diff --git "a/all.jsonl" "b/all.jsonl" --- "a/all.jsonl" +++ "b/all.jsonl" @@ -5553,9 +5553,9 @@ {"id":5553,"text":"Payment systems like Apple Pay and Google Pay can offer more protection.","entities":[{"id":51542,"label":"SOFTWARE","start_offset":21,"end_offset":30},{"id":51543,"label":"SOFTWARE","start_offset":35,"end_offset":45}],"relations":[],"Comments":[]} {"id":5554,"text":"They use a one-time generated series of numbers for each transaction, so that if attackers get their hands on it, they won’t be able to use it in the future.","entities":[],"relations":[],"Comments":[]} {"id":5555,"text":" It goes without saying that you should keep a close eye on your card statements\/bank account at all times – watching out even for small amounts that hackers may be making to test if your card is still active.","entities":[],"relations":[],"Comments":[]} -{"id":5556,"text":" However, the most effective way to stay safe is to use Trend Micro Security.","entities":[{"id":17097,"label":"location","start_offset":14,"end_offset":18},{"id":17098,"label":"location","start_offset":29,"end_offset":32},{"id":17099,"label":"location","start_offset":41,"end_offset":45}],"relations":[],"Comments":[]} -{"id":5557,"text":" How Trend Micro can help Trend Micro Security features two key mechanisms to help stop Magecart attacks:","entities":[{"id":17102,"label":"location","start_offset":23,"end_offset":26},{"id":17104,"label":"location","start_offset":89,"end_offset":93},{"id":17105,"label":"malware","start_offset":94,"end_offset":102}],"relations":[],"Comments":[]} -{"id":5558,"text":" It can detect whether the website you want to visit has been injected with skimming code, and block you from visiting the URL (via web reputation), as well as from going to malicious domains the skimming code has access to.","entities":[{"id":17106,"label":"location","start_offset":7,"end_offset":10},{"id":17107,"label":"location","start_offset":94,"end_offset":97}],"relations":[],"Comments":[]} +{"id":5556,"text":" However, the most effective way to stay safe is to use Trend Micro Security.","entities":[],"relations":[],"Comments":[]} +{"id":5557,"text":" How Trend Micro can help Trend Micro Security features two key mechanisms to help stop Magecart attacks:","entities":[{"id":51773,"label":"malware","start_offset":94,"end_offset":102}],"relations":[],"Comments":[]} +{"id":5558,"text":" It can detect whether the website you want to visit has been injected with skimming code, and block you from visiting the URL (via web reputation), as well as from going to malicious domains the skimming code has access to.","entities":[],"relations":[],"Comments":[]} {"id":5559,"text":" It uses a combination of techniques (via its Advanced Threat Scanning Engine and TrendX-File machine learning) to detect whether the malicious JavaScript code has landed on your local drive and is ready to run in your browser – and then blocks it.","entities":[{"id":17108,"label":"location","start_offset":78,"end_offset":81},{"id":17109,"label":"location","start_offset":191,"end_offset":194},{"id":17110,"label":"location","start_offset":229,"end_offset":232}],"relations":[],"Comments":[]} {"id":5560,"text":"This can spot both Magecart and similar digital skimming code.","entities":[{"id":17111,"label":"location","start_offset":5,"end_offset":8},{"id":17113,"label":"location","start_offset":28,"end_offset":31}],"relations":[],"Comments":[]} {"id":5561,"text":" Read our Security Intelligence Blog for more technical details on Magecart.","entities":[{"id":17114,"label":"location","start_offset":16,"end_offset":24}],"relations":[],"Comments":[]} @@ -13499,203 +13499,203 @@ {"id":13499,"text":"While it offers standard mailbox copies that was likely stolen with the help of credential phishing, Void Balaur also offers copies of mailboxes that have not been interacted with — for a higher price.","entities":[{"id":51567,"label":"threat-actor","start_offset":101,"end_offset":112},{"id":51568,"label":"attack-pattern","start_offset":80,"end_offset":99}],"relations":[{"id":1104,"from_id":51567,"to_id":51568,"type":"uses"}],"Comments":[]} {"id":13500,"text":"This option is particularly interesting since it would be extremely difficult under normal circumstances to gather the contents of a mailbox without any user interaction, which points to possibilities such as insider assistance or even the compromise of the email provider’s systems.","entities":[],"relations":[],"Comments":[]} {"id":13501,"text":" Figure 1.","entities":[],"relations":[],"Comments":[]} -{"id":13502,"text":"Countries in which Void Balaur email targets were located In addition, Void Balaur also offers their customers access to a large amount of private data, which includes information such as flight and travel data (passports and ticket purchases); criminal records; financial records and credit histories; pension funds; and even printouts of SMS messages.","entities":[],"relations":[],"Comments":[]} -{"id":13503,"text":"It’s easy to see why the services of a cybermercenary like Void Balaur is in demand — these types of information can be very useful for a group or an individual who wants to launch an attack on specific targets.","entities":[{"id":42112,"label":"location","start_offset":113,"end_offset":116}],"relations":[],"Comments":[]} -{"id":13504,"text":"Void Balaur’s high-profile targets","entities":[],"relations":[],"Comments":[]} -{"id":13505,"text":"What makes Void Balaur’s attacks particularly noteworthy is the often-lofty status of its targets.","entities":[],"relations":[],"Comments":[]} -{"id":13506,"text":"While the threat actor has been known to offer its services to a more general audience — as seen in its online advertisements in the underground — research from groups such as eQualit.ie and Amnesty International show that Void Balaur is likely also involved in attacks against higher profile victims, ranging from human rights activists and journalists to politicians and even presidential candidates.","entities":[{"id":42116,"label":"location","start_offset":187,"end_offset":190},{"id":42119,"label":"location","start_offset":238,"end_offset":244},{"id":42120,"label":"location","start_offset":338,"end_offset":341},{"id":42121,"label":"location","start_offset":369,"end_offset":372}],"relations":[],"Comments":[]} -{"id":13507,"text":"One of the group’s more notable campaigns involved attacks that targeted the private email addresses of government officials and politicians in an Eastern European country in September 2021.","entities":[{"id":42123,"label":"location","start_offset":125,"end_offset":128}],"relations":[],"Comments":[]} -{"id":13508,"text":"Living up to its cybermercenary label, Void Balaur does not limit itself to the geopolitical scene.","entities":[],"relations":[],"Comments":[]} -{"id":13509,"text":"Organizations that have access to a large amount of private information are also frequent victims of the group.","entities":[{"id":42127,"label":"location","start_offset":36,"end_offset":41},{"id":42128,"label":"location","start_offset":72,"end_offset":75}],"relations":[],"Comments":[]} -{"id":13510,"text":"These targets belong to different industries such as the telecommunications, retail, financial, medical, and even the biotech sectors.","entities":[{"id":42129,"label":"location","start_offset":105,"end_offset":108}],"relations":[],"Comments":[]} -{"id":13511,"text":"Organizational leaders and employees that are heavily involved with the company’s core business are among the threat actor’s favored targets, since these individuals will likely have access to the kind of information the group seeks.","entities":[{"id":42130,"label":"location","start_offset":23,"end_offset":26},{"id":42131,"label":"location","start_offset":42,"end_offset":45},{"id":42132,"label":"location","start_offset":82,"end_offset":86},{"id":42133,"label":"location","start_offset":96,"end_offset":99},{"id":42134,"label":"location","start_offset":166,"end_offset":170},{"id":42135,"label":"location","start_offset":171,"end_offset":177}],"relations":[],"Comments":[]} +{"id":13502,"text":"Countries in which Void Balaur email targets were located In addition, Void Balaur also offers their customers access to a large amount of private data, which includes information such as flight and travel data (passports and ticket purchases); criminal records; financial records and credit histories; pension funds; and even printouts of SMS messages.","entities":[{"id":51569,"label":"threat-actor","start_offset":19,"end_offset":30},{"id":51570,"label":"threat-actor","start_offset":76,"end_offset":87}],"relations":[],"Comments":[]} +{"id":13503,"text":"It’s easy to see why the services of a cybermercenary like Void Balaur is in demand — these types of information can be very useful for a group or an individual who wants to launch an attack on specific targets.","entities":[{"id":51571,"label":"threat-actor","start_offset":59,"end_offset":70}],"relations":[],"Comments":[]} +{"id":13504,"text":"Void Balaur’s high-profile targets","entities":[{"id":51572,"label":"threat-actor","start_offset":0,"end_offset":12}],"relations":[],"Comments":[]} +{"id":13505,"text":"What makes Void Balaur’s attacks particularly noteworthy is the often-lofty status of its targets.","entities":[{"id":51573,"label":"threat-actor","start_offset":11,"end_offset":23}],"relations":[],"Comments":[]} +{"id":13506,"text":"While the threat actor has been known to offer its services to a more general audience — as seen in its online advertisements in the underground — research from groups such as eQualit.ie and Amnesty International show that Void Balaur is likely also involved in attacks against higher profile victims, ranging from human rights activists and journalists to politicians and even presidential candidates.","entities":[{"id":51574,"label":"identity","start_offset":176,"end_offset":186},{"id":51575,"label":"identity","start_offset":191,"end_offset":213},{"id":51576,"label":"threat-actor","start_offset":223,"end_offset":234}],"relations":[],"Comments":[]} +{"id":13507,"text":"One of the group’s more notable campaigns involved attacks that targeted the private email addresses of government officials and politicians in an Eastern European country in September 2021.","entities":[{"id":51578,"label":"TIME","start_offset":175,"end_offset":189},{"id":51577,"label":"location","start_offset":147,"end_offset":163}],"relations":[],"Comments":[]} +{"id":13508,"text":"Living up to its cybermercenary label, Void Balaur does not limit itself to the geopolitical scene.","entities":[{"id":51579,"label":"threat-actor","start_offset":39,"end_offset":51}],"relations":[],"Comments":[]} +{"id":13509,"text":"Organizations that have access to a large amount of private information are also frequent victims of the group.","entities":[],"relations":[],"Comments":[]} +{"id":13510,"text":"These targets belong to different industries such as the telecommunications, retail, financial, medical, and even the biotech sectors.","entities":[],"relations":[],"Comments":[]} +{"id":13511,"text":"Organizational leaders and employees that are heavily involved with the company’s core business are among the threat actor’s favored targets, since these individuals will likely have access to the kind of information the group seeks.","entities":[],"relations":[],"Comments":[]} {"id":13512,"text":"Curtailing cybermercenary attacks","entities":[],"relations":[],"Comments":[]} -{"id":13513,"text":"Given what we’ve seen of cybermercenaries like Void Balaur, it is likely that these groups have access to a large number of tools and infrastructure that allows them to launch attacks even against prominent individuals and organizations.","entities":[{"id":42136,"label":"location","start_offset":0,"end_offset":5},{"id":42138,"label":"location","start_offset":66,"end_offset":72},{"id":42139,"label":"location","start_offset":108,"end_offset":113},{"id":42140,"label":"location","start_offset":130,"end_offset":133},{"id":42141,"label":"location","start_offset":161,"end_offset":165},{"id":42142,"label":"location","start_offset":219,"end_offset":222}],"relations":[],"Comments":[]} -{"id":13514,"text":"However, this does not mean that practicing and implementing the right security safeguards will not help in defending against cybermercenary attacks.","entities":[{"id":42143,"label":"location","start_offset":44,"end_offset":47},{"id":42144,"label":"location","start_offset":71,"end_offset":79},{"id":42145,"label":"location","start_offset":91,"end_offset":95}],"relations":[],"Comments":[]} -{"id":13515,"text":"The following security best practices can help both individuals and organizations thwart cybermercenary attacks (and cyberattacks in general): Employ the services of a reputable provider that places high priority on security.","entities":[{"id":42146,"label":"location","start_offset":14,"end_offset":22},{"id":42147,"label":"location","start_offset":23,"end_offset":27},{"id":42148,"label":"location","start_offset":38,"end_offset":41},{"id":42149,"label":"location","start_offset":64,"end_offset":67},{"id":42150,"label":"location","start_offset":113,"end_offset":116},{"id":42151,"label":"location","start_offset":217,"end_offset":225}],"relations":[],"Comments":[]} +{"id":13513,"text":"Given what we’ve seen of cybermercenaries like Void Balaur, it is likely that these groups have access to a large number of tools and infrastructure that allows them to launch attacks even against prominent individuals and organizations.","entities":[{"id":51580,"label":"threat-actor","start_offset":47,"end_offset":58}],"relations":[],"Comments":[]} +{"id":13514,"text":"However, this does not mean that practicing and implementing the right security safeguards will not help in defending against cybermercenary attacks.","entities":[],"relations":[],"Comments":[]} +{"id":13515,"text":"The following security best practices can help both individuals and organizations thwart cybermercenary attacks (and cyberattacks in general): Employ the services of a reputable provider that places high priority on security.","entities":[],"relations":[],"Comments":[]} {"id":13516,"text":"Consider using dedicated two-factor authentication apps or devices such as Yubikey instead of relying on SMS.","entities":[],"relations":[],"Comments":[]} {"id":13517,"text":"Use encryption systems for communication, especially when it involves sensitive information.","entities":[],"relations":[],"Comments":[]} -{"id":13518,"text":"Encrypt the drives of all computers and other machines that are used to store sensitive information.","entities":[{"id":42154,"label":"location","start_offset":36,"end_offset":39},{"id":42155,"label":"location","start_offset":60,"end_offset":63}],"relations":[],"Comments":[]} -{"id":13519,"text":"Practice good security hygiene by deleting old emails and messages to minimize the chances of an attacker gaining access to private information.","entities":[{"id":42156,"label":"location","start_offset":9,"end_offset":13},{"id":42157,"label":"location","start_offset":14,"end_offset":22},{"id":42158,"label":"location","start_offset":23,"end_offset":30},{"id":42159,"label":"location","start_offset":54,"end_offset":57}],"relations":[],"Comments":[]} -{"id":13520,"text":"Learn more about the activities and targets of Void Balaur in our research paper, Void Balaur: Tracking a Cybermercenary’s Activities.","entities":[{"id":42160,"label":"location","start_offset":32,"end_offset":35},{"id":42161,"label":"threat-actor","start_offset":47,"end_offset":58}],"relations":[],"Comments":[]} -{"id":13521,"text":" Tags APT & Targeted Attacks | Cyber Crime | Research | Articles, News, Reports","entities":[{"id":42163,"label":"location","start_offset":10,"end_offset":13}],"relations":[],"Comments":[]} -{"id":13522,"text":"The US Department of Energy (DOE) recently launched the Operational Technology (OT) Defender Fellowship.","entities":[{"id":42166,"label":"location","start_offset":93,"end_offset":103}],"relations":[],"Comments":[]} -{"id":13523,"text":"Another milestone step from the Department in enhancing the US's critical infrastructure.","entities":[],"relations":[],"Comments":[]} -{"id":13524,"text":"In collaboration with DOE's Idaho National Laboratory (INL) and the Foundation for Defense of Democracies' (FDD) Center for Cyber and Technology Innovation (CTTI), the OT Defender Fellowship hopes to expand the knowledge of primary US front-line critical infrastructure defenders.","entities":[{"id":42172,"label":"location","start_offset":60,"end_offset":63},{"id":42178,"label":"malware","start_offset":200,"end_offset":206}],"relations":[],"Comments":[]} -{"id":13525,"text":"Briolette also said that operation technology security managers play a vital role in keeping the core physical systems of the US's energy infrastructure running smoothly, especially during natural disasters, physical sabotage, and even nation-state cyberattacks.","entities":[{"id":42181,"label":"location","start_offset":46,"end_offset":54},{"id":42182,"label":"location","start_offset":97,"end_offset":101},{"id":42184,"label":"location","start_offset":131,"end_offset":137},{"id":42185,"label":"location","start_offset":227,"end_offset":230}],"relations":[],"Comments":[]} +{"id":13518,"text":"Encrypt the drives of all computers and other machines that are used to store sensitive information.","entities":[],"relations":[],"Comments":[]} +{"id":13519,"text":"Practice good security hygiene by deleting old emails and messages to minimize the chances of an attacker gaining access to private information.","entities":[],"relations":[],"Comments":[]} +{"id":13520,"text":"Learn more about the activities and targets of Void Balaur in our research paper, Void Balaur: Tracking a Cybermercenary’s Activities.","entities":[{"id":42161,"label":"threat-actor","start_offset":47,"end_offset":58}],"relations":[],"Comments":[]} +{"id":13521,"text":" Tags APT & Targeted Attacks | Cyber Crime | Research | Articles, News, Reports","entities":[],"relations":[],"Comments":[]} +{"id":13522,"text":"The US Department of Energy (DOE) recently launched the Operational Technology (OT) Defender Fellowship.","entities":[{"id":51581,"label":"identity","start_offset":4,"end_offset":33}],"relations":[],"Comments":[]} +{"id":13523,"text":"Another milestone step from the Department in enhancing the US's critical infrastructure.","entities":[{"id":51582,"label":"location","start_offset":60,"end_offset":63}],"relations":[],"Comments":[]} +{"id":13524,"text":"In collaboration with DOE's Idaho National Laboratory (INL) and the Foundation for Defense of Democracies' (FDD) Center for Cyber and Technology Innovation (CTTI), the OT Defender Fellowship hopes to expand the knowledge of primary US front-line critical infrastructure defenders.","entities":[{"id":51583,"label":"identity","start_offset":29,"end_offset":59},{"id":51584,"label":"identity","start_offset":68,"end_offset":105},{"id":51585,"label":"identity","start_offset":113,"end_offset":156},{"id":51587,"label":"identity","start_offset":168,"end_offset":190}],"relations":[],"Comments":[]} +{"id":13525,"text":"Briolette also said that operation technology security managers play a vital role in keeping the core physical systems of the US's energy infrastructure running smoothly, especially during natural disasters, physical sabotage, and even nation-state cyberattacks.","entities":[{"id":51588,"label":"location","start_offset":126,"end_offset":128}],"relations":[],"Comments":[]} {"id":13526,"text":"Sharing cybersecurity knowledge to the private sector","entities":[],"relations":[],"Comments":[]} -{"id":13527,"text":"The OT Defender Fellowship is a 12-month program for operational technology security managers in the US energy sector.","entities":[{"id":42188,"label":"location","start_offset":76,"end_offset":84},{"id":42190,"label":"location","start_offset":104,"end_offset":110}],"relations":[],"Comments":[]} -{"id":13528,"text":"It will enable the program participants to engage with various cyber and national experts across the US government.","entities":[{"id":42191,"label":"location","start_offset":3,"end_offset":7},{"id":42192,"label":"location","start_offset":69,"end_offset":72},{"id":42193,"label":"location","start_offset":73,"end_offset":81}],"relations":[],"Comments":[]} -{"id":13529,"text":"The program aims to also equip them with a better understanding of the strategies and tactics of the country's adversaries and how the US government cyber operations defend the nation.","entities":[{"id":42195,"label":"location","start_offset":31,"end_offset":35},{"id":42196,"label":"location","start_offset":82,"end_offset":85},{"id":42197,"label":"location","start_offset":123,"end_offset":126}],"relations":[],"Comments":[]} -{"id":13530,"text":"The Fellowship aligns with the bipartisan recommendations of the congressionally mandated Cyberspace Solarium Commission (CSC).","entities":[{"id":42199,"label":"location","start_offset":4,"end_offset":14}],"relations":[],"Comments":[]} -{"id":13531,"text":"King also explains that the CSC report supports operationalizing cybersecurity partnership with the private sector and remolding how the government works with the private sector.","entities":[{"id":42204,"label":"location","start_offset":115,"end_offset":118}],"relations":[],"Comments":[]} -{"id":13532,"text":"King added that this DOE initiative will better protect the US from cyberattacks.","entities":[{"id":42205,"label":"location","start_offset":0,"end_offset":4},{"id":42207,"label":"location","start_offset":36,"end_offset":40}],"relations":[],"Comments":[]} -{"id":13533,"text":"Tom Fanning, Chairman, President & CEO of Southern Company, says that national security greatly depends on the collaboration between private sector and the government.","entities":[{"id":42211,"label":"location","start_offset":70,"end_offset":78},{"id":42212,"label":"location","start_offset":79,"end_offset":87},{"id":42213,"label":"location","start_offset":125,"end_offset":132},{"id":42214,"label":"location","start_offset":148,"end_offset":151}],"relations":[],"Comments":[]} -{"id":13534,"text":"To qualify for the fellowship, participants must be in a middle or senior management role in a US energy sector, with decision-making authority and oversight responsibility of operational technology systems.","entities":[{"id":42215,"label":"location","start_offset":19,"end_offset":29},{"id":42216,"label":"location","start_offset":57,"end_offset":63},{"id":42218,"label":"location","start_offset":98,"end_offset":104},{"id":42219,"label":"location","start_offset":144,"end_offset":147}],"relations":[],"Comments":[]} -{"id":13535,"text":"They must also be nominated by their organization's leadership and commit to the requirements imposed by the program.","entities":[{"id":42220,"label":"location","start_offset":63,"end_offset":66}],"relations":[],"Comments":[]} -{"id":13536,"text":"The participant must also be a US citizen and currently hold or be able to attain federal security clearance at the Secret or higher level, or be in a role that justifies application for Department of Homeland Security-sponsored private sector clearance.","entities":[{"id":42222,"label":"location","start_offset":42,"end_offset":45},{"id":42223,"label":"location","start_offset":82,"end_offset":89},{"id":42224,"label":"location","start_offset":90,"end_offset":98}],"relations":[],"Comments":[]} -{"id":13537,"text":"For more information about the OT Defender Fellowship, visit https:\/\/inl.gov\/otdefender\/ Tags Latest News | ICS OT | APT & Targeted Attacks | IoT | Articles, News, Reports","entities":[{"id":42227,"label":"location","start_offset":43,"end_offset":53},{"id":42228,"label":"URL","start_offset":61,"end_offset":88},{"id":42229,"label":"location","start_offset":125,"end_offset":128}],"relations":[],"Comments":[]} -{"id":13538,"text":"Since 2019, we have been tracking a threat campaign we dubbed as “Water Pamola.”","entities":[{"id":42231,"label":"location","start_offset":43,"end_offset":51}],"relations":[],"Comments":[]} -{"id":13539,"text":"The campaign initially compromised e-commerce online shops in Japan, Australia, and European countries via spam emails with malicious attachments.","entities":[{"id":42233,"label":"location","start_offset":4,"end_offset":12},{"id":42234,"label":"location","start_offset":37,"end_offset":45},{"id":42237,"label":"location","start_offset":80,"end_offset":83}],"relations":[],"Comments":[]} -{"id":13540,"text":"However, since early 2020, we’ve noticed some changes to Water Pamola’s activity.","entities":[],"relations":[],"Comments":[]} -{"id":13541,"text":"Victims are now mainly located only in Japan.","entities":[{"id":42241,"label":"location","start_offset":8,"end_offset":11},{"id":42242,"label":"location","start_offset":31,"end_offset":35}],"relations":[],"Comments":[]} -{"id":13542,"text":"Recent telemetry data indicates that the attacks are not being launched via spam anymore.","entities":[{"id":42244,"label":"location","start_offset":49,"end_offset":52}],"relations":[],"Comments":[]} -{"id":13543,"text":"Instead, malicious scripts are being executed when the administrators look into customer orders in their online shop’s administration panel.","entities":[{"id":42245,"label":"location","start_offset":27,"end_offset":30}],"relations":[],"Comments":[]} +{"id":13527,"text":"The OT Defender Fellowship is a 12-month program for operational technology security managers in the US energy sector.","entities":[{"id":51589,"label":"location","start_offset":101,"end_offset":103}],"relations":[],"Comments":[]} +{"id":13528,"text":"It will enable the program participants to engage with various cyber and national experts across the US government.","entities":[],"relations":[],"Comments":[]} +{"id":13529,"text":"The program aims to also equip them with a better understanding of the strategies and tactics of the country's adversaries and how the US government cyber operations defend the nation.","entities":[{"id":51590,"label":"identity","start_offset":135,"end_offset":149}],"relations":[],"Comments":[]} +{"id":13530,"text":"The Fellowship aligns with the bipartisan recommendations of the congressionally mandated Cyberspace Solarium Commission (CSC).","entities":[{"id":51592,"label":"identity","start_offset":90,"end_offset":126}],"relations":[],"Comments":[]} +{"id":13531,"text":"King also explains that the CSC report supports operationalizing cybersecurity partnership with the private sector and remolding how the government works with the private sector.","entities":[{"id":51593,"label":"identity","start_offset":28,"end_offset":31},{"id":51594,"label":"identity","start_offset":0,"end_offset":4}],"relations":[],"Comments":[]} +{"id":13532,"text":"King added that this DOE initiative will better protect the US from cyberattacks.","entities":[{"id":51595,"label":"identity","start_offset":0,"end_offset":4},{"id":51596,"label":"location","start_offset":60,"end_offset":62}],"relations":[],"Comments":[]} +{"id":13533,"text":"Tom Fanning, Chairman, President & CEO of Southern Company, says that national security greatly depends on the collaboration between private sector and the government.","entities":[{"id":51597,"label":"identity","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} +{"id":13534,"text":"To qualify for the fellowship, participants must be in a middle or senior management role in a US energy sector, with decision-making authority and oversight responsibility of operational technology systems.","entities":[{"id":51598,"label":"location","start_offset":95,"end_offset":97}],"relations":[],"Comments":[]} +{"id":13535,"text":"They must also be nominated by their organization's leadership and commit to the requirements imposed by the program.","entities":[],"relations":[],"Comments":[]} +{"id":13536,"text":"The participant must also be a US citizen and currently hold or be able to attain federal security clearance at the Secret or higher level, or be in a role that justifies application for Department of Homeland Security-sponsored private sector clearance.","entities":[],"relations":[],"Comments":[]} +{"id":13537,"text":"For more information about the OT Defender Fellowship, visit https:\/\/inl.gov\/otdefender\/ Tags Latest News | ICS OT | APT & Targeted Attacks | IoT | Articles, News, Reports","entities":[{"id":42228,"label":"URL","start_offset":61,"end_offset":88}],"relations":[],"Comments":[]} +{"id":13538,"text":"Since 2019, we have been tracking a threat campaign we dubbed as “Water Pamola.”","entities":[{"id":51599,"label":"TIME","start_offset":6,"end_offset":10},{"id":51600,"label":"campaign","start_offset":66,"end_offset":78}],"relations":[],"Comments":[]} +{"id":13539,"text":"The campaign initially compromised e-commerce online shops in Japan, Australia, and European countries via spam emails with malicious attachments.","entities":[{"id":51605,"label":"attack-pattern","start_offset":107,"end_offset":118},{"id":51606,"label":"campaign","start_offset":4,"end_offset":12},{"id":51607,"label":"identity","start_offset":35,"end_offset":58},{"id":51601,"label":"location","start_offset":62,"end_offset":67},{"id":51602,"label":"location","start_offset":69,"end_offset":78},{"id":51603,"label":"location","start_offset":84,"end_offset":92}],"relations":[{"id":1105,"from_id":51606,"to_id":51607,"type":"targets"},{"id":1106,"from_id":51607,"to_id":51601,"type":"located-at"},{"id":1107,"from_id":51607,"to_id":51602,"type":"located-at"},{"id":1108,"from_id":51607,"to_id":51603,"type":"located-at"},{"id":1110,"from_id":51606,"to_id":51605,"type":"uses"}],"Comments":[]} +{"id":13540,"text":"However, since early 2020, we’ve noticed some changes to Water Pamola’s activity.","entities":[{"id":51609,"label":"campaign","start_offset":57,"end_offset":69},{"id":51610,"label":"TIME","start_offset":15,"end_offset":25}],"relations":[],"Comments":[]} +{"id":13541,"text":"Victims are now mainly located only in Japan.","entities":[{"id":51611,"label":"location","start_offset":39,"end_offset":44},{"id":51612,"label":"identity","start_offset":0,"end_offset":7}],"relations":[{"id":1111,"from_id":51612,"to_id":51611,"type":"located-at"}],"Comments":[]} +{"id":13542,"text":"Recent telemetry data indicates that the attacks are not being launched via spam anymore.","entities":[{"id":51613,"label":"attack-pattern","start_offset":76,"end_offset":80}],"relations":[],"Comments":[]} +{"id":13543,"text":"Instead, malicious scripts are being executed when the administrators look into customer orders in their online shop’s administration panel.","entities":[{"id":51614,"label":"identity","start_offset":55,"end_offset":69},{"id":51615,"label":"SOFTWARE","start_offset":105,"end_offset":139},{"id":51616,"label":"malware","start_offset":9,"end_offset":26}],"relations":[{"id":1112,"from_id":51616,"to_id":51615,"type":"targets"},{"id":1113,"from_id":51614,"to_id":51615,"type":"uses"}],"Comments":[]} {"id":13544,"text":" Figure 1.","entities":[],"relations":[],"Comments":[]} -{"id":13545,"text":"The Water Pamola attack chain After further searching, we noticed that an online store administrator asked about a strange online order that contains JavaScript code inserted into the field where the customer’s address or company name would normally be located.","entities":[{"id":42248,"label":"location","start_offset":189,"end_offset":194}],"relations":[],"Comments":[]} -{"id":13546,"text":"This script is likely activated by exploiting a cross-site scripting (XSS) vulnerability in the said store’s administration portal.","entities":[{"id":42249,"label":"location","start_offset":15,"end_offset":21},{"id":42250,"label":"location","start_offset":48,"end_offset":53},{"id":42251,"label":"attack-pattern","start_offset":59,"end_offset":68},{"id":42252,"label":"attack-pattern","start_offset":70,"end_offset":73},{"id":42253,"label":"location","start_offset":124,"end_offset":130}],"relations":[],"Comments":[]} +{"id":13545,"text":"The Water Pamola attack chain After further searching, we noticed that an online store administrator asked about a strange online order that contains JavaScript code inserted into the field where the customer’s address or company name would normally be located.","entities":[{"id":51617,"label":"campaign","start_offset":4,"end_offset":16},{"id":51618,"label":"identity","start_offset":79,"end_offset":105},{"id":51620,"label":"attack-pattern","start_offset":155,"end_offset":179}],"relations":[{"id":1114,"from_id":51617,"to_id":51620,"type":"uses"}],"Comments":[]} +{"id":13546,"text":"This script is likely activated by exploiting a cross-site scripting (XSS) vulnerability in the said store’s administration portal.","entities":[{"id":51622,"label":"SOFTWARE","start_offset":101,"end_offset":130},{"id":51623,"label":"malware","start_offset":5,"end_offset":11},{"id":51621,"label":"attack-pattern","start_offset":48,"end_offset":74}],"relations":[{"id":1115,"from_id":51623,"to_id":51622,"type":"targets"},{"id":1116,"from_id":51623,"to_id":51621,"type":"uses"}],"Comments":[]} {"id":13547,"text":" Figure 2.","entities":[],"relations":[],"Comments":[]} -{"id":13548,"text":"The question asked on a forum showing the payload related to Water Pamola.","entities":[],"relations":[],"Comments":[]} -{"id":13549,"text":" The above is a screenshot of the text in a forum, which is translated by Google Translate as Problem, there is an order that seems to be a mischievous order.","entities":[],"relations":[],"Comments":[]} -{"id":13550,"text":"The following characters are included in the address and company name.","entities":[{"id":42256,"label":"location","start_offset":25,"end_offset":28},{"id":42257,"label":"location","start_offset":53,"end_offset":56}],"relations":[],"Comments":[]} -{"id":13551,"text":"The script connects to the Water Pamola’s server and downloads additional payloads.","entities":[{"id":42259,"label":"location","start_offset":49,"end_offset":52}],"relations":[],"Comments":[]} -{"id":13552,"text":"Taken together, this led us to believe that Water Pamola places orders with this embedded XSS script across many targeted online shops.","entities":[{"id":42261,"label":"attack-pattern","start_offset":90,"end_offset":93},{"id":42262,"label":"location","start_offset":108,"end_offset":112}],"relations":[],"Comments":[]} -{"id":13553,"text":"If they are vulnerable to this XSS attack, these will be loaded when the victim (i.e., an administrator at the targeted merchant) opens the order within their management panel.","entities":[{"id":42263,"label":"location","start_offset":8,"end_offset":11},{"id":42264,"label":"attack-pattern","start_offset":31,"end_offset":34},{"id":42265,"label":"location","start_offset":49,"end_offset":53}],"relations":[],"Comments":[]} -{"id":13554,"text":"We have collected many attack scripts they delivered to different targets.","entities":[{"id":42266,"label":"location","start_offset":18,"end_offset":22}],"relations":[],"Comments":[]} -{"id":13555,"text":"The malicious behavior performed by the scripts includes page grabbing, credential phishing, web shell infection, and malware delivery.","entities":[{"id":42267,"label":"location","start_offset":57,"end_offset":61},{"id":42268,"label":"attack-pattern","start_offset":83,"end_offset":91},{"id":42269,"label":"attack-pattern","start_offset":93,"end_offset":102},{"id":42270,"label":"location","start_offset":114,"end_offset":117}],"relations":[],"Comments":[]} -{"id":13556,"text":"This campaign appears to be financially motivated.","entities":[{"id":42271,"label":"location","start_offset":5,"end_offset":13}],"relations":[],"Comments":[]} -{"id":13557,"text":"In at least one instance, a site that Water Pamola attacked later disclosed that they had suffered a data breach.","entities":[],"relations":[],"Comments":[]} -{"id":13558,"text":"Their server was illegally accessed and personal information, which included names, credit card numbers, card expiration dates, and credit card security codes, were potentially leaked.","entities":[{"id":42274,"label":"location","start_offset":36,"end_offset":39},{"id":42275,"label":"location","start_offset":128,"end_offset":131},{"id":42276,"label":"location","start_offset":144,"end_offset":152}],"relations":[],"Comments":[]} -{"id":13559,"text":"This breach might be associated with Water Pamola, and it hints that this campaign’s overall goal is to steal the credit card data (similar to Magecart campaigns).","entities":[{"id":42278,"label":"location","start_offset":51,"end_offset":54},{"id":42279,"label":"location","start_offset":74,"end_offset":82},{"id":42280,"label":"location","start_offset":85,"end_offset":92}],"relations":[],"Comments":[]} +{"id":13548,"text":"The question asked on a forum showing the payload related to Water Pamola.","entities":[{"id":51624,"label":"campaign","start_offset":61,"end_offset":73}],"relations":[],"Comments":[]} +{"id":13549,"text":" The above is a screenshot of the text in a forum, which is translated by Google Translate as Problem, there is an order that seems to be a mischievous order.","entities":[{"id":51625,"label":"SOFTWARE","start_offset":78,"end_offset":94}],"relations":[],"Comments":[]} +{"id":13550,"text":"The following characters are included in the address and company name.","entities":[],"relations":[],"Comments":[]} +{"id":13551,"text":"The script connects to the Water Pamola’s server and downloads additional payloads.","entities":[{"id":51627,"label":"malware","start_offset":4,"end_offset":10},{"id":51626,"label":"Infrastucture","start_offset":27,"end_offset":48}],"relations":[{"id":1117,"from_id":51627,"to_id":51626,"type":"beacons-to"}],"Comments":[]} +{"id":13552,"text":"Taken together, this led us to believe that Water Pamola places orders with this embedded XSS script across many targeted online shops.","entities":[{"id":51628,"label":"campaign","start_offset":44,"end_offset":56},{"id":42261,"label":"attack-pattern","start_offset":90,"end_offset":93}],"relations":[{"id":1118,"from_id":51628,"to_id":42261,"type":"uses"}],"Comments":[]} +{"id":13553,"text":"If they are vulnerable to this XSS attack, these will be loaded when the victim (i.e., an administrator at the targeted merchant) opens the order within their management panel.","entities":[{"id":51629,"label":"attack-pattern","start_offset":31,"end_offset":34},{"id":51630,"label":"SOFTWARE","start_offset":159,"end_offset":175}],"relations":[],"Comments":[]} +{"id":13554,"text":"We have collected many attack scripts they delivered to different targets.","entities":[],"relations":[],"Comments":[]} +{"id":13555,"text":"The malicious behavior performed by the scripts includes page grabbing, credential phishing, web shell infection, and malware delivery.","entities":[{"id":51631,"label":"attack-pattern","start_offset":57,"end_offset":70},{"id":51634,"label":"attack-pattern","start_offset":118,"end_offset":134},{"id":51632,"label":"attack-pattern","start_offset":72,"end_offset":91},{"id":51633,"label":"attack-pattern","start_offset":93,"end_offset":112}],"relations":[],"Comments":[]} +{"id":13556,"text":"This campaign appears to be financially motivated.","entities":[],"relations":[],"Comments":[]} +{"id":13557,"text":"In at least one instance, a site that Water Pamola attacked later disclosed that they had suffered a data breach.","entities":[{"id":51635,"label":"campaign","start_offset":38,"end_offset":50}],"relations":[],"Comments":[]} +{"id":13558,"text":"Their server was illegally accessed and personal information, which included names, credit card numbers, card expiration dates, and credit card security codes, were potentially leaked.","entities":[{"id":51636,"label":"Infrastucture","start_offset":6,"end_offset":12}],"relations":[],"Comments":[]} +{"id":13559,"text":"This breach might be associated with Water Pamola, and it hints that this campaign’s overall goal is to steal the credit card data (similar to Magecart campaigns).","entities":[{"id":51637,"label":"campaign","start_offset":37,"end_offset":49}],"relations":[],"Comments":[]} {"id":13560,"text":"Analysis of the XSS attack","entities":[{"id":42282,"label":"attack-pattern","start_offset":16,"end_offset":19}],"relations":[],"Comments":[]} -{"id":13561,"text":"As previously mentioned, Water Pamola sent online shopping orders appended with a malicious XSS script to attack e-commerce administrators.","entities":[{"id":42284,"label":"attack-pattern","start_offset":92,"end_offset":95},{"id":42285,"label":"location","start_offset":115,"end_offset":123}],"relations":[],"Comments":[]} -{"id":13562,"text":" It’s worth mentioning that they are not targeting a specific e-commerce framework, but e-commerce systems in general.","entities":[{"id":42286,"label":"location","start_offset":6,"end_offset":11},{"id":42287,"label":"location","start_offset":33,"end_offset":36},{"id":42288,"label":"location","start_offset":64,"end_offset":72},{"id":42289,"label":"location","start_offset":90,"end_offset":98}],"relations":[],"Comments":[]} -{"id":13563,"text":"If the store’s e-commerce system is vulnerable to XSS attacks, the malicious script will be loaded and executed on the merchant’s management panel once someone (like a system administrator or store employee) opens the said order.","entities":[{"id":42290,"label":"location","start_offset":17,"end_offset":25},{"id":42291,"label":"attack-pattern","start_offset":50,"end_offset":53},{"id":42292,"label":"location","start_offset":84,"end_offset":88},{"id":42293,"label":"location","start_offset":99,"end_offset":102}],"relations":[],"Comments":[]} -{"id":13564,"text":"These scripts were managed with an XSS attack framework called “XSS.ME,” which helps attackers deal with their attack scripts and the stolen information.","entities":[{"id":42294,"label":"attack-pattern","start_offset":35,"end_offset":38},{"id":42295,"label":"location","start_offset":95,"end_offset":99},{"id":42296,"label":"location","start_offset":126,"end_offset":129}],"relations":[],"Comments":[]} -{"id":13565,"text":"The source code of this framework is shared across many Chinese public forums.","entities":[{"id":42297,"label":"attack-pattern","start_offset":4,"end_offset":10},{"id":42298,"label":"location","start_offset":51,"end_offset":55},{"id":42300,"label":"location","start_offset":64,"end_offset":70}],"relations":[],"Comments":[]} -{"id":13566,"text":"The basic attack script provided by the framework could report the victim’s location and browser cookies.","entities":[{"id":42301,"label":"location","start_offset":85,"end_offset":88}],"relations":[],"Comments":[]} +{"id":13561,"text":"As previously mentioned, Water Pamola sent online shopping orders appended with a malicious XSS script to attack e-commerce administrators.","entities":[{"id":51638,"label":"campaign","start_offset":25,"end_offset":37},{"id":51639,"label":"attack-pattern","start_offset":92,"end_offset":95},{"id":51640,"label":"identity","start_offset":113,"end_offset":138}],"relations":[{"id":1119,"from_id":51638,"to_id":51640,"type":"targets"},{"id":1120,"from_id":51638,"to_id":51639,"type":"uses"}],"Comments":[]} +{"id":13562,"text":" It’s worth mentioning that they are not targeting a specific e-commerce framework, but e-commerce systems in general.","entities":[],"relations":[],"Comments":[]} +{"id":13563,"text":"If the store’s e-commerce system is vulnerable to XSS attacks, the malicious script will be loaded and executed on the merchant’s management panel once someone (like a system administrator or store employee) opens the said order.","entities":[{"id":51641,"label":"attack-pattern","start_offset":50,"end_offset":53},{"id":51642,"label":"malware","start_offset":67,"end_offset":83},{"id":51643,"label":"SOFTWARE","start_offset":130,"end_offset":147}],"relations":[{"id":1121,"from_id":51642,"to_id":51643,"type":"targets"},{"id":1122,"from_id":51642,"to_id":51641,"type":"uses"}],"Comments":[]} +{"id":13564,"text":"These scripts were managed with an XSS attack framework called “XSS.ME,” which helps attackers deal with their attack scripts and the stolen information.","entities":[{"id":51644,"label":"attack-pattern","start_offset":35,"end_offset":38},{"id":51645,"label":"tools","start_offset":64,"end_offset":70}],"relations":[],"Comments":[]} +{"id":13565,"text":"The source code of this framework is shared across many Chinese public forums.","entities":[{"id":51646,"label":"location","start_offset":56,"end_offset":63},{"id":51647,"label":"tools","start_offset":24,"end_offset":33}],"relations":[{"id":1123,"from_id":51647,"to_id":51646,"type":"related-to"}],"Comments":[]} +{"id":13566,"text":"The basic attack script provided by the framework could report the victim’s location and browser cookies.","entities":[{"id":51648,"label":"malware","start_offset":10,"end_offset":24}],"relations":[],"Comments":[]} {"id":13567,"text":"We observed that the scripts used during the attacks were customized.","entities":[],"relations":[],"Comments":[]} -{"id":13568,"text":"The attackers delivered a variety of different XSS scripts, which could include one or more of the following behaviors: Page Grabber","entities":[{"id":42302,"label":"attack-pattern","start_offset":47,"end_offset":50},{"id":42304,"label":"malware","start_offset":120,"end_offset":124}],"relations":[],"Comments":[]} -{"id":13569,"text":"The script sends an HTTP GET request to a specified URL address and forwards the received response to Water Pamola’s server.","entities":[{"id":42305,"label":"location","start_offset":64,"end_offset":67}],"relations":[],"Comments":[]} -{"id":13570,"text":"This is usually used during an early stage of the attack to grab content from the victim’s management page.","entities":[{"id":42307,"label":"location","start_offset":31,"end_offset":36},{"id":42308,"label":"location","start_offset":65,"end_offset":72},{"id":42309,"label":"tools","start_offset":102,"end_offset":106}],"relations":[],"Comments":[]} -{"id":13571,"text":"Doing so allows the threat actor to understand the environment and design attack scripts appropriate to the victim’s environment. Figure 3.","entities":[{"id":42310,"label":"location","start_offset":63,"end_offset":66}],"relations":[],"Comments":[]} -{"id":13572,"text":"The script for grabbing page content and sending it back to the attacker Credential Phishing","entities":[{"id":42312,"label":"location","start_offset":24,"end_offset":28},{"id":42313,"label":"location","start_offset":29,"end_offset":36},{"id":42314,"label":"location","start_offset":37,"end_offset":40},{"id":42315,"label":"attack-pattern","start_offset":88,"end_offset":96}],"relations":[],"Comments":[]} -{"id":13573,"text":"Some of the delivered scripts revealed that the campaign was trying to obtain administrator credentials for e-commerce websites using two different approaches.","entities":[{"id":42316,"label":"location","start_offset":48,"end_offset":56},{"id":42317,"label":"location","start_offset":110,"end_offset":118}],"relations":[],"Comments":[]} -{"id":13574,"text":"The first way involves appending a fake login form to the page.","entities":[{"id":42320,"label":"location","start_offset":10,"end_offset":13},{"id":42321,"label":"malware","start_offset":58,"end_offset":62}],"relations":[],"Comments":[]} -{"id":13575,"text":"The script hooks the mouse click event.","entities":[{"id":42322,"label":"location","start_offset":11,"end_offset":16}],"relations":[],"Comments":[]} -{"id":13576,"text":"If the victim enters the credential in the fake form and clicks anywhere on the page, the script will take the credentials, encode them using base64, replace some characters with custom substrings, and then upload these to Water Pamola’s server. Figure 4.","entities":[{"id":42323,"label":"location","start_offset":53,"end_offset":56},{"id":42324,"label":"malware","start_offset":80,"end_offset":84},{"id":42325,"label":"location","start_offset":97,"end_offset":101},{"id":42326,"label":"location","start_offset":131,"end_offset":135},{"id":42327,"label":"location","start_offset":198,"end_offset":201}],"relations":[],"Comments":[]} -{"id":13577,"text":"The script to create and delete fake login form for credential phishing The other approach involves showing an authorization error message and then redirecting the user to a phishing website that asks users to enter their credentials.","entities":[{"id":42330,"label":"location","start_offset":21,"end_offset":24},{"id":42331,"label":"attack-pattern","start_offset":63,"end_offset":71},{"id":42332,"label":"location","start_offset":143,"end_offset":146},{"id":42333,"label":"attack-pattern","start_offset":178,"end_offset":186},{"id":42334,"label":"location","start_offset":214,"end_offset":219}],"relations":[],"Comments":[]} -{"id":13578,"text":"The subdomains of their phishing sites were configured to match the names of the targets’ domain, such as “{victim’s domain}[.]basic-authentication[.]live”.","entities":[{"id":42335,"label":"attack-pattern","start_offset":24,"end_offset":32},{"id":42336,"label":"location","start_offset":33,"end_offset":38}],"relations":[],"Comments":[]} +{"id":13568,"text":"The attackers delivered a variety of different XSS scripts, which could include one or more of the following behaviors: Page Grabber","entities":[{"id":51649,"label":"attack-pattern","start_offset":47,"end_offset":50}],"relations":[],"Comments":[]} +{"id":13569,"text":"The script sends an HTTP GET request to a specified URL address and forwards the received response to Water Pamola’s server.","entities":[{"id":51650,"label":"campaign","start_offset":102,"end_offset":116}],"relations":[],"Comments":[]} +{"id":13570,"text":"This is usually used during an early stage of the attack to grab content from the victim’s management page.","entities":[],"relations":[],"Comments":[]} +{"id":13571,"text":"Doing so allows the threat actor to understand the environment and design attack scripts appropriate to the victim’s environment. Figure 3.","entities":[{"id":51651,"label":"malware","start_offset":74,"end_offset":88},{"id":51652,"label":"identity","start_offset":108,"end_offset":114},{"id":51653,"label":"threat-actor","start_offset":20,"end_offset":33}],"relations":[],"Comments":[]} +{"id":13572,"text":"The script for grabbing page content and sending it back to the attacker Credential Phishing","entities":[{"id":51654,"label":"attack-pattern","start_offset":77,"end_offset":96}],"relations":[],"Comments":[]} +{"id":13573,"text":"Some of the delivered scripts revealed that the campaign was trying to obtain administrator credentials for e-commerce websites using two different approaches.","entities":[{"id":51655,"label":"SOFTWARE","start_offset":108,"end_offset":127}],"relations":[],"Comments":[]} +{"id":13574,"text":"The first way involves appending a fake login form to the page.","entities":[],"relations":[],"Comments":[]} +{"id":13575,"text":"The script hooks the mouse click event.","entities":[{"id":42322,"label":"attack-pattern","start_offset":11,"end_offset":16}],"relations":[],"Comments":[]} +{"id":13576,"text":"If the victim enters the credential in the fake form and clicks anywhere on the page, the script will take the credentials, encode them using base64, replace some characters with custom substrings, and then upload these to Water Pamola’s server. Figure 4.","entities":[{"id":51656,"label":"Infrastucture","start_offset":223,"end_offset":244},{"id":51657,"label":"malware","start_offset":90,"end_offset":96}],"relations":[{"id":1124,"from_id":51657,"to_id":51656,"type":"communicates-with"}],"Comments":[]} +{"id":13577,"text":"The script to create and delete fake login form for credential phishing The other approach involves showing an authorization error message and then redirecting the user to a phishing website that asks users to enter their credentials.","entities":[{"id":51659,"label":"attack-pattern","start_offset":178,"end_offset":186},{"id":51658,"label":"attack-pattern","start_offset":52,"end_offset":71}],"relations":[],"Comments":[]} +{"id":13578,"text":"The subdomains of their phishing sites were configured to match the names of the targets’ domain, such as “{victim’s domain}[.]basic-authentication[.]live”.","entities":[{"id":51660,"label":"URL","start_offset":107,"end_offset":154}],"relations":[],"Comments":[]} {"id":13579,"text":" Figure 5.","entities":[],"relations":[],"Comments":[]} -{"id":13580,"text":"The script replaces the page content with an authorization error message and redirects users to the phishing website Webshell\/PHP backdoor injection","entities":[{"id":42338,"label":"location","start_offset":24,"end_offset":28},{"id":42339,"label":"location","start_offset":29,"end_offset":36},{"id":42340,"label":"location","start_offset":73,"end_offset":76},{"id":42341,"label":"attack-pattern","start_offset":100,"end_offset":108}],"relations":[],"Comments":[]} -{"id":13581,"text":"Some of the delivered malicious scripts attempt to install backdoors to the websites built with the EC-CUBE framework, which is popular in Japan.","entities":[],"relations":[],"Comments":[]} -{"id":13582,"text":"The attack we found only works on Series 2 of EC-CUBE; the current version is Series 4, with Series 2 now under extended support.","entities":[{"id":42343,"label":"location","start_offset":20,"end_offset":24}],"relations":[],"Comments":[]} -{"id":13583,"text":" There are three different approaches used to upload the backdoor.","entities":[{"id":42344,"label":"location","start_offset":7,"end_offset":10}],"relations":[],"Comments":[]} +{"id":13580,"text":"The script replaces the page content with an authorization error message and redirects users to the phishing website Webshell\/PHP backdoor injection","entities":[{"id":51661,"label":"malware","start_offset":4,"end_offset":10}],"relations":[],"Comments":[]} +{"id":13581,"text":"Some of the delivered malicious scripts attempt to install backdoors to the websites built with the EC-CUBE framework, which is popular in Japan.","entities":[{"id":51662,"label":"tools","start_offset":100,"end_offset":117},{"id":51664,"label":"malware","start_offset":22,"end_offset":39},{"id":51663,"label":"location","start_offset":139,"end_offset":144}],"relations":[{"id":1125,"from_id":51662,"to_id":51663,"type":"related-to"},{"id":1126,"from_id":51664,"to_id":51662,"type":"targets"}],"Comments":[]} +{"id":13582,"text":"The attack we found only works on Series 2 of EC-CUBE; the current version is Series 4, with Series 2 now under extended support.","entities":[{"id":51667,"label":"tools","start_offset":34,"end_offset":53},{"id":51668,"label":"tools","start_offset":78,"end_offset":86}],"relations":[],"Comments":[]} +{"id":13583,"text":" There are three different approaches used to upload the backdoor.","entities":[],"relations":[],"Comments":[]} {"id":13584,"text":"The first method is uploading a PHP web shell file by calling the native API provided by the framework.","entities":[{"id":42347,"label":"attack-pattern","start_offset":36,"end_offset":45}],"relations":[],"Comments":[]} -{"id":13585,"text":"The name of the web shell file is hardcoded to be either “ec_ver.php,” “log3.php,” or “temp.php.”","entities":[{"id":42348,"label":"attack-pattern","start_offset":16,"end_offset":25}],"relations":[],"Comments":[]} -{"id":13586,"text":"The web shell can execute any PHP code sent by an HTTP POST request to the web shell.","entities":[{"id":42349,"label":"attack-pattern","start_offset":4,"end_offset":13},{"id":42350,"label":"location","start_offset":14,"end_offset":17},{"id":42351,"label":"location","start_offset":55,"end_offset":59},{"id":42352,"label":"attack-pattern","start_offset":75,"end_offset":84}],"relations":[],"Comments":[]} -{"id":13587,"text":"Note the screenshot in Figure 6: The same web shell with the same “only_pcd” keyword is mentioned in this Chinese blog post.","entities":[{"id":42354,"label":"location","start_offset":37,"end_offset":41},{"id":42355,"label":"attack-pattern","start_offset":42,"end_offset":51},{"id":42356,"label":"location","start_offset":61,"end_offset":65},{"id":42358,"label":"location","start_offset":119,"end_offset":123}],"relations":[],"Comments":[]} -{"id":13588,"text":"The blog post describes a web shell with two components — a PHP script and an HTML uploading file — however, the second one is not needed as the proper POST request can be created with any custom or third-party tool (e.g., Fiddler). Figure 6.","entities":[{"id":42359,"label":"location","start_offset":9,"end_offset":13},{"id":42360,"label":"attack-pattern","start_offset":26,"end_offset":35},{"id":42362,"label":"location","start_offset":71,"end_offset":74},{"id":42363,"label":"location","start_offset":121,"end_offset":124},{"id":42364,"label":"location","start_offset":153,"end_offset":157},{"id":42365,"label":"location","start_offset":166,"end_offset":169},{"id":42366,"label":"location","start_offset":212,"end_offset":216}],"relations":[],"Comments":[]} -{"id":13589,"text":"The script for uploading the PHP web shell to an e-commerce website The second method is modifying the page header to inject PHP code, which will then execute any PHP code, sent by the parameter “ec_ver2update” in the HTTP request.","entities":[{"id":42369,"label":"attack-pattern","start_offset":33,"end_offset":42},{"id":42370,"label":"location","start_offset":51,"end_offset":59},{"id":42371,"label":"tools","start_offset":107,"end_offset":111},{"id":42372,"label":"location","start_offset":145,"end_offset":149}],"relations":[],"Comments":[]} +{"id":13585,"text":"The name of the web shell file is hardcoded to be either “ec_ver.php,” “log3.php,” or “temp.php.”","entities":[{"id":51670,"label":"FILEPATH","start_offset":58,"end_offset":69},{"id":51671,"label":"FILEPATH","start_offset":72,"end_offset":80},{"id":51672,"label":"FILEPATH","start_offset":87,"end_offset":95},{"id":42348,"label":"attack-pattern","start_offset":16,"end_offset":25}],"relations":[{"id":1127,"from_id":42348,"to_id":51670,"type":"related-to"},{"id":1128,"from_id":42348,"to_id":51671,"type":"related-to"},{"id":1129,"from_id":42348,"to_id":51672,"type":"related-to"}],"Comments":[]} +{"id":13586,"text":"The web shell can execute any PHP code sent by an HTTP POST request to the web shell.","entities":[{"id":51673,"label":"attack-pattern","start_offset":4,"end_offset":14}],"relations":[],"Comments":[]} +{"id":13587,"text":"Note the screenshot in Figure 6: The same web shell with the same “only_pcd” keyword is mentioned in this Chinese blog post.","entities":[{"id":51674,"label":"location","start_offset":106,"end_offset":113},{"id":51675,"label":"FILEPATH","start_offset":67,"end_offset":75}],"relations":[],"Comments":[]} +{"id":13588,"text":"The blog post describes a web shell with two components — a PHP script and an HTML uploading file — however, the second one is not needed as the proper POST request can be created with any custom or third-party tool (e.g., Fiddler). Figure 6.","entities":[{"id":51676,"label":"tools","start_offset":26,"end_offset":35},{"id":51677,"label":"tools","start_offset":60,"end_offset":71},{"id":51678,"label":"tools","start_offset":78,"end_offset":97}],"relations":[{"id":1130,"from_id":51676,"to_id":51677,"type":"consists-of"},{"id":1131,"from_id":51676,"to_id":51678,"type":"consists-of"}],"Comments":[]} +{"id":13589,"text":"The script for uploading the PHP web shell to an e-commerce website The second method is modifying the page header to inject PHP code, which will then execute any PHP code, sent by the parameter “ec_ver2update” in the HTTP request.","entities":[{"id":51680,"label":"malware","start_offset":4,"end_offset":10},{"id":51681,"label":"SOFTWARE","start_offset":49,"end_offset":67},{"id":51679,"label":"FILEPATH","start_offset":200,"end_offset":213}],"relations":[],"Comments":[]} {"id":13590,"text":"Note that the PHP code below is obfuscated.","entities":[],"relations":[],"Comments":[]} {"id":13591,"text":"First, the $IDFX variable uses XOR operation (see character ^) to decode the string “create_function”, then the resulting base64 string is decoded to @eval($_REQUEST['ec_ver2update']); which is the backdoor’s code.","entities":[],"relations":[],"Comments":[]} {"id":13592,"text":" Figure 7.","entities":[],"relations":[],"Comments":[]} -{"id":13593,"text":"The script for modifying the shop page header to inject a web shell","entities":[{"id":42375,"label":"location","start_offset":34,"end_offset":38},{"id":42376,"label":"attack-pattern","start_offset":58,"end_offset":67}],"relations":[],"Comments":[]} -{"id":13594,"text":" The third method is installing a malicious plugin embedded in a file named “MakePlugin.tar.gz” to the e-commerce framework.","entities":[{"id":42378,"label":"location","start_offset":108,"end_offset":116}],"relations":[],"Comments":[]} -{"id":13595,"text":"The plugin has been designed to drop multiple PHP web shell files on the server.","entities":[{"id":42379,"label":"attack-pattern","start_offset":50,"end_offset":59}],"relations":[],"Comments":[]} +{"id":13593,"text":"The script for modifying the shop page header to inject a web shell","entities":[{"id":51682,"label":"malware","start_offset":4,"end_offset":10}],"relations":[],"Comments":[]} +{"id":13594,"text":" The third method is installing a malicious plugin embedded in a file named “MakePlugin.tar.gz” to the e-commerce framework.","entities":[{"id":51683,"label":"FILEPATH","start_offset":80,"end_offset":97}],"relations":[],"Comments":[]} +{"id":13595,"text":"The plugin has been designed to drop multiple PHP web shell files on the server.","entities":[{"id":51684,"label":"Infrastucture","start_offset":73,"end_offset":79},{"id":42379,"label":"attack-pattern","start_offset":50,"end_offset":59}],"relations":[{"id":1132,"from_id":42379,"to_id":51684,"type":"targets"}],"Comments":[]} {"id":13596,"text":" Figure 8.","entities":[],"relations":[],"Comments":[]} -{"id":13597,"text":"The script for uploading and installing the malicious plugin, “MakePlugin.tar.gz” Figure 9.","entities":[{"id":42381,"label":"location","start_offset":25,"end_offset":28}],"relations":[],"Comments":[]} +{"id":13597,"text":"The script for uploading and installing the malicious plugin, “MakePlugin.tar.gz” Figure 9.","entities":[{"id":51685,"label":"FILEPATH","start_offset":63,"end_offset":80}],"relations":[],"Comments":[]} {"id":13598,"text":"The malicious plugin installs several files with web shells Malware Delivery","entities":[],"relations":[],"Comments":[]} -{"id":13599,"text":"In this case, the attack script will show an alert prompt with a message that reads “Your Flash version is too low, please install the latest version and try again!” and then redirects the victim to the fake Flash installer download website they control.","entities":[{"id":42383,"label":"location","start_offset":8,"end_offset":12},{"id":42384,"label":"location","start_offset":32,"end_offset":36},{"id":42385,"label":"location","start_offset":45,"end_offset":50},{"id":42386,"label":"location","start_offset":150,"end_offset":153},{"id":42387,"label":"location","start_offset":166,"end_offset":169}],"relations":[],"Comments":[]} -{"id":13600,"text":"(Note that Flash has been declared end-of-life by Adobe since December 31, 2020.) If the victim downloads and executes the installer downloaded from this page, the victim will be infected with a variant of Gh0stRat malware, previously also named Gh0stCringe or CineregRAT.","entities":[{"id":42390,"label":"location","start_offset":107,"end_offset":110},{"id":42391,"label":"malware","start_offset":155,"end_offset":159},{"id":42392,"label":"location","start_offset":172,"end_offset":176}],"relations":[],"Comments":[]} -{"id":13601,"text":"This RAT’s code is based on leaked Gh0st RAT source code; however, its traffic encryption is customized and it added some new features, like QQ number theft.","entities":[{"id":42394,"label":"attack-pattern","start_offset":45,"end_offset":51},{"id":42395,"label":"location","start_offset":104,"end_offset":107}],"relations":[],"Comments":[]} -{"id":13602,"text":"The Gh0st RAT samples related to this campaign are obfuscated executable files, which decrypt the main payload in memory and execute its main export function named “Shellex.” Figure","entities":[{"id":42397,"label":"location","start_offset":38,"end_offset":46},{"id":42398,"label":"location","start_offset":47,"end_offset":50},{"id":42399,"label":"location","start_offset":121,"end_offset":124},{"id":42400,"label":"location","start_offset":142,"end_offset":148}],"relations":[],"Comments":[]} -{"id":13603,"text":"The script showing the error message and redirect to the fake Flash installer Figure 11.","entities":[{"id":42401,"label":"location","start_offset":37,"end_offset":40}],"relations":[],"Comments":[]} +{"id":13599,"text":"In this case, the attack script will show an alert prompt with a message that reads “Your Flash version is too low, please install the latest version and try again!” and then redirects the victim to the fake Flash installer download website they control.","entities":[{"id":51686,"label":"malware","start_offset":18,"end_offset":32}],"relations":[],"Comments":[]} +{"id":13600,"text":"(Note that Flash has been declared end-of-life by Adobe since December 31, 2020.) If the victim downloads and executes the installer downloaded from this page, the victim will be infected with a variant of Gh0stRat malware, previously also named Gh0stCringe or CineregRAT.","entities":[{"id":51687,"label":"TIME","start_offset":62,"end_offset":79},{"id":51688,"label":"malware","start_offset":207,"end_offset":215},{"id":51689,"label":"malware","start_offset":247,"end_offset":258},{"id":51690,"label":"malware","start_offset":262,"end_offset":272}],"relations":[{"id":1133,"from_id":51688,"to_id":51689,"type":"related-to"},{"id":1134,"from_id":51688,"to_id":51690,"type":"related-to"}],"Comments":[]} +{"id":13601,"text":"This RAT’s code is based on leaked Gh0st RAT source code; however, its traffic encryption is customized and it added some new features, like QQ number theft.","entities":[{"id":51691,"label":"malware","start_offset":5,"end_offset":8},{"id":51692,"label":"malware","start_offset":35,"end_offset":44}],"relations":[],"Comments":[]} +{"id":13602,"text":"The Gh0st RAT samples related to this campaign are obfuscated executable files, which decrypt the main payload in memory and execute its main export function named “Shellex.” Figure","entities":[{"id":51695,"label":"FILEPATH","start_offset":165,"end_offset":172},{"id":51694,"label":"malware","start_offset":4,"end_offset":13}],"relations":[{"id":1135,"from_id":51694,"to_id":51695,"type":"related-to"}],"Comments":[]} +{"id":13603,"text":"The script showing the error message and redirect to the fake Flash installer Figure 11.","entities":[],"relations":[],"Comments":[]} {"id":13604,"text":"The fake Flash installer download website Analysis of the fake Flash installer","entities":[],"relations":[],"Comments":[]} {"id":13605,"text":"As described earlier, the XSS attack script redirects the victim to a fake Flash download site.","entities":[{"id":42403,"label":"attack-pattern","start_offset":26,"end_offset":29}],"relations":[],"Comments":[]} -{"id":13606,"text":"Clicking on the “Install now” button downloads a .ZIP archive, which contains several legitimate files as well as a few malicious ones, which are usually in form of DLL libraries.","entities":[{"id":42404,"label":"location","start_offset":142,"end_offset":145}],"relations":[],"Comments":[]} -{"id":13607,"text":"These libraries will be sideloaded when the legitimate executable gets executed.","entities":[{"id":42405,"label":"location","start_offset":16,"end_offset":20}],"relations":[],"Comments":[]} +{"id":13606,"text":"Clicking on the “Install now” button downloads a .ZIP archive, which contains several legitimate files as well as a few malicious ones, which are usually in form of DLL libraries.","entities":[],"relations":[],"Comments":[]} +{"id":13607,"text":"These libraries will be sideloaded when the legitimate executable gets executed.","entities":[],"relations":[],"Comments":[]} {"id":13608,"text":" Figure 12.","entities":[],"relations":[],"Comments":[]} {"id":13609,"text":"The package of downloaded Flash installer ","entities":[],"relations":[],"Comments":[]} -{"id":13610,"text":"In this example, AdobeAirFlashInstaller.exe (legitimate file) sideloads xerces-c_2_1_0.dll (patched legitimate file), which then sideloads ulibs.dll (malicious file).","entities":[],"relations":[],"Comments":[]} -{"id":13611,"text":"Ulibs.dll loads Adob.dll, which is a ZIP archive.","entities":[],"relations":[],"Comments":[]} -{"id":13612,"text":"After extracting the content of the Adob.dll zip archive, two legitimate and signed executable files are present and executed, and a similar sideloading process happens once more.","entities":[{"id":42407,"label":"location","start_offset":21,"end_offset":28},{"id":42409,"label":"location","start_offset":73,"end_offset":76},{"id":42410,"label":"location","start_offset":101,"end_offset":104},{"id":42411,"label":"location","start_offset":113,"end_offset":116},{"id":42412,"label":"location","start_offset":127,"end_offset":130}],"relations":[],"Comments":[]} +{"id":13610,"text":"In this example, AdobeAirFlashInstaller.exe (legitimate file) sideloads xerces-c_2_1_0.dll (patched legitimate file), which then sideloads ulibs.dll (malicious file).","entities":[{"id":51698,"label":"FILEPATH","start_offset":139,"end_offset":148},{"id":51696,"label":"FILEPATH","start_offset":17,"end_offset":43},{"id":51697,"label":"FILEPATH","start_offset":72,"end_offset":90}],"relations":[{"id":1136,"from_id":51696,"to_id":51697,"type":"related-to"},{"id":1137,"from_id":51697,"to_id":51698,"type":"related-to"}],"Comments":[]} +{"id":13611,"text":"Ulibs.dll loads Adob.dll, which is a ZIP archive.","entities":[{"id":51699,"label":"FILEPATH","start_offset":0,"end_offset":9},{"id":51700,"label":"FILEPATH","start_offset":16,"end_offset":24}],"relations":[],"Comments":[]} +{"id":13612,"text":"After extracting the content of the Adob.dll zip archive, two legitimate and signed executable files are present and executed, and a similar sideloading process happens once more.","entities":[{"id":51701,"label":"FILEPATH","start_offset":36,"end_offset":45}],"relations":[],"Comments":[]} {"id":13613,"text":" Figure 13.","entities":[],"relations":[],"Comments":[]} -{"id":13614,"text":"The package inside Adob.dll ","entities":[],"relations":[],"Comments":[]} -{"id":13615,"text":"Here, svchost.exe (renamed legitimate and signed Launcher.exe file from Tencent) sideloads Utility.dll (patched legitimate file).","entities":[{"id":42414,"label":"location","start_offset":38,"end_offset":41}],"relations":[],"Comments":[]} -{"id":13616,"text":"This patched file contains one new section called .newimp (new import), which adds a new import item with a reference to the oplib.dll library.","entities":[{"id":42416,"label":"location","start_offset":27,"end_offset":30},{"id":42417,"label":"location","start_offset":35,"end_offset":42},{"id":42418,"label":"location","start_offset":135,"end_offset":142}],"relations":[],"Comments":[]} -{"id":13617,"text":"This oplib.dll library is then sideloaded.","entities":[{"id":42419,"label":"location","start_offset":15,"end_offset":22}],"relations":[],"Comments":[]} +{"id":13614,"text":"The package inside Adob.dll ","entities":[{"id":51702,"label":"FILEPATH","start_offset":19,"end_offset":27}],"relations":[],"Comments":[]} +{"id":13615,"text":"Here, svchost.exe (renamed legitimate and signed Launcher.exe file from Tencent) sideloads Utility.dll (patched legitimate file).","entities":[{"id":51704,"label":"FILEPATH","start_offset":49,"end_offset":61},{"id":51705,"label":"FILEPATH","start_offset":91,"end_offset":102},{"id":51703,"label":"FILEPATH","start_offset":6,"end_offset":17}],"relations":[{"id":1138,"from_id":51703,"to_id":51705,"type":"related-to"},{"id":1139,"from_id":51703,"to_id":51704,"type":"related-to"}],"Comments":[]} +{"id":13616,"text":"This patched file contains one new section called .newimp (new import), which adds a new import item with a reference to the oplib.dll library.","entities":[{"id":51706,"label":"FILEPATH","start_offset":125,"end_offset":134}],"relations":[],"Comments":[]} +{"id":13617,"text":"This oplib.dll library is then sideloaded.","entities":[{"id":51707,"label":"FILEPATH","start_offset":5,"end_offset":14}],"relations":[],"Comments":[]} {"id":13618,"text":"Figure 14.","entities":[],"relations":[],"Comments":[]} -{"id":13619,"text":"Oplib.dll side-loading ","entities":[],"relations":[],"Comments":[]} -{"id":13620,"text":"This new import was very likely added manually by using a utility called Stud_PE.","entities":[{"id":42421,"label":"location","start_offset":25,"end_offset":31},{"id":42422,"label":"location","start_offset":58,"end_offset":65}],"relations":[],"Comments":[]} -{"id":13621,"text":"This utility has a feature called “Import Adder,” while “.newimp” is the default name of a newly added section containing newly added imports.","entities":[{"id":42423,"label":"location","start_offset":5,"end_offset":12},{"id":42424,"label":"location","start_offset":103,"end_offset":110}],"relations":[],"Comments":[]} -{"id":13622,"text":"Oplib.dll then loads a lib.DAT file from the windowsfiles directory, decodes and decrypts its contents (from a hexadecimal string; XOR 0x42), and loads it into the newly created svchost.exe process.","entities":[{"id":42425,"label":"location","start_offset":77,"end_offset":80},{"id":42426,"label":"location","start_offset":142,"end_offset":145}],"relations":[],"Comments":[]} -{"id":13623,"text":"In addition, persistence via registry keys and Scheduled Tasks are configured.","entities":[{"id":42427,"label":"location","start_offset":43,"end_offset":46},{"id":42428,"label":"location","start_offset":63,"end_offset":66}],"relations":[],"Comments":[]} -{"id":13624,"text":" Figure 15. XOR routine and svchost injection ","entities":[{"id":42430,"label":"location","start_offset":28,"end_offset":31}],"relations":[],"Comments":[]} -{"id":13625,"text":"At the end, the last payload of this infection chain is a variant of a Gh0st RAT.","entities":[],"relations":[],"Comments":[]} -{"id":13626,"text":"Communication with C&C uses sockets and is encrypted with simple SUB 0x46, XOR 0x19 encryption.","entities":[{"id":42432,"label":"location","start_offset":36,"end_offset":39}],"relations":[],"Comments":[]} +{"id":13619,"text":"Oplib.dll side-loading ","entities":[{"id":51708,"label":"FILEPATH","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} +{"id":13620,"text":"This new import was very likely added manually by using a utility called Stud_PE.","entities":[{"id":51709,"label":"tools","start_offset":73,"end_offset":80}],"relations":[],"Comments":[]} +{"id":13621,"text":"This utility has a feature called “Import Adder,” while “.newimp” is the default name of a newly added section containing newly added imports.","entities":[],"relations":[],"Comments":[]} +{"id":13622,"text":"Oplib.dll then loads a lib.DAT file from the windowsfiles directory, decodes and decrypts its contents (from a hexadecimal string; XOR 0x42), and loads it into the newly created svchost.exe process.","entities":[{"id":51712,"label":"FILEPATH","start_offset":178,"end_offset":189},{"id":51710,"label":"FILEPATH","start_offset":0,"end_offset":9},{"id":51711,"label":"FILEPATH","start_offset":23,"end_offset":30}],"relations":[],"Comments":[]} +{"id":13623,"text":"In addition, persistence via registry keys and Scheduled Tasks are configured.","entities":[],"relations":[],"Comments":[]} +{"id":13624,"text":" Figure 15. XOR routine and svchost injection ","entities":[],"relations":[],"Comments":[]} +{"id":13625,"text":"At the end, the last payload of this infection chain is a variant of a Gh0st RAT.","entities":[{"id":51713,"label":"malware","start_offset":71,"end_offset":80}],"relations":[],"Comments":[]} +{"id":13626,"text":"Communication with C&C uses sockets and is encrypted with simple SUB 0x46, XOR 0x19 encryption.","entities":[],"relations":[],"Comments":[]} {"id":13627,"text":"Figure 16.","entities":[],"relations":[],"Comments":[]} {"id":13628,"text":"XOR routine that encrypts C&C communication Figure 17.","entities":[],"relations":[],"Comments":[]} -{"id":13629,"text":"A packetFlag “xy” was found inside this Gh0st RAT variant This Gh0st RAT variant implements additional features for stealing QQ messenger user information, for example, a list of users on a given machine and their QQ messenger numbers.","entities":[{"id":42437,"label":"location","start_offset":175,"end_offset":179},{"id":42438,"label":"location","start_offset":194,"end_offset":199},{"id":42439,"label":"location","start_offset":208,"end_offset":211}],"relations":[],"Comments":[]} -{"id":13630,"text":"The code below obtains QQ numbers that are currently logged on the machine, mentioned here.","entities":[{"id":42440,"label":"location","start_offset":39,"end_offset":42}],"relations":[],"Comments":[]} +{"id":13629,"text":"A packetFlag “xy” was found inside this Gh0st RAT variant This Gh0st RAT variant implements additional features for stealing QQ messenger user information, for example, a list of users on a given machine and their QQ messenger numbers.","entities":[{"id":51715,"label":"malware","start_offset":67,"end_offset":76},{"id":51714,"label":"malware","start_offset":40,"end_offset":49}],"relations":[],"Comments":[]} +{"id":13630,"text":"The code below obtains QQ numbers that are currently logged on the machine, mentioned here.","entities":[],"relations":[],"Comments":[]} {"id":13631,"text":" Figure 18.","entities":[],"relations":[],"Comments":[]} -{"id":13632,"text":"The code used to obtain user QQ numbers Protecting e-commerce platforms from Water Pamola’s attacks Water Pamola attacked online merchants with an XSS script appended onto online shopping orders.","entities":[{"id":42442,"label":"location","start_offset":57,"end_offset":65},{"id":42444,"label":"attack-pattern","start_offset":151,"end_offset":154}],"relations":[],"Comments":[]} -{"id":13633,"text":"They also perpetrated social engineering attacks to phish credentials or prompt the download of a remote access tool.","entities":[{"id":42445,"label":"location","start_offset":98,"end_offset":104},{"id":42446,"label":"location","start_offset":112,"end_offset":116}],"relations":[],"Comments":[]} -{"id":13634,"text":"Online shop administrators should be aware that potential attacks may come not only from spam but also from different — and unexpected — infection vectors.","entities":[{"id":42447,"label":"location","start_offset":66,"end_offset":69},{"id":42448,"label":"location","start_offset":79,"end_offset":83},{"id":42449,"label":"location","start_offset":120,"end_offset":123}],"relations":[],"Comments":[]} -{"id":13635,"text":"We also recommend that administrators keep the versions of any e-commerce platforms in use by their websites up to date to prevent any potential vulnerabilities, including XSS attacks.","entities":[{"id":42450,"label":"location","start_offset":65,"end_offset":73},{"id":42451,"label":"location","start_offset":115,"end_offset":119},{"id":42452,"label":"attack-pattern","start_offset":172,"end_offset":175}],"relations":[],"Comments":[]} -{"id":13636,"text":" Organizations can benefit from having Trend Micro™ endpoint solutions such as Trend Micro Smart Protection Suites and Worry-Free™ Business Security.","entities":[{"id":42453,"label":"location","start_offset":15,"end_offset":18},{"id":42456,"label":"location","start_offset":97,"end_offset":107},{"id":42457,"label":"location","start_offset":115,"end_offset":118},{"id":42458,"label":"location","start_offset":140,"end_offset":148}],"relations":[],"Comments":[]} -{"id":13637,"text":"These can protect users and businesses from threats by detecting malicious files and spammed messages as well as blocking all related malicious URLs.","entities":[{"id":42459,"label":"location","start_offset":6,"end_offset":9},{"id":42460,"label":"location","start_offset":24,"end_offset":27},{"id":42461,"label":"location","start_offset":81,"end_offset":84}],"relations":[],"Comments":[]} -{"id":13638,"text":" Indicators of compromise can be found in this appendix.","entities":[{"id":42462,"label":"location","start_offset":26,"end_offset":29}],"relations":[],"Comments":[]} -{"id":13639,"text":" Tags Endpoints | APT & Targeted Attacks | Research | Articles, News, Reports | Cyber Threats","entities":[{"id":42463,"label":"location","start_offset":22,"end_offset":25}],"relations":[],"Comments":[]} -{"id":13640,"text":"A series of ongoing business email compromise (BEC) campaigns that uses spear-phishing schemes on Office 365 accounts has been seen targeting business executives of over 1,000 companies across the world since March 2020.","entities":[{"id":42464,"label":"location","start_offset":72,"end_offset":77},{"id":42465,"label":"attack-pattern","start_offset":78,"end_offset":86},{"id":42468,"label":"location","start_offset":197,"end_offset":202}],"relations":[],"Comments":[]} -{"id":13641,"text":"The recent campaigns target senior positions in the United States and Canada.","entities":[{"id":42470,"label":"location","start_offset":21,"end_offset":27},{"id":42472,"label":"location","start_offset":66,"end_offset":69}],"relations":[],"Comments":[]} -{"id":13642,"text":"The fraudsters, whom we named “Water Nue,” primarily target accounts of financial executives to obtain credentials for further financial fraud.","entities":[{"id":42474,"label":"identity","start_offset":37,"end_offset":40},{"id":42475,"label":"location","start_offset":53,"end_offset":59}],"relations":[],"Comments":[]} +{"id":13632,"text":"The code used to obtain user QQ numbers Protecting e-commerce platforms from Water Pamola’s attacks Water Pamola attacked online merchants with an XSS script appended onto online shopping orders.","entities":[{"id":51716,"label":"campaign","start_offset":81,"end_offset":93},{"id":51717,"label":"campaign","start_offset":104,"end_offset":116},{"id":51718,"label":"identity","start_offset":126,"end_offset":142},{"id":51719,"label":"attack-pattern","start_offset":151,"end_offset":154}],"relations":[{"id":1141,"from_id":51717,"to_id":51719,"type":"uses"},{"id":1140,"from_id":51717,"to_id":51718,"type":"targets"}],"Comments":[]} +{"id":13633,"text":"They also perpetrated social engineering attacks to phish credentials or prompt the download of a remote access tool.","entities":[{"id":51720,"label":"attack-pattern","start_offset":22,"end_offset":49}],"relations":[],"Comments":[]} +{"id":13634,"text":"Online shop administrators should be aware that potential attacks may come not only from spam but also from different — and unexpected — infection vectors.","entities":[],"relations":[],"Comments":[]} +{"id":13635,"text":"We also recommend that administrators keep the versions of any e-commerce platforms in use by their websites up to date to prevent any potential vulnerabilities, including XSS attacks.","entities":[{"id":51721,"label":"attack-pattern","start_offset":172,"end_offset":183}],"relations":[],"Comments":[]} +{"id":13636,"text":" Organizations can benefit from having Trend Micro™ endpoint solutions such as Trend Micro Smart Protection Suites and Worry-Free™ Business Security.","entities":[],"relations":[],"Comments":[]} +{"id":13637,"text":"These can protect users and businesses from threats by detecting malicious files and spammed messages as well as blocking all related malicious URLs.","entities":[],"relations":[],"Comments":[]} +{"id":13638,"text":" Indicators of compromise can be found in this appendix.","entities":[],"relations":[],"Comments":[]} +{"id":13639,"text":" Tags Endpoints | APT & Targeted Attacks | Research | Articles, News, Reports | Cyber Threats","entities":[],"relations":[],"Comments":[]} +{"id":13640,"text":"A series of ongoing business email compromise (BEC) campaigns that uses spear-phishing schemes on Office 365 accounts has been seen targeting business executives of over 1,000 companies across the world since March 2020.","entities":[{"id":51722,"label":"attack-pattern","start_offset":72,"end_offset":86},{"id":51723,"label":"SOFTWARE","start_offset":98,"end_offset":117},{"id":51724,"label":"TIME","start_offset":203,"end_offset":219},{"id":51725,"label":"identity","start_offset":142,"end_offset":161},{"id":51726,"label":"campaign","start_offset":20,"end_offset":61}],"relations":[{"id":1142,"from_id":51726,"to_id":51722,"type":"uses"},{"id":1143,"from_id":51726,"to_id":51725,"type":"targets"},{"id":1144,"from_id":51726,"to_id":51724,"type":"related-to"}],"Comments":[]} +{"id":13641,"text":"The recent campaigns target senior positions in the United States and Canada.","entities":[{"id":51729,"label":"identity","start_offset":28,"end_offset":44},{"id":51731,"label":"location","start_offset":70,"end_offset":76},{"id":51728,"label":"campaign","start_offset":4,"end_offset":20},{"id":51730,"label":"location","start_offset":52,"end_offset":65}],"relations":[{"id":1145,"from_id":51728,"to_id":51729,"type":"targets"},{"id":1146,"from_id":51729,"to_id":51730,"type":"located-at"},{"id":1147,"from_id":51729,"to_id":51731,"type":"located-at"}],"Comments":[]} +{"id":13642,"text":"The fraudsters, whom we named “Water Nue,” primarily target accounts of financial executives to obtain credentials for further financial fraud.","entities":[{"id":51732,"label":"threat-actor","start_offset":31,"end_offset":40},{"id":51734,"label":"identity","start_offset":72,"end_offset":92}],"relations":[{"id":1148,"from_id":51732,"to_id":51734,"type":"targets"}],"Comments":[]} {"id":13643,"text":"The phishing emails redirect users to fake Office 365 login pages.","entities":[{"id":42476,"label":"attack-pattern","start_offset":4,"end_offset":12}],"relations":[],"Comments":[]} -{"id":13644,"text":"Once the credentials are obtained and accounts are successfully compromised, emails containing invoice documents with tampered banking information are sent to subordinates in an attempt to siphon money through fund transfer requests.","entities":[{"id":42478,"label":"location","start_offset":21,"end_offset":24},{"id":42479,"label":"location","start_offset":34,"end_offset":37},{"id":42480,"label":"location","start_offset":47,"end_offset":50},{"id":42481,"label":"location","start_offset":147,"end_offset":150},{"id":42482,"label":"location","start_offset":196,"end_offset":201},{"id":42483,"label":"location","start_offset":215,"end_offset":223}],"relations":[],"Comments":[]} +{"id":13644,"text":"Once the credentials are obtained and accounts are successfully compromised, emails containing invoice documents with tampered banking information are sent to subordinates in an attempt to siphon money through fund transfer requests.","entities":[],"relations":[],"Comments":[]} {"id":13645,"text":"Tracking Water Nue’s activities","entities":[],"relations":[],"Comments":[]} -{"id":13646,"text":"The threat actor behind this campaign is interesting for several reasons.","entities":[{"id":42485,"label":"location","start_offset":29,"end_offset":37}],"relations":[],"Comments":[]} -{"id":13647,"text":"It appears that their technical capabilities are limited despite being able to successfully target high-level employees globally.","entities":[{"id":42486,"label":"location","start_offset":45,"end_offset":48},{"id":42487,"label":"location","start_offset":92,"end_offset":98}],"relations":[],"Comments":[]} -{"id":13648,"text":"While their phishing tools are basic (i.e., no backdoors, trojans, and other malware), they made use of public cloud services to conduct their operations.","entities":[{"id":42488,"label":"attack-pattern","start_offset":12,"end_offset":20},{"id":42489,"label":"location","start_offset":27,"end_offset":30},{"id":42490,"label":"location","start_offset":67,"end_offset":70},{"id":42491,"label":"location","start_offset":92,"end_offset":96},{"id":42492,"label":"location","start_offset":104,"end_offset":110},{"id":42493,"label":"location","start_offset":111,"end_offset":116}],"relations":[],"Comments":[]} -{"id":13649,"text":"The use of cloud services allowed them to obfuscate their operations by hosting infrastructures in the services themselves, making their activities tougher to spot for forensics.","entities":[{"id":42494,"label":"location","start_offset":11,"end_offset":16},{"id":42495,"label":"location","start_offset":34,"end_offset":38}],"relations":[],"Comments":[]} +{"id":13646,"text":"The threat actor behind this campaign is interesting for several reasons.","entities":[],"relations":[],"Comments":[]} +{"id":13647,"text":"It appears that their technical capabilities are limited despite being able to successfully target high-level employees globally.","entities":[],"relations":[],"Comments":[]} +{"id":13648,"text":"While their phishing tools are basic (i.e., no backdoors, trojans, and other malware), they made use of public cloud services to conduct their operations.","entities":[{"id":51735,"label":"attack-pattern","start_offset":12,"end_offset":20},{"id":51736,"label":"Infrastucture","start_offset":104,"end_offset":125}],"relations":[],"Comments":[]} +{"id":13649,"text":"The use of cloud services allowed them to obfuscate their operations by hosting infrastructures in the services themselves, making their activities tougher to spot for forensics.","entities":[{"id":51737,"label":"Infrastucture","start_offset":11,"end_offset":25}],"relations":[],"Comments":[]} {"id":13650,"text":"This tactic has become more commonplace among cybercriminals.","entities":[],"relations":[],"Comments":[]} -{"id":13651,"text":"We first noticed the campaign from a large group of email domains used in phishing attempts.","entities":[{"id":42497,"label":"location","start_offset":21,"end_offset":29},{"id":42498,"label":"location","start_offset":37,"end_offset":42},{"id":42499,"label":"attack-pattern","start_offset":74,"end_offset":82}],"relations":[],"Comments":[]} -{"id":13652,"text":"We found that most of the recipients hold high corporate positions, particularly in the finance department.","entities":[{"id":42500,"label":"location","start_offset":14,"end_offset":18}],"relations":[],"Comments":[]} -{"id":13653,"text":"In one of the first cases we encountered, the senior financial officer of a bank located in Africa purportedly sent a PDF invoice to a colleague, specifying a bank account in Hong Kong.","entities":[],"relations":[],"Comments":[]} -{"id":13654,"text":"The email was sent from an IP address recorded on one of the phishing sites that the attacker tested its functionality on.","entities":[{"id":42506,"label":"attack-pattern","start_offset":61,"end_offset":69},{"id":42507,"label":"location","start_offset":70,"end_offset":75}],"relations":[],"Comments":[]} -{"id":13655,"text":"The campaign is ongoing, with the threat actor switching to new infrastructures when used domain names get reported or blacklisted in systems.","entities":[{"id":42508,"label":"location","start_offset":4,"end_offset":12}],"relations":[],"Comments":[]} -{"id":13656,"text":"Water Nue Campaign Analysis","entities":[{"id":42509,"label":"identity","start_offset":6,"end_offset":9},{"id":42510,"label":"location","start_offset":10,"end_offset":18}],"relations":[],"Comments":[]} -{"id":13657,"text":"The attackers use cloud-based email distribution services like SendGrid to deliver emails with a clickable link that redirects targets to a fake Office 365 page.","entities":[{"id":42511,"label":"location","start_offset":18,"end_offset":23},{"id":42514,"label":"tools","start_offset":156,"end_offset":160}],"relations":[],"Comments":[]} -{"id":13658,"text":"(We have reached out to SendGrid and shared our findings with them.)","entities":[{"id":42516,"label":"location","start_offset":33,"end_offset":36},{"id":42517,"label":"location","start_offset":62,"end_offset":66}],"relations":[],"Comments":[]} -{"id":13659,"text":"When the target user attempts to log in, credentials are recorded through a simple PHP script.","entities":[{"id":42518,"label":"location","start_offset":9,"end_offset":15},{"id":42519,"label":"location","start_offset":53,"end_offset":56}],"relations":[],"Comments":[]} -{"id":13660,"text":" Figure 1. Water Nue attack scenario Figure 2. Sample of recorded credentials ","entities":[{"id":42521,"label":"identity","start_offset":21,"end_offset":24},{"id":42523,"label":"location","start_offset":57,"end_offset":63}],"relations":[],"Comments":[]} -{"id":13661,"text":"While the techniques aren’t new, the attack attempts appear to be successful, collecting over 800 credentials from company executives at the time of writing.","entities":[{"id":42524,"label":"location","start_offset":21,"end_offset":24},{"id":42525,"label":"location","start_offset":141,"end_offset":145}],"relations":[],"Comments":[]} -{"id":13662,"text":"How accounts are targeted for phishing attacks","entities":[{"id":42526,"label":"location","start_offset":13,"end_offset":16},{"id":42527,"label":"attack-pattern","start_offset":30,"end_offset":38}],"relations":[],"Comments":[]} -{"id":13663,"text":"In a July email sent to a C-level executive, we learned that the base domain URL is U10450540[.]ct[.]sendgrid[.]net, with the final URL being *getting-panes[.]sfo2*. Figure 3.","entities":[{"id":42529,"label":"location","start_offset":48,"end_offset":55}],"relations":[],"Comments":[]} -{"id":13664,"text":"Email header “from” field shows New York and various email accounts indicating “Swiftme@{company domain names}”","entities":[{"id":42531,"label":"location","start_offset":20,"end_offset":25},{"id":42532,"label":"location","start_offset":32,"end_offset":40},{"id":42533,"label":"location","start_offset":41,"end_offset":44}],"relations":[],"Comments":[]} -{"id":13665,"text":" “Swiftme” appears in the phishing email headers and is accompanied by account names with forged company email domains.","entities":[{"id":42534,"label":"attack-pattern","start_offset":29,"end_offset":37},{"id":42535,"label":"location","start_offset":52,"end_offset":55}],"relations":[],"Comments":[]} -{"id":13666,"text":"The displayed email header “from” and subject also pretend as a voicemail service.","entities":[{"id":42536,"label":"location","start_offset":34,"end_offset":37}],"relations":[],"Comments":[]} -{"id":13667,"text":"“Swiftme” is possibly a nod to electronic or wire transfers and reveals the campaign’s purpose after harvesting credentials.","entities":[{"id":42537,"label":"location","start_offset":60,"end_offset":63},{"id":42538,"label":"location","start_offset":76,"end_offset":84}],"relations":[],"Comments":[]} +{"id":13651,"text":"We first noticed the campaign from a large group of email domains used in phishing attempts.","entities":[{"id":51739,"label":"attack-pattern","start_offset":74,"end_offset":82},{"id":51738,"label":"campaign","start_offset":21,"end_offset":29}],"relations":[{"id":1149,"from_id":51738,"to_id":51739,"type":"uses"}],"Comments":[]} +{"id":13652,"text":"We found that most of the recipients hold high corporate positions, particularly in the finance department.","entities":[],"relations":[],"Comments":[]} +{"id":13653,"text":"In one of the first cases we encountered, the senior financial officer of a bank located in Africa purportedly sent a PDF invoice to a colleague, specifying a bank account in Hong Kong.","entities":[{"id":51742,"label":"identity","start_offset":46,"end_offset":70},{"id":51740,"label":"location","start_offset":92,"end_offset":98},{"id":51741,"label":"location","start_offset":175,"end_offset":184},{"id":51743,"label":"identity","start_offset":135,"end_offset":144}],"relations":[{"id":1150,"from_id":51742,"to_id":51740,"type":"located-at"}],"Comments":[]} +{"id":13654,"text":"The email was sent from an IP address recorded on one of the phishing sites that the attacker tested its functionality on.","entities":[{"id":51744,"label":"attack-pattern","start_offset":61,"end_offset":69}],"relations":[],"Comments":[]} +{"id":13655,"text":"The campaign is ongoing, with the threat actor switching to new infrastructures when used domain names get reported or blacklisted in systems.","entities":[],"relations":[],"Comments":[]} +{"id":13656,"text":"Water Nue Campaign Analysis","entities":[],"relations":[],"Comments":[]} +{"id":13657,"text":"The attackers use cloud-based email distribution services like SendGrid to deliver emails with a clickable link that redirects targets to a fake Office 365 page.","entities":[{"id":51745,"label":"threat-actor","start_offset":4,"end_offset":13},{"id":51746,"label":"tools","start_offset":63,"end_offset":71}],"relations":[{"id":1151,"from_id":51745,"to_id":51746,"type":"uses"}],"Comments":[]} +{"id":13658,"text":"(We have reached out to SendGrid and shared our findings with them.)","entities":[{"id":51747,"label":"tools","start_offset":24,"end_offset":32}],"relations":[],"Comments":[]} +{"id":13659,"text":"When the target user attempts to log in, credentials are recorded through a simple PHP script.","entities":[],"relations":[],"Comments":[]} +{"id":13660,"text":" Figure 1. Water Nue attack scenario Figure 2. Sample of recorded credentials ","entities":[],"relations":[],"Comments":[]} +{"id":13661,"text":"While the techniques aren’t new, the attack attempts appear to be successful, collecting over 800 credentials from company executives at the time of writing.","entities":[],"relations":[],"Comments":[]} +{"id":13662,"text":"How accounts are targeted for phishing attacks","entities":[{"id":42527,"label":"attack-pattern","start_offset":30,"end_offset":38}],"relations":[],"Comments":[]} +{"id":13663,"text":"In a July email sent to a C-level executive, we learned that the base domain URL is U10450540[.]ct[.]sendgrid[.]net, with the final URL being *getting-panes[.]sfo2*. Figure 3.","entities":[{"id":51748,"label":"URL","start_offset":84,"end_offset":116},{"id":51749,"label":"URL","start_offset":142,"end_offset":164},{"id":51750,"label":"identity","start_offset":26,"end_offset":43}],"relations":[{"id":1152,"from_id":51750,"to_id":51748,"type":"related-to"},{"id":1153,"from_id":51750,"to_id":51749,"type":"related-to"}],"Comments":[]} +{"id":13664,"text":"Email header “from” field shows New York and various email accounts indicating “Swiftme@{company domain names}”","entities":[],"relations":[],"Comments":[]} +{"id":13665,"text":" “Swiftme” appears in the phishing email headers and is accompanied by account names with forged company email domains.","entities":[],"relations":[],"Comments":[]} +{"id":13666,"text":"The displayed email header “from” and subject also pretend as a voicemail service.","entities":[],"relations":[],"Comments":[]} +{"id":13667,"text":"“Swiftme” is possibly a nod to electronic or wire transfers and reveals the campaign’s purpose after harvesting credentials.","entities":[],"relations":[],"Comments":[]} {"id":13668,"text":"Figure 4.","entities":[],"relations":[],"Comments":[]} {"id":13669,"text":"Email sample It should be noted that the SendGrid platform does not appear to attach the X-Mailers originally.","entities":[{"id":42540,"label":"location","start_offset":6,"end_offset":12}],"relations":[],"Comments":[]} -{"id":13670,"text":"Emails with different X-Mailers and headers are likely appended through tools that can confuse scan engines.","entities":[{"id":42542,"label":"location","start_offset":32,"end_offset":35},{"id":42543,"label":"location","start_offset":44,"end_offset":47},{"id":42544,"label":"location","start_offset":48,"end_offset":54},{"id":42545,"label":"location","start_offset":83,"end_offset":86}],"relations":[],"Comments":[]} -{"id":13671,"text":"Here are some of the X-Mailers we observed:","entities":[{"id":42546,"label":"location","start_offset":5,"end_offset":8}],"relations":[],"Comments":[]} +{"id":13670,"text":"Emails with different X-Mailers and headers are likely appended through tools that can confuse scan engines.","entities":[],"relations":[],"Comments":[]} +{"id":13671,"text":"Here are some of the X-Mailers we observed:","entities":[],"relations":[],"Comments":[]} {"id":13672,"text":"X-Mailer: Mozilla\/5.0 (Windows; U; Win98; de-AT; rv X-Mailer: Claws Mail 3.7.6 (GTK+ 2.22.0; x86_64-pc-linux-gnu)","entities":[],"relations":[],"Comments":[]} {"id":13673,"text":"X-Mailer: Mozilla 4.7 [en]C-CCK-MCD NSCPCD47 (Win98; I) X-Mailer: iPhone Mail (8A293)","entities":[],"relations":[],"Comments":[]} -{"id":13674,"text":"X-Mailer: Opera7.22\/Win32 M2 build 3221","entities":[{"id":42547,"label":"location","start_offset":35,"end_offset":39}],"relations":[],"Comments":[]} +{"id":13674,"text":"X-Mailer: Opera7.22\/Win32 M2 build 3221","entities":[],"relations":[],"Comments":[]} {"id":13675,"text":"X-Mailer: ZuckMail [version 1.00]","entities":[],"relations":[],"Comments":[]} {"id":13676,"text":"X-Mailer: CommuniGate Pro WebUser v5.3.2","entities":[],"relations":[],"Comments":[]} {"id":13677,"text":" Figure 5.","entities":[],"relations":[],"Comments":[]} {"id":13678,"text":"A phishing site imitates Office 365 login ","entities":[{"id":42549,"label":"attack-pattern","start_offset":2,"end_offset":10}],"relations":[],"Comments":[]} -{"id":13679,"text":"The originating IP of Water Nue’s test\/deployment machine was left in a clear text file in the phishing site’s server for collected credentials.","entities":[{"id":42552,"label":"location","start_offset":72,"end_offset":77},{"id":42553,"label":"attack-pattern","start_offset":95,"end_offset":103}],"relations":[],"Comments":[]} +{"id":13679,"text":"The originating IP of Water Nue’s test\/deployment machine was left in a clear text file in the phishing site’s server for collected credentials.","entities":[{"id":51751,"label":"campaign","start_offset":22,"end_offset":33},{"id":42553,"label":"attack-pattern","start_offset":95,"end_offset":103}],"relations":[],"Comments":[]} {"id":13680,"text":"Figure 6.","entities":[],"relations":[],"Comments":[]} {"id":13681,"text":"Sitemap Figure 7.","entities":[],"relations":[],"Comments":[]} -{"id":13682,"text":"The landing page index.html has a dummy speech functio Figure 8.","entities":[{"id":42556,"label":"location","start_offset":4,"end_offset":11},{"id":42557,"label":"tools","start_offset":12,"end_offset":16},{"id":42558,"label":"malware","start_offset":34,"end_offset":39}],"relations":[],"Comments":[]} -{"id":13683,"text":"While the main collection function resides in app.js, command and control (C&C) location is embedded in JavaScript code Figure 9.","entities":[{"id":42560,"label":"location","start_offset":62,"end_offset":65}],"relations":[],"Comments":[]} -{"id":13684,"text":"jQuery method is used to post the target’s credentials to hosting site The phishing pages record passwords inputted by site visitors.","entities":[{"id":42562,"label":"location","start_offset":25,"end_offset":29},{"id":42563,"label":"location","start_offset":34,"end_offset":40},{"id":42564,"label":"attack-pattern","start_offset":79,"end_offset":87}],"relations":[],"Comments":[]} -{"id":13685,"text":"Once the compromised credentials are used to successfully log in to accounts, fraudsters can identify themselves as executives.","entities":[{"id":42565,"label":"location","start_offset":33,"end_offset":36},{"id":42566,"label":"location","start_offset":89,"end_offset":92}],"relations":[],"Comments":[]} -{"id":13686,"text":"They will then send a fraudulent wire transfer request to trick recipients into wiring money into the criminals’ accounts.","entities":[{"id":42567,"label":"location","start_offset":5,"end_offset":9},{"id":42568,"label":"location","start_offset":38,"end_offset":46},{"id":42569,"label":"location","start_offset":87,"end_offset":92}],"relations":[],"Comments":[]} -{"id":13687,"text":"We found a BEC mail sample that was sent from the same IP.","entities":[{"id":42570,"label":"location","start_offset":20,"end_offset":26},{"id":42571,"label":"location","start_offset":50,"end_offset":54}],"relations":[],"Comments":[]} -{"id":13688,"text":"The email in question is an invoice request that has a legitimate email header, which is a known tactic used in BEC scams.","entities":[],"relations":[],"Comments":[]} +{"id":13682,"text":"The landing page index.html has a dummy speech functio Figure 8.","entities":[],"relations":[],"Comments":[]} +{"id":13683,"text":"While the main collection function resides in app.js, command and control (C&C) location is embedded in JavaScript code Figure 9.","entities":[],"relations":[],"Comments":[]} +{"id":13684,"text":"jQuery method is used to post the target’s credentials to hosting site The phishing pages record passwords inputted by site visitors.","entities":[{"id":51752,"label":"attack-pattern","start_offset":79,"end_offset":87}],"relations":[],"Comments":[]} +{"id":13685,"text":"Once the compromised credentials are used to successfully log in to accounts, fraudsters can identify themselves as executives.","entities":[],"relations":[],"Comments":[]} +{"id":13686,"text":"They will then send a fraudulent wire transfer request to trick recipients into wiring money into the criminals’ accounts.","entities":[],"relations":[],"Comments":[]} +{"id":13687,"text":"We found a BEC mail sample that was sent from the same IP.","entities":[],"relations":[],"Comments":[]} +{"id":13688,"text":"The email in question is an invoice request that has a legitimate email header, which is a known tactic used in BEC scams.","entities":[{"id":51753,"label":"attack-pattern","start_offset":112,"end_offset":121}],"relations":[],"Comments":[]} {"id":13689,"text":" Figure 10.","entities":[],"relations":[],"Comments":[]} -{"id":13690,"text":"An email sample with the same originating IP Figure 11.","entities":[{"id":42573,"label":"location","start_offset":9,"end_offset":15},{"id":42574,"label":"location","start_offset":25,"end_offset":29}],"relations":[],"Comments":[]} -{"id":13691,"text":"A sample fake PDF invoice in a BEC email","entities":[{"id":42576,"label":"location","start_offset":2,"end_offset":8}],"relations":[],"Comments":[]} -{"id":13692,"text":"How to defend against BEC and other phishing scams","entities":[{"id":42577,"label":"location","start_offset":26,"end_offset":29},{"id":42578,"label":"attack-pattern","start_offset":36,"end_offset":44}],"relations":[],"Comments":[]} -{"id":13693,"text":"Unlike other cybercriminal schemes, phishing and BEC scams can be tricky to detect as they are targeted toward specific recipients.","entities":[{"id":42579,"label":"attack-pattern","start_offset":36,"end_offset":44},{"id":42580,"label":"location","start_offset":45,"end_offset":48},{"id":42581,"label":"location","start_offset":59,"end_offset":62},{"id":42582,"label":"location","start_offset":91,"end_offset":94}],"relations":[],"Comments":[]} -{"id":13694,"text":"Attackers seek to compromise email accounts to gain access to financial and other sensitive information related to business operations.","entities":[{"id":42583,"label":"location","start_offset":72,"end_offset":75}],"relations":[],"Comments":[]} -{"id":13695,"text":"Here are some tips on how to stay protected from email scams: ","entities":[{"id":42584,"label":"location","start_offset":5,"end_offset":8}],"relations":[],"Comments":[]} -{"id":13696,"text":"Educate and train employees.","entities":[{"id":42585,"label":"location","start_offset":8,"end_offset":11}],"relations":[],"Comments":[]} +{"id":13690,"text":"An email sample with the same originating IP Figure 11.","entities":[],"relations":[],"Comments":[]} +{"id":13691,"text":"A sample fake PDF invoice in a BEC email","entities":[{"id":51754,"label":"attack-pattern","start_offset":31,"end_offset":34}],"relations":[],"Comments":[]} +{"id":13692,"text":"How to defend against BEC and other phishing scams","entities":[{"id":42578,"label":"attack-pattern","start_offset":36,"end_offset":44}],"relations":[],"Comments":[]} +{"id":13693,"text":"Unlike other cybercriminal schemes, phishing and BEC scams can be tricky to detect as they are targeted toward specific recipients.","entities":[{"id":51755,"label":"attack-pattern","start_offset":36,"end_offset":44},{"id":51756,"label":"attack-pattern","start_offset":49,"end_offset":52}],"relations":[],"Comments":[]} +{"id":13694,"text":"Attackers seek to compromise email accounts to gain access to financial and other sensitive information related to business operations.","entities":[],"relations":[],"Comments":[]} +{"id":13695,"text":"Here are some tips on how to stay protected from email scams: ","entities":[],"relations":[],"Comments":[]} +{"id":13696,"text":"Educate and train employees.","entities":[],"relations":[],"Comments":[]} {"id":13697,"text":"Deflect company intrusions through InfoSec education.","entities":[],"relations":[],"Comments":[]} -{"id":13698,"text":"All staff — from the CEO to rank-and-file employees — must learn about the different kinds of scams and what to do in case of any encounters (i.e., double-check with others and verify email details).","entities":[{"id":42587,"label":"location","start_offset":33,"end_offset":36},{"id":42588,"label":"location","start_offset":100,"end_offset":103},{"id":42589,"label":"location","start_offset":118,"end_offset":122},{"id":42590,"label":"location","start_offset":155,"end_offset":160},{"id":42591,"label":"location","start_offset":173,"end_offset":176}],"relations":[],"Comments":[]} +{"id":13698,"text":"All staff — from the CEO to rank-and-file employees — must learn about the different kinds of scams and what to do in case of any encounters (i.e., double-check with others and verify email details).","entities":[],"relations":[],"Comments":[]} {"id":13699,"text":"Confirm requests using other channels.","entities":[],"relations":[],"Comments":[]} {"id":13700,"text":"Exercise caution by following a verification system (e.g., multiple signoffs or additional verification protocols) among employees that work with sensitive information.","entities":[],"relations":[],"Comments":[]} {"id":13701,"text":"Scrutinize all emails.","entities":[],"relations":[],"Comments":[]} @@ -13703,16 +13703,16 @@ {"id":13703,"text":" In the case discussed here, the attacker email itself does not include the typical malware payload of malicious attachments.","entities":[],"relations":[],"Comments":[]} {"id":13704,"text":"As a result, traditional security solutions won’t be able to protect accounts and systems from such attacks.","entities":[],"relations":[],"Comments":[]} {"id":13705,"text":"Users can also turn on mail inspection for sender “sendgrid[.]net” in the email gateway.","entities":[{"id":48798,"label":"URL","start_offset":49,"end_offset":66}],"relations":[],"Comments":[]} -{"id":13706,"text":"Trend Micro protects both small- to medium-sized businesses and enterprises against phishing- and BEC-related emails.","entities":[{"id":48799,"label":"attack-pattern","start_offset":84,"end_offset":92}],"relations":[],"Comments":[]} +{"id":13706,"text":"Trend Micro protects both small- to medium-sized businesses and enterprises against phishing- and BEC-related emails.","entities":[{"id":51757,"label":"attack-pattern","start_offset":98,"end_offset":101},{"id":48799,"label":"attack-pattern","start_offset":84,"end_offset":92}],"relations":[],"Comments":[]} {"id":13707,"text":"Using enhanced machine learning combined with expert rules","entities":[],"relations":[],"Comments":[]} {"id":13708,"text":", Trend Micro™ Email Security solution analyzes both the header and the content of an email to stop BEC and other email threats.","entities":[],"relations":[],"Comments":[]} {"id":13709,"text":"For source verification and authentication, it uses Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM), and Domain-Based Message Authentication, Reporting and Conformance (DMARC).","entities":[],"relations":[],"Comments":[]} -{"id":13710,"text":"The Trend Micro™ Cloud App Security solution enhances the security of Microsoft Office 365 and other cloud services through sandbox malware analysis for BEC and other advanced threats.","entities":[{"id":42612,"label":"location","start_offset":10,"end_offset":15},{"id":42613,"label":"location","start_offset":17,"end_offset":22},{"id":42614,"label":"location","start_offset":27,"end_offset":35},{"id":42615,"label":"location","start_offset":58,"end_offset":66},{"id":42618,"label":"location","start_offset":91,"end_offset":94},{"id":42619,"label":"location","start_offset":101,"end_offset":106},{"id":42620,"label":"location","start_offset":157,"end_offset":160}],"relations":[],"Comments":[]} -{"id":13711,"text":"It uses Writing Style DNA to detect BEC impersonations and computer vision to find credential-stealing phishing sites.","entities":[{"id":42621,"label":"location","start_offset":55,"end_offset":58},{"id":42622,"label":"attack-pattern","start_offset":103,"end_offset":111},{"id":42623,"label":"location","start_offset":112,"end_offset":117}],"relations":[],"Comments":[]} -{"id":13712,"text":"It also protects cloud file sharing from threats and data loss by controlling sensitive data usage.","entities":[{"id":42624,"label":"location","start_offset":17,"end_offset":22},{"id":42625,"label":"location","start_offset":49,"end_offset":52}],"relations":[],"Comments":[]} -{"id":13713,"text":"Indicators of compromise (IOCs) Threat actor-managed C&C URLs: https:\/\/highstreetmuch[.]xyz\/hug\/gate[.]php https:\/\/takeusall[.]online\/benzz\/gate[.]PHP MITRE ATT&CK® Matrix Tags Cloud | APT & Targeted Attacks | Research | Phishing | Articles, News, Reports","entities":[{"id":42626,"label":"URL","start_offset":64,"end_offset":92},{"id":42627,"label":"URL","start_offset":108,"end_offset":134},{"id":42628,"label":"location","start_offset":189,"end_offset":194},{"id":42629,"label":"location","start_offset":197,"end_offset":200},{"id":42630,"label":"attack-pattern","start_offset":233,"end_offset":241}],"relations":[],"Comments":[]} -{"id":13714,"text":"Waterbear, which has been around for several years, is a campaign that uses modular malware capable of including additional functions remotely.","entities":[{"id":42633,"label":"location","start_offset":57,"end_offset":65}],"relations":[],"Comments":[]} -{"id":13715,"text":"It is associated with the cyberespionage group BlackTech, which mainly targets technology companies and government agencies in East Asia (specifically Taiwan, and in some instances, Japan and Hong Kong) and is responsible for some infamous campaigns such as PLEAD and Shrouded Crossbow.","entities":[{"id":42635,"label":"location","start_offset":100,"end_offset":103},{"id":42638,"label":"location","start_offset":159,"end_offset":162},{"id":42640,"label":"location","start_offset":188,"end_offset":191},{"id":42642,"label":"location","start_offset":203,"end_offset":206},{"id":42644,"label":"location","start_offset":264,"end_offset":267}],"relations":[],"Comments":[]} +{"id":13710,"text":"The Trend Micro™ Cloud App Security solution enhances the security of Microsoft Office 365 and other cloud services through sandbox malware analysis for BEC and other advanced threats.","entities":[],"relations":[],"Comments":[]} +{"id":13711,"text":"It uses Writing Style DNA to detect BEC impersonations and computer vision to find credential-stealing phishing sites.","entities":[{"id":51759,"label":"attack-pattern","start_offset":103,"end_offset":111},{"id":51758,"label":"attack-pattern","start_offset":83,"end_offset":102}],"relations":[],"Comments":[]} +{"id":13712,"text":"It also protects cloud file sharing from threats and data loss by controlling sensitive data usage.","entities":[],"relations":[],"Comments":[]} +{"id":13713,"text":"Indicators of compromise (IOCs) Threat actor-managed C&C URLs: https:\/\/highstreetmuch[.]xyz\/hug\/gate[.]php https:\/\/takeusall[.]online\/benzz\/gate[.]PHP MITRE ATT&CK® Matrix Tags Cloud | APT & Targeted Attacks | Research | Phishing | Articles, News, Reports","entities":[{"id":51760,"label":"URL","start_offset":64,"end_offset":107},{"id":51761,"label":"URL","start_offset":108,"end_offset":151}],"relations":[],"Comments":[]} +{"id":13714,"text":"Waterbear, which has been around for several years, is a campaign that uses modular malware capable of including additional functions remotely.","entities":[{"id":51762,"label":"campaign","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} +{"id":13715,"text":"It is associated with the cyberespionage group BlackTech, which mainly targets technology companies and government agencies in East Asia (specifically Taiwan, and in some instances, Japan and Hong Kong) and is responsible for some infamous campaigns such as PLEAD and Shrouded Crossbow.","entities":[{"id":51763,"label":"threat-actor","start_offset":47,"end_offset":56},{"id":51764,"label":"location","start_offset":127,"end_offset":137},{"id":51765,"label":"location","start_offset":151,"end_offset":157},{"id":51766,"label":"location","start_offset":182,"end_offset":187},{"id":51767,"label":"location","start_offset":192,"end_offset":201},{"id":51768,"label":"campaign","start_offset":258,"end_offset":263},{"id":51772,"label":"identity","start_offset":79,"end_offset":99},{"id":51770,"label":"campaign","start_offset":268,"end_offset":285}],"relations":[{"id":1154,"from_id":51763,"to_id":51772,"type":"targets"},{"id":1155,"from_id":51772,"to_id":51764,"type":"located-at"},{"id":1156,"from_id":51772,"to_id":51765,"type":"located-at"},{"id":1157,"from_id":51772,"to_id":51766,"type":"located-at"},{"id":1158,"from_id":51772,"to_id":51767,"type":"located-at"},{"id":1159,"from_id":51763,"to_id":51768,"type":"related-to"},{"id":1160,"from_id":51763,"to_id":51770,"type":"related-to"}],"Comments":[]} {"id":13716,"text":"In previous campaigns, we’ve seen Waterbear primarily being used for lateral movement, decrypting and triggering payloads with its loader component.","entities":[{"id":42647,"label":"location","start_offset":98,"end_offset":101}],"relations":[],"Comments":[]} {"id":13717,"text":"In most cases, the payloads are backdoors that are able to receive and load additional modules.","entities":[{"id":42648,"label":"location","start_offset":3,"end_offset":7},{"id":42649,"label":"location","start_offset":28,"end_offset":31},{"id":42650,"label":"location","start_offset":47,"end_offset":50},{"id":42651,"label":"location","start_offset":67,"end_offset":70},{"id":42652,"label":"location","start_offset":71,"end_offset":75}],"relations":[],"Comments":[]} {"id":13718,"text":"However, in one of its recent campaigns, we’ve discovered a piece of Waterbear payload with a brand-new purpose: hiding its network behaviors from a specific security product by API hooking techniques.","entities":[{"id":42655,"label":"location","start_offset":94,"end_offset":99},{"id":42656,"label":"location","start_offset":158,"end_offset":166},{"id":42657,"label":"attack-pattern","start_offset":182,"end_offset":189}],"relations":[],"Comments":[]} @@ -14375,25 +14375,25 @@ {"id":14375,"text":"One messy reality is that enterprises don’t manage all their endpoints.","entities":[{"id":44423,"label":"location","start_offset":44,"end_offset":50}],"relations":[],"Comments":[]} {"id":14376,"text":"A smart colleague turned me onto using the % of endpoints and servers managed as a prime security metric.","entities":[{"id":44424,"label":"location","start_offset":58,"end_offset":61},{"id":44425,"label":"location","start_offset":89,"end_offset":97}],"relations":[],"Comments":[]} {"id":14377,"text":"On one end of the spectrum are places like universities that maybe manage 10% of the endpoints on their network.","entities":[{"id":44427,"label":"location","start_offset":27,"end_offset":30},{"id":44428,"label":"location","start_offset":67,"end_offset":73}],"relations":[],"Comments":[]} -{"id":14378,"text":"On the other end are places like some large banking and R&D companies that can manage about 98 or 99%.","entities":[{"id":44430,"label":"location","start_offset":17,"end_offset":20},{"id":44431,"label":"location","start_offset":38,"end_offset":43},{"id":44432,"label":"location","start_offset":52,"end_offset":55},{"id":44433,"label":"location","start_offset":75,"end_offset":78},{"id":44434,"label":"location","start_offset":79,"end_offset":85}],"relations":[],"Comments":[]} -{"id":14379,"text":"A financial services company that was spending millions of dollars on getting from 96% to achieving 98%, using the very good reasoning that they were “cutting their biggest security problem in half” rather than “2%, meh.” So even the very best enterprises can have unmanaged endpoints that can be more easily exploited than ones with a security agent deployed on them.","entities":[{"id":44439,"label":"location","start_offset":120,"end_offset":124},{"id":44440,"label":"location","start_offset":173,"end_offset":181},{"id":44443,"label":"location","start_offset":239,"end_offset":243},{"id":44444,"label":"location","start_offset":256,"end_offset":259},{"id":44445,"label":"location","start_offset":290,"end_offset":293},{"id":44446,"label":"location","start_offset":336,"end_offset":344},{"id":44447,"label":"location","start_offset":363,"end_offset":367}],"relations":[],"Comments":[]} -{"id":14380,"text":"A lot of the advanced security we’ve been delivering on the last few years has been focused on this problem.","entities":[{"id":44448,"label":"location","start_offset":2,"end_offset":5},{"id":44449,"label":"location","start_offset":22,"end_offset":30}],"relations":[],"Comments":[]} -{"id":14381,"text":"EDR is an example of how stealthy or evasive attackers can be better uncovered than with traditional endpoint protection.","entities":[{"id":44451,"label":"location","start_offset":55,"end_offset":58},{"id":44452,"label":"location","start_offset":110,"end_offset":120}],"relations":[],"Comments":[]} -{"id":14382,"text":"EDR is great for endpoints they are on.","entities":[{"id":44453,"label":"location","start_offset":32,"end_offset":35}],"relations":[],"Comments":[]} -{"id":14383,"text":"Ian Loe of NTUC gives a killer example of uncovering stealthy attacks using EDR and MDR here.","entities":[{"id":44456,"label":"location","start_offset":80,"end_offset":83}],"relations":[],"Comments":[]} -{"id":14384,"text":"But most of EDR’s capabilities are for endpoints they are on: ones they manage.","entities":[{"id":44457,"label":"location","start_offset":4,"end_offset":8},{"id":44458,"label":"location","start_offset":31,"end_offset":34},{"id":44459,"label":"location","start_offset":54,"end_offset":57},{"id":44460,"label":"location","start_offset":72,"end_offset":78}],"relations":[],"Comments":[]} -{"id":14385,"text":"Sure there’s some herd-immunity with EDR that the greater number of managed endpoints the harder it is for an attacker to move laterally or deeper.","entities":[{"id":44461,"label":"location","start_offset":18,"end_offset":22}],"relations":[],"Comments":[]} -{"id":14386,"text":"But more capable, patient, and stealthy attackers are getting better at being evasive, knowing that EDR may be or is deployed.","entities":[{"id":44462,"label":"location","start_offset":27,"end_offset":30},{"id":44463,"label":"location","start_offset":50,"end_offset":53},{"id":44464,"label":"location","start_offset":104,"end_offset":107}],"relations":[],"Comments":[]} -{"id":14387,"text":"Mark Nunnikhoven does a great job in this post talking about lateral movement.","entities":[{"id":44466,"label":"location","start_offset":30,"end_offset":33},{"id":44467,"label":"location","start_offset":42,"end_offset":46}],"relations":[],"Comments":[]} -{"id":14388,"text":"EDR can only go so far on its own to help spot attacks that are exceptionally low and slow, and\/or using unmanaged endpoints.","entities":[{"id":44468,"label":"location","start_offset":4,"end_offset":7},{"id":44469,"label":"location","start_offset":8,"end_offset":12},{"id":44470,"label":"location","start_offset":60,"end_offset":63},{"id":44471,"label":"location","start_offset":82,"end_offset":85}],"relations":[],"Comments":[]} -{"id":14389,"text":"Endpoint security needs to step outside the endpoint silo to keep step with advanced attackers.","entities":[{"id":44472,"label":"location","start_offset":9,"end_offset":17},{"id":44473,"label":"location","start_offset":53,"end_offset":57}],"relations":[],"Comments":[]} -{"id":14390,"text":"An attack using many hops could see movement between managed endpoints, IoT, email, network components, containers and cloud-based servers over the course of many months.","entities":[{"id":44474,"label":"location","start_offset":16,"end_offset":20},{"id":44475,"label":"location","start_offset":45,"end_offset":52},{"id":44476,"label":"location","start_offset":115,"end_offset":118},{"id":44477,"label":"location","start_offset":119,"end_offset":124}],"relations":[],"Comments":[]} -{"id":14391,"text":"The delivery and reconnaissance could involve multiple protocols, emails, payloads, files, and credentials.","entities":[{"id":44479,"label":"location","start_offset":13,"end_offset":16},{"id":44480,"label":"location","start_offset":91,"end_offset":94}],"relations":[],"Comments":[]} -{"id":14392,"text":"Pulling together the tenuous and ephemeral threads of such an intentional attack needs more modern tools, rather than hoping we stumble on a supply of highly advanced threat hunters.","entities":[{"id":44481,"label":"location","start_offset":29,"end_offset":32},{"id":44482,"label":"location","start_offset":141,"end_offset":147},{"id":44483,"label":"location","start_offset":174,"end_offset":181}],"relations":[],"Comments":[]} -{"id":14393,"text":"Pulling together deep security information from across your enterprise is what is needed to face off against such advanced and intentionally evasive attacks.","entities":[{"id":44484,"label":"location","start_offset":22,"end_offset":30},{"id":44485,"label":"location","start_offset":60,"end_offset":70},{"id":44486,"label":"location","start_offset":123,"end_offset":126}],"relations":[],"Comments":[]} -{"id":14394,"text":"XDR is intended to be that security data lake of deeper enterprise infrastructure and security information than we’ve previously gathered in a single addressable pool and designed to be useful for threat hunters and analysts.","entities":[{"id":44487,"label":"location","start_offset":27,"end_offset":35},{"id":44488,"label":"location","start_offset":41,"end_offset":45},{"id":44489,"label":"location","start_offset":56,"end_offset":66},{"id":44490,"label":"location","start_offset":82,"end_offset":85},{"id":44491,"label":"location","start_offset":86,"end_offset":94},{"id":44492,"label":"location","start_offset":162,"end_offset":166},{"id":44493,"label":"location","start_offset":167,"end_offset":170},{"id":44494,"label":"location","start_offset":204,"end_offset":211},{"id":44495,"label":"location","start_offset":212,"end_offset":215}],"relations":[],"Comments":[]} -{"id":14395,"text":"In these posts here and here we talk about what XDR is and how it brings in more sources, such as network data.","entities":[{"id":44496,"label":"location","start_offset":20,"end_offset":23},{"id":44497,"label":"location","start_offset":55,"end_offset":58}],"relations":[],"Comments":[]} -{"id":14396,"text":"In the game of measure-countermeasure that is cybersecurity today and tomorrow, XDR is the next evolutionary step in dealing with more evasive threats.","entities":[{"id":44499,"label":"location","start_offset":66,"end_offset":69}],"relations":[],"Comments":[]} +{"id":14378,"text":"On the other end are places like some large banking and R&D companies that can manage about 98 or 99%.","entities":[],"relations":[],"Comments":[]} +{"id":14379,"text":"A financial services company that was spending millions of dollars on getting from 96% to achieving 98%, using the very good reasoning that they were “cutting their biggest security problem in half” rather than “2%, meh.” So even the very best enterprises can have unmanaged endpoints that can be more easily exploited than ones with a security agent deployed on them.","entities":[],"relations":[],"Comments":[]} +{"id":14380,"text":"A lot of the advanced security we’ve been delivering on the last few years has been focused on this problem.","entities":[],"relations":[],"Comments":[]} +{"id":14381,"text":"EDR is an example of how stealthy or evasive attackers can be better uncovered than with traditional endpoint protection.","entities":[],"relations":[],"Comments":[]} +{"id":14382,"text":"EDR is great for endpoints they are on.","entities":[],"relations":[],"Comments":[]} +{"id":14383,"text":"Ian Loe of NTUC gives a killer example of uncovering stealthy attacks using EDR and MDR here.","entities":[],"relations":[],"Comments":[]} +{"id":14384,"text":"But most of EDR’s capabilities are for endpoints they are on: ones they manage.","entities":[],"relations":[],"Comments":[]} +{"id":14385,"text":"Sure there’s some herd-immunity with EDR that the greater number of managed endpoints the harder it is for an attacker to move laterally or deeper.","entities":[],"relations":[],"Comments":[]} +{"id":14386,"text":"But more capable, patient, and stealthy attackers are getting better at being evasive, knowing that EDR may be or is deployed.","entities":[],"relations":[],"Comments":[]} +{"id":14387,"text":"Mark Nunnikhoven does a great job in this post talking about lateral movement.","entities":[],"relations":[],"Comments":[]} +{"id":14388,"text":"EDR can only go so far on its own to help spot attacks that are exceptionally low and slow, and\/or using unmanaged endpoints.","entities":[],"relations":[],"Comments":[]} +{"id":14389,"text":"Endpoint security needs to step outside the endpoint silo to keep step with advanced attackers.","entities":[],"relations":[],"Comments":[]} +{"id":14390,"text":"An attack using many hops could see movement between managed endpoints, IoT, email, network components, containers and cloud-based servers over the course of many months.","entities":[],"relations":[],"Comments":[]} +{"id":14391,"text":"The delivery and reconnaissance could involve multiple protocols, emails, payloads, files, and credentials.","entities":[],"relations":[],"Comments":[]} +{"id":14392,"text":"Pulling together the tenuous and ephemeral threads of such an intentional attack needs more modern tools, rather than hoping we stumble on a supply of highly advanced threat hunters.","entities":[],"relations":[],"Comments":[]} +{"id":14393,"text":"Pulling together deep security information from across your enterprise is what is needed to face off against such advanced and intentionally evasive attacks.","entities":[],"relations":[],"Comments":[]} +{"id":14394,"text":"XDR is intended to be that security data lake of deeper enterprise infrastructure and security information than we’ve previously gathered in a single addressable pool and designed to be useful for threat hunters and analysts.","entities":[{"id":51776,"label":"SOFTWARE","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} +{"id":14395,"text":"In these posts here and here we talk about what XDR is and how it brings in more sources, such as network data.","entities":[{"id":51775,"label":"SOFTWARE","start_offset":48,"end_offset":51}],"relations":[],"Comments":[]} +{"id":14396,"text":"In the game of measure-countermeasure that is cybersecurity today and tomorrow, XDR is the next evolutionary step in dealing with more evasive threats.","entities":[{"id":51774,"label":"SOFTWARE","start_offset":80,"end_offset":83}],"relations":[],"Comments":[]} {"id":14397,"text":" Tags Cloud | APT & Targeted Attacks | Cyber Crime | Expert Perspective | Articles, News, Reports | Cyber Threats","entities":[{"id":44501,"label":"location","start_offset":10,"end_offset":15},{"id":44502,"label":"location","start_offset":18,"end_offset":21}],"relations":[],"Comments":[]} {"id":14398,"text":"As we’ve discussed in previous blogs, XDR is a better way to detect attacks within a network since it is able to coordinate and collaborate threat intelligence and data across multiple threat vectors, including endpoint (including mobile and IIoT), server, network, messaging, web, and cloud.","entities":[{"id":44503,"label":"location","start_offset":54,"end_offset":57},{"id":44504,"label":"location","start_offset":124,"end_offset":127},{"id":44505,"label":"location","start_offset":160,"end_offset":163},{"id":44506,"label":"location","start_offset":231,"end_offset":237},{"id":44507,"label":"location","start_offset":238,"end_offset":241},{"id":44508,"label":"location","start_offset":282,"end_offset":285},{"id":44509,"label":"location","start_offset":286,"end_offset":291}],"relations":[],"Comments":[]} {"id":14399,"text":"In this blog I want to discuss an area of the attack sequence that can help organizations identify an attack, and that is the lateral movement.","entities":[{"id":44510,"label":"location","start_offset":67,"end_offset":70},{"id":44511,"label":"location","start_offset":110,"end_offset":113}],"relations":[],"Comments":[]}