id
int64
1
14.4k
text
stringlengths
3
5.01k
entities
list
relations
list
Comments
list
411
As that trend shows no sign of slowing down anytime soon, we can expect this to remain a very lucrative avenue for attackers.
[]
[]
[]
412
Unlike other cybersecurity threats we’re used to bracing for around the holiday season, unauthorized coin mining attacks can affect shoppers who are up-to-date with security patches and even some running some security protections.
[ { "id": 46110, "label": "attack-pattern", "start_offset": 89, "end_offset": 121 } ]
[]
[]
413
And unlike spam or phishing, these attacks also don’t require any lapse in vigilance by the user: they can happen simply by going to websites users know and trust.
[ { "id": 46111, "label": "attack-pattern", "start_offset": 11, "end_offset": 15 }, { "id": 46112, "label": "attack-pattern", "start_offset": 19, "end_offset": 27 } ]
[]
[]
414
The good news for retailers is that these attacks are wholly preventable.
[]
[]
[]
415
And for shoppers, the impact of a successful attack is minimal: there are no lasting effects or impact, making it an annoyance at worst. But because of the potential impact on holiday shopping and the ease of attacks, unauthorized coin mining is an attack that retailers need to be aware of and take active steps for prevention this holiday season.
[ { "id": 46113, "label": "attack-pattern", "start_offset": 219, "end_offset": 243 } ]
[]
[]
416
What Is Unauthorized Coin Mining?
[ { "id": 46114, "label": "attack-pattern", "start_offset": 9, "end_offset": 33 } ]
[]
[]
417
The best way to understand the threat of unauthorized coin mining is to first understand its impact.
[ { "id": 46115, "label": "attack-pattern", "start_offset": 42, "end_offset": 66 } ]
[]
[]
418
Unauthorized coin mining is an attack that can cause a user’s system to suddenly and unexpectedly slow down, sometimes significantly, when visiting a website.
[ { "id": 46116, "label": "attack-pattern", "start_offset": 0, "end_offset": 24 } ]
[]
[]
419
In a worst case, the slow-down can be so severe that it can make a website basically unusable.
[]
[]
[]
420
Obviously, this impact is potentially dire for shoppers and retailers as it directly impacts and harms the online shopping experience.
[]
[]
[]
421
What causes this impact is when the website the user visits is running “coin miner” code.
[ { "id": 46117, "label": "malware", "start_offset": 72, "end_offset": 82 } ]
[]
[]
422
“Coin miner” code is code used to “mine” for digital currency like bitcoin.
[ { "id": 46118, "label": "malware", "start_offset": 2, "end_offset": 12 }, { "id": 46119, "label": "SOFTWARE", "start_offset": 68, "end_offset": 75 } ]
[]
[]
423
Mining provides the computing necessary to power the digital currency’s infrastructure.
[]
[]
[]
424
Mining is also a computationally intensive process, meaning it takes a lot of system resources.
[]
[]
[]
425
Because of this, people can earn digital currency credit in exchange for the use of their computing resources to power that digital currency’s infrastructure.
[]
[]
[]
426
There are many kinds of coin mining software.
[]
[]
[]
427
In this case, we are concerned about coin mining code that’s used on websites.
[]
[]
[]
428
When the user visits the website, the code runs on their system and “mines” on behalf of others – either the website or someone else.
[]
[]
[]
429
When this is done with the visitor’s full knowledge and consent, it’s a fair and reasonable exchange.
[]
[]
[]
430
For instance, there are some websites that now use coin mining as an alternative to digital advertising to generate revenue.
[]
[]
[]
431
In these cases, the coin mining is authorized; the website informs the user that, while on the site, his or her computing resources will be used to “mine” digital currency, and the site will receive the credits.
[]
[]
[]
432
While the user will experience a slow-down as the coin mining software is run, it is (or should be) expected, because of the notification, and so done with the site visitor’s consent.
[]
[]
[]
433
Where this becomes a problem is when coin mining is done without the user’s knowledge and consent.
[]
[]
[]
434
In this case the coin mining is unauthorized: in essence, it’s an attack against the user’s resources.
[]
[]
[]
435
How Do Unauthorized Coin Mining Attacks Happen?
[ { "id": 44748, "label": "attack-pattern", "start_offset": 8, "end_offset": 32 } ]
[]
[]
436
Unauthorized coin mining attacks happen very simply: the website the user is visiting has special code on it that performs coin mining operations on the visitor’s computer while they’re on the website.
[ { "id": 46120, "label": "attack-pattern", "start_offset": 1, "end_offset": 33 } ]
[]
[]
437
And, as noted before, this happens without the user’s knowledge or consent.
[]
[]
[]
438
Because these attacks happen due to code on the website, that code is either there with the site owner’s knowledge and permission or not.
[]
[]
[]
439
When unauthorized coin mining happens with the site owner’s knowledge and permission, it’s basically a malicious site.
[ { "id": 46121, "label": "attack-pattern", "start_offset": 6, "end_offset": 30 } ]
[]
[]
440
That site’s owner is the attacker.
[]
[]
[]
441
When we’re talking about online shopping, clearly there’s no threat here to the retailer: they’re the ones doing the attacking.
[]
[]
[]
442
And for the shopper, it means you’re on an untrustworthy site and so open to all manner of risks beyond just unauthorized coin mining.
[ { "id": 46122, "label": "attack-pattern", "start_offset": 109, "end_offset": 133 } ]
[]
[]
443
The real, significant situation shoppers and retailers need to think about this season is when unauthorized coin mining code is on a site without that site owner’s knowledge and permission.
[ { "id": 46123, "label": "attack-pattern", "start_offset": 96, "end_offset": 120 } ]
[]
[]
444
Here the site itself has been attacked, and the site owners are also victims.
[]
[]
[]
445
This is an attack against not just shoppers but the retailers operating online shopping sites.
[]
[]
[]
446
How You Can Prevent Unauthorized Coin Mining Attacks If you’re a shopper, there are three things you can do to protect yourself against unauthorized coin mining attacks this holiday season: If you’re a retailer, preventing unauthorized coin mining attacks comes down to focusing on two tasks, both of which you should be doing anyway: Finally, if you’re a legitimate website that has chosen to implement coin mining to raise funds from your visitors, you can ensure that your visitors don’t think you’re engaged in unauthorized coin mining by doing three things: Conclusion Working to prevent cybercrime threats during the holiday season has become a standard part of what shoppers and retailers do every year.
[]
[]
[]
447
This year, for the first time in many years, shoppers and retailers are facing a new threat, unauthorized coin mining, driven by the surge in digital currency prices.
[]
[]
[]
448
While this threat can have a clear, negative impact on retailers and shoppers, the good news is that this threat is easily preventable and poses no lasting harm to consumers.
[]
[]
[]
449
This is a case where forewarned is forearmed, and that forearming can result in effective prevention. Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!
[]
[]
[]
450
Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
[]
[]
[]
451
This post is also available in: 日本語 (Japanese) Intro
[]
[]
[]
452
One of the most important “innovations” in malware in the past decade is what’s called a Domain Generation Algorithm (“DGA”)”.
[]
[]
[]
453
DGA is an automation technique that attackers use to make it harder for defenders to protect against attacks.
[]
[]
[]
454
While DGA has been in use for over 10 years now, it’s still a potent technique that has been a particular challenge for defenders to counter.
[]
[]
[]
455
Fortunately, there are emerging technologies now that can better counter DGAs.
[]
[]
[]
456
What is it?
[]
[]
[]
457
A Domain Generation Algorithm is a program that is designed to generate domain names in a particular fashion.
[]
[]
[]
458
Attackers developed DGAs so that malware can quickly generate a list of domains that it can use for the sites that give it instructions and receive information from the malware (usually referred to as “command and control” or C2).
[]
[]
[]
459
Attackers use DGA so that they can quickly switch the domains that they’re using for the malware attacks.
[]
[]
[]
460
Attackers do this because security software and vendors act quickly to block and take down malicious domains that malware uses.
[]
[]
[]
461
Attackers developed DGA specifically to counter these actions.
[]
[]
[]
462
In the past, attackers would maintain a static list of malicious domains; defenders could easily take that list and start blocking and taking down those sites.
[]
[]
[]
463
By using an algorithm to build the list of domains, the attackers also make it harder for defenders to know or predict what domains will be used than if they had a simple list of domains.
[]
[]
[]
464
To get that list of domains that the malware will use, defenders have to decode the algorithm which can be difficult.
[]
[]
[]
465
Even then, taking down sites that malware using a DGA can be a challenge as defenders have to go through the process of working with ISPs to take down these malicious domains one by one.
[ { "id": 46124, "label": "identity", "start_offset": 134, "end_offset": 137 } ]
[]
[]
466
Many DGAs are built to use hundreds or even thousands of domains.
[]
[]
[]
467
And these domains are often up for only limited periods of time.
[]
[]
[]
468
In this environment blocking and taking down DGA-related domains quickly becomes a game of “whack a mole” that is sometimes futile.
[]
[]
[]
469
Why should I care, what can it do to me?
[]
[]
[]
470
DGA by itself can’t harm you.
[]
[]
[]
471
But it is an important piece that enables modern malware to try and evade security products and countermeasures.
[]
[]
[]
472
The importance and usefulness of DGA is best shown by the fact that it’s been in regular and constant use since at least 2008.
[ { "id": 46125, "label": "TIME", "start_offset": 121, "end_offset": 125 } ]
[]
[]
473
DGA was a key component in the Conficker attacks in 2008 and 2009 and part of its success.
[ { "id": 46126, "label": "malware", "start_offset": 31, "end_offset": 40 }, { "id": 46127, "label": "TIME", "start_offset": 52, "end_offset": 56 }, { "id": 46128, "label": "TIME", "start_offset": 61, "end_offset": 65 } ]
[]
[]
474
What can I do about it?
[]
[]
[]
475
Because DGA is a technique the fuels malware attacks, the things you can do to help prevent malware can also help prevent DGA-fueled malware attacks: In addition, new technologies are being developed that can more directly counter DGA-fueled attacks, particularly for organizations.
[]
[]
[]
476
In particular, security vendors are bringing automation to bear to counter the attackers’ automation.
[]
[]
[]
477
New anti-DGA technologies that leverage machine learning and big data are capable of countering DGA’s automation with automated prediction of their own that can anticipate, block, assist with malicious site takedowns or even, in some cases, prevent those malicious sites from being used in the first place.
[]
[]
[]
478
You can also learn more about these new technologies and look at deploying them as an additional layer of protection.
[]
[]
[]
479
About: Threat Briefs are meant to help busy people understand real-world threats and how they can prevent them in their lives.
[]
[]
[]
480
They’re put together by Palo Alto Networks Unit 42 threat research team and are meant for you to read and share with your family, friends, and coworkers so you can all be safer and get on with the business of your digital life. Got a topic you want us to write about for you, your friends, or your family?
[ { "id": 45787, "label": "identity", "start_offset": 25, "end_offset": 43 }, { "id": 45789, "label": "identity", "start_offset": 44, "end_offset": 51 }, { "id": 45790, "label": "identity", "start_offset": 25, "end_offset": 72 } ]
[]
[]
481
Email us at u42comms@paloaltonetworks.com.
[ { "id": 1630, "label": "EMAIL", "start_offset": 12, "end_offset": 41 } ]
[]
[]
482
Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!
[]
[]
[]
483
Please mark, I'm not a robot!
[]
[]
[]
484
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
[]
[]
[]
485
Unit 42 released details about a vulnerability that affects Android devices running operating systems older than 8.0 Oreo.
[ { "id": 1635, "label": "identity", "start_offset": 0, "end_offset": 7 }, { "id": 46129, "label": "SOFTWARE", "start_offset": 60, "end_offset": 67 }, { "id": 46130, "label": "SOFTWARE", "start_offset": 113, "end_offset": 121 } ]
[]
[]
486
The vulnerability leaves Android users at risk of falling victim to an Android Toast Overlay attack.
[ { "id": 44751, "label": "SOFTWARE", "start_offset": 25, "end_offset": 32 }, { "id": 44753, "label": "attack-pattern", "start_offset": 71, "end_offset": 99 } ]
[ { "id": 155, "from_id": 44753, "to_id": 44751, "type": "targets" } ]
[]
487
Patches are available that fix this vulnerability, so Android users should get the latest updates as soon as possible.
[ { "id": 46131, "label": "SOFTWARE", "start_offset": 54, "end_offset": 61 } ]
[]
[]
488
How it Works
[]
[]
[]
489
The vulnerability affects the Toast feature on Android devices, an Android feature that allows display messages and notifications of other applications to “pop up,” and allows an attacker to employ an overlay attack.
[ { "id": 45791, "label": "SOFTWARE", "start_offset": 47, "end_offset": 54 }, { "id": 45792, "label": "SOFTWARE", "start_offset": 67, "end_offset": 74 } ]
[]
[]
490
An overlay attack happens when an attacker places a window over a legitimate application on the device.
[]
[]
[]
491
Users will interact with the window, thinking they are performing their intended function, but they are actually engaging with the attackers overlay window and executing the attacker’s desired function.
[]
[]
[]
492
You can see an example of how this would work in Figure 1.
[]
[]
[]
493
Figure 1: Bogus patch installer overlying malware requesting administrative permissions This interaction can install malware or malicious software on the device, grant malware full administrative privileges or lock the user out and render the device unusable. In the past successful overlay attacks were typically dependent on two conditions: However, with this particular vulnerability, these conditions are no longer required for a successful attack.
[]
[]
[]
494
This means that attackers can use this vulnerability in apps users get from places other than Google Play.
[ { "id": 46132, "label": "SOFTWARE", "start_offset": 94, "end_offset": 105 } ]
[]
[]
495
And when they install these malicious apps, they don’t have to ask for the “draw on top” permission.
[]
[]
[]
496
How to Defend Against It Keeping devices updated is a general security best practice.
[]
[]
[]
497
The Android Toast Overlay attack specifically targets outdated devices using versions prior to 8.0.
[ { "id": 46133, "label": "attack-pattern", "start_offset": 4, "end_offset": 32 } ]
[]
[]
498
In order to defend against the Android Toast Overlay attack, update all Android devices to the latest version.
[ { "id": 44756, "label": "attack-pattern", "start_offset": 31, "end_offset": 59 }, { "id": 44757, "label": "SOFTWARE", "start_offset": 31, "end_offset": 38 }, { "id": 44758, "label": "SOFTWARE", "start_offset": 72, "end_offset": 79 } ]
[]
[]
499
Additionally, avoid downloading malicious applications by only downloading from the Google Play store is another best practice you should always follow.
[ { "id": 46134, "label": "SOFTWARE", "start_offset": 84, "end_offset": 101 } ]
[]
[]
500
Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!
[]
[]
[]
501
Please mark, I'm not a robot!
[]
[]
[]
502
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
[]
[]
[]
503
This post is also available in: 日本語 (Japanese) Ransomware is one of the top threats in cybersecurity and a focus area for Palo Alto Networks.
[ { "id": 46135, "label": "identity", "start_offset": 128, "end_offset": 146 } ]
[]
[]
504
In the current threat landscape, ransom payments are rising and organizations are seeking to protect themselves from threat actors.
[]
[]
[]
505
In the 2021 Unit 42 Ransomware Threat Report, we detailed the observations and the trend of top ransomware families from January 2020-January 2021.
[ { "id": 1681, "label": "identity", "start_offset": 12, "end_offset": 19 }, { "id": 46138, "label": "TIME", "start_offset": 134, "end_offset": 146 }, { "id": 46136, "label": "TIME", "start_offset": 7, "end_offset": 11 }, { "id": 46137, "label": "TIME", "start_offset": 121, "end_offset": 133 } ]
[]
[]
506
This post supplements that information based on observations from the first three months of 2021, and will discuss the propagation of different ransomware families we observed in the wild and the different types of extortion used.
[ { "id": 46139, "label": "TIME", "start_offset": 92, "end_offset": 96 } ]
[]
[]
507
We hope the information will help readers get a clear picture of current directions in ransomware trends.
[]
[]
[]
508
In the first quarter (Q1) of 2021, Unit 42 detected 113 different ransomware families in the wild.
[ { "id": 46140, "label": "TIME", "start_offset": 21, "end_offset": 33 }, { "id": 46141, "label": "identity", "start_offset": 35, "end_offset": 42 } ]
[]
[]
509
Based on the statistical data, the top 15 ransomware families only cover 52.3% of total ransomware cases.
[]
[]
[]
510
This demonstrates the diversity of ransomware and emphasizes how difficult it is to expand ransomware detection coverage with static profiling.
[]
[]
[]