Red Piranha Red Piranha Threat Intelligence Report (15th May-21th May 2017)


How Red Piranha’s Security Systems & Response Mechanism Worked During the WannaCry Ransomware Attack:


Since the hacker group called Shadow brokers leaked tools used by the NSA, our highly trained team of experts included 117 new rules into the Crystal Eye System to mitigate against future threats based around the Windows SMB Zeroday and other related attack vectors exposed in this leak.


We also were also quick to analyze the threats posed by the Shadow Brokers leaks which were published in our blog article on April 15, 2017. 

ReadRecent Shadow brokers dump exposes over 3 million systems and the number is climbing

Just after the NSA hacking tools were made public by the Shadow Brokers our highly trained team of experts included 117 new rules into the Crystal Eye System to mitigate against future threats based around the Windows SMB Zeroday and other related attack vectors exposed in this leak.

However on May 12, 2017, cyber criminals had launched attacks with variants based on the tools released back in Easter in Europe. Our manually added rules already included in the system would have prevented most of the attacks to some extent but our system also would have stopped new attacks by 2 am our time via our threat intelligence feed and automatic updates. On Mid-day Saturday (May 12, 2017) we undertook an audit of our system to track our updates to determine how fast our automated systems would have been protecting our clients and found new IOC's would have made into Crystal Eye by 2 AM WST.

Timeline of Events:

Time Line of events since shadow brokers leak

Also ReadBehold A Nightmare Scenario As Leaked NSA tools come back to haunt, - WannaCry Ransomware Cripples Computers Across the World

Other News…

Information-disclosure Vulnerability Allows Attackers to Snoop into Ongoing Cisco WebEx Meetings

Major update to the Microsoft Malware Protection Engine addresses a security vulnerability

Top 10 Attacker Countries:  

Top 10 Attacker Countries:             

Diagrammatic representation of the top 10 attacker countries            

Top 10 Attacker Host:

The following data states the extent of attacks that have originated from specific host IP address.

top 10 attacker host

diagrammatic representation of top 10 attacker host

Detailed Report on Suspicious Hosts:

Behavior: Scanning hosts

Activity: Continuously using different username password combination existing and non existing usernames.

We have found following different types of events:

SSHD authentication failed.

Multiple SSHD authentication failures.

Multiple failed logins in a small period of time.

SSH insecure connection attempt (scan).

Failed Password

Invalid User

Input user auth request invalid user

Type of attack: Bruteforce

Source IP Addresses:

31.207.47.36

190.85.226.245

91.197.232.103

218.65.30.124

61.177.172.52

91.197.232.107

61.177.172.13

91.197.232.109

61.177.172.17

Details
Date Published
May 23, 2017