New Threat Detection Added | 4 (Fruity Malware, IcedID Malware, Ivanti CVE-2023-35082, and Chamilo CMS CVE-2023-34960) |
New Threat Protections | 10 |
New Ransomware Victims Last Week | 77 |
Weekly Detected Threats
The following threats were added to Crystal Eye XDR this week:
Threat name: | Fruity Malware | ||||||||||||||||||
Fruity serves as a tool for cybercriminals to spread the Remcos RAT, a remote-control tool enabling remote computer access for malicious purposes. This gives them access to sensitive data like passwords, credit cards, and real-time screen monitoring. Moreover, it facilitates file downloads and execution, opening the door to more malware. Beyond Remcos RAT, Fruity can distribute various other malware types, including banking trojans, ransomware, and remote access tools. Banking trojans steal financial data, ransomware encrypts files for a ransom, and remote access tools compromise systems. Fruity victims face substantial harm, with unauthorised access to personal data, leading to identity theft, financial losses, and privacy breaches. Its capacity to introduce more malware triggers additional infections, causing operational disruptions, data loss, and potential ransomware extortion. | |||||||||||||||||||
Threat Protected: | 04 | ||||||||||||||||||
Rule Set Type: |
| ||||||||||||||||||
Class Type: | Trojan-activity | ||||||||||||||||||
Kill Chain: | Execution T1059/T1129 - Persistence T1574 - Privilege Escalation T1055/T1548.002 - Defence Evasion T1027/T1055/T1112 - Discovery T1012/T1057/T1083 |
Threat name: | IcedID Malware | ||||||||||||||||||
IcedID, also known as BokBot, emerged in 2017. Initially tied to the banking trojan payload, the term "IcedID" now encompasses the entire infection process. After a few years under the radar, it resurfaced in 2019 using steganography to conceal its payload. As time passed, IcedID loaders advanced, adopting various steganography techniques such as "Photoloader" and more recently "Gziploader." The core functionalities of the banking trojan have seen limited changes. IcedID operates in three stages, employing two DLL loaders via rundll32.exe. While the final stage is a banking trojan, IcedID can serve as a conduit for other threats like Ransomware or as an entry point for lateral spreading. By employing both VMware EDR and NDR solutions, comprehensive visibility, detection, and prevention against threats like IcedID are achieved across all attack stages. | |||||||||||||||||||
Threat Protected: | 03 | ||||||||||||||||||
Rule Set Type: |
| ||||||||||||||||||
Class Type: | Trojan-activity | ||||||||||||||||||
Kill Chain: | Execution T1064/T1203 - Persistence T1574.002 - Privilege Escalation T1055/T1574.002 - Defence Evasion T1027/T1036/T1055 - Discovery T1012/T1018/T1018 - Collection T1114 – Command-and-Control T1071/T1105 |
Threat name: | Ivanti CVE-2023-35082 | ||||||||||||||||||
CVE-2023-35082 enables an external unauthorised attacker to gain access to the API endpoints of a publicly accessible management server. Exploiting these API endpoints provides the attacker with a range of functionalities as outlined in the official API documentation. These functionalities encompass the potential to reveal personally identifiable information (PII) and make alterations to the platform. Moreover, if an additional vulnerability is present in the API, the attacker can combine these vulnerabilities. For instance, the attacker could leverage CVE-2023-35081 in conjunction with CVE-2023-35082 to create a chain of exploits, thereby allowing the attacker to upload malicious webshell files to the appliance, potentially leading to their execution. | |||||||||||||||||||
Threat Protected: | 02 | ||||||||||||||||||
Rule Set Type: |
| ||||||||||||||||||
Class Type: | Trojan-activity | ||||||||||||||||||
Kill Chain: | Initial Access T1190 |
Threat name: | Chamilo CMS CVE-2023-34960 | ||||||||||||||||||
An inherent flaw in the wsConvertPpt module within Chamilo versions ranging from v1.11.* to v1.11.18 introduces a command injection vulnerability. This vulnerability empowers attackers to execute arbitrary commands by manipulating a SOAP API call, utilising a specially crafted PowerPoint filename. | |||||||||||||||||||
Threat Protected: | 01 | ||||||||||||||||||
Rule Set Type: |
| ||||||||||||||||||
Class Type: | Trojan-activity | ||||||||||||||||||
Kill Chain: | Initial Access T1190 |
Known exploited vulnerabilities (Week 1 - August 2023):
For more information, refer to the Forum – Security Advisory
Vulnerability | Description | |
CVE-2023-35081 | Ivanti Endpoint Manager Mobile (EPMM) Path Traversal Vulnerability |
Updated Malware Signatures (Week 1 - August 2023)
Threat | Description | |
njRAT | A remote access trojan typically spreads using phishing emails or social engineering tactics. It allows a threat actor to steal sensitive information, install additional malware, and control the victim’s machine remotely. | |
Parite | Also known as the W32/Parite Virus which infects Windows computers and is classified as a polymorphic virus. | |
Tofsee | A malware that is used to send spam emails, and conduct click frauds as well as cryptomining. | |
Vidar | A stealer designed to collect sensitive data from infected machines. It usually targets Windows-based machines and is spread through email attachments or downloads from compromised websites. | |
Ramnit | A banking trojan used to steal online banking credentials. |
New Ransomware Victims Last Week: | 77 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Red Piranha proactively gathers information about organisations impacted by ransomware attacks through various channels, including the Dark Web. In the past week, our team identified a total of 77 new ransomware victims from 18 distinct industries across 20 countries worldwide. This highlights the global reach and indiscriminate nature of ransomware attacks, which can affect organisations of all sizes and sectors. LockBit3.0, a specific ransomware, has affected the largest number of new victims (14) spread across various countries. RA Group and Play group follow closely with each hitting 10 and 8 new victims respectively. Below are the victim counts (%) for these ransomware groups and a few others. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Name of Ransomware Group | Percentage of new Victims last week | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
8Base | 5.19% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Akira | 6.49% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Alphv | 7.79% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Bianlian | 3.90% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Blackbasta | 1.30% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Clop | 1.30% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Cuba | 2.60% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Karakurt | 1.30% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
LokBit3.0 | 18.18% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Mallox | 2.60% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Medusa | 2.60% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Monti | 3.90% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Noescape | 5.19% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Nokoyawa | 10.39% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Play | 10.39% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ra Group | 12.99% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ransomware Blog | 1.30% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rhysida | 1.30% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Snatch | 1.30% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||