New Threat Detection Added | 4 (Duke Malware, NetSupport RAT, JanelaRAT, and QwixxRAT) |
New Threat Protections | 11 |
New Ransomware Victims Last Week | 126 |
Weekly Detected Threats
The following threats were added to Crystal Eye XDR this week:
Threat name: | Duke Malware | ||||||||||||||||||
Duke, a malware toolkit used by the APT29 group, also known as The Dukes, Cloaked Ursa, CozyBear, Nobelium, and UNC2452. APT29 is a Russian state-sponsored actor linked to SVR RF, engaging in politically motivated cyber espionage. Duke malware includes backdoors, loaders, data stealers, and disruptors. In 2023, The Dukes used malicious PDFs posing as German embassy invitations in a spam campaign targeting NATO-aligned Foreign Affairs ministries. | |||||||||||||||||||
Threat Protected: | 05 | ||||||||||||||||||
Rule Set Type: |
| ||||||||||||||||||
Class Type: | Trojan-activity | ||||||||||||||||||
Kill Chain: | Execution T1047- Defence Evasion TA0005/T1036 - Credential Access TA0006 -Discovery T1018 - Collection T1005 - Command-and-Control TA0011 |
Threat name: | NetSupport RAT | ||||||||||||||||||
Experts found an ongoing scheme that tricks people with fake Chrome updates, getting them to install a tool called NetSupport Manager. Bad actors then misuse this tool to steal data and control victims' computers. This scheme is somewhat similar to the earlier SocGholish campaign, possibly linked to Russian threats. But the connection to SocGholish is not certain, and they are using different tools. | |||||||||||||||||||
Threat Protected: | 04 | ||||||||||||||||||
Rule Set Type: |
| ||||||||||||||||||
Class Type: | Trojan-activity | ||||||||||||||||||
Kill Chain: | Initial Access T1566 - Execution T1059 - Collection T1119/T1005/T1185 - Command-and-Control T1132 - Exfiltration T1041 |
Threat name: | JanelaRAT | ||||||||||||||||||
A targeted threat campaign named JanelaRAT has been recently discovered. It appears to be aimed at FinTech users in the LATAM region. Employing tactics like DLL side-loading, dynamic C2 infrastructure, and a multi-stage approach, the campaign utilises a customised BX RAT variant, leading to the naming of the malware as JanelaRAT. Notably, JanelaRAT focuses on harvesting financial data in LATAM, incorporates a Windows titles sensitivity feature, employs dynamic socket configuration, exploits legitimate sources for DLL side-loading evasion, and exhibits Portuguese-language indicators, highlighting the origin of the threat actor. The initiation of the attack chain is executed through a VBScript, enclosed within ZIP archives. The VBScript undertakes two primary actions: retrieving a ZIP archive from the attackers' server and depositing a BAT file on the targeted endpoint to prime the system for the subsequent infection stage. Enclosed within the ZIP archive are two components responsible for orchestrating the ensuing stages of infection, facilitating DLL side-loading. JanelaRAT is designed to gather and transmit data regarding the compromised host to the attacker. | |||||||||||||||||||
Threat Protected: | 01 | ||||||||||||||||||
Rule Set Type: |
| ||||||||||||||||||
Class Type: | Trojan-activity | ||||||||||||||||||
Kill Chain: | Execution T1059 - Persistence T1574 - Command-and-Control T1095 - Exfiltration T1041 |
Threat name: | QwixxRat | ||||||||||||||||||
A new threat has emerged under the name QwixxRAT, posing risks to both enterprises and individual users. This Trojan enters systems discreetly, extending its reach to extract a wide array of data. It was seen in early August 2023. The malicious tool is being extensively propagated by the threat actor through platforms like Telegram and Discord. Upon successful installation on victim Windows devices belonging to, the RAT adeptly gathers sensitive information, which is subsequently dispatched to the attacker's Telegram bot, granting unauthorised access to the victim's confidential data. To elude detection by antivirus software, the RAT utilises command and control capabilities through a Telegram bot. This mechanism empowers the attacker to remotely oversee the RAT's actions and administer its functions. | |||||||||||||||||||
Threat Protected: | 01 | ||||||||||||||||||
Rule Set Type: |
| ||||||||||||||||||
Class Type: | Trojan-activity | ||||||||||||||||||
Kill Chain: | Initial Access T1190 - Execution T1059 - Command-and-Control T1102/T1071 |
Known exploited vulnerabilities (Week 3 - August 2023):
For more information, refer to the Forum – Security Advisory
Vulnerability | Description | |
CVE-2023-24489 | Citrix Content Collaboration ShareFile Improper Access Control Vulnerability |
Updated Malware Signatures (Week 3 - August 2023)
Threat | Description | |
Valyria | A Microsoft Word-based malware which is used as a dropper for second-stage malware. | |
Tofsee | A malware that is used to send spam emails, conduct click frauds as well as cryptomining. | |
Ramnit | A banking trojan used to steal online banking credentials | |
Zeus | Also known as Zbot and is primarily designed to steal banking credentials. | |
XtremeRAT | A remote access trojan interacts with the infected machine via a remote shell, uploads/downloads files, and records from a webcam/microphone. |
New Ransomware Victims Last Week: | 126 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Red Piranha proactively gathers information about organisations impacted by ransomware attacks through various channels, including the Dark Web. In the past week, our team identified a total of 126 new ransomware victims from 21 distinct industries across 22 countries worldwide. This highlights the global reach and indiscriminate nature of ransomware attacks, which can affect organisations of all sizes and sectors. Clop, a specific ransomware, has affected the largest number of new victims (41) spread across various countries. LockBit3.0 and Blackbasta hit 22 & 20 new victims respectively. Below are the victim counts (%) for these ransomware groups and a few others. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Name of Ransomware Group | Percentage of new Victims last week | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
8Base | 3.17% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Akira | 3.97% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
AlphV | 3.97% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Bianlian | 1.59% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Blackbasta | 15.87% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Clop | 32.54% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Clop Torrents | 3.17% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Everest | 1.59% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
INC Ransom | 0.79% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
LockBit3.0 | 17.46% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Medusa | 2.38% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Metaencryptor | 8.73% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Noescape | 3.97% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rhysida | 0.79% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
After conducting additional research, we found that ransomware has impacted 21 industries globally. Last week, the Manufacturing and Business Services sectors were hit particularly hard, with 17% and 15% of the total ransomware victims belonging to each of those sectors respectively. The table below presents the most recent ransomware victims sorted by industry.
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||