New Threat Detection Added |
GootLoader Malware, DolphinCape Malware, PyPi-NPM CIA Ransomware, BlackMagic Ransomware, CHAOS RAT, DEV-1028 botnet |
New Threat Protections | 9 |
Overall Weekly Observables Count | 2,331,551 |
New Ransomware Victims Last Week | 45 |
Daily Submissions by Observable Type
Weekly Detected Threats
The following threats were added to Crystal Eye XDR this week:
Threat name: |
GootLoader Malware | ||||||||||||||||||
Gootloader aka Gootkit was originally delivered through spam campaigns and legacy exploit kits. Gootloader operators are increasingly observed using search engine optimization (SEO) poisoning tactics to gain access to victims' environments and initiate multifaceted breaches involving subsequent payloads such as Cobalt Strike and Gootkit. Gootloader poses a significant threat to enterprise environments because it is designed to deliver additional malware. Gootloader operators compromise legitimate infrastructures like WordPress blogs and seed these sites with common keywords. The operators then use SEO techniques to direct anyone who types these keywords into a search engine to a page that entices the user to download a ZIP file containing the initial Gootloader script. Most observed Gootloader campaigns involved initial malicious ZIP files containing the word "contract" in the file name. |
|||||||||||||||||||
Threat Protected: | 01 | ||||||||||||||||||
Rule Set Type: |
|
||||||||||||||||||
Class Type: | Trojan- activity | ||||||||||||||||||
Kill Chain: | Persistence T1574.002- Privilege Escalation T1055/T1574.002- Defense Evasion T1055/T1218.010/T1218.011-Discovery T1082 -Command and Control T1071 |
Threat name: | DolphinCape Malware | ||||||||||||||||||
According to the latest CERT-UA advisory, the new malicious campaign against the state railway transport organization of Ukraine "Ukrzaliznytsia" used a phishing email delivering DolphinCape malware developed with Delphi to targeted users. In this attack, threat actors send out decoy emails that promise to reveal information on how to identify Iran's Shahed-136 drones. The infection chain starts by opening a decoy RAR file attachment that contains a PPSX document with malicious VBScript code. It is designed to generate a scheduled task and decrypt, create, and run a PowerShell script. The hackers use the RC4 encryption algorithm, and a key created by concatenating the value string of the "Manager" attribute and the file name. The malicious PowerShell script will use the BITS component of Microsoft Windows to download DLL and EXE files and create a scheduled task to run the latter using the DLL sideloading technique. The DLL file is identified as DolphinCape malware, which collects information about hostname, username, and operating system version, and exfiltrates other data from infected computers executes EXE and DLL files and displays a list of files and their uploads. DolphinCape malware is also capable of capturing screenshots from target computers. |
|||||||||||||||||||
Threat Protected: | 01 | ||||||||||||||||||
Rule Set Type: |
|
||||||||||||||||||
Class Type: | Trojan-activity | ||||||||||||||||||
Kill Chain: | Initial Access T1566 - Defense Evasion T1218/T1216/T1197 -Execution T1059/T1053 |
Threat name: |
PyPi-NPM CIA Ransomware |
||||||||||||||||||
An ongoing distribution of a CIA-themed ransomware that targets PyPi users has been discovered. Python's 'requests' package has been a target of typosquatting. The threat actor published ransomware binaries written in Golang disguised as a legitimate Python package. It was determined that NPM packages are also being affected. Upon execution of malware, it will immediately change the background screen with a fake message from the CIA and will start encrypting the victim's files. |
|||||||||||||||||||
Threat Protected: | 02 | ||||||||||||||||||
Rule Set Type: |
|
||||||||||||||||||
Class Type: | Trojan-activity | ||||||||||||||||||
Kill Chain: | Initial Access T1189/T1566 - Execution T1106 - Impact T1486 |
Threat name: | BlackMagic Ransomware | ||||||||||||||||||
A ransomware that targets the logistics sector. The threat group exfiltrates their victims' data first then encrypts it. Their ransom notes do not contain any links to where they can be paid, instead, they contain links to where the data is dumped and sold. Upon execution, the malware kills system processes, disables the task manager via registry, gathers information from the system then sends a request to its remote Command-and-Control server. After encryption, it creates a batch file that cleans up its traces and changing the screen background. |
|||||||||||||||||||
Threat Protected: | 01 | ||||||||||||||||||
Rule Set Type: |
|
||||||||||||||||||
Class Type: | Trojan-activity | ||||||||||||||||||
Kill Chain: | Execution T1059 - Defense Evasion T1218 - Command-and-Control T1071 - Impact T1486 |
Threat name: | CHAOS RAT | ||||||||||||||||||
A cryptocurrency mining attack targeting the Linux operating system has recently included the use of an open source remote access trojan known as CHAOS. The RAT alters /etc/crontab file, a UNIX task scheduler that downloads itself every 10 minutes from Pastebin to achieve persistence. Once downloaded and launched, it transmits system metadata to a remote server. It is GO Compiled with capabilities to carry out following operations. |
|||||||||||||||||||
Threat Protected: | 02 | ||||||||||||||||||
Rule Set Type: |
|
||||||||||||||||||
Class Type: | Trojan | ||||||||||||||||||
Kill Chain: | Persistence TA0003 - Privilege Escalation TA0004 - Discovery TA0007 - Command and Control TA0011 |
Threat name: | DEV-1028 botnet | ||||||||||||||||||
A new cross-platform botnet has been found originating from malicious software downloads on Windows devices and succeeds in infecting Linux-based devices like Minecraft servers. The botnet spreads by enumerating default credentials on internet-exposed Secure Shell (SSH)-enabled devices. IoT devices with remote configuration enabled and configured with potentially insecure settings are at risk to attacks like this botnet. The botnet’s spreading mechanism makes it uniquely interesting. While the malware can be removed from the infected source PC, it could persist on unmanaged IoT devices in the network and continue to operate as part of the botnet. |
|||||||||||||||||||
Threat Protected: | 02 | ||||||||||||||||||
Rule Set Type: |
|
||||||||||||||||||
Class Type: | Malware | ||||||||||||||||||
Kill Chain: | Execution TA0002 - Persistence TA0003 - Privilege Escalation TA0004 - Defense Evasion TA0005 - Discovery TA0007 - Command and Control TA0011 |
New Ransomware Victims Last Week: | 45 | ||||||||||||||||||||||||||||||||||||
Red Piranha periodically collects information about organizations hit by ransomwares from different sources including the Dark Web. During the previous week, Red Piranha identified a total of 45 new ransomware victim organizations. One particular group linked to the LockBit 3.0 ransomware tallied the most number of new victims (11), the locations of which are spread across different countries. This is followed by AlphaV and Bianlian groups with 9 and 6 new victims respectively. Victim counts these ransomware groups and a few others are listed below. |
|||||||||||||||||||||||||||||||||||||
Alphv | 9 | ||||||||||||||||||||||||||||||||||||
Bianlian | 6 | ||||||||||||||||||||||||||||||||||||
Blackbasta | 4 | ||||||||||||||||||||||||||||||||||||
Hive | 2 | ||||||||||||||||||||||||||||||||||||
Karakurt | 1 | ||||||||||||||||||||||||||||||||||||
Lockbit3 | 11 | ||||||||||||||||||||||||||||||||||||
Mallox | 1 | ||||||||||||||||||||||||||||||||||||
Play | 6 | ||||||||||||||||||||||||||||||||||||
Ragnarlocker | 1 | ||||||||||||||||||||||||||||||||||||
Royal | 4 | ||||||||||||||||||||||||||||||||||||
If we look the victims as per the country, we can say that USA was once again become the most targeted country by ransomware groups where a total 18 new victims were reported last week followed by India and Japan where 3 new victims each were reported. The number of new ransomware victims per country are listed below:
|
Red Piranha Security Advisory – CVE-2022-37958
Red Piranha recently published an advisory on a newly discovered vulnerability in the SPNEGO, a protocol used between client and server applications (SMB, RDP, etc.) on a Windows environment to negotiate the authentication mechanisms to be used.
The vulnerability was assigned a High severity risk rating as it allows for a Remote-code Execution on successful exploitation.
Red Piranha advisory can be found in the link below:
/news/critical-remote-code-execution-spnego-cve-2022-37958-effects-windows-protocols-rdp-and-smb