Threat Intel Banner
New Threat Detection Added4 (YouTube Bot, GodFather Returns, STRRat Malware, and Drokbk Malware)
New Threat Protections8
Overall Weekly Observables Count2,104,132
New Ransomware Victims Last Week 30


Daily Submissions by Observable Type



Weekly Detected Threats

The following threats were added to Crystal Eye XDR this week:

Threat name:

YouTube Bot Malware

Recently, a new YouTube bot malware was discovered that can watch, like, and comment on YouTube videos. Additionally, it can steal private data from browsers and function as a bot that takes instructions from a command-and-control (C&C) server to carry out additional nefarious deeds. It was created as a 32-bit executable file using the .NET compiler. The malware first determines whether it is running in a managed environment, like VMware or VirtualBox, before executing. To enhance the number of likes, comments, and views on their YouTube videos in this scenario, The Threat Actors (TAs) deploy specially crafted YouTube bots. Additionally, the YouTube bot can harvest passwords, cookies, AutoFill data, and other sensitive information from its victims.

Threat Protected:01
Rule Set Type:

Ruleset

IDS: Action

IPS: Action

Balanced

Reject

Drop

Security

Reject

Drop

WAF

Disabled

Disabled

Connectivity

Alert

Alert

OT

Disabled

Disabled

Class Type:Trojan- activity
Kill Chain:Execution T1204/T1047/T1059 - Persistence T1053 - Privilege Escalation T1055 - Defense Evasion T1036/T1562/T1497 - Credential Access T1003 - Discovery T1057/T1082/T1518 - Collection T1005 - Command-and-Control T1071/T1105


Threat name:

GodFather Malware Returns

GodFather is a well-known Android banking virus that mostly targets consumers in European nations. Recently, multiple Android samples for GodFather that were posing as MYT applications were discovered. The name of this application is MYT Müzik, and it is written in Turkish. As a result, it is believed that this application targets Turkish Android users. After successfully being installed on the victim's device, the GodFather Android virus collects private data like SMSs, basic device information like loaded app data, and the phone number of the device. In addition to these features, it can also route incoming calls from the victim's device, inject banking URLs, and control the device screen using VNC.

Threat Protected:02
Rule Set Type:

Ruleset

IDS: Action

IPS: Action

Balanced

Alert

Alert

Security

Reject

Drop

WAF

Disabled

Disabled

Connectivity

Alert

Alert

OT

Disabled

Disabled

Class Type:Trojan-activity
Kill Chain:Initial Access T1476 - Initial Access T1444 - Execution T1575 - Collection T1513 - Command-and-Control T1436/T1616


Threat name:

STRRat Malware

STRRAT is a Java-based remote access trojan (RAT) that provides threat actors with full remote control of infected Windows endpoints. STRRAT focuses on stealing credentials from browsers and email clients like Microsoft Edge, Google Chrome, Mozilla Firefox, Microsoft Outlook, Mozilla Thunderbird, and Foxmail. It also steals credentials by recording keystrokes of infected endpoints. STRRat also has the capability of mimicking a ransomware attack. No files are encrypted; the malware appends the file - extension “.crimson” while opening Notepad to display a false ransom note.

Threat Protected:03
Rule Set Type:

Ruleset

IDS: Action

IPS: Action

Balanced

Alert

Alert

Security

Reject

Drop

WAF

Disabled

Disabled

Connectivity

Alert

Alert

OT

Disabled

Disabled

Class Type:Trojan-activity
Kill Chain:Discovery TA0007


Threat name:

Drokbk Malware

The Dead Drop Resolver is a technique where a legitimate cloud service is exploited to host the information that points to the command-and-control infrastructure. A recent example is the latest campaign Using Drokbk Malware. Drokbk is deployed post-intrusion alongside other access mechanisms as an additional form of persistence within the victim's environment. The Drokbk dropper checks for the existence of the c:\programdata\SoftwareDistribution directory and creates the directory if it does not exist. The dropper then writes all bytes from an internal resource to c:\users\public\pla. This is a temporary step; the extracted file (pla) is then copied to c:\programdata\SoftwareDistribution\SessionService.exe.

Threat Protected:02
Rule Set Type:

Ruleset

IDS: Action

IPS: Action

Balanced

Alert

Alert

Security

Reject

Drop

WAF

Disabled

Disabled

Connectivity

Alert

Alert

OT

Disabled

Disabled

Class Type:Malware
Kill Chain: Execution TA0002 - Persistence TA0003 - Command-and-Control TA0011


New Ransomware Victims Last Week: 30

Red Piranha regularly collects information about organisations hit by ransomware from different sources, including the Dark Web. During the previous week, Red Piranha identified a total of 30 new ransomware victim organisations from 13 different countries all over the world.

One particular ransomware group named Royal tallied the greatest number of new victims (09), the locations of which are spread across different countries. This is followed by AlphV and Snatch groups with 06 new victims each. Victim counts these ransomware groups, and a few others are listed below.

Alphv6
Bianlian3
Hive1
LockBit3
Play1
RansomHouse1
Royal9
Snatch6


If we look at the victims as per the country, we can say that the USA was once again become the most affected country by ransomware groups where a total of 10 new victims were reported last week followed by Germany and India where 5 and 3 new victims respectively were reported. The number of new ransomware victims per country is listed below:

Bangladesh

1

Canada

2

Colombia

1

Germany

5

India

3

Italy

1

Mexico

1

Portugal

2

Rome

1

Spain

1

Sweden

1

USA

10

Vanuatu

1

      

DOWNLOAD PDF

Details
Date Published
January 03, 2023