New Threat Detection Added | 3 (DarkIRC Bot, BlackTech APT and ownCloud Vulnerabilities (CVE-2023-41093 - CVE-2023-49105)) |
New Threat Protections | 9 |
New Ransomware Victims Last Week | 96 |
Weekly Detected Threats
The following threats were added to Crystal Eye XDR this week:
Threat name: | DarkIRC Bot | ||||||||||||||||||
DarkIRC is a versatile botnet reported recently in the wild. It functions as a browser stealer, keylogger, and can even execute distributed denial-of-service attacks. This malicious tool also operates as a bitcoin clipper, altering bitcoin wallet addresses to steal transactions. In one campaign, it targets vulnerable WebLogic servers via an “HTTP GET” request, executing a PowerShell script to download a binary file. DarkIRC avoids virtual environments from VMware, VirtualBox, and others, using anti-sandbox tactics. Upon infiltration, it persists by installing within a Chrome file, enabling autorun commands for continued operation. | |||||||||||||||||||
Threat Protected: | 02 | ||||||||||||||||||
Rule Set Type: |
| ||||||||||||||||||
Class Type: | Trojan-activity | ||||||||||||||||||
Kill Chain: | Execution T1047/T1059/T1129 - Privilege Escalation T1134 - Defence Evasion T1027/T1036/T1134/T1497 - Credential Access T1003/T1056 - Discovery T1010/T1012/T1018/T1033 - Collection T1005/T1056/T1115 - Command-and-Control T1071/T1095/T1102 - Impact T1529 |
Threat name: | BlackTech APT | ||||||||||||||||||
BlackTech, a cyber espionage group focused on East Asia, particularly Taiwan, Japan, and Hong Kong, is driven by the goal of stealing technology from its targets. Analysing their tactics revealed a common thread connecting three seemingly unrelated campaigns: PLEAD, Shrouded Crossbow, and Waterbear. PLEAD, active since 2012, specialises in information theft, targeting Taiwanese government agencies and private organisations. Their toolset includes the PLEAD backdoor and DRIGO exfiltration tool, delivered through spear-phishing emails. PLEAD actors employ a router scanner to identify vulnerable routers, enabling them to establish virtual servers for command-and-control or malware delivery. | |||||||||||||||||||
Threat Protected: | 02 | ||||||||||||||||||
Rule Set Type: |
| ||||||||||||||||||
Class Type: | Trojan-activity | ||||||||||||||||||
Kill Chain: | Defence Evasion T1027/T1497 - Credential Access T1056 - Discovery T1012/T1018/T1082/T1497 - Collection T1056 - Command-and-Control T1071/T1095/T11573 |
Threat name: | ownCloud Vulnerabilities (CVE-2023-41093 - CVE-2023-49105) | ||||||||||||||||||
The ownCloud graphapi is susceptible to an information disclosure vulnerability, which could expose sensitive data stored in phpinfo() through GetPhpInfo.php, potentially revealing administrative credentials. An issue was discovered in ownCloud owncloud/core before 10.13.1. An attacker can access, modify, or delete any file without authentication if the username of a victim is known, and the victim has no signing-key configured. This occurs because pre-signed URLs can be accepted even when no signing-key is configured for the owner of the files. The earliest affected version is 10.6.0. | |||||||||||||||||||
Threat Protected: | 05 | ||||||||||||||||||
Rule Set Type: |
| ||||||||||||||||||
Class Type: | Trojan-activity | ||||||||||||||||||
Kill Chain: | Initial Access T1190 |
Known exploited vulnerabilities (Week 1 - December 2023)
Threat | Description | |
CVE-2023-42917 | Apple Multiple Products WebKit Memory Corruption Vulnerability | |
CVE-2023-42916 | Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability | |
CVE-2023-33107 | Qualcomm Multiple Chipsets Integer Overflow Vulnerability | |
CVE-2023-33106 | Qualcomm Multiple Chipsets Use of Out-of-Range Pointer Offset Vulnerability | |
CVE-2023-33063 | Qualcomm Multiple Chipsets Use-After-Free Vulnerability | |
CVE-2022-22071 | Qualcomm Multiple Chipsets Use-After-Free Vulnerability | |
CVE-2023-41266 | Qlik Sense Path Traversal Vulnerability | |
CVE-2023-41265 | Qlik Sense HTTP Tunneling Vulnerability |
Updated Malware Signatures (Week 1 - Dcember 2023)
Threat | Description | |
Remcos | Remcos functions as a remote access trojan (RAT), granting unauthorised individuals the ability to issue commands on the compromised host, record keystrokes, engage with the host's webcam, and take snapshots. Typically, this malicious software is distributed through Microsoft Office documents containing macros, which are often attached to malicious emails. | |
Zeus | Also known as Zbot and is primarily designed to steal banking credentials. | |
Glupteba | A malware dropper that is designed to download additional malware on an infected machine. | |
Vidar | A stealer designed to collect sensitive data from infected machines. It usually targets Windows-based machines and is spread through email attachments or downloads from compromised websites. | |
Bifrost | A remote access trojan that enables its operator to take control of a victim machine and steal data. It is usually distributed through spam and phishing emails. | |
CoinMiner | This malicious software installs and runs cryptocurrency mining applications. |
New Ransomware Victims Last Week: | 96 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Red Piranha proactively gathers information about organisations impacted by ransomware attacks through various channels, including the Dark Web. In the past week, our team identified a total of 96 new ransomware victims or updates in few past victims from 20 distinct industries across 20 countries worldwide. This highlights the global reach and indiscriminate nature of ransomware attacks, which can affect organisations of all sizes and sectors. LockBit3.0 ransomwares, has affected the largest number of 19 victims’ updates spread across various countries. Play and Alphv ransomware groups updated 13 and 9 new victims respectively. Below are the victim counts (%) for these ransomware groups and a few others. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Name of Ransomware Group | Percentage of new Victims last week | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
3Am | 2.08% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
8Base | 5.21% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Abyss-Data | 1.04% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Akira | 6.25% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Alphv | 9.38% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Bianlian | 4.17% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Black Suit | 3.13% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Blackbasta | 2.08% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Cactus | 2.08% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Cloak | 7.29% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Dunghill | 1.04% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Hunters | 1.04% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Inc Ransom | 2.08% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Lockbit3 | 19.79% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Medusa | 5.21% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Metaencryptor | 2.08% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Monti | 2.08% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
NoEscape | 2.08% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Play | 13.54% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Qilin | 4.17% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ransomware Blog | 1.04% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rhysida | 2.08% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Snatch | 1.04% | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||