New Threat Detection Added | 6 (Dalbit APT, Frebniis Backdoor, NewsPenguin, MalVirt malware, SparkRAT, and SHARPEXT) |
New Threat Protections | 9 |
Overall Weekly Observables Count | 2,208,222 |
New Ransomware Victims Last Week | 84 |
Daily Submissions by Observable Type
Weekly Detected Threats
The following threats were added to Crystal Eye XDR this week:
Threat name: | Dalbit APT | ||||||||||||||||||
Dalbit is a threat actor group recently discovered to have targeted Korean organisations. Their usual tactic is to target SQL and Web Servers with exploits to upload web shells. Through these web shells, additional tools such as binaries for privilege escalation, proxy tools, and scanning tools are downloaded. Upon initial foothold, FRP (Fast Reverse Proxy) is deployed to connect back to their Command-and-Control server or another victim's server via RDP. It appears that the end goal is to eventually deploy ransomware on their victims. | |||||||||||||||||||
Threat Protected: | 02 | ||||||||||||||||||
Rule Set Type: |
| ||||||||||||||||||
Class Type: | Trojan-activity | ||||||||||||||||||
Kill Chain: | Initial Access T1190 - Execution T1059 - Command-and-Control T1105 |
Threat name: | Frebniis Backdoor | ||||||||||||||||||
Frebniis is a newly observed malware that abuses IIS to deploy a backdoor onto systems. The threat actor or group behind this is still unknown and no attribution has been made yet. Microsoft's IIS feature (iisfreb.dll) used to troubleshoot web requests is injected with a malicious code. This code allows the malware to monitor HTTP requests and recognize specially formatted HTTP requests allowing for remote code execution. However, the attacker needs to gain access to the actual target by other means. | |||||||||||||||||||
Threat Protected: | 02 | ||||||||||||||||||
Rule Set Type: |
| ||||||||||||||||||
Class Type: | Trojan-activity | ||||||||||||||||||
Kill Chain: | Execution T1559/T1129 |
Threat name: | NewsPenguin | ||||||||||||||||||
A new cyber threat actor, NewsPenguin, has been discovered targeting organisations in Pakistan using a sophisticated method of payload delivery. The attacker is using a targeted phishing campaign with a weaponized document, disguised as an exhibitor manual for the upcoming Pakistan International Maritime Expo & Conference (PIMEC-2023), to trick their victims. The document contains embedded malicious VBA macro code, which leads to the final payload execution. The final payload is an advanced espionage tool encrypted with a unique "penguin" encryption key. | |||||||||||||||||||
Threat Protected: | 02 | ||||||||||||||||||
Rule Set Type: |
| ||||||||||||||||||
Class Type: | Trojan-activity | ||||||||||||||||||
Kill Chain: | Initial Access T1566.001 - Execution T1204.002, T1059.005, T1059.003, T1203, T1047, T1059.001, T1559.001 - Privilege Escalation T1055, T1055.002- Defence Evasion T1480, T1221, T1027, T1140, T1070.004, T1564.001, T1221, T1112, T1036 - Command-and-Control T1105, T1071.001, T1132.001, T1573.001 - Exfiltration T1041, T1029 - Discovery 1083, T1057, T1082, T1497.003 |
Threat name: | MalVirt malware | ||||||||||||||||||
Researchers have discovered a new cluster of virtualised malware loaders called MalVirt, which utilises the KoiVM virtualizing protector for obfuscating their implementation and execution. They distribute payloads that include the Formbook family of infostealer malware, with an unusual amount of applied anti-analysis and anti-detection techniques. The use of alternative malware distribution methods, such as malvertising and ISO files, is on the rise, as Office macros in documents from the Internet are blocked by Microsoft. The Formbook family is a feature-rich infostealer malware that is used by threat actors with cybercrime motivations but has also been observed in attacks with potentially political motivations. The intricate loader suggests an attempt to co-opt cybercriminal distribution methods to load more targeted second-stage malware onto specific victims after initial validation. | |||||||||||||||||||
Threat Protected: | 01 | ||||||||||||||||||
Rule Set Type: |
| ||||||||||||||||||
Class Type: | Trojan-activity | ||||||||||||||||||
Kill Chain: | Initial Access T1543.003/T1547.001/T1547.008/T1574.002 - Privilege Escalation T1055/T1543.003 /T1547.001 - Defence Evasion T1112/T1497 - Credential Access T1003/T1056 - Discovery T1012/T1057 - Collection T1005/T1056/T1114 - Command-and-Control T1071/T1095 |
Threat name: | SparkRAT | ||||||||||||||||||
A Chinese-speaking hacking group tracked as ‘DragonSpark’ was observed employing Golang source code interpretation to evade detection while launching espionage attacks against organisations in East Asia. It has been observed that the intrusion vector is vulnerable to MySQL database servers exposed online. The threat actors access vulnerable MySQL and web server endpoints by deploying web shells through SQL injection, cross-site scripting, or web server vulnerabilities. Then, the attackers deploy SparkRAT, a Golang-based open-source tool that can run on Windows, macOS, and Linux, offering feature-rich remote access functionality. SparkRAT uses the WebSocket protocol to communicate with the C2 server, and can automatically upgrade itself, constantly adding new features. | |||||||||||||||||||
Threat Protected: | 01 | ||||||||||||||||||
Rule Set Type: |
| ||||||||||||||||||
Class Type: | Trojan | ||||||||||||||||||
Kill Chain: | Initial Access T1566.001- Execution T1204.002 – Command-and-Control T1071 - Impact T1565 |
Threat name: | SHARPEXT | ||||||||||||||||||
SHARPEXT is a malicious browser extension deployed by SharpTongue following the successful compromise of a target system. In the first versions of SHARPEXT investigated by Volexity, the malware only supported Google Chrome. The latest version (3.0 based on the internal versioning) supports three browsers: - Chrome, Edge, Whale Prior to deploying SHARPEXT, the attacker manually exfiltrates the files required to install the extension (explained below) from the infected workstation. SHARPEXT is then manually installed by an attacker-written VBS script. | |||||||||||||||||||
Threat Protected: | 01 | ||||||||||||||||||
Rule Set Type: |
| ||||||||||||||||||
Class Type: | Malware | ||||||||||||||||||
Kill Chain: | Initial Access T1566 - Execution T1204 – Command-and-Control T1071 - Impact T1565 |
New Ransomware Victims Last Week: | 84 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Red Piranha regularly collects information about organisations hit by ransomware from different sources including the Dark Web. During the previous week, Red Piranha identified a total of 84 new ransomware victim organisations from 26 different countries all over the world. One particular ransomware group named LockBit3.0 tallied the greatest number of new victims (38), the locations of which are spread across different countries. This is followed by Medusa groups who hit 14 new victims. Victim counts these ransomware groups, and a few others are listed below. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Name of Ransomware Group | No of new Victims last week | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
0mega | 1 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
AlphV | 5 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Avoslocker | 9 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Bianlian | 4 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
BlackByte | 1 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Daixin | 1 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
LockBit3.0 | 38 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Mallox | 3 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Medusa | 14 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Play | 2 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ransomhouse | 1 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Royal | 4 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
V is vendetta | 1 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|