New Threat Detection Added | 6 (SpyMax, Amadey Bot Malware, Titan Stealer Malware, STOP/DJVU ransomware, Ice Breaker APT, and GCleaner Malware) |
New Threat Protections | 15 |
Overall Weekly Observables Count | 2,084,946 |
New Ransomware Victims Last Week | 52 |
Daily Submissions by Observable Type
Weekly Detected Threats
The following threats were added to Crystal Eye XDR this week:
Threat name: | SpyMax | ||||||||||||||||||
A powerful form of Android malware known as SpyMax is in the highlight trying to steal bank details and passwords, as well as social media pages. The latest version of the SpyMax has been openly directed at banking apps. SpyMax typically masquerades as a legitimate banking app as a part of the phishing attack, drawing users into downloading fake versions that install straight onto their Android devices. The app presents a bogus login page that looks identical to the bank's login, and using a keylogger, tracks the usernames and passwords entered. After installation the malware escalates itself to gain admin privileges, making it a task for the users to uninstall it. | |||||||||||||||||||
Threat Protected: | 02 | ||||||||||||||||||
Rule Set Type: |
| ||||||||||||||||||
Class Type: | Malware | ||||||||||||||||||
Kill Chain: | Initial Access T1566 - Privilege Escalation T1548 - Credential Access T1056 - Command-and-Control T1071 |
Threat name: | Amadey Bot Malware | ||||||||||||||||||
The Amadey bot is a Trojan that is used to steal private data from infected devices. It was first identified in 2018. It was initially discovered to be distributed through exploit kits, and Threat Actors (TAs) used it to spread malware like the Flawed Ammyy Remote Access Trojan and the GrandCrab ransomware. LOCKBIT affiliates used the Amadey bot in 2022 to spread ransomware to the victims. The appearance and functionality of bots have significantly improved in recent years. | |||||||||||||||||||
Threat Protected: | 01 | ||||||||||||||||||
Rule Set Type: |
| ||||||||||||||||||
Class Type: | Trojan-activity | ||||||||||||||||||
Kill Chain: | Execution T1204/T1059/T1218/T1047/T1106 - Persistence T1547/T1053 - Defence Evasion T1027/T1497 - Credential Access T1003/T1552/T1552/T1056 - Discovery T1082/T1518/T1083/T1087 - Collection T1005/T1213 - Command-and-Control T1071/T1095 |
Threat name: | Titan Stealer | ||||||||||||||||||
One such malware, known as Titan Stealer, was recently discovered by researchers. The numerous Command-and-Control (C&C) infrastructures connected to this Stealer's attack on new victims were also found. A recent example of TAs using Golang is Titan Stealer. There were 94 entries in the panel, which suggests that the malware may have infected several systems and may have activated multiple Command-and-Control servers. A system's IP address, country, city, username, screen size, CPU model name, threads, and GPU are all extracted by Titan Stealer. The stealer searches the victim's computer for various cryptocurrency wallets. The related files are taken and sent to the C&C server if the stealer is able to identify the wallets installed on the victim's computer. The stealer first checks wallets and then scans the system for installed software before sending a list of that software to its C&C server. The hacker then looks for installed web browsers to extract various browser data, including passwords, session cookies, autofill, and more. Text and document files that are on the computer are listed and taken by the stealer. The stealer now targets FTP clients and steals FTP server credentials from FileZilla and GHISLER. Along with enumerating and grabbing text and document files, the thief also targets and steals stored Telegram data. The data thief then zips up the stolen information, turns it into a Base64-encoded string, and sends it to its Command-and-Control server. | |||||||||||||||||||
Threat Protected: | 01 | ||||||||||||||||||
Rule Set Type: |
| ||||||||||||||||||
Class Type: | Trojan-activity | ||||||||||||||||||
Kill Chain: | Execution T1204 - Credential Access T1003/T1552 - Discovery T1082/T1518/T1083/T1087 - Collection T1005 - Command-and-Control T1071/T1095 |
Threat name: | STOP/DJVU ransomware | ||||||||||||||||||
The DJVU variants include several layers of obfuscation, which aim to slow verification by researchers as well as automated analysis tools. STOP/DJVU uses RSA encryption, one of the most commonly used ransomware groups, focusing on Windows operating systems. STOP/Djvu infection can happen through multiple approaches - Pirate software and torrents, Fake .exe, Malicious scripts or Spam. The ransomware has no pre-set infection method which makes it even harder to detect the initial sign of compromise. | |||||||||||||||||||
Threat Protected: | 01 | ||||||||||||||||||
Rule Set Type: |
| ||||||||||||||||||
Class Type: | Trojan-activity | ||||||||||||||||||
Kill Chain: | Persistence TA0003 - Boot or Logon Autostart Execution T1547 - Privilege Escalation TA0004 - Data Encrypted for Impact T1485 - System Information Discovery T1082 - Process Injection T1055 |
Threat name: | Ice Breaker APT | ||||||||||||||||||
A recently tracked threat actor dubbed as Ice Breaker has been targeting the online gaming/casino industry. The context of their social engineering attack is that the threat actors would falsely request technical support from the casino/gaming representative. Upon initial conversation, the threat actor would send links to the LNK/Zipped images of their supposed issue. Upon successful execution of the files from the victim, credentials will be harvested, and a shell will be opened for the next series of attacks. | |||||||||||||||||||
Threat Protected: | 06 | ||||||||||||||||||
Rule Set Type: |
| ||||||||||||||||||
Class Type: | Trojan-activity | ||||||||||||||||||
Kill Chain: | Initial Access T1566 - Execution T1059/T1204 - Persistence T1547 - Defence Evasion T1218 - Command-and-Control T1071 |
Threat name: | GCLeaner Malware | ||||||||||||||||||
GCleaner is a trojan malware that disguises itself as a system/cache cleaner and even a file recovery software for computers. It claims to clean a computer's cache, delete unnecessary files, clean out disk storage, etc. However, GCleaner has been exposed as a Pay-per-Install malware where they sell access to their victims' computers to drop other types of malware. In essence, the threat actors behind GCleaner would sell their victims' computers to other threat actors. Hence, it is observed that different types of malware are discovered on computers that have a GCleaner installation. Malware such as Redline, SmokeLoader, RacoonStealer are just some of the ones that are dropped. | |||||||||||||||||||
Threat Protected: | 04 | ||||||||||||||||||
Rule Set Type: |
| ||||||||||||||||||
Class Type: | Trojan-activity | ||||||||||||||||||
Kill Chain: | Initial Access T1189 - Execution T1059 - Discovery T1012/T1082 - Command-and-Control T1102 |
New Ransomware Victims Last Week: | 52 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Red Piranha regularly collects information about organizations hit by ransomware from different sources including the Dark Web. During the previous week, Red Piranha identified a total of 52 new ransomware victim organizations in 22 different countries all over the world. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
AlphV | 4 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
bianlian | 1 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
LockBit3.0 | 39 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Play | 1 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Royal | 4 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
vicesociety | 3 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|