New Threat Detection Added | 3 (Patchwork APT, Mustang Panda APT and Vidar Stealer) |
New Threat Protections | 134 |
Due to the recent significant outage at CrowdStrike, threat actors have leveraged this temporary gap in defences to execute phishing attacks. The IoCs below are recently created domains that are used by threat actors to conduct social engineering attacks. Threat actors use these domains to pose as legitimate Crowdstrike support representatives and take advantage of the urgency of the situation.
• crowdstrike-bsod[.]com • crowdstrike0day[.]com • crowdstrikebluescreen[.]com • crowdstrikedoomsday[.]com • crowdstrikedown[.]site • crowdstrikefix[.]com • crowdstriketoken[.]com • crowdstuck[.]org • fix-crowdstrike-apocalypse[.]com | • fix-crowdstrike-bsod[.]com • microsoftcrowdstrike[.]com • whatiscrowdstrike[.]com • crowdfalcon-immed-update[.]com • crowdstrikebsod[.]com • crowdstrikeoutage[.]info• crowdstrike-helpdesk[.]com • crowdstrikeupdate[.]com • crowdstrikereport[.]com | • crowdstrike[.]fail • crowdstrikebug[.]com • crowdstrikedown[.]com • crowdstrikefail[.]com • crowdstrikeoopsie[.]com • isitcrowdstrike[.]com • crowdstrikeclaim[.]com • crowdstrikefix[.]zip • crowdstrikeoutage[.]com |
Weekly Detected Threats
The following threats were added to Crystal Eye XDR this week:
Threat name: | Patchwork APT | ||||||||||||||||||||||||
Patchwork APT, also known as Dropping Elephant or Quilted Tiger, is a cyber espionage group suspected to be of Indian origin. Active since at least 2014, they target high-profile entities in South and Southeast Asia, with a focus on government, defence, and diplomatic organisations. Their primary weapon is social engineering, launching spear phishing campaigns with emails tailored to deceive victims. Once a foothold is gained, Patchwork utilises custom-built tools to steal sensitive data, making them a significant threat in the cyber landscape. Their adaptability is concerning, as they've been observed expanding their targets to other regions and incorporating new techniques like watering hole attacks. | |||||||||||||||||||||||||
Threat Protected: | 13 | ||||||||||||||||||||||||
Rule Set Type: |
| ||||||||||||||||||||||||
Class Type: | Trojan-activity | ||||||||||||||||||||||||
Kill Chain: |
|
Threat name: | Mustang Panda APT | ||||||||||||||||||
Mustang Panda APT, also known as TA416 or Bronze President, is a cyber espionage group believed to be China-based and active since at least 2012. They primarily target governments, NGOs, and religious organisations critical of the Chinese government, with a focus on Southeast Asia, Europe, and the US. Mustang Panda employs a mix of social engineering tactics like spear phishing emails with lures relevant to the target's interests. Once in, they deploy custom malware like PlugX variants to steal sensitive documents and maintain persistence on the system. Their attacks are known for exploiting vulnerabilities in popular software and leveraging legitimate tools for malicious purposes. By staying vigilant about suspicious emails, keeping software updated, and implementing strong password policies, organisations can help defend themselves against Mustang Panda's espionage. | |||||||||||||||||||
Threat Protected: | 17 | ||||||||||||||||||
Rule Set Type: |
| ||||||||||||||||||
Class Type: | Trojan-activity | ||||||||||||||||||
Kill Chain: |
|
Threat name: | Vidar Stealer | |||||||||||||||||||||||||||
Vidar Stealer, lurking since 2018, is a nasty malware operating as Malware-as-a-Service (MaaS). This means it's readily available for purchase by cybercriminals on the dark web. Vidar targets a treasure trove of sensitive data, including login credentials, browsing history, cryptocurrency wallets, and even takes screenshots. Acting like a stealthy thief, it can also download additional malware, potentially ransomware, further compromising the infected system. This adaptability and focus on financial gain make Vidar a popular choice for cybercriminals. Be cautious of suspicious emails and downloads and keep your software up-to-date to avoid falling victim to Vidar's thievery. | ||||||||||||||||||||||||||||
Threat Protected: | 01 | |||||||||||||||||||||||||||
Rule Set Type: |
| |||||||||||||||||||||||||||
Class Type: | Trojan-activity | |||||||||||||||||||||||||||
Kill Chain: |
|
Known exploited vulnerabilities (Week 3 - July 2024)
Threat | CVSS | Description | |
CVE-2024-36401 | 9.8 (Critical) | OSGeo GeoServer GeoTools Eval Injection Vulnerability | |
CVE-2022-22948 | 6.5 (Medium) | VMware vCenter Server Incorrect Default File Permissions Vulnerability | |
CVE-2024-28995 | 8.6 (High) | SolarWinds Serv-U Path Traversal Vulnerability | |
CVE-2024-34102 | 9.8 (Critical) | Adobe Commerce and Magento Open Source Improper Restriction of XML External Entity Reference (XXE) Vulnerability |
For more information, please visit the Red Piranha Forum:
https://forum.redpiranha.net/t/known-exploited-vulnerabilities-catalog-3rd-week-of-july-2024/488
Updated Malware Signatures (Week 3 - July 2024)
Threat | Description | |
CoinMiner | This malicious software installs and runs cryptocurrency mining applications. | |
Trojan Miner | This malicious software installs and runs cryptocurrency mining applications. | |
Lumma Stealer | A type of malware classified as an information stealer. Its primary purpose is to steal sensitive information from infected systems, including but not limited to credentials, financial information, browser data, and potentially other personal or confidential information. |
Ransomware Report | |
The Red Piranha Team actively collects information on organisations globally affected by ransomware attacks from various sources, including the Dark Web. In the past week alone, our team uncovered new ransomware victims and updates on previous victims across 18 industries spanning 23 countries. This underscores the widespread and indiscriminate impact of ransomware attacks, emphasising their potential to affect organisations of varying sizes and sectors worldwide. LockBit3.0 ransomware group stands out as the most prolific, having updated a significant number of victims (18%) distributed across multiple countries. In comparison, Ransomhub ransomware updated 10% of victims, in the past week. The following list provides the victim counts in percentages for these ransomware groups and a selection of others. | |
Name of Ransomware Group | Percentage of new Victims last week |
Abyss-Data | 0.96% |
Akira | 1.92% |
Arcus Media | 0.96% |
Bianlian | 1.92% |
Black Suit | 1.92% |
Blackbasta | 3.85% |
Blackbyte | 0.96% |
Blackout | 0.96% |
Cactus | 1.92% |
Cicada3301 | 0.96 % |
Donutleaks | 2.88% |
Dragonforce | 0.96% |
Dunghill | 0.96% |
Everest | 1.92% |
Fog | 6.73% |
Handala | 1.92% |
Hunters | 8.65% |
Inc Ransom | 3.85% |
18.27% | |
Mad Liberator | 4.81% |
Mallox | 1.92% |
Meow | 7.69% |
Nullbulge | 2.88% |
1.92% | |
Qilin | 0.96% |
Ransomcortex | 0.96% |
Ransomexx | 0.96% |
Ransomhouse | 0.96% |
Ransomhub | 10.58% |
Rhysida | 2.88% |
Space Bears | 0.96% |
Meow Ransomware
First detected in the wild around August 2022, Meow Ransomware quickly established itself as a cunning adversary in the cybercrime landscape. This feline-themed malware utilises a double extortion tactic, crippling victims by encrypting their data and threatening to leak it on the dark web if ransom demands aren't met. While the exact origins of Meow Ransomware remain shrouded in some mystery, security researchers believe it may be linked to a cybercriminal group previously operating under names like MeowCorp, MeowLeaks, or simply Meow. This group initially leveraged the LockBit ransomware strain, but Meow Ransomware itself appears to be a distinct evolution with its own set of characteristics.
Tactics, Techniques, and Procedures (TTPs):
Meow Ransomware doesn't rely on brute force alone. It possesses a diverse arsenal of tactics, techniques, and procedures (TTPs) to infiltrate and compromise systems, showcasing a level of planning and strategy. Here's a glimpse into its malicious toolkit:
- Phishing Attacks: Deceptive emails designed to trick users into clicking malicious links or downloading infected attachments are a common entry point. These emails may appear to be playful or lighthearted, leveraging the "Meow" theme to disguise their malicious intent. They can appear to be from colleagues, delivery companies, or even greetings for special occasions.
- Exploiting Unpatched Vulnerabilities: Meow actively seeks out unpatched vulnerabilities in software and operating systems to gain unauthorised access to networks. This underscores the importance of keeping all software and systems updated with the latest security patches.
- Remote Desktop Protocol (RDP) Exploitation: Similar to other ransomware strains, Meow can exploit weaknesses in RDP configurations to gain access to a system. RDP allows remote access to a computer, and misconfigured settings can create a vulnerability for attackers.
- Living-off-the-Land Techniques: Like many malware strains, Meow can utilise legitimate system administration tools for malicious purposes. This makes detection more challenging as these tools may appear as normal system activity. Read more on LOTL Techniques.
- Data Exfiltration: Before encryption, Meow often exfiltrates sensitive data like financial records, personal information, and intellectual property. This stolen data serves as additional leverage in extortion attempts, putting pressure on victims to pay the ransom.
- Strong Encryption: The malware utilises robust encryption algorithms to render files inaccessible. Decrypting them without the attacker's key is extremely difficult, if not impossible. This effectively cripples a victim's operations until a decision is made.
- Data Leak Site: Meow maintains a data leak site on the dark web where they list victims who haven't paid the ransom. This serves as a public shaming tactic and adds pressure on compromised organisations.
A Global Reach with Focused Targets
Meow Ransomware demonstrates a global reach, targeting victims worldwide. Here are some examples of its operations and the impact it has caused:
- Focus on Small and Medium Businesses (SMBs): Security researchers have observed a trend of Meow targeting SMBs. These organisations may have less robust cybersecurity measures compared to larger enterprises, making them more vulnerable to attack.
- Critical Infrastructure Concerns: Despite its playful facade, there have been concerns about Meow targeting critical infrastructure sectors like power grids or transportation systems. A successful attack on such infrastructure could have devastating consequences.
Ransom Note: The encrypted files bore the “.MEOW” extension, and the ransom note was named “readme.txt.