New Threat Detection Added | 2 (Zloader Malware and CHM Stealer) |
New Threat Protections | 115 |
Weekly Detected Threats
The following threats were added to Crystal Eye XDR this week:
Threat name: | Zloader Malware | ||||||||||||||||||||||||
Zloader is a sophisticated banking trojan that has evolved from the infamous Zeus malware Known for its modular architecture and adaptability, Zloader targets financial institutions and individuals by stealing banking credentials, online payment information, and personal data. It employs various techniques to evade detection, including obfuscation, anti-analysis measures, and polymorphic capabilities. This malware has been linked to significant financial losses and has become a persistent threat to both individuals and organisations. | |||||||||||||||||||||||||
Threat Protected: | 13 | ||||||||||||||||||||||||
Rule Set Type: |
| ||||||||||||||||||||||||
Class Type: | Trojan-activity | ||||||||||||||||||||||||
Kill Chain: |
|
Threat name: | CHM Stealer | |||||||||||||||||||||
CHM Stealer is a type of malware that leverages Compiled HTML Help (CHM) files as a delivery mechanism. These files, often used for documentation, can be weaponised to contain malicious scripts or payloads. Once executed, CHM Stealers can steal sensitive information such as login credentials, browser data, and personal files. These threats are typically distributed through phishing emails or malicious downloads, enticing victims to open the CHM file. Due to their common file format and potential to bypass security measures, CHM Stealers pose a significant risk to unsuspecting users. | ||||||||||||||||||||||
Threat Protected: | 01 | |||||||||||||||||||||
Rule Set Type: |
| |||||||||||||||||||||
Class Type: | Trojan-activity | |||||||||||||||||||||
Kill Chain: |
|
Known exploited vulnerabilities (Week 1 - August 2024)
Threat | CVSS | Description | |
CVE-2023-45249 | 9.8 (Critical) | Acronis Cyber Infrastructure (ACI) Insecure Default Password Vulnerability | |
CVE-2024-5217 | 9.2 (Critical) | ServiceNow Incomplete List of Disallowed Inputs Vulnerability | |
CVE-2024-4879 | 9.8 (Critical) | ServiceNow Improper Input Validation Vulnerability | |
CVE-2024-37085 | 7.2 (High) | VMware ESXi Authentication Bypass Vulnerability |
For more information, please visit the Red Piranha Forum:
https://forum.redpiranha.net/t/known-exploited-vulnerabilities-catalog-1st-week-of-august-2024/493
Updated Malware Signatures (Week 1 - August 2024)
Threat | Description | |
HawkEye | A trojan and keylogger used to steal various account credentials | |
Nanocore | The Nanocore trojan, built on the .NET framework, has been the subject of multiple source code leaks, resulting in its widespread accessibility. Like other remote access trojans (RATs), Nanocore empowers malicious actors with complete system control, enabling activities such as video and audio recording, password theft, file downloads, and keystroke logging. | |
Lumma Stealer | A type of malware classified as an information stealer. Its primary purpose is to steal sensitive information from infected systems, including but not limited to credentials, financial information, browser data, and potentially other personal or confidential information. | |
Remcos | Remcos functions as a remote access trojan (RAT), granting unauthorised individuals the ability to issue commands on the compromised host, record keystrokes, engage with the host's webcam, and take snapshots. Typically, this malicious software is distributed through Microsoft Office documents containing macros, which are often attached to malicious emails. |
Ransomware Report | |
The Red Piranha Team actively collects information on organisations globally affected by ransomware attacks from various sources, including the Dark Web. In the past week alone, our team uncovered new ransomware victims and updates on previous victims across 19 industries spanning 12 countries. This underscores the widespread and indiscriminate impact of ransomware attacks, emphasising their potential to affect organisations of varying sizes and sectors worldwide. Dispossessor ransomware group stands out as the most prolific, having updated a significant number of victims (26%) distributed across multiple countries. In comparison, Ransomhub ransomware updated 15% of victims, in the past week. The following list provides the victim counts in percentages for these ransomware groups and a selection of others. | |
Name of Ransomware Group | Percentage of new Victims last week |
Abyss-Data | 1.72% |
Akira | 8.62% |
Bianlian | 3.45% |
Black Suit | 5.17% |
Cactus | 10.34% |
Cicada330 | 1.72% |
Darkvault | 1.72% |
Dispossessor | 25.86% |
Fog | 1.72% |
Killsec | 3.45% |
Metaencryptor | 1.72% |
Qilin | 5.17% |
Ra Group | 1.72% |
Ransomhub | 15.52% |
Rhysida | 5.17% |
Space Bears | 5.17% |
Stormous | 1.72% |
Dispossessor Ransomware
Emerging in late 2022, Dispossessor ransomware quickly made its mark as a formidable threat in the cybersecurity landscape. This malicious software employs a double extortion tactic, encrypting victims' data and threatening to leak it on the dark web unless a ransom is paid. While the exact origins of Dispossessor remain shrouded in mystery, security researchers believe it may be linked to a cybercriminal group operating out of Eastern Europe. This group's previous activities suggest a level of sophistication in malware development and deployment, making Dispossessor a particularly dangerous adversary.
TTPs:
Dispossessor ransomware doesn't rely solely on brute force. It possesses a diverse arsenal of tactics, techniques, and procedures (TTPs) to infiltrate and compromise systems stealthily. Here's a glimpse into its malicious toolkit:
- Phishing Attacks: Deceptive emails designed to trick users into clicking malicious links or downloading infected attachments are a common entry point. These emails often mimic legitimate business communications, making them more likely to be clicked.
- Exploiting Vulnerabilities: Dispossessor actively seeks out unpatched vulnerabilities in software and operating systems to gain unauthorised access to networks. This underscores the importance of keeping all software and systems updated with the latest security patches.
- Supply Chain Attacks: Dispossessor has shown a preference for targeting supply chains, compromising vendors and suppliers to gain access to a wider network of victims. This tactic allows attackers to reach a larger number of victims with a single intrusion.
- Living-off-the-Land Techniques: Like many malware strains, Dispossessor can utilise legitimate system administration tools for malicious purposes. This makes detection more challenging as these tools may appear as normal system activity.
- Data Exfiltration: Before encryption, Dispossessor often exfiltrates sensitive data like financial records, personal information, and intellectual property. This stolen data serves as additional leverage in extortion attempts, putting pressure on victims to pay the ransom.
- Strong Encryption: The malware utilises robust encryption algorithms to render files inaccessible. Decrypting them without the attacker's key is extremely difficult, if not impossible. This effectively cripples a victim's operations until a decision is made.
Data Leak Site: Dispossessor maintains a data leak site on the dark web where they list victims who haven't paid the ransom. This serves as a public shaming tactic and adds pressure on compromised organisations.