New Threat Detection Added | 4 (RisePro Stealer, DoubleFinger Malware, Jockerspy, and GravityRAT) |
New Threat Protections | 9 |
New Ransomware Victims Last Week | 132 |
Weekly Detected Threats
The following threats were added to Crystal Eye XDR this week:
Threat name:
|
RisePro Stealer | ||||||||||||||||||
RisePro Stealer, closely resembling Vidar, is an insidious information-stealing malware that operates by collecting sensitive data and exporting it in log format. Developed using C++ programming language, RisePro is commonly distributed through PrivateLoader, a malware downloader. The creators of this malicious software have resorted to selling it on the popular messaging platform Telegram. Primarily, cybercriminals exploit information stealers like RisePro to extract valuable credentials such as usernames, passwords, credit card details, social security numbers, and ID card information. One prevalent technique employed by stealers involves keylogging, which records keyboard inputs. Infections often commence when victims unknowingly download the PrivateLoader malware, typically facilitated through malicious email links or attachments, counterfeit software updates, pirated/cracked software pages, P2P networks, third-party downloaders, or free file hosting sites. Various file formats, including malicious MS Office and PDF documents, ISO files, archives like ZIP or RAR, executables, and JavaScript files, are employed by threat actors to disseminate this malware. |
|||||||||||||||||||
Threat Protected:
|
04 | ||||||||||||||||||
Rule Set Type:
|
|
||||||||||||||||||
Class Type:
|
Trojan-activity | ||||||||||||||||||
Kill Chain:
|
Initial Access T1476/T1444 - Collection T1432/T1412/T1512/T1513 - Discovery T1418 |
Threat name: | DoubleFinger Malware | ||||||||||||||||||
Researchers have uncovered a sophisticated attack leveraging the DoubleFinger loader, accompanied by the cryptostealer GreetingGhoul and the remote-access Trojan Remcos. This multistage attack, resembling an advanced persistent threat (APT), begins with a malicious PIF file delivered via email. The stages of the attack involve executing shellcodes, downloading encrypted components from Imgur.com, bypassing security software, and replacing legitimate processes. The final payload, GreetingGhoul, steals cryptocurrency wallet data and intercepts user input, allowing cybercriminals to gain control and withdraw funds. Additionally, some variations of DoubleFinger install the remote access Trojan Remcos, granting complete surveillance and control over the compromised system. This attack demonstrates a high level of technical sophistication and poses a significant threat to victims' digital assets and privacy. |
|||||||||||||||||||
Threat Protected:
|
03 | ||||||||||||||||||
Rule Set Type:
|
|
||||||||||||||||||
Class Type:
|
Trojan-activity | ||||||||||||||||||
Kill Chain:
|
Execution TA0002/T1204 - Persistence T1547 - DefenCe Evasion TA0005/T1070 |
Threat name: | Jockerspy | ||||||||||||||||||
Jockerspy malware is a highly sophisticated and malicious form of spyware that poses significant threats to individuals and organisations alike. By infiltrating computer systems through various delivery mechanisms, such as malicious email attachments or compromised websites, Jockerspy establishes its presence and employs persistence techniques to evade detection. Once active, it establishes communication with its command-and-control infrastructure to receive instructions and transmit stolen data. With its extensive information-gathering capabilities, remote control functionality, and data exfiltration techniques, Jockerspy enables attackers to monitor activities, access files, and exfiltrate sensitive information. Its ability to propagate within networks further amplifies its potential for widespread damage. Understanding the operational intricacies of Jockerspy is crucial for implementing effective cybersecurity measures to protect against this potent threat. |
|||||||||||||||||||
Threat Protected:
|
01 | ||||||||||||||||||
Rule Set Type:
|
|
||||||||||||||||||
Class Type:
|
Trojan | ||||||||||||||||||
Kill Chain:
|
Persistence TA0003 - Privilege Escalation TA0004 - Defence Evasion TA0005 - Discovery TA0007 - Command-and-Control TA0011 |
Threat name: | GravityRAT | ||||||||||||||||||
GravityRAT is a highly advanced and sophisticated remote access Trojan (RAT) that poses a significant threat in the world of cybersecurity. Known for its stealthy capabilities and targeted attacks, GravityRAT enables remote control and surveillance of infected systems, allowing attackers to gain unauthorised access, steal sensitive information, and execute malicious commands. With its ability to evade detection, propagate within networks, and gather intelligence, GravityRAT poses a serious risk to individuals, organisations, and even governments, highlighting the need for robust cybersecurity measures to combat this formidable malware. |
|||||||||||||||||||
Threat Protected:
|
01 | ||||||||||||||||||
Rule Set Type:
|
|
||||||||||||||||||
Class Type:
|
Trojan | ||||||||||||||||||
Kill Chain:
|
Reconnaissance T1590 - Weaponization T1027- Delivery T1566- Exploitation T1203 - Installation T1059 - Command-and-Control T1102 - Lateral Movement T1570 - Collection T1119 - Exfiltration T1041 |
Known exploited vulnerabilities (Week 3 - June 2023):
For more information, refer to the Forum – Security Advisory
Vulnerability |
Description
|
|
CVE-2023-27997
|
Fortinet FortiOS and FortiProxy SSL-VPN Heap-Based Buffer Overflow Vulnerability
|
Updated Malware Signatures (Week 3 - June 2023)
Threat
|
Description
|
Kuluoz
|
A backdoor for a botnet. It executes commands from a remote malicious user.
|
Redline
|
A .NET-based information stealer malware.
|
Upatre
|
A malware dropper that downloads additional malware on an infected machine. It is usually observed to drop banking trojan after the initial infection.
|
Nanocore
|
The Nanocore trojan, built on the .NET framework, has been the subject of multiple source code leaks, resulting in its widespread accessibility. Similar to other remote access trojans (RATs), Nanocore empowers malicious actors with complete system control, enabling activities such as video and audio recording, password theft, file downloads, and keystroke logging.
|
Ap0calypseRAT
|
A Remote Access Trojan dropped by other malware. It periodically shows up on hacking forums.
|
Ramnit
|
A banking trojan used to steal online banking credentials.
|
Zeus
|
Also known as Zbot and is primarily designed to steal banking credentials.
|
Valyria
|
A Microsoft Word-based malware which is used as a dropper for second-stage malware.
|
Cerber
|
Another type of ransomware but instead of the usual ransom text files, it plays audio on the victim’s infected machine.
|
New Ransomware Victims Last Week: | 132 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Red Piranha proactively gathers information about organisations impacted by ransomware attacks through various channels, including the Dark Web. In the past week, our team identified a total of 132 new ransomware victims from 21 distinct industries across 32 countries worldwide. This highlights the global reach and indiscriminate nature of ransomware attacks, which can affect organisations of all sizes and sectors. Clop, a specific ransomware, has affected the largest number of new victims (35) spread across various countries. 8base and Lockbit3 groups follow closely with each hitting 18 and 17 new victims respectively. Below are the victim counts (%) for these ransomware groups and a few others. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Name of Ransomware Group | Percentage of new Victims last week | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
8base
|
13.64%
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Akira
|
3.03%
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Alphv
|
9.09%
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Blackbasta
|
2.27%
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Blackbyte
|
4.55%
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Clop
|
26.52%
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Daixin
|
0.76%
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Darkrace
|
0.76%
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
La piovra
|
0.76%
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Lockbit3
|
12.88%
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Medusa
|
2.27%
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Noescape
|
1.52%
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Oilin
|
2.27%
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rancoz
|
0.76%
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ransomhouse
|
2.27%
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ransomware blog
|
1.52%
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Rhysida
|
6.06%
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Royal
|
1.52%
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Snatch
|
6.06%
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Unsafe
|
0.76%
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|