New Threat Detection Added | 6 (Royal Ransomware, Bad magic APT, Xaview Stealer Malware, SOMNIRECORD, Muggle Stealer, and FakeGPT) |
New Threat Protections | 14 |
Overall Weekly Observables Count | 3,170,268 |
New Ransomware Victims Last Week | 188 |
Daily Submissions by Observable Type
Weekly Detected Threats
The following threats were added to Crystal Eye XDR this week:
Threat name:
|
Royal Ransomware | ||||||||||||||||||
Royal Ransomware has been observed approaching its victims through phishing campaigns and using common threat loaders such as BATLOADER and Qbot. The threat loader then downloads a Cobalt Strike payload to continue the malicious operation within the infected environment. Other ransomware operations like Qbot and BlackBasta have been noted using the same technique. The ransomware has been gaining momentum in its no of victims beating some of the top ransomware groups. |
|||||||||||||||||||
Threat Protected:
|
01 | ||||||||||||||||||
Rule Set Type:
|
|
||||||||||||||||||
Class Type:
|
Malware | ||||||||||||||||||
Kill Chain:
|
Discovery TA0005/TA0007 - Impact TA0040 - Execution TA0002 |
Threat name: | Bad magic APT | ||||||||||||||||||
A sophisticated advanced persistent threat (APT) group has been active since at least, 2016 and has targeted multiple organisations in various countries. The group, which the researchers refer to as "Bad magic," uses a variety of tactics and techniques, including spear-phishing emails, custom malware, and strategic web compromises, to gain access to their targets' networks and exfiltrate sensitive data. According to the researchers, Bad magic has a particular interest in telecommunications, financial services, and government organisations, and they suspect that the group may be state-sponsored. The group's malware is highly sophisticated and its advanced evasion techniques and anti-analysis measures avoid detection. The researchers also note that Bad magic is highly skilled and adaptable, constantly evolving its tactics and techniques in response to new security measures. |
|||||||||||||||||||
Threat Protected:
|
02 | ||||||||||||||||||
Rule Set Type:
|
|
||||||||||||||||||
Class Type:
|
Trojan-activity
|
||||||||||||||||||
Kill Chain:
|
Initial Access T1091 - Execution T1047/T1053/T1059/T1064 -Persistence T1053 - Privilege Escalation T1053/T1055 - Defence Evasion T1036/T1055 - Discovery T1010/T1018/T1083 - Lateral Movement T1091 |
Threat name: | Xaview Stealer Malware | ||||||||||||||||||
Xaview Stealer is a type of malware that is designed to steal sensitive information from an infected device. This malware is a type of Trojan, which means that it disguises itself as a legitimate file or application to deceive users into downloading and installing it. Once Xaview Stealer is installed on a device, it starts to collect a wide range of information, including browser history, cookies, usernames and passwords, credit card information, and more. This information is then sent back to the attacker's server, where it can be used for malicious purposes such as identity theft or financial fraud. One of the main ways that Xaview Stealer is distributed is through spam email campaigns. These emails often contain malicious attachments or links that, when clicked on, download, and install the malware onto the victim's device. |
|||||||||||||||||||
Threat Protected:
|
01 | ||||||||||||||||||
Rule Set Type:
|
|
||||||||||||||||||
Class Type:
|
Trojan-activity | ||||||||||||||||||
Kill Chain:
|
Initial Access T1476 - Initial AccessT1444 - Discovery T1418 - Impact T1516 |
Threat name: | SOMNIRECORD | ||||||||||||||||||
SOMNIRECORD is a malware written in C++. It acts as a backdoor and masquerades its traffic as DNS as a form of evasion. It makes a DNS query to retrieve its commands from a hardcoded domain in the binary. Its commands allow the attacker to execute any software from the victim machine, list processes, and deploy a webshell. |
|||||||||||||||||||
Threat Protected:
|
04 | ||||||||||||||||||
Rule Set Type:
|
|
||||||||||||||||||
Class Type:
|
Trojan-activity | ||||||||||||||||||
Kill Chain:
|
Execution T1059 - Defence Evasion T1036 |
Threat name: | Muggle Stealer | ||||||||||||||||||
Muggle Stealer is a malware that collects Windows and browser passwords, collects information, and takes screenshots of victim machines. The collected data is then uploaded to a Chinese IP. There is not enough data yet on how this stealer is commonly distributed and is not currently attributed to any threat actor. Rules have been deployed on Crystal Eye devices that will detect and prevent this traffic. |
|||||||||||||||||||
Threat Protected:
|
04 | ||||||||||||||||||
Rule Set Type:
|
|
||||||||||||||||||
Class Type:
|
Trojan-activity | ||||||||||||||||||
Kill Chain:
|
Execution T1059 - Collection T1005/T1113/T1056 - Command-and-Control T1102 |
Threat name: | FakeGPT | ||||||||||||||||||
It has been observed that the fake ChatGPT Chrome extension is being used as Facebook Ads account stealer. The malicious extension named Chat GPT for Google intends to steal Facebook session cookies and compromise accounts at go. The cookies are, subsequently, sent to the attackers’ server via a GET request. The cookie list is AES-encrypted and attached to the X-Cached-Key HTTP header value. This ensures that the cookies could be pilfered without any deep packet inspection mechanisms raising alarms. |
|||||||||||||||||||
Threat Protected:
|
02
|
||||||||||||||||||
Rule Set Type:
|
|
||||||||||||||||||
Class Type:
|
Malware | ||||||||||||||||||
Kill Chain:
|
Initial Access T1189 - Resource Development T1583/ T1586 - Lateral Movement T1550 - Command-and-Control T1102 |
New Ransomware Victims Last Week: | 188 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Red Piranha proactively gathers information about organisations impacted by ransomware attacks through various channels, including the Dark Web. In the past week, our team identified a total of 188 new ransomware victims from 26 distinct industries across 34 countries worldwide. This highlights the global reach and indiscriminate nature of ransomware attacks, which can affect organisations of all sizes and sectors. Clop, a specific ransomware, has affected the largest number of new victims (105) spread across various countries. LockBit 3.0 and AlphV groups follow closely with each hitting 27 and 15 new victims respectively. Below are the victim counts (%) for these ransomware groups and a few others. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Name of Ransomware Group | Percentage of new Victims last week | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Abyss-data | 2.65 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Alphv | 7.97 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Avoslocker | 2.65 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Blackbasta | 2.12 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Blackbyte | 0.53 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Clop | 55.85 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Everest | 0.53 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Karakurt | 0.53 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Lockbit3 | 14.36 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Medusa | 2.12 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Monti | 2.12 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Play | 3.72 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ransomhous | 0.53 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ransomhouse | 1.06 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
royal | 2.65 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
vicesociety | 0.53 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||