New Threat Detection Added | 4 (GhostRAT, DarkRAT, AhMyth RAT and Borr Malware) |
New Threat Protections | 169 |
Weekly Detected Threats
The following threats were added to Crystal Eye XDR this week:
Threat name: | GhostRAT Malware | |||||||||||||||||||||||||||
GhostRAT, also known as Gh0st RAT (Remote Access Tool), is a malicious program categorised as a Remote Access Trojan (RAT). First appearing in 2008, it grants unauthorised remote access to an infected Windows device. GhostRAT's source code is publicly available, allowing anyone with programming knowledge to modify it for their purposes. This adaptability has made it a popular tool among cybercriminals. Once installed, GhostRAT offers a variety of functionalities to the attacker, including: a. Full remote control: View and control the victim's screen. b. Keystroke logging: Capture everything typed on the keyboard. c. Live feed access: View the webcam and microphone feed. d. File manipulation: Download, upload, and execute files on the infected device. e. System control: Reboot or shut down the device, disable user input. Due to its ease of use and extensive features, GhostRAT remains a threat despite being around for over a decade. It's crucial to maintain up-to-date antivirus software and practice caution when downloading files or clicking on links to avoid infection. | ||||||||||||||||||||||||||||
Threat Protected: | 01 | |||||||||||||||||||||||||||
Rule Set Type: |
| |||||||||||||||||||||||||||
Class Type: | Trojan-activity | |||||||||||||||||||||||||||
Kill Chain: |
|
Threat name: | DarkRAT | |||||||||||||||||||||||||||
DarkRAT is a dangerous remote access tool (RAT) that grants unauthorised control to attackers. Once installed, it steals personal details, infects systems with malware, and runs hidden in the background. It automatically launches at startup and updates itself to evade detection. Attackers use various tricks to spread DarkRAT, including malicious attachments, fake software updates, untrustworthy download sources, and software cracks. Staying vigilant and cautious online can help you avoid falling victim to DarkRAT and similar threats. | ||||||||||||||||||||||||||||
Threat Protected: | 01 | |||||||||||||||||||||||||||
Rule Set Type: |
| |||||||||||||||||||||||||||
Class Type: | Trojan-activity | |||||||||||||||||||||||||||
Kill Chain: |
|
Threat name: | AhMyth RAT | ||||||||||||||||||||||||
AhMyth RAT is a malicious program targeting Android devices. Disguised as legitimate apps like games or screen recorders, it tricks users into installing it. Once on the device, AhMyth steals sensitive information like banking credentials, two-factor codes, and even captures screenshots. It also functions as a remote control, allowing attackers to view the phone's camera feed, record audio, and access data like call logs and contacts. This versatility makes AhMyth a dangerous tool in the hands of cybercriminals. | |||||||||||||||||||||||||
Threat Protected: | 05 | ||||||||||||||||||||||||
Rule Set Type: |
| ||||||||||||||||||||||||
Class Type: | Trojan-activity | ||||||||||||||||||||||||
Kill Chain: |
|
Threat name: | Borr Malware | |||||||||||||||||||||||||||
Borr malware is a sneaky threat lurking in the shadows of the internet. This malware family hides on Windows devices, granting remote access to attackers. The source code's public availability allows anyone with programming knowledge to modify it for their malicious purposes. Once infected, a device under Borr's control exposes sensitive information as attackers can download, upload, and manipulate files. Staying vigilant and using reliable antivirus software are crucial defences against Borr malware and its kin. | ||||||||||||||||||||||||||||
Threat Protected: | 01 | |||||||||||||||||||||||||||
Rule Set Type: |
| |||||||||||||||||||||||||||
Class Type: | Trojan-activity | |||||||||||||||||||||||||||
Kill Chain: |
|
Known exploited vulnerabilities (Week 2 - May 2024)
Threat | CVSS | Description | |
CVE-2024-4671 | Ongoing Analysis (High) | Use-After-Free Google Chrome vulnerability |
Updated Malware Signatures (Week 2 - May 2024)
Threat | Description | |
Bifrost | A remote access trojan that enables its operator to take control of a victim machine and steal data. It is usually distributed through spam and phishing emails. | |
CoinMiner | This malicious software installs and runs cryptocurrency mining applications. | |
QuasarRat | A remote access trojan that was made available to the public as an open-source project. Once installed on a victim’s machine, it is capable of keylogging, data and screen capturing among other things. It is also known to be highly customisable depending on the threat actor’s intended need. | |
Glupteba | A malware dropper that is designed to download additional malware on an infected machine. |
Ransomware Report | |
The Red Piranha Team actively collects information on organisations globally affected by ransomware attacks from various sources, including the Dark Web. In the past week alone, our team uncovered new ransomware victims and updates on previous victims across 20 different industries spanning 45 countries. This underscores the widespread and indiscriminate impact of ransomware attacks, emphasising their potential to affect organisations of varying sizes and sectors worldwide. LockBit3.0 ransomware stands out as the most prolific, having updated a significant number of victims (52%) distributed across multiple countries. In comparison, Stormous ransomware updated 7% of victims, in the past week. The following list provides the victim counts in percentages for these ransomware groups and a selection of others. | |
Name of Ransomware Group | Percentage of new Victims last week |
Abyss-Data | 0.45% |
Akira | 0.45% |
Bianlian | 0.90% |
Black Suit | 2.71% |
Blackbasta | 4.52% |
1.81% | |
Dan0N | 1.81% |
Darkvault | 0.90% |
Embargo | 0.45% |
Eraleign (Apt73) | 0.45% |
Everest | 1.36% |
Fsociety | 1.81% |
Hunters | 1.81% |
INC Ransom | 3.62% |
52.49% | |
Medusa | 3.62% |
Metaencryptor | 2.71% |
4.07% | |
Qilin | 3.62% |
Ransomhub | 2.26% |
Rhysida | 0.45% |
Stormous | 7.24% |
Team Underground | 0.45% |
Stormous Ransomware Group
Stormous is a ransomware group notorious for targeting a wide range of entities, including websites, companies, and organisations primarily in the United States and Ukraine. Their modus operandi involves encrypting victims' data and demanding payment for its release, posing significant threats to data security and integrity.
The group has garnered attention for claiming responsibility for cyber-attacks on major American brands such as Coca-Cola, Mattel, and Danaher. Additionally, they have targeted critical entities like the Ukraine Ministry of Foreign Affairs, acquiring sensitive information in the process.
One distinguishing aspect of Stormous is their proclaimed allegiance to Russia in its ongoing conflict with Ukraine. Exploiting the heightened tensions between the two nations, Stormous has used this allegiance to bolster their reputation. However, there exists a debate among experts regarding whether their actions are politically motivated or primarily driven by financial gain.
Tactics, Techniques, and Procedures (TTPs)
Phishing Email: Phishing emails represent one of the most prevalent infection vectors utilised by ransomware, Stormous included. These deceptive emails often contain malicious attachments or links. Upon interaction, such as clicking a link or opening an attachment, the ransomware is downloaded and executed on the victim's system. Stormous utilises phishing emails that masquerade as messages from organisations claiming to assist victims of the conflict in Ukraine.
Exploiting vulnerabilities: Stormous may exploit vulnerabilities within software or operating systems to infiltrate systems. This encompasses unpatched systems, vulnerable websites, and compromised VPN servers.
Remote Desktop Protocol (RDP): RDP facilitates remote access to computers or servers. If RDP configurations are inadequately secured, they can serve as entry points for ransomware attacks, including those carried out by Stormous.
Ads and pop-ups: Ransomware, including Stormous, can leverage advertisements and pop-ups on websites as a means of infiltration.
Credential abuse: This involves the illicit use of stolen or weak login credentials to gain unauthorised access to systems.
Stormous ransomware operates according to a typical ransomware attack pattern. While specific details about Stormous ransomware may be limited, we can deduce its operational method based on general knowledge about ransomware attacks.
Initial infection
Stormous ransomware gains entry to a computer or network through various means, including exploiting software vulnerabilities, phishing emails, or Remote Desktop Protocol (RDP) attacks.
File Encryption
Once infiltrated, Stormous ransomware initiates the encryption process, locking files on the infected device and potentially extending to connected network drives.
Ransom Demand
Following file encryption, a ransom note is typically delivered, demanding payment in exchange for the decryption key and a pledge not to leak the stolen data. Attackers commonly demand payment in cryptocurrencies like Bitcoin to obscure transaction tracing.
Leak Site: Stormous maintains a leak site on the dark web where they threaten to publish stolen data if the ransom is not paid.
Kill Chain:
Tactic | Technique ID | Technique Name |
Execution | T1204 | User Execution |
Defence Evasion | T1070 | Delete Shadow drive data |
Discovery | T1217 T1082 T1083 | Browser Information Discovery System Information Discovery File and Directory Discovery |
Impact | T1486 T1490 | Data Encrypted for Impact Inhibit System Recovery |
Indicators of Compromise (IOCs)
Indicators | Indicator Type | Description |
96ba3ba94db07e895090cdaca701a922523649cf6d6801b358c5ff62416be9fa b7863120606168b3731395d9850bbf25661d05c6e094c032fc486e15daeb5666 | Hash | Stormous Ransomware |
3slz4povugieoi3tw7sblxoowxhbzxeju427cffsst5fo2tizepwatid.onion h3reihqb2y7woqdary2g3bmk3apgtxuyhx4j2ftovbhe3l5svev7bdyd.onion ransekgbpijp56bflufgxptwn5hej2rztx423v6sim2zrzz7xetnr2qd.onion pdcizqzjitsgfcgqeyhuee5u6uki6zy5slzioinlhx6xjnsw25irdgqd.onion stmxylixiz4atpmkspvhkym4xccjvpcv3v67uh3dze7xwwhtnz4faxid.onion | URLs | Leak Site |
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Upon further investigation, it has been identified that ransomware has left its mark on 20 different industries worldwide. Notably, Manufacturing bore the brunt of the attacks in the past week, accounting for 20% of victims. There are a few key reasons why the manufacturing sector is a prime target for ransomware groups
- High Disruption Potential: Manufacturing relies heavily on interconnected systems and just-in-time production. A ransomware attack can grind operations to a halt, causing significant financial losses due to production delays and lost revenue. This pressure to get back online quickly can make manufacturers more willing to pay the ransom.
- Vulnerable Legacy Systems: Many manufacturers use legacy control systems (OT) that haven't been updated for security. These older systems often lack robust security features, making them easier targets for attackers to exploit.
- Limited Cybersecurity Investment: Traditionally, cybersecurity might not have been a top priority for some manufacturers compared to production efficiency. This lack of investment in security awareness training and robust security protocols leaves them exposed.
- Valuable Data: Manufacturing facilities often hold valuable intellectual property (IP) and trade secrets. Ransomware groups may not only disrupt operations but also threaten to leak this sensitive data if the ransom isn't paid.
- Success Breeds Success: The high payout potential from past attacks on manufacturers incentivises ransomware groups to continue targeting them.
The table below delineates the most recent ransomware victims, organised by industry, shedding light on the sectors grappling with the significant impact of these cyber threats.
Name of the affected Industry | Victims Count (%) |
Agriculture | 0.45 |
Business Services | 12.67 |
Construction | 6.79 |
Consumer Services | 3.62 |
Education | 4.98 |
Energy, Utilities & Waste Treatment | 0.45 |
Finance | 4.07 |
Government | 3.17 |
Healthcare | 8.14 |
Hospitality | 4.07 |
IT | 6.33 |
Legal Services | 3.17 |
Manufacturing | 20.36 |
Media & Internet | 0.90 |
Metals & Mining | 0.45 |
Organisations | 3.17 |
Real Estate | 0.45 |
Retail | 9.95 |
Telecom | 2.71 |
Transportation | 4.07 |