|New Threat Detection Added||4 (RogueRaticate, GoLang Easy Stealer, DarkCrystal RAT and NetDooka Malware)|
|New Threat Protections||13|
|New Ransomware Victims Last Week||89|
Weekly Detected Threats
The following threats were added to Crystal Eye XDR this week:
A new emerging threat has surfaced within the realm of "fake updates". This recently unveiled campaign, dubbed FakeSG, leverages compromised WordPress websites to present a tailored landing page mirroring the user's browser. Malicious actors behind this scheme disseminate the NetSupport RAT through either a zipped download or an Internet shortcut. Its main goal is to install fake updates on users' browsers to steal saved credentials.
Rule Set Type:
|Initial Access T1189 - Credential Access T1555|
|Threat name:||GoLang Easy Stealer|
This stealer is available for purchase on underground markets which offers a range of capabilities that targets cryptocurrency wallets and passwords. The GoLang Easy Stealer seems to have connections to several recent infection chains, including potential links to Wasabi Seed, a component utilised in a recent campaign called "Screentime". It advertises to collect passwords, cookies, autofill history, and banking information for browsers; 50+ crypto wallets, it works in-memory and supports PE and DLL formats.
Rule Set Type:
|Execution T1059 - Credential Access T1555 - Collection T1005|
Ukraine's government Computer Emergency Response Team, CERT-UA, has received concerning reports regarding the distribution of suspicious emails. These emails, originating from addresses within the gov.ua domain, appear to be compromised. The subject line reads Free primary legal assistance, and they include an RAR attachment Algorithm of actions of family members of a missing military serviceman. Within this RAR archive lies a document ostensibly addressing legal aid issues. However, when the document is opened and its macro activated, a PowerShell command triggers the download and execution of the .NET loader. This loader, in turn, fetches and deploys the DarkCrystal RAT malware. The choice of email recipients and the DarkCrystal RAT's control domain suggest that the attack is aimed at Ukrainian telecommunications operators and providers.
Rule Set Type:
|Execution T1059/T1064/T1203 - Persistence T1137 - Privilege Escalation T1055 - Defence Evasion T1027.002/T1036/T1497 - Discovery T1010/T1018 - Collection T1005 - Command-and-Control T1071/T1105|
Researchers recently encountered a highly sophisticated malware framework dubbed NetDooka, named after its components. This framework is distributed through a pay-per-install (PPI) service and comprises a loader, dropper, protection driver, and a full-featured remote access trojan (RAT) with its own communication protocol. The analysis revealed that NetDooka spreads via the PrivateLoader malware, initiating the entire infection chain. PrivateLoader serves as a downloader, responsible for installing various malware components as part of the PPI service. The specific payloads installed can vary depending on the malware version, with known families like SmokeLoader, RedLine, and Anubis distributed via PPI services. The inclusion of a malicious driver expands the attack surface, enabling attackers to employ various tactics, including process and file protection, antivirus evasion, and concealing malware and network communications. With the RAT payload, malicious actors can steal critical information, gain remote control, and create botnet networks. NetDooka serves as an entry point for additional malware.
Rule Set Type:
|Persistence T1546 - Privilege Escalation T1055 - Defence Evasion T1036/T1055/T1497 - Discovery T1010/T1012 - Collection T1113 - Command-and-Control T1071|
Known exploited vulnerabilities (Week 4 - October 2023)
Cisco IOS XE Web UI Command Injection Vulnerability
Roundcube Webmail Persistent Cross-Site Scripting (XSS) Vulnerability
Updated Malware Signatures (Week 4 - October 2023)
Also known as Zbot and is primarily designed to steal banking credentials.
AgentTesla is a remote access trojan designed to log keystrokes and make efforts to pilfer sensitive data from web browsers and other installed software applications.
A malware dropper that is designed to download additional malware on an infected machine.
Gh0stRAT is a widely recognised group of remote access trojans strategically crafted to grant an assailant full authority over a compromised system. Its functionalities encompass monitoring keystrokes, capturing video via the webcam, and deploying subsequent malware. The source code of Gh0stRAT has been openly accessible on the internet for an extended period, substantially reducing the hurdle for malicious actors to adapt and employ the code in fresh attack endeavours.
A trojan and keylogger used to steal various account credentials.
A remote access trojan that can take full control over an infected machine.
|New Ransomware Victims Last Week:||89|
Red Piranha proactively gathers information about organisations impacted by ransomware attacks through various channels, including the Dark Web. In the past week, our team identified a total of 89 new ransomware victims or updates in few past victims from 20 distinct industries across 16 countries worldwide. This highlights the global reach and indiscriminate nature of ransomware attacks, which can affect organisations of all sizes and sectors.
NoEscape, a specific ransomware, has affected the largest number of victims (31) updates spread across various countries. LockBit3.0 and 8Base ransomware groups updated 13 & 11 victims respectively. Below are the victim counts (%) for these ransomware groups and a few others.
|Name of Ransomware Group||Percentage of new Victims last week|
After conducting additional research, we found that ransomware has impacted 20 industries globally. Last week, the Manufacturing and Retail sectors were hit particularly hard, with 19% and 14% of the total ransomware victims belonging to each of those sectors respectively. The table below presents the most recent ransomware victims sorted by industry.