text
stringlengths 0
383k
|
---|
AcidPour Linux malware
AcidPour is a new C-based Linux malware strain considered to be an evolution of the AcidRain wiper malware. AcidPour is compiled for x86 architecture and it extends the capabilities of the previous wiper. The current feature set allows this malware to target a wide range of networking and IoT devices, dedicated RAID arrays or ICS devices running on Linux x86 distributions.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.NPE
WS.Malware.1
|
AcridRain stealer disguised as Grammarly installer
AcridRain is not a new infostealer, it's been around since at least 2018. Over the years, its prevalence has never outshone any other run-of-the-mill stealers, but it continues to be seen here and there. Recently, a new AcridRain command-and-control server has been observed, related to an ongoing drive-by-download campaign. Actors have disguised their AcridRain binary as a Grammarly installer which is a popular cloud-based typing assistant.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B
|
Active exploitation of Ivanti Secure Connect VPN 0-day vulnerabilities observed
Two recently disclosed vulnerabilities, CVE-2023-46805 and CVE-2024-21887, affecting Ivanti Connect Secure and Ivanti Policy Secure, have been actively exploited in 0-day attacks. Successful exploitation of these vulnerabilities in a chained attack allows an attacker unauthenticated remote code execution. Attacks that have been observed displayed deployments of webshells to compromised assets accessible to both the internet and internally.
Symantec protects you from this threat, identified by the following:
Network-based
Web Attack: Ivanti ICS CVE-2023-46805
Web Attack: Ivanti ICS CVE-2024-21887
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products.
|
Activists and journalists at risk from mobile spyware
Recently, a group known as Earth Empusa (aka Evil Eye and Poison Carp) has been using the Facebook platform to create fake accounts and target activists, journalists and dissidents from a handful of countries. They have been trying to entice their intended victims to install Android applications purporting to be keyboards, dictionaries, and even a prayer app, which are in fact all spyware in disguise.
Symantec protects you from this threat, identified by the following:
Mobile-based
Android.Reputation.2
|
Actor impersonates University of Indonesia scholar in Southeast Asian campaign
Spoofing of well-known universities and scholars is a common tactic used by actors worldwide in their malware campaigns. Symantec has detected a recent instance in which an actor impersonated a prominent Indonesian economist who is associated with the University of Indonesia. The actor used this impersonation to target research institutes, financial, energy and engineering industries, and conglomerates with a presence in Southeast Asia. The emails used in this malicious campaign had the subject line "Quotation - Universitas Indonesia" and contained a .xz archive. Within this archive was a Formbook variant disguised as a quotation (Quotation-Universitas Indonesia_pdf.exe). The following are some of the capabilities of this threat:
Keystroke logging
Take screenshots
Grab HTTP(s) forms from network requests
Steal data from the clipboard
Steal user and system information
Steal data from browsers, email, IM and ftp clients etc
Shutdown/Reboot the OS
Download and execute additional files
Remotely execute commands
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.terminate!g2
SONAR.heur.dropper
SONAR.prochijack!g21
Email-based
Coverage is in place for Symantec’s email security products
File-based
Packed.NSISPacker!g14
Machine Learning-based
Heur.AdvML.B
|
Actors sign malicious driver through Microsoft WHCP
Recently there have been reports of an actor who managed to have a malicious driver signed via Microsoft's Windows Hardware Compatibility Program. The malicious Netfilter driver loaded with a Rootkit Malware has been distributed within gaming environments.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Malfilter
Trojan.Gen.MBT
Trojan.Gen.2
Trojan Horse
WS.Malware.1
WS.Malware.2
Heur.AdvML.B
Heur.AdvML.C
|
Additional vulnerabilities added to Known Exploited Vulnerabilities Catalog
Three vulnerabilities disclosed back in 2022 have been reported as exploited in the wild and have now been added to the "Known Exploited Vulnerabilities Catalog" by CISA.
CVE-2022-28810 - Remote Code Execution vulnerability in Zoho ManageEngine ADSelfService Plus. This vulnerability could allow execution of arbitrary operating system commands as SYSTEM via the policy custom script feature.
CVE-2022-33891 - Command Injection vulnerability in Apache Spark. Exploitation of this vulnerability could allow attackers to execute arbitrary code within the context of the application.
CVE-2022-35914 - Teclib GLPI Remote Code Execution vulnerability. The vulnerability exists in a third party library HTMLAWED and if exploited could allow for PHP code injection.
The CVSS scores for the added vulnerabilities range from Medium to Critical and the reported vulnerabilities might pose a significant risk to enterprises.
Symantec protects you from this threat, identified by the following:
Network-based
Attack: Zoho ManageEngine ADSelfService Plus CVE-2022-28810
Web Attack: Apache Spark CVE-2022-33891
Web Attack: GLPI Unauthenticated RCE With Htmlawed Library CVE-2022-35914
|
A DDoS botnet spreading through CVEs on routers: Condi
Condi is a DDoS-as-a-service botnet whose users can either outright buy the code or rent the botnet to perform DDoS attacks. The botnet itself has been recently spreading by abusing a public vulnerability (CVE-2023-1389) on a line of TP-Link routers. A patch for the vulnerability is already public, so the group behind Condi are just taking advantage of those routers that have not been patched and are found accessible through the internet.
Symantec protects you from this threat, identified by the following:
File-based
Linux.Mirai
Trojan.Gen.NPE
WS.Malware.1
Network-based
Attack: TP-Link Router Remote Code Execution Vulnerability CVE-2023-1389
|
AdLoad activity shows no signs of stopping
AdLoad has been in the news multiple times throughout 2021 as new variants were spotted along with an increase in activity. This well-known adware loader has been present in the MacOS threat landscape for the last few years and it's showing no sign of stopping. As of December 2021, Symantec continues to observe AdLoad campaigns in which AdLoad actors continue to leverage fake apps (for example Flash player) with social engineering their preferred vector of infection.
Symantec protects you from this threat, identified by the following:
File-based
OSX.AdLoad
OSX.AdLoad!g1
Network-based
System Infected: OSX Hydromac Activity
System Infected: OSX.Trojan.Gen Activity 1
|
AdLoad malware continues to target macOS systems
AdLoad is a wide spread malware loader present on the threat landscape for the last few years. AdLoad is known to initiate campaigns targeting macOS systems that deliver a wide variety of payloads including adware, bundleware, backdoors and others. The most recently observed AdLoad campaign has been delivering proxy applications able to turn the infected hosts into proxy bots. Such botnets might be later used by the threat actors for the purpose of additional malicious campaigns or spam distribution for instance.
Symantec protects you from this threat, identified by the following:
File-based
OSX.AdLoad
OSX.AdLoad!g1
OSX.Trojan.Gen
OSX.Trojan.Gen.2
WS.Malware.1
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products
|
Adobe ColdFusion CVE-2023-26360 vulnerability under active exploitation
Adobe ColdFusion is susceptible to a critical improper access control vulnerability, identified as CVE-2023-26360 with a CVSS score of 8.6. If successfully exploited, this vulnerability enables remote code execution. Latest CISA Cybersecurity Advisory highlights instances of in-the-wild exploitation targeting governmental entities. The attackers employ custom remote access trojans (RAT) and malicious web shells during reconnaissance and data exfiltration operations.
Symantec's network protection technology, Intrusion Prevention System (IPS) blocks exploitation attempts of the CVE-2023-26360 vulnerability and thus prevents further infection/damage to the system.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Machine Learning-based
Heur.AdvML.C
Network-based
Attack: Adobe ColdFusion Unauthenticated RCE CVE-2023-26360
|
Advance-fee scam exploits Google's own applications and services
In a recent advance fee campaign, Symantec observed threat actors making a slight change in their tactics, techniques and procedures (TTP) by exploiting Google Forms services. As shown in Figure 1, this run consists of emails purporting from financial institutions notifying the recipient of a certain payment. The recipient is asked to send a response on an email address and also, there’s a hyperlinked text with an embedded Google Forms URL.
Figure 1: Email masquerading as payment notification message with Google Forms URL embedded within the content.
As shown in Figure 2, upon clicking the hyperlinked text, a Google form with title “Untitled form” opens. It appears that the threat actors have made use of the form to track responses as it includes a radio button that enables response submission for record purposes.
Figure 2: Untitled form to record user’s response.
Protection
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
|
Advance-fee scammers take advantage of COVID-19 pandemic
Along with the ever-changing threat landscape, the actors behind the advance-fee type of scam are also attempting to leverage COVID-19 pandemic. In one such scam run observed recently by Symantec, emails masqueraded as personal messages are sent to the users to seemingly provide comfort in these challenging times.
Figure 1: Advance-fee scam email masqueraded as a personal email comforting the user with a generous donation.
The scammers reassure the recipient by mentioning that a generous donation awaits and in order to receive it, the user only needs to reach out to the provided email address. As in any similar advance-fee type of scam, the perpetrators expect that by the time the user realizes of being scam victim, he might have already transferred them a considerable amount of money in order to secure the promised "donation".
Protection
Protection is in place for Symantec's email security products.
|
AESRT ransomware
AESRT is another run-of-the-mill ransomware variant found in the wild. The malware will encrypt users' files and append .AESRT extension to them. The ransomware does not drop any ransom notes, but will instead open a pop-up window that contains attackers contact info as well as the field for decryption key input. AESRT ransomware does have the functionality to delete volume shadow copies on the infected machine.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.SuspLaunch!g18
SONAR.TCP!gen1
File-based
Downloader
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
|
A Facefish story
Symantec Security Response is aware of a new Linux malware labeled "Facefish". Facefish is made up of dropper and rootkit parts, in which the rootkit portion dictates its main function. The malware was named after the polymorphic nature of the rootkit, like face-changing in Sichuan Opera, and the Blowfish cipher it employs to communicate with Command and Control servers (C&C).
The main functions of Facefish are:
Upload device information
Stealing user credentials
Bounce Shell
Execute arbitrary commands
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.NPE
Backdoor.Trojan
Web-based
Observed IP address is covered under security categories
|
African based telecommunications organizations targeted by Iranian Seedworm group
The Symantec Threat Hunter Team, part of Broadcom, observed a recent campaign by the Seedworm threat actor group, targeting telecommunications organizations in North and East Africa. This activity, which occurred in November 2023, leveraged some new and some existing features previously attributed to Seedworm. Control and communication was accomplished through a recently disclosed C2 framework known as MuddyC2Go. Other components of the attacks included various remote access tools, a customized build of the publicly available Venom Proxy hacktool, as well as a custom keylogger.
Read more in our blog: Seedworm: Iranian Hackers Target Telecoms Orgs in North and East Africa
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen6
File-based
Backdoor.Trojan
Hacktool
Trojan Horse
WS.Malware.2
Machine learning-based
Heur.AdvML.A
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products
|
Afterpay users face holiday season scams
Afterpay is a well-known buy now, pay later (BNPL) service in Australia (also available in other countries) enabling shoppers to divide their purchases into four equal, interest-free installments over a six-week period. With broad acceptance both online and in physical stores, it serves as a convenient payment choice for many Australians.
Phishing and smishing related to this service are hardly a new thing, but during the upcoming holiday season we're bound to observe increased activity. In one such example, Symantec has observed a malicious SMS campaign that's trying to snatch Afterpay users' sensitive information and potentially lead to financial theft or scams. Users are being lured by the actors through account issue social engineering and a shortened Bitly URL that redirects to the malicious website.
Observed SMS (as is, including the "AfrerPay" typo):
AfrerPay:Your afterpay account has an issue, please check:hxxps://bit[.]ly/3Rj94Rz
Symantec protects you from this threat, identified by the following:
Mobile-based
Symantec Endpoint Protection Mobile is able to analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake Afterpay domains used in this campaign are known to WebPulse.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products.
|
Agenda - Golang-based targeted ransomware
A new ransomware variant dubbed Agenda has been reported to target enterprises in Asia and Africa. The Golang-based malware is targeted at Windows-based systems. The ransomware is targeted and customized for each of the intended victims. It has been reported, that the attackers responsible for Agenda propagation have been leveraging public-facing Citrix servers as a point of the initial compromise. Agenda ransomware has functionality to terminate specific system processes and services and to delete shadow volume copies on the infected host.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.SuspLaunch!g18
File-based
Downloader
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.2
Network-based
Attack: Ransom.Gen Activity 46
|
Agent Racoon Backdoor
A new backdoor malware dubbed 'Agent Racoon' was launched during a series of related attacks targeting various organizations located in the Middle East, Africa and the U.S. Additional malicious tools used for these attacks are Ntospy, another new malware designed to steal user credentials, and a customized version of Mimikatz called Mimilite.
These tools were used to perform the following activities:
Establish backdoor capabilities
For command and control (C2)
Steal user credentials
Exfiltrate confidential information
Symantec protects you from this threat, identified by the following:
File-based
Hacktool.NPPSpy!g2
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
WS.Malware.2
WS.Reputation.1
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products.
|
Agent Tesla and Hannabi Grabber among the malware families leveraging IPFS network
The InterPlanetary File System (IPFS) is a peer-to-peer network for storing and sharing files, data and applications in a form of a distributed file system. It has been recently observed that the IPFS network is being increasingly abused by the various threat actors for the purpose of malware hosting and delivery. Two distinct malware families seen in recent campaigns that leverage IPFS are Agent Tesla and Hannabi Grabber. The observed campaigns tend to use either phishing links pointing to payloads hosted on the IPFS network or malware loaders spread via malspam that retrieve the payloads from repositories within the IPFS network.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
Email-based
Coverage is in place for Symantec’s email security products
File-based
MSIL.Downloader!gen8
Trojan Horse
Trojan.Gen.NPE
WS.Malware.1
WS.Malware.2
WS.SecurityRisk.4
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories
|
Agent Tesla campaign eyes France, Spain, Turkey and North Africa
Agent Tesla (a .NET based information stealer) is being spread to companies around the globe by multiple actors with various goals, including financial gain, corporate espionage, ransomware extortion, and more. Campaigns are intercepted on a daily basis, such as one that has been targeting companies in France, Spain, Turkey and North Africa. The perpetrators pose as a Moroccan company specializing in garment manufacturing and export.
The malicious emails, with the subject "AVIS DE VIREMENT," contain a .BZ archive (Avis_Virement1502002024.bz). Within the archive, Agent Tesla disguises itself as a fake document or notification of transfer of funds (Avis_Virement1502002024.exe). This is a run-of-the-mill social engineering tactic that's been used for years now and is still effective.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec's email security products
Behavior-based
SONAR.Trafic2.RGC!g16
File-based
Trojan.Gen.MBT
Trojan.Gen.NPE
|
Agent Tesla campaigns continue the grind
Agent Tesla has been among the top infostealers for a while now and shows no signs of letting up. This prevalent threat with infostealing and remote access capabilities is used by multiple groups and individuals for both E-crimes and targeted attacks. Symantec continues to observe Agent Tesla's campaigns with tiresome regularity, including a recent email spoof of two prominent companies:
One that provides international industrial services to engineering sectors
One that sells sound and vibration measurement instrumentation to engineering sectors
This ongoing malspam campaign targets various companies and institutions around the globe using a "quote" and "Bulk carrier shipping" social engineering theme. Email subjects include: "New Quote Request" and "[Removed] - Cargo Crane".
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec's email security products
File-based
Infostealer.Atesla
MSIL.Packed.19
Scr.Malcode!gdn30
Trojan.Gen.2
Trojan.Gen.MBT
Trojan Horse
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
|
Agent Tesla campaign targets Norway and neighboring countries
Agent Tesla continues to be among the top infostealers with remote access capabilities currently active in the threat landscape. This malware is observed globally on a daily basis and is predominantly distributed via malicious emails. Campaign complexity varies from run-of-the-mill social engineering to general news and sometimes specific topics. While its threat footprint is global, Symantec regularly observes Agent Tesla actors focusing on a specific country, often spilling over into their neighbors. As a recent example, there's an ongoing campaign that primarily targets Norwegians organizations but has also been observed in neighboring European countries. Malicious emails (subject: innbetaling) with a malicious IMG archive attached and within this archive, the Agent Tesla binary disguised as an invoice.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
File-based
Trojan Horse
Scr.Malcode!gdn34
|
Agent Tesla goes after companies in Indonesia
Agent Tesla is one of the most prevalent stealers out there and has managed to maintain its position for years. It is used by multiple groups and individuals globally, conducting campaigns in numerous languages. Symantec has observed a new campaign targeting companies in Indonesia, particularly in the automotive, financial, oleochemical, electronic, and food sectors.
The actors behind this campaign do not employ strong social engineering tactics. Instead they rely on a common approach - the tax invoice. Malicious emails (subject: Copy Faktur Pajak Masa Juni - July 2023) are sent with a .RAR archive attached. If users are deceived, they will execute the Agent Tesla binary located within the archive.
The impacts of the Agent Tesla malware can be significant, ranging from financial loss and identity theft to the compromise of sensitive information and disruption of normal system functionality.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
File-based
Scr.Malcode!gdn32
Machine Learning-based
Heur.AdvML.B!200
|
AgentTesla in campaign leveraging .ISO attachments
A new malicious campaign distributing the AgentTesla infostealing malware has been observed mid-August. The malware has been spread via malspam emails containing disk image .ISO attachments that include malicious Microsoft Compiled HTML Help .chm files leading to the infection. AgentTesla is a prevalent infostealer, present on the threat landscape for last several years. It ex-filtrates confidential information from user's machines, passwords stored in browsers, email and VPN clients. It can also lead to additional payloads being dropped on the infected hosts.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
File-based
Downloader
ISB.Downloader!gen272
JS.Downloader
Trojan Horse
WS.Malware.1
Web-based
Observed domains are covered under security categories
|
Agent Tesla now exfiltrating via data Telegram
Agent Tesla, an info-stealer spread via malspam campaigns, has started sending .DAA files (PowerISO Direct Access Archive file). After infecting the system malware gets to work logging information from the infected machine and begins exfiltrating the information via Telegram in the form of screenshots.
Symantec protects you from these threats, identified by the following:
File-based
Heur.AdvML.B
Trojan.Gen.2
Behavior-based
SONAR.SuspDataRun
|
Agent Tesla riding COVID spam wave
Agent Tesla is a sophisticated .Net keylogger and Remote Access Trojan (RAT) that was sold commercially. Because of its multi-functionality and easy-to-use nature, the malware has been one of the more popular tools used by cyber criminals and was employed in many attack campaigns throughout the years.
Recently Symantec observed Agent Tesla being delivered in an email attachment sent to more than 1,000 organizations around the globe. In order to maximize the chance of the recipients opening a malicious document file, the email has an enticing subject: "Re: Inquiry For 3ply Mask, Gown, Gloves and Goggles Offer". The email pretends to be a legitimate import-distributor company of basic chemicals and asks the recipient to open the attached document file to see quotes for those items which are closely associated with the current COVID-19 situation. Upon opening the document, an old vulnerability (CVE-2017-11882) in Microsoft Office is triggered. This vulnerability attracted public attention when a patch was finally provided for it in late 2017, given that the security hole had been left unpatched for a whopping 17 years. Successful exploitation leads to the download and execution of a remote file, namely, Agent Tesla. As Agent Tesla is a multi-purposed RAT, infection will bring a lot of problems to the targeted organizations.
CVE-2017-11882 is also known to be used to distribute other malware. Despite being 17 years late, don't forget to apply the patch!
Symantec has the following coverage against this spam run:
Exp.CVE-2017-11882!g3
Infostealer.Atesla
|
AgentTesla Spam Run
Security Response has observed AgentTesla, a prevalent .NET based keylogger and RAT, recently being distributed via spam campaigns. The emails were sent to more than 1,000 companies worldwide which suggests a random spam run rather than a targeted attack.
Email Characteristics
Subject:
RE, REQUEST FOR AUGUST SOA TO PROCEED PAYMENT.
Remittance advice and Related Invoices
File Name:
NOAH NEW_crypted.exe
File-based protection
Trojan.Gen.2
|
Agent Tesla Targets Spanish Companies, Exfiltrating Data to Telegram
Symantec has recently observed an actor running a malspam campaign (email subject: FACTURA MES DE MARZO 2024) in Spain, purporting themselves as a Spanish company specializing in various accounting, tax, labor, and audit services for businesses. Recipients are being lured with an invoice scheme. If someone is tricked into opening the attached .GZ archive (Facturas Marzo.gz) and then running the malicious binary (Facturas Marzo.exe) within, they will end up compromised with Agent Tesla. Below are some of its stealing capabilities:
Log keystrokes
Steal web browser’s login credentials
Steal email server’s login credentials
Steal VPN passwords
Steal FTP server’s login credentials
Steal WinSCP’s login credentials
The malware is set up to communicate with a Telegram bot that the attacker controls. After collecting the stolen data and preparing it for transmission, the stealer utilizes the Telegram Bot API to send this information as messages to the attacker's Telegram account or group. It's a technique increasingly used by stealers and remote access trojan developers.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
File-based
Infostealer
Trojan.Gen.MBT
Network-based
Audit: Untrusted Telegram API Connection
Machine Learning-based
Heur.AdvML.B!100
|
AgentTesla tries to sneak past the post undetected
Until a few decades ago, motor-racing teams were split into two categories in terms of measurements used to design racing cars, one with imperial units and the other using the newer metric system. With the success of the teams that measured parts using millimeter precision, the racing world gradually adopted the metric system.
Symantec recently observed AgentTesla being sent as an email attachment to companies spanning various industries. Among them, one spam message in particular caught our attention - an email sent to a well known motor-racing team about spare parts measured using the metric system. As the racing scheduled is tightly packed this year due to the ongoing pandemic, an unwary target might have opened the attachment with the blinding speed of a pitstop crew.
Symantec provides the following protections against this spam campaign:
File-based
Trojan.Gen.MBT
Email-based
Protection is in place for Symantec's email security products. Email Threat Isolation (ETI) technology from Symantec provides an extra layer of protection.
|
Aggah threat group goes after the manufacturing industry with the Warzone RAT
Aggah group has been reported to conduct a new spear-phishing campaign targeted at the manufacturing sector. The threat actors leverage emails containing PowerPoint files with malicious macros. With the help of MSHTA.exe (Windows-native binary designed to run .HTA files) they execute javascripts utilizing Powershell commands that result in malicious payloads being loaded onto the compromised machines. The final payload in this campaign has been found to belong to the Warzone RAT family, which is a type of an infostealing commodity malware.
Symantec protects you from this threat, identified by the following:
File-based
CL.Downloader!gen87
Heur.AdvML.B
ISB.Downloader!gen281
ISB.Heuristic!gen5
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.NPE
Trojan.Malscript
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Network-based
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains are covered under security categories
|
Aging vulnerabilities still used by SmokeLoader actors
SmokeLoader has been around for several years now and still lurking in the threat landscape. Over the years, their modus operandi has not changed much and as of today we still see old Microsoft Office vulnerabilities being used as a vector in malicious emails. This malware works primarily as a loader but also is considered a bot with infostealing capabilities. Since it was first observed, it has loaded many malware families.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
File-based
Bloodhound.RTF.12
Bloodhound.RTF.20
Exp.CVE-2017-0199!g4
Exp.CVE-2017-11882!g3
Trojan.Gen.NPE
Trojan Horse
Trojan.Mdropper
|
Agniane Stealer
Agniane is a recently discovered infostealer variant promoted via Telegram and advertised for sale in form of a Malware-as-a-Service (MaaS) offering. This infostealer is used by threat actors to steal system information, credentials, session cookies, browser-stored data and cryptocurrency wallets, among others. Agniane Stealer is written in C# programming language and employs various anti-analysis and evasion techniques including sandbox detection, debugger checks, obfuscation and more. The confidential data collected by Agniane is ex-filtrated to C2 servers controlled by the attackers.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.MalTraffic!gen1
SONAR.TCP!gen1
File-based
Infostealer
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.A!400
Heur.AdvML.A!500
Heur.AdvML.B!100
Heur.AdvML.B!200
Network-based
System Infected: Trojan.Backdoor Activity 568
System Infected: Trojan.Backdoor Activity 656
System Infected: Trojan.Backdoor Activity 721
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products
|
Agrius APT - using Ransomware as camouflage for their campaign of destruction
Ransomware is a lucrative business for cybercriminals but unfortunately it can also provide a means of camouflage to APT groups, allowing them to hide their true intentions behind financial gain and simple greed. In recent reports, a threat actor known as Agrius has moved away from being a plain wiper to a "Ransomware wiper" dubbed Apostle.
This group has targeted organizations in Israeli and the United Arab Emirates in cyber espionage and destruction campaigns. More recently they are leveraging exploits in web-based apps and SQL injection to gain initial entry into victims' infrastructure. From there, they use other tools such as Webshells and a backdoor known as "IPsec Helper" in the attack chain.
Symantec protects you from these threats, identified by the following:
File-based
Heur.AdvML.B
Heur.AdvML.C
Trojan.Gen.2
Trojan.Gen.NPE
Trojan.Malscript
Trojan.Tepok
Trojan.Tepok.B
WS.Malware.1
|
Ahmyth Android RAT continues to spy on mobile users
Ahmyth is an Android Remote Access Tool that's available on a well-known software development and version control platform. Over recent years, Ahmyth has been shared on hacker and underground forums, social network platforms and websites.
Through 2020 and into early 2021, we continued to observe Ahmyth activities as cybercriminals of various technical backgrounds first trialed and then added this RAT to their arsenals. As usual the most common vector has been to disguise Ahmyth as known Android applications related to companies and services, although there have also been instances where actors would trojanize legitimate applications with Ahmyth. These fake applications are then distributed via fake websites and social networks. In January 2021, researchers observed cybercriminals targeting users of a well known online European broker with this RAT.
Symantec has the following coverage in place:
Mobile-based
Android.Reputation.2
|
AhRAT Android malware
AhRAT is an Android malware variant distributed in form of a trojanized Android app called "iRecorder – Screen Recorder". The app itself was first published back in 2021 and it did not include any malicious functionality initially. It seems the malicious code (based off another mobile malware known as AhMyth) has been added in some of the later updates around August 2022. The AhRAT malware has the functionality to collect microphone recordings, call logs, text messages, contact list and users' files from the compromised devices, among others.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
Android.Reputation.2
Web-based
Observed domains/IPs are covered under security categories
|
AIRAVAT mobile RAT comes with ransomware features
AIRAVAT is a multifunctional mobile RAT malware known to be sold on the underground forums or recently even directly via Telegram channels. The malware comes with a GUI-based Web administration panel and allows for various infostealing and keylogging activities on the compromised devices. AIRAVAT is able to retrieve additional commands from the attackers C2 servers and those can include typical ransomware activities - encrypting files and displaying a ransom note via device's notifications.
Symantec protects you from this threat, identified by the following:
Mobile-based
Android.Reputation.2
AppRisk:Generisk
|
AI tools used as lures for infostealers through Facebook Ads
With the current popularity of Large-Language-Models (LLMs) it is no surprise threat actors are using the trend as well to lure victims, in this case through paid Facebook Ads for AI tools and services. If the victim clicks on the ad, the threat actor will redirect traffic abusing legit URL redirection services to abused hosting and file sharing services to download a password protected archive. The password protection is done with the intent of avoiding detection by security programs, as it contains a Windows installer file inside. If the user continues, a fake browser extension will be installed through which the threat actor will try to syphon as much information from the victim as possible, especially anything related to Facebook.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
Web.Reputation.1
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products
|
Akira ransomware for Linux
Akira is a ransomware variant that first emerged on the threat landscape in April 2023. While initially only Windows variants of this ransomware have been observed, now also a Linux strain is available. The malware targets files with predetermined extensions for the encryption - many are related to virtualized VMware ESXi environments. After successful encryption, the malware will append .akira extension to the encrypted files and will drop the ransom notes onto the compromised system.
Symantec protects you from this threat, identified by the following:
File-based
Ransom.Akira
Trojan Horse
Trojan.Gen.NPE
WS.Malware.2
Policy-based
Symantec Data Center Security (DCS) default hardening policies provide 0-day protection against Akira ransomware
|
Akira ransomware remains an active threat on the landscape
Symantec Security Response is aware of the recent joint alert from CISA, the FBI, Europol's European Cybercrime Centre (EC3), and the Netherlands' National Cyber Security Centre (NCSC-NL) regarding a number of targeted activities observed for the Akira ransomware. Akira is a ransomware family seen on the threat landscape since at least 2023. According to the released report, Akira remains an active threat and has been leveraged in attacks on over 250 organizations to date. Initial C++based variants of Akira have been encrypting user files and appending .akira extension. Latest Rust-based variant called Megazord emerged last year and it is appending .powerranges extension to the encrypted files instead. Next to Windows-based Akira strain, the group behind this ransomware has also been known to distribute a Linux-based variant focused on VMware ESXi environments.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Ps-Rd32!g1
ACM.Untrst-RunSys!g1
Behavior-based
SONAR.SuspLaunch!g138
SONAR.TCP!gen1
File-based
Ransom.Akira
Ransom.Akira!g2
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.A!300
Heur.AdvML.A!400
Heur.AdvML.A!500
Heur.AdvML.B
Heur.AdvML.C
|
Akira Stealer
According to recent reports there's a stealer that goes by the name of Akira that's being advertised and actively used, whether it's for tests or actual malicious activities. This is a run-of-the-mill stealer (written in Python) that's capable of stealing PC data, crypto wallets, 2FA extension dump, login credentials, cookies, credit cards, and autofill information from Chromium browsers.
Symantec protects you from this threat, identified by the following:
File-based
Infostealer
Trojan.Gen.MBT
|
AKO ransomware malspam uptick
We have become aware of recent reports of AKO ransomware activities. This ransomware family was first discovered in January 2020 and is mainly distributed via malspam campaigns. Similar to other prevalent ransomware variants, besides encrypting user data AKO will also attempt to delete any backups and shadow volume copies it finds.
The malware drops a text ransom note named “ako-readme.txt” to several folders on the infected machine and a random extension gets appended to the names of the encrypted files. AKO is also capable of ping scans of networked machines that allows for further lateral movement into the infected network.
We recommend regular backup procedures of any important files and applying the latest product definitions to protect against the ransomware threat.
Symantec Protections
Downloader
Packed.Generic.505
Ransom.Cryptolocker
Trojan.Gen.2
Trojan.Gen.MBT
Trojan Horse
|
Albabat Ransomware (aka White Bat)
In recent weeks, Albabat Ransomware (also known as White Bat) has been observed making the rounds, targeting companies and consumers in various countries (e.g., Hungary, Kazakhstan, the US, Czech Republic, etc.). According to the observed binaries, the group seems to be using a fake Windows 10 digital activation tool to infect users.
Upon successful compromise, in addition to encrypting files, this ransomware leaves its mark by altering the machine's wallpaper (a white bat logo on a black background) and deploying a ransom note in HTML format.
The note contains detailed information about the group, explanations regarding the employed encryption method, contact details (a Proton mail email address), and instructions for ransom payment (a Bitcoin address and price). In recent activities, they were asking for 0.0015 Bitcoin (worth 67.87 USD at the time of writing). There is no explicit mention of double extortion in their ransom note, and victims are advised to reach out only if they are willing to comply with the ransom demands.
Folder & files created by Albabat
%USERPROFILE%\Albabat\Albabat.ekey
%USERPROFILE%\Albabat\Albabat_Logs.log
%USERPROFILE%\Albabat\personal_id.txt
%USERPROFILE%\Albabat\readme\README.html
%USERPROFILE%\Albabat\readme\assets\banner.jpg
%USERPROFILE%\Albabat\readme\assets\script.js
%USERPROFILE%\Albabat\readme\assets\style.css
%USERPROFILE%\Albabat\readme\pages\faq.html
%USERPROFILE%\Albabat\wallpaper_albabat.jpg
Symantec protects you from this threat, identified by the following:
Behavior-based
ACM.Vss-DlShcp!g1
ACM.Ps-Reg!g1
ACM.Ps-Sc!g1
ACM.Untrst-RunSys!g1
SONAR.SuspLaunch!g250
SONAR.SuspLaunch!gen4
SONAR.SuspLaunch!g18
SONAR.SuspLaunch!g253
SONAR.Cryptlocker!g38
File-based
Trojan.Gen.MBT
Ransom.Albabat
|
Alchimist attack framework leveraged to spread Insekt RAT
A new attack framework dubbed Alchimist has been discovered in the wild and is reported to be leveraged in attacks against Windows, Linux and MacOS endpoints. The framework allows attackers to generate and configure payloads as well as build custom infection mechanisms for them. Alchimist has been already used to spread Golang-based malware known as Insekt RAT that possesses remote access and shellcode execution capabilities. Beside Insekt, some other tools have been distributed in the observed campaigns, among them MacOS privilege exploitation tools, Fscan tool and reverse proxies.
Symantec protects you from this threat, identified by the following:
File-based
Hacktool
ISB.Downloader!gen48
JS.Downloader
OSX.Trojan.Gen
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.NPE
Web-based
Observed domains/IPs are covered under security categories
|
ALC ransomware
ALC is a ransomware variant that just recently appeared on the threat landscape. The malware acts more like a scareware since it does not really encrypt any files on the compromised system at this time but only enumerates them. This possibly indicates the ransomware might still be in the development phase. ALC drops an additional binary on the system named AlcDif.exe, which when executed displays the ransom note in full screen mode thus imitating a screen locker type of threat.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
File-based
Ransom.Gen
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.C
|
Alduin botnet activity
In recent months, Symantec has observed Alduin botnet activity for which the source code is available on a well-known code hosting platform for version control and collaboration. While activities are still relatively low, it will likely increase as it is continually being shared on hacking and underground forums, various websites and SNS.
Symantec has the following protection in place against this bot:
File-based
Heur.AdvML.C
WS.Malware.1
|
AlienFox toolkit leveraged for harvesting of credentials
Alienfox is a modular malware toolkit leveraged in recent attacks targeting harvesting of credentials for popular cloud service providers such as AWS, MS Office365, Twillio, Zimbra and many more. AlienFox uses data-extraction scripts to search misconfigured servers for sensitive configuration files commonly used to store secrets, such as API keys, account credentials, and authentication tokens. AlienFox is sold by the threat actors via private Telegram channels, with some of the modules also readily available on Github repositories.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen6
File-based
Hacktool
Trojan Horse
WS.Malware.2
Web-based
Observed domains/IPs are covered under security categories
|
Alina still looking for Point-of-Sale victims
By now many people will have heard of Alina, a Point-of-Sale malware that was first observed in 2012. Over the years, this malware has targeted many retailers and restaurants. Despite being a bit dated, Symantec continues to observe occasional activity. POS devices and machines running POS software aren't safe from this malware. Earlier this year, a campaign was observed in which Alina used DNS tunneling to steal victim's credit card details, and these activities continue.
Symantec has the following protection in place:
File-based
Infostealer.Alina
Trojan.Gen.2
Trojan.Horse
Smg.Heur!gen
Heur.AdvML.C
|
AllaKore RAT targets Mexican banks in latest campaign
AlleKore RAT distribution campaign targeting Mexican banks and cryptocurrency entities has been observed in the wild. Most recent instances of this campaign show threat actors leveraging malicious .msi files and .NET loaders in order to deploy a modified version of AllaKore RAT payloads. AllaKore is a Delphi-based and open-source malware known since at least 2013. The malware has various capabilities including keylogging, screenshot capture, reverse shells execution, clipboard clipping or download and execution of malicious binaries.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.MalTraffic!gen1
SONAR.TCP!gen1
File-based
Infostealer.Bancos
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
WS.Reputation.1
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.A!400
Heur.AdvML.A!500
Heur.AdvML.B!100
Heur.AdvML.B!200
Network-based
System Infected: Bad Reputation Application Network Activity
System Infected: Bad Reputation Process Request 4
System Infected: Trojan.Backdoor Activity 634
System Infected: Trojan.Backdoor Activity 638
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products
|
Alloy Taurus APT Targeting Southeast Asian Government Institution
Throughout 2022, the Alloy Taurus APT constantly attempted to spy on government institutions situated in Southeast Asia. In order to establish a foothold in target machines, a huge number of web shells were deployed via vulnerabilities in Exchange Servers as their infection vector. In addition, a backdoor was installed to help lock in access. A cyber espionage operation such as this can potentially provide threat actors with a large amount of sensitive data and intellectual property (IP) against a targeted entity.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen6
File-based
Backdoor.Cobalt!gm1
Backdoor.Trojan
Hacktool
Hacktool.Fscan
Hacktool.PassReminder
Trojan.Gen.MBT
Trojan.Gen.2
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Heur.AdvML.C
Heur.AdvML.L
Heur.AdvML.M
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products.
|
Almost 100 organizations in Brazil targeted with banking Trojan
Up to 100 organizations in Brazil have been targeted with a banking Trojan since approximately late August 2021, with the most recent activity seen in early October. The initial vector of these campaigns is likely a malicious URL spread via either spam email campaigns or through malvertising. Attacks consist of multiple stages of component downloads with the final payload being the banking Trojan. These downloads include a legitimate Oracle application which is used to execute the malicious banking Trojan file, mpr.dll, by way of DLL search order hijacking.
Symantec protects you from this threat, identified by the following:
File-based
Infostealer.Bancos
Infostealer.Bancos!g4
Trojan Horse
Trojan.Gen.2
Trojan.Malmsi
Web-based
Observed domains are covered under security categories
|
Alpha Ransomware
Alpha, a new ransomware that first appeared in February 2023 and stepped up its operations in recent weeks, has strong similarities to the long defunct NetWalker ransomware, which disappeared in January 2021 following an international law enforcement operation. Both threats use a similar PowerShell-based loader to deliver the payload. In addition to this, there is a significant amount of code overlap between the Alpha and NetWalker payloads. While Alpha first appeared in February 2023, it maintained a low profile until recent weeks when it appeared to begin scaling up its operations and launching a data leak site.
Read more in our blog: Alpha Ransomware Emerges From NetWalker Ashes
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.TCP!gen6
File-based
Ransom.Alpha
Ransom.Gen
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.A!400
Heur.AdvML.A!500
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
|
Alpine bank users credentials at risk of smishing attack
Symantec has recently observed a smishing campaign targeting customers of Alpine Bank - a community bank based in Colorado, USA. They operate in various cities and towns across the state and are known for their focus on community involvement and customer service, with the attackers hoping to snatch their credentials.
The individuals or groups behind this attack have sent malicious messages to mobile users, informing them that their debit card has been locked following suspicious activities, and inviting them to click on the provided URL. While this type of social engineering tactic is prevalent worldwide, seasoned actors usually engage in domain typo-squatting to increase their chances of tricking users. In this instance however, the crooks have simply created a fake Alpine Bank login page for a domain that is clearly not similar to Alpine Bank's domain.
Observed SMS:
We have temporarily locked your debit card due to recent Activities, Kindly visit hxxps[:]//aquamed[.]com[.]pe/c/Alphine/e to verify Now
Symantec protects you from this threat, identified by the following:
Mobile-based
Symantec Endpoint Protection Mobile is able to analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake domain domain used in this campaign is known to WebPulse.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products.
|
Amadey bot leveraged to distribute Lockbit Black ransomware
Amadey bot has been reported as being leveraged to distribute Lockbit Black ransomware in some recent campaigns. The attack chain involves either malicious word documents or executable binaries masqueraded as word documents. Amadey bot is a malware variant capable of system reconnaissance, info-stealing and loading arbitrary payloads. Already in the past Amadey has been used to spread various ransomware payloads, GandCrab among others.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.UACBypass!gen30
File-based
Downloader
Scr.Malcode!gen
Trojan Horse
Trojan.Amadey!g1
Trojan.Gen.MBT
Trojan.Gen.NPE
W97M.Downloader
WS.Malware.1
WS.SecurityRisk.4
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Network-based
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories
|
Amadey Botnet Activities continue
The Amadey botnet is still active and we continue to observe new attacks. Having been sold on the black market since at least 2018, multiple groups and individuals have purchased its services to distribute their payloads. A notorious group known as TA505 has even used the Amadey botnet to deliver a remote access Trojan (RAT) called FlawedAmmyy.
The group behind this malware and their customers have employed various infection vectors including Exploit kits such as RIG and Fallout, as well as email spam runs in order to infect even more machines. It should be noted that the authors constantly push out new versions (up to at least v1.99 at the time of this writing) with recent samples compiled using MINGW32.
Currently, Amadey is capable of downloading custom payloads and attempts to steal host, username and password information from the following applications on victim machines:
filezilla
purple
wcx_ftp
realvnc
tightvnc
tigervnc
winscp
outlook
email
mikrotik winbox
Below is a collection of screenshots of a recent Amadey Command-and-Control (CnC) server we investigated (relevant information has been provided to law enforcement).
Login Panel
Statistics
All units (infected machines)
Credentials
Tasks
Settings
This month has seen various activities relating to Amadey, one example being a spam campaign that includes malicious HTML files which deliver Amadey if the victim falls for the social engineering ploy. Those emails have been sent to various organizations such as government agencies and educational institutions.
Email subject: Transferencia exitosa
Malicious URL (HTML file): http[:]//[REMOVED]/[REMOVED]/Tranferencia_140920.Uue
Symantec has a range of protections in place for Amadey and the mix of payloads it's known to download (e.g. Remcos, Smokeloader, FlawedAmmy) as well as the various exploit kits (e.g. RIG and Fallout) that have been used as infection vectors.
File-based
Trojan.Amadey*
Packed.Generic.525
SONAR.SuspBeh!gen650
Trojan.FlawedAmmyy*
Sonar.FlawedAmmyy*
Backdoor.Remvio*
Trojan.Smoaler*
Heur.AdvML.B
WS.Malware.1
WS.Malware.2
Network-based
System Infected: Trojan.Amadey Activity*
System Infected: Trojan.Smoaler Activity*
Web Attack: RIG Exploit Kit Website*
Web Attack: Exploit Toolkit Website 69
Web Attack: Exploit Toolkit Website 75
Web Attack: Exploit Toolkit Website 99
Malicious Site: Malicious Domain Request 23
System Infected: Trojan.Backdoor Activity 402
System Infected: Trojan.Backdoor Activity 459
Web Attack: Rig Exploit Kit Redirection*
Web Attack: Rig Exploit Kit SWF Download*
Email-based
Exploit/Link.G
|
Amadey Bot spread with the help of SmokeLoader malware
A new campaign distributing the Amadey bot has been discovered. According to a recent report, the botnet binaries are installed with the help of the SmokeLoader malware disguised as software cracks or keygen apps. Amadey is used by the attackers mostly to steal confidential information from the compromised hosts but it can download and install additional payloads as well.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.Heur.RGC!g542
SONAR.TCP!gen1
File-based
Trojan.Amadey
Trojan.Amadey!g1
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Web-based
Observed IPs/domains are covered under security categories
|
Amadey infostealer delivered via recent ClearFake campaign
A recent ClearFake campaign has been delivering the Amadey infostealer as the final payload. The campaign is leveraging social engineering techniques, delivering malware via fake browser updates to the victims. Malicious JavaScript code is injected into compromised websites and executed when victims navigate to the page. This leads to malware payload being downloaded as a browser update. Threat actors behind ClearFake have also been observed to employ a new technique known as EtherHiding, which uses the Binance SmartChain to distribute malicious JavaScript to potential targets.
Symantec protects you from this threat, identified by the following:
Behavior-based
ACM.Ps-Rd32!g1
ACM.Ps-RgPst!g1
ACM.Untrst-RgPst!g1
SONAR.Dropper
SONAR.TCP!gen1
File-based
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.A!400
Heur.AdvML.A!500
Heur.AdvML.B!100
Heur.AdvML.B!200
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products
|
Amadey malware family remains an active threat in the landscape
Amadey is an infostealer variant enriched with additional functionalities allowing it to download and execute malicious payloads such as ransomware. While this malware family has been known for a relatively long time, new Amadey samples are found in the wild almost every day. Modular architecture combined with both infostealing and payload loading capabilities allow for this malware to be used in miscellaneous of campaigns by different threat groups. Amadey is known to be distributed via a wide variety of ways including malicious attachments, drive-by-downloads masqueraded as cracked software, malvertising or exploit kits.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Ps-Rd32!g1
ACM.Untrst-RunSys!g1
Behavior-based
AGR.Terminate!g2
SONAR.MalTraffic!gen1
SONAR.SuspBeh!gen616
SONAR.TCP!gen1
SONAR.UACBypass!gen30
File-based
Trojan.Amadey
Trojan.Amadey!g1
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.A!400
Heur.AdvML.A!500
Heur.AdvML.B!100
Heur.AdvML.B!200
Network-based
System Infected: Activity - Bad Application Reputation Application 7
System Infected: Bad Reputation Process Request 4
System Infected: Trojan.Backdoor Activity 634
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products
|
Amadey trojan updated to collect Mikrotik router and Outlook data
Amadey, a Trojan used for credential harvesting and remote control, has been updated. Amadey's cred stealer plugin component now has the added ability to harvest Mikrotik router and Outlook data. This new functionality will be useful to attackers as this data can contain valuable information.
Symantec protects you from these threats, identified by the following:
File-based
Trojan.Gen.MBT
Trojan Horse
|
Amadey v2.07 observed in-the-wild
The Amadey bot authors have been quite active this year pushing out multiple updates, and recently a new version (2.07) has been seen. This bot for sale has been used by multiple groups (such as TA505) and individuals as a simple stealer, and to download additional malware onto compromised machines. Since it was first seen, this malware has been spread using various different vectors including Exploit kits such as RIG and Fallout, as well as malicious emails.
Symantec has the following coverage in place for this threat and recent activities.
File-based
Trojan.Amadey
Packed.Generic.525
Heur.AdvML.B
WS.Malware.1
WS.Malware.2
|
A malware with that ship sir?
Social engineering related to the shipping industry has been around for a long time now and while some are pretty basic, a few are slightly more effective when coupled with industry knowledge. Over the years we have seen multiple groups and individuals who did their research and learnt about bulk carriers, container ships and oil tankers. A recent example, Symantec has observed a global campaign that leverages active ships – Harbour Splendor, Ocean Dragon, Ocean Gemstone, Federal Island and Da Tong Yun Voy. If successfully lured by the malicious email, users will unknowingly execute a disguised Formbook.
Observed email subjects
MT HARBOUR SPLENDOR/03/ DISCHARGING PORT AGENT APPOINTMENT
MV OCEAN DRAGON - DISCHARGE IRON ORE / AGENCY APPOINTMENT
MV FEDERAL ISLAND CTM DELIVERY
MV OCEAN GEMSTONE (V2201) // AGENT NOMINATION
M.V //DA TONG YUN VOY// AGENCY NOMINATION FOR DISCHARGING WHEAT
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
File-based
Trojan.Formbook
Trojan.Gen.2
Trojan Horse
Machine Learning-based
Heur.AdvML.B
|
AMEXTROLL Android banking malware
Android banking malware known as AMEXTROLL (also known as Brata) has been spotted in the wild and actively advertised on underground forums, being sold for $3,500 per month. According to reports an actor has been targeting Android users with this threat via phishing websites and disguising it as a security application - a common social engineering tactic these days in the mobile threatscape.
Symantec protects you from this threat, identified by the following:
Mobile-based
AppRisk:Generisk
Web-based
Observed IPs/domains are covered under security categories
|
A multi-stage PowerShell attack packed with Cobalt Strike
Recently, a group of researchers discovered a multi-stage PowerShell attack delivered via a malicious PDF document file that masquerades as Kazakh Ministry of Health Care. Last November 8, an individual named 'DangerSklif' uploaded the first part of the attack via Github.
The attack will commence from a LNK file, and upon execution the file opens up a PDF file as a decoy while simultaneously running a PowerShell outlined to perform several techniques such as privilege escalation and persistency through an autorun registry key. The attack by design will take a few more other steps to stay under the radar in an attempt to increase the likelihood of deploying Cobalt Strike on to its targets.
Symantec protects you from this threat, identified by the following:
File-based
CL.Downloader!gen4
ISB.Heuristic!gen58
ISB.Downloader!gen446
ISB.Downloader!gen77
Trojan Horse
Web-based
Observed domains are covered under security categories
|
Andariel group deals in ransomware
Andariel group has primarily focused their attention on entities in South Korea, targeting home network services, manufacturing, media, and construction sectors. The threat actor has been linked to second and third stage payloads that leveraged malicious Word documents containing a macro as a means for infection. This initial infection implant is to set the stage for communicating with a C2 server (decrypting and executing the embedded payload) to commence backdoor operations. The final payload download goes only to select victims to maximize payout with a ransom note on the desktop and in the startup folder that runs with notepad.
Symantec protects you from this threat, identified by the following:
File-based
Heur.AdvML.B
Infostealer
Trojan.Gen.2
Trojan.Gen.MBT
Trojan Horse
W97M.Downloader
WS.Malware.1
WS.Malware.2
Network-based
URL reputation: Browser navigation to known bad URL
Web-based
Observed IP/Domains are covered under security categories
|
AndoryuBot DDoS botnet
Recently, light has been shed on a botnet known as AndoryuBot which is exploiting the Ruckus vulnerability (CVE-2023-25717) to carry out DDoS attacks. CVE-2023-25717 is a remote code execution vulnerability which impacts multiple Ruckus wireless devices. The attack vector starts with gaining access to devices having Ruckus vulnerability followed by establishing connection with its C2 server using SOCKS protocol, the malware then receives command from its C2 server to launch DDoS attacks.
Symantec protects you from this threat, identified by the following:
File-based
Linux.Mirai
WS.Malware.1
Network-based
Attack: Ruckus Wireless Admin RCE CVE-2023-25717
Web-based
Observed domains/IPs are covered under security categories
|
Android 888 RAT used in cyberespionage
Android remote access tools and trojans continue to be utilized by various groups and individuals to spy on their victims. This type of malware is highly prevalent as over the years, many have been cracked and leaked for free on forums, websites and social media. Some of the attackers are groups like BladeHawk which has been using one these cracked RATs known as 888 RAT in their cyberespionage campaigns.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
Android.Reputation.1
|
Android banking malware, S.O.V.A.
Mobile banking malware, around for some years now, is both highly prevalent and numerous. It's a profitable business for cybercriminals and new ones are regularly advertised underground. It has been reported that another mobile banking malware variant has appeared on the underground market, this one known as S.O.V.A. like other run-of-the-mill mobile banking malware it relies heavily on the overlay technique.
Symantec protects you from this threat, identified by the following:
Mobile-based
Android.Reputation.1
|
Android banking malware targeting Mexico
A new mobile malware posing as a banking security tool has been discovered. The malware targets users in Mexico and is reported to be distributed via phishing pages. The fake tool reports some suspected fraudulent transactions taking place on the users' account and advises to block them. The threat actors are going after the user's login data and access to the SMS messages on the compromised devices so that they can also intercept the second authentication factor in the form of SMS verification messages from the financial institutions.
Symantec protects you from this threat, identified by the following:
Mobile-based
Android.Reputation.2
AppRisk:Generisk
|
Android banking trojan GoldDigger
GoldDigger is a new banking trojan malware for Android. This malware variant has been recently observed in campaigns targeting Android users in Vietnam. GoldDigger abuses Accessibility Services on the infected device in order to exfiltrate personal data, SMS messages, 2FA credentials, banking credentials, and data from cryptocurrency apps and wallets, among others. On top of this, the malware also has keylogging and remote access capabilities.
Symantec protects you from this threat, identified by the following:
Mobile-based
Android.Malapp
Android.Reputation.2
AppRisk:Generisk
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products
|
Android Blackrock continues to pose as COVID mobile applications
Ever since the pandemic started, we have observed multiple attempts at disguising Android malware as COVID related mobile applications produced by various country's organizations. First observed in early 2020, Blackrock is one of these threats that has been seen slipstreaming COVID-19. In January 2021, more Blackrock purporting itself as legitimate COVID applications has been seen.
Believed to be based on Xerxes source code which itself was an Android Lokibot variant, Blackrock is capable of stealing password and credit card information from more than 300 applications. Symantec has the following coverage in place:
Mobile-based
Android.Reputation.2
|
Android FakeBank, from Yanbian to South Korea
In February, we published a bulletin on Fakebank Android malware seen targeting South Korea's financial industry and their customers. There have been reports of more of these FakeBank Android malware which a group named the Yanbian gang has been associated with. Active since at least 2013, this gang made South Korea's banking industry a focus of their activities.
Symantec protects you from these threats, identified by the following:
Mobile-based
AppRisk:Generisk
|
Android Joker, endlessly active
It's been years now, and the Android Joker malware is still not showing any signs of stopping as malicious apps continue to be discovered on Google Play. Disguised as genuine applications within app stores (unchanged modus operandi) the Joker malware, upon being downloaded and installed on a user's device, can engage in diverse malicious activities. These activities encompass sending SMS messages to premium numbers, enrolling users in premium services without their consent, and pilfering sensitive information.
Symantec protects you from this threat, identified by the following:
Mobile-based
AppRisk:Generisk
|
Android Locker via fake documents
While ransomware is wreaking havoc in the desktop landscape, Symantec continues to see Android Locker targeting mobile users, although it is far less prevalent than it was a couple of years ago. In a recent example, we observed Malaysian actors posing their locker as fake documents (DOC-[date]-[random characters].apk). On top of being able to lock one's Android phone screen, it is also capable of collecting sensitive data such as device information, SMS messages, contacts, and camera data. Victims are prompted via a new wallpaper set by the actor to connect through Telegram and pay the ransom in exchange for the unlock code.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
|
Android Malspam Campaign Targets India
India-based users recently received messages via WhatsApp or Telegram from an entity claiming they work for various institutions including banks, government services and utilities. Targeted users are requested to update their permanent account number (PAN) using the bank application the threat actors forwarded ([org name]-bank.apk), and if they don't, are warned their bank account will be blocked. If the intended victims comply and the malicious APK file gets installed successfully, attackers will then be capable of stealing personal information and bank-related credentials.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.2
WS.Malware.2
Mobile-based
Android.Reputation.2
|
Android malware, AbstractEmu
AbstractEmu is an Android malware with spying and remote access capabilities, as well as the ability to gain root access. In late October, multiple instances were observed on both the Google Play Store and third-party stores. To lure victims, actors disguised their malware as Android applications designed to help manage passwords, data usage and money.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
AppRisk:Generisk
Android.Reputation.2
|
Android RAT used to target Indian Defence Personnel
A variant of Spymax RAT has recently been used to target Indian Defence Personnel. Spymax RAT's code is publicly available, hence it's use by multiple groups and individuals. Defence Personnel are lured via WhatsApp Chat using promotion letters, then enticed into installing a fake PDF reader application. The malicious application will then obtain access to device resources to collect and ex-filtrate confidential data which could lead to a breach of National Security.
Symantec protects you from this threat, identified by the following:
Mobile-based
Android.Reputation.1
Android.Reputation.2
|
Android spyware updates from threat actor group APT-C-23
New variants of Android spyware associated with a threat actor group targeting the Middle East have been observed. According to available reports the threat actor group identified as APT-C-23 has updated their Android malware multiple times in 2020. Some updated functionality includes:
Ability to read notifications sent by messaging apps
Recording calls and screenshots
Bypassing protection provided from built-in Android security apps by dismissing notifications
A more secure and dynamic interaction with the C&C server
For distribution, the spyware was hosted on a fake Android app store and leveraged well-known Android applications as a lure.
Symantec provides the following coverage through Symantec Mobile Insight:
Mobile-based
AppRisk:Generisk
Other:Android.Reputation.1
|
Android users, beware of SpyMax RAT!
There are many active Remote Access Trojans in the mobile threatscape, being used against both enterprise and consumers on a daily basis. SpyMax RAT is one such threat that has been very prevalent over the past two years, mainly because it's widely shared for free on various underground forums, social media and websites, making it readily available to groups and individuals of various technical skill.
The main capabilities of SpyMax include:
Collect photos, files, location and contacts
SMS and call manager
Microphone and video capture
Symantec has been monitoring this malware activity for some time and we've seen it being delivered via third party markets, drive-by-download, masquerades and even spam campaigns. More recently, actors have leveraged COVID-19 disguising their spyware as Android contact tracer applications.
Symantec Endpoint Protection Mobile has the following protection in place:
Android.Spymax
Android.Reputation.2
|
Android users targeted by the Bahamut Threat Actor
According to the latest report, threat group known as Bahamut has been distributing malicious Android APK packages via fake websites. The threat group has been known for targeting Middle East and South Asia with phishing and malspam campaigns in the past. Malware spread in this latest instance is a spyware variant able to collect user information from the compromised devices including: contacts, sms messages, call logs etc.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
Android.Reputation.2
|
Andromeda mobile malware
A new mobile banking malware dubbed Andromeda has been discovered in the wild. Andromeda is based on the B4A (Basic For Android) development framework and according to latest reports, primarily targets mobile users in Brazil. Andromeda has the capabilities to perform overlay attacks, extract PII information, monitor received and sent SMS messages, establish remote access sessions and gain access to the victim's banking credentials or One-Time Password (OTP) codes.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
Android.Reputation.2
AppRisk:Generisk
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products
|
AndroSpy gains in prevalence
AndroSpy, an Android remote administration "tool", is an open source project available to the public via a known Internet hosting platform for software development and version control. AndroSpy and its forks (variants) are now part of the mobile threat landscape and continue to gain prevalence. They have been leveraged by multiple groups and individuals to conduct both e-crimes and targeted attacks. Recently, another variant of this RAT has been spotted, disguised as fake voicemail applications.
Symantec protects you from this threat, identified by the following:
Mobile-based
AppRisk:Generisk
|
AndroSpy in the wild
Over the last few months, Symantec has observed several instances of AndroSpy in the wild. It appears that cybercriminals have been playing with AndroSpy, whose source code has been shared on a well-known internet hosting platform for software development and version control, since the second half of 2020. AndroSpy has the basic capabilities of a RAT and Spyware.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
|
AndroxGh0st malware
Symantec Security Response is aware of the recent CISA and FBI alert regarding a number of activities observed for the AndroxGh0st malware. AndroxGh0st is a python-based botnet used to read exposed .ENV files of various widely used applications such as AWS, SendGrid, Microsoft Office 365 or Twilio. The malware conducts a scan for websites that are based on the Laravel web application framework. It also supports additional functions such as deployment of malicious webshells or scan and exploitation of exposed credentials. The threat actors behind AndroxGh0st have been reported to exploit several older RCE vulnerabilities in their attacks including: CVE-2017-9841, CVE-2021-41773 and CVE-2018-15133.
Symantec protects you from this threat, identified by the following:
File-based
Hacktool
PHP.Backdoor.Trojan
Trojan Horse
Trojan.Gen.NPE
WS.Malware.1
Network-based
Web Attack: Apache HTTP Server RCE CVE-2021-41773
Web Attack: Apache HTTP Server CVE-2021-41773 2
Web Attack: PHPUnit RCE CVE-2017-9841
Policy-based
Symantec Data Center Security (DCS) hardening using a custom sandbox for Laravel application can help protect the .ENV files from being exploited
Suspicious Process Execution: Prevention policies prevent malware from being dropped or executed on the system.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products
|
AndroxGh0st malware goes after AWS keys
AndroxGh0st is a python-based malware associated with the threat actor known as Xcatze. The malware is effectively an SMTP cracker, used to read exposed .ENV files of the Laravel web application framework to get hold of configuration data including credentials for AWS, O365, SendGrid, Twilio and more. AndroxGh0st contains various functionalities including exploitation of exposed credentials and APIs but it can also deploy webshells.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen6
File-based
Hacktool
MSIL.Downloader!gen7
Trojan Horse
WS.Malware.1
WS.Malware.2
Machine-Learning based
Heur.AdvML.B
Network-based
Audit: Environment Config File Download Attempt
Web Attack: Androxgh0st Scan Attempt
Policy-based
Suspicious Process Execution: Prevention policies prevent malware from being dropped or executed on the system.
DCS hardening using a custom sandbox for Laravel application can help protect the .ENV files from being exploited
The script is known to write the output to a result folder - this can also be prevented by DCS prevention policies
Web-based
Observed domains/IPs are covered under security categories
|
A new .NET variant of LaplasClipper malware
LaplasClipper is a type of clipboard stealer initially discovered back in 2022. As its name suggest Laplas is a clipper malware that monitors the clipboard on the infected machine for addresses of cryptocurrency wallets. Once found the malware will swap victims' cryptocurrency wallet addresses with ones owned by the attackers. While previously observed LaplasClipper were written in either GO or C++, the most recent samples observed in the wild have been compiled in .NET and obfuscated using Babel obfuscator.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.Heur.Dropper
SONAR.Heuristic.170
File-based
Trojan.Gen.2
WS.Malware.2
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!200
Heur.AdvML.C
Network-based
System Infected: Laplas Clipper Malware Activity
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products
|
A Newer version of BlueFox Stealer observed
A newer version of infostealer known as BlueFox Stealer is being advertised on underground forums. This Infostealer is attributed to Distamx Group and sold as Malware-as-a-Service. The malware is constantly upgraded based on user request and customer response.
BlueFox Stealer was first seen back in December 2021 in Russian-speaking underground forums.
The new variant targets all popular web browsers and focuses on information and credential theft along with known techniques of Screenshot capturing and System fingerprinting. It targets almost all desktop cryptocurrency wallets.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.Dropper!gen2
File-based
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B
|
A new STRRAT distribution campaign observed in the wild
A new campaign distributing the STRRAT malware has been observed in the wild. The malware is spread via malspam disguised as payment invoices with the subject "RE: Pending Invoice Payment//INV-2200541/2023/09/21". The emails have double-extension .doc.jar files attached ("INV-220054120230921.doc.jar") that once extracted lead to the execution of the malicious JavaScript file, which in turn initiates the infection with the RAT payload. STRRAT functionality remains very similar when compared to older variants with capabilities for credentials theft, keylogging, command execution, taking control over the infected system and download/installation of additional arbitrary payloads, among others.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
File-based
ISB.Dropper!gen12
Scr.Malcode!gen
Scr.Malcode!gen69
Trojan.Dropper
Trojan.Gen.NPE
WS.Malware.1
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products
|
A new variant of the FritzFrog botnet has emerged
A new variant of the FritzFrog botnet, exploiting the 2021 Log4Shell vulnerability, has been reported in the wild. This malware targets internet-facing servers, infecting them by brute-forcing weak SSH credentials and aiming at vulnerable Java applications. Additionally, the malware incorporates a module to exploit CVE-2021-4034, a privilege escalation vulnerability in the polkit Linux component, allowing the malware to run as root on vulnerable server.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.NPE
WS.Malware.1
WS.Malware.2
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products
|
A new version of a banking Trojan known as Mekotio
Mekotio, a modular banking Trojan, primarily targets Latin American countries. The start of the infection chain uses phishing emails with claims of a tax receipt pending submission. The message, containing a link to a ZIP or a ZIP attachment, lures the victim to download and extract the ZIP content. The ZIP contains an obfuscated batch script that fetches and executes a PowerShell script. Once the PowerShell script gets launched, it will download a second ZIP archive after some basic checks against location and anti-analysis techniques. The second ZIP, which contains the Mekotio payload in DLL form, is extracted. Mekotio's primary goal is to obtain e-banking credentials and online account passwords from infected victim machines. The exfiltrated data is sent to the C2 server.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
WS.Malware.2
Web-based
Observed domains/IPs are covered under security categories
|
A New Version of Rilide Infostealer
Rilide infostealer is known to target Chromium-based browsers such as Google Chrome, Microsoft Edge, Brave, and Opera. Months after it's first sighting, a new variant was reported to have added support for Chrome Extension Manifest V3 which enables the malicious browser extension to overcome restrictions introduced by Google's new extension specifications, as well as adding additional code obfuscation to evade detection. Further new capabilities include the ability to exfiltrate stolen data to a Telegram channel, and interval-based screenshot captures which are transmitted to it's dedicated C2 server.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.NPE
Web.Reputation.1
WS.Malware.1
WS.Malware.2
WS.SecurityRisk.3
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Heur.AdvML.A!300
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products.
|
Anubis walks among Android users
The infamous Android banking malware known as Anubis is not new but earlier this year the author behind this malware unleashed a new version. Multiple ads for Anubis 7.0 have been spotted on Youtube and underground forums. This version is definitely not cheap but if it successfully remains undetected, it could bring a good payday to the actor running the samples. The author states that it's able to inject up to 228 banks and cryptocurrency services around the world. On the observed ads, Anubis is being sold for $6500 with automatic GoogleProtect shutdown, and the sellers even offer a rental service at $1200 for 1 month, $2800 for 3 months and $4000 for 6 months.
Symantec confirms that the malware continues to roam among Android users and has recently observed malicious mobile applications purporting to be COVID-19 related support, with some instances faking known social applications, all stored on fake websites or third party markets.
Protection is in place for Symantec Endpoint Protection Mobile products as follows:
Trojan.Malapp
Trojan.Fakebank
Trojan.Mobilespy
|
Aobo keylogger for macOS
Aobo is a keylogger software for macOS that allows keystroke recording, password capture, website and messaging chat monitoring, among others. While the keylogger has been commercially sold for many years, there have been known instances of threat actors leveraging it for malicious purposes. In such attacks Aobo might be launched by malware droppers, malicious scripts or distributed under the disguise of legitimate applications.
Symantec protects you from this threat, identified by the following:
File-based
OSX.Spyware.AoboKeyLog
OSX.Trojan.Gen
OSX.Trojan.Gen.2
WS.SecurityRisk.1
|
Apache ActiveMQ RCE vulnerability (CVE-2023-46604) exploited in ransomware attacks
CVE-2023-4660 is a recently disclosed critical (CVSS score: 10) remote code execution vulnerability affecting Apache ActiveMQ. If successfully exploited the vulnerability might allow remote unauthenticated attackers to run arbitrary shell commands on the vulnerable systems. Apache has already released security updates for the affected products at the end of last month. Meanwhile the vulnerability has been actively exploited by several threat actors in attacks delivering SparkRAT, TellYouThePass and HelloKitty ransomware variants.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.Cryptolocker!g75
SONAR.MalTraffic!gen1
SONAR.SuspLaunch!g18
SONAR.SuspLaunch!g253
SONAR.TCP!gen1
File-based
JS.Malscript!g1
Ransom.HelloKitty
Ransom.Tellyouthepass
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.A!500
Heur.AdvML.B
Heur.AdvML.C
Network-based
Attack: Apache ActiveMQ RCE CVE-2023-46604
System Infected: Bad Reputation Process Request
Web Attack: Malicious Java Payload Download
Policy-based
Symantec Data Center Security default lockdown policy protects the underlying operating systems from this exploit. DCS network rules in the policy can be configured to limit ActiveMQ applications to trusted clients.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products
|
Apache ActiveMQ RCE vulnerability (CVE-2023-46604) exploited to deliver Kinsing malware
CVE-2023-46604 is a recently disclosed critical remote code execution vulnerability affecting Apache ActiveMQ. According to recent reports, threat actors associated with the Kinsing malware are actively taking advantage of this vulnerability to infiltrate and compromise Linux systems. The Kinsing malware enters through the exploitation of vulnerabilities in web applications or misconfigurations in container environments. Once a system is infected, the malware rapidly spreads throughout the network, posing a significant risk to overall security.
Symantec protects you from this threat, identified by the following:
File-based
JS.Malscript!g1
Trojan.Gen.NPE
Trojan Horse
WS.Malware.1
Network-based
Attack: Apache ActiveMQ RCE CVE-2023-46604
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products
|
Apache Commons Text RCE CVE-2022-42889 vulnerability (aka Text4Shell)
A new critical vulnerability affecting the Apache Commons Text library has been discovered. The flaw identified as CVE-2022-42889 (aka Text4Shell) allows for remote code execution on vulnerable servers if successfully exploited. The vulnerability affects Apache Commons Text version 1.5 through 1.9. A patched version (1.10.0) of the software has already been released by the Apache Software Foundation and users are recommended to apply the update on the vulnerable software instances.
Symantec protects you from this threat, identified by the following:
Network-based
Web Attack: Apache Commons RCE CVE-2022-42889
Policy-based
DCS Apache protection policy and custom sandboxing with advanced hardening controls provide default runtime protection for this vulnerability.
|
Apache Struts vulnerability CVE-2023-50164 exploited in the wild
CVE-2023-50164 is a recently disclosed critical (CVSS score: 9.8) path traversal vulnerability affecting Apache Struts2 open-source web application framework. If successfully exploited it might allow attackers path traversal and lead to a remote code execution (RCE). The exploit code for the vulnerability has been released publicly and the vulnerability has also been reported as exploited in the wild. Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue.
Symantec protects you from this threat, identified by the following:
Network-based
Web Attack: Apache Struts2 RCE CVE-2023-50164
Web Attack: Apache Struts2 RCE CVE-2023-50164 02
|
ApoMacroSploit - a new malware builder found in the wild
Symantec Security Response has been aware of the reports about a new Office malware builder dubbed as APOMacroSploit. The builder allows for creation of XLS files that attempt evasion of AV products and anti-phishing mechanisms. The tool includes a "WD disabler" option that disables Windows Defender on the targeted systems before executing the payload. In the reported campaign, the malicious documents created with the help of APOMacroSploit have been used to deliver the BitRAT malware.
Symantec provides the following detections against the malware samples related to this campaign:
File-based
Bloodhound.RTF.20
Scr.Malcode!gen3
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Mdropper
W97M.Downloader
|
AppleJeus cryptocurrency malware used by Lazarus group
The U.S. Government has released a new alert detailing cryptocurrency malware-related activity performed by the Lazarus threat actor group. The alert provides reports on multiple cryptocurrency malware families that are leveraged by this group and are identified under the moniker AppleJeus.
Symantec coverage is identified below and will be updated appropriately as analysis continues.
File-based
Heur.AdvML.C
OSX.Dropper
OSX.Malcol.2
OSX.Trojan.Gen
Trojan Horse
Trojan.Dropper
Web-based
Observed domains are covered under security categories
|
Apple Pay smishing campaign hits mobile users
Over the past year, phishing via Short Message Service (SMS) has steadily increased in activity - these attacks are also known as "smishing" in the cybersecurity world. Most of these campaigns lead to fake websites where victims are lured to input their credentials but there have also been instances where these websites would draw them into installing a mobile malware. When it comes to credential phishing, actors primarily purport themselves as services linked to finances such as banks. Recently, there was a campaign targeting Apple users where the victim would receive an SMS saying their Apple Pay has been temporarily suspended, asking them to visit a website to confirm details. If successfully tricked into doing so, the fake website will then attempt to phish the user's financial information.
Symantec protects you from this threat, identified by the following:
Mobile-based
Symantec Endpoint Protection Mobile is able to also analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect.
Web-based
Observed domains are covered under security categories
|
APT28 group targets Ukraine with new MASEPIE malware
In the latest campaign targeting Ukraine, APT28 aka Fancy Bear or Strontium, utilizes phishing emails urging recipients to click on a link supposedly to view an important document.
The links redirect victims to malicious web resources that employ JavaScript to drop a Windows shortcut file (LNK) that launches PowerShell commands to trigger an infection chain for a new Python malware downloader called 'MASEPIE.' The malware's primary role is to download additional malware on the infected device and steal data.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.MBT
Web.Reputation.1
WS.Malware.2
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.