text
stringlengths
0
383k
APT29 aka Cloaked Ursa targets diplomatic missions in Ukraine APT29 threat group also known as Cloaked Ursa has been engaged in a recent malicious malware delivery campaign targeted at diplomatic missions in Ukraine. The attackers have been leveraging lures through car sale advertisements sent as document flyers to the intended victims. Upon execution of the link embedded in the malicious document, the victim would be redirected to a website hosting the malware payloads. The dropped payload uses Microsoft Graph and Dropbox APIs to communicate with the C2 servers and retrieves further commands from the attackers via those channels. Symantec protects you from this threat, identified by the following: File-based Meterpreter Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE Trojan.Malscript Scr.Malcode!gdn34 WS.Malware.2 Machine Learning-based Heur.AdvML.A Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
APT36 (aka Transparent Tribe) delivering CapraRAT via cloned YouTube application Yet more activity from APT36 (aka Transparent Tribe) this time delivering CapraRAT, an Android APK that mimics the appearance of YouTube. Upon installation the application will list several permissions it requires and if permitted, attackers will subsequently gain access over the victim's device which will enable them to gather and exfiltrate personal information. CapraRAT's list of capabilities include: Recording with the microphone, front & rear cameras Collecting SMS and multimedia message contents, call logs Sending SMS messages, blocking incoming SMS Initiating phone calls Taking screen captures Overriding system settings such as GPS & Network Modifying files on the phone’s filesystem Symantec protects you from this threat, identified by the following: File-based WS.Malware.1 Mobile-based Android.Reputation.2 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
APT37 targeting journalists, human rights activists and North Korean defectors APT37 (also known as ScarCruft or Temp.Reaper) is a nation-state sponsored APT actor, with activity attributed as far back as 2016. The group is known to target North Korean defectors, as well as journalists and human rights activists who cover North Korea-related news. On a recent campaign, the potential victim received a spear-phishing email with a malicious document attached. Through the macros in the document and the use of PowerShell commands, the APT group tried to download and further infect the victim's device with a customizable backdoor called Chinotto. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Machine Learning-based Heur.AdvML.* Web-based Observed domains are covered under security categories
APT Bahamut Targeting Android Phone Users Security researchers have discovered a mobile campaign targeting individuals located in South Asia. The Android malware known as "CoverIm" was delivered via WhatsApp disguised as a Chat application named SafeChat. The malware is capable of infecting victim's devices with spyware that can steal call logs, texts, and GPS locations. CoverIm was also crafted to steal data from apps including Telegram, Signal, WhatsApp, Viber, and Facebook Messenger. Symantec protects you from this threat, identified by the following: File-based WS.Malware.1 Mobile-based Android.Reputation.2 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
APT group associated with ShadowPad launches a new wave of espionage attacks A distinct group of espionage attackers who were formerly associated with ShadowPad remote access Trojan have adopted a new, diverse toolset to mount an ongoing campaign against a range of government and state-owned organizations in a number of Asian countries. The attacks, which have been underway since at least early 2021 appear to have intelligence gathering as their main goal. A notable feature of these attacks is that the attackers leveraged a wide range of legitimate software packages in order to load their malware payloads using a technique known as DLL side-loading. Read more in our blog: New Wave of Espionage Activity Targets Asian Governments Symantec protects you from this threat, identified by the following: Behavior-based SONAR.ProcHijack!gen5 File-based Hacktool Hacktool.Mimikatz Infostealer.Logdatter ISB.Heuristic!gen11 ISB.Heuristic!gen71 PUA.Gen.6 Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.B Heur.AdvML.C Web-based Observed IPs/domains are covered under security categories
APT Group exploits Web3 gaming hype in campaign for cryptocurrency earnings A campaign centered around imitating web3 gaming projects has been observed, likely operated by a Russian-language APT group aiming for potential cryptocurrency earnings by leveraging the allure of blockchain-based gaming. Users are enticed to visit the main webpages of these projects to download the software. Once installed, the software further infects devices with infostealer malware. Depending on the operating system, the malware variants include Atomic macOS Stealer (AMOS), Stealc, Rhadamanthys, or RisePro. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Ps-Rd32!g1 File-based OSX.Trojan.Gen OSX.Trojan.Gen.2 WS.Malware.1 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
APT group – RedFoxtrot A report was recently published on the APT group known as RedFoxtrot, which has been active since at least 2014. Through the years they have targeted (and continue to target) countries in Central Asia, specifically, defense and government agencies but also the telecommunication's industry. They are known for using malware that are used by other groups also linked to cyber espionage. Symantec protects you from these threats, identified by the following: File-based Backdoor.Darkmoon Backdoor.Trojan Heur.AdvML.B Heur.AdvML.C Infostealer Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE Trojan Horse Trojan.Mdropper W97M.Downloader WS.Malware.1 WS.Malware.2 Network-based URL reputation: Browser navigation to known bad URL Web-based Observed IP/Domains are covered under security categories
APT Midge targeting organizations in Russia and Belarus The APT group known as Midge have been observed targeting organizations inside of Russia and Belarus. The group begins the attacks by sending spam messages with HTA files attached. Once the HTA file is opened it begins to download and execute a remote VBA script. The script then attempts to communicate with its C&C server. Once infected the attackers target credentials, network topography and sensitive data exfiltration. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. File-based Trojan.Gen.MBT Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Arbitrium, cross-platform RAT Symantec has observed Arbitrium activity in the threat landscape. Arbitrium is a cross-platform (Android, Windows and Linux) RAT that's been shared on development platforms. It's also being shared onto indexed web such as hacking forums and websites. Symantec has the following protection in place: File-based Heur.AdvML.B Heur.AdvML.C Trojan.Gen.MBT Trojan.Horse WS.Malware.1 Network-based System Infected: Trojan.Backdoor Activity 563
ARCrypter aka ChileLocker ransomware comes with new enhancements ARCrypter aka ChileLocker ransomware emerged back last year in attacks targeting governmental entities in Chile. Since that time the threat actors behind this ransomware expanded their malicious activities and started targeting organizations worldwide. Currently ARCrypter comes in versions supporting both Windows and Linux platforms. The most recent variant encrypts user files and appends .crYpt extension to them. It also has the capability to terminate processes and services related to anti-malware or backup solutions. The threat actors behind this malware seem to be creating dedicated chat sites hosted on TOR network for each of their victims. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.RansomChill!g1 SONAR.SuspBeh!gen678 File-based Ransom.Chill Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.C
ARCrypter is a new ransomware seen in Latin America ARCrypter is a new ransomware with no known connections to previous ransomware families or threat actors, at the time of writing, and it was recently seen in compromises reported in Latin America. The ransomware is known to encrypt files and rename them with .crypt extension. Researchers have found that the malware is now being used outside of Latin America as well. Symantec protects you from this threat, identified by the following: File-based Ransom.Chill Trojan Horse Trojan.Gen.MBT WS.Malware.1 Behavior-based SONAR.SuspBeh!gen678 SONAR.TCP!gen6 Machine Learning-based Heur.AdvML.A Heur.AdvML.B Heur.AdvML.C
Ares - a successor to the Kronos malware Ares banking trojan has been reported as the latest addition to the Kronos malware family. Already back in 2018 and 2019 an earlier variant named Osiris emerged in the wild. Both Osiris and Ares are protected by a malware packer dubbed as DarkCrypter. According to the latest reports, Ares Trojan might further download Ares Stealer on the compromised machines. The infostealer aims at collecting system information and credentials harvesting. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.B Trojan.Gen.2 Trojan.Gen.MBT Trojan Horse WS.Malware.1 WS.Malware.2 Behavior-based SONAR.MalTraffic!gen3 SONAR.SuspBeh!gen54
AresLoader malware AresLoader is a malware variant advertised and sold via hacking forums. It emerged first around December 2022 and several samples of it have been seen already in the wild. The malware can be masqueraded as legitimate applications and under such disguise be delivered to unsuspecting users. Once on the targeted endpoints, the AresLoader will reach out to the preconfigured Command and Control (C&C) servers and download the intended malware payloads. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.C Network-based System Infected: Trojan.Backdoor Activity 634 Web-based Observed domains/IPs are covered under security categories
Arid Viper's recent operations A recently released report identified operations of the APT actor known as Arid Viper that have been ongoing since at least January 2019. The group has been initiating cyber espionage campaigns and leveraging a variety of surveillance and infostealing malware. The distribution methods use social engineering techniques and target Windows as well as iOS and Android users. Symantec protects you from this threat, identified by the following: File-based: Heur.AdvML.C Infostealer Trojan.Gen.MBT Trojan.Gen.2 Trojan Horse Mobile-based AdLibrary:Generisk Android.FakeApp Android.Reputation.1 Trojan:Opfake Web-based Observed domains are covered under security categories
Arid Viper APT masquerades mobile malware as dating apps Arid Viper APT has been observed to masquerade their custom mobile malware as dating apps updates in a recent campaign. The malware is deployed in the form of .APK installation packages that once on the infected device are used to steal device info, user data, call logs, SMS messages, credentials and other confidential information and possibly also deploy additional malicious payloads. A malicious package named “Skipped_Messenger", which is a reference to a dating app called "Skipped", leverages Google’s Firebase system as a command and control (C2) channel for the attackers. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary.Generisk Android.Reputation.1 Android.Reputation.2 AppRisk:Generisk Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
ArkeiStealer activity increase ArkeiStealer is an ordinary infostealer capable of stealing sensitive information, credentials and cryptocurrency wallets. It has been around since at least 2018 and its prevalence has fluctuated over the years. Over the past few weeks, Symantec has observed an increase in activity which is most likely due to cracked versions being released on hacking forums and websites. Actors are primarily using drive-by-download as vector of infection, posing the malicious binary as fake software installer and updates. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT Suspicious: Reputation Machine Learning-based Heur.AdvML.B Heur.AdvML.C
ArkeiStealer dropped under the disguise of trading apps ArkeiStealer malware has recently been distributed in the form of an installer masqueraded as a legitimate TradingView app. ArkeiStealer is a type of info-stealing malware active in the threat landscape for the last few years. The malware is capable of data theft from compromised machines including browser-saved data, credentials, cookies, crypto-wallets and others. In the recent campaign distributing this malware, the attackers have been leveraging a fake website containing backdoored versions of the TradingView app downloader. The attack chain also involves Smokeloader malware execution from the attacker's C2 servers. Once run, Smokeloader will further download the final payload of ArkeiStealer. Symantec protects you from this threat, identified by the following: File-based Infostealer Trojan.Dropper Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.2 Machine Learning-based Heur.AdvML.B Web-based Observed domains/IPs are covered under security categories
Arkei Stealer uptick Arkei Stealer has been around for some time now and continues to appear in the threat landscape. In recent weeks we have observed an increase in activity, mostly being distributed via drive-by-download. Symantec has the following coverage in place: File-based Heur.AdvML.B WS.Malware.1 WS.Malware.2 Trojan.Gen.2 Trojan.Gen.MBT Network-based System Infected: Vidar Malware Activity 2(32043)
ArrowRAT drive-by-download campaigns observed ArrowRAT is a remote access trojan that has been actively sold since at least 2021. Over the past few months Symantec has seen increased activity which includes both testing and drive-by-download campaigns. In the those campaigns, actors attempt to lure victims by disguising the malicious binary as game hacks, software installers (e.g. Visual Studio) and updates (e.g. Google update). ArrowRAT's capabilities aren't anything new or uncommon, it's a fairly run-of-mill remote access trojan. Prevalence wise, less common than more infamous RATs such as Remcos. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Machine Learning-based Heur.AdvML.C
Artemis Ransomware now appends .optimus extension A fork of PewPew Ransomware known as Artemis continues to be observed in the wild. More recently it's been infecting victims and appending an .optimus extension to successfully encrypted files. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.B Trojan.Gen.MBT Trojan.Horse WS.Malware.1 WS.Malware.2
Asbit - an emerging Remote Access Trojan (RAT) Asbit is a new emerging Remote Access Trojan (RAT) offered for sale by its creators. Asbit was first noticed back in 2021 and distributed via installer bundles. In some of the newer 2022 campaigns, the malware installer files have been spread as .pif files via Discord. The malware starts by dropping a loader module that in turn leads to further downloading of the core modules. Asbit's functionality includes remote desktop control, command execution and keystroke injection, among others. Asbit leverages TightVNC for remote desktop functions. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based Trojan Horse Trojan.Gen.MBT WS.Malware.1 Web-based Observed IPs/domains are covered under security categories
Asian organizations targeted by new group Hydrochasma Symantec has observed apparent intelligence gathering activity targeting shipping and medical organizations in Asia. This activity, which exclusively makes use of publicly available and living-off-the-land tools, has been attributed to a previously unknown threat actor group named Hydrochasma. Read more in our blog: Hydrochasma: Previously Unknown Group Targets Medical and Shipping Organizations in Asia Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen6 File-based Hacktool SecurityRisk.LaZagne Trojan Horse Trojan.Dropper WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.A Heur.AdvML.B Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories
A snake bite with a twist Symantec Security Response has observed a recent spam run in which more than 300 companies were targeted. The Malspam characteristics are as follows: Email subject: Purchase Order No. 3109 Date : 27/01/2021 Attachment: Purchase Order No. 3109 Dated 28.01.2021.doc The attached .doc file exploits CVE-2017-11882 (Microsoft Office Memory Corruption Vulnerability) which leads to a remote file being downloaded to the compromised machine upon successful exploitation attempt. The payload has been identified as SnakeKeylogger which steals confidential information from the compromised machine. This can in turn be used for identity theft and fraudulent financial transactions. Symantec provides the following coverage against this malicious spam run: File-based Bloodhound.RTF.20 Trojan.Gen.MBT Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Astaroth, Mekotio and Ousaban? Oh my! Three banking trojans have been recently spotted utilizing malicious run.app links inside of messages targeting users in Latin America. The links redirect users to an MSI that delivers either Astaroth (which later drops Ousaban) or Mekotio. Observed subjects used in malspam Advertencia AFIP: Datos de registro desactualizados - Riesgo de bloqueo. Aviso de Factura: Pendiente de Autorización Factura de Servicios: Detalles Adjuntos Factura Mensual: Resumen de Cargos Symantec protects you from this threat, identified by the following: Behavior-based SONAR.SuspPE!gen32 File-based Downloader Trojan.Dropper Trojan Horse WS.Malware.1 WS.Malware.2 Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. Machine Learning-based Heur.AdvML.B Heur.AdvML.A!300 Heur.AdvML.B!100 Heur.AdvML.B!200
AsyncRAT and LimeRAT duo used in attacks against governmental entities A malicious campaign leveraging AsyncRAT and LimeRAT remote access trojans has been reported to target governmental entities from India, Italy, Poland, and the United States since at least 2021. The attack chain involves malspam emails containing malicious MS Excel documents directly as attachment or URL links to them. The documents once opened, run embedded malicious macros that in turn lead to infection with said trojans. AsyncRAT and LimeRAT can be used by the attackers to steal user's credentials, log keystrokes or add the infected systems to a botnet. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.MSOffice!g23 File-based Scr.Malcode!gdn14 Trojan Horse Trojan.Gen.NPE W97M.Downloader WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.C
AsyncRAT looking to infest through malspam Symantec Security Response has observed malspam that was sent to more than 100 organizations in an attempt to deliver AsyncRAT malware. AsyncRAT is an open-source Remote Access Trojan that can remotely monitor and control an infected machine. Malspam characteristics are as follows: Email Subject: New PO_100955 Attachment Name: New PO_100955.xz Inner File Name: New PO_100955.exe Symantec provides the following coverage against the AsyncRAT in this spam campaign: File-based: Trojan.Gen.2
AsyncRAT malware campaign observed in wild A campaign delivering AsyncRAT has been reported in the wild. The threat actor responsible for the campaign utilizes a JavaScript file embedded in a phishing page for the distribution of the Remote Access Trojan (RAT). AsyncRAT, an open-source remote access tool available on GitHub since 2009, is commonly leveraged as a Remote Access Trojan, making it one of the most frequently used RATs. Its distinctive features encompass keylogging, exfiltration techniques, and acting as an initial access staging point for the delivery of the final payload. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. File-based ISB.Downloader!gen569 ISB.Heuristic!gen66 Scr.Malcode!gdn14 Scr.Malcode!gen105 Trojan.Malscript Trojan Horse Web.Reputation.1 WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.A!300 Heur.AdvML.B!100 Heur.AdvML.B!200 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Atlantida Stealer There have been reports of another infostealer named Atlantida making rounds in the threat landscape, spreading via malicious HTA files on compromised websites. This threat is similar to many other counterparts that also target a wide range of data, including login credentials, cryptocurrency wallets, and browsing history - showing no signs of novelty. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.Stealer!gen1 File-based Trojan.Gen.2 Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B!100
Atlas Clipper Atlas Clipper is an info-stealing type of malware that focuses on hijacking of cryptocurrency transactions by means of swapping victim's cryptowallet addresses with those belonging to the attackers. Atlas Clipper leverages Telegram for the purpose of C&C communication. The malware has also functionality to monitor for and kill selected system processes such as those related to malware detection or debugging. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.SuspBeh!gen667 File-based Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.2 WS.Reputation.1 Machine Learning-based Heur.AdvML.C Network-based System Infected: Trojan.Backdoor Activity 564
Atlassian Confluence vulnerability CVE-2023-22518 exploited in the wild CVE-2023-22518 is an Improper Authorization Vulnerability In Confluence Data Center and Server disclosed back in October. If successfully exploited, the vulnerability might allow an unauthenticated attacker to reset Confluence instance and create a new administrator account. Using such account, the attacker can then perform all administrative actions on the compromised instance. Just this month the vulnerability has been reported as being exploited in malicious campaigns attributed to the Cerber ransomware threat group. Symantec protects you from this threat, identified by the following: Network-based Attack: Confluence Broken Access Control Vulnerability CVE-2023-22515 Web Attack: Confluence Improper Authorization Vulnerability CVE-2023-22518 Policy-based Symantec Data Center Security hardening for Atlassian application can reduce the attack surface and exposure in many different ways such as network lockdown so vulnerabilities affecting Atlassian applications cannot be exploited over the public internet Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Atomic macOS Stealer (AMOS) A new infostealing malware dubbed Atomic macOS Stealer (aka AMOS) has been discovered in the wild. The malware is being sold via a Telegram channel and advertised as a variant specifically developed for the macOS platform. AMOS will attempt to steal a wide range of sensitive data from infected machines, including system information, keychain passwords, user documents, cookies, browser data, credit card details, cryptocurrency wallets, and others. The collected information is then compressed into a .zip archive and ex-filtrated to a domain controlled by the attackers. Symantec protects you from this threat, identified by the following: File-based Trojan.Horse OSX.Trojan.Gen.2 WS.Malware.2 Web-based Observed domains/IPs are covered under security categories
Atomic Stealer (AMOS) malware distributed under the disguise of a Slack installer Atomic Stealer aka AMOS is an infostealer variant for the macOS platform. The malware is known to be sold via Telegram and often distributed via malvertising. Atomic Stealer has the functionality to exfiltrate a wide variety of data including keychain passwords, user documents, cookies, browser data, credit card details, cryptocurrency wallets, and others. Most recently AMOS has been distributed under a disguise of Slack application installation package. The threat actors have been luring the victims via Google Ads offering free download of this software. This new AMOS variant has introduced some additional code obfuscation when compared to the previous variants. The malicious download page hosting AMOS also advertises a Windows version of the Slack software - which in turn delivers the FakeBat malware. Symantec protects you from this threat, identified by the following: File-based OSX.Trojan.Gen OSX.Trojan.Gen.2 WS.Malware.1 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
AtomSilo ransomware employs Double Extortion AtomSilo is a ransomware variant that emerged around September 2021. Structurally the malware appears to have similar traits as the Lockfile ransomware and is seen to be used in several recent attacks. It has been reported that the threat actors responsible for these types of attacks are using Double Extortion tactics which includes, not just encrypting the user data but also ex-filtering it to the attacker’s remote servers with a note demanding for ransom to prevent public release of the stolen sensitive data. AtomSilo is known to be distributed via DLL side-loading techniques leveraging the vulnerability (CVE-2021-26084) in Confluence. Symantec protects you from this threat, identified by the following: File-based Downloader Trojan Horse Trojan.Gen.MBT Network-based Web Attack: Confluence RCE CVE-2021-26084 Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains are covered under security categories
Attackers abuse Windows 10 Apps Installer for BazarLoader delivery A new campaign spreading the BazarLoader has been reported, where the attackers abuse the Windows 10 Apps Installer for malware delivery. The initial vector is spam email containing a link to a URL with an ms-appinstaller: prefix. Clicking this link triggers the MS App installer to download a malicious .appxbundle file containing the final payload. BazarLoader malware has been used in multiple campaigns targeting businesses in the past and has also often been leveraged to deliver additional payloads further compromising the targeted environments. Symantec protects you from this threat, identified by the following: File-based Downloader Trojan Horse Trojan.BazarLoad Trojan.Dropper Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.1 WS.Malware.2 Network-based Malicious Site: Malicious Domain Request 15 Malicious Site: Malicious Domain Request 16 Malicious Site: Malicious Domain Request 21 Malicious Site: Malicious Domain Request 22 Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories
Attackers delivering VenomRAT via a fake proof-of-concept (PoC) An older publicly accessible PoC created for CVE-2023-25157 was modified to download and execute the VenomRAT payload. This is to deceive security researchers into thinking that a new PoC is now available for a more recent vulnerability 'CVE-2023-40477'. This remote access tool can steal data, execute commands and take over control of a victim's machine. Symantec protects you from this threat, identified by the following: File-based Downloader Scr.Malcode!gdn14 Trojan Horse WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Attackers making use of Muieblackcat vulnerability scanner Muieblackcat is a vulnerability-scanning product for web servers. Remote attackers can use Muieblackcat to detect vulnerabilities on a target server and can gain sensitive information from vulnerable systems. Intrusion Prevention System (IPS) has picked up scans based on threat landscape monitoring, which indicate a recent uptick in usage of this tool. Symantec's network protection technology, Intrusion Prevention System (IPS) blocks scanning activity from this tool to prevent further infection/damage to the system. Symantec protects you from this threat, identified by the following: Network-based Web Attack: Muieblackcat Scanner Request
Attackers still distribute malicious documents exploiting old vulnerabilities Attackers still see success delivering payloads by way of malicious documents which exploit old vulnerabilities. We continue to observe Word, Excel, and RTF documents attempting to exploit old Microsoft Office vulnerabilities such as CVE-2017-0199 or CVE-2017-11882. Typically received as a socially engineered email attachment, the documents are leveraged to deliver further malware like RATs or banking Trojans among other payloads. Symantec protects from this threat, identified by the following: Email based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers File-based Bloodhound.RTF.12 Bloodhound.RTF.20 Exp.CVE-2017-0199* Exp.CVE-2017-11882* ISB.Downloader!gen217 ISB.Downloader!gen48 ISB.Downloader!gen60 ISB.Downloader!gen63 Scr.Malcode!gen125 Scr.Malcode!gen29 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Attackers targeting Middle East users with mobile RATs Attackers have recently been observed utilizing popular messaging apps and social media posts to deliver mobile RATs. These communications point potential victims to websites that host malicious APKs for download, disguised as legitimate apps. Once installed the attackers have the capability to do the following: access the camera to capture pictures/video execute shell commands file exfiltration keylogging location tracking phishing real-time recording record active calls view/change clipboard content Symantec protects you from this threat, identified by the following: Mobile-based Android.Reputation.2
Attacks leveraging JSOutProx RAT target banks and financial institutions in India It has been reported that JSOutProx RAT has been leveraged in several attack campaigns against banks and financial institutions in India. JSOutProx is usually delivered via spear-phishing emails containing compressed .hta attachments. Netwire RAT has been reported as a secondary payload after the JSOutProx RAT infections. Symantec protects you from this threat, identified by the following: File-based JS.Downloader Packed.Generic.525 Packed.Generic.616 Trojan Horse Machine Learning-based Heur.AdvML.B Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories
Attacks targeting container environments are on the rise in 2020 We have been aware of multiple reports indicating a rise of attacks targeting container environments in 2020. Initial reports about attackers scanning for and abusing containers exposed to the internet are going back to 2018 with several more incidents noted in 2019. In many instances of such compromise, the malicious actors have been deploying container images containing cryptocurrency miners. They would also implement additional scripts scouring Shodan for more vulnerable containers and hosts. One of the most common entry points for those attackers are open or misconfigured Docker APIs. By taking advantage of those, the attackers are able to fully manage existing containers or deploy new images with malicious code. Below is a short summary of recent campaigns reported in 2020 that have been targeting container environments for malicious purpose: September - A cryptojacking worm Cetus impersonates a legitimate Portainer binary used in Docker environments. Cetus will try to deploy a XMRig cryptominer payload. The Cetus worm will also scan for other vulnerable Docker Daemons in an attempt to spread to them. August - A cryptocurrency mining worm with a feature that scans for and steals Amazon Web Services (AWS) credentials from infected servers. The malware has been used by group dubbed as TeamTNT. The group has been known for targeting exposed Docker or Kubernetes installations and further exploiting them for mining Monero cryptocurrency or initiating DDoS attacks. July - A Linux backdoor dubbed Doki that is being used to target Docker installations with exposed APIs. Doki stands out from other previously seen backdoors as it uses a Dogecoin cryptocurrency block explorer to generate its command and control domain address in real-time dynamically. April - A Golang based malware dubbed as Kinsing that will run a cryptominer and attempt to spread to other exposed containers. Once again the attackers target open or misconfigured Docker APIs in the initial stage of the attack. It is believed that attacks targeting container environments will further increase in the coming months and years as the adoption and popularity of such environments is constantly growing. Symantec protections for the discussed campaigns Downloader Linux.Backdoor.Kaiten Linux.Coinminer Linux.Kaiten Miner.Bitcoinminer Miner.XMRig Trojan Horse Trojan.Gen.NPE
AuKill - new evasive backdoor A new defense-evading backdoor dubbed AuKill has been discovered. As per the researchers the tool is a modified version of the open-source tool Backstab, which specifically targets EDR clients. Backstab is a tool capable of killing antimalware protected processes by leveraging older versions of Sysinternal's Process Explorer driver which are signed by Microsoft. The tool has been actively used by various ransomware actors since first published back in mid-June 2021. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 SONAR.TCP!gen6 File-based Hacktool.Rootkit Trojan.Gen.MBT Trojan Horse Trojan.KillAV WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.A Heur.AdvML.B Heur.AdvML.B!100
Aurora Stealer Aurora is another stealer that's being sold as Malware-as-a-Service. According to reports it was first observed earlier this year and recently more ads have been posted underground. While its activity hasn't yet reached the heights of other more infamous stealers, it has started to be picked up by various groups and individuals who are conducting classic drive-by-download campaigns. Aurora has run-of-the-mill infostealing capabilities - nothing that truly stands-out from other infostealers. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.Dropper SONAR.PsDownloader!g1 File-based Suspicious: Content Trojan.Gen.2 Trojan.Gen.MBT Trojan Horse WS.Reputation.1 Network-based System Infected: Trojan.Backdoor Activity 634 Machine Learning-based Heur.AdvML.B
Autom cryptocurrency campaigns Malicious activity related to cryptocurrency is still high and showing no signs of stopping. The threat landscape is crippled with groups and individuals looking to steal cryptowallets and hijack resources in order to farm cryptocurrencies. Recently light has been shed on actors who have been campaigning since at least 2019. Over the years, they constantly evolved their attack chain with the ultimate goal of compromising hosts and using them to mine cryptocurrency, unbeknownst to the victim. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Web-based Observed domains/IPs are covered under security categories
Avaddon bundles with DDoS attacks to coerce ransom payments Avaddon ransomware was first discovered around June 2020 and it didn't take much time for the operators to start intimidating victims by releasing the user's stolen data online. According to the latest reports, the attackers behind the new variants of Avaddon are not only capable of encrypting the user's data but are also launching DDoS attacks in order to take down the victim's network and compel them to reach out for paying the ransom. As we continue to monitor and enhance our protections against Avaddon ransomware variants, we recommend performing regular backups for any important data and ensuring your security products kept up to date with the latest product definitions. Symantec protection against the latest variants of Avaddon ransomware family include: File-based Downloader Heur.AdvML.B Heur.AdvML.C Packed.Generic.459 Packed.Generic.525 Ransom.CryptoTorLocker Ransom.Avaddon Ransom.Avaddon!g1 Trojan.Gen.MBT
Avaddon RaaS Ransomware remains active According to the latest reports, the Avaddon ransomware continues to be active in the wild. Back in January 2021 a decryption tool was released for this ransomware variant. Soon after, the threat actors updated their toolset and addressed encryption weaknesses from the earlier variants. Avaddon continues to be sold in the form of a Ransomware-as-a-Service offering and observed in-the-wild campaigns have been seen leveraging both phishing emails and RDP exploitation for delivery. As we continue to monitor and enhance our protections against Avaddon ransomware variants, we recommend performing regular backups for any important data and ensuring your security products are kept up to date with the latest product definitions. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.B Heur.AdvML.C Infostealer Packed.Generic.528 Ransom.Avaddon Ransom.Avaddon!g1
AvosLocker - new ransomware on the threat landscape A new ransomware strain dubbed as AvosLocker has been discovered. The malware is C++ compiled and is distributed via spam campaigns. AvosLocker is capable of encrypting user data including data on the network shares by adding .avos extension to the files, and will subsequently demand ransom payment for the decryption tool. Symantec protects you from this threat, identified by the following: File-based Downloader Heur.AdvML.C Trojan.Gen.MBT WS.Malware.1 Network-based Attack: Ransom.AvosLocker Activity Attack: Ransom.AvosLocker Activity 2
AvosLocker ransomware campaigns in the wild As recently reported, the AvosLocker ransomware remains active in the wild. One of the latest campaigns spreading this ransomware shows that the attackers are actively leveraging a variety of different tools including: Mimikatz, Cobalt Strike and the Sliver tool. The threat actors continue to exploit Log4Shell vulnerabilities for ransomware deployment. In some other observed AvosLocker campaigns, as recently reported in our Protection Bulletin, the ransomware has also been spread post the exploitation of the Atlassian Confluence vulnerabilities. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.SuspLaunch!g18 File-based Hacktool Hacktool.Mimikatz Ransom.AvosLocker Ransom.AvosLocker!gen2 Trojan Horse Trojan.Vilers!gen1 Machine Learning-based Heur.AdvML.B Heur.AdvML.C Network-based Attack: Ransom.AvosLocker Activity 3 Web Attack: Malicious Java Payload Upload 2 Web-based Observed IPs/domains are covered under security categories
AVrecon malware targets SOHO devices AVrecon is a Linux-based Remote Access Trojan (RAT) targeting small-office/home-office (SOHO) routers and other ARM-embedded devices. The malware is distributed via exploitation of unpatched vulnerabilities or common misconfiguration of the targeted devices. Once deployed, AVreckon will collect some information about the infected device, open a session to pre-configured C&C server, and spawn a remote shell for command execution. It might also download additional arbitrary files and run them. The malware has recently been used in campaigns aimed at ad-fraud activities, password spraying and data exfiltration. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.NPE WS.Malware.1 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
AXLocker ransomware AXLocker is a new ransomware variant targeting Windows endpoints. The ransomware leverages the AES algorithm to encrypt files and does not append any extensions to encrypted files, so they appear with their normal names. The malware will also collect various information about the infected machine and send it to the C2 server controlled by the attackers. The malware will also attempt to steal Discord tokens and ex-filtrate them to the threat actors. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT Trojan.Gen.2 WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.C
Azerbaijan National Security used as social engineering There are reports of a targeted malware campaign in which actors have used a steganography trick to deliver a .Net Remote access Trojan. Malicious emails are most likely the initial vector and would contain an attached Microsoft Word document written in Azerbaijani. This document talks about an upcoming National Security and Scientific conference in Azerbaijan in 2021. If the ploy is successful, victims would inadvertently execute the attack chain involving steganography where the payload is hidden in an image file. Symantec has the following coverage in place: File-based Heur.AdvML.C Trojan.Gen.2 Trojan.Gen.MBT W97M.Downloader WS.Malware.1 WS.Malware.2 Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Azorult actor employs a multi-layered attack chain According to recent reports, an actor has been conducting Azorult malspam campaigns with a multiple-layer attack chain in hopes of evading detection. The attack starts with malicious emails loaded with a fictitious PDF document attachment that is, in fact, an LNK file. If users are tricked into executing the malicious LNK, it will kick off the rest of the attack chain involving the use of PowerShell scripts and loaders. Azorult has been around for a while now, and it steals data such as browsing history, cookies, login credentials, and cryptocurrency information. It also enables actors to upload additional malware on compromised systems. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products Behavior-based ACM.Crtutl-CNPE!g1 ACM.Ps-TBat!g1 ACM.Ps-Schtsk!g1 ACM.Schtsk-TBat!g1 ACM.Ps-Http!g2 ACM.Ps-Wscr!g1 ACM.Wscr-CNPE!g1 ACM.Wscr-Ps!g1 File-based Trojan.Gen.NPE CL.Suspexec!gen171 ISB.Heuristic!gen23 ISB.Heuristic!gen102 ISB.Downloader!gen178 Machine Learning-based Heur.AdvML.C Network-based Web Attack: Webpulse Bad Reputation Domain Request
Azorult shows no signs of slowing Azorult, capable of harvesting a range of different data and stealing cryptocurrency wallets, continues its reign as a prevalent infostealer. Since it's first appearance for sale on the Dark Web, groups and individuals who purchased the malware have used all manner of delivery tactics such as malicious emails, exploit kits and drive-by-download. Symantec continues to observe constant activity from this malware including multiple new command-and-control servers throughout September and early October. These new servers have mostly been associated with recent spam campaigns in which emails were sent in large numbers to various industries and organizations. Symantec has the following protections in place: File-based Infostealer.Rultazo* Trojan.Gen.MBT Heur.AdvML.B Heur.AdvML.C WS.Malware.1 AUT.Heuristic!gen5 Network-based System Infected: Infostealer.Rultazo Activity* Behavior-based SONAR.SuspBeh!gen306 SONAR.Trafic2.RGC!g5 Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. Website-based This attack is proactively blocked by Symantec Web Isolation technology * Indicates multiple detections exist such as Infostealer.Rultazo!g1, Infostealer.Rultazo!g4, etc.
Babuk Locker There's been a report of a new Ransomware called Babuk. If successful, it will encrypt files and add an extension (._NIST_K571_) which has been hardcoded in the malware. Symantec has the following coverage in place: File-based Ransom.Babuk Heur.AdvML.C Trojan.Gen.MBT
Babuk Ransomware aims to encrypt Linux and virtualized systems Babuk is a relatively new ransomware variant that emerged for the first time just in 2021. While not being that long on the threat landscape, it has already made news several times, when targeting large companies in coordinated campaigns against various sectors. According to a recent report, the group behind Babuk has been seen now attempting to expand their reach by developing new malware binaries aimed at Linux/Unix systems as well as virtualized platforms (ESXi, VMware). Symantec protects you from this threat, identified by the following: File-based Linux.RansomBabuk Linux.RansomBabuk.B Ransom.Babuk Trojan.Gen.NPE WS.Malware.1
Babuk Ransomware builder leaked After targeting multiple companies, the gang behind Babuk Ransomware announced in April that they are retiring. These actors have since rebranded themselves as Payload.bin and are now reportedly operating a leak site for other ransomware operators. They've again made their way in the news recently after their Ransomware builder was leaked online. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.B Ransom.Babuk WS.Malware.1
Babuk ransomware spread via fake Anydesk software websites According to a recent report, the latest campaigns distributing the Babuk ransomware leverage fake Anydesk software websites. Any unaware user trying to download the software from such a fake website is served with a self-extracting archive bundled with a ransomware downloader. Some of the discovered archives have also been found to include both Babuk ransomware downloader and Allakore RAT payloads. Symantec protects you from this threat, identified by the following: File-based Ransom.Babuk Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.B Heur.AdvML.C Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories
Backdoor code found in XZ Utils library On March 29th a security alert was issued warning users about malicious backdoor code embedded in certain versions of XZ Utils, a popular library of data compression tools that is present in nearly every Linux distribution. The malicious code, tracked as CVE-2024-3094, is embedded in XZ Utils versions 5.6.0 and 5.6.1. and could allow remote, malicious actors to break sshd authentication and gain unauthorized access to the entire impacted system. Most stable branches of major Linux distributions use older versions of the utilities so it is unlikely to affect production systems. Users who are running the bleeding-edge versions of Linux are the most likely to be affected. The Cybersecurity and Infrastructure Security Agency (CISA) recommends developers and users to downgrade XZ Utils to an uncompromised version according to their distribution maintainer's directions. Symantec protects you from these threats, identified by the following: EDR-based IF.CVE-2024-3094!Lg1 IF.CVE-2024-3094!Lg2 File-based Trojan Horse Trojan.Gen.NPE Trojan.XZdoor Trojan.XZdoor!gen1 Policy-based DCS Hardening Prevent loading of vulnerable liblzma library versions by sshd or any application by adding */liblzma.so.5.6.0, */liblzma.so.5.6.1 to the Global File Rules - No access Resource list in the sym_unix_protection_sbp policy Prevent execution of xz programs if not required in your environment by using Application rules to route xz programs (/usr/bin/xz*) to deny_ps sandbox. DCS application discovery will report these applications. Sym_unix_protection_sbp policy by default locks down sshd program and is subjected to default daemon sandbox restrictions. DCS Monitoring Detect tampering of xz libraries by adding a filewatch rule to monitor changes to /lib/x86_64-linux-gnu/liblzma.so.* and /usr/lib/x86_64-linux-gnu/liblzma.so.*
Backdoor Rozena surfs Follina Actors continue to assimilate the recent RCE vulnerability in the Microsoft Windows Support Diagnostic Tool (CVE-2022-30190 aka Follina) into their attack chain. Of late, the crooks behind a backdoor known as Rozena have been observed leveraging this exploit via malspam. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT Trojan.Gen.NPE Trojan.Malscript Network-based Web Attack: MSDT Remote Code Execution CVE-2022-30190 Policy-based DCS default policies harden MS Office applications. DCS prevents MS Office applications from launching command interpreters including cmd.exe, powershell.exe and others as child processes. Additionally for this CVE, the RCE vulnerability can be prevented by adding *\msdt.exe to the Sandbox execution control "Programs Microsoft Office may not run"
BackMyData - a Phobos ransomware variant BackMyData is the latest Phobos ransomware variant observed in the wild. The malware has been leveraged in the latest cyber attacks targeting hospitals and medical facilities in Romania. The malware encrypts targeted files and appends .backmydata extension to them, alongside of a victim ID and developers' email address. Ransom note is dropped in the form of "info.hta" and "info.txt" text file asking victims to contact the threat actors for further instructions regarding data recovery. BackMyData has capabilities to delete Volume Shadow Copies on the infected machines. The ransomware is also able to establish persistence by creating entries in the registry as well as adding the malware executable to the Startup folder of the compromised endpoint. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Ps-RgPst!g1 ACM.Ps-Wbadmin!g1 ACM.Untrst-RunSys!g1 ACM.Vss-DlShcp!g1 ACM.Wbadmin-DlBckp!g1 ACM.Wmic-DlShcp!g1 Behavior-based Sonar.Ransom!gen105 Sonar.SuspLaunch!gen4 Sonar.SuspLaunch!g18 Sonar.SuspLaunch!g21 Sonar.SuspLaunch!g253 File-based Ransom.Phobos!gm1 Machine Learning-based Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200
Backshow Ransomware Over the past few weeks, another ransomware actor called Backshow which employs double-extortion tactics has been observed in the threat landscape, although at this time it has a low prevalence compared to other groups. When successfully executed on a system, it will generate an ID for the victim and append it to encrypted files. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.SuspLaunch!g18 File-based Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B
BadBazaar Android spyware According to recent reports, ethnic and religious minorities in Asia have been the target of a new BadBazaar spyware. This malware has been disguised as generic Android applications customized for specific groups such as dictionaries and religion-related, video player, etc. This run-of-mill spyware is being distributed via third party application stores and websites. Symantec protects you from this threat, identified by the following: Mobile-based AppRisk:Generisk
BadBazaar malware spread to Android users through trojanized Signal and Telegram apps A new campaign spreading BadBazaar malware to Android users through trojanized Signal and Telegram apps has been observed in the wild. The malicious apps named Signal Plus Messenger and FlyGram have been present initially on both Google Play Store as well as Samsung Galaxy Store but later removed. BadBazaar malware attributed to the threat group known as GREF has been previously leveraged in campaigns targeting Uyghurs and other Turkic ethnic minorities. The distributed trojanized apps provide the users with genuine working app experience while the malware activities are happening in the background and are unnoticeable to the end user. BadBazaar trojan functionalities focus mainly on espionage and data exfiltration. The malware is able to collect miscellaneous information about the compromised device including IMEI numbers, MAC address, location data and Wi-Fi network information, among others. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk Android.Reputation.1 Android.Reputation.2 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Bahamut's Android spyware disguised as secure messaging app The APT group known as Bahamut has been conducting cyber espionage campaigns in the Middle East and South Asia since at least 2017. They use custom malware and tools, among them an Android malware. Recently one of their campaigns has been brought to light in which they've attempted to lure victims via phishing websites, hoping to infect them with a variant of their Android spyware, disguised as a messaging application. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk AppRisk:Generisk
Bahamut mobile spyware spread via fake VPN apps Bahamut spyware has been recently distributed under a disguise of VPN apps in a campaign active since at least January 2022. The malware abuses the name of a legitimate VPN application called SecureVPN and comes in form of two trojanized app versions - SoftVPN and OpenVPN. Bahamuts' functionality includes data extraction from the compromised devices - call logs, contacts and SMS messages, among others. The malware will also monitor chats of many popular messaging apps such as WhatsApp and Telegram. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk Android.Reputation.2 AppRisk:Generisk Web-based Observed domains/IPs are covered under security categories
Bandit Stealer malware A new infostealing malware dubbed Bandit Stealer has been discovered in the wild. The malware targets various web browsers and cryptocurrency wallets, among others. Bandit Stealer is written in Go programming language and is distributed via malicious websites or phishing. The infostealer has the capability to run miscellaneous checks for virtual or sandbox environments before execution. The malware collects system information from the compromised machines, confidential data stored in browsers, cookies, banking details, cryptocurrency related data, and others. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.C Network-based System Infected: Trojan.Backdoor Activity 564
Bandook - A known backdoor returns Symantec is aware of a newer version of a 13-year-old backdoor named Bandook being used in a string of recent espionage attacks. Multiple organizations in several European countries, as well as Chile, Singapore and Indonesia, have been the target of this attack. The new malware variant is being delivered with the help of documents with social engineering techniques, containing malicious macros with Powershell loaders. We have seen this backdoor in 2015 and 2017 when it was reported in two cyber-espionage campaigns named “Operation Manul” and “Dark Caracal“. Symantec has proactive coverage in place for this attack. File-based protections Heur.AdvML.B Heur.AdvML.C Trojan.Gen.2 Trojan.Gen.MBT Trojan.Mdropper W97M.Downloader WS.Malware.1 WS.Malware.2 Website-based protections These activities are proactively blocked by Symantec Web Isolation technology.
Bandook malware - an older threat remains active in the wild Bandook is a remote access trojan discovered way back in 2007. While it is quite an old malware family, new variants of Bandook reemerge in the wild with new distribution campaigns to this day. In one recent such run, Bandook has been spread with help of malicious PDF files leading to download of password-protected 7z archives that once extracted will deliver the Bandook payload. Upon infection the malware will execute commands received from the attacker-controlled C2 servers. The payload has also more capabilities allowing it to download additional arbitrary modules and executables. Symantec protects you from this threat, identified by the following: Behavior-based ACM.Untrst-RunSys!g1 SONAR.ProcHijack!gen9 SONAR.SuspBeh!gen306 SONAR.SuspBeh!gen397 SONAR.TCP!gen1 File-based Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Trojan.Pidief Scr.Malcode!gen Web.Reputation.1 WS.Malware.1 Machine Learning-based Heur.AdvML.A Heur.AdvML.A!300 Heur.AdvML.A!400 Heur.AdvML.A!500 Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Banking, media, insurance, food and logistic industry targeted in malspam campaign It's not uncommon for crooks to pose as well-known international companies and organizations, and the shipping industry is often a prime target. In a recent example, Symantec has observed an attacker who has been targeting banking, media, insurance, food, and logistics companies while posing as a Turkish logistics company in a shipping-themed email campaign. This company provides aerial, maritime, and road freight services worldwide, making it a potent lure. The emails (subject: "Q#2201516 Ex-Work Sea Shipment From Door To France") include a malicious .cab archive disguised as a PDF document, which, if opened would infect the recipient with Formbook, an aging but still effective infostealer. According to Symantec's data, this campaign has been observed in countries such as Japan, France, the US, and the UK. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products File-based Trojan.Gen.2 Scr.Malcode!gen19 Machine Learning-based Heur.AdvML.B
Banking trojan 'Qbot' targeting Spanish speaking users Qbot has been active since 2007 and constantly spreading via malspam campaigns. This malware is focused on stealing user data and banking credentials and was recently observed targeting Spanish speakers. Upon successful compromise, Qbot will attempt to communicate with its dedicated command and control (C2) servers. Once a connection has been established, an additional payload will be loaded onto the victim's machine to further spread the infection. Email sample subject: Re: DATOS PARA REGISTRO DE EMPRESAS - AGENCIA DE EMPLEO Y EMPRENDIMIENTO COMPENSAR Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE Web-based Observed domains are covered under security categories
Banks, Hotels and online booking platforms targeted in a CHM campaign Symantec has observed an increase in the use of CHM files in multiple spam campaigns that deliver malware. CHM files are a type of documentation that has been compiled and compressed into an HTML format. They can contain text, images, and hyperlinks. For instance, we have identified a spam campaign in which the attacker targets well-known hotels and booking websites as well as banks by sending emails with the subject "Pagaamento Reserva" and a link to a malicious CHM file hosted on Google Drive. If a victim is tricked into running the malicious CHM file, they will unknowingly infect their machine with three malware: two remote access trojans (Babylon and Venom) and a simple screenshot grabber. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products File-based CL.Downloader!gen11 Downloader SMG.Heur!gen Trojan.Malscript Machine Learning-based Heur.AdvML.C
BatCloak in the Arabian Peninsula – Emirate of Sharjah's campaign Symantec has recently observed yet another BatCloak campaign targeting industries (both local and international) and government agencies in the Arabian Peninsula. The actors behind this attack portray themselves as the University of Sharjah, employing a social engineering technique. If users are successfully lured by the emails (subject: GOVT OF SHARJAH - UNIVERSITY OF SHARJAH - QUOTATION View) and open the malicious archive (UNIVERSITY OF SHARJAH_Project.rar), they will find the BatCloak binary (UNIVERSITY OF SHARJAH_Project.bat) disguised as a fake project quote. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products Behavior-based SONAR.SuspBeh!gen82 File-based Trojan.Gen.MBT Trojan.Gen.NPE Machine Learning-based Heur.AdvML.C
Batloader delivering final payload Batloader has been frequently observed facilitating the injection of various malware strains such as RATS, Ransomware, InfoStealer, AgentTesla etc. The underlying method remains remarkably consistent regardless of the slight code variations. The complexity of the process may vary, but Batloader is used as a tool to orchestrate multi-staged attacks to ensure the final payload is delivered to execute. Symantec protects you from these threats, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.BatCloak!gen2 SONAR.SuspLaunch!g84 Email-based Coverage is in place for Symantec’s email security products. File-based CL.Suspexec!gen Scr.Malcode!gen108 Trojan.BatCloak!gen2 Trojan.Gen.2 Trojan.Gen.NPE Trojan Horse WS.Malware.1 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Batloader malware activities in the wild Batloader is a malware variant used in initial stages of the attack chain leading up to the delivery of more advanced malicious components and payloads. The malware is often distributed via malvertising and SEO poisoning techniques with later use of malicious .MSI packages masqueraded as legitimate software installers. Just in recent few months the Batloader's activity in the wild has shown this malware delivering a variety of payloads including Cobalt Strike, Royal Ransomware, Qakbot, Vidar and RacoonStealer, among others. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.NPE WS.Malware.1 WS.Malware.2 Web-based Observed domains/IPs are covered under security categories
BatLoader uses PyArmor and large MSI files in an effort to evade detection BatLoader's (aka ModiLoader) prevalence is not showing any signs of stopping, and campaigns regularly target organizations and consumers worldwide. Since it was first observed, we have seen various vectors and tactics being used. In June, according to reports, it had been observed being distributed via large malicious MSI installers of popular software and obfuscated using PyArmor. PyArmor is a commercial tool designed to protect Python applications by obfuscating the code and adding various security mechanisms to prevent unauthorized access, reverse engineering, and piracy. These features are leveraged to increase the possibility of BatLoader evading detection. Symantec protects you from this threat, identified by the following: File-based Trojan.Malmsi Trojan.Malscript
Batten down the hatches against NetWire RAT Security Response has observed a spam run aimed at two targets: yacht brokers and everyone else. Targeting yacht brokers can be a foot in the door for additional attacks as their customers tend to be wealthy and hold high positions in the company. Emails with the subject "[Yacht broker name] Invoice to [email address of the target]" were mostly sent to yacht brokers and some aviation companies, in contrast to the "Quote for Invoice" subject sent to the other target companies. This is a clear sign that the threat actor behind this spam run paid special attention to the yacht brokers. Both attachments - NetWire RAT (Remote Access Trojan) which has been around for years - are identical except for the file name. The Trojan is capable of logging keystroke, stealing credentials, and stealing hardware-related information. Symantec provides the following protection against this NetWire spam run: File-based AUT.Heuristic!gen3 Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
BazarCall leverages call centers to install BazarLoader and other malware According to the latest reports, a malware dubbed BazarCall has been leveraging call centers in an on-going malware distribution campaign. The campaign starts as usual with a phishing email - the only difference is that there are no malicious attachments present but only a phone number that the victim is prompted to call. The call center then directs the users to a malicious hosting website from where the malware is loaded. BazarCall has been observed distributing a variety of malware so far, among others: BazarLoader, Trickbot, IcedID, Gozi. Symantec protects you from this threat, identified by the following: File-based Trojan.BazarLoad Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE Trojan Horse W97M.Downloader
BazarLoader has complaints Recent runs of the Bazar Loader Malspam campaign have changed from masquerading as outstanding invoice messages to customer complaints that require action. Links contained in these messages lead to Bazar Loader downloads. Subjects include: RE: Complaint Request at [Company Name] Re: Complaint 2 - [Company Name] [Recipient Name] Complaint, my call [Recipient first name], Customer Complaint [Recipient first name] - customer complaint confirmation Sample message Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
BBTok Banking Trojan continues to evolve BBTok is a notorious banking trojan that emerged in 2020, quickly gaining notoriety for it's focused attacks on the financial sector, particularly targeting banks in Latin America. As this malware primarily operates as a banking trojan, it's designed to steal sensitive financial information and credentials from victims, enabling cybercriminals to carry out fraudulent transactions and gain unauthorized access to bank accounts. A new variant of BBTok generated by a customized server-side application has been reported in recent campaigns. The threat actors behind BBTok have adopted new Tactics, Techniques, and Procedures (TTPs), while still primarily relying on phishing emails to facilitate the deployment of the new BBTok variant. They achieve this while bypassing security systems through the use of living-off-the-land binaries and geofencing monitoring. Symantec protects you from this threat, identified by the following: File-based Exp.CVE-2022-30190!g1 Scr.Malcode!gen Scr.Malcode!gen104 Trojan.Gen.MBT Trojan.Malscript WS.Malware.1 WS.SecurityRisk.4 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
BByStealer goes after gamers and Discord users Yet another run-of-the-mill Discord infostealer (BByStealer) has been used by multiple groups and individuals over the last few months. Observed drive-by-download campaigns indicate that gamers and Discord users have been the primary targets of BByStealer. This infostealer's prevalence is mainly due to the fact that its code is available on public sources such as a popular Internet hosting platform for software development and version control. BByStealer packs Discord logins, crypto wallets and web-browsers amongst many other generic stealing capabilities. Symantec protects you from this threat, identified by the following: File-based Suspicious: content Trojan.Gen.MBT WS.Reputation.1 Machine Learning-based Heur.AdvML.B
BbyStealer malware returns with a new campaign A new campaign spreading the BbyStealer malware has been observed in the wild. The threat actors behind it have been leveraging multiple phishing websites advertising free download of Windows installers for various Virtual Private Network (VPN) applications. The installer packages downloaded from the portals lead to the infection with BbyStealer infostealer. The malware has the functionality to extract confidential information from the targeted endpoints, credentials, data stored in browsers, cookies and crypto-wallet extensions, among others. The collected data is later forwarded to the C2 servers controlled by the attackers. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Being politically Emotet The term "carpetbagger" fits Emotet well, as the authors try to exploit every topic under the sun in order to get the the victims to open malicious attachments. A recent Emotet spam campaign used the subject "automobile industry workers' union's reaction towards emergency economic measures proposed by a Japanese political party" and was sent to, surprise surprise, an automobile industry workers union. With the COVID-19 pandemic having a major economic impact on the automobile industry, any news of potential financial assistance is of great interest to the union members. Interest which the Emotet attackers attempt to exploit for their own selfish gain. The email attachment is a document file which of course, serves Emotet. Symantec provides the following detection against this attack: File-based W97.Downloader Packed.Generic.554 Email-based Protection is in place for Symantec's email security products. Email Threat Isolation (ETI) technology from Symantec provides an extra layer of protection.
Belastingdienst malicious SMS campaign leads to financial scam Symantec has recently observed a malicious SMS phishing campaign targeting mobile users in the Netherlands. The actors behind this activity are impersonating Belastingdienst – the Dutch tax authority – with the goal of scamming Netherlands residents. The SMS advises the recipient that there's an outstanding debt that needs to be paid. If someone is successfully lured, they'll land on a fake Belastingdienst website that indicates the amount to pay via iDEAL, a popular online payment method in the Netherlands. Observed malicious SMS: Uw openstaande schuld van: €451,65 is tot op heden niet betaald. Betaal dit nog voor 11-11-2023 via: hxxps[:]//aanmaning-herinnering[.]net/belastingdienst/BD7893409/ Symantec protects you from this threat, identified by the following: Mobile-based Symantec Endpoint Protection Mobile is able to analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake Belastingdienst website used in this campaign are known to WebPulse. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Beware of FlightNight A new threat actor has been observed using similar Tactics, Techniques and Procedures (TTPs) to recent Go-Stealer campaigns targeting Indian government entities. Named FlightNight because of its use of Slack channels named "FlightNight" it is likely the work of the same threat actor. Utilizing a modified version of the open-source tool HackBrowserData it targets government entities in India including those responsible for electronic communications, IT governance, and national defense. A phishing email disguised as an invitation letter from the Indian Air Force includes an ISO file attachment. An enclosed PDF document then tricks the victim into executing a shortcut link that then installs the malware. FlightNight can then exfiltrate confidential information in Microsoft Office documents, PDF files, SQL databases and cached web browser data. Symantec protects you from these threats, identified by the following: Email-based Protection is in place for Symantec's email security products. Email Threat Isolation (ETI) technology from Symantec provides an extra layer of protection File-based Infostealer Trojan Horse Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!200 Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Beware of phishing targeting Eki-net users Eki-net is a Japanese rail ticket reservation and management system used by the Japan Railways Group (also known as JR Group). This service is widely use as millions travel using JR trains on a daily basis. It provides a convenient and efficient way to plan rail trips, make reservations, and purchase tickets online. Cybercriminals are fully aware of Eki-net's popularity and have leveraged it in phishing campaigns in hopes of snaring sensitive financial information. Recent reports indicate a new phishing campaign targeting Eki-net users, with emails (subject:【重要】会員情報変更および退会に関するお知らせ) purporting to be about account changes and withdrawals. If a victim falls for the scam and clicks on a URL in the email, they will be redirected to a fake Eki-net login page. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products Web-based Observed domains/IPs are covered under security categories
Beware of SVB-related phishing and fraudulent websites Malicious actors around the world have been using banks as fodder to fuel their malspam and phishing campaigns for years. This social engineering technique may sound overused, but it is still effective and when major banks are collapsing, they swarm to it like flies to, well, you know what. Right after the news of Silicon Valley Bank going under broke, multiple typo-squatting domains were registered, some of which were used in phishing attacks. People typo-squat domains all the time by registering domain names that are similar to popular or commonly visited websites but have slight misspellings or different wording. Typo-squatters hope to redirect the traffic meant for the legitimate website to their own site. They may use this strategy to generate ad revenue, sell counterfeit goods, or even steal personal information. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products Mobile-based Symantec Endpoint Protection Mobile is able to also analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. Web-based Observed domains/IPs are covered under security categories
Beware the RDP... For a long time now, malware operators have been using RDP (Remote Desktop Protocol) attacks as a means of gaining illicit access to infrastructure in order to distribute a wide range of malware (Trojans, Backdoors, Ransomware, etc.). RDP attacks may not be as common as other vectors such as Email and Exploit kits but are still one of the most prevalent infection vectors, and perhaps the most unforgivable. Symantec continues to observe hundreds of thousands of RDP attack attempts (Brute-force, vulnerability scans, etc.) on a daily basis – And it must be noted that we have observed an uptick in RDP brute force attempts in the recent days. The following chart represents the last 30 days of blocks by our IPS (Intrusion Prevention) technology: Our top five IPS signatures detecting these attacks: Attack: NCrack Tool RDP BruteForce Activity OS Attack: Microsoft Windows Remote Desktop Services RCE CVE-2019-0708 OS Attack: RDP Scan Attempt 2 Attack: Microsoft RDP CVE-2012-0002 4 Web Attack: Microsoft RDP Exploit Attempt Symantec also recommends following best practices for additional protection against these attacks: Apply a Strong Security Policy Use Two-Factor Authentication (2FA) Ensure your software is up-to-date Use a VPN Use a Remote Desktop gateway Change the default RDP port
Be wary of Santa's evil friend Santa Claus is portrayed as a portly and jolly man who lives at the North Pole and has teams of flying reindeer. This year, he appears to have a friend with less than good intentions who sent emails on behalf of him without his knowledge. Symantec Security Response spotted Christmas themed emails which have a link to a malicious document file hosted on Dropbox. The emails have the following subject lines: I told Santa you were good this year I told Santa you were good this year Santa's worked his magic! Shop Where Santa Shops Last-minute Gifts, Santa-Approved! Symantec detects the malicious document file as the following: File-based W97M.Downloader
BianLian - a GoLang-based ransomware BianLian is a new ransomware variant written in Go programming language. Discovered just last month, BianLian has been reported to target multiple organizations across a variety of industry sectors. The malware encrypts user files and appends .bianlian extension to them. Once the encryption is complete, the ransomware drops the ransom note and deletes itself from the compromised machine. The threat actors behind this ransomware variant employ the double extortion scheme by threatening the victims to publicly leak the compromised confidential data. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.Cryptlocker!g80 SONAR.Ransomware!g3 SONAR.Ransomware!g7 File-based Downloader WS.Malware.1
BianLian among the most active ransomware actors In recent months, the BianLian ransomware actor has been ramping up its activities, taking aim at numerous enterprises and organizations spanning various countries. As of today, this group is among the most active and employs a double-extortion tactic, which means putting its victims' data up for auction if they do not meet their payment demands. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 Ransom.Bianlian!gm SONAR.PsDownloader!g1 SONAR.SuspWrite!g6 File-based Ransom.Bianlian Machine Learning-based Heur.AdvML.B Heur.AdvML.C
BianLian ransomware group steals data, primarily targets healthcare and manufacturing sectors The BianLian ransomware group is one of the more active ransomware cyberthreat groups on the scene today. The scope of their targets range across multiple industries, primarily compromising victims in healthcare and manufacturing sectors. While most activity of this group has been observed in the United States, it has also spread its reach globally. The current modus operandi of the group is to focus on data theft in order to extort victims and does not include file encryption as part of their scheme. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.TCP!gen1 File-based Ransom.Bianlian Ransom.Bianlian!gm Trojan Horse Trojan.Gen.MBT WS.Malware.1 WS.Malware.2 Machine learning-based Heur.AdvML.A Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
BiBi-Linux wiper malware BiBi-Linux is a newly discovered Wiper malware for Linux. The malware emerged in recent attacks targeted at Israeli companies. BiBi-Linux overwrites targeted files with useless data in order to corrupt them. It will rename the processed files by appending random strings containing the name "BiBi". The malware does not extract any files, does not drop any ransom notes or leave any instructions on how to contact the attackers. If the malware is executed without any target folder specification, it will start from the root directory effectively making the infected operating system unusable. Symantec protects you from this threat, identified by the following: File-based Trojan Horse WS.Malware.1
Bible themed Matanbuchus Loader Malware-as-a-Service anything but holy BelialDemon is a malware actor, who follows a biblical themed naming for its tools as well, known as member in different underground forums and marketplaces. In one of these marketplaces, researchers saw the group advertising a new Malware-as-a-Service loader, called Matanbuchus, earlier in February. This loader comes with several capabilities as for example: independent execution to load malicious DLL; running DLLs or EXEs in memory; adding or modifying scheduled tasks and executing custom PowerShell commands. Being as they are provider of malware-as-a-service, the actor maintains as part of their operations a number of domains for its C2 infrastructure. As researchers observed, they again follow certain patterns, this time with more legitimate looking words, to try to not raise red flags on the regular logs in the attacked machine. Some patterns observed included domain names related to login or Flash update. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 WS.Malware.2 Website-based This attack is proactively blocked by Symantec Web Isolation technology
Big Head ransomware Reports have emerged about a new variant of ransomware dubbed Big Head. Like may other ransomware (Sorry, Qinynore, ScorpionLocker, etc.) this one seems to be developed using the open-source ransomware project Hidden Tear. On execution, Big Head has been observed to disguise users by displaying a fake Windows Update screen while encrypting the user's files in the background, followed by a ransom note. The actors are asking the victim to reach out to them via email or a Telegram channel. While we continue to monitor and enhance our protections against this ransomware family, we recommend regular backup procedures of any important files, and applying the latest product definitions to protect against ransomware threats. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.Ransom!gen25 SONAR.SuspBeh!gen6 SONAR.SuspBeh!gen625 SONAR.TCP!gen1 File-based Ransom.HiddenTear!g1 Ransom.Sorry Scr.Malcode!gdn14 Trojan.Gen.MBT Trojan Horse WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.C
Bigpanzi: The Cyber Syndicate behind compromised Smart TVs It has recently been reported that for nearly a decade, a relatively obscure threat actor 'Bigpanzi' has been infecting Android TV and eCos set-top boxes across the globe. Bigpanzi employs diverse methods, including deceptive apps and firmware updates to infiltrate devices, primarily utilizing two malware tools: 'pandoraspear' and 'pcdn.' Pandoraspear, a sophisticated backdoor, seizes control of DNS configurations, establishes command and control (C2) communication, and executes received commands. It employs advanced evasion techniques, including modified dynamic linking, OLLVM compilation, UPX shell, and anti-debugging mechanisms. Meanwhile, Pcdn is leveraged to construct a peer-to-peer (P2P) Content Distribution Network (CDN) on compromised devices, endowing them with DDoS capabilities. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.NPE WS.Malware.1 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
BillBug targets cert authority Symantec has recently published a blog on Billbug, a state-sponsored actor that compromised a digital certificate authority in an Asian country during a campaign in which multiple government agencies were also targeted. This threat actor has been around since at least 2009 and has conducted a number of campaigns in Asia. They have used backdoors like Hannotog and Sagerunex, but also multiple dual-use and living-off-the-land tools. Read more in our blog: Billbug: State-sponsored Actor Targets Cert Authority, Government Agencies in Multiple Asian Countries Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen6 File-based Backdoor.Hannotog Backdoor.Sagerunex Backdoor.Sagerunex!gm Backdoor.Trojan Hacktool Hacktool.Gen Trojan Horse Trojan.Gen.MBT Trojan.Trensil Network-based System Infected: Trojan.Backdoor Activity 634 Web Attack: Webpulse Bad Reputation Domain Request Machine Learning-based Heur.AdvML.B Heur.AdvML.C
Binance's Japan expansion sparks SMS phishing Binance is one of the world's largest cryptocurrency exchanges, providing a platform for buying, selling, and trading multiple digital currencies. The company's services are available to many countries around the world, although the availability of certain services and features may vary depending on countries due to regulatory considerations. In August 2023, Binance Japan was launched, offering spot trading and Earn products to residents of Japan. Users in Japan who were registered with the global Binance platform are being asked to migrate their accounts to Binance Japan if they want to continue using its services while living in Japan, with the end of November as the deadline and the global account set to withdrawal only after December 2023. It didn't take cybercriminals long to capitalize on Binance's expansion to Japan and the migration process. Symantec has observed a malicious SMS phishing campaign targeting mobile users in Japan, hoping to lure them to a fake Binance website to proceed with the migration. Observed malicious SMS (the written Japanese is clearly not at a native level): 日本の住民はサイト移転を行う必要があり、そうしないと11月30日以降使用できない binanc-jp[.]com The fake domain involved in this campaign has been created based on the well-known concept of typosquatting – where cybercriminals register deceptive domains resembling legitimate ones through common misspellings or variations. By pivoting off this domain registrant, Symantec has discovered additional phishing domains that are also typosquatting Binance. Some have country codes in the name, which indicates that they are used to target users in those countries (such as binance-my[.]com, binance-tw[.]com, binance-au[.]com, binance-ch[.]com). Symantec protects you from this threat, identified by the following: Mobile-based Symantec Endpoint Protection Mobile is able to analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake Binance Japan domain used in this campaign, and the additional ones that have been found are known to WebPulse. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Binance Turkey Users Lured with MASAK Audit Scare More Binance smishing is being observed around the world, and in a recent example, Symantec has observed an actor targeting Turkish Binance users. The social engineering tactic in the messages is different from other, more generic ones. Here they bait users with account issues (preventing them from buying, selling, and transferring crypto) related to an audit conducted by the Financial Crimes Investigation Board (MASAK) – a regulatory authority in Turkey responsible for combating money laundering and terrorism financing. Observed malicious SMS: BN Turkiye hesabiniz Masak denetimi sebebiyle alim-satim ve transfer islemlerine kisitlanmisitr. Tekrardan aktif ediniz. hxxps://bitly[.]ae/verifty B002 If users are successfully tricked and click on the malicious Bitly URL within the SMS, they will be redirected to a fake Binance Turkey login page. Symantec protects you from this threat, identified by the following: Mobile-based Symantec Endpoint Protection Mobile is able to analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake Binance domain used in this campaign are known to WebPulse. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Bing's AI chatbot abused through malicious ads It is nothing new that some threat actors use malvertising (malicious paid ads) to try to lure victims into downloading and running some strand of malware. However now malvertising can transcend from mere web searches into Bing's AI chatbot as ads are injected on the chatbot conversation, which may give the ad a heightened sense of trust for the user. In this case, the advertisement is for a fake imitation of a known network scanner, taking the unsuspecting victim to a typo-squatting domain with a lookalike page of the legitimate tool. Symantec protects you from this threat, identified by the following: File-based ISB.Heuristic!gen37 Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B!100 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
BIOPASS RAT targets victims via watering hole attacks Researchers discovered a new malware variant that abuses the popular OBS Studio live-streaming application to record and broadcast the screen of its victims to attackers. Dubbed as BIOPASS RAT, the malware has been seen being distributed via watering hole attacks targeting online gambling companies. The malware loaders are masqueraded as legitimate installers for Adobe Flash Player or Microsoft Silverlight. Aside of capabilities typical for Remote Access Trojans, BIOPASS can also extract various data from web browsers. Symantec protects you from this threat, identified by the following: File-based Backdoor.Trojan Heur.AdvML.B Heur.AdvML.C Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed IPs/domains are covered under security categories.
Bisamware Ransomware Yet another ransomware - this one dubbed Bisamware - has recently been observed in the wild. Actors behind this run-of-the-mill threat have been leveraging malspam with maldocs as the vector of infection. At this time, they are not attempting to move laterally within an organization to encrypt other machines, but are instead focusing on a lured victim's machine. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products File-based Exp.CVE-2021-40444!g4 Trojan.Gen.2 Trojan Horse W97M.Downloader