text
stringlengths 0
383k
|
---|
BitRAT activity increase
In recent months, Symantec has observed more and more BitRAT activity in the threat landscape. This Remote Access Trojan (RAT), which has been around since at least the second half of 2020, is now being delivered mainly via Malspam and drive-by-download. The activity increase is very likely due to BitRAT being cracked and released for free on various underground forums.
Symantec protects you from this threat, identified by the following:
File-based
Heur.AdvML.B
Heur.AdvML.C
Trojan.Gen.MBT
Trojan Horse
WS.Malware.1
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
|
Bizarro banking malware now also actively targets users in Europe
According to a recent report, Bizarro banking Trojan has found its way to victims in Europe. The malware originates from Brazil and is attempting to steal online banking credentials from compromised users. Bizarro is distributed via spam emails containing malicious .msi packages that download .zip archives with malware dlls from various compromised websites when launched.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.MBT
Trojan.Gen.NPE
|
Black-T cryptojacking worm is now after user credentials
New reports have emerged that the TeamTNT cyber crime group has updated its cryptojacking worm with capability to steal user credentials. Known as Black-T, the malware is mostly known for targeting Docker instances and using them for mining Monero. The group behind the malware has added memory password scraping capabilities via mimipy and mimipenguin which are two open-source Mimikatz equivalents. Any credentials gathered by the malware are uploaded to TeamTNT's command and control (C&C) servers.
Symantec has the following protections in place
File-based
Hacktool
Trojan.Gen.NPE
Trojan Horse
WS.Malware.1
WS.Malware.2
Website-based
This attack is proactively blocked by Symantec Web Isolation technology
|
BlackBasta 2.0 ransomware
A new 2.0 variant of the BlackBasta ransomware has been observed in the wild. The new strain contains several improvements over the previous versions, including updated encryption algorithms, string obfuscation via ADVObfuscator and extensions customized for each victim. The new BlackBasta variant drops the ransom note on the infected machines in form of instructions_read_me.txt file.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.RansomGen!gen4
SONAR.Ransomware!g19
SONAR.Ransomware!g30
SONAR.SuspLaunch!g18
SONAR.TCP!gen1
File-based
Downloader
Ransom.Basta
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
|
Black Basta continues to make the headlines
The Black Basta ransomware had quite a busy time of it last year, and seems bent on remaining in the spotlight in 2023 as it targets more enterprises around the world from multiple industries. This gang is among the most active and employs the dreaded double-extortion tactics to pressure victims into paying the ransom. The actors behind this RaaS use a variety of methods to infect victims, including phishing emails, drive-by downloads, and exploiting vulnerabilities in unpatched software.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.RansomBasta!g3
SONAR.Ransomware!g30
SONAR.SuspLaunch!g18
File-based
Ransom.Basta
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
|
Black Basta ransomware goes after VMware ESXi servers
Black Basta is another ransomware variant reported to be encrypting VMware ESXi servers. The malware binary searches for the /vmfs/volumes that store the virtual machines on the ESXi servers. The ransomware appends .basta extension to the encrypted files and drops the ransom note in a form of readme.txt file prompting the user to visit an .onion website for further instructions.
Symantec protects you from this threat, identified by the following:
File-based
Ransom.Basta
Ransom.Basta!gm
WS.SecurityRisk.4
|
Black Berserk Ransomware
Black Berserk is another run-of-the-mill ransomware variant seen recently in the wild. The malware encrypts user data and appends .Black extension to the encrypted files. The ransom note named "Black_Recover.txt" is dropped in each of the encrypted folders and it advises the victims to contact the threat actors via provided emails. The malware has also capability to delete Volume Shadow Copies on the infected endpoint.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.Cryptolocker!g42
SONAR.SuspLaunch!g18
File-based
Ransom.Generic.1
WS.SecurityRisk.4
Machine Learning-based
Heur.AdvML.B
|
BlackBit ransomware
BlackBit is a variant of the LokiLocker ransomware family and shares it's many characteristics. BlackBit disguises as svchost.exe system binary and encrypts user's files while appending .blackbit extension to them. Similarly to LokiLocker, the malware has capabilities to maintain persistence on the infected machine, disable Windows Defender, stop various system services and processes, as well as delete the Volume Shadow Copies. Upon successful encryption, BlackBit will drop a ransom note advising the victims to contact the threat actors via email.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.Cryptolocker!g42
SONAR.SuspBeh!gen93
SONAR.SuspLaunch!g13
SONAR.SuspLaunch!g18
SONAR.SuspLaunch!g21
SONAR.TCP!gen1
File-based
Downloader
Trojan Horse
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B
Network-based
Attack: Ransom.Lockbit Activity
System Infected: Bad Reputation Process Request 4
System Infected: Trojan.Backdoor Activity 568
System Infected: Trojan.Backdoor Activity 595
System Infected: Trojan.Backdoor Activity 634
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories
|
BlackByte, new Ransomware Family
BlackByte is a new ransomware family observed by a group of researchers, utilizing a poorly designed and crude malware with a few glaring faults. While it may be linked to other known Ransomware gangs such as REvil and Ryuk due to some observed similarities, several awkward aspects such as the file being too simple, and the fact that it makes use of a single encryption key for all victims seems to negate that relationship. Researchers consider this the work of an inexperienced amateur group attempting to join the ranks of their more skilled ransomware peers.
Symantec protects you from this threat, identified by the following:
File-based
ISB.Downloader!gen258
Trojan Horse
|
BlackByte: another ransomware operation exploiting ProxyShell
BlackByte group, like it was mentioned before of Babuk, has been seen leveraging ProxyShell for the initial infection of Microsoft Exchange Servers.
Through ProxyShell exploitation the threat actors install a webshell. This is then used to drop Cobalt Strike beacon and BlackByte ransomware. Both are in turn leveraged for privilege escalation, lateral movement, data exfiltration and finally the encryption of the infected machines.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.MBT
WS.Malware.1
Policy-based
Symantec Data Center Security default hardening policies for Microsoft Exchange servers protect against ProxyShell vulnerabilities.
Web-based
Observed domains are covered under security categories
|
BlackByteNT ransomware - new variant in C++
A new C++ variant of the BlackByte ransomware called BlackByteNT has been discovered in the wild. The malware encrypts user files and appends .blackbytent extension to the encrypted files. Once the encryption process is complete a ransom note in the form of a text file named "BB_Readme_[random_string].txt" is dropped onto the victims' machine. The ransom note advises the victims to contact the attackers via a provided TOR website for further instructions.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.Ransomware!g38
SONAR.TCP!gen1
File-based
Ransom.Blackbyte
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.C
|
BlackDream ransomware
BlackDream (Babuk variant) is yet another ransomware actor making the rounds in the wild. At this time, they do not seem to employ the dreaded double-extortion tactic. Recent activities indicate that they've been disguising their ransomware binary as a fake "Windows security" installer. Upon successful execution, it will encrypt files and append them with a .BlackDream extension. The dropped ransom note advises victims to contact the threat actor via Telegram or email to find out how much it will cost them to decrypt their files.
Symantec protects you from this threat, identified by the following:
Behavior-based
Ransom.Babuk
File-based
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.A
|
BlackHatUP Ransomware
BlackHatUP is another Chaos ransomware variant observed on the threat landscape recently. The malware encrypts user files and appends .BlackHatUP extension to them. Ransom note is dropped in form of a text file called "read_it.txt" where the threat actors ask the victims to contact them via telegram for further instructions on how to decrypt the locked files. BlackHatUP has the functionality to delete the volume shadow copies and backup catalogs on the infected machine.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.SuspDrop!gen1
File-based
Ransom.Sorry
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
|
BlackHunt Ransomware
A ransomware group called "BlackHunt" has recently been seen actively attacking companies. They use a tactic called "double extortion," where they threaten to release stolen data unless the victim pays a ransom. A few of weeks ago, they have left a ransom note on compromised machines that appeared as a blue screen of death. However, more recently they have been using a ransom note in both HTA and TXT formats. After encrypting files, they append a specific extension to the filename that includes a unique ID, an email contact, and the word "Black".
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B
|
Black Kingdom hops on the ProxyLogon wagon
Symantec is aware of recent reports relating to a ransomware variant named "Black Kingdom" leveraging ProxyLogon vulnerability on Microsoft exchange servers. Earlier this month, multiple attacks were reported leveraging this vulnerability including ransomware like DearCry. This threat stands out due to the combination of ransomware and scareware techniques used, as some of these variants drop a mere ransom note in every folder without encrypting files on the disk.
Symantec protects you from this threat, identified by the following:
File-based
Downloader
Ransom.BlackKingdom
Ransom.Wannacry
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
|
BlackMagic Ransomware
An Iranian gang known as Black Magic has recently conducted ransomware attacks against companies and claimed targets in Israel. Upon successful encryption, a short ransom note is left on the machines which reads "Black Magic has targeted you" along with their Telegram, YouTube, Twitter and Facebook contact details.
Symantec protects you from this threat, identified by the following:
File-based
Ransom.BlackMagic
Trojan.Gen.2
Trojan.Gen.MBT
|
Blackmail Threat: Fake Dating App Targets French and Turkish Users
Remote access trojans (RATs) have long been recognized as a potent tool in the cybercriminal arsenal, frequently employed to facilitate financial theft and espionage. However, their application extends beyond mere monetary gain. In recent times, numerous threat actors have leveraged RATs to orchestrate sophisticated blackmail campaigns, exploiting vulnerabilities in individuals' private lives for extortion purposes.
Symantec has observed a campaign that started in mid-February, in which an actor attempted to entice mobile users in France and Turkey with a fake dating app that mimics a lesser-known dating service. The malicious application wasn't hosted on Google Play, instead it was hosted on a malicious domain bearing a name similar to the impersonated dating service but using a different top-level domain (TLD). Users would be led to the malicious website and app via web searches or SMS messages. What they'll end up with is not a dating app but SpyNote, a notorious remote access trojan used by multiple groups and individuals around the world.
Symantec protects you from this threat, identified by the following:
Mobile-based
Android.Reputation.1
Symantec Endpoint Protection Mobile is able to analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake domain used in this campaign are known to WebPulse.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products.
|
BlackMatter: New data exfiltration tool used in attacks
At least one affiliate of the BlackMatter ransomware operation has begun using a custom data exfiltration tool in its attacks. Exmatter is designed to ex-filtrate specific file types from a number of selected directories and upload them to an attacker-controlled server prior to deployment of the ransomware itself on the victim’s network.
BlackMatter is linked to the Coreid cyber crime group, which was previously responsible for the Darkside ransomware. Coreid operates under a RaaS model, working with affiliates to conduct ransomware attacks and then taking a share of the profits.
Read more in our blog: BlackMatter: New Data Exfiltration Tool Used in Attacks
Symantec protects you from this threat, identified by the following:
File-based
Infostealer
Trojan Horse
Trojan.Exmatter
WS.Malware.1
Network-based
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories
|
BlackNet campaign carries hidden message
Across the globe, those orchestrating malware operations often embed their perspectives—be they political, geopolitical, religious, or rooted in activism—by incorporating "Easter eggs" into the attack chain or the malware itself. In a recent case, while scrutinizing cybercrime activities linked to Israel-Hamas tensions, Symantec identified a domain serving as a BlackNet command-and-control server (C2) where the author gave it a name closely related to the conflict.
BlackNet has been used regularly by multiple actors over the past few years. This remote access trojan (RAT) possesses the capability of carrying out diverse operations on a compromised system, including but not limited to uploading files, executing scripts and shell commands, opening webpages (both visible and hidden), capturing screenshots, stealing saved passwords from browsers like Chrome and Firefox, and keylogging. The dissemination of this malware primarily occurs through malicious emails but can also take place via drive-by downloads.
Symantec protects you from this threat, identified by the following:
Behavior-based
ACM.Untrst-RLsass!g1
ACM.Untrst-RunSys!g1
File-based
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B!100
|
BlackNET: Smell a RAT
Symantec Security Response has recently observed a spam run that aims to distribute BlackNET Remote Access Trojan (RAT). Malspam characteristics are as follows:
Subject: New file attachment
Attachment Name: PO2567.xlsm
Opening the attachment leads to download and installation of BlackNET malware. The compromised machine connects to a remote Command and Control server (C&C) and joins the BlackNET botnet. Some of the botnet capabilities are below:
Stealing cookies from Web browsers
Keylogging
Stealing confidential information such as passwords
Stealing Bitcoin wallets
Launching DDoS attacks
Uploading remote files to the compromised machine
Executing scripts
Taking screenshots
Symantec provides the following detection against this BlackNET RAT spam campaign:
File-based
Trojan Horse
Trojan.Gen.NPE
Trojan.Gen.MBT
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
|
BlackoutWare Ransomware
BlackoutWare is another run-of-the-mill ransomware variant observed recently in the wild. The malware encrypts user files and appends .blo extension to them. The ransom note is dropped in the form of a "WARNING.txt" text file where the attackers ask for the equivalent of 5000 Euro ransom payment in Litecoin or Bitcoin for data decryption. The malware has the capability to delete the volume shadow copies on the infected endpoint.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.RansomNokibi!g1
SONAR.SuspLaunch!g18
File-based
Ransom.Gen
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.A!400
Heur.AdvML.A!500
Heur.AdvML.B!100
Heur.AdvML.B!200
|
BlackSnake ransomware - another Chaos variant
BlackSnake is a new .NET ransomware variant based on the source code of the Chaos malware. Next to the most common ransomware functions, BlackSnake also contains a clipper module that allows it to steal cryptocurrency wallets. Following the data theft, the ransomware will encrypt users' files and append .pay2unlock extension to the encrypted files. BlackSnake will avoid encrypting specific system-related folders and files according to a pre-defined exclusion list, in an effort to prevent system instability.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.SuspLaunch!g13
SONAR.SuspLaunch!g22
File-based
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
|
Blacksoul RAT – ReconHellCat's new toy
According to reports, ReconHellCat have been caught using a new malware called Blacksoul RAT in recent targeted attacks. In these attacks, they have been luring victims with an executable posing as a National Institute of Standards and Technology (NIST) document.
Symantec has the following coverage in place for the malware (Loader and Remote Access Trojan) used:
File-based
Trojan.Horse
Trojan.Gen.2
WS.Malware.2
Heur.AdvML.C
|
Blacksuit - new ransomware targeting Windows and Linux-based systems
Blacksuit is the new arrival on the ransomware threat landscape. Variants targeting both Windows and Linux-based systems have been discovered in the wild. The malware will encrypt users' files and append .blacksuit extension to them. The malware has the functionalities to stop processes associated with the VM environment, stop specific Windows services and delete volume shadow copies from the compromised system. Upon successful encryption, Blacksuit will drop a ransom note in the form a of .txt file named "README.BlackSuit.txt" advising the victims to contact the attackers via a TOR website.
Symantec protects you from this threat, identified by the following:
File-based
Ransom.Blacksuit
WS.Malware.2
Machine Learning-based
Heur.AdvML.B
|
Blacktail threat actor targets Linux and Windows systems with Buhti ransomware
A relatively new ransomware operation calling itself Buhti appears to be eschewing developing its own payload and is instead utilizing variants of the leaked LockBit and Babuk ransomware families to attack Windows and Linux systems. Buhti, which first came to public attention in February 2023, was initially reported to be attacking Linux computers. However, Symantec’s Threat Hunter Team has also uncovered attempts to attack Windows computers on compromised networks. Since Buhti hasn’t been linked to any known cyber-crime group, Symantec has assigned the actor name Blacktail to its operators.
Read more in our blog: Buhti: New Ransomware Operation Relies on Repurposed Payloads
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
SONAR.TCP!gen6
SONAR.UACBypass!gen30
File-based
Backdoor.Cobalt
Hacktool
Meterpreter
Ransom.Buhti
Ransom.Lockbit!g6
Trojan Horse
WS.Malware.1
WS.SecurityRisk.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Network-based
System Infected: Meterpreter Reverse TCP Activity 6
System Infected: Trojan.Backdoor Activity 123
Web Attack: Malicious Java Payload Upload 2
Web Attack: Malicious Java Payload Upload 19
Web-based
Observed domains/IPs are covered under security categories
|
Blank Grabber Infostealer
Blank Grabber is an infostealer variant seen on the threat landscape since at least 2022. The malware has the functionality to steal confidential user data including credentials, cookies, cryptocurrency wallets, in-browser stored data, Discord tokens and others. Blank Grabber leverages Discord and Telegram webhooks for the purpose of command and control (C&C) communication and data ex-filtration.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
File-based
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.B
Heur.AdvML.C
|
BlazeStealer malware
BlazeStealer is an infostealing malware spread in recently observed campaigns with the help of malicious Python packages masqueraded as legitimate obfuscation tools. First of the used Python packages called "pyobftoexe" has been observed in the wild back in January while the most recent one called "pyobfgood" dates back just to last month. Once on the infected machine BlazeStealer malware will run a Discord bot with capabilities such as host information collection, theft of credentials from system browsers, keylogging, screenshot grabbing, camera recording, user file collection, remote command execution and others.
Symantec protects you from this threat, identified by the following:
File-based
Downloader
Infostealer
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products.
|
Blind Eagle phishing with Ande Loader
APT-C-36 (aka Blind Eagle) was first seen in 2018 and has been observed delivering RATs since 2021. Thought to be from South America, the group has been observed targeting the manufacturing industry in Colombia and other countries in the region. In this latest attack users receive a phishing email with a link that if clicked downloads RAR and BZ2 archives containing malicious VBS (Visual Basic Scripts). Ande Loader is then used to deliver Remcos RAT and NjRAT payloads.
Symantec protects you from these threats, identified by the following:
File-based
Backdoor.Ratenjay
Backdoor.Ratenjay!gen3
ISB.Heuristic!gen62
Scr.Malcode!gdn14
Scr.Malcode!gen
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
WS.Malware.2
WS.SecurityRisk.4
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Heur.AdvML.C
|
BLISTER loader malware campaign
According to a recently released report, a new loader malware dubbed as BLISTER has been leveraged in the wild to distribute a variety of second stage malware payloads. The attackers have been using valid code signing certificates on the malware droppers in order to evade detection. CobaltStrike and BitRAT have been observed as final payloads in the recent campaigns involving this loader.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
WS.Malware.2
Network-based
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories
|
Blitzed Grabber
There's clearly no shortage of grabbers in the threatscape, these are sold on underground forums but many also are publicly shared on popular internet hosting services for software development and version control. Among these threats is Blitzed Grabber, which was initially shared by its author before the community made copies and spread them further on various platforms, including forums, websites, and social media. Recently, Symantec has observed an increase in drive-by-download attacks that use deceptive tactics such as posing as fake software or game cheats to distribute Blitzed Grabber.
In reality, this malware offers nothing unique that sets it apart from others. It reports/exfiltrate stolen data through automated messages sent via Discord webhooks, and it has standard data theft capabilities, including stealing PC data, login credentials, cookies, and autofill information from Chromium browsers. It also takes screenshots and steals 'ROBLOSECURITY' cookies. This cookie is a small text file that is created and stored by the Roblox website on a user's web browser after they log in. It contains a unique identifier that enables Roblox to track the user's session and provide personalized services.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.SuspLaunch!g13
SONAR.SuspLaunch!g266
File-based
Scr.Malcode!gdn32
SMG.Heur!gen
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B
|
Blockchain spam leads to malware
While Emotet has been the center of mal-spam universe past a few weeks, other spam runs are often overlooked. Symantec Security Response spotted a spam attack that distributes a backdoor malware. The malware is contained in attachment "Blockchain Updated Terms and Policy.img". The spammed email has a subject "Blockchain Support - Advanced Security Center Action Required".
Crypto currency markets can be one of the better investment choices in the current economic condition, email spam like this is a good lure to open malicious attachment.
Symantec provides the following coverage to this spam run:
File-based
Trojan Horse
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
|
Bluebottle campaign continues targeting financial sector
Symantec has recently published a blog regarding recent activities by the cybercrime group known as Bluebottle. This group is known to specialize in targeting financial entities. The recently observed campaign continues this trend, with victims residing in French-speaking countries in Africa. Tactics, techniques, and procedures include the use of living off the land, dual use tools, and commodity malware, with no custom malware deployed in this campaign.
Read more in our blog: Bluebottle: Campaign Hits Banks in French-speaking Countries in Africa
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen6
File-based
Downloader
Hacktool
Hacktool.Mimikatz
Hacktool.Mimikatz!g4
Hacktool.Rootkit
Hacktool.SharpHound
Infostealer
MSIL.Downloader!gen8
Packed.NSISPacker!g14
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Guloader
WS.Malware.1
WS.Malware.2
WS.SecurityRisk.3
WS.SecurityRisk.4
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories
|
BlueShell malware distributed in attacks targeting users from South Korea and Thailand
BlueShell is a Go-based backdoor variant that was publicly released on GitHub at a certain point and was readily available to numerous APT groups. The malware comes with support for various operating systems including Windows, Linux, and macOS. BlueShell functionality includes execution of commands received from the remote C&C server as well as file upload and download. The malware has the capability to set up a SOCKS5 proxy on the compromised device with the purpose of malicious traffic concealment and detection evasion. The most recently observed campaigns distributing BlueShell malware have been targeting mainly users from South Korea and Thailand.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
SONAR.TCP!gen6
File-based
Hacktool
Hacktool.Jsprat
Trojan.Gen.MBT
Trojan.Gen.NPE
Trojan Horse
WS.Malware.1
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.A!500
Heur.AdvML.B
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products
|
BlueSky Ransomware
BlueSky is a run-of-mill ransomware group that has recently shown up in the already crowded Ransomware landscape. Their ransomware shares some similarities with Conti and others like Babuk when it comes to encryption. According to multiple reports it appears this Ransomware is distributed via Drive-by-download and at this time the group does not use double extortion tactics.
Symantec protects you from this threat, identified by the following
Behavior-based
AGR.Terminate!g2
SONAR.Ransomware!g1
SONAR.Ransomware!g3
SONAR.Ransomware!g7
SONAR.Ransomware!g12
File-based
Ransom.Conti!gm1
Machine Learning-based
Heur.AdvML.B
|
BluStealer malware spread via malspam
BluStealer is a relatively new infostealing malware spread via malspam. The emails distributed in the most recent spam campaigns purport to originate from various shipping companies and include .ISO attachments containing malware executables. BluStealer is used to extract various credentials or cookies from the compromised machines but can also steal crypto wallet data or swap crypto addresses copied into the clipboard.
Symantec protects you from this threat, identified by the following:
File-based
Heur.AdvML.B
Heur.AdvML.C
Scr.Malcode!gdn30
Scr.Malcode!gdn41
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
|
BLX stealer
Every day, new infostealers are posted on GitHub many of which are forks of previous Discord stealers. While these aren't overly sophisticated, and many never reach high prevalence, Symantec closely monitors them as they always end up being used by certain groups and individuals around the world to a degree. BLX is one of these recent run-of-the-mill stealers that is being tested by threat actors and researchers according to our observations. This threat includes Discord logins, crypto wallets, web browser history, and passwords, among many other generic stealing capabilities.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.2
Trojan.Gen.MBT
|
BMP images used to obfuscate malicious code by Lazarus APT
Researchers have provided a look into a recent malware sample associated with the North Korean threat actor group known as Lazarus. As with most campaigns, it starts with a malspam email containing an Office document which executes a malicious macro. The macro is responsible for loading malicious HTA files from embedded and decoded BMP image files, as a way to avoid detection, in an effort to load later stages of the attack chain.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
W97M.Downloader
Behavior-based
SONAR.MalTraffic!gen3
Web-based
Observed domains are covered under security categories
|
Botnet malware targets mobile users via smishing campaigns
According to the latest report, there have been several alerts issued warning mobile users about ongoing smishing (SMS phishing) campaigns impersonating Iranian government services. The targeted users are lured to download malicious Android apps via links included in the SMS messages. The malicious applications if executed are able to steal SMS messages, collect victim's banking information as well as turn the affected devices into bots spreading the threat further to new victims.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
Android.Reputation.2
AppRisk:Generisk
Web-based
Observed domains are covered under security categories
Symantec Endpoint Protection Mobile is able to also analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect.
|
BrasDex preys on Brazilians' finances
Another Android banking malware has recently been observed doing the rounds in Brazil. Known as BrasDex, it is able to perform ATS attacks in order to snatch victims' financial credentials. An ATS attack allows an actor to input data in fields of legitimate mobile banking apps and crypto currency wallets, abusing the Accessibility Service. According to reports, this threat has been active for roughly a year ago now and usually poses as Brazilian bank-related Android applications.
Symantec protects you from this threat, identified by the following:
Mobile-based
AppRisk:Generisk
|
BRATA Android RAT sneaks into Google Play
Symantec Security Response is aware of a report that new variants of the Android Remote Access Tool (RAT) called "BRATA" were hiding in apps posing as security scanners on Google Play.
BRATA functionality includes stealing PINs, passwords and patterns and unlocking the device using that stolen information, capturing the screen, hiding and unhide incoming calls, and scheduling activity lunch. It's also important to note that BRATA is capable of display phishing pages for banking Web sites. In the early days of its existence, BRATA targeted Brazilian users, however newer variants have started to target U.S. and Spanish users.
Symantec protects you from this threat, identified by the following:
Mobile-based
AppRisk:Generisk
AdLibrary:Generisk
|
BRATA mobile malware with new infostealing capabilities
The latest variant of the mobile malware known as BRATA has been reported to include several improvements, among them a new infostealing module. In the most recent campaigns, BRATA has been targeting mostly financial institutions and the malware comes now with a single phishing overlay mimicking a selected bank login page. Those changes show that the threat actors behind BRATA changed their attack methodology significantly and started engaging in more APT-like type of campaigns.
Symantec protects you from this threat, identified by the following:
Mobile-based
Android.Reputation.2
AppRisk:Generisk
Web-based
Observed IPs/domains are covered under security categories
|
BRATA seen in Italy
Over the past few months we've continued to observe BRATA activities in the mobile threat landscape. This malware is a Brazilian remote access trojan (with banking capabilities) which started in Brazil but has now been seen in the USA and Europe. More recently, there's been a campaign against Italian Android users in which actors tried to lure victims into installing a fake Antispam android application.
BRATA functionality includes stealing PINs, passwords and patterns and unlocking the device using that stolen information, capturing the screen, hiding and unhiding incoming calls, and scheduling activity. Also, it's capable of displaying phishing pages for banking web sites in order to steal victims credentials.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
Android.Reputation.1
AppRisk:Generisk
|
Brazilian banking users targeted by the BrazKing mobile malware
According to a recently released report, mobile malware known as BrazKing continues to target banking users in Brazil. The malware is reportedly spread via phishing messages that lead to malicious URLs. BrazKing can display fake overlay windows tricking users into entering their banking credentials. The malware also includes features that allow it to capture the screen of the infected device and to log the user's keystrokes. The collected data is sent to the attacker's C2 servers.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
Android.Reputation.2
AppRisk:Generisk
|
Brazilian users constantly targeted by financial malware
Latin America and especially Brazil are constantly under siege by financial malware, targeting various technology platforms including computers and mobile devices. Recently, one of these threats was spotted targeting mobile users and customers of a major bank in Brazil. Actors behind this campaign created a fake bank Android application purporting to be from this Brazilian bank. If victims successfully install the fake application, it will be able to perform transfer attacks using the Accessibility Service.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
|
Brick by Trick
Symantec Security Response is aware of reports that recent Trickybot malware is equipped with a new ominous functionality. Dubbed as "TrickBoot" by some, the new functionality uses a powerful and publicly available tool to search and spot vulnerable devices in the target infrastructure in order to modify the UEFI/BIOS firmware of a device. In the worst case scenario, affected machine will not be able to start up (bricked).
Symantec provides the following coverage for Trickybot:
File-based
Trojan.Trickybot
Trojan.Trickybot!gen1
Trojan.Trickybot!gen2
Trojan.Trickybot!gen3
Trojan.Trickybot!gen4
Trojan.Trickybot!gen5
Trojan.Trickybot!gen6
Trojan.Trickybot!g7
Trojan.Trickybot!g8
Trojan.Trickybot!g9
Trojan.Trickybot!g10
Trojan.Trickybot!g11
Trojan.Trickybot!g12
Trojan.Trickybot!g13
Trojan.Trickybot!g14
Trojan.Trickybot!g15
Trojan.Trickybot!gm
Trojan.Trickybot!gm2
Packed.Generic.516
Trojan Horse
Behavior-based
SONAR.Trickybot!gen2
Network-based
System Infected: Trojan.Trickybot Activity
System Infected: Trojan.Trickybot Activity 2
System Infected: Trojan.Trickybot Activity 3
System Infected: Trojan.Trickybot Activity 4
System Infected: Trojan.Trickybot Activity 5
System Infected: Trojan.Trickybot Activity 7
System Infected: Trojan.Trickybot Activity 9
System Infected: Trojan.Trickybot Activity 10
System Infected: Trojan.Trickybot Activity 12
System Infected: Trojan.Trickybot Activity 13
System Infected: Trojan.Trickybot Activity 14
System Infected: Trojan.Trickybot Activity 15
System Infected: Trojan.Trickybot Activity 16
|
Bridging Europe and Asia: Turkish industries under constant threat
Turkey is a major business hub in the Middle East and Eurasia region, with its strategic location bridging Europe and Asia, and its growing economy and business-friendly environment attracting investors and entrepreneurs from all over the world. However, many cybercriminals also know this, and over the years Symantec has seen countless attacks targeting industries in Turkey, as well as known Turkish organizations being regularly spoofed to boost lures.
In a recent example, an actor has been spoofing Ziraat Bank, one of Turkey's top financial institutions to conduct a malspam campaign and target industries in Turkey, including foreign companies with local ties. The emails (subject: Ticari Hesap Özetiniz) contain a malicious .lzh archive, and within that archive lies a malicious binary disguised as a business account statement. When executed, this binary deploys Snake Keylogger.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
File-based
Scr.Malcode!gdn30
|
Brimstone: Russian espionage group introduces new malware
The Russia-sponsored Brimstone group (aka Coldriver, Callisto, TA446, Star Blizzard) has stepped up its attacks against targets in Ukraine and NATO countries. Brimstone has expanded its tactics, techniques, and procedures (TTPs) and is now sending Spica malware to targets using PDFs as lure documents. Spica, a backdoor written in Rust, is delivered when the victim requests a key for the encrypted document. It then establishes persistence and can execute arbitrary commands, download files, and exfiltrate data.
Symantec protects you from these threats, identified by the following:
Behavior-based
ACM.Untrst-RLsass!g1
Email-based
Coverage is in place for Symantec's email security products
File-based
Trojan Horse
WS.Malware.2
Machine Learning-based
Heur.AdvML.A!500
Heur.AdvML.C
|
Bruh ransomware targets consumers seeking BTC miners
Symantec has recently noticed a ransomware actor that targets consumers who are looking for BTC miners. Once a victim is successfully deceived by the malicious binary masquerading as a Bitcoin miner, their files will be encrypted. The ransom note that appears on the compromised machines begins with "ATTENTION BRUH" and demands a payment of 150 US dollars in BTC, ETH, or LTC. This ransomware is a Chaos ransomware variant.
Symantec protects you from this threat, identified by the following:
File-based
Ransom.Sorry
Machine Learning-based
Heur.AdvML.B
|
Brunhilda – Android Dropper-as-a-Service
It's well known that the malware world has an economy of its own, with groups and individuals specializing in specific services to effectively serve each other. In the mobile threatscape, a Dropper-as-a-Service (DaaS) known as Brunhilda has been gaining prevalence in recent months. Actors are leveraging this dropper framework to deploy their malware onto victims' phones. There have been multiple reports of an Android banking malware with RAT capabilities known as Vultur which has apparently utilized Brunhilda's service.
In a nutshell, the way Brunhilda works is they would add run-of-the-mill Android applications to app stores, and upon installation these apps will call home, download the malicious payload and execute it.
Symantec protects you from these threats, identified by the following:
Mobile-based
AdLibrary:Generisk
AppRisk:Generisk
|
Budworm APT group uses updated SysUpdate backdoor in targeted attacks
Symantec’s Threat Hunter Team, part of Broadcom, observed recent attacks by the Budworm advanced persistent threat group which leveraged an updated version of their exclusive use SysUpdate backdoor. Budworm (aka LuckyMouse, Emissary Panda, APT27) used the tool to target a Middle Eastern telecommunications organization and an Asian government.
As well as its custom malware, Budworm also used a variety of living-off-the-land and publicly available tools in these attacks. It appears the activity by the group may have been stopped early in the attack chain as the only malicious activity seen on infected machines is credential harvesting.
Read more in our blog: Budworm: APT Group Uses Updated Custom Tool in Attacks on Government and Telecoms Org
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.SuspLaunch!g137
SONAR.TCP!gen6
File-based
Hacktool
Pwdump
Trojan Horse
WS.Malware.2
WS.SecurityRisk.3
Machine learning-based
Heur.AdvML.A
Heur.AdvML.C
Heur.AdvML.M
|
Budworm group resumes targeting U.S. organizations
Recent activity associated with the Budworm threat actor group has shown a return to targeting organizations in the United States. By targeting a U.S. state legislature, it is the first against a US-based entity by this group in a number of years. Additional targets of this group include a Middle Eastern government, an electronics manufacturer, and a South East Asian hospital.
Budworm has been observed exploiting Log4j vulnerabilities, CVE-2021-44228 and CVE-2021-45105, to deliver payloads, typically a malware family known as HyperBro. The malware is primarily launched by way of DLL side-loading. Additional payloads and tools used by Budworm include the PlugX/Korplug Trojan, Cobalt Strike, and LaZagne, among others.
Read more in our blog: Budworm: Espionage Group Returns to Targeting U.S. Organizations
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen6
File-based
Backdoor.Korplug
Hacktool.Fscan
Hacktool.Iox
HackTool.LaZagne!gen1
SecurityRisk.LaZagne
Spyware.Gen
Trojan Horse
Trojan.Dropper
Trojan.Gen.MBT
WS.Malware.1
WS.Malware.2
WS.SecurityRisk.3
Machine learning-based
Heur.AdvML.B
Heur.AdvML.C
Network-based
Attack: Log4j CVE-2021-45105
Attack: Log4j2 RCE CVE-2021-44228 2
Attack: Log4j2 RCE CVE-2021-44228 3
Attack: Log4j2 RCE CVE-2021-44228 4
Attack: Log4j2 RCE CVE-2021-44228 5
Attack: Log4j2 RCE CVE-2021-44228 7
Web-based
Observed domains/IPs are covered under security categories
|
Buer gets RUSTy
Security reserachers have recently discovered that the Buer downloader malware (first observed in 2019) has been rewritten in RUST in an attempt to bypass existing detections against the threat. The downloader is delivered via malicious office documents with embeded VBA scripts. Buer has been observed delivering various ransomware packages.
Symantec protects you from this threat, identified by the following:
File-based
Heur.AdvML.C
Trojan.Gen.MBT
Trojan.Mdropper
|
BuLock Ransomware
BuLock is a recent MedusaLocker ransomware variant observed in the wild. The malware encrypts user files and appends .bulock(*number) extension to them. Ransom note is dropped in form of a html file called "HOW_TO_BACK_FILES.html" and asks the victims to contact the attackers via the provided email addresses. BuLock comes with functionality to delete the volume shadow copies on the infected machines. Threat actors behind this ransomware also threaten the victims with public data exposure if the ransom demands are not met.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
|
Bulwark Ransomware activity increase
Over the past few weeks there's been an uptick in Bulwark ransomware activity. Actors behind this ransomware employ double-extortion tactics and leave a somewhat lengthy ransom note on affected machines. In the ransom note, they inform the victim that they have 72 hours to comply, and also warn them against contacting the media. If the victim doesn't pay, they'll leak part of the stolen data to damage the victim's reputation and then proceed to sell everything on the Darknet. In addition, the attackers also threaten to perform DDoS attacks against their websites and infrastructure.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.SuspBeh!gen54
SONAR.SuspDrop!gen7
SONAR.SuspLaunch!g189
SONAR.UacBypass!gen30
File-based
Ransom.Locky!g35
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B
|
Bumblebee back in business
A recently observed malspam campaign has reintroduced Bumblebee malware. Bumblebee is a loader that was actively used by many groups prior to a multiple month leave of absence. The new campaign attempts to distribute Bumblebee by way of voicemail-themed emails linking to a malicious document download. This document in turn launches a script which executes Powershell commands that result in the download of Bumblebee.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Ps-Rd32!g1
File-based
Trojan.Gen.MBT
Trojan.Gen.NPE
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products
|
Bumblebee loader increases it's footprint in the threat landscape
Bumblebee, a recently developed malware loader, has quickly become a key component in a wide range of cyber-crime attacks and appears to have replaced a number of older loaders, which suggests that it is the work of established actors and that the transition to Bumblebee was pre-planned. By analysis of three other tools used in recent attacks involving Bumblebee, Symantec’s Threat Hunter team, a part of Broadcom Software, has linked this tool to a number of ransomware operations including Conti, Quantum, and Mountlocker. The tactics, techniques, and procedures (TTPs) used in these older attacks support the hypothesis that Bumblebee may have been introduced as a replacement loader for Trickbot and BazarLoader, since there is some overlap between recent activity involving Bumblebee and older attacks linked to these loaders.
Read more in our blog: Bumblebee: New Loader Rapidly Assuming Central Position in Cyber-crime Ecosystem
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.Dropper
SONAR.Module!gen3
SONAR.Ransomware!g1
SONAR.Ransomware!g3
SONAR.Ransomware!g7
SONAR.Ransomware!g13
SONAR.RansomGen!gen1
SONAR.RansomQuantm!g1
SONAR.SuspLoad!g12
SONAR.SuspOpen!gen7
SONAR.SuspOpen!gen8
SONAR.SuspStart!gen12
SONAR.WMIC!gen10
SONAR.WMIC!gen13
File-based
Backdoor.Cobalt!gm1
Backdoor.Cobalt!gm5
Ransom.Quantum
Ransom.Quantum!gm1
Trojan Horse
Trojan.Bumblebee
Trojan.Bumblebee!g1
Trojan.Gen.2
Trojan.Gen.9
Trojan.Gen.MBT
Network-based
Attack: Meterpreter Reverse HTTPS
Audit: ADFind Tool Activity
System Infected: Trojan.Backdoor Activity 373
Policy-based
Symantec DCS hardening policies block BumbleBee loader activities and Quantum ransomware activities like file write/read, network activity, WMI queries etc.
Web-based
Observed IPs/domains are covered under security categories
|
BundleBot malware posing as AI tools, common apps or games
BundleBot is a malware with stealer/bot capabilities. It uses dotnet bundle which is a single-file, self-contained format, including all the necessary pieces to run on its own. This generally creates a very large file and can make analyzing and debugging more difficult.
The victims are lured through Facebook Ads and compromised websites, appearing as AI tools, common apps or games, where the large file size may add to the appearance of legitimacy for the malware.
Symantec protects you from this threat, identified by the following:
File-based
Backdoor.Ratenjay
Downloader
Trojan Horse
Trojan.Gen.2
W97M.Downloader
WS.Malware.1
WS.Malware.2
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products
|
Bundlore knows no holidays
Bundlore is a type of adware that has affected both Windows and MacOS operating systems for years and new versions are constantly seen. Bundlore primarily spreads through drive-by downloads that are disguised as fake updates, cracks, and keygens, and it has not altered its tactics. Despite its long-standing presence, it shows no signs of slowing down, particularly on MacOS.
Symantec protects you from this threat, identified by the following:
File-based
OSX.Trojan.Gen
|
Bundlore shows no sign of stopping
Bundlore is a well-known adware bundleware that has impacted both Windows and MacOS environments for years, with many variations brought to light during that time. Symantec continues to see Bundlore activity as it shows no sign of stopping especially in the MacOS landscape. Its modus operandi has not changed for some time - it continues to leverage drive-by-download via malvertising as its infection vector, disguising itself as fake updates, cracks and keygens.
Symantec protects you from this threat, identified by the following:
File-based
OSX.Trojan.Gen
|
BunnyLoader
On a regular basis, actors with malicious intent immerse themselves in the threat market, offering a variety of services such as phishing kits, ransomware, stealers, backdoors, loaders, exploits, and more. Symantec always keeps a close watch on underground forums for newcomers as well as command-and-control servers.
Recently, command-and-control panels that featured a red bunny as a logo and the name "BunnyLoader" were observed. This malware is associated with an actor who has been promoting it as a loader with stealer and clipper functions. It does however lack distinctive features that would set it apart from other known loaders. The observed activities were most likely related to testing, but we anticipate that various groups and individuals may attempt to use it for malicious activities, while the extent and prevalence of these activities remains uncertain.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.SuspDataRun
File-based
Trojan.Gen.MBT
Trojan Horse
Machine Learning-based
Heur.AdvML.B
|
BunnyLoader 3.0
BunnyLoader was first discovered back in September 2023 and it was known to be a loader with stealer and clipper functions. Recently, researchers uncovered the latest version of the malware packed with functionality enhancements including a bug fix and additional antivirus evasion and protections.
Below is the list of BunnyLoader's former and more recent capabilities:
Fileless loading
Credential theft
Keylogging
Clipboard theft
Downloading additional malware
Remote command execution
Crypto wallet theft
Application credential theft
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Untrst-RunSys!g1
Behavior-based
SONAR.Dropper
SONAR.MalTraffic!gen1
File-based
Scr.Malcode!gdn32
SMG.Heur!gen
Trojan.Gen.MBT
Trojan.Gen.2
Trojan Horse
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products
|
Busy Hive Ransomware
Hive ransomware-as-a-service (RaaS) emerged in late June targeting companies in various sectors. Assessments show that the threat actor has hit 355 organizations by October. The common initial compromise methods believed to be used to infiltrate a victim's network are via vulnerable RDP servers, access to compromised VPN credentials, and/or phishing emails with malicious attachments.
Symantec protects you from this threat, identified by the following:
File-based
Downloader
Ransom.Gen
Ransom.Hive
Ransom.Hive!g2
Trojan.Gen.MBT
Trojan.Gen.9
Trojan Horse
WS.Malware.1
Behavior-based
SONAR.RansomHive!g1
SONAR.RansomHive!g2
SONAR.RansomHive!g3
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
|
Byakugan malware
Byakugan is a modular infostealer variant observed recently in the wild. The malware has been distributed under the disguise of a Adobe Reader installer. The malware receives commands from a remote C2 server that also acts as attacker's control panel. Byakugan's functionality includes keylogging, screen capture, coin mining, theft of information stored in the web browsers and arbitrary file download, among others.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Ps-RgPst!g1
ACM.Ps-SvcReg!g1
File-based
Trojan Horse
Trojan.Pidief
Web.Reputation.1
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.A!400
Heur.AdvML.A!500
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products
|
Cacti RCE vulnerability (CVE-2022-46169) exploited in the wild
Cacti is an open-source network monitoring tool designed as a front-end application for the data logging tool RRDtool. Last December a command injection vulnerability (CVE-2022-46169) affecting Cacti versions 1.2.22 and below was discovered. While the vulnerability was patched shortly after its disclosure, new reports indicate that the RCE is being currently exploited in the wild. The vulnerability could allow an unauthenticated attacker to execute arbitrary code on servers running Cacti.
Symantec protects you from this threat, identified by the following:
Network-based
Attack: Cacti Unauthenticated Command Injection Vulnerability CVE-2022-46169
|
Cacti SQL Injection Vulnerability CVE-2023-51448
CVE-2023-51448 is a blind SQL injection (SQLi) vulnerability within the SNMP Notification Receivers in Cacti, which is a network monitoring and fault management framework. Successful exploitation of the vulnerability might allow an unauthenticated attacker to send a crafted HTTP GET request to the endpoint ‘/cacti/managers.php’ with a crafted SQLi payload. This might result in disclosure of the Cacti database content or allow for remote command execution.
Symantec protects you from this threat, identified by the following:
Network-based
Web Attack: Cacti SQL Injection Vulnerability CVE-2023-51448
|
Cactus Ransomware
Cactus is a ransomware variant first identified around March 2023. Most recently this malware has been distributed in campaigns exploiting Qlik Sense application vulnerabilities as well as via malvertising campaigns leveraging Danabot malware. Cactus is known to use RDP protocol or various remote access tools for lateral movement in the compromised environment. Upon file encryption the malware will drop a ransom note in form of a text file called "cAcTuS.readme.txt" where victims are advised to contact the attackers via a provided email address. The threat actors behind this ransomware will also attempt to ex-filtrate user data before file encryption. For that purpose they are using tools such as Rclone software. The stolen data is then used as part of double extortion tactics.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.TCP!gen1
File-based
Ransom.Cactus
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Network-based
Web Attack: Qlik Sense Enterprise Path Traversal CVE-2023-41266
|
Call me Sunshuttle or GoldMax - yet another SolarWinds related backdoor
New malware associated with the SolarWinds attack has been detailed in recent reports. Identified as Sunshuttle or GoldMax, this is a back door written in Go, which was reportedly found to be impersonating systems management software. The report indicates this second-stage payload was used in conjunction with previously identified tools to conduct network reconnaissance.
The back door would make use of either local or embedded configurations in order to determine behavior. One notable feature of the malware is that it can attempt to blend-in with regular network traffic by selecting referrers from a list of popular website URLs to add to cookie headers used in communication with the C&C server. Some additional functionality includes:
Downloading or uploading files
Opening a command shell
Running OS related commands
Symantec provides the following signatures for known indicators:
File-based
Backdoor.GoldMax
Web-based
Observed domains are covered under security categories
|
Campaign distributing Agent Tesla malware leveraging PDF attachments
A spear-phishing email campaign distributing the Agent Tesla malware via PDF attachments has been reported in the wild. This campaign specifically targets online travelers by presenting fake invoices for bookings reportedly from a well-known travel agency. Upon opening the PDF attachment, a JavaScript payload is triggered which fetches and runs a PowerShell script, ultimately leading to the installation of the Agent Tesla malware. The malware is capable of extracting personal data and credentials from commonly used web browsers, exfiltrating this information via the threat actors' Telegram channel.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Ps-Rd32!g1
ACM.Ps-Wscr!g1
ACM.Wscr-Ps!g1
ACM.Rgsvc-Lnch!g1
Behavior-based
SONAR.SuspLaunch!g318
File-based
ISB.Downloader!gen572
JS.Downloader
Scr.DLHeur!gen17
Scr.Malcode!gen
Trojan Horse
Trojan.Pidief
Network-based
34479 Audit: Suspicious Process Accessing bitbucket.org
33337 Audit: PowerShell Process Accessing bitbucket.org
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products.
|
Campaign using new variant of LummaC Infostealer observed in wild
LummaC is an infostealing malware advertised and sold on underground forums since August 2022. In the past, the stealer was distributed through a combination of tactics, including phishing websites that masquerade as legitimate software sources and spear-phishing emails. The malware extracts various data from both Chromium and Mozilla-based browsers including details of crypto wallets and any two-factor authentication (2FA) extensions installed on the victim's machine. Once collected, the data is encrypted by the stealer malware before being forwarded to the C2 servers controlled by the attackers.
This malware has been continuously evolving and the latest version has the ability to introduce extra malware into the compromised system. In the specific instance of this campaign observed, the LummaC stealer is employed to acquire and set up the Amadey bot which is notable for its role in activities such as system evaluation, data pilfering, and the delivery of additional harmful payloads. Following this, the Amadey bot is executed to retrieve the SectopRAT, a Remote Access Trojan built on the .NET framework. SectopRAT is known for its multifaceted capabilities, including various techniques to go undetected, highlighting the escalating sophistication of cyber threats.
Symantec protects you from this threat, identified by the following:
File-based
Scr.Malcode!gdn32
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Network-based
System Infected: Infostealer Lumma Activity 3
System Infected: Trojan.Backdoor Activity 611
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products
|
Candiru Spyware
Candiru spyware was first discovered last July (2021) and was able to stay out of sight for months. Earlier this month, it was caught exploiting a recently discovered zero-day vulnerability in Google Chrome (CVE-2022-2294) targeting journalists mostly based in the Middle East.
After a successful exploitation, a malicious payload called 'Devil’s Tongue' will be dropped. Its capabilities include stealing victim credentials from both LSASS and browsers such as Chrome and Firefox, file collection, registry querying, running WMI commands, and querying SQLite databases.
Symantec protects you from these threats, identified by the following:
Network-based
Malicious Site: Malicious Domain Request 21
Malicious Site: Malicious Domain Request 22
Web-based
Observed IPs/domains are covered under security categories
|
Canva graphic design platform abused in new phishing wave
With the ever changing email threat landscape, not only legitimate file sharing services are being actively abused but as we have seen in a recent phishing wave, threat actors are also expanding to different platforms – in this case a graphic design platform of canva.com. In the observed phishing run, emails masqueraded as fax notification messages lure the recipient to click on a hyperlinked text and download a .pdf document. The content is kept short in an attempt to pose as a legitimate email template. As shown in Figure 1, once the recipient clicks on the hyperlinked text, an online preview of the document is displayed on a webpage hosted on canva.com.
Figure 1: Phishing email masqueraded as a fax notification email with a canva.com URL embedded in the content.
As shown in Figure 2, the online preview offers the recipient an option to download the message in audio format.
Figure 2: Online preview of the document hosted on canva.com
After clicking on the hyperlinked text, the recipient is served with a credential stealing website often masqueraded as login page for Microsoft Office 365 or Outlook, as show in Figure 3.
Figure 3: The embedded URL in hyperlinked text redirects the user to a fake credential stealing webpage.
Protection
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
|
Capital Gains Tax and crypto social engineering delivers Redline Stealer in Australia
Over the last few months, Redline Stealer has gained notoriety as it's been the infostealer of choice for multiple groups and individuals around the world looking to steal sensitive information from medium and large companies. What they do next varies from extorting the victims to selling their data and access on underground markets. Symantec regularly observes non-large campaigns that are targeting specific companies. Recently, in one of these campaigns an actor has attempted to compromise financial organizations in Australia via malicious emails about Capital Gains Tax and cryptocurrency, advising major legislation change by the Australian Government. These emails contain a Zip archive, and within it the Redline stealer binary disguised as a PDF report (filename: updated KYC T&Cs-pdf.exe).
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
File-based
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B
|
Capybara stealer
Symantec has identified a command-and-control server associated with an infostealer named Capybara, which is currently being promoted on Telegram and Discord.
If a user is successfully deceived into executing Capybara, the malware first checks that it is not operating within a virtual machine (VM). If not, it subsequently attempts to terminate the following processes: “httpdebuggerui”, “wireshark”, “fiddler”, “vboxservice”, “df5serv”, “processhacker”, “vboxtray”, “vmtoolsd”, “vmwaretray”, “ida64”, “ollydbg”, “pestudio”, “vmwareuser”, “vgauthservice”, “vmacthlp”, “x96dbg”, “vmsrvc”, “x32dbg”, “vmusrvc,” “prl_cc”, “prl_tools”, “xenservice”, “qemu-ga”, “joeboxcontrol”, “ksdumperclient”, “ksdumper”, and “joeboxserver”.
Capybara possesses the following capabilities:
Capture screenshots and execute mouse clicks on specified screens.
Keylogging.
Collect computer information, network details, installed programs, process list, FileZilla server information, Discord backup codes, remote desktop connections, wallets from various virtual coin apps and extension wallets, tokens from Discord and browsers, and browser data (cookies, history, bookmarks, auto-fills, and passwords).
Terminate processes based on a given PID.
Download, retrieve, or delete files.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Maljava
|
Carbine Loader shell script used in Cryptojacking Nagios XI applications
A shell script dubbed Carbine Loader uses publicly available code to infect, gain persistence, and spread laterally through SSH. This campaign operates via the remote code execution on public facing Nagios XI applications. The loader infects the server and installs XMRig crypto miners such as amdx h2, compromising the system. The compromised devices may experience degraded performance and a new script could be automatically downloaded leading to further abuse.
Symantec protects you from these threats, identified by the following:
File-based
Trojan.Gen.NPE
Web-based
Observed domains are covered under security categories
|
Carderbee APT Group
A previously unknown advanced persistent threat (APT) group dubbed as Carderbee used the legitimate Cobra DocGuard software to carry out a supply chain attack with the goal of deploying the Korplug backdoor (aka PlugX) onto victim computers. In the course of this attack, the attackers used malware signed with a legitimate Microsoft certificate. Most of the victims in this campaign are based in Hong Kong, with some victims based in other regions of Asia.
Read more in our blog: Carderbee: APT Group uses Legit Software in Supply Chain Attack Targeting Orgs in Hong Kong
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.TCP!gen6
File-based
Downloader
Hacktool
Trojan Horse
Trojan.Dropper
Trojan.Gen.MBT
WS.Malware.2
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.A!400
Heur.AdvML.A!500
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products
|
Casbaneiro banking trojan continues to evolve
Casbaneiro, also known by its aliases Metamorfo and Ponteiro, is a notorious banking trojan that emerged in 2018. It gained notoriety for its focused attacks on the financial sector, particularly targeting banks in Latin America. As this malware primarily operates as a banking trojan, it's designed to steal sensitive financial information and credentials from victims, enabling cybercriminals to carry out fraudulent transactions and gain unauthorized access to bank accounts.
In the recently observed campaigns the malicious attacks leverage phishing emails with a link to an html file which if followed, leads to malicious RAR file download that in turn initiates a multi-stage infection process. The use of a User Account Control (UAC) bypass technique by the financially motivated threat actors behind the Casbaneiro banking malware family demonstrates their continued evolution and sophistication in carrying out malicious activities.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Email-based
Coverage is in place for Symantec’s email security products
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.B
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products
|
CATAKA Ransomware
CATAKA is a new ransomware variant making the rounds in the wild. The malware encrypts user files and appends random extensions to them. Ransom notes are dropped in the form of both readme.txt files and a replaced desktop wallpaper. The threat actors ask for the equivalent of $1500 in Bitcoin cryptocurrency as the fee for the decryption of the locked files.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.SuspLaunch!g22
SONAR.SuspLaunch!g266
File-based
Ransom.Gen
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B!100
Heur.AdvML.B!200
|
CatB ransomware
CatB (aka Fishcat) is a new ransomware variant recently discovered in the wild. The malware is able to DLL hijack the MSDTC service in order to silently execute its payload in order to avoid detection. CatB ransomware comes with a dropper component responsible for final ransomware payload delivery after execution of several anti-VM checks on the compromised machine. While the ransom note dropped by the CatB shows some similarities to the Pandora ransomware variant, these malware strains otherwise appear unrelated.
Symantec protects you from this threat, identified by the following:
File-based
Ransom.Gen
Trojan.Dropper
Trojan.Gen.2
WS.Malware.1
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.C
|
CDRThief looking for VoIP softswitches
There have been reports of a Linux infostealer dubbed CDRThief targeting Voice over Internet Protocol softswitches. Symantec has the following coverage in place:
File-based
Trojan.Gen.NPE
|
CDRThief malware steals VoIP metadata from Linux softswitches
We have been aware of reports about a new Linux malware that targets Voice-over-IP (VoIP) telephony switches in order to steal call data records (CDR). It is believed that the malware may be used for cyber espionage or for a type of telephony fraud scheme known as International Revenue Share Fraud (IRSF). The malware targets specifically two VoIP softswitches (call switching nodes that route calls using software rather than hardware) running on Linux servers: Linknat VOS2009 and Linknat VOS3000. Once on a compromised server, the malware searches for the Linknat configuration files and extracts credentials for the MySQL database, where the CDR metadata is stored. CDRThief then uploads the compromised CDR data to a remote server.
Symantec protection
Linux.Trojan
|
Censored ransomware
A ransomware known as "Censored" has been observed spreading, targeting individual machines of consumers and small businesses. It asks victims for a ransom of 200 US dollars' worth of Bitcoin. Currently, this ransomware does not appear to spread laterally. It belongs to the Chaos ransomware variant, and it lacks distinctive features that would set it apart from other ransomware variants anRd strains.
Symantec protects you from this threat, identified by the following:
File-based
Ransom.Sorry
Machine Learning-based
Heur.AdvML.B
|
Cerber ransomware targeting Atlassian Confluence and Gitlab RCE CVEs
A new ransomware variant adopts an old name “Cerber” (named CerberImposter on ID Ransomware) and also its ransom note and TOR payment site. The updated code uses newer versions of the crypto library and has released Linux variants, while the old Cerber versions had only windows compiled variants. The ransom notes created by the newer version is named _$$RECOVERY_README$$_.html and is appending the .locked extension to the user’s encrypted files.
On the new activity seen by this group, the threat actor was targeting publicly disclosed remote code execution CVEs for Atlassian Confluence (CVE-2021-26084) and GitLab (CVE-2021-22205) to gain remote access without authentication. Patches have been rolled out for both the CVEs and we would recommend users keep their system up to date.
Symantec protects you from this threat, identified by the following:
File-based
Downloader.Trojan
Trojan.Gen.2
Trojan.Gen.NPE
WS.Malware.1
Web-based
Observed domains are covered under security categories
|
Cerberus as fake Chrome update in the mobile threatscape
Fake updates are a common social engineering tactic used by both grayware and malware actors as a means to deliver their payload. While computers are the most impacted platform, mobile devices such as Android also see their fair share. In one recent example, a group or individual has been observed luring mobile users with fictitious Chrome updates (Chrome_Update_[random version number].apk and/or Chrome.apk) that are actually a remote access trojan known as Cerberus – a sophisticated Android banking malware with remote access capabilities that first emerged in the threat landscape around 2019.
Symantec protects you from this threat, identified by the following:
Mobile-based
AppRisk:Generisk
|
Cerberus targets mobile users' finances
Within the Android threat landscape, banking malware are highly prevalent and a particularly nasty one known as Cerberus has been stealing from Android users since at least 2019. In its early days, authors behind this mobile threat employed a malware-as-a-service model, but in late 2020 they released their source code for free after a failed auction. Since that time, Symantec has continued to observe Cerberus being used by multiple groups and individuals.
Symantec protects you from this threat, identified by the following:
Mobile-based
Android.Reputation.2
|
Chaes Infostealer updated version spotted
According to reports, an updated version of the Chaes Infostealer is circulating. The attack begins with a phishing email containing a malicious URL disguising itself as an urgent communication request related to a legal case and written in Portuguese. Clicking on the link redirects victims to a deceptive website impersonating TotalAV, where users are prompted to enter their password to download a document. This action triggers the delivery of an MSI installer. Upon successful activation of the installed malware, exfiltrated data is sent to the threat actor's C2 server, accessible through the Chaes team panel login page.
Symantec protects you from this threat, identified by the following:
File-based
CL.Downloader!gen89
Scr.Malcode!gen
Trojan Horse
Trojan.Gen.MBT
Web.Reputation.1
WS.Malware.1
WS.SecurityRisk.4
Email based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products.
|
Chameleon mobile banking trojan
Chameleon is a new mobile banking trojan variant that emerged on the threat landscape this year. The malware has been seen in campaigns targeting Android users in Australia and in Poland where the malware binaries have been masqueraded as a cryptocurrency app called Coinspot or IKO bank application respectively. Chameleon's capabilities include keylogging, SMS harvesting, cookie stealing and more. The malware also employs anti-emulation techniques and has the ability to disable the Google Play Protect security feature on infected Android devices.
Symantec protects you from this threat, identified by the following:
Mobile-based
Android.Reputation.2
AppRisk:Generisk
Web-based
Observed domains/IPs are covered under security categories
|
Chamelgang APT
Light has been shed on yet another APT group, Chamelgang. This actor has been active in at least 10 countries around the globe according to reports, and mimicking various known IT companies' domains in their attack chain. Additionally, they also leverage new vulnerabilities such as ProxyShell as well as multiple malware including TinyShell, CobaltStrike, Webshells, BeaconLoader, DoorMe and ProxyT.
Symantec protects you from these threats, identified by the following:
File-based
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Horse
|
Chaos - Go-based successor to Kaiji malware
Chaos is a Go-based malware believed to be an updated variant of the older Kaiji botnet. The malware comes with support for various architectures, including Windows, Linux, ARM, Intel (i386), MIPS and PowerPC. One of the main distribution methods of Chaos malware is through exploitation of known vulnerabilities. The malware functionality depends on the set of commands received from the C2 servers and it might include propagation to additional targets, DDoS attacks or cryptocurrency mining operations.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.SuspBeh!gen25
File-based
Linux.Kaiji!gen
Trojan Horse
Trojan.Gen.NPE
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.B!100
Network-based
Attack: Zyxel Firewall Unauthenticated Command Injection CVE-2022-30525
Web Attack: f5 Big-IP iControl Rest RCE CVE-2022-1388
Web Attack: Huawei Router RCE CVE-2017-17215
Policy-based
DCS default hardening policy provides zero day protection against the Chaos malware.
DCS prevents the bot binary from writing to disk, creating cron jobs, creating and starting services or any enumeration attempts.
Web-based
Observed domains/IPs are covered under security categories
|
Chaos ransomware baits Roblox players
The pursuit of an easy win in the gaming world has long made gamers susceptible targets for cybercriminals. This is because the very nature of how cheating tools are distributed and hosted creates an environment ripe for exploitation. Also, due to the inherent trust between gamers as players often share and exchange files, mods, or cheat programs with one another, fostering a sense of camaraderie and collaboration.
Cheat tools are typically shared through various channels within the gaming community. These include underground forums, obscure websites, private chat groups, file-sharing platforms, and even social media. Malicious groups and individuals infiltrate these channels on a daily basis, enticing gamers into downloading malware disguised as cheat tools (infostealer, remote access trojan, ransomware, coinminer, crypto wallet clipper, etc.) granting them unauthorized access to gamers' systems, personal information, or gaming accounts.
In a recent example, Symantec observed an actor who is enticing Roblox players with cheat software. However, instead of receiving the promised advantages, players find themselves facing a Chaos ransomware variant that encrypts all their files. Subsequently, the cybercriminal demands a ransom of 200 US dollars worth of bitcoin to regain access to their files.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.SuspDrop!gen1
File-based
Ransom.Sorry
Machine Learning-based
Heur.AdvML.B
|
Chaos ransomware impersonates Fortnite installer
It's well-known that Fortnite is an extremely popular online game played by many around the world. Unfortunately, people with bad intention are also aware of this, and sadly, that kind of success often attracts malevolence. In a recent example, a ransomware actor who goes by "LRD KMG," has been targeting French gamers by disguising their Chaos ransomware as a Fortnite installer. Victims will find their files encrypted and receive a short ransom note advising them to pay 1000 euros worth of Bitcoin to have their files decrypted.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.SuspDrop!gen1
File-based
Ransom.Sorry
Machine Learning-based
Heur.AdvML.B
|
Chaos Ransomware Targets Atomic Mail Sender Users
Atomic Mail Sender is a software program designed for sending bulk email campaigns. Such software is commonly used by businesses, marketers, and individuals who need to reach out to a large audience via email for purposes such as marketing campaigns, newsletters, announcements, and promotions.
Recently, a ransomware actor has been targeting potential Atomic Mail Sender users by disguising a variant of chaos ransomware as a cracked version that is distributed via drive-by-download. Upon successful compromise, files are encrypted, and a ransom note (read_it.txt) is dropped in various existing folders, demanding a ransom of $1500 worth of Bitcoin.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Untrst-RLsass!g1
ACM.Untrst-RunSys!g1
File-based
Ransom.Sorry
|
Chaos Ransomware variant more like a wiper
There's a Chaos ransomware variant that's been roaming the threat landscape disguised as a Windows 11 Upgrade assistant program. If victims are successfully lured into downloading and executing these fake upgrade programs, they'll end up having their smaller files encrypted and larger files disrupted as random bytes are added.
Per the ransom note, the actor behind this ransomware is not interested in money or stealing victim's files. The sole intent is to encrypt, destroy and make fun of its victims. Two links are presented in the note, one redirecting to a classic troll music video, the other to a Chaos ransomware decryptor. The decryptor though, will only work on the files that have been encrypted and if the actor's private key is available at the time.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Machine Learning-based
Heur.AdvML.C
|
Chaos Ransomware variants affects both consumers and enterprises
There has been a recent proliferation of Chaos ransomware variants worldwide, with multiple groups and individuals creating their own versions to carry out widespread and minimal encryption attacks. Both consumers and businesses are at risk of being targeted. Symantec has recently observed an actor targeting Minecraft players by disguising Chaos ransomware as a Minecraft installer. If successful, the encryption will demand a ransom of 1500 US dollars, with no double-extortion tactic.
Symantec protects you from this threat, identified by the following:
File-based
Ransom.Sorry
Machine Learning-based
Heur.AdvML.B
|
Chaos ransomware variant seeks French-speaking Minecraft players
Minecraft is played by many worldwide, and being such a popular video game, many cybercriminals piggyback on its success to target its player base. In a recent example, Symantec observed a Chaos ransomware actor disguising its malicious binary as a Minecraft installer and luring French-speaking users into downloading it. Upon successful encryption, it will drop a ransom note written in French, demanding 0.006 Bitcoin (valued at 166.12 USD at the time of writing) to be paid within 72 hours.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.SuspBeh!gen625
File-based
Ransom.Sorry
Machine Learning-based
Heur.AdvML.B
|
Chaos Ransomware variants target Italian and Turkish organizations
Symantec has observed various groups and individuals using multiple variants of the Chaos ransomware since the source code was made public. These variants are typically distributed through common methods such as RDP brute force attacks, known vulnerabilities in software, drive-by-downloads, and malicious emails. Recently, two specific Chaos variants have been identified that appear to be targeting Italian and Turkish organizations, possibly through malicious emails based on their names (faturra and sipariş listesi). The individuals behind these variants do not engage in double-extortion tactics nor try to spread the ransomware to additional devices within victims' infrastructure. The ransom demands for these variants are relatively low, with one requesting 500 US dollars and the other requesting 1600 US dollars, both to be paid in Bitcoin.
Symantec protects you from this threat, identified by the following:
File-based
Ransom.Sorry
Machine Learning-based
Heur.AdvML.B
|
Chaos Ransomware variant targets users with a CashApp social engineering lure
A ransomware chaos variant is roaming loose, infecting a single machine by luring users with CashApp social engineering. CashApp is a mobile financial services platform available in the United States and the United Kingdom.
The criminals behind this activity have disguised the malicious binary as an information file about their CashApp being hacked. If users execute it, they'll find their files encrypted, wallpaper changed, and a ransom note asking for $100 worth of Bitcoin to be paid to a provided crypto wallet address.
Symantec protects you from this threat, identified by the following:
Behavior-based
ACM.Untrst-RLsass!g1
ACM.Untrst-RunSys!g1
File-based
Ransom.Sorry
|
Chaos Ransomware variant targets VPN seekers
Malware actors often disguise their malicious software as VPN installers, as VPNs are increasingly popular and many people seek ways to protect their online privacy and security.
Symantec has observed a group or individual behind a Chaos Ransomware variant targeting consumers and enterprise users who are searching for VPNs in the wrong places. The ransomware binary, disguised as a VPN installer, adds a ".locked" extension to encrypted files and drops the classic Chaos ransom note. Victims are asked to pay 1500 US dollars worth of Bitcoin to decrypt their files. This campaign does not employ the double-extortion tactic.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.SuspDrop!gen1
File-based
Ransom.Sorry
Machine Learning-based
Heur.AdvML.B
|
Chaos ransomware variant threatens victims with illicit content ruse
Symantec has recently observed a variant of the Chaos ransomware, where the actor targets individual machines and employs a double-extortion tactic which differs from the classic approach. In addition to encrypting files, the ransomware changes the machine's wallpaper, stating that explicit and illicit child content was found on the user's machine and displaying the FBI logo. According to the ransom note, they are demanding 1000 US dollars worth of Bitcoin to decrypt files. To add additional pressure, if the victim does not comply, the attackers threaten to send all illicit files they claim to have collected to the FBI.
While this is an uncommon tactic nowadays, it's not entirely new, and is in fact a social engineering tactic taken from older Ransomlock strains. It's unfortunate that certain ransomware actors resort to such distasteful tactics to pressure their victims. This approach preys on the fear of legal consequences and the potential damage to one's reputation, clearly intended to cause extra distress and even panic in the hope that it will make individuals more likely to comply with the ransom demands.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.SuspDrop!gen1
File-based
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B
|
Chaos variant in Turkey demands 10,000 Turkish Lira worth of cryptocurrency
Consumers and enterprise users in Turkey have recently become targets of a ransomware actor running a Chaos variant. The impact of their activities remains low compared to some other infamous ransomware as they to do not move laterally within infrastructure. They primarily target single machines, asking for cryptocurrency payments to a Metamask wallet, amounting to 10,000 Turkish Lira.
Symantec protects you from this threat, identified by the following:
Behavior-based
ACM.Untrst-RLsass!g1
SONAR.Dropper
ACM.Ps-RgPst!g1
ACM.Untrst-RgPst!g1
SONAR.SuspBeh!gen625
SONAR.SuspLaunch!g250
SONAR.SuspLaunch!g18
SONAR.SuspLaunch!gen4
ACM.Vss-DlShcp!g1
SONAR.Suspl
File-based
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B!100
|
Chaos variant: playing mind games, but chasing crypto
Chaos variants are observed on a daily basis, with the majority targeting single machines of consumers and enterprises via drive-by-download tactics, often posing as legitimate software of various genres. Recently, Symantec observed a variant in which the actor provides no means to contact them in the ransom note, nor asks for a specific amount to decrypt. The note indicates that to retrieve the private key, they'll need to find a secret file on the affected machine (which is actually not true). In addition to encrypting files and changing the wallpaper to a black and white image of some trees, the variant has the capability to monitor content being copied to the clipboard, and modify it. If the content is recognized as a Bitcoin address, it's replaced with a different one, the ultimate goal here of course being to steal cryptocurrency.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.SuspDrop!gen1
AGR.Terminate!g2
File-based
Ransom.Sorry
Machine Learning-based
Heur.AdvML.B
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.