text
stringlengths
0
383k
ChatGPT-themed Android Malware Threat actors are continuously creating ChatGPT-themed lures to spread malware disguised as AI chatbots which are currently very popular. The malware being spread includes two types, a Meterpreter trojan disguised as a "SuperGPT" application and one calling itself "ChatGPT" which sends short text messages to premium-rate numbers in Thailand. Premium-rate numbers cost more than calls to normal phone numbers and can end up being quite expensive. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT WS.Malware.1 WS.Malware.2 Mobile-based Android.Reputation.1 Android.Reputation.2 AppRisk:Generisk
CherryBlos mobile malware CherryBlos is a newly discovered mobile malware variant used to steal credentials of cryptocurrency wallets or to replace the wallet addresses during crypto transactions. The malware has been distributed through posts on popular social network portals containing ads redirecting users to phishing websites that spread the malicious apps. CherryBlos is packed with Jiagubao commercial packer and it comes with various techniques ensuring its' persistence and detection evasion on the infected device. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk Android.Reputation.2 AppRisk:Generisk Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Chimaera - new campaign from the TNT APT group A new campaign attributed to the TNT APT group and dubbed as Chimaera has been discovered. The attackers have been reported to leverage a variety of shell scripts, coin-miners, IRC bots and open source tools in coordinated attacks on multiple platforms including Windows, Linux, AWS, Docker and Kubernetes. Same as in the past, the TNT threat group has been focusing the efforts on stealing system credentials and exploiting the infected machines for cryptomining, among others. Symantec protects you from this threat, identified by the following: File-based Linux.Backdoor.Kaiten Trojan Horse WS.Malware.1 Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains are covered under security categories
Chimera (aka Slug) and their backdoor, OwlProxy Chimera, also known as Slug, is an active APT group that has been targeting I.T., Financial and Healthcare industries based in Asia for a few years now. In their campaigns, they have been using a backdoor dubbed OwlProxy which they've recently updated. This malware allows them to tunnel in and out of the victim's network, and run commands on the targeted machine. Symantec protects you from this threat, identified by the following: File-based Trojan.Owprox Heur.AdvML.C Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 WS.Malware.2
ChinaZ and ShellBot among the malware families targeting Linux SSH servers ChinaZ DDoS bot and ShellBot (aka PerlBot) are two of the malware families recently observed in attacks against Linux SSH servers. Shellbot is a Perl-based DDoS botnet known to attack poorly configured, internet facing devices through brute-force attacks against common passwords. Shellbot uses IRC protocol for C2 communication. ChinaZ is another type of DDoS botnet present on the threat landscape for around 10 years and known to attack both Linux and Windows environments. ChinaZ supports several different types of DDoS attacks including SYN, UDP, ICMP, and DNS Flood attacks. Symantec protects you from this threat, identified by the following: File-based Backdoor.IRC.Bot IRC.Backdoor.Trojan DDoS.Trojan Perl.Pircbot Trojan Horse Trojan.Gen.NPE WS.Malware.1 Machine Learning-based Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories
Chinese-speaking ransomware actor demands payment to TRC20 wallet A Chinese-speaking ransomware actor has been spotted making the rounds. If the ransomware is successfully executed on a victim's system, it will drop multiple ransom notes (请阅读解锁.txt, which translates to "Please read the instructions") as files are encrypted. Currently, the dropped ransom note is written in Chinese, and victims are being asked to pay $8,000 to a TRC20 wallet. This ransomware actor does not seem to employ double-extortion tactics according to their ransom note. TRC20 tokens and the TRON blockchain have gained popularity in China. Since its launch in 2017, TRON has attracted a significant following in China and has garnered attention for its high-profile partnerships and marketing efforts. Similar to ERC20 tokens on the Ethereum blockchain, TRC20 tokens are fungible and can represent any tradable digital asset, such as cryptocurrencies, utility tokens, or even tokenized assets like real estate or commodities. The TRC20 standard defines a set of rules and functions that enable the creation, transfer, and management of tokens on the TRON network. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.SuspDrop!gen1 File-based Ransom.HiddenTear!g1 Machine Learning-based Heur.AdvML.B
Chinese espionage campaign targets Asian semiconductor sector A new espionage campaign is targeting semiconductor companies in Taiwan, Singapore, and Hong Kong with Cobalt Strike malware. The campaign has links to multiple Chinese APT groups. According to recent research, the attackers are using lures mentioning Taiwan Semiconductor Manufacturing (TSMC) to initiate the attacks. These lures delivered a version of the Hyperbro loader that is loaded via DLL sideloading using a signed CyberArk binary. Hyperbro is then used to run Cobalt Strike Beacon in-memory. DLL side-loading is a well-known technique that involves attackers placing a malicious DLL in a directory where a legitimate DLL is expected to be found. The attacker then runs the legitimate application themselves (having installed it themselves in most cases). The legitimate application then loads and executes the payload. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.TCP!gen1 File-based Backdoor.Cobalt Meterpreter Packed.Generic.347 Trojan Horse Trojan.Gen.MBT Machine Learning-based Heur.AdvML.A Heur.AdvML.A!400 Heur.AdvML.A!500 Heur.AdvML.A!300 Heur.AdvML.B!100 Heur.AdvML.B!200 Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
chMiner: New RAT in town Symantec Security Response is aware of a new Remote Access Trojan (RAT) called chMiner in the wild. The malware is being sold on the underground and is being advertised to have typical RAT capabilities such as: Miners cpu/gpu Remote desktop Keylogger WebCam Execute code: .Net, PowerShell Anti-VM Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT
CHM malware spread in recent campaigns targeting Korean users According to a recently released report malicious campaigns leveraging chm files have been seen impersonating communication guides from Korean financial institutions and insurance companies. These fraudulent guides cover topics such as "credit card limit," "results of insurance fee withdrawal," and "banking contracts". If a victim is tricked into running the malicious CHM file, they will unknowingly infect their machine with malware that can be used to exfiltrate user credentials and personal data among others. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products File-based Downloader Infostealer.Eynice Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
ChromeLoader malware campaigns continue ChromeLoader (also known as Choziosi Loader) is browser hijacker malware that changes browser settings with the purpose of redirecting the user's traffic to advertisement websites. The malware emerged initially around January 2022 and over the next few months multiple variants of it have been leveraged across several campaigns. As different variants for both Windows and MacOS platforms exist, the malware has capabilities to target Chrome or Safari browsers likewise. Chromeloader's malicious browser extensions have mostly adware functionalities but on some occasions they can also serve as infostealers - by intercepting the user’s search engine queries and forwarding them to the attacker's C2 servers. Symantec protects you from this threat, identified by the following: File-based Downloader.Chromesten OSX.Trojan.Gen PUA.Downloader Trojan Horse Trojan.Gen.MBT WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.B Heur.AdvML.C Network-based System Infected: Trojan.Backdoor Activity 634 Web Attack: Malicious Javascript Website 42 Web Attack: Malicious Website Request 10 Web Attack: Malicious Website Request 11 Web-based Observed IPs/domains are covered under security categories
ChromeLoader targets enterprises in recent campaigns In recent activity we have observed an evolution of usage of the ChromeLoader malware tool. Active since at least early 2022, the tool was used to primarily target consumers for credential theft. Our data shows that recent attacks are against enterprise targets for the purpose of delivering ransomware, data theft, and causing system instability. Threat actors have leveraged a variety of methods for distributing ChromeLoader. Campaigns have used malicious ads, social media sites, cracked or pirated software, and impersonation of legitimate software as some of the methods to spread this malware. ChromeLoader is typically installed by way of an ISO that is downloaded to the victim machine. The ISO gets mounted on the compromised system and the contents within are responsible for delivering the malicious executable to the computer. Symantec protects you from this threat, identified by the following: File-based Downloader.Chromesten Downloader.Chromst!g1 Trojan.Chromeloader Trojan Horse Trojan.Gen.MBT WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.B Network-based Malicious Site: Malicious Domain Request 21 Malicious Site: Malicious Domain Request 22 Web Attack: Malicious Website Request 10 Web Attack: Malicious Website Request 11
Chropex hijacks macOS users' browser Yet another browser hijacker has been observed recently in the macOS threat landscape. While Chropex is predominantly active in the US, Symantec continues to observe more instances in other countries. Actors behind this hijacker have been delivering it via malvertising campaigns and drive-by-download which are classic to the macOS threatscape vector-wise. If it successfully hijacks a victims' browser, it will open Safari and display web ads but also monitor Safari's searches in order to inject more ads. Symantec protects you from this threat, identified by the following: File-based OSX.Chropex
CinaRAT - QuasarRAT's successor distributed in the wild Symantec Security Response is aware of new campaigns distributing the CinaRAT malware. CinaRAT is a rebranded variant of the older QuasarRAT and its code is publicly available on Github. According to the reports CinaRAT is being delivering via ISO archive files. Symantec provides the following detections against CinaRAT malware: File-based ISB.Downloader!gen80 Trojan Horse Trojan.Gen.MBT Trojan.Gen.NPE
Cinoshi Malware-as-a-Service (MaaS) Cinoshi is a new malware variant distributed in the form of a Malware-as-a-Service (MaaS) offering. The malware consists of several modules including infostealer, data clipper, botnet and a cryptocurrency miner. Cinoshi is .Net based and incorporates several anti-tampering and persistence techniques. It targets web browser data including cookies, credentials and banking information, among others. The infostealing module also allows it to harvest data from crypto wallets, take screenshots or steal session keys of various running applications such as Discord or Telegram. Symantec protects you from this threat, identified by the following: File-based Scr.Malcode!gdn32 Trojan Horse Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.B Web-based Observed domains/IPs are covered under security categories
Clasiopa threat group A hitherto unknown attack group has been observed targeting a materials research organization in Asia. The group, which Symantec calls Clasiopa, is characterized by a distinct toolset, which includes one piece of custom malware (Backdoor.Atharvan). The infection vector used by Clasiopa is unknown, although there is some evidence to suggest that the attackers gain access through brute force attacks on public-facing servers. Read more in our blog: Clasiopa: New Group Targets Materials Research Symantec protects you from this threat, identified by the following: Behavior-based SONAR.SuspDrop!gen1 SONAR.TCP!gen6 File-based Backdoor.Atharvan Hacktool Trojan Horse Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.C
Clast82, evasive Android dropper Recently there have been reports of a malicious dropper known as Clast82 which evaded Google evaluation and ended up on its application store. The malicious dropper is using Firebase as the C2 and GitHub as the hosting platform to download additional payloads such as AlienBot. Actors behind that malware have added their malicious code to open source android applications (VPN, QR and Music) which mobile users tend to download. Symantec has the following protection in place: Mobile-based Android.Reputation.1 Android.Reputation.2
ClearFake campaign delivers Atomic Stealer (AMOS) malware to macOS users Atomic Stealer (aka AMOS) is a malware variant for macOS platform that has been recently distributed in a malicious campaign dubbed as ClearFake. The attackers disguise the malicious binaries as fake Safari or Chrome browser update DMG packages. AMOS Stealer is known to exfiltrate a wide variety of sensitive data from infected macOS machines, including system information, keychain passwords, browser data and cookies, credit card details, cryptocurrency wallets, among others. Symantec protects you from this threat, identified by the following: File-based OSX.Trojan.Gen WS.Malware.1 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Cling! You have a new malicious meeting reminder One of the sole purposes of file sharing or storage services is to offer the user with a variety of sharing capabilities and share / store documents on the go. However, this is turning out to be a sweet spot for Threat actors as observed by Symantec in a recent malspam run. As shown in Figure 1, emails purporting to be meeting reminder notifications are sent to the recipient in the context of a file been shared. The email body is kept short and imitates a legitimate email template from one of the file sharing services. In order to view the shared file, the recipient has to click on the hyperlinked text contained within the email body. Figure 1: Malspam email masqueraded as a meeting reminder notification A single click redirects the user to a legitimate file storage service webpage while the malicious payload downloads onto the recipient’s computer. This malicious .xls file when opened, prompts the user to enable macros for a better view of the file content. Enabling macros in the .xls file in turn downloads a malicious downloader which in then downloads an infostealer, Agent Tesla. Symantec provides the following protection against the malware distributed in this campaign: File-based Trojan.Gen.2 W97M.Downloader Infostealer.Atesla Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
CLOP ransomware is actively targeting enterprises CLOP is a ransomware family first discovered back in 2019 and considered as an evolution to the older Cryptomix ransomware. Earlier last year there have been multiple reports on CLOP ransomware being distributed by the FIN11 threat group. Attackers behind CLOP remained very active in first months of 2021 and have been targeting multiple enterprises and universities, among others. It has been reported that threat actors affiliated with this ransomware have been leveraging the Accellion File Transfer Appliance (FTA) vulnerabilities in their attacks. CLOP attackers also attempt to exfiltrate large amount of data from the compromised Accelion servers and later threaten victims to release it publicly. As we continue to monitor and enhance our protections against CLOP ransomware variants, we recommend performing regular backups for any important data and ensuring your security products are kept up to date with the latest product definitions. Symantec protects you from this threat, identified by the following: File-based Downloader Heur.AdvML.B Heur.AdvML.C Ransom.Cryptolocker Ransom.Ploc Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 WS.Malware.2 Behavior-based SONAR.Cryptlck!g187
CLOP ransomware re-surges with new activity CLOP is a ransomware family first discovered in 2019 as an evolution to the Cryptomix ransomware. Its many variants have been known to be distributed among others by the TA505 APT group in the past and most recently also by FIN11 group. According to the latest reports, FIN11 group has also been threatening the ransomware victims with publishing the stolen data in order to pressure them into paying the demands. Similar to other ransomware variants, CLOP will attempt to terminate various Windows services and processes before the encryption. Many early and recent CLOP samples have been signed with stolen digital certificates - an attempt to give a sense of legitimacy to the malicious files. We recommend regular backup procedures of any important files and applying the latest product definitions to protect against ransomware threats. Symantec protections: File-based Downloader Heur.AdvML.B Heur.AdvML.C Ransom.Ploc Trojan.Gen.2 Trojan.Gen.MBT Trojan Horse
CLOP Ransomware still out there CLOP Ransomware is not new, in fact it's been around since at least 2019. Over the years since, it has continuously been seen targeting organizations of various size via multiple infection vectors such as spear phishing, vulnerable servers, RDP brute force attacks, etc. Actors behind this threat are using double extortion tactics, threatening to sell or leak stolen encrypted files if the ransom is not paid. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B
Clop ransomware variant for Linux arrives with an encryption bug A new Linux variant of the well known Clop ransomware emerged in the wild. First used in campaigns around the end of December 2022, the Linux variant is similar to its Windows counterpart. It also includes some specific targeting of Oracle database folders for the purpose of data encryption. Clop for Linux has been found to contain a serious encryption logic flaw which allows the victims to retrieve the encrypted files without paying the ransom. This recent Clop Linux strain is most likely still in a development phase and it is believed that new improved variants will keep emerging and will continue to target the Linux-based systems. Symantec protects you from this threat, identified by the following: File-based Packed.Generic.620 Ransom.Ploc Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.2 Machine Learning-based Heur.AdvML.B
Cloud9 Javascript botnet Cloud9 is a Javascript botnet that often comes in form of a malicious browser extensions. The underlying Javascripts can also be used for standalone execution by the threat actors and as such be distributed via user redirections to websites containing those malicious .js scripts. Cloud9's functionality includes theft of cookies, keylogging, cryptocurrency mining, ads injection and delivery of additional arbitrary payloads. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.SuspBeh!gen667 File-based Hacktool Scr.Malcode!gen Trojan Horse Trojan.Gen.NPE Trojan.Malscript WS.Malware.1 Machine Learning-based Heur.AdvML.B Web-based Observed domains/IPs are covered under security categories
Cloud based team collaboration services abused in new phish wave Services offered by Nuclino, a cloud based team collaboration platform, have been abused in a recent phish run to steal credentials. As shown in Figure 1, emails disguised as notification messages are sent to recipients luring them into opening a shared file. In order to view the file, the recipient needs to click on the hyperlinked text – “Access File” - beneath which an embedded legitimate URL of Nuclino services is present. Figure 1: Phishing email disguised as a notification message with nuclino.com URL embedded within the email content. As shown in Figure 2, upon clicking the embedded URL, the user is provided with an option to view /download the shared .pdf document by further clicking on the hyperlinked text. Figure 2: The embedded nuclino.com URL when clicked requires the user to click the hyperlinked text to view the shared document. Upon clicking the hyperlinked text, the user is served with a fake login page aimed at stealing credentials as shown in Figure 3. Figure 3: Fake login webpage designed to steal credentials. Protection Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Cloudflare R2 abused to host Roundcube phishing Webmail services are often impersonated by phishing actors in an attempt to snatch enterprise email credentials. Symantec observes these attacks on a daily basis. In a recent example, we identified a campaign that impersonates Roundcube, a popular open-source webmail application known for providing a user-friendly interface to access email accounts via a web browser. In this campaign, actors are sending emails with the subject "[Company Name] Warning !!! Deactivation alert" to various industries worldwide. If victims are lured by these emails and click on the malicious URL, they will be redirected to a fake Roundcube login phishing page hosted on Cloudflare's R2. URL pattern: hxxps://pub-[removed][.]r2[.]dev/RWMAIL[.]html#John[.]Doe@JohnDoe[.]com Cloudflare's R2 is a free hosting service provided by Cloudflare that allows users to deploy static sites quickly. Unfortunately, the convenience and ease of use offered by such services can also be attractive to malicious actors, including those involved in phishing. Symantec protects you from these threats, identified by the following: Email-based Coverage is in place for Symantec's email security products Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
CloudMensis - a new malware targeting macOS A new macOS backdoor dubbed CloudMensis has been discovered in the wild. The malware leverages public cloud storage for C&C communication - this includes Dropbox, pCloud and Yandex Disk services. CloudMensis malware is used by the attackers to ex-filtrate a wide variety of sensitive user's data including documents, screenshots, email messages and keystrokes. CloudMensis also has functionality that allows it to bypass TCC (Transparency, Consent, and Control), which is a macOS mechanism to control application access to certain OS functions. Symantec protects you from this threat, identified by the following: File-based OSX.Trojan.Gen WS.Malware.1
Cloud services being abused to deliver malware Cybercriminals are always on the lookout for inconspicuous ways to deliver their threats and the use of legitimate cloud services to host malware is not new. A short time ago a particular group began using a custom downloader to download malware hosted on a well known VoIP, instant messaging and digital distribution platform that is highly popular among gamers and content creators and is also used by companies. Over the past 30 days, Symantec observed a multitude of companies in the agricultural, food, wholesale and engineering supply business become the target of these actors in three tailored spam campaigns, focused mainly on the EMEA region but including industries in the U.S., Middle East and Asia Pacific. According to our analysis, they continue to use the AveMaria RAT as the final payload, just as they did earlier this year. Indicators of compromise (IOC): Email subject: [Removed] Agricultural Machinery Solutions- PO11009827625 (Third-Party Procurement) Attachment: Doc00918761510gl_Signed.xz Content: Doc00918761510pgl_Signed_.exe Email subject: RFQ_11092874734697298 Attachment: PO_10082775347623.xz Content: PO_10082775347623.exe Email subject: [Removed] Procurements Enquiry-Kindy Treat and Revert to us for Onward Discussion Attachment: 001911876254309.001 Content: 001911876254309.exe Symantec has the following coverage in place for this attack: File-based Downloader.Cordisa Backdoor.Avecma Trojan.Horse WS.Malware.2 Heur.AdvML.B Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. Website-based This activity is proactively blocked by Symantec Web Isolation technology.
CLR SqlShell malware leveraged in attacks against MS-SQL servers CLR SqlShell malware has been observed increasingly being leveraged in attacks against MS-SQL servers. The attackers are abusing the CLR Stored Procedures functionality that allows for code management and execution in the MS-SQL environment. CLR SqlShell malware is mostly used in the initial attack stages to execute attacker's commands and download additional payloads. Some of the most recent attacks where SqlShell was used led to the distribution of Trigona ransomware, coinminers such as MRBMiner, MyKings or LoveMiner, but the attackers might also be deploying many other various malware strains, backdoors or proxyware variants using similar attack chains. Symantec protects you from this threat, identified by the following: File-based Backdoor.Trojan Trojan Horse Trojan.Gen Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.2 Policy-based Symantec Data Center Security (DCS) provides 0-day protection for CLR SqlShell attacks against MS-SQL servers: Lockdown of the DCS SQL server sandbox to limit inbound connections to trusted internal networks will prevent threat actors gaining initial access through brute force or dictionary attacks. Additional DCS rules to detect/audit for arbitrary/unexpected inbound connections might be also added for enhanced security. DCS prevents SQL server from launching command interpreters including cmd.exe, powershell.exe and others as child processes. DCS hardening policy will also prevent the download of any additional payloads onto the server. Web-based Observed domains/IPs are covered under security categories
Clubhouse trendiness attracts Mobile cybercriminals As often happens when a service becomes trendy, cybercriminals swoop in! Clubhouse, a social networking app based on audio-chat has gained in popularity in recent months and as expected malicious actors are trying to piggyback on its fame in order to infect its users. While Clubhouse is currently only available to IOS users, there have been reports of BlackRock Android malware purporting to be the Android version. Aside from social media applications, we continue to see Blackrock pretending to be COVID-related mobile applications produced by various country's organizations. Believed to be based on Xerxes source code which itself was an Android Lokibot variant, Blackrock is capable of stealing passwords and credit card information from more than 300 applications. Symantec protects you from this threat, identified by the following: Mobile-based Android.Reputation.1
CMLocker Ransomware uptick Over the past few months, a ransomware known as CMLocker has been making the rounds across the globe. If it successfully compromises a machine, encrypted files will usually have a .CMLOCKER extension appended to them. Unlike some of its counterparts, the actors behind CMLocker do not resort to double-extortion tactics and don't seem to laterally spread in the victim's environment. In the ransom note left on the victim's machine, they ask for 980 US dollars worth of Bitcoin. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.Heur.Dropper SONAR.SuspBeh!gen93 SONAR.SuspLaunch!g18 File-based Trojan.Gen.6 Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B
Cobalt Mirage and Drokbk There have been reports of Cobalt Mirage activity earlier this year where the attackers leveraged the infamous Log4j vulnerabilities as the initial vector of infection. When the intrusion is successful, a backdoor known as Drokbk is dropped, which uses Github as a drop-dead resolver. This group has been active since at least 2020 and mostly seen targeting western organizations (USA, Israel, Europe, Australia). Earlier this year, ransomware activities were also linked to this group. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT Network-based Attack: Log4j2 RCE CVE-2021-44228 Attack: Log4j2 RCE CVE-2021-44228 2 Attack: Log4j CVE-2021-45046 Attack: Log4j CVE-2021-45105 Audit: Log4j2 RCE CVE-2021-44228 Machine Learning-based Heur.AdvML.C
Cobalt Strike and XMRig distributed via exploitation of an old CVE-2019-18935 Telerik UI flaw According to a recent report, the exploitation of a three-year-old Telerik UI RCE vulnerability (CVE-2019-18935) has been observed in a recent malware distribution campaign. The attackers have been targeting vulnerable web servers in an effort to deliver Cobalt Strike beacons and initiate a PowerShell script which ultimately leads to the delivery of the XMRig cryptominer payload. This current campaign shows certain similarities with some older activities of the threat group known as Blue Mockingbird which has been known to exploit the same Telerik UI vulnerabilities in attacks targeting Microsoft IIS servers back in 2020. Symantec protects you from this threat, identified by the following: File-based Backdoor.Cobalt!gm5 Meterpreter Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.C Network-based System Infected: Trojan.Coinminer Activity 32 Web Attack: Telerik UI CVE-2019-18935 Web Attack: Telerik UI CVE-2019-18935 2 Policy-based DCS default hardening sandbox will protect TelerikUI based web servers from crypto miner and Cobalt Strike infections Web-based Observed IPs/domains are covered under security categories
Cobalt Strike Beacon Linux version dubbed 'Vermilion Strike' Recently, a group of security researchers spotted a new variant of Cobalt Strike Beacon - a Linux version they dubbed 'Vermilion Strike', crafted by unknown threat actors. The legitimate security tool is one of the most sought-after second stage bearers of cybersecurity attacks as it offers enhanced post-exploitation capabilities. The Linux environment is less safe now because of this, and continuous vigilance is vital in order to minimize cybersecurity risk. Vermilion Strike can perform the following tasks once deployed on a compromised Linux system: Change working directory Get current working directory Append/write to file Upload file to C2 Execute command via popen Get disk partitions List files Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. File-based Heur.AdvML.B Heur.AdvML.C Meterpreter Trojan.Gen.MBT WS.Malware.1 WS.SecurityRisk.1 Web-based Observed domains/IPs are covered under security categories
Cobalt Strike beacons delivered in recent campaigns A new malicious campaign distributing the Cobalt Strike payload has been discovered in the wild. The attackers have been leveraging phishing documents with lure themes relating to job descriptions or job details of government organizations. The spread maldoc attachments attempt to exploit a relatively old CVE-2017-0199 MS Office RCE vulnerability. If successfully exploited, the attack chain continues through a series of VB and PowerShell scripts until a final payload is downloaded. Aside of Cobalt Strike beacons also Redline Stealer and Amadey bot binaries belong to the downloaded payloads. Cobalt Strike may assist attackers in execution of malicious actions in follow-up attacks or in the delivery of additional arbitrary binaries. Symantec protects you from this threat, identified by the following: File-based Backdoor.Cobalt Backdoor.Cobalt!gm1 CL.Downloader!gen173 ISB.Downloader!gen48 ISB.Downloader!gen63 Scr.Malcode!gen Scr.Malcode.T!ge Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE.C W97M.Downloader Machine Learning-based Heur.AdvML.B Network-based Attack: Malicious RTF File CVE-2017-0199 System Infected: Infostealer.Amadeybot Activity Web-based Observed domains/IPs are covered under security categories
Cobralocker disguises itself as Among Us executable New variants of the CobraLocker ransomware are reportedly out in the wild disguised as executables for a popular online multiplayer game "Among Us". Some of the recent file names used by this ransomware that Symantec observed are: AmongUs2.exe or AmongUsLauncher.exe. The malware will attempt to terminate several system processes before encrypting user files. Once the encryption is complete it will demand Bitcoin payment for data decryption. As we continue to monitor and enhance our protections against Cobralocker ransomware variants, we recommend performing regular backups for any important data and ensuring your security products kept up to date with the latest product definitions. Symantec protection against the latest variants of Cobralocker ransomware family includes: File-based Downloader Heur.AdvML.B Heur.AdvML.C Trojan.Gen.MBT Trojan Horse WS.Malware 1
CodeRAT source code leaked on Github The source code of a remote access trojan dubbed CodeRAT has been reported as leaked on Github. The malware has been recently used in an attack campaign targeting Farsi-speaking code developers. The campaign used malicious Word documents containing Microsoft Dynamic Data Exchange (DDE) exploits to spread the malware. Instead of relying on dedicated C2 servers for communication and data ex-filtration, the attackers leveraged Telegram-based anonymous file upload APIs. CodeRAT supports around 50 different commands including data collection and ex-filtration, process termination, screenshot grabbing, as well as download and execution of arbitrary files, among others. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE W97M.Downloader WS.Malware.1
Colibri Loader and Warzone RAT deployed in the latest UAC-0113 APT campaigns New activities attributed to the UAC-0113 threat group have been observed, where the attackers use dynamic DNS domains masquerading as Ukrainian telecommunications companies in an attempt to spread malware onto the networks of Ukrainian organizations. The employed attacks use various lure documents related to military operations, administration notices, reports, etc. The threat group is leveraging malicious ISO files that deliver executables deploying Colibri Loader and the Warzone RAT (aka AveMaria) payloads. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.SuspBeh!gen25 SONAR.SuspLaunch!g12 File-based Backdoor.Avecma Infostealer Packed.Generic.516 Packed.Generic.526 SMG.Heur!gen Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.1 WS.SecurityRisk.3 Machine Learning-based Heur.AdvML.B Network-based System Infected: Trojan.Backdoor Activity 446 Web-based Observed domains/IPs are covered under security categories
Colisimo smishing campaign in France Shipping companies that cater to both consumers and enterprises are continuously being used in social engineering attacks to scam users and/or steal their credentials and other sensitive information, such as addresses, names, credit cards, etc. These campaigns are observed on a daily basis worldwide and are primarily executed through malicious emails and SMS. Recently, Symantec has observed a smishing campaign in France in which actors are posing as Colissimo – a French postal service and courier company specializing in parcel and package delivery. Colissimo is part of La Poste, the French postal service, and is a major player in parcel delivery services in France. In this campaign, the perpetrators are attempting to deceive mobile users by claiming that their package has encountered a shipping issue and advising them to click on a URL to verify. These actors have typosquatted Colissimo to create multiple fake domains that closely resemble the legitimate one. This tactic takes advantage of people's typographical errors when entering a website address. In the case of shipping companies, it's an effective strategy because people frequently visit these sites to track packages, check shipping status, or seek customer support. Observed SMS: Colissimo: Votre colis CH7013262652FR a rencontré un problème lors de son acheminement. Veuillez vous rendre sur le lien ci-dessous: colissimo-parceltrack[.]com Symantec protects you from this threat, identified by the following: Mobile-based Symantec Endpoint Protection Mobile is able to analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake Colissimo domains used in this campaign are known to WebPulse. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
CollectionRAT - another malware variant leveraged by Lazarus APT CollectionRAT is yet another malware variant recently leveraged in malicious campaigns conducted by the Lazarus APT. The malware exhibits certain similarities to another malware family known as EarlyRAT that has been previously attributed to the Andariel threat group. CollectionRAT has the functionalities to gather information about the infected system and execute remote commands. It also has the ability to run additional payloads downloaded from remote C2 servers. Lazarus has been also reported to increasingly rely on open-source tools usage in the initial stages of their attacks. Some examples of such tools include DeimosC2 or Malicious Plink. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 SONAR.TCP!gen6 File-based Trojan Horse Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.A Heur.AdvML.A!300 Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Color1337 - Linux cryptomining campaign Color1337 is a recently identified cryptomining operation targeting Linux-based devices. The distributed malware runs a Monero cryptocurrency miner malware and attempts to propagate to other machines within the infected network. The threat actors have been leveraging Discord servers for retrieval of the information from the compromised machines. Symantec protects you from this threat, identified by the following: File-based Hacktool Miner.XMRig Trojan Horse Trojan.Gen.NPE WS.Malware.1 Web-based Observed domains/IPs are covered under security categories
Comebacker malware spread via malicious PyPI packages by Appleworm APT Several malicious Python packages have been found in PyPI, the official Python package repository. The discovered packages (pycryptoenv, pycryptoconf, quasarlib and swapmempool) lead to the delivery of the Comebacker malware variant attributed to the Appleworm APT group (aka Lazarus). The spread malware has functionality to download and execute additional arbitrary payloads. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Ps-Rd32!g1 File-based Trojan Horse Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.1 WS.Reputation.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.A!400 Heur.AdvML.A!500 Heur.AdvML.B!100 Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
CommBank users targeted in smishing campaign CommBank, short for the Commonwealth Bank of Australia, is one of the largest financial institutions in Australia and a major player in the banking landscape of several other countries, including New Zealand, the United States, and the United Kingdom, as well as parts of Asia. Over the years, countless phishing attempts to snatch CommBank users' credentials have been observed on both computers and mobile devices. The latter, though less common, is becoming more prevalent. In one recent example, Symantec has observed an actor who has been messaging users in Australia, impersonating the bank and luring them with fake abnormal activities on their account. The SMS contains a URL with a domain that typosquats the Commonwealth Bank of Australia to strengthen the social engineering trick. Observed SMS: CommBank has detected an abnormal transaction, please follow the link prompts to complete authentication immediately: hxxps://www[.]comnebank[.]com Symantec protects you from this threat, identified by the following: Mobile-based Symantec Endpoint Protection Mobile is able to analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake CommBank domain used in this campaign are known to WebPulse. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Commonwealth of Independent States government entities targeted by YoroTrooper group A recent report provided some details of activity observed by the YoroTrooper threat actor. Reportedly comprised of individuals from Kazakhstan, the group appears to be moving toward the use of more custom malware to target victims located in the Commonwealth of Independent States. Entities belonging to these regional governments along with state-owned websites have been confirmed compromises. The group delivers multiple implants that are responsible for opening reverse shells and exfiltrating content from its victims. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based Backdoor.Trojan Infostealer JS.Downloader Trojan Horse Trojan.Gen.MBT Trojan.Mallnk VBS.Downloader.Trojan WS.Malware.1 Machine learning-based Heur.AdvML.A Heur.AdvML.A!300 Heur.AdvML.B!100 Heur.AdvML.B!200 Heur.AdvML.C Network-based System Infected: Python Meterpreter Reverse TCP Activity Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
ComRAT and Zebrocy backdoor used in a series of attacks against governments We have been aware of recently released reports on activities from two prominent APT groups known as Waterbug/Turla and Earworm/Zebrocy. Both groups have been known to target a wide range of government organizations in a series of espionage operations in the past. The newest reports focus on two malware families used by those groups to exploit compromised systems - the Zebrocy backdoor and ComRAT. Symantec provides the following protections against the reported campaign: Backdoor.Trojan Hacktool.Mimikatz Trojan.Dropper Trojan Horse To find out more about earlier APT activities against governmental institutions, read our previous publications: APT28: New Espionage Operations Target Military and Government Organizations Waterbug: Espionage Group Rolls Out Brand-New Toolset in Attacks Against Governments
Confluence users warned to patch critical bug On August 25th, Atlassian released a security advisory for a couple of vulnerabilities, related to their Confluence Server and Data Center instances. In particular the vulnerability tracked as CVE-2021-26084 is a Remote Code Execution, which can allow unauthenticated attackers to remotly execute commands on a vulnerable server. The company has released a patch and customers are recommended to upgrade their servers. After a PoC was made available, indications of malicious actor scanning and exploiting the vulnerability have been seen on the raise, to the point that the US Cybercom sent a public notice warning the CVE is actively being exploited. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT Network-based Web Attack: Malicious Java Payload Upload 5 Web Attack: Confluence RCE CVE-2021-26084 Web-based Observed IPs/domains are covered under security categories
ConnectWise ScreenConnect vulnerabilities CVE-2024-1708 & CVE-2024-1709 exploited by ransomware threat groups CVE-2024-1708 and CVE-2024-1709 are two recently disclosed vulnerabilities affecting ConnectWise ScreenConnect servers. First of the flaws - CVE-2024-1708 is a high priority path traversal vulnerability that might allow unauthenticated attackers to access restricted files and directories leading to information disclosure. Second flaw - CVE-2024-1709 is a critical authentication bypass vulnerability allowing attackers access to vulnerable systems and to potentially execute malicious code. The flaws have been reported as being exploited in the wild by various ransomware threat groups including Lockbit, Black Basta and Bl00dy Ransomware. Product vendor ConnectWise already released security fix version 23.9.8 to address the reported vulnerabilities. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Ps-Rd32!g1 ACM.Untrst-FlPst!g1 ACM.Untrst-RLsass!g1 ACM.Untrst-RunSys!g1 ACM.Wmic-DlShcp!g1 Behavior-based SONAR.Ransom!gen82 SONAR.Ransom!gen113 SONAR.SuspDataRun SONAR.SuspLaunch!g193 SONAR.TCP!gen1 SONAR.TCP!gen6 File-based Backdoor.Cobalt Backdoor.Cobalt!gen19 ISB.Downloader!gen173 Packed.Generic.700 Scr.Malcode!gdn14 Scr.Malcode!gdn20 Trojan Horse Trojan.Gen.MBT WS.Reputation.1 WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B!100 Heur.AdvML.B!200 Network-based System Infected: Trojan.Backdoor Activity 721 Web Attack: ConnectWise ScreenConnect CVE-2024-1708 Web Attack: ConnectWise ScreenConnect CVE-2024-1709 Web Attack: Webpulse Bad Reputation Domain Request Policy-based DCS default hardening policy for Windows servers will prevent arbitrary command and powershell execution and prevent tampering of critical Windows OS files and folders. DCS network rules in the policy can be configured to limit ScreenConnect applications to trusted clients. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Contagious Interview and Wagemole ATP Campaign Researchers reported two new distinct ATP campaigns dubbed "Contagious Interview" and "Wagemole". For Contagious Interview, threat actors are pretending to be a legitimate employer seeking applicants. During their fictitious interview session, unknowing applicants will be lured into installing an infostealer. On the flip side, for Wagemole threat actors are posing as an applicant, mostly for US based organizations with the aim of committing cyberespionage. Symantec protects you from this threat, identified by the following: File-based Infostealer Trojan Horse Trojan.Gen.MBT Trojan.Malscript WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Continuous activities of the BlackHunt ransomware group BlackHunt is a C++-based ransomware variant initially discovered in the wild back in 2022. The malware remains active and recently has been leveraged in attacks against organizations in Paraguay. BlackHunt encrypts user files and appends an additional extension to them, which in case of the latest variant is ".Hunt2". The malware will avoid encrypting files with specific extensions as well as configuration and system files. Functionality-wise the ransomware can delete backup data and volume shadow copies on the infected machines as well as stop system restore capability of the infected system. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Ps-Reg!g1 ACM.Ps-RgPst!g1 ACM.Ps-Schtsk!g1 ACM.Ps-Wbadmin!g1 ACM.Untrst-RunSys!g1 ACM.Vss-DlShcp!g1 ACM.Wbadmin-DlBckp!g1 Behavior-based AGR.Terminate!g2 SONAR.Ransom!gen14 SONAR.SuspLaunch!g18 SONAR.SuspLaunch!g250 SONAR.SuspLaunch!g340 SONAR.TCP!gen1 File-based Ransom.BlackHunt Trojan Horse WS.Malware.2 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200
Continuous activities of UAC-0099 threat group against Ukraine "UAC-0099" is a threat group known to be targeting Ukraine since at least mid-2022. In some of the recent campaigns the attackers have been leveraging self extracting RAR .SFX archives, .LNK files masqueraded as WordPad documents as well as PowerShell scripts and a LoanPage VBS malware payload. UAC-0099 has also been observed to leverage exploitation of a known WinRAR CVE-2023-38831 vulnerability within the infection chain of their attacks. Symantec protects you from this threat, identified by the following: Behavior-based ACM.Ps-Base64!g1 ACM.Ps-TVbs!g1 ACM.Ps-Wscr!g1 ACM.Schtsk-TVbs!g1 SONAR.TCP!gen1 File-based CL.Downloader!gen4 CL.Downloader!gen241 Exp.CVE-2023-38831 ISB.Downloader!gen63 ISB.Downloader!gen77 Scr.Malcode!gen Scr.Mallnk!gen1 Scr.Mallnk!gen6 Trojan Horse Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.1 Web.Reputation.1 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Continuous operations of the Swallowtail APT group Swallowtail APT (Fancy Bear, Forrest Blizzard or ITG05) is a state-sponsored threat group known for its attacks against government and non-governmental organizations worldwide. Recent Swallowtail operations have been leveraging Masepie and OceanMap backdoors as well as a Powershell infostealer called SteelHook. All named malware variants have been previously used in earlier campaigns attributed to this threat actor. The initial attack vector relies on phishing runs using lures focused on trending topics from various fields. The threat group has also been observed to abuse free hosting platforms to host malicious payloads and leverage WebDAV servers in their attacks. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Untrst-FlPst!g1 File-based Backdoor.Trojan Infostealer Trojan Horse Trojan.Gen.MBT Web.Reputation.1 WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.A!500 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Conti ransomware keeps targeting companies worldwide Conti is a ransomware family that was first reported around July 2020 and is being regarded by some as a Ryuk ransomware successor. Since its emergence, the ransomware has been seen multiple times in the wild and actively targeting companies around the world. Like many other active ransomware families, Conti steals data from compromised victims prior to encryption. This data is then used as leverage by the threat actors to encourage victims to pay the ransom to avoid its publication. While we continue to monitor and enhance our protections against this ransomware family, we recommend regular backup procedures of any important files and applying the latest product definitions to protect against ransomware threats. Symantec protections against this ransomware family: File-based Downloader Heur.AdvML.B Heur.AdvML.C Trojan.Gen.MBT Ransom.Bitpaymer Ransom.Conti Ransom.Cryptolocker Behavior-based SONAR.Cryptlck!g171 SONAR.SuspLaunch!g18 Network-based [32179] Attack: Ransom.Gen Activity 23
Conti ransomware threat group adopts Log4j exploit to compromise VMware vCenter servers It has been reported that the threat group behind the Conti ransomware has been leveraging the Apache Log4j vulnerability in attacks targeting VMware vCenter servers. The attackers exploit the vulnerable server instances and once compromised, establish foothold that allows them for further lateral movement in the network. Read more about the Apache Log4j vulnerability in our earlier bulletin: Threat Alert: Apache Log4j RCE (CVE-2021-44228) aka Log4Shell Symantec protects you from this threat, identified by the following: File-based Downloader Ransom.Conti Ransom.Conti!gen9 Ransom.Conti!gen10 Ransom.Conti!gen11 Ransom.Conti!gm1 Trojan.Gen.2 Behavior-based CL.RansomConti!gen3 SONAR.Ransomware!g30 SONAR.RansomConti!g1 SONAR.RansomConti!g2 Machine Learning-based Heur.AdvML.C Network-based Attack: Log4j2 RCE CVE-2021-44228 Attack: Log4j2 RCE CVE-2021-44228 2 Attack: Log4j CVE-2021-45046 Attack: Ransom.Conti Activity Attack: Ransom.Conti Activity 2 Attack: Ransom.Conti Activity 3 Attack: Ransom.Gen Activity 29
Convuster MacOs Adware moves from Swift to Rust programming language According to a recently released report, the latest samples of the MacOs adware known as Convuster are now written in the Rust programming language which is a shift from previously compiling in Swift. A move to a new programming language is no less than yet another attempt at avoiding detection and making the analysis more challenging. Not only are Adware actors choosing less popular programming languages, they are also being leveraged by malicious groups developing malware. Symantec provides the following detection against Convuster: File-based OSX.Trojan.Gen
Coper masquerades as Google Chrome mobile app Coper Android banking malware has been around since at least 2021 and initially was targeting mobile users in Latin American countries but over the years has spread to European countries. As of today, this threat is still fairly active and recently Symantec has observed an actor disguising its Android banking malware (Coper) as Google Chrome mobile app (GoogleChrome02.5.apk) trying to target European mobile users. Its capabilities range from sensitive information collection to displaying fake window overlays, deceiving users into unknowingly surrendering their credentials, among other things. Symantec protects you from this threat, identified by the following: Mobile-based Android.Reputation.1
CopperStealer - a new infostealing malware A new infostealer malware has been discovered according to the latest reports. Dubbed as CopperStealer the malware has info-stealing capabilities but can also download additional malware. The observed campaigns utilizing this malware have been targeting saved browser passwords, cookies and going after Facebook and Instagram accounts among others. CopperStealer has been seen hosted on a variety of websites advertising cracked software and serial keys. Symantec protects you from this threat, identified by the following: File-based Hacktool.Rootkit Heur.AdvML.B Heur.AdvML.C SMG.Heur!gen Trojan.Gen.2 Trojan.Gen.MBT Trojan Horse
CopperStealer cranks up cryptocurrency theft CopperStealer has gained in prevalence over the last few months and according to reports is still being enhanced by its owner. In recent drive-by-download campaigns, the threat has been seen stealing victim's API keys used by cryptocurrency exchange websites via malicious browser extension. If successful, it allows the threat to steal cryptocurrencies by transferring them to the attacker's wallets. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.Di!Gen1 SONAR.Heur.Dropper SONAR.Rarsfx!Pua File-based Suspicious: Reputation Trojan.Gen.2 Trojan.Gen.MBT WS.Reputation.1 Machine Learning-based Heur.AdvML.C
CopperStealth and CopperPhish campaigns by the Water Orthrus APT The threat group known as Water Orthrus has been recently facilitating two new malicious campaigns dubbed CopperStealth and CopperPhish respectively. CopperStealth campaign delivers rootkit malware under the disguise of free software installers. The rootkit once deployed will inject the CopperStealth payload into the system processes. The payload is expected to run commands received from the C2 servers. CopperPhish campaign leverages downloader malware variants such as PrivateLoader, that in turn download the CopperPhish dropper responsible for the final payload execution. This campaign is aimed at phishing of banking and credit card information from the unsuspecting victims. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.TCP!gen1 File-based Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Trojan.Malfilter WS.Malware.1 Machine Learning-based Heur.AdvML.A Heur.AdvML.B Network-based System Infected: Trojan.Backdoor Activity 502 System Infected: Trojan.Backdoor Activity 634 System Infected: Trojan.Backdoor Activity 721 Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories
Copybara mobile malware spread in TOAD attacks Copybara mobile malware also known as BRATA has been spread in a recent wave of TOAD (telephone-oriented attack delivery) attacks targeted at customers of multiple Italian banks. The threat actors have been leveraging phishing sites impersonating webpages of various Italian financial institutions. TOAD attacks involve direct phone call between attackers and victims, where the victims are being convinced to download and run malicious binaries on their devices. Copybara binaries often come masqueraded as fake security updates and the malware has various remote access capabilities. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk Android.Reputation.2 AppRisk:Generisk
Coreid (aka Fin7) uses backdoor against US Automaker victims A recent report provided details of activity by the Coreid (aka Fin7) threat group in which victims in the US automaker industry were targeted. According to the report, the campaign leveraged spearphishing emails against selected targets by socially engineering content related to free online scanning tools. The victim would be coerced into following a link to a typosquatted domain related to a legitimate online scanner. From here, the attack chain would result in the download of a multi-stage component responsible for deploying the final backdoor payload. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Ps-Rd32!g1 ACM.Ps-RgPst!g1 ACM.Untrst-RunSys!g1 File-based Trojan Horse Trojan.Dropper Trojan.Gen.MBT WS.Malware.1 Machine learning-based Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Core Werewolf APT group targets Russian defense organizations in espionage campaign Espionage activity of the Core Werewolf APT group targeting Russian defense organizations was observed around mid-April. The attack utilized a malicious document as bait, purportedly meant for the presentation of state awards to special forces soldiers. However, the document is actually a 7zSFX archive containing a legitimate remote access tool, UltraVNC. Upon extraction, the malware creates copies of a decoy document and the UltraVNC executable, schedules tasks to run the executable, and establishes a connection to a designated server. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Untrst-RunSys!g1 ACM.Ps-Schtsk!g1 File-based PUA.Gen.2 Trojan Horse Trojan.Gen.MBT WS.Reputation.1 WS.Malware.1 Machine learning-based Heur.AdvML.C
CosaNostra botnet unleashed It has been reported that a botnet by the name of CosaNostra has been observed in the wild. This botnet is reportedly a variant of another botnet called BlackNet. The CosaNostra malware allows the attacker to perform various activities such as launching DDoS attacks, stealing confidential information from Web browsers, and sending spam emails. Symantec provides the following coverage against CosaNostra botnet: Trojan.Gen.2
CostaRicto APT campaign comes with custom-built malware We have become aware of reports of a new cyber-espionage campaign conducted by a hackers-for-hire group. The campaign dubbed as CostaRicto has been active since at least late 2019 and deploys its own custom malware alongside off-the-shelf tools in its attacks. One of the malware variants used here is SombRAT backdoor. It includes capabilities to download and execute arbitrary payloads and also collect system information and upload it to a remote server. Symantec has the following coverage in place against activities in this campaign: File-based Backdoor.Rozena Heur.AdvML.B Heur.AdvML.C Trojan.Gen.MBT Trojan Horse Trojan.Pinypot
Costco member logins targeted in a smishing campaign Symantec has recently observed a campaign in which actors are attempting to snatch Costco member logins via malicious Short Message Service (SMS). The strategy involves enticing users with the promise of a potential cashback, aiming to lure them into connecting to a phishing website. Costco is a membership-based retail giant known for its warehouse-style stores and located in multiple countries around the world. Observed malicious SMS: COSTCO Your annual cashback has been totaled as a result of your membership with us, and the sum of $58.88 is now available to be claimed.See: CostcomemberLogin[.]com Symantec protects you from this threat, identified by the following: Mobile-based Symantec Endpoint Protection Mobile is able to analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake domain used in this campaign are known to WebPulse. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Cova loader leveraged for Nosu infostealer and SystemBC distribution Cova loader has been leveraged in a recently discovered malware distribution campaign. The threat actors used the loader to spread two distinct payloads of a new infostealer dubbed Nosu and the well known proxy bot SystemBC. Nosu malware has the functionality to steal credentials, crypto-wallets, cookies or data files from the infected endpoints. The distribution of reported campaigns has been observed all across the world with the most of the infections seen in North and South America. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based Backdoor.SystemBC Trojan Horse Trojan.Gen.MBT WS.Malware.1 Machine-Learning based Heur.AdvML.A Heur.AdvML.B Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories
Coverage details for Microsoft's April Patch Release On April 13, Microsoft published their regularly scheduled monthly updates. For the April release Microsoft addressed 108 vulnerabilities. Symantec protects you from these issues, identified by the following: File-based Exp.CVE-2021-28310
Coverage details for Microsoft's August Patch Release On August 10, Microsoft published their regularly scheduled monthly updates. For the August release Microsoft addressed 44 vulnerabilities. Symantec has introduced the following protections based on available information. Additional signatures are currently being investigated and may be toggled at a later date. Network-based OS Attack: Windows Services for NFS ONCRPC XDR Driver CVE-2021-26432 (released in 8/12 definitions) Web Attack: Microsoft Scripting Engine CVE-2021-34480 (released in 8/12 definitions)
Coverage details for Microsoft's December Patch Release On December 14, Microsoft published their regularly scheduled monthly updates. For the December release Microsoft has addressed 67 vulnerabilities. An additional 16 vulnerabilities related to Chromium were previously addressed in December. Symantec has introduced the following protections based on available information. File-based Exp.CVE-2021-43883 (renamed from Bloodhound.Exploit.843) Policy-based Symantec DCS provides 0 day protection for the Windows Installer EOP vulnerability. In particular, the attempts by the POC/exploit to overwrite Windows service binaries and MSI files are prevented by DCS Windows hardening policies.
Coverage details for Microsoft's February Patch Release On February 9, Microsoft published their regularly scheduled monthly updates. For the February release, Microsoft addressed 56 vulnerabilities. Symantec has introduced the following protections based on available information. Additional signatures are currently being investigated and may be toggled at a later date. File-based (CVE-2021-1698) - Exp.CVE-2021-1698 (CVE-2021-24074) - Exp.CVE-2021-24074 (CVE-2021-24078) - Exp.CVE-2021-24078 (CVE-2021-24086) - Exp.CVE-2021-24086 (CVE-2021-24094) - Exp.CVE-2021-24094 Network-based (CVE-2021-24072) - Web Attack: XML External Entity Attack
Coverage details for Microsoft's January Patch Release On January 12, Microsoft published their regularly scheduled monthly updates. For the January release, Microsoft addressed 83 vulnerabilities. Symantec has introduced the following protections based on available information. Additional signatures are currently being investigated and may be toggled at a later date. File-based Exp.CVE-2021-1647 Network-based Web Attack: Microsoft SharePoint CVE-2021-1707
Coverage details for Microsoft's July Patch Release On July 13, Microsoft published their regularly scheduled monthly updates. For the July release Microsoft addressed 117 vulnerabilities. Symantec has introduced the following protections based on available information. Additional signatures are currently being investigated and may be toggled at a later date. File-based Exp.CVE-2021-34527 Exp.CVE-2021-34527!g1 Network-based Audit: MSRPC Windows Print Spooler RpcAddPrinterDriverEx Attempt Audit: MSRPC Windows Print Spooler RpcAddPrinterDriverEx Attempt 2 Audit: SMB Windows Print Spooler RpcAddPrinterDriverEx Attempt Audit: Windows Print Spooler RCE CVE-2021-34527 OS Attack: Windows Print Spooler RCE CVE-2021-34527 Web Attack: Microsoft Internet Explorer CVE-2020-1380 (covers CVE-2021-34448) Web Attack: Microsoft Exchange Server CVE-2021-34473
Coverage details for Microsoft's June 2022 Patch Release On June 14, Microsoft published their regularly scheduled monthly updates. For the June release Microsoft has addressed 56 vulnerabilities. One of the vulnerabilities addressed, but not explicitly listed, is the recently disclosed Follina vulnerability which has been identified as actively exploited. Symantec has introduced the following protections based on available information. File-based Exp.CVE-2022-30190 Network-based Web Attack: MSDT Remote Code Execution CVE-2022-30190
Coverage details for Microsoft's March Patch Release On March 8, Microsoft published their regularly scheduled monthly updates. For the March release Microsoft has addressed 71 vulnerabilities. Symantec has introduced the following protections based on available information. File-based Exp.CVE-2022-21990
Coverage details for Microsoft's May Patch Release On May 11, Microsoft published their regularly scheduled monthly updates. For the May release Microsoft addressed 55 vulnerabilities. Symantec has introduced the following protections based on available information. Additional signatures are currently being investigated and may be toggled at a later date. Network-based OS Attack: Windows HTTP Protocol Stack CVE-2021-31166 Web Attack: Microsoft Scripting Engine CVE-2021-26419 Web Attack: Microsoft SharePoint CVE-2021-31181
Coverage details for Microsoft's November Patch Release On November 10, Microsoft published their regularly scheduled monthly updates. For the November release Microsoft addressed 112 vulnerabilities. Symantec has introduced the following protections based on available information. File-based (CVE-2020-17087) - Exp.CVE-2020-17087 (CVE-2020-17088) - Exp.CVE-2020-17088 Network-based (CVE-2020-17047) OS Attack: Microsoft Windows NFS CVE-2020-17047 (CVE-2020-17051) OS Attack: Microsoft Windows NFS CVE-2020-17051 (CVE-2020-17053) Web Attack: Microsoft Internet Explorer CVE-2020-17053 (CVE-2020-17056) OS Attack: Microsoft Windows NFS CVE-2020-17056 (CVE-2020-17061) Web Attack: Microsoft SharePoint CVE-2020-17061
Coverage details for Microsoft's September Patch Release On September 14, Microsoft published their regularly scheduled monthly updates. For the September release Microsoft addressed 66 vulnerabilities. Symantec has introduced the following protections based on available information. Additional signatures are currently being investigated and may be toggled at a later date. File-based Exp.CVE-2021-40444 Exp.CVE-2021-40444!g1 Exp.CVE-2021-40444!g2 Exp.CVE-2021-40444!g3 Exp.CVE-2021-40444!g4 Exp.CVE-2021-40444!g5 Exp.CVE-2021-40444!g6 Network-based Web Attack: Microsoft MSHTML RCE CVE-2021-40444 Web Attack: Open Management Infrastructure RCE CVE-2021-38647 Behavior-based SONAR.SuspLaunch!g161 SONAR.SuspLaunch!g162
Covid phishing website leads to Punisher Ransomware According to recent reports, actors behind Punisher ransomware have leveraged a fake Chilean COVID-related website to lure victims into downloading and executing their ransomware which was disguised as COVID tracking software. Victims who were successfully lured would have had their files encrypted, and presented with a ransom note asking for 1000 USD in Bitcoin. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT Machine Learning-based Heur.AdvML.C Web-based Observed domains are covered under security categories
CR4T malware implant distributed in the DuneQuixote campaign Malicious campaign dubbed DuneQuixote has been reported to distribute new variants of the CR4T malware implant. The campaign targets various organizations and entities in the Middle East. CR4T malware comes in two different strains, one written in C/C++ and the other one in the Golang programming language. The malware functionality focuses on granting the attackers with access to the infected endpoints, enabling remote command execution and arbitrary file upload/download capabilities. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Ps-Rd32!g1 ACM.Untrst-RunSys!g1 Behavior-based SONAR.TCP!gen1 File-based Trojan Horse Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.A!400 Heur.AdvML.A!500 Heur.AdvML.B!100 Heur.AdvML.B!200 Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Cracked, Collector Stealer sees a rise in activity Every now and then someone's malware gets cracked and released for free on various underground forums, websites and social media. That's the recent tale of Collector Stealer (also known as DCStealer and DataCollector). Ever since, Symantec has observed more and more instances this infostealer in the threatscape, being distributed via malicious emails and drive-by-downloads. Evermore cybercriminals are using this malware and some have also made new variants such as Panda stealer which we recently published a bulletin for. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.B Trojan.Dropper WS.Malware.1 WS.Malware.2 Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Cracked macOS apps lead to cryptostealing malware A new campaign spreading cryptostealing malware to macOS users has been observed in the wild. The malware installation happens via an Activator tool added to the compromised image of the cracked app. The tool has been confirmed to run without issues on macOS versions 13.6 Ventura or later, suggesting the threat actors are targeting users of the most recent OS versions. The final payload of the campaign is a cryptostealing malware targeting resources stored within the Exodus and Bitcoin Core crypto wallets. Symantec protects you from this threat, identified by the following: File-based OSX.Trojan.Gen OSX.Trojan.Gen.2 WS.Malware.1 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Crackonosh, out for wool and come home shorn While cracked software is illegal, some still want to give it a crack and may end up being infected with Crackonosh, as this backdoor and cryptomining threat hides in such software. Recent reports indicate that actors behind this activity have been targeting gamers given that most of the malicious cracked software are video games. Symantec protects you from this threat, identified by the following: File-based Downloader.Trojan Trojan.Dropper Trojan.Gen.2 Trojan.Gen.6 Trojan.Gen.MBT Trojan.Horse Trojan.Malscript Miner.XMRig WS.Malware.1 WS.Malware.2 Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed IPs/Domains are covered under security categories
CraneFly threat actor uses previously unseen techniques Symantec, by Broadcom Software, has discovered a previously undocumented dropper that is being used to install a new backdoor and other tools using the novel technique of reading commands from seemingly innocuous Internet Information Services (IIS) logs. The dropper (Trojan.Geppei) is being used by an actor Symantec calls Cranefly (aka UNC3524), to install another piece of hitherto undocumented malware (Trojan.Danfuan) and other tools. The technique of reading commands from IIS logs is not something Symantec researchers have seen being used to date in real-world attacks. Read more in our blog: Cranefly: Threat Actor Uses Previously Unseen Techniques and Tools in Stealthy Campaign Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 SONAR.TCP!gen6 File-based Hacktool Hacktool.Regeorg Trojan.Danfuan Trojan.Geppei WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.A
CRAT the RAT gets an upgrade There have been reports of a new version of CRAT in the wild. CRAT is a Remote Access Trojan that has been associated with Lazarus and where CRAT goes a Ransomware usually follows. Earlier this year, actors used spam campaigns with malicious HWP files to deliver the first version of CRAT. The infection vector for this new version is however yet to be determined. Lazarus is a very active attack group involved in both cyber crime and espionage. The group was initially known for its espionage operations and a number of high-profile disruptive attacks, including the 2014 attack on Sony Pictures. Lazarus has also become involved in financially motivated attacks, including an US$81 million theft from the Bangladesh Central Bank and the WannaCry ransomware. Symantec has multiple protections in place for this RAT: File-based Trojan.Gen.2 Trojan.Gen.MBT Ransom.Wannacry WS.Malware.1 WS.Malware.2 Website-based This activity is proactively blocked by Symantec Web Isolation technology.
CraxsRAT There is no shortage of private and public Android RATs in the threatscape, with many having reached certain degrees of prevalence and persistence, especially when they are cracked and/or leaked for free. CraxsRAT is a recent remote access trojan that is being advertised on Telegram, other social networking sites, websites, platform for software development and underground forums. It has also been cracked and leaked for free, leading to more activities (attacks and tests) from various groups and individuals. This threat has run-of-the-mill capabilities that are common among mobile remote access trojans and spyware, along with stealing features. Symantec protects you from this threat, identified by the following: Mobile-based AppRisk:Generisk
Creal infostealer targets cryptocurrency users Threat Actors have been targeting cryptocurrency users in recent malicious phishing campaigns and leveraging a new info-stealing malware dubbed "Creal". Creal is python complied malware with the following capabilities: Steals login credentials, cookies and auto-fill information from chromium browsers Steals data from chat and gaming applications. Targets Chrome-based browser extensions Steals wallets and confidential files that are related to crypto wallet applications. The overall purpose of this malware is to obtain and exfiltrate information to their preconfigured C2 server using Discord webhooks. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT W32.Beapy Machine Learning-based Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories
Credential Phishing attacks with hash tags in the URL Symantec has recently seen credential phishing attacks using hashtags, (#), in the URLs to try to bypass spam filters. The email subjects refer to account logins, for example “Account user authentication”. The URLs in the messages redirected to websites designed to look like common webmail login pages. Protections Protection is in place for Symantec's email security products.
Credit Saison users targeted with a new phishing wave Credit Saison is one of the largest credit card issuers headquartered in Tokyo, Japan. Lately, Symantec has observed phish runs that impersonate Credit Saison services and entice users to open fake notification emails. The email body content mentions to confirm Saison card usage. These phish emails make an attempt to lure users to open and click on phish URLs. Email Subject: 【最終確認】セゾンカード ご利用確認のお願い Translated Email Subject: [Final confirmation] Request for confirmation of Saison card usage Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
CredoMap malware spread in the latest APT28's campaign targeting Ukraine APT28 group has been observed to deliver CredoMap malware to targets in Ukraine in their latest campaign. The threat actors have been leveraging malicious .rtf documents and exploiting MSDT CVE-2022-30190 vulnerability also known as Follina in their attacks. CredoMap malware is capable of credentials and cookie theft from various web browsers. The malware uses IMAP email protocol for data ex-filtration. Symantec protects you from this threat, identified by the following: File-based Trojan Horse W97M.Downloader WS.Malware.1 WS.Malware.2 Network-based Web Attack: MSDT Remote Code Execution CVE-2022-30190 Web Attack: Webpulse Bad Reputation Domain Request Policy-based DCS default policies harden MS Office applications. DCS prevents MS Office applications from launching command interpreters including cmd.exe, powershell.exe and others as child processes. Additionally for this CVE, the RCE vulnerability can be prevented by adding *\msdt.exe to the Sandbox execution control "Programs Microsoft Office may not run" Web-based Observed IPs/domains are covered under security categories
Crimeware campaign using commodity RATS A new government and political themed campaign is being employed to target entities in Afghanistan and India. The infection chain consists of malicious RTF documents and PowerShell scripts that distributes malware to victims. Overall it appears to be a lone threat actor casting these lures under the guise of a Pakistani IT software development firm called "Bunse Technologies". The attacks use a variety of commodity RATS, but primarily QuasarRAT and dcRAT. Symantec protects you from this threat, identified by the following: File-based Bloodhound.RTF.12 Bloodhound.RTF.20 Trojan Horse Trojan.Gen.MBT Trojan.Mdropper WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.B Heur.AdvML.C Network-based Malicious Site: Malicious Domain Request 59 Web-based Observed domains/IPs are covered under security categories
Cring ransomware delivered via VPN vulnerability Symantec Security Response is aware of a report that cites several European companies as being the targets of a cyber attack campaign in early 2021 in which Cring ransomware was delivered as a payload. The attacker initially got a foot in the door to the targeted environment by exploiting a vulnerability in VPN software (the patch for which was released in May 2019). After a series of activities, the domain administrator account was seized by the attacker who used the confidential information to feed Cring ransomware to the unsuspected victims. Symantec protects you from this threat, identified by the following: File-based Ransom.Gen Trojan Horse Heur.AdvML.C Web-based Observed domains are covered under security categories
CrossLock ransomware Yet another Ransomware gang have been making the rounds, this one known as CrossLock, written using the Go programming language. According to reports, this actor employs the nefarious double-extortion tactics like many other actors. If encryption is successful, files will be appended with a .crlk extension and victims will then be asked to contact the crooks via Tox chat. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based Downloader Machine Learning-based Heur.AdvML.B
CryptBot among the infostealer variants distributed in latest CoralRaider campaign According to a recent report, three distinct infostealers variants Cryptbot, LummaC2 and Rhadamanthys have been distributed in a newly discovered campaign attributed to the threat actor known as CoralRaider. The threat actors have been leveraging Content Delivery Network (CDN) cache as a malware delivery mechanism. The new variant of CryptBot malware has the functionality to steal a wide variety of data from the compromised machines. It targets data exfiltration from web browsers, cryptocurrency wallets, authenticator apps and password managers. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Mshta-Cmd!g1 ACM.Mshta-Http!g1 ACM.Mshta-Ps!g1 ACM.Ps-Http!g2 ACM.Ps-Reg!g1 ACM.Ps-Mshta!g1 Behavior-based SONAR.Stealer!gen1 SONAR.SuspScript!g7 SONAR.TCP!gen1 File-based CL.Downloader!gen55 Scr.Mallnk!gen13 Trojan Horse Trojan.Gen.MBT Trojan.Gen.NPE Web.Reputation.1 WS.Malware.1 WS.Malware.2 WS.SecurityRisk.4 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.A!400 Heur.AdvML.A!500 Heur.AdvML.B!100 Heur.AdvML.B!200 Network-based Audit: Bad Reputation Application Activity System Infected: Trojan.Backdoor Activity 721 Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
CryptNet RaaS ransomware CryptNet is a new RaaS (Ransomware-as-a-Service) ransomware variant that emerged this month on the threat landscape. The malware is written in .NET, uses AES algorithm for encryption, and has capabilities to disable backup services and delete shadow copies. Following successful encryption CryptNet will append random extensions to the encrypted files, drop ransom notes in the form of .txt files as well as change the desktop wallpaper on the infected machine. The attackers behind this ransomware variant have also set up a data leak website where they publish details of their victims. Symantec protects you from this threat, identified by the following: File-based Trojan Horse WS.Malware.1 Machine Learning-based Heur.AdvML.B
Crypto clipper campaign via trojanized Tor browser The prevalence of crypto wallet hijackers is not faltering and in fact appears to be increasing. These are mostly distributed via drive-by-download, with actors disguising the malicious binaries as software and update installers, video game hacks, cryptocurrency miners, and more. Recently, light has been shed on a crypto clipper campaign that was delivered via trojanized Tor installers. Tor Browser is a free, open-source web browser that allows users to browse the internet anonymously. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.TCP!gen1 File-based Trojan Horse Machine Learning-based Heur.AdvML.B
Cryptocurrency clipper preys on TikTok users Over the last few years, the short-form video hosting and social media service known as TikTok has gained greatly in popularity. As of today, it's a staple among teenagers and young adults worldwide. This demographic is also known to be heavily exposed to cryptocurrency and this hasn't gone unnoticed by those with ill intent. Symantec recently observed a drive-by-download campaign in which an actor preyed on TikTok users looking to boost their views via shortcuts such as view bots. Little do they know that if successfully tricked they would in fact install a cryptocurrency clipper whose main purpose is to swap victims' cryptocurrency wallet addresses with the ones owned by the malware actor. Symantec protects you from this threat, identified by the following: File-based Trojan Horse WS.Malware.1 Machine Learning-based Heur.AdvML.C
CryptoMiners incorporate indirect syscalls evasion technique Indirect syscalls, a technique frequently utilized by ransomware loaders such as Pikabot, have recently been observed being employed by other malware types, notably CoinMiners. This malware, serving as a stager for the XMrig miner, establishes persistence by creating a run registry and service entry. Subsequently, it executes in memory to evade detection and maintain its foothold on the infected system. Symantec protects you from this threat, identified by the following: File-based Trojan Horse WS.Malware.2 Machine Learning-based Heur.AdvML.B Heur.AdvML.A!300 Heur.AdvML.B!100 Heur.AdvML.B!200
Cryptomining campaign targets Linux and Windows The 8220 Gang is a threat group that has used cryptomining attacks in the past. In their most recent version the Linux port saw minimal changes while Windows version included many enhancements. The Windows deployment of the cryptominer utilizes PowerShell for fileless execution. New techniques including DLL sideloading, User Account Control (UAC) bypass, and changes to the AMSIscanBuffer and ETWEventWrite function attacks. The group also uses techniques to circumvent detection methods and bypass antivirus (AV), endpoint detection and EDR systems. There were no major changes in the Linux variant which is a shell script that downloads the malware. The script looks for susceptible applications and uses newer versions of masscan and spirit for reconnaissance. This new version is also more difficult to detect. Symantec protects you from these threats, identified by the following: File-based Trojan.Gen.NPE Trojan Horse WS.Malware.1 WS.Malware.2 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Crypto Mining Snapshot Cryptocurrency miners have been around for a long time now and have gained in popularity in recent years with the boom in major cryptocurrencies like Bitcoin, Monero, etc. Where there is money to make, there will always a degree of criminality. Cybercriminals certainly have been and are continuing to profit from this type of threat. We have seen these being distributed using all kinds of infection vectors from exploit kits to major SMB vulnerabilities like Double pulsar and Eternal blue. Symantec continues to closely monitor cryptocurrency miners and related threats, and have multiple detections in place across our scan technologies. Below is our top detections as of September 2020.
Cryptonite ransomware acts as a wiper Cryptonite is yet another Python-based ransomware variant. It's the second malware variant named exactly the same - the other Cryptonite ransomware is based on the older Chaos ransomware. Cryptonite encrypts user files and appends .cryptn8 to them. The malware can delete Volume Shadow Copies and it contains several functions for evading detections such as AMSI bypass or event logging disablement. It has been reported that some recent samples of this malware may never allow for data decryption and instead act as a wiper. Symantec protects you from this threat, identified by the following: File-based Ransom.Cryptonite Trojan.Gen.2 WS.Malware.1 Machine Learning-based Heur.AdvML.A Heur.AdvML.B Web-based Observed domains/IPs are covered under security categories
Cryptonite Ransomware seen in French-speaking countries Cryptonite Ransomware has recently been observed in French-speaking countries such as Canada. The actors behind this recent activity, who do not appear to move laterally within a compromised environment, are requesting 0.51 Bitcoin to decrypt the affected machine. They threaten to delete 2 files each 24 hours until payment is made and will increase the price if still not paid after 7 days, as opposed to using the classic double extortion tactics that more infamous Ransomware groups seem to prefer. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.SuspBeh!gen625 File-based Ransom.Sorry Machine Learning-based Heur.AdvML.B
CryptoWire Ransomware CryptoWire is a ransomware initially discovered back in 2018. While this variant was not very active in last few years, a new delivery campaign has been observed in the wild just recently. The malware has the functionality to encrypt user files on both local and network drives, USB drives or any externally connected disks. CryptoWire adds ".encrypted" string to the locked files and the ransom note is displayed in form of a pop up window. Whats very unusual for this type of malware, is that the reported variant allows for the decryption key to be located within either the traffic sent back to the C2 servers or inside the used Autoit script. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Ps-Schtsk!g1 ACM.Untrst-Rgpst!g1 ACM.Untrst-RunSys!g1 ACM.Vss-DlShcp!g1 Behavior-based AGR.Terminate!g2 SONAR.Ransom!gen14 SONAR.SuspLaunch!g18 SONAR.SuspLaunch!g250 SONAR.SuspLaunch!g340 SONAR.SuspReg!gen49 File-based Ransom.Cryptolocker Scr.Malcode!gen Trojan.Gen.9 Trojan.Gen.MBT Web.Reputation.1 WS.Malware.1 Machine Learning-based Heur.AdvML.A Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!200 Heur.AdvML.C Network-based Audit: Bad Reputation Application Activity Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products