text
stringlengths 0
383k
|
---|
ChatGPT-themed Android Malware
Threat actors are continuously creating ChatGPT-themed lures to spread malware disguised as AI chatbots which are currently very popular. The malware being spread includes two types, a Meterpreter trojan disguised as a "SuperGPT" application and one calling itself "ChatGPT" which sends short text messages to premium-rate numbers in Thailand. Premium-rate numbers cost more than calls to normal phone numbers and can end up being quite expensive.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.MBT
WS.Malware.1
WS.Malware.2
Mobile-based
Android.Reputation.1
Android.Reputation.2
AppRisk:Generisk
|
CherryBlos mobile malware
CherryBlos is a newly discovered mobile malware variant used to steal credentials of cryptocurrency wallets or to replace the wallet addresses during crypto transactions. The malware has been distributed through posts on popular social network portals containing ads redirecting users to phishing websites that spread the malicious apps. CherryBlos is packed with Jiagubao commercial packer and it comes with various techniques ensuring its' persistence and detection evasion on the infected device.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
Android.Reputation.2
AppRisk:Generisk
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products.
|
Chimaera - new campaign from the TNT APT group
A new campaign attributed to the TNT APT group and dubbed as Chimaera has been discovered. The attackers have been reported to leverage a variety of shell scripts, coin-miners, IRC bots and open source tools in coordinated attacks on multiple platforms including Windows, Linux, AWS, Docker and Kubernetes. Same as in the past, the TNT threat group has been focusing the efforts on stealing system credentials and exploiting the infected machines for cryptomining, among others.
Symantec protects you from this threat, identified by the following:
File-based
Linux.Backdoor.Kaiten
Trojan Horse
WS.Malware.1
Network-based
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains are covered under security categories
|
Chimera (aka Slug) and their backdoor, OwlProxy
Chimera, also known as Slug, is an active APT group that has been targeting I.T., Financial and Healthcare industries based in Asia for a few years now. In their campaigns, they have been using a backdoor dubbed OwlProxy which they've recently updated. This malware allows them to tunnel in and out of the victim's network, and run commands on the targeted machine.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Owprox
Heur.AdvML.C
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
WS.Malware.2
|
ChinaZ and ShellBot among the malware families targeting Linux SSH servers
ChinaZ DDoS bot and ShellBot (aka PerlBot) are two of the malware families recently observed in attacks against Linux SSH servers. Shellbot is a Perl-based DDoS botnet known to attack poorly configured, internet facing devices through brute-force attacks against common passwords. Shellbot uses IRC protocol for C2 communication. ChinaZ is another type of DDoS botnet present on the threat landscape for around 10 years and known to attack both Linux and Windows environments. ChinaZ supports several different types of DDoS attacks including SYN, UDP, ICMP, and DNS Flood attacks.
Symantec protects you from this threat, identified by the following:
File-based
Backdoor.IRC.Bot
IRC.Backdoor.Trojan
DDoS.Trojan
Perl.Pircbot
Trojan Horse
Trojan.Gen.NPE
WS.Malware.1
Machine Learning-based
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories
|
Chinese-speaking ransomware actor demands payment to TRC20 wallet
A Chinese-speaking ransomware actor has been spotted making the rounds. If the ransomware is successfully executed on a victim's system, it will drop multiple ransom notes (请阅读解锁.txt, which translates to "Please read the instructions") as files are encrypted. Currently, the dropped ransom note is written in Chinese, and victims are being asked to pay $8,000 to a TRC20 wallet. This ransomware actor does not seem to employ double-extortion tactics according to their ransom note.
TRC20 tokens and the TRON blockchain have gained popularity in China. Since its launch in 2017, TRON has attracted a significant following in China and has garnered attention for its high-profile partnerships and marketing efforts. Similar to ERC20 tokens on the Ethereum blockchain, TRC20 tokens are fungible and can represent any tradable digital asset, such as cryptocurrencies, utility tokens, or even tokenized assets like real estate or commodities. The TRC20 standard defines a set of rules and functions that enable the creation, transfer, and management of tokens on the TRON network.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.SuspDrop!gen1
File-based
Ransom.HiddenTear!g1
Machine Learning-based
Heur.AdvML.B
|
Chinese espionage campaign targets Asian semiconductor sector
A new espionage campaign is targeting semiconductor companies in Taiwan, Singapore, and Hong Kong with Cobalt Strike malware. The campaign has links to multiple Chinese APT groups.
According to recent research, the attackers are using lures mentioning Taiwan Semiconductor Manufacturing (TSMC) to initiate the attacks. These lures delivered a version of the Hyperbro loader that is loaded via DLL sideloading using a signed CyberArk binary. Hyperbro is then used to run Cobalt Strike Beacon in-memory.
DLL side-loading is a well-known technique that involves attackers placing a malicious DLL in a directory where a legitimate DLL is expected to be found. The attacker then runs the legitimate application themselves (having installed it themselves in most cases). The legitimate application then loads and executes the payload.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.TCP!gen1
File-based
Backdoor.Cobalt
Meterpreter
Packed.Generic.347
Trojan Horse
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.A!400
Heur.AdvML.A!500
Heur.AdvML.A!300
Heur.AdvML.B!100
Heur.AdvML.B!200
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products
|
chMiner: New RAT in town
Symantec Security Response is aware of a new Remote Access Trojan (RAT) called chMiner in the wild. The malware is being sold on the underground and is being advertised to have typical RAT capabilities such as:
Miners cpu/gpu
Remote desktop
Keylogger
WebCam
Execute code: .Net, PowerShell
Anti-VM
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.MBT
|
CHM malware spread in recent campaigns targeting Korean users
According to a recently released report malicious campaigns leveraging chm files have been seen impersonating communication guides from Korean financial institutions and insurance companies. These fraudulent guides cover topics such as "credit card limit," "results of insurance fee withdrawal," and "banking contracts". If a victim is tricked into running the malicious CHM file, they will unknowingly infect their machine with malware that can be used to exfiltrate user credentials and personal data among others.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
File-based
Downloader
Infostealer.Eynice
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products
|
ChromeLoader malware campaigns continue
ChromeLoader (also known as Choziosi Loader) is browser hijacker malware that changes browser settings with the purpose of redirecting the user's traffic to advertisement websites. The malware emerged initially around January 2022 and over the next few months multiple variants of it have been leveraged across several campaigns. As different variants for both Windows and MacOS platforms exist, the malware has capabilities to target Chrome or Safari browsers likewise. Chromeloader's malicious browser extensions have mostly adware functionalities but on some occasions they can also serve as infostealers - by intercepting the user’s search engine queries and forwarding them to the attacker's C2 servers.
Symantec protects you from this threat, identified by the following:
File-based
Downloader.Chromesten
OSX.Trojan.Gen
PUA.Downloader
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Network-based
System Infected: Trojan.Backdoor Activity 634
Web Attack: Malicious Javascript Website 42
Web Attack: Malicious Website Request 10
Web Attack: Malicious Website Request 11
Web-based
Observed IPs/domains are covered under security categories
|
ChromeLoader targets enterprises in recent campaigns
In recent activity we have observed an evolution of usage of the ChromeLoader malware tool. Active since at least early 2022, the tool was used to primarily target consumers for credential theft. Our data shows that recent attacks are against enterprise targets for the purpose of delivering ransomware, data theft, and causing system instability.
Threat actors have leveraged a variety of methods for distributing ChromeLoader. Campaigns have used malicious ads, social media sites, cracked or pirated software, and impersonation of legitimate software as some of the methods to spread this malware.
ChromeLoader is typically installed by way of an ISO that is downloaded to the victim machine. The ISO gets mounted on the compromised system and the contents within are responsible for delivering the malicious executable to the computer.
Symantec protects you from this threat, identified by the following:
File-based
Downloader.Chromesten
Downloader.Chromst!g1
Trojan.Chromeloader
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.B
Network-based
Malicious Site: Malicious Domain Request 21
Malicious Site: Malicious Domain Request 22
Web Attack: Malicious Website Request 10
Web Attack: Malicious Website Request 11
|
Chropex hijacks macOS users' browser
Yet another browser hijacker has been observed recently in the macOS threat landscape. While Chropex is predominantly active in the US, Symantec continues to observe more instances in other countries. Actors behind this hijacker have been delivering it via malvertising campaigns and drive-by-download which are classic to the macOS threatscape vector-wise. If it successfully hijacks a victims' browser, it will open Safari and display web ads but also monitor Safari's searches in order to inject more ads.
Symantec protects you from this threat, identified by the following:
File-based
OSX.Chropex
|
CinaRAT - QuasarRAT's successor distributed in the wild
Symantec Security Response is aware of new campaigns distributing the CinaRAT malware. CinaRAT is a rebranded variant of the older QuasarRAT and its code is publicly available on Github. According to the reports CinaRAT is being delivering via ISO archive files.
Symantec provides the following detections against CinaRAT malware:
File-based
ISB.Downloader!gen80
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.NPE
|
Cinoshi Malware-as-a-Service (MaaS)
Cinoshi is a new malware variant distributed in the form of a Malware-as-a-Service (MaaS) offering. The malware consists of several modules including infostealer, data clipper, botnet and a cryptocurrency miner. Cinoshi is .Net based and incorporates several anti-tampering and persistence techniques. It targets web browser data including cookies, credentials and banking information, among others. The infostealing module also allows it to harvest data from crypto wallets, take screenshots or steal session keys of various running applications such as Discord or Telegram.
Symantec protects you from this threat, identified by the following:
File-based
Scr.Malcode!gdn32
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Web-based
Observed domains/IPs are covered under security categories
|
Clasiopa threat group
A hitherto unknown attack group has been observed targeting a materials research organization in Asia. The group, which Symantec calls Clasiopa, is characterized by a distinct toolset, which includes one piece of custom malware (Backdoor.Atharvan). The infection vector used by Clasiopa is unknown, although there is some evidence to suggest that the attackers gain access through brute force attacks on public-facing servers.
Read more in our blog: Clasiopa: New Group Targets Materials Research
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.SuspDrop!gen1
SONAR.TCP!gen6
File-based
Backdoor.Atharvan
Hacktool
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.C
|
Clast82, evasive Android dropper
Recently there have been reports of a malicious dropper known as Clast82 which evaded Google evaluation and ended up on its application store. The malicious dropper is using Firebase as the C2 and GitHub as the hosting platform to download additional payloads such as AlienBot. Actors behind that malware have added their malicious code to open source android applications (VPN, QR and Music) which mobile users tend to download.
Symantec has the following protection in place:
Mobile-based
Android.Reputation.1
Android.Reputation.2
|
ClearFake campaign delivers Atomic Stealer (AMOS) malware to macOS users
Atomic Stealer (aka AMOS) is a malware variant for macOS platform that has been recently distributed in a malicious campaign dubbed as ClearFake. The attackers disguise the malicious binaries as fake Safari or Chrome browser update DMG packages. AMOS Stealer is known to exfiltrate a wide variety of sensitive data from infected macOS machines, including system information, keychain passwords, browser data and cookies, credit card details, cryptocurrency wallets, among others.
Symantec protects you from this threat, identified by the following:
File-based
OSX.Trojan.Gen
WS.Malware.1
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products
|
Cling! You have a new malicious meeting reminder
One of the sole purposes of file sharing or storage services is to offer the user with a variety of sharing capabilities and share / store documents on the go. However, this is turning out to be a sweet spot for Threat actors as observed by Symantec in a recent malspam run.
As shown in Figure 1, emails purporting to be meeting reminder notifications are sent to the recipient in the context of a file been shared. The email body is kept short and imitates a legitimate email template from one of the file sharing services. In order to view the shared file, the recipient has to click on the hyperlinked text contained within the email body.
Figure 1: Malspam email masqueraded as a meeting reminder notification
A single click redirects the user to a legitimate file storage service webpage while the malicious payload downloads onto the recipient’s computer. This malicious .xls file when opened, prompts the user to enable macros for a better view of the file content. Enabling macros in the .xls file in turn downloads a malicious downloader which in then downloads an infostealer, Agent Tesla.
Symantec provides the following protection against the malware distributed in this campaign:
File-based
Trojan.Gen.2
W97M.Downloader
Infostealer.Atesla
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
|
CLOP ransomware is actively targeting enterprises
CLOP is a ransomware family first discovered back in 2019 and considered as an evolution to the older Cryptomix ransomware. Earlier last year there have been multiple reports on CLOP ransomware being distributed by the FIN11 threat group. Attackers behind CLOP remained very active in first months of 2021 and have been targeting multiple enterprises and universities, among others. It has been reported that threat actors affiliated with this ransomware have been leveraging the Accellion File Transfer Appliance (FTA) vulnerabilities in their attacks. CLOP attackers also attempt to exfiltrate large amount of data from the compromised Accelion servers and later threaten victims to release it publicly.
As we continue to monitor and enhance our protections against CLOP ransomware variants, we recommend performing regular backups for any important data and ensuring your security products are kept up to date with the latest product definitions.
Symantec protects you from this threat, identified by the following:
File-based
Downloader
Heur.AdvML.B
Heur.AdvML.C
Ransom.Cryptolocker
Ransom.Ploc
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
WS.Malware.2
Behavior-based
SONAR.Cryptlck!g187
|
CLOP ransomware re-surges with new activity
CLOP is a ransomware family first discovered in 2019 as an evolution to the Cryptomix ransomware. Its many variants have been known to be distributed among others by the TA505 APT group in the past and most recently also by FIN11 group. According to the latest reports, FIN11 group has also been threatening the ransomware victims with publishing the stolen data in order to pressure them into paying the demands.
Similar to other ransomware variants, CLOP will attempt to terminate various Windows services and processes before the encryption. Many early and recent CLOP samples have been signed with stolen digital certificates - an attempt to give a sense of legitimacy to the malicious files.
We recommend regular backup procedures of any important files and applying the latest product definitions to protect against ransomware threats.
Symantec protections:
File-based
Downloader
Heur.AdvML.B
Heur.AdvML.C
Ransom.Ploc
Trojan.Gen.2
Trojan.Gen.MBT
Trojan Horse
|
CLOP Ransomware still out there
CLOP Ransomware is not new, in fact it's been around since at least 2019. Over the years since, it has continuously been seen targeting organizations of various size via multiple infection vectors such as spear phishing, vulnerable servers, RDP brute force attacks, etc. Actors behind this threat are using double extortion tactics, threatening to sell or leak stolen encrypted files if the ransom is not paid.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B
|
Clop ransomware variant for Linux arrives with an encryption bug
A new Linux variant of the well known Clop ransomware emerged in the wild. First used in campaigns around the end of December 2022, the Linux variant is similar to its Windows counterpart. It also includes some specific targeting of Oracle database folders for the purpose of data encryption. Clop for Linux has been found to contain a serious encryption logic flaw which allows the victims to retrieve the encrypted files without paying the ransom. This recent Clop Linux strain is most likely still in a development phase and it is believed that new improved variants will keep emerging and will continue to target the Linux-based systems.
Symantec protects you from this threat, identified by the following:
File-based
Packed.Generic.620
Ransom.Ploc
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.2
Machine Learning-based
Heur.AdvML.B
|
Cloud9 Javascript botnet
Cloud9 is a Javascript botnet that often comes in form of a malicious browser extensions. The underlying Javascripts can also be used for standalone execution by the threat actors and as such be distributed via user redirections to websites containing those malicious .js scripts. Cloud9's functionality includes theft of cookies, keylogging, cryptocurrency mining, ads injection and delivery of additional arbitrary payloads.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.SuspBeh!gen667
File-based
Hacktool
Scr.Malcode!gen
Trojan Horse
Trojan.Gen.NPE
Trojan.Malscript
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Web-based
Observed domains/IPs are covered under security categories
|
Cloud based team collaboration services abused in new phish wave
Services offered by Nuclino, a cloud based team collaboration platform, have been abused in a recent phish run to steal credentials. As shown in Figure 1, emails disguised as notification messages are sent to recipients luring them into opening a shared file. In order to view the file, the recipient needs to click on the hyperlinked text – “Access File” - beneath which an embedded legitimate URL of Nuclino services is present.
Figure 1: Phishing email disguised as a notification message with nuclino.com URL embedded within the email content.
As shown in Figure 2, upon clicking the embedded URL, the user is provided with an option to view /download the shared .pdf document by further clicking on the hyperlinked text.
Figure 2: The embedded nuclino.com URL when clicked requires the user to click the hyperlinked text to view the shared document.
Upon clicking the hyperlinked text, the user is served with a fake login page aimed at stealing credentials as shown in Figure 3.
Figure 3: Fake login webpage designed to steal credentials.
Protection
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
|
Cloudflare R2 abused to host Roundcube phishing
Webmail services are often impersonated by phishing actors in an attempt to snatch enterprise email credentials. Symantec observes these attacks on a daily basis. In a recent example, we identified a campaign that impersonates Roundcube, a popular open-source webmail application known for providing a user-friendly interface to access email accounts via a web browser.
In this campaign, actors are sending emails with the subject "[Company Name] Warning !!! Deactivation alert" to various industries worldwide. If victims are lured by these emails and click on the malicious URL, they will be redirected to a fake Roundcube login phishing page hosted on Cloudflare's R2.
URL pattern: hxxps://pub-[removed][.]r2[.]dev/RWMAIL[.]html#John[.]Doe@JohnDoe[.]com
Cloudflare's R2 is a free hosting service provided by Cloudflare that allows users to deploy static sites quickly. Unfortunately, the convenience and ease of use offered by such services can also be attractive to malicious actors, including those involved in phishing.
Symantec protects you from these threats, identified by the following:
Email-based
Coverage is in place for Symantec's email security products
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products
|
CloudMensis - a new malware targeting macOS
A new macOS backdoor dubbed CloudMensis has been discovered in the wild. The malware leverages public cloud storage for C&C communication - this includes Dropbox, pCloud and Yandex Disk services. CloudMensis malware is used by the attackers to ex-filtrate a wide variety of sensitive user's data including documents, screenshots, email messages and keystrokes. CloudMensis also has functionality that allows it to bypass TCC (Transparency, Consent, and Control), which is a macOS mechanism to control application access to certain OS functions.
Symantec protects you from this threat, identified by the following:
File-based
OSX.Trojan.Gen
WS.Malware.1
|
Cloud services being abused to deliver malware
Cybercriminals are always on the lookout for inconspicuous ways to deliver their threats and the use of legitimate cloud services to host malware is not new. A short time ago a particular group began using a custom downloader to download malware hosted on a well known VoIP, instant messaging and digital distribution platform that is highly popular among gamers and content creators and is also used by companies.
Over the past 30 days, Symantec observed a multitude of companies in the agricultural, food, wholesale and engineering supply business become the target of these actors in three tailored spam campaigns, focused mainly on the EMEA region but including industries in the U.S., Middle East and Asia Pacific. According to our analysis, they continue to use the AveMaria RAT as the final payload, just as they did earlier this year.
Indicators of compromise (IOC):
Email subject: [Removed] Agricultural Machinery Solutions- PO11009827625 (Third-Party Procurement)
Attachment: Doc00918761510gl_Signed.xz
Content: Doc00918761510pgl_Signed_.exe
Email subject: RFQ_11092874734697298
Attachment: PO_10082775347623.xz
Content: PO_10082775347623.exe
Email subject: [Removed] Procurements Enquiry-Kindy Treat and Revert to us for Onward Discussion
Attachment: 001911876254309.001
Content: 001911876254309.exe
Symantec has the following coverage in place for this attack:
File-based
Downloader.Cordisa
Backdoor.Avecma
Trojan.Horse
WS.Malware.2
Heur.AdvML.B
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Website-based
This activity is proactively blocked by Symantec Web Isolation technology.
|
CLR SqlShell malware leveraged in attacks against MS-SQL servers
CLR SqlShell malware has been observed increasingly being leveraged in attacks against MS-SQL servers. The attackers are abusing the CLR Stored Procedures functionality that allows for code management and execution in the MS-SQL environment. CLR SqlShell malware is mostly used in the initial attack stages to execute attacker's commands and download additional payloads. Some of the most recent attacks where SqlShell was used led to the distribution of Trigona ransomware, coinminers such as MRBMiner, MyKings or LoveMiner, but the attackers might also be deploying many other various malware strains, backdoors or proxyware variants using similar attack chains.
Symantec protects you from this threat, identified by the following:
File-based
Backdoor.Trojan
Trojan Horse
Trojan.Gen
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.2
Policy-based
Symantec Data Center Security (DCS) provides 0-day protection for CLR SqlShell attacks against MS-SQL servers:
Lockdown of the DCS SQL server sandbox to limit inbound connections to trusted internal networks will prevent threat actors gaining initial access through brute force or dictionary attacks. Additional DCS rules to detect/audit for arbitrary/unexpected inbound connections might be also added for enhanced security.
DCS prevents SQL server from launching command interpreters including cmd.exe, powershell.exe and others as child processes. DCS hardening policy will also prevent the download of any additional payloads onto the server.
Web-based
Observed domains/IPs are covered under security categories
|
Clubhouse trendiness attracts Mobile cybercriminals
As often happens when a service becomes trendy, cybercriminals swoop in! Clubhouse, a social networking app based on audio-chat has gained in popularity in recent months and as expected malicious actors are trying to piggyback on its fame in order to infect its users. While Clubhouse is currently only available to IOS users, there have been reports of BlackRock Android malware purporting to be the Android version.
Aside from social media applications, we continue to see Blackrock pretending to be COVID-related mobile applications produced by various country's organizations. Believed to be based on Xerxes source code which itself was an Android Lokibot variant, Blackrock is capable of stealing passwords and credit card information from more than 300 applications.
Symantec protects you from this threat, identified by the following:
Mobile-based
Android.Reputation.1
|
CMLocker Ransomware uptick
Over the past few months, a ransomware known as CMLocker has been making the rounds across the globe. If it successfully compromises a machine, encrypted files will usually have a .CMLOCKER extension appended to them. Unlike some of its counterparts, the actors behind CMLocker do not resort to double-extortion tactics and don't seem to laterally spread in the victim's environment. In the ransom note left on the victim's machine, they ask for 980 US dollars worth of Bitcoin.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.Heur.Dropper
SONAR.SuspBeh!gen93
SONAR.SuspLaunch!g18
File-based
Trojan.Gen.6
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B
|
Cobalt Mirage and Drokbk
There have been reports of Cobalt Mirage activity earlier this year where the attackers leveraged the infamous Log4j vulnerabilities as the initial vector of infection. When the intrusion is successful, a backdoor known as Drokbk is dropped, which uses Github as a drop-dead resolver. This group has been active since at least 2020 and mostly seen targeting western organizations (USA, Israel, Europe, Australia). Earlier this year, ransomware activities were also linked to this group.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.MBT
Network-based
Attack: Log4j2 RCE CVE-2021-44228
Attack: Log4j2 RCE CVE-2021-44228 2
Attack: Log4j CVE-2021-45046
Attack: Log4j CVE-2021-45105
Audit: Log4j2 RCE CVE-2021-44228
Machine Learning-based
Heur.AdvML.C
|
Cobalt Strike and XMRig distributed via exploitation of an old CVE-2019-18935 Telerik UI flaw
According to a recent report, the exploitation of a three-year-old Telerik UI RCE vulnerability (CVE-2019-18935) has been observed in a recent malware distribution campaign. The attackers have been targeting vulnerable web servers in an effort to deliver Cobalt Strike beacons and initiate a PowerShell script which ultimately leads to the delivery of the XMRig cryptominer payload. This current campaign shows certain similarities with some older activities of the threat group known as Blue Mockingbird which has been known to exploit the same Telerik UI vulnerabilities in attacks targeting Microsoft IIS servers back in 2020.
Symantec protects you from this threat, identified by the following:
File-based
Backdoor.Cobalt!gm5
Meterpreter
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.C
Network-based
System Infected: Trojan.Coinminer Activity 32
Web Attack: Telerik UI CVE-2019-18935
Web Attack: Telerik UI CVE-2019-18935 2
Policy-based
DCS default hardening sandbox will protect TelerikUI based web servers from crypto miner and Cobalt Strike infections
Web-based
Observed IPs/domains are covered under security categories
|
Cobalt Strike Beacon Linux version dubbed 'Vermilion Strike'
Recently, a group of security researchers spotted a new variant of Cobalt Strike Beacon - a Linux version they dubbed 'Vermilion Strike', crafted by unknown threat actors. The legitimate security tool is one of the most sought-after second stage bearers of cybersecurity attacks as it offers enhanced post-exploitation capabilities. The Linux environment is less safe now because of this, and continuous vigilance is vital in order to minimize cybersecurity risk.
Vermilion Strike can perform the following tasks once deployed on a compromised Linux system:
Change working directory
Get current working directory
Append/write to file
Upload file to C2
Execute command via popen
Get disk partitions
List files
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
File-based
Heur.AdvML.B
Heur.AdvML.C
Meterpreter
Trojan.Gen.MBT
WS.Malware.1
WS.SecurityRisk.1
Web-based
Observed domains/IPs are covered under security categories
|
Cobalt Strike beacons delivered in recent campaigns
A new malicious campaign distributing the Cobalt Strike payload has been discovered in the wild. The attackers have been leveraging phishing documents with lure themes relating to job descriptions or job details of government organizations. The spread maldoc attachments attempt to exploit a relatively old CVE-2017-0199 MS Office RCE vulnerability. If successfully exploited, the attack chain continues through a series of VB and PowerShell scripts until a final payload is downloaded. Aside of Cobalt Strike beacons also Redline Stealer and Amadey bot binaries belong to the downloaded payloads. Cobalt Strike may assist attackers in execution of malicious actions in follow-up attacks or in the delivery of additional arbitrary binaries.
Symantec protects you from this threat, identified by the following:
File-based
Backdoor.Cobalt
Backdoor.Cobalt!gm1
CL.Downloader!gen173
ISB.Downloader!gen48
ISB.Downloader!gen63
Scr.Malcode!gen
Scr.Malcode.T!ge
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE.C
W97M.Downloader
Machine Learning-based
Heur.AdvML.B
Network-based
Attack: Malicious RTF File CVE-2017-0199
System Infected: Infostealer.Amadeybot Activity
Web-based
Observed domains/IPs are covered under security categories
|
Cobralocker disguises itself as Among Us executable
New variants of the CobraLocker ransomware are reportedly out in the wild disguised as executables for a popular online multiplayer game "Among Us". Some of the recent file names used by this ransomware that Symantec observed are: AmongUs2.exe or AmongUsLauncher.exe. The malware will attempt to terminate several system processes before encrypting user files. Once the encryption is complete it will demand Bitcoin payment for data decryption.
As we continue to monitor and enhance our protections against Cobralocker ransomware variants, we recommend performing regular backups for any important data and ensuring your security products kept up to date with the latest product definitions.
Symantec protection against the latest variants of Cobralocker ransomware family includes:
File-based
Downloader
Heur.AdvML.B
Heur.AdvML.C
Trojan.Gen.MBT
Trojan Horse
WS.Malware 1
|
CodeRAT source code leaked on Github
The source code of a remote access trojan dubbed CodeRAT has been reported as leaked on Github. The malware has been recently used in an attack campaign targeting Farsi-speaking code developers. The campaign used malicious Word documents containing Microsoft Dynamic Data Exchange (DDE) exploits to spread the malware. Instead of relying on dedicated C2 servers for communication and data ex-filtration, the attackers leveraged Telegram-based anonymous file upload APIs. CodeRAT supports around 50 different commands including data collection and ex-filtration, process termination, screenshot grabbing, as well as download and execution of arbitrary files, among others.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
W97M.Downloader
WS.Malware.1
|
Colibri Loader and Warzone RAT deployed in the latest UAC-0113 APT campaigns
New activities attributed to the UAC-0113 threat group have been observed, where the attackers use dynamic DNS domains masquerading as Ukrainian telecommunications companies in an attempt to spread malware onto the networks of Ukrainian organizations. The employed attacks use various lure documents related to military operations, administration notices, reports, etc. The threat group is leveraging malicious ISO files that deliver executables deploying Colibri Loader and the Warzone RAT (aka AveMaria) payloads.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.SuspBeh!gen25
SONAR.SuspLaunch!g12
File-based
Backdoor.Avecma
Infostealer
Packed.Generic.516
Packed.Generic.526
SMG.Heur!gen
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
WS.SecurityRisk.3
Machine Learning-based
Heur.AdvML.B
Network-based
System Infected: Trojan.Backdoor Activity 446
Web-based
Observed domains/IPs are covered under security categories
|
Colisimo smishing campaign in France
Shipping companies that cater to both consumers and enterprises are continuously being used in social engineering attacks to scam users and/or steal their credentials and other sensitive information, such as addresses, names, credit cards, etc. These campaigns are observed on a daily basis worldwide and are primarily executed through malicious emails and SMS.
Recently, Symantec has observed a smishing campaign in France in which actors are posing as Colissimo – a French postal service and courier company specializing in parcel and package delivery. Colissimo is part of La Poste, the French postal service, and is a major player in parcel delivery services in France.
In this campaign, the perpetrators are attempting to deceive mobile users by claiming that their package has encountered a shipping issue and advising them to click on a URL to verify. These actors have typosquatted Colissimo to create multiple fake domains that closely resemble the legitimate one. This tactic takes advantage of people's typographical errors when entering a website address. In the case of shipping companies, it's an effective strategy because people frequently visit these sites to track packages, check shipping status, or seek customer support.
Observed SMS:
Colissimo: Votre colis CH7013262652FR a rencontré un problème lors de son acheminement. Veuillez vous rendre sur le lien ci-dessous: colissimo-parceltrack[.]com
Symantec protects you from this threat, identified by the following:
Mobile-based
Symantec Endpoint Protection Mobile is able to analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake Colissimo domains used in this campaign are known to WebPulse.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products.
|
CollectionRAT - another malware variant leveraged by Lazarus APT
CollectionRAT is yet another malware variant recently leveraged in malicious campaigns conducted by the Lazarus APT. The malware exhibits certain similarities to another malware family known as EarlyRAT that has been previously attributed to the Andariel threat group. CollectionRAT has the functionalities to gather information about the infected system and execute remote commands. It also has the ability to run additional payloads downloaded from remote C2 servers. Lazarus has been also reported to increasingly rely on open-source tools usage in the initial stages of their attacks. Some examples of such tools include DeimosC2 or Malicious Plink.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
SONAR.TCP!gen6
File-based
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.A!300
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products
|
Color1337 - Linux cryptomining campaign
Color1337 is a recently identified cryptomining operation targeting Linux-based devices. The distributed malware runs a Monero cryptocurrency miner malware and attempts to propagate to other machines within the infected network. The threat actors have been leveraging Discord servers for retrieval of the information from the compromised machines.
Symantec protects you from this threat, identified by the following:
File-based
Hacktool
Miner.XMRig
Trojan Horse
Trojan.Gen.NPE
WS.Malware.1
Web-based
Observed domains/IPs are covered under security categories
|
Comebacker malware spread via malicious PyPI packages by Appleworm APT
Several malicious Python packages have been found in PyPI, the official Python package repository. The discovered packages (pycryptoenv, pycryptoconf, quasarlib and swapmempool) lead to the delivery of the Comebacker malware variant attributed to the Appleworm APT group (aka Lazarus). The spread malware has functionality to download and execute additional arbitrary payloads.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Ps-Rd32!g1
File-based
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
WS.Reputation.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.A!400
Heur.AdvML.A!500
Heur.AdvML.B!100
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products
|
CommBank users targeted in smishing campaign
CommBank, short for the Commonwealth Bank of Australia, is one of the largest financial institutions in Australia and a major player in the banking landscape of several other countries, including New Zealand, the United States, and the United Kingdom, as well as parts of Asia. Over the years, countless phishing attempts to snatch CommBank users' credentials have been observed on both computers and mobile devices. The latter, though less common, is becoming more prevalent.
In one recent example, Symantec has observed an actor who has been messaging users in Australia, impersonating the bank and luring them with fake abnormal activities on their account. The SMS contains a URL with a domain that typosquats the Commonwealth Bank of Australia to strengthen the social engineering trick.
Observed SMS:
CommBank has detected an abnormal transaction, please follow the link prompts to complete authentication immediately: hxxps://www[.]comnebank[.]com
Symantec protects you from this threat, identified by the following:
Mobile-based
Symantec Endpoint Protection Mobile is able to analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake CommBank domain used in this campaign are known to WebPulse.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products.
|
Commonwealth of Independent States government entities targeted by YoroTrooper group
A recent report provided some details of activity observed by the YoroTrooper threat actor. Reportedly comprised of individuals from Kazakhstan, the group appears to be moving toward the use of more custom malware to target victims located in the Commonwealth of Independent States. Entities belonging to these regional governments along with state-owned websites have been confirmed compromises. The group delivers multiple implants that are responsible for opening reverse shells and exfiltrating content from its victims.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
File-based
Backdoor.Trojan
Infostealer
JS.Downloader
Trojan Horse
Trojan.Gen.MBT
Trojan.Mallnk
VBS.Downloader.Trojan
WS.Malware.1
Machine learning-based
Heur.AdvML.A
Heur.AdvML.A!300
Heur.AdvML.B!100
Heur.AdvML.B!200
Heur.AdvML.C
Network-based
System Infected: Python Meterpreter Reverse TCP Activity
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products
|
ComRAT and Zebrocy backdoor used in a series of attacks against governments
We have been aware of recently released reports on activities from two prominent APT groups known as Waterbug/Turla and Earworm/Zebrocy. Both groups have been known to target a wide range of government organizations in a series of espionage operations in the past. The newest reports focus on two malware families used by those groups to exploit compromised systems - the Zebrocy backdoor and ComRAT.
Symantec provides the following protections against the reported campaign:
Backdoor.Trojan
Hacktool.Mimikatz
Trojan.Dropper
Trojan Horse
To find out more about earlier APT activities against governmental institutions, read our previous publications:
APT28: New Espionage Operations Target Military and Government Organizations
Waterbug: Espionage Group Rolls Out Brand-New Toolset in Attacks Against Governments
|
Confluence users warned to patch critical bug
On August 25th, Atlassian released a security advisory for a couple of vulnerabilities, related to their Confluence Server and Data Center instances. In particular the vulnerability tracked as CVE-2021-26084 is a Remote Code Execution, which can allow unauthenticated attackers to remotly execute commands on a vulnerable server. The company has released a patch and customers are recommended to upgrade their servers.
After a PoC was made available, indications of malicious actor scanning and exploiting the vulnerability have been seen on the raise, to the point that the US Cybercom sent a public notice warning the CVE is actively being exploited.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.MBT
Network-based
Web Attack: Malicious Java Payload Upload 5
Web Attack: Confluence RCE CVE-2021-26084
Web-based
Observed IPs/domains are covered under security categories
|
ConnectWise ScreenConnect vulnerabilities CVE-2024-1708 & CVE-2024-1709 exploited by ransomware threat groups
CVE-2024-1708 and CVE-2024-1709 are two recently disclosed vulnerabilities affecting ConnectWise ScreenConnect servers. First of the flaws - CVE-2024-1708 is a high priority path traversal vulnerability that might allow unauthenticated attackers to access restricted files and directories leading to information disclosure. Second flaw - CVE-2024-1709 is a critical authentication bypass vulnerability allowing attackers access to vulnerable systems and to potentially execute malicious code. The flaws have been reported as being exploited in the wild by various ransomware threat groups including Lockbit, Black Basta and Bl00dy Ransomware. Product vendor ConnectWise already released security fix version 23.9.8 to address the reported vulnerabilities.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Ps-Rd32!g1
ACM.Untrst-FlPst!g1
ACM.Untrst-RLsass!g1
ACM.Untrst-RunSys!g1
ACM.Wmic-DlShcp!g1
Behavior-based
SONAR.Ransom!gen82
SONAR.Ransom!gen113
SONAR.SuspDataRun
SONAR.SuspLaunch!g193
SONAR.TCP!gen1
SONAR.TCP!gen6
File-based
Backdoor.Cobalt
Backdoor.Cobalt!gen19
ISB.Downloader!gen173
Packed.Generic.700
Scr.Malcode!gdn14
Scr.Malcode!gdn20
Trojan Horse
Trojan.Gen.MBT
WS.Reputation.1
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B!100
Heur.AdvML.B!200
Network-based
System Infected: Trojan.Backdoor Activity 721
Web Attack: ConnectWise ScreenConnect CVE-2024-1708
Web Attack: ConnectWise ScreenConnect CVE-2024-1709
Web Attack: Webpulse Bad Reputation Domain Request
Policy-based
DCS default hardening policy for Windows servers will prevent arbitrary command and powershell execution and prevent tampering of critical Windows OS files and folders.
DCS network rules in the policy can be configured to limit ScreenConnect applications to trusted clients.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products
|
Contagious Interview and Wagemole ATP Campaign
Researchers reported two new distinct ATP campaigns dubbed "Contagious Interview" and "Wagemole". For Contagious Interview, threat actors are pretending to be a legitimate employer seeking applicants. During their fictitious interview session, unknowing applicants will be lured into installing an infostealer.
On the flip side, for Wagemole threat actors are posing as an applicant, mostly for US based organizations with the aim of committing cyberespionage.
Symantec protects you from this threat, identified by the following:
File-based
Infostealer
Trojan Horse
Trojan.Gen.MBT
Trojan.Malscript
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products.
|
Continuous activities of the BlackHunt ransomware group
BlackHunt is a C++-based ransomware variant initially discovered in the wild back in 2022. The malware remains active and recently has been leveraged in attacks against organizations in Paraguay. BlackHunt encrypts user files and appends an additional extension to them, which in case of the latest variant is ".Hunt2". The malware will avoid encrypting files with specific extensions as well as configuration and system files. Functionality-wise the ransomware can delete backup data and volume shadow copies on the infected machines as well as stop system restore capability of the infected system.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Ps-Reg!g1
ACM.Ps-RgPst!g1
ACM.Ps-Schtsk!g1
ACM.Ps-Wbadmin!g1
ACM.Untrst-RunSys!g1
ACM.Vss-DlShcp!g1
ACM.Wbadmin-DlBckp!g1
Behavior-based
AGR.Terminate!g2
SONAR.Ransom!gen14
SONAR.SuspLaunch!g18
SONAR.SuspLaunch!g250
SONAR.SuspLaunch!g340
SONAR.TCP!gen1
File-based
Ransom.BlackHunt
Trojan Horse
WS.Malware.2
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
|
Continuous activities of UAC-0099 threat group against Ukraine
"UAC-0099" is a threat group known to be targeting Ukraine since at least mid-2022. In some of the recent campaigns the attackers have been leveraging self extracting RAR .SFX archives, .LNK files masqueraded as WordPad documents as well as PowerShell scripts and a LoanPage VBS malware payload. UAC-0099 has also been observed to leverage exploitation of a known WinRAR CVE-2023-38831 vulnerability within the infection chain of their attacks.
Symantec protects you from this threat, identified by the following:
Behavior-based
ACM.Ps-Base64!g1
ACM.Ps-TVbs!g1
ACM.Ps-Wscr!g1
ACM.Schtsk-TVbs!g1
SONAR.TCP!gen1
File-based
CL.Downloader!gen4
CL.Downloader!gen241
Exp.CVE-2023-38831
ISB.Downloader!gen63
ISB.Downloader!gen77
Scr.Malcode!gen
Scr.Mallnk!gen1
Scr.Mallnk!gen6
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
Web.Reputation.1
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products.
|
Continuous operations of the Swallowtail APT group
Swallowtail APT (Fancy Bear, Forrest Blizzard or ITG05) is a state-sponsored threat group known for its attacks against government and non-governmental organizations worldwide. Recent Swallowtail operations have been leveraging Masepie and OceanMap backdoors as well as a Powershell infostealer called SteelHook. All named malware variants have been previously used in earlier campaigns attributed to this threat actor. The initial attack vector relies on phishing runs using lures focused on trending topics from various fields. The threat group has also been observed to abuse free hosting platforms to host malicious payloads and leverage WebDAV servers in their attacks.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Untrst-FlPst!g1
File-based
Backdoor.Trojan
Infostealer
Trojan Horse
Trojan.Gen.MBT
Web.Reputation.1
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.A!500
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products
|
Conti ransomware keeps targeting companies worldwide
Conti is a ransomware family that was first reported around July 2020 and is being regarded by some as a Ryuk ransomware successor. Since its emergence, the ransomware has been seen multiple times in the wild and actively targeting companies around the world. Like many other active ransomware families, Conti steals data from compromised victims prior to encryption. This data is then used as leverage by the threat actors to encourage victims to pay the ransom to avoid its publication.
While we continue to monitor and enhance our protections against this ransomware family, we recommend regular backup procedures of any important files and applying the latest product definitions to protect against ransomware threats.
Symantec protections against this ransomware family:
File-based
Downloader
Heur.AdvML.B
Heur.AdvML.C
Trojan.Gen.MBT
Ransom.Bitpaymer
Ransom.Conti
Ransom.Cryptolocker
Behavior-based
SONAR.Cryptlck!g171
SONAR.SuspLaunch!g18
Network-based
[32179] Attack: Ransom.Gen Activity 23
|
Conti ransomware threat group adopts Log4j exploit to compromise VMware vCenter servers
It has been reported that the threat group behind the Conti ransomware has been leveraging the Apache Log4j vulnerability in attacks targeting VMware vCenter servers. The attackers exploit the vulnerable server instances and once compromised, establish foothold that allows them for further lateral movement in the network.
Read more about the Apache Log4j vulnerability in our earlier bulletin: Threat Alert: Apache Log4j RCE (CVE-2021-44228) aka Log4Shell
Symantec protects you from this threat, identified by the following:
File-based
Downloader
Ransom.Conti
Ransom.Conti!gen9
Ransom.Conti!gen10
Ransom.Conti!gen11
Ransom.Conti!gm1
Trojan.Gen.2
Behavior-based
CL.RansomConti!gen3
SONAR.Ransomware!g30
SONAR.RansomConti!g1
SONAR.RansomConti!g2
Machine Learning-based
Heur.AdvML.C
Network-based
Attack: Log4j2 RCE CVE-2021-44228
Attack: Log4j2 RCE CVE-2021-44228 2
Attack: Log4j CVE-2021-45046
Attack: Ransom.Conti Activity
Attack: Ransom.Conti Activity 2
Attack: Ransom.Conti Activity 3
Attack: Ransom.Gen Activity 29
|
Convuster MacOs Adware moves from Swift to Rust programming language
According to a recently released report, the latest samples of the MacOs adware known as Convuster are now written in the Rust programming language which is a shift from previously compiling in Swift. A move to a new programming language is no less than yet another attempt at avoiding detection and making the analysis more challenging. Not only are Adware actors choosing less popular programming languages, they are also being leveraged by malicious groups developing malware.
Symantec provides the following detection against Convuster:
File-based
OSX.Trojan.Gen
|
Coper masquerades as Google Chrome mobile app
Coper Android banking malware has been around since at least 2021 and initially was targeting mobile users in Latin American countries but over the years has spread to European countries. As of today, this threat is still fairly active and recently Symantec has observed an actor disguising its Android banking malware (Coper) as Google Chrome mobile app (GoogleChrome02.5.apk) trying to target European mobile users. Its capabilities range from sensitive information collection to displaying fake window overlays, deceiving users into unknowingly surrendering their credentials, among other things.
Symantec protects you from this threat, identified by the following:
Mobile-based
Android.Reputation.1
|
CopperStealer - a new infostealing malware
A new infostealer malware has been discovered according to the latest reports. Dubbed as CopperStealer the malware has info-stealing capabilities but can also download additional malware. The observed campaigns utilizing this malware have been targeting saved browser passwords, cookies and going after Facebook and Instagram accounts among others. CopperStealer has been seen hosted on a variety of websites advertising cracked software and serial keys.
Symantec protects you from this threat, identified by the following:
File-based
Hacktool.Rootkit
Heur.AdvML.B
Heur.AdvML.C
SMG.Heur!gen
Trojan.Gen.2
Trojan.Gen.MBT
Trojan Horse
|
CopperStealer cranks up cryptocurrency theft
CopperStealer has gained in prevalence over the last few months and according to reports is still being enhanced by its owner. In recent drive-by-download campaigns, the threat has been seen stealing victim's API keys used by cryptocurrency exchange websites via malicious browser extension. If successful, it allows the threat to steal cryptocurrencies by transferring them to the attacker's wallets.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.Di!Gen1
SONAR.Heur.Dropper
SONAR.Rarsfx!Pua
File-based
Suspicious: Reputation
Trojan.Gen.2
Trojan.Gen.MBT
WS.Reputation.1
Machine Learning-based
Heur.AdvML.C
|
CopperStealth and CopperPhish campaigns by the Water Orthrus APT
The threat group known as Water Orthrus has been recently facilitating two new malicious campaigns dubbed CopperStealth and CopperPhish respectively. CopperStealth campaign delivers rootkit malware under the disguise of free software installers. The rootkit once deployed will inject the CopperStealth payload into the system processes. The payload is expected to run commands received from the C2 servers. CopperPhish campaign leverages downloader malware variants such as PrivateLoader, that in turn download the CopperPhish dropper responsible for the final payload execution. This campaign is aimed at phishing of banking and credit card information from the unsuspecting victims.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.TCP!gen1
File-based
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Malfilter
WS.Malware.1
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.B
Network-based
System Infected: Trojan.Backdoor Activity 502
System Infected: Trojan.Backdoor Activity 634
System Infected: Trojan.Backdoor Activity 721
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories
|
Copybara mobile malware spread in TOAD attacks
Copybara mobile malware also known as BRATA has been spread in a recent wave of TOAD (telephone-oriented attack delivery) attacks targeted at customers of multiple Italian banks. The threat actors have been leveraging phishing sites impersonating webpages of various Italian financial institutions. TOAD attacks involve direct phone call between attackers and victims, where the victims are being convinced to download and run malicious binaries on their devices. Copybara binaries often come masqueraded as fake security updates and the malware has various remote access capabilities.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
Android.Reputation.2
AppRisk:Generisk
|
Coreid (aka Fin7) uses backdoor against US Automaker victims
A recent report provided details of activity by the Coreid (aka Fin7) threat group in which victims in the US automaker industry were targeted. According to the report, the campaign leveraged spearphishing emails against selected targets by socially engineering content related to free online scanning tools. The victim would be coerced into following a link to a typosquatted domain related to a legitimate online scanner. From here, the attack chain would result in the download of a multi-stage component responsible for deploying the final backdoor payload.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Ps-Rd32!g1
ACM.Ps-RgPst!g1
ACM.Untrst-RunSys!g1
File-based
Trojan Horse
Trojan.Dropper
Trojan.Gen.MBT
WS.Malware.1
Machine learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products.
|
Core Werewolf APT group targets Russian defense organizations in espionage campaign
Espionage activity of the Core Werewolf APT group targeting Russian defense organizations was observed around mid-April. The attack utilized a malicious document as bait, purportedly meant for the presentation of state awards to special forces soldiers. However, the document is actually a 7zSFX archive containing a legitimate remote access tool, UltraVNC. Upon extraction, the malware creates copies of a decoy document and the UltraVNC executable, schedules tasks to run the executable, and establishes a connection to a designated server.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Untrst-RunSys!g1
ACM.Ps-Schtsk!g1
File-based
PUA.Gen.2
Trojan Horse
Trojan.Gen.MBT
WS.Reputation.1
WS.Malware.1
Machine learning-based
Heur.AdvML.C
|
CosaNostra botnet unleashed
It has been reported that a botnet by the name of CosaNostra has been observed in the wild. This botnet is reportedly a variant of another botnet called BlackNet.
The CosaNostra malware allows the attacker to perform various activities such as launching DDoS attacks, stealing confidential information from Web browsers, and sending spam emails.
Symantec provides the following coverage against CosaNostra botnet:
Trojan.Gen.2
|
CostaRicto APT campaign comes with custom-built malware
We have become aware of reports of a new cyber-espionage campaign conducted by a hackers-for-hire group. The campaign dubbed as CostaRicto has been active since at least late 2019 and deploys its own custom malware alongside off-the-shelf tools in its attacks. One of the malware variants used here is SombRAT backdoor. It includes capabilities to download and execute arbitrary payloads and also collect system information and upload it to a remote server.
Symantec has the following coverage in place against activities in this campaign:
File-based
Backdoor.Rozena
Heur.AdvML.B
Heur.AdvML.C
Trojan.Gen.MBT
Trojan Horse
Trojan.Pinypot
|
Costco member logins targeted in a smishing campaign
Symantec has recently observed a campaign in which actors are attempting to snatch Costco member logins via malicious Short Message Service (SMS). The strategy involves enticing users with the promise of a potential cashback, aiming to lure them into connecting to a phishing website.
Costco is a membership-based retail giant known for its warehouse-style stores and located in multiple countries around the world.
Observed malicious SMS:
COSTCO Your annual cashback has been totaled as a result of your membership with us, and the sum of $58.88 is now available to be claimed.See: CostcomemberLogin[.]com
Symantec protects you from this threat, identified by the following:
Mobile-based
Symantec Endpoint Protection Mobile is able to analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake domain used in this campaign are known to WebPulse.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products.
|
Cova loader leveraged for Nosu infostealer and SystemBC distribution
Cova loader has been leveraged in a recently discovered malware distribution campaign. The threat actors used the loader to spread two distinct payloads of a new infostealer dubbed Nosu and the well known proxy bot SystemBC. Nosu malware has the functionality to steal credentials, crypto-wallets, cookies or data files from the infected endpoints. The distribution of reported campaigns has been observed all across the world with the most of the infections seen in North and South America.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
File-based
Backdoor.SystemBC
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
Machine-Learning based
Heur.AdvML.A
Heur.AdvML.B
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories
|
Coverage details for Microsoft's April Patch Release
On April 13, Microsoft published their regularly scheduled monthly updates. For the April release Microsoft addressed 108 vulnerabilities.
Symantec protects you from these issues, identified by the following:
File-based
Exp.CVE-2021-28310
|
Coverage details for Microsoft's August Patch Release
On August 10, Microsoft published their regularly scheduled monthly updates. For the August release Microsoft addressed 44 vulnerabilities.
Symantec has introduced the following protections based on available information. Additional signatures are currently being investigated and may be toggled at a later date.
Network-based
OS Attack: Windows Services for NFS ONCRPC XDR Driver CVE-2021-26432 (released in 8/12 definitions)
Web Attack: Microsoft Scripting Engine CVE-2021-34480 (released in 8/12 definitions)
|
Coverage details for Microsoft's December Patch Release
On December 14, Microsoft published their regularly scheduled monthly updates. For the December release Microsoft has addressed 67 vulnerabilities. An additional 16 vulnerabilities related to Chromium were previously addressed in December.
Symantec has introduced the following protections based on available information.
File-based
Exp.CVE-2021-43883 (renamed from Bloodhound.Exploit.843)
Policy-based
Symantec DCS provides 0 day protection for the Windows Installer EOP vulnerability. In particular, the attempts by the POC/exploit to overwrite Windows service binaries and MSI files are prevented by DCS Windows hardening policies.
|
Coverage details for Microsoft's February Patch Release
On February 9, Microsoft published their regularly scheduled monthly updates. For the February release, Microsoft addressed 56 vulnerabilities.
Symantec has introduced the following protections based on available information. Additional signatures are currently being investigated and may be toggled at a later date.
File-based
(CVE-2021-1698) - Exp.CVE-2021-1698
(CVE-2021-24074) - Exp.CVE-2021-24074
(CVE-2021-24078) - Exp.CVE-2021-24078
(CVE-2021-24086) - Exp.CVE-2021-24086
(CVE-2021-24094) - Exp.CVE-2021-24094
Network-based
(CVE-2021-24072) - Web Attack: XML External Entity Attack
|
Coverage details for Microsoft's January Patch Release
On January 12, Microsoft published their regularly scheduled monthly updates. For the January release, Microsoft addressed 83 vulnerabilities.
Symantec has introduced the following protections based on available information. Additional signatures are currently being investigated and may be toggled at a later date.
File-based
Exp.CVE-2021-1647
Network-based
Web Attack: Microsoft SharePoint CVE-2021-1707
|
Coverage details for Microsoft's July Patch Release
On July 13, Microsoft published their regularly scheduled monthly updates. For the July release Microsoft addressed 117 vulnerabilities.
Symantec has introduced the following protections based on available information. Additional signatures are currently being investigated and may be toggled at a later date.
File-based
Exp.CVE-2021-34527
Exp.CVE-2021-34527!g1
Network-based
Audit: MSRPC Windows Print Spooler RpcAddPrinterDriverEx Attempt
Audit: MSRPC Windows Print Spooler RpcAddPrinterDriverEx Attempt 2
Audit: SMB Windows Print Spooler RpcAddPrinterDriverEx Attempt
Audit: Windows Print Spooler RCE CVE-2021-34527
OS Attack: Windows Print Spooler RCE CVE-2021-34527
Web Attack: Microsoft Internet Explorer CVE-2020-1380 (covers CVE-2021-34448)
Web Attack: Microsoft Exchange Server CVE-2021-34473
|
Coverage details for Microsoft's June 2022 Patch Release
On June 14, Microsoft published their regularly scheduled monthly updates. For the June release Microsoft has addressed 56 vulnerabilities. One of the vulnerabilities addressed, but not explicitly listed, is the recently disclosed Follina vulnerability which has been identified as actively exploited.
Symantec has introduced the following protections based on available information.
File-based
Exp.CVE-2022-30190
Network-based
Web Attack: MSDT Remote Code Execution CVE-2022-30190
|
Coverage details for Microsoft's March Patch Release
On March 8, Microsoft published their regularly scheduled monthly updates. For the March release Microsoft has addressed 71 vulnerabilities.
Symantec has introduced the following protections based on available information.
File-based
Exp.CVE-2022-21990
|
Coverage details for Microsoft's May Patch Release
On May 11, Microsoft published their regularly scheduled monthly updates. For the May release Microsoft addressed 55 vulnerabilities.
Symantec has introduced the following protections based on available information. Additional signatures are currently being investigated and may be toggled at a later date.
Network-based
OS Attack: Windows HTTP Protocol Stack CVE-2021-31166
Web Attack: Microsoft Scripting Engine CVE-2021-26419
Web Attack: Microsoft SharePoint CVE-2021-31181
|
Coverage details for Microsoft's November Patch Release
On November 10, Microsoft published their regularly scheduled monthly updates. For the November release Microsoft addressed 112 vulnerabilities.
Symantec has introduced the following protections based on available information.
File-based
(CVE-2020-17087) - Exp.CVE-2020-17087
(CVE-2020-17088) - Exp.CVE-2020-17088
Network-based
(CVE-2020-17047) OS Attack: Microsoft Windows NFS CVE-2020-17047
(CVE-2020-17051) OS Attack: Microsoft Windows NFS CVE-2020-17051
(CVE-2020-17053) Web Attack: Microsoft Internet Explorer CVE-2020-17053
(CVE-2020-17056) OS Attack: Microsoft Windows NFS CVE-2020-17056
(CVE-2020-17061) Web Attack: Microsoft SharePoint CVE-2020-17061
|
Coverage details for Microsoft's September Patch Release
On September 14, Microsoft published their regularly scheduled monthly updates. For the September release Microsoft addressed 66 vulnerabilities.
Symantec has introduced the following protections based on available information. Additional signatures are currently being investigated and may be toggled at a later date.
File-based
Exp.CVE-2021-40444
Exp.CVE-2021-40444!g1
Exp.CVE-2021-40444!g2
Exp.CVE-2021-40444!g3
Exp.CVE-2021-40444!g4
Exp.CVE-2021-40444!g5
Exp.CVE-2021-40444!g6
Network-based
Web Attack: Microsoft MSHTML RCE CVE-2021-40444
Web Attack: Open Management Infrastructure RCE CVE-2021-38647
Behavior-based
SONAR.SuspLaunch!g161
SONAR.SuspLaunch!g162
|
Covid phishing website leads to Punisher Ransomware
According to recent reports, actors behind Punisher ransomware have leveraged a fake Chilean COVID-related website to lure victims into downloading and executing their ransomware which was disguised as COVID tracking software. Victims who were successfully lured would have had their files encrypted, and presented with a ransom note asking for 1000 USD in Bitcoin.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.C
Web-based
Observed domains are covered under security categories
|
CR4T malware implant distributed in the DuneQuixote campaign
Malicious campaign dubbed DuneQuixote has been reported to distribute new variants of the CR4T malware implant. The campaign targets various organizations and entities in the Middle East. CR4T malware comes in two different strains, one written in C/C++ and the other one in the Golang programming language. The malware functionality focuses on granting the attackers with access to the infected endpoints, enabling remote command execution and arbitrary file upload/download capabilities.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Ps-Rd32!g1
ACM.Untrst-RunSys!g1
Behavior-based
SONAR.TCP!gen1
File-based
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.A!400
Heur.AdvML.A!500
Heur.AdvML.B!100
Heur.AdvML.B!200
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products
|
Cracked, Collector Stealer sees a rise in activity
Every now and then someone's malware gets cracked and released for free on various underground forums, websites and social media. That's the recent tale of Collector Stealer (also known as DCStealer and DataCollector). Ever since, Symantec has observed more and more instances this infostealer in the threatscape, being distributed via malicious emails and drive-by-downloads. Evermore cybercriminals are using this malware and some have also made new variants such as Panda stealer which we recently published a bulletin for.
Symantec protects you from this threat, identified by the following:
File-based
Heur.AdvML.B
Trojan.Dropper
WS.Malware.1
WS.Malware.2
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
|
Cracked macOS apps lead to cryptostealing malware
A new campaign spreading cryptostealing malware to macOS users has been observed in the wild. The malware installation happens via an Activator tool added to the compromised image of the cracked app. The tool has been confirmed to run without issues on macOS versions 13.6 Ventura or later, suggesting the threat actors are targeting users of the most recent OS versions. The final payload of the campaign is a cryptostealing malware targeting resources stored within the Exodus and Bitcoin Core crypto wallets.
Symantec protects you from this threat, identified by the following:
File-based
OSX.Trojan.Gen
OSX.Trojan.Gen.2
WS.Malware.1
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products
|
Crackonosh, out for wool and come home shorn
While cracked software is illegal, some still want to give it a crack and may end up being infected with Crackonosh, as this backdoor and cryptomining threat hides in such software. Recent reports indicate that actors behind this activity have been targeting gamers given that most of the malicious cracked software are video games.
Symantec protects you from this threat, identified by the following:
File-based
Downloader.Trojan
Trojan.Dropper
Trojan.Gen.2
Trojan.Gen.6
Trojan.Gen.MBT
Trojan.Horse
Trojan.Malscript
Miner.XMRig
WS.Malware.1
WS.Malware.2
Network-based
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed IPs/Domains are covered under security categories
|
CraneFly threat actor uses previously unseen techniques
Symantec, by Broadcom Software, has discovered a previously undocumented dropper that is being used to install a new backdoor and other tools using the novel technique of reading commands from seemingly innocuous Internet Information Services (IIS) logs. The dropper (Trojan.Geppei) is being used by an actor Symantec calls Cranefly (aka UNC3524), to install another piece of hitherto undocumented malware (Trojan.Danfuan) and other tools. The technique of reading commands from IIS logs is not something Symantec researchers have seen being used to date in real-world attacks.
Read more in our blog: Cranefly: Threat Actor Uses Previously Unseen Techniques and Tools in Stealthy Campaign
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
SONAR.TCP!gen6
File-based
Hacktool
Hacktool.Regeorg
Trojan.Danfuan
Trojan.Geppei
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.A
|
CRAT the RAT gets an upgrade
There have been reports of a new version of CRAT in the wild. CRAT is a Remote Access Trojan that has been associated with Lazarus and where CRAT goes a Ransomware usually follows. Earlier this year, actors used spam campaigns with malicious HWP files to deliver the first version of CRAT. The infection vector for this new version is however yet to be determined.
Lazarus is a very active attack group involved in both cyber crime and espionage. The group was initially known for its espionage operations and a number of high-profile disruptive attacks, including the 2014 attack on Sony Pictures. Lazarus has also become involved in financially motivated attacks, including an US$81 million theft from the Bangladesh Central Bank and the WannaCry ransomware.
Symantec has multiple protections in place for this RAT:
File-based
Trojan.Gen.2
Trojan.Gen.MBT
Ransom.Wannacry
WS.Malware.1
WS.Malware.2
Website-based
This activity is proactively blocked by Symantec Web Isolation technology.
|
CraxsRAT
There is no shortage of private and public Android RATs in the threatscape, with many having reached certain degrees of prevalence and persistence, especially when they are cracked and/or leaked for free.
CraxsRAT is a recent remote access trojan that is being advertised on Telegram, other social networking sites, websites, platform for software development and underground forums. It has also been cracked and leaked for free, leading to more activities (attacks and tests) from various groups and individuals.
This threat has run-of-the-mill capabilities that are common among mobile remote access trojans and spyware, along with stealing features.
Symantec protects you from this threat, identified by the following:
Mobile-based
AppRisk:Generisk
|
Creal infostealer targets cryptocurrency users
Threat Actors have been targeting cryptocurrency users in recent malicious phishing campaigns and leveraging a new info-stealing malware dubbed "Creal".
Creal is python complied malware with the following capabilities:
Steals login credentials, cookies and auto-fill information from chromium browsers
Steals data from chat and gaming applications.
Targets Chrome-based browser extensions
Steals wallets and confidential files that are related to crypto wallet applications.
The overall purpose of this malware is to obtain and exfiltrate information to their preconfigured C2 server using Discord webhooks.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
W32.Beapy
Machine Learning-based
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories
|
Credential Phishing attacks with hash tags in the URL
Symantec has recently seen credential phishing attacks using hashtags, (#), in the URLs to try to bypass spam filters. The email subjects refer to account logins, for example “Account user authentication”. The URLs in the messages redirected to websites designed to look like common webmail login pages.
Protections
Protection is in place for Symantec's email security products.
|
Credit Saison users targeted with a new phishing wave
Credit Saison is one of the largest credit card issuers headquartered in Tokyo, Japan. Lately, Symantec has observed phish runs that impersonate Credit Saison services and entice users to open fake notification emails. The email body content mentions to confirm Saison card usage. These phish emails make an attempt to lure users to open and click on phish URLs.
Email Subject: 【最終確認】セゾンカード ご利用確認のお願い
Translated Email Subject: [Final confirmation] Request for confirmation of Saison card usage
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products.
|
CredoMap malware spread in the latest APT28's campaign targeting Ukraine
APT28 group has been observed to deliver CredoMap malware to targets in Ukraine in their latest campaign. The threat actors have been leveraging malicious .rtf documents and exploiting MSDT CVE-2022-30190 vulnerability also known as Follina in their attacks. CredoMap malware is capable of credentials and cookie theft from various web browsers. The malware uses IMAP email protocol for data ex-filtration.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
W97M.Downloader
WS.Malware.1
WS.Malware.2
Network-based
Web Attack: MSDT Remote Code Execution CVE-2022-30190
Web Attack: Webpulse Bad Reputation Domain Request
Policy-based
DCS default policies harden MS Office applications. DCS prevents MS Office applications from launching command interpreters including cmd.exe, powershell.exe and others as child processes. Additionally for this CVE, the RCE vulnerability can be prevented by adding *\msdt.exe to the Sandbox execution control "Programs Microsoft Office may not run"
Web-based
Observed IPs/domains are covered under security categories
|
Crimeware campaign using commodity RATS
A new government and political themed campaign is being employed to target entities in Afghanistan and India. The infection chain consists of malicious RTF documents and PowerShell scripts that distributes malware to victims. Overall it appears to be a lone threat actor casting these lures under the guise of a Pakistani IT software development firm called "Bunse Technologies". The attacks use a variety of commodity RATS, but primarily QuasarRAT and dcRAT.
Symantec protects you from this threat, identified by the following:
File-based
Bloodhound.RTF.12
Bloodhound.RTF.20
Trojan Horse
Trojan.Gen.MBT
Trojan.Mdropper
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Network-based
Malicious Site: Malicious Domain Request 59
Web-based
Observed domains/IPs are covered under security categories
|
Cring ransomware delivered via VPN vulnerability
Symantec Security Response is aware of a report that cites several European companies as being the targets of a cyber attack campaign in early 2021 in which Cring ransomware was delivered as a payload. The attacker initially got a foot in the door to the targeted environment by exploiting a vulnerability in VPN software (the patch for which was released in May 2019). After a series of activities, the domain administrator account was seized by the attacker who used the confidential information to feed Cring ransomware to the unsuspected victims.
Symantec protects you from this threat, identified by the following:
File-based
Ransom.Gen
Trojan Horse
Heur.AdvML.C
Web-based
Observed domains are covered under security categories
|
CrossLock ransomware
Yet another Ransomware gang have been making the rounds, this one known as CrossLock, written using the Go programming language. According to reports, this actor employs the nefarious double-extortion tactics like many other actors. If encryption is successful, files will be appended with a .crlk extension and victims will then be asked to contact the crooks via Tox chat.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
File-based
Downloader
Machine Learning-based
Heur.AdvML.B
|
CryptBot among the infostealer variants distributed in latest CoralRaider campaign
According to a recent report, three distinct infostealers variants Cryptbot, LummaC2 and Rhadamanthys have been distributed in a newly discovered campaign attributed to the threat actor known as CoralRaider. The threat actors have been leveraging Content Delivery Network (CDN) cache as a malware delivery mechanism. The new variant of CryptBot malware has the functionality to steal a wide variety of data from the compromised machines. It targets data exfiltration from web browsers, cryptocurrency wallets, authenticator apps and password managers.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Mshta-Cmd!g1
ACM.Mshta-Http!g1
ACM.Mshta-Ps!g1
ACM.Ps-Http!g2
ACM.Ps-Reg!g1
ACM.Ps-Mshta!g1
Behavior-based
SONAR.Stealer!gen1
SONAR.SuspScript!g7
SONAR.TCP!gen1
File-based
CL.Downloader!gen55
Scr.Mallnk!gen13
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.NPE
Web.Reputation.1
WS.Malware.1
WS.Malware.2
WS.SecurityRisk.4
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.A!400
Heur.AdvML.A!500
Heur.AdvML.B!100
Heur.AdvML.B!200
Network-based
Audit: Bad Reputation Application Activity
System Infected: Trojan.Backdoor Activity 721
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products
|
CryptNet RaaS ransomware
CryptNet is a new RaaS (Ransomware-as-a-Service) ransomware variant that emerged this month on the threat landscape. The malware is written in .NET, uses AES algorithm for encryption, and has capabilities to disable backup services and delete shadow copies. Following successful encryption CryptNet will append random extensions to the encrypted files, drop ransom notes in the form of .txt files as well as change the desktop wallpaper on the infected machine. The attackers behind this ransomware variant have also set up a data leak website where they publish details of their victims.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
|
Crypto clipper campaign via trojanized Tor browser
The prevalence of crypto wallet hijackers is not faltering and in fact appears to be increasing. These are mostly distributed via drive-by-download, with actors disguising the malicious binaries as software and update installers, video game hacks, cryptocurrency miners, and more. Recently, light has been shed on a crypto clipper campaign that was delivered via trojanized Tor installers. Tor Browser is a free, open-source web browser that allows users to browse the internet anonymously.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.TCP!gen1
File-based
Trojan Horse
Machine Learning-based
Heur.AdvML.B
|
Cryptocurrency clipper preys on TikTok users
Over the last few years, the short-form video hosting and social media service known as TikTok has gained greatly in popularity. As of today, it's a staple among teenagers and young adults worldwide. This demographic is also known to be heavily exposed to cryptocurrency and this hasn't gone unnoticed by those with ill intent. Symantec recently observed a drive-by-download campaign in which an actor preyed on TikTok users looking to boost their views via shortcuts such as view bots. Little do they know that if successfully tricked they would in fact install a cryptocurrency clipper whose main purpose is to swap victims' cryptocurrency wallet addresses with the ones owned by the malware actor.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
WS.Malware.1
Machine Learning-based
Heur.AdvML.C
|
CryptoMiners incorporate indirect syscalls evasion technique
Indirect syscalls, a technique frequently utilized by ransomware loaders such as Pikabot, have recently been observed being employed by other malware types, notably CoinMiners. This malware, serving as a stager for the XMrig miner, establishes persistence by creating a run registry and service entry. Subsequently, it executes in memory to evade detection and maintain its foothold on the infected system.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
WS.Malware.2
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.A!300
Heur.AdvML.B!100
Heur.AdvML.B!200
|
Cryptomining campaign targets Linux and Windows
The 8220 Gang is a threat group that has used cryptomining attacks in the past. In their most recent version the Linux port saw minimal changes while Windows version included many enhancements.
The Windows deployment of the cryptominer utilizes PowerShell for fileless execution. New techniques including DLL sideloading, User Account Control (UAC) bypass, and changes to the AMSIscanBuffer and ETWEventWrite function attacks. The group also uses techniques to circumvent detection methods and bypass antivirus (AV), endpoint detection and EDR systems.
There were no major changes in the Linux variant which is a shell script that downloads the malware. The script looks for susceptible applications and uses newer versions of masscan and spirit for reconnaissance. This new version is also more difficult to detect.
Symantec protects you from these threats, identified by the following:
File-based
Trojan.Gen.NPE
Trojan Horse
WS.Malware.1
WS.Malware.2
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products
|
Crypto Mining Snapshot
Cryptocurrency miners have been around for a long time now and have gained in popularity in recent years with the boom in major cryptocurrencies like Bitcoin, Monero, etc. Where there is money to make, there will always a degree of criminality. Cybercriminals certainly have been and are continuing to profit from this type of threat. We have seen these being distributed using all kinds of infection vectors from exploit kits to major SMB vulnerabilities like Double pulsar and Eternal blue.
Symantec continues to closely monitor cryptocurrency miners and related threats, and have multiple detections in place across our scan technologies. Below is our top detections as of September 2020.
|
Cryptonite ransomware acts as a wiper
Cryptonite is yet another Python-based ransomware variant. It's the second malware variant named exactly the same - the other Cryptonite ransomware is based on the older Chaos ransomware. Cryptonite encrypts user files and appends .cryptn8 to them. The malware can delete Volume Shadow Copies and it contains several functions for evading detections such as AMSI bypass or event logging disablement. It has been reported that some recent samples of this malware may never allow for data decryption and instead act as a wiper.
Symantec protects you from this threat, identified by the following:
File-based
Ransom.Cryptonite
Trojan.Gen.2
WS.Malware.1
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.B
Web-based
Observed domains/IPs are covered under security categories
|
Cryptonite Ransomware seen in French-speaking countries
Cryptonite Ransomware has recently been observed in French-speaking countries such as Canada. The actors behind this recent activity, who do not appear to move laterally within a compromised environment, are requesting 0.51 Bitcoin to decrypt the affected machine. They threaten to delete 2 files each 24 hours until payment is made and will increase the price if still not paid after 7 days, as opposed to using the classic double extortion tactics that more infamous Ransomware groups seem to prefer.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.SuspBeh!gen625
File-based
Ransom.Sorry
Machine Learning-based
Heur.AdvML.B
|
CryptoWire Ransomware
CryptoWire is a ransomware initially discovered back in 2018. While this variant was not very active in last few years, a new delivery campaign has been observed in the wild just recently. The malware has the functionality to encrypt user files on both local and network drives, USB drives or any externally connected disks. CryptoWire adds ".encrypted" string to the locked files and the ransom note is displayed in form of a pop up window. Whats very unusual for this type of malware, is that the reported variant allows for the decryption key to be located within either the traffic sent back to the C2 servers or inside the used Autoit script.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Ps-Schtsk!g1
ACM.Untrst-Rgpst!g1
ACM.Untrst-RunSys!g1
ACM.Vss-DlShcp!g1
Behavior-based
AGR.Terminate!g2
SONAR.Ransom!gen14
SONAR.SuspLaunch!g18
SONAR.SuspLaunch!g250
SONAR.SuspLaunch!g340
SONAR.SuspReg!gen49
File-based
Ransom.Cryptolocker
Scr.Malcode!gen
Trojan.Gen.9
Trojan.Gen.MBT
Web.Reputation.1
WS.Malware.1
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!200
Heur.AdvML.C
Network-based
Audit: Bad Reputation Application Activity
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.