text
stringlengths
0
383k
Csharp-streamer RAT In 2021, the Revil threat group utilized the Csharp-streamer RAT malware variant in ransomware campaigns. New instances of this malware observed this year demonstrate capabilities such as data exfiltration, keylogging, credential theft, network discovery, and payload deployment. The malware can establish connections to the attacker's Command and Control (C2) servers using the Internet Control Message Protocol (ICMP) protocol. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based Trojan Horse Trojan.Gen.MBT WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.A Heur.AdvML.A!300 Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Cuba Ransomware Campaign (October and November) Recently, the FBI released a statement saying that as of early November 2021, 49 entities in five critical infrastructure sectors were hit by Cuba Ransomware. Sectors included but not limited to are financial, government, healthcare, manufacturing and information technology. It was reported that the Cuba Ransomware gang still operates together with Hancitor malware spam operators to gain access to compromised networks. Hancitor is known for establishing initial access into the victim's network using phishing emails, Microsoft Exchange vulnerabilities and compromised credentials. Subsequently, Cuba ransomware actors use legitimate Windows services such as PowerShell, PsExec, and other unspecified services, and then leverage Windows Admin privileges to execute their ransomware and other processes remotely. Symantec protects you from this threat, identified by the following: File-based Backdoor.Cobalt Trojan Horse Trojan.Gen.MBT Web-based Observed domains/IPs are covered under security categories
Cuba Ransomware is targeting organizations Symantec Security Response has been aware of the recent Cuba Ransomware activities targeted at various organizations. The group behind this ransomware variant also employs the tactic of data theft from the compromised machines and threatens to release it publicly if the ransom demands are not met. As we continue to monitor and enhance our protections against Cuba Ransomware variants, we recommend performing regular backups for any important data and ensuring your security products are kept up to date with the latest product definitions. Symantec protects you from this threat, identified by the following: File-based Downloader Heur.AdvML.B Heur.AdvML.C Trojan.Gen.NPE Trojan Horse
CVE-2021-3129 - Remote Code Execution (RCE) vulnerability in Laravel under active exploitation CVE-2021-3129 is a critical (CVSS score 9.8) Remote Code Execution (RCE) Vulnerability in Laravel framework. If successfully exploited, this vulnerability allows an unauthenticated remote attacker to gain control over the victim systems, compromise all databases and services that Laravel uses and negatively impact the entire infrastructure. Symantec's network protection technology, Intrusion Prevention System (IPS) has picked up scans based on threat landscape monitoring, which indicate a recent uptick in exploitation of this vulnerability. Symantec's network protection technology, Intrusion Prevention System (IPS) blocks these vulnerability exploitation attempts to prevent further infection/damage to the system. Symantec protects you from this threat, identified by the following: Network-based Web Attack: Laravel RCE CVE-2021-3129
CVE-2021-3560, Polkit's 7 year old privilege escalation vulnerability A seven-year-old flaw (tracked as CVE-2021-3560) that resides in the polkit auth system services installed by default on many modern Linux distributions has recently been disclosed and patched. The vulnerability was introduced all the way back in 2014 in polkit version 0.113. Symantec protects you from this vulnerability, identified by the following: Policy-based Data Center Security (DCS) provides zero day protection against this Linux privilege escalation vulnerability with default hardening and detection policies.
CVE-2022-22954 VMware vulnerability remains exploited in the wild CVE-2022-22954 is a remote code execution (RCE) vulnerability in VMware Workspace ONE Access and Identity Manager that has been disclosed a while back in April 2022. According to a recent report, this vulnerability is still being targeted in the wild. The attacks exploiting CVE-2022-22954 are distributing various payloads to Linux-based platforms. The payloads observed in the most recent campaigns include Mirai malware strain, RAR1ransom ransomware and GuardMiner, which is a XMRig coinminer variant. Symantec protects you from this threat, identified by the following: File-based Downloader Trojan Horse Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.B Network-based Web Attack: VMware WorkSpace One RCE CVE-2022-22954 Policy-based Symantec DCS default hardening will block saving or modification of executables associated with this exploit. Additionally customer can set up the network perimeter to avoid exposing the services to the internet. Web-based Observed IPs are covered under security categories
CVE-2022-26134 Atlassian Confluence vulnerability exploited in the wild Critical CVE-2022-26134 Atlassian Confluence vulnerability has been reported as being exploited in the wild by a number of threat actors to spread botnet or ransomware malware. This RCE vulnerability relates to an Object-Graph Navigation Language (OGNL) injection that could allow an unauthenticated user to execute arbitrary code on the compromised system. Among the malware families currently distributed in the attacks exploiting this vulnerability are Kinsing and Mirai botnets as well as AvosLocker and Cerber2021 ransomware variants. Symantec protects you from this threat, identified by the following: File-based Downloader Ransom.Cerber Trojan Horse Trojan.Gen.NPE Network-based Web Attack: Atlassian OGNL Injection CVE-2022-26134 Web Attack: Malicious Java Payload Upload 5 Policy-based DCS customers with Confluence Server instances are protected using default hardening rules. Web-based Observed IPs/domains are covered under security categories
CVE-2022-47966 ManageEngine vulnerability exploited by Lazarus APT for QuiteRAT delivery Lazarus APT group has been reported to leverage ManageEngine RCE vulnerability (CVE-2022-47966) in their latest attacks. CVE-2022-47966 is an unauthenticated remote code execution (RCE) vulnerability affecting over twenty Zoho ManageEngine products that if successfully exploited can allow the remote attackers to execute arbitrary commands on the vulnerable servers. One of the payload variants seen in the recent Lazarus campaigns is a Remote Access Trojan (RAT) dubbed as QuiteRAT. This malware is based on the Qt framework and belongs to the MagicRAT malware family. Functionality-wise it is able to collect basic information about the infected system, execute remote commands as well as download and run additional arbitrary payloads. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen6 File-based Trojan Horse WS.Malware.2 Machine Learning-based Heur.AdvML.C Network-based Web Attack: Zoho Manageengine RCE Vulnerability CVE-2022-47966 Policy-based Symantec DCS Hardening policy for Windows provides 0 day protection against threats exploiting CVE-2022-47966. The default sandboxing controls prevent webshells and malware tools from getting installed and prevent arbitrary system command execution from privileged applications. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
CVE-2023-20887 vulnerability affecting VMware Aria Operations for Networks CVE-2023-20887 is a recently disclosed critical (CVSS score: 9.8) command injection vulnerability affecting VMware Aria Operations for Networks, which is a network monitoring and management solution. If exploited the vulnerability could allow remote attackers to execute arbitrary code within the context of the vulnerable application. The exploit code for the vulnerability has been released publicly and the vulnerability has also been reported as exploited in the wild. VMWare has already released an emergency security product update to address this vulnerability. Symantec protects you from this threat, identified by the following: Network-based Web Attack: VMware Aria Operations for Networks CVE-2023-20887
CVE-2023-22515 Atlassian Confluence Broken Access Control vulnerability exploited in the wild CVE-2023-22515 is a recently disclosed a critical (CVSS score: 10.0) privilege escalation vulnerability affecting certain versions of Atlassian Confluence Data Center and Server. If exploited the vulnerability could allow remote attackers to obtain access to Confluence instances by creating unauthorized Confluence administrator accounts. The vulnerability has been reported as being exploited in the wild for the purpose of initial access to the targeted networks. One of the groups leveraging this vulnerability in their attacks since at least the middle of September is Storm-0062 (also known as DarkShadow or Oro0lxy). The vendor Atlassian has already released a patch to address this vulnerability in product versions 8.3.3, 8.4.3, 8.5.2 or later. Symantec protects you from this threat, identified by the following: Network-based Attack: Confluence Broken Access Control Vulnerability CVE-2023-22515 Policy-based Symantec Data Center Security (DCS) hardening for Confluence application can reduce the attack surface and exposure in many different ways. Locking down of Confluence network exposure for example can prevent exploitation of Confluence vulnerabilities over the public internet.
CVE-2023-22524 - RCE vulnerability in Atlassian Companion for macOS CVE-2023-22524 is a recently disclosed Remote Code Execution (RCE) vulnerability affecting Atlassian Companion for macOS application. The vulnerability has been rated as critical with CVSS score of 9.6. Successful exploitation of the vulnerability may allow an attacker to execute arbitrary code within the context of the application by leveraging Websockets to bypass Atlassian Companion’s blocklist and MacOS Gatekeeper. The vulnerability has been patched in product version 2.0.0 or later. Symantec protects you from this threat, identified by the following: Network-based Web Attack: Atlassian Companion App for MacOS CVE-2023-22524
CVE-2023-22527 - Remote Code Execution (RCE) vulnerability in Atlassian Confluence under active exploitation CVE-2023-22527 is a critical (CVSS score 10) OGNL injection vulnerability in Atlassian Confluence Data Center and Server. If successfully exploited, this vulnerability allows unauthenticated remote attackers to achieve remote code execution (RCE) on an affected instance. Symantec's network protection technology, Intrusion Prevention System (IPS) blocks these vulnerability exploitation attempts to prevent further infection/damage to the system. Symantec protects you from this threat, identified by the following: Network-based Web Attack: Atlassian Confluence RCE CVE-2023-22527
CVE-2023-32315 Openfire vulnerability exploited for Kinsing malware delivery CVE-2023-32315 is an authentication bypass vulnerability disclosed back in May 2023 that affects Openfire administrative console. If exploited the vulnerability could allow an unauthenticated user to access restricted sections in the Openfire Admin Console as well as upload malicious plugins, potentially leading to full compromise of the vulnerable application. According to a recent report, a new campaign leveraging CVE-2023-32315 Openfire vulnerability for Kinsing malware distribution has been observed in the wild. The attackers have been using malicious plugins uploaded to the Openfire console in order to deploy the Kinsing payload which in turn would lead to download and execution of cryptomining malware on the infected hosts. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.NPE Trojan.Maljava WS.Malware.1 Network-based Attack: Openfire Authentication Bypass Vulnerability CVE-2023-32315 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
CVE-2023-33246 Apache RocketMQ RCE vulnerability CVE-2023-33246 is a recently disclosed critical (CVSS score: 9.8) remote code execution vulnerability affecting Apache RocketMQ which is a distributed messaging and streaming platform. The vulnerability has been reported in Apache RocketMQ product version 5.1.0 and below. If exploited the vulnerability could allow remote attackers to perform arbitrary code execution by using the RocketMQ update configuration function. Apache has released an emergency security update in product version 5.1.1 to address this vulnerability. Symantec protects you from this threat, identified by the following: Network-based Web Attack: RocketMQ RCE CVE-2023-33246
CVE-2023-38035 vulnerability affecting Ivanti Sentry CVE-2023-38035 is a recently disclosed critical (CVSS score: 9.8) authentication bypass vulnerability affecting Ivanti Sentry (previously MobileIron Sentry) versions 9.18 and prior, which is an in-line mobile traffic gateway and management system. If exploited the vulnerability could allow remote attackers to execute arbitrary code on vulnerable systems with root privileges. The exploit code for the vulnerability has been recently released publicly and the vulnerability has also been added to the "Known Exploited Vulnerabilities Catalog" by CISA following the reports of in the wild exploitation. Symantec protects you from this threat, identified by the following: Network-based Web Attack: Ivanti Sentry API CVE-2023-38035
CVE-2023-38545 Heap Buffer Overflow vulnerability in Curl CVE-2023-38545 is a recently disclosed high severity heap buffer overflow vulnerability in Curl command-line tool and the libcurl library. It affects applications using the libcurl library to connect via SOCKS5 proxy and attempting to resolve a long hostname. While there are several requirements required for vulnerability to be successfully exploited, it can potentially lead to remote code execution (RCE). A new patched version of curl 8.4.0 has been already released to address this vulnerability. Symantec protects you from this threat, identified by the following: Network-based Web Attack: Curl Heap Overflow CVE-2023-38545 Policy-based DCS default sym_unix_protection_sbp and sym_win_hardened_sbp policies have multiple 0-day protections in place for curl vulnerability CVE-2023-38545. DCS UNIX hardened protection policy prevents arbitrary use of the curl tool by privileged applications and users on Linux/UNIX systems. Windows and UNIX default hardened sandbox and custom sandboxes for applications, protect the underlying OS resources from affected applications built with libcurl and prevent several techniques used by threat actors to achieve persistence and arbitrary code execution Additionally, DCS baseline detection policies alert on system tampering and suspicious user activity such as failed login attempts.
CVE-2023-38646 Metabase Pre-Auth RCE Vulnerability CVE-2023-38646 is a critical (CVSS score: 9.8) remote code execution vulnerability (RCE) disclosed last month affecting Metabase which is a popular business intelligence platform. The vulnerability has been reported in Metabase versions lower than 0.46.6.1 (open source) and 1.46.6.1 (Enterprise). If exploited the vulnerability could allow remote unauthenticated attackers to execute arbitrary commands on the targeted Metabase servers, at the server's privilege level. Symantec protects you from this threat, identified by the following: Network-based Web Attack: Metabase RCE Vulnerability CVE-2023-38646
CVE-2023-39026 FileMage Gateway Directory Traversal Vulnerability CVE-2023-39026 is a recently disclosed (CVSS score: 7.5 High) directory traversal vulnerability affecting FileMage Gateway versions 1.10.8 and prior, which is a cloud-based multi-protocol file transfer solution. If exploited the vulnerability could allow remote unauthenticated attackers to obtain sensitive information and access files on the host system via crafted requests to the /mgmt/ component. The exploit code for the vulnerability has been recently published publicly and the vendor FileMage has released a patch to address this vulnerability in product version 1.10.9. Symantec protects you from this threat, identified by the following: Network-based Web Attack: Filemage Gateway Directory Traversal Vulnerability CVE-2023-39026
CVE-2023-41266 A path traversal vulnerability in Qlik Sense Enterprise under active exploitation CVE-2023-41266 is a path traversal vulnerability affecting Qlik Sense Enterprise. If successfully exploited, this vulnerability allows an unauthenticated remote attacker to generate an anonymous session. This allows them to transmit HTTP requests to unauthorized endpoints. Symantec's network protection technology, Intrusion Prevention System (IPS) has picked up scans based on threat landscape monitoring, which indicate a recent uptick in exploitation of this vulnerability. Symantec's network protection technology, Intrusion Prevention System (IPS) blocks these vulnerability exploitation attempts to prevent further infection/damage to the system. Symantec protects you from this threat, identified by the following: Network-based Web Attack: Qlik Sense Enterprise Path Traversal CVE-2023-41266
CVE-2023-42793 TeamCity Authentication Bypass vulnerability exploited by ransomware gangs CVE-2023-42793 is a recently disclosed (CVSS score: 9.8 Critical) authentication bypass vulnerability in JetBrains TeamCity CI/CD (Continuous integration and Deployment) Servers. If exploited the vulnerability could allow unauthenticated attackers with HTTP(S) access to the TeamCity server and lead to administrative control of the vulnerable server or further remote code execution (RCE) attacks. The vulnerability has been reported as being exploited in the wild by various ransomware threat groups and the vendor has already released a patch to address it in the product version 2023.05.4. Symantec protects you from this threat, identified by the following: Network-based Web Attack: TeamCity Authentication Bypass CVE-2023-42793 Policy-based Symantec Data Center Security default lockdown policy sym_win_hardened_sbp protects the underlying Windows servers from the TeamCity CVE-2023-42793, including preventing execution of arbitrary cmd shells as demonstrated in some public exploit samples. DCS network rules in the policy can be configured to limit TeamCity application to trusted clients.
CVE-2023-49070 Apache OFBiz RCE vulnerability CVE-2023-49070 is a critical (CVSS score 9.8) pre-auth remote code execution vulnerability in Apache OFBiz. Successful exploitation of the vulnerability grants the attacker complete control over the server, allowing them to steal sensitive data, disrupt operations, or even launch further attacks against the organization’s network. Symantec's network protection technology, Intrusion Prevention System (IPS) blocks these vulnerability exploitation attempts to prevent further infection/damage to the system. Symantec protects you from this threat, identified by the following: Network-based Web Attack: Apache Ofbiz RCE CVE-2023-49070
CVE-2023-51467 Apache OFBiz Authentication Bypass vulnerability CVE-2023-51467 is a critical (CVSS score 9.8) authentication bypass vulnerability in Apache OFBiz. Successful exploitation of the vulnerability allows the attackers to bypass authentication protections and conduct a Server-Side Request Forgery (SSRF) attack. The vulnerability has been patched in Apache OFBiz product version 18.12.11 or above. Symantec protects you from this threat, identified by the following: Network-based Web Attack: Apache OFBiz Authentication Bypass CVE-2023-51467
CVE-2023-7102, New Zero-Day vulnerability in Barracuda's ESG Appliance exploited A Chinese threat actor, UNC4841, has been reported exploiting a new zero-day vulnerability identified as CVE-2023-7102 in Barracuda Email Security Gateway (ESG) appliances. The threat actor utilized an Arbitrary Code Execution (ACE) vulnerability within a third-party Perl module called 'Spreadsheet ParseExcel' to deploy a specially crafted Excel email attachment targeting a limited number of ESG devices. Barracuda has observed new variants of SEASPY and SALTWATER malware being deployed on these ESG devices. Symantec protects you from this threat, identified by the following: File-based DDoS.Trojan Exp.CVE-2023-2868 Linux.Trojan Trojan Horse WS.Malware.2 WS.SecurityRisk.4 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
CVE-2024-0204: An authentication bypass vulnerability in GoAnywhere MFT CVE-2024-0204 is an authentication bypass vulnerability in GoAnywhere MFT, a managed file transfer solution. If successfully exploited, this vulnerability allows unauthenticated remote attackers to create an administrative user for the application, which will help attackers to deploy malware, access sensitive data and likely enable further attacks within the network. Symantec's network protection technology, Intrusion Prevention System (IPS) blocks these vulnerability exploitation attempts to prevent further infection/damage to the system. Symantec protects you from this threat, identified by the following: Network-based Web Attack: Nginx Improper Path Normalization
CVE-2024-1071 - WordPress Ultimate Member Plugin vulnerability CVE-2024-1071 is a recently disclosed SQL Injection vulnerability impacting WordPress Ultimate Member Plugin versions 2.1.3 to 2.8.2. Successful exploitation of the vulnerability could allow unauthenticated attackers to append additional SQL queries to existing ones, potentially resulting in the extraction of sensitive data from the database. The vulnerability has been observed being exploited in the wild and the vendor has already released a patched version, 2.8.3, to mitigate the risk. Symantec protects you from this threat, identified by the following: Network-based Web Attack: WordPress Ultimate Member Plugin CVE-2024-1071
CVE-2024-1852 - WordPress WP-Members Membership Plugin vulnerability CVE-2024-1852 is a high severity cross-site scripting (XSS) vulnerability affecting WordPress WP-Members Membership Plugin. Successful exploitation of this vulnerability could allow unauthenticated attackers to inject arbitrary web scripts into vulnerable pages. If executed in the context of an administrator, the exploitation of this flaw could additionally lead to redirection of the site visitors to malicious URLs or further compromise. The vulnerability has been addressed in version 3.4.9.3 of the plugin. Symantec protects you from this threat, identified by the following: Network-based Attack: WordPress WP-Members Membership Plugin CVE-2024-1852
CVE-2024-20767 - Adobe ColdFusion vulnerability CVE-2024-20767 is a directory traversal vulnerability in Adobe ColdFusion, which is a development platform for building and deploying web and mobile applications. If successfully exploited, this vulnerability allows unauthenticated remote attackers to read arbitrary files on the system. Symantec's network protection technology, Intrusion Prevention System (IPS) blocks these vulnerability exploitation attempts to prevent further infection/damage to the system. Symantec protects you from this threat, identified by the following: Network-based Web Attack: Passwd File Download Attempt Web Attack: Adobe ColdFusion Arbitrary File Read CVE-2024-20767
CVE-2024-20931 - Oracle Weblogic Server RCE vulnerability CVE-2024-20931 is a recently disclosed Remote Code Execution (RCE) vulnerability affecting Oracle WebLogic Server’s T3\IIOP protocol. Successful exploitation of this vulnerability could allow unauthenticated attackers to execute arbitrary code within the context of the application as well as unrestricted access to the critical data on the vulnerable instances of Oracle WebLogic Server. The vulnerability has already been addressed with a patch by the application vendor. Symantec protects you from this threat, identified by the following: Network-based Web Attack: Oracle Weblogic Server CVE-2024-20931 Policy-based Symantec Data Center Security IPS policy has several recommendations on preventing exploitation of the CVE-2024-20931 vulnerability: Setting up a control on where files can be written and what commands can be run via java in the sandbox that java apps are run in. The sandbox assignment configured by the user can be used to block unknown programs. The network controls can be used to block the initial infection and stop any C2 access.
CVE-2024-23334 Directory Traversal vulnerability in aiohttp CVE-2024-23334 is a directory traversal vulnerability in aiohttp, which is an asynchronous HTTP client/server framework for asyncio and Python. If successfully exploited, this vulnerability allows unauthenticated remote attackers to read sensitive information from arbitrary files located on the file system of the server. Symantec's network protection technology, Intrusion Prevention System (IPS) blocks the vulnerability exploitation attempts to prevent further infection/damage to the system. Symantec protects you from this threat, identified by the following: Network-based Attack: Aiohttp Directory Traversal CVE-2024-23334 Web Attack: Passwd File Download Attempt
CVE-2024-23897 Arbitrary File Read vulnerability in Jenkins CVE-2024-23897 is a recently disclosed critical (CVSS score: 7.5) arbitrary file read vulnerability affecting Jenkins which is an open-source, Java-based tool for continuous integration. This vulnerability is caused by an error in the CLI command parser in affected versions of Jenkins. If successfully exploited, it allows unauthenticated remote attackers to read arbitrary files and potential leakage of sensitive information stored on the Jenkins controller file system. Symantec's network protection technology, Intrusion Prevention System (IPS) blocks these vulnerability exploitation attempts to prevent further infection/damage to the system. Symantec protects you from this threat, identified by the following: Network-based Web Attack: Jenkins Arbitrary File Read Vulnerability CVE-2024-23897 Policy-based Symantec Data Center Security (DCS) default lockdown policy protects the underlying UNIX servers from this vulnerability, including preventing execution of arbitrary commands and restricting the access to critical OS files from being read. DCS network rules in the policy can be configured to limit Jenkins application to trusted clients.
CVE-2024-25600 - WordPress Bricks Builder RCE vulnerability CVE-2024-25600 is a critical (CVSS score 9.8) Remote Code Execution (RCE) vulnerability affecting Bricks Builder plugin for WordPress. Successful exploitation of this vulnerability could allow unauthenticated attackers to remotely execute arbitrary PHP code on affected WordPress-based websites. The vulnerability has been reported as being exploited in the wild including installation attempts of malicious PHP-based webshells on the vulnerable servers. A patch addressing this vulnerability has been released in Bricks Builder plugin version 1.9.6.1 or higher. Symantec protects you from this threat, identified by the following: Network-based Attack: WordPress Bricks Builder Theme RCE CVE-2024-25600 Attack: WordPress Bricks Builder Theme RCE CVE-2024-25600 2 Policy-based Symantec Data Center Security default lockdown policy sym_win_hardened_sbp protects the underlying Windows servers from the CVE-2024-25600 , including preventing execution of arbitrary commands. DCS network rules in the policy can be configured to limit wordpress application to trusted clients.
CVE-2024-27199 : Authentication Bypass vulnerability in JetBrains TeamCity CVE-2024-27199 is an authentication bypass vulnerability in the web component of TeamCity, which is a build management and continuous integration server from JetBrains. This vulnerability arises from a path traversal issue. Successfully exploiting this issue will enable an unauthenticated attacker with HTTP(S) access to a TeamCity server to bypass authentication checks, gain administrative control of that TeamCity server and system modification, including the ability to replace the HTTPS certificate with a malicious one. Symantec's network protection technology, Intrusion Prevention System (IPS) blocks these vulnerability exploitation attempts to prevent further infection/damage to the system. Symantec protects you from this threat, identified by the following: Network-based Web Attack: JetBrains TeamCity Authentication Bypass CVE-2024-27199 Policy-based DCS hardening for TeamCity application can reduce the attack surface and exposure in many different ways: Lock down the TeamCity network exposure such that the vulnerability be exploited over the public internet Prevent access to critical files such that sensitive system information can not be exfiltrated
Cybercriminal Neo_Net targets Spanish and Chilean banks According to recent reports, an actor known as Neo_Net has been conducting an eCrime campaign since 2021 in which they targets clients of Spanish and Chileans banks. They have also been observed spreading to other banks around the world. Neo_Net employs various tactics, including smishing through Ankarex (a Smishing-as-a-Service platform), the creation of deceptive websites, and the distribution of malicious mobile applications, all of which are utilized to carry out their financial phishing endeavors. Symantec protects you from this threat, identified by the following: Behavior-based AdLibrary:Generisk AppRisk:Generisk
Cyberespionage group Gelsemium targeted gamers via NoxPlayer Android emulator Activity attributed to Gelsemium dates back to 2014 when the group first surfaced while researchers were investigating a targeted cyber-espionage campaign (dubbed Operation TooHash) powered by spear-phishing. The group is mostly known for targeting electronics manufacturers, religious organizations, governments, and universities from East Asia and the Middle East. Gelsemium uses a highly configurable, multi-stage approach with their own dropper, loader and main malware module. It can be modified to the environment on-the-fly, and counts amongst its tactics the use of Dynamic DNS domain names for their C2 servers to avoid the red flag of lists of newly created domains. Researchers believe Gelsemium is the APT group that, between September 2020 and January 2021, coordinated the supply-chain attack that compromised and abused the updating of the NoxPlayer Android emulator for Windows and macOS to infect gamer's systems. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.MBT Trojan.Gen.2 WS.Malware.1
Cyberespionage: ShellClient RAT An APT group known as MalKamak, active since at least 2018, has recently targeted organizations in the aerospace and telecommunications sectors in a cyberespionage campaign dubbed "Operation GhostShell". It has mainly been observed in the Middle East but also appears to seek victims in the US, Russia and Europe according to reports. A custom remote access trojan, ShellClient, has been used in these attacks. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.C Trojan.Gen.MBT
CyberGate RAT masquerading as Dork tool Recently, an actor has been targeting security researchers, penetration testers, and cybercriminals alike by disguising a remote access trojan as a URL to the Dork converter tool. The remote access trojan is CyberGate, which has been active for multiple years now. In the realm of cybersecurity, "Dorks" are special search queries used by cybersecurity experts and hackers to find vulnerable websites, sensitive information, and malware online. They help discover security weaknesses, exposed data such as passwords or financial information, and locations of malware. Cybersecurity researchers use them for research, testing, and staying ahead of threats. However, they can also be misused by hackers for illegal activities. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Ps-RgPst!g1 Behavior-based SONAR.Dropper File-based W32.Spyrat Machine Learning-based Heur.AdvML.B!100
CyberLink installer compromised in supply chain attack A sophisticated covert way to distribute malware is through compromising a legitimate software from the source. In this way, an unsuspecting victim will update their legitimate software from their legitimate source. Unbeknownst to the vicitm the software will behave on the surface while giving a malicious actor access to the system, or perform any other nefarious actions. This is what is called a supply chain attack. Recent research has found that this is what happened to a version of CyberLink installer which was modified by a threat actor called Diamond Sleet (aka Lazarus, Appleworm, ZINC). Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT Web.Reputation.1 WS.Malware.1 Machine Learning-based Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Cylance ransomware targets both Windows and Linux Cylance is a newly discovered ransomware variant that targets both Windows and Linux-based systems. The Windows variant of the malware creates a mutex named "CylanceMutex" to ensure only one instance of the payload is run on the infected machine and will append .Cylance extensions to the encrypted files. Following successful encryption, the malware drops the ransom note in the form of a “CYLANCE_README.txt" text file. Cylance ransomware has functionalities to establish persistence and to delete volume shadow copies on the compromised endpoint. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.Ransom!gen98 SONAR.Ransomware!g3 SONAR.Ransomware!g7 SONAR.Ransomware!g12 SONAR.Ransomware!g28 File-based Ransom.Gen Ransom.Generic.1 Trojan Horse Machine Learning-based Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Network-based System Infected: Bad Reputation Process Request 4 System Infected: Trojan.Backdoor Activity 634 Web-based Observed domains/IPs are covered under security categories
Cypress Stealer Cypress Stealer is a recent run-of-the-mill infostealer that's being sold on underground forums - at the time of this writing it's priced at US$100. Symantec has observed recent command and control activity here and there, although it's currently far from being as prevalent as its more infamous infostealing cousins such as Lokibot, AzorUlt, Formbook and Agent Tesla. This latest one is mostly being distributed via drive-by-download and social engineering. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.B Heur.AdvML.C Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 WS.Malware.2 Behavior-based SONAR.AM.PS!g1 SONAR.Powershell!gen4 SONAR.SuspLaunch!g12 SONAR.TCP!gen1
Cyrat Ransomware in Town The cybercrime scene is already flooded with different variants of ransomware, but those ransomware subspecies tend to have something in common such as a sinister theme, similar ransom message or the same encryption method. A recently emerged ransomware dubbed Cyrat however, named for its use of .CYRAT as an encrypted file extension, reportedly uses the relatively uncommon encryption method Fernet to encrypt files on the infected host. Cyrat ransomware is reportedly delivered via a fake application that claims to fix corrupted DLLs on the infected system. Symantec protection Trojan.Gen.MBT
D0nut Ransomware Donut is yet another ransomware actor that has been observed in the already crowded Ransomware threatscape. It employs double-extortion tactics and leverages a ransomware known as D0nut. Post encryption, files are appended with a .D0nut extension. The ransom note contains a picture of a donut written using Ascii, along with guidance on how to contact the authors using Tox chat. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.Ransomware!g1 SONAR.Ransomware!g12 File-based Downloader Machine Learning-based Heur.AdvML.B
DAAM Android botnet comes with a ransomware module DAAM Android malware has been reported as being spread via a trojanized version of the Psiphon application. The malware has various capabilities including keylogging, call recording, clipboard data and screenshot capture, collection of browser history, ex-filtration of files, call logs, SMS messages, etc. DAAM also contains a ransomware module that uses AES algorithm for file encryption on the infected mobile device. Symantec protects you from this threat, identified by the following: Mobile-based Android.Reputation.1 Android.Reputation.2 Web-based Observed domains/IPs are covered under security categories
Dagon Locker ransomware Dagon Locker is a ransomware variant with strong code similarities to the MountLocker and Quantum ransomware strains. The malware is offered for sale in the form of Ransomware-as-a-Service. Dagon is able to terminate system processes and services before proceeding with the file encryption. Following the encryption process the malware will append ".dagoned" extension to the encrypted files. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.Ransomware!g3 SONAR.Ransomware!g7 File-based Ransom.Quantum Trojan.Gen.2 WS.Malware.1 Machine Learning-based Heur.AdvML.A Heur.AdvML.B
Danabot resurfaces in a new malicious campaign Symantec Security Response is aware of the newest campaign of the Danabot infostealer. Danabot was first discovered back in 2018. Several variants of this malware were observed in the wild up to the middle of last year, but it remained mostly dormant in the second half of the year. According to the latest reports, Danabot has resurfaced now and is being distributed via websites offering cracked software and games. Symantec has the following coverage in place against latest Danabot samples: File-based Trojan.Danabot Trojan.Danabot!gen1 Trojan.Danabot!gen2 Trojan.Gen.2 Trojan.Gen.MBT
DangerousPassword / SnatchCrypto operation continues to target macOS and Linux users DangerousPassword (aka SnatchCrypto or CryptoMimic) is a long-running financially motivated campaign aimed at cryptocurrency theft. The threat actors have been known to use various infection vectors in their attacks. The recently observed attacks have been targeting developers of cryptocurrency exchange businesses on various platforms including Windows, macOS and Linux. The attack chain was initiated through a builder.py module written in Python and the attackers have been also leveraging Node.js malware in this recent run. Symantec protects you from this threat, identified by the following: File-based Backdoor.Trojan Trojan Horse OSX.Trojan.Gen Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
DangerousPassword / SnatchCrypto operation now also targets macOS DangerousPassword (aka SnatchCrypto or CryptoCore) is a long-running operation attributed to the BlueNoroff threat group (also associated with Lazarus APT). The campaign is financially motivated and aimed at cryptocurrency theft. The threat actors have been known to use various infection vectors in their attacks, leveraging Windows shortcut files, MS Office documents, .chm files or OneNote files, among others. The recently observed attacks also target the macOS platform and use malicious .pdf files alongside a malicious PDF viewer app. The final payload in this distribution is a Rust-based malware dubbed RustBucket that once executed will assist the attackers with the intended compromise of the targeted systems. Symantec protects you from this threat, identified by the following: File-based CL.Downloader!gen195 OSX.Trojan.Gen Trojan Horse Trojan.Gen.2 Trojan.Gen.NPE Trojan.Pidief WS.Malware.1 Machine Learning-based Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories
Dangerous RAT uptick linked to leaks Perhaps not at the top of the proverbial Rat pack, Dangerous RAT still gained some prevalence in recent weeks. One possible explanation of this activity increase would be that Dangerous RAT version 5 was recently leaked onto multiple hacking and underground forums, telegram and websites. This threat comes with the run-of-the-mill RAT and stealer capabilities but also has a Ransomware component. Symantec has the following coverage in place: File-based Heur.AdvML.B Heur.AdvML.C Trojan.Gen.MBT Trojan.Gen.2 Trojan.Horse WS.Malware.1 WS.Malware.2
DangerousSavanna campaign targeting financial organizations A malicious campaign dubbed DangerousSavanna has been reported to target financial organizations in Central and Western Africa for the last two years. The threat actors behind the campaign have been leveraging a variety of custom or open-source tools including Metasploit framework, PoshC2 implants, DWservice remote access tool, and AsyncRAT malware. The infection chain is usually initiated with the help of malicious spear-phishing emails sent to the targeted organizations. The emails would contain malicious attachments in the form of loaders disguised as PDF documents or other variety of file types. Symantec protects you from this threat, identified by the following: File-based CL.Downloader!gen1 CL.Downloader!gen9 CL.Downloader!gen20 CL.Downloader!gen24 CL.Downloader!gen69 ISB.Downloader!gen63 ISB.Downloader!gen252 ISB.Heuristic!gen5 ISB.Heuristic!gen10 ISB.Houdini!gen7 Meterpreter!gm1 Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT W97M.Downloader Machine Learning-based Heur.AdvML.C Web-based Observed IPs/domains are covered under security categories
DarkBit ransomware DarkBit is a new Golang-based targeted ransomware variant used in recent in the wild attacks. The ransomware employs multi-threaded encryption process, contains file/folder exclusion list, appends .darkbit extension to the encrypted files and drops a ransom note "RECOVERY_DARKBIT.txt. Darkbit includes the functionality to delete the volume shadow copies on the infected endpoints. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.SuspLaunch!g18 SONAR.SuspLaunch!g253 SONAR.SuspLaunch!gen4 SONAR.TCP!gen1 File-based Ransom.Darkbit WS.Malware.1 Machine Learning-based Heur.AdvML.A
DarkCloud Stealer DarkCloud is an infostealer variant actively distributed in the wild. The malware is spread mostly through spam emails disguised as order invoices. The emails deliver a .zip archive containing the binary of the DarkCloud loader which leads to an infection. Darkcloud Stealer has many functionalities and can act as a keylogger, screenshot grabber or cryptoswapper. It collects MS office, pdf and text document files as well as various confidential information stored in web browsers including credit card details, credentials, cookies and many others. The malware will extract the collected data via different channels such as Telegram, SMTP and FTP, among others. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 Email-based Coverage is in place for Symantec’s email security products File-based MSIL.Packed.31 Packed.Generic.681 Packed.Generic.683 Packed.NSISPacker!g14 Scr.Malcode!gdn14 Scr.Malcode!gdn30 Scr.Malcode!gdn32 Scr.Malcode!gdn34 Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.B!200 Heur.AdvML.C
Dark Crystal RAT malware Dark Crystal RAT (DCRat) is an information stealer. This malware is highly versatile due to its modular architecture as it allows for customization for specific objective type attacks. This modularity also enables for constant code mutations to persist in attempts to bypass detection. Once a victims machine is infected DCRat gathers information such as screen captures, webcam/microphone data, .NET data, and stream/telegram data etc. to exfiltrate. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Untrst-RunSys!g1 Behavior-based AGR.Terminate!g2 SONAR.SuspLoad!gen2 File-based Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B!100 Heur.AdvML.B!200 Heur.AdvML.B Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
DarkGate (aka MehCrypter) DarkGate (aka MehCrypter) was first discovered back in 2018, at the time spread via torrent files. Now out with a new version, this time using malicious ads and SEO poisoning as the distribution vector. Infection routine and capabilities are the same as before, the malware being both a 'crypter' and a 'stealer', the latter capabilities including keylogging, clipboard contents and cryptocurrency wallets, among others. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.MBT WS.Malware.2 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
DarkIRC attacks on Oracle WebLogic servers via patched vulnerability We have become aware of the latest attacks against Oracle WebLogic servers through the CVE-2020-14882 vulnerability. This flaw has been already patched by Oracle earlier in November, but if exploited it allows for remote code execution. The latest reports call out several different payloads in the most recent campaigns that exploit this vulnerability - one of them being DarkIRC bot. The bot is able to execute a variety of functions including stealing browser data, keylogging, downloading arbitrary files and performing DDoS attacks among others. Symantec has the following protection in place for this campaign: File-based Heur.AdvML.B IRC.Backdoor.Trojan Trojan Horse WS.Malware.1 WS.Malware.2 Network-based [32674] Web Attack: Oracle Weblogic Server RCE CVE-2020-14882
Darkrace Ransomware Darkrace is a new ransomware variant exhibiting certain similarities to the Lockbit malware strain and possibly based on the leaked Lockbit 3.0 source code. Darkrace encrypts user files and appends random extensions to them. The malware has the capability to delete shadow copies from the targeted machine and to perform a clean-up of all malicious executables once the encryption is complete. The ransom note dropped on the machine contains instructions for the victims to contact the attackers via email as well as a link to the leak website operated by the threat actors. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.Ransom!gen109 SONAR.SuspLaunch!g18 SONAR.SuspLaunch!g189 SONAR.SuspLaunch!g193 File-based Downloader Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.B
DarkRadiation - Bash Ransomware targets Linux distributions A new ransomware discovered in the wild, named as DarkRadiation has been reported to target Linux distributions and Docker containers. The ransomware's implementation relies on a number of obfuscated bash scripts, C2s and a variety of hacking tools to support lateral movement within the infected network. DarkRadiation might target files with specific extensions and will contact the attackers C&C servers via Telegram API once the encryption process is completed. Symantec protects you from this threat, identified by the following: File-based Hacktool OSX.Trojan.Gen Trojan.Gen.NPE Trojan.Horse WS.Malware.1 WS.Malware.2 Web-based Observed IPs/Domains are covered under security categories
DarkSide - another targeted ransomware emerges There have been reports of a new ransomware gang called DarkSide. The gang emerged around August 10, and its members claim to be former affiliates of various other ransomware gangs. Like many other targeted ransomware operators recently, the gang also attempts to steal data from infected systems before encrypting them, and then threatens to publish this data online if the ransom isn’t paid. According to known reports, the ransom demands might range from $200,000 up to $2 million. Some of the Darkside ransomware characteristics are as follows: Adds a random extension to encrypted files Creates a dynamic mutex name Executes a PowerShell command to delete Shadow Volume copies Avoids terminating remote viewer processes like "TeamViewer" Avoids terminating Virtual Machine Management Services like "vmms.exe" and "vmcompute.exe" According to other vendors there are certain similarities seen in the ransom note, the encryption method used, and the countries DarkSide avoids infecting, that suggest certain links might exist between this new gang and the group behind the REvil/Sodinokibi ransomware. Symantec Protections: Ransom.Cryptolocker Ransom.Gen!gm Trojan Horse IPS [32436] Attack: Ransom.Gen Activity 29
Darkside and Defray ransomware used to target ESXi Servers According to a newly released report, Darkside and Defray ransomware variants have been used to target ESXi Servers in the latest malicious campaigns. Those activities have been attributed to two APT groups known as Sprite Spider and Carbon Spider. By going directly after ESXi servers the attackers hope to increase the scope of affected systems and thus to pressure victims into paying the requested ransom. While we continue to monitor and enhance our protections against this ransomware family, we recommend regular backup procedures of any important files and applying the latest product definitions to protect against ransomware threats. Symantec's protections against Darkside and Defray ransomware variants include: File-based: Downloader Heur.AdvML.B Ransom.Cryptolocker Ransom.Defray Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE Trojan Horse
DarkSide RaaS service affiliate UNC2465 recently seen using a software supply chain attack UNC2465, a known affiliate of DarkSide's RaaS service, has been found targeting closed-circuit television software. In this supply chain attack UNC2465 used the SmokedHam backdoor to perform lateral movements, deploy a keylogger, Cobalt Strike beacon, and gather user credentials. Symantec protects you from these threats, identified by the following: File-based Backdoor.Rozena Backdoor.Trojan Downloader Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed IPs/Domains are covered under security categories Email-based Observed domains are covered under security categories.
DarkSide Ransomware, Linux variant Now infamous, it must be noted that DarkSide Ransomware gang not only target Windows but also Linux platforms. In fact, in recent reported activities their Linux variant has been observed targeting ESXI servers. Symantec protects you from this threat, identified by the following: File-based Linux.Darkside Trojan.Gen.NPE WS.Malware.1 Web-based Observed domains are covered under security categories.
Darkside Ransomware returns as BlackMatter We have been aware about the reports on a new emerging ransomware dubbed as BlackMatter. Several online sources indicate that BlackMatter might be a rebranded version of the infamous DarkSide ransomware as it leverages the same unique encryption methods known from Darkside. While most of the BlackMatter samples discovered in the wild are aimed at Windows victims, there have already been reports of a Linux encryptor variant that specifically targets VMWare ESXi servers. Symantec protects you from this threat, identified by the following: File-based Downloader Heur.AdvML.B Trojan Horse WS.Malware.1 Network-based System Infected: Ransom.Gen Activity 40
DarkTortilla malware distributed via phishing websites DarkTortilla malware has been recently distributed via phishing pages masqueraded as Grammarly and Cisco websites. Previously DarkTortilla used to be spread prevalently by spam emails with malicious attachments. In this new campaign, the malware droppers hosted on the phishing pages are disguised as software installers. Upon execution the installers will display a fake message to the users informing that the application failed to run due to missing dependencies. DarkTortilla payload has the functionality to create persistence on the infected host, contact the C2 servers for more commands as well as download additional payloads. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.SuspBeh!gen45 File-based Trojan Horse Trojan.Gen.2 WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.B Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories
DarkTortilla malware used in campaigns delivering various RATs DarkTortilla is a .NET-based crypter leveraged in various campaigns since 2015. It has been used to deliver a variety of malware payloads such as: AgentTesla, AsyncRAT, NanoCore or Redline Stealer. The malware is delivered mostly through malspam campaigns with emails containing archives of various file formats including .iso, .zip, .img, etc. DarkTortilla consists of two separate components required to run the final payloads - a .NET-based loader executable and a DLL core processor module. DarkTortilla has functionalities to ensure persistence on the targeted machines, to perform anti-sandbox and anti-VM checks, and to deliver and execute addon payload packages. Symantec protects you from this threat, identified by the following: File-based Packed.Generic.619 Trojan Horse Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B
Dark Utilities C2aaS platform leveraged in recent campaigns Various threat groups have been reported to leverage a newly released C2aaS (C2-as-a-service) platform named Dark Utilities. The platform provides command and control center (C2) infrastructure as a service to the cybercriminals. It also hosts malicious payloads within the Interplanetary File System (IPFS) - which is a peer-to-peer network system for storing data. Some of the recent malware distribution campaigns in the wild have been observed to use Dark Utilities for C2 communications - few of those focused on remote access, DDoS and cryptomining. Symantec protects you from this threat, identified by the following: File-based Backdoor.Trojan Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.1 Machine Learning-based Heur.AdvML.C Web-based Observed IPs/domains are covered under security categories
DarkWatchman Java-based RAT A Java-based remote access trojan known as DarkWatchman has been observed in the threat landscape. According to recent reports, actors behind this malware have been using malicious email as the initial vector of infection. DarkWatchman is a run-of-mill remote access trojan but has fileless capabilities as it leverages the registry in an attempt to reduce the chance of being detected. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.DI!gen1 Email-based Coverage is in place for Symantec’s email security products File-based Trojan.Gen.2 Trojan.Gen.NPE Trojan Horse WS.Malware.1 WS.Malware.2 Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains are covered under security categories
Darkworld Ransomware Reports have emerged about a new variant of ransomware dubbed as Darkworld. This ransomware uses Rijndael algorithm to encrypt user's file and appends .dark extension to them. As far as distribution goes, Darkworld has been observed to be disguised as third-party software and available for download on some suspicious third-party sites. While we continue to monitor and enhance our protections against this ransomware family, we recommend regular backup procedures of any important files and applying the latest product definitions to protect against ransomware threats. Symantec protections against the Darkworld ransomware family include: File-based Trojan.Gen.MBT Trojan.Horse
DBatLoader funnels Formbook in Western and Eastern Europe Symantec has observed a DBatLoader (also known as ModiLoader) targeting organizations in Western and Eastern Europe, with actors impersonating multiple companies. These range from a Croatian business that sells and rents tents, marquees, and other event equipment, to a non-profit association of research-based pharmaceutical manufacturers in Bulgaria, and a Turkish company that produces and sells concrete products. The malicious emails contain a zip archive with the DBatLoader binary attached (example: Kopija bankovne uplate.exe). If a user is successfully tricked into executing it, this action could lead to the activation of Formbook. The social engineering tactics employed by the actors are drawn from a classic playbook, utilizing a "payment" lure. Email subjects: otvrda uplate Վճարում ödeme onaylama Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products Behavior-based ACM.Ps-RgPst!g1 SONAR.Stealer!gen2 File-based Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B!100 Network-based Audit: Bad Reputation Application Activity System Infected: Trojan.Formbook Activity 5 System Infected: Trojan.Formbook Activity 2 Web Attack: Webpulse Bad Reputation Domain Request
DBatLoader Malspam campaigns spreading Remcos RAT infections DBatLoader has recently been leveraged for distribution of Remcos RAT malware variants. DBatLoader (aka ModiLoader) has been seen in the past delivering a variety of malicious payloads such as Remcos, Formbook or Warzone RAT. In this latest observed campaign, victims were lured by a purchase order malspam email with an iso attachment, the iso having an embedded executable file for ModiLoader disguised as an Excel spreadsheet. This ModiLoader exe will then infect the compromised host with Remcos RAT. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.SuspBeh!gen530 SONAR.TCP!gen1 File-based Downloader Trojan Horse Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.B Network-based System Infected: Netweird.B Activity 2 System Infected: RemcosRAT Trojan Activity System Infected: Trojan.Backdoor Activity 634 Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories
DBatLoader staging Formbook and Remcos RAT infections DBatLoader has been recently leveraged for distribution of Formbook and Remcos RAT malware variants. DBatLoader (aka ModiLoader) is a Delphi-based loader seen in the past delivering a variety of malicious payloads such as Remcos, Netwire or Warzone RAT. DBatLoader is known to leverage steganography during the initial attack stages and to download malware payloads from miscellaneous public cloud repositories. In this latest observed campaign, Formbook and Remcos payloads were spread through WordPress sites with authorized SSL certificates. The attackers also made use of various file formats (such as .pdf, .html, .zip or .one) to deliver the payloads. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based Downloader ISB.MalOneNote!gen1 Scr.MalPbs!gen1 Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE Trojan.Gen.NPE.C WS.Malware.1 Machine Learning-based Heur.AdvML.B Network-based System Infected: Trojan.Backdoor Activity 634 Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories
DCRAT campaign: Turkish organizations targeted DCRAT (also known as Dark Crystal RAT) has been around since at least 2019 and has experienced prevalence spikes here and there over the past few years. In today's threat landscape, it's less prevalent, but intermittent activity continues to be observed. In a recent example, Symantec blocked a campaign that has been targeting Turkish organizations. The actors employed malspam (subject: Hesap bildirimi) containing a malicious XLA file (Hesap bildirimi.xla) which would fetch the DCRAT payload (server1.exe) from a domain. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products File-based ISB.Downloader!gen60 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
DcRAT poses as feisty OnlyFans content OnlyFans popularity continues to increase, attracting the attention of various groups and individuals who are constantly on the lookout for trends to exploit using social engineering tactics. According to reports, an actor has been attempting to lure victims with free OnlyFans content featuring a famous adult actress using drive-by-download as an infection vector. Hoping to satisfy their curiosity, victims will actually end up infecting themselves with a remote access trojan known as DcRAT if they execute the malicious VBS script within the downloaded archive. This threat is currently being spread across the globe, via both malspam and drive-by-download campaigns. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.SuspLaunch!g284 File-based Scr.Malcode!gdn14 Trojan Horse Machine Learning-based Heur.AdvML.B
DCrat still a popular Remote Access Trojan DCrat (also known as DarkCrystal RAT) has been around since at least 2019 and is still commonly used by cybercriminals. DCrat's authors continue to update and improve their malware by regularly adding additional features. Recent activity indicates that it's mostly being distributed via malicious emails and drive-by-downloads. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.B Heur.AdvML.C Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 WS.Malware.2 Behavior-based SONAR.SuspBeh!gen25 SONAR.SuspDrop!gen1 SONAR.SuspLaunch!g13 SONAR.SuspLaunch!g22 SONAR.SuspLaunch!g52 Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
DDOSIA malware leveraged for DDoS attacks DDOSIA is a botnet malware leveraged by a threat group known as NoName057(16) in a series of Distributed Denial-of-Service (DDoS) attacks in the past few months. DDOSIA is being developed in various versions supporting Windows, Linux and macOS platforms. The threat group NoName057(16) has been known to target banks, educational and governmental sectors, among others. Several past attacks executed by this threat actor have been directed at Ukraine or countries and organizations supporting Ukraine. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based DDoS.Trojan Trojan Horse WS.Malware.2 Machine Learning-based Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories
DDoSia toolkit continues to be leveraged by attack groups DDosia is a DDoS botnet variant attributed to the threat group known as NoName057(16). This threat actor has been mainly conducting attacks against European organizations and entities supporting Ukraine. While DDosia already supports various architectures and operating systems, at the end of last year a new variant emerged with added support for FreeBSD OS. DDosia toolkit continues to be leveraged in ongoing campaigns observed in the wild since the beginning of this year. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based Hacktool Linux.Mirai OSX.Trojan.Gen OSX.Trojan.Gen.2 Trojan Horse Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.A!400 Heur.AdvML.A!500 Heur.AdvML.B!100 Heur.AdvML.B!200 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Ddostf DDoS malware targets MySQL servers Ddostf malware is another DDoS botnet variant targeting vulnerable MySQL servers. While it is relatively old, as it was initially discovered back in 2016, it is still being used in malicious campaigns to this day. The malware scans for open port 3306/TCP used by MySQL servers and employs brute force or dictionary attacks against the vulnerable systems. Upon infection Ddostf contacts the predefined C2 servers, uploads basic information about the infected system to the attackers and finally receives commands for DDoS attacks execution or download of additional arbitrary payloads. Symantec protects you from this threat, identified by the following: File-based Downloader SMG.Heur!gen WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
DeadRinger campaign targeting Southeast Asia telecommunications industry According to a recently released report, a coordinated operation targeting the telecommunications industry in Southeast Asia has been ongoing since at least 2017. Dubbed DeadRinger, the operation comprised of activities from three different APT groups facilitating espionage efforts against selected targets. The threat actors have been exploiting known vulnerabilities in MS Exchange Servers as well as leveraging various tools and backdoor malware to compromise the targets and collect data from the infected systems. Symantec protects you from this threat, identified by the following: File-based Backdoor.Trojan Hacktool.Mimikatz Heur.AdvML.B Heur.AdvML.C Trojan Horse Trojan.Gen Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories
DEARCRY Ransomware deployed via ProxyLogon A few days after the disclosure of multiple Microsoft Exchange vulnerabilities (also known as ProxyLogon) being used in targeted attacks, there are now reports of a Ransomware by the name of DEARCRY targeting those vulnerable Exchange servers. Actors behind this Ransomware use ProxyLogon to gain access to the Exchange servers and then deploy their Ransomware. Encrypted file will have a .CRYPT extension. Symantec has a range of coverage in place for ProxyLogon (read more about this here) and the following for DEARCRY: File-based Ransom.Dearcry Downloader Heur.AdvML.C WS.Malware.1
Decoy Dog malware toolkit Decoy Dog is a newly discovered malware toolkit used by the threat actors for the purpose of detection evasion. The attackers behind Decoy Dog have been reported to use methods such as domain aging or DNS query dribbling in order to establish good domain reputation before proceeding with the malicious operations. The infrastructure related to Decoy Dog has shown links to the usage of a Remote Access Trojan known as Pupy RAT. Pupy is a open-source post-exploitation tool allowing the attackers remote control, command execution and theft of credentials, among others. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.NPE WS.Malware.1 Web-based Observed domains/IPs are covered under security categories
Decoy Dog malware toolkit still active in the wild Decoy Dog is a malware toolkit discovered earlier this year and used by the threat actors for the purpose of detection evasion. The malware leverages the domain name system (DNS) for communication with the Command & Control (C&C) servers. Decoy Dog is based on Pupy RAT, which is an open-source Remote Access Trojan that allows the attackers to have remote control, command execution and theft of credentials, among others. The latest variants of Decoy Dog malware come with various improvements in implemented communication protocols, a new domain generation algorithm (DGA), and more. Symantec protects you from this threat, identified by the following: File-based Linux.Mirai Trojan Horse Trojan.Gen.NPE WS.Malware.1 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
DeftTorero threat group DeftTorero group (also known as Lebanese Cedar or Volatile Cedar) is a threat actor believed to originate from the Middle East and active on the threat landscape since at least 2015. DeftTorero APT is known to leverage fileless techniques as well as commonly available offensive tools in their attacks. Explosive RAT is one of the payloads distributed in various DeftTorero campaigns, and threat actors have also been using Caterpillar and ASPXSpy webshells in the initial stages of the attacks. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 SONAR.TCP!gen6 File-based Backdoor.Trojan Hacktool Hacktool.Ace HackTool.LaZagne!gen1 Hacktool.Mimikatz Infostealer!im ISB.Downloader!gen210 ISB.Heuristic!gen23 ISB.Heuristic!gen27 NetCat SecurityRisk.LaZagne Trojan Horse Trojan.Gen.MBT Trojan.Gen.NPE Machine Learning-based Heur.AdvML.B Heur.AdvML.B!100
Deja Vu all over again Symantec Security Response recently came across a new variant of Djvu ransomware which adds a file extension ".cadq" to the files it encrypts. Some refer to this ransomware family as "Stop". Symantec detects this new variant of Djvu ransomware as the following: File-based Downloader Network-based System Infected: Trojan.Ransomware Activity 56
Delta Plus variant of the Babuk Ransomware Following the earlier source-code leak of the Babuk Ransomware back in September, recent reports indicate that a new Delta Plus version of this malware has being seen on the threat landscape now. This recent variant of the Babuk ransomware will encrypt the user files and append '.delta' extension to them, instead of the previously used '.babyk' one. Symantec protects you from this threat, identified by the following: File-based Ransom.Babuk Trojan Horse Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B Heur.AdvML.C Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains are covered under security categories
Demand for streaming credentials lead to more phishing and smishing Streaming services boast millions of users globally, making them lucrative targets for cybercriminals. A large user base provides attackers with a broad pool of potential victims, increasing the chances of successful phishing attempts. In addition stolen streaming service credentials are valuable on the black market. Cybercriminals can use these credentials for various purposes, including unauthorized access to premium content, resale on underground forums (at a cheaper price than the official monthly cost), or even exploiting stored information linked to user accounts. These phishing attacks mostly conducted via email but the increasing use of SMS (Short Message Service) for phishing attacks, commonly known as "smishing," can be attributed to several factors that make this method appealing to cybercriminals: widespread use of mobile devices, and SMS having higher open rates than email, generally being perceived as more urgent. Symantec has recently observed smishing actors attempting to lure mobile users with fictitious account issues related to a missed payment with the intention of stealing their credentials. If individuals are successfully fooled by this social engineering trick and follow the provided URL, they will be directed to a fake login page that mimicks the targeted streaming platform. In one instance, an actor has also included a CAPTCHA on his malicious website, designed to provide a false sense of legitimacy. Observed SMS: [Streaming service name]: Your last payment could not be processed. Missed payment may lead to discontinuation of our services. See here: [malicious url] [Streaming service name] Account on hold. Please confirm your details to avoid cancellation: [malicious url] [Streaming service name] : Votre dernier préIèvement a été refusé. Vos services prendront fin automatiquement le 03/02/2024 : [malicious url] [Streaming service name]: votre compte sera suspendu d'ici 24H, veuiIIez confirmer vos informations afin de profiter de nos services: [malicious url] [Streaming service name] Payment method on hold. Please update your billing information to avoid account cancellation: [malicious url] Symantec protects you from this threat, identified by the following: Mobile-based Symantec Endpoint Protection Mobile is able to analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake domains used in this campaign are known to WebPulse. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Denmark, another Nordea phishing campaign making the rounds Large financial institutions are continuously spoofed and used in social engineering campaigns to lure victims into visiting phishing websites or executing malicious binaries. Symantec observes campaigns abusing these organizations on a daily basis around the world. In a recent example, consumers and enterprises in Denmark have been targeted by yet another Nordea phishing campaign. Nordea is one of the largest banks in the Nordic region, operating in Denmark, Sweden, Finland, and Norway. Emails with the following subjects redirect to fake Nordea login websites: Din Nordea-ID er tilbagekaldt e-ticket ref [random ID] Opdater dine personlige oplysninger Du har et nyt online dokument Meddelelse online, handling påkrævet Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products Web-based Observed domains are covered under security categories
DevOpt backdoor DevOpt is a newly discovered persistent backdoor that exhibits additional keylogging and infostealing capabilities. According to a recent report, the malware is still under development with many updates and improvements being added in the most recent variant. The infostealing module aims to steal credentials, banking and credit card details and other confidential data. An additional grabber module can extract sensitive files including Word, Excel and RTF documents. Once collected, the confidential data is uploaded to C&C servers controlled by the threat actors. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based Trojan Horse Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories
Dharma (aka Crysis) ransomware activity continues Dharma is a ransomware strain from the Crysis malware family discovered initially back in 2016. While the malware is relatively old, to this day new variants of it emerge in the wild. The known infection vector is usually malspam or exploitation of exposed RDP servers. The malware encrypts user files and depending on the deployed variant appends various extensions to them. Some examples of extensions used by most recently discovered variants of this ransomware include: .shiel, .avan, .AeR, .data, .intel, .tutu. Symantec protects you from this threat, identified by the following: Behavior-based ACM.Ps-RgPst!g1 ACM.Vss-DlShcp!g1 SONAR.RansomCrys!g1 SONAR.RansomCrys!g2 File-based Ransom.Crysis Ransom.Crysis!gm SMG.Heur!gen WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Network-based Attack: Ransom.Crysis Activity 3
Dharma / Crysis ransomware latest variants Dharma also known as Crysis is a ransomware family present on the threat landscape for the last few years. Less prevalent than it used to be, it is still re-emerging regularly with new variants in the wild. Crysis is known to be delivered either via malspam containing malicious attachments or through direct exploitation of exposed RDP servers. While this ransomware is mostly known to be operated as a Ransomware-as-a-Service (RaaS) model, the Crysis source code leak back in 2020 led to the emergence of a multitude of variants and forks of the original malware over the years. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.RansomCrys!g1 SONAR.RansomCrys!g2 SONAR.SuspDataRun File-based Ransom.Crysis Ransom.Crysis!gm SMG.Heur!gen WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Network-based Attack: Ransom.Crysis Activity 3
DHC ransomware Multiple versions of the DHC ransomware have been observed in circulation. Upon successfully compromising and encrypting files, a ransom note named READ_IT.txt is dropped onto the victim's machine, instructing to pay $42 USD in Bitcoin for decryption software. The ransom note includes contact details such as an email address and reference to a Discord server. Notably, the malware can halt various system processes and services and delete volume shadow copies. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.SuspDrop!gen1 File-based Ransom.HiddenTear!g1 Ransom.Sorry WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.A!300 Heur.AdvML.B!100 Heur.AdvML.B!200 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
DHL smishing leads to Android malware SMS phishing (aka Smishing) is a technique that's still widely used by threat actors to lure mobile victims onto phishing websites in order to steal their credentials, but also onto websites hosting malicious android applications. In recent weeks, researchers have observed a campaign targeting Spanish users. The actors behind that campaign have generated a multitude of fake DHL domains (a technique known as Typo-squatting) and sent out SMS messages that include a link to download a malicious Android application. Indicators of compromise: SMS: Su paquete esta llegando, rastreado aquí: [Malicious URL] URL format: hxxps://dhl-[removed][.][removed]/index/DHL[.]apk Symantec has the following coverage in place: Mobile-based AppRisk:Generisk Android.Reputation.2 Symantec Endpoint Protection Mobile is able to also analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake DHL domains used in this campaign are known to WebPulse.
DiamondFox stubbornly endures Some infostealers may not have the same prevalence as others like Predatorthief, Agent Tesla, Azorult, Lokibot, etc., but they still manage to stick around for years. Two reasons that may explain why they are able to outlast some of their peers - they are dirt cheap, or even better, come at no cost having been leaked and cracked repeatedly. After all, who doesn't like free stuff? DiamondFox is one such threat. It's been around since at least 2016 and we are still seeing C2s and new variants popping up from time to time. This malware is used by quite a variety of groups and individual as it is readily available (having been leaked and cracked). Over the years it's been distributed using Exploit kits, spam campaigns and drive-by-downloads. It may not be prevalent but it's still very much part of the threat landscape and we continue to monitor it closely. Symantec has the following protections in place for this malware: File-based SMG.Heur!gen Packed.Vuntid!gen1 Heur.AdvML.B Heur.AdvML.C WS.Malware.1 WS.Malware.2 WS.SecurityRisk.3 SONAR.SuspDrop!gen1 SONAR.SuspBeh!gen625 SONAR.SuspBeh!gen609 SONAR.SuspLaunch!g22 Network-based System Infected: DiamondFox Activity
Diavol Ransomware: New but shares similarities to Conti Researchers have recently discovered a new ransomware named Diavol along with a payload for Conti when investigating an attack earlier last month. Not only that, but in the research both payloads showed similarities in the parameters used and the use of asynchronous I/O operations for encryption. However, at this point, it is not possible to say with confidence if one is a new variant of the other or if it could be attributed to the same group. Diavol uses bitmap images to store its main routines as way to make analysis harder, without the use of obfuscation through packing or anti-disassembly tricks. The rest of the operations follow the standards typical for ransomware, with only a couple of exceptions. First, the malware does not seem to have data exfiltration capabilities. Second, the wallpaper is changed at the end of the encryption process on the target computer to alert the victim to follow the instructions in the ransom note.. Symantec protects you from this threat, identified by the following: File-based Downloader Heur.AdvML.B Heur.AdvML.C Ransom.Conti Trojan Horse WS.Malware.1
DinodasRAT leveraged by unknown APT to target government entity in Guyana According to a recently published report, an unknown threat actor group was observed targeting a Guyanese governmental entity with a previously unseen backdoor. Identified in the report as Operation Jacana, the backdoor, called DinodasRAT, allows the attackers to perform numerous actions on a compromised machine. Actions include, but are not limited to, file and OS system manipulation, data exfiltration, launching a reverse shell, and others. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen6 File-based Trojan Horse Trojan.Gen.MBT WS.Malware.1 WS.Malware.2 Machine learning-based Heur.AdvML.A!400 Heur.AdvML.A!500 Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
DirtyMoe (aka NuggetPhantom) – Cryptojacking and DDoS DirtyMoe (aka Nuggetphantom) is a modularized malware that is able to perform cryptojacking and Denial of Service attacks. This malware has been around for a few years now and is distributed via Purple Fox exploit kit. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.2 W32.Gosys WS.Malware.1 WS.Malware.2
DiscordRAT's Masquerades: From TikTok Bots, to Video Games and Deepfake Software DiscordRAT is a remote access trojan that has been available to the public for the past two years, posted on a well-known platform for software developers that allows them to host, manage, and collaborate on code. Prevalence-wise, this threat is fairly low but nonetheless active, with sporadic activities that stay within the scope of drive-by-download social engineering and tactics. Consumers have mostly been the target of DiscordRAT actors but it's also been used against enterprise users in some cases. In recent activities, this malware has been disguised as many different tools and software related to trends, ranging from TikTok view bots to Fortnite and Valorant installers, to nude deepfake software, and the list goes on. Without going into much detail, this malware basically lets attackers remotely control and steal information from infected computers. It can display fake messages, execute commands, download and upload files, and even manipulate the user's interface. More alarmingly, it can steal data like passwords and webcam pictures, hide its presence with a rootkit, and even cause system crashes. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B!100 Heur.AdvML.C Network-based Audit: Bad Reputation Application Activity System Infected: Trojan.Backdoor Activity 656 System Infected: Trojan.Backdoor Activity 721
DJVU Malware related to the STOP Ransomware Family is Back with New Variant A new variant of the highly prevalent DJVU malware associated with the STOP ransomware family has been seen in the wild. The malware is downloaded and executes via malicious files disguised as software cracks or keygens. Files on the infected computer are then encrypted and a ransom note displays asking for a payment in Bitcoins. Symantec protects you from these threats, identified by the following: File-based Downloader Heur.AdvML.B Trojan.Gen.2 WS.Malware.1 WS.Malware.2 Behavior-based SONAR.Ransomstop!gen1 SONAR.Ransomstop!gen2 SONAR.Ransomstop!gen4 SONAR.Ransomstop!gen5 SONAR.Ransomstop!gen6 SONAR.Ransomstop!gen7 SONAR.Ransomstop!gen8 SONAR.SuspBeh!gen24 SONAR.SuspBeh!gen306 SONAR.SuspBeh!gen397 SONAR.SuspBeh!gen414 SONAR.SuspBeh!gen434 SONAR.SuspBeh!gen45 SONAR.SuspBeh!gen452 SONAR.SuspBeh!gen483 SONAR.SuspBeh!gen485 SONAR.SuspBeh!gen526 SONAR.SuspBeh!gen530 SONAR.SuspLaunch!g12 SONAR.Trafic2.RGC!g16 Network-based Attack: Ransom.Gen Activity 23 Attack: Ransom.Gen Activity 38 Audit: Ransom.Gen Activity 52 System Infected: Trojan.Ransomware Activity 50 System Infected: Trojan.Ransomware Activity 56 System Infected: Trojan.Ransomware Activity 58
Dodo Ransomware: Modest ransom and Mercurial masquerade Recently, another ransomware called Dodo has been making the rounds. This one differs from other ransomware in that it only demands a modest sum of 15 US dollars in either Bitcoin or XMR. Once files are encrypted, they will have .dodov2 added as extension and a ransom note (dodov2_readit.txt) will be left behind. Dodo ransomware has been detected in several countries, including the Philippines, France, the UK, Belgium, Germany, Sweden, Estonia, and Turkey where it masquerades as a version control system (VCS) called Mercurial that is typically used to manage software development projects. Similar to other VCS, Mercurial enables collaboration among multiple users on a shared codebase, keeps track of code changes, and allows for the restoration of previous versions when necessary. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.SuspDrop!gen1 File-based Ransom.Sorry Machine Learning-based Heur.AdvML.B
Doenerium infostealer A new campaign spreading Doenerium infostealer has been observed in the wild. The malware has been distributed via a website masqueraded as Windows Malicious Software Removal Tool hosting page. Doenerium is an open-source infostealer available on Github. The malware's infostealing functionality targets the browser's data, credentials, clipboard data, crypto wallets and Discord tokens, among others. The malware might also terminate various processes related to virtualization software and malware analysis. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.1 Machine Learning-based Heur.AdvML.B Web-based Observed domains are covered under security categories
DogeRAT Android malware DogeRAT is an Android malware variant known for targeting businesses and enterprises from banking and entertainment sectors, among others. The malware is distributed under the disguise of apps belonging to legitimate and well-known brands such as YouTube, Netflix, ChatGPT and others. Once executed DogeRAT attempts to steal sensitive user information including clipboard data, contacts, messages, credentials and banking data. With the help of this remote trojan the attackers might also take control of the compromised device and perform additional malicious actions. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk Android.Reputation.2 AppRisk:Generisk
Domain Déjà Vu: TA557 reuses Qakbot domains to deliver Pikabot The threat actor identified as TA557 has established a significant presence over the course of several years, gaining notoriety for their persistent malspam campaigns targeting industries and organizations globally. In their current operations, TA557 is deploying three distinct payloads: IcedID, Pikabot, and the recently introduced Darkgate. Darkgate's emergence follows the successful takedown of Qakbot just a few weeks ago. Symantec maintains a close watch on the activities of this threat group (previous protection bulletins). Despite the removal of Qakbot from the threat landscape, there are indications that TA557 continues to leverage previously used domains. This is evidenced by the reutilization of domains to deliver recent payloads, with Pikabot being a prominent example - accounting for 20 out of the 146 domains recently observed. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Domain fronting techniques leveraged in attacks delivering Cobalt Strike A new malicious campaign has been discovered, where the attackers leverage domain fronting techniques to target users in Myanmar. The threat actors have been reported to use staged payloads with Meterpreter stager to deliver the Cobalt Strike. Cobalt Strike remains a powerful and very popular tool among various threat groups and can be used to distribute a wide variety of final payloads including commodity malware and ransomware. Symantec protects you from this threat, identified by the following: File-based Backdoor.Cobalt!gen1 Backdoor.Rozena WS.Malware.1 Machine Learning-based Heur.AdvML.B Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories
Domino backdoor leads to Project Nemesis infostealer payload A new backdoor variant dubbed Domino has been discovered in the wild. The malware has been associated with the FIN7 threat group and has been delivered in recent campaigns leveraging Dave Loader malware. According to a latest report, Domino shows some code overlap with the Lizar toolkit (also known as DiceLoader). The backdoor collects basic information about the infected system, connects to pre-defined C2 servers and is later used to deliver a final stage payload, which in this instance was a .NET-based Project Nemesis infostealer. This infostealing payload has the functionality to collect various data from web browsers, VPN applications, chat apps, or cryptocurrency wallets. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based Scr.Malcode!gdn32 Trojan Horse Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A Heur.AdvML.B Heur.AdvML.C Network-based System Infected: Trojan.Backdoor Activity 634 Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories