text
stringlengths
0
383k
FakeBat malware spread via malvertising A recent malvertising campaign has been spreading FakeBat malware with the help of MSIX installer files. The run was impersonating various well known software brands such as Notion, Trello, Braavos or OneNote to lure the victims into downloading the malicious installers. Some of the malvertisements made use of URL shorteners in order to camouflage the bad domains from potential victims. The MSIX files delivered to users contain obfuscated PowerShell scripts leading to malware infection. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Ps-Rd32!g1 File-based Downloader Trojan.Gen.MBT Trojan.Gen.NPE Web.Reputation.1 WS.Malware.1 Machine Learning-based Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Fake Browser Update Delivering Async RAT A legitimate but compromised website was reported to have been altered and linked with a SocGholish URL that leads to a fake browser update. The SocGolish payload will eventually install AsyncRAT which is a known credential stealer and loader for other malware. Symantec protects you from this threat, identified by the following: File-based JS.Downloader Trojan Horse WS.Malware.1 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Fake Coinbase wallet mobile app harvests credentials Symantec has recently observed an actor targeting Coinbase mobile users with the aim of harvesting their credentials using a malicious Android application (CoinbaseWallet.apk) posing as a Coinbase app. If a victim is successfully lured into downloading and installing the fake Coinbase app on their devices, they'll be prompted to log in, and that's when the app will collect their credentials. The malware is hosted on a domain that mimics Coinbase, with a name resembling the well-known cryptocurrency exchange platform. While unconfirmed, we believe that users are redirected to this domain via malicious SMS. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk Symantec Endpoint Protection Mobile is able to analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake domain used in this campaign are known to WebPulse. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
FakeCop malware targets Android users in Japan A new campaign spreading the FakeCop Android malware masqueraded as a security application has been targeting users in Japan. The malware is an infostealer and collects various information from the compromised devices, including device information, contact lists and SMS messages. Once collected, the data is forwarded to the attackers C&C servers. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Airad AdLibrary:Generisk AdLibrary:Waps Android.Reputation.2 AppRisk:Generisk
Fake Cracked Software Download Leads to Information Stealer With vulnerabilities such as Log4J being in the news almost every other day, malware delivery schemes like social engineering are often swept under the carpet. Social engineering remains one of the most effective ways to deliver malware to unsuspecting users. Recently we have observed information stealing malware being delivered under the guise of "cracked" software downloads. The victim is redirected to a web page (by means such as malvertising) wherein a cracked version of a software is made available for download. The cracked version is actually an information-stealing malware that when executed, steals important system information such as browser cookies, default logins, system screenshots etc and exfiltrates it back to the attackers. Symantec's network protection technology, Intrusion Prevention System (IPS), blocks the infection at the browser webpage level itself, to prevent the further infection/damage to the system. Symantec protects you from this threat, identified by the following: File-based Packed.Generic.497 Trojan Horse Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B Network-based Malicious Site: Malicious Domain Request 68 Malicious Site: Malicious Domain Request 69 Malicious Site: Malicious Domain Request 71 System Infected: Infostealer Activity 16
Fake DDoS prompts on compromised websites lead to NetSupport RAT With new critical vulnerabilities being discovered and hitting the news almost every other day, malware delivery schemes like social engineering are often swept under the carpet. Social engineering remains one of the most effective ways to deliver malware to unsuspecting users. Symantec is aware of reports that fake DDoS prompts displayed on compromised websites are enticing users to download malware disguised as a security tool installer. The attackers inject a small piece of javascript code in the compromised website which displays the fake DDoS prompt. The DDoS prompt tricks the user into believing that a verification code is needed to access the website, which can be obtained by downloading and running a security tool installer. The security tool installer is actually a malware which installs NetSupport RAT that enables backdoor access to the victim's machine. The attacker can use this backdoor access to install additional malware or perform any other malicious activities. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Dropper Trojan.Mallnk NetSupportManager!conf Network-based Symantec's network protection technology, Intrusion Prevention System (IPS), blocks the infection at the browser webpage level itself, to prevent further infection/damage to the system. Malicious Site: Malicious Domain Request 21 Malicious Site: Malicious Domain Request 22 Web Attack: Mass Injection Website 96
Fake expired certificate pages used to lure victims This is a recent tactic, where compromised Windows IIS servers present unsuspected victims a notification page, stating that their certificate has expired and prompting them to download and run a utility to fix the issue. If the user follows the prompt, they will download a malicious executable that will subsequently download TVRAT, a malware with capabilities similar to TeamViewer which will allow the threat actors full remote access to the infected machines. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.2 Trojan.Gen.MBT Trojan Horse
Fake French court convictions aim to snatch Microsoft 365 credentials Malicious PDFs leading to phishing attacks are not new, but have shown no signs of stopping in recent months. Campaigns are observed on a daily basis around the globe, targeting random companies and consumers, some tailored with specific victimology based on regions and/or industry sectors. Symantec has observed one such campaign in France, in which the actors attempt to lure companies with fake court convictions in the form of a PDF file ([company name] Convocation au Tribunal.pdf). Once the malicious PDF is opened, users are prompted with a message stating that the file has been made available to them on OneDrive. The URL redirects to a phishing page that mimics the Microsoft 365 login, aiming to harvest the user's credentials. Utilizing fake court convictions as a social engineering tactic for phishing can be disturbingly effective. By exploiting the sense of urgency and fear associated with legal matters, cybercriminals create a scenario where recipients feel compelled to act swiftly to avoid adverse consequences. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec's email security products Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Fake Google Chrome and Facebook installers lead to FFDroider Earlier this year, light was shed on an infostealer (FFDroider) that primarily targets social media credentials. Over the past few weeks, Symantec has observed new command-and-control servers associated with this threat. Actors behind this new activity have been luring victims with fake Google chrome and Facebook installers via Drive-by-download campaigns. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.WMIC!gen16 File-based Trojan.Gen.2 Trojan.Gen.MBT Trojan Horse Machine Learning-based Heur.AdvML.B
Fake Google Play Store app leads to Hydra Hydra activity is not uncommon, as one of the many prevalent Android banking malwares that has been roaming the global mobile landscape for a few years now. Recently, Symantec observed an actor who has been disguising his Hydra as a fake Google Play Store app (Play_Store.apk), with most being distributed via drive-by-download social engineering. They are using malicious websites to spread but there have also been instances where Discord has been abused. The Google Play Store is a widely trusted platform for Android users to download and install apps. By disguising malware as the official store, attackers exploit the trust users have in the legitimate source, making it more likely for them to install the malicious application. Being a fundamental component of the Android ecosystem, and users typically don't uninstall or disable it. By disguising malware as this essential component, crooks aim for a persistent presence on the device. Like most of its peers, this banking malware performs injection and overlay to conduct financial theft but is also able to collect other sensitive data such as SMS, contacts and device information. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk Android.Reputation.1 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Fake HDFC reward mobile apps lead to financial theft HDFC Bank Ltd. is one of the leading private sector banks in India, offering a wide range of banking and financial services across various segments. While HDFC Bank primarily operates in India, it also has a presence in other countries. The users of this bank, like those of any other financial institution around the world, have been the targets of non-stop phishing and malware campaigns. Recently, Symantec observed an Android campaign in which criminals targeted HDFC mobile users with fake reward apps (offer.apk and hdfc-reward.apk) campaigns. If a user is successfully lured, the app will start collecting contacts, SMS, and other sensitive information stored on the mobile device. The main goal of the malware is to collect victims' financial information, including their credit card details, by asking them to provide this information to enter the reward program. The attackers assure users that they won't store their CVV (the three or four digit security code printed on the back of credit and debit cards) which of course is a lie. Symantec protects you from this threat, identified by the following: Mobile-based AppRisk:Generisk
Fake Job App Steals SMS Messages From Oil Industry Job Seekers Symantec has recently observed a malicious actor targeting mobile users who are looking for jobs in the oil industry. They have created a fake application ([company name] Jobs.apk) that has the appearance of being from a significant player in the oil industry of Bahrain and the Middle East. Users who are successfully lured into installing the app are asked to input their phone numbers into a form. Unbeknownst to them, the malicious actors will actually monitor and steal all their SMS messages. Malicious actors collect SMS messages from victims for various nefarious purposes. This includes intercepting two-factor authentication codes to gain unauthorized access to personal and financial accounts, committing financial fraud by using sensitive information such as one-time passwords, stealing personal details for identity theft, gathering contact information for further phishing schemes, and potentially engaging in corporate espionage, especially in industries like oil where sensitive information is frequently exchanged. Symantec protects you from this threat, identified by the following: Mobile-based AppRisk:Generisk
Fake letter of dismissal leads to Lokibot The global economy is more fragile than ever due to the ongoing COVID-19 pandemic. Losing one's job in the current climate can have a devastating effect on people's lives. Which is exactly what cyber criminals are counting on as they attempt to exploit that fragility via the spam run Symantec Security Response recently observed. The email has the subject "Letter of dismissal" and contains different links to the same malware stored on Dropbox. The link to the malware varies depending on the day the malicious email was sent out. The threat has been identified as Lokibot and Symantec provides the following coverage: File-based Trojan Horse
Fake NordVPN Installer Delivering SecTopRAT A recent malvertising campaign was discovered capitalizing on Microsoft's Bing ads to promote a fake NordVPN installer that will eventually drop SecTopRAT, a .NET based trojan designed to steal sensitive personal information from the victim's machine. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT Machine Learning-based Heur.AdvML.A!500 Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Fake renewals for antivirus products emerge as scam campaigns Recently, Symantec observed a new email scam campaign spreading fake renewals for antivirus products. As shown in Figure 1, emails masquerading as antivirus subscription renewal notifications are sent to users. Looking closely at the email, one can notice the infamous zero font css trick being used to evade traditional anti-spam filters. Figure 1: Email masquerading as antivirus renewal notification message. Clicking on the hyperlinked text “Renew” redirects to a bogus offer webpage as shown in Figure 2. Figure 2: Embedded URL in the email redirects the user to a bogus offer webpage. Protection Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Fake Telegram domains lead to Infostealer Social Network services have always been a target of cybercrime and more recently a campaign aimed at Telegram's users has been reported. Actors have created fake Telegram domains to distribute Azorult Infostealer disguised as Telegram's desktop version installer. Symantec has the following coverage in place: File-based Heur.AdvML.B Heur.AdvML.C Scr.Malcode!gdn30 Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 WS.Malware.2
Fake windows defender pushing malicious windows apps There's no end to social engineering tricks and ingenuity - Recently it's been reported that cybercriminals have tailored fake Windows Defender update websites that push out pop-ups similar to the Windows Defender product's notifications.This in an attempt to lure victims into installing an infostealer disguised as a fake update.This Trojan stealer basically looks for System information, Application profile data and User data. Symantec protects you from this threat, identified by the following: File-based: Heur.AdvML.B Trojan.Gen.NPE Trojan.Gen.MBT WS.Malware.1 Web-based: Observed domains are covered under security categories
Fake Windows update dropping Aurora Stealer A malvertising attack has been observed redirecting users to a fake Windows security update. Threat actors were reported utilizing Invalid Printer Loader (also known as "in2al5d p3in4er") to distribute and drop an infostealer dubbed 'Aurora Stealer'. This infostealer is capable of harvesting credentials from infected systems. The previous Protection Bulletins about Aurora Stealer and Invalid Printer Loader can be seen here: Aurora Stealer Increased activity observed for the Aurora Stealer in2al5d p3in4er Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen6 File-based Infostealer WS.Malware.1 Web-based Observed domains/IPs are covered under security categories
Fake Windows updates lead to Gomorrah stealer Gomorrah is a run-of-mill stealer that targets passwords and cryptocurrency wallets. Sold underground and used by multiple groups and individuals, this malware was first seen in early 2020. As of today Symantec continues to see activity although its prevalence is low compared to other infamous infostealers. Security Response recently observed a fake windows update drive-by-download campaign that leads to Gomorrah. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Machine Learning-based Heur.AdvML.C
Fargo aka Mallox ransomware Fargo ransomware (aka Mallox) has been reported as being distributed in recent attacks targeting MS-SQL servers. Once on the targeted server, the ransomware will attempt to terminate specific processes and services in order to proceed with encryption. The malware appends an additional extension to the encrypted files. The extension might be slightly different depending on the malware version - this includes extensions such as: .FARGO .FARGO2 .FARGO3 or .FARGO4 coming with the latest variant. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.Cryptlocker!g42 SONAR.RansomGen!gen4 File-based Downloader Scr.Malcode!gdn14 Scr.Malcode!gdn30 Scr.Malcode!gdn32 Trojan Horse Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.B Policy-based DCS Hardening policy for Microsoft SQL Server provides zero day protection from Fargo ransomware. Advanced DCS sandboxing controls for Microsoft Windows and SQL Server prevent malicious code from being distributed to the servers.
Farsi-speaking users worldwide are targeted by Iranian threat actors The new Iranian threat actor targets Farsi speaking windows users through spear-phishing campaigns using malicious word documents as attachments. These attached Word documents exploit a Microsoft MSHTML remote code execution (RCE) bug tracked as CVE-2021-40444. Once the malicious winword attachments are opened by the user, a PowerShell-based stealer payload is executed via a multi-staged attack which eventually ends up exfiltrating system information from compromised systems including Google and Instagram credentials. Symantec protects you from this threat, identified by the following: File-based Exp.CVE-2021-40444 Exp.CVE-2021-40444!* Trojan.Gen.MBT Trojan.Gen.NPE Network-based Web Attack: Microsoft MSHTML RCE CVE-2021-40444 Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains are covered under security categories
Fasten your seat belts, aviation industry is experiencing spear phishing turbulence Recently security researchers have discovered a spear phishing campaign targeting the aviation industry. The email messages spoof federal aviation authorities and contain links to .vbs script files stored on a file hosting platform that eventually end up loading AsyncRAT malware on the targeted systems. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.B Trojan Horse Trojan.Gen.MBT Trojan.Gen.NPE Email-based Protection is in place for Symantec's email security products. Email Threat Isolation (ETI) technology from Symantec provides an extra layer of protection. Website-based This attack is proactively blocked by Symantec Web Isolation technology
FatalRAT - new Remote Access Trojan discovered A new Remote Access Trojan (RAT) has been discovered and dubbed as FatalRAT. According to a recently released report, the malware is spread via forums and Telegram channels. FatalRAT leverages multiple evasion and obfuscation techniques. It aims at collecting system information and keylogging, but can also download and execute arbitrary files. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.B Heur.AdvML.C Trojan Horse Trojan.Gen.MBT WS.Malware.2 Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories.
FatalRAT Distributed Through Fake Cryptocurrency App Website A new malicious campaign has been identified where the attackers attempt to distribute FatalRAT malware via a webpage masqueraded as a legitimate cryptocurrency application download website specifically designed for Chinese users. Once the RAT payload is installed, it can steal personal information from victims and perform keylogging activities. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Ps-RgPst!g1 ACM.Ps-Net!g1 Behavior-based SONAR.Coinbitminer!g1 SONAR.SuspBeh!gen609 File-based Miner.Bitcoinminer Miner.Cpuminer SMG.Heur!gen Trojan.Coinbitminer Trojan.Gen.MBT WS.Malware.2 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!100 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
FAUST ransomware, a Phobos family variant FAUST ransomware, a variant of the Phobos family, has been reported in the wild. As part of the campaign, the FAUST variant was propagated in an Office document utilizing a VBA script. The ransomware encrypts user files, appends the ".faust" extension and drops an info.hta and an info.txt file. These files are used for communication with the threat actors after encrypting a victim's files. Victims are instructed to contact the attackers via email or TOX messenger for ransom negotiations. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based CL.Downloader!gen38 CL.Downloader!gen205 Ransom.Phobos!gm1 Trojan.Malfilter Trojan.Maladd Trojan Horse Web.Reputation.1 WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.A!300 Heur.AdvML.B!100 Heur.AdvML.B!200 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Fbot: another cousin of Mirai Fbot is a Linux botnet malware and yet another member of the infamous Mirai malware. On top of performing Telnet scanning and launching DDoS attacks, recent Fbots are equipped with a new ability that enables the malware to propagate to other vulnerable systems, including roadside monitoring devices. Symantec provides the following coverage against recent Fbot samples: File-based Linux.Satori Downloader Trojan.Gen.NPE Web-based Observed domain is covered under security categories
FBot malware attacks targeting web servers and cloud services FBot is a Python-based malware variant seen recently used in malicious campaigns targeting web servers and cloud services. The malware includes several functions dedicated to AWS account hijacking attacks, credentials harvesting, attacks against various other SaaS services or intrusions against some popular Content Management Systems (CMS). FBot also includes a wide variety of utilities such as IP address generator, port scanner, reverse IP scanner, IP and email validators and others. Symantec protects you from this threat, identified by the following: File-based Trojan Horse
Fenix clipper Crypto wallet clippers are in some ways considered more lucrative than cryptominers, unless you're running a large botnet. Over the past few years, many of these clippers have been advertised on underground forums or even on public cloud-based services for software development and version control. In this protection bulletin, we cover one named "Fenix," which may not be as prevalent as some, but is being observed in the threatscape and notably, boasts AS bypass capabilities. It is mostly spread via drive-by-download social engineering tactics, with consumers being the primary targets. It has shown sporadic activity with minor spikes related to newer posts on websites, forums, and social media. Symantec protects you from this threat, identified by the following: Behavior-based ACM.Untrst-RunSys!g1 File-based Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B!100
Ferocious Kitten shows its claws with MarkiRAT Security researchers have recently discovered the APT group Ferocious Kitten has been deploying MarkiRAT to monitor users in the Middle East over the past several years. MarkiRAT has been deployed via malicious Word macros and is then used to exfiltrate data from applications like Chrome, Telegram and Psiphon (open source VPN software) via keyloggers. Symantec protects you from these threats, identified by the following: File-Based Heur.AdvML.C Trojan Horse Trojan.GEN.MBT Network-based Malicious Site: Malicious Domains Request
FickerStealer hidden in a fake game installer As Symantec Security Response previously reported, FickerStealer was recently being delivered via Hancitor malspam campaigns. Since the Infostealer is known to be sold on hacking forums and doubtless purchased by various would-be attackers, finding the malware delivered using a different method targeting a different type of audience was not surprising - hidden inside a fake installer of a popular PC game. FickerStealer is designed to steal information from the compromised machine such as browser passwords. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.2
FickerStealer spreading via Hancitor FickerStealer has been around since 2020, but it has recently been found to be spreading via Russian threat actor forums of late. In the past FickerStealer would spread via compromised websites and URLs resulting in unintentional downloads, however in recent activity Hancitor has been used to spread this malware. Spam email containing a weaponized Microsoft Word document attached is sent out to entice victims to open it. Once opened malicious macro code is executed that enables Hancitor to communicate with C2 server to retrieve a URL containing a FickerStealer sample. FickerStealer is heavily obfuscated to avoid detection and is capable of stealing sensitive information. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.B Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT W97M.Downloader WS.Malware.1 WS.Malware.2 Behavior-based SONAR.MalTraffic!gen3 Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Ficker the infostealer FickerStealer is an information stealing malware that was first observed in 2020. The initial infection vector is typically an email with a malicious attachment. In a recent case we have seen the attachment as an XLSM document with an embedded macro that is responsible for downloading the FickerStealer payload. FickerStealer is capable of stealing sensitive information such as cryptocurrency wallets, and application/web browser passwords. It can additionally capture credentials stored by Windows Credential Manager, and FTP client information. This includes session information from email clients and various chats. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.B Trojan.Gen.2 W97M.Downloader WS.Malware.1 WS.Malware.2 Behavior-based SONAR.MalTraffic!gen3 Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. Web-based Observed domains are covered under security categories
Fictitious OnlyFans premium mobile app revealed as SpyNote OnlyFans' popularity worldwide has grown exponentially over the past few years. Positioned as a social media service, it has become a lucrative means of livelihood for many individuals. Yet, the intriguing dichotomy lies in its content, which ventures into the NSFW (Not Safe For Work) territory. Many users, while capitalizing on the platform's income potential, inadvertently tread a fine line that might lead them onto Santa's naughty list. In this digital landscape, cybercriminals have identified OnlyFans creators and users as a ripe target. Symantec has observed recurrent form of attacks, from phishing to computer and mobile malware. More recently, we have seen an actor trying to lure users with a mobile app that claims to give access to OnlyFans Premium. This fictitious app offers a unique and exclusive experience, providing users with captivating photos, videos, and expert advice from influencers and celebrities. In reality, it's none of this - it's actually SpyNote. This spyware/remote access trojan is widely used globally, and its source code is publicly available. In terms of capabilities, it can collect keystrokes, device information, contacts, call logs, SMS messages, photos, and videos, as well as information about installed apps. It's also capable of recording calls and using the device camera. Users who fall for this specific campaign and lack protection software will likely become victims not only of identity and financial theft but also of potential blackmail. Additionally, their contacts could be at risk further down the road. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk Android.Reputation.1
FIFA World Cup malspam campaigns on the rise Different malware families including SolarMarker and Parrot TDS have been leveraging the FIFA World Cup event to target users, via a campaign in which threat actors are using tactics such as cracked versions of FIFA games to distribute malicious PDFs, or notifying users to download critical browser updates. Researchers have observed a rise in fake streaming sites and sites offering world cup tickets using newly registered domains. Symantec protects you from these threats, identified by the following: File-based Trojan.Gen.2 Trojan Horse JS.Cryxos!inf Trojan.Gen.NPE Machine Learning-based Heur.AdvML.A!500 Web-based Observed domains/IPs are covered under security categories
Fileless delivery of RAT and RedLine Stealer Recently, a campaign was observed abusing Microsoft Build Engine (MSBuild) to deliver fileless payloads, namely RAT and RedLine Stealer (Password Stealer). The attackers found a way to leverage the compilation feature of the open-source tool working with hacked MSBuild project files. Compilation will unknowingly execute the malcode and inject it into the process memory. If performed as expected, attackers can gain privileges on the victim’s machine, then carry out the rest of the infection routine with a relatively low chance of getting blocked by an AV product, given that the malware is now concealed behind a legitimate process. Symantec protects you from this threat, identified by the following: File-based Trojan Horse WS.Malware.2
Finfisher can use an UEFI bootkit and bypass security checks Finfisher, also known as FinSpy, is a commercially developed surveillance suit with malware-like capabilities. Although its developer says that it is only sold to government agencies and law enforcement, cybersecurity firms have reported it being distributed through phishing campaigns and more dubious sources. The suite has been known to infect a computer MBR since 2014, but now it includes a UEFI boot kit. This would allow it to inject itself at boot time in modern systems, bypassing firmware security checks, like through the Windows Boot Manager in Windows. Not only are Windows systems at risk here, so are versions for Linux and macOS. Symantec protects you from this threat, identified by the following: File-based OSX.Malcol OSX.Trojan.Gen OSX.Trojan.Gen Trojan Horse Trojan.Gen.2 Trojan.Gen.NPE WS.Malware.1 Web-based Observed IPs/domains are covered under security categories
First 2021 Qakbot campaign observed Qakbot is a well-known banking malware that has been active on the threat landscape for years. After the lack of activity from Qakbot in the last few weeks, just yesterday on 01.19 there has been a considerable spike of malspam leading to this malware. Qakbot distribution in this campaign happens via spam emails with .zip attachments that once extracted lead to .xlsm Excel files containing malicious macros. Interesting to note is that the Qakbot dlls fetched by the macros are disguised as .JPG files. Indicators of compromise (IOC) Email subject examples: Re: Automatic reply: Infection Control - Reminder Re: Automatic reply: Reminder - Fraud Awareness Re: Automatic reply: Cyber / Information Security Re: Automatic reply: Stop Procrastinating... Now! - Reminder Re: Automatic reply: Annual Performance and Development Review 2019 Re: Automatic reply: Reminder - Lone Working Guide for Employees Attachments: Complaint_Copy_[numeric string]_[numeric string].zip Extracted files : Complaint_Copy_[numeric string]_[numeric string].xlsm Symantec offers following protections against this campaign: File-based Trojan.Gen Trojan Horse Trojan.Mdropper WS.Malware.1 VBA.Downloader.Gen Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
FiXS - the ATM Malware FiXS is a new ATM malware variant observed being used in campaigns in Mexico. According to recent reports, FiXS malware arrives embedded within the Neshta (Neshuta) dropper. FiXS is not vendor specific and will target any ATM that supports the CEN/XFS (eXtensions for Financial Services) standard. Malware can wait for the ATM cassettes to be loaded with cash before attempting the dispense procedures. It also has a feature allowing for 30 minutes delay after ATM reboot before attempting to dispense the cash. The attackers are interacting with the FiXS malware and sending commands by leveraging an external keyboard. Symantec protects you from this threat, identified by the following: File-based Trojan Horse W32.Neshuta WS.Malware.1 Machine Learning-based Heur.AdvML.B Policy-based Symantec Data Center Security (DCS) protected app control policy prevents unauthorized program execution and provides system and application lockdown to secure ATMs from threats such as FiXS malware
Flagpro malware leveraged by the BlackTech APT BlackTech APT group has been reported to leverage a new malware dubbed Flagpro in attacks targeting Japanese companies. Flagpro is distributed via spear-phishing emails that contain zipped MS Excel files with malicious macros. The attackers use this new malware mainly in initial attack stages for the purpose of reconnaissance and second stage payload download. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE Machine Learning-based Heur.AdvML.B Heur.AdvML.C Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories
Flubot, Android Banking malware We recently published two protection bulletins for back-to-back smishing campaigns (linked below) which targeted Spanish Android users. If successfully tricked by the malicious SMS, the victim would end up installing an Android banking malware known as Flubot. On top of its data stealing capabilities, the malware is able to further increase its spread by collecting victim's contact lists in order to send additional malicious SMS. DHL smishing leads to Android malware Not a Fedex package but Android malware! Smished! On March 2nd, Spanish Law Enforcement arrested four people believed to be part of the group behind this malware. Symantec has the following protection in place: Mobile-based AppRisk:Generisk Android.Reputation.2 Symantec Endpoint Protection Mobile is able to also analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect.
FluBot Android malware spreads through ongoing SMS campaigns According to a recently released report, the Flubot mobile banking malware continues to be spread via malicious SMS campaigns. The malware has been targeting users in many European countries. The distribution of the Flubot follows the usual pattern - the user receives a fake parcel delivery SMS message containing a link. Once the link is followed, the victim will be prompted to download an additional app that hides the Flubot malware. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT Trojan.Gen.2 Mobile-based AdLibrary:Generisk AppRisk:Generisk Other:Android.Reputation.1
FluHorse Android malware FluHorse is a newly discovered malware targeting Android users from Eastern Asia. FluHorse has been developed based on the open-source framework known as Flutter. The malware spreads via phishing and social engineering and comes masqueraded as applications belonging to legitimate financial institutions or toll collection companies. FluHorse malware targets theft of credentials, Two-Factor Authentication (2FA) codes and credit card information, among others. Once collected, the stolen data is ex-filtrated to the C&C servers belonging to the attackers. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk Android.Reputation.2 AppRisk:Generisk Web-based Observed domains/IPs are covered under security categories
FluHorse mobile malware changing technique On a daily basis there are countless phishing attempts, generated by a variety of phishing kits and cybercriminals keep on changing their TTPs in the hope of evading malspam detection. Fluhorse, developed based on the open-source framework known as Flutter, was first reported in May 2023. In June, however, the threat actors behind this phishing campaign have shifted their technique from basic obfuscation to packing and concealing the encrypted payloads within executables of mimicked applications. The threat actors mimic popular applications belonging to legitimate financial institutions or toll collection companies of Eastern Asia with millions of downloads. FluHorse malware targets theft of credentials, Two-Factor Authentication (2FA) codes and credit card information, among others. The stolen data is ex-filtrated to the C&C servers belonging to the attackers. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products. File-based Android.Malapp Android.Reputation.2 Trojan.Gen.MBT Mobile-based AdLibrary:Generisk AppRisk:Generisk Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Fonix Crypter still flies under the radar Fonix Crypter, a ransomware variant first spotted around July this year shows some repeated occurrences in the wild since its discovery. Fonix is reported to be sold as RaaS (Ransomware as a Service) offering. The malware actors seem to focus mostly on Windows as the ransomware target platform. Fonix features are very similar to most other ransomware families including deletion of Volume Shadow Copies, disabling system recovery and achieving persistence via Task Scheduler. Symantec offers following protections against this ransomware variant: File-based Downloader Heur.AdvML.B Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.1 WS.Malware.2 Network-based [32179] Attack: Ransom.Gen Activity 23 [32436] Attack: Ransom.Gen Activity 29
FontOnLake stealthily infects Linux Systems A new malware family infects Linux Systems. Dubbed FontOnLake, it was observed being distributed via a trojanized application which then delivers backdoor and rootkit components. FontOnLake’s presence is always accompanied by a rootkit and uses different command and control servers for each sample. This shows that the operators are trying very hard to avoid attention, leading researchers to speculate that this malware may have been used in targeted attacks. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.NPE Linux.Lightaidra Linux.Kerlisen Web-based Observed domains are covered under security categories
Foreign agency attributed with attacks exploiting publicly known vulnerabilities that targeted U.S. and Allied networks A Joint Cybersecurity Advisory was recently released by the NSA, the FBI, and CISA detailing activities they attributed to a foreign agency. The advisory identifies five known vulnerabilities exploited during attempts to compromise U.S. and allied entities in cyberespionage related campaigns. Application of available patches is highly recommended. The vulnerabilities identified are as follows: CVE-2018-13379 Fortinet FortiGate VPN CVE-2019-9670 Synacor Zimbra Collaboration Suite CVE-2019-11510 Pulse Secure Pulse Connect Secure VPN CVE-2019-19781 Citrix Application Delivery Controller and Gateway CVE-2020-4006 VMware Workspace ONE Access Symantec protects you from these issues, identified by the following: Network-based Web Attack: Citrix ADC RCE CVE-2019-19781 Web Attack: Fortinet FortiOS Directory Traversal CVE-2018-13379 Web Attack: Pulse Secure SSL VPN File Disclosure CVE-2019-11510 (CVE-2019-9670) Web Attack: XML External Entity Attack
Forgery – Elaborate IGF Scam Targeting French Companies Symantec has observed a spam actor targeting companies in France (both local and international) with the hope of swindling €9,708.10 by impersonating the IGF government agency. In France, the IGF stands for "Inspection Générale des Finances," which translates to the General Inspectorate of Finance in English. It is a government agency responsible for conducting financial audits, inspections, and providing advisory services to the French government. The malicious emails (subject: "INSPECTION GENERALE DES FINANCES") contain an elaborate PDF file (IMPOT (1)(1)-1.pdf) posing as an official letter from the Ministère de l'Économie et des Finances and IGF. The email explains that fraud has been discovered, and if the user does not pay the fine within 48 hours they may face a larger fine of up to €500,000 and/or 5 years of imprisonment. The PDF document is also falsely signed and stamped by the current chef des services administratifs et financiers to increase the deception - a classic case of forgery. The groups or individuals behind this scare tactic hope that the victim will get in touch, and if so they will provide guidance on how to pay the fictitious fine. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products
Formbook campaign: German thermoplastics company and French automotive supplier spoofed An actor has recently initiated a malicious email campaign, targeting companies in Europe by spoofing a German thermoplastics company and a global French automotive supplier. Attached to these emails are malicious document files that execute an exploit for the well-known CVE-2017-11882 vulnerability and then drop Formbook. CVE-2017-11882 refers to a vulnerability in Microsoft Office identified in 2017 which is still widely exploited. Specifically, it is a remote code execution vulnerability in the Equation Editor component of Microsoft Office, allowing an attacker to execute arbitrary code on a victim's system if the user opens a specially crafted Microsoft Office file. Observed subjects include: (Spoofed company name) Purchase Order_231023 (Spoofed company name) Bulk Purchase Order Factura_ 03351 Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products File-based Exp.CVE-2017-11882!g6
Formbook campaign targets Polish organizations Formbook's activities continue and campaigns are often observed around the globe – it's one of the top Infostealer form grabbers. Recently Symantec observed a Formbook campaign that primarily targets organizations in Poland but has also been seen in neighboring countries. Actors purport themselves as Italian and Romanian plastic / foam manufacturing companies, sending out fake order emails (subject: Zamówienie nr_DOC_0080962946) that contain a malicious IMG archive as an attachment. If users are successfully lured, they'll end up executing the Formbook binary disguised as a fictitious order. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products File-based Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B Heur.AdvML.C
Formbook KazMunayGas campaign: companies and government agencies around the world targeted In the ever-evolving landscape of cyber threats, as we step into 2024, Formbook remains an enduring menace. Symantec has been observing campaigns worldwide in the first few days of the new year. In one ongoing example, an actor is posing as KazMunayGas, the Kazakhstan national oil and gas company. The malicious emails (subject: КОММЕРЧЕСКИЙ ПОСТАВЩИК) are being sent to companies and government agencies in Germany, the UK, Canada, Russia, Turkey, Israel, Japan, Mauritius, Hungary, the Falkland Islands, Spain, the UAE, etc. Attached to the email is a zip archive (КОММЕРЧЕСКИЙ ПОСТАВЩИК.zip), and within that the malicious Formbook binary (КОММЕРЧЕСКИЙ ПОСТАВЩИК.exe) disguised as a fake commercial document. As we all know, this persistent malware poses significant risks to both companies and government agencies. Its impact includes potential data breaches leading to the compromise of critical information, financial loss, operational disruption, and reputational damage. For companies, intellectual property theft is a concern while government agencies face national security implications. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products Behavior-based ACM.Untrst-RunSys!g1 ACM.Rgsvc-Lnch!g1 File-based CL.Suspexec!gen8 Scr.Malcode!gdn34 Trojan.Formbook Machine Learning-based Heur.AdvML.B!200 Network-based System Infected: Trojan.Formbook Activity 2 Web Attack: Webpulse Bad Reputation Domain Request
Formbook leverages CVE-2021-40444 Malware actors are incorporating vulnerabilities into their attack chain at an ever faster pace, a prime example being Formbook which incorporated CVE-2021-40444 as observed in recent malspam campaigns. CVE-2021-40444 is a remote code execution (RCE) vulnerability in MSHTML that was disclosed this month. Read more about this vulnerability and our protection here. Formbook has been around since at least 2016 and as of today is still one of the top Infostealer form grabbers. This malware is being used by multiple groups and individuals and Symantec continues to observe activities on a global scale. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.B Heur.AdvML.C Scr.Malcode!gdn30 Network-based Web Attack: Microsoft MSHTML RCE CVE-2021-40444
Formbook rides event vehicles to target Turkish organizations Formbook prevalence remains high and is seen around the globe on a daily basis. As Symantec continues to observe campaigns, the primary vector of infection has not changed among groups and individuals, still favoring malicious emails. Recently, an ongoing Formbook campaign has been primarily targeting Turkish organizations, but instances in other countries have also been observed such as the USA, France, Thailand, Serbia, etc. Actors behind this malspam campaign purport themselves to be a Turkish company that produces custom vehicles for various events including those of a political nature. They also employ a run-of-the-mill "payment" social engineering tactic with the email subject: Ödeme. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec's email security products File-based Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B
Formbook shows no signs of stopping Formbook has been around since at least 2016 and as of today is still one of the top Infostealer form grabbers in the wild. This malware is being used by multiple groups and individuals and Symantec continues to observe activities on a global scale. Vector wise, it's mostly distributed via malicious emails but there have been some instances of Drive-by-Download and Exploit kits being used. Symantec has the following coverage in place for recently observed campaigns: File-based Heur.AdvML.B Heur.AdvML.C Scr.Malcode!gdn30 Trojan.Gen.2 WS.Malware.1 Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Found Windows variant of BiBi-Linux wiper Shortly after the discovery of the new Linux wiper called BiBi a research team has found a Windows variant. The infection vector is unknown so far, but similar to the Linux variant, the wiper rewrites the targeted files with random data. As for behavior specific to its Windows counterpart, the wiper does change the extension to BiBi[number], it does not alter exe, DLL and similar files as to not prevent itself from running after touching system files and deletes any possible Shadow Copy backups. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.C
Fraudulent relief-themed websites after Turkey and Syria earthquakes It's highly common to see multiple relief-themed websites spawn post-disaster anywhere around the globe. These are often created to provide a centralized platform for coordinating relief efforts and providing resources to those affected by the disaster. Unfortunately, cybercriminals also create relief-themed websites after a disaster as part of their criminal activities. Those websites are designed to trick people into providing sensitive information or making fraudulent donations, and they can be very convincing. Symantec has observed many relief-themed domains that were created after Turkey and Syria were struck by two major earthquakes, with some of them being controlled by malicious actors. It is important to be cautious when visiting relief-themed websites after a disaster. It is advisable to only donate to established, reputable organizations and to verify that a website is legitimate before providing any personal information. Symantec protects you from this threat, identified by the following: Web-based Observed domains/IPs are covered under security categories
FreakOut leverages recently disclosed vulnerabilities to create a botnet Symantec Security Response is aware of several attacks that were reportedly exploiting multiple vulnerabilities, including some that were only recently published, to inject OS commands. The goal behind the attacks was to create an IRC botnet which can later be used for various purposes, such as DDoS attacks or crypto-mining. The attacks target particular Network Attached Storage (NAS) devices, a Web application framework and an open source enterprise portal. Symantec provides the following coverage for the botnet: Trojan.Gen.NPE Hacktool
Frea Ransomware Frea is one more Chaos ransomware variant just recently spotted in the wild. The malware encrypts user files and appends .frea extension to them. It also changes the desktop wallpaper on the infected machine. Ransom note is dropped in form of a text file called "oku.txt" providing the victim with attackers' email address as a contact point. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Untrst-RLsass!g1 ACM.Untrst-RunSys!g1 File-based Ransom.HiddenTear!g1 Trojan Horse WS.Malware.1 Machine Learning-based Heur.AdvML.B
Frebniis malware Symantec has observed a new malware that abuses a feature of Microsoft’s Internet Information Services (IIS) to deploy a backdoor onto targeted systems. The malware, dubbed Frebniis, was used by a currently unknown threat actor against targets in Taiwan. The technique used by Frebniis involves injecting malicious code into the memory of a DLL file (iisfreb.dll) related to an IIS feature used to troubleshoot and analyze failed web page requests. This allows the malware to stealthily monitor all HTTP requests and recognize specially formatted HTTP requests sent by the attacker, allowing for remote code execution. Read more in our blog: Frebniis: New Malware Abuses Microsoft IIS Feature to Establish Backdoor Symantec protects you from this threat, identified by the following: File-based Backdoor.Frebniis WS.Malware.1 Machine Learning-based Heur.AdvML.C
Free dynamic DNS service abused in recent phish wave Lately, threat actors abused free dynamic DNS service - DuckDNS to steal credentials. As shown in Figure 1, emails masqueraded as "User login failure" notification messages are sent to the recipients trying to entice them into clicking the hyperlinked text in the email content. Figure 1: Email masqueraded as notification message with DuckDNS service URL embedded within hyperlinked text. As shown in Figure 2, a phishing page masqueraded as an account recovery site is hosted on the duckdns[.]org platform. Figure 2: Phishing page created for credential harvesting. Protection Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
FreeWorld Ransomware Reports have emerged about a new variant of Mimic ransomware dubbed as FreeWorld. The actors behind this ransomware have employed brute force attack techniques targeting Microsoft SQL (MSSQL) services. Upon successful infection, it abuses the legitimate application Everything to locate target files and appends .FreeWorldEncryption extension post encryption. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.TCP!gen6 SONAR.SuspBeh!gen616 File-based Ransom.Zombie Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Network-based System Infected: Trojan.Backdoor Activity 634 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
French targeted by a Netflix phishing campaign This year, Symantec has been observing many phishing attempts to steal users Netflix credentials worldwide. Stolen Netflix accounts are in high demand in underground markets and that's how victims end up, unknowingly, sharing their Netflix with complete strangers. More recently, French users have been the target of one of these campaigns. In fact, a series of emails purporting to be from Netflix were sent to companies' employees as well as consumers. If successfully tricked, users who click on the URL within the email would be redirected to a look alike Netflix login page. Indicators of compromise: Email subject: Votre compte est suspendu Phishing domain: hxxps://web-netflix[.]eu Symantec has the following coverage in place: Network-based Malicious Phishing Site: Phishing Suspicious Request Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Freya Bitcoin Clipper Another cryptocurrency wallet clipper is being actively used by multiple groups and individuals. Known as "Freya bitcoin clipper", it gained a bit of traction earlier this year when its builder was echoed across various hacking forums, websites and social media. Actors who leverage this threat are mostly targeting consumers. Behavior-wise, it does nothing other than replace the victim's cryptocurrency wallet address with the actor's address. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.2 Trojan.Gen.MBT Machine Learning-based Heur.AdvML.C
Frivinho Ransomware Frivinho, a newly discovered ransomware variant, adds the ".Frivinho0>v" extension to encrypted files. Once encryption is completed, a ransom note named "PLS_READ_ME.txt" is dropped on the affected device, demanding Bitcoin payment for data decryption. Notably, the malware is capable of removing volume shadow copies on the compromised endpoint. Symantec protects you from this threat, identified by the following: Behavior-based ACM.Untrst-RLsass!g1 ACM.Untrst-RunSys!g1 File-based Ransom.Sorry WS.Malware.1 Machine Learning-based Heur.AdvML.B
From Brazil to Portugal – Maxtrilha banking trojan Latin America is one region of the world that's constantly targeted by banking malware, often distributed via malicious emails and drive-by-download. Maxtrilha (developed in Delphi) is a new one that's been recently reported, with actors behind this thread already having campaigned in Brazil but now expanding their activities to include Portugal. They have distributed this malware via emails purporting to be from government tax agencies, containing a malicious URL redirecting to a loader. This loader will deploy Maxtrilha, the actual payload and banking malware, which will monitor for its victim to visit a banking website and then steal their login credentials. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.2 Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. Web-based Observed domains are covered under security categories
From woolly to shorn: danger lurks in the gaming world Cybercriminals are known to target users who search for video game hacks, cheats and cracked software. In a recent example, Symantec observed that some Fortnite players looking for an advantage have been the target of a ransomware attack. The attackers disguised the ransomware as a "Fortnite Leecher and Slayer", encrypting the victim's files and adding a random 4-character extension. A ransom note was left on the compromised machine demanding 30 Polish Zloty (equivalent to 6.82 US dollars at the time of writing). In the context of Fortnite, a leecher is someone who joins a squad or party with the intention of gaining rewards and benefits without contributing anything to the team effort. In other words, they "leech" off of other players efforts to gain rewards. On the other hand, a slayer is a player who actively participates and contributes to the team's success in achieving objectives and goals in the game. They take on a leadership role and often have strong communication skills and game knowledge. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.SuspBeh!gen625 File-based Ransom.Sorry Machine Learning-based Heur.AdvML.B
From XLA to RTF to VBS: Agent Tesla Malspam Wave in Latin America Symantec recently detected an Agent Tesla malspam campaign with a focus on several Latin American countries including Mexico, Ecuador, the Dominican Republic, Colombia, Brazil, and Peru. The perpetrators leveraged well-known and previously patched vulnerabilities as their delivery mechanism. The emails come equipped with an XLA file attachment (named boleto bancário.xla or cotización.xla). Upon execution, this attachment exploits CVE-2017-0199 to download a malicious RTF file. Subsequently, the RTF file utilizes CVE-2017-11882 to download a VBS file (mondaybrazillll.vbs), ultimately leading to the deployment of the Agent Tesla malware. Observed email subjects: cotización Relatório de pagamento solicitud de cotización.. CVE-2017-0199 is a vulnerability that exists in Microsoft Word and Office Online. It allows attackers to execute arbitrary code via a crafted document containing an embedded OLE2link object, leading to potential remote code execution. CVE-2017-11882 is a vulnerability in Microsoft Office, specifically in the Equation Editor component. Exploiting this flaw enables attackers to execute arbitrary code through a maliciously crafted file, providing a pathway for remote code execution. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products File-based Exp.CVE-2017-11882!g2 Downloader Scr.Malcode!gen59
Funnelweb targets Taiwan with new spear-phishing email campaign A new spear-phishing email campaign by the threat actor Funnelweb (also known as Earth Lusca) targeting users in Taiwan has been reported in the wild. The attack begins with a phishing email containing a 7z archive attachment with an LNK file, which when opened, executes JavaScript code ultimately leading to the delivery of a final-stage Cobalt Strike payload. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Ps-Rd32!g1 ACM.Ps-Wscr!g1 Behavior-based SONAR.SuspLaunch!g372 File-based Backdoor.Cobalt!gm1 Backdoor.Cobalt Trojan Horse Trojan.Mallnk Trojan.Malscript Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B!100 Heur.AdvML.B!200 Heur.AdvML.C Network-based 32486_Audit: Bad Reputation Application Activity 33837_System Infected: Bad Reputation Application Network Activity 33986_System Infected: Trojan.Backdoor Activity 721 29565_Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
FurBall malware spread in the latest APT campaigns We have been aware of the latest reports concerning the activities of the APT-C-50 group and the FurBall (aka Domestic Kitten) malware distributed by them. While the earlier campaigns spreading this malware date back to 2017, some still remain active. FurBall is reported to be delivered via SMS messages containing direct links to malware binaries or through malicious mobile apps disguised as legitimate ones. The malware has capabilities to collect a variety of information from the compromised devices but also allows the attackers to execute arbitrary commands on them. Symantec provides the following detections against this campaign: File-based Trojan.Gen.2 Trojan.Gen.MBT Mobile-based AppRisk:Generisk Spyware:MobileSpy
GachiSteal a Collector's spawn Since Collector stealer (aka DCStealer and DataCollector) was cracked and leaked for free, Symantec has observed multiple spawns in the threat landscape. Gachisteal is one of those variants that's based on the Collector stealer and is mostly being delivered via drive-by-download. As of today, this infostealer is still far less prevalent than the malware it originated from. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT Trojan.Horse WS.Malware.1 Behavior-based SONAR.MalTraffic!gen3
Gafgyt: Recipient of Mirai's code transplant Recently variants of Linux malware Gafgyt have been observed to include some modules from the leaked Mirai source code. These implanted modules are for HTTP, UDP and TCP flooding, STD module and Telnet Bruteforce. Symantec protects you from this threat, identified by the following: File-Based Linux.Mirai Linux.Lightaidra Trojan.Gen.NPE
Gamaredon - not your typical APT group Security Response is aware of recently published details related to the Gamaredon group. This particular group has a broader range of victims rather than the more highly targeted victimology observed in most APT campaigns. Campaigns have been identified that used trojanized applications, self-extracting archives socially engineered to look like common files, and emails with malicious payloads including malicious documents. These represent the first stage loaders that act as beacons and connect to C&C servers responsible for deploying and updating the second stage payloads. Symantec provides the following protection for known indicators. File-based Heur.AdvML.C Trojan.Gen.MBT VBS.Downloader.Trojan W97M.Downloader Network-based System Infected: Trojan.Backdoor Activity 109 Web-based Observed domains are covered under security categories
Gamaredon APT group targeted Ukraine in a newly discovered campaign According to a recently released report, the Gamaredon APT group has been launching series of malicious targeted attacks against Ukrainian government organizations in the previous quarter of the year. The attackers have been sending victims malicious .docx documents via email that attempted to download .dot files via remote templates. The final payload remains unknown as the remote template domains were down at the time of threat discovery and investigation. Symantec protects you from this threat, identified by the following: File-based W97M.Downloader WS.Malware.1 Web-based Observed domains are covered under security categories
Gamaredon APT spreads infostealing malware to users in Ukraine A new campaign attributed to the Gamaredon APT group (aka Shuckworm) has been reported to distribute infostealing malware to users in Ukraine. The attackers leverage malspam email with MS Office documents containing malicious VBS macros. Once executed, the macros download .rar archives with .lnk files inside. Through the execution of PowerShell scripts the infostealer malware is deployed on the targeted hosts. The malware has the capabilities to extract data from the infected machines as well as spread additional arbitrary payloads. The infostealer can also extract files from any attached removable storage - it searches for files with pre-defined extensions. Symantec protects you from this threat, identified by the following: File-based CL.Downloader!gen203 Scr.Malcode!gen Trojan.Gen.MBT Trojan.Gen.NPE W97M.Downloader WS.Malware.1 Machine Learning-based Heur.AdvML.B Network-based System Infected: Trojan.Backdoor Activity 634 Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories
Gamers in Blackguard's line of sight Blackguard is a run-of-the-mill infostealer that is used by multiple groups and individuals. In the last few months it's mostly been seen targeting consumers via drive-by-download. More recently, an actor has set his sights on gamers as he tries to lure them into installing this piece of malware by disguising it as a CounterStrike patch, which has been posted on gaming forums and discord channels. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT Trojan Horse Network-based System Infected: Trojan.Backdoor Activity 634 Machine Learning-based Heur.AdvML.C
Garsomware & Rakkun: Two more Chaos variants doing the rounds We are all by now well accustomed to seeing new Chaos Ransomware variants appearing in the threat landscape as groups and individuals around the world have increasing access to source code. Garsomware and Rakkun are two variants that have recently been spotted, both demanding 0.1473766 BTC - equivalent to 3207.53 US dollars at the time of this writing. Most Chaos variants remain low in prevalence and target individual computers rather than moving laterally in an infrastructure and infecting other machines. Additionally, the double-extortion tactic is not employed. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.SuspBeh!gen625 File-based Ransom.Sorry Machine Learning-based Heur.AdvML.B
Geacon - Cobalt Strike for macOS Geacon is a Go-based implementation of the Cobalt Strike attack simulation tool for the macOS platform. While most of the Geacon samples observed in the wild seem to be still used mostly for red-team testing, it's only a matter of time before various threat actors start abusing them for malicious attacks in a similar way Cobalt Strike is leveraged. Geacon has been used maliciously in some instances recently, including one case where it masqueraded as the legitimate SecureLink remote assistance application. The macOS sample that was used in this example shared a C2 address previously well-known due to its connection to Cobalt Strike beacons. Symantec protects you from this threat, identified by the following: File-based OSX.Trojan.Gen OSX.Trojan.Gen.2 WS.Malware.1 Web-based Observed domains/IPs are covered under security categories
Germany, Austria and Switzerland in Warzone RAT's light of sight Warzone (also known as AveMaria) is a remote access trojan that has been present in the threat landscape for some time now. Although its prevalence is not as high as other RATs and stealers, it has remained consistent over the years. Symantec regularly observes campaigns associated with Warzone worldwide. In a recent example, a new campaign has been detected, primarily targeting organizations in Germany, Austria, Switzerland, and international entities with local ties. The malicious emails, claiming to be payment receipts (subject: Überprüfen Sie den Zahlungsbeleg), contain a .ARJ archive that contains Warzone's binary. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products File-based Scr.Malcode!gdn34
Gh0stTimes malware leveraged by the BlackTech attack group According to the latest reports, the attack group known as BlackTech seems to be persistent with its malicious activities in Japan since 2018. Since 2020 the group has been leveraging Gh0stTimes malware in their attacks which is reported to be a customized version of the Gh0st RAT (Remote Access Trojan). Symantec protects you from this threat, identified by the following: File-based Backdoor.Trojan Heur.AdvML.B Heur.AdvML.C Trojan.Gen.MBT Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains are covered under security categories
Ghimob: First Brazil, then what? It seems there is a new Android banking malware in the Latin American region. Dubbed as Ghimob, perpetrators have been disguising their malware as legitimate mobile apps and luring victims via emails which redirect them to these malicious apps. While it currently appears focused on the Brazilian financial industry and its user base, as many eventually do, it may well expand its grasp and start to target a more global audience. The Symantec Endpoint Protection Mobile product protects against this threat as follows: AppRisk:Generisk AdLibrary:Generisk Other:Android.Reputation.1
GhostEmperor uses kernel mode rootkit to hide malware artifacts An attack named GhostEmperor using a formerly unknown Windows kernel mode rootkit, Demodex, to begin a multi-stage attack has been observed in the wild. The rootkit hides the artifacts of the malware and uses a component of an open-source project named Cheat Engine to bypass Driver Signature Enforcement. Symantec protects you from these threats, identified by the following: File-based Hacktool.Mimikatz Trojan.Gen.2 Trojan.Gen.MBT
GhostLocker 2.0 GhostSec has reportedly evolved with a new GhostLocker 2.0 ransomware-as-a-service offering. The newer Golang variant has been utilized to conduct double-extortion attacks on organizations across multiple countries. Additionally, a couple of new tools have been introduced, including a website-scanning tool called 'GhostSecDeepScanToolset,' designed to perform a deep scan of targeted websites, and 'GhostPresser,' a tool used for probing and taking over WordPress installations. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Untrst-FlPst!g1 File-based Trojan.IcedID Trojan Horse Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
GhostLocker Ransomware GhostLocker is a ransomware variant distributed in the form of a Ransom-as-a-Service (RaaS) offering and observed in the wild this month. The malware is attributed to the threat group called GhostSec. GhostLocker has the functionality for delayed encryption, privilege escalation and the ability to kill processes and services on the infected hosts, among others. Upon completing the encryption process the malware will append .ghost extension to the locked files. Most recent variants of GhostLocker are compiled with Nuitka, which is a source-to-source compiler from Python code to C binaries. Symantec protects you from this threat, identified by the following: Behavior-based ACM.Untrst-FlPst!g1 SONAR.Dropper File-based Trojan Horse Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.A!400 Heur.AdvML.A!500 Heur.AdvML.B!100 Heur.AdvML.B!200 Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Ghostpulse malware loader A new campaign has been reported using spurious MSIX Windows app package files to distribute a new malware loader dubbed Ghostpulse. The threat actors behind it have been employing tactics such as malvertising and search engine optimization poisoning to lure users into downloading free Windows installers for popular web browsers like Google Chrome, Microsoft Edge, and Brave. Ghostpulse employs a technique known as process doppelgänging to execute various types of malware, including SectopRAT, Rhadamanthys, Vidar, Lumma, and NetSupport RAT. Symantec protects you from this threat, identified by the following: File-based JS.Malscript!gen3 Trojan.Gen.NPE Web.Reputation.1 WS.Malware.1 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Ghostscript Vulnerability (CVE-2021-3781) A bug in GhostScript was discovered by a researcher a year ago and was presented in a cybersecurity conference that took place a couple of weeks back. Ghostscript is a small library that allows applications to process PDF documents and PostScript-based files. The talk was about a 0-day (RCE exploit chain) vulnerability in the software that directly affects ImageMagick. After several days, another researcher decided to publish a POC via Github prior to the patch that was only just released on September 9, 2021 by Artifex. This act posed a security risk, potentially allowing threat actors to grasp the opportunity and leverage the flaws in their attacks. CVE-2021-3781 was assigned to identify the vulnerability. Symantec protects you from this threat, identified by the following: File-based Bloodhound.Exploit.842
Gigabud Android RAT Gigabud is a recently discovered mobile Remote Access Trojan (RAT) for Android. The malware includes various functionalities such as the collection of data about the infected device, theft of banking credentials, abuse of accessibility services and screen recordings, among others. Gigabud was initially seen in attacks targeted at users in Thailand back in July 2022. Later though its usage expanded to many other countries. The malware is distributed under the disguise of apps associated with known banking brands or governmental entities. Symantec protects you from this threat, identified by the following: Mobile-based Android.Reputation.1 Android.Reputation.2 Web-based Observed domains/IPs are covered under security categories
GitLab Account-Take-Over vulnerability CVE-2023-7028 CVE-2023-7028 is an Account-Take-Over vulnerability rated as critical (CVSS score of 10). The vulnerability impacts the authentication mechanisms of the GitLab Community Edition (CE) and Enterprise Edition (EE) applications. If successfully exploited the flaw allows attackers to take over Gitlab accounts without user interaction. GitLab has published fix in product versions 16.7.2, 16.5.6, and 16.6.4. The fix has also been backported to product versions 16.1.6, 16.2.9, and 16.3.7. Symantec protects you from this threat, identified by the following: Network-based Attack: GitLab Account-Take-Over Vulnerability CVE-2023-7028
Gitlab Path Traversal Vulnerability CVE-2023-2825 CVE-2023-2825 is a recently disclosed critical (CVSS score: 10.0) path traversal vulnerability affecting Gitlab Community Edition (CE) and Enterprise Edition (EE) version 16.0.0. If exploited the vulnerability could allow unauthenticated users to read arbitrary files present on the Gitlab server through a path traversal bug. This could lead to exposure of confidential data, software code or other proprietary information. GitLab has released an emergency security update in version 16.0.1 to address this vulnerability. Symantec protects you from this threat, identified by the following: Network-based Attack: Gitlab Path Traversal Vulnerability CVE-2023-2825
Global Agent Tesla campaign fueled by sanitizer & soap dispenser technology lure As the world continues to grapple with the COVID-19 pandemic, many organizations and businesses around the world have expanded their budgets to address the virus in the workplace. One measure that at least some organizations have implemented is the use of sensors and dispensers, such as those for hand sanitizer and soap in order to promote hand hygiene and help reduce the spread of the virus. Cybercriminals have taken advantage of this over the past two years. In a recent example, Symantec observed an actor purporting to be from a company that provides sensor technology for these dispensers in an order-themed malicious email campaign targeting organizations around the world, including Japan, Hong Kong, Singapore, China, Israel, the US, India, and the UK. If a victim is successfully lured they'll end up being compromised with the notorious Agent Tesla malware. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products File-based Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B
Global Remcos campaign observed with a focus on Japan Remcos is a sophisticated and prevalent remote access trojan (RAT) that's been around for a few years now. While the vector of infection hasn't changed much, mostly still being distributed via malicious emails in both targeted and non-targeted campaigns, we have seen groups and individuals cycle through different modus operandi in their attack chain. Recently, one campaign stood out as the actor targeted companies worldwide with a focus on Japan. They have been employing the overused, run-of-mill social engineering quote that appears to still be relatively effective (subject: 見積のリクエスト:RFQ-2022080902401220JP). These emails contain an image attachment and within that, the Remcos binary. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products File-based Trojan Horse Machine Learning-based Heur.AdvML.C
GlobeImposter ransomware is back in recent campaigns GlobeImposter, an old ransomware variant discovered back in 2017, has been reported to be active in some recent campaigns targeting MS-SQL Servers. The threat actors behind the attack seem to be exploiting poorly secured servers either via known vulnerabilities or through a series of brute force and dictionary attacks. Once access to the servers is obtained, the ransomware binaries get deployed. GlobeImposter can terminate selected database services and delete volume shadow copies before encrypting the victim's data. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.SuspBeh!gen54 SONAR.SuspDrop!gen7 File-based Downloader Ransom.Cryptolocker Ransom.GlobeImposter Scr.Malcode!gdn14 Scr.Malcode!gdn32 Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories
GlorySprout Infostealer A new infostealer, named GlorySprout, written in C++ with a Golang back-end panel, has been observed being advertised on hacker forums. While the infostealer advertises AntiVM and keylogging capabilities, it also employs API hashing, string obfuscation, and scheduled tasks for persistence. It features support for log backup and exclusion of logs from specified countries or IPs. Upon compromising a system, it has the capability to target sensitive data such as browser history, cryptocurrency wallets, gaming accounts, and messaging apps, and exfiltrate collected data to its C2 server. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Untrst-RunSys!g1 ACM.Vss-DlShcp!g1 File-based Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.B!100 Network-based Audit: Bad Reputation Application Activity Audit: Untrusted Telegram API Connection System Infected: Trojan.Backdoor Activity 564 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
GlowSand - malicious campaign targeting Ukraine According to a recent report, a new targeted activity against organizations in Ukraine has been observed in the wild. The campaign dubbed GlowSand leverages malicious MS Office XML documents masqueraded as payroll data, among others. The malware payloads are distributed from remote servers configured to allow only downloads from Ukrainian IP addresses. The purpose of these attacks seems to be to establish a foothold on the compromised networks, information gathering and download additional payloads. Symantec protects you from this threat, identified by the following: File-based CL.Downloader!gen203 ISB.Downloader!gen53 Trojan.Gen.2 Trojan.Gen.NPE Trojan.Mdropper W97M.Downloader Web-based Observed domains/IPs are covered under security categories
Glupteba malware evolves with UEFI bootkit In recent campaigns, Glupteba malware has been observed deploying a Unified Extensible Firmware Interface (UEFI) bootkit installer binary disguised as a legitimate Windows binary. The threat actors behind these campaigns have exploited the extensive reach of PPI services to facilitate widespread infections. The UEFI bootkit possesses the ability to intervene and manipulate the boot process of the operating system, thereby enabling Glupteba to effectively conceal its presence. This highlights the continuous evolution of the threat actors' tactics and techniques. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.Glupteba!gen2 SONAR.TCP!gen6 File-based Hacktool.Efiguard Trojan.Glupteba WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Network-based System Infected: Trojan.Backdoor Activity 634 (33246) Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
GO#WEBBFUSCATOR campaign leverages steganography and malicious macros A new malicious campaign dubbed GO#WEBBFUSCATOR has been discovered in the wild. The attackers are leveraging malspam emails containing malicious MS Word documents with obfuscated macros. Once executed, a JPG file featuring an image from the James Webb telescope is downloaded and later decoded into a malicious executable written in Golang programming language. The malware establishes a DNS connection to the attackers C2 server and starts sending encrypted queries. According to the reports, the malware has been observed to run arbitrary enumeration commands, a standard first reconnaissance step. Symantec protects you from this threat, identified by the following: File-based ISB.Downloader!gen433 Trojan Horse Trojan.Gen.MBT W97M.Downloader WS.Malware.1 Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed IPs/domains are covered under security categories
GoAnywhere MFT RCE vulnerability exploited in the wild CVE-2023-0669 is a remote code execution vulnerability in GoAnywhere MFT, a managed file transfer solution. Successful exploitation of the vulnerability can allow remote attackers to execute arbitrary code. The vendor has released a patch to address the vulnerability. Meanwhile Symantec is currently observing this vulnerability to be exploited in the wild. Symantec protects you from this threat, identified by the following: Network-based Web Attack: GoAnywhere MFT RCE CVE-2023-0669
GoatRAT Android banking trojan GoatRAT is another android banking trojan variant utilizing the ATS (Automated Transfer System) framework that allows the actors to perform several fraudulent operations automatically without needing manual or remote interaction from the operator's side. Once the user opens the targeted banking application, the malware will display an overlay layer which will collect banking credentials, send them to C2 servers controlled by the attackers and initiate a transfer of money from the victim's account to the attacker. GoatRAT has been seen in campaigns targeting users of Brazilian banks that leverage the PIX instant payment platform. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk Android.Reputation.2 AppRisk:Generisk Web-based Observed domains/IPs are covered under security categories
GoBruteforcer - a new Golang-based botnet GoBruteforcer is a new botnet variant written in the Golang programming language. The botnet targets web servers running services such as phpMyAdmin, MySQL, FTP and Postgres. Once the targeted vulnerable host has been scanned, the botnet will attempt entry via a brute force password attack. Upon successful login on the targeted system, GoBruteforcer will deploy and execute an internet relay chat (IRC) bot that connects to the attacker's pre-configured servers and awaits further commands. Symantec protects you from this threat, identified by the following: File-based PHP.Backdoor.Trojan Trojan Horse Trojan.Gen.NPE WS.Malware.1 Web-based Observed domains/IPs are covered under security categories
GodFather Android malware targets Turkish users in a new campaign GodFather Android banking malware comes back in a new campaign targeting users from Turkey. This time around the malware is distributed via an installer masqueraded as MYT Müzik application. GodFather malware has the functionalities to steal confidential data from the compromised devices including SMS messages, device details and various app data. The malware might be also used to control the screen via VNC and to inject banking URLs. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk Android.Reputation.2 AppRisk:Generisk
Going out for wool and coming home shorn Security Response came across a file with an interesting name "Wi-Fi Hack Help.exe", which actually turned out be a Remote Access Trojan (RAT). Looking at the file name, one could assume the file might have been advertised with the intent of illicitly accessing nearby Wi-Fi, or possibly used to steal Wi-Fi credentials from machines it gets installed on. The file is a literal booby trap intended to "boomerang-hack" the user, as it's design allows it to carry out a host of malicious actions, including stealing browser credentials, keylogging and taking screenshots, just to name a few. Symantec offers the following protection against this threat: File-based W32.Extrat
Goldoson Ad Fraud Ad fraud is still widely used by groups and individuals around the world because it can be highly lucrative, and mobile users are prime targets. One ad fraud campaign recently reported in South Korea was conducted via an Android adware known as Goldoson. It typically works by simulating user clicks on mobile ads, generating fraudulent impressions and clicks that inflate the ad revenue earned by the attacker. On top of that, it is also able to collect sensitive information such as GPS location, Wi-Fi and Bluetooth device information, as well as a list of installed applications. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk AppRisk:Generisk