text
stringlengths 0
383k
|
---|
Increased abuse of Discord webhooks by cybercriminals
Over the past few months, there has been an increase in the number of infostealers that use Discord to report stolen data through automated messages sent via Discord webhooks. These run-of-the-mill infostealers often share similarities in their code, with many being based on copies or forks of other infostealers. They are commonly shared through public sources such as software development and version control hosting services, as well as hacker forums and websites. Creal, Prisonizme and Vert are recent examples of infostealers that have been observed in the wild by Symantec, typically being delivered through drive-by-downloads disguised as cracked software or hacktools.
Symantec protects you from these threats, identified by the following:
File-based
Trojan.Gen.MBT
Trojan.Gen.NPE
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C |
Increased activity observed for the Aurora Stealer
Aurora Stealer is a Golang-based infostealer variant sold in a form of Malware-as-a-Service (MaaS) offering. The malware emerged first in 2022 and has seen several improvements and updates being added since the initial release. Aurora has fairly typical infostealing capabilities and it aims at theft of system information, credentials, banking information, cryptocurrency wallets, cookies and others. In the last several weeks, Symantec has observed an increase in malicious activities associated with distribution of Aurora Stealer, which might indicate that this malware family is gaining in prevalence on the threat landscape.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.ProcHijack!g45
SONAR.Susp.Beh!gen93
SONAR.SuspLaunch!g52
SONAR.SuspLaunch!g266
SONAR.TCP!gen1
File-based
Infostealer
Infostealer.Aurora!g1
Packed.Generic.528
Packed.Generic.616
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Heur.AdvML.C
Network-based
System Infected: Aurora Infostealer Activity
System Infected: Trojan.Backdoor Activity 634
System Infected: Trojan.Backdoor Activity 735 |
Increased activity related to Rhysida ransomware
According to the latest HC3 (Health Sector Cybersecurity Coordination Center) advisory, there has been an increase of activity associated to the Rhysida ransomware. Rhysida comes in the form of Ransomware-as-a-Service (Raas), was first seen in the wild back in May and has been used actively in several distribution campaigns since that time. The attackers behind Rhysida are targeting educational, healthcare, governmental and manufacturing sectors, among others. The attacks distributing Rhysida are known to leverage phishing campaigns for initial access and Cobalt Strike beacons further down the infection chain. The malware employs a multi-threaded encryption process, contains a hardcoded list of excluded extensions/directories and appends .rhysida extension to the encrypted files. The most recent variants have also been observed to delete shadow copies and clear event logs on the infected endpoints.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.Ransom!gen10
SONAR.Ransomware!g1
SONAR.Ransomware!g2
SONAR.Ransomware!g3
SONAR.SuspLaunch!g18
SONAR.TCP!gen1
File-based
Downloader
Ransom.Rhysida
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.B
Heur.AdvML.C |
Increased ProxyShellMiner activity observed
We recently observed a ping spike in one of our IPS coinminer signatures. Upon further analysis, we found that the behavior is associated with ProxyShellMiner. It has been observed that the miner is delivered after attackers have successfully infiltrated into an organization's network by exploiting ProxyShell vulnerabilities CVE-2021-34473 and CVE-2021-34523 in Windows Exchange servers. ProxyShellMiner uses a technique called “process hollowing” to inject the miner into installed browsers on the compromised system and to start the coin-mining process. ProxyShellMiner can cause service outage, degrade server performance and disrupt business networks. Once the attackers have gained access to the network, they can perform additional malicious actions such as backdoor deployment or remote code execution.
Symantec's network protection technology, Intrusion Prevention System (IPS) blocks this coin mining activity to prevent damage to the system. IPS also blocks the exploitation attempts for the ProxyShell vulnerabilities.
Symantec protects you from this threat, identified by the following:
Network-based
System Infected: Trojan.Coinminer Activity 32
Web Attack: Microsoft Exchange Server CVE-2021-34473
Web Attack: Microsoft Exchange Server Elevation of Privilege CVE-2021-34523
Web Attack: Microsoft Exchange Server RCE CVE-2021-34473 |
Increased risk of BlackMatter ransomware attacks
Symantec Security Response is aware of recent CISA and FBI alerts about the increased number of activities observed for the BlackMatter Ransomware. BlackMatter was first seen around July 2021 and is believed to be a rebranded variant of the Darkside ransomware. Blackmatter has been leveraged in various campaigns targeting multiple organizations and critical infrastructure entities. As well as the Windows variant of the malware, a Linux encryptor version also exists and it has been used by the attackers to target ESXi virtual servers.
Symantec protects you from this threat, identified by the following:
File-based
Downloader
Linux.RansomDarkside
Linux.RansomDkside!g1
Ransom.Blackmatter
Ransom.Blackmatter!g1
Ransom.Blackmatter!g2
Ransom.Blackmatter!gm1
Ransom.Darkside!gen5
Ransom.Darkside!gen6
Trojan Horse
Trojan.Gen.MBT
Behavior-based
SONAR.RansomBlkMat!g1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Network-based
Attack: Ransom.Gen Activity 29
System Infected: Ransom.Gen Activity 40 |
Increased risk of Conti ransomware attacks
Symantec Security Response is aware of recent CISA and FBI alerts about the increased number of activities observed for the Conti Ransomware. Conti is a ransomware family that was first reported around July 2020 and is being regarded as a Ryuk ransomware successor. Already this year Conti has been seen multiple times actively targeting companies around the world. Conti attackers leverage double-extortion tactic by also stealing data from compromised victims prior to encryption. This tactic is used to encourage the victims into paying the ransom in order to avoid the public release of the confidential data.
Symantec protects you from this threat, identified by the following:
File-based
CL.RansomConti!gen1
CL.RansomConti!gen2
Heur.AdvML.B
Heur.AdvML.C
ISB.RansomConti!gen1
ISB.RansomConti!gen2
Ransom.Conti
Ransom.Conti!gen2
Ransom.Conti!gen3
Ransom.Conti!gen4
Ransom.Conti!gen5
Ransom.Conti!gen6
Ransom.Conti!gen7
Ransom.Conti!gen8
Trojan Horse
Behavior-based
SONAR.Cryptlck!g171
SONAR.Ransomware!g19
Network-based
Attack: Ransom.Conti Activity
Attack: Ransom.Conti Activity 2
Attack: Ransom.Conti Activity 3
Attack: Ransom.Gen Activity 29
Attack: Ransom.Gen Activity 33 |
Increase in activity for Clop ransomware
February and March 2023 have seen an increase in malicious activity attributed to the Clop ransomware. The Clop ransomware family was initially identified in 2019 and has since been regularly seen to target organizations and institutions via a variety of infection channels, including spear phishing, exploitation of vulnerable servers, and RDP brute force attacks. The most recent attacks have made use of the Fortra GoAnywhere MFT (CVE-2023-0669) vulnerability to spread the malware. This is yet another occurrence where the threat actors behind Clop (TA505) are taking advantage of flaws in file transfer software. Back in 2021, they leveraged a vulnerability in Accellion File Transfer Appliance (FTA).
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
File-based
Packed.Generic.620
Ransom.Ploc
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Network-based
Web Attack: GoAnywhere MFT RCE CVE-2023-0669 |
Increase in phishing utlizing URLs with ports
Threat actors continue to evolve their obfuscation techniques attempting to evade detection. In this recent campaign messages include a URL with an appended port number that rotates in the messages sent out during the run (hxxp://example[.]com:0808). The messages range in topics from bank transfers to account closures enticing users to click the link inside the message and provide their credentials.
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. |
Increase in weight loss promotion spam
Symantec has recently observed an increase in weight loss related spam with suspect URL containing recently registered domain "carbofixhero[.]icu" in the link path. The URL leads to a progress bar which then presents a "Continue" button that leads to a site to purchase diet pills.
The mails have changing senders, subject lines, and URL pattern containing the aforementioned domain.
Sample Subjects:
If Your Metabolism Has Always Been Slow...
The key to turning on your metabolism
Turn up your metabolism whenever you want.
You can do in less than 3 seconds to start burning it off
Protections
Protection is in place for Symantec's email security products. Email Threat Isolation (ETI) technology from Symantec provides an extra layer of protection |
Increase of activity noted for Jupyter infostealer
An increase of activity has been recently observed for the Jupyter malware. Jupyter is an infostealer variant initially discovered in 2020 and known to be delivered via relatively common attack vectors such as drive-by downloads, phishing emails or malvertizing. The malware has the functionality to harvest credentials and data stored in various web-browsers and later exfiltrate the collected information to the C2 servers controlled by the attackers.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
Ws.Malware.2
WS.Reputation.1
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
Increase of activity related to Truebot malware
According to the latest CISA (Cybersecurity and Infrastructure Security Agency) advisory, new variants of Truebot malware have been recently leveraged in activities targeted at organizations in the United States and Canada. TrueBot is known to primarily be distributed via phishing emails but now attackers are also delivering the malware via exploitation of CVE-2022-31199, a remote code execution (RCE) vulnerability in the Netwrix Auditor software which allows unauthorized attackers to execute malicious code with the SYSTEM user's privileges. Truebot botnet has been widely used in the past by threat actors associated with the Cl0p ransomware.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
File-based
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Heur.AdvML.C
Network-based
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Increase of Lockbit ransomware attacks
Lockbit has been one of the most active ransomware variants in the last few weeks. This malware is sold as part of a Ransomware-as-a-Service (RaaS) offering. According to the latest reports, the threat group behind it has been actively recruiting for new affiliates. One of the most recent developments in this ransomware variant is it's novel technique to deploy itself to Active Directory clients via Group Object Policies (GPOs).
Symantec protects you from this threat, identified by the following:
File-based
Downloader
Heur.AdvML.B
Heur.AdvML.C
Ransom.Lockbit
Ransom.Lockbit!g2
Ransom.Lockbit!gen3
Ransom.Lockbit!gen4
Ransom.Lockbit!gm1
Trojan Horse
Trojan.Gen.MBT
Behavior-based
SONAR.RansomLckbit!g1
SONAR.RansomLckbit!g2
SONAR.RansomLckbit!g3
SONAR.SuspReg!gen28
Network-based
Attack: Ransom.Lockbit Activity
Attack: Ransom.Lockbit Activity 2
Attack: Ransom.Lockbit Activity 3 |
Increase of malware distribution via Google Ads
There has been a notable spike of different malware variants distributed via abuse of the Google Ads platform in the recent weeks. The infection chain is usually very straightforward - users searching for a particular piece of software to download, click on Google search ads that lead them to fake websites purporting to be legitimate download portals. The attackers masquerade the malicious executables as installers for known legit applications or tools such as Zoom, LibreOffice, Rufus, 7-Zip, WinRaR, VLC-Player, Notepad++ and many others. The recent campaigns have been distributing a wide range of malware families this way. Just to name few of the recently observed ones: Rhadamanthys Stealer, BatLoader, Ursnif, IcedID, Redline Stealer, Vidar Stealer and others.
Symantec protects you from this threat, identified by the following:
File-based
MSIL.Downloader!gen7
Scr.Malcode!gdn14
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Network-based
Malicious Site: Malicious Domain Request 21
Malicious Site: Malicious Domain Request 22
Malicious Site: Malicious Domain Request 114
System Infected: Trojan.Backdoor Activity 592
System Infected: Trojan.Backdoor Activity 634
System Infected: Trojan.Backdoor Activity 735
Web-based
Observed domains/IPs are covered under security categories |
Increase of SideCopy APT activities
According to a recently released report, there has been a spike of activities associated with the APT group known as SideCopy. The group has been targeting governmental institutions though several distinct infection chains and have been deploying a variety of remote access trojans (RATs) such as: NjRAT, CetaRAT, Allakore, MargulasRAT and EpicenterRAT.
Symantec protects you from this threat, identified by
File-based
Backdoor.Ratenjay
Backdoor.Ratenjay!gen3
Heur.AdvML.B
Heur.AdvML.C
ISB.Downloader!gen67
JS.Downloader
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.NPE
Network-based
System Infected: Backdoor.Ratenjay RAT Activity
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed IPs/domains are covered under security categories. |
Increase of SmokeLoader attacks on Ukrainian institutions
An increase of activities targeted at Ukrainian organizations and governmental entities has been reported by Ukraine's National Cyber Security Coordination Center (NCSСС). The threat actors have been leveraging the SmokeLoader malware in their attacks dating back to at least May this year. This modular malware is spread through phishing campaigns and once on the infected endpoint it can extract credentials, confidential information, collect emails and files, intercept keystrokes but also lead to download and execution of additional arbitrary payloads.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.ProHijack!g45
SONAR.TCP!gen1
File-based
ISB.Downloader!gen60
ISB.Downloader!gen68
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
WS.Reputation.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Indian banking customers targeted in new campaigns spreading mobile malware
New malicious SMS campaigns targeting Indian banking customers have been observed in the wild. The attackers are leveraging fake banking websites which offer points redemption for vouchers or cash. The websites impersonate portals of well know banks such as HDFC, Axis or SDI. In some related campaigns the threat actors have also been using ‘Know Your Customer’ (KYC) identity verification templates for scamming, prompting users for urgent verification and threatening with account lock out otherwise. The malware distributed in those campaigns is used for collection of customers' banking details and credentials.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
Android.Reputation.2
AppRisk:Generisk
Web-based
Observed domains/IPs are covered under security categories |
Indonesian Businesses Targeted in an Agent Tesla Campaign
Symantec has recently observed an individual or group running a targeted malspam campaign against Indonesian organizations, although instances have been seen in neighboring countries. The actors are purporting themselves as a leading Indonesian bank and employing financial transaction social engineering tactics.
The malicious emails (subject: PEMBERITAHUAN PEMERIKSAAN DOKUMEN [targeted company's name]) are written in Indonesian and contains a malicious archive attachment (_DOCUMENT_MAIL_MK77123.PDF.gz). Within that .GZ archive is a malicious PE file within (_DOCUMENT_MAIL_MK77123.PDF.exe) which when executed will deploy Agent Tesla onto the user's machine. This threat is highly prevalent and specializes in stealing sensitive information such as login credentials, financial data, and personal documents.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Behavior-based
SONAR.Stealer!gen1
File-based
Scr.Malcode!gdn34
Trojan.Gen.NPE
Machine Learning-based
Heur.AdvML.B!200 |
Indonesia – Wedding invites used as lure by an SMS thief
In mid-2023, an actor have been observed sending SMS messages to mobile users in Indonesia, enticing them to install an application posing as a wedding invitation. Over the past few months, more of these malicious applications have been detected. The malware's primary goal is to collect SMS messages and send them to the author's Telegram channel via a Telegram bot API.
Observed app names,
UNDANGAN PERNIKAHAN DIGITAL_1.0.apk
Surat Undangan.apkAcara Resepsi_1.0.apk
Surat Undangan Online0.apk
Surat Undangan Wedding Digital_ok.apk
Undangan-resmi.apk
Undangan pernikahan-1.0.apk
Malicious actors usually target SMS messages for several reasons. Firstly, SMS often contains sensitive information such as one-time passwords (OTPs) and transaction confirmations, which can be exploited for financial fraud or identity theft. Secondly, by intercepting SMS containing authentication codes, malware can bypass two-factor authentication, granting unauthorized access to accounts. Additionally, intercepted SMS can be utilized for espionage, surveillance, or personal spying, enabling attackers to monitor communications or track individuals. Social engineering attacks can be facilitated by crafting convincing phishing messages using stolen SMS content. Furthermore, attackers may resort to blackmail or extortion using compromising information obtained from SMS. Lastly, stolen SMS data can be sold for profit on the dark web or to other malicious actors interested in exploiting the data.
Symantec protects you from these threats, identified by the following:
Mobile-based
Android.Reputation.1
AppRisk:Generisk |
Infected USB Drives Dropping SOGU and SNOWYDRIVE Malware
Researchers have reported campaigns which are focused on leveraging USB flash drives as their initial vector. After the initial compromise, SOGU targets will be enticed to launch a legitimate file that is packed with a malicious DLL loader. With SNOWYDRIVE, intended victims will be lured to click on malware masquerading as a legitimate file.
This main goal of these malware is to exfiltrate data and they were found to support a wide range of commands, including file transfer, file execution, remote desktop, screenshot capture, reverse shell, and keylogging.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
File-based
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.2
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
Inferno Drainer Scam-as-a-Service
With campaigns observed on a daily basis, Crypto and NFTs are constantly at risk of having their assets stolen by malware and phishing actors. One notable campaign involved the use of "Inferno Drainer" Scam-as-a-Service, a cybercrime offering where individuals or groups provided fraudulent services or tools for a fee or a percentage of profits. Inferno Drainer utilizes malicious scripts that mimic popular Web3 protocols, enabling it to connect with cryptocurrency wallets and obtain user consent to authorize transactions.
Over the past year, the actors behind Inferno Drainer have created over thousands of phishing domains, targeting various well-known crypto and NFT transaction services. Reports suggest that they have potentially stolen millions of dollars worth of cryptocurrency transactions. Despite the official shutdown of Inferno Drainer by its operators, its consumers are still at large and actively seeking other scam-as-a-service schemes for their participation.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
Influx of malicious apps and websites impersonating ChatGPT-like AI tools for malware delivery
There has been a considerable increase in malicious activities leveraging fake apps, installers and websites mimicking ChatGPT and similar AI tools since the beginning of this year. Common techniques employed by the attackers involve phishing and malicious advertisements via popular search engines or media platforms with the aim of malware deployment to unsuspecting users. Recently observed campaigns involve domains masqueraded as some of the most popular AI tools and platforms, including ChatGPT, Midjourney, Google Bard or Dall-e. One of the malware families distributed in such campaigns has been the Redline Stealer, which is a very well-known and popular infostealing malware variant used to exfiltrate sensitive data, credentials, cookies or cryptocurrency wallets, among others.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
File-based
Trojan Horse
Trojan.Gen.NPE
Trojan.RedLineStealer
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Network-based
System Infected: Redline Stealer Activity
System Infected: Redline Stealer Activity 2
System Infected: Trojan.Backdoor Activity 634
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories |
Information-stealing malware 'NodeStealer'
NodeStealer is written in Javascript, executed through Node.js. and will be distributed as a Windows executable file masquerading as a PDF or an Excel document. If launched, Node.js's auto-launch module will add a new registry key to gain foothold on the victim's machine between reboots. NodeStealer allows threat actors to steal browser cookies that can be leveraged to hijack Facebook accounts as well as Gmail and other outlook accounts across various platforms including Linux, macOS and Windows.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.2
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.B
Heur.AdvML.B!200
Web-based
Observed domains/IPs are covered under security categories |
Infostealers deployed in recent Shuckworm campaigns targeting Ukraine
Symantec, a division of Broadcom Software, has recently observed an attack targeting Ukraine by delivering Shuckworm to targeted networks, which is an information-stealing malware. This activity was ongoing as recently as August 8, 2022 and much of the activity observed in this campaign is consistent with the activity that CERT-UA highlighted on July 26. Shuckworm (aka Gamaredon, Armageddon) is a Russia-linked group that has almost exclusively focused its operations on Ukraine since it first appeared in 2014. It is generally considered to be a state-sponsored espionage operation.
Read more in our blog: Shuckworm: Russia-Linked Group Maintains Ukraine Focus
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.SuspBeh!gen6
File-based
Backdoor.Ratenjay
SMG.Heur!gen
Trojan Horse
Trojan.Gamaredon
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Web-based
Observed IPs/domains are covered under security categories |
Infostealer written in AutoIt distributed in campaigns against Ukraine and Georgia
According to a recently released report, a series of malicious campaigns initially targeting Ukrainian government entities has now branched out to targets in Georgia. The attackers leverage phishing emails to spread an info-stealing malware written in the AutoIt programming language. The infostealer collects data from the compromised machines and uploads it to a preconfigured C&C server.
Symantec protects you from this threat, identified by the following:
File-based
Bloodhound.RTF.12
Bloodhound.RTF.20
CL.Downloader!gen10
CL.Downloader!gen38
Heur.AdvML.B
Heur.AdvML.C
Infostealer
ISB.Downloader!gen80
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
Trojan.Mdropper
W97M.Downloader
Network-based
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed IPs/domains are covered under security categories. |
Infy APT distributes Foudre and Tonnerre malware
Symantec Security Response has been aware of the reported activities of an APT group dubbed as Infy. The group has been targeting victims from various countries across the globe in a series of espionage campaigns dated back to 2017. Two distinct malware families used by Infy in the recent campaigns are known to be Tonnerre and Foudre.
Symantec provides the following detections against the malware associated to Infy activities:
File-based
Trojan.Gen.2
Trojan Horse
Trojan.Gen.NPE
Trojan.Gen.MBT
W97M.Downloader |
InkySquid APT exploits browser vulnerabilities to spread the Bluelight malware
A new report emerged about the latest activities of the APT group known as InkySquid. In the recent campaign, the threat actors have managed to compromise an online newspaper webpage by injecting malicious code to redirect the users to load malicious Javascript from the attacker-owned domain. The APT group has been leveraging here a browser vulnerability CVE-2020-1380 as well as a Cobalt Strike stager used to deliver Bluelight malware as a final payload. In another campaign InkySquid has been exploiting a different browser vulnerability - CVE-2021-26411, while the payload remained the same as in the campaign leveraging CVE-2020-1380.
Symantec protects you from this threat, identified by the following:
File-based
Heur.AdvML.C
Trojan Horse
Network-based
Web Attack: Internet Explorer RCE CVE-2021-26411
Web Attack: Microsoft Internet Explorer CVE-2020-1380 |
Inlock ransomware
Inlock is another run-of-the-mill ransomware variant seen in the wild. The malware encrypts user data and appends .inlock extension to the encrypted files. Besides dropping a ransom note in a form of .txt file, Inlock will also change the desktop wallpaper on the infected machine and delete Volume Shadow Copies.
Symantec protects you from this threat, identified by the following:
File-based
Scr.Malcode!gdn32
Trojan Horse
WS.Malware.1
Machine Learning-based
Heur.AdvML.C |
Internet Archive abused in phishing wave
On a daily basis there are literally millions of phishing attempts to obtain sensitive information such as usernames and passwords of various Internet services from consumers and company employees. Exposing them all is a daunting task. One common trick that continues to be used is malware operators abusing the well-known Internet Archive to generate phishing pages. Symantec has recently observed one of these instances where spam emails purporting to be from Microsoft contained a URL redirect to a tailored phishing page in the Internet Archive library, hoping someone would insert their email credentials.
Protection
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. |
Internet Explorer flaws exploited in recent campaigns spreading the Magniber ransomware
Magniber ransomware gang has been reported leveraging two Internet Explorer (IE) vulnerabilities as well as malicious advertisements in their latest attacks. The two exploited IE vulnerabilities are tracked as CVE-2021-26411 and CVE-2021-40444 and both have been patched by Microsoft back in March and September respectively.
Magniber, which first appeared in 2017 as the successor to the Cerber ransomware, mainly targets organizations in Asia. The ransomware does not employ double extortion tactics, relying instead solely on file encryption.
Symantec protects you from this threat, identified by the following:
File-based
Exp.CVE-2021-26411
Exp.CVE-2021-40444*
ISB.CVE-2021-26411!g1
Ransom.Magniber
Ransom.Magniber!gen1
Ransom.Magniber!gen2
Trojan.Gen.MBT
Behavior-based
SONAR.RansomMgnibr!g1
SONAR.RansomMgnibr!g2
Network-based
Attack: Ransom.Gen Activity 29
Web Attack: Internet Explorer RCE CVE-2021-26411
Web Attack: Microsoft MSHTML RCE CVE-2021-40444 |
Invicta Stealer promoted via social media channels
Invicta Stealer is a new malware promoted by its' creators via various social media platforms such as Telegram and YouTube. Invicta is an infostealer capable of system information collection, theft of browser data, cookies, banking details, cryptocurrency wallets and other data from applications such as Discord, Steam or KeyPass. Invicta Stealer has been already observed in distribution campaigns leveraging malspam emails masqueraded as refund invoices from GoDaddy (a well-known web hosting company). The emails include malicious .html files leading to the infection with the infostealer payload.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
File-based
MSH.Downloader
Trojan Horse
Trojan.Gen.NPE
Trojan.Malscript
WS.Malware.1
Machine Learning-based
Heur.AdvML.B |
iOS and Android spyware masquerades as "Korean Video App"
An application widely used in Asia and explicitly designed for escort services, is actually a stealthy Spyware program designed to gather confidential information about an individual. The program can perform a variety of functions on the compromised device such as the gathering of contacts, reading and collecting SMS data and fetching location details, and further access can be extended into collecting albums and device details. The particulars, illegally secured, will sooner or later doubtless be used to blackmail the victim.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.MBT
Trojan.Gen.2
W97M.Downloader
Mobile-based
Android.Reputation.2
Web-based
Observed Domains are covered under security categories |
GoldDigger is an Android banking trojan malware originally seen in October 2023 targeting Android users in Vietnam. A new variation named GoldPickaxe for Android and iOS has been observed in the wild. The iOS version can be used by attackers to collect facial biometrics and other identity information to overcome biometric banking authentication and gain illicit access to accounts. It can also abuse Accessibility Services on the infected device in order to exfiltrate personal data, SMS messages, 2FA credentials, banking credentials, and data from cryptocurrency apps and wallets.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
WS.SecurityRisk.3
Mobile-based
Android.Reputation.2
OSX.Trojan.Gen
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
IPStorm goes after Linux platforms
According to reports, IPSstorm, a Golang malware and known to use p2p network, has recently added Linux support. A new variant has been observed targeting Linux platforms, for which Symantec has the following coverage in place:
File-based:
Trojan.IPStorm
Trojan.Horse
Backdoor.Trojan
WS.Malware.2
Website-based
This attack is proactively blocked by Symantec Web Isolation technology |
Iranian bank with international branches targeted by an Android FakeBank
FakeBank is a type of Android malware designed to harvest mobile users' sensitive data related to financial institutions. Techniques range from fake login screens to call forwarding (aka vishing) and SMS snooping. They have been present in the mobile threatscape for many years now, their prevalence steadfast.
In a recent example, Symantec has observed a fake bank actor targeting users of one of the largest commercial banks in Iran, which has international branches including locations in Europe, the Middle East, and Central Asia. The malicious app (likely distributed via malicious SMS) has been crafted to appear as an official banking app from the targeted bank. It is hosted on malicious domains that are typosquatting the bank's name in order to better lure users into a false sense of legitimacy.
Symantec protects you from this threat, identified by the following:
Mobile-based
AppRisk:Generisk
Symantec Endpoint Protection Mobile is able to analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake domain used in this campaign are known to WebPulse.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Irata's Arabic Stock App Ploy
Irata (aka Iranian remote access trojan) is an Android banking malware with spyware capabilities that has been active since at least 2022 and has continuously been observed in the mobile threatscape. Symantec has recently detected increased activity. In one campaign, the groups or individuals behind it have been disguising their malicious binary (saham.apk) as a stock app for Arabic speakers.
The observed apps were hosted on malicious domains, which likely indicates that they were spread via malicious SMS rather than through official or third-party app stores. This modus operandi is a tactic that Irata actors have been known to use.
Symantec protects you from this threat, identified by the following:
Mobile-based
AppRisk:Generisk
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
Irata campaign in Italy posing as a CheBanca mobile app
Another IRATA campaign in Italy has been observed and this time the actors are going after the mobile users of an Italian financial institution that provides banking services (CheBanca). The malicious app "CheBancaToken.apk" is most likely being spread via malicious SMS which is a classic modus operandi of mobile threat actors in recent years. Users would have been provided with a malicious URL (hxxps[:]//www[.]app-nuova[.]com/CheBancaToken.apk) where the fictitious CheBanca app is hosted.
Irata (aka Iranian remote access trojan) is an Android banking malware with spyware capabilities that has been active since at least 2022 and has continuously been observed around the world.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
Symantec Endpoint Protection Mobile is able to analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake domain used in this campaign are known to WebPulse.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
IronNetInjector - a new toolset used by the Turla APT
According to a recently released report, the Turla APT is using a new tool dubbed as IronNetInjector. The tool consists of an IronPython script and an embedded .NET injector, which is used to load the malware onto the targeted system.
Symantec provides the following detections related to this campaign:
File-based
Trojan.Gen.MBT
Trojan Horse |
Is Haron ransomware a knockoff of Avaddon ransomware or a rebranding?
Haron ransomware, first discovered in July 2021, has been seen using a ransom note and leak site similar to those used by Avaddon ransomware. While both are using Thanos ransomware code, Haron is using a version written in C#, while Avaddon was last seen using a C++ version. Haron is using a near duplicate of the leak site, a publicly available version of Thanos and insecure authentication. This indicates that they are likely not a rebranding of Avaddon, who are known to be more sophisticated and write their own ransomware code.
Symantec protects you from these threats, identified by the following:
File-based
Downloader
Ransom.Thanos
Trojan Horse |
Israel-Hamas conflict typo-squatted
On the weekend of October 7th and 8th, dramatic events unfolded in Israel leading to a major conflict with Hamas, a Palestinian political and militant organization. Over the past two days, Symantec has observed more than 170 newly-registered domains that appear to be related to donations, politics, and information surrounding the conflict, which some are referring to as war. While not all observed domains are malicious or shady, Symantec flagged suspicious ones and continues to monitor for malicious activities.
During major incidents, especially those which garner widespread attention like wars and other crises, there's often a surge in Internet activity with people searching for information related to the event. Cybercriminals take advantage of this by creating typo-squatting domains. These domains have names similar to legitimate websites or events but contain slight misspellings or variations. When users make typing errors or misspellings while searching for information on the event, they might end up on these malicious sites instead of the intended ones.
This tactic allows cybercriminals to engage in various nefarious activities such as spreading misinformation, conducting phishing attacks, donation scam or distributing malware. Users may be more vulnerable during these times due to heightened emotions and a sense of urgency to get the latest information.
Symantec protects you from this threat, identified by the following:
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Israel targeted with new ransomware gang 'N3TW0RM'
Last week some researchers brought to light a new ransomware gang targeting Israeli organizations. It is stated that this ransomware shares characteristics with previously seen Pay2Key attacks, which were linked to Fox Kitten hacking group, an Iranian nation-state hacking group.
N3TW0RM uses a client-server model, where the threat actor installs a program on the victim's server and waits listening for connections from the workstations, at which point it deploys an executable on the device to encrypt, via the program PAExec. The encrypted files will have a '.n3tw0rm' extension appended.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.NPE
Trojan Horse
Behavior-based
SONAR.BC.PUA!g12 |
It's 2021 and Joker is still trying to defraud unwary Android users
While it's been active since 2016, the Android malware known as Joker continues its prevalence as more and more show up on the Google Play and in third party app stores. In early 2021, Symantec and others observed multiple Joker apps disguised as legitimate applications that anyone might use such as QR Code reader, Translator, Chat, Contact recovery, News feeds, etc.
The main behavior of this malware is to perform billing fraud. It is capable of sending SMS to premium rate numbers and making purchases via WAP billing. It's also able to steal contact lists, along with SMS and device information.
Symantec has the following coverage in place for the recent activities:
Mobile-based
AdLibrary:Generisk
Android.Reputation.1 |
It's no Joke - malicious apps with Joker Trojan removed from Google Play store
Google recently removed a handful of apps from their store which contained the Joker Trojan. This malware targets Android devices with the intent to steal data. This can include data such as device information, SMS messages, or contacts. Aside from data theft, the malware can also subscribe victims to premium rate services without consent.
Symantec provides the following protections for associated indicators through Symantec Mobile Insight:
Mobile-based
AdLibrary:Generisk
AppRisk:Generisk |
Ivanti SSRF vulnerability CVE-2024-21893
CVE-2024-21893 is a recently disclosed Server-Side Request Forgery (SSRF) vulnerability with a CVSS score of 8.2. The vulnerability affects the SAML component of several Ivanti products, such as Ivanti Connect Secure (9.x, 22.x), Ivanti Policy Secure (9.x, 22.x) and Ivanti Neurons for ZTA. Successful exploitation of the vulnerability can allow attackers access to certain restricted resources without authentication. The vulnerability has been reported as being exploited in the wild.
Symantec protects you from this threat, identified by the following:
Network-based
Web Attack: Ivanti SSRF Vulnerability CVE-2024-21893
Web Attack: Ivanti SSRF Vulnerability CVE-2024-21893 2 |
Ivanti XXE Vulnerability CVE-2024-22024
CVE-2024-22024 is a recently disclosed XML external entity (XXE) injection vulnerability affecting the SAML component of Ivanti Connect Secure and Ivanti Policy Secure products. Successful exploitation of this vulnerability could allow attackers to access certain restricted resources without necessary authentication. The vulnerability has been reported as being exploited in the wild. The vendor has already released patched versions of the vulnerable products.
Symantec protects you from this threat, identified by the following:
Network-based
Web Attack: Ivanti XXE Vulnerability CVE-2024-22024 |
IZ1H9 Mirai variant now exploits even more vulnerabilities
Mirai variant known as IZ1H9 has updated its portfolio of exploited IoT vulnerabilities. The malware currently targets miscellaneous devices including D-Link and Netis routers, Sunhillo SureLine, Geutebruck IP cameras, Zyxel devices, TP-Link Archer, Korenix Jetwave wireless AP, TOTOLINK routers, and others. Upon infection with IZ1H9, the vulnerable devices become part of the botnet, allow the attackers full remote control and can be used to conduct DDoS attacks. The malware also contains a data section with predefined login credentials used in brute-force attacks.
Symantec protects you from this threat, identified by the following:
File-based
Linux.Mirai
Trojan.Gen.NPE
Web.Reputation.1
WS.Malware.1
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
JanelaRAT malware
JanelaRAT malware is a new modified variant of a Remote Access Trojan known as BX RAT. JanelaRAT has been observed prevalently in distribution campaigns targeting banking users from the LATAM region. In an effort to avoid detection, the malware leverages the technique of DLL sideloading into legitimate executables. JanelaRAT functionality includes capture of mouse / keyboard inputs and screenshots of the infected system, among others. The malware contacts the predefined C2 servers over a custom protocol and transmits the extracted information to the attackers.
Symantec protects you from this threat, identified by the following:
File-based
Infostealer.Eynice
ISB.Downloader!gen62
ISB.Houdini!gen7
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
WS.SecurityRisk.4
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Janeleiro banking trojan in Brazil
Trojan "Janeleiro" has been around since 2019 and has made a resurgence in 2021. This threat spreads via phishing emails imitating invoices sent in small batches targeting Brazilian financial institutions.
These messages contain URLs that redirect to a .zip archive hosted on compromised servers. If the victim unzips this archive file, a Windows-based MSI installer then loads and runs the main Trojan DLL.
Janeleiro attempts to deceive its victims with fake pop-up windows created "on-demand" using banking-related keywords that are detected on a compromised machine. These pop-ups are designed to appear to be from some of the largest banks across Brazil and they request the input of sensitive information and banking details from victims.
The malware captures and exfiltrates to its C&C servers allowing a command list that includes options such as controlling windows, killing existing browser sessions – such as those launched in Google Chrome – capturing screens, keylogging, and hijacking clipboard data, among other functions.
Symantec protects you from this threat, identified by the following:
File-based
Heur.AdvML.C
Trojan.Gen.2
Trojan.Gen.MBT
Trojan Horse
Trojan.Malmsi
WS.Malware.1
WS.Malware.2
Behavior-based
SONAR.MalTraffic!gen3 |
Japanese organizations targeted in American Express phishing scam
Phishing actors have been leveraging banks for years to fuel their social engineering efforts in order to snatch financial data from both consumers and enterprises around the world. Symantec observes these campaigns on a daily basis. In a recent example, one actor has been targeting Japanese organizations while posing as American Express via malicious emails. They attempt to lure victims citing bogus card issues such as fraudulent activity or excessive usage. If someone is successfully lured and clicks on the URL within the email, they will be redirected to a fake American Express website.
Observed email subjects,
American Expressカード利用に関する重要なご案内
ご利用金額の超過によるカード利用制限のご案内
カード不正使用の防止にご協力をお願いします - カード利用制限のお知らせ
不正利用の疑いがあります - カードの停止手続きが必要です
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
Web-based
Observed domains/IPs are covered under security categories |
Japanese UCS users targeted in phishing campaign
Symantec has recently identified a phishing campaign in which the perpetrators pretend to be from UCS, a well-known Japanese credit card company. The phishers send out fake emails (subject: [UCS]UCSネットサーブ一時的な利用停止、ログインして確認してください) claiming that there been a temporary service suspension and include a link to a fake UCS login page. If a victim clicks on the link and enters their login credentials, the phishers will collect and potentially misuse this information. It is important for users to be cautious when receiving emails claiming to be from financial institutions and to verify the authenticity of any links before clicking on them. Also, beware that the Japanese used in the observed emails and fake websites contains grammatical errors, which is a major warning sign.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
Web-based
Observed domains/IPs are covered under security categories |
Japanese users' Amazon Prime credentials at risk
The year end holiday season is almost upon us and cybercriminals know only too well that's the perfect time to crank up online shopping phishing, and we are indeed seeing an uptick. We've recently observed an Amazon prime-themed phishing campaign in which thousands of emails (subject: Amazonプライムの自動更新設定を解除いたしました!番号) were sent to Japanese users. Threat actors are trying to trick users into believing their Amazon Prime automatic renewal has been canceled. If a user is successfully lured by this social engineering tactic, they'll be redirected to a fake Amazon logon page and their credentials will be harvested.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
Web-based
Observed domains/IPs are covered under security categories |
Jarjets ransomware
Jarjets is another new ransomware variant observed on the threat landscape within the last week. The malware encrypts the user files and appends .Jarjets extension to them. Ransom note is dropped on the infected machine in form of a text file called "Jarjets_ReadMe.txt" where the threat actors ask the victims to contact them via provided email addresses for further instructions on how to decrypt the locked files.
Symantec protects you from this threat, identified by the following:
File-based
Ransom.Generic.1
WS.SecurityRisk.4
Machine Learning-based
Heur.AdvML.B |
JaskaGO infostealer for Windows and macOS
JaskaGO is a new Go-based infostealer developed for both Windows and macOS platforms. The malware collects a wide range of data from the compromised machines including credentials, cookies, browser history, files from local folders, cryptowallets and others. Collected data is compressed into a .zip archive and forwarded to attackers C2 servers. Beside the info-stealing functionality JaskaGO can also execute shell commands received from attackers as well as download and run additional payloads.
Symantec protects you from this threat, identified by the following:
File-based
OSX.Trojan.Gen
OSX.Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.C |
Jasmin ransomware distributed via exploitation of TeamCity JetBrains vulnerabilities
CVE-2024-27198 and CVE-2024-27199 are two recently disclosed vulnerabilities affecting JetBrains TeamCity On-Premises platform. Since the emergence of the proof-of-concept (PoC) code for both vulnerabilities, multiple threat actors have been found to be exploiting them in their attacks. One such observed campaign has been leveraging the JetBrains bugs to deploy ransomware variant dubbed as Jasmin. The malware has the functionality to encrypt user files, append .lsoc extension to them and drop ransom note in form of a file called "un-lock your files.html". Other recently observed campaigns exploiting the JetBrains vulnerabilities have been reported to infect victims with different payloads such as XMRig Coinminer, Cobalt Strike beacons or the SparkRAT backdoor.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Crtutl-CNPE!g1
ACM.Schtsk-TBat!g1
ACM.Untrst-FlPst!g1
ACM.Untrst-RunSys!g1
Behavior-based
SONAR.SuspLaunch!g250
File-based
PUA.Gen.2
Ransom.Zombie
Scr.Malcode!gdn14
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.A!400
Heur.AdvML.A!500
Heur.AdvML.B!100
Heur.AdvML.B!200
Heur.AdvML.C
Network-based
Web Attack: JetBrains TeamCity Authentication Bypass CVE-2024-27198
Web Attack: JetBrains TeamCity Authentication Bypass CVE-2024-27199
Policy-based
DCS hardening for TeamCity application can reduce the attack surface and exposure in many different ways:
Lock down the TeamCity network exposure such that the vulnerability be exploited over the public internet
Prevent access to critical files such that sensitive system information can not be exfiltrated
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Java-based RAT exploits human weakness
Symantec Security Response has observed a Java-based RAT was spammed out in COVID-themed emails. While COVID is a oft-used lure this year, exploiting emotional and financial vulnerabilities brought by the ongoing pandemic is too much of a morale crime.
Some of the email subjects used in this spam campaign and Symantec protection below:
Email subjects
Resolution Framework for COVID-19-related stress - Grievances Redressal
Agricultural Debt Waiver & Debt Relief
File-based protection
Trojan.Maljava |
Javascript backdoor distributed via Windows 11 Alpha-themed malicious documents
According to a recent report, the FIN7 APT group has been distributing a JavaScript backdoor via a malspam campaign leveraging a Windows 11 Alpha theme. The infection chain starts with a malicious decoy Word document claiming to be created on Windows 11 Alpha, and asks the recipient to enable editing to continue. Once enabled, the malicious VBA macros contained in the document will attempt to drop a JavaScript payload. The campaign reportedly targets point-of-sale (POS) providers.
Symantec protects you from this threat, identified by the following:
File-based
Heur.AdvML.B
Trojan Horse
Trojan.Gen.2
Trojan.Gen.NPE
W97M.Downloader
Network-based
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains are covered under security categories |
Jcrypt aka RIP Lmao Ransomware
Since the end of 2020, Jcrypt (also known as RIP Lmao) Ransomware continues to be observed in-the-wild. This Ransomware is known to add .jcrypt extension to files after successful encryption.
The ransom notes have a bright red background and contain a skull with RIP Lmao written at its base. The authors have been asking for 0.8 bitcoin as a ransom.
Symantec has the following coverage in place:
File-based
Heur.AdvML.C
WS.Malware.1 |
Jigsaw ransomware still trying its luck in 2020
Jigsaw ransomware was first discovered in 2016. It was named after the character depicted in the ransom note and it was one of the first ransomware families deleting the user's encrypted data if the ransom was not paid. While there hasn't been much talk about Jigsaw ransomware in 2020, the evidence of its activities still can be found in the wild, for example the reports from May about phishing runs delivering double payloads - both Jigsaw and Lokibot. The most recent telemetry from October shows that a number of Jigsaw samples can still be encountered in the wild.
While Symantec continues monitoring this ransomware family, we recommend regular backup procedures of any important files and applying the latest product definitions to protect against ransomware threats.
Symantec protections:
File-based
Heur.AdvML.B
Heur.AdvML.C
Ransom.Jigsaw
Ransom.Jigsaw!gm1
Trojan.Gen.MBT
Trojan Horse
Network-based
System Infected: Ransom.Jigsaw Download 5 |
JinxLoader: Advertised and Used in the Wild
A new Go-written loader, dubbed JinxLoader, is making rounds in underground forums. Reports indicate its recent usage in malicious emails, loading threats like Formbook. The malware pays homage to League of Legends character Jinx, featuring the character on its ad poster and C2 login panel. JinxLoader's primary function is straightforward – loading malware.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
File-based
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B!200
Heur.AdvML.C |
Jira Atlassian vulnerability CVE-2021-26086 still being exploited in the wild
Over the last few weeks Symantec's network protection technology, Intrusion Prevention System (IPS) has picked up scans based on threat landscape monitoring which indicate an uptick in exploitation of an older and already patched Jira Atlassian vulnerability. CVE-2021-26086 is a path traversal and read file vulnerability in the Jira Software Server. The vulnerability allows a remote attacker to read and exfiltrate files and information. Attackers are targeting files for exfiltration which contain sensitive information such as logging data and configuration settings. This sensitive information can then be used by attackers for further exploitation.
Symantec protects you from this threat, identified by the following:
Network-based
Web Attack: Atlassian Jira Server File Disclosure CVE-2021-26086 |
Jira Software Server CVE-2021-26086 vulnerability under active exploitation
Jira Atlassian is one of the most popular ticketing tools used by organizations around the world. CVE-2021-26086 is a path traversal and read file vulnerability in the Jira Software Server. The vulnerability allows a remote attacker to read and exfiltrate files and information.
Symantec's network protection technology, Intrusion Prevention System (IPS) has picked up scans based on threat landscape monitoring, which indicate an uptick in exploitation of this vulnerability. Attackers are targeting files for exfiltration which contain sensitive information such as logging information and configuration settings. This stolen sensitive information can then be used by attackers for further exploitation. Though the vulnerability is couple of years old, attackers are hoping to cash in on delayed patch deployment by organizations.
Symantec protects you from this threat, identified by the following:
Network-based
Web Attack: Atlassian Jira Server File Disclosure CVE-2021-26086 |
JKwerlo Ransomware
JKwerlo is a newly discovered ransomware variant written in the Go programming language. This malware has been used in recent campaigns targeting Spanish and French speaking users. The initial attack stage relies on malicious .html files delivered to users via spam emails. The ransomware payload is distributed either directly through compressed .zip archives or downloaded from a Dropbox file sharing repository. JKwerlo does not append any additional extensions to the encrypted files. The malware has the functionality to delete volume shadow copies, to disable Windows firewall and Windows recovery mode, among others. In some instances the ransomware has also been observed to download an additional post exploitation tool called Rubeus, likely used by the threat actors to obtain administrative privileges on the infected machines.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Ps-Rd32!g1
Behavior-based
AGR.Terminate!g2
SONAR.MalTraffic!gen1
SONAR.SuspLaunch!g18
File-based
Downloader
ISB.Downloader!gen523
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.NPE.C
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!400
Heur.AdvML.A!500
Heur.AdvML.C
Network-based
System Infected: Bad Reputation Application Connecting to Cloud Storage |
JobCrypter - a less prominent ransomware remains active
JobCrypter is yet another old ransomware variant that keeps re-emerging in the wild. In the latest distribution campaigns from March and April a JavaScript loader is leveraged to drop the malicious payload. The ransomware ensures its persistence by dropping a copy of itself named "ERFFREEED.exe" in the "%ROAMING%" path and creating a startup script to launch the exe. It also uses SMTP client to communicate with the C2 server.
As we continue to monitor and enhance our protections against JobCrypter Ransomware variants, we recommend performing regular backups for any important data and ensuring your security products are kept up to date with the latest product definitions.
Symantec protects you from this threat, identified by the following:
File-based
Heur.AdvML.B
Heur.AdvML.C
Ransom.JobCrypter
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
Trojan Horse |
Joker, like a rash that keeps coming back
This mobile threat continues to plague Android users and find its way on to Google Play, disguised as basic apps that users are most likely to download - apps like chat, design and keyboard fonts have recently been observed. This mobile malware attempts to simulate clicks and subscribe victims to premium services through the interception of SMS messages.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
AppRisk:Generisk |
Joker continues to find its way to Google Play
Android malware known as Joker has been around for some time now but is still quite prevalent in today's mobile threatscape. This infamous threat is often found on Google Play, but also on third party Android App stores. More recently there have been a few that have been reported on Google Play.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk |
Joker Malware Found in Apps on Google Play
Information has recently been published regarding a handful of applications found on Google Play that contained the Joker malware. Joker is mobile malware that attempts to simulate clicks and potentially subscribe victims to premium services through interception of SMS messages. Joker has previously been found in hundreds of Android apps. The apps identified this time have seen roughly 200,000 total installs and have since been removed from Google Play.
Current and previous Joker samples are detected by Symantec Mobile Insight as follows:
AdLibrary:Generisk
AppRisk:Generisk
Other:Android.Reputation.1 |
JokerSpy - a backdoor for macOS
JokerSpy is a recently discovered Python-based backdoor developed for the macOS platform. The malware's main functionality is to connect to a remote C&C server and retrieve commands from the attackers. This can also include instructions for download of additional arbitrary tools and payloads. JokerSpy has been recently leveraged in a malicious campaign targeted at a cryptocurrency exchange in Japan and was delivering a macOS enumeration hacktool called Swiftbelt.
Symantec protects you from this threat, identified by the following:
File-based
OSX.Trojan.Gen
OSX.Trojan.Gen.2
Trojan Horse |
jRAT: Payroll Software Facade
Cybercriminals continue to disguise their malware as payroll software for small businesses, aiming to gain access to sensitive information like employee details and financial records, with the goal of financial gain through data theft or fraud.
In a recent example, an actor has been masquerading his jRAT (also known as JacksBot) binary as a software called "EzPayroll", likely distributed via drive-by-download. JRAT has been around for a long time, and over the years variants have been observed in numerous types of attacks worldwide.
While it's a generic remote access trojan capability-wise, being Java-based is one of its notable characteristics, contributing to its cross-platform compatibility. It can function effectively on various operating systems like Windows, Mac OS, Linux, and even Android, as long as the target device has Java Runtime Environment (JRE) installed.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Untrst-RunSys!g1
ACM.Ps-CPE!g2
File-based
Trojan.Gen.2
Trojan.Gen.NPE
Trojan.Maljava |
JSSLoader returns with a new C++ variant
A new variant of the JSSLoader malware has been observed in the wild. The APT group associated with this malware has written the new loader in the C++, where older versions of JSSLoader were written in .NET. This change could be yet an another attempt at evading existing detections. JSSLoader is known to be leveraged in early stages of malicious campaigns and used to load additional malware payloads.
Symantec protects you from this threat, identified by the following:
File-based
Backdoor.Jssloader
Heur.AdvML.B
Heur.AdvML.C
Trojan Horse
Trojan.Gen.2
W97M.Downloader
Network-based
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains are covered under security categories |
Jupyter Infostealer emerges with backdoor features
New reports have emerged about the latest arrival on an already quite saturated Infostealer landscape called Jupyter. While the malware primarily targets collecting browser data from the compromised machines, it also includes some capabilities more characteristic to backdoors such as to download additional executables or to execute PowerShell scripts.
Symantec continues to monitor Jupyter activity and has the following coverage in place:
File-based
Backdoor.Trojan
Trojan.Gen.2
Trojan.Gen.MBT
Trojan Horse
WS.Malware.1
WS.Malware.2
Website-based
This activity is proactively blocked by Symantec Web Isolation technology |
Jupyter Infostealer using MSI files to avoid detection
Jupyter is an infostealer and backdoor that is constantly evolving its tactics to avoid detection. In its latest iteration, it uses MSI files, compiled through 3rd party tools, to mask the use of PowerShell to download and execute the Jupyter payload.
The MSI files are large and go through the motions of installing legit software, like PDF readers, as to not alert the victim and attempt to fool antivirus software.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.2
Trojan.Gen.MBT
Trojan Horse |
Kadavro Vector ransomware
Kadavro Vector is a new ransomware variant related to the NoCry ransomware family. The malware encrypts files on the victims' machine, appends “.vector_" extension to the encrypted files and demands ransom payment in the Monero cryptocurrency. Kadavro Vector is distributed as a fake Tor browser installer package.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.Ransomware!g34
SONAR.SuspBeh!gen752
SONAR.SuspBeh!gen93
SONAR.TCP!gen1
File-based
Scr.Malcode!gdn32
Trojan Horse
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!200
Network-based
System Infected: Trojan.Backdoor Activity 568
System Infected: Trojan.Backdoor Activity 634
Web-based
Observed domains/IPs are covered under security categories |
Kamran mobile spyware
Kamran is a newly discovered Android spyware variant. It has been distributed in recent watering hole attacks and is reported to target specifically Urdu-speaking users in the Gilgit-Baltistan region in Pakistan. Kamran has the functionality to collect user contacts, call logs, SMS messages and files stored on the compromised devices, among others. The collected information is extracted to the C&C servers hosted on Firebase and controlled by the attackers.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
Android.Reputation.2 |
KANDYKORN malware distributed in the latest campaign targeting macOS users
A new campaign dubbed REF7001 targeted at macOS users has been reported in the wild. The attack chain is multi-staged and involves the initial compromise through Python scripts, delivery of SugarLoader and HLoader malware variants and the final infection with the KandyKorn payload. The KandyKorn malware has capabilities for data collection and ex-filtration from the infected endpoint. The malware might also execute additional arbitrary commands or payloads retrieved from the C2 servers belonging to the attackers.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
OSX.Trojan.Gen
WS.Malware.1
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Kanti - a NIM-based ransomware variant
Kanti is another run-of-the-mill ransomware variant observed in the wild. The malware is written in the NIM programming language. It encrypts user files and appends .kanti extension to them. The malware excludes several folder and file types from encryption on the compromised system. Upon completing the file encryption process a ransom note dropped on the machine is advising the victims to contact the attackers via email.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.Ransomware!g1
File-based
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
Machine Learning-based
Heur.AdvML.C |
Kapeka backdoor
Kapeka is a recently identified backdoor variant leveraged in malicious campaigns targeted at various entities from Eastern Europe since at least 2022. It is believed that this backdoor has been distributed by the threat group known as Sandworm. Kapeka backdoor is coded in C++ and contains capabilities for victim's machine fingerprinting, shell command execution, read/write file operations or launch of arbitrary payloads, among others. Kapeka has also functionalities to upgrade the backdoor binaries or to completely remove itself from the infected endpoint.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Ps-Rd32!g1
ACM.Ps-Schtsk!g1
ACM.Untrst-RunSys!g1
Behavior-based
SONAR.TCP!gen1
File-based
Trojan.Kapeka
WS.Malware.2
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Karma Ransomware observed in the latest campaigns
We have become aware of recent malicious campaigns distributing Ransomware variant dubbed as Karma. The malware will encrypt the victim's files and append .karma extension to them. KARMA-ENCRYPTED.txt ransom note is dropped in various folders on the victim's machine. The threat actors advise the victims to contact them via email addresses provided in the ransom note. They also threaten to publicly leak confidential data if the ransom demands are not met.
Symantec protects you from this threat, identified by the following:
File-based
Heur.AdvML.C
Heur.AdvML.M
Ransom.Gen
Trojan Horse
WS,Malware.1
Bahavior-based
SONAR.RansomKarma!g1
SONAR.Ransomware!g12 |
Kasseika ransomware distributed in BYOVD attacks
Kasseika is a recent ransomware variant observed in the wild. Similar to a few other ransomware strains currently on the threat landscape, Kasseika employs so called Bring-Your-Own-Vulnerable-Driver (BYOVD) techniques. In this case, the threat actors leverage vulnerable driver Martini.sys for the purpose of disabling various security solutions present on the targeted endpoint. Once delivered the malware will terminate several system processes and services running on the machine before commencing with the encryption process. Upon completing file encryption, the ransomware will drop the ransom note .txt file in every encrypted directory as well as change the desktop wallpaper.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.RansomBlkMat!g2
SONAR.RansomPlay!gen1
SONAR.Ransom!gen98
SONAR.TCP!gen1
File-based
Trojan Horse
Ransom.Kasseika
Trojan.Killfiles
Trojan.Malscript
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.A!400
Heur.AdvML.A!500
Heur.AdvML.B!100
Heur.AdvML.B!200
Heur.AdvML.C |
Kavach authentication users in India targeted by SpyNote
SpyNote is an Android spyware that has been around for a few years now and is still used by various groups and individuals around the globe. Recently, there have been reports of activity in India where actors have disguised their SpyNote as a Kavach update. Kavach is an authentication service that secures access to various software solutions in India.
SpyNote malware has the following capabilities:
File, SMS, Calls, Contacts, Location, Account and Camera manager
Download and install other apks
Keylogging
Microphone and screen recording
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
Web-based
Observed domains/IPs are covered under security categories |
KEKW infostealer spread via PyPI packages
KEKW infostealer is a malware variant recently distributed as PyPI (Python Package Index) packages. KEKW's functionality includes information collection from compromised machines, cookies and credentials theft, browser data extraction, perform clipper activities, among others. Once collected, the stolen data is formatted into JSON format and compressed into a .zip archive before extraction to the C2 servers controlled by the attackers.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.NPE
WS.Malware.1
Web-based
Observed domains/IPs are covered under security categories |
Kevin and James, Lyceum's backdoors
The APT group known as Lyceum (aka Hexane) which has been around since at least 2018 is reportedly still active as recent reports exposed their new backdoors (dubbed "James" and "Kevin") and PowerShell scripts. This group has predominantly been active in the Middle East and Africa, involved in cyberespionage campaigns.
Symantec protects you from these threats, identified as the following:
File-based
ISB.Heuristic!gen5
ISB.Heuristic!gen68
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Malscript
Machine Learning-based
Heur.AdvML.C |
Key Group Ransomware
Over the past few weeks, consumers as well as small and medium size businesses have been the target of another Ransomware actor known as Key Group (also known as keygroup777). These crooks employ a run-of-the-mill ransomware which, post successful execution, will append .keygroup777 or .keygroup extension to encrypted files. The ransom note left on the compromised machine asks victims to contact the actor via telegram or email. There is no ransom amount listed.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.Heur.Dropper
SONAR.SuspBeh!gen1
SONAR.SuspDataRun
SONAR.SuspDrop!gen1
File-based
Ransom.HiddenTear!g1
Ransom.Sorry
Trojan Horse
Machine Learning-based
Heur.AdvML.B |
KeyLock Ransomware
Symantec is aware of a ransomware variant that goes by the name of KeyLock. If the malware is successfully executed, it will attempt to encrypt files and append them with a .keylock extension. It will also drop a ransom note, "README-id-(victim's ID number).txt," advising victims to connect with them via email or Telegram within 72 hours. According to the ransom note's content, the criminals appear to employ double-extortion tactics - threatening to release sensitive information unless a ransom is paid.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.SuspLaunch!g22
SONAR.SuspLaunch!g266
File-based
Ransom.Zombie
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B |
Keylogger spam taking advantage of recent COVID-19 variants
Symantec Security Response has observed a new spam attack attempting to take advantage of the recent COVID-19 situation wherein new variants are appearing around the globe. The spam comes in three languages: English, Korean and Vietnamese, with the payload being a keylogger which steals information from the compromised machine.
The email IOCs are as follows.
Email subject:
Reports on new deadly COVID-19 variants
새로운 COVID-19 변형에 대한 중요한 업데이트 (English translation: Important update on the new COVID-19 variant)
Cập nhật quan trọng về các biến thể COVID-19 mới (English translation: Important update on the new COVID-19 variants)
Malicious attachment:
Covid-19 reports.iso
CDC report.xz
Symantec provides the following coverage against this spam attack:
File-based
Trojan Horse
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. |
KeySteal macOS malware
KeySteal is an infostealer variant targeting the macOS platform. The main purpose of this malware is to steal information from Keychain - the password management system in macOS. The latest variants of KeySteal malware have been spread in form of Mach-O binaries with names such as “UnixProject”, "CodeSignature" or most recently “ChatGPT”. KeySteal leverages hardcoded C2 addresses for communication and has the capability to drop persistence components on the infected system.
Symantec protects you from this threat, identified by the following:
File-based
OSX.Trojan.Gen
OSX.Trojan.Gen.2
WS.Malware.1
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
Keyzetsu clipper
A new addition to the long list of crypto wallet clippers, Keyzetsu has been identified in the threat landscape, currently being distributed through pirated software such as Evernote, driver installers such as Realtek, and software updates like Google update. This malware has the ability to notify its author through a Telegram bot and Telegram's API when it successfully infects a device and hijacks a victim's wallet – a fairly common technique these days among stealers.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.SuspBeh!gen633
File-based
Trojan.Gen.NPE
Machine Learning-based
Heur.AdvML.B |
Khonsari Ransomware exploits Log4j vulnerability
Earlier threats seen leveraging the Log4j vulnerability (CVE-2021-44228) were cryptocurrency miners and Cobalt Strike related. A recent addition to the ongoing exploitation is a ransomware family known as 'Khonsari'. Researchers who have monitored it's infection attempts disclosed that along with the ransomware payload, a Remote Access Trojan (RAT) named 'Orcus' is dropped on successfully infected machines.
The attack leverages the remote code execution flaw to download an additional payload - a .NET binary - from a remote server which encrypts files with the extension ".khonsari".
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.Ransomware!g1
File-based
Downloader
Ransom.Khonsari
Trojan Horse
Trojan.Gen.MBT
Machine learning-based
Heur.AdvML.C |
Klingon RAT - another malware written in Golang
Klingon RAT is yet another malware variant written in Golang programming language. As per a recently released report, the Klingon RAT is well written and includes several features aimed at maintaining persistence, privilege escalation and bypassing UAC. The malware collects information from the compromised machine and communicates via TLS protocol with the Command and Control Server (C2), from where it can receive further commands to execute on the infected host.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
WS.Malware.2
Network-based
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed IPs/Domains are covered under security categories |
KmsdBot malware
KmsdBot is a new botnet variant written in Golang programming language that supports various architectures including Winx86, x86_64, Arm64 and mips64. The malware attacks via Secure Shell Protocol (SSH) connections and targets systems having default or weak login credentials. Functionality wise KmsdBot can engage in DDoS attacks as well as run cryptomining activities.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
File-based
Trojan Horse
Trojan.Gen.NPE
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.C |
Knight ransomware
Knight ransomware is a new variant of the Cyclops ransomware family. The malware encrypts user files, appends .knight_l extension to them and drops a ransom note in form of a .txt file named "How To Restore Your Files.txt". Knight ransomware has been recently distributed in malspam campaigns disguised as TripAdvisor complaint notifications. The malspam would include either compressed malware executables directly or .htm attachments redirecting the users to download of Excel .xll files leading to an infection.
Symantec protects you from this threat, identified by the following:
File-based
Ransom.Knight
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Network-based
System Infected: Trojan.Backdoor Activity 721 |
Knight Ransomware spares none
A recently published report detailed some activity related to Knight Ransomware. This ransomware group has acted primarily against targets in the United States and its victims resided in multiple industries. According to the report, while the retail industry saw the most activity, this group did not shy away from attacking entities within the healthcare industry, potentially negatively impacting individuals in need of medical care.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.RansomGen!gen3
SONAR.Ransomware!g1
SONAR.Ransomware!g38
SONAR.Ransomware!g7
SONAR.TCP!gen1
File-based
Ransom.Knight
Trojan Horse
Trojan.Gen.MBT
W32.Silly!gen
WS.Malware.1
WS.Malware.2
Machine learning-based
Heur.AdvML.A
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Network-based
Attack: Ransom.Gen Activity 29
System Infected: Trojan.Backdoor Activity 634
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Knock Knock, who's there? It's Yakuza bot
Gafgyt is a relatively prevalent Linux malware. Because its code is openly available, Gafgyt is an easy target for cyber criminals to modify to suit their own tastes. Yakuza bot is one of those variants which connects back to Command and Control (C&C) servers in order to perform Distributed Denial of Service (DDoS) attacks.
Symantec protects against Yakuza bot as follows:
File-based protection
Downloader.Trojan
Linux.Lightaidra |
Kobalos - a new Linux backdoor discovered
Symantec Security Response is aware of the latest reports of a new Linux backdoor dubbed as Kobalos. The backdoor provides remote access to the infected systems but can also act as a proxy to other compromised machines. According to the reports, a trojanized version of an OpenSSH client has been identified on the infected systems that served as a SSH credential stealer.
Symantec provides the following detection against Kobalos malware:
File-based
Linux.SSHDoor
Linux.Trojan
Trojan Horse |
Konni Remote Access Trojan spread in a recent campaign
A Remote Access Trojan (RAT) known as Konni has been distributed in a recent campaign leveraging malicious Word documents, batch scripts and DLL binaries. Konni RAT has the functionality to extract confidential data from compromised machines as well as execute remote commands. Konni has also some capabilities for UAS bypass and encrypted communication to C2 servers.
Symantec protects you from this threat, identified by the following:
Behavior-based
ACM.Ps-Rd32!g1
File-based
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.A!400
Heur.AdvML.A!500
Heur.AdvML.B!100
Heur.AdvML.B!200
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Koxic ransomware
Koxic is a ransomware variant recently reported to be distributed to users in Korea. The malware will encrypt user data and append .koxic extension to the encrypted files. Koxic includes functionality to delete Volume Shadow Copies from the infected machines as well as terminate selected system processes and services before proceeding with the encryption process.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.RansomNemty!g2
SONAR.SuspLaunch!g18
SONAR.TCP!gen1
File-based
Downloader
Trojan Horse
WS.Malware.1
Machine Learning-based
Heur.AdvML.B |
Kraken APT hides behind Windows Error Reporting service
We are aware of reports of a recently observed APT which directly injects shellcode into the werfault.exe process, associated with the Windows Error Reporting service. The attack, given the name Kraken, initially makes use of a socially engineered phishing mail to entice the user to execute code. The infection chain eventually leads to the injection of the malicious payload into this process in an effort to evade detection.
Symantec provides the following coverage for known indicators:
File-based
Trojan.Gen.NPE
W97M.Downloader |
Krasue RAT for Linux
Krasue, Remote Access Trojan (RAT) variant was initially discovered back in 2021. The malware has been reported to mostly target organizations in Thailand with a focus on the telecommunications sector. The initial attack vector might include brute force attacks and exploitation of known vulnerabilities, among others. Krasue malware comes embedded with rootkits supporting various Linux kernel versions. The rootkits masquerade as VMware drivers and are used to conceal malware activities, evade detections as well as provide root access for the attackers.
Symantec protects you from this threat, identified by the following:
File-based
Backdoor.Trojan
Hacktool.Rootkit!gen8
Trojan.Gen.NPE |
KratosKnife
KratosKnife is a bot that has been around for a few years now and has been shared on various websites, forums, and also on a public software development and version control hosting service. Prevalence-wise, this malware is far from being among the most active threats of the same capabilities (bot and stealer) out there, but Symantec continues to observe sporadic activities that are either malicious or test-related. Groups or individuals behind malicious attacks usually use drive-by-download as the initial vector of infection. If they manage to successfully compromise a machine, they'll be able to deploy additional payloads, execute commands, and collect various sensitive information (cookies, crypto wallets, etc.).
Symantec protects you from this threat, identified by the following:
Behavior-based
ACM.Untrst-RunSys!g1
File-based
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.C |
KrustyLoader Backdoor
CVE-2024-21887 and CVE-2023-46805 were two zero-day vulnerabilities recently disclosed for Ivanti (a remote access VPN software). The vulnerabilities were described as enabling unauthenticated remote code execution and authentication bypass. Reports show that APT actors quickly got involved in exploiting the bugs to deploy a Rust-based malware, which the researcher who discovered it appears to have named "KrustyLoader". The malware's purpose is to ultimately download Sliver, a red-teaming tool similar in nature to Cobalt Strike.
Symantec protects you from this threat, identified by the following:
File-based
Linux.Mirai
Trojan.Gen.NPE
WS.Malware.1
Network-based
Web Attack: Ivanti ICS CVE-2023-46805
Web Attack: Ivanti ICS CVE-2024-21887
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
KryptoCibule, the cryptostealing RAT
Yet another cryptocurrency malware made an appearance this week. Dubbed KrypotoCibule, it's believed to have been around since as far back as December 2018 and is designed to perform the following financial heist related actions:
Use the infected machine to mine coins
Replace wallet addresses in the clipboard in order to take over transactions
Steal cryptocurrency-related files
The malware is concealed in installers for pirated software floating around in the Torrent network. The malware appears to target users in the Czech Republic and Slovakia and one could deduce the pirated software is probably popular in those countries.
Symantec protections
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT |
Kubernetes pods in Muhstik's line of sight
Actors behind Muhstik botnet have set their sights on Kubernetes pods in their cryptocurrency campaign as recent reports indicate, this via a compromised Kubernetes pods Wordpress. This threat has been around for a few years performing denial-of-service (DDoS) attacks and downloading cryptocurrency miners. Web applications and IoTs are primarily targeted and added to the botnet.
Symantec protects you from this threat, identified by the following:
File-based
Linux.Kaiten
Trojan Horse |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.