text
stringlengths
0
383k
Kuiper Ransomware Kuiper is a relatively new ransomware family observed first around September 2023, that was advertised for sale around that time in the form of a Ransomware-as-a-Service offering. Kuiper comes in variants supporting different platforms including Windows, Linux and macOS. The malware encrypts user files and appends .kuiper extension to them. A certain set of file extensions and folders is excluded from encryption. Further capabilities depend on the variant and might include change of the desktop wallpaper, deletion of the malware binaries post-encryption, terminating of selected system processes or removal of volume shadow copies, among others. Symantec protects you from this threat, identified by the following: Behavior-based ACM.Ps-Enc!g1 ACM.Ps-Net!g1 ACM.Untrst-RunSys!g1 AGR.Terminate!g2 SONAR.Cryptlocker!g42 SONAR.SuspLaunch!g18 SONAR.SuspLaunch!g190 SONAR.TCP!gen1 File-based ISB.Heuristic!gen58 OSX.Trojan.Gen Ransom.Kuiper Trojan Horse Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.1 Machine Learning-based Heur.AdvML.A!500 Heur.AdvML.C EDR-based Symantec added malware-specific threat hunting queries which can be fired on the customer iCDM console. For more information, refer to this link: https://github.com/Symantec/threathunters/tree/main/Ransomwares/Kuiper Symantec EDR is capable of monitoring and flagging this threat actor's tactics, techniques and procedures. EDR enrichment rules for Kuiper ransomware TTPs include: Process Injection: Process Hollowing [T1055.012] Command and Scripting Interpreter: Windows Command Shell [T1059.003] Service Stop [T1489] Impair Defenses [T1562] System Services: Service Execution [T1569.002] Indicator Removal: Clear Windows Event Logs [T1070.001] Process Discovery [T1057] Data Encrypted for Impact [T1486] Command and Scripting Interpreter: PowerShell [T1059.001] Command and Scripting Interpreter [T1059] Obfuscated Files or Information [T1027] File and Directory Discovery [T1083] Command and Scripting Interpreter: Unix Shell [T1059.004] Ingress Tool Transfer [T1105] Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
KV-Botnet KV-Botnet is a threat attributed to the APT group Volt Typhoon (also known as Bronze Silhouette). The botnet has been leveraged mostly to proxy malicious traffic through compromised small office/home offices (SOHO) devices in the group's campaigns. KV-Botnet has been active in multiple attacks since at least February 2022 until its dismantlement by the FBI in December 2023. Shortly after the takedown, the threat actors attempted to regain control and revive the botnet. While those efforts were reported to be unsuccessful, there's a potential for the botnet's activities to resurface in the future. Symantec protects you from this threat, identified by the following: File-based Linux.Trojan Downloader Trojan Horse Trojan.Gen.NPE WS.Malware.1 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
L00KUPRU Ransomware L00KUPRU is a new Xorist ransomware variant recently discovered in the wild. The malware encrypts user files and adds the .L00KUPRU extension to them.The attackers drop a ransom noted as a text file called "HOW TO DECRYPT FILES.txt" and demand payment in Bitcoin cryptocurrency. Additionally, the ransom note is displayed in a pop-up window on the desktop providing the victims with contact details of the attackers as well as BTC wallet address for payments. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Ps-RgPst!g1 File-based Ransom.CryptoTorLocker WS.Malware.1 Machine Learning-based Heur.AdvML.B
Lambda Ransomware Lambda (aka LambdaCrypter) is another recently discovered run-off-the-mill ransomware variant that is being distributed in the wild. The malware encrypts user files and appends .Lambda extension to them. Upon successful encryption, the malware drops a ransom note in the form of the .txt file called "LAMBDA_README.txt". The attackers advise the impacted victims to visit the onion website called out in the ransom note for further instructions on how to retrieve the encrypted files. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.Ransomware!g38 SONAR.TCP!gen1 File-based Ransom.Lambda Trojan Horse Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Network-based Attack: Ransom.Gen Activity 46 System Infected: Trojan.Backdoor Activity 568 System Infected: Trojan.Backdoor Activity 634
Laplas Clipper Clipping crypto wallets is a growing trend as Symantec continues to observe more and more threats with this capability. Laplas is yet another one, currently being advertised on underground Russian-speaking forums, and observed in-the-wild. This clipper will swap victims' cryptocurrency wallet addresses with ones owned by the malware actor. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products File-based Trojan.Gen.2 Trojan.Gen.MBT Machine Learning-based Heur.AdvML.C
Large number of U.S. Census-themed typo-squatter domains being registered On a daily basis, cyber actors register new typo-squatter domains which could be used for themed phishing campaigns or malicious redirection. These domains usually mimic major brands or are directly related to current events such as Covid-19, the upcoming U.S. election, etc. This year we have seen a large number of U.S. Census-themed typo-squatter domains registered, with over 800 registered in the last two months alone. These highly suspicious domains have reflected the following patterns or themes: Census Training Section 508 Accessibility Census Geographies Symantec has various protections in place for these campaigns: Web-based Observed domains are covered under security categories Network-based Audit: Suspicious Domain Request Audit: Suspicious Domain Request 2
Large Turkish bank spoofed in Snake Keylogger malspam campaign Symantec has recently observed a malspam campaign in which one of the largest and most prominent banks in Turkey is being spoofed to deliver the Snake Keylogger. The actors attempt to lure victims with "account transaction" social engineering. The malicious emails (subject: Hesap hareketleriniz) have a GZ archive attached (Hesap hareketleriniz pdf.gz), containing the Snake Keylogger binary. Local and international companies of all sectors operating in Turkey are the primary targets in this campaign. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products Behavior-based SONAR.SuspBeh!gen752 SONAR.SuspLaunch!g310 File-based Scr.Malcode!gdn34 Machine Learning-based Heur.AdvML.B
Latest activities of Pawn Storm threat group (aka APT28) Pawn Storm (aka APT28 or Fancy Bear) is a threat group that has been active on the threat landscape for around two decades. Over the course of the last year, the threat actors have been launching targeted NTLMv2 hash relay attacks against a number of victims from various sectors including governmental entities, defense industry, financial, energy and transportation sectors, among others. Pawn Storm are known to leverage spear-phishing runs, brute force attacks as well as exploitation of known exposed vulnerabilities in their campaigns. Symantec protects you from this threat, identified by the following: Behavior-based ACM.Ps-Http!g2 ACM.Ps-Rd32!g1 ACM.Untrst-FlPst!g1 File-based CL.Downloader!gen241 Trojan Horse Trojan.Gen.MBT Trojan.Gen.NPE Web.Reputation.1 WS.Malware.2 Machine Learning-based Heur.AdvML.A Heur.AdvML.A!400 Heur.AdvML.A!500 Heur.AdvML.C Network-based System Infected: Trojan.Backdoor Activity 721 Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Latest activities of the Mantis APT group The Mantis cyber-espionage group (aka Arid Viper, Desert Falcon, APT-C-23), a threat actor believed to be operating out of the Palestinian territories, is continuing to mount attacks, deploying a refreshed toolset and going to great lengths to maintain a persistent presence on targeted networks. While the group is known for targeting organizations in the Middle East, the most recent campaign uncovered by Symantec, by Broadcom Software, focused on organizations within the Palestinian territories, with malicious activity beginning in September 2022 and continuing to at least February 2023. This targeting is not unprecedented for Mantis and Symantec previously uncovered attacks against individuals located in the Palestinian territories during 2017. Read more in our blog: Mantis: New Tooling Used in Attacks Against Palestinian Targets Symantec protects you from this threat, identified by the following: Behavior-based SONAR.SuspPE!gen19 SONAR.TCP!gen1 SONAR.TCP!gen6 File-based Backdoor.Trojan Trojan Horse Trojan.Aridgopher Trojan.Exmatter Trojan.Micropsia WS.Malware.1 Machine Learning-based Heur.AdvML.A Heur.AdvML.B Heur.AdvML.C Network-based System Infected: Trojan.Backdoor Activity 634 Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories
Latest activities of the SideCopy APT group SideCopy is a threat actor active on the threat landscape since at least 2019. The group is known to target organizations and governmental institutions from India and Afghanistan. The most recent campaigns attributed to this APT have seen usage of Remote Access Trojans (RATs) such as Action RAT and AllaKore RAT. The attackers have also been reported to leverage a post-exploitation framework called SILENTTRINITY for the purpose of payload generation. The distributed RAT variants have functionalities that allow the attackers to retrieve information about the infected machines, execute arbitrary commands or download further malicious payloads. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based CL.Downloader!gen203 CL.Downloader!gen241 Downloader ISB.Downloader!gen67 Trojan Horse Trojan.Gen.MBT Trojan.Gen.NPE W97M.Downloader WS.Malware.1 Machine Learning-based Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories
Latest Agent Tesla distribution campaigns keep leveraging old vulnerabilities Agent Tesla is one of the most prevalent infostealers with remote access capabilities that has been present on the threat landscape in last few years. This malware is observed globally on a daily basis and is predominantly distributed via malicious emails. A recent phishing campaign spreading this malware has been seen leveraging relatively old Microsoft vulnerabilities CVE-2017-11882 and CVE-2018-0802 within its attack chain. The attackers have been distributing phishing emails masqueraded as purchase invoices, with malicious Excel files attached that in turn contained the exploits for the mentioned vulnerabilities. The dropped Agent Tesla modules have the functionality to exfiltrate credentials from various browsers, emails clients and applications, log keystrokes and take screenshots from the compromised machines, among others. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 Email-based Coverage is in place for Symantec’s email security products File-based Exp.CVE-2017-11882!g5 Scr.Malcode!gdn32 Trojan Horse Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Network-based Attack: Microsoft Office CVE-2018-0802 Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Latest Atomic Stealer (AMOS) variant leverages Python scripts Atomic Stealer (AMOS) is a malware variant targeted at the macOS platform. A new variant that drops and leverages Python scripts for detection evasion and data collection has been observed. The captured data includes information stored in Chromium-based browsers such as passwords or cookies, system information, credentials or data related to installed crypto-wallets and cryptocurrency extensions etc. All collected information is compressed into a .zip archive and forwarded to a C2 server controlled by the attackers. Symantec protects you from this threat, identified by the following: File-based OSX.Trojan.Gen OSX.Trojan.Gen.2 WS.Malware.1 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Latest BlackNet, free on multiple underground forums Symantec has observed multiple new command-and-control servers that have been associated with BlackNet. Further investigation indicated that individuals have recently posted BlackNet v3.5.2 for free on underground forums. It's not the first time BlackNet source code has been made accessible to a larger audience - earlier this year it was posted on Github although promptly removed. BlackNet is able to perform various actions on a compromised machine such as: Upload file, execute scripts and shell commands, open webpage (visible / hidden), capture screenshot, steal saved password (Chrome and Firefox), Keylogging, etc. This malware is mostly distributed via malicious email but also drive-by-download. Symantec has the following coverage in place: File-based: Trojan.Gen.MBT Trojan Horse WS.Malware.1 WS.Malware.2 Heur.AdvML.B Heur.AdvML.C Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. Website-based This attack is proactively blocked by Symantec Web Isolation technology
Latest Dark Pink APT activities Dark Pink is an advanced persistent threat (APT) group known to be focused on the Asia-Pacific (APAC) region. Dark Pink targets corporate espionage, information/data theft and ex-filtration, among others. The group leverages a wide variety of malware variants and custom tools. Some of these include Cucky infostealer, Ctealer malware, TelePowerBot implant and KamiKakaBot. The data collected from compromised endpoints is ex-filtrated either through public cloud services, HTTP protocol or various Webhooks. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.MBT WS.Malware.1 WS.Reputation.1 Machine Learning-based Heur.AdvML.A!500 Heur.AdvML.B Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Latest FinSpy variants come with multi-OS support A new report has emerged about a recent spying campaign using the FinSpy commodity malware to target members of Egyptian civil society organizations. FinSpy is a spying tool known in the past to have been sold to governments and law enforcement agencies, but has been also used by oppressive regimes. Spyware features include keylogging, intercepting of phone calls, ex-filtration of data, audio and camera recording among others. The most recent Finspy campaign has been active since September of last year and utilizes previously unseen variants for Linux and Mac operating systems. Symantec provides the following protection against this threat: File-based Heur.AdvML.C OSX.Trojan.Gen Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE Mobile-based AppRisk:Generisk Website-based This attack is proactively blocked by Symantec Web Isolation technology
Latest Gozi campaigns target banking and cryptocurrency sectors Gozi (aka Ursnif, Snifula) is a well-known banking trojan family active on the threat landscape for over 15 years. The malware is designed to steal login credentials, two-factor authentication codes, banking details and other confidential data from the infected endpoints. The latest observed campaigns distributing Gozi have been targeting the banking sector and companies associated with the cryptocurrency industry, such as exchanges and blockchain service providers. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.SuspScript!g20 File-based Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.A!400 Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Latest Joker variant comes with obfuscation techniques and multi-stage payloads A new variant of the Joker mobile malware has been observed in the wild. Joker is a malware family initially discovered back in 2017 that has been known to target Android devices with info-stealing purposes. The new variant features advanced obfuscation and evasion techniques including the ability to download multi-staged payloads. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk Android.Reputation.2 AppRisk:Generisk
Latest Lokibot campaign targets old vulnerabilities Lokibot malware has been recently observed in a campaign exploiting two fairly old MS Remote Code Execution (RCE) vulnerabilities - CVE-2021-40444 and CVE-2022-30190. Attackers have been embedding malicious macros in MS Office documents that once executed lead to infections with the final payload. The Lokibot malware is present on the threat landscape for many years and is known to be primarily spread via malspam and used for info-stealing purposes. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based Infostealer.Lokibot Trojan Horse Trojan.Gen.2 Trojan.Malscript W32.IRCBot.NG W97M.Downloader WS.Malware.2 Machine Learning-based Heur.AdvML.A Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!100 Network-based Web Attack: Microsoft MSHTML RCE CVE-2021-40444 Web Attack: MSDT Remote Code Execution CVE-2022-30190 Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Latest Lumma Stealer variants spread via Discord Lumma Stealer is an infostealer variant written in C and known on the threat landscape since at least 2022. A new campaign abusing Discord’s content delivery network (CDN) to distribute this malware has been just recently observed in the wild. Once on the infected machine, Lumma will attempt to steal data stored in the system browsers as well any present cryptocurrency wallets. This malware continues to be sold on underground forums and has been continuously evolving overtime with latest versions adding new capability to load additional arbitrary payloads on the infected endpoint. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT WS.Malware.1 WS.Reputation.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.C Network-based System Infected: Infostealer LummaC2 Activity System Infected: Infostealer LummaC2 Activity 02 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Latest Medusa botnet variant comes with a ransomware module Medusa is a DDoS botnet based on the code of the popular Mirai malware. A new variant of this botnet just emerged in the wild with addition of a ransomware and Telnet brute-force modules. The ransomware module is able to search through the infected machine for files with pre-defined extensions, encrypt them using AES 256-bit encryption, and finally append .medusastealer extension to the encrypted files. The malware has also a functionality to delete all files from the infected system drives after encryption, turning it more into a data wiper instead. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.NPE WS.Malware.1
Latest Phobos ransomware variants observed in the wild Phobos is a ransomware family well established on the threat landscape and active since at least 2019. New variants of this malware keep emerging in the wild each month. Just last week we have observed three new variants known as Elpy, Elbie and GrafGrafel. They encrypt user data and append a string of data to the encrypted files that consist of an unique ID number, threat actor contact email address and a respectively .Elpy, .Elbie or .GrafGrafel extension. The ransom note is usually left in a form of a text file containing instructions on how to recover the files. Phobos ransomware comes with capabilities allowing it to delete Volume Shadow Copies, disable the Windows firewall as well as terminate selected system processes. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.SuspDataRun File-based Ransom.Phobos Ransom.Phobos!g2 Ransom.Phobos!gm1 WS.SecurityRisk.4 Machine Learning-based Heur.AdvML.B Network-based Attack: Ransom.Crysis Activity 3
Latest Ryuk ransomware variant targets webservers According to a recently released report, the latest Ryuk variant is used in attacks targeted specifically at webservers. This malware variant includes a functionality to replace the webserver index file with a ransom note, and it will also print out the ransom note on the connected default printer. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.B Ransom.Ryuk Ransom.Ryuk!gm Trojan.Gen.MBT Behavior-based SONAR.RansomRyuk!gen1 SONAR.RansomRyuk!g3 SONAR.RansomRyuk!g5 SONAR.SuspBeh!gen57 Network-based Audit: Ransom.Ryuk Activity Audit: Ransom.Ryuk Activity 2 Attack: Ransom.Ryuk Activity 3 Attack: Ransom.Ryuk Activity 4
Latest version of Meduza in the wild New ads for a stealer known as Meduza (its newer version) have recently been observed, and activities have already been noticed (drive-by-download). This stealer is pretty much the same as all other stealers out there, with some comparing it to more nefarious ones capability-wise such as AzorUlt, Raccoon, and RedLine. The threat targets sensitive browser information, cryptowallets, Discord and Telegram data, Steam, password managers, etc. Symantec protects you from this threat, identified by the following: Behavior-based ACM.Ps-Msbuild!g1 File-based Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B!100 Heur.AdvML.B!200
Latest XLoader macOS variant spread under the disguise of OfficeNote application XLoader is a re-branded malware variant of the infamous Formbook infostealer. Its main functionality is to steal credentials, web browser cookies and data, log keystrokes on the compromised system and steal other sorts of user confidential data. The macOS variant emerged on the threat landscape around 2021 and was spread in the form of a Java application. The newest campaign distributing XLoader to macOS systems has been masquerading the malware binaries as a productivity application called ‘OfficeNote’. The application has been bundled into a .dmg image file and initially signed with a valid digital signature, that has been since revoked. Once deployed, the malware installs the persistence agent and starts collecting clipboard information and data stored in various web browsers, among others. Symantec protects you from this threat, identified by the following: File-based OSX.Trojan.Gen OSX.Trojan.Gen.2 WS.Malware.1
Latest Xorist ransomware variants Xorist ransomware (aka. EnCiPhErEd) is a well established malware family. Despite it being relatively old, it remains active on the threat landscape and every month we observe new variants being distributed in the wild. Xorist is mostly spread via cracked software installers, drive-by-downloads or malspam campaigns. Latest strains of this malware encrypt user files and append .hjutm or .th extensions. The ransom note is dropped in form of a .txt file but also displayed as a pop-up window to the victims. Symantec protects you from this threat, identified by the following: File-based Ransom.CryptoTorLocker WS.Malware.1 Machine Learning-based Heur.AdvML.B
Latrodectus malware Latrodectus loader is a malware variant first discovered in November 2023. The malware has been recently distributed in malicious campaigns attributed to the TA577 and TA578 threat groups. The loader is mostly used in the initial stages of the attacks to execute remote commands and to download additional payloads. Notably, its distribution campaigns exhibit similarities with previous IcedID operations in techniques and infrastructure usage. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Ps-Rd32!g1 ACM.Ps-Wscr!g1 ACM.Wscr-Rd32!g1 Behavior-based AGR.Terminate!g2 SONAR.SuspBeh!gen805 SONAR.SuspLaunch!g360 File-based Scr.Heuristic!gen20 Scr.Malcode!gen Scr.Malcode!gen137 Trojan Horse Trojan.Gen.MBT Trojan.Gen.NPE Trojan.Latrodectus Trojan.Pikabot!gen13 Web.Reputation.1 WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.A!400 Heur.AdvML.A!500 Heur.AdvML.B!100 Heur.AdvML.B!200 Heur.AdvML.C Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
LaZagne hacktool leverages Desktop-Bus (D-Bus) APIs on Linux systems for data extraction LaZagne is a popular open-source password recovery tool known to be used by multiple threat actors for the purpose of credential theft. With the various threat groups showing an increased interest in Linux systems, also LaZagne variant for this OS has seen a more widespread use in the wild. The LaZagne Linux modules have been observed to leverage D-Bus APIs to steal confidential data including credentials. D-Bus (short for "Desktop Bus") is a mechanism commonly used in Unix-like systems that allows for communication between multiple components and applications. Recent LaZagne campaigns leveraging D-Bus APIs have been targeting data extraction from applications such as Pidgin or KWallet. Symantec protects you from this threat, identified by the following: File-based Hacktool Hacktool.LaZagne Hacktool.LaZagne!gen1 Infostealer SecurityRisk.LaZagne Trojan Horse Trojan.Gen.NPE Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Lazarus adds QtBitcoinTrader to AppleJeus The Lazarus (aka Appleworm) group continues their AppleJeus operation with a series of attacks on cryptocurrency exchanges. So far, at least seven different versions of AppleJeus have been discovered, each of which is designed to target a different cryptocurrency trading application. Recently light has been shed on newer samples and the abuse of yet another cryptocurrency trading application, QtBitcoinTrader. Initially the malware was spread using fake versions of legitimate trading platform websites. Later however, the attackers switched vectors, relying on phishing, social networking, and social engineering techniques to fool victims into downloading the malware. Symantec protects you from this threat, identified by the following: File-based Trojan.Horse Trojan.Gen.MBT
Lazarus APT, now focused on IT Supply Chain This year the North Korean state-backed hacker group 'Lazarus' were consistent in targeting the cyber defense industry. It has recently been reported that they are now expanding their capabilities with supply chain attacks. Such malicious acts, if successful, will allow the hackers to able to launch a wide range of attack on corporate networks. Lazarus is known to deliver a remote access trojan called COPPERHEDGE via BLINDINGCAN backdoor. Using this RAT, threat actors will be able to easily facilitate system reconnaissance, running of arbitrary commands on compromised systems, and data exfiltration. Symantec protects you from this threat, identified by the following: File-based Backdoor.Trojan Trojan.Gen.2 Trojan.Gen.MBT Web-based Observed domains are covered under security categories
Lazarus APT targets jobseekers with macOS malware A new instance of malicious activities attributed to the infamous Lazarus APT has been observed during the course of this month. The attackers once again have been leveraging decoy .pdf files masqueraded as job offers from known companies. One of the most recently observed examples involves fake job offers purporting to originate from Coinbase. Malware spread by Lazarus has been compiled for both Intel and Apple Silicon architectures but is very similar when it comes to functionality. Once executed the malware will connect to the predefined C2 servers and await for commands from the threat actors. This latest campaign is similar to previous operations run by Lazarus APT that also involved fake job offers and can be linked to a broader campaign known as "Operation Dream Job". For more information about this operation, check our previous blog: Lazarus Targets Chemical Sector Symantec protects you from this threat, identified by the following: File-based OSX.Nukesped OSX.Trojan.Gen Trojan Horse Trojan.Gen.MBT WS.Malware.1 Web-based Observed domains are covered under security categories
Lazarus group goes after blockchain The infamous threat actor Lazarus group has been active since at least 2009. Also known as HIDDEN COBRA and Guardians of Peace, cybersecurity communities have attributed the adversary to the North Korean government on many occasions over the years. Their activities are known to be destructive and cause havoc in targeted countries and companies. A report that recently came out suggests their targets have shifted from destruction to financial gain. In this particular campaign, the attackers started off with a job advertisement in a document file sent to targets on LinkedIn. The targets are said to be working in an unnamed blockchain company. The document claims to be protected by General Data Protection Regulation (GDPR) and the recipients were asked to enable macros in order to see the contents. This enabled a malicious macro to be executed and kicked off the infection chain. Several payloads were delivered in the attack campaign including the following capabilities: download additional files initiate C2 communication execute arbitrary commands capture credentials connect to the network back door that are on other target hosts Symantec has confirmed coverage for the available IOCs under the following names: Trojan.Gen.NPE W97M.Downloader
LazyScripter APT group remains active since 2018 Symantec Security Response is aware of the released report concerning the activities of the LazyScripter APT group. LazyScripter is active since 2018 and apparently the group's primary motive seems to be focused on theft of sensitive information and intelligence gathering for potential future attacks. It has been reported that a variety of commercially available Remote Access Trojans (RATs) and Infostealers are used in these attacks. Symantec has following detections to avert such campaign: File-based Backdoor.Ratenjay Backdoor.Ratenjay!gen3 Heur.AdvML.B Heur.AdvML.C Infostealer Packed.Generic.525 Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE Trojan.Mdropper W32.Spyrat W97M.Downloader
Leafperforator (aka Sidewinder) Android campaign in South and East Asia The APT group known as Leafperforator (aka Sidewinder and Rattlesnake) have been active since at least 2012 and continues to campaign in South and East Asia. They have been known to use emails with malicious documents/links to exploit or phish targets of interest. The lures used are tailored to contain content which may be of relevance to the target. Recently, one of their campaign against Pakistani entities has been disclosed. The actors planted Android malware on Google Play disguised as VPN, religious, and phone cleaning related apps. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk AppRisk:Generisk
Leafperforator (aka Sidewinder / Rattlesnake) continues to campaign The APT group known as Leafperforator (aka Sidewinder and Rattlesnake) have been active since at least 2012 and continues to campaign in South and East Asia. This APT group has been known to use emails with malicious documents/links to exploit or phish targets of interest. The lures used are tailored to contain content which may be of relevance to the target. In 2020, they were observed using Covid-19 themed lures, taking advantage of interest in the ongoing pandemic. Leafperforator have also been known to used DLL side-loading as a technique to launch their malware payload(s). Payloads have been observed to contain the following functionality: Collect system information. Collect drive and file directory information. Collect files of interest. Update malware configuration. Ex-filtrate information to C2 server. Symantec protects you from this threat, identified by the following: File-based Bloodhound.RTF.20 Trojan.Gen.NPE Trojan.Horse
LEAKDB Ransomware The Phobos ransomware, known as LEAKDB, has emerged as a recent variant in the wild. It encrypts user files, adds a .LEAKDB extension, and includes the victim's ID along with the ransomware developer's email address. The entire appended string looks like the following -> Filename.[original extension].id.[alphanumeric ID].[email].LEAKDB. Upon successful encryption, the ransomware leaves a ransom note in the form of a text file info.txt asking the victims to contact the attackers for further instructions on how to recover the locked data. Symantec protects you from this threat, identified by the following: Behavior-based ACM.Untrst-RunSys!g1 ACM.Ps-RgPst!g1 ACM.Ps-Wbadmin!g1 AGR.Terminate!g2 SONAR.SuspDataRun File-based Ransom.Phobos!gm1 Machine Learning-based Heur.AdvML.B
Lebanese Cedar APT continues its activities Symantec Security Response is aware of the most recent Lebanese Cedar APT group activities. The group has been active since at least 2012, and their reported latest campaign appears to be ongoing since last year. The campaign targets telecommunication and ISP companies among others and aims at ex-filtration of sensitive information. The attackers use vulnerable Oracle and Atlassian Web servers as main intrusion vector and deploy a remote access trojan dubbed as Explosive RAT in the compromised environments. Symantec protection against the latest variants of the Explosive RAT used in this campaign includes: File-based Trojan.Gen.2 Trojan.Gen.NPE Trojan Horse Network-based Web Attack: Atlassian Confluence Server CVE-2019-3396 Web Attack: Jira Remote Code Execution CVE-2019-11581
Legion - Python-based credential harvester Legion is a Python-based credential harvester tool offered for sale on Telegram. The hacktool's main functionality is to retrieve credentials from various web services and misconfigured web servers that can later be used in mass spam campaigns. Legion targets a wide variety of web services including AWS, Twillio, Nexmo, SES, Mailgun and many others. The hacktool has also capabilities for enumeration of vulnerable SMTP servers, remote code execution or exploitation of vulnerable Apache versions. Symantec protects you from this threat, identified by the following: File-based Hacktool WS.Malware.2
Legitimate cloud monitoring admin tool used in cyber attack Attackers have been able to leverage Weave Scope, an open source cloud monitoring tool integrated with Docker, Kubernetes, and other cloud environments, to gain full access to their targets. We are aware of reports that an attack by a threat actor group named TeamTNT uses this mechanism to gain full control over the targeted environment without the need to install malware. Aside from gaining full control the attackers also deploy cryptominers, a usual payload for this particular group. The attack involves accessing an exposed Docker API port to create a new privileged container. This container is then configured to mount its own file system to the file system of the target server thereby gaining access to files. Root access is gained on the server which then allows the attackers to install Weave Scope. Through this administration tool the group can execute various shell commands within the environment without the need for additional malicious code. Symantec protects against related indicators with the following detections: Trojan Horse Trojan.Gen.NPE
LemonDuck - advanced cryptominer now also targets Linux devices We are aware of reports concerning an updated version of the LemonDuck cryptojacking malware. LemonDuck was first spotted back in June 2019 and is known for targeting enterprise networks via the MS SQL service using brute-force attacks, or the SMB protocol using EternalBlue. While initially the malware was focused on Windows systems, it now has a port scanning module that searches for internet-connected Linux systems listening on the 22 TCP port used for SSH Remote Login. Once a target is found, the malware launches SSH brute force attack using the username root and a hardcoded list of passwords. If successful, the malware then downloads and executes malicious shellcode before looking for more Linux devices to infect. Once on a compromised network, the malware drops an XMRig Monero (XMR) CPU miner. In addition to targeting Linux machines, LemonDuck now also has a module that exploits the SMBGhost (CVE-2020-0796) Windows SMBv3 Client/Server remote code execution vulnerability, and another module that scans for and hacks into servers running exposed Redis (REmote DIctionary Server) databases and Hadoop clusters managed using YARN (Yet Another Resource Negotiator). Symantec Protections Downloader Heur.AdvML.B Trojan.Gen.MBT Trojan.Gen.NPE W32.Beapy WS.Malware.1 IPS [32098] OS Attack: Microsoft Server Message Block RCE CVE-2020-0796
Lemon Duck coinminer continues to target Microsoft Exchange servers According to a recent report, Lemon Duck cryptomining malware continues to target unpatched MS Exchange servers. The botnet has also been observed to attempt downloading and executing Cobalt Strike payloads, which is believed to be an evolution in the tactics of the threat group behind this threat. Symantec protects you from this threat, identified by the following: File-based Backdoor.Cobalt Heur.AdvML.B Heur.AdvML.C ISB.Downloader!gen462 ISB.Heuristic!gen5 ISB.Heuristic!gen39 ISB.Lemonduck!gen2 Miner.XMRig Trojan.Gen.MBT Trojan.Gen.NPE Trojan Horse Network-based Attack: Microsoft Exchange Server CVE-2021-26855 Web Attack: Microsoft Exchange Server CVE-2021-26857 Web-based Observed domains are covered under security categories
Lemon_Duck cryptomining malware reported to target vulnerable Exchange Servers Just a few days after DEARCRY ransomware was observed to be used in the Proxylogon attacks, new reports have emerged about the group behind the Lemon_Duck cryptomining botnet also targeting vulnerable Exchange servers. We have discussed Lemon_Duck in our earlier Protection Bulletin back in September. The malware is used to install XMRig Monero (XMR) CPU miners on the infected devices and has been known to exploit several other critical vulnerabilities in the past - EternalBlue and SMBGhost among others. Symantec has a range of coverage in place for ProxyLogon (read more about the coverage here) and the following coverage for latest Lemon_Duck IoCs: File-based CL.Downloader!gen9 Hacktool ISB.Downloader!gen173 Trojan Horse Network-based System Infected: Malicious PowerShell Script Download 3 System Infected: Malicious PowerShell Script Download 4 System Infected: Malicious PowerShell Script Download 5 System Infected: Trojan.Backdoor Activity 404
Leveraging Discord to facilitate malicious activity There has been an increase in usage of communication platforms like Discord and Slack to provide functionality for malware. Threat actors are using these platforms to not only deliver malware but also operate as command and control servers. Symantec Security Response is aware of various RATs, stealers, and other malware types that are leveraging such services. Symantec protects you from these threats, identified by the following: File-based Backdoor.Ratenjay Heur.AdvML.B Heur.AdvML.C Trojan Horse Trojan.Gen.2 Trojan.Gen.NPE Behavior-based SONAR.MalTraffic!gen3 SONAR.Ratenjay!gen1 SONAR.SuspBeh!gen22 SONAR.SuspLaunch!g18 SONAR.SuspLaunch!gen4
Lightning framework, a threat to Linux environments The Linux threat landscape continues to expand as more and more criminal activities are brought to light. Lightning framework is the latest, which can deploy backdoors and rootkits via plugins from a core module. According to reports, this threat stands out as malware targeting Linux is rarely this complex. Actors behind Lightning framework have been disguising their malicious binaries as known software using typosquatting, such as Seahorse. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Policy-based Symantec Data Center Security Hardening for Linux servers prevents Lightning framework Linux malware from infecting Linux hosts and establishing persistence using the MITRE Boot or Logon Initialization Scripts technique.
LightSpy malware implant LightSpy is a modular surveillance tool with variants supporting both Android and iOS platforms. This malware implant has functionality to exfiltrate private user information, GPS location data, SMS messages, messenger apps data, phone call history and others. LightSpy has also capabilities allowing it to comprehensively track browser history on the infected device, remotely execute shell commands and record voice over IP (VOIP) call sessions. Symantec protects you from this threat, identified by the following: File-based OSX.Trojan.Gen Mobile-based Android.Malapp AppRisk:Generisk Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
LilithBot, a bot malware with built-in fuctions This malware is attributed to Eternity Group and sold as Malware-as-a-Service. The malware is constantly upgraded and can be customized for the user by the group. Although it is configurable by the user and can be used to download and run other malware like any other bot malware, it comes with built-in functions like stealer, clipper and miner capabilities. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT Trojan Horse WS.Malware.1 WS.Malware.2 Web-based Observed domains are covered under security categories
Lilith Ransomware A new ransomware emerged recently called Lilith, written in C/C++. This ransomware employs a double-extortion attack technique where the threat actors steal sensitive data and subsequently encrypt infected files. Encrypted files will be appended with a .lilith extension and the generated ransom note will have a file name of "Restore_Your_Files.txt". Symantec protects you from this threat, identified by the following: Behavior-based SONAR.Ransomware!g1 SONAR.Ransomware!g7 File-based Downloader Ransom.Lilith Trojan.Gen.MBT WS.Malware.1
LimeRAT malware actively leveraged by the APT-C-36 threat group LimeRAT is a malware variant attributed to the APT-C-36 (aka Blind Eagle) threat group. The malware has been known for several years now but is continuously used by the threat group and observed in various malicious campaigns during the last few months. LimeRAT is a fairly multi-functional Remote Access Trojan (RAT) that allows for remote control over the infected endpoints but also exhibits various info-stealing and keylogging capabilities. With the help of this malware, the attackers can execute remote arbitrary commands, download files or initiate crypto-mining campaigns, among others. Symantec protects you from this threat, identified by the following: File-based Scr.Malcode!gdn14 Scr.Malcode!gdn32 Trojan Horse Trojan.Gen.MBT Trojan.LimeRat WS.Malware.1 Machine Learning-based Heur.AdvML.B Web-based Observed domains/IPs are covered under security categories
LinkT smishing campaign: fake unpaid bill Phishing and scam actors frequently target users of toll providers due to the combination of financial transactions, a large user base, and the inherent sense of urgency associated with these services. Toll services, being hubs of financial transactions, are attractive to cybercriminals seeking monetary gains. The vast user base that relies on toll providers for transportation creates an appealing target for phishing campaigns, allowing attackers to reach a diverse audience and increase their chances of success. The sense of urgency inherent in toll-related communications becomes a powerful tool for phishing attacks. Users, concerned about potential payment issues or service disruptions, are more likely to hastily respond to phishing attempts, providing attackers with swift access to sensitive information. Lastly, toll providers communicate with users through various channels, including emails, text messages, and phone calls. Cybercriminals orchestrate coordinated phishing campaigns across these channels, enhancing the effectiveness of their social engineering tactics and increasing the probability of success. LinkT – an electronic toll collection (ETC) system used in Australia – is a recent example where Symantec has observed a malicious SMS campaign, with actors luring victims to phishing websites via fake unpaid bill notifications. Observed SMS: Linkt:You have an unpaid vehicle invoice. Click hxxps[:]//link[.]invoiceissue[.]cc for more. Linkt:You have an unpaid vehicle bill. Click hxxps[:]//link[.]ticketissue[.]cc for more. Symantec protects you from this threat, identified by the following: Mobile-based Symantec Endpoint Protection Mobile is able to analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake LinkT domains used in this campaign are known to WebPulse. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Linux-focused BPFDoor backdoor comes with improvements BPFDoor is a backdoor variant targeting Linux and Solaris installations initially discovered in 2021. The malware utilizes Berkeley Packet Filter (BPF) packet sniffer to monitor network traffic and send packets only on existing open ports, bypassing firewall rules and network protections. The latest variants of BPFDoor come with improvements in the implementation of the leveraged BPF filters, proving that the backdoor remains under active development by the threat group behind it. Symantec protects you from this threat, identified by the following: File-based Backdoor.Trojan Linux.BPFDoor Linux.Lightaidra Trojan Horse Trojan.Gen.NPE WS.Malware.1
Linux backdoor RotaJakiro has been hidden for years We are aware of recent reports about a Linux backdoor which had been flying under the radar for a number of years. Identified as RotaJakiro, the backdoor targets 64-bit Linux systems and performs multiple functions typical of backdoors - collecting device info, stealing data, and downloading and executing additional plugins. This backdoor also makes use of varying techniques to maintain persistence and make analysis more difficult. Symantec protects you from this threat, identified by the following: File-based Backdoor.Trojan Network-based URL reputation: Browser navigation to known bad URL Web-based Observed domains are covered under security categories
Linux Binaries as a Stealth Windows Loader Windows Subsystem for Linux (WSL) was first introduced back in April 2016 with the concept of running Linux binaries (in ELF format) natively on Windows 10, Windows 11 and Windows Server 2019. This feature allows running command line tool functionality from Linux to Windows without needing a Virtual Machine setup. Years later, a WSL-based malware has surfaced, crafted on this concept. A group of researchers recently shared their observations of the ongoing malware threat. The main objective of the campaign was to run an ELF loader within the WSL environment and gain a foothold in the Windows systems. Once control is achieved, additional payloads will be installed and injected into running processes using Windows API calls. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.B Meterpreter Packed.Generic.347 Trojan.Gen.MBT Trojan.Gen.NPE Web-based Observed domains are covered under security categories
Linux bot – TNTbottinger The street reports that a group known as TeamTNT has been deploying an IRC bot (TNTbottinger) in recent attacks which packs Denial-of-Service (DDoS) capabilities. Symantec has the following coverage in place for this threat: File-based Trojan.Gen.NPE Trojan.Horse
Linux machines invited on a DreamBus ride Linux DreamBus botnet, a new variant of SystemdMiner, is reportedly out in the wild targeting a series of Linux apps that are typically used in Enterprise environment. The goal of the botnet is to mine Monero (XMR) cryptocurrency. Symantec provides the following coverage: File-based Trojan.Gen.NPE
Linux OS still a coveted target for mining activities While Cryptocurrency markets are being shaken by the collapse of multiple crypto exchanges, businesses, groups and individuals continue to mine using both well-known and lesser known coin miners. While these coin miners are mostly legitimate, potential misuse of the associated software has been flagged over the years, and Symantec has had long standing detections in place for it. Most mining activities are observed on Windows and Linux operating systems and recently, we have seen many tuned for Linux. Symantec protects you from this threat, identified by the following: File-based Miner.XMrig Trojan.Gen.NPE
Linux variant of Ares RAT among various payloads delivered in latest campaigns by SideCopy APT Multiple Remote Access Trojan (RAT) variants have been distributed in the latest campaigns attributed to the SideCopy APT group. The threat actors have been reported to exploit WinRAR vulnerability CVE-2023-38831 in order to deliver RAT variants such as Allakore, DRAT, Key RAT or a Linux strain of the Ares RAT. The attackers are also known to leverage phishing links leading to decoy .pdf documents and to download of malicious LNK and HTA files that result in final payload download onto the compromised systems. One of the mentioned payload variants - Ares malware - is an open-source Python-based RAT capable of shell command execution, screenshot grabbing and additional file download, among others. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.TCP!gen1 File-based CL.Downloader!gen203 CL.Downloader!gen241 Infostealer.Eynice Scr.Malcode!gen Trojan Horse Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.1 Machine Learning-based Heur.AdvML.A!500 Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Linux variant of the SideWalk backdoor A Linux variant of the modular backdoor known as SideWalk has been reported as being in use by the SparklingGoblin advanced persistent threat (APT) group. While the Linux variant of this malware has reportedly been already leveraged back in a 2021 campaign against a Hong Kong university, it was not initially associated with SparklingGoblin activities and named StageClient. The Linux variant exhibits numerous similarities to it's Windows counterpart both in malware architecture as well as C2 communication. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.1 Web-based Observed domains/IPs are covered under security categories
List of suspected DGA-generated domains uncovered On 26 October 2020, Security Response learned of three suspicious domains comprised of a random-letter sub-domain and a root domain containing a multi-word domain and a .biz TLD. Further research revealed that unknown cyber actors with privacy-protected identities registered these domains on 17 September 2020. Additional investigation revealed 17 unique root domains using the .biz TLD and 16 similarly-patterned root domains using a second TLD: .vip. A total of 1,571 unique sub-domains were seen. These domains appeared to be DGA (Domain Generation Algorithm) generated because of the large number of random letter sub-domains and domains composed of random word pairs. Examples: spryxbnn.warintroduce[.]biz dik.worktraining[.]biz rwy.homerealise[.]biz awr.ninecontrol[.]biz bjx.worktraining[.]vip seb.lieseventeen[.]vip aow.warintroduce[.]vip We have also seen these domains being used in suspicious redirect chains. Symantec has protections in place for these campaigns. Web-based Observed domains are covered under security categories
LitterDrifter malware LitterDrifter is a malware variant attributed to the Gamaredon (aka Shuckworm) threat group. LitterDrifter is a worm written in VBS and known to be self-propagated via USB drives. It's main functionalities are to spread infection to additional endpoints and execute commands or arbitrary payloads received from the C&C servers belonging to the threat actors. LitterDrifter has so far been leveraged in campaigns mainly focusing on targets in Ukraine, but there have also been traces of its infections in USA, Vietnam, Chile, Poland and Germany. Symantec protects you from this threat, identified by the following: File-based ISB.Downloader!gen53 Trojan Horse Trojan.Gen.NPE VBS.Downloader.Trojan WS.Malware.2 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Lizar the new fake hacking tool by FIN7 While under the guise as security researchers the cyber crime group FIN7 (aka Fruitfly, Carbanak, Silicon) has released a new backdoor malware package called Lizar that is masquerading as a penetration testing tool. The Lizar toolkit consists of various plugins and a loader that can be used independently or combined into a bot client for different tasks. Its components consist of the following: Client: GUI software interface that FIN7 uses to control infected computers Server: Software that enables communications between the client and infected computers Loader: Initial stage of malware which is used to download and run additional plugins Plugins: Modules used to add different functionality to the malware Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.B Heur.AdvML.C Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 WS.Malware.2 Web-based Observed IPs are covered under security categories
Loaders related to TA505 encrypting with GoLang Security researchers have discovered that the TA505 malware group have recently begun using the GoLang encrypter to wrap .NET loaders in an effort to evade detection. If these loaders succeed they will download PowerShell scripts, miner bots and the ServHelper RAT. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.2 WS.Malware.1 WS.Malware.2 Website-based This attack is proactively blocked by Symantec Web Isolation technology
LOBSHOT malware includes a HVNC component LOBSHOT is a newly discovered malware variant having both infostealing and banking-trojan capabilities. The malware is spread by abuse of Google Ads platform and comes masqueraded as legitimate software installers. LOBSHOT includes a HVNC (Hidden Virtual Network Computing) module allowing the attackers to generate a hidden desktop on the compromised machine and thus provide them with a direct and unnoticed access. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.SuspBeh!gen633 File-based Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.B Heur.AdvML.B!100 Network-based Malicious Site: Malicious Domain Request 21 Malicious Site: Malicious Domain Request 22 Web-based Observed domains/IPs are covered under security categories
Lockbit 2.0 targets organizations in Australia According to the latest reports, a new Lockbit 2.0 variant has been seen targeting Australian organizations from various sectors. This new ransomware variant has been found leveraging an older Fortinet vulnerability identified as CVE-2018-13379 to gain access to victim networks. Lockbit ransomware affiliates are also implementing a technique known as "double extortion", where the victim's stolen data is uploaded to a public leak website in cases where the demanded ransom has not been paid. Symantec protects you from this threat, identified by the following: File-based Downloader Heur.AdvML.B Heur.AdvML.C Ransom.Lockbit Ransom.Lockbit!g2 Ransom.Lockbit!gen3 Trojan.Gen.2 Trojan.Gen.MBT Network-based Attack: Ransom.Lockbit Activity Attack: Ransom.Lockbit Activity 2 Attack: Ransom.Lockbit Activity 3 Web Attack: Fortinet FortiOS Directory Traversal CVE-2018-13379
LockBit campaign leverages Group Policies for network distribution Symantec recently observed threat actors targeting server machines in order to spread the LockBit ransomware threat throughout compromised networks. In one particular attack, after collecting domain-related information, LockBit made use of Group Policy updates to forcefully push the malware laterally through connected systems on the same domain. Read more in our blog: LockBit: Ransomware Puts Servers in the Crosshairs Symantec protects you from this threat, identified by the following: Behavior-based SONAR.RansomLckbit!g1 SONAR.RansomLckbit!g3 SONAR.RansomNokibi!g1 File-based Ransom.LockBit Ransom.LockBit!g2 Ransom.Lockbit!gen3 Ransom.Lockbit!gm1 Scr.Malscript!gen1 Machine Learning-based Heur.AdvML.B Network-based Attack: Lockbit Ransomware Binary Copy GPO Config Attack: Lockbit Ransomware Enable Share GPO Config Attack: Lockbit Ransomware Security Services Taskkill GPO Attack: Lockbit Ransomware Services Disable GPO Config Policy-based Symantec Data Center Security Hardening policies for Windows Servers and Domain Controllers prevent Lockbit ransomware installation. The default DCS lockdown prevents lateral movement of Lockbit ransomware on the network and protects servers from Lockbit execution attempts to tamper with Group Policies and critical system resources. Web-based Observed domains are covered under security categories
Lockbit group using a new encryptor named "LockBit Green" The threat actor group behind Lockbit ransomware has started using a new encryptor based on the leaked source code for Conti ransomware. The encryptors used by the group have gone through several iterations, but the current version has been named Lockbit Green, to differentiate it from other variations that are still in use, Lockbit Black (a.k.a Lockbit 3.0). Symantec protects you from this threat, identified by the following: File-based Downloader Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.C
LockBit leveraging vulnerable drivers to disable security solutions in latest campaigns LockBit is a prolific ransomware-as-a-service (RaaS) variant used by malicious actors Symantec tracks as Syrphid. While this ransomware family was first discovered back in 2019, new updated variants emerge every year. In the most recent campaigns observed by Symantec, LockBit ransomware has been leveraging a tool known as TrueSightKiller. This tool abuses a vulnerable driver called truesight.sys in an effort to disable security solutions. The malware requires to specify a PID (process identifier) or the process name as the parameter to terminate the targeted security solution. This type of attack is widely known as Bring Your Own Vulnerable Driver (BYOVD) and it involves legitimate signed drivers capable of running with kernel privileges. Once dropped onto the victim endpoints BYOVD attacks allow the threat actors to disable AV or EDR solutions during the pre-ransomware execution stage, so before the actual encryption process starts. This is also not the first time LockBit attackers have abused vulnerable drivers in a ransomware campaign. Back in 2022 they leveraged a similar tool known as Terminator for the same purpose. Symantec protects you from this threat, identified by the following: File-based Hacktool Ransom.Lockbit Trojan.Gen.MBT WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.A Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.C Heur.AdvML.B!200 EDR-based Symantec EDR is capable of monitoring and flagging this threat actor's tactics, techniques and procedures. EDR enrichment rules for TrueSightKiller TTPs include: Subvert Trust Controls [T1553] Command and Scripting Interpreter: Windows Command Shell [T1059.003] Create or Modify System Process: Windows Service [T1543.003] Modify Registry [T1112]
LockBit ransomware data leak site goes private again Having a data leak site has been a bit of trend among the ransomware crooks lately. A list of such ransomware includes SunCrypt, Maze, DopplePaymer, Conti and many more. SunCrypt ransomware is covered in one of our recent Protection Bulletins. On top of encrypting files, having stolen data publicly available adds another tool to the arsenal of the ransomware gangs to pressure the affected organization to pay up, especially when the posted information does not adhere to a secure data policy. The growing list now includes LockBit ransomware. This ransomware appears to have first surfaced in the wild at the beginning of 2020. According to public reports, the LockBit authors launched their own data leak site, but shut it down after they joined forces with another ransomware gang. Recently the LockBit group reopened their own website where they leaked stolen information. To protect from LockBit ransomware, always apply the latest definitions. File-based protection Ransom.Lockbit Ransom.Lockbit!g1 SONAR.Lockbit!gen1 SONAR.Lockbit!gen2
Lockbit ransomware re-enters the stage with the new 3.0 aka Lockbit Black variant A new 3.0 variant of the infamous Lockbit ransomware has been released around the end of June 2022. This new version is also referenced as Lockbit Black because of main code similarities to the BlackMatter / Darkside ransomware variants. Lockbit Black requires a -pass parameter to be supplied upon execution. This is in turn similar to the BlackCat (aka. Noberus) ransomware which also requires a specific access-token. Lockbit 3.0 can delete a number of pre-defined services and terminate certain processes. This new version also comes with new icon, wallpaper and ransom note. Symantec protects you from this threat, identified by the following: File-based Downloader Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.B Policy-based DCS default hardening policy provides zero day protection against Lockbit 3.0 ransomware
LockBit Ransomware unleashes Word file tactics LockBit, offered as part of a Ransomware-as-a-Service (RaaS) package, emerged as one of the most active ransomware variants in 2023. Recent reports indicate that the threat group behind LockBit has been utilizing Word files as a distribution method, reminiscent of their past strategies. The primary approach involves embedding malicious macros within Word documents. Upon opening these documents, harmful macros trigger the download of additional code from external URLs, leading to the execution of the LockBit ransomware. The filenames of these malicious Word files often mimic common names or phrases associated with job applications. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 Ransom.Blackmatter!gm1 SONAR.MSWord!g6 Email-based Coverage is in place for Symantec's email security products File-based CL.Downloader!gen20 ISB.Downloader!gen69 Scr.Malcode!gen Trojan.Mdropper W97M.Downloader WS.Malware.1 WS.SecurityRisk.4 Machine Learning-based Heur.AdvML.B Heur.AdvML.A!300 Heur.AdvML.B!100 Heur.AdvML.B!200 Network-based Web Attack: Webpulse Bad Reputation Domain Request (29565) Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Lockbit ransomware variant for macOS A new Lockbit ransomware variant targeting macOS platform has been discovered. The identified macOS ransomware samples seem to be based on Lockbit’s Linux encryptor and only compiled for macOS with rudimentary configuration settings. This variant appears to be still in development and not ready for deployment in any attacks against macOS machines. Given the Lockbit operations leverage encryptors for several different operating systems, including Windows, Linux, ESXi, it might be only a matter of time before a fully operational macOS version is used in the wild as well. Symantec protects you from this threat, identified by the following: File-based OSX.Ransom.Lockbit Trojan Horse
Lockean, a threat group tied to ransomware Lockean is the name of a newly identified ransomware group, attributed with several ransomware attacks on French companies in the last 2 years. In the attacks attributed to the group, some of the tools and ransomware strains used were different over time (Maze, Egregor, Sodinokibi, DoppelPaymer and ProLock, all are Ransomware-as-a-Service). However, the group was identified due to the commonalities seen in the attacks. The initial infection vector in most cases was spam email campaigns involving a variety of loaders, it mainly uses QakBot as first payload, Cobal Strike for lateral movement, data exfiltration with rclone, and similarities in naming convention and infrastructure used for Cobalt Strike C2 Servers. Symantec protects you from this threat, identified by the following: File-based Packed.Generic.459 Ransom.Maze Ransom.Maze!gm Ransom.RagnarLock!g1 Trojan.Anserin Trojan.Cryptolock!g24 Trojan.Gen.2 Trojan Horse WS.Malware.1 Behavior-based SONAR.TCP!gen1 SONAR.Module!gen3 Machine Learning-based Heur.AdvML.* Web-based Observed domains are covered under security categories
LockFile Ransomware activity observed leveraging PetitPotam We have observed ongoing campaigns leveraging a recently discovered ransomware named Lockfile. These attack campaigns appear to be infiltrating organizations by way of vulnerable Microsoft Exchange servers. Evidence suggests that Exchange vulnerabilities collectively known as ProxyShell are targeted for this initial infiltration. Once inside, the attackers take advantage of an incompletely patched vulnerability (CVE-2021-36942) affecting Microsoft’s NTLM authentication system. By performing a particular NTLM Relay Attack, dubbed PetitPotam, the attackers can access the domain controller to spread through the network. Additional information can be found in our blog, LockFile: Ransomware Uses PetitPotam Exploit to Compromise Windows Domain Controllers. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.C Ransom.Lockfile Ransom.CryptoTorLocker Network-based Audit: SMB EFS NTLM Relay Attempt 2 OS Attack: SMB EFS NTLM Relay Attempt Web Attack: Microsoft Exchange Server RCE CVE-2021-34473 Web Attack: Microsoft Exchange Server Elevation of Privilege CVE-2021-34523 Policy-based: Symantec Data Center Security default hardening policies for Microsoft Exchange servers and Windows Domain Controllers protect against ProxyShell vulnerabilities and prevent Lockfile ransomware attacks on Domain Controllers. Threat Defense for Active Directory (TDAD) prevents a potential adversary from spreading across the enterprise. Lateral movement attempts or Domain privilege escalation for any malicious purpose will be detected and blocked.
Lockxx Ransomware There have been reports of yet another actor joining the ransomware landscape, doing the rounds in Asia, Europe and the US. Once this threat is successfully executed on a compromised machine, it will encrypt files and append a .lockxx extension. In addition, a ransom note in HTA format (lockxx.recovery_data.hta) will be dropped, written in both English and Chinese, where one can switch between language using a button on top of the HTA file. Symantec protects you from this threat, identified by the following: Behavior-based ACM.Untrst-RunSys!g1 SONAR.SuspLaunch!g193 ACM.Wmic-DlShcp!g1 SONAR.SuspLaunch!g189 SONAR.SuspLaunch!g340 SONAR.SuspLaunch!g341 SONAR.SuspLaunch!g195 SONAR.SuspLaunch!g250 File-based Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B!100
Loda and Warzone RAT targeted campaigns observed Multiple groups are using Loda and Warzone RAT in targeted attacks worldwide, including recent reports of campaigns in Russia that use government document lures. These attacks begin with a malicious email containing a VHDX attachment, which in turn contains two decoy documents and a malicious LNK. When executed, the LNK will deploy either Warzone RAT or Loda RAT. Symantec protects you from this threat, identified by the following: File-based Scr.Malcode!gdn32 Trojan.Gen.MBT Trojan.Gen.2 Trojan Horse Machine Learning-based Heur.AdvML.B Heur.AdvML.C
LodaRAT goes Android The developers of LodaRAT have incorporated an Android based payload to their portfolio. Symantec Security Response is aware of a recent campaign using a multi-stage delivery to deploy the Loda Remote Access Trojan to both Windows and Android systems. Symantec provides the following coverage for known indicators of this campaign: File-based Exp.CVE-2017-11882!g2 Heur.AdvML.C Trojan.Gen.MBT Trojan.Gen.NPE Mobile-based AdLibrary:Generisk Android.Reputation.1
LodaRAT remains active with new functionalities LodaRAT is a remote access trojan initially discovered back in 2020. The malware remains active in the wild with a number of 2022 campaigns where it has been either dropped by other malware variants such as VenomRAT or was distributed together with additional payloads of Redline Stealer or Neshta. LodaRAT is written in AutoIt programming language and the latest strains contain functionality to enumerate any attached removable storage and automatically copy malware files to it. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.SuspDataRun SONAR.TCP!gen1 File-based Scr.Malcode!gen Trojan Horse W32.Neshuta WS.Malware.1 Machine Learning-based Heur.AdvML.B Web-based Observed domains/IPs are covered under security categories
LodaRAT updated with new versions in new campaigns We are aware of reports of newly identified versions of the remote access trojan named LodaRAT. New campaigns have been observed distributing LodaRAT via email with malicious RAR archive attachments using a ".rev" file extension. Previous campaigns leveraged malicious Word docs and exploits as part of the infection chain. Additional changes found in the newer versions can be seen in the lack of obfuscation and the implementation of a Powershell keylogger, which is added and then removed in the "newest" version discovered. Symantec provides the following coverage for the associated indicators: File-based Trojan.Gen.MBT Trojan.Gen.NPE Trojan Horse Behavior-based SONAR.SuspDataRun Website-based This attack is proactively blocked by Symantec Web Isolation technology
LODEINFO malware continues targeting organizations in Japan LODEINFO is a malware family discovered initially in 2019 and attributed to the APT10 threat group. Over the years the malware has been known to target organizations in both governmental and public sectors in Japan. According to a latest report, the malware remains active in 2022 campaigns and continues to target entities in Japan. LODEINFO has been continuously updated and improved by its' creators since the time of the initial discovery. The latest variants have been reported to implement support for 64bit architecture or add improvements in the C2 communication, among others. Symantec protects you from this threat, identified by the following: File-based ISB.Downloader!gen411 Scr.Malcode!gen Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT W97M.Downloader WS.Malware.1 Machine Learning-based Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories
Log4j exploitation leads to Proxyjacking attacks CVE-2021-44228 (aka Log4Shell) is a critical vulnerability in Apache Log4j library disclosed back in 2021. The vulnerability is still frequently used in the wild despite being known already for two years. According to a recent report, a new campaign leverages CVE-2021-44228 for the purpose of proxyjacking. After the threat actors have gained access to the targeted endpoint in such an attack, they install a proxy agent payload that successfully transforms the compromised system into a remote proxy server. The attackers can then make profit by selling access to the compromised server to a proxyware service provider. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Network-based Audit: Log4j2 RCE CVE-2021-44228 Attack: Log4j2 RCE CVE-2021-44228 2 Attack: Log4j2 RCE CVE-2021-44228 3 Attack: Log4j2 RCE CVE-2021-44228 4 Attack: Log4j2 RCE CVE-2021-44228 5 Attack: Log4j2 RCE CVE-2021-44228 7 Web-based Observed domains/IPs are covered under security categories
LogoKit phishing campaigns On a daily basis there are countless phishing attempts, generated by a variety of phishing kits. Recently, one has come under the spotlight as it gains in prevalence, using open redirect vulnerabilities in the hope of evading malspam detection. An open redirect vulnerability allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL as a parameter to the proper function. Known as LogoKit, it's been used to mostly phish credentials of large, popular services such as Office 365, GoDaddy and various banks. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products Web-based Observed domains are covered under security categories
Lokibot, aging but still prevalent Lokibot malware has been around since at least 2015 and is still very much active in today's threat landscape. Over the years, authors behind this threat have continuously maintained and upgraded it. The main infection vector has not changed though, still primarily being spread via malicious email campaigns which Symantec regularly observes targeting companies and institutions around the globe. These malspam campaigns don't use trendy or fancy social engineering tactics, they continue to use run-of-the-mill quotes, shipping, swift, invoice and payment related social engineering themes. Recent campaigns have been observed using the following email subjects: URGENT PROFORMA INVOICE FOR PAYMENT SWIFT-MLSB-2105001 RFQ /QUO. AE21-SZ477 Awaiting your invoice for remittance Advance payment and schedule update 31 INV2021 LC/TT Payment Transaction URGENT PROFORMA INVOICE FOR PAYMENT SHIPPING DOCUMENT Payment Advice Buyer & Payment Position RATE REQUEST SEA FREIGHT IMPORT PAYMENT TO NEW BANK DETAILS (CONFIRM BANK DETAILS) Symantec protects you from this threat, identified by the following: Behavior-based Infostealer.Lokibot!gm SONAR.SuspBeh!gen667 SONAR.Trafic2.RGC!g13 Email-based Coverage is in place for Symantec's email security products File-based Exp.CVE-2017-11882!g5 MSIL.Packed.19 Packed.Generic.528 Packed.Generic.606 Scr.Malcode!gdn30 Trojan Horse Machine Learning-based Heur.AdvML.B Heur.AdvML.C Network-based System Infected: Infostealer.Lokibot Activity 2
Lokibot is still very prevalent in the Email threat landscape Lokibot is clearly not fading away with these malicious infosealers being delivered almost daily by email. Most of these emails are associated with spam campaigns in which the actors are gambling on the high output of emails rather than sophisticated social engineering and attack chain. The Lokibot malware is able to steal credentials from hundreds of applications including browsers, FTP clients, Email clients, SSH clients and password management software. This malware has been around since 2015 and is one of the most prevalent infostealers observed to date, used by many different groups and individuals. In a recent campaign, we've seen thousands of malicious emails being sent in a period of just one month (August 15th - September 15th). The group behind the campaign is using simple social engineering based on the well-known SWIFT payment system while impersonating a Chinese Industrial Food Dehydrator Manufacturer. Apparently, these attacks are not targeted attacks as we have seen them being delivered to various industries and organisations. Email subject: SWIFT Email attachment: SWIFT.rar Symantec has various detections in place for Lokibot, see below: File-based Infostealer.Lokibot* Heur.AdvML.B WS.Malware.2 SONAR.SuspLaunch!g12 Sonar.Lokibot* Network-based System Infected: Infostealer.Lokibot Activity* Email-based AVE/Heur.AdvML.B!200
Lokibot malware delivered through new campaigns using multiple methods Recently observed campaigns spreading the Lokibot infostealer have been found to be using multiple delivery methods to infect targets. We have identified malicious PDFs, RTFs, and Office documents as the initial infection vector. These files are attached to email and attempt to directly download relevant payloads or may leverage older, commonly seen vulnerabilities (like CVE-2017-11882) to achieve their purpose. Symantec protects you from this threat, identified by the following: File-based Bloodhound.RTF.12 Bloodhound.RTF.20 Exp.CVE-2017-11882!g5 Heur.AdvML.B Infostealer!im Infostealer.Lokibot!gm Trojan!im Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE W97M.Downloader Behavior-based SONAR.Trafic2.RGC!g13 Web-based Observed domains are covered under security categories Email-based Coverage is in place for Symantec's email security products.
Lokibot shipped in IMG and LHZ archives hits LATAM Most of us are well accustomed to Lokibot now given its prevalence across the globe and the length of time it's been around. Symantec recently observed a campaign which predominantly targets industries in Latin America, but has also been seen in Spain and Portugal. The actors leverage a classic bank transfer social engineering tactic purported to involve a well-known bank in Mexico. The emails contain two archives (IMG and LHZ), both of which include the Lokibot binary. This malware is able to steal credentials from hundreds of applications including browsers, FTP clients, Email clients, SSH clients and password management software. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products File-based Trojan Horse Machine Learning-based Heur.AdvML.B
Lokibot uptick in the email landscape At this point, Lokibot is one of those infostealers that most everyone is aware of, having been in the threat landscape for a few years now with prevalence remaining high. This threat has been used for credential and cryptocurrency wallet theft, but also as a backdoor to deploy second-stage malware. On top of that it's been responsible for countless credential dumps on the darknet. Symantec continues to observe campaigns on a daily basis but over the past few weeks we have seen somewhat of an increase in malspam activity. These malspam campaigns don't use trendy or fancy social engineering tactics, instead actors rely on run-of-the-mill quotes, shipping, SWIFT, invoice and payment related social engineering themes. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.ProcHijack!g21 Email-based Coverage is in place for Symantec's email security products File-based Trojan.Gen.2 Trojan.Gen.MBT Network-based System Infected: Bad Reputation Process Request 4 Machine Learning-based Heur.AdvML.B
LokiLocker is doing the rounds again Spotted earlier this year, LokiLocker Ransomware-as-a-Service continues to be observed in the threat landscape. Actors behind this ransomware still employ encryption and file deletion on a timer to further pressure victims into paying the ransom. When it comes to the extension appended to encrypted files, it tends to change between variants. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.Cryptlck!g171 SONAR.Heur.Dropper SONAR.Ransomgen!gen3 File-based Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B
Look out for fake installers that are really infostealers A malware distribution campaign, likely distributed via online advertising, has been observed trying to trick users into executing fake software installers. The fake installers execute several tasks including an information stealer looking for any credentials on the system, a backdoor that enables remote access via a stealth RDP connection and a malicious Chrome browser extension containing a keylogger and other infostealer behaviors. Symantec protects you from these threats, identified by the following: File-based PUA.DriverPack Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT VBS.Downloader.Trojan Machine Learning-based Heur.AdvML.B Heur.AdvML.C Web-based Observed domains are covered under security categories
Lookout for new NoEscape Ransomware on the horizon Yet another Ransomware-as-a-Service (RaaS) program that goes by the name "NoEscape" has been observed advertising for new partners on the Dark Web. NoEscape is written in C++ and uses a highly customizable Ransomware as a Service (RaaS) model. The malware has functionality to disable UAC, stop system services and processes, as well as delete system backup and shadow copies. Following successful encryption NoEscape will append extensions like “.CCBDFHCHFD” to the encrypted files, drop ransom notes in the form of .txt files. This model is being continually updated so it is likely we'll observe more activity once additional partners are found. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.SuspLaunch!g189 SONAR.SuspLaunch!g193 File-based Trojan.Gen.2 Trojan.Gen.MBT Trojan Horse WS.Malware.2 Machine Learning-based Heur.AdvML.B Heur.AdvML.C Network-based Attack: Ransom.Gen Activity 46
Look out for the new Konni Konni RAT has been around since 2014, but only recently has a new variant been spotted, and potentially linked to the North Korean APT group named APT37. The malicious activity starts with spam email containing a weaponized Microsoft Word document attached to entice victims to open it. The latest iteration of the spam campaign contains one of two documents written in Russian language. One relates to trade and economic issues between Russia and the Korean Peninsula, while the other document deals with intergovernmental Russian-Mongolian commission meetings. The primary victims of this RAT are political organizations in Russia and South Korea, but other countries such as Japan, Mongolia, Nepal, and Vietnam have been targeted. Once the document is opened macro code is executed to start a chain of activities that results in the deployment of the Konni RAT. This new variant of Konni Uses a different bypass technique based the victim's OS Uses different macros from previous instances Executes scripts using Javascript Is heavily obfuscated Symantec protects you from this threat, identified by the following: File-based Backdoor.Trojan Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Trojan.Mdropper W97M.Downloader Web-based Observed domains are covered under security categories Email-based Coverage is in place for Symantec's email security products.
LostTrust Ransomware LostTrust is a recently discovered ransomware variant believed to be a rebrand of the MetaEncryptor malware strain. The attackers behind this malware leverage a public leak site where they release victims details of their attacks. LostTrust ransomware encrypts user files and appends .losttrustencoded extension to them. Ransom note is delivered through a .txt file called !LostTrustEncoded.txt which is dropped in each of the encrypted folders on the compromised endpoint. The malware has also capabilities to disable miscellaneous processes and services on the target machine and to delete the shadow volume copies. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.RansomPlay!gen1 SONAR.SuspLaunch!g190 File-based Ransom.Zombie Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.A!400 Heur.AdvML.A!500 Heur.AdvML.B!100 Heur.AdvML.B!200
Louse (aka Patchwork) APT group Louse APT (aka Patchwork or Quilted Tiger) is a threat group first identified in 2015 that has been known to prevalently target high-profile organizations, financial and governmental entities as well as media, energy and pharmaceutical sectors across the world. The group has been leveraging a wide range of malware variants and custom tools in their attacks. BadNews backdoor and VajraSpy RAT are just two examples of malware strains attributed to this threat actor. Louse APT has been employing spear-phishing and watering hole attacks as well as leveraging exploits of known vulnerabilities in efforts to compromise the targeted entities. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Ps-Http!g2 File-based Trojan Horse Trojan.Gen.2 Trojan.Gen.NPE Trojan.Mdropper W97M.Downloader Web.Reputation.1 WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Heur.AdvML.C Network-based System Infected: Trojan.Backdoor Activity 721 Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Love Ransomware Another ransomware that goes by the name "LoveRansomware" has been observed doing the rounds. Interestingly, the ransom amount is not stated in the ransom note that is left on affected machines. The actors are asking the victim to reach out to them via email or Telegram. Containing nothing that makes it stand out of the crowd, this is a simple run-of-mill ransomware. Post-encryption, files are appended with a .Love extension. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.Ransomnemty!g2 SONAR.Ransomnokibi!g1 File-based Ransom.HiddenTear!g1
Luca Stealer - a new Rust-based infostealer A new infostealer written in the Rust programming language and dubbed Luca Stealer has been discovered. The source code for this malware has just recently been leaked on a cybercrime forum. The malware targets primarily Chromium-based browsers, messaging apps and crypto wallets with the added functionality to steal victims’ files. The infostealer trojan ex-filtrates the collected data, credentials or financial information through a Telegram bot or via Discord’s webhooks. Symantec protects you from this threat, identified by the following: File-based Downloader Trojan Horse Trojan.Gen.MBT WS.Malware.1 WS.Malware.2 Network-based System Infected: Trojan.Backdoor Activity 564 System Infected: Trojan.Backdoor Activity 634
Lucifer DDoS botnet activities A new campaign has been observed in the wild that makes use of a Linux DDoS botnet called Lucifer. The malware targets instances of Apache Hadoop YARN and Apache Druid infrastructure. It exploits any potential misconfigurations or known vulnerabilities to gain access to the targeted systems. Once the malware successfully infects the system, it downloads and executes the main payload, which is a trojan known as XMRig coinminer. This trojan is used to mine the Monero cryptocurrency. Symantec protects you from this threat, identified by the following: File-based Backdoor.Trojan PUA.Gen.2 Trojan.Gen.NPE WS.Malware.1 Network-based Web Attack: Apache Druid RCE CVE-2021-25646 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Lumar infostealer Lumar is a newly discovered infostealer variant advertised for sale in the form of a Malware-as-a-Service (MaaS) package on underground forums. The malware has capabilities to extract browser cookies and credentials, collect various user files, steal cryptocurrency wallets or capture Telegram sessions, among others. The extracted data is forwarded to the C2 servers controlled by the malware authors. Symantec protects you from this threat, identified by the following: File-based Trojan Horse WS.Malware.2 Machine Learning-based Heur.AdvML.B Network-based System Infected: Trojan.Backdoor Activity 634
LuminousMoth APT - large scale campaigns on selected targets According to a recently released report, a threat actor group known as LuminousMoth has been engaged in targeted attacks on organizations in South East Asia. The actors have been leveraging Cobalt Strike Beacons in the reported campaigns and also deploying additional info-stealing malware. The TTPs characteristic for this APT group show a certain overlap with another threat actor known as HoneyMyte (MustangPanda). Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.C Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 WS.Malware.2 Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed IPs/domains are covered under security categories.
LummaC2 Infostealer LummaC2 is an infostealing malware advertised and sold on underground forums. The malware extracts various data from both Chromium and Mozilla-based browsers. LummaC2 also targets various crypto wallets and any two-factor authentication (2FA) extensions installed on the victim's machine. Once collected, the data is encrypted by the stealer malware before being forwarded to the C2 servers controlled by the attackers. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Ws.Malware.1 Machine Learning-based Heur.AdvML.B Web-based Observed domains/IPs are covered under security categories
Lumma stealer getting views on YouTube Lumma stealer, an infostealer variant written in C and known to be roaming the threat landscape since at least 2022, has been making the rounds via YouTube instructional videos. The videos entice users with offers of cracked software, hiding behind shortened links leading unsuspecting users to download Lumma stealer instead. Once on the infected machine, Lumma will attempt to steal data stored in the system browsers as well any present cryptocurrency wallets. This malware continues to be sold on underground forums and has been continuously evolving over time with latest versions adding new capability to load additional arbitrary payloads on the infected endpoint. Symantec protects you from this threat, identified by the following: File-based MSIL.Packed.12 Trojan.Gen.MBT WS.Malware.1 WS.Reputation.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.C Network-based System Infected: Infostealer LummaC2 Activity System Infected: Infostealer LummaC2 Activity 02 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Lumma stealer in-the-wild Lumma is yet another infostealer that's recently been seen lurking in the threatscape. Not exactly a standout from the crowd, it has the same capabilities as many other infostealers which are pretty much tuned for the current environment. Lumma's main capabilities are as follows: Steals login credentials, cookies and autofill information multiple browsers Stores different types of information in text files Steals data from browser extensions which are related to Cryptocurrency Wallets Targets additional Chrome-based browser extensions related to two-factor and multi-factor authentication (2FA/MFA) and password management Steals wallets and confidential files that are related to crypto wallet applications by checking the default wallet file location in AppData Symantec protects you from this threat, identified by the following: File-based Infostealer Packed.Vmpbad!gen38 Trojan.Gen.2
Lunar Reborn stealer Lunar Reborn is yet another infostealer that has recently been advertised. Symantec has already observed both test and malicious drive-by-download activities which may be run by multiple groups and individuals. The malware is simple and has generic infostealing capabilities (with a sweet tooth for Growtopia and Roblox) including the following: Symantec protects you from this threat, identified by the following: Steal passwords, cookies, history, credit card, autofills, etc. from known Chromium and Gecko based browsers Steal Growtopia account Steal Roblox cookies Steal Discord tokens Steal cryptowallets Self delete Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.ProcHijack!gen8 SONAR.SuspBeh!gen633 File-based Trojan Horse Machine Learning-based Heur.AdvML.B Heur.AdvML.C
Lust Stealer Fairly new on the scene, Lust stealer is another run-of-the-mill infostealer that has been seen recently in the threat landscape. This threat is not bound to one group and is being sold as malware-as-a-service. At this time, the threat is mainly distributed via drive-by-download. In observed campaigns, most actors have disguised their Lust Stealer binary as popular games, Discord and TikTok hacks. Symantec protects you from this threat, identified by the following: Machine Learning-based Heur.AdvML.B