text
stringlengths 0
383k
|
---|
Kuiper Ransomware
Kuiper is a relatively new ransomware family observed first around September 2023, that was advertised for sale around that time in the form of a Ransomware-as-a-Service offering. Kuiper comes in variants supporting different platforms including Windows, Linux and macOS. The malware encrypts user files and appends .kuiper extension to them. A certain set of file extensions and folders is excluded from encryption. Further capabilities depend on the variant and might include change of the desktop wallpaper, deletion of the malware binaries post-encryption, terminating of selected system processes or removal of volume shadow copies, among others.
Symantec protects you from this threat, identified by the following:
Behavior-based
ACM.Ps-Enc!g1
ACM.Ps-Net!g1
ACM.Untrst-RunSys!g1
AGR.Terminate!g2
SONAR.Cryptlocker!g42
SONAR.SuspLaunch!g18
SONAR.SuspLaunch!g190
SONAR.TCP!gen1
File-based
ISB.Heuristic!gen58
OSX.Trojan.Gen
Ransom.Kuiper
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!500
Heur.AdvML.C
EDR-based
Symantec added malware-specific threat hunting queries which can be fired on the customer iCDM console. For more information, refer to this link: https://github.com/Symantec/threathunters/tree/main/Ransomwares/Kuiper
Symantec EDR is capable of monitoring and flagging this threat actor's tactics, techniques and procedures. EDR enrichment rules for Kuiper ransomware TTPs include:
Process Injection: Process Hollowing [T1055.012]
Command and Scripting Interpreter: Windows Command Shell [T1059.003]
Service Stop [T1489]
Impair Defenses [T1562]
System Services: Service Execution [T1569.002]
Indicator Removal: Clear Windows Event Logs [T1070.001]
Process Discovery [T1057]
Data Encrypted for Impact [T1486]
Command and Scripting Interpreter: PowerShell [T1059.001]
Command and Scripting Interpreter [T1059]
Obfuscated Files or Information [T1027]
File and Directory Discovery [T1083]
Command and Scripting Interpreter: Unix Shell [T1059.004]
Ingress Tool Transfer [T1105]
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
KV-Botnet
KV-Botnet is a threat attributed to the APT group Volt Typhoon (also known as Bronze Silhouette). The botnet has been leveraged mostly to proxy malicious traffic through compromised small office/home offices (SOHO) devices in the group's campaigns. KV-Botnet has been active in multiple attacks since at least February 2022 until its dismantlement by the FBI in December 2023. Shortly after the takedown, the threat actors attempted to regain control and revive the botnet. While those efforts were reported to be unsuccessful, there's a potential for the botnet's activities to resurface in the future.
Symantec protects you from this threat, identified by the following:
File-based
Linux.Trojan
Downloader
Trojan Horse
Trojan.Gen.NPE
WS.Malware.1
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
L00KUPRU Ransomware
L00KUPRU is a new Xorist ransomware variant recently discovered in the wild. The malware encrypts user files and adds the .L00KUPRU extension to them.The attackers drop a ransom noted as a text file called "HOW TO DECRYPT FILES.txt" and demand payment in Bitcoin cryptocurrency. Additionally, the ransom note is displayed in a pop-up window on the desktop providing the victims with contact details of the attackers as well as BTC wallet address for payments.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Ps-RgPst!g1
File-based
Ransom.CryptoTorLocker
WS.Malware.1
Machine Learning-based
Heur.AdvML.B |
Lambda Ransomware
Lambda (aka LambdaCrypter) is another recently discovered run-off-the-mill ransomware variant that is being distributed in the wild. The malware encrypts user files and appends .Lambda extension to them. Upon successful encryption, the malware drops a ransom note in the form of the .txt file called "LAMBDA_README.txt". The attackers advise the impacted victims to visit the onion website called out in the ransom note for further instructions on how to retrieve the encrypted files.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.Ransomware!g38
SONAR.TCP!gen1
File-based
Ransom.Lambda
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Network-based
Attack: Ransom.Gen Activity 46
System Infected: Trojan.Backdoor Activity 568
System Infected: Trojan.Backdoor Activity 634 |
Laplas Clipper
Clipping crypto wallets is a growing trend as Symantec continues to observe more and more threats with this capability. Laplas is yet another one, currently being advertised on underground Russian-speaking forums, and observed in-the-wild. This clipper will swap victims' cryptocurrency wallet addresses with ones owned by the malware actor.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
File-based
Trojan.Gen.2
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.C |
Large number of U.S. Census-themed typo-squatter domains being registered
On a daily basis, cyber actors register new typo-squatter domains which could be used for themed phishing campaigns or malicious redirection. These domains usually mimic major brands or are directly related to current events such as Covid-19, the upcoming U.S. election, etc.
This year we have seen a large number of U.S. Census-themed typo-squatter domains registered, with over 800 registered in the last two months alone. These highly suspicious domains have reflected the following patterns or themes:
Census Training
Section 508 Accessibility
Census Geographies
Symantec has various protections in place for these campaigns:
Web-based
Observed domains are covered under security categories
Network-based
Audit: Suspicious Domain Request
Audit: Suspicious Domain Request 2 |
Large Turkish bank spoofed in Snake Keylogger malspam campaign
Symantec has recently observed a malspam campaign in which one of the largest and most prominent banks in Turkey is being spoofed to deliver the Snake Keylogger. The actors attempt to lure victims with "account transaction" social engineering. The malicious emails (subject: Hesap hareketleriniz) have a GZ archive attached (Hesap hareketleriniz pdf.gz), containing the Snake Keylogger binary. Local and international companies of all sectors operating in Turkey are the primary targets in this campaign.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
Behavior-based
SONAR.SuspBeh!gen752
SONAR.SuspLaunch!g310
File-based
Scr.Malcode!gdn34
Machine Learning-based
Heur.AdvML.B |
Latest activities of Pawn Storm threat group (aka APT28)
Pawn Storm (aka APT28 or Fancy Bear) is a threat group that has been active on the threat landscape for around two decades. Over the course of the last year, the threat actors have been launching targeted NTLMv2 hash relay attacks against a number of victims from various sectors including governmental entities, defense industry, financial, energy and transportation sectors, among others. Pawn Storm are known to leverage spear-phishing runs, brute force attacks as well as exploitation of known exposed vulnerabilities in their campaigns.
Symantec protects you from this threat, identified by the following:
Behavior-based
ACM.Ps-Http!g2
ACM.Ps-Rd32!g1
ACM.Untrst-FlPst!g1
File-based
CL.Downloader!gen241
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.NPE
Web.Reputation.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.A!400
Heur.AdvML.A!500
Heur.AdvML.C
Network-based
System Infected: Trojan.Backdoor Activity 721
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Latest activities of the Mantis APT group
The Mantis cyber-espionage group (aka Arid Viper, Desert Falcon, APT-C-23), a threat actor believed to be operating out of the Palestinian territories, is continuing to mount attacks, deploying a refreshed toolset and going to great lengths to maintain a persistent presence on targeted networks. While the group is known for targeting organizations in the Middle East, the most recent campaign uncovered by Symantec, by Broadcom Software, focused on organizations within the Palestinian territories, with malicious activity beginning in September 2022 and continuing to at least February 2023. This targeting is not unprecedented for Mantis and Symantec previously uncovered attacks against individuals located in the Palestinian territories during 2017.
Read more in our blog: Mantis: New Tooling Used in Attacks Against Palestinian Targets
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.SuspPE!gen19
SONAR.TCP!gen1
SONAR.TCP!gen6
File-based
Backdoor.Trojan
Trojan Horse
Trojan.Aridgopher
Trojan.Exmatter
Trojan.Micropsia
WS.Malware.1
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.B
Heur.AdvML.C
Network-based
System Infected: Trojan.Backdoor Activity 634
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories |
Latest activities of the SideCopy APT group
SideCopy is a threat actor active on the threat landscape since at least 2019. The group is known to target organizations and governmental institutions from India and Afghanistan. The most recent campaigns attributed to this APT have seen usage of Remote Access Trojans (RATs) such as Action RAT and AllaKore RAT. The attackers have also been reported to leverage a post-exploitation framework called SILENTTRINITY for the purpose of payload generation. The distributed RAT variants have functionalities that allow the attackers to retrieve information about the infected machines, execute arbitrary commands or download further malicious payloads.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
File-based
CL.Downloader!gen203
CL.Downloader!gen241
Downloader
ISB.Downloader!gen67
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.NPE
W97M.Downloader
WS.Malware.1
Machine Learning-based
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories |
Latest Agent Tesla distribution campaigns keep leveraging old vulnerabilities
Agent Tesla is one of the most prevalent infostealers with remote access capabilities that has been present on the threat landscape in last few years. This malware is observed globally on a daily basis and is predominantly distributed via malicious emails. A recent phishing campaign spreading this malware has been seen leveraging relatively old Microsoft vulnerabilities CVE-2017-11882 and CVE-2018-0802 within its attack chain. The attackers have been distributing phishing emails masqueraded as purchase invoices, with malicious Excel files attached that in turn contained the exploits for the mentioned vulnerabilities. The dropped Agent Tesla modules have the functionality to exfiltrate credentials from various browsers, emails clients and applications, log keystrokes and take screenshots from the compromised machines, among others.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
Email-based
Coverage is in place for Symantec’s email security products
File-based
Exp.CVE-2017-11882!g5
Scr.Malcode!gdn32
Trojan Horse
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Network-based
Attack: Microsoft Office CVE-2018-0802
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Latest Atomic Stealer (AMOS) variant leverages Python scripts
Atomic Stealer (AMOS) is a malware variant targeted at the macOS platform. A new variant that drops and leverages Python scripts for detection evasion and data collection has been observed. The captured data includes information stored in Chromium-based browsers such as passwords or cookies, system information, credentials or data related to installed crypto-wallets and cryptocurrency extensions etc. All collected information is compressed into a .zip archive and forwarded to a C2 server controlled by the attackers.
Symantec protects you from this threat, identified by the following:
File-based
OSX.Trojan.Gen
OSX.Trojan.Gen.2
WS.Malware.1
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Latest BlackNet, free on multiple underground forums
Symantec has observed multiple new command-and-control servers that have been associated with BlackNet. Further investigation indicated that individuals have recently posted BlackNet v3.5.2 for free on underground forums. It's not the first time BlackNet source code has been made accessible to a larger audience - earlier this year it was posted on Github although promptly removed.
BlackNet is able to perform various actions on a compromised machine such as: Upload file, execute scripts and shell commands, open webpage (visible / hidden), capture screenshot, steal saved password (Chrome and Firefox), Keylogging, etc. This malware is mostly distributed via malicious email but also drive-by-download.
Symantec has the following coverage in place:
File-based:
Trojan.Gen.MBT
Trojan Horse
WS.Malware.1
WS.Malware.2
Heur.AdvML.B
Heur.AdvML.C
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Website-based
This attack is proactively blocked by Symantec Web Isolation technology |
Latest Dark Pink APT activities
Dark Pink is an advanced persistent threat (APT) group known to be focused on the Asia-Pacific (APAC) region. Dark Pink targets corporate espionage, information/data theft and ex-filtration, among others. The group leverages a wide variety of malware variants and custom tools. Some of these include Cucky infostealer, Ctealer malware, TelePowerBot implant and KamiKakaBot. The data collected from compromised endpoints is ex-filtrated either through public cloud services, HTTP protocol or various Webhooks.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
WS.Reputation.1
Machine Learning-based
Heur.AdvML.A!500
Heur.AdvML.B
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Latest FinSpy variants come with multi-OS support
A new report has emerged about a recent spying campaign using the FinSpy commodity malware to target members of Egyptian civil society organizations. FinSpy is a spying tool known in the past to have been sold to governments and law enforcement agencies, but has been also used by oppressive regimes. Spyware features include keylogging, intercepting of phone calls, ex-filtration of data, audio and camera recording among others.
The most recent Finspy campaign has been active since September of last year and utilizes previously unseen variants for Linux and Mac operating systems.
Symantec provides the following protection against this threat:
File-based
Heur.AdvML.C
OSX.Trojan.Gen
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
Mobile-based
AppRisk:Generisk
Website-based
This attack is proactively blocked by Symantec Web Isolation technology |
Latest Gozi campaigns target banking and cryptocurrency sectors
Gozi (aka Ursnif, Snifula) is a well-known banking trojan family active on the threat landscape for over 15 years. The malware is designed to steal login credentials, two-factor authentication codes, banking details and other confidential data from the infected endpoints. The latest observed campaigns distributing Gozi have been targeting the banking sector and companies associated with the cryptocurrency industry, such as exchanges and blockchain service providers.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.SuspScript!g20
File-based
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.A!400
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Latest Joker variant comes with obfuscation techniques and multi-stage payloads
A new variant of the Joker mobile malware has been observed in the wild. Joker is a malware family initially discovered back in 2017 that has been known to target Android devices with info-stealing purposes. The new variant features advanced obfuscation and evasion techniques including the ability to download multi-staged payloads.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
Android.Reputation.2
AppRisk:Generisk |
Latest Lokibot campaign targets old vulnerabilities
Lokibot malware has been recently observed in a campaign exploiting two fairly old MS Remote Code Execution (RCE) vulnerabilities - CVE-2021-40444 and CVE-2022-30190. Attackers have been embedding malicious macros in MS Office documents that once executed lead to infections with the final payload. The Lokibot malware is present on the threat landscape for many years and is known to be primarily spread via malspam and used for info-stealing purposes.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
File-based
Infostealer.Lokibot
Trojan Horse
Trojan.Gen.2
Trojan.Malscript
W32.IRCBot.NG
W97M.Downloader
WS.Malware.2
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Network-based
Web Attack: Microsoft MSHTML RCE CVE-2021-40444
Web Attack: MSDT Remote Code Execution CVE-2022-30190
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Latest Lumma Stealer variants spread via Discord
Lumma Stealer is an infostealer variant written in C and known on the threat landscape since at least 2022. A new campaign abusing Discord’s content delivery network (CDN) to distribute this malware has been just recently observed in the wild. Once on the infected machine, Lumma will attempt to steal data stored in the system browsers as well any present cryptocurrency wallets. This malware continues to be sold on underground forums and has been continuously evolving overtime with latest versions adding new capability to load additional arbitrary payloads on the infected endpoint.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.MBT
WS.Malware.1
WS.Reputation.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Network-based
System Infected: Infostealer LummaC2 Activity
System Infected: Infostealer LummaC2 Activity 02
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Latest Medusa botnet variant comes with a ransomware module
Medusa is a DDoS botnet based on the code of the popular Mirai malware. A new variant of this botnet just emerged in the wild with addition of a ransomware and Telnet brute-force modules. The ransomware module is able to search through the infected machine for files with pre-defined extensions, encrypt them using AES 256-bit encryption, and finally append .medusastealer extension to the encrypted files. The malware has also a functionality to delete all files from the infected system drives after encryption, turning it more into a data wiper instead.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.NPE
WS.Malware.1 |
Latest Phobos ransomware variants observed in the wild
Phobos is a ransomware family well established on the threat landscape and active since at least 2019. New variants of this malware keep emerging in the wild each month. Just last week we have observed three new variants known as Elpy, Elbie and GrafGrafel. They encrypt user data and append a string of data to the encrypted files that consist of an unique ID number, threat actor contact email address and a respectively .Elpy, .Elbie or .GrafGrafel extension. The ransom note is usually left in a form of a text file containing instructions on how to recover the files. Phobos ransomware comes with capabilities allowing it to delete Volume Shadow Copies, disable the Windows firewall as well as terminate selected system processes.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.SuspDataRun
File-based
Ransom.Phobos
Ransom.Phobos!g2
Ransom.Phobos!gm1
WS.SecurityRisk.4
Machine Learning-based
Heur.AdvML.B
Network-based
Attack: Ransom.Crysis Activity 3 |
Latest Ryuk ransomware variant targets webservers
According to a recently released report, the latest Ryuk variant is used in attacks targeted specifically at webservers. This malware variant includes a functionality to replace the webserver index file with a ransom note, and it will also print out the ransom note on the connected default printer.
Symantec protects you from this threat, identified by the following:
File-based
Heur.AdvML.B
Ransom.Ryuk
Ransom.Ryuk!gm
Trojan.Gen.MBT
Behavior-based
SONAR.RansomRyuk!gen1
SONAR.RansomRyuk!g3
SONAR.RansomRyuk!g5
SONAR.SuspBeh!gen57
Network-based
Audit: Ransom.Ryuk Activity
Audit: Ransom.Ryuk Activity 2
Attack: Ransom.Ryuk Activity 3
Attack: Ransom.Ryuk Activity 4 |
Latest version of Meduza in the wild
New ads for a stealer known as Meduza (its newer version) have recently been observed, and activities have already been noticed (drive-by-download). This stealer is pretty much the same as all other stealers out there, with some comparing it to more nefarious ones capability-wise such as AzorUlt, Raccoon, and RedLine. The threat targets sensitive browser information, cryptowallets, Discord and Telegram data, Steam, password managers, etc.
Symantec protects you from this threat, identified by the following:
Behavior-based
ACM.Ps-Msbuild!g1
File-based
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B!100
Heur.AdvML.B!200 |
Latest XLoader macOS variant spread under the disguise of OfficeNote application
XLoader is a re-branded malware variant of the infamous Formbook infostealer. Its main functionality is to steal credentials, web browser cookies and data, log keystrokes on the compromised system and steal other sorts of user confidential data. The macOS variant emerged on the threat landscape around 2021 and was spread in the form of a Java application. The newest campaign distributing XLoader to macOS systems has been masquerading the malware binaries as a productivity application called ‘OfficeNote’. The application has been bundled into a .dmg image file and initially signed with a valid digital signature, that has been since revoked. Once deployed, the malware installs the persistence agent and starts collecting clipboard information and data stored in various web browsers, among others.
Symantec protects you from this threat, identified by the following:
File-based
OSX.Trojan.Gen
OSX.Trojan.Gen.2
WS.Malware.1 |
Latest Xorist ransomware variants
Xorist ransomware (aka. EnCiPhErEd) is a well established malware family. Despite it being relatively old, it remains active on the threat landscape and every month we observe new variants being distributed in the wild. Xorist is mostly spread via cracked software installers, drive-by-downloads or malspam campaigns. Latest strains of this malware encrypt user files and append .hjutm or .th extensions. The ransom note is dropped in form of a .txt file but also displayed as a pop-up window to the victims.
Symantec protects you from this threat, identified by the following:
File-based
Ransom.CryptoTorLocker
WS.Malware.1
Machine Learning-based
Heur.AdvML.B |
Latrodectus malware
Latrodectus loader is a malware variant first discovered in November 2023. The malware has been recently distributed in malicious campaigns attributed to the TA577 and TA578 threat groups. The loader is mostly used in the initial stages of the attacks to execute remote commands and to download additional payloads. Notably, its distribution campaigns exhibit similarities with previous IcedID operations in techniques and infrastructure usage.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Ps-Rd32!g1
ACM.Ps-Wscr!g1
ACM.Wscr-Rd32!g1
Behavior-based
AGR.Terminate!g2
SONAR.SuspBeh!gen805
SONAR.SuspLaunch!g360
File-based
Scr.Heuristic!gen20
Scr.Malcode!gen
Scr.Malcode!gen137
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.NPE
Trojan.Latrodectus
Trojan.Pikabot!gen13
Web.Reputation.1
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.A!400
Heur.AdvML.A!500
Heur.AdvML.B!100
Heur.AdvML.B!200
Heur.AdvML.C
Network-based
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
LaZagne hacktool leverages Desktop-Bus (D-Bus) APIs on Linux systems for data extraction
LaZagne is a popular open-source password recovery tool known to be used by multiple threat actors for the purpose of credential theft. With the various threat groups showing an increased interest in Linux systems, also LaZagne variant for this OS has seen a more widespread use in the wild. The LaZagne Linux modules have been observed to leverage D-Bus APIs to steal confidential data including credentials. D-Bus (short for "Desktop Bus") is a mechanism commonly used in Unix-like systems that allows for communication between multiple components and applications. Recent LaZagne campaigns leveraging D-Bus APIs have been targeting data extraction from applications such as Pidgin or KWallet.
Symantec protects you from this threat, identified by the following:
File-based
Hacktool
Hacktool.LaZagne
Hacktool.LaZagne!gen1
Infostealer
SecurityRisk.LaZagne
Trojan Horse
Trojan.Gen.NPE
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Lazarus adds QtBitcoinTrader to AppleJeus
The Lazarus (aka Appleworm) group continues their AppleJeus operation with a series of attacks on cryptocurrency exchanges. So far, at least seven different versions of AppleJeus have been discovered, each of which is designed to target a different cryptocurrency trading application. Recently light has been shed on newer samples and the abuse of yet another cryptocurrency trading application, QtBitcoinTrader.
Initially the malware was spread using fake versions of legitimate trading platform websites. Later however, the attackers switched vectors, relying on phishing, social networking, and social engineering techniques to fool victims into downloading the malware.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Horse
Trojan.Gen.MBT |
Lazarus APT, now focused on IT Supply Chain
This year the North Korean state-backed hacker group 'Lazarus' were consistent in targeting the cyber defense industry. It has recently been reported that they are now expanding their capabilities with supply chain attacks. Such malicious acts, if successful, will allow the hackers to able to launch a wide range of attack on corporate networks.
Lazarus is known to deliver a remote access trojan called COPPERHEDGE via BLINDINGCAN backdoor. Using this RAT, threat actors will be able to easily facilitate system reconnaissance, running of arbitrary commands on compromised systems, and data exfiltration.
Symantec protects you from this threat, identified by the following:
File-based
Backdoor.Trojan
Trojan.Gen.2
Trojan.Gen.MBT
Web-based
Observed domains are covered under security categories |
Lazarus APT targets jobseekers with macOS malware
A new instance of malicious activities attributed to the infamous Lazarus APT has been observed during the course of this month. The attackers once again have been leveraging decoy .pdf files masqueraded as job offers from known companies. One of the most recently observed examples involves fake job offers purporting to originate from Coinbase. Malware spread by Lazarus has been compiled for both Intel and Apple Silicon architectures but is very similar when it comes to functionality. Once executed the malware will connect to the predefined C2 servers and await for commands from the threat actors.
This latest campaign is similar to previous operations run by Lazarus APT that also involved fake job offers and can be linked to a broader campaign known as "Operation Dream Job". For more information about this operation, check our previous blog: Lazarus Targets Chemical Sector
Symantec protects you from this threat, identified by the following:
File-based
OSX.Nukesped
OSX.Trojan.Gen
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
Web-based
Observed domains are covered under security categories |
Lazarus group goes after blockchain
The infamous threat actor Lazarus group has been active since at least 2009. Also known as HIDDEN COBRA and Guardians of Peace, cybersecurity communities have attributed the adversary to the North Korean government on many occasions over the years. Their activities are known to be destructive and cause havoc in targeted countries and companies.
A report that recently came out suggests their targets have shifted from destruction to financial gain. In this particular campaign, the attackers started off with a job advertisement in a document file sent to targets on LinkedIn. The targets are said to be working in an unnamed blockchain company. The document claims to be protected by General Data Protection Regulation (GDPR) and the recipients were asked to enable macros in order to see the contents. This enabled a malicious macro to be executed and kicked off the infection chain.
Several payloads were delivered in the attack campaign including the following capabilities:
download additional files
initiate C2 communication
execute arbitrary commands
capture credentials
connect to the network back door that are on other target hosts
Symantec has confirmed coverage for the available IOCs under the following names:
Trojan.Gen.NPE
W97M.Downloader |
LazyScripter APT group remains active since 2018
Symantec Security Response is aware of the released report concerning the activities of the LazyScripter APT group. LazyScripter is active since 2018 and apparently the group's primary motive seems to be focused on theft of sensitive information and intelligence gathering for potential future attacks. It has been reported that a variety of commercially available Remote Access Trojans (RATs) and Infostealers are used in these attacks.
Symantec has following detections to avert such campaign:
File-based
Backdoor.Ratenjay
Backdoor.Ratenjay!gen3
Heur.AdvML.B
Heur.AdvML.C
Infostealer
Packed.Generic.525
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
Trojan.Mdropper
W32.Spyrat
W97M.Downloader |
Leafperforator (aka Sidewinder) Android campaign in South and East Asia
The APT group known as Leafperforator (aka Sidewinder and Rattlesnake) have been active since at least 2012 and continues to campaign in South and East Asia. They have been known to use emails with malicious documents/links to exploit or phish targets of interest. The lures used are tailored to contain content which may be of relevance to the target. Recently, one of their campaign against Pakistani entities has been disclosed. The actors planted Android malware on Google Play disguised as VPN, religious, and phone cleaning related apps.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
AppRisk:Generisk |
Leafperforator (aka Sidewinder / Rattlesnake) continues to campaign
The APT group known as Leafperforator (aka Sidewinder and Rattlesnake) have been active since at least 2012 and continues to campaign in South and East Asia. This APT group has been known to use emails with malicious documents/links to exploit or phish targets of interest. The lures used are tailored to contain content which may be of relevance to the target. In 2020, they were observed using Covid-19 themed lures, taking advantage of interest in the ongoing pandemic. Leafperforator have also been known to used DLL side-loading as a technique to launch their malware payload(s). Payloads have been observed to contain the following functionality:
Collect system information.
Collect drive and file directory information.
Collect files of interest.
Update malware configuration.
Ex-filtrate information to C2 server.
Symantec protects you from this threat, identified by the following:
File-based
Bloodhound.RTF.20
Trojan.Gen.NPE
Trojan.Horse |
LEAKDB Ransomware
The Phobos ransomware, known as LEAKDB, has emerged as a recent variant in the wild. It encrypts user files, adds a .LEAKDB extension, and includes the victim's ID along with the ransomware developer's email address. The entire appended string looks like the following -> Filename.[original extension].id.[alphanumeric ID].[email].LEAKDB. Upon successful encryption, the ransomware leaves a ransom note in the form of a text file info.txt asking the victims to contact the attackers for further instructions on how to recover the locked data.
Symantec protects you from this threat, identified by the following:
Behavior-based
ACM.Untrst-RunSys!g1
ACM.Ps-RgPst!g1
ACM.Ps-Wbadmin!g1
AGR.Terminate!g2
SONAR.SuspDataRun
File-based
Ransom.Phobos!gm1
Machine Learning-based
Heur.AdvML.B |
Lebanese Cedar APT continues its activities
Symantec Security Response is aware of the most recent Lebanese Cedar APT group activities. The group has been active since at least 2012, and their reported latest campaign appears to be ongoing since last year. The campaign targets telecommunication and ISP companies among others and aims at ex-filtration of sensitive information. The attackers use vulnerable Oracle and Atlassian Web servers as main intrusion vector and deploy a remote access trojan dubbed as Explosive RAT in the compromised environments.
Symantec protection against the latest variants of the Explosive RAT used in this campaign includes:
File-based
Trojan.Gen.2
Trojan.Gen.NPE
Trojan Horse
Network-based
Web Attack: Atlassian Confluence Server CVE-2019-3396
Web Attack: Jira Remote Code Execution CVE-2019-11581 |
Legion - Python-based credential harvester
Legion is a Python-based credential harvester tool offered for sale on Telegram. The hacktool's main functionality is to retrieve credentials from various web services and misconfigured web servers that can later be used in mass spam campaigns. Legion targets a wide variety of web services including AWS, Twillio, Nexmo, SES, Mailgun and many others. The hacktool has also capabilities for enumeration of vulnerable SMTP servers, remote code execution or exploitation of vulnerable Apache versions.
Symantec protects you from this threat, identified by the following:
File-based
Hacktool
WS.Malware.2 |
Legitimate cloud monitoring admin tool used in cyber attack
Attackers have been able to leverage Weave Scope, an open source cloud monitoring tool integrated with Docker, Kubernetes, and other cloud environments, to gain full access to their targets. We are aware of reports that an attack by a threat actor group named TeamTNT uses this mechanism to gain full control over the targeted environment without the need to install malware. Aside from gaining full control the attackers also deploy cryptominers, a usual payload for this particular group.
The attack involves accessing an exposed Docker API port to create a new privileged container. This container is then configured to mount its own file system to the file system of the target server thereby gaining access to files. Root access is gained on the server which then allows the attackers to install Weave Scope. Through this administration tool the group can execute various shell commands within the environment without the need for additional malicious code.
Symantec protects against related indicators with the following detections:
Trojan Horse
Trojan.Gen.NPE |
LemonDuck - advanced cryptominer now also targets Linux devices
We are aware of reports concerning an updated version of the LemonDuck cryptojacking malware. LemonDuck was first spotted back in June 2019 and is known for targeting enterprise networks via the MS SQL service using brute-force attacks, or the SMB protocol using EternalBlue. While initially the malware was focused on Windows systems, it now has a port scanning module that searches for internet-connected Linux systems listening on the 22 TCP port used for SSH Remote Login. Once a target is found, the malware launches SSH brute force attack using the username root and a hardcoded list of passwords. If successful, the malware then downloads and executes malicious shellcode before looking for more Linux devices to infect. Once on a compromised network, the malware drops an XMRig Monero (XMR) CPU miner.
In addition to targeting Linux machines, LemonDuck now also has a module that exploits the SMBGhost (CVE-2020-0796) Windows SMBv3 Client/Server remote code execution vulnerability, and another module that scans for and hacks into servers running exposed Redis (REmote DIctionary Server) databases and Hadoop clusters managed using YARN (Yet Another Resource Negotiator).
Symantec Protections
Downloader
Heur.AdvML.B
Trojan.Gen.MBT
Trojan.Gen.NPE
W32.Beapy
WS.Malware.1
IPS [32098] OS Attack: Microsoft Server Message Block RCE CVE-2020-0796 |
Lemon Duck coinminer continues to target Microsoft Exchange servers
According to a recent report, Lemon Duck cryptomining malware continues to target unpatched MS Exchange servers. The botnet has also been observed to attempt downloading and executing Cobalt Strike payloads, which is believed to be an evolution in the tactics of the threat group behind this threat.
Symantec protects you from this threat, identified by the following:
File-based
Backdoor.Cobalt
Heur.AdvML.B
Heur.AdvML.C
ISB.Downloader!gen462
ISB.Heuristic!gen5
ISB.Heuristic!gen39
ISB.Lemonduck!gen2
Miner.XMRig
Trojan.Gen.MBT
Trojan.Gen.NPE
Trojan Horse
Network-based
Attack: Microsoft Exchange Server CVE-2021-26855
Web Attack: Microsoft Exchange Server CVE-2021-26857
Web-based
Observed domains are covered under security categories |
Lemon_Duck cryptomining malware reported to target vulnerable Exchange Servers
Just a few days after DEARCRY ransomware was observed to be used in the Proxylogon attacks, new reports have emerged about the group behind the Lemon_Duck cryptomining botnet also targeting vulnerable Exchange servers. We have discussed Lemon_Duck in our earlier Protection Bulletin back in September. The malware is used to install XMRig Monero (XMR) CPU miners on the infected devices and has been known to exploit several other critical vulnerabilities in the past - EternalBlue and SMBGhost among others.
Symantec has a range of coverage in place for ProxyLogon (read more about the coverage here) and the following coverage for latest Lemon_Duck IoCs:
File-based
CL.Downloader!gen9
Hacktool
ISB.Downloader!gen173
Trojan Horse
Network-based
System Infected: Malicious PowerShell Script Download 3
System Infected: Malicious PowerShell Script Download 4
System Infected: Malicious PowerShell Script Download 5
System Infected: Trojan.Backdoor Activity 404 |
Leveraging Discord to facilitate malicious activity
There has been an increase in usage of communication platforms like Discord and Slack to provide functionality for malware. Threat actors are using these platforms to not only deliver malware but also operate as command and control servers. Symantec Security Response is aware of various RATs, stealers, and other malware types that are leveraging such services.
Symantec protects you from these threats, identified by the following:
File-based
Backdoor.Ratenjay
Heur.AdvML.B
Heur.AdvML.C
Trojan Horse
Trojan.Gen.2
Trojan.Gen.NPE
Behavior-based
SONAR.MalTraffic!gen3
SONAR.Ratenjay!gen1
SONAR.SuspBeh!gen22
SONAR.SuspLaunch!g18
SONAR.SuspLaunch!gen4 |
Lightning framework, a threat to Linux environments
The Linux threat landscape continues to expand as more and more criminal activities are brought to light. Lightning framework is the latest, which can deploy backdoors and rootkits via plugins from a core module. According to reports, this threat stands out as malware targeting Linux is rarely this complex. Actors behind Lightning framework have been disguising their malicious binaries as known software using typosquatting, such as Seahorse.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Policy-based
Symantec Data Center Security Hardening for Linux servers prevents Lightning framework Linux malware from infecting Linux hosts and establishing persistence using the MITRE Boot or Logon Initialization Scripts technique. |
LightSpy malware implant
LightSpy is a modular surveillance tool with variants supporting both Android and iOS platforms. This malware implant has functionality to exfiltrate private user information, GPS location data, SMS messages, messenger apps data, phone call history and others. LightSpy has also capabilities allowing it to comprehensively track browser history on the infected device, remotely execute shell commands and record voice over IP (VOIP) call sessions.
Symantec protects you from this threat, identified by the following:
File-based
OSX.Trojan.Gen
Mobile-based
Android.Malapp
AppRisk:Generisk
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
LilithBot, a bot malware with built-in fuctions
This malware is attributed to Eternity Group and sold as Malware-as-a-Service. The malware is constantly upgraded and can be customized for the user by the group. Although it is configurable by the user and can be used to download and run other malware like any other bot malware, it comes with built-in functions like stealer, clipper and miner capabilities.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.MBT
Trojan Horse
WS.Malware.1
WS.Malware.2
Web-based
Observed domains are covered under security categories |
Lilith Ransomware
A new ransomware emerged recently called Lilith, written in C/C++. This ransomware employs a double-extortion attack technique where the threat actors steal sensitive data and subsequently encrypt infected files. Encrypted files will be appended with a .lilith extension and the generated ransom note will have a file name of "Restore_Your_Files.txt".
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.Ransomware!g1
SONAR.Ransomware!g7
File-based
Downloader
Ransom.Lilith
Trojan.Gen.MBT
WS.Malware.1 |
LimeRAT malware actively leveraged by the APT-C-36 threat group
LimeRAT is a malware variant attributed to the APT-C-36 (aka Blind Eagle) threat group. The malware has been known for several years now but is continuously used by the threat group and observed in various malicious campaigns during the last few months. LimeRAT is a fairly multi-functional Remote Access Trojan (RAT) that allows for remote control over the infected endpoints but also exhibits various info-stealing and keylogging capabilities. With the help of this malware, the attackers can execute remote arbitrary commands, download files or initiate crypto-mining campaigns, among others.
Symantec protects you from this threat, identified by the following:
File-based
Scr.Malcode!gdn14
Scr.Malcode!gdn32
Trojan Horse
Trojan.Gen.MBT
Trojan.LimeRat
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Web-based
Observed domains/IPs are covered under security categories |
LinkT smishing campaign: fake unpaid bill
Phishing and scam actors frequently target users of toll providers due to the combination of financial transactions, a large user base, and the inherent sense of urgency associated with these services.
Toll services, being hubs of financial transactions, are attractive to cybercriminals seeking monetary gains. The vast user base that relies on toll providers for transportation creates an appealing target for phishing campaigns, allowing attackers to reach a diverse audience and increase their chances of success.
The sense of urgency inherent in toll-related communications becomes a powerful tool for phishing attacks. Users, concerned about potential payment issues or service disruptions, are more likely to hastily respond to phishing attempts, providing attackers with swift access to sensitive information.
Lastly, toll providers communicate with users through various channels, including emails, text messages, and phone calls. Cybercriminals orchestrate coordinated phishing campaigns across these channels, enhancing the effectiveness of their social engineering tactics and increasing the probability of success.
LinkT – an electronic toll collection (ETC) system used in Australia – is a recent example where Symantec has observed a malicious SMS campaign, with actors luring victims to phishing websites via fake unpaid bill notifications.
Observed SMS:
Linkt:You have an unpaid vehicle invoice. Click hxxps[:]//link[.]invoiceissue[.]cc for more.
Linkt:You have an unpaid vehicle bill. Click hxxps[:]//link[.]ticketissue[.]cc for more.
Symantec protects you from this threat, identified by the following:
Mobile-based
Symantec Endpoint Protection Mobile is able to analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake LinkT domains used in this campaign are known to WebPulse.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
Linux-focused BPFDoor backdoor comes with improvements
BPFDoor is a backdoor variant targeting Linux and Solaris installations initially discovered in 2021. The malware utilizes Berkeley Packet Filter (BPF) packet sniffer to monitor network traffic and send packets only on existing open ports, bypassing firewall rules and network protections. The latest variants of BPFDoor come with improvements in the implementation of the leveraged BPF filters, proving that the backdoor remains under active development by the threat group behind it.
Symantec protects you from this threat, identified by the following:
File-based
Backdoor.Trojan
Linux.BPFDoor
Linux.Lightaidra
Trojan Horse
Trojan.Gen.NPE
WS.Malware.1 |
Linux backdoor RotaJakiro has been hidden for years
We are aware of recent reports about a Linux backdoor which had been flying under the radar for a number of years. Identified as RotaJakiro, the backdoor targets 64-bit Linux systems and performs multiple functions typical of backdoors - collecting device info, stealing data, and downloading and executing additional plugins. This backdoor also makes use of varying techniques to maintain persistence and make analysis more difficult.
Symantec protects you from this threat, identified by the following:
File-based
Backdoor.Trojan
Network-based
URL reputation: Browser navigation to known bad URL
Web-based
Observed domains are covered under security categories |
Linux Binaries as a Stealth Windows Loader
Windows Subsystem for Linux (WSL) was first introduced back in April 2016 with the concept of running Linux binaries (in ELF format) natively on Windows 10, Windows 11 and Windows Server 2019. This feature allows running command line tool functionality from Linux to Windows without needing a Virtual Machine setup. Years later, a WSL-based malware has surfaced, crafted on this concept.
A group of researchers recently shared their observations of the ongoing malware threat. The main objective of the campaign was to run an ELF loader within the WSL environment and gain a foothold in the Windows systems. Once control is achieved, additional payloads will be installed and injected into running processes using Windows API calls.
Symantec protects you from this threat, identified by the following:
File-based
Heur.AdvML.B
Meterpreter
Packed.Generic.347
Trojan.Gen.MBT
Trojan.Gen.NPE
Web-based
Observed domains are covered under security categories |
Linux bot – TNTbottinger
The street reports that a group known as TeamTNT has been deploying an IRC bot (TNTbottinger) in recent attacks which packs Denial-of-Service (DDoS) capabilities. Symantec has the following coverage in place for this threat:
File-based
Trojan.Gen.NPE
Trojan.Horse |
Linux machines invited on a DreamBus ride
Linux DreamBus botnet, a new variant of SystemdMiner, is reportedly out in the wild targeting a series of Linux apps that are typically used in Enterprise environment. The goal of the botnet is to mine Monero (XMR) cryptocurrency.
Symantec provides the following coverage:
File-based
Trojan.Gen.NPE |
Linux OS still a coveted target for mining activities
While Cryptocurrency markets are being shaken by the collapse of multiple crypto exchanges, businesses, groups and individuals continue to mine using both well-known and lesser known coin miners. While these coin miners are mostly legitimate, potential misuse of the associated software has been flagged over the years, and Symantec has had long standing detections in place for it. Most mining activities are observed on Windows and Linux operating systems and recently, we have seen many tuned for Linux.
Symantec protects you from this threat, identified by the following:
File-based
Miner.XMrig
Trojan.Gen.NPE |
Linux variant of Ares RAT among various payloads delivered in latest campaigns by SideCopy APT
Multiple Remote Access Trojan (RAT) variants have been distributed in the latest campaigns attributed to the SideCopy APT group. The threat actors have been reported to exploit WinRAR vulnerability CVE-2023-38831 in order to deliver RAT variants such as Allakore, DRAT, Key RAT or a Linux strain of the Ares RAT. The attackers are also known to leverage phishing links leading to decoy .pdf documents and to download of malicious LNK and HTA files that result in final payload download onto the compromised systems. One of the mentioned payload variants - Ares malware - is an open-source Python-based RAT capable of shell command execution, screenshot grabbing and additional file download, among others.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.TCP!gen1
File-based
CL.Downloader!gen203
CL.Downloader!gen241
Infostealer.Eynice
Scr.Malcode!gen
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!500
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
Linux variant of the SideWalk backdoor
A Linux variant of the modular backdoor known as SideWalk has been reported as being in use by the SparklingGoblin advanced persistent threat (APT) group. While the Linux variant of this malware has reportedly been already leveraged back in a 2021 campaign against a Hong Kong university, it was not initially associated with SparklingGoblin activities and named StageClient. The Linux variant exhibits numerous similarities to it's Windows counterpart both in malware architecture as well as C2 communication.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
Web-based
Observed domains/IPs are covered under security categories |
List of suspected DGA-generated domains uncovered
On 26 October 2020, Security Response learned of three suspicious domains comprised of a random-letter sub-domain and a root domain containing a multi-word domain and a .biz TLD. Further research revealed that unknown cyber actors with privacy-protected identities registered these domains on 17 September 2020. Additional investigation revealed 17 unique root domains using the .biz TLD and 16 similarly-patterned root domains using a second TLD: .vip. A total of 1,571 unique sub-domains were seen.
These domains appeared to be DGA (Domain Generation Algorithm) generated because of the large number of random letter sub-domains and domains composed of random word pairs. Examples:
spryxbnn.warintroduce[.]biz
dik.worktraining[.]biz
rwy.homerealise[.]biz
awr.ninecontrol[.]biz
bjx.worktraining[.]vip
seb.lieseventeen[.]vip
aow.warintroduce[.]vip
We have also seen these domains being used in suspicious redirect chains.
Symantec has protections in place for these campaigns.
Web-based
Observed domains are covered under security categories |
LitterDrifter malware
LitterDrifter is a malware variant attributed to the Gamaredon (aka Shuckworm) threat group. LitterDrifter is a worm written in VBS and known to be self-propagated via USB drives. It's main functionalities are to spread infection to additional endpoints and execute commands or arbitrary payloads received from the C&C servers belonging to the threat actors. LitterDrifter has so far been leveraged in campaigns mainly focusing on targets in Ukraine, but there have also been traces of its infections in USA, Vietnam, Chile, Poland and Germany.
Symantec protects you from this threat, identified by the following:
File-based
ISB.Downloader!gen53
Trojan Horse
Trojan.Gen.NPE
VBS.Downloader.Trojan
WS.Malware.2
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Lizar the new fake hacking tool by FIN7
While under the guise as security researchers the cyber crime group FIN7 (aka Fruitfly, Carbanak, Silicon) has released a new backdoor malware package called Lizar that is masquerading as a penetration testing tool.
The Lizar toolkit consists of various plugins and a loader that can be used independently or combined into a bot client for different tasks.
Its components consist of the following:
Client: GUI software interface that FIN7 uses to control infected computers
Server: Software that enables communications between the client and infected computers
Loader: Initial stage of malware which is used to download and run additional plugins
Plugins: Modules used to add different functionality to the malware
Symantec protects you from this threat, identified by the following:
File-based
Heur.AdvML.B
Heur.AdvML.C
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
WS.Malware.2
Web-based
Observed IPs are covered under security categories |
Loaders related to TA505 encrypting with GoLang
Security researchers have discovered that the TA505 malware group have recently begun using the GoLang encrypter to wrap .NET loaders in an effort to evade detection. If these loaders succeed they will download PowerShell scripts, miner bots and the ServHelper RAT.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.2
WS.Malware.1
WS.Malware.2
Website-based
This attack is proactively blocked by Symantec Web Isolation technology |
LOBSHOT malware includes a HVNC component
LOBSHOT is a newly discovered malware variant having both infostealing and banking-trojan capabilities. The malware is spread by abuse of Google Ads platform and comes masqueraded as legitimate software installers. LOBSHOT includes a HVNC (Hidden Virtual Network Computing) module allowing the attackers to generate a hidden desktop on the compromised machine and thus provide them with a direct and unnoticed access.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.SuspBeh!gen633
File-based
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.B!100
Network-based
Malicious Site: Malicious Domain Request 21
Malicious Site: Malicious Domain Request 22
Web-based
Observed domains/IPs are covered under security categories |
Lockbit 2.0 targets organizations in Australia
According to the latest reports, a new Lockbit 2.0 variant has been seen targeting Australian organizations from various sectors. This new ransomware variant has been found leveraging an older Fortinet vulnerability identified as CVE-2018-13379 to gain access to victim networks. Lockbit ransomware affiliates are also implementing a technique known as "double extortion", where the victim's stolen data is uploaded to a public leak website in cases where the demanded ransom has not been paid.
Symantec protects you from this threat, identified by the following:
File-based
Downloader
Heur.AdvML.B
Heur.AdvML.C
Ransom.Lockbit
Ransom.Lockbit!g2
Ransom.Lockbit!gen3
Trojan.Gen.2
Trojan.Gen.MBT
Network-based
Attack: Ransom.Lockbit Activity
Attack: Ransom.Lockbit Activity 2
Attack: Ransom.Lockbit Activity 3
Web Attack: Fortinet FortiOS Directory Traversal CVE-2018-13379 |
LockBit campaign leverages Group Policies for network distribution
Symantec recently observed threat actors targeting server machines in order to spread the LockBit ransomware threat throughout compromised networks. In one particular attack, after collecting domain-related information, LockBit made use of Group Policy updates to forcefully push the malware laterally through connected systems on the same domain.
Read more in our blog: LockBit: Ransomware Puts Servers in the Crosshairs
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.RansomLckbit!g1
SONAR.RansomLckbit!g3
SONAR.RansomNokibi!g1
File-based
Ransom.LockBit
Ransom.LockBit!g2
Ransom.Lockbit!gen3
Ransom.Lockbit!gm1
Scr.Malscript!gen1
Machine Learning-based
Heur.AdvML.B
Network-based
Attack: Lockbit Ransomware Binary Copy GPO Config
Attack: Lockbit Ransomware Enable Share GPO Config
Attack: Lockbit Ransomware Security Services Taskkill GPO
Attack: Lockbit Ransomware Services Disable GPO Config
Policy-based
Symantec Data Center Security Hardening policies for Windows Servers and Domain Controllers prevent Lockbit ransomware installation. The default DCS lockdown prevents lateral movement of Lockbit ransomware on the network and protects servers from Lockbit execution attempts to tamper with Group Policies and critical system resources.
Web-based
Observed domains are covered under security categories |
Lockbit group using a new encryptor named "LockBit Green"
The threat actor group behind Lockbit ransomware has started using a new encryptor based on the leaked source code for Conti ransomware. The encryptors used by the group have gone through several iterations, but the current version has been named Lockbit Green, to differentiate it from other variations that are still in use, Lockbit Black (a.k.a Lockbit 3.0).
Symantec protects you from this threat, identified by the following:
File-based
Downloader
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C |
LockBit leveraging vulnerable drivers to disable security solutions in latest campaigns
LockBit is a prolific ransomware-as-a-service (RaaS) variant used by malicious actors Symantec tracks as Syrphid. While this ransomware family was first discovered back in 2019, new updated variants emerge every year. In the most recent campaigns observed by Symantec, LockBit ransomware has been leveraging a tool known as TrueSightKiller. This tool abuses a vulnerable driver called truesight.sys in an effort to disable security solutions. The malware requires to specify a PID (process identifier) or the process name as the parameter to terminate the targeted security solution.
This type of attack is widely known as Bring Your Own Vulnerable Driver (BYOVD) and it involves legitimate signed drivers capable of running with kernel privileges. Once dropped onto the victim endpoints BYOVD attacks allow the threat actors to disable AV or EDR solutions during the pre-ransomware execution stage, so before the actual encryption process starts. This is also not the first time LockBit attackers have abused vulnerable drivers in a ransomware campaign. Back in 2022 they leveraged a similar tool known as Terminator for the same purpose.
Symantec protects you from this threat, identified by the following:
File-based
Hacktool
Ransom.Lockbit
Trojan.Gen.MBT
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.C
Heur.AdvML.B!200
EDR-based
Symantec EDR is capable of monitoring and flagging this threat actor's tactics, techniques and procedures. EDR enrichment rules for TrueSightKiller TTPs include:
Subvert Trust Controls [T1553]
Command and Scripting Interpreter: Windows Command Shell [T1059.003]
Create or Modify System Process: Windows Service [T1543.003]
Modify Registry [T1112] |
LockBit ransomware data leak site goes private again
Having a data leak site has been a bit of trend among the ransomware crooks lately. A list of such ransomware includes SunCrypt, Maze, DopplePaymer, Conti and many more. SunCrypt ransomware is covered in one of our recent Protection Bulletins.
On top of encrypting files, having stolen data publicly available adds another tool to the arsenal of the ransomware gangs to pressure the affected organization to pay up, especially when the posted information does not adhere to a secure data policy.
The growing list now includes LockBit ransomware. This ransomware appears to have first surfaced in the wild at the beginning of 2020. According to public reports, the LockBit authors launched their own data leak site, but shut it down after they joined forces with another ransomware gang. Recently the LockBit group reopened their own website where they leaked stolen information.
To protect from LockBit ransomware, always apply the latest definitions.
File-based protection
Ransom.Lockbit
Ransom.Lockbit!g1
SONAR.Lockbit!gen1
SONAR.Lockbit!gen2 |
Lockbit ransomware re-enters the stage with the new 3.0 aka Lockbit Black variant
A new 3.0 variant of the infamous Lockbit ransomware has been released around the end of June 2022. This new version is also referenced as Lockbit Black because of main code similarities to the BlackMatter / Darkside ransomware variants. Lockbit Black requires a -pass parameter to be supplied upon execution. This is in turn similar to the BlackCat (aka. Noberus) ransomware which also requires a specific access-token. Lockbit 3.0 can delete a number of pre-defined services and terminate certain processes. This new version also comes with new icon, wallpaper and ransom note.
Symantec protects you from this threat, identified by the following:
File-based
Downloader
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Policy-based
DCS default hardening policy provides zero day protection against Lockbit 3.0 ransomware |
LockBit Ransomware unleashes Word file tactics
LockBit, offered as part of a Ransomware-as-a-Service (RaaS) package, emerged as one of the most active ransomware variants in 2023. Recent reports indicate that the threat group behind LockBit has been utilizing Word files as a distribution method, reminiscent of their past strategies. The primary approach involves embedding malicious macros within Word documents. Upon opening these documents, harmful macros trigger the download of additional code from external URLs, leading to the execution of the LockBit ransomware. The filenames of these malicious Word files often mimic common names or phrases associated with job applications.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
Ransom.Blackmatter!gm1
SONAR.MSWord!g6
Email-based
Coverage is in place for Symantec's email security products
File-based
CL.Downloader!gen20
ISB.Downloader!gen69
Scr.Malcode!gen
Trojan.Mdropper
W97M.Downloader
WS.Malware.1
WS.SecurityRisk.4
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.A!300
Heur.AdvML.B!100
Heur.AdvML.B!200
Network-based
Web Attack: Webpulse Bad Reputation Domain Request (29565)
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Lockbit ransomware variant for macOS
A new Lockbit ransomware variant targeting macOS platform has been discovered. The identified macOS ransomware samples seem to be based on Lockbit’s Linux encryptor and only compiled for macOS with rudimentary configuration settings. This variant appears to be still in development and not ready for deployment in any attacks against macOS machines. Given the Lockbit operations leverage encryptors for several different operating systems, including Windows, Linux, ESXi, it might be only a matter of time before a fully operational macOS version is used in the wild as well.
Symantec protects you from this threat, identified by the following:
File-based
OSX.Ransom.Lockbit
Trojan Horse |
Lockean, a threat group tied to ransomware
Lockean is the name of a newly identified ransomware group, attributed with several ransomware attacks on French companies in the last 2 years.
In the attacks attributed to the group, some of the tools and ransomware strains used were different over time (Maze, Egregor, Sodinokibi, DoppelPaymer and ProLock, all are Ransomware-as-a-Service). However, the group was identified due to the commonalities seen in the attacks. The initial infection vector in most cases was spam email campaigns involving a variety of loaders, it mainly uses QakBot as first payload, Cobal Strike for lateral movement, data exfiltration with rclone, and similarities in naming convention and infrastructure used for Cobalt Strike C2 Servers.
Symantec protects you from this threat, identified by the following:
File-based
Packed.Generic.459
Ransom.Maze
Ransom.Maze!gm
Ransom.RagnarLock!g1
Trojan.Anserin
Trojan.Cryptolock!g24
Trojan.Gen.2
Trojan Horse
WS.Malware.1
Behavior-based
SONAR.TCP!gen1
SONAR.Module!gen3
Machine Learning-based
Heur.AdvML.*
Web-based
Observed domains are covered under security categories |
LockFile Ransomware activity observed leveraging PetitPotam
We have observed ongoing campaigns leveraging a recently discovered ransomware named Lockfile. These attack campaigns appear to be infiltrating organizations by way of vulnerable Microsoft Exchange servers. Evidence suggests that Exchange vulnerabilities collectively known as ProxyShell are targeted for this initial infiltration.
Once inside, the attackers take advantage of an incompletely patched vulnerability (CVE-2021-36942) affecting Microsoft’s NTLM authentication system. By performing a particular NTLM Relay Attack, dubbed PetitPotam, the attackers can access the domain controller to spread through the network.
Additional information can be found in our blog, LockFile: Ransomware Uses PetitPotam Exploit to Compromise Windows Domain Controllers.
Symantec protects you from this threat, identified by the following:
File-based
Heur.AdvML.C
Ransom.Lockfile
Ransom.CryptoTorLocker
Network-based
Audit: SMB EFS NTLM Relay Attempt 2
OS Attack: SMB EFS NTLM Relay Attempt
Web Attack: Microsoft Exchange Server RCE CVE-2021-34473
Web Attack: Microsoft Exchange Server Elevation of Privilege CVE-2021-34523
Policy-based:
Symantec Data Center Security default hardening policies for Microsoft Exchange servers and Windows Domain Controllers protect against ProxyShell vulnerabilities and prevent Lockfile ransomware attacks on Domain Controllers.
Threat Defense for Active Directory (TDAD) prevents a potential adversary from spreading across the enterprise. Lateral movement attempts or Domain privilege escalation for any malicious purpose will be detected and blocked. |
Lockxx Ransomware
There have been reports of yet another actor joining the ransomware landscape, doing the rounds in Asia, Europe and the US. Once this threat is successfully executed on a compromised machine, it will encrypt files and append a .lockxx extension. In addition, a ransom note in HTA format (lockxx.recovery_data.hta) will be dropped, written in both English and Chinese, where one can switch between language using a button on top of the HTA file.
Symantec protects you from this threat, identified by the following:
Behavior-based
ACM.Untrst-RunSys!g1
SONAR.SuspLaunch!g193
ACM.Wmic-DlShcp!g1
SONAR.SuspLaunch!g189
SONAR.SuspLaunch!g340
SONAR.SuspLaunch!g341
SONAR.SuspLaunch!g195
SONAR.SuspLaunch!g250
File-based
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B!100 |
Loda and Warzone RAT targeted campaigns observed
Multiple groups are using Loda and Warzone RAT in targeted attacks worldwide, including recent reports of campaigns in Russia that use government document lures. These attacks begin with a malicious email containing a VHDX attachment, which in turn contains two decoy documents and a malicious LNK. When executed, the LNK will deploy either Warzone RAT or Loda RAT.
Symantec protects you from this threat, identified by the following:
File-based
Scr.Malcode!gdn32
Trojan.Gen.MBT
Trojan.Gen.2
Trojan Horse
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C |
LodaRAT goes Android
The developers of LodaRAT have incorporated an Android based payload to their portfolio. Symantec Security Response is aware of a recent campaign using a multi-stage delivery to deploy the Loda Remote Access Trojan to both Windows and Android systems.
Symantec provides the following coverage for known indicators of this campaign:
File-based
Exp.CVE-2017-11882!g2
Heur.AdvML.C
Trojan.Gen.MBT
Trojan.Gen.NPE
Mobile-based
AdLibrary:Generisk
Android.Reputation.1 |
LodaRAT remains active with new functionalities
LodaRAT is a remote access trojan initially discovered back in 2020. The malware remains active in the wild with a number of 2022 campaigns where it has been either dropped by other malware variants such as VenomRAT or was distributed together with additional payloads of Redline Stealer or Neshta. LodaRAT is written in AutoIt programming language and the latest strains contain functionality to enumerate any attached removable storage and automatically copy malware files to it.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.SuspDataRun
SONAR.TCP!gen1
File-based
Scr.Malcode!gen
Trojan Horse
W32.Neshuta
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Web-based
Observed domains/IPs are covered under security categories |
LodaRAT updated with new versions in new campaigns
We are aware of reports of newly identified versions of the remote access trojan named LodaRAT. New campaigns have been observed distributing LodaRAT via email with malicious RAR archive attachments using a ".rev" file extension. Previous campaigns leveraged malicious Word docs and exploits as part of the infection chain. Additional changes found in the newer versions can be seen in the lack of obfuscation and the implementation of a Powershell keylogger, which is added and then removed in the "newest" version discovered.
Symantec provides the following coverage for the associated indicators:
File-based
Trojan.Gen.MBT
Trojan.Gen.NPE
Trojan Horse
Behavior-based
SONAR.SuspDataRun
Website-based
This attack is proactively blocked by Symantec Web Isolation technology |
LODEINFO malware continues targeting organizations in Japan
LODEINFO is a malware family discovered initially in 2019 and attributed to the APT10 threat group. Over the years the malware has been known to target organizations in both governmental and public sectors in Japan. According to a latest report, the malware remains active in 2022 campaigns and continues to target entities in Japan. LODEINFO has been continuously updated and improved by its' creators since the time of the initial discovery. The latest variants have been reported to implement support for 64bit architecture or add improvements in the C2 communication, among others.
Symantec protects you from this threat, identified by the following:
File-based
ISB.Downloader!gen411
Scr.Malcode!gen
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
W97M.Downloader
WS.Malware.1
Machine Learning-based
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories |
Log4j exploitation leads to Proxyjacking attacks
CVE-2021-44228 (aka Log4Shell) is a critical vulnerability in Apache Log4j library disclosed back in 2021. The vulnerability is still frequently used in the wild despite being known already for two years. According to a recent report, a new campaign leverages CVE-2021-44228 for the purpose of proxyjacking. After the threat actors have gained access to the targeted endpoint in such an attack, they install a proxy agent payload that successfully transforms the compromised system into a remote proxy server. The attackers can then make profit by selling access to the compromised server to a proxyware service provider.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Network-based
Audit: Log4j2 RCE CVE-2021-44228
Attack: Log4j2 RCE CVE-2021-44228 2
Attack: Log4j2 RCE CVE-2021-44228 3
Attack: Log4j2 RCE CVE-2021-44228 4
Attack: Log4j2 RCE CVE-2021-44228 5
Attack: Log4j2 RCE CVE-2021-44228 7
Web-based
Observed domains/IPs are covered under security categories |
LogoKit phishing campaigns
On a daily basis there are countless phishing attempts, generated by a variety of phishing kits. Recently, one has come under the spotlight as it gains in prevalence, using open redirect vulnerabilities in the hope of evading malspam detection. An open redirect vulnerability allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL as a parameter to the proper function. Known as LogoKit, it's been used to mostly phish credentials of large, popular services such as Office 365, GoDaddy and various banks.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
Web-based
Observed domains are covered under security categories |
Lokibot, aging but still prevalent
Lokibot malware has been around since at least 2015 and is still very much active in today's threat landscape. Over the years, authors behind this threat have continuously maintained and upgraded it. The main infection vector has not changed though, still primarily being spread via malicious email campaigns which Symantec regularly observes targeting companies and institutions around the globe. These malspam campaigns don't use trendy or fancy social engineering tactics, they continue to use run-of-the-mill quotes, shipping, swift, invoice and payment related social engineering themes.
Recent campaigns have been observed using the following email subjects:
URGENT PROFORMA INVOICE FOR PAYMENT
SWIFT-MLSB-2105001
RFQ /QUO. AE21-SZ477
Awaiting your invoice for remittance
Advance payment and schedule update
31 INV2021
LC/TT Payment Transaction
URGENT PROFORMA INVOICE FOR PAYMENT
SHIPPING DOCUMENT
Payment Advice
Buyer & Payment Position
RATE REQUEST SEA FREIGHT IMPORT
PAYMENT TO NEW BANK DETAILS (CONFIRM BANK DETAILS)
Symantec protects you from this threat, identified by the following:
Behavior-based
Infostealer.Lokibot!gm
SONAR.SuspBeh!gen667
SONAR.Trafic2.RGC!g13
Email-based
Coverage is in place for Symantec's email security products
File-based
Exp.CVE-2017-11882!g5
MSIL.Packed.19
Packed.Generic.528
Packed.Generic.606
Scr.Malcode!gdn30
Trojan Horse
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Network-based
System Infected: Infostealer.Lokibot Activity 2 |
Lokibot is still very prevalent in the Email threat landscape
Lokibot is clearly not fading away with these malicious infosealers being delivered almost daily by email. Most of these emails are associated with spam campaigns in which the actors are gambling on the high output of emails rather than sophisticated social engineering and attack chain.
The Lokibot malware is able to steal credentials from hundreds of applications including browsers, FTP clients, Email clients, SSH clients and password management software. This malware has been around since 2015 and is one of the most prevalent infostealers observed to date, used by many different groups and individuals.
In a recent campaign, we've seen thousands of malicious emails being sent in a period of just one month (August 15th - September 15th). The group behind the campaign is using simple social engineering based on the well-known SWIFT payment system while impersonating a Chinese Industrial Food Dehydrator Manufacturer. Apparently, these attacks are not targeted attacks as we have seen them being delivered to various industries and organisations.
Email subject: SWIFT
Email attachment: SWIFT.rar
Symantec has various detections in place for Lokibot, see below:
File-based
Infostealer.Lokibot*
Heur.AdvML.B
WS.Malware.2
SONAR.SuspLaunch!g12
Sonar.Lokibot*
Network-based
System Infected: Infostealer.Lokibot Activity*
Email-based
AVE/Heur.AdvML.B!200 |
Lokibot malware delivered through new campaigns using multiple methods
Recently observed campaigns spreading the Lokibot infostealer have been found to be using multiple delivery methods to infect targets. We have identified malicious PDFs, RTFs, and Office documents as the initial infection vector. These files are attached to email and attempt to directly download relevant payloads or may leverage older, commonly seen vulnerabilities (like CVE-2017-11882) to achieve their purpose.
Symantec protects you from this threat, identified by the following:
File-based
Bloodhound.RTF.12
Bloodhound.RTF.20
Exp.CVE-2017-11882!g5
Heur.AdvML.B
Infostealer!im
Infostealer.Lokibot!gm
Trojan!im Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
W97M.Downloader
Behavior-based
SONAR.Trafic2.RGC!g13
Web-based
Observed domains are covered under security categories
Email-based
Coverage is in place for Symantec's email security products. |
Lokibot shipped in IMG and LHZ archives hits LATAM
Most of us are well accustomed to Lokibot now given its prevalence across the globe and the length of time it's been around. Symantec recently observed a campaign which predominantly targets industries in Latin America, but has also been seen in Spain and Portugal. The actors leverage a classic bank transfer social engineering tactic purported to involve a well-known bank in Mexico. The emails contain two archives (IMG and LHZ), both of which include the Lokibot binary. This malware is able to steal credentials from hundreds of applications including browsers, FTP clients, Email clients, SSH clients and password management software.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
File-based
Trojan Horse
Machine Learning-based
Heur.AdvML.B |
Lokibot uptick in the email landscape
At this point, Lokibot is one of those infostealers that most everyone is aware of, having been in the threat landscape for a few years now with prevalence remaining high. This threat has been used for credential and cryptocurrency wallet theft, but also as a backdoor to deploy second-stage malware. On top of that it's been responsible for countless credential dumps on the darknet.
Symantec continues to observe campaigns on a daily basis but over the past few weeks we have seen somewhat of an increase in malspam activity. These malspam campaigns don't use trendy or fancy social engineering tactics, instead actors rely on run-of-the-mill quotes, shipping, SWIFT, invoice and payment related social engineering themes.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.ProcHijack!g21
Email-based
Coverage is in place for Symantec's email security products
File-based
Trojan.Gen.2
Trojan.Gen.MBT
Network-based
System Infected: Bad Reputation Process Request 4
Machine Learning-based
Heur.AdvML.B |
LokiLocker is doing the rounds again
Spotted earlier this year, LokiLocker Ransomware-as-a-Service continues to be observed in the threat landscape. Actors behind this ransomware still employ encryption and file deletion on a timer to further pressure victims into paying the ransom. When it comes to the extension appended to encrypted files, it tends to change between variants.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.Cryptlck!g171
SONAR.Heur.Dropper
SONAR.Ransomgen!gen3
File-based
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B |
Look out for fake installers that are really infostealers
A malware distribution campaign, likely distributed via online advertising, has been observed trying to trick users into executing fake software installers. The fake installers execute several tasks including an information stealer looking for any credentials on the system, a backdoor that enables remote access via a stealth RDP connection and a malicious Chrome browser extension containing a keylogger and other infostealer behaviors.
Symantec protects you from these threats, identified by the following:
File-based
PUA.DriverPack
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
VBS.Downloader.Trojan
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Web-based
Observed domains are covered under security categories |
Lookout for new NoEscape Ransomware on the horizon
Yet another Ransomware-as-a-Service (RaaS) program that goes by the name "NoEscape" has been observed advertising for new partners on the Dark Web. NoEscape is written in C++ and uses a highly customizable Ransomware as a Service (RaaS) model. The malware has functionality to disable UAC, stop system services and processes, as well as delete system backup and shadow copies. Following successful encryption NoEscape will append extensions like “.CCBDFHCHFD” to the encrypted files, drop ransom notes in the form of .txt files. This model is being continually updated so it is likely we'll observe more activity once additional partners are found.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.SuspLaunch!g189
SONAR.SuspLaunch!g193
File-based
Trojan.Gen.2
Trojan.Gen.MBT
Trojan Horse
WS.Malware.2
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Network-based
Attack: Ransom.Gen Activity 46 |
Look out for the new Konni
Konni RAT has been around since 2014, but only recently has a new variant been spotted, and potentially linked to the North Korean APT group named APT37.
The malicious activity starts with spam email containing a weaponized Microsoft Word document attached to entice victims to open it. The latest iteration of the spam campaign contains one of two documents written in Russian language. One relates to trade and economic issues between Russia and the Korean Peninsula, while the other document deals with intergovernmental Russian-Mongolian commission meetings. The primary victims of this RAT are political organizations in Russia and South Korea, but other countries such as Japan, Mongolia, Nepal, and Vietnam have been targeted.
Once the document is opened macro code is executed to start a chain of activities that results in the deployment of the Konni RAT.
This new variant of Konni
Uses a different bypass technique based the victim's OS
Uses different macros from previous instances
Executes scripts using Javascript
Is heavily obfuscated
Symantec protects you from this threat, identified by the following:
File-based
Backdoor.Trojan
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Mdropper
W97M.Downloader
Web-based
Observed domains are covered under security categories
Email-based
Coverage is in place for Symantec's email security products. |
LostTrust Ransomware
LostTrust is a recently discovered ransomware variant believed to be a rebrand of the MetaEncryptor malware strain. The attackers behind this malware leverage a public leak site where they release victims details of their attacks. LostTrust ransomware encrypts user files and appends .losttrustencoded extension to them. Ransom note is delivered through a .txt file called !LostTrustEncoded.txt which is dropped in each of the encrypted folders on the compromised endpoint. The malware has also capabilities to disable miscellaneous processes and services on the target machine and to delete the shadow volume copies.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.RansomPlay!gen1
SONAR.SuspLaunch!g190
File-based
Ransom.Zombie
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.A!400
Heur.AdvML.A!500
Heur.AdvML.B!100
Heur.AdvML.B!200 |
Louse (aka Patchwork) APT group
Louse APT (aka Patchwork or Quilted Tiger) is a threat group first identified in 2015 that has been known to prevalently target high-profile organizations, financial and governmental entities as well as media, energy and pharmaceutical sectors across the world. The group has been leveraging a wide range of malware variants and custom tools in their attacks. BadNews backdoor and VajraSpy RAT are just two examples of malware strains attributed to this threat actor. Louse APT has been employing spear-phishing and watering hole attacks as well as leveraging exploits of known vulnerabilities in efforts to compromise the targeted entities.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Ps-Http!g2
File-based
Trojan Horse
Trojan.Gen.2
Trojan.Gen.NPE
Trojan.Mdropper
W97M.Downloader
Web.Reputation.1
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Heur.AdvML.C
Network-based
System Infected: Trojan.Backdoor Activity 721
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Love Ransomware
Another ransomware that goes by the name "LoveRansomware" has been observed doing the rounds. Interestingly, the ransom amount is not stated in the ransom note that is left on affected machines. The actors are asking the victim to reach out to them via email or Telegram. Containing nothing that makes it stand out of the crowd, this is a simple run-of-mill ransomware. Post-encryption, files are appended with a .Love extension.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.Ransomnemty!g2
SONAR.Ransomnokibi!g1
File-based
Ransom.HiddenTear!g1 |
Luca Stealer - a new Rust-based infostealer
A new infostealer written in the Rust programming language and dubbed Luca Stealer has been discovered. The source code for this malware has just recently been leaked on a cybercrime forum. The malware targets primarily Chromium-based browsers, messaging apps and crypto wallets with the added functionality to steal victims’ files. The infostealer trojan ex-filtrates the collected data, credentials or financial information through a Telegram bot or via Discord’s webhooks.
Symantec protects you from this threat, identified by the following:
File-based
Downloader
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
WS.Malware.2
Network-based
System Infected: Trojan.Backdoor Activity 564
System Infected: Trojan.Backdoor Activity 634 |
Lucifer DDoS botnet activities
A new campaign has been observed in the wild that makes use of a Linux DDoS botnet called Lucifer. The malware targets instances of Apache Hadoop YARN and Apache Druid infrastructure. It exploits any potential misconfigurations or known vulnerabilities to gain access to the targeted systems. Once the malware successfully infects the system, it downloads and executes the main payload, which is a trojan known as XMRig coinminer. This trojan is used to mine the Monero cryptocurrency.
Symantec protects you from this threat, identified by the following:
File-based
Backdoor.Trojan
PUA.Gen.2
Trojan.Gen.NPE
WS.Malware.1
Network-based
Web Attack: Apache Druid RCE CVE-2021-25646
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Lumar infostealer
Lumar is a newly discovered infostealer variant advertised for sale in the form of a Malware-as-a-Service (MaaS) package on underground forums. The malware has capabilities to extract browser cookies and credentials, collect various user files, steal cryptocurrency wallets or capture Telegram sessions, among others. The extracted data is forwarded to the C2 servers controlled by the malware authors.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
WS.Malware.2
Machine Learning-based
Heur.AdvML.B
Network-based
System Infected: Trojan.Backdoor Activity 634 |
LuminousMoth APT - large scale campaigns on selected targets
According to a recently released report, a threat actor group known as LuminousMoth has been engaged in targeted attacks on organizations in South East Asia. The actors have been leveraging Cobalt Strike Beacons in the reported campaigns and also deploying additional info-stealing malware. The TTPs characteristic for this APT group show a certain overlap with another threat actor known as HoneyMyte (MustangPanda).
Symantec protects you from this threat, identified by the following:
File-based
Heur.AdvML.C
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
WS.Malware.2
Network-based
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed IPs/domains are covered under security categories. |
LummaC2 Infostealer
LummaC2 is an infostealing malware advertised and sold on underground forums. The malware extracts various data from both Chromium and Mozilla-based browsers. LummaC2 also targets various crypto wallets and any two-factor authentication (2FA) extensions installed on the victim's machine. Once collected, the data is encrypted by the stealer malware before being forwarded to the C2 servers controlled by the attackers.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Ws.Malware.1
Machine Learning-based
Heur.AdvML.B
Web-based
Observed domains/IPs are covered under security categories |
Lumma stealer getting views on YouTube
Lumma stealer, an infostealer variant written in C and known to be roaming the threat landscape since at least 2022, has been making the rounds via YouTube instructional videos. The videos entice users with offers of cracked software, hiding behind shortened links leading unsuspecting users to download Lumma stealer instead.
Once on the infected machine, Lumma will attempt to steal data stored in the system browsers as well any present cryptocurrency wallets. This malware continues to be sold on underground forums and has been continuously evolving over time with latest versions adding new capability to load additional arbitrary payloads on the infected endpoint.
Symantec protects you from this threat, identified by the following:
File-based
MSIL.Packed.12
Trojan.Gen.MBT
WS.Malware.1
WS.Reputation.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Network-based
System Infected: Infostealer LummaC2 Activity
System Infected: Infostealer LummaC2 Activity 02
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Lumma stealer in-the-wild
Lumma is yet another infostealer that's recently been seen lurking in the threatscape. Not exactly a standout from the crowd, it has the same capabilities as many other infostealers which are pretty much tuned for the current environment. Lumma's main capabilities are as follows:
Steals login credentials, cookies and autofill information multiple browsers
Stores different types of information in text files
Steals data from browser extensions which are related to Cryptocurrency Wallets
Targets additional Chrome-based browser extensions related to two-factor and multi-factor authentication (2FA/MFA) and password management
Steals wallets and confidential files that are related to crypto wallet applications by checking the default wallet file location in AppData
Symantec protects you from this threat, identified by the following:
File-based
Infostealer
Packed.Vmpbad!gen38
Trojan.Gen.2 |
Lunar Reborn stealer
Lunar Reborn is yet another infostealer that has recently been advertised. Symantec has already observed both test and malicious drive-by-download activities which may be run by multiple groups and individuals. The malware is simple and has generic infostealing capabilities (with a sweet tooth for Growtopia and Roblox) including the following:
Symantec protects you from this threat, identified by the following:
Steal passwords, cookies, history, credit card, autofills, etc. from known Chromium and Gecko based browsers
Steal Growtopia account
Steal Roblox cookies
Steal Discord tokens
Steal cryptowallets
Self delete
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.ProcHijack!gen8
SONAR.SuspBeh!gen633
File-based
Trojan Horse
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C |
Lust Stealer
Fairly new on the scene, Lust stealer is another run-of-the-mill infostealer that has been seen recently in the threat landscape. This threat is not bound to one group and is being sold as malware-as-a-service. At this time, the threat is mainly distributed via drive-by-download. In observed campaigns, most actors have disguised their Lust Stealer binary as popular games, Discord and TikTok hacks.
Symantec protects you from this threat, identified by the following:
Machine Learning-based
Heur.AdvML.B |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.