text
stringlengths 0
383k
|
---|
LV Ransomware proves to be a modified Sodinokibi variant
LV ransomware - a malware variant that's been in use since at least 2020 - has been found to be actually a modified version of the Sodinokibi ransomware associated with a separate threat group. LV Ransomware has been advertised for sale on underground forums and the group behind it also published a leak site calling out its victims.
Symantec protects you from this threat, identified by the following:
File-based
Downloader
Heur.AdvML.B
WS.Malware.1 |
macOS backdoor leads to Ransomware
A macOS backdoor has been recently discovered. This new backdoor masquerades as a Visual Studio update, has 3 observed variants and is written in Rust. Once installed the backdoor attempts to impersonate common software notifications in order to obtain the admin password. Once this is achieved it gets to work on setting up persistence and exfiltrating data that will later be used to extort the victim.
Symantec protects you from this threat, identified by the following:
File based
Trojan Horse
OSX.Trojan.Gen
OSX.Trojan.Gen.2
Network based
WS.Malware.1
WS.Malware.2
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
MacOS CVE-2022-46689
Apple recently released patches for vulnerabilities (CVE-2022-46689) in macOS versions 13.1, 12.6.2, and 11.7.2 that could allow a local authenticated attacker to gain elevated privileges on the system. This vulnerability is caused by a race condition in the macOS kernel and can be exploited by an authenticated attacker through a specially crafted request, such as through an app, to execute arbitrary code with kernel privileges. A proof of concept for this vulnerability was recently shared on an Internet hosting service for software development and version control, which may be used to attack vulnerable MacOS versions.
Symantec protects you from this threat, identified by the following:
File-based
Exp.CVE-2022-46689 |
MacOS: Honkbox Cryptominer
Recently, light has been shed on Honkbox which has been making rounds in the MacOS threat landscape since 2019. This threat is a cryptominer with multiple components and according to reports, there are at least three variants. Actors have been spreading it using trojanized cracked software that is popular among MacOS users. It primarily affects consumers but enterprises are not exempt.
Symantec protects you from this threat, identified by the following:
File-based
OSX.Trojan.Gen |
macOS MetaStealer
MetaStealer is a recently discovered infostealer variant targeting business users on the macOS platform. While the malware is primarily spread via .dmg image files disguised under various file names referencing business presentations, contracts, cover references etc., some MetaStealer droppers might also masquerade as Adobe Photoshop or Tradeview application installers. MetaStealer has the capability to exfiltrate keychains, saved credentials or confidential user files from the compromised machines.
Symantec protects you from this threat, identified by the following:
File-based
OSX.Trojan.Gen
OSX.Trojan.Gen.2
WS.Malware.1
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
MacOS ObjCShellz malware deployed by BlueNoroff threat group
A new macOS malware variant attributed to the BlueNoroff APT group has been identified in the wild. The malware dubbed ObjCShellz shares some characteristics with the malware variants deployed by the same threat actors in earlier campaigns known as RustBucket. Functionality-wise the malware acts as a remote shell executing commands received from the attackers.
Symantec protects you from this threat, identified by the following:
File-based
OSX.Nukesped
Trojan Horse
WS.Malware.2
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
MacOS Users targeted with Infostealers
MacOS users continue to be targeted with infostealers via malicious advertisements and fake websites. In a recent campaign, a counterfeit website offering free group meeting scheduling software was observed. This website installs an infostealer capable of extracting users' keychain data, credentials stored in web browsers, and information from cryptocurrency wallets. This malware shares similar characteristics with a Rust-based stealer family called Realst and employs an AppleScript call to prompt users for their macOS login password in order to execute its malicious activities.
Symantec protects you from this threat, identified by the following:
File-based
OSX.Trojan.Gen
WS.Malware.1
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
MacStealer malware
MacStealer is a newly identified infostealer targeting the macOS platform. MacStealer has the functionality to exfiltrate a variety of confidential data including login credentials, cookies, credit card data, documents and others. The malware has also the ability to forward some of the stolen information directly to attacker's controlled Telegram channels.
Symantec protects you from this threat, identified by the following:
File-based
OSX.Trojan.Gen
OSX.Trojan.Gen.2
WS.Malware.1
Web-based
Observed domains/IPs are covered under security categories |
Mac vulnerability patched as Shlayer malware spreads
Apple has released a patch for a MacOS vulnerability (CVE-2021-30657) which is reportedly being exploited in the wild by Shlayer malware. The vulnerability allows Shlayer to bypass the security checks implemented by the vendor, and download and launch second-stage payloads.
Shlayer is known as an adware distribution vehicle and has been around since at least early 2018, initially hidden in a fake Flash installer. Since then, the attackers have tried other methods to distribute the malware such as fake pop-ups and malvertising campaigns. By exploiting an unpatched vulnerability, the Shlayer attackers have stepped into a brand new distribution realm.
Mac users are strongly recommended to apply the patch as soon as possible.
Symantec protects you from this threat, identified by the following:
File-based
OSX.Trojan.Gen
Web-based
Observed domains are covered under security categories |
Mad Cat Ransomware
A chaos ransomware variant known as Mad Cat has been observed encrypting individual machines, affecting both consumers and enterprises. The observed sample will encrypt files and then append a random 4-character extension. The actor behind this variant is asking for 0.02 BTC, which is equal to 682.33 USD at the time of writing.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.SuspBeh!gen625
File-based
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B |
MafiaWare666 ransomware
MafiaWare666 is yet another run-of-the mill ransomware variant written in C#. While there have been several campaigns spreading various versions of this ransomware, the malware remains relatively simple with no implementation of any obfuscation or anti-analysis techniques. Once user's files are encrypted MafiaWare666 will append additional extension to them. Some of the known extensions used by the malware include: .MafiaWare666, .jcrypt, .brutusptCrypt or .bmcrypt. The dropped ransom note asks for Bitcoin payment to a specified crypto-wallet address.
Symantec protects you from this threat, identified by the following:
File-based
Ransom.Gen
Scr.Malcode!gdn14
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
Machine Learning-based
Heur.AdvML.B |
Magecart Group 12 seen using favicon to hide PHP web shell
Magecart Group 12 activity has been seen using a new malware vector. This attack uses a PHP web shell script. The script is renamed as a favicon PNG file and inserted into the shortcut icon tags on a webpage. Once the web shell is running, the attacker has and can maintain remote access to the infected machine. Similar attacks using JavaScript have been previously detected, but the use of a PHP web shell script is new.
Symantec protects you from these threats, identified by the following:
Email-based
Protection is in place for Symantec's email security products.
Email Threat Isolation (ETI) technology from Symantec provides an extra layer of protection.
Network-based
Web Attack: Formjacking Website
Formjacking Black list
Website-based
Observed domains are covered under security categories.
|
Magento Vulnerability CVE-2024-20720
Reports have revealed that threat actors were able to exploit Magento, now known as Adobe Commerce, by injecting backdoor malware into certain e-commerce websites through a recently disclosed vulnerability classified as CVE-2024-20720. This vulnerability allows attackers to execute arbitrary code on target servers, potentially leading to remote code execution.
Symantec protects you from this threat, identified by the following:
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Maggie backdoor targets MS SQL servers
Maggie is a new backdoor targeted exclusively at MS SQL servers. The malware disguises itself as an Extended Stored Procedure DLL file. Extended Stored Procedure is natively used to extend SQL Server functionality through additional functions that come compiled in form of dynamic link library (DLL) files. Maggie is controlled by the attackers only through MS SQL queries that instruct the backdoor to perform specific actions or run commands. The backdoor supports 51 commands including downloading and deleting files, running SOCKS5 proxy, running programs, bruteforce scans to other SQL servers, installing and running terminal services and many others.
Symantec protects you from this threat, identified by the following:
File-based
Backdoor.Maggie
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories |
MagicRAT - new malware attributed to the Lazarus APT
A new remote access trojan (RAT) dubbed MagicRAT has been discovered in the wild and attributed to the Lazarus APT group. According to a recent report, the malware has been distributed in campaigns exploiting publicly exposed VMware Horizon platforms. MagicRAT once on the infected systems might lead to deployment of additional payloads. One of the MagicRAT's C2 servers has been reported as being shared with TigerRAT - another malware variant also attributed to the Lazarus group.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
WS.Malware.2
Network-based
System Infected: Trojan.Backdoor Activity 634
Web-based
Observed IPs/domains are covered under security categories |
Magnet Goblin targets Ivanti Connect Secure VPN users
A malware campaign conducted by the threat actor known as Magnet Goblin, targeting Ivanti Connect Secure VPN, has been reported. NerbianRAT, a Linux-based malware, and WARPWIRE Infostealer were deployed as part of the campaign. Magnet Goblin specializes in exploiting 1-day vulnerabilities in public-facing services, and in this instance they exploited a command injection vulnerability in the web components of Ivanti Connect Secure (CVE-2024-21887).
Symantec protects you from this threat, identified by the following:
File-based
Hacktool.Ligolo
Trojan.Gen.NPE
Trojan Horse
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Network-based
Web Attack: Ivanti ICS CVE-2023-46805
Web Attack: Ivanti ICS CVE-2024-21887
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
Magniber ransomware campaigns exploit the recently patched CVE-2021-26411 vulnerability
Based on recent reports, Magniber ransomware deployment campaigns appear to be leveraging recently patched Microsoft IE RCE vulnerability CVE-2021-26411. Before this, these campaigns were exploiting similar IE vulnerabilities like CVE-2020-0968 and CVE-2019-1367.
As we continue to monitor and enhance our protections against Magniber ransomware variants, we recommend performing regular backups for any important data and ensuring your security products kept up to date with the latest product definitions.
Symantec's protection against Magniber ransomware includes the following:
File-based:
Exp.CVE-2021-26411
Heur.AdvML.B
ISB.CVE-2021-26411!g1
Packed.Generic.525
Trojan.Gen.MBT
Trojan Horse
Network-based:
Web Attack: Internet Explorer RCE CVE-2021-26411
Web Attack: Microsoft Internet Explorer RCE CVE-2019-1367 |
Magniber ransomware campaigns target European countries
According to latest reports, Magniber ransomware has been observed in recent attacks targeting users in several European countries. The attackers are leveraging malvertising as the preferred distribution method. The potential victims are directed to a download of .zip archives containing malicious .msi packages disguised as security updates or software patches. Just in the last year alone, Magniber ransomware has been spread via a large variety of different file formats, including signed .appx files, .msi and .js/.jse packages, among others.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.SuspLaunch!g193
File-based
Ransom.Magniber
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.B |
Magniber Ransomware leverages PrintNightmare vulnerability to spread
It has been reported that one of the PrintNightmare vulnerabilities (CVE-2021-34527) has been weaponized by the Magniber ransomware group. According to the latest reports, Magniber started to leverage this vulnerability in the distribution campaigns dating back to the middle of July. The observed campaigns have been primarily targeting victims in South Korea.
Symantec protects you from this threat, identified by the following:
File-based
Downloader
Exp.CVE-2021-34527
Exp.CVE-2021-34527!g1
Packed.Generic.525
Packed.Generic.616
Trojan.Gen.MBT
Network-based
Attack: Ransom.Gen Activity 29
Audit: Windows Print Spooler RCE CVE-2021-34527
OS Attack: Windows Print Spooler RCE CVE-2021-34527 |
Makop Ransomware attacks via phishing runs
Makop is a ransomware variant seen being distributed as a payload of phishing campaigns this year. This malware will attempt to delete the Volume Shadow Copies on the compromised machine - a technique used by many other ransomware families. The ransomware appends .makop extension to the encrypted files.
We recommend regular backup procedures of any important files and applying the latest product definitions to protect against ransomware threats.
Symantec's protections:
File-based
Downloader
Heur.AdvML.B
Heur.AdvML.C
Packed.Generic.525
Trojan.Gen.MBT
Behavior-based
SONAR.Ransom!gen29
Network-based
[32465] Attack: Ransom.Crysis Activity
[32466] Attack: Ransom.Crysis Activity 2
[32483] Attack: Ransom.Crysis Activity 3 |
Makop ransomware continues to be spread via malspam
Makop ransomware continues to be spread via malspam campaigns as multiple samples of this ransomware family have been found in the wild across March and April. The most latest Makop variants encrypt user files while appending either the .pecunia or .dark extension to them and drop a ransom note file named 'readme-warning.txt' in each of the encrypted folders.
As we continue to monitor and enhance our protections against Makop Ransomware variants, we recommend performing regular backups for any important data and ensuring your security products are kept up to date with the latest product definitions.
Symantec protects you from this threat, identified by the following:
File-based
Downloader
Heur.AdvML.B
Heur.AdvML.C
Packed.Generic.525
Trojan.Gen.2
Trojan.Gen.MBT
Trojan Horse
Behavior-based
SONAR.Ransom!gen29 |
Makop Ransomware Distributed as Fake Resumes
Makop Ransomware, a file-encrypting ransomware first seen in 2020, has been recently seen distributed in Korea via email. An attachment to the email made to look like a resume document is actual a twice compressed archive that contains the ransomware. Once expanded, Makop deletes volume shadow copy files, stops processes and then encrypts files on the infected machine.
Symantec protects you from these threats, identified by the following:
File-based
Trojan.Gen.2
Email-based
Coverage is in place for Symantec's email security products |
Malicious activities associated with the WIP26 threat group
According to a recent report, a new threat actor dubbed WIP26 has been engaged in a series of attacks against the telecommunications sector in the Middle East. The threat group has been relying on public cloud infrastructure (such as MS Mail 365, Microsoft Azure, Google Firebase or Dropbox) in a likely attempt to evade detection and stay under the radar. WIP26 employs two distinct backdoor variants dubbed CMD365 and CMDEmber that masquerade as legitimate applications such as pdf readers or software updates. The purpose of discovered campaigns is likely reconnaissance, espionage and data exfiltration.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
File-based
Trojan Horse
Trojan.Gen.2
WS.Malware.2
Machine Learning-based
Heur.AdvML.B
Web-based
Observed domains/IPs are covered under security categories |
Malicious activities attributed to the Earth Krahang APT
New malicious activities attributed to the APT actor named Earth Krahang have been observed in the wild. These threat actors have been known to target governmental entities around the world. TTPs of this threat group include the usage of open-source scanning tools, conducing spear-phishing campaigns, brute-force attacks, vulnerability exploitation, usage of various tools allowing for privilege escalation or facilitation of remote desktop connections to the compromised machines. Among the malware variants observed to be recently in use by Earth Krahang are RESHELL and XDealer backdoors.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Ps-Rd32!g1
ACM.Ps-Wscr!g1
ACM.Untrst-RunSys!g1
Behavior-based
SONAR.ProcHijack!g45
SONAR.ProcHijack!g47
SONAR.SuspInject!gen3
SONAR.SuspLaunch!g13
SONAR.TCP!gen1
File-based
Backdoor.Cobalt!gm1
Downloader
Trojan Horse
Trojan.Coinminer
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
Trojan.Nancrat
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.A!300
Heur.AdvML.A!400
Heur.AdvML.A!500
Heur.AdvML.B!100
Heur.AdvML.B!200
Heur.AdvML.C
Network-based
Attack: Openfire Authentication Bypass Vulnerability CVE-2023-32315
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Malicious backdoor XRed
XRed backdoor has sophisticated capabilities as it collects system data information that it transmits the data using SMTP to email addresses. This backdoor also has notable persistence capabilities by using hidden directories and Registry Run Keys while attempting to remain hidden in trojanized software. It additionally has worm-like propagation via USB drive capabilities.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Ps-RgPst!g1
ACM.Untrst-RunSys!g1
Behavior-based
SONAR.SuspPE!gen32
SONAR.Dropper
File-based
Backdoor.Graybird
Backdoor.Trojan
Trojan.Gen.2
Trojan.Gen.9
Trojan Horse
Trojan.Gen.MBT
Trojan.Mdropper
W32.Changeup
W32.Fixflo.B!inf
W32.Zorex
Web.Reputation.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.A!300
Heur.AdvML.B!100
Heur.AdvML.B!200
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Malicious campaign targets German users with either Gootkit or Sodinokibi
We have been aware of reports concerning a new malicious campaign targeting German users in particular. The campaign has been active since around the last week of November and makes use of compromised WordPress websites and fake download links to spread either the Gootkit banking trojan or the Sodinokibi ransomware. While Sodinokibi has been one of most prevalent ransomware families since 2019, Gootkit disappeared around a year ago when its operators experienced a data breach after leaving a MongoDB database exposed. The breach prompted speculation that the malware had been retired for good. It is interesting to see its re-emergence on the threat landscape right now.
For more information on Sodinokibi ransomware family and its earlier campaigns read our publication: Sodinokibi: Ransomware Attackers also Scanning for PoS Software, Leveraging Cobalt Strike
Symantec has the following protection in place for this reported campaign:
File-based
Downloader
Heur.AdvML.B
Heur.AdvML.C
Trojan.Gen.2
Trojan.Gen.MBT
Trojan Horse
Website-based
These activities are proactively blocked by Symantec Web Isolation technology. |
Malicious coa and rc NPM packages discovered
Two popular NPM libraries, "coa" and "rc", were recently modified to include malicious scripts that would be executed upon package installation. These scripts would attempt to download and execute the Danabot Trojan, a password-stealing malware.
Symantec protects you from this threat, identified by the following:
File-based
Downloader
Trojan Horse
Trojan.Danabot
Trojan.Gen.MBT
Trojan.Malscript
WS.Malware.1
Network-based
Malicious Site: Malicious Domains Request
System Infected: Trojan.Danabot Activity 3
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories |
Malicious downloader masquerading as Covid-19 vaccination information
New malware has been observed propagating via malicious email attachments disguised as a Covid-19 related vaccine information. The attack consists of a password protected .xlsm attachment which the recipient is encouraged to open using a provided password. Further interaction is required to enable macros in the document so that additional content can be downloaded. The goal is to gain back door access to the now compromised system.
The attackers attempt to appear legitimate by using a seemingly Covid-19 related "information" address to distribute the email and by incorporating a number of security related images into the attached document.
Symantec protects you from this threat, identified by
File-based
Heur.AdvML.C
Trojan.Gen.MBT
Email-based
Protection is in place for Symantec's email security products.
Web-based
Observed domains are covered under security categories. |
Maliciously blended Android app downloads malware
Symantec Security Response is aware of a report that a particular version of a popular Android app, which allows users to download and install Android apps from unofficial Android app stores, includes malicious code. This app version is capable of showing ads as well as downloading other malware onto the target device. The app is not actually intended to perform the latter action, however the malign code is thought to have been mistakenly included by its developers. The code has been removed from the latest official version of the app.
Symantec protects you from this threat, identified by the following:
Mobile-based
AppRisk:Generisk
Other:Android.Reputation.1 |
Malicious MSI leads to BatLoader
Over the past two years BatLoader campaigns have fluctuated and as of today, it maintains a presence in the threat landscape. This threat has loaded various infostealers and remote access trojans in past campaigns. Symantec has recently observed new command-and-control servers that host multiple malicious Microsoft Windows Installers (MSI) which deploy this loader if successfully executed. The actor behind this recent campaign has disguised these MSI installers as well-known and popular software such as Tor, MsOffice, Malwarebyte, Adblock, WinRar, Luminar, etc.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.MBT
Scr.Malscript!gen1
Ws.Reputation.1
Machine Learning-based
Heur.AdvML.C |
Malicious new loader runs as a server
A malicious loader, named Wslink, has been brought to light recently. The loader has been undocumented so far and remains without attribution to any known threat actor. The initial compromise vector is also not known, but telemetry has shown a few hits in Central Europe, North America, and the Middle East.
This malware runs as a server and executes received modules in memory with public-private key encrypted communication.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.MBT |
Malicious Replica of CapCut Websites Delivering Information Stealing Malware
Researchers have recently spotted a couple of phishing websites hosting fake CapCut installers. CapCut is an official video editor for Tiktok and Threat Actors capitalized on the application's popularity. The fraudulent installers when downloaded and executed will drop a variety of malware including Offx and Redline stealer. One known Offx stealer capability is the ability to extract passwords and cookies from web browsers. Redline is able to grab data stored in web browsers and applications, including credentials, credit cards, and auto-complete data.
Symantec protects you from this threat, identified by the following:
File-based
Scr.Malcode!gdn14
Scr.Malcode!gdn32
Trojan.Gen.MBT
Trojan Horse
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Web-based
Observed domains/IPs are covered under security categories |
Malicious SMS Targeting Crédit Agricole Mobile Users
Symantec identifies various genres of social engineering in phishing attacks, all aimed at manipulating individuals into revealing sensitive information. Common strategies involve sending false invoices, posing as tech support, offering fraudulent job opportunities, and using fake password reset emails. Scammers employ a variety tactics such as fake software updates, IRS or tax threats, lottery scams, and healthcare-related messages.
Each of these strategies are comprised of sub-tactics. This protection bulletin specifically addresses one related to fake password reset attempts. Symantec recently detected a smishing campaign targeting Crédit Agricole's mobile users in France, using a fictitious SécuriPass reset/reactivation requirement due to cyber-attack. The attackers exploited the knowledge that these users rely on SécuriPass, a digital service provided by Crédit Agricole to enhance online banking transaction security, tailoring their social engineering and phishing techniques accordingly.
According to Crédit Agricole, users must be aware that the activation of SécuriPass takes place exclusively within their banking app (Ma Banque); any other activation method may be considered an attempt at fraud.
Observed malicious SMS:
Crédit Agricole : Mise à jour de votre SécuriPass obligatoire suite à une cyber-attaque, activez-le en cliquant sur le lien suivant: hxxps[:]//servicecaactiverapide[.]com
Symantec protects you from this threat, identified by the following:
Mobile-based
Symantec Endpoint Protection Mobile is able to analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake domain used in this campaign are known to WebPulse.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
Malicious SMS Targets BDO Unibank users
Banco De Oro (BDO) Unibank is the largest bank in the Philippines and among the top 20 banks in Southeast Asia. Over the past few weeks, Symantec has observed recurrent malicious SMS in which actors are attempting to lure the bank's mobile users into providing sensitive information that will eventually lead to financial theft. This campaign, while it mostly affects consumers, has also been observed targeting corporate users.
The malicious SMS's social engineering plays on account restrictions and a sense of urgency by setting up a deadline of 24 hours. The actors are using a URL shortener (Shorten[.]ee) that will redirect to the phishing/scam website. Using URL shorteners is a common tactic to mask the destination of a link, making it easier to trick people into clicking on phishing links or visiting harmful websites.
Examples of malicious SMS and URLs:
[ BANCO DE ORO ] Your account has been restricted due to unrecognized attempts, Failure to take action will result in account termination within 24 hours. Update here shorten[.]ee/BDO_ONLINEPAY
[BANCO DE ORO!] Your account has been restricted due to unrecognized attempts, Failure to take action will result in account termination within 24 hours. Update shorten[.]ee/BDO-VerifyMyAccount
[ BANCO DE ORO ] Your account has been restricted due to unrecognized attempts, Failure to take action will result in account termination within 24 hours. Update here shorten[.]ee/BDO-OnlineUpdate
Symantec protects you from this threat, identified by the following:
Mobile-based
Symantec Endpoint Protection Mobile is able to analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake BDO domains used in this campaign are known to WebPulse.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
Mallox Ransomware
Mallox is a ransomware group that employs the dreaded double extortion tactic, which means stolen data will likely be sold off or leaked if the victim does not pay the ransom. Recently, Mallox activities have been observed, and post-encryption the ransomware will append a .mallox extension to the encrypted files.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.Cryptlocker!g42
SONAR.SuspLaunch!g18
SONAR.SuspLaunch!g230
SONAR.SuspLaunch!gen4
File-based
MSIL.Downloader!gen8
Trojan.Gen.MBT
WS.Reputation.1
Machine Learning-based
Heur.AdvML.B |
Mallox ransomware actively targeting organizations
Mallox ransomware has reappeared in the wild and is reported to actively target organizations. Mallox (aka. Fargo) is an updated variant of the TargetCompany ransomware strain and has been first seen on the threat landscape back in 2021. The distribution chain involves a payload loader that has also been observed to download several other malware families such as AgentTesla or Remcos. Mallox will encrypt users' files and append .mallox extension to them. This ransomware variant is also known to employ the double extortion technique by ex-filtrating confidential information from the infected endpoints and threatening the victims with public release of the stolen data.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.Cryptlocker!g42
SONAR.MalTraffic!gen1
SONAR.SuspLaunch!g18
SONAR.SuspLaunch!g230
SONAR.SuspLaunch!g253
SONAR.SuspLaunch!gen4
SONAR.TCP!gen1
File-based
Trojan.Gen.2
Downloader
MSIL.Downloader!gen7
MSIL.Downloader!gen8
Ransom.Mallox
Scr.Malcode!gdn14
Scr.Malcode!gdn32
SMG.Heur!gen
Trojan.Gen.NPE
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Network-based
System Infected: Trojan.Backdoor Activity 634
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories |
Mallox ransomware continues to be observed in the wild
Mallox ransomware (known also as Fargo) is a variant of the TargetCompany ransomware family first seen on the threat landscape back in 2021. While it might not be as prevalent as other ransomware variants, a new set of Mallox samples observed in the wild across October and November proves that this ransomware continues to be used in malicious attacks. Mallox encrypts user files and appends .mallox extension to them. The threat actors behind this ransomware variant are known to employ the double extortion technique by not only encrypting the files but also ex-filtrating confidential information from the infected endpoints.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.SuspLaunch!g230
SONAR.SuspLaunch!g309
SONAR.TCP!gen1
File-based
Downloader
Ransom.Mallox
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Heur.AdvML.C
Network-based
System Infected: Bad Reputation Process Request 4 |
Malspam Activity Delivering StealC Infostealer
Last year, it was reported that various infostealer malware like Vidar, Raccoon and a few others give rise to a new malware dubbed StealC. A recent malspam campaign was observed dropping StealC malware via a malicious PDF file, with a link that would eventually download and execute a JS file, subsequently leading to the extraction of StealC malware onto the compromised machine.
Symantec protects you from this threat, identified by the following:
File-based
ISB.Downloader!gen48
ISB.Downloader!gen89
Scr.Malcode!gen
Web.Reputation.1
WS.SecurityRisk.4
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled product |
Malspam actors targeting financial industry with Zorex
Symantec has recently observed a malspam campaign delivering W32.Zorex infected IMG files targeting various industries, including Banking/Financial, pharmaceuticals, and hospitality. Once executed Zorex attempts to infect XLS, XLSX, and XLSM files on the victims machine.
Symantec protects you from these threats, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.SuspBeh!gen633
SONAR.SuspBeh!gen6
File-Based
W32.Zorex
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200 |
Malspam Campaign Delivering DanaBot
An Italian language-based malspam campaign was spotted recently delivering DanaBot. The email contains a link to a malicious JS file which will subsequently download and run the DanaBot DLL. DanaBot is a banking trojan designed to steal financial information from its targets.
Symantec protects you from this threat, identified by the following:
File-based
ISB.Downloader!gen60
ISB.Downloader!gen68
Scr.Malcode!gen60
Scr.Malcode!gen120
Trojan.Gen.MBT
Web.Reputation.1
WS.Malware.1
WS.SecurityRisk.4
Machine Learning-based
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
Malspam campaign dropping Matanbuchus and Qbot
Earlier this year, researchers reported on a new Malware-as-a-Service loader in the field named 'Matanbuchus', advertised on an underground forum the malware creator 'BelialDemon' was a member of.
Recently, a malspam campaign was observed delivering a macro-enabled XLSB file utilizing Matanbuchus as a way to retrieve the additional Qakbot (Qbot) malware afterwards. This activity will subsequently result in a spambot and Cobalt Strike attack.
Symantec protects you from this threat, identified by the following:
File-based
Downloader.Trojan
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.NPE
Trojan.Mdropper
W97M.Downloader
Machine learning-based
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories |
Malspam campaign pushing DCRat via malicious document
A recent malspam campaign aimed at spreading DCRat payload via malicious word documents re-emerged and was spotted by a group of researchers earlier this week. The Dark Crystal RAT (DCRAT) has been around since at least June 2019 and it resurfaced this year around the same month. The operation mostly targets the investment banking industry in Australia.
Malware of this type enables remote access and subsequent control over an infected device.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
File-based
Heur.AdvML.B
Trojan.Gen.MBT
Web-based
Observed domains are covered under security categories |
Malspam campaigns spreading Hancitor malware abuse OneDrive
The most recent Hancitor malspam campaigns have seen a slight change of tactics. The attackers started leveraging feedproxy.google[.]com links in the spam instead of previously used docs.google[.]com links. The distributed spam emails purport to originate from the document signing service DocuSign and inform the recipient about incoming invoice for a service. Once clicked upon, the links redirect to malicious Hancitor word documents hosted on OneDrive URLs. Hancitor malware is known to be used to download a variety of payloads to the compromised hosts.
Examples of the email subject seen in the latest campaigns:
You received invoice from DocuSign Service
You got invoice from DocuSign Service
You received invoice from DocuSign Electronic Signature Service
You got invoice from DocuSign Electronic Signature Service
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.MBT
W97M.Downloader
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Web-based
Observed domains/IPs are covered under security categories |
Malspam capitalizing on Kaseya to deliver Cobalt Strike
Security researchers have reported a new malspam campaign delivering Cobalt Strike (a penetration testing tool commonly utilized by threat actors). The messages have an attached malicious EXE as well as a link to another malicious EXE pretending to be a Microsoft update for the recent Kaseya ransomware attack. Both of these files are Cobalt Strike payloads.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Web-based
Observed IPs/Domains are covered under security categories |
Malspam grabs RedLine stealer from Discord
RedLine Stealer's prevalence has been slowly increasing since it was first discovered in 2020. Used by multiple groups and individuals who conduct constant drive-by-download and malspam campaigns, this threat plagues both the consumer and enterprise markets. In many instances, actors have leveraged this malware to exfiltrate sensitive data from organizations which usually leads to extortion tactics, the data and environment access being sold on underground markets.
Recently, there have been reports of a group that attempted to lure victims with malicious emails containing a PDF attachment. If a victim is successfully lured by the URL within the PDF, it will download RedLine's binary hosted on Discord – a popular VoIP and instant messaging social platform.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
File-based
Trojan Horse |
Malspam: Latin America hit by njRAT and AsyncRAT
Latin America has been the target of multiple spam campaigns, which are attempts to deploy njRAT and AsyncRAT onto victims' machines. These remote access trojans aren't new and appear to be commonly used by both individuals and groups around the globe. Symantec can confirm the use of classic malicious (macro-enabled) Office documents and a series of scripts to deploy the RATs used with these campaigns.
Symantec protects you from these threats, identified by the following:
File-based
Backdoor.ASync!gm
Backdoor.Ratenjay
CL.Downloader!gen10
Downloader
Heur.AdvML.B
Heur.AdvML.C
ISB.Downloader!gen221
ISB.Downloader!gen281
ISB.Downloader!gen348
ISB.Downloader!gen76
ISB.Heuristic!gen5
Trojan.Horse
Trojan.Gen.MBT
Trojan.Gen.NPE
W97M.Downloader
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. |
Malvertising campaign for Webex serving BatLoader
A malvertising campaign abusing Google Ads tracking templates is targeting Webex users. If the user clicks on these ads, they will be redirected to websites distributing BatLoader malware as an installer. As the name indicates, this malware is used to load the next step on the attack chain. At the time of checking, the malware downloaded and run is DanaBot, but this can change as the threat actor wishes. DanaBot is a banking trojan that can be used for stealing information, remote connection to the infected system as well as load and run more malware, including ransomware.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Whispergate
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.A!400
Heur.AdvML.A!500
Heur.AdvML.B
Heur.AdvML.B!200
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Malware-as-a-Service (MaaS) campaign targets Android users in India
A new campaign distributing malicious APK packages to Android users in India has been discovered in the wild. The spread malware is known to be sold in form of Malware-as-a-Service (MaaS) offering and targets theft of banking information, SMS messages and other confidential information from victims' devices. The attackers have been spreading the malicious .apk packages under the disguise of various apps concerning customer support, online bookings, billing or courier services, among others.
Symantec protects you from this threat, identified by the following:
Mobile-based
Android.Reputation.2
AppRisk:Generisk
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Malware authors dig up math lessons to try and evade sandboxing
Security researchers have recently discovered that malware authors have turned to trigonometry to try and determine if the malware package is being run inside. Using some fancy Trigonometry the malware is able to track mouse acceleration in order to determine that it is being run inside of a sandbox based and change it's behavior.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200 |
Malware campaign distributing MadMxShell backdoor via masquerade websites
A new backdoor called MadMxShell has surfaced as part of a malware campaign. The threat actors responsible for the campaign are hosting masquerade websites that impersonate legitimate IP scanner software sites. Employing tactics such as typosquatting and SEO poisoning, they attract users through Google Ads. The backdoor utilizes DNS MX queries for command and control (C2) communication, aiming to evade memory forensics security solutions. The malware provides attackers with unauthorized access to compromised systems, allowing them to execute commands, exfiltrate data, and carry out other malicious activities.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Ps-Rd32!g1
File-based
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.B!100
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Malware campaign spreading Dridex via XLSB
Dridex is a banking Trojan which has been active for almost a decade now. The malware is capable of stealing sensitive information on infected machines. Recently, a malware campaign was observed delivering Dridex via XLSB files. Attackers encrypted the ZIP files upon distribution to possibly bypass email scanning protection.
Symantec protects you from this threat, identified by the following:
Email-based
Protection is in place for Symantec's email security products. Email Threat Isolation (ETI) technology from Symantec provides an extra layer of protection
File-based
Scr.MalMacro!gen3
Trojan Horse
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B
Web-based
Observed domains/IPs are covered under security categories |
Malware discovered on the website of a major certification authority
The official website of a major certificate authority has been compromised. It turns out that the official signature application installer available for download from the public site was backdoored with a Cobalt Strike binary. The malicious installer starts downloading the legitimate version of the installer first so the victim doesn't notice anything unusual. The malware uses steganography to decrypt the Cobalt Strike beacon.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
Network-based
Malicious Site: Malicious Domains Request
Malicious Site: Malicious Domain Request 59 |
Malware disguised as known crypto trading bot on the rise
Crypto trading bots aren't new but are gaining in popularity after being advertised over and over by influencers on social media. Broadly speaking these bots are programs that automatically execute specific trades based on predefined rules. There are many companies like CryptoHopper who provide trading bot services that can plug into different brokers. Since these bots are touted as money making with no financial skills required, many crypto enthusiasts give them a try and some end up downloading them from unreliable sources. Cybercriminals noticed this trend and Symantec is seeing more and more fake crypto trading bots being delivered via social media, forums, fake websites and Voice over IP platforms such as Discord. Over the last few months, this social engineering has been used to deliver threats like infostealer, remote access trojan and crypto clippers. More recently, Symantec has observed a RedLine Stealer drive-by-download campaign disguised as cracked CryptoHopper.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.2
Trojan.Gen.MBT
Trojan Horse
Machine Learning-based
Heur.AdvML.B
Web-based
Observed domains are covered under security categories |
Malware distribution campaigns by the CyberCartel threat group
CyberCartel is a threat group known to be active mostly in Mexico and other Latin American countries since at least 2012. The group relies heavily on miscellaneous malware variants sold as part of malware-as-a-service (Maas) offerings. The latest malicious campaigns attributed to this threat actor have been leveraging malvertising as the main means of malware distribution. The attackers have been deploying malicious payloads with various functionalities such as infostealing, banking data theft, screenshot grabbing, clipboard overwriting, malicious re-directions, traffic interception and others.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
File-based
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE.C
WS.Malware.2
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Network-based
System Infected: Trojan.Backdoor Activity 676
System Infected: Trojan.Backdoor Activity 704
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Malware Loaders dropping Android Banking Trojans
Loaders are lightweight and benign in nature and can easily be integrated into legitimate applications like QR code scanners, PDF scanners, security tools, fitness apps, and two-factor authenticators. Such harmful applications get listed in the Google Play Store if security checks fail to spot the often tiny piece of malware coding hiding within the app.
If a user unknowingly downloads the infected application, installs and launches the software, the loader will establish a connection with the C2 server and an additional Banking Trojan payload will be grabbed from the server. This malware has the capacity to steal credentials for social media, instant messaging, mobile banking, and cryptocurrency apps.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.MBT
Trojan.Gen.2
Trojan Horse
WS.Malware.1
WS.Malware.2
Mobile-based
Android.Reputation.2 |
Malware MountLocker tries to spread by using Windows API
This week researchers have discovered what it is believed a new MountLocker ransomware variant, that contains a new worm feature to spread to and encrypt other devices in the network, through the use of Windows Active Directory Service Interfaces API.
This sample is believed to be a customized version created by a new ransomware group, reported this month, called 'XingLocker'.
Symantec protects you from this threat, identified by the following:
File-based
Downloader
Trojan.Gen.2
Trojan.Gen.MBT
Trojan Horse
WS.Malware.1 |
Malware Seen Hidden in Steam Profile Images
An emerging malware, named SteamHide, has been seen hidden in profile images on the Steam Network. The images are not infectious or executable but do host the Downloader code in the image Profile. An external component can then download the data, unpack and execute the code.
Hidden malware in a image file metadata has previously been seen, but the use of Steam is new. The same method, using updated images, could be used to download updated code or update links. There is also evidence that the code is actively being worked, so variations of this malware will likely be seen in the future.
Symantec protects you from these threats, identified by the following:
File-based
Heur.AdvML.B
Heur.AdvML.C
Trojan.Gen.MBT |
Mamba Ransomware leverages DiskCryptor encryption software
Symantec Security Response is aware of a recent alert issued by the FBI warning of an increase in Mamba / HDDCryptor ransomware activities targeted at governments and various institutions in both public and private sector. According to the report, Mamba ransomware leverages an open source disk encryption software called DiskCryptor in the latest campaigns.
As we continue to monitor and enhance our protections against Mamba ransomware variants, we recommend performing regular backups for any important data and ensuring your security products are kept up to date with the latest product definitions.
Symantec protects you from this threat, identified by the following:
File-based
Heur.AdvML.B
Heur.AdvML.C
Ransom.HDDCryptor
Trojan.Gen.2
Trojan.Gen.MBT |
Mamont Android banking trojan
Mamont is a recently identified banking trojan for Android. The malware has been distributed disguised as a Google Chrome installer package. Mamont has the functionality to collect information about the infected device. It can exfiltrate selected messages and intercept new messages, sending them back to attackers' controlled Telegram channel. The malware has the capability to examine the content of the messages as it is focused on those related to any financial or monetary transactions.
Symantec protects you from this threat, identified by the following:
Mobile-based
Android.Reputation.2
AppRisk:Generisk |
ManageEngine OpManager path traversal vulnerability CVE-2023-47211
CVE-2023-47211 is a recently disclosed critical path traversal vulnerability, with a CVSS score of 9.1. It impacts the uploadMib feature of ManageEngine OpManager. Successful exploitation of the vulnerability can enable attackers to modify file paths beyond the default installation directory in the MIB Browser tool, potentially leading to arbitrary file creation through carefully crafted HTTP requests.
Symantec protects you from this threat, identified by the following:
Network-based
Web Attack: ManageEngine OpManager Path Traversal CVE-2023-47211
Policy-based
Symantec Data Center Security default lockdown policy can protect the underlying servers from this vulnerability by preventing the file creation outside of the default MiBs File's location directory. |
ManageEngine RCE vulnerability CVE-2022-47966 exploited in the wild
CVE-2022-47966 is an unauthenticated remote code execution (RCE) vulnerability affecting over twenty Zoho ManageEngine products such as ADManager Plus, ADSelfService Plus, ServiceDesk Plus, Password Manager Pro, Remote Access Plus and others. If successfully exploited the RCE vulnerability can allow the remote attackers to execute arbitrary commands on the vulnerable servers. While the vendor has released a series of patches for the affected products, the vulnerability has been reported as being exploited in the wild.
Symantec protects you from this threat, identified by the following:
Network-based
Web Attack: Zoho Manageengine RCE Vulnerability CVE-2022-47966
Policy-based
Symantec DCS Hardening policy for Windows provides 0 day protection against threats exploiting CVE-2022-47966. The default sandboxing controls prevent webshells and malware tools from getting installed and prevent arbitrary system command execution from privileged applications.
Web-based
Observed domains/IPs are covered under security categories |
Manic Menagerie 2.0 campaign
Manic Menagerie 2.0 is a long-running malicious campaign targeted at web hosting and IT providers across the EU and the United States. While the start of the campaign dates way back to 2020, the most recent activities of the responsible threat group were seen in April 2023 and prove that the campaign remains ongoing. The purpose of the Manic Menagerie 2.0 campaign is to deploy web shells and coin miners onto the compromised servers. The dropped web shells may provide the attackers with a foothold for further exploitation, while the coin miners allow exploiting the compromised servers for monetary gain. The attackers have also been observed to leverage various custom and dual-use tools such as PCHunter, GoIIS, GodPotato, PetitPotam and others.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
SONAR.TCP!gen6
File-based
Hacktool.Rotpotato!g1
Linux.Coinminer
Trojan Horse
Trojan.Coinbitminer
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
Trojan.Malscript
WS.Malware.1
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.B
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Manjusaka attack framework
A newly discovered offensive framework named Manjusaka is being used in the wild according to the latest reports. Advertised as an alternative to other toolsets commonly used by threat actors such as Cobalt Strike or Sliver, Manjusaka makes use of Rust-based implants and binaries written in GoLang. The malware implants have various functionalities, including arbitrary command execution, remote control over the infected endpoints, file access, credentials ex-filtration and more. Manjusaka implants come in both Windows and Linux variants that show very similar capabilities.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.SuspInject!g25
SONAR.TCP!gen1
File-based
Backdoor.Cobalt!gen9
ISB.Downloader!gen136
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
W97M.Downloader
WS.Malware.1
WS.Malware.2
Network-based
System Infected: Trojan.Backdoor Activity 373
Policy-based
Symantec Data Center Security (DCS) provides the zero day protection against Manjusaka offensive framework:
DCS hardened Linux servers prevent execution of malware from temp or other writable locations. The policy denies writing of the nps.db file onto the disk.
DCS hardened policy also prevents all inbound and outbound connections to the C2 servers.
DCS hardened policy prevents the implant from reaching an external network and downloading the payloads.
Web-based
Observed IPs/domains are covered under security categories |
Maori ransomware targeting Linux
Maori is a Go-based run-of-the-mill ransomware variant targeting the Linux platform. The malware will encrypt user files present in the home directory and append a .maori extension to them. Once the encryption is complete, a ransom note in the form of a “README_MAORI.txt” file will be dropped onto the compromised machine. The ransom note asks the victims to contact the attackers via the Tox messenger for further instructions.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
WS.Malware.2 |
Mars Stealer and R2 phishing combined
Cracked versions of Mars Stealer are widespread and new groups and individuals continually gain access to them, contributing to the ongoing threat that persists globally. Recently, an actor has been running various malspam campaigns using the same Mars Stealer binary, seemingly without a specific target audience in mind (i.e. all organizations around the world are potential targets).
In most iterations, the emails contain a malicious binary attachment (Document.pif). However in one occurrence, besides having the malware attached to the email, they also attempted to capture users' email credentials with a malicious link leading to a phishing page hosted on CloudFlare R2 (read more about this phishing tactic - Link).
Observed email subjects:
Purchase Order Number :4123001569
Request for Quotation
TRQ-983702]: Your services is expiring soon for [recipient email address] Mailbox
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
File-based
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B
Network-based
System Infected: Trojan.Backdoor Activity 634
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
Mars Stealer malware spread via a fake Atomic wallet website
Mars Stealer is a variant of info-stealing malware targeting user credentials, cryptocurrency wallets and 2FA plugins, among others. The malware has been seen recently spread via a fake Atomic wallet website. The website was serving a ZIP archive containing a malicious batch file to anyone wanting to download the Windows version of the crypto wallet. The batch file once executed and through a series of PowerShell commands would lead to the infection with the Mars Stealer payload downloaded from the attacker's Discord server.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
WS.Malware.2
Machine Learning-based
Heur.AdvML.B
Network-based
System Infected: Bad Reputation Process Request 4
Web-based
Observed domains are covered under security categories |
Maseru Infostealer: South African industries and organizations in the line of sight
Symantec has recently discovered a spear phishing campaign in which actors have been targeting South African industries and organizations, posing as a well known South African bank. While there is a clear focus on the African region in this attack, some global industries have also been targeted.
In this financial social engineering attack, emails contained a redirection to a recently registered domain said to be an algorithmic trading platform that trades cryptocurrencies. This is where the malware (dropper) is being stored — an infostealer which the author appears to have named after the capital of Lesotho, Maseru.
Aside from keylogging, the decrypted payload is able to download, upload, update and delete itself, and classes indicate that it is also capable of recording videos from webcams.
Indicator of compromise:
Subject: BANKING DETAILS
HTML file: PaymentConfirmation.pdf.html
URL: hxxp://[removed]/pay/proof%20of%20payment.exe
Symantec has multiple coverage in place for this threat and attack:
File-based
Infostealer.Uresam
Trojan.Dropper
Trojan.Horse
Trojan.Gen.2
WS.Malware.2
Heur.AdvML.C
Behavior-based
SONAR.SuspDrop!gen7
Network-based
System Infected: Backdoor.Trojan Activity 406
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Website-based
This activity is proactively blocked by Symantec Web Isolation technology. |
Massloger trojan targets user credentials in a new campaign
A new malicious campaign has been discovered that leverages a variant of the Masslogger trojan. The malware is used to steal user data and credentials associated with various applications such as Outlook, Google Chrome and several instant messenger applications.
Symantec provides the following detections against this campaign:
File-based
Downloader
Heur.AdvML.B
Trojan.Gen.MBT
Trojan Horse |
MasterFred, Android Overlayer
Overlay is one of the most used techniques among mobile banking malware and infostealers. Recently, a new threat dubbed "MasterFred" has been observed in the threat landscape. MasterFred is designed to overlay a victim's phone screen in an attempt to harvest financial credentials and credit card information.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
AppRisk:Generisk |
MATA: A new multi-platform malware framework linked to Lazarus APT
Attackers linked to the Lazarus APT group (aka Appleworm) have developed a new multi-platform family of malware known as MATA. It includes versions capable of infecting Windows, Linux and macOS operating systems. The malware has a modular construction. The Windows version of the malware consists of a loader, which loads an encrypted payload known as the Orchestrator. The Orchestrator is capable of communicating with the command and control (C&C) server and downloading further plug-in modules.
Plug-ins include:
A module to run cmd.exe or PowerShell with additional parameters and collect responses to these commands
A module to manipulate processes
A module to check for a TCP connection with a specific address or range of addresses
A module to create a HTTP proxy server
A file manipulation module
A module to inject DLLs into running processes
A module to connect to remote servers
Different modules exist for Linux and macOS. The Mac version includes a trojanized application based on open source two-factor authentication (2FA) software.
Symantec Protections
Hacktool.Mata
Hacktool.Mata!g1
Trojan.Gen.MBT
Trojan Horse
Trojan.Gen.2
OSX.Trojan.Gen |
Matanbuchus campaign via malicious XLS
Matanbuchus is a loader-as-a-service that has been in the threatscape for a couple of years now and remains active as of today. This threat has mainly been distributed via email, and various attack chains have been observed. It acts as a first-stage infection, designed to download and install other malware on compromised machines. Today, there have been reports of a new campaign in which the threat actor is leveraging malicious XLS files to fetch a JS file that will in turn lead to a malicious DLL.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec's email security products
Adaptive-based
ACM.Ps-Rd32!g1
File-based
Scr.Malcode!gen
Trojan.Gen.MBT
Trojan.Mdropper
Machine Learning-based
Heur.AdvML.C |
Matrix Ransomware
Matrix Ransomware is now targeting small to medium size businesses around the globe. The actors behind this Ransomware have employed vectors such as Email and Exploit kits in the past but have recently moved away from these and turned to RDP as their main attack vector.
Symantec protects you from this threat, identified by the following:
File-based
Downloader
Heur.AdvML.B
Heur.AdvML.C
Packed.Generic.528
Ransom.Matrix
Trojan Horse
WS.Malware.1
WS.Malware.2
Network-based
System Infected: Ransom.Matrix Activity |
Maui Ransomware used in targeted attacks against healthcare sector
Symantec Security Response is aware of the recent CISA and FBI alert regarding a number of targeted activities observed for the Maui ransomware. This malware strain has been reported to target organizations from the Healthcare and Public Health (HPH) sector since at least May 2021. Maui ransomware is believed to be designed for manual execution by the threat actors with the help of interactions with the malware binaries through the command-line interface. Once the targeted user data is identified by the attackers, the malware encrypts the files using AES 128-bit encryption.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.2
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.C |
MaxOfferDeal variants keep on pestering MacOS users
Symantec continues to observe variants of MaxOfferDeal (aka Genieo) in the MacOS landscape. When successfully deployed, MaxOfferDeal will hijack the victim's web browsers and show multiple third-party advertisements as the user surfs the web. It also redirects users' searches to unwanted websites. These are usually distributed via drive-by-download from fake updates and adware installers.
Symantec protects you from this threat, identified by the following:
File-based
OSX.Trojan.Gen
OSX.Trojan.Gen.2 |
Maze ransomware halts its operations
The Maze ransomware gang officially announced that they have halted operations. Maze is one of the most notorious ransomware variants, employing a double-extortion tactic in which the malware encrypts files for ransom, and the operators threaten to release the stolen information on the Internet in order to extort money from the victim. While the news is good, don't let your guard down. Plenty of other ransomware will take its place and continue to haunt the cyber world.
Symantec detects Maze ransomware as the following:
File based
Ransom.Maze
Ransom.Maze!g1
Ransom.Maze!g2
Ransom.Maze!gm
Behavior based
SONAR.Ransommaze!g1
Network based
32179 (Attack: Ransom.Gen Activity 23) |
Maze Ransomware now using virtual machine technique
Functionality new to Maze ransomware has been observed in recent attacks. The new functionality takes a page from the Ragnar Locker ransomware gang whereby the file-encrypting payload is distributed within a virtual machine. The attack makes use of a Windows installer (.msi) file which contains a VirtualBox virtual disk image (.vdi) on which Windows 7 is installed.
Symantec protections:
File based
Trojan Horse
Trojan.Maltrec.TS
Ransom.Maze
Ransom.Maze!gm
Behavior based
SONAR.Ransommaze!g1
SONAR.Cryptlocker!g61 |
MCCrash DDoSes private Minecraft servers
There you are, finally playing on your private Minecraft server after a long day then suddenly your network starts to lag, and next thing can't do anything at all. That's probably due to a DDoS attack (by MCCrash) against your server. According to recent reports, this threat spread from Windows machines to Linux-based devices then was used by its authors to DDoS private Minecraft servers, with cracked software being the initial vector of infection.
Symantec protects you from this threat, identified by the following:
File-based
SMG.Heur!gen
Trojan Horse
Trojan.Gen.NPE
Machine Learning-based
Heur.AdvML.B |
MDBotnet malware used for DDoS attacks
MDBotnet is a new malware variant offered for sale on underground forums. The malware's main functionality is to carry out HTTP and SYN flood Distributed Denial-of-Service (DDoS) attacks. MDBotnet also comes with an additional "Updater" binary responsible for downloading the most recent versions of the malware from the remote servers controlled by the threat actors.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.2
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.C
Network-based
System Infected: Trojan.Backdoor Activity 634
Web-based
Observed domains/IPs are covered under security categories |
Medusa $tealer
There is no shortage of infostealers in the threat landscape and yet another one has been spotted. Known as Medusa $tealer, this malware has infostealing, denial-of-service (DDoS) and cryptomining capabilities. Actors behind this threat have recently been advertising it on Discord, TikTok and Telegram. As of now, there is limited activity in the wild but we expect to observe drive-by-download campaigns in the near future as groups and individuals try it out.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.2
Trojan Horse
Machine Learning-based
Heur.AdvML.C |
Medusa Android malware spread in recent campaigns leveraging COVID-19 lures
According to the latest reports, the Medusa Android malware has been distributed in recent campaigns targeting users from the United States and Canada. Medusa incorporates several features aimed at stealing credentials, sending and receiving SMS messages, accessing storage, camera or microphone on the compromised devices, etc. The malware has been reported to be spread via malicious SMS messages or through fake websites and being delivered to the users as a fake Adobe Flash player update.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
Android.Reputation.2
AppRisk:Generisk |
MedusaLocker ransomware exploits RDP vulnerabilities to gain access to networks
Symantec Security Response is aware of the recent CISA and FBI alert regarding a number of activities observed for the MedusaLocker ransomware. This malware strain was first discovered in late 2019. According to the released report, the latest activities of this ransomware variant have been observed as recently as May 2022. MedusaLocker is a type of Ransomware-as-a-Service (RaaS) malware and is known to exploit vulnerabilities in Remote Desktop Protocol (RDP) to access targeted networks. MedusaLocker incorporates processes to delete backups and recovery options and has functionality that enables discovery of network connected systems via Internet Control Message Protocol (ICMP) sweeps.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.SuspBeh!gen54
SONAR.SuspDrop!gen7
File-based
Downloader
Ransom.Cryptolocker
Ransom.Locky!g35
Ransom.MedusaLocker
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Network-based
Attack: Ransom.Gen Activity 56
Web-based
Observed IPs/domains are covered under security categories |
MedusaLocker ransomware still active in the wild
MedusaLocker is a ransomware variant first discovered in late 2019 that shows certain connections to another ransomware strain known as GlobeImposter. MedusaLocker a type of Ransomware-as-a-Service (RaaS) malware and is known to exploit vulnerabilities in Remote Desktop Protocol (RDP) to access targeted networks. Just last month Health Sector Cybersecurity Coordination Center (HC3) released an advisory warning about potential attacks from MedusaLocker affiliated threat actors and targeted at the healthcare sector. MedusaLocker appends various extensions to the encrypted files. Some examples of extensions used by most recently discovered variants of this ransomware include: .allock, .filesencrypted, .lockfiles, .marnet2, .onelock and .skynetwork8.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.SuspLaunch!g18
SONAR.UACBypass!gen30
File-based
Downloader
Ransom.Cryptolocker
Ransom.Globeimposter
Ransom.Locky!g35
Ransom.MedusaLocker
WS.Malware.1
WS.SecurityRisk.4
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Network-based
Attack: Ransom.Gen Activity 56 |
MedusaLocker shows spikes of activity in recent months
Symantec is continuously monitoring developments across various ransomware families in the wild. During the last few months we have noticed several spikes of activity for one of the less propagated family known as MedusaLocker. This ransomware variant has been first discovered in late 2019. Some malware characteristics include:
Multiple stages of infection including powershell injection mechanisms
Ability to encrypt mapped network drives
Discovery of network connected systems via ICMP sweeps
Incorporates processes to delete backups and recovery options
Symantec provides the following protection against this threat:
File-based
Downloader
Heur.AdvML.B
Ransom.Cryptolocker
Trojan.Gen.2
Trojan.Gen.MBT
Trojan Horse
Behavior-based
SONAR.Ransom!gen35
SONAR.SuspBeh!gen54
SONAR.SuspDataRun
Network-based
Attack: Ransom.Gen Activity 23
Attack: Ransom.Gen Activity 29
Website-based
This attack is proactively blocked by Symantec Web Isolation technology |
Medusa Ransomware
Medusa ransomware operates as a ransomware-as-a-service (RaaS), with attackers exploiting known vulnerabilities and account compromises in the initial stages. Upon infection, Medusa encrypts user files, adding the .medusa extension, and excluding certain file types like .dll and .exe from encryption. The ransom note, titled '!!read_me_medusa!!.txt,' directs victims to contact the attackers for decryption instructions. The malware has functionality that can halt specific processes, eliminate volume shadow copies, and self-delete after completing the encryption process.
Symantec protects you from this threat, identified by the following:
Behavior-based
ACM.Ps-Net!g1
ACM.Untrst-RunSys!g1
SONAR.Ransomware!g7
SONAR.Ransomware!g12
SONAR.RansomGen!gen3
File-based
Ransom.Gen
Ransom.Medusa
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.A!500
Heur.AdvML.C |
Meet Epsilon Ransomware
The term "Epsilon" has various meanings depending on the context, including a small quantity or an empty string, but there is nothing small or empty about the Epsilon ransomware that Symantec Security Response recently came across. We identified several samples of Epsilon ransomware across at least 6 different countries. Files encrypted by Epsilon will have a ".boom" file extension. After files are encrypted, the user is instructed to contact an address hosted by a free encrypted email service in order to decrypt the affected files. The attacker, as with many other cyber criminals, is willing to decrypt two files for free as proof that the encrypted files can be recovered.
Symantec provides the following protection against Epsilon ransomware:
File-based
Ransom.HiddenTear!g1
Trojan.Gen.MBT |
Megazord Ransomware
Megazord ransomware is a Rust-based malware that targets healthcare, education, and government entities. The initial attack vector includes spear-phishing emails as well as exploiting vulnerable services. Tools such as RDP and advanced IP scanners are used for lateral movement. Once compromised, Megazord terminates multiple processes and services, and encrypts local volumes and files. The encrypted files are appended with the “POWERRANGES” extension, and a ransom note, "powerranges.txt" is dropped in each folder containing encrypted files. Victims are instructed to contact the threat actor via the TOX messenger with reference to a unique Telegram channel link provided in the ransom note. Megazord shares multiple code similarities with Akira and is believed to be related to the Akira ransomware.
Symantec protects you from this threat, identified by the following:
File-based
Ransom.Akira!g2
Trojan.Gen.MBT
W97M.Downloader
WS.Malware.1
Machine learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200 |
Mekotio banking malware targets Italy in the latest malspam campaign
Mekotio is a banking malware known for several years for targeting predominantly the Latin America region. According to latest reports, the most recent distribution campaign of this malware targets users in Italy instead. The victims will receive malspam posing as false tax receipts. Those emails contain links directing to compressed msi files, which in turn lead to a download of vbs and dll files initiating the infection.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.2
Trojan.Malmsi
W97M.Downloader
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Web-based
Observed domains are covered under security categories |
Menorah, new malware attributed to Crambus (APT34)
The advanced persistent threat (APT) group Crambus (aka OilRig, APT34) is a covert cyberespionage group mainly focused in the Middle East, collecting sensitive intelligence by employing spear phishing campaigns. A new malware has been attributed to this group, named Menorah. The malware is being distributed through a malicious office document in charge of downloading the malware and creating a scheduled task to run it in the background. Menorah can be considered a backdoor with capabilities to gather system information, download and upload files to the system and execute shell commands.
Symantec protects you from this threat, identified by the following:
File-based
Backdoor.Ratenjay
W97M.Downloader
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.A!400
Heur.AdvML.A!500
Heur.AdvML.B
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Meow Ransomware
Meow Ransomware was first reported back in 2022, crafted out of the Conti ransomware source code that was leaked in the same year. Threat actors behind the ransomware made a come back this year after a couple months of silence and were already reported to have a total of nine victims to date.
The ransomware encrypts various type of files and adds .MEOW as its file extension. Attackers prefer victims to communicate via email or Telegram at addresses and handles mentioned in the ransom note named "readme.txt".
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Untrst-RunSys!g1
Behavior-based
SONAR.RansomPlay!gen1
File-based
Downloader
Ransom.Conti!gen4
Ransom.Conti!gen10
Ransom.Conti!gen12
Ransom.Generic.1
WS.SecurityRisk.4
Machine Learning-based
Heur,AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200 |
Mercari smishing campaign hits Japan
SMS phishing (aka Smishing) is a technique that's still widely used by threat actors to lure mobile victims onto phishing websites in order to steal their credentials, but also to websites hosting malicious android applications. Recently, Symantec has observed an ongoing smishing campaign targeting Japanese mobile users in an attempt to steal their Mercari credentials. Mercari is a well-known and popular Japanese e-commerce company that provides marketplace services via their mobile application.
In this campaign, actors are sending out SMS informing potential victims that their Mercari account has been temporarily frozen, along with a URL. The URL leads to a phishing page identical to Mercari's login page.
Indicators of compromise:
SMS: メルカリをご利用ありがとうございます。メルカリの口座を一時凍結します。詳細はアクセス: [Malicious URL]
URLs' format: hxxps://mercari[.][5 random letters][.]com/
Symantec protects you from this threat, identified by the following:
Mobile-based
Symantec Endpoint Protection Mobile is able to also analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake Mercari domains used in this campaign are known to WebPulse. |
Merdoor backdoor leveraged by the Lancefly APT
The Lancefly advanced persistent threat (APT) group is using a custom-written backdoor in attacks targeting organizations in South and Southeast Asia, in activity that has been ongoing for several years. Lancefly’s custom malware dubbed Merdoor, is a powerful backdoor that appears to have existed since 2018. Symantec researchers observed it being used in some activity in 2020 and 2021, as well as this more recent campaign, which continued into the first quarter of 2023. The motivation behind both these campaigns is believed to be intelligence gathering. The attackers in this campaign also have access to an updated version of the ZXShell rootkit
Read more in our blog: Lancefly: Group Uses Custom Backdoor to Target Orgs in Government, Aviation, Other Sectors
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.TCP!gen1
SONAR.TCP!gen6
File-based
Backdoor.Trojan
Hacktool
Hacktool.Gen
Hacktool.Mimikatz
PUA.Gen.2
Trojan Horse
Trojan.Dropper
Trojan.Gen.MBT
WS.Malware.2
Machine learning-based
Heur.AdvML.A
Heur.AdvML.B
Heur.AdvML.C
Network-based
System Infected: Trojan.Backdoor Activity 634
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories |
MesaCorp Ransomware
MesaCorp ransomware (Chaos variant) has been seen in Turkey and other countries, targeting single machines and asking for a ransom of 2 XMR which is equivalent to 299 US Dollars at the time of writing. Encrypted files will see themselves appended with a .MesaCorp extension and the ransom note (written in English and Turkish) will be dropped at various locations. The threat will also replace the current wallpaper with the ransom note.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.SuspBeh!gen625
File-based
Ransom.HiddenTear!g1
Machine Learning-based
Heur.AdvML.B
Policy-based
Symantec Data Center Security (DCS) default hardening policies provide 0-day protection against MesaCorp ransomware |
MeshAgent used in spear phishing campaign by Stonefly APT group
A new spear phishing campaign by the Stonefly (aka Andariel) APT group has been reported in the wild. As part of the campaign, MeshAgent was deployed along with the malware payload by exploiting known vulnerabilities in installed software. MeshAgent, like other remote management tools, provides various functionalities for remote control. However, it is commonly exploited by threat actors for malicious purposes.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen6
File-based
Hacktool.Mimikatz
Scr.Malcode!gdn32
Trojan.Gen.MBT
WS.Malware.1
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Mesipinoza deploys MagicSocks during ransomware attack
Mespinoza has been shown to deploy various tools during their ransomware campaigns, among these tools is Gasket, which is a backdoor with command and control (C&C) functionality written in Golang. Another utility dubbed MagicSocks, which is used as a standalone tool or with Gasket, is used for creating tunnels and proxies.
Finally, before deploying the Mespinoza ransomware the group exfiltrates data that could be potentially sensitive to their targets (sample keywords used; clandestine, fraud, SSN), potentially profiting twice from ransomware victims.
Symantec protects you from this threat, identified by the following:
File-Based
Backdoor.Trojan
Ransom.Gen
Trojan.Gen.2
Trojan.Gen.MBT
Trojan Horse
Website-based
Observed domains are covered under security categories |
Mesmerised Ransomware
Mesmerised is a new ransomware variant of the Chaos family that has been observed in the wild. Multiple versions of the ransomware have been observed in circulation. The malware encrypts user data and appends .mesmerised extension to the files. Upon successfully compromising and encrypting files, a ransom note named READ-ME.txt is dropped onto the victim's machine with instructions on ransom payment in Bitcoin or Litecoin to get the decryption tool. The ransom note includes contact details such as an email address and a reference to a uToxID for instant messaging. Notably, the malware can halt various system processes and services and delete volume shadow copies.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.SuspDrop!gen1
File-based
Ransom.Zombie
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.A!300
Heur.AdvML.B!100
Heur.AdvML.B!200 |
Messec Ransomware
Messec is another Chaos ransomware variant recently observed in the wild. The malware encrypts user files and appends .messec extension to them. The ransom note is dropped in the form of a "READ_ME.txt" text file where the attackers ask for 100$ ransom payment in Bitcoin for data decryption. Once the files on the compromised machine are encrypted the malware will also change the desktop wallpaper on the system.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.SuspDrop!gen1
File-based
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!200 |
Metamask's popularity brings a surge in phishing scams
Metamask is a popular cryptocurrency wallet and browser extension that allows users to securely store, manage, and interact with Ethereum-based cryptocurrencies and decentralized applications (dApps) directly from their web browser. Over the years, it has become a popular choice among cryptocurrency users and dApp developers. However, as we all know in the cybersecurity space, popularity always attracts unwanted attention.
In recent years, Symantec has seen an increase in phishing websites mimicking Metamask in hopes of tricking users into giving away their private keys, seed phrases, or other sensitive information that can be used to steal their cryptocurrency. These phishing campaigns are conducted by groups and individuals around the world and are mostly observed via phishing emails and smishing (SMS phishing). Below are some examples of the subject lines observed in recent phishing email attempts:
MetaMask Quick Identity Verification
[Important Notice] Request to confirm use of MetaMask
MetaMask Privacy Policy Update: 21/02/2023
This email is a service from MetaMask
MetaMask(メタマスク) クイック本人確認
【重要なお知らせ】MetaMask(メタマスク) ご利用確認のお願い
You have a frozen MetaMask wallet
Your MetaMask wallet is limited!
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
Mobile-based
Symantec Endpoint Protection Mobile is able to also analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect.
Web-based
Observed domains/IPs are covered under security categories |
MetaMask cryptocurrency wallet users targeted with a new phish wave
MetaMask is a cryptocurrency wallet service that allows it's users to access their Ethereum wallets through a browser or mobile application. Recently, Symantec has observed a new wave of phish runs spoofing MetaMask services with fake verification notifications. The email content provides a deadline and mentions that the "unverified" accounts will be suspended if not verified. It entices the user to click on the URL in order to verify their MetaMask wallet.
Email Headers:
Subject: Your MetaMask wallet will be suspended
From: "MetaMask" <chief@redacted_domain>
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Metasploit Meterpreter observed in attacks targeting vulnerable Redis servers
Meterpreter is an advanced Metasploit attack payload leveraged in penetration testing that uses in-memory DLL injection stagers. The tool has been known to be exploited by various threat actors for a long while now. In a recently reported campaign, Meterpreter has been observed being deployed to vulnerable or misconfigured Redis servers. The attackers have also been using a privilege escalation tool called PrintSpoofer. Meterpreter deployment to vulnerable servers is an initial attack step that might lead to deployment of further arbitrary payloads such as cryptominers or ransomware.
Symantec protects you from this threat, identified by the following:
File-based
Meterpreter
Packed.Generic.347
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.A!300
Heur.AdvML.B!100
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Metasploit used in a cryptocurrency mining campaign
Red Team tools have been used for years by the pen-testing industry but also by cybercriminals as part of their attack chain. There have been recent reports of a campaign in which a popular testing framework known as Metasploit and its backdoor (Meterpreter) were used by a group to deploy a cryptocurrency miner.
Symantec protects you from these threats, identified by the following:
File-based
Meterpreter
Trojan.Gen.MBT |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.