text
stringlengths
0
383k
LV Ransomware proves to be a modified Sodinokibi variant LV ransomware - a malware variant that's been in use since at least 2020 - has been found to be actually a modified version of the Sodinokibi ransomware associated with a separate threat group. LV Ransomware has been advertised for sale on underground forums and the group behind it also published a leak site calling out its victims. Symantec protects you from this threat, identified by the following: File-based Downloader Heur.AdvML.B WS.Malware.1
macOS backdoor leads to Ransomware A macOS backdoor has been recently discovered. This new backdoor masquerades as a Visual Studio update, has 3 observed variants and is written in Rust. Once installed the backdoor attempts to impersonate common software notifications in order to obtain the admin password. Once this is achieved it gets to work on setting up persistence and exfiltrating data that will later be used to extort the victim. Symantec protects you from this threat, identified by the following: File based Trojan Horse OSX.Trojan.Gen OSX.Trojan.Gen.2 Network based WS.Malware.1 WS.Malware.2 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
MacOS CVE-2022-46689 Apple recently released patches for vulnerabilities (CVE-2022-46689) in macOS versions 13.1, 12.6.2, and 11.7.2 that could allow a local authenticated attacker to gain elevated privileges on the system. This vulnerability is caused by a race condition in the macOS kernel and can be exploited by an authenticated attacker through a specially crafted request, such as through an app, to execute arbitrary code with kernel privileges. A proof of concept for this vulnerability was recently shared on an Internet hosting service for software development and version control, which may be used to attack vulnerable MacOS versions. Symantec protects you from this threat, identified by the following: File-based Exp.CVE-2022-46689
MacOS: Honkbox Cryptominer Recently, light has been shed on Honkbox which has been making rounds in the MacOS threat landscape since 2019. This threat is a cryptominer with multiple components and according to reports, there are at least three variants. Actors have been spreading it using trojanized cracked software that is popular among MacOS users. It primarily affects consumers but enterprises are not exempt. Symantec protects you from this threat, identified by the following: File-based OSX.Trojan.Gen
macOS MetaStealer MetaStealer is a recently discovered infostealer variant targeting business users on the macOS platform. While the malware is primarily spread via .dmg image files disguised under various file names referencing business presentations, contracts, cover references etc., some MetaStealer droppers might also masquerade as Adobe Photoshop or Tradeview application installers. MetaStealer has the capability to exfiltrate keychains, saved credentials or confidential user files from the compromised machines. Symantec protects you from this threat, identified by the following: File-based OSX.Trojan.Gen OSX.Trojan.Gen.2 WS.Malware.1 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
MacOS ObjCShellz malware deployed by BlueNoroff threat group A new macOS malware variant attributed to the BlueNoroff APT group has been identified in the wild. The malware dubbed ObjCShellz shares some characteristics with the malware variants deployed by the same threat actors in earlier campaigns known as RustBucket. Functionality-wise the malware acts as a remote shell executing commands received from the attackers. Symantec protects you from this threat, identified by the following: File-based OSX.Nukesped Trojan Horse WS.Malware.2 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
MacOS Users targeted with Infostealers MacOS users continue to be targeted with infostealers via malicious advertisements and fake websites. In a recent campaign, a counterfeit website offering free group meeting scheduling software was observed. This website installs an infostealer capable of extracting users' keychain data, credentials stored in web browsers, and information from cryptocurrency wallets. This malware shares similar characteristics with a Rust-based stealer family called Realst and employs an AppleScript call to prompt users for their macOS login password in order to execute its malicious activities. Symantec protects you from this threat, identified by the following: File-based OSX.Trojan.Gen WS.Malware.1 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
MacStealer malware MacStealer is a newly identified infostealer targeting the macOS platform. MacStealer has the functionality to exfiltrate a variety of confidential data including login credentials, cookies, credit card data, documents and others. The malware has also the ability to forward some of the stolen information directly to attacker's controlled Telegram channels. Symantec protects you from this threat, identified by the following: File-based OSX.Trojan.Gen OSX.Trojan.Gen.2 WS.Malware.1 Web-based Observed domains/IPs are covered under security categories
Mac vulnerability patched as Shlayer malware spreads Apple has released a patch for a MacOS vulnerability (CVE-2021-30657) which is reportedly being exploited in the wild by Shlayer malware. The vulnerability allows Shlayer to bypass the security checks implemented by the vendor, and download and launch second-stage payloads. Shlayer is known as an adware distribution vehicle and has been around since at least early 2018, initially hidden in a fake Flash installer. Since then, the attackers have tried other methods to distribute the malware such as fake pop-ups and malvertising campaigns. By exploiting an unpatched vulnerability, the Shlayer attackers have stepped into a brand new distribution realm. Mac users are strongly recommended to apply the patch as soon as possible. Symantec protects you from this threat, identified by the following: File-based OSX.Trojan.Gen Web-based Observed domains are covered under security categories
Mad Cat Ransomware A chaos ransomware variant known as Mad Cat has been observed encrypting individual machines, affecting both consumers and enterprises. The observed sample will encrypt files and then append a random 4-character extension. The actor behind this variant is asking for 0.02 BTC, which is equal to 682.33 USD at the time of writing. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.SuspBeh!gen625 File-based Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B
MafiaWare666 ransomware MafiaWare666 is yet another run-of-the mill ransomware variant written in C#. While there have been several campaigns spreading various versions of this ransomware, the malware remains relatively simple with no implementation of any obfuscation or anti-analysis techniques. Once user's files are encrypted MafiaWare666 will append additional extension to them. Some of the known extensions used by the malware include: .MafiaWare666, .jcrypt, .brutusptCrypt or .bmcrypt. The dropped ransom note asks for Bitcoin payment to a specified crypto-wallet address. Symantec protects you from this threat, identified by the following: File-based Ransom.Gen Scr.Malcode!gdn14 Trojan Horse Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.1 Machine Learning-based Heur.AdvML.B
Magecart Group 12 seen using favicon to hide PHP web shell Magecart Group 12 activity has been seen using a new malware vector. This attack uses a PHP web shell script. The script is renamed as a favicon PNG file and inserted into the shortcut icon tags on a webpage. Once the web shell is running, the attacker has and can maintain remote access to the infected machine. Similar attacks using JavaScript have been previously detected, but the use of a PHP web shell script is new. Symantec protects you from these threats, identified by the following: Email-based Protection is in place for Symantec's email security products. Email Threat Isolation (ETI) technology from Symantec provides an extra layer of protection. Network-based Web Attack: Formjacking Website Formjacking Black list Website-based Observed domains are covered under security categories.
Magento Vulnerability CVE-2024-20720 Reports have revealed that threat actors were able to exploit Magento, now known as Adobe Commerce, by injecting backdoor malware into certain e-commerce websites through a recently disclosed vulnerability classified as CVE-2024-20720. This vulnerability allows attackers to execute arbitrary code on target servers, potentially leading to remote code execution. Symantec protects you from this threat, identified by the following: Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Maggie backdoor targets MS SQL servers Maggie is a new backdoor targeted exclusively at MS SQL servers. The malware disguises itself as an Extended Stored Procedure DLL file. Extended Stored Procedure is natively used to extend SQL Server functionality through additional functions that come compiled in form of dynamic link library (DLL) files. Maggie is controlled by the attackers only through MS SQL queries that instruct the backdoor to perform specific actions or run commands. The backdoor supports 51 commands including downloading and deleting files, running SOCKS5 proxy, running programs, bruteforce scans to other SQL servers, installing and running terminal services and many others. Symantec protects you from this threat, identified by the following: File-based Backdoor.Maggie Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories
MagicRAT - new malware attributed to the Lazarus APT A new remote access trojan (RAT) dubbed MagicRAT has been discovered in the wild and attributed to the Lazarus APT group. According to a recent report, the malware has been distributed in campaigns exploiting publicly exposed VMware Horizon platforms. MagicRAT once on the infected systems might lead to deployment of additional payloads. One of the MagicRAT's C2 servers has been reported as being shared with TigerRAT - another malware variant also attributed to the Lazarus group. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 WS.Malware.2 Network-based System Infected: Trojan.Backdoor Activity 634 Web-based Observed IPs/domains are covered under security categories
Magnet Goblin targets Ivanti Connect Secure VPN users A malware campaign conducted by the threat actor known as Magnet Goblin, targeting Ivanti Connect Secure VPN, has been reported. NerbianRAT, a Linux-based malware, and WARPWIRE Infostealer were deployed as part of the campaign. Magnet Goblin specializes in exploiting 1-day vulnerabilities in public-facing services, and in this instance they exploited a command injection vulnerability in the web components of Ivanti Connect Secure (CVE-2024-21887). Symantec protects you from this threat, identified by the following: File-based Hacktool.Ligolo Trojan.Gen.NPE Trojan Horse WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.B Heur.AdvML.C Network-based Web Attack: Ivanti ICS CVE-2023-46805 Web Attack: Ivanti ICS CVE-2024-21887 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Magniber ransomware campaigns exploit the recently patched CVE-2021-26411 vulnerability Based on recent reports, Magniber ransomware deployment campaigns appear to be leveraging recently patched Microsoft IE RCE vulnerability CVE-2021-26411. Before this, these campaigns were exploiting similar IE vulnerabilities like CVE-2020-0968 and CVE-2019-1367. As we continue to monitor and enhance our protections against Magniber ransomware variants, we recommend performing regular backups for any important data and ensuring your security products kept up to date with the latest product definitions. Symantec's protection against Magniber ransomware includes the following: File-based: Exp.CVE-2021-26411 Heur.AdvML.B ISB.CVE-2021-26411!g1 Packed.Generic.525 Trojan.Gen.MBT Trojan Horse Network-based: Web Attack: Internet Explorer RCE CVE-2021-26411 Web Attack: Microsoft Internet Explorer RCE CVE-2019-1367
Magniber ransomware campaigns target European countries According to latest reports, Magniber ransomware has been observed in recent attacks targeting users in several European countries. The attackers are leveraging malvertising as the preferred distribution method. The potential victims are directed to a download of .zip archives containing malicious .msi packages disguised as security updates or software patches. Just in the last year alone, Magniber ransomware has been spread via a large variety of different file formats, including signed .appx files, .msi and .js/.jse packages, among others. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.SuspLaunch!g193 File-based Ransom.Magniber Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.B
Magniber Ransomware leverages PrintNightmare vulnerability to spread It has been reported that one of the PrintNightmare vulnerabilities (CVE-2021-34527) has been weaponized by the Magniber ransomware group. According to the latest reports, Magniber started to leverage this vulnerability in the distribution campaigns dating back to the middle of July. The observed campaigns have been primarily targeting victims in South Korea. Symantec protects you from this threat, identified by the following: File-based Downloader Exp.CVE-2021-34527 Exp.CVE-2021-34527!g1 Packed.Generic.525 Packed.Generic.616 Trojan.Gen.MBT Network-based Attack: Ransom.Gen Activity 29 Audit: Windows Print Spooler RCE CVE-2021-34527 OS Attack: Windows Print Spooler RCE CVE-2021-34527
Makop Ransomware attacks via phishing runs Makop is a ransomware variant seen being distributed as a payload of phishing campaigns this year. This malware will attempt to delete the Volume Shadow Copies on the compromised machine - a technique used by many other ransomware families. The ransomware appends .makop extension to the encrypted files. We recommend regular backup procedures of any important files and applying the latest product definitions to protect against ransomware threats. Symantec's protections: File-based Downloader Heur.AdvML.B Heur.AdvML.C Packed.Generic.525 Trojan.Gen.MBT Behavior-based SONAR.Ransom!gen29 Network-based [32465] Attack: Ransom.Crysis Activity [32466] Attack: Ransom.Crysis Activity 2 [32483] Attack: Ransom.Crysis Activity 3
Makop ransomware continues to be spread via malspam Makop ransomware continues to be spread via malspam campaigns as multiple samples of this ransomware family have been found in the wild across March and April. The most latest Makop variants encrypt user files while appending either the .pecunia or .dark extension to them and drop a ransom note file named 'readme-warning.txt' in each of the encrypted folders. As we continue to monitor and enhance our protections against Makop Ransomware variants, we recommend performing regular backups for any important data and ensuring your security products are kept up to date with the latest product definitions. Symantec protects you from this threat, identified by the following: File-based Downloader Heur.AdvML.B Heur.AdvML.C Packed.Generic.525 Trojan.Gen.2 Trojan.Gen.MBT Trojan Horse Behavior-based SONAR.Ransom!gen29
Makop Ransomware Distributed as Fake Resumes Makop Ransomware, a file-encrypting ransomware first seen in 2020, has been recently seen distributed in Korea via email. An attachment to the email made to look like a resume document is actual a twice compressed archive that contains the ransomware. Once expanded, Makop deletes volume shadow copy files, stops processes and then encrypts files on the infected machine. Symantec protects you from these threats, identified by the following: File-based Trojan.Gen.2 Email-based Coverage is in place for Symantec's email security products
Malicious activities associated with the WIP26 threat group According to a recent report, a new threat actor dubbed WIP26 has been engaged in a series of attacks against the telecommunications sector in the Middle East. The threat group has been relying on public cloud infrastructure (such as MS Mail 365, Microsoft Azure, Google Firebase or Dropbox) in a likely attempt to evade detection and stay under the radar. WIP26 employs two distinct backdoor variants dubbed CMD365 and CMDEmber that masquerade as legitimate applications such as pdf readers or software updates. The purpose of discovered campaigns is likely reconnaissance, espionage and data exfiltration. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based Trojan Horse Trojan.Gen.2 WS.Malware.2 Machine Learning-based Heur.AdvML.B Web-based Observed domains/IPs are covered under security categories
Malicious activities attributed to the Earth Krahang APT New malicious activities attributed to the APT actor named Earth Krahang have been observed in the wild. These threat actors have been known to target governmental entities around the world. TTPs of this threat group include the usage of open-source scanning tools, conducing spear-phishing campaigns, brute-force attacks, vulnerability exploitation, usage of various tools allowing for privilege escalation or facilitation of remote desktop connections to the compromised machines. Among the malware variants observed to be recently in use by Earth Krahang are RESHELL and XDealer backdoors. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Ps-Rd32!g1 ACM.Ps-Wscr!g1 ACM.Untrst-RunSys!g1 Behavior-based SONAR.ProcHijack!g45 SONAR.ProcHijack!g47 SONAR.SuspInject!gen3 SONAR.SuspLaunch!g13 SONAR.TCP!gen1 File-based Backdoor.Cobalt!gm1 Downloader Trojan Horse Trojan.Coinminer Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE Trojan.Nancrat WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.A Heur.AdvML.A!300 Heur.AdvML.A!400 Heur.AdvML.A!500 Heur.AdvML.B!100 Heur.AdvML.B!200 Heur.AdvML.C Network-based Attack: Openfire Authentication Bypass Vulnerability CVE-2023-32315 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Malicious backdoor XRed XRed backdoor has sophisticated capabilities as it collects system data information that it transmits the data using SMTP to email addresses. This backdoor also has notable persistence capabilities by using hidden directories and Registry Run Keys while attempting to remain hidden in trojanized software. It additionally has worm-like propagation via USB drive capabilities. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Ps-RgPst!g1 ACM.Untrst-RunSys!g1 Behavior-based SONAR.SuspPE!gen32 SONAR.Dropper File-based Backdoor.Graybird Backdoor.Trojan Trojan.Gen.2 Trojan.Gen.9 Trojan Horse Trojan.Gen.MBT Trojan.Mdropper W32.Changeup W32.Fixflo.B!inf W32.Zorex Web.Reputation.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.A!300 Heur.AdvML.B!100 Heur.AdvML.B!200 Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Malicious campaign targets German users with either Gootkit or Sodinokibi We have been aware of reports concerning a new malicious campaign targeting German users in particular. The campaign has been active since around the last week of November and makes use of compromised WordPress websites and fake download links to spread either the Gootkit banking trojan or the Sodinokibi ransomware. While Sodinokibi has been one of most prevalent ransomware families since 2019, Gootkit disappeared around a year ago when its operators experienced a data breach after leaving a MongoDB database exposed. The breach prompted speculation that the malware had been retired for good. It is interesting to see its re-emergence on the threat landscape right now. For more information on Sodinokibi ransomware family and its earlier campaigns read our publication: Sodinokibi: Ransomware Attackers also Scanning for PoS Software, Leveraging Cobalt Strike Symantec has the following protection in place for this reported campaign: File-based Downloader Heur.AdvML.B Heur.AdvML.C Trojan.Gen.2 Trojan.Gen.MBT Trojan Horse Website-based These activities are proactively blocked by Symantec Web Isolation technology.
Malicious coa and rc NPM packages discovered Two popular NPM libraries, "coa" and "rc", were recently modified to include malicious scripts that would be executed upon package installation. These scripts would attempt to download and execute the Danabot Trojan, a password-stealing malware. Symantec protects you from this threat, identified by the following: File-based Downloader Trojan Horse Trojan.Danabot Trojan.Gen.MBT Trojan.Malscript WS.Malware.1 Network-based Malicious Site: Malicious Domains Request System Infected: Trojan.Danabot Activity 3 Machine Learning-based Heur.AdvML.B Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories
Malicious downloader masquerading as Covid-19 vaccination information New malware has been observed propagating via malicious email attachments disguised as a Covid-19 related vaccine information. The attack consists of a password protected .xlsm attachment which the recipient is encouraged to open using a provided password. Further interaction is required to enable macros in the document so that additional content can be downloaded. The goal is to gain back door access to the now compromised system. The attackers attempt to appear legitimate by using a seemingly Covid-19 related "information" address to distribute the email and by incorporating a number of security related images into the attached document. Symantec protects you from this threat, identified by File-based Heur.AdvML.C Trojan.Gen.MBT Email-based Protection is in place for Symantec's email security products. Web-based Observed domains are covered under security categories.
Maliciously blended Android app downloads malware Symantec Security Response is aware of a report that a particular version of a popular Android app, which allows users to download and install Android apps from unofficial Android app stores, includes malicious code. This app version is capable of showing ads as well as downloading other malware onto the target device. The app is not actually intended to perform the latter action, however the malign code is thought to have been mistakenly included by its developers. The code has been removed from the latest official version of the app. Symantec protects you from this threat, identified by the following: Mobile-based AppRisk:Generisk Other:Android.Reputation.1
Malicious MSI leads to BatLoader Over the past two years BatLoader campaigns have fluctuated and as of today, it maintains a presence in the threat landscape. This threat has loaded various infostealers and remote access trojans in past campaigns. Symantec has recently observed new command-and-control servers that host multiple malicious Microsoft Windows Installers (MSI) which deploy this loader if successfully executed. The actor behind this recent campaign has disguised these MSI installers as well-known and popular software such as Tor, MsOffice, Malwarebyte, Adblock, WinRar, Luminar, etc. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT Scr.Malscript!gen1 Ws.Reputation.1 Machine Learning-based Heur.AdvML.C
Malicious new loader runs as a server A malicious loader, named Wslink, has been brought to light recently. The loader has been undocumented so far and remains without attribution to any known threat actor. The initial compromise vector is also not known, but telemetry has shown a few hits in Central Europe, North America, and the Middle East. This malware runs as a server and executes received modules in memory with public-private key encrypted communication. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT
Malicious Replica of CapCut Websites Delivering Information Stealing Malware Researchers have recently spotted a couple of phishing websites hosting fake CapCut installers. CapCut is an official video editor for Tiktok and Threat Actors capitalized on the application's popularity. The fraudulent installers when downloaded and executed will drop a variety of malware including Offx and Redline stealer. One known Offx stealer capability is the ability to extract passwords and cookies from web browsers. Redline is able to grab data stored in web browsers and applications, including credentials, credit cards, and auto-complete data. Symantec protects you from this threat, identified by the following: File-based Scr.Malcode!gdn14 Scr.Malcode!gdn32 Trojan.Gen.MBT Trojan Horse WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Web-based Observed domains/IPs are covered under security categories
Malicious SMS Targeting Crédit Agricole Mobile Users Symantec identifies various genres of social engineering in phishing attacks, all aimed at manipulating individuals into revealing sensitive information. Common strategies involve sending false invoices, posing as tech support, offering fraudulent job opportunities, and using fake password reset emails. Scammers employ a variety tactics such as fake software updates, IRS or tax threats, lottery scams, and healthcare-related messages. Each of these strategies are comprised of sub-tactics. This protection bulletin specifically addresses one related to fake password reset attempts. Symantec recently detected a smishing campaign targeting Crédit Agricole's mobile users in France, using a fictitious SécuriPass reset/reactivation requirement due to cyber-attack. The attackers exploited the knowledge that these users rely on SécuriPass, a digital service provided by Crédit Agricole to enhance online banking transaction security, tailoring their social engineering and phishing techniques accordingly. According to Crédit Agricole, users must be aware that the activation of SécuriPass takes place exclusively within their banking app (Ma Banque); any other activation method may be considered an attempt at fraud. Observed malicious SMS: Crédit Agricole : Mise à jour de votre SécuriPass obligatoire suite à une cyber-attaque, activez-le en cliquant sur le lien suivant: hxxps[:]//servicecaactiverapide[.]com Symantec protects you from this threat, identified by the following: Mobile-based Symantec Endpoint Protection Mobile is able to analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake domain used in this campaign are known to WebPulse. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Malicious SMS Targets BDO Unibank users Banco De Oro (BDO) Unibank is the largest bank in the Philippines and among the top 20 banks in Southeast Asia. Over the past few weeks, Symantec has observed recurrent malicious SMS in which actors are attempting to lure the bank's mobile users into providing sensitive information that will eventually lead to financial theft. This campaign, while it mostly affects consumers, has also been observed targeting corporate users. The malicious SMS's social engineering plays on account restrictions and a sense of urgency by setting up a deadline of 24 hours. The actors are using a URL shortener (Shorten[.]ee) that will redirect to the phishing/scam website. Using URL shorteners is a common tactic to mask the destination of a link, making it easier to trick people into clicking on phishing links or visiting harmful websites. Examples of malicious SMS and URLs: [ BANCO DE ORO ] Your account has been restricted due to unrecognized attempts, Failure to take action will result in account termination within 24 hours. Update here shorten[.]ee/BDO_ONLINEPAY [BANCO DE ORO!] Your account has been restricted due to unrecognized attempts, Failure to take action will result in account termination within 24 hours. Update shorten[.]ee/BDO-VerifyMyAccount [ BANCO DE ORO ] Your account has been restricted due to unrecognized attempts, Failure to take action will result in account termination within 24 hours. Update here shorten[.]ee/BDO-OnlineUpdate Symantec protects you from this threat, identified by the following: Mobile-based Symantec Endpoint Protection Mobile is able to analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake BDO domains used in this campaign are known to WebPulse. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Mallox Ransomware Mallox is a ransomware group that employs the dreaded double extortion tactic, which means stolen data will likely be sold off or leaked if the victim does not pay the ransom. Recently, Mallox activities have been observed, and post-encryption the ransomware will append a .mallox extension to the encrypted files. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.Cryptlocker!g42 SONAR.SuspLaunch!g18 SONAR.SuspLaunch!g230 SONAR.SuspLaunch!gen4 File-based MSIL.Downloader!gen8 Trojan.Gen.MBT WS.Reputation.1 Machine Learning-based Heur.AdvML.B
Mallox ransomware actively targeting organizations Mallox ransomware has reappeared in the wild and is reported to actively target organizations. Mallox (aka. Fargo) is an updated variant of the TargetCompany ransomware strain and has been first seen on the threat landscape back in 2021. The distribution chain involves a payload loader that has also been observed to download several other malware families such as AgentTesla or Remcos. Mallox will encrypt users' files and append .mallox extension to them. This ransomware variant is also known to employ the double extortion technique by ex-filtrating confidential information from the infected endpoints and threatening the victims with public release of the stolen data. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.Cryptlocker!g42 SONAR.MalTraffic!gen1 SONAR.SuspLaunch!g18 SONAR.SuspLaunch!g230 SONAR.SuspLaunch!g253 SONAR.SuspLaunch!gen4 SONAR.TCP!gen1 File-based Trojan.Gen.2 Downloader MSIL.Downloader!gen7 MSIL.Downloader!gen8 Ransom.Mallox Scr.Malcode!gdn14 Scr.Malcode!gdn32 SMG.Heur!gen Trojan.Gen.NPE WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Network-based System Infected: Trojan.Backdoor Activity 634 Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories
Mallox ransomware continues to be observed in the wild Mallox ransomware (known also as Fargo) is a variant of the TargetCompany ransomware family first seen on the threat landscape back in 2021. While it might not be as prevalent as other ransomware variants, a new set of Mallox samples observed in the wild across October and November proves that this ransomware continues to be used in malicious attacks. Mallox encrypts user files and appends .mallox extension to them. The threat actors behind this ransomware variant are known to employ the double extortion technique by not only encrypting the files but also ex-filtrating confidential information from the infected endpoints. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.SuspLaunch!g230 SONAR.SuspLaunch!g309 SONAR.TCP!gen1 File-based Downloader Ransom.Mallox Trojan Horse Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Heur.AdvML.C Network-based System Infected: Bad Reputation Process Request 4
Malspam Activity Delivering StealC Infostealer Last year, it was reported that various infostealer malware like Vidar, Raccoon and a few others give rise to a new malware dubbed StealC. A recent malspam campaign was observed dropping StealC malware via a malicious PDF file, with a link that would eventually download and execute a JS file, subsequently leading to the extraction of StealC malware onto the compromised machine. Symantec protects you from this threat, identified by the following: File-based ISB.Downloader!gen48 ISB.Downloader!gen89 Scr.Malcode!gen Web.Reputation.1 WS.SecurityRisk.4 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled product
Malspam actors targeting financial industry with Zorex Symantec has recently observed a malspam campaign delivering W32.Zorex infected IMG files targeting various industries, including Banking/Financial, pharmaceuticals, and hospitality. Once executed Zorex attempts to infect XLS, XLSX, and XLSM files on the victims machine. Symantec protects you from these threats, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.SuspBeh!gen633 SONAR.SuspBeh!gen6 File-Based W32.Zorex Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200
Malspam Campaign Delivering DanaBot An Italian language-based malspam campaign was spotted recently delivering DanaBot. The email contains a link to a malicious JS file which will subsequently download and run the DanaBot DLL. DanaBot is a banking trojan designed to steal financial information from its targets. Symantec protects you from this threat, identified by the following: File-based ISB.Downloader!gen60 ISB.Downloader!gen68 Scr.Malcode!gen60 Scr.Malcode!gen120 Trojan.Gen.MBT Web.Reputation.1 WS.Malware.1 WS.SecurityRisk.4 Machine Learning-based Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Malspam campaign dropping Matanbuchus and Qbot Earlier this year, researchers reported on a new Malware-as-a-Service loader in the field named 'Matanbuchus', advertised on an underground forum the malware creator 'BelialDemon' was a member of. Recently, a malspam campaign was observed delivering a macro-enabled XLSB file utilizing Matanbuchus as a way to retrieve the additional Qakbot (Qbot) malware afterwards. This activity will subsequently result in a spambot and Cobalt Strike attack. Symantec protects you from this threat, identified by the following: File-based Downloader.Trojan Trojan Horse Trojan.Gen.MBT Trojan.Gen.NPE Trojan.Mdropper W97M.Downloader Machine learning-based Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories
Malspam campaign pushing DCRat via malicious document A recent malspam campaign aimed at spreading DCRat payload via malicious word documents re-emerged and was spotted by a group of researchers earlier this week. The Dark Crystal RAT (DCRAT) has been around since at least June 2019 and it resurfaced this year around the same month. The operation mostly targets the investment banking industry in Australia. Malware of this type enables remote access and subsequent control over an infected device. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products File-based Heur.AdvML.B Trojan.Gen.MBT Web-based Observed domains are covered under security categories
Malspam campaigns spreading Hancitor malware abuse OneDrive The most recent Hancitor malspam campaigns have seen a slight change of tactics. The attackers started leveraging feedproxy.google[.]com links in the spam instead of previously used docs.google[.]com links. The distributed spam emails purport to originate from the document signing service DocuSign and inform the recipient about incoming invoice for a service. Once clicked upon, the links redirect to malicious Hancitor word documents hosted on OneDrive URLs. Hancitor malware is known to be used to download a variety of payloads to the compromised hosts. Examples of the email subject seen in the latest campaigns: You received invoice from DocuSign Service You got invoice from DocuSign Service You received invoice from DocuSign Electronic Signature Service You got invoice from DocuSign Electronic Signature Service Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.MBT W97M.Downloader Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. Web-based Observed domains/IPs are covered under security categories
Malspam capitalizing on Kaseya to deliver Cobalt Strike Security researchers have reported a new malspam campaign delivering Cobalt Strike (a penetration testing tool commonly utilized by threat actors). The messages have an attached malicious EXE as well as a link to another malicious EXE pretending to be a Microsoft update for the recent Kaseya ransomware attack. Both of these files are Cobalt Strike payloads. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Web-based Observed IPs/Domains are covered under security categories
Malspam grabs RedLine stealer from Discord RedLine Stealer's prevalence has been slowly increasing since it was first discovered in 2020. Used by multiple groups and individuals who conduct constant drive-by-download and malspam campaigns, this threat plagues both the consumer and enterprise markets. In many instances, actors have leveraged this malware to exfiltrate sensitive data from organizations which usually leads to extortion tactics, the data and environment access being sold on underground markets. Recently, there have been reports of a group that attempted to lure victims with malicious emails containing a PDF attachment. If a victim is successfully lured by the URL within the PDF, it will download RedLine's binary hosted on Discord – a popular VoIP and instant messaging social platform. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products File-based Trojan Horse
Malspam: Latin America hit by njRAT and AsyncRAT Latin America has been the target of multiple spam campaigns, which are attempts to deploy njRAT and AsyncRAT onto victims' machines. These remote access trojans aren't new and appear to be commonly used by both individuals and groups around the globe. Symantec can confirm the use of classic malicious (macro-enabled) Office documents and a series of scripts to deploy the RATs used with these campaigns. Symantec protects you from these threats, identified by the following: File-based Backdoor.ASync!gm Backdoor.Ratenjay CL.Downloader!gen10 Downloader Heur.AdvML.B Heur.AdvML.C ISB.Downloader!gen221 ISB.Downloader!gen281 ISB.Downloader!gen348 ISB.Downloader!gen76 ISB.Heuristic!gen5 Trojan.Horse Trojan.Gen.MBT Trojan.Gen.NPE W97M.Downloader Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Malvertising campaign for Webex serving BatLoader A malvertising campaign abusing Google Ads tracking templates is targeting Webex users. If the user clicks on these ads, they will be redirected to websites distributing BatLoader malware as an installer. As the name indicates, this malware is used to load the next step on the attack chain. At the time of checking, the malware downloaded and run is DanaBot, but this can change as the threat actor wishes. DanaBot is a banking trojan that can be used for stealing information, remote connection to the infected system as well as load and run more malware, including ransomware. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Whispergate WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.A!400 Heur.AdvML.A!500 Heur.AdvML.B Heur.AdvML.B!200 Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Malware-as-a-Service (MaaS) campaign targets Android users in India A new campaign distributing malicious APK packages to Android users in India has been discovered in the wild. The spread malware is known to be sold in form of Malware-as-a-Service (MaaS) offering and targets theft of banking information, SMS messages and other confidential information from victims' devices. The attackers have been spreading the malicious .apk packages under the disguise of various apps concerning customer support, online bookings, billing or courier services, among others. Symantec protects you from this threat, identified by the following: Mobile-based Android.Reputation.2 AppRisk:Generisk Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Malware authors dig up math lessons to try and evade sandboxing Security researchers have recently discovered that malware authors have turned to trigonometry to try and determine if the malware package is being run inside. Using some fancy Trigonometry the malware is able to track mouse acceleration in order to determine that it is being run inside of a sandbox based and change it's behavior. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200
Malware campaign distributing MadMxShell backdoor via masquerade websites A new backdoor called MadMxShell has surfaced as part of a malware campaign. The threat actors responsible for the campaign are hosting masquerade websites that impersonate legitimate IP scanner software sites. Employing tactics such as typosquatting and SEO poisoning, they attract users through Google Ads. The backdoor utilizes DNS MX queries for command and control (C2) communication, aiming to evade memory forensics security solutions. The malware provides attackers with unauthorized access to compromised systems, allowing them to execute commands, exfiltrate data, and carry out other malicious activities. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Ps-Rd32!g1 File-based Trojan Horse Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.B!100 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Malware campaign spreading Dridex via XLSB Dridex is a banking Trojan which has been active for almost a decade now. The malware is capable of stealing sensitive information on infected machines. Recently, a malware campaign was observed delivering Dridex via XLSB files. Attackers encrypted the ZIP files upon distribution to possibly bypass email scanning protection. Symantec protects you from this threat, identified by the following: Email-based Protection is in place for Symantec's email security products. Email Threat Isolation (ETI) technology from Symantec provides an extra layer of protection File-based Scr.MalMacro!gen3 Trojan Horse Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B Web-based Observed domains/IPs are covered under security categories
Malware discovered on the website of a major certification authority The official website of a major certificate authority has been compromised. It turns out that the official signature application installer available for download from the public site was backdoored with a Cobalt Strike binary. The malicious installer starts downloading the legitimate version of the installer first so the victim doesn't notice anything unusual. The malware uses steganography to decrypt the Cobalt Strike beacon. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.MBT WS.Malware.1 Network-based Malicious Site: Malicious Domains Request Malicious Site: Malicious Domain Request 59
Malware disguised as known crypto trading bot on the rise Crypto trading bots aren't new but are gaining in popularity after being advertised over and over by influencers on social media. Broadly speaking these bots are programs that automatically execute specific trades based on predefined rules. There are many companies like CryptoHopper who provide trading bot services that can plug into different brokers. Since these bots are touted as money making with no financial skills required, many crypto enthusiasts give them a try and some end up downloading them from unreliable sources. Cybercriminals noticed this trend and Symantec is seeing more and more fake crypto trading bots being delivered via social media, forums, fake websites and Voice over IP platforms such as Discord. Over the last few months, this social engineering has been used to deliver threats like infostealer, remote access trojan and crypto clippers. More recently, Symantec has observed a RedLine Stealer drive-by-download campaign disguised as cracked CryptoHopper. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.2 Trojan.Gen.MBT Trojan Horse Machine Learning-based Heur.AdvML.B Web-based Observed domains are covered under security categories
Malware distribution campaigns by the CyberCartel threat group CyberCartel is a threat group known to be active mostly in Mexico and other Latin American countries since at least 2012. The group relies heavily on miscellaneous malware variants sold as part of malware-as-a-service (Maas) offerings. The latest malicious campaigns attributed to this threat actor have been leveraging malvertising as the main means of malware distribution. The attackers have been deploying malicious payloads with various functionalities such as infostealing, banking data theft, screenshot grabbing, clipboard overwriting, malicious re-directions, traffic interception and others. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE.C WS.Malware.2 Machine Learning-based Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Network-based System Infected: Trojan.Backdoor Activity 676 System Infected: Trojan.Backdoor Activity 704 Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Malware Loaders dropping Android Banking Trojans Loaders are lightweight and benign in nature and can easily be integrated into legitimate applications like QR code scanners, PDF scanners, security tools, fitness apps, and two-factor authenticators. Such harmful applications get listed in the Google Play Store if security checks fail to spot the often tiny piece of malware coding hiding within the app. If a user unknowingly downloads the infected application, installs and launches the software, the loader will establish a connection with the C2 server and an additional Banking Trojan payload will be grabbed from the server. This malware has the capacity to steal credentials for social media, instant messaging, mobile banking, and cryptocurrency apps. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT Trojan.Gen.2 Trojan Horse WS.Malware.1 WS.Malware.2 Mobile-based Android.Reputation.2
Malware MountLocker tries to spread by using Windows API This week researchers have discovered what it is believed a new MountLocker ransomware variant, that contains a new worm feature to spread to and encrypt other devices in the network, through the use of Windows Active Directory Service Interfaces API. This sample is believed to be a customized version created by a new ransomware group, reported this month, called 'XingLocker'. Symantec protects you from this threat, identified by the following: File-based Downloader Trojan.Gen.2 Trojan.Gen.MBT Trojan Horse WS.Malware.1
Malware Seen Hidden in Steam Profile Images An emerging malware, named SteamHide, has been seen hidden in profile images on the Steam Network. The images are not infectious or executable but do host the Downloader code in the image Profile. An external component can then download the data, unpack and execute the code. Hidden malware in a image file metadata has previously been seen, but the use of Steam is new. The same method, using updated images, could be used to download updated code or update links. There is also evidence that the code is actively being worked, so variations of this malware will likely be seen in the future. Symantec protects you from these threats, identified by the following: File-based Heur.AdvML.B Heur.AdvML.C Trojan.Gen.MBT
Mamba Ransomware leverages DiskCryptor encryption software Symantec Security Response is aware of a recent alert issued by the FBI warning of an increase in Mamba / HDDCryptor ransomware activities targeted at governments and various institutions in both public and private sector. According to the report, Mamba ransomware leverages an open source disk encryption software called DiskCryptor in the latest campaigns. As we continue to monitor and enhance our protections against Mamba ransomware variants, we recommend performing regular backups for any important data and ensuring your security products are kept up to date with the latest product definitions. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.B Heur.AdvML.C Ransom.HDDCryptor Trojan.Gen.2 Trojan.Gen.MBT
Mamont Android banking trojan Mamont is a recently identified banking trojan for Android. The malware has been distributed disguised as a Google Chrome installer package. Mamont has the functionality to collect information about the infected device. It can exfiltrate selected messages and intercept new messages, sending them back to attackers' controlled Telegram channel. The malware has the capability to examine the content of the messages as it is focused on those related to any financial or monetary transactions. Symantec protects you from this threat, identified by the following: Mobile-based Android.Reputation.2 AppRisk:Generisk
ManageEngine OpManager path traversal vulnerability CVE-2023-47211 CVE-2023-47211 is a recently disclosed critical path traversal vulnerability, with a CVSS score of 9.1. It impacts the uploadMib feature of ManageEngine OpManager. Successful exploitation of the vulnerability can enable attackers to modify file paths beyond the default installation directory in the MIB Browser tool, potentially leading to arbitrary file creation through carefully crafted HTTP requests. Symantec protects you from this threat, identified by the following: Network-based Web Attack: ManageEngine OpManager Path Traversal CVE-2023-47211 Policy-based Symantec Data Center Security default lockdown policy can protect the underlying servers from this vulnerability by preventing the file creation outside of the default MiBs File's location directory.
ManageEngine RCE vulnerability CVE-2022-47966 exploited in the wild CVE-2022-47966 is an unauthenticated remote code execution (RCE) vulnerability affecting over twenty Zoho ManageEngine products such as ADManager Plus, ADSelfService Plus, ServiceDesk Plus, Password Manager Pro, Remote Access Plus and others. If successfully exploited the RCE vulnerability can allow the remote attackers to execute arbitrary commands on the vulnerable servers. While the vendor has released a series of patches for the affected products, the vulnerability has been reported as being exploited in the wild. Symantec protects you from this threat, identified by the following: Network-based Web Attack: Zoho Manageengine RCE Vulnerability CVE-2022-47966 Policy-based Symantec DCS Hardening policy for Windows provides 0 day protection against threats exploiting CVE-2022-47966. The default sandboxing controls prevent webshells and malware tools from getting installed and prevent arbitrary system command execution from privileged applications. Web-based Observed domains/IPs are covered under security categories
Manic Menagerie 2.0 campaign Manic Menagerie 2.0 is a long-running malicious campaign targeted at web hosting and IT providers across the EU and the United States. While the start of the campaign dates way back to 2020, the most recent activities of the responsible threat group were seen in April 2023 and prove that the campaign remains ongoing. The purpose of the Manic Menagerie 2.0 campaign is to deploy web shells and coin miners onto the compromised servers. The dropped web shells may provide the attackers with a foothold for further exploitation, while the coin miners allow exploiting the compromised servers for monetary gain. The attackers have also been observed to leverage various custom and dual-use tools such as PCHunter, GoIIS, GodPotato, PetitPotam and others. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 SONAR.TCP!gen6 File-based Hacktool.Rotpotato!g1 Linux.Coinminer Trojan Horse Trojan.Coinbitminer Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE Trojan.Malscript WS.Malware.1 Machine Learning-based Heur.AdvML.A Heur.AdvML.B Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Manjusaka attack framework A newly discovered offensive framework named Manjusaka is being used in the wild according to the latest reports. Advertised as an alternative to other toolsets commonly used by threat actors such as Cobalt Strike or Sliver, Manjusaka makes use of Rust-based implants and binaries written in GoLang. The malware implants have various functionalities, including arbitrary command execution, remote control over the infected endpoints, file access, credentials ex-filtration and more. Manjusaka implants come in both Windows and Linux variants that show very similar capabilities. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.SuspInject!g25 SONAR.TCP!gen1 File-based Backdoor.Cobalt!gen9 ISB.Downloader!gen136 Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT W97M.Downloader WS.Malware.1 WS.Malware.2 Network-based System Infected: Trojan.Backdoor Activity 373 Policy-based Symantec Data Center Security (DCS) provides the zero day protection against Manjusaka offensive framework: DCS hardened Linux servers prevent execution of malware from temp or other writable locations. The policy denies writing of the nps.db file onto the disk. DCS hardened policy also prevents all inbound and outbound connections to the C2 servers. DCS hardened policy prevents the implant from reaching an external network and downloading the payloads. Web-based Observed IPs/domains are covered under security categories
Maori ransomware targeting Linux Maori is a Go-based run-of-the-mill ransomware variant targeting the Linux platform. The malware will encrypt user files present in the home directory and append a .maori extension to them. Once the encryption is complete, a ransom note in the form of a “README_MAORI.txt” file will be dropped onto the compromised machine. The ransom note asks the victims to contact the attackers via the Tox messenger for further instructions. Symantec protects you from this threat, identified by the following: File-based Trojan Horse WS.Malware.2
Mars Stealer and R2 phishing combined Cracked versions of Mars Stealer are widespread and new groups and individuals continually gain access to them, contributing to the ongoing threat that persists globally. Recently, an actor has been running various malspam campaigns using the same Mars Stealer binary, seemingly without a specific target audience in mind (i.e. all organizations around the world are potential targets). In most iterations, the emails contain a malicious binary attachment (Document.pif). However in one occurrence, besides having the malware attached to the email, they also attempted to capture users' email credentials with a malicious link leading to a phishing page hosted on CloudFlare R2 (read more about this phishing tactic - Link). Observed email subjects: Purchase Order Number :4123001569 Request for Quotation TRQ-983702]: Your services is expiring soon for [recipient email address] Mailbox Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products File-based Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B Network-based System Infected: Trojan.Backdoor Activity 634 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Mars Stealer malware spread via a fake Atomic wallet website Mars Stealer is a variant of info-stealing malware targeting user credentials, cryptocurrency wallets and 2FA plugins, among others. The malware has been seen recently spread via a fake Atomic wallet website. The website was serving a ZIP archive containing a malicious batch file to anyone wanting to download the Windows version of the crypto wallet. The batch file once executed and through a series of PowerShell commands would lead to the infection with the Mars Stealer payload downloaded from the attacker's Discord server. Symantec protects you from this threat, identified by the following: File-based Trojan Horse WS.Malware.2 Machine Learning-based Heur.AdvML.B Network-based System Infected: Bad Reputation Process Request 4 Web-based Observed domains are covered under security categories
Maseru Infostealer: South African industries and organizations in the line of sight Symantec has recently discovered a spear phishing campaign in which actors have been targeting South African industries and organizations, posing as a well known South African bank. While there is a clear focus on the African region in this attack, some global industries have also been targeted. In this financial social engineering attack, emails contained a redirection to a recently registered domain said to be an algorithmic trading platform that trades cryptocurrencies. This is where the malware (dropper) is being stored — an infostealer which the author appears to have named after the capital of Lesotho, Maseru. Aside from keylogging, the decrypted payload is able to download, upload, update and delete itself, and classes indicate that it is also capable of recording videos from webcams. Indicator of compromise: Subject: BANKING DETAILS HTML file: PaymentConfirmation.pdf.html URL: hxxp://[removed]/pay/proof%20of%20payment.exe Symantec has multiple coverage in place for this threat and attack: File-based Infostealer.Uresam Trojan.Dropper Trojan.Horse Trojan.Gen.2 WS.Malware.2 Heur.AdvML.C Behavior-based SONAR.SuspDrop!gen7 Network-based System Infected: Backdoor.Trojan Activity 406 Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. Website-based This activity is proactively blocked by Symantec Web Isolation technology.
Massloger trojan targets user credentials in a new campaign A new malicious campaign has been discovered that leverages a variant of the Masslogger trojan. The malware is used to steal user data and credentials associated with various applications such as Outlook, Google Chrome and several instant messenger applications. Symantec provides the following detections against this campaign: File-based Downloader Heur.AdvML.B Trojan.Gen.MBT Trojan Horse
MasterFred, Android Overlayer Overlay is one of the most used techniques among mobile banking malware and infostealers. Recently, a new threat dubbed "MasterFred" has been observed in the threat landscape. MasterFred is designed to overlay a victim's phone screen in an attempt to harvest financial credentials and credit card information. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk AppRisk:Generisk
MATA: A new multi-platform malware framework linked to Lazarus APT Attackers linked to the Lazarus APT group (aka Appleworm) have developed a new multi-platform family of malware known as MATA. It includes versions capable of infecting Windows, Linux and macOS operating systems. The malware has a modular construction. The Windows version of the malware consists of a loader, which loads an encrypted payload known as the Orchestrator. The Orchestrator is capable of communicating with the command and control (C&C) server and downloading further plug-in modules. Plug-ins include: A module to run cmd.exe or PowerShell with additional parameters and collect responses to these commands A module to manipulate processes A module to check for a TCP connection with a specific address or range of addresses A module to create a HTTP proxy server A file manipulation module A module to inject DLLs into running processes A module to connect to remote servers Different modules exist for Linux and macOS. The Mac version includes a trojanized application based on open source two-factor authentication (2FA) software. Symantec Protections Hacktool.Mata Hacktool.Mata!g1 Trojan.Gen.MBT Trojan Horse Trojan.Gen.2 OSX.Trojan.Gen
Matanbuchus campaign via malicious XLS Matanbuchus is a loader-as-a-service that has been in the threatscape for a couple of years now and remains active as of today. This threat has mainly been distributed via email, and various attack chains have been observed. It acts as a first-stage infection, designed to download and install other malware on compromised machines. Today, there have been reports of a new campaign in which the threat actor is leveraging malicious XLS files to fetch a JS file that will in turn lead to a malicious DLL. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec's email security products Adaptive-based ACM.Ps-Rd32!g1 File-based Scr.Malcode!gen Trojan.Gen.MBT Trojan.Mdropper Machine Learning-based Heur.AdvML.C
Matrix Ransomware Matrix Ransomware is now targeting small to medium size businesses around the globe. The actors behind this Ransomware have employed vectors such as Email and Exploit kits in the past but have recently moved away from these and turned to RDP as their main attack vector. Symantec protects you from this threat, identified by the following: File-based Downloader Heur.AdvML.B Heur.AdvML.C Packed.Generic.528 Ransom.Matrix Trojan Horse WS.Malware.1 WS.Malware.2 Network-based System Infected: Ransom.Matrix Activity
Maui Ransomware used in targeted attacks against healthcare sector Symantec Security Response is aware of the recent CISA and FBI alert regarding a number of targeted activities observed for the Maui ransomware. This malware strain has been reported to target organizations from the Healthcare and Public Health (HPH) sector since at least May 2021. Maui ransomware is believed to be designed for manual execution by the threat actors with the help of interactions with the malware binaries through the command-line interface. Once the targeted user data is identified by the attackers, the malware encrypts the files using AES 128-bit encryption. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.2 WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.C
MaxOfferDeal variants keep on pestering MacOS users Symantec continues to observe variants of MaxOfferDeal (aka Genieo) in the MacOS landscape. When successfully deployed, MaxOfferDeal will hijack the victim's web browsers and show multiple third-party advertisements as the user surfs the web. It also redirects users' searches to unwanted websites. These are usually distributed via drive-by-download from fake updates and adware installers. Symantec protects you from this threat, identified by the following: File-based OSX.Trojan.Gen OSX.Trojan.Gen.2
Maze ransomware halts its operations The Maze ransomware gang officially announced that they have halted operations. Maze is one of the most notorious ransomware variants, employing a double-extortion tactic in which the malware encrypts files for ransom, and the operators threaten to release the stolen information on the Internet in order to extort money from the victim. While the news is good, don't let your guard down. Plenty of other ransomware will take its place and continue to haunt the cyber world. Symantec detects Maze ransomware as the following: File based Ransom.Maze Ransom.Maze!g1 Ransom.Maze!g2 Ransom.Maze!gm Behavior based SONAR.Ransommaze!g1 Network based 32179 (Attack: Ransom.Gen Activity 23)
Maze Ransomware now using virtual machine technique Functionality new to Maze ransomware has been observed in recent attacks. The new functionality takes a page from the Ragnar Locker ransomware gang whereby the file-encrypting payload is distributed within a virtual machine. The attack makes use of a Windows installer (.msi) file which contains a VirtualBox virtual disk image (.vdi) on which Windows 7 is installed. Symantec protections: File based Trojan Horse Trojan.Maltrec.TS Ransom.Maze Ransom.Maze!gm Behavior based SONAR.Ransommaze!g1 SONAR.Cryptlocker!g61
MCCrash DDoSes private Minecraft servers There you are, finally playing on your private Minecraft server after a long day then suddenly your network starts to lag, and next thing can't do anything at all. That's probably due to a DDoS attack (by MCCrash) against your server. According to recent reports, this threat spread from Windows machines to Linux-based devices then was used by its authors to DDoS private Minecraft servers, with cracked software being the initial vector of infection. Symantec protects you from this threat, identified by the following: File-based SMG.Heur!gen Trojan Horse Trojan.Gen.NPE Machine Learning-based Heur.AdvML.B
MDBotnet malware used for DDoS attacks MDBotnet is a new malware variant offered for sale on underground forums. The malware's main functionality is to carry out HTTP and SYN flood Distributed Denial-of-Service (DDoS) attacks. MDBotnet also comes with an additional "Updater" binary responsible for downloading the most recent versions of the malware from the remote servers controlled by the threat actors. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.2 WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.A Heur.AdvML.C Network-based System Infected: Trojan.Backdoor Activity 634 Web-based Observed domains/IPs are covered under security categories
Medusa $tealer There is no shortage of infostealers in the threat landscape and yet another one has been spotted. Known as Medusa $tealer, this malware has infostealing, denial-of-service (DDoS) and cryptomining capabilities. Actors behind this threat have recently been advertising it on Discord, TikTok and Telegram. As of now, there is limited activity in the wild but we expect to observe drive-by-download campaigns in the near future as groups and individuals try it out. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.2 Trojan Horse Machine Learning-based Heur.AdvML.C
Medusa Android malware spread in recent campaigns leveraging COVID-19 lures According to the latest reports, the Medusa Android malware has been distributed in recent campaigns targeting users from the United States and Canada. Medusa incorporates several features aimed at stealing credentials, sending and receiving SMS messages, accessing storage, camera or microphone on the compromised devices, etc. The malware has been reported to be spread via malicious SMS messages or through fake websites and being delivered to the users as a fake Adobe Flash player update. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk Android.Reputation.2 AppRisk:Generisk
MedusaLocker ransomware exploits RDP vulnerabilities to gain access to networks Symantec Security Response is aware of the recent CISA and FBI alert regarding a number of activities observed for the MedusaLocker ransomware. This malware strain was first discovered in late 2019. According to the released report, the latest activities of this ransomware variant have been observed as recently as May 2022. MedusaLocker is a type of Ransomware-as-a-Service (RaaS) malware and is known to exploit vulnerabilities in Remote Desktop Protocol (RDP) to access targeted networks. MedusaLocker incorporates processes to delete backups and recovery options and has functionality that enables discovery of network connected systems via Internet Control Message Protocol (ICMP) sweeps. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.SuspBeh!gen54 SONAR.SuspDrop!gen7 File-based Downloader Ransom.Cryptolocker Ransom.Locky!g35 Ransom.MedusaLocker Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.C Network-based Attack: Ransom.Gen Activity 56 Web-based Observed IPs/domains are covered under security categories
MedusaLocker ransomware still active in the wild MedusaLocker is a ransomware variant first discovered in late 2019 that shows certain connections to another ransomware strain known as GlobeImposter. MedusaLocker a type of Ransomware-as-a-Service (RaaS) malware and is known to exploit vulnerabilities in Remote Desktop Protocol (RDP) to access targeted networks. Just last month Health Sector Cybersecurity Coordination Center (HC3) released an advisory warning about potential attacks from MedusaLocker affiliated threat actors and targeted at the healthcare sector. MedusaLocker appends various extensions to the encrypted files. Some examples of extensions used by most recently discovered variants of this ransomware include: .allock, .filesencrypted, .lockfiles, .marnet2, .onelock and .skynetwork8. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.SuspLaunch!g18 SONAR.UACBypass!gen30 File-based Downloader Ransom.Cryptolocker Ransom.Globeimposter Ransom.Locky!g35 Ransom.MedusaLocker WS.Malware.1 WS.SecurityRisk.4 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Network-based Attack: Ransom.Gen Activity 56
MedusaLocker shows spikes of activity in recent months Symantec is continuously monitoring developments across various ransomware families in the wild. During the last few months we have noticed several spikes of activity for one of the less propagated family known as MedusaLocker. This ransomware variant has been first discovered in late 2019. Some malware characteristics include: Multiple stages of infection including powershell injection mechanisms Ability to encrypt mapped network drives Discovery of network connected systems via ICMP sweeps Incorporates processes to delete backups and recovery options Symantec provides the following protection against this threat: File-based Downloader Heur.AdvML.B Ransom.Cryptolocker Trojan.Gen.2 Trojan.Gen.MBT Trojan Horse Behavior-based SONAR.Ransom!gen35 SONAR.SuspBeh!gen54 SONAR.SuspDataRun Network-based Attack: Ransom.Gen Activity 23 Attack: Ransom.Gen Activity 29 Website-based This attack is proactively blocked by Symantec Web Isolation technology
Medusa Ransomware Medusa ransomware operates as a ransomware-as-a-service (RaaS), with attackers exploiting known vulnerabilities and account compromises in the initial stages. Upon infection, Medusa encrypts user files, adding the .medusa extension, and excluding certain file types like .dll and .exe from encryption. The ransom note, titled '!!read_me_medusa!!.txt,' directs victims to contact the attackers for decryption instructions. The malware has functionality that can halt specific processes, eliminate volume shadow copies, and self-delete after completing the encryption process. Symantec protects you from this threat, identified by the following: Behavior-based ACM.Ps-Net!g1 ACM.Untrst-RunSys!g1 SONAR.Ransomware!g7 SONAR.Ransomware!g12 SONAR.RansomGen!gen3 File-based Ransom.Gen Ransom.Medusa Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A Heur.AdvML.A!500 Heur.AdvML.C
Meet Epsilon Ransomware The term "Epsilon" has various meanings depending on the context, including a small quantity or an empty string, but there is nothing small or empty about the Epsilon ransomware that Symantec Security Response recently came across. We identified several samples of Epsilon ransomware across at least 6 different countries. Files encrypted by Epsilon will have a ".boom" file extension. After files are encrypted, the user is instructed to contact an address hosted by a free encrypted email service in order to decrypt the affected files. The attacker, as with many other cyber criminals, is willing to decrypt two files for free as proof that the encrypted files can be recovered. Symantec provides the following protection against Epsilon ransomware: File-based Ransom.HiddenTear!g1 Trojan.Gen.MBT
Megazord Ransomware Megazord ransomware is a Rust-based malware that targets healthcare, education, and government entities. The initial attack vector includes spear-phishing emails as well as exploiting vulnerable services. Tools such as RDP and advanced IP scanners are used for lateral movement. Once compromised, Megazord terminates multiple processes and services, and encrypts local volumes and files. The encrypted files are appended with the “POWERRANGES” extension, and a ransom note, "powerranges.txt" is dropped in each folder containing encrypted files. Victims are instructed to contact the threat actor via the TOX messenger with reference to a unique Telegram channel link provided in the ransom note. Megazord shares multiple code similarities with Akira and is believed to be related to the Akira ransomware. Symantec protects you from this threat, identified by the following: File-based Ransom.Akira!g2 Trojan.Gen.MBT W97M.Downloader WS.Malware.1 Machine learning-based Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200
Mekotio banking malware targets Italy in the latest malspam campaign Mekotio is a banking malware known for several years for targeting predominantly the Latin America region. According to latest reports, the most recent distribution campaign of this malware targets users in Italy instead. The victims will receive malspam posing as false tax receipts. Those emails contain links directing to compressed msi files, which in turn lead to a download of vbs and dll files initiating the infection. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.2 Trojan.Malmsi W97M.Downloader Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. Web-based Observed domains are covered under security categories
Menorah, new malware attributed to Crambus (APT34) The advanced persistent threat (APT) group Crambus (aka OilRig, APT34) is a covert cyberespionage group mainly focused in the Middle East, collecting sensitive intelligence by employing spear phishing campaigns. A new malware has been attributed to this group, named Menorah. The malware is being distributed through a malicious office document in charge of downloading the malware and creating a scheduled task to run it in the background. Menorah can be considered a backdoor with capabilities to gather system information, download and upload files to the system and execute shell commands. Symantec protects you from this threat, identified by the following: File-based Backdoor.Ratenjay W97M.Downloader WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.A!400 Heur.AdvML.A!500 Heur.AdvML.B Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Meow Ransomware Meow Ransomware was first reported back in 2022, crafted out of the Conti ransomware source code that was leaked in the same year. Threat actors behind the ransomware made a come back this year after a couple months of silence and were already reported to have a total of nine victims to date. The ransomware encrypts various type of files and adds .MEOW as its file extension. Attackers prefer victims to communicate via email or Telegram at addresses and handles mentioned in the ransom note named "readme.txt". Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Untrst-RunSys!g1 Behavior-based SONAR.RansomPlay!gen1 File-based Downloader Ransom.Conti!gen4 Ransom.Conti!gen10 Ransom.Conti!gen12 Ransom.Generic.1 WS.SecurityRisk.4 Machine Learning-based Heur,AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200
Mercari smishing campaign hits Japan SMS phishing (aka Smishing) is a technique that's still widely used by threat actors to lure mobile victims onto phishing websites in order to steal their credentials, but also to websites hosting malicious android applications. Recently, Symantec has observed an ongoing smishing campaign targeting Japanese mobile users in an attempt to steal their Mercari credentials. Mercari is a well-known and popular Japanese e-commerce company that provides marketplace services via their mobile application. In this campaign, actors are sending out SMS informing potential victims that their Mercari account has been temporarily frozen, along with a URL. The URL leads to a phishing page identical to Mercari's login page. Indicators of compromise: SMS: メルカリをご利用ありがとうございます。メルカリの口座を一時凍結します。詳細はアクセス: [Malicious URL] URLs' format: hxxps://mercari[.][5 random letters][.]com/ Symantec protects you from this threat, identified by the following: Mobile-based Symantec Endpoint Protection Mobile is able to also analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake Mercari domains used in this campaign are known to WebPulse.
Merdoor backdoor leveraged by the Lancefly APT The Lancefly advanced persistent threat (APT) group is using a custom-written backdoor in attacks targeting organizations in South and Southeast Asia, in activity that has been ongoing for several years. Lancefly’s custom malware dubbed Merdoor, is a powerful backdoor that appears to have existed since 2018. Symantec researchers observed it being used in some activity in 2020 and 2021, as well as this more recent campaign, which continued into the first quarter of 2023. The motivation behind both these campaigns is believed to be intelligence gathering. The attackers in this campaign also have access to an updated version of the ZXShell rootkit Read more in our blog: Lancefly: Group Uses Custom Backdoor to Target Orgs in Government, Aviation, Other Sectors Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.TCP!gen1 SONAR.TCP!gen6 File-based Backdoor.Trojan Hacktool Hacktool.Gen Hacktool.Mimikatz PUA.Gen.2 Trojan Horse Trojan.Dropper Trojan.Gen.MBT WS.Malware.2 Machine learning-based Heur.AdvML.A Heur.AdvML.B Heur.AdvML.C Network-based System Infected: Trojan.Backdoor Activity 634 Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories
MesaCorp Ransomware MesaCorp ransomware (Chaos variant) has been seen in Turkey and other countries, targeting single machines and asking for a ransom of 2 XMR which is equivalent to 299 US Dollars at the time of writing. Encrypted files will see themselves appended with a .MesaCorp extension and the ransom note (written in English and Turkish) will be dropped at various locations. The threat will also replace the current wallpaper with the ransom note. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.SuspBeh!gen625 File-based Ransom.HiddenTear!g1 Machine Learning-based Heur.AdvML.B Policy-based Symantec Data Center Security (DCS) default hardening policies provide 0-day protection against MesaCorp ransomware
MeshAgent used in spear phishing campaign by Stonefly APT group A new spear phishing campaign by the Stonefly (aka Andariel) APT group has been reported in the wild. As part of the campaign, MeshAgent was deployed along with the malware payload by exploiting known vulnerabilities in installed software. MeshAgent, like other remote management tools, provides various functionalities for remote control. However, it is commonly exploited by threat actors for malicious purposes. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen6 File-based Hacktool.Mimikatz Scr.Malcode!gdn32 Trojan.Gen.MBT WS.Malware.1 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Mesipinoza deploys MagicSocks during ransomware attack Mespinoza has been shown to deploy various tools during their ransomware campaigns, among these tools is Gasket, which is a backdoor with command and control (C&C) functionality written in Golang. Another utility dubbed MagicSocks, which is used as a standalone tool or with Gasket, is used for creating tunnels and proxies. Finally, before deploying the Mespinoza ransomware the group exfiltrates data that could be potentially sensitive to their targets (sample keywords used; clandestine, fraud, SSN), potentially profiting twice from ransomware victims. Symantec protects you from this threat, identified by the following: File-Based Backdoor.Trojan Ransom.Gen Trojan.Gen.2 Trojan.Gen.MBT Trojan Horse Website-based Observed domains are covered under security categories
Mesmerised Ransomware Mesmerised is a new ransomware variant of the Chaos family that has been observed in the wild. Multiple versions of the ransomware have been observed in circulation. The malware encrypts user data and appends .mesmerised extension to the files. Upon successfully compromising and encrypting files, a ransom note named READ-ME.txt is dropped onto the victim's machine with instructions on ransom payment in Bitcoin or Litecoin to get the decryption tool. The ransom note includes contact details such as an email address and a reference to a uToxID for instant messaging. Notably, the malware can halt various system processes and services and delete volume shadow copies. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.SuspDrop!gen1 File-based Ransom.Zombie Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.A!300 Heur.AdvML.B!100 Heur.AdvML.B!200
Messec Ransomware Messec is another Chaos ransomware variant recently observed in the wild. The malware encrypts user files and appends .messec extension to them. The ransom note is dropped in the form of a "READ_ME.txt" text file where the attackers ask for 100$ ransom payment in Bitcoin for data decryption. Once the files on the compromised machine are encrypted the malware will also change the desktop wallpaper on the system. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.SuspDrop!gen1 File-based Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!200
Metamask's popularity brings a surge in phishing scams Metamask is a popular cryptocurrency wallet and browser extension that allows users to securely store, manage, and interact with Ethereum-based cryptocurrencies and decentralized applications (dApps) directly from their web browser. Over the years, it has become a popular choice among cryptocurrency users and dApp developers. However, as we all know in the cybersecurity space, popularity always attracts unwanted attention. In recent years, Symantec has seen an increase in phishing websites mimicking Metamask in hopes of tricking users into giving away their private keys, seed phrases, or other sensitive information that can be used to steal their cryptocurrency. These phishing campaigns are conducted by groups and individuals around the world and are mostly observed via phishing emails and smishing (SMS phishing). Below are some examples of the subject lines observed in recent phishing email attempts: MetaMask Quick Identity Verification [Important Notice] Request to confirm use of MetaMask MetaMask Privacy Policy Update: 21/02/2023 This email is a service from MetaMask MetaMask(メタマスク) クイック本人確認 【重要なお知らせ】MetaMask(メタマスク) ご利用確認のお願い You have a frozen MetaMask wallet Your MetaMask wallet is limited! Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products Mobile-based Symantec Endpoint Protection Mobile is able to also analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. Web-based Observed domains/IPs are covered under security categories
MetaMask cryptocurrency wallet users targeted with a new phish wave MetaMask is a cryptocurrency wallet service that allows it's users to access their Ethereum wallets through a browser or mobile application. Recently, Symantec has observed a new wave of phish runs spoofing MetaMask services with fake verification notifications. The email content provides a deadline and mentions that the "unverified" accounts will be suspended if not verified. It entices the user to click on the URL in order to verify their MetaMask wallet. Email Headers: Subject: Your MetaMask wallet will be suspended From: "MetaMask" <chief@redacted_domain> Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Metasploit Meterpreter observed in attacks targeting vulnerable Redis servers Meterpreter is an advanced Metasploit attack payload leveraged in penetration testing that uses in-memory DLL injection stagers. The tool has been known to be exploited by various threat actors for a long while now. In a recently reported campaign, Meterpreter has been observed being deployed to vulnerable or misconfigured Redis servers. The attackers have also been using a privilege escalation tool called PrintSpoofer. Meterpreter deployment to vulnerable servers is an initial attack step that might lead to deployment of further arbitrary payloads such as cryptominers or ransomware. Symantec protects you from this threat, identified by the following: File-based Meterpreter Packed.Generic.347 Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A Heur.AdvML.A!300 Heur.AdvML.B!100 Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Metasploit used in a cryptocurrency mining campaign Red Team tools have been used for years by the pen-testing industry but also by cybercriminals as part of their attack chain. There have been recent reports of a campaign in which a popular testing framework known as Metasploit and its backdoor (Meterpreter) were used by a group to deploy a cryptocurrency miner. Symantec protects you from these threats, identified by the following: File-based Meterpreter Trojan.Gen.MBT