text
stringlengths 0
383k
|
---|
MetaStealer distributed via malvertising
MetaStealer is an infostealer variant discovered back in 2022. It is known to be delivered via malspam campaigns as well as bundled with pirated software. Recently the malware has been also seen being delivered via means of malvertising. Upon clicking on the ads, the victim gets redirected to malware landing pages masqueraded as download portals for AnyDesk or Notepad++ software. MetaStealer has the functionalities to collect various information from local browsers, steal credentials, cryptowallets, extract data from miscellaneous 3rd party applications and more.
Symantec protects you from this threat, identified by the following:
Behavior-based
ACM.Ps-Rd32!g1
ACM.Rd32-CPE!g1
File-based
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
WS.Reputation.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.A!500
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
MetaStealer malware spread in campaign targeting US asylum seekers
MetaStealer malware has been distributed in a recent campaign targeting US asylum seekers. The campaign is believed to have been initiated via spam emails containing a download link leading to a malicious .zip archive. Upon extracting the archive, the victim is served with a malicious .lnk file masqueraded as a PDF document, initiating the infection chain on the compromised endpoint. While the malware infection happens in the background, a decoy PDF document, mimicking the “I-589, Application for Asylum and for Withholding of Removal” form, is displayed to the victim. MetaStealer malware, executed as a final payload of this campaign, has the functionality to steal confidential information from the infected machines.
Symantec protects you from this threat, identified by the following:
Behavior-based
ACM.Ps-Rd32!g1
ACM.Rd32-CPE!g1
File-based
CL.Downloader!gen241
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.A!400
Heur.AdvML.A!500
Heur.AdvML.B!100
Heur.AdvML.B!200
Network-based
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
MeteorExpress train to nowhere
MeteorExpress has recently surfaced as a file wiping malware that paralyzed the Iranian railway system in early July. It is too soon to identify the associated affiliates that coordinated the attack, but the intention with such malware is to delete files to cause disruption rather than generate revenue.
The malware uses a toolkit of batch files that go through a process to launch wiper:
Check existing anti-virus
Disconnect devices from the network
Add exclusions to Windows Defender
Extract executable files to the system
Clear event logs
Delete specific scheduled tasks
Flush the filesystem cache
Launch the Meteor wiper
Once MeteorExpress is launched to wipe the system, it completes the process with a lock-out to the device's Master Boot Record (MBR) followed by the install of a screen locker. This renders the device unbootable.
Symantec protects you from this threat, identified by the following:
File-based
Heur.AdvML.B
Heur.AdvML.C
Trojan Horse
Trojan.Gen.2
WS.Malware.2 |
Microsoft Exchange vulnerabilities added to SquirrelWaffle's bag of tricks
In recent months, SquirrelWaffle loader has made its presence known in the threat landscape and continues to gain in prevalence via regular malspam campaigns. Actors behind this malware have employed various tricks to spread their malware, one being the use of recent vulnerabilities in Microsoft Exchange such as ProxyLogon and Proxyshell. According to reports, SquirrelWaffle has been leveraging these to piggyback email threads, and spam their malware by replying to these threads. The replies contain malicious URLs redirecting victims to the rest of the attack chain.
Symantec protects you from these threats, identified by the following:
File-based
Trojan.Gen.MBT
Trojan Horse
Trojan.Mdropper
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Network-based
Attack: Microsoft Exchange Server CVE-2021-26855
Web Attack: Microsoft Exchange Server RCE CVE-2021-34473
Web Attack: Microsoft Exchange Server CVE-2021-34473
Web Attack: Microsoft Exchange Server Elevation of Privilege CVE-2021-34523
Policy-based
Symantec Data Center Security default hardening policies for Microsoft Exchange servers and Windows Domain Controllers protect against ProxyLogon and ProxyShell vulnerabilities.
Web-based
Observed domains/IPs are covered under security categories |
Microsoft SharePoint Server CVE-2023-29357 vulnerability under active exploitation
CVE-2023-29357 is a critical (CVSS score 9.8) elevation of privilege (EoP) vulnerability affecting Microsoft SharePoint Server. If successfully exploited the vulnerability allows an unauthenticated remote attacker to gain access by impersonating the authenticated user. If the impersonated user account is an administrator account, the attacker would also gain administrator privileges.
We are aware of reports which indicate an uptick in exploitation of this vulnerability in the wild. Attackers are trying to retrieve user information from SharePoint servers that can then be used to prepare a list of admin users and spoof the administrator's identity. The elevated administrator privilege thus obtained can also be used for further exploitation of the infected network. Symantec's network protection technology, Intrusion Prevention System (IPS) blocks these vulnerability exploitation attempts to prevent further infection/damage to the system.
Symantec protects you from this threat, identified by the following:
Network-based
Attack: Microsoft SharePoint Server Privilege Escalation CVE-2023-29357 |
Middle Eastern industries suspected to have been targeted by Iranian group Tortoiseshell
The Iranian-sponsored cyberespionage group Tortoiseshell (aka Imperial Kitten, Smoke Sandstorm, UNC1549) is targeting Middle Eastern firms in the defense sector with a pair of new backdoors. The threat actors, who have been linked to the Islamic Revolutionary Guard Corps (IGRC), are using political messaging and fake technical jobs to fool employees and compromise systems at companies in Israel, the United Arab Emirates, and other countries in the greater Middle East. According to reports, the campaign executes spear-phishing and watering-hole attacks for credential harvesting and dropping backdoor malware known as MINIBIKE, or its updated variant MINIBUS. The campaign, which dates to at least June 2022 and remains active, uses Microsoft Azure cloud infrastructure for command-and-control and hosting functions.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Ps-Rd32!g1
ACM.Ps-RgPst!g1
File-based
Backdoor.Trojan
Trojan.Coinminer
Trojan.Gen.MBT
Trojan.Gen.NPE
Machine learning-based
Heur.AdvML.A
Heur.AdvML.B
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Middle Eastern oil & gas social engineering activities not so sweet
During October, various industries, organizations and government agencies have been the target of a Lokibot spear phishing campaign impersonating a well-known oil & gas company in the Middle East. The group behind this attack clearly knows that activities related to this particular industry can be a powerful social engineering lure, like nectar to the proverbial bee.
Below are some examples of the type of malicious emails we've observed in this attack:
Email subject: TENDER TITLE: OCTOBER MASSIVE DUALIZATION AND EXPANSION OF SAUDI ARABIA GOVERNMENT OWNED OIL AND GAS COMPANIES.
Email attachment: BID (ITB).zip
The Lokibot malware is able to steal credentials from hundreds of applications including browsers, FTP clients, Email clients, SSH clients and password management software. This malware has been around since 2015 and is one of the most prevalent infostealers observed to date, used by many different groups and individuals.
Symantec has various detections in place for Lokibot:
File-based
Infostealer.Lokibot*
Sonar.Lokibot*
Heur.AdvML.B
WS.Malware.1
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. |
Migo Malware Targeting Redis Servers
A new malware dubbed 'Migo' was reported and said to target Redis servers on Linux hosts by launching weakening techniques in order to disable Redis security features such as set protected-mode, replica-read-only, aof-rewrite-incremental-fsync and rdb-save-incremental-fsync. Migo is a Golang-based ELF malware designed to execute a cryptojacking attack on its targets machine.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.NPE
WS.Malware.1
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
MikuBot – sold underground, observed in the field
There aren't any shortage of bots in the threat landscape. On a daily basis Symantec observes botnet infection attempts around the globe and it's not uncommon for new bots to suddenly pop-up on black markets and social media. This protection bulletin introduces yet another run-of-the-mill bot known as MikuBot (named after Hatsune Miku, a Japanese anime character) which is a TinyNuke variant and currently being sold on underground forums and Telegram. It must be noted that this malware also bears the same name as a popular multipurpose bot for Discord. Shortly after the ads started to appear, Symantec observed activities linked to both test trials as well as actual cybercrime. As of this writing, drive-by-download is being used as the primary vector of infection by actors behind this bot network. In one of the observed activities, MikuBot has been disguised as Vim - a free and open-source, screen-based text editor program - and hosted on Mega.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.Heur.Dropper
SONAR.SuspBeh!gen609
File-based
Trojan.Tinukebot!gm
Network-based
System Infected: System Process Suspicious Activity 21
System Infected: Trojan.Backdoor Activity 634
Web Attack: Malicious Website Activity 52
Machine Learning-based
Heur.AdvML.B |
Millenium RAT
Millenium RAT (Remote Access Trojan) is a malware variant targeting the Windows platform and allowing the attackers remote control over Telegram. The malware has a wide range of infostealing functionalities including keylogging, screenshot grabbing, in-browser stored data collection (cookies, credentials, banking info, etc), but also remote command execution and download of additional payloads. The attackers leverage Telegram APIs for malware communication and file/data extraction.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
File-based
Trojan Horse
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B!100
Heur.AdvML.B!200 |
Millions of Exim mail servers exposed to remote attacks
A critical vulnerability in the Exim mail transfer agent can allow unauthenticated attackers to gain remote code execution (RCE) on internet-exposed servers.
The vulnerability (CVE-2023-42115) was uncovered back in June 2022 and disclosed through Trend Micro's Zero Day Initiative (ZDI). However, while the flaw was reported to the Exim team in June 2022, and again in May 2023, the developers failed to provide an update on their patch progress. ZDI then made the decision to publish an advisory on the flaw on September 27, 2023.
CVE-2023-42115 exists within the SMTP service, which listens on TCP port 25 by default. The flaw exists due to insufficient validation of user-supplied data, which can result in a write past the end of a buffer.
Symantec protects you from this threat, identified by the following:
Policy-based
Data Center Security (DCS) default sym_unix_protection_sbp policy has a hardened sandbox for the Exim mail server application running on several popular Linux distributions. Multiple layers of policy lockdown controls are enabled by default to protect Exim against remote threats targeting unauthorized code and command execution and tampering of OS critical files and directories. |
Mimic ransomware
Mimic is a new ransomware variant discovered in the wild. The malware abuses APIs of a 3rd party filename search engine utility for Windows known as "Everything". The malware leverages Everything32.dll to query target files on the infected system that are to be encrypted by the malware. Mimic includes various functionalities such as collecting system info, disabling Windows Defender, bypassing UAC, terminating system processes and deleting volume shadow copies, among others. Mimic ransomware utilizes multi-threaded encryption process and appends .quietplace extension to the encrypted files.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C |
Mimic ransomware used in latest campaigns targeting MSSQL servers
A new malicious campaign observed in the wild, named RE#TURGENC, has been leveraging Mimic ransomware to target MSSQL servers. The attackers utilise brute force methods to gain access to targeted servers, executing remote commands with the help of the xp_cmdshell procedure. Various tools such as PowerShell scripts, Cobalt Strike, Mimikatz, PsExec, Advanced Port Scanner and some AnyDesk binaries are employed. The Mimic ransomware payload utilizes APIs from a third-party filename search engine utility, "Everything," to facilitate encryption by querying specific files marked for encryption.
Symantec protects you from this threat, identified by the following:
Behavior-based
ACM.Untrst-RunSys!g1
SONAR.SuspBeh!gen616
SONAR.UACBypass!gen30
File-based
Trojan Horse
Trojan.Gen.MBT
Ransom.Gen
Ransom.Mimic
Ransom.Zombie
Scr.Malcode!gdn32
WS.Malware.1
WS.Reputation.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.A!400
Heur.AdvML.A!500
Heur.AdvML.B!100
Heur.AdvML.B!200
Heur.AdvML.C
Policy-based
Symantec DCS default hardening policy sym_win_hardened_sbp for Microsoft SQL Server has multiple controls to provide 0-day protection against MIMIC ransomware. DCS policy control "Software Install Restrictions" for MS SQL sandbox prevents malware tools and malicious powershell scripts from getting installed on the Microsoft SQL Server.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
Mimo coinminer and Mimus ransomware spread in recent campaigns
Mimo (aka Hezb) malware has been distributed as a final payload of some recent cryptomining campaign. The threat actor behind this malware has also been reported to spread a ransomware variant dubbed Mimus (based on MauriCrypt source code) on other occasions. Historically the Mimo threat actors have been known to leverage various exploits in their campaigns. Some examples of vulnerabilities exploited by them include: Log4Shell vulnerability CVE-2021-44228, Atlassian Confluence vulnerability CVE-2022-26134, WSO2 vulnerability CVE-2022-29464, Papercut vulnerability CVE-2023–27350 and most recently Apache ActiveMQ vulnerability CVE-2023-46604.
Symantec protects you from this threat, identified by the following:
Behavior-based
ACM.Ps-RgPst!g1
ACM.Ps-SvcReg!g1
AGR.Terminate!g2
SONAR.TCP!gen1
File-based
Downloader.Trojan
ISB.Downloader!gen205
Ransom.Crysis
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.NPE
Web.Reputation.1
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Heur.AdvML.C
Network-based
Attack: Apache ActiveMQ RCE CVE-2023-46604
Attack: Log4j2 RCE CVE-2021-44228*
Attack: WSO2 Unrestricted File Upload Vulnerability CVE-2022-29464
Audit: Papercut NG CVE-2023-27350
Web Attack: Atlassian OGNL Injection CVE-2022-26134
Web Attack: Papercut NG CVE-2023-27350 2
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Minas coinminer
Minas is a new variant of cryptocurrency mining malware. Midas employs various detection evasion tactics including encryption, injection mechanisms, random name generation and persistence techniques, among others. The infection chain involves PowerShell script execution that leads to .dll payload extraction and XMRig coinminer launching in memory.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.B |
Minebridge RAT returns in a new malicious campaign
Symantec Security Response has been aware of the released report concerning the resurgence of the Minebridge Remote Access Trojan (RAT) in some recently observed campaigns. Minebridge RAT activities have been linked in the past to the TA505 APT group. Minebridge uses self-extracting archives (SFX) to execute and drop a vulnerable version of Teamviewer application. The dropped application allows the malware to sideload a malicious dll binary and from there perform malicious activities on the compromised system.
Symantec provides the following detections related to this campaign:
File-based
Heur.AdvML.C
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE |
Mint Stealer, actively advertised with a dash of drama
In recent weeks, an actor has been actively advertising an infostealer dubbed Mint Stealer on websites, Telegram, and forums. On the latter however there's been a bit of drama, as the alleged author has posted that someone was trying to portray themselves as a Mint Stealer seller to scam people. It's unconfirmed whether that's actually a scam or if someone really has accessed their source code.
While the advert says it's a lot better than many stealers, it's actually a pretty common example, and Symantec has seen Python and JS versions. Below are some of its theft capabilities:
Computer information
Various game APPs sessions
Discord and Telegram Token/Session
Metamask recovery key and other known cold wallets
Web browsers passwords, cookies, autofills, history and credits cards
Stolen data will be zipped and uploaded to its command-and-control (C2) server, then Mint Stealer will delete the zip archive it created on the victims' machine.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.TCP!gen6
File-based
Infostealer
Trojan Horse
Machine Learning-based
Heur.AdvML.B |
Mirai Botnet variant called Moobot targets Tenda Routers
A recent Mirai variant called Moobot has been observed targeting Tenda routers, according to a recently released report. Moobot has been distributed from a malware hosting domain - Cyberium, that has already been seen spreading the Satori variant in the past. The observed Moobot samples have been attempting to exploit Tenda RCE Vulnerability CVE-2020-10987 with the intent of including the compromised devices into a DDoS botnet.
Symantec protects you from this threat, identified by the following:
File-based
Linux.Mirai
Trojan.Gen.NPE
WS.Malware.1
WS.Malware.2
Network-based
Web Attack: Tenda AC15 AC1900 CVE-2020-10987
Web Attack: Tenda Router RCE CVE-2020-10987
Web-based
Observed domains are covered under security categories |
Mirai malware is targeting the latest IoT vulnerabilities
A new Mirai variant has been reported to target several of the latest IoT vulnerabilities - CVE-2021-27561, CVE-2021-27562 and CVE-2021-22502 among others. Once the vulnerability is exploited on the targeted device, attackers will attempt to execute arbitrary commands or download and spread additional malware strains.
Symantec has the following coverage in place:
File-based
Linux.Mirai
Linux.Mirai!g1
Trojan.Gen.NPE
WS.Malware.1 |
Mirai variant scsihelper
According to a recently released report, Mirai variant dubbed scsihelper has been updated to leverage TLS protocol for communication. Scsihelper has been additionally equipped with anti-VM and anti-analysis checks used to detect virtual and debugging environments. Scsihelper is believed to have been used in limited targeted attacks.
Symantec protects you from this threat, identified by the following:
File-based
Linux.Lightaidra
Linux.Mirai
Trojan.Gen.NPE
Network-based
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains are covered under security categories |
MirrorBlast uses phishing messages to target financial organizations
MirrorBlast is a new attack chain campaign targeting multiple financial service organizations in Canada, Europe, Hong Kong and the United States. The attackers utilize phishing emails with links to malicious Excel files. These files contain malicious macro code that executes the payload and evades detection while sending information to a command and control center server.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
File-based
Threat Artifact
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Malmsi
Trojan.Mdropper
W97M.Downloader
WS.Malware.1
WS.Malware.2
Web-based
Observed domains are covered under security categories |
Misconfigured Docker instances allow for an easy cryptomining target
According to recently published research, cryptojacking remains one of the most common threats targeting misconfigured Docker daemons. Attackers often gain access through open TCP sockets that require no authentication, gain control over the Docker instance and deploy malicious bots, malware binaries such as Kinsing or XMRig coinminers.
Symantec protects you from these threats, identified by the following:
File-based
Downloader
Linux.Backdoor.Kaiten
Linux.Kaiten
Trojan.Gen.NPE
Trojan Horse
WS.Malware.1
WS.Malware.2
Web-based
Observed domains are covered under security categories |
Misha Stealer
Recently there have been reports of yet another stealer known as Misha (also known as Granda Misha), a threat capable of harvesting sensitive information (credentials, autofill, history, etc.) that have been saved in popular web browsers such as Chrome, Firefox, QQ, Vivaldi, Brave, Opera, Yandex, Chromium and Torch Web. It's also able to steal server, port, user and password details of IMAP, POP3, SMTP and HTTP Email Protocols from Outlook. Adding to the list, it can collect information from the below communication services, FTP programs and crypto wallets:
Telegram
Pidgin
Swift
Psi
Gajim
NppFTP
WinSCP
Psi++
CoreFTP
FileZilla
Trillian
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
File-based
Trojan.Horse
Infostealer
Machine Learning-based
Heur.AdvML.B |
Mispadu banking trojan targets LATAM countries
Mispadu (aka Ursa) is a banking trojan initially discovered back in 2019 and known to target users from Latin America. According to a recent report, a new campaign leveraging Mispadu started around August 2022 and is still ongoing. The campaign attempts theft of banking credentials but also credentials stored in Outlook and Chrome applications are targeted. The malware is spread mostly through malspam emails or malvertising. The attackers are also known to compromise known legitimate websites and use them for malware distribution.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.SuspLoad!gen2
SONAR.SuspPE!gen32
File-based
Trojan.Malscript
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C |
Mispadu Stealer
Mispadu, an infostealer variant first identified in 2019, is known to be distributed in multi-staged attacks. More recently, the latest variant of this malware has been used in campaigns targeting the LATAM region, particularly Mexico. Mispadu aims to steal financial information from a range of institutions, exchanges, or businesses aligned with cryptocurrency.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.TCP!gen1
File-based
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Mispadu Stealer extends its reach
Mispadu Stealer (known also as Ursa) has shown some increased activity in recent distribution campaigns. While originally this malware has been mostly targeting LATAM countries, the recently observed activity shows European countries to be targeted this time around as well. The malware delivery chain leverages .pdf documents containing URL links to .zip archive with malicious MSI installers or HTA scripts. Later stages include deployment of malicious VB Scripts and the Mispadu malware payloads.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Ps-Mshta!g1
ACM.Ps-Wscr!g1
File-based
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
WS.SecurityRisk.3
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B!100
Heur.AdvML.B!200
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Mispadu / Ursa spam campaigns
There have been reports of ongoing Mispadu / Ursa campaigns targeting Spanish and Portuguese speakers. Symantec can confirm this and has coverage in place.
File-based
Heur.AdvML.C
Trojan.Gen.NPE
VBS.Downloader.Trojan
W97M.Downloader
Trojan.Gen.MBT
WS.Malware.1
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Website-based
This attack is blocked by Symantec Web Isolation technology. |
MLflow CVE-2023-3765 vulnerability under active exploitation
CVE-2023-3765 is a critical (CVSS score 10.0) path traversal vulnerability affecting MLflow platform. Successful exploitation of the vulnerability allows to list, download, write, and delete files on the system. We are aware of reports which indicate an uptick in exploitation of this vulnerability in the wild. Symantec's network protection technology, Intrusion Prevention System (IPS) blocks these vulnerability exploitation attempts to prevent further infection/damage to the system.
Symantec protects you from this threat, identified by the following:
Network-based
Attack: MLflow Path Traversal Vulnerability CVE-2023-3765 |
MMRat Android malware
MMRat is a newly discovered variant of Android malware leveraged in campaigns targeting users in Southeast Asia. The malware uses custom Protobuf communication protocol for data exfiltration from the compromised devices. MMRat has been spreading through phishing websites masqueraded as official app stores. The malware capabilities incorporate device information collection, keylogging, camera recordings, lock screen pattern capture and data exfiltration, among others. By abuse of the accessibility services the malware allows the attackers to remotely control the device and thus to perform additional malicious activities such as bank fraud for example.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
Android.Malapp
Android.Reputation.2
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
MobiDash activity continues in the mobile threat landscape
The Android threatscape isn't just filled with malware like spyware, banking stealers, SMS fraud, etc. Mobile users are also plagued with all genres of potentially unwanted adware that can be quite pesky and intrusive. MobiDash is one of these, and it's been around for a while now.
MobiDash is an ad display module that can be integrated into other apps rather than being a standalone app. It's known to spread via legitimate apps (mostly games) that have been repackaged with its module and then distributed onto third-party app stores and websites. If a user unknowingly downloads one of these, they'll experience loads of pop-up ads and annoying redirects. Another unwanted side effect is the battery drainage.
Symantec protects you from this threat, identified by the following:
Mobile-based
Android.Reputation.2
AppRisk:Generisk |
MobiHok, another Mobile RAT out of the gutter
Back in 2019, some crooks were inspired by SpyNote and created their own Android Remote Access Trojan – MobiHok. A year later, it's among the most used Android RATs in the mobile threatscape. Having been cracked and leaked for free all over the Internet makes it a threat one should not ignore.
Main features include:
File, SMS, Calls, Contacts, Location, Account and Camera manager
Download and install other apks
Keylogging
Microphone and screen recording
Multiple groups and individuals have been targeting Android users using MobiHok this year, their main vector being third party markets, fake websites and other social platforms. This year the favorite disguise was COVID-19 related applications such as tracing apps which officials or companies have created to help contain the virus spread.
Symantec Endpoint Protection Mobile has the following protection in place:
AdLibrary:Generisk
Android.Reputation.1
Android.Reputation.2 |
Mobile Ad Fraud Operation - Pareto botnet
Yes, ad fraud is still a thing in the threat landscape, especially on Mobile. Recently, light has been shed on a botnet known as Pareto which consists of almost a million infected Android devices imitating people watching connected TV products. In this advertising fraud operation, reports say this botnet was serving on average 650 million ad requests a day and was first spotted in 2020. Actors behind this botnet have been disguising Pareto as games and utility Android applications in hopes of luring victims and adding them to their botnet.
Symantec protects you from this threat, identified by the following:
Mobile-based
Android.Reputation.2 |
Mobile malware DawDropper spreads banking trojans
DawDropper is a mobile malware dropper distributed under the disguise of various Android apps such as app cleaners, document scanners, QR code readers, etc. The malware abuses Firebase Realtime Database - a legitimate third party cloud hosting service for C&C purposes and also leverages GitHub to host malicious payloads. DawDropper has been reported to spread several variants of banking trojans, such as Octo, Hydra, Ermac and Teabot.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
Android.Reputation.1
Android.Reputation.2
AppRisk:Generisk
Web-based
Observed domains are covered under security categories |
Mobile malware masqueraded as Telegram mod apps spread to Chinese-speaking users
A new campaign delivering mobile malware to Chinese-speaking users has been recently observed in the wild. The malware has been hosted on the Google Play Store and masqueraded as unofficial Telegram mods. The distributed apps have fully-fledged Telegram capabilities and might be hard to tell apart from legitimate apps for an ordinary user. Once installed the malware allows the attackers to steal Telegram messages, user data, contact lists or even clip cryptowallet addresses, among others.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
Android.Malapp
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Mobile malware masqueraded as WhatsApp mod apps spread to Arabic-speaking users
A new campaign delivering mobile malware to Arabic-speaking users, masquerading as WhatsApp mod apps, has been recently observed in the wild. These unofficial WhatsApp mods are mostly distributed through third-party app stores and Telegram channels, in addition to various dubious websites dedicated to WhatsApp modifications.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
AppRisk:Generisk
Android.Reputation.2
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
Mobile malware targeting NTT DOCOMO users in Japan
A new malicious campaign targeting NTT DOCOMO users in Japan has been observed in the wild. The malware has been distributed through fake apps hosted on Google Play Store and disguised as mobile security applications. The malware uses collected user's password to target NTT DOCOMO mobile payment service and to perform payment fraud.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
Android.Reputation.2
AppRisk:Generisk
Web-based
Observed domains/IPs are covered under security categories |
Mobile mingler targeted by PJobRAT
Social engineering related to dating has long been successful and continues to be, even moreso these days due to how dating has evolved along with the advance of technology. The increased use of mobile applications to find and participate in dates has seen the introduction of many malicious dating and instant messaging apps. Recently, Indians have been targeted by a spyware app named "PJobRAT" which poses as a dating application tailored for Indian minglers and marriage seekers.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk |
MobileOrder Android spyware distributed by the Scarlet Mimic APT group
A new wave of malicious activities attributed to the APT known as Scarlet Mimic and targeting the Uyghur community has been observed in the wild. The attackers continue to leverage mobile malware dubbed MobileOrder, which was first discovered back in 2015. According to a recent report, the malware is most likely distributed by various social engineering campaigns using malicious applications disguised as pdf files, documents, pictures or audio data. MobileOrder can steal data stored on the infected devices as well as take photos, initiate calls or manipulate the call logs and SMS messages.
Symantec protects you from this threat, identified by the following:
Mobile-based
Android.Reputation.1
Android.Reputation.2
AppRisk:Generisk
Spyware:MobileSpy
Web-based
Observed domains/IPs are covered under security categories |
Mobile Ransomware – Android users still at risk
While researchers continue to discover and report on Ransomware that affects computers, the Ransomware that targets mobile users tends to get lost in the noise. Many of these are hosted on third party markets, websites and communication platforms such as forums, patiently waiting for unwary Android users to happen by. Along with the myriad other types of malware and cyberthreats that plague us all on a daily basis, Symantec researchers monitor and track these mobile threats just as vigilantly, to ensure that Symantec Endpoint Protection Mobile is well equipped to detect them. Some recently observed variants are detected as:
Trojan:Lockdroid
Trojan:Simplocker
AdLibrary:Generisk
Other:Android.Reputation.1 |
ModernLoader campaigns observed delivering a range of malware
Recent attacks have been observed delivering ModernLoader as the final payload. ModernLoader is a RAT that collects system information and can deploy a variety of modules including cryptocurrency-mining malware. The attacks appear to be targeting Eastern European users via compromised websites and use files disguised as fake Amazon gift cards to deliver the threats.
Symantec protects you from these threats, identified by the following:
File-based
ISB.Downloader!gen281
ISB.Heuristic!gen5
Trojan Horse
Trojan.Dropper!g6
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE.C
Trojan.Whispergate |
Modified Specter Botnet C2 domains
Specter Botnet was first discovered back in September 2020. The botnet is a Remote Access Trojan (RAT) for Linux platform.
Recently, it was observed that they have modified their C2 domain configuration file and seen taking advantage of top-level domains 'api[.]github[.]com' and 'www[.]ibm[.]com'. No hacking or misconfiguration took place, it was just attackers were able to exploit a flaw in the ClouDNS service.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.NPE
Trojan Horse
Linux.Mirai
Web-based
Observed domains/IPs are covered under security categories |
ModiLoader campaign in Eastern Europe
ModiLoader continues to be an active threat in the cybersecurity landscape, primarily distributed worldwide through malicious emails. In a recent example, Symantec identified a campaign targeting companies, both local and international, in Hungary, Croatia, Russia, Macedonia, Slovenia, Bosnia and Herzegovina. The perpetrators pose as a Telecom company in Sarajevo and employ the classic "order" social engineering tactic. If a user is successfully lured into opening the attached archive (U prilogu je potvrda narudzbe.zip) and subsequently executes the binary within (U prilogu je potvrda narudzbe.exe), it will trigger the execution of ModiLoader.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
Behavior-based
AGR.Terminate!g5
SONAR.SuspBeh!gen24
SONAR.SuspBeh!gen526
SONAR.SuspBeh!gen530
File-based
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B |
ModiLoader uptick observed
There have been reports of increased ModiLoader activity over the past 30 days, during which time it has been seen loading the Remcos RAT. This loader is being distributed via malicious emails and the malware operators have been using run-of-the-mill quotes, banking transfer and bill social engineering tactics to lure victims. Below are some email subjects Symantec has observed being used against multiple industries:
Proformafaktura
Trade Inquiry from Saudi Arabia
RFQ: TRANS ANATOLIAN NATURAL GAS PIPELINE (TANAP) - PHASE 1(Package 2).
APS-192: OUR Invoice SE21037 in Euro
ORDER # 691593 / YOUR PO# /#SHIPMENT 358262 / CUSTOMER
[Removed] CARGO DELIVERY
Aviso de pago de 03.11.2020
URGENT!!! 2 x 20ft - SHIPPING DOC BL,SI,INV#462345 // [removed] KLEVEN V.949E
Symantec is closely monitoring this threat and has the following protections in place:
File-based
Trojan.Gen.MBT
Trojan.Gen.NPE
Trojan Horse
Trojan.Gen.2
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. |
Moisha .NET-based ransomware
Moisha is a new .NET-based ransomware variant. First seen mid-August, the malware employs double-extortion scheme during the attack by both encrypting and ex-filtrating the data. Moisha has the capabilities to stop certain system services as well as kill processes of specific applications running on the targeted hosts. The malware does not append any extensions to the encrypted files and the ransom note is dropped as a text file named "!!!READ TO RECOVER YOUR DATA!!!.txt".
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.B |
Molerats (aka Katydid) activities in the Middle East continue
The group known as Molerats (also known as Katydid) continue their cyber espionage activities in the Middle East. In their latest spearphishing campaign they utilized malware dubbed LastConn.
Symantec protects you from this threat, identified by the following:
File-based
Heur.AdvML.B
Heur.AdvML.C
Trojan.Gen.MBT
Trojan.Horse
WS.Malware.1
WS.Malware.2 |
MoneyBird Ransomware (aka Agrius)
Recently new Agrius activities have been reported where they've used a new Ransomware and taken the alias of MoneyBird. Active since 2021, the group has been associated with various ransomware and wiper attacks in the Middle East such as Israel. Additionally, Agrius has a history of stealing data from their victims and leaking it online. While they use a new ransomware, their modus operandi is fairly similar to previous campaigns – targeting vulnerable web servers for initial access.
Symantec protects you from this threat, identified by the following:
File-based
Ransom.MoneyBird
Trojan.Gen.MBT |
Money Message - new ransomware variant targeting Windows and Linux-based systems
A new ransomware dubbed Money Message has been discovered in the wild. While initially only the Windows-based variant was reported, Symantec's Threat Hunter Team has also found a Linux ESXi version of this ransomware family. Money Message uses ChaCha20/ECDH algorithm to encrypt the files. Once the encryption is complete, a ransom note text file named money_message.log is dropped onto the infected endpoint. The malware variant targeting Linux-based systems appears to still be in development, but it also has the functionality to encrypt files. The attackers behind this ransomware are running a public extortion site and they also claim to have exfiltrated data from victims before encryption.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.SuspLaunch!g18
SONAR.SuspLaunch!gen4
SONAR.TCP!gen1
File-based
Downloader
Ransom.MoneyMess
Trojan Horse
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C |
MonikerLink vulnerability in MS Outlook - CVE-2024-21413
CVE-2024-21413, known as the MonikerLink bug, is a recently disclosed critical vulnerability affecting various Microsoft Outlook products. Successful exploitation of the vulnerability could allow unauthenticated attackers to bypass the Office Protected View security feature, leading to exposure of local NTLM credentials and allowing for remote code execution (RCE). The vulnerability has been reported to be exploited in the wild as a zero-day bug before the release of a patch by the vendor as part of February Patch Tuesday updates.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec's email security products
Network-based
Attack: Microsoft Outlook RCE CVE-2024-21413
Policy-based
Symantec Data Center Security default policies harden MS Office applications.
DCS prevents MS Office applications from launching command interpreters including cmd.exe, powershell.exe and others as child processes.
DCS default policies will stop any SMB connections.
DCS default policies will also stop from any malware to be dropped or executed in the system. |
Monkeypox to phish Microsoft credentials
Cybercriminals tend to jump on world news to fuel their phishing and malware campaigns – particularly world events that produce fear and curiosity will always be a powerful social engineering tactic. Monkeypox cases have been observed in many countries and echoed across world news, and there have also been reports of actors leveraging it as a social engineering lure in order to phish Microsoft credentials via malspam.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
Web-based
Observed domains/IPs are covered under security categories |
Monti ransomware for Linux
Monti is a ransomware variant based on the leaked source code of the infamous Conti ransomware. The malware targets the Linux systems and appends .puuuk extension to the encrypted files. The threat actors behind this ransomware variant operate a tor-based data leak website. Upon encryption of the files the ransomware drops a ransom note in form of README.txt file and additionally another file called result.txt with the count and a total size of encrypted files.
Symantec protects you from this threat, identified by the following:
File-based
Ransom.Conti
Trojan.Gen.NPE
WS.Malware.1 |
Moobot and Shellbot attack on exploitable servers
Moobot is known malware that turns networked devices running Linux into remotely controlled bots. ShellBot (aka PerlBot) is another type of botnet developed in Perl, known to target Internet of Things (IoT) devices and Linux servers.
For the past few months both these Linux malware were reported once again to be back in action as threat actors were observed leveraging two known RCE vulnerabilities (CVE-2021-35394 (Realtek Jungle SDK Remote Code Execution Vulnerability) and CVE-2022-46169 (Cacti Command Injection Vulnerability)) in order to continue the spread of Moobot and Shellbot. If exploit attempts are successful, compromised machines will be controlled via its C2 server from where further attacks can be deployed.
Symantec protects you from this threat, identified by the following:
File-based
IRC.Backdoor.Trojan
Linux.Mirai
Linux.Mirai!g2
Trojan.Gen.NPE
WS.Malware.1
WS.Malware.2
Network-based
Web Attack: Realtek Jungle SDK RCE CVE-2021-35394
Attack: Cacti Unauthenticated Command Injection Vulnerability CVE-2022-46169
Web-based
Observed domains/IPs are covered under security categories |
More Aliens in the mobile threatscape
Since 2020, Symantec has observed more and more Alien Android malware activities. This threat is among the most prevalent in the current mobile threat landscape and is believed to be a variant of the infamous Cerberus. Capable of stealing credentials of multiple different mobile apps, with many of them being bank and financial applications, it is also able to:
Collect information like usual spyware
Elevate privileges
Install and start applications
Steal 2FA codes that authenticator apps generate
Lock screen
Symantec protects you from this threat, identified by the following:
Mobile-based
Android.Reputation.1
AdLibrary:Generisk |
More Amadey disguised as cracked software and KMS hacktools
Amadey is a simple bot that has been used by multiple groups and individuals since at least late 2018. Over the years its prevalence has fluctuated but as of today activity is still being observed. Amadey's goal is to collect basic information from the compromised machine and download additional payloads. Infection vectors have varied but lately it's mostly distributed via drive-by-download while posing as cracked software and Key Management Service (KMS) hacktools such as KMSAuto and KMSpico.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.2
Trojan Horse
Machine Learning-based
Heur.AdvML.B |
More and more phishers use Telegram API
In recent months, there has been a surge in the abuse of Telegram's API call (via bots) by phishers worldwide. They use this method to steal information and transmit it to their Telegram channels or private chats. The anonymous nature of Telegram's channels and groups poses challenges for law enforcement agencies trying to locate the culprits, and the end-to-end encryption guarantees the security of messages sent via the platform. Additionally, the ease of use of the Telegram API makes it an attractive option for attackers to collect stolen data. Among these type of phishing campaigns, the Microsoft Office 365 login page is one of the most mimicked.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products |
More Android banking malware observed in India
Over the past few weeks, more Android banking malware targeting Indian's mobile users have been observed posing as Android apps of well-known banks such as SBI, Axis and HDFC. The banking malware are similar to Drinik's earlier versions, generating phishing pages of the targeted bank and steal SMS messages to intercept two-factor authentication (2FA). Actors behind these campaigns are luring victims to fake websites where the malicious apps are hosted.
Symantec protects you from this threat, identified by the following:
Mobile-based
AppRisk:Generisk
Web-based
Observed domains/IPs are covered under security categories |
More Android banking malware posing as SBI reward app observed in India
65% of India's population reside in rural areas. Most known name banks in India are expanding and having a large number of rural branches. Mobile banking is gaining popularity among the rural population in India due to ease of conducting financial transactions. However, with the rise of mobile banking this rural population is now becoming the main target of banking frauds.
Over the past few weeks, more Android banking malware targeting India's mobile users have been observed masquerading as a banking rewards application for well-known banks such as SBI. Actors may use various techniques like Smishing/Vishing/Phishing to lure victims into installing the Android malware disguised as a banking rewards app. Once installed the malware allows the attacker to steal SMS messages and intercept two-factor authentication (2FA) which can be exploited to gain access to sensitive information, such as email accounts and other forms of personal information which can further lead to potential financial loss.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
AppRisk:Generisk
Symantec Endpoint Protection Mobile is able to analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake domains used in this campaign are known to WebPulse. |
More cryptocurrency miners observed on MacOS
Cryptocurrency is hardly new but its popularity continues to gain as it opens up more to the world. Even over the last few months it's been getting easier and easier to access and day by day new investors join hoping to get a slice of the pie. Some of these investors try to mine their own cryptocurrency coins themselves or via various services.
Cryptocurrency miners are predominantly seen on the Windows and Linux operating systems, but Symantec is starting to observe more and more which are specifically tuned for the MacOS environment. While these coinminers are mostly legitimate, potential misuse of the associated software has been flagged over the years, and Symantec has had long standing detections in place for it.
Symantec protects you from these threats, identified by the following:
File-based
OSX.Coinminer
OSX.Coinminer!gen1
OSX.Trojan.Gen
OSX.Trojan.Gen.2 |
More CSPs targeted by cryptocurrency campaigns
The Linux threat landscape is packed with cryptocurrency miners and actors continue to find ways to deploy them. Targeting Cloud Service Providers (CSPs) is very common and there have been recent reports of a campaign in which actors have been targeting the Huawei Cloud in order to deploy their miner.
Symantec protects you from this threat, identified by the following:
File-based
Downloader
Trojan.Gen.NPE
Trojan.Horse |
More DarkGate PDF Activity
DarkGate is a Remote Access Trojan (RAT) that has been making its rounds since 2018. This Malware-as-a-Service (MaaS) type of malware evolved rapidly and just last October, we wrote a story about DarkGate incorporating PDF attachments into their campaign as a way to leverage effectiveness on their motives.
Recently, a new Darkgate-related PDF malware campaign has been observed with the following infection chain:
URL > .URL shortcut 1 > .URL shortcut 2 > ZIP > MSI > Sideloading DLL > Autoit3.exe and Autoit script > DarkGate
The complexity of the infection chain shows the lengths the author went to in order to evade detection (currently no vendor other than Symantec shows a detection on Virus Total so they were somewhat successful) but our heuristic engine caught it.
The MSI will drop a legitimate EXE file called ItuneHelper.exe where attackers used a technique called DLL side-loading. This technique combines a legitimate application and a malicious DLL, where in this case the malicious DLL was named "CoreFoundation.dll". It mimics the name of the real DLL component of the EXE file.
During execution, CoreFoundation.dll will extract Autoit3.exe and a malicious file called script.au3 from the file sqlite3.dll. Autoit3.exe is a legitimate EXE file which will run script.au3 to decrypt and load the final payload, a DarkGate binary.
Symantec has 0-day protection against this threat, identified by the following:
File based
Scr.DLHeur!gen7
Email based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. |
More Fake MetaMask Android Apps Circulating, Targeting Users' Wallets
More fake MetaMask Android applications have been observed targeting mobile users' wallet via phishing tactics, all of which are being hosted on malicious domains mimicking MetaMask and leveraging typosquatting techniques. It's most likely that these apps are being spread via malicious SMS.
This growing trend is mainly due to the fact that MetaMask is a widely used cryptocurrency wallet and gateway to decentralized applications (dApps) on the Ethereum blockchain. Its popularity makes it a prime target for attackers seeking to exploit its reputation and user base for financial gains.
While individual consumers are the primary users of MetaMask, there may be cases where certain features or integrations are used by enterprises or businesses for specific purposes, such as managing cryptocurrency assets or interacting with blockchain-based systems. However, the main focus and user base of MetaMask are individual consumers.
Symantec protects you from this threat, identified by the following:
Mobile-based
AppRisk:Generisk
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
More malicious BAT files leveraged in malspam targeting China, Thailand and Kazakhstan
BAT files, due to their simplicity, built-in Windows functionality, concealment potential and scripting capabilities have long been used by malicious actors for various purposes, but primarily as loaders. In recent months, the threat landscape has witnessed an increasing use of this technique with families such as BatLoader and BatCloak.
In a recent example, Symantec observed a malspam campaign in which an actor passed themselves off as a Latvian company that provides batteries for all types of vehicles. The malicious emails contained a .IMG or .7z attachment, within which a malicious BAT file was concealed, masquerading as a PDF (in this case a payment/bank transfer notification). If successfully executed by the victim, this BAT file would act as a loader for Agent Tesla.
While most of the malicious emails targeted organizations in China and Thailand, they also targeted organizations in Kazakhstan. The emails and malicious attachments were written/named in the respective country's language.
Observed email subjects:
新银行支付交易通知
ประกาศการชำระเงินผ่า
ประกาศ?การชำระ?เงินผ่า?นธนาคาร?ที่เข้า?มา
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
Behavior-based
AGR.Terminate!g2
SONAR.BatCloak!gen2
SONAR.SuspLaunch!g84 |
Morse code used in phishing attacks
Crafty cybercriminals have resorted to Morse code to deliver phishing attacks and steal Microsoft Office 365 credentials. The vector has been identified as an email containing an attachment with a double-extension (XLXS & HTML) in order to appear like an Excel invoice. If the victim is successfully tricked into running the HTML file, a script in the file will decode the Morse code string and kick off a chain of events behind the scene which ultimately ends with a popup on the screen asking the victim to submit their Office 365 password. This password is then uploaded to a CnC server controlled by the authors.
Symantec has the following coverage in place:
File-based
Trojan.Horse
Network-based
Malicious Phishing Site: Phishing Suspicious Request
Malicious Phishing Site: Phishing Suspicious Request 2
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. |
MortalKombat - a new Xorist ransomware variant
MortalKombat is a newly discovered Xorist ransomware variant that has been recently spread in distribution campaigns alongside of a Go-based Laplas Clipper malware. The attacks have been focused mostly on individuals and organizations in the United States, UK, Turkey and the Philippines. MortalKombat targets various files on the infected machines including those related to applications, backups or databases. Due to no hard-coded exclusions, the ransomware might also encrypt various system folders and files leading to system corruption. Upon file encryption MortalKombat will drop a ransom note and change the desktop wallpaper on the infected machine.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.SuspBeh!gen93
SONAR.SuspBeh!gen616
SONAR.SuspTempRun
SONAR.SuspTempRun2
File-based
Downloader
Ransom.CryptoTorLocker
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Web-based
Observed domains/IPs are covered under security categories |
Moserpass malware distributed in a latest supply chain attack
According to recent reports, password manager solution Passwordstate had it's product update mechanisms compromised in a supply chain attack. Malicious updates have been reportedly delivered to users between April 20th and April 22nd. The package if installed would deploy malware dubbed Moserpass, that would attempt to collect system information as well as Passwordstate data from the compromised systems.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.MBT
Trojan.Moserbot
Web-based
Observed domains are covered under security categories |
Moses Staff cyberattack against Israeli Defense Ministry
A new Ransomware gang named "Moses Staff" claimed to have successfully breached Israeli Defense Ministry's servers and websites. The group reported that they are now in possession of the State's confidential data such as reports, operational maps, information about soldiers and units, and letters and correspondence. They have threatened to leak more sensitive information to serve as an alert on how Israeli authorities work.
Symantec protects you from this threat, identified by the following:
File-based
Hacktool
Trojan.Gen.NPE
Trojan Horse
Ransom.Gen
WS.Malware.2
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C |
Movable Type API CVE-2021-20837 vulnerability under active exploitation
CVE-2021-20837 is a critical (CVSS score 9.8) command injection vulnerability affecting Movable Type API. If successfully exploited, this vulnerability enables remote code execution. Symantec's network protection technology, Intrusion Prevention System (IPS) has picked up scans based on threat landscape monitoring, which indicate a recent uptick in exploitation of this vulnerability. Though the vulnerability is a couple of years old, attackers are hoping to cash in on delayed patch deployment by organizations.
Symantec protects you from this threat, identified by the following:
Network-based
Attack: MovableType RCE CVE-2021-20837 |
MOVEit Transfer vulnerability (CVE-2023-34362) exploited in the wild
Recently discovered critical SQL injection vulnerability in the MOVEit Transfer software (CVE-2023-34362) has been reported as being exploited in the wild by threat actors. If exploited, the vulnerability might allow attackers with unauthorized access to unpatched systems leading up to compromise and ex-filtration of confidential data. The vulnerability has just recently been added to the "Known Exploited Vulnerabilities Catalog" by CISA following the reports of in the wild exploitation. An additional advisory by CISA attributes the campaign detailed below to the Clop ransomware group.
One of the observed campaigns leveraging MOVEit vulnerability has been deploying LEMURLOOT web shells to the infected targets. The web shells have been masqueraded as "human.aspx" files which are a legitimate component of the MOVEit MFT software. LEMURLOOT has the functionality to steal data from the targeted MOVEit Transfer systems as well as information and credentials for Azure Blob Storage containers.
On July 10th, there has been reports of a critical SQL injection vulnerability in MOVEit Transfer. It is, tracked as CVE-2023-36934, could allow an unauthenticated attacker to gain unauthorized access to the MOVEit Transfer database. The vulnerability exists in the way that MOVEit Transfer processes requests for the "human.aspx" page. By injecting malicious SQL code into the "Username" parameter, an attacker could bypass sanitization checks and execute arbitrary SQL commands on the MOVEit Transfer database.
Read more in our blog: MOVEit Vulnerabilities: What You Need to Know
Symantec protects you from this threat, identified by the following:
File-based
JS.Malscript!g1
Trojan Horse
Trojan.Gen.2
Trojan.Gen.NPE
Trojan.Malscript
Trojan.Webshell
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.C
Network-based
Audit: MOVEit Transfer RCE CVE-2023-35036
Web Attack: MOVEit Transfer RCE CVE-2023-34362
Web Attack: MOVEit Transfer SQL Injection CVE-2023-36934
Policy-based
DCS default hardening policies such as sym_win_hardened_sbp provide 0-day protection for CVE-2023-34362.
DCS policy control "Software Install Restrictions" for MS SQL, MS IIS and other hardened application sandboxes stop CL0P ransomware from exploiting this vulnerability by preventing arbitrary deployment of webshells and unauthorized software.
DCS default hardening policies for Microsoft IIS and Windows Servers protect against known and unknown threats targeting MOVEit vulnerabilities such as CVE-2023-36934.
Web-based
Observed domains/IPs are covered under security categories |
MrAgent tool leveraged by the RansomHouse threat group for ESXi attacks
RansomHouse is a ransomware threat group known to conduct operations targeting Linux instances and VMware ESXi servers with malware variants such as WhiteRabbit or MarioLocker (aka Mario ESXi). This threat actor has recently been leveraging a tool known as MrAgent that allows for an automated ransomware delivery process and simultaneous deployment across multiple hypervisors in large environments. MrAgent has the functionality to schedule and log the malicious binary deployment, retrieve the information about the targeted infrastructure as well as execute commands on the hypervisor.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
File-based
Hacktool
Ransom.Gen
Trojan Horse
Trojan.Gen.NPE
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!400
Heur.AdvML.A!500
Heur.AdvML.C
Policy-based
Data Center Security Intrusion Prevention System (IPS) default policies provide multi-layer zero-day protection against Mario / MrAgent on Windows and Unix systems.
Suspicious Process Execution: Prevention policies prevent this malware from being dropped or executed on the system.
IPS policies will block all C2 connections made by this binary and prevent it from receiving any further instructions. |
MrAnon Stealer
MrAnon is a new infostealing malware identified recently in a phishing campaign delivering malicious PDF files under the disguise of hotel booking queries. The final payload is delivered through .NET executables and malicious PowerShell scripts. MrAnon targets theft of various user data from the compromised machines including: user credentials, data stored in system browsers, data from cryptocurrency extensions and desktop wallets, VPN application data, information from various messenger apps, document files stored on the machines, and others. The extracted data is compressed and uploaded to a public file-sharing service where it can be accessed by the attackers.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.MalTraffic!gen1
SONAR.Stealer!gen1
SONAR.TCP!gen1
Email-based
Coverage is in place for Symantec’s email security products
File-based
Backdoor.Trojan
Infostealer.Limitail
Trojan Horse
Trojan.Pidief
Web.Reputation.1
WS.Malware.1
Network-based
System Infected: Trojan.Backdoor Activity 641
System Infected: Trojan.Backdoor Activity 721
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
MrbMiner malware targets SQL Servers for cryptomining
Symantec Security Response is aware of the ongoing campaigns of the cryptomining trojan dubbed as MrbMiner. Although the malware is reported to mainly target exposed SQL servers, a Linux variant has also been discovered. MrbMiner executables are disguised to resemble certain Microsoft Windows processes or services such as: Windows Security Service.exe, Windows Host Management.exe or Install Windows Host.exe.
Symantec has the following protection in place:
File-based
Hacktool.ProcHack
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
Miner.XMRig |
Muck Stealer
Muck is one among the plethora of run-of-the-mill stealers whose source code is on a well-known software development platform - easily accessible to the public. Symantec is currently observing activities primarily associated with testing. It's still too early to determine the fate this malware will have prevalence-wise, but one thing is certain it will undoubtedly be used in drive-by-download tactics by groups and individuals soon enough.
This threat is mostly used to target Discord tokens, browser data (cookies, passwords, history, bookmarks, autofill, saved credit cards), and crypto wallets. It allows the creator to fetch and transfer stolen information to Discord using Webhooks.
Symantec protects you from this threat, identified by the following:
Behavior-based
ACM.Untrst-RunSys!g1
SONAR.Stealer!gen1
File-based
Infostealer
Trojan.Gen.MBT |
Muggle Stealer malware
A new infostealing malware dubbed Muggle Stealer has been seen making rounds in the wild. The malware is written in the Go programming language and is spread via usual methods also used by other similar infostealing malware variants, such as malicious websites or phishing. The malware gathers system information from the compromised machines, collects screenshots, extracts confidential data stored in browsers including credentials, cookies and others.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Network-based
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Muhstik targets Linux servers with Weblogic and Drupal exploits
We are aware of reports of recent Muhstik botnet activities against cloud infrastructure. Muhstik has been around for a few years now and is known to be used in various cryptocurrency mining or DDoS campaigns. The bot modules also include functionality to compromise home IoT routers. According to the latest reports Muhstik uses multiple exploits against Oracle Weblogic and Drupal in its attempts to propagate to vulnerable Linux servers.
Symantec Protection against Muhstik botnet includes:
File-based
Linux.Kaiten
Linux.Lightaidra
Trojan.Gen.NPE
WS.Malware.1
Network-based
Attack: Oracle Weblogic RCE CVE-2019-2725
Attack: Oracle Weblogic RCE CVE-2019-2725 2
Web Attack: Drupal RCE CVE-2018-7600
Web Attack: Oracle WebLogic RCE CVE-2017-10271
Website-based
This activity is proactively blocked by Symantec Web Isolation technology |
MultiloginBot targets Multilogin users
Mimicking websites of popular apps and services to lure users is a very old social engineering trick and continues to be widely used in today's threat landscape. In a recent example, an actor has created fake Multilogin (a service that companies and individual users can leverage to manage multiple online accounts) websites in order to trick users into downloading an infostealer disguised as a Multilogin installer.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.2 |
Multiple mobile malware variants target banking users in India
A recent wave of attacks leveraging SMS text messages with phishing links has been reported to actively target banking users in India. The attacks distribute various mobile malware families including Elibomi, FakeReward, AxBanker, IcRAT, and IcSpy. The threat actors responsible for the campaigns make use of phishing sites resembling official webpages of several well-known banks in India. The distributed malware payloads are designed to collect and ex-filtrate users' data including banking credentials and credit card information, among others.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
Android.Reputation.2
AppRisk:Generisk
Web-based
Observed domains/IPs are covered under security categories |
Multiple RATs distributed in the “Armor Piercer" campaign
A malicious campaign dubbed "Armor Piercer" has been reported to target government institutions in India. The attackers have been distributing two commodity Remote Access Trojans (RATs) known as NetWire and Ave Maria (also Warzone). The attack chain includes malicious documents spread via malspam that lead to a RAT loaders. The attackers also leverage compromised websites to host the payloads.
Symantec protects you from this threat, identified by the following:
File-based
Heur.AdvML.B
Heur.AdvML.C
Infostealer
ISB.Downloader!gen48
ISB.Downloader!gen80
ISB.Downloader!gen219
Scr.Malcode!gdn30
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
W97M.Downloader
Network-based
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains are covered under security categories |
My Number Card (Individual Number Card) users targeted with a new phish wave
My Number Card also known as the Individual Number Card is a document issued by the municipalities of Japan for identity purpose. It serves as an identity document for citizens of various parts of Japan. Recently, Symantec has observed a new wave of phish runs spoofing MyNumber Card services with typo-squatted phishing URLs. The email content provides a bit of information on Minor Points (MyNa Points) system and entices the users to click on the phishing URL in order to view current points.
Email Subject:【マイナポイント第2弾】20,000円分のポイントプレゼント!
Translated Email Subject:【Minor Points 2nd】20,000 yen worth of points for a giveaway!
Phish URL structure: hxxps://mynumber.card[.]jp.[redacted_domain].com/
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Mystic Stealer
Mystic Stealer is yet another run-of-the-mill infostealer that has been making rounds in the threat landscape, but is far from being as prevalent as other malware in the same family. Occasionally, command-and-control servers have been detected, and the login panel of Mystic Stealer displays two diagonally aligned circles colored in purple and teal. Actors behind recent activities are spreading it via classic drive-by-download tactics. Below are some of its harvesting capabilities:
Computer information (name, user name, guid, etc.)
Web-browsers auto-fill data and history
Cryptocurrency wallet-related data or files from the various APP locations (such as Bitcoin, DashCore, Exodus, Guarda, Electrum, MyMonero, etc.)
Symantec protects you from this threat, identified by the following:
File-based
Infostealer
Suspicious: Reputation
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C |
Mélofée implant family targeting Linux servers
Mélofée is a newly discovered implant family targeting Linux servers. One of the known Mélofée variants has been leveraged to deliver a rootkit based on a modified version of the open source Reptile project. Most recent implant samples exhibit new backdoor functionalities as this malware variant appears to be under continuous development. According to a recent report, infrastructure used by Mélofée attackers shares some common links with other threat groups and usage of a variety of malicious tools such as Winnti, PlugX, Cobalt Strike or HelloBot.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
File-based
Backdoor.Cobalt
Backdoor.Cobalt!gen1
Backdoor.Cobalt!gen7
Backdoor.Cobalt!gm
Trojan Horse
Trojan.Gen.NPE
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Web-based
Observed domains/IPs are covered under security categories |
NajtriStealer
Symantec has recently observed an infostealer known as "NajtriStealer" that has been advertised on Telegram and TikTok. This threat is similar to many other variants that have emerged in that it's not particularly sophisticated and therefore unlikely to reach the level of notoriety of other infostealers.
NajtriStealer has the following capabilities:
Grab user tokens from the following APPs: Discord, Chrome, Opera, Brave and Yandex
Steal cookies, passwords, autofill data and credit card info from web browsers
Steal session info from Telegram Desktop App
Steal Discord Backup Codes
Symantec protects you from this threat, identified by the following:
File-based
Infostealer |
Nanocore delivered via malicious .zipx files
Researchers have recently noted that attackers utilizing the Nanocore RAT malspam campaign have a new obfuscation technique. The attackers are compressing icon binary files with attached extra data in RAR format. Currently only WinRAR and 7-Zip will open these malicious archives while WinZip fails.
Symantec has the following coverage in place:
File-based
Trojan Horse
Trojan.Gen.MBT |
Nanocore persists in the email threat landscape
Nanocore is a remote access trojan that has persisted in the threat landscape even as newer RATs have emerged. Some groups and individuals still find it effective, and Symantec has observed repeated campaigns using this malware. Over the past 25 days, we have seen numerous email campaigns delivering Nanocore and targeting organizations of all sizes around the world. The email subjects used in these campaigns demonstrate that basic social engineering tactics like order, quote, transfer, and payment requests are still being widely employed. Here are some examples:
Amadeus ATC functionality
APPLYING FOR THE POST OF AN ACCOUNTANT
COMMERCIAL INVOICE AND BILL OF LANDING... 28/12/2022
E-enquiry DAROU_ORDER_06122022
E-enquiry JIAXING_ORDER_05122022
ESSENTIAL OIL
Letter of Recommendation
New Order
NEW ORDER 50708, 61062
Orden de compra urgente 05-33062
PAYMENT ACCOUNT STATEMENT / AGVE GROUP
PAYMENT ACCOUNT STATEMENT / FENTEXmedical GmbH
Request For Quote 100000pcs
RETURN PAYMENT TT (Ref 001122022066743)
Returned Payment
Scan Copy_00206122022
SUMMARY OF REMITTANCE TRF1038738
Transfer Confirmation
UPDATE EMAIL NOTIFICATION
UPDATE EMAIL REQUIRED
Urgent order=> KIND REMINDER (urgent)
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.PsDownloader!g1
Email-based
Coverage is in place for Symantec's email security products
File-based
ISB.Downloader!gen285
ISB.Downloader!gen544
Trojan.Gen.MBT
Scr.Malcode!gdn30
Scr.Malcode!gdn34
Machine Learning-based
Heur.AdvML.B |
Napoli Ransomware
Napoli, a variant of Chaos ransomware, has recently been discovered in the wild. The malware encrypts user files, adds the .napoli extension and also changes the desktop wallpaper on the infected endpoints. The attackers drop a ransom noted as a text file called "read_it.txt" and demand payment in Bitcoin. Additionally, the malware comes with functionality to delete the volume shadow copies on the infected machine.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Untrst-RLsass!g1
ACM.Untrst-RunSys!g1
File-based
Ransom.Sorry
WS.Malware.1
Machine Learning-based
Heur.AdvML.B |
NarniaRAT and Fenix Botnet spread in campaigns targeting LATAM
NarniaRAT and Fenix Botnet have been delivered as two separate payloads in a recent operation targeting users from Latin America. The campaign spreads malicious .zip archives masqueraded as legitimate tools. The dropped payloads allow for infostealing, keylogging and data extraction with focus on banking-related data. The malware targets exfiltration of information related to various and well known banking entities operating in Latin American countries.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Ps-Rd32!g1
File-based
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
National Bank of Greece (NBG) users targeted with a new phishing wave
National Bank of Greece (NBG) is one of the largest global banking and financial services organization headquartered in Athens, Greece. Lately, Symantec has observed phish runs that impersonate National Bank of Greece's services and entice users to open fake verification emails. The email body content mentions that there was an unusual funds transfer attempt and thus a security alert has been generated. The user needs to verify the unusual transaction(s) to avoid further restrictions on their account. These phish emails make an attempt to lure users to open and click on phish URLs ready to steal credentials.
Email Subject: I-BANK NBG
Email From: NBG I-BANK <spoofed_email_address>
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Nebulae Backdoor leveraged in malicious campaigns by the NAIKON APT
A new backdoor dubbed as Nebulae has been discovered in malicious campaigns associated with the NAIKON APT group. The reported campaigns also leveraged the Aria-Body loader and RainyDay backdoor. The threat actors focused on data theft and cyber-espionage and have been targeting governmental and military organizations in South Asia.
Symantec protects you from this threat, identified by the following:
File-based
Heur.AdvML.B
Heur.AdvML.C
Trojan.Gen.2
Trojan.Gen.MBT
Trojan Horse
Web-based
Observed domains are covered under security categories |
Necro Python bot has added to its spell book
Security researchers have recently discovered that the Necro Python bot (discovered in January of this year) has been adding functionaility to it's toolkit, including but not limited to the MITRE ATT%CK framework, exploits of more than 10 web apps, as well as some SMB protocol exploits. This malware appears to be multi-platform by targeting both Linux and Windows based systems and has been observed as primarily a vehicle to distrubute XMRig, a JavaScript based Monero miner.
Symantec protects you from this threat, identified by the following:
File-based
Miner.XMRig
Trojan Horse
Trojan.Gen.NPE
Trojan.Gen.MBT
Network-based
URL reputation: Browser navigation to known bad URL
Web Attack: Oracle Weblogic Server RCE CVE-2020-14882
Web Attack: TerraMaster TOS RCE CVE-2020-28188
Web Attack: Malicious Java Payload Upload 7
Web Attack: Malicious Java Payload Upload 9 |
NeedleDropper
NeedleDropper is a new malware variant advertised and sold on hacking forums and leveraged to drop malicious payloads. NeedleDropper comes in a form of a self-extracting (SFX) archive consisting of several binaries and additional configuration files used for malware execution. The NeedleDropper distribution methods vary and might include malspam delivery or direct shares of malicious files via Discord or OneDrive links.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
File-based
Packed.Generic.681
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.2 |
Nefilim Ransomware
Nefilim Ransomware, which shares similarities with Nemty Ransomware, continues to attack companies, encrypting their files and threatening to release stolen data if they don't pay the ransom. The attack chain, which usually starts with RDP attacks, utilizes multiple hacktools and other threats to steal data, communicate with C2s and spread laterally within the victim's environment. Examples of these include Mimikatz, Lazagne, Cobalt Strike, WMI and PsExec.
Symantec protects you from this threat, identified by the following:
File-based
Ransom.Cryptolocker
Trojan.Gen.MBT
Trojan Horse
Trojan.Maltrec.TS
WS.Malware.1
WS.Malware.2 |
Netflix Phishing and Scams Persist
Ever since Netflix streaming became a global hit, there has been an endless wave of phishing and scams targeting users worldwide. Campaigns are observed daily, with most originating from malicious emails while mobile SMS scams are closely following suit.
In recent weeks, Symantec has observed actors spamming malicious SMS to mobile users. These messages attempt to trick users into believing their Netflix account may be canceled, urging them to click on the provided URL to resolve the issue. In another instance, users are lured in with fake payment issues.
Example of observed malicious SMS:
Netflix Payment method on hold. Please confirm your details to avoid account cancellation: hxxps[:]//profilenotice[.]info
NETFLIX Account on hold. Please confirm your details to avoid cancellation: hxxps[:]//profilenotice[.]info
Netflix : Your payment cannot be completed . To keep access to the service please visit hxxps[:]//Netflix-subcription[.]com to update your payment method.
Netflix: Votre compte est temporairement suspendu en raison d'un problème avec votre dernier paiement. Pour mettre à jour votre mode de paiement: hxxps[:]//compteresoudre-netflix[.]com
Symantec protects you from this threat, identified by the following:
Mobile-based
Symantec Endpoint Protection Mobile is able to analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake Netflix domains used in this campaign are known to WebPulse.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
NetSupport Manager RAT
Threat actors altered the real purpose of NetSupport Manager to perform malicious activities and it now executes as a Remote Access Trojan (RAT). Recent reports show the tool was downloaded by users via compromised websites bundled in fake browser updates.
Once a foothold is established within a victim's machine, attackers will gain remote access control, potentially across various networked machines, that eventually allows them to steal sensitive information about its victims and perform a range of malicious activities.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.NPE
WS.Malware.1
WS.Reputation.1
Machine Learning-based
Heur.AdvML.C
Network-based
System Infected: Trojan.Backdoor Activity 670
System Infected: NetSupport RAT Activity
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
NetWalker Ransomware Adopts a RaaS Model
In recently released reports, Netwalker - originally observed in 2019 as Mailto - has shown activity throughout 2020 being leveraged as ransomware-as-a-service (RaaS). Netwalker encrypts sensitive data to hold for large payouts.
The most commonly observed methods used by this threat were phishing emails, with malicious attachments containing VBScript or PowerShell scripts, exploiting exposed/vulnerable RDP services, and executable files.
Symantec protects you from this threat, identified by the following:
File-based
Downloader
Heur.AdvML.B
Packed.Generic.459
Ransom.Cryptolocker
Ransom.Netwalker
Ransom.Netwalker!g3
Ransom.Netwalker!gm
Trojan Horse
Trojan.Gen.MBT |
Netwire disguised as Zoom installer
Netwire is a remote access trojan that's been around for a couple of years now and is still regularly used by groups and individuals around the globe. Nowadays Netwire's malicious activities continue to be primarily conducted via malicious emails and drive-by-download. Over the years, we've seen all kinds of social engineering tactics being used to lure victims from run-of-the-mill quotes, payments, and miscellaneous transactions, to trendy news and services. More recently, Symantec has observed an actor trying to pass off his Netwire binary as a Zoom installer. As many are aware, Zoom is a major video communications service whose user base significantly increased during the COVID-19 pandemic.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Netweird |
Netwire RAT seen used in campaign targeting Pakistan's Government
A threat actor group has been targeting a number of organizations based in Pakistan. The campaign uses spearphishing emails with DOCM document attachments with content related to "National Cyber Security." The documents contains macros that download and run Netwire RAT. Netwire is a publicly available, multi-platform remote administration tool (RAT) that has been used by criminal and APT groups since 2012.
Symantec protects you from this threat, identified by the following:
File-based
Infostealer
Trojan.Gen.NPE
WS.Malware.1
Email-based
Protection is in place for Symantec's email security products. Email Threat Isolation (ETI) technology from Symantec provides an extra layer of protection. |
Neurevt aka Betabot targets Mexican institutions
According to the latest report, Neurevt malware known also as Betabot has been targeting institutions in Mexico in the recent campaigns. The newest variant of Neurevt combines both infostealing as well as backdoor features. Once the targeted system has been compromised, the malware will attempt to capture banking credentials, screenshots and user's confidential information and later exfiltrate the collected data to the pre-defined C2 servers.
Symantec protects you from this threat, identified by the following:
File-based
Heur.AdvML.B
Heur.AdvML.C
SMG.Heur!gen
Trojan Horse
Trojan.BetaBot!g1
Trojan.Gen.2
Trojan.Gen.MBT
Network-based
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains are covered under security categories |
Nevada Ransomware
Yet another ransomware, this one dubbed "Nevada", recently made headlines for targeting VMware ESXi servers worldwide through an old vulnerability. CVE-2021-21974 allows an unauthenticated attacker to execute arbitrary code with elevated privileges on affected systems.
VMware ESXi servers are used to create virtual machines (VMs) and provide a layer of abstraction between physical hardware and virtualized environments, making a ransomware attack highly disruptive. The actors behind this ransomware run both a Windows and Linux version. So far we have been able to confirm protection for Windows. After encryption, files are appended with a .NEVADA extension.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.CryptLocker!g36
SONAR.RansomPlay!gen1
File-based
Downloader
Machine Learning-based
Heur.AdvML.B |
New activity attributed to the BlackFly APT
The Blackfly espionage group (aka APT41, Winnti Group, Bronze Atlas) has continued to mount attacks against targets in Asia and recently targeted two subsidiaries of an Asian conglomerate, both of which operate in the materials and composites sector, suggesting that the group may be attempting to steal intellectual property.
Read more in our blog: Blackfly: Espionage Group Targets Materials Technology
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
SONAR.TCP!gen6
File-based
Backdoor.Winnkit
Hacktool.Mimikatz
Spyware.Gen
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.B
Heur.AdvML.C |
New AdLoad Mac malware variants observed bypassing XProtect
Recent campaigns leveraging AdLoad malware for Mac have been observed bypassing Apple's XProtect security feature. This malware targets macOS and typically attempts to hijack browser search results and inject ads into webpages.
New variants of the malware are relying on file extensions of .service or .system for execution and to establish persistence. The associated campaigns use fake installer applications to drop the malware onto the system. In many cases the fake installers are signed with a valid signature, thereby attempting to legitimize the application.
Symantec protects you from this threat, identified by the following:
File-based
OSX.AdLoad
OSX.Bundlore
OSX.Trojan.Gen
OSX.Trojan.Gen.2 |
New Android malware deployed by the StrongPity APT group
According to a recently released report, the StrongPity (aka Promethium) advanced persistent threat (APT) group is conducting a new campaign that deploys Android malware. This would be the first ever observed occurrence of this APT group distributing malware for the Android platform. The attackers leverage trojanized mobile apps, modified in a way to obtain additional permission on the phone. The malware has ability to collect data stored on the device and exfiltrate it to a pre-configured C&C server.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
Android.Reputation.2
AppRisk:Generisk |
New Android malware variant dubbed 'MaliBot'
MaliBot, a new Android information stealing trojan variant was spotted targeting online banking and cryptocurrency wallets of users from Spain and Italy.
Some of MaliBot’s key characteristics include:
Disguises itself as a cryptocurrency mining app named “Mining X” or “The CryptoApp”, and occasionally assumes some other guises, such as “MySocialSecurity” and “Chrome”
Is focused on stealing financial information, credentials, crypto wallets, and personal data (PII), and also targets financial institutions in Italy and Spain
Is capable of stealing and bypassing multi-factor (2FA/MFA) codes
Includes the ability to remotely control infected devices using a VNC server implementation
Symantec protects you from these threats, identified by the following:
File-based
Trojan.Gen.MBT
Trojan.Gen.2
WS.Malware.1
WS.Malware.2
Mobile-based
Android.Reputation.2
Web-based
Observed IPs/domains are covered under security categories |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.