text
stringlengths
0
383k
MetaStealer distributed via malvertising MetaStealer is an infostealer variant discovered back in 2022. It is known to be delivered via malspam campaigns as well as bundled with pirated software. Recently the malware has been also seen being delivered via means of malvertising. Upon clicking on the ads, the victim gets redirected to malware landing pages masqueraded as download portals for AnyDesk or Notepad++ software. MetaStealer has the functionalities to collect various information from local browsers, steal credentials, cryptowallets, extract data from miscellaneous 3rd party applications and more. Symantec protects you from this threat, identified by the following: Behavior-based ACM.Ps-Rd32!g1 ACM.Rd32-CPE!g1 File-based Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.1 WS.Reputation.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.A!500 Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
MetaStealer malware spread in campaign targeting US asylum seekers MetaStealer malware has been distributed in a recent campaign targeting US asylum seekers. The campaign is believed to have been initiated via spam emails containing a download link leading to a malicious .zip archive. Upon extracting the archive, the victim is served with a malicious .lnk file masqueraded as a PDF document, initiating the infection chain on the compromised endpoint. While the malware infection happens in the background, a decoy PDF document, mimicking the “I-589, Application for Asylum and for Withholding of Removal” form, is displayed to the victim. MetaStealer malware, executed as a final payload of this campaign, has the functionality to steal confidential information from the infected machines. Symantec protects you from this threat, identified by the following: Behavior-based ACM.Ps-Rd32!g1 ACM.Rd32-CPE!g1 File-based CL.Downloader!gen241 Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.A!400 Heur.AdvML.A!500 Heur.AdvML.B!100 Heur.AdvML.B!200 Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
MeteorExpress train to nowhere MeteorExpress has recently surfaced as a file wiping malware that paralyzed the Iranian railway system in early July. It is too soon to identify the associated affiliates that coordinated the attack, but the intention with such malware is to delete files to cause disruption rather than generate revenue. The malware uses a toolkit of batch files that go through a process to launch wiper: Check existing anti-virus Disconnect devices from the network Add exclusions to Windows Defender Extract executable files to the system Clear event logs Delete specific scheduled tasks Flush the filesystem cache Launch the Meteor wiper Once MeteorExpress is launched to wipe the system, it completes the process with a lock-out to the device's Master Boot Record (MBR) followed by the install of a screen locker. This renders the device unbootable. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.B Heur.AdvML.C Trojan Horse Trojan.Gen.2 WS.Malware.2
Microsoft Exchange vulnerabilities added to SquirrelWaffle's bag of tricks In recent months, SquirrelWaffle loader has made its presence known in the threat landscape and continues to gain in prevalence via regular malspam campaigns. Actors behind this malware have employed various tricks to spread their malware, one being the use of recent vulnerabilities in Microsoft Exchange such as ProxyLogon and Proxyshell. According to reports, SquirrelWaffle has been leveraging these to piggyback email threads, and spam their malware by replying to these threads. The replies contain malicious URLs redirecting victims to the rest of the attack chain. Symantec protects you from these threats, identified by the following: File-based Trojan.Gen.MBT Trojan Horse Trojan.Mdropper Machine Learning-based Heur.AdvML.B Heur.AdvML.C Network-based Attack: Microsoft Exchange Server CVE-2021-26855 Web Attack: Microsoft Exchange Server RCE CVE-2021-34473 Web Attack: Microsoft Exchange Server CVE-2021-34473 Web Attack: Microsoft Exchange Server Elevation of Privilege CVE-2021-34523 Policy-based Symantec Data Center Security default hardening policies for Microsoft Exchange servers and Windows Domain Controllers protect against ProxyLogon and ProxyShell vulnerabilities. Web-based Observed domains/IPs are covered under security categories
Microsoft SharePoint Server CVE-2023-29357 vulnerability under active exploitation CVE-2023-29357 is a critical (CVSS score 9.8) elevation of privilege (EoP) vulnerability affecting Microsoft SharePoint Server. If successfully exploited the vulnerability allows an unauthenticated remote attacker to gain access by impersonating the authenticated user. If the impersonated user account is an administrator account, the attacker would also gain administrator privileges. We are aware of reports which indicate an uptick in exploitation of this vulnerability in the wild. Attackers are trying to retrieve user information from SharePoint servers that can then be used to prepare a list of admin users and spoof the administrator's identity. The elevated administrator privilege thus obtained can also be used for further exploitation of the infected network. Symantec's network protection technology, Intrusion Prevention System (IPS) blocks these vulnerability exploitation attempts to prevent further infection/damage to the system. Symantec protects you from this threat, identified by the following: Network-based Attack: Microsoft SharePoint Server Privilege Escalation CVE-2023-29357
Middle Eastern industries suspected to have been targeted by Iranian group Tortoiseshell The Iranian-sponsored cyberespionage group Tortoiseshell (aka Imperial Kitten, Smoke Sandstorm, UNC1549) is targeting Middle Eastern firms in the defense sector with a pair of new backdoors. The threat actors, who have been linked to the Islamic Revolutionary Guard Corps (IGRC), are using political messaging and fake technical jobs to fool employees and compromise systems at companies in Israel, the United Arab Emirates, and other countries in the greater Middle East. According to reports, the campaign executes spear-phishing and watering-hole attacks for credential harvesting and dropping backdoor malware known as MINIBIKE, or its updated variant MINIBUS. The campaign, which dates to at least June 2022 and remains active, uses Microsoft Azure cloud infrastructure for command-and-control and hosting functions. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Ps-Rd32!g1 ACM.Ps-RgPst!g1 File-based Backdoor.Trojan Trojan.Coinminer Trojan.Gen.MBT Trojan.Gen.NPE Machine learning-based Heur.AdvML.A Heur.AdvML.B Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Middle Eastern oil & gas social engineering activities not so sweet During October, various industries, organizations and government agencies have been the target of a Lokibot spear phishing campaign impersonating a well-known oil & gas company in the Middle East. The group behind this attack clearly knows that activities related to this particular industry can be a powerful social engineering lure, like nectar to the proverbial bee. Below are some examples of the type of malicious emails we've observed in this attack: Email subject: TENDER TITLE: OCTOBER MASSIVE DUALIZATION AND EXPANSION OF SAUDI ARABIA GOVERNMENT OWNED OIL AND GAS COMPANIES. Email attachment: BID (ITB).zip The Lokibot malware is able to steal credentials from hundreds of applications including browsers, FTP clients, Email clients, SSH clients and password management software. This malware has been around since 2015 and is one of the most prevalent infostealers observed to date, used by many different groups and individuals. Symantec has various detections in place for Lokibot: File-based Infostealer.Lokibot* Sonar.Lokibot* Heur.AdvML.B WS.Malware.1 Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Migo Malware Targeting Redis Servers A new malware dubbed 'Migo' was reported and said to target Redis servers on Linux hosts by launching weakening techniques in order to disable Redis security features such as set protected-mode, replica-read-only, aof-rewrite-incremental-fsync and rdb-save-incremental-fsync. Migo is a Golang-based ELF malware designed to execute a cryptojacking attack on its targets machine. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.NPE WS.Malware.1 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
MikuBot – sold underground, observed in the field There aren't any shortage of bots in the threat landscape. On a daily basis Symantec observes botnet infection attempts around the globe and it's not uncommon for new bots to suddenly pop-up on black markets and social media. This protection bulletin introduces yet another run-of-the-mill bot known as MikuBot (named after Hatsune Miku, a Japanese anime character) which is a TinyNuke variant and currently being sold on underground forums and Telegram. It must be noted that this malware also bears the same name as a popular multipurpose bot for Discord. Shortly after the ads started to appear, Symantec observed activities linked to both test trials as well as actual cybercrime. As of this writing, drive-by-download is being used as the primary vector of infection by actors behind this bot network. In one of the observed activities, MikuBot has been disguised as Vim - a free and open-source, screen-based text editor program - and hosted on Mega. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.Heur.Dropper SONAR.SuspBeh!gen609 File-based Trojan.Tinukebot!gm Network-based System Infected: System Process Suspicious Activity 21 System Infected: Trojan.Backdoor Activity 634 Web Attack: Malicious Website Activity 52 Machine Learning-based Heur.AdvML.B
Millenium RAT Millenium RAT (Remote Access Trojan) is a malware variant targeting the Windows platform and allowing the attackers remote control over Telegram. The malware has a wide range of infostealing functionalities including keylogging, screenshot grabbing, in-browser stored data collection (cookies, credentials, banking info, etc), but also remote command execution and download of additional payloads. The attackers leverage Telegram APIs for malware communication and file/data extraction. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 File-based Trojan Horse WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B!100 Heur.AdvML.B!200
Millions of Exim mail servers exposed to remote attacks A critical vulnerability in the Exim mail transfer agent can allow unauthenticated attackers to gain remote code execution (RCE) on internet-exposed servers. The vulnerability (CVE-2023-42115) was uncovered back in June 2022 and disclosed through Trend Micro's Zero Day Initiative (ZDI). However, while the flaw was reported to the Exim team in June 2022, and again in May 2023, the developers failed to provide an update on their patch progress. ZDI then made the decision to publish an advisory on the flaw on September 27, 2023. CVE-2023-42115 exists within the SMTP service, which listens on TCP port 25 by default. The flaw exists due to insufficient validation of user-supplied data, which can result in a write past the end of a buffer. Symantec protects you from this threat, identified by the following: Policy-based Data Center Security (DCS) default sym_unix_protection_sbp policy has a hardened sandbox for the Exim mail server application running on several popular Linux distributions. Multiple layers of policy lockdown controls are enabled by default to protect Exim against remote threats targeting unauthorized code and command execution and tampering of OS critical files and directories.
Mimic ransomware Mimic is a new ransomware variant discovered in the wild. The malware abuses APIs of a 3rd party filename search engine utility for Windows known as "Everything". The malware leverages Everything32.dll to query target files on the infected system that are to be encrypted by the malware. Mimic includes various functionalities such as collecting system info, disabling Windows Defender, bypassing UAC, terminating system processes and deleting volume shadow copies, among others. Mimic ransomware utilizes multi-threaded encryption process and appends .quietplace extension to the encrypted files. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.B Heur.AdvML.C
Mimic ransomware used in latest campaigns targeting MSSQL servers A new malicious campaign observed in the wild, named RE#TURGENC, has been leveraging Mimic ransomware to target MSSQL servers. The attackers utilise brute force methods to gain access to targeted servers, executing remote commands with the help of the xp_cmdshell procedure. Various tools such as PowerShell scripts, Cobalt Strike, Mimikatz, PsExec, Advanced Port Scanner and some AnyDesk binaries are employed. The Mimic ransomware payload utilizes APIs from a third-party filename search engine utility, "Everything," to facilitate encryption by querying specific files marked for encryption. Symantec protects you from this threat, identified by the following: Behavior-based ACM.Untrst-RunSys!g1 SONAR.SuspBeh!gen616 SONAR.UACBypass!gen30 File-based Trojan Horse Trojan.Gen.MBT Ransom.Gen Ransom.Mimic Ransom.Zombie Scr.Malcode!gdn32 WS.Malware.1 WS.Reputation.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.A!400 Heur.AdvML.A!500 Heur.AdvML.B!100 Heur.AdvML.B!200 Heur.AdvML.C Policy-based Symantec DCS default hardening policy sym_win_hardened_sbp for Microsoft SQL Server has multiple controls to provide 0-day protection against MIMIC ransomware. DCS policy control "Software Install Restrictions" for MS SQL sandbox prevents malware tools and malicious powershell scripts from getting installed on the Microsoft SQL Server. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Mimo coinminer and Mimus ransomware spread in recent campaigns Mimo (aka Hezb) malware has been distributed as a final payload of some recent cryptomining campaign. The threat actor behind this malware has also been reported to spread a ransomware variant dubbed Mimus (based on MauriCrypt source code) on other occasions. Historically the Mimo threat actors have been known to leverage various exploits in their campaigns. Some examples of vulnerabilities exploited by them include: Log4Shell vulnerability CVE-2021-44228, Atlassian Confluence vulnerability CVE-2022-26134, WSO2 vulnerability CVE-2022-29464, Papercut vulnerability CVE-2023–27350 and most recently Apache ActiveMQ vulnerability CVE-2023-46604. Symantec protects you from this threat, identified by the following: Behavior-based ACM.Ps-RgPst!g1 ACM.Ps-SvcReg!g1 AGR.Terminate!g2 SONAR.TCP!gen1 File-based Downloader.Trojan ISB.Downloader!gen205 Ransom.Crysis Trojan Horse Trojan.Gen.MBT Trojan.Gen.NPE Web.Reputation.1 WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Heur.AdvML.C Network-based Attack: Apache ActiveMQ RCE CVE-2023-46604 Attack: Log4j2 RCE CVE-2021-44228* Attack: WSO2 Unrestricted File Upload Vulnerability CVE-2022-29464 Audit: Papercut NG CVE-2023-27350 Web Attack: Atlassian OGNL Injection CVE-2022-26134 Web Attack: Papercut NG CVE-2023-27350 2 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Minas coinminer Minas is a new variant of cryptocurrency mining malware. Midas employs various detection evasion tactics including encryption, injection mechanisms, random name generation and persistence techniques, among others. The infection chain involves PowerShell script execution that leads to .dll payload extraction and XMRig coinminer launching in memory. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.B
Minebridge RAT returns in a new malicious campaign Symantec Security Response has been aware of the released report concerning the resurgence of the Minebridge Remote Access Trojan (RAT) in some recently observed campaigns. Minebridge RAT activities have been linked in the past to the TA505 APT group. Minebridge uses self-extracting archives (SFX) to execute and drop a vulnerable version of Teamviewer application. The dropped application allows the malware to sideload a malicious dll binary and from there perform malicious activities on the compromised system. Symantec provides the following detections related to this campaign: File-based Heur.AdvML.C Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE
Mint Stealer, actively advertised with a dash of drama In recent weeks, an actor has been actively advertising an infostealer dubbed Mint Stealer on websites, Telegram, and forums. On the latter however there's been a bit of drama, as the alleged author has posted that someone was trying to portray themselves as a Mint Stealer seller to scam people. It's unconfirmed whether that's actually a scam or if someone really has accessed their source code. While the advert says it's a lot better than many stealers, it's actually a pretty common example, and Symantec has seen Python and JS versions. Below are some of its theft capabilities: Computer information Various game APPs sessions Discord and Telegram Token/Session Metamask recovery key and other known cold wallets Web browsers passwords, cookies, autofills, history and credits cards Stolen data will be zipped and uploaded to its command-and-control (C2) server, then Mint Stealer will delete the zip archive it created on the victims' machine. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.TCP!gen6 File-based Infostealer Trojan Horse Machine Learning-based Heur.AdvML.B
Mirai Botnet variant called Moobot targets Tenda Routers A recent Mirai variant called Moobot has been observed targeting Tenda routers, according to a recently released report. Moobot has been distributed from a malware hosting domain - Cyberium, that has already been seen spreading the Satori variant in the past. The observed Moobot samples have been attempting to exploit Tenda RCE Vulnerability CVE-2020-10987 with the intent of including the compromised devices into a DDoS botnet. Symantec protects you from this threat, identified by the following: File-based Linux.Mirai Trojan.Gen.NPE WS.Malware.1 WS.Malware.2 Network-based Web Attack: Tenda AC15 AC1900 CVE-2020-10987 Web Attack: Tenda Router RCE CVE-2020-10987 Web-based Observed domains are covered under security categories
Mirai malware is targeting the latest IoT vulnerabilities A new Mirai variant has been reported to target several of the latest IoT vulnerabilities - CVE-2021-27561, CVE-2021-27562 and CVE-2021-22502 among others. Once the vulnerability is exploited on the targeted device, attackers will attempt to execute arbitrary commands or download and spread additional malware strains. Symantec has the following coverage in place: File-based Linux.Mirai Linux.Mirai!g1 Trojan.Gen.NPE WS.Malware.1
Mirai variant scsihelper According to a recently released report, Mirai variant dubbed scsihelper has been updated to leverage TLS protocol for communication. Scsihelper has been additionally equipped with anti-VM and anti-analysis checks used to detect virtual and debugging environments. Scsihelper is believed to have been used in limited targeted attacks. Symantec protects you from this threat, identified by the following: File-based Linux.Lightaidra Linux.Mirai Trojan.Gen.NPE Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains are covered under security categories
MirrorBlast uses phishing messages to target financial organizations MirrorBlast is a new attack chain campaign targeting multiple financial service organizations in Canada, Europe, Hong Kong and the United States. The attackers utilize phishing emails with links to malicious Excel files. These files contain malicious macro code that executes the payload and evades detection while sending information to a command and control center server. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products File-based Threat Artifact Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Trojan.Malmsi Trojan.Mdropper W97M.Downloader WS.Malware.1 WS.Malware.2 Web-based Observed domains are covered under security categories
Misconfigured Docker instances allow for an easy cryptomining target According to recently published research, cryptojacking remains one of the most common threats targeting misconfigured Docker daemons. Attackers often gain access through open TCP sockets that require no authentication, gain control over the Docker instance and deploy malicious bots, malware binaries such as Kinsing or XMRig coinminers. Symantec protects you from these threats, identified by the following: File-based Downloader Linux.Backdoor.Kaiten Linux.Kaiten Trojan.Gen.NPE Trojan Horse WS.Malware.1 WS.Malware.2 Web-based Observed domains are covered under security categories
Misha Stealer Recently there have been reports of yet another stealer known as Misha (also known as Granda Misha), a threat capable of harvesting sensitive information (credentials, autofill, history, etc.) that have been saved in popular web browsers such as Chrome, Firefox, QQ, Vivaldi, Brave, Opera, Yandex, Chromium and Torch Web. It's also able to steal server, port, user and password details of IMAP, POP3, SMTP and HTTP Email Protocols from Outlook. Adding to the list, it can collect information from the below communication services, FTP programs and crypto wallets: Telegram Pidgin Swift Psi Gajim NppFTP WinSCP Psi++ CoreFTP FileZilla Trillian Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based Trojan.Horse Infostealer Machine Learning-based Heur.AdvML.B
Mispadu banking trojan targets LATAM countries Mispadu (aka Ursa) is a banking trojan initially discovered back in 2019 and known to target users from Latin America. According to a recent report, a new campaign leveraging Mispadu started around August 2022 and is still ongoing. The campaign attempts theft of banking credentials but also credentials stored in Outlook and Chrome applications are targeted. The malware is spread mostly through malspam emails or malvertising. The attackers are also known to compromise known legitimate websites and use them for malware distribution. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.SuspLoad!gen2 SONAR.SuspPE!gen32 File-based Trojan.Malscript Trojan Horse Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.C
Mispadu Stealer Mispadu, an infostealer variant first identified in 2019, is known to be distributed in multi-staged attacks. More recently, the latest variant of this malware has been used in campaigns targeting the LATAM region, particularly Mexico. Mispadu aims to steal financial information from a range of institutions, exchanges, or businesses aligned with cryptocurrency. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.TCP!gen1 File-based Trojan Horse Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Mispadu Stealer extends its reach Mispadu Stealer (known also as Ursa) has shown some increased activity in recent distribution campaigns. While originally this malware has been mostly targeting LATAM countries, the recently observed activity shows European countries to be targeted this time around as well. The malware delivery chain leverages .pdf documents containing URL links to .zip archive with malicious MSI installers or HTA scripts. Later stages include deployment of malicious VB Scripts and the Mispadu malware payloads. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Ps-Mshta!g1 ACM.Ps-Wscr!g1 File-based Trojan Horse Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.1 WS.SecurityRisk.3 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B!100 Heur.AdvML.B!200 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Mispadu / Ursa spam campaigns There have been reports of ongoing Mispadu / Ursa campaigns targeting Spanish and Portuguese speakers. Symantec can confirm this and has coverage in place. File-based Heur.AdvML.C Trojan.Gen.NPE VBS.Downloader.Trojan W97M.Downloader Trojan.Gen.MBT WS.Malware.1 Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. Website-based This attack is blocked by Symantec Web Isolation technology.
MLflow CVE-2023-3765 vulnerability under active exploitation CVE-2023-3765 is a critical (CVSS score 10.0) path traversal vulnerability affecting MLflow platform. Successful exploitation of the vulnerability allows to list, download, write, and delete files on the system. We are aware of reports which indicate an uptick in exploitation of this vulnerability in the wild. Symantec's network protection technology, Intrusion Prevention System (IPS) blocks these vulnerability exploitation attempts to prevent further infection/damage to the system. Symantec protects you from this threat, identified by the following: Network-based Attack: MLflow Path Traversal Vulnerability CVE-2023-3765
MMRat Android malware MMRat is a newly discovered variant of Android malware leveraged in campaigns targeting users in Southeast Asia. The malware uses custom Protobuf communication protocol for data exfiltration from the compromised devices. MMRat has been spreading through phishing websites masqueraded as official app stores. The malware capabilities incorporate device information collection, keylogging, camera recordings, lock screen pattern capture and data exfiltration, among others. By abuse of the accessibility services the malware allows the attackers to remotely control the device and thus to perform additional malicious activities such as bank fraud for example. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk Android.Malapp Android.Reputation.2 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
MobiDash activity continues in the mobile threat landscape The Android threatscape isn't just filled with malware like spyware, banking stealers, SMS fraud, etc. Mobile users are also plagued with all genres of potentially unwanted adware that can be quite pesky and intrusive. MobiDash is one of these, and it's been around for a while now. MobiDash is an ad display module that can be integrated into other apps rather than being a standalone app. It's known to spread via legitimate apps (mostly games) that have been repackaged with its module and then distributed onto third-party app stores and websites. If a user unknowingly downloads one of these, they'll experience loads of pop-up ads and annoying redirects. Another unwanted side effect is the battery drainage. Symantec protects you from this threat, identified by the following: Mobile-based Android.Reputation.2 AppRisk:Generisk
MobiHok, another Mobile RAT out of the gutter Back in 2019, some crooks were inspired by SpyNote and created their own Android Remote Access Trojan – MobiHok. A year later, it's among the most used Android RATs in the mobile threatscape. Having been cracked and leaked for free all over the Internet makes it a threat one should not ignore. Main features include: File, SMS, Calls, Contacts, Location, Account and Camera manager Download and install other apks Keylogging Microphone and screen recording Multiple groups and individuals have been targeting Android users using MobiHok this year, their main vector being third party markets, fake websites and other social platforms. This year the favorite disguise was COVID-19 related applications such as tracing apps which officials or companies have created to help contain the virus spread. Symantec Endpoint Protection Mobile has the following protection in place: AdLibrary:Generisk Android.Reputation.1 Android.Reputation.2
Mobile Ad Fraud Operation - Pareto botnet Yes, ad fraud is still a thing in the threat landscape, especially on Mobile. Recently, light has been shed on a botnet known as Pareto which consists of almost a million infected Android devices imitating people watching connected TV products. In this advertising fraud operation, reports say this botnet was serving on average 650 million ad requests a day and was first spotted in 2020. Actors behind this botnet have been disguising Pareto as games and utility Android applications in hopes of luring victims and adding them to their botnet. Symantec protects you from this threat, identified by the following: Mobile-based Android.Reputation.2
Mobile malware DawDropper spreads banking trojans DawDropper is a mobile malware dropper distributed under the disguise of various Android apps such as app cleaners, document scanners, QR code readers, etc. The malware abuses Firebase Realtime Database - a legitimate third party cloud hosting service for C&C purposes and also leverages GitHub to host malicious payloads. DawDropper has been reported to spread several variants of banking trojans, such as Octo, Hydra, Ermac and Teabot. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk Android.Reputation.1 Android.Reputation.2 AppRisk:Generisk Web-based Observed domains are covered under security categories
Mobile malware masqueraded as Telegram mod apps spread to Chinese-speaking users A new campaign delivering mobile malware to Chinese-speaking users has been recently observed in the wild. The malware has been hosted on the Google Play Store and masqueraded as unofficial Telegram mods. The distributed apps have fully-fledged Telegram capabilities and might be hard to tell apart from legitimate apps for an ordinary user. Once installed the malware allows the attackers to steal Telegram messages, user data, contact lists or even clip cryptowallet addresses, among others. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk Android.Malapp Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Mobile malware masqueraded as WhatsApp mod apps spread to Arabic-speaking users A new campaign delivering mobile malware to Arabic-speaking users, masquerading as WhatsApp mod apps, has been recently observed in the wild. These unofficial WhatsApp mods are mostly distributed through third-party app stores and Telegram channels, in addition to various dubious websites dedicated to WhatsApp modifications. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk AppRisk:Generisk Android.Reputation.2 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Mobile malware targeting NTT DOCOMO users in Japan A new malicious campaign targeting NTT DOCOMO users in Japan has been observed in the wild. The malware has been distributed through fake apps hosted on Google Play Store and disguised as mobile security applications. The malware uses collected user's password to target NTT DOCOMO mobile payment service and to perform payment fraud. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk Android.Reputation.2 AppRisk:Generisk Web-based Observed domains/IPs are covered under security categories
Mobile mingler targeted by PJobRAT Social engineering related to dating has long been successful and continues to be, even moreso these days due to how dating has evolved along with the advance of technology. The increased use of mobile applications to find and participate in dates has seen the introduction of many malicious dating and instant messaging apps. Recently, Indians have been targeted by a spyware app named "PJobRAT" which poses as a dating application tailored for Indian minglers and marriage seekers. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk
MobileOrder Android spyware distributed by the Scarlet Mimic APT group A new wave of malicious activities attributed to the APT known as Scarlet Mimic and targeting the Uyghur community has been observed in the wild. The attackers continue to leverage mobile malware dubbed MobileOrder, which was first discovered back in 2015. According to a recent report, the malware is most likely distributed by various social engineering campaigns using malicious applications disguised as pdf files, documents, pictures or audio data. MobileOrder can steal data stored on the infected devices as well as take photos, initiate calls or manipulate the call logs and SMS messages. Symantec protects you from this threat, identified by the following: Mobile-based Android.Reputation.1 Android.Reputation.2 AppRisk:Generisk Spyware:MobileSpy Web-based Observed domains/IPs are covered under security categories
Mobile Ransomware – Android users still at risk While researchers continue to discover and report on Ransomware that affects computers, the Ransomware that targets mobile users tends to get lost in the noise. Many of these are hosted on third party markets, websites and communication platforms such as forums, patiently waiting for unwary Android users to happen by. Along with the myriad other types of malware and cyberthreats that plague us all on a daily basis, Symantec researchers monitor and track these mobile threats just as vigilantly, to ensure that Symantec Endpoint Protection Mobile is well equipped to detect them. Some recently observed variants are detected as: Trojan:Lockdroid Trojan:Simplocker AdLibrary:Generisk Other:Android.Reputation.1
ModernLoader campaigns observed delivering a range of malware Recent attacks have been observed delivering ModernLoader as the final payload. ModernLoader is a RAT that collects system information and can deploy a variety of modules including cryptocurrency-mining malware. The attacks appear to be targeting Eastern European users via compromised websites and use files disguised as fake Amazon gift cards to deliver the threats. Symantec protects you from these threats, identified by the following: File-based ISB.Downloader!gen281 ISB.Heuristic!gen5 Trojan Horse Trojan.Dropper!g6 Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE.C Trojan.Whispergate
Modified Specter Botnet C2 domains Specter Botnet was first discovered back in September 2020. The botnet is a Remote Access Trojan (RAT) for Linux platform. Recently, it was observed that they have modified their C2 domain configuration file and seen taking advantage of top-level domains 'api[.]github[.]com' and 'www[.]ibm[.]com'. No hacking or misconfiguration took place, it was just attackers were able to exploit a flaw in the ClouDNS service. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.NPE Trojan Horse Linux.Mirai Web-based Observed domains/IPs are covered under security categories
ModiLoader campaign in Eastern Europe ModiLoader continues to be an active threat in the cybersecurity landscape, primarily distributed worldwide through malicious emails. In a recent example, Symantec identified a campaign targeting companies, both local and international, in Hungary, Croatia, Russia, Macedonia, Slovenia, Bosnia and Herzegovina. The perpetrators pose as a Telecom company in Sarajevo and employ the classic "order" social engineering tactic. If a user is successfully lured into opening the attached archive (U prilogu je potvrda narudzbe.zip) and subsequently executes the binary within (U prilogu je potvrda narudzbe.exe), it will trigger the execution of ModiLoader. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products Behavior-based AGR.Terminate!g5 SONAR.SuspBeh!gen24 SONAR.SuspBeh!gen526 SONAR.SuspBeh!gen530 File-based Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B
ModiLoader uptick observed There have been reports of increased ModiLoader activity over the past 30 days, during which time it has been seen loading the Remcos RAT. This loader is being distributed via malicious emails and the malware operators have been using run-of-the-mill quotes, banking transfer and bill social engineering tactics to lure victims. Below are some email subjects Symantec has observed being used against multiple industries: Proformafaktura Trade Inquiry from Saudi Arabia RFQ: TRANS ANATOLIAN NATURAL GAS PIPELINE (TANAP) - PHASE 1(Package 2). APS-192: OUR Invoice SE21037 in Euro ORDER # 691593 / YOUR PO# /#SHIPMENT 358262 / CUSTOMER [Removed] CARGO DELIVERY Aviso de pago de 03.11.2020 URGENT!!! 2 x 20ft - SHIPPING DOC BL,SI,INV#462345 // [removed] KLEVEN V.949E Symantec is closely monitoring this threat and has the following protections in place: File-based Trojan.Gen.MBT Trojan.Gen.NPE Trojan Horse Trojan.Gen.2 Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Moisha .NET-based ransomware Moisha is a new .NET-based ransomware variant. First seen mid-August, the malware employs double-extortion scheme during the attack by both encrypting and ex-filtrating the data. Moisha has the capabilities to stop certain system services as well as kill processes of specific applications running on the targeted hosts. The malware does not append any extensions to the encrypted files and the ransom note is dropped as a text file named "!!!READ TO RECOVER YOUR DATA!!!.txt". Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.B
Molerats (aka Katydid) activities in the Middle East continue The group known as Molerats (also known as Katydid) continue their cyber espionage activities in the Middle East. In their latest spearphishing campaign they utilized malware dubbed LastConn. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.B Heur.AdvML.C Trojan.Gen.MBT Trojan.Horse WS.Malware.1 WS.Malware.2
MoneyBird Ransomware (aka Agrius) Recently new Agrius activities have been reported where they've used a new Ransomware and taken the alias of MoneyBird. Active since 2021, the group has been associated with various ransomware and wiper attacks in the Middle East such as Israel. Additionally, Agrius has a history of stealing data from their victims and leaking it online. While they use a new ransomware, their modus operandi is fairly similar to previous campaigns – targeting vulnerable web servers for initial access. Symantec protects you from this threat, identified by the following: File-based Ransom.MoneyBird Trojan.Gen.MBT
Money Message - new ransomware variant targeting Windows and Linux-based systems A new ransomware dubbed Money Message has been discovered in the wild. While initially only the Windows-based variant was reported, Symantec's Threat Hunter Team has also found a Linux ESXi version of this ransomware family. Money Message uses ChaCha20/ECDH algorithm to encrypt the files. Once the encryption is complete, a ransom note text file named money_message.log is dropped onto the infected endpoint. The malware variant targeting Linux-based systems appears to still be in development, but it also has the functionality to encrypt files. The attackers behind this ransomware are running a public extortion site and they also claim to have exfiltrated data from victims before encryption. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.SuspLaunch!g18 SONAR.SuspLaunch!gen4 SONAR.TCP!gen1 File-based Downloader Ransom.MoneyMess Trojan Horse WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.C
MonikerLink vulnerability in MS Outlook - CVE-2024-21413 CVE-2024-21413, known as the MonikerLink bug, is a recently disclosed critical vulnerability affecting various Microsoft Outlook products. Successful exploitation of the vulnerability could allow unauthenticated attackers to bypass the Office Protected View security feature, leading to exposure of local NTLM credentials and allowing for remote code execution (RCE). The vulnerability has been reported to be exploited in the wild as a zero-day bug before the release of a patch by the vendor as part of February Patch Tuesday updates. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec's email security products Network-based Attack: Microsoft Outlook RCE CVE-2024-21413 Policy-based Symantec Data Center Security default policies harden MS Office applications. DCS prevents MS Office applications from launching command interpreters including cmd.exe, powershell.exe and others as child processes. DCS default policies will stop any SMB connections. DCS default policies will also stop from any malware to be dropped or executed in the system.
Monkeypox to phish Microsoft credentials Cybercriminals tend to jump on world news to fuel their phishing and malware campaigns – particularly world events that produce fear and curiosity will always be a powerful social engineering tactic. Monkeypox cases have been observed in many countries and echoed across world news, and there have also been reports of actors leveraging it as a social engineering lure in order to phish Microsoft credentials via malspam. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products Web-based Observed domains/IPs are covered under security categories
Monti ransomware for Linux Monti is a ransomware variant based on the leaked source code of the infamous Conti ransomware. The malware targets the Linux systems and appends .puuuk extension to the encrypted files. The threat actors behind this ransomware variant operate a tor-based data leak website. Upon encryption of the files the ransomware drops a ransom note in form of README.txt file and additionally another file called result.txt with the count and a total size of encrypted files. Symantec protects you from this threat, identified by the following: File-based Ransom.Conti Trojan.Gen.NPE WS.Malware.1
Moobot and Shellbot attack on exploitable servers Moobot is known malware that turns networked devices running Linux into remotely controlled bots. ShellBot (aka PerlBot) is another type of botnet developed in Perl, known to target Internet of Things (IoT) devices and Linux servers. For the past few months both these Linux malware were reported once again to be back in action as threat actors were observed leveraging two known RCE vulnerabilities (CVE-2021-35394 (Realtek Jungle SDK Remote Code Execution Vulnerability) and CVE-2022-46169 (Cacti Command Injection Vulnerability)) in order to continue the spread of Moobot and Shellbot. If exploit attempts are successful, compromised machines will be controlled via its C2 server from where further attacks can be deployed. Symantec protects you from this threat, identified by the following: File-based IRC.Backdoor.Trojan Linux.Mirai Linux.Mirai!g2 Trojan.Gen.NPE WS.Malware.1 WS.Malware.2 Network-based Web Attack: Realtek Jungle SDK RCE CVE-2021-35394 Attack: Cacti Unauthenticated Command Injection Vulnerability CVE-2022-46169 Web-based Observed domains/IPs are covered under security categories
More Aliens in the mobile threatscape Since 2020, Symantec has observed more and more Alien Android malware activities. This threat is among the most prevalent in the current mobile threat landscape and is believed to be a variant of the infamous Cerberus. Capable of stealing credentials of multiple different mobile apps, with many of them being bank and financial applications, it is also able to: Collect information like usual spyware Elevate privileges Install and start applications Steal 2FA codes that authenticator apps generate Lock screen Symantec protects you from this threat, identified by the following: Mobile-based Android.Reputation.1 AdLibrary:Generisk
More Amadey disguised as cracked software and KMS hacktools Amadey is a simple bot that has been used by multiple groups and individuals since at least late 2018. Over the years its prevalence has fluctuated but as of today activity is still being observed. Amadey's goal is to collect basic information from the compromised machine and download additional payloads. Infection vectors have varied but lately it's mostly distributed via drive-by-download while posing as cracked software and Key Management Service (KMS) hacktools such as KMSAuto and KMSpico. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.2 Trojan Horse Machine Learning-based Heur.AdvML.B
More and more phishers use Telegram API In recent months, there has been a surge in the abuse of Telegram's API call (via bots) by phishers worldwide. They use this method to steal information and transmit it to their Telegram channels or private chats. The anonymous nature of Telegram's channels and groups poses challenges for law enforcement agencies trying to locate the culprits, and the end-to-end encryption guarantees the security of messages sent via the platform. Additionally, the ease of use of the Telegram API makes it an attractive option for attackers to collect stolen data. Among these type of phishing campaigns, the Microsoft Office 365 login page is one of the most mimicked. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products
More Android banking malware observed in India Over the past few weeks, more Android banking malware targeting Indian's mobile users have been observed posing as Android apps of well-known banks such as SBI, Axis and HDFC. The banking malware are similar to Drinik's earlier versions, generating phishing pages of the targeted bank and steal SMS messages to intercept two-factor authentication (2FA). Actors behind these campaigns are luring victims to fake websites where the malicious apps are hosted. Symantec protects you from this threat, identified by the following: Mobile-based AppRisk:Generisk Web-based Observed domains/IPs are covered under security categories
More Android banking malware posing as SBI reward app observed in India 65% of India's population reside in rural areas. Most known name banks in India are expanding and having a large number of rural branches. Mobile banking is gaining popularity among the rural population in India due to ease of conducting financial transactions. However, with the rise of mobile banking this rural population is now becoming the main target of banking frauds. Over the past few weeks, more Android banking malware targeting India's mobile users have been observed masquerading as a banking rewards application for well-known banks such as SBI. Actors may use various techniques like Smishing/Vishing/Phishing to lure victims into installing the Android malware disguised as a banking rewards app. Once installed the malware allows the attacker to steal SMS messages and intercept two-factor authentication (2FA) which can be exploited to gain access to sensitive information, such as email accounts and other forms of personal information which can further lead to potential financial loss. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk AppRisk:Generisk Symantec Endpoint Protection Mobile is able to analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake domains used in this campaign are known to WebPulse.
More cryptocurrency miners observed on MacOS Cryptocurrency is hardly new but its popularity continues to gain as it opens up more to the world. Even over the last few months it's been getting easier and easier to access and day by day new investors join hoping to get a slice of the pie. Some of these investors try to mine their own cryptocurrency coins themselves or via various services. Cryptocurrency miners are predominantly seen on the Windows and Linux operating systems, but Symantec is starting to observe more and more which are specifically tuned for the MacOS environment. While these coinminers are mostly legitimate, potential misuse of the associated software has been flagged over the years, and Symantec has had long standing detections in place for it. Symantec protects you from these threats, identified by the following: File-based OSX.Coinminer OSX.Coinminer!gen1 OSX.Trojan.Gen OSX.Trojan.Gen.2
More CSPs targeted by cryptocurrency campaigns The Linux threat landscape is packed with cryptocurrency miners and actors continue to find ways to deploy them. Targeting Cloud Service Providers (CSPs) is very common and there have been recent reports of a campaign in which actors have been targeting the Huawei Cloud in order to deploy their miner. Symantec protects you from this threat, identified by the following: File-based Downloader Trojan.Gen.NPE Trojan.Horse
More DarkGate PDF Activity DarkGate is a Remote Access Trojan (RAT) that has been making its rounds since 2018. This Malware-as-a-Service (MaaS) type of malware evolved rapidly and just last October, we wrote a story about DarkGate incorporating PDF attachments into their campaign as a way to leverage effectiveness on their motives. Recently, a new Darkgate-related PDF malware campaign has been observed with the following infection chain: URL > .URL shortcut 1 > .URL shortcut 2 > ZIP > MSI > Sideloading DLL > Autoit3.exe and Autoit script > DarkGate The complexity of the infection chain shows the lengths the author went to in order to evade detection (currently no vendor other than Symantec shows a detection on Virus Total so they were somewhat successful) but our heuristic engine caught it. The MSI will drop a legitimate EXE file called ItuneHelper.exe where attackers used a technique called DLL side-loading. This technique combines a legitimate application and a malicious DLL, where in this case the malicious DLL was named "CoreFoundation.dll". It mimics the name of the real DLL component of the EXE file. During execution, CoreFoundation.dll will extract Autoit3.exe and a malicious file called script.au3 from the file sqlite3.dll. Autoit3.exe is a legitimate EXE file which will run script.au3 to decrypt and load the final payload, a DarkGate binary. Symantec has 0-day protection against this threat, identified by the following: File based Scr.DLHeur!gen7 Email based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
More Fake MetaMask Android Apps Circulating, Targeting Users' Wallets More fake MetaMask Android applications have been observed targeting mobile users' wallet via phishing tactics, all of which are being hosted on malicious domains mimicking MetaMask and leveraging typosquatting techniques. It's most likely that these apps are being spread via malicious SMS. This growing trend is mainly due to the fact that MetaMask is a widely used cryptocurrency wallet and gateway to decentralized applications (dApps) on the Ethereum blockchain. Its popularity makes it a prime target for attackers seeking to exploit its reputation and user base for financial gains. While individual consumers are the primary users of MetaMask, there may be cases where certain features or integrations are used by enterprises or businesses for specific purposes, such as managing cryptocurrency assets or interacting with blockchain-based systems. However, the main focus and user base of MetaMask are individual consumers. Symantec protects you from this threat, identified by the following: Mobile-based AppRisk:Generisk Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
More malicious BAT files leveraged in malspam targeting China, Thailand and Kazakhstan BAT files, due to their simplicity, built-in Windows functionality, concealment potential and scripting capabilities have long been used by malicious actors for various purposes, but primarily as loaders. In recent months, the threat landscape has witnessed an increasing use of this technique with families such as BatLoader and BatCloak. In a recent example, Symantec observed a malspam campaign in which an actor passed themselves off as a Latvian company that provides batteries for all types of vehicles. The malicious emails contained a .IMG or .7z attachment, within which a malicious BAT file was concealed, masquerading as a PDF (in this case a payment/bank transfer notification). If successfully executed by the victim, this BAT file would act as a loader for Agent Tesla. While most of the malicious emails targeted organizations in China and Thailand, they also targeted organizations in Kazakhstan. The emails and malicious attachments were written/named in the respective country's language. Observed email subjects: 新银行支付交易通知 ประกาศการชำระเงินผ่า ประกาศ?การชำระ?เงินผ่า?นธนาคาร?ที่เข้า?มา Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products Behavior-based AGR.Terminate!g2 SONAR.BatCloak!gen2 SONAR.SuspLaunch!g84
Morse code used in phishing attacks Crafty cybercriminals have resorted to Morse code to deliver phishing attacks and steal Microsoft Office 365 credentials. The vector has been identified as an email containing an attachment with a double-extension (XLXS & HTML) in order to appear like an Excel invoice. If the victim is successfully tricked into running the HTML file, a script in the file will decode the Morse code string and kick off a chain of events behind the scene which ultimately ends with a popup on the screen asking the victim to submit their Office 365 password. This password is then uploaded to a CnC server controlled by the authors. Symantec has the following coverage in place: File-based Trojan.Horse Network-based Malicious Phishing Site: Phishing Suspicious Request Malicious Phishing Site: Phishing Suspicious Request 2 Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
MortalKombat - a new Xorist ransomware variant MortalKombat is a newly discovered Xorist ransomware variant that has been recently spread in distribution campaigns alongside of a Go-based Laplas Clipper malware. The attacks have been focused mostly on individuals and organizations in the United States, UK, Turkey and the Philippines. MortalKombat targets various files on the infected machines including those related to applications, backups or databases. Due to no hard-coded exclusions, the ransomware might also encrypt various system folders and files leading to system corruption. Upon file encryption MortalKombat will drop a ransom note and change the desktop wallpaper on the infected machine. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.SuspBeh!gen93 SONAR.SuspBeh!gen616 SONAR.SuspTempRun SONAR.SuspTempRun2 File-based Downloader Ransom.CryptoTorLocker Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.1 Machine Learning-based Heur.AdvML.B Web-based Observed domains/IPs are covered under security categories
Moserpass malware distributed in a latest supply chain attack According to recent reports, password manager solution Passwordstate had it's product update mechanisms compromised in a supply chain attack. Malicious updates have been reportedly delivered to users between April 20th and April 22nd. The package if installed would deploy malware dubbed Moserpass, that would attempt to collect system information as well as Passwordstate data from the compromised systems. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT Trojan.Moserbot Web-based Observed domains are covered under security categories
Moses Staff cyberattack against Israeli Defense Ministry A new Ransomware gang named "Moses Staff" claimed to have successfully breached Israeli Defense Ministry's servers and websites. The group reported that they are now in possession of the State's confidential data such as reports, operational maps, information about soldiers and units, and letters and correspondence. They have threatened to leak more sensitive information to serve as an alert on how Israeli authorities work. Symantec protects you from this threat, identified by the following: File-based Hacktool Trojan.Gen.NPE Trojan Horse Ransom.Gen WS.Malware.2 Machine Learning-based Heur.AdvML.B Heur.AdvML.C
Movable Type API CVE-2021-20837 vulnerability under active exploitation CVE-2021-20837 is a critical (CVSS score 9.8) command injection vulnerability affecting Movable Type API. If successfully exploited, this vulnerability enables remote code execution. Symantec's network protection technology, Intrusion Prevention System (IPS) has picked up scans based on threat landscape monitoring, which indicate a recent uptick in exploitation of this vulnerability. Though the vulnerability is a couple of years old, attackers are hoping to cash in on delayed patch deployment by organizations. Symantec protects you from this threat, identified by the following: Network-based Attack: MovableType RCE CVE-2021-20837
MOVEit Transfer vulnerability (CVE-2023-34362) exploited in the wild Recently discovered critical SQL injection vulnerability in the MOVEit Transfer software (CVE-2023-34362) has been reported as being exploited in the wild by threat actors. If exploited, the vulnerability might allow attackers with unauthorized access to unpatched systems leading up to compromise and ex-filtration of confidential data. The vulnerability has just recently been added to the "Known Exploited Vulnerabilities Catalog" by CISA following the reports of in the wild exploitation. An additional advisory by CISA attributes the campaign detailed below to the Clop ransomware group. One of the observed campaigns leveraging MOVEit vulnerability has been deploying LEMURLOOT web shells to the infected targets. The web shells have been masqueraded as "human.aspx" files which are a legitimate component of the MOVEit MFT software. LEMURLOOT has the functionality to steal data from the targeted MOVEit Transfer systems as well as information and credentials for Azure Blob Storage containers. On July 10th, there has been reports of a critical SQL injection vulnerability in MOVEit Transfer. It is, tracked as CVE-2023-36934, could allow an unauthenticated attacker to gain unauthorized access to the MOVEit Transfer database. The vulnerability exists in the way that MOVEit Transfer processes requests for the "human.aspx" page. By injecting malicious SQL code into the "Username" parameter, an attacker could bypass sanitization checks and execute arbitrary SQL commands on the MOVEit Transfer database. Read more in our blog: MOVEit Vulnerabilities: What You Need to Know Symantec protects you from this threat, identified by the following: File-based JS.Malscript!g1 Trojan Horse Trojan.Gen.2 Trojan.Gen.NPE Trojan.Malscript Trojan.Webshell WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.C Network-based Audit: MOVEit Transfer RCE CVE-2023-35036 Web Attack: MOVEit Transfer RCE CVE-2023-34362 Web Attack: MOVEit Transfer SQL Injection CVE-2023-36934 Policy-based DCS default hardening policies such as sym_win_hardened_sbp provide 0-day protection for CVE-2023-34362. DCS policy control "Software Install Restrictions" for MS SQL, MS IIS and other hardened application sandboxes stop CL0P ransomware from exploiting this vulnerability by preventing arbitrary deployment of webshells and unauthorized software. DCS default hardening policies for Microsoft IIS and Windows Servers protect against known and unknown threats targeting MOVEit vulnerabilities such as CVE-2023-36934. Web-based Observed domains/IPs are covered under security categories
MrAgent tool leveraged by the RansomHouse threat group for ESXi attacks RansomHouse is a ransomware threat group known to conduct operations targeting Linux instances and VMware ESXi servers with malware variants such as WhiteRabbit or MarioLocker (aka Mario ESXi). This threat actor has recently been leveraging a tool known as MrAgent that allows for an automated ransomware delivery process and simultaneous deployment across multiple hypervisors in large environments. MrAgent has the functionality to schedule and log the malicious binary deployment, retrieve the information about the targeted infrastructure as well as execute commands on the hypervisor. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based Hacktool Ransom.Gen Trojan Horse Trojan.Gen.NPE WS.Malware.1 Machine Learning-based Heur.AdvML.A!400 Heur.AdvML.A!500 Heur.AdvML.C Policy-based Data Center Security Intrusion Prevention System (IPS) default policies provide multi-layer zero-day protection against Mario / MrAgent on Windows and Unix systems. Suspicious Process Execution: Prevention policies prevent this malware from being dropped or executed on the system. IPS policies will block all C2 connections made by this binary and prevent it from receiving any further instructions.
MrAnon Stealer MrAnon is a new infostealing malware identified recently in a phishing campaign delivering malicious PDF files under the disguise of hotel booking queries. The final payload is delivered through .NET executables and malicious PowerShell scripts. MrAnon targets theft of various user data from the compromised machines including: user credentials, data stored in system browsers, data from cryptocurrency extensions and desktop wallets, VPN application data, information from various messenger apps, document files stored on the machines, and others. The extracted data is compressed and uploaded to a public file-sharing service where it can be accessed by the attackers. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.MalTraffic!gen1 SONAR.Stealer!gen1 SONAR.TCP!gen1 Email-based Coverage is in place for Symantec’s email security products File-based Backdoor.Trojan Infostealer.Limitail Trojan Horse Trojan.Pidief Web.Reputation.1 WS.Malware.1 Network-based System Infected: Trojan.Backdoor Activity 641 System Infected: Trojan.Backdoor Activity 721 Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
MrbMiner malware targets SQL Servers for cryptomining Symantec Security Response is aware of the ongoing campaigns of the cryptomining trojan dubbed as MrbMiner. Although the malware is reported to mainly target exposed SQL servers, a Linux variant has also been discovered. MrbMiner executables are disguised to resemble certain Microsoft Windows processes or services such as: Windows Security Service.exe, Windows Host Management.exe or Install Windows Host.exe. Symantec has the following protection in place: File-based Hacktool.ProcHack Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE Miner.XMRig
Muck Stealer Muck is one among the plethora of run-of-the-mill stealers whose source code is on a well-known software development platform - easily accessible to the public. Symantec is currently observing activities primarily associated with testing. It's still too early to determine the fate this malware will have prevalence-wise, but one thing is certain it will undoubtedly be used in drive-by-download tactics by groups and individuals soon enough. This threat is mostly used to target Discord tokens, browser data (cookies, passwords, history, bookmarks, autofill, saved credit cards), and crypto wallets. It allows the creator to fetch and transfer stolen information to Discord using Webhooks. Symantec protects you from this threat, identified by the following: Behavior-based ACM.Untrst-RunSys!g1 SONAR.Stealer!gen1 File-based Infostealer Trojan.Gen.MBT
Muggle Stealer malware A new infostealing malware dubbed Muggle Stealer has been seen making rounds in the wild. The malware is written in the Go programming language and is spread via usual methods also used by other similar infostealing malware variants, such as malicious websites or phishing. The malware gathers system information from the compromised machines, collects screenshots, extracts confidential data stored in browsers including credentials, cookies and others. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.B Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Muhstik targets Linux servers with Weblogic and Drupal exploits We are aware of reports of recent Muhstik botnet activities against cloud infrastructure. Muhstik has been around for a few years now and is known to be used in various cryptocurrency mining or DDoS campaigns. The bot modules also include functionality to compromise home IoT routers. According to the latest reports Muhstik uses multiple exploits against Oracle Weblogic and Drupal in its attempts to propagate to vulnerable Linux servers. Symantec Protection against Muhstik botnet includes: File-based Linux.Kaiten Linux.Lightaidra Trojan.Gen.NPE WS.Malware.1 Network-based Attack: Oracle Weblogic RCE CVE-2019-2725 Attack: Oracle Weblogic RCE CVE-2019-2725 2 Web Attack: Drupal RCE CVE-2018-7600 Web Attack: Oracle WebLogic RCE CVE-2017-10271 Website-based This activity is proactively blocked by Symantec Web Isolation technology
MultiloginBot targets Multilogin users Mimicking websites of popular apps and services to lure users is a very old social engineering trick and continues to be widely used in today's threat landscape. In a recent example, an actor has created fake Multilogin (a service that companies and individual users can leverage to manage multiple online accounts) websites in order to trick users into downloading an infostealer disguised as a Multilogin installer. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.2
Multiple mobile malware variants target banking users in India A recent wave of attacks leveraging SMS text messages with phishing links has been reported to actively target banking users in India. The attacks distribute various mobile malware families including Elibomi, FakeReward, AxBanker, IcRAT, and IcSpy. The threat actors responsible for the campaigns make use of phishing sites resembling official webpages of several well-known banks in India. The distributed malware payloads are designed to collect and ex-filtrate users' data including banking credentials and credit card information, among others. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk Android.Reputation.2 AppRisk:Generisk Web-based Observed domains/IPs are covered under security categories
Multiple RATs distributed in the “Armor Piercer" campaign A malicious campaign dubbed "Armor Piercer" has been reported to target government institutions in India. The attackers have been distributing two commodity Remote Access Trojans (RATs) known as NetWire and Ave Maria (also Warzone). The attack chain includes malicious documents spread via malspam that lead to a RAT loaders. The attackers also leverage compromised websites to host the payloads. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.B Heur.AdvML.C Infostealer ISB.Downloader!gen48 ISB.Downloader!gen80 ISB.Downloader!gen219 Scr.Malcode!gdn30 Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE W97M.Downloader Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains are covered under security categories
My Number Card (Individual Number Card) users targeted with a new phish wave My Number Card also known as the Individual Number Card is a document issued by the municipalities of Japan for identity purpose. It serves as an identity document for citizens of various parts of Japan. Recently, Symantec has observed a new wave of phish runs spoofing MyNumber Card services with typo-squatted phishing URLs. The email content provides a bit of information on Minor Points (MyNa Points) system and entices the users to click on the phishing URL in order to view current points. Email Subject:【マイナポイント第2弾】20,000円分のポイントプレゼント! Translated Email Subject:【Minor Points 2nd】20,000 yen worth of points for a giveaway! Phish URL structure: hxxps://mynumber.card[.]jp.[redacted_domain].com/ Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Mystic Stealer Mystic Stealer is yet another run-of-the-mill infostealer that has been making rounds in the threat landscape, but is far from being as prevalent as other malware in the same family. Occasionally, command-and-control servers have been detected, and the login panel of Mystic Stealer displays two diagonally aligned circles colored in purple and teal. Actors behind recent activities are spreading it via classic drive-by-download tactics. Below are some of its harvesting capabilities: Computer information (name, user name, guid, etc.) Web-browsers auto-fill data and history Cryptocurrency wallet-related data or files from the various APP locations (such as Bitcoin, DashCore, Exodus, Guarda, Electrum, MyMonero, etc.) Symantec protects you from this threat, identified by the following: File-based Infostealer Suspicious: Reputation Machine Learning-based Heur.AdvML.B Heur.AdvML.C
Mélofée implant family targeting Linux servers Mélofée is a newly discovered implant family targeting Linux servers. One of the known Mélofée variants has been leveraged to deliver a rootkit based on a modified version of the open source Reptile project. Most recent implant samples exhibit new backdoor functionalities as this malware variant appears to be under continuous development. According to a recent report, infrastructure used by Mélofée attackers shares some common links with other threat groups and usage of a variety of malicious tools such as Winnti, PlugX, Cobalt Strike or HelloBot. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based Backdoor.Cobalt Backdoor.Cobalt!gen1 Backdoor.Cobalt!gen7 Backdoor.Cobalt!gm Trojan Horse Trojan.Gen.NPE WS.Malware.1 Machine Learning-based Heur.AdvML.B Web-based Observed domains/IPs are covered under security categories
NajtriStealer Symantec has recently observed an infostealer known as "NajtriStealer" that has been advertised on Telegram and TikTok. This threat is similar to many other variants that have emerged in that it's not particularly sophisticated and therefore unlikely to reach the level of notoriety of other infostealers. NajtriStealer has the following capabilities: Grab user tokens from the following APPs: Discord, Chrome, Opera, Brave and Yandex Steal cookies, passwords, autofill data and credit card info from web browsers Steal session info from Telegram Desktop App Steal Discord Backup Codes Symantec protects you from this threat, identified by the following: File-based Infostealer
Nanocore delivered via malicious .zipx files Researchers have recently noted that attackers utilizing the Nanocore RAT malspam campaign have a new obfuscation technique. The attackers are compressing icon binary files with attached extra data in RAR format. Currently only WinRAR and 7-Zip will open these malicious archives while WinZip fails. Symantec has the following coverage in place: File-based Trojan Horse Trojan.Gen.MBT
Nanocore persists in the email threat landscape Nanocore is a remote access trojan that has persisted in the threat landscape even as newer RATs have emerged. Some groups and individuals still find it effective, and Symantec has observed repeated campaigns using this malware. Over the past 25 days, we have seen numerous email campaigns delivering Nanocore and targeting organizations of all sizes around the world. The email subjects used in these campaigns demonstrate that basic social engineering tactics like order, quote, transfer, and payment requests are still being widely employed. Here are some examples: Amadeus ATC functionality APPLYING FOR THE POST OF AN ACCOUNTANT COMMERCIAL INVOICE AND BILL OF LANDING... 28/12/2022 E-enquiry DAROU_ORDER_06122022 E-enquiry JIAXING_ORDER_05122022 ESSENTIAL OIL Letter of Recommendation New Order NEW ORDER 50708, 61062 Orden de compra urgente 05-33062 PAYMENT ACCOUNT STATEMENT / AGVE GROUP PAYMENT ACCOUNT STATEMENT / FENTEXmedical GmbH Request For Quote 100000pcs RETURN PAYMENT TT (Ref 001122022066743) Returned Payment Scan Copy_00206122022 SUMMARY OF REMITTANCE TRF1038738 Transfer Confirmation UPDATE EMAIL NOTIFICATION UPDATE EMAIL REQUIRED Urgent order=> KIND REMINDER (urgent) Symantec protects you from this threat, identified by the following: Behavior-based SONAR.PsDownloader!g1 Email-based Coverage is in place for Symantec's email security products File-based ISB.Downloader!gen285 ISB.Downloader!gen544 Trojan.Gen.MBT Scr.Malcode!gdn30 Scr.Malcode!gdn34 Machine Learning-based Heur.AdvML.B
Napoli Ransomware Napoli, a variant of Chaos ransomware, has recently been discovered in the wild. The malware encrypts user files, adds the .napoli extension and also changes the desktop wallpaper on the infected endpoints. The attackers drop a ransom noted as a text file called "read_it.txt" and demand payment in Bitcoin. Additionally, the malware comes with functionality to delete the volume shadow copies on the infected machine. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Untrst-RLsass!g1 ACM.Untrst-RunSys!g1 File-based Ransom.Sorry WS.Malware.1 Machine Learning-based Heur.AdvML.B
NarniaRAT and Fenix Botnet spread in campaigns targeting LATAM NarniaRAT and Fenix Botnet have been delivered as two separate payloads in a recent operation targeting users from Latin America. The campaign spreads malicious .zip archives masqueraded as legitimate tools. The dropped payloads allow for infostealing, keylogging and data extraction with focus on banking-related data. The malware targets exfiltration of information related to various and well known banking entities operating in Latin American countries. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Ps-Rd32!g1 File-based Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
National Bank of Greece (NBG) users targeted with a new phishing wave National Bank of Greece (NBG) is one of the largest global banking and financial services organization headquartered in Athens, Greece. Lately, Symantec has observed phish runs that impersonate National Bank of Greece's services and entice users to open fake verification emails. The email body content mentions that there was an unusual funds transfer attempt and thus a security alert has been generated. The user needs to verify the unusual transaction(s) to avoid further restrictions on their account. These phish emails make an attempt to lure users to open and click on phish URLs ready to steal credentials. Email Subject: I-BANK NBG Email From: NBG I-BANK <spoofed_email_address> Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Nebulae Backdoor leveraged in malicious campaigns by the NAIKON APT A new backdoor dubbed as Nebulae has been discovered in malicious campaigns associated with the NAIKON APT group. The reported campaigns also leveraged the Aria-Body loader and RainyDay backdoor. The threat actors focused on data theft and cyber-espionage and have been targeting governmental and military organizations in South Asia. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.B Heur.AdvML.C Trojan.Gen.2 Trojan.Gen.MBT Trojan Horse Web-based Observed domains are covered under security categories
Necro Python bot has added to its spell book Security researchers have recently discovered that the Necro Python bot (discovered in January of this year) has been adding functionaility to it's toolkit, including but not limited to the MITRE ATT%CK framework, exploits of more than 10 web apps, as well as some SMB protocol exploits. This malware appears to be multi-platform by targeting both Linux and Windows based systems and has been observed as primarily a vehicle to distrubute XMRig, a JavaScript based Monero miner. Symantec protects you from this threat, identified by the following: File-based Miner.XMRig Trojan Horse Trojan.Gen.NPE Trojan.Gen.MBT Network-based URL reputation: Browser navigation to known bad URL Web Attack: Oracle Weblogic Server RCE CVE-2020-14882 Web Attack: TerraMaster TOS RCE CVE-2020-28188 Web Attack: Malicious Java Payload Upload 7 Web Attack: Malicious Java Payload Upload 9
NeedleDropper NeedleDropper is a new malware variant advertised and sold on hacking forums and leveraged to drop malicious payloads. NeedleDropper comes in a form of a self-extracting (SFX) archive consisting of several binaries and additional configuration files used for malware execution. The NeedleDropper distribution methods vary and might include malspam delivery or direct shares of malicious files via Discord or OneDrive links. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based Packed.Generic.681 Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.2
Nefilim Ransomware Nefilim Ransomware, which shares similarities with Nemty Ransomware, continues to attack companies, encrypting their files and threatening to release stolen data if they don't pay the ransom. The attack chain, which usually starts with RDP attacks, utilizes multiple hacktools and other threats to steal data, communicate with C2s and spread laterally within the victim's environment. Examples of these include Mimikatz, Lazagne, Cobalt Strike, WMI and PsExec. Symantec protects you from this threat, identified by the following: File-based Ransom.Cryptolocker Trojan.Gen.MBT Trojan Horse Trojan.Maltrec.TS WS.Malware.1 WS.Malware.2
Netflix Phishing and Scams Persist Ever since Netflix streaming became a global hit, there has been an endless wave of phishing and scams targeting users worldwide. Campaigns are observed daily, with most originating from malicious emails while mobile SMS scams are closely following suit. In recent weeks, Symantec has observed actors spamming malicious SMS to mobile users. These messages attempt to trick users into believing their Netflix account may be canceled, urging them to click on the provided URL to resolve the issue. In another instance, users are lured in with fake payment issues. Example of observed malicious SMS: Netflix Payment method on hold. Please confirm your details to avoid account cancellation: hxxps[:]//profilenotice[.]info NETFLIX Account on hold. Please confirm your details to avoid cancellation: hxxps[:]//profilenotice[.]info Netflix : Your payment cannot be completed . To keep access to the service please visit hxxps[:]//Netflix-subcription[.]com to update your payment method. Netflix: Votre compte est temporairement suspendu en raison d'un problème avec votre dernier paiement. Pour mettre à jour votre mode de paiement: hxxps[:]//compteresoudre-netflix[.]com Symantec protects you from this threat, identified by the following: Mobile-based Symantec Endpoint Protection Mobile is able to analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake Netflix domains used in this campaign are known to WebPulse. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
NetSupport Manager RAT Threat actors altered the real purpose of NetSupport Manager to perform malicious activities and it now executes as a Remote Access Trojan (RAT). Recent reports show the tool was downloaded by users via compromised websites bundled in fake browser updates. Once a foothold is established within a victim's machine, attackers will gain remote access control, potentially across various networked machines, that eventually allows them to steal sensitive information about its victims and perform a range of malicious activities. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.NPE WS.Malware.1 WS.Reputation.1 Machine Learning-based Heur.AdvML.C Network-based System Infected: Trojan.Backdoor Activity 670 System Infected: NetSupport RAT Activity Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
NetWalker Ransomware Adopts a RaaS Model In recently released reports, Netwalker - originally observed in 2019 as Mailto - has shown activity throughout 2020 being leveraged as ransomware-as-a-service (RaaS). Netwalker encrypts sensitive data to hold for large payouts. The most commonly observed methods used by this threat were phishing emails, with malicious attachments containing VBScript or PowerShell scripts, exploiting exposed/vulnerable RDP services, and executable files. Symantec protects you from this threat, identified by the following: File-based Downloader Heur.AdvML.B Packed.Generic.459 Ransom.Cryptolocker Ransom.Netwalker Ransom.Netwalker!g3 Ransom.Netwalker!gm Trojan Horse Trojan.Gen.MBT
Netwire disguised as Zoom installer Netwire is a remote access trojan that's been around for a couple of years now and is still regularly used by groups and individuals around the globe. Nowadays Netwire's malicious activities continue to be primarily conducted via malicious emails and drive-by-download. Over the years, we've seen all kinds of social engineering tactics being used to lure victims from run-of-the-mill quotes, payments, and miscellaneous transactions, to trendy news and services. More recently, Symantec has observed an actor trying to pass off his Netwire binary as a Zoom installer. As many are aware, Zoom is a major video communications service whose user base significantly increased during the COVID-19 pandemic. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Netweird
Netwire RAT seen used in campaign targeting Pakistan's Government A threat actor group has been targeting a number of organizations based in Pakistan. The campaign uses spearphishing emails with DOCM document attachments with content related to "National Cyber Security." The documents contains macros that download and run Netwire RAT. Netwire is a publicly available, multi-platform remote administration tool (RAT) that has been used by criminal and APT groups since 2012. Symantec protects you from this threat, identified by the following: File-based Infostealer Trojan.Gen.NPE WS.Malware.1 Email-based Protection is in place for Symantec's email security products. Email Threat Isolation (ETI) technology from Symantec provides an extra layer of protection.
Neurevt aka Betabot targets Mexican institutions According to the latest report, Neurevt malware known also as Betabot has been targeting institutions in Mexico in the recent campaigns. The newest variant of Neurevt combines both infostealing as well as backdoor features. Once the targeted system has been compromised, the malware will attempt to capture banking credentials, screenshots and user's confidential information and later exfiltrate the collected data to the pre-defined C2 servers. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.B Heur.AdvML.C SMG.Heur!gen Trojan Horse Trojan.BetaBot!g1 Trojan.Gen.2 Trojan.Gen.MBT Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains are covered under security categories
Nevada Ransomware Yet another ransomware, this one dubbed "Nevada", recently made headlines for targeting VMware ESXi servers worldwide through an old vulnerability. CVE-2021-21974 allows an unauthenticated attacker to execute arbitrary code with elevated privileges on affected systems. VMware ESXi servers are used to create virtual machines (VMs) and provide a layer of abstraction between physical hardware and virtualized environments, making a ransomware attack highly disruptive. The actors behind this ransomware run both a Windows and Linux version. So far we have been able to confirm protection for Windows. After encryption, files are appended with a .NEVADA extension. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.CryptLocker!g36 SONAR.RansomPlay!gen1 File-based Downloader Machine Learning-based Heur.AdvML.B
New activity attributed to the BlackFly APT The Blackfly espionage group (aka APT41, Winnti Group, Bronze Atlas) has continued to mount attacks against targets in Asia and recently targeted two subsidiaries of an Asian conglomerate, both of which operate in the materials and composites sector, suggesting that the group may be attempting to steal intellectual property. Read more in our blog: Blackfly: Espionage Group Targets Materials Technology Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 SONAR.TCP!gen6 File-based Backdoor.Winnkit Hacktool.Mimikatz Spyware.Gen Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A Heur.AdvML.B Heur.AdvML.C
New AdLoad Mac malware variants observed bypassing XProtect Recent campaigns leveraging AdLoad malware for Mac have been observed bypassing Apple's XProtect security feature. This malware targets macOS and typically attempts to hijack browser search results and inject ads into webpages. New variants of the malware are relying on file extensions of .service or .system for execution and to establish persistence. The associated campaigns use fake installer applications to drop the malware onto the system. In many cases the fake installers are signed with a valid signature, thereby attempting to legitimize the application. Symantec protects you from this threat, identified by the following: File-based OSX.AdLoad OSX.Bundlore OSX.Trojan.Gen OSX.Trojan.Gen.2
New Android malware deployed by the StrongPity APT group According to a recently released report, the StrongPity (aka Promethium) advanced persistent threat (APT) group is conducting a new campaign that deploys Android malware. This would be the first ever observed occurrence of this APT group distributing malware for the Android platform. The attackers leverage trojanized mobile apps, modified in a way to obtain additional permission on the phone. The malware has ability to collect data stored on the device and exfiltrate it to a pre-configured C&C server. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk Android.Reputation.2 AppRisk:Generisk
New Android malware variant dubbed 'MaliBot' MaliBot, a new Android information stealing trojan variant was spotted targeting online banking and cryptocurrency wallets of users from Spain and Italy. Some of MaliBot’s key characteristics include: Disguises itself as a cryptocurrency mining app named “Mining X” or “The CryptoApp”, and occasionally assumes some other guises, such as “MySocialSecurity” and “Chrome” Is focused on stealing financial information, credentials, crypto wallets, and personal data (PII), and also targets financial institutions in Italy and Spain Is capable of stealing and bypassing multi-factor (2FA/MFA) codes Includes the ability to remotely control infected devices using a VNC server implementation Symantec protects you from these threats, identified by the following: File-based Trojan.Gen.MBT Trojan.Gen.2 WS.Malware.1 WS.Malware.2 Mobile-based Android.Reputation.2 Web-based Observed IPs/domains are covered under security categories