text
stringlengths
0
383k
New AppleJeus variant spread by fake cryptocurrency trading websites A new activity by the Lazarus APT shows the threat actors targeting cryptocurrency users with a new strain of the AppleJeus malware. The attackers leverage a fraudulent cryptocurrency-themed website mimicking a legitimate trading platform called BloxHolder. Through this website, the attackers are distributing a Windows MSI installer for a cryptocurrency trading app bundled with the AppleJeus malware. AppleJeus has been used by Lazarus at least since 2018 in various campaigns aimed at cryptocurrency theft. Symantec protects you from this threat, identified by the following: File-based ISB.Downloader!gen347 ISB.Downloader!gen411 ISB.Downloader!gen420 Scr.Malcode!gen1 Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT W97M.Downloader WS.Malware.1 WS.SecurityRisk.4 Machine Learning-based Heur.AdvML.A Heur.AdvML.B Web-based Observed domains/IPs are covered under security categories
New AstraLocker ransomware variant found in the wild AstraLocker 2.0 variant has been found in the wild. The malware is distributed mostly through malspam campaigns leveraging malicious MS Word documents. The new AstraLocker variant is reported to be based prevalently on the Babuk ransomware code that was leaked to the public back in 2021. AstraLocker employs several evasion tactics and performs various checks for the presence of virtual environments. The ransomware encrypts user files and appends various extensions to them, such as: .babuk, .astralocker or .astra. Symantec protects you from this threat, identified by the following: File-based Ransom.Babuk Trojan Horse Trojan.Gen.NPE W97M.Downloader WS.Malware.1 Machine Learning-based Heur.AdvML.B
New AsukaStealer malware A newly advertised infostealer malware has been observed for sale. Known as AsukaStealer, the malware is offered up under a Malware-as-a-Service model. This new malware includes common infostealer functionality, such as theft of data and credentials for browsers and cryptowallets, Discord tokens, collection of system information and screenshot capabilities. Symantec detects you from this threat, identified by the following: File-based Infostealer Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
New AsyncRAT infection chain The AsyncRAT infection chain campaign starts with a malicious URL embedded within a spam email that leads to a malicious HTML file download. Several processes are kicked-off to execute C2 communications. The malware exhibits several capabilities such as - credential stealing, keylogging, browser data capture etc. All collected data is exfiltrated over to AsyncRAT server. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products. File-based Backdoor.ASync!gm CL.Downloader!gen Scr.Malcode!gdn14 Trojan Horse Trojan.Gen.NPE Trojan.Malscript WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B!100 Heur.AdvML.B!200 Heur.AdvML.B Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
New backdoor Macma delivered in a watering hole campaign A new watering hole campaign targeting visitors to several Hong Kong websites has been discovered. The attackers responsible for it have been leveraging the recent XNU privilege escalation vulnerability (CVE-2021-30869) to drop a new variant of a MacOS backdoor. Dubbed as Macma or OSX.CDDS the malware includes functionality to fingerprint the targeted device, upload or download arbitrary files and capture keystrokes among others. Symantec protects you from this threat, identified by the following: File-based OSX.Trojan.Gen OSX.Trojan.Gen.2 Trojan.Malscript WS.Malware.1 Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories
New backdoor TinyTurla-NG (TTNG) Russian threat group Turla APT has been accredited with the new backdoor TinyTurla-NG (TTNG). Turla APT uses compromised WordPress based websites as C2 endpoints for this backdoor. Arbitrary commands are executed on the victims infected machine for TTNG to exfiltrate collected key information relating to credentials for popular password management software. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Ps-Rd32!g1 File-based Trojan.Gen.2 Trojan.Gen.MBT Machine Learning-based Heur.AdvML.A Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
New backdoor WineLoader Phishing attacks impersonating political parties with an invite lure to diplomats for a wine-tasting event has been used to deploy WineLoader malware. WineLoader is a new backdoor variant that shares features similar to that of BurntBatter, BeatDrop, and MuskyBeat which are associated with APT29. Once deployed, WineLoader collects and exfiltrates gathered information from the infected machine (victim's username, process name, device name etc.) to the C2. The C2 can determine to execute additional modules to perform further tasks like establishing persistence. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Ps-Rd32!g1 File-based: Scr.Malcode!gen Trojan.Gen.MBT Trojan.Malscript WS.Malware.1 Web.Reputation.1 Network-based Audit: Suspicious Process Accessing Lets Encrypt Certified Site Web Attack: Webpulse Bad Reputation Domain Request
New Banking Trojan Chavecloak A new banking trojan dubbed Chavecloak was identified as the payload of a financially-motivated engineering spam campaign targeting users in South America. The malicious email includes a PDF attachment that upon opening, prompts the download of an archive file. Extracting this archive triggers the execution of Chavecloak, utilizing the DLL side-loading technique. This malware incorporates functionality such as keystroke logging, displaying deceptive pop-ups, and monitoring financial and cryptocurrency transactions. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.NPE Trojan.Pidief WS.Malware.1 Machine Learning-based Heur.AdvML.A!200 Heur.AdvML.A!300 Heur.AdvML.B!100 Heur.AdvML.B Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
New BazarLoader in the wild The Threat Landscape is saturated with malicious loaders, and BazarLoader is one of them. Late last year, BazarLoader gained an additional measure of infamy when it associated its business with Ransomware Ryuk and Trickbot in several damaging campaigns. Through January 2021 Symantec and other vendors observed malspam runs distributing a new version of BazarLoader. Symantec has the following coverage in place for BazarLoader: File-based Trojan.BazarLoad WS.Malware.1 WS.Malware.2 Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
New Bifrost Linux variant discovered A new variant of the Bifrost Linux malware (also known as Bifrose) has been found in the wild. Bifrost is a RAT malware known to be spread via malicious websites or malspam campaigns. The malware has the functionality to collect information about the infected host. Latest Bifrost variants employ C2 domain typosquatting techniques in an effort to evade detection. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.NPE WS.Malware.1 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
New BlackGuard variant comes with additional capabilities BlackGuard infostealer was first discovered back in 2022. The malware is advertised on underground forums and sold in the form of a Malware-as-a-Service (MaaS) offering. The infostealer is capable of data theft from a range of web browsers, email clients, messaging and VPN applications, among others. The new variant of BlackGuard seen in the wild comes with additional features allowing it to hijack cryptocurrency wallets and propagate through removable or shared drives. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based Trojan Horse WS.Malware.1 Machine Learning-based Heur.AdvML.B Web-based Observed domains/IPs are covered under security categories
New Botnet 'Simps' attempts to woo IoT devices Security researchers recently discovered a new botnet being dubbed 'Simps'. This botnet is being delivered along with Gafgyt, another IoT malware also known as 'Bashlite' via Remove Code Execution (RCE) vulnerabilities in various IoT devices. Symantec protects you from these threats, identified by the following: File-Based Trojan.Gen.NPE Trojan Horse Linux.Lightaidra Network-based Web Attack: Webpulse Bad Reputation Domain Request Website-based Observed domains are covered under security categories.
New Bumblebee campaign observed Bumblebee is a prevalent loader that has quickly become a key component in a wide range of cyber-crime attacks and appears to have replaced a number of older loaders. It had links to a number of ransomware operations. A new Bumblebee malspam campaign has been observed where the attack chain pivots from Virtual Hard Disk (VHD) container. It is again using the infamous ISO container inside a password protected ZIP. If a user is successfully lured into extracting the ZIP and ISO containers then executing the malicious link file that runs a powershell script, it will trigger the rest of the chain. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products File-based Trojan.Gen.2 Trojan.Gen.MBT Trojan.Mallnk Scr.Malarchive!gen1 Web-based Observed domains/IPs are covered under security categories
New campaign attributed to Daggerfly APT A telecommunications organization in Africa appears to be among the latest targets for the Daggerfly (aka Evasive Panda, Bronze Highland) advanced persistent threat (APT) group. Researchers from the Threat Hunter Team at Symantec, by Broadcom Software, found multiple unique plugins associated with the MgBot modular malware framework on the victim’s network. The attackers were also seen using a PlugX loader and abusing the legitimate AnyDesk remote desktop software. Read more in our blog: Daggerfly: APT Actor Targets Telecoms Company in Africa Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen6 File-based Backdoor.PsEmpire Backdoor.Trojan Hacktool Infostealer Trojan Horse Trojan.Gen.MBT Trojan.Gen.NPE.2 WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.B Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories
New campaigns leveraging Truebot malware Truebot malware has been observed in recent campaigns aimed at information theft and ransomware distribution. This malware is attributed to the threat group known as Silence Group, which is believed to be associated with the APT actor TA505. Truebot delivery vectors differed depending on the campaign where it was spread. Earlier attacks from August exploited CVE-2022-31199 Netwrix auditor vulnerability. Later campaigns used infections with Raspberry Robin malware through USB devices to spread the payloads. Truebot is a downloader variant responsible for collecting system information and downloading additional payloads to the infected endpoints. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.C Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories
New campaign targeting Apache Hadoop and Apache Flink applications A new campaign targeting Apache Hadoop and Apache Flink applications has been observed in the wild. The attackers have been exploiting existing security misconfigurations in both applications for remote access and code execution. The threat actors leveraged BGP packer for payload binaries obfuscation as well as two distinct rootkits to hide the malware and the executed commands. A Monero cryptominer is dropped on the infected machines as the final payload in this campaign. Symantec protects you from this threat, identified by the following: File-based PUA.Gen.2 Trojan Horse Trojan.Gen.NPE WS.Malware.1 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
New Ceeloader Malware Suspected Russian-backed APT group, known as Nobelium, targets government and enterprise networks worldwide by using new malware identified as "Ceeloader". This new, heavily obfuscated, custom malware is written in C and is capable of executing shell-code payloads directly in memory. It mixes meaningful calls to the Windows API in large blocks of junk code to conceal the true calls in an effort to evade detection by security software. Ceeloader will communicate with a C2 server via HTTP and the response is decrypted using AES256 in CBC mode. Symantec protects you from these threats, identified by the following: Network-based Malicious Site: Malicious Domain Request 59 Web-based Observed domains/IPs are covered under security categories
New coinmining campaign leveraging ProxyShellMiner malware A new campaign distributing ProxyShellMiner malware has been observed in the wild. The attackers are exploiting Microsoft Exchange ProxyShell vulnerabilities from 2021 (CVE-2021-34473 and CVE-2021-34523) for the purpose of initial access and payload delivery. The dropped coinminer payload belongs to XMRig coinminer family. To achieve persistence the malware will create a scheduled task on the infected machines that is configured to run with every logon. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 SONAR.TCP!gen6 File-based Trojan Horse Trojan.Coinminer Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.C Network-based Web Attack: Microsoft Exchange Server CVE-2021-34473 Web Attack: Microsoft Exchange Server Elevation of Privilege CVE-2021-34523 Policy-based Symantec Data Center Security default hardening policies for Microsoft Exchange servers protect against ProxyShell vulnerabilities. Web-based Observed domains/IPs are covered under security categories
New Coyote Trojan malware New Coyote Trojan malware has been targeting users of Brazilian banking institutions. This malware utilizes various advanced technologies (ie. Squirrel installer) for infection and then establishes communications with its C&C server. Once connection is verified the collected information (ie. screenshots, credentials etc.) is exfiltrated from the infected machine. Symantec protects you from this threat, identified by the following: File-based Backdoor.Cobalt Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.A!300 Heur.AdvML.B!100 Heur.AdvML.B!200 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
New credential stealer Zaraza Zaraza is a new credential stealing malware capable of harvesting sensitive information saved on popular web browsers such as Chrome, Firefox, Microsoft Edge, Vivaldi, Brave, Opera, Yandex and Chromium. This malware exfiltrates saved information (credentials, autofill, history, cryptocurrency wallets etc.) from the infected machines to a Telegram channel utilized as C2 servers controlled by the attackers. Symantec protects you from these threats, identified by the following: File-based Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.C Web-based Observed domains are covered under security categories
New crypto wallet clipper targets Portuguese speakers There are various techniques for crypto theft, and one approach involves detecting when a Bitcoin address is copied to a clipboard and quickly replaced with a different address belonging to the threat actor. This is to trick users into sending Bitcoins to the wrong address. This method is highly effective because Bitcoin transactions are irreversible. A malware campaign using the above technique has been observed in the wild targeting victims from multiple industries, including IT, real estate, and manufacturing. The threat actors in this campaign are using SEO poisoning techniques to redirect Portuguese-speaking victims searching for WhatsApp Web to malicious domains that impersonate the legitimate Web application. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT Trojan Horse Trojan.Malscript Machine Learning-based Heur.AdvML.B Heur.AdvML.C Web-based Observed domains are covered under security categories
New custom tools leveraged by the Play ransomware group Play ransomware (also known as PlayCrypt), which is developed by a group Symantec tracks as Balloonfly, was launched in June 2022, and since then has been responsible for multiple high-profile attacks. Like most ransomware groups now, Play carries out double-extortion attacks, where the attackers exfiltrate data from victim networks before encrypting them. The Play ransomware group is using two new, custom-developed tools that allow it to enumerate all users and computers on a compromised network, and copy files from the Volume Shadow Copy Service (VSS) that are normally locked by the operating system. Read more in our blog: Play Ransomware Group Using New Custom Data-Gathering Tools Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.PsExeSvc!gen2 SONAR.Ransomplay!gen1 SONAR.Ransomplay!gen3 SONAR.TCP!gen1 SONAR.TCP!gen6 File-based Backdoor.SystemBC Downloader Hacktool Infostealer.Grixba Ransom.PlayCrypt Trojan Horse Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.C Network-based System Infected: Trojan.Backdoor Activity 634 Web-based Observed domains/IPs are covered under security categories
New DEEP#GOSU campaign attributed to Springtail APT (aka Kimsuky) A new malicious campaign dubbed DEEP#GOSU has been attributed to the Springtail APT (aka Kimsuky or Thallium). The attack chain leverages among others .LNK files, embedded PowerShell code and VBScript stagers that lead up to download of payloads hosted on the Dropbox file repository. The final payload in the campaigns is an infostealing malware with backdoor capabilities that allows for clipboard monitoring, keylogging and data exfiltration. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Ps-Http!g2 File-based CL.Downloader!gen241 Scr.Mallnk!gen2 Scr.Mallnk!gen13 Trojan Horse Trojan.Gen.NPE WS.Malware.1 WS.SecurityRisk.4 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
New DeroHe Ransomware distributed in a widespread campaign Reports have emerged about a new variant of ransomware dubbed as DeroHe. The malware is disguised as a legitimate dll file in the IObit License Manager application. Users downloading the hacked application would likely be unaware that it loads a malicious dll and ransomware onto their system. DeroHe encrypts files adding .DeroHe extension to them and demands a ransom payment in a less common Dero cryptocurrency. While we continue to monitor and enhance our protections against this ransomware family, we recommend regular backup procedures of any important files and applying the latest product definitions to protect against ransomware threats. Symantec protections against this ransomware family include: File-based Downloader Trojan.Gen.2 Trojan.Gen.NPE
New Ducktail infostealer variant observed A new PHP variant of the infostealer known as Ducktail has been observed in the wild. Ducktail was first seen back in 2021 in malicious campaigns targeting Facebook Business accounts. The new Ducktail variant is reportedly being distributed mostly via free or cracked applications and game installers. The functionality of the new variant remains pretty similar to the original strain and focuses on information and credentials theft. Symantec protects you from this threat, identified by the following: File-based Hacktool Infostealer.Ducktail Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1
Newer version of Xenomorph observed The Android banking malware known as Xenomorph continues to be seen in the mobile threat landscape According to reports the latest iteration is now targeting more than 30 U.S. financial institutions and has new commands. This threat behaves like many other mobile banking malware, using the classic overlay technique and being able to perform ATS (Automatic Transfer System) attacks in order to snatch victims' financial credentials. Symantec protects you from this threat, identified by the following: Mobile-based AppRisk:Generisk
New espionage campaigns conducted by the Siamesekitten APT group New espionage activities attributed to the Siamesekitten APT group (also known as Lyceum) have been observed in the wild. As reported, the group has been engaged in a series of supply chain attacks in the Middle East and Africa during the last 3 months. The attackers have also replaced the previously used backdoor "Milan" with a new variant dubbed "Shark". Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.C Infostealer Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains are covered under security categories
New FormBook variants identified According to recently released reports, two new variants of the infamous FormBook infostealer have been identified. Formbook is infostealing malware known for several years and it's main purpose is to harvest credentials from web browsers, collect screenshots and log keystrokes. First out of the two new variants is reported to leverage steganography during distribution stages, it also loads multiple modules into the memory. The second variant dubbed as Xloader, targets macOS platform and is reported to be for sale in a form of Malware-as-a-Service offering on the underground forums. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.B Heur.AdvML.C OSX.Trojan.Gen Packed.Generic.570 Packed.Generic.571 Scr.Malcode!gdn31 Trojan Horse Trojan.Formbook Trojan.Gen.2 Trojan.Gen.NPE Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains are covered under security categories.
New FurBall malware variant distributed by the Domestic Kitten APT A new variant of the mobile malware dubbed Furball has been identified in a surveillance campaign targeting Iranian citizens. The operation is reported to be led by the Domestic Kitten APT group (also known as APT-C-50). While the new version of the malware exhibits many similarities to previous variants of this malware family, it also comes with some changes to C2 communication and new obfuscation methods. Furball's functionality includes ex-filtration of sms messages, stored contacts and phone call logs, etc. The malware might also receive additional commands from the C&C server. Symantec protects you from this threat, identified by the following: Mobile-based Android.Reputation.2 AppRisk:Generisk Spyware:MobileSpy
New GoLang ransomware threat named DECAF GoLang written ransomware, such as Babuk, Hive, and HelloKitty to name a few, is gaining popularity among threat actors. The latest strain of ransomware using GoLang is named DECAF. It is implemented in GoLang 1.17 which is more complex in how parameters are passed to functions. It employs file filtering mechanisms for encryption, and uses the multi-goroutine method for a quicker encryption response. Findings based on debug and pre-release versions have subtle differences, which suggests that the development of DECAF is ongoing. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.MBT WS.Malware.2
New GuLoader Spam Campaigns GuLoader is an advanced shellcode-based downloader which uses a variety of anti-analysis tricks to try to evade detection and make reverse-engineering more difficult, with the goal of delivering a range of malware including but not limited to ransomware, infostealers, banking Trojans, RATs and Proxies. As we have mentioned in previous bulletins, GuLoader has certainly been active this year. Yet another spam run was recently observed, causing our telemetry systems to report a significant spike on November 8 with smaller spikes either side of that. In this particular campaign, one of the observed payloads was named "TAROM - Romanian Air Transport P.O. 4500106584 11082023.vbs". Symantec protects you from this threat, identified by the following: File-based Scr.Guloader!gen1 Scr.Malcode!gen Trojan Horse Web.Reputation.1
New info stealer Rage Stealer Rage Stealer is a new malicious info stealer that covertly infiltrates a victims system and exfiltrates various forms of personal saved data (login credentials, auto-fill history, credit card/cryptocurrency wallets etc.) from the infected machine to a Telegram API utilized as C2 servers controlled by the attackers. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based Trojan Horse Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200
New JsOutProx malware variant observed in campaigns targeted at financial sector A new JsOutProx malware variant has been observed in recent campaigns targeted at financial sector in the Africa, the Middle East, South Asia, and Southeast Asia. JsOutProx RAT is attributed to a threat group known as Solar Spider. While in the past the group has been using GitHub repositories to host the malicious payloads, the latest attacks leverage repositories on the GitLab platform instead. JsOutProx has modular architecture and the functionality to execute shell commands, upload/download files, modify system files, capture screenshots and various system information, among others. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Ps-Wscr!g1 File-based JS.Downloader Trojan Horse Trojan.Gen.NPE WS.Malware.1 WS.Malware.2 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
New Krane malware campaigns deploy XMRig coinminers A new malware delivered by brute force attacks has been discovered and dubbed as Krane. This variant has ability to download second stage payloads or drop Monero XMRig cryptominers on the compromised machines. Krane interestingly employs a combination of bash and python scripts used for propagation and lateral movement. Symantec protects you from this threat, identified by the following: File-based Downloader Downloader.Trojan Hacktool Hacktool.Rootkit Trojan Horse Trojan.Gen.NPE WS.Malware.1 WS.Malware.2 Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories
New Lazarus APT campaign again targets macOS users A new instance of malicious activities known as "Operation In(ter)ception" or "Operation Dream Job" has been observed this month. The campaign is attributed to the Lazarus APT group. Just last month a similar operation was leveraging lures for job vacancies at cryptocurrency exchange platform Coinbase with the intent to infect macOS users with malware. The new campaign moved away from Coinbase and now uses lures for supposed job vacancies at a different exchange - Crypto.com. Malware spread by Lazarus is compiled for both Intel and M1 Apple Silicon architectures but remains similar when it comes to functionality. Once executed the malware will connect to the predefined C2 servers and await for commands from the threat actors. Symantec protects you from this threat, identified by the following: File-based OSX.Nukesped OSX.Trojan.Gen OSX.Trojan.Gen.2 WS.Malware.1 Web-based Observed domains are covered under security categories
New Linux backdoor GTPDOOR A new Linux backdoor, known as GTPDOOR, has been reported in the wild. This malware is specifically crafted to target telecommunications networks and is suspected to be linked to the Mystrium threat actor group (also known as LightBasin). GTPDOOR exploits the GPRS Tunnelling Protocol Control Plane (GTP-C) to establish covert command and control (C2) communications, enabling it to disguise its activities within legitimate network traffic. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.NPE WS.Malware.1
New linux malware campaign targeting web facing services A recent malware campaign has been detected deploying several novel Golang malware payloads, aimed at public-facing web services such as Apache Hadoop, Docker, Redis, and Confluence. The threat actors behind this campaign are utilizing these payloads to exploit misconfigured servers running these services, ultimately deploying cryptocurrency miners. These payloads utilize a range of techniques including port scanning, HTTP requests, and shell commands to exploit known vulnerabilities and execute malicious code on compromised systems. Symantec protects you from this threat, identified by the following: File-based Hacktool Trojan Horse Trojan.Gen.NPE WS.Malware.1 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
New Linux ransomware variant in development A new ransomware variant targeting Linux devices has been discovered in the wild. The malware appends .crypted extension to the encrypted user files. The ransom note dropped by the ransomware is identical to the one known from a ransomware variant dubbed DarkAngels (which in turn is a rebranded strain of Babuk). It also shows some code similarities to the RagnarLocker variant. This new Linux ransomware is believed to be still in the development phase. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.NPE WS.Malware.1
Newly discovered rootkit called FiveSys According to the threat researchers who have recently uncovered the rootkit called FiveSys, this malware campaign has been active for more than a year now. FiveSys predominantly targets the Chinese online gaming market, the sole purpose of the campaign being to steal credentials and hijack in-app purchase requests. Recent finding shows that FiveSys malware obtains a Microsoft-issued digital signature but the malware analyst who disclosed the issue added "the reason the driver got digitally signed by Microsoft is because the operating system no longer accepts drivers signed by the vendor only". Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.2 Trojan.Gen.MBT Trojan Horse Machine Learning-based Heur.AdvML.B Web-based Observed domains are covered under security categories
New malicious campaign leveraging Babadeda crypter to deliver infostealers and RATs A new malicious campaign has been discovered that leverages a crypter known as Babadeda and targets the cryptocurrency, NFT, and DeFi communities. According to the released report, the campaign has been ongoing since May 2021 and during its duration the threat actors have been distributing a variety of infostealers, remote access Trojans (RATs) or even ransomware. The malware distribution chain involves Discord phish messages sent to users with download URLs inside them that lead to the malicious installers. Symantec protects you from this threat, identified by the following: File-based Downloader Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.C Network-based System Infected: DCRAT Trojan Activity System Infected: Trojan.Backdoor Activity 507 System Infected: Trojan.Gen.2 Activity 101 Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories
New malicious campaign utilizes both BazarLoader and BuerLoader We have been aware of the reports of recent phishing runs utilizing two different malware loaders in the same campaign: BazarLoader and BuerLoader. While BazarLoader has been known for a while and used by the Trickbot group to load the Bazar backdoor, BuerLoader is a relatively new malware variant discovered in 2019. The loaders are further used to execute malicious binaries and scripts on the compromised hosts. Symantec provides the following protection against BazarLoader and BuerLoader threats: File-based Backdoor.Trojan Heur.AdvML.C Trojan.Gen.2 Trojan.Gen.MBT Trojan Horse Trojan.Maltrec.TS Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. Website-based This attack is proactively blocked by Symantec Web Isolation technology
New malvertising campaign spreads Atomic Stealer (AMOS) to macOS users Atomic macOS Stealer (aka AMOS) has been discovered around April 2023. The malware steals a wide range of sensitive data from infected machines, including system information, keychain passwords, user documents, cookies, browser data, credit card details, cryptocurrency wallets, and others. A new malvertising campaign spreading this malware variant has been recently observed in the wild. The attackers have been masquerading their malicious download website as TradingView which is a popular charting platform and social network used by traders and investors. The malicious page offers downloads of a fake TrandingView desktop app for multiple platforms. While the Windows and Linux variants app would lead to download of NetSupport RAT, the macOS version results in Atomic Stealer installation on the victim machine. Symantec protects you from this threat, identified by the following: File-based OSX.Trojan.Gen OSX.Trojan.Gen.2 WS.Malware.1 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
New malware backdoor Tomiris Tomiris is a new malware backdoor thought to have been developed by Nobelium group. Threat actors had previously hijacked government DNS servers to redirect traffic to machines under the attackers control. Victims that visited the hijacked sites were redirected to webmail login pages which allowed the attackers to steal not only their credentials, but in some instances prompted for install of a software update which actually downloaded the malware onto the victims machines. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 Web-based Observed IPs/domains are covered under security categories
New malware group Persian Remote World offers its own tools for sale A recently established malware group named Persian Remote World develops its own tools and then offers them for sale on a subscription basis. These tools cover a number of functions including loaders, RATs, infostealers, banking trojans, screen captures, and even ransomware. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT Ws.Malware.1 Machine Learning-based Heur.AdvML.C
New malware used in attacks on telecoms companies in Middle East Telecommunications providers in the Middle East are being targeted with new malware that masquerades as legitimate security software components, including Palo Alto Networks’ Cortex XDR application and Microsoft’s Exchange Web Services (EWS) platform, to make detection more difficult. It appears the attackers exploit internet-facing servers to deploy the HTTPSnoop backdoor onto victim networks for initial access, allows them to listen to incoming requests for specific HTTP(S) URLs and execute that content on the infected endpoint. The other new malware is called PipeSnoop, which can accept arbitrary shellcode from a named pipe and execute it on the infected endpoint. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Cridex Trojan.Gen.9 Trojan.Gen.MBT WS.Malware.1 Behavior-based SONAR.TCP!gen1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.A!400 Heur.AdvML.A!500 Heur.AdvML.B!100 Heur.AdvML.B!200 Heur.AdvML.C
New malware variants join the JSWorm Ransomware family JSWorm ransomware has been initially discovered back in 2019 and the malware family has been evolving ever since. There have been multiple rebranded variants of JSWorm discovered over time and known under the names like Nemty or Nefilim. According to the latest reports, the two most recent variants seen in 2021 are Milihpen and Gangbang. The threat actor behind this ransomware has also been known to publish victim's data on a leak website. As we continue to monitor and enhance our protections against JSWorm Ransomware variants, we recommend performing regular backups for any important data and ensuring your security products are kept up to date with the latest product definitions. Symantec protects you from this threat, identified by the following: File-based Downloader Heur.AdvML.B Heur.AdvML.C Ransom.Cryptolocker Ransom.Nefilim!gen1 Ransom.Nemty Trojan.Gen.2 Trojan.Gen.MBT
New Microsoft Azure phishing campaign A campaign taking over user accounts in Microsoft Azure environments has recently been observed. Users with high level access or individuals with confidential business information are the most likely to be targeted. This attack uses various techniques for example fake document sharing URLs used in emails to gather user credentials, take over accounts, exfiltrate data and send new phishing attacks. Symantec protects you from these threats, identified by the following: Email-based Coverage is in place for Symantec's email security products Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
New MidgeDropper variant observed in the wild A new dropper variant dubbed MidgeDropper has been reported in the wild. The threat actors have been observed using attack techniques that include code obfuscation and DLL sideloading. The attack vector involves luring victims mostly through phishing emails with rar attachments containing an obfuscated pdf file. Upon execution, this pdf file leads to download of an Xbox Game Bar background application process published by Microsoft. The application itself is benign but is used to sideload an obfuscated and malicious DLL file which then downloads the final payload. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based Trojan Horse Trojan.Gen.NPE WS.Malware.2 Machine Learning-based Heur.AdvML.A Heur.AdvML.B Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
New Mirai variant IZ1H9 is targeting the latest IoT vulnerabilities A new Mirai variant IZ1H9 has been reported to target several of the latest IoT vulnerabilities - CVE-2023-27076, CVE-2023-26801 and CVE-2023-26802 among others. Upon infection, the vulnerable devices become part of the Mirai botnet and allow the attackers full remote control. The malware will attempt to terminate various processes running on the infected host that belong to other botnets or different Mirai variants. The compromised devices can then be used to conduct DDoS attacks, among others. Symantec protects you from this threat, identified by the following: File-based Downloader.Trojan Linux.Mirai Linux.Mirai!g1 Linux.Mirai!g2 Trojan.Gen.NPE WS.SecurityRisk.4 Web-based Observed domains/IPs are covered under security categories
New Mirai variant targets TP-Link wireless router vulnerability A new variant of Mirai-based botnet campaign - also known as MANGA or Dark - targets a recently published TP-Link wireless router RCE vulnerability (CVE-2021-41653). Threat actors exploit the vulnerability to force the devices to download and execute a malicious script, which then downloads the main binary payloads. The updated firmware has already been released by TP-Link for the affected hardware version (TL-WR840N EU V5). Symantec protects you from these threats, identified by the following: File-based: Linux.Mirai Trojan.Gen.NPE WS.Malware.1 WS.Malware.2 Network-based: Attack: TP-Link Remote Code Execution CVE-2021-41653 Web-based Observed domains/IPs are covered under security categories
New Mirai variant V3G4 observed in the wild A new Mirai malware variant dubbed V3G4 has been discovered in the wild. The attackers leverage several different vulnerabilities for the purpose of its' distribution. Upon infection with V3G4, the vulnerable devices become part of the Mirai botnet and allow the attackers for a full remote control. The malware will attempt to terminate various processes running on the infected host that belong to other botnets or different Mirai variants. The V3G4 botnet might be further leveraged for the purpose of DDoS attacks, among others. Symantec protects you from this threat, identified by the following: File-based Linux.Mirai Trojan.Gen.NPE WS.Malware.1 Network-based Attack: Airspan AirSpot RCE CVE-2022-36267 Web Attack: Atlassian OGNL Injection CVE-2022-26134 Web Attack: Draytek Routers CVE-2020-8515 Web Attack: Webmin Remote Code Execution CVE-2019-15107 Policy-based DCS sandboxing of Linux applications prevents Mirai variant behavior of exploiting LOLBins to download malware from the attacker infrastructure. Web-based Observed domains/IPs are covered under security categories
New mobile malware spread by the DoNot (aka APT-C-35) APT group A new mobile malware variant has been observed being distributed by the DoNot (aka APT-C-35) APT group. The group is known to target governmental organizations in South Asia and their latest campaign is focused on Android users in the Kashmir region of India. The distributed malware comes disguised as a messaging app installer and has the functionality to collect conversations from social media apps, take screen captures and camera photos as well as record VoIP calls. The latest variants of the mobile malware used by DoNot threat actors leverage Firebase Cloud Messaging (FCM) for the purpose of C&C communication. Symantec protects you from this threat, identified by the following: Mobile-based Android.Reputation.2 AppRisk:Generisk Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
New modular backdoor SideWalk distributed by the SparklingGoblin APT group A new modular backdoor called SideWalk has been discovered. The malware is used by an advanced persistent threat (APT) group dubbed SparklingGoblin. The SideWalk malware shares multiple similarities with another backdoor used earlier by the group called CrossWalk. SideWalk can dynamically load and execute additional modules sent from its command and control (C&C) server. While the APT group has been targeting organizations from around the world since 2020, SideWalk backdoor has been used in a recent campaign aimed at a computer retail company based in the U.S. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.2 Trojan.Gen.MBT Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains are covered under security categories
New MosaicLoader malware targets people looking for cracked software A newly discovered malware named MosaicLoader is targeting people that are searching for pirated software or cracked passwords. The global campaign distributes the malware via search engine optimization (SEO) poisoning, advertising cracked installers for popular software. MosaicLoader is designed to deploy more second-stage payloads, including information stealers, cryptominers, backdoors, and remote access Trojans. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE Trojan.Maltrec.TS
New Nimbda loader leveraged by Tropic Trooper A new malicious campaign attributed to the threat actor Tropic Trooper uses a novel loader dubbed Nimbda and a new strain of malware from the Yahoyah trojan family. Nimbda malware comes bundled with an "SMS Bomber" which is a tool used to execute a DoS type attack against a specified phone number, flooding it with text messages. Yahoyah trojan is a piece of malware previously leveraged by Tropic Trooper and this most recent variant is used to collect information about local wireless networks. With the use of steganographic techniques, Yahoyah also drops the final payload of the campaign - TClient backdoor. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.SuspLoad!gen2 File-based Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.C Web-based Observed IPs/domains are covered under security categories
New phishing run serves benefit reports and payment amendments Threat actors continue to add creativity to phishing email templates and this time it's with employee benefits. In a recent phishing run, emails masqueraded as benefit reports or employee payroll amendment notifications are sent to recipients with attached fake documents containing phishing URLs. The email subjects contain the email ID part along with a timestamp. This is done to add a personal touch and lure the user into opening the email. The email body content is kept short and in some of the cases the content is embedded in an image. Listed below are few subjects of the observed phishing emails: Employee Payroll Amendment/Benefits Reports on [Day][Month][Year] [Time], for [email ID] Benefits Preview Approved: Salary' amendment for all (REVISED)[Day][Month]-[Year] [Time] Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
New phishing run spoofs International Card Services (ICS) Symantec has observed a new wave of phish runs spoofing International Card Services BV to steal credentials. In this run, threat actors have not hyperlinked the phishing URL but included it in plain text along with the email content. As the call to action in this phishing run, the email recipients are asked to to validate their email address. Interestingly for this supposed email validation process, the victims are required to copy and paste the actual phishing URL in the browser or type manually. The victims are served with credential harvesting webpages once the phishing URL opens in web browser. Email headers: Subject: laaste herrinering uw aandacht is vereist. Translated Subject: last reminder your attention is required. Subject: Laaste oproep uw aandacht is vereist. Translated Subject: Last call your attention is required. Subject: Heeft u een momentje voor ons? Translated Subject: Do you have a moment for us? Subject: Opnieuw identificeren bij Ics Translated Subject: Re-identify at Ics From: Mijn ICS Alerts <redacted_email_address> Translated From: My ICS Alerts <redacted_email_address> Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
New phishing run spoofs Mexican Postal Service (Correos de Mexico) Symantec has observed a new wave of phish runs spoofing Mexican Postal Service (Correos de Mexico) to steal credentials. The email content is kept specific and mentions an undelivered package. The reason for not delivering the package is stated as "failure to pay custom duties". To make the email content look real and personal, threat actors have included the recipient's email address in the invoice details. Upon clicking on the phish URLs presented in the email, the victims are served with credential harvesting webpages. Subject: En caso de impago, Su paquete será retenido ! Translated subject: In case of non-payment, Your package will be returned to the sender Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
New PRIVATELOG malware leverages CLFS log files for evasion A new malware family has been discovered that relies on the Common Log File System (CLFS) to hide a second-stage payload in registry transaction files in an attempt to evade detection. Common Log File System (CLFS) is a general-purpose logging subsystem introduced back in Windows Server 2003 R2 and used for building high-performance transaction logs. The malware dubbed as PRIVATELOG also comes with its own installer named STASHLOG. According to the released reports, the malware seems to be still in the development stages or might potentially be only used in a highly targeted activities. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.C Trojan Horse Trojan.Gen.MBT
New PurpleFox Backdoor called FoxSocket A new backdoor associated with PurpleFox, called FoxSocket, leverages WebSockets to communicate with C2 servers in a more covert way. PowerShell commands are downloaded from specific URLs hosted on compromised servers. The purpose of the commands is to install the initial MSI package as an admin without user intervention as it contains components for the backdoor. The notable characteristic is the use of WebSockets to communicate with C2 servers in a consistent open TCP connection. This creates a more silent exfiltration of data from the victims infected machine. Symantec protects you from these threats, identified as the following: File-based Trojan Horse Trojan.Gen.MBT WS.Malware.1 WS.Malware.2 Behavior-based ISB.Downloader!gen285 Machine Learning-based Heur.AdvML.B Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories
New Qakbot campaign observed using OneNote Qakbot is one of the most prevalent banking malware in the threat landscape and a new campaign has been observed. In this new campaign, spam actors have leveraged OneNote files that lead to the download of a malicious HTA file. If victims are successfully lured, the HTA will trigger the rest of the attack chain which involves CURL + Rundll32 to download Qakbot. Attack chain: Email > url > .zip (no password) > .one file > .hta embedded > runs curl + Rundll32 > executes Qakbot .dll Email > .one file attached > .hta embedded > runs curl + Rundll32 > executes Qakbot .dll Symantec protects you from this threat, identified by the following: Behavior-based SONAR.MSHta!g17 Email-based Coverage is in place for Symantec’s email security products File-based Downloader Trojan Horse Trojan.Malscript Trojan.Mdropper W32.Qakbot WS.Malware.1 Web-based Observed domains/IPs are covered under security categories
New Qakbot download pattern observed We have recently observed an increase of a new Qakbot download URL pattern in our data. The download is typically hosted on a compromised domain and the URL includes the pattern "catalogue-[digits].zip". This archive contains a malicious Excel file responsible for the next step in the infection chain. Symantec protects you from this threat, identified by the following: File-based Trojan.Mdropper Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains are covered under security categories
New Qakbot malspam campaign observed with malicious HTML file leading the attack chain Qakbot is one of the most prevalent banking malware in the threat landscape and a new campaign has been observed. Over the years, Malspam (basic malicious emails and stolen threads) continue to be used as the initial vector of infection, however the attack chain itself has continuously been cycled and sometimes includes new techniques. In this new campaign, spam actors have leveraged malicious HTML attachment (e.g. document, Infos, and various latin words followed by 4 random numbers) that lead to the download of a password protected ZIP which contains a malicious LNK file. If victims are successfully lured, the LNK will trigger the rest of the attack chain which involves CURL and WSCRIPT to download Qakbot. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products File-based ISB.Downloader!gen520 ISB.Downloader!gen523 Scr.Mallnk!gen3 Trojan Horse Machine Learning-based Heur.AdvML.B
New ransomware, Azov, only seeks damage The new ransomware name "Azov" is derived from the extension the encrypted files are renamed to which reference the Ukrainian Azov Regiment. It is distributed through pirated software, key generators, and adware bundles. According to the ransom note it claims to be created by known security researchers and to contact them, but this claim is false. Due to this ransom note providing false contact information there is no known decryption keys, so rather than ransomware it should be considered a destructive data wiper since there is no means to decrypt the files. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.Ransomware!g7 SONAR.Ransomware!g20 SONAR.Ransomware!g3 SONAR.TCP!gen1 SONAR.ProcHijack!g45 File-based Downloader Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.B
New Ransomware dubbed WannaFriendMe exploiting Roblox Roblox is an online gaming platform where users can create their own games and monetize them by selling Game Passes in order to avail special game offers. Game Passes can only be purchased with Robux, an in-game currency. Ransomware being referred to as WannaFriendMe appears to be mimicking Ryuk ransomware as it appends the .ryuk extension on to infected files, however research shows that the variant is more likely a Chaos ransomware. Instead of the usual cryptocurrency demands, WannaFriendMe will request victims to buy their decrypter using a Game Pass as their ransom payment. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.SuspDrop!gen1 File-based Ransom.Chaos WS.Malware.1 Machine Learning-based Heur.AdvML.B
New ransomware gang "Lorenz" New ransomware gang Lorenz - similar to that of a previous gang known as ThunderCrypt - are focusing their attacks on worldwide organizations to gain large payouts. Since its inception last month the Lorenz operation started infiltrating networks and infecting devices. As it spreads it harvests victims unencrypted files to remote servers that are out of reach. Victims are pressured for payment as the pilfered data is threatened to be published and sold to other threat actors. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.C Ransom.Gen Trojan.Gen.2 WS.Malware.1 WS.Malware.2
New ransomware group Memento Team New ransomware group "Memento Team" has a different approach to holding victim's files hostage. Instead of encrypting files - to avoid the detection of commodity ransomware by anti-ransomware protection - Memento Team skips encryption and moves the files into password protected archives instead. The group moves the files into archives with strong passwords, encrypt the key and then delete the original files. This tactic is to overcome detection from security software long enough to archive the files and drop the ransom note. Symantec protects you from these threats, identified by the following: File-based Hacktool.Mimikatz Hacktool.Mimikatz!g4 Trojan Horse Trojan.Gen.MBT Trojan.Seaduke W32.Beapy WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.B Heur.AdvML.C Network-based Ransomware C2 connectivity System Infected: Coinminer Activity 2 System Infected: Trojan.Coinminer Activity 26 System Infected: VBS CoinMiner Download Policy-based Symantec Data Center Security has zero day protection coverage for the adversary tactics and techniques used by the Memento ransomware actor. Web-based Observed domains/IPs are covered under security categories
New remote control backdoor leveraging malicious drivers emerges in China In a recent campaign observed in China, a new remote control backdoor was distributed. The threat actors behind the campaign utilized malicious kernel-mode drivers to carry out exploitation activities. The backdoor exhibited various capabilities, including disabling anti-virus software, stealing keyboard inputs, and downloading additional malware files such as miners and rootkits from command-and-control (C2) servers for execution. This campaign underscores the expectation that threat actors will continue to utilize rootkits to conceal malicious code from security tools, thereby weakening defenses and evading detection for extended periods of time. Symantec protects you from this threat, identified by the following: File-based Trojan.Malfilter WS.Malware.1 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
New Rust-based RansomExx variant A new variant of RansomExx ransomware has been identified in the wild, re-written using Rust programming language. RansomExx is an evolution of the older Defray ransomware family. The ransomware has been actively targeting several companies across the world since at least 2020. The reason for the switch to Rust is mainly due to higher AV evasion rates across various vendors on malware written in this programming language. The new variant RansomExx2 targets Linux environments for data encryption and will append random extensions to the encrypted files. Symantec protects you from this threat, identified by the following: File-based Linux.RansomEXX WS.Malware.1
New Rust-based SysJoker Malware An APT campaign was reported to be associated with Hamas-linked threat actors utilizing a new multi-platform Rust-based malware dubbed 'SysJoker'. The new variant, although rewritten from its former C++ based code, maintains its original functionality such as collection of victims' computer information including OS version and MAC address among others, sending it back to the attacker's C2 server hosted via OneDrive. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based Trojan Horse Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!100 Network-based System Infected: Trojan.Backdoor Activity 634 (33246) Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
New Sayler RAT A new Remote Access Trojan named "Sayler" has been identified. This malicious software has a arsenal of capabilities encompassing of keylogger, information stealer, screen capture, and ransomware to name a few. Sayler RAT infiltrates a users system via either spam mails or deceptive websites and is designed to grant covert remote access to exfiltrate the captured information. Symantec protects you from this threat, identified by the following: File-based Trojan.Maljava
New Sharkbot banking malware campaign A new campaign distributing the Sharkbot mobile banking malware versions 2.29 - 2.32 has been observed in the wild. The malware has been spread via malicious apps located on Google Play store and targeted at banking users from Italy, UK, Germany, Spain and Poland, among others. Sharkbot droppers have been masquerading as a tax calculation app named 'Codice Fiscale' or a file manager application. The droppers contain functionality to check for the SIM country location and compare against the list of specified targeted countries. If there is no match the malware will exit without performing any malicious actions. Symantec protects you from this threat, identified by the following: Mobile-based Android.Malapp Android.Reputation.2 AppRisk:Generisk
New spear phishing campaign by Iranian threat actor Sandstorm targeting researchers A recent spear phishing attack conducted by the Iranian threat actor Sandstorm and targeting researchers and universities has been reported. The attackers employ phishing lures, utilizing compromised genuine email accounts to trick victims into downloading malicious files, with the intent of stealing sensitive data. Notably, a newly identified custom backdoor named MediaPI has been observed in action. This backdoor sends encrypted communications to Sandstorm's command-and-control (C2), masquerading as Windows Media Player and incorporating encryption features while manipulating images for C2 information. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.MBT WS.Malware.1 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
New Stealerium stealer variant distributed by Warp malware A new campaign observed in the wild has been reported to leverage Warp malware to distribute a new variant of the Stealerium infostealer to the victims. The used Warp malware consists of a Go-based Warp Loader component delivered to the victims as a malicious email attachment and a Warp Dropper component responsible for distributing and executing the infostealing payload. The Stealerium infostealer aims to steal system information, credentials, banking details, crypto wallets, and web browser cookies, among others. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.MBT WS.Malware.2 Machine Learning-based Heur.AdvML.A Heur.AdvML.A!500 Heur.AdvML.B Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
New StrelaStealer distribution campaign A new StrelaStealer distribution campaign has been reported in the wild. The malware is an infostealer variant first discovered back in 2022. StrelaStealer targets exfiltration of email login credentials from various email clients. The malware is spread via malspam delivering malicious JScript files within .zip archives. The payload is delivered as a .DLL binary. Latest StrealStealer variant introduces updates within the infection chain and the used obfuscation - all focused on detection evasion. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Crtutl-CPE!g1 ACM.Findstr-Dl!g1 ACM.Ps-Rd32!g1 ACM.Ps-Wscr!g1 ACM.Wscr-Rd32!g1 Behavior-based SONAR.SuspPE!gen7 File-based Scr.Malcode!gen Scr.Malcode!gen130 Trojan Horse Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.1 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
New StrelaStealer malware targeting mail credentials A StrelaStealer malware using the Spanish language has been observed in the wild. The attack chain involves an ISO file via email attachments. The ISO file contains LNK and HTML files which load the malware when executed. The malware then searches for email account credentials of popular email clients like Outlook and Thunderbird and exfiltrates their contents to C2 servers. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products File-based Downloader Trojan Horse Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B
New StrRAT fakes ransomware Security Response is aware of a malware campaign that pushed the Java-based STRRAT remote access trojan (RAT). The malware was delivered in a spam run in which the recipients were lured into opening a malicious attachment. This variant of STRRAT is not only designed to steal credentials and passwords from popular browsers and email clients but also adds a ".crimson" extension to the files in the compromised machine without actually encrypting them in hope that the users are scared enough to pay ransom. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.NPE Scr.Malcode!gen Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
New STRRAT variant observed in the wild A new 1.6 variant of the Java-based STRRAT has been observed in the wild. The malware is spread via malspam containing .pdf attachments that lead to .zip archives download and to payload delivery via malicious JavaScripts. STRRAT functionality remains mostly unchanged when compared to older variants and involves credentials theft, keylogging, command execution, taking control over the infected system and download / installation of additional arbitrary payloads, among others. The new 1.6 variant has been updated by the threat actors with two string obfuscation techniques, enhancing the malware's detection evasion potential. Symantec protects you from this threat, identified by the following: File-based ISB.Dropper!gen12 ISB.Dropper!gen35 Trojan Horse Trojan.Gen.NPE Scr.Malcode!gen Scr.Malcode!gen69 WS.Malware.1 Network-based System Infected: JS.Downloader Activity 34 System Infected: Trojan.Backdoor Activity 410 Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
New technique seen used with Zloader A new technique has been observed with phishing email MS Word document attachments that results in the downloading of Zloader. The Word document with macros that, when enabled, downloads a password protected Excel file. The Word file uses the data found in the Excel file to create a new macro module which updates the Excel file to change the configuration of the victims machine. The configuration change is to bypass user intervention to prevent disabling of Excel macro warnings and to run the new malicious macro in the Excel file. The malicious macro does the final download of the payload and execution of the DLL. Symantec protects you from this threat, identified by the following: File-based ISB.Downloader!gen411 Trojan Horse W97M.Downloader WS.Malware.1 Website-based This attack is proactively blocked by Symantec Web Isolation technology
New Telegram RAT more than meets the ToxicEye Symantec Security Response is aware of a new RAT that uses Telegram for C&C. Dubbed as ToxicEye, the RAT is capable of stealing information, encrypting files on the compromised machines and taking over the microphone and camera for recording. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Heur.AdvML.C
New Telekopye bot reported in the wild A new Telekopye botnet has been reported in the wild. Telekopye is a Telegram bot that helps threat actors scam people in online markets. The bot has capabilities that include creating phishing websites, sending phishing emails, SMS messaging, and creating fake screenshots. These bots are used by threat actors to fool people into disclosing their personal information, such as online credentials and financial details. The primary targets observed in this recent campaign are online markets like OLX, Yula, BlaBlaCar, eBay, etc. Symantec protects you from this threat, identified by the following: File-based Trojan Horse WS.Malware.2 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
New threat group leveraging PowerMagic backdoor and CommonMagic framework According to a recent report, a previously unknown threat actor has been engaged in attacks against organizations based in Donetsk, Lugansk, and Crimea territories. The attackers have been leveraging a new modular malware framework called CommonMagic as well as PowerMagic backdoor. The infection chain involves .lnk files extracted from .zip archives that lead to .msi installers containing encrypted payload binaries and .vbs scripts. The dropped malware attempts data collection and additional functionality allows the attackers to collect screenshots from the infected endpoints. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based CL.Downloader!gen89 Trojan Horse Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.B Heur.AdvML.C Network-based System Infected: Trojan.Backdoor Activity 634 Web-based Observed domains/IPs are covered under security categories
New updated version of the large-scale Fodcha botnet Fodcha is a large-scale DDoS botnet initially discovered back in April 2022. The malware is known to be distributed through the exploitation of exposed vulnerabilities as well as through brute force attempts on weak Telnet/SSH credentials. It has been reported that a new version of Fodcha is currently in circulation. The attackers have updated the used communications protocols as well as started to leverage additional algorithms for communication encryption. Fodcha is known to target various architectures including arm, mips, mpsl, and x86, among others. Symantec protects you from this threat, identified by the following: File-based Linux.Lightaidra Linux.Mirai Trojan.Gen.NPE WS.Malware.1 Web-based Observed domains/IPs are covered under security categories
New variant of Agent Tesla found in the latest campaigns Agent Tesla was among the most common malware families observed in the wild last year. The malware is usually delivered via malspam campaigns where a large quantity of emails containing malicious archives is spammed out. Agent Tesla continues to evolve and is known to include features specific for both infostealers and remote access trojans. According to the newest reports, the latest iterations of Agent Tesla focus on improving malware detection evasion and implementing additional communication channels. Symantec provides the following protection against latest Agent Tesla attacks: File-based Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE Trojan Horse
New variant of Android GravityRAT malware emerges A new variant of the Android malware known as GravityRAT has been observed in the wild. The malware is distributed as a trojanized version of OMEMO Instant Messenger and branded as BingeChat app. Already in the past campaigns GravityRAT has been masquerading as similar messaging apps, for example Chatico. The malicious apps are usually not hosted on GooglePlay but distributed through malicious download websites advertising free messaging solutions. This latest variant of GravityRAT has added functionality to delete files on the infected devices as well as WhatsApp backup files extraction capability. Symantec protects you from this threat, identified by the following: Mobile-based Android.Reputation.2 AppRisk:Generisk Web-based Observed domains/IPs are covered under security categories
New variant of Chameleon Android malware allows for biometric authentication bypass Chameleon is an Android banking malware that first emerged at the beginning of 2023. The malware has been used in earlier campaigns targeting Android users in Australia and in Poland and has been distributed under the disguise of banking or cryptocurrrency apps. Chameleon's capabilities include keylogging, SMS harvesting, credential theft and cookie stealing, among others. The most recently discovered variant of this malware allows the attackers to bypass the biometric authentication on the infected device, forcing it to fallback to standard authentication means such as PIN entry and unlock the device. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk Android.Reputation.1 Android.Reputation.2
New variant of IDAT Loader leveraged for Remcos malware delivery A new variant of the IDAT Loader malware has been leveraged in a latest campaign targeting Ukraine affiliated entities in Finland. IDAT is a versatile loader known to be used to deliver a wide range of payloads. Previously there have been instances of this loader distributing Danabot, SystemBC or Redline Stealer, among others. The latest campaign has been attributed to the UAC-0184 threat group. The threat actors have been using steganographic techniques to obfuscate the delivered malicious payload - commercial RAT (Remote Access Trojan) known as Remcos. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Ps-Wscr!g1 ACM.Wscr-CNPE!g1 ACM.Wscr-FlPst!g1 File-based CL.Downloader!gen111 ISB.Downloader!gen63 Scr.Malcode!gen Scr.Mallnk!gen13 Trojan Horse Trojan.Gen.MBT Trojan.Gen.NPE Trojan.Mdropper Web.Reputation.1 WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.A!400 Heur.AdvML.A!500 Heur.AdvML.B Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
New variant of JsOutProx RAT JsOutProx is another Java-based Remote Access Trojan that's been active in the threat landscape since at least 2019. Nowadays, this malware is mostly distributed via malspam campaigns, and recently a new variant has been observed. The actors behind this malware are known as Solar Spider. Symantec protects you from this threat, identified by the following: File-based Backdoor.Trojan Trojan.Horse
New variant of Lador backdoor out for OSX Symantec Security Response recently came across a new variant of Lador backdoor malware. The malware is Go-compiled and is built to use on Mac machines. As it's written in Go (Golang), the same malware code can be compiled to run on other platforms such as Windows and Linux. Symantec provides the following detection against this new variant of Lador backdoor: File-based OSX.Trojan.Gen
New variant of MasterFred installs Xenomorph Banking Trojan via Gymdropper A new variant of MasterFred (aka Brox) malware, attributed to the threat actor known as Hadoken Security, was recently seen as a hosted application on the Google Play Store. This malicious application uses Gymdrop dropper to download the Xenomorph Android banking trojan to infect the victim’s device. This new variant acts as a hostile downloader instead of performing the trojan activities directly. Droppers are used as a means to bypass the security mechanisms implemented by the Google Play Store for flagging rogue applications. Symantec protects you from this threat, identified by the following: Mobile-based Android.Reputation.1 Android.Reputation.2 AppRisk:Generisk
New variant of PlugX delivered by MustangPanda Mustang Panda is an APT group known to be targeting both governmental and non-governmental organizations all over the world. This APT group has recently been observed targeting the Taiwanese government and diplomats with a new PlugX malware variant. Using a decoy PDF, a legitimate executable is used to deploy a malicious DLL now written in the Nim programming language. A DAT file containing PlugX is then decrypted and loaded into memory. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.MBT WS.Malware.2 Machine Learning-based Heur.AdvML.C Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
New variant of RisePro malware comes with RAT functionality RisePro is an infostealer variant known to be spread in the form of malicious cracked software packages via the PrivateLoader malware. The stealer targets cookies, saved credentials, banking information and crypto wallets on the infected endpoints. The most recent variant of RisePro has been seen exhibiting some additional RAT-like functionality and enabling the attacker's remote control functions over the compromised machines. For that purpose the malware leverages HVNC (Hidden Virtual Network Computing) communication with the threat actors. Symantec protects you from this threat, identified by the following: Behavior-based ACM.Ps-Rd32!g1 ACM.Ps-RgPst!g1 ACM.Untrst-Schtsk!g1 SONAR.Heuristic.159 SONAR.SuspStart!gen15 File-based Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Network-based System Infected: Trojan.Backdoor Activity 634 System Infected: Trojan.Backdoor Activity 656 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
New variant of RustBucket malware for macOS A new variant of RustBucket malware targeting macOS users has been observed in the wild. The malware was first reported in early May 2023, it's operation being attributed to the BlueNoroff threat group (also associated with Lazarus APT). The malware seems to be under continuous development and in the latest campaign it is able to achieve persistence on macOS through the utilization of LaunchAgents. On compromised systems the malware helps the threat actor to collect information around installed applications, running processes and their status, current timestamp, etc., and later exfiltrate the collected data to the attacker's C2 servers. Symantec protects you from this threat, identified by the following: File-based OSX.Trojan.Gen WS.Malware.1 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
New variant of Sardonic backdoor used by FIN8 APT to deliver Noberus ransomware Symantec’s Threat Hunter Team, a part of Broadcom, recently observed the Syssphinx (aka FIN8) cyber-crime group deploying a variant of the Sardonic backdoor to deliver the Noberus ransomware. While analysis of the backdoor revealed it to be part of the Sardonic framework previously used by the group, it seems that most of the backdoor’s features have been altered to give it a new appearance. Syssphinx (aka FIN8) is a financially motivated cyber-crime group known for targeting organizations in the hospitality, retail, entertainment, insurance, technology, chemicals, and finance sectors. Read more in our blog: FIN8 Uses Revamped Sardonic Backdoor to Deliver Noberus Ransomware Symantec protects you from this threat, identified by the following: File-based Hacktool.Mimikatz Trojan Horse Trojan.Gen.MBT WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.A Heur.AdvML.B Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
New variant of the Apostle ransomware discovered A new variant of the Apostle ransomware has been discovered in the wild. The malware is associated with the threat group known as Agrius, which has been active during 2020 and 2021 with several malicious campaigns. The newly reported attacks leverage a loader malware dubbed Jennlog which attempts to masquerade the final payload as log files. A second variant of the Jennlog loader has been reported to download a different payload from the OrcusRAT family. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.B Heur.AdvML.C Trojan.Apostrius Trojan Horse Trojan.Gen.MBT
New variant of the Sysrv botnet used in campaign distributing XMRig coinminer A new variant of the Sysrv botnet has been observed in a recent campaign distributing XMRig coinminers. The attack leverages exploits for several well-known application vulnerabilities in Apache Struts (CVE-2017-9805) and Atlassian Confluence (CVE-2023-22527 and CVE-2021-26084). The attackers have also been reported to compromise a legitimate domain of an academic institution and use it to host malicious payloads. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Ps-Wscr!g1 File-based Trojan.Gen.NPE WS.Malware.1 WS.Reputation.1 Machine Learning-based Heur.AdvML.B Network-based Attack: Apache Struts CVE-2017-9805 2 Web Attack: Atlassian Confluence RCE CVE-2023-22527 Web Attack: Confluence RCE CVE-2021-26084 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
New variant of WhiteSnake Infostealer A new variant of the WhiteSnake Stealer has been discovered in the wild. This malware boasts enhanced AntiVM features to detect sandboxed and virtual environments. It is capable of hijacking a victim's microphone and webcam, effectively transforming personal devices into surveillance tools. Additionally, it extracts various types of sensitive information from compromised machines, including system information, cookies, login credentials, browsing history, and cryptocurrency wallets. Once collected, the compromised data is exfiltrated to the threat actor's Command-and-Control (C&C) server. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Untrst-RunSys!g1 Behavior-based SONAR.Stealer!gen1 SONAR.MalTraffic!gen1 File-based Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Network-based Audit: Bad Reputation Application Activity System Infected: Trojan.Backdoor Activity 568 Web Attack: Webpulse Bad Reputation Domain Request
New variant of WizardUpdate (aka UpdateAgent) discovered Earlier this month, a group of researchers disclosed their findings about the latest macOS malware known as WizardUpdate (aka UpdateAgent). Initial reports about the threat first came to light in November last year and successive variants have been emerging ever since. The latest variants contain several upgrades including the ability to: deploy secondary payloads downloaded from cloud infrastructure grab the full download history of infected Macs by enumerating LSQuarantineDataURLString using SQLite bypass Gatekeeper by removing quarantine attributes from downloaded payloads modify PLIST files using PlistBuddy leverage existing user profiles to execute commands change the sudoers list to give admin permissions to regular users Symantec protects you from this threat, identified by the following: File-based Backdoor.Trojan Behavior-based OSX.WizardUpdate
New variants of the android malware distributed by the C-23 APT group According to a recently released report, new variants of the Android malware previously attributed to the APT group known as C-23 have been discovered. The malware masquerades as software update apps and might be delivered to users via SMS messages containing download links. The threat actors added some new features to the new variants that allow for greater evasiveness of the threat. The android malware distributed by the C-23 threat group has the ability to collect various data from the compromised devices including logs, contacts, images and documents but can also record audio/video and take screenshots. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk Android.Reputation.2 Android.Reputation.3 AppRisk:Generisk
New Venom RAT variants come with an infostealing module A latest variant of the Venom RAT malware has incorporated some additional info-stealing functionality. The malware is offered for sale on underground forums and the new version has been advertised with the addition of features allowing for theft of passwords, cookies, bookmarks and autofill data stored in browsers. Once collected the confidential data is extracted to the C2 servers controlled by the attackers. Aside of the infostealing functionalities, Venom still possesses typical RAT features seen in its' previous variants, including launch of hidden Explorer and PowerShell sessions, remote keylogger, Shell command execution, download and execution of arbitrary files and others. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.ProcHijack!g45 SONAR.SuspDataRun SONAR.SuspDrop!gen1 SONAR.TCP!gen1 File-based Scr.Malcode!gdn14 Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT W32.Fixflo.B!inf WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.B