text
stringlengths 0
383k
|
---|
New version of Aberebot in the wild and source code for sale
Android malware known as Aberebot is able to steal users credentials of multiple banks, social media accounts and cryptocurrency services by overlaying phishing pages when it notices a user's activity and interaction with certain apps and websites (leveraging Accessibility Service). It's also able to perform classic actions such as collecting sensitive device information, stored files, contacts and SMS.
Recent reports indicate that a new version of this malware has been seen in the mobile threat landscape. Aberebot was actively advertised on underground forums for $7000, although in newer posts, the malware author appears to have discontinued its development, instead opting to sell a lifetime license for $300 and the source code for $3000.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk |
New version of CopperStealer in-the-wild
CopperStealer is relatively new, being first observed earlier this year on websites that host fake cracked software. The author behind this run-of-the-mill infostealer continues to improve it and a new version has been spotted in-the-wild. Over the last few weeks the modus operandi hasn't changed, continuing to make consumers the main target.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.MBT
Trojan Horse
Network-based
System Infected: Trojan.Backdoor Activity 564
System Infected: Trojan.Backdoor Activity 634
Machine Learning-based
Heur.AdvML.B |
New version of GoMet backdoor targets organizations in Ukraine
A new variant of the GoMet backdoor has been discovered in campaigns targeting organizations in Ukraine. GoMet, as the name suggests, is written in the Go programming language and includes functionality for remote command execution as well as file upload/download. The malware has the ability to run scheduled cron jobs thereby ensuring a constant connection to the attacker's C2 servers
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Web-based
Observed IPs are covered under security categories |
New VileRAT variant in the wild
A new variant of the VileRAT malware, linked to the DeathStalker (Evilnum) threat group, has been discovered in the wild. Programmed in Python, VileRAT exhibits features such as remote access, keylogging, remote command execution, and information gathering. The most recently observed campaigns leverage NSIS installers and VileLoader malware to deliver VileRAT payloads.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.Dropper!gen2
File-based
Trojan.Dropper
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
WS.Reputation.1
Machine Learning-based
Heur.AdvML.A!500
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
New "Vizom" malware targets Brazilian online banking
Symantec Security Response is tracking malware dubbed "Vizom" which is endangering online banking users in Brazil. This new banking malware is not only designed to steal banking-related credentials from the infected machine, but also acts as a Remote Admin Tool (RAT) and keylogger.
Symantec detects Vizom as the following:
File-based protection
Trojan.Gen.MBT
Trojan Horse |
New Voice Message PDF attachment phishing
In a recent phishing run, emails containing a PDF attachment posing as a voice message notification has been sent to recipients. The PDF contains the format of a "new voice message received" template with criteria outlining the caller ID, message length, and a voicemail preview which defaults with a "Unfortunately, the transcript for this message is unavailable at this moment". The call to action is for the recipient to click the phishing URL to "Listen to the voice message".
Email Headers:
Subject: New Voice Message Attached from <call number> - WIRELESS CALLER
Attached File-name: Voicemail(1).pdf
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec's email security products
File-based
Trojan.Pidief
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
New wave of malspam spreading IcedID malware
IcedID also known as Bokbot is a malware first observed around 2017. Historically IcedID was mainly a banking trojan, but with time its focus shifted on being a loader for follow-on infections of various payloads including ransomware. New malspam campaigns distributing IcedID have been observed in the wild just this week. The infection chain involved emails containing .PDF attachments disguised as invoice notices with filenames such as "INV-Details-JUL23.pdf" or "Scan_Doc_07-26.pdf". The PDF documents contained a link redirecting the victims to a download of a compressed and password-protected zip archive. Upon extracting and running the executables within, the IcedID payload was being delivered to the victims.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.IcedID!g4
Email-based
Coverage is in place for Symantec’s email security products.
File-based
Scr.IcedID!gen3
Scr.Malcode!gdn28
Scr.Malpdf!gen2
Trojan.Gen.MBT
Trojan Horse
WS.Malware.1
Machine Learning-based
Heur.AdvML.C
Network-based
System Infected: Trojan.Backdoor Activity 634
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
New wave of snowshoe spam comes with fake product promotions
Threat actors have come up with a new trick to flood and spam users by designing and executing a new wave of snowshoe campaigns. These snowshoe runs have recently appeared on the radar with an abuse of sa.com. Sa.com is a subdomain of .COM for the Kingdom of Saudi Arabia. Randomized domain names registered around the year 1998 are abused in this particular campaign. In general, snowshoe runs appear in small bursts of email volume. Contrarily in this case, Symantec observed a single outburst of over one million emails spanning over various fake product promotions. These detected emails showcase the attackers tactics to lure recipients into falling for such "too good to be true" offers. The email subjects entice recipients to open them and initiate a click bait reaction.
Listed below are few of the observed email subjects:
Increase your Internet speed with this WIFI Booster!
Track Your Vehicle in Real-Time - Anywhere!
Goodbye to Painful Aches - Get Relief Now
Get a Brighter Smile in Just 7 Days!
Track of your health with this SmartWatch!
Your Virtual Concierge is Here!
4K Drone - Get Professional Quality Video for a Low Price!
Simple 7-second "Fungus Vanishing" Ritual Clears Nails 3X Faster
This Solar powered flashlight is life saving!
This Device Translates 36 Languages Instantly!
3 Days to Control Blood Sugar - It's Possible!
Natural Way of Regrowing Hair !
Portable Vacuum Cleaner, Take Anywhere!
Say Goodbye To Lower Back Pain !
Do you want to find a solution to fight back lurking thieves?
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
New wave of Zloader
Late last year, a new variant of the infamous Zeus banking malware called Zloader showed up and has continued its dirty work via a multitude of spam campaigns. The group behind this variant has been very active in the maintenance and development of their malware resulting in multiple different versions this year.
In September and October we observed a spike in Zloader activities, with a number of new command-and-control servers associated with these recent spam campaigns.
Symantec has the following protections against Zloader:
File-based
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
W97M.Downloader
Heur.AdvML.B
Heur.AdvML.C
WS.Malware.1
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. |
New Xloader campaign leverages steganography
Xloader is a re-branded variant of the infamous Formbook infostealer. Like its predecessor, Xloader's purpose is to steal credentials and web browser cookies, log keystrokes on the compromised machine as well as take screenshots and steal other sorts of user's data. A new campaign has been identified that leverages spam emails with .pdf attachments during the initial execution stage. Further up the infection chain additional embedded malicious documents in .xlsx and .rtf formats are also used. This Xloader distribution campaign also makes use of steganographic techniques to hide malicious content in bitmap files.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec's email security products
File-based
Packed.Generic.661
Scr.Malcode!gdn30
Trojan Horse
Trojan.Formbook
Trojan.Gen.MBT
Trojan.Gen.NPE
Trojan.Mdropper
Machine Learning-based
Heur.AdvML.B
Web-based
Observed IPs/domains are covered under security categories |
New Zebrocy Activity
The malware group known as Zebrocy (aka Earworm) has been active for a while now, and have been involved with intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia. The group use spear-phishing emails to compromise their targets and infect them with malware.
More recently, there has been new activity and researchers have shed light on one of the attack stages related to that activity, in this case the dropper.
Symantec protects you from this threat, identified by the following:
File-based
Heur.AdvML.C
ISB.Downloader!gen68
ISB.Dropper!gen1
WS.Malware.1
Behavior-based
SONAR.MalTraffic!gen3
SONAR.MSWord!g7 |
New Zloader trojan exploiting Microsoft’s Signature Verification in the wild
A new campaign involving the Zloader, a banking malware designed to steal user credentials has been observed in the wild. The malware exploits Microsoft’s signature verification mechanisms to inject its payloads into signed system DLL to hide its presence on the infected system. A legitimate remote monitoring and management software called Atera is used as part of this infection chain, the same software was reported to be used by the Conti ransomware group to gain persistence and remote access.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.MBT
Trojan.Malfilter
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Network-based
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories |
Nexus Android banking malware
Nexus is a new banking malware developed for the Android platform and sold in the form of a Malware-as-a-Service (MaaS) subscription. Source code similarities and some overlap of the executed commands indicate that Nexus might be an evolution of the well known SOVA banking malware. Nexus is able to perform Account Takeover (ATO) attacks in which the attackers take ownership over the online banking or cryptocurrency accounts with help of stolen credentials, SMS interception or takeover of 2FA codes.
Symantec protects you from this threat, identified by the following:
Mobile-based
Android.Reputation.2
AppRisk:Generisk
Web-based
Observed domains/IPs are covered under security categories |
Ngioweb botnet targeting IoT devices
Recent online reports suggest that Ngioweb malware is in the wild. Ngioweb is a Linux malware that infects vulnerable IoT devices in order to construct a botnet.
Symantec detects this malware as follows:
File-based
Trojan Horse
Trojan.Gen.NPE |
Nibiru ransomware threatens its own catastrophe
Nibiru, a.k.a. Planet X, is a large planetary object that is believed will hit the Earth sometime in the 21st century bringing about much destruction. A new ransomware that has been named after the doomsday harbinger is destined to have a similarly catastrophic effect on the files on an infected machine. It also aims to destroy the victim's financial state as its ransom is set at an astronomical $4.5 million worth of Bitcoin. Files encrypted by Nibiru ransomware will have a standard .nibiru file extension.
Symantec protects users from Nibiru ransomware as follows:
File-based
Ransom.Cryptolocker |
NicoMiner - a new Monero coinminer
Symantec Security Response has been aware of the released report about a new coinminer dubbed as NicoMiner. This Monero mining malware has been observed to be distributed via exploitation of various vulnerabilities and it targets both Windows and Linux platforms.
Symantec has the following coverage in place for the NicoMiner malware:
File-based
Trojan.Gen.2
Trojan.Gen.MBT
Trojen.Gen.NPE
Trojan Horse
WS.Malware.1 |
Nightingale Stealer
Nightingale is yet another stealer with run-of-the-mill capabilities that has recently been observed advertised on various platforms and also used in cybercrime attacks (drive-by-download). If someone is successfully lured into executing this threat, among other things it will gather data, including browser, crypto wallet, and system specifications.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.Dropper
File-based
Trojan.Gen.MBT |
NimzaLoader - new malware associated with TA800 discovered
According to a recent report, a new malware dubbed NimzaLoader has been discovered. NimzaLoader is written in the Nim programming language and has been associated with the activities of the TA800 APT group. The malware functionalities include executing powershell commands and injecting shellcode into processes among others.
Symantec provides the following detection against NimzaLoader:
File-based
Trojan.Gen.MBT |
Nitol DDoS malware leveraged for Amadey bot distribution
Nitol malware has been leveraged to install the Amadey bot in some recent campaigns. Nitol is a well known DDoS malware that support several different DDoS attack executions. The malware may also download additional payloads or run updates depending on the commands received from the C2 servers. The Amadey bot distributed in the reported campaigns might be further used by the threat actors to collect data from the infected endpoints or to download yet more malicious payloads.
Symantec protects you from this threat, identified by the following:
File-based
MSIL.Downloader!gen8
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Network-based
System Infected: Backdoor.Nitol Activity
System Infected: Trojan.Backdoor Activity 634
Web-based
Observed domains/IPs are covered under security categories |
Nitrogen, initial access malware infects through malvertising
Nitrogen is a malware family used for initial access to the victims machine. The infection comes through malvertising, abusing paid ads on search engines masquerading as legitimate sources for popular software. From the fake but legitimate-looking site, the victim will download an ISO file with an installer which will install the legitimate software the person was looking for, as to avoid initial suspicion, along with a Python running environment and a malicious Python package. Using the Python module installed, the next step will secure the access to the victim's machine connecting to the C2 servers, letting the threat actors know a new machine is infected and installing Meterpreter and possibly Cobalt Strike. After this, the threat actors could exploit the machine themselves or sell the access to other groups.
Symantec protects you from this threat, identified by the following:
File-based
Meterpreter
Trojan Horse
Trojan.Emotet
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
WS.Malware.2
WS.SecurityRisk.1
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Nitrogen malware delivery campaign
A new malicious campaign spreading the Nitrogen malware has been observed in the wild. The attack leverages malvertising techniques via Google Ads and the malware binaries are masqueraded as PuTTY or FileZilla software installers. Nitrogen uses DLL sideloading to infect the targeted system. Once deployed this malware is generally used to gain initial access allowing network compromise and additional arbitrary payload deployments.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Ps-Rd32!g1
File-based
Trojan.Gen.NPE
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Nitrokod - a cryptomining campaign
A new cryptomining campaign dubbed Nitrokod has been reported to infect machines across 11 countries worldwide. The malware is distributed via free software available to download via multiple sharing sites. One of such applications is “Google Translate Desktop”, which once installed initiates a delayed multi-stage infection process ending up with XMRig miner payload.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen6
File-based
Trojan Horse
Trojan.Gen.2
WS.Malware.2
Machine Learning-based
Heur.AdvML.B
Web-based
Observed domains are covered under security categories |
Nitro ransomware
Nitro is a run-of-the-mill ransomware variant initially discovered in 2021 and reportedly created for educational purposes only. New variants of this malware are occasionally found in the wild indicating it remains in use. Its' impact though seem to be pretty limited. In terms of ransom, instead of any payment Nitro asks for Discord Nitro subscription gift codes. Aside of the usual ransomware functionality, Nitro has also capability to steal Discord tokens from the infected machine.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.B |
NjRAT, long of tooth, can still bite
NjRAT is a run-of-the-mill remote access trojan that has been around since at least 2013 and as of today is still actively used by multiple groups and individuals. Over the years its source code and variants have been echoed countless times on social media, hosting services for software development and version control, as well as hacking websites and forums. Both consumers and enterprises have been the target of actors running malicious email and drive-by-download campaigns disguised as fake updates, cracked software, game mods and hacks. In recent weeks Symantec has observed a measurable uptick in the threat landscape.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
File-based
Backdoor.Ratenjay
Backdoor.Ratenjay!gen3
Downloader
Trojan Horse
Machine Learning-based
Heur.AdvML.B |
NjRAT and Nanocore are still waiting for those orders
NjRAT (also known as Bladabindi or Ratenjay) and Nanocore belong to the most prevalent Remote Access Trojan families observed in the wild this year. Both RATs are commonly used to capture data from the compromised devices including grabbing keystrokes, collecting stored credentials or browser history etc. Just this week we have noticed interesting malspam runs that utilize fairly common "shipment tracking" or "fake order" themes. The payloads delivered in those runs have been determined either as NjRat or Nanocore.
Email subjects:
"Any news about this Order?"
"Any news about this Order PV20035320 ?"
"Please Update us on this Order"
Email attachments:
"dansk_order.rar"
"PV20035320.rar"
"rfq00092.rar"
Symantec continuously monitors these threats in order to keep our customers protected against the latest variants. Below is our current protection for the samples and emails associated with the campaigns mentioned as well as other recently identified NjRAT and Nanocore samples.
File-based:
Backdoor.Ratenjay
Backdoor.Ratenjay!gen3
Trojan.Gen.2
Trojan.Gen.MBT
Trojan Horse
Trojan.Nancrat
WS.Malware.1
WS.Malware.2
Email-based:
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Website-based
This activity is proactively blocked by Symantec Web Isolation technology |
NjRAT campaign: Spanish consulting, healthcare and energy industries targeted
In Mid-November, Symantec observed an actor attempting to infect Spanish industries and organizations with a well-known remote access trojan that goes by the name NjRAT. The malicious emails (subject: ENVIO FACTURAS SOLICITADA (Facturas Nº:232683)) impersonate a German manufacturer of building materials - or its Spanish subsidiary to be more specific - in a bill-based social engineering scheme.
In terms of victimology, they have primarily targeted consulting, healthcare, and energy-related companies. If a user happens to be lured, they will open the attached archive (FACTURAS.rar) and then the NjRAT binary (FACTURAS.exe) disguised as a fake bill.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
Behavior-based
ACM.Untrst-FlPst!g1
SONAR.SuspBeh!gen625
File-based
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B!100 |
NjRAT remains active in the wild
NjRat (also known as Bladabindi or Ratenjay) is one of the most widely used Remote Access Trojans (RATs) of the last decade. Symantec continues to observe the activities of this malware family also in 2022. NjRAT is used extract data from the compromised endpoints and this includes logged keystrokes, stored credentials, browser history etc. Some later NjRAT variants also target cryptocurrency wallets. This RAT furthermore allows the attackers to send commands via remote shell, manipulate the registry as well as download additional arbitrary files.
Symantec protects you from this threat, identified by the following:
File-based
Backdoor.Ratenjay
Backdoor.Ratenjay!gen2
Backdoor.Ratenjay!gen3
Downloader
MSIL.Trojan!gen2
Packed.Generic.619
Scr.Malcode!gdn14
Trojan Horse
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Network-based
System Infected: Backdoor.Ratenjay RAT Activity
System Infected: Trojan.Backdoor Activity 555
System Infected: Trojan.Backdoor Activity 634
Web-based
Observed IPs/domains are covered under security categories |
NjRAT spread across the Middle East and North Africa using geopolitical lures
An active campaign using Middle Eastern geopolitical-themed lures to distribute NjRAT has been spotted across the Middle East and North Africa. Arabic speaking users are lured into downloading infected cab files hosted on compromised hosting servers. Opening the lure file infects the victims’ machines with a PowerShell script dropper which is responsible for loading the NjRAT binary into memory.
NjRAT allows attackers to conduct malicious activities on infected systems such as log keystrokes, access the victim’s camera, steal credentials stored in browsers, open a reverse shell, upload/download files, perform process, file, and registry manipulations etc.
Symantec protects you from this threat, identified by the following:
File-based
CL.Downloader!gen11
ISB.Downloader!gen80
ISB.Heuristic!gen5
Scr.Malcode!gen
Trojan Horse
Trojan.Gen.NPE
VBS.Downloader.Trojan
Email-based
Coverage is in place for Symantec’s email security products
Web-based
Observed domains/IPs are covered under security categories |
NJRAT targets Spanish-speaking users with fund and pension social engineering
Pension and fund-themed social engineering attacks can be especially potent during times of economic turmoil, such as the ongoing aftermath of certain events in 2022. Symantec has recently detected a malicious email campaign targeting Spanish-speaking users that pretends to be a notification about a transfer of pension funds from a known Colombian financial company that administers pension and severance funds. The emails include a RAR archive attachment with two malicious VBS files, which, if opened, will infect the victim's device with the NJRAT remote access trojan.
NjRat, also known as Bladabindi or Ratenjay, is a highly prevalent Remote Access Trojan (RAT) that has been used extensively over the past decade. It allows attackers to extract data from compromised devices including logged keystrokes, stored credentials, and browser history. Some newer variants of NjRat also target cryptocurrency wallets. In addition to data extraction, this RAT enables attackers to send commands through a remote shell, modify the registry, and download additional files.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
File-based
Scr.Malcode!gen |
No-Justice Wiper employed to target Albanian Parliament
Iranian threat actors targeted the Albanian Parliament employing the No-Justice Wiper. The attackers utilized commonly used tools such as Putty Link, Revsocks, and the Windows 2000 resource kit in reconnaissance, lateral movement, and the targeting of a telecommunications service provider. The No-Justice Wiper executes multiple actions, including loading a library, receiving addresses for API functions, and ultimately wiping computer disks.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen6
File-based
PUA.Gen.2
PUA.Gen.4
Trojan Horse
WS.Malware.2
WS.SecurityRisk.3 |
NoaBot - new Mirai-based botnet
The year 2023 marked a significant recovery for crypto markets, rebounding from the 2022 downturn, although it has yet to reach the highs of 2021. As per reports the total crypto market cap surged from below $1 trillion in mid-2022 to surpass $1.5 trillion by December 2023. Threat actors, adapting to new trends in cryptojacking, have shifted their focus to Internet-facing Linux systems and Internet of Things (IoT) devices.
A new Mirai-based botnet has been reported as part of a crypto mining campaign. This botnet, equipped with capabilities such as a wormable self-spreader and an SSH key backdoor, can download and execute additional binaries or spread to new victims. As part of the attack, a modified version of the XMRig miner is deployed.
Symantec protects you from this threat, identified by the following:
File-based
Linux.Mirai
OSX.Trojan.Gen
PUA.Gen.2
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
WS.SecurityRisk.3
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
Nobelium (aka Hagensia) spear-phishing campaign
APT actors known as Nobelium (aka Hagensia) who were behind the infamous SolarWinds attack continue to be active. Recently, one of their email campaigns has been put under the spotlight. The group has been spear-phishing for victims among multiple organizations, with malicious emails purporting to be from the United States Agency for International Development. Multiple threats have been used in these attacks including the following:
EnvyScout, a malicious HTML/JS file attachment.
NativeZone, a custom Cobalt Beacon loader.
BoomBox, a downloader.
VaporRage, a shellcode loader.
Symantec protects you from these threats, identified by the following:
File-based
Backdoor.Cobalt
Heur.AdvML.C
Trojan.Gen.2
Trojan.Gen.NPE
Trojan Horse
WS.Malware.1
WS.Malware.2
Network-based
System Infected: Trojan.Backdoor Domains 2
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. |
Noberus aka ALPHV/BlackCat - a new Rust-based ransomware
A new ransomware written in Rust was spotted by Symantec researchers on a victim network in mid-November, with three variants of the ransomware deployed in the course of that attack. In the observed campaign shortly before Noberus ransomware (also known as ALPHV or BlackCat) has been deployed, ConnectWise was also executed. This might be an indication that the attackers may have leveraged access to ConnectWise to deploy their payload. While it is a legitimate tool, ConnectWise has frequently been exploited by ransomware attackers in recent times to gain access to victim networks.
Read more in our blog: Noberus: Technical Analysis Shows Sophistication of New Rust-based Ransomware
Symantec protects you from this threat, identified by the following:
File-based
Ransom.Noberus
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
Behavior-based
SONAR.SuspLaunch!gen4
Machine Learning-based
Heur.AdvML.C
Heur.AdvML.M
Network-based
Attack: Ransom.Gen Activity 51 |
Noberus ransomware continues attacks with new TTPs
Noberus (aka BlackCat, ALPHV) is widely believed to be a successor payload to the Darkside and BlackMatter ransomware families. Attackers deploying the Noberus ransomware have been using new tactics, tools, and procedures (TTPs) in recent months, making the threat more dangerous than ever. Among some of the more notable developments has been the use of a new version of the Exmatter data exfiltration tool, and the use of Eamfo, information-stealing malware that is designed to steal credentials stored by Veeam backup software.
Read more in our blog: Noberus Ransomware: Darkside and BlackMatter Successor Continues to Evolve its Tactics
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen6
File-based
Infostealer.Eamfo
Ransom.Noberus
Trojan.Exmatter
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C |
NoBit Ransomware
There is no shortage of ransomware threats in the landscape, and on a daily basis both small and large actors are observed. Symantec recently detected a ransomware known as NoBit targeting individual machines of both consumers and enterprises. They accomplish this by disguising their ransomware (a Chaos variant) as a fake Microsoft Edge installer. According to the content of the ransom note, they do not appear to employ double-extortion tactics and instead request a $500 USD ransom while advising the victim to contact them on Telegram.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.Heur.Dropper
SONAR.SuspBeh!gen625
Machine Learning-based
Heur.AdvML.B |
No Christmas Break for Agent Tesla: Riyad Bank Impersonated in a Malspam Campaign
Usually over Christmas there is somewhat less malware activity, but that does not mean there isn't any. Attacks from all fronts (e.g., email, drive downloads, vulnerabilities, etc.) keep on going. In a recent example, an Agent Tesla malspam campaign caught Symantec's attention, with the actor impersonating Riyad Bank – a major financial institution in Saudi Arabia and one of the largest banks in the country by assets.
The malicious emails (subject: Riyad Bank Trade Finance Transaction Notification - REF2023122047047) have been sent to both local (Saudi Arabia) and international organizations (with local ties or not). Attached is a 7z archive (Payment_Advice.JPEG.7z) and within the Agent Tesla binary posing as a Payment document (Payment_Advice.exe).
This threat is a Remote Access Trojan (RAT) and information stealer that has been around for some years now and is still highly prevalent. It's being used by multiple groups and individuals around the world. It has been used to conduct financial and identity theft, as well as data breaches—exfiltration of sensitive company information or compromise of confidential documents, sometimes leading to extortion.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
Machine Learning-based
ACM.Ps-Rgasm!g1
ACM.Rgasm-Lnch!g1
File-based
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B |
NoCry ransomware still active in the field
Security Response is aware of recent reports regarding activities of the NoCry ransomware. NoCry is believed to be a variant of an older Judge ransomware. The malware will encrypt user files and append .cry extension to them. It has been reported that previous versions of publicly available decryptor tools might also work for the latest NoCry variant.
As we continue to monitor and enhance our protections against NoCry Ransomware variants, we recommend performing regular backups for any important data and ensuring your security products are kept up to date with the latest product definitions.
Symantec protects you from this threat, identified by the following:
File-based
Heur.AdvML.B
Heur.AdvML.C
Trojan.Gen.MBT
Trojan Horse
Behavior-based
SONAR.MalTraffic!gen3 |
NodeStealer malware campaign leverages social media malvertising for distribution
Recently observed NodeStealer campaigns have been leveraging social media malvertising for malware distribution. The attackers have been hijacking Facebook business accounts in order to serve malicious advertisements. Clicking on the ad triggers a download of an archived malicious executable that leads to the infection with the final payload. NodeStealer is an infostealing malware seen for the first time earlier this year. Functionality-wise it can hijack cookie sessions from various web browsers but also steal cryptocurrency wallets, and data from other applications or download additional arbitrary payloads.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.MBT
WS.Malware.2
WS.Reputation.1
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
NodeStealer malware variant 2.0 found in the wild
A new 2.0 variant of the NodeStealer malware has been seen distributed via phishing campaigns in the wild. The main functionality of this malware is to steal browser cookies in order to take over Facebook business accounts. The discovered 2.0 NodeStealer variant is written in Python and has additional capabilities which allow for cryptocurrency theft and download of additional arbitrary payloads. BitRAT, HVNC RAT and Xworm are among the payloads seen downloaded by NodeStealer.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
File-based
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.B
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
No diplomatic behavior here, just BackdoorDiplomacy
BackdoorDiplomacy is a cyber-espionage group that has been linked to attacks targeting telecommunication companies in Africa and the Middle East, as well as diplomatic entities in the Ministries of Foreign Affairs since 2017. The group is cross-platform targeting both Windows and Linux systems focusing on poorly enforced file-upload security, and exploiting unpatched vulnerabilities found on internet-exposed applications to drop and execute a custom implant called "Turain". This malware will do harvesting and exfiltration of system data overall, which also includes copying sensitive data stored upon removable media. Collected data is then put into a password-protected archive which is passed to a C2 center via the backdoor.
Symantec protects you from this threat, identified by the following:
File-based
Backdoor.Trojan
Malware
Threat Artifact
Trojan.Gen.NPE
Trojan.Malscript
WS.Malware.1
Network-based
URL reputation: Browser navigation to known bad URL
Web-based
Observed IP/Domains are covered under security categories |
NoEscape Ransomware
NoEscape ransomware is a Ransomware-as-a-Service offering that was initially observed in the first half of 2023. NoEscape activity has been seen across the globe, primarily focused in North America and Europe. Victims of NoEscape exist across multiple industries, including retail, government, and manufacturing, among others. Attacks leveraging NoEscape exhibit standard ransomware behaviors such as file encryption, process termination, data exfiltration, and threats of extortion through possible data leaks.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.SuspLaunch!g189
SONAR.SuspLaunch!g193
SONAR.TCP!gen1
File-based
Downloader
Ransom.NoEscape
Trojan Horse
Trojan.Gen.NPE
WS.Malware.1
Machine learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Network-based
Attack: Ransom.Gen Activity 46 |
Nokoyawa ransomware comes now in Rust-based variant
New Rust-based variant of the Nokoyawa ransomware has been discovered in the wild. Nokoyawa is a ransomware family first observed back in February 2022 and initially written in C programming language. Similar move to the Rust programming language has been already made by several other ransomware variants and is dictated mostly by faster encryption process and better AV evasion. The threat actors behind Nokoyawa also employ double extortion by ex-filtrating users' data just before the encryption takes place.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.C |
NoName057(16) threat group continues their DDoS attacks with help of the DDosia toolkit
DDosia is a botnet malware variant known to be leveraged by NoName057(16) threat group in a series of Distributed Denial-of-Service (DDoS) attacks targeting websites of various government agencies, institutions and private companies across Europe in the last few months. NoName057(16) threat actors are known to focus their attacks on Ukraine or countries and organizations supporting Ukraine. DDosia variants come in various versions supporting different operating systems including Windows, Linux and macOS. DDosia malware builds are distributed via a Telegram channel belonging to the threat actors. Last month alone has shown a considerable increase of subscribers to the attacker's channel as well as an increase in number of potential contributors to the DDoS attacks leveraging DDosia toolkit.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
File-based
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
OSX.Trojan.Gen
WS.Malware.1
Machine Learning-based
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Nood RAT malware
Nood RAT is a Linux variant of the Gh0st RAT malware. The malware functionality includes remote shell execution, infostealing, file management, setup of Socks proxies on the infected systems and port forwarding, among others. Nood RAT might receive additional commands from the attackers C2 servers while the communication with those servers remains encrypted in an attempt to thwart any network detection efforts.
Symantec protects you from this threat, identified by the following:
File-based
Backdoor.Trojan
Trojan Horse
Trojan.Gen.NPE
WS.Malware.1
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
"No One Was Home" themed Evri phishing emails are making the rounds
Evri is a parcel delivery company based in United Kingdom. As the holiday season has started, spoofed emails masqueraded as Evri parcel notifications have been observed. These emails entice the users to click phishing URLs in order to reschedule the delivery as "no one was home". The phishing URLs are constructed using hijacked domains and with a sole purpose of stealing credentials.
Subject: Reschedule your parcel
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
NOOSE ransomware
Another instance of Chaos ransomware has been observed, where the actors identify themselves as the National Office of Security Enforcement (NOOSE), a fictitious government agency in the real world but existing in the Grand Theft Auto video game. Upon successful compromise and encryption, the ransomware will leave a ransom note (OPEN_ME.txt) instructing victims to pay 1540 USD worth of Monero to a provided crypto wallet. Currently, this actor does not employ double extortion tactics and appears to target single machines through drive-by-download social engineering.
Symantec protects you from this threat, identified by the following:
Behavior-based
ACM.Untrst-RLsass!g1
ACM.Untrst-RunSys!g1
File-based
Ransom.Sorry |
No plans for Halloween? Emotet would like your company
Last minute plans for Halloween? Not if Emotet has its way.
Emotet Trojan keeps at it trying to make you open those malicious attachment, as the malware works through the macros in the document. As the latest trend, Symantec has observed a campaign of Emotet spam alluring recipients with invitations to a Halloween party, with the supposed instructions or address in an attached doc file.
Email subjects:
Halloween Party
Halloween Pot Luck 10.31
Halloween invitation
Halloween
Inviting friends to your Halloween Extravaganza
Halloween party invitation
Attachment names:
Information.doc
Halloween party invitation.doc
Address and invite list.doc
Inviting friends to your Halloween Extravaganza.doc
Happy Halloween.doc
Details.doc
invite list.doc
Party tonight.doc
Symantec detects the malicious attachments as follows:
ISB.Downloader!gen411
Trojan.Gen
VBA.Downloader.Gen
W97M.Downloader
Coverage is also in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. |
Not a Fedex package but Android malware! Smished!
Spanish speakers have been the targets of back to back smishing campaigns. Earlier this month, threat actors generated a multitude of fake DHL domains, a technique known as Typo-squatting, to send out SMS messages that include a link to download a malicious Android application.
More recently, they are being hit by a new wave of malicious SMS pretending to be Fedex this time, where victims are redirected to download an Android malware (named Fedex.apk).
Indicators of compromise:
SMS: Tu envio esta por llegar, rastrealo aqui: URL
URL format: hxxps://[removed].[Top-Level domain]/fedex/?...
Symantec Endpoint Protection Mobile has the following coverage in place:
Mobile-based:
Android.Reputation.2
Symantec Endpoint Protection Mobile is able to also analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The domains used in this Fedex smishing campaign are known to WebPulse. |
Not a "Good Day" ransomware
It is not a good day if you are infected with ransomware, however Good Day ransomware is a variant of ARCrypter ransomware that takes its name from that generic greeting on their victims portal. The ransomware has been recently seen distributed as a fake Microsoft Windows Update binary. When successfully launched, it changes the extension of the encrypted files to .crYpX, where X is a capital letter, normally seen starting with A and up to E.
Symantec protects you from this threat, identified by the following:
File-based
Ransom.Gen
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B!200
Heur.AdvML.B!100 |
Note-taking app's file sharing services abused to share phishing content
Legitimate web applications that offer various services are been abused by threat actors to distribute malspam or spread phishing waves. One of the recent phish runs observed by Symantec show that services offered by a popular note-taking service have been abused. These spam runs comprise phishing emails posed as notification messages for recent shared files. As shown in Figure 1, the email content is kept short with the sole purpose to entice the recipient in clicking the blue hyperlinked text. Beneath the text lies a URL directing the recipient to the note-taking app's file sharing webpage.
Figure 1: Phishing email masqueraded as notification email with a URL to the note-taking app's file sharing page embedded in content.
The twist here is that using a legitimate web application or service, a bogus file is shared with an embedded phishing URL as shown in Figure 2.
Figure 2: A bogus .pdf document is shared using the note-taking app’s file sharing service.
On clicking the URL provided in the online viewer, the user is redirected to a credential stealing webpage. As shown in Figure 3, these phishing webpages are designed to look and feel like a legitimate file-sharing service login webpages.
Figure 3: The embedded URL provided in the online viewer redirects the user to a fake file-sharing service login webpage.
Protection
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. |
Notorious Joker again sneaks onto Google Play
The Android Malware "Joker" is not new, having been around for some years now. Through these years it has gained a certain notoriety for repeatedly finding its way onto official app stores such as Google Play. Still active and showing no sign of stopping, Joker was recently observed on Google Play yet gain, this time with more than 500K installs. The threat is able to steal device information, SMS messages and contacts. It then attempts to simulate clicks and subscribe victims to premium services.
Symantec protects you from this threat, identified by the following:
Mobile-based
AppRisk:Generisk |
NovaSentinel Stealer
Symantec continuously monitors the threat landscape for newly advertised threats, and we do encounter many on a daily basis. While some never end up making it, others do thrive over the years. In this protection bulletin, we'll briefly talk about one that was recently spotted along with its test-related activities.
Dubbed NovaSentinel, this threat is a run-of-the-mill stealer that is primarily tuned to steal from gamers and crypto-enthusiasts but does also have the capability to damage enterprises. It's currently being sold for 250 Euros per month, or 3,040 Euros for lifetime access. Below are some of its features:
Stealing various gaming service sessions (EpicGames, RiotGames, Growtopia, Ubisoft)
Taking over Discord accounts
Stealing sensitive browser-related information (cookies, history, auto-fill, credit card data, etc.)
Stealing crypto wallets
Collecting Filezilla, Putty, TotalCommander servers' info
Grabbing files
Symantec protects you from this threat, identified by the following:
File-based
Infostealer |
Nova Stealer among the malware variants distributed via Facebook ads advertising fake AI services
A new infostealer distribution campaign has been reported in the wild with attackers leveraging compromised Facebook accounts to advertise fake AI services impersonating well-known brands such as MidJourney, SORA AI, Evoto, ChatGPT-5 and DALL-E 3. The advertisements lead victims to download malicious software disguised as desktop versions of the mentioned AI programs. Nova Stealer, Rilide Stealer V4, Vidar and IceRAT were among the infostealing payloads distributed in this campaign, which have been known to target users from various European countries.
Symantec protects you from this threat, identified by the following:
File-based
CL.Downloader!gen211
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.NPE
Web.Reputation.1
WS.Malware.1
Machine Learning-based
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
NSABuffMiner worm continues to target servers vulnerable to EternalBlue
According to a recently released report, NSABuffMiner botnet (known also as Indexsinas) is still managing to leverage the leaked EternalBlue exploit (CVE-2017-0144) to spread itself across networks using the Server Message Block (SMB) protocol. Upon exploitation a Monero mining module is being dropped on the targeted machines. The attack also leverages two other associated tools (DoublePulsar and EternalRomance) to perform lateral movement and privilege escalation.
Symantec protects you from this threat, identified by the following:
File-based
Backdoor.Doublepulsar
Hacktool
Heur.AdvML.B
Heur.AdvML.C
Miner.XMRig
Trojan Horse
Trojan.Gen.2
Trojan.Gen.NPE
Trojan.Gen.MBT
Network-based
OS Attack: Microsoft Windows SMB RCE CVE-2017-0144
OS Attack: Microsoft Windows SMB Remote Code Execution CVE-2017-0144
OS Attack: Microsoft Windows SMB Remote Code Execution CVE-2017-0144 2
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains are covered under security categories |
NuggetPhantom malware distributed via Purple Fox
Symantec Security Response is aware of a recent event where NuggetPhantom malware was distributed via a Purple Fox exploit kit.
NuggetPhantom is a modular malware toolkit that allows attackers to perform cryptomining, launch DDoS attacks, and download and install remote modules that enable the malware to carry out additional actions.
Symantec provides the following protection against this attack:
File-based
Trojan.Malmsi
Network-based
30825 (System Infected: CoinMiner Activity 6)
31298 (System Infected: Malicious PowerShell Script Download 3)
32316 (System Infected: Trojan.Backdoor Activity 473) |
NullMixer leveraged for CrashedTech and Koi Loader delivery
NullMixer is a dropper variant used to spread payloads belonging to a variety of malware families. The attack chain often involves SEO poisoning, malvertising and social engineering together with the distribution of backdoored or cracked versions of known tools and applications. The most recent NullMixer campaign has been delivering malware loaders from the Koi and CrashedTech families. Once on the compromised endpoints the delivered loaders are used to fetch additional payloads such as Redline Stealer, PseudoManuscrypt or Fabookie Stealer.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
File-based
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Network-based
System Infected: Trojan.Backdoor Activity 634
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories |
NullMixer malware dropper
NullMixer is a dropper malware used to spread payloads belonging to a variety of malware families. The attack chain often involves malicious websites distributing all sorts of cracks or software keygen packages that contain the malware dropper installer. NullMixer has been reported to drop payloads belonging to the following malware strains, among others: SmokeLoader, RedLine Stealer, PseudoManuscrypt, FormatLoader, ColdStealer.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
File-based
MSIL.Downloader!gen6
Packed.Generic.525
PUA.Gen.2
Scr.Malcode!gdn32
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
W32.XiaobaMiner
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Network-based
System Infected: Trojan.Backdoor Activity 634
Web-based
Observed domains/IPs are covered under security categories |
NULLTHEGAME Ransomware wants Monero
A ransomware actor calling it's malware "NULLTHEGAME" has been observed in the threat landscape running a classic encryption attack with no double-extortion tactics. Upon successful compromise, encrypted files will be appended with a .NULL extension and a ransom note will be left on the machine asking for 30 Moneros, valued at $4,209.63 USD at the time of writing.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.SuspDrop!gen1
File-based
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.C |
Numando banking malware
Numando is yet another example of banking malware targeting Latin America. The malware is written in Delphi and includes capabilities like displaying fake overlay windows, taking screenshots or killing browser processes. It is reported that the malware is distributed via malspam campaigns containing .msi installers inside of .zip archives. Once the .msi file is executed, the Numando malware will run from the encrypted malware .dll injector.
Symantec protects you from this threat, identified by the following:
File-based
Heur.AdvML.C
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Network-based
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains are covered under security categories |
NYX ransomware
NYX is a ransomware variant written in C/C++ programming language and is partially based on the leaked Conti ransomware source code. NYX is believed to be distributed by the exploitation of exposed Remote Desktop Protocol (RDP) ports over internet. The attackers behind this malware variant employ the double-extortion technique by stealing the user's confidential data before encrypting it. NYX ransomware will append .nyx extension to the encrypted files.
Symantec protects you from this threat, identified by the following:
File-based
Ransom.Conti!gm1
WS.SecurityRisk.4
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200 |
ObliqueRAT payloads distributed via compromised websites
A new report has emerged about a recent malicious campaign spreading the ObliqueRAT trojan. The malware is downloaded with the help of Microsoft Office documents containing malicious macros. The macros point to compromised websites where the ObliqueRAT payloads are hosted in the form of benign image files. Based on some overlaps in C&C infrastructure used by ObliqueRAT and RevengeRAT it is believed that there might be some link between the operators of those two malware families.
Symantec provides the following detections related to the reported campaigns:
File-based
Heur.AdvML.B
Heur.AdvML.C
ISB.Dropper!gen4
Trojan Horse
Trojan.Mdropper
Trojan.Reverat
W97M.Downloader |
OceanLotus fakes it
Symantec is aware of a report which describes recent OceanLotus activities via fake websites and social media pages. This cyberespionage is not new and has been around for some years now. They have been targeting private companies with ties to Vietnam in various industries, as well as foreign governments, dissidents, and journalists. Symantec has multiple protection layers in place for these attacks.
File-based
Trojan.Mebroot!gen6
Heur.AdvML.B
WS.Malware.2
WS.SecurityRisk.1
Network-based
System Infected: Trojan.Backdoor Domains 2
Website-based
This activity is proactively blocked by Symantec Web Isolation technology |
OceanMap backdoor attributed to APT28
OceanMap, a backdoor variant based on C# and linked to the APT28 threat group (Fancy Bear), is designed to execute remote commands. It establishes persistence on infected machines by dropping .URL files in the autorun directory. Communication with attackers is facilitated through the IMAP protocol. OceanMap has been observed in recent APT28 campaigns, often in conjunction with Masepie malware, SteelHook PowerShell scripts, and additional tools utilized for network reconnaissance and compromise.
Symantec protects you from this threat, identified by the following:
Behavior-based
ACM.Ps-Http!g2
ACM.Untrst-FlPst!g1
File-based
Trojan Horse
Trojan.Gen.MBT
Web.Reputation.1
WS.Malware.2
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Octo Android malware masquerades as banking mobile app
In a recent campaign, Octo Android malware has been observed masquerading as a reputable Greek bank's mobile app. Octo is an Android malware with remote access capabilities targeting financial institutions worldwide, and was first seen in early 2022. The malware's functionality includes blocking push notifications, intercepting SMS messages, disabling sound, locking the device screen, starting remote access sessions and more.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.MBT
WS.Malware.1
Mobile-based
AppRisk:Generisk
Other:Android.Reputation.1 |
Office and Windows HTML RCE vulnerability (CVE-2023-36884) exploited in targeted attacks
A zero-day vulnerability (CVE-2023-36884) affecting Microsoft Windows and Office products is being exploited by attackers in the wild. To date, the exploit has been used in highly targeted attacks against organizations in the government and defense sectors in Europe and North America. The vulnerability was disclosed yesterday (July 11) by Microsoft, which said that an attacker could create a specially crafted Microsoft Office document that enables remote code execution on the target’s computer. In order for the exploit to succeed, the victim needs to open the malicious file. No patch has been released yet for the vulnerability.
Read more in our blog: Attackers Exploit Unpatched Windows Zero-Day Vulnerability
Symantec has introduced the following protections based on available information. Additional signatures may be added as analysis progresses.
Email-based
Coverage is in place for Symantec’s email security products
File-based
Trojan.Mdropper
WS.Malware.1
Network-based
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
OfflRouter observed infecting Ukrainian DOC files
Threat researchers have recently discovered OfflRouter infections in various DOC files observed in the wild. These documents contain VBA code that, once opened, downloads an executable file which begins to look for other DOC files on the machine to infect as well as search for additional plugins on removable drives.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen
W97M.Downloader
Machine learning-based
Heur.AdvML.A
Heur.AdvML.A!500
Heur.AdvML.C |
OilAlpha targets Arabian Android Users
According to a recent report, a new targeted activity against organizations in the Arabian Peninsula has been observed in the wild. The threat actor group dubbed OilAlpha targeted Arabic speaking entities related to the Saudi Arabian government and those interested in political development, humanitarian organizations and NGOs in Yemen. Victims operating Android-based devices were lured into downloading spoofed Android applications injected with remote access trojan like SpyMax and in some cases njRAT.
SpyMax is a mobile remote administration tool (RAT) that enables a threat actor to carry out attacks that highly impact the confidentiality and integrity of the victim’s data, as well as the victim’s privacy. It is powerful, widely available, and does not require root privileges on the victim’s device.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.2
Trojan.Gen.MBT
Mobile-based
AdLibrary:Generisk
AppRisk:Generisk
Trojan:Spymax
Web-based
Observed domains/IPs are covered under security categories |
Old MS Office vulnerability CVE-2017-11882 still leveraged for Agent Tesla delivery
CVE-2017-11882 is an older vulnerability affecting the Equation Editor component in Microsoft Office. Successful exploitation of this flaw might allow attackers for remote code execution on the infected machines. Agent Tesla is a malware family observed to be still leveraging this old vulnerability in some of the recent campaigns. The infection chain initiates from a malspam email with a .xlam attachment containing the CVE-2017-11882 exploit. Once the vulnerability is exploited, the infection continues through further stages involving malicious VBS and JPG files, PowerShell scripts and DLL binaries, leading in the end to the delivery of the final Agent Tesla payload.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.Powershell!g85
SONAR.SuspBeh!gen667
SONAR.SuspDataRun
SONAR.TCP!gen1
Email-based
Coverage is in place for Symantec’s email security products
File-based
Downloader
Exp.CVE-2017-11882!g2
Exp.CVE-2017-11882!g3
Exp.CVE-2017-11882!g5
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.NPE
Trojan.Sorcurat
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Old scams never die, drumroll fake Tech support
Tech support scams have been around for years and Symantec continues to observe thousands of malicious traffic redirections to scammer's domains on a daily basis. Our IPS telemetry over the last 30 days for these malicious redirections to Technical support scam sites demonstrates as much.
Symantec IPS technology is well suited to block those malicious redirections:
Web Attack: Fake Tech Support Domains*
Web Attack: Fake Tech Support Website*
* This indicates multiple detections exist such as Web Attack: Fake Tech Support Website 295, Web Attack: Fake Tech Support Website 374, etc. |
Once again North Korean threat actors target security researchers through social media
A recent campaign has come to light where North Korean threat actors are targeting security researchers. The campaign consisted of the publication of a security tool laced with malicious code to extract information from the researcher's system, as well as social engineering through social media. In this second method, the threat actor would build trust over time with the researcher until the point that they would send them malicious files with 0-day exploits or point them to the mentioned "security tool".
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
One-click porn fraud for unwary kinksters
One-click fraud is a type of social engineering that has been around for nearly a decade now and it's still very much in play throughout the world. In recent months, Japanese have been the target of one of these frauds, where bad actors have been attempting to lure people interested in adult-related video to fake websites purporting to be popular adult video hosting services.
The meat of this social engineering scam starts as soon as victims have been successfully lured onto these sites. Fraudsters have crafted a page to trick the victims into thinking they've just signed a contract to a paid service costing around US$4100, or US$3200 if the victim pays within 24 hours (an attempt to get them to pay promptly before they have time to reconsider). Eventually, deceived users end up having to call the listed phone number to either pay for the fictitious service or to cancel it. If they do call the phone number listed, the crooks at the other end will tell them they can't in fact cancel, and try to pressure them into paying the fee.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Network-based
URL reputation: Browser navigation to known bad URL
Malicious Site: Malicious Domain Request 21
Malicious Site: Malicious Domain Request 22
Malicious Site: Malicious Domain Request 58
Website-based
Observed domains are covered under security categories. |
One more Ransomware in-the-wild: Phoenix CryptoLocker
A Ransomware known as Phoenix Cryptolocker has joined the overcrowded Ransomware threatscape. Upon successful encryption, this threat will append a .phoenix extension to encrypted files.
Symantec protects you from this threat, identified by the following:
File-based
Ransom.Cryptolocker
WS.Malware.1 |
Ongoing campaign targets mobile users with the PhoneSpy malware
According to a recent report, an ongoing campaign leveraging a mobile malware dubbed PhoneSpy targets users from South Korea. The malware masquerades itself as various legit applications and is able to steal data and credentials from the compromised devices, install arbitrary APK packages downloaded from the attackers C2 servers, record audio/video from the device and send sms messages.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
AppRisk:Generisk
Android.Reputation.2 |
Ongoing Formbook campaign targets industries in Vietnam and South Korea
Formbook is a global threat that affects all countries. Symantec recently detected a Formbook attacker who is targeting industries in Vietnam and South Korea, as well as foreign companies with offices there. Although these countries were the primary targets, there have also been some attempts to infect organizations in other countries like the UK, Singapore, Australia, South Africa, and the US. The attackers typically use emails with malicious archive attachments (GZ for South Korea and ZIP for Vietnam) as the primary means of infecting victims. Through shipping and payment social engineering, the attackers lure victims into opening the attachment and thus executing Formbook.
Email subjects
지불을 확인하십시오
Thông tin giao hàng
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
File-based
scr.malcode!gdn30
scr.malcode!gdn34 |
OnionCrypter - encryption service leveraged in various malware campaigns since 2016
According to a recent report, OnionCrypter is a type of packer that has been observed in use by over 30 various malware families since 2016 - this includes the most prevalent ones like Ursnif, Lokibot or Zeus. OnionCrypter is written in C++ and can execute various functions. It is believed that OnionCrypter is one another example of crypter sold in the form of a "Crypter-as-a-Service" offering.
Symantec provides the following detection against the related samples packed with OnionCrypter:
File-based
Heur.AdvML.B
Heur.AdvML.C
Trojan.Gen.2
Trojan.Gen.MBT
Trojan Horse
WS.Malware.1 |
Online-retailers susceptible to Formjacking
Formjacking is a term used to describe the use of malicious JavaScript code to steal credit card details and other information from payment forms on the checkout web pages of e-commerce sites. This type of attack is not new and has in fact been around for years, but is still being widely observed in the threat landscape.
One of the most notorious gangs behind multiple large Formjacking campaigns is know as Magecart. Last month, we observed a spike which has been attributed to Magecart activity, after which the numbers fell to a steady median as can be seen on the IPS telemetry chart below. We expect more Formjacking activities in the lead up to the year-end holiday period.
Symantec constantly monitors Formjacking activities and has the following coverage in place:
Network-based
Web Attack: Formjacking Website
File-based
Trojan.Malscript
Trojan.Gen.NPE
Website-based
This attack is proactively blocked by Symantec Web Isolation technology |
Online marketplaces (e.g Mercari) get busy at year-end, and so do phishing activities
Online marketplaces, such as Mercari (a popular Japanese e-commerce platform that caters both store and individual users), typically experience increased activity around year-end. Many people engage in year-end cleaning, decluttering, and reorganizing, often leading to the sale of items they no longer need. Additionally, the holiday season prompts individuals to buy and sell items for gift-giving purposes or to make extra money for holiday expenses. During this time of the year, Symantec observes an uptick in phishing campaigns.
For instance, one actor has been spamming malicious emails from randomly generated email domains to Japanese consumers and enterprise users. The emails, with the subject "【メルカリ】一時的な利用停止、ログインして確認してください," leverage a classic account suspension tactic in an attempt to lure recipients into clicking the malicious URL and redirecting them to a fake Mercari login page.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
OnlyFans' cheaters end up being cheated
OnlyFans is a well-known platform on which creators can post their photos and other kinds of content, making various content accessible either for free, via a monthly subscription or pay-per-view. The service also allows fans to one-time tip their favorite creators. During the Covid-19 lockdown there has been an increase in popularity which did not go unnoticed by the watchful eyes of cybercriminals.
There are clearly plenty of internauts who would like to get an eyeful of OnlyFans content which is gated behind a paywall, for free, and cybercriminals know it only too well. In recent months, Symantec has observed an increase in social engineering related to this platform.
Observed social engineering:
Fake OnlyFans account generators to access content for free
Fake OnlyFans content downloaders, leakers, and grabbers
Fake downloaded OnlyFans content of known creators
Fake OnlyFans premium access hacks
These fake tools are of course malware in disguise, and baited users may be the ones who'll get watched for free as we've seen multiple remote access trojans (RATs) such as Nanocore and LimeRAT. There were also instances of infostealers (Agent Tesla and Discord stealers) and cryptocurrency miners. These were mostly being distributed via drive-by-download from social media, websites and forums.
Symantec protects you from these threats, identified by the following:
File-based
Heur.AdvML.B
Heur.AdvML.C
Trojan.Limerat
Trojan.Nancrat
Trojan.Nancrat!g1
SMG.Heur!gen
WS.Malware.1
WS.SecurityRisk.3
WS.SecurityRisk.4
Behavior-based
SONAR.SuspBeh!gen92
SONAR.SuspDataRun |
Onyx Ransomware
Onyx is another Ransomware that's been observed in the wild after a two month hiatus. Actors behind this .NET threat developed it based off Chaos Ransomware and as such it employs double extortion tactics. As of today, it has predominantly targeted companies in the US, and reports assume that there is a probability that Onyx may be run by Conti's affiliates or at least collaborated with them after one of the victims was reported on both Conti's and Onyx's leak websites.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.SuspDrop!gen1
File-based
Ransom.Sorry |
OpcJacker
It has been reported that a new infostealer disguised as a VPN installer is being delivered through malvertising. This latest threat, known as OpcJacker, has typical infostealing features but with a particular emphasis on stealing cryptocurrency wallets through the use of clipping/hijacking tactics. Furthermore, it has the ability to run modules such as NetSupport RAT and hVNC. This campaign is primarily directed towards consumers.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.MBT
Trojan.Gen.NPE
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories |
Open source SpyBoxRAT and HorusEyesRAT in-the-wild
SpyBoxRAT and HorusEyesRAT are two open source Remote Access Tools that have been posted on known software development platforms. They have also been echoed on hacker forums and underground forums. HorusEyesRAT is seen as the evolution of SpyBoxRAT, though both projects have been archived by the author.
In recent months, there has been increased HorusEyesRAT activity as it's being used by multiple groups and individuals and mostly distributed via malicious emails and drive-by-download.
Symantec protects you from these threats, identified by the following:
File-based
Heur.AdvML.B
Trojan.Gen.MBT
WS.Malware.1
WS.Malware.2 |
Operation Blacksmith
The Lazarus APT group is behind the recent Operation Blacksmith campaign, exploiting the 2021 Log4j vulnerability (CVE-2021-44228) known as Log4Shell. Three new malware families - NineRAT, DLRAT, and BottomLoader - coded in the Dlang programming language, are used to deploy payloads in this campaign. BottomLoader delivers additional payloads, while NineRAT and DLRAT execute various commands from the attackers' C2 servers.
Symantec protects you from this threat, identified by the following:
Behavior-based
ACM.Ps-Http!g2
ACM.Ps-Sc!g1
ACM.Untrst-RLsass!g1
ACM.Untrst-RunSys!g1
SONAR.MalTraffic!gen1
SONAR.TCP!gen1
File-based
PUA.Gen.2
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.C
Network-based
Audit: Log4j2 RCE CVE-2021-44228
Attack: Log4j2 RCE CVE-2021-44228 2
Attack: Log4j2 RCE CVE-2021-44228 3
Attack: Log4j2 RCE CVE-2021-44228 4
Attack: Log4j2 RCE CVE-2021-44228 5
Attack: Log4j2 RCE CVE-2021-44228 7
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Operation Dianxun
Symantec Security Response is aware of a public report of Operation Dianxun which targets telecommunications companies for information likely associated with 5G technology. The report suggests that methods used in the campaign are similar to the tactics employed by previously identified threat actors.
Symantec provides the following coverage against Operation Dianxun:
File-based
Trojan.Gen.2
Trojan.Gen.MBT
Downloader
Web-based
Observed domains are covered under security categories |
Operation Exorcist
There has been a report on multiple spearphishing campaigns (dubbed "Operation Exorcist") against the roman catholic church which happened over the span of several years. In these attacks, actors leveraged PlugX (a known remote access trojan) along with other malware such as NBTScan, Sparkle, NewBounce, ScanLine, Kotibu Gh0st and Zupdax.
Symantec protects you from these threats, identified by the following:
File-based
Backdoor.Trojan
Hacktool.Rootkit
Packed.Cupx!gen2
Trojan.Gen.2
Trojan.Gen.MBT
Trojan Horse
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C |
Operation HamsaUpdate
Operation HamsaUpdate is a recently identified campaign targeting Israeli customers using F5’s network devices. The attackers have been reported to leverage wiper malware targeting Windows servers (variant called Hatef) as well as Linux platform (variant called Hamsa). The attack chain initiates through phishing emails containing .zip archives with a .NET application disguised as a F5 update tool. The deployed loader has the functionality to execute the wiper malware payloads. During the wipe operation the malware continuously communicates with attackers via Telegram, providing updates on the status of the infected machines as well as progress of the running wiping tasks.
Symantec protects you from this threat, identified by the following:
Behavior-based
ACM.Ps-Wscr!g1
ACM.Untrst-RunSys!g1
AGR.Terminate!g2
SONAR.MalTraffic!gen1
SONAR.SuspLaunch!g220
SONAR.SuspLaunch!g221
SONAR.SuspPE!gen32
SONAR.SuspStart!gen18
SONAR.TCP!gen1
File-based
Downloader
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.A!500
Heur.AdvML.B!100
Heur.AdvML.B!200
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Operation Spalax targets Colombian companies
Symantec is aware of the Operation Spalax targeting Colombian institutions and companies. These attacks consist of phishing e-mails containing social engineering techniques. The e-mail contents appear to be intimidating recipients with court hearings, bank account freeze warnings, or notifications about the mandatory COVID-19 test. These e-mails have a PDF file as an attachment. The PDF attachments have a link to RAR archives hosted on legitimate cloud hosting platforms. Once those archives are unpacked, they contain malicious files capable of remotely controlling the victim's machine. This campaign is known to use three commercially available remote access Trojans (RATs) - Remcos, njRAT, and AsyncRAT.
Symantec provides the following coverage against this campaign:
File-based
Backdoor.Ratejay
Heur.AdvML.C
Infostealer
Packed.Generic.548
Packed.Generic.570
Packed.NSISPacker!g6
Trojan.Gen.2
Trojan.Gen.MBT
Trojan Horse |
OrBit - a new Linux malware
OrBit is a newly discovered Linux malware variant that utilizes advanced evasions techniques. OrBit can provide the attackers with remote access to the compromised hosts but can also be used to harvest user's credentials. The malware is capable of infecting all running processes and gaining persistence on the victim's machine. OrBit comes in form of a dropper that initially prepares the machine for malware execution and a payload binary that is installed afterwards.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
WS.Malware.2 |
Orchard Botnet
A new botnet dubbed Orchard was observed using Bitcoin creator Satoshi Nakamoto's information to generate malicious domains in order to conceal its command-and-control (C2) infrastructure. The botnet has undergone at least three revisions since February 2021, its main purpose being to deploy additional payloads onto a victim's machine and execute commands received from the C2 server. Additional capabilities of the botnet include uploading device and user information as well as infecting USB storage devices to aid in propagating the malware.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Web-based
Observed IPs/domains are covered under security categories |
Orcus RAT remains active in the wild
The Orcus Remote Access Trojan (RAT) was initially discovered back in 2016 and it still continues to be found in various in the wild distribution campaigns. The malware has typical RAT functionalities including remote administration, keylogging, credential theft, remote code execution and few others. Orcus is known to be spread via spear-phishing or drive-by-downloads. Due to its' modular architecture the malware can be enhanced via custom-built or downloaded plugins.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.SuspBeh!gen57
SONAR.SuspBeh!gen609
SONAR.SuspBeh!gen625
SONAR.TCP!gen1
SONAR.UACBypass!gen9
File-based
Scr.Malcode!gdn14
Scr.Malcode!gdn32
SMG.Heur!gen
Trojan Horse
Trojan.Gen.MBT
Trojan.Sorcurat
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Network-based
System Infected: Trojan.Backdoor Activity 634 |
OriginLogger malware spread in a recent malspam campaign
OriginLogger malware has been recently distributed in a malspam campaign leveraging malicious .iso attachment files disguised as payment invoices. The delivered emails with the subject "BANK PAYMENT NOTIFICATION" purported to come from a banking institution. Upon running the executable contained within the .iso file, a loader malware begins the infection process and delivers the malicious payload to the victim's machine. OriginLogger malware is an infostealer and keylogger that shares many similarities with the AgentTesla malware.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
File-based
Trojan.Gen.2
Trojan.Gen.NPE
WS.Malware.2
Machine Learning-based
Heur.AdvML.B
Web-based
Observed domains/IPs are covered under security categories |
Orion Grabber
Symantec has recently observed drive-by-download activity in which an actor was trying to lure victims with cracked software and hacks. Unbeknownst to the victims, they actually download and execute an infostealer known as Orion (also known as Orion Grabber). While authors advertise this malware as the number 1 grabber, it's pretty much a run-of-the-mill infostealer. Below are some of its stealing capabilities:
Web browser sensitive data (history, cookies, passwords)
Computer information
Desktop screenshots
Webcam pictures
Crypto wallet clipper
According to the authors, there are more than 40 plugins available and Orion reports back to the operator using Discord's webhooks.
Symantec protects you from this threat, identified by the following
File-based
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B |
OSAMiner - Mac cryptominer returns with new evasion tricks
There have been reports about the return of the Monero coin mining malware which was infamous in 2015, know as OSAMiner. In recent variants, attackers have made an attempt to make the analysis and detection of the malware more challenging by using Run-Only AppleScript in the malware. OSAMiner targets MacOS and is known to spread via cracked software and games.
Symantec provides the following coverage against this coinmining malware:
File-based
OSX.Malcol.2
OSX.Trojan.Gen
OSX.Trojan.Gen.2
WS.Malware.1
Network-based
[30765] System Infected: Miner.Bitcoinminer Activity 7 |
Oscorp, Android stealer
There have been reports of a new Android stealer in-the-wild. Dubbed Oscorp, it's been observed being distributed via a domain. If the victim is successfully tricked into installing this app and granting it permissions, the malware will be able to perform the following actions:
Steal credentials
Record video and audio
Uninstall applications
Manage calls and sms
Steal cryptocurrency payment via redirection
Steal Google 2FA PIN
Symantec has the following coverage in place:
Mobile-based
AppRisk:Generisk |
Osiris, banking malware
Recently, there have been reports of Osiris (Kronos variant) activity which targeted German manufacturing industries and their customers.
Symantec has the following coverage in place:
File-based
Heur.AdvML.B
WS.Malware.1 |
Oski poses as Avast installer
Oski stealer continues to be observed in the threat landscape. Used by multiple groups and individuals, this run-of-the-mill infostealer is primarily distributed via drive-by-download but also seen in malspam campaigns. The malware is still maintained by its authors and we regularly see new versions. Recently, Symantec observed a drive-by-download campaign in which malicious Oski were disguised as an Avast installer.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Network-based
System Infected: Vidar Malware Activity 2
Machine learning-based
Heur.AdvML.B
Web-based
Observed domains/IPs are covered under security categories |
Oski Stealer delivered in a recent malspam campaign
A recent malspam campaign observed in July has been leveraging Agent Tesla malware to deliver an infostealing payload. Dubbed as Oski Stealer, the malware is known since 2019 and focuses on stealing sensitive information from web browsers, user credentials and cryptocurrency wallets, among others. The distribution of the Oski malware in this campaign relied on malicious emails with macro-laden Microsoft PPT files attached to them.
Symantec protects you from this threat, identified by the following:
File-based
Heur.AdvML.B
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. |
Oski Stealer drive-by-download activity observed
Oski Stealer is an infostealer that was first observed being marketed on underground forums in late 2019 and early 2020. The malware focuses on stealing sensitive information from web browsers and cryptocurrency wallets.
It has undergone some development since it was first advertised on underground forums, which shows that the authors are keen on improving their malware features and capabilities. So far, Oski Stealer's prevalence is not quite at the level of more infamous infostealers like Agent Tesla, AzorUlt, Formbook and Lokitbot but that may not be the case for long. Clearly, the malware is being used by various individuals and groups and its prevalence will likely increase.
Below is a screenshot of an Oski Stealer login panel.
Symantec Security Response has been monitoring its activities for some time now, and during the past two months we observed new domains associated with the malware, with recently collected samples mostly being distributed via drive-by-download. This vector is not the only one that criminals who bought Oski Stealer have been seen employing this year. It's also been distributed in spam, some themed around Covid-19.
Symantec has the following protections in place for the recent Oski Stealer samples.
File-based protection
SMG.Heur!gen
ML.Attribute.HighConfidence
Trojan.Gen.9
Trojan Horse
WS.Malware.2
WS.Malware.1
Heur.AdvML.B
Heur.AdvML.C
Network-based protection
Web Attack: Suspicious Executable Image Download(22819)
System Infected: Vidar Malware Activity 2(32043) |
OSX Xcsset spyware activity continues
Xcsset Spyware was first seen in mid 2020, and since then we continue to observe instances in-the-wild. This spyware is known to spread via infected Xcode projects but may also be able to spread via trojanized apps. Any MacOS user, developer or otherwise, could potentially be a victim.
Symantec has the following coverage in place for this threat:
File-based
OSX.Trojan.Gen
OSX.Trojan.Gen.2
WS.Malware.1 |
Ousaban (aka Javali) continues to lurk in Brazil
Ousaban (also known as Javali) is one of the many banking malware being observed in Latin America, with a predominance in Brazil. In recent activities, actors continue to use malspam as a main vector along with run-of-the-mill social engineering to distribute the threat.
Symantec protects you from this threat, identified by the following:
File-based
Heur.AdvML.B
Heur.AdvML.C
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
WS.Malware.2
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. |
Ov3r-stealer malware
Recently discovered, Ov3r_Stealer, a password-stealing malware, is spreading via fraudulent job postings on Facebook, typically promoting managerial roles. Victims are directed to a Discord link where a PowerShell script fetches the malware payload from a GitHub repository. Ov3r_Stealer is crafted to pilfer data from various applications such as cryptocurrency wallets, web browsers, browser extensions, Discord, FileZilla, among others. Furthermore, it scrutinizes the system services configuration in the Windows Registry, potentially to pinpoint additional targets.
Symantec protects you from this threat, identified by the following:
File-based
ISB.Heuristic!gen39
ISB.Heuristic!gen43
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.NPE
Web.Reputation.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.A!300
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.