text
stringlengths 0
383k
|
---|
Qilin ransomware remains an active threat in the landscape
Qilin, also known as Agenda, is a Rust-based ransomware variant discovered in 2022. The malware has been spreading actively in the wild in recent months, with ongoing developments evident in new versions. Qilin is known to be distributed under a Ransomware-as-a-Service (RaaS) model with its operators often employing double extortion tactics. Most recent campaigns utilise custom PowerShell scripts to target vCenter and ESXi instances.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Ps-Rd32!g1
ACM.Untrst-RLsass!g1
Behavior-based
SONAR.Cryptlocker!g42
SONAR.SuspLaunch!gen4
SONAR.SuspLaunch!g18
SONAR.SuspLaunch!g253
SONAR.TCP!gen1
SONAR.TCP!gen6
File-based
Ransom.Agenda
Ransom.Qilin
Ransom.Qilin!g1
Trojan.Gen.MBT
Trojan Horse
Web.Reputation.1
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.A!400
Heur.AdvML.A!500
Heur.AdvML.B!100
Heur.AdvML.B!200 |
QnodeService, not the kind of service you want
QnodeService has been fairly active in the threatscape this year. Over the last few months, actors have been spreading countless malicious QnodeService downloaders and trojans (mainly obfuscated with Allatori) via multiple spam campaigns.
Symantec continues to observe a vast array of social engineering tactics employed by the perpetrators, from slipstreaming global events such as COVID-19, to the run-of-the-mill postal shipping, quotes, billing and banking transfer tricks. While there is a clear focus on NAM and EMEA, we also have seen campaigns targeting industries in the APAC region.
Below are some of the email subjects we have observed over the past 30 days which were associated with QnodeService malware campaigns:
Email subjects
[Removed] Tracking - 187320605737 Delivery scheduled for today
[Removed] #4091013211 PICKUP
Invoice From Tour Africa Travel
PVM sąskaitos faktūros
Delayed Delivery
Customer Statemen from Leather Merchant SERVICES
Swift October MT103...
Facture Octobre
Wydruk [Faktura]
OPERATIONS MT103/202 EN ATTENTES...
Invoice From [Removed] Australia
Symantec has various protection layers in place for this threat:
File-based
Trojan.Maljava
Backdoor.Trojan
Trojan.Gen.NPE
Network-based
System Infected: Trojan.Backdoor Activity 527
System Infected: Trojan.Backdoor Domains 2
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Website-based
This activity is proactively blocked by Symantec Web Isolation technology. |
QnodeService tries "sex tape" social engineering
QnodeService has been very active this year and the authors behind this malware have employed different social engineering tactics in their spam campaigns, from global events such as COVID to run-of-the-mill invoices, bank transfers and shipping quotes. Recently however, they have been seen trying the infamous "sex tape" social engineering trick to lure so-inclined or perhaps just curious victims. Malicious emails purporting to contain a sex tape involving Trump have been observed, but there is actually no video attached to those emails, it is in fact the QnodeService downloader which then installs the QnodeService Remote Access Trojan (RAT).
Symantec has the following coverage in place:
File-based
Trojan.Gen.NPE
Trojan.Maljava
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. |
Qvoid Stealer Activity Uptick
It's hardly a surprise to see malware source code hosted on public sites being leveraged by multiple threat actors. Qvoid Stealer has not escaped this fate with Symantec observing an increase in related activity over the past few months. This threat is similar to many other infostealers that gravitate around Discord capability-wise, reporting back to the operator using Discord's webhooks. It's able to collect Discord tokens and passwords, compromised system information, grab screenshots, steal web browser data (passwords and cookies), clip crypto wallets, etc. Most recent activities are drive-by-download campaigns in which actors disguised Qvoid Stealer as cracked and fake software.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec's email security products
File-based
SMG.Heur!gen
Network-based
System Infected: Trojan.Backdoor Activity 632
System Infected: Trojan.Backdoor Activity 634
System Infected: Trojan.Backdoor Activity 656
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C |
QwixxRAT
QwixxRAT is a new Remote Access Trojan variant seen used recently in in-the-wild campaigns. The malware is reported as being distributed via Telegram and Discord platforms. QwixxRAT has the functionality to allow attackers remote control over the infected endpoint, to launch arbitrary commands or to collect confidential user data. The communication to the attackers C&C and extraction of any collected user data is achieved with help of a Telegram bot API.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.Dropper
File-based
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.A!400
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Raccoon - The masked bandit information stealer
Raccoon Stealer first seen in 2019 has shown a recent resurgence. It is an information stealer and a dropper for other malware that targets a victims credentials and cryptocurrency wallets.
The distribution method varies, but it is known to be delivered through unsolicited spam campaigns with malicious document attachments, exploit kits and malvertising.
Symantec protects you from this threat, identified by the following:
File-based
Downloader
Heur.AdvML.B
Heur.AdvML.C
Trojan.Gen.2
Trojan.Gen.MBT
Trojan Horse
Trojan.SnakeKeylogger
WS.Malware.1
WS.Malware.2
Behavior-based
SONAR.MalTraffic!gen3
SONAR.SuspBeh!gen1
SONAR.SuspBeh!gen24
SONAR.SuspLaunch!g12 |
Raccoon infostealer activity
Symantec researchers have observed an uptick in Racoon activity recently. Raccoon is an infostealer and a dropper for other malware. The malware is sold underground at a relatively cheap price, which explains its popularity with cyber criminals. It's known to be delivered through spam campaigns, exploit kits and malvertising.
Symantec provides the following coverage against recent variants of Raccoon:
Trojan.Gen.2
Heur.AdvML.B |
Raccoon Stealer continues to lurk
Raccoon Stealer is still active in the threat landscape impacting both consumers and enterprise around the globe. This stealer-as-a-service is being used by multiple groups and individuals looking to steal credentials and cryptowallets. Over the years it's been seen distributed via malicious emails, exploit kits and in recent months increasingly seen disguised as cracked software.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.2
Trojan.Gen.MBT
Trojan Horse
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C |
Raccoon Stealer returns with an updated variant
A new version of the infamous Raccoon Stealer has been discovered in the wild. Raccoon Stealer 2.0 as advertised on underground forums, is written in C++ and claims several performance and detection avoidance improvements over the earlier version of the infostealer. The updated malware has been reported as being already distributed through cracked software packages.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.AM.E!g37
SONAR.ProcHijack!g21
SONAR.SuspLaunch!g12
SONAR.TCP!gen1
File-based
CL.Downloader!gen111
Packed.Generic.525
Packed.Generic.620
Scr.Malcode!gdn30
Scr.Malcode!gdn33
Scr.Mallnk!gen1
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Network-based
System Infected: Trojan.Backdoor Activity 632
System Infected: Trojan.Backdoor Activity 634 |
Raccoon Stealer updated to gather cryptocurrency wallet IDs and facilitate file uploads and downloads
Raccoon Stealer, a cloud stealer-as-a-service, has been updated to not only gather cryptocurrency wallet IDs but to allow file uploads and downloads. The information stealer, active for over 2 years, is used to gather passwords, cookies, and other form data from locally stored website data in the user's browser. Adding cryptocurrency IDs and file access to its services shows that it is still in active development and could help it become more prevalent.
Symantec protects you from these threats, identified by the following:
File-based
Trojan.Gen.2
Trojan.Gen.MBT |
Raccoon Stealer v2.3.0
After a 6-month hiatus, a post in one underground forum was seen promoting the new Raccoon Stealer version 2.3.0. The infostealer was enhanced from its previous versions and now includes new features such as a new quick search tool to easily browse through stolen data, automatic bot blocking and panel display, reporting system that detects and blocks IPs by crawlers (protection against threat researchers) and a new log stats panel.
Symantec protects you from this threat, identified by the following:
File-based
Downloader
ISB.Downloader!gen483
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.B
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Ragnar Locker finds new ways to pressure its victims
We have become aware of reports that the group responsible for the Ragnar Locker ransomware has used a hacked Facebook advertiser's account in order to run ads promoting their attacks. Ragnar Locker is one of the most prominent targeted ransomware families and has been used in campaigns targeting various companies this year. Not only do the attackers encrypt user's data, they also threaten to publish it if ransom demands are not met. With this latest tactic the threat actors are trying to publicly pressure more victims into paying the ransom.
While Symantec continues to monitor this ransomware family, we recommend regular backup procedures of any important files and applying the latest product definitions to protect against ransomware threats.
Symantec Protection against Ragnar Locker ransomware family:
File-based Protection
Downloader
Heur.AdvML.B
Heur.AdvML.C
Ransom.Gen
Ransom.RagnarLocker
Trojan.Gen.MBT
Trojan Horse
Behavior-based Protection
SONAR.Cryptlck!g171
SONAR.SuspLaunch!gen4
SONAR.SuspLaunch!g18
Network-based Protection
[32179] Attack: Ransom.Gen Activity 23 |
RA Group ransomware
RA Group is a new ransomware threat actor whose operations have been observed in the wild since April 2023. The threat group leverages customized encryptor malware based on the leaked Babuk ransomware source code. The malware has the capability to delete the volume shadow copies on the infected machine. It encrypts users' files appending a .GAGUP extension, and employs double extortion techniques by also threatening victims with the public release of their stolen data.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.Ransomware!g7
SONAR.Ransomware!g16
SONAR.Ransomware!g38
SONAR.TCP!gen1
File-based
Downloader
WS.Malware.2
Machine Learning-based
Heur.AdvML.C |
Rampant Kitten campaign targets Iranian entities
A recent report unraveled an ongoing surveillance operation by threat actors that has purportedly been targeting Iranian expats and dissidents for years. The reported campaign, named Rampant Kitten, had several possible attack vectors:
Windows based infostealers
An Android based backdoor
Phishing pages associated with Telegram
The attackers attempt to take advantage of multiple attack vectors to spy on their victims, attacking victims’ personal computers and mobile devices.
Symantec provides the following protection for associated indicators:
File-based
Downloader
ISB.Downloader!gen73
PUA.Yontoo.C
Trojan Horse
Trojan.Gen
Trojan.Gen.2
Trojan.Gen.MBT
WS.Reputation.1
Website-based
This attack is blocked by Symantec Web Isolation technology |
Rancoz ransomware
Rancoz is a ransomware variant recently discovered in the wild. The ransomware will encrypt user files and append .rec_rans extension to them. The malware has the functionality to delete system backups, volume shadow copies and system logs on the compromised machines. Upon completed encryption, the malware will change the desktop wallpaper and drop ransom note advising the victims to contact the attackers via email. The threat actor behind this malware variant employs the double extortion technique by also threatening the victims with publicly leaking the compromised data.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.Cryptolocker!g42
SONAR.Ransomware!g38
SONAR.SuspLaunch!g18
SONAR.SuspLaunch!g253
SONAR.SuspLaunch!gen4
SONAR.TCP!gen1
File-based
Downloader
WS.Malware.1
Machine Learning-based
Heur.AdvML.C |
RanHassan (aka DcDcrypt ) ransomware
RanHassan also known as DcDcrypt is another run-of-the-mill ransomware variant seen in the wild. The malware first discovered around May 2022 has been known to target users from India and various Arabic speaking countries. RanHassan is written in C# and it appends .[Enc] extension to the encrypted files. The malware is pretty basic without any functionality to delete backups/volume shadow copies or establishing any persistence on the infected machine.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Machine Learning-based
Heur.AdvML.C |
Ranion RaaS – Free malware lasts longer
Nowadays, Ransomware stories are seemingly endless as the business continues to boom. These threats come and go, but some persist. Ranion has been around since at least 2017 according to reports, and is still active. Ranion is a run-of-the-mill Ransomware-as-a-Service but is advertised on the dark web for free, although there are paid add-ons available for purchase such as dropping capabilities. This add-on would allow actors to drop other threats on to compromised machines. In recent campaigns, actors have distributed this Ransomware via Malspam and notably, the common double-extortion tactic is not employed.
Symantec protects you from this threat, identified by the following:
File-based
Heur.AdvML.B
Heur.AdvML.C
Downloader
Trojan.Gen.2
Trojan.Gen.MBT |
Ransom Cartel shows similarities to Revil ransomware
Ransom Cartel is a ransomware variant distributed under the Ransomware as a Service (RaaS) model. This malware strain first emerged back in December 2021 and it exhibits a certain number of similarities to the infamous Revil ransomware. The threat actors behind the ransomware leverage double extortion tactics and beside encrypting the confidential files also threaten the victims with the publication of the stolen data. The attackers have been reported to use a variety of additional tools in attempts to compromise victims, such as DonPAPI, LaZagne and Mimikatz.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.Ransomware!g19
SONAR.Ransomware!g30
SONAR.Ransomware!g39
File-based
Ransom.Cartel
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
WS.Malware.2
Web-based
Observed domains/IPs are covered under security categories |
RansomExx continues targeted campaigns
RansomExx is known to be a re-branded variant of the early Defray ransomware. It has shown increased activity in 2020 while targeting several companies across the world and demanding millions of dollars in ransom. Some more common features of this ransomware strain include the attempts to disable system restore and data backup, the ability to kill specific processes or to bypass system related files and folders.
We recommend regular backup procedures of any important files and applying the latest product definitions to protect against ransomware threats.
Symantec protections:
File-based
Downloader
Heur.AdvML.B
Heur.AdvML.C
Ransom.Exx
Trojan.Gen.2
Trojan.Gen.MBT
Network-based
[32436] Attack: Ransom.Gen Activity 29 |
RansomExx ransomware now comes with a Linux variant
RansomExx is known to be a spin-off of the older Defray ransomware family. The ransomware has been actively targeting several companies across the world in 2020. According to the latest reports, there is a new variant of RansomExx discovered in the wild that has been specifically written for the Linux platform. It is reported that the 64-bit ELF malware executables do not exhibit any network activities and seem to focus mainly on file encryption.
We recommend regular backup procedures of any important files and applying the latest product definitions to protect against ransomware threats.
Symantec protections against the RansomExx family latest samples:
Heur.AdvML.B
Heur.AdvML.C
Ransom.Exx
Trojan.Gen.NPE
Trojan.Gen.MBT
Trojan.Horse |
RansomHouse threat group activities
RansomHouse is a threat group active on the ransomware landscape since at least 2021. The group has been known to conduct encryption campaigns targeting Linux instances and VMware ESXi virtual machines with Babuk ransomware variants such as WhiteRabbit or MarioLocker. This threat actor often leverages phishing campaigns or known vulnerabilities for initial access. According to latest reports, RansomHouse remains active in 2023. The threat actors also employ double extortion tactics by exfiltrating user data and threatening to release it on a public leak site.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.ProcHijack!g45
SONAR.SuspLaunch!g12
SONAR.TCP!gen1
File-based
Hacktool
Ransom.Babuk
Ransom.Gen
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.A!400
Heur.AdvML.A!500
Heur.AdvML.B!100
Heur.AdvML.B!200
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Ransomware attack on gaming firm
Symantec Security Response is aware of a recent report where a popular gaming publisher and developer was infected with HelloKitty ransomware. The report indicated that a health organization and a powerplant operator were also victims of the same ransomware, which adds a ".crypted" file extension to the files it encrypts.
Symantec provides the following coverage against this HelloKitty ransomware:
Trojan.Gen.2
Ransom.CryptoTorLocker
Heur.AdvML.B |
Ransomware attacks leverage dual-use tools for data exfiltration
Data exfiltration is a core component of today's ransomware attacks. The Symantec Threat Hunter Team, part of Broadcom, has put together a report which identified an increased usage of both malicious and legitimate exfiltration tools that are being leveraged to provide this functionality. The report identifies legitimate use tools such as Rclone, AnyDesk, and ScreenConnect as well as malicious tools like Cobalt Strike as being used by multiple Ransomware actors.
Read more in our blog: Data Exfiltration: Increasing Number of Tools Leveraged by Ransomware Attackers
Symantec protects you from these threats, identified by the following:
Adaptive-based
ACM.Ps-Rd32!g1
ACM.Untrst-RunSys!g1
Behavior-based
AGR.Terminate!g2
AGR.Terminate!g10
AGR.Terminate!g5
SONAR.TCP!gen1
SONAR.TCP!gen6
File-based
Backdoor.Cobalt
Backdoor.Cobalt!gen1
Backdoor.Cobalt!gen7
Backdoor.Cobalt!gm1
Backdoor.Cobalt!gm5
Hacktool
Hacktool.Chisel
Hacktool.Gen
Trojan Horse
Trojan.Gen.9
Trojan.Gen.MBT
WS.Malware.1
WS.Malware.2
Machine learning-based
Heur.AdvML.A
Heur.AdvML.A!300
Heur.AdvML.A!500
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Heur.AdvML.C
Network-based
Web Attack: Webpulse Bad Reputation Domain Request (29565) |
Ransomware daddy demands $25M and change
Symantec Security Response has come across a puzzling new ransomware variant. Named Daddycrypt, it encrypts files on the infected machine and appends a ".daddycrypt" file extension to them. The perpetrator then demands a whopping 500 bitcoins (currently over 25 million US dollars) plus a 500 dollar Amazon gift card for decrypting the files.
Symantec detects Daddycrypt ransomware as the following:
File-based
Trojan.Gen.2 |
Ransomware demands a ransom without encrypting files
Symantec Security Response is aware of a public report that a peculiar PowerShell ransomware was recently submitted to an online file scanning site. The ransomware is unique in that it does not encrypt files one-by-one on the compromised system, but instead puts all the target files into a single encrypted 7zip file (extension 7z). This effectively achieves the same goal but in a different manner.
Perhaps even stranger, the ransom demand is US$20 worth of Bitcoin for the password to the encrypted 7zip file, significantly lower than most other ransomware.
Symantec protects you from this threat, identified by the following:
File-based
Ransom.Hamachive |
Ransomware in Review: LooCipher
Few can argue that 2020 wasn't the year of ransomware as it reclaimed its position at the top of the malware kingdom. A new ransomware Security Response came across in June this year is LooCipher. The ransomware is typically distributed through spam runs containing malicious document files. Files encrypted by LooCipher will have the extension ".lcphr" appended to them. Ransomware notes will be also present as @Please_Read_Me.txt that contain a Q&A and a bitcoin address for the ransom payment.
Symantec provides the following coverage against LooCipher ransomware:
File-based
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT |
Ransomware variant "Help" discovered
Security Response has come across a new ransomware variant being called "Help". As is often the case, the name was derived from the fact that encrypted files will have a .help file extension.
Symantec detects Help ransomware as the following:
File-based
Trojan Horse
Trojan.Gen.2 |
Ranzy Locker ransomware remains active in the wild and continues to target organizations
Symantec Security Response is aware of a recent FBI alert about the increased number of activities observed for the Ranzy Locker ransomware. Ranzy Locker was first seen in 2020 and is believed to be a rebranded variant of ThunderX ransomware. Ranzy has been leveraged in various campaigns targeting multiple organizations and has reportedly compromised more than 30 US businesses this year.
Attackers behind the Ranzy Locker employ the Double Extortion tactic which includes, not just encrypting the user data but also ex-filtering it to the attacker’s remote servers and later using it as leverage to force the ransom payment.
Symantec protects you from this threat, identified by the following:
File-based
Downloader
Ransom.Cryptolocker
Trojan.Gen.2
WS.Malware.1
Machine Learning-based
Heur.AdvML.B |
RapperBot botnet now also with cryptomining functionality
RapperBot is a DDoS botnet known to target IoT devices since around mid-2022. The botnet usually exploits weak or default SSH/Telnet credentials and brute-forces access to vulnerable devices in order to initiate Distributed Denial of Service (DDoS) attacks. Some most recent campaigns leveraging RapperBot have been observed to execute Monero cryptocurency miners on the infected devices. The running miners can be configured to use multiple mining pools with some of them hosted as mining proxies on the C2 servers of RapperBot itself.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.NPE
WS.Malware.1
WS.Malware.2
Web-based
Observed domains/IPs are covered under security categories |
RapperBot in the Linux threatscape
Ever since Mirai first appeared in the threat landscape there hasn't been any shortage of Linux bots with Distributed Denial-of-Service (DDoS) capabilities which target Internet of Things (IoT) devices. Every now and then one of these bots (based on Mirai's code) is brought to light, such as RapperBot. According to reports, this threat, located on compromised IoTs scans SSH servers and tries to brute force them. If successful, it will report the credentials to its command-and-control server and then deploy itself on the SSH server.
Symantec protects you from this threat, identified by the following:
File-based
Linux.Mirai |
Raptor Android RAT C2 Sighted
Symantec has observed an individual or group that generated samples and a Command and Control (C2) server of an Android Remote Access Trojan known as "Raptor." This threat is not new having been in circulation for a few years now. Its code is accessible to the public through older entries on forums, websites, and software development platforms.
If this threat is successfully installed without the victim's knowledge, it will report to its C2 server and await the actor's commands. The malware enables the author to retrieve and exfiltrate stolen information to Discord via Webhooks. Some of its capabilities include:
Collect sensitive information (SMS, device and location data, call logs, contacts, app list, files, browser history, etc.)
Perform SMS premium scams
Wipe content on the SD card
Lock the screen and change the wallpaper
Encrypt all pictures and media files with the AES key "0123456789012345"
Vibrate the device, delete call logs, and initiate a voice message
Symantec protects you from this threat, identified by the following:
Mobile-based
Android.mobilespy |
Raspberry Robin malware continues to evolve
The Raspberry Robin malware has been observed exploiting two 1-day LPE (Local Privilege Escalation) exploits, with the most recent one being CVE-2023-36802, a Microsoft Streaming Service Proxy vulnerability which enables privilege escalation. Raspberry Robin is also evolving by incorporating more advanced defense evasion techniques, including evading system shutdowns, validating remote desktops, and checking UWF (Unified Write Filter) filter drivers. Furthermore, it has updated its attack vector by utilizing new deployment methods, such as masquerading as a legitimate Windows service.
Symantec protects you from this threat, identified by the following:
File-based
Packed.Generic.553
Trojan Horse
Trojan.Emotet
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
Raspberry Robin targeting financial entities in Europe
A new wave of attacks involving the Raspberry Robin malware has been observed in the wild. The attack chain involves malicious MSI installer files (around 500MB large in size) that are dropped onto the victim's machine. When unpacked the size is much smaller and the malicious samples attempt to connect to the attackers's C2 servers in order to download additional malware modules. The attackers behind the recent Raspberry Robin campaigns have been abusing several well known data hosting providers such as Discord or Azure to host the malicious payload binaries.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Web-based
Observed domains/IPs are covered under security categories |
Raspberry Robin worm spreads via USB devices
Raspberry Robin (also known as "QNAP worm") is a malware with worm capabilities initially discovered back in September 2021. The malware is known to spread via infected USB drives with the help of malicious .lnk files. The execution chain involves downloading and executing .msi packages containing malicious libraries. Raspberry Robin also leverages the Microsoft Standard Installer (msiexec.exe) process to connect to pre-configured C2 servers belonging to the attackers. In some other instances the utilized command and control (C2) infrastructure involved malware's connections to TOR network nodes.
Symantec protects you from this threat, identified by the following:
File-based
CL.Downloader!gen20
Downloader
Packed.Generic.553
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Policy-based
DCS Hardening for Windows has zero day protection against the Raspberry Robin threat. DCS default lockdown prevents arbitrary download of .msi packages and launch of msiexec.exe to connect to external C2 infrastructure.
Web-based
Observed IPs/domains are covered under security categories |
RAT + free VoIP + future ransomware = Abaddon RAT
Symantec Security Response is aware of a new Remote Access Trojan named Abaddon which was recently unleashed into the wild. The RAT is reportedly the first malware to use a popular free VoIP software, especially among gamers, as a Command and Control (C&C) server. The RAT has ransomware capability, however the feature appears to be still in development. It's not too far fetched to think Abaddon will be equipped with the ransomware feature in the near future.
Symantec detects Abaddon RAT as the following:
Backdoor.Trojan |
Rat4Droid
In 2023, Rat4Droid was echoed across various platforms such as hacking websites, Facebook, Youtube and Telegram channels, and observed in numerous campaigns where multiple groups and individuals disguised it as different apps (example: Porn, documents, Free phone numbers, PUBG redeem codes, music, photo editors, etc.) and targeted various demographics.
The Author has localized it to market to Arabic, French, English, Spanish and German speakers. It packs run-of-mill extraction and execution capabilities including:
Data extraction: contacts, photos, files, SMS, call logs, location
Command execution: delete file, play sound, change wallpaper, vibrate, send voice message and notification, turn on flash, open application, lock screen, factory reset, perform call, send SMS, record voice.
Prevalence-wise, while it's not as active as other Android remote access trojans like Spynote and Irata, Symantec continues to observe both testing and malicious activities in multiple countries (with a slightly higher volume in Arabic speaking countries).
Symantec protects you from this threat, identified by the following:
Mobile-based
AppRisk:Generisk |
RAT malware spread via a fake Telegram website
A new malicious campaign has been identified, where the attackers attempt to distribute a Remote Access Trojan (RAT) malware via a webpage masqueraded as a legitimate Telegram website. The malware is spread through an MSI installer package, that once executed sideloads a malicious .dll binary called mpclient.dll. The name of this .dll file on purpose resembles a legitimate system file found on MS Windows systems. The RAT payload, once successfully installed, awaits further commands from the attacker's C2 servers. The malware code indicates that it has the functionality to terminate running processes, delete data from various applications and browsers as well as download additional arbitrary payloads.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories |
RatMilad mobile spyware
RatMilad is new mobile malware targeting enterprise devices, that has been just recently discovered in the wild. The malware exhibits both spyware and Remote Access Trojan (RAT) capabilities. Depending on the commands received from the attackers it can collect a wide range of data from the infected device, ex-filtrate it and perform additional malicious actions such as writing and deleting files, among others. RatMilad is believed to be distributed through Telegram channels under the disguise of VPN applications and it's relying on social engineering techniques to convince users to sideload the fake app on their mobile devices.
Symantec protects you from this threat, identified by the following:
Mobile-based
Android.Reputation.1
Android.Reputation.2
Web-based
Observed domains/IPs are covered under security categories |
RATs delivered via malicious ads
Threat actors have been reported leveraging Google search results to host malware via malicious ads targeting users who are attempting to circumvent tight restrictions in China against the use of Telegram or LINE. A VPN enables users to access restricted platforms and search for the aforementioned banned applications, but they may be lured into downloading a malware-laden file masquerading as an installer for the banned apps, where in fact the installer is a Remote Administration Trojan (RAT) file capable of giving the attacker full control over the victim's machine.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B!100
Heur.AdvML.B!200
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
RATs get cozy with AHK (AutoHotKey) loader
There is yet another loader in-the-wild and this one, known as AHK Loader, has the peculiarity to be tied up with the AutoHotKey scripting language. According to reports, the actors lure victims with an AutoHotKey executable which then uses malicious VBScripts to load a Remote Access Trojan. Multiple RATs have been seen utilizing AHK loader in various campaigns including: LimeRAT, RevengeRAT, VjW0rm, Houdini RAT, etc.
Symantec protects you from this threat, identified by the following:
File-based
Heur.AdvML.C
Trojan.Horse
WS.Malware.1
WS.Malware.2
Behavior-based
SONAR.SuspBeh!gen1
SONAR.SuspBeh!gen25
SONAR.SuspBeh!gen66
SONAR.TCP!gen1 |
RATs learning new habits
A new malware written in Go, named HabitsRAT, has been seen targeting both Windows and Linux machines. The original Windows version attacks Microsoft Exchange servers. We have now observed updated variants targeting both Windows and Linux environments. This attack takes remote control of the targeted machine and uses a private key to sign files in order to evade detection.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.2
Backdoor.Trojan
Trojan.Gen.MBT
Trojan Horse
Website-based
Observed domains are covered under security categories |
RA World Ransomware
Recently spotted in the wild, RA World is another ransomware variant that encrypts user files, adding a .RAWLD extension. Victims are prompted to contact the attackers via Tox or Telegram to receive instructions on data recovery. The ransom note, named "Data breach warning.txt," warns of potential public data exposure if ransom demands aren't met. RA World ransomware can erase Volume Shadow Copies on the infected system.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.Ransomware!g1
SONAR.Ransomware!g3
SONAR.Ransomware!g7
SONAR.Ransomware!g38
SONAR.SuspLaunch!g18
SONAR.SuspLaunch!g253
File-based
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.C |
RAXNET Bitcoin Stealer
Why bother mining cryptocurrency when you can just clip crypto wallets and hijack cryptocurrency transactions? That's the road many cybercriminals are undertaking and there isn't any shortage of such clippers on both underground markets and public sources. RAXNET Bitcoin Stealer is one of these recently observed doing the rounds. These threats are usually delivered via drive-by-download rather than other common vectors such as malicious emails.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B |
RCE vulnerability in Centos Web Panel 7 (CVE-2022-44877)
CentOS Web Panel (CWP) is a web-based control panel for Linux servers. It allows users to manage various aspects of their server, including web server, email, DNS, and databases, through a web-based interface.
Recently Centos released a patch for a remote code execution (RCE) vulnerability in Centos Web Panel 7 (CVE-2022-44877) which if successfully exploited, would allow remote attackers to execute arbitrary OS commands via shell metacharacters in the login parameter.
Following the release of the patch the security researcher who reported this vulnerability shared a proof-of-concept. Unfortunately when guidance and proof-of-concept code is publicly available it often fuels malicious activities as actors assimilate. Over the past week, there have been multiple attempts to compromise unpatched CWP servers by using CVE-2022-44877.
Symantec protects you from this threat, identified by the following:
Network-based
Attack: Centos Web Panel 7 RCE CVE-2022-44877 |
Read The Manual (RTM) Locker ransomware
RTM (Read The Manual) Locker is another Ransomware-As-A-Service (RaaS) malware variant observed recently on the threat landscape. The ransomware employs multi-threaded encryption process, is able to delete Volume Shadow Copies and can also stop/disable certain system processes and services. Upon the successful file encryption the RTM Locker will drop a ransom note and change the desktop wallpaper on the infected endpoint informing the victims about the compromise and advising them to contact the attackers. The ransomware will then ensure all logs from the compromised machine are wiped before it deletes itself.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.CryptoLocker!g35
SONAR.CryptoLocker!g36
SONAR.Ransomware!g7
SONAR.Ransomware!g16
File-based
Ransom.Generic.1
Machine Learning-based
Heur.AdvML.B |
Realst infostealer spread via fake blockchain games
The discovery of rust-based malware dubbed Realst represents a concerning development in the world of cyber threats, especially for users of Windows and macOS systems. The attackers behind Realst have employed fake blockchain games such as Brawl Earth, Dawnland, Destruction, Evolion, WildWorld etc. as a disguise to lure unsuspecting users into downloading and installing the malware. These games might promise exciting rewards or other incentives to entice users into engaging with them. The consistent behavioural patterns observed in the Realst malware indicate a deliberate focus on stealing valuable information related to browsers, crypto wallets, and keychain databases. Given its recent interest in macOS 14 Sonoma, it appears to be actively evolving to target the latest operating system versions.
Symantec protects you from this threat, identified by the following:
File-based
ISB.Heuristic!gen21
OSX.Trojan.Gen
OSX.Trojan.Gen.2
Trojan Horse
Trojan.Gen.MBT
Web.Reputation.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Realtek SDK 2021 vulnerability is still exploited for malware distribution
Realtek Jungle SDK (CVE-2021-35394) is a remote code execution vulnerability disclosed in August 2021. If successfully exploited, the attackers could gain complete control of the compromised devices, leverage them for DDoS attacks or run arbitrary code remotely. While the vulnerability has been known for over 1.5 years now, it is reported as still being exploited in the wild for the delivery of various malware families including Mirai, Gafgyt, Mozi and the DDoS botnet known as RedGoBot.
Symantec protects you from this threat, identified by the following:
File-based
Linux.Lightaidra
Linux.Mirai
Trojan Horse
Trojan.Gen.NPE
WS.Malware.1
Network-based
Web Attack: Realtek Jungle SDK RCE CVE-2021-35394
Web-based
Observed domains/IPs are covered under security categories |
Realtek SDK vulnerabilities exploited by the Mirai botnet
Mirai botnet variant known as Dark.IoT has been reported to leverage two most recently discovered Realtek SDK vulnerabilities tracked as CVE-2021-35394 and CVE-2021-35395. The disclosed vulnerabilities might impact wireless devices relying on Realtek chipsets and SDK from several different vendors. If successfully exploited, the attackers could gain a complete control of the compromised devices, leverage them for DDoS attacks or run arbitrary code on them.
Symantec protects you from this threat, identified by the following:
File-based
Downloader
Linux.Mirai
Trojan.Gen.NPE
Network-based
Web Attack: Realtek Jungle SDK RCE CVE-2021-35394
Web Attack: Realtek Jungle SDK RCE CVE-2021-35395
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains are covered under security categories |
Recent activities of the RIG Exploit Kit
Despite the general decline of Exploit Kit activity in the last few years, RIG EK remains to be continuously leveraged in the wild. The attack volume attributed to this exploit kit has shown an uptick during the last year alone, suggesting the EK activity will continue for the years to come and will remain a significant threat to enterprises. RIG still incorporates relatively old Internet Explorer vulnerabilities dating back even to 2012. Two recently used exploits are Microsoft Internet Explorer CVE-2020-0674 and CVE-2021-26411. Historically RIG EK has been utilized to distribute a variety of malware payloads, including Dridex, SmokeLoader, RaccoonStealer, RedlineStealer, Ursnif, PureCrypter, Royal ransomware and many others.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.ProcHijack!g45
SONAR.SuspScript!g20
File-based
Packed.Generic.528
Packed.Generic.553
Packed.Generic.616
Scr.Malcode!gdn32
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.B
Network-based
Web Attack: Internet Explorer RCE CVE-2021-26411
Web Attack: Microsoft Internet Explorer CVE-2019-0752
Web Attack: Microsoft Internet Explorer CVE-2020-0674
Web Attack: Microsoft VBScript Engine RCE CVE-2018-8174
Web Attack: RIG Exploit Kit Website
Web Attack: RIG Exploit Kit Website 3
Web Attack: RIG Exploit Kit Website 5
Web Attack: Rig Exploit Kit Website 8
Web Attack: Rig Exploit Kit Website 14
Web Attack: Rig Exploit Kit Website 23
Web-based
Observed domains/IPs are covered under security categories |
Recent activities of the Webworm APT group
Symantec, by Broadcom Software, has gained insight into the current activities of a group we call Webworm. The group has developed customized versions of three older remote access Trojans (RATs), including Trochilus, Gh0st RAT, and 9002 RAT. At least one of the indicators of compromise (IOCs) observed by Symantec was used in an attack against an IT service provider operating in multiple Asian countries, while others appear to be in pre-deployment or testing stages. Active since at least 2017, Webworm has been known to target government agencies and enterprises involved in IT services, aerospace, and electric power industries located in Russia, Georgia, Mongolia, and a number of other Asian countries.
Read more in our blog: Webworm: Espionage Attackers Testing and Using Older Modified RATs
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen6
File-based
Trojan Horse
Trojan.Gen.MBT
WS.Malware.2
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C |
Recent activity of the TA866 threat group
New activity associated to the TA866 threat group has been observed in recent months. The threat actors have been targeting organizations in the United States and Germany with a variety of commodity and custom malware variants. The attack chain usually involves phishing emails with Microsoft Publisher (.pub) file attachments containing malicious macros, or .pdf files containing URLs that lead to malicious Javascript files. WasabiSeed, Screenshotter as well as AHK Bot and Rhadamanthys Stealer were among the malware families distributed recently by the TA866 group.
Symantec protects you from this threat, identified by the following:
File-based
Downloader
Infostealer
Trojan.Malmsi
Web-based
Observed domains/IPs are covered under security categories |
Recent Agent Tesla Malspam Campaign
We recently observed a spike in detections related to Agent Tesla malware due to an ongoing malware campaign. The attack initiated from phishing emails with malicious attachments or links, often disguised as legitimate sources. Symantec's advanced machine learning technology (AML) has proactively blocked this reported campaign.
Agent Tesla is a Remote Access Trojan (RAT) written in .NET, active since 2014. Versatile, with capabilities such as keylogging, screenshot capture, data theft, and remote access control, this malware regularly updates and evolves making detection an ongoing challenge.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Ps-Sc!g1
ACM.Ps-RgPst!g1
ACM.Rgsvc-Lnch!g1
ACM.Untrst-RgPst!g1
ACM.Untrst-RunSys!g1
Behavior-based
AGR.Terminate!g2
SONAR.SuspBeh!gen24
SONAR.SuspBeh!gen526
SONAR.SuspBeh!gen530
SONAR.SuspBeh!gen752
SONAR.SuspLaunch!g310
SONAR.TCP!gen1
File-based
CL.Suspexec!gen8
CL.Suspexec!gen168
Scr.Malcode!gdn33
Scr.Malcode!gdn34
Trojan Horse
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B!100
Heur.AdvML.B!200 |
Recent AZOrult InfoStealer malspam campaign
A recent malspam campaign was observed by researchers distributing AZOrult infostealer malware via a Microsoft Excel spreadsheet (XLSB) containing a malicious macro. The deceptive "Request for a quote" email appears to be targeting organizations in Europe and the Middle East.
Symantec protects you from this threat, identified by the following:
File-based
CL.Downloader!gen20
Heur.AdvML.B
ISB.Downloader!gen44
ISB.Downloader!gen69
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.2
WS.Malware.1
W97M.Downloader
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. |
Recent espionage activities by the GoldenJackal APT group
According to a recently released report, the threat group known as GoldenJackal continues its espionage campaigns targeting government organizations and individuals in the Middle East and South Asia. The threat actors leverage multiple attack vectors - some including fake Skype installers to drop .NET malware, malicious document like Word files exploiting the Follina vulnerability (CVE-2022-30190) to download a malicious HTML page. Once the attackers have successfully gained access to a victim's machine they will attempt to steal credentials, take desktop screenshots, collect confidential information from the local system and web browsers, and later exfiltrate the collected data to their C2 servers.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
File-based
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!200
Heur.AdvML.C
Network-based
System Infected: Trojan.Backdoor Activity 634
System Infected: Bad Reputation Process Request 4
Web-based
Observed domains/IPs are covered under security categories |
Recent hike in "Make Money Fast" spam with PDF attachments
Symantec has recently observed an increase in "Make Money Fast" spam with pdf attachments that include link to sites purporting to be income making activities. They have changing senders, subject lines and attachment names. This spam campaign is targeted at many organizations worldwide across various industries.
Email:
Attached PDF:
Landing page:
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. |
Recent increase in typosquatting targeting the financial sector
Symantec has recently observed multiple phishing hosts targeting financial institutions. Actors send messages purporting to be from a financial institution and use the look-a-like URLs in links instead of the actual company link. In the past two months, hundreds of unique typosquatting hosts have been seen, some hosted on the same IP addresses.
Examples include:
<bank-name>-iaccessweb[.]com
<bank-name>-iauth[.]com
<bank-name>-safetyupdated[.]com
<bank-name>secure-access[.]com
Symantec protects you from these threats, identified by the following:
Email-based
Coverage is in place for Symantec's email security products
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Recent JSSLoader RAT activities
Symantec Security Response is aware of recent cyber attacks that involve JSSLoader RAT. The attacks are attributed to an infamous ATP group and start off with email spam with WSF and VBS attachments. Opening the files opens a gate to a series of malicious activities, in which JSSLoader RAT payload is downloaded installed. Additional malware, typically DiceLoader, is often brought in and executed by JSSLoader RAT.
Symantec provides the following coverage against the attack:
File-based
VBS.Downloader.Trojan
ISB.Downloader!gen51
ISB.Downloader!gen173
JS.Downloader
Trojan Horse
Trojan.Gen.2
Trojan.Gen.NPE
Heur.AdvML.C |
Recent malspam campaign delivering MassLogger infostealer targeting organizations
MassLogger is a cheap and easily available infostealer distributed via underground forums. A recent malspam campaign observed in August appears to be targeting organizations most likely as a first stage of a larger attack.
The malspam campaign utilizes messages that appear to be legitimate business communication by requesting the victims open the attached malicious executable, contained in a zip, for an urgent transaction.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.2
Trojan.Gen.NPE
Trojan Horse
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. |
Recent malspam delivers Smokeloader bot instead of bank details
At the beginning of September Symantec Security Response has observed a new malspam campaign spreading the Smokeloader malware. Smokeloader is a well documented loader bot known for several years. It is mostly used to download other malware payloads like ransomware, backdoors or banking trojans, but due to its modular architecture it can also be used directly for executing a variety of functions.
In the observed malspam campaign, emails with the subject "Bank Details" purporting to originate from banking institutions have been spammed out to a number of recipients worldwide. An archive file named "Bank Details.xlsx.xxe" has been attached to those emails. The spam authors have attempted to obfuscate the file type with the false extension, as the attached .xlsx.xxe file is in reality a RAR compressed archive. Extraction of the file leads to a double-extension executable "Bank Details.xlsx.com" that upon investigation proved to be a Smokeloader sample.
Symantec protections against malware distributed in this spam campaign
Trojan.Smoaler |
Recent Matanbuchus campaign drops Cobalt Strike payload
A report about a new Matanbuchus Malware-as-a-Service (MaaS) project first came to light in the early months of 2021. Just a few days ago, a new phishing operation was spotted utilizing the same MaaS, which eventually drops a Cobalt Strike beacon that is used to increase exploitation potential.
The previous Protection Bulletin about Matanbuchus can be seen here: Malspam campaign dropping Matanbuchus and Qbot
Symantec protects you from these threats, identified by the following:
File-based
ISB.Downloader!gen520
Trojan Horse
Trojan.Malscript
Trojan.Gen.NPE
Trojan.Gen.2
WS.Malware.1
WS.Malware.2
Web-based
Observed domains/IPs are covered under security categories |
Recent ransomware distribution campaigns by Vice Society
Vice Society (aka. DEV-0832) ransomware group remains active in the threat landscape and their efforts strongly focus on healthcare, educational and manufacturing sectors. This threat actor is known to deploy various ransomware payloads including Zeppelin, HelloKitty, RedAlert or their latest variant known as PolyVice. Vice Society also uses a wide variety of tools for initial access, lateral movement or data ex-filtration. Some of those tools include Cobalt Strike, Mimikatz, Rubeus or Kape. According to latest reports, the most recent ransomware distribution campaigns attributed to Vice Society have been targeting organizations in Brazil, Argentina, Switzerland and Israel.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.Cryptlocker!g42
SONAR.SuspLaunch!g18
File-based
Backdoor.Cobalt
Backdoor.Cobalt!gm5
Downloader
Hacktool.Mimikatz
Hacktool.Rubeus!gen1
Ransom.Zeppelin
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.B
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories |
Recent SpyNote Android malware activities
SpyNote is an Android malware seen on the threat landscape for the last few years and actively used by various threat groups. The malware's functionality includes data and credentials theft from the compromised devices, keylogging, Google Authenticator codes extraction and calls/camera recording, among others. The malware is usually distributed under the disguise of legitimate apps associated with known brands and companies. Just in the last month alone several campaigns have been spreading SpyNote through .apk packages masqueraded as applications from Bank of Japan, 7-Eleven or the Indian Railway Catering and Tourism Corporation (IRCTC).
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
Android.Reputation.2
AppRisk:Generisk
Web-based
Observed domains/IPs are covered under security categories |
Recent TA558 APT activities targeting LATAM
TA558 group is known to target various sectors across Latin America. In the most recent campaigns these threat actors have been leveraging spam emails with malicious attachments in order to deliver a wide range of payloads such as AsyncRAT, NjRAT, Vjw0rm or RevengeRAT, among others. TA558 has been observed to continuously exploit old MS Equation Editor vulnerabilities from 2017 (CVE-2017-8570, CVE-2017-11882), potentially targeting mostly legacy or unpatched systems.
Symantec protects you from this threat, identified by the following:
File-based
Exp.CVE-2017-8570!g*
Exp.CVE-2017-11882!g*
Scr.Malcode!gen
Scr.Malcode!gen59
Trojan.Gen.MBT
Trojan.Gen.NPE
Trojan.Gen.NPE.C
Trojan.Malscript
Web.Reputation.1
WS.Malware.1
* This indicates multiple similarly named detections exist such as Exp.CVE-2017-11882!g2, Exp.CVE-2017-11882!g3, etc.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Reconnaissance activities by Bahamut APT
We are aware of recent reports regarding activities attributed to the threat actor group known as Bahamut. The discovered activity was found to be distributing malicious .docx documents exploiting a relatively old MS Office RCE vulnerability (CVE-2017-8570). Upon successful exploitation a backdoor malware is dropped that is believed to be an indication of an initial reconnaissance stage in this campaign.
Symantec protects you from this threat, identified by the following:
File-based
Heur.AdvML.C
Trojan.Gen.2
Trojan.Gen.NPE
Trojan Horse
Trojan.Mdropper
W97M.Downloader |
RecordBreaker gains in prevalence
Raccoon 2.0, also known as RecordBreaker, continues to gain in prevalence as Symantec observes more and more drive-by-download campaigns. In most of these campaigns, actors disguise the malicious binary as cracked software, fake updates and driver installer/downloaders. As of today, it is mostly affecting consumers but enterprises are far from being exempted. More and more groups and individuals are leveraging run-of-the-mill infostealer to exfiltrate sensitive data from organizations. They then proceed with extortion tactics or sell the data and environment access on underground markets.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
File-based
Trojan.Gen.2
Trojan.Gen.MBT
Suspicious: Reputation
Machine Learning-based
Heur.AdvML.B |
RecordBreaker infostealer spread under the disguise of .NET update files
RecordBreaker malware is known to be an evolution of the Raccoon infostealer. The malware was first seen last year and it continues to gain in prevalence in the wild. The latest campaigns distributing RecordBreaker have been masquerading the initial downloader as a Microsoft .NET Framework update package. The malware performs various anti-debugging and sandbox presence checks. If run within a virtual environment it will only download a legitimate .NET update installation file from the official Microsoft portal and then terminate itself. Outside of VM environments the RecordBreaker payload will be fetched from a malicious C2 server. The infostealer, once executed, has the functionality to steal sensitive data from the compromised machines.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
File-based
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.2
WS.Reputation.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Heur.AdvML.C
Network-based
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories |
RecordStealer - new infostealer distributed under the disguise of software cracks
A new infostealer malware dubbed as RecordStealer has been spotted in the wild. The malware disguises itself as software crack package or a software installer. RecordStealer targets data stored in the browser, cookies, cryptocurrency wallets, saved credentials etc. Some of the C2 communications servers used by RecordStealer have been reported to also be shared with another info-stealing malware known as Clipbanker.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
WS.Malware.2
Web-based
Observed IPs/domains are covered under security categories |
Recurrent ETC phishing campaigns hit Japan
Japanese users continue to be targeted by phishing campaigns in which actors impersonate ETC (Electronic Toll Collection System) – a Japanese system to pay tolls via wireless communication between antennas on expressway toll gates and in-vehicle devices. Over the last few weeks, Symantec has observed these campaigns in both the email and mobile landscape, the latter via SMS. If a victim does fall for one of these phishing attempts, actors will gain access to their ETC credentials along with various personal data that's stored in their ETC account. On top of this, there is a good chance that many people have used the same password for other web services which actors can then attempt to access.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
Mobile-based
Symantec Endpoint Protection Mobile is able to also analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake domains used in this campaign are known to WebPulse.
Web-based
Observed domains are covered under security categories |
Recurrent Nedbank phishing campaigns in South Africa
It's not uncommon to see phishing campaigns targeting users of major banks, including both individual retail customers and businesses. But over the past few weeks, Symantec has observed a rather persistent malicious email campaign in which actors continuously attempt to snatch the credentials of South African Nedbank users by portraying themselves as the bank – a very well-known South African bank and one of the largest financial institutions in the country. The malicious emails, relatively well-written and more convincing than some, have the subject "Nedbank Credit Card Monthly Charges eStatement" and contain a malicious HTML file (NedBank Statement.html) that loads the phishing page. If a users is lured and input their credentials it'll be collected and sent to the actors' domain.
Email-based
Coverage is in place for Symantec’s email security products
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Red Appaloosa campaign spreads banking malware to users in Mexico
Red Appaloosa is a new campaign targeting users in Mexico with a variety of banking malware. The attackers leverage phishing emails masqueraded as payment invoices from the Federal Electricity Commission (CFE - Comisión Federal de Electricidad). The distributed emails contain .pdf or .html files attached to them that redirect the victims to attackers' controlled websites and trigger a download of .zip archives containing malicious executables. Once the malware is installed on the victim's machine, it will await for the user to visit one of the observed banking websites in order to attempt the theft of user's banking information.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
WS.Malware.2
Web-based
Observed domains/IPs are covered under security categories |
RedDriver browser hijacker targets Chinese speakers
Chinese speakers seems to be the main focus of this driver-based browser hijacker, RedDriver. The driver inject itself on the browsers processes, can install its own certificates and hijack all browser traffic at the network level, which can make it difficult to detect its behavior. It uses several open-source tools on its code and development, as well as forged signed certificates to bypass Windows detection.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
AGR.Terminate!g5
SONAR.Trafic2.RGC!g10
File-based
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Redeemer ransomware
Redeemer is yet another ransomware variant distributed on cybercrime forums via affiliate programs. A new 2.0 version of this ransomware family was advertised online just last month. According to the authors it comes with new affiliate GUI toolkit, better Windows 11 support, modified ransom notes and several other improvements. Redeemer ransomware includes functionality to clear event logs and delete any shadow copies or system backups on the infected machines. The malware appends .redeem extension to the encrypted files.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.SuspBeh!gen57
SONAR.SuspDrop!gen1
SONAR.SuspLaunch!g18
SONAR.TCP!gen6
File-based
Ransom.Redeemer
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1 |
RedEnergy
There have been reports of a new stealer-as-a-ransomware called RedEnergy, being disseminated through SEO poisoning and malicious emails masquerading as browser updates. RedEnergy has the ability to extract sensitive data including passwords, credit card numbers, and files. Additionally, it possesses ransomware functionality, enabling it to encrypt files using the ".FACKOFF!" extension. The combination of stealing and encrypting data enables the perpetrator to engage in double-extortion tactics or profit from the stolen information.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
File-based
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
RedGoBot DDoS botnet
Light has been shed on a DDoS botnet known as RedGoBot that is written in the Go language. Actors behind this threat are able to launch DDoS attacks via HTTP, UDP and TCP flood. On top of that it's also capable of killing other DDoS bots on the device it compromised. According to reports, RedGoBot is spreading via a known Vacron NVR RCE Vulnerability.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.NPE |
Redigo - a Golang-based backdoor targeting Redis servers
Redigo is a Golang-based malware targeting Redis servers by exploitation of the CVE-2022-0543 Redis vulnerability. The malware is able to mimic Redis server communication over port 6379 and thus allowing the attackers to hide the traffic between the infected server and the malicious C2 servers. Redigo adds the infected servers to a botnet that later performs Distributed Denial of Service (DDoS) attacks, and also performs cryptocurrency mining on the servers.
Symantec protects you from this threat, identified by the following:
File-based
Linux.Trojan
Trojan Horse
WS.Malware.2
Network-based
Web Attack: Redis CVE-2022-0543
Policy-based
Symantec Data Center Security hardening using a custom sandbox for Redis server provides protection against Redigo types of malware. |
RedLineStealer continues its nefarious activity
RedLine Stealer is an infostealer malware that steals password credentials, credit card numbers, and cryptocurrency wallets. It has the capability of executing commands, downloading files, and periodically sending information about the infected system.
Still a relatively new infostealer that was spotted early 2020 it continues its nefarious activity.
Symantec protects you from this threat, identified by the following:
File-based
Heur.AdvML.B
Heur.AdvML.C
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.RedLineStealer
WS.Malware.1
WS.Malware.2 |
RedLine Stealer continues to be spread via various campaigns
In recent months, RedLine Stealer has been reported to leverage various distribution campaigns and the malware is known to be offered as MaaS (Malware as a Service) on underground malware forums. The threat is known to contain various features including fingerprinting victim's machine, information stealing from various applications like web browsers, FTP clients, Instant Messengers (IM), VPN services and gaming clients. The malware is also capable of illicit ex-filtration of victim's sensitive data including banking details and crypto-wallets, and many more.
Symantec protects you from this threat, identified by the following:
File-based
Heur.AdvML.B
Heur.AdvML.C
Scr.Malcode!gdn34
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
Network-based
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed IPs/domains are covered under security categories. |
RedLine Stealer distributed via malicious XLL add-ins
A group of researchers recently disclosed a widespread malware campaign that delivers RedLine Stealer via a malicious Excel add-in file (XLL). Lures used to seek user engagement are varied and include payment reports, holiday gift guides and website promotions, and are found in random websites' contact forms, article comment sections and discussion forums incorporated into a Google Drive link which hosts the malicious XLL file.
RedLine is an information-stealing Trojan and simultaneously a Downloader. It can execute commands to download additional malware to further extend the attack.
Symantec protects you from this threat, identified by the following:
File-based
Downloader
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.C
Network-based
System Infected: Trojan.Backdoor Activity 611(33088)
Web-based
Observed domains/IPs are covered under security categories |
RedLine Stealer leveraged by multiple threat actors to steal user data
According to a recent report, RedLine Stealer remains one of the main sources of stolen information sold on underground markets. The malware itself is offered for sale on various forums and Telegram channels and has been adopted by several threat actors in the past year. RedLine Stealer targets user data, login credentials, browser cookies, payment card data or details of cryptocurrency wallets, among others. The malware is spread commonly by phishing campaigns that often leverage current events or topics as lures.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.RedLineStealer
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Network-based
System Infected: Redline Stealer
System Infected: Redline Stealer Activity
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories |
RedLine Stealer Malware-as-a-Service offered through a Telegram channel
Redline is a type of infostealing malware with various features allowing it to fingerprint victim's machine, steal data from various applications like web browsers, FTP clients, Instant Messengers (IM), VPN services, as well as load additional malware payloads. Redline is known to be sold as part of a Malware-as-a-Service subscription offering. According to latest reports, the threat group behind this malware have been providing their services and bot support via a Telegram channel.
Symantec protects you from this threat, identified by the following:
File-based
Heur.AdvML.B
Heur.AdvML.C
Scr.Malcode!gdn30
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Network-based
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains are covered under security categories |
Redline Stealer spread under the disguise of VPN app installer
Redline Stealer malware has been recently distributed under a disguise of a VPN application called ExpressVPN. For the purpose of malware distribution, the attackers have set up a number of phishing websites mimicking the legitimate ExpressVPN webpage and offering the fake installer for download. Depending on the commands received from the C2 servers Redline Stealer will attempt to collect various information from the compromised endpoints including banking details, login credentials, crypto wallets, cookies and browser data, among others.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.MBT
WS.Malware.1
Web-based
Observed domains/IPs are covered under security categories |
RedProtection ransomware seen in France and Switzerland
RedProtection is a variant of chaos ransomware that has recently been observed circulating in France and Switzerland. Upon successful encryption, it will deploy a ransom note written in both English and French. Victims are instructed to transfer 0.0061 BTC to a specified cryptocurrency wallet within 24 hours and then reach out to the attackers via Telegram. The note also mentions a willingness to negotiate the ransom amount. This threat actor specifically targets individual machines of corporate users and consumers.
Symantec protects you from this threat, identified by the following:
Behavior-based
ACM.Untrst-RLsass!g1
ACM.Untrst-RunSys!g1
File-based
Ransom.Sorry |
RedXOR backdoor targets both Linux endpoints and servers
A new backdoor dubbed as RedXOR has been recently discovered. According to the released reports, the backdoor shows certain similarities with the known PWNLNX and XORDDOS malware variants and it targets Linux systems including both endpoints and servers.
Symantec provides the following detections against RedXOR malware:
File-based
Backdoor.Trojan
Linux.Trojan
Trojan.Gen.NPE |
RegretLocker ransomware makes you regret not having that backup
We have become aware of reports of a new ransomware dubbed as RegretLocker. This variant emerged just in October and has an ability to mount virtual drive images and encrypt individual files on it. The ransomware will add .mouse extension to the encrypted files.
We recommend regular backup procedures of any important files and applying the latest product definitions to protect against ransomware threats.
Symantec protections:
Trojan.Gen.MBT
Trojan Horse |
Rekoobe backdoor for Linux
Rekoobe backdoor belongs to a relatively old malware family that re-emerges with new variants from time to time. Rekoobe is based on the source code of the Tiny Shell open-source backdoor and is known to target mostly Linux servers. The malware functionality includes download of arbitrary payloads, reverse shell execution, receiving and executing commands from attackers' controlled C&C servers as well as data theft from the compromised machines. The malware is widely associated with the threat group known as APT-31, but other threat actors might have also been leveraging it in the past.
Symantec protects you from this threat, identified by the following:
File-based
Backdoor.Trojan
Trojan.Gen.NPE
WS.Malware.1
WS.Malware.2
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
RelicRace/RelicSource malware duo leveraged for delivery of Formbook and Snake keylogger
A new malspam campaign with a TGZ archive file as an attachment has been observed in the wild. This TGZ archive contains an executable file identified as a .NET-based downloader RelicRace, which is designed to download and execute the infamous RelicSource malware on the compromised systems. These executables download and install Formbook malware and Snake keylogger as final payloads on infected machines. Formbook malware steals personal information from victims’ devices and manipulate these systems using control commands from a C2 server and Snake keylogger to ex-filtrate sensitive data including user credentials, clipboard data, keystrokes and many more.
Symantec protects you from this threat, identified by the following:
File-based
Scr.Malcode!gdn14
Trojan Horse
Trojan.Formbook
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Web-based
Observed domains are covered under security categories |
Remcos - clever social engineering, or confused authors?
Regardless of whether targeted or not, most malspam campaigns generally rely on social engineering, intricately weaving interconnected elements to better ensnare victims. However, instances do exist where components fail to align. In such cases, the malicious actors who bungled their one job may be able to capitalize on user perplexity, prompting some people to click out of curiosity, blissfully unaware of the glaring red flags.
A good example of this is a recent Remcos campaign wherein actors impersonate an Argentinian hotel chain with locations in Buenos Aires, Trelew, and Puerto Iguazú. They then deploy malicious emails in Arabic (subject "نسخة الفاتورة") and sign off as a steel company in the UAE, using a different employee name. Intriguingly, they attempt to instill confidence by declaring that their new email domain will henceforth be associated with the steel company. Go figure.
Emails contain a .R10 archive (INVOICE0987654570.R10) and within the Remcos binary (INVOICE0987654570.exe) and were sent to random companies in the UK, US and EU, with some located in the UAE.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
Behavior-based
ACM.Untrst-RunSys!g1
File-based
CL.Suspexec!gen8
Scr.Malcode!gdn34
Trojan.Remcos
Machine Learning-based
Heur.AdvML.B!200 |
Remcos and GuLoader tools disguised as legitimate products
GuLoader is an advanced shellcode-based downloader that is often observed in spam runs, delivering payload variants including ransomware, infostealers, banking trojans, RATs, among others. Remcos, on the other hand, is commercially sold as remote control and surveillance software.
Researchers have recently spotted a couple of e-commerce websites selling branded versions of Remcos and GuLoader tools as legitimate products. The individuals operating these websites often post marketing videos of these masquerade products on their Telegram channel. There is proven evidence of their involvement in the distribution of malware, including Formbook and Amadey Loader.
Symantec protects you from this threat, identified by the following:
Behavior-based
Ransom.Pots
SONAR.TCP!gen1
Trojan.Remcos
File-based
Scr.Malcode!gdn30
Scr.Malcode!gdn32
Scr.Malcode!gdn34
Scr.Malcode!gen36
Trojan Horse
Trojan.Gen.2
Trojan.Gen.NPE
WS.Malware.1
WS.SecurityRisk.4
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Heur.AdvML.B!300
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
Remcos campaign observed with focus on US Tax Day
Recently, there has been increased activity of Remcos RAT in the threat landscape, reportedly observed being distributed in U.S. tax-related malicious emails. With the US Tax season near its end, actors try to lure firms dealing with tax preparation and financial services with messages around tax documentation from clients. The phishing emails contain shortcut files disguised as .pdf documents that upon execution start the infection chain and ultimately lead to the Remcos RAT payload.
Symantec protects you from these threats, identified by the following:
Email-based
Coverage is in place for Symantec's email security products
File-based
Trojan Horse
Trojan.Gen.MBT
Web-based
Observed domains are covered under security categories |
Remcos goes BIG
In recently observed activity, the Remcos RAT has been trying to avoid detection by going big - between 300MB and 1.5 GB big. It does this by adding extra bytes to the malicious file in the overlay section.
In the context of a binary file, an overlay section refers to a portion of the file that can be extended or modified without affecting the rest of the file's structure. By padding the overlay section with zeros you are effectively increasing its size, which in turn, makes the entire file bigger.
Padding in this manner (adding extra zero bytes to a file) doesn't change the content or functionality of the original data, it simply increases the overall file size. Padding is done for various reasons, such as aligning data to specific memory boundaries or ensuring consistent block sizes for more efficient read and write operations. But in this case bad actors are using it as a way to try to evade detection. Although the file size is in fact large, once archived it will appear to be less than 1MB.
Threat actors may add zero bytes to the overlay section of a malicious file to inflate its size for various reasons. These tactics include evading size-based security checks, confusing automated analysis and sandbox environments, tricking file integrity checkers, concealing additional payloads, misleading users with the appearance of legitimacy, and circumventing size-based detection rules.
These inflated Remcos have been observed being delivered via malspam, SEO poisoning and other phishing URLs.
Symantec protects you from this threat, identified by the following:
EDR-based
Symantec EDR is capable of monitoring and flagging this threat's tactics, techniques and procedures.
Symantec added malware specific threat hunting queries which can be fired on the customer iCDM console. For more information on these queries, refer to this GitHub repository: https://github.com/Symantec/threathunters/tree/main/Trojan/Remcos
File-based
Trojan.Remcos
Trojan Horse
Trojan.Gen.MBT
Network-based
System Infected: Trojan.Backdoor Activity 757
Email-based
Coverage is in place for Symantec’s email security products. |
Remcos RAT and Agent Tesla spread via KoiVM-based loaders
Remcos RAT and Agent Tesla malware have been distributed in a recent campaign leveraging a .NET loader in form of a KoiVM virtualized binary. The initial downloader is reported to be spread via malspam. Once extracted and executed, it downloads a KoiVM-based dropper that leads to stage 3 final payload of either Remcos or Agent Tesla. This malware distribution campaign has been leveraging Hastebin URLs as C2 server addresses. Both Agent Tesla and Remcos are malware families well established in the threat landscape and used in various attacks over the last few years.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.SuspDataRun
File-based
Scr.Malcode!gdn32
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.B
Web-based
Observed domains/IPs are covered under security categories |
Remcos RAT downloaded by a daisy-chain of Visual Basic scripts
Remcos RAT, even though used by malicious actors, is marketed and sold as an administrative tool by the company Breaking Security via their website. Remcos is often delivered through malicious documents or archive files containing scripts or executables.
A recent malspam campaign has been reported delivering Remcos under the guise of financially-themed emails. What is different in this campaign is that the file attached to the email is a Visual Basic Script (VBS) which when executed, daisy-chains the download and execution of several more VBS files until finally downloading and executing Remcos RAT on the victim's computer.
Symantec protects you from this threat, identified by the following:
File-based
Infostealer.Lokibot!43
ISB.Downloader!gen281
Scr.Malcode!gdn30
Trojan Horse
Trojan.Gen.NPE
Trojan.Mdropper
WS.Malware.1
WS.Malware.2
WS.SecurityRisk.4
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Website-based
Observed Domains are covered under security categories |
Remcos RAT remains active on the threat landscape
Remcos is a type of commercial RAT that stayed relatively active over the years and remains one of the top malware families spread by malspam to this day. The email campaigns distributing Remcos usually follow global trends or most current themes to make sure they get the much needed recipient's attention. Just this year Remcos has been observed to be delivered via various malicious email campaigns leveraging among others COVID-19 and US Tax Season themes.
Symantec protects you from this threat, identified by the following:
File-based
Heur.AdvML.B
Heur.AdvML.C
ISB.Downloader!gen76
Scr.Malcode!gdn30
Trojan.Dropper
Trojan.Gen.2
Trojan.Gen.MBT
Trojan Horse
Trojan.Mdropper
W97M.Downloader |
Remcos RAT spam campaigns targeting European countries
Multiple spam email campaigns delivering the Remcos RAT have been reported in the wild, targeting European countries. The threat actors responsible for these campaigns utilize AceCryptor to embed the malware for distribution, with the aim to exfiltrate user credentials from browsers and email clients.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Ps-RgPst!g1
ACM.Untrst-RgPst!g1
ACM.Untrst-RunSys!g1
Behavior-based
SONAR.Dropper
SONAR.SuspCreate!g12
SONAR.SuspBeh!gen633
File-based
Trojan Horse
Trojan.Gen.MBT
Trojan.Remcos
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. |
Remcos sighted in Romania and Moldova
Remcos seems to be everywhere, with campaigns observed on a daily basis. In this bulletin, we'll cover one instance where the actor is focusing their sights on Romania, Moldova, and surrounding countries. The actors behind this recent campaign are portraying themselves as a Romanian supplier of industrial equipment specializing in machine tools.
The malicious emails (subject: Comandă nouă) sent to companies in the region leverage a "product order" social engineering scheme. Attached is a ZIP archive (Noua lista de comenzi.zip), within which lies the Remcos binary posing as a command list (Noua lista de comenzi.exe).
Remcos RAT can severely impact companies by facilitating data theft, system compromise, operational disruption, espionage, reputation damage, and legal and compliance issues. Its ability to provide remote access to compromised systems enables attackers to carry out various malicious activities, leading to financial losses, operational disruptions, legal consequences, and damage to reputation.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec's email security products
Adaptive-based
ACM.Ps-RgPst!g1
File-based
Trojan.Gen.MBT
Trojan.Gen.NPE
Machine Learning-based
Heur.AdvML.B!100
Network-based
Audit: Bad Reputation Application Activity |
Remcos slipstreams the FIFA World Cup
As the FIFA World Cup is in full speed with victorious teams competing in the round of 16, malicious groups and individuals continue to slipstream this world event. As a recent example, Symantec observed a malspam campaign written in Turkish (email subject: FIFA DÜNYA KUPASI KATAR 2022 SATIN ALIM SİPARİŞİ) where an actor purports to be a FIFA official in Qatar. The malicious emails were sent to organizations around the world, using FIFA and a run-of-the-mill "purchase order" social engineering tactic. If victims are successfully lured into extracting the attached .IMG file and running the malicious executable file within, it will install the infamous Remcos Remote Access Trojan.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.SuspDataRun
Email-based
Coverage is in place for Symantec's email security products
File-based
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B |
Remcos spoofs Polish HVAC and Hungarian Paint and Hardware Retail companies
Remcos RAT has been around for a while now and is continuously observed worldwide, being used by multiple groups and individuals. In a recent example, an actor is currently targeting European companies, with a focus on Poland and Hungary, posing as a known Polish HVAC and a Hungarian paint & hardware retail company. Malicious emails contain a Word document (UPIT.doc or Zapytanie ofertowe.doc) crafted to exploit a known vulnerability (CVE-2017-11882), which would fetch and drop Remcos if executed.
Observed email subjects,
Upit za ponudom 531996790090
Prośba o ofertę Nº 48723
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
File-based
Exp.CVE-2017-11882!g5
Scr.Malcode!gdn34 |
Remittance malspam delivers JAR-based Qealler
Symantec has observed a malspam campaign that involves an embedded image linked to a malicious URL. The payload in this campaign is Qealler, which is a Java-based RAT malware designed to steal sensitive information. Emails involved in this spam run are masquerading as legit remittance notifications and asking users to download the attached document. A compromised domain link is embedded in the image served in the emails and if the image is clicked, the user gets redirected to a malicious site that triggers download of the JAR file executable named Remittance_Advice-PYMT8351.jar. The JAR file is currently blocked by Symantec as Trojan.Maljava.
Figure 1: Email sample showing the compromised domain.
Symantec protections against malware distributed in this spam campaign
Trojan.Maljava |
Remo Android banking trojan
Remo is a new Android malware variant found to be distributed by several phishing websites impersonating the Binance trading platform. The malware has been reported to target various banking and cryptocurrency trading / wallet applications for the purpose of data theft. Remo abuses the Accessibility Services on the infected device in order to log keystrokes, steal clipboard data or capture text displayed on the victims' screen. Latest campaigns spreading this malware have been mainly targeting mobile users in Southeast Asia.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
Android.Reputation.1
Android.Reputation.2
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
Reports of WordPress File Manager Plugin vulnerability being exploited in the wild
We have been aware of reports relating to malicious actors exploiting the recently discovered WordPress File Manager Plugin vulnerability in the wild. The flaw resides in version 6.0 to 6.8 of the WordPress File Manager plugin, which at the time of disclosure had more than 700,000 installations worldwide. Successful exploitation of this vulnerability could allow a remote code execution on the vulnerable WordPress sites. While the vulnerability does not have any CVE assigned to it yet, an updated version (6.9) of the File Manager plugin has been released already on the first of September to fix the bug.
Symantec protections for the discussed vulnerabilities
IPS [32545] Attack: WordPress File Manager Plugin RCE
IPS [32535] Attack: WordPress File Manager Plugin RCE 2 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.