text
stringlengths
0
383k
Qilin ransomware remains an active threat in the landscape Qilin, also known as Agenda, is a Rust-based ransomware variant discovered in 2022. The malware has been spreading actively in the wild in recent months, with ongoing developments evident in new versions. Qilin is known to be distributed under a Ransomware-as-a-Service (RaaS) model with its operators often employing double extortion tactics. Most recent campaigns utilise custom PowerShell scripts to target vCenter and ESXi instances. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Ps-Rd32!g1 ACM.Untrst-RLsass!g1 Behavior-based SONAR.Cryptlocker!g42 SONAR.SuspLaunch!gen4 SONAR.SuspLaunch!g18 SONAR.SuspLaunch!g253 SONAR.TCP!gen1 SONAR.TCP!gen6 File-based Ransom.Agenda Ransom.Qilin Ransom.Qilin!g1 Trojan.Gen.MBT Trojan Horse Web.Reputation.1 WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.A!400 Heur.AdvML.A!500 Heur.AdvML.B!100 Heur.AdvML.B!200
QnodeService, not the kind of service you want QnodeService has been fairly active in the threatscape this year. Over the last few months, actors have been spreading countless malicious QnodeService downloaders and trojans (mainly obfuscated with Allatori) via multiple spam campaigns. Symantec continues to observe a vast array of social engineering tactics employed by the perpetrators, from slipstreaming global events such as COVID-19, to the run-of-the-mill postal shipping, quotes, billing and banking transfer tricks. While there is a clear focus on NAM and EMEA, we also have seen campaigns targeting industries in the APAC region. Below are some of the email subjects we have observed over the past 30 days which were associated with QnodeService malware campaigns: Email subjects [Removed] Tracking - 187320605737 Delivery scheduled for today [Removed] #4091013211 PICKUP Invoice From Tour Africa Travel PVM sąskaitos faktūros Delayed Delivery Customer Statemen from Leather Merchant SERVICES Swift October MT103... Facture Octobre Wydruk [Faktura] OPERATIONS MT103/202 EN ATTENTES... Invoice From [Removed] Australia Symantec has various protection layers in place for this threat: File-based Trojan.Maljava Backdoor.Trojan Trojan.Gen.NPE Network-based System Infected: Trojan.Backdoor Activity 527 System Infected: Trojan.Backdoor Domains 2 Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. Website-based This activity is proactively blocked by Symantec Web Isolation technology.
QnodeService tries "sex tape" social engineering QnodeService has been very active this year and the authors behind this malware have employed different social engineering tactics in their spam campaigns, from global events such as COVID to run-of-the-mill invoices, bank transfers and shipping quotes. Recently however, they have been seen trying the infamous "sex tape" social engineering trick to lure so-inclined or perhaps just curious victims. Malicious emails purporting to contain a sex tape involving Trump have been observed, but there is actually no video attached to those emails, it is in fact the QnodeService downloader which then installs the QnodeService Remote Access Trojan (RAT). Symantec has the following coverage in place: File-based Trojan.Gen.NPE Trojan.Maljava Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Qvoid Stealer Activity Uptick It's hardly a surprise to see malware source code hosted on public sites being leveraged by multiple threat actors. Qvoid Stealer has not escaped this fate with Symantec observing an increase in related activity over the past few months. This threat is similar to many other infostealers that gravitate around Discord capability-wise, reporting back to the operator using Discord's webhooks. It's able to collect Discord tokens and passwords, compromised system information, grab screenshots, steal web browser data (passwords and cookies), clip crypto wallets, etc. Most recent activities are drive-by-download campaigns in which actors disguised Qvoid Stealer as cracked and fake software. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec's email security products File-based SMG.Heur!gen Network-based System Infected: Trojan.Backdoor Activity 632 System Infected: Trojan.Backdoor Activity 634 System Infected: Trojan.Backdoor Activity 656 Machine Learning-based Heur.AdvML.B Heur.AdvML.C
QwixxRAT QwixxRAT is a new Remote Access Trojan variant seen used recently in in-the-wild campaigns. The malware is reported as being distributed via Telegram and Discord platforms. QwixxRAT has the functionality to allow attackers remote control over the infected endpoint, to launch arbitrary commands or to collect confidential user data. The communication to the attackers C&C and extraction of any collected user data is achieved with help of a Telegram bot API. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.Dropper File-based Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.A!400 Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Raccoon - The masked bandit information stealer Raccoon Stealer first seen in 2019 has shown a recent resurgence. It is an information stealer and a dropper for other malware that targets a victims credentials and cryptocurrency wallets. The distribution method varies, but it is known to be delivered through unsolicited spam campaigns with malicious document attachments, exploit kits and malvertising. Symantec protects you from this threat, identified by the following: File-based Downloader Heur.AdvML.B Heur.AdvML.C Trojan.Gen.2 Trojan.Gen.MBT Trojan Horse Trojan.SnakeKeylogger WS.Malware.1 WS.Malware.2 Behavior-based SONAR.MalTraffic!gen3 SONAR.SuspBeh!gen1 SONAR.SuspBeh!gen24 SONAR.SuspLaunch!g12
Raccoon infostealer activity Symantec researchers have observed an uptick in Racoon activity recently. Raccoon is an infostealer and a dropper for other malware. The malware is sold underground at a relatively cheap price, which explains its popularity with cyber criminals. It's known to be delivered through spam campaigns, exploit kits and malvertising. Symantec provides the following coverage against recent variants of Raccoon: Trojan.Gen.2 Heur.AdvML.B
Raccoon Stealer continues to lurk Raccoon Stealer is still active in the threat landscape impacting both consumers and enterprise around the globe. This stealer-as-a-service is being used by multiple groups and individuals looking to steal credentials and cryptowallets. Over the years it's been seen distributed via malicious emails, exploit kits and in recent months increasingly seen disguised as cracked software. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.2 Trojan.Gen.MBT Trojan Horse Machine Learning-based Heur.AdvML.B Heur.AdvML.C
Raccoon Stealer returns with an updated variant A new version of the infamous Raccoon Stealer has been discovered in the wild. Raccoon Stealer 2.0 as advertised on underground forums, is written in C++ and claims several performance and detection avoidance improvements over the earlier version of the infostealer. The updated malware has been reported as being already distributed through cracked software packages. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.AM.E!g37 SONAR.ProcHijack!g21 SONAR.SuspLaunch!g12 SONAR.TCP!gen1 File-based CL.Downloader!gen111 Packed.Generic.525 Packed.Generic.620 Scr.Malcode!gdn30 Scr.Malcode!gdn33 Scr.Mallnk!gen1 Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B Heur.AdvML.C Network-based System Infected: Trojan.Backdoor Activity 632 System Infected: Trojan.Backdoor Activity 634
Raccoon Stealer updated to gather cryptocurrency wallet IDs and facilitate file uploads and downloads Raccoon Stealer, a cloud stealer-as-a-service, has been updated to not only gather cryptocurrency wallet IDs but to allow file uploads and downloads. The information stealer, active for over 2 years, is used to gather passwords, cookies, and other form data from locally stored website data in the user's browser. Adding cryptocurrency IDs and file access to its services shows that it is still in active development and could help it become more prevalent. Symantec protects you from these threats, identified by the following: File-based Trojan.Gen.2 Trojan.Gen.MBT
Raccoon Stealer v2.3.0 After a 6-month hiatus, a post in one underground forum was seen promoting the new Raccoon Stealer version 2.3.0. The infostealer was enhanced from its previous versions and now includes new features such as a new quick search tool to easily browse through stolen data, automatic bot blocking and panel display, reporting system that detects and blocks IPs by crawlers (protection against threat researchers) and a new log stats panel. Symantec protects you from this threat, identified by the following: File-based Downloader ISB.Downloader!gen483 Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.B Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Ragnar Locker finds new ways to pressure its victims We have become aware of reports that the group responsible for the Ragnar Locker ransomware has used a hacked Facebook advertiser's account in order to run ads promoting their attacks. Ragnar Locker is one of the most prominent targeted ransomware families and has been used in campaigns targeting various companies this year. Not only do the attackers encrypt user's data, they also threaten to publish it if ransom demands are not met. With this latest tactic the threat actors are trying to publicly pressure more victims into paying the ransom. While Symantec continues to monitor this ransomware family, we recommend regular backup procedures of any important files and applying the latest product definitions to protect against ransomware threats. Symantec Protection against Ragnar Locker ransomware family: File-based Protection Downloader Heur.AdvML.B Heur.AdvML.C Ransom.Gen Ransom.RagnarLocker Trojan.Gen.MBT Trojan Horse Behavior-based Protection SONAR.Cryptlck!g171 SONAR.SuspLaunch!gen4 SONAR.SuspLaunch!g18 Network-based Protection [32179] Attack: Ransom.Gen Activity 23
RA Group ransomware RA Group is a new ransomware threat actor whose operations have been observed in the wild since April 2023. The threat group leverages customized encryptor malware based on the leaked Babuk ransomware source code. The malware has the capability to delete the volume shadow copies on the infected machine. It encrypts users' files appending a .GAGUP extension, and employs double extortion techniques by also threatening victims with the public release of their stolen data. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.Ransomware!g7 SONAR.Ransomware!g16 SONAR.Ransomware!g38 SONAR.TCP!gen1 File-based Downloader WS.Malware.2 Machine Learning-based Heur.AdvML.C
Rampant Kitten campaign targets Iranian entities A recent report unraveled an ongoing surveillance operation by threat actors that has purportedly been targeting Iranian expats and dissidents for years. The reported campaign, named Rampant Kitten, had several possible attack vectors: Windows based infostealers An Android based backdoor Phishing pages associated with Telegram The attackers attempt to take advantage of multiple attack vectors to spy on their victims, attacking victims’ personal computers and mobile devices. Symantec provides the following protection for associated indicators: File-based Downloader ISB.Downloader!gen73 PUA.Yontoo.C Trojan Horse Trojan.Gen Trojan.Gen.2 Trojan.Gen.MBT WS.Reputation.1 Website-based This attack is blocked by Symantec Web Isolation technology
Rancoz ransomware Rancoz is a ransomware variant recently discovered in the wild. The ransomware will encrypt user files and append .rec_rans extension to them. The malware has the functionality to delete system backups, volume shadow copies and system logs on the compromised machines. Upon completed encryption, the malware will change the desktop wallpaper and drop ransom note advising the victims to contact the attackers via email. The threat actor behind this malware variant employs the double extortion technique by also threatening the victims with publicly leaking the compromised data. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.Cryptolocker!g42 SONAR.Ransomware!g38 SONAR.SuspLaunch!g18 SONAR.SuspLaunch!g253 SONAR.SuspLaunch!gen4 SONAR.TCP!gen1 File-based Downloader WS.Malware.1 Machine Learning-based Heur.AdvML.C
RanHassan (aka DcDcrypt ) ransomware RanHassan also known as DcDcrypt is another run-of-the-mill ransomware variant seen in the wild. The malware first discovered around May 2022 has been known to target users from India and various Arabic speaking countries. RanHassan is written in C# and it appends .[Enc] extension to the encrypted files. The malware is pretty basic without any functionality to delete backups/volume shadow copies or establishing any persistence on the infected machine. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Machine Learning-based Heur.AdvML.C
Ranion RaaS – Free malware lasts longer Nowadays, Ransomware stories are seemingly endless as the business continues to boom. These threats come and go, but some persist. Ranion has been around since at least 2017 according to reports, and is still active. Ranion is a run-of-the-mill Ransomware-as-a-Service but is advertised on the dark web for free, although there are paid add-ons available for purchase such as dropping capabilities. This add-on would allow actors to drop other threats on to compromised machines. In recent campaigns, actors have distributed this Ransomware via Malspam and notably, the common double-extortion tactic is not employed. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.B Heur.AdvML.C Downloader Trojan.Gen.2 Trojan.Gen.MBT
Ransom Cartel shows similarities to Revil ransomware Ransom Cartel is a ransomware variant distributed under the Ransomware as a Service (RaaS) model. This malware strain first emerged back in December 2021 and it exhibits a certain number of similarities to the infamous Revil ransomware. The threat actors behind the ransomware leverage double extortion tactics and beside encrypting the confidential files also threaten the victims with the publication of the stolen data. The attackers have been reported to use a variety of additional tools in attempts to compromise victims, such as DonPAPI, LaZagne and Mimikatz. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.Ransomware!g19 SONAR.Ransomware!g30 SONAR.Ransomware!g39 File-based Ransom.Cartel Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 WS.Malware.2 Web-based Observed domains/IPs are covered under security categories
RansomExx continues targeted campaigns RansomExx is known to be a re-branded variant of the early Defray ransomware. It has shown increased activity in 2020 while targeting several companies across the world and demanding millions of dollars in ransom. Some more common features of this ransomware strain include the attempts to disable system restore and data backup, the ability to kill specific processes or to bypass system related files and folders. We recommend regular backup procedures of any important files and applying the latest product definitions to protect against ransomware threats. Symantec protections: File-based Downloader Heur.AdvML.B Heur.AdvML.C Ransom.Exx Trojan.Gen.2 Trojan.Gen.MBT Network-based [32436] Attack: Ransom.Gen Activity 29
RansomExx ransomware now comes with a Linux variant RansomExx is known to be a spin-off of the older Defray ransomware family. The ransomware has been actively targeting several companies across the world in 2020. According to the latest reports, there is a new variant of RansomExx discovered in the wild that has been specifically written for the Linux platform. It is reported that the 64-bit ELF malware executables do not exhibit any network activities and seem to focus mainly on file encryption. We recommend regular backup procedures of any important files and applying the latest product definitions to protect against ransomware threats. Symantec protections against the RansomExx family latest samples: Heur.AdvML.B Heur.AdvML.C Ransom.Exx Trojan.Gen.NPE Trojan.Gen.MBT Trojan.Horse
RansomHouse threat group activities RansomHouse is a threat group active on the ransomware landscape since at least 2021. The group has been known to conduct encryption campaigns targeting Linux instances and VMware ESXi virtual machines with Babuk ransomware variants such as WhiteRabbit or MarioLocker. This threat actor often leverages phishing campaigns or known vulnerabilities for initial access. According to latest reports, RansomHouse remains active in 2023. The threat actors also employ double extortion tactics by exfiltrating user data and threatening to release it on a public leak site. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.ProcHijack!g45 SONAR.SuspLaunch!g12 SONAR.TCP!gen1 File-based Hacktool Ransom.Babuk Ransom.Gen Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.A!400 Heur.AdvML.A!500 Heur.AdvML.B!100 Heur.AdvML.B!200 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Ransomware attack on gaming firm Symantec Security Response is aware of a recent report where a popular gaming publisher and developer was infected with HelloKitty ransomware. The report indicated that a health organization and a powerplant operator were also victims of the same ransomware, which adds a ".crypted" file extension to the files it encrypts. Symantec provides the following coverage against this HelloKitty ransomware: Trojan.Gen.2 Ransom.CryptoTorLocker Heur.AdvML.B
Ransomware attacks leverage dual-use tools for data exfiltration Data exfiltration is a core component of today's ransomware attacks. The Symantec Threat Hunter Team, part of Broadcom, has put together a report which identified an increased usage of both malicious and legitimate exfiltration tools that are being leveraged to provide this functionality. The report identifies legitimate use tools such as Rclone, AnyDesk, and ScreenConnect as well as malicious tools like Cobalt Strike as being used by multiple Ransomware actors. Read more in our blog: Data Exfiltration: Increasing Number of Tools Leveraged by Ransomware Attackers Symantec protects you from these threats, identified by the following: Adaptive-based ACM.Ps-Rd32!g1 ACM.Untrst-RunSys!g1 Behavior-based AGR.Terminate!g2 AGR.Terminate!g10 AGR.Terminate!g5 SONAR.TCP!gen1 SONAR.TCP!gen6 File-based Backdoor.Cobalt Backdoor.Cobalt!gen1 Backdoor.Cobalt!gen7 Backdoor.Cobalt!gm1 Backdoor.Cobalt!gm5 Hacktool Hacktool.Chisel Hacktool.Gen Trojan Horse Trojan.Gen.9 Trojan.Gen.MBT WS.Malware.1 WS.Malware.2 Machine learning-based Heur.AdvML.A Heur.AdvML.A!300 Heur.AdvML.A!500 Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Heur.AdvML.C Network-based Web Attack: Webpulse Bad Reputation Domain Request (29565)
Ransomware daddy demands $25M and change Symantec Security Response has come across a puzzling new ransomware variant. Named Daddycrypt, it encrypts files on the infected machine and appends a ".daddycrypt" file extension to them. The perpetrator then demands a whopping 500 bitcoins (currently over 25 million US dollars) plus a 500 dollar Amazon gift card for decrypting the files. Symantec detects Daddycrypt ransomware as the following: File-based Trojan.Gen.2
Ransomware demands a ransom without encrypting files Symantec Security Response is aware of a public report that a peculiar PowerShell ransomware was recently submitted to an online file scanning site. The ransomware is unique in that it does not encrypt files one-by-one on the compromised system, but instead puts all the target files into a single encrypted 7zip file (extension 7z). This effectively achieves the same goal but in a different manner. Perhaps even stranger, the ransom demand is US$20 worth of Bitcoin for the password to the encrypted 7zip file, significantly lower than most other ransomware. Symantec protects you from this threat, identified by the following: File-based Ransom.Hamachive
Ransomware in Review: LooCipher Few can argue that 2020 wasn't the year of ransomware as it reclaimed its position at the top of the malware kingdom. A new ransomware Security Response came across in June this year is LooCipher. The ransomware is typically distributed through spam runs containing malicious document files. Files encrypted by LooCipher will have the extension ".lcphr" appended to them. Ransomware notes will be also present as @Please_Read_Me.txt that contain a Q&A and a bitcoin address for the ransom payment. Symantec provides the following coverage against LooCipher ransomware: File-based Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT
Ransomware variant "Help" discovered Security Response has come across a new ransomware variant being called "Help". As is often the case, the name was derived from the fact that encrypted files will have a .help file extension. Symantec detects Help ransomware as the following: File-based Trojan Horse Trojan.Gen.2
Ranzy Locker ransomware remains active in the wild and continues to target organizations Symantec Security Response is aware of a recent FBI alert about the increased number of activities observed for the Ranzy Locker ransomware. Ranzy Locker was first seen in 2020 and is believed to be a rebranded variant of ThunderX ransomware. Ranzy has been leveraged in various campaigns targeting multiple organizations and has reportedly compromised more than 30 US businesses this year. Attackers behind the Ranzy Locker employ the Double Extortion tactic which includes, not just encrypting the user data but also ex-filtering it to the attacker’s remote servers and later using it as leverage to force the ransom payment. Symantec protects you from this threat, identified by the following: File-based Downloader Ransom.Cryptolocker Trojan.Gen.2 WS.Malware.1 Machine Learning-based Heur.AdvML.B
RapperBot botnet now also with cryptomining functionality RapperBot is a DDoS botnet known to target IoT devices since around mid-2022. The botnet usually exploits weak or default SSH/Telnet credentials and brute-forces access to vulnerable devices in order to initiate Distributed Denial of Service (DDoS) attacks. Some most recent campaigns leveraging RapperBot have been observed to execute Monero cryptocurency miners on the infected devices. The running miners can be configured to use multiple mining pools with some of them hosted as mining proxies on the C2 servers of RapperBot itself. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.NPE WS.Malware.1 WS.Malware.2 Web-based Observed domains/IPs are covered under security categories
RapperBot in the Linux threatscape Ever since Mirai first appeared in the threat landscape there hasn't been any shortage of Linux bots with Distributed Denial-of-Service (DDoS) capabilities which target Internet of Things (IoT) devices. Every now and then one of these bots (based on Mirai's code) is brought to light, such as RapperBot. According to reports, this threat, located on compromised IoTs scans SSH servers and tries to brute force them. If successful, it will report the credentials to its command-and-control server and then deploy itself on the SSH server. Symantec protects you from this threat, identified by the following: File-based Linux.Mirai
Raptor Android RAT C2 Sighted Symantec has observed an individual or group that generated samples and a Command and Control (C2) server of an Android Remote Access Trojan known as "Raptor." This threat is not new having been in circulation for a few years now. Its code is accessible to the public through older entries on forums, websites, and software development platforms. If this threat is successfully installed without the victim's knowledge, it will report to its C2 server and await the actor's commands. The malware enables the author to retrieve and exfiltrate stolen information to Discord via Webhooks. Some of its capabilities include: Collect sensitive information (SMS, device and location data, call logs, contacts, app list, files, browser history, etc.) Perform SMS premium scams Wipe content on the SD card Lock the screen and change the wallpaper Encrypt all pictures and media files with the AES key "0123456789012345" Vibrate the device, delete call logs, and initiate a voice message Symantec protects you from this threat, identified by the following: Mobile-based Android.mobilespy
Raspberry Robin malware continues to evolve The Raspberry Robin malware has been observed exploiting two 1-day LPE (Local Privilege Escalation) exploits, with the most recent one being CVE-2023-36802, a Microsoft Streaming Service Proxy vulnerability which enables privilege escalation. Raspberry Robin is also evolving by incorporating more advanced defense evasion techniques, including evading system shutdowns, validating remote desktops, and checking UWF (Unified Write Filter) filter drivers. Furthermore, it has updated its attack vector by utilizing new deployment methods, such as masquerading as a legitimate Windows service. Symantec protects you from this threat, identified by the following: File-based Packed.Generic.553 Trojan Horse Trojan.Emotet Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Raspberry Robin targeting financial entities in Europe A new wave of attacks involving the Raspberry Robin malware has been observed in the wild. The attack chain involves malicious MSI installer files (around 500MB large in size) that are dropped onto the victim's machine. When unpacked the size is much smaller and the malicious samples attempt to connect to the attackers's C2 servers in order to download additional malware modules. The attackers behind the recent Raspberry Robin campaigns have been abusing several well known data hosting providers such as Discord or Azure to host the malicious payload binaries. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.B Web-based Observed domains/IPs are covered under security categories
Raspberry Robin worm spreads via USB devices Raspberry Robin (also known as "QNAP worm") is a malware with worm capabilities initially discovered back in September 2021. The malware is known to spread via infected USB drives with the help of malicious .lnk files. The execution chain involves downloading and executing .msi packages containing malicious libraries. Raspberry Robin also leverages the Microsoft Standard Installer (msiexec.exe) process to connect to pre-configured C2 servers belonging to the attackers. In some other instances the utilized command and control (C2) infrastructure involved malware's connections to TOR network nodes. Symantec protects you from this threat, identified by the following: File-based CL.Downloader!gen20 Downloader Packed.Generic.553 Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.C Policy-based DCS Hardening for Windows has zero day protection against the Raspberry Robin threat. DCS default lockdown prevents arbitrary download of .msi packages and launch of msiexec.exe to connect to external C2 infrastructure. Web-based Observed IPs/domains are covered under security categories
RAT + free VoIP + future ransomware = Abaddon RAT Symantec Security Response is aware of a new Remote Access Trojan named Abaddon which was recently unleashed into the wild. The RAT is reportedly the first malware to use a popular free VoIP software, especially among gamers, as a Command and Control (C&C) server. The RAT has ransomware capability, however the feature appears to be still in development. It's not too far fetched to think Abaddon will be equipped with the ransomware feature in the near future. Symantec detects Abaddon RAT as the following: Backdoor.Trojan
Rat4Droid In 2023, Rat4Droid was echoed across various platforms such as hacking websites, Facebook, Youtube and Telegram channels, and observed in numerous campaigns where multiple groups and individuals disguised it as different apps (example: Porn, documents, Free phone numbers, PUBG redeem codes, music, photo editors, etc.) and targeted various demographics. The Author has localized it to market to Arabic, French, English, Spanish and German speakers. It packs run-of-mill extraction and execution capabilities including: Data extraction: contacts, photos, files, SMS, call logs, location Command execution: delete file, play sound, change wallpaper, vibrate, send voice message and notification, turn on flash, open application, lock screen, factory reset, perform call, send SMS, record voice. Prevalence-wise, while it's not as active as other Android remote access trojans like Spynote and Irata, Symantec continues to observe both testing and malicious activities in multiple countries (with a slightly higher volume in Arabic speaking countries). Symantec protects you from this threat, identified by the following: Mobile-based AppRisk:Generisk
RAT malware spread via a fake Telegram website A new malicious campaign has been identified, where the attackers attempt to distribute a Remote Access Trojan (RAT) malware via a webpage masqueraded as a legitimate Telegram website. The malware is spread through an MSI installer package, that once executed sideloads a malicious .dll binary called mpclient.dll. The name of this .dll file on purpose resembles a legitimate system file found on MS Windows systems. The RAT payload, once successfully installed, awaits further commands from the attacker's C2 servers. The malware code indicates that it has the functionality to terminate running processes, delete data from various applications and browsers as well as download additional arbitrary payloads. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories
RatMilad mobile spyware RatMilad is new mobile malware targeting enterprise devices, that has been just recently discovered in the wild. The malware exhibits both spyware and Remote Access Trojan (RAT) capabilities. Depending on the commands received from the attackers it can collect a wide range of data from the infected device, ex-filtrate it and perform additional malicious actions such as writing and deleting files, among others. RatMilad is believed to be distributed through Telegram channels under the disguise of VPN applications and it's relying on social engineering techniques to convince users to sideload the fake app on their mobile devices. Symantec protects you from this threat, identified by the following: Mobile-based Android.Reputation.1 Android.Reputation.2 Web-based Observed domains/IPs are covered under security categories
RATs delivered via malicious ads Threat actors have been reported leveraging Google search results to host malware via malicious ads targeting users who are attempting to circumvent tight restrictions in China against the use of Telegram or LINE. A VPN enables users to access restricted platforms and search for the aforementioned banned applications, but they may be lured into downloading a malware-laden file masquerading as an installer for the banned apps, where in fact the installer is a Remote Administration Trojan (RAT) file capable of giving the attacker full control over the victim's machine. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B!100 Heur.AdvML.B!200 Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
RATs get cozy with AHK (AutoHotKey) loader There is yet another loader in-the-wild and this one, known as AHK Loader, has the peculiarity to be tied up with the AutoHotKey scripting language. According to reports, the actors lure victims with an AutoHotKey executable which then uses malicious VBScripts to load a Remote Access Trojan. Multiple RATs have been seen utilizing AHK loader in various campaigns including: LimeRAT, RevengeRAT, VjW0rm, Houdini RAT, etc. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.C Trojan.Horse WS.Malware.1 WS.Malware.2 Behavior-based SONAR.SuspBeh!gen1 SONAR.SuspBeh!gen25 SONAR.SuspBeh!gen66 SONAR.TCP!gen1
RATs learning new habits A new malware written in Go, named HabitsRAT, has been seen targeting both Windows and Linux machines. The original Windows version attacks Microsoft Exchange servers. We have now observed updated variants targeting both Windows and Linux environments. This attack takes remote control of the targeted machine and uses a private key to sign files in order to evade detection. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.2 Backdoor.Trojan Trojan.Gen.MBT Trojan Horse Website-based Observed domains are covered under security categories
RA World Ransomware Recently spotted in the wild, RA World is another ransomware variant that encrypts user files, adding a .RAWLD extension. Victims are prompted to contact the attackers via Tox or Telegram to receive instructions on data recovery. The ransom note, named "Data breach warning.txt," warns of potential public data exposure if ransom demands aren't met. RA World ransomware can erase Volume Shadow Copies on the infected system. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.Ransomware!g1 SONAR.Ransomware!g3 SONAR.Ransomware!g7 SONAR.Ransomware!g38 SONAR.SuspLaunch!g18 SONAR.SuspLaunch!g253 File-based Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.C
RAXNET Bitcoin Stealer Why bother mining cryptocurrency when you can just clip crypto wallets and hijack cryptocurrency transactions? That's the road many cybercriminals are undertaking and there isn't any shortage of such clippers on both underground markets and public sources. RAXNET Bitcoin Stealer is one of these recently observed doing the rounds. These threats are usually delivered via drive-by-download rather than other common vectors such as malicious emails. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B
RCE vulnerability in Centos Web Panel 7 (CVE-2022-44877) CentOS Web Panel (CWP) is a web-based control panel for Linux servers. It allows users to manage various aspects of their server, including web server, email, DNS, and databases, through a web-based interface. Recently Centos released a patch for a remote code execution (RCE) vulnerability in Centos Web Panel 7 (CVE-2022-44877) which if successfully exploited, would allow remote attackers to execute arbitrary OS commands via shell metacharacters in the login parameter. Following the release of the patch the security researcher who reported this vulnerability shared a proof-of-concept. Unfortunately when guidance and proof-of-concept code is publicly available it often fuels malicious activities as actors assimilate. Over the past week, there have been multiple attempts to compromise unpatched CWP servers by using CVE-2022-44877. Symantec protects you from this threat, identified by the following: Network-based Attack: Centos Web Panel 7 RCE CVE-2022-44877
Read The Manual (RTM) Locker ransomware RTM (Read The Manual) Locker is another Ransomware-As-A-Service (RaaS) malware variant observed recently on the threat landscape. The ransomware employs multi-threaded encryption process, is able to delete Volume Shadow Copies and can also stop/disable certain system processes and services. Upon the successful file encryption the RTM Locker will drop a ransom note and change the desktop wallpaper on the infected endpoint informing the victims about the compromise and advising them to contact the attackers. The ransomware will then ensure all logs from the compromised machine are wiped before it deletes itself. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.CryptoLocker!g35 SONAR.CryptoLocker!g36 SONAR.Ransomware!g7 SONAR.Ransomware!g16 File-based Ransom.Generic.1 Machine Learning-based Heur.AdvML.B
Realst infostealer spread via fake blockchain games The discovery of rust-based malware dubbed Realst represents a concerning development in the world of cyber threats, especially for users of Windows and macOS systems. The attackers behind Realst have employed fake blockchain games such as Brawl Earth, Dawnland, Destruction, Evolion, WildWorld etc. as a disguise to lure unsuspecting users into downloading and installing the malware. These games might promise exciting rewards or other incentives to entice users into engaging with them. The consistent behavioural patterns observed in the Realst malware indicate a deliberate focus on stealing valuable information related to browsers, crypto wallets, and keychain databases. Given its recent interest in macOS 14 Sonoma, it appears to be actively evolving to target the latest operating system versions. Symantec protects you from this threat, identified by the following: File-based ISB.Heuristic!gen21 OSX.Trojan.Gen OSX.Trojan.Gen.2 Trojan Horse Trojan.Gen.MBT Web.Reputation.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Realtek SDK 2021 vulnerability is still exploited for malware distribution Realtek Jungle SDK (CVE-2021-35394) is a remote code execution vulnerability disclosed in August 2021. If successfully exploited, the attackers could gain complete control of the compromised devices, leverage them for DDoS attacks or run arbitrary code remotely. While the vulnerability has been known for over 1.5 years now, it is reported as still being exploited in the wild for the delivery of various malware families including Mirai, Gafgyt, Mozi and the DDoS botnet known as RedGoBot. Symantec protects you from this threat, identified by the following: File-based Linux.Lightaidra Linux.Mirai Trojan Horse Trojan.Gen.NPE WS.Malware.1 Network-based Web Attack: Realtek Jungle SDK RCE CVE-2021-35394 Web-based Observed domains/IPs are covered under security categories
Realtek SDK vulnerabilities exploited by the Mirai botnet Mirai botnet variant known as Dark.IoT has been reported to leverage two most recently discovered Realtek SDK vulnerabilities tracked as CVE-2021-35394 and CVE-2021-35395. The disclosed vulnerabilities might impact wireless devices relying on Realtek chipsets and SDK from several different vendors. If successfully exploited, the attackers could gain a complete control of the compromised devices, leverage them for DDoS attacks or run arbitrary code on them. Symantec protects you from this threat, identified by the following: File-based Downloader Linux.Mirai Trojan.Gen.NPE Network-based Web Attack: Realtek Jungle SDK RCE CVE-2021-35394 Web Attack: Realtek Jungle SDK RCE CVE-2021-35395 Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains are covered under security categories
Recent activities of the RIG Exploit Kit Despite the general decline of Exploit Kit activity in the last few years, RIG EK remains to be continuously leveraged in the wild. The attack volume attributed to this exploit kit has shown an uptick during the last year alone, suggesting the EK activity will continue for the years to come and will remain a significant threat to enterprises. RIG still incorporates relatively old Internet Explorer vulnerabilities dating back even to 2012. Two recently used exploits are Microsoft Internet Explorer CVE-2020-0674 and CVE-2021-26411. Historically RIG EK has been utilized to distribute a variety of malware payloads, including Dridex, SmokeLoader, RaccoonStealer, RedlineStealer, Ursnif, PureCrypter, Royal ransomware and many others. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.ProcHijack!g45 SONAR.SuspScript!g20 File-based Packed.Generic.528 Packed.Generic.553 Packed.Generic.616 Scr.Malcode!gdn32 Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A Heur.AdvML.B Network-based Web Attack: Internet Explorer RCE CVE-2021-26411 Web Attack: Microsoft Internet Explorer CVE-2019-0752 Web Attack: Microsoft Internet Explorer CVE-2020-0674 Web Attack: Microsoft VBScript Engine RCE CVE-2018-8174 Web Attack: RIG Exploit Kit Website Web Attack: RIG Exploit Kit Website 3 Web Attack: RIG Exploit Kit Website 5 Web Attack: Rig Exploit Kit Website 8 Web Attack: Rig Exploit Kit Website 14 Web Attack: Rig Exploit Kit Website 23 Web-based Observed domains/IPs are covered under security categories
Recent activities of the Webworm APT group Symantec, by Broadcom Software, has gained insight into the current activities of a group we call Webworm. The group has developed customized versions of three older remote access Trojans (RATs), including Trochilus, Gh0st RAT, and 9002 RAT. At least one of the indicators of compromise (IOCs) observed by Symantec was used in an attack against an IT service provider operating in multiple Asian countries, while others appear to be in pre-deployment or testing stages. Active since at least 2017, Webworm has been known to target government agencies and enterprises involved in IT services, aerospace, and electric power industries located in Russia, Georgia, Mongolia, and a number of other Asian countries. Read more in our blog: Webworm: Espionage Attackers Testing and Using Older Modified RATs Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen6 File-based Trojan Horse Trojan.Gen.MBT WS.Malware.2 Machine Learning-based Heur.AdvML.B Heur.AdvML.C
Recent activity of the TA866 threat group New activity associated to the TA866 threat group has been observed in recent months. The threat actors have been targeting organizations in the United States and Germany with a variety of commodity and custom malware variants. The attack chain usually involves phishing emails with Microsoft Publisher (.pub) file attachments containing malicious macros, or .pdf files containing URLs that lead to malicious Javascript files. WasabiSeed, Screenshotter as well as AHK Bot and Rhadamanthys Stealer were among the malware families distributed recently by the TA866 group. Symantec protects you from this threat, identified by the following: File-based Downloader Infostealer Trojan.Malmsi Web-based Observed domains/IPs are covered under security categories
Recent Agent Tesla Malspam Campaign We recently observed a spike in detections related to Agent Tesla malware due to an ongoing malware campaign. The attack initiated from phishing emails with malicious attachments or links, often disguised as legitimate sources. Symantec's advanced machine learning technology (AML) has proactively blocked this reported campaign. Agent Tesla is a Remote Access Trojan (RAT) written in .NET, active since 2014. Versatile, with capabilities such as keylogging, screenshot capture, data theft, and remote access control, this malware regularly updates and evolves making detection an ongoing challenge. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Ps-Sc!g1 ACM.Ps-RgPst!g1 ACM.Rgsvc-Lnch!g1 ACM.Untrst-RgPst!g1 ACM.Untrst-RunSys!g1 Behavior-based AGR.Terminate!g2 SONAR.SuspBeh!gen24 SONAR.SuspBeh!gen526 SONAR.SuspBeh!gen530 SONAR.SuspBeh!gen752 SONAR.SuspLaunch!g310 SONAR.TCP!gen1 File-based CL.Suspexec!gen8 CL.Suspexec!gen168 Scr.Malcode!gdn33 Scr.Malcode!gdn34 Trojan Horse Trojan.Gen.MBT Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B!100 Heur.AdvML.B!200
Recent AZOrult InfoStealer malspam campaign A recent malspam campaign was observed by researchers distributing AZOrult infostealer malware via a Microsoft Excel spreadsheet (XLSB) containing a malicious macro. The deceptive "Request for a quote" email appears to be targeting organizations in Europe and the Middle East. Symantec protects you from this threat, identified by the following: File-based CL.Downloader!gen20 Heur.AdvML.B ISB.Downloader!gen44 ISB.Downloader!gen69 Trojan Horse Trojan.Gen.MBT Trojan.Gen.2 WS.Malware.1 W97M.Downloader Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Recent espionage activities by the GoldenJackal APT group According to a recently released report, the threat group known as GoldenJackal continues its espionage campaigns targeting government organizations and individuals in the Middle East and South Asia. The threat actors leverage multiple attack vectors - some including fake Skype installers to drop .NET malware, malicious document like Word files exploiting the Follina vulnerability (CVE-2022-30190) to download a malicious HTML page. Once the attackers have successfully gained access to a victim's machine they will attempt to steal credentials, take desktop screenshots, collect confidential information from the local system and web browsers, and later exfiltrate the collected data to their C2 servers. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based Trojan Horse Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!200 Heur.AdvML.C Network-based System Infected: Trojan.Backdoor Activity 634 System Infected: Bad Reputation Process Request 4 Web-based Observed domains/IPs are covered under security categories
Recent hike in "Make Money Fast" spam with PDF attachments Symantec has recently observed an increase in "Make Money Fast" spam with pdf attachments that include link to sites purporting to be income making activities. They have changing senders, subject lines and attachment names. This spam campaign is targeted at many organizations worldwide across various industries. Email: Attached PDF: Landing page: Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Recent increase in typosquatting targeting the financial sector Symantec has recently observed multiple phishing hosts targeting financial institutions. Actors send messages purporting to be from a financial institution and use the look-a-like URLs in links instead of the actual company link. In the past two months, hundreds of unique typosquatting hosts have been seen, some hosted on the same IP addresses. Examples include: <bank-name>-iaccessweb[.]com <bank-name>-iauth[.]com <bank-name>-safetyupdated[.]com <bank-name>secure-access[.]com Symantec protects you from these threats, identified by the following: Email-based Coverage is in place for Symantec's email security products Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Recent JSSLoader RAT activities Symantec Security Response is aware of recent cyber attacks that involve JSSLoader RAT. The attacks are attributed to an infamous ATP group and start off with email spam with WSF and VBS attachments. Opening the files opens a gate to a series of malicious activities, in which JSSLoader RAT payload is downloaded installed. Additional malware, typically DiceLoader, is often brought in and executed by JSSLoader RAT. Symantec provides the following coverage against the attack: File-based VBS.Downloader.Trojan ISB.Downloader!gen51 ISB.Downloader!gen173 JS.Downloader Trojan Horse Trojan.Gen.2 Trojan.Gen.NPE Heur.AdvML.C
Recent malspam campaign delivering MassLogger infostealer targeting organizations MassLogger is a cheap and easily available infostealer distributed via underground forums. A recent malspam campaign observed in August appears to be targeting organizations most likely as a first stage of a larger attack. The malspam campaign utilizes messages that appear to be legitimate business communication by requesting the victims open the attached malicious executable, contained in a zip, for an urgent transaction. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.2 Trojan.Gen.NPE Trojan Horse Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Recent malspam delivers Smokeloader bot instead of bank details At the beginning of September Symantec Security Response has observed a new malspam campaign spreading the Smokeloader malware. Smokeloader is a well documented loader bot known for several years. It is mostly used to download other malware payloads like ransomware, backdoors or banking trojans, but due to its modular architecture it can also be used directly for executing a variety of functions. In the observed malspam campaign, emails with the subject "Bank Details" purporting to originate from banking institutions have been spammed out to a number of recipients worldwide. An archive file named "Bank Details.xlsx.xxe" has been attached to those emails. The spam authors have attempted to obfuscate the file type with the false extension, as the attached .xlsx.xxe file is in reality a RAR compressed archive. Extraction of the file leads to a double-extension executable "Bank Details.xlsx.com" that upon investigation proved to be a Smokeloader sample. Symantec protections against malware distributed in this spam campaign Trojan.Smoaler
Recent Matanbuchus campaign drops Cobalt Strike payload A report about a new Matanbuchus Malware-as-a-Service (MaaS) project first came to light in the early months of 2021. Just a few days ago, a new phishing operation was spotted utilizing the same MaaS, which eventually drops a Cobalt Strike beacon that is used to increase exploitation potential. The previous Protection Bulletin about Matanbuchus can be seen here: Malspam campaign dropping Matanbuchus and Qbot Symantec protects you from these threats, identified by the following: File-based ISB.Downloader!gen520 Trojan Horse Trojan.Malscript Trojan.Gen.NPE Trojan.Gen.2 WS.Malware.1 WS.Malware.2 Web-based Observed domains/IPs are covered under security categories
Recent ransomware distribution campaigns by Vice Society Vice Society (aka. DEV-0832) ransomware group remains active in the threat landscape and their efforts strongly focus on healthcare, educational and manufacturing sectors. This threat actor is known to deploy various ransomware payloads including Zeppelin, HelloKitty, RedAlert or their latest variant known as PolyVice. Vice Society also uses a wide variety of tools for initial access, lateral movement or data ex-filtration. Some of those tools include Cobalt Strike, Mimikatz, Rubeus or Kape. According to latest reports, the most recent ransomware distribution campaigns attributed to Vice Society have been targeting organizations in Brazil, Argentina, Switzerland and Israel. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.Cryptlocker!g42 SONAR.SuspLaunch!g18 File-based Backdoor.Cobalt Backdoor.Cobalt!gm5 Downloader Hacktool.Mimikatz Hacktool.Rubeus!gen1 Ransom.Zeppelin Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A Heur.AdvML.B Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories
Recent SpyNote Android malware activities SpyNote is an Android malware seen on the threat landscape for the last few years and actively used by various threat groups. The malware's functionality includes data and credentials theft from the compromised devices, keylogging, Google Authenticator codes extraction and calls/camera recording, among others. The malware is usually distributed under the disguise of legitimate apps associated with known brands and companies. Just in the last month alone several campaigns have been spreading SpyNote through .apk packages masqueraded as applications from Bank of Japan, 7-Eleven or the Indian Railway Catering and Tourism Corporation (IRCTC). Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk Android.Reputation.2 AppRisk:Generisk Web-based Observed domains/IPs are covered under security categories
Recent TA558 APT activities targeting LATAM TA558 group is known to target various sectors across Latin America. In the most recent campaigns these threat actors have been leveraging spam emails with malicious attachments in order to deliver a wide range of payloads such as AsyncRAT, NjRAT, Vjw0rm or RevengeRAT, among others. TA558 has been observed to continuously exploit old MS Equation Editor vulnerabilities from 2017 (CVE-2017-8570, CVE-2017-11882), potentially targeting mostly legacy or unpatched systems. Symantec protects you from this threat, identified by the following: File-based Exp.CVE-2017-8570!g* Exp.CVE-2017-11882!g* Scr.Malcode!gen Scr.Malcode!gen59 Trojan.Gen.MBT Trojan.Gen.NPE Trojan.Gen.NPE.C Trojan.Malscript Web.Reputation.1 WS.Malware.1 * This indicates multiple similarly named detections exist such as Exp.CVE-2017-11882!g2, Exp.CVE-2017-11882!g3, etc. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Reconnaissance activities by Bahamut APT We are aware of recent reports regarding activities attributed to the threat actor group known as Bahamut. The discovered activity was found to be distributing malicious .docx documents exploiting a relatively old MS Office RCE vulnerability (CVE-2017-8570). Upon successful exploitation a backdoor malware is dropped that is believed to be an indication of an initial reconnaissance stage in this campaign. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.C Trojan.Gen.2 Trojan.Gen.NPE Trojan Horse Trojan.Mdropper W97M.Downloader
RecordBreaker gains in prevalence Raccoon 2.0, also known as RecordBreaker, continues to gain in prevalence as Symantec observes more and more drive-by-download campaigns. In most of these campaigns, actors disguise the malicious binary as cracked software, fake updates and driver installer/downloaders. As of today, it is mostly affecting consumers but enterprises are far from being exempted. More and more groups and individuals are leveraging run-of-the-mill infostealer to exfiltrate sensitive data from organizations. They then proceed with extortion tactics or sell the data and environment access on underground markets. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products File-based Trojan.Gen.2 Trojan.Gen.MBT Suspicious: Reputation Machine Learning-based Heur.AdvML.B
RecordBreaker infostealer spread under the disguise of .NET update files RecordBreaker malware is known to be an evolution of the Raccoon infostealer. The malware was first seen last year and it continues to gain in prevalence in the wild. The latest campaigns distributing RecordBreaker have been masquerading the initial downloader as a Microsoft .NET Framework update package. The malware performs various anti-debugging and sandbox presence checks. If run within a virtual environment it will only download a legitimate .NET update installation file from the official Microsoft portal and then terminate itself. Outside of VM environments the RecordBreaker payload will be fetched from a malicious C2 server. The infostealer, once executed, has the functionality to steal sensitive data from the compromised machines. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 File-based Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.2 WS.Reputation.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Heur.AdvML.C Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories
RecordStealer - new infostealer distributed under the disguise of software cracks A new infostealer malware dubbed as RecordStealer has been spotted in the wild. The malware disguises itself as software crack package or a software installer. RecordStealer targets data stored in the browser, cookies, cryptocurrency wallets, saved credentials etc. Some of the C2 communications servers used by RecordStealer have been reported to also be shared with another info-stealing malware known as Clipbanker. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 WS.Malware.2 Web-based Observed IPs/domains are covered under security categories
Recurrent ETC phishing campaigns hit Japan Japanese users continue to be targeted by phishing campaigns in which actors impersonate ETC (Electronic Toll Collection System) – a Japanese system to pay tolls via wireless communication between antennas on expressway toll gates and in-vehicle devices. Over the last few weeks, Symantec has observed these campaigns in both the email and mobile landscape, the latter via SMS. If a victim does fall for one of these phishing attempts, actors will gain access to their ETC credentials along with various personal data that's stored in their ETC account. On top of this, there is a good chance that many people have used the same password for other web services which actors can then attempt to access. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products Mobile-based Symantec Endpoint Protection Mobile is able to also analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake domains used in this campaign are known to WebPulse. Web-based Observed domains are covered under security categories
Recurrent Nedbank phishing campaigns in South Africa It's not uncommon to see phishing campaigns targeting users of major banks, including both individual retail customers and businesses. But over the past few weeks, Symantec has observed a rather persistent malicious email campaign in which actors continuously attempt to snatch the credentials of South African Nedbank users by portraying themselves as the bank – a very well-known South African bank and one of the largest financial institutions in the country. The malicious emails, relatively well-written and more convincing than some, have the subject "Nedbank Credit Card Monthly Charges eStatement" and contain a malicious HTML file (NedBank Statement.html) that loads the phishing page. If a users is lured and input their credentials it'll be collected and sent to the actors' domain. Email-based Coverage is in place for Symantec’s email security products Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Red Appaloosa campaign spreads banking malware to users in Mexico Red Appaloosa is a new campaign targeting users in Mexico with a variety of banking malware. The attackers leverage phishing emails masqueraded as payment invoices from the Federal Electricity Commission (CFE - Comisión Federal de Electricidad). The distributed emails contain .pdf or .html files attached to them that redirect the victims to attackers' controlled websites and trigger a download of .zip archives containing malicious executables. Once the malware is installed on the victim's machine, it will await for the user to visit one of the observed banking websites in order to attempt the theft of user's banking information. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.1 WS.Malware.2 Web-based Observed domains/IPs are covered under security categories
RedDriver browser hijacker targets Chinese speakers Chinese speakers seems to be the main focus of this driver-based browser hijacker, RedDriver. The driver inject itself on the browsers processes, can install its own certificates and hijack all browser traffic at the network level, which can make it difficult to detect its behavior. It uses several open-source tools on its code and development, as well as forged signed certificates to bypass Windows detection. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 AGR.Terminate!g5 SONAR.Trafic2.RGC!g10 File-based Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.B Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Redeemer ransomware Redeemer is yet another ransomware variant distributed on cybercrime forums via affiliate programs. A new 2.0 version of this ransomware family was advertised online just last month. According to the authors it comes with new affiliate GUI toolkit, better Windows 11 support, modified ransom notes and several other improvements. Redeemer ransomware includes functionality to clear event logs and delete any shadow copies or system backups on the infected machines. The malware appends .redeem extension to the encrypted files. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.SuspBeh!gen57 SONAR.SuspDrop!gen1 SONAR.SuspLaunch!g18 SONAR.TCP!gen6 File-based Ransom.Redeemer Trojan Horse Trojan.Gen.MBT WS.Malware.1
RedEnergy There have been reports of a new stealer-as-a-ransomware called RedEnergy, being disseminated through SEO poisoning and malicious emails masquerading as browser updates. RedEnergy has the ability to extract sensitive data including passwords, credit card numbers, and files. Additionally, it possesses ransomware functionality, enabling it to encrypt files using the ".FACKOFF!" extension. The combination of stealing and encrypting data enables the perpetrator to engage in double-extortion tactics or profit from the stolen information. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 File-based Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
RedGoBot DDoS botnet Light has been shed on a DDoS botnet known as RedGoBot that is written in the Go language. Actors behind this threat are able to launch DDoS attacks via HTTP, UDP and TCP flood. On top of that it's also capable of killing other DDoS bots on the device it compromised. According to reports, RedGoBot is spreading via a known Vacron NVR RCE Vulnerability. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.NPE
Redigo - a Golang-based backdoor targeting Redis servers Redigo is a Golang-based malware targeting Redis servers by exploitation of the CVE-2022-0543 Redis vulnerability. The malware is able to mimic Redis server communication over port 6379 and thus allowing the attackers to hide the traffic between the infected server and the malicious C2 servers. Redigo adds the infected servers to a botnet that later performs Distributed Denial of Service (DDoS) attacks, and also performs cryptocurrency mining on the servers. Symantec protects you from this threat, identified by the following: File-based Linux.Trojan Trojan Horse WS.Malware.2 Network-based Web Attack: Redis CVE-2022-0543 Policy-based Symantec Data Center Security hardening using a custom sandbox for Redis server provides protection against Redigo types of malware.
RedLineStealer continues its nefarious activity RedLine Stealer is an infostealer malware that steals password credentials, credit card numbers, and cryptocurrency wallets. It has the capability of executing commands, downloading files, and periodically sending information about the infected system. Still a relatively new infostealer that was spotted early 2020 it continues its nefarious activity. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.B Heur.AdvML.C Trojan.Gen.2 Trojan.Gen.MBT Trojan.RedLineStealer WS.Malware.1 WS.Malware.2
RedLine Stealer continues to be spread via various campaigns In recent months, RedLine Stealer has been reported to leverage various distribution campaigns and the malware is known to be offered as MaaS (Malware as a Service) on underground malware forums. The threat is known to contain various features including fingerprinting victim's machine, information stealing from various applications like web browsers, FTP clients, Instant Messengers (IM), VPN services and gaming clients. The malware is also capable of illicit ex-filtration of victim's sensitive data including banking details and crypto-wallets, and many more. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.B Heur.AdvML.C Scr.Malcode!gdn34 Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed IPs/domains are covered under security categories.
RedLine Stealer distributed via malicious XLL add-ins A group of researchers recently disclosed a widespread malware campaign that delivers RedLine Stealer via a malicious Excel add-in file (XLL). Lures used to seek user engagement are varied and include payment reports, holiday gift guides and website promotions, and are found in random websites' contact forms, article comment sections and discussion forums incorporated into a Google Drive link which hosts the malicious XLL file. RedLine is an information-stealing Trojan and simultaneously a Downloader. It can execute commands to download additional malware to further extend the attack. Symantec protects you from this threat, identified by the following: File-based Downloader Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.C Network-based System Infected: Trojan.Backdoor Activity 611(33088) Web-based Observed domains/IPs are covered under security categories
RedLine Stealer leveraged by multiple threat actors to steal user data According to a recent report, RedLine Stealer remains one of the main sources of stolen information sold on underground markets. The malware itself is offered for sale on various forums and Telegram channels and has been adopted by several threat actors in the past year. RedLine Stealer targets user data, login credentials, browser cookies, payment card data or details of cryptocurrency wallets, among others. The malware is spread commonly by phishing campaigns that often leverage current events or topics as lures. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Trojan.RedLineStealer Machine Learning-based Heur.AdvML.B Heur.AdvML.C Network-based System Infected: Redline Stealer System Infected: Redline Stealer Activity Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories
RedLine Stealer Malware-as-a-Service offered through a Telegram channel Redline is a type of infostealing malware with various features allowing it to fingerprint victim's machine, steal data from various applications like web browsers, FTP clients, Instant Messengers (IM), VPN services, as well as load additional malware payloads. Redline is known to be sold as part of a Malware-as-a-Service subscription offering. According to latest reports, the threat group behind this malware have been providing their services and bot support via a Telegram channel. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.B Heur.AdvML.C Scr.Malcode!gdn30 Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains are covered under security categories
Redline Stealer spread under the disguise of VPN app installer Redline Stealer malware has been recently distributed under a disguise of a VPN application called ExpressVPN. For the purpose of malware distribution, the attackers have set up a number of phishing websites mimicking the legitimate ExpressVPN webpage and offering the fake installer for download. Depending on the commands received from the C2 servers Redline Stealer will attempt to collect various information from the compromised endpoints including banking details, login credentials, crypto wallets, cookies and browser data, among others. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT WS.Malware.1 Web-based Observed domains/IPs are covered under security categories
RedProtection ransomware seen in France and Switzerland RedProtection is a variant of chaos ransomware that has recently been observed circulating in France and Switzerland. Upon successful encryption, it will deploy a ransom note written in both English and French. Victims are instructed to transfer 0.0061 BTC to a specified cryptocurrency wallet within 24 hours and then reach out to the attackers via Telegram. The note also mentions a willingness to negotiate the ransom amount. This threat actor specifically targets individual machines of corporate users and consumers. Symantec protects you from this threat, identified by the following: Behavior-based ACM.Untrst-RLsass!g1 ACM.Untrst-RunSys!g1 File-based Ransom.Sorry
RedXOR backdoor targets both Linux endpoints and servers A new backdoor dubbed as RedXOR has been recently discovered. According to the released reports, the backdoor shows certain similarities with the known PWNLNX and XORDDOS malware variants and it targets Linux systems including both endpoints and servers. Symantec provides the following detections against RedXOR malware: File-based Backdoor.Trojan Linux.Trojan Trojan.Gen.NPE
RegretLocker ransomware makes you regret not having that backup We have become aware of reports of a new ransomware dubbed as RegretLocker. This variant emerged just in October and has an ability to mount virtual drive images and encrypt individual files on it. The ransomware will add .mouse extension to the encrypted files. We recommend regular backup procedures of any important files and applying the latest product definitions to protect against ransomware threats. Symantec protections: Trojan.Gen.MBT Trojan Horse
Rekoobe backdoor for Linux Rekoobe backdoor belongs to a relatively old malware family that re-emerges with new variants from time to time. Rekoobe is based on the source code of the Tiny Shell open-source backdoor and is known to target mostly Linux servers. The malware functionality includes download of arbitrary payloads, reverse shell execution, receiving and executing commands from attackers' controlled C&C servers as well as data theft from the compromised machines. The malware is widely associated with the threat group known as APT-31, but other threat actors might have also been leveraging it in the past. Symantec protects you from this threat, identified by the following: File-based Backdoor.Trojan Trojan.Gen.NPE WS.Malware.1 WS.Malware.2 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
RelicRace/RelicSource malware duo leveraged for delivery of Formbook and Snake keylogger A new malspam campaign with a TGZ archive file as an attachment has been observed in the wild. This TGZ archive contains an executable file identified as a .NET-based downloader RelicRace, which is designed to download and execute the infamous RelicSource malware on the compromised systems. These executables download and install Formbook malware and Snake keylogger as final payloads on infected machines. Formbook malware steals personal information from victims’ devices and manipulate these systems using control commands from a C2 server and Snake keylogger to ex-filtrate sensitive data including user credentials, clipboard data, keystrokes and many more. Symantec protects you from this threat, identified by the following: File-based Scr.Malcode!gdn14 Trojan Horse Trojan.Formbook Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.1 Machine Learning-based Heur.AdvML.B Web-based Observed domains are covered under security categories
Remcos - clever social engineering, or confused authors? Regardless of whether targeted or not, most malspam campaigns generally rely on social engineering, intricately weaving interconnected elements to better ensnare victims. However, instances do exist where components fail to align. In such cases, the malicious actors who bungled their one job may be able to capitalize on user perplexity, prompting some people to click out of curiosity, blissfully unaware of the glaring red flags. A good example of this is a recent Remcos campaign wherein actors impersonate an Argentinian hotel chain with locations in Buenos Aires, Trelew, and Puerto Iguazú. They then deploy malicious emails in Arabic (subject "نسخة الفاتورة") and sign off as a steel company in the UAE, using a different employee name. Intriguingly, they attempt to instill confidence by declaring that their new email domain will henceforth be associated with the steel company. Go figure. Emails contain a .R10 archive (INVOICE0987654570.R10) and within the Remcos binary (INVOICE0987654570.exe) and were sent to random companies in the UK, US and EU, with some located in the UAE. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products Behavior-based ACM.Untrst-RunSys!g1 File-based CL.Suspexec!gen8 Scr.Malcode!gdn34 Trojan.Remcos Machine Learning-based Heur.AdvML.B!200
Remcos and GuLoader tools disguised as legitimate products GuLoader is an advanced shellcode-based downloader that is often observed in spam runs, delivering payload variants including ransomware, infostealers, banking trojans, RATs, among others. Remcos, on the other hand, is commercially sold as remote control and surveillance software. Researchers have recently spotted a couple of e-commerce websites selling branded versions of Remcos and GuLoader tools as legitimate products. The individuals operating these websites often post marketing videos of these masquerade products on their Telegram channel. There is proven evidence of their involvement in the distribution of malware, including Formbook and Amadey Loader. Symantec protects you from this threat, identified by the following: Behavior-based Ransom.Pots SONAR.TCP!gen1 Trojan.Remcos File-based Scr.Malcode!gdn30 Scr.Malcode!gdn32 Scr.Malcode!gdn34 Scr.Malcode!gen36 Trojan Horse Trojan.Gen.2 Trojan.Gen.NPE WS.Malware.1 WS.SecurityRisk.4 Machine Learning-based Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Heur.AdvML.B!300 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Remcos campaign observed with focus on US Tax Day Recently, there has been increased activity of Remcos RAT in the threat landscape, reportedly observed being distributed in U.S. tax-related malicious emails. With the US Tax season near its end, actors try to lure firms dealing with tax preparation and financial services with messages around tax documentation from clients. The phishing emails contain shortcut files disguised as .pdf documents that upon execution start the infection chain and ultimately lead to the Remcos RAT payload. Symantec protects you from these threats, identified by the following: Email-based Coverage is in place for Symantec's email security products File-based Trojan Horse Trojan.Gen.MBT Web-based Observed domains are covered under security categories
Remcos goes BIG In recently observed activity, the Remcos RAT has been trying to avoid detection by going big - between 300MB and 1.5 GB big. It does this by adding extra bytes to the malicious file in the overlay section. In the context of a binary file, an overlay section refers to a portion of the file that can be extended or modified without affecting the rest of the file's structure. By padding the overlay section with zeros you are effectively increasing its size, which in turn, makes the entire file bigger. Padding in this manner (adding extra zero bytes to a file) doesn't change the content or functionality of the original data, it simply increases the overall file size. Padding is done for various reasons, such as aligning data to specific memory boundaries or ensuring consistent block sizes for more efficient read and write operations. But in this case bad actors are using it as a way to try to evade detection. Although the file size is in fact large, once archived it will appear to be less than 1MB. Threat actors may add zero bytes to the overlay section of a malicious file to inflate its size for various reasons. These tactics include evading size-based security checks, confusing automated analysis and sandbox environments, tricking file integrity checkers, concealing additional payloads, misleading users with the appearance of legitimacy, and circumventing size-based detection rules. These inflated Remcos have been observed being delivered via malspam, SEO poisoning and other phishing URLs. Symantec protects you from this threat, identified by the following: EDR-based Symantec EDR is capable of monitoring and flagging this threat's tactics, techniques and procedures. Symantec added malware specific threat hunting queries which can be fired on the customer iCDM console. For more information on these queries, refer to this GitHub repository: https://github.com/Symantec/threathunters/tree/main/Trojan/Remcos File-based Trojan.Remcos Trojan Horse Trojan.Gen.MBT Network-based System Infected: Trojan.Backdoor Activity 757 Email-based Coverage is in place for Symantec’s email security products.
Remcos RAT and Agent Tesla spread via KoiVM-based loaders Remcos RAT and Agent Tesla malware have been distributed in a recent campaign leveraging a .NET loader in form of a KoiVM virtualized binary. The initial downloader is reported to be spread via malspam. Once extracted and executed, it downloads a KoiVM-based dropper that leads to stage 3 final payload of either Remcos or Agent Tesla. This malware distribution campaign has been leveraging Hastebin URLs as C2 server addresses. Both Agent Tesla and Remcos are malware families well established in the threat landscape and used in various attacks over the last few years. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.SuspDataRun File-based Scr.Malcode!gdn32 Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A Heur.AdvML.B Web-based Observed domains/IPs are covered under security categories
Remcos RAT downloaded by a daisy-chain of Visual Basic scripts Remcos RAT, even though used by malicious actors, is marketed and sold as an administrative tool by the company Breaking Security via their website. Remcos is often delivered through malicious documents or archive files containing scripts or executables. A recent malspam campaign has been reported delivering Remcos under the guise of financially-themed emails. What is different in this campaign is that the file attached to the email is a Visual Basic Script (VBS) which when executed, daisy-chains the download and execution of several more VBS files until finally downloading and executing Remcos RAT on the victim's computer. Symantec protects you from this threat, identified by the following: File-based Infostealer.Lokibot!43 ISB.Downloader!gen281 Scr.Malcode!gdn30 Trojan Horse Trojan.Gen.NPE Trojan.Mdropper WS.Malware.1 WS.Malware.2 WS.SecurityRisk.4 Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. Website-based Observed Domains are covered under security categories
Remcos RAT remains active on the threat landscape Remcos is a type of commercial RAT that stayed relatively active over the years and remains one of the top malware families spread by malspam to this day. The email campaigns distributing Remcos usually follow global trends or most current themes to make sure they get the much needed recipient's attention. Just this year Remcos has been observed to be delivered via various malicious email campaigns leveraging among others COVID-19 and US Tax Season themes. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.B Heur.AdvML.C ISB.Downloader!gen76 Scr.Malcode!gdn30 Trojan.Dropper Trojan.Gen.2 Trojan.Gen.MBT Trojan Horse Trojan.Mdropper W97M.Downloader
Remcos RAT spam campaigns targeting European countries Multiple spam email campaigns delivering the Remcos RAT have been reported in the wild, targeting European countries. The threat actors responsible for these campaigns utilize AceCryptor to embed the malware for distribution, with the aim to exfiltrate user credentials from browsers and email clients. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Ps-RgPst!g1 ACM.Untrst-RgPst!g1 ACM.Untrst-RunSys!g1 Behavior-based SONAR.Dropper SONAR.SuspCreate!g12 SONAR.SuspBeh!gen633 File-based Trojan Horse Trojan.Gen.MBT Trojan.Remcos WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Remcos sighted in Romania and Moldova Remcos seems to be everywhere, with campaigns observed on a daily basis. In this bulletin, we'll cover one instance where the actor is focusing their sights on Romania, Moldova, and surrounding countries. The actors behind this recent campaign are portraying themselves as a Romanian supplier of industrial equipment specializing in machine tools. The malicious emails (subject: Comandă nouă) sent to companies in the region leverage a "product order" social engineering scheme. Attached is a ZIP archive (Noua lista de comenzi.zip), within which lies the Remcos binary posing as a command list (Noua lista de comenzi.exe). Remcos RAT can severely impact companies by facilitating data theft, system compromise, operational disruption, espionage, reputation damage, and legal and compliance issues. Its ability to provide remote access to compromised systems enables attackers to carry out various malicious activities, leading to financial losses, operational disruptions, legal consequences, and damage to reputation. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec's email security products Adaptive-based ACM.Ps-RgPst!g1 File-based Trojan.Gen.MBT Trojan.Gen.NPE Machine Learning-based Heur.AdvML.B!100 Network-based Audit: Bad Reputation Application Activity
Remcos slipstreams the FIFA World Cup As the FIFA World Cup is in full speed with victorious teams competing in the round of 16, malicious groups and individuals continue to slipstream this world event. As a recent example, Symantec observed a malspam campaign written in Turkish (email subject: FIFA DÜNYA KUPASI KATAR 2022 SATIN ALIM SİPARİŞİ) where an actor purports to be a FIFA official in Qatar. The malicious emails were sent to organizations around the world, using FIFA and a run-of-the-mill "purchase order" social engineering tactic. If victims are successfully lured into extracting the attached .IMG file and running the malicious executable file within, it will install the infamous Remcos Remote Access Trojan. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.SuspDataRun Email-based Coverage is in place for Symantec's email security products File-based Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B
Remcos spoofs Polish HVAC and Hungarian Paint and Hardware Retail companies Remcos RAT has been around for a while now and is continuously observed worldwide, being used by multiple groups and individuals. In a recent example, an actor is currently targeting European companies, with a focus on Poland and Hungary, posing as a known Polish HVAC and a Hungarian paint & hardware retail company. Malicious emails contain a Word document (UPIT.doc or Zapytanie ofertowe.doc) crafted to exploit a known vulnerability (CVE-2017-11882), which would fetch and drop Remcos if executed. Observed email subjects, Upit za ponudom 531996790090 Prośba o ofertę Nº 48723 Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products File-based Exp.CVE-2017-11882!g5 Scr.Malcode!gdn34
Remittance malspam delivers JAR-based Qealler Symantec has observed a malspam campaign that involves an embedded image linked to a malicious URL. The payload in this campaign is Qealler, which is a Java-based RAT malware designed to steal sensitive information. Emails involved in this spam run are masquerading as legit remittance notifications and asking users to download the attached document. A compromised domain link is embedded in the image served in the emails and if the image is clicked, the user gets redirected to a malicious site that triggers download of the JAR file executable named Remittance_Advice-PYMT8351.jar. The JAR file is currently blocked by Symantec as Trojan.Maljava. Figure 1: Email sample showing the compromised domain. Symantec protections against malware distributed in this spam campaign Trojan.Maljava
Remo Android banking trojan Remo is a new Android malware variant found to be distributed by several phishing websites impersonating the Binance trading platform. The malware has been reported to target various banking and cryptocurrency trading / wallet applications for the purpose of data theft. Remo abuses the Accessibility Services on the infected device in order to log keystrokes, steal clipboard data or capture text displayed on the victims' screen. Latest campaigns spreading this malware have been mainly targeting mobile users in Southeast Asia. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk Android.Reputation.1 Android.Reputation.2 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Reports of WordPress File Manager Plugin vulnerability being exploited in the wild We have been aware of reports relating to malicious actors exploiting the recently discovered WordPress File Manager Plugin vulnerability in the wild. The flaw resides in version 6.0 to 6.8 of the WordPress File Manager plugin, which at the time of disclosure had more than 700,000 installations worldwide. Successful exploitation of this vulnerability could allow a remote code execution on the vulnerable WordPress sites. While the vulnerability does not have any CVE assigned to it yet, an updated version (6.9) of the File Manager plugin has been released already on the first of September to fix the bug. Symantec protections for the discussed vulnerabilities IPS [32545] Attack: WordPress File Manager Plugin RCE IPS [32535] Attack: WordPress File Manager Plugin RCE 2