text
stringlengths
0
383k
Reptile - a Linux rootkit malware Reptile is an open-source rootkit malware targeted at Linux-based systems and seen regularly emerging with new variants in the wild, often in conjunction with other malicious payloads. The malware is primarily used to conceal malicious directories/files, processes and network communication with the C&C server belonging to the threat actors. Reptile also incorporates a reverse shell routine (based on TinyShell), that allows the attackers to remotely control the compromised systems. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.NPE WS.Malware.1
Retch ransomware Retch is a new ransomware variant based on the open-source Hidden Tear ransomware. The malware targets files with pre-defined extensions for encryption. Once encrypted it appends the .Retch extension to them and drops a ransom note in the form of a .txt file asking victims to pay for the file decryption in Bitcoins. The most recent samples of this ransomware have been submitted to public file scanning services from various countries worldwide, indicating that the attackers are not targeting any specific regions or businesses. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.Cryptlocker!g38 SONAR.RansomGen!gen3 SONAR.Ransomware!g1 SONAR.Ransomware!g7 File-based Trojan.Gen.MBT Ransom.HiddenTear Ransom.HiddenTear!g1 WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.A!500 Heur.AdvML.A!400 Heur.AdvML.B!100 Heur.AdvML.B!200 Network-based System Infected: Trojan.Backdoor Activity 634
RevengeRAT - aging but still causing trouble For years, the threatscape has been plagued by both old and new Remote Access Trojans. RevengeRAT is in the former group, seeing its fair share of usage back in 2019 and 2020 in multiple campaigns by various groups and individuals. Easily accessible (and free) via leaks, this malware continues to be used and more recently has been observed in new malspam campaigns. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.NPE Heur.AdvML.C Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Revenge RAT via malicious PPAM in Latin America, Portugal and Spain A .ppam file is a PowerPoint add-on. PPAM files can contain code, scripts, and resources that are loaded into PowerPoint to provide additional functionality, including custom commands, tools, or integration with external services. This functionality can be exploited by attackers to execute malicious code on a victim's system. Such malicious PPAM files can be created using various programming languages, including Visual Basic for Applications (VBA) or modern web technologies like HTML, CSS, and JavaScript. Due to their widespread use in organizations and their ability to execute code, PPAM files have been an attractive vector for delivering malware. Over the past few months, one actor has been leveraging malicious PPAM files in Latin America, Portugal and Spain via emails. Examples of filenames include "Reserva Detalhes.ppam," "reservas.ppam," "powerPoint.ppam," "Reserva Cancelar.ppam," "Reserva detalhada.ppam," etc. These PPAM files contain a malicious macro that will execute a PowerShell downloader, which in turn will deliver a remote access trojan known as Revenge RAT. This threat enables attackers to control the victim's system remotely, allowing actions such as viewing the desktop, accessing files, stealing sensitive information, and monitoring user activities. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec's email security products File-based ISB.Heuristic!gen10 ISB.Heuristic!gen125 Scr.Malcode!gen103 Scr.Malcode!gen125 CL.Downloader!gen9 Machine Learning-based Heur.AdvML.B
Rever Ransomware, sporadically active Rever ransomware actors are not new to the threat landscape and appear to have been active since at least mid-2022. While they do employ the nefarious double-extortion tactic, they are far from being as prevalent as certain other ransomware actors. However, Symantec does continue to regularly observe Rever's activities. Upon successful compromise, encrypted files will be appended with a random 8 characters extension. The ransom note left on affected machines is fairly similar to Babuk's note and advises victims to connect with them using Tox chat, with no ransom price stated. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.CryptLocker!g42 SONAR.RansomPlay!gen1 SONAR.SuspLaunch!gen4 SONAR.SuspLaunch!g18 File-based Ransom.Babuk Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B
ReverseRat malware targeted govt., energy sector in South and Central Asia A threat actor, with suspected ties to Pakistan, has been targeting the government and energy sectors in South and Central Asia, deploying a remote access Trojan (RAT) onto compromised Windows systems. Researchers mostly saw the malware affecting entities in India, with a few in Afghanistan. The threat actor relies on re-purposed open-source code and uses compromised domains in the same country as the targeted entity to host their malicious files, in an attempt to make the connections look like normal traffic. The attack is likely to begin with malicious links sent via email or messages, which download a zip file with a LNK file, pointing to a malicious HTA file in the same domain, and a decoy PDF file, with themes related to the sector the targeted organization deal with. The HTA file results in two agents being downloaded to the victim machine, one to reside in memory while the other grants persistence on the infected workstation. The final payload is a .NET backdoor called ReverseRat that has the capability to capture screenshots, terminate processes, execute arbitrary executables, perform file operations, and upload data to a remote server Symantec protects you from this threat, identified by the following: File-based Backdoor.Ratenjay JS.Downloader Trojan Horse Trojan.Gen.MBT Trojan.Gen.NPE Trojan.Gen.2 WS.Malware.2
Revive, Android banking malware Revive is a run-of-the-mill Android banking malware with spyware capabilities that has recently been brought to light. According to reports, this threat's code shows similarities with TearDroid for which source code is available to the public. Being able to collect credentials and intercept SMS allows the actors to take over their victims' financial account. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk
Rhadamanthys infostealer continues to be distributed via malicious ads Rhadamanthys is a malware known to be distributed mostly through malspam or malvertising. The most recently observed campaign spreading this malware has been leveraging malicious ads and decoy websites masqueraded as download portals for the popular productivity application called Notion. In this campaign the attackers attempt to spread both malware targeted at macOS and Windows users. While the macOS based payload is a version of Atomic Stealer, Windows binaries end up with Rhadamanthys payload deployment. The infostealer has the capabilities for credential theft from various applications and email programs. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.TCP!gen1 File-based Downloader OSX.Trojan.Gen Trojan Horse Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A!500 Heur.AdvML.C Network-based System Infected: Trojan.Backdoor Activity 634 Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Rhadamanthys malware deployments attributed to TA547 A new Rhadamanthys infostealer deployment campaign attributed to the TA547 threat actor has been discovered in the wild. The campaign targets a wide range of industries in Germany. In their attacks, the attackers leverage .zip archives containing malicious .lnk files that once executed trigger PowerShell scripts leading to Rhadamanthys infection on the compromised endpoint. Interestingly enough, according to the reports the malicious PowerShell scripts are believed to have been generated by LLM (a subset GenAI). Symantec actually observed a different campaign from the same actors in which they were using the same modus operandi (PS file also generated using LLM) but delivering CleanupLoader. The deployed malware payload (Rhadamanthys) has various capabilities including collection and exfiltration of confidential user data such as credentials, cookies etc. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Ps-Enc!g1 ACM.Ps-Http!g2 ACM.Untrst-RunSys!g1 Behavior-based SONAR.Stealer!gen2 SONAR.SuspStart!gen14 File-based CL.Downloader!gen9 Trojan.Gen.MBT Trojan.Gen.NPE Web.Reputation.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.A!400 Heur.AdvML.A!500 Heur.AdvML.B!100 Heur.AdvML.B!200 Network-based System Infected: Trojan.Backdoor Activity 796 Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Rhadamanthys stealer via GoogleAds It is common for hackers to use GoogleAds to spread phishing and malware attacks, but recently there have been several instances of this occurring that have gained media attention. One example of this involves a fake website for the software Notepad++ that was advertised through GoogleAds. If users download the fake installer from this website, they will unknowingly install an infostealer called Rhadamanthys on their device. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.2 Machine Learning-based Heur.AdvML.A Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories
Rhysida ransomware Rhysida is a newly identified ransomware variant targeting Windows environments. The ransomware employs a multi-threaded encryption process, contains a hardcoded list of excluded extensions/directories and appends .rhysida extension to the encrypted files. Instead of a ransom note typically in the form of a .TXT file, Rhysida drops the ransom note in a .PDF format in each of the traversed directories. The malware also changes the desktop wallpaper on the compromised machine. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.Ransomware!g1 SONAR.Ransomware!g3 SONAR.Ransomware!g16 File-based Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A
RIG Exploit Kit - Threat that won't go away Exploit Kit campaigns have been less prevalent these days since the latest browsers like Chrome, Firefox and Edge are less exploited compared to Internet Explorer. Even though exploit kits have been on the decline, RIG exploit kit presents a recurring reminder that a decline does not mean an end. We have recently become aware of reports that a recent RIG Exploit Kit campaign has been leveraged to drop WastedLoader malware. Wastedloader is believed to be a new loader variant of the WastedLocker and the ransomware component might get subsequently downloaded from a command and control (C&C) server. This particular campaign exploited MS Internet Explorer CVE-2019-0752 and CVE-2018-8174 vulnerabilities. Symantec’s network protection technology, Intrusion Prevention System (IPS), blocks this exploitation attempt at the network level, thus preventing any further damage to the system. Symantec protects you from this threat, identified by the following: File-based Downloader Packed.Generic.459 Ransom.WastedLocker Ransom.WastedLocker!gm Trojan.Gen.2 Trojan Horse Network-based Malicious Site: Malicious Domain Request 21 Malicious Site: Malicious Domain Request 22 Web Attack: Microsoft Internet Explorer CVE-2019-0752 Web Attack: RIG Exploit Kit Website 3 Web Attack: RIG Exploit Kit Website 5 Web-based Observed domains are covered under security categories
Rilide Stealer leverages fake browser extensions for malicious activities A recent malware variant identified as Rilide Stealer targets Chrome-based browsers. Rilide disguises as legitimate browser extensions to carry out malicious actions such as script injections, screenshot grabbing or theft of cryptocurrency from various exchanges. When the Rilide Loader is first deployed, it modifies browser shortcuts so that when the browser is launched, it additionally executes with a parameter pointing to the malicious extension that was earlier dropped on the compromised system. The Ekipa RAT and Aurora Stealer malware families have lately been used to spread Rilide Stealer. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based Trojan Horse Trojan.Malscript W97M.Downloader WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.B Heur.AdvML.B Web-based Observed domains/IPs are covered under security categories
Rimasuta, a Mirai variant Mirai is a well-known bot that has been plaguing Linux-operated devices and machines for years now. Campaigns of both old and new variants are being observed on a regular basis. For example, there have been reports of new activities related to an old variant that was first observed in 2021. Called Rimasuta, it leverages vulnerabilities to spread and turn devices into bots. Additionally, the actors behind this threat have started to use the ChaCha20 encryption algorithm for robust communication. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.NPE
Rincrypt Ransomware Rincrypt is one more run-of-the-mill ransomware variant recently observed on the threat landscape. When executed, it targets files with the specific extensions according to a pre-defined list. The malware appends the encrypted files with “.rincrypt” extension. Upon completed encryption process a ransom note file called "READ THIS.txt" is dropped onto the desktop of the infected machine. It contains an email address for the victims to contact for further instructions. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Untrst-RunSys!g1 Behavior-based SONAR.Ransomware!g10 SONAR.TCP!gen6 File-based Ransom.Gen WS.Malware.1
Risen Ransomware A ransomware actor known as "Risen" has been detected in the wild. According to their ransom note ($Risen_Note.txt and $risen_guide.hta), the threat actors appear to employ double-extortion tactics by threatening to sell or leak stolen information if the ransom payment is not made. Encrypted files will have an extension added to them, following this format: [actor's email address, TELEGRAM:actor's ID].random ID. Victims are provided with two email addresses, a Telegram ID, and a blog URL (hosted on the Tor network) as means of contact. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT Machine Learning-based Heur.AdvML.C
RisePro stealer persists in the threatscape First observed in late 2022, the RisePro stealer continues to exhibit signs of activity and is still primarily delivered as malicious cracked software via Private loader. In July 2023, more command and control server panels have been observed. It's not a complex malware, and in terms of capabilities, a fairly run-of-the-mill stealer that aims to grab files and steal sensitive data from web browsers, credit cards, and cryptocurrency wallets using browser extensions, among other things. While consumers and small businesses seem to be the primary targets, medium and large-sized enterprises are still at risk from groups and individuals who may employ other infection vectors. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.2 Trojan.Gen.MBT Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B!200 Heur.AdvML.B!100
RisePro stealer still active in the threatscape First observed in late 2022, the RisePro stealer continues to exhibit signs of activity and is still primarily delivered as malicious cracked software via PrivateLoader. PrivateLoader allows threat actors to buy the capacity to download malicious payloads onto infected systems as a Pay-per-install service. In recent weeks a rise in command and control server activity has been observed. The stealer targets cookies, saved passwords, saved credit cards and crypto wallets using browser extensions, among other things. While consumers and small businesses seem to be the primary targets, medium and large-sized enterprises are still at risk from groups and individuals who may employ other infection vectors. Symantec protects you from these threats, identified by the following: File-based Trojan.Gen.2 Trojan.Gen.MBT Trojan Horse Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.A!400 Heur.AdvML.A!500 Heur.AdvML.B!100 Heur.AdvML.B!200
Roaming Mantis leverages Android malware in a recent Smishing campaign According to a latest report, Roaming Mantis threat group has been targeting Japanese users with a malware dubbed as SmsSpy in a recent smishing campaign. Depending on the OS version of the targeted device, two distinct malware versions could have been distributed in the attack. Once the device has been compromised, SmsSpy will attempt to collect stored phone numbers as well as SMS messages from the device. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.2 Trojan.Gen.MBT Mobile-based AppRisk:Generisk AdLibrary:Generisk Web-based Observed domains are covered under security categories Symantec Endpoint Protection Mobile is able to also analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect.
RobinBot expands RobinBot is another bot that's based on the infamous Mirai malware, and according to reports it's currently spreading on Linux based devices via known vulnerabilities. An early version of this malware was written in C but recent versions have been written in Java. Actors behind this botnet are capable of launching HTTP and OVH Flood attacks, DDoS attack against Roblox, and Bootstrap-based DDoS attacks from compromised devices. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.NPE
Rogue - the Android RAT We are aware of recent reports of the Rogue Android RAT. Rogue is a mobile Remote Access Trojan that is a compilation of components found as open-source and in the malware underground. This mobile RAT offers a wide variety of features, including but not limited to: Persistence through registration as a device administrator Leverage Google Firebase services for C&C activity to masquerade as a legitimate service Able to perform many RAT related functions such as getting SMS messages, delete/install/execute apps, record audio, collect device information, etc Log and document user's actions by way of the Android accessibility service Block or record incoming calls Symantec provides the following detections for associated indicators. These encompass both endpoint and mobile products. File-based AdLibrary:Generisk Android.Reputation.2 PUA.Gen.2 Trojan.Gen.2 Trojan.Gen.MBT
RogueRaticate links found in PDFs delivered via email Symantec recently observed RogueRaticate, a malicious 'browser update' threat first discovered in 2023, being delivered inside malicious PDF files. The messages encourage recipients to open the attached malicious PDF. Observed subjects include: Bill for Conference Sign-Up Costs Client Presentation #28277 Client Presentation #718481 Data Analysis #8989 Feedback Request #2698 Invoice for Conference Registration Fees Journey Expense Billing Mockups for the Design #4617 Next Week Meeting Agenda #14873 Outline for the Proposal #425145 Presentation for the Client #47133 Project Updated Timeline #9233 Training Feedback #79655 Travel Cost Bill Submission Travel Expense Invoice Submission Upcoming Meeting Agenda #142354 Once opened, recipients are advised to follow a link that leads the users to download a URL file ultimately resulting in a RogueRaticate infection. Symantec protects you from this threat, identified by the following: File based Scr.DLHeur!gen7 Network based WS.SecurityRisk.4 Email based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers
RokRAT malware spread through ISO and LNK files A new campaign leveraging ISO and LNK file for the delivery of the RokRAT malware has been recently observed in the wild. The dropped LNK files when run trigger malicious Powershell script execution that leads to the payload download through Google Onedrive APIs. RokRAT is a Remote Access Trojan variant widely attributed to the APT37 (aka ScarCruft) threat group and known to abuse various public cloud storage services for C&C purposes. The malware's functionality allows the attackers for data collection from the compromised machines, keylogging and download/execution of additional arbitrary files. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.2 Trojan.Gen.NPE.C WS.Malware.1 Machine Learning-based Heur.AdvML.B Network-based System Infected: Trojan.Backdoor Activity 634
RomCom backdoor actively distributed by Void Rabisu APT RomCom backdoor has been distributed in a recent campaign conducted by the threat actor known as Void Rabisu (aka Tropical Scorpius). The same actor has been responsible for Cuba ransomware distribution campaigns in August last year. RomCom RAT attack chain involves phishing emails, social engineering and third-party websites hosting malware executables disguised as software .msi installers for known applications such as ChatGPT, WinDirStat, AstraChat, GIMP, Veeam Backup and others. The attackers also abuse the Google Ads platform to promote their fake websites. RomCom has the functionality to run attackers' commands on the infected device, extract data, download and run additional payloads and others. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.MBT WS.Reputation.1 WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories
ROMCOM RAT used alongside Cuba Ransomware ROMCOM RAT is a custom trojan in active development, first seen earlier this year. The latest version of the RAT has been seen deployed with Cuba Ransomware by a, presumably, new threat actor. ROMCOM has the typical functionalities of a RAT: communication with C2, retrieve system information, delete files, take screenshots, download files, launch processes, etc. Symantec protects you from this threat, identified by the following: File-based Exp.CVE-2020-1472 Hacktool Ransom.Cuba Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Trojan.Nvcertleak!g1 WS.Malware.1 WS.Malware.2 Behavior-based SONAR.TCP!gen1 Machine Learning-based Heur.AdvML.B Heur.AdvML.C Web-based Observed domains are covered under security categories
RomCom RAT used in attacks against military targets in Ukraine RomCom Remote Access Trojan (RAT) has been leveraged in recent attacks against military infrastructure targets in Ukraine. The malware has been attributed to the threat group known as Tropical Scorpius aka UNC2596. The same group has been responsible for Cuba ransomware distribution campaigns earlier in August this year. RomCom RAT attack chain involves phishing emails with embedded links to various third-party websites hosting malware executables disguises as software updates or installers. Symantec protects you from this threat, identified by the following: File-based Hacktool Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.1 Machine Learning-based Heur.AdvML.B Web-based Observed domains/IPs are covered under security categories
Rook Ransomware A ransomware actor known as Rook has been increasingly active recently. While their prevalence is still relatively low in comparison to more infamous ransomware actors, they also employ the dreaded double extortion tactic which is becoming a staple of ransomware activities around the globe. Symantec protects you from this threat, identified by the following: Behavior-based Sonar.SuspLaunch!g18 File-based Downloader Trojan.Gen.MBT
Rook ransomware shows similarities to the Babuk variant Recently discovered Rook ransomware has been reported to be based on the leaked source code of the Babuk ransomware. Rook is delivered via either phishing emails or campaigns leveraging CobaltStrike for payload delivery. Upon infection of the targeted system, Rook will attempt to terminate specific processes and services and to delete the volume shadow copies. The attackers behind the Rook also employ the double-extortion tactics - threatening to expose the data ex-filtrated from the victims if the ransom is not paid. Symantec protects you from this threat, identified by the following: File-based Downloader WS.Malware.1 WS.Malware.2 Behavior-based SONAR.SuspLaunch!g18
Roshtyak - a heavily obfuscated malware Roshtyak is a backdoor payload attributed to the Raspberry Robin threat group. The malware is heavily obfuscated and employs a number of distinct anti-sandbox and anti-VM techniques. One of the used evasion mechanisms relies on dropping fake payload if malware detects it resides on a VM or in a debugger environment. The fake payload observed belongs to BroAssist adware family and it's intended to lead the researchers into believing the investigated threat is not that interesting. Roshtyak's functionality includes ex-filtration of information about the victim as well as download of additional arbitrary payloads. Symantec protects you from this threat, identified by the following: File-based Packed.Generic.553 Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.B Web-based Observed domains/IPs are covered under security categories
Royal ransomware variant emerges A new ransomware family dubbed Royal has been observed in recent attacks targeting organizations. The threat actors behind Royal use callback phishing attacks for malware distribution. The attackers also leverage Cobalt Strike for execution of malicious actions in follow-up attack stages. The Royal ransomware encrypts files with a .royal file extension before dropping a README.TXT file directing victims to a Tor-based payment site. It has also been reported, that the ransomware may target virtual machines and encrypt their virtual disk files (VMDKs). Symantec protects you from this threat, identified by the following: Behavior-based SONAR.SuspLaunch!gen4 File-based Ransom.Royal Trojan Horse WS.Malware.2
Royal remains one of the most prolific ransomware variants Royal is a malware family that emerged in 2022 and to this day remains one of the most prolific ransomware variants. The threat group behind Royal targets various industry sectors including healthcare. Royal infection chain is known to leverage a wide set of techniques and tools including targeted callback phishing attacks, various loaders and open-source tools or additional payloads for the purpose of multistage attacks. Royal ransomware has the functionality to delete backups and volume shadow copies and the utilized file encryption process is multi-threaded. Latest 2023 Royal distribution campaigns have been reported to leverage Citrix vulnerability CVE-2022-27510 as the initial access point for the ransomware attacks. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.RansomRoyal!g1 SONAR.RansomRoyl!gen1 SONAR.SuspLaunch!gen4 File-based Ransom.gen!g4 Ransom.Royal Trojan Horse Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.B Network-based Attack: Ransom.Gen Activity 47
Rummy smishing campaigns: cybercriminals target Indian gamblers For centuries, gambling has been a part of many cultures, attracting people with the excitement and the potential for rewards. However, where there is money and especially money-addiction, crime often follows. Over the years gambling has fueled numerous cybercrime fraud, phishing, and malware campaigns. An example of recent gambling-related activity observed by Symantec is a Rummy smishing campaign targeting Indians. Rummy is a popular card game in India, usually played with two to six players with the objective of forming sets and sequences of cards. The player who melds all their cards first wins the game. If a user falls for the SMS message indicating a transaction of 98,305 Indian Rupees (equivalent to 1,191 US Dollars at the time of writing) to their Rummy account, they will be redirected to a fraudulent online credit card website and prompted to enter their name, phone number, and email address. Symantec protects you from this threat, identified by the following: Mobile-based Symantec Endpoint Protection Mobile is able to also analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. Web-based Observed domain is covered under security categories
Russian and Mongolian IT companies targeted by threat actor group We are aware of recent reports regarding activity attributed to the threat actor group known as TA428. The activity was found to be targeting government information technology agencies in Russia and Mongolia. The attacks consisted of multiple malware families, including Poison Ivy and PlugX, and also leveraged EternalBlue to facilitate lateral movement. Symantec detects associated indicators as follows: File-based Backdoor.DoublePulsar Backdoor.Korplug Hacktool Trojan Horse Trojan.Dropper Trojan.Mdropper Network-based OS Attack: Microsoft SMB MS17-010 Disclosure Attempt OS Attack: Microsoft Windows SMB Remote Code Execution CVE-2017-0144 2
Russian APT group initiated spear-phishing campaign A Russian APT group employed various themed spear-phishing campaigns (themes such as NASA, USAID etc.) to targeted Russian opposition entities. The victims were lured into opening a LNK file disguised as a PDF that executed a Powershell script belonging to an open-source project called HTTP-Shell. This tool enables upload/download file capabilities, C&C options, and ease of movement between directories. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products File-based CL.Downloader!gen12 CL.Downloader!gen241 CL.Downloader!gen263 Scr.Malcode!gen WS.Malware.1 WS.SecurityRisk.4 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Russian legal document decoy hides SapphireStealer activity A recently reported campaign was observed attempting to deliver SapphireStealer malware from a fake Russian government website. Upon execution of the downloaded payload, victims would be presented a decoy legal document while the stealer would perform activity in the background. Stolen data would then be exfiltrated to the attacker's command and control server. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Untrst-RunSys!g1 Behavior-based SONAR.Stealer!gen1 SONAR.TCP!gen1 File-based Trojan Horse Trojan.Gen.MBT WS.Malware.1 Machine learning-based Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Rust-based infostealing malware abuses Github Codespace for data ex-filtration Infostealing malware identified as Deltastealer has been observed in some recent distribution campaigns in the wild. This Rust-based malware targets various user information such as browser data, banking details, cryptocurrency wallets, Discord tokens, etc. and ex-filtrates the collected data to GitHub Codespace webhooks controlled by the attackers. The infostealer variant distributed in the observed campaigns is very similar in functionality to another malware family known as PirateStealer - that also targets Discord data among other information and also has capabilities to extract stolen data to GitHub Codespace. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!200 Heur.AdvML.C Network-based System Infected: Trojan.Backdoor Activity 634 Web-based Observed domains/IPs are covered under security categories
RustDoor and GateDoor malware RustDoor is a macOS malware and focuses on backdoor functionality, whereas GateDoor is a Windows malware that has loader functionality. Both malware have been distributed by encouraging victims to download utilities or updates through fake distribution sites posing as normal legit sites. Under the guise of normal installed program updates/utilities RustDoor and GateDoor will receive and execute commands from the C&C server to perform malicious actions. The commands supported per malware varies but there are infrastructure similarities that suggest a common attack developer. Combined actions include exfiltration of collected information, downloading additional files, and execution of commands. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Ps-Rd32!g1 ACM.Ps-Wscr!g1 File-based OSX.Trojan.Gen OSX.Trojan.Gen.2 Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.A Heur.AdvML.B!100 Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Rusty Droid RAT for Android Rusty Droid is a new Android RAT (Remote Access Trojan) variant for the Android platform. The malware masquerades as a .APK installation package for Google Chrome application. The malware has various capabilities, including sending/receiving SMS messages, intercepting Gmail emails, reading contact lists, keylogging, initiating calls to premium-rate numbers and data injections. Rusty Droid abuses the Accessibility Service on the infected device to execute malicious actions. The collected data is ex-filtrated to the C2 servers controlled by the attackers. Symantec protects you from this threat, identified by the following: Mobile-based Android.Reputation.1 Android.Reputation.2 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Ryuk ransomware recently rampant within healthcare industry The Cybersecurity and Infrastructure Security Agency published a report regarding Ryuk Ransomware targeting entities in the Healthcare industry. Associated campaigns typically leverage an initial downloader component to deliver the Ryuk ransomware payload with financial gain as the intent. Symantec provides the following protections based on some recent samples associated with Ryuk. File-based Backdoor.Trojan Downloader Downloader!gm Heur.AdvML.B Heur.AdvML.C Packed.Generic.528 Packed.Generic.554 Packed.Generic.579 Ransom.Conti Ransom.Hermes Ransom.Hermes!gen2 Ransom.Lamer Ransom.Ryuk Ransom.Ryuk!gen2 Ransom.Ryuk!gen3 Ransom.Ryuk!gen4 Ransom.Wannacry SMG.Heur!gen Trojan Horse Trojan.BazarLoad Trojan.Gen.2 Trojan.Gen.MBT Trojan.Maltrec.TS Trojan.Trickybot!g16 Behavior-based SONAR.Cryptlocker!g75 SONAR.RansomRyuk!gen1 SONAR.RansomRyuk!g3 SONAR.RansomRyuk!g5 SONAR.SuspLaunch!g18 Network-based [Sig ID: 32641] Malicious Site: Malicious Domain Request 46 [Sig ID: 30660] System Infected: Trojan.Backdoor Domains 2 Email-based Protection is in place for Symantec's email security products. Email Threat Isolation (ETI) technology from Symantec provides an extra layer of protection. Web-based Observed domains are covered under security categories
Ryuk Ransomware variant with spreading capability Security Response are aware of recent reports of a new Ryuk Ransomware variant which has built-in spreading capability. If it successfully infects a machine, it is then able to spread to other machines within the Windows domain using scheduled tasks. Ryuk Ransomware (also known as Hermes) itself is not new and has been around for a while now. To deliver their Ransomware, the gang has been leveraging various malware in multiple stage attacks such as Emotet, Trickbot, Bazar and Buer loaders. Symantec has the following coverage in place: File-based Ransom.Ryuk Downloader Heur.AdvML.B Heur.AdvML.C Trojan.Gen.MBT Trojan.Gen.2 Trojan.Horse WS.Malware.1 WS.Malware.2 Behavior-based SONAR.SuspBeh!gen57
Sabbath Ransomware observed targeting health, education and infrastructure victims Ransomware operator Sabbath has been linked to previous activity using the names UNC2190, Arcane and Eruption. Their affiliate model has been rebranded Sabbath and uses preconfigured Cobalt Strike BEACON backdoor payloads unchanged from previous attacks. The group targets health, education and other infrastructure companies in North America and were last seen publicly extorting victims in June 2021. Symantec protects you from these threats, identified by the following: File-based Backdoor.Cobalt Ransom.Wannacry Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT
SafeRAT malware SafeRAT is another Remote Access Trojan recently found active on the threat landscape. The malware can act as a clipboard stealer and a keylogger, can exfiltrate data from various browsers and messenger applications, collect information about the infected machine as well as run additional arbitrary plugins fetched from the remote C2 servers. According to the recent reports, SafeRAT is believed to be distributed by malspam containing malicious .bat attachments. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Ps-Rd32!g1 File-based Trojan.Gen.MBT WS.Malware.1 WS.Reputation.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.A!400 Heur.AdvML.A!500 Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Heur.AdvML.C Network-based System Infected: Trojan.SafeRAT Activity System Infected: Trojan.SafeRAT Activity 2 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Saint Bot ain't no saint Another downloader joins the fray and don't think it's a saint just because it's been named so. Reports indicate that this malware, new in the threat landscape, has been seen delivered via malspam campaigns, ready to download and execute malicious payloads. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.2 Trojan.Gen.MBT Trojan.Horse
SaintBot C2 observed SaintBot first came to light in early 2021 and ever since, sporadic activity has been observed. Actors have leveraged this threat as a means to download other malware via malspam campaigns. Recently, a new command-and-control server associated with this bot has been spotted, hinting at a possible new campaign. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec's email security products File-based Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B Web-based Observed domains/IPs are covered under security categories
Salfram – email-based malware campaigns targeting businesses There have been reports of a number of email-based malware campaigns using links to malicious documents that have been hosted on legitimate file-sharing platforms. The observed email runs have been targeting businesses with multiple payloads such as AveMaria, Gozi, SmokeLoader or ZLoader. While distributing various payloads, the observed campaigns had one shared characteristic - they all used the same crypter containing a specific string value "Salfram". The use of crypters to obfuscate the code and to make analysis more challenging is quite common among threat actors, but using the same crypter with a shared string value allowed the researchers to track those campaigns much more easily in this case. Symantec protections Downloader Heur.AdvML.B Heur.AdvML.C SONAR.Infostealer!g2 Trojan.Gen.2 Trojan.Gen.MBT Trojan Horse
SapphireStealer malware SapphireStealer is an open-source .NET-based infostealer malware seen increasingly used in the wild since it's public release around December 2022. The malware targets ex-filtration of various data including compromised host information, credentials stored in browsers, screenshots from the infected system as well as document and image files stored on disk that match predefined criteria. Some of the most recent campaigns distributing SapphireStealer have been leveraging malware called FUD-Loader for the purpose of payload delivery to its victims. Symantec protects you from this threat, identified by the following: File-based Downloader Infostealer.Eynice Trojan Horse Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.2 Machine Learning-based Heur.AdvML.A Heur.AdvML.A!300 Heur.AdvML.A!400 Heur.AdvML.A!500 Heur.AdvML.B Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
SARA used in the wild – Android Ransomware There's been a recent increase of Android lockers that are primarily distributed via hacking forums and websites to unwary users looking for various hacks that run on Android. These lockers have all been generated using SARA, a tool that re-compiles old Android ransomware into customized fake mobile apps. This tool was recently posted on a well-known Internet hosting service for software development and version control which explains the increased activity – it's accessible to the public. Actors will request a ransom from the victim via the lock screen in exchange for the password. Symantec protects you from this threat, identified by the following: Mobile-based AppRisk:Generisk AdLibrary:Generisk
Satacom malware spreading cryptocurrency infostealers Satacom downloader aka LegionLoader has been recently observed in campaigns delivering cryptocurrency infostealers to the victims. The malware is initially spread via websites advertising free software downloads or cracked software installers. Satacom downloads multiple binaries to the infected machine, including PowerShell scripts that install malicious extensions for Chromium-based web browsers. The installed extensions utilize web injection techniques and allow the attackers to manipulate the content of the targeted websites with the purpose of cryptocurrency theft. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Web-based Observed domains/IPs are covered under security categories
Satori malware provides no enlightenment for Linux Symantec Security Response is aware of a recent report of Satori activities. Named after the Japanese term for Buddhist enlightenment, Satori is a Linux malware and is a known variant of the Mirai botnet. Symantec provides the following detection against this recent variant of Satori: File-based Linux.Satori
SawRat observed using LNK files A new Java-based RAT concealed within a ZIP archive has been observed in the wild. Named "Saw RAT" due to the use of a package called “saw.chain”, the ZIP contains an Adobe icon LNK file to tempt users to open what looks like a PDF file. When the LNK is clicked a JAR file is opened and run which can gather system information, upload files and execute other commands on the infected system. Symantec protects you from this threat, identified by the following: File-based VBS.Dunihi!lnk WS.SecurityRisk.4
Say No to Osno There has been a report of an update to an infostealer previously known as Babax. The author behind the malware has changed its name to Osno and added a couple of new features including a rootkit and a Ransomware component. This last one is currently not working as a Ransomware per se but more like a wiper. Symantec has the following coverage in place for this threat: File-based Trojan.Gen.2 Heur.AdvML.C WS.Malware.2 Website-based This activity is proactively blocked by Symantec Web Isolation technology
Scammers split Bitcoin wallet address (BTC) into two to extort money In recent weeks, Symantec has observed a sudden rise in the volume of extortion scam emails. These emails make use of threatening language in order to extort money from the recipients. Scammers appear to have kicked off a new extortion scam campaign by making a few changes to their existing email templates. Recent emails threaten the recipient by describing their supposed misconduct on the Internet and asking them to pay money in order to safeguard their privacy (as if you could trust a scammer). Interestingly, as shown in Figure 1 below, the scammers split the bitcoin wallet address (BTC) into two parts and instruct the recipient to combine these two parts (and no spaces in between mind!) in order to make a payment. This technique is an attempt to bypass traditional anti-spam filters. Figure 1: Extortion scam email threatening the recipient in order to extort money via a bitcoin wallet address (BTC). Protection Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
ScanBox exploitation framework delivered in recent espionage campaign ScanBox exploitation framework has been delivered in a recent espionage campaign conducted by the APT group known as TA423 or Red Ladon. Throughout the campaign the attackers have been leveraging spear phishing emails purporting to originate from various Australian media entities. ScanBox framework allows the attackers to conduct reconnaissance of the victim's network and for further delivery of additional payloads to selected targets. It has been reported that the campaign in question primarily targeted Australian Governmental agencies, Australian news media outlets and several heavy industry manufacturers conducting operations in the South China Sea region. Symantec protects you from this threat, identified by the following: File-based Infostealer Web-based Observed IPs/domains are covered under security categories
ScarCruft and Lazarus linked to Russian missile company's breach Symantec is aware of reports of a cyber attack against a Russian missile engineering company, allegedly perpetrated by the North Korean actor ScarCruft. While not the sole actor involved in this cyber espionage campaign, they have discovered a backdoor known as "OpenCarrot," which has ties to Lazarus, another North Korean group. As of the time of writing, the method of initial access remains uncertain. However, these groups are recognized for employing a diverse range of techniques to infiltrate victims' networks. These techniques encompass phishing emails, the exploitation of vulnerabilities in the company's software, and the utilization of stolen credentials. Symantec protects you from this threat, identified by the following: File-based Backdoor.Trojan Trojan Horse Trojan.Gen.MBT Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Network-based System Infected: Trojan.Backdoor Activity 634 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Scarlet stealer Scarlet is yet another stealer that is actively being advertised, and binaries are showing up from tests as well as malicious activities. This threat does not differ much from other stealers as it's basically doing the same thing – going after computer information, web-browsers' sensitive data and crypto wallets (including Exodus, Electrum, Atomic, Guarda, Coinomi, Monero, Ledger, Bitbox and Trezor). It also reports and exfiltrate stolen data via a Telegram bot. Groups and individuals who might buy this stealer will most likely be targeting consumers in hopes of snatching crypto wallets but enterprises may not be exempted as its other stealing features remain a critical threat. Symantec protects you from this threat, identified by the following: Behavior-based ACM.Untrst-FlPst!g1 File-based Infostealer Machine Learning-based Heur.AdvML.B!100 Network-based Audit: Bad Reputation Application Activity Audit: Untrusted Telegram API Connection System Infected: Trojan.Backdoor Activity 641
Scarred Manticore leverages LIONTAIL framework A new activity from the threat actor known as Scarred Manticore has been observed in the wild. The attackers leverage a malware framework called LIONTAIL to target various sectors including financial, governmental and telecommunications in the Middle East. LIONTAIL consists of a set of shellcode loaders and payloads including a C-based backdoor, that allows for remote command execution over HTTP. The Scarred Manticore threat actor is also known to use a wide range of custom web shells, DLL backdoors and implants in their attacks. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based Downloader Hacktool.Ace Hacktool.Proxy.A Hacktool.Rootkit Trojan Horse Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.A!400 Heur.AdvML.A!500 Heur.AdvML.B!100 Heur.AdvML.B!200 Heur.AdvML.C
Schoolyard Bully after Facebook credentials Light has been shed on "School yard bully", an Android malware whose primary goal is to snatch Facebook credentials. This threat has been active since at least 2017 and over the years multiple campaigns have been observed. The threat actor's modus operandi hasn't really changed much, generally disguising their malware as educational Android applications. These have been seen on Google Play and other third-party app stores and websites. Upon successful installation, the malicious app will prompt the victim to log into their Facebook account, stealing their credentials in the process. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk
ScrubCrypt gains a cryptominer customer While crypto clippers have increased, cryptomining is still prevalent and there have been reports of a cryptominer actor increasing their activities. In a recent campaign, they have started to use a Crypter known as ScrubCrypt in their attack chain, which in turn uses Bat packing. Crypters are commonly used by groups and individuals around the world, and there is no shortage of choices available. These are malicious software designed to evade detection by security software by encrypting the malicious code within the malware. BAT packing is a common technique used by Crypters. This technique involves compressing the malicious code into a small executable file and then packing and encrypting it using various encryption algorithms. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.maltraffic!gen1 SONAR.TCP!gen1 File-based Trojan Horse Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Network-based System Infected: Coinminer Activity 2 System Infected: Miner.Bitcoinminer Activity 16 System Infected: Trojan.Coinminer Activity 26 Web-based Observed domains/IPs are covered under security categories
Search ads serving up installers wrapped in malware New malvertising (malicious advertising) campaigns have been detected distributing modified AnyDesk, Telegram, DropBox, and Zoom installers via Google ads when searching for keywords related to the programs. The installers download a powershell script in the background which has backdoor capabilities, including scraping content and executing additional commands. Symantec protects you from these threats, identified by the following: File-based Trojan.Gen.MBT Trojan Horse Trojan.Gen.2 Network-based Malicious Site: Malicious Domains Request Malicious Site: Malicious Domain Request 21 Malicious Site: Malicious Domain Request 22 System Infected: Bad Reputation Process Request 6 System Infected: Trojan.Backdoor Domains 2 System Infected: Trojan.Backdoor Activity 606 Email-based Protection is in place for Symantec's email security products. Email Threat Isolation (ETI) technology from Symantec provides an extra layer of protection. Web-based Observed domains are covered under security categories
Search Marquis still a nuisance to MacOS users Browser hijacking is an aging technique but Symantec continues to observe malware and adware that modify people's browser settings without their permission, redirecting them to websites they did not intend to visit. Search Marquis (also known as Search Baron and OfferDeal) is one of these which has been around for a few years now and continues to target MacOS users. Symantec protects you from this threat, identified by the following: File-based OSX.OfferDeal
SectopRAT packed with encrypted C&C controls The Remote Access Trojan known as SectopRAT (also known as 1xxbot, ArechClient and Asatafar), active since 2019 continues to be seen in the threat landscape. SectopRAT is known to be delivered via Drive-by-Download technique. Actors behind the .NET compiled malware continue to enhance its features. Based on recent reports, SectopRAT comes packed in multiple layers to evade detection and capable of using encrypted Command-and-Control server communication in recent activities. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.B Heur.AdvML.C Trojan.Gen.MBT Trojan Horse WS.Malware.1 WS.Malware.2
SecuriDropper mobile malware SecuriDropper is a new mobile malware variant offered for sale in the form of a Dropper-as-a-Service (DaaS) model. The malware has functionality allowing it to bypass the "Restricted Settings" security feature introduced in Android 13 and responsible for setting certain restrictions on the privileges granted to sideloaded apps. Some of the latest campaigns leveraging SecuriDropper have been observed to deliver SpyNote RAT or the Ermac banking trojan as final payloads. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk Android.Reputation.2 AppRisk:Generisk
Security researchers in Asia targeted using Internet Explorer 0-day Symantec Security Response is aware of a report that a small number of security researchers in Asia were targeted by what's believed to be a state sponsored APT group. The adversary sent a MHT file which claims to contain a Chrome exploit to the researchers. Opening the file launches Internet Explorer and malicious JavaScript downloads two payloads, one of which contains code to exploit an unpatched Internet Explorer vulnerability. Symantec provides protection against this attack as below. Additional coverage is currently being investigated. File-based Trojan.Malscript Network-based Malicious Site: Malicious Domains Request System Infected: Trojan.Backdoor Domains 2 Web Attack: Exploit Website 10
Seedworm APT continues malicious activities in 2020 The Symantec Threat Hunting Team has uncovered a new wave of attacks by the Seedworm APT group targeting a wide range of government entities, telecoms and computer services organizations in the Middle East. The following protections are in place against Seedworm activities: File-based Backdoor.Mori Backdoor.Powemuddy Downloader.Covic Hacktool.Mimikatz Heur.AdvML.C Infostealer!im Trojan Horse Network-based System Infected: Trojan.Backdoor Activity 243 More information is available at Seedworm: Iran-Linked Group Continues to Target Organizations in the Middle East
Seedworm distributing remote administration management software agents Seedworm(also known as MuddyWater), a threat actor targeting the EMEA region, has been identified in a spear-phishing campaign. The attackers distributed agents of Atera and ConnectWise ScreenConnect remote administration management software via PDF file attachments hosted on file hosting servers. Upon execution, these agents grant the threat actor remote access to compromised systems, allowing them to perform file operations. Symantec protects you from this threat, identified by the following: File-based PUA.Gen.2 Trojan.Malmsi WS.Malware.1 Network-based Audit: Atera Client Activity Audit: TLS v1 Request Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Seedworm exploits Atera Agent in a spear-phishing Campaign Seedworm (also known as MuddyWater), is actively exploiting the legitimate remote monitoring and management (RMM) tool Atera Agent in its spear-phishing campaign. The actor leverages Atera's 30-day free trial offers to create agents registered with compromised email accounts, enabling remote access to targeted systems without establishing their own command-and-control (C2) infrastructure. Atera offers extensive remote control capabilities via its web UI, including file upload/download, interactive shell access, and AI-powered command assistance. The threat actor utilizes free file hosting platforms to host their RMM installers, distributing them via spear-phishing emails. Symantec protects you from this threat, identified by the following: File-based PUA.Gen.2 Trojan.Malmsi WS.Malware.1 Machine Learning-based Heur.AdvML.C Network-based Audit: Atera Client Activity Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Self-Evaluation link from HR? Not so fast Security researchers have recently reported on phishing messages impersonating HR departments sending updated employee handbooks or self-evaluation forms. The links contained in these messages lead to free web form hosting services designed to harvest credentials from well intentioned employees. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
SEO campaign leads to shady adult dating and porn domains SEO poisoning attacks have made headlines in recent months, and more campaigns are being discovered. This type of attack vector involves manipulating search engine results to promote a malicious website or set of websites with the goal of infecting users' computers with malware, phishing out their credentials, or luring them into a fraud scheme. Symantec recently observed an SEO poisoning campaign in which users were redirected to adult-themed domains (porn and dating) via benign domains that had open or vulnerable redirects. The URLs in the search engine results contain shady middlemen URLs (of which thousands have been discovered) in the query string. The term "shady" is often used to describe domains that appear suspicious or potentially harmful. Symantec protects you from this threat, identified by the following: Network-based URL reputation: Browser navigation to known bad URL Web-based Observed sites are covered under security categories WebPulse returns elevated Risk Levels for newly-appearing sites Website content & telemetry rules will detect & categorize new URLs
Serbian agri-food exporter spoofed to target in-country organizations Symantec recently observed one of the largest agri-food exporters in Serbia being spoofed by a threat actor to target various organizations in the country. The malicious emails, written in Serbian (subject: Састанак за заказивање), have been crafted to appear as an invitation to set up a business appointment. Attached to the email is a malicious .Z archive (Писмо састанка о именовању docx.z) – utilizing the Lempel-Ziv-Welch (LZW) compression algorithm. While this algorithm was commonly used in the past, it has been largely replaced by more efficient compression formats like .zip, .gzip, and .tar.gz. Nonetheless, Symantec continues to observe this type of archive being used by certain groups and individuals. If users are successfully lured by this social engineering tactic and execute the malicious binary (Писмо састанка о именовању.docx.exe) within the archive, they'll end up running a NullSoft script-driven installer that will deploy a loader and an encrypted payload – Agent Tesla. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products Behavior-based SONAR.ProcHijack!g21 SONAR.Stealer!gen1 File-based Infostealer.Atesla Machine Learning-based Heur.AdvML.B!100
SeroXen RAT spread through a typosquatted NuGet package SeroXen RAT is a malware variant first observed on the threat landscape back in 2022. The malware has since been advertised and sold online as a ready-to-use tool, easily available for implementation without any advanced know-how. SeroXen is believed to be partially based on the infamous Quasar RAT and once installed on the targeted host allows the attackers remote control and command execution. The most recently observed campaign spreading SeroXen RAT has been disguising the malicious binaries within typosquatted packages hosted on the NuGet package manager repository. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200
Serpent Stealer released Serpent Stealer is a new and complex .NET-based malware. It is distributed via underground forums and can collect data from most web browsers, programs and gather some login credentials. Serpent Stealer has been seen using techniques to evade antivirus software and the test for the presence of malware tools such as debuggers and virtual machines and is able to bypass Windows User Account Control (UAC). It uses webhooks and Discord abuse to exfiltrate the collected information. Symantec protects you from these threats, identified by the following: Behavior-based SONAR.TCP!gen1 Email-based Coverage is in place for Symantec’s email security products. File-based Trojan Horse Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B!100 Heur.AdvML.B!200 Heur.AdvML.B Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Serverless Web Hosting services abused in recent phishing run Symantec has observed that threat actors started to abuse a serverless Web hosting service to steal credentials in a recent phish run. As shown in the Figure 1, email samples are themed as voicemail notification messages. The email template is kept short with limited content. Figure 1: Email sample masqueraded as voicemail notification message. As shown in Figure 2, on clicking the hyperlinked text in the email, the embedded URL opens a fake login page aimed to steal credentials. The phishing page is hosted by using a serverless Web hosting service. Figure 2: Phishing page hosted on a serverless Web hosting service for credential harvesting. Protection Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
ServHelper RAT distributed via latest TA505 campaigns According to a recently released report, since June there has been a spike in ServHelper activities. This malware variant is commonly associated with the activities of the APT group known as TA505. ServHelper is now being distributed via various means in the latest campaigns. The attackers have also been leveraging other malware families such as Raccoon Stealer and Amadey Trojan to spread ServHelper. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.B Heur.AdvML.C ISB.Downloader!gen412 Packed.Generic.616 Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories
SessionManager IIS backdoor SessionManager IIS backdoor has been used in various 2022 attack campaigns against governmental, military and industrial entities across the world. According to a recent report, SessionManager has been deployed to over 20 different organizations from the mentioned sectors. Due to the use of another malware variant known as OwlProxy, the attacks leveraging SessionManager have been attributed to the threat group named Gelsemium. SessionManager backdoor has functionalities to execute arbitrary binaries on the compromised hosts as well as connect to other compromised network endpoints. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.MBT Trojan.Owprox Trojan.Owprox!gen1 WS.Malware.1 Policy-based Symantec DCS default hardening for Microsoft Exchange and Microsoft IIS provides zero day protection for ProxyLogon vulnerabilities, preventing installation of unauthorized backdoors such as the SessionManager IIS module. DCS sandboxing of Microsoft Exchange and IIS services prevents subsequent malicious actions by the SessionManager backdoor to tamper with critical system files, run arbitrary processes, or download malware tools for credential theft and data exfiltration.
Several new ransomware variants use the leaked Conti source code Several new ransomware variants based on the leaked Conti ransomware source code have been found in the wild. The spotted variants include: Putin ransomware, ScareCrow, Bluesky and Meow. While we have already seen some of the Bluesky samples back in August, the other mentioned ransomware families were discovered just recently. Some of their characteristics include: ScareCrow encrypts users' files and appends .CROW extension to them. The ransom note asks the victim to contact the threat actors via Telegram. Putin ransomware encrypts users' files and appends .PUTIN extension to them. The threat actors behind this variant also use Telegram to contact the victims. They also publish details of the victims on their telegram channel. Meow encrypts users' files and appends .MEOW extension to them. Ransom note provides both email addresses and telegram handles to the threat actors. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.Ransomware!g1 SONAR.Ransomware!g7 SONAR.Ransomware!g12 File-based Downloader Ransom.Bluesky Ransom.Conti!gm1 Ransom.Conti!gen4 Ransom.Conti!gen10 Ransom.Conti!gen12 Ransom.Generic.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200
ShadowPad: a sophisticated modular backdoor/malware platform ShadowPad is the successor of the backdoor PlugX, but has since evolved into a modular malware platform using plugins. The basic modules still provides a backdoor functionality, along with other data retrieval capabilites through plugins from the C2 server. The tool keeps being updated with anti-detection and persistance techniques regurarly. A recent report suggests that the tool and the different plugins are tightly controled by the author, and is only privately shared or sold to threat actors, among them Chinese spionage groups. Symantec protects you from this threat, identified by the following: File-based Backdoor.Shadowpad Backdoor.Winnti Trojan Horse Trojan.Broler Trojan.Gen.2 Trojan.Gen.MBT
ShadowPad trojan used by Redfly group to target critical infrastructure Symantec’s Threat Hunter Team has found evidence that a threat actor group Symantec calls Redfly used the ShadowPad trojan to compromise a national grid in an Asian country for as long as six months earlier this year. The attackers managed to steal credentials and compromise multiple computers on the organization’s network. Aside from the ShadowPad RAT, the attackers also leveraged a keylogger and a tool called PackerLoader, used to load and execute shellcode. Read more in our blog: Redfly: Espionage Actors Continue to Target Critical Infrastructure Symantec protects you from this threat, identified by the following: Behavior-based SONAR.Pwdump!gen1 SONAR.Pwdump!gen5 SONAR.SuspStart!gen14 SONAR.TCP!gen6 File-based Backdoor.Shadowpad Spyware.Keylogger Trojan Horse Trojan.Gen.MBT WS.Malware.1 Machine learning-based Heur.AdvML.A Heur.AdvML.B Heur.AdvML.C Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Shanova Ransomware Shanova is a recent Chaos ransomware variant observed on the threat landscape. The malware encrypts user files and appends .shanova extension to them. Ransom note is dropped in the form of a text file called "read_it.txt" where the threat actors ask the victims to contact them via the provided email address for further instructions on how to decrypt the locked files. Shanova has the functionality to delete the volume shadow copies and backups from the infected machine. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.SuspBeh!gen625 SONAR.SuspLaunch!g22 SONAR.SuspLaunch!g266 File-based Trojan.Gen.MBT Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.A!400 Heur.AdvML.A!500 Heur.AdvML.B!100 Heur.AdvML.B!200
SharkBot, a banking malware from below Another Android banking malware has surfaced in the mobile threat landscape. Dubbed SharkBot, it's not only using the classic overlay technique but also performing automatic transfer attack using the Accessibility Service. An ATS attack allows an actor to input data in fields of legitimate mobile banking apps and crypto currency wallets. According to recent reports, this malware has been targeting banks and cryptocurrency services in the UK, US and Italy. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk
Sharkbot mobile malware returns with a new campaign Sharkbot, first seen around October 2021, is a variant of a mobile banking trojan capable of financial fraud and stealing customers' sensitive information. A new variant 2.25 of the Sharkbot malware has been recently spread via malicious apps hosted on the Google Play Store. The malware masquerades as fake antivirus or phone cleaner apps. According to the reports, the latest Sharkbot variant comes with new functionalities allowing it to steal cookies from the compromised device. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk Android.Reputation.2 AppRisk:Generisk Web-based Observed IPs/domains are covered under security categories
Sharpil RAT malware - possible precursor to Sharp Stealer Sharpil is a new Remote Access Trojan (RAT) discovered in the threat landscape. This C#-based malware features basic infostealing functionality including system info collection and data gathering from various web browsers. Once on the infected machine Sharpil initiates connection to the attackers via a Telegram bot. Sharpil exhibits some code similarities with another recently identified malware variant called Sharp Stealer. This variant has been reported as being advertised for sale on Telegram, and it possesses some enhanced capabilities when compared to Sharpil RAT. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Untrst-RunSys!g1 Behavior-based SONAR.MalTraffic!gen1 SONAR.Stealer!gen1 File-based Trojan Horse Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A Heur.AdvML.A!300 Heur.AdvML.A!400 Heur.AdvML.B!100 Heur.AdvML.B!200 Heur.AdvML.B Network-based Audit: Bad Reputation Application Activity System Infected: Trojan.Backdoor Activity 568
SharpPanda APT group inflates its spear-phishing campaign A new campaign by SharpPanda APT targeting government entities from G20 nations has been observed in the wild. The threat actor uses a spear-phishing campaign with a weaponized document customized to appear genuine to the recipient organization. The documents are weaponized using a tool called RoyalRoad which exploits vulnerabilities like CVE-2018-0802, CVE-2018-0798, and CVE-2017-11882 observed in Equation Editor of Microsoft Office. Opening the document sets off a chain of events through which attackers attempt to collect data from the victim. If the victim machine is determined to be of interest, the next phase of events continues, resulting in the execution of a loader that communicates with a C2 server and executes the backdoor. The backdoor grants the ability to: Capture screenshots Gather victim machine information (i.e. process and service info, Win Version, registry keys etc...) Control shutdown Run read/write commands via cmd Control file capability and attributes Process creation/termination control Symantec protects you from this threat, identified by the following: File-based Bloodhound.RTF.12 Trojan Horse W97M.Downloader Web-based Observed domains/IPs are covered under security categories
Shc malware leveraged for coinminer and DDoS bots distribution A new campaign leveraging Shc Linux malware to deliver XMRig coinminers has been observed in the wild. Shc stands for Shell Script Compiler and relies on Bash shell scripts that can be converted into the .elf Linux executables. The malicious scripts delivered to the infected endpoints contain instructions for download of additional payloads from the C2 servers belonging to the attackers and their later execution. Aside of coinminer distribution, the same threat actors have been observed also to download some DDoS IRC bot binaries onto the infected endpoints. Symantec protects you from this threat, identified by the following: File-based Linux.Coinminer Trojan Horse Trojan.Gen.NPE WS.Malware.1 Web-based Observed domains/IPs are covered under security categories
ShellBot is a dangerous publicly available cryptocurrency miner ShellBot is a publicly available cryptocurrency miner most commonly used to mine Monero. It uses ShellShock, Drupalgeddon and other exploits to attack poorly configured, internet facing devices through brute-force attacks guessing common passwords. It enables attackers to mount internet relay chat (IRC)-controlled botnets that can include endpoints, Linux servers, Android devices and Internet of Things devices. Symantec protects you from this threat, identified by the following: File-based Perl.Pircbot Website-based This attack is proactively blocked by Symantec Web Isolation technology
Shikitega - new malware targeting Linux devices A new malware dubbed Shikitega has been reported to target Linux-based endpoints and IoT devices. The malware leverages known Linux vulnerabilities for privilege escalation and the XMRig coinminer payload execution. During the multistage infection chain, the malware downloads and runs a Metasploit meterpreter known as Mettle, that allows for a wide range of malicious activities to be performed on the infected host. For the purpose of C&C communication, Shikitega abuses legitimate cloud hosting services. Symantec protects you from this threat, identified by the following: File-based Backdoor.Monev Trojan.Gen.NPE WS.Malware.1 WS.SecurityRisk.4 Web-based Observed domains are covered under security categories
ShinobuClipper Clipping (also known as hijacking) crypto wallets is a technique that has gained in popularity over the last few years. Essentially a malware with this capability is able to replace victims' cryptocurrency wallet addresses with ones owned by the malware actor. There are many malware families with various complexity and additional stealing capabilities which adopted this technique, although we continue to see many threats that just clip. ShinobuClipper is one of these, in use by by multiple groups and individuals over the last few years now. Recent ShinobuClipper activities indicate that actors continue to favor the drive-by-download vector to lure victims, leveraging fake updates (e.g. Chrome updates) and blockchain-related tech/services as social social engineering tactics. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.SuspBeh!gen6 File-based Trojan.Gen.MBT Trojan Horse Machine Learning-based Heur.AdvML.B
Shortcuts to TikTok fame could lead to malware It's common knowledge that cyber criminals keep track of world news and trendy services in order to fuel their social engineering tricks and allow them to better lure victims. In 2020 TikTok's popularity dramatically increased globally and ever since Symantec has been observing recurrent malicious activities slipstreaming its success. The most common activity relates to Remote Access Trojans (NJRAT, NanoCore, etc.) and infostealers purporting to be TikTok's hacktools to help gain followers and views, delivered via drive-by-download. This is a powerful trick as many TikTok users could be tempted by such shortcuts to reach a higher level of popularity and fame on this video-sharing social networking service. It's also well known that TikTok pays its users per views they've achieved on their videos. Symantec protects you from these threats, identified by the following: File-based Backdoor.Ratenjay Backdoor.Ratenjay!gen2 Backdoor.Ratenjay!gen3 Heur.AdvML.B Trojan.Nancrat Trojan.Nancrat!g1 Behavior-based SONAR.Infostealer!g2 SONAR.Nancrat!gen1 SONAR.Nancrat!gen4 SONAR.Ratenjay!gen1 SONAR.Ratenjay!gen2 SONAR.SuspBeh!gen22
Shuckworm group continues campaign against Ukraine The Shuckworm espionage group is continuing to mount multiple cyber attacks against Ukraine, with recent targets including security services, military, and government organizations. Shuckworm (aka Gamaredon, Armageddon) is a Russia-linked group that has almost exclusively focused its operations on Ukraine since it first appeared in 2014. Ukrainian officials have publicly stated that the group operates on behalf of the Russian Federal Security Service (FSB). Shuckworm is known to use phishing emails as an initial infection vector, then proceed to download additional backdoors and tools onto targeted machines. Read more in our blog: Shuckworm: Inside Russia’s Relentless Cyber Campaign Against Ukraine Symantec protects you from this threat, identified by the following: File-based CL.Downloader!gen12 Downloader ISB.Downloader!gen281 ISB.Downloader!gen490 ISB.Heuristic!gen5 Scr.Malcode!gen Trojan Horse W97M.Downloader Web-based Observed domains/IPs are covered under security categories
Shuriken Ransomware Shuriken is a new ransomware variant observed in the wild. The malware appears to be a strain of the Blackbit (aka LokiLocker) ransomware family. It encrypts user data and appends .Shuriken extension to the files. Upon completed encryption a ransom note text file called "READ-ME-SHURKEWIN.txt" is dropped within the encrypted locations on the infected machine. The malware has the functionality to disable Windows firewall and to delete volume shadow copies as well as system backups on the infected endpoint, among others. Symantec protects you from this threat, identified by the following: Behavior-based ACM.Ps-Schtsk!g1 ACM.Untrst-FlPst!g1 ACM.Wmic-DlShcp!g1 AGR.Terminate!g2 SONAR.RansomGen!gen3 SONAR.SuspBeh!gen93 SONAR.SuspBeh!gen752 File-based Scr.Malcode!gen Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.B!100 Network-based System Infected: Bad Reputation Process Request 4
Sideloading vulnerabilities in OneDrive exploited for cryptomining According to a recent report, a new cryptojacking campaign exploiting known DLL sideloading vulnerabilities in Microsoft OneDrive has been discovered in the wild. The attackers leverage malicious secur32.dll binaries that are being dropped onto the targeted machines and later loaded by the legitimate OneDrive executable. Depending on the config file delivered in the specific campaign run, the discovered payload is either the Lolminer or the XMRig cryptocurrency miner. Symantec protects you from this threat, identified by the following: File-based Scr.Malcode!gdn32 SMG.Heur!gen Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE Machine Learning-based Heur.AdvML.A Heur.AdvML.B
Signed backdoor found in screen mirroring software A recent report identified a signed backdoor present in LaiXi Android screen mirroring software. According to the report, attackers abused the Microsoft Windows Hardware Compatibility Program to get the malware signed. The malware contains an embedded freeware proxy server, likely intended to watch and potentially manipulate network traffic. There are no indications that the software vendor was the victim of a supply chain attack nor that they intentionally introduced the malicious code. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Untrst-RunSys!g1 Behavior-based SONAR.TCP!gen1 File-based PUA.Gen.2 Trojan Horse Trojan.Certbypass Trojan.Gen.MBT WS.Malware.1 Machine learning-based Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!200 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Signed XLL File Delivers Buer Loader Buer Loader is Malware-as-a-Service that has been around since 2019 and gained popularity when adopted by Ryuk threat actors. In recent spam campaigns social engineering is used to lure recipients to open a malicious Microsoft Excel attachment. When the recipient opens the file a macro is triggered which attempts to connect to a predefined server to download the Bauer Loader malware. The primary difference in this campaign is that the XLL file used is signed with a valid digital signature in an effort to evade detection. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.B Heur.AdvML.C Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 WS.Malware.2 Email-based Protection is in place for Symantec's email security products. Email Threat Isolation (ETI) technology from Symantec provides an extra layer of protection. Website-based Observed Domains are covered under security categories
SilentCryptoMiner as fake chrome updates in drive-by-download campaigns SilentCryptoMiner, as the name suggests, is a cryptocurrency miner that's able to silently mine various currencies such as Etherium, Monero, Raptoreum, etc. It usually goes along with a web panel known as Unam which facilitates controls and commands of SilentCryptoMiner running on victim machines. Both SilentCryptoMiner and Unam are publicly available on a well-known Internet hosting platform for software development and version control which grants access to both legitimate and illegal use. Over the last few weeks, Symantec has observed an actor trying to compromise machines via drive-by-download by disguising the coin miner as Chrome updates as well as game hacks. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT Trojan Horse Web-based Observed domains are covered under security categories
SilverRAT malware SilverRAT, a remote access trojan variant discovered in the wild, has recently seen the distribution of its cracked builder through hacking forums and Telegram channels. Written in C# and targeting the Windows platform, SilverRAT possesses capabilities such as keylogging, theft of browser data, cookies, files, and credentials. Additionally, the malware enables attackers to initiate hidden remote sessions on infected systems. Symantec protects you from this threat, identified by the following: Behavior-based ACM.Ps-CPE!g2 ACM.Mshta-Masq!g1 ACM.Ps-RLsass!g1 SONAR.SuspStart!gen14 SONAR.TCP!gen1 File-based CL.Suspexec!gen135 Backdoor.Silverrat Backdoor.Silverrat!g1 SMG.Heur!gen Trojan Horse Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.A!400 Heur.AdvML.A!500 Heur.AdvML.B!100 Heur.AdvML.B!200
Silver Sparrow targets Apple's M1 Security researchers recently identified a new OSX malware with downloading capabilities. Dubbed Silver Sparrow, it uses JavaScript for execution and is compiled for Apple’s new M1 ARM64 architecture. Symantec has the following coverage in place: File-based OSX.Trojan.Gen OSX.Trojan.Gen.2
SkidMap preys on Redis According to recent reports, a new SkidMap variant is actively targeting vulnerable Redis servers, which are open-source, in-memory data structure stores. This Linux threat has been active since at least 2019. Actors behind this recent activity are still going for persistence and cryptomining. When an open Redis server is discovered, they will deploy a malicious shell that functions as a dropper for a malicious GIF or JPEG. This payload will subsequently load a rootkit and a cryptocurrency miner. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.NPE Trojan Horse
SkinnyBoy with an appetite for malware trouble SkinnyBoy is a new malware being used by Russian hacking group APT28 (aka PwnStorm, Fancy Bear, Sofacy, Sednit, or Strontium). The malware is delivered via a spear phishing campaign leveraging Word documents laced with macros that extract a downloader malware to the victim machine. Skinnyboy's purpose is to gather and extract vital component/system information from the compromised machine to a C2 server and then to retrieve the final payload from said server. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.B Heur.AdvML.C Trojan Horse Trojan.Gen.2 WS.Malware.2 Network-based URL reputation: Browser navigation to known bad URL Web-based Observed IP/Domains are covered under security categories
Skuld infostealer Skuld is a recently discovered Golang-based info-stealing malware variant. Skuld targets extraction of system information, victim's confidential files, cryptocurrencies, Discord tokens, data stored in various web browsers, etc. The malware has the capability to perform various checks for presence of debugging or virtualized environments before execution. The ex-filtration of the stolen data is possible either through Discord webhooks or via upload of compressed files to Gofile storage service. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based Trojan Horse Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories
SkullLocker Ransomware Another ransomware actor, this one known as SkullLocker (a chaos variant) has been observed in the threat landscape. Files that are successfully encrypted following a compromise are appended with a .skull extension. The ransom note left on affected machines is written in Polish, advising victims to contact the perpetrators and pay within 72 hours. It is uncertain whether these actors employ the dreaded double extortion tactic, but they do not mention any sale or leak of victims' encrypted data in their ransom note. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.SuspDrop!gen1 File-based Ransom.Sorry Machine Learning-based Heur.AdvML.B
Sload Downloader targets victims in Europe Sload malware serves as a downloader leading usually to Trickbot, Ramnit or other banking trojan payloads. According to a recently released report, Sload has been actively targeting victims in Europe this year. The distribution campaigns leverage LNK files, VBS, Powershell and WSF scripts in order to run the Sload downloader. Symantec protects you from this threat, identified by the following: File-based Trojan Horse VBS.Downloader.Trojan WS.Malware.1 WS.Malware.2 Web-based Observed domains are covered under security categories