text
stringlengths 0
383k
|
---|
Reptile - a Linux rootkit malware
Reptile is an open-source rootkit malware targeted at Linux-based systems and seen regularly emerging with new variants in the wild, often in conjunction with other malicious payloads. The malware is primarily used to conceal malicious directories/files, processes and network communication with the C&C server belonging to the threat actors. Reptile also incorporates a reverse shell routine (based on TinyShell), that allows the attackers to remotely control the compromised systems.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.NPE
WS.Malware.1 |
Retch ransomware
Retch is a new ransomware variant based on the open-source Hidden Tear ransomware. The malware targets files with pre-defined extensions for encryption. Once encrypted it appends the .Retch extension to them and drops a ransom note in the form of a .txt file asking victims to pay for the file decryption in Bitcoins. The most recent samples of this ransomware have been submitted to public file scanning services from various countries worldwide, indicating that the attackers are not targeting any specific regions or businesses.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.Cryptlocker!g38
SONAR.RansomGen!gen3
SONAR.Ransomware!g1
SONAR.Ransomware!g7
File-based
Trojan.Gen.MBT
Ransom.HiddenTear
Ransom.HiddenTear!g1
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.A!500
Heur.AdvML.A!400
Heur.AdvML.B!100
Heur.AdvML.B!200
Network-based
System Infected: Trojan.Backdoor Activity 634 |
RevengeRAT - aging but still causing trouble
For years, the threatscape has been plagued by both old and new Remote Access Trojans. RevengeRAT is in the former group, seeing its fair share of usage back in 2019 and 2020 in multiple campaigns by various groups and individuals. Easily accessible (and free) via leaks, this malware continues to be used and more recently has been observed in new malspam campaigns.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.NPE
Heur.AdvML.C
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. |
Revenge RAT via malicious PPAM in Latin America, Portugal and Spain
A .ppam file is a PowerPoint add-on. PPAM files can contain code, scripts, and resources that are loaded into PowerPoint to provide additional functionality, including custom commands, tools, or integration with external services. This functionality can be exploited by attackers to execute malicious code on a victim's system. Such malicious PPAM files can be created using various programming languages, including Visual Basic for Applications (VBA) or modern web technologies like HTML, CSS, and JavaScript. Due to their widespread use in organizations and their ability to execute code, PPAM files have been an attractive vector for delivering malware.
Over the past few months, one actor has been leveraging malicious PPAM files in Latin America, Portugal and Spain via emails. Examples of filenames include "Reserva Detalhes.ppam," "reservas.ppam," "powerPoint.ppam," "Reserva Cancelar.ppam," "Reserva detalhada.ppam," etc.
These PPAM files contain a malicious macro that will execute a PowerShell downloader, which in turn will deliver a remote access trojan known as Revenge RAT. This threat enables attackers to control the victim's system remotely, allowing actions such as viewing the desktop, accessing files, stealing sensitive information, and monitoring user activities.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec's email security products
File-based
ISB.Heuristic!gen10
ISB.Heuristic!gen125
Scr.Malcode!gen103
Scr.Malcode!gen125
CL.Downloader!gen9
Machine Learning-based
Heur.AdvML.B |
Rever Ransomware, sporadically active
Rever ransomware actors are not new to the threat landscape and appear to have been active since at least mid-2022. While they do employ the nefarious double-extortion tactic, they are far from being as prevalent as certain other ransomware actors. However, Symantec does continue to regularly observe Rever's activities. Upon successful compromise, encrypted files will be appended with a random 8 characters extension. The ransom note left on affected machines is fairly similar to Babuk's note and advises victims to connect with them using Tox chat, with no ransom price stated.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.CryptLocker!g42
SONAR.RansomPlay!gen1
SONAR.SuspLaunch!gen4
SONAR.SuspLaunch!g18
File-based
Ransom.Babuk
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B |
ReverseRat malware targeted govt., energy sector in South and Central Asia
A threat actor, with suspected ties to Pakistan, has been targeting the government and energy sectors in South and Central Asia, deploying a remote access Trojan (RAT) onto compromised Windows systems. Researchers mostly saw the malware affecting entities in India, with a few in Afghanistan.
The threat actor relies on re-purposed open-source code and uses compromised domains in the same country as the targeted entity to host their malicious files, in an attempt to make the connections look like normal traffic.
The attack is likely to begin with malicious links sent via email or messages, which download a zip file with a LNK file, pointing to a malicious HTA file in the same domain, and a decoy PDF file, with themes related to the sector the targeted organization deal with. The HTA file results in two agents being downloaded to the victim machine, one to reside in memory while the other grants persistence on the infected workstation. The final payload is a .NET backdoor called ReverseRat that has the capability to capture screenshots, terminate processes, execute arbitrary executables, perform file operations, and upload data to a remote server
Symantec protects you from this threat, identified by the following:
File-based
Backdoor.Ratenjay
JS.Downloader
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.NPE
Trojan.Gen.2
WS.Malware.2 |
Revive, Android banking malware
Revive is a run-of-the-mill Android banking malware with spyware capabilities that has recently been brought to light. According to reports, this threat's code shows similarities with TearDroid for which source code is available to the public. Being able to collect credentials and intercept SMS allows the actors to take over their victims' financial account.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk |
Rhadamanthys infostealer continues to be distributed via malicious ads
Rhadamanthys is a malware known to be distributed mostly through malspam or malvertising. The most recently observed campaign spreading this malware has been leveraging malicious ads and decoy websites masqueraded as download portals for the popular productivity application called Notion. In this campaign the attackers attempt to spread both malware targeted at macOS and Windows users. While the macOS based payload is a version of Atomic Stealer, Windows binaries end up with Rhadamanthys payload deployment. The infostealer has the capabilities for credential theft from various applications and email programs.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.TCP!gen1
File-based
Downloader
OSX.Trojan.Gen
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!500
Heur.AdvML.C
Network-based
System Infected: Trojan.Backdoor Activity 634
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Rhadamanthys malware deployments attributed to TA547
A new Rhadamanthys infostealer deployment campaign attributed to the TA547 threat actor has been discovered in the wild. The campaign targets a wide range of industries in Germany. In their attacks, the attackers leverage .zip archives containing malicious .lnk files that once executed trigger PowerShell scripts leading to Rhadamanthys infection on the compromised endpoint.
Interestingly enough, according to the reports the malicious PowerShell scripts are believed to have been generated by LLM (a subset GenAI). Symantec actually observed a different campaign from the same actors in which they were using the same modus operandi (PS file also generated using LLM) but delivering CleanupLoader.
The deployed malware payload (Rhadamanthys) has various capabilities including collection and exfiltration of confidential user data such as credentials, cookies etc.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Ps-Enc!g1
ACM.Ps-Http!g2
ACM.Untrst-RunSys!g1
Behavior-based
SONAR.Stealer!gen2
SONAR.SuspStart!gen14
File-based
CL.Downloader!gen9
Trojan.Gen.MBT
Trojan.Gen.NPE
Web.Reputation.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.A!400
Heur.AdvML.A!500
Heur.AdvML.B!100
Heur.AdvML.B!200
Network-based
System Infected: Trojan.Backdoor Activity 796
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Rhadamanthys stealer via GoogleAds
It is common for hackers to use GoogleAds to spread phishing and malware attacks, but recently there have been several instances of this occurring that have gained media attention. One example of this involves a fake website for the software Notepad++ that was advertised through GoogleAds. If users download the fake installer from this website, they will unknowingly install an infostealer called Rhadamanthys on their device.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.2
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories |
Rhysida ransomware
Rhysida is a newly identified ransomware variant targeting Windows environments. The ransomware employs a multi-threaded encryption process, contains a hardcoded list of excluded extensions/directories and appends .rhysida extension to the encrypted files. Instead of a ransom note typically in the form of a .TXT file, Rhysida drops the ransom note in a .PDF format in each of the traversed directories. The malware also changes the desktop wallpaper on the compromised machine.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.Ransomware!g1
SONAR.Ransomware!g3
SONAR.Ransomware!g16
File-based
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A |
RIG Exploit Kit - Threat that won't go away
Exploit Kit campaigns have been less prevalent these days since the latest browsers like Chrome, Firefox and Edge are less exploited compared to Internet Explorer. Even though exploit kits have been on the decline, RIG exploit kit presents a recurring reminder that a decline does not mean an end. We have recently become aware of reports that a recent RIG Exploit Kit campaign has been leveraged to drop WastedLoader malware. Wastedloader is believed to be a new loader variant of the WastedLocker and the ransomware component might get subsequently downloaded from a command and control (C&C) server. This particular campaign exploited MS Internet Explorer CVE-2019-0752 and CVE-2018-8174 vulnerabilities. Symantec’s network protection technology, Intrusion Prevention System (IPS), blocks this exploitation attempt at the network level, thus preventing any further damage to the system.
Symantec protects you from this threat, identified by the following:
File-based
Downloader
Packed.Generic.459
Ransom.WastedLocker
Ransom.WastedLocker!gm
Trojan.Gen.2
Trojan Horse
Network-based
Malicious Site: Malicious Domain Request 21
Malicious Site: Malicious Domain Request 22
Web Attack: Microsoft Internet Explorer CVE-2019-0752
Web Attack: RIG Exploit Kit Website 3
Web Attack: RIG Exploit Kit Website 5
Web-based
Observed domains are covered under security categories |
Rilide Stealer leverages fake browser extensions for malicious activities
A recent malware variant identified as Rilide Stealer targets Chrome-based browsers. Rilide disguises as legitimate browser extensions to carry out malicious actions such as script injections, screenshot grabbing or theft of cryptocurrency from various exchanges. When the Rilide Loader is first deployed, it modifies browser shortcuts so that when the browser is launched, it additionally executes with a parameter pointing to the malicious extension that was earlier dropped on the compromised system. The Ekipa RAT and Aurora Stealer malware families have lately been used to spread Rilide Stealer.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
File-based
Trojan Horse
Trojan.Malscript
W97M.Downloader
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.B
Web-based
Observed domains/IPs are covered under security categories |
Rimasuta, a Mirai variant
Mirai is a well-known bot that has been plaguing Linux-operated devices and machines for years now. Campaigns of both old and new variants are being observed on a regular basis. For example, there have been reports of new activities related to an old variant that was first observed in 2021. Called Rimasuta, it leverages vulnerabilities to spread and turn devices into bots. Additionally, the actors behind this threat have started to use the ChaCha20 encryption algorithm for robust communication.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.NPE |
Rincrypt Ransomware
Rincrypt is one more run-of-the-mill ransomware variant recently observed on the threat landscape. When executed, it targets files with the specific extensions according to a pre-defined list. The malware appends the encrypted files with “.rincrypt” extension. Upon completed encryption process a ransom note file called "READ THIS.txt" is dropped onto the desktop of the infected machine. It contains an email address for the victims to contact for further instructions.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Untrst-RunSys!g1
Behavior-based
SONAR.Ransomware!g10
SONAR.TCP!gen6
File-based
Ransom.Gen
WS.Malware.1 |
Risen Ransomware
A ransomware actor known as "Risen" has been detected in the wild. According to their ransom note ($Risen_Note.txt and $risen_guide.hta), the threat actors appear to employ double-extortion tactics by threatening to sell or leak stolen information if the ransom payment is not made. Encrypted files will have an extension added to them, following this format: [actor's email address, TELEGRAM:actor's ID].random ID. Victims are provided with two email addresses, a Telegram ID, and a blog URL (hosted on the Tor network) as means of contact.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.C |
RisePro stealer persists in the threatscape
First observed in late 2022, the RisePro stealer continues to exhibit signs of activity and is still primarily delivered as malicious cracked software via Private loader. In July 2023, more command and control server panels have been observed. It's not a complex malware, and in terms of capabilities, a fairly run-of-the-mill stealer that aims to grab files and steal sensitive data from web browsers, credit cards, and cryptocurrency wallets using browser extensions, among other things. While consumers and small businesses seem to be the primary targets, medium and large-sized enterprises are still at risk from groups and individuals who may employ other infection vectors.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.2
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B!200
Heur.AdvML.B!100 |
RisePro stealer still active in the threatscape
First observed in late 2022, the RisePro stealer continues to exhibit signs of activity and is still primarily delivered as malicious cracked software via PrivateLoader. PrivateLoader allows threat actors to buy the capacity to download malicious payloads onto infected systems as a Pay-per-install service. In recent weeks a rise in command and control server activity has been observed. The stealer targets cookies, saved passwords, saved credit cards and crypto wallets using browser extensions, among other things. While consumers and small businesses seem to be the primary targets, medium and large-sized enterprises are still at risk from groups and individuals who may employ other infection vectors.
Symantec protects you from these threats, identified by the following:
File-based
Trojan.Gen.2
Trojan.Gen.MBT
Trojan Horse
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.A!400
Heur.AdvML.A!500
Heur.AdvML.B!100
Heur.AdvML.B!200 |
Roaming Mantis leverages Android malware in a recent Smishing campaign
According to a latest report, Roaming Mantis threat group has been targeting Japanese users with a malware dubbed as SmsSpy in a recent smishing campaign. Depending on the OS version of the targeted device, two distinct malware versions could have been distributed in the attack. Once the device has been compromised, SmsSpy will attempt to collect stored phone numbers as well as SMS messages from the device.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.2
Trojan.Gen.MBT
Mobile-based
AppRisk:Generisk
AdLibrary:Generisk
Web-based
Observed domains are covered under security categories
Symantec Endpoint Protection Mobile is able to also analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. |
RobinBot expands
RobinBot is another bot that's based on the infamous Mirai malware, and according to reports it's currently spreading on Linux based devices via known vulnerabilities. An early version of this malware was written in C but recent versions have been written in Java. Actors behind this botnet are capable of launching HTTP and OVH Flood attacks, DDoS attack against Roblox, and Bootstrap-based DDoS attacks from compromised devices.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.NPE |
Rogue - the Android RAT
We are aware of recent reports of the Rogue Android RAT. Rogue is a mobile Remote Access Trojan that is a compilation of components found as open-source and in the malware underground.
This mobile RAT offers a wide variety of features, including but not limited to:
Persistence through registration as a device administrator
Leverage Google Firebase services for C&C activity to masquerade as a legitimate service
Able to perform many RAT related functions such as getting SMS messages, delete/install/execute apps, record audio, collect device information, etc
Log and document user's actions by way of the Android accessibility service
Block or record incoming calls
Symantec provides the following detections for associated indicators. These encompass both endpoint and mobile products.
File-based
AdLibrary:Generisk
Android.Reputation.2
PUA.Gen.2
Trojan.Gen.2
Trojan.Gen.MBT |
RogueRaticate links found in PDFs delivered via email
Symantec recently observed RogueRaticate, a malicious 'browser update' threat first discovered in 2023, being delivered inside malicious PDF files. The messages encourage recipients to open the attached malicious PDF.
Observed subjects include:
Bill for Conference Sign-Up Costs
Client Presentation #28277
Client Presentation #718481
Data Analysis #8989
Feedback Request #2698
Invoice for Conference Registration Fees
Journey Expense Billing
Mockups for the Design #4617
Next Week Meeting Agenda #14873
Outline for the Proposal #425145
Presentation for the Client #47133
Project Updated Timeline #9233
Training Feedback #79655
Travel Cost Bill Submission
Travel Expense Invoice Submission
Upcoming Meeting Agenda #142354
Once opened, recipients are advised to follow a link that leads the users to download a URL file ultimately resulting in a RogueRaticate infection.
Symantec protects you from this threat, identified by the following:
File based
Scr.DLHeur!gen7
Network based
WS.SecurityRisk.4
Email based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers |
RokRAT malware spread through ISO and LNK files
A new campaign leveraging ISO and LNK file for the delivery of the RokRAT malware has been recently observed in the wild. The dropped LNK files when run trigger malicious Powershell script execution that leads to the payload download through Google Onedrive APIs. RokRAT is a Remote Access Trojan variant widely attributed to the APT37 (aka ScarCruft) threat group and known to abuse various public cloud storage services for C&C purposes. The malware's functionality allows the attackers for data collection from the compromised machines, keylogging and download/execution of additional arbitrary files.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.2
Trojan.Gen.NPE.C
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Network-based
System Infected: Trojan.Backdoor Activity 634 |
RomCom backdoor actively distributed by Void Rabisu APT
RomCom backdoor has been distributed in a recent campaign conducted by the threat actor known as Void Rabisu (aka Tropical Scorpius). The same actor has been responsible for Cuba ransomware distribution campaigns in August last year. RomCom RAT attack chain involves phishing emails, social engineering and third-party websites hosting malware executables disguised as software .msi installers for known applications such as ChatGPT, WinDirStat, AstraChat, GIMP, Veeam Backup and others. The attackers also abuse the Google Ads platform to promote their fake websites. RomCom has the functionality to run attackers' commands on the infected device, extract data, download and run additional payloads and others.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.MBT
WS.Reputation.1
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories |
ROMCOM RAT used alongside Cuba Ransomware
ROMCOM RAT is a custom trojan in active development, first seen earlier this year. The latest version of the RAT has been seen deployed with Cuba Ransomware by a, presumably, new threat actor. ROMCOM has the typical functionalities of a RAT: communication with C2, retrieve system information, delete files, take screenshots, download files, launch processes, etc.
Symantec protects you from this threat, identified by the following:
File-based
Exp.CVE-2020-1472
Hacktool
Ransom.Cuba
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Nvcertleak!g1
WS.Malware.1
WS.Malware.2
Behavior-based
SONAR.TCP!gen1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Web-based
Observed domains are covered under security categories |
RomCom RAT used in attacks against military targets in Ukraine
RomCom Remote Access Trojan (RAT) has been leveraged in recent attacks against military infrastructure targets in Ukraine. The malware has been attributed to the threat group known as Tropical Scorpius aka UNC2596. The same group has been responsible for Cuba ransomware distribution campaigns earlier in August this year. RomCom RAT attack chain involves phishing emails with embedded links to various third-party websites hosting malware executables disguises as software updates or installers.
Symantec protects you from this threat, identified by the following:
File-based
Hacktool
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Web-based
Observed domains/IPs are covered under security categories |
Rook Ransomware
A ransomware actor known as Rook has been increasingly active recently. While their prevalence is still relatively low in comparison to more infamous ransomware actors, they also employ the dreaded double extortion tactic which is becoming a staple of ransomware activities around the globe.
Symantec protects you from this threat, identified by the following:
Behavior-based
Sonar.SuspLaunch!g18
File-based
Downloader
Trojan.Gen.MBT |
Rook ransomware shows similarities to the Babuk variant
Recently discovered Rook ransomware has been reported to be based on the leaked source code of the Babuk ransomware. Rook is delivered via either phishing emails or campaigns leveraging CobaltStrike for payload delivery. Upon infection of the targeted system, Rook will attempt to terminate specific processes and services and to delete the volume shadow copies. The attackers behind the Rook also employ the double-extortion tactics - threatening to expose the data ex-filtrated from the victims if the ransom is not paid.
Symantec protects you from this threat, identified by the following:
File-based
Downloader
WS.Malware.1
WS.Malware.2
Behavior-based
SONAR.SuspLaunch!g18 |
Roshtyak - a heavily obfuscated malware
Roshtyak is a backdoor payload attributed to the Raspberry Robin threat group. The malware is heavily obfuscated and employs a number of distinct anti-sandbox and anti-VM techniques. One of the used evasion mechanisms relies on dropping fake payload if malware detects it resides on a VM or in a debugger environment. The fake payload observed belongs to BroAssist adware family and it's intended to lead the researchers into believing the investigated threat is not that interesting. Roshtyak's functionality includes ex-filtration of information about the victim as well as download of additional arbitrary payloads.
Symantec protects you from this threat, identified by the following:
File-based
Packed.Generic.553
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.B
Web-based
Observed domains/IPs are covered under security categories |
Royal ransomware variant emerges
A new ransomware family dubbed Royal has been observed in recent attacks targeting organizations. The threat actors behind Royal use callback phishing attacks for malware distribution. The attackers also leverage Cobalt Strike for execution of malicious actions in follow-up attack stages. The Royal ransomware encrypts files with a .royal file extension before dropping a README.TXT file directing victims to a Tor-based payment site. It has also been reported, that the ransomware may target virtual machines and encrypt their virtual disk files (VMDKs).
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.SuspLaunch!gen4
File-based
Ransom.Royal
Trojan Horse
WS.Malware.2 |
Royal remains one of the most prolific ransomware variants
Royal is a malware family that emerged in 2022 and to this day remains one of the most prolific ransomware variants. The threat group behind Royal targets various industry sectors including healthcare. Royal infection chain is known to leverage a wide set of techniques and tools including targeted callback phishing attacks, various loaders and open-source tools or additional payloads for the purpose of multistage attacks. Royal ransomware has the functionality to delete backups and volume shadow copies and the utilized file encryption process is multi-threaded. Latest 2023 Royal distribution campaigns have been reported to leverage Citrix vulnerability CVE-2022-27510 as the initial access point for the ransomware attacks.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.RansomRoyal!g1
SONAR.RansomRoyl!gen1
SONAR.SuspLaunch!gen4
File-based
Ransom.gen!g4
Ransom.Royal
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Network-based
Attack: Ransom.Gen Activity 47 |
Rummy smishing campaigns: cybercriminals target Indian gamblers
For centuries, gambling has been a part of many cultures, attracting people with the excitement and the potential for rewards. However, where there is money and especially money-addiction, crime often follows. Over the years gambling has fueled numerous cybercrime fraud, phishing, and malware campaigns.
An example of recent gambling-related activity observed by Symantec is a Rummy smishing campaign targeting Indians. Rummy is a popular card game in India, usually played with two to six players with the objective of forming sets and sequences of cards. The player who melds all their cards first wins the game.
If a user falls for the SMS message indicating a transaction of 98,305 Indian Rupees (equivalent to 1,191 US Dollars at the time of writing) to their Rummy account, they will be redirected to a fraudulent online credit card website and prompted to enter their name, phone number, and email address.
Symantec protects you from this threat, identified by the following:
Mobile-based
Symantec Endpoint Protection Mobile is able to also analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect.
Web-based
Observed domain is covered under security categories |
Russian and Mongolian IT companies targeted by threat actor group
We are aware of recent reports regarding activity attributed to the threat actor group known as TA428. The activity was found to be targeting government information technology agencies in Russia and Mongolia. The attacks consisted of multiple malware families, including Poison Ivy and PlugX, and also leveraged EternalBlue to facilitate lateral movement.
Symantec detects associated indicators as follows:
File-based
Backdoor.DoublePulsar
Backdoor.Korplug
Hacktool
Trojan Horse
Trojan.Dropper
Trojan.Mdropper
Network-based
OS Attack: Microsoft SMB MS17-010 Disclosure Attempt
OS Attack: Microsoft Windows SMB Remote Code Execution CVE-2017-0144 2 |
Russian APT group initiated spear-phishing campaign
A Russian APT group employed various themed spear-phishing campaigns (themes such as NASA, USAID etc.) to targeted Russian opposition entities. The victims were lured into opening a LNK file disguised as a PDF that executed a Powershell script belonging to an open-source project called HTTP-Shell. This tool enables upload/download file capabilities, C&C options, and ease of movement between directories.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
File-based
CL.Downloader!gen12
CL.Downloader!gen241
CL.Downloader!gen263
Scr.Malcode!gen
WS.Malware.1
WS.SecurityRisk.4
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
Russian legal document decoy hides SapphireStealer activity
A recently reported campaign was observed attempting to deliver SapphireStealer malware from a fake Russian government website. Upon execution of the downloaded payload, victims would be presented a decoy legal document while the stealer would perform activity in the background. Stolen data would then be exfiltrated to the attacker's command and control server.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Untrst-RunSys!g1
Behavior-based
SONAR.Stealer!gen1
SONAR.TCP!gen1
File-based
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
Machine learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Rust-based infostealing malware abuses Github Codespace for data ex-filtration
Infostealing malware identified as Deltastealer has been observed in some recent distribution campaigns in the wild. This Rust-based malware targets various user information such as browser data, banking details, cryptocurrency wallets, Discord tokens, etc. and ex-filtrates the collected data to GitHub Codespace webhooks controlled by the attackers. The infostealer variant distributed in the observed campaigns is very similar in functionality to another malware family known as PirateStealer - that also targets Discord data among other information and also has capabilities to extract stolen data to GitHub Codespace.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
File-based
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!200
Heur.AdvML.C
Network-based
System Infected: Trojan.Backdoor Activity 634
Web-based
Observed domains/IPs are covered under security categories |
RustDoor and GateDoor malware
RustDoor is a macOS malware and focuses on backdoor functionality, whereas GateDoor is a Windows malware that has loader functionality. Both malware have been distributed by encouraging victims to download utilities or updates through fake distribution sites posing as normal legit sites. Under the guise of normal installed program updates/utilities RustDoor and GateDoor will receive and execute commands from the C&C server to perform malicious actions. The commands supported per malware varies but there are infrastructure similarities that suggest a common attack developer. Combined actions include exfiltration of collected information, downloading additional files, and execution of commands.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Ps-Rd32!g1
ACM.Ps-Wscr!g1
File-based
OSX.Trojan.Gen
OSX.Trojan.Gen.2
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.B!100
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Rusty Droid RAT for Android
Rusty Droid is a new Android RAT (Remote Access Trojan) variant for the Android platform. The malware masquerades as a .APK installation package for Google Chrome application. The malware has various capabilities, including sending/receiving SMS messages, intercepting Gmail emails, reading contact lists, keylogging, initiating calls to premium-rate numbers and data injections. Rusty Droid abuses the Accessibility Service on the infected device to execute malicious actions. The collected data is ex-filtrated to the C2 servers controlled by the attackers.
Symantec protects you from this threat, identified by the following:
Mobile-based
Android.Reputation.1
Android.Reputation.2
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Ryuk ransomware recently rampant within healthcare industry
The Cybersecurity and Infrastructure Security Agency published a report regarding Ryuk Ransomware targeting entities in the Healthcare industry. Associated campaigns typically leverage an initial downloader component to deliver the Ryuk ransomware payload with financial gain as the intent.
Symantec provides the following protections based on some recent samples associated with Ryuk.
File-based
Backdoor.Trojan
Downloader
Downloader!gm
Heur.AdvML.B
Heur.AdvML.C
Packed.Generic.528
Packed.Generic.554
Packed.Generic.579
Ransom.Conti
Ransom.Hermes
Ransom.Hermes!gen2
Ransom.Lamer
Ransom.Ryuk
Ransom.Ryuk!gen2
Ransom.Ryuk!gen3
Ransom.Ryuk!gen4
Ransom.Wannacry
SMG.Heur!gen
Trojan Horse
Trojan.BazarLoad
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Maltrec.TS
Trojan.Trickybot!g16
Behavior-based
SONAR.Cryptlocker!g75
SONAR.RansomRyuk!gen1
SONAR.RansomRyuk!g3
SONAR.RansomRyuk!g5
SONAR.SuspLaunch!g18
Network-based
[Sig ID: 32641] Malicious Site: Malicious Domain Request 46
[Sig ID: 30660] System Infected: Trojan.Backdoor Domains 2
Email-based
Protection is in place for Symantec's email security products. Email Threat Isolation (ETI) technology from Symantec provides an extra layer of protection.
Web-based
Observed domains are covered under security categories |
Ryuk Ransomware variant with spreading capability
Security Response are aware of recent reports of a new Ryuk Ransomware variant which has built-in spreading capability. If it successfully infects a machine, it is then able to spread to other machines within the Windows domain using scheduled tasks.
Ryuk Ransomware (also known as Hermes) itself is not new and has been around for a while now. To deliver their Ransomware, the gang has been leveraging various malware in multiple stage attacks such as Emotet, Trickbot, Bazar and Buer loaders.
Symantec has the following coverage in place:
File-based
Ransom.Ryuk
Downloader
Heur.AdvML.B
Heur.AdvML.C
Trojan.Gen.MBT
Trojan.Gen.2
Trojan.Horse
WS.Malware.1
WS.Malware.2
Behavior-based
SONAR.SuspBeh!gen57 |
Sabbath Ransomware observed targeting health, education and infrastructure victims
Ransomware operator Sabbath has been linked to previous activity using the names UNC2190, Arcane and Eruption. Their affiliate model has been rebranded Sabbath and uses preconfigured Cobalt Strike BEACON backdoor payloads unchanged from previous attacks. The group targets health, education and other infrastructure companies in North America and were last seen publicly extorting victims in June 2021.
Symantec protects you from these threats, identified by the following:
File-based
Backdoor.Cobalt
Ransom.Wannacry
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT |
SafeRAT malware
SafeRAT is another Remote Access Trojan recently found active on the threat landscape. The malware can act as a clipboard stealer and a keylogger, can exfiltrate data from various browsers and messenger applications, collect information about the infected machine as well as run additional arbitrary plugins fetched from the remote C2 servers. According to the recent reports, SafeRAT is believed to be distributed by malspam containing malicious .bat attachments.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Ps-Rd32!g1
File-based
Trojan.Gen.MBT
WS.Malware.1
WS.Reputation.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.A!400
Heur.AdvML.A!500
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Heur.AdvML.C
Network-based
System Infected: Trojan.SafeRAT Activity
System Infected: Trojan.SafeRAT Activity 2
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Saint Bot ain't no saint
Another downloader joins the fray and don't think it's a saint just because it's been named so. Reports indicate that this malware, new in the threat landscape, has been seen delivered via malspam campaigns, ready to download and execute malicious payloads.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Horse |
SaintBot C2 observed
SaintBot first came to light in early 2021 and ever since, sporadic activity has been observed. Actors have leveraged this threat as a means to download other malware via malspam campaigns. Recently, a new command-and-control server associated with this bot has been spotted, hinting at a possible new campaign.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec's email security products
File-based
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B
Web-based
Observed domains/IPs are covered under security categories |
Salfram – email-based malware campaigns targeting businesses
There have been reports of a number of email-based malware campaigns using links to malicious documents that have been hosted on legitimate file-sharing platforms. The observed email runs have been targeting businesses with multiple payloads such as AveMaria, Gozi, SmokeLoader or ZLoader. While distributing various payloads, the observed campaigns had one shared characteristic - they all used the same crypter containing a specific string value "Salfram". The use of crypters to obfuscate the code and to make analysis more challenging is quite common among threat actors, but using the same crypter with a shared string value allowed the researchers to track those campaigns much more easily in this case.
Symantec protections
Downloader
Heur.AdvML.B
Heur.AdvML.C
SONAR.Infostealer!g2
Trojan.Gen.2
Trojan.Gen.MBT
Trojan Horse |
SapphireStealer malware
SapphireStealer is an open-source .NET-based infostealer malware seen increasingly used in the wild since it's public release around December 2022. The malware targets ex-filtration of various data including compromised host information, credentials stored in browsers, screenshots from the infected system as well as document and image files stored on disk that match predefined criteria. Some of the most recent campaigns distributing SapphireStealer have been leveraging malware called FUD-Loader for the purpose of payload delivery to its victims.
Symantec protects you from this threat, identified by the following:
File-based
Downloader
Infostealer.Eynice
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.2
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.A!300
Heur.AdvML.A!400
Heur.AdvML.A!500
Heur.AdvML.B
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
SARA used in the wild – Android Ransomware
There's been a recent increase of Android lockers that are primarily distributed via hacking forums and websites to unwary users looking for various hacks that run on Android. These lockers have all been generated using SARA, a tool that re-compiles old Android ransomware into customized fake mobile apps. This tool was recently posted on a well-known Internet hosting service for software development and version control which explains the increased activity – it's accessible to the public. Actors will request a ransom from the victim via the lock screen in exchange for the password.
Symantec protects you from this threat, identified by the following:
Mobile-based
AppRisk:Generisk
AdLibrary:Generisk |
Satacom malware spreading cryptocurrency infostealers
Satacom downloader aka LegionLoader has been recently observed in campaigns delivering cryptocurrency infostealers to the victims. The malware is initially spread via websites advertising free software downloads or cracked software installers. Satacom downloads multiple binaries to the infected machine, including PowerShell scripts that install malicious extensions for Chromium-based web browsers. The installed extensions utilize web injection techniques and allow the attackers to manipulate the content of the targeted websites with the purpose of cryptocurrency theft.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Web-based
Observed domains/IPs are covered under security categories |
Satori malware provides no enlightenment for Linux
Symantec Security Response is aware of a recent report of Satori activities. Named after the Japanese term for Buddhist enlightenment, Satori is a Linux malware and is a known variant of the Mirai botnet.
Symantec provides the following detection against this recent variant of Satori:
File-based
Linux.Satori |
SawRat observed using LNK files
A new Java-based RAT concealed within a ZIP archive has been observed in the wild. Named "Saw RAT" due to the use of a package called “saw.chain”, the ZIP contains an Adobe icon LNK file to tempt users to open what looks like a PDF file. When the LNK is clicked a JAR file is opened and run which can gather system information, upload files and execute other commands on the infected system.
Symantec protects you from this threat, identified by the following:
File-based
VBS.Dunihi!lnk
WS.SecurityRisk.4 |
Say No to Osno
There has been a report of an update to an infostealer previously known as Babax. The author behind the malware has changed its name to Osno and added a couple of new features including a rootkit and a Ransomware component. This last one is currently not working as a Ransomware per se but more like a wiper. Symantec has the following coverage in place for this threat:
File-based
Trojan.Gen.2
Heur.AdvML.C
WS.Malware.2
Website-based
This activity is proactively blocked by Symantec Web Isolation technology |
Scammers split Bitcoin wallet address (BTC) into two to extort money
In recent weeks, Symantec has observed a sudden rise in the volume of extortion scam emails. These emails make use of threatening language in order to extort money from the recipients. Scammers appear to have kicked off a new extortion scam campaign by making a few changes to their existing email templates. Recent emails threaten the recipient by describing their supposed misconduct on the Internet and asking them to pay money in order to safeguard their privacy (as if you could trust a scammer). Interestingly, as shown in Figure 1 below, the scammers split the bitcoin wallet address (BTC) into two parts and instruct the recipient to combine these two parts (and no spaces in between mind!) in order to make a payment. This technique is an attempt to bypass traditional anti-spam filters.
Figure 1: Extortion scam email threatening the recipient in order to extort money via a bitcoin wallet address (BTC).
Protection
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. |
ScanBox exploitation framework delivered in recent espionage campaign
ScanBox exploitation framework has been delivered in a recent espionage campaign conducted by the APT group known as TA423 or Red Ladon. Throughout the campaign the attackers have been leveraging spear phishing emails purporting to originate from various Australian media entities. ScanBox framework allows the attackers to conduct reconnaissance of the victim's network and for further delivery of additional payloads to selected targets. It has been reported that the campaign in question primarily targeted Australian Governmental agencies, Australian news media outlets and several heavy industry manufacturers conducting operations in the South China Sea region.
Symantec protects you from this threat, identified by the following:
File-based
Infostealer
Web-based
Observed IPs/domains are covered under security categories |
ScarCruft and Lazarus linked to Russian missile company's breach
Symantec is aware of reports of a cyber attack against a Russian missile engineering company, allegedly perpetrated by the North Korean actor ScarCruft. While not the sole actor involved in this cyber espionage campaign, they have discovered a backdoor known as "OpenCarrot," which has ties to Lazarus, another North Korean group.
As of the time of writing, the method of initial access remains uncertain. However, these groups are recognized for employing a diverse range of techniques to infiltrate victims' networks. These techniques encompass phishing emails, the exploitation of vulnerabilities in the company's software, and the utilization of stolen credentials.
Symantec protects you from this threat, identified by the following:
File-based
Backdoor.Trojan
Trojan Horse
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Network-based
System Infected: Trojan.Backdoor Activity 634
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
Scarlet stealer
Scarlet is yet another stealer that is actively being advertised, and binaries are showing up from tests as well as malicious activities. This threat does not differ much from other stealers as it's basically doing the same thing – going after computer information, web-browsers' sensitive data and crypto wallets (including Exodus, Electrum, Atomic, Guarda, Coinomi, Monero, Ledger, Bitbox and Trezor). It also reports and exfiltrate stolen data via a Telegram bot.
Groups and individuals who might buy this stealer will most likely be targeting consumers in hopes of snatching crypto wallets but enterprises may not be exempted as its other stealing features remain a critical threat.
Symantec protects you from this threat, identified by the following:
Behavior-based
ACM.Untrst-FlPst!g1
File-based
Infostealer
Machine Learning-based
Heur.AdvML.B!100
Network-based
Audit: Bad Reputation Application Activity
Audit: Untrusted Telegram API Connection
System Infected: Trojan.Backdoor Activity 641 |
Scarred Manticore leverages LIONTAIL framework
A new activity from the threat actor known as Scarred Manticore has been observed in the wild. The attackers leverage a malware framework called LIONTAIL to target various sectors including financial, governmental and telecommunications in the Middle East. LIONTAIL consists of a set of shellcode loaders and payloads including a C-based backdoor, that allows for remote command execution over HTTP. The Scarred Manticore threat actor is also known to use a wide range of custom web shells, DLL backdoors and implants in their attacks.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
File-based
Downloader
Hacktool.Ace
Hacktool.Proxy.A
Hacktool.Rootkit
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.A!400
Heur.AdvML.A!500
Heur.AdvML.B!100
Heur.AdvML.B!200
Heur.AdvML.C |
Schoolyard Bully after Facebook credentials
Light has been shed on "School yard bully", an Android malware whose primary goal is to snatch Facebook credentials. This threat has been active since at least 2017 and over the years multiple campaigns have been observed. The threat actor's modus operandi hasn't really changed much, generally disguising their malware as educational Android applications. These have been seen on Google Play and other third-party app stores and websites. Upon successful installation, the malicious app will prompt the victim to log into their Facebook account, stealing their credentials in the process.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk |
ScrubCrypt gains a cryptominer customer
While crypto clippers have increased, cryptomining is still prevalent and there have been reports of a cryptominer actor increasing their activities. In a recent campaign, they have started to use a Crypter known as ScrubCrypt in their attack chain, which in turn uses Bat packing. Crypters are commonly used by groups and individuals around the world, and there is no shortage of choices available. These are malicious software designed to evade detection by security software by encrypting the malicious code within the malware. BAT packing is a common technique used by Crypters. This technique involves compressing the malicious code into a small executable file and then packing and encrypting it using various encryption algorithms.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.maltraffic!gen1
SONAR.TCP!gen1
File-based
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Network-based
System Infected: Coinminer Activity 2
System Infected: Miner.Bitcoinminer Activity 16
System Infected: Trojan.Coinminer Activity 26
Web-based
Observed domains/IPs are covered under security categories |
Search ads serving up installers wrapped in malware
New malvertising (malicious advertising) campaigns have been detected distributing modified AnyDesk, Telegram, DropBox, and Zoom installers via Google ads when searching for keywords related to the programs. The installers download a powershell script in the background which has backdoor capabilities, including scraping content and executing additional commands.
Symantec protects you from these threats, identified by the following:
File-based
Trojan.Gen.MBT
Trojan Horse
Trojan.Gen.2
Network-based
Malicious Site: Malicious Domains Request
Malicious Site: Malicious Domain Request 21
Malicious Site: Malicious Domain Request 22
System Infected: Bad Reputation Process Request 6
System Infected: Trojan.Backdoor Domains 2
System Infected: Trojan.Backdoor Activity 606
Email-based
Protection is in place for Symantec's email security products. Email Threat Isolation (ETI) technology from Symantec provides an extra layer of protection.
Web-based
Observed domains are covered under security categories |
Search Marquis still a nuisance to MacOS users
Browser hijacking is an aging technique but Symantec continues to observe malware and adware that modify people's browser settings without their permission, redirecting them to websites they did not intend to visit. Search Marquis (also known as Search Baron and OfferDeal) is one of these which has been around for a few years now and continues to target MacOS users.
Symantec protects you from this threat, identified by the following:
File-based
OSX.OfferDeal |
SectopRAT packed with encrypted C&C controls
The Remote Access Trojan known as SectopRAT (also known as 1xxbot, ArechClient and Asatafar), active since 2019 continues to be seen in the threat landscape. SectopRAT is known to be delivered via Drive-by-Download technique. Actors behind the .NET compiled malware continue to enhance its features. Based on recent reports, SectopRAT comes packed in multiple layers to evade detection and capable of using encrypted Command-and-Control server communication in recent activities.
Symantec protects you from this threat, identified by the following:
File-based
Heur.AdvML.B
Heur.AdvML.C
Trojan.Gen.MBT
Trojan Horse
WS.Malware.1
WS.Malware.2 |
SecuriDropper mobile malware
SecuriDropper is a new mobile malware variant offered for sale in the form of a Dropper-as-a-Service (DaaS) model. The malware has functionality allowing it to bypass the "Restricted Settings" security feature introduced in Android 13 and responsible for setting certain restrictions on the privileges granted to sideloaded apps. Some of the latest campaigns leveraging SecuriDropper have been observed to deliver SpyNote RAT or the Ermac banking trojan as final payloads.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
Android.Reputation.2
AppRisk:Generisk |
Security researchers in Asia targeted using Internet Explorer 0-day
Symantec Security Response is aware of a report that a small number of security researchers in Asia were targeted by what's believed to be a state sponsored APT group. The adversary sent a MHT file which claims to contain a Chrome exploit to the researchers. Opening the file launches Internet Explorer and malicious JavaScript downloads two payloads, one of which contains code to exploit an unpatched Internet Explorer vulnerability.
Symantec provides protection against this attack as below. Additional coverage is currently being investigated.
File-based
Trojan.Malscript
Network-based
Malicious Site: Malicious Domains Request
System Infected: Trojan.Backdoor Domains 2
Web Attack: Exploit Website 10 |
Seedworm APT continues malicious activities in 2020
The Symantec Threat Hunting Team has uncovered a new wave of attacks by the Seedworm APT group targeting a wide range of government entities, telecoms and computer services organizations in the Middle East.
The following protections are in place against Seedworm activities:
File-based
Backdoor.Mori
Backdoor.Powemuddy
Downloader.Covic
Hacktool.Mimikatz
Heur.AdvML.C
Infostealer!im
Trojan Horse
Network-based
System Infected: Trojan.Backdoor Activity 243
More information is available at Seedworm: Iran-Linked Group Continues to Target Organizations in the Middle East |
Seedworm distributing remote administration management software agents
Seedworm(also known as MuddyWater), a threat actor targeting the EMEA region, has been identified in a spear-phishing campaign. The attackers distributed agents of Atera and ConnectWise ScreenConnect remote administration management software via PDF file attachments hosted on file hosting servers. Upon execution, these agents grant the threat actor remote access to compromised systems, allowing them to perform file operations.
Symantec protects you from this threat, identified by the following:
File-based
PUA.Gen.2
Trojan.Malmsi
WS.Malware.1
Network-based
Audit: Atera Client Activity
Audit: TLS v1 Request
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Seedworm exploits Atera Agent in a spear-phishing Campaign
Seedworm (also known as MuddyWater), is actively exploiting the legitimate remote monitoring and management (RMM) tool Atera Agent in its spear-phishing campaign. The actor leverages Atera's 30-day free trial offers to create agents registered with compromised email accounts, enabling remote access to targeted systems without establishing their own command-and-control (C2) infrastructure. Atera offers extensive remote control capabilities via its web UI, including file upload/download, interactive shell access, and AI-powered command assistance. The threat actor utilizes free file hosting platforms to host their RMM installers, distributing them via spear-phishing emails.
Symantec protects you from this threat, identified by the following:
File-based
PUA.Gen.2
Trojan.Malmsi
WS.Malware.1
Machine Learning-based
Heur.AdvML.C
Network-based
Audit: Atera Client Activity
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Self-Evaluation link from HR? Not so fast
Security researchers have recently reported on phishing messages impersonating HR departments sending updated employee handbooks or self-evaluation forms. The links contained in these messages lead to free web form hosting services designed to harvest credentials from well intentioned employees.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
SEO campaign leads to shady adult dating and porn domains
SEO poisoning attacks have made headlines in recent months, and more campaigns are being discovered. This type of attack vector involves manipulating search engine results to promote a malicious website or set of websites with the goal of infecting users' computers with malware, phishing out their credentials, or luring them into a fraud scheme.
Symantec recently observed an SEO poisoning campaign in which users were redirected to adult-themed domains (porn and dating) via benign domains that had open or vulnerable redirects. The URLs in the search engine results contain shady middlemen URLs (of which thousands have been discovered) in the query string. The term "shady" is often used to describe domains that appear suspicious or potentially harmful.
Symantec protects you from this threat, identified by the following:
Network-based
URL reputation: Browser navigation to known bad URL
Web-based
Observed sites are covered under security categories
WebPulse returns elevated Risk Levels for newly-appearing sites
Website content & telemetry rules will detect & categorize new URLs |
Serbian agri-food exporter spoofed to target in-country organizations
Symantec recently observed one of the largest agri-food exporters in Serbia being spoofed by a threat actor to target various organizations in the country. The malicious emails, written in Serbian (subject: Састанак за заказивање), have been crafted to appear as an invitation to set up a business appointment.
Attached to the email is a malicious .Z archive (Писмо састанка о именовању docx.z) – utilizing the Lempel-Ziv-Welch (LZW) compression algorithm. While this algorithm was commonly used in the past, it has been largely replaced by more efficient compression formats like .zip, .gzip, and .tar.gz. Nonetheless, Symantec continues to observe this type of archive being used by certain groups and individuals.
If users are successfully lured by this social engineering tactic and execute the malicious binary (Писмо састанка о именовању.docx.exe) within the archive, they'll end up running a NullSoft script-driven installer that will deploy a loader and an encrypted payload – Agent Tesla.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
Behavior-based
SONAR.ProcHijack!g21
SONAR.Stealer!gen1
File-based
Infostealer.Atesla
Machine Learning-based
Heur.AdvML.B!100 |
SeroXen RAT spread through a typosquatted NuGet package
SeroXen RAT is a malware variant first observed on the threat landscape back in 2022. The malware has since been advertised and sold online as a ready-to-use tool, easily available for implementation without any advanced know-how. SeroXen is believed to be partially based on the infamous Quasar RAT and once installed on the targeted host allows the attackers remote control and command execution. The most recently observed campaign spreading SeroXen RAT has been disguising the malicious binaries within typosquatted packages hosted on the NuGet package manager repository.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200 |
Serpent Stealer released
Serpent Stealer is a new and complex .NET-based malware. It is distributed via underground forums and can collect data from most web browsers, programs and gather some login credentials. Serpent Stealer has been seen using techniques to evade antivirus software and the test for the presence of malware tools such as debuggers and virtual machines and is able to bypass Windows User Account Control (UAC). It uses webhooks and Discord abuse to exfiltrate the collected information.
Symantec protects you from these threats, identified by the following:
Behavior-based
SONAR.TCP!gen1
Email-based
Coverage is in place for Symantec’s email security products.
File-based
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B!100
Heur.AdvML.B!200
Heur.AdvML.B
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Serverless Web Hosting services abused in recent phishing run
Symantec has observed that threat actors started to abuse a serverless Web hosting service to steal credentials in a recent phish run.
As shown in the Figure 1, email samples are themed as voicemail notification messages. The email template is kept short with limited content.
Figure 1: Email sample masqueraded as voicemail notification message.
As shown in Figure 2, on clicking the hyperlinked text in the email, the embedded URL opens a fake login page aimed to steal credentials. The phishing page is hosted by using a serverless Web hosting service.
Figure 2: Phishing page hosted on a serverless Web hosting service for credential harvesting.
Protection
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. |
ServHelper RAT distributed via latest TA505 campaigns
According to a recently released report, since June there has been a spike in ServHelper activities. This malware variant is commonly associated with the activities of the APT group known as TA505. ServHelper is now being distributed via various means in the latest campaigns. The attackers have also been leveraging other malware families such as Raccoon Stealer and Amadey Trojan to spread ServHelper.
Symantec protects you from this threat, identified by the following:
File-based
Heur.AdvML.B
Heur.AdvML.C
ISB.Downloader!gen412
Packed.Generic.616
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
Network-based
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories |
SessionManager IIS backdoor
SessionManager IIS backdoor has been used in various 2022 attack campaigns against governmental, military and industrial entities across the world. According to a recent report, SessionManager has been deployed to over 20 different organizations from the mentioned sectors. Due to the use of another malware variant known as OwlProxy, the attacks leveraging SessionManager have been attributed to the threat group named Gelsemium. SessionManager backdoor has functionalities to execute arbitrary binaries on the compromised hosts as well as connect to other compromised network endpoints.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.MBT
Trojan.Owprox
Trojan.Owprox!gen1
WS.Malware.1
Policy-based
Symantec DCS default hardening for Microsoft Exchange and Microsoft IIS provides zero day protection for ProxyLogon vulnerabilities, preventing installation of unauthorized backdoors such as the SessionManager IIS module. DCS sandboxing of Microsoft Exchange and IIS services prevents subsequent malicious actions by the SessionManager backdoor to tamper with critical system files, run arbitrary processes, or download malware tools for credential theft and data exfiltration. |
Several new ransomware variants use the leaked Conti source code
Several new ransomware variants based on the leaked Conti ransomware source code have been found in the wild. The spotted variants include: Putin ransomware, ScareCrow, Bluesky and Meow. While we have already seen some of the Bluesky samples back in August, the other mentioned ransomware families were discovered just recently. Some of their characteristics include:
ScareCrow encrypts users' files and appends .CROW extension to them. The ransom note asks the victim to contact the threat actors via Telegram.
Putin ransomware encrypts users' files and appends .PUTIN extension to them. The threat actors behind this variant also use Telegram to contact the victims. They also publish details of the victims on their telegram channel.
Meow encrypts users' files and appends .MEOW extension to them. Ransom note provides both email addresses and telegram handles to the threat actors.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.Ransomware!g1
SONAR.Ransomware!g7
SONAR.Ransomware!g12
File-based
Downloader
Ransom.Bluesky
Ransom.Conti!gm1
Ransom.Conti!gen4
Ransom.Conti!gen10
Ransom.Conti!gen12
Ransom.Generic.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200 |
ShadowPad: a sophisticated modular backdoor/malware platform
ShadowPad is the successor of the backdoor PlugX, but has since evolved into a modular malware platform using plugins. The basic modules still provides a backdoor functionality, along with other data retrieval capabilites through plugins from the C2 server. The tool keeps being updated with anti-detection and persistance techniques regurarly. A recent report suggests that the tool and the different plugins are tightly controled by the author, and is only privately shared or sold to threat actors, among them Chinese spionage groups.
Symantec protects you from this threat, identified by the following:
File-based
Backdoor.Shadowpad
Backdoor.Winnti
Trojan Horse
Trojan.Broler
Trojan.Gen.2
Trojan.Gen.MBT |
ShadowPad trojan used by Redfly group to target critical infrastructure
Symantec’s Threat Hunter Team has found evidence that a threat actor group Symantec calls Redfly used the ShadowPad trojan to compromise a national grid in an Asian country for as long as six months earlier this year. The attackers managed to steal credentials and compromise multiple computers on the organization’s network. Aside from the ShadowPad RAT, the attackers also leveraged a keylogger and a tool called PackerLoader, used to load and execute shellcode.
Read more in our blog: Redfly: Espionage Actors Continue to Target Critical Infrastructure
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.Pwdump!gen1
SONAR.Pwdump!gen5
SONAR.SuspStart!gen14
SONAR.TCP!gen6
File-based
Backdoor.Shadowpad
Spyware.Keylogger
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
Machine learning-based
Heur.AdvML.A
Heur.AdvML.B
Heur.AdvML.C
Network-based
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Shanova Ransomware
Shanova is a recent Chaos ransomware variant observed on the threat landscape. The malware encrypts user files and appends .shanova extension to them. Ransom note is dropped in the form of a text file called "read_it.txt" where the threat actors ask the victims to contact them via the provided email address for further instructions on how to decrypt the locked files. Shanova has the functionality to delete the volume shadow copies and backups from the infected machine.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.SuspBeh!gen625
SONAR.SuspLaunch!g22
SONAR.SuspLaunch!g266
File-based
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.A!400
Heur.AdvML.A!500
Heur.AdvML.B!100
Heur.AdvML.B!200 |
SharkBot, a banking malware from below
Another Android banking malware has surfaced in the mobile threat landscape. Dubbed SharkBot, it's not only using the classic overlay technique but also performing automatic transfer attack using the Accessibility Service. An ATS attack allows an actor to input data in fields of legitimate mobile banking apps and crypto currency wallets. According to recent reports, this malware has been targeting banks and cryptocurrency services in the UK, US and Italy.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk |
Sharkbot mobile malware returns with a new campaign
Sharkbot, first seen around October 2021, is a variant of a mobile banking trojan capable of financial fraud and stealing customers' sensitive information. A new variant 2.25 of the Sharkbot malware has been recently spread via malicious apps hosted on the Google Play Store. The malware masquerades as fake antivirus or phone cleaner apps. According to the reports, the latest Sharkbot variant comes with new functionalities allowing it to steal cookies from the compromised device.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
Android.Reputation.2
AppRisk:Generisk
Web-based
Observed IPs/domains are covered under security categories |
Sharpil RAT malware - possible precursor to Sharp Stealer
Sharpil is a new Remote Access Trojan (RAT) discovered in the threat landscape. This C#-based malware features basic infostealing functionality including system info collection and data gathering from various web browsers. Once on the infected machine Sharpil initiates connection to the attackers via a Telegram bot. Sharpil exhibits some code similarities with another recently identified malware variant called Sharp Stealer. This variant has been reported as being advertised for sale on Telegram, and it possesses some enhanced capabilities when compared to Sharpil RAT.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Untrst-RunSys!g1
Behavior-based
SONAR.MalTraffic!gen1
SONAR.Stealer!gen1
File-based
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.A!300
Heur.AdvML.A!400
Heur.AdvML.B!100
Heur.AdvML.B!200
Heur.AdvML.B
Network-based
Audit: Bad Reputation Application Activity
System Infected: Trojan.Backdoor Activity 568 |
SharpPanda APT group inflates its spear-phishing campaign
A new campaign by SharpPanda APT targeting government entities from G20 nations has been observed in the wild. The threat actor uses a spear-phishing campaign with a weaponized document customized to appear genuine to the recipient organization. The documents are weaponized using a tool called RoyalRoad which exploits vulnerabilities like CVE-2018-0802, CVE-2018-0798, and CVE-2017-11882 observed in Equation Editor of Microsoft Office. Opening the document sets off a chain of events through which attackers attempt to collect data from the victim. If the victim machine is determined to be of interest, the next phase of events continues, resulting in the execution of a loader that communicates with a C2 server and executes the backdoor.
The backdoor grants the ability to:
Capture screenshots
Gather victim machine information (i.e. process and service info, Win Version, registry keys etc...)
Control shutdown
Run read/write commands via cmd
Control file capability and attributes
Process creation/termination control
Symantec protects you from this threat, identified by the following:
File-based
Bloodhound.RTF.12
Trojan Horse
W97M.Downloader
Web-based
Observed domains/IPs are covered under security categories |
Shc malware leveraged for coinminer and DDoS bots distribution
A new campaign leveraging Shc Linux malware to deliver XMRig coinminers has been observed in the wild. Shc stands for Shell Script Compiler and relies on Bash shell scripts that can be converted into the .elf Linux executables. The malicious scripts delivered to the infected endpoints contain instructions for download of additional payloads from the C2 servers belonging to the attackers and their later execution. Aside of coinminer distribution, the same threat actors have been observed also to download some DDoS IRC bot binaries onto the infected endpoints.
Symantec protects you from this threat, identified by the following:
File-based
Linux.Coinminer
Trojan Horse
Trojan.Gen.NPE
WS.Malware.1
Web-based
Observed domains/IPs are covered under security categories |
ShellBot is a dangerous publicly available cryptocurrency miner
ShellBot is a publicly available cryptocurrency miner most commonly used to mine Monero. It uses ShellShock, Drupalgeddon and other exploits to attack poorly configured, internet facing devices through brute-force attacks guessing common passwords. It enables attackers to mount internet relay chat (IRC)-controlled botnets that can include endpoints, Linux servers, Android devices and Internet of Things devices.
Symantec protects you from this threat, identified by the following:
File-based
Perl.Pircbot
Website-based
This attack is proactively blocked by Symantec Web Isolation technology |
Shikitega - new malware targeting Linux devices
A new malware dubbed Shikitega has been reported to target Linux-based endpoints and IoT devices. The malware leverages known Linux vulnerabilities for privilege escalation and the XMRig coinminer payload execution. During the multistage infection chain, the malware downloads and runs a Metasploit meterpreter known as Mettle, that allows for a wide range of malicious activities to be performed on the infected host. For the purpose of C&C communication, Shikitega abuses legitimate cloud hosting services.
Symantec protects you from this threat, identified by the following:
File-based
Backdoor.Monev
Trojan.Gen.NPE
WS.Malware.1
WS.SecurityRisk.4
Web-based
Observed domains are covered under security categories |
ShinobuClipper
Clipping (also known as hijacking) crypto wallets is a technique that has gained in popularity over the last few years. Essentially a malware with this capability is able to replace victims' cryptocurrency wallet addresses with ones owned by the malware actor. There are many malware families with various complexity and additional stealing capabilities which adopted this technique, although we continue to see many threats that just clip. ShinobuClipper is one of these, in use by by multiple groups and individuals over the last few years now. Recent ShinobuClipper activities indicate that actors continue to favor the drive-by-download vector to lure victims, leveraging fake updates (e.g. Chrome updates) and blockchain-related tech/services as social social engineering tactics.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.SuspBeh!gen6
File-based
Trojan.Gen.MBT
Trojan Horse
Machine Learning-based
Heur.AdvML.B |
Shortcuts to TikTok fame could lead to malware
It's common knowledge that cyber criminals keep track of world news and trendy services in order to fuel their social engineering tricks and allow them to better lure victims. In 2020 TikTok's popularity dramatically increased globally and ever since Symantec has been observing recurrent malicious activities slipstreaming its success.
The most common activity relates to Remote Access Trojans (NJRAT, NanoCore, etc.) and infostealers purporting to be TikTok's hacktools to help gain followers and views, delivered via drive-by-download. This is a powerful trick as many TikTok users could be tempted by such shortcuts to reach a higher level of popularity and fame on this video-sharing social networking service. It's also well known that TikTok pays its users per views they've achieved on their videos.
Symantec protects you from these threats, identified by the following:
File-based
Backdoor.Ratenjay
Backdoor.Ratenjay!gen2
Backdoor.Ratenjay!gen3
Heur.AdvML.B
Trojan.Nancrat
Trojan.Nancrat!g1
Behavior-based
SONAR.Infostealer!g2
SONAR.Nancrat!gen1
SONAR.Nancrat!gen4
SONAR.Ratenjay!gen1
SONAR.Ratenjay!gen2
SONAR.SuspBeh!gen22 |
Shuckworm group continues campaign against Ukraine
The Shuckworm espionage group is continuing to mount multiple cyber attacks against Ukraine, with recent targets including security services, military, and government organizations. Shuckworm (aka Gamaredon, Armageddon) is a Russia-linked group that has almost exclusively focused its operations on Ukraine since it first appeared in 2014. Ukrainian officials have publicly stated that the group operates on behalf of the Russian Federal Security Service (FSB). Shuckworm is known to use phishing emails as an initial infection vector, then proceed to download additional backdoors and tools onto targeted machines.
Read more in our blog: Shuckworm: Inside Russia’s Relentless Cyber Campaign Against Ukraine
Symantec protects you from this threat, identified by the following:
File-based
CL.Downloader!gen12
Downloader
ISB.Downloader!gen281
ISB.Downloader!gen490
ISB.Heuristic!gen5
Scr.Malcode!gen
Trojan Horse
W97M.Downloader
Web-based
Observed domains/IPs are covered under security categories |
Shuriken Ransomware
Shuriken is a new ransomware variant observed in the wild. The malware appears to be a strain of the Blackbit (aka LokiLocker) ransomware family. It encrypts user data and appends .Shuriken extension to the files. Upon completed encryption a ransom note text file called "READ-ME-SHURKEWIN.txt" is dropped within the encrypted locations on the infected machine. The malware has the functionality to disable Windows firewall and to delete volume shadow copies as well as system backups on the infected endpoint, among others.
Symantec protects you from this threat, identified by the following:
Behavior-based
ACM.Ps-Schtsk!g1
ACM.Untrst-FlPst!g1
ACM.Wmic-DlShcp!g1
AGR.Terminate!g2
SONAR.RansomGen!gen3
SONAR.SuspBeh!gen93
SONAR.SuspBeh!gen752
File-based
Scr.Malcode!gen
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.B!100
Network-based
System Infected: Bad Reputation Process Request 4 |
Sideloading vulnerabilities in OneDrive exploited for cryptomining
According to a recent report, a new cryptojacking campaign exploiting known DLL sideloading vulnerabilities in Microsoft OneDrive has been discovered in the wild. The attackers leverage malicious secur32.dll binaries that are being dropped onto the targeted machines and later loaded by the legitimate OneDrive executable. Depending on the config file delivered in the specific campaign run, the discovered payload is either the Lolminer or the XMRig cryptocurrency miner.
Symantec protects you from this threat, identified by the following:
File-based
Scr.Malcode!gdn32
SMG.Heur!gen
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.B |
Signed backdoor found in screen mirroring software
A recent report identified a signed backdoor present in LaiXi Android screen mirroring software. According to the report, attackers abused the Microsoft Windows Hardware Compatibility Program to get the malware signed. The malware contains an embedded freeware proxy server, likely intended to watch and potentially manipulate network traffic.
There are no indications that the software vendor was the victim of a supply chain attack nor that they intentionally introduced the malicious code.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Untrst-RunSys!g1
Behavior-based
SONAR.TCP!gen1
File-based
PUA.Gen.2
Trojan Horse
Trojan.Certbypass
Trojan.Gen.MBT
WS.Malware.1
Machine learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!200
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Signed XLL File Delivers Buer Loader
Buer Loader is Malware-as-a-Service that has been around since 2019 and gained popularity when adopted by Ryuk threat actors. In recent spam campaigns social engineering is used to lure recipients to open a malicious Microsoft Excel attachment. When the recipient opens the file a macro is triggered which attempts to connect to a predefined server to download the Bauer Loader malware. The primary difference in this campaign is that the XLL file used is signed with a valid digital signature in an effort to evade detection.
Symantec protects you from this threat, identified by the following:
File-based
Heur.AdvML.B
Heur.AdvML.C
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
WS.Malware.2
Email-based
Protection is in place for Symantec's email security products. Email Threat Isolation (ETI) technology from Symantec provides an extra layer of protection.
Website-based
Observed Domains are covered under security categories |
SilentCryptoMiner as fake chrome updates in drive-by-download campaigns
SilentCryptoMiner, as the name suggests, is a cryptocurrency miner that's able to silently mine various currencies such as Etherium, Monero, Raptoreum, etc. It usually goes along with a web panel known as Unam which facilitates controls and commands of SilentCryptoMiner running on victim machines. Both SilentCryptoMiner and Unam are publicly available on a well-known Internet hosting platform for software development and version control which grants access to both legitimate and illegal use. Over the last few weeks, Symantec has observed an actor trying to compromise machines via drive-by-download by disguising the coin miner as Chrome updates as well as game hacks.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.MBT
Trojan Horse
Web-based
Observed domains are covered under security categories |
SilverRAT malware
SilverRAT, a remote access trojan variant discovered in the wild, has recently seen the distribution of its cracked builder through hacking forums and Telegram channels. Written in C# and targeting the Windows platform, SilverRAT possesses capabilities such as keylogging, theft of browser data, cookies, files, and credentials. Additionally, the malware enables attackers to initiate hidden remote sessions on infected systems.
Symantec protects you from this threat, identified by the following:
Behavior-based
ACM.Ps-CPE!g2
ACM.Mshta-Masq!g1
ACM.Ps-RLsass!g1
SONAR.SuspStart!gen14
SONAR.TCP!gen1
File-based
CL.Suspexec!gen135
Backdoor.Silverrat
Backdoor.Silverrat!g1
SMG.Heur!gen
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.A!400
Heur.AdvML.A!500
Heur.AdvML.B!100
Heur.AdvML.B!200 |
Silver Sparrow targets Apple's M1
Security researchers recently identified a new OSX malware with downloading capabilities. Dubbed Silver Sparrow, it uses JavaScript for execution and is compiled for Apple’s new M1 ARM64 architecture.
Symantec has the following coverage in place:
File-based
OSX.Trojan.Gen
OSX.Trojan.Gen.2 |
SkidMap preys on Redis
According to recent reports, a new SkidMap variant is actively targeting vulnerable Redis servers, which are open-source, in-memory data structure stores. This Linux threat has been active since at least 2019. Actors behind this recent activity are still going for persistence and cryptomining. When an open Redis server is discovered, they will deploy a malicious shell that functions as a dropper for a malicious GIF or JPEG. This payload will subsequently load a rootkit and a cryptocurrency miner.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.NPE
Trojan Horse |
SkinnyBoy with an appetite for malware trouble
SkinnyBoy is a new malware being used by Russian hacking group APT28 (aka PwnStorm, Fancy Bear, Sofacy, Sednit, or Strontium). The malware is delivered via a spear phishing campaign leveraging Word documents laced with macros that extract a downloader malware to the victim machine. Skinnyboy's purpose is to gather and extract vital component/system information from the compromised machine to a C2 server and then to retrieve the final payload from said server.
Symantec protects you from this threat, identified by the following:
File-based
Heur.AdvML.B
Heur.AdvML.C
Trojan Horse
Trojan.Gen.2
WS.Malware.2
Network-based
URL reputation: Browser navigation to known bad URL
Web-based
Observed IP/Domains are covered under security categories |
Skuld infostealer
Skuld is a recently discovered Golang-based info-stealing malware variant. Skuld targets extraction of system information, victim's confidential files, cryptocurrencies, Discord tokens, data stored in various web browsers, etc. The malware has the capability to perform various checks for presence of debugging or virtualized environments before execution. The ex-filtration of the stolen data is possible either through Discord webhooks or via upload of compressed files to Gofile storage service.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
File-based
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories |
SkullLocker Ransomware
Another ransomware actor, this one known as SkullLocker (a chaos variant) has been observed in the threat landscape. Files that are successfully encrypted following a compromise are appended with a .skull extension. The ransom note left on affected machines is written in Polish, advising victims to contact the perpetrators and pay within 72 hours. It is uncertain whether these actors employ the dreaded double extortion tactic, but they do not mention any sale or leak of victims' encrypted data in their ransom note.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.SuspDrop!gen1
File-based
Ransom.Sorry
Machine Learning-based
Heur.AdvML.B |
Sload Downloader targets victims in Europe
Sload malware serves as a downloader leading usually to Trickbot, Ramnit or other banking trojan payloads. According to a recently released report, Sload has been actively targeting victims in Europe this year. The distribution campaigns leverage LNK files, VBS, Powershell and WSF scripts in order to run the Sload downloader.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
VBS.Downloader.Trojan
WS.Malware.1
WS.Malware.2
Web-based
Observed domains are covered under security categories |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.