text
stringlengths 0
383k
|
---|
SlothfulMedia RAT is no slouch
Recent online reports indicate that a new SlothfulMedia Remote Access Trojan (RAT) was used to target several Asian and Eastern European countries. Some suggest this malware is a cyber arsenal used by APT group known as Iamtheking and PowerPool. The RAT is capable of performing actions typical of RATs: running commands, killing processes, invoking a remote shell, adding and deleting registry values, taking screen shots and interacting with the file system.
Symantec detects SlothfulMedia RAT as the following:
File-based protection
Trojan.Gen.2 |
Smaller gangs scavenge for new tools
Smaller gangs often lack the resources and/or technical knowledge to expand their capabilities and rely on scavenging parts of other ransomware families into their own operations. In one such instance the gang known for deploying the 'Delta' ransomware have expanded their capabilities by implementing parts of Babuk and Chaos ransomware from recent leaks of their source code. This allows them to increase their reach and their payouts.
Symantec protects you from this threat, identified by the following:
File-based
Ransom.Babuk
Ransom.Cryptolocker
Trojan.Gen.2
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Network-based
Attack: Ransom.AvosLocker Activity 2
Attack: Ransom.Gen Activity 29
Attack: Ransom.Gen Activity 41
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories |
SMAUG Ransomware as a Service
A recent Ransomware as a Service known as "SMAUG" reportedly entered the cybercrime market in April 2020 and is known to offer easy-to-use services to both cyber criminals and victims. The ransomware is written in GO, and can run on Windows, Linux and MacOS.
Some key features of SMAUG RaaS:
Fully customizable
Includes “Company Mode”, which allows for a single key to decrypt all the encrypted files in the affected organization
Allow attackers to set a ransom price, deadline and ransom message
Can execute and encrypt without internet connectivity
Has a fully automated payment system
Employs a friendly User Interface (UI) for attackers
Uses a friendly ransom payment walk-through
Symantec protection
Ransom.Cryptolocker |
SMBC phishing campaign targets Japanese enterprises and consumers
SMBC (Sumitomo Mitsui Banking Corporation) is a major bank in Japan, making it a prime target for recurrent phishing scams. Symantec has recently identified an email phishing campaign (subject: 【三井住友】カード株式会社からの緊急のご連絡) where cybercriminals impersonate SMBC and use fake login websites that resemble SMBC Vpass to steal users' financial information. This campaign can have severe consequences for both individual customers and businesses. Some examples of these phishing websites are:
sqrmnwae[.]cf
glutfgua[.]ga
vmkikuxe[.]ga
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
Web-based
Observed domains/IPs are covered under security categories |
Smishing attempts impersonating Australia's Postal service on the rise
Smishing attacks targeting Australians consumers and enterprise users is not new and in fact very much recurrent. In July, Symantec detected numerous newly registered domains that engaged in typosquatting, mimicking Australian postal service. These domains were found to be involved in malicious SMS campaigns. Below are a few examples of the malicious SMS messages seen being distributed.
Delivery unsuccessful. Update your parcel information at hxxps://post[.]service-center[.]cc for a successful delivery. We value your cooperation.
Please update your parcel information at hxxps://post[.]case-center[.]cc after the failed delivery attempt[.] Thank you for your prompt action and understanding.
Update your parcel information at hxxps://post[.]admess[.]cc as the delivery attempt was unsuccessful. Please ensure accurate details for a successful delivery.
We regret to inform you that the delivery attempt was unsuccessful. To proceed with the delivery, update your parcel information at hxxps://post[.]case-center[.]cc
Due to a failed delivery attempt, we kindly request you to update your parcel information at hxxps://post[.]pack-handle[.]cc for successful delivery.
Postal services are often used as a social engineering lure in both email and SMS phishing because they are familiar and trusted entities. Messages related to postal services create a sense of urgency or concern, making recipients more likely to act quickly without verifying the message's legitimacy. By impersonating postal services, attackers can request personal information under the guise of package tracking or delivery issues which often lead to identify theft and financial loss.
Symantec protects you from this threat, identified by the following:
Mobile-based
Symantec Endpoint Protection Mobile is able to analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake Australia Post domains used in this campaign are known to WebPulse.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
Smishing campaign delivers TianySpy to Japanese mobile users
Japan has recently been the target of a smishing campaign delivering a mobile threat known as TianySpy. As per reports, the malicious SMS purports to be from a known mobile carrier. If a mobile user is successfully tricked, they'll be redirected to a fake website then prompted to download TianySpy, disguised as a configuration and security application. This malware's main function is to display fake websites in an attempt to steal users' credentials.
Symantec protects you from this threat, identified by the following:
Mobile-based
Android.Reputation.2
AppRisk:Generisk
Symantec Endpoint Protection Mobile is able to also analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake DHL domains used in this campaign are known to WebPulse. |
Smishing campaign in India leads to phishing and spyware
Banking users in India have been the target of a smishing campaign that leads to phishing and spyware. Actors sent out malicious SMS which include a link to a fake State Bank of India website, in an attempt to phish their bank information. If victims are successfully lured by the phishing website, they'll also be prompted to install an Android spyware disguised as an SBI Android support application.
Symantec protects you from this threat, identified by the following:
Mobile-based
AppRisk:Generisk
Symantec Endpoint Protection Mobile is able to also analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake DHL domains used in this campaign are known to WebPulse. |
Smishing campaign targeting Coinbase users
As cryptocurrency continues to become more mainstream, Symantec observes a steady increase in related phishing campaigns in both the email and the mobile landscape.
This bulletin covers an ongoing campaign that aims to snatch US-based mobile Coinbase users' credentials. Coinbase is one of the most popular cryptocurrency exchanges in the world.
The Short Message Service (SMS) is attempting to lure victims with a fictitious unclaimed bonus, and a malicious URL to claim it is provided. If a user clicks on that URL, they'll end up at a fake Coinbase login page that only appears when accessed from a mobile web browser.
Observed malicious SMS:
Coinbase - You have an unclaimed bonus of $60 on your account. To claim it, visit our website below: hxxps[:]//id38-coinbase[.]com/connect
Symantec protects you from this threat, identified by the following:
Mobile-based
Symantec Endpoint Protection Mobile is able to analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake Coinbase domain used in this campaign is known to WebPulse.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
Smishing Campaign: Truist Bank Mobile Users Targeted
Around the world, people are accustomed to phishing attacks targeting users of major banks, but we must not forget that regional banks are also continuously targeted. For example, users of Truist— which primarily operates in the Southeastern and Mid-Atlantic regions of the United States—have been receiving malicious SMS messages indicating that their account has been placed on hold, and advising them to follow the provided URL to verify. Unsuspecting users would be lured to a fake Truist website tuned for phishing.
Observed SMS:
Truist-Alert^sca5v.zw69:For your protection we have placed a hold on your account.visit hxxps[:]//cebabh[.]edu[.]pe/truist/ to verify.
Symantec protects you from this threat, identified by the following:
Mobile-based
Symantec Endpoint Protection Mobile is able to analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake Truist website used in this campaign is known to WebPulse.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
SmokeLoader continues targeting Ukrainian entities
SmokeLoader is a well known malware variant that connects to attackers' controlled C2 servers in order to download additional modules or malware payloads according to received commands. This malware is distributed mostly through phishing campaigns. In recently observed campaigns it has continued to target governmental and public institutions in Ukraine as well as companies from the medical, construction and manufacturing sector.
Symantec protects you from this threat, identified by the following:
Behavior-based
ACM.Untrst-RunSys!g1
SONAR.ProcHijack!g45
File-based
Trojan.Gen.9
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Network-based
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
SMSThief mobile malware goes after banking customers
SMSThief Android malware has been reported to target Indian banking customers in a recent wave of attacks. The malicious .apk package is spread via phishing URLs and masqueraded as an HDFC Bank application to redeem reward points or vouchers. The malware ex-filtrates credit card information and users' personal details including phone numbers and email addresses.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
Android.Reputation.2
Web-based
Observed domains/IPs are covered under security categories |
SmugX campaign comes with the use of HTML Smuggling techniques
SmugX is a newly discovered malicious campaign targeted at embassies and foreign affairs ministries in Europe. The campaign shows a certain degree of overlap with previous activities attributed to Mustang Panda and Red Delta threat groups. SmugX leverages HTML Smuggling techniques to hide the malicious payloads inside of HTML documents. Further down the infections chain, the attackers also make use of JavaScript, .msi files and sideloaded .dll files. The final payload in the campaign is the PlugX malware which is a well known Remote Access Trojan (RAT) used by various APT groups since at least 2008.
Symantec protects you from this threat, identified by the following:
File-based
Backdoor.Roboform
JS.Downloader
Trojan Horse
Trojan.Gen.MBT
Trojan.Malscript
WS.Malware.2
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.B
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Snake Keylogger among the most prevalent Infostealers
Snake Keylogger is a type of info-stealing malware that appeared on the landscape back in November 2020. According to a recently released report, there has been a spike in Snake infections seen since August 2021. The malware is usually spread via malicious phishing campaigns and capable of credential theft from over 50 different applications. The staging mechanisms of the recent Snake samples are almost identical to those known from two other very popular infostealers - Formbook and Agent Tesla
Symantec protects you from this threat, identified by the following:
File-based
Scr.Malcode!gdn30
Trojan Horse
Trojan.Gen.MBT
Trojan.SnakeKeylogger
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C |
Snake Keylogger Campaign against Thai businesses
While the cyber threat landscape in Thailand is not often mentioned by the media, it remains fairly active, with groups and individuals around the world targeting its consumers and organizations on a daily basis. In a recent example, Symantec observed a Snake Keylogger malspam campaign in which an actor is attempting to compromise both local and international companies with offices in Thailand, using a classic "quote" social engineering tactic.
Malicious emails (subject: ขอใบเสนอราคา) contain a .ace archive (รายละเอียด.ace) and within it, a Snake Keylogger binary (รายละเอียด.exe) disguised as a fake document describing the fictitious quote. In this campaign, the perpetrators are impersonating two Thai companies in the engineering, procurement and construction industry (TTCL) and the food packaging industry (Vexcel Pack).
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
Behavior-based
SONAR.Stealer!gen1
File-based
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B!100 |
Snake Keylogger Malspam Uptick
Perhaps not as prevalent as other infostealers, Snake Keylogger still does have its space in the threatscape and we recently observed an increased in activity. Multiple malspam campaigns have been seen these past few weeks delivering this infostealer. Symantec has the following coverage in place:
File-based
Heur.AdvML.B
Heur.AdvML.C
WS.Malware.1
WS.Malware.2
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. |
SnakeKeylogger: Slithering in Europe and the Middle-East disguised as the AMFR
SnakeKeylogger is well-known in the cybersecurity community and is heavily used around the world by multiple groups and individuals. Symantec has observed a new campaign that started on November 17th, in which the actors are impersonating the Association of Medical Physicists of Russia (AMPR) targeting various industries in Europe and the Middle East. The emails (subject: Договор) contain a malicious archive (Contract.bz) and within that, the SnakeLogger binary (Contract.exe) is disguised as a contract. While it's a simple infostealer, if a user is successfully lured the impact may range from financial and identity theft to data breaches.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
Behavior-based
SONAR.Stealer!gen1
File-based
Scr.Malcode!gdn32
Machine Learning-based
Heur.AdvML.B |
Snake Keylogger uptick
Since it was first spotted back in 2020, Snake Keylogger's prevalence has fluctuated but it continues to be among most used infostealer in today's landscape. In the recent weeks we've observed a slight uptick as groups and individuals conduct malspam campaigns. When it comes to these campaigns, most of the time generic quote, payment, SWIFT and shipping social engineering tactics are employed, often the attached binary being disguised as a PDF file.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
File-based
Msil.Packed.20
Scr.Malcode!gdn30
Scr.Malcode!gdn34
Trojan.Gen.2
Machine Learning-based
Heur.AdvML.B |
Snatch ransomware activity continues
Snatch is a ransomware family seen on the threat landscape since at least 2019. The malware remains active in the wild to this day with new variants emerging regularly. The threat groups behind Snatch are known to leverage double-extortion tactics by not only encrypting user data but also by stealing it and threatening with public release if the ransom demands are not met. The malware appends random extensions to the encrypted files. Some examples of extensions used by most recently discovered variants of this ransomware include: .hgjzitlxe, .tcvjuo, .tnwkgbvl, .qxtfkslrf, .zuioseft.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.Ransomware!g1
SONAR.Ransomware!g3
SONAR.Ransomware!g7
SONAR.Ransomware!g28
File-based
Downloader
Ransom.Snatch
Ransom.Snatch!g1
Ransom.Snatch!g2
Ransom.Snatch!gm
Trojan.Gen.2
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.C |
Snatch ransomware remains a significant threat
Symantec Security Response is aware of the recent CISA and FBI alert regarding a number of targeted activities observed for the Snatch ransomware. Snatch is a ransomware family seen on the threat landscape since at least 2019. According to the released report, the threat groups behind Snatch have been actively targeting critical infrastructure sectors including the Defense Industrial Base (DIB), Food and Agriculture, and Information Technology sectors in their campaigns involving both data exfiltration and double extortion. The threat actors have been leveraging brute forcing of RDP connections but also illegally obtained compromised credentials for initial access to the victims’ network. The Snatch ransomware appends random extensions to the encrypted files and drops a ransom note in form of a "HOW TO RESTORE YOUR FILES.TXT" file.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.RansomSnatch!g1
File-based
Downloader
Ransom.Snatch
Trojan.Gen.MBT
Trojan.Malscript
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!500
Heur.AdvML.C
Network-based
Malicious Site: Malicious Domains Request |
Snip3 - a new RAT loader in the form of "Crypter-as-a-Service"
New reports emerged about a RAT loader dubbed as Snip3, that's been advertised and sold in the form of a "Crypter-as-a-Service" offering. According to the released reports, this crypter is usually delivered via phishing emails and it implements a variety of detection bypass techniques. The observed campaigns leveraging Snip3 have been delivering RevengeRAT, AsyncRAT and Agent Tesla among others.
Symantec protects you from this threat, identified by the following:
File-based
CL.Downloader!gen96
CL.Downloader!gen116
ISB.Downloader!gen80
Trojan.Gen.2
Trojan.Gen.NPE
Trojan Horse
Trojan.Revetrat
W97M.Downloader
VBS.Downloader.Trojan
Web-based
Observed domains are covered under security categories |
SnowLight downloader spread in campaigns exploiting F5 BIG-IP and ScreenConnect vulnerabilities
Recent malicious campaigns attributed to the UNC5174 threat group have been reported to exploit F5 BIG-IP (CVE-2023-46747) and Connectwise ScreenConnect (CVE-2024-1709) vulnerabilities for malware delivery. One malware variant, SnowLight, is a C-based downloader for Linux, used by the threat actors to download and execute secondary payloads on the infected machines. GoreVerse, GoHeavy and SuperShell are payload variants distributed by UNC5174 in the reported campaigns.
Symantec protects you from this threat, identified by the following:
File-based
Backdoor.Trojan
Trojan Horse
Network-based
Attack: F5 BIG-IP RCE CVE-2023-46747
Web Attack: ConnectWise ScreenConnect CVE-2024-1708
Web Attack: ConnectWise ScreenConnect CVE-2024-1709
Policy-based
DCS default hardening policy for Windows servers will prevent arbitrary command and powershell execution and prevent tampering of critical Windows OS files and folders
DCS network rules in the policy can be configured to limit ScreenConnect applications to trusted clients
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
SocGholish (aka FakeUpdates) dropping Raspberry Robin
Our researchers observed a recent SocGholish campaign, a malware that typically hides behind a fake software update. Unsuspecting victims may have either received an email that lead them to the compromised website, or the user was perhaps actively looking for a software update and unfortunately found themselves at one of the fake sites. The websites are injected with a malicious JavaScript that if executed will download another file with a .WSF extension. This .WSF files contains a JavaScript file (this one highly obfuscated and accompanied by a range of anti-sandbox and anti-analysis functions) which eventually lead to Raspberry Robin, a USB-based worm that acts as a loader for further malware.
SocGholish performs the following eligibility checks to verify if the infection routine should continue:
If the sample is running in a Desktop folder, quit
If the Windows build is lower than build number 17063 (Windows 10 Build 17063), quit
If the machine's processor matches with a list of products, quit
If the machine's MAC address matches a list of MAC prefixes, quit
If running processes match a specified list of processes, quit
If the script runs without an argument, relaunch another instance with a random argument, then quit
If the malware's eligibility checks all pass, it will delete itself and set path exclusions to bypass Windows Defender, following which it will make an attempt to launch curl.exe and download the payload from a dedicated remote server.
The final payload appears with a single word as its filename and .dll as its extension. It will then be launched with the use of 'msiexec.exe -z'.
Despite these concerted attempts to circumvent analysis and detection, our heuristic engine blocks SocGholish without the need for an update.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Ps-Wscr!g1
File-based
Scr.Malcode!gen53
Network-based
34049_Audit: Scripting Host Processes Making Network Connections
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
SocGholish framework leveraged to distribute the NetSupport RAT
According to a latest report, SocGholish malware framework has been leveraged in a recent campaign distributing the NetSupport Remote Access Trojan (RAT). Distribution through SocGholish relies on social engineering via compromised websites containing injected malicious HTML code. The injected code redirects the users to fake browser update pages from where compressed archives containing malicious scripts are downloaded and later executed on the victim's machine. This attack chain leads in the end to the NetSupport RAT payload download.
Symantec protects you from this threat, identified by the following:
File-based
ISB.Downloader!gen542
Trojan Horse
WS.Malware.2
WS.SecurityRisk.4
Web-based
Observed domains/IPs are covered under security categories |
Socks5Systemz proxy botnet
A new proxy botnet, dubbed Socks5Systemz, has been discovered in the wild. This botnet was observed being delivered by two popular loaders, PrivateLoader and Amadey.
The threat actor behind the botnet has developed a comprehensive proxy service that allows users to subscribe, manage existing subscriptions, and access the current list of available proxies. Additionally, they are involved in selling compromised accounts and proxy access.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
File-based
Scr.Malcode!gdn32
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Network-based
System Infected: Trojan.Backdoor Activity 558
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled product |
Sodinokibi adds Linux to its resume
Security researchers have recently discovered a new Sodinokibi (aka REvil) ransomware encryptor that targets Linux servers. This new encryptor looks for VMWare ESXi servers and issues a stop command in order to encrypt the entire virtual disk.
Symantec protects you from this threat, identified by the following:
File-based
Linux.Sodinokibi |
SolarMarker backdoor bundled in modified PDF application installer
A new variant of the backdoor dubbed SolarMarker was discovered bundled in a trojanized PDF application installer. This malware infects a victim under the guise of a legitimate PDF application installer for PDFescape. It makes use of a malicious PowerShell script and performs basic backdoor functionality like file uploads, downloads, and execution.
Symantec protects you from this threat, identified by the following:
File-based
ISB.Heuristic!gen5
Trojan Horse
Trojan.Gen.MBT
Network-based
URL reputation: Browser navigation to known bad URL
Web-based
Observed domains are covered under security categories |
SolarMarker malware campaign adapts with PyInstaller for obfuscation
A SolarMarker malware campaign has been observed utilizing PyInstaller to obfuscate first-stage PowerShell scripts instead of Inno Setup and PS2EXE, showcasing the adaptability of threat actors in evading detection mechanisms targeting SolarMarker. SolarMarker is typically spread through attacks involving Search Engine Optimization Poisoning (SEO-Poisoning). In this observed campaign, users were tempted to download a disguised PDF document from a website impersonating a reputed South Californian Medical University.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.MBT
WS.Malware.1
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
SolidBit, a LockBit's copycat
SolidBit is a variant of Yashma (a.k.a. Chaos) ransomware, and although the builder of the latter was already leaked on underground forums, SolidBit does not use the leaked code as is. SolidBit includes some changes and additions, one of which is the support of chat, likely something they took from LockBit seeing as the chat interface is a lookalike of LockBit's.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
WS.Malware.2
Behavior-based
SONAR.Cryptlck!g114
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C |
Sombrat backdoor and Fivehands ransomware deployed in campaigns exploiting Sonicwall vulnerabilities
According to a recent report, a threat group dubbed as UNC2447 has been deploying Sombrat backdoor and Fivehands ransomware in a series of campaigns run in the last few months. The group leveraged CVE-2021-20016 Sonicwall VPN vulnerability in order to breach the targeted networks and spread the malware. Fivehands ransomware has been first discovered in February, and it shows certain similarities to the earlier ransomware variants known as Deathransom and HelloKitty.
Symantec protects you from these threats, identified by the following:
File-based
Backdoor.Rozena
Heur.AdvML.B
Heur.AdvML.C
Packed.Generic.528
Ransom.CryptoTorLocker
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
Trojan Horse
Network-based
System Infected: Trojan.Backdoor Activity 235
System Infected: Trojan.Backdoor Activity 570
System Infected: Trojan.Mdropper Activity 10
Web-based
Observed domains are covered under security categories |
Somnia ransomware aims to disrupt Ukrainian organizations
Recently, Ukrainian organizations have been the target of a ransomware attack conducted by Russian hacktivists. These actors have used ransomware called Somnia which they spread via an access broker which in turn infected victims via Vidar stealer and other tools such as Cobalt Strike. The stealer was disguised as a fake Advanced IP Scanner (a well known network scanning tool) hosted on a fake website. This ransomware group is not asking for a ransom, all they want is to disrupt the organizations.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
SONAR.Ransomware!g34
File-based
Ransom.Crysis
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Network-based
System Infected: Trojan.Backdoor Activity 634
Web-based
Observed domains/IPs are covered under security categories |
Sophisticated Feb 2020 watering hole attack retrospective
In early 2020, Google observed a sophisticated operation in which a watering hole technique was used as a stepping stone to deploy a chain of exploits against both Windows and Android devices. In a series of six blogs published recently, they detail the multiple vulnerabilities and exploits that were used. Among the Chrome, Android and Windows exploits, the following four were 0-days at the time of the attack (note they were all patched in spring 2020):
CVE-2020-6418: Chrome Vulnerability in TurboFan
CVE-2020-0938: Font Vulnerability on Windows
CVE-2020-1020: Font Vulnerability on Windows
CVE-2020-1027: Windows CSRSS Vulnerability
Symantec has the following coverage in place:
File-based
ISB.CVE-2020-6418!gen1
Exp.CVE-2020-0938
Exp.CVE-2020-1027
Network-based
Web Attack: Google Chrome CVE-2020-6418
Web Attack: Microsoft Windows OpenType Fonts CVE-2020-0938 Download
Web Attack: Microsoft Windows OpenType Fonts CVE-2020-1020 Download
Mobile-based
SEP Mobile provides protection against Android related vulnerabilities identified in this operation. |
"Sophos" Named Ransomware
Researchers recently discovered a new ransomware abusing a legitimate software company name - Sophos. Encrypted files will also be renamed with the extension ".sophos".
Aside from common ransomware capabilities such as encrypting of files and dropping of ransom notes, this "Sophos" ransomware also contains some RAT functionalities, including hooking the keyboard driver for keystroke logging and profiling the system using WMI commands. In addition, the ransomware can also check the victim's machine language settings, and won't run if it's in Russian.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.2
WS.Malware.2
Machine Learning-based
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
SoumniBot - Android banking malware
SoumniBot is a new banking malware variant for Android. This malware has been reported to target mobile users from Korea. SoumniBot leverages several techniques to evade detection such as invalid compression method value, invalid manifest size or long XML namespace names. Functionality-wise this android malware can collect information about the infected device, contact data, SMS/MMS messages, and exfiltrate digital certificates issued by Korean banks that are stored on the device.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
Android.Reputation.2
AppRisk:Generisk
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
South African fintechs Ozow and PayFast impersonated in smishing campaign
Mobile banking in South Africa has been on the rise and gaining popularity among the population. It has played a crucial role in promoting financial inclusion in the country, as many individuals who may not have had access to traditional banking services now have the ability to use mobile banking to conduct financial transactions. However, the rise of mobile banking has also attracted cybercriminals who seek to exploit potential vulnerabilities for their gain.
Recently, Symantec has observed a number of SMS phishing (also known as smishing) attempts impersonating Ozow and PayFast, prominent South African fintech companies that provide online payment solutions. These messages include short URLs to malicious websites mimicking the fintechs, prompting users to select their bank and then reveal sensitive information. This can lead to identity theft, financial loss, and potentially further scams.
Observed malicious SMS examples (as is - including typos):
Ozow Payment. Confirm incoming deposit. Please click this hxxps://dik[.]si/Wepay0zownow to approve deposit to your credit/cheque account from SARS retuns.
Ozow Payment. Confirm your deposit. Please visit https hxxps://shp[.]zone/ljiE to complete deposit to your credit/cheque account; 26/07/2023.
PayFast:A payment has been sent to your Debit/Credit card vai SARS. Tap LINK hxxps://dik[.]si/Payfastnow02 to recieve payment into your Account, T&C's Apply.
Symantec protects you from this threat, identified by the following:
Mobile-based
Symantec Endpoint Protection Mobile is able to analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake domains used in this campaign are known to WebPulse.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
Southeast Asian Government Entity, a target for Stately Taurus APT
A cyberespionage attack against government institutions in Southeast Asia facilitated by an APT group 'Stately Taurus' (aka Mustang Panda) has been in operation since 2021 and similar campaigns are still being observed to date.
Identical to other APT groups, web shell and backdoor files are initially deployed to maintain access to the victim's machine, followed by various tools and techniques allowing attackers to gather and steal sensitive information from compromised networks.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen6
File-based
Hacktool
Hacktool.Mimikatz
Hacktool.Mimikatz!g4
Scr.Malcode!gdn32
Trojan.Gen.MBT
Trojan.Gen.2
Trojan Horse
WS.Malware.1
WS.Malware.2
WS.SecurityRisk.1
WS.SecurityRisk.4
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Heur.AdvML.C
Heur.AdvML.M
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
Southeast Asian government institution targeted by Gelsemium APT
An infection chain operated by an APT group dubbed Gelsemium was spotted by security researchers while administering an investigation into a compromised server for a certain government entity located in Southeast Asia.
The attackers initially installed AspxSpy, China Chopper and reGeorg web shells in order to establish persistent access over the compromised server to allow the group to launch additional attacks. OwlProxy and SessionManager were the main backdoors subsequently utilized, with the objective of gathering intelligence from sensitive IIS servers.
Symantec protects you from this threat, identified by the following:
File-based
Hacktool
Hacktool.Ace
Trojan.Gen.MBT
Trojan.Gen.NPE
Trojan.Gen.2
Trojan Horse
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.B
Heur.AdvML.C
Heur.AdvML.B!100
Heur.AdvML.B!200
Heur.AdvML.A!300
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
South Korean financial industry hit by new Android Fakebank
South Korea's financial industry and their customers continue to be targeted by Android malware known as Fakebank. This threat has been around for a few years now but Symantec has recently observed an uptick in this malware, purporting to be legitimate Android applications of well known South Korean finance companies.
Fakebank malware is able to collect banking SMS, record phone calls to banks, display a fake bank login UI and intercept Android users’ banking-related incoming and outgoing calls.
Symantec Endpoint Protection Mobile has the following coverage in place:
Mobile-based
Android.Fakebank |
SOVA, an Android Banking Trojan
Back in September 2021, threat actors behind SOVA claimed that the software was still in its development phase. Now, with a newer version disguised as a fake Android application and masqueraded logos based on some popular apps like Chrome, Amazon and NFT, the threat actors are back, targeting mainly banking applications and crypto exchanges/wallets.
Some improvements observed with the current version:
Refactored and improved cookie-stealer mechanism
Allows the malware to protect itself by intercepting and deflecting attempts made by victims to uninstall the app
Attackers can control the specific targets via the command-and- control (C2) interface
Allow attackers to grab screenshots, and to record and execute commands
VNC (Virtual Network Computing) capability
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.MBT
Mobile-based
Android.Reputation.2
Web-based
Observed IPs/domains are covered under security categories |
Spacecolon toolset leveraged for Scarab ransomware delivery
Spacecolon is a malicious toolset leveraged to deliver Scarab ransomware variant is some recent campaigns attributed to the threat operator dubbed as CosmicBeetle. The toolset consists of three different modules (installer, hacktool and a service module) and allows the attackers to execute arbitrary commands on the infected systems as well as download and execute additional malicious payloads. CosmicBeetle threat actor has also been reported to use a wide variety of other tools including red-team tools in their attacks.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.SuspBeh!gen625
File-based
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Spam campaign uses tax theme to target Mexican users with TimbreStealer malware
A new stealer malware was identified as the payload of a financially engineering spam campaign. This campaign targeted only users in Mexico and lured victims to download the payload by way of a tax related theme. The final payload has been identified as TimbreStealer, a sophisticated stealer leveraging multiple embedded modules to perform its tasks.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen6
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
File-based
Packed.Generic.739
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
Network-based
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Spanish consumers and small businesses hit by Ransomware
While ransomware groups gain all the attention due to their impacts on organizations of all sizes around the world, there are still plenty of lesser ransomware actors that crawl the threatscape. For example, a ransomware that bears no name for now has been observed to have encrypted single machines of both Spanish speaking consumers and small businesses. Post-encryption, files are appended with a random 4 character extension and a short ransom note asking for relatively modest 20 US Dollars in Bitcoin. There are no indications of a double-extortion scheme.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.SuspDrop!gen1
File-based
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B |
Spanish digital bank users in SpyNote's crosshairs
While monitoring the threat landscape, Symantec came across Android remote access trojan activity targeting mobile users in Spain. The group or individual behind this activity has been attempting to lure users of a known Spanish digital bank with a fake security app ([bank's name] security.apk) – mimicking existing ones that allow users to securely access their bank accounts, approve transactions, and manage their security settings.
If a user is successfully tricked into installing the malicious app, they'll end up being compromised with SpyNote, a notorious remote access trojan that's being used by multiple actors around the world.
Symantec protects you from this threat, identified by the following:
Mobile-based
Android.Reputation.1 |
Spanish organizations targeted in GuLoader malware campaign
Malware loaders are a common tactic for cybercriminals to deliver and execute malware on a victim's computer, in the hope of evading detection by security software. Some groups and individuals specialize in loaders and provide their services to others. There are countless loaders in the threat landscape, GuLoader being one that is frequently observed in campaigns around the world.
Symantec recently identified a campaign which targets organizations in Spain with malicious billing emails that appear to be from a Spanish construction company. If a victim falls for the social engineering tactic and downloads the malicious binary in the attached archive (PAGO SIXTO.rar) they will end up executing GuLoader.
Over the years, this sophisticated malware loader has been used to deliver various types of malware. Just some of the malware families that have been delivered by Guloader include Formbook, Lokibot, Agent Tesla and SystemBC.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
File-based
Trojan.Guloader
Machine Learning-based
Heur.AdvML.C |
Specter, Linux RAT
There have been reports of a Linux Remote Access Trojan called Specter doing the rounds, targeting vulnerable IP Camera / NVR / DVR devices of a certain maker. Symantec has protection in place for this malware as below:
File-based
Trojan Horse |
SpectralBlur, new macOS backdoor
BlueNoroff, also known as TA444, remains active and continues to introduce new MacOS malware families. In a recent campaign, the threat actor has been reported distributing a MacOS backdoor dubbed SpectralBlur.
The SpectralBlur malware backdoor incorporates typical features such as file upload and download, file deletion, shell execution, and configuration updates. These actions are executed through commands from a remote command-and-control (C2) server. One distinctive feature of SpectralBlur is its use of pseudo-terminals for remotely executing shell commands, a technique not observed before. SpectralBlur shares similarities with KandyKorn (aka SockRacket), an advanced implant functioning as a remote access trojan capable of taking control of compromised hosts.
Symantec protects you from this threat, identified by the following:
File-based
OSX.Trojan.Gen |
SpectralViper backdoor
SpectralViper backdoor has been observed in recent campaigns targeting Vietnamese organizations. The backdoor is heavily obfuscated and has functionality for arbitrary file upload/download, command execution and file/directory and token manipulation, among others. The latest campaigns distributing SpectralViper have also been leveraging additional loaders and PowerShell malware throughout the infection chain. DonutLoader, P8Loader and PowerSeal belong to the malware variants used here.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
File-based
Trojan Horse
WS.Malware.1
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.B
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories |
Spike of activity observed for the GuLoader malware
During the last week Symantec observed a spike of activity attributed to the GuLoader malware family. GuLoader is an advanced shellcode-based downloader which aims at delivering a wide range of malware variants including ransomware, infostealers, banking trojans, RATs and Proxies, among others. GuLoader mainly spreads via email spam campaigns leveraging various themes. The final payload might also vary as GuLoader is known to deliver different malware variants including Formbook, Agent Tesla, NanoCore and others.
MITRE TTPs known to be used by GuLoader actors include the following:
Credentials from Password Stores: Windows Credential Manager [T1555.004]
Credentials from Password Stores: Credentials from Web Browsers [T1555.003]
Unsecured Credentials: Credentials In Files [T1552.001]
Ingress Tool Transfer [T1105]
Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder [T1547.001]
Exfiltration Over C2 Channel [T1041]
Browser Bookmark Discovery [T1217]
Forge Web Credentials: Web Cookies [T1606.001]
Hide Artifacts: NTFS File Attributes [T1564.004]
Command and Scripting Interpreter [T1059]
Command and Scripting Interpreter: PowerShell [T1059.001]
Process Injection: Process Hollowing [T1055.012]
Boot or Logon Autostart Execution: Winlogon Helper DLL [T1547.004]
Boot or Logon Autostart Execution: Active Setup [T1547.014]
Application Layer Protocol [T1071]
Symantec protects you from this threat, identified by the following:
Behavior-based
ACM.Wscr-Ps!g1
ACM.Wscr-RgPst!g1
SONAR.Powershell!g74
SONAR.SuspBeh!gen82
SONAR.SuspStart!gen2
SONAR.SuspStart!gen6
SONAR.TCP!gen1
EDR-based
Symantec EDR is capable of monitoring and flagging this threat actor's tactics, techniques and procedures.
Symantec added malware specific threat hunting queries which can be fired on the customer iCDM console. For more information on these queries, refer to this GitHub repository: https://github.com/Symantec/threathunters/tree/main/Trojan/GuLoader
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
File-based
Packed.NSISPacker!g14
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Heur.AdvML.C
Network-based
System Infected: Trojan.Backdoor Activity 758
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Splunk Remote Code Execution (RCE) vulnerability CVE-2023-46214
CVE-2023-46214 is a recently disclosed remote code execution (RCE) vulnerability affecting Splunk Enterprise platform. Due to a flaw in processing of user-supplied extensible stylesheet language transformations (XSLT), remote attackers might be able to upload malicious XSLT resulting in remote code execution on the affected Splunk instance. The exploit code for the vulnerability has been released publicly and the users are recommended to upgrade to Splunk versions 9.0.7 and 9.1.2 or greater to fix this issue.
Symantec protects you from this threat, identified by the following:
Network-based
Web Attack: Splunk RCE CVE-2023-46214 |
Spoofed Adobe Creative Cloud email notifications appear in phish runs
Adobe Creative Cloud provides a collection of applications for graphic design, video editing, web development, photography and more. Lately, Symantec has observed phishing runs that impersonate Adobe Creative Cloud and entice users to open fake notifications emails. The email body content is kept short and mentions a pending document stored in the cloud. These phish emails make an attempt to lure users to open and click on phish URLs. Upon clicking on the phish URLs presented in the email content, the victims are served with credential harvesting webpages.
Email headers:
Subject: You have receieved a document through AdobePDF
Subject: You Received a New Document
From: AdobePDF<redacted_email_address>
From: Adobe <redacted_email_address>
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Spoofed Amazon Prime email notifications appear in phish runs
Amazon Prime, a paid subscription service from Amazon, provides members with various benefits. Recently, Symantec has observed phishing attempts mimicking Amazon Prime, enticing users to open fake notification emails. Contents of the emails vary from "membership renewal" or "account benefits put on hold" to warnings about account security. These fraudulent emails aim to trick users into clicking on phishing URLs.
Email Subject: Your Prime membership is Renewing on
Email From: "Prime" <spoofed_email_address>
Upon clicking on the phish URLs presented in the email content, the victims are served with credential harvesting webpages.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Spoofed HM Revenue & Customs email notifications appear in phish runs
HM Revenue & Customs (HMRC) is United Kingdom's (UK) tax and customs authority that collects taxes such as income tax, corporation tax and capital gain tax. Recently, Symantec has observed phishing attempts mimicking HMRC, enticing users to open fake notification emails. The email mentions that the user profile is not updated. The user needs to update the profile and if not done, the profile will be deleted from HMRC. These fraudulent emails aim to trick users into clicking on phishing URLs. Upon clicking on the phish URLs presented in the email content, the victims are served with credential harvesting webpages.
Email Subject: Action Needed: Important Government Gateway Online Account Verification
Email From: Government Gateway <spoofed_email_address>
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Spoofed Tele2 refund email notifications appear in phish runs
Tele2 is a well-known mobile network provider founded in year 1993 and is headquartered in Stockholm, Sweden. Lately, Symantec has observed phish runs that impersonate Tele2 and entice users to open fake refund notification emails. These phish emails make an attempt to lure users to open and click on phish URLs.
Email Subject: Bekräfta din återbetalning från Tele2
Translated Email Subject: Confirm your refund from Tele2
Upon clicking on the phish URLs presented in the email content, the victims are served with credential harvesting webpages.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Spook ransomware - another spin-off from Thanos
Spook ransomware is a malware variant first observed around September 2021. There are several indicators and code similarities pointing to links between Spook and earlier ransomware variant called Prometheus, which in turn is an evolution from the Thanos ransomware. Attackers behind Spook target various industries and threaten to release victim's details if ransom demands are not met.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.2
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C |
Spooky MirCop Ransomware
MirCop is an old ransomware with recent variants showing a new spooky zombie-themed twist. The infection starts via a new phishing campaign that suggests communication was lost for a previous arrangement regarding an order supply list. This lure is used to get the victim into clicking the Google Drive URL, which does a download of an MHT file onto the victim's machine. When the MHT file is opened, it does a download of a RAR archive containing an EXE file, which uses VBS scripts to drop and execute the MirCop payload. The ransomware immediately changes the background to a a zombie-themed image and locks files.
Symantec protects you from these threats, identified by the following:
Behavior-based
SONAR.SuspDataRun
File-based
PasswordRevealer
Trojan Horse
Trojan.Gen.NPE
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.C
Web-based
Observed domains are covered under security categories |
Spotify users targeted with phishing emails
Spotify is a digital music service providing users instant access to its digital library of songs and podcasts. Recently, Symantec has observed a new wave of phishing emails spoofing Spotify services with fake payment notifications. The email content calls out a "payment failure" issue and entices the user to review and update payment details by clicking on a phishing URL ready to steal credentials.
Email Subject: We can't process your payment
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
Springtail APT group abuses valid certificate of known Korean public entity
The Springtail (also known as Kimsuky) APT group has been observed distributing dropper malware disguised as an application from a known Korean public entity. Once compromised, the dropper installs an Endoor backdoor malware. This threat enables attackers to collect sensitive information from the victim or install additional malware.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Untrst-RunSys!g1
ACM.Ps-Schtsk!g1
Behavior-based
SONAR.SuspLaunch!g266
SONAR.SuspLaunch!g13
File-based
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
SprySOCKS, a new Linux backdoor used by Chinese espionage-focused threat actor
SprySOCKS is the new Linux backdoor used by a Chinese threat actors targeting government agencies in multiple countries. This backdoor is based on a Windows open source malware (Trochilus), ported to Linux, with influences from other malwares like RedLeaves and Derusbi. The threat actor is most recently targeting public facing servers with known vulnerabilities for their initial access and installing Cobalt Strike and subsequent tools, like the SprySOCKS backdoor.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.NPE
Linux.Mirai
WS.Malware.1
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Spyder Loader malware observed in recent campaigns
Symantec has observed a likely continuation of the Operation CuckooBees, this time targeting organizations in Hong Kong. The victims observed in the activity were government organizations, with the attackers remaining active on some networks for as long as a year. While we did not see the ultimate payload in this campaign, based on the previous activity seen alongside the Spyder Loader malware being deployed onto the victims machines, it seems likely the ultimate goal of this activity was intelligence gathering.
Read more in our blog: Spyder Loader Malware Seen in Recent Campaign Targeting Organizations in Hong Kong
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Spyload
WS.Malware.1 |
SpyNote campaign: Brazil's agriculture industry targeted
Symantec has observed an actor who has been impersonating AgroPart, a service which provides a spare parts catalogue for the agricultural industry, to target Brazilian farmers.
They have disguised their SpyNote malware (Agro-Partes.apk) as the AgroPart mobile app in the hope of luring users into installing it. This threat has been around for a few years now, with its source code available to the public and constantly used by multiple groups and individuals around the world.
Below are some of its main collection capabilities:
Keystrokes
Device information
Contacts
Call logs and SMS messages
Photos and videos
Information about installed apps
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk |
SpyNote campaign using Vietnam's National Public Service as bait
SpyNote remote access trojan and its variants are proliferating globally, with groups and individuals employing various social engineering tactics to target mobile users. In a recent campaign, Symantec observed the threat (DỊCH VỤ CÔNG.apk) masquerading as an official app from Vietnam's National Public Service web platform, which offers extensive online public services for both citizens and businesses.
This specific campaign has not only been active in Vietnam but also observed in other countries such as Canada and Poland. At this time, it's still unclear how this malicious app is being distributed.
SpyNote allows bad actors to remotely control infected Android devices, enabling them to access and steal sensitive data, monitor user activities, and even activate hardware such as cameras and microphones without the user's knowledge.
Symantec protects you from this threat, identified by the following:
Mobile-based
Android.Reputation.1 |
SpyNote malware continues to target banking customers
SpyNote mobile malware family has been seen increasingly targeting banking customers around the end of 2022. The malware's functionality includes data collection and credentials theft from the compromised devices, keylogging, Google Authenticator codes extraction and calls/camera recording, among others. The latest SpyNote.C variant is even advertised and sold via the Telegram channel under the name CypherRAT, as it boasts some additional RAT capabilities.
Symantec protects you from this threat, identified by the following:
Mobile-based
Android.Reputation.1
Android.Reputation.2
AppRisk:Generisk
Web-based
Observed domains/IPs are covered under security categories |
SpyNote Preying on UNHCR Supporters in Yemen
In late 2023, Symantec observed an actor targeting Arabic speaking mobile users in Yemen who were willing to provide assistance to UNHCR, a United Nations agency that offers protection and aid to refugees, asylum seekers, stateless individuals, and internally displaced people. The agency's work is funded by voluntary contributions from governments, individuals, and businesses, and plays a crucial role in Yemen, a country facing a complex humanitarian crisis due to ongoing conflict and displacement.
The malicious app was disguised as an application (دليل_تقديم_الدعم_من_المفوضية_السامية .apk) that provides information on how to support UNHCR. Users who might be tricked into installing this app, will in fact end up deploying an Android spyware known as SpyNote on their mobile devices.
Symantec protects you from this threat, identified by the following:
Mobile-based
Android.Reputation.1 |
SpyNote Spyware Targeting Banking Sectors
SpyNote Android spyware has been making the rounds since 2016 and another campaign was recently spotted by threat researchers. The attack was direct and focused on bank sectors from the European region, being delivered via smishing (SMS phishing). Victims are asked to download and install a “new certified banking app” before a subsequent message provides directions for users to launch a TeamViewer instance, which in reality is the initial step to allow access to the victim's device.
SpyNote's list of capabilities:
Keylogger
SMS Collection & 2FA Bypass
C2 Communications
Screen Recording and Defense Evasion
Symantec protects you from this threat, identified by the following:
File-based
WS.Malware.1
Mobile-based
Android.Reputation.2
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Squid Game-Themed Threats
It is no surprise that threat actors have once again hopped aboard the latest craze, this time capitalizing on the immensely popular Korean survival drama series 'Squid Game'. Opportunities are widespread and various Squid Game-themed malware and scam subjects have been observed. They include trojanized mobile applications, adware, fake streams, and even phishy offers of Halloween costumes.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.MBT
Mobile-based
AdLibrary:Generisk
Android.Reputation.2 |
Squirrelwaffle loader emerges in the wild
We are aware of recent reports calling out the new emerging loader malware dubbed as SquirrelWaffle. It has been reported that the loader is being delivered via infrastructure associated previously with a known Qakbot affiliate named "TR". SquirrelWaffle is spread via malspam campaigns with embedded URLs. The links point to .zip archives containing Word documents with malicious VBA macros. SquirrelWaffle payload delivered by the current campaign has been reported as CobaltStrike.
Symantec protects you from this threat, identified by the following:
File-based
ISB.Downloader!gen430
ISB.Dropper!gen15
Heur.AdvML.B
Heur.AdvML.C
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
W97M.Downloader
Network-based
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains are covered under security categories |
SquirrelWaffle loader used to deliver Qakbot and Cobalt Strike payloads
SquirrelWaffle loader malware first emerged in September 2021. According to the latest report, SquirrelWaffle remains active in the wild and is being leveraged to download Qakbot or Cobalt Strike payloads. The malware is known to be delivered via malspam campaigns containing malicious .doc or .xls attachments.
Symantec protects you from this threat, identified by the following:
File-based
ISB.Downloader!gen430
ISB.Dropper!gen15
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
Trojan.Mdropper
W97M.Downloader
Machine Learning-based
Heur.AdvML.B
Network-based
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories |
Srry Stealer spreading via malicious JavaScript
SrryStealer is a newly identified info stealer that covertly infiltrates a victim's system through a malicious JavaScript file. Upon execution, it attempts to terminate a list of targeted processes, including those associated with browsers and Discord. Subsequently, it proceeds to harvest a wide range of data, including system information and personal saved data such as login credentials, browser history, autofill passwords, credit card details, cryptocurrency wallets, and Discord tokens. The gathered data is then exfiltrated to the threat actor's command-and-control (C2) servers.
Symantec protects you from this threat, identified by the following:
File-based
Infostealer
Trojan Horse
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.A!400
Network-based
29565_Web Attack: Webpulse Bad Reputation Domain Request
Policy-based
Symantec Data Center Security (DCS) provides Multi-layered protection from this Infostealer.
Suspicious Process Execution: Prevention policies prevent malware from being dropped or executed on the system.
Network Control: Prevention policies block outgoing connections to public internet ( mythic-slender[.]online) in this case.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
SSLoad and Cobalt Strike leveraged in compromised "Contact Form" campaign
A new loader has emerged called SSLoad, distinct from SLoad. Reports reveal a campaign where attackers were observed abusing and sending malicious links via contact forms. Clicking these links will download and install the SSLoad malware, then this DLL-based loader will deploy further backdoors and payloads, including a Cobalt Strike beacon to establish connection to the attacker's C2 servers to exfiltrate system and user information.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Ps-Wscr!g1
ACM.Wmip-Net!g1
File-based
ISB.Downloader!gen195
PUA.Gen.2
Scr.Malcode!gen137
Trojan.Gen.MBT
WS.Malware.1
WS.SecurityRisk.3
WS.SecurityRisk.4
W32.Fixflo.B!inf
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Heur.AdvML.C
Network-based
Audit: Scripting Host Processes Making Network Connections
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Statc Stealer
Threat researchers have reported a new infostealer dubbed Statc Stealer. This info-stealing malware infects Windows devices and steals a broad range of information from their victims. Stact Stealer also supports filename discrepancy checks in order to evade sandbox detection.
Initial attack will commence from a click on a malicious Google Chrome based ad that would download a malicious file. Launching of the malicious file results in a PDF decoy and a downloader binary file getting dropped. The binary file will subsequently download the Statc stealer via a PowerShell script. Obtained victim's information will be encrypted and subsequently transmitted to the attacker's dedicated C&C server.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.2
Trojan Horse
WS.Malware.1
WS.Malware.2
W32.Qakbot
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Stately Taurus APT Campaign Targeting Asian Countries
Researchers observed a recent Stately Taurus (aka Mustang Panda) APT campaign during an ASEAN-Australia Special Summit held just this month targeting Asian countries. Two malware packages were created and deployed for this recent attack - one is a ZIP format and the other one is a SCR file. Both of these packages' main goal is to deploy malware with the use of abused copies of applications from known software developers like QFX Sofware Corporation and Electronic Arts, Inc..
Initial infection would commence from an executable file that would subsequently sideload a malicious DLL and the final step is to load a decrypted code that would establish connection between the victim's machine with the attacker's dedicated C2 server to be able to conduct cyberespionage activities.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Ps-Rd32!g1
File-based
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Stately Taurus APT conducting campaigns targeting the Philippines
Stately Taurus APT group (aka Mustang Panda) has been observed to target institutions across the South Pacific region, including the Philippines government in their recent campaigns dating back to August. The attackers have been abusing legitimate software to sideload malicious binaries. Among the abused apps were the Solid PDF Creator application and the SmadavProtect antivirus application. The threat group has also been attempting to masquerade the C2 traffic as legitimate Microsoft connections.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Network- based
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
"Steal-It" exfiltration campaign
A new infostealing and exfiltration campaign dubbed as "Steal-It" has been reported in the wild. According to a recent report, the campaign has been attributed to the APT28 threat actor also known as Fancy Bear. The attackers have been leveraging customized scripts based on the Nishang framework to steal NTLMv2 hashes and system information from the compromised systems and perform the exfiltration of the collected data with the help of Mockbin APIs. The infection chain involves the use of compressed .zip archives containing malicious .lnk files, that in turn lead to the execution of malicious PowerShell scripts based on the Nishang framework. The campaign has been reported to leverage a geofencing strategy and target specific regions including Australia, Poland, and Belgium.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.NPE
Trojan Horse
WS.Malware.2
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Stealc Infostealer
Vidar, Raccoon, Mars and Redline gave birth to a new malware dubbed Stealc. It was reported that in the underground forums Stealc is rapidly gaining in popularity due to its stealing capabilities such as running a customizable file grabber. This allows the attackers to steal files matching their 'grabber rules', upload the stolen files to the attacker's dedicated C2 server and wipes traces of infection afterwards.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
WS.Malware.1
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.B
Web-based
Observed domains/IPs are covered under security categories |
StealC malware distributed in a recent campaign
StealC is an infostealer variant focused on theft of confidential information including browser-stored data, cookies, cryptocurrency wallets or data from various messaging applications. In a recent campaign StealC binaries have been disguised as installer/setup files for various well known applications or cracked software installations. The fake installers are distributed via publicly accessible file repositories such as GitHub, Mega or Dropbox, among others.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.Stealer!gen2
File-based
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Stealth Soldier backdoor used in attacks against Libyan organizations
Stealth Soldier is a newly discovered backdoor variant leveraged in espionage and surveillance campaigns targeting organizations in Libya. The malware functionality includes keylogging, file ex-filtration, screenshot grabbing, web-browser data and credentials theft, among others. The command and control (C&C) addresses used by the malware indicate certain relations to a larger set of domains previously being used in phishing attacks and masqueraded as websites of the Libyan Foreign Affairs Ministry for example.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories |
SteganoAmor campaign attributed to TA558 threat group
A new malicious campaign dubbed as SteganoAmor has been attributed to the TA558 threat actor. The attackers have been leveraging steganography techniques by concealing malicious code inside image files. TA558 is a threat group know to target tourism and hospitality sectors with extensive focus on targets located in Latin America. In their attacks the group continues to leverage an old Microsoft Office Equation Editor vulnerability from 2017 - CVE-2017-11882. The observed delivered payloads might vary and include malware from Remcos, Agent Tesla, Formbook, Guloader, Lokibot, Xworm and several other families.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.Stealer!gen1
SONAR.SuspLaunch!g13
SONAR.SuspLaunch!g266
SONAR.SuspStart!gen15
SONAR.TCP!gen1
File-based
Downloader
Exp.CVE-2017-11882!g2
Exp.CVE-2017-11882!g3
Exp.CVE-2017-11882!g5
ISB.Downloader!gen40
Packed.NSISPacker!g14
Scr.Malcode!gen
Scr.Malcode!gen3
Scr.Malcode!gen59
Scr.Malcode!gdn33
Scr.Malcode!gdn34
Trojan.Gen.MBT
Trojan.Gen.NPE
Trojan.Gen.NPE.C
Trojan.Mdropper
VBS.Downloader.Trojan
Web.Reputation.1
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Network-based
System Infected: Bad Reputation Application Connecting to Cloud Storage
Web Attack: Malicious File Download 11
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Stickman eyes crypto wallets
Over the past few weeks, Symantec have observed another crypto wallet clipper in the threat landscape. It's true name is not clear, but we are calling it "Stickman the Clipper" for now, as a stickman carrying a wallet is featured on its C2 login panel. The actors behind this threat are primarily distributing it as fake software and hacktools via drive-by-downloads. Clippers are extremely common these days as they take advantage of the growing use and value of cryptocurrencies, even when the crypto world has been shaken by the fall of popular cryptocurrency exchanges.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Banclip
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B |
Sticky Werewolf targets public organizations in Poland
Sticky Werewolf, last reported in October 2023 targeting organizations in Russia and Belarus, has now been observed in recent campaigns targeting public organizations in Poland. These attacks utilize spear-phishing techniques, where phishing emails contain links to malicious files with .exe extensions, disguised as PDF documents. Clicking on these files leads to the download of a Darktrack RAT payload.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Untrst-FlPst!g1
File-based
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
STOP / DJVU ransomware still observed in the wild
STOP ransomware (known also as DJVU) has been active for the last several years and new variants of this malware continue to be found in the wild compromising both consumer and enterprise users. STOP ransomware is known to be mostly distributed via cracked software and drive-by-downloads. The malware appends four-letter extensions to the encrypted files. Some examples of extensions used by most recently discovered variants of this ransomware include: .zoqw, .zouu, .poqw, .mzqw, .mzop and .mztu.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
File-based
Downloader
Packed.Generic.528
Ransom.Pots
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Network-based
System Infected: Ransom.DJVU Activity 4
System Infected: Trojan.Backdoor Activity 634 |
STOP ransomware (aka DJVU) activity continues
Threat actors behind STOP ransomware (also known as DJVU) have been active for a few years now and continue to be observed around the globe compromising both consumer and enterprise users. STOP ransomware is mostly distributed via cracked software and drive-by-downloads but unlike some of its more infamous ransomware counterparts, the double extortion tactic is not being used. Interestingly, recent reports and analysis have shown that this threat won't execute its encryption routine if the victim is located in the following countries: Russia, Belarus, Ukraine, Azerbaijan, Armenia, Tajikistan, Kazakhstan, Kyrgyzstan, Uzbekistan and Syria.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.Ransomstop!gen7
File-based
Packed.Generic.620
Trojan.Gen.MBT
Ransom.Pots
Ransom.Pots!gen2
Machine learning-based
Heur.AdvML.B
Network-based
System Infected: Trojan.Backdoor Activity 634
System Infected: Trojan.Ransomware Activity 58 |
STOP ransomware at large
New variants of the STOP ransomware, also known as DJVU, are consistently emerging in the wild. STOP ransomware is primarily distributed through cracked software and drive-by downloads. Once activated, the malware encrypts user files and appends four-letter extensions to them, such as .cdqw, .nbzi, etc. Following the encryption process, a ransom note text file named "_readme.txt" is displayed, demanding payment in Bitcoins.
Symantec protects you from this threat, identified by the following:
Behavior-based
Ransom.Pots
File-based
Ransom.Zombie
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Network-based
System Infected: Trojan.Backdoor Activity 634 (33246)
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
StormKitty stealer observed in drive-by-download and malspam campaigns
StormKitty stealer is a threat whose code is available to the public, being posted on a well-known internet hosting service for software development and version control. It's not a new infostealer and its prevalence fluctuates based on echoes of its existence on social media, hacking forums and websites. Over the last few weeks, Symantec has seen a slight activity increase related to drive-by-download (e.g. cracked software and fake updates) and malspam (SWIFT social engineering) campaigns. This malware has nothing that makes it stand out from other similar infostealers, mainly stealing passwords, discord token and crypto wallets.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
File-based
Scr.Malcode!gdn34
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B |
StrelaStealer malware continues to target Spanish users
StrelaStealer is an infostealer variant initially discovered back in 2022 and known to be targeting specifically Spanish users. In contrary to campaigns from last year that were using ISO files during the attack chain, this years' campaigns switched to the use of ZIP files. Inside the distributed ZIP archives there are malicious .PIF files that lead to the malware infection. Once executed on the targeted machine, StrelaStealer will search for email account credentials of popular email clients like Outlook and Thunderbird and exfiltrate the collected information to C2 servers controlled by the attackers.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
File-based
Trojan Horse
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Web-based
Observed domains/IPs are covered under security categories |
StrigoiMaster: Blood thirsty RAT with fangs
Symantec Security Response recently came across a new Remote Access Trojan (RAT). Likely named after troubled spirits in Romanian mythology which are referred to as vampires in modern times, Strigoi Master is a JAVA-based RAT that can be purchased on the underground. As the name suggests, compromised machines will be under control of the RAT master. The malware's features include:
Remote VNC
Live and Offline keylogging
Download and execute remote files
Reboot and shut down remote computer
Symantec provides the following detection against StrigoiMaster RAT:
Trojan.Dropper
Trojan Horse |
STRRAT: Global campaign observed
STRRAT is not a new threat, having been around for some time now and still actively used by groups and individuals worldwide to fuel localized, global, targeted, and non-targeted campaigns. In a recent example, Symantec observed an actor who typosquatted a well-known German multinational pharmaceutical and biotechnology company to conduct a spearphishing campaign. The email subject was "CONFIRM VERBAL GERMANY ORDER (JUNE)," and it targeted various industries in Europe, the Middle East, Asia, Latin America, and North America. The campaign employed a classic "Quote" lure and a .cab attachment containing a malicious Java script file (the STRRAT malware) designed to perform remote access and control of infected systems.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
File-based
ISB.Dropper!gen12 |
Subzero malware leveraged by the KNOTWEED group
A threat group known as Knotweed has been linked to numerous spyware attacks on law firms, banks, and strategic consultancies in countries around the world. The threat actors have been leveraging malware dubbed Subzero which consists of two specific components, a persistent loader called Jumplump and the primary payload called Corelump. The malware is spread through exploits in Windows and Adobe Reader from various campaigns in 2021 and 2022. Subzero allows the attackers to hack into targets' computers and run arbitrary commands via remote shells and ex-filtrate various confidential data, including files, keystrokes or screenshots.
Symantec protects you from this threat, identified by the following:
File-based
Hacktool.Mimikatz
Trojan Horse
W97M.Downloader
WS.Malware.1
WS.Malware.2
Policy-based
Symantec Data Center Security hardening policies prevent malware tools and payloads used by KNOTWEED from getting installed on Windows systems. The Software Install Restrictions in the DCS policy prevent the threat from tampering the systems with trojanized binaries. DCS hardening policy also prevents the downloader shellcode from connecting to the C2 server to download any payloads.
Web-based
Observed domains are covered under security categories |
SugarGh0st malware - a customized Gh0st RAT in the field
SugarGh0st, a customized variant of the Gh0st RAT family, has emerged in the wild. It’s been detected in campaigns aimed at the Uzbekistan Ministry of Foreign Affairs and South Korean users. The infection process utilizes Windows Shortcut files containing malicious Javascript to deploy DLL loaders and execute SugarGh0st binaries. This malware is capable of gathering system details, executing diverse file operations, enabling remote control by attackers, initiating reverse shell, and executing arbitrary commands sent by the attackers.
Symantec protects you from this threat, identified by the following:
Behavior-based
ACM.Ps-Rd32!g1
ACM.Ps-Wscr!g1
ACM.Wscr-CPE!g1
ACM.Wscr-CNPE!g1
AGR.Terminate!g2
AGR.Terminate!g6
SONAR.SuspLaunch!g78
File-based
Backdoor.Trojan
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Sumitomo Mitsui Banking Corporation (SMBC) users targeted with a new phishing wave
Sumitomo Mitsui Banking Corporation (SMBC) is a Japanese multinational bank headquartered in Chiyoda City, Tokyo, Japan. Lately, Symantec has observed phish runs that impersonate SMBC's services and entice users to open fake notifications emails. The email body content is kept short and mentions to confirm SMBC card usage. These phish emails make an attempt to lure users to open and click on phish URLs. In this phish wave, the threat actors have made use of typo-squatting to impersonate the legit SMBC website URLs.
Email Subject:【重要なお知らせ】三井カードご利用確認のお願い
Translated Email Subject: [Important Notice] Request for confirmation of Mitsui Card usage
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
SunCrypt infections may lead to data leaks
We have been aware of some recent attack campaigns related to the SunCrypt ransomware. SunCrypt is a ransomware variant that first emerged around October 2019 but it was not very widespread at that time. More recent reports of SunCrypt activities started around August 2020, when the group behind it released a dedicated leak website. On it they started to publish stolen data of victims who refused to pay for the decryptor. Similar tactics of stealing data from victims before encrypting it have been used by various other ransomware actors in the past. Around the time of the leak site release, the SunCrypt group also made claims to be associated with the Maze ransomware gang. While some SunCrypt samples indeed show traffic to IP addresses seen previously in Maze operations, any closer affiliation between those two groups has not been confirmed.
SunCrypt uses a heavily obfuscated Powershell loader to initiate the infection. The loaded malware then utilizes the ChaCha cryptographic algorithm to encrypt the victim's files. As with many other ransomware variants, the encrypted files may never be recovered. We recommend regular backup procedures of any important files and applying the latest product definitions to protect against the ransomware threat.
Symantec offers the following protections
File-based
Ransom.Gen
Trojan.Gen.NPE
Network-based
[32436] Attack: Ransom.Gen Activity 29 |
Sunloginclient CVE-2022-10270 vulnerability exploited in the wild
Sunloginclient is a remote control application for monitoring and accessing various devices in the IT environment. Sunloginclient suffers from a vulnerability (CVE-2022-10270) that can lead to execution of arbitrary code. The vendor has released a patch to address the vulnerability. Meanwhile Symantec is observing attackers currently exploiting the vulnerability to drop various malware variants including coin miners.
Symantec protects you from this threat, identified by the following:
Network-based
Web Attack: Sunlogin RCE Vulnerability |
SuperBear RAT malware
A Remote Access Trojan (RAT) dubbed SuperBear has been distributed in a recent campaign targeted at South Korean journalists. The initial attack vector was a phishing email containing a .LNK file that once run would lead to a malicious PowerShell script execution. Further down the attack chain, the threat actors have been leveraging an AutoIT3 compiled script responsible for process injection operations. The final payload of this campaign is SuperBear RAT and it has the capabilities to exfiltrate data from the infected endpoints as well as download / execute arbitrary shell commands and DLL libraries.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
SupermanMiner continues to evolve
Recently, attention has been drawn to SupermanMiner, a cryptominer that has been active in the threat landscape since 2021. This malicious software consists of multiple components, and reports indicate the existence of at least eight variants currently circulating. SupermanMiner is a Monero mining trojan written in the Go programming language, and it utilizes Google Sites to host custom web pages for the distribution of malware. Historically, the threat actors associated with SupermanMiner have employed various techniques such as vulnerability exploitation, SSH brute force and web shell injection to carry out their attacks.
Symantec protects you from this threat, identified by the following:
File-based
PUA.Gen.2
Trojan Horse
Trojan.Gen.NPE
WS.Malware.1 |
Supply-chain attack on Asian gaming industry
Symantec Security Response is aware of a report that a small number of gaming companies were affected by malware delivered through the compromised update mechanism of a popular Android gaming emulator for Windows and Mac. According to the report, the victims are all located in Asia.
The malware used in this attack are Backdoor and Remote Access Trojan (RAT).
Symantec provides the following protection against this attack:
File-based:
Trojan Horse
Trojan.Gen.MBT
Web-based
Observed domains are covered under security categories |
Surtr Ransomware
Surtr Ransomware-as-a-Service has been around since at least late 2021 and more recently observed in Korea per reports. Upon successful infection, as many ransomware do, it will attempt to delete shadow copies and encrypt files (appending .surtr extension). It is also able to encrypt mounted drives and network shares. Actors behind this threat employ the dreaded double-extortion tactics.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.SuspLaunch!g18
File-based
Ransom.Surtr
Trojan.Gen.MBT
Network-based
Attack: Ransom.Gen Activity 46
Machine Learning-based
Heur.AdvML.B |
SVCReady loader used in campaigns delivering RedLine stealer
A new loader, dubbed SVCReady, is being used in phishing attacks involving malicious Word documents. SVCReady has been reported to leverage an unusual technique to load malware payloads. While many maldocs just use malicious macros to download payloads, here the malware uses VBA macro code to run shellcode hidden in the file properties. One of the most recent campaigns where SVCReady has been used, has seen the Redline infostealer being delivered as a payload to the compromised systems.
Symantec protects you from this threat, identified by the following:
File-based
ISB.Downloader!gen177
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
W97M.Downloader
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Heur.AdvML.M
Web-based
Observed domains are covered under security categories |
SwiftSlicer - new wiper discovered in Ukraine
A new wiper attack was uncovered in Ukraine and is attributed to the Sandwork APT group. This new malware is called "SwiftSlicer". It is highly versatile and destructive as it seeks to delete backups and corrupt/delete Windows system files.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.C |
Symantec coverage details for Microsoft's October Patch Release
On October 13, Microsoft published their regularly scheduled monthly updates. For the October release Microsoft addressed 87 vulnerabilities.
Symantec has introduced the following protections based on available information.
File-based
(CVE-2020-16898) - Exp.CVE-2020-16898
Network-based
(CVE-2020-16896) - OS Attack: Windows Remote Desktop Protocol CVE-2020-16896 |
Symantec coverage details for Microsoft September Patch Release
On September 8, Microsoft published their regularly scheduled monthly updates. For the September release Microsoft addressed 129 vulnerabilities.
Symantec has introduced the following protections based on available information.
(CVE-2020-0664) Attack: Microsoft Active Directory CVE-2020-0664 |
Symantec coverage details for the Microsoft August Patch Release
On August 11, Microsoft published their regularly scheduled monthly updates. For the August release Microsoft addressed 120 vulnerabilities.
Symantec has introduced the following protections based on available information.
File based
(CVE-2020-1380) - Exp.CVE-2020-1380
(CVE-2020-1587) - Exp.CVE-2020-1587
Network based
(CVE-2020-1380) - Web Attack: Microsoft Internet Explorer CVE-2020-1380
(CVE-2020-1567) - Web Attack: Internet Explorer Remote Code Execution
(CVE-2020-1570) - Web Attack: Microsoft Internet Explorer CVE-2020-1570 |
Symantec coverage for 'Zerologon' vulnerability (CVE-2020-1472)
In the August patch release from Microsoft they addressed a Netlogon vulnerability identified as CVE-2020-1472. In recent weeks there has been much discussion about the dangers of potential exploitation which includes the release of proof of concept code. Successful exploitation of the vulnerability, given the name Zerologon, could allow for a malicious attacker to assume control of an Active Directory domain controller.
Customers are advised to have applied the available updates to secure any at risk network environment.
Symantec has released the following signatures to offer protection against possible exploitation of this vulnerability.
File based
Exp.CVE-2020-1472
Network based
[SID 32577] OS Attack: Microsoft Netlogon CVE-2020-1472 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.