text
stringlengths
0
383k
SlothfulMedia RAT is no slouch Recent online reports indicate that a new SlothfulMedia Remote Access Trojan (RAT) was used to target several Asian and Eastern European countries. Some suggest this malware is a cyber arsenal used by APT group known as Iamtheking and PowerPool. The RAT is capable of performing actions typical of RATs: running commands, killing processes, invoking a remote shell, adding and deleting registry values, taking screen shots and interacting with the file system. Symantec detects SlothfulMedia RAT as the following: File-based protection Trojan.Gen.2
Smaller gangs scavenge for new tools Smaller gangs often lack the resources and/or technical knowledge to expand their capabilities and rely on scavenging parts of other ransomware families into their own operations. In one such instance the gang known for deploying the 'Delta' ransomware have expanded their capabilities by implementing parts of Babuk and Chaos ransomware from recent leaks of their source code. This allows them to increase their reach and their payouts. Symantec protects you from this threat, identified by the following: File-based Ransom.Babuk Ransom.Cryptolocker Trojan.Gen.2 Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B Heur.AdvML.C Network-based Attack: Ransom.AvosLocker Activity 2 Attack: Ransom.Gen Activity 29 Attack: Ransom.Gen Activity 41 Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories
SMAUG Ransomware as a Service A recent Ransomware as a Service known as "SMAUG" reportedly entered the cybercrime market in April 2020 and is known to offer easy-to-use services to both cyber criminals and victims. The ransomware is written in GO, and can run on Windows, Linux and MacOS. Some key features of SMAUG RaaS: Fully customizable Includes “Company Mode”, which allows for a single key to decrypt all the encrypted files in the affected organization Allow attackers to set a ransom price, deadline and ransom message Can execute and encrypt without internet connectivity Has a fully automated payment system Employs a friendly User Interface (UI) for attackers Uses a friendly ransom payment walk-through Symantec protection Ransom.Cryptolocker
SMBC phishing campaign targets Japanese enterprises and consumers SMBC (Sumitomo Mitsui Banking Corporation) is a major bank in Japan, making it a prime target for recurrent phishing scams. Symantec has recently identified an email phishing campaign (subject: 【三井住友】カード株式会社からの緊急のご連絡) where cybercriminals impersonate SMBC and use fake login websites that resemble SMBC Vpass to steal users' financial information. This campaign can have severe consequences for both individual customers and businesses. Some examples of these phishing websites are: sqrmnwae[.]cf glutfgua[.]ga vmkikuxe[.]ga Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products Web-based Observed domains/IPs are covered under security categories
Smishing attempts impersonating Australia's Postal service on the rise Smishing attacks targeting Australians consumers and enterprise users is not new and in fact very much recurrent. In July, Symantec detected numerous newly registered domains that engaged in typosquatting, mimicking Australian postal service. These domains were found to be involved in malicious SMS campaigns. Below are a few examples of the malicious SMS messages seen being distributed. Delivery unsuccessful. Update your parcel information at hxxps://post[.]service-center[.]cc for a successful delivery. We value your cooperation. Please update your parcel information at hxxps://post[.]case-center[.]cc after the failed delivery attempt[.] Thank you for your prompt action and understanding. Update your parcel information at hxxps://post[.]admess[.]cc as the delivery attempt was unsuccessful. Please ensure accurate details for a successful delivery. We regret to inform you that the delivery attempt was unsuccessful. To proceed with the delivery, update your parcel information at hxxps://post[.]case-center[.]cc Due to a failed delivery attempt, we kindly request you to update your parcel information at hxxps://post[.]pack-handle[.]cc for successful delivery. Postal services are often used as a social engineering lure in both email and SMS phishing because they are familiar and trusted entities. Messages related to postal services create a sense of urgency or concern, making recipients more likely to act quickly without verifying the message's legitimacy. By impersonating postal services, attackers can request personal information under the guise of package tracking or delivery issues which often lead to identify theft and financial loss. Symantec protects you from this threat, identified by the following: Mobile-based Symantec Endpoint Protection Mobile is able to analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake Australia Post domains used in this campaign are known to WebPulse. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Smishing campaign delivers TianySpy to Japanese mobile users Japan has recently been the target of a smishing campaign delivering a mobile threat known as TianySpy. As per reports, the malicious SMS purports to be from a known mobile carrier. If a mobile user is successfully tricked, they'll be redirected to a fake website then prompted to download TianySpy, disguised as a configuration and security application. This malware's main function is to display fake websites in an attempt to steal users' credentials. Symantec protects you from this threat, identified by the following: Mobile-based Android.Reputation.2 AppRisk:Generisk Symantec Endpoint Protection Mobile is able to also analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake DHL domains used in this campaign are known to WebPulse.
Smishing campaign in India leads to phishing and spyware Banking users in India have been the target of a smishing campaign that leads to phishing and spyware. Actors sent out malicious SMS which include a link to a fake State Bank of India website, in an attempt to phish their bank information. If victims are successfully lured by the phishing website, they'll also be prompted to install an Android spyware disguised as an SBI Android support application. Symantec protects you from this threat, identified by the following: Mobile-based AppRisk:Generisk Symantec Endpoint Protection Mobile is able to also analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake DHL domains used in this campaign are known to WebPulse.
Smishing campaign targeting Coinbase users As cryptocurrency continues to become more mainstream, Symantec observes a steady increase in related phishing campaigns in both the email and the mobile landscape. This bulletin covers an ongoing campaign that aims to snatch US-based mobile Coinbase users' credentials. Coinbase is one of the most popular cryptocurrency exchanges in the world. The Short Message Service (SMS) is attempting to lure victims with a fictitious unclaimed bonus, and a malicious URL to claim it is provided. If a user clicks on that URL, they'll end up at a fake Coinbase login page that only appears when accessed from a mobile web browser. Observed malicious SMS: Coinbase - You have an unclaimed bonus of $60 on your account. To claim it, visit our website below: hxxps[:]//id38-coinbase[.]com/connect Symantec protects you from this threat, identified by the following: Mobile-based Symantec Endpoint Protection Mobile is able to analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake Coinbase domain used in this campaign is known to WebPulse. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Smishing Campaign: Truist Bank Mobile Users Targeted Around the world, people are accustomed to phishing attacks targeting users of major banks, but we must not forget that regional banks are also continuously targeted. For example, users of Truist— which primarily operates in the Southeastern and Mid-Atlantic regions of the United States—have been receiving malicious SMS messages indicating that their account has been placed on hold, and advising them to follow the provided URL to verify. Unsuspecting users would be lured to a fake Truist website tuned for phishing. Observed SMS: Truist-Alert^sca5v.zw69:For your protection we have placed a hold on your account.visit hxxps[:]//cebabh[.]edu[.]pe/truist/ to verify. Symantec protects you from this threat, identified by the following: Mobile-based Symantec Endpoint Protection Mobile is able to analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake Truist website used in this campaign is known to WebPulse. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
SmokeLoader continues targeting Ukrainian entities SmokeLoader is a well known malware variant that connects to attackers' controlled C2 servers in order to download additional modules or malware payloads according to received commands. This malware is distributed mostly through phishing campaigns. In recently observed campaigns it has continued to target governmental and public institutions in Ukraine as well as companies from the medical, construction and manufacturing sector. Symantec protects you from this threat, identified by the following: Behavior-based ACM.Untrst-RunSys!g1 SONAR.ProcHijack!g45 File-based Trojan.Gen.9 Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
SMSThief mobile malware goes after banking customers SMSThief Android malware has been reported to target Indian banking customers in a recent wave of attacks. The malicious .apk package is spread via phishing URLs and masqueraded as an HDFC Bank application to redeem reward points or vouchers. The malware ex-filtrates credit card information and users' personal details including phone numbers and email addresses. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk Android.Reputation.2 Web-based Observed domains/IPs are covered under security categories
SmugX campaign comes with the use of HTML Smuggling techniques SmugX is a newly discovered malicious campaign targeted at embassies and foreign affairs ministries in Europe. The campaign shows a certain degree of overlap with previous activities attributed to Mustang Panda and Red Delta threat groups. SmugX leverages HTML Smuggling techniques to hide the malicious payloads inside of HTML documents. Further down the infections chain, the attackers also make use of JavaScript, .msi files and sideloaded .dll files. The final payload in the campaign is the PlugX malware which is a well known Remote Access Trojan (RAT) used by various APT groups since at least 2008. Symantec protects you from this threat, identified by the following: File-based Backdoor.Roboform JS.Downloader Trojan Horse Trojan.Gen.MBT Trojan.Malscript WS.Malware.2 Machine Learning-based Heur.AdvML.A Heur.AdvML.B Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Snake Keylogger among the most prevalent Infostealers Snake Keylogger is a type of info-stealing malware that appeared on the landscape back in November 2020. According to a recently released report, there has been a spike in Snake infections seen since August 2021. The malware is usually spread via malicious phishing campaigns and capable of credential theft from over 50 different applications. The staging mechanisms of the recent Snake samples are almost identical to those known from two other very popular infostealers - Formbook and Agent Tesla Symantec protects you from this threat, identified by the following: File-based Scr.Malcode!gdn30 Trojan Horse Trojan.Gen.MBT Trojan.SnakeKeylogger Machine Learning-based Heur.AdvML.B Heur.AdvML.C
Snake Keylogger Campaign against Thai businesses While the cyber threat landscape in Thailand is not often mentioned by the media, it remains fairly active, with groups and individuals around the world targeting its consumers and organizations on a daily basis. In a recent example, Symantec observed a Snake Keylogger malspam campaign in which an actor is attempting to compromise both local and international companies with offices in Thailand, using a classic "quote" social engineering tactic. Malicious emails (subject: ขอใบเสนอราคา) contain a .ace archive (รายละเอียด.ace) and within it, a Snake Keylogger binary (รายละเอียด.exe) disguised as a fake document describing the fictitious quote. In this campaign, the perpetrators are impersonating two Thai companies in the engineering, procurement and construction industry (TTCL) and the food packaging industry (Vexcel Pack). Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products Behavior-based SONAR.Stealer!gen1 File-based Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B!100
Snake Keylogger Malspam Uptick Perhaps not as prevalent as other infostealers, Snake Keylogger still does have its space in the threatscape and we recently observed an increased in activity. Multiple malspam campaigns have been seen these past few weeks delivering this infostealer. Symantec has the following coverage in place: File-based Heur.AdvML.B Heur.AdvML.C WS.Malware.1 WS.Malware.2 Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
SnakeKeylogger: Slithering in Europe and the Middle-East disguised as the AMFR SnakeKeylogger is well-known in the cybersecurity community and is heavily used around the world by multiple groups and individuals. Symantec has observed a new campaign that started on November 17th, in which the actors are impersonating the Association of Medical Physicists of Russia (AMPR) targeting various industries in Europe and the Middle East. The emails (subject: Договор) contain a malicious archive (Contract.bz) and within that, the SnakeLogger binary (Contract.exe) is disguised as a contract. While it's a simple infostealer, if a user is successfully lured the impact may range from financial and identity theft to data breaches. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products Behavior-based SONAR.Stealer!gen1 File-based Scr.Malcode!gdn32 Machine Learning-based Heur.AdvML.B
Snake Keylogger uptick Since it was first spotted back in 2020, Snake Keylogger's prevalence has fluctuated but it continues to be among most used infostealer in today's landscape. In the recent weeks we've observed a slight uptick as groups and individuals conduct malspam campaigns. When it comes to these campaigns, most of the time generic quote, payment, SWIFT and shipping social engineering tactics are employed, often the attached binary being disguised as a PDF file. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products File-based Msil.Packed.20 Scr.Malcode!gdn30 Scr.Malcode!gdn34 Trojan.Gen.2 Machine Learning-based Heur.AdvML.B
Snatch ransomware activity continues Snatch is a ransomware family seen on the threat landscape since at least 2019. The malware remains active in the wild to this day with new variants emerging regularly. The threat groups behind Snatch are known to leverage double-extortion tactics by not only encrypting user data but also by stealing it and threatening with public release if the ransom demands are not met. The malware appends random extensions to the encrypted files. Some examples of extensions used by most recently discovered variants of this ransomware include: .hgjzitlxe, .tcvjuo, .tnwkgbvl, .qxtfkslrf, .zuioseft. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.Ransomware!g1 SONAR.Ransomware!g3 SONAR.Ransomware!g7 SONAR.Ransomware!g28 File-based Downloader Ransom.Snatch Ransom.Snatch!g1 Ransom.Snatch!g2 Ransom.Snatch!gm Trojan.Gen.2 Trojan.Gen.MBT Machine Learning-based Heur.AdvML.A Heur.AdvML.C
Snatch ransomware remains a significant threat Symantec Security Response is aware of the recent CISA and FBI alert regarding a number of targeted activities observed for the Snatch ransomware. Snatch is a ransomware family seen on the threat landscape since at least 2019. According to the released report, the threat groups behind Snatch have been actively targeting critical infrastructure sectors including the Defense Industrial Base (DIB), Food and Agriculture, and Information Technology sectors in their campaigns involving both data exfiltration and double extortion. The threat actors have been leveraging brute forcing of RDP connections but also illegally obtained compromised credentials for initial access to the victims’ network. The Snatch ransomware appends random extensions to the encrypted files and drops a ransom note in form of a "HOW TO RESTORE YOUR FILES.TXT" file. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.RansomSnatch!g1 File-based Downloader Ransom.Snatch Trojan.Gen.MBT Trojan.Malscript WS.Malware.1 Machine Learning-based Heur.AdvML.A!500 Heur.AdvML.C Network-based Malicious Site: Malicious Domains Request
Snip3 - a new RAT loader in the form of "Crypter-as-a-Service" New reports emerged about a RAT loader dubbed as Snip3, that's been advertised and sold in the form of a "Crypter-as-a-Service" offering. According to the released reports, this crypter is usually delivered via phishing emails and it implements a variety of detection bypass techniques. The observed campaigns leveraging Snip3 have been delivering RevengeRAT, AsyncRAT and Agent Tesla among others. Symantec protects you from this threat, identified by the following: File-based CL.Downloader!gen96 CL.Downloader!gen116 ISB.Downloader!gen80 Trojan.Gen.2 Trojan.Gen.NPE Trojan Horse Trojan.Revetrat W97M.Downloader VBS.Downloader.Trojan Web-based Observed domains are covered under security categories
SnowLight downloader spread in campaigns exploiting F5 BIG-IP and ScreenConnect vulnerabilities Recent malicious campaigns attributed to the UNC5174 threat group have been reported to exploit F5 BIG-IP (CVE-2023-46747) and Connectwise ScreenConnect (CVE-2024-1709) vulnerabilities for malware delivery. One malware variant, SnowLight, is a C-based downloader for Linux, used by the threat actors to download and execute secondary payloads on the infected machines. GoreVerse, GoHeavy and SuperShell are payload variants distributed by UNC5174 in the reported campaigns. Symantec protects you from this threat, identified by the following: File-based Backdoor.Trojan Trojan Horse Network-based Attack: F5 BIG-IP RCE CVE-2023-46747 Web Attack: ConnectWise ScreenConnect CVE-2024-1708 Web Attack: ConnectWise ScreenConnect CVE-2024-1709 Policy-based DCS default hardening policy for Windows servers will prevent arbitrary command and powershell execution and prevent tampering of critical Windows OS files and folders DCS network rules in the policy can be configured to limit ScreenConnect applications to trusted clients Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
SocGholish (aka FakeUpdates) dropping Raspberry Robin Our researchers observed a recent SocGholish campaign, a malware that typically hides behind a fake software update. Unsuspecting victims may have either received an email that lead them to the compromised website, or the user was perhaps actively looking for a software update and unfortunately found themselves at one of the fake sites. The websites are injected with a malicious JavaScript that if executed will download another file with a .WSF extension. This .WSF files contains a JavaScript file (this one highly obfuscated and accompanied by a range of anti-sandbox and anti-analysis functions) which eventually lead to Raspberry Robin, a USB-based worm that acts as a loader for further malware. SocGholish performs the following eligibility checks to verify if the infection routine should continue: If the sample is running in a Desktop folder, quit If the Windows build is lower than build number 17063 (Windows 10 Build 17063), quit If the machine's processor matches with a list of products, quit If the machine's MAC address matches a list of MAC prefixes, quit If running processes match a specified list of processes, quit If the script runs without an argument, relaunch another instance with a random argument, then quit If the malware's eligibility checks all pass, it will delete itself and set path exclusions to bypass Windows Defender, following which it will make an attempt to launch curl.exe and download the payload from a dedicated remote server. The final payload appears with a single word as its filename and .dll as its extension. It will then be launched with the use of 'msiexec.exe -z'. Despite these concerted attempts to circumvent analysis and detection, our heuristic engine blocks SocGholish without the need for an update. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Ps-Wscr!g1 File-based Scr.Malcode!gen53 Network-based 34049_Audit: Scripting Host Processes Making Network Connections Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
SocGholish framework leveraged to distribute the NetSupport RAT According to a latest report, SocGholish malware framework has been leveraged in a recent campaign distributing the NetSupport Remote Access Trojan (RAT). Distribution through SocGholish relies on social engineering via compromised websites containing injected malicious HTML code. The injected code redirects the users to fake browser update pages from where compressed archives containing malicious scripts are downloaded and later executed on the victim's machine. This attack chain leads in the end to the NetSupport RAT payload download. Symantec protects you from this threat, identified by the following: File-based ISB.Downloader!gen542 Trojan Horse WS.Malware.2 WS.SecurityRisk.4 Web-based Observed domains/IPs are covered under security categories
Socks5Systemz proxy botnet A new proxy botnet, dubbed Socks5Systemz, has been discovered in the wild. This botnet was observed being delivered by two popular loaders, PrivateLoader and Amadey. The threat actor behind the botnet has developed a comprehensive proxy service that allows users to subscribe, manage existing subscriptions, and access the current list of available proxies. Additionally, they are involved in selling compromised accounts and proxy access. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based Scr.Malcode!gdn32 Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Network-based System Infected: Trojan.Backdoor Activity 558 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled product
Sodinokibi adds Linux to its resume Security researchers have recently discovered a new Sodinokibi (aka REvil) ransomware encryptor that targets Linux servers. This new encryptor looks for VMWare ESXi servers and issues a stop command in order to encrypt the entire virtual disk. Symantec protects you from this threat, identified by the following: File-based Linux.Sodinokibi
SolarMarker backdoor bundled in modified PDF application installer A new variant of the backdoor dubbed SolarMarker was discovered bundled in a trojanized PDF application installer. This malware infects a victim under the guise of a legitimate PDF application installer for PDFescape. It makes use of a malicious PowerShell script and performs basic backdoor functionality like file uploads, downloads, and execution. Symantec protects you from this threat, identified by the following: File-based ISB.Heuristic!gen5 Trojan Horse Trojan.Gen.MBT Network-based URL reputation: Browser navigation to known bad URL Web-based Observed domains are covered under security categories
SolarMarker malware campaign adapts with PyInstaller for obfuscation A SolarMarker malware campaign has been observed utilizing PyInstaller to obfuscate first-stage PowerShell scripts instead of Inno Setup and PS2EXE, showcasing the adaptability of threat actors in evading detection mechanisms targeting SolarMarker. SolarMarker is typically spread through attacks involving Search Engine Optimization Poisoning (SEO-Poisoning). In this observed campaign, users were tempted to download a disguised PDF document from a website impersonating a reputed South Californian Medical University. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT WS.Malware.1 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
SolidBit, a LockBit's copycat SolidBit is a variant of Yashma (a.k.a. Chaos) ransomware, and although the builder of the latter was already leaked on underground forums, SolidBit does not use the leaked code as is. SolidBit includes some changes and additions, one of which is the support of chat, likely something they took from LockBit seeing as the chat interface is a lookalike of LockBit's. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 WS.Malware.2 Behavior-based SONAR.Cryptlck!g114 Machine Learning-based Heur.AdvML.B Heur.AdvML.C
Sombrat backdoor and Fivehands ransomware deployed in campaigns exploiting Sonicwall vulnerabilities According to a recent report, a threat group dubbed as UNC2447 has been deploying Sombrat backdoor and Fivehands ransomware in a series of campaigns run in the last few months. The group leveraged CVE-2021-20016 Sonicwall VPN vulnerability in order to breach the targeted networks and spread the malware. Fivehands ransomware has been first discovered in February, and it shows certain similarities to the earlier ransomware variants known as Deathransom and HelloKitty. Symantec protects you from these threats, identified by the following: File-based Backdoor.Rozena Heur.AdvML.B Heur.AdvML.C Packed.Generic.528 Ransom.CryptoTorLocker Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE Trojan Horse Network-based System Infected: Trojan.Backdoor Activity 235 System Infected: Trojan.Backdoor Activity 570 System Infected: Trojan.Mdropper Activity 10 Web-based Observed domains are covered under security categories
Somnia ransomware aims to disrupt Ukrainian organizations Recently, Ukrainian organizations have been the target of a ransomware attack conducted by Russian hacktivists. These actors have used ransomware called Somnia which they spread via an access broker which in turn infected victims via Vidar stealer and other tools such as Cobalt Strike. The stealer was disguised as a fake Advanced IP Scanner (a well known network scanning tool) hosted on a fake website. This ransomware group is not asking for a ransom, all they want is to disrupt the organizations. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 SONAR.Ransomware!g34 File-based Ransom.Crysis Trojan Horse Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.B Network-based System Infected: Trojan.Backdoor Activity 634 Web-based Observed domains/IPs are covered under security categories
Sophisticated Feb 2020 watering hole attack retrospective In early 2020, Google observed a sophisticated operation in which a watering hole technique was used as a stepping stone to deploy a chain of exploits against both Windows and Android devices. In a series of six blogs published recently, they detail the multiple vulnerabilities and exploits that were used. Among the Chrome, Android and Windows exploits, the following four were 0-days at the time of the attack (note they were all patched in spring 2020): CVE-2020-6418: Chrome Vulnerability in TurboFan CVE-2020-0938: Font Vulnerability on Windows CVE-2020-1020: Font Vulnerability on Windows CVE-2020-1027: Windows CSRSS Vulnerability Symantec has the following coverage in place: File-based ISB.CVE-2020-6418!gen1 Exp.CVE-2020-0938 Exp.CVE-2020-1027 Network-based Web Attack: Google Chrome CVE-2020-6418 Web Attack: Microsoft Windows OpenType Fonts CVE-2020-0938 Download Web Attack: Microsoft Windows OpenType Fonts CVE-2020-1020 Download Mobile-based SEP Mobile provides protection against Android related vulnerabilities identified in this operation.
"Sophos" Named Ransomware Researchers recently discovered a new ransomware abusing a legitimate software company name - Sophos. Encrypted files will also be renamed with the extension ".sophos". Aside from common ransomware capabilities such as encrypting of files and dropping of ransom notes, this "Sophos" ransomware also contains some RAT functionalities, including hooking the keyboard driver for keystroke logging and profiling the system using WMI commands. In addition, the ransomware can also check the victim's machine language settings, and won't run if it's in Russian. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.2 WS.Malware.2 Machine Learning-based Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
SoumniBot - Android banking malware SoumniBot is a new banking malware variant for Android. This malware has been reported to target mobile users from Korea. SoumniBot leverages several techniques to evade detection such as invalid compression method value, invalid manifest size or long XML namespace names. Functionality-wise this android malware can collect information about the infected device, contact data, SMS/MMS messages, and exfiltrate digital certificates issued by Korean banks that are stored on the device. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk Android.Reputation.2 AppRisk:Generisk Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
South African fintechs Ozow and PayFast impersonated in smishing campaign Mobile banking in South Africa has been on the rise and gaining popularity among the population. It has played a crucial role in promoting financial inclusion in the country, as many individuals who may not have had access to traditional banking services now have the ability to use mobile banking to conduct financial transactions. However, the rise of mobile banking has also attracted cybercriminals who seek to exploit potential vulnerabilities for their gain. Recently, Symantec has observed a number of SMS phishing (also known as smishing) attempts impersonating Ozow and PayFast, prominent South African fintech companies that provide online payment solutions. These messages include short URLs to malicious websites mimicking the fintechs, prompting users to select their bank and then reveal sensitive information. This can lead to identity theft, financial loss, and potentially further scams. Observed malicious SMS examples (as is - including typos): Ozow Payment. Confirm incoming deposit. Please click this hxxps://dik[.]si/Wepay0zownow to approve deposit to your credit/cheque account from SARS retuns. Ozow Payment. Confirm your deposit. Please visit https hxxps://shp[.]zone/ljiE to complete deposit to your credit/cheque account; 26/07/2023. PayFast:A payment has been sent to your Debit/Credit card vai SARS. Tap LINK hxxps://dik[.]si/Payfastnow02 to recieve payment into your Account, T&C's Apply. Symantec protects you from this threat, identified by the following: Mobile-based Symantec Endpoint Protection Mobile is able to analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake domains used in this campaign are known to WebPulse. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Southeast Asian Government Entity, a target for Stately Taurus APT A cyberespionage attack against government institutions in Southeast Asia facilitated by an APT group 'Stately Taurus' (aka Mustang Panda) has been in operation since 2021 and similar campaigns are still being observed to date. Identical to other APT groups, web shell and backdoor files are initially deployed to maintain access to the victim's machine, followed by various tools and techniques allowing attackers to gather and steal sensitive information from compromised networks. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen6 File-based Hacktool Hacktool.Mimikatz Hacktool.Mimikatz!g4 Scr.Malcode!gdn32 Trojan.Gen.MBT Trojan.Gen.2 Trojan Horse WS.Malware.1 WS.Malware.2 WS.SecurityRisk.1 WS.SecurityRisk.4 Machine Learning-based Heur.AdvML.A Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Heur.AdvML.C Heur.AdvML.M Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Southeast Asian government institution targeted by Gelsemium APT An infection chain operated by an APT group dubbed Gelsemium was spotted by security researchers while administering an investigation into a compromised server for a certain government entity located in Southeast Asia. The attackers initially installed AspxSpy, China Chopper and reGeorg web shells in order to establish persistent access over the compromised server to allow the group to launch additional attacks. OwlProxy and SessionManager were the main backdoors subsequently utilized, with the objective of gathering intelligence from sensitive IIS servers. Symantec protects you from this threat, identified by the following: File-based Hacktool Hacktool.Ace Trojan.Gen.MBT Trojan.Gen.NPE Trojan.Gen.2 Trojan Horse WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.A Heur.AdvML.B Heur.AdvML.C Heur.AdvML.B!100 Heur.AdvML.B!200 Heur.AdvML.A!300 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
South Korean financial industry hit by new Android Fakebank South Korea's financial industry and their customers continue to be targeted by Android malware known as Fakebank. This threat has been around for a few years now but Symantec has recently observed an uptick in this malware, purporting to be legitimate Android applications of well known South Korean finance companies. Fakebank malware is able to collect banking SMS, record phone calls to banks, display a fake bank login UI and intercept Android users’ banking-related incoming and outgoing calls. Symantec Endpoint Protection Mobile has the following coverage in place: Mobile-based Android.Fakebank
SOVA, an Android Banking Trojan Back in September 2021, threat actors behind SOVA claimed that the software was still in its development phase. Now, with a newer version disguised as a fake Android application and masqueraded logos based on some popular apps like Chrome, Amazon and NFT, the threat actors are back, targeting mainly banking applications and crypto exchanges/wallets. Some improvements observed with the current version: Refactored and improved cookie-stealer mechanism Allows the malware to protect itself by intercepting and deflecting attempts made by victims to uninstall the app Attackers can control the specific targets via the command-and- control (C2) interface Allow attackers to grab screenshots, and to record and execute commands VNC (Virtual Network Computing) capability Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT Mobile-based Android.Reputation.2 Web-based Observed IPs/domains are covered under security categories
Spacecolon toolset leveraged for Scarab ransomware delivery Spacecolon is a malicious toolset leveraged to deliver Scarab ransomware variant is some recent campaigns attributed to the threat operator dubbed as CosmicBeetle. The toolset consists of three different modules (installer, hacktool and a service module) and allows the attackers to execute arbitrary commands on the infected systems as well as download and execute additional malicious payloads. CosmicBeetle threat actor has also been reported to use a wide variety of other tools including red-team tools in their attacks. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.SuspBeh!gen625 File-based Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Spam campaign uses tax theme to target Mexican users with TimbreStealer malware A new stealer malware was identified as the payload of a financially engineering spam campaign. This campaign targeted only users in Mexico and lured victims to download the payload by way of a tax related theme. The final payload has been identified as TimbreStealer, a sophisticated stealer leveraging multiple embedded modules to perform its tasks. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen6 Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. File-based Packed.Generic.739 Trojan Horse Trojan.Gen.MBT WS.Malware.1 Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Spanish consumers and small businesses hit by Ransomware While ransomware groups gain all the attention due to their impacts on organizations of all sizes around the world, there are still plenty of lesser ransomware actors that crawl the threatscape. For example, a ransomware that bears no name for now has been observed to have encrypted single machines of both Spanish speaking consumers and small businesses. Post-encryption, files are appended with a random 4 character extension and a short ransom note asking for relatively modest 20 US Dollars in Bitcoin. There are no indications of a double-extortion scheme. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.SuspDrop!gen1 File-based Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B
Spanish digital bank users in SpyNote's crosshairs While monitoring the threat landscape, Symantec came across Android remote access trojan activity targeting mobile users in Spain. The group or individual behind this activity has been attempting to lure users of a known Spanish digital bank with a fake security app ([bank's name] security.apk) – mimicking existing ones that allow users to securely access their bank accounts, approve transactions, and manage their security settings. If a user is successfully tricked into installing the malicious app, they'll end up being compromised with SpyNote, a notorious remote access trojan that's being used by multiple actors around the world. Symantec protects you from this threat, identified by the following: Mobile-based Android.Reputation.1
Spanish organizations targeted in GuLoader malware campaign Malware loaders are a common tactic for cybercriminals to deliver and execute malware on a victim's computer, in the hope of evading detection by security software. Some groups and individuals specialize in loaders and provide their services to others. There are countless loaders in the threat landscape, GuLoader being one that is frequently observed in campaigns around the world. Symantec recently identified a campaign which targets organizations in Spain with malicious billing emails that appear to be from a Spanish construction company. If a victim falls for the social engineering tactic and downloads the malicious binary in the attached archive (PAGO SIXTO.rar) they will end up executing GuLoader. Over the years, this sophisticated malware loader has been used to deliver various types of malware. Just some of the malware families that have been delivered by Guloader include Formbook, Lokibot, Agent Tesla and SystemBC. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products File-based Trojan.Guloader Machine Learning-based Heur.AdvML.C
Specter, Linux RAT There have been reports of a Linux Remote Access Trojan called Specter doing the rounds, targeting vulnerable IP Camera / NVR / DVR devices of a certain maker. Symantec has protection in place for this malware as below: File-based Trojan Horse
SpectralBlur, new macOS backdoor BlueNoroff, also known as TA444, remains active and continues to introduce new MacOS malware families. In a recent campaign, the threat actor has been reported distributing a MacOS backdoor dubbed SpectralBlur. The SpectralBlur malware backdoor incorporates typical features such as file upload and download, file deletion, shell execution, and configuration updates. These actions are executed through commands from a remote command-and-control (C2) server. One distinctive feature of SpectralBlur is its use of pseudo-terminals for remotely executing shell commands, a technique not observed before. SpectralBlur shares similarities with KandyKorn (aka SockRacket), an advanced implant functioning as a remote access trojan capable of taking control of compromised hosts. Symantec protects you from this threat, identified by the following: File-based OSX.Trojan.Gen
SpectralViper backdoor SpectralViper backdoor has been observed in recent campaigns targeting Vietnamese organizations. The backdoor is heavily obfuscated and has functionality for arbitrary file upload/download, command execution and file/directory and token manipulation, among others. The latest campaigns distributing SpectralViper have also been leveraging additional loaders and PowerShell malware throughout the infection chain. DonutLoader, P8Loader and PowerSeal belong to the malware variants used here. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based Trojan Horse WS.Malware.1 Machine Learning-based Heur.AdvML.A Heur.AdvML.B Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories
Spike of activity observed for the GuLoader malware During the last week Symantec observed a spike of activity attributed to the GuLoader malware family. GuLoader is an advanced shellcode-based downloader which aims at delivering a wide range of malware variants including ransomware, infostealers, banking trojans, RATs and Proxies, among others. GuLoader mainly spreads via email spam campaigns leveraging various themes. The final payload might also vary as GuLoader is known to deliver different malware variants including Formbook, Agent Tesla, NanoCore and others. MITRE TTPs known to be used by GuLoader actors include the following: Credentials from Password Stores: Windows Credential Manager [T1555.004] Credentials from Password Stores: Credentials from Web Browsers [T1555.003] Unsecured Credentials: Credentials In Files [T1552.001] Ingress Tool Transfer [T1105] Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder [T1547.001] Exfiltration Over C2 Channel [T1041] Browser Bookmark Discovery [T1217] Forge Web Credentials: Web Cookies [T1606.001] Hide Artifacts: NTFS File Attributes [T1564.004] Command and Scripting Interpreter [T1059] Command and Scripting Interpreter: PowerShell [T1059.001] Process Injection: Process Hollowing [T1055.012] Boot or Logon Autostart Execution: Winlogon Helper DLL [T1547.004] Boot or Logon Autostart Execution: Active Setup [T1547.014] Application Layer Protocol [T1071] Symantec protects you from this threat, identified by the following: Behavior-based ACM.Wscr-Ps!g1 ACM.Wscr-RgPst!g1 SONAR.Powershell!g74 SONAR.SuspBeh!gen82 SONAR.SuspStart!gen2 SONAR.SuspStart!gen6 SONAR.TCP!gen1 EDR-based Symantec EDR is capable of monitoring and flagging this threat actor's tactics, techniques and procedures. Symantec added malware specific threat hunting queries which can be fired on the customer iCDM console. For more information on these queries, refer to this GitHub repository: https://github.com/Symantec/threathunters/tree/main/Trojan/GuLoader Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. File-based Packed.NSISPacker!g14 Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Heur.AdvML.C Network-based System Infected: Trojan.Backdoor Activity 758 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Splunk Remote Code Execution (RCE) vulnerability CVE-2023-46214 CVE-2023-46214 is a recently disclosed remote code execution (RCE) vulnerability affecting Splunk Enterprise platform. Due to a flaw in processing of user-supplied extensible stylesheet language transformations (XSLT), remote attackers might be able to upload malicious XSLT resulting in remote code execution on the affected Splunk instance. The exploit code for the vulnerability has been released publicly and the users are recommended to upgrade to Splunk versions 9.0.7 and 9.1.2 or greater to fix this issue. Symantec protects you from this threat, identified by the following: Network-based Web Attack: Splunk RCE CVE-2023-46214
Spoofed Adobe Creative Cloud email notifications appear in phish runs Adobe Creative Cloud provides a collection of applications for graphic design, video editing, web development, photography and more. Lately, Symantec has observed phishing runs that impersonate Adobe Creative Cloud and entice users to open fake notifications emails. The email body content is kept short and mentions a pending document stored in the cloud. These phish emails make an attempt to lure users to open and click on phish URLs. Upon clicking on the phish URLs presented in the email content, the victims are served with credential harvesting webpages. Email headers: Subject: You have receieved a document through AdobePDF Subject: You Received a New Document From: AdobePDF<redacted_email_address> From: Adobe <redacted_email_address> Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Spoofed Amazon Prime email notifications appear in phish runs Amazon Prime, a paid subscription service from Amazon, provides members with various benefits. Recently, Symantec has observed phishing attempts mimicking Amazon Prime, enticing users to open fake notification emails. Contents of the emails vary from "membership renewal" or "account benefits put on hold" to warnings about account security. These fraudulent emails aim to trick users into clicking on phishing URLs. Email Subject: Your Prime membership is Renewing on Email From: "Prime" <spoofed_email_address> Upon clicking on the phish URLs presented in the email content, the victims are served with credential harvesting webpages. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Spoofed HM Revenue & Customs email notifications appear in phish runs HM Revenue & Customs (HMRC) is United Kingdom's (UK) tax and customs authority that collects taxes such as income tax, corporation tax and capital gain tax. Recently, Symantec has observed phishing attempts mimicking HMRC, enticing users to open fake notification emails. The email mentions that the user profile is not updated. The user needs to update the profile and if not done, the profile will be deleted from HMRC. These fraudulent emails aim to trick users into clicking on phishing URLs. Upon clicking on the phish URLs presented in the email content, the victims are served with credential harvesting webpages. Email Subject: Action Needed: Important Government Gateway Online Account Verification Email From: Government Gateway <spoofed_email_address> Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Spoofed Tele2 refund email notifications appear in phish runs Tele2 is a well-known mobile network provider founded in year 1993 and is headquartered in Stockholm, Sweden. Lately, Symantec has observed phish runs that impersonate Tele2 and entice users to open fake refund notification emails. These phish emails make an attempt to lure users to open and click on phish URLs. Email Subject: Bekräfta din återbetalning från Tele2 Translated Email Subject: Confirm your refund from Tele2 Upon clicking on the phish URLs presented in the email content, the victims are served with credential harvesting webpages. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Spook ransomware - another spin-off from Thanos Spook ransomware is a malware variant first observed around September 2021. There are several indicators and code similarities pointing to links between Spook and earlier ransomware variant called Prometheus, which in turn is an evolution from the Thanos ransomware. Attackers behind Spook target various industries and threaten to release victim's details if ransom demands are not met. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.2 Machine Learning-based Heur.AdvML.B Heur.AdvML.C
Spooky MirCop Ransomware MirCop is an old ransomware with recent variants showing a new spooky zombie-themed twist. The infection starts via a new phishing campaign that suggests communication was lost for a previous arrangement regarding an order supply list. This lure is used to get the victim into clicking the Google Drive URL, which does a download of an MHT file onto the victim's machine. When the MHT file is opened, it does a download of a RAR archive containing an EXE file, which uses VBS scripts to drop and execute the MirCop payload. The ransomware immediately changes the background to a a zombie-themed image and locks files. Symantec protects you from these threats, identified by the following: Behavior-based SONAR.SuspDataRun File-based PasswordRevealer Trojan Horse Trojan.Gen.NPE WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.C Web-based Observed domains are covered under security categories
Spotify users targeted with phishing emails Spotify is a digital music service providing users instant access to its digital library of songs and podcasts. Recently, Symantec has observed a new wave of phishing emails spoofing Spotify services with fake payment notifications. The email content calls out a "payment failure" issue and entices the user to review and update payment details by clicking on a phishing URL ready to steal credentials. Email Subject: We can't process your payment Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Springtail APT group abuses valid certificate of known Korean public entity The Springtail (also known as Kimsuky) APT group has been observed distributing dropper malware disguised as an application from a known Korean public entity. Once compromised, the dropper installs an Endoor backdoor malware. This threat enables attackers to collect sensitive information from the victim or install additional malware. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Untrst-RunSys!g1 ACM.Ps-Schtsk!g1 Behavior-based SONAR.SuspLaunch!g266 SONAR.SuspLaunch!g13 File-based Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
SprySOCKS, a new Linux backdoor used by Chinese espionage-focused threat actor SprySOCKS is the new Linux backdoor used by a Chinese threat actors targeting government agencies in multiple countries. This backdoor is based on a Windows open source malware (Trochilus), ported to Linux, with influences from other malwares like RedLeaves and Derusbi. The threat actor is most recently targeting public facing servers with known vulnerabilities for their initial access and installing Cobalt Strike and subsequent tools, like the SprySOCKS backdoor. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.NPE Linux.Mirai WS.Malware.1 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Spyder Loader malware observed in recent campaigns Symantec has observed a likely continuation of the Operation CuckooBees, this time targeting organizations in Hong Kong. The victims observed in the activity were government organizations, with the attackers remaining active on some networks for as long as a year. While we did not see the ultimate payload in this campaign, based on the previous activity seen alongside the Spyder Loader malware being deployed onto the victims machines, it seems likely the ultimate goal of this activity was intelligence gathering. Read more in our blog: Spyder Loader Malware Seen in Recent Campaign Targeting Organizations in Hong Kong Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Spyload WS.Malware.1
SpyNote campaign: Brazil's agriculture industry targeted Symantec has observed an actor who has been impersonating AgroPart, a service which provides a spare parts catalogue for the agricultural industry, to target Brazilian farmers. They have disguised their SpyNote malware (Agro-Partes.apk) as the AgroPart mobile app in the hope of luring users into installing it. This threat has been around for a few years now, with its source code available to the public and constantly used by multiple groups and individuals around the world. Below are some of its main collection capabilities: Keystrokes Device information Contacts Call logs and SMS messages Photos and videos Information about installed apps Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk
SpyNote campaign using Vietnam's National Public Service as bait SpyNote remote access trojan and its variants are proliferating globally, with groups and individuals employing various social engineering tactics to target mobile users. In a recent campaign, Symantec observed the threat (DỊCH VỤ CÔNG.apk) masquerading as an official app from Vietnam's National Public Service web platform, which offers extensive online public services for both citizens and businesses. This specific campaign has not only been active in Vietnam but also observed in other countries such as Canada and Poland. At this time, it's still unclear how this malicious app is being distributed. SpyNote allows bad actors to remotely control infected Android devices, enabling them to access and steal sensitive data, monitor user activities, and even activate hardware such as cameras and microphones without the user's knowledge. Symantec protects you from this threat, identified by the following: Mobile-based Android.Reputation.1
SpyNote malware continues to target banking customers SpyNote mobile malware family has been seen increasingly targeting banking customers around the end of 2022. The malware's functionality includes data collection and credentials theft from the compromised devices, keylogging, Google Authenticator codes extraction and calls/camera recording, among others. The latest SpyNote.C variant is even advertised and sold via the Telegram channel under the name CypherRAT, as it boasts some additional RAT capabilities. Symantec protects you from this threat, identified by the following: Mobile-based Android.Reputation.1 Android.Reputation.2 AppRisk:Generisk Web-based Observed domains/IPs are covered under security categories
SpyNote Preying on UNHCR Supporters in Yemen In late 2023, Symantec observed an actor targeting Arabic speaking mobile users in Yemen who were willing to provide assistance to UNHCR, a United Nations agency that offers protection and aid to refugees, asylum seekers, stateless individuals, and internally displaced people. The agency's work is funded by voluntary contributions from governments, individuals, and businesses, and plays a crucial role in Yemen, a country facing a complex humanitarian crisis due to ongoing conflict and displacement. The malicious app was disguised as an application (دليل_تقديم_الدعم_من_المفوضية_السامية .apk) that provides information on how to support UNHCR. Users who might be tricked into installing this app, will in fact end up deploying an Android spyware known as SpyNote on their mobile devices. Symantec protects you from this threat, identified by the following: Mobile-based Android.Reputation.1
SpyNote Spyware Targeting Banking Sectors SpyNote Android spyware has been making the rounds since 2016 and another campaign was recently spotted by threat researchers. The attack was direct and focused on bank sectors from the European region, being delivered via smishing (SMS phishing). Victims are asked to download and install a “new certified banking app” before a subsequent message provides directions for users to launch a TeamViewer instance, which in reality is the initial step to allow access to the victim's device. SpyNote's list of capabilities: Keylogger SMS Collection & 2FA Bypass C2 Communications Screen Recording and Defense Evasion Symantec protects you from this threat, identified by the following: File-based WS.Malware.1 Mobile-based Android.Reputation.2 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Squid Game-Themed Threats It is no surprise that threat actors have once again hopped aboard the latest craze, this time capitalizing on the immensely popular Korean survival drama series 'Squid Game'. Opportunities are widespread and various Squid Game-themed malware and scam subjects have been observed. They include trojanized mobile applications, adware, fake streams, and even phishy offers of Halloween costumes. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT Mobile-based AdLibrary:Generisk Android.Reputation.2
Squirrelwaffle loader emerges in the wild We are aware of recent reports calling out the new emerging loader malware dubbed as SquirrelWaffle. It has been reported that the loader is being delivered via infrastructure associated previously with a known Qakbot affiliate named "TR". SquirrelWaffle is spread via malspam campaigns with embedded URLs. The links point to .zip archives containing Word documents with malicious VBA macros. SquirrelWaffle payload delivered by the current campaign has been reported as CobaltStrike. Symantec protects you from this threat, identified by the following: File-based ISB.Downloader!gen430 ISB.Dropper!gen15 Heur.AdvML.B Heur.AdvML.C Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE W97M.Downloader Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains are covered under security categories
SquirrelWaffle loader used to deliver Qakbot and Cobalt Strike payloads SquirrelWaffle loader malware first emerged in September 2021. According to the latest report, SquirrelWaffle remains active in the wild and is being leveraged to download Qakbot or Cobalt Strike payloads. The malware is known to be delivered via malspam campaigns containing malicious .doc or .xls attachments. Symantec protects you from this threat, identified by the following: File-based ISB.Downloader!gen430 ISB.Dropper!gen15 Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE Trojan.Mdropper W97M.Downloader Machine Learning-based Heur.AdvML.B Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories
Srry Stealer spreading via malicious JavaScript SrryStealer is a newly identified info stealer that covertly infiltrates a victim's system through a malicious JavaScript file. Upon execution, it attempts to terminate a list of targeted processes, including those associated with browsers and Discord. Subsequently, it proceeds to harvest a wide range of data, including system information and personal saved data such as login credentials, browser history, autofill passwords, credit card details, cryptocurrency wallets, and Discord tokens. The gathered data is then exfiltrated to the threat actor's command-and-control (C2) servers. Symantec protects you from this threat, identified by the following: File-based Infostealer Trojan Horse WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.A!400 Network-based 29565_Web Attack: Webpulse Bad Reputation Domain Request Policy-based Symantec Data Center Security (DCS) provides Multi-layered protection from this Infostealer. Suspicious Process Execution: Prevention policies prevent malware from being dropped or executed on the system. Network Control: Prevention policies block outgoing connections to public internet ( mythic-slender[.]online) in this case. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
SSLoad and Cobalt Strike leveraged in compromised "Contact Form" campaign A new loader has emerged called SSLoad, distinct from SLoad. Reports reveal a campaign where attackers were observed abusing and sending malicious links via contact forms. Clicking these links will download and install the SSLoad malware, then this DLL-based loader will deploy further backdoors and payloads, including a Cobalt Strike beacon to establish connection to the attacker's C2 servers to exfiltrate system and user information. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Ps-Wscr!g1 ACM.Wmip-Net!g1 File-based ISB.Downloader!gen195 PUA.Gen.2 Scr.Malcode!gen137 Trojan.Gen.MBT WS.Malware.1 WS.SecurityRisk.3 WS.SecurityRisk.4 W32.Fixflo.B!inf Machine Learning-based Heur.AdvML.A Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Heur.AdvML.C Network-based Audit: Scripting Host Processes Making Network Connections Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Statc Stealer Threat researchers have reported a new infostealer dubbed Statc Stealer. This info-stealing malware infects Windows devices and steals a broad range of information from their victims. Stact Stealer also supports filename discrepancy checks in order to evade sandbox detection. Initial attack will commence from a click on a malicious Google Chrome based ad that would download a malicious file. Launching of the malicious file results in a PDF decoy and a downloader binary file getting dropped. The binary file will subsequently download the Statc stealer via a PowerShell script. Obtained victim's information will be encrypted and subsequently transmitted to the attacker's dedicated C&C server. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.2 Trojan Horse WS.Malware.1 WS.Malware.2 W32.Qakbot Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Stately Taurus APT Campaign Targeting Asian Countries Researchers observed a recent Stately Taurus (aka Mustang Panda) APT campaign during an ASEAN-Australia Special Summit held just this month targeting Asian countries. Two malware packages were created and deployed for this recent attack - one is a ZIP format and the other one is a SCR file. Both of these packages' main goal is to deploy malware with the use of abused copies of applications from known software developers like QFX Sofware Corporation and Electronic Arts, Inc.. Initial infection would commence from an executable file that would subsequently sideload a malicious DLL and the final step is to load a decrypted code that would establish connection between the victim's machine with the attacker's dedicated C2 server to be able to conduct cyberespionage activities. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Ps-Rd32!g1 File-based Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Stately Taurus APT conducting campaigns targeting the Philippines Stately Taurus APT group (aka Mustang Panda) has been observed to target institutions across the South Pacific region, including the Philippines government in their recent campaigns dating back to August. The attackers have been abusing legitimate software to sideload malicious binaries. Among the abused apps were the Solid PDF Creator application and the SmadavProtect antivirus application. The threat group has also been attempting to masquerade the C2 traffic as legitimate Microsoft connections. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Network- based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
"Steal-It" exfiltration campaign A new infostealing and exfiltration campaign dubbed as "Steal-It" has been reported in the wild. According to a recent report, the campaign has been attributed to the APT28 threat actor also known as Fancy Bear. The attackers have been leveraging customized scripts based on the Nishang framework to steal NTLMv2 hashes and system information from the compromised systems and perform the exfiltration of the collected data with the help of Mockbin APIs. The infection chain involves the use of compressed .zip archives containing malicious .lnk files, that in turn lead to the execution of malicious PowerShell scripts based on the Nishang framework. The campaign has been reported to leverage a geofencing strategy and target specific regions including Australia, Poland, and Belgium. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.NPE Trojan Horse WS.Malware.2 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Stealc Infostealer Vidar, Raccoon, Mars and Redline gave birth to a new malware dubbed Stealc. It was reported that in the underground forums Stealc is rapidly gaining in popularity due to its stealing capabilities such as running a customizable file grabber. This allows the attackers to steal files matching their 'grabber rules', upload the stolen files to the attacker's dedicated C2 server and wipes traces of infection afterwards. Symantec protects you from this threat, identified by the following: File-based Trojan Horse WS.Malware.1 Machine Learning-based Heur.AdvML.A Heur.AdvML.B Web-based Observed domains/IPs are covered under security categories
StealC malware distributed in a recent campaign StealC is an infostealer variant focused on theft of confidential information including browser-stored data, cookies, cryptocurrency wallets or data from various messaging applications. In a recent campaign StealC binaries have been disguised as installer/setup files for various well known applications or cracked software installations. The fake installers are distributed via publicly accessible file repositories such as GitHub, Mega or Dropbox, among others. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.Stealer!gen2 File-based Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Stealth Soldier backdoor used in attacks against Libyan organizations Stealth Soldier is a newly discovered backdoor variant leveraged in espionage and surveillance campaigns targeting organizations in Libya. The malware functionality includes keylogging, file ex-filtration, screenshot grabbing, web-browser data and credentials theft, among others. The command and control (C&C) addresses used by the malware indicate certain relations to a larger set of domains previously being used in phishing attacks and masqueraded as websites of the Libyan Foreign Affairs Ministry for example. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories
SteganoAmor campaign attributed to TA558 threat group A new malicious campaign dubbed as SteganoAmor has been attributed to the TA558 threat actor. The attackers have been leveraging steganography techniques by concealing malicious code inside image files. TA558 is a threat group know to target tourism and hospitality sectors with extensive focus on targets located in Latin America. In their attacks the group continues to leverage an old Microsoft Office Equation Editor vulnerability from 2017 - CVE-2017-11882. The observed delivered payloads might vary and include malware from Remcos, Agent Tesla, Formbook, Guloader, Lokibot, Xworm and several other families. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.Stealer!gen1 SONAR.SuspLaunch!g13 SONAR.SuspLaunch!g266 SONAR.SuspStart!gen15 SONAR.TCP!gen1 File-based Downloader Exp.CVE-2017-11882!g2 Exp.CVE-2017-11882!g3 Exp.CVE-2017-11882!g5 ISB.Downloader!gen40 Packed.NSISPacker!g14 Scr.Malcode!gen Scr.Malcode!gen3 Scr.Malcode!gen59 Scr.Malcode!gdn33 Scr.Malcode!gdn34 Trojan.Gen.MBT Trojan.Gen.NPE Trojan.Gen.NPE.C Trojan.Mdropper VBS.Downloader.Trojan Web.Reputation.1 WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Network-based System Infected: Bad Reputation Application Connecting to Cloud Storage Web Attack: Malicious File Download 11 Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Stickman eyes crypto wallets Over the past few weeks, Symantec have observed another crypto wallet clipper in the threat landscape. It's true name is not clear, but we are calling it "Stickman the Clipper" for now, as a stickman carrying a wallet is featured on its C2 login panel. The actors behind this threat are primarily distributing it as fake software and hacktools via drive-by-downloads. Clippers are extremely common these days as they take advantage of the growing use and value of cryptocurrencies, even when the crypto world has been shaken by the fall of popular cryptocurrency exchanges. Symantec protects you from this threat, identified by the following: File-based Trojan.Banclip Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B
Sticky Werewolf targets public organizations in Poland Sticky Werewolf, last reported in October 2023 targeting organizations in Russia and Belarus, has now been observed in recent campaigns targeting public organizations in Poland. These attacks utilize spear-phishing techniques, where phishing emails contain links to malicious files with .exe extensions, disguised as PDF documents. Clicking on these files leads to the download of a Darktrack RAT payload. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Untrst-FlPst!g1 File-based Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
STOP / DJVU ransomware still observed in the wild STOP ransomware (known also as DJVU) has been active for the last several years and new variants of this malware continue to be found in the wild compromising both consumer and enterprise users. STOP ransomware is known to be mostly distributed via cracked software and drive-by-downloads. The malware appends four-letter extensions to the encrypted files. Some examples of extensions used by most recently discovered variants of this ransomware include: .zoqw, .zouu, .poqw, .mzqw, .mzop and .mztu. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based Downloader Packed.Generic.528 Ransom.Pots Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Network-based System Infected: Ransom.DJVU Activity 4 System Infected: Trojan.Backdoor Activity 634
STOP ransomware (aka DJVU) activity continues Threat actors behind STOP ransomware (also known as DJVU) have been active for a few years now and continue to be observed around the globe compromising both consumer and enterprise users. STOP ransomware is mostly distributed via cracked software and drive-by-downloads but unlike some of its more infamous ransomware counterparts, the double extortion tactic is not being used. Interestingly, recent reports and analysis have shown that this threat won't execute its encryption routine if the victim is located in the following countries: Russia, Belarus, Ukraine, Azerbaijan, Armenia, Tajikistan, Kazakhstan, Kyrgyzstan, Uzbekistan and Syria. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.Ransomstop!gen7 File-based Packed.Generic.620 Trojan.Gen.MBT Ransom.Pots Ransom.Pots!gen2 Machine learning-based Heur.AdvML.B Network-based System Infected: Trojan.Backdoor Activity 634 System Infected: Trojan.Ransomware Activity 58
STOP ransomware at large New variants of the STOP ransomware, also known as DJVU, are consistently emerging in the wild. STOP ransomware is primarily distributed through cracked software and drive-by downloads. Once activated, the malware encrypts user files and appends four-letter extensions to them, such as .cdqw, .nbzi, etc. Following the encryption process, a ransom note text file named "_readme.txt" is displayed, demanding payment in Bitcoins. Symantec protects you from this threat, identified by the following: Behavior-based Ransom.Pots File-based Ransom.Zombie Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Network-based System Infected: Trojan.Backdoor Activity 634 (33246) Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
StormKitty stealer observed in drive-by-download and malspam campaigns StormKitty stealer is a threat whose code is available to the public, being posted on a well-known internet hosting service for software development and version control. It's not a new infostealer and its prevalence fluctuates based on echoes of its existence on social media, hacking forums and websites. Over the last few weeks, Symantec has seen a slight activity increase related to drive-by-download (e.g. cracked software and fake updates) and malspam (SWIFT social engineering) campaigns. This malware has nothing that makes it stand out from other similar infostealers, mainly stealing passwords, discord token and crypto wallets. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products File-based Scr.Malcode!gdn34 Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B
StrelaStealer malware continues to target Spanish users StrelaStealer is an infostealer variant initially discovered back in 2022 and known to be targeting specifically Spanish users. In contrary to campaigns from last year that were using ISO files during the attack chain, this years' campaigns switched to the use of ZIP files. Inside the distributed ZIP archives there are malicious .PIF files that lead to the malware infection. Once executed on the targeted machine, StrelaStealer will search for email account credentials of popular email clients like Outlook and Thunderbird and exfiltrate the collected information to C2 servers controlled by the attackers. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based Trojan Horse WS.Malware.1 Machine Learning-based Heur.AdvML.B Web-based Observed domains/IPs are covered under security categories
StrigoiMaster: Blood thirsty RAT with fangs Symantec Security Response recently came across a new Remote Access Trojan (RAT). Likely named after troubled spirits in Romanian mythology which are referred to as vampires in modern times, Strigoi Master is a JAVA-based RAT that can be purchased on the underground. As the name suggests, compromised machines will be under control of the RAT master. The malware's features include: Remote VNC Live and Offline keylogging Download and execute remote files Reboot and shut down remote computer Symantec provides the following detection against StrigoiMaster RAT: Trojan.Dropper Trojan Horse
STRRAT: Global campaign observed STRRAT is not a new threat, having been around for some time now and still actively used by groups and individuals worldwide to fuel localized, global, targeted, and non-targeted campaigns. In a recent example, Symantec observed an actor who typosquatted a well-known German multinational pharmaceutical and biotechnology company to conduct a spearphishing campaign. The email subject was "CONFIRM VERBAL GERMANY ORDER (JUNE)," and it targeted various industries in Europe, the Middle East, Asia, Latin America, and North America. The campaign employed a classic "Quote" lure and a .cab attachment containing a malicious Java script file (the STRRAT malware) designed to perform remote access and control of infected systems. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products File-based ISB.Dropper!gen12
Subzero malware leveraged by the KNOTWEED group A threat group known as Knotweed has been linked to numerous spyware attacks on law firms, banks, and strategic consultancies in countries around the world. The threat actors have been leveraging malware dubbed Subzero which consists of two specific components, a persistent loader called Jumplump and the primary payload called Corelump. The malware is spread through exploits in Windows and Adobe Reader from various campaigns in 2021 and 2022. Subzero allows the attackers to hack into targets' computers and run arbitrary commands via remote shells and ex-filtrate various confidential data, including files, keystrokes or screenshots. Symantec protects you from this threat, identified by the following: File-based Hacktool.Mimikatz Trojan Horse W97M.Downloader WS.Malware.1 WS.Malware.2 Policy-based Symantec Data Center Security hardening policies prevent malware tools and payloads used by KNOTWEED from getting installed on Windows systems. The Software Install Restrictions in the DCS policy prevent the threat from tampering the systems with trojanized binaries. DCS hardening policy also prevents the downloader shellcode from connecting to the C2 server to download any payloads. Web-based Observed domains are covered under security categories
SugarGh0st malware - a customized Gh0st RAT in the field SugarGh0st, a customized variant of the Gh0st RAT family, has emerged in the wild. It’s been detected in campaigns aimed at the Uzbekistan Ministry of Foreign Affairs and South Korean users. The infection process utilizes Windows Shortcut files containing malicious Javascript to deploy DLL loaders and execute SugarGh0st binaries. This malware is capable of gathering system details, executing diverse file operations, enabling remote control by attackers, initiating reverse shell, and executing arbitrary commands sent by the attackers. Symantec protects you from this threat, identified by the following: Behavior-based ACM.Ps-Rd32!g1 ACM.Ps-Wscr!g1 ACM.Wscr-CPE!g1 ACM.Wscr-CNPE!g1 AGR.Terminate!g2 AGR.Terminate!g6 SONAR.SuspLaunch!g78 File-based Backdoor.Trojan Trojan Horse Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Sumitomo Mitsui Banking Corporation (SMBC) users targeted with a new phishing wave Sumitomo Mitsui Banking Corporation (SMBC) is a Japanese multinational bank headquartered in Chiyoda City, Tokyo, Japan. Lately, Symantec has observed phish runs that impersonate SMBC's services and entice users to open fake notifications emails. The email body content is kept short and mentions to confirm SMBC card usage. These phish emails make an attempt to lure users to open and click on phish URLs. In this phish wave, the threat actors have made use of typo-squatting to impersonate the legit SMBC website URLs. Email Subject:【重要なお知らせ】三井カードご利用確認のお願い Translated Email Subject: [Important Notice] Request for confirmation of Mitsui Card usage Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
SunCrypt infections may lead to data leaks We have been aware of some recent attack campaigns related to the SunCrypt ransomware. SunCrypt is a ransomware variant that first emerged around October 2019 but it was not very widespread at that time. More recent reports of SunCrypt activities started around August 2020, when the group behind it released a dedicated leak website. On it they started to publish stolen data of victims who refused to pay for the decryptor. Similar tactics of stealing data from victims before encrypting it have been used by various other ransomware actors in the past. Around the time of the leak site release, the SunCrypt group also made claims to be associated with the Maze ransomware gang. While some SunCrypt samples indeed show traffic to IP addresses seen previously in Maze operations, any closer affiliation between those two groups has not been confirmed. SunCrypt uses a heavily obfuscated Powershell loader to initiate the infection. The loaded malware then utilizes the ChaCha cryptographic algorithm to encrypt the victim's files. As with many other ransomware variants, the encrypted files may never be recovered. We recommend regular backup procedures of any important files and applying the latest product definitions to protect against the ransomware threat. Symantec offers the following protections File-based Ransom.Gen Trojan.Gen.NPE Network-based [32436] Attack: Ransom.Gen Activity 29
Sunloginclient CVE-2022-10270 vulnerability exploited in the wild Sunloginclient is a remote control application for monitoring and accessing various devices in the IT environment. Sunloginclient suffers from a vulnerability (CVE-2022-10270) that can lead to execution of arbitrary code. The vendor has released a patch to address the vulnerability. Meanwhile Symantec is observing attackers currently exploiting the vulnerability to drop various malware variants including coin miners. Symantec protects you from this threat, identified by the following: Network-based Web Attack: Sunlogin RCE Vulnerability
SuperBear RAT malware A Remote Access Trojan (RAT) dubbed SuperBear has been distributed in a recent campaign targeted at South Korean journalists. The initial attack vector was a phishing email containing a .LNK file that once run would lead to a malicious PowerShell script execution. Further down the attack chain, the threat actors have been leveraging an AutoIT3 compiled script responsible for process injection operations. The final payload of this campaign is SuperBear RAT and it has the capabilities to exfiltrate data from the infected endpoints as well as download / execute arbitrary shell commands and DLL libraries. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
SupermanMiner continues to evolve Recently, attention has been drawn to SupermanMiner, a cryptominer that has been active in the threat landscape since 2021. This malicious software consists of multiple components, and reports indicate the existence of at least eight variants currently circulating. SupermanMiner is a Monero mining trojan written in the Go programming language, and it utilizes Google Sites to host custom web pages for the distribution of malware. Historically, the threat actors associated with SupermanMiner have employed various techniques such as vulnerability exploitation, SSH brute force and web shell injection to carry out their attacks. Symantec protects you from this threat, identified by the following: File-based PUA.Gen.2 Trojan Horse Trojan.Gen.NPE WS.Malware.1
Supply-chain attack on Asian gaming industry Symantec Security Response is aware of a report that a small number of gaming companies were affected by malware delivered through the compromised update mechanism of a popular Android gaming emulator for Windows and Mac. According to the report, the victims are all located in Asia. The malware used in this attack are Backdoor and Remote Access Trojan (RAT). Symantec provides the following protection against this attack: File-based: Trojan Horse Trojan.Gen.MBT Web-based Observed domains are covered under security categories
Surtr Ransomware Surtr Ransomware-as-a-Service has been around since at least late 2021 and more recently observed in Korea per reports. Upon successful infection, as many ransomware do, it will attempt to delete shadow copies and encrypt files (appending .surtr extension). It is also able to encrypt mounted drives and network shares. Actors behind this threat employ the dreaded double-extortion tactics. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.SuspLaunch!g18 File-based Ransom.Surtr Trojan.Gen.MBT Network-based Attack: Ransom.Gen Activity 46 Machine Learning-based Heur.AdvML.B
SVCReady loader used in campaigns delivering RedLine stealer A new loader, dubbed SVCReady, is being used in phishing attacks involving malicious Word documents. SVCReady has been reported to leverage an unusual technique to load malware payloads. While many maldocs just use malicious macros to download payloads, here the malware uses VBA macro code to run shellcode hidden in the file properties. One of the most recent campaigns where SVCReady has been used, has seen the Redline infostealer being delivered as a payload to the compromised systems. Symantec protects you from this threat, identified by the following: File-based ISB.Downloader!gen177 Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE W97M.Downloader WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.C Heur.AdvML.M Web-based Observed domains are covered under security categories
SwiftSlicer - new wiper discovered in Ukraine A new wiper attack was uncovered in Ukraine and is attributed to the Sandwork APT group. This new malware is called "SwiftSlicer". It is highly versatile and destructive as it seeks to delete backups and corrupt/delete Windows system files. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.C
Symantec coverage details for Microsoft's October Patch Release On October 13, Microsoft published their regularly scheduled monthly updates. For the October release Microsoft addressed 87 vulnerabilities. Symantec has introduced the following protections based on available information. File-based (CVE-2020-16898) - Exp.CVE-2020-16898 Network-based (CVE-2020-16896) - OS Attack: Windows Remote Desktop Protocol CVE-2020-16896
Symantec coverage details for Microsoft September Patch Release On September 8, Microsoft published their regularly scheduled monthly updates. For the September release Microsoft addressed 129 vulnerabilities. Symantec has introduced the following protections based on available information. (CVE-2020-0664) Attack: Microsoft Active Directory CVE-2020-0664
Symantec coverage details for the Microsoft August Patch Release On August 11, Microsoft published their regularly scheduled monthly updates. For the August release Microsoft addressed 120 vulnerabilities. Symantec has introduced the following protections based on available information. File based (CVE-2020-1380) - Exp.CVE-2020-1380 (CVE-2020-1587) - Exp.CVE-2020-1587 Network based (CVE-2020-1380) - Web Attack: Microsoft Internet Explorer CVE-2020-1380 (CVE-2020-1567) - Web Attack: Internet Explorer Remote Code Execution (CVE-2020-1570) - Web Attack: Microsoft Internet Explorer CVE-2020-1570
Symantec coverage for 'Zerologon' vulnerability (CVE-2020-1472) In the August patch release from Microsoft they addressed a Netlogon vulnerability identified as CVE-2020-1472. In recent weeks there has been much discussion about the dangers of potential exploitation which includes the release of proof of concept code. Successful exploitation of the vulnerability, given the name Zerologon, could allow for a malicious attacker to assume control of an Active Directory domain controller. Customers are advised to have applied the available updates to secure any at risk network environment. Symantec has released the following signatures to offer protection against possible exploitation of this vulnerability. File based Exp.CVE-2020-1472 Network based [SID 32577] OS Attack: Microsoft Netlogon CVE-2020-1472