text
stringlengths 0
383k
|
---|
Symantec coverage for FASTCash 2.0 campaign
Details about a recent campaign called FASTCash 2.0 have been published by the US government. The malicious activity has been attributed to a threat actor named BeagleBoyz which is reportedly under the HIDDEN COBRA umbrella. The attack has targeted numerous financial institutions around the world in an ATM cash-out scheme. Attacks involve injection into the target institution network followed by reconnaissance and further compromise to allow for monetization. FASTCash related activity has reportedly been performed by this group since 2016.
Symantec Protections
Heur.AdvML.C
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE |
Symantec coverage for malware used by OldGremlin
Recent reports have identified a Russian threat actor group named OldGremlin which has been observed targeting Russian entities. Attack campaigns associated with this group typically involve phishing emails with malicious attachments or links that install a custom piece of malware. This malware is then used to perform additional activity including network propagation, data exfiltration, reconnaissance, or file downloads and execution. The intended payload of these attacks are to infect systems with TinyCryptor ransomware.
Symantec provides the following protections for indicators associated with this group:
File based
CL.Downloader!gen20
CL.Downloader!gen234
Heur.AdvML.C
ISB.Heuristic!gen5
Trojan Horse
Trojan.Gen.NPE |
Symantec coverage for Qbot's New Tricks
The infamous malware family Qbot (aka Qakbot) has introduced some new functionality to its already comprehensive list of capabilities. Security Response has observed the inclusion of an email collector module into recently seen Qbot samples. This module is responsible for collecting emails from a compromised target for use in subsequent social engineering malspam campaigns. This feature comes in addition to the information stealing, remote control and payload execution capabilities already present in this family.
Symantec protections include the following:
File based
Heur.AdvML.B
ISB.Downloader!gen346
Packed.CryptOne!gen1
Trojan.Anserin
Trojan.Gen.MBT
VBS.Dropper!gen2
Network based
System Infected: JS.Downloader Activity 33 |
Symantec Coverage for Recently Observed Thanos Ransomware
According to a recent report, Thanos Ransomware was observed targeting two state-run organizations in the Middle East and North Africa. There are indications that the threat actor behind the attacks had previously gained entry into the organizations to obtain valid credentials. These credentials were then used in conjunction with Powershell scripts to distribute the Thanos Ransomware within the affected networks in later attacks.
Symantec has the following detections for associated IOCs:
Downloader
Ransom.Cryptolocker
Ransom.Gen
Ransom.Thanos
Trojan Horse
Trojan.Malscript |
Symantec coverage for recent Trickbot/Emotet campaign
On September 11 we observed a new email campaign attempting to deliver malware. The campaign leveraged an attachment with a malicious macro that was responsible for delivering either the Trickbot or Emotet Trojans to victims. The attack made use of hidden text within the attached document to pass parameters to a non-obfuscated macro. This in turn created a base64 encoded text file that is later decoded into a dll downloader payload, which masqueraded as a pdf file. The dll is responsible for downloading the Trickbot or Emotet payloads.
Subjects and attachment names used in this campaign include the following:
all the details
doc
documents
paperwork
The attachment is typically named in the format of Doc_XXXX.doc where XXXX is a random four digit number.
Symantec provides the following protections against this attack:
File based
Downloader
Heur.AdvML.C
Trojan.Trickybot
W97M.Downloader
Email
Trojan.Dridex |
Symantec coverage for Remote Access Trojan BLINDINGCAN
A new malware analysis report was released on August 19 which provides technical details regarding BLINDINGCAN, a remote access Trojan. This Trojan has reportedly been used by the HIDDEN COBRA actor group to perform espionage against targets of interest. This particular campaign involved targeting government contractors via socially engineered malicious Office documents in an attempt to install the BLINDINGCAN implant. The suspected objective of the campaign is to obtain intelligence related to key military and energy technologies.
Symantec has confirmed coverage for the available IOCs under the following names:
File based
Backdoor.Trojan
Hacktool
Trojan.Gen.NPE
Trojan.Mdropper
Trojan.Volgmer.B
Network based
System Infected: Backdoor.Trojan Activity 254
System Infected: Backdoor.Trojan Activity 255 |
Symantec coverage observed for Trickybot Banking Trojan during August
There has been a lot of recent news regarding the resurgence of the Emotet banking Trojan and its return from dormancy. While active, Emotet related activity typically accounts for the most visibility among banking Trojans. Based on intelligence collected for the previous month we can see that the second most active banking Trojan during the period has been Trickybot. Data taken from prior to this period suggests that Trickybot activity has been consistent as opposed to the inconsistent spikes observed with Emotet.
Security Response has observed the following detections for Trickybot during the month of August.
File based
Trojan.Trickybot
Trojan.Trickybot!g12
Trojan.Trickybot!g13
Trojan.Trickybot!g7
Trojan.Trickybot!gen1
Trojan.Trickybot!gen2
Trojan.Trickybot!gen6
Network based
System Infected: Trojan.Trickbot Activity
System Infected: Trojan.Trickybot Activity 10
System Infected: Trojan.Trickybot Activity 12
System Infected: Trojan.Trickybot Activity 15
System Infected: Trojan.Trickybot Activity 3
System Infected: Trojan.Trickybot Activity 5
System Infected: Trojan.Trickybot Activity 7
System Infected: Trojan.Trickybot Activity 9 |
Symantec Protection for Malspam campaign using GuLoader
Security Response has become aware of reports of malspam campaigns using GuLoader, returning around the second week of July after it's activity dropped off in late June. It is known that GuLoader has a connection with an Italian software company called CloudEye. When CloudEye announced their business resumption after a month of interruption, an increase in malspam activity using the classic DHL delivery lure pushing GuLoader was observed.
Symantec Protections
AV: Trojan.Gen.2
Email: W32/Generic |
Symbiote - a new malware targeting Linux
A new malware targeting the Linux platform and dubbed as Symbiote has been discovered in the wild. Instead of using standalone malicious executable, Symbiote comes in form of a shared object (SO) library loaded into all running processes on the compromised machine. The malware allows the attackers remote access to the machine and ability to collect user credentials among others. Similarly as BPFDoor malware discovered just last month, Symbiote leverages Berkeley Packet Filter (BPF) to hide its communication on the infected host.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.NPE
WS.Malware.1
WS.Malware.2
Web-based
Observed domains are covered under security categories |
Sync-Scheduler Infostealer
A Infostealer dubbed as Sync-Scheduler, written in C++, has been reported as being distributed concealed within Office document files. The malware employs file-nesting techniques to conceal its presence and is equipped with anti-analysis and defense evasion techniques. Upon compromising systems, it searches through users' personal directories for office documents such as Word, PowerPoint, and Excel files. The stolen data is then exfiltrated over the network as form-data.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.MalTraffic!gen1
File-based
Trojan.Gen.MBT
Trojan Horse
WS.Malware.1
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.C
Network-based
Audit: Bad Reputation Application Activity
System Infected: Bad Reputation Process Request 4
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
SYS01 Stealer goes after Facebook business accounts
SYS01 Stealer is a type of infostealing malware recently leveraged in campaigns targeting Facebook business accounts belonging to individuals related to governmental institutions and manufacturing industries, among others. The attackers make use of Google Ads or fake Facebook profiles in order to distribute the malicious payloads to unsuspecting victims. SYS01 Stealer is designed to steal confidential information such as login credentials, Facebook business account information, cookies and others.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
SONAR.TCP!gen6
File-based
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.B
Web-based
Observed domains/IPs are covered under security categories |
SysAid IT Support Software zero-day vulnerability exploited in the wild
A new campaign exploiting a zero-day flaw in SysAid IT support software has been reported. The threat actor Lace Tempest has been associated with these targeted attacks. The identified issue, labeled as CVE-2023-47246, revolves around a path traversal flaw capable of enabling code execution within on-premise installations. Following the exploitation of this vulnerability, the threat actor utilized the compromised SysAid software to issue commands, facilitating the delivery of a malware loader for the Gracewire malware..
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.NPE
WS.Malware.1
Machine Learning-based
Heur.AdvML.A
Network-based
Web Attack: SysAid Path Traversal CVE-2023-47246
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
SYSDF Ransomware
SYSDF is a recently identified Dharma/Crysis ransomware variant. The malware encrypts user files and appends .SYSDF extension to them. In addition, a unique victim ID and a malware developers' email address is added as well. SYSDF drops the ransom note in the form of a text file onto the victims' machine. The malware includes the capabilities to delete the volume shadow copies on the infected host .
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Ps-RgPst!g1
ACM.Vss-DlShcp!g1
Behavior-based
SONAR.RansomCrys!g2
File-based
Ransom.Crysis
Ransom.Crysis!gm
SMG.Heur!gen
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B!100
Heur.AdvML.B!200 |
Syslogk - a new Linux rootkit discovered
A new Linux rootkit dubbed Syslogk has been discovered in the wild. According to a recent report, Syslogk is based on an older open-source rootkit known as Adore-Ng and appears to be under active development. The rootkit has functionality to hide directories containing malicious files on the infected machine as well as malicious network traffic. Syslogk also has the ability to hide a malicious payload - in this case a backdoor from the Rekoobe malware family.
Symantec protects you from this threat, identified by the following:
File-based
Backdoor.Trojan
Trojan Horse
Trojan.Gen.2
Trojan.Gen.NPE
WS.Malware.2 |
Sysrv-Hello exploits multiple vulnerabilities for cryptomining
Sysrv-Hello is a Monero cryptoming botnet that emerged in the wild around December 2020. According to multiple reports, the botnet has been increasingly active this year and has been consistently adding new exploits to target more vulnerable systems. The initial multi-component build of the malware has been replaced by a single binary in the latest revision, that is capable of both cryptomining and spreading to other systems. Over the last months Sysrv-hello has been observed exploiting a larger amount of vulnerabilities, among others:
CVE-2021-3129 - Laravel
CVE-2020-16846 - Saltstack
CVE-2020-14882 - Oracle Weblogic
CVE 2019-11581 - Atlassian Jira Server
CVE-2019-10758 - Mongo Express
CVE-2019-7238 - Sonatype Nexus Repository Manager
CVE-2019-3396 - Atlassian Confluence Server
CVE-2019-0193 - Apache Solr
CVE-2018-7600 - Drupal Ajax
CVE-2017-12149 - Jboss Application Server
CVE-2017-11610 - XML-RPC
CVE-2017-9841 - PHPUnit
CVE 2017-5638 - Apache Struts MVC
Symantec protects you from this threat, identified by the following:
File-based:
Downloader
Heur.AdvML.B
Heur.AdvML.C
Miner.XMRig
Trojan.Gen.MBT
Trojan.Gen.NPE
Trojan Horse
Network-based:
Attack: Apache Struts CVE-2017-5638
Attack: Mongo Express RCE CVE-2019-10758
Web Attack: Atlassian Confluence Server CVE-2019-3396
Web Attack: Coinminer Download 5
Web Attack: Drupal RCE CVE-2018-7600
Web Attack: Jira Remote Code Execution CVE-2019-11581
Web Attack: Laravel RCE CVE-2021-3129
Web Attack: Malicious File Download 52
Web Attack: Oracle Weblogic Server RCE CVE-2020-14882
Web Attack: PHPUnit RCE CVE-2017-9841
Web Attack: SaltStack Remote Code Execution CVE-2020-16846
Web Attack: Sonatype Nexus Repository Manager RCE CVE-2019-7238
Web Attack: Trojan.Coinbitminer Download
Web-based
Observed domains are covered under security categories |
SystemBC (Coroxy) continuous activities
SystemBC (also known as Coroxy) is a proxy bot malware well known on the threat landscape and distributed by various threat groups in recent years. Its functionality is quite diverse starting with data collection from the compromised systems, establishing persistence, setting up SOCKS5 proxies for malicious traffic tunneling as well as download and execution of additional arbitrary payloads including ransomware. SystemBC is known to be sold on the underground markets and often distributed by various loaders in malspam campaigns.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
File-based
Backdoor.SystemBC
Backdoor.SystemBC!g1
Backdoor.SystemBC!g2
Backdoor.SystemBC!g3
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.A!400
Heur.AdvML.A!500
Heur.AdvML.B!100
Heur.AdvML.B!200
Network-based
System Infected: Trojan.Backdoor Activity 597
System Infected: Trojan.Backdoor Activity 634
System Infected: Trojan.Backdoor Activity 721
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
SystemBC continues to be used in malicious campaigns
SystemBC (also known as Coroxy) is a well known proxy bot leveraged over the years by various threat actors to download and execute malicious payloads including ransomware. SystemBC has a distinct functionality that allows it to set up SOCKS5 proxies on the infected clients for the purpose of malicious traffic tunneling. SystemBC is know to be sold on the underground forums and remains an active threat on the landscape to this day. Some of the latest campaigns leveraging this malware have also been reported to deliver CobaltStrike as its payload.
Symantec protects you from this threat, identified by the following:
File-based
Backdoor.Cobalt
Backdoor.SystemBC
Backdoor.SystemBC!g1
Backdoor.SystemBC!g2
Backdoor.SystemBC!g3
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Network-based
System Infected: Bad Reputation Process Request 4
System Infected: Trojan.Backdoor Activity 634
Web-based
Observed domains/IPs are covered under security categories |
SystemBC Malware-as-a-Service (MaaS)
As per recent reports, SystemBC malware has been leveraged by Ryuk group involved in extortion and ransomware activities. SystemBC evolved as a backdoor and proxy bot since its first release, the latest variant being capable of process-hollowing thus hiding the payload from static analysis.
Symantec protects you from this threat, identified by the following:
File-based
Heur.AdvML.B
Heur.AdvML.C
Ransom.Wannacry
Trojan.Gen.MBT
Trojan.Gen.2
Trojan Horse
Trojan.Mdropper
Network-based
URL reputation: Browser navigation to known bad URL
Malicious Site: Malicious Domains Request
System Infected: Trojan.Backdoor Domains 2
Web-based
Observed IP/Domains are covered under security categories |
SystemBC RAT spam run unleashed
SystemBC was recently spammed out in spreadsheet attachments which contain malicious macros. Enabling the macro will download and install a remote file, which is the SystemBC Remote Access Trojan (RAT). The RAT is able to phone home, execute files, and act as a Tor proxy.
Some of the malicious spreadsheet names include:
DOCUMENT-[random numbers].xls
documentation-[random numbers].xls
agreement-[random numbers].xls
Document[random numbers].xls
required-[random numbers].xls
contract-[random numbers].xls
documents-[random numbers].xls
docs-[random numbers].xls
data-[random numbers].xls
answer-[random numbers].xls
Symantec provides the following protection against this attack:
File-based
Trojan.Mdropper
Trojan.Gen.2
Scr.Malcode!gen
Network-based
System Infected: CoinMiner Activity 6
System Infected: CoinMiner Activity 7
System Infected: Trojan.Backdoor Activity 373
Web-based
Observed domains are covered under security categories
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. |
TA2722 threat group distributes Remcos and NanoCore RATs in the latest campaigns
According to latest reports, a recent wave of malicious campaigns distributing either Remcos or NanoCore remote access trojans (RATs) has been associated to a new threat actor dubbed as TA2722 (or Balikbayan Foxes). The attackers have been impersonating Philippine Department of Health, the Philippine Overseas Employment Administration (POEA) or the Kingdom of Saudi Arabia embassy in Manila, among others. The malicious campaigns have been targeting various industries across North America, Europe and Southeast Asia.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
File-based
Packed.Generic.610
Scr.Malcode!gdn30
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B
Network-based
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories |
TA402 APT group delivering new downloader dubbed IronWind
The APT group TA402 has been reported delivering a new downloader dubbed IronWind in their recent phishing campaigns targeting Middle Eastern government entities. The attack vector starts with a phishing email containing XLL or RAR file attachments. When these attachments are opened, they lead to the download and sideloading of the malware DLL.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
WS.Malware.2
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
TA505's first spam activity in September
Several tweets indicate that a renowned cyber crime gang known as TA505 (a.k.a. SectorJ04, Graceful Spider and Gold Tahoe) continues to be active in September 2020. The group is allegedly behind distribution of Dridex and Locky ransomware. Various malware that are believed to be SDBbot, Get2 Downloader and a RAT are distributed through spam messages with malicious macros.
Symantec provides the following protection against this recent spam campaign:
Trojan.Gen.2
Trojan.Gen.MBT |
TA505's TeslaGun control panel leveraged for ServHelper malware distribution
APT group known as TA505 (a.k.a EvilCorp) has been reported to leverage a new software control panel called TeslaGun for the purpose of managing its ServHelper malware campaigns. TA505 threat actor is a financially motivated group known for several years and the ServHelper malware has been also used in various previous attacks attributed to this APT. The TeslaGun panel allows the attackers to distribute the backdoor malware to selected targets, manage attack data and information collected from the victims as well send remote commands to the infected hosts.
Symantec protects you from this threat, identified by the following:
File-based
Packed.Generic.525
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Network-based
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories |
TA544 activities involving IDAT Loader
A new set of malicious activities attributed to the TA544 (aka Narwal Spider) threat group has been reported in the wild. This threat actor has been known to target various Italian organizations and entities in the past. In their latest campaigns, the attackers have been leveraging new variants of the IDAT Loader malware to deliver various payloads such as Remcos RAT or SystemBC malware.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.MBT
Trojan.Mallnk
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!400
Heur.AdvML.A!300
Heur.AdvML.A!500
Heur.AdvML.B!200
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
TA551 APT group distributes BazarLoader in recent malspam campaigns
It has been reported that the threat group known as TA551 (or Shathak) has been spreading BazarLoader malware in recently observed malspam campaigns. The group has been previously seen distributing a variety of malware variants such as Trickbot, Ursnif or IcedID. The recent malspam campaign leverages password protected .zip archives that contain MS Office documents with malicious macros. Once the victim enables the macros, the document drops a .hta file that retrieves BazarLoader binaries and infects the host with it. BazarLoader malware observed in this campaign leads to a Cobalt Strike payload.
Symantec protects you from this threat, identified by the following:
File-based
Backdoor.Cobalt
Downloader
JS.Downloader
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
W97M.Downloader
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Network-based
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories |
TA551 malspam campaigns distribute IceID infostealer
Email-based malware distribution campaigns associated with TA551 have been distributing mostly Ursnif or Valak infostealer in the past. It has been reported recently that the latest iterations of those campaigns started pushing IceID infostealer instead. The campaign uses .zip packed and password-protected Word documents distributed via spam emails. The extracted .doc files include malicious macros that retrieve installers for the IceID malware when executed.
Indicators of compromise (IOC) examples:
Email subject: Re: FBO Jets Checking In
Attachment: request.zip
Content: adjure.12.20.doc
Email subject: Re: Join us for the UltraSet Matrix Presentation (New Carpet Tile)
Attachment: request.zip
Content: legal agreement.12.20.doc
Email subject: Re: New Little Giant Kombo ladders
Attachment: request.zip
Content: charge.12.20.doc
Symantec provides the following coverage of the latest activities related to TA551:
File-based
Heur.AdvML.B
Heur.AdvML.C
ISB.Downloader!gen386
ISB.Downloader!gen424
Trojan.Gen.NPE
Trojan.Gen.MBT
Trojan.Horse
W97M.Downloader
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. |
TA551 observed distributing IcedID via malspam
TA551 , also known as Shathak, has distributed many different malware families over the past few year including Ursnif, Valak, BazarLoader and Trickbot. These initial vectors often lead further Cobalt Strike infestations. Recent attacks began with malspam spoofing replies to previously valid emails containing password protected zip attachments. The password is included in the email body and a Microsoft Office document is contained in the zip archive. Opening the file and running the macro infects the machine with IcedID (Bokbot).
Symantec protects you from these threats, identified by the following:
File-based
Trojan Horse
Trojan.Gen.2
Trojan.Malscript
W97M.Downloader
Email-based
Coverage is in place for Symantec's email security products |
TA577 activity continues - malicious email campaigns propagate DarkGate
The DarkGate loader, first observed in 2018, has over the past few weeks gained in prevalence following the takedown of Qakbot by law enforcement. Most likely due to that takedown, since September the threat actor known as TA577 (used to be an affiliate of Qakbot) who continues to deliver Pikabot and IcedID, has also started to deliver DarkGate via its malicious email campaigns.
While it's primarily used as a loader, DarkGate also has a Hidden Virtual Network Computing (HVNC) module, keylogging capabilities, and information-stealing capabilities. Over the past few weeks, Symantec has observed multiple TA577 attack chains rotating through its tools and techniques as described below.
Sept 21st:
Email > ZIP > LNK > CURL > VBS > AutoIT > EXE (DarkGate)
Sept 23rd:
Email > URL > ZIP > LNK > CURL > VBS > AutoIT > EXE (DarkGate)
Sept 25th:
Email > PDF > URL > XLL > HTA > CURL > VBS > MSI > AutoIT > EXE (DarkGate)
Email > PDF > URL > XLL > HTA > CURL > VBS > AutoIT > EXE (DarkGate)
Sept 26th:
Email > PDF > URL > XLL > CURL > DLL (IcedID)
Email > PDF > URL > ZIP (Password Protected) > LNK > CURL > VBS/MSI > AutoIT > EXE (DarkGate)
Sept 28th:
Email > URL > ZIP (Password Protected) > LNK > CURL > DLL (Pikabot)
Email > URL > ZIP (Password Protected) > LNK > CURL > DLL (IcedID)
Oct 2nd:
Email > URL > Zip (Password Protected) > LNK > CUR > VBS > CMD > CURL > AUTOIT > EXE (DarkGate)
Email > PDF > URL > Zip (Password Protected) > LNK > CUR > VBS > CMD > CURL > AUTOIT > EXE (DarkGate)
Oct 3rd:
Email > PDF > TDS-404 > URL > XLL > HTA > CMD > CURL > DLL (DarkGate)
Oct 4th:
Email > URL > ZIP > LNK > Regsvr32 (*.sct) > Rundll32 > DLL (Pikabot)
Email > PDF > URL > ZIP > VBS > CMD > CURL > DLL (DarkGate)
Email > PDF > URL > ZIP > JS > PS(on memory) > DLL
Oct 5th
Email > HTML > ZIP > PEEXE (Bumblebee)
Email > URL > ZIP > JS > PEDLL (PikaBot)
Oct 9th
Email > URL > ZIP > MSI > AUTOIT > PEEXE (DarkGate)
Oct 10th
Email > URL > JS > CURL > PEDLL (Bumblebee)
Email URL > ZIP > MSI > KeyScramblerIE > Shellcode > CMD > CURL > AUTOIT (DarkGate)
Email > PDF > URL > ZIP > MSI > KeyScramblerIE > Shellcode > CMD > CURL > AUTOIT (DarkGate)
Email > URL > ZIP > VBS > AUTOIT (DarkGate)
Oct 11th
Email > PDF > URL > ZIP > MSI > AUTOIT (DarkGate)
Email > PDF >URL > ZIP > VBS > AUTOIT (DarkGate)
Oct 13th
Email > MS TEAMS > URL > ZIP > LNK > PS > AUTOIT (DarkGate)
Email > PDF > URL > ZIP > MSI > AUTOIT (DarkGate)
Email > PDF >URL > ZIP > VBS > AUTOIT (DarkGate)
By closely tracking the activities of TA577 and their evolving attack chains, Symantec ensures that our security measures are continually updated and improved.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Behavior-based
SONAR.Heur.Dropper
File-based
Downloader
ISB.Downloader!gen68
ISB.Dropper!gen1
ISB.Houdini!gen7
Js.Downloader
Memscan.SuspLoad!g1
Trojan.Gen.MBT
Trojan Horse
Trojan.Darkgate
Trojan.Darkgate!gen1
Trojan.Darkgate!gen2
VBS.Downloader.Trojan
WS.Reputation.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Network-based
System Infected: Malicious File Download Request 3
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
TA588 continues espionage activities in Latin America
The TA558 group, known for targeting various sectors across Latin America, has recently been observed employing spam emails with malicious attachments to distribute Venom RAT, a remote access trojan derived from Quasar RAT. This malware is equipped with functionalities for harvesting sensitive data and gaining remote control over compromised systems.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
File-based
Scr.Malcode!gdn32
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Tambir Android malware
Tambir is a backdoor malware known to be targeting Android users in Turkey. The malware has extensive infostealing functionality incorporating theft of SMS messages, keystrokes, dialing premium numbers, running additional apps, etc. Similarly to other mobile malware variants Tambir abuses the Android accessibility service to conduct its activities. Upon execution the malware retrieves the attackers C2 addresses from public channels such as Telegram or ICQ.
Symantec protects you from this threat, identified by the following:
Mobile-based
Android.Reputation.2
AppRisk:Generisk |
Taurus Loader activity continues
According to a recently released report, Taurus Loader keeps getting distributed via websites offering cracked software. The main function of the loader is to download additional payloads onto the compromised machines, among others the Taurus Stealer malware. Taurus has been observed to leverage AutoIT scripts during the execution of its numerous evasion techniques.
Symantec protects you from this threat, identified by the following:
File-based
Heur.AdvML.B
Heur.AdvML.C
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Behavior-based
SONAR.SuspPE!gen32 |
Taurus Stealer strikes back through exploit kits
Recent reports identified ongoing malvertising campaigns distributing Taurus stealer with the use of the Fallout Exploit Kit. Taurus is a type of infostealing malware discovered earlier this year. The malware shares many characteristics with the well known Predator Thief infostealer and is believed to be used by the same threat actor. It has capabilities to steal passwords and cookies from various browsers, FTP and email credentials as well as cryptocurrency wallets.
File-based protection
Trojan.Gen.2
Trojan.Gen.MBT
W97M.Downloader
Network-based protection
System Infected: Taurus Infostealer 1
Website-based protection
This attack is blocked by Symantec Web Isolation technology. |
Tax-related smishing campaign observed in Australia
The tax season in Australia commences on July 1st each year, extending through October 31st. This is naturally the period when tax-related social engineering is most frequently observed. In a recent example, Symantec observed an SMS phishing (aka "smishing") campaign in which scammers posed as the tax office, hoping to lure Australians to a fake MyGov website hosted on IPFS. Short for Interplanetary File System, the IPFS is a peer-to-peer distributed file system that allows people around the world to exchange files. The phishing website is designed to harvest users' MyGov credentials.
SMS example: New important message about your 2023 Income Tax. Visit hxxps[:]//bafkreibl6kyjzitljufhxvde37x5ux2az7hmcw7eereqzaepji4pesqqcm[.]ipfs[.]dweb[.]link to claim your refund
Symantec protects you from this threat, identified by the following:
Mobile-based
Symantec Endpoint Protection Mobile is able to analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake domains used in this campaign are known to WebPulse.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
Tax-Themed phishing campaign deploys XWorm RAT
An email phishing campaign has been reported deploying the Remote Access Trojan (RAT) XWorm. The attack begins with an HTML tax document attachment. Upon opening, it triggers the download of a JavaScript file which then executes a PowerShell script. This script is equipped with features to terminate running processes, manage decoy PDF files, disable User Account Control (UAC), and ultimately deliver the XWorm payload.
XWorm enables threat actors to gain unauthorized access to devices, facilitating the theft of sensitive information such as login credentials and passwords. Additionally, it includes capabilities for clipboard monitoring, installing ransomware, and launching Distributed Denial of Service (DDoS) attacks.
Symantec protects you from this threat, identified by the following:
File-based
ISB.Downloader!gen572
Scr.Malcode!gen
WS.SecurityRisk.4
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Teabot, new Android infostealer brewing in Europe
Security researchers have recently discovered a new Android infostealer targeting European financial institutions that includes the following functionality:
Full control of the infected device via Accessibility Services and real-time screen-sharing
Key logging capabilities
Steal credentials via overlay attacks
Ability to modify, send, or hide SMS messages
Intercept Google Authentication codes
Symantec protects you from this threat, identified by the following:
Mobile-based
AppRisk:Generisk |
Tele2 phishing campaign in Netherlands and Belgium
On a daily basis Symantec observes phishing campaigns where actors pose as known telecommunication companies around the world. Cyber criminals often pose as so in phishing attacks because these companies have a large number of customers, and people are likely to trust communications from them.
Symantec has recently uncovered a Tele2 phishing campaign targeting both consumers and businesses in the Netherlands and Belgium. The attackers attempted to lure users with malicious emails pretending to be notifications of denied access and including a link to a fake Tele2 login website. Below are the observed email subjects
Herinnering: Uw toegang wordt als ongeautoriseerd verklaard
Uw toegang wordt geweigerd
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
Web-based
Observed domains/IPs are covered under security categories |
TellYouThePass - another ransomware variant exploiting Log4j vulnerability
Tellyouthepass is the second ransomware variant after the recently reported Khonsari to leverage the Log4j vulnerability (CVE-2021-44228). This ransomware family is relatively old and hasn't been much active in the last two years. Tellyouthepass comes both in Windows and Linux versions, with the Linux one being able to harvest SSH keys and move laterally through the networks.
Symantec protects you from this threat, identified by the following:
File-based
Downloader
Ransom.Tellyouthepass
Ransom.Tellyouthepa!g1
Ransom.Tellyouthepa!g2
Trojan Horse
Trojan.Gen.NPE
Behavior-based
SONAR.Cryptlocker!g75 |
Temp Stealer - a new infostealer variant
Temp Stealer is a new run-of-the-mill infostealer variant advertised on underground forums. The malware is able to exfiltrate various data from the compromised endpoints including crypto wallets, browser data, system information as well as data from applications such as Discord or Telegram. According to a recent report, Temp Stealer is often disguised as software cracks or keygens but can also be spread as bundled installers for various other software.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.B
Web-based
Observed domains/IPs are covered under security categories |
Teng Snake Ransomware
Ever since Chaos ransomware source code hit public sources it sprung countless variants that are operated by groups and individuals around the world. Teng Snake ransomware is one of these variants recently observed in the threat landscape. According to the ransom note left on the victim's machine, this actor does not employ double-extortion tactics and has been asking for 10,000 Tether (equivalent to 10,000 US Dollars). Post-encryption, files are appended with four random characters.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.SuspLaunch!g18
File-based
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B |
Teslarvng Ransomware
A ransomware gang known as Teslarvng has increased their activity in recent months. These actors are not new to the threat landscape and have evolved over time, employing various infection vectors ranging from malicious emails to Remote Desktop Protocol attacks.
They also employ the infamous "double extortion" tactic – exfiltrating the data before encrypting it. This way if the company refuses to pay the ransom, the attacker can threaten to publicize their data by either publishing it online or selling it to the highest bidder.
Symantec protects you from this threat, identified by the following:
File-based
Downloader
Ransom.Teslarvng
Ransom.Teslarvng!g1
Trojan.Gen.MBT
Trojan.Horse
WS.Malware.1
WS.Malware.2
Behavior-based
SONAR.SuspLaunch!gen4
SONAR.SuspLaunch!g18
Network-based
Attack: Ransom.Crysis Activity 3 |
TFlower Ransomware distributed with the help of MATA malware framework
According to a recent report, a new campaign has been discovered where the TFlower Ransomware is being deployed with the help of MATA malware framework. MATA framework was first discovered in July 2020 and is being linked to the infamous Lazarus APT group.
As we continue to monitor and enhance our protections against TFlower ransomware variants, we recommend performing regular backups for any important data and ensuring your security products are kept up to date with the latest product definitions.
Symantec's protections against this campaign and the TFlower ransomware variants include:
File-based
Heur.AdvML.C
Trojan.Gen.MBT
Trojan.Gen.NPE
Trojan Horse
OSX.Trojan.Gen |
TgToxic Android malware
TgToxic is an Android malware variant observed in campaigns targeting users in Southeast Asia since around the middle of last year. The malware has been used for phishing and infostealing purposes. The attackers have been targeting ex-filtration of credentials and data related to banking or email applications and cryptocurrency wallets of the compromised users. TgToxic leverages WebSocket as a communication channel with the attackers' C2 servers.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
Android.Malapp
Android.Reputation.2
AppRisk:Generisk
Web-based
Observed domains/IPs are covered under security categories |
The BlackHeart Badboy lives on
A recently discovered ransomware variant "Alix1011RVA" contains a contact email address that is also present in another ransomware which appeared on the scene back in December 2019. This older ransomware is known as Badboy, which appears to be a member of the BlackHeart ransomware family.
The Alix1011RVA strain adds a file extension ".Alix1011RVA" to the files it encrypts.
Symantec provides the following protection against this threat:
File-based Protection
Ransom.Cryptolocker
Trojan.Gen.2 |
The comeback of the WannaRen ransomware
WannaRen is an older ransomware variant discovered back in 2020. It has been reported that WannaRen has now made a comeback under a re-branded name of Life ransomware and that it targets users in India. The malware is spread in a form of a MSI package binary and it abuses legitimate system components for DLL sideloading. The malware will append .life extension to the encrypted files.
Symantec protects you from this threat, identified by the following:
File-based
Backdoor.ASync!gm
Ransom.Gen
Scr.Malcode!gdn14
Trojan Horse
Trojan.Dropper
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.B |
The French and Spanish job – A Formbook campaign
Symantec Security response has recently observed an on-going Formbook campaign that mainly targets companies in France, Belgium, North Africa and a few in Spain. There was also some spill over to international companies which have satellite offices in those countries and a French speaking workforce.
Actors behind this attack have been spurting a series of spam every 2 to 3 days. The bulk of the malicious emails associated with this activity are written in French and some in Spanish. They all have a zip file attached in which Formbook is waiting patiently to be unleashed by unwary corporate victims. It must be noted that no special social engineering is being used, just the usual run-of-the-mill quotes, billing and banking transfer tricks.
Email subjects:
CONSULTATION
Etat des factures non réglées.
demande offre de prix
DEMANDE DE PRIX
virement
transferencia
Symantec has various protections in place against this attack:
File-based
Trojan.Formbook
Trojan.Gen.2
Downloader.Ponik!gen9
WS.Malware.2
Heur.AdvML.B
Behavior-based
Sonar.Heuristic.159
Sonar.Di!gen1
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. |
The Mobile Malware Threat Remains
There are regular reports of newly discovered malware disguised as legitimate mobile apps. While malicious mobile apps are not as prevalent as Windows based malware, they remain an ongoing threat. In the last 180 days Symantec has discovered over 350,000 new malicious mobile apps.
Symantec now processes over 88,858 mobile apps every 24 hours. And in total has analyzed 91 million apps. Currently, Symantec has discovered and provided protection against:
29,849,297 Malicious apps
56,480,431 Grayware apps |
TheMoon malware targets thousands of insecure routers
A new malicious campaign featuring an updated version of TheMoon, a notorious malware family has been reported. This latest variant of TheMoon appears to target insecure outdated home routers, particularly those manufactured by Asus, along with other IoT devices. After compromising these devices, the malware utilizes them to route traffic through a proxy service known as Faceless. It actively seeks out specific shell environments to execute its primary malicious payload and establishes connections with the threat actors' command and control server to receive further instructions.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
WS.Malware.2
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
The persistence of billing fraud Android malware: a profitable venture for cybercriminals
Billing fraud Android malware is still prevalent because it is a highly profitable form of cybercrime. Malware authors can easily create and distribute malicious apps that are designed to steal personal information and charge victims for unwanted or unauthorized services. The widespread use of mobile devices and the ease with which malicious apps can be distributed through app stores and other online platforms provides a large potential target for attackers.
Joker and Harly are among the most common types of billing fraud Android malware, malicious applications are discovered on a daily basis. They primarily spread through Google Play, by hiding themselves within seemingly legitimate apps. These malware pose a significant risk to both consumers and enterprises. Consumers can be targeted through their mobile devices, while enterprises can be affected when employees use company-owned devices that have been infected.
Symantec protects you from this threat, identified by the following:
Mobile-based
Android.Reputation.2 |
The return of Emotet
After a months-long hiatus we have observed new campaigns delivering the Emotet malware via email spam. The emails contain an Excel attachment which is responsible for downloading Emotet. The Excel file makes use of social engineering to require user input to successfully execute the malicious content.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.MSExcel!g4
Email-based
Coverage is in place for Symantec’s email security products
File-based
CL.Suspexec!gen128
Scr.Malcode!gen
Scr.MalMacro!gen1
XLM.Downloader!gen1
XLM.Downloader!gen2
XLM.Downloader!gen4
Network-based
Web Attack: Malicious Payload Download 26
Web Attack: W97M.Downloader Payload Download
Web-based
Observed domains are covered under security categories |
The rise of Trickbot
Last January, after the international takedown against Emotet, the ascension of Trickbot to fill the gap become noticeable almost immediately. Some similarities that these two prolific malware have in common is their flexible functionality, and reliability at opening up network access for attackers to load additional malware such as ransomware onto the victim's machine. As a result, Trickbot is a useful fallback for the threat actors.
This was recently observed in a malspam campaign involving the use of malicious XLS files which download Trickbot (Trojan.Trickybot).
Symantec protects you from this threat, identified by the following:
File-based
Heur.AdvML.C
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Mdropper
WS.Malware.1
W97M.Downloader
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. |
The Turkish job - A Formbook campaign
Symantec has recently observed an ongoing Formbook campaign that is predominantly targeting major industries in Turkey from the following sectors: energy, transportation, food and online shopping. The actors purport themselves to be a well known Turkish company in the aluminum and carbon fiber industry, attempting to lure victims with a classic "order" social engineering tactic (email subject: Ynt: Sipariş Onayı). The malicious emails come with a .bz archive that contains the Formbook binary. This malware has been around since at least 2016 and as of today is still one of the top Infostealer form grabbers in the wild.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
Machine Learning-based
Heur.AdvML.B |
The vBulletin CVE-2020-17496 vulnerability exploited in the wild
We have been aware of reports relating to malicious actors exploiting vBulletin CVE-2020-17496 vulnerability in the wild. The vulnerability is a bypass for a previously patched vBulletin flaw (CVE-2019-16759) that allowed unauthenticated attackers to run malicious code and take control of the vulnerable vBulletin servers. The initial remote code execution (RCE) bug was disclosed and patched in September 2019. In August 2020 researchers identified a new at the time zero-day vulnerability that allowed attackers to bypass the previously released fix. The bypass vulnerability has been assigned a CVE identifier of CVE-2020-17496.
At the beginning of September new reports emerged with evidence of CVE-2020-17496 being exploited in the wild. According to the reports, the attacks exploiting CVE-2020-17496 have attempted to download either the Shellbot or Mirai malware post-exploitation.
Symantec protections for the discussed vulnerabilities
IPS [31818] Web Attack: vBulletin Remote Code Execution CVE-2019-16759
IPS [32484] Web Attack: vBulletin CVE-2020-17496 |
The WatchDog group observed using new cryptojacking campaigns
Recently, evidence was shared confirming the WatchDog group has been incorporating at least some of the behaviors, tools and strategies of the TeamTNT cryptojacking group into their operations. And it seems to be working as desired, as the use of these tools has significantly increased their cryptojacking operations. In contrast, they don't appear to be using certain other techniques commonly used by TeamTNT including credential scraping, lateral movement and GoLang binaries.
Symantec protects you from these threats, identified by the following:
File-based
Downloader
Linux.Coinminer
Linux.Kaiten
Linux.Lightaidra
Linux.Trojan
Trojan Horse
Trojan.Gen.NPE
Web-based
Observed domains are covered under security categories |
ThiefQuest macOS ransomware remains active in the wild
ThiefQuest (also known under an older name EvilQuest) is a ransomware variant targeting the macOS platform. Beside the typical ransomware characteristics, some variants of this malware also exhibit additional keylogging, infostealing and backdoor functionalities. ThiefQuest is able to perform several checks in order to find out if it's running in a virtualized environment. One of such checks performed by the malware is the verification of the MAC organizational unique identifier (OUI) of the device. The malware will also attempt to disable security solutions installed on the device in an attempt to avoid any detections. While ThiefQuest has been seen on the threat landscape for several years now, many new samples have been observed in the wild during the last month alone.
Symantec protects you from this threat, identified by the following:
File-based
OSX.RansomThiefQuest
OSX.RansomThiefQue!g1
OSX.Trojan.Gen
WS.Malware.1 |
ThirdEye Stealer
Reports have emerged about the latest arrival of a new Infostealer on the already saturated threat landscape dubbed ThirdEye. ThirdEye is still evolving and the most recent iterations of this malware have functionality to collect information around disk details, volume information, installed applications, processes running etc. The extracted information is then sent to the attackers C2 server.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.TCP!gen1
File-based
Linux.Lightaidra
Trojan Horse
WS.Malware.2
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.B
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
THOR - New PlugX variant discovered
A new strain of the infamous PlugX malware has been discovered and dubbed as THOR. PlugX RAT (also known as Korplug) is known since at least 2008 and has been leveraged in a multitude of high profile campaigns since its first appearance. The new THOR variant includes enhancements in the payload delivery mechanisms and allows for abuse of trusted system binaries. According to a latest report, the THOR variant has been already used in Proxylogon attacks targeting MS Exchange Servers back in March 2021.
Symantec protects you from this threat, identified by the following:
File-based
Backdoor.Korplug
Heur.AdvML.B
Heur.AdvML.C
Trojan Horse
Trojan.Gen
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
Network-based
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories. |
Threat actor 8base loads its Phobos ransomware variant through backdoor SmokeLoader
A new variant of Phobos ransomware malware has been attributed to threat actor 8base. This variant has been seen being loaded and executed using the backdoor trojan SmokeLoader. Like other ransomware malware Phobos attempts to establish persistence, terminate processes that may keep the target files open, disable system recovery, and delete backups as well as shadow copies. The files encrypted by this variant are usually renamed to ".8base" file extension.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.SuspDataRun
SONAR.SuspLaunch!gen4
SONAR.SuspLaunch!g18
SONAR.SuspLaunch!g253
SONAR.TCP!gen1
File-based
Downloader
Scr.Malcode!gdn14
Scr.Malcode!gdn32
Ransom.Phobos!g2
Ransom.Phobos!gm1
Trojan.Gen.MBT
Trojan Horse
WS.Malware.1
WS.SecurityRisk.4
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.A!300
Heur.AdvML.A!400
Heur.AdvML.A!500
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200 |
Threat actors abuse forum services in new phishing wave
Online forum services are widely used to communicate and share information on various subjects. Not surprisingly, threat actors have started abusing legitimate forum creating services.
As observed by Symantec in this phishing wave, emails were masquerading as password notification messages to lure the recipient into clicking on hyperlinked text in order to change the password. The email content is kept short and has made extensive use of homoglyphic and accented characters in the body - a thinly veiled attempt to bypass anti-spam filters.
As shown in Figure 1, once the recipient clicks on the hyperlinked text it redirects to a phishing webpage created with the help of online forum building and survey services.
Figure 1: Phishing email masquerading as password notification message
As shown in Figures 2 & 3, the fake credential harvesting webpages are created by using online forum building and survey services.
Figure 2: The embedded URL in hyperlinked text redirects the user to a fake login page probing for email address.
Figure 3: The embedded URL in hyperlinked text redirects the user to fake login page probing for password.
Protection
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. |
Threat actors abuse known software brands to spread RomCom RAT
Just last month RomCom RAT has been leveraged in a series of attacks against military infrastructure targets in Ukraine. According to new reports, the threat actors behind this malware have also been abusing known software brands for the RAT distribution. The malware droppers have been masqueraded as installers for KeePass Password Manager, SolarWinds NPM and the Veeam Backup and Recovery software, among others. The attackers have been leveraging fake websites and typo-squatting domains to spread those installers. It does seem that Ukraine still remains the main target of the attackers, but it is believed that also English-speaking countries might be secondary targets.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
Machine Learning-based
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories |
Threat actors impersonate video communications platform to steal credentials
Symantec has observed a new phishing campaign that involves a fake meeting invitation to lure recipients into disclosing their Microsoft 365 credentials. As shown in Figure 1, these phishing emails masquerade as meeting invitations from a popular video communications platform and entice the recipient to click on the hyperlinked text with phishing URL embedded within it.
Figure 1: Phishing email masqueraded as a meeting invitation with a phishing URL embedded in content.
Recipients who click on the hyperlinked text: “View Meeting ID” are redirected to a fake credentials stealing login page where they are prompted to provide their password, as shown in Figure 2.
Figure 2: Phishing URL when clicked redirects to a credential stealing webpage.
Protection
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. |
Threat actors leverage web application creator services to spread phish
Online application creator services offer a wide range of services ranging from developing full stack web applications to diversified communities of think-alike individuals. It’s not unusual now that threat actors have found out ways to abuse such services. Recently, a phishing wave abusing Glitch’s services was observed by Symantec.
As shown in Figure 1, phish emails have been masqueraded as notification messages informing the recipients to upgrade their existing email storage space. In order to upgrade, the recipient needs to click on hyperlinked text from which an embedded phishing URL is served. The email content is grammatically bad.
Figure 1: Phishing email masqueraded as a mailbox upgrade notification email with a phishing URL embedded in content.
As shown in Figure 2, once the recipient clicks on the hyperlinked text, it redirects to credentials stealing webpage hosted on Glitch.
Figure 2: The embedded URL redirects the user to a fake credentials stealing webpage.
Protection
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. |
Threat actors spoof Comprobantes Fiscales Digitales por Internet (CFDI) format to spread phish emails
As observed by Symantec in a recent phish run, the threat actors have impersonated Comprobantes Fiscales Digitales por Internet (CFDI) - an electronic invoicing format mandated by the Mexican tax authority, to steal user credentials. The phishing emails are masqueraded as payment notification messages and probe the recipient to download a digital tax receipt in PDF or XML format. To download the digital tax receipt, the recipient must click on a phishing URL disguised as a download URL.
Email Subject: Fw: Error en tu pago cfdi. - ([random_numbers])
Translated Email Subject: Fw: Error in your cfdi payment. - ([random_numbers])
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
Threat actors spoof Dalsey, Hillblom and Lynn (DHL) services to steal credentials.
Symantec has identified a new surge in phishing attacks that impersonate Dalsey, Hillblom, and Lynn (DHL) services to steal credentials. In this campaign, phishing emails are disguised as shipment notifications featuring a random waybill number in the email subject—a common reference for shipments. The email content is brief, encouraging recipients to click on a phishing URL. Once clicked, victims encounter webpages designed for credential harvesting.
Email Subject: Waybill no ***** - ([random_numbers])
Email From: DHL <spoofed_email_address>
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
Threat actors spoof DPD - Geopost services to steal credentials
Symantec has identified a new wave of phishing attacks that impersonate DPD - a part of Geopost services to steal credentials. Geopost is a global parcel delivery service headquartered in Issy-les-Moulineaux, France. In this campaign, German language phishing emails are disguised as parcel notifications to reschedule deliveries or check parcel details. The email content is brief, encouraging recipients to click on a phishing URL. Once clicked, victims encounter webpages designed for credential harvesting.
Email Subject: Ihre Paketzustellungsnachricht Nr#[random_numbers]?
Translated Email Subject: Your parcel delivery message No#[random_numbers]?
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Threat Actors spoof electronic payment solutions service to spread phish laden attachments
As observed by Symantec in a recent phish run, the threat actors have impersonated Zelis - an electronic payment solutions service, in an attempt to steal user credentials. As shown in Figure 1, emails masqueraded as payment notification messages are sent with phish laden .pdf attachments. Surprisingly, there is no content included in the body of the email.
Figure 1: Phishing email disguised as a payment notification message with PDF attachment file.
As shown in Figure 2, upon opening the attachment file, the recipient is presented with a pending payment notification message and is guided on how to proceed with the payment. The notification template used in the .pdf file looks almost legitimate to the human eye. A phishing URL is embedded within the hyperlinked text – “Approve your payment”.
Figure 2: The .pdf attachment file when opened showcases a pending payment notification message with embedded phishing URL.
When clicked upon, the link redirects the recipient to a fake login page aimed to steal credentials as shown in Figure 3.
Figure 3: Upon clicking the hyperlinked text in the .pdf attachment, it redirects to a fake login page.
Protection
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. |
Threat actors spoof FedEx services to steal credentials
Symantec has identified a new surge in phishing attacks that impersonate FedEx services to steal credentials. In this campaign, phishing emails are disguised as shipment notifications to reschedule deliveries or check package details. The email content is brief, encouraging recipients to click on a phishing URL. Once clicked, victims encounter webpages designed for credential harvesting.
Email Subjects:
Reschedule your package delivery
Confirm Delivery: Your parcel will be delivered by David
FedEx - package delivery
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Threat actors spoof Japanese credit card services (JCB) in new phish wave
As observed recently by Symantec, threat actors have spoofed Japanese credit card services (JCB) in phish laden emails. As shown in Figure 1, emails masqueraded as important notification messages are sent to the recipients informing that the access to their account is restricted due to a recent compromise. In order to remove these restrictions, the recipient is required to click on the provided URL. In this phish run, threat actors have made use of compromised domains in the attack URL that resemble those of the legitimate services.
Figure 1: Phishing email disguised as a notification message from JCB with a phish URL embedded within the email content.
As shown in Figure 2, upon clicking the URL embedded in the email, CAPTCHA verification page opens and after the verification it redirects to a fake JCB login page aimed at credentials theft.
Figure 2: The embedded phish URL when clicked verifies the recipient with CAPTCHA and redirects to a fake JCB login page.
Protection:
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. |
Threat actors trick banking users with QRishing in new phish campaign
Symantec has recently observed a new phishing wave in which threat actors have changed their techniques to QRishing (QR code - initiated phishing attacks). These specially designed QR codes contain phishing URLs embedded within them. As shown in Figure 1, the phishing emails are disguised as important banking notifications. In the specific email sample analyzed here, the recipient is reminded that he / she is due for a debit card renewal. The recipient is further asked to scan the QR code included in the email, upon which the renewal request should be initiated.
Figure 1: Phishing email disguised as a banking notification message for debit card renewal.
After scanning the QR Code with a QR code scanner application, the embedded phishing URL opens.
Figure 2: Upon scanning the QR code provided in the email, it attempts to open the embedded phishing URL.
Protection
Coverage is in place for Symantec's email security products. |
Threat actors turn into Human Resources (HR) staff to spread fake payroll notifications
Interestingly, it seems that Threat actors have now turned into fake Human Resources staff to spread a new wave of phishing emails. In a recent phishing run, emails containing phishing URLs and masqueraded as payroll notifications are sent to recipients. The email subjects contain the recipient's first and last name along with a "missing payroll" keyword. This is done to add a personal touch and lure the user into opening the email. The email body content is kept short and the "from" field shows recipient's domain name + "HR" word. The email body mentions that there is one action item pending on the HR portal and includes a phishing URL ready to steal credentials.
Email Headers:
Subject: [Recipient's_first_name].[Recipient's_last_name] Missing Payroll
From: "[Recipient's_domain_name] HR " <spoofed_email_address>
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Threat actors turn to fake PayPal CAPTCHA to steal credentials
Threat actors have constantly made changes to tactics and techniques in which phish campaigns are carried out. Recently, Symantec has observed a phishing wave spoofing PayPal payment services with the help of .html attachments. As shown in Figure 1, these emails are masqueraded as account notification messages asking recipients to restore accounts within 24 hours or face account termination. An .html file is attached to the email which needs to be downloaded in order to proceed with the account restoration process.
Figure 1: Phishing email masqueraded as an account notification with an .html file attached to the message.
As shown in Figure 2, once the .html attachment is downloaded and opened, the recipient is served with a fake PayPal CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) verification page.
Figure 2: Fake PayPal CAPTCHA verification page.
Upon entering the six CAPTCHA characters, the user is redirected to a credential stealing webpage imitating a legit PayPal service webpage.
Protection
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. |
Threat Actor UNC4990 posting images for scripts to see
UNC4990 is a threat actor best known for utilizing USB devices as an initial infection vector that recently have been found to be expanding their capabilities by encoding payloads inside of externally hosted files. Users are tricked into opening a Powershell script located on the USB device that utilizes encoded information found inside externally posted images in order to download and execute whichever malware the attacker chooses as the next stage of the attack.
Symantec protects you from this threat, identified by the following:
File based
Downloader
Trojan.Gen.2
Trojan.Gen.NPE
Trojan.Gen.MBT
Trojan Horse
Machine-learning based
Heur.AdvML.A!300
Heur.AdvML.B!200
Heur.AdvML.B
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Threat Alert: Apache Log4j RCE (CVE-2021-44228) aka Log4Shell
UPDATE December 20, 2021: The Apache Software Foundation has released a patch for a third vulnerability in Log4j. Version 2.17.0 of the software was released on December 17 after issues were discovered with the previous release (2.16). Apache said that 2.16 does not always protect from infinite recursion in lookup evaluation and is vulnerable to CVE-2021-45105, a denial of service vulnerability.
UPDATE December 15, 2021: Apache has patched a second vulnerability in Log4j. The vulnerability (CVE-2021-45046) arises from the fact that the fix for the previous vulnerability (CVE-2021-44228) did not completely prevent exploits in all circumstances. The fix has been shipped in Log4j version 2.16.0.
A critical remote code execution (RCE) vulnerability in Apache Log4j has recently been disclosed and multiple proof of concepts are now available to the public. Log4j is a Java logging library and is widely-used by a large number of applications and services. Version 2.0 and 2.14.1 of Apache Log4j are impacted and a fix has been shipped in version 2.15.0. This vulnerability has been dubbed "Log4Shell" by the security community.
As expected, actors have already started to leverage this vulnerability such as those behind cryptominer botnets, and Muhstik is one of these. This malware has been around for a few years now and is known to be used in various cryptocurrency mining and DDoS campaigns.
Symantec protects you from these threats, identified by the following:
Behavior-based
SONAR.Maljava!g7
SONAR.Ransomware!g1
SONAR.Ransomware!g31
SONAR.Ransomware!g32
SONAR.SuspLaunch!g184
SONAR.SuspLaunch!g185
Email-based
Coverage is in place for Symantec’s email security products
File-based
CL.Suspexec!gen106
CL.Suspexec!gen107
CL.Suspexec!gen108
Linux.Kaiten
Miner.XMRig!gen2
Ransom.Khonsari
Ransom.Tellyouthepass
Ransom.Tellyouthepa!g1
Ransom.Tellyouthepa!g2
Trojan Horse
Trojan.Maljava
Machine Learning-based
Heur.AdvML.C
Network-based
Attack: Log4j2 RCE CVE-2021-44228
Attack: Log4j2 RCE CVE-2021-44228 2
Attack: Log4j CVE-2021-45046
Attack: Log4j CVE-2021-45105
Attack: Malicious LDAP Response
Audit: Log4j2 RCE CVE-2021-44228
Audit: Malicious LDAP Response
Audit: Suspicious Java Class File Executing Arbitrary Commands
Policy-based
DCS provides multi-layered protection for Windows, Linux Server workloads and container applications for this vulnerability:
Suspicious Process Execution: Prevention policies prevent malware from being dropped or executed on the system. DCS hardened Linux servers prevent execution of malware from temp or other writable locations, a technique used by attackers to drop crypto miners such as XMRig in reported log4shell exploitation.
Review the Linux proxy execution list for your log4j based application sandbox to include additional tools such as */curl, */wget. These tools are used by attackers to connect from the victim log4j application to external C2 servers for downloading additional payloads.
DCS sandboxing of Windows and Linux applications prevent suspicious program execution using living off the land tools and tampering of critical system services and resources.
Network Control: Ability to block outgoing connections to public internet and limit required LDAP, http and other traffic from server workloads and containerized applications using log4j2 to internal trusted systems
Detection Policies : System Attack detection: Baseline_WebAttackDetection_Generic_MaliciousUserAgent rule should be updated to include *jndi:* select string to alert on malicious server requests using the suspicious jndi lookup attempts via jndi:ldap, jndi:rmi, jndi:dns etc. Make sure to set the path to your web server access log file in the IDS Web Attack Detection option. Similar custom text log rules should be added for each of your log4j application log file.
Web-based
WebPulse observed traffic is currently protected for the Log4jShell vulnerability through normal processes. |
Threat Alert: Chrome and Edge RCE exploit publicly disclosed
A remote code execution exploit that works on both Chrome and Edge has been publicly disclosed on Twitter and GitHub. The available exploit is not fully-weaponized and requires additional exploitation to perform a sandbox escape. This is necessary to perform the remote code execution on the local system.
Symantec protects you from these threats, identified by the following:
File-based
Trojan.Malscript
Network-based
Web Attack: Google Chrome V8 Javascript Engine Remote Code Execution |
Threat Alert: CVE-2021-41773, Apache HTTP Server vulnerability
Apache recently published a security advisory and fixed two vulnerabilities in Apache HTTP Server (CVE-2021-41524 and CVE-2021-41773), the later being the most important and also reportedly being exploited in the wild. According to Apache, this vulnerability can allow attackers to map URLs to files outside the expected document root by launching a path traversal attack. Exploiting this flaw may also lead to the leaking of the source of interpreted files such as CGI scripts.
Symantec protects you from this threat, identified by the following:
Network-based
Web Attack: Apache HTTP Server RCE CVE-2021-41773 |
Threat Alert: DarkSide Ransomware still carefully selecting its targets
Active since at least the second half of 2020, the Ransomware gang known as DarkSide has targeted specific companies, often gaining access to their infrastructure via relatively unprotected entry points and then moving further into the network from there. On top of encrypting files these malicious actors also exfiltrate data to add more leverage into the ransom process, threatening to publicly disclose the stolen data if victims do not pay.
Symantec protects you from this threat, identified by the following:
File-based
Ransom.Darkside
Downloader
Heur.AdvML.B
Heur.AdvML.C
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
Network-based
Attack: Ransom.Gen Activity 29
Malicious Site: Malicious Domains Request
System Infected: Trojan.Backdoor Domains 2
Website-based
Observed domains are covered under security categories |
Threat Alert: FireEye reports a hack and theft of Red Team tools
On December 8th, Security firm FireEye revealed that it had been breached by state-sponsored attackers, who apparently stole “Red Team” penetration testing tools and attempted to access customer data. No evidence has yet been found of the tools being used in the wild.
In order to assist organizations in protecting themselves against these stolen tools, FireEye released a GitHub repository of countermeasures that can be deployed which includes Snort, Yara, ClamAV, and HXIOC rules. Utilizing these rules Symantec has collected matching samples and can confirm the below coverage. Further investigation is underway.
File-based
Backdoor.Cobalt
Backdoor.Cobalt!gen1
Backdoor.Cobalt!gen3
Backdoor.Cobalt!gen4
Backdoor.Rozena
Downloader
Exp.CVE-2017-11774
Exp.CVE-2020-1472
Hacktool
Hacktool.Mimikatz
Hacktool.Rebeus
Hacktool.Safetykatz
Hacktool.Seatbelt
Hacktool.SharpHound
Heur.AdvML.B
Heur.AdvML.C
Meterpreter
Packed.Generic.550
Ransom.Wannacry
SecurityRisk.KeeFarce
Trojan Horse
Trojan.Gen
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
Trojan.Mestep
W97M.Downloader
Network-based
Attack: Zoho ManageEngine Desktop Central CVE-2020-10189
OS Attack: Microsoft Netlogon CVE-2020-1472
OS Attack: Microsoft Netlogon CVE-2020-1472 2
OS Attack: Microsoft Netlogon CVE-2020-1472 3
OS Attack: Microsoft Netlogon CVE-2020-1472 4
OS Attack: Microsoft Windows Remote Desktop Services RCE CVE-2019-0708
OS Attack: Microsoft Windows Remote Desktop Services RCE CVE-2019-0708 3
Web Attack: Citrix ADC RCE CVE-2019-19781
Web Attack: Fortinet FortiOS Directory Traversal CVE-2018-13379
Web Attack: Microsoft Exchange Remote Code Execution CVE-2020-0688
Web Attack: Microsoft Office Outlook CVE-2017-11774
Web Attack: Microsoft SharePoint RCE CVE-2019-0604
Web Attack: Pulse Secure SSL VPN File Disclosure CVE-2019-11510
|
Threat Alert: Kaseya VSA Supply Chain Sodinokibi Ransomware
A supply chain attack was recently disclosed by Kaseya in which some of their customers reported being infected with Sodinokibi ransomware.
Kaseya VSA is a platform that allows providers to perform patch management and client monitoring for their customers. Kaseya issued a security advisory recommending their customers immediately shut down their VSA servers while they investigate.
For more information, Symantec has published the following blog: Kaseya Ransomware Supply Chain Attack: What You Need To Know
Symantec protects you from this threat, identified by the following:
File-based
Downloader
Heur.AdvML.C
Packed.Generic.618
Trojan.Gen.2
Trojan.Gen.MBT
Ransom.Sodinokibi
WS.Malware.1
WS.Malware.2
Network-based
Ransom.Gen Activity 29
Audit: Ransom.Gen Activity 55 |
Threat Alert: Microsoft Exchange vulnerabilities exploited (aka Hafnium or ProxyLogon)
On March 2, 2021, Microsoft released an Out-of-Band patch to address actively exploited vulnerabilities affecting Microsoft Exchange by an APT group known as Hafnium. Two of these vulnerabilities (CVE-2021-26855 and CVE-2021-27065) and the technique used have been given the name "ProxyLogon".
Successful exploitation of these vulnerabilities reportedly allowed attackers to gain a foothold in the environment which lead to further compromise, with the goal of stealing data. The following issues are patched in the published security update with four of them being actively exploited.
CVE-2021-26412
CVE-2021-26854
CVE-2021-26855 (Exploited)
CVE-2021-26857 (Exploited)
CVE-2021-26858 (Exploited)
CVE-2021-27065 (Exploited)
CVE-2021-27078
Symantec has published the following signatures targeting the known vulnerabilities and related attacks. We will continue our analysis to add additional protection where possible.
Policy-based
Data Center Security (DCS) Intrusion Prevention (with default policies) provides zero-day protection against the deployment of webshells on Exchange Servers, including those used in these attacks.
File-based
Backdoor.Trojan
Exp.CVE-2021-26855
Hacktool
Hacktool.Regeorg
Hacktool.Nishang
ISB.Downloader!gen313
Trojan.Chinchop
Trojan.Chinchop!gen3
Trojan.Chinchop!gen4
Trojan.Chinchop!gen5
Network-based
Attack: Microsoft Exchange Server CVE-2021-26855
Web Attack: Microsoft Exchange Server CVE-2021-26857
Attack: AntSword Activity
Web Attack: WebShell Access Attempt
Web Attack: WebShell Access Attempt 2
Web Attack: WhatWeb Scanner Request
Web Attack: ASP WebShell Upload Attempt
System Infected: Malicious PowerShell Script Download 4
System Infected: Malicious PowerShell Script Download 5
System Infected: Trojan.Backdoor Activity 404
Threat Defense for Active Directory (TDAD) prevents a potential adversary from spreading across the enterprise. Lateral movement attempts or Domain privilege escalation from the Exchange Server (Patient Zero) for any malicious purpose will be detected and blocked.
Behavioral Isolation
To better protect against such attacks, employing smart ASR techniques is paramount. Symantec's Behavioral Isolation, part of SES Complete offering, is a powerful ASR technology that enables the admin to proactively improve their security posture by identifying unusual and potentially risky behaviors of trusted applications.
Behavioral Isolation utilizes machine learning on Symantec’s global threat telemetry to identify behaviors exhibited by cybersecurity threats that may appear legitimate under certain circumstances and hence evade traditional protection technologies. By blocking unusual behavior of trusted applications, attack chains similar to and including attacks exploiting MS Exchange Servers can be disrupted. |
Threat Alert: Microsoft MSHTML RCE Vulnerability (CVE-2021-40444)
On September 7th, Microsoft published an advisory for a remote code execution (RCE) vulnerability in MSHTML (CVE-2021-40444) which according to reports is actively being used in targeted attacks. MSHTML, also known as Trident, was mainly used by the Internet Explorer browser but is also used by Microsoft Office. This component allows developers to add web browsing functionality to their own applications. In the observed attacks, actors have crafted malicious Microsoft Office documents leveraging the vulnerability.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
File-based
Backdoor.Shelma!g1
Backdoor.Trojan
CL.Suspexec!gen75
Downloader
Exp.CVE-2021-40444
Exp.CVE-2021-40444!g1
Exp.CVE-2021-40444!g2
Exp.CVE-2021-40444!g3
Exp.CVE-2021-40444!g4
Exp.CVE-2021-40444!g5
Exp.CVE-2021-40444!g6
Trojan.Malooxml!g1
W97M.Downloader
Network-based
Malicious Site: Malicious Domains Request
Malicious Site: Malicious Domain Request 59
Web Attack: Malicious Script Download 51
Web Attack: Microsoft MSHTML RCE CVE-2021-40444
Behavior-based
SONAR.SuspLaunch!g161
SONAR.SuspLaunch!g162
Web-based
Observed domains are covered under security categories
Note: We will continue our analysis to add additional protection where possible and update this bulletin. |
Threat Alert: SUNBURST, Global Intruder
There has been a report of a global intrusion campaign in which a malicious operator has compromised the legitimate updater of SolarWinds’ Orion IT monitoring and management software. The backdoor in use is being referred to as "SUNBURST".
SolarWinds has released an advisory and recommend its users to upgrade to Orion Platform version 2020.2.1 HF 1 as soon as possible to ensure the security of their environment.
Symantec has the following protections in place against this attack:
File-based
Backdoor.Sunburst
Backdoor.Sunburst!gen1
Backdoor.SuperNova
Backdoor.TearDrop
Command line protection
CL.Suspexec!gen17
CL.Suspexec!gen18
CL.Suspexec!gen20
Network-based
System Infected: Sunburst Malware Activity
Symantec has published the following blog entry which provides additional technical details related to this alert: Sunburst: Supply Chain Attack Targets SolarWinds Users |
Threat Group TAG-22 continues malicious activities
Threat actor group known as TAG-22 has been reported to leverage compromised GlassFish servers and Cobalt Strike tools in the initial access stages of campaigns targeting telecommunication, research and governmental sectors. The actors have been seen to deploy Winnti, ShadowPad and Spyder backdoor malware among others. The used tools, malware and command and control infrastructure show signs of overlap with several other known threat groups.
Symantec protects you from this threat, identified by the following:
File-based
Backdoor.Rozena
Heur.AdvML.B
ISB.Downloader!gen136
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
W97M.Downloader
Network-based
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed IPs/domains are covered under security categories. |
ThunderCats Hack
The activity being tracked under the name "ThunderCats" seems to be drawing attention in the Russian press with reports that Russian government agencies have been victims of the APT campaign. Based on analysis, the malware used this time, called Mail-O, is a variant of malware known as PhantomNet or SManager, which has been suspected of being associated with a threat actor named "TA428", a Chinese-based attacker. The hacker used the cloud storage facilities of Russian technology companies Yandex and Mail.ru to steal data. Mail-O disguised network activity as legitimate utilities Yandex Disk and Disk-O.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.MBT
Heur.AdvML.C
Trojan Horse
WS.Malware.1 |
ThunderX ransomware makes an appearance
Security Response has become aware of a new ransomware variant dubbed ThunderX which appears to have joined an already crowded ransomware field just this month, September 2020.
This ransomware adds a ".tx_locked" file extension to the files it encrypts.
Symantec protects against this threat as follows:
File-based protection
Ransom.Cryptolocker |
ThunderX strikes again, this time as Ranzy Locker
ThunderX is a relatively new ransomware strain first observed just last month. We have briefly discussed it in one of the recent Protection Bulletins. It looks like the authors behind this malware decided now to release an updated and re-branded version dubbed as Ranzy Locker. At the same time they have also launched a data leak website - thus following similar tactics to many other ransomware groups out there.
We recommend regular backup procedures of any important files and applying the latest product definitions to protect against ransomware threats.
Symantec protections against ThunderX/Ranzy Locker:
File-based
Downloader
Heur.AdvML.B
Ransom.Cryptolocker
Trojan.Gen.2
Trojan.Gen.MBT
Behavior-based
SONAR.SuspLaunch!gen4
SONAR.SuspLaunch!g18 |
TicTacToe Dropper
TicTacToe is a variant of malware dropper recently leveraged in campaigns observed in the wild. This dropper is usually spread via spam campaigns utilizing malicious .iso attachments. Once on the compromised machine, TicTacToe may deliver a wide range of malware payloads including AgentTesla, SnakeLogger, Remcos, LokiBot and others. It is believed this dropper malware is used by multiple threat groups and possibly distributed in form of a malware-as-a-service model.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Ps-RgPst!g1
ACM.Untrst-RunSys!g1
Behavior-based
SONAR.Stealer!gen1
SONAR.SuspBeh!gen752
SONAR.SuspLaunch!g310
File-based
CL.Suspexec!gen8
MSIL.Packed.38
Scr.Malcode!gdn32
Scr.Malcode!gdn34
Trojan.Gen.MBT
WS.Malware.1
WS.SecurityRisk.4
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.A!400
Heur.AdvML.A!500
Heur.AdvML.B!100
Heur.AdvML.B!200
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
TigerDownloader and TigerRAT
An APT group known as Stonefly (aka Silent Chollima and Andariel) which has been predominantly targeting various industries in South Korea is still active. This group has been using both spearphishing and compromised websites, along with a custom downloader (TigerDownloader) and remote access trojan (TigerRAT) as their initial attack vector in recent financial and cyberespionage campaigns.
Symantec protects you from these threats, identified by the following:
Email-based
Coverage is in place for Symantec's email security products
File-based
Trojan.Gen.2
Trojan.Gen.MBT
Trojan Horse
Machine Learning-based
Heur.AdvML.B
Web-based
Observed domains/IPs are covered under security categories |
TimeTime capitalizes on the recent increase in ransomware visibility
A new ransomware that is not as sophisticated as other more common ransomware like Conti, Hive or AvosLocker has been observed . Named TimeTime, it only asks for a €100 euro PaysafeCard, a prepaid payment method, and is written in C# code that is not obfuscated. Although the ransomware note states that files were stolen, there is no evidence of data being exfiltrated.
Symantec protects you from these threats, identified by the following:
File-based
Downloader
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.C |
TinyNuke malware spread in recent campaigns targeting French organizations
According to a recently released report malicious campaigns leveraging TinyNuke banking malware have been seen across the year 2021 with the latest run still active in November. The distribution campaigns have been reported to target various French entities and organizations. The malware is spread via malspam campaigns containing invoice- or financial-themed lures. TinyNuke malware can be used to steal credentials and user data among others.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
Trojan.Tinukebot
Trojan.Tinukebot.B
Trojan.Tinukebot.B!gm
Behavior-based
SONAR.SuspDataRun
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Network-based
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories |
TISAK Ransomware
TISAK is a new ransomware variant observed in the wild. The malware appears to be a strain of the Proxima/BlackShadow ransomware family. It encrypts user data and appends .Tisak extension to the files. Upon completed encryption process a ransom note text file called Tisak_Help.txt is dropped within the encrypted locations on the infected machine. The malware has the functionality to stop various system processes and services as well as delete volume shadow copies. The threat actors behind this ransomware variant threaten the victims with data publication if the requested ransom demands are not met.
Symantec protects you from this threat, identified by the following:
Behavior-based
ACM.Ps-Schtsk!g1
ACM.Untrst-RunSys!g1
File-based
Ransom.Generic.1
WS.SecurityRisk.4
Machine Learning-based
Heur.AdvML.B |
Titan Stealer
On a regular basis, new infostealers are uncovered and most are usually delivered via drive-by-download while posing as fake software. Titan Stealer is one of these that has recently been seen doing the rounds. This malware is fairly generic and below are some of its harvesting capabilities. Stolen information is packed into a zip archive in memory, and the resulting (base64) encoded archive is sent to its command-and-control server.
Passwords, Local State, History and Autofill info from Chromium- based and Gecko- based browsers
Info and files of 55 Crypto-related browser extensions
Screenshots
Cryptocurrency wallets from the various APP locations (Coinomi, Zcash, Armory, bytecoin, Atomic, Ethereum, Guarda and Exodus)
User name, MAC address, CPU and GPU info
Installed softwares
Info from C:/Program Files (x86)/Steam/ and C:/Program Files (x86)/Steam/config/
Recentservers.xml from FileZilla
Wcx_ftp.ini from Total Commander
Key_datas and maps from Telegram Desktop
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen6
File-based
Infostealer
Trojan.Gen.2
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B |
TodayZoo Phishing Kit
Phishing has been prevalent for years now and shows no signs of stopping, its roots being deep in the underground economy with many actors offering phishing kit services. There is no shortage when it comes to these offerings, where groups and individuals can choose from Phishing-as-a-Service (PhaaS), one-time payment kits, leaked source code, and open-source phishing kits. The knowledge is so easy to access and assimilate, some people create their own from the ground up and others pluck and merge codes from different kits, along the lines of TodayZoo.
According to recent reports, the TodayZoo phishing kit has been used in multiple campaigns in an attempt to steal Microsoft credentials.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
Network-based
Malicious Site: Malicious Domain Request 21
Malicious Site: Malicious Domain Request 22
Web-based
Observed domains are covered under security categories |
Toddler banking malware roams the threatscape
Reports indicate that early this year a new mobile banking malware known as Toddler joined the already crowded mobile threat landscape. Similar to many bankers, this malware uses the overlay technique to phish out or “harvest” banking and other credentials. It also has keylogging capabilities.
Symantec protects you from this threat, identified by the following:
Mobile-based
AppRisk:Generisk |
ToddyCat APT
ToddyCat is a relatively new APT attacking high-profile organizations within government and military sectors across Europe and Asia since December 2020. No evidence has been found yet to associate the threat actors behind ToddyCat to other known APT actors.
ToddyCat employs the Samurai Backdoor and Ninja Trojans, two sophisticated cyber-espionage tools designed to penetrate deep into targeted networks whilst maintaining stealth.
Symantec protects you from these threats, identified by the following:
File-based
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.2
Policy-based
DCS provides 0 day protection for this threat with default hardening policies
Web-based
Observed domains are covered under security categories |
ToddyCat APT conducting an active campaign against governmental and telecommunications targets in Asia
A new active campaign called “Stayin’ Alive” has been reported to target governmental and telecommunications targets in Asia. A set of tools used and infrastructure leveraged show specific links to the APT actor known as ToddyCat. The group has been known to target high-profile Asian organizations in similar attacks. “Stayin’ Alive” uses a set of unique downloader and backdoor variants dubbed CurLog, CurLu and CurKeep. The initial attack chain of the campaign is conducted with the help of spear-phishing emails. The dropped payloads can execute reconnaissance on the infected endpoints and report back to the C&C servers controlled by the attackers.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.TCP!gen1
File-based
Downloader
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.A!400
Heur.AdvML.A!500
Heur.AdvML.B
Heur.AdvML.B!200
Heur.AdvML.C
Network-based
System Infected: Trojan.Backdoor Activity 634
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Tomiris group uses a variety of malware tools
We have talked about Tomiris group's own tools in the past, however, recent campaigns show that the threat actor uses a variety of tools, technologies (Rust, Python, Golang, etc) and attack vectors (DNS hijacking, C2s in Telegram) on their campaigns. The only thing that seems consistent is their target being in the Commonwealth of Independent States (CIS). Some of the tools associated with the group are Topinambour, JLORAT, Tunnus, Roopy, Telemiris.
Symantec protects you from this threat, identified by the following:
Behaviour-based
SONAR.TCP!gen1
File-based
Downloader
Trojan Horse
Trojan.Gen.MBT
Trojan.Burtopinam
WS.Malware.*
Machine Learning-based
Heur.AdvML,*
Network-based
System Infected: Trojan.Backdoor Activity 654
System Infected: Trojan.Backdoor Activity 634
System Infected: Trojan.Backdoor Activity 564
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories |
TONEDROP - Earth Preta's new dropper malware
A new dropper malware dubbed TONEDROP attributed to the APT group Earth Preta (aka Mustang Panda) has been discovered in the wild. The dropper is used to deliver malware payloads from the TONEINS and TONESHELL malware families. The campaign targets several countries from various regions including Asia-Pacific (APAC) and Europe. In their attacks the threat actors leverage malicious download sites masqueraded as Google Drive to deliver the initial payloads.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
SONAR.TCP!gen6
File-based
Trojan Horse
Trojan.Gen.NPE
WS.Malware.1
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories |
Top Email trends for October 2020
Spam and Phishing campaigns maintain their place at the top of the email threat landscape this month, with embedded URLs the most common attack vector and Bazaloader accounting for a majority of the malspam volume observed during October. The social engineering tactics employed in these malicious emails can vary from the relatively basic to the highly complex.
Description Category Attack vector Indicators of Compromise (IOC)
Bazaloader delivered by abusing Google Docs services Malspam Embedded URL
Subject keywords: Homepage, document, termination,
Assigned Low, office meeting, Customer Complaint, task list, Subpoena, Payslip, cancellation notice, arrangement, Existing debt, anonymous survey, invoice, office meeting
URL: https://docs.google.com/document/d/e/[redacted]
Leveraging file sharing platform to send malicious meeting email reminders Malspam Embedded URL Subject keywords: Doc#Reminder, Meeting Notice
URL: http://[redacted].failiem.lv/down.php?[redacted]=[filename].xls
Imitating WeTransfer to steal credentials Phishing Embedded URL Subject keywords: New order quote
URL: https://[redacted].com/wen/New%20WeTrans%20Page/[redacted]
Web application creator services leveraged to spread phish Phishing Embedded URL Subject keywords: Warning, Upgrade
URL: https://[redacted].glitch.me/?email=
Impersonating Zoom to steal credentials Phishing Embedded URL Subject keywords: Meeting ID, Message Report
URL: http://t.mail.[redacted].com/r/?id=
Miming Microsoft online excel services to steal credentials Phishing Embedded URL Subject keywords: PAYSLIP INVOICE
URL: http://[redacted].com/securedexcel/#[email]
Wave of fake invoice phish emails emerge to steal credentials Phishing Embedded URL Subject keywords: facturas, nombre
URL: http://[redacted]/wp-docs/blogs//?hash=%email%
Phishing runs carried out by abusing publishing application services Phishing Embedded URL Subject keywords: FSE SO#
URL: https://pub.lucidpress.com/[redacted]/
Note-taking app's file sharing services abused to share phishing content Phishing Embedded URL
Subject keyword: Scan
URL: https://www.evernote.com/shard/[redacted]
Splitting Bitcoin wallet address (BTC) into two to extort money Scam (Extortion)
Bitcoin wallet address (BTC)
Subject keyword: caught
BTC:
Bit-Coin address Part 1: 1FvzzrPWkiAcofL
Bit-Coin address Part 2: SeZFwwjeLH5bgewue7v |
Tor2Mine still active with new variants observed
Tor2Mine is a cryptocurrency malware that mines Monero and is capable of stealing admin credentials in order to spread via the network within a compromised environment. This threat has been around for a few years now and is still active in today's threatscape. As recent reports indicate, new variants have been spotted.
Symantec protects you from these threats, identified by the following:
Behavior-based
SONAR.LoadPoint!gen5
File-based
CL.Downloader!gen111
ISB.Downloader!gen*
ISB.Heuristic!gen*
Trojan.Gen.NPE
Trojan.Gen.6
Trojan horse
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.B
Network-based
Audit: Powershell Base64 Script Execution 02
System Infected: Malicious PowerShell Script Download 24
System Infected: Trojan.Backdoor Activity 618
Web Attack: Malicious HTA File Download 3 |
Tortilla runs campaign deploying variants of Babuk
A relatively new threat actor, known as Tortilla, has been found linked to a recent malicious campaign deploying variants of Babuk ransomware. Users predominantly affected were in the U.S., with smaller numbers of infection in Brazil, Finland, Germany, Honduras, U.K., Ukraine, and Thailand. This particular Babuk campaign relies on exploiting vulnerabilities in Microsoft Exchange Server.
Vulnerabilities with ProxyShell are used to run obfuscated commands to connect and download a packed downloader module from the actor's infrastructure. An exploit that attempts to escalate the process privileges using a vulnerability in the Encrypted File System is used as well.
The PowerShell command invokes a web request to connect to the malicious repository to download the main loader module, saves it and then runs it. The ransomware module encrypts the files in the victim's server, appends a file extension pertaining to Babuk to the encrypted files, and then the threat actor demands payment from the victim to obtain the decryption key to regain their files.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.ProcHijack!g51
File-based
ISB.Heuristic!gen56
Packed.Generic.347
Packed.Generic.619
Ransom.Gen
Trojan Horse
Trojan.Gen.2
Trojan.Gen.9
Trojan.Gen.MBT
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories |
TP-Link Archer AX21 CVE-2023-1389 still being exploited by botnets
Last year an unauthenticated command injection vulnerability, CVE-2023-1389, was disclosed for the web management interface of the TP-Link Archer AX21 (AX1800) router. Despite this vulnerability being reported and remediated, numerous campaigns still exploit it. Recent attacks have been observed utilizing various botnets including Moobot, Miroi, AGoent, and Gafgyt. As botnets are known to target IoT vulnerabilities users should install the latest updates and follow manufacturer remediation steps.
Symantec protects you from these threats, identified by the following:
File-based
CL.Downloader!gen277
Linux.Mirai
Trojan.Gen.NPE
Trojan Horse
WS.Malware.1
Network-based
Attack: TP-Link Router Remote Code Execution Vulnerability CVE-2023-1389 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.