text
stringlengths
0
383k
Symantec coverage for FASTCash 2.0 campaign Details about a recent campaign called FASTCash 2.0 have been published by the US government. The malicious activity has been attributed to a threat actor named BeagleBoyz which is reportedly under the HIDDEN COBRA umbrella. The attack has targeted numerous financial institutions around the world in an ATM cash-out scheme. Attacks involve injection into the target institution network followed by reconnaissance and further compromise to allow for monetization. FASTCash related activity has reportedly been performed by this group since 2016. Symantec Protections Heur.AdvML.C Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE
Symantec coverage for malware used by OldGremlin Recent reports have identified a Russian threat actor group named OldGremlin which has been observed targeting Russian entities. Attack campaigns associated with this group typically involve phishing emails with malicious attachments or links that install a custom piece of malware. This malware is then used to perform additional activity including network propagation, data exfiltration, reconnaissance, or file downloads and execution. The intended payload of these attacks are to infect systems with TinyCryptor ransomware. Symantec provides the following protections for indicators associated with this group: File based CL.Downloader!gen20 CL.Downloader!gen234 Heur.AdvML.C ISB.Heuristic!gen5 Trojan Horse Trojan.Gen.NPE
Symantec coverage for Qbot's New Tricks The infamous malware family Qbot (aka Qakbot) has introduced some new functionality to its already comprehensive list of capabilities. Security Response has observed the inclusion of an email collector module into recently seen Qbot samples. This module is responsible for collecting emails from a compromised target for use in subsequent social engineering malspam campaigns. This feature comes in addition to the information stealing, remote control and payload execution capabilities already present in this family. Symantec protections include the following: File based Heur.AdvML.B ISB.Downloader!gen346 Packed.CryptOne!gen1 Trojan.Anserin Trojan.Gen.MBT VBS.Dropper!gen2 Network based System Infected: JS.Downloader Activity 33
Symantec Coverage for Recently Observed Thanos Ransomware According to a recent report, Thanos Ransomware was observed targeting two state-run organizations in the Middle East and North Africa. There are indications that the threat actor behind the attacks had previously gained entry into the organizations to obtain valid credentials. These credentials were then used in conjunction with Powershell scripts to distribute the Thanos Ransomware within the affected networks in later attacks. Symantec has the following detections for associated IOCs: Downloader Ransom.Cryptolocker Ransom.Gen Ransom.Thanos Trojan Horse Trojan.Malscript
Symantec coverage for recent Trickbot/Emotet campaign On September 11 we observed a new email campaign attempting to deliver malware. The campaign leveraged an attachment with a malicious macro that was responsible for delivering either the Trickbot or Emotet Trojans to victims. The attack made use of hidden text within the attached document to pass parameters to a non-obfuscated macro. This in turn created a base64 encoded text file that is later decoded into a dll downloader payload, which masqueraded as a pdf file. The dll is responsible for downloading the Trickbot or Emotet payloads. Subjects and attachment names used in this campaign include the following: all the details doc documents paperwork The attachment is typically named in the format of Doc_XXXX.doc where XXXX is a random four digit number. Symantec provides the following protections against this attack: File based Downloader Heur.AdvML.C Trojan.Trickybot W97M.Downloader Email Trojan.Dridex
Symantec coverage for Remote Access Trojan BLINDINGCAN A new malware analysis report was released on August 19 which provides technical details regarding BLINDINGCAN, a remote access Trojan. This Trojan has reportedly been used by the HIDDEN COBRA actor group to perform espionage against targets of interest. This particular campaign involved targeting government contractors via socially engineered malicious Office documents in an attempt to install the BLINDINGCAN implant. The suspected objective of the campaign is to obtain intelligence related to key military and energy technologies. Symantec has confirmed coverage for the available IOCs under the following names: File based Backdoor.Trojan Hacktool Trojan.Gen.NPE Trojan.Mdropper Trojan.Volgmer.B Network based System Infected: Backdoor.Trojan Activity 254 System Infected: Backdoor.Trojan Activity 255
Symantec coverage observed for Trickybot Banking Trojan during August There has been a lot of recent news regarding the resurgence of the Emotet banking Trojan and its return from dormancy. While active, Emotet related activity typically accounts for the most visibility among banking Trojans. Based on intelligence collected for the previous month we can see that the second most active banking Trojan during the period has been Trickybot. Data taken from prior to this period suggests that Trickybot activity has been consistent as opposed to the inconsistent spikes observed with Emotet. Security Response has observed the following detections for Trickybot during the month of August. File based Trojan.Trickybot Trojan.Trickybot!g12 Trojan.Trickybot!g13 Trojan.Trickybot!g7 Trojan.Trickybot!gen1 Trojan.Trickybot!gen2 Trojan.Trickybot!gen6 Network based System Infected: Trojan.Trickbot Activity System Infected: Trojan.Trickybot Activity 10 System Infected: Trojan.Trickybot Activity 12 System Infected: Trojan.Trickybot Activity 15 System Infected: Trojan.Trickybot Activity 3 System Infected: Trojan.Trickybot Activity 5 System Infected: Trojan.Trickybot Activity 7 System Infected: Trojan.Trickybot Activity 9
Symantec Protection for Malspam campaign using GuLoader Security Response has become aware of reports of malspam campaigns using GuLoader, returning around the second week of July after it's activity dropped off in late June. It is known that GuLoader has a connection with an Italian software company called CloudEye. When CloudEye announced their business resumption after a month of interruption, an increase in malspam activity using the classic DHL delivery lure pushing GuLoader was observed. Symantec Protections AV: Trojan.Gen.2 Email: W32/Generic
Symbiote - a new malware targeting Linux A new malware targeting the Linux platform and dubbed as Symbiote has been discovered in the wild. Instead of using standalone malicious executable, Symbiote comes in form of a shared object (SO) library loaded into all running processes on the compromised machine. The malware allows the attackers remote access to the machine and ability to collect user credentials among others. Similarly as BPFDoor malware discovered just last month, Symbiote leverages Berkeley Packet Filter (BPF) to hide its communication on the infected host. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.NPE WS.Malware.1 WS.Malware.2 Web-based Observed domains are covered under security categories
Sync-Scheduler Infostealer A Infostealer dubbed as Sync-Scheduler, written in C++, has been reported as being distributed concealed within Office document files. The malware employs file-nesting techniques to conceal its presence and is equipped with anti-analysis and defense evasion techniques. Upon compromising systems, it searches through users' personal directories for office documents such as Word, PowerPoint, and Excel files. The stolen data is then exfiltrated over the network as form-data. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.MalTraffic!gen1 File-based Trojan.Gen.MBT Trojan Horse WS.Malware.1 Machine Learning-based Heur.AdvML.A Heur.AdvML.C Network-based Audit: Bad Reputation Application Activity System Infected: Bad Reputation Process Request 4 Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
SYS01 Stealer goes after Facebook business accounts SYS01 Stealer is a type of infostealing malware recently leveraged in campaigns targeting Facebook business accounts belonging to individuals related to governmental institutions and manufacturing industries, among others. The attackers make use of Google Ads or fake Facebook profiles in order to distribute the malicious payloads to unsuspecting victims. SYS01 Stealer is designed to steal confidential information such as login credentials, Facebook business account information, cookies and others. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 SONAR.TCP!gen6 File-based Trojan Horse Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.B Web-based Observed domains/IPs are covered under security categories
SysAid IT Support Software zero-day vulnerability exploited in the wild A new campaign exploiting a zero-day flaw in SysAid IT support software has been reported. The threat actor Lace Tempest has been associated with these targeted attacks. The identified issue, labeled as CVE-2023-47246, revolves around a path traversal flaw capable of enabling code execution within on-premise installations. Following the exploitation of this vulnerability, the threat actor utilized the compromised SysAid software to issue commands, facilitating the delivery of a malware loader for the Gracewire malware.. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.NPE WS.Malware.1 Machine Learning-based Heur.AdvML.A Network-based Web Attack: SysAid Path Traversal CVE-2023-47246 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
SYSDF Ransomware SYSDF is a recently identified Dharma/Crysis ransomware variant. The malware encrypts user files and appends .SYSDF extension to them. In addition, a unique victim ID and a malware developers' email address is added as well. SYSDF drops the ransom note in the form of a text file onto the victims' machine. The malware includes the capabilities to delete the volume shadow copies on the infected host . Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Ps-RgPst!g1 ACM.Vss-DlShcp!g1 Behavior-based SONAR.RansomCrys!g2 File-based Ransom.Crysis Ransom.Crysis!gm SMG.Heur!gen WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B!100 Heur.AdvML.B!200
Syslogk - a new Linux rootkit discovered A new Linux rootkit dubbed Syslogk has been discovered in the wild. According to a recent report, Syslogk is based on an older open-source rootkit known as Adore-Ng and appears to be under active development. The rootkit has functionality to hide directories containing malicious files on the infected machine as well as malicious network traffic. Syslogk also has the ability to hide a malicious payload - in this case a backdoor from the Rekoobe malware family. Symantec protects you from this threat, identified by the following: File-based Backdoor.Trojan Trojan Horse Trojan.Gen.2 Trojan.Gen.NPE WS.Malware.2
Sysrv-Hello exploits multiple vulnerabilities for cryptomining Sysrv-Hello is a Monero cryptoming botnet that emerged in the wild around December 2020. According to multiple reports, the botnet has been increasingly active this year and has been consistently adding new exploits to target more vulnerable systems. The initial multi-component build of the malware has been replaced by a single binary in the latest revision, that is capable of both cryptomining and spreading to other systems. Over the last months Sysrv-hello has been observed exploiting a larger amount of vulnerabilities, among others: CVE-2021-3129 - Laravel CVE-2020-16846 - Saltstack CVE-2020-14882 - Oracle Weblogic CVE 2019-11581 - Atlassian Jira Server CVE-2019-10758 - Mongo Express CVE-2019-7238 - Sonatype Nexus Repository Manager CVE-2019-3396 - Atlassian Confluence Server CVE-2019-0193 - Apache Solr CVE-2018-7600 - Drupal Ajax CVE-2017-12149 - Jboss Application Server CVE-2017-11610 - XML-RPC CVE-2017-9841 - PHPUnit CVE 2017-5638 - Apache Struts MVC Symantec protects you from this threat, identified by the following: File-based: Downloader Heur.AdvML.B Heur.AdvML.C Miner.XMRig Trojan.Gen.MBT Trojan.Gen.NPE Trojan Horse Network-based: Attack: Apache Struts CVE-2017-5638 Attack: Mongo Express RCE CVE-2019-10758 Web Attack: Atlassian Confluence Server CVE-2019-3396 Web Attack: Coinminer Download 5 Web Attack: Drupal RCE CVE-2018-7600 Web Attack: Jira Remote Code Execution CVE-2019-11581 Web Attack: Laravel RCE CVE-2021-3129 Web Attack: Malicious File Download 52 Web Attack: Oracle Weblogic Server RCE CVE-2020-14882 Web Attack: PHPUnit RCE CVE-2017-9841 Web Attack: SaltStack Remote Code Execution CVE-2020-16846 Web Attack: Sonatype Nexus Repository Manager RCE CVE-2019-7238 Web Attack: Trojan.Coinbitminer Download Web-based Observed domains are covered under security categories
SystemBC (Coroxy) continuous activities SystemBC (also known as Coroxy) is a proxy bot malware well known on the threat landscape and distributed by various threat groups in recent years. Its functionality is quite diverse starting with data collection from the compromised systems, establishing persistence, setting up SOCKS5 proxies for malicious traffic tunneling as well as download and execution of additional arbitrary payloads including ransomware. SystemBC is known to be sold on the underground markets and often distributed by various loaders in malspam campaigns. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based Backdoor.SystemBC Backdoor.SystemBC!g1 Backdoor.SystemBC!g2 Backdoor.SystemBC!g3 Trojan Horse Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.A!400 Heur.AdvML.A!500 Heur.AdvML.B!100 Heur.AdvML.B!200 Network-based System Infected: Trojan.Backdoor Activity 597 System Infected: Trojan.Backdoor Activity 634 System Infected: Trojan.Backdoor Activity 721 Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
SystemBC continues to be used in malicious campaigns SystemBC (also known as Coroxy) is a well known proxy bot leveraged over the years by various threat actors to download and execute malicious payloads including ransomware. SystemBC has a distinct functionality that allows it to set up SOCKS5 proxies on the infected clients for the purpose of malicious traffic tunneling. SystemBC is know to be sold on the underground forums and remains an active threat on the landscape to this day. Some of the latest campaigns leveraging this malware have also been reported to deliver CobaltStrike as its payload. Symantec protects you from this threat, identified by the following: File-based Backdoor.Cobalt Backdoor.SystemBC Backdoor.SystemBC!g1 Backdoor.SystemBC!g2 Backdoor.SystemBC!g3 Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.B Heur.AdvML.C Network-based System Infected: Bad Reputation Process Request 4 System Infected: Trojan.Backdoor Activity 634 Web-based Observed domains/IPs are covered under security categories
SystemBC Malware-as-a-Service (MaaS) As per recent reports, SystemBC malware has been leveraged by Ryuk group involved in extortion and ransomware activities. SystemBC evolved as a backdoor and proxy bot since its first release, the latest variant being capable of process-hollowing thus hiding the payload from static analysis. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.B Heur.AdvML.C Ransom.Wannacry Trojan.Gen.MBT Trojan.Gen.2 Trojan Horse Trojan.Mdropper Network-based URL reputation: Browser navigation to known bad URL Malicious Site: Malicious Domains Request System Infected: Trojan.Backdoor Domains 2 Web-based Observed IP/Domains are covered under security categories
SystemBC RAT spam run unleashed SystemBC was recently spammed out in spreadsheet attachments which contain malicious macros. Enabling the macro will download and install a remote file, which is the SystemBC Remote Access Trojan (RAT). The RAT is able to phone home, execute files, and act as a Tor proxy. Some of the malicious spreadsheet names include: DOCUMENT-[random numbers].xls documentation-[random numbers].xls agreement-[random numbers].xls Document[random numbers].xls required-[random numbers].xls contract-[random numbers].xls documents-[random numbers].xls docs-[random numbers].xls data-[random numbers].xls answer-[random numbers].xls Symantec provides the following protection against this attack: File-based Trojan.Mdropper Trojan.Gen.2 Scr.Malcode!gen Network-based System Infected: CoinMiner Activity 6 System Infected: CoinMiner Activity 7 System Infected: Trojan.Backdoor Activity 373 Web-based Observed domains are covered under security categories Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
TA2722 threat group distributes Remcos and NanoCore RATs in the latest campaigns According to latest reports, a recent wave of malicious campaigns distributing either Remcos or NanoCore remote access trojans (RATs) has been associated to a new threat actor dubbed as TA2722 (or Balikbayan Foxes). The attackers have been impersonating Philippine Department of Health, the Philippine Overseas Employment Administration (POEA) or the Kingdom of Saudi Arabia embassy in Manila, among others. The malicious campaigns have been targeting various industries across North America, Europe and Southeast Asia. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products File-based Packed.Generic.610 Scr.Malcode!gdn30 Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories
TA402 APT group delivering new downloader dubbed IronWind The APT group TA402 has been reported delivering a new downloader dubbed IronWind in their recent phishing campaigns targeting Middle Eastern government entities. The attack vector starts with a phishing email containing XLL or RAR file attachments. When these attachments are opened, they lead to the download and sideloading of the malware DLL. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.MBT WS.Malware.1 WS.Malware.2 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
TA505's first spam activity in September Several tweets indicate that a renowned cyber crime gang known as TA505 (a.k.a. SectorJ04, Graceful Spider and Gold Tahoe) continues to be active in September 2020. The group is allegedly behind distribution of Dridex and Locky ransomware. Various malware that are believed to be SDBbot, Get2 Downloader and a RAT are distributed through spam messages with malicious macros. Symantec provides the following protection against this recent spam campaign: Trojan.Gen.2 Trojan.Gen.MBT
TA505's TeslaGun control panel leveraged for ServHelper malware distribution APT group known as TA505 (a.k.a EvilCorp) has been reported to leverage a new software control panel called TeslaGun for the purpose of managing its ServHelper malware campaigns. TA505 threat actor is a financially motivated group known for several years and the ServHelper malware has been also used in various previous attacks attributed to this APT. The TeslaGun panel allows the attackers to distribute the backdoor malware to selected targets, manage attack data and information collected from the victims as well send remote commands to the infected hosts. Symantec protects you from this threat, identified by the following: File-based Packed.Generic.525 Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.C Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories
TA544 activities involving IDAT Loader A new set of malicious activities attributed to the TA544 (aka Narwal Spider) threat group has been reported in the wild. This threat actor has been known to target various Italian organizations and entities in the past. In their latest campaigns, the attackers have been leveraging new variants of the IDAT Loader malware to deliver various payloads such as Remcos RAT or SystemBC malware. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT Trojan.Mallnk WS.Malware.1 Machine Learning-based Heur.AdvML.A!400 Heur.AdvML.A!300 Heur.AdvML.A!500 Heur.AdvML.B!200 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
TA551 APT group distributes BazarLoader in recent malspam campaigns It has been reported that the threat group known as TA551 (or Shathak) has been spreading BazarLoader malware in recently observed malspam campaigns. The group has been previously seen distributing a variety of malware variants such as Trickbot, Ursnif or IcedID. The recent malspam campaign leverages password protected .zip archives that contain MS Office documents with malicious macros. Once the victim enables the macros, the document drops a .hta file that retrieves BazarLoader binaries and infects the host with it. BazarLoader malware observed in this campaign leads to a Cobalt Strike payload. Symantec protects you from this threat, identified by the following: File-based Backdoor.Cobalt Downloader JS.Downloader Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE W97M.Downloader Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories
TA551 malspam campaigns distribute IceID infostealer Email-based malware distribution campaigns associated with TA551 have been distributing mostly Ursnif or Valak infostealer in the past. It has been reported recently that the latest iterations of those campaigns started pushing IceID infostealer instead. The campaign uses .zip packed and password-protected Word documents distributed via spam emails. The extracted .doc files include malicious macros that retrieve installers for the IceID malware when executed. Indicators of compromise (IOC) examples: Email subject: Re: FBO Jets Checking In Attachment: request.zip Content: adjure.12.20.doc Email subject: Re: Join us for the UltraSet Matrix Presentation (New Carpet Tile) Attachment: request.zip Content: legal agreement.12.20.doc Email subject: Re: New Little Giant Kombo ladders Attachment: request.zip Content: charge.12.20.doc Symantec provides the following coverage of the latest activities related to TA551: File-based Heur.AdvML.B Heur.AdvML.C ISB.Downloader!gen386 ISB.Downloader!gen424 Trojan.Gen.NPE Trojan.Gen.MBT Trojan.Horse W97M.Downloader Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
TA551 observed distributing IcedID via malspam TA551 , also known as Shathak, has distributed many different malware families over the past few year including Ursnif, Valak, BazarLoader and Trickbot. These initial vectors often lead further Cobalt Strike infestations. Recent attacks began with malspam spoofing replies to previously valid emails containing password protected zip attachments. The password is included in the email body and a Microsoft Office document is contained in the zip archive. Opening the file and running the macro infects the machine with IcedID (Bokbot). Symantec protects you from these threats, identified by the following: File-based Trojan Horse Trojan.Gen.2 Trojan.Malscript W97M.Downloader Email-based Coverage is in place for Symantec's email security products
TA577 activity continues - malicious email campaigns propagate DarkGate The DarkGate loader, first observed in 2018, has over the past few weeks gained in prevalence following the takedown of Qakbot by law enforcement. Most likely due to that takedown, since September the threat actor known as TA577 (used to be an affiliate of Qakbot) who continues to deliver Pikabot and IcedID, has also started to deliver DarkGate via its malicious email campaigns. While it's primarily used as a loader, DarkGate also has a Hidden Virtual Network Computing (HVNC) module, keylogging capabilities, and information-stealing capabilities. Over the past few weeks, Symantec has observed multiple TA577 attack chains rotating through its tools and techniques as described below. Sept 21st: Email > ZIP > LNK > CURL > VBS > AutoIT > EXE (DarkGate) Sept 23rd: Email > URL > ZIP > LNK > CURL > VBS > AutoIT > EXE (DarkGate) Sept 25th: Email > PDF > URL > XLL > HTA > CURL > VBS > MSI > AutoIT > EXE (DarkGate) Email > PDF > URL > XLL > HTA > CURL > VBS > AutoIT > EXE (DarkGate) Sept 26th: Email > PDF > URL > XLL > CURL > DLL (IcedID) Email > PDF > URL > ZIP (Password Protected) > LNK > CURL > VBS/MSI > AutoIT > EXE (DarkGate) Sept 28th: Email > URL > ZIP (Password Protected) > LNK > CURL > DLL (Pikabot) Email > URL > ZIP (Password Protected) > LNK > CURL > DLL (IcedID) Oct 2nd: Email > URL > Zip (Password Protected) > LNK > CUR > VBS > CMD > CURL > AUTOIT > EXE (DarkGate) Email > PDF > URL > Zip (Password Protected) > LNK > CUR > VBS > CMD > CURL > AUTOIT > EXE (DarkGate) Oct 3rd: Email > PDF > TDS-404 > URL > XLL > HTA > CMD > CURL > DLL (DarkGate) Oct 4th: Email > URL > ZIP > LNK > Regsvr32 (*.sct) > Rundll32 > DLL (Pikabot) Email > PDF > URL > ZIP > VBS > CMD > CURL > DLL (DarkGate) Email > PDF > URL > ZIP > JS > PS(on memory) > DLL Oct 5th Email > HTML > ZIP > PEEXE (Bumblebee) Email > URL > ZIP > JS > PEDLL (PikaBot) Oct 9th Email > URL > ZIP > MSI > AUTOIT > PEEXE (DarkGate) Oct 10th Email > URL > JS > CURL > PEDLL (Bumblebee) Email URL > ZIP > MSI > KeyScramblerIE > Shellcode > CMD > CURL > AUTOIT (DarkGate) Email > PDF > URL > ZIP > MSI > KeyScramblerIE > Shellcode > CMD > CURL > AUTOIT (DarkGate) Email > URL > ZIP > VBS > AUTOIT (DarkGate) Oct 11th Email > PDF > URL > ZIP > MSI > AUTOIT (DarkGate) Email > PDF >URL > ZIP > VBS > AUTOIT (DarkGate) Oct 13th Email > MS TEAMS > URL > ZIP > LNK > PS > AUTOIT (DarkGate) Email > PDF > URL > ZIP > MSI > AUTOIT (DarkGate) Email > PDF >URL > ZIP > VBS > AUTOIT (DarkGate) By closely tracking the activities of TA577 and their evolving attack chains, Symantec ensures that our security measures are continually updated and improved. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. Behavior-based SONAR.Heur.Dropper File-based Downloader ISB.Downloader!gen68 ISB.Dropper!gen1 ISB.Houdini!gen7 Js.Downloader Memscan.SuspLoad!g1 Trojan.Gen.MBT Trojan Horse Trojan.Darkgate Trojan.Darkgate!gen1 Trojan.Darkgate!gen2 VBS.Downloader.Trojan WS.Reputation.1 Machine Learning-based Heur.AdvML.B Heur.AdvML.C Network-based System Infected: Malicious File Download Request 3 Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
TA588 continues espionage activities in Latin America The TA558 group, known for targeting various sectors across Latin America, has recently been observed employing spam emails with malicious attachments to distribute Venom RAT, a remote access trojan derived from Quasar RAT. This malware is equipped with functionalities for harvesting sensitive data and gaining remote control over compromised systems. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 File-based Scr.Malcode!gdn32 Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Tambir Android malware Tambir is a backdoor malware known to be targeting Android users in Turkey. The malware has extensive infostealing functionality incorporating theft of SMS messages, keystrokes, dialing premium numbers, running additional apps, etc. Similarly to other mobile malware variants Tambir abuses the Android accessibility service to conduct its activities. Upon execution the malware retrieves the attackers C2 addresses from public channels such as Telegram or ICQ. Symantec protects you from this threat, identified by the following: Mobile-based Android.Reputation.2 AppRisk:Generisk
Taurus Loader activity continues According to a recently released report, Taurus Loader keeps getting distributed via websites offering cracked software. The main function of the loader is to download additional payloads onto the compromised machines, among others the Taurus Stealer malware. Taurus has been observed to leverage AutoIT scripts during the execution of its numerous evasion techniques. Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.B Heur.AdvML.C Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Behavior-based SONAR.SuspPE!gen32
Taurus Stealer strikes back through exploit kits Recent reports identified ongoing malvertising campaigns distributing Taurus stealer with the use of the Fallout Exploit Kit. Taurus is a type of infostealing malware discovered earlier this year. The malware shares many characteristics with the well known Predator Thief infostealer and is believed to be used by the same threat actor. It has capabilities to steal passwords and cookies from various browsers, FTP and email credentials as well as cryptocurrency wallets. File-based protection Trojan.Gen.2 Trojan.Gen.MBT W97M.Downloader Network-based protection System Infected: Taurus Infostealer 1 Website-based protection This attack is blocked by Symantec Web Isolation technology.
Tax-related smishing campaign observed in Australia The tax season in Australia commences on July 1st each year, extending through October 31st. This is naturally the period when tax-related social engineering is most frequently observed. In a recent example, Symantec observed an SMS phishing (aka "smishing") campaign in which scammers posed as the tax office, hoping to lure Australians to a fake MyGov website hosted on IPFS. Short for Interplanetary File System, the IPFS is a peer-to-peer distributed file system that allows people around the world to exchange files. The phishing website is designed to harvest users' MyGov credentials. SMS example: New important message about your 2023 Income Tax. Visit hxxps[:]//bafkreibl6kyjzitljufhxvde37x5ux2az7hmcw7eereqzaepji4pesqqcm[.]ipfs[.]dweb[.]link to claim your refund Symantec protects you from this threat, identified by the following: Mobile-based Symantec Endpoint Protection Mobile is able to analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. The fake domains used in this campaign are known to WebPulse. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Tax-Themed phishing campaign deploys XWorm RAT An email phishing campaign has been reported deploying the Remote Access Trojan (RAT) XWorm. The attack begins with an HTML tax document attachment. Upon opening, it triggers the download of a JavaScript file which then executes a PowerShell script. This script is equipped with features to terminate running processes, manage decoy PDF files, disable User Account Control (UAC), and ultimately deliver the XWorm payload. XWorm enables threat actors to gain unauthorized access to devices, facilitating the theft of sensitive information such as login credentials and passwords. Additionally, it includes capabilities for clipboard monitoring, installing ransomware, and launching Distributed Denial of Service (DDoS) attacks. Symantec protects you from this threat, identified by the following: File-based ISB.Downloader!gen572 Scr.Malcode!gen WS.SecurityRisk.4 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Teabot, new Android infostealer brewing in Europe Security researchers have recently discovered a new Android infostealer targeting European financial institutions that includes the following functionality: Full control of the infected device via Accessibility Services and real-time screen-sharing Key logging capabilities Steal credentials via overlay attacks Ability to modify, send, or hide SMS messages Intercept Google Authentication codes Symantec protects you from this threat, identified by the following: Mobile-based AppRisk:Generisk
Tele2 phishing campaign in Netherlands and Belgium On a daily basis Symantec observes phishing campaigns where actors pose as known telecommunication companies around the world. Cyber criminals often pose as so in phishing attacks because these companies have a large number of customers, and people are likely to trust communications from them. Symantec has recently uncovered a Tele2 phishing campaign targeting both consumers and businesses in the Netherlands and Belgium. The attackers attempted to lure users with malicious emails pretending to be notifications of denied access and including a link to a fake Tele2 login website. Below are the observed email subjects Herinnering: Uw toegang wordt als ongeautoriseerd verklaard Uw toegang wordt geweigerd Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products Web-based Observed domains/IPs are covered under security categories
TellYouThePass - another ransomware variant exploiting Log4j vulnerability Tellyouthepass is the second ransomware variant after the recently reported Khonsari to leverage the Log4j vulnerability (CVE-2021-44228). This ransomware family is relatively old and hasn't been much active in the last two years. Tellyouthepass comes both in Windows and Linux versions, with the Linux one being able to harvest SSH keys and move laterally through the networks. Symantec protects you from this threat, identified by the following: File-based Downloader Ransom.Tellyouthepass Ransom.Tellyouthepa!g1 Ransom.Tellyouthepa!g2 Trojan Horse Trojan.Gen.NPE Behavior-based SONAR.Cryptlocker!g75
Temp Stealer - a new infostealer variant Temp Stealer is a new run-of-the-mill infostealer variant advertised on underground forums. The malware is able to exfiltrate various data from the compromised endpoints including crypto wallets, browser data, system information as well as data from applications such as Discord or Telegram. According to a recent report, Temp Stealer is often disguised as software cracks or keygens but can also be spread as bundled installers for various other software. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.A Heur.AdvML.B Web-based Observed domains/IPs are covered under security categories
Teng Snake Ransomware Ever since Chaos ransomware source code hit public sources it sprung countless variants that are operated by groups and individuals around the world. Teng Snake ransomware is one of these variants recently observed in the threat landscape. According to the ransom note left on the victim's machine, this actor does not employ double-extortion tactics and has been asking for 10,000 Tether (equivalent to 10,000 US Dollars). Post-encryption, files are appended with four random characters. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.SuspLaunch!g18 File-based Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B
Teslarvng Ransomware A ransomware gang known as Teslarvng has increased their activity in recent months. These actors are not new to the threat landscape and have evolved over time, employing various infection vectors ranging from malicious emails to Remote Desktop Protocol attacks. They also employ the infamous "double extortion" tactic – exfiltrating the data before encrypting it. This way if the company refuses to pay the ransom, the attacker can threaten to publicize their data by either publishing it online or selling it to the highest bidder. Symantec protects you from this threat, identified by the following: File-based Downloader Ransom.Teslarvng Ransom.Teslarvng!g1 Trojan.Gen.MBT Trojan.Horse WS.Malware.1 WS.Malware.2 Behavior-based SONAR.SuspLaunch!gen4 SONAR.SuspLaunch!g18 Network-based Attack: Ransom.Crysis Activity 3
TFlower Ransomware distributed with the help of MATA malware framework According to a recent report, a new campaign has been discovered where the TFlower Ransomware is being deployed with the help of MATA malware framework. MATA framework was first discovered in July 2020 and is being linked to the infamous Lazarus APT group. As we continue to monitor and enhance our protections against TFlower ransomware variants, we recommend performing regular backups for any important data and ensuring your security products are kept up to date with the latest product definitions. Symantec's protections against this campaign and the TFlower ransomware variants include: File-based Heur.AdvML.C Trojan.Gen.MBT Trojan.Gen.NPE Trojan Horse OSX.Trojan.Gen
TgToxic Android malware TgToxic is an Android malware variant observed in campaigns targeting users in Southeast Asia since around the middle of last year. The malware has been used for phishing and infostealing purposes. The attackers have been targeting ex-filtration of credentials and data related to banking or email applications and cryptocurrency wallets of the compromised users. TgToxic leverages WebSocket as a communication channel with the attackers' C2 servers. Symantec protects you from this threat, identified by the following: Mobile-based AdLibrary:Generisk Android.Malapp Android.Reputation.2 AppRisk:Generisk Web-based Observed domains/IPs are covered under security categories
The BlackHeart Badboy lives on A recently discovered ransomware variant "Alix1011RVA" contains a contact email address that is also present in another ransomware which appeared on the scene back in December 2019. This older ransomware is known as Badboy, which appears to be a member of the BlackHeart ransomware family. The Alix1011RVA strain adds a file extension ".Alix1011RVA" to the files it encrypts. Symantec provides the following protection against this threat: File-based Protection Ransom.Cryptolocker Trojan.Gen.2
The comeback of the WannaRen ransomware WannaRen is an older ransomware variant discovered back in 2020. It has been reported that WannaRen has now made a comeback under a re-branded name of Life ransomware and that it targets users in India. The malware is spread in a form of a MSI package binary and it abuses legitimate system components for DLL sideloading. The malware will append .life extension to the encrypted files. Symantec protects you from this threat, identified by the following: File-based Backdoor.ASync!gm Ransom.Gen Scr.Malcode!gdn14 Trojan Horse Trojan.Dropper Trojan.Gen.2 Trojan.Gen.MBT WS.Malware.1 Machine Learning-based Heur.AdvML.B
The French and Spanish job – A Formbook campaign Symantec Security response has recently observed an on-going Formbook campaign that mainly targets companies in France, Belgium, North Africa and a few in Spain. There was also some spill over to international companies which have satellite offices in those countries and a French speaking workforce. Actors behind this attack have been spurting a series of spam every 2 to 3 days. The bulk of the malicious emails associated with this activity are written in French and some in Spanish. They all have a zip file attached in which Formbook is waiting patiently to be unleashed by unwary corporate victims. It must be noted that no special social engineering is being used, just the usual run-of-the-mill quotes, billing and banking transfer tricks. Email subjects: CONSULTATION Etat des factures non réglées. demande offre de prix DEMANDE DE PRIX virement transferencia Symantec has various protections in place against this attack: File-based Trojan.Formbook Trojan.Gen.2 Downloader.Ponik!gen9 WS.Malware.2 Heur.AdvML.B Behavior-based Sonar.Heuristic.159 Sonar.Di!gen1 Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
The Mobile Malware Threat Remains There are regular reports of newly discovered malware disguised as legitimate mobile apps. While malicious mobile apps are not as prevalent as Windows based malware, they remain an ongoing threat. In the last 180 days Symantec has discovered over 350,000 new malicious mobile apps. Symantec now processes over 88,858 mobile apps every 24 hours. And in total has analyzed 91 million apps. Currently, Symantec has discovered and provided protection against: 29,849,297 Malicious apps 56,480,431 Grayware apps
TheMoon malware targets thousands of insecure routers A new malicious campaign featuring an updated version of TheMoon, a notorious malware family has been reported. This latest variant of TheMoon appears to target insecure outdated home routers, particularly those manufactured by Asus, along with other IoT devices. After compromising these devices, the malware utilizes them to route traffic through a proxy service known as Faceless. It actively seeks out specific shell environments to execute its primary malicious payload and establishes connections with the threat actors' command and control server to receive further instructions. Symantec protects you from this threat, identified by the following: File-based Trojan Horse WS.Malware.2 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
The persistence of billing fraud Android malware: a profitable venture for cybercriminals Billing fraud Android malware is still prevalent because it is a highly profitable form of cybercrime. Malware authors can easily create and distribute malicious apps that are designed to steal personal information and charge victims for unwanted or unauthorized services. The widespread use of mobile devices and the ease with which malicious apps can be distributed through app stores and other online platforms provides a large potential target for attackers. Joker and Harly are among the most common types of billing fraud Android malware, malicious applications are discovered on a daily basis. They primarily spread through Google Play, by hiding themselves within seemingly legitimate apps. These malware pose a significant risk to both consumers and enterprises. Consumers can be targeted through their mobile devices, while enterprises can be affected when employees use company-owned devices that have been infected. Symantec protects you from this threat, identified by the following: Mobile-based Android.Reputation.2
The return of Emotet After a months-long hiatus we have observed new campaigns delivering the Emotet malware via email spam. The emails contain an Excel attachment which is responsible for downloading Emotet. The Excel file makes use of social engineering to require user input to successfully execute the malicious content. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.MSExcel!g4 Email-based Coverage is in place for Symantec’s email security products File-based CL.Suspexec!gen128 Scr.Malcode!gen Scr.MalMacro!gen1 XLM.Downloader!gen1 XLM.Downloader!gen2 XLM.Downloader!gen4 Network-based Web Attack: Malicious Payload Download 26 Web Attack: W97M.Downloader Payload Download Web-based Observed domains are covered under security categories
The rise of Trickbot Last January, after the international takedown against Emotet, the ascension of Trickbot to fill the gap become noticeable almost immediately. Some similarities that these two prolific malware have in common is their flexible functionality, and reliability at opening up network access for attackers to load additional malware such as ransomware onto the victim's machine. As a result, Trickbot is a useful fallback for the threat actors. This was recently observed in a malspam campaign involving the use of malicious XLS files which download Trickbot (Trojan.Trickybot). Symantec protects you from this threat, identified by the following: File-based Heur.AdvML.C Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Trojan.Mdropper WS.Malware.1 W97M.Downloader Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
The Turkish job - A Formbook campaign Symantec has recently observed an ongoing Formbook campaign that is predominantly targeting major industries in Turkey from the following sectors: energy, transportation, food and online shopping. The actors purport themselves to be a well known Turkish company in the aluminum and carbon fiber industry, attempting to lure victims with a classic "order" social engineering tactic (email subject: Ynt: Sipariş Onayı). The malicious emails come with a .bz archive that contains the Formbook binary. This malware has been around since at least 2016 and as of today is still one of the top Infostealer form grabbers in the wild. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products Machine Learning-based Heur.AdvML.B
The vBulletin CVE-2020-17496 vulnerability exploited in the wild We have been aware of reports relating to malicious actors exploiting vBulletin CVE-2020-17496 vulnerability in the wild. The vulnerability is a bypass for a previously patched vBulletin flaw (CVE-2019-16759) that allowed unauthenticated attackers to run malicious code and take control of the vulnerable vBulletin servers. The initial remote code execution (RCE) bug was disclosed and patched in September 2019. In August 2020 researchers identified a new at the time zero-day vulnerability that allowed attackers to bypass the previously released fix. The bypass vulnerability has been assigned a CVE identifier of CVE-2020-17496. At the beginning of September new reports emerged with evidence of CVE-2020-17496 being exploited in the wild. According to the reports, the attacks exploiting CVE-2020-17496 have attempted to download either the Shellbot or Mirai malware post-exploitation. Symantec protections for the discussed vulnerabilities IPS [31818] Web Attack: vBulletin Remote Code Execution CVE-2019-16759 IPS [32484] Web Attack: vBulletin CVE-2020-17496
The WatchDog group observed using new cryptojacking campaigns Recently, evidence was shared confirming the WatchDog group has been incorporating at least some of the behaviors, tools and strategies of the TeamTNT cryptojacking group into their operations. And it seems to be working as desired, as the use of these tools has significantly increased their cryptojacking operations. In contrast, they don't appear to be using certain other techniques commonly used by TeamTNT including credential scraping, lateral movement and GoLang binaries. Symantec protects you from these threats, identified by the following: File-based Downloader Linux.Coinminer Linux.Kaiten Linux.Lightaidra Linux.Trojan Trojan Horse Trojan.Gen.NPE Web-based Observed domains are covered under security categories
ThiefQuest macOS ransomware remains active in the wild ThiefQuest (also known under an older name EvilQuest) is a ransomware variant targeting the macOS platform. Beside the typical ransomware characteristics, some variants of this malware also exhibit additional keylogging, infostealing and backdoor functionalities. ThiefQuest is able to perform several checks in order to find out if it's running in a virtualized environment. One of such checks performed by the malware is the verification of the MAC organizational unique identifier (OUI) of the device. The malware will also attempt to disable security solutions installed on the device in an attempt to avoid any detections. While ThiefQuest has been seen on the threat landscape for several years now, many new samples have been observed in the wild during the last month alone. Symantec protects you from this threat, identified by the following: File-based OSX.RansomThiefQuest OSX.RansomThiefQue!g1 OSX.Trojan.Gen WS.Malware.1
ThirdEye Stealer Reports have emerged about the latest arrival of a new Infostealer on the already saturated threat landscape dubbed ThirdEye. ThirdEye is still evolving and the most recent iterations of this malware have functionality to collect information around disk details, volume information, installed applications, processes running etc. The extracted information is then sent to the attackers C2 server. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.TCP!gen1 File-based Linux.Lightaidra Trojan Horse WS.Malware.2 Machine Learning-based Heur.AdvML.A Heur.AdvML.B Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
THOR - New PlugX variant discovered A new strain of the infamous PlugX malware has been discovered and dubbed as THOR. PlugX RAT (also known as Korplug) is known since at least 2008 and has been leveraged in a multitude of high profile campaigns since its first appearance. The new THOR variant includes enhancements in the payload delivery mechanisms and allows for abuse of trusted system binaries. According to a latest report, the THOR variant has been already used in Proxylogon attacks targeting MS Exchange Servers back in March 2021. Symantec protects you from this threat, identified by the following: File-based Backdoor.Korplug Heur.AdvML.B Heur.AdvML.C Trojan Horse Trojan.Gen Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories.
Threat actor 8base loads its Phobos ransomware variant through backdoor SmokeLoader A new variant of Phobos ransomware malware has been attributed to threat actor 8base. This variant has been seen being loaded and executed using the backdoor trojan SmokeLoader. Like other ransomware malware Phobos attempts to establish persistence, terminate processes that may keep the target files open, disable system recovery, and delete backups as well as shadow copies. The files encrypted by this variant are usually renamed to ".8base" file extension. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.SuspDataRun SONAR.SuspLaunch!gen4 SONAR.SuspLaunch!g18 SONAR.SuspLaunch!g253 SONAR.TCP!gen1 File-based Downloader Scr.Malcode!gdn14 Scr.Malcode!gdn32 Ransom.Phobos!g2 Ransom.Phobos!gm1 Trojan.Gen.MBT Trojan Horse WS.Malware.1 WS.SecurityRisk.4 Machine Learning-based Heur.AdvML.A Heur.AdvML.A!300 Heur.AdvML.A!400 Heur.AdvML.A!500 Heur.AdvML.B Heur.AdvML.B!100 Heur.AdvML.B!200
Threat actors abuse forum services in new phishing wave Online forum services are widely used to communicate and share information on various subjects. Not surprisingly, threat actors have started abusing legitimate forum creating services. As observed by Symantec in this phishing wave, emails were masquerading as password notification messages to lure the recipient into clicking on hyperlinked text in order to change the password. The email content is kept short and has made extensive use of homoglyphic and accented characters in the body - a thinly veiled attempt to bypass anti-spam filters. As shown in Figure 1, once the recipient clicks on the hyperlinked text it redirects to a phishing webpage created with the help of online forum building and survey services. Figure 1: Phishing email masquerading as password notification message As shown in Figures 2 & 3, the fake credential harvesting webpages are created by using online forum building and survey services. Figure 2: The embedded URL in hyperlinked text redirects the user to a fake login page probing for email address. Figure 3: The embedded URL in hyperlinked text redirects the user to fake login page probing for password. Protection Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Threat actors abuse known software brands to spread RomCom RAT Just last month RomCom RAT has been leveraged in a series of attacks against military infrastructure targets in Ukraine. According to new reports, the threat actors behind this malware have also been abusing known software brands for the RAT distribution. The malware droppers have been masqueraded as installers for KeePass Password Manager, SolarWinds NPM and the Veeam Backup and Recovery software, among others. The attackers have been leveraging fake websites and typo-squatting domains to spread those installers. It does seem that Ukraine still remains the main target of the attackers, but it is believed that also English-speaking countries might be secondary targets. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.1 Machine Learning-based Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories
Threat actors impersonate video communications platform to steal credentials Symantec has observed a new phishing campaign that involves a fake meeting invitation to lure recipients into disclosing their Microsoft 365 credentials. As shown in Figure 1, these phishing emails masquerade as meeting invitations from a popular video communications platform and entice the recipient to click on the hyperlinked text with phishing URL embedded within it. Figure 1: Phishing email masqueraded as a meeting invitation with a phishing URL embedded in content. Recipients who click on the hyperlinked text: “View Meeting ID” are redirected to a fake credentials stealing login page where they are prompted to provide their password, as shown in Figure 2. Figure 2: Phishing URL when clicked redirects to a credential stealing webpage. Protection Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Threat actors leverage web application creator services to spread phish Online application creator services offer a wide range of services ranging from developing full stack web applications to diversified communities of think-alike individuals. It’s not unusual now that threat actors have found out ways to abuse such services. Recently, a phishing wave abusing Glitch’s services was observed by Symantec. As shown in Figure 1, phish emails have been masqueraded as notification messages informing the recipients to upgrade their existing email storage space. In order to upgrade, the recipient needs to click on hyperlinked text from which an embedded phishing URL is served. The email content is grammatically bad. Figure 1: Phishing email masqueraded as a mailbox upgrade notification email with a phishing URL embedded in content. As shown in Figure 2, once the recipient clicks on the hyperlinked text, it redirects to credentials stealing webpage hosted on Glitch. Figure 2: The embedded URL redirects the user to a fake credentials stealing webpage. Protection Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Threat actors spoof Comprobantes Fiscales Digitales por Internet (CFDI) format to spread phish emails As observed by Symantec in a recent phish run, the threat actors have impersonated Comprobantes Fiscales Digitales por Internet (CFDI) - an electronic invoicing format mandated by the Mexican tax authority, to steal user credentials. The phishing emails are masqueraded as payment notification messages and probe the recipient to download a digital tax receipt in PDF or XML format. To download the digital tax receipt, the recipient must click on a phishing URL disguised as a download URL. Email Subject: Fw: Error en tu pago cfdi. - ([random_numbers]) Translated Email Subject: Fw: Error in your cfdi payment. - ([random_numbers]) Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Threat actors spoof Dalsey, Hillblom and Lynn (DHL) services to steal credentials. Symantec has identified a new surge in phishing attacks that impersonate Dalsey, Hillblom, and Lynn (DHL) services to steal credentials. In this campaign, phishing emails are disguised as shipment notifications featuring a random waybill number in the email subject—a common reference for shipments. The email content is brief, encouraging recipients to click on a phishing URL. Once clicked, victims encounter webpages designed for credential harvesting. Email Subject: Waybill no ***** - ([random_numbers]) Email From: DHL <spoofed_email_address> Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products.
Threat actors spoof DPD - Geopost services to steal credentials Symantec has identified a new wave of phishing attacks that impersonate DPD - a part of Geopost services to steal credentials. Geopost is a global parcel delivery service headquartered in Issy-les-Moulineaux, France. In this campaign, German language phishing emails are disguised as parcel notifications to reschedule deliveries or check parcel details. The email content is brief, encouraging recipients to click on a phishing URL. Once clicked, victims encounter webpages designed for credential harvesting. Email Subject: Ihre Paketzustellungsnachricht Nr#[random_numbers]? Translated Email Subject: Your parcel delivery message No#[random_numbers]? Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Threat Actors spoof electronic payment solutions service to spread phish laden attachments As observed by Symantec in a recent phish run, the threat actors have impersonated Zelis - an electronic payment solutions service, in an attempt to steal user credentials. As shown in Figure 1, emails masqueraded as payment notification messages are sent with phish laden .pdf attachments. Surprisingly, there is no content included in the body of the email. Figure 1: Phishing email disguised as a payment notification message with PDF attachment file. As shown in Figure 2, upon opening the attachment file, the recipient is presented with a pending payment notification message and is guided on how to proceed with the payment. The notification template used in the .pdf file looks almost legitimate to the human eye. A phishing URL is embedded within the hyperlinked text – “Approve your payment”. Figure 2: The .pdf attachment file when opened showcases a pending payment notification message with embedded phishing URL. When clicked upon, the link redirects the recipient to a fake login page aimed to steal credentials as shown in Figure 3. Figure 3: Upon clicking the hyperlinked text in the .pdf attachment, it redirects to a fake login page. Protection Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Threat actors spoof FedEx services to steal credentials Symantec has identified a new surge in phishing attacks that impersonate FedEx services to steal credentials. In this campaign, phishing emails are disguised as shipment notifications to reschedule deliveries or check package details. The email content is brief, encouraging recipients to click on a phishing URL. Once clicked, victims encounter webpages designed for credential harvesting. Email Subjects: Reschedule your package delivery Confirm Delivery: Your parcel will be delivered by David FedEx - package delivery Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Threat actors spoof Japanese credit card services (JCB) in new phish wave As observed recently by Symantec, threat actors have spoofed Japanese credit card services (JCB) in phish laden emails. As shown in Figure 1, emails masqueraded as important notification messages are sent to the recipients informing that the access to their account is restricted due to a recent compromise. In order to remove these restrictions, the recipient is required to click on the provided URL. In this phish run, threat actors have made use of compromised domains in the attack URL that resemble those of the legitimate services. Figure 1: Phishing email disguised as a notification message from JCB with a phish URL embedded within the email content. As shown in Figure 2, upon clicking the URL embedded in the email, CAPTCHA verification page opens and after the verification it redirects to a fake JCB login page aimed at credentials theft. Figure 2: The embedded phish URL when clicked verifies the recipient with CAPTCHA and redirects to a fake JCB login page. Protection: Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Threat actors trick banking users with QRishing in new phish campaign Symantec has recently observed a new phishing wave in which threat actors have changed their techniques to QRishing (QR code - initiated phishing attacks). These specially designed QR codes contain phishing URLs embedded within them. As shown in Figure 1, the phishing emails are disguised as important banking notifications. In the specific email sample analyzed here, the recipient is reminded that he / she is due for a debit card renewal. The recipient is further asked to scan the QR code included in the email, upon which the renewal request should be initiated. Figure 1: Phishing email disguised as a banking notification message for debit card renewal. After scanning the QR Code with a QR code scanner application, the embedded phishing URL opens. Figure 2: Upon scanning the QR code provided in the email, it attempts to open the embedded phishing URL. Protection Coverage is in place for Symantec's email security products.
Threat actors turn into Human Resources (HR) staff to spread fake payroll notifications Interestingly, it seems that Threat actors have now turned into fake Human Resources staff to spread a new wave of phishing emails. In a recent phishing run, emails containing phishing URLs and masqueraded as payroll notifications are sent to recipients. The email subjects contain the recipient's first and last name along with a "missing payroll" keyword. This is done to add a personal touch and lure the user into opening the email. The email body content is kept short and the "from" field shows recipient's domain name + "HR" word. The email body mentions that there is one action item pending on the HR portal and includes a phishing URL ready to steal credentials. Email Headers: Subject: [Recipient's_first_name].[Recipient's_last_name] Missing Payroll From: "[Recipient's_domain_name] HR " <spoofed_email_address> Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Threat actors turn to fake PayPal CAPTCHA to steal credentials Threat actors have constantly made changes to tactics and techniques in which phish campaigns are carried out. Recently, Symantec has observed a phishing wave spoofing PayPal payment services with the help of .html attachments. As shown in Figure 1, these emails are masqueraded as account notification messages asking recipients to restore accounts within 24 hours or face account termination. An .html file is attached to the email which needs to be downloaded in order to proceed with the account restoration process. Figure 1: Phishing email masqueraded as an account notification with an .html file attached to the message. As shown in Figure 2, once the .html attachment is downloaded and opened, the recipient is served with a fake PayPal CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) verification page. Figure 2: Fake PayPal CAPTCHA verification page. Upon entering the six CAPTCHA characters, the user is redirected to a credential stealing webpage imitating a legit PayPal service webpage. Protection Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
Threat Actor UNC4990 posting images for scripts to see UNC4990 is a threat actor best known for utilizing USB devices as an initial infection vector that recently have been found to be expanding their capabilities by encoding payloads inside of externally hosted files. Users are tricked into opening a Powershell script located on the USB device that utilizes encoded information found inside externally posted images in order to download and execute whichever malware the attacker chooses as the next stage of the attack. Symantec protects you from this threat, identified by the following: File based Downloader Trojan.Gen.2 Trojan.Gen.NPE Trojan.Gen.MBT Trojan Horse Machine-learning based Heur.AdvML.A!300 Heur.AdvML.B!200 Heur.AdvML.B Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Threat Alert: Apache Log4j RCE (CVE-2021-44228) aka Log4Shell UPDATE December 20, 2021: The Apache Software Foundation has released a patch for a third vulnerability in Log4j. Version 2.17.0 of the software was released on December 17 after issues were discovered with the previous release (2.16). Apache said that 2.16 does not always protect from infinite recursion in lookup evaluation and is vulnerable to CVE-2021-45105, a denial of service vulnerability. UPDATE December 15, 2021: Apache has patched a second vulnerability in Log4j. The vulnerability (CVE-2021-45046) arises from the fact that the fix for the previous vulnerability (CVE-2021-44228) did not completely prevent exploits in all circumstances. The fix has been shipped in Log4j version 2.16.0. A critical remote code execution (RCE) vulnerability in Apache Log4j has recently been disclosed and multiple proof of concepts are now available to the public. Log4j is a Java logging library and is widely-used by a large number of applications and services. Version 2.0 and 2.14.1 of Apache Log4j are impacted and a fix has been shipped in version 2.15.0. This vulnerability has been dubbed "Log4Shell" by the security community. As expected, actors have already started to leverage this vulnerability such as those behind cryptominer botnets, and Muhstik is one of these. This malware has been around for a few years now and is known to be used in various cryptocurrency mining and DDoS campaigns. Symantec protects you from these threats, identified by the following: Behavior-based SONAR.Maljava!g7 SONAR.Ransomware!g1 SONAR.Ransomware!g31 SONAR.Ransomware!g32 SONAR.SuspLaunch!g184 SONAR.SuspLaunch!g185 Email-based Coverage is in place for Symantec’s email security products File-based CL.Suspexec!gen106 CL.Suspexec!gen107 CL.Suspexec!gen108 Linux.Kaiten Miner.XMRig!gen2 Ransom.Khonsari Ransom.Tellyouthepass Ransom.Tellyouthepa!g1 Ransom.Tellyouthepa!g2 Trojan Horse Trojan.Maljava Machine Learning-based Heur.AdvML.C Network-based Attack: Log4j2 RCE CVE-2021-44228 Attack: Log4j2 RCE CVE-2021-44228 2 Attack: Log4j CVE-2021-45046 Attack: Log4j CVE-2021-45105 Attack: Malicious LDAP Response Audit: Log4j2 RCE CVE-2021-44228 Audit: Malicious LDAP Response Audit: Suspicious Java Class File Executing Arbitrary Commands Policy-based DCS provides multi-layered protection for Windows, Linux Server workloads and container applications for this vulnerability: Suspicious Process Execution: Prevention policies prevent malware from being dropped or executed on the system. DCS hardened Linux servers prevent execution of malware from temp or other writable locations, a technique used by attackers to drop crypto miners such as XMRig in reported log4shell exploitation. Review the Linux proxy execution list for your log4j based application sandbox to include additional tools such as */curl, */wget. These tools are used by attackers to connect from the victim log4j application to external C2 servers for downloading additional payloads. DCS sandboxing of Windows and Linux applications prevent suspicious program execution using living off the land tools and tampering of critical system services and resources. Network Control: Ability to block outgoing connections to public internet and limit required LDAP, http and other traffic from server workloads and containerized applications using log4j2 to internal trusted systems Detection Policies : System Attack detection: Baseline_WebAttackDetection_Generic_MaliciousUserAgent rule should be updated to include *jndi:* select string to alert on malicious server requests using the suspicious jndi lookup attempts via jndi:ldap, jndi:rmi, jndi:dns etc. Make sure to set the path to your web server access log file in the IDS Web Attack Detection option. Similar custom text log rules should be added for each of your log4j application log file. Web-based WebPulse observed traffic is currently protected for the Log4jShell vulnerability through normal processes.
Threat Alert: Chrome and Edge RCE exploit publicly disclosed A remote code execution exploit that works on both Chrome and Edge has been publicly disclosed on Twitter and GitHub. The available exploit is not fully-weaponized and requires additional exploitation to perform a sandbox escape. This is necessary to perform the remote code execution on the local system. Symantec protects you from these threats, identified by the following: File-based Trojan.Malscript Network-based Web Attack: Google Chrome V8 Javascript Engine Remote Code Execution
Threat Alert: CVE-2021-41773, Apache HTTP Server vulnerability Apache recently published a security advisory and fixed two vulnerabilities in Apache HTTP Server (CVE-2021-41524 and CVE-2021-41773), the later being the most important and also reportedly being exploited in the wild. According to Apache, this vulnerability can allow attackers to map URLs to files outside the expected document root by launching a path traversal attack. Exploiting this flaw may also lead to the leaking of the source of interpreted files such as CGI scripts. Symantec protects you from this threat, identified by the following: Network-based Web Attack: Apache HTTP Server RCE CVE-2021-41773
Threat Alert: DarkSide Ransomware still carefully selecting its targets Active since at least the second half of 2020, the Ransomware gang known as DarkSide has targeted specific companies, often gaining access to their infrastructure via relatively unprotected entry points and then moving further into the network from there. On top of encrypting files these malicious actors also exfiltrate data to add more leverage into the ransom process, threatening to publicly disclose the stolen data if victims do not pay. Symantec protects you from this threat, identified by the following: File-based Ransom.Darkside Downloader Heur.AdvML.B Heur.AdvML.C Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.1 Network-based Attack: Ransom.Gen Activity 29 Malicious Site: Malicious Domains Request System Infected: Trojan.Backdoor Domains 2 Website-based Observed domains are covered under security categories
Threat Alert: FireEye reports a hack and theft of Red Team tools On December 8th, Security firm FireEye revealed that it had been breached by state-sponsored attackers, who apparently stole “Red Team” penetration testing tools and attempted to access customer data. No evidence has yet been found of the tools being used in the wild. In order to assist organizations in protecting themselves against these stolen tools, FireEye released a GitHub repository of countermeasures that can be deployed which includes Snort, Yara, ClamAV, and HXIOC rules. Utilizing these rules Symantec has collected matching samples and can confirm the below coverage. Further investigation is underway. File-based Backdoor.Cobalt Backdoor.Cobalt!gen1 Backdoor.Cobalt!gen3 Backdoor.Cobalt!gen4 Backdoor.Rozena Downloader Exp.CVE-2017-11774 Exp.CVE-2020-1472 Hacktool Hacktool.Mimikatz Hacktool.Rebeus Hacktool.Safetykatz Hacktool.Seatbelt Hacktool.SharpHound Heur.AdvML.B Heur.AdvML.C Meterpreter Packed.Generic.550 Ransom.Wannacry SecurityRisk.KeeFarce Trojan Horse Trojan.Gen Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE Trojan.Mestep W97M.Downloader Network-based Attack: Zoho ManageEngine Desktop Central CVE-2020-10189 OS Attack: Microsoft Netlogon CVE-2020-1472 OS Attack: Microsoft Netlogon CVE-2020-1472 2 OS Attack: Microsoft Netlogon CVE-2020-1472 3 OS Attack: Microsoft Netlogon CVE-2020-1472 4 OS Attack: Microsoft Windows Remote Desktop Services RCE CVE-2019-0708 OS Attack: Microsoft Windows Remote Desktop Services RCE CVE-2019-0708 3 Web Attack: Citrix ADC RCE CVE-2019-19781 Web Attack: Fortinet FortiOS Directory Traversal CVE-2018-13379 Web Attack: Microsoft Exchange Remote Code Execution CVE-2020-0688 Web Attack: Microsoft Office Outlook CVE-2017-11774 Web Attack: Microsoft SharePoint RCE CVE-2019-0604 Web Attack: Pulse Secure SSL VPN File Disclosure CVE-2019-11510
Threat Alert: Kaseya VSA Supply Chain Sodinokibi Ransomware A supply chain attack was recently disclosed by Kaseya in which some of their customers reported being infected with Sodinokibi ransomware. Kaseya VSA is a platform that allows providers to perform patch management and client monitoring for their customers. Kaseya issued a security advisory recommending their customers immediately shut down their VSA servers while they investigate. For more information, Symantec has published the following blog: Kaseya Ransomware Supply Chain Attack: What You Need To Know Symantec protects you from this threat, identified by the following: File-based Downloader Heur.AdvML.C Packed.Generic.618 Trojan.Gen.2 Trojan.Gen.MBT Ransom.Sodinokibi WS.Malware.1 WS.Malware.2 Network-based Ransom.Gen Activity 29 Audit: Ransom.Gen Activity 55
Threat Alert: Microsoft Exchange vulnerabilities exploited (aka Hafnium or ProxyLogon) On March 2, 2021, Microsoft released an Out-of-Band patch to address actively exploited vulnerabilities affecting Microsoft Exchange by an APT group known as Hafnium. Two of these vulnerabilities (CVE-2021-26855 and CVE-2021-27065) and the technique used have been given the name "ProxyLogon". Successful exploitation of these vulnerabilities reportedly allowed attackers to gain a foothold in the environment which lead to further compromise, with the goal of stealing data. The following issues are patched in the published security update with four of them being actively exploited. CVE-2021-26412 CVE-2021-26854 CVE-2021-26855 (Exploited) CVE-2021-26857 (Exploited) CVE-2021-26858 (Exploited) CVE-2021-27065 (Exploited) CVE-2021-27078 Symantec has published the following signatures targeting the known vulnerabilities and related attacks. We will continue our analysis to add additional protection where possible. Policy-based Data Center Security (DCS) Intrusion Prevention (with default policies) provides zero-day protection against the deployment of webshells on Exchange Servers, including those used in these attacks. File-based Backdoor.Trojan Exp.CVE-2021-26855 Hacktool Hacktool.Regeorg Hacktool.Nishang ISB.Downloader!gen313 Trojan.Chinchop Trojan.Chinchop!gen3 Trojan.Chinchop!gen4 Trojan.Chinchop!gen5 Network-based Attack: Microsoft Exchange Server CVE-2021-26855 Web Attack: Microsoft Exchange Server CVE-2021-26857 Attack: AntSword Activity Web Attack: WebShell Access Attempt Web Attack: WebShell Access Attempt 2 Web Attack: WhatWeb Scanner Request Web Attack: ASP WebShell Upload Attempt System Infected: Malicious PowerShell Script Download 4 System Infected: Malicious PowerShell Script Download 5 System Infected: Trojan.Backdoor Activity 404 Threat Defense for Active Directory (TDAD) prevents a potential adversary from spreading across the enterprise. Lateral movement attempts or Domain privilege escalation from the Exchange Server (Patient Zero) for any malicious purpose will be detected and blocked. Behavioral Isolation To better protect against such attacks, employing smart ASR techniques is paramount. Symantec's Behavioral Isolation, part of SES Complete offering, is a powerful ASR technology that enables the admin to proactively improve their security posture by identifying unusual and potentially risky behaviors of trusted applications. Behavioral Isolation utilizes machine learning on Symantec’s global threat telemetry to identify behaviors exhibited by cybersecurity threats that may appear legitimate under certain circumstances and hence evade traditional protection technologies. By blocking unusual behavior of trusted applications, attack chains similar to and including attacks exploiting MS Exchange Servers can be disrupted.
Threat Alert: Microsoft MSHTML RCE Vulnerability (CVE-2021-40444) On September 7th, Microsoft published an advisory for a remote code execution (RCE) vulnerability in MSHTML (CVE-2021-40444) which according to reports is actively being used in targeted attacks. MSHTML, also known as Trident, was mainly used by the Internet Explorer browser but is also used by Microsoft Office. This component allows developers to add web browsing functionality to their own applications. In the observed attacks, actors have crafted malicious Microsoft Office documents leveraging the vulnerability. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. File-based Backdoor.Shelma!g1 Backdoor.Trojan CL.Suspexec!gen75 Downloader Exp.CVE-2021-40444 Exp.CVE-2021-40444!g1 Exp.CVE-2021-40444!g2 Exp.CVE-2021-40444!g3 Exp.CVE-2021-40444!g4 Exp.CVE-2021-40444!g5 Exp.CVE-2021-40444!g6 Trojan.Malooxml!g1 W97M.Downloader Network-based Malicious Site: Malicious Domains Request Malicious Site: Malicious Domain Request 59 Web Attack: Malicious Script Download 51 Web Attack: Microsoft MSHTML RCE CVE-2021-40444 Behavior-based SONAR.SuspLaunch!g161 SONAR.SuspLaunch!g162 Web-based Observed domains are covered under security categories Note: We will continue our analysis to add additional protection where possible and update this bulletin.
Threat Alert: SUNBURST, Global Intruder There has been a report of a global intrusion campaign in which a malicious operator has compromised the legitimate updater of SolarWinds’ Orion IT monitoring and management software. The backdoor in use is being referred to as "SUNBURST". SolarWinds has released an advisory and recommend its users to upgrade to Orion Platform version 2020.2.1 HF 1 as soon as possible to ensure the security of their environment. Symantec has the following protections in place against this attack: File-based Backdoor.Sunburst Backdoor.Sunburst!gen1 Backdoor.SuperNova Backdoor.TearDrop Command line protection CL.Suspexec!gen17 CL.Suspexec!gen18 CL.Suspexec!gen20 Network-based System Infected: Sunburst Malware Activity Symantec has published the following blog entry which provides additional technical details related to this alert: Sunburst: Supply Chain Attack Targets SolarWinds Users
Threat Group TAG-22 continues malicious activities Threat actor group known as TAG-22 has been reported to leverage compromised GlassFish servers and Cobalt Strike tools in the initial access stages of campaigns targeting telecommunication, research and governmental sectors. The actors have been seen to deploy Winnti, ShadowPad and Spyder backdoor malware among others. The used tools, malware and command and control infrastructure show signs of overlap with several other known threat groups. Symantec protects you from this threat, identified by the following: File-based Backdoor.Rozena Heur.AdvML.B ISB.Downloader!gen136 Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE W97M.Downloader Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed IPs/domains are covered under security categories.
ThunderCats Hack The activity being tracked under the name "ThunderCats" seems to be drawing attention in the Russian press with reports that Russian government agencies have been victims of the APT campaign. Based on analysis, the malware used this time, called Mail-O, is a variant of malware known as PhantomNet or SManager, which has been suspected of being associated with a threat actor named "TA428", a Chinese-based attacker. The hacker used the cloud storage facilities of Russian technology companies Yandex and Mail.ru to steal data. Mail-O disguised network activity as legitimate utilities Yandex Disk and Disk-O. Symantec protects you from this threat, identified by the following: File-based Trojan.Gen.MBT Heur.AdvML.C Trojan Horse WS.Malware.1
ThunderX ransomware makes an appearance Security Response has become aware of a new ransomware variant dubbed ThunderX which appears to have joined an already crowded ransomware field just this month, September 2020. This ransomware adds a ".tx_locked" file extension to the files it encrypts. Symantec protects against this threat as follows: File-based protection Ransom.Cryptolocker
ThunderX strikes again, this time as Ranzy Locker ThunderX is a relatively new ransomware strain first observed just last month. We have briefly discussed it in one of the recent Protection Bulletins. It looks like the authors behind this malware decided now to release an updated and re-branded version dubbed as Ranzy Locker. At the same time they have also launched a data leak website - thus following similar tactics to many other ransomware groups out there. We recommend regular backup procedures of any important files and applying the latest product definitions to protect against ransomware threats. Symantec protections against ThunderX/Ranzy Locker: File-based Downloader Heur.AdvML.B Ransom.Cryptolocker Trojan.Gen.2 Trojan.Gen.MBT Behavior-based SONAR.SuspLaunch!gen4 SONAR.SuspLaunch!g18
TicTacToe Dropper TicTacToe is a variant of malware dropper recently leveraged in campaigns observed in the wild. This dropper is usually spread via spam campaigns utilizing malicious .iso attachments. Once on the compromised machine, TicTacToe may deliver a wide range of malware payloads including AgentTesla, SnakeLogger, Remcos, LokiBot and others. It is believed this dropper malware is used by multiple threat groups and possibly distributed in form of a malware-as-a-service model. Symantec protects you from this threat, identified by the following: Adaptive-based ACM.Ps-RgPst!g1 ACM.Untrst-RunSys!g1 Behavior-based SONAR.Stealer!gen1 SONAR.SuspBeh!gen752 SONAR.SuspLaunch!g310 File-based CL.Suspexec!gen8 MSIL.Packed.38 Scr.Malcode!gdn32 Scr.Malcode!gdn34 Trojan.Gen.MBT WS.Malware.1 WS.SecurityRisk.4 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.A!400 Heur.AdvML.A!500 Heur.AdvML.B!100 Heur.AdvML.B!200 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
TigerDownloader and TigerRAT An APT group known as Stonefly (aka Silent Chollima and Andariel) which has been predominantly targeting various industries in South Korea is still active. This group has been using both spearphishing and compromised websites, along with a custom downloader (TigerDownloader) and remote access trojan (TigerRAT) as their initial attack vector in recent financial and cyberespionage campaigns. Symantec protects you from these threats, identified by the following: Email-based Coverage is in place for Symantec's email security products File-based Trojan.Gen.2 Trojan.Gen.MBT Trojan Horse Machine Learning-based Heur.AdvML.B Web-based Observed domains/IPs are covered under security categories
TimeTime capitalizes on the recent increase in ransomware visibility A new ransomware that is not as sophisticated as other more common ransomware like Conti, Hive or AvosLocker has been observed . Named TimeTime, it only asks for a €100 euro PaysafeCard, a prepaid payment method, and is written in C# code that is not obfuscated. Although the ransomware note states that files were stolen, there is no evidence of data being exfiltrated. Symantec protects you from these threats, identified by the following: File-based Downloader Trojan.Gen.MBT Machine Learning-based Heur.AdvML.C
TinyNuke malware spread in recent campaigns targeting French organizations According to a recently released report malicious campaigns leveraging TinyNuke banking malware have been seen across the year 2021 with the latest run still active in November. The distribution campaigns have been reported to target various French entities and organizations. The malware is spread via malspam campaigns containing invoice- or financial-themed lures. TinyNuke malware can be used to steal credentials and user data among others. Symantec protects you from this threat, identified by the following: File-based Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE Trojan.Tinukebot Trojan.Tinukebot.B Trojan.Tinukebot.B!gm Behavior-based SONAR.SuspDataRun Machine Learning-based Heur.AdvML.B Heur.AdvML.C Network-based Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories
TISAK Ransomware TISAK is a new ransomware variant observed in the wild. The malware appears to be a strain of the Proxima/BlackShadow ransomware family. It encrypts user data and appends .Tisak extension to the files. Upon completed encryption process a ransom note text file called Tisak_Help.txt is dropped within the encrypted locations on the infected machine. The malware has the functionality to stop various system processes and services as well as delete volume shadow copies. The threat actors behind this ransomware variant threaten the victims with data publication if the requested ransom demands are not met. Symantec protects you from this threat, identified by the following: Behavior-based ACM.Ps-Schtsk!g1 ACM.Untrst-RunSys!g1 File-based Ransom.Generic.1 WS.SecurityRisk.4 Machine Learning-based Heur.AdvML.B
Titan Stealer On a regular basis, new infostealers are uncovered and most are usually delivered via drive-by-download while posing as fake software. Titan Stealer is one of these that has recently been seen doing the rounds. This malware is fairly generic and below are some of its harvesting capabilities. Stolen information is packed into a zip archive in memory, and the resulting (base64) encoded archive is sent to its command-and-control server. Passwords, Local State, History and Autofill info from Chromium- based and Gecko- based browsers Info and files of 55 Crypto-related browser extensions Screenshots Cryptocurrency wallets from the various APP locations (Coinomi, Zcash, Armory, bytecoin, Atomic, Ethereum, Guarda and Exodus) User name, MAC address, CPU and GPU info Installed softwares Info from C:/Program Files (x86)/Steam/ and C:/Program Files (x86)/Steam/config/ Recentservers.xml from FileZilla Wcx_ftp.ini from Total Commander Key_datas and maps from Telegram Desktop Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen6 File-based Infostealer Trojan.Gen.2 Trojan.Gen.MBT Machine Learning-based Heur.AdvML.B
TodayZoo Phishing Kit Phishing has been prevalent for years now and shows no signs of stopping, its roots being deep in the underground economy with many actors offering phishing kit services. There is no shortage when it comes to these offerings, where groups and individuals can choose from Phishing-as-a-Service (PhaaS), one-time payment kits, leaked source code, and open-source phishing kits. The knowledge is so easy to access and assimilate, some people create their own from the ground up and others pluck and merge codes from different kits, along the lines of TodayZoo. According to recent reports, the TodayZoo phishing kit has been used in multiple campaigns in an attempt to steal Microsoft credentials. Symantec protects you from this threat, identified by the following: Email-based Coverage is in place for Symantec’s email security products Network-based Malicious Site: Malicious Domain Request 21 Malicious Site: Malicious Domain Request 22 Web-based Observed domains are covered under security categories
Toddler banking malware roams the threatscape Reports indicate that early this year a new mobile banking malware known as Toddler joined the already crowded mobile threat landscape. Similar to many bankers, this malware uses the overlay technique to phish out or “harvest” banking and other credentials. It also has keylogging capabilities. Symantec protects you from this threat, identified by the following: Mobile-based AppRisk:Generisk
ToddyCat APT ToddyCat is a relatively new APT attacking high-profile organizations within government and military sectors across Europe and Asia since December 2020. No evidence has been found yet to associate the threat actors behind ToddyCat to other known APT actors. ToddyCat employs the Samurai Backdoor and Ninja Trojans, two sophisticated cyber-espionage tools designed to penetrate deep into targeted networks whilst maintaining stealth. Symantec protects you from these threats, identified by the following: File-based Trojan Horse Trojan.Gen.MBT Trojan.Gen.2 Policy-based DCS provides 0 day protection for this threat with default hardening policies Web-based Observed domains are covered under security categories
ToddyCat APT conducting an active campaign against governmental and telecommunications targets in Asia A new active campaign called “Stayin’ Alive” has been reported to target governmental and telecommunications targets in Asia. A set of tools used and infrastructure leveraged show specific links to the APT actor known as ToddyCat. The group has been known to target high-profile Asian organizations in similar attacks. “Stayin’ Alive” uses a set of unique downloader and backdoor variants dubbed CurLog, CurLu and CurKeep. The initial attack chain of the campaign is conducted with the help of spear-phishing emails. The dropped payloads can execute reconnaissance on the infected endpoints and report back to the C&C servers controlled by the attackers. Symantec protects you from this threat, identified by the following: Behavior-based AGR.Terminate!g2 SONAR.TCP!gen1 File-based Downloader Trojan Horse Trojan.Gen.2 Trojan.Gen.MBT Trojan.Gen.NPE WS.Malware.1 Machine Learning-based Heur.AdvML.A!300 Heur.AdvML.A!400 Heur.AdvML.A!500 Heur.AdvML.B Heur.AdvML.B!200 Heur.AdvML.C Network-based System Infected: Trojan.Backdoor Activity 634 Web-based Observed domains/IPs are covered under security categories in all WebPulse enabled products
Tomiris group uses a variety of malware tools We have talked about Tomiris group's own tools in the past, however, recent campaigns show that the threat actor uses a variety of tools, technologies (Rust, Python, Golang, etc) and attack vectors (DNS hijacking, C2s in Telegram) on their campaigns. The only thing that seems consistent is their target being in the Commonwealth of Independent States (CIS). Some of the tools associated with the group are Topinambour, JLORAT, Tunnus, Roopy, Telemiris. Symantec protects you from this threat, identified by the following: Behaviour-based SONAR.TCP!gen1 File-based Downloader Trojan Horse Trojan.Gen.MBT Trojan.Burtopinam WS.Malware.* Machine Learning-based Heur.AdvML,* Network-based System Infected: Trojan.Backdoor Activity 654 System Infected: Trojan.Backdoor Activity 634 System Infected: Trojan.Backdoor Activity 564 Web Attack: Webpulse Bad Reputation Domain Request Web-based Observed domains/IPs are covered under security categories
TONEDROP - Earth Preta's new dropper malware A new dropper malware dubbed TONEDROP attributed to the APT group Earth Preta (aka Mustang Panda) has been discovered in the wild. The dropper is used to deliver malware payloads from the TONEINS and TONESHELL malware families. The campaign targets several countries from various regions including Asia-Pacific (APAC) and Europe. In their attacks the threat actors leverage malicious download sites masqueraded as Google Drive to deliver the initial payloads. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.TCP!gen1 SONAR.TCP!gen6 File-based Trojan Horse Trojan.Gen.NPE WS.Malware.1 Machine Learning-based Heur.AdvML.A Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories
Top Email trends for October 2020 Spam and Phishing campaigns maintain their place at the top of the email threat landscape this month, with embedded URLs the most common attack vector and Bazaloader accounting for a majority of the malspam volume observed during October. The social engineering tactics employed in these malicious emails can vary from the relatively basic to the highly complex. Description Category Attack vector Indicators of Compromise (IOC) Bazaloader delivered by abusing Google Docs services Malspam Embedded URL Subject keywords: Homepage, document, termination, Assigned Low, office meeting, Customer Complaint, task list, Subpoena, Payslip, cancellation notice, arrangement, Existing debt, anonymous survey, invoice, office meeting URL: https://docs.google.com/document/d/e/[redacted] Leveraging file sharing platform to send malicious meeting email reminders Malspam Embedded URL Subject keywords: Doc#Reminder, Meeting Notice URL: http://[redacted].failiem.lv/down.php?[redacted]=[filename].xls Imitating WeTransfer to steal credentials Phishing Embedded URL Subject keywords: New order quote URL: https://[redacted].com/wen/New%20WeTrans%20Page/[redacted] Web application creator services leveraged to spread phish Phishing Embedded URL Subject keywords: Warning, Upgrade URL: https://[redacted].glitch.me/?email= Impersonating Zoom to steal credentials Phishing Embedded URL Subject keywords: Meeting ID, Message Report URL: http://t.mail.[redacted].com/r/?id= Miming Microsoft online excel services to steal credentials Phishing Embedded URL Subject keywords: PAYSLIP INVOICE URL: http://[redacted].com/securedexcel/#[email] Wave of fake invoice phish emails emerge to steal credentials Phishing Embedded URL Subject keywords: facturas, nombre URL: http://[redacted]/wp-docs/blogs//?hash=%email% Phishing runs carried out by abusing publishing application services Phishing Embedded URL Subject keywords: FSE SO# URL: https://pub.lucidpress.com/[redacted]/ Note-taking app's file sharing services abused to share phishing content Phishing Embedded URL Subject keyword: Scan URL: https://www.evernote.com/shard/[redacted] Splitting Bitcoin wallet address (BTC) into two to extort money Scam (Extortion) Bitcoin wallet address (BTC) Subject keyword: caught BTC: Bit-Coin address Part 1: 1FvzzrPWkiAcofL Bit-Coin address Part 2: SeZFwwjeLH5bgewue7v
Tor2Mine still active with new variants observed Tor2Mine is a cryptocurrency malware that mines Monero and is capable of stealing admin credentials in order to spread via the network within a compromised environment. This threat has been around for a few years now and is still active in today's threatscape. As recent reports indicate, new variants have been spotted. Symantec protects you from these threats, identified by the following: Behavior-based SONAR.LoadPoint!gen5 File-based CL.Downloader!gen111 ISB.Downloader!gen* ISB.Heuristic!gen* Trojan.Gen.NPE Trojan.Gen.6 Trojan horse WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.B Network-based Audit: Powershell Base64 Script Execution 02 System Infected: Malicious PowerShell Script Download 24 System Infected: Trojan.Backdoor Activity 618 Web Attack: Malicious HTA File Download 3
Tortilla runs campaign deploying variants of Babuk A relatively new threat actor, known as Tortilla, has been found linked to a recent malicious campaign deploying variants of Babuk ransomware. Users predominantly affected were in the U.S., with smaller numbers of infection in Brazil, Finland, Germany, Honduras, U.K., Ukraine, and Thailand. This particular Babuk campaign relies on exploiting vulnerabilities in Microsoft Exchange Server. Vulnerabilities with ProxyShell are used to run obfuscated commands to connect and download a packed downloader module from the actor's infrastructure. An exploit that attempts to escalate the process privileges using a vulnerability in the Encrypted File System is used as well. The PowerShell command invokes a web request to connect to the malicious repository to download the main loader module, saves it and then runs it. The ransomware module encrypts the files in the victim's server, appends a file extension pertaining to Babuk to the encrypted files, and then the threat actor demands payment from the victim to obtain the decryption key to regain their files. Symantec protects you from this threat, identified by the following: Behavior-based SONAR.ProcHijack!g51 File-based ISB.Heuristic!gen56 Packed.Generic.347 Packed.Generic.619 Ransom.Gen Trojan Horse Trojan.Gen.2 Trojan.Gen.9 Trojan.Gen.MBT WS.Malware.1 WS.Malware.2 Machine Learning-based Heur.AdvML.C Web-based Observed domains/IPs are covered under security categories
TP-Link Archer AX21 CVE-2023-1389 still being exploited by botnets Last year an unauthenticated command injection vulnerability, CVE-2023-1389, was disclosed for the web management interface of the TP-Link Archer AX21 (AX1800) router. Despite this vulnerability being reported and remediated, numerous campaigns still exploit it. Recent attacks have been observed utilizing various botnets including Moobot, Miroi, AGoent, and Gafgyt. As botnets are known to target IoT vulnerabilities users should install the latest updates and follow manufacturer remediation steps. Symantec protects you from these threats, identified by the following: File-based CL.Downloader!gen277 Linux.Mirai Trojan.Gen.NPE Trojan Horse WS.Malware.1 Network-based Attack: TP-Link Router Remote Code Execution Vulnerability CVE-2023-1389