Cyware Daily Threat Intelligence
Daily Threat Briefing • Oct 1, 2024
We use cookies to improve your experience. Do you accept?
Daily Threat Briefing • Oct 1, 2024
What started as a seemingly harmless download turned into an eight-day siege, as attackers infiltrated networks with Nitrogen malware, only to end with BlackCat ransomware locking down the entire domain. After gaining initial access, the attackers deployed tools like Sliver, Cobalt Strike, and PowerSploit.
Cybercriminals are targeting the gaming community, especially Roblox and Da Hood players, with malicious Python packages disguised as cheats or mods. These packages contain the Skuld Stealer and Blank Grabber malware, stealing data like Discord credentials, cryptocurrency wallets, and 2FA codes.
The CISA flagged four actively exploited vulnerabilities, including flaws in D-Link and DrayTek routers, Motion Spell GPAC, and SAP Commerce Cloud. These critical vulnerabilities could be exploited for command injection or remote access, with CISA urging all organizations—not just federal agencies—to patch immediately to reduce their risk.
Nitrogen campaign drops BlackCat ransomware
In November 2023, a BlackCat ransomware attack began with the use of Nitrogen malware, disguised as Advanced IP Scanner on a fraudulent website. Sliver and Cobalt Strike beacons were deployed on the host through Python scripts. The threat actor utilized PowerSploit, SharpHound, and Impacket for lateral movement and network enumeration post initial access. Restic, an open-source backup tool, was used for data exfiltration from a file server to a remote location. The attacker modified a privileged user's password on the eighth day, deploying BlackCat ransomware across the domain using PsExec and executing a batch script.
Linux malware campaign targets vulnerable servers
Elastic Security Labs discovered a sophisticated Linux malware campaign targeting vulnerable servers, using tools like KAIJI and RUDEDEVIL. The attackers exploited the GSOCKET network utility to establish encrypted communication channels. The campaign also involved cryptocurrency mining activities, especially with XMRIG, which connects to the mining pool c3pool.org. The attackers attempted to establish persistence, conduct manual privilege escalation, and download custom malware, but faced challenges in executing the custom binaries. The campaign involved the use of various tactics and techniques, including post-compromise dwell time, Bitcoin mining, and money laundering activities using gambling APIs.
Roblox cheaters hit with malware
The gaming community, particularly Roblox players and its derivative game Da Hood, is targeted by cybercriminals using malicious Python packages. These packages are disguised as cheats or mods to enhance gaming experiences but actually contain malware such as the Skuld Stealer and Blank Grabber, which can steal sensitive data from users' systems. The cybercriminals distribute these packages through platforms like GitHub, Discord, and YouTube. Skuld Stealer is a Go-written malware that targets Windows systems to steal data from Discord, browsers, and cryptocurrency wallets. It can steal login credentials, cookies, credit cards, and browsing history, as well as intercept 2FA codes from Discord users. Similarly, Blank Grabber is an info-stealer based on Python and C++.
CISA adds four bugs to KEV catalog
The CISA identified four new vulnerabilities that are actively being exploited, including command injection vulnerabilities in D-Link (CVE-2023-25280) and DrayTek (CVE-2020-15415) routers; a null pointer dereference vulnerability in Motion Spell GPAC (CVE-2021-4043); and a deserialization vulnerability in SAP Commerce Cloud (CVE-2019-0344). These vulnerabilities pose significant risks to federal enterprise and must be remediated according to Binding Operational Directive (BOD) 22-01. While the directive applies to FCEB agencies, CISA encourages all organizations to prioritize the timely remediation of these vulnerabilities to reduce exposure to cyberattacks. The bugs have been added to the KEV catalog.
Multiple flaws in Foxit PDF Reader and Editor
Multiple vulnerabilities (CVE-2024-28888, CVE-2024-7725, CVE-2024-38393, and CVE-2024-41605) were discovered in Foxit PDF Reader and Editor. These flaws could result in arbitrary code execution, potentially allowing attackers to install programs, view, change, or delete data, or create new accounts with full user rights. The vulnerabilities affect various versions of Foxit PDF Reader for both Windows and macOS. Users are urged to apply appropriate updates provided by Foxit to vulnerable systems immediately after appropriate testing and to establish and maintain a vulnerability management process.