We use cookies to improve your experience. Do you accept?

Skip to main content

Cyware Weekly Threat Intelligence - September 02–06

Cyware Weekly Threat Intelligence - September 02–06 - Featured Image

Weekly Threat Briefing Sep 6, 2024

The Good

As cyber threats loom larger than ever, the White House released a comprehensive roadmap to secure the Border Gateway Protocol (BGP), a key component of internet routing. The initiative focuses on implementing Resource Public Key Infrastructure (RPKI) and advanced filtering techniques to defend against BGP hijacks and ensure the integrity of government network traffic. At the same time, the DOJ has seized 32 web domains tied to a Russian disinformation campaign aimed at influencing the American public, with multiple Russian entities facing legal action for orchestrating the operation.

  • The White House released a roadmap to enhance the cybersecurity of the Border Gateway Protocol (BGP), which routes data across networks. The plan calls for contractors to provide secure internet routing technologies to validate the legitimacy of data entering government networks and prevent BGP hijack attacks. The roadmap recommends using Resource Public Key Infrastructure (RPKI) to confirm network rights to specific internet protocol addresses and enforce specialized filtering techniques. It also urges network service providers to monitor data entering their networks and develop cybersecurity risk management plans.

  • The DOJ announced the seizure of 32 web domains linked to a Russian disinformation campaign targeting the American public ahead of the upcoming presidential election. The operation, known as Doppelgänger, is believed to be connected to Russian companies and agencies controlled by the Russian Presidential Administration. Russian companies and individuals, including RT executives, were indicted and sanctioned for orchestrating a $10 million scheme.

  • The ONCD launched a hiring sprint called Service to America to fill nearly half a million cyber jobs across the United States. The initiative aims to raise awareness about cyber job opportunities, remove barriers to entry, and engage both public and private sector employers. The government is collaborating with various agencies to recruit and hire individuals, including military spouses, and is advocating for the removal of degree requirements for cyber jobs.

The Bad

In the ever-changing world of cybercrime, no sector or individual is safe from increasingly sophisticated attacks. The Fog ransomware group has shifted its focus to financial services, leveraging a multi-pronged approach of data theft and file encryption to pressure victims into paying hefty ransoms. At the same time, political figures in Malaysia are under siege as the Babylon RAT spreads through malicious ISO files, allowing attackers to gain control of systems and steal sensitive data. Meanwhile, hackers themselves are being targeted by the Lummac Stealer malware, which disguises itself as an OnlyFans Checker tool to swipe credentials, financial info, and cryptocurrency wallets.

  • The Fog ransomware group, previously known for targeting education and recreational sectors, has now shifted focus to the financial services sector. The ransomware, a variant of STOP/DJVU, targets both Windows and Linux endpoints and demands a ransom via a Tor site. The attackers are highly skilled and utilize a multi-pronged approach, combining data theft with encryption to pressure victims into paying the ransom. They employ various tools and commands to traverse networks, gather information, exfiltrate data, and hinder file recovery from backups.
  • A cyberattack campaign in Malaysia is using malicious ISO files to spread the Babylon RAT, targeting political figures and officials. The ISO files contain deceptive components like shortcuts and scripts to trick users. The threat actor previously used the Quasar RAT against Malaysian entities, showing a trend of targeting high-profile individuals. Babylon RAT gives the attacker control over infected systems, allowing for activities like keylogging and data theft. This highlights the importance of enhancing security measures to prevent unauthorized access to sensitive data.
  • Cybersecurity experts uncovered the Lummac Stealer malware, posing as an OnlyFans Checker tool, which targets hackers. The malware also targets Disney+ and Instagram hackers. The malware is capable of stealing passwords, financial information, browsing history, and cryptocurrency wallets. It has been found to spread through cracked software and uses tactics to detect human users. The malware's architecture suggests global influences from East Asia, Africa, Latin America, and Celtic mythology.
  • The CISA added two flaws in DrayTek VigorConnect routers to its KEV catalog. These flaws, known as CVE-2021-20123 and CVE-2021-20124, are path traversal issues that allow attackers to download arbitrary files with root privileges. The vulnerabilities were patched in October 2021. While there are no reports of in-the-wild attacks, Fortinet noted CVE-2021-20123 being exploited in a global campaign across industries. Exploitation attempts spiked in August, leading CISA to include the vulnerabilities in its catalog.
  • Cisco Talos recently discovered a series of Microsoft Office documents created by the MacroPack payload generator framework and uploaded to VirusTotal between May and July. These documents contained various malicious payloads like the Havoc and Brute Ratel post-exploitation frameworks, as well as a new PhantomCore RAT variant. The MacroPack framework allows for the quick generation of different payloads with a single command, posing a challenge for detection. These documents originated from different countries, each featuring unique payloads and themes.

New Threats

Cyber adversaries are ramping up attacks across platforms, with no one safe from mobile, web, or ransomware exploits. The new SpyAgent malware is after cryptocurrency wallets, disguising itself as innocent Android apps to steal sensitive data from users in Korea, with signs it may soon target iOS. At the same time, DarkCracks is infecting GLPI and WordPress websites, using multi-layered attacks to evade antivirus detection and seize control of servers for long-term exploitation. Meanwhile, the RaaS group Cicada3301 is making waves with its Rust-based ransomware, targeting both Windows and Linux/ESXi systems and recruiting affiliates for widespread attacks.

  • A new mobile malware called SpyAgent is targeting mnemonic keys for cryptocurrency wallets. This Android malware disguises itself as legitimate apps and steals sensitive data such as text messages, contacts, and images. It spreads through phishing campaigns and infects devices by tricking users into downloading fake apps. The malware can also receive and execute commands from a remote server. The malware has been targeting users in Korea and has shown signs of spreading to the U.K. The researchers also found evidence suggesting a potential shift to targeting iOS users in the future.
  • QiAnXin identified a sophisticated malware campaign known as DarkCracks that targets GLPI and WordPress websites to distribute malicious loaders and maintain control over compromised systems. This stealthy threat evades detection by most antivirus software. DarkCracks employs a complex delivery system utilizing public websites to distribute malicious payloads and compromise devices for long-term exploitation. The malware initiates a multi-stage attack upon gaining access to a server, enabling attackers to establish persistent control over networks. The campaign's use of a three-tier URL verification system and targeted phishing tactics, including a decoy resume file in Korean, adds layers of difficulty for defenders.
  • A new RaaS operation called Cicada3301 has emerged and already listed 23 victims on its extortion portal since mid-June. The ransomware is written in Rust and targets both Windows and Linux/ESXi hosts. The group behind Cicada3301 has recruited affiliates and shares similarities with the now-defunct BlackCat/ALPHV group. The ransomware supports configurable parameters for its operation and generates a symmetric key for encryption. After encrypting files, it creates a ransom note and targets specific file extensions.
  • ManticoraLoader is a new MaaS observed on the XSS cybercrime forum distributed by a user with the alias DarkBLUP. The malware, available on Telegram since August 8, features stealth and obfuscation tactics, compatible with Windows 7 and above. It collects detailed information from infected devices, covertly sending data to a central control panel for profiling victims and customization of attacks. The actors limit clients to 10, offering services for $500 per month, aiming to monetize the tool.
  • Security researchers uncovered a new threat called Revival Hijack that enables attackers to spread malicious payloads via PyPI. By re-registering a formerly legitimate package name with a malicious one, attackers can trick users into inadvertently downloading harmful packages. Attackers are utilizing tactics like cloning repositories and typosquatting to distribute malware. The researchers demonstrated the threat by replacing legitimate packages with empty ones, leading to nearly 200,000 downloads in three months.
  • Cisco patched a command injection vulnerability in its Identity Services Engine (ISE) solution, allowing attackers to gain root privileges on vulnerable systems. The flaw, tracked as CVE-2024-20469, stems from insufficient validation of user input. Attackers with administrator privileges can execute malicious commands without user interaction. Cisco has released fixes for affected versions of ISE, including 3.2P7 and 3.3P4. Additionally, Cisco removed a backdoor account in its Smart Licensing Utility software and addressed other vulnerabilities such as CVE-2024-20295 and CVE-2024-20401.
  • A new multi-platform backdoor called KTLVdoor, developed in Golang, was found to be associated with the Chinese threat actor Earth Lusca. This malware, available for Windows and Linux, disguises itself as system utilities to perform tasks like file manipulation, command execution, and port scanning. It uses sophisticated encryption and obfuscation methods to avoid detection. The attack utilizes more than 50 C&C servers in China, but it is uncertain if they are exclusively for Earth Lusca or shared with other threat actors.
  • FortiGuard Labs found Emansrepo, a Python info-stealer spreading through fake emails with purchase orders and invoices. The malware compresses victim data into zip files and sends them to the attacker. Initially spread via phishing emails with Emansrepo download links, it's now packed using PyInstaller for systems without Python. The attack has become more complex, with multiple stages and data theft from different sources. Emansrepo collects user data from browsers and sends them to the attacker. The malware has evolved to steal PDF files, extensions, and cookies.

Related Threat Briefings

Dec 20, 2024

Cyware Weekly Threat Intelligence, December 16–20, 2024

In a digital age where borders are blurred, governments are sharpening their strategies to outpace cyber adversaries. The draft update to the National Cyber Incident Response Plan (NCIRP) introduces a comprehensive framework for managing nationwide cyberattacks that impact critical infrastructure and the economy. Meanwhile, the fiscal year 2025 defense policy bill, recently approved by the Senate, emphasizes strengthening cybersecurity measures both at home and abroad. A deceptive health app on the Amazon Appstore turned out to be a Trojan horse for spyware. Masquerading as BMI CalculationVsn, the app recorded device screens, intercepted SMS messages, and scanned for installed apps to steal sensitive data. Malicious extensions targeting developers and cryptocurrency projects have infiltrated the VSCode marketplace and NPM. Disguised as productivity tools, these extensions employed downloader functionality to deliver obfuscated PowerShell payloads. The BADBOX botnet has resurfaced, compromising over 192,000 Android devices, including high-end smartphones and smart TVs, directly from the supply chain. Industrial control systems are facing heightened risks as malware like Ramnit and Chaya_003 targets engineering workstations from Mitsubishi and Siemens. Both malware families exploit legitimate services, complicating detection and mitigation efforts in ICS environments. The Chinese hacking group Winnti has been leveraging a PHP backdoor called Glutton, targeting organizations in China and the U.S. This modular ELF-based malware facilitates tailored attacks across industries and even embeds itself into software packages to compromise other cybercriminals. A tax-themed phishing campaign, dubbed FLUX#CONSOLE, is deploying backdoor payloads to compromise systems in Pakistan. Threat actors employ phishing emails with double-extension files masquerading as PDFs.

Dec 13, 2024

Cyware Weekly Threat Intelligence, December 09–13, 2024

Cybercrime’s web of deception unraveled in South Korea as authorities dismantled a fraud network responsible for extorting $6.3 million through fake online trading platforms. Dubbed Operation Midas, the effort led to the arrest of 32 individuals and the seizure of 20 servers. In a significant move to combat surveillance abuses, the U.S. defense policy bill for 2025 introduced measures to shield military and diplomatic personnel from commercial spyware threats. The legislation calls for stringent cybersecurity standards, a review of spyware incidents, and regular reporting to Congress. The subtle art of deception found a new stage with a Microsoft Teams call, as attackers used social engineering to manipulate victims into granting remote access. By convincing users to install AnyDesk, they gained control of systems, executing commands to download the DarkGate malware. Russian APT Secret Blizzard has resurfaced and used the Amadey bot to infiltrate Ukrainian military devices and deploy their Tavdig backdoor. In a phishing spree dubbed "Aggressive Inventory Zombies (AIZ)," scammers impersonated brands like Etsy, Amazon, and Binance to target retail and crypto audiences. Surveillance has reached unsettling new depths with the discovery of BoneSpy and PlainGnome, two spyware families linked to the Russian group Gamaredon. Designed for extensive espionage, these Android malware tools track GPS, capture audio, and harvest data. A new Android banking trojan has already caused havoc among Indian users, masquerading as utility and banking apps to steal sensitive financial information. With 419 devices compromised, the malware intercepts SMS messages, exfiltrates personal data via Supabase, and even tricks victims into entering details under the pretense of bill payment. Iranian threat actors have set their sights on critical infrastructure, deploying IOCONTROL malware to infiltrate IoT and OT/SCADA systems in Israel and the U.S.

Dec 6, 2024

Cyware Weekly Threat Intelligence, December 02–06, 2024

NIST sharpened the tools for organizations to measure their cybersecurity readiness, addressing both technical and leadership challenges. The two-volume guidance blends data-driven assessments with managerial insights, emphasizing the critical role of leadership in applying findings. The Manson Market, a notorious hub for phishing networks, fell in a sweeping Europol-led takedown. With over 50 servers seized and 200TB of stolen data recovered, the operation spanned multiple countries, including Germany and Austria. Russian APT group BlueAlpha leveraged Cloudflare Tunnels to cloak its GammaDrop malware campaign from prying eyes. The group deployed HTML smuggling and DNS fast-fluxing to bypass detection, targeting Ukrainian organizations with precision. Earth Minotaur intensified its surveillance operations against Tibetan and Uyghur communities through the MOONSHINE exploit kit. The kit, now updated with newer exploits, enables the installation of the DarkNimbus backdoor on Android and Windows devices. Cloudflare Pages became an unwitting ally in the sharp rise of phishing campaigns, with a staggering 198% increase in abuse cases. Cybercriminals exploited the platform's infrastructure to host malicious pages, fueling a surge from 460 incidents in 2023 to over 1,370 by October 2024. DroidBot has quietly infiltrated over 77 cryptocurrency exchanges and banking apps, building a web of theft across Europe. Active since June 2024, this Android malware operates as a MaaS platform, enabling affiliates to tailor attacks. Rockstar 2FA, a phishing platform targeting Microsoft 365 users, has set the stage for large-scale credential theft. With over 5,000 phishing domains launched, the platform is marketed on Telegram. The Gafgyt malware is shifting gears, targeting exposed Docker Remote API servers through legitimate Docker images, creating botnets capable of launching DDoS attacks.