Go to listing page

Cyware Weekly Cyber Threat Intelligence April 02 - 06, 2018

Cyware Weekly Cyber Threat Intelligence April 02 - 06, 2018

Share Blog Post

The Good


Notable advancements have been made towards thwarting cyber attacks. A simulated Android OS environment, named Droidy, was designed to generate behavioral reports of Android apps. A new tool, called HoneyBot, was also developed to expose hackers of industrial automation. Additionally, decryptors for the Magniber ransomware have been released.

  • The antivirus scanning engine, VirusTotal, made an announcement about a new Android sandbox technology. Named Droidy, this is a simulated Android OS environment for analyzing Android app behavior and producing reports for users and security researchers. These reports will contain additional behavioral details that would help security researchers confirm the malicious classification of VirusTotal scan results or even overturn them.
  • A new novel tool is designed by a group of researchers at Georgia Tech that would help in delaying and exposing would-be hackers to industrial automation. The small robot, called HoneyBot, is designed to trick cybercriminals into thinking it's a vulnerable robot performing important industrial automation tasks. Once a successful breach is detected, the tool raises alarm and helps IT security professionals in blocking the attack.
  • Decrypters for few versions of the Magniber ransomware have been created by security researchers from AhnLab, a South Korea-based cyber-security firm. Users can download the decryptors from AhnLab's website. Unfortunately, the usage instructions aren’t available in English. Hence, victims will have to use online translation services to understand them.

The Bad


This week, among the cyber attack victims, are four Singapore universities--targeted by Iranian hackers to steal sensitive information, major Israeli websites--targeted by the Dark-Coder hacker group to display images of the Gazan protesters, and four U.S. pipeline companies--to shut down their electronic systems. Also, a data breach involving (24)7.ai leaked customer payment information of Delta Airlines.

  • Four Singapore universities were found to have been targeted by Iranian hackers in a wave of attacks believed to part of last month’s security breach involving global educational institutions. The targeted universities included National University of Singapore (NUS), Singapore Management University, Singapore University of Technology and Design, and Nanyang Technological University (NTU). In total 52 accounts were found to be affected from these universities. As per government sources, they learned of breaches only last week.
  • A dozen major Israeli websites were at the receiving end of a major cyber attack launched by Palestinian sympathizers. The cyber attack was carried out by a hacker group known as Dark-Coder or TH3Falcon in response to clashes between the IDF and Gazan protesters last weekend. Among the affected websites were those belonging to hospitals, local authorities, the Israeli Opera, Israel Teachers Union and the IDF Widows and Orphans organization. All the affected websites temporarily displayed the images from the clashes on Gaza border that took place last weekend.
  • This week witnessed a striking cyber attack on four U.S pipeline companies. The attack shut down their electronic systems used for communicating with customers.The targeted companies were Energy Transfer Partners LP, Broadwalk Pipeline Partners LP, Eastern Shore Natural Gas and Oneok Inc. The shutdown did not impact any movement of gas but brokedown the communication channels these companies use for interacting with customers. Interestingly, most of the electronic communication equipment is third-party based and the attack once again underscores the importance of closing all security loopholes while dealing with third-party services.
  • Delta Air Lines has disclosed that it was impacted by a cyber breach potentially compromising customer’s payment information. As per the disclosure, the breach occurred last fall and only a small subset of customers were impacted. The incident involved (24)7.ai, a chat service used by Delta and many other companies. Delta has assured that only customer payment information was impacted and no other details like passport, security or frequent flyer information was affected.

New Threats


Researchers detected a new MacOS backdoor, identified as ‘OSX_OCEANLOTUS.D’, being distributed by the APT 32 group. The IcedID banking Trojan is now using malicious Word documents along with the Rovnix malware to infect systems. An upgraded version of njRAT was found pushing Lime Ransomware and a bitcoin wallet stealer. Also discovered is a new style botnet (IoTroop) focused on targeting the financial sector.

  • Researchers have found out a new Mirai style botnet targeting the financial sector. As per researchers, the attack on the financial sector is the largest since the Mirai wreaked havoc on Dyn servers in October 2016. The research found out three financial institutions becoming the latest victim of the new IoTroop botnet, created through hijacked internet connected web cameras and televisions. The aim of the hackers being the botnet seems to choke the internet traffic of financial firms by overloading servers and subsequently knocking off the services.
  • Security researchers at Trend Micro have found out a new MacOS backdoor that is probably the latest version of a threat used by APT 32, also known as Cobalt Kitty and OceanLotus. The backdoor has been identified as ‘OSX_OCEANLOTUS.D’. The attackers exploiting the backdoor have been found targeting MacOS computers having Perl programming language installed. The backdoor is being distributed through a malicious Microsoft Word document that claims to be a registration form for an event with HDMC, a Vietnamese organization that advertises national independence and democracy.
  • An upgraded version of njRAT has been found pushing Lime Ransomware and a bitcoin wallet stealer. Also known as Bladabindi, njRAT is an old-time Trojan that was first spotted in 2013 and has survived since then. The malware is known for using .NET obfuscation tools that make it go stealth against antivirus solutions and subsequently hinder any analysis by security researchers. The malware also makes use of dynamic DNA for command and control servers and communicates using a custom TCP protocol over a configurable port.
  • Last year in November, security researchers unearthed a new banking Trojan which was labeled as ‘IcedID’. Initially, it was found being distributed by Emotet and later in the new year there was a considerable increase in IcedID infections which were detected all throughout the AMP ecosystem. Now researchers have found infections through Emotet being mellowed down but more being spread through emails with malicious Microsoft Word documents without macros. Once the user clicks on the document, Rovnix is downloaded and executed which further downloads IcedID. In addition to Rovnix, a Bytecoin miner is also being downloaded as a second payload.


 Tags

icedid
threat intelligence
mirai
delta air lines
njrat trojan
virustotal
macos

Posted on: April 06, 2018


More from Cyware

Stay updated on the security threat landscape and technology innovations at Cyware with our threat intelligence briefings and blogs.

The Virtual Cyber Fusion Suite