April 5, 2022
-
Anomali Threat Research
,

Anomali Cyber Watch: AcidRain Wiped Viasat Modems, BlackMatter Rewritten into BlackCat Ransomware, SaintBear Goes with Go, and More

<p>The various threat intelligence stories in this iteration of the Anomali Cyber Watch discuss the following topics: <b>APT, Information stealers, Phishing, Russia, Ukraine, Vulnerabilities,</b> and <b>Wipers</b>. The IOCs related to these stories are attached to Anomali Cyber Watch and can be used to check your logs for potential malicious activity.</p> <p><img src="https://cdn.filestackcontent.com/RnfjfvzRfGJRZ6quag33"/><br/> <b>Figure 1 - IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed.</b></p> <h2>Trending Cyber News and Threat Intelligence</h2> <div class="trending-threat-article"> <h3><a href="https://www.sentinelone.com/labs/acidrain-a-modem-wiper-rains-down-on-europe/" target="_blank">AcidRain | A Modem Wiper Rains Down on Europe</a></h3> <p>(published: March 31, 2022)</p> <p>On February 24, 2022, Viasat KA-SAT modems became inoperable in Ukraine after threat actors exploited a misconfigured VPN appliance, compromised KA-SAT network, and were able to execute management commands on a large number of residential modems simultaneously. SentinelOne researchers discovered that a specific Linux wiper, dubbed AcidRain, likely used in that attack as it shows the same targeting and the same overwriting method that was seen in a Viasat’s Surfbeam2 modem targeted in the attack. AcidRain shows code similarities with VPNFilter stage 3 wiping plugin called dstr, but AcidRain’s code appears to be sloppier, so the connection between the two is still under investigation.<br/> <b>Analyst Comment:</b> Internet service providers are heavily targeted due to their trust relationships with their customers and they should harden their configurations and access policies. Devices targeted by AcidRain can be brought back to service through flash memory/factory reset. Organizations exposed to Russia-Ukrainian military conflict should plan for backup options in case of a wiper attack.<br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/2402541" target="_blank">[MITRE ATT&amp;CK] Data Destruction - T1485</a> | <a href="https://ui.threatstream.com/ttp/3297597" target="_blank">[MITRE ATT&amp;CK] System Shutdown/Reboot - T1529</a> | <a href="https://ui.threatstream.com/ttp/947138" target="_blank">[MITRE ATT&amp;CK] Exploit Public-Facing Application - T1190</a> | <a href="https://ui.threatstream.com/ttp/947137" target="_blank">[MITRE ATT&amp;CK] Supply Chain Compromise - T1195</a><br/> <b>Tags:</b> AcidRain, Viasat KA-SAT, Russia, Ukraine, Germany, target-country:UA, target-country:DE, Wiper, Modem, Supply-chain compromise, VPN appliance, VPNFilter</p> </div> <div class="trending-threat-article"> <h3><a href="https://blog.polyswarm.io/blackcat-ransomware" target="_blank">BlackCat Ransomware</a></h3> <p>(published: March 31, 2022)</p> <p>BlackCat (ALPHV) ransomware-as-a-service surfaced on Russian-speaking underground forums in late 2021. The BlackCat ransomware is perhaps the first ransomware written entirely in Rust, and is capable of targeting both Windows and Linux machines. It targeted multiple industries in the US, Europe, the Philippines, and other regions, and Polyswarm researchers expect it to expand its operations. It is attributed to the BlackMatter/DarkSide ransomware threat group. BlackCat used some known BlackMatter infrastructure and shared the same techniques: reverse SSH tunnels and scheduled tasks for persistence, LSASS for credential access, lmpacket, RDP, and psexec for command and control.<br/> <b>Analyst Comment:</b> It is crucial for your company to ensure that servers are always running the most current software version. Your company should have policies in place in regards to the proper configurations needed for your servers in order to conduct your business needs safely. Additionally, always practice Defense in Depth (do not rely on single security mechanisms - security measures should be layered, redundant, and failsafe). Furthermore, a business continuity plan should be in place in the case of a ransomware infection.<br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/3905348" target="_blank">[MITRE ATT&amp;CK] OS Credential Dumping - T1003</a> | <a href="https://ui.threatstream.com/ttp/947127" target="_blank">[MITRE ATT&amp;CK] Scheduled Task - T1053</a> | <a href="https://ui.threatstream.com/ttp/2402531" target="_blank">[MITRE ATT&amp;CK] Data Encrypted for Impact - T1486</a><br/> <b>Tags:</b> BlackCat, ALPHV, Ransomware, BlackMatter, DarkSide, Russia, RaaS, USA, target-country:US, Europe, target-region:Europe, Philippines, target-country:PH, Reverse SSH tunnel, LSASS, Scheduled task, Impacket, RDP, psexec, Windows, Linux</p> </div> <div class="trending-threat-article"> <h3><a href="https://blog.morphisec.com/threat-research-mars-stealer" target="_blank">Mars Stealer</a></h3> <p>(published: March 29, 2022)</p> <p>Morphisec researchers were able to get an insider look into the new Mars infostealer customer operations as the threat actor keylogged himself. First discovered in June 2021, Mars is based on the Oski Stealer and is under constant development. In addition to regular password repositories, it is targeting over three dozen types of various cryptocurrency-related plugins (most targeted: Metamask, Coinbase, Binance, and Math wallets, in that order). Mars is sold on underground forums by Russian-speaking actors for $160 (USD) and doesn’t require any customer vetting. Customers deliver the stealer most commonly via phishing, and sometimes via typosquatted software sites promoted via Google Ads. These Mars payloads were packed by Babadeda crypter or Autoit loader. The studied campaign utilized anonymous VPS and proxy services, CloudFlare, and a GitLab account to host continuously updated latest Mars builds.<br/> <b>Analyst Comment:</b> In addition to anti-phishing training users should be instructed to use caution when responding to online ads and searching for free software and documents. Pirated software carries an additional risk of being backdoored.<br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/3905074" target="_blank">[MITRE ATT&amp;CK] Phishing - T1566</a> | <a href="https://ui.threatstream.com/ttp/947205" target="_blank">[MITRE ATT&amp;CK] User Execution - T1204</a> | <a href="https://ui.threatstream.com/ttp/947235" target="_blank">[MITRE ATT&amp;CK] Obfuscated Files or Information - T1027</a> | <a href="https://ui.threatstream.com/ttp/947136" target="_blank">[MITRE ATT&amp;CK] Deobfuscate/Decode Files or Information - T1140</a> | <a href="https://ui.threatstream.com/ttp/3905036" target="_blank">[MITRE ATT&amp;CK] Credentials from Password Stores - T1555</a> | <a href="https://ui.threatstream.com/ttp/3905359" target="_blank">[MITRE ATT&amp;CK] Proxy - T1090</a><br/> <b>Tags:</b> Mars infostealer, Oski Stealer, Healthcare, Canada, Russia, source-country:RU, target-country:CA, Cryptocurrency wallet, Google Ads, Metamask, Coinbase wallet, Binance, Babadeda crypter, Autoit loader, Typosquatting, Phishing</p> </div> <div class="trending-threat-article"> <h3><a href="https://blog.malwarebytes.com/threat-intelligence/2022/03/new-spear-phishing-campaign-targets-russian-dissidents/" target="_blank">New Phishing Campaigns Related to the Ukraine Military Conflict</a></h3> <p>(published: March 29, 2022)</p> <p>Malwarebytes researchers discovered two new campaigns utilizing messages that are spoofing Russian online censorship agencies. The first campaign targeted the Russian Ministry of Internal Affairs, Ministry of Science and Higher Education of the Russian Federation, various Russian regional governments, and other users. It was the first time an attacker used RTF files to exploit the CAB-less version of the CVE-2021-40444 MSHTML exploit by embedding a malicious URL that downloads an HTML file which exploits the vulnerability in the MSHTML engine and executes the script in Windows Script Host (WSF) data back at the start of the RTF file. It leads to execution of the JScript, and spawning of PowerShell to download a CobaltStrike beacon. Another campaign, potentially related to Carbanak (Carbon Spider), used a similarly-themed lure to deliver a PowerShell-based Rat.<br/> <b>Analyst Comment:</b> In times of crisis when users wonder about all the new regulations coming down, threat actors utilize these topics to craft phishing emails. Keep your systems updated, CAB-less version of CVE-2021-40444 is known to bypass some mitigations, but not the released patch itself.<br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/3905074" target="_blank">[MITRE ATT&amp;CK] Phishing - T1566</a> | <a href="https://ui.threatstream.com/ttp/3904527" target="_blank">[MITRE ATT&amp;CK] Ingress Tool Transfer - T1105</a> | <a href="https://ui.threatstream.com/ttp/3906161" target="_blank">[MITRE ATT&amp;CK] Command and Scripting Interpreter - T1059</a> | <a href="https://ui.threatstream.com/ttp/947141" target="_blank">[MITRE ATT&amp;CK] Masquerading - T1036</a> | <a href="https://ui.threatstream.com/ttp/947235" target="_blank">[MITRE ATT&amp;CK] Obfuscated Files or Information - T1027</a> | <a href="https://ui.threatstream.com/ttp/947136" target="_blank">[MITRE ATT&amp;CK] Deobfuscate/Decode Files or Information - T1140</a> | <a href="https://ui.threatstream.com/ttp/947082" target="_blank">[MITRE ATT&amp;CK] System Owner/User Discovery - T1033</a> | <a href="https://ui.threatstream.com/ttp/947125" target="_blank">[MITRE ATT&amp;CK] System Information Discovery - T1082</a><br/> <b>Tags:</b> CABLESS, CAB-less 40444 exploit, CVE-2021-40444, MSHTML exploit, Cobalt Strike, PowerShell, Government, Russia, target-country:RU, Ukraine-Russia Conflict 2022, Carbanak, Carbon Spider</p> </div> <div class="trending-threat-article"> <h3><a href="https://www.ic3.gov/Media/News/2022/220329.pdf" target="_blank">Cyber Actors Target US Election Officials with Invoice-Themed Phishing Campaign to Harvest Credentials</a></h3> <p>(published: March 29, 2022)</p> <p>The Federal Bureau of Investigation (FBI) discovered a phishing campaign that targeted US election officials in at least nine states. This campaign had three waves of invoice-themed emails sent in October 2021. These emails contained attachments (either PDF or Microsoft Word documents) that were redirecting to a credential-harvesting website. The FBI expects increased targeting of the US election infrastructure in the lead-up to the November 2022 US midterm elections.<br/> <b>Analyst Comment:</b> Network defenders should proactively monitor their infrastructure and establish proper communications with agencies helping with their defensive posture. Teach your users to recognize phishing, social engineering, and spoofing attempts, and encourage them to confirm, if possible, requests for sensitive information through secondary channels such as phone call. Implement multi-factor authentication (MFA), especially for webmail, virtual private networks (VPNs), and accounts that access critical systems.<br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/3905074" target="_blank">[MITRE ATT&amp;CK] Phishing - T1566</a> | <a href="https://ui.threatstream.com/ttp/947205" target="_blank">[MITRE ATT&amp;CK] User Execution - T1204</a> | <a href="https://ui.threatstream.com/ttp/947231" target="_blank">[MITRE ATT&amp;CK] Valid Accounts - T1078</a><br/> <b>Tags:</b> Government, Elections, Phishing, USA, target-country:US</p> </div> <div class="trending-threat-article"> <h3><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/verblecon-sophisticated-malware-cryptocurrency-mining-discord" target="_blank">Sophisticated New Loader Used in Low-level Attacks</a></h3> <p>(published: March 29, 2022)</p> <p>Symantec researchers analyzed a sophisticated loader they first spotted in January 2022 and called it Verblecon. The malware comes as a server-side polymorphic JAR file; it looks different every time it is downloaded. When executed it conducts multiple checks to determine if it is being debugged or run in a sandbox environment, these checks include: Java command-line arguments of its own process, typical virtual machine directories, MAC address prefixes, processes, files, usernames, and registry strings. Verblecon has both hard-coded command-and-control (C2) domains and those using domain generation algorithm (DGA). The campaign objective is to install cryptocurrency miner and to spread by stealing Discord tokens and advertising trojanized videogame applications.<br/> <b>Analyst Comment:</b> Users’ trust in chatting apps is often exploited to spread trojans. Don’t rush to download and install something just because somebody previously-trusted messaged you. Try to verify the authenticity of the messenger and the file provided.<br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/2402525" target="_blank">[MITRE ATT&amp;CK] Resource Hijacking - T1496</a> | <a href="https://ui.threatstream.com/ttp/3905073" target="_blank">[MITRE ATT&amp;CK] Dynamic Resolution - T1568</a> | <a href="https://ui.threatstream.com/ttp/947136" target="_blank">[MITRE ATT&amp;CK] Deobfuscate/Decode Files or Information - T1140</a> | <a href="https://ui.threatstream.com/ttp/947235" target="_blank">[MITRE ATT&amp;CK] Obfuscated Files or Information - T1027</a> | <a href="https://ui.threatstream.com/ttp/2402543" target="_blank">[MITRE ATT&amp;CK] Virtualization/Sandbox Evasion - T1497</a> | <a href="https://ui.threatstream.com/ttp/947082" target="_blank">[MITRE ATT&amp;CK] System Owner/User Discovery - T1033</a> | <a href="https://ui.threatstream.com/ttp/947252" target="_blank">[MITRE ATT&amp;CK] Query Registry - T1012</a> | <a href="https://ui.threatstream.com/ttp/947125" target="_blank">[MITRE ATT&amp;CK] System Information Discovery - T1082</a> | <a href="https://ui.threatstream.com/ttp/947207" target="_blank">[MITRE ATT&amp;CK] Process Discovery - T1057</a> | <a href="https://ui.threatstream.com/ttp/947195" target="_blank">[MITRE ATT&amp;CK] File and Directory Discovery - T1083</a><br/> <b>Tags:</b> Verblecon, Java, DGA, Cryptominer, Discord, Sandbox evasion</p> </div> <div class="trending-threat-article"> <h3><a href="https://cert.gov.ua/article/38374" target="_blank">UAC-0056 Cyberattack on Ukrainian Authorities Using GraphSteel and GrimPlant Malware </a></h3> <p>(published: March 28, 2022)</p> <p>Russia-sponsored group SaintBear (UAC-0056, SaintBear, UNC2589, TA471, Lorec53) was detected attacking Ukrainian government organizations using GraphSteel and GrimPlant backdoors. This campaign starts with malicious macros in a salary-themed phishing attachment. Upon activation, the macros decodes embedded hex-encoded data to drop and execute the next-stage downloader written in Go. This will download and run another downloader, which in turn will download and run two backdoors written in Go: GraphSteel and GrimPlant.<br/> <b>Analyst Comment:</b> Many advanced attacks start with basic techniques such as unwarranted email with malicious attachment that requires the user to open it and enable macroses. It is important to teach your users basic online hygiene and phishing awareness.<br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/3905074" target="_blank">[MITRE ATT&amp;CK] Phishing - T1566</a> | <a href="https://ui.threatstream.com/ttp/947205" target="_blank">[MITRE ATT&amp;CK] User Execution - T1204</a> | <a href="https://ui.threatstream.com/ttp/3904527" target="_blank">[MITRE ATT&amp;CK] Ingress Tool Transfer - T1105</a><br/> <b>Tags:</b> SaintBear, Russia, source-country:RU, Ukraine, target-country:UA, Ukraine-Russia Conflict 2022, Operation Bleeding Bear, UAC-0056, SaintBear, UNC2589, TA471, Lorec53, GraphSteel, GrimPlant, Golang, Macros</p> </div> <div class="trending-threat-article"> <h3><a href="https://www.intezer.com/blog/research/conversation-hijacking-campaign-delivering-icedid/" target="_blank">New Conversation Hijacking Campaign Delivering IcedID</a></h3> <p>(published: March 28, 2022)</p> <p>Intezer researchers discovered a new phishing campaign that uses conversation hijacking to deliver IcedID (BokBot). By utilizing compromised Microsoft Exchange servers, the attackers forge a reply to a previously stolen email sending it from the email account from whom the email was stolen from. In March 2022, the group was attaching archived ISO files that included two files, a LNK file made to look like a document file and a DLL file. The observed tactics, techniques, and procedures (TTP) such as the use of conversation hijacking, IcedID, password-protected zip files, and regsvr32.exe for execution for malicious DLLs align with the threat group TA551 (Shathak, Gold Cabin).<br/> <b>Analyst Comment:</b> Threat actors can improve their phishing success rates by making their replies to the hijacked conversations more convincing and by abusing specific file formats (such as ISO) to subvert Mark-of-the-Web (MOTW) controls. Organizations should respond by continuous user education and improving their endpoint security controls.<br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/3905372" target="_blank">[MITRE ATT&amp;CK] Subvert Trust Controls - T1553</a> | <a href="https://ui.threatstream.com/ttp/947145" target="_blank">[MITRE ATT&amp;CK] Signed Binary Proxy Execution - T1218</a> | <a href="https://ui.threatstream.com/ttp/3905074" target="_blank">[MITRE ATT&amp;CK] Phishing - T1566</a> | <a href="https://ui.threatstream.com/ttp/947205" target="_blank">[MITRE ATT&amp;CK] User Execution - T1204</a> | <a href="https://ui.threatstream.com/ttp/947098" target="_blank">[MITRE ATT&amp;CK] Email Collection - T1114</a> | <a href="https://ui.threatstream.com/ttp/947125" target="_blank">[MITRE ATT&amp;CK] System Information Discovery - T1082</a><br/> <b>Tags:</b> TA551, Shathak, Gold Cabin, BokBot, IcedID, Gziploader, Banking and finance, Healthcare, Energy, Law, Pharmaceutical, Initial access broker, Spearphishing, Signed binary proxy, Conversation hijacking, API hashing, Microsoft Exchange server, ISO, regsvr32.exe</p> </div> <h2>Observed Threats</h2> <p>Additional information regarding the threats discussed in this week's Anomali Cyber Watch can be found below:</p> <p><a href="https://ui.threatstream.com/actor/1688" target="_blank">Carbanak</a><br/> The Carbanak group, which has been active since at least 2014, is primarily focused on attacking banks and companies in, and related to, the retail industry. Initially, the group focused only on attacking Russian banks, but in August 2015 they reportedly expanded their target scope to banks, hospitality, manufacturers of Point of Sale (PoS) systems, retailers, and restaurant industries worldwide. They are a sophisticated group that will compromise vendors employed by the primary target to use the vendor’s legitimate emails in spearphishing campaigns. In May 2021, Carbanak/DarkSide attack caused major US pipeline operator Colonial Pipeline to stop their operations.</p>

Get the Latest Anomali Updates and Cybersecurity News – Straight To Your Inbox

Become a subscriber to the Anomali Newsletter
Receive a monthly summary of our latest threat intelligence content, research, news, events, and more.