Blog

Anomali Cyber Watch: Russia Targets Ukraine with New Malware, Targeted Phishing Campaigns Give Way to Wizard Spider, Certificates Stolen by Lapsus Are Being Abused, and More

Anomali Threat Research
March 22, 2022
Table of contents
<p>The various threat intelligence stories in this iteration of the Anomali Cyber Watch discuss the following topics: <b>APT, Code signing, Naver, Phishing, Russia, Ukraine,</b> and <b>Vulnerabilities</b>. The IOCs related to these stories are attached to Anomali Cyber Watch and can be used to check your logs for potential malicious activity.</p> <p><img src="https://cdn.filestackcontent.com/H24EBfeaQah5PMD33DqK"/><br/> <b>Figure 1 - IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed.</b></p> <h2>Trending Cyber News and Threat Intelligence</h2> <div class="trending-threat-article"> <h3><a href="https://blog.malwarebytes.com/threat-intelligence/2022/03/double-header-isaacwiper-and-caddywiper/" target="_blank">Double Header: IsaacWiper and CaddyWiper</a></h3> <p>(published: March 18, 2022)</p> <p>Data destruction is one of the common objectives for Russia in its ongoing cyberwar with Ukraine. During the February-March 2022 military escalation, three new wipers were discovered. On February 23, 2022, HermeticWiper, on February 24, 2022, IsaacWiper, and, later in March 2022, CaddyWiper. Malwarebytes researchers assess that all three wipers have been written by different authors and have no code overlap. IsaacWiper and CaddyWiper are light in comparison to the more complex HermeticWiper. CaddyWiper has an additional check to exclude wiping Domain Controllers probably to leave an opportunity for malware propagation.<br/> <b>Analyst Comment:</b> Focus on intrusion prevention and having a proper disaster recovery plan in place: have anti-phishing training, keep your systems updated, regularly backup your data to an offline storage.<br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/2402541" target="_blank">[MITRE ATT&amp;CK] Data Destruction - T1485</a><br/> <b>Tags:</b> CaddyWiper, IsaacWiper, HermeticWiper, Wiper, Data destruction, Russia, Ukraine, Ukraine-Russia Conflict 2022, Operation Bleeding Bear</p> </div> <div class="trending-threat-article"> <h3><a href="https://cert.gov.ua/article/37829" target="_blank">UAC-0035 (InvisiMole) Attacks Ukrainian Government Organizations</a></h3> <p>(published: March 18, 2022)</p> <p>The Computer Emergency Response Team for Ukraine (CERT-UA) detected a new UAC-0035 (InvisiMole) phishing campaign targeting Ukrainian government organizations. InvisiMole is likely a subgroup connected to the Russia-sponsored Gamaredon (Primitive Bear) group. The new campaign features an attached archive, together with a shortcut (LNK) file. If the LNK file is opened, an HTML Application file (HTA) downloads and executes VBScript designed to deploy the LoadEdge backdoor. LoadEdge deploys additional malware and modules including TunnelMole, malware that abuses the DNS protocol to form a tunnel for malicious software distribution, and RC2CL backdoor module.<br/> <b>Analyst Comment:</b> Users should be trained to recognize spearphishing attempts. Attachments with rare attachment extensions (LNK, ISO, BAT to name a few) should be reported.<br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/3905074" target="_blank">[MITRE ATT&amp;CK] Phishing - T1566</a> | <a href="https://ui.threatstream.com/ttp/3904527" target="_blank">[MITRE ATT&amp;CK] Ingress Tool Transfer - T1105</a> | <a href="https://ui.threatstream.com/ttp/3905068" target="_blank">[MITRE ATT&amp;CK] Protocol Tunneling - T1572</a> | <a href="https://ui.threatstream.com/ttp/947166" target="_blank">[MITRE ATT&amp;CK] Modify Registry - T1112</a> | <a href="https://ui.threatstream.com/ttp/947205" target="_blank">[MITRE ATT&amp;CK] User Execution - T1204</a><br/> <b>Tags:</b> InvisiMole, UAC-0035, TunnelMole, Gamaredon, Primitive Bear, Russia, Ukraine, LNK, HTA, DNS, Ukraine-Russia Conflict 2022, Operation Bleeding Bear</p> </div> <div class="trending-threat-article"> <h3><a href="https://blog.google/threat-analysis-group/exposing-initial-access-broker-ties-conti/" target="_blank">Exposing Initial Access Broker with Ties to Conti</a></h3> <p>(published: March 17, 2022)</p> <p>Exotic Lily (DEV-0413) is an initial access broker group detected by the Google Threat Analysis Group. Exotic Lily is capable of sending 5,000 emails a day, and has been observed targeting 650 organizations globally. The threat group relies heavily on human operations with manually spoofing organizations, creating fake employee profiles and personal websites. Exotic Lily tries to avoid detection by uploading their malicious payload to public file-sharing services such as OneDrive, TransferNow, TransferXL, or WeTransfer. In September 2021, Exotic Lily was sending an exploit for CVE-2021-40444. In or around November 2021, they switched to delivering ISO files with hidden BazarLoader DLLs and LNK shortcuts. Next infection stages include Cobalt Strike and deployment of Conti and Diavol ransomware. Exotic Lily has close relationships with Wizard Spider (FIN12) but seems to operate as a separate entity.<br/> <b>Analyst Comment:</b> Users should be made aware that a malicious link can come even from somebody that they had an established communication with. Financially-motivated groups like Exotic Lily show a high level of persistence and resourcefulness and a defense-in-depth approach is needed on defenders’ side.<br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/3905074" target="_blank">[MITRE ATT&amp;CK] Phishing - T1566</a> | <a href="https://ui.threatstream.com/ttp/2402531" target="_blank">[MITRE ATT&amp;CK] Data Encrypted for Impact - T1486</a> | <a href="https://ui.threatstream.com/ttp/3904527" target="_blank">[MITRE ATT&amp;CK] Ingress Tool Transfer - T1105</a> | <a href="https://ui.threatstream.com/ttp/947125" target="_blank">[MITRE ATT&amp;CK] System Information Discovery - T1082</a><br/> <b>Tags:</b> Exotic Lily, DEV-0413, TransferNow, TransferXL, WeTransfer, OneDrive, CVE-2021-40444, Bumblebee loader, BazarLoader, Bazar, ISO, DLL, LNK, Cobalt Strike, Conti, Diavol, Ransomware, Wizard Spider, FIN12</p> </div> <div class="trending-threat-article"> <h3><a href="https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/suspected-darkhotel-apt-activity-update.html" target="_blank">Suspected DarkHotel APT Activity Update</a></h3> <p>(published: March 17, 2022)</p> <p>An IP address reported in December 2021 as a part of the South Korean threat actor DarkHotel, remained active as part of spearphishing campaign targeting luxury hotels in Macao, China. This campaign started in November 2021 and lasted through January 18, 2022, possibly stopping as the planned conferences in the targeted area were canceled due to COVID-19-related measures. The campaign featured attached Excel documents with malicious, obfuscated macroses containing multiple loops to make the analysis more complex. When executed by the user the macros creates a scheduled task to collect and exfiltrate data. Additionally, the macros utilizes a known LOLBAS (living off the land binaries and scripts) technique to perform PowerShell command lines as trusted scripts.<br/> <b>Analyst Comment:</b> Hotel guests using hotel WiFi should use a VPN to keep their network traffic encrypted. Hotel administrators should be trained to recognize spearphishing attempts and avoid enabling macroses in the non-warranted attachments.<br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/3905074" target="_blank">[MITRE ATT&amp;CK] Phishing - T1566</a> | <a href="https://ui.threatstream.com/ttp/947205" target="_blank">[MITRE ATT&amp;CK] User Execution - T1204</a> | <a href="https://ui.threatstream.com/ttp/3906161" target="_blank">[MITRE ATT&amp;CK] Command and Scripting Interpreter - T1059</a> | <a href="https://ui.threatstream.com/ttp/947194" target="_blank">[MITRE ATT&amp;CK] Indicator Removal on Host - T1070</a> | <a href="https://ui.threatstream.com/ttp/3905769" target="_blank">[MITRE ATT&amp;CK] Native API - T1106</a> | <a href="https://ui.threatstream.com/ttp/947252" target="_blank">[MITRE ATT&amp;CK] Query Registry - T1012</a> | <a href="https://ui.threatstream.com/ttp/947127" target="_blank">[MITRE ATT&amp;CK] Scheduled Task - T1053</a> | <a href="https://ui.threatstream.com/ttp/947201" target="_blank">[MITRE ATT&amp;CK] Scripting - T1064</a> | <a href="https://ui.threatstream.com/ttp/3905071" target="_blank">[MITRE ATT&amp;CK] Application Layer Protocol - T1071</a> | <a href="https://ui.threatstream.com/ttp/3906161" target="_blank">[MITRE ATT&amp;CK] Command and Scripting Interpreter - T1059</a><br/> <b>Tags:</b> China, Hospitality, Spearphishing, PowerShell, Scheduled task, Suspected-DarkHotel</p> </div> <div class="trending-threat-article"> <h3><a href="https://asec.ahnlab.com/en/32572/" target="_blank">Gh0stCringe RAT Being Distributed to Vulnerable Database Servers</a></h3> <p>(published: March 16, 2022)</p> <p>Gh0stCringe RAT (CirenegRAT) was first detected in December 2018 being distributed via a SMB vulnerability. ASEC researchers have found that recent Gh0stCringe RAT infections were targeting database servers (Microsoft SQL and MySQL) that had account credentials vulnerable to brute force or dictionary attacks. Gh0stCringe code is based on the source code of publicly-released Gh0st RAT. For keylogging, Gh0stCringe uses Windows Polling method (GetAsyncKeyState() API), as opposed to Windows Hooking (SetWindowsHookEx() API) in Gh0st RAT. The malware can change its file size when copying itself, set the hidden or system attributes, terminate itself to disrupt analysis, and achieve persistence via registering a service and registry key.<br/> <b>Analyst Comment:</b> Use long passwords with sufficient entropy and change them periodically. Maintain the latest patch for your systems. Use firewalls for database servers accessible from outside.<br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/947231" target="_blank">[MITRE ATT&amp;CK] Valid Accounts - T1078</a> | <a href="https://ui.threatstream.com/ttp/947227" target="_blank">[MITRE ATT&amp;CK] Brute Force - T1110</a> | <a href="https://ui.threatstream.com/ttp/3905040" target="_blank">[MITRE ATT&amp;CK] Create or Modify System Process - T1543</a> | <a href="https://ui.threatstream.com/ttp/947166" target="_blank">[MITRE ATT&amp;CK] Modify Registry - T1112</a> | <a href="https://ui.threatstream.com/ttp/947199" target="_blank">[MITRE ATT&amp;CK] Data Staged - T1074</a> | <a href="https://ui.threatstream.com/ttp/947243" target="_blank">[MITRE ATT&amp;CK] Input Capture - T1056</a> | <a href="https://ui.threatstream.com/ttp/947235" target="_blank">[MITRE ATT&amp;CK] Obfuscated Files or Information - T1027</a><br/> <b>Tags:</b> Gh0stCringe, CirenegRAT, Gh0st RAT, ZombieBoy, SMB, MS-SQL, MySQL, Database server, Brute force attack, Dictionary attack</p> </div> <div class="trending-threat-article"> <h3><a href="https://blog.malwarebytes.com/awareness/2022/03/stolen-nvidia-certificates-used-to-sign-malware-heres-what-to-do/" target="_blank">Stolen Nvidia Certificates Used to Sign Malware—Here’s What to Do</a></h3> <p>(published: March 15, 2022)</p> <p>In March 2022, the extortionist threat group, Lapsus$ leaked Nvidia’s internal data including two of Nvidia’s code signing certificates. Those certificates are already being used to sign malware. Leaked signing certificates have expired (in 2014 and 2018) but Windows doesn't require a valid timestamp when signing kernel drivers if the certificate was issued before July 29, 2015.<br/> <b>Analyst Comment:</b> System administrators are advised to configure Windows Defender Application Control (WDAC) policies in regards to Nvidia drivers. You can check if you have files signed with the leaked certificates in your environment: use the serial numbers 43BB437D609866286DD839E1D00309F5 and 14781bc862e8dc503a559346f5dcc518, or use Neo23x0’s Yara rule.<br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/3905372" target="_blank">[MITRE ATT&amp;CK] Subvert Trust Controls - T1553</a><br/> <b>Tags:</b> Lapsus$, Nvidia, Certificate, Code signing, Windows driver, Kernel driver</p> </div> <div class="trending-threat-article"> <h3><a href="https://www.prevailion.com/what-wicked-webs-we-unweave/" target="_blank">What Wicked Webs We Un-Weave: Wizard Spider</a></h3> <p>(published: March 15, 2022)</p> <p>Prevailion researchers detected a large-scale phishing campaign using hundreds of domains to steal credentials for Naver, a Google-like online platform in South Korea that provides email, payment, search, social, and other customer-facing services. 532 unique domains belonging to the ongoing phishing campaign targeting Naver logins were registered from August 2021 to February 2022. Prevailion didn’t make a final attribution call, but notes that this Naver-targeting phishing infrastructure overlaps with Russia-based, financially-motivated threat actor group Wizard Spider, and shares similarities with some of the characteristics of Wizard Spider’s associate, initial access broker Exotic Lily.<br/> <b>Analyst Comment:</b> It’s important to keep a watchful eye on suspicious domain registration activity related to your brand and companies from your supply chain. Anomali Targeted Threat Monitoring service can help you detect and block such suspicious domain registrations.<br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/3905074" target="_blank">[MITRE ATT&amp;CK] Phishing - T1566</a><br/> <b>Tags:</b> Naver, Wizard Spider, TrickBot, Conti ransomware, Cobalt Strike beacon, Conti, CVE-2021-40444, Phishing, South Korea, Russia</p> </div> <div class="trending-threat-article"> <h3><a href="https://blog.talosintelligence.com/2022/03/ukraine-invasion-scams-malware.html" target="_blank">Threat Advisory: Opportunistic Cyber Criminals Take Advantage of Ukraine Invasion</a></h3> <p>(published: March 14, 2022)</p> <p>Cisco Talos researchers observed scam and malware distribution actors using email lures with themes related to the military conflict in Ukraine, including humanitarian assistance and various types of fundraising. As Ukraine remains in the top news topics, this abuse is expected to increase. One of the often observed threats is a commodity remote access trojan (RAT) called Remcos that is known for its persistence via a registry run key and utilizations of a Dynamic DNS server for command and control (C2) communications.<br/> <b>Analyst Comment:</b> Organizations should start proactively hunting for scam threats in their environment by building a word list to search for. Users should be trained to recognize phishing threats, and to check for possible web link spoofing by hovering the mouse over the highlighted area.<br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/3905073" target="_blank">[MITRE ATT&amp;CK] Dynamic Resolution - T1568</a> | <a href="https://ui.threatstream.com/ttp/947166" target="_blank">[MITRE ATT&amp;CK] Modify Registry - T1112</a> | <a href="https://ui.threatstream.com/ttp/3905074" target="_blank">[MITRE ATT&amp;CK] Phishing - T1566</a> | <a href="https://ui.threatstream.com/ttp/3904527" target="_blank">[MITRE ATT&amp;CK] Ingress Tool Transfer - T1105</a><br/> <b>Tags:</b> Remcos, RAT, DDNS, CVE-2017-11882, Scam, Phishing, Bitcoin, Cryptocurrency, Ukraine-Russia Conflict 2022, Ukraine</p> </div> <h2>Observed Threats</h2> <p>Additional information regarding the threats discussed in this week's Anomali Cyber Watch can be found below:</p> <p><a href="https://ui.threatstream.com/actor/1703" target="_blank">Gamaredon Group</a><br/> The Advanced Persistent Threat (APT) group “Gamaredon,” is believed to be a Russia-based group that has been active since at least 2013. The group is known for conducting cyber espionage campaigns targeting the Ukrainian government, law enforcement officials, media, and military. The Lookingglass Cyber Threat Intelligence Group first reported Gamaredon in their report on a cyberespionage campaign dubbed “Operation Armageddon” in April 2015, according to Palo Alto Networks Unit 42 researchers. This led Unit 42 researchers, in February 2017, to name the group “Gamaredon Group” because they believe the group conducted Operation Armageddon.</p> <p><a href="https://ui.threatstream.com/actor/27829" target="_blank">Wizard Spider</a><br/> Wizard Spider is a financially-motivated APT group operating out of Russia that has been active since 2016. Their primary activities involve the development and administration of Trickbot, Conti, Diavol, and Ryuk malware families. Wizard Spider targets large organizations for a high-ransom return. This is a technique known as big game hunting (or BGH). Their main tool, Trickbot, is a banking trojan that harvests financial credentials and Personal Identifiable Information (PII). While phishing is the main method of malware propagation, other methods such as exposed RDP services are seeing an increase in use. Known associated groups are: Grim Spider - A group that has been operating Ryuk ransomware since August 2018; reported to be a cell of Wizard Spider, and Lunar Spider - This threat group is the Eastern European-based operator and developer of the commodity banking malware called BokBot (aka IcedID). Main activities involve data theft and wire fraud.</p> <p><a href="https://ui.threatstream.com/malware/310231" target="_blank">IsaacWiper</a><br/> IsaacWiper alias Lasainraw is wiper malware that enumerates the physical drive and wipes out the MBR to make the system inaccessible. On February 24, 2022, security vendor ESET observed IsaacWiper being used to target the Government of Ukraine networks. It can either be a DLL or an EXE file dropped and executed in the %programdata% or system32 location.</p> <p><a href="https://ui.threatstream.com/malware/306720" target="_blank">HermeticWiper</a><br/> HermeticWiper (FoxBlade) is a sophisticated disk-wiping malware used to attack organizations in Ukraine the day prior to the launch of a Russian invasion on February 24, 2022. The malware features behavioral characteristics similar to the WhisperGate data-wiping malware first reported on January 15, 2022 by Microsoft in a destructive malware operation targeting multiple Ukraine-based organizations. HermeticWiper has two main destructive components that corrupts data and renders infected systems inoperable by damaging the Master Boot Record (MBR) and EaseUS Partition Master software.</p> <p><a href="https://ui.threatstream.com/tip/2750422" target="_blank">Exploited Windows MSHTML Vulnerability (CVE-2021-40444) Was Unpatched Until September 2021</a><br/> A remote code execution (RCE) vulnerability in MSHTML that affects Microsoft Windows (CVE-2021-40444) was recently reported publicly by Microsoft Threat Intelligence Center (MTIC) on 7 September, 2021. To exploit this vulnerability, a would-be attacker could craft a malicious ActiveX control to be used by a Microsoft Office document that hosts the browser rendering engine. The original exploit vector has been determined to be externally-targeted OLEObject relationship definition bearing an MHTML handler prefix pointed at an HTML file hosted on an actor infrastructure. A typical exploit for this vulnerability would use documents crafted with embedded JavaScript that downloads a cabinet file (.cab) containing a dynamic-link library (DLL) from a remote host. Once the DLL function is executed, shellcode is loaded from an attacker’s remote source and into the “wabmig.exe” process (Microsoft address import tool). Observed campaigns leveraging CVE-2021-40444 were connected to spreading various malware, including but not limited to BazaLoader, Conti ransomware, Cobalt Strike, and Trickbot.</p>
Anomali Threat Research

Anomali's Threat Research team continually tracks security threats to identify when new, highly critical security threats emerge. The Anomali Threat Research team's briefings discuss current threats and risks like botnets, data breaches, misconfigurations, ransomware, threat groups, and various vulnerabilities. The team also creates free and premium threat intelligence feeds for Anomali's industry-leading Threat Intelligence Platform, ThreatStream.

Propel your mission with amplified visibility, analytics, and AI.

Learn how Anomali can help you cost-effectively improve your security posture.

March 22, 2022
-
Anomali Threat Research
,

Anomali Cyber Watch: Russia Targets Ukraine with New Malware, Targeted Phishing Campaigns Give Way to Wizard Spider, Certificates Stolen by Lapsus Are Being Abused, and More

<p>The various threat intelligence stories in this iteration of the Anomali Cyber Watch discuss the following topics: <b>APT, Code signing, Naver, Phishing, Russia, Ukraine,</b> and <b>Vulnerabilities</b>. The IOCs related to these stories are attached to Anomali Cyber Watch and can be used to check your logs for potential malicious activity.</p> <p><img src="https://cdn.filestackcontent.com/H24EBfeaQah5PMD33DqK"/><br/> <b>Figure 1 - IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed.</b></p> <h2>Trending Cyber News and Threat Intelligence</h2> <div class="trending-threat-article"> <h3><a href="https://blog.malwarebytes.com/threat-intelligence/2022/03/double-header-isaacwiper-and-caddywiper/" target="_blank">Double Header: IsaacWiper and CaddyWiper</a></h3> <p>(published: March 18, 2022)</p> <p>Data destruction is one of the common objectives for Russia in its ongoing cyberwar with Ukraine. During the February-March 2022 military escalation, three new wipers were discovered. On February 23, 2022, HermeticWiper, on February 24, 2022, IsaacWiper, and, later in March 2022, CaddyWiper. Malwarebytes researchers assess that all three wipers have been written by different authors and have no code overlap. IsaacWiper and CaddyWiper are light in comparison to the more complex HermeticWiper. CaddyWiper has an additional check to exclude wiping Domain Controllers probably to leave an opportunity for malware propagation.<br/> <b>Analyst Comment:</b> Focus on intrusion prevention and having a proper disaster recovery plan in place: have anti-phishing training, keep your systems updated, regularly backup your data to an offline storage.<br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/2402541" target="_blank">[MITRE ATT&amp;CK] Data Destruction - T1485</a><br/> <b>Tags:</b> CaddyWiper, IsaacWiper, HermeticWiper, Wiper, Data destruction, Russia, Ukraine, Ukraine-Russia Conflict 2022, Operation Bleeding Bear</p> </div> <div class="trending-threat-article"> <h3><a href="https://cert.gov.ua/article/37829" target="_blank">UAC-0035 (InvisiMole) Attacks Ukrainian Government Organizations</a></h3> <p>(published: March 18, 2022)</p> <p>The Computer Emergency Response Team for Ukraine (CERT-UA) detected a new UAC-0035 (InvisiMole) phishing campaign targeting Ukrainian government organizations. InvisiMole is likely a subgroup connected to the Russia-sponsored Gamaredon (Primitive Bear) group. The new campaign features an attached archive, together with a shortcut (LNK) file. If the LNK file is opened, an HTML Application file (HTA) downloads and executes VBScript designed to deploy the LoadEdge backdoor. LoadEdge deploys additional malware and modules including TunnelMole, malware that abuses the DNS protocol to form a tunnel for malicious software distribution, and RC2CL backdoor module.<br/> <b>Analyst Comment:</b> Users should be trained to recognize spearphishing attempts. Attachments with rare attachment extensions (LNK, ISO, BAT to name a few) should be reported.<br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/3905074" target="_blank">[MITRE ATT&amp;CK] Phishing - T1566</a> | <a href="https://ui.threatstream.com/ttp/3904527" target="_blank">[MITRE ATT&amp;CK] Ingress Tool Transfer - T1105</a> | <a href="https://ui.threatstream.com/ttp/3905068" target="_blank">[MITRE ATT&amp;CK] Protocol Tunneling - T1572</a> | <a href="https://ui.threatstream.com/ttp/947166" target="_blank">[MITRE ATT&amp;CK] Modify Registry - T1112</a> | <a href="https://ui.threatstream.com/ttp/947205" target="_blank">[MITRE ATT&amp;CK] User Execution - T1204</a><br/> <b>Tags:</b> InvisiMole, UAC-0035, TunnelMole, Gamaredon, Primitive Bear, Russia, Ukraine, LNK, HTA, DNS, Ukraine-Russia Conflict 2022, Operation Bleeding Bear</p> </div> <div class="trending-threat-article"> <h3><a href="https://blog.google/threat-analysis-group/exposing-initial-access-broker-ties-conti/" target="_blank">Exposing Initial Access Broker with Ties to Conti</a></h3> <p>(published: March 17, 2022)</p> <p>Exotic Lily (DEV-0413) is an initial access broker group detected by the Google Threat Analysis Group. Exotic Lily is capable of sending 5,000 emails a day, and has been observed targeting 650 organizations globally. The threat group relies heavily on human operations with manually spoofing organizations, creating fake employee profiles and personal websites. Exotic Lily tries to avoid detection by uploading their malicious payload to public file-sharing services such as OneDrive, TransferNow, TransferXL, or WeTransfer. In September 2021, Exotic Lily was sending an exploit for CVE-2021-40444. In or around November 2021, they switched to delivering ISO files with hidden BazarLoader DLLs and LNK shortcuts. Next infection stages include Cobalt Strike and deployment of Conti and Diavol ransomware. Exotic Lily has close relationships with Wizard Spider (FIN12) but seems to operate as a separate entity.<br/> <b>Analyst Comment:</b> Users should be made aware that a malicious link can come even from somebody that they had an established communication with. Financially-motivated groups like Exotic Lily show a high level of persistence and resourcefulness and a defense-in-depth approach is needed on defenders’ side.<br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/3905074" target="_blank">[MITRE ATT&amp;CK] Phishing - T1566</a> | <a href="https://ui.threatstream.com/ttp/2402531" target="_blank">[MITRE ATT&amp;CK] Data Encrypted for Impact - T1486</a> | <a href="https://ui.threatstream.com/ttp/3904527" target="_blank">[MITRE ATT&amp;CK] Ingress Tool Transfer - T1105</a> | <a href="https://ui.threatstream.com/ttp/947125" target="_blank">[MITRE ATT&amp;CK] System Information Discovery - T1082</a><br/> <b>Tags:</b> Exotic Lily, DEV-0413, TransferNow, TransferXL, WeTransfer, OneDrive, CVE-2021-40444, Bumblebee loader, BazarLoader, Bazar, ISO, DLL, LNK, Cobalt Strike, Conti, Diavol, Ransomware, Wizard Spider, FIN12</p> </div> <div class="trending-threat-article"> <h3><a href="https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/suspected-darkhotel-apt-activity-update.html" target="_blank">Suspected DarkHotel APT Activity Update</a></h3> <p>(published: March 17, 2022)</p> <p>An IP address reported in December 2021 as a part of the South Korean threat actor DarkHotel, remained active as part of spearphishing campaign targeting luxury hotels in Macao, China. This campaign started in November 2021 and lasted through January 18, 2022, possibly stopping as the planned conferences in the targeted area were canceled due to COVID-19-related measures. The campaign featured attached Excel documents with malicious, obfuscated macroses containing multiple loops to make the analysis more complex. When executed by the user the macros creates a scheduled task to collect and exfiltrate data. Additionally, the macros utilizes a known LOLBAS (living off the land binaries and scripts) technique to perform PowerShell command lines as trusted scripts.<br/> <b>Analyst Comment:</b> Hotel guests using hotel WiFi should use a VPN to keep their network traffic encrypted. Hotel administrators should be trained to recognize spearphishing attempts and avoid enabling macroses in the non-warranted attachments.<br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/3905074" target="_blank">[MITRE ATT&amp;CK] Phishing - T1566</a> | <a href="https://ui.threatstream.com/ttp/947205" target="_blank">[MITRE ATT&amp;CK] User Execution - T1204</a> | <a href="https://ui.threatstream.com/ttp/3906161" target="_blank">[MITRE ATT&amp;CK] Command and Scripting Interpreter - T1059</a> | <a href="https://ui.threatstream.com/ttp/947194" target="_blank">[MITRE ATT&amp;CK] Indicator Removal on Host - T1070</a> | <a href="https://ui.threatstream.com/ttp/3905769" target="_blank">[MITRE ATT&amp;CK] Native API - T1106</a> | <a href="https://ui.threatstream.com/ttp/947252" target="_blank">[MITRE ATT&amp;CK] Query Registry - T1012</a> | <a href="https://ui.threatstream.com/ttp/947127" target="_blank">[MITRE ATT&amp;CK] Scheduled Task - T1053</a> | <a href="https://ui.threatstream.com/ttp/947201" target="_blank">[MITRE ATT&amp;CK] Scripting - T1064</a> | <a href="https://ui.threatstream.com/ttp/3905071" target="_blank">[MITRE ATT&amp;CK] Application Layer Protocol - T1071</a> | <a href="https://ui.threatstream.com/ttp/3906161" target="_blank">[MITRE ATT&amp;CK] Command and Scripting Interpreter - T1059</a><br/> <b>Tags:</b> China, Hospitality, Spearphishing, PowerShell, Scheduled task, Suspected-DarkHotel</p> </div> <div class="trending-threat-article"> <h3><a href="https://asec.ahnlab.com/en/32572/" target="_blank">Gh0stCringe RAT Being Distributed to Vulnerable Database Servers</a></h3> <p>(published: March 16, 2022)</p> <p>Gh0stCringe RAT (CirenegRAT) was first detected in December 2018 being distributed via a SMB vulnerability. ASEC researchers have found that recent Gh0stCringe RAT infections were targeting database servers (Microsoft SQL and MySQL) that had account credentials vulnerable to brute force or dictionary attacks. Gh0stCringe code is based on the source code of publicly-released Gh0st RAT. For keylogging, Gh0stCringe uses Windows Polling method (GetAsyncKeyState() API), as opposed to Windows Hooking (SetWindowsHookEx() API) in Gh0st RAT. The malware can change its file size when copying itself, set the hidden or system attributes, terminate itself to disrupt analysis, and achieve persistence via registering a service and registry key.<br/> <b>Analyst Comment:</b> Use long passwords with sufficient entropy and change them periodically. Maintain the latest patch for your systems. Use firewalls for database servers accessible from outside.<br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/947231" target="_blank">[MITRE ATT&amp;CK] Valid Accounts - T1078</a> | <a href="https://ui.threatstream.com/ttp/947227" target="_blank">[MITRE ATT&amp;CK] Brute Force - T1110</a> | <a href="https://ui.threatstream.com/ttp/3905040" target="_blank">[MITRE ATT&amp;CK] Create or Modify System Process - T1543</a> | <a href="https://ui.threatstream.com/ttp/947166" target="_blank">[MITRE ATT&amp;CK] Modify Registry - T1112</a> | <a href="https://ui.threatstream.com/ttp/947199" target="_blank">[MITRE ATT&amp;CK] Data Staged - T1074</a> | <a href="https://ui.threatstream.com/ttp/947243" target="_blank">[MITRE ATT&amp;CK] Input Capture - T1056</a> | <a href="https://ui.threatstream.com/ttp/947235" target="_blank">[MITRE ATT&amp;CK] Obfuscated Files or Information - T1027</a><br/> <b>Tags:</b> Gh0stCringe, CirenegRAT, Gh0st RAT, ZombieBoy, SMB, MS-SQL, MySQL, Database server, Brute force attack, Dictionary attack</p> </div> <div class="trending-threat-article"> <h3><a href="https://blog.malwarebytes.com/awareness/2022/03/stolen-nvidia-certificates-used-to-sign-malware-heres-what-to-do/" target="_blank">Stolen Nvidia Certificates Used to Sign Malware—Here’s What to Do</a></h3> <p>(published: March 15, 2022)</p> <p>In March 2022, the extortionist threat group, Lapsus$ leaked Nvidia’s internal data including two of Nvidia’s code signing certificates. Those certificates are already being used to sign malware. Leaked signing certificates have expired (in 2014 and 2018) but Windows doesn't require a valid timestamp when signing kernel drivers if the certificate was issued before July 29, 2015.<br/> <b>Analyst Comment:</b> System administrators are advised to configure Windows Defender Application Control (WDAC) policies in regards to Nvidia drivers. You can check if you have files signed with the leaked certificates in your environment: use the serial numbers 43BB437D609866286DD839E1D00309F5 and 14781bc862e8dc503a559346f5dcc518, or use Neo23x0’s Yara rule.<br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/3905372" target="_blank">[MITRE ATT&amp;CK] Subvert Trust Controls - T1553</a><br/> <b>Tags:</b> Lapsus$, Nvidia, Certificate, Code signing, Windows driver, Kernel driver</p> </div> <div class="trending-threat-article"> <h3><a href="https://www.prevailion.com/what-wicked-webs-we-unweave/" target="_blank">What Wicked Webs We Un-Weave: Wizard Spider</a></h3> <p>(published: March 15, 2022)</p> <p>Prevailion researchers detected a large-scale phishing campaign using hundreds of domains to steal credentials for Naver, a Google-like online platform in South Korea that provides email, payment, search, social, and other customer-facing services. 532 unique domains belonging to the ongoing phishing campaign targeting Naver logins were registered from August 2021 to February 2022. Prevailion didn’t make a final attribution call, but notes that this Naver-targeting phishing infrastructure overlaps with Russia-based, financially-motivated threat actor group Wizard Spider, and shares similarities with some of the characteristics of Wizard Spider’s associate, initial access broker Exotic Lily.<br/> <b>Analyst Comment:</b> It’s important to keep a watchful eye on suspicious domain registration activity related to your brand and companies from your supply chain. Anomali Targeted Threat Monitoring service can help you detect and block such suspicious domain registrations.<br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/3905074" target="_blank">[MITRE ATT&amp;CK] Phishing - T1566</a><br/> <b>Tags:</b> Naver, Wizard Spider, TrickBot, Conti ransomware, Cobalt Strike beacon, Conti, CVE-2021-40444, Phishing, South Korea, Russia</p> </div> <div class="trending-threat-article"> <h3><a href="https://blog.talosintelligence.com/2022/03/ukraine-invasion-scams-malware.html" target="_blank">Threat Advisory: Opportunistic Cyber Criminals Take Advantage of Ukraine Invasion</a></h3> <p>(published: March 14, 2022)</p> <p>Cisco Talos researchers observed scam and malware distribution actors using email lures with themes related to the military conflict in Ukraine, including humanitarian assistance and various types of fundraising. As Ukraine remains in the top news topics, this abuse is expected to increase. One of the often observed threats is a commodity remote access trojan (RAT) called Remcos that is known for its persistence via a registry run key and utilizations of a Dynamic DNS server for command and control (C2) communications.<br/> <b>Analyst Comment:</b> Organizations should start proactively hunting for scam threats in their environment by building a word list to search for. Users should be trained to recognize phishing threats, and to check for possible web link spoofing by hovering the mouse over the highlighted area.<br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/3905073" target="_blank">[MITRE ATT&amp;CK] Dynamic Resolution - T1568</a> | <a href="https://ui.threatstream.com/ttp/947166" target="_blank">[MITRE ATT&amp;CK] Modify Registry - T1112</a> | <a href="https://ui.threatstream.com/ttp/3905074" target="_blank">[MITRE ATT&amp;CK] Phishing - T1566</a> | <a href="https://ui.threatstream.com/ttp/3904527" target="_blank">[MITRE ATT&amp;CK] Ingress Tool Transfer - T1105</a><br/> <b>Tags:</b> Remcos, RAT, DDNS, CVE-2017-11882, Scam, Phishing, Bitcoin, Cryptocurrency, Ukraine-Russia Conflict 2022, Ukraine</p> </div> <h2>Observed Threats</h2> <p>Additional information regarding the threats discussed in this week's Anomali Cyber Watch can be found below:</p> <p><a href="https://ui.threatstream.com/actor/1703" target="_blank">Gamaredon Group</a><br/> The Advanced Persistent Threat (APT) group “Gamaredon,” is believed to be a Russia-based group that has been active since at least 2013. The group is known for conducting cyber espionage campaigns targeting the Ukrainian government, law enforcement officials, media, and military. The Lookingglass Cyber Threat Intelligence Group first reported Gamaredon in their report on a cyberespionage campaign dubbed “Operation Armageddon” in April 2015, according to Palo Alto Networks Unit 42 researchers. This led Unit 42 researchers, in February 2017, to name the group “Gamaredon Group” because they believe the group conducted Operation Armageddon.</p> <p><a href="https://ui.threatstream.com/actor/27829" target="_blank">Wizard Spider</a><br/> Wizard Spider is a financially-motivated APT group operating out of Russia that has been active since 2016. Their primary activities involve the development and administration of Trickbot, Conti, Diavol, and Ryuk malware families. Wizard Spider targets large organizations for a high-ransom return. This is a technique known as big game hunting (or BGH). Their main tool, Trickbot, is a banking trojan that harvests financial credentials and Personal Identifiable Information (PII). While phishing is the main method of malware propagation, other methods such as exposed RDP services are seeing an increase in use. Known associated groups are: Grim Spider - A group that has been operating Ryuk ransomware since August 2018; reported to be a cell of Wizard Spider, and Lunar Spider - This threat group is the Eastern European-based operator and developer of the commodity banking malware called BokBot (aka IcedID). Main activities involve data theft and wire fraud.</p> <p><a href="https://ui.threatstream.com/malware/310231" target="_blank">IsaacWiper</a><br/> IsaacWiper alias Lasainraw is wiper malware that enumerates the physical drive and wipes out the MBR to make the system inaccessible. On February 24, 2022, security vendor ESET observed IsaacWiper being used to target the Government of Ukraine networks. It can either be a DLL or an EXE file dropped and executed in the %programdata% or system32 location.</p> <p><a href="https://ui.threatstream.com/malware/306720" target="_blank">HermeticWiper</a><br/> HermeticWiper (FoxBlade) is a sophisticated disk-wiping malware used to attack organizations in Ukraine the day prior to the launch of a Russian invasion on February 24, 2022. The malware features behavioral characteristics similar to the WhisperGate data-wiping malware first reported on January 15, 2022 by Microsoft in a destructive malware operation targeting multiple Ukraine-based organizations. HermeticWiper has two main destructive components that corrupts data and renders infected systems inoperable by damaging the Master Boot Record (MBR) and EaseUS Partition Master software.</p> <p><a href="https://ui.threatstream.com/tip/2750422" target="_blank">Exploited Windows MSHTML Vulnerability (CVE-2021-40444) Was Unpatched Until September 2021</a><br/> A remote code execution (RCE) vulnerability in MSHTML that affects Microsoft Windows (CVE-2021-40444) was recently reported publicly by Microsoft Threat Intelligence Center (MTIC) on 7 September, 2021. To exploit this vulnerability, a would-be attacker could craft a malicious ActiveX control to be used by a Microsoft Office document that hosts the browser rendering engine. The original exploit vector has been determined to be externally-targeted OLEObject relationship definition bearing an MHTML handler prefix pointed at an HTML file hosted on an actor infrastructure. A typical exploit for this vulnerability would use documents crafted with embedded JavaScript that downloads a cabinet file (.cab) containing a dynamic-link library (DLL) from a remote host. Once the DLL function is executed, shellcode is loaded from an attacker’s remote source and into the “wabmig.exe” process (Microsoft address import tool). Observed campaigns leveraging CVE-2021-40444 were connected to spreading various malware, including but not limited to BazaLoader, Conti ransomware, Cobalt Strike, and Trickbot.</p>

Get the Latest Anomali Updates and Cybersecurity News – Straight To Your Inbox

Become a subscriber to the Anomali Newsletter
Receive a monthly summary of our latest threat intelligence content, research, news, events, and more.