May 31, 2023
-
Anomali Threat Research
,

Anomali Cyber Watch: Shadow Force Targets Korean Servers, Volt Typhoon Abuses Built-in Tools, CosmicEnergy Tests Electric Distribution Disruption

<div id="weekly"> <p id="intro">The various threat intelligence stories in this iteration of the Anomali Cyber Watch discuss the following topics:<b> China, DLL Side-Loading, Living off the Land, Operational technology, Ransomware, </b> and <b>Russia</b>. The IOCs related to these stories are attached to Anomali Cyber Watch and can be used to check your logs for potential malicious activity. <img src="https://cdn.filestackcontent.com/1jINs2mfRrmKNX1NbZwq"/><br/> <b>Figure 1 - IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed.</b></p> <div class="trending-threats-article" id="trending-threats"> <h2 id="trendingthreats">Trending Cyber News and Threat Intelligence</h2> <h3 id="article-1"><a href="https://download.ahnlab.com/global/brochure/ATIP_2023_Shadow-Force-Groups-Viticdoor-and-CoinMiner.pdf" target="_blank">Shadow Force Group's Viticdoor and CoinMiner</a></h3> <p>(published: May 27, 2023)</p> <p>Shadow Force is a threat that has been targeting South Korean organizations since 2013. It primarily targets Windows servers. Ahnlab researchers analyzed the group’s activity in 2020-2022. Shadow Force activities are relatively easy to detect as the actors tend to reuse the same file names for their malware. At the same time, the group has evolved: after March its files often exceed 10MB due to binary packing. The actors also started introducing various cryptocurrency miners and a new backdoor dubbed Viticdoor.<br/> <b>Analyst Comment:</b> Organizations should keep their servers updated and properly configured with security in mind. An unusually high CPU usage and overheating can be a sign of the malicious resource hijacking for cryptocurrency mining. Network and host-based indicators associated with Shadow Force are available in the Anomali platform and customers are advised to block these on their infrastructure.<br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/attackpattern/10061" target="_blank">[MITRE ATT&amp;CK] T1588.003 - Obtain Capabilities: Code Signing Certificates</a> | <a href="https://ui.threatstream.com/attackpattern/9638" target="_blank">[MITRE ATT&amp;CK] T1105 - Ingress Tool Transfer</a> | <a href="https://ui.threatstream.com/attackpattern/9592" target="_blank">[MITRE ATT&amp;CK] T1027.002 - Obfuscated Files or Information: Software Packing</a> | <a href="https://ui.threatstream.com/attackpattern/3718" target="_blank">[MITRE ATT&amp;CK] T1569.002: Service Execution</a> | <a href="https://ui.threatstream.com/attackpattern/10029" target="_blank">[MITRE ATT&amp;CK] T1059.003 - Command and Scripting Interpreter: Windows Command Shell</a> | <a href="https://ui.threatstream.com/attackpattern/9933" target="_blank">[MITRE ATT&amp;CK] T1547.001 - Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder</a> | <a href="https://ui.threatstream.com/attackpattern/9799" target="_blank">[MITRE ATT&amp;CK] T1546.008 - Event Triggered Execution: Accessibility Features</a> | <a href="https://ui.threatstream.com/attackpattern/9860" target="_blank">[MITRE ATT&amp;CK] T1543.003 - Create or Modify System Process: Windows Service</a> | <a href="https://ui.threatstream.com/attackpattern/9729" target="_blank">[MITRE ATT&amp;CK] T1554 - Compromise Client Software Binary</a> | <a href="https://ui.threatstream.com/attackpattern/10004" target="_blank">[MITRE ATT&amp;CK] T1078.001 - Valid Accounts: Default Accounts</a> | <a href="https://ui.threatstream.com/attackpattern/9838" target="_blank">[MITRE ATT&amp;CK] T1140 - Deobfuscate/Decode Files Or Information</a> | <a href="https://ui.threatstream.com/attackpattern/9598" target="_blank">[MITRE ATT&amp;CK] T1036.001 - Masquerading: Invalid Code Signature</a> | <a href="https://ui.threatstream.com/attackpattern/9596" target="_blank">[MITRE ATT&amp;CK] T1553.002 - Subvert Trust Controls: Code Signing</a> | <a href="https://ui.threatstream.com/attackpattern/10101" target="_blank">[MITRE ATT&amp;CK] T1036.004 - Masquerading: Masquerade Task Or Service</a> | <a href="https://ui.threatstream.com/attackpattern/9712" target="_blank">[MITRE ATT&amp;CK] T1574 - Hijack Execution Flow</a> | <a href="https://ui.threatstream.com/attackpattern/9888" target="_blank">[MITRE ATT&amp;CK] T1056.001 - Input Capture: Keylogging</a> | <a href="https://ui.threatstream.com/attackpattern/9808" target="_blank">[MITRE ATT&amp;CK] T1003.001 - OS Credential Dumping: Lsass Memory</a> | <a href="https://ui.threatstream.com/attackpattern/9857" target="_blank">[MITRE ATT&amp;CK] T1110 - Brute Force</a> | <a href="https://ui.threatstream.com/attackpattern/9710" target="_blank">[MITRE ATT&amp;CK] T1057 - Process Discovery</a> | <a href="https://ui.threatstream.com/attackpattern/10018" target="_blank">[MITRE ATT&amp;CK] T1087.001 - Account Discovery: Local Account</a> | <a href="https://ui.threatstream.com/attackpattern/13021" target="_blank">[MITRE ATT&amp;CK] Picus: The System Information Discovery Technique Explained - MITRE ATT&amp;CK T1082</a> | <a href="https://ui.threatstream.com/attackpattern/9647" target="_blank">[MITRE ATT&amp;CK] T1021.002 - Remote Services: Smb/Windows Admin Shares</a> | <a href="https://ui.threatstream.com/attackpattern/9888" target="_blank">[MITRE ATT&amp;CK] T1056.001 - Input Capture: Keylogging</a> | <a href="https://ui.threatstream.com/attackpattern/9796" target="_blank">[MITRE ATT&amp;CK] T1115 - Clipboard Data</a> | <a href="https://ui.threatstream.com/attackpattern/9671" target="_blank">[MITRE ATT&amp;CK] T1113 - Screen Capture</a> | <a href="https://ui.threatstream.com/attackpattern/9812" target="_blank">[MITRE ATT&amp;CK] T1219 - Remote Access Software</a> | <a href="https://ui.threatstream.com/attackpattern/9720" target="_blank">[MITRE ATT&amp;CK] T1571 - Non-Standard Port</a> | <a href="https://ui.threatstream.com/attackpattern/9607" target="_blank">[MITRE ATT&amp;CK] T1565.001 - Data Manipulation: Stored Data Manipulation</a> | <a href="https://ui.threatstream.com/attackpattern/10023" target="_blank">[MITRE ATT&amp;CK] T1496 - Resource Hijacking</a><br/> <b>Tags:</b> actor:Shadow Force, malware:Viticdoor, detection:Backdoor/Win.​​Viticdoor, malware-type:Backdoor, detection:CoinMiner/Win.ShadowForce, malware-type:Miner, target-country:South Korea, target-industry:Government, target-industry:Politics, target-industry:IT, target-industry:Food, target-industry:Outsourcing, file-type:EXE, file-type:DLL, target-system:Windows server, target-system:Windows</p> <h3 id="article-2"><a href="https://www.mandiant.com/resources/blog/cosmicenergy-ot-malware-russian-response" target="_blank">COSMICENERGY: New OT Malware Possibly Related To Russian Emergency Response Exercises</a></h3> <p>(published: May 25, 2023)</p> <p>Mandiant researchers have discovered a new malware called COSMICENERGY, specifically designed to target Windows-based operational technology (OT) systems used in electric power distribution. Similar to previously-discovered OT malware INDUSTROYER and INDUSTROYER.V2, COSMICENERGY interacts with IEC 60870-5-104 (IEC-104) devices, such as remote terminal units (RTUs), commonly found in Europe, the Middle East, and Asia. COSMICENERGY has two derivative disruption tools: PIEHOP and LIGHTWORK. PIEHOP is a Python-based disruption tool that connects to a remote MSSQL server to issue commands to an RTU, while LIGHTWORK is a C++ tool that uses the IEC-104 protocol to modify the state of RTUs over TCP, crafting configurable IEC-104 ASDU messages to control the state of RTU Information Object Addresses. The malware has been observed utilizing open-source libraries for OT protocol implementation, including IRONGATE, TRITON, and INCONTROLLER.<br/> <b>Analyst Comment:</b> Although COSMICENERGY has some signs of being a Russian red-team tool under development, threat actors regularly adapt and make use of legitimate tools. Network defenders should monitor logs on critical systems, look for execution of packaged Python scripts and creation of temporary “_MEIPASS” PyInstaller folder. Detect enablement and usage of SQL extended stored procedures for Windows shell command execution. Host-based indicators associated with COSMICENERGY are available in the Anomali platform for historical reference.<br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/attackpattern/9838" target="_blank">[MITRE ATT&amp;CK] T1140 - Deobfuscate/Decode Files Or Information</a> | <a href="https://ui.threatstream.com/attackpattern/17857" target="_blank">[MITRE ATT&amp;CK] T0807 - Command-Line Interface</a> | <a href="https://ui.threatstream.com/attackpattern/17862" target="_blank">[MITRE ATT&amp;CK] T0809 - Data Destruction</a> | <a href="https://ui.threatstream.com/attackpattern/17893" target="_blank">[MITRE ATT&amp;CK] T0831 - Manipulation Of Control</a> | <a href="https://ui.threatstream.com/attackpattern/17925" target="_blank">[MITRE ATT&amp;CK] T0855 - Unauthorized Command Message</a> | <a href="https://ui.threatstream.com/attackpattern/14432" target="_blank">[MITRE ATT&amp;CK] picus-security: The Most Used ATT&amp;CK Technique — T1059 Command and Scripting Interpreter</a> | <a href="https://ui.threatstream.com/attackpattern/9827" target="_blank">[MITRE ATT&amp;CK] T1059.006 - Command and Scripting Interpreter: Python</a> | <a href="https://ui.threatstream.com/attackpattern/9591" target="_blank">[MITRE ATT&amp;CK] T1027 - Obfuscated Files Or Information</a> | <a href="https://ui.threatstream.com/attackpattern/9767" target="_blank">[MITRE ATT&amp;CK] T1070 - Indicator Removal On Host</a> | <a href="https://ui.threatstream.com/attackpattern/9770" target="_blank">[MITRE ATT&amp;CK] T1070.004 - Indicator Removal on Host: File Deletion</a> | <a href="https://ui.threatstream.com/attackpattern/9863" target="_blank">[MITRE ATT&amp;CK] T1083 - File And Directory Discovery</a><br/> <b>Signatures:</b> <a href="https://ui.threatstream.com/signature/108148" target="_blank">PIEHOP - Yara by Mandiant</a> | <a href="https://ui.threatstream.com/signature/108150" target="_blank">LIGHTWORK - YARA by Mandiant</a>.<br/> <b>Tags:</b> malware:COSMICENERGY, malware:PIEHOP, malware:LIGHTWORK, malware-type:Disruption tool, abused:PyInstaller, abused:Python, abused:C++, abused:IRONGATE, abused:TRITON, abused:INCONTROLLER, file-type:EXE, abused:​​IEC-104, target-system:OT, target-system:Windows</p> <h3 id="article-3"><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/buhti-ransomware" target="_blank">Buhti: New Ransomware Operation Relies on Repurposed Payloads</a></h3> <p>(published: May 25, 2023)</p> <p>Buhti (Blacktail) is a relatively new ransomware operation targeting Windows and Linux systems with double-extortion attacks. The group is quick to utilize new exploits for initial access, it was seen abusing the vulnerability in PaperCut NG and MF (CVE-2023-27350) and IBM's Aspera Faspex file-exchange application (CVE-2022-47986). Bihti developed its own custom data exfiltration tool, but for crypters the group utilizes variants of the leaked LockBit and Babuk ransomware families.<br/> <b>Analyst Comment:</b> Keeping software updated with the latest security patches is critical for users and enterprises. This includes both the operating system and all applications being used. Make sure there is a security system in place that can proactively provide a comprehensive defense against attackers targeting new vulnerabilities. Host-based indicators associated with Buhti campaigns are available in the Anomali platform for ongoing infections and historical reference.<br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/attackpattern/10012" target="_blank">[MITRE ATT&amp;CK] T1190 - Exploit Public-Facing Application</a> | <a href="https://ui.threatstream.com/attackpattern/3708" target="_blank">[MITRE ATT&amp;CK] T1005: Data from Local System</a> | <a href="https://ui.threatstream.com/attackpattern/9638" target="_blank">[MITRE ATT&amp;CK] T1105 - Ingress Tool Transfer</a> | <a href="https://ui.threatstream.com/attackpattern/3714" target="_blank">[MITRE ATT&amp;CK] T1486: Data Encrypted for Impact</a><br/> <b>Tags:</b> malware:Buhti, malware:LockBit, malware:Babuk, malware-type:Ransomware, actor:Blacktail, actor:Buhti, malware-type:Exfiltration tool, malware:Cobalt Strike Beacon, malware:Meterpreter, malware:Cobalt Strike, malware:Sliver, abused:AnyDesk, abused:ConnectWise, target-software:PaperCut, vulnerability:CVE-2023-27350, target-software:Aspera Faspex, vulnerability:CVE-2022-47986, target-system:Windows, target-system:Linux</p> <h3 id="article-4"><a href="https://media.defense.gov/2023/May/24/2003229517/-1/-1/0/CSA_Living_off_the_Land.PDF" target="_blank">People's Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection</a></h3> <p>(published: May 24, 2023)</p> <p>International cybersecurity authorities (Australia, Canada, New Zealand, the UK, and the US) have issued a joint Cybersecurity Advisory regarding a recently-discovered activity attributed to the China-sponsored Volt Typhoon threat group. The group was targeting Windows-based systems across US critical infrastructure, while hiding behind previously-compromised small office/home office network devices in the geographic area of the target. The group primarily relied on Living off the Land: using built-in network administration tools such as netsh, ntdsutil, PowerShell, and Windows Management Instrumentation Command Line (WMIC). This allows Volt Typhoon to blend their activity while achieving objectives such as collecting information about the storage devices on the local host and exfiltrating password hashes from the main Active Directory database file. The actor has used several hacking tools: the Earthworm tunneling tool, custom Fast Reverse Proxy (FRP) clients, Impacket, Mimikatz, and various remote administration tools.<br/> <b>Analyst Comment:</b> Network defenders should detect suspicious commands and discern from legitimate system administration commands. Activities such as using port proxies are not common for legitimate system administration, and should have a limited use on the need-to basis. Use the available indicators and detection signatures to spot and investigate potentially-suspicious activity.<br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/attackpattern/10012" target="_blank">[MITRE ATT&amp;CK] T1190 - Exploit Public-Facing Application</a> | <a href="https://ui.threatstream.com/attackpattern/9800" target="_blank">[MITRE ATT&amp;CK] T1047 - Windows Management Instrumentation</a> | <a href="https://ui.threatstream.com/attackpattern/3712" target="_blank">[MITRE ATT&amp;CK] T1059.001: PowerShell</a> | <a href="https://ui.threatstream.com/attackpattern/10029" target="_blank">[MITRE ATT&amp;CK] T1059.003 - Command and Scripting Interpreter: Windows Command Shell</a> | <a href="https://ui.threatstream.com/attackpattern/9869" target="_blank">[MITRE ATT&amp;CK] T1505.003 - Server Software Component: Web Shell</a> | <a href="https://ui.threatstream.com/attackpattern/9586" target="_blank">[MITRE ATT&amp;CK] T1546 - Event Triggered Execution</a> | <a href="https://ui.threatstream.com/attackpattern/9768" target="_blank">[MITRE ATT&amp;CK] T1070.001 - Indicator Removal on Host: Clear Windows Event Logs</a> | <a href="https://ui.threatstream.com/attackpattern/9929" target="_blank">[MITRE ATT&amp;CK] T1003.003 - OS Credential Dumping: Ntds</a> | <a href="https://ui.threatstream.com/attackpattern/9857" target="_blank">[MITRE ATT&amp;CK] T1110 - Brute Force</a> | <a href="https://ui.threatstream.com/attackpattern/10006" target="_blank">[MITRE ATT&amp;CK] T1110.003 - Brute Force: Password Spraying</a> | <a href="https://ui.threatstream.com/attackpattern/9633" target="_blank">[MITRE ATT&amp;CK] T1003 - Os Credential Dumping</a> | <a href="https://ui.threatstream.com/attackpattern/9599" target="_blank">[MITRE ATT&amp;CK] T1555 - Credentials From Password Stores</a> | <a href="https://ui.threatstream.com/attackpattern/13021" target="_blank">[MITRE ATT&amp;CK] Picus: The System Information Discovery Technique Explained - MITRE ATT&amp;CK T1082</a> | <a href="https://ui.threatstream.com/attackpattern/9631" target="_blank">[MITRE ATT&amp;CK] T1033 - System Owner/User Discovery</a> | <a href="https://ui.threatstream.com/attackpattern/9709" target="_blank">[MITRE ATT&amp;CK] T1069.001 - Permission Groups Discovery: Local Groups</a> | <a href="https://ui.threatstream.com/attackpattern/9619" target="_blank">[MITRE ATT&amp;CK] T1069.002 - Permission Groups Discovery: Domain Groups</a> | <a href="https://ui.threatstream.com/attackpattern/9983" target="_blank">[MITRE ATT&amp;CK] T1016 - System Network Configuration Discovery</a> | <a href="https://ui.threatstream.com/attackpattern/9628" target="_blank">[MITRE ATT&amp;CK] T1090 - Proxy</a> | <a href="https://ui.threatstream.com/attackpattern/9734" target="_blank">[MITRE ATT&amp;CK] T1090.002 - Proxy: External Proxy</a><br/> <b>Signatures:</b> <a href="https://ui.threatstream.com/signature/108165" target="_blank">ShellJSP - YARA</a> | <a href="https://ui.threatstream.com/signature/108176" target="_blank">EncryptJSP - YARA</a> | <a href="https://ui.threatstream.com/signature/108177" target="_blank">Volt Typhoon's custom FRP tool - YARA</a> | <a href="https://ui.threatstream.com/signature/108178" target="_blank">HACKTOOL_FRPClient - YARA</a>.<br/> <b>Tags:</b> actor:Volt Typhoon, target-country:US, target-sector:Critical infrastructure, source-country:China, technique:Living off the Land, malware:Earthworm, malware:Fast Reverse Proxy, malware:FRP, malware-type:Tunneling, malware:Mimikatz, abused:netsh, abused:ntdsutil, abused:PowerShell, abused:wmic, abused:Impacket, open-port:8080, open-port:8443, open-port:8043, open-port:8000, open-port:10443, target-system:Windows</p> <h3 id="article-5"><a href="https://asec.ahnlab.com/en/53132/" target="_blank">Lazarus Group Targeting Windows IIS Web Servers</a></h3> <p>(published: May 23, 2023)</p> <p>Lazarus Group, a North Korea-sponsored actor group, has been detected targeting Windows Internet Information Services (IIS) web servers. After getting access to a misconfigured or vulnerable IIS server, the threat actor places a DLL side-loading triad (DAT, DLL, and EXE files) via the Windows IIS web server process, w3wp.exe. For the second stage, it side-loads additional malware (diagn.dll) by exploiting the open-source Color Picker Plugin, and decodes an infostealer that performs LSASS memory credential dumping. After acquiring the system credentials, Lazarus Group performed internal reconnaissance before utilizing Remote Desktop Protocol (port 3389) to perform lateral movement into the internal network.<br/> <b>Analyst Comment:</b> Network defenders are advised to monitor abnormal process execution relationships. Host-based indicators associated with the Lazarus Group IIS targeting are available in the Anomali platform for historical reference.<br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/attackpattern/10012" target="_blank">[MITRE ATT&amp;CK] T1190 - Exploit Public-Facing Application</a> | <a href="https://ui.threatstream.com/attackpattern/10104" target="_blank">[MITRE ATT&amp;CK] T1574.002 - Hijack Execution Flow: Dll Side-Loading</a> | <a href="https://ui.threatstream.com/attackpattern/9770" target="_blank">[MITRE ATT&amp;CK] T1070.004 - Indicator Removal on Host: File Deletion</a> | <a href="https://ui.threatstream.com/attackpattern/9808" target="_blank">[MITRE ATT&amp;CK] T1003.001 - OS Credential Dumping: Lsass Memory</a> | <a href="https://ui.threatstream.com/attackpattern/9591" target="_blank">[MITRE ATT&amp;CK] T1027 - Obfuscated Files Or Information</a> | <a href="https://ui.threatstream.com/attackpattern/9838" target="_blank">[MITRE ATT&amp;CK] T1140 - Deobfuscate/Decode Files Or Information</a><br/> <b>Tags:</b> mitre-group:Lazarus Group, detection:Trojan/Win.LazarLoader, target-software:IIS Web Server, abused:w3wp.exe, abused:Salsa20, open-port:3389, file-type:DLL, file-type:EXE, file-type:DAT, target-system:Windows</p> </div> </div>

Get the Latest Anomali Updates and Cybersecurity News – Straight To Your Inbox

Become a subscriber to the Anomali Newsletter
Receive a monthly summary of our latest threat intelligence content, research, news, events, and more.