January 3, 2017
Anomali Threat Research

Anomali Weekly Threat Intelligence Briefing - January 2, 2017

<p><b>Figure 1: IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed.</b></p><h2>Trending Threats</h2><p>This section provide summaries and links to the top threat intelligence stories from this past week. All IOCs from these stories are attached to this threat briefing and can be used for indicator matching against your logs.</p><p><a href="https://www.us-cert.gov/security-publications/GRIZZLY-STEPPE-Russian-Malicious-Cyber-Activity" target="_blank"><b>US-CERT: GRIZZLY STEPPE – Russian Malicious Cyber Activity</b></a> (<i>December 29, 2016</i>)<br/> US-CERT released technical indicators related to recent Russian Intelligence Services cyber operations. The report includes a mix of IoCs ranging from Tor Exit nodes, Russian APT C2s, openly-available malware and webshells, and crimeware. These threats appear to be from multiple different cyber operator groups. The report insinuates that the different groups are working at the behest of the Russian government. The US-CERT report also include a well thought out set of general security recommendations that all organizations should implement to improve their security posture.<br/> <b>Recommendation:</b> Search your logs for these IoCs, and perform a full forensic analysis of any host found to be communicating with them.<br/> <b>Tags:</b> Fancy Bear, Sofacy, Grizzly Steppe</p><p><a href="https://www.whitehouse.gov/the-press-office/2016/12/29/fact-sheet-actions-response-russian-malicious-cyber-activity-and" target="_blank"><b>Whitehouse: FACT SHEET: Actions in Response to Russian Malicious Cyber Activity and Harassment</b></a> (<i>December 29, 2016</i>)<br/> The United States of America's Whitehouse issued a press release summarizing sanctions against Russia for the harrassment of diplomatic personnel and cyber operations surrounding the US 2016 Election. The sanctions are focused on officer personnel of the GRU. Included in the release are sanctions against two unrelated cybercriminals that reside in the Black Sea region of Russia.<br/> <b>Tags:</b> Fancy Bear, Sofacy, Grizzly Steppe</p><p><a href="https://securelist.com/blog/mobile/76969/switcher-android-joins-the-attack-the-router-club/" target="_blank"><b>Switcher: Android joins the 'attack-the-router' club</b></a> (<i>December 28, 2016</i>)<br/> The Switcher trojan compromises Android OS hosts in order to ultimately compromise the local wifi network that Android OS host is using. The Switcher trojan is focused on modifying the DNS settings of the local area network, in order to hijack traffic for malicious purposes. The local area network's routers are compromised via weak default passwords in a known dictionary. This allows the malicious actors to redirect all traffic from all hosts using that local area network's DNS settings.<br/> <b>Recommendation:</b> Change the default passwords of your local area network routers, and check the DNS settings of hosts fror the related IOCS<br/> <b>Tags:</b> Switcher, APK, Android</p><p><a href="http://blog.trendmicro.com/trendlabs-security-intelligence/updated-sundown-exploit-kit-uses-steganography/" target="_blank"><b>Sundown Exploit Kit Adds Steganography to Playbook</b></a> (<i>December 29, 2016</i>)<br/> In an interesting turn of events, Trend Micro recently observed Sundown using a cryptographic technique known as steganography - the inclusion of data hidden in image files. The PNG files weren’t just used to store harvested information; the malware designers now used steganography to hide their exploit code. This was largely unexpected as the Sundown Exploit Kit (EK) has been rather lazy - copying techniques from existing EKs, and forgoing sophisticated evasion tactics.<br/> <b>Recommendation:</b> implement an organization wide patch update program for Flash player, or remove the Flash player software.<br/> <b>Tags:</b> Sundown, Exploit-Kit, Steganography</p><p><a href="http://blog.trendmicro.com/trendlabs-security-intelligence/recent-spam-runs-in-germany-show-how-threats-intend-to-stay-in-the-game/" target="_blank"><b>Surge in ransomware targeting Germany - GoldenEye, Cerber, Locky</b></a> (<i>December 29, 2016</i>)<br/> In December, GoldenEye ransomware was observed by Trend Micro targeting German-speaking usersand human resource (HR) departments. GoldenEye, just a relabeled hybrid of the Petya and Mischa ransomwares, not only kept to the James Bond theme of its earlier iteration, but also its attack vector. Apart from GoldenEye, Trend Micro also saw spam runs and observed a surge in detections of Cerber, Petya, and Locky in Germany. The social lures of these malware may be German, but the risks and impact are the same for everyone<br/> <b>Recommendation:</b> Using a network sandbox based IDS can enable early detection of the malicious PDFs and Office Macros used to retreive much malware.<br/> <b>Tags:</b> Ransomware, GoldenEye, Cerber, Petya, Locky, Germany</p><p><a href="http://researchcenter.paloaltonetworks.com/2016/12/unit42-campaign-evolution-pseudo-darkleech-2016/" target="_blank"><b>Campaign Evolution: pseudo-Darkleech in 2016</b></a> (<i>December 30, 2016</i>)<br/> The Darkleech campaigns have evolved since 2012 to become the Psuedo-Darkleech campaigns. These campaigns have used many exploit kits including the AnglerEK, NeutrinoEK, and RigEK. The psuedo-Darkleech campaigns are currently delivering ransomware, including Cerber most recently.<br/> <b>Recommendation:</b> disable javascript in browsers when possible, ensure browsers are patched.<br/> <b>Tags:</b> psuedo-darkleech, cerber, rigEK, Neutrino EK, Angler EK</p><h2>Observed Threats</h2><p>This section includes the top threats observed from the Anomali Community user base as well as sensors deployed by Anomali Labs.</p><p><a href="https://ui.threatstream.com/tip/6699" target="_blank"><b>NJRat Tool TIP</b></a><br/> NJrat is a widely available Remote Access Tool. The tool was originally developed in 2013 by a freelance coder with the alias of `njq8`. NJRat is commonly used as general spyware and to facilitate computer intrusions. NJRAT is often delivered via drive-by downloads and phishing emails. NJRat is most commonly used to target organizations in the middle east.<br/> <b>Tags:</b> njrat, Remote Access Tool, RAT</p>

Get the Latest Anomali Updates and Cybersecurity News – Straight To Your Inbox

Become a subscriber to the Anomali Newsletter
Receive a monthly summary of our latest threat intelligence content, research, news, events, and more.