March 12, 2019
-
Anomali Threat Research
,

Weekly Threat Briefing: Email Verification Service Takes Itself Offline After 800 Million Records Get Publicly Exposed

<p>This section listed below contains summaries on various threat intelligence stories that occurred during the past week. The intelligence in this week’s iteration discuss the following threats: <b>APT40, Backdoor, Chafer, Data breach, IRIDIUM, Phishing, Malware, RATs, Ransomware, Vulnerabilities</b> and <b>Whitefly</b>. The IOCs related to these stories are attached to the Community Threat Briefing and can be used to check your logs for potential malicious activity.</p><h2>Trending Threats</h2><p><a href="https://www.infosecurity-magazine.com/news/iranian-group-stole-6tbs-of-data-1/" target="_blank"><b>Iranian Group Stole 6TBs of data from Citrix </b></a> (<i>March 11, 2019</i>)<br/> "IRIDIUM," an Iranian-related threat group has been attributed to a cyber espionage campaign against governmental organisations, oil and gas, and technology sectors that resulted in 6 terabytes (TB) of data being stolen from the software company, "Citrix." According to researchers from the company, "Resecurity," the attack occurred around Christmas 2018 and used "proprietary techniques designed to bypass two-factor authentication systems, and methods to access VPNs and single sign-on (SSO)." Information stolen includes e-mail correspondence, files in network shares, and other services used for project management and procurement.<br/> <a href="https://forum.anomali.com/t/iranian-group-stole-6tbs-of-data-from-citrix/3625" target="_blank">Click here for Anomali recommendation</a><br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/947227">[MITRE ATT&amp;CK] Brute Force (T1110)</a></p><p><a href="https://www.bleepingcomputer.com/news/security/stop-ransomware-installing-password-stealing-trojans-on-victims/" target="_blank"><b>STOP Ransomware Installing Password Stealing Trojans on Victims </b></a> (<i>March 10, 2019</i>)<br/> The ransomware family, "STOP," has been seen to have added more capabilities to its most recent variant that now also installs the "AZORult" password-stealing trojan onto the victim's computer to steal account credentials, cryptocurrency wallets, desktop files, amongst others. The ransomware is distributed by a fake software update with a Windows Update screen pop-up appearing, whilst it disables Windows Defender and blocks access to security sites.<br/> <a href="https://forum.anomali.com/t/stop-ransomware-installing-password-stealing-trojans-on-victims/3626" target="_blank">Click here for Anomali recommendation</a></p><p><a href="https://www.itpro.co.uk/security/33179/email-verification-service-takes-itself-offline-after-800-million-records-get" target="_blank"><b>Email Verification Service Takes Itself Offline After 800 Million Records Get Publicly Exposed </b></a> (<i>March 8, 2019</i>)<br/> Researchers Bob Diachenko and Vinny Troya discovered a MongoDB database containing over 800 million records that was not password-protected but publicly accessible over the internet. The database, owned by email verification company "Verifications.io," contained information including email addresses, names, phone numbers, as well as individuals' city, date of birth, and gender. These records appear to be unique records that have not been leaked from previous breaches, according to the website "HaveIBeenPwned." Researchers contacted the company who then took the database offline on March 7, 2019.<br/> <a href="https://forum.anomali.com/t/email-verification-service-takes-itself-offline-after-800-million-records-get-publicly-exposed/3627" target="_blank">Click here for Anomali recommendation</a></p><p><a href="https://blog.trendmicro.com/trendlabs-security-intelligence/new-slub-backdoor-uses-github-communicates-via-slack/" target="_blank"><b>New SLUB Backdoor Uses GitHub, Communicates via Slack </b></a> (<i>March 7, 2019</i>)<br/> A watering hole attack has been observed by Trend Micro researchers that exploits a VBScript engine vulnerability, registered as "CVE-2018-8174," to infect users with the backdoor "SLUB." If the user is infected, a multi-stage infection process begins to initially check what antivirus software is running on the machine, and will exit the process if it finds the machine has one of the seven antivirus processes. If not, the downloader tries to exploit the Windows vulnerability, "CVE-2015-1701," to obtain local privilege escalation. The final payload installed is the "SLUB" backdoor which uses both Slack and Github to communicate with the Command and Control (C2) server and receive commands.<br/> <a href="https://forum.anomali.com/t/new-slub-backdoor-uses-github-communicates-via-slack/3628" target="_blank">Click here for Anomali recommendation</a><br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/947233">[MITRE ATT&amp;CK] Exploitation for Privilege Escalation (T1068)</a> | <a href="https://ui.threatstream.com/ttp/947139">[MITRE ATT&amp;CK] Remote Access Tools (T1219)</a> | <a href="https://ui.threatstream.com/ttp/947267">[MITRE ATT&amp;CK] Drive-by Compromise (T1189)</a></p><p><a href="https://blog.yoroi.company/research/op-pistacchietto-an-italian-job/" target="_blank"><b>Op. "Pistacchietto": An Italian Job</b></a> (<i>March 6, 2019</i>)<br/> Yoroi researchers observed a new campaign, dubbed "Operation Pistacchietto," targeting organisations in Italy with multiple specific malwares. The campaign begins as a fake Java page that requests the user update their Java version to continuing surfing the internet. It provides a link to the "update" that downloads a .bat file, and begins to install malicious code. The malicious script is made up of two parts: the first part fools users into allowing the code administrative privileges, whilst the second part downloads additional components and obtains persistence by using the Windows Task Scheduler. Before the second part of the script downloads additional components, it checks the machine's architecture to download the correct backdoor malware for the machine. The malicious file is able to bypass antivirus detection because the signature changes every time. On top of installing a backdoor specific to the machine's operating system, the malware is able to install the Android Remote Access Trojan (RAT) "AhMyth Android Rat" if it determines it is on an Android mobile.<br/> <a href="https://forum.anomali.com/t/op-pistacchietto-an-italian-job/3629" target="_blank">Click here for Anomali recommendation</a><br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/947139">[MITRE ATT&amp;CK] Remote Access Tools (T1219)</a> | <a href="https://ui.threatstream.com/ttp/947106">[MITRE ATT&amp;CK] Spearphishing Link (T1192)</a> | <a href="https://ui.threatstream.com/ttp/947127">[MITRE ATT&amp;CK] Scheduled Task (T1053)</a></p><p><a href="https://myonlinesecurity.co.uk/fake-dun-bradstreet-company-complaint-delivers-trickbot/" target="_blank"><b>Fake Dun &amp; Bradstreet Company Complaint Delivers Trickbot </b></a> (<i>March 6, 2019</i>)<br/> A phishing email has been observed to be targeting users by masquerading as a company complaint email from "Dun and Bradstreet," a commercial data and analytics organisation, to install the Trickbot banking trojan. The email is from "service@dnbcomplaint.com" which is a typosquatted email address to trick users into opening the email attachment and enable macros in the document. If a user enables macros, the malware will drop several .bat files into the temp folder on a user' machine than renames the "bitsadmin.exe" to "ld0CIC0.exe" to bypass security software detection. The malware then calls out to a specified download site then downloads multiple binary files that create the full Trickbot payload to install on the infected machine.<br/> <a href="https://forum.anomali.com/t/fake-dun-bradstreet-company-complaint-delivers-trickbot/3630" target="_blank">Click here for Anomali recommendation</a><br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/947180">[MITRE ATT&amp;CK] Spearphishing Attachment (T1193)</a></p><p><a href="https://www.symantec.com/blogs/threat-intelligence/whitefly-espionage-singapore" target="_blank"><b>Whitefly: Espionage Group has Singapore in Its Sights </b></a> (<i>March 6, 2019</i>)<br/> A threat group called "Whitefly," has been attributed to the July 2018 breach of the Singaporean company, "SingHealth," and is suspected to continuously be conducting attacks against organisations based in Singapore, according to Symantec researchers. The group uses spear phishing emails as the initial infection vector that contain malicious images or documents that pretend to be relevant to the user's organisation to increase the likelihood of it being opened. If opened, a trojan is downloaded onto the machine to obtain privilege escalation, and then contacts the Command and Control (C2) server. The C2 sends information to download additional malicious tools such as Mimikatz, a custom-made malware to facilitate information stealing, and open-source tool "Termite," which allows Whitefly the ability to conduct more complex actions such as controlling multiple compromised machines at a time. The threat group is believed to be sophisticated because of the ability to maintain presence on a network for a long time before discovery.<br/> <a href="https://forum.anomali.com/t/whitefly-espionage-group-has-singapore-in-its-sights/3631" target="_blank">Click here for Anomali recommendation</a><br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/947180">[MITRE ATT&amp;CK] Spearphishing Attachment (T1193)</a> | <a href="https://ui.threatstream.com/ttp/947241">[MITRE ATT&amp;CK] Credentials in Files (T1081)</a></p><p><a href="https://blog.malwarebytes.com/threat-analysis/2019/03/spotlight-troldesh-ransomware-aka-shade/" target="_blank"><b>Spotlight on Troldesh Ransomware, aka ‘Shade'</b></a> (<i>March 6, 2019</i>)<br/> According to researchers from Malwarebytes, the ransomware "Troldesh," (also known as Shade) has had an uptick of infections in the past few months. The malware is typically distributed through phishing emails containing malicious .zip file attachments and targets Windows OS machines. The email frequently states that the attachment should be opened quickly and unzipped. If the target follows those directions, the malicious payload is then downloaded onto the machine from compromised Content Management System (CMS) websites. Troldesh is believed to be of Russian origin because the ransom note is in both Russian and English, and requires the victim to email a given address for further information to retrieve their files back.<br/> <a href="https://forum.anomali.com/t/spotlight-on-troldesh-ransomware-aka-shade/3632" target="_blank">Click here for Anomali recommendation</a><br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/947180">[MITRE ATT&amp;CK] Spearphishing Attachment (T1193)</a></p><p><a href="https://thehackernews.com/2019/03/update-google-chrome-hack.html" target="_blank"><b>New Google Chrome Zero-Day Vulnerability Found Actively Exploited in the Wild </b></a> (<i>March 6, 2019</i>)<br/> Clement Lecigne, a security researcher from Google's Threat Analysis Group, discovered a high-severity vulnerability, registered as "CVE-2019-5786," in Google Chrome. This vulnerability could allow a remote threat actor to execute arbitrary code and obtain full control over a vulnerable machine. The vulnerability affects the Chrome web browsing software for the operating systems Microsoft Windows, Apple macOS, and Linux, and it is a use-after-free flaw in the "FileReader" component of Google Chrome. A threat actor could exploit this vulnerability by tricking a user into opening or accessing a specially-crafted webpage, and has been observed to be exploited in the wild.<br/> <a href="https://forum.anomali.com/t/new-google-chrome-zero-day-vulnerability-found-actively-exploited-in-the-wild/3633" target="_blank">Click here for Anomali recommendation</a></p><p><a href="https://www.crowdstrike.com/blog/pinchy-spider-adopts-big-game-hunting/" target="_blank"><b>PINCHY SPIDER Affiliates Adopt "Big Game Hunting" Tactics to Distribute GandCrab Ransomware</b></a> (<i>March 6, 2019</i>)<br/> "PINCHY SPIDER," the developers behind the popular ransomware, "GandCrab," have been observed to deploy GandCrab in enterprise networks, utilising lateral movement and toolsets commonly associated with nation-related threat groups, in ransomware deployments known as "big game hunting." According to CrowdStrike, PINCHY SPIDER sells GandCrab to others in criminal forums, and has been consistently updating their ransomware capabilities due to the cybersecurity world developing decryptor tools and mitigations for GandCrab. The threat group was found to be recruiting for people who had remote desktop protocol (RDP) and VNC (Virtual Network Computing) skills, as well as have experience in corporate networking.<br/> <a href="https://forum.anomali.com/t/pinchy-spider-affiliates-adopt-big-game-hunting-tactics-to-distribute-gandcrab-ransomware/3634" target="_blank">Click here for Anomali recommendation</a></p><p><a href="https://www.fireeye.com/blog/threat-research/2019/03/apt40-examining-a-china-nexus-espionage-actor.html" target="_blank"><b>APT40: Examining a China-Nexus Espionage Actor </b></a> (<i>March 4, 2019</i>)<br/> A new Advanced Persistent Threat (APT) group "APT40," has been announced by researchers from FireEye that are tied to a 2016 campaign that targeted defence, education, engineering, maritime, and transportation infrastructure. The APT group specifically targeted multiple countries including Belgium, Cambodia, Germany, Hong Kong, Malaysia, Norway, Philippines, Saudi Arabia, Switzerland, the United States, and the United Kingdom. APT40 was observed masquerading as an Unmanned Underwater Vehicle (UUV) manufacturer and attempted to illicitly acquire information and technology to help further advance China's naval capabilities. APT40 utilises web server exploitation, registered vulnerabilities, and malicious phishing documents, amongst other tactics, to get into a network and then use a variety of malware to conduct reconnaissance, escalate privileges, establish a foothold, and exfiltrate information back to the APT group.<br/> <a href="https://forum.anomali.com/t/apt40-examining-a-china-nexus-espionage-actor/3635" target="_blank">Click here for Anomali recommendation</a><br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/947180">[MITRE ATT&amp;CK] Spearphishing Attachment (T1193)</a> | <a href="https://ui.threatstream.com/ttp/947203">[MITRE ATT&amp;CK] Web Service (T1102)</a> | <a href="https://ui.threatstream.com/ttp/947233">[MITRE ATT&amp;CK] Exploitation for Privilege Escalation (T1068)</a></p><p><a href="https://unit42.paloaltonetworks.com/new-python-based-payload-mechaflounder-used-by-chafer/" target="_blank"><b>New Python-based Payload MechaFlounder Used by Chafer </b></a> (<i>March 4, 2019</i>)<br/> The threat group, "Chafer," has been observed targeting Turkish government institutions and attempting to install a Python-based trojan, dubbed "MechaFlounder," according Palo Alto Networks researchers. Although the initial infection vector is unclear to researchers, users somehow download a file that initiates the payload to begin installation. MechaFlounder functions as a backdoor that allows the threat group to upload and download files remotely on a machine, as well as run other commands onto an infected machine received via the Command and Control (C2) server. This new malware appears to have been developed with both custom code and code snippets that are available via open-source.<br/> <a href="https://forum.anomali.com/t/new-python-based-payload-mechaflounder-used-by-chafer/3636" target="_blank">Click here for Anomali recommendation</a><br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/947139">[MITRE ATT&amp;CK] Remote Access Tools (T1219)</a></p><p><a href="https://blog.trendmicro.com/trendlabs-security-intelligence/fileless-banking-trojan-targeting-brazilian-banks-downloads-possible-botnet-capability-info-stealers/" target="_blank"><b>Fileless Banking Trojan Targeting Brazilian Banks Downloads Possible Botnet Capability, Info Stealers</b></a> (<i>March 4, 2019</i>)<br/> Researchers from Trend Micro observed a fileless malware that installed a banking trojan and information stealer into machines that are related to the Brazilian banks Banco Bradesco, Banco do Brasil, and Sicredi. Once the first trojan infects a machine, it downloads and executes PowerShell codes which drops .LNK files into the Startup folder of the machine and forces the machine to restart. This triggers a lock screen to appear after reboot that looks like a legitimate logon screen but is actually malicious. The objective of the lock screen is to fool the user into entering their system username and password. The malware then sends the obtained credential information to the threat actor's Command and Control (C2) server. A second trojan is then initiated that attempts to open Microsoft Outlook and obtain any email addresses stored in it, although if Outlook is not on the machine, it skips that step. The "RADMIN" malware is also installed onto the machine to obtain administrative privileges and monitor screen activity of the user, as well as spread within the network. The final payload installed is a banking trojan. The largest infections were observed in Brazil and Taiwan.<br/> <a href="https://forum.anomali.com/t/fileless-banking-trojan-targeting-brazilian-banks-downloads-possible-botnet-capability-info-stealers/3637" target="_blank">Click here for Anomali recommendation</a><br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/947139">[MITRE ATT&amp;CK] Remote Access Tools (T1219)</a> | <a href="https://ui.threatstream.com/ttp/947211">[MITRE ATT&amp;CK] Registry Run Keys / Start Folder (T1060)</a></p>

Get the Latest Anomali Updates and Cybersecurity News – Straight To Your Inbox

Become a subscriber to the Anomali Newsletter
Receive a monthly summary of our latest threat intelligence content, research, news, events, and more.