September 17, 2019
-
Anomali Threat Research
,

Weekly Threat Briefing: Hackers Steal $4.2m From State Troopers' Pension Fund

<div id="weekly"><p id="intro">The intelligence in this week’s iteration discuss the following threats: <strong>LokiBot, Magecart, Nemty, NetWire, Purple Fox, Ryuk Ransomware, </strong>and<strong> WiryJMPer</strong>. The IOCs related to these stories are attached to the Community Threat Briefing and can be used to check your logs for potential malicious activity.</p><div id="trending-threats"><h2 id="trendingthreats">Trending Threats</h2><p><a href="https://www.zdnet.com/article/database-leaks-data-on-most-of-ecuadors-citizens-including-6-7-million-children/" target="_blank"><b>Database Leaks Data On Most of Ecuador's Citizens, Including 6.7 Million Children </b></a> (<i>September 16, 2019</i>)<br/> A database of approximately 20.8 million citizen records has been exposed via a misconfigured database, in one of the largest leaks in the country’s history. The database, held on an ElasticSearch server was discovered by researchers Noam Rotem and Ran Locar. The data contained included Dates of birth, Cedulas (national ID numbers), Education levels, Employment information, Home addresses, Marital status, Names, and Phone numbers. Information on families was also exposed including family relationships and 6.7 million records about children under the age of 18 that include addresses, cedulas, gender, names, and places of birth. After a week of being exposed, the database was finally secured after vpnMentor contacted the Ecuador Computer Emergency Response Team, who acted as an intermediary.<br/> <a href="https://forum.anomali.com/t/database-leaks-data-on-most-of-ecuadors-citizens-including-6-7-million-children/4178" target="_blank">Click here for Anomali recommendation</a><b> </b><br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/1259983">[MITRE PRE-ATT&amp;CK] Identify sensitive personnel information (PRE-T1051)</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-wiryjmper-dropper-hides-netwire-rat-payloads-in-plain-sight/" target="_blank"><b>New WiryJMPer Droppers Hides Netwire RAT Payloads in Plain Sight</b></a> (<i>September 12, 2019</i>)<br/> Avast researchers have identified a new malware dropper that infects systems with Netwire malware. Netwire is a Remote Access Trojan (RAT) that allows actors to remotely control their victims’ computers. The discovery was first made as researchers noticed a cryptocurrency wallet, specifically an ABBC Coin wallet, binary was three times the size of a regular wallet. Netwire infects the system while windows are shown in the foreground to distract the user. The malware adds a shortcut in attempt to gain persistence.<br/> <a href="https://forum.anomali.com/t/new-wiryjmper-droppers-hides-netwire-rat-payloads-in-plain-sight/4179" target="_blank">Click here for Anomali recommendation </a><br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/947079">[MITRE ATT&amp;CK] Screen Capture - T1113</a> | <a href="https://ui.threatstream.com/ttp/947139">[MITRE ATT&amp;CK] Remote Access Tools - T1219</a> | <a href="https://ui.threatstream.com/ttp/947211">[MITRE ATT&amp;CK] Registry Run Keys / Start Folder (T1060)</a></p><p><a href="https://www.bleepingcomputer.com/news/security/garmin-sa-shopping-portal-breach-leads-to-theft-of-payment-data/" target="_blank"><b>Garmin SA Shopping Portal Breach Leads to Theft of Payment Data</b></a> (<i>September 12, 2019</i>)<br/> Garmin Southern Africa, a satellite technology company, disclosed that their customer data has been breached. The customer data includes address, email addresses, first and last name, and payment information including card number, CVV code and expiration date. The cause of the breach hasn’t been suggested, however it could be a Magecart skimmer due to the site running on Magento CMS, a platform that has been compromised with Magecart skimmers in recent months.<br/> <a href="https://forum.anomali.com/t/garmin-sa-shopping-portal-breach-leads-to-theft-of-payment-data/4180" target="_blank">Click here for Anomali recommendation</a><b> </b><br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/1259983">[MITRE PRE-ATT&amp;CK] Identify sensitive personnel information (PRE-T1051)</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ryuk-related-malware-steals-confidential-military-financial-files/" target="_blank"><b>Ryuk Related Malware Steals Confidential Military, Financial Files</b></a> (<i>September 11, 2019</i>)<br/> The security researchers known as MalwareHunterTeam have identified a new malware that searches for sensitive files and uploads to an FTP site. The malware appears to be similar to the Ryuk Ransomware that encrypts victims’ files and demands a ransom. MalwareHunterTeam notes that the malware appears to make it seem like it is stealing files but likely does not actually do so. Targeting confidential financial, law enforcement and military files, the malware looks for files with document file extensions such as .doc and then compares the file name to a list of strings including words such as defence, military, undercover among others which are then uploaded to a server. While there are ties to Ryuk ransomware, such as code similarities, it is unknown if they are the same group or how the systems are being infected with the malware.<br/> <a href="https://forum.anomali.com/t/ryuk-related-malware-steals-confidential-military-financial-files/4181" target="_blank">Click here for Anomali recommendation</a><b> </b><br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/947224">[MITRE ATT&amp;CK] Exfiltration Over Alternative Protocol - T1048</a> | <a href="https://ui.threatstream.com/ttp/947195">[MITRE ATT&amp;CK] File and Directory Discovery - T1083</a> | <a href="https://ui.threatstream.com/ttp/947266">[MITRE ATT&amp;CK] Data Encrypted - T1022</a></p><p><a href="https://www.infosecurity-magazine.com/news/hackers-steal-from-pension-fund/" target="_blank"><b>Hackers Steal $4.2m From State Troopers' Pension Fund</b></a> (<i>September 9, 2019</i>)<br/> A pension fund for law enforcement officers of Oklahoma have had $4.2 million stolen from a fund of over $1 billion. Occuring on August 26, 2019, the email account of an investment manager working for the Oklahoma Law Enforcement Retirement System (OLERS) was breached. The fund handled the pensions and benefits for retired law enforcement officers, highway troopers, park rangers, and state agents. The FBI is investigating the incident and, as of this writing, $477,000 has been recovered so far.<br/> <a href="https://forum.anomali.com/t/hackers-steal-4-2m-from-state-troopers-pension-fund/4182" target="_blank">Click here for Anomali recommendation</a><b> </b></p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-teams-can-be-used-to-execute-arbitrary-payloads/" target="_blank"><b>Microsoft Teams Can Be Used To Execute Arbitrary Paylods</b></a> (<i>September 10, 2019</i>)<br/> Researcher Reegun Richard has a flaw that can allow actors to use binaries to execute malicious code using a fake installation folder. All that is needed is an executable and two folders that part of Microsoft Teams installation, inheriting trust of the signed executable any code placed in the folder will be deployed. Apps affected include those that use the Squirrel installation framework such as Discord, GitHub, Grammarly, Slack, and WhatsApp. While Microsoft are aware of the issue, they claim it “did not meet the bar of security issue”.<br/> <a href="https://forum.anomali.com/t/microsoft-teams-can-be-used-to-execute-arbitrary-paylods/4183" target="_blank">Click here for Anomali recommendation</a><b> </b><br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/2402693">[MITRE PRE-ATT&amp;CK] Identify vulnerabilities in third-party software libraries - T1389</a> | <a href="https://ui.threatstream.com/ttp/947138">[MITRE ATT&amp;CK] Exploit Public-Facing Application - T1190</a></p><p><a href="https://www.bleepingcomputer.com/news/security/lokibot-info-stealer-used-in-spear-phishing-attack-on-us-company/" target="_blank"><b>LokiBot Info-Stealer Used in Spearphishing Attack on US Company</b></a> (<i>September 10, 2019</i>)<br/> Researchers with the FortiGuard SE Team have identified a malspam campaign that is distributing LokiBot via phishing messages. The campaign is targeting employees of a large US manufacturing company with an email attachment, which if downloaded will infect the user with malware. Stealing information from the company including credentials, and passwords the malware then relays the information back to the Command &amp; Control server via an HTTP POST request.<br/> <a href="https://forum.anomali.com/t/lokibot-info-stealer-used-in-spearphishing-attack-on-us-company/4184" target="_blank">Click here for Anomali recommendation </a><br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/947087">[MITRE ATT&amp;CK] Credential Dumping - T1003</a> | <a href="https://ui.threatstream.com/ttp/947180">[MITRE ATT&amp;CK] Spearphishing Attachment - T1193</a> | <a href="https://ui.threatstream.com/ttp/947291">[MITRE ATT&amp;CK] Commonly Used Port - T1043</a> | <a href="https://ui.threatstream.com/ttp/947126">[MITRE ATT&amp;CK] Standard Application Layer Protocol - T1071</a> | <a href="https://ui.threatstream.com/ttp/947205">[MITRE ATT&amp;CK] User Execution - T1204</a> | <a href="https://ui.threatstream.com/ttp/947164">[MITRE ATT&amp;CK] File Deletion - T1107</a> | <a href="https://ui.threatstream.com/ttp/947268">[MITRE ATT&amp;CK] Hidden Files and Directories - T1158</a> | <a href="https://ui.threatstream.com/ttp/1946">Data Compressed (MITRE ATT&amp;CK T1002)</a></p><p><a href="https://blog.trendmicro.com/trendlabs-security-intelligence/purple-fox-fileless-malware-with-rookit-component-delivered-by-rig-exploit-kit-now-abuses-powershell/" target="_blank"><b>‘Purple Fox’ Fileless Malware with Rootkit Component Delivered by Rig Exploit Kit Now Abuses Powershell</b></a> (<i>September 9, 2019</i>)<br/> A new version of ‘Purple Fox’, a downloader malware that delivers cryptocurrency miners, has been discovered abusing PowerShell for fileless infection. The actors abuse vulnerabilities in VBScripts’ engine so that an .hta file redirects to use a malicious PowerShell script. The script posing as an image file then exploits vulnerabilities to escalate privileges and install the main malware component. The payload, an msi file with encrypted shellcode, restarts the system and renames its components and using its rootkit capabilities to hide and protect files and registry entries to make it more difficult for the malware to be reversed.<br/> <a href="https://forum.anomali.com/t/purple-fox-fileless-malware-with-rootkit-component-delivered-by-rig-exploit-kit-now-abuses-powershell/4185" target="_blank">Click here for Anomali recommendation</a><b> </b><br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/947232">[MITRE ATT&amp;CK] DLL Side-Loading - T1073</a> | <a href="https://ui.threatstream.com/ttp/947166">[MITRE ATT&amp;CK] Modify Registry - T1112</a> | <a href="https://ui.threatstream.com/ttp/947287">[MITRE ATT&amp;CK] PowerShell - T1086</a> | <a href="https://ui.threatstream.com/ttp/947092">[MITRE ATT&amp;CK] Rootkit - T1014</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fake-paypal-site-spreads-nemty-ransomware/" target="_blank"><b>Fake PayPal Site Spreads Nemty Ransomware</b></a> (<i>September 8, 2019</i>)<br/> A new variant of the “Nemty” ransomware is being spread to users from a fake PayPal website. The Nemty ransomware drops a ransom note to victims demanding around $1,000, with the ability to collect users’ computer ID, computer name, operating system, and username. Pretending to be the PayPal website, the fake page advertises a return on payments made through the system of around 3-5%, with an executable containing the ransomware should users click to download. Using homograph domain spoofing, the actors are able to spoof links for various links on the fake website, making it look like the legitimate PayPal website.<br/> <a href="https://forum.anomali.com/t/fake-paypal-site-spreads-nemty-ransomware/4186" target="_blank">Click here for Anomali recommendation</a><b> </b><br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/947106">[MITRE ATT&amp;CK] Spearphishing Link - T1192</a> | <a href="https://ui.threatstream.com/ttp/947205">[MITRE ATT&amp;CK] User Execution - T1204</a> | <a href="https://ui.threatstream.com/ttp/947203">[MITRE ATT&amp;CK] Web Service - T1102</a> | <a href="https://ui.threatstream.com/ttp/1260045">[MITRE PRE-ATT&amp;CK] Upload, install, and configure software/tools (PRE-T1139)</a> | <a href="https://ui.threatstream.com/ttp/947266">[MITRE ATT&amp;CK] Data Encrypted - T1022</a></p></div></div>

Get the Latest Anomali Updates and Cybersecurity News – Straight To Your Inbox

Become a subscriber to the Anomali Newsletter
Receive a monthly summary of our latest threat intelligence content, research, news, events, and more.