WTB: Millions Exposed in Desjardins Data Leak

Weekly Threat Briefing: Millions Exposed in Desjardins Data Leak

June 25, 2019 | Anomali Labs

This section listed below contains summaries on various threat intelligence stories that occurred during the past week. The intelligence in this week’s iteration discuss the following threats: BlueKeep, Cryptominers, FlawedAmmyy Trojan, Sodinokibi, and TA505. The IOCs related to these stories are attached to the Community Threat Briefing and can be used to check your logs for potential malicious activity.

Trending Threats

Sodinokibi Ransomware Spreads Wide via Hacked MSPs, Sites and Spam (June 21, 2019)
In a new round of attacks, Managed Service Providers (MSPs) are being attacked to distribute “Sodinokibi” ransomware. In gaining remote access to MSPs, threat actors were able to push Sodinokibi to the endpoints using the MSPs Webroot Management Console. Once the user runs the malicious code, their files are encrypted and a ransom is demanded to unencrypt the files. In another attempt to spread the ransomware, “WinRar Italy,” was compromised so users would download Sodinokibi instead of the legitimate software. Webroot logged all customers out of their consoles and have enabled mandatory two-factor authentication in response to the attacks.
MITRE ATT&CK: [MITRE ATT&CK] PowerShell - T1086 | [MITRE ATT&CK] Remote Access Tools - T1219 | [MITRE ATT&CK] Web Service - T1102

OEM Software Puts Multiple Laptops At Risk (June 21, 2019)
Researchers at SafeBreach Labs have identified a vulnerability in Dell’s “SupportAssist” software that is preinstalled on millions of Dell laptops and PCs to carry out health checks. The vulnerability, “CVE-2019-12280,” can allow an actor to escalate privileges and achieve persistence on an affected machine. Due to how .dll files are loaded by the software, malicious DLLs could be placed in specific directories, enabling an attacker to gain complete control of a system. SupportAssist is maintained by PC Doctor, which also provide tools for other Windows computers. This means that more computers could be at risk that are not Dell. The vulnerability was reported to Dell on April 29th by SafeBreach, with Dell reporting it to PC Doctor, who released fixes on May 28th.
Click here for Anomali recommendation
MITRE ATT&CK: [MITRE ATT&CK] Remote Access Tools - T1219 | [MITRE ATT&CK] System Information Discovery - T1082

Microsoft Warns of Campaign Dropping FlawedAmmyy RAT in Memory (June 21, 2019)
Microsoft have issued a warning about an active campaign targeting South Koreans with FlawedAmmyy Remote Access Trojan (RAT). FlawedAmmyy is a RAT, used frequently by threat group TA505 within spam campaigns. Using a spam email, the actors try to convince users to open an excel file that runs a Macrosoft function along with an executable in memory. This executable downloads another malware straight into the computer’s memory. The vulnerability, registered as CVE-2917-11882, was previously patched two years ago, however unpatched systems are still being targeted by threat actors.
Click here for Anomali recommendation
MITRE ATT&CK: [MITRE ATT&CK] PowerShell - T1086 | [MITRE ATT&CK] Remote Access Tools - T1219 | [MITRE ATT&CK] Spearphishing Attachment - T1193

LoudMiner Cryptomining Malware Targets Powerful Audio Creation PCs (June 21, 2019)
Researchers at ESET have identified a cryptocurrency miner, named “LoudMiner”, that uses virtual machines to run on Windows and macOS. The malware, which is based on the “XMRig” miner, is spreading through a website containing cracked (free/illegal) copies of Virtual Studio Technology (VST) software. Machines running VST software are targeted due to the high CPU usage needed to run the software, and for the malware to run without being immediately suspicious. Using a virtual machine, a Linux XMRig cryptominer is run on infected machines to steal cryptocurrency.
Click here for Anomali recommendation
MITRE ATT&CK: [MITRE ATT&CK] User Execution - T1204 | [MITRE PRE-ATT&CK] Upload, install, and configure software/tools (PRE-T1139)

Cryptocurrency-Mining Botnet Malware Arrives Through ADB and Spreads Through SSH (June 20, 2019)
Trend Micro researchers have identified a new cryptominer botnet malware that uses open Android Debug Bridge (Android Debug Bridge) ports and spreads through SSH. As ADB doesn’t have authentication by default, the malware is able to infect the system and spread to any other system that has had an SSH connection with the host. Using the ADB command line, the payload is downloaded, with the commands deleted, along with downloaded files to remove any trace of the attack. The malware searches for known hosts to further infect more systems with the malware due to the mechanism that saves systems that have communicated through SSH as known hosts.
Click here for Anomali recommendation
MITRE ATT&CK: [MITRE ATT&CK] Exfiltration Over Alternative Protocol - T1048 | [MITRE ATT&CK] File Deletion - T1107 | [MITRE ATT&CK] Obfuscated Files or Information - T1027 | [MITRE PRE-ATT&CK] Upload, install, and configure software/tools (PRE-T1139)

Millions Exposed in Desjardins Data Leak (June 20, 2019)
In one of Canada’s largest data breaches, 2.9 million credit union members of Desjardins Group had their Personally Identifiable Information (PII) leaked. Starting in late 2018, a police investigation was launched following a suspicious transaction, which led to the police notifying Desjardins on June 14 about the extent of the breach. The leaked information, which included addresses, birthdates, banking habits, email addresses, phone numbers, names, social security numbers, was the result of an employee acting illegally. Following the leak, Desjardins conducted their own investigation that resulted in firing the employee and tightening security.
Click here for Anomali recommendation
MITRE ATT&CK: [MITRE PRE-ATT&CK] Identify sensitive personnel information (PRE-T1051)

Cryptomining Dropper and Cronjob Creator (June 19, 2019)
A cryptomining dropper malware has been reported on by Sucuri researchers after receiving information from an unknown individual who had discovered a process running on their web server. Using a Bash script on the server, threat actors are able to download the cryptominer to the victims’ systems; as of this writing, it is unknown how actors initially compromised the servers however it is likely through an unpatched vulnerability, brute force or phishing for admin credentials. The Bash script looks for any other cryptomining processes that are already running, kills any it finds, and subsequently downloads the cryptominer. The payload and configuration file are deleted to hide the miner’s presence. To gain persistence, a cron job runs every minute to checking for the Bash script, downloading and executing again if it has been removed. This enables the malware to reinfect the host when all malicious files have been removed.
Click here for Anomali recommendation
MITRE ATT&CK: [MITRE ATT&CK] Brute Force - T1110 | [MITRE ATT&CK] File Deletion - T1107 | [MITRE PRE-ATT&CK] Host-based hiding techniques (PRE-T1091) | [MITRE ATT&CK] Obfuscated Files or Information - T1027 | [MITRE ATT&CK] Remote Access Tools - T1219 | [MITRE ATT&CK] Scripting - T1064

New Node.js Trojan Threatens Gamers (June 19, 2019)
Researchers at Doctor Web have identified a new type of trojan written in Javascript that uses Node.js to execute itself. Using websites that post video games cheats, a 7zip file containing what the user believes are cheats is downloaded, with the trojan contained in the archive. Once the executable file is ran, the trojan is downloaded and installed, gathering system information and running a cryptocurrency miner.
Click here for Anomali recommendation
MITRE ATT&CK: [MITRE ATT&CK] User Execution - T1204 | [MITRE ATT&CK] Web Service - T1102 | [MITRE ATT&CK] System Information Discovery - T1082

Mozilla Firefox 67.0.3 Patches Actively Exploited Zero-Day (June 19, 2019)
Mozilla has released two updates for its Firefox web browser to patch a critical zero-day vulnerability registered as, CVE-2019-11707. The vulnerability can be exploited by threat actors to execute code remotely to gain complete control of a vulnerable system. Actors could inject malicious code in the Javascript of a site and trick users of unpatched versions to run the code on their system.
Click here for Anomali recommendation
MITRE ATT&CK: [MITRE ATT&CK] Exploitation for Client Execution - T1203 | [MITRE ATT&CK] Remote Access Tools - T1219 | [MITRE ATT&CK] Scripting - T1064 | [MITRE ATT&CK] User Execution - T1204 | [MITRE ATT&CK] Web Service - T1102

Oracle Patches Another Actively-Exploited WebLogic Zero-Day (June 19, 2019)
Oracle has patched a previously zero-day vulnerability in WebLogic servers. Identified as CVE-2019-2729, the vulnerability allows a threat actor to run code on a server without authentication. Similar to a recent vulnerability, CVE-2019-2725, in WebLogic, both bug exist in the deserialization process when the content is converted back to its original form from binary that can be exploited to allow for unauthenticated code execution on vulnerable systems. Threat actors are targeting corporate networks due to the high amount of installed WebLogic servers that enables them to plant crypto mining malware on the vulnerable servers.
Click here for Anomali recommendation
MITRE ATT&CK: [MITRE ATT&CK] Remote Access Tools - T1219 | [MITRE ATT&CK] Web Service - T1102 | [MITRE PRE-ATT&CK] Upload, install, and configure software/tools (PRE-T1139) | [MITRE ATT&CK] Data Encoding - T1132

DHS Tests Remote Exploit for BlueKeep RDP Vulnerability (June 17, 2019)
The US Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) announced that they have identified a Remote Code Execution (RCE) exploit for “BlueKeep,” a vulnerability affecting older versions of Windows, Windows 2000 through Windows 7. In the alert, CISA notes that Windows 2000 is vulnerable to a “wormable” attack that would spread to other vulnerable systems in a similar manner to the 2017 WannaCry attacks. Exploiting the vulnerability, an unauthenticated user can access a system remotely to install malware. Microsoft has issued patches, and warns organizations about the vulnerability due to the critical nature.
Click here for Anomali recommendation
MITRE ATT&CK: [MITRE ATT&CK] Remote Access Tools - T1219 | [MITRE ATT&CK] Web Service - T1102

Android Malware Bypasses 2FA by Stealing One-Time Passwords (June 17, 2019)
Malware that is capable of stealing Android one-time passwords has been discovered by researchers at ESET. In an attempt to strengthen security, Google previously banned apps that access SMS and call logs when they are not necessary. However, threat actors have found a way to bypass this by accessing notifications to steal one-time passwords and two-factor authentication codes. Between June 7 and June 13, fake Turkish cryptocurrency apps were uploaded to the Google Play Store attempting to steal login credentials by requesting permissions to read all notifications. Once the permissions are accepted, the fake application phishes for the credentials with a fake login screen and prompts notifications from a specific list of apps to be collected from. In addition, the control of notifications enables threat actors to delete and silence notifications, to hide from the user.
Click here for Anomali recommendation
MITRE ATT&CK: [MITRE PRE-ATT&CK] Identify sensitive personnel information (PRE-T1051) | [MITRE ATT&CK] Obfuscated Files or Information - T1027 | [MITRE ATT&CK] Spearphishing via Service - T1194 | [MITRE ATT&CK] User Execution - T1204

Observed Threats

This section includes the top threats observed from the Anomali Community user base as well as sensors deployed by Anomali Labs. A ThreatStream account is required to view this section. Click here to request a trial.

TA505
The financially-motivated threat group called, “TA505,” was first reported on by Proofpoint researchers in December 2017.[1] Malicious activity attributed to the Russian-speaking group dates back to at least 2014, and the campaigns conducted by TA505 have targeted entities and individuals around the world. The group distributes a variety of malware, both well-known strains (Dridex banking trojan, Locky ransomware), custom-created (Jaff ransomware, tRAT), and variants of legitimate remote access tools (Remote Manipulator System). The group primarily distributes malware and tools via large scale and indiscriminately-distributed malspam campaigns, often through the “Necurs” botnet, with malicious attachments or links. Incorporation of new malware, creating custom malware and the use of advanced tactics, such as the removal of malware artifacts, indicate that this group is a sophisticated threat and likely well-funded. The group is innovative and shows the flexibility to pivot to other techniques and malware trends on a global scale.

Anomali Labs
About the Author

Anomali Labs

Get the latest threat intelligence news in your email.