February 26, 2019
-
Anomali Threat Research
,

Weekly Threat Briefing: The Facebook Login Phishing Campaign Can Even Trick Savvy Users

<p>The intelligence in this weekís iteration discuss the following threats: <strong>APT28, APT-C-36, Cryptominer, Data breach, Fbot, KEYMARBLE backdoor, Malware, Mimikatz, Phishing, RADMIN, Ransomware, Rietspoof,</strong> and <strong>Vulnerabilities.</strong> The IOCs related to these stories are attached to the Community Threat Briefing and can be used to check your logs for potential malicious activity.</p><h2>Trending Threats</h2><p><a href="https://securityaffairs.co/wordpress/81567/malware/fbot-malware-hisilicon.html" target="_blank"><b>Fbot Malware Targets HiSilicon DVR/NVR Soc Devices </b></a> (<i>February 24, 2019</i>)<br/> Researchers from 360Netlab discovered that a high number of HiSilicon "DVR/NVR Soc" devices were becoming infected with a new version of the "Fbot" malware. 24,528 IP addresses were infected worldwide, according to 360Netlab, and threat actors were able to exploit the surveillance cameras via a weak security implementation of the DVRIP protocol created by HiSilicon. This allowed the actors to establish a backdoor in the device and then inject Fbot. Fbot is then able to conduct Distributed-Denial-of-Service (DDoS) attacks.<br/> <a href="https://forum.anomali.com/t/fbot-malware-targets-hisilicon-dvr-nvr-soc-devices/3578" target="_blank">Click here for Anomali recommendation</a></p><p><a href="https://latesthackingnews.com/2019/02/22/the-facebook-login-phishing-campaign-can-even-trick-savvy-users/" target="_blank"><b>The Facebook Login Phishing Campaign Can Even Trick Savvy Users </b></a> (<i>February 22, 2019</i>)<br/> Antoine Vincent Jebara, the CEO of the offline password manager and authentication company, "Myki," published a blog post describing a recent phishing campaign that has been targeting users who visit a website purporting to be a legitimate news site, "The News Week Journal." The campaign uses an HTML block with a well-crafted and fake Facebook login prompt for users to access a site, that actually steals the credentials of the user. The fake login popup allows users to interact with it as a legitimate popup such as dragging it around or dismissing it. Because of the authentic appearance of the fake login window, including the mocked up HTTPS status, it may be difficult for Facebook users to identify the campaign.<br/> <a href="https://forum.anomali.com/t/the-facebook-login-phishing-campaign-can-even-trick-savvy-users/3579" target="_blank">Click here for Anomali recommendation</a><br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/947263">[MITRE ATT&amp;CK] Spearphishing via Service (T1194)</a></p><p><a href="https://www.infosecurity-magazine.com/news/pos-firm-hacked-malware-deployed-1/" target="_blank"><b>POS Firm Hacked, Malware Deployed at 130+ Outlets </b></a> (<i>February 22, 2019</i>)<br/> Minnesota-based "North Country Business Products" released an announcement to customers stating that they suffered a cyberattack in January 2019 which resulted in their Point-of-Sale (PoS) systems to be infected with malware. The malware allowed unknown threat actors to steal customer data including cardholder's credit card number, CVV, expiration date, and name. The breach affected users who used their card at over 130 locations including Dunn Brothers Coffee, Zipps Sports Grill, and Someburros outlets between January 3 and January 24, 2019. As of this writing, it is unclear how threat actors managed to infect the PoS systems.<br/> <a href="https://forum.anomali.com/t/pos-firm-hacked-malware-deployed-at-130-outlets/3580" target="_blank">Click here for Anomali recommendation</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cr1ptt0r-ransomware-targets-embedded-systems-infects-d-link-nas-gear/" target="_blank"><b>Cr1ptT0r Ransomware Infects D-Link NAS Devices, Targets Embedded Systems </b></a> (<i>February 22, 2019</i>)<br/> A new ransomware, dubbed "Cr1ptT0r," has been observed targeting Network Attached Storage (NAS) equipment; the ransomware was first brought to the attention of researchers in BleepingComputer forums on an unspecified date. Users of D-Link DNS-360 devices notice their devices were infected with ransomware, which was likely infected via vulnerabilities in the firmware that can allow for remote code execution. The DNS-360 is noted to have several vulnerabilities in the firmware, and users who were infected by the ransomware stated that they had not updated the firmware to the latest version, despite the device being connected to the internet. The threat actors behind the ransomware request users to visit a specific URL to get more information regarding the infection and how to retrieve their files back. Threat actors requested 0.30672022 Bitcoin ($1,200 USD) or a user can pay $19.99 for individual file decryption.<br/> <a href="https://forum.anomali.com/t/cr1ptt0r-ransomware-infects-d-link-nas-devices-targets-embedded-systems/3581" target="_blank">Click here for Anomali recommendation</a><br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/947227">[MITRE ATT&amp;CK] Brute Force (T1110)</a></p><p><a href="https://www.securityweek.com/critical-drupal-vulnerability-allows-remote-code-execution" target="_blank"><b>Critical Drupal Vulnerability Allows Remote Code Execution </b></a> (<i>February 21, 2019</i>)<br/> Drupal, the content management system, released a security update on Wednesday, February 20, 2019 regarding a "highly critical" vulnerability, registered as "CVE-2019-6340," that could allow remote code execution. The flaw is caused by a lack of proper data sanitisation, which means a threat actor could exploit this by enabling the core RESTful Web Services module and allowing PATCH and POST requests. This vulnerability affects Drupal versions 8.6.10 and 8.5.11. Drupal 7 is not affected, though it is advised users apply updates released for version 7, as well.<br/> <a href="https://forum.anomali.com/t/critical-drupal-vulnerability-allows-remote-code-execution/3582" target="_blank">Click here for Anomali recommendation</a></p><p><a href="https://thehackernews.com/2019/02/winrar-malware-exploit.html" target="_blank"><b>Warning: Critical WinRAR Flaw Affects All Versions Released In Last 19 Years </b></a> (<i>February 21, 2019</i>)<br/> A critical vulnerability in Window's "WinRAR" archiver tool has been discovered by Check Point researchers that affects all versions of WinRAR released in the past 19 years. The vulnerability is due to the way the old library, "UNACEV2.DLL," extracted files compressed in ACE file format, where threat actors are able to craft a filepath string within a field, that leverages buggy code to trigger a path traversal vulnerability. An absolute path traversal bug that would allow attackers to extract compressed files to a folder of their choosing could then be leveraged to execute arbitrary code on a system.<br/> <a href="https://forum.anomali.com/t/warning-critical-winrar-flaw-affects-all-versions-released-in-last-19-years/3583" target="_blank">Click here for Anomali recommendation</a><br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/947240">[MITRE ATT&amp;CK] Data Compressed (T1002)</a></p><p><a href="https://blog.trendmicro.com/trendlabs-security-intelligence/monero-miner-malware-uses-radmin-mimikatz-to-infect-propagate-via-vulnerability/" target="_blank"><b>Monero Miner-Malware Uses RADMIN, MIMIKATZ to Infect, Propagate via Vulnerability</b></a> (<i>February 20, 2019</i>)<br/> Researchers from Trend Micro discovered an uptake of threat actors using both "Mimikatz" and "RADMIN" open-sourced malware tools to install Monero cryptocurrency miners onto company machines based in China, Hong Kong, Italy, and Taiwan. The initial infection vector is accomplished via a user visiting a compromised website, also known as a "watering hole." The initial payload removes older versions of malware on the machine then reinstalls the initial download to ensure the infection process is updated. It then connects to several URLs and IP addresses to download files, specifically the Monero miner, Mimikatz, and RADMIN. Following the installation of the Monero miner, Mimikatz is executed to gather credentials and enable the threat actor to remotely execute commands. RADMIN is dropped on the machine to allow the threat actor remote command communication via a named pipe. This attack exploits a patched Windows SMB server vulnerability (MS17-010) which was patched in 2017.<br/> <a href="https://forum.anomali.com/t/monero-miner-malware-uses-radmin-mimikatz-to-infect-propagate-via-vulnerability/3584" target="_blank">Click here for Anomali recommendation</a><br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/947267">[MITRE ATT&amp;CK] Drive-by Compromise (T1189)</a> | <a href="https://ui.threatstream.com/ttp/947139">[MITRE ATT&amp;CK] Remote Access Tools (T1219)</a> | <a href="https://ui.threatstream.com/ttp/947087">[MITRE ATT&amp;CK] Credential Dumping (T1003)</a></p><p><a href="https://www.theage.com.au/national/victoria/crime-syndicate-hacks-15-000-medical-files-at-cabrini-hospital-demands-ransom-20190220-p50z3c.html" target="_blank"><b>Crime Syndicate Hacks 15,000 Medical Files at Cabrini Hospital, Demands Ransom</b></a> (<i>February 20, 2019</i>)<br/> A specialist cardiology unit at Cabrini Hospital in Australia suffered a cyber-attack where threat actors compromised their system and stole 15,000 patients' files. The medical staff were unable to access patients' files for over three weeks following the ransomware attack. The threat actors demanded the ransom paid in cryptocurrency before they would send a decryption password to the hospital. According to the article, it is understood that a ransom has been made, for an unknown amount, but some files still have yet to be recovered, including patients' personal details and sensitive medical records. An investigation is still ongoing to recover all the files.<br/> <a href="https://forum.anomali.com/t/crime-syndicate-hacks-15-000-medical-files-at-cabrini-hospital-demands-ransom/3585" target="_blank">Click here for Anomali recommendation</a></p><p><a href="https://www.zdnet.com/article/microsoft-reveals-new-apt28-cyber-attacks-against-european-political-entities/" target="_blank"><b>Microsoft Reveals New APT28 Cyber-Attacks Against European Political Entities </b></a> (<i>February 20, 2019</i>)<br/> Microsoft disclosed that they have observed recent activity conducted by Russian Advanced Persistent Threat Group (APT) "APT28." The activity consists of spear phishing emails designed to target European political and governmental entities, as well as NGOs and think-tanks that work closely with government officials. Between September and December 2018, there were approximately 104 accounts targeted by APT28 in Belgium, France, Germany, Poland, Romania, and Serbia. The goal was to steal user login credentials and infect victims with malware, in a suspected attempt to possibly influence the upcoming 2019 European Parliament elections that take place in May. It is unknown if the spear phishing emails were able to infect their intended targets, as of this writing.<br/> <a href="https://forum.anomali.com/t/microsoft-reveals-new-apt28-cyber-attacks-against-european-political-entities/3586" target="_blank">Click here for Anomali recommendation</a><br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/947180">[MITRE ATT&amp;CK] Spearphishing Attachment (T1193)</a> | <a href="https://ui.threatstream.com/ttp/947106">[MITRE ATT&amp;CK] Spearphishing Link (T1192)</a></p><p><a href="https://www.deepinstinct.com/2019/02/19/a-new-wave-of-the-separ-info-stealer-is-infecting-organizations-through-living-off-the-land-attack-methods/" target="_blank"><b>A New Wave of the Separ Info-Stealer is Infecting Organizations through "Living off the Land" Attack Methods</b></a> (<i>February 19, 2019</i>)<br/> The credential-stealer, "Separ," has been found to be actively distributed to users in Southeast Asia and the Middle East hidden in a phishing campaign utilising fake PDF attachments. The emails and attachments are related to businesses and relate to quotations, shipment confirmations, and equipment specifications. The fake PDF document contains a self-extractor so if a user opens the attachment, it will automatically initiate and run a VBScript that sets up several directories. The script then launches a second script that changes the machine's firewall settings, opens an empty .jpg to hide command windows, runs SecurityXploded's "Email and Browser Password Dumps" to steal credentials and uploads them to a legitimate FTP client.<br/> <a href="https://forum.anomali.com/t/a-new-wave-of-the-separ-info-stealer-is-infecting-organizations-through-living-off-the-land-attack-methods/3587" target="_blank">Click here for Anomali recommendation</a><br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/947180">[MITRE ATT&amp;CK] Spearphishing Attachment (T1193)</a> | <a href="https://ui.threatstream.com/ttp/947201">[MITRE ATT&amp;CK] Scripting (T1064)</a> | <a href="https://ui.threatstream.com/ttp/947224">[MITRE ATT&amp;CK] Exfiltration Over Alternative Protocol (T1048)</a></p><p><a href="https://research.checkpoint.com/north-korea-turns-against-russian-targets/" target="_blank"><b>North Korea Turns Against New Targets?! </b></a> (<i>February 19, 2019</i>)<br/> A new phishing campaign targeting Russian organisations is being attributed to the North Korean Advanced Persistent Threat (APT) group, "Lazarus," according to Check Point researchers. The phishing emails contained Microsoft Word or Excel attachments that had multiple images inside the document and required a user to "enable content" to view the images in the file. If the macros were enabled, a VBScript was downloaded and executed from a Dropbox host. The VBScript downloads a CAB file that contains the final payload from a compromised server, that appears as a JPEG image, and executes the final payload: the "KEYMARBLE" backdoor. The backdoor acts as a Remote Access Trojan (RAT) that allows the operator basic functionality to obtain information from the infected machines and exfiltrate the data to the Command and Control (C2) server.<br/> <a href="https://forum.anomali.com/t/north-korea-turns-against-new-targets/3588" target="_blank">Click here for Anomali recommendation</a><br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/947180">[MITRE ATT&amp;CK] Spearphishing Attachment (T1193)</a> | <a href="https://ui.threatstream.com/ttp/947139">[MITRE ATT&amp;CK] Remote Access Tools (T1219)</a> | <a href="https://ui.threatstream.com/ttp/947201">[MITRE ATT&amp;CK] Scripting (T1064)</a></p><p><a href="https://www.zdnet.com/article/rietspoof-malware-spreads-via-facebook-messenger-and-skype-spam/" target="_blank"><b>Rietspoof Malware Spreads via Facebook Messenger and Skype Spam</b></a> (<i>February 19, 2019</i>)<br/> A new malware, dubbed "Rietspoof," has been observed to be distributed to users via Facebook, Skype, and other instant messaging clients, according to Avast researchers. Rietspoof is a dropper malware that infects victims and obtains persistence on the compromised machine to then download other malware to the machine following instructions from the Command and Control (C2) server. The malware obtains persistence by placing a LNK shortcut file into the Windows/Startup folder and, because it is signed with legitimate certificates, it is able to evade antivirus checks. The malware is capable of downloading, executing, uploading, and deleting files in addition to deleting itself from the system in the case the malware is identified and the actor wants to delete evidence of their activities.<br/> <a href="https://forum.anomali.com/t/rietspoof-malware-spreads-via-facebook-messenger-and-skype-spam/3589" target="_blank">Click here for Anomali recommendation</a><br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/947106">[MITRE ATT&amp;CK] Spearphishing Link (T1192)</a> | <a href="https://ui.threatstream.com/ttp/947211">[MITRE ATT&amp;CK] Registry Run Keys / Start Folder (T1060)</a></p><p><a href="https://www.avanan.com/resources/the-norelationship-attack-bypasses-office-365" target="_blank"><b>The NoRelationship Attack Bypasses Office 365 Email Attachment Security</b></a> (<i>February 19, 2019</i>)<br/> A new phishing attack has been detected by researchers from Avanan that bypasses Exchange Online Protection (EOP) URL filters that are responsible for scanning Office documents to ensure they are not malicious. This attack, dubbed "NoRelationship," will exploit the fact that email filters only scan the "document.xmls.rels" file to see if any links are in the document. Threat actors will erase the URL in that file so the parser does not detect anything malicious. The email then will pass through without being detected as malicious and the user is able to open the email and potentially open the harmful document.<br/> <a href="https://forum.anomali.com/t/the-norelationship-attack-bypasses-office-365-email-attachment-security/3590" target="_blank">Click here for Anomali recommendation</a><br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/947180">[MITRE ATT&amp;CK] Spearphishing Attachment (T1193)</a></p><p><a href="https://ti.360.net/blog/articles/apt-c-36-continuous-attacks-targeting-colombian-government-institutions-and-corporations-en/" target="_blank"><b>APT-C-36: Continuous Attacks Targeting Colombian Government Institutions and Corporations </b></a> (<i>February 18, 2019</i>)<br/> Researchers from 360Netlab have been tracking a suspected South American-based Advanced Persistent Threat (APT) group, "Blind Eagle" (also known as APT-C-36). The group is believed to have been active since April 2018 and primarily target Colombian government entities and other various industries. The group utilises phishing lures with attachments that contain malware as the initial infection vector. The goal of the APT group is to establish a backdoor into the intended targets to then obtain a foothold and then move laterally once in a network for reconnaissance purposes. The phishing emails and attachments are tailored to each industry/entity the group is targeting to potentially increase the possibility that a recipient will open the email and attachment. The attachment requests that macros be enabled and, if allowed, will begin the installation process of the "Imminent" backdoor.<br/> <a href="https://forum.anomali.com/t/apt-c-36-continuous-attacks-targeting-colombian-government-institutions-and-corporations/3591" target="_blank">Click here for Anomali recommendation</a><br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/947180">[MITRE ATT&amp;CK] Spearphishing Attachment (T1193)</a> | <a href="https://ui.threatstream.com/ttp/947139">[MITRE ATT&amp;CK] Remote Access Tools (T1219)</a></p><h2>Observed Threats</h2><p>This section includes the top threats observed from the Anomali Community user base as well as sensors deployed by Anomali Labs. A ThreatStream account is required to view this section. <a href="https://www.anomali.com/products" target="_blank">Click here to request a trial.</a></p><p><a href="https://ui.threatstream.com/actor/4494" target="_blank">APT28</a><br/> The Advanced Persistent Threat (APT) group ìAPT28î is believed to be a Russian-sponsored group that has been active since at least 2007. The group displays high levels of sophistication in the multiple campaigns that they have been attributed to, and various malware and tools used to conduct the operations align with the strategic interests of the Russian government. The group is believed to operate under the Main Intelligence Directorate (GRU), the foreign intelligence agency of the Russian armed forces.</p><p><a href="https://ui.threatstream.com/actor/281" target="_blank">Lazarus Group</a><br/> The Advanced Persistent Threat group (APT) ìLazarus Groupî is believed to be based in the Democratic People's Republic of Korea (DPRK) and has been active since at least 2009. Lazarus Group is believed to be composed of operatives from ìBureau 121î (121?), the cyber warfare division of North Koreaís Reconnaissance General Bureau. The Reconnaissance General Bureau was formed due to a reorganization in 2009 but its exact structure is not known due to North Koreaís denial and deception tactics. Bureau 121 is North Koreaís most important cyber unit that is used for both offensive and defensive operations. Bureau 121 are referred, in South Korean open-source media, as the ìElectronic Reconnaissance Bureauís Cyber Warfare Guidance Bureauî (전자정찰국 사이버전지도국). The term ìguidanceî in the context of North Korea often denotes that an organization is personally overseen by the head of state of North Korea as a strategically significant entity. Lazarus Group has targeted financial organizations since at least July 2009, The group is well known for their tendency to engage in data destruction/disk wiping attacks, and network traffic Distributed Denial-of-Service (DDoS) attacks, typically against the Republic of Korea (South Korea). The group targets various industries and sectors including South Korean and US government organizations, Non-Governmental Organizations (NGO), media and entertainment organizations, as well as shipping and transportation organizations, Korean hydro and nuclear power, and jamming of South Korean GPS.</p>

Get the Latest Anomali Updates and Cybersecurity News – Straight To Your Inbox

Become a subscriber to the Anomali Newsletter
Receive a monthly summary of our latest threat intelligence content, research, news, events, and more.