April 23, 2019
Anomali Threat Research

Weekly Threat Briefing: Watch Out for Game of Thrones Phishing Scams as the Final Season Arrives

<div id="weekly"><p id="intro">The intelligence in this week’s iteration discuss the following threats:<strong> Brute force, Data breach, Data theft, Phishing, Personally Identifiable Information, Ransomware, Threat group, Vulnerabilities, </strong>and<strong> Zero-day</strong>. The IOCs related to these stories are attached to the Community Threat Briefing and can be used to check your logs for potential malicious activity.</p><div id="trending-threats"><h2 id="trendingthreats">Trending Threats</h2><p><a href="https://latesthackingnews.com/2019/04/22/watch-out-for-game-of-thrones-phishing-scams-as-the-final-season-arrives/" target="_blank"><b>Watch Out for Game of Thrones Phishing Scams As The Final Season Arrives</b></a> (<i>April 22, 2019</i>)<br/> Check Point researchers have identified a phishing campaign themed after the HBO series “Game of Thrones,” with the campaign’s objective being the theft of user data. The emails attempt to direct recipients to Game of Thrones websites that purport to be fan pages, gaming sites, and online shopping stores. Some of the websites are designed to steal user data such as email addresses and phone numbers to be used in additional spam campaigns. The other types of websites, such as the online stores, are designed to steal a user’s credit or debit card information.<br/> <a href="https://forum.anomali.com/t/watch-out-for-game-of-thrones-phishing-scams-as-the-final-season-arrives/3754" target="_blank">Click here for Anomali recommendation</a><br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/947205">[MITRE ATT&amp;CK] User Execution (T1204)</a> | <a href="https://ui.threatstream.com/ttp/947106">[MITRE ATT&amp;CK] Spearphishing Link (T1192)</a></p><p><a href="https://threatpost.com/easter-attack-apple-ios/143901/" target="_blank"><b>Easter Attack Affects Half a Billion Apple iOS Users via Chrome Bug</b></a> (<i>April 18, 2019</i>)<br/> The threat group called “eGobbler” is believed to be responsible for conducting one of “the top three massive malvertising [malicious advertising] campaigns” observed in the past 18 months that has impacted 500 million user sessions, according to Confiant researchers. Clicking upon one these malvertisements or pop-ups will begin the downloading process for a malicious payload that is used hijack user sessions. This campaign is exploiting an unpatched bug in the Google Chrome browser for iOS that can allow the actors to hijack user sessions. eGobbler’s objective is to utilize the session hijacking to redirect mobile web browser users to another site or used to display a pop-up that cannot be exited out of. Researchers observed that 35% of all the advertisements “are served through sandboxed cross-origin iframes” and that the actors are primarily using the “.world” top level domain, the latter which could help identify this campaign. eGobbler is primarily targeting users in the US with this campaign beginning on April 6 and composed of eight separate campaigns with the malvertisements lifespan lasting 24-48 hours.<br/> <a href="https://forum.anomali.com/t/easter-attack-affects-half-a-billion-apple-ios-users-via-chrome-bug/3755" target="_blank">Click here for Anomali recommendation</a><br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/947205">[MITRE ATT&amp;CK] User Execution (T1204)</a></p><p><a href="https://nakedsecurity.sophos.com/2019/04/18/oracle-issues-nearly-300-patches-in-quarterly-update/" target="_blank"><b>Oracle Issues Nearly 300 Patches in Quarterly Update</b></a> (<i>April 18, 2019</i>)<br/> In the latest Critical Update Patch, Oracle has issued security updates for 297 vulnerabilities. The patches were issued for 110 products on April 16. Some of the products that contained vulnerabilities include the following: Fusion Middleware product set with 42 vulnerabilities. Other products affected are Oracle Communications Applications with 26 security fixes, and the Oracle E-Business Suite, with 35 security fixes, with the majority for remotely exploitable bugs. Oracle Retail Applications received 24 security fixes, with 20 open to potential remote exploitation without authentication.<br/> <a href="https://forum.anomali.com/t/oracle-issues-nearly-300-patches-in-quarterly-update/3756" target="_blank">Click here for Anomali recommendation</a></p><p><a href="https://www.prnewswire.co.uk/news-releases/cyberint-reports-suspected-russian-speaking-threat-actors-ta505-continues-cybercrime-spree-against-global-retailers-amp-financial-institutions-888912257.html" target="_blank"><b>CyberInt Reports: Suspected Russian-speaking Threat Actors “TA505” Continues Cybercrime Spree Against Global Retailers and Financial Institutions</b></a> (<i>April 17, 2019</i>)<br/> CyberInt Research Labs have observed continuing campaigns conducted by the financially-motivated threat group called “TA505.” The group, which has been active since at least 2014, primarily uses spear phishing emails distributed to financial institutions and retail companies to compromise organizations with Remote Access Tools (RATs) such as “Remote Manipulator System” (RMS). Using a legitimate RAT can assist the group in remaining undetected on a network because malicious traffic may appear authentic while actually it is malicious activity conducted by the threat group.<br/> <a href="https://forum.anomali.com/t/cyberint-reports-suspected-russian-speaking-threat-actors-ta505-continues-cybercrime-spree-against-global-retailers-and-financial-institutions/3757" target="_blank">Click here for Anomali recommendation</a><br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/947205">[MITRE ATT&amp;CK] User Execution (T1204)</a> | <a href="https://ui.threatstream.com/ttp/947139">[MITRE ATT&amp;CK] Remote Access Tools (T1219)</a></p><p><a href="https://thehackernews.com/2019/04/justdial-hacked-data-breach.html" target="_blank"><b>Over 100 Million Justdial Users’ Personal Data Found Exposed On the Internet </b></a> (<i>April 17, 2019</i>)<br/> The Indian local search company, “Justdial,” which is India’s largest local search company, was observed to be leaking its customers’ Personally Identifiable Information (PII), according to security researcher Rajshekhar Rajaharia. Rajaharia discovered that Justdial was using an API endpoint that contained a database storing customer data that was publicly accessible since at least mid-2015. The information observed to be stored in the database consists of: address, cell phone number, company name, date of birth, email address, gender, name, occupation, photo, and any other data a user provided to Justdial.<br/> <a href="https://forum.anomali.com/t/over-100-million-justdial-users-personal-data-found-exposed-on-the-internet/3758" target="_blank">Click here for Anomali recommendation</a></p><p><a href="https://blog.talosintelligence.com/2019/04/seaturtle.html?m=1" target="_blank"><b>DNS Hijacking Abuses Trust In Core Internet Service</b></a> (<i>April 17, 2019</i>)<br/> A new DNS hijacking campaign, dubbed “Sea Turtle,” has been discovered targeting private and public organisations primarily located in the Middle East and North Africa, according to researchers from Cisco Talos. The threat actors behind this campaign initiated the attacks by either exploiting registered vulnerabilities (CVE-2009-1151, CVE-2014-6271, CVE-2017-3881, CVE-2017-6736, CVE-2017-12617, CVE-2018-0296, CVE-2018-7600) or spear phishing emails. Once obtaining initial access, the threat actor would modify the NS records for the target organisations to direct users to a malicious DNS server that provided actor-controlled responses for all DNS queries. They then established a Man-in-the-Middle framework to impersonate legitimate services to steal credentials, and once the threat actor obtained the credentials, they directed the user to the legitimate service to evade detection. The affected industries include energy organisations, information technology firms, intelligence agencies, internet service providers, military organisations, ministries of foreign affairs, registrars, and telecommunications organisations.<br/> <a href="https://forum.anomali.com/t/dns-hijacking-abuses-trust-in-core-internet-service/3759" target="_blank">Click here for Anomali recommendation</a><br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/947180">[MITRE ATT&amp;CK] Spearphishing Attachment (T1193)</a> | <a href="https://ui.threatstream.com/ttp/947233">[MITRE ATT&amp;CK] Exploitation for Privilege Escalation (T1068)</a> | <a href="https://ui.threatstream.com/ttp/947292">[MITRE ATT&amp;CK] Exploitation for Defense Evasion (T1211)</a></p><p><a href="https://blog.trendmicro.com/trendlabs-security-intelligence/potential-targeted-attack-uses-autohotkey-and-malicious-script-embedded-in-excel-file-to-avoid-detection/" target="_blank"><b>Potential Targeted Attack Uses AutoHotkey and Malicious Script Embedded in Excel File to Avoid Detection</b></a> (<i>April 17, 2019</i>)<br/> A phishing campaign has been observed by researchers from Trend Micro that contain a macro-enabled document that exploits the legitimate script engine, “AutoHotKey.” AutoHotKey will run a malicious script that establishes a connection to a Command and Control (C2) server which then executes an additional script in response to commands received from the C2. The C2 can also send commands to take screen captures of the infected device, obtain device information, as well as install the Remote Access Tool (RAT), “TeamViewer,” that can give the threat actor remote control over the system.<br/> <a href="https://forum.anomali.com/t/potential-targeted-attack-uses-autohotkey-and-malicious-script-embedded-in-excel-file-to-avoid-detection/3760" target="_blank">Click here for Anomali recommendation</a><br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/947139">[MITRE ATT&amp;CK] Remote Access Tools (T1219)</a> | <a href="https://ui.threatstream.com/ttp/947180">[MITRE ATT&amp;CK] Spearphishing Attachment (T1193)</a> | <a href="https://ui.threatstream.com/ttp/947201">[MITRE ATT&amp;CK] Scripting (T1064)</a></p><p><a href="https://nakedsecurity.sophos.com/2019/04/17/internet-explorer-browser-flaw-threatens-all-windows-users/" target="_blank"><b>Internet Explorer Browser Flaw Threatens All Windows Users</b></a> (<i>April 17, 2019</i>)<br/> Researcher John Page, known by the alias “hyp3rlinx,” has published Proof-of-Concept (POC) code for a vulnerability in Windows’ “Internet Explorer” (IE) web browser. The vulnerability, which some refer to as a “zero-day vulnerability because it is a known weakness for which there is no patch,” resides in the way IE handles its default web page archiving format, MHTML (MHT) files. A threat actor could distribute a malicious MHT file to a Windows 7, Windows 10, or Windows 12 R2 system because they by default would open them via IE. The MHT file could also contain malicious XML markup to prevent IE from showing a security warning. If opening of the MHT file through IE this takes place, a remote actor could gain the ability the steal Local files and “conduct reconnaissance on locally installed Program version information.” Even on Windows 10, there can be a short setup process that takes place when the machine is booted for the first time, thus potentially leaving all Windows users at risk of this vulnerability, albeit a slight and short timeframe for first-time startup.<br/> <a href="https://forum.anomali.com/t/internet-explorer-browser-flaw-threatens-all-windows-users/3761" target="_blank">Click here for Anomali recommendation</a><br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/947205">[MITRE ATT&amp;CK] User Execution (T1204)</a></p><p><a href="https://www.infosecurity-magazine.com/news/wipro-confirms-major-breach-1/" target="_blank"><b>Wipro Confirms Major Breach Investigation</b></a> (<i>April 17, 2019</i>)<br/> The Indian IT services giant, “Wipro,” gas announced that they have recently observed suspicious activity in some employee accounts following a phishing campaign targeting users. The company stated that following a comprehensive investigation, they have remediated the incident and attempted to mitigate any impact the breach might have caused. At least eleven or twelve customers of Wipro are affected.<br/> <a href="https://forum.anomali.com/t/wipro-confirms-major-breach-investigation/3762" target="_blank">Click here for Anomali recommendation</a></p><p><a href="https://www.bleepingcomputer.com/news/security/nampohyu-virus-ransomware-targets-remote-samba-servers/" target="_blank"><b>NamPoHyu Virus' Ransomware Targets Remote Samba Servers</b></a> (<i>April 16, 2019</i>)<br/> A new ransomware family, “NamPoHyu Virus” or “MegaLocker Virus,” has been observed infecting users via vulnerable Samba servers. The ransomware searches for accessible servers, and attempts to brute force the passwords. If it successfully brute forces the device, it then remotely encrypts the files on the server and displays a ransom note. Users are instructed to email a provided address for payment instructions, which are $250 USD in Bitcoin for individual users or $1000 USD in Bitcoin for companies.<br/> <a href="https://forum.anomali.com/t/nampohyu-virus-ransomware-targets-remote-samba-servers/3763" target="_blank">Click here for Anomali recommendation</a><br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/947227">[MITRE ATT&amp;CK] Brute Force (T1110)</a></p><p><a href="https://www.zdnet.com/article/a-hacker-has-dumped-nearly-one-billion-user-records-over-the-past-two-months/" target="_blank"><b>A Hacker Has Dumped Nearly One Billion User Records Over the Past Two Months</b></a> (<i>April 15, 2019</i>)<br/> A threat actor by the name of “Gnosticplayers” has breached over 44 companies and stolen almost one billion records. The actor has put up approximately 932 million records across five different release rounds, selling them on various Dark Web marketplaces for Bitcoin. The most recent companies to have their data published by the threat actor include Evite, iCracked, Mindjolt, Moda Operandi, Wanelo, and Yanolja.<br/> <a href="https://forum.anomali.com/t/a-hacker-has-dumped-nearly-one-billion-user-records-over-the-past-two-months/3764" target="_blank">Click here for Anomali recommendation</a></p><p><a href="https://blog.talosintelligence.com/2019/04/hawkeye-reborn.html" target="_blank"><b>New HawkEye Reborn Variant Emerges Following Ownership Change </b></a> (<i>April 15, 2019</i>)<br/> Researchers from Cisco Talos have observed a new variant, “Reborn v9, Version,” of the keylogger and information-stealing malware, “HawkEye,” being distributed via phishing emails to various organisations. The emails are themed around invoice documents, bills, statements, order confirmations, or other corporate functions, and contain an attached Excel spreadsheet that contains a macro-enabled document. The malicious spreadsheet exploits registered vulnerability, “CVE-2017-11882,” that allows for arbitrary code execution in Microsoft Office and executes shellcode. Upon execution, the HawkEye keylogger is installed on the infected machine and steals information such as system information, passwords from common web browsers and Minecraft, clipboard content, and can take screenshots from the desktop and webcam.<br/> <a href="https://forum.anomali.com/t/new-hawkeye-reborn-variant-emerges-following-ownership-change/3765" target="_blank">Click here for Anomali recommendation</a><br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/947139">[MITRE ATT&amp;CK] Remote Access Tools (T1219)</a> | <a href="https://ui.threatstream.com/ttp/947180">[MITRE ATT&amp;CK] Spearphishing Attachment (T1193)</a> | <a href="https://ui.threatstream.com/ttp/947287">[MITRE ATT&amp;CK] PowerShell (T1086)</a> | <a href="https://ui.threatstream.com/ttp/947235">[MITRE ATT&amp;CK] Obfuscated Files or Information (T1027)</a></p><p><a href="https://securelist.com/new-win32k-zero-day-cve-2019-0859/90435/" target="_blank"><b>New Zero-day Vulnerability CVE-2019-0859 in win32k.sys</b></a> (<i>April 15, 2019</i>)<br/> A new zero-day vulnerability, registered as “CVE-2019-0859,” in Windows’ “win32k.sys” has been discovered by researchers from Kaspersky Lab. The vulnerability is a use-after-free flaw that lies in the “CreateWindowEx” function, specifically the “WM_NCCREATE” callback. A threat actor could exploit the callback flaw which could then allow them control over the free memory block and then execute PowerShell code that ultimately makes an HTTP reverse shell to gain access to the entire infected system.<br/> <a href="https://forum.anomali.com/t/new-zero-day-vulnerability-cve-2019-0859-in-win32k-sys/3766" target="_blank">Click here for Anomali recommendation</a><br/> <b>MITRE ATT&amp;CK: </b> <a href="https://ui.threatstream.com/ttp/947287">[MITRE ATT&amp;CK] PowerShell (T1086)</a> | <a href="https://ui.threatstream.com/ttp/947173">[MITRE ATT&amp;CK] Hooking (T1179)</a> | <a href="https://ui.threatstream.com/ttp/947201">[MITRE ATT&amp;CK] Scripting (T1064)</a></p></div></div>

Get the Latest Anomali Updates and Cybersecurity News – Straight To Your Inbox

Become a subscriber to the Anomali Newsletter
Receive a monthly summary of our latest threat intelligence content, research, news, events, and more.