April 25, 2018
Anomali Threat Research

Weekly Threat Briefing: Energetic Bear/Crouching Yeti: Attacks on Servers

<p>The intelligence in this week's iteration discuss the following threats: <strong>Adblocker Malware</strong>, <strong>APT28</strong>, <strong>ARS VBS Loader</strong>, <strong>Desert Scorpion</strong>, <strong>DNS Hijacking</strong>, <strong>Mukstik</strong>, <strong>PBot</strong>, <strong>Roaming Mantis</strong>, <strong>SquirtDanger</strong>, <strong>Stresspaint</strong>, and <strong>XiaoBa</strong>. The IOCs related to these stories are attached to the WTB and can be used to check your logs for potential malicious activity.</p><h2>Trending Threats</h2><p><a href="https://securelist.com/energetic-bear-crouching-yeti/85345/" target="_blank"><b>Energetic Bear/Crouching Yeti: attacks on servers</b></a> (<i>April 23, 2018</i>)<br/> Due to recent advisories by both the <a href="https://www.us-cert.gov/ncas/alerts/TA18-106A">United States Computer Emergency Readiness Team</a> (US-CERT) and the <a href="https://www.ncsc.gov.uk/content/files/protected_files/article_files/Russian%20State%20Sponsored%20Actor%20Advisory.pdf">United Kingdom National Cyber Security Centre</a> (NCSC), Kaspersky Labs have released information detailing servers that have been compromised and used as attack platforms by the group. The targeted countries include Germany, Greece, Russia, Turkey, Ukraine, United Kingdom, and the United States of America. The compromised servers range across many different industries, and were either used for watering hole attacks in order to reach their main targets, auxiliary purposes, or for hosting malware and logs. The watering hole servers infected targets by having an injected link in the webpage or a JavaScript file. The link would direct to an IP address using "file://", which initiates a request to fetch the resource over Server Message Block (SMB), which allows APT28 to harvest the victims IP, username, domain name, and NTLM hash of the victim's password. Other servers were used for platforms to conduct scanning attacks using tools such as Nmap, Sqlmap, and Commix. It appears that the scanning attacks were conducted to further expand APT28's water hole hosting infrastructure.<br/> <a href="https://forum.anomali.com/t/energetic-bear-crouching-yeti-attacks-on-servers/2372" target="_blank">Click here for Anomali recommendation</a></p><p><a href="http://blog.netlab.360.com/botnet-muhstik-is-actively-exploiting-drupal-cve-2018-7600-in-a-worm-style-en/" target="_blank"><b>Botnet Muhstik is Actively Exploiting Drupal CVE-2018-7600 in a Worm Style</b></a> (<i>April 20, 2018</i>)<br/> After the public announcement of a remote code execution vulnerability, registered as "CVE-2018-7600," for the "Drupal" Content Management System (CMS), a large number of scans against the internet have been detected trying to exploit this vulnerability. After noticing worm-like propagation behaviour, NetLab researchers have named the "botnet" responsible for the attacks as"Mukstik," after a word that appears in its binary file and Internet Relay Chat (IRC) channel. The botnet tries to infect servers by scanning TCP ports 80, 8080, 7001, 2004, and attempts to use seven different exploit payloads on each. When an exploit is successful, it will report back to a "Command and Control" (C2) server, ready to receive commands.<br/> <a href="https://forum.anomali.com/t/botnet-muhstik-is-actively-exploiting-drupal-cve-2018-7600-in-a-worm-style/2373" target="_blank">Click here for Anomali recommendation</a></p><p><a href="https://www.alertlogic.com/blog/ssh-worming-cryptominer-targets-vulnerable-weblogic-instances/" target="_blank"><b>SSH Worming CryptoMiner Targets Vulnerable WebLogic Instances</b></a> (<i>April 19, 2018</i>)<br/> Attackers have created a "Cryptominer" script that exploits "CVE-2017-10271" to infect vulnerable "WebLogic" instances, then tries to propagate via Secure Shell (SSH) according to Alert Logic researchers. After infecting a vulnerable WebLogic instance and installing a modified "XMRig" miner, the script attempts to identify every SSH key on the host by checking the ".ssh" directory and looking for directly referenced SSH certs in all users bash history. The script also checks for recently accessed SSH hosts and netstat to identify potential targets. The attacker iterates across all discovered users, keys, and target hosts and attempts to install the worm onto the target machine. A tactic that the attacker employs is to change the landing page that delivers the malware to an FBI takedown notice, this is to make incident responders believe that the site has been neutered.<br/> <a href="https://forum.anomali.com/t/ssh-worming-cryptominer-targets-vulnerable-weblogic-instances/2374" target="_blank">Click here for Anomali recommendation</a></p><p><a href="https://thehackernews.com/2018/04/adblocker-chrome-extention.html" target="_blank"><b>Over 20 Million Users Installed Malicious Ad Blockers From Chrome Store</b></a> (<i>April 19, 2018</i>)<br/> Five malicious "ad blocker" extensions have been discovered on the "Google Chrome Store" that have been installed by over 20 million people. The extensions allowed the creators to steal information that victims entered into any website they visit, which could include usernames, passwords, and card details. All the extensions were copycat versions of legitimate Ad-blockers. The creators used popular keywords in the names and descriptions in order to rank their position higher in search results.<br/> <a href="https://forum.anomali.com/t/over-20-million-users-installed-malicious-ad-blockers-from-chrome-store/2375" target="_blank">Click here for Anomali recommendation</a></p><p><a href="https://blog.malwarebytes.com/threat-analysis/2018/04/pbot-python-based-adware/" target="_blank"><b>PBot: a Python-based adware</b></a> (<i>April 18, 2018</i>)<br/> Malwarebytes researchers have discovered a Python-based adware, called "PBot" or "PythonBot," that is dropped by the RIG exploit kit. The malware comes under the disguise of software that blocks cryptocurrency miners, but has nothing in common. The malware performs "Man-in-the-Browser" (MITB) attacks and injects scripts into legitimate website pages. PBot is able to control whatever contents are displayed on the browser. Legitimate certificates on sites with HTTPS are replaced with fake certificates. There is a possibility that PBot will be configured in the future, from harmless ads, to display more malicious pages, such as phishing.<br/> <a href="https://forum.anomali.com/t/pbot-a-python-based-adware/2376" target="_blank">Click here for Anomali recommendation</a></p><p><a href="https://security.radware.com/malware/stresspaint-malware-targeting-facebook-credentials/" target="_blank"><b>Stresspaint Malware Targeting Facebook Credentials</b></a> (<i>April 18, 2018</i>)<br/> Radware's research team recently detected malicious activity attributed to a threat group collecting user credentials and payment details from Facebook users worldwide. The group sends phishing emails that download a painting application called "Relieve Stress Paint" that drops a malware dubbed "Stresspaint" in the background. At the time of this writing, the group has infected over 40,000 users. The malware copies the content of Chrome browser cookies and login data files. When saved login credentials or Facebook cookies are found, they are encrypted and sent to the command and control server.<br/> <a href="https://forum.anomali.com/t/stresspaint-malware-targeting-facebook-credentials/2377" target="_blank">Click here for Anomali recommendation</a></p><p><a href="https://researchcenter.paloaltonetworks.com/2018/04/unit42-squirtdanger-swiss-army-knife-malware-veteran-malware-author-thebottle/" target="_blank"><b>SquirtDanger: The Swiss Army Knife Malware from Veteran Malware Author TheBottle</b></a> (<i>April 17, 2018</i>)<br/> Palo Alto Networks Unit 42 researchers have released information on a new malware family, dubbed "SquirtDanger," based on the name of a DLL file used in the attacks. The malware is believed to have been created by the Russian malware author called "TheBottle." SquirtDanger is a botnet malware family written in C#. Once run on a system, it creates a scheduled task to run every minute. It uses raw TCP connections to communicate to a remote Command and Control (C2) server. The malware can take screenshots, exfiltrate files, steal browser passwords, steal cryptocurrency wallets, swap identified wallets in the victim's clipboard, and execute files, among others. The malware is likely delivered via software that has been illegally copied and trojanized with the malware.<br/> <a href="https://forum.anomali.com/t/squirtdanger-the-swiss-army-knife-malware-from-veteran-malware-author-thebottle/2378" target="_blank">Click here for Anomali recommendation</a></p><p><a href="https://blog.trendmicro.com/trendlabs-security-intelligence/ransomware-xiaoba-repurposed-as-file-infector-and-cryptocurrency-miner/" target="_blank"><b>Ransomware XIAOBA Repurposed as File Infector and Cryptocurrency Miner</b></a> (<i>April 17, 2018</i>)<br/> The "XiaoBa" ransomware has been repurposed to be a File Infector and Cryptocurrency miner, according to Trend Micro researchers. The file infector injects malware binaries to run the malware code. It also injects ".html" and ".htm" files to run the "Coinhive" mining script. Variants have also been found to include the "XMRig" miner. XiaoBa also modifies the "hosts" file to redirect anti-virus and forensics related URLs to localhost. The file infector can infect an executable of any size because there are no limits set. There are also no markers of infected files, which allows it to infect itself multiple times. Once XiaoBa infects a file, the code of the host file will not execute, this could affect critical files, rendering the victim's system unstable.<br/> <a href="https://forum.anomali.com/t/ransomware-xiaoba-repurposed-as-file-infector-and-cryptocurrency-miner/2379" target="_blank">Click here for Anomali recommendation</a></p><p><a href="https://www.flashpoint-intel.com/blog/meet-ars-vbs-loader/" target="_blank"><b>RAT Gone Rogue: Meet ARS VBS Loader</b></a> (<i>April 16, 2018</i>)<br/> A new variant of the malicious loader called "ARS VBS Loader," which is based on the "SafeLoader VBS" loader that was sold and later leaked on Russian underground forums, has added Remote Access Trojan (RAT) feature to its capabilities, according to Flashpoint researchers. The ARS VBS Loader malware is being distributed via malspam emails that are themed around personal banking, package shipments, and toll road notifications. If a malspam recipient interacts with the malicious attachment that contains the loader, a recipient could be infected with multiple different malwares, such as the information-stealing malware "AZORult."<br/> <a href="https://forum.anomali.com/t/rat-gone-rogue-meet-ars-vbs-loader/2380" target="_blank">Click here for Anomali recommendation</a></p><p><a href="https://www.ncsc.gov.uk/content/files/protected_files/article_files/Russian%20State%20Sponsored%20Actor%20Advisory.pdf" target="_blank"><b>Advisory: Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices</b></a> (<i>April 16, 2018</i>)<br/> The U.S. Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) in coordination with the U.K.'s National Cyber Security Centre (NCSC) have issued a join Technical Alert (TA). This TA discusses how Russian state-sponsored threat actors are targeting network infrastructure devices such as routers, switches, firewall, and Network-based Intrusion Detection System (NIDS) devices. The Russian threat actors are engaging in this activity "to conduct man-in-the-middle attacks to support espionage, extract intellectual property, maintain persistent access to victim networks, and potentially lay a foundation for future offensive operations."<br/> <a href="https://forum.anomali.com/t/advisory-russian-state-sponsored-cyber-actors-targeting-network-infrastructure-devices/2381" target="_blank">Click here for Anomali recommendation</a></p><p><a href="https://securelist.com/roaming-mantis-uses-dns-hijacking-to-infect-android-smartphones/85178/" target="_blank"><b>Roaming Mantis Uses DNS Hijacking to Infect Android Smartphones</b></a> (<i>April 16, 2018</i>)<br/> Japanese media organization began reporting about DNS hijacking attacks that were targeting routers in Japan which subsequently redirected user to malicious IP addresses in attempts to infect users with banking trojans. Kaspersky Lab researchers looked deeper into these attacks and found malware, dubbed "Roaming Mantis," is behind the DNS hijacking attacks. Once the malware has infected a router it can redirect any user using the router trying to visit a website to one of the actor's choosing. The malicious website, once visited, displays a dialogue box that requests the user update to the latest version of Chrome for a better browsing experience. If this fake update is downloaded, a user will have granted permissions to an Android Application Package (APK) that can conduct additional malicious activity, such as stealing information on an infected device.<br/> <a href="https://forum.anomali.com/t/roaming-mantis-uses-dns-hijacking-to-infect-android-smartphones/2382" target="_blank">Click here for Anomali recommendation</a></p><p><a href="https://blog.lookout.com/desert-scorpion-google-play" target="_blank"><b>Lookout Finds New Surveillanceware in Google Play with Ties to Known Threat Actor Targeting the Middle East</b></a> (<i>April 16, 2018</i>)<br/> A new, targeted mobile malware campaign has been observed to be distributing surveillance malware (surveillanceware) via an application in the Google Play Store, according to Lookout researchers. The malware is called "Desert Scorpion" and was able to infect users by hiding in an application called "Dardesh (Unleashed)." Researchers note that the application ties together Desert Scorpion with another surveillanceware called "FrozenCell;" these malwares are believed to be in active development by one threat group dubbed "APT-C-23." The Dardesh application masquerades as a messaging application that itself is being distributed by phishing emails and messages, specifically via Facebook.<br/> <a href="https://forum.anomali.com/t/lookout-finds-new-surveillanceware-in-google-play-with-ties-to-known-threat-actor-targeting-the-middle-east/2383" target="_blank">Click here for Anomali recommendation</a></p>

Get the Latest Anomali Updates and Cybersecurity News – Straight To Your Inbox

Become a subscriber to the Anomali Newsletter
Receive a monthly summary of our latest threat intelligence content, research, news, events, and more.