August 8, 2017
-
Anomali Threat Research
,

Weekly Threat Briefing: WannaCry Hero Arrested, One of Two Charged with Distribution of Kronos Malware

<p>The intelligence in this week’s iteration discuss the following threats: <strong>APT</strong>, <strong>Data Breach</strong>, <strong>Exploit Kits</strong>, <strong>Malspam</strong>, <strong>Mobile</strong>, <strong>Phishing</strong>, <strong>Ransomware</strong>, and <strong>Spyware</strong>. The IOCs related to these stories are attached to the WTB and can be used to check your logs for potential malicious activity.</p><h2>Trending Threats</h2><p><a href="https://malwarebreakdown.com/2017/08/07/campaign-leads-to-rig-ek-and-fake-flash-player-update-site-rig-drops-urlzone-and-fake-flash-player-update-drops-a-miner/" target="_blank"><b>Campaign Leads to RIG EK and Fake Flash Player Update Site. RIG Drops URLZone and Fake Flash Player Update Drops a Miner </b></a> (<i>August 7, 2017</i>)<br/> Researchers have discovered that the RIG Exploit Kit (EK) campaign is redirecting users to malicious locations that drop the "URLZone" banking trojan. Other instances in this campaign present users with fake Adobe Flash Player updates when video streaming websites are visited in attempts to trick the user that the update is needed to properly view the video. The malware downloaded via the fake Flash update was identified to be "XMRig CoinMiner." The malware is being distributed via redirection attacks that lead to the RIGEK.<br/> <b>Recommendation:</b> Exploit kits, in general, are a common threat because they are often easily available to threat kits for purchase on underground forums. The kits, put together by skilled actors, are then sold to criminal groups as easily deployable exploitation frameworks. Users should be educated on how to browse the web as safely as possible, and to report any suspicious symptoms observed on their devices to IT/secops immediately. Additionally, web browsers should be kept up-to-date and any suspicious activity should be reported to the appropriate personnel.<br/> <b>Tags:</b> RIGEK, Adobe Flash Player</p><p><a href="https://info.phishlabs.com/blog/smoke-loader-adds-additional-obfuscation-methods-to-mitigate-analysis" target="_blank"><b>Smoke Loader Adds Additional Obfuscation Methods to Mitigate Analysis </b></a> (<i>August 4, 2017</i>)<br/> According to PhishLabs, the malware downloading module, "Smoke Loader" (Dofoil), has received some updates by its creators. The malware has been upgraded to include new and more complex anti-analysis features such as checking the infected host for indicators related to malware analysis techniques. Smoke Loader has been offered for sale on underground forums since at least 2011, and it is known primarily for dropping the RIG exploit kit on infected machines to download additional malware.<br/> <b>Recommendation:</b> Exploit kits have become one of the most common types of crimeware currently available to the less than sophisticated threat actor. The kits, put together by skilled actors, are then sold to criminal groups as easily deployable exploitation frameworks. The best protection from exploit kits is through employee education in combination with keeping web browsing software (including extensions such as flash and java) up to date at all times, as well as operating system software. Users should be educated on how to browse the web as safely as possible, and to report any suspicious symptoms observed on their devices to IT/secops immediately. In the case of a compromise by Rig, the infected system must be wiped and reformatted.<br/> <b>Tags:</b> Smoke Loader, Malware</p><p><a href="http://blog.trendmicro.com/trendlabs-security-intelligence/cerber-ransomware-evolves-now-steals-bitcoin-wallets/" target="_blank"><b>Cerber Ransomware Evolves Again, Now Steals From Bitcoin Wallets </b></a> (<i>August 3, 2017</i>)<br/> The threat actors behind the "Cerber" ransomware have once again updated their malware, according to Trend Micro researchers. In this iteration, Cerber has been updated to include the functionality of targeting Bitcoin, Electrum, and MultiBit wallets and stealing their contents. Additionally, this Cerber variant is also capable of stealing saved passwords in multiple web browsers including Internet Explorer, Google Chrome, and Mozilla Firefox. The malware is being distributed via an email with no content and a zip file attachment that will infect the recipient if opened.<br/> <b>Recommendation:</b> All employees should be educated on the risks of malspam, and how to identify such attempts. Poor grammar and urgent content are often indicators of these type of attacks. Additionally, messages that request a recipient to open a file attachment should also be avoided.<br/> <b>Tags:</b> Cerber, Ransomware</p><p><a href="https://threatpost.com/wannacry-hero-arrested-one-of-two-charged-with-distribution-of-kronos-malware/127186/" target="_blank"><b>WannaCry Hero Arrested, One of Two Charged with Distribution of Kronos Malware </b></a> (<i>August 3, 2017</i>)<br/> The researcher who was praised for preventing further distribution of the "WannaCry" ransomware, was arrested by authorities in Las Vegas, Nevada, U.S. At the time of this writing, Marcus Hutchins has been indicted for creating the "Kronos" banking malware, and another unnamed individual indicted for offering it for purchase on various underground markets. Kronos is often distributed by exploit kits, and functions by using web-injections that imitate a legitimate website to steal user credentials.<br/> <b>Recommendation:</b> Exploit kits have become one of the most common types of crimeware currently available to the less than sophisticated threat actor. The kits, put together by skilled actors, are then sold to criminal groups as easily deployable exploitation frameworks. The best protection from exploit kits is through employee education in combination with keeping web browsing software (including extensions such as flash and java) up to date at all times, as well as operating system software. Users should be educated on how to browse the web as safely as possible, and to report any suspicious symptoms observed on their devices to IT/secops immediately. In the case of a compromise, the infected system must be wiped and reformatted.<br/> <b>Tags:</b> WannaCry, Researcher, Cybercrime</p><p><a href="https://www.bleepingcomputer.com/news/security/ukrainian-firm-facing-legal-action-for-damages-caused-by-notpetya-ransomware/" target="_blank"><b>Ukrainian Firm Facing Legal Action for Damages Caused by NotPetya Ransomware </b></a> (<i>August 3, 2017</i>)<br/> A Ukrainian law firm, Justcutum Attorneys Association, is attempting to gather support from victims of the global NotPetya ransomware campaign for a collection lawsuit. As of this writing, the suit would be filed against the company responsible for MEDoc's accounting software, "Intellect-Service LLC." Researchers' subsequent investigation of the event revealed that Intellect-Service had not updated their servers since at least 2013. Additionally, Ukrainian authorities have stated that they have not arrested any of the company's staff, but charges may be filed in the future.<br/> <b>Recommendation:</b> It is crucial that your company ensure that servers are always running the most current software version. In addition, your company should have policies in place in regards to the proper configurations needed for your servers in order to conduct your business needs safely. Furthermore, always practice Defense in Depth (don't rely on single security mechanisms - security measures should be layered, redundant, and failsafe). In the case of ransomware infection, the affected systems should be wiped and reformatted, even if the ransom is paid. Other machines on the same network should be scanned for other potential infections.<br/> <b>Tags:</b> NotPetya, Ransomware, Legal action</p><p><a href="https://www.theregister.co.uk/2017/08/02/chrome_web_developer_extension_hacked/" target="_blank"><b>Chrome Web Dev Plugin with 1m+ Users Hijacked, Crams Ads Into Browsers </b></a> (<i>August 2, 2017</i>)<br/> Chris Pederick, the developer of the "Web Developer" extension for Chrome, has discovered that his Google account has been the victim of a phishing attack by an unknown actor(s). Pederick is warning users of his tool to update to version 0.5 or later as soon as possible. The actor pushed an update, as version 0.4.9, to Web Developer's approximate 1,044,000 users that displays advertisements. The threat actor's version fetches JavaScript code from the web and forcibly displays advertisements and possibly other malicious functions.<br/> <b>Recommendation:</b> Users who installed version 0.4.9 of Web Developer should update to version 0.5 or later as soon as possible, or uninstall the extension and install a fresh copy. Additionally, it may also be wise to change passwords used in your Chrome browser while the infected extension was in use.<br/> <b>Tags:</b> Chrome extension, Breach</p><p><a href="https://blog.malwarebytes.com/cybercrime/2017/08/enemy-at-the-gates-reviewing-the-magnitude-exploit-kit-redirection-chain/" target="_blank"><b>Enemy at the Gates: Reviewing the Magnitude Exploit Kit Redirection Chain </b></a> (<i>August 2, 2017</i>)<br/> Malwarebytes researchers have released information detailing the "Magnitude" exploit kit's redirection attacks over the past several months. Currently, Magnitude is being distributed via malvertising campaigns that drop the "Cerber" ransomware on targets primarily located in South Korea. The actors behind Magnitude are abusing the Real-time Bidding (RTB) process, used by advertising companies to auction on which advertisements will be displayed on a website, to display malicious advertisements. If the malvertisement is followed, users are screened at a gate that chooses on whether or not the user should proceed to the exploit kit. The gate, dubbed "Magnigate," performs additional checks on the user's information such as browser information, Internet Service Provider (ISP), IP address, geolocation, operating system, and user agent.<br/> <b>Recommendation:</b> Users should be cautious when clicking on advertisements because as this story portrays, malicious advertisements can sometimes appear on legitimate online locations. However, clicking on such advertisements is not always required. If the advertised product is appealing, it would be safer to search for the product on the authentic websites of the company who is selling the product, or other trusted online shopping locations.<br/> <b>Tags:</b> Exploit kit, Magnitude</p><p><a href="https://threatpost.com/amazon-halts-sale-of-android-blu-phone-amid-spyware-concerns/127141/" target="_blank"><b>Amazon Halts Sale of Android Blu Phone Amid Spyware Concerns </b></a> (<i>August 1, 2017</i>)<br/> Last week during a talk at the Black Hat security conference, Kryptowire researchers discussed how the "Blu" Android smartphone gathered Personally Identifiable Information (PII) on its users. Amazon responded by stating that Blu phones will be "unavailable for purchase on Amazon.com" and will remain so "until the issue is resolved." However, at the time of this writing, the phones are still available for purchase on Amazon.com. The issue resides in Blu's firmware utility, "Adups," that is created by "Shanghai Adups Technology." Kryptowire researchers discussed how Adups was collecting various data such as call history (accompanied with full phone numbers), International Mobile Equipment Identity (IMEI), Media Access Control address, and serial number. The collected data is then sent back to Shanghai Adups Technology's servers.<br/> <b>Recommendation:</b> The threat of preinstalled threats has the possibility of hiding from even the most cautious of users; if the devices listed here are being used by your company, or for personal use, they should be properly wiped and restored. However, sometimes the operating system may have code that will reinfect the device. Additionally, it is important that mobile devices connecting to corporate and personal networks have trusted antivirus software installed that it always kept up-to-date.<br/> <b>Tags:</b> Spyware, Blu, Mobile</p><p><a href="https://blog.malwarebytes.com/threat-analysis/2017/08/trickbot-comes-with-new-tricks-attacking-outlook-and-browsing-data/" target="_blank"><b>TrickBot Comes with New Tricks – Attacking Outlook and Browsing Data </b></a> (<i>August 1, 2017</i>)<br/> The TrickBot Trojan has been updated recently with two new modules,. The first module "module.dll" is a large module written in C++. This module focuses on stealing data. It attempts to get the victim's website cookies, HTML5 local storage, browser history and grabs URL hits from a cache. Module.dll sets up a hidden desktop in order to have a workspace, to fingerprint browsers, that is not noticeable by the victim. The module contains a hardcoded HTML file with inline JavaScript that gets information on the browser's configuration. The module also has the ability to steal from locally stored databases by incorporating SQLite. The second module "outlook.dll" is written in Delphi. It attempts to steal Microsoft Outlook related data from registry keys.<br/> <b>Recommendation:</b> Users should be cautious when clicking on advertisements, malicious advertisements can sometimes appear on legitimate online locations. Always keep your browser and operating system up to date, including any browser add-ons you may need (Flash, Java). Employ network as well as host based detection and prevention systems where possible.<br/> <b>Tags:</b> Trickbot, Malware</p><p><a href="https://www.proofpoint.com/us/threat-insight/post/fin7carbanak-threat-actor-unleashes-bateleur-jscript-backdoor" target="_blank"><b>Fin7/Carbanak Threat Actor Unleashes Bateleur JScript Backdoor </b></a> (<i>July 31, 2017</i>)<br/> The financially motivated Advanced Persistent Threat (APT) group, "FIN7," has been identified to have added a new JScript backdoor to their arsenal, according to Proofpoint researchers. The backdoor is called, "Bateleur," and comes with updated malicious macros that are being used to target U.S.-based restaurants. The malware is being distributed via phishing emails that claim that the attachment is a check that was discussed previously. The emails are being sent from Outlook and Gmail accounts that both claim that the attached document has been encrypted and requires content to be enabled in order to properly view the document.<br/> <b>Recommendation:</b> Defense in depth (layering of security mechanisms, redundancy, fail safe defense processes) is the best way to ensure safety from APTs, including a focus on both network and host based security. Prevention and detection capabilities should also be in place. Furthermore, all employees should be educated on the risks of phishing, how to identify such attempts.<br/> <b>Tags:</b> FIN7/Carbanak, Bateleur backdoor, Phishing</p><p><a href="http://ew.com/tv/2017/07/31/hbo-hacked-game-of-thrones/" target="_blank"><b>HBO Hacked: Upcoming Episodes, Game of Thrones Data Leaked Online </b></a> (<i>July 31, 2017</i>)<br/> The American premium cable and satellite television network, HBO, has confirmed that it was breached by an unknown threat actor. The actor stole upcoming episodes for multiple shows including Ballers, Game of Thrones, and Room 104, that were then posted on a torrent website. Overall, the actor stole approximately 1.5 terabytes of data. The breach also included theft of HBO employee login credentials. Additionally, the actor(s) also stated that more episodes would be "coming soon."<br/> <b>Recommendation:</b> Defense in depth (layering of security mechanisms, redundancy, fail safe defense processes) is the best way to ensure safety from threat actors, including a focus on both network and host based security. Prevention and detection capabilities should also be in place. Additionally, password should not be stored in unencrypted documents and the user of password managers can assist in protecting login credentials.<br/> <b>Tags:</b> Data breach, HBO</p><p><a href="https://securelist.com/a-new-era-in-mobile-banking-trojans/79198/" target="_blank"><b>A New Era in Mobile Banking Trojans </b></a> (<i>July 31, 2017</i>)<br/> Researchers from Kaspersky have found a new version of the mobile banking malware family Svpeng. The modifications include new keylogger functionality that records keystrokes made through Android accessibility services which also allows it to grant more permissions and prevent uninstallation attempts. If it is granted permission to use the accessibility services, it can gain access to the UI of other applications and obtain data. It takes screenshots every time the victims presses the button on the keyboard and uploads it to a Command and Control (C2) server. If an application such as a banking app does not allow screenshots to be taken, a phishing window is drawn over the top of the application. The application does not affect the device if the victim's language is in Russian, suggesting that Russian actors are behind the Trojan.<br/> <b>Recommendation:</b> This Trojan is spread from malicious websites pretending to be a flash player. This Trojan even affects fully patched devices. Always use the Google Play Store to obtain your software, and avoid downloading applications, even if they appear legitimate, from third-party stores. In addition, it is important to review the permission the application will request and comments from others who have downloaded the application.<br/> <b>Tags:</b> Trojan, Android, Svpeng, Accessibilty Services</p><p><a href="http://www.malware-traffic-analysis.net/2017/07/31/index.html" target="_blank"><b>Malspam Pushing Globeimposter Ransomware </b></a> (<i>July 31, 2017</i>)<br/> Researchers have identified a malspam campaign that is distributing "Globeimposter" ransomware. The spam emails claim that the attached zip file is a payment receipt. If the zip file is opened, a malicious VBS script will launch a process that infects the user with ransomware. Researchers note that the malware does not present the infected user with decryption instructions, and they believe it is because the threat actors behind the campaign made mistakes in the malicious code.<br/> <b>Recommendation:</b> Always be on high alert while reading email, in particular when it has attachments, attempts to redirect to a URL, comes with an urgent label, or uses poor grammar. Use anti-spam and antivirus protection, and avoid opening email from untrusted or unverified senders.<br/> <b>Tags:</b> Malspam, Ransomware, Globeimposter</p><p><a href="http://www.securityweek.com/hackers-compromise-accounts-fireeye-threat-intelligence-analyst" target="_blank"><b>Hackers Compromise Accounts of FireEye Threat Intelligence Analyst </b></a> (<i>July 31, 2017</i>)<br/> An unknown actor, claiming to be called the "37337 hacker," compromised several social media accounts belonging to a Senior Threat Analyst at FireEye, according to a statement made by the company. The actor stole limited information including a small Microsoft Outlook contact list, emails, and whitepaper documents written by Cylance researchers. The threat actor(s) claim that this breach was part of "Operation #LeakTheAnalyst." According to the actor(s), the objective of this campaign is to track analysts online and tarnish their reputation. Additionally, FireEye has stated that it does not appear their network was compromised.<br/> <b>Recommendation:</b> It is important that your company and employees use different passwords for the different accounts that are being used. As this story portrays, previous breaches can allow actors to gain access to other accounts because users frequently use the same username and password combinations for multiple accounts. Furthermore, policies should be in place that require your employees to change their passwords on a frequent basis.<br/> <b>Tags:</b> Threat actor, Breach</p><h2>Observed Threats</h2><p>This section includes the top threats observed from the Anomali Community user base as well as sensors deployed by Anomali Labs. A ThreatStream account is required to view this section. <a href="https://www.anomali.com/products/threatstream" target="_blank">Click here to request a trial.</a></p><p><a href="https://ui.threatstream.com/tip/7471" target="_blank"><b>RIG exploit kit Tool Tip</b></a><br/> The RIG exploit kit is a framework used to exploit client side vulnerabilities in web browsers. The RIG exploit kit takes advantage of vulnerabilities in Internet Explorer, Adobe flash, Java and Microsoft Silverlight. The RIG exploit kit was first observed in early 2014. The RIG exploit kit's objective is to upload malicious code to the target system. The RIG exploit kit is known to distribute ransomware, spambots and backdoors. Victims are redirected to the RIG exploit kit with a landing page coming from malvertising or compromised sites.<br/> <b>Tags:</b> RIG, exploitkit</p>

Get the Latest Anomali Updates and Cybersecurity News – Straight To Your Inbox

Become a subscriber to the Anomali Newsletter
Receive a monthly summary of our latest threat intelligence content, research, news, events, and more.