text
stringlengths
8
115k
# ‘Hidden Bee’ Miner Delivered via Improved Drive-by Download Toolkit Malwarebytes Labs July 26, 2018 This blog post was authored by @hasherezade and Jérôme Segura. We recently detected a drive-by download attack trying to exploit CVE-2018-4878, a vulnerability in Flash Player, in a sequence that was not matchin...
# Ransomware Gangs are Starting to Look Like Ocean’s 11 The cybercrime underground ecosystem once housed cybercriminals who would perform attacks from start to finish on their own. This one-man show has nearly completely dissolved, though, as one of the most prominent trends that emerged instead is the specialization ...
# BLANK SLATE MALSPAM STOPS PUSHING LOCKY, STARTS PUSHING SAGE 2.2 RANSOMWARE ## ASSOCIATED FILES: - Zip archive of the pcaps: 2017-10-13-Blank-Slate-campaign-pushes-Sage-2.2-ransomware.pcap.zip 1.6 MB (1,592,055 bytes) - Zip archive of the spreadsheet tracker: 2017-10-13-Blank-Slate-malspam-tracker.csv.zip 1.4 kB (1,...
# ThreatConnect Research Roundup: Ryuk and Domains Spoofing ESET and Microsoft Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in observations of related indicators across ThreatConnect’s CAL™ (Col...
# New Internet Explorer Zero-Day Exploited in Hong Kong Attacks Bug patched by Microsoft yesterday (CVE-2015-2502) has already been exploited in watering hole attacks to deliver Korplug malware. **By:** Symantec Security Response **Created:** 19 Aug 2015 A newly patched zero-day vulnerability in Internet Explorer ...
# Conti Affiliates Use ProxyShell Exchange Exploit in Ransomware Attacks An investigation into recent attacks by a Conti affiliate reveals that the attackers initially accessed targeted organizations’ networks with ProxyShell, an exploit of vulnerabilities in Microsoft Exchange that have been the subject of multiple c...
# Hunting Cobalt Strike C2 with Shodan **Michael Koczwara** September 25, 2021 Four techniques: - Default certificate. - Hash + 50050 port (FP filtering is required). - JARM (FP filtering is required). - ASN/ISP scanning (this one is handy for subnet pivoting). You can read my Twitter thread where I explained the ...
# Russia's Hack Wasn't Cyberwar. That Complicates US Strategy The list of US government agencies compromised in the SolarWinds hack continues to expand, with reports of infiltrations at Treasury, Commerce, Homeland Security, and potentially State, Defense, and the CDC. This is a big deal for national security: It is t...
# Meet Kraken: A New Golang Botnet in Development **February 16, 2022 | by Stephan Simon** February 22, 2022 Editor’s Note: Since conducting his initial research, ZeroFox Intelligence Researcher Stephan Simon has uncovered additional details about the operators and the botnet. Updates have been published here. In la...
# Unmasking CamoFei ## An In-depth Analysis of an Emerging APT Group Focused on Healthcare Sectors in East Asia ### Still Hsu, DuckLL - Threat Intelligence Researcher @ TeamT5 - Non-binary (they/them) - Part-time streamer - Speaker of Conferences: BlackHat Asia, HITB, HITCON, CODE BLUE - UCCU Hacker Core Member ## ...
# From Cracks to Empty Wallets – How Popular Cracks Lead to Digital Currency and Data Theft For about three years, hackers have been stealing cryptocurrency from victims’ Monero wallets using powerful malware delivered through software cracks for popular apps. Cracks and patches have been around since the advent of co...
# Spear Phishing against Cryptocurrency Businesses As of June 2019, JPCERT/CC has observed targeted emails to some Japanese organisations. These emails contain a URL to a cloud service and convince recipients to download a zip file which contains a malicious shortcut file. This article will describe the details of the...
# Night Sky is the Latest Ransomware Targeting Corporate Networks It's a new year, and with it comes a new ransomware to keep an eye on called 'Night Sky' that targets corporate networks and steals data in double-extortion attacks. According to MalwareHunterTeam, who first spotted the new ransomware, the Night Sky ope...
# Excel 4 Macros: "Abnormal Sheet Visibility" **Published:** 2020-10-26 **Last Updated:** 2020-10-26 21:53:07 UTC **by Didier Stevens (Version: 1)** **3 comment(s)** Excel 4 macros are composed of formulas (commands) and values stored inside a sheet. Each sheet in a spreadsheet can be "visible", "hidden" or "...
# Analyzing Gootkit's Persistence Mechanism Malware authors are quite known for their innovation. A couple of years back, we wouldn't have imagined running into Node.js and JavaScript-based malware, yet that's exactly what Gootkit does. Gootkit is a piece of banking malware that uses web-injects (just like ZeuS and it...
# SectorC08: Multi-Layered SFX in Recent Campaigns Target Ukraine ## Overview Unlike other state-sponsored threat actors, SectorC08 appears to be only concerned with a single target: Ukraine. Artifacts of their likely activity have been found as far back as 2013, and up until today, their modus operandi in the initia...
# Defend and Deter Last week, Microsoft announced that Nobelium, a skilled hacking group associated with the Russian SVR and behind the SolarWinds attack last year, was engaged in phishing attacks targeting thousands of accounts at hundreds of government and human rights agencies. Today, we’re providing an update on o...
# Dacls, the Dual platform RAT ## Background On October 25, 2019, a suspicious ELF file (80c0efb9e129f7f9b05a783df6959812) was flagged by our new threat monitoring system. At first glance, it seems to be just another one of the regular botnets, but we soon realized this is something with potential link to the Lazarus...
# THREAT ALERT: Inside the Redeemer 2.0 Ransomware The Cybereason Global Security Operations Center (SOC) Team issues Cybereason Threat Alerts to inform customers of emerging impacting threats. The Alerts summarize these threats and provide practical recommendations for protecting against them. In this article, the Cy...
# Sowbug: Cyber Espionage Group Targets South American and Southeast Asian Governments Symantec has identified a previously unknown group called Sowbug that has been conducting highly targeted cyber attacks against organizations in South America and Southeast Asia, focusing on foreign policy institutions and diplomati...
# Targeted Attacks Against the Energy Sector **Candid Wueest** Version 1.0 – January 13, 2014, 14:00 GMT --- ## Overview The energy sector has become a major focus for targeted attacks and is now among the top five most targeted sectors worldwide. Companies in the sector are facing a growing risk of having their ...
# How Vietnam-based hacking operation OceanLotus targets journalists February 1, 2021 A woman is pictured using a computer at a conference in Berlin, Germany on December 27, 2010. Vietnam-based hacking operation OceanLotus has targeted journalists in Germany. (Reuters/Thomas Peter) In early 2020, Vietnamese writer B...
# The Full Story of the Stunning RSA Hack Can Finally Be Told Andy Greenberg May 20, 2021 Amid all the sleepless hours that Todd Leetham spent hunting ghosts inside his company’s network in early 2011, the experience that sticks with him most vividly all these years later is the moment he caught up with them. Or ...
# Zoho Patches Actively Exploited Critical ADSelfService Plus Bug The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning that hackers are exploiting a critical vulnerability in Zoho’s ManageEngine ADSelfService Plus password management solution that allows them to take control of the system. ADSel...
# BLATSTING Command-and-Control Protocol In this installment I’m going to describe the Command-and-Control (or C&C) protocol of BLATSTING. This is the protocol used in the network traffic between the malware and what is used by the person controlling it. I’m also going to see whether this traffic can be detected. ## ...
# UISGCON11: Конференция по информационной безопасности Уже традиционно и на радость всем неравнодушным ИТ-шникам (и не только) 4 декабря 2015 в г. Киеве состоялась конференция Украинской группы информационной безопасности UISGCON11. От начала и до конца мероприятия, то ли потому, что было много заинтересованных и ком...
# The COVID-19 Vaccine's Global Cold Chain Continues to Be a Target In December 2020, IBM Security X-Force released a research blog disclosing that the COVID-19 cold chain — an integral part of delivering and storing COVID-19 vaccines at safe temperatures — was targeted by cyber adversaries. After that first report, w...
# Tyupkin ATM Malware: Take The Money Now Or Never! **December 13, 2017** **Posted by Alexander Sevtsov** A Sandbox is a dynamic file analysis system that allows a researcher to analyze the behavior of potentially malicious code in a virtualized environment without damaging a real host system. In some cases, a sand...
# MALWARE TECHNICAL INSIGHT: TURLA “Penquin_x64” ## EXECUTIVE SUMMARY The APT group known as Turla (aka Snake, Venomous Bear, Group 88, Uroburos, Waterbug and others) is a well-established collective that has been operational since at least 2004. Turla is one of the most advanced APTs in the world; it is famous for d...
# Advanced Persistent Threats (APTs) ## APT39 **Suspected attribution:** Iran **Target sectors:** While APT39's targeting scope is global, its activities are concentrated in the Middle East. APT39 has prioritized the telecommunications sector, with additional targeting of the travel industry and IT firms that suppor...
# Komplex Mac Backdoor Answers Old Questions A new piece of Mac malware, dubbed Komplex, has been discovered by Palo Alto Networks. This malware provides a backdoor into the system, like most other recent Mac malware. Where it gets most interesting, though, isn’t in its capabilities, but in the connections it allows u...
# How TrickBot Malware Hooking Engine Targets Windows 10 Browsers **Vitali Kremez** reveals how TrickBot’s hooking engine targets Chrome, Firefox, Explorer, and Edge in Windows 10. ## What is TrickBot Malware? Background & Summary TrickBot banking malware remains one of the more interesting and continually developin...
# BackdoorDiplomacy: Upgrading from Quarian to Turian **ESET researchers discover a new campaign that evolved from the Quarian backdoor** **Adam Burgher** **June 10, 2021** ## Executive summary An APT group that we are calling BackdoorDiplomacy, due to the main vertical of its victims, has been targeting Ministr...
# Korean Energy and Transportation Targets Attacked by OnionDog APT **Catalin Cimpanu** **March 9, 2016** Chinese security researchers from cyber-security vendor Qihoo 360 have blown the lid on a cyber-espionage APT named OnionDog that's been targeting Korean-speaking countries since October 2013. According to thei...
# A Short Journey into DarkVNC Attack Chain During an analysis of different remote desktop trojans, we came across an interesting attack chain which leverages an RTF that exploits CVE-2017-8759 to deliver DarkVNC, a malicious version of the well-known VNC, designed to silently remote-control a victim. ## DarkVNC Atta...
# Red Flags Fly Over Software Supply Chain-Compromised 3CX Update **Karlo Zanki** **Threat Research** **March 30, 2023** ReversingLabs is analyzing a supply chain compromise of the firm 3CX Ltd., a maker of enterprise voice over IP (VoIP) solutions. Beginning on March 22nd, 2023, compromised versions of the 3CXDe...
# MineBridge RAT Is on the Rise, With a Sophisticated Delivery Mechanism The MineBridge RAT was first identified in January 2020 by security researchers at FireEye, who observed the backdoor attacking financial institutions in the United States with some targets located in South Korea as well. MineBridge was initially...
# LockBit Ransomware Now Encrypts Windows Domains Using Group Policies **By Lawrence Abrams** **July 27, 2021** A new version of the LockBit 2.0 ransomware has been found that automates the encryption of a Windows domain using Active Directory group policies. The LockBit ransomware operation launched in September...
# Self-spreading Stealer Attacks Gamers via YouTube **Authors** Oleg Kupreev An unusual malicious bundle (a collection of malicious programs distributed in the form of a single installation file, self-extracting archive or other file with installer-type functionality) recently caught our eye. Its main payload is ...
# APT44 Report ## Sandworm ### Authors Gabby Roncone, Dan Black, John Wolfram, Tyler McLellan, Nick Simonian, Ryan Hall, Anton Prokopenkov, Dan Perez, Lexie Aytes, Alden Wahlstrom ### Acknowledgements Collaboration with companies and governments to track and mitigate threats is critical to our collective efforts to ...
# Stuxnet Malware Analysis Paper **Amr Thabet** September 6, 2011 This article will focus on Stuxnet’s Windows infection methods and spreading methods. The tricks used by Stuxnet and the evidence behind the criminals of Stuxnet. ## 1. Introduction Stuxnet is not only a new virus or worm but a new era of malware...
# ESET Industry Report on Government: Targeted but Not Alone ## APT Groups, Cybercriminals and the Need for Resilient IT Security for Government ### Introduction Despite the pitfalls in making predictions during a pandemic, we can be confident cyber-risks for government bodies will continue to grow, evolve, and requ...
# Analysis of Initial In The Wild Attacks Exploiting Log4Shell/Log4J/CVE-2021-44228 **Introduction** Log4J is an open-source logging platform running on Java and built into many web platforms. Public reports of exploitation started on December 9th, followed by wider exploitation on December 10th onwards. The exploit...
# The Dangers of Using Abandoned Plugins & Themes Krasimir Konov December 17, 2020 It’s not very often that we see abandoned components being used on a website — but when we do, it’s most often because the website was exhibiting malware-like behavior and we were called to investigate and clean up the site. Old a...
# LokiBot: Getting Equation Editor Shellcode While today’s analysis will be similar to one we’ve done before, it will be almost exactly the same as this one from SANS. Although it’s been done by others, it never hurts to practice using these tools and get that muscle memory down. We’ll be working off of this document ...
# Dissecting SmokeLoader (or Yulia's sweet ass proposition) In mid-August I started receiving some emails from Yulia. She wanted me to take a look at her sweet ass: I was not sure about it, but after receiving some more emails like this I took a look (I received the last one on the 10th of September). Then I found out...
# ACIDBOX Clustering June 26, 2020 Written By J A G-S Update 06.29.2020: As in all things, the wider wisdom of the threat intel community provides greater context. The code overlaps I was pointing to while scarcer were not in fact unique. As @TheEnergyStory points out, it’s Mbed TLS put through Visual Studio. Rel...
# TrickBot Gang Shuts Down Botnet After Months of Inactivity February 24, 2022 The operators of the TrickBot malware botnet have shut down their server infrastructure today after months of inactivity, bringing to an end one of the most dangerous and persistent malware operations seen in recent years. Prior to today’s...
# The ARC of Satori by ASERT Team on January 18th, 2018 Authors: Pete Arzamendi, Matt Bing, and Kirk Soluk. Satori, the heir-apparent to the infamous IoT malware Mirai, was discovered by researchers in December 2017. The word "satori" means "enlightenment" or "understanding" in Japanese, but the evolution of the Sa...
# Hackers Begin Weaponizing TCP Middlebox Reflection for Amplified DDoS Attacks March 2, 2022 Distributed denial-of-service (DDoS) attacks leveraging a new amplification technique called TCP Middlebox Reflection have been detected for the first time in the wild, six months after the novel attack mechanism was present...
# Hakbit Ransomware Campaign Against Germany, Austria, Switzerland Proofpoint researchers have been tracking a low-volume, email-based ransomware campaign targeting organizations in Austria, Switzerland, and Germany. The campaign leverages Hakbit, a variant of Thanos ransomware as a service (RaaS). The attack employs ...
# Not all "Internet Connections" are Equal People commonly think that any “Internet Connection” is exactly the same, or they may be vaguely aware that some connections are faster than others. However, there are significant differences between the connections. While these differences may not matter to someone who just ...
# A Rustock-ing Stuffer Joe Stewart Recently I took a look at the Rustock trojan in order to see what the financial motive behind it was. No surprise, as it turns out the motive is spam. Using a sandnet, I injected myself into the botnet, able to capture (and blackhole) a small portion of the spam being sent through ...
# Blackgear Cyberespionage Campaign Resurfaces Blackgear (also known as Topgear and Comnie) is a cyberespionage campaign dating back to 2008, at least based on the Protux backdoor used by its operators. It targets organizations in Japan, South Korea, and Taiwan, leveling its attacks on public sector agencies and telec...
# FireEye Uncovers CVE-2017-8759: Zero-Day Used in the Wild to Distribute FINSPY FireEye recently detected a malicious Microsoft Office RTF document that leveraged CVE-2017-8759, a SOAP WSDL parser code injection vulnerability. This vulnerability allows a malicious actor to inject arbitrary code during the parsing of ...
# 自己紹介 ## 小池倫太郎 - NTTセキュリティ・ジャパン SOCアナリスト - nao_sec - 悪性ファイルやスクリプトの解析 - 脅威情報の収集・調査 ## 中島将太 - サイバーディフェンス研究所 分析官 - nao_sec - RTFのExploit、シェルコード解析やマルウェア解析などを担当 ## モチベーションとゴール - Royal Roadを用いた標的型攻撃の特徴を把握 - Royal Roadによって生成されたRTFの挙動や特徴 - どのような脆弱性が悪用されるのか - どのようにマルウェアが実行されるのか - バージョン、アクターごとの特徴 - 攻撃アク...
# Evading Detection with Excel 4.0 Macros and the BIFF8 XLS Format Abusing legacy functionality built into the Microsoft Office suite is a tale as old as time. One functionality that is popular with red teamers and maldoc authors is using Excel 4.0 Macros to embed standard malicious behavior in Excel files and then ex...
# ASEC Report ## VOL.93 Q4 2018 ASEC (AhnLab Security Emergency Response Center) is a global security response group consisting of malware analysts and security experts. This report is published by ASEC and focuses on the most significant security threats and latest security technologies to guard against such threats....
# Sarbloh: The Ransomware With NO Demand By Rajesh R March 5, 2021 We came across this tweet about Sarbloh ransomware exploiting the current political climate of the country. We have seen malware using similar tactics in the past and enticing users with trending news like COVID-19 or the US elections as their the...
# Confidence in the Connected World ## Year in Review In 2018, CIS once again demonstrated the importance of our role as an independent, global leader in cybersecurity. Among our most notable accomplishments was the creation of the Elections Infrastructure Information Sharing & Analysis Center® (EI-ISAC®). Using the ...
# Mandiant Threat Hunting Guide ## Summary This document contains threat hunting guidance and queries for detecting abnormal and malicious activity across Snowflake customer database instances. Default retention policies for the relevant views enable threat hunting across the past year (365 days). ## Background On Ju...
# Tracking Subaat: Targeted Phishing Attack Leads to Threat Actor's Repository **By Unit 42** **October 27, 2017** **Category:** Unit 42 **Tags:** CVE-2012-0158, Downloader, QuasarRAT, Subaat In mid-July, Palo Alto Networks Unit 42 identified a small targeted phishing campaign aimed at a government organizati...
# Corporate Website Contact Forms Used to Spread BazarBackdoor Malware The stealthy BazarBackdoor malware is now being spread via website contact forms rather than typical phishing emails to evade detection by security software. BazarBackdoor is a stealthy backdoor malware created by the TrickBot group and is now unde...
# Threat Actors Exploiting Multiple CVEs Against Zimbra Collaboration Suite ## SUMMARY Update November 10, 2022: This product was written by the Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing and Analysis Center (MS-ISAC) with contributions by the Federal Bureau of Inv...
# SharpBeacon CobaltStrike Beacon written in .Net 4 用.net重写了stager及Beacon,其中包括正常上线、文件管理、进程管理、令牌管理、结合SysCall进行注入、原生端口转发、关ETW等一系列功能。 ## 如何使用 启动teamserver后会生成beacon_keys文件,我们需要提取出里面的RSA公私密钥后,复制到config.cs中,并在config.cs修改回传的URL和生成hash的随机数。 **How to use** Firstly, starting TeamServer and you got .cobaltstrike.beacon_key...
# Study of an APT Attack on a Telecommunications Company in Kazakhstan In October 2021, one of Kazakhstan’s telecommunication companies contacted Doctor Web, with suspicion of malware in the corporate network. During the first look, we found backdoors that were previously only used in targeted attacks. During the inve...
# The MsnMM Campaigns ## The Earliest Naikon APT Campaigns ### Introduction Over time, the Naikon APT appears to have used specific toolsets against organizations within a designated country, as though each campaign was focused on one country. There is sometimes crossover between campaigns in several ways: the backd...
# Malware Analysis 27-08-19 ## Malware Analysis ### Initial Vector The initial vector is an INP file (format used for the software InPage) with the exploit CVE-2017-12824. We can see here the 0x7E and 0x72 represent a class of type in the stream for use, an OLE stream for launching the first binary file. We can see ...
# New Mirai Variant Targeting Network Security Devices **By Vaibhav Singhal, Ruchna Nigam, Zhibin Zhang, and Asher Davila** **March 15, 2021** **Category: Unit 42** **Tags: CVE-2019-19356, CVE-2020-25506, CVE-2020-26919, CVE-2021-22502, CVE-2021-27561, CVE-2021-27562, IoT, Mirai, VisualDoor, vulnerabilities** #...