This article discusses the rising threat of malware campaigns utilizing fake CAPTCHA pages to deceive users into executing malicious commands. These tactics, employed by both common cybercriminals and advanced threat actors, highlight the need for organizations to enhance employee awareness and implement robust cybersecurity measures. #CyberSecurity #Malware #CAPTCHA

Keypoints :

Malware campaigns are using fake CAPTCHA pages to mimic trusted services.…
Read More

This report highlights the significant rise in phishing incidents and malware activity, particularly targeting U.S. organizations. Key threats include “SocGholish” and “LummaC2” malware, alongside increasing ransomware attacks, especially from “RansomHub.” Organizations are urged to enhance their cybersecurity measures and training to combat these evolving threats. #Cybersecurity #Phishing #Ransomware

Keypoints :

Phishing incidents accounted for 46% of all customer incidents from August 1 to October 31, 2024.…
Read More

Short Summary:

In July 2024, a ReliaQuest customer in the manufacturing sector experienced a data exfiltration attack. The threat actor exploited a Fortinet firewall and used a brute-force attack on a privileged service account to gain access to multiple file servers, exfiltrating sensitive business data. The ReliaQuest Threat Hunting team collaborated with the customer to isolate affected hosts and implement remediation strategies, including the use of GreyMatter Response Playbooks for rapid response.…

Read More

Summary: The report discusses the growing trend of threat actors exploiting legitimate IT tools for malicious operations, termed CAMO (Commercial Applications, Malicious Operations), which allows them to bypass security measures and evade detection. It emphasizes the need for organizations to recognize this threat and implement effective countermeasures to mitigate risks associated with the misuse of these tools.…

Read More

Short Summary:

In 2024, malware loaders have become a prevalent tool in cyberattacks, with loaders like SocGholish, GootLoader, and Raspberry Robin leading the charge. These loaders utilize sophisticated evasion techniques and are increasingly leveraging scripting languages like Python for persistence and stealth. The report highlights the evolution of these loaders, their impact on organizations, and provides mitigation strategies for cybersecurity professionals.…

Read More

Summary: This report analyzes the rising use of data-exfiltration tools, particularly Rclone, by threat actors in cyber incidents, highlighting their capabilities and the implications for organizations. It also provides recommendations for enhancing security measures to mitigate the risks associated with data exfiltration.

Threat Actor: Various threat groups | LockBit, Black Basta, Blacksuit Victim: Organizations across sectors | US manufacturing sector, UK professional services

Key Point :

Rclone has been identified as the most frequently used data-exfiltration tool, appearing in 57% of incidents investigated by ReliaQuest.…
Read More

Key Points

In June 2024, ReliaQuest responded to detections from an endpoint detection and response (EDR) tool signaling the beginning of a ransomware attack by the “Medusa” ransomware group that resulted in the encryption of various hosts in a customer environment. Since 2022, the Ransomware-as-a-Service (RaaS) group Medusa has targeted organizations in the technology, education, manufacturing, and healthcare sectors by taking advantage of unpatched vulnerabilities and hijacking legitimate accounts.…
Read More

Key Points

ReliaQuest observed new execution techniques in a campaign from the JavaScript framework “ClearFake,” tricking users into copying, pasting, and manually executing malicious PowerShell code. Upon execution, the PowerShell code performs multiple functions, including clearing the DNS cache, displaying a message box, downloading further PowerShell code, and installing “LummaC2” malware.…
Read More

Summary: This report examines the threat posed by Russia-linked advanced persistent threat (APT) groups on operational technology (OT) by analyzing key cyber attacks from the past 12 months, providing detection rules and recommendations for network defenders.

Threat Actor: Russia-linked APT groups | Russia-linked APT groups Victim: Various industries and specifically a manufacturing industry customer | manufacturing industry

Key Points:

This report analyzes cyber attacks conducted by Russia-linked APT groups on operational technology (OT) in the past year, providing useful detection rules and recommendations for network defenders.…
Read More

In early September 2023, ReliaQuest detected suspicious process executions within a customer’s environment, originating from the Windows debug directory. Our subsequent investigation revealed these executions as part of a more significant cyber-threat incident that resulted in double extortion: the encryption of customer data, followed by ransomware deployment and a threat to publicly release the data. …

Read More