Summary :

The article discusses the Bring Your Own Vulnerable Driver (BYOVD) technique, highlighting its exploitation by malicious actors through vulnerable Windows drivers. It details various payloads, recent ransomware activities, and the challenges of creating malicious drivers in modern Windows environments. #BYOVD #WindowsSecurity #Malware

Keypoints :

BYOVD is a technique where attackers exploit known vulnerable drivers for malicious purposes.…
Read More

Summary:

Cisco Talos has identified a phishing campaign targeting Facebook business and advertising account users in Taiwan, utilizing deceptive emails and malware delivery methods to compromise victims. The threat actor employs various evasion techniques to bypass security measures, leveraging cloud services and obfuscation methods to deliver information stealers.…
Read More

Short Summary:

Cisco Talos has uncovered a phishing campaign utilizing the open-source toolkit Gophish, targeting Russian-speaking users. The campaign employs modular infection chains involving malicious documents and HTML files, leading to the deployment of PowerRAT and DCRAT payloads. The threat actor is actively developing their tools and using sophisticated methods to execute and maintain persistence on compromised machines.…

Read More

Short Summary:

Cisco Talos has identified a financially motivated threat actor, active since 2022, distributing a MedusaLocker ransomware variant named “BabyLockerKZ.” The actor has targeted organizations globally, with a notable increase in victims in South America since early 2023. The attacks utilize various publicly known tools and custom scripts for credential theft and lateral movement, showcasing a professional and aggressive approach.…

Read More

Short Summary:

Attackers are exploiting legitimate web features to send spam, utilizing automated processes and human involvement to manipulate web forms and email servers. Credential stuffing is also a significant threat, allowing attackers to access email accounts and send spam from legitimate domains. The article discusses various methods used by spammers and tools that facilitate these attacks, while also providing recommendations for users to enhance their security.…

Read More
Short Summary

Cisco Talos has identified a series of malicious Microsoft Office documents uploaded to VirusTotal, generated using the MacroPack framework. These documents, linked to various actors from countries including China, Pakistan, Russia, and the U.S., deliver multiple payloads, such as the Havoc and Brute Ratel frameworks, and a new variant of the PhantomCore RAT.…

Read More

ArcaneDoor is a campaign that is the latest example of state-sponsored actors targeting perimeter network devices from multiple vendors. Coveted by these actors, perimeter network devices are the perfect intrusion point for espionage-focused campaigns. As a critical path for data into and out of the network, these devices need to be routinely and promptly patched; using up-to-date hardware and software versions and configurations; and be closely monitored from a security perspective.…

Read More

By Joey Chen, Chetan Raghuprasad and Alex Karkins. 

Cisco Talos discovered a new ongoing campaign since at least February 2024, operated by a threat actor distributing three famous infostealer malware, including Cryptbot, LummaC2 and Rhadamanthys. Talos also discovered a new PowerShell command-line argument embedded in the LNK file to bypass anti-virus products and download the final payload into the victims’ host.…
Read More
During a threat-hunting exercise, Cisco Talos discovered documents with potentially confidential information originating from Ukraine. The documents contained malicious VBA code, indicating they may be used as lures to infect organizations.  The results of the investigation have shown that the presence of the malicious code is due to the activity of a rare multi-module virus that’s delivered via the .NET…
Read More

Cisco Talos would like to acknowledge Brandon White of Cisco Talos and Phillip Schafer, Mike Moran, and Becca Lynch of the Duo Security Research team for their research that led to the ,identification of these attacks.

Cisco Talos is actively monitoring a global increase in brute-force attacks against a variety of targets, including Virtual Private Network (VPN) services, web application authentication interfaces and SSH services since at least March 18, 2024.…

Read More
Cisco Talos discovered a new threat actor we’re calling “CoralRaider” that we believe is of Vietnamese origin and financially motivated. CoralRaider has been operating since at least 2023, targeting victims in several Asian and Southeast Asian countries.  This group focuses on stealing victims’ credentials, financial data, and social media accounts, including business and advertisement accounts.…
Read More
Cisco Talos Incident Response (Talos IR) has observed the ongoing use of legitimate digital document publishing (DDP) sites for phishing, credential theft and session token theft during recent incident response and threat intelligence engagements. Hosting phishing lures on DDP sites increases the likelihood of a successful phishing attack, since these sites often have a favorable reputation, are unlikely to appear on web filter blocklists, and may instill a false sense of security in users who recognize them as familiar or legitimate.…
Read More
Cisco Talos observed a surge in GhostSec, a hacking group’s malicious activities since this past year. GhostSec has evolved with a new GhostLocker 2.0 ransomware, a Golang variant of the GhostLocker ransomware. The GhostSec and Stormous ransomware groups are jointly conducting double extortion ransomware attacks on various business verticals in multiple countries. …
Read More
Cisco Talos has discovered a new campaign operated by a threat actor distributing a previously unknown malware we’re calling “TimbreStealer.” This threat actor was observed distributing TimbreStealer via a spam campaign using Mexican tax-related themes starting in at least November 2023. The threat actor has previously used similar tactics, techniques and procedures (TTPs) to distribute a banking trojan known as “Mispadu.”…
Read More
Cisco Talos, in cooperation with CERT.NGO, has discovered new malicious components used by the Turla APT. New findings from Talos illustrate the inner workings of the command and control (C2) scripts deployed on the compromised WordPress servers utilized in the compromise we previously disclosed. Talos also illustrates the post-compromise activity carried out by the operators of the TinyTurla-NG (TTNG) backdoor to issue commands to the infected endpoints.…
Read More