Summary:

This report discusses the ClickFix social engineering tactic, which utilizes deceptive web pages to trick users into executing malicious PowerShell commands, leading to system infections. The analysis highlights various infection chains, detection opportunities, and the evolution of this tactic within the cybersecurity landscape.

Keypoints:

ClickFix is a new social engineering tactic monitored since May 2024.…
Read More

Summary:

This article discusses an incident involving a threat actor’s unsuccessful attempt to bypass Cortex XDR, which inadvertently provided valuable insights into their operations. Through the investigation, Unit 42 uncovered the use of an AV/EDR bypass tool and identified the threat actor’s identity, revealing their tactics and tools utilized in the attack.…
Read More
Short Summary

Unit 42 has identified Jumpy Pisces, a North Korean state-sponsored threat group, as a key player in a recent ransomware incident involving collaboration with the Play ransomware group. This marks a significant shift in Jumpy Pisces’ tactics, indicating their deeper involvement in the ransomware landscape, moving from cyberespionage to potential ransomware attacks targeting a wide range of victims globally.…

Read More

Short Summary:

The Cybereason Threat Analysis report investigates the Beast Ransomware-as-a-Service (RaaS) platform, detailing its capabilities, operational methods, and recommendations for defense. The report highlights the group’s expanding marketplace, customizable binaries, and advanced detection and prevention techniques employed by the Cybereason Defense Platform.

Key Points:

Expanding Marketplace: Beast Ransomware group continuously updates tools to attract a wider audience in the cybercrime ecosystem.…
Read More

Short Summary:

In July 2024, Palo Alto Networks identified Lynx ransomware, a successor to INC ransomware, which has targeted various sectors in the U.S. and UK. Lynx operates under a ransomware-as-a-service model and employs double-extortion tactics, exfiltrating data before encryption. The article outlines the delivery mechanisms, technical analysis, and comparisons with INC ransomware, emphasizing the need for robust cybersecurity measures.…

Read More
Short Summary

Unit 42 has identified ongoing malicious activities by North Korean threat actors, known as the CL-STA-240 Contagious Interview campaign. These actors pose as recruiters to lure job seekers into downloading malware, specifically the BeaverTail downloader and the InvisibleFerret backdoor. The campaign has evolved with updates to the malware, which now targets both macOS and Windows platforms, and includes features for stealing sensitive data, particularly cryptocurrency wallets.…

Read More

Summary: Security Operations Center (SOC) practitioners are increasingly frustrated with their current threat detection tools, which create excessive alerts and hinder their ability to identify real threats. Despite growing confidence in their capabilities and optimism about AI’s potential, many practitioners feel overwhelmed by the number of tools and alerts they manage, leading to a search for more effective solutions like extended detection and response (XDR).…

Read More

Summary: Microsoft has reported a multi-staged attack by the threat actor Storm-0501, which compromised hybrid cloud environments leading to data exfiltration, credential theft, and ransomware deployment across various sectors in the United States. This financially motivated cybercriminal group has evolved from targeting educational institutions to exploiting vulnerabilities in cloud infrastructures, emphasizing the need for enhanced security measures in hybrid environments.…

Read More
Introduction

In light of the escalating frequency and complexity of ransomware attacks, are security leaders confident in their organization’s defenses? According to Group-IB’s Hi-Tech Crime Trends 2023/2024 Report, ransomware will have an increasingly significant impact in 2024 and beyond. Key trends driving this include the expansion of the Ransomware-as-a-Service (RaaS) market, the proliferation of stolen data on Dedicated Leak Sites (DLS), and a rise in affiliate programs.…

Read More
Short Summary: Microsoft has reported a multi-staged attack by the threat actor Storm-0501, targeting hybrid cloud environments in various sectors across the U.S. The group, financially motivated, has been active since 2021 and has evolved to conduct ransomware operations using various techniques, including credential theft, lateral movement, and data exfiltration, ultimately leading to ransomware deployment.…
Read More
Short Summary

The article discusses the discovery of a new strain of the RomCom malware family, named SnipBot, which exhibits advanced techniques for evasion and obfuscation. This malware allows attackers to execute commands, download additional modules, and pivot through victim networks for data exfiltration. The investigation reveals the malware’s infection chain, post-infection activities, and the potential motivations behind the attacks.…

Read More
Short Summary: Trend Micro’s report on the Water Bakunawa group highlights their use of the RansomHub ransomware, which employs advanced anti-EDR techniques, including the EDRKillShifter tool, to evade detection and disrupt security measures. The group exploits vulnerabilities like Zerologon to gain access to networks and has targeted various critical infrastructure sectors, demanding ransoms while threatening to release compromised data.…
Read More

Short Summary:

This article discusses the discovery of a new post-exploitation red team tool called Splinter, identified on customer systems through Advanced WildFire’s memory scanning tools. It highlights the importance of continuous tracking and detection of such tools to enhance security. Splinter, developed in Rust, has standard post-exploitation features and poses a potential threat if misused.…

Read More

Short Summary:

Unit 42 researchers have identified an ongoing campaign that delivers Linux and macOS backdoors through poisoned Python packages, named PondRAT. This campaign is linked to the Gleaming Pisces threat actor, known for sophisticated attacks against the cryptocurrency industry. The researchers found significant code similarities between PondRAT and POOLRAT, another malware attributed to Gleaming Pisces.…

Read More

Summary: The report by Command Zero highlights the significant challenges faced by SecOps leaders, particularly the skills gap in cybersecurity and the operational difficulties with commonly used tools. It emphasizes the need for investment in talent development and continuous learning to address these issues effectively.

Threat Actor: Command Zero | Command Zero Victim: Cybersecurity Professionals | Cybersecurity Professionals

Key Point :

There is a significant skills shortage in cybersecurity, particularly in cyber investigations, leading to burnout among existing teams.…
Read More

Short Summary:

This article provides a comprehensive overview of North Korean threat groups under the Reconnaissance General Bureau (RGB) and their associated malware. It highlights the various operations these groups conduct, including espionage, financial crime, and destructive attacks. The article also discusses the detection and prevention capabilities of Palo Alto Networks Cortex XDR against these threats.…

Read More

Short Summary:

On August 19, 2024, Microsoft reported that a North Korean threat actor, Citrine Sleet, exploited a zero-day vulnerability in Chromium (CVE-2024-7971) to gain remote code execution, targeting the cryptocurrency sector. This blog details the tactics, techniques, and procedures (TTPs) used in the attack, the FudModule rootkit, and provides recommendations for mitigation and detection.…

Read More

Short Summary:

Between April and July 2024, Microsoft identified the Iranian state-sponsored threat actor Peach Sandstorm deploying a new multi-stage backdoor named Tickler, targeting sectors such as satellite, communications, oil and gas, and government in the US and UAE. The group also conducted password spray attacks and intelligence gathering via LinkedIn, indicating a focus on intelligence collection for Iranian state interests.…

Read More
Short Summary

The threat actor group Bling Libra, known for the ShinyHunters ransomware, has shifted tactics from selling stolen data to extorting victims. They gained access to an organization’s AWS environment using legitimate credentials obtained from public repositories. Despite limited permissions, they conducted reconnaissance and deleted data from S3 buckets, ultimately sending an extortion email to the victim.…

Read More

Short Summary:

This publication outlines best practices for event logging to enhance cyber security and resilience against threats. Developed by the Australian Cyber Security Centre (ACSC) in collaboration with international partners, it emphasizes the importance of effective logging solutions to support incident response, reduce alert noise, and ensure compliance with organizational policies.…

Read More
Short Summary

Unit 42 researchers uncovered a cloud extortion campaign that exploited misconfigurations, particularly exposed environment variable files (.env files), to compromise and extort multiple organizations. The attackers utilized various tactics, including scanning for sensitive information and leveraging cloud services, to execute their operations and ransom data without encryption.…

Read More
Short Summary

The rise of DeathGrip ransomware, a Ransomware-as-a-Service (RaaS) model, highlights the decreasing barrier to entry for cybercriminals. With tools like LockBit 3.0 and Yashma/Chaos readily available, even those with minimal skills can launch sophisticated attacks. DeathGrip promotes its services through Telegram, offering features such as advanced encryption, security evasion techniques, and system manipulation capabilities.…

Read More
Short Summary

The RHADAMANTHYS stealer has emerged as a sophisticated threat targeting Israeli users through social engineering tactics, particularly phishing emails. This malware, developed by Russian-speaking actors, employs a multi-stage infection process, advanced anti-analysis techniques, and extensive data exfiltration capabilities, posing a significant risk to sensitive information.…

Read More

A recent faulty configuration file in CrowdStrike’s Falcon platform caused a significant IT disruption, rendering millions of Windows machines inoperable. The result was a multi-day outage event, which affected critical sectors such as airlines, banks, and hospitals, and underscored the immense responsibility and potential risk associated with kernel accessibility given to a third-party security solution.  …

Read More
Executive Summary

In this post, we share information about how security professionals can take analysis shortcuts to quickly triage and analyze multiple malware samples. Within minutes, we can determine the malware families from a group of samples, parse the embedded configuration and extract the associated network indicators of compromise (IoCs).…

Read More

On May 23, 2023, the U.S., Australia, New Zealand, Canada and the U.K. issued a joint advisory about a suspected Chinese state-sponsored threat actor group that infiltrates firewalls, routers and virtual private networks (VPNs) belonging to critical infrastructure organizations. The group is primarily referred to as Volt Typhoon aka BRONZE SILHOUETTE, Dev-0391, Insidious Taurus, Storm-0391, UNC3236, VANGUARD PANDA, VOLTZITE.…

Read More

Key Takeaways 

Cyble Research and Intelligence Labs (CRIL) has uncovered a multi-stage cyberattack campaign with a Zip file containing a malicious shortcut (.lnk) file.  

When the shortcut is executed, it downloads a PowerShell script, initiating a chain of events that ultimately allows the Threat Actor (TA) to gain Remote Desktop Protocol (RDP) access to the victim’s system. …
Read More

Our threat hunters discovered CVE-2024-38112, which was used as a zero-day by APT group Void Banshee, to access and execute files through the disabled Internet Explorer using MSHTML. We promptly identified and reported this zero-day vulnerability to Microsoft, and it has been patched.

Report Highlights:

In May, ZDI threat hunters under Trend Micro’s Zero Day Initiative discovered a vulnerability that the APT group Void Banshee had been exploiting in an updated Atlantida Stealer campaign.…
Read More

A supply chain attack is a prominent “Initial Access” tactic employed by malware authors and Advanced Persistent Threat (APT) groups to gain a foothold on their targeted hosts or systems. This method involves compromising a third-party service or software that is trusted by the target, thereby injecting malicious code into legitimate software updates or distributions.…

Read More
Executive Summary

This article shows how to circumvent anti-analysis techniques from GootLoader malware while using Node.js debugging in Visual Studio Code. This evasion technique used by GootLoader JavaScript files can present a formidable challenge for sandboxes attempting to analyze the malware.

Sandboxes with limited computing resources can struggle to analyze a large volume of binaries.…

Read More