Group-IB
2.21K subscribers
744 photos
26 videos
2 files
530 links
Your daily source of cybersecurity news brought to you by Group-IB, one of the global industry leaders.
Download Telegram
Let's dive a little bit deeper into the ransomware threat. According to the latest edition of Group-IBโ€™s annual Hi-Tech Crime Trends report, ransomware will remain the top threat for organizations and businesses in 2023.

Here are some highlights:

๐Ÿ“Across the globe, 2,886 companies had their information, files, and data published on ransomware DLS between H2 2021 โ€“ H1 2022.

๐Ÿ“The top five most affected countries were the United States, Germany, United Kingdom, Canada, and Italy.

๐Ÿ“The largest number of ransomware-related data leak victims were found in the following sectors: manufacturing, real estate, professional services, and transportation industries.

๐Ÿ“The most active ransomware groups in H2 2021 โ€“ H1 2022 were Lockbit, Conti, and Hive.

Want to learn more about Group-IB's findings on ransomware and other cyberthreats? Download our newest report Hi-Tech Crime Trends 2022/2023๐Ÿ‘ˆ

#HiTechCrimeTrends #report #ransomware
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ7๐Ÿ‘1๐Ÿ‘1
๐Ÿ”ฎA little cybersecurity forecast never hurt nobody. We have put together the top cyber threats that you need to be aware of in 2023, according to Group-IB's annual Hi-Tech Crime Trends report.

Make sure to download the full report๐Ÿ‘ˆ

#HiTechCrimeTrends #report
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘7
Sharing is caring, and sharing data with the cybersec community is one of our contributions to the global fight against cybercrime. The Group-IB Threat Intelligence team now has its own Twitter account: make sure to follow for the latest research, analytics, IOCs and threat alerts ๐Ÿ‘‰ https://twitter.com/GroupIB_TI

#ThreatIntelligence
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘4๐Ÿ”ฅ2๐Ÿ˜ฑ1
๐Ÿ“จ It all started with an email...

In the summer of 2022, the Group-IB Managed Extended Detection and Response (MXDR) solution successfully detected and blocked an email carrying a malicious attachment. This email was intended for Group-IBโ€™s employees.

While analyzing this attack, the Group-IB Threat Intelligence team found patterns in the actions of the attackers and attributed the observed TTPs to the Tonto Team (aka HeartBeat, Karma Panda, CactusPete, Bronze Huntley, Earth Akhlut). What else did we find out about the threat actor?

โ–ช๏ธThe attackers used phishing emails to deliver malicious Microsoft Office documents created with the Royal Road Weaponizer, a tool widely used by Chinese nation-state threat actors.

โ–ช๏ธDuring the attack, Group-IB researchers noticed the use of the Bisonal.DoubleT backdoor. Bisonal.DoubleT is a unique tool developed by the Tonto Team APT.

โ–ช๏ธThe attackers used a new downloader that Group-IB analysts named TontoTeam.Downloader (aka QuickMute).

Check out our fresh blog where we provide indicators of compromise associated with the Tonto Team campaign and detailed analysis of the tools, techniques, and procedures (TTPs) of the threat actor. This information is useful for organizations fighting cybercrime and information security professionals โ€” chief information officers, SOC analysts, and incident responders โ€” in other sectors targeted by the Tonto Team. Read๐Ÿ‘ˆ

#APT #TontoTeam
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ10๐Ÿ‘5
โœ‰๏ธ The Group-IB Computer Emergency Response Team has analyzed malicious email campaigns detected by Group-IB Managed XDR in Q4 2022. Here are the highlights:

โ–ช๏ธArchives remained the primary pathway for malware delivery, although the proportion of campaigns that used this vector fell compared to Q3.

โ–ช๏ธIn Q4 2022, the top 3 widely used malware in phishing emails were SnakeKeylogger, AgentTesla, and FormBookFormgrabber. They accounted for 67% of all malicious email campaigns in Q3 2022. In 2023, stealers will remain one of the top cyber threats.

โ–ช๏ธThreat actors most often used hosting providers located in the United States, Netherlands, and Germany to host their C2 servers. 45% of phishing websites were hosted on .com domains.

#CERT #MXDR
๐Ÿ”ฅ10๐Ÿ‘3
๐Ÿ Old snake, new skin.

Group-IB Threat Intelligence team uncovered a previously undocumented spear phishing campaign carried out by the nation-state cyber threat actor SideWinder between June and November 2021. For the first time, Group-IB researchers confirmed the links between the SideWinder, Baby Elephant, and Donot APT groups and described the entire arsenal of the cyberespionage group, including newly discovered tools. What else?

โ–ช๏ธSideWinder has been systematically attacking government organizations in South and East Asia for espionage purposes for about 10 years.

โ–ช๏ธThe attackers attempted to target 61 government, military, law enforcement, and other organizations in Afghanistan, Bhutan, Myanmar, Nepal, and Sri Lanka.

โ–ช๏ธGroup-IB specialists analyzed SideWinderโ€™s network infrastructure and found numerous phishing resources, including a spear-phishing project targeting the crypto industry.

โ–ช๏ธAmong the newly discovered tools were SideWinder.RAT.b (a remote access Trojan) and SideWinder.StealerPy, which is a custom information stealer written in Python designed to exfiltrate information collected from the victimโ€™s computer.

Curious to know more? Download Group-IBโ€™s new report "Old snake, new skin: Analysis of SideWinder APT activity between June and November 2021". The report contains YARA rules for hunting the group and a table with the groupโ€™s TTPs (Tactics, Techniques, and Procedures) mapped to the MITRE ATT&CKยฎ matrix, providing all the information companies and organizations needed to update their security controls to detect SideWinder. Download๐Ÿ‘ˆ

#APT #SideWinder
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ7๐Ÿ‘2
๐Ÿ“ฆ What happens when you combine ransomware with information stealers, remote access Trojans, and other malware in one easy-to-download package?

Dubai-based researchers from Group-IBโ€™s Digital Forensics and Incident Response (DFIR) team found that malicious actors, instead of simply infecting a computer with ransomware, have taken to packaging a whole host of malicious files into what we call malware bundles.

Malware bundles have been around for a while, but their recent usage by cybercriminals reveals some interesting trends. First, it highlights how threat actors, with their ever-growing appetite for cash, create new approaches for monetization. Secondly, their usage can reveal insights into the interactions between low-skilled threat actors and their more sophisticated counterparts. An entry-level cybercriminal can leverage a malware bundle to gain access to a single computer, but they are also able to sell this access to a more-skilled threat actor who is able to move laterally from a single device to an entire corporate network.

Check out our latest blog post to get the insights from our investigations into affected companies in Egypt, South Africa, Saudi Arabia, Turkey, Morocco, UAE, Kenya, Israel, Pakistan, India, and Germany. We discuss channels of delivery, malware attribution, tactics, techniques and procedures (TTPs), and bundled parts and roles, all in reference to the MITRE ATT&CKยฎ (Adversarial Tactics, Techniques & Common Knowledge) framework, in order to detail how the cybercriminals gained initial access and secured persistence. Read now๐Ÿ‘ˆ

#ransomware
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ7๐Ÿ‘3