CTT Report Hub
3.21K subscribers
7.92K photos
6 videos
67 files
11.6K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#ParsedReport
06-12-2022

Vice Society: Profiling a Persistent Threat to the Education Sector

https://unit42.paloaltonetworks.com/vice-society-targets-education-sector

Actors/Campaigns:
Vice_society (motivation: cyber_criminal)
Unc2447

Threats:
Hellokitty
Printnightmare_vuln
Lockbit
Fivehands
Zeppelin
Lotl_technique
Blackcat
Bloodhound_tool
Systembc
Avoslocker
Sombrat_rat

Industry:
Education, Financial, Healthcare, Government, E-commerce, Ngo

Geo:
Emea, Germany, America, Japan, California, Spain, France, Italy, Apac, Brazil

CVEs:
CVE-2021-34527 [Vulners]
Vulners: Score: 9.0, CVSS: 3.7,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- microsoft windows server 2008 (r2, -)
- microsoft windows server 2012 (r2, -)
- microsoft windows 10 (1607, -, 20h2, 21h1, 1809, 1909, 2004)
- microsoft windows 8.1 (-)
- microsoft windows server 2016 (-, 20h2, 2004)
have more...
CVE-2021-1675 [Vulners]
Vulners: Score: 9.3, CVSS: 3.5,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- microsoft windows server 2008 (r2, -)
- microsoft windows server 2012 (r2, -)
- microsoft windows 10 (1607, -, 20h2, 21h1, 1809, 1909, 2004)
- microsoft windows 8.1 (-)
- microsoft windows server 2016 (-)
have more...

TTPs:
Tactics: 11
Technics: 0

IOCs:
Domain: 5
File: 4
Email: 14
Registry: 1
Hash: 15
Path: 1

Softs:
esxi, psexec, windows defender, microsoft defender, local security authority, ive directory data, windows print spooler

Algorithms:
aes
#ParsedReport
06-12-2022

Iran: State-Backed Hacking of Activists, Journalists, Politicians

https://www.hrw.org/news/2022/12/05/iran-state-backed-hacking-activists-journalists-politicians

Actors/Campaigns:
Cleaver
Phosphorus
Irgc

Threats:
Credential_harvesting_technique
Hostile
Hyperscrape_tool

Industry:
Government, Financial

Geo:
Usa, Qatar, Iranian, Morocco, Iran, Africa, Tehran, Indian, Beirut, American, Israeli, Libya, Lebanon, Irans

IOCs:
Domain: 7
Url: 7

Softs:
telegram, google takeout

Languages:
javascript, php
#ParsedReport
06-12-2022

Blue Callisto orbits around US Laboratories in 2022

https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/blue-callisto-orbits-around-us.html

Actors/Campaigns:
Coldriver (motivation: cyber_espionage)
Tick

Threats:
Seaborgium
Evilginx_tool

Industry:
Financial, Aerospace, Education, Government, Healthcare, Telco, Transport, Logistic, Energy

Geo:
Ukraine, Australia, Russia, Ukrainian

TTPs:

IOCs:
Domain: 5
File: 3
Url: 6
IP: 7

Functions:
OpenSSL

Languages:
javascript
#ParsedReport
06-12-2022

Not a SIMulation: CrowdStrike Investigations Reveal Intrusion Campaign Targeting Telco and BPO Companies

https://www.crowdstrike.com/blog/analysis-of-intrusion-campaign-targeting-telecom-and-bpo-companies

Threats:
Credential_harvesting_technique
Anydesk_tool
Dwservice_tool
Logmein_tool
Screenconnect_tool
Teamviewer_tool
Sorillus_rat
Rustscan_tool
Impacket_tool
Dcsync_technique

Industry:
Bp_outsourcing, Telco

CVEs:
CVE-2021-35464 [Vulners]
Vulners: Score: 10.0, CVSS: 5.4,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- forgerock am (<6.5.3)
- forgerock openam (<14.6.3)


IOCs:
Domain: 3
IP: 86
Hash: 8
File: 1

Softs:
telegram, curl, beanywhere, domotz, pulseway, rport, rsocx, trendmicro basecamp, zerotier, esxi, have more...

Languages:
python

Links:
https://github.com/carlospolop/PEASS-ng/tree/master/linPEAS
https://github.com/NetSPI/aws\_consoler
https://github.com/RustScan/RustScan
https://github.com/b23r0/rsocx
#ParsedReport
06-12-2022

Exposing TAG-53s Credential Harvesting Infrastructure Used for Russia-Aligned Espionage Operations

https://www.recordedfuture.com/exposing-tag-53-credential-harvesting-infrastructure-for-russia-aligned-espionage-operations

Actors/Campaigns:
Tag-53 (motivation: cyber_espionage, information_theft)
Coldriver (motivation: cyber_espionage, information_theft)
Seaborgium (motivation: cyber_espionage, information_theft)

Threats:
Credential_harvesting_technique
Typosquatting_technique

Industry:
Ngo, Logistic, Government, Telco, Aerospace

Geo:
Russian, Ukraine, Poland, Russia

TTPs:

IOCs:
Domain: 38
IP: 38

Softs:
microsoft onedrive
#ParsedReport
06-12-2022

DEV-0139 launches targeted attacks against the cryptocurrency industry

https://www.microsoft.com/en-us/security/blog/2022/12/06/dev-0139-launches-targeted-attacks-against-the-cryptocurrency-industry

Threats:
Dll_sideloading_technique

Industry:
Financial

TTPs:
Tactics: 6
Technics: 13

IOCs:
File: 27
Path: 7
Url: 1
Hash: 10
Domain: 1
IP: 1

Softs:
microsoft defender, microsoft defender for endpoint, telegram, microsoft excel, windows media player, "powerpnt", microsoft 365 defender

Algorithms:
base64, xor

Functions:
CreateDate, CreateFile, OpenDrive, Win32

Win API:
CreateProcess

Languages:
visual_basic

Platforms:
x64

Links:
https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Windows%20Security%20Events/Hunting%20Queries/Least\_Common\_Parent\_Child\_Process.yaml
https://github.com/Azure/Azure-Sentinel/blob/46906229919827bffa14211341f52dd68e27ad81/Hunting%20Queries/Microsoft%20365%20Defender/Execution/detect-anomalous-process-trees.yaml
#ParsedReport
06-12-2022

Technical Analysis of DanaBot Obfuscation Techniques

https://www.zscaler.com/blogs/security-research/technical-analysis-danabot-obfuscation-techniques

Threats:
Danabot
Junk_code_technique
Beacon

Industry:
Financial

IOCs:
File: 1
Hash: 1

Languages:
delphi, prolog, python

Links:
https://github.com/threatlabz/tools/blob/main/danabot/10\_math\_loops.py
https://github.com/threatlabz/tools/blob/main/danabot/11\_rename\_junk\_variables.py
https://github.com/threatlabz/tools/blob/main/danabot/idr\_map\_to\_idapy.py
https://github.com/threatlabz/tools/blob/main/danabot/02\_dynamic\_return.py
https://github.com/OALabs/hashdb-ida
https://github.com/OALabs/hashdb/pull/35
https://github.com/threatlabz/tools/blob/main/danabot/06\_fake\_UStrLAsg\_and\_UStrCopy.py
https://github.com/threatlabz/tools/tree/main/danabot
https://github.com/threatlabz/tools/blob/main/danabot/01\_junk\_byte\_jump.py
https://github.com/threatlabz/tools/blob/main/danabot/03\_uppercase\_jumps.py
https://github.com/threatlabz/tools/blob/main/danabot/09\_empty\_loops.py
https://github.com/threatlabz/tools/blob/main/danabot/idr\_idc\_to\_idapy.py
https://github.com/threatlabz/tools/blob/main/danabot/04\_letter\_mapping.py
https://github.com/threatlabz/tools/blob/main/danabot/12\_rename\_junk\_random\_variables.py
https://github.com/crypto2011/IDR
https://github.com/threatlabz/tools/blob/main/danabot/08\_set\_stack\_string\_letters\_comments.py
https://github.com/threatlabz/tools/blob/main/danabot/07\_stack\_string\_letters\_to\_last\_StrCatN\_call.py
https://github.com/threatlabz/tools/blob/main/danabot/05\_reset\_code.py
#ParsedReport
07-12-2022

Polonium APT Group: Uncovering New Elements

https://www.deepinstinct.com/blog/polonium-apt-group-uncovering-new-elements

Actors/Campaigns:
Polonium

Threats:
Megacreep
Vbcreep

Industry:
Chemical

Geo:
Israeli, Israel, Lebanon

IOCs:
Hash: 4
File: 6
Registry: 2

Softs:
sysinternals

Functions:
MainZero

Languages:
visual_basic

Links:
https://github.com/eset/malware-ioc/tree/master/polonium
#ParsedReport
07-12-2022

Malware Distributed with Disguised Filenames (RIGHT-TO-LEFT OVERRIDE)

https://asec.ahnlab.com/en/43518

Threats:
Laplas_clipper
Redline_stealer
Tron
Trojan/win.rtlo.x2172
Dropper/win.agent.c5317732
Trojan/win.injection.c5313120
Trojan/win.generic.c535472
Trojan/win.generic.c5310136
Raccoon_stealer

Industry:
Financial

IOCs:
File: 3
Hash: 6
IP: 1

Softs:
zcash

Languages:
php
#ParsedReport
07-12-2022

A Closer look at BlackMagic ransomware

https://blog.cyble.com/2022/12/07/a-closer-look-at-blackmagic-ransomware

Threats:
Blackmagic
Anydesk_tool
Mosesstaff

Industry:
Logistic, Transport, Financial

Geo:
Israeli, Australia, India, Georgia, Israel, Israels, Singapore, Dubai, Iran

TTPs:
Tactics: 4
Technics: 8

IOCs:
Url: 2
File: 7
Path: 1
Registry: 1
IP: 2
Hash: 2

Softs:
nginx, docker, qemu, cpanel, virtualbox

Functions:
Sleep

Win API:
GetLogicalDriveStringsA

Win Services:
powerpnt

Languages:
java, python
#ParsedReport
07-12-2022

Securonix Threat Labs Security Advisory: ProxyNotShell Revisited: Detecting Latest Exploits Using Security Analytics

https://www.securonix.com/blog/proxynotshell-revisited

Actors/Campaigns:
Steep_maverick

Threats:
Proxynotshell_vuln
Proxyshell_vuln
Chinachopper
Havoc
Qakbot

CVEs:
CVE-2022-41040 [Vulners]
Vulners: Score: Unknown, CVSS: 3.2,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- microsoft exchange server (2013, 2016, 2019, 2019, 2016)

CVE-2021-34523 [Vulners]
Vulners: Score: 7.5, CVSS: 3.4,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- microsoft exchange server (2013, 2019, 2016, 2016, 2019)

CVE-2021-31207 [Vulners]
Vulners: Score: 6.5, CVSS: 1.7,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- microsoft exchange server (2013, 2019, 2016, 2016, 2019)

CVE-2021-34473 [Vulners]
Vulners: Score: 10.0, CVSS: 2.8,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- microsoft exchange server (2013, 2019, 2016, 2016, 2019)

CVE-2022-41082 [Vulners]
Vulners: Score: Unknown, CVSS: 2.8,
Vulners: Exploitation: Unknown
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- microsoft exchange server (2013, 2016, 2019, 2019, 2016)


TTPs:
Tactics: 3
Technics: 3

IOCs:
File: 10
Path: 2
Command: 2

Softs:
microsoft exchange, microsoft exchange server, msexchange

Win API:
WmiCreateProcess

Languages:
python
#ParsedReport
07-12-2022

An Update on HIVE Ransomware

https://www.avertium.com/resources/threat-reports/an-update-on-hive-ransomware

Threats:
Hive
Vssadmin_tool

Industry:
Energy, Financial, Government, Retail, Healthcare

Geo:
Quebec, Indias, Canada, Ontario

CVEs:
CVE-2021-34523 [Vulners]
Vulners: Score: 7.5, CVSS: 3.4,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- microsoft exchange server (2013, 2019, 2016, 2016, 2019)

CVE-2021-31207 [Vulners]
Vulners: Score: 6.5, CVSS: 1.7,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- microsoft exchange server (2013, 2019, 2016, 2016, 2019)

CVE-2021-34473 [Vulners]
Vulners: Score: 10.0, CVSS: 2.8,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- microsoft exchange server (2013, 2019, 2016, 2016, 2019)


IOCs:
Domain: 4

Softs:
esxi, microsoft exchange server, macos

Algorithms:
zip

Languages:
golang

Links:
https://github.com/reecdeep/HiveV5\_file\_decryptor/blob/main/README.md