CTT Report Hub
3.22K subscribers
7.93K photos
6 videos
67 files
11.6K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#ParsedReport
09-12-2022

New MuddyWater Threat: Old Kitten; New Tricks

https://www.deepinstinct.com/blog/new-muddywater-threat-old-kitten-new-tricks

Actors/Campaigns:
Muddywater (motivation: cyber_espionage)
Luna_moth

Threats:
Remoteutilities_tool
Screenconnect_tool
Atera_tool
Syncro_tool
Batloader
Luna

Industry:
Telco, Healthcare, Government, Aerospace, Petroleum

Geo:
America, Jordan, Emirates, Israeli, Asia, Israel, Africa, Syrian, Armenia, Oman, Azerbaijan, Tajikistan, Iran, Egypt, Qatar, Iraq

TTPs:
Tactics: 3
Technics: 5

IOCs:
File: 2
Hash: 36

Algorithms:
zip, exhibit
#ParsedReport
09-12-2022

Cloud Atlas targets entities in Russia and Belarus amid the ongoing war in Ukraine. Introduction

https://research.checkpoint.com/2022/cloud-atlas-targets-entities-in-russia-and-belarus-amid-the-ongoing-war-in-ukraine

Actors/Campaigns:
Cloudatlas (motivation: cyber_espionage)

Threats:
Powershower
Rtcpproxy_tool
Lockbit
Ntdsutil_tool
Anydesk_tool
Putty_tool

Industry:
Education, Energy, Financial, Transport, Government

Geo:
Russia, Russian, Belarus, Belarusian, Moldova, Asia, Ukraine

CVEs:
CVE-2018-0802 [Vulners]
Vulners: Score: 9.3, CVSS: 3.5,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- microsoft office (2007, 2013, 2016, 2010, 2016)
- microsoft word (2013, 2007, 2010, 2013, 2016)
- microsoft office compatibility pack (-)

CVE-2017-11882 [Vulners]
Vulners: Score: 9.3, CVSS: 4.8,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- microsoft office (2013, 2010, 2016, 2007)


IOCs:
IP: 1
Registry: 1
File: 2

Softs:
microsoft office, squid, telegram

Algorithms:
aes-256, base64, xor, zip

Functions:
WriteAllBytes, ReadAllText, ReadBytes, OpenDrive

Win API:
Decompress

Languages:
python
#ParsedReport
09-12-2022

APT Cloud Atlas: Unbroken Threat

https://www.ptsecurity.com/ru-ru/research/pt-esc-threat-intelligence/apt-cloud-atlas-unbroken-threat

Actors/Campaigns:
Cloudatlas (motivation: cyber_espionage)
Gamaredon
Bitter

Threats:
Powershower
Trojan.win32.generic.a
Trojan.win32.reglolbins.a

Industry:
Government, Financial

Geo:
Belarus, Slovenia, Russia, Azerbaijan, Russian, Turkey, Iranian, Tajikistan

CVEs:
CVE-2017-11882 [Vulners]
Vulners: Score: 9.3, CVSS: 4.8,
Vulners: Exploitation: True
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- microsoft office (2013, 2010, 2016, 2007)


TTPs:
Tactics: 7
Technics: 20

IOCs:
File: 12
Hash: 16

Softs:
microsoft office, component object model

Algorithms:
aes-cbc, aes, base64, lzma, xor, cbc

Win API:
GetLocalTime, GetUserDefaultLCID, GetSystemDefaultLCID

Languages:
visual_basic

YARA: Found
#ParsedReport
09-12-2022

Threat Actors Targeting Fans Amid FIFA World Cup Fever

https://blog.cyble.com/2022/12/09/threat-actors-targeting-fans-amid-fifa-world-cup-fever

Threats:
Redline_stealer
Beacon
Process_injection_technique
Process_hollowing_technique

Geo:
Australia, Qatar, Georgia, India, Dubai, Singapore

TTPs:
Tactics: 7
Technics: 20

IOCs:
Domain: 2
Url: 4
File: 2
Hash: 2

Softs:
android
#ParsedReport
09-12-2022

Ransomware Roundup New Vohuk, ScareCrow, and AERST Variants

https://www.fortinet.com/blog/threat-research/ransomware-roundup-new-vohuk-scarecrow-and-aerst-variants

Threats:
Vohuk
Scarecrow
Aerst
Conti
W32/ransom.fywdocb!tr
W32/filecoder.oke!tr.ransom
W32/filecoder.rth!tr.ransom
W32/filecoder.ace!tr.ransom

Industry:
Financial

Geo:
Philippines, Germany, India, Italy, Russia

IOCs:
File: 1
Hash: 8

Softs:
telegram

Algorithms:
chacha20
Интеграция с IBM Exchange для получения инфы о CVE пока отъехала. Буду чинить :(
#technique

Vulpes: Obfuscating Memory Regions with Timers

https://mez0.cc/posts/vulpes-obfuscating-memory-regions/
#technique

StealthHook - A method for hooking a function without modifying memory protection

https://www.x86matthew.com/view_post?id=stealth_hook
#ParsedReport
12-12-2022

Dark Web Profile: APT42 Iranian Cyber Espionage Group

https://socradar.io/dark-web-profile-apt42-iranian-cyber-espionage-group

Actors/Campaigns:
Cleaver (motivation: cyber_espionage, cyber_criminal)
Phosphorus (motivation: cyber_espionage)
Tag-56 (motivation: cyber_espionage)
Remix_kitten (motivation: cyber_espionage)
Irgc (motivation: cyber_espionage)

Threats:
Nemesis
Brokeyolk
Pineflower
Stuxnet
Credential_harvesting_technique
Powerpost_tool
Chairsmack
Magicdrop
Silentuploader
Dostealer
Tabbycat
Vinethorn
Vbrevshell
Tamecat

Industry:
Education, Healthcare, Government, Telco

Geo:
Irans, Germany, Iranian, Israeli, Albanian, Australia, Iran

CVEs:
CVE-2018-13379 [Vulners]
Vulners: Score: 5.0, CVSS: 3.2,
Vulners: Exploitation: True
X-Force: Risk: 7.5
X-Force: Patch: Official fix
Soft:
- fortinet fortios (le6.0.4, le5.6.7)


IOCs:
Domain: 5
File: 10
Hash: 9
Url: 28

Softs:
android, telegram
#ParsedReport
12-12-2022

Iranian hacking group uses compromised email accounts to distribute MSP remote access tool

https://www.malwarebytes.com/blog/news/2022/12/iranian-hacking-group-uses-compromised-email-accounts-to-distribute-msp-remote-access-tool

Actors/Campaigns:
Muddywater

Threats:
Msp_remote_tool
Log4shell_vuln
Syncro_tool
Atera_tool
Screenconnect_tool
Remoteutilities_tool

Industry:
Government, Petroleum, Telco

Geo:
Tajikistan, Iraq, Azerbaijan, Egypt, Oman, Qatar, Emirates, Jordan, Iran, Israel, Armenia, Iranian

IOCs:
File: 1
#ParsedReport
12-12-2022

Linux Cryptocurrency Mining Attacks Enhanced via CHAOS RAT. Conclusion

https://www.trendmicro.com/en_us/research/22/l/linux-cryptomining-enhanced-via-chaos-rat-.html

Actors/Campaigns:
Teamtnt

Threats:
Chaos
Kinsing_miner
Xmrig_miner
Malxmr_miner

Geo:
Russia

TTPs:
Tactics: 7
Technics: 0

IOCs:
File: 5
Hash: 6

Softs:
unix task scheduler

Languages:
golang

Links:
https://github.com/tiagorlampert/CHAOS
#ParsedReport
12-12-2022

Drokbk Malware Uses GitHub as Dead Drop Resolver

https://www.secureworks.com/blog/drokbk-malware-uses-github-as-dead-drop-resolver

Actors/Campaigns:
Cobalt_mirage (motivation: government_sponsored)
Comment_crew

Threats:
Dead_drop_technique
Mirage
Frpc_tool
Tunnelfish_tool
Log4shell_vuln
Beacon

Industry:
Government

Geo:
Iranian

CVEs:
CVE-2021-44228 [Vulners]
Vulners: Score: 9.3, CVSS: 4.5,
Vulners: Exploitation: True
X-Force: Risk: 10
X-Force: Patch: Official fix
Soft:
- apache log4j (2.0, 2.0, 2.0, 2.0, <2.15.0, <2.3.1, <2.12.2)
- siemens sppa-t3000 ses3000 firmware (*)
- siemens logo\! soft comfort (*)
- siemens spectrum power 4 (4.70, 4.70, <4.70, 4.70)
- siemens siveillance control pro (*)
have more...
CVE-2021-45046 [Vulners]
Vulners: Score: 5.1, CVSS: 1.8,
Vulners: Exploitation: True
X-Force: Risk: 9
X-Force: Patch: Official fix
Soft:
- apache log4j (2.0, 2.0, 2.0, 2.0, <2.12.2, <2.16.0)
- intel oneapi (-)
- intel audio development kit (-)
- intel datacenter manager (-)
- intel system debugger (-)
have more...

IOCs:
File: 1
Path: 8
Hash: 17
IP: 3

Softs:
vmware horizon

Algorithms:
exhibit

Links:
https://github.com/fatedier/frp
https://github.com/dnSpyEx/dnSpy