CTT Report Hub
3.22K subscribers
7.93K photos
6 videos
67 files
11.6K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#ParsedReport
12-12-2022

A Custom Python Backdoor for VMWare ESXi Servers

https://blogs.juniper.net/en-us/threat-research/a-custom-python-backdoor-for-vmware-esxi-servers

Threats:
Netcat_tool
Asbit_rat
Tsunami_botnet

CVEs:
CVE-2020-3992 [Vulners]
Vulners: Score: 10.0, CVSS: 2.8,
Vulners: Exploitation: True
X-Force: Risk: 9.8
X-Force: Patch: Official fix
Soft:
- vmware esxi (6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 7.0.0, 6.5, 6.5, 6.5, 6.7, 6.7, 7.0.0)
- vmware cloud foundation (<4.1, <3.10.1.1)

CVE-2022-30190 [Vulners]
Vulners: Score: 9.3, CVSS: 3.4,
Vulners: Exploitation: True
X-Force: Risk: 7.8
X-Force: Patch: Official fix
Soft:
- microsoft windows server 2012 (r2, -)
- microsoft windows 10 (1607, -, 1809, 20h2, 21h1, 21h2)
- microsoft windows 8.1 (-)
- microsoft windows server 2016 (-)
- microsoft windows server 2008 (-, r2)
have more...
CVE-2019-5544 [Vulners]
Vulners: Score: 7.5, CVSS: 1.7,
Vulners: Exploitation: True
X-Force: Risk: 9.8
X-Force: Patch: Unavailable
Soft:
- vmware horizon daas (<9.0.0.0)
- vmware esxi (6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.0, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.5, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7, 6.7)
- redhat enterprise linux desktop (7.0)
- redhat enterprise linux server (7.0)
- redhat enterprise linux server aus (7.7)
have more...

TTPs:
Tactics: 1
Technics: 0

IOCs:
File: 6
IP: 1

Softs:
esxi, redis

Algorithms:
base64

Languages:
python
Запилили новый API по данным, что генерит движок парсинга TI-отчетов (разбираем где-то 200-250 отчетов в мес. от 98 источников).

Очень много данных еще остается лежать на диске и не входит ни в одну из наших API (email, registry, coin wallets, commands, код yara|sigma, winapi). Думаю, добавим уже в новую версию API, где данные будут уже в STIX-формате.

Текущая версия API скорее про бюллетени по TI-отчету. Через API можно получить сразу все бюллетени по всем отчетам за выбранные сутки.

Выгляди это вот так.
🔥2
#ParsedReport
13-12-2022

Fortinet Released Patch for FortiOS SSL-VPN RCE VulnerabilityCVE-2022-42475. Fortinet Released Patch for FortiOS SSL-VPN RCE Vulnerability CVE-2022-42475

https://socradar.io/fortinet-released-patch-for-fortios-ssl-vpn-rce-vulnerability-cve-2022-42475

CVEs:
CVE-2022-42475 [Vulners]
Vulners: Score: Unknown, CVSS: Unknown,
Vulners: Exploitation: Unknown
X-Force: Risk: 9.8
X-Force: Patch: Official fix


IOCs:
IP: 4

Languages:
javascript
#ParsedReport
13-12-2022

How 140k NuGet, NPM, and PyPi Packages Were Used to Spread Phishing Links. What Happened?

https://checkmarx.com/blog/how-140k-nuget-npm-and-pypi-packages-were-used-to-spread-phishing-links

Industry:
Retail, E-commerce

IOCs:
Email: 1
Domain: 87
File: 3

Softs:
nuget package manager, tiktok, instagram

Links:
https://gist.github.com/jossef/77c4fd00fccf68b56d76a36c79799ca1
https://gist.github.com/jossef/1c1152368ff6210340644f44afec7e8e
#ParsedReport
13-12-2022

GoTrim: Go-based Botnet Actively Brute Forces WordPress Websites

https://www.fortinet.com/blog/threat-research/gotrim-go-based-botnet-actively-brute-forces-wordpress-websites

Threats:
Gotrim_botnet
Stealthworker
Upx_tool
Beacon
Hostile

Industry:
E-commerce

IOCs:
Hash: 9
IP: 1
File: 1
Url: 11

Softs:
wordpress, joomla!

Algorithms:
gzip, aes-gcm, aes

Languages:
php, golang, javascript
#ParsedReport
13-12-2022

Mallox Ransomware

https://labs.k7computing.com/index.php/mallox-ransomware

Threats:
Mallox
Intellilock_tool
Process_hollowing_technique
Bozon

IOCs:
File: 3

Softs:
mssql

Algorithms:
aes, rc4, des

Links:
https://github.com/danielmiessler/SecLists/blob/master/Passwords/Default-Credentials/mssql-betterdefaultpasslist.txt
#ParsedReport
13-12-2022

Venom RAT expands its operations by adding a Stealer Module

https://blog.cyble.com/2022/12/13/venom-rat-expands-its-operations-by-adding-a-stealer-module

Threats:
Venomrat
Hvnc_tool
Process_injection_technique

Industry:
Financial

TTPs:
Tactics: 8
Technics: 16

IOCs:
File: 4
Command: 1
Hash: 22

Softs:
chrome, internet explorer, pale moon, pale waterfox, windows defender, 360browser, chromium, opera, comodo dragon, 7star, have more...

Functions:
DetectBankingServices, DetectPornServices, DetectCryptocurrencyServices
#ParsedReport
13-12-2022

Dissecting the Empire C2 Framework

https://blog.qualys.com/vulnerabilities-threat-research/2022/12/12/dissecting-the-empire-c2-framework

Actors/Campaigns:
Vice_society
Wizard_spider
Turla
Leviathan
Fin12
Darkhydrus
Apt33
Shell_crew
Axiom

Threats:
Empire_loader
Confuserex_tool
Trickbot
Metasploit_tool
Cactustorch
Meterpreter_tool
Lazagne
Beacon

Industry:
Healthcare

Geo:
Usa, Australia, Canada

TTPs:

IOCs:
Url: 1
Domain: 1
IP: 4

Softs:
ubuntu, debian, docker, process explorer, android

Languages:
ironpython, visual_basic, php, csharp, python

Links:
https://github.com/BC-SECURITY/Empire
#ParsedReport
13-12-2022

Driving Through Defenses \| Targeted Attacks Leverage Signed Malicious Microsoft Drivers

https://www.sentinelone.com/labs/driving-through-defenses-targeted-attacks-leverage-signed-malicious-microsoft-drivers

Threats:
Poortry
Stonestop
Hive
Vmprotect_tool

Industry:
Financial, Healthcare, Entertainment, Telco, Transport, Bp_outsourcing

IOCs:
File: 1
Hash: 3

Win API:
ZwTerminateProcess, PsSuspendProcess, PsResumeProcess
#ParsedReport
14-12-2022

Probing Weaponized Chat Applications Abused in Supply-Chain Attacks

https://www.trendmicro.com/en_us/research/22/l/probing-weaponized-chat-applications-abused-in-supply-chain-atta.html

Actors/Campaigns:
Emissary_panda
Water_labbu

Threats:
Dll_sideloading_technique
Trojan.win64.commdcry.a
Trojan.win32.commpload.a
Trojan.win64.commsendr.a
Trojan.win64.commject.a
Backdoor.win64.commsock.a
Trojan.win64.commsock.a
Trojanspy.win64.commspy.a
Backdoor.js.commload.a

Geo:
Chinese

IOCs:
File: 13
Url: 3
Domain: 10
IP: 2
Path: 2
Hash: 23

Softs:
macos, node.js, telegram, windows registry, "microsoft edge", "chrome", "opera", chromium

Algorithms:
xor, zip, rc4

Languages:
golang, javascript
#ParsedReport
14-12-2022

Wouldve, Couldve, ShouldveDid: TA453 Refuses to be Bound by Expectations

https://www.proofpoint.com/us/blog/threat-insight/ta453-refuses-be-bound-expectations

Actors/Campaigns:
Cleaver (motivation: cyber_espionage)
Irgc
Phosphorus
Badblood

Threats:
Beacon
Credential_harvesting_technique
Charmpower
Hostile

Industry:
Education, Government, Aerospace, Energy, Healthcare

Geo:
Tehran, Israel, Iran, Iranians, Israeli, Bahrain, American, Iranian, Dubai

IOCs:
Domain: 7
Email: 1
Hash: 1
IP: 1

Softs:
microsoft word

Functions:
GhostEcho
#ParsedReport
14-12-2022

Unmasking MirrorFace: Operation LiberalFace targeting Japanese political entities

https://www.welivesecurity.com/2022/12/14/unmasking-mirrorface-operation-liberalface-targeting-japanese-political-entities

Actors/Campaigns:
Liberalface (motivation: cyber_espionage)

Threats:
Mirrorface
Lodeinfo
Mirrorstealer
Putty_tool
Dll_sideloading_technique
Process_injection_technique

Geo:
Ukraine, Japan, Japanese

TTPs:
Tactics: 9
Technics: 26

IOCs:
File: 7
Path: 2
IP: 5
Command: 1
Domain: 2
Hash: 5

Algorithms:
base64, aes-256-cbc, xor, rc4

Win API:
CreateProcessA
#ParsedReport
14-12-2022

Royal Rumble: Analysis of Royal Ransomware

https://www.cybereason.com/blog/royal-ransomware-analysis

Threats:
Royal_ransomware
Blackcat
Zeon
Lockbit
Batloader
Qakbot
Cobalt_strike
Blackbasta
Conti
Babuk

Geo:
England

TTPs:
Tactics: 3
Technics: 9

IOCs:
File: 4
Hash: 8

Algorithms:
aes, aes-256

Win API:
WSAIoctl, LPFN_CONNECTEX, GetIpAddrTable, WSASocketW, CreateIoCompletionPort, htons, NetShareEnum, GetNativeSystemInfo, RmStartSession, RmRegisterResources, have more...

Links:
https://github.com/struppigel/PortEx
#ParsedReport
14-12-2022

APT5 Exploits Zero-Day Vulnerability on Citrix ADC and Gateway Devices

https://socradar.io/apt5-exploits-zero-day-vulnerability-on-citrix-adc-and-gateway-devices

Actors/Campaigns:
Apt5

Industry:
Telco

Geo:
Asia, Chinese

CVEs:
CVE-2022-27518 [Vulners]
Vulners: Score: Unknown, CVSS: 4.3,
Vulners: Exploitation: True
X-Force: Risk: 9.8
X-Force: Patch: Official fix
Soft:
- citrix application delivery controller firmware (<12.1-55.291, <12.1-55.291, <13.0-58.32, <12.1-65.25)
- citrix gateway firmware (<12.1-65.25, <13.0-58.32)


IOCs:
File: 1
#ParsedReport
14-12-2022

Black Basta: Riding the Crimeware Sleigh

https://inquest.net/blog/2022/12/13/black-basta-riding-crimeware-sleigh

Threats:
Blackbasta
Qakbot
Cobalt_strike
Beacon
Mimikatz_tool
Html_smuggling_technique
Vssadmin_tool

Geo:
Crimea, Ukrainian, Russian, Ukraine

IOCs:
File: 2
Url: 1

Softs:
nginx

Algorithms:
zip, chacha20

Languages:
javascript

YARA: Found
#ParsedReport
14-12-2022

Signed driver malware moves up the software trust chain

https://news.sophos.com/en-us/2022/12/13/signed-driver-malware-moves-up-the-software-trust-chain

Actors/Campaigns:
Lapsus
Unc2596

Threats:
Burntcigar_tool
Byovd_technique
Cuba
Robinhood
Blackbyte
Vmprotect_tool
Avkill_tool

Geo:
Chinese, China

IOCs:
File: 8
Hash: 15

Softs:
windows kernel, jenkins

Win API:
DeviceIoControl

Links:
https://github.com/sophoslabs/IoCs/blob/master/Troj\_Agent-BJJB.csv