CTT Report Hub
3.21K subscribers
7.95K photos
6 videos
67 files
11.6K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#ParsedReport
13-12-2022

Driving Through Defenses \| Targeted Attacks Leverage Signed Malicious Microsoft Drivers

https://www.sentinelone.com/labs/driving-through-defenses-targeted-attacks-leverage-signed-malicious-microsoft-drivers

Threats:
Poortry
Stonestop
Hive
Vmprotect_tool

Industry:
Financial, Healthcare, Entertainment, Telco, Transport, Bp_outsourcing

IOCs:
File: 1
Hash: 3

Win API:
ZwTerminateProcess, PsSuspendProcess, PsResumeProcess
#ParsedReport
14-12-2022

Probing Weaponized Chat Applications Abused in Supply-Chain Attacks

https://www.trendmicro.com/en_us/research/22/l/probing-weaponized-chat-applications-abused-in-supply-chain-atta.html

Actors/Campaigns:
Emissary_panda
Water_labbu

Threats:
Dll_sideloading_technique
Trojan.win64.commdcry.a
Trojan.win32.commpload.a
Trojan.win64.commsendr.a
Trojan.win64.commject.a
Backdoor.win64.commsock.a
Trojan.win64.commsock.a
Trojanspy.win64.commspy.a
Backdoor.js.commload.a

Geo:
Chinese

IOCs:
File: 13
Url: 3
Domain: 10
IP: 2
Path: 2
Hash: 23

Softs:
macos, node.js, telegram, windows registry, "microsoft edge", "chrome", "opera", chromium

Algorithms:
xor, zip, rc4

Languages:
golang, javascript
#ParsedReport
14-12-2022

Wouldve, Couldve, ShouldveDid: TA453 Refuses to be Bound by Expectations

https://www.proofpoint.com/us/blog/threat-insight/ta453-refuses-be-bound-expectations

Actors/Campaigns:
Cleaver (motivation: cyber_espionage)
Irgc
Phosphorus
Badblood

Threats:
Beacon
Credential_harvesting_technique
Charmpower
Hostile

Industry:
Education, Government, Aerospace, Energy, Healthcare

Geo:
Tehran, Israel, Iran, Iranians, Israeli, Bahrain, American, Iranian, Dubai

IOCs:
Domain: 7
Email: 1
Hash: 1
IP: 1

Softs:
microsoft word

Functions:
GhostEcho
#ParsedReport
14-12-2022

Unmasking MirrorFace: Operation LiberalFace targeting Japanese political entities

https://www.welivesecurity.com/2022/12/14/unmasking-mirrorface-operation-liberalface-targeting-japanese-political-entities

Actors/Campaigns:
Liberalface (motivation: cyber_espionage)

Threats:
Mirrorface
Lodeinfo
Mirrorstealer
Putty_tool
Dll_sideloading_technique
Process_injection_technique

Geo:
Ukraine, Japan, Japanese

TTPs:
Tactics: 9
Technics: 26

IOCs:
File: 7
Path: 2
IP: 5
Command: 1
Domain: 2
Hash: 5

Algorithms:
base64, aes-256-cbc, xor, rc4

Win API:
CreateProcessA
#ParsedReport
14-12-2022

Royal Rumble: Analysis of Royal Ransomware

https://www.cybereason.com/blog/royal-ransomware-analysis

Threats:
Royal_ransomware
Blackcat
Zeon
Lockbit
Batloader
Qakbot
Cobalt_strike
Blackbasta
Conti
Babuk

Geo:
England

TTPs:
Tactics: 3
Technics: 9

IOCs:
File: 4
Hash: 8

Algorithms:
aes, aes-256

Win API:
WSAIoctl, LPFN_CONNECTEX, GetIpAddrTable, WSASocketW, CreateIoCompletionPort, htons, NetShareEnum, GetNativeSystemInfo, RmStartSession, RmRegisterResources, have more...

Links:
https://github.com/struppigel/PortEx
#ParsedReport
14-12-2022

APT5 Exploits Zero-Day Vulnerability on Citrix ADC and Gateway Devices

https://socradar.io/apt5-exploits-zero-day-vulnerability-on-citrix-adc-and-gateway-devices

Actors/Campaigns:
Apt5

Industry:
Telco

Geo:
Asia, Chinese

CVEs:
CVE-2022-27518 [Vulners]
Vulners: Score: Unknown, CVSS: 4.3,
Vulners: Exploitation: True
X-Force: Risk: 9.8
X-Force: Patch: Official fix
Soft:
- citrix application delivery controller firmware (<12.1-55.291, <12.1-55.291, <13.0-58.32, <12.1-65.25)
- citrix gateway firmware (<12.1-65.25, <13.0-58.32)


IOCs:
File: 1
#ParsedReport
14-12-2022

Black Basta: Riding the Crimeware Sleigh

https://inquest.net/blog/2022/12/13/black-basta-riding-crimeware-sleigh

Threats:
Blackbasta
Qakbot
Cobalt_strike
Beacon
Mimikatz_tool
Html_smuggling_technique
Vssadmin_tool

Geo:
Crimea, Ukrainian, Russian, Ukraine

IOCs:
File: 2
Url: 1

Softs:
nginx

Algorithms:
zip, chacha20

Languages:
javascript

YARA: Found
#ParsedReport
14-12-2022

Signed driver malware moves up the software trust chain

https://news.sophos.com/en-us/2022/12/13/signed-driver-malware-moves-up-the-software-trust-chain

Actors/Campaigns:
Lapsus
Unc2596

Threats:
Burntcigar_tool
Byovd_technique
Cuba
Robinhood
Blackbyte
Vmprotect_tool
Avkill_tool

Geo:
Chinese, China

IOCs:
File: 8
Hash: 15

Softs:
windows kernel, jenkins

Win API:
DeviceIoControl

Links:
https://github.com/sophoslabs/IoCs/blob/master/Troj\_Agent-BJJB.csv
#ParsedReport
14-12-2022

Silence is golden partner for Truebot and Clop ransomware

https://www.malwarebytes.com/blog/news/2022/12/silence-is-golden-partner-for-truebot-and-clop-ransomware

Actors/Campaigns:
Whisper_spider
Ta505
Fin11

Threats:
Truebot
Clop
Raspberry_robin
Winrm_tool
Cobalt_strike
Flawedgrace_rat
Teleport_tool
Ransom.agent

Geo:
Pakistan, Brazil, Mexico

CVEs:
CVE-2022-31199 [Vulners]
Vulners: Score: Unknown, CVSS: 4.8,
Vulners: Exploitation: Unknown
X-Force: Risk: Unknown
X-Force: Patch: Unknown
Soft:
- netwrix auditor (<10.5)


TTPs:
Tactics: 1
Technics: 0

IOCs:
File: 1

Softs:
active directory
#ParsedReport
14-12-2022

. Famous domestic financial app impersonation attack attack

https://asec.ahnlab.com/ko/44225

Actors/Campaigns:
Kimsuky

Industry:
Financial

Geo:
Japan, Korea, Singapore

IOCs:
IP: 3
Domain: 25
Url: 25
#ParsedReport
14-12-2022

Quick Update on Recent Denonia Samples

https://www.cadosecurity.com/quick-update-on-recent-denonia-samples

Threats:
Denonia
Xmrig_miner
Log4shell_vuln

Geo:
Philippines

IOCs:
Hash: 7

Softs:
unix, macos

Languages:
golang

Platforms:
arm

YARA: Found

Links:
https://github.com/cado-security
https://github.com/likexian/doh-go
#ParsedReport
14-12-2022

RedGoBotGoDDoS. Redgobot DDOS zombie network written in the new Go language

https://mp.weixin.qq.com/s/4iTA4LBNEnOQ5T5AcvZCCA

Threats:
Redgobot_botnet
Robinbot
Gobot
Bashlite
Tcpsynflood_technique
Tcpackflood_technique
Moobot

IOCs:
Hash: 11
File: 1
IP: 3

Softs:
curl

Functions:
OpenVpn_Send

Languages:
golang

Platforms:
arm, ppc64, amd64, mips
#ParsedReport
15-12-2022

STOP Ransomware Being Distributed in Korea

https://asec.ahnlab.com/en/43861

Threats:
Stop_ransomware
Smokeloader
Vidar_stealer
Trojan/win.generic.r533564
Raccoon_stealer
Ransomware/win.extensions.c5314354
Beamwinhttp_loader

Industry:
Financial

Geo:
Korea

IOCs:
Path: 6
Url: 5
Registry: 1
File: 5
Hash: 7

Softs:
task scheduler

Platforms:
intel, x86
#ParsedReport
15-12-2022

ASEC Weekly Malware Statistics (December 5th, 2022 December 11th, 2022)

https://asec.ahnlab.com/en/44354

Threats:
Amadey
Smokeloader
Lockbit
Beamwinhttp_loader
Garbage_cleaner
Agent_tesla
Formbook
Clipboard_grabbing_technique

Industry:
Financial

Geo:
Korea

IOCs:
Url: 21
Email: 5
File: 6
Domain: 5

Softs:
telegram

Languages:
php
#ParsedReport
15-12-2022

MoneyMonger: Predatory Loan Scam Campaigns Move to Flutter

https://www.zimperium.com/blog/moneymonger-predatory-loan-scam-campaigns-move-to-flutter

Actors/Campaigns:
Moneymonger (motivation: information_theft)

Threats:
Bazarbackdoor

Industry:
Financial

Geo:
Peru, Indian, Nederlands

IOCs:
Url: 33
Hash: 39
File: 1

Softs:
flutter, flutters, flutter-java, android, google chrome, mozilla firefox, opera, microsoft edge

Algorithms:
aes, xor

Functions:
collects_privateInfo

Languages:
java, javascript

Platforms:
apple
Интересный проект с TTP и инфой по ним (детекты, новости, софты, группировки и т.д.)
https://app.tidalcyber.com/