CTT Report Hub
3.22K subscribers
7.97K photos
6 videos
67 files
11.6K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#ParsedReport
15-12-2022

STOP Ransomware Being Distributed in Korea

https://asec.ahnlab.com/en/43861

Threats:
Stop_ransomware
Smokeloader
Vidar_stealer
Trojan/win.generic.r533564
Raccoon_stealer
Ransomware/win.extensions.c5314354
Beamwinhttp_loader

Industry:
Financial

Geo:
Korea

IOCs:
Path: 6
Url: 5
Registry: 1
File: 5
Hash: 7

Softs:
task scheduler

Platforms:
intel, x86
#ParsedReport
15-12-2022

ASEC Weekly Malware Statistics (December 5th, 2022 December 11th, 2022)

https://asec.ahnlab.com/en/44354

Threats:
Amadey
Smokeloader
Lockbit
Beamwinhttp_loader
Garbage_cleaner
Agent_tesla
Formbook
Clipboard_grabbing_technique

Industry:
Financial

Geo:
Korea

IOCs:
Url: 21
Email: 5
File: 6
Domain: 5

Softs:
telegram

Languages:
php
#ParsedReport
15-12-2022

MoneyMonger: Predatory Loan Scam Campaigns Move to Flutter

https://www.zimperium.com/blog/moneymonger-predatory-loan-scam-campaigns-move-to-flutter

Actors/Campaigns:
Moneymonger (motivation: information_theft)

Threats:
Bazarbackdoor

Industry:
Financial

Geo:
Peru, Indian, Nederlands

IOCs:
Url: 33
Hash: 39
File: 1

Softs:
flutter, flutters, flutter-java, android, google chrome, mozilla firefox, opera, microsoft edge

Algorithms:
aes, xor

Functions:
collects_privateInfo

Languages:
java, javascript

Platforms:
apple
Интересный проект с TTP и инфой по ним (детекты, новости, софты, группировки и т.д.)
https://app.tidalcyber.com/
Вот это я понимаю утечка. Не то что ваши миллионы ПДН, логинов и паролей.
Forwarded from vx-underground
mcbazza was exploring Shodan. He found an exposed camera monitoring a large crop of Tomatoes

Good find!
🔥2
#ParsedReport
15-12-2022

MCCrash: Cross-platform DDoS botnet targets private Minecraft servers

https://www.microsoft.com/en-us/security/blog/2022/12/15/mccrash-cross-platform-ddos-botnet-targets-private-minecraft-servers

Threats:
Log4shell_vuln
Trojan:win32/mccrash.ma

Industry:
Healthcare, Iot

Geo:
Russia

IOCs:
File: 7
Domain: 2
Hash: 7

Softs:
microsoft defender for iot, (debian, ubuntu, pyinstaller, azure active directory, microsoft 365 defender, windows security, windows defender application control, microsoft defender, microsoft defender for endpoint, have more...

Languages:
java, python
#ParsedReport
16-12-2022

Dark Web Profile: Black Basta Ransomware

https://socradar.io/dark-web-profile-black-basta-ransomware

Actors/Campaigns:
Carbanak

Threats:
Blackbasta
Lockbit
Conti
Cobalt_strike
Qakbot

Industry:
Retail, Healthcare, Foodtech

Geo:
Deutsche, American

Algorithms:
chacha20

YARA: Found
SIGMA: Found
#ParsedReport
16-12-2022

Sophisticated DarkTortilla Malware Spreading Via Phishing Sites

https://blog.cyble.com/2022/12/16/sophisticated-darktortilla-malware-spreading-via-phishing-sites

Actors/Campaigns:
Tortilla

Threats:
Darktortilla
Agent_tesla
Asyncrat_rat
Nanocore_rat
Process_injection_technique

TTPs:
Tactics: 5
Technics: 6

IOCs:
Hash: 10
Url: 2
Registry: 1
File: 4
Path: 1
Domain: 2

Softs:
task scheduler, net framework, chrome

Algorithms:
rc4, exhibit, zip

Functions:
CreateDecryptor, FindNextFileExW, WriteFileA

Win API:
FindFirstFileExW, CreateFileA, GetObjectA
#ParsedReport
16-12-2022

. Types of the latest .NET packers and domestic distribution trends

https://asec.ahnlab.com/ko/44066

Threats:
Agent_tesla
Formbook
Postealer
Avemaria_rat
Asyncrat_rat
Darktortilla
Purecrypter
Confuserex_tool
Lokibot_stealer
Remcos_rat
Trojan/win.msilkrypt.r478738
Trojan/win.msilkrypt.r479010
Trojan/win.malwarex-gen.c4922823
Trojan/win.msilkrypt.c5020026
Trojan/win.msil.r503383
Trojan/win.msil.r510208
Trojan/win.msil.r492640
Trojan/win.msilkrypt.r478746
Trojan/win.msil.r491654
Trojan/win.msil.r479032
Trojan/win.msil.r536135
Trojan/win.loader.c5020045
Trojan/win.msilkrypt.r479033
Trojan/win.generic.c5197697
Trojan/win.msilkrypt.r479202
Trojan/win.msil.r5288800
Trojan/win.msil.c5134406
Trojan/win.msil.r498082
Trojan/win.msil.c5198300
Trojan/win.msil.r510204

Industry:
Transport

Geo:
Korea

IOCs:
File: 101
Hash: 33
Url: 27

Softs:
discord

Algorithms:
base64, xor

Functions:
Gameloader, Type

Languages:
csharp
#ParsedReport
16-12-2022

I Solemnly Swear My Driver Is Up to No Good: Hunting for Attestation Signed Malware

https://www.mandiant.com/resources/blog/hunting-attestation-signed-malware

Actors/Campaigns:
Mofang
Contileaks

Threats:
Poortry
Stonestop
Plugx_rat
Trickbot
Fivesys
Vmprotect_tool

Industry:
Entertainment, Education

Geo:
Chinese, Iranian, Russian

IOCs:
Hash: 288
IP: 7
File: 13
Path: 3

Languages:
python

YARA: Found
#ParsedReport
16-12-2022

Dark Web Profile: Killnet Russian Hacktivist Group

https://socradar.io/dark-web-profile-killnet-russian-hacktivist-group

Actors/Campaigns:
Killnet (motivation: financially_motivated, hacktivism)
Xaknet (motivation: hacktivism)
Zarya (motivation: hacktivism)
Anonymous_russia (motivation: hacktivism)
Dpr_joker (motivation: hacktivism)
Beregini (motivation: hacktivism)
Rahdit (motivation: hacktivism)
Noname057 (motivation: hacktivism)
Zsecnet (motivation: hacktivism)

Threats:
Killmilk_actor
Joker
Orbit_technique
Cannon
Karma

Industry:
Transport, Government, Aerospace, Telco, Financial, Healthcare

Geo:
Poland, Italy, Japan, Romania, London, Ukrainian, Germany, Ukraines, Indiana, Russia, Norwegian, Estonia, Ukraine, Italian, Romanian, Russian, Lithuania, Czech, American

TTPs:
Tactics: 3
Technics: 5

Softs:
telegram, teamspeak
#ParsedReport
19-12-2022

Veeam Fixes Critical Vulnerabilities in Backup & Replication Software (CVE-2022-26500 & CVE-2022-26501)

https://socradar.io/veeam-fixes-critical-vulnerabilities-in-backup-replication-software-cve-2022-26500-cve-2022-26501

Threats:
Monti
Yanluowang
Empire_loader

CVEs:
CVE-2022-26500 [Vulners]
Vulners: Score: 6.5, CVSS: 7.4,
Vulners: Exploitation: True
X-Force: Risk: 9.8
X-Force: Patch: Official fix
Soft:
- veeam backup \& replication (9.5.0.1536, 9.5.4.2615, <10.0.1.4854, 10.0.1.4854, 10.0.1.4854, 10.0.1.4854, 10.0.1.4854, <11.0.1.1261, 11.0.1.1261, 11.0.1.1261, 11.0.1.1261, 11.0.1.1261)

CVE-2022-26501 [Vulners]
Vulners: Score: 10.0, CVSS: 2.0,
Vulners: Exploitation: True
X-Force: Risk: 9.8
X-Force: Patch: Official fix
Soft:
- veeam backup \& replication (<10.0.1.4854, 10.0.1.4854, 10.0.1.4854, 10.0.1.4854, 10.0.1.4854, <11.0.1.1261, 11.0.1.1261, 11.0.1.1261, 11.0.1.1261, 11.0.1.1261)

CVE-2022-265001 [Vulners]
Vulners: Score: Unknown, CVSS: Unknown,
Vulners: Exploitation: Unknown
X-Force: Risk: Unknown
X-Force: Patch: Unknown


IOCs:
File: 4
Hash: 3
IP: 1

Languages:
python