CTT Report Hub
3.22K subscribers
7.99K photos
6 videos
67 files
11.7K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#ParsedReport
02-01-2023

ASEC Weekly Malware Statistics (December 19th, 2022 December 25th, 2022)

https://asec.ahnlab.com/en/45023

Threats:
Beamwinhttp_loader
Garbage_cleaner
Agent_tesla
Tofsee
Stop_ransomware
Smokeloader
Vidar_stealer
Formbook
Clipboard_grabbing_technique
Snake_keylogger

Industry:
Financial

Geo:
Korea

IOCs:
File: 19
Email: 9
Domain: 2
Url: 11

Softs:
telegram, discord

Languages:
php
#ParsedReport
02-01-2023

Dark Web Profile: MuddyWater APT Group

https://socradar.io/dark-web-profile-muddywater-apt-group

Actors/Campaigns:
Muddywater (motivation: cyber_espionage, financially_motivated)
Unc3313

Threats:
Powgoop
Powerstats
Stuxnet
Mimikatz_tool
Ligolo
Screenconnect_tool
Ehorus_tool
Starwhale
Disttrack
Syncro_tool

Industry:
Government, Energy, Healthcare, Education, Financial

Geo:
Asia, Iraq, Africa, Turkish, Turkey, Azerbaijan, Irans, America, Iran, Pakistan, Israeli, Bahrain, Iranian, Emirates, Israel

TTPs:
Tactics: 12
Technics: 55

IOCs:
File: 11
Hash: 30
IP: 16

Softs:
component object model

Languages:
visual_basic, python, javascript
#ParsedReport
03-01-2023

How Infostealer Threat Actors Make a Profit

https://asec.ahnlab.com/en/45150

Threats:
Agent_tesla
Formbook
Lokibot_stealer
Snake_keylogger
Redline_stealer
Vidar_stealer
Lockbit

Industry:
Financial
#ParsedReport
04-01-2023

Shc Linux Malware Installing CoinMiner

https://asec.ahnlab.com/en/45182

Threats:
Xmrig_miner
Perlbot

Geo:
Korea

IOCs:
File: 1
Hash: 12
IP: 2
Url: 9

Softs:
ubuntu)

Algorithms:
rc4

Languages:
perl
#ParsedReport
04-01-2023

Pupy RAT hiding under WerFaults cover

https://labs.k7computing.com/index.php/pupy-rat-hiding-under-werfaults-cover

Actors/Campaigns:
Apt33 (motivation: cyber_espionage)
Cleaver (motivation: cyber_espionage)

Threats:
Pupy_rat
Lolbin_technique
Dll_sideloading_technique
Cloudeye
Reflectiveloader

Industry:
Energy

Geo:
Chinese, China, Iran

TTPs:
Tactics: 1
Technics: 0

IOCs:
File: 6
Hash: 3
Url: 1

Softs:
windows error reporting

Algorithms:
rc4

Win API:
CreateThread

Languages:
python

Links:
https://github.com/n1nj4sec/pupy
#ParsedReport
05-01-2023

BlindEagle Targeting Ecuador With Sharpened Tools. HIGHLIGHTS:

https://research.checkpoint.com/2023/blindeagle-targeting-ecuador-with-sharpened-tools

Actors/Campaigns:
Blindeagle (motivation: financially_motivated, cyber_espionage)
Cloudatlas

Threats:
Quasar_rat
Meterpreter_tool
Lotl_technique
Azov
Wannacry
Rubyminer
Adwind_rat

Industry:
Financial, Government

Geo:
Ukraine, Ecuador, America, Russia, Spanish, Belarus, Colombian, Colombia, Turkish

IOCs:
Url: 5
File: 14
Domain: 3
Registry: 3
Hash: 13

Softs:
pyinstaller, windows defender), office 365, android

Algorithms:
prng, base64, zip

Functions:
GetConsoleWindow, CreateObject

Win API:
ShowWindow, VirtualAlloc, RtlMoveMemory, CreateThread, WaitForSingleObject

Win Services:
WebClient

Languages:
python

Links:
https://github.com/rapid7/metasploit-payloads/blob/master/python/meterpreter/meterpreter.py
#ParsedReport
05-01-2023

Securonix Threat Labs Monthly Intelligence Insights December

https://www.securonix.com/blog/securonix-threat-labs-monthly-intelligence-insights-december

Actors/Campaigns:
Agrius
Steppy_kavach
Phosphorus
Transparenttribe
Sidecopy

Threats:
Crywiper
Zerobot
Raspberry_robin
Avkiller
Burntcigar_tool
Cuba
Apostle
Fantasy_wiper
Log4shell_vuln
Proxyshell_vuln

Industry:
Telco, Government, Energy, Iot, Financial

Geo:
Israel, Indias, Mexico, Argentina, Iran, Africa, Pakistan, Brazil, France, American, Colombia, Australian, Iranian, Russian, Australia, Indian, India, Emirates, Croatia, Italy

CVEs:
CVE-2022-42475 [Vulners]
Vulners: Score: Unknown, CVSS: 6.2,
Vulners: Exploitation: True
X-Force: Risk: 9.8
X-Force: Patch: Official fix

CVE-2022-33891 [Vulners]
Vulners: Score: Unknown, CVSS: 2.3,
Vulners: Exploitation: Unknown
X-Force: Risk: 9.8
X-Force: Patch: Official fix
Soft:
- apache spark (le3.0.3, le3.2.1, le3.1.2)


IOCs:
Path: 1
Command: 1
File: 14
IP: 1
Domain: 1

Softs:
apache spark

Languages:
javascript
Нужны ли на этом канале ссылки на инструментарий: тулы, обфускаторы и т.д (тег #technique)?
Final Results
77%
Да
18%
Нет
5%
Посмотреть ответы
Спасибо, что поучаствовали в голосовалке.
Расклад понятен, посты под тегом #technique продолжаем :)
🔥1
#technique

Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime

https://github.com/D1rkMtr/UnhookingPatch
#technique

Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle to ntdll , and trigger exported API from the export table

https://github.com/D1rkMtr/FilelessNtdllReflection
#ParsedReport
05-01-2023

Unraveling the techniques of Mac ransomware

https://www.microsoft.com/en-us/security/blog/2023/01/05/unraveling-the-techniques-of-mac-ransomware

Threats:
Opendir
Filecoder
Keranger
Macransom
Evilquest
Applescript
Timestomp_technique

TTPs:
Tactics: 8
Technics: 27

IOCs:
File: 1
Hash: 5

Softs:
macos, microsoft defender for endpoint, unix, mac os, virtualbox, microsoft edge, microsoft defender, sudo

Algorithms:
xor, cbc, aes, hmac, zip

Functions:
opendir, readdir, closedir, ptrace, time, sleep, kqueue, kevent, CreateMatchingDirectory

Languages:
objective_c

Links:
https://github.com/gdbinit/gopher