In-depth analysis of the Operation Cache Panda organized supply chain attack against Taiwan's financial industry
https://medium.com/cycraft/supply-chain-attack-targeting-taiwan-financial-sector-bae2f0962934
https://medium.com/cycraft/supply-chain-attack-targeting-taiwan-financial-sector-bae2f0962934
Medium
深度剖析針對臺灣金融業的 Operation Cache Panda 組織型供應鏈攻擊
奧義智慧團隊第一手調查,挖掘中國國家級駭客利用金融軟體系統漏洞,所引發的一系列高風險攻擊事件
Wed, 23 Feb 2022 01:22:17 +0000
Increased Phishing Attacks Disguised as Microsoft
https://asec.ahnlab.com/en/31994/
ASEC BLOG
Increased Phishing Attacks Disguised as Microsoft - ASEC BLOG
The ASEC analysis team has recently discovered phishing emails disguised as Microsoft login pages. As shown in the figure below, one of the collected samples is disguised as the company’s voice message to prompt users to click the attached playback file.…
Wed, 23 Feb 2022 01:56:10 +0000
ASEC 주간 악성코드 통계 ( 20220214 ~ 20220220 )
https://asec.ahnlab.com/ko/31982/
ASEC BLOG
ASEC 주간 악성코드 통계 ( 20220214 ~ 20220220 ) - ASEC BLOG
ASEC 분석팀에서는 ASEC 자동 분석 시스템 RAPIT 을 활용하여 알려진 악성코드들에 대한 분류 및 대응을 진행하고 있다. 본 포스팅에서는 2022년 2월 14일 월요일부터 2월 20일 일요일까지 한 주간 수집된 악성코드의 통계를 정리한다. 대분류 상으로는 인포스틸러가 74.5%로 1위를 차지하였으며, 그 다음으로는 RAT (Remote Administration Tool) 악성코드가 17.4%, 뱅킹 악성코드 3.9%, 다운로더 2.1%, 랜섬웨어…
Wed, 23 Feb 2022 01:56:10 +0000
정상 윈도우 인스톨러(MSI)로 위장한 매그니베르 유포 재개 (2/22)
https://asec.ahnlab.com/ko/32005/
ASEC BLOG
정상 윈도우 인스톨러(MSI)로 위장한 매그니베르 유포 재개 (2/22) - ASEC BLOG
ASEC 분석팀은 어제 (02/22) 오전 매그니베르 랜섬웨어가 기존 윈도우앱(APPX) 형태가 아닌 정상 윈도우 인스톨러(MSI)로 위장하여 유포를 재개한 것을 확인하였다. MSI 확장자로 유포중인 매그니베르의 파일명은 아래와 같이 윈도우 업데이트 파일로 위장하였다. Critical.Update.Win10.0-kb4215776.msi Critical.Update.Win10.0-kb6253668.msi Critical.Update.Win10.0-kb5946410.msi…
Wed, 23 Feb 2022 15:58:19 +0000
(Ex)Change of Pace: UNC2596 Observed Leveraging Vulnerabilities to Deploy Cuba Ransomware
https://www.mandiant.com/resources/unc2596-cuba-ransomware
Mandiant
(Ex)Change of Pace: UNC2596 Observed Leveraging Vulnerabilities to Deploy Cuba Ransomware | Mandiant
Coffee Ransomware Continues To Be Active, Antiy Releases Decryption Tool
https://www-antiy-cn.translate.goog/research/notice&report/research_report/20220222.html?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=ru&_x_tr_pto=wapp
https://www-antiy-cn.translate.goog/research/notice&report/research_report/20220222.html?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=ru&_x_tr_pto=wapp
www-antiy-cn.translate.goog
Coffee勒索软件持续活跃,安天发布解密工具
安天是引领威胁检测与防御能力发展的网络安全国家队,为客户构建端点防护、流量监测、边界防护、导流捕获、深度分析、应急处置的安全基石
New Sandworm Malware Cyclops Blink Replaces VPNFilter
https://www.cisa.gov/uscert/ncas/alerts/aa22-054a
https://www.cisa.gov/uscert/ncas/alerts/aa22-054a
www.cisa.gov
New Sandworm Malware Cyclops Blink Replaces VPNFilter | CISA
The Sandworm actor, which the United Kingdom and the United States have previously attributed to the Russian GRU, has replaced the exposed VPNFilter malware with a new more advanced framework.
Thu, 24 Feb 2022 01:04:34 +0000
Dridex bots deliver Entropy ransomware in recent attacks
https://news.sophos.com/en-us/2022/02/23/dridex-bots-deliver-entropy-ransomware-in-recent-attacks/
Sophos News
Dridex bots deliver Entropy ransomware in recent attacks
Some code used in the ransomware bear a resemblance to code used in Dridex malware, hinting at a common origin
Sanctions Be Damned | From Dridex to Macaw, The Evolution of Evil Corp
https://www.sentinelone.com/labs/sanctions-be-damned-from-dridex-to-macaw-the-evolution-of-evil-corp/
https://www.sentinelone.com/labs/sanctions-be-damned-from-dridex-to-macaw-the-evolution-of-evil-corp/
SentinelOne
Sanctions Be Damned | From Dridex to Macaw, The Evolution of Evil Corp
What really happened to Evil Corp after the OFAC sanctions? Did they cut and run, or are they still operating with impunity?
Malware Civil War – Malicious npm Packages Targeting Malware Authors
https://jfrog.com/blog/malware-civil-war-malicious-npm-packages-targeting-malware-authors/
https://jfrog.com/blog/malware-civil-war-malicious-npm-packages-targeting-malware-authors/
JFrog
Malware Civil War - Malicious npm Packages Targeting Malware Authors
JFrog discovers 25 open-source npm malicious packages, including one that targets malware authors to hijack stolen Discord tokens. Find out more >
Thu, 24 Feb 2022 01:14:51 +0000
LockBit Ransomware Being Distributed Using Resume and Copyright-related Emails
https://asec.ahnlab.com/en/32054/
ASEC
LockBit Ransomware Being Distributed Using Resume and Copyright-related Emails - ASEC
The ASEC analysis team has recently discovered ransomware that is being distributed emails after disguising itself as resumes or copyright-related claims. The malicious emails with such content have been steadily distributed from the past. Unlike previous…
Thu, 24 Feb 2022 01:14:51 +0000
Cobalt Strike Being Distributed to Vulnerable MS-SQL Servers (2)
https://asec.ahnlab.com/en/32062/
ASEC
Cobalt Strike Being Distributed to Unsecured MS-SQL Servers (2) - ASEC
The ASEC analysis team has uploaded a post on February 21st about distribution of Cobalt Strike via unsecured MS-SQL servers. Cobalt Strike Being Distributed to Unsecured MS-SQL Servers As for the current case, the distributed Cobalt Strike had a different…
Thu, 24 Feb 2022 02:46:46 +0000
用DTA照亮DNS威胁分析之路 (3)
https://blog.netlab.360.com/use_dta_to_illuminate_the_path_of_dns_threat_analysis_3/
360 Netlab Blog - Network Security Research Lab at 360
用DTA照亮DNS威胁分析之路 (3)
--- 内置未知威胁分析模型介绍
概述
在系列文章2
[https://blog.netlab.360.com/use_dta_to_illuminate_the_path_of_dns_threat_analysis_2/]
,介绍了如何利用DTA进行一轮完整的未知威胁分析,共有3个步骤:
> 1、提出分析思路,从DNS日志里找到可疑线索
2、确认可疑线索有威胁行为
3、借助DNS日志确认资产被感染
其中,这几个步骤里最为安全分析人员所熟悉的应该是步骤2,毕竟日常工作大家都少不了利用各家威胁情…
概述
在系列文章2
[https://blog.netlab.360.com/use_dta_to_illuminate_the_path_of_dns_threat_analysis_2/]
,介绍了如何利用DTA进行一轮完整的未知威胁分析,共有3个步骤:
> 1、提出分析思路,从DNS日志里找到可疑线索
2、确认可疑线索有威胁行为
3、借助DNS日志确认资产被感染
其中,这几个步骤里最为安全分析人员所熟悉的应该是步骤2,毕竟日常工作大家都少不了利用各家威胁情…
Thu, 24 Feb 2022 05:05:52 +0000
StrRAT in Disguise
https://labs.k7computing.com/index.php/strrat-in-disguise/
K7 Labs
StrRAT in Disguise - K7 Labs
This blog is a follow-up to the StrRAT discussed before here in K7Labs blog. A new variant of StrRAT where […]
Thu, 24 Feb 2022 10:58:35 +0000
New Malware Capable of Controlling Social Media Accounts Infects 5,000+ Machines and is actively being Distributed via Gaming Applications on Microsoft’s Offici
https://research.checkpoint.com/2022/new-malware-capable-of-controlling-social-media-accounts-infects-5000-machines-and-is-actively-being-distributed-via-gaming-applications-on-microsofts-official-store/
Check Point Research
New Malware Capable of Controlling Social Media Accounts Infects 5,000+ Machines and is actively being Distributed via Gaming Applications…
Popular games such as “Temple Run” or “Subway Surfer” were found to be malicious Attackers can use the installed malware as a backdoor in order to gain full control on the victim’s machine Most of the victims are from Sweden, Bulgaria, Russia, Bermuda and…
Thu, 24 Feb 2022 15:16:43 +0000
Left On Read: Telegram Malware Spotted in Latest Iranian Cyber Espionage Activity
https://www.mandiant.com/resources/telegram-malware-iranian-espionage
Google Cloud Blog
Left On Read: Telegram Malware Spotted in Latest Iranian Cyber Espionage Activity | Mandiant | Google Cloud Blog
Thu, 24 Feb 2022 18:36:42 +0000
Hermetic Wiper & resurgence of targeted attacks on Ukraine
https://www.zscaler.com/blogs/security-research/hermetic-wiper-resurgence-targeted-attacks-ukraine
Zscaler
Hermetic Wiper & resurgence of targeted attacks on Ukraine | Zscaler
Ukraine Targeted Attacks Wiper
Fri, 25 Feb 2022 01:09:38 +0000
New Infostealer ‘ColdStealer’ Being Distributed
https://asec.ahnlab.com/en/32090/
ASEC BLOG
New Infostealer 'ColdStealer' Being Distributed - ASEC BLOG
The ASEC analysis team has discovered the distribution of ColdStealer that appears to be a new type of infostealer. The malware disguises itself as a software download for cracks and tools, a distribution method that was mentioned multiple times in previous…
Fri, 25 Feb 2022 13:29:00 +0000
Threat updates – A new IcedID GZipLoader variant
https://threatray.com/blog/a-new-icedid-gziploader-variant/
Threatray
Threat updates: A new IcedID GZipLoader variant | Threatray
IcedId is a modular banking Trojan discovered in 2017.
Fri, 25 Feb 2022 17:13:39 +0000
Some details of the DDoS attacks targeting Ukraine and Russia in recent days
https://blog.netlab.360.com/some_details_of_the_ddos_attacks_targeting_ukraine_and_russia_in_recent_days/
360 Netlab Blog - Network Security Research Lab at 360
Some details of the DDoS attacks targeting Ukraine and Russia in recent days
At 360Netlab, we continuously track botnets on a global scale through our BotMon system. In particular, for DDoS-related botnets, we further tap into their C2 communications to enable us really see the details of the attacks. Equipped with this visibility…