Mon, 07 Mar 2022 21:58:15 +0000
MS Office Files Involved Again in Recent Emotet Trojan Campaign – Part I
https://www.fortinet.com/blog/threat-research/ms-office-files-involved-in-emotet-trojan-campaign-pt-one
Fortinet Blog
MS Office Files Involved Again in Recent Emotet Trojan Campaign – Part I
FortiGuard Labs discovered more than 500 Microsoft Excel files involved in a campaign to deliver a fresh Emotet Trojan variant. Read to learn more how to avoid this lure.…
Mon, 07 Mar 2022 22:05:21 +0000
An update on the threat landscape
https://blog.google/threat-analysis-group/update-threat-landscape-ukraine/
Google
An update on the threat landscape
Online security is extremely important for people in Ukraine and the surrounding region right now. Government agencies, independent newspapers and public service provide…
Tue, 08 Mar 2022 00:50:28 +0000
The Good, the Bad, and the Web Bug: TA416 Increases Operational Tempo Against European Governments as Conflict in Ukraine Escalates
https://www.proofpoint.com/us/blog/threat-insight/good-bad-and-web-bug-ta416-increases-operational-tempo-against-european
Proofpoint
TA416: Activity, Techniques, & Targeting Explained | Proofpoint US
Proofpoint provides insights into TA416's activity targeting European governments as conflict in Ukraine escalates. Learn more about this Chinese state threat group.
Tue, 08 Mar 2022 01:02:53 +0000
njRAT Being Distributed via Webhards
https://asec.ahnlab.com/en/32450/
ASEC BLOG
njRAT Being Distributed via Webhards - ASEC BLOG
Webhards is a platform used to distribute malware, and it is mainly used by attackers that mainly target Korean users. The ASEC analysis team has been monitoring malware types distributed through webhards and has uploaded multiple blog posts about them in…
Tue, 08 Mar 2022 01:02:53 +0000
Malicious HWP File Disguised as Press Release of 20th Presidential Election Early Voting for Sailors Being Distributed
https://asec.ahnlab.com/en/32456/
ASEC BLOG
Malicious HWP File Disguised as Press Release of 20th Presidential Election Early Voting for Sailors Being Distributed - ASEC BLOG
The ASEC analysis team has discovered distribution of malicious HWP file disguised as “Press Release of 20th Presidential Election Early Voting for Sailors” as the presidential election draws near. The attacker distributed the malicious HWP file on February…
Tue, 08 Mar 2022 13:12:19 +0000
New RURansom Wiper Targets Russia
https://www.trendmicro.com/en_us/research/22/c/new-ruransom-wiper-targets-russia.html
Trend Micro
New RURansom Wiper Targets Russia
We analyze RURansom, a malware variant discovered to be targeting Russia. Originally suspected to be a ransomware because of its name, analysis reveals RURansom to be a wiper.
Tue, 08 Mar 2022 15:36:05 +0000
Does This Look Infected? A Summary of APT41 Targeting U.S. State Governments
https://www.mandiant.com/resources/apt41-us-state-governments
Google Cloud Blog
APT41 Targeting U.S. State Government Networks | Mandiant | Google Cloud Blog
We detail APT41's persistent effort that allowed them to successfully compromise at least 6 U.S. state government networks by exploiting vulnerable web apps.
Tue, 08 Mar 2022 16:47:38 +0000
Fake Purchase Order Used to Deliver Agent Tesla
https://www.fortinet.com/blog/threat-research/fake-purchase-order-used-to-deliver-agent-tesla
Fortinet Blog
Fake Purchase Order Used to Deliver Agent Tesla
FortiGuard Labs discovered a phishing email addressed to a Ukrainian recipient that masqueraded as purchase order containing a PPT attachment aiming to deploy the Agent Tesla RAT. Learn more.…
Tue, 08 Mar 2022 16:49:37 +0000
FBI Releases Indicators of Compromise for RagnarLocker Ransomware
https://us-cert.cisa.gov/ncas/current-activity/2022/03/08/fbi-releases-indicators-compromise-ragnarlocker-ransomware
Tue, 08 Mar 2022 16:49:40 +0000
Daxin Backdoor: In-Depth Analysis, Part One
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/daxin-malware-espionage-analysis
Security
Daxin Backdoor: In-Depth Analysis, Part One
In the first of a two-part series of blogs, we will delve deeper into Daxin, examining the driver initialization, networking, key exchange, and backdoor functionality of the malware.
Tue, 08 Mar 2022 16:50:50 +0000
Container Escape to Shadow Admin: GKE Autopilot Vulnerabilities
https://unit42.paloaltonetworks.com/gke-autopilot-vulnerabilities/
Unit 42
Container Escape to Shadow Admin: GKE Autopilot Vulnerabilities
We disclosed several GKE Autopilot vulnerabilities and attack techniques to Google. The issues are now fixed – we provide a technical analysis.
Tue, 08 Mar 2022 16:52:03 +0000
PROPHET SPIDER Exploits Citrix ShareFile Remote Code Execution Vulnerability CVE-2021-22941 to Deliver Webshell
https://www.crowdstrike.com/blog/prophet-spider-exploits-citrix-sharefile/
crowdstrike.com
PROPHET SPIDER Exploits Citrix ShareFile | CrowdStrike
Read our blog post to learn how PROPHET SPIDER continues to evolve their tradecraft while continuing to exploit known web-server vulnerabilities.
Tue, 08 Mar 2022 23:48:04 +0000
Emotet Redux
https://blog.lumen.com/emotet-redux/?utm_source=rss&utm_medium=rss&utm_campaign=emotet-redux
Lumen
Emotet Redux - Lumen
What Global Network Visibility Reveals about the Resurgence of One of the World’s Most Notorious Botnets Executive Summary Since its reemergence on Nov. 14, 2021, Black Lotus Labs has once again been tracking Emotet, one of the world’s most prolific malware…
Wed, 09 Mar 2022 11:25:19 +0000
Decrypted: Prometheus Ransomware
https://decoded.avast.io/threatresearch/decrypted-prometheus-ransomware/?utm_source=rss&utm_medium=rss&utm_campaign=decrypted-prometheus-ransomware
Avast Threat Labs
Decrypted: Prometheus Ransomware - Avast Threat Labs
Avast Releases Decryptor for the Prometheus Ransomware. Prometheus is a ransomware strain written in C# that inherited a lot of code from an older strain called Thanos. Skip to how to use the Prometheus ransomware decryptor. How Prometheus Works Prometheus…
Wed, 09 Mar 2022 11:40:21 +0000
New Nokoyawa Ransomware Possibly Related to Hive
https://www.trendmicro.com/en_us/research/22/c/nokoyawa-ransomware-possibly-related-to-hive-.html
Trend Micro
New Nokoyawa Ransomware Possibly Related to Hive
In March 2022, we came across evidence that another, relatively unknown, ransomware known as Nokoyawa is likely connected with Hive, as the two families share some striking similarities in their attack chain, from the tools used to the order in which they…
Wed, 09 Mar 2022 16:07:56 +0000
Raccoon Stealer: “Trash panda” abuses Telegram
https://decoded.avast.io/vladimirmartyanov/raccoon-stealer-trash-panda-abuses-telegram/?utm_source=rss&utm_medium=rss&utm_campaign=raccoon-stealer-trash-panda-abuses-telegram
Avast Threat Labs
Raccoon Stealer: “Trash panda” abuses Telegram - Avast Threat Labs
We recently came across a stealer, called Raccoon Stealer, a name given to it by its author. Raccoon Stealer uses the Telegram infrastructure to store and update actual C&C addresses. Raccoon Stealer is a password stealer capable of stealing not just passwords…
Wed, 09 Mar 2022 19:02:41 +0000
Russia-Ukraine Crisis Places Critical Infrastructure At High Risk
https://blog.cyble.com/2022/03/09/russia-ukraine-crisis-places-critical-infrastructure-at-high-risk/
Cyble
Russia-Ukraine Crisis Places Critical Infrastructure At High Risk
State-sponsored attackers, APT groups, and numerous hackers’ communities have been actively targeting the critical infrastructures.
Wed, 09 Mar 2022 19:13:31 +0000
Updated: Conti Ransomware
https://us-cert.cisa.gov/ncas/current-activity/2022/03/09/updated-conti-ransomware
Wed, 09 Mar 2022 19:44:35 +0000
FormBook spam campaign targets citizens of Ukraine️
https://blog.malwarebytes.com/threat-intelligence/2022/03/formbook-spam-campaign-targets-citizens-of-ukraine%EF%B8%8F/
Thu, 10 Mar 2022 01:51:19 +0000
Daxin Backdoor: In-Depth Analysis, Part Two
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/daxin-backdoor-espionage-analysis
Security
Daxin Backdoor: In-Depth Analysis, Part Two
In the second of a two-part series of blogs, we examine the communications and networking features of Daxin.
Thu, 10 Mar 2022 12:50:52 +0000
Qakbot injects itself into the middle of your conversations
https://news.sophos.com/en-us/2022/03/10/qakbot-injects-itself-into-the-middle-of-your-conversations/
Sophos News
Qakbot injects itself into the middle of your conversations
The heavily distributed botnet delivers a wide variety of payloads – and scans your network for weaknesses