CTT Report Hub
3.13K subscribers
7.5K photos
5 videos
67 files
11.2K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#ParsedReport
30-03-2022

ASEC Weekly Malware Statistics (March 21st, 2022 March 27th, 2022)

https://asec.ahnlab.com/en/33217

Threats:
Agent_tesla (tags: malware)
Formbook (tags: malware)
Lokibot_stealer (tags: malware)
Redline_stealer (tags: malware)
Snake_keylogger (tags: malware)

Industry:
Financial

IOCs:
Domain: 7
Email: 10
File: 23
Url: 16
IP: 4
#ParsedReport
30-03-2022

The Infection Chain. New Wave of Remcos RAT Phishing Campaign

https://blog.morphisec.com/remcos-trojan-analyzing-attack-chain

Threats:
Remcos_rat (tags: ransomware, phishing, rat, trojan, malware)
Cloudeye (tags: trojan)
Babadeda (tags: trojan)

Industry:
Financial

IOCs:
Hash: 28
File: 6
Domain: 8
Url: 12
Алярм! Spring4Shell.... Фреймворк много где используется.
#ParsedReport
31-03-2022

Tracking cyber activity in Eastern Europe

https://blog.google/threat-analysis-group/tracking-cyber-activity-eastern-europe

Actors/Campaigns:
Curious_gorge
Comment_crew
Ghostwriter

Industry:
Government, Financial

Geo:
Russia, Korea, Belarusian, Iran, China, Ukraine, Mongolia

IOCs:
IP: 5
Domain: 9
#ParsedReport
31-03-2022

New Milestones for Deep Panda: Log4Shell and Digitally Signed Fire Chili Rootkits

https://www.fortinet.com/blog/threat-research/deep-panda-log4shell-fire-chili-rootkits

Actors/Campaigns:
Shell_crew (tags: dropper, rat, backdoor, malware, rootkit)
Axiom

Threats:
Fire_chili_rootkit (tags: dropper, rat, backdoor, malware, rootkit)
Log4shell_vuln (tags: dropper, rat, backdoor, malware, rootkit)
Gh0st_rat
Netbot
Themida_packer_tool

Industry:
Financial

Geo:
Chinese, Korean

TTPs:

IOCs:
File: 10
Path: 1
Domain: 4
Hash: 50
IP: 3
Url: 4

Links:
https://github.com/bowlofstew/rootkit.com/blob/master/cardmagic/PortHidDemo\_Vista.c
https://github.com/geemion/Record/blob/master/HideReg.c
https://github.com/sin5678/gh0st
#ParsedReport
31-03-2022

Cloud Atlas Maldoc

https://inquest.net/blog/2022/03/30/cloud-atlas-maldoc

Threats:
Cloudatlas (tags: rat, malware, phishing)

Industry:
Aerospace, Media, Financial, Government

Geo:
Russian, Ukraine

IOCs:
Hash: 3
Url: 1
Domain: 2
IP: 1
#ParsedReport
31-03-2022

Analysis of BlackGuard - a new info stealer malware being sold in a Russian hacking forum

https://www.zscaler.com/blogs/security-research/analysis-blackguard-new-info-stealer-malware-being-sold-russian-hacking

Threats:
Blackguard_stealer (tags: cryptomining, vpn, ransomware, malware, phishing, stealer)
Exodus
Terra_stealer

Industry:
Financial, E-commerce

Geo:
Russian

TTPs:
Tactics: 1
Technics: 0

IOCs:
File: 2
Hash: 10
#ParsedReport
31-03-2022

State-sponsored Attack Groups Capitalise on Russia-Ukraine War for Cyber Espionage. Introduction

https://research.checkpoint.com/2022/state-sponsored-attack-groups-capitalise-on-russia-ukraine-war-for-cyber-espionage

Actors/Campaigns:
Siamesekitten (tags: malware)
Sidewinder (tags: malware, stealer)

Threats:
Machete

Industry:
Financial, Government, Energy

Geo:
Nicaragua, Iranian, America, India, Indian, Venezuela, Americans, Africa, Pakistani, Israel, Pakistan, Israeli, Asia, Arabia, Russia, Iran, Ukraine, China, Saudi, Russian

CVEs:
CVE-2017-11882 [Vulners]
Vulners score: 8.3
Exploitation: True
Patch: Official fix
Soft:
- microsoft office (2013, 2010, 2016, 2007)


IOCs:
Email: 1
Domain: 7
File: 15
Hash: 53
IP: 3
Url: 7
Path: 2

YARA: Found

Links:
https://github.com/TheGeekHT/Loki.Rat/
https://github.com/ghuntley/Heijden.Dns
#ParsedReport
31-03-2022

Lazarus Trojanized DeFi app for delivering malware

https://securelist.com/lazarus-trojanized-defi-app/106195

Actors/Campaigns:
Lazarus (tags: malware, backdoor, trojan)

Threats:
Cookietime
Volgmer
Threatneedle

Industry:
Financial

Geo:
Korea

TTPs:
Tactics: 6
Technics: 11

IOCs:
Hash: 12
File: 11
Path: 2
Url: 8
#ParsedReport
31-03-2022

Ransomware Enforcement Operations in 2020 and 2021

https://www.recordedfuture.com/ransomware-enforcement-operations-in-2020-and-2021

Threats:
Revil (tags: ransomware)
Netwalker (tags: ransomware)
Log4shell_vuln

Industry:
Media, Financial, Healthcare, Government

Geo:
Romania, Russian, Uk, Japan, Poland, Ukraine
#ParsedReport
31-03-2022

Conti-nuation: methods and techniques observed in operations post the leaks

https://research.nccgroup.com/2022/03/31/conti-nuation-methods-and-techniques-observed-in-operations-post-the-leaks

Threats:
Conti
Bazarbackdoor
Trickbot
Cobalt_strike
Qakbot
Proxyshell_vuln
Proxylogon_exploit
Bloodhound_tool
Mimikatz
Zerologon_vuln

CVEs:
CVE-2018-13379 [Vulners]
Vulners score: 4.0
Exploitation: True
Patch: Official fix
Soft:
- fortinet fortios (le6.0.4, le5.6.7)

CVE-2018-13374 [Vulners]
Vulners score: 4.4
Exploitation: Unknown
Patch: Official fix
Soft:
- fortinet fortios (le5.6.7, le6.0.2)

CVE-2021-44228 [Vulners]
Vulners score: 4.0
Exploitation: True
Patch: Official fix
Soft:
- apache log4j (2.0, 2.0, 2.0, 2.0, <2.3.1, <2.12.2, <2.15.0)
- siemens sppa-t3000 ses3000 firmware (*)
- siemens captial (<2019.1, 2019.1, 2019.1)
- siemens comos (*)
- siemens desigo cc advanced reports (4.0, 4.1, 4.2, 5.0, 5.1)
have more...

TTPs:
Tactics: 4
Technics: 0

IOCs:
File: 14
Url: 1
Path: 8
IP: 4
Domain: 1
Hash: 1
#ParsedReport
31-03-2022

Security Advisory: Spring Cloud Framework Vulnerabilities

https://www.zscaler.com/blogs/security-research/security-advisory-spring-cloud-framework-vulnerabilities

Threats:
Spring4shell


CVEs:
CVE-2022-22963 [Vulners]
Score: CVSS Unknown, Vulners PENDING,
Exploitation: Unknown
Patch: Official fix

CVE-2022-22965 [Vulners]
Score: CVSS Unknown, Vulners PENDING,
Exploitation: Unknown
Patch: Official fix


Links:
https://github.com/spring-projects/spring-framework/commit/7f7fb58dd0dae86d22268a4b59ac7c72a6c22529
#ParsedReport
01-04-2022

Dissecting Blackguard Info Stealer. Sophisticated Variant Spotted in the wild

https://blog.cyble.com/2022/04/01/dissecting-blackguard-info-stealer

Actors/Campaigns:
Lapsus

Threats:
Blackguard_stealer (tags: vpn, malware, phishing, stealer)

Industry:
Financial

TTPs:
Tactics: 7
Technics: 16

IOCs:
File: 12
Path: 2
Url: 2
Registry: 1
Hash: 4
#ParsedReport
01-04-2022

Complete dissection of an APK with a suspicious C2 Server

https://lab52.io/blog/complete-dissection-of-an-apk-with-a-suspicious-c2-server

Threats:
Turla

IOCs:
IP: 1
Hash: 2
Url: 4
Email: 1
#ParsedReport
01-04-2022

AcidRain. A Modem Wiper Rains Down on Europe

https://www.sentinelone.com/labs/acidrain-a-modem-wiper-rains-down-on-europe

Actors/Campaigns:
Fancy_bear
Sandworm

Threats:
Acidrain (tags: rat, vpn, ddos, malware)
Vpnfilter (tags: botnet)
Whispergate
Hermeticwiper
Isaacwiper
Killdisk
Doublezero
Cyclops_blink

Industry:
Ics, Government, Iot

Geo:
Germany, Ukraine, Italy, German, Italian, Russia

IOCs:
Hash: 2

Links:
https://github.com/trendmicro/tlsh
#ParsedReport
01-04-2022

What Our Honeypot Sees Just One Day After The Spring4Shell Advisory

https://blog.netlab.360.com/what-our-honeypot-sees-just-one-day-after-the-spring4shell-advisory-en

Actors/Campaigns:
Lapsus

Threats:
Spring4shell (tags: scan, botnet)
Mirai (tags: botnet)

CVEs:
CVE-2010-1622 [Vulners]
Vulners: Score: 6.0, CVSS: 7.3,
Vulners: Exploitation: Unknown
X-Force: Risk: 7.5
X-Force: Patch: Official fix
Soft:
- oracle fusion middleware (11.1.1.8.0, 7.6.2, 11.1.1.6.1)
- springsource spring framework (2.5.6, 2.5.7, 2.5.2, 2.5.3, 3.0.0, 2.5.0, 2.5.1, 3.0.2, 3.0.1, 2.5.4, 2.5.5)

CVE-2022-22965 [Vulners]
Vulners: Score: Unknown, CVSS: PENDING,
Vulners: Exploitation: Unknown
X-Force: Risk: 9.8
X-Force: Patch: Official fix


IOCs:
File: 4
IP: 311
Url: 12
Hash: 18
#ParsedReport
01-04-2022

New UAC-0056 activity: Theres a Go Elephant in the room

https://blog.malwarebytes.com/threat-intelligence/2022/04/new-uac-0056-activity-theres-a-go-elephant-in-the-room

Actors/Campaigns:
Unc2589 (tags: stealer, backdoor, malware, phishing)

Threats:
Grimplant
Graphsteel
Cobalt_strike
Elephant_loader (tags: dropper)
Whispergate

Industry:
Media, Government

Geo:
Georgia, Ukrainian, Ukraine

IOCs:
Path: 4
Hash: 10
IP: 1

Links:
https://github.com/denisbrodbeck/machineid