CTT Report Hub
3.13K subscribers
7.5K photos
5 videos
67 files
11.2K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#ParsedReport
31-03-2022

Lazarus Trojanized DeFi app for delivering malware

https://securelist.com/lazarus-trojanized-defi-app/106195

Actors/Campaigns:
Lazarus (tags: malware, backdoor, trojan)

Threats:
Cookietime
Volgmer
Threatneedle

Industry:
Financial

Geo:
Korea

TTPs:
Tactics: 6
Technics: 11

IOCs:
Hash: 12
File: 11
Path: 2
Url: 8
#ParsedReport
31-03-2022

Ransomware Enforcement Operations in 2020 and 2021

https://www.recordedfuture.com/ransomware-enforcement-operations-in-2020-and-2021

Threats:
Revil (tags: ransomware)
Netwalker (tags: ransomware)
Log4shell_vuln

Industry:
Media, Financial, Healthcare, Government

Geo:
Romania, Russian, Uk, Japan, Poland, Ukraine
#ParsedReport
31-03-2022

Conti-nuation: methods and techniques observed in operations post the leaks

https://research.nccgroup.com/2022/03/31/conti-nuation-methods-and-techniques-observed-in-operations-post-the-leaks

Threats:
Conti
Bazarbackdoor
Trickbot
Cobalt_strike
Qakbot
Proxyshell_vuln
Proxylogon_exploit
Bloodhound_tool
Mimikatz
Zerologon_vuln

CVEs:
CVE-2018-13379 [Vulners]
Vulners score: 4.0
Exploitation: True
Patch: Official fix
Soft:
- fortinet fortios (le6.0.4, le5.6.7)

CVE-2018-13374 [Vulners]
Vulners score: 4.4
Exploitation: Unknown
Patch: Official fix
Soft:
- fortinet fortios (le5.6.7, le6.0.2)

CVE-2021-44228 [Vulners]
Vulners score: 4.0
Exploitation: True
Patch: Official fix
Soft:
- apache log4j (2.0, 2.0, 2.0, 2.0, <2.3.1, <2.12.2, <2.15.0)
- siemens sppa-t3000 ses3000 firmware (*)
- siemens captial (<2019.1, 2019.1, 2019.1)
- siemens comos (*)
- siemens desigo cc advanced reports (4.0, 4.1, 4.2, 5.0, 5.1)
have more...

TTPs:
Tactics: 4
Technics: 0

IOCs:
File: 14
Url: 1
Path: 8
IP: 4
Domain: 1
Hash: 1
#ParsedReport
31-03-2022

Security Advisory: Spring Cloud Framework Vulnerabilities

https://www.zscaler.com/blogs/security-research/security-advisory-spring-cloud-framework-vulnerabilities

Threats:
Spring4shell


CVEs:
CVE-2022-22963 [Vulners]
Score: CVSS Unknown, Vulners PENDING,
Exploitation: Unknown
Patch: Official fix

CVE-2022-22965 [Vulners]
Score: CVSS Unknown, Vulners PENDING,
Exploitation: Unknown
Patch: Official fix


Links:
https://github.com/spring-projects/spring-framework/commit/7f7fb58dd0dae86d22268a4b59ac7c72a6c22529
#ParsedReport
01-04-2022

Dissecting Blackguard Info Stealer. Sophisticated Variant Spotted in the wild

https://blog.cyble.com/2022/04/01/dissecting-blackguard-info-stealer

Actors/Campaigns:
Lapsus

Threats:
Blackguard_stealer (tags: vpn, malware, phishing, stealer)

Industry:
Financial

TTPs:
Tactics: 7
Technics: 16

IOCs:
File: 12
Path: 2
Url: 2
Registry: 1
Hash: 4
#ParsedReport
01-04-2022

Complete dissection of an APK with a suspicious C2 Server

https://lab52.io/blog/complete-dissection-of-an-apk-with-a-suspicious-c2-server

Threats:
Turla

IOCs:
IP: 1
Hash: 2
Url: 4
Email: 1
#ParsedReport
01-04-2022

AcidRain. A Modem Wiper Rains Down on Europe

https://www.sentinelone.com/labs/acidrain-a-modem-wiper-rains-down-on-europe

Actors/Campaigns:
Fancy_bear
Sandworm

Threats:
Acidrain (tags: rat, vpn, ddos, malware)
Vpnfilter (tags: botnet)
Whispergate
Hermeticwiper
Isaacwiper
Killdisk
Doublezero
Cyclops_blink

Industry:
Ics, Government, Iot

Geo:
Germany, Ukraine, Italy, German, Italian, Russia

IOCs:
Hash: 2

Links:
https://github.com/trendmicro/tlsh
#ParsedReport
01-04-2022

What Our Honeypot Sees Just One Day After The Spring4Shell Advisory

https://blog.netlab.360.com/what-our-honeypot-sees-just-one-day-after-the-spring4shell-advisory-en

Actors/Campaigns:
Lapsus

Threats:
Spring4shell (tags: scan, botnet)
Mirai (tags: botnet)

CVEs:
CVE-2010-1622 [Vulners]
Vulners: Score: 6.0, CVSS: 7.3,
Vulners: Exploitation: Unknown
X-Force: Risk: 7.5
X-Force: Patch: Official fix
Soft:
- oracle fusion middleware (11.1.1.8.0, 7.6.2, 11.1.1.6.1)
- springsource spring framework (2.5.6, 2.5.7, 2.5.2, 2.5.3, 3.0.0, 2.5.0, 2.5.1, 3.0.2, 3.0.1, 2.5.4, 2.5.5)

CVE-2022-22965 [Vulners]
Vulners: Score: Unknown, CVSS: PENDING,
Vulners: Exploitation: Unknown
X-Force: Risk: 9.8
X-Force: Patch: Official fix


IOCs:
File: 4
IP: 311
Url: 12
Hash: 18
#ParsedReport
01-04-2022

New UAC-0056 activity: Theres a Go Elephant in the room

https://blog.malwarebytes.com/threat-intelligence/2022/04/new-uac-0056-activity-theres-a-go-elephant-in-the-room

Actors/Campaigns:
Unc2589 (tags: stealer, backdoor, malware, phishing)

Threats:
Grimplant
Graphsteel
Cobalt_strike
Elephant_loader (tags: dropper)
Whispergate

Industry:
Media, Government

Geo:
Georgia, Ukrainian, Ukraine

IOCs:
Path: 4
Hash: 10
IP: 1

Links:
https://github.com/denisbrodbeck/machineid
#ParsedReport
02-04-2022

Fresh TOTOLINK Vulnerabilities Picked Up by Beastmode Mirai Campaign

https://www.fortinet.com/blog/threat-research/totolink-vulnerabilities-beastmode-mirai-campaign

Threats:
Beastmode_botnet (tags: ddos, rat, malware, botnet)
Mirai (tags: ddos, rat, malware, botnet)
Dark_mirai_botnet

Industry:
Iot

CVEs:
CVE-2016-5674 [Vulners]
Vulners: Score: 10.0, CVSS: 8.5,
Vulners: Exploitation: Unknown
X-Force: Risk: 6.3
X-Force: Patch: Unavailable
Soft:
- netgear readynas surveillance (1.4.2, 1.4.1, 1.1.1, 1.1.2, 1.3.2.14, 1.2.0.4, 1.3.2.4, 1.4.0)
- nuuo nvrmini 2 (3.0.0, 2.2.1, 2.0.0, 1.7.6, 1.7.5)
- nuuo nvrsolo (2.3.9.6, 2.3.7.10, 2.0.0, 1.75, 3.0.0, 2.1.5, 2.0.1, 2.3.7.9, 2.3.1.20, 2.3, 2.2.2)

CVE-2021-4045 [Vulners]
Vulners: Score: 10.0, CVSS: 3.7,
Vulners: Exploitation: Unknown
X-Force: Risk: 9.8
X-Force: Patch: Unavailable
Soft:
- tp-link tapo c200 firmware (le1.1.15)

CVE-2022-25075 [Vulners]
Vulners: Score: 7.5, CVSS: 6.9,
Vulners: Exploitation: Unknown
X-Force: Risk: 7.3
X-Force: Patch: Official fix
Soft:
- totolink a3000ru firmware (v5.9c.2280_b20180512)

CVE-2021-45382 [Vulners]
Vulners: Score: 10.0, CVSS: 5.3,
Vulners: Exploitation: Unknown
X-Force: Risk: 9.8
X-Force: Patch: Unavailable
Soft:
- dlink dir-820l firmware (-)
- dlink dir-820lw firmware (-)
- dlink dir-826l firmware (-)
- dlink dir-830l firmware (-)
- dlink dir-836l firmware (-)
have more...
CVE-2022-26210 [Vulners]
Vulners: Score: 7.5, CVSS: 7.1,
Vulners: Exploitation: Unknown
X-Force: Risk: 7.3
X-Force: Patch: Unavailable
Soft:
- totolink a830r firmware (5.9c.4729_b20191112)
- totolink a3100r firmware (4.1.2cu.5050_b20200504)
- totolink a950rg firmware (4.1.2cu.5161_b20200903)
- totolink a800r firmware (4.1.2cu.5137_b20200730)
- totolink a3000ru firmware (5.9c.5185_b20201128)
have more...
CVE-2022-26186 [Vulners]
Vulners: Score: 7.5, CVSS: PENDING,
Vulners: Exploitation: Unknown
X-Force: Risk: 7.3
X-Force: Patch: Unavailable
Soft:
- totolink n600r firmware (4.3.0cu.7570_b20200620)

CVE-2017-17215 [Vulners]
Vulners: Score: 6.5, CVSS: 6.9,
Vulners: Exploitation: True
X-Force: Risk: 9.8
X-Force: Patch: Unavailable
Soft:
- huawei hg532 firmware (-)


IOCs:
File: 7
Url: 11
IP: 2
Hash: 22
#ParsedReport
03-04-2022

PlugX: A Talisman to Behold

https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/plugx-a-talisman-to-behold.html

Actors/Campaigns:
Redfoxtrot

Threats:
Plugx_rat (tags: rat, dns, malware, backdoor, scan)
Thor
Pcshare

Industry:
Telco

Geo:
Asia, China, Africa

TTPs:
Tactics: 3
Technics: 14

IOCs:
File: 13
Path: 2
Domain: 10
Hash: 19
IP: 18
#ParsedReport
04-04-2022

Stolen Images Campaign Ends in Conti Ransomware

https://thedfirreport.com/2022/04/04/stolen-images-campaign-ends-in-conti-ransomware

Threats:
Conti (tags: trojan, rat, malware, ransomware, dns, proxy, backdoor)
Icedid
Cobalt_strike
Atera_agent
Mimikatz
Ryuk

Industry:
Financial

CVEs:
CVE-2021-42278 [Vulners]
Vulners: Score: 6.5, CVSS: 7.1,
Vulners: Exploitation: Unknown
X-Force: Risk: 7.5
X-Force: Patch: Official fix
Soft:
- microsoft windows server 2008 (-, r2)
- microsoft windows server 2012 (-, r2)
- microsoft windows server 2016 (-, 20h2, 2004)
- microsoft windows server 2019 (-)
- microsoft windows server 2022 (-)
have more...
CVE-2021-42287 [Vulners]
Vulners: Score: 6.5, CVSS: 7.1,
Vulners: Exploitation: Unknown
X-Force: Risk: 7.5
X-Force: Patch: Official fix
Soft:
- microsoft windows server (2004)
- microsoft windows server 2008 (-, -, r2)
- microsoft windows server 2012 (-, r2)
- microsoft windows server 2016 (-)
- microsoft windows server 2019 (-)
have more...

TTPs:
Tactics: 11
Technics: 22

IOCs:
File: 13
Domain: 2
Path: 1
IP: 10
Hash: 10

YARA: Found
SIGMA: Found

Links:
https://github.com/SigmaHQ/sigma/blob/master/rules/windows/deprecated/sysmon\_mimikatz\_detection\_lsass.yml
https://github.com/SigmaHQ/sigma/blob/becf3baeb4f6313bf267f7e8d6e9808fc0fc059c/rules/windows/process\_creation/proc\_creation\_win\_susp\_recon\_activity.yml
https://github.com/SigmaHQ/sigma/blob/e049058d14dd9ec09771b38ed4d59e8b49ba1bad/rules/windows/builtin/security/win\_security\_cobaltstrike\_service\_installs.yml
https://github.com/darkoperator/Veil-PowerView/blob/master/PowerView/functions/Invoke-ShareFinder.ps1
https://github.com/WazeHell/sam-the-admin/
https://github.com/SigmaHQ/sigma/blob/04f72b9e78f196544f8f1331b4d9158df34d7ecf/rules/windows/builtin/application/win\_software\_atera\_rmm\_agent\_install.yml
https://github.com/SigmaHQ/sigma/blob/eb382c4a59b6d87e186ee269805fe2db2acf250e/rules/windows/builtin/security/win\_admin\_share\_access.yml
https://github.com/SigmaHQ/sigma/blob/071bcc292362fd3754a2da00878bba4bae1a335f/rules/windows/process\_creation/proc\_creation\_win\_ad\_find\_discovery.yml
https://github.com/SigmaHQ/sigma/blob/8bb3379b6807610d61d29db1d76f5af4840b8208/rules/windows/process\_creation/proc\_creation\_win\_trust\_discovery.yml
https://github.com/SigmaHQ/sigma/blob/11b6b24660c045bb907ed43cfe007349764173bc/rules/windows/powershell/powershell\_script/posh\_ps\_powerview\_malicious\_commandlets.yml
https://github.com/SigmaHQ/sigma/blob/6b3fc11a48e8aa2773dfe266c3be11e4c4c973a5/rules/windows/process\_creation/proc\_creation\_win\_powershell\_defender\_disable\_feature.yml
https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1
#ParsedReport
04-04-2022

The Discord Token Grab

https://labs.k7computing.com/index.php/the-discord-token-grab

Threats:
Kazy

Industry:
Financial

IOCs:
File: 1
Url: 1
Path: 1
Hash: 1

Links:
https://github.com/extremecoders-re/pyinstxtractor
#ParsedReport
04-04-2022

Elephant Framework Delivered in Phishing Attacks Against Ukrainian Organizations

https://www.intezer.com/blog/research/elephant-malware-targeting-ukrainian-orgs

Actors/Campaigns:
Unc2589 (tags: phishing)

Threats:
Graphsteel (tags: stealer, malware, phishing)
Grimplant (tags: malware, backdoor, phishing)
Cobalt_strike
Elephant_loader
Babar

Industry:
Government, Petroleum, Media

Geo:
Romania, Russian, Ukrainian, Turkey, French, Ukraine, Israel

IOCs:
File: 3
IP: 1
Url: 1
Hash: 1
Path: 1
Domain: 1

Links:
https://github.com/redcode-labs/Coldfire
https://github.com/kerbyj/goLazagne
#ParsedReport
04-04-2022

Spring4Shell (CVE-2022-22965): details and mitigations

https://securelist.com/spring4shell-cve-2022-22965/106239

Threats:
Spring4shell (tags: malware)
Log4shell_vuln

CVEs:
CVE-2022-22963 [Vulners]
Vulners: Score: Unknown, CVSS: PENDING,
Vulners: Exploitation: Unknown
X-Force: Risk: 9.8
X-Force: Patch: Official fix

CVE-2010-1622 [Vulners]
Vulners: Score: 6.0, CVSS: 7.3,
Vulners: Exploitation: Unknown
X-Force: Risk: 7.5
X-Force: Patch: Official fix
Soft:
- oracle fusion middleware (11.1.1.8.0, 7.6.2, 11.1.1.6.1)
- springsource spring framework (2.5.6, 2.5.7, 2.5.2, 2.5.3, 3.0.0, 2.5.0, 2.5.1, 3.0.2, 3.0.1, 2.5.4, 2.5.5)

CVE-2022-22965 [Vulners]
Vulners: Score: Unknown, CVSS: PENDING,
Vulners: Exploitation: Unknown
X-Force: Risk: 9.8
X-Force: Patch: Official fix


IOCs:
Hash: 2
File: 1
#ParsedReport
04-04-2022

FIN7 Power Hour: Adversary Archaeology and the Evolution of FIN7

https://www.mandiant.com/resources/evolution-of-fin7

Actors/Campaigns:
Carbanak (tags: scan, dropper, ransomware, dns, malware, backdoor, phishing, rat, proxy)
Darkside (tags: ransomware)
Blackmatter
Fin12

Threats:
Revil
Blackcat (tags: ransomware)
Powerplant
Birdwatch_loader
Fowlgaze
Loadout_loader
Griffon
Badusb_technique
Dice_loader
Killack
Powertrash_tool
Supersoft
Pillowmint
Powersploit
Termite
Metasploit_tool
Bughatch
Cobalt_strike
Kerberoasting_technique
Hello
Atera_agent
Easylook_tool
Boatlaunch_tool
Jssloader
Maze (tags: ransomware)
Ryuk (tags: ransomware)
Bateleur
Driftpin

Industry:
Financial, Healthcare, Telco

TTPs:
Tactics: 10
Technics: 53

IOCs:
Path: 4
File: 28
Hash: 34
Coin: 1
Domain: 15

Links:
https://github.com/monoxgas/sRDI
https://github.com/PowerShellMafia/PowerSploit/blob/master/CodeExecution/Invoke-Shellcode.ps1