CTT Report Hub
3.13K subscribers
7.51K photos
5 videos
67 files
11.2K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#ParsedReport
14-04-2022

Threat Spotlight: "Haskers Gang" Introduces New ZingoStealer

http://blog.talosintelligence.com/2022/04/haskers-gang-zingostealer.html

Threats:
Zingo_stealer (tags: stealer, ransomware, malware, cryptomining, rat)
Redline_stealer (tags: fraud, malware, stealer)
Xmrig_miner (tags: malware, cryptomining, stealer, rat)
Exodus

Industry:
Financial

Geo:
Russian

TTPs:
Tactics: 2
Technics: 0

IOCs:
Url: 5
Domain: 3
File: 17
Path: 8
IP: 1
Coin: 1
Hash: 349
#ParsedReport
14-04-2022

Lazarus Targets Chemical Sector

https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/lazarus-dream-job-chemical

Actors/Campaigns:
Lazarus (tags: backdoor, rat, malware)
Dream_job (tags: malware)

Threats:
Skynet_botnet

Industry:
Chemical, Government, Healthcare

Geo:
Korea, USA

IOCs:
File: 16
Hash: 32
Url: 3
Path: 4
IP: 2
Domain: 5
#ParsedReport
14-04-2022

INCONTROLLER: New State-Sponsored Cyber Attack Tools Target Multiple Industrial Control Systems

https://www.mandiant.com/resources/incontroller-state-sponsored-ics-tool

Threats:
Incontroller_tool (tags: ddos, scan, rat, backdoor, malware)
Triton (tags: malware)
Crashoverride (tags: malware)
Stuxnet
Vpnfilter (tags: malware)

Industry:
Ics, Financial, Energy

Geo:
Iranian, Ukraine, America, Russia

CVEs:
CVE-2020-15368 [Vulners]
Vulners: Score: 2.1, CVSS: 4.0,
Vulners: Exploitation: Unknown
X-Force: Risk: 6.2
X-Force: Patch: Unavailable
Soft:
- asrock rgb driver firmware (-)


TTPs:
Tactics: 8
Technics: 0

IOCs:
File: 1

YARA: Found
#ParsedReport
14-04-2022

ESET takes part in global operation to disrupt Zloader botnets

https://www.welivesecurity.com/2022/04/13/eset-takes-part-global-operation-disrupt-zloader-botnets

Actors/Campaigns:
Darkside

Threats:
Z_loader (tags: malware, botnet, proxy, ransomware, stealer, rat, trojan, spam)
Zeus
Rig_tool
Hiddenvnc_tool
Raccoon_stealer
Cobalt_strike
Atera_tool
Gozi
Kryptik_trojan

Industry:
E-commerce, Financial

Geo:
Ukraine, Canada, Japan, Australia, USA, Germany

CVEs:
CVE-2012-0151 [Vulners]
Vulners: Score: 9.3, CVSS: 7.7,
Vulners: Exploitation: Unknown
X-Force: Risk: 9.3
X-Force: Patch: Official fix
Soft:
- microsoft windows vista (*, *)
- microsoft windows server 2008 (r2, *, *, *, r2)
- microsoft windows xp (*, -)
- microsoft windows 7 (*, *)
- microsoft windows server 2003 (*)
have more...
CVE-2013-3900 [Vulners]
Vulners: Score: 7.6, CVSS: 7.3,
Vulners: Exploitation: True
X-Force: Risk: 9.3
X-Force: Patch: Official fix
Soft:
- microsoft windows server 2008 (r2, r2, -)
- microsoft windows 7 (-)
- microsoft windows rt (-)
- microsoft windows 8.1 (-)
- microsoft windows server 2003 (-)
have more...

TTPs:
Tactics: 12
Technics: 53

IOCs:
IP: 4
File: 7
Hash: 18
Url: 33
#ParsedReport
14-04-2022

Old Gremlins, new methods

https://blog.group-ib.com/oldgremlin_comeback

Actors/Campaigns:
Oldgremlin
Molerats

Industry:
Healthcare, Financial, Petroleum

Geo:
Belarus, Russia

IOCs:
Domain: 12
File: 12
Url: 8
Path: 2
IP: 4
Hash: 5
#ParsedReport
18-04-2022

Orion Threat Alert: Flight of the BumbleBee. A new campaign in the wild: BumbleBee

https://www.cynet.com/orion-threat-alert-flight-of-the-bumblebee

Actors/Campaigns:
Exotic_lily
Wizard_spider
Molerats

Threats:
Bumblebee (tags: spam, malware, phishing, ransomware, rat)
Cobalt_strike
Lolbin
Fake-trusteer
Bazarbackdoor
Icedid
Conti
Lockbit
Avoslocker
Emotet

Industry:
Financial

TTPs:
Tactics: 6
Technics: 0

IOCs:
File: 15
Path: 1
IP: 9
Hash: 9
Domain: 3
#ParsedReport
18-04-2022

An Investigation of the BlackCat Ransomware via Trend Micro Vision One. Finding the threats

https://www.trendmicro.com/en_us/research/22/d/an-investigation-of-the-blackcat-ransomware.html

Threats:
Blackcat (tags: backdoor, scan, dns, ransomware, malware, rat)
Cobalt_strike (tags: ransomware)
Proxyshell_vuln
Proxylogon_exploit
Netscan_tool
Bloodhound_tool
Crackmapexec_tool
Mimikatz
Lolbin

CVEs:
CVE-2021-31207 [Vulners]
Vulners: Score: 6.5, CVSS: 2.8,
Vulners: Exploitation: True
X-Force: Risk: 6.6
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2013, 2016, 2016, 2019, 2019)

CVE-2021-34523 [Vulners]
Vulners: Score: 7.5, CVSS: 6.4,
Vulners: Exploitation: True
X-Force: Risk: 9
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2013, 2016, 2016, 2019, 2019)

CVE-2021-34473 [Vulners]
Vulners: Score: 10.0, CVSS: 6.4,
Vulners: Exploitation: True
X-Force: Risk: 9.1
X-Force: Patch: Official fix
Soft:
- microsoft exchange server (2013, 2016, 2016, 2019, 2019)


TTPs:
Tactics: 1
Technics: 0

IOCs:
File: 13
IP: 2
Path: 1
Hash: 25
Domain: 1

Links:
https://github.com/Kevin-Robertson/Inveigh
#ParsedReport
18-04-2022

From the Front Lines \| Peering into A PYSA Ransomware Attack

https://www.sentinelone.com/blog/from-the-front-lines-peering-into-a-pysa-ransomware-attack

Actors/Campaigns:
Quickbooks

Threats:
Mespinoza (tags: malware, phishing, ransomware, backdoor)
Lolbin
Cobalt_strike
Empire_loader
Chisel_tool
Powershell_ransomware
Psexec_tool
Koadic_tool
Mimikatz
Anydesk_tool
Magicsocks

Industry:
Government, Education, Healthcare

TTPs:
Tactics: 3
Technics: 19

IOCs:
File: 12
Path: 3
Hash: 40

Links:
https://github.com/winscp/winscp
https://github.com/jpillora/chisel
#ParsedReport
18-04-2022

Threat Spotlight: Conti Ransomware Group Behind theKarakurt Hacking Team. Threat Spotlight: Conti Ransomware Group Behind the Karakurt Hacking Team

https://www.infinitumit.com.tr/conti-ransomware-group-behind-the-karakurt-hacking-team

Threats:
Conti (tags: phishing, ransomware, malware, rat, dns, vpn, proxy)
Cobalt_strike
Anydesk_tool
Mimikatz
Metasploit_tool
Ligolo
Log4shell_vuln

Industry:
Government

Geo:
Germany, Canada, Russian

CVEs:
CVE-2021-44228 [Vulners]
Vulners: Score: 9.3, CVSS: 4.0,
Vulners: Exploitation: True
X-Force: Risk: 10
X-Force: Patch: Official fix
Soft:
- apache log4j (2.0, 2.0, 2.0, 2.0, <2.3.1, <2.12.2, <2.15.0)
- siemens sppa-t3000 ses3000 firmware (*)
- siemens captial (<2019.1, 2019.1, 2019.1)
- siemens comos (*)
- siemens desigo cc advanced reports (4.0, 4.1, 4.2, 5.0, 5.1)
have more...

TTPs:
Tactics: 9
Technics: 23

IOCs:
Domain: 1
IP: 21
File: 3
Url: 2

Links:
https://github.com/tnpitsecurity/ligolo-ng
https://github.com/infinitumitlabs
https://github.com/rapid7/metasploit-framework
https://github.com/Lozy/danted
https://github.com/SecureAuthCorp/impacket
https://github.com/infinitumitlabs/Karakurt-Hacking-Team-CTI
#ParsedReport
19-04-2022

BAZARLOADER: Unpacking an ISO File Infection. Step 1: Mounting ISO File & Extracting Stage 1 Executable

https://www.0ffset.net/reverse-engineering/bazarloader-iso-file-infection/?utm_source=rss&utm_medium=rss&utm_campaign=bazarloader-iso-file-infection

Threats:
Bazarbackdoor
Metasploit_tool
Cobalt_strike

IOCs:
File: 4
Hash: 1

Links:
https://github.com/OALabs/hashdb-ida
https://github.com/mandiant/flare-emu
https://github.com/OALabs/hashdb/blob/b3cc544fad41c749d04616663ac13f02bf1aaf37/algorithms/metasploit.py
https://github.com/OALabs/BlobRunner
#ParsedReport
20-04-2022

Shuckworm: Espionage Group Continues Intense Campaign Against Ukraine

https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/shuckworm-intense-campaign-ukraine

Actors/Campaigns:
Gamaredon (tags: malware, backdoor)

Threats:
Pterodo (tags: rat, dropper)

Geo:
Russian, Ukraine

IOCs:
File: 9
Path: 1
Domain: 1
Hash: 162
Url: 77

Links:
https://github.com/Symantec/threathunters/tree/main/Shuckworm
#ParsedReport
20-04-2022

Reversing a NSIS dropper using quick and dirty shellcode emulation. The Excel document

https://malcat.fr/blog/reversing-a-nsis-dropper-using-quick-and-dirty-shellcode-emulation

Threats:
Nsis_dropper (tags: malware, stealer, rat)
Dbat_loader
Lokibot_stealer (tags: malware, rat, stealer)

CVEs:
CVE-2018-0798 [Vulners]
Vulners: Score: 9.3, CVSS: 9.3,
Vulners: Exploitation: Unknown
X-Force: Risk: 7.8
X-Force: Patch: Official fix
Soft:
- microsoft office (2010, 2016, 2016, 2007, 2013)
- microsoft word (2013, 2016, 2007, 2010, 2013)
- microsoft office compatibility pack (-)

IOCs:
Url: 1
File: 2
Hash: 4

Links:
https://github.com/mandiant/speakeasy
#ParsedReport
21-04-2022

LemonDuck Targets Docker for Cryptomining Operations

https://www.crowdstrike.com/blog/lemonduck-botnet-targets-docker-for-cryptomining-operations

Threats:
Lemonduck (tags: botnet, dropper, rat, cryptomining, malware)
Proxylogon_exploit
Eternalblue_vuln
Bluekeep_vuln
Cr8escape_vuln
Xmrig_miner

TTPs:
Tactics: 1
Technics: 0

IOCs:
File: 2
Domain: 1

Links:
https://github.com/xmrig/xmrig-proxy
#ParsedReport
21-04-2022

Hackers Spearphish Corporate Hiring Managers with Poisoned Resumes, Infecting Them with the More_Eggs Malware, Warns eSentire

https://www.esentire.com/blog/hackers-spearphish-corporate-hiring-managers-with-poisoned-resumes-infecting-them-with-the-more-eggs-malware

Actors/Campaigns:
Venom_spider
Magecart (tags: ransomware, malware, backdoor)
Evilnum (tags: ransomware, malware, backdoor)

Threats:
More_eggs (tags: rat, ransomware, malware, phishing, backdoor)
Cobalt (tags: ransomware, malware, backdoor)
Terra_loader
Meterpreter_tool
Metasploit_tool
Terra_stealer
Lolbin

Industry:
Aerospace, Retail, Healthcare, E-commerce, Financial

Geo:
Canada

TTPs:
Tactics: 5
Technics: 28

IOCs:
File: 10
Hash: 5
#ParsedReport
21-04-2022

Warez users fell for Certishell. Sivpici\.php5\.sk

https://decoded.avast.io/danielbenes/warez-users-fell-for-certishell/?utm_source=rss&utm_medium=rss&utm_campaign=warez-users-fell-for-certishell

Threats:
Certishell (tags: fraud, ddos, ransomware, rat, malware, keylogger, cryptomining)
Xmrig_miner (tags: cryptomining)
Vmprotect (tags: cryptomining)
Filecoder
Themida_packer_tool (tags: cryptomining)

Geo:
Slovakia, Czech

IOCs:
Domain: 3
File: 33
Registry: 2
Url: 272
Hash: 554

Links:
https://github.com/monoxgas/sRDI
https://github.com/avast/ioc/blob/master/Certishell/samples.sha256
https://github.com/avast/ioc/blob/master/Certishell/network.txt
https://github.com/avast/ioc/tree/master/Certishell