CTT Report Hub
3.13K subscribers
7.52K photos
5 videos
67 files
11.2K links
Threat Intelligence Report Hub
https://cyberthreat.tech
ООО Технологии киберугроз
Contact: @nikolaiav
Download Telegram
#ParsedReport
25-04-2022

New Core Impact Backdoor Delivered Via VMWare Vulnerability

https://blog.morphisec.com/vmware-identity-manager-attack-backdoor

Actors/Campaigns:
Cleaver (tags: backdoor)
Woolen_goldfish

Threats:
Cobalt_strike (tags: backdoor)
Metasploit_tool (tags: backdoor)
Powertrash_tool
Log4shell_vuln
Jssloader

Geo:
London, Iran

CVEs:
CVE-2022-22958 [Vulners]
Vulners: Score: 6.5, CVSS: PENDING,
Vulners: Exploitation: Unknown
X-Force: Risk: 9.1
X-Force: Patch: Official fix
Soft:
- vmware cloud foundation (<5.0)
- vmware identity manager (3.3.3, 3.3.4, 3.3.5, 3.3.6)
- vmware vrealize automation (7.6, <9.0)
- vmware vrealize suite lifecycle manager (<9.0)
- vmware workspace one access (20.10.0.0, 20.10.0.1, 21.08.0.0, 21.08.0.1)
have more...
CVE-2022-22957 [Vulners]
Vulners: Score: 6.5, CVSS: PENDING,
Vulners: Exploitation: Unknown
X-Force: Risk: 9.1
X-Force: Patch: Official fix
Soft:
- vmware cloud foundation (<5.0)
- vmware identity manager (3.3.3, 3.3.4, 3.3.5, 3.3.6)
- vmware vrealize automation (7.6, <9.0)
- vmware vrealize suite lifecycle manager (<9.0)
- vmware workspace one access (20.10.0.0, 20.10.0.1, 21.08.0.0, 21.08.0.1)
have more...
CVE-2022-22954 [Vulners]
Vulners: Score: 10.0, CVSS: PENDING,
Vulners: Exploitation: Unknown
X-Force: Risk: 9.8
X-Force: Patch: Official fix
Soft:
- vmware identity manager (3.3.3, 3.3.4, 3.3.5, 3.3.6)
- vmware vrealize automation (7.6, le8.6)
- vmware workspace one access (20.10.0.0, 20.10.0.1, 21.08.0.0, 21.08.0.1)
- vmware cloud foundation (le4.3.1)
- vmware vrealize suite lifecycle manager (le8.2)
have more...

TTPs:
Tactics: 1
Technics: 0

IOCs:
File: 1
IP: 1
Domain: 2
Url: 1
Hash: 2
#ParsedReport
26-04-2022

New Malware of Lazarus Threat Actor Group Exploiting INITECH Process

https://asec.ahnlab.com/en/33801

Actors/Campaigns:
Lazarus (tags: malware)

Threats:
Lazarshell (tags: malware)
Infostealer/win.outlook (tags: malware)
Trojan/win.agent (tags: malware)
Akdoor (tags: malware)
Lazarbinder (tags: malware)
Lazardoor (tags: malware)
Lazarkeyloger (tags: malware)
Lazarloader (tags: malware)
Lazarportscan (tags: malware)
Zvrek (tags: malware)
Trojan/win32.agent (tags: malware)

Industry:
Chemical

Geo:
Korean

IOCs:
File: 8
Hash: 49
Url: 7
Path: 2
IP: 6
#ParsedReport
26-04-2022

ASEC Weekly Malware Statistics (April 18th, 2022 April 24th, 2022)

https://asec.ahnlab.com/en/33798

Threats:
Agent_tesla (tags: malware)
Formbook (tags: malware)
Lokibot_stealer (tags: malware)
Beamwinhttp_loader (tags: malware)
Garbage_cleaner (tags: malware)
Snake_keylogger (tags: malware)

Industry:
Financial, Transport

Geo:
Korea

IOCs:
Domain: 5
IP: 5
Email: 10
File: 33
Url: 16
#ParsedReport
26-04-2022

A "Naver"-ending game of Lazarus APT

https://www.zscaler.com/blogs/security-research/naver-ending-game-lazarus-apt

Actors/Campaigns:
Lazarus (tags: malware, dropper, phishing, dns, ransomware)

Threats:
Aspacked

Industry:
Telco

Geo:
Korea

IOCs:
IP: 4
Hash: 49
Domain: 53
File: 14
Path: 2
Email: 2
CERT-FR THREATS AND INCIDENTS REPORT. The FIN7 cybercriminal group

https://www.cert.ssi.gouv.fr/cti/CERTFR-2022-CTI-003/
#ParsedReport
27-04-2022

Stonefly: North Korea-linked Spying Operation Continues to Hit High-value Targets

https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/stonefly-north-korea-espionage

Actors/Campaigns:
Lazarus
Dream_job

Threats:
Log4shell_vuln
Dtrack_rat
Mimikatz
Putty_tool

Industry:
Government, Financial, Aerospace, Energy

Geo:
Korean

CVEs:
CVE-2021-44228 [Vulners]
Vulners: Score: 9.3, CVSS: 4.0,
Vulners: Exploitation: True
X-Force: Risk: 10
X-Force: Patch: Official fix
Soft:
- apache log4j (2.0, 2.0, 2.0, 2.0, <2.3.1, <2.12.2, <2.15.0)
- siemens sppa-t3000 ses3000 firmware (*)
- siemens captial (<2019.1, 2019.1, 2019.1)
- siemens comos (*)
- siemens desigo cc advanced reports (4.0, 4.1, 4.2, 5.0, 5.1)
have more...

IOCs:
File: 9
Hash: 28
Domain: 4
Url: 6

Links:
https://github.com/SecureAuthCorp/impacket/blob/master/examples/wmiexec.py
https://github.com/3proxy/3proxy
https://github.com/Kevin-Robertson/Invoke-TheHash
#ParsedReport
27-04-2022

Malware analysis report on SparrowDoor malware

https://www.ncsc.gov.uk/report/mar-sparrowdoor

Threats:
Sparrowdoor (tags: backdoor, malware)

IOCs:
File: 3
Domain: 1
Registry: 2
Hash: 2

YARA: Found
SIGMA: Found
#ParsedReport
27-04-2022

Hive0117 Continues Fileless Malware Delivery in Eastern Europe

https://securityintelligence.com/posts/hive00117-fileless-malware-delivery-eastern-europe

Actors/Campaigns:
Hive0117 (tags: keylogger, malware, trojan, phishing, rat, backdoor)

Threats:
Darkwatchman (tags: malware)

Industry:
Telco, Financial, Energy, Logistic, Government

Geo:
German, Ukraine, Lithuania, Estonia, Russia

IOCs:
Domain: 3
File: 4
IP: 2
Email: 1
Url: 1
Hash: 7
Чуть-чуть офтопа.
Вливать в мастер-ветку теперь может только вице-президент.
Интересная история. После оформления договоренности о покупке Twitter'а Маском руководство соцсети запретило внесение любых изменений в код платформы (для внесения нужно согласование на уровне вице-президента), опасаясь саботажа со стороны сотрудников, которым могла не понравиться продажа компании и личность Маска, что могло заставить их внести в код какую-нибудь бяку. Управление безопасной разработкой становится все более модной темой 😊
#ParsedReport
27-04-2022

Targeted attack on Thailand Pass customers delivers AsyncRAT

https://www.zscaler.com/blogs/security-research/targeted-attack-thailand-pass-customers-delivers-asyncrat

Threats:
Asyncrat_rat (tags: phishing, malware, ransomware, spam, trojan)

Industry:
Aerospace

Geo:
Thailand

IOCs:
Domain: 3
Url: 3
File: 23
IP: 1
Hash: 15
#ParsedReport
27-04-2022

Industroyer2: Nozomi Networks Labs Analyzes the IEC 104 Payload

https://www.nozominetworks.com/blog/industroyer2-nozomi-networks-labs-analyzes-the-iec-104-payload

Actors/Campaigns:
Sandworm

Threats:
Crashoverride (tags: rat, ransomware, scan, malware)
Botenago
Incontroller_tool
Log4shell_vuln

Industry:
Iot, Energy

Geo:
Ukraine

IOCs:
File: 6
Path: 1
Hash: 2

YARA: Found
#ParsedReport
27-04-2022

LockBit Ransomware Side-loads Cobalt Strike Beacon with Legitimate VMware Utility

https://www.sentinelone.com/labs/lockbit-ransomware-side-loads-cobalt-strike-beacon-with-legitimate-vmware-utility

Threats:
Cobalt_strike (tags: malware, scan, ransomware, rat)
Lockbit (tags: malware, scan, ransomware, rat)
Reflectiveloader
Stealbit

IOCs:
File: 4
Path: 6
Url: 3
Hash: 6
IP: 2

YARA: Found
#ParsedReport
28-04-2022

New APT Group Earth Berberoka Targets Gambling Websites With Old and New Malware. Technical analysis

https://www.trendmicro.com/en_us/research/22/d/new-apt-group-earth-berberoka-targets-gambling-websites-with-old.html

Actors/Campaigns:
Earth_berberoka (tags: rat, dropper, proxy, malware, backdoor)

Threats:
Gh0st_rat (tags: malware)
Plugx_rat (tags: malware)
Puppetloader (tags: malware)
Tigerplug
Basicloader
Quasar_rat
Asyncrat_rat

IOCs:
Hash: 1
File: 12
Path: 1

Links:
https://github.com/denji/golang-tls
https://github.com/lucas-clemente/quic-go
#ParsedReport
28-04-2022

BRONZE PRESIDENT Targets Russian Speakers with Updated PlugX

https://www.secureworks.com/blog/bronze-president-targets-russian-speakers-with-updated-plugx

Actors/Campaigns:
Red_delta (tags: malware, rat, dns)

Threats:
Plugx_rat (tags: rat, malware, dns)

Geo:
Poland, Belarus, Russian, Myanmar, Asia, Ukraine, Chinas, Lithuania, Vietnam, China, Latvia

IOCs:
File: 1
Path: 1
IP: 3
Hash: 4
#ParsedReport
27-04-2022

Assembling the Russian Nesting Doll: UNC2452 Merged into APT29

https://www.mandiant.com/resources/unc2452-merged-into-apt29

Actors/Campaigns:
Darkhalo (tags: proxy, dns, backdoor, phishing, malware)
Duke (tags: proxy, dns, backdoor, phishing, malware)

Threats:
Cobalt_strike
Sunburst
Domain_fronting_technique
Raindrop_tool
Teardrop_tool
Mamadogs_tool
Crimsonbox_tool
Guardrails_tool
Dcsync_technique
Kerberoasting_technique

Industry:
Government, Telco, Education, Healthcare

Geo:
Asia, America, Russia

TTPs:
Tactics: 12
Technics: 55
#ParsedReport
27-04-2022

A lookback under the TA410 umbrella: Its cyberespionage TTPs and activity

https://www.welivesecurity.com/2022/04/27/lookback-ta410-umbrella-cyberespionage-ttps-activity

Actors/Campaigns:
Ta410 (tags: rat, malware, backdoor, dropper, rootkit, proxy, phishing, keylogger)
Stone_panda
A41apt
Equation

Threats:
Flowcloud_rat (tags: rootkit, backdoor)
Plugx_rat (tags: rat, backdoor)
Quasar_rat (tags: backdoor)
Proxylogon_exploit
Proxyshell_vuln
Lolbin
Htran
Earthworm_tool
Farfli
Gh0st_rat
Guardrails_tool
Metasploit_tool
Dnguard_tool
Rozena
Meterpreter_tool
Eternalblue_vuln

Industry:
Government, Education

Geo:
China, Africa, Israel, Ukraine, French, Japan, India, Asia

CVEs:
CVE-2017-11882 [Vulners]
Vulners: Score: 9.3, CVSS: 8.3,
Vulners: Exploitation: True
X-Force: Risk: 7.8
X-Force: Patch: Official fix
Soft:
- microsoft office (2013, 2010, 2016, 2007)

CVE-2019-0604 [Vulners]
Vulners: Score: 7.5, CVSS: 4.1,
Vulners: Exploitation: True
X-Force: Risk: 9.8
X-Force: Patch: Official fix
Soft:
- microsoft sharepoint foundation (2013)
- microsoft sharepoint server (2019, 2010)
- microsoft sharepoint enterprise server (2016)


TTPs:
Tactics: 10
Technics: 53

IOCs:
File: 25
Domain: 6
Hash: 43
Path: 7
Url: 7
Registry: 6
IP: 14

YARA: Found

Links:
https://github.com/LOLBAS-Project/LOLBAS#user-content-the-history-of-the-lolbin
https://github.com/eset/malware-ioc
https://github.com/sin5678/gh0st
https://github.com/UndefinedIdentifier/LCX
https://github.com/quasar/Quasar
https://github.com/protocolbuffers/protobuf
https://github.com/a0rtega/pafish
https://github.com/rootkiter/EarthWorm