Fri, 18 Feb 2022 14:50:44 +0000
New SharkBot Variant Discovered
https://blog.cyble.com/2022/02/18/new-sharkbot-variant-discovered/
Cyble
Analysis - SharkBot Malware v1.63
Cyble Research Labs analyses the latest version of SharkBot malware, which has resurfaced with sophisticated new abilities to target Android banking users.
Sun, 20 Feb 2022 12:47:45 +0000
Technical Analysis of the DDoS Attacks against Ukrainian Websites
https://www.cadosecurity.com/technical-analysis-of-the-ddos-attacks-against-ukrainian-websites/
Cado
Technical Analysis of the DDoS Attacks against Ukrainian Websites
Last week the websites for several banks and government organisations in Ukraine were hit with a Distributed Denial-of-Service attack.
Mon, 21 Feb 2022 01:29:36 +0000
Modified CryptBot Infostealer Being Distributed
https://asec.ahnlab.com/en/31802/
ASEC BLOG
Modified CryptBot Infostealer Being Distributed - ASEC BLOG
CryptBot is an infostealer that is usually distributed under the disguise of web pages that share cracks and tools. The distribution pages are exposed at the top of the search result page of search engines such as Google, so the risk of infection is high…
Mon, 21 Feb 2022 01:29:36 +0000
Cobalt Strike Being Distributed to Vulnerable MS-SQL Servers
https://asec.ahnlab.com/en/31811/
ASEC
Cobalt Strike Being Distributed to Unsecured MS-SQL Servers - ASEC
Cobalt Strike Being Distributed to Unsecured MS-SQL Servers ASEC
Mon, 21 Feb 2022 02:11:03 +0000
Qbot and Zerologon Lead To Full Domain Compromise
https://thedfirreport.com/2022/02/21/qbot-and-zerologon-lead-to-full-domain-compromise/
The DFIR Report
Qbot and Zerologon Lead To Full Domain Compromise
In this intrusion (from November 2021), a threat actor gained its initial foothold in the environment through the use of Qbot (a.k.a. Quakbot/Qakbot) malware. Soon after execution of the Qbot paylo…
New information stealing malware “ColdStealer” being distributed
https://asec-ahnlab-com.translate.goog/ko/31703/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=ru&_x_tr_pto=wapp
https://asec-ahnlab-com.translate.goog/ko/31703/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=ru&_x_tr_pto=wapp
ASEC BLOG
신종 정보 탈취 악성코드 "ColdStealer" 유포 중 - ASEC BLOG
ASEC 분석팀은 신종 악성코드로 추정되는 ColdStealer가 유포 중임을 확인하였다. 해당 유포는 기존 블로그에서 수차례 언급하였던 크랙 및 툴 등의 S/W 다운로드로 위장한 방식이다. 이러한 방식의 악성코드 유포에는 두 가지 케이스가 존재하는데 1. CryptBot, RedLine 등의 단일 악성코드를 유포하는 케이스와,2. 내부 다양한 여러 악성코드가 압축 해제되어 실행되는 드로퍼형 악성코드이다. ColdStealer의 경우 후자의 방식으로 유포되었다.…
Mon, 21 Feb 2022 13:21:14 +0000
Latest Mac Coinminer Utilizes Open-Source Binaries and the I2P Network
https://www.trendmicro.com/en_us/research/22/b/latest-mac-coinminer-utilizes-open-source-binaries-and-the-i2p-network.html
Trend Micro
Latest Mac Coinminer Utilizes Open-Source Binaries and the I2P Network
Tue, 22 Feb 2022 00:57:45 +0000
Checking and Remediating Stealthy Malware, PurpleFox
https://asec.ahnlab.com/en/31874/
ASEC BLOG
Checking and Remediating Stealthy Malware, PurpleFox - ASEC BLOG
PurpleFox was first discovered in 2018. The attacker hid the malware with a self-developed driver back then, but since 2019, they have been using the customized open-source program ‘Hidden.’ It was also found that the attacker tested the malware multiple…
Tue, 22 Feb 2022 00:57:45 +0000
APT Attack Attempts Disguised as North Korea Related Paper Requirements (Kimsuky)
https://asec.ahnlab.com/en/31879/
ASEC BLOG
APT Attack Attempts Disguised as North Korea Related Paper Requirements (Kimsuky) - ASEC BLOG
The ASEC analysis team has recently discovered the distribution of malicious Word (DOC) files to graduate school professors that are disguised as North Korea-related paper requirements. The name of the Word file is shown below. The term ‘KIMA’ mentioned in…
Tue, 22 Feb 2022 22:19:11 +0000
SMS PVA Part 1: Underground Service for Cybercriminals
https://www.trendmicro.com/en_us/research/22/b/sms-pva-cybercriminals-part-1.html
Trend Micro
SMS PVA Part 1: Underground Service for Cybercriminals
This is a 3-part blog entry about SMS PVA, a service that lets cybercriminals compromise smartphone cybersecurity.
In-depth analysis of the Operation Cache Panda organized supply chain attack against Taiwan's financial industry
https://medium.com/cycraft/supply-chain-attack-targeting-taiwan-financial-sector-bae2f0962934
https://medium.com/cycraft/supply-chain-attack-targeting-taiwan-financial-sector-bae2f0962934
Medium
深度剖析針對臺灣金融業的 Operation Cache Panda 組織型供應鏈攻擊
奧義智慧團隊第一手調查,挖掘中國國家級駭客利用金融軟體系統漏洞,所引發的一系列高風險攻擊事件
Wed, 23 Feb 2022 01:22:17 +0000
Increased Phishing Attacks Disguised as Microsoft
https://asec.ahnlab.com/en/31994/
ASEC BLOG
Increased Phishing Attacks Disguised as Microsoft - ASEC BLOG
The ASEC analysis team has recently discovered phishing emails disguised as Microsoft login pages. As shown in the figure below, one of the collected samples is disguised as the company’s voice message to prompt users to click the attached playback file.…
Wed, 23 Feb 2022 01:56:10 +0000
ASEC 주간 악성코드 통계 ( 20220214 ~ 20220220 )
https://asec.ahnlab.com/ko/31982/
ASEC BLOG
ASEC 주간 악성코드 통계 ( 20220214 ~ 20220220 ) - ASEC BLOG
ASEC 분석팀에서는 ASEC 자동 분석 시스템 RAPIT 을 활용하여 알려진 악성코드들에 대한 분류 및 대응을 진행하고 있다. 본 포스팅에서는 2022년 2월 14일 월요일부터 2월 20일 일요일까지 한 주간 수집된 악성코드의 통계를 정리한다. 대분류 상으로는 인포스틸러가 74.5%로 1위를 차지하였으며, 그 다음으로는 RAT (Remote Administration Tool) 악성코드가 17.4%, 뱅킹 악성코드 3.9%, 다운로더 2.1%, 랜섬웨어…
Wed, 23 Feb 2022 01:56:10 +0000
정상 윈도우 인스톨러(MSI)로 위장한 매그니베르 유포 재개 (2/22)
https://asec.ahnlab.com/ko/32005/
ASEC BLOG
정상 윈도우 인스톨러(MSI)로 위장한 매그니베르 유포 재개 (2/22) - ASEC BLOG
ASEC 분석팀은 어제 (02/22) 오전 매그니베르 랜섬웨어가 기존 윈도우앱(APPX) 형태가 아닌 정상 윈도우 인스톨러(MSI)로 위장하여 유포를 재개한 것을 확인하였다. MSI 확장자로 유포중인 매그니베르의 파일명은 아래와 같이 윈도우 업데이트 파일로 위장하였다. Critical.Update.Win10.0-kb4215776.msi Critical.Update.Win10.0-kb6253668.msi Critical.Update.Win10.0-kb5946410.msi…
Wed, 23 Feb 2022 15:58:19 +0000
(Ex)Change of Pace: UNC2596 Observed Leveraging Vulnerabilities to Deploy Cuba Ransomware
https://www.mandiant.com/resources/unc2596-cuba-ransomware
Mandiant
(Ex)Change of Pace: UNC2596 Observed Leveraging Vulnerabilities to Deploy Cuba Ransomware | Mandiant
Coffee Ransomware Continues To Be Active, Antiy Releases Decryption Tool
https://www-antiy-cn.translate.goog/research/notice&report/research_report/20220222.html?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=ru&_x_tr_pto=wapp
https://www-antiy-cn.translate.goog/research/notice&report/research_report/20220222.html?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=ru&_x_tr_pto=wapp
www-antiy-cn.translate.goog
Coffee勒索软件持续活跃,安天发布解密工具
安天是引领威胁检测与防御能力发展的网络安全国家队,为客户构建端点防护、流量监测、边界防护、导流捕获、深度分析、应急处置的安全基石
New Sandworm Malware Cyclops Blink Replaces VPNFilter
https://www.cisa.gov/uscert/ncas/alerts/aa22-054a
https://www.cisa.gov/uscert/ncas/alerts/aa22-054a
www.cisa.gov
New Sandworm Malware Cyclops Blink Replaces VPNFilter | CISA
The Sandworm actor, which the United Kingdom and the United States have previously attributed to the Russian GRU, has replaced the exposed VPNFilter malware with a new more advanced framework.
Thu, 24 Feb 2022 01:04:34 +0000
Dridex bots deliver Entropy ransomware in recent attacks
https://news.sophos.com/en-us/2022/02/23/dridex-bots-deliver-entropy-ransomware-in-recent-attacks/
Sophos News
Dridex bots deliver Entropy ransomware in recent attacks
Some code used in the ransomware bear a resemblance to code used in Dridex malware, hinting at a common origin