Daily NCSC-FI news followup 2019-06-07

A Deep Dive into the Emotet Malware

www.fortinet.com/blog/threat-research/deep-dive-into-emotet-malware.html
Emotet is a trojan that is primarily spread through spam emails. During its lifecycle, it has gone through a few iterations. Early versions were delivered as a malicious JavaScript file. Later versions evolved to use macro-enabled Office documents to retrieve a malicious payload from a C2 server. FortiGuard Labs has been tracking Emotet since it was first discovered, and in this blog, I will provide a deep analysis of a new Emotet sample found in early May. This detailed analysis includes how to unpack the persistent payload, how Emotet malware communicates with its C2 servers, how to identify the hard-coded C2 server list and RSA key in the executable, as well as how it encrypts the data it gathers

Strange Bits: Sodinokibi Spam, CinaRAT, and Fake G DATA

www.gdatasoftware.com/blog/2019/06/31724-strange-bits-sodinokibi-spam-cinarat-and-fake-g-data
n the second part of our Strange Bits series we are taking a closer look at Sodinokibi Spam E-Mails, CinaRAT and a Malware that tries to imitate G DATA. Sodinokibi ransomware was known so far for being installed via Oracle WebLogic exploit (see Talos’ article). A new campaign uses spam emails with attached MS Office Word document to download Sokinokibi to the target system. JamesWT found the first sample, Sculabs another one[1]. The email pretends to be a warning letter from the fee collection center of public-law broadcasting institutions in the Federal Public of Germany and demands 213.50 EUR payment.

CIA sextortion an old scam with a new twist

www.kaspersky.com/blog/cia-sextortion/27146/
What would you think if you received an e-mail with Central Intelligence Agency Case #45361978 in the subject line? Would you decide that someone, somewhere had seriously screwed up and accidentally sent you a top-secret file? Or that youre being recruited for the secret services (well, you never know)? Alas, in either case you would almost certainly be mistaken the e-mails in question are just another extortion trick.

New Brute-Force Botnet Targeting Over 1.5 Million RDP Servers Worldwide

thehackernews.com/2019/06/windows-rdp-brute-force.html
Security researchers have discovered an ongoing sophisticated botnet campaign that is currently brute-forcing more than 1.5 million publicly accessible Windows RDP servers on the Internet. Dubbed GoldBrute, the botnet scheme has been designed in a way to escalate gradually by adding every new cracked system to its network, forcing them to further find new available RDP servers and then brute force them.. Also:

isc.sans.edu/forums/diary/GoldBrute+Botnet+Brute+Forcing+15+Million+RDP+Servers/25002/
. Also:

threatpost.com/forget-bluekeep-beware-goldbrute/145482/

SandboxEscaper Debuts ByeBear Windows Patch Bypass

threatpost.com/sandboxescaper-byebear-windows-bypass/145470/
Guerrilla developer SandboxEscaper has disclosed a second bypass exploit for a patch that fixes a Windows local privilege-escalation (LPE) flaw again without notifying Microsoft. The exploit, dubbed ByeBear, enables attackers to get past the patch to attack a permissions-overwrite, privilege-escalation flaw (CVE-2019-0841), which exists because Windows AppX Deployment Service (AppXSVC) improperly handles hard links. It allows a local attacker to run processes in an elevated context, allowing them to then install programs, and view, change or delete data, according to Microsoft.. Also:

thehackernews.com/2019/06/windows-eop-exploit.html
. Also:

www.bleepingcomputer.com/news/security/new-windows-10-zero-day-bug-emerges-from-bypassing-patched-flaw/

Ancient ICEFOG APT malware spotted again in new wave of attacks

www.zdnet.com/article/ancient-icefog-apt-malware-spotted-again-in-new-wave-of-attacks/
Malware developed by Chinese state-sponsored hackers that was once thought to have disappeared has been recently spotted in new attacks, in an updated and more dangerous form. Spotted by FireEye senior researcher Chi-en (Ashley) Shen, the malware is named ICEFOG (also known as Fucobha). It was initially used by a Chinese APT (advanced persistent threat, a technical term for state-sponsored hacking units), also named ICEFOG, whose operations were first detailed in a Kaspersky report in September 2013.

Tietomurto Marimekon verkkokaupassa: Yli 1 500 käyttäjän syöttämiä tietoja on kerätty luvattomasti

www.hs.fi/kotimaa/art-2000006133616.html
Tietomurto Marimekon verkkokaupassa: Yli 1 500 käyttäjän syöttämiä tietoja on kerätty luvattomasti. Murtautuja on voinut saada haltuunsa sivustolla tietomurron aikana asioineen käyttäjän syöttämiä tietoja, kuten toimitus- ja laskutusosoitteen sekä verkkokaupan kirjautumistiedot, kertoo sähköpostitse Marimekon digitaalisen liiketoiminnan johtaja Kari Härkönen.

PHA Family Highlights: Triada

security.googleblog.com/2019/06/pha-family-highlights-triada.html
We continue our PHA family highlights series with the Triada family, which was first discovered early in 2016. The main purpose of Triada apps was to install spam apps on a device that displays ads. The creators of Triada collected revenue from the ads displayed by the spam apps. The methods Triada used were complex and unusual for these types of apps. Triada apps started as rooting trojans, but as Google Play Protect strengthened defenses against rooting expl. Myös:

www.tivi.fi/uutiset/tv/b27c5cea-155a-4812-be53-de78d1a70e46

Someone slipped a vuln into crypto-wallets via an NPM package. Then someone else siphoned off $13m in coins to protect it from thieves

www.theregister.co.uk/2019/06/07/komodo_npm_wallets/
lockchain biz Komodo this week said it had used a vulnerability discovered by JavaScript package biz NPM to take control of some older Agama cryptocurrency wallets to prevent hackers from doing the same. The digital currency startup said it had socked away 8 million KMD (Komodo) and 96 BTC (Bitcoin) tokens worth about almost $13m from the wallets, and stashed them in two digital wallets under its control, where the assets await reclamation by their owners.

Massive Changes to Tech and Platforms, But Cybercrime? Not So Much

www.darkreading.com/threat-intelligence/massive-changes-to-tech-and-platforms-but-cybercrime-not-so-much/d/d-id/1334911
The still-relevant recommendation is to invest more in law enforcement, concludes an economic study of cybercrime. In 2012, a group of cybersecurity researchers and social scientists studied the impact of cybercrime and its cost to society, concluding that the money spent anticipating an attack is less effective than money spent responding to an attack. This week, many of the same researchers released an updated paper at the Workshop on the Economics of Information Security (WIES) conference, in Cambridge, Mass., that looks at direct and indirect damages due to cybercrime,

The Endless Scourge of Malicious Email

blogs.cisco.com/security/threat-report-email-attacks
There is no question that unwanted email is a source of annoyance. It is also the biggest source of cyber threats. In fact, just last month, spam accounted for 85 percent of all email sent. Plus, according to Verizons 2018 Data Breach Investigations Report, email is the number one vector for both malware distribution (92.4 percent) and phishing (96 percent). Attackers know that, unfortunately, this channel just works. Because email forces the user to stop and at least scan every message they receive, it presents the perfect opportunity to serve up malicious links and file attachments that people in a hurry sometimes mistakenly click on. Phishing and social engineering have gotten so sophisticated that it can be hard for even cyber-savvy users to discern the legitimate from the malicious.

Hackers selling services to target FTSE companies

www.itproportal.com/news/hackers-selling-services-to-target-ftse-companies/
The amount of hacking tools that can be used against FTSE 100 and Fortune 500 companies is on the rise on the dark net, new research has warned. A report from Bromium found four in ten vendors on the dark net are selling targeted hacking services, which it claims translates to a 20 per cent rise compared to the same period three years ago. The price varies, significantly from $150 to $10,000, and mostly depends on the target company, and the plan to which

Cathay Pacific’s unpatched decade-old vulnerability led to 2018 breach

www.zdnet.com/article/cathay-pacifics-unpatched-decade-old-vulnerability-led-to-2018-breach/
The Hong Kong Privacy Commissioner for Personal Data Stephen Kai-yi Wong released a report [PDF] on Thursday detailing his findings relating to the Cathay Pacific breach disclosed in October that affected 9.4 million people. In his report, Wong spelled out how a pair of groups had targeted the airline, with the first dropping a keylogger onto a reporting system in October 2014 that harvested credentials and allowed them to move laterally through the network and gather other credentials before ceasing on March 22, 2018. The report said Cathay is not aware of how this group entered the system.

AMCA Healthcare Hack Widens Again, Reaching 20.1M Victims

threatpost.com/amca-healthcare-hack-widens-opko/145453/
The hack of the American Medical Collection Agency (AMCA), a third-party bill collection vendor, continues to expand, now impacting 20.1 million patients across three laboratory services providers. In the wake of revelations that the personal data of 12 million patients from Quest Diagnostics had been potentially compromised by an infiltration of AMCA systems, another 7.7 million patients from LabCorp were shown on Wednesday to be impacted. And, 400,000 victims from OPKO Health have been now been added to the tally as of Thursday.

New Mirai Variant Adds 8 New Exploits, Targets Additional IoT Devices

unit42.paloaltonetworks.com/new-mirai-variant-adds-8-new-exploits-targets-additional-iot-devices/
Palo Alto Networks Unit 42 has been tracking the evolution of the Mirai malware, known for targeting embedded devices with the primary intent of launching DDoS attacks and self-propagation, since 2016 when it took down several notable targets. As part of this ongoing research, weve recently discovered a new variant of Mirai that has eight new exploits against a wide range of embedded devices. These newly targeted devices range from wireless presentation systems to set-top-boxes, SD-WANs, and even smart home controllers.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.