{"id":470,"text":" DGA by itself can’t harm you.","entities":[],"relations":[],"Comments":[]} | |
{"id":471,"text":"But it is an important piece that enables modern malware to try and evade security products and countermeasures.","entities":[],"relations":[],"Comments":[]} | |
{"id":472,"text":"The importance and usefulness of DGA is best shown by the fact that it’s been in regular and constant use since at least 2008.","entities":[{"id":46125,"label":"TIME","start_offset":121,"end_offset":125}],"relations":[],"Comments":[]} | |
{"id":473,"text":"DGA was a key component in the Conficker attacks in 2008 and 2009 and part of its success.","entities":[{"id":46126,"label":"malware","start_offset":31,"end_offset":40},{"id":46127,"label":"TIME","start_offset":52,"end_offset":56},{"id":46128,"label":"TIME","start_offset":61,"end_offset":65}],"relations":[],"Comments":[]} | |
{"id":474,"text":" What can I do about it?","entities":[],"relations":[],"Comments":[]} | |
{"id":475,"text":" Because DGA is a technique the fuels malware attacks, the things you can do to help prevent malware can also help prevent DGA-fueled malware attacks: In addition, new technologies are being developed that can more directly counter DGA-fueled attacks, particularly for organizations.","entities":[],"relations":[],"Comments":[]} | |
{"id":476,"text":"In particular, security vendors are bringing automation to bear to counter the attackers’ automation.","entities":[],"relations":[],"Comments":[]} | |
{"id":477,"text":"New anti-DGA technologies that leverage machine learning and big data are capable of countering DGA’s automation with automated prediction of their own that can anticipate, block, assist with malicious site takedowns or even, in some cases, prevent those malicious sites from being used in the first place.","entities":[],"relations":[],"Comments":[]} | |
{"id":478,"text":" You can also learn more about these new technologies and look at deploying them as an additional layer of protection. ","entities":[],"relations":[],"Comments":[]} | |
{"id":479,"text":"About: Threat Briefs are meant to help busy people understand real-world threats and how they can prevent them in their lives.","entities":[],"relations":[],"Comments":[]} | |
{"id":480,"text":" They’re put together by Palo Alto Networks Unit 42 threat research team and are meant for you to read and share with your family, friends, and coworkers so you can all be safer and get on with the business of your digital life. Got a topic you want us to write about for you, your friends, or your family?","entities":[{"id":45787,"label":"identity","start_offset":25,"end_offset":43},{"id":45789,"label":"identity","start_offset":44,"end_offset":51},{"id":45790,"label":"identity","start_offset":25,"end_offset":72}],"relations":[],"Comments":[]} | |
{"id":481,"text":"Email us at u42comms@paloaltonetworks.com.","entities":[{"id":1630,"label":"EMAIL","start_offset":12,"end_offset":41}],"relations":[],"Comments":[]} | |
{"id":482,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} | |
{"id":483,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} | |
{"id":484,"text":" By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} | |
{"id":485,"text":"Unit 42 released details about a vulnerability that affects Android devices running operating systems older than 8.0 Oreo.","entities":[{"id":1635,"label":"identity","start_offset":0,"end_offset":7},{"id":46129,"label":"SOFTWARE","start_offset":60,"end_offset":67},{"id":46130,"label":"SOFTWARE","start_offset":113,"end_offset":121}],"relations":[],"Comments":[]} | |
{"id":486,"text":"The vulnerability leaves Android users at risk of falling victim to an Android Toast Overlay attack.","entities":[{"id":44751,"label":"SOFTWARE","start_offset":25,"end_offset":32},{"id":44753,"label":"attack-pattern","start_offset":71,"end_offset":99}],"relations":[{"id":155,"from_id":44753,"to_id":44751,"type":"targets"}],"Comments":[]} | |
{"id":487,"text":"Patches are available that fix this vulnerability, so Android users should get the latest updates as soon as possible.","entities":[{"id":46131,"label":"SOFTWARE","start_offset":54,"end_offset":61}],"relations":[],"Comments":[]} | |
{"id":488,"text":" How it Works ","entities":[],"relations":[],"Comments":[]} | |
{"id":489,"text":"The vulnerability affects the Toast feature on Android devices, an Android feature that allows display messages and notifications of other applications to “pop up,” and allows an attacker to employ an overlay attack.","entities":[{"id":45791,"label":"SOFTWARE","start_offset":47,"end_offset":54},{"id":45792,"label":"SOFTWARE","start_offset":67,"end_offset":74}],"relations":[],"Comments":[]} | |
{"id":490,"text":" An overlay attack happens when an attacker places a window over a legitimate application on the device.","entities":[],"relations":[],"Comments":[]} | |
{"id":491,"text":"Users will interact with the window, thinking they are performing their intended function, but they are actually engaging with the attackers overlay window and executing the attacker’s desired function.","entities":[],"relations":[],"Comments":[]} | |
{"id":492,"text":"You can see an example of how this would work in Figure 1.","entities":[],"relations":[],"Comments":[]} | |
{"id":493,"text":" Figure 1: Bogus patch installer overlying malware requesting administrative permissions This interaction can install malware or malicious software on the device, grant malware full administrative privileges or lock the user out and render the device unusable. In the past successful overlay attacks were typically dependent on two conditions: However, with this particular vulnerability, these conditions are no longer required for a successful attack.","entities":[],"relations":[],"Comments":[]} | |
{"id":494,"text":"This means that attackers can use this vulnerability in apps users get from places other than Google Play.","entities":[{"id":46132,"label":"SOFTWARE","start_offset":94,"end_offset":105}],"relations":[],"Comments":[]} | |
{"id":495,"text":"And when they install these malicious apps, they don’t have to ask for the “draw on top” permission.","entities":[],"relations":[],"Comments":[]} | |
{"id":496,"text":" How to Defend Against It Keeping devices updated is a general security best practice.","entities":[],"relations":[],"Comments":[]} | |
{"id":497,"text":"The Android Toast Overlay attack specifically targets outdated devices using versions prior to 8.0.","entities":[{"id":46133,"label":"attack-pattern","start_offset":4,"end_offset":32}],"relations":[],"Comments":[]} | |
{"id":498,"text":"In order to defend against the Android Toast Overlay attack, update all Android devices to the latest version.","entities":[{"id":44756,"label":"attack-pattern","start_offset":31,"end_offset":59},{"id":44757,"label":"SOFTWARE","start_offset":31,"end_offset":38},{"id":44758,"label":"SOFTWARE","start_offset":72,"end_offset":79}],"relations":[],"Comments":[]} | |
{"id":499,"text":"Additionally, avoid downloading malicious applications by only downloading from the Google Play store is another best practice you should always follow.","entities":[{"id":46134,"label":"SOFTWARE","start_offset":84,"end_offset":101}],"relations":[],"Comments":[]} | |
{"id":500,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} | |
{"id":501,"text":" Please mark, I'm not a robot! ","entities":[],"relations":[],"Comments":[]} | |
{"id":502,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} | |
{"id":503,"text":"This post is also available in: 日本語 (Japanese) Ransomware is one of the top threats in cybersecurity and a focus area for Palo Alto Networks.","entities":[{"id":46135,"label":"identity","start_offset":128,"end_offset":146}],"relations":[],"Comments":[]} | |
{"id":504,"text":"In the current threat landscape, ransom payments are rising and organizations are seeking to protect themselves from threat actors.","entities":[],"relations":[],"Comments":[]} | |
{"id":505,"text":"In the 2021 Unit 42 Ransomware Threat Report, we detailed the observations and the trend of top ransomware families from January 2020-January 2021.","entities":[{"id":1681,"label":"identity","start_offset":12,"end_offset":19},{"id":46138,"label":"TIME","start_offset":134,"end_offset":146},{"id":46136,"label":"TIME","start_offset":7,"end_offset":11},{"id":46137,"label":"TIME","start_offset":121,"end_offset":133}],"relations":[],"Comments":[]} | |
{"id":506,"text":"This post supplements that information based on observations from the first three months of 2021, and will discuss the propagation of different ransomware families we observed in the wild and the different types of extortion used.","entities":[{"id":46139,"label":"TIME","start_offset":92,"end_offset":96}],"relations":[],"Comments":[]} | |
{"id":507,"text":"We hope the information will help readers get a clear picture of current directions in ransomware trends.","entities":[],"relations":[],"Comments":[]} | |
{"id":508,"text":"In the first quarter (Q1) of 2021, Unit 42 detected 113 different ransomware families in the wild.","entities":[{"id":46140,"label":"TIME","start_offset":21,"end_offset":33},{"id":46141,"label":"identity","start_offset":35,"end_offset":42}],"relations":[],"Comments":[]} | |
{"id":509,"text":"Based on the statistical data, the top 15 ransomware families only cover 52.3% of total ransomware cases.","entities":[],"relations":[],"Comments":[]} | |
{"id":510,"text":"This demonstrates the diversity of ransomware and emphasizes how difficult it is to expand ransomware detection coverage with static profiling.","entities":[],"relations":[],"Comments":[]} | |
{"id":511,"text":"Figure 1 shows the proportion of ransomware sample numbers for different families that Unit 42 detected in the wild.","entities":[{"id":46142,"label":"identity","start_offset":87,"end_offset":94}],"relations":[],"Comments":[]} | |
{"id":512,"text":"Among all, 6.7% of the ransomware samples are Virlock, which has been active since 2014.","entities":[{"id":46143,"label":"malware","start_offset":46,"end_offset":53},{"id":46144,"label":"TIME","start_offset":83,"end_offset":87}],"relations":[],"Comments":[]} | |
{"id":513,"text":"Virlock has the largest number of variants due to its file-infector-like behavior.","entities":[{"id":46145,"label":"attack-pattern","start_offset":54,"end_offset":81},{"id":44760,"label":"malware","start_offset":0,"end_offset":7}],"relations":[{"id":159,"from_id":44760,"to_id":46145,"type":"uses"}],"Comments":[]} | |
{"id":514,"text":" Higher malware variant numbers don't necessarily imply a higher prevalence.","entities":[],"relations":[],"Comments":[]} | |
{"id":515,"text":"Some ransomware families don’t deliver different variants every time, but the infection ratio per sample is high, meaning attackers delivered the same malware to huge numbers of victims.","entities":[],"relations":[],"Comments":[]} | |
{"id":516,"text":"Figure 2 shows a completely different result from Figure 1 and stems from only counting ransomware samples from cases in which more than five hosts were infected with the same malware.","entities":[],"relations":[],"Comments":[]} | |
{"id":517,"text":"From this lens, the top three families observed are Ryuk (31.7%), Sodinokibi (20%) and Maze (15%). Emails are still the most efficient method to deliver and propagate ransomware.","entities":[{"id":46146,"label":"malware","start_offset":52,"end_offset":56},{"id":46147,"label":"malware","start_offset":66,"end_offset":76},{"id":46148,"label":"malware","start_offset":87,"end_offset":91}],"relations":[],"Comments":[]} | |
{"id":518,"text":"Figure 3 shows ransomware arrives via different application protocols.","entities":[],"relations":[],"Comments":[]} | |
{"id":519,"text":"The majority of ransomware is delivered by email.","entities":[{"id":44761,"label":"attack-pattern","start_offset":16,"end_offset":48}],"relations":[],"Comments":[]} | |
{"id":520,"text":"Web browsing is the second most common entry vector for ransomware infections.","entities":[],"relations":[],"Comments":[]} | |
{"id":521,"text":"The process of delivering malware by a URL can include various techniques.","entities":[],"relations":[],"Comments":[]} | |
{"id":522,"text":"For example, the URL links can be posted on forums or chat group software, sent by IM applications, offered via fake freeware for download or attached in emails.","entities":[{"id":45793,"label":"attack-pattern","start_offset":112,"end_offset":125},{"id":46149,"label":"attack-pattern","start_offset":142,"end_offset":160}],"relations":[],"Comments":[]} | |
{"id":523,"text":"Web hosting ransomware can also be downloaded and successfully installed through a multi-layered infection chain among different file types.","entities":[{"id":46150,"label":"attack-pattern","start_offset":0,"end_offset":22}],"relations":[],"Comments":[]} | |
{"id":524,"text":"For example, AlumniLocker is first delivered as a phishing PDF.","entities":[{"id":46151,"label":"malware","start_offset":13,"end_offset":25},{"id":46152,"label":"attack-pattern","start_offset":50,"end_offset":62}],"relations":[],"Comments":[]} | |
{"id":525,"text":"It leads to downloading a ZIP archive that contains an LNK downloader.","entities":[{"id":44763,"label":"SOFTWARE","start_offset":26,"end_offset":29},{"id":44764,"label":"attack-pattern","start_offset":55,"end_offset":69}],"relations":[],"Comments":[]} | |
{"id":526,"text":"This downloads and executes an obfuscated PowerShell script to finally install the ransomware.","entities":[{"id":46153,"label":"attack-pattern","start_offset":42,"end_offset":59}],"relations":[],"Comments":[]} | |
{"id":527,"text":" Figure 4 breaks down which file types we saw in the course of ransomware detection and their prevalence.","entities":[],"relations":[],"Comments":[]} | |
{"id":528,"text":"32-bit EXE is the most common ransomware file type we observed.","entities":[],"relations":[],"Comments":[]} | |
{"id":529,"text":"Other file types are often used as the first stage of infection or downloaders, such as archives, documents and scripts.","entities":[],"relations":[],"Comments":[]} | |
{"id":530,"text":"Most ransomware is delivered via email with an attached archive; the ransomware is compressed in the archived files with or without password protection.","entities":[],"relations":[],"Comments":[]} | |
{"id":531,"text":"“Resume” or “portfolio document” are examples of archive file names, and the archive contains one or more pieces of malware with fake document file icons.","entities":[],"relations":[],"Comments":[]} | |
{"id":532,"text":"One example here is Makop, contained in a 7z archive along with an infostealer malware (SHA256: DE6DFA018773E07C218EF1DF62CE0D99A708841BF1DDFB4C6AD7E323D5D666A4).","entities":[{"id":1760,"label":"malware","start_offset":67,"end_offset":78},{"id":1761,"label":"SHA2","start_offset":96,"end_offset":160},{"id":46154,"label":"tools","start_offset":42,"end_offset":44}],"relations":[{"id":156,"from_id":1761,"to_id":1760,"type":"related-to"}],"Comments":[]} | |
{"id":533,"text":"A script file is also used to download or install ransomware.","entities":[],"relations":[],"Comments":[]} | |
{"id":534,"text":"For example, GandCrab uses JScript as a downloader, leveraging Windows Background Intelligent Transfer Service (BITS) to download the payload in the background (Figure 5).","entities":[{"id":44765,"label":"malware","start_offset":13,"end_offset":21},{"id":44766,"label":"tools","start_offset":63,"end_offset":117}],"relations":[{"id":20,"from_id":44765,"to_id":44766,"type":"uses"}],"Comments":[]} | |
{"id":535,"text":"We also observed that Mailto (AKA NetWalker) tends to deliver ransomware in a highly obfuscated PowerShell script.","entities":[{"id":1765,"label":"malware","start_offset":22,"end_offset":28},{"id":1766,"label":"malware","start_offset":34,"end_offset":43},{"id":46155,"label":"attack-pattern","start_offset":78,"end_offset":113}],"relations":[{"id":162,"from_id":1766,"to_id":1765,"type":"duplicate-of"},{"id":160,"from_id":46155,"to_id":1766,"type":"delivers"},{"id":161,"from_id":46155,"to_id":1765,"type":"delivers"}],"Comments":[]} | |
{"id":536,"text":"Exploit documents are seldom seen for delivering ransomware.","entities":[],"relations":[],"Comments":[]} | |
{"id":537,"text":"One example is an exploit RTF that led to downloading and installing Makop ransomware remotely.","entities":[{"id":44767,"label":"attack-pattern","start_offset":18,"end_offset":29},{"id":44768,"label":"malware","start_offset":69,"end_offset":85}],"relations":[{"id":21,"from_id":44767,"to_id":44768,"type":"delivers"}],"Comments":[]} | |
{"id":538,"text":" Besides encrypting files on infected hosts, the main feature of ransomware is, of course, the demand for ransom.","entities":[],"relations":[],"Comments":[]} | |
{"id":539,"text":"Since ransomware threat actors have had years to evolve their techniques, there are now several different ways for attackers to receive payments and provide the \"service\" they claim to offer.","entities":[],"relations":[],"Comments":[]} | |
{"id":540,"text":"Usually, after the ransomware successfully installs, it pops up a message box or leaves text files to explain how to pay the ransom – the ransom note.","entities":[],"relations":[],"Comments":[]} | |
{"id":541,"text":"Some ransomware locks the victim's screen and only displays the ransom note.","entities":[],"relations":[],"Comments":[]} | |
{"id":542,"text":" Unit 42 has reviewed ransom notes from different ransomware families.","entities":[{"id":46156,"label":"identity","start_offset":1,"end_offset":8}],"relations":[],"Comments":[]} | |
{"id":543,"text":"Most ransom notes request payment in cryptocurrency or mention reaching out via the darknet, though some other contact methods also appear. In these cases, the ransom note asks victims to pay a specific amount in cryptocurrency – Bitcoin (BTC), Monero (XMR), etc. — to a specific wallet address.","entities":[{"id":45794,"label":"SOFTWARE","start_offset":246,"end_offset":252},{"id":44769,"label":"SOFTWARE","start_offset":231,"end_offset":238},{"id":44770,"label":"SOFTWARE","start_offset":231,"end_offset":244},{"id":44772,"label":"SOFTWARE","start_offset":246,"end_offset":258}],"relations":[],"Comments":[]} | |
{"id":544,"text":"Two ransomware families that utilize these types of ransom notes are Virlock and WanaCrypt0r.","entities":[{"id":46157,"label":"malware","start_offset":69,"end_offset":76},{"id":46158,"label":"malware","start_offset":81,"end_offset":92}],"relations":[],"Comments":[]} | |
{"id":545,"text":" Some ransomware families, including Babuk, Sodinokibi, Cerber, Mailto, Ryuk and others, seldom show the ransom amount or cryptocurrency wallet address.","entities":[{"id":46160,"label":"malware","start_offset":44,"end_offset":54},{"id":46159,"label":"malware","start_offset":37,"end_offset":42},{"id":46161,"label":"malware","start_offset":56,"end_offset":62},{"id":46163,"label":"malware","start_offset":72,"end_offset":76},{"id":46162,"label":"malware","start_offset":64,"end_offset":70}],"relations":[],"Comments":[]} | |
{"id":546,"text":"Instead, they instruct victims to install TOR and reach out to them on the darknet.","entities":[{"id":44773,"label":"tools","start_offset":42,"end_offset":45}],"relations":[],"Comments":[]} | |
{"id":547,"text":"Usually, they host a website for victims to input the identification key found in the ransom note, upload encrypted files for decryption – and pay the ransom.","entities":[],"relations":[],"Comments":[]} | |
{"id":548,"text":" Ransom notes from Makop, Dharma, Ryuk, DearCry and others, sometimes ask victims to reach out to them via email.","entities":[{"id":46164,"label":"malware","start_offset":19,"end_offset":24},{"id":46166,"label":"malware","start_offset":34,"end_offset":38},{"id":46167,"label":"malware","start_offset":40,"end_offset":47},{"id":46165,"label":"malware","start_offset":26,"end_offset":32}],"relations":[],"Comments":[]} | |
{"id":549,"text":"The email addresses given are usually from untraceable email accounts.","entities":[],"relations":[],"Comments":[]} | |
{"id":550,"text":"At other times, a threat actor lets the victim chat with them directly on group chat software.","entities":[],"relations":[],"Comments":[]} | |
{"id":551,"text":"The victims can find the threat actor’s user name through specific group chat software or follow a chat group link in the ransom note. Ransom payment operations are complicated and highly automated processes.","entities":[],"relations":[],"Comments":[]} | |
{"id":552,"text":"Attackers can create a lot of cryptocurrency wallets automatically; they can even make a unique wallet address for each victim.","entities":[],"relations":[],"Comments":[]} | |
{"id":553,"text":"Once a ransom is received, the ransom will be involved in the multiple transactions that are managed to distribute and aggregate the ransom across thousands of virtual wallets.","entities":[],"relations":[],"Comments":[]} | |
{"id":554,"text":"For example, the Xorist ransomware (SHA256: 4979A10B81C41ECC0FC3A0F376ADE766CE616D2301639F74E0277047CC40E3D6) demanded £1,000 for a ransom; the bitcoin wallet address was 1BFqrLCDwwrxueY7FFDn8DqeoasPJignxt.","entities":[{"id":1837,"label":"SHA2","start_offset":44,"end_offset":108},{"id":46168,"label":"malware","start_offset":17,"end_offset":34},{"id":46169,"label":"SOFTWARE","start_offset":144,"end_offset":151}],"relations":[{"id":157,"from_id":1837,"to_id":46168,"type":"indicates"}],"Comments":[]} | |
{"id":555,"text":"However, this wallet had not really received any ransom payments when the malware was delivered.","entities":[],"relations":[],"Comments":[]} | |
{"id":556,"text":"The wallet got involved in the operation of mixing and tumbling among several other virtual wallets.","entities":[],"relations":[],"Comments":[]} | |
{"id":557,"text":"This is a pretty common operation when attackers want to withdraw or disperse currency from ransom payments into other wallets.","entities":[],"relations":[],"Comments":[]} | |
{"id":558,"text":"During the operation, 25.1 BTC from 538 wallets was sent to 1NDyJtNTjmwk5xPNhjgAMu4HDHigtobu1s (SHA256: CE11703DEF517306326C48A67A7C859A3DE0F18E2451DF226CE171389A5B7953), which is a wallet owned by Binance cryptocurrency exchange.","entities":[{"id":1845,"label":"SHA2","start_offset":104,"end_offset":168},{"id":44776,"label":"identity","start_offset":198,"end_offset":229}],"relations":[{"id":164,"from_id":44776,"to_id":1845,"type":"owns"}],"Comments":[]} | |
{"id":559,"text":"(ref: Binance on Twitter ).","entities":[{"id":46171,"label":"SOFTWARE","start_offset":6,"end_offset":13},{"id":46172,"label":"SOFTWARE","start_offset":17,"end_offset":24}],"relations":[],"Comments":[]} | |
{"id":560,"text":"The 25.1 BTC amount was worth $1.18 million at that time, and now is about $876,000.","entities":[],"relations":[],"Comments":[]} | |
{"id":561,"text":" Since Virlock only requests a $250 ransom, it does not draw too much public attention.","entities":[{"id":45795,"label":"malware","start_offset":7,"end_offset":14}],"relations":[],"Comments":[]} | |
{"id":562,"text":"Other ransomware families, however, target enterprises and ask for multimillion dollar ransoms, which garners much more media attention.","entities":[],"relations":[],"Comments":[]} | |
{"id":563,"text":"Based on the way Virlock spreads the ransom amount it demands, it is likely designed to target consumers or home users.","entities":[{"id":46173,"label":"malware","start_offset":17,"end_offset":24}],"relations":[],"Comments":[]} | |
{"id":564,"text":"After infection, Virlock hides the file extension through modification of the registry (HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced\\HideFileExt = 1, HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced\\Hidden = 2).","entities":[{"id":1874,"label":"REGISTRYKEY","start_offset":88,"end_offset":164},{"id":1876,"label":"REGISTRYKEY","start_offset":170,"end_offset":241},{"id":44778,"label":"malware","start_offset":17,"end_offset":24}],"relations":[{"id":165,"from_id":1874,"to_id":44778,"type":"indicates"},{"id":166,"from_id":1876,"to_id":44778,"type":"indicates"}],"Comments":[]} | |
{"id":565,"text":"The encrypted file icon will look the same as usual, but after opening the infected file, the ransom note will pop up.","entities":[],"relations":[],"Comments":[]} | |
{"id":566,"text":"Virlock uses, but isn’t limited to, PDF, DOC, PPT, JPG, BMP,GIF, RAR, 7Zip, Zip and EXE files.","entities":[{"id":46174,"label":"malware","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} | |
{"id":567,"text":"Figure 6 is a screenshot of a recently captured Virlock ransom note.","entities":[{"id":44781,"label":"malware","start_offset":48,"end_offset":55}],"relations":[],"Comments":[]} | |
{"id":568,"text":"The attacker asked for $250 and required payment as 0.004 BTC (suggesting that at the time the ransom note was written, 1 BTC equaled approximately $62,500).","entities":[],"relations":[],"Comments":[]} | |
{"id":569,"text":"At the time of infection experiments, 1 BTC equaled approximately $54,649, suggesting that the exchange rate in the ransom note is not updated on the fly.","entities":[],"relations":[],"Comments":[]} | |
{"id":570,"text":"Some Virlock variants ask for more ransom, such as 0.771 BTC, 1.008 BTC or more.","entities":[{"id":44782,"label":"malware","start_offset":5,"end_offset":12}],"relations":[],"Comments":[]} | |
{"id":571,"text":" The top three samples we observed spreading in early 2021 were Ryuk, Maze, and Sodinokibi.","entities":[{"id":1907,"label":"malware","start_offset":64,"end_offset":68},{"id":1910,"label":"malware","start_offset":80,"end_offset":90},{"id":46175,"label":"malware","start_offset":70,"end_offset":74},{"id":46176,"label":"TIME","start_offset":54,"end_offset":58}],"relations":[],"Comments":[]} | |
{"id":572,"text":"These three contribute 7.2% out of the total infected numbers we collected.","entities":[],"relations":[],"Comments":[]} | |
{"id":573,"text":" Ryuk will change the infected file extension to .RYK, and leave a ransom note called RyukReadMe.html.","entities":[{"id":44783,"label":"malware","start_offset":1,"end_offset":5},{"id":44784,"label":"FILEPATH","start_offset":86,"end_offset":101}],"relations":[{"id":22,"from_id":44784,"to_id":44783,"type":"indicates"}],"Comments":[]} | |
{"id":574,"text":"One of the reasons Ryuk causes so much damage is because it will scan the local network and try to infect other machines through Server Message Block (SMB) protocols.","entities":[{"id":1919,"label":"malware","start_offset":19,"end_offset":23},{"id":46177,"label":"SOFTWARE","start_offset":129,"end_offset":155}],"relations":[],"Comments":[]} | |
{"id":575,"text":"Ryuk will even send out Wake-on-LAN packets to wake up systems that have been configured with this feature.","entities":[{"id":1923,"label":"malware","start_offset":0,"end_offset":4}],"relations":[],"Comments":[]} | |
{"id":576,"text":"In this research, we discussed ransomware family trends we observed in the first three months of 2021.","entities":[{"id":44785,"label":"TIME","start_offset":97,"end_offset":101}],"relations":[],"Comments":[]} | |
{"id":577,"text":"First, we reviewed the trends from prevalent ransomware families, then we discussed the most common file types used as attack vectors leveraged by ransomware.","entities":[],"relations":[],"Comments":[]} | |
{"id":578,"text":"Lastly, we gave an example of ransom operations and updates about top ransomware families.","entities":[],"relations":[],"Comments":[]} | |
{"id":579,"text":" Ransomware threats are a serious challenge.","entities":[],"relations":[],"Comments":[]} | |
{"id":580,"text":"Employing effective backup strategies and disaster recovery procedures is important.","entities":[],"relations":[],"Comments":[]} | |
{"id":581,"text":"Palo Alto Networks customers are further protected from ransomware.","entities":[{"id":46178,"label":"identity","start_offset":0,"end_offset":18}],"relations":[],"Comments":[]} | |
{"id":582,"text":"Cortex XSOAR can automatically and instantly coordinate with network security, malware analysis and threat management solutions to ensure customers remain protected.","entities":[{"id":44786,"label":"SOFTWARE","start_offset":0,"end_offset":12}],"relations":[],"Comments":[]} | |
{"id":583,"text":"Cortex XDR endpoint protection stops malware, exploits and ransomware before they can compromise endpoints.","entities":[{"id":46179,"label":"SOFTWARE","start_offset":0,"end_offset":10}],"relations":[],"Comments":[]} | |
{"id":584,"text":"With AI-powered Inline analysis, the Next-Generation Firewall stops exploits that lead to infection, and WildFire’s always up-to-date machine learning models monitor behavior to preemptively detect unknown ransomware.","entities":[{"id":46180,"label":"identity","start_offset":105,"end_offset":113}],"relations":[],"Comments":[]} | |
{"id":585,"text":" If you think you may have been impacted by ransomware, please email unit42-investigations@paloaltonetworks.com or call (866) 4-UNIT42 to get in touch with the Unit 42 Incident Response team.","entities":[{"id":1952,"label":"EMAIL","start_offset":69,"end_offset":111},{"id":1954,"label":"identity","start_offset":160,"end_offset":167},{"id":44787,"label":"identity","start_offset":128,"end_offset":134},{"id":44788,"label":"identity","start_offset":160,"end_offset":190}],"relations":[],"Comments":[]} | |
{"id":586,"text":" Highlights from the 2021 Unit 42 Ransomware Threat Report Ransomware Threat Assessments: A Companion to the 2021 Unit 42 Ransomware Threat Report Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[{"id":1956,"label":"identity","start_offset":26,"end_offset":33},{"id":1958,"label":"identity","start_offset":115,"end_offset":122}],"relations":[],"Comments":[]} | |
{"id":587,"text":"Please mark, I'm not a robot! ","entities":[],"relations":[],"Comments":[]} | |
{"id":588,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} | |
{"id":589,"text":"If you need to understand one thing about cybercrime, it’s that it is all about business.","entities":[],"relations":[],"Comments":[]} | |
{"id":590,"text":" In our latest Unit 42 research on cybercriminals using the Hancitor malware, we show that not only are their attacks about business, we can see these cybercriminals deftly applying some fundamental business principles around timing, specialization, and globalization.","entities":[{"id":46181,"label":"identity","start_offset":15,"end_offset":22},{"id":46182,"label":"malware","start_offset":60,"end_offset":68}],"relations":[],"Comments":[]} | |
{"id":591,"text":" Hancitor is a malware that focuses getting other malware onto the victim’s system.","entities":[{"id":44790,"label":"malware","start_offset":1,"end_offset":9}],"relations":[],"Comments":[]} | |
{"id":592,"text":"In the case of Hancitor, it’s typically banking Trojans that steal the victim’s banking information.","entities":[{"id":46183,"label":"malware","start_offset":15,"end_offset":23},{"id":46184,"label":"attack-pattern","start_offset":61,"end_offset":99}],"relations":[],"Comments":[]} | |
{"id":593,"text":" In our latest research, we can see the attackers behind Hancitor have been timing their attacks to happen during the busiest time of the global working week, the middle of the week.","entities":[{"id":46185,"label":"malware","start_offset":57,"end_offset":65}],"relations":[],"Comments":[]} | |
{"id":594,"text":"And we’ve seen that in adapting their attacks to better evade detection, they’ve specialized their operations around the globe.","entities":[],"relations":[],"Comments":[]} | |
{"id":595,"text":" Hancitor isn’t particularly advanced in its tactics: it’s ideal target is an old or outdated version of Microsoft Windows like Windows 7 or even Windows XP.","entities":[{"id":46187,"label":"malware","start_offset":1,"end_offset":9},{"id":46188,"label":"SOFTWARE","start_offset":105,"end_offset":122},{"id":46189,"label":"SOFTWARE","start_offset":128,"end_offset":137},{"id":46190,"label":"SOFTWARE","start_offset":146,"end_offset":157}],"relations":[],"Comments":[]} | |
{"id":596,"text":"But it’s effective enough that when used in several hundred different spam campaigns every month it pays for the criminals to keep up these attacks against targets around the world.","entities":[],"relations":[],"Comments":[]} | |
{"id":597,"text":" Timing In our most recent research, one of the things that jumped out for our researchers is the clear pattern around the timing of the attacks.","entities":[],"relations":[],"Comments":[]} | |
{"id":598,"text":"As you can see in Figure 1 below, throughout 2017, the Hancitor attacks show clear spikes in their occurrence and these spikes happen during the middle of the week.","entities":[{"id":46192,"label":"TIME","start_offset":45,"end_offset":49},{"id":46191,"label":"SOFTWARE","start_offset":55,"end_offset":63}],"relations":[],"Comments":[]} | |
{"id":599,"text":" Figure 1: Timeline of Hancitor campaign activity since January 2017.","entities":[{"id":46193,"label":"malware","start_offset":23,"end_offset":31},{"id":46194,"label":"TIME","start_offset":56,"end_offset":68}],"relations":[],"Comments":[]} | |
{"id":600,"text":" The attackers behind Hancitor aren’t the first to time their spam attacks like this, but it is an effective tactic to try and increase their chances of success, especially when combined with the other innovation that we’ve seen.","entities":[{"id":44791,"label":"malware","start_offset":22,"end_offset":30},{"id":44792,"label":"attack-pattern","start_offset":62,"end_offset":74}],"relations":[{"id":23,"from_id":44791,"to_id":44792,"type":"uses"}],"Comments":[]} | |
{"id":601,"text":"Adapting the Attacks ","entities":[],"relations":[],"Comments":[]} | |
{"id":602,"text":"In the past, Hancitor was sent as a malicious attachment in a spam email which would then download and install the attackers’ final malware like a banking Trojan.","entities":[{"id":46195,"label":"malware","start_offset":13,"end_offset":21},{"id":46196,"label":"attack-pattern","start_offset":36,"end_offset":72}],"relations":[{"id":167,"from_id":46195,"to_id":46196,"type":"uses"}],"Comments":[]} | |
{"id":603,"text":"When they would do this, the Hancitor attachment would download and install the final malware from a malicious or compromised site.","entities":[{"id":44793,"label":"malware","start_offset":29,"end_offset":37}],"relations":[],"Comments":[]} | |
{"id":604,"text":" But as organizations have gotten more effective at blocking malicious attachments like Hancitor, we’ve seen the attackers behind Hancitor adapt to evade detection and prevention.","entities":[{"id":46198,"label":"malware","start_offset":130,"end_offset":138},{"id":46200,"label":"malware","start_offset":88,"end_offset":96}],"relations":[],"Comments":[]} | |
{"id":605,"text":" They’ve done this by moving the Hancitor malware from being a malicious attachment in spam to itself being a malicious download.","entities":[{"id":46201,"label":"malware","start_offset":33,"end_offset":41}],"relations":[],"Comments":[]} | |
{"id":606,"text":"The spam the attackers use no long has a malicious attachment but instead a malicious link that downloads the malicious Hancitor attachment.","entities":[{"id":44794,"label":"malware","start_offset":120,"end_offset":128},{"id":44795,"label":"attack-pattern","start_offset":76,"end_offset":91},{"id":44796,"label":"attack-pattern","start_offset":41,"end_offset":61}],"relations":[{"id":24,"from_id":44796,"to_id":44794,"type":"delivers"},{"id":25,"from_id":44795,"to_id":44794,"type":"delivers"}],"Comments":[]} | |
{"id":607,"text":" To do this, they make the spam look like something that requires you to click and download something like and invoice, a message, or a delivery notification.","entities":[],"relations":[],"Comments":[]} | |
{"id":608,"text":"Figure 2 shows one of these that was made to look like an Amazon shipping notice.","entities":[{"id":46202,"label":"identity","start_offset":58,"end_offset":64}],"relations":[],"Comments":[]} | |
{"id":609,"text":"Figure 2: Hancitor malspam example from February 2017.","entities":[{"id":44797,"label":"malware","start_offset":10,"end_offset":18},{"id":44798,"label":"TIME","start_offset":40,"end_offset":53}],"relations":[],"Comments":[]} | |
{"id":610,"text":" This means that a Hancitor attack now has two downloads rather than one and what these attackers did around the malicious downloads shows another modern business tactic: globalization.","entities":[{"id":46203,"label":"malware","start_offset":19,"end_offset":27}],"relations":[],"Comments":[]} | |
{"id":611,"text":" Globalizing the Attacks Figure 3 below is a map showing where our Unit 42 researchers have found webistes involved in Hancitor attacks.","entities":[{"id":46204,"label":"malware","start_offset":120,"end_offset":128},{"id":46205,"label":"identity","start_offset":68,"end_offset":87}],"relations":[],"Comments":[]} | |
{"id":612,"text":" Figure 3: Hancitor distribution servers globally thus far in 2017 Table 1 – Number of Distribution Servers by Country ","entities":[{"id":44799,"label":"malware","start_offset":11,"end_offset":19},{"id":44800,"label":"TIME","start_offset":62,"end_offset":66}],"relations":[],"Comments":[]} | |
{"id":613,"text":"The hot spots in the United States represents distribution servers which are created using fraud based accounts at various hosting providers that are hosting the Hancitor documents while the hotspots in Asia represent legitimate sites for small and medium businesses that have been compromised by the actors behind Hancitor campaign to host the malicious Hancitor documents.","entities":[{"id":46207,"label":"malware","start_offset":162,"end_offset":170},{"id":46208,"label":"location","start_offset":203,"end_offset":207},{"id":46206,"label":"location","start_offset":21,"end_offset":34},{"id":46210,"label":"campaign","start_offset":315,"end_offset":332},{"id":46211,"label":"malware","start_offset":355,"end_offset":363}],"relations":[{"id":168,"from_id":46207,"to_id":46206,"type":"targets"},{"id":169,"from_id":46207,"to_id":46208,"type":"targets"}],"Comments":[]} | |
{"id":614,"text":" Conclusion Attackers are always making business decisions to optimize their attacks in ways that are most successful and profitable.","entities":[],"relations":[],"Comments":[]} | |
{"id":615,"text":"What is most interesting about Hancitor is the way these decisions so clearly reflect an awareness of business realities (by targeting peak working times) and dividing up the “work” of their attacks in a way that so clearly mirrors mainstream business decisions around globalizing operations.","entities":[{"id":45796,"label":"malware","start_offset":31,"end_offset":39}],"relations":[],"Comments":[]} | |
{"id":616,"text":" In the end, while Hancitor may not be sophisticated, these steps to adapt and stay effective seem to be succeeding.","entities":[{"id":46212,"label":"malware","start_offset":19,"end_offset":27}],"relations":[],"Comments":[]} | |
{"id":617,"text":"And we expect to continue to see Hancitor be a global threat for the foreseeable future.","entities":[{"id":46213,"label":"malware","start_offset":33,"end_offset":41}],"relations":[],"Comments":[]} | |
{"id":618,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} | |
{"id":619,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} | |
{"id":620,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} | |
{"id":621,"text":"This post is also available in: 日本語 (Japanese) This Unit 42 blog provides an update on the threat situation surrounding attacks using the Petya Ransomware which are impacting organizations in Ukraine, Russia and to a lesser extent around the world.","entities":[{"id":2073,"label":"identity","start_offset":58,"end_offset":65},{"id":2074,"label":"malware","start_offset":144,"end_offset":149},{"id":44803,"label":"malware","start_offset":144,"end_offset":160},{"id":44804,"label":"location","start_offset":198,"end_offset":205},{"id":44805,"label":"location","start_offset":207,"end_offset":213}],"relations":[{"id":27,"from_id":44803,"to_id":44805,"type":"targets"},{"id":26,"from_id":44803,"to_id":44804,"type":"targets"}],"Comments":[]} | |
{"id":622,"text":" On June 27th, 2017 we became aware of a new variant of the Petya malware which is spreading through multiple lateral movement techniques.","entities":[{"id":2081,"label":"malware","start_offset":60,"end_offset":65},{"id":46214,"label":"TIME","start_offset":4,"end_offset":19}],"relations":[],"Comments":[]} | |
{"id":623,"text":"One technique includes the ETERNALBLUE exploit tool.","entities":[{"id":2083,"label":"malware","start_offset":28,"end_offset":39}],"relations":[],"Comments":[]} | |
{"id":624,"text":"This is the same exploit the WanaCrypt0r\/WannaCry malware exploited to spread globally in May, 2017.","entities":[{"id":2086,"label":"malware","start_offset":29,"end_offset":40},{"id":2087,"label":"malware","start_offset":41,"end_offset":49},{"id":44808,"label":"TIME","start_offset":90,"end_offset":99}],"relations":[],"Comments":[]} | |
{"id":625,"text":"At least 50 organizations have reported impacts from the malware, including government and critical infrastructure operators.","entities":[],"relations":[],"Comments":[]} | |
{"id":627,"text":" Palo Alto Networks is documenting our prevention capabilities with regard to this threat in the Palo Alto Networks Protections for Petya Ransomware blog post.","entities":[{"id":44809,"label":"identity","start_offset":1,"end_offset":19},{"id":44810,"label":"identity","start_offset":97,"end_offset":115},{"id":44811,"label":"malware","start_offset":132,"end_offset":148}],"relations":[],"Comments":[]} | |
{"id":628,"text":"Windows users should take the following general steps to protect themselves:","entities":[{"id":46217,"label":"SOFTWARE","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} | |
{"id":629,"text":" This is a developing situation, we will update this blog as new information becomes available.","entities":[],"relations":[],"Comments":[]} | |
{"id":630,"text":"AutoFocus users view samples using the Petya tag.","entities":[{"id":2102,"label":"malware","start_offset":39,"end_offset":44}],"relations":[],"Comments":[]} | |
{"id":631,"text":" Petya is a ransomware family that works by modifying the Window’s system’s Master Boot Record (MBR), causing the system to crash.","entities":[{"id":2103,"label":"malware","start_offset":1,"end_offset":6},{"id":46218,"label":"SOFTWARE","start_offset":58,"end_offset":100}],"relations":[],"Comments":[]} | |
{"id":632,"text":"When the user reboots their PC, the modified MBR prevents Windows from loading and displays a fake “chkdisk” screen which indicates the computer's hard drive is being repaired, but the malware is actually encrypting the user's files.","entities":[{"id":46220,"label":"SOFTWARE","start_offset":58,"end_offset":65},{"id":46219,"label":"SOFTWARE","start_offset":45,"end_offset":48}],"relations":[],"Comments":[]} | |
{"id":633,"text":" When this process completes, the malware displays an ASCII Ransom note demanding payment from the victim (Figure 1). Figure 1: Latest Petya Ransom note displayed on a compromised system.","entities":[{"id":2109,"label":"malware","start_offset":136,"end_offset":141}],"relations":[],"Comments":[]} | |
{"id":634,"text":" The latest version of the Petya ransomware is spreading over Windows SMB and is reportedly using the ETERNALBLUE exploit tool, which exploits CVE-2017-0144 and was originally released by the Shadow Brokers group in April 2017.","entities":[{"id":2111,"label":"malware","start_offset":27,"end_offset":32},{"id":2113,"label":"malware","start_offset":102,"end_offset":113},{"id":2116,"label":"threat-actor","start_offset":188,"end_offset":206},{"id":46221,"label":"SOFTWARE","start_offset":62,"end_offset":73},{"id":46222,"label":"vulnerability","start_offset":143,"end_offset":156},{"id":46223,"label":"TIME","start_offset":216,"end_offset":226}],"relations":[{"id":171,"from_id":2111,"to_id":46222,"type":"exploits"},{"id":170,"from_id":2111,"to_id":46221,"type":"targets"},{"id":172,"from_id":2116,"to_id":2113,"type":"authored-by"},{"id":173,"from_id":46222,"to_id":46221,"type":"targets"}],"Comments":[]} | |
{"id":635,"text":" After the system is compromised the victim is asked to send US $300 in Bitcoin to a specific Bitcoin address and then send an e-mail with the victim’s bitcoin wallet ID to wowsmith123456@posteo[.]net to retrieve their individual decryption key.","entities":[{"id":46226,"label":"SOFTWARE","start_offset":94,"end_offset":101},{"id":46224,"label":"EMAIL","start_offset":173,"end_offset":200},{"id":46225,"label":"SOFTWARE","start_offset":72,"end_offset":79}],"relations":[],"Comments":[]} | |
{"id":636,"text":" Posteo (a free e-mail provider) has already shut down this e-mail address, and as such victims should not even attempt to pay the ransom.","entities":[{"id":44816,"label":"SOFTWARE","start_offset":1,"end_offset":7}],"relations":[],"Comments":[]} | |
{"id":637,"text":"As of 13:00 UTC on June 28thth, approximately 4 Bitcoin have been transferred to the attacker's wallet.","entities":[{"id":46227,"label":"TIME","start_offset":6,"end_offset":28}],"relations":[],"Comments":[]} | |
{"id":638,"text":" Unit 42 is unaware of ANY successful recovery after paying the ransom.","entities":[{"id":2124,"label":"identity","start_offset":1,"end_offset":8},{"id":2125,"label":"location","start_offset":64,"end_offset":70}],"relations":[],"Comments":[]} | |
{"id":639,"text":"Additionally, ongoing research by the industry is showing that specific actions this malware takes makes it technically infeasible, if not impossible, for recovery to occur.","entities":[],"relations":[],"Comments":[]} | |
{"id":640,"text":" This means that even though this malware is functionally ransomware, for threat assessment purposes, it should be functionally considered a “wiper”.","entities":[],"relations":[],"Comments":[]} | |
{"id":641,"text":" We are aware of the following information about how the Petya attack lifecycle works.","entities":[{"id":46228,"label":"malware","start_offset":57,"end_offset":62}],"relations":[],"Comments":[]} | |
{"id":642,"text":" Delivery\/Exploitation","entities":[],"relations":[],"Comments":[]} | |
{"id":643,"text":" We have not yet confirmed the initial infection vector for this new Petya variant.","entities":[{"id":2132,"label":"malware","start_offset":69,"end_offset":74}],"relations":[],"Comments":[]} | |
{"id":644,"text":"Previous variants were spread through e-mail, but we have not identified this latest sample carried in any e-mail related attacks.","entities":[],"relations":[],"Comments":[]} | |
{"id":645,"text":" While we have not been able to directly confirm the source, we have seen evidence that a Ukrainian software application called MEDoc was used by attackers to deliver the Petya DLL.","entities":[{"id":46229,"label":"location","start_offset":90,"end_offset":99},{"id":44817,"label":"SOFTWARE","start_offset":128,"end_offset":133},{"id":44818,"label":"malware","start_offset":171,"end_offset":176}],"relations":[{"id":174,"from_id":44818,"to_id":44817,"type":"uses"}],"Comments":[]} | |
{"id":646,"text":"The software is heavily used in Ukraine it appears the company’s systems may have been compromised and used to issue a malicious update to systems running the program on the morning of Jun 27th.","entities":[{"id":46230,"label":"TIME","start_offset":174,"end_offset":193},{"id":46231,"label":"location","start_offset":32,"end_offset":39}],"relations":[],"Comments":[]} | |
{"id":648,"text":" Installation ","entities":[],"relations":[],"Comments":[]} | |
{"id":649,"text":"This variant of Petya is spread as a DLL file, which must be executed by another process before it takes action on the system.","entities":[{"id":2145,"label":"malware","start_offset":16,"end_offset":21}],"relations":[],"Comments":[]} | |
{"id":650,"text":"Once executed, it overwrites the Master Boot Record and creates a scheduled task to reboot the system.","entities":[{"id":46233,"label":"SOFTWARE","start_offset":33,"end_offset":51},{"id":46234,"label":"attack-pattern","start_offset":66,"end_offset":80}],"relations":[],"Comments":[]} | |
{"id":651,"text":"Once the system reboots, the malware displays a fake “chkdisk” scan which tricks the victim into believing the program is repairing their hard drive.","entities":[],"relations":[],"Comments":[]} | |
{"id":652,"text":"In reality, the malware is encrypting the NTFS Master File Table in the background.","entities":[],"relations":[],"Comments":[]} | |
{"id":653,"text":"Once the fake chkdisk completes, the malware displays a ransom note which demands a payment of $300 in bitcoin.","entities":[],"relations":[],"Comments":[]} | |
{"id":654,"text":"Command and Control Petya contains no Command and Control mechanisms that we know of.","entities":[{"id":2153,"label":"malware","start_offset":21,"end_offset":26}],"relations":[],"Comments":[]} | |
{"id":655,"text":"After a host is infected, there is no communication from the malware back to the attacker.","entities":[],"relations":[],"Comments":[]} | |
{"id":656,"text":" Lateral Movement Petya uses three mechanisms to spread to additional hosts.","entities":[{"id":2156,"label":"malware","start_offset":19,"end_offset":24},{"id":46235,"label":"attack-pattern","start_offset":1,"end_offset":17}],"relations":[],"Comments":[]} | |
{"id":657,"text":" Ransomware attacks are very common, but they are rarely coupled with an exploit that allows the malware to spread as a network worm.","entities":[],"relations":[],"Comments":[]} | |
{"id":658,"text":"The WannaCry attacks in May, 2017 demonstrated that many Windows systems had not been patched for this vulnerability.","entities":[{"id":2160,"label":"malware","start_offset":4,"end_offset":12},{"id":46236,"label":"TIME","start_offset":24,"end_offset":33},{"id":46237,"label":"SOFTWARE","start_offset":57,"end_offset":64}],"relations":[],"Comments":[]} | |
{"id":659,"text":"The spread of Petya using this vulnerability indicates that many organizations may still be vulnerable, despite the attention WannaCry received.","entities":[{"id":2163,"label":"malware","start_offset":14,"end_offset":19},{"id":2166,"label":"malware","start_offset":126,"end_offset":134}],"relations":[],"Comments":[]} | |
{"id":660,"text":" As always if you have any questions, please come to the Threat & Vulnerability Discussions on our Live Community. Version Summary June 27, 2017: June 27, 2017 – 1:08 PM PT June 28, 2017 – 8:40 AM PT June 29, 2017 - 5:00 PM PT Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[{"id":46238,"label":"TIME","start_offset":133,"end_offset":146},{"id":46241,"label":"TIME","start_offset":177,"end_offset":203},{"id":46242,"label":"TIME","start_offset":205,"end_offset":231},{"id":46240,"label":"TIME","start_offset":149,"end_offset":175}],"relations":[],"Comments":[]} | |
{"id":661,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} | |
{"id":662,"text":"Nearly all of us have a use for Microsoft Office documents.","entities":[{"id":46243,"label":"SOFTWARE","start_offset":32,"end_offset":48}],"relations":[],"Comments":[]} | |
{"id":663,"text":"Whether they are work documents, e-receipts, or a lease on a new apartment – Office documents are useful to all of us, and this is part of the reason we’re very likely to open an office document we receive as an attachment in e-mail.","entities":[],"relations":[],"Comments":[]} | |
{"id":664,"text":"Armed with the knowledge that many people will open nearly any document, even those from an untrusted source, adversaries commonly choose these files in attacks to compromise a system.","entities":[],"relations":[],"Comments":[]} | |
{"id":665,"text":"In this threat brief we show you five different ways that Office documents can be subverted and abused to attack and compromise a Windows endpoint, some we’ve already posted about before, and some are new.","entities":[{"id":46244,"label":"SOFTWARE","start_offset":130,"end_offset":137}],"relations":[],"Comments":[]} | |
{"id":666,"text":" Macros Macros are the most straight-forward way for an attacker to weaponize Office documents.","entities":[],"relations":[],"Comments":[]} | |
{"id":667,"text":"Office applications have a built-in script engine that can run VBA (Visual Basic for Applications) scripts.","entities":[{"id":46245,"label":"SOFTWARE","start_offset":63,"end_offset":98}],"relations":[],"Comments":[]} | |
{"id":668,"text":"These scripts can execute immediately as the document opens, without any user interaction (assuming the user has previously enabled macros) and run malicious code on the system.","entities":[],"relations":[],"Comments":[]} | |
{"id":669,"text":"If the user has not enabled macros, a popup window will appear asking the user to click to do so.","entities":[],"relations":[],"Comments":[]} | |
{"id":670,"text":"The pop-up is one of several security mechanisms added by Microsoft to mitigate the security risk that macros pose.","entities":[{"id":46246,"label":"identity","start_offset":58,"end_offset":67}],"relations":[],"Comments":[]} | |
{"id":671,"text":"Microsoft will also force a different file extension (.docm instead of .docx for new documents containing macros).","entities":[{"id":46247,"label":"identity","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} | |
{"id":672,"text":"Despite these measures, users still choose to open these files and enable their content, thus allowing macros to continue be a common attack vector – both in wide and simple attacks to deliver ransomware such as Emotet, as well as for sophisticated attacks like this Sofacy campaign.","entities":[{"id":2220,"label":"malware","start_offset":212,"end_offset":218},{"id":44819,"label":"campaign","start_offset":267,"end_offset":282},{"id":44821,"label":"threat-actor","start_offset":267,"end_offset":273}],"relations":[{"id":175,"from_id":44819,"to_id":44821,"type":"related-to"}],"Comments":[]} | |
{"id":673,"text":"Figure 1.","entities":[],"relations":[],"Comments":[]} | |
{"id":674,"text":"The Sofacy document before & after the content is enabled","entities":[{"id":46248,"label":"malware","start_offset":4,"end_offset":10}],"relations":[],"Comments":[]} | |
{"id":675,"text":" As you can see in this example, attackers try to convince users to disable the security mechanisms added by Microsoft using social engineering, convincing the user to enable content for them to be able to see the full document.","entities":[{"id":45797,"label":"attack-pattern","start_offset":125,"end_offset":143},{"id":44822,"label":"identity","start_offset":109,"end_offset":118}],"relations":[],"Comments":[]} | |
{"id":676,"text":"In the Sofacy example, the attackers had simply made the font color white, so the text was present prior to the user enabling macros, just not clearly visible.","entities":[{"id":46249,"label":"malware","start_offset":7,"end_offset":13}],"relations":[],"Comments":[]} | |
{"id":677,"text":" Embedded Flash files In addition to built-in capabilities, like macros, Office documents can also be embedded with external objects, such as Adobe Flash files.","entities":[{"id":2236,"label":"location","start_offset":91,"end_offset":94},{"id":46250,"label":"SOFTWARE","start_offset":143,"end_offset":154}],"relations":[],"Comments":[]} | |
{"id":678,"text":"These objects are passed to the appropriate software for handling, thus any vulnerability that the software has can also be exploited by embedding it within the Adobe Flash content in the Office document.","entities":[{"id":44823,"label":"SOFTWARE","start_offset":161,"end_offset":172}],"relations":[],"Comments":[]} | |
{"id":679,"text":"An example for such attack vector being leveraged by attackers is CVE-2018-4878, an Adobe Flash Player Zero-Day exploited by embedding malicious SWF files in Excel documents.","entities":[{"id":46251,"label":"vulnerability","start_offset":66,"end_offset":79},{"id":46252,"label":"SOFTWARE","start_offset":84,"end_offset":102},{"id":46253,"label":"attack-pattern","start_offset":125,"end_offset":173}],"relations":[{"id":176,"from_id":46252,"to_id":46251,"type":"has"},{"id":177,"from_id":46251,"to_id":46253,"type":"uses"}],"Comments":[]} | |
{"id":680,"text":"In these types of attacks, the malicious Excel contains embedded Adobe Flash content which can trigger the Flash vulnerability and execute embedded shellcode.","entities":[{"id":46255,"label":"vulnerability","start_offset":107,"end_offset":126},{"id":46254,"label":"SOFTWARE","start_offset":65,"end_offset":76}],"relations":[],"Comments":[]} | |
{"id":681,"text":" Microsoft Equation Editor","entities":[{"id":45798,"label":"SOFTWARE","start_offset":1,"end_offset":26}],"relations":[],"Comments":[]} | |
{"id":682,"text":"In a similar way to embedding Adobe Flash files into an Office document, you can also embed equations in documents that will be parsed by Microsoft Equation Editor - a program that lets you easily write mathematical equations: Figure 2. Microsoft Equation Editor As in our previous example, vulnerabilities in the equation editor can be exploited by leveraging malicious Office documents.","entities":[{"id":46257,"label":"SOFTWARE","start_offset":30,"end_offset":41},{"id":46258,"label":"SOFTWARE","start_offset":138,"end_offset":163},{"id":46256,"label":"SOFTWARE","start_offset":238,"end_offset":263}],"relations":[],"Comments":[]} | |
{"id":683,"text":"We’ve seen examples of this just recently, when CVE-2017-11882 was exploited in the wild, paving the way to other exploits like CVE-2018-0802, both of which exploit flaws in the equation editor, enabling attackers to get from the user opening an Office document to remote code execution.","entities":[{"id":46259,"label":"vulnerability","start_offset":48,"end_offset":62},{"id":46260,"label":"vulnerability","start_offset":128,"end_offset":141},{"id":46261,"label":"SOFTWARE","start_offset":178,"end_offset":193}],"relations":[],"Comments":[]} | |
{"id":684,"text":"While still not seen in the wild, similar exploits in Microsoft Equation Editor, such as such as CVE-2018-0807 and CVE-2018-0798, were identified by Unit 42 researchers.","entities":[{"id":2275,"label":"identity","start_offset":149,"end_offset":156},{"id":44827,"label":"SOFTWARE","start_offset":54,"end_offset":79},{"id":44824,"label":"vulnerability","start_offset":97,"end_offset":110},{"id":44825,"label":"vulnerability","start_offset":115,"end_offset":128}],"relations":[{"id":29,"from_id":44827,"to_id":44825,"type":"has"},{"id":28,"from_id":44827,"to_id":44824,"type":"has"}],"Comments":[]} | |
{"id":685,"text":"Note that since the Microsoft Equation Editor runs as its own process (eqnedt32.exe), protections specific to Microsoft Office such as EMET and Windows Defender Exploit Guard are not effective by default, as they only protect Microsoft Office processes (such as winword.exe). OLE Objects & HTA Handlers","entities":[{"id":46263,"label":"SOFTWARE","start_offset":144,"end_offset":174},{"id":46264,"label":"SOFTWARE","start_offset":20,"end_offset":45},{"id":46262,"label":"SOFTWARE","start_offset":110,"end_offset":126},{"id":46265,"label":"FILEPATH","start_offset":71,"end_offset":83},{"id":46266,"label":"SOFTWARE","start_offset":226,"end_offset":242},{"id":46267,"label":"FILEPATH","start_offset":262,"end_offset":273}],"relations":[],"Comments":[]} | |
{"id":686,"text":"OLE Objects & HTA Handlers are mechanisms Office documents use to make references to include other documents in their content.","entities":[],"relations":[],"Comments":[]} | |
{"id":687,"text":"They can be used to compromise an endpoint in the following way: This functionality was leveraged in exploitation of CVE-2017-0199 - a Microsoft Office\/WordPad remote code execution (RCE) vulnerability patched by Microsoft in September 2017, and was used in multiple campaigns, like this OilRig campaign.","entities":[{"id":2292,"label":"identity","start_offset":136,"end_offset":145},{"id":2293,"label":"tools","start_offset":146,"end_offset":152},{"id":2298,"label":"malware","start_offset":289,"end_offset":295},{"id":44828,"label":"vulnerability","start_offset":118,"end_offset":131},{"id":44830,"label":"campaign","start_offset":289,"end_offset":303},{"id":44829,"label":"TIME","start_offset":227,"end_offset":241},{"id":44831,"label":"tools","start_offset":136,"end_offset":152},{"id":44832,"label":"tools","start_offset":153,"end_offset":160}],"relations":[{"id":30,"from_id":44831,"to_id":44828,"type":"has"},{"id":31,"from_id":44832,"to_id":44828,"type":"has"},{"id":32,"from_id":44830,"to_id":44828,"type":"exploits"}],"Comments":[]} | |
{"id":688,"text":"Figure 3.","entities":[],"relations":[],"Comments":[]} | |
{"id":689,"text":"RTF files will look exactly like regular Word documents ","entities":[{"id":46268,"label":"SOFTWARE","start_offset":41,"end_offset":45}],"relations":[],"Comments":[]} | |
{"id":690,"text":"In addition to the previous OLE & HTA exploit, attackers discovered RTF files can also execute ‘text\/html’ mime-type OLE objects using the MSHTML.","entities":[{"id":44833,"label":"vulnerability","start_offset":28,"end_offset":45}],"relations":[],"Comments":[]} | |
{"id":691,"text":"This means that RTF documents expose the same attack surface as Internet Explorer!","entities":[{"id":46269,"label":"SOFTWARE","start_offset":64,"end_offset":81}],"relations":[],"Comments":[]} | |
{"id":692,"text":"Leveraging this logical vulnerability, known as CVE-2018-8174, allows attackers to execute arbitrary HTML\/JavaScript\/VBScript.","entities":[{"id":46270,"label":"vulnerability","start_offset":48,"end_offset":61},{"id":46271,"label":"attack-pattern","start_offset":83,"end_offset":125}],"relations":[],"Comments":[]} | |
{"id":693,"text":"While code executed in this way is ‘sandboxed’ (where it cannot run new processes or write to the filesystem etc.), like other code running from Internet Explorer","entities":[{"id":45799,"label":"SOFTWARE","start_offset":145,"end_offset":162}],"relations":[],"Comments":[]} | |
{"id":694,"text":", this flaw can be used to leverage other vulnerabilities, such as a memory corruption UAF vulnerability in the VBScript engine, to gain arbitrary code execution in the context of the Word application (winword.exe), allowing them to gain control on the system.","entities":[{"id":46272,"label":"FILEPATH","start_offset":202,"end_offset":213},{"id":46273,"label":"SOFTWARE","start_offset":112,"end_offset":127},{"id":46274,"label":"SOFTWARE","start_offset":184,"end_offset":200}],"relations":[],"Comments":[]} | |
{"id":695,"text":" Conclusion","entities":[],"relations":[],"Comments":[]} | |
{"id":696,"text":"While document-based attacks have been a common attack vector for over a decade, we’re seeing a recent rise in their popularity and complexity.","entities":[],"relations":[],"Comments":[]} | |
{"id":697,"text":"This rise may be a result of browser exploits becoming more difficult to use, due to the hardening done by browser developers.","entities":[],"relations":[],"Comments":[]} | |
{"id":698,"text":"No matter the reason","entities":[],"relations":[],"Comments":[]} | |
{"id":699,"text":", it is important that organizations know how to defend against these common techniques.","entities":[],"relations":[],"Comments":[]} | |
{"id":700,"text":" Prevention Palo Alto Networks Traps advanced endpoint protection offers multiple methods of malware and exploit prevention to protect against these threats:","entities":[{"id":2316,"label":"identity","start_offset":12,"end_offset":30}],"relations":[],"Comments":[]} | |
{"id":701,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} | |
{"id":702,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} | |
{"id":703,"text":"This has been a fun week.","entities":[],"relations":[],"Comments":[]} | |
{"id":704,"text":"We have not had a significant cyber event like this – something that affects just about everybody on the Internet -- since the Kaminsky DNS vulnerability of 2008.","entities":[{"id":46276,"label":"vulnerability","start_offset":127,"end_offset":153},{"id":46275,"label":"TIME","start_offset":157,"end_offset":161}],"relations":[],"Comments":[]} | |
{"id":705,"text":"Everybody I know has been scrambling to understand what it means to their organization, to their business and to their immediate family.","entities":[],"relations":[],"Comments":[]} | |
{"id":706,"text":"Yes, I said family.","entities":[],"relations":[],"Comments":[]} | |
{"id":707,"text":"I am sure I am not the only one who has answered a question or two from his mother-in-law about how the Internet is melting down based on what she’s been reading in the press.","entities":[],"relations":[],"Comments":[]} | |
{"id":708,"text":" There’s a lot out there already about what Heartbleed means for the Web and beyond, and I’ll point you to our own analysis written by Scott Simkin or an essay by Dan Goodin over at ars technica for that explanation.","entities":[{"id":44834,"label":"identity","start_offset":135,"end_offset":147},{"id":44835,"label":"identity","start_offset":163,"end_offset":173},{"id":44836,"label":"identity","start_offset":182,"end_offset":194},{"id":44837,"label":"vulnerability","start_offset":44,"end_offset":54}],"relations":[],"Comments":[]} | |
{"id":709,"text":"Instead, here are eight things I am doing right now to protect Palo Alto Networks and my home (and mother-in-law) and that you should be doing, too:","entities":[{"id":46277,"label":"identity","start_offset":63,"end_offset":81}],"relations":[],"Comments":[]} | |
{"id":710,"text":" If there’s a long-term consideration here, it’s to install perfect forward secrecy, as Twitter did last year.","entities":[{"id":46278,"label":"SOFTWARE","start_offset":88,"end_offset":95}],"relations":[],"Comments":[]} | |
{"id":711,"text":"That ensures that a session key derived from a stolen private key and a collected public key in the future will not be compromised.","entities":[],"relations":[],"Comments":[]} | |
{"id":712,"text":" For more: Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} | |
{"id":713,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} | |
{"id":714,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} | |
{"id":715,"text":"This post is also available in: 日本語 (Japanese) On Aug. 25, 2021, Atlassian released a security advisory for an injection vulnerability in Confluence Server and Data Center, CVE-2021-26084.","entities":[{"id":46281,"label":"vulnerability","start_offset":179,"end_offset":193},{"id":46282,"label":"SOFTWARE","start_offset":144,"end_offset":177},{"id":46279,"label":"identity","start_offset":71,"end_offset":80},{"id":46280,"label":"TIME","start_offset":56,"end_offset":69}],"relations":[{"id":178,"from_id":46282,"to_id":46281,"type":"has"}],"Comments":[]} | |
{"id":716,"text":"If the vulnerability is exploited, threat actors could bypass authentication and run arbitrary code on unpatched systems.","entities":[{"id":46283,"label":"attack-pattern","start_offset":55,"end_offset":76},{"id":46284,"label":"attack-pattern","start_offset":81,"end_offset":99}],"relations":[],"Comments":[]} | |
{"id":717,"text":"Since the release of this advisory, mass scanning activity has started to occur, seeking unpatched systems, and in-the-wild exploitation has begun.","entities":[],"relations":[],"Comments":[]} | |
{"id":718,"text":"Unit 42 recommends customers upgrade to the latest release of Confluence Server and Data Center.","entities":[{"id":46285,"label":"identity","start_offset":0,"end_offset":7},{"id":46286,"label":"SOFTWARE","start_offset":62,"end_offset":95}],"relations":[],"Comments":[]} | |
{"id":719,"text":" The Atlassian products vulnerable to CVE-2021-26084 are those using the following versions of Confluence Server and Data Center: Confluence Cloud customers are not affected by this vulnerability.","entities":[{"id":46287,"label":"identity","start_offset":5,"end_offset":14},{"id":46288,"label":"vulnerability","start_offset":38,"end_offset":52},{"id":46290,"label":"SOFTWARE","start_offset":131,"end_offset":147},{"id":46289,"label":"SOFTWARE","start_offset":95,"end_offset":128}],"relations":[{"id":180,"from_id":46289,"to_id":46288,"type":"has"}],"Comments":[]} | |
{"id":720,"text":" We recommend that customers update Atlassian Confluence Server and Data Center to the latest version, 7.13.0 (TLS).","entities":[{"id":44838,"label":"SOFTWARE","start_offset":36,"end_offset":79}],"relations":[],"Comments":[]} | |
{"id":721,"text":"You can find the newest release on Atlassian’s download center.","entities":[{"id":46291,"label":"identity","start_offset":35,"end_offset":44}],"relations":[],"Comments":[]} | |
{"id":722,"text":" If you cannot install the latest upgrade, see the Mitigation section on the Atlassian security advisory for information on how to mitigate this vulnerability by running a script for the operating system your Confluence server is hosted on. Palo Alto Networks provides protection against the exploitation of this vulnerability: Palo Alto Networks will update this Threat Brief with new information and recommendations as they become available.","entities":[{"id":46292,"label":"identity","start_offset":77,"end_offset":86},{"id":46293,"label":"SOFTWARE","start_offset":209,"end_offset":219},{"id":46294,"label":"identity","start_offset":242,"end_offset":260},{"id":46295,"label":"identity","start_offset":330,"end_offset":348}],"relations":[],"Comments":[]} | |
{"id":723,"text":" writeups\/Confluence-RCE.md at main · httpvoid\/writeups Confluence Server Download Archives Confluence Security Advisory - 2021-08-25 | Confluence Data Center and Server 7.13 ","entities":[{"id":46296,"label":"TIME","start_offset":125,"end_offset":135},{"id":46297,"label":"SOFTWARE","start_offset":138,"end_offset":177},{"id":44839,"label":"FILEPATH","start_offset":1,"end_offset":27},{"id":44841,"label":"SOFTWARE","start_offset":57,"end_offset":74},{"id":44842,"label":"SOFTWARE","start_offset":94,"end_offset":104}],"relations":[],"Comments":[]} | |
{"id":724,"text":"Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} | |
{"id":725,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} | |
{"id":726,"text":"This post is also available in: 日本語 (Japanese) On Sept. 14, 2021, Microsoft’s Security Response Center (MSRC) released security patches detailing the findings of four critical vulnerabilities affecting the Microsoft Azure package Open Management Infrastructure (OMI).","entities":[{"id":46298,"label":"TIME","start_offset":56,"end_offset":70},{"id":44843,"label":"identity","start_offset":72,"end_offset":115},{"id":44844,"label":"SOFTWARE","start_offset":212,"end_offset":272}],"relations":[],"Comments":[]} | |
{"id":727,"text":"The open-source OMI package is designed to provide a portable infrastructure backbone for web-based management tools, such as diagnostic monitoring, log analytic services and automation functionality within UNIX and Linux systems.","entities":[{"id":46299,"label":"SOFTWARE","start_offset":207,"end_offset":211},{"id":46301,"label":"SOFTWARE","start_offset":16,"end_offset":27},{"id":46300,"label":"SOFTWARE","start_offset":216,"end_offset":221}],"relations":[],"Comments":[]} | |
{"id":728,"text":"OMI is used by Microsoft Azure to manage UNIX packages within Azure virtual machines (VMs), containers and serverless cloud instances.","entities":[{"id":46302,"label":"SOFTWARE","start_offset":0,"end_offset":3},{"id":46305,"label":"SOFTWARE","start_offset":62,"end_offset":90},{"id":46303,"label":"SOFTWARE","start_offset":15,"end_offset":30},{"id":46304,"label":"SOFTWARE","start_offset":41,"end_offset":45}],"relations":[],"Comments":[]} | |
{"id":729,"text":"According to Microsoft’s security release notes, any system created, or which has updated its OMI package, after Aug. 11, 2021, should automatically be patched.","entities":[{"id":44845,"label":"TIME","start_offset":113,"end_offset":126},{"id":44846,"label":"identity","start_offset":13,"end_offset":23}],"relations":[],"Comments":[]} | |
{"id":730,"text":" The four critical vulnerabilities discovered by security researchers from Wiz include one unauthenticated remote code execution (RCE) and three privilege escalation vulnerabilities. Dubbed OMIGOD, the four vulnerabilities were found to directly affect Azure cloud instances using the following Azure services: Prisma Cloud Compute Defender agents can detect whether any Azure system is vulnerable to any of the four CVEs.","entities":[{"id":46306,"label":"attack-pattern","start_offset":91,"end_offset":135},{"id":46311,"label":"SOFTWARE","start_offset":313,"end_offset":342},{"id":46307,"label":"attack-pattern","start_offset":145,"end_offset":165},{"id":46309,"label":"SOFTWARE","start_offset":254,"end_offset":265},{"id":46310,"label":"SOFTWARE","start_offset":296,"end_offset":310},{"id":46313,"label":"SOFTWARE","start_offset":373,"end_offset":378},{"id":46308,"label":"vulnerability","start_offset":191,"end_offset":197}],"relations":[],"Comments":[]} | |
{"id":731,"text":"Additionally, Prisma Cloud users can also build a custom vulnerability detection rule to identify if any system is running an OMI package with a version previous to 1.6.8.1.","entities":[{"id":46314,"label":"SOFTWARE","start_offset":14,"end_offset":26},{"id":46315,"label":"SOFTWARE","start_offset":126,"end_offset":129}],"relations":[],"Comments":[]} | |
{"id":732,"text":" To build a custom vulnerability detection rule, open Prisma Cloud and navigate to the following page: name,type,package,minVersionInclusive,maxVersionInclusive,md5 OMIGOD,package,omi,*,1.6.8.0, Palo Alto Networks Azure-based VM- and CN-Series Firewall instances do not use the OMI package and are not vulnerable to the OMI critical vulnerabilities.","entities":[{"id":46318,"label":"identity","start_offset":197,"end_offset":215},{"id":46319,"label":"SOFTWARE","start_offset":216,"end_offset":221},{"id":46321,"label":"SOFTWARE","start_offset":322,"end_offset":325},{"id":46317,"label":"vulnerability","start_offset":166,"end_offset":172},{"id":46316,"label":"SOFTWARE","start_offset":54,"end_offset":66},{"id":46320,"label":"SOFTWARE","start_offset":280,"end_offset":283}],"relations":[],"Comments":[]} | |
{"id":733,"text":" Prisma Cloud will create an alert for any system which maintains an OMI package vulnerable to the OMI critical vulnerabilities.","entities":[{"id":46322,"label":"SOFTWARE","start_offset":1,"end_offset":13},{"id":46324,"label":"SOFTWARE","start_offset":99,"end_offset":102},{"id":46323,"label":"SOFTWARE","start_offset":69,"end_offset":73}],"relations":[],"Comments":[]} | |
{"id":734,"text":"Should a system be identified as vulnerable, the following steps should be taken for that Azure Cloud Instance:","entities":[{"id":46325,"label":"SOFTWARE","start_offset":90,"end_offset":101}],"relations":[],"Comments":[]} | |
{"id":735,"text":"On Sept. 14, 2021, security researchers from Wiz released a report detailing the findings of four critical vulnerabilities affecting the Microsoft Azure package OMI.","entities":[{"id":46326,"label":"identity","start_offset":45,"end_offset":48},{"id":44849,"label":"TIME","start_offset":3,"end_offset":17},{"id":44851,"label":"SOFTWARE","start_offset":137,"end_offset":164}],"relations":[],"Comments":[]} | |
{"id":736,"text":"Dubbed OMIGOD, the four vulnerabilities were found to directly affect Azure Cloud Instances.","entities":[{"id":46327,"label":"vulnerability","start_offset":7,"end_offset":13},{"id":46328,"label":"SOFTWARE","start_offset":70,"end_offset":81}],"relations":[{"id":181,"from_id":46328,"to_id":46327,"type":"has"}],"Comments":[]} | |
{"id":737,"text":"Palo Alto Networks Azure-based VM and CN Series Firewall instances do not use the OMI package and are not vulnerable to the OMI critical vulnerabilities.","entities":[{"id":46331,"label":"SOFTWARE","start_offset":82,"end_offset":85},{"id":46330,"label":"SOFTWARE","start_offset":19,"end_offset":24},{"id":46329,"label":"identity","start_offset":0,"end_offset":18},{"id":46332,"label":"SOFTWARE","start_offset":124,"end_offset":127}],"relations":[],"Comments":[]} | |
{"id":738,"text":"Customers of Prisma Cloud have the ability to create alerts to detect vulnerabilities.","entities":[{"id":44852,"label":"SOFTWARE","start_offset":13,"end_offset":25}],"relations":[],"Comments":[]} | |
{"id":739,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} | |
{"id":740,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} | |
{"id":741,"text":"Use-after-free bugs have affected Internet Explorer for years.","entities":[{"id":46333,"label":"SOFTWARE","start_offset":34,"end_offset":51}],"relations":[],"Comments":[]} | |
{"id":742,"text":"In the past year alone, Microsoft patched 122 IE vulnerabilities, the majority of which were use-after-free bugs.","entities":[{"id":46334,"label":"identity","start_offset":24,"end_offset":33}],"relations":[],"Comments":[]} | |
{"id":743,"text":"This year Microsoft has already patched 126 IE vulnerabilities to date.","entities":[{"id":46335,"label":"identity","start_offset":10,"end_offset":19}],"relations":[],"Comments":[]} | |
{"id":744,"text":"Of those vulnerabilities, 4 were actively being exploited in the wild.","entities":[],"relations":[],"Comments":[]} | |
{"id":745,"text":"These 4 exploits (CVE-2014-1815, CVE-2014-1776, CVE-2014-0322, CVE-2014-0324) were all based on use-after-free bugs.","entities":[{"id":46336,"label":"vulnerability","start_offset":18,"end_offset":31},{"id":46337,"label":"vulnerability","start_offset":33,"end_offset":46},{"id":46339,"label":"vulnerability","start_offset":63,"end_offset":76},{"id":46338,"label":"vulnerability","start_offset":48,"end_offset":61}],"relations":[],"Comments":[]} | |
{"id":746,"text":" To deal with the increasing number of use-after-free bugs and associated exploits, Microsoft introduced a series of new control mechanisms in the most recent Internet Explorer patches.","entities":[{"id":46340,"label":"identity","start_offset":84,"end_offset":93},{"id":46341,"label":"SOFTWARE","start_offset":159,"end_offset":176}],"relations":[],"Comments":[]} | |
{"id":747,"text":"In June, Microsoft introduced a new isolated heap mechanism to solve the usage issue of use-after-free exploitation.","entities":[{"id":44853,"label":"identity","start_offset":9,"end_offset":18},{"id":44854,"label":"attack-pattern","start_offset":88,"end_offset":115}],"relations":[],"Comments":[]} | |
{"id":748,"text":"They followed that up In July by implementing a deferred free method to solve the freeing issue of use-after-free bugs.","entities":[{"id":46342,"label":"TIME","start_offset":25,"end_offset":29},{"id":46343,"label":"attack-pattern","start_offset":99,"end_offset":113}],"relations":[],"Comments":[]} | |
{"id":749,"text":" The main concept of an isolated heap is simple.","entities":[],"relations":[],"Comments":[]} | |
{"id":750,"text":"It allocates a dedicated heap for select critical objects to use that is separate from other heaps that a user can directly access.","entities":[],"relations":[],"Comments":[]} | |
{"id":751,"text":"The heap block will not be occupied by user-controlled data after the critical objects are freed.","entities":[],"relations":[],"Comments":[]} | |
{"id":752,"text":"This mechanism prevents precise control of the data of a freed object from further exploitation.","entities":[],"relations":[],"Comments":[]} | |
{"id":753,"text":" Figure 1. _g_hIsolatedHeap handle used for isolated heap ","entities":[],"relations":[],"Comments":[]} | |
{"id":754,"text":"The isolated heap was applied to many but not all internal objects, leaving some still vulnerable.","entities":[],"relations":[],"Comments":[]} | |
{"id":755,"text":"To address this, Microsoft introduced another protection method of deferred free named ProtectedFree.","entities":[{"id":46344,"label":"identity","start_offset":17,"end_offset":26}],"relations":[],"Comments":[]} | |
{"id":756,"text":"They encapsulate this method and apply it to almost every object in mshtml.dll.","entities":[{"id":44855,"label":"FILEPATH","start_offset":68,"end_offset":78}],"relations":[],"Comments":[]} | |
{"id":757,"text":"In IE9, for example, it has been applied to every object through MemoryProtection::HeapFree as shown in figure 2.","entities":[{"id":46345,"label":"SOFTWARE","start_offset":3,"end_offset":6}],"relations":[],"Comments":[]} | |
{"id":758,"text":"Figure 2.","entities":[],"relations":[],"Comments":[]} | |
{"id":759,"text":"References of MemoryProtection::HeapFree ","entities":[],"relations":[],"Comments":[]} | |
{"id":760,"text":"The main idea of this protection mechanism is to delay the freeing action so that the intruder is unable to determine when they can occupy the freed object using controlled data.","entities":[],"relations":[],"Comments":[]} | |
{"id":761,"text":"In this new patch, every time Internet Explorer tries to free an object, it is not freed immediately.","entities":[{"id":46346,"label":"SOFTWARE","start_offset":30,"end_offset":47}],"relations":[],"Comments":[]} | |
{"id":762,"text":"Instead, the block to be freed is marked and filled with 0x00 data and added to a pool.","entities":[],"relations":[],"Comments":[]} | |
{"id":763,"text":"When the size of the pool hits a predefined threshold, which is currently 100k (0x186A0 as highlighted in figure 3), it performs the real freeing operation (ReclaimUnmarkedBlocks). Figure 3.","entities":[],"relations":[],"Comments":[]} | |
{"id":764,"text":"C++ style pseudo code of ProtectedFree function ","entities":[],"relations":[],"Comments":[]} | |
{"id":765,"text":"Microsoft stores the to-be-freed blocks in a structure called st_ProtecFreeManageHeap.","entities":[{"id":44856,"label":"identity","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} | |
{"id":766,"text":"This structure is created in the function MemoryProtection::CMemoryProtector::ProtectCurrentThread and is used to manage deferred free heap blocks.","entities":[],"relations":[],"Comments":[]} | |
{"id":767,"text":"Figure 4 shows an example of the structure in memory.","entities":[],"relations":[],"Comments":[]} | |
{"id":768,"text":" Figure 4. st_ProtecFreeManageHeap Figure 5 provides an alternate view of the structure in a C style code block.","entities":[],"relations":[],"Comments":[]} | |
{"id":769,"text":" Figure 5. C style code of st_ProtecFreeManageHeap ","entities":[],"relations":[],"Comments":[]} | |
{"id":770,"text":"If we were able to make the size of the current heap block in this structure larger than the threshold of 0x186A0 bytes and trigger CMemoryProtector::ProtectedFree, it is still possible to force a true freeing action and occupy the freed object with other data as we show in the following piece of javascript code in figure 6. Figure 6. Javascript proof of concept to force freeing When creating the anchor element, the debug logs are shown in figure 7.","entities":[{"id":46347,"label":"SOFTWARE","start_offset":340,"end_offset":350}],"relations":[],"Comments":[]} | |
{"id":771,"text":"The address of the anchor element is 0x0c3b3f98.","entities":[],"relations":[],"Comments":[]} | |
{"id":772,"text":"Figure 7:","entities":[],"relations":[],"Comments":[]} | |
{"id":773,"text":"Before free We then manually decrease the reference number, so the CMemoryProtector::ProtectedFree function will fill the block with 0’s, but the object is still not freed.","entities":[],"relations":[],"Comments":[]} | |
{"id":774,"text":"Figure 8: decrease the reference number, not yet freed ","entities":[],"relations":[],"Comments":[]} | |
{"id":775,"text":"Finally we make the size of the CMemoryProtector::ProtectedFree management structure larger than 0x186a0 forcing the freeing operation.","entities":[],"relations":[],"Comments":[]} | |
{"id":776,"text":" Figure 9: field “TotalMemorySize” of st_ProtecFreeManageHeap is greater than threshold ","entities":[],"relations":[],"Comments":[]} | |
{"id":777,"text":"The anchor element is now actually freed as shown in figure 10.","entities":[],"relations":[],"Comments":[]} | |
{"id":778,"text":"Figure 10: object is in the free list now ","entities":[],"relations":[],"Comments":[]} | |
{"id":779,"text":"From a researchers' point of view, deferred free created a few problems, one of the major ones being that the page heap feature may not work correctly.","entities":[],"relations":[],"Comments":[]} | |
{"id":780,"text":"Page heap is a useful feature for debugging.","entities":[],"relations":[],"Comments":[]} | |
{"id":781,"text":"When page heap is turned on, the system allows only one object in one memory page.","entities":[],"relations":[],"Comments":[]} | |
{"id":782,"text":"Once this object is freed the whole page is marked as invalid.","entities":[],"relations":[],"Comments":[]} | |
{"id":783,"text":"So the next time IE tries to access a freed object an invalid address exception would be raised.","entities":[{"id":46348,"label":"SOFTWARE","start_offset":17,"end_offset":20}],"relations":[],"Comments":[]} | |
{"id":784,"text":"This mechanism is extremely helpful when researchers are trying to find use-after-free bugs.","entities":[],"relations":[],"Comments":[]} | |
{"id":785,"text":" With the introduction of the deferred free patch the object is no longer truly freed, so the page still exists.","entities":[],"relations":[],"Comments":[]} | |
{"id":786,"text":"In this situation the researcher is no longer able to determine whether a use-after-free behavior has occurred because no exception would be thrown out.","entities":[],"relations":[],"Comments":[]} | |
{"id":787,"text":"To reduce the impact of the deferred free patch, a research may consider patching the mshtml.dll in memory.","entities":[{"id":46349,"label":"FILEPATH","start_offset":86,"end_offset":96}],"relations":[],"Comments":[]} | |
{"id":788,"text":"For example, you can call MemoryProtection::CMemoryProtector::UnprotectProcess before you perform any fuzzing tasks.","entities":[{"id":46350,"label":"attack-pattern","start_offset":102,"end_offset":109}],"relations":[],"Comments":[]} | |
{"id":789,"text":" The recent patches and introduction of isolated heap and deferred free are strong signs that Microsoft plans to address the fundamentals of use-after-free exploitation in a preventative manner rather than to passively patch the vulnerabilities as they are discovered.","entities":[{"id":44857,"label":"identity","start_offset":94,"end_offset":103},{"id":44858,"label":"attack-pattern","start_offset":141,"end_offset":168}],"relations":[],"Comments":[]} | |
{"id":790,"text":"From the results of our research, applications of such methods can effectively stop unpatched use-after-free attacks.","entities":[{"id":46351,"label":"attack-pattern","start_offset":94,"end_offset":116}],"relations":[],"Comments":[]} | |
{"id":791,"text":"It can also make the exploitations of heap overflows or type confusion bugs significantly more difficult.","entities":[{"id":46353,"label":"attack-pattern","start_offset":21,"end_offset":52}],"relations":[],"Comments":[]} | |
{"id":792,"text":"But this is not the end.","entities":[],"relations":[],"Comments":[]} | |
{"id":793,"text":" For the foreseeable future, Microsoft may introduce more defensive mechanisms against use-after-free bugs or even heap fengshui to reduce the risk of being exploited.","entities":[{"id":46354,"label":"identity","start_offset":29,"end_offset":38}],"relations":[],"Comments":[]} | |
{"id":794,"text":"Could it be game over for use-after-free exploitation, or it is just the beginning of another cat and mouse game?","entities":[],"relations":[],"Comments":[]} | |
{"id":795,"text":"Time will tell.","entities":[],"relations":[],"Comments":[]} | |
{"id":796,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} | |
{"id":797,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} | |
{"id":798,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} | |
{"id":799,"text":"Today we’re releasing a new Unit 42 white paper titled “Credential-Based Attacks: Exposing the Ecosystem and Motives Behind Credential Phishing, Theft and Abuse.”","entities":[{"id":2601,"label":"identity","start_offset":28,"end_offset":35},{"id":2604,"label":"attack-pattern","start_offset":135,"end_offset":143}],"relations":[],"Comments":[]} | |
{"id":800,"text":"In this paper, we look at the problem of credential theft by exploring how it happens, what attackers do with credentials once they’ve stolen them, and what you can do to help prevent credential-based attacks.","entities":[{"id":46355,"label":"attack-pattern","start_offset":184,"end_offset":208}],"relations":[],"Comments":[]} | |
{"id":801,"text":" Credentials and authentication have become synonymous, with valid credentials allowing access to sensitive resources.","entities":[],"relations":[],"Comments":[]} | |
{"id":802,"text":"Adversaries are increasingly stealing and using credentials as part of their playbooks; impersonating legitimate users to access a company’s most sensitive information, erase data on servers, and reconfigure them so that they can’t boot; and undertake other malicious activities.","entities":[],"relations":[],"Comments":[]} | |
{"id":803,"text":"Stolen credentials underpin some of the most critical and damaging attacks out there; both Shamoon 2 and the Sofacy threat actor group, for example, have made detailed use of credential theft.","entities":[{"id":46358,"label":"attack-pattern","start_offset":175,"end_offset":191},{"id":46356,"label":"threat-actor","start_offset":109,"end_offset":134},{"id":46357,"label":"threat-actor","start_offset":91,"end_offset":100}],"relations":[{"id":182,"from_id":46357,"to_id":46358,"type":"uses"},{"id":183,"from_id":46356,"to_id":46358,"type":"uses"}],"Comments":[]} | |
{"id":804,"text":" Credential theft today can happen in many ways, but the most notable are through credential phishing and the use of malware like keyloggers (both staples of the Sofacy group), as well as password reuse.","entities":[{"id":44859,"label":"attack-pattern","start_offset":1,"end_offset":17},{"id":44860,"label":"attack-pattern","start_offset":82,"end_offset":101},{"id":44861,"label":"attack-pattern","start_offset":130,"end_offset":140},{"id":44862,"label":"threat-actor","start_offset":162,"end_offset":174},{"id":44863,"label":"attack-pattern","start_offset":188,"end_offset":202}],"relations":[{"id":33,"from_id":44862,"to_id":44863,"type":"uses"},{"id":34,"from_id":44862,"to_id":44861,"type":"uses"},{"id":35,"from_id":44862,"to_id":44860,"type":"uses"},{"id":36,"from_id":44862,"to_id":44859,"type":"uses"}],"Comments":[]} | |
{"id":805,"text":"The impact of a successful credential theft is, ultimately, access and authorization.","entities":[{"id":46359,"label":"attack-pattern","start_offset":27,"end_offset":43}],"relations":[],"Comments":[]} | |
{"id":806,"text":"Attackers will use credential theft for remote access to an organization, to access cloud-based resources (which may have weaker credential protections than network-based resources), or to move laterally within an organization once they’ve gained entry.","entities":[{"id":46360,"label":"attack-pattern","start_offset":19,"end_offset":35}],"relations":[],"Comments":[]} | |
{"id":807,"text":"The most sophisticated attacks can – and do – blend these actions together, sometimes using multiple stolen credentials to penetrate networks, move laterally within them, elevate privileges, and then access and steal data. Prevention of credential theft is too often overlooked.","entities":[{"id":46361,"label":"attack-pattern","start_offset":238,"end_offset":254},{"id":44864,"label":"attack-pattern","start_offset":101,"end_offset":119},{"id":44865,"label":"attack-pattern","start_offset":143,"end_offset":157},{"id":44866,"label":"attack-pattern","start_offset":171,"end_offset":188},{"id":44867,"label":"attack-pattern","start_offset":200,"end_offset":221}],"relations":[],"Comments":[]} | |
{"id":808,"text":"Organizations should continue with user education to help users better spot and not fall for phishing and spam attacks.","entities":[{"id":46362,"label":"attack-pattern","start_offset":93,"end_offset":118}],"relations":[],"Comments":[]} | |
{"id":809,"text":"You and your employees can also use password managers to make unique, complex passwords for each site not just a goal but a reality.","entities":[],"relations":[],"Comments":[]} | |
{"id":810,"text":"Technology is also catching up; recent advances in two-factor\/multi-factor authentication (2FA\/MFA) and one-time passwords (OTP) represent the best long-term approaches to preventing credential theft.","entities":[{"id":46363,"label":"attack-pattern","start_offset":183,"end_offset":199}],"relations":[],"Comments":[]} | |
{"id":811,"text":"(Our newest release, PAN-OS 8.0, also includes protections to significantly limit or eliminate password reuse.)","entities":[],"relations":[],"Comments":[]} | |
{"id":812,"text":"Get your copy of our white paper here.","entities":[],"relations":[],"Comments":[]} | |
{"id":813,"text":" Ignite '17 Security Conference: Vancouver, BC June 12–15, 2017 Ignite '17 Security Conference is a live, four-day conference designed for today’s security professionals.","entities":[{"id":46365,"label":"TIME","start_offset":47,"end_offset":63},{"id":46366,"label":"location","start_offset":33,"end_offset":46}],"relations":[],"Comments":[]} | |
{"id":814,"text":"Hear from innovators and experts, gain real-world skills through hands-on sessions and interactive workshops, and find out how breach prevention is changing the security industry.","entities":[],"relations":[],"Comments":[]} | |
{"id":815,"text":"Visit the Ignite website for more information on tracks, workshops and marquee sessions.","entities":[],"relations":[],"Comments":[]} | |
{"id":816,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} | |
{"id":817,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} | |
{"id":818,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} | |
{"id":819,"text":"This post is also available in: 日本語 (Japanese) In January 2020, during the first Patch Tuesday of the new year, Microsoft released patches for 17 new vulnerabilities including one for CVE-2020-0601 known as Curveball.","entities":[{"id":44869,"label":"TIME","start_offset":56,"end_offset":68},{"id":44870,"label":"identity","start_offset":118,"end_offset":127},{"id":44871,"label":"TIME","start_offset":93,"end_offset":100},{"id":44872,"label":"vulnerability","start_offset":190,"end_offset":203},{"id":44873,"label":"vulnerability","start_offset":213,"end_offset":222}],"relations":[],"Comments":[]} | |
{"id":820,"text":"The vulnerability exists in the Windows CryptoAPI (Crypt32.dll) and specifically relates to the method used for Elliptic Curve Cryptography (ECC) certificate validation.","entities":[{"id":46367,"label":"FILEPATH","start_offset":51,"end_offset":62},{"id":46368,"label":"SOFTWARE","start_offset":32,"end_offset":49}],"relations":[],"Comments":[]} | |
{"id":821,"text":"At the time of release, Microsoft affirmed that they had not yet seen the vulnerability exploited in the wild (ITW).","entities":[{"id":46369,"label":"identity","start_offset":24,"end_offset":33}],"relations":[],"Comments":[]} | |
{"id":822,"text":"Researcher Tal Be’ery released a blog titled “Win 10 Crypto Vulnerability: Cheating in Elliptic Curve Billiard 2” that does a fantastic job at explaining this bug.","entities":[{"id":2688,"label":"location","start_offset":136,"end_offset":139},{"id":46370,"label":"SOFTWARE","start_offset":46,"end_offset":52},{"id":44874,"label":"identity","start_offset":11,"end_offset":21}],"relations":[],"Comments":[]} | |
{"id":823,"text":" The patch provided by Microsoft included the typical release of operating system patches, but this time a new Application Programming Interface (API) function was added.","entities":[{"id":46371,"label":"SOFTWARE","start_offset":23,"end_offset":32}],"relations":[],"Comments":[]} | |
{"id":824,"text":"The new CveEventWrite function can be used to publish events when an attempt to exploit security vulnerabilities in user-mode applications occurs.","entities":[],"relations":[],"Comments":[]} | |
{"id":825,"text":"Analysts can collect alerts on the Application Message “CVE-2020-0601” as a means to hunt for attempted exploitation of this vulnerability on patched systems.","entities":[{"id":46372,"label":"vulnerability","start_offset":56,"end_offset":69}],"relations":[],"Comments":[]} | |
{"id":826,"text":" We also recommend users of the Chrome browser to update to version 79.0.3945.130 as they recently released an update to fix the TLS issue. Palo Alto Networks customers running Traps are now safeguarded from the Windows CryptoAPI Spoofing vulnerability, regardless of whether they are running an unpatched Microsoft Windows 10 system.","entities":[{"id":46376,"label":"SOFTWARE","start_offset":307,"end_offset":328},{"id":46375,"label":"SOFTWARE","start_offset":213,"end_offset":230},{"id":46373,"label":"SOFTWARE","start_offset":32,"end_offset":38},{"id":46374,"label":"identity","start_offset":141,"end_offset":159}],"relations":[],"Comments":[]} | |
{"id":827,"text":"Additionally, Palo Alto Networks offers multiple, additional complementary protections:","entities":[{"id":46377,"label":"identity","start_offset":14,"end_offset":32}],"relations":[],"Comments":[]} | |
{"id":828,"text":"As a member of the Microsoft Active Protections Program (MAPP) program, Palo Alto Networks received early details of the vulnerability, providing greater understanding of the threat, which helps us implement strong product coverage.","entities":[{"id":46378,"label":"identity","start_offset":19,"end_offset":62},{"id":44876,"label":"identity","start_offset":72,"end_offset":90}],"relations":[],"Comments":[]} | |
{"id":829,"text":"As always, we recommend keeping your Microsoft products up to date with the latest patches to mitigate this vulnerability.","entities":[{"id":46379,"label":"identity","start_offset":37,"end_offset":46}],"relations":[],"Comments":[]} | |
{"id":830,"text":" Palo Alto Networks will update this Threat Brief with new information and recommendations as they become available. CVE-2020-0601: The ChainOfFools\/CurveBall Attack Explained POC Win10 Crypto Vulnerability: Cheating in Elliptic Curve Billiards 2 NSA Cybersecurity Advisory Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[{"id":46383,"label":"identity","start_offset":250,"end_offset":253},{"id":46384,"label":"vulnerability","start_offset":137,"end_offset":149},{"id":46381,"label":"vulnerability","start_offset":118,"end_offset":131},{"id":46382,"label":"SOFTWARE","start_offset":182,"end_offset":187},{"id":46380,"label":"identity","start_offset":1,"end_offset":19},{"id":46385,"label":"vulnerability","start_offset":150,"end_offset":159}],"relations":[],"Comments":[]} | |
{"id":831,"text":"Please mark, I'm not a robot! ","entities":[],"relations":[],"Comments":[]} | |
{"id":832,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} | |
{"id":833,"text":"In the months since the WanaCrypt0r\/WannaCry and the Petya\/NotPetya attacks, security researchers have delved into the nuts and bolts these incidents and the malware involved.","entities":[{"id":2720,"label":"malware","start_offset":36,"end_offset":44},{"id":2722,"label":"malware","start_offset":53,"end_offset":58},{"id":2723,"label":"malware","start_offset":59,"end_offset":67},{"id":2719,"label":"malware","start_offset":24,"end_offset":35}],"relations":[],"Comments":[]} | |
{"id":834,"text":" One key thing that research into these security incidents shows is that these attacks used a relatively new and unknown technique called kernel APC attacks as part of their toolkit.","entities":[{"id":44878,"label":"attack-pattern","start_offset":138,"end_offset":156}],"relations":[],"Comments":[]} | |
{"id":835,"text":" Kernel APC attacks occur in a way that increases the “stealth” factor and makes standard detection and prevention very difficult.","entities":[{"id":46386,"label":"attack-pattern","start_offset":1,"end_offset":19}],"relations":[],"Comments":[]} | |
{"id":836,"text":"And kernel APC attacks do this while still maximizing the power and control that the code has on the target system.","entities":[{"id":46387,"label":"attack-pattern","start_offset":3,"end_offset":22}],"relations":[],"Comments":[]} | |
{"id":837,"text":" While kernel APC attacks aren’t well known and can be hard to understand, their proven success in WanaCrypt0r\/WannaCry and the Petya\/NotPetya make them an important threat to understand because proven attack techniques are quickly adopted widely.","entities":[{"id":2746,"label":"malware","start_offset":128,"end_offset":133},{"id":44880,"label":"attack-pattern","start_offset":7,"end_offset":25},{"id":44881,"label":"malware","start_offset":99,"end_offset":110},{"id":44882,"label":"malware","start_offset":111,"end_offset":119},{"id":44884,"label":"malware","start_offset":134,"end_offset":142}],"relations":[{"id":185,"from_id":44882,"to_id":44880,"type":"uses"},{"id":186,"from_id":2746,"to_id":44880,"type":"uses"},{"id":184,"from_id":44881,"to_id":44880,"type":"uses"},{"id":187,"from_id":44884,"to_id":44880,"type":"uses"}],"Comments":[]} | |
{"id":838,"text":"And understanding is a first step to prevention.","entities":[],"relations":[],"Comments":[]} | |
{"id":839,"text":" To understand what makes kernel APC attacks so dangerous, it’s important to understand what they are. The kernel is the heart of the operating system.","entities":[{"id":46388,"label":"attack-pattern","start_offset":26,"end_offset":44}],"relations":[],"Comments":[]} | |
{"id":840,"text":"When talking about operating systems with security permissions and controls like Windows or UNIX\/Linux, the kernel operates with the highest level of control.","entities":[{"id":46392,"label":"SOFTWARE","start_offset":97,"end_offset":102},{"id":46391,"label":"SOFTWARE","start_offset":92,"end_offset":96},{"id":44885,"label":"SOFTWARE","start_offset":81,"end_offset":88}],"relations":[],"Comments":[]} | |
{"id":841,"text":"Because of this, attacks against the kernel are used to gain complete control over a system, generally as part of an “elevation or privilege” (EoP) or “privilege escalation” attack.","entities":[{"id":2756,"label":"attack-pattern","start_offset":152,"end_offset":172},{"id":46393,"label":"attack-pattern","start_offset":118,"end_offset":140}],"relations":[],"Comments":[]} | |
{"id":842,"text":"Typically, attacks against the kernel are used in conjunction with code execution attacks so that an attacker can target a limited privilege user but ultimately gain full control over the system.","entities":[],"relations":[],"Comments":[]} | |
{"id":843,"text":" Privilege escalation attacks against the kernel have been around for some time and are well-known and can be well protected against. Kernel APC attacks however are a different class of attack.","entities":[{"id":2760,"label":"attack-pattern","start_offset":1,"end_offset":21},{"id":44889,"label":"attack-pattern","start_offset":135,"end_offset":153}],"relations":[],"Comments":[]} | |
{"id":844,"text":"These don’t attack the kernel to gain privileges.","entities":[],"relations":[],"Comments":[]} | |
{"id":845,"text":"Instead kernel APC attacks already have kernel privileges and use them to further carry out their attack.","entities":[{"id":46394,"label":"attack-pattern","start_offset":8,"end_offset":26}],"relations":[],"Comments":[]} | |
{"id":846,"text":"In this case by making legitimate programs execute malicious code rather than their own legitimate code.","entities":[{"id":44890,"label":"attack-pattern","start_offset":43,"end_offset":65}],"relations":[],"Comments":[]} | |
{"id":847,"text":" Kernel APC attacks do this using their control over the kernel to redirect APCs: “Asynchronous Procedure Calls”.","entities":[{"id":46395,"label":"attack-pattern","start_offset":1,"end_offset":19}],"relations":[],"Comments":[]} | |
{"id":848,"text":"APCs can basically be thought of as places in line for the CPU that the kernel gives access to.","entities":[],"relations":[],"Comments":[]} | |
{"id":849,"text":"In a kernel APC attack, the attacker gives a legitimate program’s place in line to the attacker’s code.","entities":[{"id":44891,"label":"attack-pattern","start_offset":5,"end_offset":22}],"relations":[],"Comments":[]} | |
{"id":850,"text":" The crux of what makes this attack technique so important is how the technique uses this level of control to have legitimate programs run illegitimate commands.","entities":[],"relations":[],"Comments":[]} | |
{"id":851,"text":"It’s easier to detect and prevent illegitimate programs (malware) from executing commands.","entities":[],"relations":[],"Comments":[]} | |
{"id":852,"text":"But when legitimate programs execute illegitimate commands, it’s harder to detect and prevent: it’s not always clear whether a command is legitimate or not, and interfering with commands from legitimate programs can have significant (sometimes catastrophic) unintended consequences.","entities":[],"relations":[],"Comments":[]} | |
{"id":853,"text":"And finally because of ways that kernel APC attacks are carried out, it doesn’t leave the usual fingerprints you find after an attack making detection harder still.","entities":[],"relations":[],"Comments":[]} | |
{"id":854,"text":" Taken altogether, these make kernel APC attacks an effective and sophisticated technique.","entities":[{"id":46396,"label":"attack-pattern","start_offset":30,"end_offset":48}],"relations":[],"Comments":[]} | |
{"id":855,"text":"And while this technique alone isn’t solely responsible for the damaging power of WanaCrypt0r\/WannaCry and Petya\/NotPetya it is certainly an important contributing factor.","entities":[{"id":2781,"label":"malware","start_offset":82,"end_offset":93},{"id":2784,"label":"malware","start_offset":107,"end_offset":112},{"id":44893,"label":"malware","start_offset":94,"end_offset":102},{"id":44895,"label":"malware","start_offset":113,"end_offset":121}],"relations":[],"Comments":[]} | |
{"id":856,"text":" Perhaps more importantly, it’s a piece of those attacks that has escaped relative notice outside of some specialized parts of the research community.","entities":[],"relations":[],"Comments":[]} | |
{"id":857,"text":" New effective attack techniques that escape notice are always inviting for other copycat attackers.","entities":[],"relations":[],"Comments":[]} | |
{"id":858,"text":"A good way to defend against this is to understand and be aware of the thread: forewarned is forearmed.","entities":[],"relations":[],"Comments":[]} | |
{"id":859,"text":" If you want a more detailed understanding of kernel APC attacks as they occurred in WanaCrypt0r\/WannaCry, two good resources are Microsoft’s MMPC blog “WannaCrypt ransomware worm targets out-of-date systems” and Countercept’s “DOUBLEPULSAR Usermode Analysis: Generic Reflective DLL Loader”.","entities":[{"id":2796,"label":"identity","start_offset":130,"end_offset":139},{"id":2800,"label":"malware","start_offset":228,"end_offset":240},{"id":2791,"label":"malware","start_offset":85,"end_offset":96},{"id":2792,"label":"malware","start_offset":97,"end_offset":105},{"id":46397,"label":"malware","start_offset":153,"end_offset":163}],"relations":[],"Comments":[]} | |
{"id":860,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} | |
{"id":861,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} | |
{"id":862,"text":"In recent years, ransomware families are often glamorized as being some of the most dangerous types of malware.","entities":[],"relations":[],"Comments":[]} | |
{"id":863,"text":"They’ve certainly caused a wealth of damage to end users with some of the more prominent malware families, such as CryptoLocker, CryptoWall, TorrentLocker, and TeslaCrypt infecting millions of users overall.","entities":[{"id":46398,"label":"malware","start_offset":160,"end_offset":170},{"id":46399,"label":"malware","start_offset":141,"end_offset":154},{"id":46400,"label":"malware","start_offset":129,"end_offset":139},{"id":46401,"label":"malware","start_offset":115,"end_offset":128}],"relations":[],"Comments":[]} | |
{"id":864,"text":" For readers that might be unfamiliar with ransomware, it’s a type of malware that is responsible for encrypting a user’s files with a key known only to the attackers.","entities":[],"relations":[],"Comments":[]} | |
{"id":865,"text":"Examples of files that might be encrypted include financial documents, home movies, photos, or business-related files.","entities":[],"relations":[],"Comments":[]} | |
{"id":866,"text":"In order to decrypt these files, the victim must provide a ransom, or payment, to the attacker, often in the form of a digital currency.","entities":[],"relations":[],"Comments":[]} | |
{"id":867,"text":"While ransomware is often thought to be bullet-proof, it is certainly not always the case.","entities":[],"relations":[],"Comments":[]} | |
{"id":868,"text":"In early 2015, Emnisoft identified a new family of malware named PClock.","entities":[{"id":46402,"label":"identity","start_offset":15,"end_offset":23},{"id":46405,"label":"TIME","start_offset":3,"end_offset":13},{"id":46403,"label":"malware","start_offset":65,"end_offset":71}],"relations":[],"Comments":[]} | |
{"id":869,"text":"At the time, the malware was riddled with issues, specifically in the way it encrypted files.","entities":[],"relations":[],"Comments":[]} | |
{"id":870,"text":"It used a simple XOR encryption routine with a static key, allowing victims to easily recover their files without paying a ransom.","entities":[],"relations":[],"Comments":[]} | |
{"id":871,"text":" In August, we started detecting updated copies of PClock, which has been improved upon by the malware author.","entities":[{"id":46406,"label":"TIME","start_offset":4,"end_offset":10},{"id":46407,"label":"malware","start_offset":51,"end_offset":57}],"relations":[],"Comments":[]} | |
{"id":872,"text":"We set out to determine if this updated version of PClock holds up to some of the more prominent families.","entities":[{"id":46408,"label":"malware","start_offset":51,"end_offset":57}],"relations":[],"Comments":[]} | |
{"id":873,"text":"For the sake of clarity, I will refer to this newer version of PClock as PClock2 going forward.","entities":[{"id":44897,"label":"malware","start_offset":73,"end_offset":80},{"id":44896,"label":"malware","start_offset":63,"end_offset":69}],"relations":[],"Comments":[]} | |
{"id":874,"text":" The following sample is used for analysis: Figure 1.","entities":[],"relations":[],"Comments":[]} | |
{"id":875,"text":"PClock2","entities":[{"id":46409,"label":"malware","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} | |
{"id":876,"text":"analysis sample PClock2 is written in Visual Basic.","entities":[{"id":46410,"label":"SOFTWARE","start_offset":39,"end_offset":51},{"id":44898,"label":"malware","start_offset":17,"end_offset":24}],"relations":[{"id":188,"from_id":44898,"to_id":46410,"type":"uses"}],"Comments":[]} | |
{"id":877,"text":"For a copy of this file’s IDA Pro database (idb), please refer here.","entities":[{"id":46411,"label":"SOFTWARE","start_offset":26,"end_offset":33}],"relations":[],"Comments":[]} | |
{"id":878,"text":" When initially executed, PClock2 performs a very simple anti-analysis check where it will sleep for a random amount of time and compare the time spent sleeping against a set value.","entities":[{"id":46412,"label":"malware","start_offset":26,"end_offset":33}],"relations":[],"Comments":[]} | |
{"id":879,"text":"This check is essentially looking for sandbox systems where the sleep function accelerates analysis.","entities":[],"relations":[],"Comments":[]} | |
{"id":880,"text":" Figure 2. Check by PClock2 for hooking of sleep function A simple check is performed to determine if the malware is running with administrative privileges.","entities":[{"id":46413,"label":"malware","start_offset":20,"end_offset":27},{"id":46414,"label":"attack-pattern","start_offset":32,"end_offset":39}],"relations":[],"Comments":[]} | |
{"id":881,"text":"Once completed, the malware sends the result via an HTTP POST request to a remote server.","entities":[],"relations":[],"Comments":[]} | |
{"id":882,"text":"All data sent via HTTP POST requests is sent in the clear.","entities":[],"relations":[],"Comments":[]} | |
{"id":883,"text":"Figure 3. HTTP POST request containing administrative privileges ","entities":[],"relations":[],"Comments":[]} | |
{"id":884,"text":"The ‘P0’ is statically set by the malware in the above request.","entities":[],"relations":[],"Comments":[]} | |
{"id":885,"text":"The ‘1828’ represents the thread ID (TID) of the malware, while the ‘rnd’ GET variable is randomly generated.","entities":[],"relations":[],"Comments":[]} | |
{"id":886,"text":" Throughout the runtime of PClock2, it makes multiple HTTP POST requests to a remote server using the same characteristics, including the ‘PO[TID]’ and the current time.","entities":[{"id":46416,"label":"malware","start_offset":27,"end_offset":34}],"relations":[],"Comments":[]} | |
{"id":887,"text":"Additionally, the user-agent used by the entire PClock family, including PClock2, is consistent across samples.","entities":[{"id":46417,"label":"malware","start_offset":48,"end_offset":54},{"id":46418,"label":"malware","start_offset":73,"end_offset":80}],"relations":[],"Comments":[]} | |
{"id":888,"text":" PClock2 proceeds to copy itself with the name “winjab.exe” in the following path.","entities":[{"id":44900,"label":"FILEPATH","start_offset":48,"end_offset":58},{"id":44899,"label":"malware","start_offset":1,"end_offset":8}],"relations":[],"Comments":[]} | |
{"id":889,"text":"While this particular sample is seen installing itself to the %ALLUSERSPROFILE% path, other samples have been witnessed using %APPDATA% instead.","entities":[{"id":46419,"label":"FILEPATH","start_offset":62,"end_offset":79},{"id":46420,"label":"FILEPATH","start_offset":126,"end_offset":135}],"relations":[],"Comments":[]} | |
{"id":890,"text":" PClock2 also enables persistence by setting the following registry key.","entities":[{"id":46421,"label":"malware","start_offset":1,"end_offset":8}],"relations":[],"Comments":[]} | |
{"id":891,"text":"All instances of the entire PClock family have been found to use this particular registry key.","entities":[{"id":44901,"label":"malware","start_offset":28,"end_offset":34}],"relations":[],"Comments":[]} | |
{"id":892,"text":" After installation is complete, the malware makes another HTTP POST containing the various file paths it used.","entities":[],"relations":[],"Comments":[]} | |
{"id":893,"text":" Figure 4. HTTP POST request containing file paths of malware After installation, PClock2 will also set the following registry key with a value of ‘INSTALL_OK’.","entities":[{"id":46422,"label":"malware","start_offset":83,"end_offset":90}],"relations":[],"Comments":[]} | |
{"id":894,"text":" This particular registry key is used to hold the latest state of the malware.","entities":[],"relations":[],"Comments":[]} | |
{"id":895,"text":"Other messages that might be present in this key include the following.","entities":[],"relations":[],"Comments":[]} | |
{"id":896,"text":" The following registry keys are also used within the CLOCK sub-path by PClock2: PClock2 proceeds to use the API from blockchain.info to generate a unique Bitcoin (BTC) wallet identifier, which is configured to automatically forward payments to a hardcoded wallet identifier of ‘1MRfkK134ErfbcadUSoSUCBahngCqoBKju’.","entities":[{"id":46423,"label":"malware","start_offset":72,"end_offset":79},{"id":46424,"label":"malware","start_offset":82,"end_offset":89},{"id":46425,"label":"DOMAIN","start_offset":119,"end_offset":134}],"relations":[],"Comments":[]} | |
{"id":897,"text":"The following HTTPS request accomplishes this.","entities":[],"relations":[],"Comments":[]} | |
{"id":898,"text":" PClock2 will also make a request to the following blockchain.info address to determine the current value of BTC.","entities":[{"id":46427,"label":"DOMAIN","start_offset":51,"end_offset":66},{"id":46426,"label":"malware","start_offset":1,"end_offset":8}],"relations":[],"Comments":[]} | |
{"id":899,"text":"This information is stored in the ‘\\BData\\B’ registry key as previously stated.","entities":[{"id":46428,"label":"REGISTRYKEY","start_offset":35,"end_offset":43}],"relations":[],"Comments":[]} | |
{"id":900,"text":" The malware proceeds to generate a unique key that will be used in subsequent file encryption using the following data: This data is concatenated to form a string similar to the following: Figure 5.","entities":[],"relations":[],"Comments":[]} | |
{"id":901,"text":"Data collected to be used in formation of unique key This data is then hashed using the SHA256 algorithm to generate a unique key.","entities":[],"relations":[],"Comments":[]} | |
{"id":902,"text":"This key is stored in the ‘\\CData\\C’ registry key as previously stated.","entities":[{"id":46429,"label":"REGISTRYKEY","start_offset":27,"end_offset":35}],"relations":[],"Comments":[]} | |
{"id":903,"text":"This key is also sent via a HTTP POST request.","entities":[],"relations":[],"Comments":[]} | |
{"id":904,"text":"Figure 6.","entities":[],"relations":[],"Comments":[]} | |
{"id":905,"text":"HTTP POST request containing unique SHA256 key PClock2 scans the file system of the victim in order to identify files that are to be encrypted.","entities":[],"relations":[],"Comments":[]} | |
{"id":906,"text":"The following paths are ignored: Additionally, for a list of targeted file types, please see the following link.","entities":[],"relations":[],"Comments":[]} | |
{"id":907,"text":" Once files are identified, PClock will begin encrypting them, one-by-one.","entities":[{"id":46430,"label":"malware","start_offset":28,"end_offset":34}],"relations":[],"Comments":[]} | |
{"id":908,"text":"Unlike the original version of PClock, this variant has forgone the simple XOR encryption routine in place of using RC4.","entities":[{"id":46431,"label":"malware","start_offset":31,"end_offset":37}],"relations":[],"Comments":[]} | |
{"id":909,"text":"The RC4 key is generated by concatenating the SHA256 value previously generated with the path to the file being encrypted.","entities":[],"relations":[],"Comments":[]} | |
{"id":910,"text":"250dd811187959220220574a185ccf669e06c0ee3926773a7cb94750c401812cC:\\Documents and Settings\\Administrator\\Desktop\\Form1.cs ","entities":[{"id":2878,"label":"SHA1","start_offset":0,"end_offset":76},{"id":46432,"label":"FILEPATH","start_offset":81,"end_offset":121}],"relations":[],"Comments":[]} | |
{"id":911,"text":"It should be noted that PClock takes a very long time to encrypt these files.","entities":[{"id":46433,"label":"malware","start_offset":24,"end_offset":30}],"relations":[],"Comments":[]} | |
{"id":912,"text":"On a test sandbox, the malware took upwards of 20 minutes to complete encryption, which is less than ideal for an attacker as it gives the victim time to notice the infection and stop it.","entities":[{"id":46434,"label":"TIME","start_offset":36,"end_offset":57}],"relations":[],"Comments":[]} | |
{"id":913,"text":"By comparison, the latest version of the CryptoWall malware family takes roughly 1-3 minutes to complete its encryption routine.","entities":[{"id":2888,"label":"malware","start_offset":41,"end_offset":51},{"id":2889,"label":"TIME","start_offset":73,"end_offset":92}],"relations":[],"Comments":[]} | |
{"id":914,"text":" It’s also interesting to note that each time PClock2 scans a directory or encrypts a file, it makes an HTTP POST request to the C2 server.","entities":[{"id":46436,"label":"Infrastucture","start_offset":129,"end_offset":138},{"id":46435,"label":"malware","start_offset":46,"end_offset":53}],"relations":[{"id":189,"from_id":46435,"to_id":46436,"type":"beacons-to"}],"Comments":[]} | |
{"id":915,"text":" Figure 7. HTTP POST request indicating a folder is being scanned This resulted in over 1,000 requests being made on a sandbox machine, which contained little data of interest.","entities":[],"relations":[],"Comments":[]} | |
{"id":916,"text":" After it finished the encryption routine, PClock2 generates a VBScript file in the following directory:","entities":[{"id":46437,"label":"malware","start_offset":43,"end_offset":50},{"id":46438,"label":"SOFTWARE","start_offset":63,"end_offset":71}],"relations":[],"Comments":[]} | |
{"id":917,"text":" This script file contains the following commands, which will delete shadow copies on the Windows operating system.","entities":[{"id":46439,"label":"SOFTWARE","start_offset":90,"end_offset":114}],"relations":[],"Comments":[]} | |
{"id":918,"text":" Set UAC = CreateObject(\"Shell.Application\") UAC.ShellExecute \"vssadmin\", \"Delete Shadows \/All \/Quiet\", \"\", \"runas\", 1 On Windows XP, the following dialog box appears to the victim when this script runs, making it fairly apparent that something suspicious is occurring: Figure 8.","entities":[{"id":46440,"label":"SOFTWARE","start_offset":123,"end_offset":133}],"relations":[],"Comments":[]} | |
{"id":919,"text":"Dialog box that appears to victim when VBS attempts to run ","entities":[],"relations":[],"Comments":[]} | |
{"id":920,"text":"After running the clean up script the malware overwrites the ‘\\CData\\C’ registry key with a value of zero, which removes the unique SHA256 key.","entities":[{"id":46441,"label":"REGISTRYKEY","start_offset":62,"end_offset":70}],"relations":[],"Comments":[]} | |
{"id":921,"text":"Finally, the malware changes the victim’s wallpaper and generates a GUI instructing the victim how they can provide payment and retrieve their files.","entities":[],"relations":[],"Comments":[]} | |
{"id":922,"text":"This dialogue mimics the more-capable “CryptoLocker” malware family and provides instructions in both English and Spanish.","entities":[{"id":2904,"label":"malware","start_offset":39,"end_offset":51}],"relations":[],"Comments":[]} | |
{"id":923,"text":"Figure 9.","entities":[],"relations":[],"Comments":[]} | |
{"id":924,"text":"Ransom demand ","entities":[],"relations":[],"Comments":[]} | |
{"id":925,"text":"I originally wished to determine if the new version of PClock, PClock 2, included enough improvements to compete with some of the larger ransomware malware families, such as CryptoWall, TeslaCrypt, or TorrentLocker.","entities":[{"id":2911,"label":"malware","start_offset":174,"end_offset":184},{"id":2913,"label":"malware","start_offset":201,"end_offset":214},{"id":46442,"label":"malware","start_offset":186,"end_offset":196},{"id":46446,"label":"malware","start_offset":63,"end_offset":71},{"id":46447,"label":"malware","start_offset":55,"end_offset":61}],"relations":[],"Comments":[]} | |
{"id":926,"text":"In truth, this version has made a number of improvements, such as adding more file types to target, ignoring certain directories, and using a better encryption routine.","entities":[],"relations":[],"Comments":[]} | |
{"id":927,"text":" However, a number of strong issues still plague this malware family, such as the following: While this version is an improvement, it still lacks many of the features and stealth that are currently present in the larger ransomware families.","entities":[],"relations":[],"Comments":[]} | |
{"id":928,"text":"While ransomware is a large problem for users, it’s important to realize that not all malware families are created equal.","entities":[],"relations":[],"Comments":[]} | |
{"id":929,"text":"Like most things in life, malware comes in many shapes and forms, from the more elegant and robust solutions, to those that come up lacking.","entities":[],"relations":[],"Comments":[]} | |
{"id":930,"text":" All PClock malware family samples are properly classified as malicious by WildFire.","entities":[{"id":44902,"label":"malware","start_offset":5,"end_offset":11},{"id":44903,"label":"identity","start_offset":75,"end_offset":83}],"relations":[],"Comments":[]} | |
{"id":931,"text":"AutoFocus users can find more information on samples and indicators related to this attack by viewing the PClock tag.","entities":[{"id":46448,"label":"malware","start_offset":106,"end_offset":112}],"relations":[],"Comments":[]} |