- Perimeter Security Is at the Forefront of Industry 4.0 Revolution
- Black Friday sales just slashed the Apple Watch SE (2nd Gen) to its lowest price ever
- Get an Apple Watch Series 10 for $70 off for the first time ahead of Black Friday
- The 15 best Black Friday Target deals 2024
- This fantastic 2-in-1 laptop I tested is highly recommended for office workers (and it's on sale)
Anomali Cyber Watch: CloudWizard Targets Both Sides in Ukraine, Camaro Dragon Trojanized TP-Link Firmware, RA Group Ransomware Copied Babuk
The various threat intelligence stories in this iteration of the Anomali Cyber Watch discuss the following topics: APT, China, Data leak, Infostealers, Package-name typosquatting, Phishing, and Ukraine. The IOCs related to these stories are attached to Anomali Cyber Watch and can be used to check your logs for potential malicious activity.
Figure 1 – IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed.
Trending Cyber News and Threat Intelligence
CloudWizard APT: the Bad Magic Story Goes on
(published: May 19, 2023)
A newly-discovered modular malware framework dubbed CloudWizard has been active since 2016. Kaspersky researchers were able to connect it to previously-recorded advanced persistent threat activities: Operation Groundbait and the Prikormka malware (2008-2016), Operation BugDrop (2017), PowerMagic (2020-2022) and CommonMagic (2022). Similar to these previous campaigns, CloudWizard targets individuals, diplomatic organizations, and research organizations in the Donetsk, Lugansk, Crimea, Central and Western Ukraine regions. CloudWizard’s two main modules perform encryption and decryption of all communications and relay the encrypted data to the cloud or web-based C2. Additional modules enable taking screenshots, microphone recording, keylogging and more.
Analyst Comment: Earlier, ESET researchers concluded that the actors behind Operation Groundbait most likely operate from within Ukraine, but Kaspersky researchers did not share if they agree with this attribution. Wars and military conflicts attract additional cyber activity. All known CloudWizard indicators are available in the Anomali platform and customers are advised to block these on their infrastructure.
MITRE ATT&CK: [MITRE ATT&CK] T1027 – Obfuscated Files Or Information | [MITRE ATT&CK] T1140 – Deobfuscate/Decode Files Or Information | [MITRE ATT&CK] T1555 – Credentials From Password Stores | [MITRE ATT&CK] T1056.001 – Input Capture: Keylogging | [MITRE ATT&CK] T1573 – Encrypted Channel
Tags: actor:CloudWizard, APT, target-country:Ukraine, target-region:Donetsk, target-region:Lugansk, target-region:Crimea, target-region:central Ukraine, target-region:western Ukraine, campaign:Operation BugDrop, campaign:Operation Groundbait, malware:Prikormka, malware:CloudWizard, malware:PowerMagic, malware:CommonMagic, target-industry:Diplomatic, target-industry:Research, abused:OneDrive, file-type:DLL, file-type:VFS, file-type:LRC, target-system:Windows
CapCut Users Under Fire
(published: May 19, 2023)
Several campaigns are targeting users of the CapCut video editing software with typosquatted websites. Users in jurisdictions where this popular product of ByteDance is banned (Taiwan, India, and several other countries) are especially vulnerable. One campaign profiled by Cyble researchers delivers the Offx stealer. Another campaign delivers BatLoader eventually leading to RedLine Stealer and an Antimalware Scan Interface (AMSI) bypass tool. It had not been detected by any antivirus engine at the time of discovery.
Analyst Comment: Users should avoid downloading pirated software from unofficial websites. All known indicators associated with this CapCut-impersonating campaign are available in the Anomali platform and customers are advised to block these on their infrastructure.
MITRE ATT&CK: [MITRE ATT&CK] T1566 – Phishing | [MITRE ATT&CK] T1059.001: PowerShell | [MITRE ATT&CK] T1204 – User Execution | [MITRE ATT&CK] T1027 – Obfuscated Files Or Information | [MITRE ATT&CK] T1555 – Credentials From Password Stores | [MITRE ATT&CK] T1539 – Steal Web Session Cookie | [MITRE ATT&CK] T1552 – Unsecured Credentials | [MITRE ATT&CK] T1528 – Steal Application Access Token | [MITRE ATT&CK] T1113 – Screen Capture | [MITRE ATT&CK] T1486: Data Encrypted for Impact | [MITRE ATT&CK] T1490: Inhibit System Recovery | [MITRE ATT&CK] T1095 – Non-Application Layer Protocol | [MITRE ATT&CK] T1071 – Application Layer Protocol | [MITRE ATT&CK] T1567 – Exfiltration Over Web Service | [MITRE ATT&CK] T1041 – Exfiltration Over C2 Channel | [MITRE ATT&CK] T1562.001: Disable or Modify Tools
Tags: malware:Offx, malware-type:Infostealer, malware:BatLoader, malware-type:Loader, malware:RedLine, impersonated:CapCut, targeted:CapCut Users, technique:Phishing, target-country:Taiwan, target-country:India, malware-type:Infostealer, file-type:EXE, file-type:BAT, abused:PowerShell, target-system:Windows
RATs Found Hiding in the npm Attic
(published: May 18, 2023)
Malicious packages at the npm public repository were staying undetected for up to two months. The attackers used name typosquatting and impersonation of popular, legitimate packages, used their code, and included links to the legitimate GitHub repositories. ReversingLabs researchers determined that this campaign was aiming at delivering a modified version of the open-source TurkoRat infostealer. It was used to steal user information and crypto wallets.
Analyst Comment: Development organizations should take steps to avoid typing mistakes for dependencies, scrutinize the features and behaviors of the code they are relying on. Organizations should pay attention to suspicious combinations of code behavior such as discrepancies in naming, executing commands, hard-coded IP addresses, smaller than expected downloads, suspicious versioning, and writing data to files. Indicators associated with this TurkoRat campaigns are available in the Anomali platform for ongoing infections and historical reference.
MITRE ATT&CK: [MITRE ATT&CK] T1195.002 – Supply Chain Compromise: Compromise Software Supply Chain | [MITRE ATT&CK] T1036.005 – Masquerading: Match Legitimate Name Or Location | [MITRE ATT&CK] T1036 – Masquerading | [MITRE ATT&CK] T1555 – Credentials From Password Stores
Tags: malware:TurkoRat, malware-type:Infostealer, malware-type:Clipper, abused:npm, technique:Supply chain, technique:Package name typosquatting, actor:AliTefeli02, file-type:JS, file-type:EXE, target-industry:Software Publishers, target-industry:Cryptocurrency, target-system:Windows
China-Taiwan Tensions Spark Surge in Cyberattacks on Taiwan
(published: May 17, 2023)
In April 2023, rising geopolitical tensions between China and Taiwan resulted in an increase in cyber-attacks towards Taiwan, with malicious emails and phishing URLs. PlugX and other malware detections were identified by Trellix researchers. The malicious emails targeted various industries, with the most impacted industries being networking/IT, manufacturing, and logistics. The phishing URLs were found to be generic login pages, targeted company-specific pages, and multi-brand login pages, with the goal of harvesting credentials. Three days after the phishing email volume peaked, the PlugX RAT detections spiked, with sightings of other malware families such as Formbook, Kryptik, and Zmutzy.
Analyst Comment: All employees should be educated on the risks of phishing, specifically, how to identify such attempts and whom to contact if a phishing attack is identified. Unwarranted emails that request that the recipient follow a link and enter the credentials can be indicative of a phishing attack. Host-based indicators associated with this campaign are available in the Anomali platform and customers are advised to block these on their infrastructure.
MITRE ATT&CK: [MITRE ATT&CK] T1566.002 – Phishing: Spearphishing Link | [MITRE ATT&CK] T1078 – Valid Accounts | [MITRE ATT&CK] T1574.002 – Hijack Execution Flow: Dll Side-Loading | [MITRE ATT&CK] T1056.001 – Input Capture: Keylogging | [MITRE ATT&CK] T1113 – Screen Capture
Tags: malware:PlugX, detection:BackDoor-PlugX, detection:Trojan:Win32/Korplug, malware:Kryptik, malware:Zmutzy, detection:Trojan-AutoIt, malware:Formbook, target-industry:Networking, target-industry:Manufacturing, target-country:Taiwan, target-industry:Logistics, file-type:ISO, file-type:DLL, target-system:Windows
The Dragon Who Sold His Camaro: Analyzing Custom Router Implant
(published: May 16, 2023)
Check Point researchers have recently discovered a malicious firmware implant tailored for TP-Link routers. This implant is associated with a China-sponsored group known as Camaro Dragon, and is similar to previously-reported activities conducted by the Mustang Panda group. The actors trojanized TP-Link firmware images by modifying two files and adding four files to the altered router firmware. The implant contains several malicious components, including a custom backdoor, dubbed Horse Shell, that enables remote shell, file transfer, and network tunneling, making it easier for them to anonymize their communication through a chain of infected nodes.
Analyst Comment: While the exact intrusion technique is not known, it is important to keep your network devices patched to the latest security update. Indicators associated with this campaign and the HorseShell implant-detecting YARA rule provided by Check Point are available in the Anomali platform.
MITRE ATT&CK: [MITRE ATT&CK] T1005: Data from Local System | [MITRE ATT&CK] T1090 – Proxy | [MITRE ATT&CK] Picus: The System Information Discovery Technique Explained – MITRE ATT&CK T1082 | [MITRE ATT&CK] T1016 – System Network Configuration Discovery | [MITRE ATT&CK] T1573 – Encrypted Channel
Signatures: CamaroDragon’s HorseShell implant – YARA by Check Point
Tags: actor:Camaro Dragon, malware:Horse Shell, detection:HorseShell, malware-type:Backdoor, malware-type:Implant, actor:Mustang Panda, source-country:China, target-region:Europe, file-type:ELF, file-type:LOG, file-type:DAT, target-device:TP-Link router, target-system:Linux
Newly Identified RA Group Compromises Companies in U.S. and South Korea with Leaked Babuk Source Code
(published: May 15, 2023)
RA Group is a new ransomware group that has been actively exposing target data since April 2023. The group uses double-extortion tactics. Talos researchers established that Ra Group’s ransomware is based on the leaked Babuk ransomware source code. The ransomware code appears to include the target’s name and is written in C++, and uses the cryptography scheme with curve25519 and eSTREAM cipher hc-128 algorithm for encryption. The group’s first exposed targets were organizations in the US and South Korea.
Analyst Comment: Ransomware is a constantly evolving threat, and the most fundamental defense is having proper backup and restore processes in place that allows recovery without any need to decrypt the affected data. Data theft is containable through segmentation, encrypting data at rest, and limiting the storage of personal and sensitive data.
MITRE ATT&CK: [MITRE ATT&CK] T1486: Data Encrypted for Impact | [MITRE ATT&CK] T1490: Inhibit System Recovery
Tags: actor:RA Group, target-country:US, target-country:South Korea, malware:Babuk, detection:Win.Ransomware.Babuk, malware-type:Ransomware, malware:RA, detection:Ransomware/Win.RA, abused:qTox, abused:TOR, Data leak site, target-industry:Manufacturing, target-industry:Wealth management, target-industry:Insurance, target-industry:Pharmaceuticals, file-type:EXE, file-type:GAGUP, target-system:Windows