- Buy Microsoft Visio Professional or Microsoft Project Professional 2024 for just $80
- Get Microsoft Office Pro and Windows 11 Pro for 87% off with this bundle
- Buy or gift a Babbel subscription for 78% off to learn a new language - new low price
- Join BJ's Wholesale Club for just $20 right now to save on holiday shopping
- This $28 'magic arm' makes taking pictures so much easier (and it's only $20 for Black Friday)
Anomali Cyber Watch: Cozy Bear Abuses Google Drive API, Complex Lightning Framework Targets Linux, Google Ads Hide Fraudulent Redirects, and More
The various threat intelligence stories in this iteration of the Anomali Cyber Watch discuss the following topics: APT, Bots, China, Linux, Malspam, Mobil, Russia, and Spearhishing. The IOCs related to these stories are attached to Anomali Cyber Watch and can be used to check your logs for potential malicious activity.
Figure 1 – IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed.
Trending Cyber News and Threat Intelligence
Lightning Framework: New Undetected “Swiss Army Knife” Linux Malware
(published: July 21, 2022)
Intezer researchers discovered a new Linux malware called Lightning Framework (Lightning). It is a modular framework able to install multiple types of rootkits and to run various plugins. Lightning has passive and active capabilities for communication with the threat actor, including opening up SSH service via an OpenSSH daemon, and a polymorphic command and control (C2) configuration. Lightning is a newly discovered threat, and there is no information about its use in the wild and the actors behind it.
Analyst Comment: Defenders should block known Lightning indicators. Monitor for file creation based on the Lightning naming convention.
MITRE ATT&CK: [MITRE ATT&CK] Logon Scripts – T1037 | [MITRE ATT&CK] Account Manipulation – T1098 | [MITRE ATT&CK] Obfuscated Files or Information – T1027 | [MITRE ATT&CK] Deobfuscate/Decode Files or Information – T1140 | [MITRE ATT&CK] Hide Artifacts – T1564 | [MITRE ATT&CK] Masquerading – T1036 | [MITRE ATT&CK] Rootkit – T1014 | [MITRE ATT&CK] Indicator Removal on Host – T1070 | [MITRE ATT&CK] File and Directory Discovery – T1083 | [MITRE ATT&CK] Network Service Scanning – T1046 | [MITRE ATT&CK] Network Sniffing – T1040 | [MITRE ATT&CK] System Information Discovery – T1082 | [MITRE ATT&CK] Data Encoding – T1132 | [MITRE ATT&CK] Standard Non-Application Layer Protocol – T1095 | [MITRE ATT&CK] Proxy – T1090 | [MITRE ATT&CK] Exfiltration Over C2 Channel – T1041
Tags: Lightning Framework, Linux, Lightning.Downloader, Lightning.Core, Typosquatting, Masquerading, Timestomping, Port:33229
Google Ads Lead to Major Malvertising Campaign
(published: July 20, 2022)
Malwarebytes researchers discovered a malvertising campaign abusing Google Search advertisements for popular keywords such as “amazon,” “facebook,” “walmart,” “youtube,” and other world top brands. The malicious ad points to the Google domain and displays the legitimate domain of the company allegedly advertised, so there is no way for users to see from the Google Search page that the destination will be inauthentic. Clicking on the malicious ad leads to several redirects and includes so-called cloaking when the final destination for crawlers and research IP addresses will be the legitimate website, while residential IPs tend to be redirected to a tech support scam page.
Analyst Comment: Users should use caution when clicking on paid positions in Google Search. Use security systems that recognize browser locker features such as forced fullscreen and auto-playing an audio warning.
Tags: Browser locker, Browlock, Malvertizing, Google Ads, Cloaking, Tech support scam, Iframe
Russian APT29 Hackers Use Online Storage Services, DropBox and Google Drive
(published: July 19, 2022)
Unit42 researchers discovered two spearphsihing campaigns that targeted several Western diplomatic missions between May and June 2022. This cyberespionage activity is attributed to Russia’s Foreign Intelligence Service (SVR) tracked as Cozy Bear (APT29). Multi-stage infection used PDF attachments leading to the EnvyScout HTML malware, and a malicious ISO image file with an LNK shortcut. Upon user execution, the first-stage payload uses Google Drive API to communicate with a Google Drive share to exfiltrate victim data and get the second-stage payload, Cobalt Strike Beacon.
Analyst Comment: Defenders should employ a layered approach including anti-phishing training, concentrating on identifying Cobalt Strike traffic and known APT infrastructure. Consider limiting non-administrative accounts’ ability to execute certain file types when downloaded from the Internet.
MITRE ATT&CK: [MITRE ATT&CK] Phishing – T1566 | [MITRE ATT&CK] User Execution – T1204 | [MITRE ATT&CK] Obfuscated Files or Information – T1027 | [MITRE ATT&CK] Deobfuscate/Decode Files or Information – T1140 | [MITRE ATT&CK] Ingress Tool Transfer – T1105 | [MITRE ATT&CK] Hijack Execution Flow – T1574
Tags: Cozy Bear, APT29, Cloaked Ursa, Nobelium, Spearphishing, EnvyScout, Cobalt Strike Beacon, Cobalt Strike, Government, Diplomatic, SVR, Russia, source-country:RU, Turkey, Portugal, Brazil, Egypt, NATO, Cyberespionage
I See What You Did There: A Look At The CloudMensis MacOS Spyware
(published: July 19, 2022)
First discovered in April 2022, CloudMensis, a macOS backdoor which was analyzed and exposed by ESET researchers has capabilities to gather sensitive information on victim’s compromised systems. This malware is specifically designed for macOS and is developed in Objective-C. Primary intentions of the actors include gathering of user critical information through exfiltrating documents, screen captures, keystrokes and other means. CloudMensis utilizes cloud storage for both, receiving commands and exfiltrating documents. This includes but is not limited to pCloud, Yandex Disk, and Dropbox. Apple has acknowledged these kinds of malware and is previewing Lockdown Mode on its operating system which disables entry points for such threats reducing the overall attack surface.
Analyst Comment: Updating and keeping your mac up to date are the basic mitigation techniques. Heavily targeted users and organizations should consider new features such as the Lockdown Mode once released, that will reduce the overall attack surface for such threats.
MITRE ATT&CK: [MITRE ATT&CK] Subvert Trust Controls – T1553 | [MITRE ATT&CK] Archive Collected Data – T1560 | [MITRE ATT&CK] Input Capture – T1056 | [MITRE ATT&CK] Data from Local System – T1005 | [MITRE ATT&CK] Data from Removable Media – T1025 | [MITRE ATT&CK] Email Collection – T1114 | [MITRE ATT&CK] Encrypted Channel – T1573 | [MITRE ATT&CK] Web Service – T1102 | [MITRE ATT&CK] Exfiltration Over Web Service – T1567
Tags: CloudMensis, Spyware, macOS, Apple, pCloud, Yandex Disk, Dropbox
A Deep Dive Into the Residential Proxy Service ‘911’
(published: July 18, 2022)
VPN services offered for free online, such as 911 (domain 911[.]re) often sell their users’ traffic history and other private information. Moreover, the 911 VPN tool makes them part of the botnet network that sells access to those nodes for proxying. Researchers at the University of Sherbrooke uncovered that 911 also enables the end user to probe the LAN network of the infected node, making it possible to poison the DNS cache of the LAN router of the infected node. 911 started seven years ago, and has roughly 120,000 Windows PCs for rent via the service, mostly in the United States. 911 actively promotes its proxying services to cybercriminals and it has a history of connections with criminal pay-per-install and pay-per-click services.
Analyst Comment: Users should avoid suspicious, free VPN offerings as those often sell their traffic information, turn the user’s PC into a traffic relay for other users, and expose their networks for further attacks.
MITRE ATT&CK: [MITRE ATT&CK] User Execution – T1204 | [MITRE ATT&CK] Proxy – T1090
Tags: 911[.]re, Free VPN, Proxy, USA, target-country:US, China, Romania, Wugaa Enterprises LLC, Gold Click Limited, Pay-per-click, Pay-per-install, Windows, Socks5 proxy
8220 Gang Massively Expands Cloud Botnet to 30,000 Infected Hosts
(published: July 18, 2022)
Active since 2017, the 8220 cryptomining threat group increased its botnet from around 2,000 bots in mid-2021 to 30,000 bots in July 2022. This Chinese-speaking group is specializing in attacking Linux machines to mine Monero. They use generic infection scripts, the IRC Botnet, and the PwnRig Monero-mining malware. In 2022, the group added a special file containing 450 hardcoded credentials for SSH brute forcing. 8220 also shifted their honeypot evasion blocklist from direct IPs listed in the script to a list in an additionally-downloaded file.
Analyst Comment: Protection from opportunity groups like 8220 should involve regular maintenance and patch deployment to your servers and systems including but not limited to Apache, Confluence, Docker, Drupal, Hadoop, and Redis. Always change default administrative passwords. Monitor for a sudden increase in your CPU utilization.
MITRE ATT&CK: [MITRE ATT&CK] Exploit Public-Facing Application – T1190 | [MITRE ATT&CK] Valid Accounts – T1078 | [MITRE ATT&CK] Resource Hijacking – T1496 | [MITRE ATT&CK] Impair Defenses – T1562
Tags: 8220, Cryptomining, XMRig, Monero miner, Linux, Botnet, China, source-country:CN, Tsunami IRC Botnet, PwnRig, Honeypot evasion, Jira
Ongoing Roaming Mantis Smishing (SMS Phishing) Campaign Targeting France
(published: July 18, 2022)
Roaming Mantis (FLINT 2022-037), is a Chinese threat group discovered by SEKOIA.IO researchers in early 2022 with a majority of targets being in France. Depending on the victim’s mobile phone operating system, malicious activity includes either deployment of an Android remote access trojan (RAT) named MoqHao or redirects to a fake Apple iCloud page. MoqHao, when deployed, has capabilities of stealing browser information and other user sensitive information. This campaign was also discovered in regions like Japan, South Korea, and Taiwan. The main motivation behind the campaign is financial, which is why developed nations are being targeted.
Analyst Comment: SMS Phishing has been around for a while and the best possible mitigation is to never respond to unknown links received via SMS. Regularly updating the browser and operating system, and also reporting unknown SMS to telecom companies are the best mitigation techniques.
MITRE ATT&CK: [MITRE ATT&CK] Phishing – T1566 | [MITRE ATT&CK] User Execution – T1204 | [MITRE ATT&CK] Web Service – T1102 | [MITRE ATT&CK] Application Layer Protocol – T1071 | [MITRE ATT&CK] Exfiltration Over C2 Channel – T1041
Tags: Roaming Mantis, MoqHao, Wroba, XLoader, Android malware, RAT, SMS, Phishing, Smishing, target-country:FR, France, iOS, iPhone
GeckoSpy: Pegasus Spyware Used Against Thailand’s Pro-Democracy Movement
(published: July 17, 2022)
CitizenLab researchers describe a wide spyware campaign targeting the opposition to the Thai government with the Pegasus spyware. From October 2020 to November 2021, over 30 key figures associated with pro-democracy protests were targeted: activists, academics, lawyers, and NGO workers. The campaign slowed down after Apple made patches for the ForcedEntry exploit in late September 2021. It stopped after Apple notified the targeted individuals and filed a lawsuit against NSO Group that was providing Pegasus. NSO operations and domain infrastructure targeting Thailand go back to May 2014.
Analyst Comment: Political figures and heavily targeted individuals can consider keeping their devices updated and maximally locked/hardened, not trusting unwarranted messages and web-links, or minimizing their use of apps and IT technologies when dealing with sensitive information altogether.
MITRE ATT&CK: [MITRE ATT&CK] Exploitation for Client Execution – T1203 | [MITRE ATT&CK] Ingress Tool Transfer – T1105
Tags: GeckoSpy, NSO Group, Pegasus, Spyware, Government, Thailand, source-country:TH, target-country:TH, Apple, iPhone, ForcedEntry exploit, CVE-2021-30860, CVE-2021-30858
Observed Threats
Additional information regarding the threats discussed in this week’s Anomali Cyber Watch can be found below:
APT29
The Advanced Persistent Threat (APT) group “APT29” is a Russian-based group that was first reported on in July 2013 by Kaspersky and CrySyS Lab researchers. Prior to this report, malicious activity had been observed but not yet attributed to one sophisticated group. The group boasts an arsenal of custom and complex malwares at its disposal and is believed to be sponsored by the Russian Federation government. APT29 conducts cyber espionage campaigns and has been active since at least 2008. The group primarily targets government entities and organizations that work in geopolitical affairs around the world, however, a plethora of other targets have also been identified.
CVE-2021-30860
An integer overflow was addressed with improved input validation. This issue is fixed in Security Update 2021-005 Catalina, iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6, watchOS 7.6.2. Processing a maliciously crafted PDF may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
CVE-2021-30858
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
!function(f,b,e,v,n,t,s)
{if(f.fbq)return;n=f.fbq=function(){n.callMethod?n.callMethod.apply(n,arguments):n.queue.push(arguments)};if(!f._fbq)f._fbq=n;n.push=n;n.loaded=!0;n.version=’2.0′;n.queue=[];t=b.createElement(e);t.async=!0;t.src=v;s=b.getElementsByTagName(e)[0];s.parentNode.insertBefore(t,s)}(window,document,’script’,’https://connect.facebook.net/en_US/fbevents.js’);fbq(‘init’,’2115220198489652′);fbq(‘track’,’PageView’);
Source link