- What is AI networking? How it automates your infrastructure (but faces challenges)
- I traveled with a solar panel that's lighter than a MacBook, and it's my new backpack essential (and now get 23% off for Black Friday)
- Windows 11 24H2 hit by a brand new bug, but there's a workaround
- This Samsung OLED spoiled every other TV for me, and it's $1,400 off for Black Friday
- How to Protect Your Social Media Passwords with Multi-factor Verification | McAfee Blog
Anomali Cyber Watch: LEMURLOOT on Exploited MOVEit Transfers, Zero-Click iOS Exploit Targeted Kaspersky, Qakbot Turns Bots into Proxies
The various threat intelligence stories in this iteration of the Anomali Cyber Watch discuss the following topics: Adware, Botnets, Data leak, Obfuscation, Phishing, Zero-day vulnerabilities, and Zero-click exploits. The IOCs related to these stories are attached to Anomali Cyber Watch and can be used to check your logs for potential malicious activity.
Figure 1 – IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed.
Trending Cyber News and Threat Intelligence
Zero-Day Vulnerability in MOVEit Transfer Exploited for Data Theft
(published: June 2, 2023)
A zero-day vulnerability in the MOVEit Transfer secure managed file transfer software (CVE-2023-34362) was announced by Progress Software Corporation on May 31, 2023. Mandiant researchers have observed a wide exploitation that had already started on May 27, 2023. This opportunistic campaign affected Canada, Germany, India, Italy, Pakistan, the US, and other countries. The attackers have been using the custom LEMURLOOT web shell masquerading as a legitimate component of the MOVEit Transfer. It is used to exfiltrate data previously uploaded by the users of individual MOVEit Transfer systems. This actor activity is dubbed UNC4857 and it has a low confidence similarity to FIN11-attributed data theft extortion via the CL0P ransomware data leak site.
Analyst Comment: The US Cybersecurity and Infrastructure Security Agency added CVE-2023-34362 to its list of known exploited vulnerabilities, ordering US federal agencies to patch their systems by June 23, 2023. Network defenders should follow the Progress Software Corporation remediation steps that include hardening, detection, clean-up, and installing the recent MOVEit Transfer security patches. YARA rules and host-based indicators associated with the LEMURLOOT webshell are available in the Anomali platform for detection and historical reference.
MITRE ATT&CK: [MITRE ATT&CK] T1587.003 – Develop Capabilities: Digital Certificates | [MITRE ATT&CK] T1190 – Exploit Public-Facing Application | [MITRE ATT&CK] T1036 – Masquerading | [MITRE ATT&CK] T1136 – Create Account | [MITRE ATT&CK] T1083 – File And Directory Discovery | [MITRE ATT&CK] T1560.001 – Archive Collected Data: Archive Via Utility
Signatures: LEMURLOOT Webshell DLL Payloads – YARA by Mandiant | LEMURLOOT Webshell ASP.NET scripts – YARA by Mandiant | MOVEit Exploitation – YARA by Florian Roth.
Tags: malware:LEMURLOOT, malware-type:Webshell, target-software:MOVEit Transfer, actor:UNC4857, exploit-type:Zero-day, vulnerability:CVE-2023-34362, target-country:Canada, target-country:India, target-country:Italy, target-country:Pakistan, target-country:Germany, target-country:US, target-software:Azure Blob Storage, abused:C#, abused:gzip, actor:FIN11, actor:Clop, technique:SQLi attack, file-type:DLL, file-type:ASPX, file-type:HTML, target-system:Windows
Unmasking Malicious Extensions: Avast Detects New Threats on the Chrome Web Store
(published: June 2, 2023)
Wladimir Palant and Avast researchers have discovered 32 malicious extensions on the Chrome Web Store. The extensions provide legitimate functionality, but contain an obfuscated code with adware and search result hijacker functionalities. 24,000 of Avast’s users were affected and these extensions had a combined 75 million installs on the Chrome Web Store, although the install counts may have been artificially inflated.
Analyst Comment: It takes time to detect additional malicious functionality. Random redirects from Google results can be the sign of this campaign infection. Network indicators associated with this campaign are available in the Anomali platform and customers are advised to block these on their infrastructure.
MITRE ATT&CK: [MITRE ATT&CK] T1204 – User Execution | [MITRE ATT&CK] T1027 – Obfuscated Files Or Information
Tags: malware-type:Adware, malware-type:Search result hijacker, technique:Malicious browser extension, target-software:Chrome
Operation Triangulation: iOS Devices Targeted with Previously Unknown Malware
(published: June 1, 2023)
Kaspersky researchers have detected an advanced iOS malware on iPhones connected to their own corporate network. This campaign dubbed Operation Triangulation starts with an unidentified, zero-click exploit attached to an iMessage. It downloads subsequent stages with additional exploits for privilege escalation. The initial message and the exploit attachment are then deleted to avoid detection. The final payload runs with root privileges, collects system and user information, and downloads additional plugin modules. It does not have persistence, but previously-infected devices were observed being reinfected. The most recent version of iOS successfully targeted is iOS 15.7 (released on September 12, 2022). Operation Triangulation is ongoing and is traced back to 2019.
Analyst Comment: Network defenders are advised to check backups of potentially-targeted devices for indicators of compromise, the most reliable being the presence of data-usage lines in timeline.csv mentioning the process named BackupAgent. All known C2 domains associated with this campaign are available in the Anomali platform and customers are advised to block these on their infrastructure and check their DNS logs for historical information.
MITRE ATT&CK: [MITRE ATT&CK] T1630 – Indicator Removal On Host | [MITRE ATT&CK] T1544 – Remote File Copy | [MITRE ATT&CK] T1426 – System Information Discovery | [MITRE ATT&CK] T1437.001 – Application Layer Protocol: Web Protocols
Tags: campaign:Operation Triangulation, exploit-type:Zero-click, APT, target-industry:Software and Services, target-industry:Cybersecurity, target-company:Kaspersky, target-system:Mobile, target-system:iOS
Qakbot: Retool, Reinfect, Recycle
(published: June 1, 2023)
Qakbot (Pinkslipbot or Qbot) is a long-standing banking trojan and malware/ransomware distribution network that has been active since 2007. It primarily spreads through email hijacking and social engineering methods, delivering malicious files to infect Windows hosts. In 2023, Qakbot employed various tactics, including the use of malicious OneNote files, Mark of the Web evasion techniques, and HTML smuggling. The botnet has evolved to conceal its infrastructure within residential IP space. Bots communicate with the backconnect server to be repurposed into proxies: Tier 1 command-and-control (C2) servers. Lumen’s Black Lotus Labs researchers have detected up to 70-90 new C2 servers a week as part of Qakbot spamming cycle. These servers communicate with Tier 2 C2 servers hosted on “bulletproof” virtual private server (VPS) providers.
Analyst Comment: Organizations should bolster defenses against phishing by fully monitoring network resources, ensuring proper patch management and conducting ongoing phishing and social-engineering training for employees. Continue or enable OneNote attachment blocking, if feasible. All known higher-tier C2 indicators associated with this campaign are available in the Anomali platform and customers are advised to block these on their infrastructure.
MITRE ATT&CK: [MITRE ATT&CK] T1583.003 – Acquire Infrastructure: Virtual Private Server | [MITRE ATT&CK] T1584.005 – Compromise Infrastructure: Botnet | [MITRE ATT&CK] T1566.001 – Phishing: Spearphishing Attachment | [MITRE ATT&CK] T1027.006 – Obfuscated Files or Information: Html Smuggling | [MITRE ATT&CK] T1090 – Proxy | [MITRE ATT&CK] T1105 – Ingress Tool Transfer | [MITRE ATT&CK] T1486: Data Encrypted for Impact
Tags: malware:Qakbot, malware:Pinkslipbot, malware:Qbot, malware-type:Botnet, malware-type:Ransomware, abused:OneNote, filetype:DLL, filetype:HTML, filetype:ONE, technique:Email hijacking, technique:Proxy, technique:Compromised web server, technique:VPS server, target-system:Windows
When Byte Code Bites: Who Checks the Contents of Compiled Python Files?
(published: June 1, 2023)
In April 2023, a novel supply-chain attack was detected in the Python Package Index (PyPI). To evade typical static code analysis detection tools, it places the malicious functionality into a single file containing compiled Python byte code (PYC file). To load the malicious Python compiled module, the actors used the Importlib import implementation instead of the usual Import directive. The malware then downloads and executes yet another Python script, which actors change from time to time. It collects usernames, hostnames, and directory listings, and executes additional code using scheduled tasks or cronjob, depending on the target system. ReversingLabs researchers examined the C2 server and found evidence of successful exploitation and keylogging outputs.
Analyst Comment: Researchers can leverage the inspection of decompiled versions of the suspicious PYC files. Suspicious behaviors to look for include the presence of URLs that reference the host by IP address, detection of file execution, gathering of sensitive information, and process creation. Host-based indicators associated with this campaign are available in the Anomali platform for ongoing infections and historical reference.
MITRE ATT&CK: [MITRE ATT&CK] T1105 – Ingress Tool Transfer | [MITRE ATT&CK] T1033 – System Owner/User Discovery | [MITRE ATT&CK] T1053.003 – Scheduled Task/Job: Cron | [MITRE ATT&CK] T1056.001 – Input Capture: Keylogging
Tags: abused:PyPI, abused:Python, file-type:PYC, target-system:macOS, target-system:Linux, target-system:Windows