- The best foldable phones of 2024: Expert tested and reviewed
- Redefining customer experience: How AI is revolutionizing Mastercard
- The Apple Pencil Pro has dropped down to $92 on Amazon ahead of Black Friday
- This tiny USB-C accessory has a game-changing magnetic feature (and it's 30% off)
- Schneider Electric ousts CEO over strategic differences
Anomali Cyber Watch: MalVirt Obfuscates with KoiVM Virtualization, IceBreaker Overlay Hides V8 Bytecode Runtime Interpretation, Sandworm Deploys Multiple Wipers in Ukraine
The various threat intelligence stories in this iteration of the Anomali Cyber Watch discuss the following topics: APT, Data leak, Malvertising, North Korea, Proxying, Russia, Typosquatting, Ukraine, and Wipers. The IOCs related to these stories are attached to Anomali Cyber Watch and can be used to check your logs for potential malicious activity.
Figure 1 – IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed.
Trending Cyber News and Threat Intelligence
No Pineapple! –DPRK Targeting of Medical Research and Technology Sector
(published: February 2, 2023)
In August-November 2022, North Korea-sponsored group Lazarus has been engaging in cyberespionage operations targeting defense, engineering, healthcare, manufacturing, and research organizations. The group has shifted their infrastructure from using domains to be solely IP-based. For initial compromise the group exploited known vulnerabilities in unpatched Zimbra mail servers (CVE-2022-27925 and CVE-2022-37042). Lazarus used off the shelf malware (Cobalt Strike, JspFileBrowser, JspSpy webshell, and WSO webshell), abused legitimate Windows and Unix tools (such as Putty SCP), and tools for proxying (3Proxy, Plink, and Stunnel). Two custom malware unique to North Korea-based advanced persistent threat actors were a new Grease version that enables RDP access on the host, and the Dtrack infostealer.
Analyst Comment: Organizations should keep their mail server and other publicly-facing systems always up-to-date with the latest security features. Lazarus Group cyberespionage attacks are often accompanied by stages of multi-gigabyte exfiltration traffic. Suspicious connections and events should be monitored, detected and acted upon. Use the available YARA signatures and known indicators.
MITRE ATT&CK: [MITRE ATT&CK] T1587.002 – Develop Capabilities: Code Signing Certificates | [MITRE ATT&CK] T1190 – Exploit Public-Facing Application | [MITRE ATT&CK] picus-security: The Most Used ATT&CK Technique—T1059 Command and Scripting Interpreter | [MITRE ATT&CK] T1569.002: Service Execution | [MITRE ATT&CK] T1106: Native API | [MITRE ATT&CK] T1505.003 – Server Software Component: Web Shell | [MITRE ATT&CK] T1037.005 – Boot or Logon Initialization Scripts: Startup Items | [MITRE ATT&CK] T1053.005 – Scheduled Task/Job: Scheduled Task | [MITRE ATT&CK] T1036.005 – Masquerading: Match Legitimate Name Or Location | [MITRE ATT&CK] T1553 – Subvert Trust Controls | [MITRE ATT&CK] T1070.004 – Indicator Removal on Host: File Deletion | [MITRE ATT&CK] T1070.007 – Indicator Removal: Clear Network Connection History And Configurations | [MITRE ATT&CK] T1136 – Create Account | [MITRE ATT&CK] T1078 – Valid Accounts | [MITRE ATT&CK] T1003.001 – OS Credential Dumping: Lsass Memory | [MITRE ATT&CK] T1556 – Modify Authentication Process | [MITRE ATT&CK] T1012: Query Registry | [MITRE ATT&CK] T1016 – System Network Configuration Discovery | [MITRE ATT&CK] T1018 – Remote System Discovery | [MITRE ATT&CK] T1033 – System Owner/User Discovery | [MITRE ATT&CK] T1049 – System Network Connections Discovery | [MITRE ATT&CK] Picus: The System Information Discovery Technique Explained – MITRE ATT&CK T1082 | [MITRE ATT&CK] T1083 – File And Directory Discovery | [MITRE ATT&CK] T1087.002 – Account Discovery: Domain Account | [MITRE ATT&CK] T1021.001 – Remote Services: Remote Desktop Protocol | [MITRE ATT&CK] T1021.001 – Remote Services: Remote Desktop Protocol | [MITRE ATT&CK] T1071.001 – Application Layer Protocol: Web Protocols | [MITRE ATT&CK] T1114.002 – Email Collection: Remote Email Collection | [MITRE ATT&CK] T1560 – Archive Collected Data | [MITRE ATT&CK] T1074 – Data Staged | [MITRE ATT&CK] T1119 – Automated Collection | [MITRE ATT&CK] T1071 – Application Layer Protocol | [MITRE ATT&CK] T1090.002 – Proxy: External Proxy | [MITRE ATT&CK] T1090.001 – Proxy: Internal Proxy | [MITRE ATT&CK] T1041 – Exfiltration Over C2 Channel
Tags: mitre-group:Lazarus Group, North Korea, source-country:KP, India, target-country:IN, target-industry:Defense, target-industry:Engineering, target-industry:Healthcare, target-industry:Manufacturing, target-industry:Research, target-industry:Universities, APT, Cyberespionage, Data leak, Printnightmare, CVE-2021-34527, CVE-2022-27925, CVE-2022-37042, CVE-2021-4034, file-type:JSP, Plink, 3Proxy, RDPWrapper, malware:JspSpy, malware:WSO webshell, malware-type:webshell, mitre-software:Cobalt Strike, malware:Dtrack, malware-type:Infostealer, malware:Grease, RDP access, Windows, Unix
MalVirt | .NET Virtualization Thrives in Malvertising Attacks
(published: February 2, 2023)
SentinelLabs detected a malvertising campaign that uses a virtualized malware loader dubbed MalVirt. The loader uses KoiVM virtualization from the ConfuserEX .NET protector. It turns the .NET opcodes into new ones that only are understood by the KoiVM virtual machine. MalVirt has obfuscated namespace, class, and function names, it can patch the AmsiScanBuffer function to bypass the Anti Malware Scan Interface, and uses Base-64 encoding and AES-encryption for some strings that can raise suspicion. The final payload, an infostealer from the Formbook/XLoader family is disguising its C2 traffic camouflaging the true C2 domain through beaconing to multiple domains. It also employs anti-analysis and anti-detection techniques such as detecting the presence of user- and kernel-land debuggers using the NtQueryInformationProcess and NtQuerySystemInformation functions.
Analyst Comment: Consider using an ad-blocker service. Before clicking to download a software, check if the domain name is misspelled. As is always the case, end user education and awareness remains a key component in any organization’s protective arsenal. Until search engines get better in recognizing these kinds of redirect abuse, take extra caution with search results, especially promoted ones.
MITRE ATT&CK: [MITRE ATT&CK] T1204 – User Execution | [MITRE ATT&CK] T1027.002 – Obfuscated Files or Information: Software Packing | [MITRE ATT&CK] T1140 – Deobfuscate/Decode Files Or Information | [MITRE ATT&CK] T1562.001: Disable or Modify Tools | [MITRE ATT&CK] T1622 – Debugger Evasion
Tags: malware:MalVirt, malware-type:Loader, Malvertising, Google Ads, malware:Formbook, malware:XLoader, malware-type:Infostealer, Virtualization, .Net, KoiVM, ConfuserEX, file-type:EXE, Windows
No Macro? No Worries. VSTO Being Weaponized by Threat Actors
(published: February 1, 2023)
After Microsoft decided to block-by-default any VBA macro in Office files bearing the mark-of-the-web, threat actors started looking for new delivery methods including Visual Studio Tools for Office (VSTO). Deep Instinct detected in-the-wild samples abusing VSTO, a software development toolset available in Microsoft’s Visual Studio IDE. VSTO allows to develop .Net-based Office Add-In’s, incorporate them into an Office document for delivery and execution, and achieve persistence by associating with an Office application and run each time the application is booted.
Analyst Comment: Security vendors should incorporate monitoring for VSTO. When handling a potential suspicious maldocs, users should be suspicious if prompted to install an Add-In and/or a customization.
MITRE ATT&CK: [MITRE ATT&CK] T1204.002 – User Execution: Malicious File | [MITRE ATT&CK] T1059.001: PowerShell | [MITRE ATT&CK] T1553.005 – Subvert Trust Controls: Mark-Of-The-Web Bypass | [MITRE ATT&CK] T1027 – Obfuscated Files Or Information | [MITRE ATT&CK] T1137.006 – Office Application Startup: Add-Ins
Tags: file-type:VSTO, Visual Studio Tools for Office, Visual Studio IDE, .Net, file-type:DLL, file-type:ZIP, PowerShell, Microsoft, Windows
Operation Ice Breaker Targets The Gam(bl)ing Industry Right Before It’s Biggest Gathering
(published: February 1, 2023)
Security Joes researchers detected several incidents for the Operation Ice Breaker campaign targeting gaming and gambling industries. The unidentified attackers used typosquatted domains and targeted customer support chats with malicious links masquerading as error screenshot images. One attack chain used a VBS downloader to deliver the well-documented Houdini RAT, another used a LNK downloader to download and execute an additional MSI package. These MSI packages impersonated legitimate software installers for Avast Free Antivirus or Formware 3D and contained a set of decoy files and a CAB archive with a compressed version of the IceBreaker Backdoor. IceBreaker executable has a unique use for the overlay appended to the end of the original executable: it stores V8 Bytecode, an abstraction of machine code that represents the code of the script and is interpreted at runtime by the V8’s Ignition interpreter.
Analyst Comment: Operation Ice Breaker used two specific social engineering techniques that could be taught to client-facing support agents. First, they complained to customer support without actually having an account with the company. Second, to mask their broken English, they were requesting support in different languages (Spanish, French) but communicated in English.
Network defenders are advised to monitor for the execution of VBS scripts and LNK files from the Temp folder; LNK files created in the startup folder; creation of msiexec.exe processes receiving URLs as parameters; and unauthorized tsocks.exe tool execution.
MITRE ATT&CK: [MITRE ATT&CK] T1566.003 – Phishing: Spearphishing Via Service | [MITRE ATT&CK] T1204.001 – User Execution: Malicious Link | [MITRE ATT&CK] T1204.002 – User Execution: Malicious File | [MITRE ATT&CK] T1059.005 – Command and Scripting Interpreter: Visual Basic | [MITRE ATT&CK] T1547.001 – Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder | [MITRE ATT&CK] T1036.007 – Masquerading: Double File Extension | [MITRE ATT&CK] T1218.007 – Signed Binary Proxy Execution: Msiexec | [MITRE ATT&CK] T1555.003 – Credentials from Password Stores: Credentials From Web Browsers | [MITRE ATT&CK] T1539 – Steal Web Session Cookie | [MITRE ATT&CK] T1057 – Process Discovery | [MITRE ATT&CK] T1087.001 – Account Discovery: Local Account | [MITRE ATT&CK] T1518 – Software Discovery | [MITRE ATT&CK] Picus: The System Information Discovery Technique Explained – MITRE ATT&CK T1082 | [MITRE ATT&CK] T1113 – Screen Capture | [MITRE ATT&CK] T1572 – Protocol Tunneling | [MITRE ATT&CK] T1571 – Non-Standard Port | [MITRE ATT&CK] T1105 – Ingress Tool Transfer | [MITRE ATT&CK] T1071.001 – Application Layer Protocol: Web Protocols
Tags: Operation Ice Breaker, malware:IceBreaker, malware-type:Backdoor, file-type:VBS, file-type:LNK, malware:Houdini RAT, malware-type:RAT, file-type:ZIP, Reverse shell, DropBox, Bytenode, file-type:JSC, Customer service, Typosquatting, IDN homograph attack, Social engineering, file-type:MSI, file-type:CAB, file-type:EXE, Node.js, C++, JavaScript, V8 Bytecode, Ignition interpreter, target-industry:Gaming, target-industry:Gambling, Windows
New Data Wipers Deployed Against Ukraine
(published: January 30, 2023)
The Computer Emergency Response Team of Ukraine (CERT-UA) reported a sophisticated, partially-successful, data-wiping attack against one of Ukraine’s news agencies. The reconnaissance started on December 7, 2022, or earlier, followed by the initial access. On January 17, 2023, the attacker attempted to deploy and execute five different wipers using a group policy object (GPO) for scheduled task creation. CaddyWiper and ZeroWipe malware, and the SDelete legitimate utility were targeting Windows. Additional two wipers were AwfulShred targeting Linux and BidSwipe targeting FreeBSD. The attack was advertised on the CyberArmyofRussia_Reborn Telegram channel associated with the Russia-sponsored Sandworm Team, likely responsible for the attack.
Analyst Comment: Advanced data wiping campaigns can be spoiled by having proper safe-guards in place including, but not limited to online and offline backups, requiting proper authorization for data removal, and other protections. For legitimate tool abuse, network defenders are advised to establish a baseline for typical running processes and monitor for anomalies.
MITRE ATT&CK: [MITRE ATT&CK] T1485 – Data Destruction | [MITRE ATT&CK] T1053 – Scheduled Task/Job | [MITRE ATT&CK] T1490: Inhibit System Recovery
Tags: malware:CaddyWiper, malware:ZeroWipe, detection:SDelete, malware:AwfulShred, malware:BidSwipe, malware-type:Wiper, mitre-group:Sandworm Team, actor:UAC-0082, CyberArmyofRussia_Reborn, APT, Russia, source-country:RU, GRU, Ukraine, target-country:UA, target-industry:Mass media, Group Policy Object, TOR, file-type:EXE, file-type:BAT, file-type:SH, Windows, Linux, FreeBSD
SwiftSlicer: New Destructive Wiper Malware Strikes Ukraine
(published: January 27, 2023)
Russia-sponsored group Sandworm Team have been detected targeting Ukraine with a new Go-based wiper dubbed SwiftSlicer. Sandworm deployed the wiper using Active Directory Group Policy. The initial intrusion vector used to compromise the organization is unknown. SwiftSlicer is capable of deleting shadow copies, recursively overwriting critical system files and drivers, and rebooting. For overwriting, it uses a 4096 bytes length random-data block.
Analyst Comment: In 2022, Russian APT groups used several different wipers. SwiftSlicer shows that the data destruction threat continues to evolve. Organizations with exposure to the military conflict in Ukraine should prepare offline backups to minimize the effects of a potential data-wiping attack.
MITRE ATT&CK: [MITRE ATT&CK] T1485 – Data Destruction | [MITRE ATT&CK] T1490: Inhibit System Recovery | [MITRE ATT&CK] T1529 – System Shutdown/Reboot
Tags: detection:SwiftSlicer, detection:WinGo/KillFiles.C, Golang, malware-type:Wiper, mitre-group:Sandworm Team, APT, Russia, source-country:RU, GRU, Ukraine, target-country:UA, Active Directory Group Policy, Windows