text
stringlengths
0
839k
The admin@338 has largely targeted organizations involved in financial, economic and trade policy, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors.The admin@338 started targeting Hong Kong media companies, probably in response to political and economic challenges in Hong Kong and China.Multiple China-based cyber threat groups have targeted international media organizations in the past.The admin@338 has targeted international media organizations in the past.In August 2015, the admin@338 sent spear phishing emails to a number of Hong Kong-based media organizations, including newspapers, radio, and television.In August 2015, the threat actors sent spear phishing emails to a number of Hong Kong-based media organizations, including newspapers, radio, and television.In August 2015, the admin@338 sent spear phishing emails to a number of Hong Kong-based media organizations.The admin@338 previous activities against financial and policy organizations have largely focused on spear phishing emails written in English, destined for Western audiences.Once the LOWBALL malware calls back to the Dropbox account, the admin@338 will create a file called upload.bat which contains commands to be executed on the compromised computer.We observed the admin@338 upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.We have previously observed the admin@338 group use BUBBLEWRAP.The LOWBALL first stage malware allows the group to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets.The admin@338 linked to China and alleged to be responsible for targeted attacks against foreign governments and ministries, has now pointed its focus inward at China autonomous territory Hong Kong.An APT gang linked to China and alleged to be responsible for targeted attacks against foreign governments and ministries, has now pointed its focus inward at China autonomous territory Hong Kong.The group targeting Hong Kong media outlets is called admin@338 and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack government and financial firms specializing in global economic policy.The agroup targeting Hong Kong media outlets is called admin@338 and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack government and financial firms specializing in global economic policy.The admin@338, active since 2008, has been seen targeting organizations in the financial services, telecoms, government, and defense sectors.The APT actor, active since 2008, has been seen targeting organizations in the financial services, telecoms, government, and defense sectors.In August 2013, FireEye reported that admin@338 had been using the Poison Ivy RAT in its operations.In March 2014, the admin@338 leveraged the disappearance of Malaysia Airlines Flight MH370 to target a government in the Asia-Pacific region and a US-based think tank.In March 2014, the group leveraged the disappearance of Malaysia Airlines Flight MH370 to target a government in the Asia-Pacific region and a US-based think tank.According to FireEye, the admin@338 sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL.According to FireEye, the attackers sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL.The admin@338's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP.Researchers have pointed out that it is not uncommon for China-based threat groups to target Hong Kong media organizations, particularly ones whose reporting focuses on the pro-democracy movement.Researchers have pointed out that it is not uncommon for admin@338 to target Hong Kong media organizations, particularly ones whose reporting focuses on the pro-democracy movement.This week the experts at FireEye discovered that a group of Chinese-based hackers called admin@338 had sent multiple MH370-themed spear phishing emails, the attackers targeted government officials in Asia-Pacific, it is likely for cyber espionage purpose.The attackers used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of government officials.The admin@338 used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of government officials.FireEye analysts documented the admin@338 group's activities in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.The spear-phishing campaign against Asian entities isn't isolated, the admin@338 also started another attack against the US-based think tank on 14th March.Our analysis has led us to conclude that APT1 is likely government-sponsored and one of the most persistent of China's cyber threat actors.FireEye said it has tracked admin@338's activity since 2013 and the group has largely targeted organizations involved in financial, economic, and trade policy.The simplest conclusion based on these facts is that APT1 is operating in China, and most likely in Shanghai.These data sets show that APT1 is either operating in China during normal Chinese business hours or that APT1 is intentionally going to painstaking lengths to look like they are.APT1 has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently.While APT1 intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT.Given the mission, resourcing, and location of PLA Unit 61398, we conclude that PLA Unit 61398 is APT1.APT1 were a highly prolific cyber-attack group operating out of China.APT1 is a China-based cyber-espionage group, active since mid-2006.APT12's targets are consistent with larger People's Republic of China (PRC) goals.Since the release of the Arbor blog post, FireEye has observed APT12 use a modified backdoor that we call HIGHTIDE.However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to APT12.From October 2012 to May 2014, FireEye observed APT12 utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server.Similar to RIPTIDE campaigns, APT12 infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158.FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while APT12 developed a completely new malware toolset.They have largely targeted organizations involved in financial, economic and trade policy, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors.A China-based cyber threat group, which FireEye tracks as an uncategorized advanced persistent threat (APT) group and other researchers refer to as admin@338, may have conducted the activity.The group previous activities against financial and policy organizations have largely focused on spear phishing emails written in English, destined for Western audiences.About four months after The New York Times publicized an attack on its network, the APT12 behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " NUMBERED PANDA " Numbered Panda has a long list of high-profile victims and is known by a number of names including: DYNCALC, IXESHE, JOY RAT, APT-12, etc.Numbered Panda has a long list of high-profile victims and is known by a number of names including: DYNCALC, IXESHE, JOY RAT, APT-12, etc.The new campaigns mark the first significant stirrings from the APT12 since it went silent in January in the wake of a detailed expose of the group and its exploits — and a retooling of what security researchers believe is a massive spying operation based in China.Between November 26, 2015, and December 1, 2015, known and suspected China-based APT16 launched several spear phishing attacks targeting Japan and Taiwan in the high-tech, government services, media and financial services industries.Between November 26, 2015, and December 1, 2015, known and suspected China-based APT groups launched several spear phishing attacks targeting Japanese and Taiwanese organizations in the high-tech, government services, media and financial services industries.On November 26, 2015, a suspected China-based APT16 sent Japanese defense policy-themed spear phishing emails to multiple Japanese financial and high-tech companies.On November 26, 2015, a suspected China-based APT group sent Japanese defense policy-themed spear phishing emails to multiple Japanese financial and high-tech companies.While attribution of the first two spear phishing attacks is still uncertain, we attribute the second December phishing campaign to the China-based APT group that we refer to as APT16.APT16 actors sent spear phishing emails to two Taiwanese media organizations.On the same date that APT16 targeted Taiwanese media, suspected Chinese APT actors also targeted a Taiwanese government agency, sending a lure document that contained instructions for registration and subsequent listing of goods on a local Taiwanese auction website.It is possible, although not confirmed, that APT16 was also responsible for targeting this government agency, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor.Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based media organizations continues to be a priority for China-based APT16.The suspected APT16 targeting of the Taiwanese government agency – in addition to the Taiwanese media organizations – further supports this possibility.APT17 was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver ".APT17, also known as DeputyDog, is a China-based threat group that FireEye Intelligence has observed conducting network intrusions against U.S. government entities, the defense industry, law firms, information technology companies, mining companies, and non-government organizations.FireEye has monitored APT17's use of BLACKCOFFEE variants since 2013 to masquerade malicious communication as normal web traffic by disguising the CnC communication as queries to web search engines.The use of BLACKCOFFEE demonstrates APT17's evolving use of public websites to hide in plain sight.TG-0416 is a stealthy and extremely successful Advanced Persistent Threat (APT) group known to target a broad range of verticals since at least 2009, including technology, industrial, manufacturing, human rights groups, government, pharmaceutical, and medical technology.The APT18 then installed the hcdLoader RAT, which installs as a Windows service and provides command line access to the compromised system.The malware used by the Wekby group has ties to the HTTPBrowser malware family, and uses DNS requests as a command and control mechanism.These URIs result in the download of an installer, which creates a PE of the malware typically known as HTTPBrowser, but called Token Control by the Wekby group themselves (based upon the PDB strings found within many of the samples).APT19 seemed to be going after defense sector firms, Chinese dissident groups and political, financial, pharmaceutical and energy sectors that could benefit the Chinese economy.APT19 seemed to be going after defense sector firms, Chinese dissident groups and other political target, as well as certain financial targets and other commercial targets in pharmaceutical and energy sectors that could benefit the Chinese economy.FANCY BEAR (also known as Sofacy or APT 28) is a separate Russian-based threat actor, which has been active since mid 2000s, and has been responsible for targeted intrusion campaigns against the Aerospace, Defense, Energy, Government and Media sectors.APT28 malware, in particular the family of modular backdoors that we call CHOPSTICK, indicates a formal code development environment.However, three themes in APT28's targeting clearly reflects areas of specific interest to an Eastern European government, most likely the Russian government.We identified three themes in APT28's lures and registered domains, which together are particularly relevant to the Russian government.Georgian military security issues, particularly with regard to U.S. cooperation and NATO, provide a strong incentive for Russian state-sponsored threat actors to steal information that sheds light on these topics.Instead, we observed the two Russian espionage groups compromise the same systems and engage separately in the theft of identical credentials.APT28's malware settings suggest that the developers have done the majority of their work in a Russian language build environment during Russian business hours, which suggests that the Russian government is APT28's sponsor.We believe that APT28's targeting of the MOD aligns with Russian threat perceptions.We assess that APT28 is most likely sponsored by the Russian government.Given the available data, we assess that APT28's work is sponsored by the Russian government.The targets were similar to a 2015 TG-4127 campaign — individuals in Russia and the former Soviet states, current and former military and government personnel in the U.S. and Europe, individuals working in the defense and government supply chain, and authors and journalists — but also included email accounts linked to the November 2016 United States presidential election.The targets of TG-4127 include military, government and defense sectors.Some of APT28's more commonly used tools are the SOURFACE downloader, its second stage backdoor EVILTOSS, and a modular family of implants that we call CHOPSTICK.While TG-4127 continues to primarily threaten organizations and individuals operating in Russia and former Soviet states, this campaign illustrates its willingness to expand its scope to other targets that have intelligence of interest to the Russian government.CTU researchers assess with moderate confidence that the group is operating from the Russian Federation and is gathering intelligence on behalf of the Russian government.This intelligence has been critical to protecting and informing our clients, exposing this threat, and strengthening our confidence in attributing APT28 to the Russian Government.Our visibility into the operations of APT28 - a group we believe the Russian Government sponsors - has given us insight into some of the government's targets, as well as its objectives and the activities designed to further them.Since at least 2007, APT28 has engaged in extensive operations in support of Russian strategic interests.APT28 espionage activity has primarily targeted entities in the U.S., Europe, and the countries of the former Soviet Union, including governments, militaries, defense attaches, media entities, and dissidents and figures opposed to the current Russian Government.APT28 espionage activity has primarily targeted entities in the U.S., Europe, and the countries of the former Soviet Union, including governments and militaries, defense attaches, media entities, and dissidents and figures opposed to the current Russian Government.Over the past two years, Russia appears to have increasingly leveraged APT28 to conduct information operations commensurate with broader strategic military doctrine.After compromising a victim organization, APT28 will steal internal data that is then leaked to further political narratives aligned with Russian interests.After compromising a political organization, APT28 will steal internal data.On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye's long held public assessment that the Russian Government sponsors APT28.In October 2014, FireEye released APT28: A Window into Russia's Cyber Espionage Operations, and characterized APT28's activity as aligning with the Russian Government's strategic intelligence requirements.In October 2014, FireEye released APT28: A Window into Russia's Cyber Espionage Operations', and characterized APT28's activity as aligning with the Russian Government's strategic intelligence requirements.APT28 targets Russian rockers and dissidents Pussy Riot via spear-phishing emails.Our investigation of APT28's compromise of WADA's network, and our observations of the surrounding events reveal how Russia sought to counteract a damaging narrative and delegitimize the institutions leveling criticism.Since releasing our 2014 report, we continue to assess that APT28 is sponsored by the Russian Government.In our 2014 report, we identified APT28 as a suspected Russian government-sponsored espionage actor.For full details, please reference our 2014 report, APT28: A Window into Russia's Cyber Espionage Operations.The espionage group, which according to the U.S. Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) is linked to the Russian government, returned to low-key intelligence-gathering operations during 2017 and into 2018, targeting a range of military and government targets in Europe and South America.The APT28, which is linked to the Russian government, returned to low-key intelligence-gathering operations during 2017 and into 2018, targeting a range of military and government targets in Europe and South America.Another attack group, Earworm (aka Zebrocy), has been active since at least May 2016 and is involved in what appears to be intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia.Several sources consider APT28 a group of CyberMercs based in Russia.The primary targets of APT28 are potential victims in several countries such as Ukraine, Spain, Russia, Romania, the United States and Canada.We have reasons to believe that the operators of the APT28 network are either Russian citizens or citizens of a neighboring country that speak Russian.Previous work published by security vendor FireEye in October 2014 suggests the group might be of Russian origin.Finally, the use of recent domestic events and a prominent US military exercise focused on deterring Russian aggression highlight APT28's ability and interest in exploiting geopolitical events for their operations.In 2013, the Sofacy group expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM, JHUHUGIT, AZZY and a few others.In 2013, the Sofacy group expanded their arsenal and added more backdoors and tools, including CORESHELL, SPLM (aka Xagent, aka CHOPSTICK), JHUHUGIT (which is built with code from the Carberp sources), AZZY (aka ADVSTORESHELL, NETUI, EVILTOSS, and spans across 4-5 generations) and a few others.The Sofacy group spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware.APT28 spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware.The group spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware.Their evolving and modified SPLM, CHOPSTICK, XAgent code is a long-standing part of Sofacy activity, however much of it is changing.FireEye has moderate confidence that a campaign targeting the hospitality sector is attributed to Russian actor APT28.APT28 is using novel techniques involving the EternalBlue exploit and the open source tool Responder to spread laterally through networks and likely target travelers.Upon gaining access to the machines connected to corporate and guest Wi-Fi networks, APT28 deployed Responder.Compared to other backdoor tools associated with the Sofacy group, the use of Zebrocy in attack campaigns is far more widespread.As alluded to in our previous blog regarding the Cannon tool, the Sofacy group (AKA Fancy Bear, APT28, STRONTIUM, Pawn Storm, Sednit) has persistently attacked various government and private organizations around the world from mid-October 2018 through mid-November 2018.Russian citizens—journalists, software developers, politicians, researchers at universities, and artists are also targeted by Pawn Storm.The JHUHUGIT implant became a relatively popular first stage for the Sofacy attacks and was used again with a Java zero-day (CVE-2015-2590) in July 2015.While the JHUHUGIT (and more recently, " JKEYSKW ") implant used in most of the Sofacy attacks, high profile victims are being targeted with another first level implant, representing the latest evolution of their AZZY Trojan.Once a foothold is established, Sofacy trys to upload more backdoors, USB stealers as well as other hacking tools such as " Mimikatz " for lateral movement.Once a foothold is established, they try to upload more backdoors, USB stealers as well as other hacking tools such as " Mimikatz " for lateral movement.The Sofacy threat group continues to target government organizations in the EU, US, and former Soviet states to deliver the Zebrocy tool as a payload.Of note, we also discovered the Sofacy group using a very similar delivery document to deliver a new Trojan called Cannon.Komplex shares a significant amount of functionality and traits with another tool used by Sofacy – the Carberp variant that Sofacy had used in previous attack campaigns on systems running Windows.The Sofacy group created the Komplex Trojan to use in attack campaigns targeting the OS X operating system – a move that showcases their continued evolution toward multi-platform attacks.The Komplex Trojan revealed a design similar to Sofacy's Carberp variant Trojan, which we believe may have been done in order to handle compromised Windows and OS X systems using the same C2 server application with relative ease.This whitepaper explores the tools - such as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, etc- of the Dukes, a well-resourced, highly dedicated and organized cyberespionage group that we believe has been working for the Russian Federation since at least 2008 to collect intelligence in support of foreign and security policy decision-making.The Dukes are a well-resourced, highly dedicated and organized cyberespionage group that we believe has been working for the Russian Federation since at least 2008 to collect intelligence in support of foreign and security policy decision-making.The Dukes are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke.The origins of the Duke toolset names can be traced back to when researchers at Kaspersky Labs coined the term " MiniDuke " to identify the first Duke-related malware they found.As researchers continued discovering new toolsets that were created and used by the same group that had been operating MiniDuke, and thus the threat actor operating the toolsets started to be commonly referred to as " Dukes ".Based on the campaign identifiers found in PinchDuke samples discovered from 2009, the targets of the Dukes group during that year included organizations such as the Ministry of Defense of Georgia and the ministries of foreign affairs of Turkey and Uganda.Importantly, PinchDuke trojan samples always contain a notable text string, which we believe is used as a campaign identifier by the Dukes group to distinguish between multiple attack campaigns that are run in parallel.This neatly ties together many of the tools used by the Dukes group, as versions of this one loader have been used to load malware from three different Dukes-related toolsets CosmicDuke, PinchDuke, and MiniDuke – over the course of five years.The Dukes continued the expansion of their arsenal in 2011 with the addition of two more toolsets: MiniDuke and CozyDuke.As we now know, by February 2013 the Dukes group had been operating MiniDuke and other toolsets for at least 4 and a half years.Secondly, the value the Dukes intended to gain from these MiniDuke campaigns may have been so great that they deemed it worth the risk of getting noticed.This is in stark contrast to some other suspected Russian threat actors (such as Operation Pawn Storm) who appear to have increased their targeting of Ukraine following the crisis.The Dukes actively targeted Ukraine before the crisis, at a time when Russia was still weighing her options, but once Russia moved from diplomacy to direct action, Ukraine was no longer relevant to the Dukes in the same way.In the latter case however, the Dukes group appear to have also simultaneously developed an entirely new loader, which we first observed being used in conjunction with CosmicDuke during the spring of 2015.The Dukes could have ceased all use of CosmicDuke (at least until they had developed a new loader) or retired it entirely, since they still had other toolsets available.For these CozyDuke campaigns however, the Dukes appear to have employed two particular later-stage toolsets, SeaDuke and HammerDuke.Firstly, as with the MiniDuke campaigns of February 2013 and CosmicDuke campaigns in the summer of 2014, again the group clearly prioritized the continuation of their operations over maintaining stealth.In addition to the notably overt and large-scale campaigns with CozyDuke and CloudDuke, the Dukes also continued to engage in more covert, surgical campaigns using CosmicDuke.We are however only aware of one instance - the exploitation of CVE-2013-0640 to deploy MiniDuke - where we believe the exploited vulnerability was a zero-day at the time that the group acquired the exploit.All of the available evidence however does in our opinion suggest that the group operates on behalf of the Russian Federation.This assertion of time zone is also supported by timestamps found in many GeminiDuke samples, which similarly suggest the group work in the Moscow Standard Time timezone, as further detailed in the section on the technical analysis of GeminiDuke.Mandiant has observed Russian nation-state attackers APT29 employing domain fronting techniques for stealthy backdoor access to victim environments for at least two years.APT29 has used The Onion Router and the TOR domain fronting plugin meek to create a hidden, encrypted network tunnel that appeared to connect to Google services over TLS.Mandiant has observed APT29 using a stealthy backdoor that we call POSHSPY.Mandiant has since identified POSHSPY in several other environments compromised by APT29 over the past two years.In the investigations Mandiant has conducted, it appeared that APT29 deployed POSHSPY as a secondary backdoor for use if they lost access to their primary backdoors.POSHSPY is an excellent example of the skill and craftiness of APT29.FireEye assesses that APT32 leverages a unique suite of fully-featured malware, in conjunction with commercially-available tools, to conduct targeted operations that are aligned with Vietnamese state interests.In addition to focused targeting of the private sector with ties to Vietnam, APT32 has also targeted foreign governments, as well as Vietnamese dissidents and journalists since at least 2013.From 2016 through 2017, two subsidiaries of U.S. and Philippine consumer products corporations, located inside Vietnam, were the target of APT32 intrusion operations.From 2016 through 2017, two consumer products corporations, located inside Vietnam, were the target of APT32 intrusion operations.In 2014, APT32 leveraged a spear-phishing attachment titled " Plans to crackdown on protesters at the Embassy of Vietnam.exe, " which targeted dissident activity among the Vietnamese diaspora in Southeast Asia.In 2015 and 2016, two Vietnamese media outlets were targeted with malware that FireEye assesses to be unique to APT32.In 2014, APT32 leveraged a spear-phishing attachment titled " Plans to crackdown on protesters at the Embassy of Vietnam.exe ".Since at least 2014, FireEye has observed APT32 targeting foreign corporations with a vested interest in Vietnam's manufacturing, consumer products, and hospitality sectors.APT32 operations are characterized through deployment of signature malware payloads including WINDSHIELD, KOMPROGO, SOUNDBITE, and PHOREAL.In 2017, social engineering content in lures used by the actor provided evidence that they were likely used to target members of the Vietnam diaspora in Australia as well as government employees in the Philippines.APT32 often deploys these backdoors along with the commercially-available Cobalt Strike BEACON backdoor.APT32 often deploys these backdoors along with the commercially-available Cobalt Strike backdoor.Based on incident response investigations, product detections, and intelligence observations along with additional publications on the same operators, FireEye assesses that APT32 is a cyber espionage group aligned with Vietnamese government interests.OceanLotus, also known as APT32, is believed to be a Vietnam-based APT group that has become increasingly sophisticated in its attack tactics, techniques, and procedures (TTPs).While Volexity does not typically engage in attempting attribution of any threat actor, Volexity does agree with previously reported assessments that OceanLotus is likely operating out of Vietnam.During that phase, the APT32 operated a fileless PowerShell-based infrastructure, using customized PowerShell payloads taken from known offensive frameworks such as Cobalt Strike, PowerSploit and Nishang.However, over the past few years, we have been tracking a separate, less widely known suspected Iranian group with potential destructive capabilities, whom we call APT33.Our analysis reveals that APT33 is a capable group that has carried out cyber espionage operations since at least 2013.We assess APT33 works at the behest of the Iranian government.APT33 has targeted organizations – spanning multiple industries – headquartered in the United States, Saudi Arabia and South Korea.Cybereason also attributes the recently reported Backdoor.Win32.Denis to the OceanLotus Group, which at the time of this report's writing, had not been officially linked to this threat actor.APT33 has shown particular interest in organizations in the aviation sector, as well as organizations in the energy sector with ties to petrochemical production.From mid-2016 through early 2017, APT33 compromised a U.S. organization in the aerospace sector and targeted a business conglomerate located in Saudi Arabia with aviation holdings.From mid-2016 through early 2017, APT33 compromised organizations located in Saudi Arabia and U.S. in the aerospace sector.During the same time period, APT33 also targeted companies in South Korea involved in oil refining and petrochemicals.More recently, in May 2017, APT33 appeared to target a Saudi organization and a South Korean business conglomerate using a malicious file that attempted to entice victims with job vacancies for a Saudi Arabian petrochemical company.More recently, in May 2017, APT33 appeared to target organizations in Saudi and South Korea using a malicious file that attempted to entice victims with job vacancies.We assess the targeting of multiple companies with aviation-related partnerships to Saudi Arabia indicates that APT33 may possibly be looking to gain insights on Saudi Arabia's military aviation capabilities to enhance Iran's domestic aviation capabilities or to support Iran's military and strategic decision making vis a vis Saudi Arabia.APT33 may possibly be looking to gain insights on Saudi Arabia's military aviation capabilities to enhance Iran's domestic aviation capabilities or to support Iran's military and strategic decision making vis a vis Saudi Arabia.The generalized targeting of organizations involved in energy and petrochemicals mirrors previously observed targeting by other suspected Iranian threat groups, indicating a common interest in the sectors across Iranian actors.APT33 sent spear phishing emails to employees whose jobs related to the aviation industry.APT33 registered multiple domains that masquerade as Saudi Arabian aviation companies and Western organizations that together have partnerships to provide training, maintenance and support for Saudi's military and commercial fleet.We identified APT33 malware tied to an Iranian persona who may have been employed by the Iranian government to conduct cyber threat activity against its adversaries.APT33's targeting of organizations involved in aerospace and energy most closely aligns with nation-state interests, implying that the threat actor is most likely government sponsored.APT33 leverages popular Iranian hacker tools and DNS servers used by other suspected Iranian threat groups.This coupled with the timing of operations – which coincides with Iranian working hours – and the use of multiple Iranian hacker tools and name servers bolsters our assessment that APT33 may have operated on behalf of the Iranian government.The publicly available backdoors and tools utilized by APT33 – including NANOCORE, NETWIRE, and ALFA Shell – are all available on Iranian hacking websites, associated with Iranian hackers, and used by other suspected Iranian threat groups.APT33's focus on aviation may indicate the group's desire to gain insight into regional military capabilities to enhance Iran's aviation capabilities or to support Iran's military and strategic decision making.Specifically, the targeting of organizations in the aerospace and energy sectors indicates that the APT33 is likely in search of strategic intelligence capable of benefitting a government or military sponsor.APT33's focus on aviation may indicate the group's desire to gain insight into regional military aviation capabilities to enhance Iran's aviation capabilities or to support Iran's military and strategic decision making.We expect APT33 activity will continue to cover a broad scope of targeted entities, and may spread into other regions and sectors as Iranian interests dictate.The Elfin espionage group (aka APT33) has remained highly active over the past three years, attacking at least 50 organizations in Saudi Arabia, the United States, and a range of other countries.On May 16, 2019 FireEye's Advanced Practices team attributed the remaining " suspected APT33 activity " (referred to as GroupB in this blog post) to APT33, operating at the behest of the Iranian government.The Elfin group (aka APT33) has remained highly active over the past three years, attacking at least 50 organizations in Saudi Arabia, the United States, and a range of other countries.On May 16, 2019 FireEye's Advanced Practices team attributed the remaining " suspected APT33 activity " to APT33, operating at the behest of the Iranian government.APT37 has likely been active since at least 2012 and focuses on targeting the public and private sectors primarily in South Korea.In 2017, APT37 expanded its targeting beyond the Korean peninsula to include Japan, Vietnam and the Middle East, and to a wider range of industry verticals, including chemicals, electronics, manufacturing, aerospace, automotive and healthcare entities.In 2017, APT37 targeted a company in Middle East that entered into a joint venture with the North Korean government to provide telecommunications service to the country.While not conclusive by itself, the use of publicly available Iranian hacking tools and popular Iranian hosting companies may be a result of APT33's familiarity with them and lends support to the assessment that APT33 may be based in Iran.North Korean defector and human rights-related targeting provides further evidence that APT37 conducts operations aligned with the interests of North Korea.In 2017, APT37 targeted a Middle Eastern company that entered into a joint venture with the North Korean government to provide telecommunications service to the country (read on for a case study).APT37 targeted a research fellow, advisory member, and journalist associated with different North Korean human rights issues and strategic organizations.APT37 distributed SLOWDRIFT malware using a lure referencing the Korea Global Forum against academic and strategic institutions located in South Korea.We believe a organization located in Middle East was targeted by APT37 because it had been involved with a North Korean company and a business deal went bad.In one instance, APT37 weaponized a video downloader application with KARAE malware that was indiscriminately distributed to South Korean victims through torrent websites.FireEye confirmed that since at least November 2017, APT37 exploited a zero-day Adobe Flash vulnerability, CVE-2018-4878, to distribute DOGCALL malware to South Korean victims.FireEye iSIGHT Intelligence confirmed that since at least November 2017, APT37 exploited a zero-day Adobe Flash vulnerability, CVE-2018-4878, to distribute DOGCALL malware to South Korean victims.In April 2017, APT37 targeted South Korean military and government organizations with the DOGCALL backdoor and RUHAPPY wiper malware.It is possible that APT37's distribution of KARAE malware via torrent websites could assist in creating and maintaining botnets for future distributed denial-of-service (DDoS) attacks, or for other activity such as financially motivated campaigns or disruptive operations.We assess with high confidence that APT37 acts in support of the North Korean government and is primarily based in North Korea.The compilation times of APT37 malware is consistent with a developer operating in the North Korea time zone (UTC +8:30) and follows what is believed to be a typical North Korean workday.The majority of APT37 activity continues to target South Korea, North Korean defectors, and organizations and individuals involved in Korean Peninsula reunification efforts.Similarly, APT37 targeting of a company located in Middle East in 2017 is also consistent with North Korean objectives given the entity's extensive relationships inside North Korea.Similarly, APT37 targeting of a Middle Eastern company in 2017 is also consistent with North Korean objectives given the entity's extensive relationships inside North Korea.In May 2017, APT37 used a bank liquidation letter as a spear phishing lure against a board member of a Middle Eastern financial company.Though they have primarily tapped other tracked suspected North Korean teams to carry out the most aggressive actions, APT37 is an additional tool available to the regime, perhaps even desirable for its relative obscurity.ScarCruft is a relatively new APT group, victims have been observed in Russia, Nepal, South Korea, China, India, Kuwait and Romania.Certain details, such as using the same infrastructure and targeting, make us believe that Operation Daybreak is being done by the ScarCruft APT group.Prior to the discovery of Operation Daybreak, we observed the ScarCruft APT launching a series of attacks in Operation Erebus.Operation Daybreak appears to have been launched by unknown attackers to infect high profile targets through spear-phishing e-mails.Operation Daybreak appears to have been launched by APT37 to infect high profile targets through spear-phishing e-mails.On occasion the APT37 directly included the ROKRAT payload in the malicious document and during other campaigns the attackers leveraged multi-stage infection processes.In the early part of 2017, Group123 started the " Evil New Year " campaign.In November 2017, Talos observed the latest Group123 campaign of the year, which included a new version of ROKRAT being used in the latest wave of attacks.Group123 is constantly evolving as the new fileless capability that was added to ROKRAT demonstrates.In this campaign, the Group123 used a classical HWP document in order to download and execute a previously unknown malware: NavRAT.However, we asses with medium confidence that NavRAT is linked to Group123.APT38 is a financially motivated North Korean regime-backed group responsible for conducting destructive attacks against financial institutions, as well as some of the world's largest cyber heists.APT38 is a financially motivated North Korean regime-backed group responsible for conducting destructive attacks against financial institutions, as well as some of the world.APT38 is believed to operate more similarly to an espionage operation, carefully conducting reconnaissance within compromised financial institutions and balancing financially motivated objectives with learning about internal systems.The group has compromised more than 16 organizations in at least 13 different countries, sometimes simultaneously, since at least 2014.APT38 shares malware code and other development resources with TEMP.Hermit North Korean cyber espionage activity, although we consider APT38.We consider APT38's operations more global and highly specialized for targeting the financial sector.APT38 is a financially motivated group linked to North Korean cyber espionage operators, renown for attempting to steal hundreds of millions of dollars from financial institutions and their brazen use of destructive malware.Because APT38 is backed by (and acts on behalf of) the North Korean regime, we opted to categorize the group as an " APT " instead of a " FIN ".Over time these malware similarities diverged, as did targeting, intended outcomes, and TTPs, almost certainly indicating that TEMP.Hermit activity is made up of multiple operational groups primarily linked together with shared malware development resources and North Korean state sponsorship.Based on observed activity, we judge that APT38's primary mission is targeting financial institutions and manipulating inter-bank financial systems to raise large sums of money for the North Korean regime.Since 2015, APT38 has attempted to steal hundreds of millions of dollars from financial institutions.APT38 has pursued their main objective of targeting banks and financial entities since at least 2014.We surmise that the targeting of banks, media, and government agencies is conducted in support of APT38's primary mission.The APT38 targeted news outlets known for their business and financial sector reporting, probably in support of efforts to identify and compromise additional financial institutions.APT38 also targeted financial transaction exchange companies likely because of their proximity to banks.Given the lapse in time between the spear-phishing and the heist activity in the above example, we suggest two separate but related groups under the North Korean regime were responsible for carrying out missions; one associated with reconnaissance (TEMP.Hermit or a related group) and another for the heists (APT38).APT38, in particular, is strongly distinguishable because of its specific focus on financial institutions and operations that attempt to use SWIFT fraud to steal millions of dollars at a time.We can confirm that the APT38 operator activity is linked to the North Korean regime, but maintains a set of common characteristics, including motivation, malware, targeting, and TTPs that set it apart from other statesponsored operations.As previously mentioned, we assess with high confidence that APT38's mission is focused on targeting financial institutions to raise money for the North Korean regime.As previously mentioned, we assess with high confidence that APT38's mission is focused on targeting financial institutions and financial systems to raise money for the North Korean regime.Although the APT38's primary targets appear to be Financial Exchange banks and other financial organizations, they have also Financial Exchange targeted countries' media organizations with a focus on the financial sector.Since at least the beginning of 2014, APT38 operations have focused almost exclusively on developing and conducting financially motivated campaigns targeting international entities, whereas TEMP.Hermit is generally linked to operations focused on South Korea and the United States.TEMP.Hermit is generally linked to operations focused on South Korea and the United States.While North Korean cyber operations against specific countries may have been driven by diplomatic factors and perceived insults against Pyongyang, the application of increasingly restrictive and numerous financial sanctions against North Korea probably contributed to the formation of APT38.APT38's operations began in February 2014 and were likely influenced by financial sanctions enacted in March 2013 that blocked bulk cash transfers and restricted North Korea's access to international banking systems.APT37 (Reaper), another North Korean state-sponsored group, targeted a Middle Eastern financial company, but there was no evidence of financial fraud.APT37, another North Korean state-sponsored group, targeted a Middle Eastern financial company, but there was no evidence of financial fraud.Early APT38 operations suggest that the group began targeting financial institutions with an intent to manipulate financial transaction systems at least as early as February 2014, although we did not observe fraudulent transactions until 2015.We do not have evidence that the earliest targeted financial institutions were victimized by fraudulent transactions before APT38 left the compromised environments, possibly indicating that APT38 was conducting reconnaissance-only activity at that time.In early 2014, the APT38 deployed NESTEGG (a backdoor) and KEYLIME (a keylogger) malware designed to impact financial institution-specific systems at a Southeast Asian bank.In early 2014, the APT38 deployed NESTEGG (a backdoor) and KEYLIME (a keylogger) malware designed to impact financial institution-specific systems at a Southeast Asian bank.From November 2015 through the end of 2016, APT38 was involved in at least nine separate compromises against banks.Per the complaint, the email account [email protected] was used to send LinkedIn invitations to employees of a bank later targeted by APT38.Further, the recent DOJ complaint provides insight into initial compromise techniques conducted by North Korean operators against APT38 targets, which may have been leveraged as part of the initial compromise into the targeted organizations.This is corroborated by our identification of TEMP.Hermit's use of MACKTRUCK at a bank, preceding the APT38 operation targeting the bank's SWIFT systems in late 2015.APT38 relies on DYEPACK, a SWIFT transaction-hijacking framework, to initiate transactions, steal money, and hide any evidence of the fraudulent transactions from the victimized bank.The APT38 uses DYEPACK to manipulate the SWIFT transaction records and hide evidence of the malicious transactions, so bank personnel are none the wiser when they review recent transactions.During this heist, APT38 waited for a holiday weekend in the respective countries to increase the likelihood of hiding the transactions from banking authorities.During one reported incident, APT38 caused an outage in the bank's essential services.We attribute APT38 to North Korean state-sponsored operators based on a combination of technical indicators linking the activity to Pyongyang and details released by DOJ implicating North Korean national Park Jin Hyok in a criminal conspiracy.As detailed in the DOJ complaint, a sample of WHITEOUT malware we attribute to APT38 was used between 2015 and 2016 against a Southeast Asian bank.APT38's increasingly aggressive targeting against banks and other financial institutions has paralleled North Korea's worsening financial condition.APT38's increasingly aggressive targeting against banks and other financial institutions has paralleled North Korea's worsening financial condition.APT38's increasingly aggressive targeting against banks and other financial institutions has paralleled North Korea's worsening financial condition.Malware overlaps between APT38 and TEMP.Hermit highlight the shared development resources accessible by multiple operational groups linked to North Korean state-sponsored activity.APT39 has prioritized the telecommunications sector, with additional targeting of the travel industry and IT firms that support it and the high-tech industry.This is evidence of shared motivation and intent to target the SWIFT system by the North Korean operators performing the reconnaissance and APT38 which later targeted that organization.Although APT38 is distinct from other TEMP.Hermit activity, both groups operate consistently within the interests of the North Korean state.Based on details published in the DOJ complaint against North Korean programmer Park Jin Hyok, we know that APT38 and other cyber operators linked to TEMP.Hermit are associated with Lab 110, an organization subordinate to or synonymous with the 6th Technical Bureau in North Korea.As detailed in the DOJ complaint, a sample of WHITEOUT (aka Contopee) malware we attribute to APT38 was used between 2015 and 2016 against a Southeast Asian bank.Based on details published in the DOJ complaint against North Korean programmer Park Jin Hyok, we know that APT38 and other cyber operators linked to TEMP.Hermit are associated with Lab 110, an organization subordinate to or synonymous with the 6th Technical Bureau in North Korea's Reconnaissance General Bureau (RGB).APT38.As detailed in the DOJ complaint, a sample of WHITEOUT (aka Contopee) malware we attribute to APT38 was used between 2015 and 2016 against a Southeast Asian bank.APT38's targeting of financial institutions is most likely an effort by the North Korean government to supplement their heavily-sanctioned economy.We have moderate confidence APT39 operations are conducted in support of Iranian national interests based on regional targeting patterns focused in the Middle East.APT39's focus on the widespread theft of personal information sets it apart from other Iranian groups FireEye tracks, which have been linked to influence operations, disruptive attacks, and other threats.APT39's focus on the telecommunications and travel industries suggests intent to perform monitoring, tracking, or surveillance operations against specific individuals, collect proprietary or customer data for commercial or operational purposes that serve strategic requirements related to national priorities, or create additional accesses and vectors to facilitate future campaigns.Other groups attributed to Iranian attackers, such as Rocket Kitten, have targeted Iranian individuals in the past, including anonymous proxy users, researchers, journalists, and dissidents.Remexi is a basic back door Trojan that allows Cadelle to open a remote shell on the computer and execute commands.Remexi is a basic back door Trojan that allows attackers to open a remote shell on the computer and execute commands.One group, which we call Cadelle, uses Backdoor.Cadelspy, while the other, which we've named Chafer, uses Backdoor.Remexi and Backdoor.Remexi.B.APT39 facilitates lateral movement through myriad tools such as Remote Desktop Protocol (RDP), Secure Shell (SSH), PsExec, RemCom, and xCmdSvc.The APT39 were using an improved version of Remexi in what the victimology suggests might be a domestic cyber-espionage operation.A well-funded, highly active group of Middle Eastern hackers was caught, yet again, using a lucrative zero-day exploit in the wild to break into computers and infect them with powerful spyware developed by an infamous cyberweapons dealer named Gamma Group.A well-funded, highly active BlackOasis group of Middle Eastern hackers was caught, yet again, using a lucrative zero-day exploit in the wild to break into computers and infect them with powerful spyware developed by an infamous cyberweapons dealer named Gamma Group.The Middle Eastern hacker group in this case is codenamed " BlackOasis ".Kaspersky found the BlackOasis group was exploiting a Adobe Flash Player zero-day vulnerability (CVE-2016-4117) to remotely deliver the latest version of " FinSpy " malware, according to a new blog post published Monday.Kaspersky found the group was exploiting a Adobe Flash Player zero-day vulnerability (CVE-2016-4117) to remotely deliver the latest version of " FinSpy " malware, according to a new blog post published Monday.BlackOasis' interests span a wide gamut of figures involved in Middle Eastern politics.REDBALDKNIGHT, also known as BRONZE BUTLER and Tick, is a cyberespionage group known to target Japanese organizations such as government agencies (including defense) as well as those in biotechnology, electronics manufacturing, and industrial chemistry.REDBALDKNIGHT, also known as BRONZE BUTLER and Tick, is a cyberespionage group known to target Japan such as government agencies as well as those in biotechnology, electronics manufacturing, and industrial chemistry.In fact, REDBALDKNIGHT has been targeting Japan as early as 2008, based on the file properties of the decoy documents they've been sending to their targets.In fact, REDBALDKNIGHT has been zeroing in on Japanese organizations as early as 2008 — at least based on the file properties of the decoy documents they've been sending to their targets.Secureworks® incident responders and Counter Threat Unit™ (CTU) researchers investigated activities associated with the BRONZE BUTLER (also known as Tick) threat group, which likely originates in the People.Targeting data supports the belief that APT39's key mission is to track or monitor targets of interest, collect personal information, including travel itineraries, and gather customer data from telecommunications firms.BRONZE BUTLER has used a broad range of publicly available (Mimikatz and gsecdump) and proprietary (Daserf and Datper) tools.BRONZE BUTLER are also fluent in Japanese, crafting phishing emails in native Japanese and operating successfully within a Japanese-language environment.BRONZE BUTLER has demonstrated the ability to identify a significant zero-day vulnerability within a popular Japanese corporate tool and then use scan-and-exploit techniques to indiscriminately compromise Japanese Internet-facing enterprise systems.The group has demonstrated the ability to identify a significant zero-day vulnerability within a popular Japanese corporate tool and then use scan-and-exploit techniques to indiscriminately compromise Japanese Internet-facing enterprise systems.BRONZE BUTLER has used phishing emails with Flash animation attachments to download and execute Daserf malware, and has also leveraged Flash exploits for SWC attacks.The group has used phishing emails with Flash animation attachments to download and execute Daserf malware, and has also leveraged Flash exploits for SWC attacks.BRONZE BUTLER uses credential theft tools such as Mimikatz and WCE to steal authentication information from the memory of compromised hosts.While investigating a 2016 intrusion, Secureworks identified BRONZE BUTLER exploiting a then-unpatched remote code execution vulnerability (CVE-2016-7836) in SKYSEA Client View, a popular Japanese product used to manage an organization.While investigating a 2016 intrusion, Secureworks incident responders identified BRONZE BUTLER exploiting a then-unpatched remote code execution vulnerability (CVE-2016-7836) in SKYSEA Client View, a popular Japanese product used to manage an organization.Several xxmm samples analyzed by CTU researchers incorporate Mimikatz, allowing BRONZE BUTLER to issue Mimikatz commands directly from xxmm.BRONZE BUTLER compromises organizations to conduct cyberespionage, primarily focusing on Japan.Symantec discovered the most recent wave of Tick attacks in July 2015, when the group compromised three different Japanese websites with a Flash (.swf) exploit to mount watering hole attacks.Carbanak is a remote backdoor (initially based on Carberp), designed for espionage, data exfiltration and to provide remote access to infected machines.Symantec discovered the most recent wave of Tick attacks in July 2015, when BRONZE BUTLER compromised three different Japanese websites with a Flash (.swf) exploit to mount watering hole attacks.In some cases, the attackers used the Society for Worldwide Interbank Financial Telecommunication (SWIFT) network to transfer money to their accounts.Carbanak is a backdoor used by the attackers to compromise the victim.If found on the target system, Carbanak will try to exploit a known vulnerability in Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows 8, and Windows Server 2012, CVE-2013-3660, for local privilege escalation.To enable connections to the infected computer using the Remote Desktop Protocol (RDP), Carbanak sets Termservice service execution mode to Auto.Carbanak is also aware of the IFOBS banking application and can, on command, substitute the details of payment documents in the IFOBS system.Sensitive bank documents have be found on the servers that were controlling Carbanak.Existing telemetry indicates that the Carbanak attackers are trying to expand operations to other Baltic and Central Europe countries, the Middle East, Asia and Africa.FIN7 is a financially-motivated threat group that has been associated with malicious operations dating back to late 2015.As with previous campaigns, and as highlighted in our annual M-Trends 2017 report, FIN7 is calling stores at targeted organizations to ensure they received the email and attempting to walk them through the infection process.We believe that the Carbanak campaign is a clear indicator of a new era in cybercrime in which criminals use APT techniques directly against the financial industry instead of through its customers.While FIN7 has embedded VBE as OLE objects for over a year, they continue to update their script launching mechanisms.This report describes the details and type of operations carried out by Carbanak that focuses on financial industry, such as payment providers, retail industry and PR companies.Carbanak has its origin in more common financial fraud including theft from consumer and corporate bank accounts in Europe and Russia, using standard banking malware, mainly Carberp.The group has its origin in more common financial fraud including theft from consumer and corporate bank accounts in Europe and Russia, using standard banking malware, mainly Carberp.From 2013 Carbanak intensified its activity focused on banks and electronic payment systems in Russia and in the post-Soviet space.Since 2013 Carbanak has successfully gained access to networks of more than 50 banks and 5 payment systems.The first successful bank robbery was committed by this group in January 2013.To reduce the risk of losing access to the internal bank network, the Carbanak, in addition to malicious programs, also used for remote access legitimate programs such as Ammy Admin and Team Viewer.We have no evidence of compromises against banks in Western Europe or United States, but it should be noted that the attackers methods could be utilized against banks outside of Russia as well.Additionally the reports on Carbanak show a different picture, where banks targeted outside of Russia, specifically Europe, USA and Japan are mentioned, which does not match our research.Without any insight into the evidence Kaspersky has obtained, we can only repeat our view that Anunak has targeted only banks in Russia and we have no concrete reports of compromised banks outside of Russia directly related to this criminal group.Charming Kitten is an Iranian cyberespionage group operating since approximately 2014.These attacks have included criminal groups responsible for the delivery of NewPosThings, MalumPOS and PoSeidon point of sale Malware, as well as Carbanak from the Russian criminal organization we track as Carbon Spider.The Charming Kitten' focus appears to be individuals of interest to Iran in the fields of academic research.Sometimes, they aim at establishing a foothold on the target's computer to gain access into their organization, but, based on our data, this is usually not their main objective, as opposed to other Iranian threat groups, such as OilRig and CopyKittens.Flying Kitten (which is another name given by the security industry to Charming Kitten) was one of the first groups to be described as a coherent threat actor conducting operations against political opponents of the IRI (Islamic Republic of Iran) government and foreign espionage targets.Flying Kitten was one of the first groups to be described as a coherent threat actor conducting operations against political opponents of government and foreign espionage targets.At certain times, Mesri has been a member of an Iran-based hacking group called the Turk Black Hat security team ".During intense intelligence gathering over the last 24 months, we observed the technical capabilities of the Operation Cleaver team rapidly evolve faster than any previously observed Iranian effort.TinyZBot is a bot written in C#and developed by the Cleaver team.Some of the teams publicly known today include Iranian Cyber Army, Ashiyane, Islamic Cyber Resistance Group, Izz ad-Din al-Qassam Cyber Fighters, Parastoo, Shabgard, Iran Black Hats and many others 9.However, even though the TTPs of the Cleaver team have some overlap to techniques used by Iranian Cyber Army (botnets), Ashiyane (SQL injection) and Syrian Electronic Army (phishing), we believe this is largely the work of a new team.The Cobalt group's traditional " stomping grounds " are the Eastern Europe, Central Asia, and Southeast Asia.Against targets in the CIS countries, the Cobalt also used their own infrastructure, which included rented dedicated servers.In several cases, the Cobalt compromised company infrastructure and employee accounts in order to send phishing messages to partner companies in North and South America, Europe, CIS countries, and Central and Southeast Asia.To ensure remote access to the workstation of an employee at a target organization, the Cobalt group (as in previous years) uses Beacon, a Trojan available as part of commercial penetration testing software.Artifacts indicated the involvement of the Cobalt that, according to Positive Technologies information, from August to October had performed similar successful attacks in Eastern Europe, and it's likely that this group may will soon become active in the West.In a recent spear-phishing campaign, the Cobalt Hacking Group used a remote code execution vulnerability in Microsoft Office software to connect to its command and control server via Cobalt Strike.The basic principles of targeted attacks on financial institutions have not changed since 2013 when the Anunak, Corkow, Buhtrap, and Lurk groups began conducting the first attacks on Russian banks.In a recent spear-phishing campaign, the Cobalt Group used a known CVE to connect to its C&C server via Cobalt Strike, but ended up revealing all targets.This isn't the first time we've seen Cobalt makes this error—back in March, an attack focussing on 1,880 targets across financial institutions in Kazakhstan had the same flaw.The Carbanak attacks targeting over a 100 financial institutions worldwide.The leader of the crime gang behind the Carbanak and Cobalt malware attacks targeting over a 100 financial institutions worldwide has been arrested in Alicante, Spain, after a complex investigation conducted by the Spanish National Police.Since 2013, the Cobalt have attempted to attack banks and financial institutions using pieces of malware they designed.Since 2013, the cybercrime gang have attempted to attack banks, e-payment systems and financial institutions using pieces of malware they designed, known as Carbanak and Cobalt.The organised crime group started its high-tech criminal activities in late 2013 by launching the Anunak malware campaign that targeted financial transfers and ATM networks of financial institutions around the world.One of the Cobalt Group's latest campaigns, an attack that leads to a Cobalt Strike beacon and to JavaScript backdoor, was investigated and presented by the Talos research team.The Cobalt started its high-tech criminal activities in late 2013 by launching the Anunak malware campaign that targeted financial transfers and ATM networks of financial institutions around the world.The Cobalt group misused Cobalt Strike, for instance, to perpetrate ATM cyber heists and target financial institutions across Europe, and interestingly, Russia.The hacking group misused Cobalt Strike, for instance, to perpetrate ATM cyber heists and target financial institutions across Europe, and interestingly, Russia.If successful, Cobalt goes on to attack financial institutions outside the country.The vulnerability was used to retrieve and execute Cobalt Strike from a remote server they controlled.As part of our monitoring of Iranian threat agents activities, we have detected that since October 2016 and until the end of January 2017, the Jerusalem Post, as well as multiple other Israeli websites and one website in the Palestinian Authority were compromised by Iranian threat agent CopyKittens.CopyKittens use several self-developed malware and hacking tools that have not been publicly reported to date, and are analyzed in this report: TDTESS backdoor; Vminst, a lateral movement tool; NetSrv, a Cobalt Strike loader; and ZPP, a files compression console program.CopyKittens often uses the trial version of Cobalt Strike, a publicly available commercial software for " Adversary Simulations and Red Team Operations ".Other public tools used by the CopyKittens are Metasploit, a well-known free and open source framework for developing and executing exploit code against a remote target machine; Mimikatz, a post-exploitation tool that performs credential dumping; and Empire, a PowerShell and Python post-exploitation agent.The group, which we have given the name Gallmaker, has been operating since at least December 2017, with its most recent activity observed in June 2018.Rather, the Gallmaker's attack activity we observed is carried out exclusively using LotL tactics and publicly available hack tools.Gallmaker used lure documents attempt to exploit the Microsoft Office Dynamic Data Exchange (DDE) protocol in order to gain access to victim machines.Should a user enable this content, the attackers are then able to use the DDE protocol to remotely execute commands in memory on the victim's system.Back in 2013, CopyKittens used several Facebook profiles to spread links to a website impersonating Haaretz news, an Israeli newspaper.Gallmaker's activity appears to be highly targeted, with its victims all related to government, military, or defense sectors.Gallmaker's targets are embassies of an Eastern European country.There are no obvious links between the Eastern European and Middle Eastern targets, but it is clear that Gallmaker is specifically targeting the defense, military, and government sectors.The group has carried out attacks most months since December 2017.Its activity subsequently increased in the second quarter of 2018, with a particular spike in April 2018.The fact that Gallmaker appears to rely exclusively on LotL tactics and publicly available hack tools makes its activities extremely hard to detect.The Gamaredon Group primarily makes use of compromised domains, dynamic DNS providers, Russian and Ukrainian country code top-level domains (ccTLDs), and Russian hosting providers to distribute their custom-built malware.Gallmaker may well have continued to avoid detection were it not for Symantec's technology.In this instance, Symantec identified the specific PowerShell commands used by Gallmaker as being suspicious, leading to the discovery of this new campaign.Without Symantec's advanced AI-based capabilities, Gallmaker's activities may well have remained undetected.Previously, LookingGlass reported on a campaign they named " Operation Armageddon ", targeting individuals involved in the Ukrainian military and national security establishment.The earliest discovered sample (based on compile times and sandbox submission times) distributed by this threat group resembles the descriptions of Gamaredon provided by Symantec and Trend Micro.The scripts would also use wget to send POST requests to command and control (C2) servers that would contain information about the compromised system.These VNC exectuables would either be included in the SFX file or downloaded by the batch script.The batch script would then attempt to have the VNC program connect to a command and control (C2) server to enable the server to control the compromised system.While the most recent samples observed still use batch scripts and SFX files, the Gamaredon Group has moved away from applications like wget, Remote Manipulator Tool, VNC and ChkFlsh.exe.The threat group using these implants has been active since at least 2014 and has been seen targeting individuals likely involved in the Ukrainian government.Some of the samples share delivery mechanisms and infrastructure with samples which are detected by a few antivirus vendors as Gamaredon.Periodically, researchers at Palo Alto Networks hunt through WildFire execution reports, using AutoFocus, to identify untagged samples' artifacts in the hopes of identifying previously undiscovered malware families, behaviors, and campaigns.Just a few months later, in February 2015, we announced the discovery of Carbanak, a cyber-criminal gang that used custom malware and APT techniques to steal millions of dollars while infecting hundreds of financial institutions in at least 30 countries.Today at the Security Analyst Summit (SAS 2016), Kaspersky Lab is announcing the discovery of two new gangs engaged in APT-style bank robberies – Metel and GCMAN – and the reemergence of the Carbanak group with new targets in its sights.In 2015, Kaspersky Lab researchers conducted Incident Response for 29 organizations located in Russia and infected by these three groups.Kaspersky Lab is releasing crucial Indicators of Compromise (IOCs) and other data to help organizations search for traces of these attack groups in their corporate networks.In all, Kaspersky Lab discovered Metel in more than 30 financial institutions.It is highly likely that this threat is far more widespread and we urge financial institutions around the world to scan their networks for signs of the Metel malware.A second group, which we call GCMAN because the malware is based on code compiled on the GCC compiler, emerged recently using similar techniques to the Metel Group to infect banking institutions and attempt to transfer money to e-currency services.Our investigations revealed that the attackers drove around several cities in Russia, stealing money from ATMs belonging to different banks.Once inside the network, the GCMAN group uses legitimate and penetration testing tools such as Putty, VNC, and Meterpreter for lateral movement.Our investigation revealed an attack where the GCMAN group then planted a cron script into bank's server, sending financial transactions at the rate of $200 per minute.The GCMAN group used an MS SQL injection in commercial software running on one of bank's public web services, and about a year and a half later, they came back to cash out.During that time they poked 70 internal hosts, compromised 56 accounts, making their way from 139 attack sources (TOR and compromised home routers).However, in September last year, our friends at CSIS published a blog detailing a new Carbanak variant affecting one of its customers.Kaspersky Lab's research team responded to three financial institutions in Russia that were infected with the GCMAN malware.In one remarkable case, the Carbanak 2.0 gang used its access to a financial institution that stores information about shareholders to change the ownership details of a large company.Recently Subaat drew our attention due to renewed targeted attack activity.Technical analysis on some of the attacks as well as attribution links with Pakistan actors have been already depicted by 360 and Tuisec, in which they found interesting connections to a larger group of attackers Unit 42 researchers have been tracking, which we are calling Gorgon Group.Starting in February 2018, Palo Alto Networks identified a campaign of attacks performed by members of Gorgon Group targeting governmental organizations in the United Kingdom, Spain, Russia, and the United States.Starting in February 2018, Palo Alto Networks Unit 42 identified aof attacks performed by members of Gorgon Group targeting governmental organizations in the United Kingdom, Spain, Russia, and the United States.The GCMAN group has moved beyond banks and is now targeting the budgeting and accounting departments in any organization of interest to them, using the same APT-style tools and techniques.Starting in February 2018, Unit 42 identified a campaign of attacks performed by members of Gorgon Group targeting governmental organizations in the United Kingdom, Spain, Russia, and the United States.APT38's increasingly aggressive targeting against banks.Gorgon Group used common URL shortening services to download payloads.The GCMAN group has moved beyond banks and is now targeting the budgeting and accounting departments in any organization of interest to them, using the same APT-style tools and techniques.APT38 has paralleled North Korea's worsening financial condition.On much of the C2 infrastructure we identified several crimeware family samples.While investigating the domains and infrastructure used by the phishing components of Gorgon Group, Unit 42 researchers witnessed several common operational security flaws with Gorgon Group's actors throughout their many campaigns.360 and Tuisec already identified some Gorgon Group members.RATs such as NjRat and infostealers like Lokibot were leveraging the same C2 infrastructure as that of the targeted attacks.it's not known if the attackers physically reside in Pakistan.Gorgon used numerous decoy documents and phishing emails, both styles of attacks lacked overall sophistication.While it's not known if the attackers physically reside in Pakistan, all members of Gorgon Group purport to be in Pakistan based on their online personas.Starting in mid-February, Unit 42 researchers have been tracking an active campaign sharing a significant portion of infrastructure leveraged by Gorgon Group for criminal and targeted attacks.Unit 42 researchers have been tracking Gorgon Group for criminal and targeted attacks.As part of the investigation, Unit 42 researchers were able to identify an interesting characteristic about how the Gorgon Group crew uses shared infrastructure between cybercrime and targeted attacks.The crew combines both regular crime and targeted attack objectives using the same domain infrastructure over time, rarely changing their TTPs.One interesting note about the criminal activity of Gorgon Group is their usage of Bitly.Between April 1, 2018 and May 30, 2018, we observed the domain stevemike-fireforce.info used in a Gorgon Group cybercrime campaign involving more than 2,300 emails and 19 documents in the initial attack.Similar to that of their targeted attacks, Gorgon Group leveraged Bitly for distribution and shortening of C2 domains.Beginning in early March 2018, Unit 42 started observing targeted attacks against Russian, Spanish and United States government agencies operating in Pakistan.Leveraging click counts for the campaign for Bitly, we were able to see Gorgon Group's activity volume increase throughout April.As we continued to investigate, it became apparent that Gorgon Group had been consistently targeting worldwide governmental organizations operating within Pakistan.Starting in mid-February.Additionally, during that time, members of Gorgon Group were also performing criminal operations against targets across the globe, often using shared infrastructure with their targeted attack operations.Unit 42 researchers have been tracking an active campaign.This Gorgon Group campaign leveraged spear phishing emails with Microsoft Word documents exploiting CVE-2017-0199.Beginning in early March 2018, Unit 42 started observing Gorgon group attacks against Russian, Spanish and United States government agencies operating in Pakistan.Like all of Gorgon Group's members, Fudpage's online profile, infrastructure utilization and standardization, connects them back to Gorgon Group.Ultimately, this lead us to the conclusion that several of Gorgon Group's members have a nexus in Pakistan.Gorgon Group isn't the first actor group we've witnessed dabble in both nation state level and criminal attacks.Overall, in spite of the lack of sophistication in Gorgon Group's activity, they were still relatively successful; once again proving that simple attacks on individuals without proper protections, work.On January 15, Advanced Threat Research discovered an operation using a new variant of the SYSCON backdoor.The Korean-language Word document manual.doc appeared in Vietnam on January 17, with the original author name of Honeybee.While Gorgon Group has been making minor changes in their methodologies, they are still actively involved in both targeted and criminal attacks.This malicious document contains a Visual Basic macro that dropped and executed an upgraded version of the implant known as SYSCON, which appeared in 2017 in malicious Word documents as part of several campaigns using North Korea–related topics.This key was also used in the Honeybee campaign and appears to have been used since August 2017.Several additional documents surfaced between January 17 and February 3.All contain the same Visual Basic macro code and author name as Honeybee.Some of the malicious documents were test files without the implant.From our analysis, Honeybee submitted most of these documents from South Korea, indicating that some of the targeting was in South Korea.Honeybee attacked beyond the borders of South Korea to target Vietnam, Singapore, Argentina, Japan, Indonesia, and Canada.Honeybee appears to target humanitarian aid and inter-Korean affairs.McAfee Advanced Threat Research team's analysis, we find multiple components from this operation are unique from a code perspective, even though the code is loosely based on previous versions of the SYSCON backdoor.Large-scale cyber espionage campaigns such as " GhostNet ".As the crisis in Syria escalates, FireEye researchers have discovered a cyber espionage campaign, which we call " Ke3chang ", that falsely advertises information updates about the ongoing crisis to compromise MFA networks in Europe.As the crisis in Syria escalates, FireEye researchers have discovered a threat group, which we call " Ke3chang ", that falsely advertises information updates about the ongoing crisis to compromise MFA networks in Europe.We believe that the Ke3chang attackers are operating out of China and have been active since at least 2010.FireEye gained visibility into one of 23 known command-and-control (CnC) servers operated by the Ke3chang actor for about one week.Each attack comprises a variety of phases, including reconnaissance, exploitation, command and control, lateral movement, and exfiltration.The Ke3chang attackers have been active since at least 2010.traditionally targeted the aerospace, energy, government, high-tech, consulting services, and chemicals / manufacturing / mining sectors.The Ke3chang have used three types of malware over the years and have traditionally targeted the aerospace, energy, government, high-tech, consulting services, chemicals, manufacturing, mining sectors.August 2013, FireEye gained visibility on one of 22 CnC servers used at that time by the Ke3chang attackers.In this report, we present the historical intelligence we have gathered on the Ke3chang campaign, as well as an in-depth assessment of the ongoing Syrian-themed attacks against these MFAs.Ke3chang attackers have used spear-phishing emails.Ke3chang has also leveraged a Java zero-day vulnerability (CVE-2012-4681), as well as older, reliable exploits for Microsoft Word (CVE-2010-3333) and Adobe PDF Reader (CVE-2010-2883).Traditionally, the Ke3chang attackers have used spear-phishing emails with either a malware attachment or a link to a malicious download.Over the years, the Ke3chang attackers have used three types of malware that we call: " BS2005 ", " BMW ", and " MyWeb ".it is a typical first stage backdoor commonly found in APT attacks.The attackers have used three types of malware over the years and have traditionally targeted the aerospace, energy, government, high-tech, consulting services, and chemicals / manufacturing / mining sectors.All of the CnC communications are performed over the HTTP protocol.The current Ke3chang campaign leverages the BS2005 malware, while older activity from 2010 - 2011 leveraged BMW, followed by the MyWeb malware sporadically used in between.A trait common to all three malware families we analyzed is that they use the IWebBrowser2 COM interface to perform their CnC communication.Three months after the Olympics-themed attacks, FireEye observed a new BS2005 campaign labeled " newtiger ", which is possibly a reference to an older 2010 campaign labeled " tiger ".Using information from the FireEye DTI cloud, FireEye observed that Ke3chang targeted a single firm.The Ke3chang attackers used the older " MyWeb " malware family from 2010 to 2011.The Ke3chang attackers used the older MyWeb malware family from 2010 to 2011.During our period of visibility into the BS2005 " moviestar " campaign against various ministries of foreign affairs in Europe, FireEye discovered that the Ke3chang had initially tested the malware in virtual machines, prior to compromising actual targets.The MyWeb sample that FireEye analyzed has a compile date of 1/20/2011.At least one of the attacks in this campaign leveraged a European security and defense-themed lure, which aligns with the targeting preferences for this group.MyWeb is the second-generation malware used by Ke3chang.ministries of foreign affairs in Europe have been targeted and compromised by a threat actor we call Ke3chang.This attack used the crisis in Syria as a lure to deliver malware to its targets.Tracking the malicious activities of the elusive Ke3chang APT group, ESET researchers have discovered new versions of malware families linked to the group, and a previously unreported backdoor.Furthermore, FireEye has presented evidence indicating that the Ke3chang attackers have been active since at least 2010 and have attacked targets related to G20 meetings in the past.During our brief window of visibility into one of the known 22 CnC nodes, FireEye observed the Ke3chang conducting reconnaissance and moving laterally throughout the compromised networks.Ke3chang attackers are operating within China.In May 2017, NCC Group's Incident Response team reacted to an ongoing incident.which provides a range of services to UK Government.APT15 was targeting information related to UK government departments and military technology.backdoors that now appear to be part of APT15's toolset.This report demonstrates that Ke3chang is able to successfully penetrate government targets using exploits for vulnerabilities that have already been patched and despite the fact that these ministries have defenses in place.RoyalDNS - required APT15.The Ke3chang group also used keyloggers and their own .NET tool to enumerate folders and dump data from Microsoft Exchange mailboxes.APT15 was also observed using Mimikatz to dump credentials and generate Kerberos golden tickets.This time, APT15 opted for a DNS based backdoor: RoyalDNS.APT15 then used a tool known as RemoteExec.APT15 then used a tool known as RemoteExec (similar to Microsoft.Coincidentally, following the recent hack of a US Navy contractor and theft of highly sensitive data on submarine warfare, we have found evidence of very recent activity by a group referred to as APT15, known for committing cyber espionage which is believed to be affiliated with the Chinese government.APT15 is known for committing cyberespionage against companies and organizations located in many different countries, targeting different sectors such as the oil industry, government contractors, military, and more.Other names for the group are Vixen Panda, Ke3chang, Royal APT, and Playful Dragon.ther names for the group are Vixen Panda, Ke3chang, Royal APT, and Playful Dragon.There are many articles and researches online about APT15 and their activities, the most recent one by NCC Group.There are many articles and researches online about APT15 and their activities, the most recent one by NCC Group; although posted in March 2018, it refers to a campaign in 2017.both attributed to Chinese government affiliated groups.DLL hijacking techniques have been seen in the past with the APT15 group.cyber actors of the North Korean to target the media, aerospace, financial, and critical infrastructure sectors in the United States and globally.The U.S. Government refers to the malicious cyber activity by the North Korean government as HIDDEN COBRA.Tools and capabilities used by HIDDEN COBRA actors include DDoS botnets, keyloggers, remote access tools (RATs), and wiper malware.Variants of malware and tools used by HIDDEN COBRA actors include Destover and Hangman.DHS has previously released Alert TA14-353A.The DeltaCharlie DDoS bot was originally reported by Novetta in their 2016 Operation Blockbuster Malware Report.Our analysis shows that the cybercriminals behind the attack against an online casino in Central America, and several other targets in late-2017, were most likely the infamous Lazarus hacking group.The Lazarus Group was first identified in Novetta's report Operation Blockbuster in February 2016.cyberattacks against high-value targets in Ukraine in December 2015 and December 2016.In all of these incidents, the Lazarus utilized similar toolsets, including KillDisk that was executed on compromised machines.We are confident this KillDisk malware was deployed by Lazarus, rather than by another, unrelated attacker.This recent attack against an online casino in Central America suggests that hacking tools from the Lazarus toolset are recompiled with every attack (we didn't see these exact samples anywhere else).Utilizing KillDisk in the attack scenario most likely served one of two purposes: the attackers covering their tracks after an espionage operation, or it was used directly for extortion or cyber-sabotage.Today we'd like to share some of our findings, and add something new to what's currently common knowledge about Lazarus Group activities, and their connection to the much talked about February 2016 incident, when an unknown attacker attempted to steal up to $851M USD from Bangladesh Central Bank.Since the Bangladesh incident there have been just a few articles explaining the connection between Lazarus Group and the Bangladesh bank heist.However, from this it's only clear that Lazarus might have attacked Polish banks.Symantec also confirmed seeing the Lazarus wiper tool in Poland at one of their customers.Considering that the afterhack publications by the media mentioned that the investigation stumbled upon three different attackers, it was not obvious whether Lazarus was the one responsible for the fraudulent SWIFT transactions, or if Lazarus had in fact developed its own malware to attack banks' systems.We would like to add some strong facts that link some attacks on banks to Lazarus, and share some of our own findings as well as shed some light on the recent TTPs used by the attacker, including some yet unpublished details from the attack in Europe in 2017.Lazarus attacks are not a local problem and clearly the group's operations span across the whole world.Lazarus was previously known to conduct cyberespionage and cybersabotage activities, such as attacks on Sony Pictures Entertainment with volumes of internal data leaked, and many system harddrives in the company wiped.We believe that Lazarus Group is very large and works mainly on infiltration and espionage operations, while a substantially smaller units within the group, which we have dubbed Bluenoroff, is responsible for financial profit.Lazarus regrouped and rushed into new countries, selecting mostly poorer and less developed locations, hitting smaller banks because they are, apparently, easy prey.To date, the Lazarus group has been one of the most successful in launching large scale operations against the financial industry.We believe that Lazarus will remain one of the biggest threats to the banking sector, finance, and trading companies, as well as casinos for the next few years.We believe Lazarus started this watering hole attack at the end of 2016 after their other operation was interrupted in South East Asia.We believe they started this watering hole campaign at the end of 2016 after their other operation was interrupted in South East Asia.A rudimentary but somewhat clever design, KiloAlfa provides keylogging capability for the Lazarus Group's collection of malicious tools.The design of KiloAlfa is broken down into two basic components: the persistence functionality and the keylogging functionality.The persistence functionality of KiloAlfa allows the malware to self-install on a victim's machine when activated (described below).Evidence suggest that the Lazarus Group uses compromised infrastructure as the public-facing touchpoint for the majority of their malware samples.PapaAlfa is believed to be one of the proxy malware components that the Lazarus Group uses to hide the true command and control server (s) for operations.Rather, PapaAlfa could be considered a smart proxy due in part to the fact that the Lazarus can easily switch the backend destination address and port without having to reestablish control over the infected machine hosting the PapaAlfa malware.In terms of form factor, PapaAlfa comes in two flavors: service DLL and standalone executable.The IndiaBravo-PapaAlfa installer is responsible for installing the service DLL variant.While the tools profiled in this report are not inherently malicious, their capabilities are nonetheless integral to the Lazarus Group's cyber operations, both espionage and destructive in nature, making them inherently dangerous to potential victims.These tools often lay the groundwork for further malicious activity, such as the targeting of antivirus capabilities and the disabling of firewalls, both of which are very fundamental defensive measures.Furthermore, like many other identified Lazarus Group families, these tools showcase the group's creative solutions, such as the PapaAlfa, which makes it difficult to immediately identify potentially malicious activity on a compromised network.The first class, colloquially known as " wipers ", are a class of malware has the primary intent of destroying data on a victim's machine.DDoS malware floods a target's network-connected service with an excessive number of request at once in order to overload the capacity of the server.For example, DeltaAlfa specifies a DDoS bot family identified as Alfa.The naming scheme used by Novetta for the malware identified during Operation Blockbuster consists of at least two identifiers which each identifier coming from the International Civil Aviation Organization (ICAO)'s phonetic alphabet,2 commonly referred to as the NATO phonetic alphabet.Loaders are typically responsible for loading a DLL component into memory given that a DLL cannot operate in a standalone mode such as an executable.This report will explore the various installers, uninstallers and loaders Novetta has observed the Lazarus Group using.This reverse engineering report looks at the RATs and staging malware found within the Lazarus Group's collection.Regardless of their sophistication or refinement, the malware families within the Lazarus Group's India and Lima classes perform at a reasonable level for their designed purpose: the introduction and persistence of malware from the Lazarus Group on a victim's infrastructure.While the capabilities for the installers, loaders, and uninstallers in this report are relatively straight forward and single-focused, analysis of these malware families provide further insight into the capabilities of the Lazarus Group.The Lazarus Group employs a variety of RATs that operate in both client mode and server mode.The most common communication mode for a RAT is to act as a client to a remote server.The Lazarus Group employs a variety of RATs and staging malware to conduct cyber operations, many of which contain significant code overlap that points to at least a shared development environment.While some members within the Romeo and Sierra groups may not implement sound authentication strategies, shift their design focus in abrupt and unusual manners, and fail to understand the pitfalls of distributed command networks, on the whole the families within the Lazarus Group's collection of RATs and staging malware perform their tasks with surprising effectiveness.This new campaign, dubbed HaoBao, resumes Lazarus' previous phishing emails, posed as employee recruitment, but now targets Bitcoin users and global financial organizations.This new campaign, dubbed HaoBao, resumes Lazarus' previous phishing emails, posed as employee recruitment, but now targets financial organizations.McAfee Advanced Threat Research analysts have discovered an aggressive Bitcoin-stealing phishing campaign by the international cybercrime group Lazarus that uses sophisticated malware with long-term impact.McAfee Advanced Threat Research (ATR) analysts have discovered an aggressive Bitcoin-stealing phishing campaign by the international cybercrime group Lazarus that uses sophisticated malware with long-term impact.Beginning in 2017, the Lazarus group heavily targeted individuals with spear phishing emails impersonating job recruiters which contained malicious documents.The use of decoy documents also reveals some of the potential targets of the Lazarus group's malicious activity, specifically the use spear phishing attacks observed targeting South Korean government and aerospace organizations.The campaign lasted from April to October and used job descriptions relevant to target organizations, in both English and Korean language.The Lazarus Group's objective was to gain access to the target's environment and obtain key military program insight or steal money.In this latest discovery by McAfee, despite a short pause in similar operations, the Lazarus group targets financial organizations.This campaign is tailored to identifying those who are running Bitcoin related software through specific system scans.This Malware Analysis Report (MAR) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI).When victims open malicious documents attached to the emails, the malware scans for Bitcoin activity and then establishes an implant for long-term data-gathering.According to trusted third-party reporting, HIDDEN COBRA actors have likely been using FALLCHILL malware since 2016 to target the aerospace, telecommunications, and finance industries.The malware is a fully functional RAT with multiple commands that the actors can issue from a command and control (C2) server to a victim's system via dual proxies.FALLCHILL typically infects a system as a file dropped by other HIDDEN COBRA malware or as a file downloaded unknowingly by users when visiting sites compromised by HIDDEN COBRA actors.HIDDEN COBRA actors use an external tool or dropper to install the FALLCHILL malware to establish persistence.HIDDEN COBRA actors install the FALLCHILL malware to establish persistence.Working with U.S. government partners, DHS and FBI identified Internet Protocol (IP) addresses and other indicators of compromise (IOCs) associated with a remote administration tool (RAT) used by the North Korean government—commonly known as FALLCHILL.This alert's IOC files provide HIDDEN COBRA indicators related to FALLCHILL.McAfee Advanced Threat Research analysts have uncovered a global data reconnaissance campaign assaulting a wide number of industries including critical infrastructure, entertainment, finance, health care, and telecommunications.Because of this, additional HIDDEN COBRA malware may be present on systems compromised with FALLCHILL.This campaign, dubbed Operation GhostSecret, leverages multiple implants, tools, and malware variants associated with the state-sponsored cyber group HIDDEN COBRA.From March 18 to 26 we observed the malware operating in multiple areas of the world.Furthermore, the Advanced Threat Research team has discovered Proxysvc, which appears to be an undocumented implant.Our investigation into this campaign reveals that the actor used multiple malware implants, including an unknown implant with capabilities similar to Bankshot.The attackers behind Operation GhostSecret used a similar infrastructure to earlier threats, including SSL certificates used by FakeTLS in implants found in the Destover backdoor variant known as Escad, which was used in the Sony Pictures attack.Based on our analysis of public and private information from submissions, along with product telemetry, it appears Proxysvc was used alongside the 2017 Destover variant and has operated undetected since mid-2017.This new variant resembles parts of the Destover malware, which was used in the 2014 Sony Pictures attack.The Lazarus used a similar infrastructure to earlier threats, including the Destover backdoor variant known as Escad.The McAfee Advanced Threat Research team discovered a previously unknown data-gathering implant that surfaced in mid-February 2018.The Advanced Threat Research team uncovered activity related to this campaign in March 2018, when the actors targeted Turkish banks.Lazarus used watering hole attacks to compromise legitimate and trusted websites frequently visited by their targets.Malefactors used watering hole attacks to compromise legitimate and trusted websites frequently visited by their targets.Feedback from our Smart Protection Network revealed that apart from attacks in North America (mainly the U.S.), Europe, and South America, the campaign also noticeably affected enterprises in Taiwan, Hong Kong, China, and Bahrain.On February 28, the McAfee discovered that the cybercrime group HIDDEN COBRA continues to target cryptocurrency and financial organizations.On February 28, the McAfee Advanced Threat Research team discovered that the cybercrime group HIDDEN COBRA continues to target cryptocurrency and financial organizations.While the URL acts similarly to how eye-watch.in: 443 delivers payloads, we also saw the URL leveraging and exploiting security flaws in Flash: CVE-2015-8651, CVE-2016-1019, and CVE-2016-4117.In this analysis, we observed the return of HIDDEN COBRA's Bankshot malware implant surfacing in the Turkish financial system.In this new, aggressive campaign we see a return of the Bankshot implant, which last appeared in 2017.This attack resembles previous attacks by HIDDEN COBRA conducted against the SWIFT.The exploit, which takes advantage of CVE-2018-4878, allows an attacker to execute arbitrary code such as an implant.These implants are variations of earlier forms of Bankshot, a remote access tool that gives an attacker full capability on a victim's system.Bankshot was first reported by the Department of Homeland Security on December 13, 2017, and has only recently resurfaced in newly compiled variants.We have found what may be an early data-gathering stage for future possible heists from financial organizations in Turkey (and possibly other countries).Documents with the Flash exploit managed to evade static defenses and remain undetected as an exploit on VirusTotal.This malware report contains analysis of one 32-bit Windows executable file, identified as a Remote Access Trojan (RAT).This malware is capable of accessing device configuration data, downloading additional files, executing commands, modifying the registry, capturing screen shots, and exfiltrating data.Volgmer is a backdoor Trojan designed to provide covert access to a compromised system.It is suspected that spear phishing is the primary delivery mechanism for Volgmer infections; however, HIDDEN COBRA actors use a suite of custom tools, some of which could also be used to initially compromise a system.Since at least 2013, HIDDEN COBRA actors have been observed using Volgmer malware in the wild to target the government, financial, automotive, and media industries.Therefore, it is possible that additional HIDDEN COBRA malware may be present on network infrastructure compromised with Volgmer.As a backdoor Trojan, Volgmer has several capabilities including: gathering system information, updating service registry keys, downloading and uploading files, executing commands, terminating processes, and listing directories.In one of the samples received for analysis, the US-CERT Code Analysis Team observed botnet controller functionality.Volgmer payloads have been observed in 32-bit form as either executables or dynamic-link library (.dll)Lazarus actors commonly maintain persistence on a victim's system by installing the malware-as-a-service.Working with U.S. Government partners, DHS and FBI identified Trojan malware variants used by the North Korean government - referred to by the U.S. Government as BADCALL.The malware uses a custom binary protocol to beacon back to the command and control (C2) server, often via TCP port 8080 or 8088, with some payloads implementing Secure Socket Layer (SSL) encryption to obfuscate communications.DHS and FBI are distributing this MAR to enable network defense and reduce exposure to North Korean government malicious cyber activity.The malware known as RATANKBA is just one of the weapons in Lazarus' arsenal.We analyzed a new RATANKBA variant (BKDR_RATANKBA.ZAEL–A), discovered in June 2017, that uses a PowerShell script instead of its more traditional PE executable form—a version that other researchers also recently identified.Around 55% of the victims of Lazarus were located in India and neighboring countries.Lazarus group could have been active since late 2016, was used in a recent campaign targeting financial institutions using watering hole attacks.Since they first emerged back in 2007 with a series of cyberespionage attacks against the South Korean government, these threat actors have successfully managed to pull off some of the most notable and devastating targeted attacks—such as the widely-reported 2014 Sony hack and the 2016 attack on a Bangladeshi bank—in recent history.It's possible that Lazarus is using RATANKBA to target larger organizations.RATANKBA is delivered to its victims using a variety of lure documents, including Microsoft Office documents, malicious CHM files, and different script downloaders.Overall, an organization will need multilayered security strategies, as Lazarus and other similar groups are experienced cybercriminals who employ different strategies to get past organizational defenses.simultaneous use of the detected Win32/KillDisk.NBO variants.Working with U.S. Government partners, DHS and FBI identified Trojan malware variants used by the North Korean government – commonly known as HARDRAIN.These files have the capability to download and install malware, install proxy and Remote Access Trojans (RATs), connect to command and control (C2) servers to receive additional instructions, and modify the victim's firewall to allow incoming connections.The cybercriminal group Lazarus has a history of attacking financial organizations in Asia and Latin America.We also recently discovered that Lazarus successfully planted their backdoor (detected by Trend Micro as BKDR_BINLODR.ZNFJ-A) into several machines of financial institutions across Latin America.We determined that these backdoors were installed on the targets' machines on September 19 2018, based mainly on the service creation time of the loader component.Just last week Lazarus were found stealing millions from ATMs across Asia and Africa.These and other tools used by the Lazarus group can be mitigated by routinely scanning the network for any malicious activity to help prevent the malware from entering and spreading through an organization.The backdoors Lazarus are deploying are difficult to detect and a significant threat to the privacy and security of enterprises, allowing attackers to steal information, delete files, install malware, and more.Trend Micro endpoint solutions such as Trend Micro™ Smart Protection Suites and Worry-Free™ Business Security can protect users and businesses from these threats by detecting malicious files and spammed messages as well as blocking all related malicious URLs.FBI has high confidence that HIDDEN COBRA actors are using malware variants in conjunction with proxy servers to maintain a presence on victim networks and to further network exploitation.Ransomware that has been publicly named " WannaCry ", " WCry " or " WanaCrypt0r " (based on strings in the binary and encrypted files) has spread to at least 74 countries as of Friday 12 May 2017, reportedly targeting Russia initially, and spreading to telecommunications, shipping, car manufacturers, universities and health care industries, among others.Ransomware that has been publicly named " WannaCry ", " WCry " or " WanaCrypt0r " (based on strings in the binary and encrypted files) has spread to at least 74 countries as of Friday 12 May 2017, reportedly targeting Russia initially, and spreading to telecommunications, shipping, car manufacturers, universities and health care industries, among others.We also saw that the attack technique bears some resemblance to a previous 2017 Lazarus attack, analyzed by BAE Systems, against targets in Asia.WannaCry utilizes EternalBlue by crafting a custom SMB session request with hard-coded values based on the target system.Notably, after the first SMB packet sent to the victim's IP address, WannaCry sends two additional packets to the victim containing the hard-coded IP addresses 192.168.56.20 and 172.16.99.5.WannaCry (also known as WCry or WanaCryptor) malware is a self-propagating (worm-like) ransomware that spreads through internal networks and over the public internet by exploiting a vulnerability in Microsoft's Server Message Block (SMB) protocol, MS17-010.The WannaCry malware consists of two distinct components, one that provides ransomware functionality and a component used for propagation, which contains functionality to enable SMB exploitation capabilities.WannaCry leverages an exploit, codenamed " EternalBlue ", that was released by the Shadow Brokers on April 14, 2017.WannaCry appends encrypted data files with the .WCRY extension, drops and executes a decryptor tool, and demands $300 or $600 USD (via Bitcoin) to decrypt the data.In May 2017, SecureWorks® Counter Threat Unit® (CTU) researchers investigated a widespread and opportunistic WCry (also known as WanaCry, WanaCrypt, and Wana Decrypt0r) ransomware campaign that impacted many systems around the world.In November 2017, SecureWorks Counter Threat Unit (CTU) researchers investigated a widespread and opportunistic WCry ransomware campaign that impacted many systems around the world.Microsoft addressed the SMBv1 vulnerabilities in March 2017 with Security Bulletin MS17-010.The worm leverages an SMBv1 exploit that originates from tools released by the Shadow Brokers threat group in April.If the DoublePulsar backdoor does not exist, then the SMB worm attempts to compromise the target using the Eternalblue SMBv1 exploit.WCry uses a combination of the RSA and AES algorithms to encrypt files.The campaign's use of an SMB worm to distribute WCry contributed to the ransomware's virulence.Last week Microsoft, working together with Facebook and others in the security community, took strong steps to protect our customers and the internet from ongoing attacks by an advanced persistent threat actor known to us as ZINC, also known as the Lazarus Group.Last week Microsoft, working together with Facebook, took strong steps to protect our customers and the internet from ongoing attacks by the Lazarus Group.We concluded that Lazarus Group was responsible for WannaCry, a destructive malware.We concluded that Lazarus Group was responsible for WannaCry, a destructive attack in May that targeted Microsoft customers.Today, the governments of the United States, United Kingdom, Australia, Canada, New Zealand and Japan have all announced that the government of North Korea is responsible for the activities of ZINC/Lazarus.In November 2017, Secureworks Counter Threat Unit™ (CTU) researchers discovered the North Korean cyber threat group, known as Lazarus Group and internally tracked as NICKEL ACADEMY by Secureworks, had launched a malicious spearphishing campaign using the lure of a job opening for the CFO role at a European-based cryptocurrency company.In November 2017, CTU researchers discovered the North Korean cyber threat group, known as Lazarus Group, had launched a malicious spearphishing campaign using the lure of a job opening for the CFO role at a European-based cryptocurrency company.Bankshot is designed to persist on a victim's network for further exploitation; thus the Advanced Threat Research team believes this operation is intended to gain access to specific financial organizations.CTU researchers assess this as the continuation of activity first observed in 2016, and it is likely that the campaign is ongoing.CTU researchers have observed NICKEL ACADEMY (Lazarus) copying and pasting job descriptions from online recruitment sites in previous campaigns.There are several indicators, which have led CTU researchers to believe with high confidence that NICKEL ACADEMY is behind the current spearphishing campaign.CTU researchers also identified components in the custom C2 protocol being used which they have seen utilized by Nickel Academy (Lazarus) previously.CTU researchers also identified components in the custom C2 protocol being used (the way in which the malware talks to the Command and Control Servers) which they have seen utilized by Nickel Academy (Lazarus) previously.Leafminer attempts to infiltrate target networks through various means of intrusion: watering hole websites, vulnerability scans of network services on the internet, and brute-force login attempts.The researchers found that there are common elements in the macro and in the first- stage RAT used in this campaign, with former campaigns of the NICKEL ACADEMY (Lazarus) threat group.During our investigation, there was a breakthrough discovery that helped connect Leafminer to a number of attacks observed on systems in the Middle East and identify the toolkit used in the group's efforts of intrusion, lateral movement, and exfiltration.As of early June 2018, the server hosted 112 files in a subdirectory that could be accessed through a public web shell planted by the Leafminer.As of early June 2018, the server hosted 112 files in a subdirectory that could be accessed through a public web shell planted by the attackers.The Leafminer's post-compromise toolkit suggests that Leafminer is looking for email data, files, and database servers on compromised target systems.Researching the hacker handle MagicCoder results in references to the Iranian hacking forum Ashiyane as well as defacements by the Iranian hacker group Sun Army.Targeted regions included in the list of Leafminer are Saudi Arabia, United Arab Emirates, Qatar, Kuwait, Bahrain, Egypt, Israel, and Afghanistan.Our investigation of Leafminer started with the discovery of JavaScript code on several compromised websites in the Middle East.This included the Fuzzbunch framework that was part of an infamous leak of exploits and tools by the Shadow Brokers in April 2017.Leafminer has developed exploit payloads for this framework (Table 2) that deliver custom malware through attacks against SMB vulnerabilities described by Microsoft.The EternalBlue exploit from the framework received worldwide attention after being used in the ransomware campaigns WannaCry in May and Petya / NotPetya in June 2017.The Leafminer operators use EternalBlue to attempt lateral movement within target networks from compromised staging servers.Symantec also observed attempts by Leafminer to scan for the Heartbleed vulnerability (CVE-2014-0160) from an attacker-controlled IP address.Furthermore, the Leafminer arsenal server hosted a Python script to scan for this vulnerability.Another intrusion approach used by Leafminer seems a lot less sophisticated than the previously described methods but can be just as effective: using specific hacktools to guess the login passwords for services exposed by a targeted system.Commands found in a readme text that was stored in a ZIP archive together with the hacktool THC Hydra in Leafminer's tool arsenal represent online dictionary attacks on Microsoft Exchange and Remote Desktop Protocol services of regional government servers in Saudi Arabia.Symantec identified two strains of custom malware used by the Leafminer group: Trojan.Imecab and Backdoor.Sorgu.Leafminer is a highly active group, responsible for targeting a range of organizations across the Middle East.Leafminer appears to be based in Iran and seems to be eager to learn from and capitalize on tools and techniques used by more advanced threat actors.Leafminer also utilized Process Doppelganging, a detection evasion technique first discussed at the Black Hat EU conference last year.Dragos has identified Leafminer group targeting access operations in the electric utility sector.Analysis of RASPITE tactics, techniques, and procedures (TTPs) indicate the group has been active in some form since early - to mid-2017.RASPITE targeting includes entities in the US, Middle East, Europe, and East Asia.RASPITE overlaps significantly with Symantec's Leafminer, which recently released a report on the group's activity in the Middle East.RASPITE's activity to date currently focuses on initial access operations within the electric utility sector.This means that the Leafminer group is targeting electric utilities.While the group has not yet demonstrated an ICS capability, RASPITE's recent targeting focus and methodology are clear indicators of necessary activity for initial intrusion operations into an IT network to prepare the way for later potential ICS events.Active since at least 2014, this actor has long-standing interest in maritime industries, naval defense contractors, and associated research institutions in the United States and Western Europe.Active since at least 2014, the Leviathan has long-standing interest in maritime industries, naval defense contractors, and associated research institutions in the United States and Western Europe.On September 15 and 19, 2017, Proofpoint detected and blocked spearphishing emails from this group targeting a US shipbuilding company and a US university research center with military ties.The attachments exploited CVE-2017-8759 which was discovered and documented only five days prior to the campaign.Some of the documents exploited CVE-2017-0199 to deliver the payload.Between August 2 and 4, the actor sent targeted spearphishing emails containing malicious URLs linking to documents to multiple defense contractors.Between August 2 and 4, the Leviathan sent targeted spearphishing emails containing malicious URLs linking to documents to multiple defense contractors.The Leviathan also occasionally used macro-laden Microsoft Word documents to target other US research and development organizations during this period.The period between November 2014 and January 2015 marked one of the earlier instances in which Proofpoint observed persistent exploitation attempts by this actor.The Leviathan, whose espionage activities primarily focus on targets in the US and Western Europe with military ties, has been active since at least 2014.This actor, whose espionage activities primarily focus on targets in the US and Western Europe with military ties, has been active since at least 2014.The campaign is linked to a group of suspected Chinese cyber espionage actors we have tracked since 2013, dubbed TEMP.Periscope.The Leviathan generally emailed Microsoft Excel documents with malicious macros to US universities with military interests, most frequently related to the Navy.The current campaign is a sharp escalation of detected activity since summer 2017.Since early 2018, FireEye (including our FireEye as a Service (FaaS), Mandiant Consulting, and iSIGHT Intelligence teams) has been tracking an ongoing wave of intrusions targeting engineering and maritime entities, especially those connected to South China Sea issues.Known targets of the Leviathan have been involved in the maritime industry, and research institutes, academic organizations, and private firms in the United States.Active since at least 2013, TEMP.Periscope has primarily focused on maritime-related targets across multiple verticals, including engineering firms, shipping and transportation, manufacturing, defense, government offices, and research universities.TEMP.Periscope overlaps in targeting, as well as tactics, techniques, and procedures (TTPs), with TEMP.Jumper, a group that also overlaps significantly with public reporting on NanHaiShu.The actor has conducted operations since at least 2013 in support of China's naval modernization effort.FireEye is highlighting a cyber espionage operation targeting crucial technologies and traditional intelligence targets from a China-nexus state sponsored actor we call APT40.The Leviathan group has specifically targeted engineering, transportation, and the defense industry, especially where these sectors overlap with maritime technologies.We believe APT40's emphasis on maritime issues and naval technology ultimately support China's ambition to establish a blue-water navy.Within a year APT40 was observed masquerading as a UUV manufacturer, and targeting universities engaged in naval research.APT40 engages in broader regional targeting against traditional intelligence targets, especially organizations with operations in Southeast Asia.We assess with moderate confidence that APT40 is a state-sponsored Chinese cyber espionage operation.The actor's targeting is consistent with Chinese state interests and there are multiple technical artifacts indicating the actor is based in China.Analysis of the operational times of the group's activities indicates that it is probably centered around China Standard Time (UTC +8).APT40 relies heavily on web shells for an initial foothold into an organization.APT40 has been observed leveraging a variety of techniques for initial compromise, including web server exploitation, phishing campaigns delivering publicly available and custom backdoors, and strategic web compromises.Depending on placement, a web shell can provide continued access to victims' environments, re-infect victim systems, and facilitate lateral movement.The group's capabilities are more than the much discussed CVE-2012-0158 exploits over the past few years.A paper released today by our colleagues at Palo Alto Networks presented a portion of data on this crew under the label " the Lotus Blossom Operation ", likely named for the debug string present in much of the " Elise " codebase since at least 2012: " d:\lstudio\projects\lotus\… ".Instead, the Spring Dragon group is known to have employed spearphish exploits, strategic web compromises, and watering holes attack.The group's spearphish toolset includes PDF exploits, Adobe Flash Player exploits, and the common CVE-2012-0158 Word exploits including those generated from the infamous " Tran Duy Linh " kit.The Spring Dragon appears to have rolled out a steady mix of exploits against government-related organizations in VN, TW, PH, and other locations over the past few years.Organizations located in Myanmar and targeted by Spring Dragon have gone unmentioned.Spring Dragon's infiltration techniques there were not simply spearphish.The download name was " Zawgyi_Keyboard_L.zip ", and it dropped a " setup.exe " that contained several backdoor components, including an Elise " wincex.dll " (a42c966e26f3577534d03248551232f3, detected as Backdoor.Win32.Agent.delp).While this particular actor effectively used their almost worn out CVE-2012-0158 exploits in the past, Spring Dragon employs more involved and creative intrusive activity as well.The well-known threat group called DRAGONFISH or Lotus Blossom are distributing a new form of Elise malware targeting organizations for espionage purposes.The threat actors associated with DRAGONFISH have previously focused their campaigns on targets in Southeast Asia, specifically those located in countries near the South China Sea.iDefense analysts have identified a campaign likely to be targeting members of— or those with affiliation or interest in—the ASEAN Defence Ministers' Meeting (ADMM).iDefense analysts have identified a campaign likely to be targeting members of or those with affiliation or interest in the ASEAN Defence Minister's Meeting (ADMM).iDefense assesses with high confidence that this campaign is associated with the threat group DRAGONFISH (also known as Lotus Blossom and Spring Dragon).To mitigate the threat of the described campaign, security teams can consider blocking access to the C2 server 103.236.150.14 and, where applicable, ensure that the Microsoft Security Update KB2553204 is installed in order to patch the CVE-2017-11882 vulnerability.The actors attempted to exploit CVE-2014-6332 using a slightly modified version of the proof-of-concept (POC) code to install a Trojan called Emissary, which is related to the Operation Lotus Blossom campaign.The targeting of this individual suggests the actors are interested in breaching the French Ministry of Foreign Affairs itself or gaining insights into relations between France and Taiwan.On November 10, 2015, threat actors sent a spear-phishing email to an individual at the French Ministry of Foreign Affairs.On November 10, 2015, Lotus Blossom sent a spear-phishing email to an individual at the French Ministry of Foreign Affairs.Both attachments are malicious Word documents that attempt to exploit the Windows OLE Automation Array Remote Code Execution Vulnerability tracked by CVE-2014-6332.Lotus Blossom attempted to exploit CVE-2014-6332 using the POC code available in the wild.This Trojan is related to the Elise backdoor described in the Operation Lotus Blossom report.Lotus Blossom was attempting to exploit CVE-2014-6332 to install a new version of the Emissary Trojan, specifically version 5.3.APT threat actors, most likely nation state-sponsored, targeted a diplomat in the French Ministry of Foreign Affairs with a seemingly legitimate invitation to a technology conference in Taiwan.Additionally, the targeting of a French diplomat based in Taipei, Taiwan aligns with previous targeting by these actors, as does the separate infrastructure.The Elise malware used by Lotus Blossom, which was an attack campaign on targets in Southeast Asia.Based on the targeting and lures, Unit 42 assesses that the Lotus Blossom actors' collection requirements include militaries and government agencies in Southeast Asia.In December 2015, Unit 42 published a blog about a cyber espionage attack using the Emissary Trojan as a payload.The oldest sample we found was created in 2009, indicating this tool has been in use for almost seven years.In addition, Emissary appears to against Taiwan or Hong Kong, all of the decoys are written in Traditional Chinese, and they use themes related to the government or military.Of note, this is three years earlier than the oldest Elise sample we have found, suggesting this group has been active longer than previously documented.In addition, we observed a TTP shift post publication with regards to their malware delivery; they started using compromised but legitimate domains to serve their malware.All of the Emissary we've collected are written in Traditional Chinese, which is used primarily in Taiwan and Hong Kong.One of the most interesting observations made during this analysis is that the amount of development effort devoted to Emissary significantly increased after we published our Operation Lotus Blossom report in June 2015, resulting in many new versions of the Emissary Trojan.Lotus Blossom targeted the government, higher education, and high tech companies.Our evidence suggests that malware authors created Emissary as early as 2009, which suggests that threat actors have relied on this tool as a payload in cyber-espionage attacks for many years.While it lacks more advanced functionality like screen capturing, it is still able to carry out most tasks desired by threat actors: exfiltration of files, ability to download and execute additional payloads, and gain remote shell access.The timeline in Figure 2 shows that the Emissary Trojan was first created (version 1.0) in May 2009 and quickly received an update that resulted in version 1.1 in June 2009.Between August and November 2015 the malware author creates several new versions of Emissary, specifically 5.0, 5.1, 5.3 and 5.4 in a much more rapid succession compared to development process in earlier versions.Version 2.0 received one update in October 2013 before the malware author released version 3.0 in December 2014.While this may be coincidental, the out-of-sequence version 3.0 sample was created ten days after we published the Operation Lotus Blossom paper that exposed the Elise Trojan that is closely related to Emissary.The Lotus Blossom largely targets military or government, with some cases of higher education and high tech companies.The use of Emissary appears to be focused only on Taiwan and Hong Kong, with regular malware updates to avoid detection and to increase the odds of success.The Lotus Blossom actors using Emissary have been active for at least seven years in Southeast Asia.Magic Hound has primarily targeted organizations in the energy, government, and technology sectors that are either based or have business interests in Saudi Arabia.Regardless of causation, the rapid development of new versions of Emissary suggests that the malware authors are making frequent modifications to evade detection, which as a corollary suggests the Lotus Blossom are actively using the Emissary Trojan as a payload in attacks.Link analysis of infrastructure and tools also revealed a potential relationship between Magic Hound and the adversary group called " Rocket Kitten " (AKA Operation Saffron Rose, Ajax Security Team, Operation Woolen-Goldfish) as well as an older attack campaign called Newscasters.In addition to the malware evolution, the actors also shifted from solely spear-phishing targets with attachments to also compromising legitimate websites to host malware.It is highly likely the Lotus Blossom used spear-phishing attacks containing links to these malicious documents as a delivery mechanism.We were ultimately able to identify multiple organizations in the government, energy, and technology sectors targeted by Magic Hound.The Magic Hound attacks did not rely on exploit code to compromise targeted systems, instead relying on Excel and Word documents containing malicious macros.The MPK bot is not publicly available and had previously been attributed to an adversary group called " Rocket Kitten " which has often been thought to be a state sponsored adversary operating in the Middle East region.One payload was a Python based open source remote administration tool (RAT) called Pupy.The Magic Hound campaign used Word and Excel documents containing malicious macros as a delivery method, specifically attempting to load MagicHound.Rollover.Many of the Fetch samples we analyzed attempted to obfuscate their functionality by encrypting their embedded strings using AES.The loader's main goal was to run a PowerShell command to execute shellcode.To set up persistence, the loader writes a file to " c:\temp\rr.exe " and executes it with specific command line arguments to create auto run registry keys.The Magic Hound campaign was also discovered using a custom dropper tool, which we have named MagicHound.DropIt.We have also seen Magic Hound using DropIt as a binder, specifically dropping a legitimate decoy executable along with the malicious executable onto the target host.We also found a second IRC bot called MPK using the same IP for its C2 server that a Leash sample was hosted on.The Magic Hound attack campaign is an active and persistent espionage motivated adversary operating in the Middle East region.Organizations in the government, energy, and technology sectors have been targeted by Magic Hound, specifically organizations based in or doing business in Saudi Arabia.At a high level, Retriever is a .NET downloader that downloads secondary payloads from servers associated with Magic Hound.For example, we analyzed a DropIt sample (SHA256: cca268c13885ad5751eb70371bbc9ce8c8795654fedb90d9e3886cbcfe323671) that dropped two executables, one of which was saved to "%TEMP%\flash_update.exe " that was a legitimate Flash Player installer.M-Trends 2018 can arm security teams with the knowledge they need to defend against today's most often used cyber attacks, as well as lesser seen and emerging threats.FireEye tracks thousands of threat actors, but pays special attention to state-sponsored attackers who carry out advanced persistent threat (APT) attacks.Since at least 2014, APT32, also known as the OceanLotus Group, has targeted foreign corporations with investments in Vietnam, foreign governments, journalists, and Vietnamese dissidents.During a recent campaign, APT32 leveraged social engineering emails with Microsoft ActiveMime file attachments to deliver malicious macros.Evidence also suggests that APT32 has targeted network security and technology infrastructure corporations with connections to foreign investors.Since at least 2014, APT32, also known as the OceanLotus Group, has targeted foreign corporations foreign governments.FireEye asesses that APT32 actors may be aligned with the national interests of Vietnam.APT32 poses a threat to companies doing business or preparing to invest in Vietnam.We believe recent activity targeting private interests in Vietnam suggests that APT32 poses a threat to companies doing business or preparing to invest in the country.DROPSHOT is a notable piece of malware used to deliver variants of the TURNEDUP backdoor.Additionally, there is evidence to suggest APT33 targeted Saudi Arabia.APT33 often conducts spear-phishing operations using a built-in phishing module.Additionally, there is evidence to suggest APT33 targeted Saudi Arabian and Western organizations that provide training, maintenance and support for Saudi Arabia's military and commercial fleets.Although we have only observed APT33 use DROPSHOT to deliver TURNEDUP, we have identified multiple DROPSHOT samples in the wild that delivered wiper malware we call SHAPESHIFT.The SHAPESHIFT wiper is capable of wiping disks and volumes, as well as deleting files.Ties to SHAPESHIFT suggest that APT33 may engage in destructive operations or shares tools or development resources with an Iranian threat group that conducts destructive operations.In a recent attack, APT33 sent spear-phishing emails to workers in the aviation industry.The HTA files contained job descriptions and links to job postings on popular employment websites.Since at least 2014, an Iranian threat group tracked by FireEye as APT34 has conducted reconnaissance aligned with the strategic interests of Iran.These emails included recruitment-themed lures and links to malicious HTML application (HTA) files.The OilRig group conducts operations primarily in the Middle East, targeting financial, government, energy, chemical, telecommunications and other industries.APT34 uses a mix of public and non-public tools.APT34 often uses compromised accounts to conduct spear-phishing operations.APT33 leverages a mix of public and non-public tools and often conducts spear-phishing operations using a built-in phishing module from " ALFA TEaM Shell ", a publicly available web shell.In July 2017, FireEye observed APT34 targeting an organization in the Middle East using the POWRUNER PowerShell-based backdoor and the downloader BONDUPDATER, which includes a domain generation algorithm (DGA) for command and control.POWRUNER was delivered using a malicious RTF file that exploited CVE-2017-0199.In November 2017, APT34 leveraged the Microsoft Office vulnerability CVE-2017-11882 to deploy POWRUNER and BONDUPDATER less than a week after Microsoft issued a patch.FireEye has identified APT35 operations dating back to 2014.APT35, also known as the Newscaster Team, is a threat group sponsored by the Iranian government that conducts long term, resource-intensive operations to collect strategic intelligence.APT35 typically targets military, diplomatic and government, media, energy, engineering, business services and telecommunications sectors in U.S. and the Middle East.APT35 has historically used unsophisticated tools like those listed below in Figure 3.APT35 typically targets U.S. and the Middle Eastern military, diplomatic and government personnel, organizations in the media, energy and defense industrial base (DIB), and engineering, business services and telecommunications sectors.Many of the fake personas utilized by APT35 claimed to be part of news organizations, which led to APT35 being referred to as the Newscaster Team.Since at least 2013, the Iranian threat group that FireEye tracks as APT33 has carried out a cyber espionage operation to collect information from defense, aerospace and petrochemical organizations.Since at least 2013, the Iranian threat group FireEye tracks as APT33 has carried out a cyber espionage operation to collect information from defense, aerospace and petrochemical organizations.In early 2017, Mandiant responded to an incident involving APT35 targeting an energy company.The attacker used a spear-phishing email containing a link to a fake resume hosted on a legitimate website that had been compromised.APT35 also installed BROKEYOLK, a custom backdoor, to maintain persistence on the compromised host.They then proceeded to log directly into the VPN using the credentials of the compromised user.The resume contained the PupyRAT backdoor, which communicated with known APT35 infrastructure.Once connected to the VPN, APT35 focused on stealing domain credentials from a Microsoft Active Directory Domain Controller to allow them to authenticate to the single-factor VPN and Office 365 instance.While having access to the organization's environment, the Magic Hound targeted data related to entities in the Middle East.Mandiant has previously observed targeted attackers stealing email, but few threat actors have been as successful at this as APT35.The campaigns delivered PupyRAT, an open-source cross-platform remote access trojan (RAT).Ultimately, APT35 had used access to hundreds of mailboxes to read email communications and steal data related to Middle East organizations, which later became victims of destructive attacks.CTU researchers observed likely unsuccessful phishing campaigns being followed by highly targeted spearphishing and social engineering attacks from a threat actor using the name Mia Ash.Further analysis revealed a well-established collection of fake social media profiles that appear intended to build trust and rapport with potential victims.COBALT GYPSY has used spearphishing to target telecommunications, government, defense, oil, and financial services organizations based in or affiliated with the MENA region, identifying individual victims through social media sites.The connections associated with these profiles indicate the threat actor began using the persona to target organizations in April 2016.Between December 28, 2016 and January 1, 2017, CTU researchers observed a phishing campaign targeting Middle Eastern organizations.The macro ran a PowerShell command that attempted to download additional PowerShell loader scripts for PupyRAT, a research and penetration-testing tool that has been used in attacks.The survey contained macros that, once enabled, downloaded PupyRAT.CTU researchers determined that the COBALT GYPSY threat group orchestrated this activity due to the tools, techniques, and procedures (TTPs) used in both campaigns.The Magic Hound has repeatedly used social media to identify and interact with employees at targeted organizations and then used weaponized Excel documents.The group has repeatedly used social media, particularly LinkedIn, to identify and interact with employees at targeted organizations, and then used weaponized Excel documents to deliver RATs such as PupyRAT.By compromising a user account that has administrative or elevated access, Magic Hound can quickly access a targeted environment to achieve their objectives.These characteristics suggest that COBALT GYPSY executed the January and February phishing campaigns and that it created the Mia Ash persona.CTU researchers have observed multiple COBALT GYPSY campaigns since 2015 and consider it highly likely that the group is associated with Iranian government-directed cyber operations.The use of the Mia Ash persona demonstrates the creativity and persistence that threat actors employ to compromise targets.CTU researchers conclude that COBALT GYPSY created the persona to gain unauthorized access to targeted computer networks via social engineering.The persistent use of social media to identify and manipulate victims indicates that COBALT GYPSY successfully achieves its objectives using this tactic.COBALT GYPSY's continued social media use reinforces the importance of recurring social engineering training.SecureWorks Counter Threat Unit (CTU) researchers analyzed a phishing campaign that targeted a Middle Eastern organization in early January 2017.SecureWorks® Counter Threat Unit™ (CTU) researchers analyzed a phishing campaign that targeted a Middle Eastern organization in early January 2017.CTU analysis suggests this activity is related to Iranian threat actors closely aligned with or acting on behalf of the COBALT GYPSY threat group (formerly labeled Threat Group-2889).Since early 2014, an attacker group of Iranian origin has been actively targeting persons of interest by means of malware infection, supported by persistent spear phishing campaigns.This cyber-espionage group was dubbed' Rocket Kitten', and remains active as of this writing, with reported attacks as recent as October 2015.Characterized by relatively unsophisticated technical merit and extensive use of spear phishing, the Magic Hound targeted individuals and organizations in the Middle East (including targets inside Iran itself), as well as across Europe and in the United States.The May 2014' Operation Saffron Rose' publication identifies an Iranian hacking group formerly named' Ajax Security' (code-named' Flying Kitten' by CrowdStrike) engaged in active spear phishing attacks on Iranian dissidents (those attempting to circumvent government traffic monitoring).An Iranian hacking group formerly named Ajax Security (code-named' Flying Kitten' by CrowdStrike) engaged in active spear phishing attacks on Iranian dissidents (those attempting to circumvent government traffic monitoring).The report specifies the Magic Hound targeted political, military and defense industry in the US, UK and Israel.ClearSky's September 2014 blog post first described active attacks using a piece of malware they dubbed' Gholee' (as appears in a malicious payload export function, potentially named after a popular Iranian singer9).The Rocket Kitten attacker group's main attack vector is spear-phishing.After learning of an active attack incident from the Rocket Kitten group on a customer network, Check Point researchers decided to actively join the investigation.As described in previous publications, the Rocket Kitten attackers make extensive use of various phishing schemes.While the recent paper from Trend Micro and ClearSky (' The Spy Kittens Are Back: Rocket Kitten 2') does extensively cover the campaign's narrative, we aimed to seek confirmation that our analyzed attack was positively connected to the same campaign and set out to provide additional value and insight.As the Rocket Kitten group's behavior was well characterized in previous publications (see the recent report from Trend Micro and ClearSky).Magic Hound will often find simpler ways for effective compromise, such as creative phishing and simple custom malware.We present the connection between Behzad Mesri, an Iranian national recently indicted for his involvement in hacking HBO, and Charming Kitten.Sometimes, they aim at establishing a foothold on the target's computer to gain access into their organization, but, based on our data, this is usually not their main objective, as opposed to other Iranian threat groups, such as Oilrig1 and CopyKittens2.A case of these obscure lines can be found in a blogpost published in coordination and parallel to this report - " Flying Kitten to Rocket Kitten, A Case of Ambiguity and Shared Code " 3 by Collin Anderson and Claudio Guarnieri.FireEye's publication of " Operation Saffron Rose " report, which described Flying Kitten's operations against aviation firms, led to the dismantling of Flying Kitten's infrastructure and the apparent end of its activities.To sum up, the HBO hacker - Behzad Mesri is a member of Turk Black Hat along with ArYaIeIrAn, who provides infrastructure for Charming Kitten activity via PersianDNS / Mahanserver together with Mohammad Rasoul Akbari, who is a Facebook friend of Behzad Mesri's.Charming kitten regularly target international media outlets with Persian-language services.It was a decoy to make visitor download a " Flash Player ", which was in fact DownPaper malware, analyzed later in this report.In addition to using PlugX and Poison Ivy (PIVY), both known to be used by the group, they also used a new Trojan called " ChChes " by the Japan Computer Emergency Response Team Coordination Center (JPCERT).Wapack labs also observed a similar sample targeting Japan in November.MenuPass spoofed several sender email addresses to send spear phishing emails, most notably public addresses associated with the Sasakawa Peace Foundation and The White House.menuPass typically makes use of a mix of DDNS and actor-registered domains in their attack campaigns.There is not much public information about the APT campaign called menuPass (also known as Stone Panda and APT10).A paper from FireEye in 2013 on several campaigns using PIVY included menuPass as one of them.Believed to have started activity in 2009 and to originate from China, the group initially was known for targeting US and overseas defense contractors but broadened their targeting as time passed.menuPass has targeted individuals and organizations in Japan since at least 2014, and as the same organizations and academics were largely targeted each month in these attacks, it further shows menuPass is persistent in attempts to compromise their targets.menuPass also heavily favors spear phishing, and so takes steps to socially engineer their spear phishes for maximum appearance of legitimacy.menuPass is an ongoing APT campaign with a broad range of targets and will likely continue to target Japan in the future.ChopShop1 is a new framework developed by the MITRE Corporation for network-based protocol decoders that enable security professionals to understand actual commands issued by human operators controlling endpoints.PyCommands, meanwhile, are Python scripts that automate tasks for Immunity Debugger, a popular tool for reverse-engineering malware binaries.Poison Ivy is a remote access tool that is freely available for download from its official web site at www.poisonivy-rat.com.First released in 2005, the tool has gone unchanged since 2008 with v ersion 2.3.2.Poison Ivy includes features common to most Windows-based RATs, including key logging, screen capturing, video capturing, file transfers, system administration, password theft, and traffic relaying.APT40 was previously reported as TEMP.Periscope and TEMP.Jumper.They move laterally and escalate system privileges to extract sensitive information — whenever the attacker wants to do so.4,5 Because some RATs used in targeted attacks are widely available, determining whether an attack is part of a broader APT campaign can be difficult.In 2011, three years after the most recent release of PIVY, attackers used the RAT to compromise security firm RSA and steal data about its SecureID authentication system.PIVY also played a key role in the 2011 campaign known as Nitro that targeted chemical makers, government agencies, defense contractors, and human rights groups.10,11 Still active a year later, the Nitro attackers used a zero-day vulnerability in Java to deploy PIVY in 2012.Just recently, PIVY was the payload of a zero-day exploit in Internet Explorer used in what is known as a " strategic web compromise " attack against visitors to a U.S. government website and a variety of others.The Poison Ivy builder kit allows attackers to customize and build their own PIVY server, which is delivered as mobile code to a target that has been compromised, typically using social engineering.Attackers can point and click their way through a compromised network and exfiltrate data.Commodity RATs also complicate efforts by security professionals to correlate a threat actor's activity over time—attackers can hide in the sea of malicious activity that also uses Poison Ivy-based malware.This report is an initial public release of research PwC UK and BAE Systems have conducted into new, sustained global campaigns by an established threat actor against managed IT service providers and their clients as well as several directly targeted organisations in Japan.Since late 2016, PwC UK and BAE Systems have been assisting victims of a new cyber espionage campaign conducted by APT10.The campaign, which we refer to as Operation Cloud Hopper, has targeted managed IT service providers (MSPs), allowing APT10 unprecedented potential access to the intellectual property and sensitive data of those MSPs and their clients globally.APT10 ceased its use of the Poison Ivy malware family after a 2013 FireEye report, which comprehensively detailed the malware's functionality and features, and its use by several China-based threat actors, including APT10.APT10 primarily used PlugX malware from 2014 to 2016, progressively improving and deploying newer versions, while simultaneously standardising their command and control function.PwC UK and BAE Systems assess it is highly likely that APT10 is a China-based threat actor with a focus on espionage and wide ranging information collection.APT10 is known to have exfiltrated a high volume of data from multiple victims, exploiting compromised MSP networks, and those of their customers, to stealthily move this data around the world.APT10, a name originally coined by FireEye, is also referred to as Red Apollo by PwC UK, CVNX by BAE Systems, Stone Panda by CrowdStrike, and menuPass Team more broadly in the public domain.The threat actor has previously been the subject of a range of open source reporting, including most notably a report by FireEye comprehensively detailing the threat actor's use of the Poison Ivy malware family and blog posts by Trend Micro3 similarly detailing the use of EvilGrab malware.The threat actor has previously been the subject of a range of open source reporting, including most notably a report by FireEye comprehensively detailing the threat actor's use of the Poison Ivy malware family and blog posts by Trend Micro similarly detailing the use of EvilGrab malware.APT10 has been in operation since at least 2009, and has evolved its targeting from an early focus on the US defence industrial base (DIB)1 and the technology and telecommunications sector, to a widespread compromise of multiple industries and sectors across the globe, most recently with a focus on MSPs.The research and ongoing tracking of APT10 by both PwC UK and BAE.APT10 has been in operation since at least 2009, and has evolved its targeting from an early focus on the US defence industrial base (DIB) and the technology and telecommunications sector, to a widespread compromise of multiple industries and sectors across the globe, most recently with a focus on MSPs.PwC UK has been engaged in supporting investigations linked to APT10 compromises.As a result of our analysis of APT10's activities, we believe that it almost certainly benefits from significant staffing and logistical resources, which have increased over the last three years, with a significant step-change in 2016.Due to the scale of the threat actor's operations throughout 2016 and 2017, we similarly assess it currently comprises multiple teams, each responsible for a different section of the day-to-day operations, namely domain registration, infrastructure management, malware development, target operations, and analysis.APT10 withdrew from direct targeting using Poison Ivy in 2013 and conducted its first known retooling operation, upgrading its capabilities and replatforming to use PlugX.It is highly likely that this is due to the release of the 2013 FireEye report.Our report will detail the most recent campaigns conducted by APT10, including the sustained targeting of MSPs, which we have named Operation Cloud Hopper, and the targeting of a number of Japanese institutions.MSPs therefore represent a high-payoff target for espionagefocused threat actors such as APT10.Given the level of client network access MSPs have, once APT10 has gained access to a MSP, it is likely to be relatively straightforward to exploit this and move laterally onto the networks of potentially thousands of other victims.This, in turn, would provide access to a larger amount of intellectual property and sensitive data.APT10 has been observed to exfiltrate stolen intellectual property via the MSPs, hence evading local network defences.The command and control (C2) infrastructure chosen by APT10 for Operation Cloud Hopper is predominantly referenced using dynamic-DNS domains.Several of these provide enterprise services or cloud hosting, supporting our assessment that APT10 are almost certainly targeting MSPs.The 13th FYP was released in March 2016 and the sectors and organisations known to be targeted by APT10 are broadly in line with the strategic aims documented in this plan.These aims outlined in the FYP will largely dictate the growth of businesses in China and are, therefore, likely to also form part of Chinese companies' business strategies.APT10 has, in the past, primarily been known for its targeting of government and US defence industrial base organisations, with the earliest known date of its activity being in December 2009.Observed APT10 targeting is in line with many of the historic compromises we have outlined previously as originating from China.In line with commonly used APT actor methodologies, the threat actor aligns its decoy documents to a topic of interest relevant to the recipient.This section details changes made to APT10 tools, techniques and procedures (TTPs) post-2014, following its shift from Poison Ivy to PlugX.We have observed that in cases where APT10 has infiltrated a target via an MSP, it continues to use the MSPs credentials.In order to gain any further credentials, APT10 will usually deploy credential theft tools such as mimikatz or PwDump, sometimes using DLL load order hijacking, to use against a domain controller, explained further in Annex B.APT10 achieves persistence on its targets primarily by using scheduled tasks or Windows services in order to ensure the malware remains active regardless of system reboots.For example, in addition to compromising high value domain controllers and security servers, the threat actor has also been observed identifying and subsequently installing malware on low profile systems that provide non-critical support functions to the business, and are thus less likely to draw the attention of system administrators.In the majority of instances APT10 used either a reverse shell or RDP connection to install its malware; the actor also uses these methods to propagate across the network.The tactical malware, historically EvilGrab, and now ChChes (and likely also RedLeaves), is designed to be lightweight and disposable, often being delivered through spear phishing.Once executed, tactical malware contains the capability to profile the network and manoeuvre through it to identify a key system of interest.We have also observed APT10 use DLL search order hijacking and sideloading, to execute some modified versions of open-source tools.For example, PwC UK has observed APT10 compiling DLLs out of tools, such as Mimikatz and PwDump6, and using legitimate, signed software, such as Windows Defender to load the malicious payloads.During our analysis of victim networks, we were able to observe APT10 once again initiate a retooling cycle in late 2016.We observed the deployment and testing of multiple versions of Quasar malware, and the introduction of the bespoke malware families ChChes and RedLeaves.APT10 is a constantly evolving, highly persistent China-based threat actor that has an ambitious and unprecedented collection programme against a broad spectrum of sectors, enabled by its strategic targeting.Since exposure of its operations in 2013, APT10 has made a number of significant changes intended to thwart detection of its campaigns.PwC UK and BAE Systems, working closely with industry and government, have uncovered a new, unparallelled campaign which we refer to as Operation Cloud Hopper.This operation has targeted managed IT service providers, the compromise of which provides APT10 with potential access to thousands of further victims.An additional campaign has also been observed targeting Japanese entities.APT10's malware toolbox shows a clear evolution from malware commonly associated with China-based threat actors towards bespoke in-house malware that has been used in more recent campaigns; this is indicative of APT10's increasing sophistication, which is highly likely to continue.The threat actor's known working hours align to Chinese Standard Time (CST) and its targeting corresponds to that of other known China-based threat actors, which supports our assessment that these campaigns are conducted by APT10.APT10 (MenuPass Group) is a Chinese cyber espionage group that FireEye has tracked since 2009.Its targets include the military organizations and governments of countries with national interests in the South China Sea, including some within the U.S. defense industrial base.Moafee may have chosen its targets based on the rich resources of South China Sea region – the world's second business sea-lane, according to Wikipedia – including rare earth metals, crude oil, and natural gas.DragonOK appears to operate out of China's Jiangsu Province.Moafee and DragonOK both use a well-known proxy tool – HUC Packet Transmit Tool (HTRAN) – to disguise their geographical locations.However, FireEye researchers do not have enough insight to reliably report a definitive connection to the Moafee and DragonOK groups.Both Moafee and DragonOK favor spear-phishing emails as an attack vector, often employing a decoy to deceive the victim.Attachments are typically sent as an executable file embedded in a ZIP archive or a password-protected Microsoft Office document.We observed Moafee running HTRAN proxies on their multiple Command and Control (C2) servers – all operated on CHINANET, and hosted in Guangdong Province.Like the Moafee group, we observed DragonOK running HTRAN to proxy their C2 servers, which are also operated on CHINANET but are hosted in the Jiangsu Province.Primarily focused on governments and military operations of countries with interests in the South China Sea, Moafee likely chooses its targets based on region's rich natural resources.By targeting high-tech and manufacturing operations in Japan and Taiwan, DragonOK may be acquiring trade secrets for a competitive economic advantage.Security researchers subsequently linked these attacks to a broader, yearlong campaign that targeted not just Israelis but Palestinians as well.and as discovered later, even the U.S. and UK governments.The second group, known as DragonOK, targets high-tech and manufacturing companies in Japan and Taiwan.In 2012, the Molerats attacks appeared to rely heavily on the XtremeRAT, a freely available tool that is popular with attackers based in the Middle East.But the group has also used Poison Ivy (PIVY), a RAT more commonly associated with threat actors in China — so much so that PIVY has, inaccurately, become synonymous with all APT attacks linked to China.This blog post analyzes several recent Molerats attacks that deployed PIVY against targets in the Middle East and in the U.S. We also examine additional PIVY attacks that leverage Arabic-language content related to the ongoing crisis in Egypt and the wider Middle East to lure targets into opening malicious files.We do not know whether using PIVY is an attempt by those behind the Molerats campaign to frame China-based threat actors for their attacks or simply evidence that they have added another effective, publicly-available RAT to its arsenal.We observed several attacks in June and July 2013 against targets in the Middle East and the U.S. that dropped a PIVY payload that connected to command-and-control (CnC) infrastructure used by the Molerats attackers.The archive contains an .exe file, sometimes disguised as a Microsoft Word file, a video, or another file format, using the corresponding icon.In addition to DustySky, the attackers use publicly available tools such as the following Remote Administration Tools (RAT): Poison Ivy, Nano Core, XtremeRAT, DarkComet and Spy-Net.DustySky (called " NeD Worm " by its developer) is a multi-stage malware in use since May 2015.It is in use by the Molerats (aka Gaza cybergang), a politically motivated group whose main objective, we believe, is intelligence gathering.Operating since 2012, the Molerats group's activity has been reported by Norman, Kaspersky, FireEye, and PwC.DustySky has been developed and used since May 2015 by Molerats (aka " Gaza cybergang "), a terrorist group whose main objective in this campaign is intelligence gathering.Most targets are from the Middle East: Israel, Egypt, Saudi Arabia, United Arab Emirates and Iraq.The United States and countries in Europe are targeted as well.The sample analyzed is f589827c4cf94662544066b80bfda6ab from late August 2015.The MuddyWater attacks are primarily against Middle Eastern nations.However, we have also observed attacks against surrounding nations and beyond, including targets in India and the USA.Targeted sectors of Molerats include governmental and diplomatic institutions, including embassies; companies from the aerospace and defence Industries; financial institutions; journalists; software developers.The Palo Alto Networks Unit 42 research team recently came across a series of malicious files which were almost identical to those targeting the Saudi Arabian government previously discussed by MalwareBytes.MuddyWater attacks are characterized by the use of a slowly evolving PowerShell-based first stage backdoor we call " POWERSTATS ".When we looked at the cluster of activity which consisted of what appeared to be espionage-focused attacks in the Middle East, we were somewhat confused as the previous public reporting had attributed these attacks to FIN7.FIN7 is a threat actor group that is financially motivated with targets in the restaurant, services and financial sectors.Following the trail of existing public reporting, the tie to FIN7 is essentially made based on a download observed from a MuddyWater C2, of a non-public tool " DNSMessenger ".There was a mistake in the original Morphisec analysis which linked these attacks to FIN7.The DNSMessenger malware is a shared tool, used by FIN7, MuddyWater and perhaps other groups.In September 2018, we found evidence of Seedworm and the espionage group APT28 (aka Swallowtail, Fancy Bear), on a computer within the Brazil-based embassy of an oil-producing nation.We found new variants of the Powermud backdoor, a new backdoor (Backdoor.Powemuddy), and custom tools for stealing passwords, creating reverse shells, privilege escalation, and the use of the native Windows cabinet creation tool, makecab.exe, probably for compressing stolen data to be uploaded.Seedworm likely functions as a cyber espionage group to secure actionable intelligence that could benefit their sponsor's interests.During the operations, the group used tools consistent with those leveraged during past intrusions including Powermud, a custom tool used by the Seedworm group, and customized PowerShell, LaZagne, and Crackmapexec scripts.The Seedworm group controls its Powermud backdoor from behind a proxy network to hide the ultimate command-and-control (C&C) location.After compromising a system, typically by installing Powermud or Powemuddy, Seedworm first runs a tool that steals passwords saved in users' web browsers and email, demonstrating that access to the victim's email, social media, and chat accounts is one of their likely goals.Seedworm then uses open-source tools such as LaZagne and Crackmapexec to obtain Windows authorization credentials.The group, which we call Seedworm (aka MuddyWater), has been operating since at least 2017, with its most recent activity observed in December 2018.The Seedworm group is the only group known to use the Powermud backdoor.Additionally, the group compromised organizations in Europe and North America that have ties to the Middle East.MuddyWater is an Iranian high-profile threat actor that's been seen active since 2017.Little detail is given on the nature of how the connection between DNSMessenger and MuddyWater was discovered it isn't possible for us to verify this link.Over the past year, we've seen the group extensively targeting a wide gamut of entities in various sectors, including Governments, Academy, Crypto-Currency, Telecommunications and the Oil sectors.Little detail is given on the nature of how the connection between DNSMessenger and MuddyWater was discovered it isn't possible for us to verify this link.Depending on each sample, the content of document is either a fake resume application, or a letter from the Ministry of Justice in Lebanon or Saudi Arabia.Analysts in our DeepSight Managed Adversary and Threat Intelligence (MATI) team have found a new backdoor, Backdoor.Powemuddy, new variants of Seedworm's Powermud backdoor (aka POWERSTATS), a GitHub repository used by the group to store their scripts, as well as several post-compromise tools the group uses to exploit victims once they have established a foothold in their network.From January 2018 to March 2018, through FireEye's Dynamic Threat Intelligence, we observed attackers leveraging the latest code execution and persistence techniques to distribute malicious macro-based documents to individuals in Asia and the Middle East.MuddyWater has engaged in prolific spear phishing of government and defense entities in Central and Southwest Asia.This actor has engaged in prolific spear phishing of government and defense entities in Central and Southwest Asia.When successfully executed, the malicious documents install a backdoor we track as POWERSTATS.The group is known for espionage campaigns in the Middle East.The threat group in this recently observed campaign – TEMP.Zagros – weaponized their malware using the following techniques.The MuddyWater campaign was first sighted in 2017 when it targeted the Saudi government using an attack involving PowerShell scripts deployed via Microsoft Office Word macro.The threat group in this recently observed campaign a TEMP.Zagros a weaponized their malware using the following techniques.Like the previous campaigns, these samples again involve a Microsoft Word document embedded with a malicious macro that is capable of executing PowerShell (PS) scripts leading to a backdoor payload.MuddyWater is a relatively new APT that surfaced in 2017.We attribute this activity to TEMP.Zagros (reported by Palo Alto Networks and Trend Micro as MuddyWater), an Iran-nexus actor that has been active since at least May 2017.We attribute this activity to TEMP.Zagros (reported by Palo Alto Networks and Trend Micro), an Iran-nexus actor that has been active since at least May 2017.Entities in these sectors are often " enabling victims " as telecommunications providers or IT services agencies and vendors could provide Seedworm actors with further victims to compromise.The group mainly targets the telecommunications and IT services sectors.However, the group behind MuddyWater has been known to target other countries in the Middle East, Europe and the US.The group has focused mainly on governmental targets in Iraq and Saudi Arabia, according to past telemetry.The new spear-phishing docs used by MuddyWater rely on social engineering to persuade users to enable macros.MuddyWater has recently been targeting victims likely from Lebanon and Oman, while leveraging compromised domains, one of which is owned by an Israeli web developer.As MuddyWater has consistently been using POWERSTATS as its main tool, they are relatively easy to distinguish from other actors.In March 2018, Trend Micro provided a detailed analysis of another campaign that bore the hallmarks of MuddyWater.In May 2018, Trend Micro found a new sample (Detected as W2KM_DLOADR.UHAOEEN) that may be related to this campaign.In May 2018, Trend Micro found a new sample (Detected as W2KM_DLOADR.UHAOEEN) that may be related to this campaign.Given the use of lure documents designed with social engineering in mind, it is likely that MuddyWater use phishing or spam to target users who are unaware of these documents' malicious nature.We recently noticed the group behind MuddyWater that appear to be targeting government bodies, military entities, telcos and educational institutions in Jordan, Turkey, Azerbaijan and Pakistan, in addition to the continuous targeting of Iraq and Saudi Arabia, other victims were also detected in Mali, Austria, Russia, Iran and Bahrain. .Observed Seedworm victims were located primarily in Pakistan and Turkey, but also in Russia, Saudi Arabia, Afghanistan, Jordan, and elsewhere.The MuddyWaters group has carried out a large number of attacks and demonstrated advanced social engineering, in addition to the active development of attacks, infrastructure and the use of new methods and techniques.Cisco Talos assesses with moderate confidence that a campaign we recently discovered called " BlackWater " is associated with suspected persistent threat actor MuddyWater.In this latest activity, BlackWater first added an obfuscated Visual Basic for Applications (VBA) script to establish persistence as a registry key.Talos has uncovered documents that we assess with moderate confidence are associated with suspected persistent threat actor MuddyWater.MuddyWater has been active since at least November 2017 and has been known to primarily target entities in the Middle East.Between February and March 2019, probable MuddyWater-associated samples indicated that BlackWater established persistence on the compromised host, at used PowerShell commands to enumerate the victim's machine and contained the IP address of the actor's command and control (C2).Despite last month's report on aspects of the MuddyWater campaign, the group is undeterred and continues to perform operations.Based on these observations, as well as MuddyWater's history of targeting Turkey-based entities, we assess with moderate confidence that this campaign is associated with the MuddyWater threat actor group.Our recent report, " The Chronicles of the Hellsing APT: the Empire Strikes Back " began with an introduction to the Naikon APT, describing it as " One of the most active APTs in Asia, especially around the South China Sea ".It came in the form of a " Tran Duy Linh " CVE-2012-0158 exploit kit document MD5: de8a242af3794a8be921df0cfa51885f61 and was observed on April 10, 2014.Considering the volume of Naikon activity observed and its relentless, repeated attack attempts, such a confrontation was worth looking into, so we did.The attackers appeared to be Chinese-speaking and targeted mainly top-level government agencies and civil and military organizations in countries such as the Philippines, Malaysia, Cambodia, Indonesia, Vietnam, Myanmar, Singapore, Nepal, Thailand, Laos and China.The oil and gas infrastructure nexus observed in connection with greensky27.vicp.net and other Unit 78020 (Naikon) infrastructure suggests targeting patterns supportive of the PRC's strategic interests over energy resources within the South China Sea and Southeast Asia.This Naikon report will be complemented by a follow-on report that will examine the Naikon TTP and the incredible volume of attack activity around the South China Sea that has been going on since at least 2010.The attackers appeared to be Chinese-speaking and targeted mainly top-level government agencies and civil and military organizations in countries such as the Philippines, Malaysia, Cambodia, Indonesia, Vietnam, Myanmar, Singapore, Nepal.This bait document, or email attachment, appears to be a standard Word document, but is in fact an CVE-2012-0158 exploit, an executable with a double extension, or an executable with an RTLO filename, so it can execute code without the user's knowledge or consent.In the Naikon scheme, a C&C server can be specialized XSControl software running on the host machine.It was during operator X's network monitoring that the attackers placed Naikon proxies within the countries' borders, to cloak and support real-time outbound connections and data exfiltration from high-profile victim organizations.In addition to stealing keystrokes, Naikon also intercepted network traffic.Operator X also took advantage of cultural idiosyncrasies in its target countries, for example, the regular and widely accepted use of personal Gmail accounts for work.In the spring of 2014, we noticed an increase in the volume of attack activity by the Naikon APT.In particular, we noticed that the Naikon group was spear-phished by an actor we now call " Hellsing ".More details about the cloak and dagger games between Naikon and Hellsing can be found in our blogpost: " The Chronicles of the Hellsing APT: The Empire Strikes Back ".Truvasys has been involved in several attack campaigns, where it has masqueraded as one of server common computer utilities, including WinUtils, TrueCrypt, WinRAR, or SanDisk.PROMETHIUM is an activity group that has been active as early as 2012.The group primarily uses Truvasys, a first-stage malware that has been in circulation for several years.NEODYMIUM is an activity group that is known to use a backdoor malware detected by Microsoft as Wingbird.PROMETHIUM and NEODYMIUM both used an exploit for CVE-2016-4117, a vulnerability in Adobe Flash Player that, at the time, was both unknown and unpatched.Data about Wingbird activity indicate that it is typically used to attack individual computers instead of networks.In early May 2016, both PROMETHIUM and NEODYMIUM started conducting attack campaigns against specific individuals in Europe.Meanwhile, NEODYMIUM used well-tailored spear-phishing emails with attachments that delivered the exploit code, ultimately leading to Wingbird's installation on victim computers.PROMETHIUM and NEODYMIUM both used a zero-day exploit that executed code to download a malicious payload.Wingbird, the advanced malware used by NEODYMIUM, has several behaviors that trigger alerts in Windows Defender ATP.This volume chronicles two activity groups, code-named PROMETHIUM and NEODYMIUM, both of which target individuals in a specific area of Europe.Although most malware today either seeks monetary gain or conducts espionage for economic advantage, both of these activity groups appear to seek information about specific individuals.In May 2016, both PROMETHIUM and NEODYMIUM were observed to launch attack campaigns.NEODYMIUM is an activity group that, like PROMETHIUM, conducted an attack campaign in early May 2016.Data about Wingbird activity indicates that it is typically used to attack individuals and individual computers instead of networks.NEODYMIUM also used the exact same CVE-2016-4117 exploit code that PROMETHIUM used, prior to public knowledge of the vulnerability's existence.NEODYMIUM used a backdoor detected by Windows Defender as Wingbird, whose characteristics closely match FinFisher, a government-grade commercial surveillance package.In May 2016, two apparently unrelated activity groups, PROMETHIUM and NEODYMIUM, conducted attack campaigns in Europe that used the same zeroday exploit while the vulnerability was publicly unknown.The Middle Eastern hacker group in this case is codenamed " BlackOasis " Kaspersky found the group was exploiting a Adobe Flash Player zero-day vulnerability (CVE-2016-4117) to remotely deliver the latest version of " FinSpy " malware, according to a new blog post published Monday.FinSpy, a final-stage payload that allows for an attacker to covertly learn what a target is talking about and who they are communicating with, is associated with Gamma Group — which goes by other names, including FinFisher and Lench IT Solutions.In the past, BlackOasis messages were designed to appear like news articles from 2016 about political relations between Angola and China.BlackOasis in recent months sent a wave of phishing emails.PROMETHIUM uses a unique set of tools and methods to perform actions like lateral movement and data exfiltration.Last year, Microsoft researchers described Neodymium's behavior as unusual: " unlike many activity groups, which typically gather information for monetary gain or economic espionage, PROMETHIUM and NEODYMIUM appear to launch campaigns simply to gather information about certain individuals.The discovery by Kaspersky marks at least the fifth zero-day exploit used by BlackOasis and exposed by security researchers since June 2015.Victims of BlackOasis have been observed in the following countries: Russia, Iraq, Afghanistan, Nigeria, Libya, Jordan, Tunisia, Saudi Arabia, Iran, Netherlands, Bahrain, United Kingdom and Angola.Unlike many activity groups, which typically gather information for monetary gain or economic espionage, PROMETHIUM and NEODYMIUM appear to launch campaigns simply to gather information about certain individuals.A cursory review of BlackOasis' espionage campaign suggests there is some overlap between the group's actions and Saudi Arabia's geopolitical interests.Kaspersky's research notes that BlackOasis hacked into computers based in Saudi Arabia.All 13 countries where Kaspersky reportedly observed BlackOasis activity are connected to Saudi Arabia in one of three ways: economically; from a national security perspective; or due to established policy agreements.The Operation Aurora, named by McAfee and announced in January 2010, and the WikiLeaks document disclosures of 2010 have highlighted the fact that external and internal threats are nearly impossible to prevent.These attacks have involved social engineering, spearphishing attacks, exploitation of Microsoft Windows operating systems vulnerabilities, Microsoft Active Directory compromises, and the use of remote administration tools (RATs) in targeting and harvesting sensitive competitive proprietary operations and project-financing information with regard to oil and gas field bids and operations.Night Dragon's attacks have involved social engineering, spearphishing attacks, exploitation of Microsoft Windows operating systems vulnerabilities, Microsoft Active Directory compromises, and the use of remote administration tools (RATs) in targeting and harvesting sensitive competitive proprietary operations and project-financing information with regard to oil and gas field bids and operations.We have identified the tools, techniques, and network activities used in these continuing attacks—which we have dubbed Night Dragon—as originating primarily in China.Attackers using several locations in China have leveraged C&C servers on purchased hosted services in the United States and compromised servers in the Netherlands to wage attacks against global oil, gas, and petrochemical companies, as well as individuals and executives in Kazakhstan, Taiwan, Greece, and the United States to acquire proprietary and highly confidential information.Attackers using several locations in China have leveraged C&C servers on purchased hosted services in the United States and compromised servers in the Netherlands to wage attacks against global oil, gas, and petrochemical companies, as well as individuals and executives in Kazakhstan, Taiwan, Greece, and the United States to acquire proprietary and highly confidential information.The primary operational technique used by Night Dragon comprised a variety of hacker tools, including privately developed and customized RAT tools that provided complete remote administration capabilities to the attacker.While Night Dragon attacks focused specifically on the energy sector, the tools and techniques of this kind can be highly successful when targeting any industry.In addition, the attackers employed hacking tools of Chinese origin and that are prevalent on Chinese underground hacking forums.We have been presented with a rare opportunity to see some development activities from the actors associated with the OilRig attack campaign, a campaign Unit 42 has been following since May 2016.Recently we were able to observe these actors making modifications to their Clayslide delivery documents in an attempt to evade antivirus detection.We collected two sets of Clayslide samples that appear to be created during the OilRig actor's development phase of their attack lifecycle.On November 15, 2016, an actor related to the OilRig campaign began testing the Clayslide delivery documents.The actor then made subtle modifications to the file and uploaded the newly created file to the same popular antivirus testing website in order to determine how to evade detection.In addition to making changes to the Excel worksheets that contain the decoy content, the actor also made changes to the worksheet that is initially displayed to the user.Taking a step back, as discussed in the Appendix in our initial OilRig blog, Clayslide delivery documents initially open with a worksheet named " Incompatible " that displays content that instructs the user to " Enable Content " to see the contents of the document, which in fact runs the malicious macro and compromises the system.This realization suggests that the OilRig threat group will continue to use their delivery documents for extended periods with subtle modifications to remain effective.Iranian threat agent OilRig has been targeting multiple organisations in Israel and other countries in the Middle East since the end of 2015.In recent attacks they set up a fake VPN Web Portal and targeted at least five Israeli IT vendors, several financial institutes, and the Israeli Post Office.In these websites they hosted malware that was digitally signed with a valid, likely stolen code signing certificate.In December 2015, Symantec published a post about " two Iran-based attack groups that appear to be connected, Cadelle and Chafer " that " have been using Backdoor.Cadelspy and Backdoor.Remexi to spy on Iranian individuals and Middle Eastern organizations ".In May 2016, Unit 42 observed attacks of OilRig primarily focused on financial institutions and technology organizations within Saudi Arabia.In recent OilRig attacks, the threat actors purport to be legitimate service providers offering service and technical troubleshooting as a social engineering theme in their spear-phishing attacks.The campaign appears highly targeted and delivers a backdoor we have called' Helminth'.Artifacts identified within the malware samples related to these attacks also suggest the targeting of the defense industry in Saudi Arabia, which appears to be related to an earlier wave of attacks carried out in the fall of 2015.In May 2016, Unit 42 began researching attacks that used spear-phishing emails with attachments, specifically malicious Excel spreadsheets sent to financial organizations within Saudi Arabia.Over the course of the attack campaign, we have observed two different variations of the Helminth backdoor, one written in VBScript and PowerShell that was delivered via a macro within Excel spreadsheets and the other a standalone Windows executable.FireEye also reported on these attacks in a May 22 blog post.The executable variant of Helminth is installed with a dropper Trojan that we are tracking as the HerHer Trojan.The Helminth executable variant is very similar in functionality to its script-based counterpart, as it also communicates with its C2 server using both HTTP and DNS queries.Helminth executable samples send artifacts within network beacons to its C2 server that the Trojan refers to as a' Group' and' Name'.It appears that the group values hardcoded into the malware is associated with the targeted organization, as several are Saudi Arabian organizations within the telecommunications and defense industries.It appears that the group values hardcoded into the malware is associated with the targeted organization, as several are Saudi Arabian organizations within the telecommunications and defense industries.This suggests that the threat actors are not only focused on financial organizations, as their target set could include other industries as well.The email address [email protected] and the geolocation of Tehran, Iran, being of note.The registrant information for kernel.ws also provided a geolocation of Tehran, IR and the email provider for the address used in checkgoogle.org was the same used for mydomain1607.com, chmail.ir.The mydomain1110.com domain did not appear to reuse any of the previously observed WHOIS data artifacts, but did still give a geolocation of Tehran in addition to the use of an email address linked to other domains thematically similar to the know command and control domains and are potentially related.While researching the OilRig campaign, we have seen two waves of targeted attacks on Saudi Arabian organizations in which a group of threat actors delivered the Helminth Trojan as a payload.The two variants of Helminth do require different delivery methods, with the script variant relying on an Excel spreadsheet for delivery, while the executable variant is more traditional in the fact that it can be installed without a delivery document.Since our first published analysis of the OilRig campaign in May 2016, we have continued to monitor this group for new activity.Additionally, the scope of organizations targeted by this group has expanded to not only include organizations within Saudi Arabia, but also a company in Qatar and government organizations in Turkey, Israel and the United States.The group behind the OilRig campaign continues to leverage spear-phishing emails with malicious Microsoft Excel documents to compromise victims.In addition to these instances, multiple Qatari organizations were the subject to spear phishing attacks carrying Helminth samples earlier this year.While the malware deployed is not terribly sophisticated, it uses techniques such as DNS command and control (C2) that allows it to stay under the radar at many establishments.Less than a week after Microsoft issued a patch for CVE-2017-11882 on Nov. 14, 2017, FireEye observed an attacker using an exploit for the Microsoft Office vulnerability to target a government organization in the Middle East.We assess this activity was carried out by a suspected Iranian cyber espionage threat group, whom we refer to as APT34, using a custom PowerShell backdoor to achieve its objectives.This threat group has conducted broad targeting across a variety of industries, including financial, government, energy, chemical, and telecommunications, and has largely focused its operations within the Middle East.We assess that APT34 works on behalf of the Iranian government based on infrastructure details that contain references to Iran, use of Iranian infrastructure, and targeting that aligns with nation-state interests.APT34 uses a mix of public and non-public tools, often conducting spear phishing operations using compromised accounts, sometimes coupled with social engineering tactics.We believe APT34 is involved in a long-term cyber espionage operation largely focused on reconnaissance efforts to benefit Iranian nation-state interests and has been operational since at least 2014.In May 2016, we published a blog detailing a spear phishing campaign targeting banks in the Middle East region that used macro-enabled attachments to distribute POWBAT malware.In July 2017, we observed APT34 targeting a Middle East organization using a PowerShell-based backdoor that we call POWRUNER and a downloader with domain generation algorithm functionality that we call BONDUPDATER, based on strings within the malware.APT34 loosely aligns with public reporting related to the group " OilRig ".The backdoor was delivered via a malicious .rtf file that exploited CVE-2017-0199.In this latest campaign, APT34 leveraged the recent Microsoft Office vulnerability CVE-2017-11882 to deploy POWRUNER and BONDUPDATER.The vulnerability was patched by Microsoft on Nov 14, 2017.The vulnerability exists in the old Equation Editor (EQNEDT32.EXE), a component of Microsoft Office that is used to insert and evaluate mathematical formulas.During the past few months, APT34 has been able to quickly incorporate exploits for at least two publicly vulnerabilities (CVE-2017-0199 and CVE-2017-11882) to target organizations in the Middle East.The OilRig group (AKA APT34, Helix Kitten) is an adversary motivated by espionage primarily operating in the Middle East region.We expect APT34 will continue to evolve their malware and tactics as they continue to pursue access to entities in the Middle East region.The OilRig group (AKA APT34, Helix Kitten) is an adversary motivated by espionage primarily operating in the Middle East region.We first discovered this group in mid-2016, although it is possible their operations extends earlier than that time frame.Between May and June 2018, Unit 42 observed multiple attacks by the OilRig group appearing to originate from a government agency in the Middle East.The use of script-based backdoors is a common technique used by the OilRig group as we have previously documented.The attacks delivered a PowerShell backdoor called QUADAGENT, a tool attributed to the OilRig group by both ClearSky Cyber Security and FireEye.A closer examination revealed the obfuscation used by the OilRig group in these QUADAGENT samples were likely the result of using an open-source toolkit called Invoke-Obfuscation.All three waves involved a single spear phishing email that appeared to originate from a government agency based in the Middle East.This latest attack consisted of three waves between May and June 2018.The OilRig group continues to be a persistent adversary group in the Middle East region.APT34 are involved in long-term cyber espionage operations largely focused on the Middle East.This threat group has conducted broad targeting across a variety of industries, including financial, government, energy, chemical, and telecommunications.Recent investigations by FireEye's Mandiant incident response consultants combined with FireEye iSIGHT Threat Intelligence analysis have given us a more complete picture of a suspected Iranian threat group, that we believe has been operating since at least 2014.Join us in a live webinar as we discuss this threat group whom we assess to be working on behalf of the Iranian Government, with a mission that would benefit nation-state geopolitical and economic needs.On January 8, 2018, Unit 42 observed the OilRig threat group carry out an attack on an insurance agency based in the Middle East.APT34 uses a mix of public and non-public tools, often conducting spear phishing operations using compromised accounts from trusted third parties, sometimes coupled with social engineering tactics.Just over a week later, on January 16, 2018, we observed an attack on a Middle Eastern financial institution.The January 8 attack used a variant of the ThreeDollars delivery document, which we identified as part of the OilRig toolset based on attacks that occurred in August 2017.However, the attack on January 16 did not involve ThreeDollars at all.Interestingly, the targeted organization in the January 16 attack had already been targeted by the OilRig group a year ago on January 2017.Instead, OilRig's attack involved delivering the OopsIE Trojan directly to the victim, most likely using a link in a spear phishing email.In the January 16, 2018 attack, we observed OilRig attacking an organization it previously targeted in January 2017.On January 8, 2018, the OilRig threat group sent an email with the subject Beirut Insurance Seminar Invitation to an insurance agency in the Middle East.The email contained an attachment named Seminar-Invitation.doc, which is a malicious Microsoft Word document we track as ThreeDollars.This suggests that due to the January 2017 attack, the targeted organization may have taken actions to counter known OilRig TTPs, in this case delivering malicious macro documents, causing the OilRig operators to adopt a different delivery tactic.We also identified another sample of ThreeDollars, created on January 15, 2017 with the file name strategy preparation.dot.The samples of ThreeDollars we collected in these attacks are structurally very similar to the first sample we analyzed in October 2017, down to the lure image used to trick the recipient into clicking the " Enable Content " button to execute the malicious macro.Since May 2016, we have continued to monitor and uncover various attacks and tools associated with the OilRig group.] com, which we previously identified in October 2017 to be an OilRig C2.Based on previously observed tactics, it is highly likely the OilRig group leveraged credential harvesting and compromised accounts to use the government agency as a launching platform for their true attacks.Inspecting the class C network for 185.162.235.0/24 shows us that another IP on the same network resolves to an OilRig domain, msoffice-cdn.com which we identified in August 2017.We had previously observed this author name in use once before, in the very first ThreeDollars document we collected that we had reported on in August 2017.The OilRig group continues to remain a highly active adversary in the Middle East region.Organizations detected a compromise themselves in 62% of the cases that Mandiant worked in 2017.The group conducts operations primarily in the Middle East, targeting financial, government, energy, chemical, telecommunications and other industries.Repeated targeting of Middle Eastern financial, energy and government organizations leads FireEye to assess that those sectors are a primary concern of APT34.The use of infrastructure tied to Iranian operations, timing and alignment with the national interests of Iran also lead FireEye to assess that APT34 acts on behalf of the Iranian government.APT34 uses a mix of public and non-public tools (Fig.2) and often uses compromised accounts to conduct spear-phishing operations.In November 2017, APT34 leveraged the Microsoft Office vulnerability CVE-2017-11882 to deploy POWRUNER and BONDUPDATER less than a week after Microsoft issued a patch.Unit 42's ongoing research into the OilRig campaign shows that the threat actors involved in the original attack campaign continue to add new Trojans to their toolset and continue their persistent attacks in the Middle East.When we first discovered the OilRig attack campaign in May 2016, we believed at the time it was a unique attack campaign likely operated by a known, existing threat group.The email address is associated with the Lebanese domain of a major global financial institution.POWRUNER was delivered using a malicious RTF file that exploited CVE-2017-0199.In July 2017, we observed the OilRig group using a tool they developed called ISMAgent in a new set of targeted attacks.In August 2017, we found this threat group has developed yet another Trojan that they call' Agent Injector' with the specific purpose of installing the ISMAgent backdoor.On August 23, 2017, we observed OilRig targeting an organization within the United Arab Emirates government.Based on that research and this observation, we postulate that the OilRig group gathered credentials to a legitimate user's OWA account and logged into the user's account to send phishing attacks to other individuals within the same, targeted organization.The OilRig group continues to target organizations in the Middle East, in this instance targeting the government of the United Arab Emirates.The payload embedded within the ISMInjector sample delivered in this attack is a variant of the ISMAgent backdoor that we had discussed in detail in our blog discussing a targeted attack on a Saudi Arabian technology company.Initial inspection of this attack suggested this was again the OilRig campaign using their existing toolset, but further examination revealed not only new variants of the delivery document we named Clayslide, but also a different payload embedded inside it.In July 2017, we observed an attack on a Middle Eastern technology organization that was also targeted by the OilRig campaign in August 2016.This technique was observed in previous Clayslide documents to access the script variant of the Helminth Trojan in earlier OilRig attacks.In the past, we had primarily associated the OilRig campaign with using the Clayslide documents to deliver as a payload a Trojan we named Helminth; in this instance, the payload was instead a variant of the ISMDoor Trojan with significant modifications which we are now tracking as ISMAgent.The June 2017 sample of Clayslide contained the same OfficeServicesStatus.vbs file found in the ISMAgent Clayslide document, but instead of having the payload embedded in the macro as segregated base64 strings that would be concatenated, this variant obtained its payload from multiple cells within the " Incompatible " worksheet.Clearly, OilRig incorporates a testing component within their development process, as we have previously observed OilRig performing testing activities on their delivery documents and their TwoFace webshells.While continuing research on the August 2018 attacks on a Middle eastern government that delivered BONDUPDATER, Unit 42 researchers observed OilRig's testing activities and with high confidence links this testing to the creation of the weaponized delivery document used in this attack.While investigating recent attacks performed by the threat actor group OilRig using their new Bondupdater version, Unit 42 researchers searched for additional Microsoft Office documents used by OilRig hoping to locate additional malware being used in other attacks during the same time period.The tester created the final test file less than 8 hours before the creation time of a delivery document, which was then delivered via a spear-phishing email 20 minutes later.During this testing, we saw document filenames that contain the C2 we witnessed in the targeted attack above, specifically the filenames XLS-withyourface.xls and XLS-withyourface – test.xls.These samples appeared to have been created by OilRig during their development and testing activities, all of which share many similarities with the delivery document used in the recent OilRig attack against a Middle Eastern government, N56.15.doc (7cbad6b3f505a199d6766a86b41ed23786bbb99dab9cae6c18936afdc2512f00) that we have also included in Table 1.However, they later continued by making modifications to the Excel document just prior to the attack on August 26th.HELIX KITTEN is likely an Iranian-based adversary group, active since at least late 2015, targeting organizations in the aerospace, energy, financial, government, hospitality and telecommunications business verticals.Additionally, HELIX KITTEN actors have shown an affinity for creating thoroughly researched and structured spear-phishing messages relevant to the interests of targeted personnel.In addition to Helminth, the ISMDoor implant is likely used by the Iran-based adversary to attack targets particularly those in the Middle East region.These incidents involved spear-phishing attacks, which characteristic of HELIX KITTEN, included emails containing malicious PowerShell in their macros that connects to known C2 infrastructure.During the summer of 2018, HELIX KITTEN actors were observed targeting entities in the Middle East — of note, targets appeared to be located in Bahrain and Kuwait.ISMDoor is able to exfiltrate data, take screenshots, and execute arbitrary commands on the victim's machine.In early November 2018, CrowdStrike observed activity from the HELIX KITTEN adversary at a customer in the telecommunications vertical.The attackers sent multiple emails containing macro-enabled XLS files to employees working in the banking sector in the Middle East.In the first week of May 2016, FireEye's DTI identified a wave of emails containing malicious attachments being sent to multiple banks in the Middle East region.Our data suggests that actors have deployed the RGDoor backdoor on webservers belonging to eight Middle Eastern government organizations, as well as one financial and one educational institution.In August 2018, Unit 42 observed OilRig targeting a government organization using spear-phishing emails to deliver an updated version of a Trojan known as BONDUPDATER.The OilRig group has been active since at least mid-2016, and continues their attack campaigns throughout the Middle East, targeting both governmental agencies and businesses on an almost routine basis.BONDUPDATER is a PowerShell-based Trojan first discovered by FireEye in mid-November 2017, when OilRig targeted a different Middle Eastern governmental organization.During the past month, Unit 42 observed several attacks against a Middle Eastern government leveraging an updated version of the BONDUPDATER malware, which now includes the ability to use TXT records within its DNS tunneling protocol for its C2 communications.The email had no subject and what initially drew our attention to OilRig's attack was the content of the spear phishing email.As expected, OilRig is continuing their onslaught of attacks well into 2018 with continued targeting in the Middle East.First identified in January 2015, Orangeworm has also conducted targeted attacks against organizations in related industries as part of a larger supply-chain attack in order to reach their intended victims.According to Symantec telemetry, almost 40 percent of Orangeworm's confirmed victim organizations operate within the healthcare industry.Their next move was to list any remote shared drives and then attempt to access remote shares owned by the specific government office they were targeting, again attempting to extract all Word documents.Sowbug's next move was to list any remote shared drives and then attempt to access remote shares owned by the specific government office they were targeting, again attempting to extract all Word documents.For example, in September 2016, Sowbug infiltrated an organization in Asia, deploying the Felismus backdoor on one of its computers, Computer A, using the file name adobecms.exe in CSIDL_WINDOWS\debug.In this case, the attackers maintained a presence on the target's network for nearly six months between September 2016 and March 2017.In other attacks, there was evidence that Felismus was installed using a tool known as Starloader (detected by Symantec as Trojan.Starloader).Symantec has found evidence of Starloader files being named AdobeUpdate.exe, AcrobatUpdate.exe, and INTELUPDATE.EXE among others.Additionally, Starloader was also observed deploying additional tools used by the attackers, such as credential dumpers and keyloggers.ASERT has learned of an APT campaign, possibly originating from DPRK, we are calling STOLEN PENCIL that is targeting academic institutions since at least May 2018.Once gaining a foothold on a user's system, the threat actors behind STOLEN PENCIL use Microsoft's Remote Desktop Protocol (RDP) for remote point-and-click access.The group uses an advanced piece of malware known as Remsec (Backdoor.Remsec) to conduct its attacks.Strider has been active since at least October 2011.Lua modules is a technique that has previously been used by Flamer.The Remsec malware used by Strider has a modular design.The group has maintained a low profile until now and its targets have been mainly organizations and individuals that would be of interest to a nation state's intelligence services.The group's targets include a number of organizations and individuals located in Russia.Remsec uses a Lua interpreter to run Lua modules which perform various functions.Russia.The attackers then began to perform reconnaissance activities on Computer A via cmd.exe, collecting system-related information, such as the OS version, hardware configuration, and network information.the group's targets include an organization in Sweden.the group's targets include an embassy in Belgium.Symantec will continue to search for more Remsec modules and targets in order to build upon our understanding of Strider and better protect our customers.Another such an exceptional espionage platform is " ProjectSauron, also known as " Strider ".In September 2015, our anti-targeted attack technologies caught a previously unknown attack.Forensic analysis indicates that the APT has been operational since at least June 2011 and was still active in 2016.After getting the IP, the ProjectSauron component tries to communicate with the remote server using its own (ProjectSauron) protocol as if it was yet another C&C server.In a number of the cases we analyzed, ProjectSauron deployed malicious modules inside the custom network encryption's software directory, disguised under similar filenames and accessing the data placed beside its own executable.The threat actor behind ProjectSauron commands a top-of-the-top modular cyber-espionage platform in terms of technical sophistication, designed to enable long-term campaigns through stealthy survival mechanisms coupled with multiple exfiltration methods.In September 2015, Kaspersky Lab's Anti-Targeted Attack Platform discovered anomalous network traffic in a government organization network.In late 2015, Symantec identified suspicious activity involving a hacking tool used in a malicious manner against one of our customers.Secondary ProjectSauron modules are designed to perform specific functions like stealing documents, recording keystrokes, and hijacking encryption keys from both infected computers and attached USB sticks.activity originated from three separate IP addresses, all located in Chengdu, China.We don't know the exact date Suckfly stole the certificates from the South Korean organizations.stolen certificates being used maliciously occurred in early 2014.Symantec detects this threat as Backdoor.Nidiran.Specifically, Suckfly used a specially crafted web page to deliver an exploit for the Microsoft Windows OLE Remote Code Execution Vulnerability (CVE-2014-6332), which affects specific versions of Microsoft Windows.The threat then executes " svchost.exe ".Attackers have been known to distribute malicious files masquerading as the legitimate iviewers.dll file and then use DLL load hijacking to execute the malicious code and infect the computer.Once exploit has been achieved, Nidiran is delivered through a self-extracting executable that extracts the components to a .tmp folder after it has been executed.The certificates Blackfly stole were also from South Korean companies, primarily in the video game and software development industry.Blackfly began with a campaign to steal certificates, which were later used to sign malware used in targeted attacks.In March 2016, Symantec published a blog on Suckfly, an advanced cyberespionage group that conducted attacks against a number of South Korean organizations to steal digital certificates.Since then we have identified a number of attacks over a two-year period, beginning in April 2014, which we attribute to Suckfly.The attacks targeted high-profile targets, including government and commercial organizations.these attacks were part of a planned operation against specific targets in India.While there have been several Suckfly campaigns that infected organizations with the group's custom malware Backdoor.Nidiran, the Indian targets show a greater amount of post-infection activity than targets in other regions.While there have been several Suckfly campaigns that infected organizations with the group's custom malware Backdoor.Nidiran, the Indian targets show a greater amount of post-infection activity than targets in other regions.The first known Suckfly campaign began in April of 2014.Suckfly's attacks on government organizations that provide information technology services to other government branches is not limited to India.It has conducted attacks on similar organizations in Saudi Arabia, likely because of the access that those organizations have.Similar to its other attacks, Suckfly used the Nidiran back door along with a number of hacktools to infect the victim's internal hosts.In 2015, Suckfly conducted a multistage attack.Suckfly conducted a multistage attack between April 22 and May 4.On April 22, 2015, Suckfly exploited a vulnerability on the targeted employee's operating system (Windows) that allowed the attackers to bypass the User Account Control and install the Nidiran back door to provide access for their attack.Suckfly conducted a multistage attack against an e-commerce organization.Suckfly conducted a multistage attack against an e-commerce organization based in India.Most of the group's attacks are focused on government or technology related companies and organizations.While we know the attackers used a custom dropper to install the back door, we do not know the delivery vector.While tracking what days of the week Suckfly used its hacktools, we discovered that the group was only active Monday through Friday.By targeting all of these organizations together, Suckfly could have had a much larger impact on India and its economy.While we don't know the motivations behind the attacks, the targeted commercial organizations, along with the targeted government organizations, may point in this direction.There is no evidence that Suckfly gained any benefits from attacking the government organizations, but someone else may have benefited from these attacks.During this time they were able to steal digital certificates from South Korean companies and launch attacks against Indian and Saudi Arabian government organizations.We believe that Suckfly will continue to target organizations in India and similar organizations in other countries in order to provide economic insight to the organization behind Suckfly's operations.This time, however, TA459 opportunistically used spear-phishing emails with a Microsoft Word attachment exploiting the recently patched CVE-2017-0199 to deploy the ZeroT Trojan, which in turn downloaded the PlugX Remote Access Trojan (RAT).Proofpoint is tracking this attacker, believed to operate out of China, as TA459.This time, however, attackers opportunistically used spear-phishing emails with a Microsoft Word attachment exploiting the recently patched CVE-2017-0199 to deploy the ZeroT Trojan, which in turn downloaded the PlugX Remote Access Trojan (RAT).TA549 possesses a diverse malware arsenal including PlugX, NetTraveler, and ZeroT.TA459 is well-known for targeting organizations in Russia and neighboring countries.Ongoing activity from attack groups like TA459 who consistently target individuals specializing in particular areas of research and expertise further complicate an already difficult security situation for organizations dealing with more traditional malware threats, phishing campaigns, and socially engineered threats every day.Using data collected from the Trend Micro™ Smart Protection Network, we are able to identify victims whose networks communicated with Taidoor C&C servers.The Taidoor attackers have been actively engaging in targeted attacks since at least March 4, 2009.Taidoor spoofed Taiwanese government email addresses to send out socially engineered emails in the Chinese language that typically leveraged Taiwan-themed issues.Despite some exceptions, the Taidoor campaign often used Taiwanese IP addresses as C&C servers and email addresses to send out socially engineered emails with malware as attachments.One of the primary targets of the Taidoor campaign appeared to be the Taiwanese government.Suckfly targeted one of India's largest e-commerce companies, a major Indian shipping company, one of India's largest financial organizations, and an IT firm that provides support for India's largest stock exchange.Data from the early part of this year shows that the Taidoor attackers rampantly used malicious.DOC files to exploit a Microsoft Common Controls vulnerability, CVE-2012-0158.Taidoor actively sent out malicious documents and maintained several IP addresses for command and control.The attackers actively sent out malicious documents and maintained several IP addresses for command and control.As part of their social engineering ploy, the Taidoor attackers attach a decoy document to their emails that, when opened, displays the contents of a legitimate document but executes a malicious payload in the background.Sometimes, however, certain samples made use of domain names for HTTP communication.Based on the command capabilities of the Taidoor malware, we were able to determine that data theft and data destruction was possible.The ultimate objective of targeted attacks is to acquire sensitive data.In December 2017, FireEye publicly released our first analysis on the TRITON attack where malicious actors used the TRITON custom attack framework to manipulate industrial safety systems at a critical infrastructure facility and inadvertently caused a process shutdown.In our most recent analysis, we attributed the intrusion activity that led to the deployment of TRITON to a Russian government-owned technical research institute in Moscow.For more in-depth analysis of TRITON and other cyber threats, consider subscribing to FireEye Cyber Threat Intelligence.During this time, the attacker must ensure continued access to the target environment or risk losing years of effort and potentially expensive custom ICS malware.In this report we continue our research of the actor's operations with a specific focus on a selection of custom information technology (IT) tools and tactics the threat actor leveraged during the early stages of the targeted attack lifecycle.Additionally, the actor possibly gained a foothold on other target networks—beyond the two intrusions discussed in this post – using similar strategies.There is often a singular focus from the security community on ICS malware largely due to its novel nature and the fact that there are very few examples found in the wild.ЦНИИХМ), a Russian government-owned technical research institution located in Moscow.In this blog post we provide additional information linking TEMP.Veles and their activity surrounding the TRITON intrusion to a Russian government-owned research institute.Analysis of these cryptcat binaries indicates that the actor continually modified them to decrease AV detection rates.TEMP.Veles' lateral movement activities used a publicly-available PowerShell-based tool, WMImplant.On multiple dates in 2017, TEMP.Veles struggled to execute this utility on multiple victim systems, potentially due to AV detection.Custom payloads utilized by TEMP.Veles in investigations conducted by Mandiant are typically weaponized versions of legitimate open-source software, retrofitted with code used for command and control.We identified file creation times for numerous files that TEMP.Veles created during lateral movement on a target's network.Adversary behavioral artifacts further suggest the TEMP.Veles operators are based in Moscow, lending some further support to the scenario that CNIIHM, a Russian research organization in Moscow, has been involved in TEMP.Veles activity.XENOTIME is easily the most dangerous threat activity publicly known.CNIIHM's characteristics are consistent with what we might expect of an organization responsible for TEMP.Veles activity.Dragos identified several compromises of ICS vendors and manufacturers in 2018 by activity associated with XENOTIME, providing potential supply chain threat opportunities and vendor-enabled access to asset owner and operator ICS networks.XENOTIME rose to prominence in December 2017 when Dragos and FireEye jointly published details of TRISIS destructive malware targeting Schneider Electric's Triconex safety instrumented system.Targeting a safety system indicates significant damage and loss of human life were either intentional or acceptable goals of the attack, a consequence not seen in previous disruptive attacks such as the 2016 CRASHOVERRIDE malware that caused a power loss in Ukraine.XENOTIME used credential capture and replay to move between networks, Windows commands, standard command-line tools such as PSExec, and proprietary tools for operations on victim hosts.XENOTIME configured TRISIS based on the specifics and functions of the Triconex system within the industrial control (ICS) environment.Dragos' data indicates XENOTIME remains active.TEMP.Veles created a custom malware framework and tailormade credential gathering tools, but an apparent misconfiguration prevented the attack from executing properly.Furthermore, Dragos' analysis of the TRISIS event continues as we recover additional data surrounding the incident.XENOTIME operates globally, impacting regions far outside of the Middle East, their initial target.Intelligence suggests the group has been active since at least 2014 and is presently operating in multiple facilities targeting safety systems beyond Triconex.Dragos instead focuses on threat behaviors and appropriate detection and response.Dragos assesses with moderate confidence that XENOTIME intends to establish required access and capability to cause a potential, future disruptive—or even destructive—event.However, full details on XENOTIME and other group tools, techniques, procedures, and infrastructure is available to network defenders via Dragos WorldView.This seems confusing as FireEye earlier publicly declared the TRITON as a discrete entity, linked to a Russian research institution, and christened it as " TEMP.Veles ".This seems confusing as FireEye earlier publicly declared the " TRITON actor " as a discrete entity, linked to a Russian research institution, and christened it as " TEMP.Veles ".Meanwhile, parallel work at Dragos (my employer, where I have performed significant work on the activity described above) uncovered similar conclusions concerning TTPs and behaviors, for both the 2017 event and subsequent activity in other industrial sectors.FireEye recently published a blog covering the tactics, techniques, and procedures (TTPs) for the " TRITON actor " when preparing to deploy the TRITON/TRISIS malware framework in 2017.Based on information gained from discussion with the initial TRITON/TRISIS responders and subsequent work on follow-on activity by this entity, Dragos developed a comprehensive (public) picture of adversary activity roughly matching FireEye's analysis published in April 2019, described in various media.Since late 2018, based upon the most-recent posting, FireEye appears to have " walked back " the previously-used terminology of TEMP.Veles and instead refers rather cryptically to the " TRITON actor ", while Dragos leveraged identified behaviors to consistently refer to an activity group, XENOTIME.Dragos leveraged identified behaviors to consistently refer to an activity group, XENOTIME.Aside from the competitive vendor naming landscape (which I am not a fan of in cases on direct overlap, but which has more to say for itself when different methodologies are employed around similar observations), the distinction between FireEye and Dragos' approaches with respect to the " TRITON actor " comes down to fundamental philosophical differences in methodology.In the 2018 public posting announcing TEMP.Veles, FireEye researchers noted that the institute in question at least supported TEMP.Veles activity in deploying TRITON.My understanding is FireEye labels entities where definitive attribution is not yet possible with the " TEMP " moniker (hence, TEMP.Veles) – yet in this case FireEye developed and deployed the label, then appeared to move away from it in subsequent reporting.In comparison, XENOTIME was defined based on principles of infrastructure (compromised third-party infrastructure and various networks associated with several Russian research institutions), capabilities (publicly- and commercially-available tools with varying levels of customization) and targeting (an issue not meant for discussion in this blog).Of note, this methodology of naming abstracts away the " who " element – XENOTIME may represent a single discrete entity (such as a Russian research institution) or several entities working in coordination in a roughly repeatable, similar manner across multiple events.Much like the observers watching the shadows of objects cast upon the wall of the cave, these two definitions (XENOTIME and TEMP.Veles, both presumably referring to " the TRITON actor ") describe the same phenomena, yet at the same time appear different.To better understand how the adversary was operating and what other actions they had performed, CTU researchers examined cmd.exe and its supporting processes to uncover additional command line artifacts.CTU researchers assess with high confidence that threat groups like Threat Group-1314 will continue to live off of the land to avoid detection and conduct their operations.Analysis of TG-3390's operations, targeting, and tools led CTU researchers to assess with moderate confidence the group is located in the People's Republic of China.The threat actors target a wide range of organizations: CTU researchers have observed TG-3390 actors obtaining confidential data on defense manufacturing projects, but also targeting other industry verticals and attacking organizations involved in international relations.In comparison to other threat groups, TG-3390 is notable for its tendency to compromise Microsoft Exchange servers using a custom backdoor and credential logger.CTU researchers have evidence that the TG-3390 compromised U.S and UK organizations in the following verticals: manufacturing (specifically aerospace (including defense contractors), automotive, technology, energy, and pharmaceuticals), education, and legal, as well as organizations focused on international relations.Based on analysis of the group's SWCs, TG-3390 operations likely affect organizations in other countries and verticals.TG-3390 operates a broad and long-running campaign of SWCs and has compromised approximately 100 websites as of this publication.CTU researchers have evidence that the threat group compromised U.S and UK organizations in the following verticals: manufacturing (specifically aerospace (including defense contractors), automotive, technology, energy, and pharmaceuticals), education, and legal, as well as organizations focused on international relations.Like many threat groups, TG-3390 conducts strategic web compromises (SWCs), also known as watering hole attacks, on websites associated with the target organization's vertical or demographic to increase the likelihood of finding victims with relevant information.Through an IP address whitelisting process, the threat group selectively targets visitors to these websites.After the initial compromise, TG-3390 delivers the HTTPBrowser backdoor to its victims.CTU researchers assess with high confidence that TG-3390 uses information gathered from prior reconnaissance activities to selectively compromise users who visit websites under its control.TG-3390 uses the PlugX remote access tool.The SWC of a Uyghur cultural website suggests intent to target the Uyghur ethnic group, a Muslim minority group primarily found in the Xinjiang region of China.The threat actors have used the Baidu search engine, which is only available in Chinese, to conduct reconnaissance activities.Recently, CTU researchers responded to an intrusion perpetrated by Threat Group-1314, one of numerous threat groups that employ the " living off the land " technique to conduct their intrusions.CTU researchers have observed the Threat Group-3390 obtaining information about specific U.S. defense projects that would be desirable to those operating within a country with a manufacturing base, an interest in U.S. military capability, or both.CTU researchers have observed the threat group obtaining information about specific U.S. defense projects that would be desirable to those operating within a country with a manufacturing base, an interest in U.S. military capability, or both.TG-3390 can quickly leverage compromised network infrastructure during an operation and can conduct simultaneous intrusions into multiple environments.Malware used by the threat group can be configured to bypass network-based detection; however, the threat actors rarely modify host-based configuration settings when deploying payloads.TG-3390 uses older exploits to compromise targets, and CTU researchers have not observed the threat actors using zero-day exploits as of this publication.In addition to using SWCs to target specific types of organizations, TG-3390 uses spearphishing emails to target specific victims.After gaining access to a target network in one intrusion analyzed by CTU researchers, TG-3390 actors identified and exfiltrated data for specific projects run by the target organization, indicating that they successfully obtained the information they sought.Based on this information, CTU researchers assess that TG-3390 aims to collect defense technology and capability intelligence, other industrial intelligence, and political intelligence from governments and NGOs.Incident response engagements have given CTU researchers insight into the tactics TG-3390 employs during intrusions.CTU researchers have not observed TG-3390 actors performing reconnaissance prior to compromising organizations.CTU researchers have observed the threat actors installing a credential logger and backdoor on Microsoft Exchange servers, which requires a technical grasp of Internet Information Services (IIS).TG-3390 is capable of using a C2 infrastructure that spans multiple networks and registrars.TG-3390 SWCs may be largely geographically independent, but the group's most frequently used C2 registrars and IP net blocks are located in the U.S.Using a U.S.-based C2 infrastructure (see Figure 7) to compromise targets in the U.S. helps TG-3390 actors avoid geo-blocking and geo-flagging measures used in network defense.The threat actors create PlugX DLL stub loaders that will run only after a specific date.The compile dates of the samples analyzed by CTU researchers are all later than the hard-coded August 8, 2013 date, indicating that the code might be reused from previous tools.One archive sample analyzed by CTU researchers contained a legitimate PDF file, a benign image of interest to targets (see Figure 8), and an HTTPBrowser installer disguised as an image file.CTU researchers have observed TG-3390 activity between 04:00 and 09:00 UTC, which is 12:00 to 17:00 local time in China (UTC +8).TG-3390 sends spearphishing emails with ZIP archive attachments.CTU researchers have observed TG-3390 compromising a target organization's externally and internally accessible assets, such as an OWA server, and adding redirect code to point internal users to an external website that hosts an exploit and delivers malware.TG-3390 actors have used Java exploits in their SWCs.In particular, TG-3390 has exploited CVE-2011-3544, a vulnerability in the Java Runtime Environment, to deliver the HTTPBrowser backdoor; and CVE-2010-0738, a vulnerability in JBoss, to compromise internally and externally accessible assets used to redirect users' web browsers to exploit code.In activity analyzed by CTU researchers, TG-3390 executed the Hunter web application scanning tool against a target server running IIS.In particular, the threat actors have exploited CVE-2011-3544, a vulnerability in the Java Runtime Environment, to deliver the HTTPBrowser backdoor; and CVE-2010-0738, a vulnerability in JBoss, to compromise internally and externally accessible assets used to redirect users' web browsers to exploit code.TG-3390 uses DLL side loading, a technique that involves running a legitimate, typically digitally signed, program that loads a malicious DLL.CTU researchers have observed the Threat Group-3390 employing legitimate Kaspersky antivirus variants in analyzed samples.The adversaries have used this technique to allow PlugX and HTTPBrowser to persist on a system.CTU researchers have observed the TG-3390 employing legitimate Kaspersky antivirus variants in analyzed samples.TG-3390 actors have deployed the OwaAuth web shell to Exchange servers, disguising it as an ISAPI filter.In other cases, threat actors placed web shells on externally accessible servers, sometimes behind a reverse proxy, to execute commands on the compromised system.CTU researchers have discovered numerous details about TG-3390 operations, including how the adversaries explore a network, move laterally, and exfiltrate data.When the adversaries' operations are live, they modify the record again to point the C2 domain to an IP address they can access.They then identify the Exchange server and attempt to install the OwaAuth web shell.If the OwaAuth web shell is ineffective because the victim uses two-factor authentication for webmail, TG-3390 identify other externally accessible servers and deploy ChinaChopper web shells.After compromising an initial victim's system (patient 0), the threat actors use the Baidu search engine to search for the victim's organization name.CTU researchers discovered the threat actors searching for " [company] login ", which directed them to the landing page for remote access.TG-3390 actors keep track of and leverage existing ASPXTool web shells in their operations, preferring to issue commands via an internally accessible web shell rather than HTTPBrowser or PlugX.Within six hours of entering the environment, the threat actors compromised multiple systems and stole credentials for the entire domain.Despite multiple public disclosures of their activities, BRONZE UNION remains an active and formidable threat as of this publication.In 2015, the SecureWorks® Counter Threat Unit™ (CTU) research team documented the BRONZE UNION threat group (formerly labeled TG-3390), which CTU™ analysis suggests is based in the People's Republic of China (PRC).After reestablishing access, the adversaries download tools such as gsecudmp and WCE that are staged temporarily on websites that TG-3390 previously compromised but never used.In 2015, the SecureWorks documented the BRONZE UNION threat group (formerly labeled TG-3390), which CTU analysis suggests is based in the People's Republic of China (PRC).BRONZE UNION threat campaigns that illustrate the evolution of the group's methods and espionage objectives.Based on BRONZE UNION's targeting activity, CTU researchers assess it is highly likely that the group focuses on political and defense organization networks.this SWC was used to specifically target Turkish.In 2016, the threat actors conducted a strategic web compromise (SWC) on the website of an international industry organization that affected aerospace, academic, media, technology, government, and utilities organizations around the world.In addition, BRONZE UNION activity on multiple U.S.-based defense manufacturer networks included the threat actors seeking information associated with aerospace technologies, combat processes, and naval defense systems.this SWC was used to specifically target Turkish goverment.Since that analysis, CTU researchers have observed multiple BRONZE UNION threat campaigns that illustrate the evolution of the group's methods and espionage objectives.this SWC was used to specifically target Turkish banking.this SWC was used to specifically target Turkish academic networks.BRONZE UNION has consistently demonstrated the capability to conduct successful large-scale intrusions against high-profile networks and systems.The threat actors appear to be able to create and leverage multiple SWCs in parallel.In a separate incident, CTU researchers identified a file named s.txt, which is consistent with the output of the Netview host-enumeration tool.BRONZE UNION actors leveraged initial web shell access on Internet-facing systems to conduct internal reconnaissance.BRONZE UNION appears to use a combination of self-registered IP addresses and commercial VPN services in its command and control (C2) and operational infrastructure.This script relays commands and output between the controller and the system.The threat actors used the appcmd command-line tool to unlock and disable the default logging component on the server (systsm.webServer/httplogging) and then delete existing logs from the system (see Figure 4).In 2016, CTU researchers observed the group using native system.In March 2018 we detected an ongoing campaign.TG-3390's activities indicate a preference for leveraging SWCs and scan-and-exploit techniques to compromise target systems.As of this publication, BRONZE UNION remains a formidable threat group that targets intellectual property and executes its operations at a swift pace.we detected an ongoing campaign targeting a national data center.The operators used the HyperBro Trojan as their last-stage in-memory remote administration tool (RAT).we detected an ongoing campaign targeting a national data center in the Centeral Asia.The tools found in this campaign, such as the HyperBro Trojan, are regularly used by a variety of Chinese-speaking actors.Due to tools and tactics in use we attribute the campaign to LuckyMouse Chinese-speaking actor (also known as EmissaryPanda and APT27).It's possible TG-3390 used a waterhole to infect data center employees.Even when we observed LuckyMouse using weaponized documents with CVE-2017-11882 (Microsoft Office Equation Editor, widely used by Chinese-speaking actors since December 2017), we can′t prove they were related to this particular attack.We suspect this router was hacked as part of the campaign in order to process the malware's HTTP requests.In March 2017, Wikileaks published details about an exploit affecting Mikrotik called ChimayRed.There were traces of HyperBro in the infected data center from mid-November 2017.In March 2017, Wikileaks published details about an exploit affecting Mikrotik called ChimayRed.This is a hacking group with Chinese origins which targets selected organisations related with education, energy and technology.Usually, the delivered payload is either the well-known' PlugX' or' HTTPBrowser' RAT, a tool which is believed to have Chinese origins and to be used only by certain Chinese hacking groups.Emissary Panda has used many ways with the most notable being the exploits from the Hacking Team leak.Emissary Panda is still active and continues to target selected organisations.Cybersecurity researchers have uncovered an espionage campaign that has targeted a national data center of an unnamed central Asian country in order to conduct watering hole attacks.The campaign is believed to be active covertly since fall 2017.LuckyMouse, also known as Iron Tiger, EmissaryPanda, APT 27 and Threat Group-3390, is the same group of Chinese hackers who was found targeting Asian countries with Bitcoin mining malware early this year.March by security researchers from Kaspersky Labs.For example, at the end of 2016 CTU researchers observed the threat actors using native system functionality to disable logging processes and delete logs within a network.The group has been active since at least 2010 and was behind many previous attack campaigns resulting in the theft of massive amounts of data from the directors and managers of US-based defense contractors.attacks to a Chinese-speaking threat actor group called LuckyMouse.LuckyMouse has been spotted using a widely used Microsoft Office vulnerability (CVE-2017-11882).This time the group chose a national data center as its target from an unnamed country in Central Asia in an attempt to gain " access to a wide range of government resources at one fell swoop ".The initial attack vector used in the attack against the data center is unclear, but researchers believe LuckyMouse possibly had conducted watering hole or phishing attacks to compromise accounts belonging to employees at the national data center.According to the researchers, the group injected malicious JavaScript code into the official government websites associated with the data center in order to conduct watering hole attacks.the targeted system with a piece of malware called HyperBro, a Remote Access Trojan (RAT).The main command and control (C&C) server used in this attack is hosted on an IP address which belongs to a Ukrainian ISP, specifically to a MikroTik router running a firmware version released in March 2016.the targets of the hacking group were in the automotive.Dell SecureWorks researchers unveiled a report on Threat Group-3390 that has targeted companies around the world while stealing massive amounts of industrial data.The group, believed to be based in China, has also targeted defense contractors, colleges and universities, law firms, and political organizations — including organizations related to Chinese minority ethnic groups.LAS VEGAS—Today at the Black Hat information security conference, Dell SecureWorks researchers unveiled a report on a newly detected hacking group that has targeted companies around the world while stealing massive amounts of industrial data.Designated as Threat Group 3390 and nicknamed " Emissary Panda " by researchers, the hacking group has compromised victims' networks largely through " watering hole " attacks launched from over 100 compromised legitimate websites, sites picked because they were known to be frequented by those targeted in the attack.the United Kingdom had data stolen by members of Emissary Panda.the US had data stolen by members of Emissary Panda.No zero-day vulnerabilities were used to breach targeted networks, instead " TG-3390 relied on old vulnerabilities such as CVE-2011-3544 " — a near-year-old Java security hole — " and CVE-2010-0738 to compromise their targets ", Dell SecureWorks' researchers reported.The group used a number of tools common to other Chinese hacking groups, but they had a few unique tools of their own with interfaces developed for Standard (Simplified) Chinese.If the address falls within ranges that the attackers are interested in, the malicious site waits for their next page view to drop an exploit on the desirable target's PC.Visitors to sites exploited by Emissary Panda are directed by code embedded in the sites to a malicious webpage, which screens their IP address.There has also been at least one victim targeted by a spear-phishing attack.A variety of malware, including the PlugX tool, was shared with other known Chinese threat groups.Once inside networks, the group generally targeted Windows network domain controllers and Exchange e-mail servers, targeting user credentials to allow them to move to other systems throughout the targeted network.They used an exploit of Internet Information Server to inject keylogger and backdoor malware onto the Exchange server.But two tools used were unique to the group: ASPXTool, an Internet Information Services (IIS) specific " Web shell " used to gain access to servers inside a target's network; and the OwaAuth credential stealing tool and Web shell, used to attack Microsoft Exchange servers running the Web Outlook interface.By using such features and tools, attackers are hoping to blend in on the victim's network and hide their activity in a sea of legitimate processes.TAA leverages advanced artificial intelligence and machine learning that combs through Symantec's data lake of telemetry in order to spot patterns associated with targeted attacks.January 2018, TAA triggered an alert at a large telecoms operator in Southeast Asia.Thrip was using PsExec to move laterally between computers on the company's network.TAA triggered an alert at a large telecoms operator in Southeast Asia.AA triggered an alert at a large telecoms operator in Southeast Asia.PsExec is a Microsoft Sysinternals tool for executing processes on other systems and is one of the most frequently seen legitimate pieces of software used by attackers attempting to live off the land.TAA not only flagged this malicious use of PsExec, it also told us what the attackers were using it for.Thrip was attempting to remotely install a previously unknown piece of malware (Infostealer.Catchamas) on computers within the victim's network.three computers in China being used to launch the Thrip attacks.Perhaps the most worrying discovery we made was that Thrip had targeted a satellite communications operator.Thrip seemed to be mainly interested in the operational side of the company.This suggests to us that Thrip's motives go beyond spying and may also include disruption.Armed with this information about the malware and living off the land tactics being used by this group of attackers whom we named Thrip, we broadened our search to see if we could find similar patterns that indicated Thrip had been targeting other organizations.The group had also targeted three different telecoms operators, all based in Southeast Asia.In all cases, based on the nature of the computers infected by Thrip, it appeared that the telecoms companies themselves and not their customers were the targets of these attacks.Catchamas is a custom Trojan designed to steal information from an infected computer and contains additional features designed to avoid detection.Many of the tools they use now feature new behaviors, including a change in the way they maintain a foothold in the targeted network.Execute a command through exploits for CVE-2017-11882.Execute a command through exploits for CVE-2018-0802.The backdoor will load the encrypted configuration file and decrypt it, then use Secure Sockets Layer (SSL) protocol to connect to command-and-control (C&C) servers.TClient is actually one of Tropic Trooper's other backdoors.The malicious loader will use dynamic-link library (DLL) hijacking — injecting malicious code into a process of a file/application — on sidebar.exe and launch dllhost.exe (a normal file).TClient, for instance, uses DLL hijacking and injection that may not be as noticeable to others.The backdoor noted by other security researchers was encoded with different algorithms and configured with different parameter names in 2016, for instance.Taiwan has been a regular target of cyber espionage threat actors for a number of years.In early August, Unit 42 identified two attacks using similar techniques.which has been active since at least 2011.One of the attacks used Tropic Trooper's known Yahoyah malware, but the other attack deployed the widely available Poison Ivy RAT.This confirms the actors are using Poison Ivy as part of their toolkit, something speculated in the original Trend Micro report but not confirmed by them.The document attached to this e-mail exploits CVE-2012-0158.As we have noted in many earlier reports, attackers commonly use decoy files to trick victims into thinking a malicious document is actually legitimate.Further analysis uncovered a handful of ties indicating the actors may also be using the PCShare malware family, which has not been previously tied to the group.This matches with known Tactics, Techniques, and Procedures (TTPs) for Tropic Trooper, targeting both government institutions and also the energy industry in Taiwan.Tropic Trooper is also still exploiting CVE-2012-0158, as are many threat actors.The Tropic Trooper threat actor group has been known to target governments and organizations in the Asia Pacific region for at least six years.Turla is a notorious group that has been targeting governments.Turla is known to run watering hole and spearphishing campaigns to better pinpoint their targets.Turla is a notorious group that has been targeting government officials.The documents attached to spear-phishing e-mails used in both attacks contain code that exploits CVE-2012-0158, which despite its age remains one of the most common Microsoft Word vulnerabilities being exploited by multiple threat actors.Turla is a notorious group that has been targeting diplomats.The codename for Turla APT group in this presentation is MAKERSMARK.The Intercept reported that there exists a 2011 presentation by Canada's Communication Security Establishment (CSE) outlining the errors made by the Turla operators during their operations even though the tools they use are quite advanced.The witnessed techniques, tactics and procedures (TTPs) are in-line with what we usuallysee in Turla's operation: a first stage backdoor, such as Skipper, likely delivered through spearphishing followed by the appearance on the compromised system of a second stage backdoor, Gazerin this case.Southeastern Europe as well as countries in the former Soviet Union Republichas recently been the main target.Finally, there are many similarities between Gazer and other second stage backdoors used by the Turla group such as Carbon and Kazuar.Skipper, which has been linked to Turla in the past, was found alongside Gazer in most cases we investigated.Turla APT group makes an extra effort to avoid detection by wiping files securely, changing the strings and randomizing what could be simple markers through the different backdoor versions.The attackers behind Epic Turla have infected several hundred computers in more than 45 countries, including government institutions.Turla all uses an encrypted container to store the malware's components and configuration and they also log their actions in a file.Over the last 10 months, Kaspersky Lab researchers have analyzed a massive cyber-espionage operation which we call " Epic Turla ".We also observed exploits against older (patched) vulnerabilities, social engineering techniques and watering hole strategies in these attacks.The attackers behind Epic Turla have infected several hundred computers in more than 45 countries, including embassies.The attackers behind Epic Turla have infected several hundred computers in more than 45 countries, including military.The attackers behind Epic Turla have infected several hundred computers in more than 45 countries, including education.When G-Data published on Turla/Uroburos back in February, several questions remained unanswered.The attackers behind Epic Turla have infected several hundred computers in more than 45 countries, including research and pharmaceutical companies.The primary backdoor used in the Epic attacks is also known as " WorldCupSec ", " TadjMakhal ", " Wipbot " or " Tavdig ".Thrip's motive is likely espionage and its targets include those in the communications, geospatial imaging, and defense sectors, both in the United States and Southeast Asia.One big unknown was the infection vector for Turla (aka Snake or Uroburos).The mothership server is generally a VPS, which runs the Control panel software used to interact with the victims.the backdoor is packaged together with the CVE-2013-5065 EoP exploit and heavily obfuscated.Once a victim is confirmed as " interesting ", the attackers upload another Epic backdoor which has a unique ID used to control this specific victim.Our analysis indicates this is a sophisticated multi-stage infection; which begins with Epic Turla.this attack against a Kaspersky Lab user on August 5, 2014.VENOMOUS BEAR is an advanced, Russia-based adversary that's been active since at least 2004.Venomous Bear has deployed malware to targets using several novel methods.For years, Turla has relied, among other impersonations, on fake Flash installers to compromise victims.Turla merely uses the Adobe brand to trick users into downloading the malware.By looking at our telemetry, we found evidence that Turla installers were exfiltrating information to get.adobe.com URLs since at least July 2016.Thus, it is clear they are trying to be as stealthy as possible by hiding in the network traffic of the targeted organizations.Finally, some of the victims are also infected with other Turla-related malware such as ComRAT or Gazer.Kaspersky Lab documented this behavior in 2014.It is not a new tactic for Turla to rely on fake Flash installers to try to trick the user to install one of their backdoors.Turla operators could use an already-compromised machine in the network of the victim's organization to perform a local MitM attack.Our January 2018 white paper was the first public analysis of a Turla campaign called Mosquito.It is not the first time Turla has used generic tools.In the past, we have seen the group using open-source password dumpers such as Mimikatz.Starting in March 2018, we observed a significant change in the campaign: it now leverages the open source exploitation framework Metasploit before dropping the custom Mosquito backdoor.Even an experienced user can be fooled by downloading a malicious file that is apparently from adobe.com, since the URL and the IP address correspond to Adobe's legitimate infrastructure.However, to our knowledge, this is the first time Turla has used Metasploit as a first stage backdoor, instead of relying on one of its own tools such as Skipper.Traffic was intercepted on a node between the end machine and the Adobe servers, allowing Turla's operators to replace the legitimate Flash executable with a trojanized version.At the beginning of March 2018, as part of our regular tracking of Turla's activities, we observed some changes in the Mosquito campaign.In this post, we have presented the evolutions of the Turla Mosquito campaign over the last few months.Primary targets for this adversary are in the government, aerospace, NGO, defense, cryptology and education sectors.Turla's campaign still relies on a fake Flash installer but, instead of directly dropping the two malicious DLLs, it executes a Metasploit shellcode and drops, or downloads from Google Drive, a legitimate Flash installer.The Turla espionage group has been targeting various institutions for many years.Recently, we found several new versions of Carbon, a second stage backdoor in the Turla group arsenal.The Turla group is known to be painstaking and work in stages, first doing reconnaissance on their victims' systems before deploying their most sophisticated tools such as Carbon.Kaspersky APT Intelligence Reporting subscription, customers received an update in mid-February 2017.Like previous Turla activity, WhiteBear leverages compromised websites and hijacked satellite connections for command and control (C2) infrastructure.WhiteBear is a parallel project or second stage of the Skipper Turla cluster of activity documented in another private intelligence report " Skipper Turla – the White Atlas framework " from mid-2016.However, despite the similarities to previous Turla campaigns, we believe that WhiteBear is a distinct project with a separate focus.From February to September 2016, WhiteBear activity was narrowly focused on embassies and consular operations around the world.Continued WhiteBear activity later shifted to include defense-related organizations into June 2017.All of these early WhiteBear targets were related to embassies and diplomatic/foreign affair organizations.Thus, Turla operators had access to some highly sensitive information (such as emails sent by the German Foreign Office staff) for almost a year.Our investigation also led to the discovery of dozens of email addresses registered by Turla operators for this campaign and used to receive exfiltrated data from the victims.It mainly targets Microsoft Outlook, a widely used mail client, but also targets The Bat!, a mail client very popular in Eastern Europe.First, Turla steals emails by forwarding all outgoing emails to the attackers.We identified several European governments and defense companies compromised with this group.What actually happens is that the malware is able to decode data from the PDF documents and interpret it as commands for the backdoor.In early 2018, multiple media claimed that Turla operators used mail attachments to control infected machines.As detailed in the previous section, this malware is able to manipulate and exfiltrate emails.To our knowledge, Turla is the only espionage group that currently uses a backdoor entirely controlled by emails, and more specifically via PDF attachments.The attackers first infected in March 2017.Our research shows that compromised organizations are at risk of not only being spied on by the Turla group who planted the backdoor, but also by other attackers.The developers refer to this tool by the name Kazuar, which is a Trojan written using the Microsoft.NET Framework that offers actors complete access to compromised systems targeted by its operator.We suspect the Kazuar tool may be linked to the Turla threat actor group (also known as Uroburos and Snake), who have been reported to have compromised embassies, defense contractors, educational institutions, and research organizations across the globe.This is also a full-featured backdoor controlled by email, and which can work independently of any other Turla component.A hallmark of Turla operations is iterations of their tools and code lineage in Kazuar can be traced back to at least 2005.If the hypothesis is correct and the Turla threat group is using Kazuar, we believe they may be using it as a replacement for Carbon and its derivatives.We used a combination of tools such as NoFuserEx, ConfuserEx Fixer, ConfuserEx Switch Killer, and de4d0t in order to deobfuscate the code for in depth analysis.Kazuar generates its mutex by using a process that begins with obtaining the MD5 hash of a string " [username]=>singleton-instance-mutex ".The subject is a series of targeted attacks against private companies.e uncovered the activity of a hacking group which has Chinese origins.Also, by creating this type of API access, Turla could use one accessible server as a single point to dump data to and exfiltrate data from.According to our estimations, this group has been active for several years and specializes in cyberattacks against the online video game industry.Based on our analysis, we believe that threat actors may compile Windows and Unix based payloads using the same code to deploy Kazuar against both platforms.The group's main objective is to steal source codes.In 2010 HBGary investigated an information security incident related to the Winnti group at one of HBGary's customers – an American video game company.In 2010 US-based HBGary investigated an information security incident related to the Winnti group at one of HBGary's customers – an American video game company.For a long time the Winnti group had been considered as a Chinese threat actor targeting gaming companies specifically.In April Novetta released its excellent report on the Winnti malware spotted in the operations of Axiom group.The Axiom group has been presented as an advanced Chinese threat actor carrying out cyber-espionage attacks against a whole range of different industries.this library includes two drivers compiled on August 22 and September 4, 2014.Also our visibility as a vendor does not cover every company in the world (at least so far;)) and the Kaspersky Security Network (KSN) did not reveal other attacks except those against gaming companies.Conversely, LokiBot and Agent Tesla are new malware tools.Based on multiple active compromises by the Axiom threat group, Novetta was able to capture and analyze new Winnti malware samples.Initial attack targets are commonly software and gaming organizations in United States, Japan, South Korea, and China.Initial attack targets are commonly software and gaming organizations in United States, Japan, South Korea, and China.The samples Novetta obtained from the active Axiom infection were compiled in mid- to late 2014 and represent what Novetta is referring to as version 3.0 of the Winnti lineage.We assess with high confidence that the Winnti umbrella is associated with the Chinese state intelligence apparatus, with at least some elements located in the Xicheng District of Beijing.The Winnti umbrella continues to operate highly successfully in 2018.The Winnti umbrella and closely associated entities has been active since at least 2009.The Winnti and Axiom group names were created by Kaspersky Lab and Symantec, respectively, for their 2013/2014 reports on the original group.Their operations against gaming and technology organizations are believed to be economically motivated in nature.However, based on the findings shared in this report we assess with high confidence that the actor's primary long-term mission is politically focused.The Winnti umbrella and linked groups' initial targets are gaming studios and high tech businesses.During the same time period, we also observed the actor using the Browser Exploitation Framework (BeEF) to compromise victim hosts and download Cobalt Strike.In this campaign, the attackers experimented with publicly available tooling for attack operations.The primary goal of these attacks was likely to find code-signing certificates for signing future malware.The Chinese intelligence apparatus has been reported on under many names, including Winnti, PassCV, APT17, Axiom, LEAD, BARIUM, Wicked Panda, and GREF.The attackers behind observed activity in 2018 operate from the Xicheng District of Beijing via the net block 221.216.0.0/13.ALLANITE activity closely resembles Palmetto Fusion described by the US Department of Homeland Security (DHS).ALLANITE activity closely resembles Palmetto Fusion described by the US Department of Homeland Security.ALLANITE uses email phishing campaigns and compromised websites called watering holes to steal credentials and gain access to target networks, including collecting and distributing screenshots of industrial control systems.In October 2017, a DHS advisory documented ALLANITE technical operations combined with activity with a group Symantec calls Dragonfly (which Dragos associates with DYMALLOY).In October 2017, a DHS advisory documented ALLANITE technical operations combined with activity with a group.We assess with high confidence that the attackers discussed here are associated with the Chinese state intelligence apparatus.ALLANITE operations limit themselves to information gathering and have not demonstrated any disruptive or damaging capabilities.In October 2017, a DHS advisory documented ALLANITE technical operations combined with activity with a group Symantec calls Dragonfly.Public disclosure by third-parties, including the DHS, associate ALLANITE operations with Russian strategic interests.ALLANITE conducts malware-less operations primarily leveraging legitimate and available tools in the Windows operating system.Dragos does not publicly describe ICS activity group technical details except in extraordinary circumstances in order to limit tradecraft proliferation.However, full details on ALLANITE and other group tools, techniques, procedures, and infrastructure is available to network defenders via Dragos WorldView.In addition to maritime operations in this region, Anchor Panda also heavily targeted western companies in the US, Germany, Sweden, the UK, and Australia, and other countries involved in maritime satellite systems, aerospace companies, and defense contractors.A current round of cyber-attacks from Chinese source groups are targeting the maritime sector in an attempt to steal technology.PLA Navy Anchor Panda is an adversary that CrowdStrike has tracked extensively over the last year targeting both civilian and military maritime operations in the green/brown water regions primarily in the area of operations of the South Sea Fleet of the PLA Navy.ALLANITE operations continue and intelligence indicates activity since at least May 2017.APT Anchor Panda is a Chinese threat actor group who target maritime operations.According to cyber security researchers, Anchor Panda, who work directly for the Chinese PLA Navy, likely remains active.Dragos does not corroborate nor conduct political attribution to threat activity.In the past they used Adobe Gh0st, Poison Ivy and Torn RAT malware as their primary attack vector is sphere phishing.Their targets are marine companies that operate in and around the South China Sea, an area of much Chinese interest.As recently as this past week, researchers observed Chinese hackers escalating cyber-attack efforts to steal military research secrets from US universities.The cyber-espionage campaign has labelled the group Advanced Persistent Threat (APT) 40 or, titled, Periscope.The group has been active since at least January 2013.The group has also targeted businesses operating in the South China Sea, which is a strategically important region and the focus of disputes between China and other states.The main targets seem to be US companies in engineering, transport and defense, although it has targeted other organizations around the world.The times of day the group is active also suggests that it is based near Beijing and the group has reportedly used malware that has been observed in other Chinese operations, indicating some level of collaboration.Periscope's activity has previously been suspected of being linked to China, but now researchers believe their evidence links the operation to the Chinese state.APT40 is described as a moderately sophisticated cyber-espionage group which combines access to significant development resources with the ability to leverage publicly available tools.Anchor Panda uses website and web-server compromise as a means of attack and leverages an enormous cache of tools in its campaigns, to include exploits that take advantage of known CVE software vulnerabilities.Like many espionage campaigns, much of APT40's activity begins by attempting to trick targets with phishing emails, before deploying malware such as the Gh0st RAT trojan to maintain persistence on a compromised network.The group uses website and web-server compromise as a means of attack and leverages an enormous cache of tools in its campaigns, to include exploits that take advantage of known CVE software vulnerabilities.More than half of the organizations we have observed being targeted or breached by APT5 operate in these sectors.APT5 has been active since at least 2007.APT5 has targeted or breached organizations across multiple industries, but its focus appears to be on telecommunications and technology companies, especially information about satellite communications.APT5 targeted the network of an electronics firm that sells products for both industrial and military applications.The group subsequently stole communications related to the firm's business relationship with a national military, including inventories and memoranda about specific products they provided.In one case in late 2014, APT5 breached the network of an international telecommunications company.The group used malware with keylogging capabilities to monitor the computer of an executive who manages the company's relationships with other telecommunications companies.APT5 also targeted the networks of some of Southeast Asia's major telecommunications providers with Leouncia malware.We suspect that the group sought access to these networks to obtain information that would enable it to monitor communications passing through the providers' systems.The FBI said the " group of malicious cyber actors " (known as APT6 or 1.php) used dedicated top-level domains in conjunction with the command and control servers to deliver " customized malicious software " to government computer systems.Deepen told Threatpost the group has been operating since at least since 2008 and has targeted China and US relations experts, Defense Department entities, and geospatial groups within the federal government.Government officials said they knew the initial attack occurred in 2011, but are unaware of who specifically is behind the attacks.According to Deepen, APT6 has been using spear phishing in tandem with malicious PDF and ZIP attachments or links to malware infected websites that contains a malicious SCR file.Nearly a month later, security experts are now shining a bright light on the alert and the mysterious group behind the attack.The attacks discussed in this blog are related to an APT campaign commonly referred to as " th3bug ", named for the password the actors often use with their Poison Ivy malware.Over the summer they compromised several sites, including a well-known Uyghur website written in that native language.In contrast to many other APT campaigns, which tend to rely heavily on spear phishing to gain victims, " th3bug " is known for compromising legitimate websites their intended visitors are likely to frequent.While we were unable to recover the initial vulnerability used, it is possibly the same CVE-2014-0515 Adobe Flash exploit first reported by Cisco TRAC in late July.However, to increase success rates APT20 can use zero-day exploits, so even a properly patched system would be compromised.Our direct observation of in-the-wild spearphishing attacks staged by the Bahamut group have been solely attempts to deceive targets into providing account passwords through impersonation of notices from platform providers.Bahamut was first noticed when it targeted a Middle Eastern human rights activist in the first week of January 2017.Later that month, the same tactics and patterns were seen in attempts against an Iranian women's activist – an individual commonly targeted by Iranian actors, such as Charming Kitten and the Sima campaign documented in our 2016 Black Hat talk.In June we published on a previously unknown group we named " Bahamut ", a strange campaign of phishing and malware apparently focused on the Middle East and South Asia.Once inside a network, APT40 uses credential-harvesting tools to gain usernames and passwords, allowing it to expand its reach across the network and move laterally through an environment as it moves to towards the ultimate goal of stealing data.Bahamut was shown to be resourceful, not only maintaining their own Android malware but running propaganda sites, although the quality of these activities varied noticeably.In June we published on a previously unknown group we named " Bahamut ", a strange campaign of phishing and malware apparently focused on the Middle East and South Asia.Several times, APT5 has targeted organizations and personnel based in Southeast Asia.However, in the same week of September a series of spearphishing attempts once again targeted a set of otherwise unrelated individuals, employing the same tactics as before.Our primary contribution in this update is to implicate Bahamut in what are likely counterterrorism-motivated surveillance operations, and to further affirm our belief that the group is a hacker-for-hire operation.As we wrote then, compared to Kingphish, Bahamut operates as though it were a generation ahead in terms of professionalism and ambition.In the Bahamut report, we discussed two domains found within our search that were linked with a custom Android malware agent.After the publication of the original report, these sites were taken offline despite the fact that one agent was even updated a six days prior to our post (the " Khuai " application).FIF is notable for its links to the Lashkar-e-Taiba (LeT) terrorist organization, which has committed mass-casualty attacks in India in support of establishing Pakistani control over the disputed Jammu and Kashmir border region.As a result, it is already flagged as Bahamut by antivirus engines.Our initial observation of the Bahamut group originated from in-the-wild attempts to deceive targets into providing account passwords through impersonation of platform providers.One curious trait of Bahamut is that it develops fully-functional applications in support of its espionage activities, rather than push nonfunctional fake apps or bundle malware with legitimate software.Curiously, Bahamut appears to track password attempts in response to failed phishing attempts or to provoke the target to provide more passwords.Bahamut spearphishing attempts have also been accompanied with SMS messages purporting to be from Google about security issues on their account, including a class 0 message or " flash text ".These text messages did not include links but are intended to build credibility around the fake service notifications later sent to the target's email address.We have not found evidence of Bahamut engaging in crime or operating outside its limited geographic domains, although this narrow perspective could be accounted for by its compartmentalization of operations.Thus far, Bahamut's campaigns have appeared to be primarily espionage or information operations – not destructive attacks or fraud.The targets and themes of Bahamut's campaigns have consistently fallen within two regions – South Asia (primarily Pakistan, specifically Kashmir) and the Middle East (from Morocco to Iran).Our prior publication also failed to acknowledge immensely valuable input from a number of colleagues, including Nadim Kobeissi's feedback on how the API endpoints on the Android malware were encrypted.Bahamut targeted similar Qatar-based individuals during their campaign.Bellingcat also reported the domain had been used previously to host potential decoy documents as detailed in VirusTotal here using hxxp://voguextra.com/decoy.doc.The China-backed BARIUM APT is suspected to be at the helm of the project.Trojanized versions of the utility were then signed with legitimate certificates and were hosted on and distributed from official ASUS update servers – which made them mostly invisible to the vast majority of protection solutions, according to Kaspersky Lab.Kaspersky Lab To compromise the utility, Kaspersky Lab determined that the cyberattackers used stolen digital certificates used by ASUS to sign legitimate binaries, and altered older versions of ASUS software to inject their own malicious code.To compromise the utility, Kaspersky Lab determined that Barium used stolen digital certificates used by ASUS to sign legitimate binaries, and altered older versions of ASUS software to inject their own malicious code.BARIUM, a Chinese state player that also goes by APT17, Axiom and Deputy Dog, was previously linked to the ShadowPad and CCleaner incidents, which were also supply-chain attacks that used software updates to sneak onto machines.That said, the " fingerprints " left on the samples by the attackers – including techniques used to achieve unauthorized code execution – suggest that the BARIUM APT is behind the effort, according to the researchers.In the 2017 ShadowPad attack, the update mechanism for Korean server management software provider NetSarang was compromised to serve up an eponymous backdoor.In the next incident, also in 2017, software updates for the legitimate computer cleanup tool CCleaner was found to have been compromised by hackers to taint them with the same ShadowPad backdoor.NetSarang, which has headquarters in South Korea and the United States, removed the backdoored update, but not before it was activated on at least one victim's machine in Hong Kong.Given our increased confidence that Bahamut was responsible for targeting of Qatari labor rights advocates and its focus on the foreign policy institutions other Gulf states, Bahamut's interests are seemingly too expansive to be limited one sponsor or customer.Barium specializes in targeting high value organizations holding sensitive data, by gathering extensive information about their employees through publicly available information and social media, using that information to fashion phishing attacks intended to trickthose employees into compromising their computers and networks.We identified an overlap in the domain voguextra.com, which was used by Bahamut within their " Devoted To Humanity " app to host an image file and as C2 server by the PrayTime iOS app mentioned in our first post.Althoughthe BariumDefendants have relied on differentand distinct infrastructures in an effortto evade detection, Bariumused the same e-mail address ([email protected]) to register malicious domains used in connection with at least two toolsets that Barium has employed to compromise victim computers.The second method, described in Part D.2, below, involves the " ShadowPad " malware, which the Barium Defendants have distributed via a third-party software provider's compromised update.To enhance the effectiveness of phishing attacks into the organization, Barium will collect additional background informationfrom social media sites.Employing a technique known as " spear phishing ", Barium has heavily targeted individuals within HumanResources or Business Developmentdepartments ofthe targeted organizations in order to compromise the computers ofsuch individuals.The first method, described in Part D.l, below, involves the " Barlaiy " and " PlugXL " malware, which the Barium Defendants propagate using phishing techniques.Using the information gathered from its reconnaissance on social media sites, Barium packages the phishing e-mail in a way that gives the e-mail credibility to the target user, often by making the e-mail appear as ifit were sent from an organization known to and trusted by the victim or concerning a topic of interest to the victim.Barium Defendants install the malicious " Win32/Barlaiy " malware and the malicious " Win32/PlugX.L " malware on victim computers using the means described above.Both Win32/Barlaiy & Win32/PlugX.L are remote access " trojans ", which allow Barium to gather a victim's information, control a victim's device, install additional malware, and exfiltrate information fi-om a victim's device.Barium Defendants install the malicious credential stealing and injection tool known as " Win32/RibDoor.A!dha ".While not detected at the time, Microsoft's antivirus and security products now detect this Barium malicious file and flag the file as " Win32/ShadowPad.A ".MXI Player appears to be a version of the Bahamut agent, designed to record the phone calls and collect other information about the user (com.mxi.videoplay).Figure 9a, below, shows detections of encounters with the Barium actors and their infrastructure, including infected computers located in Virginia, and Figure 9b, below, shows detections of encounters throughout the United States.Barium has targeted Microsoft customers both in Virginia, the United States, and around the world.Once the Barium Defendants have access to a victim computer through the malware described above, they monitor the victim's activity and ultimately search for and steal sensitive documents (for example, exfiltration of intellectual property regarding technology has been seen), and personal information fi"om the victim's network.According to a 49-page report published Thursday, all of the attacks are the work of Chinese government's intelligence apparatus, which the report's authors dub the Winnti Umbrella.Researchers from various security organizations have used a variety of names to assign responsibility for the hacks, including LEAD, BARIUM, Wicked Panda, GREF, PassCV, Axiom, and Winnti.It targets organizations in Japan, South Korea, and Taiwan, leveling its attacks on public sector agencies and telecommunications and other high-technology industries.In 2016, for instance, we found their campaigns attacking Japanese organizations with various malware tools, notably the Elirks backdoor.Blackgear has been targeting various industries since its emergence a decade ago.Blackgear's campaigns also use email as an entry point, which is why it's important to secure the email gateway.BLACKGEAR is an espionage campaign which has targeted users in Taiwan for many years.Our research indicates that it has started targeting Japanese users.The malware tools used by BLACKGEAR can be categorized into three categories: binders, downloaders and backdoors.Binders are delivered by attack vectors (such as phishing and watering hole attacks) onto a machine.Based on the mutexes and domain names of some of their C&C servers, BlackTech's campaigns are likely designed to steal their target's technology.Following their activities and evolving tactics and techniques helped us uncover the proverbial red string of fate that connected three seemingly disparate campaigns: PLEAD, Shrouded Crossbow, and of late, Waterbear.Active since 2012, it has so far targeted Taiwanese government agencies and private organizations.PLEAD uses spear-phishing emails to deliver and install their backdoor, either as an attachment or through links to cloud storage services.PLEAD also dabbled with a short-lived, fileless version of their malware when it obtained an exploit for a Flash vulnerability (CVE-2015-5119) that was leaked during the Hacking Team breach.PLEAD also uses CVE-2017-7269, a buffer overflow vulnerability Microsoft Internet Information Services (IIS) 6.0 to compromise the victim's server.This campaign, first observed in 2010, is believed to be operated by a well-funded group given how it appeared to have purchased the source code of the BIFROST backdoor, which the operators enhanced and created other tools from.Shrouded Crossbow targeted privatized agencies and government contractors as well as enterprises in the consumer electronics, computer, healthcare, and financial industries.Shrouded Crossbow employs three BIFROST-derived backdoors: BIFROSE, KIVARS, and XBOW.Like PLEAD, Shrouded Crossbow uses spear-phishing emails with backdoor-laden attachments that utilize the RTLO technique and accompanied by decoy documents.XBOW's capabilities are derived from BIFROSE and KIVARS; Shrouded Crossbow gets its name from its unique mutex format.While PLEAD and KIVARS are most likely to be used in first phase attacks, Waterbear can be seen as a secondary backdoor installed after attackers have gained a certain level of privilege.Recently, the JPCERT published a thorough analysis of the Plead backdoor, which, according to Trend Micro, is used by the cyberespionage group BlackTech.Despite the fact that the Changing Information Technology Inc. certificate was revoked on July 4, 2017, the BlackTech group is still using it to sign their malicious tools.The BlackTech group is primarily focused on cyberespionage in Asia.The new activity described in this blogpost was detected by ESET in Taiwan, where the Plead malware has always been most actively deployed.Attackers are targeting Windows platform and aiming at government institutions as well as big companies in Colombia.Attackers like to use spear-fishing email with password protected RAR attachment to avoid being detected by the email gateway.The first sample being captured was in April 2018 and since that we observed a lot more related ones.After performing investigations on the classified victims, we find the attacker targets big companies and government agencies in Colombia.After monitoring and correlating the APT attack, 360 Threat Intelligence Center discovered multiple related emails to attack Colombian government agencies, financial institutions and large enterprises.The oldest sample we've seen up to now is from November 2013.One of the top targets is the Japan Pension Service, but the list of targeted industries includes government and government agencies, local governments, public interest groups, universities, banks, financial services, energy and so on.However, the attack is different in two respects: unlike other APTs, the main focus of Blue Termite is to attack Japanese organizations; and most of their C2s are located in Japan.Originally, the main infection vector of Blue Termite was spear-phishing emails.Kaspersky Lab has detected a new method of first infection that uses a drive-by-download with a flash exploit (CVE-2015-5119, the one leaked from The Hacking Team incident).Kaspersky Lab also found some watering hole attacks, including one on a website belonging to a prominent member of the Japanese government.In early July 2015, however, Kaspersky Lab found a sample that creates a decryption key with Salt1, Salt2, and Salt3.From early June, when the cyber-attack on the Japan Pension Service started to be reported widely, various Japanese organizations would have started to deploy protection measures.It employs AES in addition to SID tricks, making it difficult to decrypt sensitive data.In order to fight back against this cyber-espionage, Kaspersky Lab will continue its research.Bookworm's functional code is radically different from PlugX and has a rather unique modular architecture that warranted additional analysis by Unit 42.Bookworm has little malicious functionality built-in, with its only core ability involving stealing keystrokes and clipboard contents.The Plead malware is a backdoor which, according to Trend Micro, is used by the BlackTech group in targeted attacks.So far, it appears threat actors have deployed the Bookworm Trojan primarily in attacks on targets in Thailand.The threat actors use a commercial installation tool called Smart Installer Maker to encapsulate and execute a self-extracting RAR archive and in some cases a decoy slideshow or Flash installation application.The self-extracting RAR writes a legitimate executable, an actor-created DLL called Loader.dll and a file named readme.txt to the filesystem and then executes the legitimate executable.targeted attacks.Using XREFs during static analysis is a common technique to quickly find where functions of interest are called.The developers designed Bookworm to be a modular Trojan not limited to just the initial architecture of the Trojan, as Bookworm can also load additional modules provided by the C2 server.Although the developers of Bookworm have included only keylogging functionality in Bookworm as a core ability, as suggested in Table 1, several of the embedded DLLs provide Leader with cryptographic and hashing functions, while others support Leader's ability to communicate with its C2 server.While we did not discuss the surrounding attacks using Bookworm in detail, we have observed threat actors deploying Bookworm primarily in attacks on targets in Thailand.Also, Bookworm uses a combination of encryption and compression algorithms to obfuscate the traffic between the system and C2 server.The developers of Bookworm have gone to great lengths to create a modular framework that is very flexible through its ability to run additional modules directly from its C2 server.Unit 42 recently published a blog on a newly identified Trojan called Bookworm, which discussed the architecture and capabilities of the malware and alluded to Thailand being the focus of the threat actors' campaigns.Leader is Bookworm's main module and controls all of the activities of the Trojan, but relies on the additional DLLs to provide specific functionality.The developers of Bookworm use these modules in a rather unique way, as the other embedded DLLs provide API functions for Leader to carry out its tasks.Unit 42 does not have detailed targeting information for all known Bookworm samples, but we are aware of attempted attacks on at least two branches of government in Thailand.We speculate that other attacks delivering Bookworm were also targeting organizations in Thailand based on the contents of the associated decoys documents, as well as several of the dynamic DNS domain names used to host C2 servers that contain the words " Thai " or " Thailand ".We believe that it is likely threat actors will continue development Bookworm, and will continue to use it for the foreseeable future.Threat actors have delivered Bookworm as a payload in attacks on targets in Thailand.Analysis of compromised systems seen communicating with Bookworm C2 servers also confirms our speculation on targeting with a majority of systems existing within Thailand.As mentioned in our previous blog on Bookworm, the Trojan sends a static date string to the C2 server that we referred to as a campaign code.We believed that the actors would use this date code to track their attack campaigns; however, after continued analysis of the malware, we think these static dates could also be a build identifier for the Trojan.Threat actors may use the date string hardcoded into each Bookworm sample as a build identifier.A Trojan sending a build identifier to its C2 server is quite common, as it notifies the threat actors of the specific version of the Trojan in which they are interacting.Due to these changes without a new date string, we believe the date codes are used for campaign tracking rather than a Bookworm build identifier.We believe that Bookworm samples use the static date string as campaign codes, which we used to determine the approximate date of each attack that we did not have detailed targeting information.Another decoy slideshow associated with the Bookworm attack campaign contains photos of an event called Bike for Dad 2015.The campaign code " 20150920 " is associated with this decoy, which is a week prior to media articles announcing that the Crown Price of Thailand Maha Vajiralongkorn will lead the Bike for Dad 2015 event.Chitpas is heavily involved with Thailand politics and was a core leader of the People's Committee for Absolute Democracy (PCAD), which is an organization that staged anti-government campaigns in 2013 and 2014.The final remaining known decoy includes photos of Chitpas Tant Kridakon (Figure 7), who is known as heiress to the largest brewery in Thailand.These images were associated with the Bookworm campaign code " 20150905 ".Unit 42 analyzed the systems communicating with the Bookworm C2 domains and found that a majority of the IP addresses existed within autonomous systems (ASN) located in Thailand.The pie chart in Figure 8 shows that the vast majority (73%) of the hosts are geographically located in Thailand, which matches the known targeting of this threat group.We believe that the IP addresses from Canada, Russia and Norway are analysis systems of antivirus companies or security researchers.Overall, the Bookworm infrastructure overlaps with the infrastructure hosting C2 servers used by various attack tools, including FFRAT, Poison Ivy, PlugX, and others.Overall, the Bookworm infrastructure overlaps with the infrastructure hosting C2 servers used by various attack tools, including FFRAT, Poison Ivy, PlugX, and others.Unit 42 enumerated the threat infrastructure related to Bookworm and created a chart to visualize connected entities to its current attack campaign.Threat actors have targeted the government of Thailand and delivered the newly discovered Bookworm Trojan since July 2015.The actors appear to follow a set playbook, as the observed TTPs are fairly static within each attack in this campaign.So far, Unit 42 has seen infrastructure overlaps with servers hosting C2 servers for samples of the FFRAT, PlugX, Poison Ivy and Scieron Trojans, suggesting that the threat actors use these tools as the payload in their attacks.The threat actors have continually used Flash Player installers and Flash slideshows for decoys.The vast majority of systems communicating with Bookworm C2 servers are within the Bangkok metropolitan area where a majority of the government of Thailand exists.Buhtrap has been active since 2014, however their first attacks against financial institutions were only detected in August 2015.At the moment, the group is known to target Russian and Ukrainian banks.Buhtrap is the first hacker group using a network worm to infect the overall bank infrastructure that significantly increases the difficulty of removing all malicious functions from the network.Malicious programs intentionally scan for machines with an automated Bank-Customer system of the Central bank of Russia (further referred to as BCS CBR).If the document was delivered with macros instead of exploits (CVE-2012-0158, CVE-2013-3906 or CVE-2014-1761), then the document contained instructions for enabling macros.We noticed that criminals were spreading Buhtrap using this method from May 2015 to August 2015.It is worth noting that attackers used the same compromised websites to spread Buhtrap as those that had been used for the Corkow Trojan.Moreover, they used the same exploit kit Niteris as that in the Corkow case.Purportedly during one of the first attacks hackers intercepted the mailing list of the Anti-drop " club and created a specific phishing email for its members.However, it is still widely used, notably in Russia.As noted in our previous blog on Buhtrap, this gang has been actively targeting Russian businesses, mostly through spear-phishing.It is thus interesting to see Buhtrap add strategic web compromises to their arsenal.The first malware we saw was the lurk downloader, which was distributed on October 26th.The executable would install the real Ammyy product, but would also launch a file called either AmmyyService.exe or AmmyySvc.exe which contained the malicious payload.Buhtrap is getting better at disguising the code they inject into compromised websites.With the recent arrests of actors using the Lurk banking trojan, Buhtrap appears to be a likely alternative for actors wishing to target Russian banks and software.They have different functions and ways of spreading, but the same purpose — to steal money from the accounts of businesses.Our experts have found that cybercriminals are actively focusing on SMBs, and giving particular attention to accountants.The first encounter with Buhtrap was registered back in 2014.For now, we can call RTM one of the most active financial Trojans.At that time it was the name of a cybercriminal group that was stealing money from Russian financial establishments — to the tune of at least $150,000 per hit.Buhtrap resurfaced in the beginning of 2017 in the TwoBee campaign, where it served primarily as means of malware delivery.After the source codes of their tools became public in 2016, the name Buhtrap was used for the financial Trojan.Just like last time, Buhtrap is spreading through exploits embedded in news outlets.Estimating the damages is challenging, but as we learned, the criminals are siphoning off assets in transactions that do not exceed $15,000 each.As explained later, we believe this campaign is financially-motivated and that it targets accounting departments in Russian businesses." Buhgalter " means " accountant " in Russian.Seeing a campaign like this, inevitably the Anunak/Carbanak documented by Fox-IT and Kaspersky comes to mind.The infection vector is similar, it uses a similar modified mimikatz application, and it uses a third-party remote access tool, changes system settings to allow concurrent RDP sessions, and so on.The second, aptly titled " kontrakt87.doc ", copies a generic telecommunications service contract from MegaFon, a large Russian mobile phone operator.In addition to built-in functionalities, the operators of Careto can upload additional modules which can perform any malicious task.Careto's Mask campaign we discovered relies on spear-phishing e-mails with links to a malicious website.Sometimes, the attackers use sub-domains on the exploit websites, to make them seem more legitimate.These sub-domains simulate sub-sections of the main newspapers in Spain plus some international ones like the Guardian and the Washington Post.The CVE-2012-0773 was originally discovered by VUPEN and has an interesting story.In other words, the attackers attracted our attention by attempting to exploit Kaspersky Lab products.We initially became aware of Careto when we observed attempts to exploit a vulnerability in our products to make the malware " invisible " in the system.Most modules were created in 2012.The attackers began taking them offline in January 2014.Last week we discussed Numbered Panda, a group that is also based out of China and is fairly well known to the security community, though by many names.We revealed a Chinese-based adversary we crypt as Anchor Panda, a group with very specific tactics, techniques, and procedures (TTPs) and a keen interest in maritime operations and naval and aerospace technology.The campaign was active until January 2014, but during our investigations the C&C servers were shut down.This week we are going to discuss Clever Kitten, whom, by virtue of several indicators, we have affiliated with the Islamic Republic of Iran.Clever Kitten has moved to leveraging strategic web compromises.Clever Kitten actors have a strong affinity for PHP server-side attacks to make access; this is relatively unique amongst targeted attackers who often favor targeting a specific individual at a specific organization using social engineering.Clever Kitten primarily targets global companies with strategic importance to countries that are contrary to Iranian interests.A Clever Kitten attack starts with the use of a web vulnerability scanner to conduct reconnaissance.The scanner was identified as the Acunetix Web Vulnerability Scanner which is a commercial penetration testing tool that is readily available as a 14-day trial.Once an exploitable page is identified, Clever Kitten will attempt to upload a PHP backdoor to gain remote access to the system.The reason for this is likely the availability of exploits against web browsers, which for a variety of reasons allows an attacker to bypass security features such as Data Execution Prevention (DEP) or Address Space Layout Randomization (ASLR).Once an exploitable page is identified, the actor will attempt to upload a PHP backdoor to gain remote access to the system.In Clever Kitten's attacks, the goal is lateral movement; this is an attempt to move further into the target environment in order to begin intelligence collection.This activity is a longer tail for the actor than a spearphish; this is likely based on the Clever Kitten background, which may be focused on web development/application testing.Without going too deep into the rabbit hole, there are several indicators pointing to an Iranian nexus, including language artifacts in the tool-marks used by the attacker, as well as network activity tying this actor to a very specific location that we have high confidence in not being spoofed.Clever Kitten's goal is to eventually be able to masquerade as a legitimate user by compromising credentials either through a pass-the-hash attack, or by dumping password hashes from a compromised host.The campaign targets Middle Eastern organizations largely from the Lebanon and United Arab Emirates, though, Indian and Canadian companies with interests in those Middle Eastern countries are also targeted.There are new TTPs used in this attack – for example Agent_Drable is leveraging the Django python framework for command and control infrastructure, the technical details of which are outlined later in the blog.n summary, Cold River is a sophisticated threat actor making malicious use of DNS tunneling for command and control activities, compelling lure documents, and previously unknown implants.Some of the exploit server paths contain modules that appear to have been designed to infect Linux computers, but we have not yet located the Linux backdoor.The campaign targets Middle Eastern organizations largely from the Lebanon and United Arab Emirates, though, Indian and Canadian companies with interests in those Middle Eastern countries may have also been targeted.The decoy documents used by the InPage exploits suggest that the targets are likely to be politically or militarily motivated.The use of InPage as an attack vector is not commonly seen, with the only previously noted attacks being documented by Kaspersky in late 2016.The decoy documents dropped suggest that the targets are likely to be politically or militarily motivated, with subjects such as Intelligence reports and political situations being used as lure documents.While documents designed to exploit the InPage software are rare, they are not new – however in recent weeks Unit42 has observed numerous InPage exploits leveraging similar shellcode, suggesting continued use of the exploit previously discussed by Kaspersky.Confucius targeted a particular set of individuals in South Asian countries, such as military personnel and businessmen, among others.Tweety Chat's Android version can record audio, too.Confucius' operations include deploying bespoke backdoors and stealing files from their victim's systems with tailored file stealers, some of which bore resemblances to Patchwork's.Compared to Patchwork, whose Trojanized documents exploit at least five security flaws, Confucius' backdoors are delivered through Office files exploiting memory corruption vulnerabilities CVE-2015-1641 and CVE-2017-11882.Back in February, we noted the similarities between the Patchwork and Confucius groups and found that, in addition to the similarities in their malware code, both groups primarily went after targets in South Asia.Back in February, Trend Micro noted the similarities between the Patchwork and Confucius groups and found that, in addition to the similarities in their malware code, both groups primarily went after targets in South Asia.One of its file stealers, swissknife2, abuses a cloud storage service as a repository of exfiltrated files.During the months that followed in which we tracked Confucius' activities, we found that they were still aiming for Pakistani targets.During their previous campaign, we found Confucius using fake romance websites to entice victims into installing malicious Android applications.Periodically, the malware tries to contact the Command-and-Control (C&C) server with the username encoded into parameters.This function is similar to the various versions of backdoors (such as sctrls and sip_telephone) that we analyzed in our previous blog post and whitepaper.This algorithm was previously discussed by security researchers in a Confucius-related blog post.Lately, Patchwork has been sending multiple RTF files exploiting CVE-2017-8570.The group still uses the Badnews malware, a backdoor with information-stealing and file-executing capabilities, albeit updated with a slight modification in the encryption routine at the end of 2017, when they added Blowfish encryption on top of their custom encryption described in our former Patchwork blogpost.Threat actors like Confucius and Patchwork are known for their large arsenal of tools and ever-evolving techniques that can render traditional security solutions — which are often not designed to handle the persistent and sophisticated threats detailed in this blog — ineffective.The reality is that IT departments of small to large-sized organizations are not equipped to handle the more advanced threats that groups like Confucius use in their attacks.Patchwork uses email as an entry point, which is why securing the email gateway is important.This blog post examines two similar malware families that utilize the aforementioned technique to abuse legitimate websites, their connections to each other, and their connections to known espionage campaigns.In order to increase the likelihood of their malware successfully communicating home, cyber espionage threat actors are increasingly abusing legitimate web services, in lieu of DNS lookups to retrieve a command and control address.In 2013, Rapid7 reported on a series of relatively amateur attacks against Pakistani targets.The first of which we call' CONFUCIUS_A', a malware family that has links to a series of attacks associated with a backdoor attack method commonly known as SNEEPY (aka ByeByeShell) first reported by Rapid7 in 2013.At first glance CONFUCIUS_B looks very similar to CONFUCIUS_A, and they are also packaged in plain SFX binary files.The CONFUCIUS_B executable is disguised as a PowerPoint presentation, using a Right-To-Left-Override (RTLO) trick and a false icon.We also believe that both clusters of activity have links to attacks with likely Indian origins, the CONFUCIUS_A attacks are linked to the use of SNEEPY/BYEBYESHELL and the CONFUCIUS_B have a loose link to Hangover.The two malware families themselves are also very similar, and therefore we think that the shared technique is an indication of a single developer, or development company, behind both CONFUCIUS_A and CONFUCIUS_B.In this blog post, we discussed two separate malware variations that behave in very similar ways and use similar techniques to acquire a C2 address, with both using Yahoo Answers and Quora to evade traditional mechanisms for blocking command and control domains.The Android version, for instance, can steal SMS messages, accounts, contacts, and files, as well as record audio.Confucius' backdoors are delivered through Office documents exploiting memory corruption vulnerabilities CVE-2015-1641 and CVE-2017-11882.We dove deeper into Confucius' operations—namely, the malware-ridden documents, backdoors, and file stealers they use in their campaigns.The sctrls backdoor we came across is delivered via RTF files exploiting CVE-2015-1641.The documents that exploit CVE2017-11882 download another payload — an HTML Application (HTA) file toting a malicious Visual Basic (VBS) script — from the server, which is executed accordingly by the command-line tool mshta.exe.In August 2015 a new incident related to the Corkow (Metel) Trojan was detected.Corkow provided remote access to the ITS-Broker system terminal by 《 Platforma soft 》 Ltd, which enabled the fraud to be committed.According to our statistics, as of the beginning of 2015 this botnet encompassed over 250 000 infected devices worldwide including infecting more than 100 financial institutions with 80% of them from the top 20 list.The interest among hackers in targeting trading systems is expected to grow.Russian-speaking hackers are believed to be responsible for these attacks and used the Corkow Trojan.Hackers target primarily companies in Russia and CIS countries, though it is noticed that the amount of attacks targeting the USA has increased 5 times since 2011.One of the first botnets specializing in targeting the trading software called Quik was " Ranbyus ", created in 2012.As of the Group-IB investigation of this malware program in March 2015, Corkow v.7.118.1.1 had not been detected by a single antivirus program.Hackers gained access to a computer in the trading system in September 2014.Starting in December 2014, the criminal group began running keyloggers in the infected system.To spread the Corkow malware criminals use a drive-by downloads method, when victims are infected while visiting compromised legitimate websites.Group-IB specialists detected various sites used by criminals to spread the Trojan: mail tracking websites, news portals, electronic books, computer graphics resources, music portals, etc.Hackers use the exploits " Nitris Exploit Kit " (earlier known as CottonCastle), which is not available in open sources and sold only to trusted users.Group-IB Bot-trek TDS sensors are in place at a number of financial institutions and, unfortunately, we register that currently Corkow malware is present on 80% of protected corporate systems.Considering the Trojan delivery method and through our analysis of infections on banks' networks, we can confirm that all infections were conducted on a random basis.According to statistics, Corkow primarily targets users in Russia and the CIS, but it is worth noting that in 2014 the amount of attacks targeting the USA increased by 5 times, in comparison with 2011.Moreover, the number of Corkow incidents detected in Q1 2015 in the United States exceeds the number of those in the CIS countries.Moreover, the number of Corkow incidents detected in Q1 2015 in the United States exceeds the number of those in the CIS countries.Hackers first actively spread bots using the Niteris exploit, and then search for infected devices at banks amongst their bots by analyzing IP addresses, cracked passwords and results of the modules performance.In addition to the legitimate AmmyAdmin tool, the hackers used Visconti Backdoor developed based on legitimate RMS (remote manipulator system) software.If a bot was installed on a network that was of interest to the hacking group, this bot was then used to upload one of the remote access programs.To obtain logins and passwords they applied keyloggers built into Corkow, as well as a commonly used feature of Mimikatz, dumping clear text Windows credentials from LSA.Hackers used the remote access to detect servers of their interest in the internal network.In 2015, the Metel gang began to target banks and financial institutions directly.Metel is a banking Trojan (also known as Corkow) discovered in 2011 when it was used to attack users of online banking services.After the infection stage, criminals move laterally with the help of legitimate and pentesting tools, stealing passwords from their initial victims (entry point) to gain access to the computers within the organization that have access to money transactions.With this level of access, the gang has been able to pull off a clever trick by automating the rollback of ATM transactions.COVELLITE operates globally with targets primarily in Europe, East Asia, and North America.US targets emerged in September 2017 with a small, targeted phishing campaign directed at select U.S. electric companies.LAZARUS GROUP is responsible for attacks ranging from the 2014 attack on Sony Pictures to a number of Bitcoin heists in 2017.Technical analysis of COVELLITE malware indicates an evolution from known LAZARUS toolkits.COVELLITE remains active but appears to have abandoned North American targets, with indications of activity in Europe and East Asia.Given the group's specific interest in infrastructure operations, rapidly improving capabilities, and history of aggressive targeting, Dragos considers this group a primary threat to the ICS industry.Delivering a backdoor and spyware, this campaign was designed to steal information from infected systems using a malware client capable of filtering out " uninteresting " files, and spread primarily via a targeted phishing email usually promising a pornographic video.Lookout researchers have discovered a new mobile surveillanceware family, FrozenCell.The threat is likely targeting employees of various Palestinian government agencies, security services, Palestinian students, and those affiliated with the Fatah political party.Delivering a backdoor and spyware, Desert Falcons's campaign was designed to steal information from infected systems using a malware client capable of filtering out " uninteresting " files, and spread primarily via a targeted phishing email usually promising a pornographic video.FrozenCell is the mobile component of a multi-platform attack we've seen a threat actor known as " Two-tailed Scorpion/APT-C-23 ", use to spy on victims through compromised mobile devices and desktops.This threat is another proof point that attackers are clearly incorporating the mobile device into their surveillance campaigns as a primary attack vector.Desert Falcons is keenly aware of the information they can derive from these devices and are using multi-stage (phishing + an executable), multi-platform (Android + desktop) attacks to accomplish their spying.FrozenCell masquerades as fake updates to chat applications like Facebook, WhatsApp, Messenger, LINE, and LoveChat.For example, the actors behind FrozenCell used a spoofed app called Tawjihi 2016, which Jordanian or Palestinian students would ordinarily use during their general secondary examination.It appears the Desert Falcons sent malicious executables though phishing campaigns impersonating individuals associated with the Palestinian Security Services, the General Directorate of Civil Defence - Ministry of the Interior, and the 7th Fateh Conference of the Palestinian National Liberation Front (held in late 2016).The titles and contents of these files suggest that the actor targeted individuals affiliated with these government agencies and the Fatah political party.We believe that this is a new variant of VAMP, indicating that the threat actors behind APT-C-23 are still active and continuously improving their product.VAMP targeted various types of data from the phones of victims: images, text messages, contacts, and call history, among others.Recently, Trend Micro researchers came across a new mobile malware family which we have called GnatSpy.On Nov. 27, 2018, Cisco's Talos research division published a write-up outlining the contours of a sophisticated cyber espionage campaign it dubbed DNSpionage.Talos said the perpetrators of DNSpionage were able to steal email and other login credentials from a number of government and private sector entities in Lebanon and the United Arab Emirates by hijacking the DNS servers for these targets, so that all email and virtual private networking (VPN) traffic was redirected to an Internet address controlled by the attackers.Talos reported that these DNS hijacks also paved the way for the attackers to obtain SSL encryption certificates for the targeted domains (e.g.webmail.finance.gov.lb), which allowed them to decrypt the intercepted email and VPN credentials and view them in plain text.That changed on Jan. 25, 2019, when security firm CrowdStrike published a blog post listing virtually every Internet address known to be (ab)used by the espionage campaign to date.Working backwards from each Internet address, I was able to see that in the last few months of 2018 the hackers behind DNSpionage succeeded in compromising key components of DNS infrastructure for more than 50 Middle Eastern companies and government agencies, including targets in Albania, Cyprus, Egypt, Iraq, Jordan, Kuwait, Lebanon, Libya, Saudi Arabia and the United Arab Emirates.PCH is a nonprofit entity based in northern California that also manages significant amounts of the world's DNS infrastructure, particularly the DNS for more than 500 top-level domains and a number of the Middle East top-level domains targeted by DNSpionage.This APT group usually carries out target attacks against government agencies to steal sensitive information.In addition to spreading malware via spear fishing email with Office attachment containing either vulnerability or malicious macro, this group is particularly good at leveraging malicious Android APKs in the target attacks.We named the actor DustSquad and have provided private intelligence reports to our customers on four of their campaigns involving custom Android and Windows malware.In this blogpost we cover a malicious program for Windows called Octopus that mostly targets diplomatic entities.We also started monitoring the malware and, using Kaspersky Attribution Engine based on similarity algorithms, discovered that Octopus is related to DustSquad, something we reported in April 2018.From early 2014 until December 2018, ns0.idm.net.lb pointed to 194.126.10.18, which appropriately enough is an Internet address based in Lebanon.Kaspersky Lab products detect the Octopus Trojan as Trojan.Win32.Octopus.gen.Political entities in Central Asia have been targeted throughout 2018 by different actors, including IndigoZebra, Sofacy (with Zebrocy malware) and most recently by DustSquad (with Octopus malware).El Machete is one of these threats that was first publicly disclosed and named by Kaspersky here.We've found that this group has continued to operate successfully, predominantly in Latin America, since 2014.All attackers simply moved to new C2 infrastructure, based largely around dynamic DNS domains, in addition to making minimal changes to the malware in order to evade signature-based detection.In the case of Octopus, DustSquad used Delphi as their programming language of choice, which is unusual for such an actor.Targets included a wide array of high-profile entities, including intelligence services, military, utility providers (telecommunications and power), embassies, and government institutions.Some time ago, a Kaspersky Lab customer in Latin America contacted us to say he had visited China and suspected his machine was infected with an unknown, undetected malware.It was a targeted attack we are calling " Machete ".At first look, it pretends to be a Java related application but after a quick analysis, it was obvious this was something more than just a simple Java file." Machete " is a targeted attack campaign with Spanish speaking roots.The decoy slideshows all contain photos from very meaningful events to individuals in Thailand, suggesting that the actors continually look for impactful events to use to disguise their attacks.In some cases, such as Russia, the target appears to be an embassy from one of the countries of this list.Both attackers and victims speak Spanish natively, as we see it consistently in the source code of the client side and in the Python code.We are also grateful to the Private Office of his Holiness the Dalai Lama, the Tibetan Government-in-Exile, the missions of Tibet in London, Brussels, and New York, and Drewla (a Tibetan NGO).Between June 2008 and March 2009 the Information Warfare Monitor conducted an extensive and exhaustive two-phase investigation focused on allegations of Chinese cyber espionage against the Tibetan community.These instances of Gh0st RAT are consistently controlled from commercial Internet access accounts located on the island of Hainan, People's Republic of China.The fieldwork generated extensive data that allowed us to examine Tibetan information security practices, as well as capture real-time evidence of malware that had penetrated Tibetan computer systems.It is therefore possible that the large percentage of high value targets identified in our analysis of the GhostNet are coincidental, spread by contact between individuals who previously communicated through e-mail.Where they exist, they often use grey market or pirated software.Contextually relevant emails are sent to specific targets with attached documents that are packed with exploit code and Trojan horse programmes designed to take advantage of vulnerabilities in software installed on the target's computer.GhostNet represents a network of compromised computers resident in high-value political, economic, and media locations spread across numerous countries worldwide.After that, the attacker is capable to control the compromised device.The computers of diplomats, military attachés, private assistants, secretaries to Prime Ministers, journalists and others are under the concealed control of unknown assailant (s).The C&C server (82.137.255.56) used by the above backdoors was used by APT-C-27 (Goldmouse) many times since 2017.According to 360 Threat Intelligence Center, Goldmouse was observed deploying the nebulous njRAT backdoor.The banking malware GozNym has legs; only a few weeks after the hybrid Trojan was discovered, it has reportedly spread into Europe and begun plaguing banking customers in Poland with redirection attacks.The APT group is reportedly targeting the Middle East region.The malware has started targeting corporate, SMB, investment banking and consumer accounts at banks, including some in Portugal and the U.S., in addition to Poland, according to researchers at IBM's X-Force team.According to Kessem the malware has redirection instructions for 17 banks, and features an additional 230 URLs to assist attackers in targeting community banks and email service providers in Poland.With GozNym, attackers dupe users by showing them the actual bank's URL and SSL certificate.Fresh from targeting banks in Poland, the banking Trojan GozNym has begun taking aim at banks in Germany.Attackers went on to use the Trojan to steal $4 million from 24 banks, including 22 in the United States and two in Canada, in just two weeks.Recreating and maintaining fake bank sites can be an arduous task, but Kessem claims the GozNym group appears up to the task.The malware is distributed primarily through laced spam emails that lure recipients into opening attachments.Kessem.Fresh from targeting banks in Poland, the banking Trojan has reportedly begun taking aim at banks in Germany.Now GozNym is now targeting 13 banks and subsidiaries in Germany, Limor Kessem, Executive Security Advisor at IBM, said Tuesday.he Trojan, a hybrid of Nymaim and Gozi malware, initially formed in April and thrives on carrying out redirection attacks via DNS poisoning.In April, shortly after the Trojan's discovery, researchers observed a massive GozNym campaign targeting 24 North American banks.The method, which technically redirects users through local DNS poisoning, requires a fair bit of work; recreating and maintaining fake bank sites can be an arduous task, but Kessem claims the group behind GozNym – Nymaim – appear up to the task.Attackers behind Dyre have used similar tactics in the past but have only deployed their attacks in English speaking countries and Spain.When we last heard from the Trojan, its operators were seen launching redirection attacks on four large, U.S. banks in June.The fact that the cybercriminals behind GozNym have already adapted the Trojan for three different languages and in countries which have different banking systems is unique, according to Kessem.By the end of April, GozNym had redirection instructions for 17 Polish banks in its repertoire, along with an extra 230 URLs designed to assist attackers in targeting community banks and email service providers in the Eastern European country.Seeking to tease out any possible links between Operation Aurora, VOHO, Operation DeputyDog, and Ephemeral Hydra, we began with Symantec's Hidden Lynx report as our foundation.The authors of that report identify three primary tools used in the campaigns attributed to Hidden Lynx: Trojan.Naid, Backdoor.Moudoor, and Backdoor.Hikit.We will detail how the C&C infrastructure and tools used by hacker group Hidden Lynx during its VOHO campaign (2012), excellently documented by Symantec researchers last September, overlap with tools used in other high profile operations during the past few years.When the New York Times and Mandiant last year unmasked a large scale Chinese hacking operation, pinpointing its location down to the building, the report drew mainstream attention to what security professionals already well knew: sophisticated threat actors carry out persistent cyber operations over months and years.By the end of April, GozNym had redirection instructions for 17 Polish banks in its repertoire, along with an extra 230 URLs designed to assist attackers in targeting community banks and email service providers in the Eastern European country.Using Recorded Future, we quickly built a timeline of the reported use of those tools in major security incidents, finding many events prior to the early 2013 exposé on Hidden Lynx.In particular, FireEye during the fall of 2013 called out infrastructure overlap between Ephemeral Hydra and DeputyDog.The above network shows relationships between three tools used by Hidden Lynx during its VOHO campaign: Trojan.Naid, Backdoor.Moudoor, and Backdoor.Hikit.Symantec during 2012 linked the Elderwood Project to Operation Aurora; Trojan.Naid and Backdoor.Moudoor were also used in Aurora, by the Elderwood Gang, and by Hidden Lynx.In addition to these, we also identified " Macfog ", a native Mac OS X implementation of Icefog that infected several hundred victims worldwide.Icefog, also known as the " Dagger Panda " by Crowdstrike's naming convention, infected targets mainly in South Korea and Japan.In 2013, a public report reveals a group of actors conducted targeted attacks leverage a malware dubbed ICEFOG against mainly government organizations and defense industry of South Korea and Japan.Similar to our approach with Symantec's report on Hidden Lynx, we used Recorded Future to organize the technical details about the DeputyDog attacks to reveal technical information described in the open source reporting across multiple campaigns.With Javafog, we are turning yet another page in the Icefog story by discovering another generation of backdoors used by the attackers.Since January 2013, we've been on the lookout for a possible RedOctober comeback.One possible hit was triggered when we observed Mevade, an unusual piece of malware that appeared late in 2013.In August 2014, some of our users observed targeted attacks with a variation of CVE-2012-0158 and an unusual set of malware.It wasn't until August 2014 that we observed something which made us wonder if RedOctober is back for good.The Cloud Atlas implants utilize a rather unusual C&C mechanism.We named it RedOctober because we started this investigation in October 2012, an unusually hot month.The attackers upload data to the account, which is downloaded by the implant, decrypted and interpreted.Just like with RedOctober, the top target of Cloud Atlas is Russia, followed closely by Kazakhstan, according to data from the Kaspersky Security Network (KSN).In May 2015, Palo Alto Networks WildFire detected two e-mails carrying malicious documents from a genuine and compromised Israeli Gmail account, sent to an Israeli industrial organization.One e-mail carried a Microsoft PowerPoint file named " thanks.pps " (VirusTotal), the other a Microsoft Word document named " request.docx ".Around the same time, WildFire also captured an e-mail containing a Word document (" hello.docx ") with an identical hash as the earlier Word document, this time sent to a U.S. Government recipient.Attacks using this tool were still active as of April 2016.Considering the language being used in the malicious code is Arabic, it seems that the attacker is familiar with Arabic language as well.The initially-observed " thanks.pps " example tricks the user into running the embedded file named ins8376.exe which loads a payload DLL named mpro324.dll.In this case, the file used the software name " Cyberlink ", and a description of " CLMediaLibrary Dynamic Link Library " and listing version 4.19.9.98.Unit 42 published a blog at the beginning of May titled " Prince of Persia ", in which we described the discovery of a decade-long campaign using a formerly unknown malware family, Infy, that targeted government and industry interests worldwide.We noted in our original blog the large amount of targeting of Iranian citizens in this campaign, we observed almost one-third of all victims to be Iranian.In addition to the original " Infy " variant, we also see the newer, more sophisticated, interactive, and fuller-featured " Infy M " variant deployed against apparently-higher-value targets.This documentation provides new insight into intrusion efforts conducted by at least four discrete Iranian threat actors, Rocket Kitten, Infy, Sima, and Operation Cleaver, including groups and tools that have not been previously disclosed.Since early 2013, we have observed activity from a unique threat actor group, which we began to investigate based on increased activities against human right activists in the beginning of 2015.Over the course of three years of observation of campaigns targeting civil society and human rights organizations, from records of well over two hundred spearphishing and other intrusion attempts against individuals inside of Iran and in the diaspora, a narrative of persistent intrusion efforts emerges.Thanks to information we have been able to collect during the course of our research, such as characteristics of the group's malware and development cycle, our research strongly supports the claim that the Infy group is of Iranian origin and potentially connected to the Iranian state.Amongst a backdrop of other incidents, Infy became one of the most frequently observed agents for attempted malware attacks against Iranian civil society beginning in late 2014, growing in use up to the February 2016 parliamentary election in Iran.Until the publication of the Palo Alto report, the developers of the Infy appeared to be actively updating and maintaining the codebase, and new releases were distributed to existing, as well as new, targets quite regularly.Other samples were found bearing a compilation time as early as June 2012 and version 00002.Over the months following the elections, the accounts of Iranians that had been compromised by the actors were then used for spreading the malware.When activities targeting of civil society subsided, the actors instead appeared to have focused on external targets, such a series of attempts to spearphish the Danish Ministry of Foreign Affairs.Palo Alto Networks has noted and described the differences of two malware agents developed in parallel, with commonalities in behavior but differing functionalities; families described as Infy and Infy M. Our primary observation was of the Infy (non-M) malware, which primarily functions as a keylogger for the collection of account credentials.Our observation of Infy's campaigns, primarily through the lens of spearphishing attacks against Iranian civil society and media organizations, indicates a wandering focus on particular demographics on a strategic basis over time.The Infy malware was seen targeting Iranians again in June 2015, when it was shared with researchers after being sent to a broadcast journalist at BBC Persian with a generic introduction and a PowerPoint presentation attached titled " Nostalogy " (sic).Based on information collected in the course of this research, the targets and victims of Infy's campaigns have continued to be strongly aligned with Iran's " soft war " agenda, internal security policies, and regional adversaries of the hardline establishment of the Islamic Republic of Iran.Until late December 2015, in nearly every Infy message documented since our tracking began in May 2013, no attempt included strong tailoring of the approach, often not even including an email body, instead relying on cryptic filenames and email subjects to attract interest.One narrowly-targeted spearphishing from Infy was sent from the compromised account of a political activist promoting participation inside of Iran, claiming to be a set of images of a British-Iranian dual national that has been held in Evin Prison for five years on espionage charges.As in the past, these messages have been sent accounts believed to be fake and accounts compromised by Infy, including Kurdish activists that had previously been compromised by the Flying Kitten actor group.The actors successfully compromised a host of an Saudi government institutions on January 17, 2016, and maintained access for at least two weeks.The Infy group also appears to engage in espionage activities against foreign governments and businesses.In order to initially compromise the designated targets, Infy typically distributed specifically-crafted malicious documents containing Infy through spearphishing attacks.In order to initially compromise the designated targets, the attackers typically distributed specifically-crafted malicious documents containing Infy through spearphishing attacks.On May 2, 2016, Palo Alto Networks published the report " Prince of Persia ", which provided the first public and widely-reported indication of Infy's activities in Iran, while other publications either refrained from making the association or were not openly available.Prior to the distribution of new versions of the agent, the Infy developers appear to consistently conduct tests from local hosts, which indicates that the control and maintenance of the software occurs in the Khorasan Razavi province of Iran, potentially in the city of Mashhad.On May 2, 2016, Palo Alto published the report " Prince of Persia ", which provided the first public and widely-reported indication of Infy's activities in Iran, while other publications either refrained from making the association or were not openly available.Only one client, based in Iran, continued to communicate with the infrastructure.A researcher has attributed a recently publicized attack on Citrix' internal network to the Iranian-linked group known as IRIDIUM – and said that the data heist involved 6 terabytes of sensitive data." IRIDIUM has hit more than 200 government agencies, oil and gas companies and technology companies, including Citrix Systems Inc ", they said.Citrix told Threatpost that this is indeed the same password-spraying attack it announced itself last week – but it wouldn't confirm the other details in Resecurity's post, including the attribution.In wake of these events, a security firm Resecurity reached out to NBC news and claimed that they had reasons to believe that the attacks were carried out by Iranian-linked group known as IRIDIUM.Resecurity says that IRIDIUM " has hit more than 200 government agencies, oil and gas companies, and technology companies including Citrix.Resecurity claims that IRIDIUM breached Citrix's network during December 2018.Infy engaged in malware spearphishing against the same targets as Flying Kitten from the outset of its campaign; Operation Cleaver has registered several resources related to development agencies that have been the subject of intrusion attempts by others since February 2014.The malicious samples we found are the early stage malware most often delivered by spear-phishing e-mails.This next stage library copies itself into the System32 directory of the Windows folder after the hardcoded file name — either KBDLV2.DLL or AUTO.DLL, depending on the malware sample.At this stage, the malware gathers information about the infected computer.Hancom Office is widely used in South Korea.Perhaps it also points to the suspected North Korean origin of attack.The attacker is from North Korea.All of them lie in ranges of the Jilin Province Network and Liaoning Province Network, in China.Finally, this geo-location supports the likely theory that the attackers behind Kimsuky are based in North Korea.In this blog, we look at the Winnti malware implant as used by two known activity groups BARIUM and LEAD.According to the German press, the intruders used the Winnti family of malware as their main implant, giving them persistent access to the conglomerate's network as early as February 2016.In the case of this malware, the activity groups strongly associated with Winnti are BARIUM and LEAD.But even though they share the use of Winnti, the BARIUM and LEAD activity groups are involved in very different intrusion scenarios.To show how this breach and similar breaches can be mitigated, we look at how Windows Defender ATP flags activities associated with BARIUM, LEAD, and other known activity groups and how it provides extensive threat intelligence about these groups.BARIUM begins its attacks by cultivating relationships with potential victims—particularly those working in Business Development or Human Resources—on various social media platforms.During these intrusions, LEAD's objective was to steal sensitive data, including research materials, process documents, and project plans.Initial intrusion stages feature the Win32/Barlaiy implant—notable for its use of social network profiles, collaborative document editing sites, and blogs for C&C.Once BARIUM has established rapport, they spear-phish the victim using a variety of unsophisticated malware installation vectors, including malicious shortcut (.lnk) files with hidden payloads, compiled HTML help (.chm) files, or Microsoft Office documents containing macros or exploits.Instead, the group often simply emails a Winnti installer to potential victims, relying on basic social engineering tactics to convince recipients to run the attached malware.Microsoft Analytics shows that Winnti has been used in intrusions carried out throughout Asia, Europe, Oceania, the Middle East, and the United States in the last six months (Figure 1).Instead, Lead often simply emails a Winnti installer to potential victims, relying on basic social engineering tactics to convince recipients to run the attached malware.In some other cases, LEAD gains access to a target by brute-forcing remote access login credentials, performing SQL injection, or exploiting unpatched web servers, and then they copy the Winnti installer directly to compromised machines.This was the case in two known intrusions in 2015, where attackers named the implant DLL " ASPNET_FILTER.DLL " to disguise it as the DLL for the ASP.NET ISAPI Filter.Windows Defender ATP helps network security professionals deal with intrusions from activity groups like LEAD and BARIUM in several ways.The following examples were developed using a Winnti installer that was used in attacks in December 2016.The Windows 10 Creators Update will bring several enhancements to Windows Defender ATP that will provide SOC personnel with options for immediate mitigation of a detected threat.LEAD and BARIUM are not known for large-scale spear-phishing, so it is unlikely that SOC personnel would have to deal with multiple machines having been compromised by these groups at the same time.And, finally, with the upcoming Creators Update, Windows Defender ATP will provide additional capabilities for detecting threats such as Winnti, as well as centralized response options, such as machine isolation and file blocking, that will enable fast containment of known attack jump off points.The police suspected Lurk of stealing nearly three billion rubles, using malicious software to systematically withdraw large sums of money from the accounts of commercial organizations, including banks.When we first encountered Lurk, in 2011, it was a nameless Trojan.While the machine is in isolation, SOC personnel can direct the infected machine to collect live investigation data, such as the DNS cache or security event logs, which they can use to verify alerts, assess the state of the intrusion, and support follow-up actions.This article is an attempt to share this experience with other experts, particularly the IT security specialists in companies and financial institutions that increasingly find themselves the targets of cyber-attacks.In most cases, the attackers only had to infect the computer on which the RBS software was installed in order to start stealing the cash.We were soon able to help investigate another incident involving Lurk.This event significantly affected the Russian cybercriminal world as the gang had stolen hundreds of millions of rubles during a few years of activity, and was considered a " leader " among cybercriminals.In Russia, there were several relatively large cybercriminal groups engaged in financial theft via attacks on RBS.In April 2013, a year after we found the " bodiless " Lurk module, the Russian cybercriminal underground exploited several families of malicious software that specialized in attacks on banking software.Through the information exchanges used by people in the security industry, we learned that several Russian banks were struggling with malicious programs created specifically to attack a particular type of legal banking software.If it did, the malware downloaded additional modules, including ones allowing for the automatic creation of unauthorized payment orders, changing details in legal payment orders, etc.As far as we can judge from the data we have, in 2014 the criminal group behind Lurk seriously reduced its activity and " lived from hand to mouth ", attacking anyone they could, including ordinary users.In February 2015, Kaspersky Lab's Global Research and Analysis Team (GReAT) released its research into the Carbanak campaign targeting financial institutions.Since 2011, the robbers had allegedly been stealing money directly from bank accounts in Russia and other countries of the Commonwealth of Independent States (CIS) by using a Trojan called Lurk.which they launched targeted attacks against Russian banks, businesses and media companies.Lurk uses a form of steganography: that's where one file is hidden away inside another file of a completely different sort, such as an image, audio, or video file.The latest version of Madi also has the ability to monitor the Russian social network Vkontakte (VK) along with the Jabber messaging platform to look for users who visit websites that contain words like " USA ", " Skype ", and " gov ".Madi was found capturing computer screens, recording audio and stealing screenshots, keystrokes, documents and e-mail correspondence from " Middle Eastern critical infrastructure engineering firms, government agencies, financial houses and academia.A timeline of new activity can be scoped out for the group, with the greatest number of related downloaders created by the developers in December 2011, Feb and March of 2012, followed by June of 2012.it reports to was created on August 10, 2011.Since at least 2008, The Lamberts have used multiple sophisticated attack tools against high-profile victims.Longhorn, which we internally refer to as " The Lamberts ", first came to the attention of the ITSec community in 2014, when our colleagues from FireEye discovered an attack using a zero day vulnerability (CVE-2014-4148).The attack leveraged malware we called' BlackLambert', which was used to target a high profile organization in Europe.Their arsenal includes network-driven backdoors, several generations of modular backdoors, harvesting tools, and wipers.The first time the Lambert family malware was uncovered publicly was in October 2014, when FireEye posted a blog about a zero day exploit (CVE-2014-4148) used in the wild.Interestingly, while most Blue Lambert variants have version numbers in the range of 2.x, Green Lambert is mostly in 3.x versions.While investigating one of these infections involving White Lambert (network-driven implant) and Blue Lambert (active implant), we found yet another family of tools that appear to be related.Versions of this particular orchestrator were found on other victims, together with White Lambert samples, indicating a close relationship between the White and Pink Lambert malware families.While in most cases the infection vector remains unknown, the high profile attack from 2014 used a very complex Windows TTF zero-day exploit (CVE-2014-4148).This migration activity was last observed in October 2016.Most of the Blue and Green Lambert samples have two C&C servers hardcoded in their configuration block: a hostname and an IP address.Some of the known filenames for Gray Lambert are mwapi32.dll and poolstr.dll – it should be pointed though that the filenames used by the Lamberts are generally unique and have never been used twice.Black Lambert was seen only briefly and we assume it was " retired " from the arsenal after being discovered by FireEye in 2014.The Lamberts toolkit spans across several years, with most activity occurring in 2013 and 2014.To further exemplify the proficiency of the attackers leveraging the Lamberts toolkit, deployment of Black Lambert included a rather sophisticated TTF zero day exploit, CVE-2014-4148.Taking that into account, we classify the Lamberts as the same level of complexity as Regin, ProjectSauron, Equation and Duqu2, which makes them one of the most sophisticated cyber espionage toolkits we have ever analysed.Taking that into account, we classify the Lamberts as the same level of complexity as Regin, ProjectSauron, Equation and Duqu2, which makes them one of the most sophisticated cyber espionage toolkits we have ever analysed.On January 15, Confiant exposed the activity of the Zirconium group, spreading malicious ads via a network of fake ad agencies through 2017, in what amounted to the largest malvertising campaign of recent times.Cadelle, uses Backdoor.Cadelspy.Symantec telemetry identified Cadelle and Chafer activity dating from as far back as July 2014, however, it's likely that activity began well before this date.Chafer, uses Backdoor.Remexi.Cadelle's threats are capable of opening a back door and stealing information from victims' computers.Chafer, uses Backdoor.Remexi.B.registrant information points to activity possibly as early as 2011.These threats are capable of opening a back door and stealing information from victims' computers.executable compilation times suggest early 2012.It's unclear how Cadelle infects its targets with Backdoor.Cadelspy.The affected organizations we were able to identify are mostly based in the Middle East.one organization is located in the US.There are a number of factors in these groups' campaigns that suggests that the attackers may be based in Iran.Remexi is a basic back door Trojan that allows attackers to open a remote shell on the computer and execute commands.Their primary interest appears to be gathering intelligence.This stands in opposition to the data gathered from export timestamps and C&C domain activity that points to Green Lambert being considerably older than the Blue variant.security policy in the Eastern Europe and South Caucasus regions.Callisto Group via credential phishingThese spear phishing emails were crafted to appear highly convincing, including being sent from legitimate email accounts suspected to have been previously compromised by the Callisto Group via credential phishing.In early 2016 the Callisto Group began sending highly targeted spear phishing emails with malicious attachments that contained, as their final payload, the " Scout " malware tool from the HackingTeam RCS Galileo platform.These spear phishing emails were crafted to appear highly convincing, including being sent from legitimate email accounts suspected to have been previously compromised by the Callisto Group via credential phishing.Callisto Group appears to be intelligence gathering related to European foreign and security policy.some indications of loosely linked activity dating back to at least 2013.In October 2015, the Callisto Group was observed sending targeted credential phishing emails.In early 2016, the Callisto Group was observed sending targeted spear phishing emails.The malicious attachments purported to be invitations or drafts of the agenda for the conference.Based on our analysis of Callisto Group's usage of RCS Galileo, we believe the Callisto Group did not utilize the leaked RCS Galileo source code, but rather used the leaked readymade installers to set up their own installation of the RCS Galileo platform.In the known spear phishing attacks by the Callisto Group, they employed the " Scout " malware tool from the RCS Galileo platform.We are confident the Callisto Group used this type of access to a target's email account for the purposes of sending spear phishing to other targets.If a target of the spear phishing described in " Phase 2: malware deployment " opened the email attachment and, crucially, clicked on the icon in the attachment, this would lead to the target's computer becoming infected with the " Scout " malware tool from the RCS Galileo platform.Callisto Group and related infrastructure contain links to at least Russia, Ukraine, and China.they have been last known to employ malware in February 2016.RCS Galileo platform.The spear phishing emails used in the known attacks by the Callisto Group were so convincing that even skilled and alert users would likely have attempted to open the malicious attachment.In October 2015 the Callisto Group targeted a handful of individuals with phishing emails that attempted to obtain the target's webmail credentials.The Callisto Group has been active at least since late 2015 and continues to be so, including continuing to set up new phishing infrastructure every week.Called Greenbug, this group is believed to be instrumental in helping Shamoon steal user credentials of targets ahead of Shamoon's destructive attacks.On Tuesday, Arbor Networks said that it has new leads on a credential stealing remote access Trojan (RAT) called Ismdoor, possibly used by Greenbug to steal credentials on Shamoon's behalf." With our latest research we now see how Greenbug has shifted away from HTTP-based C2 communication with Ismdoor.It's now relying on a new DNS-based attack technique to better cloak command and control communications between Greenbug and the malware ", said Dennis Schwarz, research analyst on Arbor's ASERT Team, in an interview with Threatpost.t's now relying on a new DNS-based attack technique to better cloak command and control communications between Greenbug and the malware ", said Dennis Schwarz, research analyst on Arbor's ASERT Team, in an interview with Threatpost.By relying on a native PDF command to navigate to a new URL, Zirconium successfully circumvented Chrome's anti-redirect protection.In the context of the Ismdoor RAT, the DNS attack technique is used primarily by Greenbug for stealing credentials.To do this, it employs a number of specific commands via DNSMessenger.Iranian Threat Agent Greenbug has been registering domains similar to those of Israeli High-Tech and Cyber Security Companies.By pivoting off the registration details and servers data of the two domains we discovered others registered by the threat agent.Named Trochilus, this new RAT was part of Group 27's malware portfolio that included six other malware strains, all served together or in different combinations, based on the data that needed to be stolen from each victim.According to the security experts, this collection of malware was discovered after their first initial report was published, meaning that Group 27 ignored the fact they were unmasked and continued to infect their targets regardless, through the same entry point, the Myanmar Union Election Commission (UEC) website.Trochilus RAT activity was discovered during both months of October and November 2015.From September 2016 through late November 2016, a threat actor group used both the Trochilus RAT and a newly idenfied RAT we've named MoonWind to target organizations in Thailand, including a utility organization.We chose the name' MoonWind' based on debugging strings we saw within the samples, as well as the compiler used to generate the samples.The attackers compromised two legitimate Thai websites to host the malware, which is a tactic this group has used in the past.Both the Trochilus and MoonWind RATs were hosted on the same compromised sites and used to target the same organization at the same time.The attackers used different command and control servers (C2s) for each malware family, a tactic we believe was meant to thwart attempts to tie the attacks together using infrastructure alone.Further research led us to additional MoonWind samples using the same C2 (dns.webswindows.com) but hosted on a different compromised but legitimate website.The attacks in that case took place in late September to early October 2016 and the attackers stored the MoonWind samples as RAR files, while in the November attacks the RATs were stored as executables.We were not able to find additional tools, but the attackers again compromised a legitimate Thai website to host their malware, in this case the student portal for a Thai University.Trochilus was first reported by Arbor Networks in their Seven Pointed Dagger report tying its use to other targeted Southeast Asia activity.The activity dates to at least 2013 and has ties to multiple reports by other researchers.It is highly likely MoonWind is yet another new tool being used by the group or groups responsible for that activity, indicating they are not only still active but continuing to evolve their playbook.The samples provided were alleged to be targeting Tibetan and Chinese Pro-Democracy Activists.On June 7, 2013, Rapid7 released an analysis of malware dubbed' KeyBoy', also exploiting unknown vulnerabilities in Microsoft Office, similarly patched by MS12-060, but allegedly targeting interests in Vietnam and India.As we have seen in some previous targeted malware attacks, the attackers in this incident are taking advantage of services like changeip.com to establish free subdomains in their infrastructure.Blending in with legitimate traffic is a common tactic used by attackers to help fly under the radar.Subdomains at phmail.us have been linked to malicious activity dating back as far as December 2011.Based on the patterns of subdomain registration over time in DNS, TRAC believes this is an example where the attackers registered their own second-level domain.In this blog post we'll analyze two specific incidents apparently targeting victims in Vietnam and in India and we'll describe the capabilities of the custom backdoor being used that for convenience (and to our knowledge, for a lack of an existing name) we call KeyBoy, due to a string present in one of the samples.We encountered the first document exploit called " THAM luan - GD - NCKH2.doc " a few days ago, which appears to be leveraging some vulnerabilities patched with MS12-060.This document, written in Vietnamese, appears to be reviewing and discussing best practices for teaching and researching scientific topics.For the sake of this analysis we'll take the Vietnamese backdoor as an example; the one found in the Indian attack operates in the exact same way.In the second set they are making use of a dynamic DNS service by ChangeIP.com.The Tibetan community has been targeted for over a decade by espionage operations that use malware to infiltrate communications and gather information.he Tibetan community has been targeted for over a decade by espionage operations that use malware to infiltrate communications and gather information.They are often targeted simultaneously with other ethnic minorities and religious groups in China.Examples as early as 2008 document malware operations against Tibetan non-governmental organizations (NGOs) that also targeted Falun Gong and Uyghur groups.More recently in 2016, Arbor Networks reported on connected malware operations continuing to target these same groups, which the Communist Party of China perceives as a threat to its power.There is the exploit code and malware used to gain access to systems, the infrastructure that provides command and control to the malware operator, and the human elements – developers who create the malware, operators who deploy it, and analysts who extract value from the stolen information.For example, we have observed frequent reuse of older (patched) exploits in malware operations against the Tibetan community.These operations involved highly targeted email lures with repurposed content and attachments that contained an updated version of KeyBoy.In August and October 2016 we observed a malware operation targeting members of the Tibetan Parliament (the highest legislative organ of the Tibetan government in exile, formally known as Central Tibetan Administration).The Arbor report describes the ongoing use of these four vulnerabilities in a series of espionage campaigns against not only Tibetan groups, but also others related to Hong Kong, Taiwan, and Uyghur interests.The malware samples deployed in both of these operations are updated versions of the KeyBoy backdoor first discussed in 2013 by Rapid7.This behavioural tactic was previously mentioned in relation to KeyBoy in a 2013 blog post by Cisco.These versions of KeyBoy differed from the one first described by Rapid7 in several ways, many of which will be described in the sections to follow.These samples were contained in exploit documents containing distinct lure content, one having a Tibetan nexus, the other an Indian nexus.We believe the 2013, 2015, and 2016 KeyBoy samples provide evidence of a development effort focused on changing components that would be used by researchers to develop detection signatures.In another modification, first observed in the most recent October 11 Parliamentarian operation (version agewkassif), the developer (s) of KeyBoy began using a string obfuscation routine in order to hide many of the critical values referenced within the malware.Trend Micro specifically noted that the 2013 versions of KeyBoy used the same algorithm for encoding their configuration files as was observed in the Operation Tropic Trooper malware.This sample was also found to be deployed using the CVE-2012-0158 vulnerability.The operation against the Tibetan Parliamentarians illustrates the continued use of malicious attachments in the form of documents bearing exploits.Chances are about even, though, that Mofang is a relevant threat actor to any organization that invests in Myanmar or is otherwise politically involved.In addition to the campaign in Myanmar, Mofang has been observed to attack targets across multiple sectors (government, military, critical infrastructure and the automotive and weapon industries) in multiple countries.This threat report gives insight into some of the information that Fox-IT has about a threat actor that it follows, called Mofang.The name Mofang is based on the Mandarin verb, which means to imitate.It is highly likely that the Mofang group is a group that operates out of China and is probably government-affiliated.Chapter 7 explains the working of Mofang's preferred tools: ShimRat and SimRatReporter.The Mofang group has been active in relation to the Kyaukphyu sez.KeyBoy provides basic backdoor functionality, allowing the operators to select from various capabilities used to surveil and steal information from the victim machine.The first attack started in early July with a ShimRatReporter payload.Myanmar has been the target of Mofang's attacks for years before the campaign related to the sez.In late September 2015 Mofang used the website of Myanmar's national airline hosted at www.flymna.com for an attack against an organization in Myanmar.In December 2012 Mofang started a campaign against a new target, called' seg' for the purpose of this report.From the configuration it can be determined that the company was running F-Secure Antivirus and Mofang registered the domain to not appear suspicious.In September 2015 Mofang launched another attack.A new version of ShimRat was built on the 7th of September, uploaded to the server and only days later used in a new campaign.MoneyTaker has primarily been targeting card processing systems, including the AWS CBR (Russian Interbank System) and purportedly SWIFT (US).Given the wide usage of STAR in LATAM, financial institutions in LATAM could have particular exposure to a potential interest from the MoneyTaker group.In addition to banks, the MoneyTaker group has attacked law firms and also financial software vendors.Since that time, the group attacked companies in California, Utah, Oklahoma, Colorado, Illinois, Missouri, South Carolina, North Carolina, Virginia and Florida.The first attack in the US that Group-IB attributes to MoneyTaker was conducted in the spring of 2016: money was stolen from the bank by gaining access to First Data's " STAR " network operator portal.The first attack in the US that Group-IB attributes to this group was conducted in the spring of 2016: money was stolen from the bank by gaining access to First Data's " STAR " network operator portal.In 2017, the number of MoneyTaker's attacks has remained the same with 8 US banks, 1 law firm and 1 bank in Russia being targeted.In 2017, the number of attacks has remained the same with 8 US banks, 1 law firm and 1 bank in Russia being targeted.By analyzing the attack infrastructure, Group-IB identified that MoneyTaker group continuously exfiltrates internal banking documentation to learn about bank operations in preparation for future attacks.Group-IB reports that MoneyTaker uses both borrowed and their own self-written tools.Group-IB has provided Europol and Interpol with detailed information about the MoneyTaker group for further investigative activities as part of our cooperation in fighting cybercrime.In late September 2015 Mofang used the website of Myanmara's national airline hosted at www.flymna.com for an attack against an organization in Myanmar.To control the full operation, MoneyTaker uses a Pentest framework Server.On it, MoneyTaker install a legitimate tool for penetration testing – Metasploit.At the end of June 2015 Mofang started its campaign to gather information of a specific target in relation to the sezs: the cpg Corporation.MoneyTaker uses' fileless' malware only existing in RAM and is destroyed after reboot.To ensure persistence in the system MoneyTaker relies on PowerShell and VBS scripts - they are both difficult to detect by antivirus and easy to modify.After successfully infecting one of the computers and gaining initial access to the system, the attackers perform reconnaissance of the local network in order to gain domain administrator privileges and eventually consolidate control over the network.MUSTANG PANDA has previously used the observed microblogging site to host malicious PowerShell scripts and Microsoft Office documents in targeted attacks on Mongolia-focused NGOs.This newly observed activity uses a series of redirections and fileless, malicious implementations of legitimate tools to gain access to the targeted systems.Unit 42 recently identified a targeted attack against an individual working for the Foreign Ministry of Uzbekistan in China.Since that time, MoneyTaker attacked companies in California, Utah, Oklahoma, Colorado, Illinois, Missouri, South Carolina, North Carolina, Virginia and Florida.In their Operation Tropic Trooper report, Trend Micro documented the behaviour and functionality of an espionage toolkit with several design similarities to those observed in the various components of KeyBoy.Our analysis shows that actors attempted to exploit CVE-2012-0158 to install NetTraveler Trojan.Unit 42's analysis shows that NetTraveler attempted to exploit CVE-2012-0158 to install NetTraveler Trojan.Our analysis shows that NetTraveler attempted to exploit CVE-2012-0158 to install NetTraveler Trojan.In 2016, Group-IB identified 10 attacks conducted by MoneyTaker, 6 attacks on banks in the US, 1 attack on a US service provider, 1 attack on a bank in the UK and 2 attacks on Russian banks.If KeyBoy is a single component of a larger espionage toolkit, the developers may have realized that this older, static-key based, configuration encoding algorithm was inadvertently providing a link between disparate components of their malware suite.In 2016, Group-IB identified 10 attacks conducted by MoneyTaker; 6 attacks on banks in the US, 1 attack on a US service provider, 1 attack on a bank in the UK and 2 attacks on Russian banks.The NetTraveler trojan has been known to be used in targeted cyber espionage attacks for more than a decade by nation state threat actors and continues to be used to target its victims and exfiltrate data.The exploit document carrying this alternate KeyBoy configuration also used a decoy document which was displayed to the user after the exploit launched.Only one incident involving a Russian bank was promptly identified and prevented that is known to Group-IB.This program is designed to capture keystrokes, take screenshots of the user's desktop and get contents from the clipboard.To conduct targeted attacks, MoneyTaker use a distributed infrastructure that is difficult to track.This technique hides the true C2 server from researchers that do not have access to both the rastls.dll and Sycmentec.config files.Hackers use Metasploit to conduct all these activities: network reconnaissance, search for vulnerable applications, exploit vulnerabilities, escalate systems privileges, and collect information.Over the years they've used application components from Norman, McAfee and Norton.Recently, Falcon Intelligence observed new activity from MUSTANG PANDA, using a unique infection chain to target likely Mongolia-based victims.Throughout the years, the Mofang group has compromised countless servers belonging to government or other Myanmar related organizations, in order to stage attacks.This file requires the target to attempt to open the .lnk file, which redirects the user to a Windows Scripting Component (.wsc) file, hosted on an adversary-controlled microblogging page.A report published by Kaspersky Labs in 2011 on NetTraveler also mentions the C2 servers were being hosted by Krypt Technolgies.Obviously, the developers behind NetTraveler have taken steps to try to hide the malware's configuration.In this report, we'll review how the actors attempted to exploit CVE-2012-0158 to install the NetTraveler Trojan.In this report, we'll review how NetTraveler attempted to exploit CVE-2012-0158 to install the NetTraveler Trojan.In this report, we'll review how the NetTraveler attempted to exploit CVE-2012-0158 to install the NetTraveler Trojan.Upon successful exploitation, the attachment will install the trojan known as NetTraveler using a DLL side-loading attack technique.NetTraveler has been used to target diplomats, embassies and government institutions for over a decade, and remains the tool of choice by the adversaries behind these cyber espionage campaigns.WildFire correctly classifies NetTraveler as malicious.The NetTraveler group has infected victims across multiple establishments in both the public and private sector including government institutions, embassies, the oil and gas industry, research centers, military contractors and activists.Today Kaspersky Lab's team of experts published a new research report about NetTraveler, which is a family of malicious programs used by APT actors to successfully compromise more than 350 high-profile victims in 40 countries.According to Kaspersky Lab's report, this threat actor has been active since as early as 2004; however, the highest volume of activity occurred from 2010 – 2013.Most recently, the NetTraveler group's main domains of interest for cyberespionage activities include space exploration, nanotechnology, energy production, nuclear power, lasers, medicine and communications.In addition, the NetTraveler toolkit was able to install additional info-stealing malware as a backdoor, and it could be customized to steal other types of sensitive information such as configuration details for an application or computer-aided design files.During Kaspersky Lab's analysis of NetTraveler, the company's experts identified six victims that had been infected by both NetTraveler and Red October, which was another cyberespionage operation analyzed by Kaspersky Lab in January 2013.Kaspersky Lab's products detect and neutralize the malicious programs and its variants used by the NetTraveler Toolkit, including Trojan-Spy.Win32.TravNet and Downloader.Win32.NetTraveler.Based on Kaspersky Lab's analysis of NetTraveler's C&C data, there were a total of 350 victims in 40 countries across including the United States, Canada, United Kingdom, Russia, Chile, Morocco, Greece, Belgium, Austria, Ukraine, Lithuania, Belarus, Australia, Hong Kong, Japan, China, Mongolia, Iran, Turkey, India, Pakistan, South Korea, Thailand, Qatar, Kazakhstan, and Jordan.Kaspersky Lab's products detect the Microsoft Office exploits used in the spear-phishing attacks, including Exploit.MSWord.CVE-2010-333, Exploit.Win32.CVE-2012-0158.In this case, it was a group commonly referred to as " Nitro ", which was coined by Symantec in its 2011 whitepaper.Historically, Nitro is known for targeted spear phishing campaigns and using Poison Ivy malware, which was not seen in these attacks.Since at least 2013, Nitro appears to have somewhat modified their malware and delivery methods to include Spindest and legitimate compromised websites, as reported by Cyber Squared's TCIRT.In July, Nitro compromised a South Korean clothing and accessories manufacturer's website to serve malware commonly referred to as " Spindest ".Of all the samples we've tied to this activity so far noted in this blog, this is the only one configured to connect directly to an IP address for Command and Control (C2).The next sample was another Spindest variant and had the same timestamp as the aforementioned PcClient sample.As this post and previous cited research show, APT groups such as Nitro will continue to evolve their techniques within the kill chain to avoid detection.Attacks on the chemical industry are merely their latest attack wave.The goal of the attackers appears to be to collect intellectual property such as design documents, formulas, and manufacturing processes.The attack wave started in late July 2011 and continued into midSeptember 2011.The purpose of the attacks appears to be industrial espionage, collecting intellectual property for competitive advantage.They then moved on to the motor industry in late May.From late April to early May, the attackers focused on human rights related NGOs.Attackers then moved on to the motor industry in late May.At this point, the current attack campaign against the chemical industry began.The attackers first researched desired targets and then sent an email specifically to the target.First, when a specific recipient was targeted, the mails often purported to be meeting invitations from established business partners.While the attackers used different pretexts when sending these malicious emails, two methodologies stood out.Secondly, when the emails were being sent to a broad set of recipients, the mails purported to be a necessary security update.The attacks were traced back to a computer system that was a virtual private server (VPS) located in the United States.Attackers are sending malicious PDF and DOC files, which use exploits to drop variants of Backdoor.Sogu.This particular threat was also used by hackers to compromise a Korean social network site to steal records of 35 million users.The Sogu gang use a custom developed threat – Backdoor.Sogu, whereas the group described in this document use an off the shelf threat – Poison Ivy.The Sogu gang, in contrast, use PDF and DOC files in very tailored, targeted emails.These attacks are primarily targeting private industry in search of key intellectual property for competitive advantage, military institutions, and governmental organizations often in search of documents related to current political events and human rights organizations.Nitro's campaign focused on the chemical sector with the goal of obtaining sensitive documents such as proprietary designs, formulas, and manufacturing processes.This attack campaign focused on the chemical sector with the goal of obtaining sensitive documents such as proprietary designs, formulas, and manufacturing processes.These have been highly active in the Middle East region and unveiled ongoing targeted attacks in multiple regions.The attackers try to lure targets through spear phishing emails that include compressed executables.We found that the group behind this campaign targeted mainly industrial, engineering and manufacturing organizations in more than 30 countries.Using the Kaspersky Security Network (KSN) and artifacts from malware files and attack sites, we were able to trace the attacks back to March 2015.Operation Ghoul is one of the many attacks in the wild targeting industrial, manufacturing and engineering organizations, Kaspersky Lab recommends users to be extra cautious while checking and opening emails and attachments.The main point that sets Operation Groundbait apart from the other attacks is that it has mostly been targeting anti-government separatists in the self-declared Donetsk and Luhansk People's Republics.The attacks appear to be geopolitically motivated and target high profile organizations.The objective of the attacks is clearly espionage – they involve gaining access to top legislative, executive and judicial bodies around the world.The attackers have targeted a large number of organizations globally since early 2017, with the main focus on the Middle East and North Africa (MENA), especially Palestine.The attacks were initially discovered while investigating a phishing attack that targeted political figures in the MENA region.Like BlackEnergy (a.k.a Sandworm, Quedagh), Potao is an example of targeted espionage (APT) malware detected mostly in Ukraine and a number of other CIS countries, including Russia, Georgia and Belarus.The main reason for the increase in Potao detections in 2014 and 2015 were infections through USB drives.The first Potao campaign that we examined took place in August 2011.In March 2014, the gang behind Potao started using a new infection vector.Since March 2015, ESET has detected Potao binaries at several high-value Ukrainian targets that include government and military entities and one of the major Ukrainian news agencies.As confirmation that the malware writers are still very active even at the time of this writing, ESET detected a new Potao sample compiled on July 20, 2015.In the previous pages we have presented our findings based on ESET detection telemetry and our analysis of Win32/Potao and Win32/FakeTC samples.Potao is another example of targeted espionage malware, a so-called APT, to use the popular buzzword, although technically the malware is not particularly advanced or sophisticated.Examples of notable Potao dissemination techniques, some of which were previously unseen, or at least relatively uncommon, include the use of highly-targeted spear-phishing SMS messages to drive potential victims to malware download sites and USB worm functionality that tricked the user into' willingly' executing the trojan.The PassCV group continues to be one of the most successful and active threat groups that leverage a wide array of stolen Authenticode-signing certificates.The PassCV group typically utilized publicly available RATs in addition to some custom code, which ultimately provided backdoor functionality to affected systems via phony resumes and curriculum vitae (CVs).he PassCV group typically utilized publicly available RATs in addition to some custom code, which ultimately provided backdoor functionality to affected systems via phony resumes and curriculum vitae (CVs).PassCV continues to maintain a heavy reliance on obfuscated and signed versions of older RATs like ZxShell and Ghost RAT, which have remained a favorite of the wider Chinese criminal community since their initial public release.SPEAR identified recent PassCV samples which implemented another commercial off-the-shelf (COTS) RAT called Netwire.SPEAR identified recent PassCV samples which implemented another commercial off-the-shelf (COTS) RAT called Netwire.The first new connection SPEAR identified was derived from an email address listed in Blue Coat Systems' original report on PassCV.Syncopate is a well-known Russian company that is best known as the developer and operator of the' GameNet' platform.The PassCV group continues to be extremely effective in compromising both small and large game companies and surreptitiously using their code-signing certificates to infect an even larger swath of organizations.Since the last report, PassCV has significantly expanded its targets to include victims in the United States, Taiwan, China and Russia.Based on data collected from Palo Alto Networks AutoFocus threat intelligence, we discovered continued operations of activity very similar to the Roaming Tiger attack campaign that began in the August 2015 timeframe, with a concentration of attacks in late October and continuing into December.The files exploit the well-known Microsoft Office vulnerability, CVE-2012-0158, to execute malicious code in order to take control of the targeted systems.BBSRAT is typically packaged within a portable executable file, although in a few of the observed instances, a raw DLL was discovered to contain BBSRAT.WildFire properly classifies BBSRAT malware samples as malicious.This week we will discuss another Chinese nexus adversary we call Samurai Panda.Samurai Panda is interesting in that their target selection tends to focus on Asia Pacific victims in Japan, the Republic of Korea, and other democratic Asian victims.Next, in an effort to demonstrate it wasn't relegated to China, CrowdStrike exposed Clever Kitten, an actor we track out of Iran who leverages some very distinct TTPs when viewed next to a more visible adversary.Next, in an effort to demonstrate it wasn't relegated to China, we exposed Clever Kitten, an actor we track out of Iran who leverages some very distinct TTPs when viewed next to a more visible adversary.Beginning in 2009, we've observed this actor conduct more than 40 unique campaigns that we've identified in the malware configurations' campaign codes.These codes are often leveraged in the malware used by coordinated targeted attackers to differentiate victims that were successfully compromised from different target sets.When conducting programmatic espionage activity, it can presumably become quite confusing if the attacker targets a heavy industry company, an avionics program, and seven other unique targets as to which infected host you will collect what information from.These rules detect the malware " beaconing " to the command-and-control server, the initial malware check-in, and an attempt to download a backdoor module.Earlier this month, Securelist's technology caught another zero-day Adobe Flash Player exploit deployed in targeted attacks.Securelist believe the attacks are launched by an APT Group we track under the codename " ScarCruft ".ScarCruft is a relatively new APT group; victims have been observed in Russia, Nepal, South Korea, China, India, Kuwait and Romania.ScarCruft has several ongoing operations, utilizing multiple exploits — two for Adobe Flash and one for Microsoft Internet Explorer.ScarCruft is a relatively new APT group; victims have been observed in Russia, Nepal, South Korea, China, India, Kuwait and Romania.Operation Daybreak appears to have been launched by ScarCruft in March 2016 and employs a previously unknown (0-day) Adobe Flash Player exploit.Adobe Flash Player exploit.It is also possible that ScarCruft deployed another zero day exploit, CVE-2016-0147, which was patched in April.Operation Erebus leverages another Flash Player exploit (CVE-2016-4117) through the use of watering hole attacks.ScarCruft's Operation Erebus leverages another Flash Player exploit (CVE-2016-4117) through the use of watering hole attacks.Nevertheless, resourceful threat actors such as ScarCruft will probably continue to deploy zero-day exploits against their high profile targets.After publishing our initial series of blogposts back in 2016, Kaspersky have continued to track the ScarCruft threat actor.After publishing our initial series of blogposts back in 2016, we have continued to track the ScarCruft threat actor.ScarCruft is a Korean-speaking and allegedly state-sponsored threat actor that usually targets organizations and companies with links to the Korean peninsula.The ScarCruft group uses common malware delivery techniques such as spear phishing and Strategic Web Compromises (SWC).ScarCruft is a Korean-speaking and allegedly state-sponsored threat actor that usually targets organizations and companies with links to the Korean peninsula.ScarCruft uses a multi-stage binary infection scheme.One of the most notable functions of the initial dropper is to bypass Windows UAC (User Account Control) in order to execute the next payload with higher privileges.This malware uses the public privilege escalation exploit code CVE-2018-8120 or UACME which is normally used by legitimate red teams.Afterwards, the installer malware creates a downloader and a configuration file from its resource and executes it.The downloader malware uses the configuration file and connects to the C2 server to fetch the next payload.The ScarCruft group keeps expanding its exfiltration targets to steal further information from infected hosts and continues to create tools for additional data exfiltration.We also discovered an interesting piece of rare malware created by this threat actor – a Bluetooth device harvester.We believe they may have some links to North Korea, which may explain why ScarCruft decided to closely monitor them.ScarCruft also attacked a diplomatic agency in Hong Kong, and another diplomatic agency in North Korea.It appears ScarCruft is primarily targeting intelligence for political and diplomatic purposes.ScarCruft infected this victim on September 21, 2018.But before the ScarCruft infection, however, another APT group also targeted this victim with the host being infected with GreezeBackdoor on March 26, 2018.ScarCruft has a keen interest in North Korean affairs, attacking those in the business sector who may have any connection to North Korea, as well as diplomatic agencies around the globe.Earlier this month, we caught another zero-day Adobe Flash Player exploit deployed in targeted attacks.ScarCruft is a relatively new APT group; victims have been observed in several countries, including Russia, Nepal, South Korea, China, India, Kuwait and Romania.Currently, the group is engaged in two major operations: Operation Daybreak and Operation Erebus.The other one, ScarCruft's Operation Erebus employs an older exploit, for CVE-2016-4117 and leverages watering holes.The other one, " Operation Erebus " employs an older exploit, for CVE-2016-4117 and leverages watering holes.We will publish more details about the attack once Adobe patches the vulnerability, which should be on June 16.The ScarCruft APT gang has made use of a Flash zero day patched Thursday by Adobe to attack more than two dozen high-profile targets in Russia and Asia primarily.Adobe on Thursday patched a zero-day vulnerability in Flash Player that has been used in targeted attacks carried out by a new APT group operating primarily against high-profile victims in Russia and Asia.Researchers at Kaspersky Lab privately disclosed the flaw to Adobe after exploits against the zero-day were used in March by the ScarCruft APT gang in what Kaspersky Lab is calling Operation Daybreak.Kaspersky speculates that ScarCruft could also be behind another zero-day, CVE-2016-0147, a vulnerability in Microsoft XML Core Services that was patched in April.Attacks start with spear-phishing emails that include a link to a website hosting an exploit kit associated with ScarCruft and used in other attacks.Another set of attacks called Operation Erebus leverages another Flash exploit, CVE-2016-4117, and relies on watering hole attacks as a means of propagation.Thursday's Flash Player update patched 36 vulnerabilities in total including the zero day CVE-2016-4171.The ongoing operation likely began as early as January 2017 and has continued through the first quarter of 2019.Cisco Talos assess with high confidence that these operations are distinctly different and independent from the operations performed by DNSpionage, which we reported on in November 2018.We assess with high confidence that these operations are distinctly different and independent from the operations performed by DNSpionage, which we reported on in November 2018.The common use of the Enfal Trojan suggests that Shadow Network may be exchanging tools and techniques.While Silence had previously targeted Russian banks, Group-IB experts also have discovered evidence of the group's activity in more than 25 countries worldwide.In August 2017, the National Bank of Ukraine warned state-owned and private banks across the country about a large-scale phishing attack.The threat actor used an exploit from the arsenal of the state-sponsored hacker group APT28.The new threat actor group was eventually named Silence.Silence is a group of Russian-speaking hackers, based on their commands language, the location of infrastructure they used, and the geography of their targets (Russia, Ukraine, Belarus, Azerbaijan, Poland, and Kazakhstan).Although Silence's phishing emails were also sent to bank employees in Central and Western Europe, Africa, and Asia).Silence also used Russian-language web hosting services.Financially motivated APT groups which focus efforts on targeted attacks on the financial sector such as — Anunak, Corkow, Buhtrap — usually managed botnets using developed or modified banking Trojans.They tried new techniques to steal from banking systems, including AWS CBR (the Russian Central Bank's Automated Workstation Client), ATMs, and card processing.Group-IB researchers were tracking Silence throughout this period and conducting response following incidents in the financial sector.Group-IB detected the first incidents relating to Silence in June 2016.One of Silence's first targets was a Russian bank, when they tried to attack AWS CBR.They are selective in their attacks and wait for about three months between incidents, which is approximately three times longer than other financially motivated APT groups, like MoneyTaker, Anunak (Carbanak), Buhtrap or Cobalt.Silence try to apply new techniques and ways of stealing from various banking systems, including AWS CBR, ATMs, and card processing.Silence's successful attacks currently have been limited to the CIS and Eastern European countries.He is responsible for developing tools for conducting attacks and is also able to modify complex exploits and third party software.Silence's main targets are located in Russia, Ukraine, Belarus, Azerbaijan, Poland, and Kazakhstan.However, some phishing emails were sent to bank employees in more than 25 countries of Central and Western Europe, Africa and Asia including: Kyrgyzstan, Armenia, Georgia, Serbia, Germany, Latvia, Czech Republic, Romania, Kenya, Israel, Cyprus, Greece, Turkey, Taiwan, Malaysia, Switzerland, Vietnam, Austria, Uzbekistan, Great Britain, Hong Kong, and others.In the same year, they conducted DDoS attacks using the Perl IRC bot and public IRC chats to control Trojans.In the same year, Silence conducted DDoS attacks using the Perl IRC bot and public IRC chats to control Trojans.In two months, the group returned to their proven method and withdrew funds again through ATMs.In September 2017, we discovered a new targeted attack on financial institutions.In September 2017, we discovered Silence attack on financial institutions.The infection vector is a spear-phishing email with a malicious attachment.An interesting point in the Silence attack is that the cybercriminals had already compromised banking infrastructure in order to send their spear-phishing emails from the addresses of real bank employees and look as unsuspicious as possible to future victims.The spear-phishing infection vector is still the most popular way to initiate targeted campaigns.We conclude that the actor behind the attack is Silence group, a relatively new threat actor that's been operating since mid-2016.A preliminary analysis caught the attention of our Threat Analysis and Intelligence team as it yielded interesting data that, among other things, shows that Silence was targeting employees from financial entities, specifically in the Russian Federation and the Republic of Belarus.As shown above, the threat runs several native binaries to collect useful information for its recon phase.The intelligence we have collected shows that Silence is part of a more extensive operation, still focused on financial institutions operating mainly on Russian territory.These spearphishing attempts represent an evolution of Iranian actors based on their social engineering tactics and narrow targeting.Based on file modification dates and timestamps of samples, it appears that the observed campaign was initiated in the middle of February 2016, with the infrastructure taken offline at the start of March.While the Sima moniker could similarly originate from software labels, it is a common female Persian name and a Persian-language word for " visage " or " appearance ".Given its use in more advanced social engineering campaigns against women's rights activists, the label seem particularly apt.Samples and resource names contained the family names of prominent Iranians, and several of these individuals received the malware located in their respective folder.The Sima group also engaged in impersonation of Citizenship and Immigration Services at the Department of Homeland Security, posing as a notice about the expiration of the recipient's Permanent Residence status.In another case, Sima mirrored an announcement made about the broadcast of a television program on Iranian-American cultural affairs in order to impersonate the individual and engage in spearphishing within hours of the legitimate message.The server used to host these malware samples was located on the German provider Hetzner (148.251.55.114), within a small block of IP addresses that are registered with the customer ID " HOS-156205 ".All the samples appear to be have been compiled between February 29 and March 1 2016, shortly before our discovery, suggesting that, despite the known C&C servers having quickly gone offline shortly after, this spree of attacks might be fresh and currently undergoing.These archives provide further indication that those entities behind the campaigns are Persian-language speakers, due to the naming of files and folders in Persian.For the sake of narrative we are going to focus exclusively to those samples we identified being used in attacks against Iranian civil society and diaspora.Butterfly has attacked multi-billion dollar companies operating in the internet, IT software, pharmaceutical, and commodities sectors.The first signs of Butterfly's activities emerged in early 2013 when several major technology and internet firms were compromised.However, an investigation by Symantec has found that the group has been active since at least March 2012 and its attacks have not only continued to the present day, but have also increased in number.Symantec has to date discovered 49 different organizations in more than 20 countries that have been attacked by Butterfly.Aside from the four companies which have publicly acknowledged attacks, Symantec has identified five other large technology firms compromised by Butterfly, primarily headquartered in the US.In the first attack, Butterfly gained a foothold by first attacking a small European office belonging to one firm and using this infection to then move on to its US office and European headquarters.However, technology is not the only sector the group has focused on and Symantec has found evidence that Butterfly has attacked three major European pharmaceutical firms.Butterfly has also shown an interest in the commodities sector, attacking two major companies involved in gold and oil in late 2014.The company specializes in finance and natural resources specific to that region.The latter was one of at least three law firms Butterfly has targeted over the past three years.In many attacks, the group has succeeded in compromising Microsoft Exchange or Lotus Domino email servers in order to intercept company emails and possibly use them to send counterfeit emails.A powerful threat actor known as " Wild Neutron " (also known as " Jripbot " and " Morpho ") has been active since at least 2011, infecting high profile companies for several years by using a combination of exploits, watering holes and multi-platform malware.Based on the profile of the victims and the type of information targeted by the attackers, Symantec believes that Butterfly is financially motivated, stealing information it can potentially profit from.Wild Neutron hit the spotlight in 2013, when it successfully infected companies such as Apple, Facebook, Twitter and Microsoft.Wild Neutron's attacks in 2015 uses a stolen code signing certificate belonging to Taiwanese electronics maker Acer and an unknown Flash Player exploit.During the 2013 attacks, the Wild Neutron actor successfully compromised and leveraged the website www.iphonedevsdk.com, which is an iPhone developers forum.Wild Neutron's attack took advantage of a Java zero-day exploit and used hacked forums as watering holes.While the group used watering hole attacks in 2013, it's still unclear how victims get redirected to the exploitation kits in the new 2014-2015 attacks.Wild Neutron's tools include a password harvesting trojan, a reverse-shell backdoor and customized implementations of OpenSSH, WMIC and SMB.Instead of Flash exploits, older Wild Neutron exploitation and watering holes used what was a Java zero-day at the end of 2012 and the beginning of 2013, detected by Kaspersky Lab products as Exploit.Java.CVE-2012-3213.b.The victims for the 2014-2015 versions are generally IT and real estate/investment companies and in both cases, a small number of computers have been infected throughout Wild Neutron.Wild Neutron's targeting of major IT companies, spyware developers (FlexiSPY), jihadist forums (the " Ansar Al-Mujahideen English Forum ") and Bitcoin companies indicate a flexible yet unusual mindset and interests.We continue to track the Wild Neutron group, which is still active as of June 2015.A ransomware variant dubbed PyLocky was observed in September 2018 being distributed by a phishing campaign using an invoicing theme.PyLocky was found to be targeting entities in France and Germany.Fxmsp specialize in breaching highly secure protected networks to access private corporate and government information.Fxmsp is a hacking collective that has operated in various top-tier Russian- and English-speaking underground communities since 2017.Throughout 2017 and 2018, Fxmsp established a network of trusted proxy resellers to promote their breaches on the criminal underground.On April 24, 2019, Fxmsp claimed to have secured access to three leading antivirus companies.According to the Fxmsp, they worked tirelessly for the first quarter of 2019 to breach these companies and finally succeeded and obtained access to the companies' internal networks.Booz Allen Hamilton in 2014 and AhnLab in 2015 reported on Bisonal using a simple XOR cipher to hide the C2 address strings in the body . For example, Bisonal malware in 2012 used send() and recv() APIs to communicate with its C2 This Bisonal variant used in the latest attack communicates with one of the following hard-coded C2 addresses by using the HTTP POST method on TCP port 443.Previous reports have discussed Bisonal malware used in attacks against Japan, South Korea and Russia.This particular sample we found targeted an organization in Russia and there is a specific system language check for Cyrillic and no others.If it's Cyrillic and the command to the shell is not ‘ipconfig’, the threat converts the command result text encoding from Cyrillic to UTF-16.Similar to the Bisonal variant targeting the Russian organization, this sample was also disguised as PDF document.The contents of the decoy PDF is a job descriptions with the South Korean Coast Guard.The installed EXE file is almost exactly the same as the DLL version of Bisonal variant used against the Russian organization.The targets are military or defense industry in particular countries, it used DDNS for C2 servers, and tracked connections from their victims by using target or campaign codes, as well as disguising the malware as document file, and using a dropper to install the malware and decoy file.A previous campaign of this APT group was uncovered by Talos in June 2017, and since then very little of this operation was seen in the wild.ined in the archive is called DriverInstallerU.exe” but its metadata shows that its original name is Interenet Assistant.exe”.After reviewing all the malware functionalities, we are confident in saying that the attackers look for victims who answer well-defined characteristics and believe that further stages of the attack are delivered only to those who fit the specific victim profile.In this sample, however, the module names were changed from actors and characters’ names to car models, namely BMW_x1”, BMW_x2” and up to BMW_x8”.But, thanks to the attackers known affection for decoy documents that pose as news summaries, we were able to date the campaign back to March 2018.With the experience gained from the APT attack that began in March 2017, it seems this campaign has evolved into an attack with new capabilities, and an even more specific target, over a year later.These unknown actors continued launching DDoS attacks over the next few years.For simplicity, Kaspersky is calling them the BlackEnergy APT group.Since the middle of 2015, one of the preferred attack vectors for BlackEnergy in Ukraine has been Excel documents with macros that drop the Trojan to disk if the user chooses to run the script in the document.A very good analysis and overview of the BlackEnergy attacks in Ukraine throughout 2014 and 2015 was published by the Ukrainian security firm Cys Centrum the text is only available in Russian for now, but can be read via Google Translate.The earliest signs of destructive payloads with BlackEnergy go back as far as June 2014.BlackEnergy is a highly dynamic threat actor and the current attacks in Ukraine indicate that destructive actions are on their main agenda, in addition to compromising industrial control installations and espionage activities.Kaspersky will continue to monitor the BlackEnergy attacks in Ukraine and update our readers with more data when available.From Buhtrap perpetrating cybercrime for financial gain, its toolset has been expanded with malware used to conduct espionage in Eastern Europe and Central Asia.Throughout our tracking, we've seen this group deploy its main backdoor as well as other tools against various victims, but June 2019 was the first time we saw the Buhtrap group use a zero-day exploit as part of a campaign.In that case, we observed Buhtrap using a local privilege escalation exploit, CVE-2019-1132, against one of its victims.However, as the shift in targets occurred before the source code leak, we assess with high confidence that the same people behind the first Buhtrap malware attacks against businesses and banks are also involved in targeting governmental institutions.When Buhtrap was targeting businesses, the decoy documents would typically be contracts or invoices.The Buhtrap group is well known for its targeting of financial institutions and businesses in Russia.Figure 2 is a typical example of a generic invoice the group used in a campaign in 2014.When the group's focus shifted to banks, the decoy documents were related to banking system regulations or advisories from FinCERT, an organization created by the Russian government to provide help and guidance to its financial institutions.We confirmed that this is a DarkHydrus Group's new attack targeting Middle East region.In July 2018, Palo Alto disclosed DarkHydrus Group which showed its special interest to governments in Middle East.Prior to that report, we published detail analysis on malware exploiting CVE-2018-8414 vulnerability (remote code execution in SettingContent-ms), which is believed a work of DarkHydrus.However, the final payload is something that welivesecurity have never seen associated with Buhtrap.It's coincident that both 'darkhydrus' APT group name and ‘Williams’ user name in PDB path found in this Twitter user.In recent APT incidents, Dark Hydruns tend to adopt Office VBA macro instead of Office 0day vulnerability in the consideration of cost reduction.ASERT uncovered a credential theft campaign we call LUCKY ELEPHANT where attackers masquerade as legitimate entities such as foreign government, telecommunications, and military.From at least February 2019 to present, the actors in the LUCKY ELEPHANT campaign copied webpages to mimic South Asian government websites as well as Microsoft Outlook 365 login pages and hosted them on their own doppelganger domains, presumably to trick victims into providing login credentials.ASERT suspects that the Actors use phishing emails to lure victims to the doppelganger websites and entice users to enter their credentials.It is important to note that one domain, yahoomail[.]cf is only associated with this group from February 2019 onward.In late 2018, the domain was associated with a different APT group / campaign of Chinese origin.Based on our analysis into the activity, ASERT deems with moderate confidence that an Indian APT group is behind the LUCKY ELEPHANT campaign.The targets are typical of known Indian APT activity and the infrastructure was previously used by an Indian APT group.DoNot Team has a history of heavily targeting Pakistan, in addition to other neighboring countries.The 360 Intelligence Center observed four distinct campaigns against Pakistan since 2017 (link), recently targeting Pakistani businessmen working in China.DoNot Team’s confirmed use of this IP dates back to September 2018, with a six-month gap until it was used to host doppelganger domains for the LUCKY ELEPHANT campaign in early February.One of the IP addresses, 128.127.105.13, was previously used by the DoNot Team (aka APT-C-35), a suspected Indian APT group.The actors behind LUCKY ELEPHANT recognize the effectiveness and use doppelganger webpages nearly identical to legitimate sites, enticing users to input their credentials.The heavier targeting in Pakistan adheres to historical targeting and the ongoing tension between the two countries, which has escalated since a terrorist attack in Kashmir on 14 February 2019.The targeting of Pakistan, Bangladesh, Sri Lanka, Maldives, Myanmar, Nepal, and the Shanghai Cooperation Organization are all historical espionage targets by India.However, it is clear is that Donot are actively establishing infrastructure and are targeting governments in South Asia.First attack of this campaign took place in May 2018.Arbor also published APT research on this group, and named it ‘Donot’.Donot attacked government agencies, aiming for classified intelligence.We identified this APT group coded as ‘APT-C-35’ in 2017, who is mainly targeting Pakistan and other South Asian countries for cyber espionage.At least 4 attack campaigns against Pakistan have been observed by us since 2017.Spear phishing emails with vulnerable Office documents or malicious macros are sent to victims.In the latest attack, Donot group is targeting Pakistani businessman working in China.Two unique malware frameworks, EHDevel and yty, are developed by attackers.wuaupdt.exe is a CMD backdoor, which can receive and execute CMD commands sent from C2.Furthermore, it has similar code logic as previous ones wuaupdt.exe in this attack appears in previous Donot attack, and C2 addresses are same to previous ones.From the attack activity captured this time, it is obvious that Donot APT group is still keen on Pakistan as primary target of attack, and even expands scope of attack to include Pakistani staffs and institutions in China.Buhtrap still make extensive use of NSIS installers as droppers and these are mainly delivered through malicious documents.They first came to light in 2016, when they managed to steal sensitive information from the US Democratic National Committee (DNC).Earworm first came to light in 2016, when they managed to steal sensitive information from the US Democratic National Committee (DNC).They were also behind an attack on the World Anti-Doping Agency (WADA), in which they leaked confidential information about several drug tests.SPLM, GAMEFISH, and Zebrocy delivery all maintain their own clusters, but frequently overlap later.Our previous post on Sofacy's 2017 activity stepped away from the previously covered headline buzz presenting their association with previously known political hacks and interest in Europe and the US, and examines their under-reported ongoing activity in middle east, central asia, and now a shift in targeting further east, including China, along with an overlap surprise.The larger, 300kb+ SPLM backdoors deployed in 2016 and 2017 are not observed any longer at targets in 2018.A previous, removed, report from another vendor claimed non-specific information about the groups' interest in Chinese universities, but that report has been removed – most likely detections were related to students’ and researchers’ scanning known collected samples and any incidents” remain unconfirmed and unknown.Either way, the group's consistent activity throughout central and eastern asia seems to be poorly represented in the public discussion.The actors behind this campaign we call LUCKY ELEPHANT use doppelganger webpages to mimic legitimate entities such as foreign governments, telecommunications, and military.Currently, Sofacy targets large air-defense related commercial organizations in China with SPLM, and moves Zebrocy focus across Armenia, Turkey, Kazahkstan, Tajikistan, Afghanistan, Mongolia, China, and Japan.Either way, Sofacy's consistent activity throughout central and eastern asia seems to be poorly represented in the public discussion.According to this new alert, Hidden Cobra the U.S government’s code name for Lazarus has been conducting FASTCash attacks stealing money from Automated Teller Machines (ATMs) from banks in Asia and Africa since at least 2016.Lazarus is a very active attack group involved in both cyber crime and espionage.The group was initially known for its espionage operations and a number of high-profile disruptive attacks, including the 2014 attack on Sony Pictures.Following US-CERTs report, Symantec's research uncovered the key component used in Lazarus's recent wave of financial attacks.More recently, Lazarus has also become involved in financially motivated attacks, including an US$81 million dollar theft from the Bangladesh Central Bank and the WannaCry ransomware.Other open source and semi-legitimate pen-testing tools like nbtscan and powercat are being used for mapping available resources and lateral movement as well.To make the fraudulent withdrawals, Lazarus first breaches targeted banks' networks and compromises the switch application servers handling ATM transactions.The operation, known as FASTCash” has enabled Lazarus to fraudulently empty ATMs of cash.In order to permit their fraudulent withdrawals from ATMs, Lazarus inject a malicious Advanced Interactive eXecutive (AIX) executable into a running, legitimate process on the switch application server of a financial transaction network, in this case a network handling ATM transactions.It was previously believed that the attackers used scripts to manipulate legitimate software on the server into enabling the fraudulent activity.In recent years, Lazarus has also become involved in financially motivated attacks.This malware in turn intercepts fraudulent Lazarus cash withdrawal requests and sends fake approval responses, allowing the attackers to steal cash from ATMs.Lazarus was linked to the $81 million theft from the Bangladesh central bank in 2016, along with a number of other bank heists.Lazarus was also linked to the WannaCry ransomware outbreak in May 2017.WannaCry incorporated the leaked EternalBlue exploit that used two known vulnerabilities in Windows CVE-2017-0144 and CVE-2017-0145 to turn the ransomware into a worm, capable of spreading itself to any unpatched computers on the victim's network and also to other vulnerable computers connected to the internet.Lazarus was initially known for its involvement in espionage operations and a number of high-profile disruptive attacks, including the 2014 attack on Sony Pictures that saw large amounts of information being stolen and computers wiped by malware.In short, Lazarus continues to pose a serious threat to the financial sector and organizations should take all necessary steps to ensure that their payment systems are fully up to date and secured.As with the 2016 series of virtual bank heists, including the Bangladesh Bank heist, FASTCash illustrates that Lazarus possesses an in-depth knowledge of banking systems and transaction processing protocols and has the expertise to leverage that knowledge in order to steal large sums from vulnerable banks.The attack, which starts with a malicious attachment disguised as a top secret US document, weaponizes TeamViewer, the popular remote access and desktop sharing software, to gain full control of the infected computer.As described in the infection flow, one of the first uses of the AutoHotKey scripts is to upload a screenshot from the compromised PC.It is hard to tell if there are geopolitical motives behind this campaign by looking solely at the list of countries it was targeting, since it was not after a specific region and the victims came from different places in the world.The initial infection vector used by the threat actor also changed over time, during 2018 we have seen multiple uses of self-extracting archives instead of malicious documents with AutoHotKey, which displayed a decoy image to the user.The recent wave of FASTCash attacks demonstrates that financially motivated attacks are not simply a passing interest for the Lazarus group and can now be considered one of its core activities.Although both examples of the different delivery methods described above show an exclusive targeting of Russian speakers, the recurring financial and political themes that they use highlight the attacker's interest in the financial world once more.Throughout our investigation, we have found evidence that shows operational similarities between this implant and Gamaredon Group.Gamaredon Group is an alleged Russian threat group.Gamaredon Group has been active since at least 2013, and has targeted individuals likely involved with the Ukrainian government.EvilGnome's functionalities include desktop screenshots, file stealing, allowing capturing audio recording from the user’s microphone and the ability to download and execute further modules.Gamaredon Group primarily makes use of Russian hosting providers in order to distribute its malware.Gamaredon Group's implants are characterized by the employment of information stealing tools — among them being screenshot and document stealers delivered via a SFX, and made to achieve persistence through a scheduled task.Gamaredon Group infects victims using malicious attachments, delivered via spear phishing techniques.The techniques and modules employed by EvilGnome — that is the use of SFX, persistence with task scheduler and the deployment of information stealing tools—remind us of Gamaredon Group’s Windows tools.We can observe that the sample is very recent, created on Thursday, July 4.As can be observed in the illustration above, the makeself script is instructed to run ./setup.sh after unpacking.The ShooterAudio module uses PulseAudio to capture audio from the user's microphone.makeself.sh is a small shell script that generates a self-extractable compressed tar archive from a directory.During our 2018 monitoring of this group, we were able to identify different techniques utilized by very similar attackers in the MENA region, sometimes on the same target.Gaza Cybergang Group3 (highest sophistication) whose activities previously went by the name Operation Parliament.Gaza Cybergang has been seen employing phishing, with several chained stages to evade detection and extend command and control server lifetimes.The most popular targets of SneakyPastes are embassies, government entities, education, media outlets, journalists, activists, political parties or personnel, healthcare and banking.Through our continuous monitoring of threats during 2018, we observed a new wave of attacks by Gaza Cybergang Group1 targeting embassies and political personnel.Gaza Cybergang Group1 is an attack group with limited infrastructure and an open-source type of toolset, which conducts widespread attacks, but is nevertheless focused on Palestinian political problems.In this campaign, Gaza Cybergang used disposable emails and domains as the phishing platform to target the victims.The RAT, however, had a multitude of functionalities (as listed in the table below) such as to download and execute, compress, encrypt, upload, search directories, etc.We expect the damage caused by these groups to intensify and the attacks to extend into other regions that are also linked to the complicated Palestinian situation.Cylance determined that the ‘Ghost Dragon’ group utilized specifically tailored variants of Gh0st RAT, which the group modified from the 3.6 version of the source code released in 2008.The standard network protocol for Gh0st RAT 3.6 employs zlib compression, which utilizes ‘Gh0st’ as a static five-byte packet flag that must be included in the first five bytes of initial transmission from the victim.In a more recent version of the modified Gh0st RAT malware, Ghost Dragon implemented dynamic packet flags which change the first five bytes of the header in every login request with the controller.SPEAR has observed numerous different XOR keys utilized by Ghost Dragon.Exploit and tools continued to be used after Buckeye's apparent disappearance in 2017.The Buckeye attack group was using Equation Group tools to gain persistent access to target organizations at least a year prior to the Shadow Brokers leak.Buckeye's use of Equation Group tools also involved the exploit of a previously unknown Windows zero-day vulnerability.While Buckeye appeared to cease operations in mid-2017, the Equation Group tools it used continued to be used in attacks until late 2018.The 2017 leak of Equation Group tools by a mysterious group calling itself the Shadow Brokers was one of the most significant cyber security stories in recent years.However, Symantec has now found evidence that the Buckeye cyber espionage group (aka APT3, Gothic Panda) began using Equation Group tools in attacks at least a year prior to the Shadow Brokers leak.Equation is regarded as one of the most technically adept espionage groups and the release of a trove of its tools had a major impact, with many attackers rushing to deploy the malware and exploits disclosed.DoublePulsar was delivered to victims using a custom exploit tool (Trojan.Bemstour) that was specifically designed to install DoublePulsar.One vulnerability is a Windows zero-day vulnerability (CVE-2019-0703) discovered by Symantec.Bemstour exploits two Windows vulnerabilities in order to achieve remote kernel code execution on targeted computers.The second Windows vulnerability (CVE-2017-0143) was patched in March 2017 after it was discovered to have been used by two exploit tools—EternalRomance and EternalSynergy—that were also released as part of the Shadow Brokers leak.It was reported by Symantec to Microsoft in September 2018 and was patched on March 12, 2019.How Buckeye obtained Equation Group tools at least a year prior to the Shadow Brokers leak remains unknown.The Buckeye attack group had been active since at least 2009, when it began mounting a string of espionage attacks, mainly against organizations based in the U.S.These include CVE-2010-3962 as part of an attack campaign in 2010 and CVE-2014-1776 in 2014.Beginning in August 2016, a group calling itself the Shadow Brokers began releasing tools it claimed to have originated from the Equation Group.Over the coming months, it progressively released more tools, until April 2017, when it released a final, large cache of tools, including the DoublePulsar backdoor, the FuzzBunch framework, and the EternalBlue, EternalSynergy, and EternalRomance exploit tools.However, Buckeye had already been using some of these leaked tools at least a year beforehand.The earliest known use of Equation Group tools by Buckeye is March 31, 2016, during an attack on a target in Hong Kong.Beginning in March 2016, Buckeye began using a variant of DoublePulsar (Backdoor.Doublepulsar), a backdoor that was subsequently released by the Shadow Brokers in 2017.However, while activity involving known Buckeye tools ceased in mid-2017, the Bemstour exploit tool and the DoublePulsar variant used by Buckeye continued to be used until at least September 2018 in conjunction with different malware.During this attack, the Bemstour exploit tool was delivered to victims via known Buckeye malware (Backdoor.Pirpi).One hour later, Bemstour was used against an educational institution in Belgium.Bemstour is specifically designed to deliver a variant of the DoublePulsar backdoor.DoublePulsar is then used to inject a secondary payload, which runs in memory only.A significantly improved variant of the Bemstour exploit tool was rolled out in September 2016, when it was used in an attack against an educational institution in Hong Kong.When used against 32-bit targets, Bemstour still delivered the same DoublePulsar backdoor.Bemstour was used again in June 2017 in an attack against an organization in Luxembourg.Between June and September 2017, Bemstour was also used against targets in the Philippines and Vietnam.Development of Bemstour has continued into 2019.Unlike earlier attacks when Bemstour was delivered using Buckeye's Pirpi backdoor, in this attack Bemstour was delivered to the victim by a different backdoor Trojan (Backdoor.Filensfer).The most recent sample of Bemstour seen by Symantec appears to have been compiled on March 23, 2019, eleven days after the zero-day vulnerability was patched by Microsoft.Filensfer is a family of malware that has been used in targeted attacks since at least 2013.The zero-day vulnerability found and reported by Symantec (CVE-2019-0703) occurs due to the way the Windows SMB Server handles certain requests.While Symantec has never observed the use of Filensfer alongside any known Buckeye tools, information shared privately by another vendor included evidence of Filensfer being used in conjunction with known Buckeye malware (Backdoor.Pirpi).CVE-2017-0143 was also used by two other exploit tools—EternalRomance and EternalSynergy—that were released as part of the Shadow Brokers leak in April 2017.Buckeye's exploit tool, EternalRomance, as well as EternalSynergy, can exploit the CVE-2017-0143 message type confusion vulnerability to perform memory corruption on unpatched victim In the case of the Buckeye exploit tool, the attackers exploited their own zero-day vulnerability (CVE-2019-0703).It is noteworthy that the attackers never used the FuzzBunch framework in its attacks.FuzzBunch is a framework designed to manage DoublePulsar and other Equation Group tools and was leaked by the Shadow Brokers in 2017.There are multiple possibilities as to how Buckeye obtained Equation Group tools before the Shadow Brokers leak.However, aside from the continued use of the tools, Symantec has found no other evidence suggesting Buckeye has retooled.this RTF exploits again the CVE-2017_1882 on eqnedt32.exe.And the dropper execute the iassvcs.exe to make a side loading and make the persistence.This IP is very interesting because it connects with tele.zyns.com and old infrastructures used by chinese APT or DDOS Chinese team against the ancient soviet republics.Over the past three years, Filensfer has been deployed against organizations in Luxembourg, Sweden, Italy, the UK, and the U.S.All zero-day exploits known, or suspected, to have been used by this group are for vulnerabilities in Internet Explorer and Flash.According to reports, the Philippines is the most exposed country in ASEAN to the cyberattacks known as advanced persistent threats, or APTs.Our analysis of this malware shows that it belongs to Hussarini, also known as Sarhust, a backdoor family that has been used actively in APT attacks targeting countries in the ASEAN region since 2014.OutExtra.exe is a signed legitimate application from Microsoft named finder.exe.In addition to file-based protection, customers of the DeepSight Intelligence Managed Adversary and Threat Intelligence (MATI) service have received reports on Buckeye, which detail methods of detecting and thwarting activities of this group.However, in this attack, this file is used to load the Hussarini backdoor via DLL hijacking.Today, this malware is still actively being used against the Philippines.Hussarini was first mentioned in APT campaigns targeting the Philippines and Thailand in 2014.Further analysis showed that the Iron cybercrime group used two main functions from HackingTeam's source in both IronStealer and Iron ransomware.Xagent” is the original filename Xagent.exe whereas seems to be the version of the worm.Xagent – A variant of JbossMiner Mining Worm” – a worm written in Python and compiled using PyInstaller for both Windows and Linux platforms.Its activities were traced back to 2010 in FireEye's 2013 report on operation Ke3chang – a cyberespionage campaign directed at diplomatic organizations in Europe.We have been tracking the malicious activities related to this threat actor and discovered a previously undocumented malware family with strong links to the Ke3chang group – a backdoor we named Okrum.Furthermore, from 2015 to 2019, we detected new versions of known malware families attributed to the Ke3chang group – BS2005 backdoors from operation Ke3chang and the RoyalDNS malware, reported by NCC Group in 2018.Ke3chang behind the attacks seemed to have a particular interest in Slovakia, where a big portion of the discovered malware samples was detected; Croatia, the Czech Republic and other countries were also affected.Our technical analysis of the malware used in these attacks showed close ties to BS2005 backdoors from operation Ke3chang, and to a related TidePool malware family discovered by Palo Alto Networks in 2016 that targeted Indian embassies across the globe.The story continued in late 2016, when we discovered a new, previously unknown backdoor that we named Okrum.The malicious actors behind the Okrum malware were focused on the same targets in Slovakia that were previously targeted by Ketrican 2015 backdoors.We started connecting the dots when we discovered that the Okrum backdoor was used to drop a Ketrican backdoor, freshly compiled in 2017.In 2017, the same entities that were affected by the Okrum malware and by the 2015 Ketrican backdoors again became targets of the malicious actors.This time, the attackers used new versions of the RoyalDNS malware and a Ketrican 2017 backdoor.According to ESET telemetry, Okrum was first detected in December 2016, and targeted diplomatic missions in Slovakia, Belgium, Chile, Guatemala and Brazil throughout 2017.In addition to file-based protection, customers of the DeepSight has received reports on Buckeye, which detail methods of detecting and thwarting activities of this group.In 2018, we discovered a new version of the Ketrican backdoor that featured some code improvements.According to our telemetry, Okrum was used to target diplomatic missions in Slovakia, Belgium, Chile, Guatemala, and Brazil, with the attackers showing a particular interest in Slovakia.Indeed, we have detected various external tools being abused by Okrum, such as a keylogger, tools for dumping passwords, or enumerating network sessions.The detection evasion techniques we observed in the Okrum malware include embedding the malicious payload within a legitimate PNG image, employing several anti-emulation and anti-sandbox tricks, as well as making frequent changes in implementation.The unnamed company makes products used in the military and aerospace industries, and the hackers could have been after commercial secrets or more traditional espionage, according to ClearSky, the cybersecurity firm that exposed the operation.North Korean dictator Kim Jong Un has set ambitious economic goals, and some cybersecurity analysts have predicted he will unleash the Pyongyang-affiliated hackers to meet those deadlines by targeting multinational companies’ trade secrets.According to ClearSky, the suspected Lazarus operatives looked to leverage a vulnerability in outdated WinRAR file-archiving software that hackers have been exploiting since it was disclosed last month.This new Lotus Blossom campaign delivers a malicious RTF document posing as an ASEAN Defence Minister's Meeting (ADMM) directory (decoy) that also carries an executable (payload) embedded as an OLE object, the Elise backdoor.Just months after the APT32 watering hole activity against ASEAN-related websites was observed in Fall 2017, this new activity clearly indicates the association (ASEAN) clearly remains a priority collection target in the region.Researchers implicated Lazarus Group because of digital clues including a malicious implant known as Rising Sun that has been attributed to the group.The attackers originally embedded an implant into the malicious document as a hypertext application (HTA) file, and then quickly moved to hide it in an image on a remote server and used obfuscated Visual Basic macros to launch the decoder script.Lazarus used the open-source tool Invoke-PSImage, released December 20, to embed the PowerShell script into the image file.Once the script runs, it passes the decoded script from the image file to the Windows command line in a variable $x, which uses cmd.exe to execute the obfuscated script and run it via PowerShell.The Department of Homeland Security (DHS) issued an alert about this activity on Jan. 24 2019, warning that an attacker could redirect user traffic and obtain valid encryption certificates for an organization's domain names.In the Sea Turtle campaign, Talos was able to identify two distinct groups of victims.The first group, we identify as primary victims, includes national security organizations, ministries of foreign affairs, and prominent energy organizations.The threat actors behind the Sea Turtle campaign show clear signs of being highly capable and brazen in their endeavors.In most cases, threat actors typically stop or slow down their activities once their campaigns are publicly revealed.The threat actors behind the Sea Turtle campaign were successful in compromising entities by manipulating and falsifying DNS records at various levels in the domain name space.If an attacker was able to compromise an organization's network administrator credentials, the attacker would be able to change that particular organization's DNS records at will.If the attackers were able to obtain one of these EPP keys, they would be able to modify any DNS records that were managed by that particular registrar.Captured legitimate user credentials when users interacted with these actor - controlled servers.The diagram below illustrates how we believe the actors behind the Sea Turtle campaign used DNS hijacking to achieve their end goals.As of early 2019, the only evidence of the spear-phishing threat vector came from a compromised organization's public disclosure.On January 4, Packet Clearing House, which is not an Internet exchange point but rather is an NGO which provides support to Internet exchange points and the core of the domain name system, provided confirmation of this aspect of the actors’ tactics when it publicly revealed its internal DNS had been briefly hijacked as a consequence of the compromise at its domain registrar.During a typical incident, the actor would modify the NS records for the targeted organization, pointing users to a malicious DNS server that provided actor-controlled responses to all DNS queries.The next step for the actor was to build MitM servers that impersonated legitimate services to capture user credentials.In addition to the MitM server IP addresses published in previous reports, Talos identified 16 additional servers leveraged by the actor during the observed attacks.The attackers would then use the certificate on actor-controlled servers to perform additional MitM operations to harvest additional credentials.In some cases, the victims were redirected to these actor-controlled servers displaying the stolen certificate.One notable aspect of the campaign was the actors' ability to impersonate VPN applications, such as Cisco Adaptive Security Appliance (ASA) products, to perform MitM attacks.At this time, we do not believe that the attackers found a new ASA exploit.Rather, they likely abused the trust relationship associated with the ASA's SSL certificate to harvest VPN credentials to gain remote access to the victim's network.As an example, DNS records indicate that a targeted domain resolved to an actor-controlled MitM server.In another case, the attackers were able to compromise NetNod, a non-profit, independent internet infrastructure organization based in Sweden.Using this access, the threat actors were able to manipulate the DNS records for sa1[.]dnsnode[.]net.This redirection allowed the attackers to harvest credentials of administrators who manage domains with the TLD of Saudi Arabia (.sa).In one of the more recent campaigns on March 27, 2019, the threat actors targeted the Sweden-based consulting firm Cafax.We assess with high confidence that Sea Turtle was targeted in an attempt to re-establish access to the NetNod network, which was previously compromised by this threat actor.Obtaining access to this ccTLD registrars would have allowed attackers to hijack any domain that used those ccTLDs.These actors perform DNS hijacking through the use of actor-controlled name servers.Sea Turtle have been more aggressive in their pursuit targeting DNS registries and a number of registrars, including those that manage ccTLDs.These actors use Let's Encrypts, Comodo, Sectigo, and self-signed certificates in their MitM servers to gain the initial round of credentials.These actors have been more aggressive in their pursuit targeting DNS registries and a number of registrars, including those that manage ccTLDs.Once they have access to the network, they steal the organization's legitimate SSL certificate and use it on actor-controlled servers.We believe that the Sea Turtle campaign continues to be highly successful for several reasons.Had more ccTLDs implemented security features such as registrar locks, attackers would be unable to redirect the targeted domains.The attackers stole organizations' SSL certificates associated with security appliances such as ASA to obtain VPN credentials, allowing the actors to gain access to the targeted network.The threat actors were able to maintain long term persistent access to many of these networks by utilizing compromised credentials.Cisco Talos will continue to monitor Sea Turtle and work with our partners to understand the threat as it continues to evolve to ensure that our customers remain protected and the public is informed.If the user enables macro to open the xlsm file, it will then drop the legitimate script engine AutoHotkey along with a malicious script file.Create a link file in the startup folder for AutoHotkeyU32.exe, allowing the attack to persist even after a system restart.More importantly, one of these files also enables the download of TeamViewer, a remote access tool that gives threat actors remote control over the system.Such attacks highlight the need for caution before downloading files from unknown sources and enabling macro for files from unknown sources.The agency's hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA's hacking capacities.By the end of 2016, the CIA's hacking division, which formally falls under the agency's Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other weaponized malware.Such is the scale of the CIA's undertaking that by 2016, its hackers had utilized more code than that used to run Facebook.Wikileaks has carefully reviewed the Year Zero disclosure and published substantive CIA documentation while avoiding the distribution of 'armed' cyberweapons until a consensus emerges on the technical and political nature of the CIA's program and how such 'weapons' should analyzed, disarmed and published.These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States.The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell's 1984, but Weeping Angel, developed by the CIA's Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.After infestation, Weeping Angel places the target TV in a 'Fake-Off' mode, so that the owner falsely believes the TV is off when it is on.As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks.The CIA's Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones.Despite iPhone's minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA's Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads.The attack against Samsung smart TVs was developed in cooperation with the United Kingdom's MI5/BTSS.CIA's arsenal includes numerous local and remote zero days developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop.These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the smart phones that they run on and collecting audio and message traffic before encryption is applied.The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware.CIA's malware includes multiple local and remote weaponized zero days, air gap jumping viruses such as Hammer Drill which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas Brutal Kangaroo and to keep its malware infestations going.Many of these infection efforts are pulled together by the CIA's Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as Assassin and Medusa.The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB's HIVE and the related Cutthroat and Swindle tools, which are described in the examples section below.By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area — including France, Italy and Switzerland.A number of the CIA's electronic attack methods are designed for physical proximity.The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer.The attacker then infects and exfiltrates data to removable media.As an example, specific CIA malware revealed in Year Zero is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts.For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use.For example, Comodo was defeated by CIA malware placing itself in the Window's Recycle Bin.CIA hackers discussed what the NSA's Equation Group hackers did wrong and how the CIA's malware makers could avoid similar exposure.The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.This information is used by the CIA's 'JQJIMPROVISE' software (see below) to configure a set of CIA malware suited to the specific needs of an operation.Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from 'Fine Dining' questionairies.HIVE is a multi-platform CIA malware suite and its associated control software.A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks.In April 2013, Kaspersky Lab reported that a popular game was altered to include a backdoor in 2011.Yet again, new supply-chain attacks recently caught the attention of ESET Researchers.Given that these attacks were mostly targeted against Asia and the gaming industry, it shouldn’t be surprising they are the work of the group described in Kaspersky’s Winnti – More than just a game”.The OSB functions as the interface between CIA operational staff and the relevant technical support staff.A sustained cyberespionage campaign targeting at least three companies in the United States and Europe was uncovered by Recorded Future and Rapid7 between November 2017 and September 2018.The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant.The attackers then enumerated access and conducted privilege escalation on the victim networks, utilizing DLL sideloading techniques documented in a US-CERT alert on APT10 to deliver malware.On the two other victim networks, the attackers deployed a unique version of the UPPERCUT (ANEL) backdoor, known to have only been used by APT10.APT10 actors then compressed proprietary data from Visma using WinRAR (deployed by the attackers) and exfiltrated to a Dropbox account using the cURL for Windows command-line tool.UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.we assess with high confidence that these incidents were conducted by APT10 also known as Stone Panda, menuPass, CVNX in an effort to gain access to networks and steal valuable intellectual property or gain commercial advantage.On top of the breadth, volume, and targets of attacks that APT10 has conducted since at least 2016, we now know that these operations are being run by the Chinese intelligence agency, the Ministry of State Security (MSS).Utilizing actors working for shell companies such as Huaying Haitai Science and Technology Development Co Ltd, the MSS has conducted an unprecedented campaign, dubbed Operation Cloud Hopper, ” against managed IT service providers (MSPs) designed to steal intellectual property and enable secondary attacks against their clients.We assess that APT10 likely compromised Visma with the primary goal of enabling secondary intrusions onto their client networks, and not of stealing Visma intellectual property.In this same time frame, APT10 also targeted a U.S. law firm and an international apparel company, likely to gather information for commercial advantage.The backdoor was deployed using the Notepad++ updater and sideloading malicious DLL, as noted in APT10’s targeting of Japanese corporations in July 2018.That attack was attributed to perpetrators Kaspersky called the Winnti Group.APT10 is a threat actor that has been active since at least 2009.APT10 has historically targeted healthcare, defense, aerospace, government, heavy industry and mining, and MSPs and IT services, as well as other sectors, for probable intellectual property theft.We believe APT10 is the most significant Chinese state-sponsored cyber threat to global corporations known to date.In the blog, Intrusion Truth identified APT10 as having utilized several Tianjin-based companies, including Huaying Haitai Science and Technology Development Co Ltd and Laoying Baichen Instruments Equipment Co Ltd.Based on the technical data uncovered, and in light of recent disclosures by the U.S. Department of Justice on the ongoing activities of Chinese state-sponsored threat actors.Our research from 2017 concluded that Guangdong ITSEC (and therefore the MSS) directed the activities of a company named Boyusec, which was identified as a shell company for APT3.Access to the networks of these third-party service providers grants the MSS the ability to potentially access the networks of hundreds, if not thousands, of corporations around the world.The December APT10 indictment noted that the group’s malicious activities breached at least 45 companies and managed service providers in 12 countries, including Brazil, Canada, Finland, France, Germany, India, Japan, Sweden, Switzerland, the United Arab Emirates, the United Kingdom, and the United States.In all three incidents, APT10 gained access to networks through deployments of Citrix and LogMeIn remote-access software using stolen valid user credentials.In all three incidents, the attackers gained access to networks through deployments of Citrix and LogMeIn remote-access software using stolen valid user credentials.In all three incidents, APT10 actors used previously acquired legitimate credentials, possibly gained via a third-party supply chain compromise in order to gain initial access to the law firm and the apparel company.In early 2017, APT10 began conducting attacks against global managed IT service providers (MSPs) that granted them unprecedented access to MSPs and their customers’ networks.'Improvise' is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor).During this operation (dubbed ‘Cloud Hopper” because of the group’s use of popular western cloud-based services), APT10 utilized both new malware (Quasar RAT, Trochilus, RedLeaves, ChChes as well as some familiar old tools.Most recently, on December 20, 2018, the U.S. Department of Justice charged two hackers associated with the Chinese Ministry of State Security (MSS) with global computer intrusion campaigns targeting intellectual property.This indictment attributed the intrusions to APT10, a group that had been conducting the malicious activities for over a decade on behalf of the MSS, China’s civilian human intelligence agency.The Visma group operates across the entire Nordic region along with Benelux, Central, and Eastern Europe.Recorded Future has actively tracked APT10 for several years, focusing specifically on the group’s targeting of MSPs and global internet infrastructure providers since the Operation Cloud Hopper report in 2017.We were particularly interested in identifying whether any customers of the targeted MSPs were subsequently compromised by APT10, given their potential access through compromised MSP networks.Recorded Future’s Insikt Group has actively tracked APT10 for several years, focusing specifically on the group’s targeting of MSPs and global internet infrastructure providers since the Operation Cloud Hopper report in 2017.In September 2018, one of our clients (and a supplier as well), Visma, reached out to us for assistance in investigating an incident uncovered on their network following a breach notification by Rapid7.This was followed by an initial exploitation, network enumeration, and malicious tool deployment on various Visma endpoints within two weeks of initial access.On August 30, 2018, APT10 deployed their first modified version of Trochilus that had its C2 communications encrypted using Salsa20 and RC4 ciphers instead of the more common RC4-encrypted Trochilus variant seen in the wild.This sample, similar to other Trochilus samples, was deployed using a DLL sideloading method utilizing three files, uploaded to the same folder on the victim machine as identified in US-CERT advisory TA17-117A last revised on December 20, 2018.The configuration file then loads the Trochilus payload into memory by injecting it into a valid system process.APT10 also used WinRAR and cURL for Windows, both often renamed, to compress and upload the exfiltrated files from the Visma network to the Dropbox API.In order to exfiltrate the compromised data, APT10 employed custom malware that used Dropbox as its C2.They also used WinRAR and cURL for Windows, both often renamed, to compress and upload the exfiltrated files from the Visma network to the Dropbox API.Our research partner Rapid7 investigated the Dropbox use and found that the attackers had used the same account to store exfiltrated data from a global apparel company.They also identified broadly similar TTPs being used in the attack against a U.S law firm specializing in intellectual property law.Rapid7’s investigation revealed the law firm was first targeted in late 2017, followed by the apparel company a few months later, and finally, the Visma attack in August 2018.In one of the attacks, Rapid7 identified the attackers escaping a Citrix application in order to run the payload script on the victim desktop.Additionally, the same DLL sideloading technique observed in the Visma attack was used, and many of the tools deployed by the APT10 shared naming similarities as well 1.bat, cu.exe, ss.rar, r.exe, pd.exe.Most interestingly, Rapid7 observed the use of the Notepad++ updater gup.exe as a legitimate executable to sideload a malicious DLL (libcurl.dll) in order to deploy a variant of the UPPERCUT backdoor also known as ANEL.APT10 used this approach to deploy UPPERCUT when targeting Japanese corporations in July 2018.APT10 actors gained initial access to the Visma network around August 17, 2018.While we are confident that APT10 actors gained access to the Visma network in August using stolen employee Citrix remote desktop credentials, it is not clear how or when these credentials were initially compromised.Insikt Group analysis of network metadata to and from the VPN endpoint IPs revealed consistent connectivity to Citrix-hosted infrastructure from all eight VPN endpoint IPs starting on August 17, 2018 — the same date the first authenticated login to Visma’s network was made using stolen credentials.After almost two weeks, on August 30, 2018, APT10 attackers used their access to the network to move laterally and made their first deployment of an RC4- and Salsa20-encrypted variant of the Trochilus malware using a previously associated DLL sideloading techniquE.This means that APT10 actors had two separate access points into the Visma network.This slight delay may point to the handing over of active exploitation duties to other operator(s) in a multi-team APT10 effort within the Ministry of State Security for the attack.Other examples of malicious infrastructure registered with internet.bs include domains for APT28’s VPNFilter malware campaign and the registration of the cyber-berkut.org domain that was affiliated with the pro-Russian and potentially Russian state-linked threat actor CyberBerkut.KHRAT is a backdoor trojan purported to be used with the China-linked cyberespionage group DragonOK.In early 2018, Rapid7 identified that APT10 compromised an apparel company, based upon detections and intelligence gathered from the U.S.-based law firm breach.The attacker gained access to the victim’s internet-accessible Citrix systems and authenticated to them from networks associated with low-cost VPN providers owned by VPN Consumer Network.Rapid7 again observed APT10 dropping payloads named ccSEUPDT.exe.” The attackers used identical TTPs for executing malware and Mimikatz as observed before, by using DLL sideloading with known good binaries that had DLL search order path issues.Rapid7 reviewed malware discovered in the victim’s environment and found implants that used Dropbox as the C2.The attackers used the same method of lateral movement by mounting the remote drive on a system, copying 1.bat to it, using task scheduler to execute the batch script, and finally, deleting the batch script.APT10 used the same method of lateral movement by mounting the remote drive on a system, copying 1.bat to it, using task scheduler to execute the batch script, and finally, deleting the batch script.For exfiltration of stolen data, APT10 used WinRAR and renamed rar.exe” to r.exe” to create archives, upload them with curl.exe” (renamed to c.exe”), and again, use the cloud storage provider Dropbox.Rapid7 discovered that additional data was placed into the Dropbox accounts under control of the attacker during the compromise and was able to attribute data that was placed into it as being owned by Visma.Once on the Visma network, APT10 attackers used the Microsoft BITSAdmin CLI tool to copy malicious tools from a suspected attacker-controlled C2 hosted on 173.254.236[.]158 to the \ProgramData\temp\ directory on the infected host.Rapid7 then provided a breach notification to Visma to alert them to this compromise in September 2018.We believe APT10 is the most significant known Chinese state-sponsored cyber threat to global corporations.APT10's unprecedented campaign against MSPs, alleged to have included some of the largest MSPs in the world, in order to conduct secondary attacks against their clients, grants the Chinese state the ability to potentially access the networks of hundreds (if not thousands) of corporations around the world.This campaign brings to light further evidence supporting the assertions made by the Five Eyes nations, led by the U.S Department of Justice indictment against APT10 actors outlining the unprecedented scale of economic cyberespionage being conducted by the Chinese Ministry of State Security.This report, alongside the plethora of other reporting on APT10 operations, acutely highlights the vulnerability of organizational supply chains.We believe the groups moved to use CVE-2018-0798 instead of the other Microsoft Equation Editor Remote Code Execution (RCE) vulnerabilities because the former is more reliable as it works on all known versions of Equation Editor.The analyzed RTF files share the same object dimension (objw2180\objh300) used to track the RTF weaponizer in our previous report, however, the sample was not exploiting CVE-2017-11882 or CVE-2018-0802.After further analysis, it was discovered that the RTF files were exploiting the CVE-2018-0798 vulnerability in Microsoft’s Equation Editor (EQNEDT32).Anomali Researchers were able to identify multiple samples of malicious RTF documents ITW using the same exploit for CVE-2018-0798.The earliest use of the exploit ITW we were able to identify and confirm is a sample (e228045ef57fb8cc1226b62ada7eee9b) dating back to October 2018 (VirusTotal submission of 2018-10-29) with the RTF creation time 2018-10-23.CVE-2018-0798 is an RCE vulnerability, a stack buffer overflow that can be exploited by a threat actor to perform stack corruption.As observed previously with CVE-2017-11882 and CVE-2018-0802, the weaponizer was used exclusively by Chinese cyber espionage actors for approximately one year December 2017 through December 2018, after which cybercrime actors began to incorporate it in their malicious activity.Upon decrypting and executing, it drops two additional files wsc_proxy.exe” (legitimate Avast executable) and a malicious DLL wsc.dll” in the%TEMP% folder.However, Beginning on 25 June 2019, we started observing multiple commodity campaigns Mostly dropping AsyncRAT using the updated RTF weaponizer with the same exploit (CVE-2018-0798).Analysis of the Royal Road weaponizer has resulted in the discovery that multiple Chinese threat groups started utilizing CVE-2018-0798 in their RTF weaponizer.These findings also suggest that the threat groups have robust exploit developing capabilities because CVE-2018-0798 is not widely reported on and it is typically not incorporated into publicly available weaponizers.In addition, a current ANY.RUN playback of our observed Elise infection is also available.Upon opening of the MS Word document, our embedded file exploits CVE-2017-11882 to drop a malicious fake Norton Security Shell Extension module, 'NavShExt.dll', which is then injected into iexplore.exe to install the backdoor, begin collection, and activate command and control.Moving through the infection process, NetWitness Endpoint detects the initial exploit CVE-2017-1182 in action as the Microsoft Equation Editor, 'EQNEDT32.exe', scores high for potentially malicious activity.Most recently though, a new campaign, targeting Belarus, Turkey and Ukraine, has emerged that caught the attention of Check Point researchers.The well-crafted and socially engineered malicious documents then become the first stage of a long and mainly fileless infection chain that eventually delivers POWERSTATS, a signature PowerShell backdoor of this threat group.This powerful backdoor can receive commands from the attackers, enabling it to exfiltrate files from the system it is running on, execute additional scripts, delete files, and more.If the macros in SPK KANUN DEĞİŞİKLİĞİ GİB GÖRÜŞÜ.doc” are enabled, an embedded payload is decoded and saved in the%APPDATA% directory with the name CiscoAny.exe”.INF files have been used in the past by MuddyWater, although they were launched using Advpack.dll and not IEAdvpack.dll.In addition, by using VBA2Graph, we were able to visualize the VBA call graph in the macros of each document.Although it has focused most of its efforts on the Middle East region, the political affiliations, motives and purposes behind MuddyWater’s attacks are not very well- defined, thus earning it its name.In the past, countries such as Saudi Arabia, the UAE and Turkey have been a MuddyWater's main target, but the campaigns have also reached a much wider audience, making their way to victims in countries such as Belarus and Ukraine.MuddyWater target groups across Middle East and Central Asia, primarily using spear phishing emails with malicious attachments.Most recently MuddyWater were connected to a campaign in March that targeted organizations in Turkey, Pakistan, and Tajikistan.The group has been quite visible since the initial 2017 Malwarebytes report on their elaborate espionage attack against the Saudi Arabian government.Our analysis revealed that they drop a new backdoor, which is written in PowerShell as MuddyWater’s known POWERSTATS backdoor.We assume that RunPow stands for run PowerShell, ” and triggers the PowerShell code embedded inside the .dll file.This backdoor has some features similar to a previously discovered version of the Muddywater backdoor.Based on our analysis, we can confirm that MuddyWater target Turkish government organizations related to the finance and energy sectors.This is yet another similarity with previous MuddyWater campaigns, which were known to have targeted multiple Turkish government entities.The main delivery method of this type of backdoor is spear phishing emails or spam that uses social engineering to manipulate targets into enabling malicious documents.Trend Micro™ Deep Discovery™ provides detection, in-depth analysis, and proactive response to today’s stealthy malware, and targeted attacks in real time.MuddyWater first surfaced in 2017.First stage infections and graphical decoys have been described by multiple sources, including in our previous research MuddyWater expands operations.MuddyWater compiles various offensive Python scripts.This includes Python scripts.Usually, the Stageless Meterpreter has the Ext_server_stdapi.x64.dll”, Ext_server_extapi.x64.dll”, and Ext_server_espia.x64.dll” extensions.The January 2017 report followed up on other private reports published on the group’s BeEF-related activity in 2015 and 2016.Previous analysis of the NewsBeef APT indicates that the group focuses on Saudi Arabian (SA) and Western targets, and lacks advanced offensive technology development capabilities.However, in the summer of 2016, NewsBeef deployed a new toolset that includes macro-enabled Office documents, PowerSploit, and the Pupy backdoor.The most recent NewsBeef campaign uses this toolset in conjunction with spearphishing emails, links sent over social media/standalone private messaging applications, and watering hole attacks that leverage compromised high-profile websites some belonging to the SA government.The NewsBeef actor deployed a new toolset in a campaign that focused primarily on Saudi Arabian targets.NewsBeef continues to deploy malicious macro-enabled Office documents, poisoned legitimate Flash and Chrome installers, PowerSploit, and Pupy tools.The NewsBeef campaign is divided into two main attack vectors, spearphishing and strategic web compromise watering hole attacks.On December 25, 2016, the NewsBeef APT stood up a server to host a new set of Microsoft Office documents (maintaining malicious macros and PowerShell scripts) to support its spear-phishing operations.These compromised servers include Saudi Arabian government servers and other high-value organizational identities relevant to NewsBeef's targets.However, Kaspersky Security Network (KSN) records also contain links that victims clicked from the Outlook web client outlook.live.com” as well as attachments arriving through the Outlook desktop application.Interestingly, NewsBeef set up its server using the hosting provider Choopa, LLC, US”, the same hosting provider that the group used in attacks over the summer of 2016.NTG’s IT focus and client list likely aided NewsBeef’s delivery of malicious PowerShell-enabled Office documents and poisoned installers.In other schemes, NewsBeef sent macro-enabled Office attachments from spoofed law firm identities or other relevant service providers to targets in SA.The law firm in this scheme is based in the United Kingdom and is the sole location for targets outside of SA for this campaign.Starting in October 2016, NewsBeef compromised a set of legitimate servers (shown below), and injected JavaScript to redirect visitors to http://analytics-google.org:69/Check.aspx.For example, on a Saudi government website, the NewsBeef APT delivered packed JavaScript into the bottom of a referenced script that is included in every page served from the site the packed and unpacked JavaScript is shown below.The JavaScript forces visiting web browsers to collect and send (via a POST request) web browser, browser version, country of origin, and IP address data to the attacker controlled server jquerycodedownload.live/check.aspx”.A high volume of redirections from the compromised site continues into mid-January 2017.However, as this recent campaign indicates, the NewsBeef APT appears to have shifted its intrusion toolset away from BeEF and towards macro-enabled malicious Office documents, PowerSploit, and Pupy.Despite this shift in toolset, the group still relies on old infrastructure as evidenced by their reuse of servers hosted by the service providers Choopa and Atlantic.net.Its attack activities can be traced back to April 2012.The OceanLotus reflects a very strong confrontational ability and willing to attack by keep evolving their techniques.These APT attacks and adopting confrontation measures will exist for a long time.OceanLotus’ targets are global.OceanLotus have been actively using since at least early 2018.OceanLotus malware family samples used no earlier than 2017.We identified two methods to deliver the KerrDown downloader to targets.The link to the final payload of KerrDown was still active during the time of analysis and hence we were able to download a copy which turned out to be a variant of Cobalt Strike Beacon.While investigating KerrDown we found multiple RAR files containing a variant of the malware.Therefore, it is clear that the OceanLotus group works during weekdays and takes a break during the weekends.The group was first revealed and named by SkyEye Team in May 2015.OceanLotus's targets include China's maritime institutions, maritime construction, scientific research institutes and shipping enterprises.RedDrip Team (formerly SkyEye Team) has been to OceanLotus to keep track of high strength, groupactivity, found it in the near future to Indochinese Peninsula countries since 2019 On April 1, 2019, RedDrip discovered a Vietnamese file name Hop dong sungroup.rar in the process of daily monitoring the attack activities of the OceanLotus.COCCOC is a Vietnam was founded in 2013.In fact, according to reports of various security vendors, OceanLotus also attacked several countries, including Cambodia, Thailand, Laos, even some victims in Vietnam, like opinion leaders, media, real estate companies, foreign enterprises and banks.Unlike the 2016 variants of Ratsnif that stored all packets to a PCAP file.these threat actors targeted a number of government agencies Threat actors targeted a number of government agencies in East Asia.Attackers relied on Microsoft Equation Editor exploit CVE-2018-0798 to deliver a custom malware that Proofpoint researchers have dubbed Cotx RAT.Maudi Surveillance Operation which was previously reported in 2013.specifically CVE-2018-0798, before downloading subsequent payloads.The dropped PE file has the distinctive file name 8.t”.The last process is utilized as part of the loading process for Cotx RAT and involves the legitimate Symantec binary noted above.These conflicts have even resulted in Haftar leading an attack on the capital city in April.The attackers have targeted a large number of organizations globally since early 2017.Attackers were initially discovered while investigating a phishing attack that targeted political figures in the MENA region.Group's targets include high-profile entities such as parliaments, senates, top state offices and officials, political science scholars, military and intelligence agencies, ministries, media outlets, research centers, election commissions, Olympic organizations, large trading companies, and other unknown entities.Cisco Talos recently published a blogpost describing targeted attacks in the Middle East region which we believe may be connected.Operation Parliament appears to be another symptom of escalating tensions in the Middle East region.The attackers have taken great care to stay under the radar, imitating another attack group in the region.With deception and false flags increasingly being employed by threat actors, attribution is a hard and complicated task that requires solid evidence, especially in complex regions such as the Middle East.The malware was first seen packed with VMProtect; when unpacked the sample didn’t show any similarities with previously known malware.The malware starts communicating with the C&C server by sending basic information about the infected machine.The malware basically provides a remote CMD/PowerShell terminal for the attackers, enabling them to execute scripts/commands and receive the results via HTTP requests.What lied beneath this facade was a well-engineered campaign of phishing attacks designed to steal credentials and spy on the activity of dozens of journalists, human rights defenders, trade unions and labour rights activists, many of whom are seemingly involved in the issue of migrants’ rights in Qatar and Nepal.We refer to this campaign and the associated actor as Operation Kingphish Malik”, in one of its written forms in Arabic, translates to King”.It is worth noting that in December 2016, Amnesty International published an investigation into another social engineering campaign perpetrated by a seemingly fake human rights organization known as Voiceless Victims, which targeted international human rights and labour rights organizations campaigning on migrant workers’ rights in Qatar.It appears that the attackers may have impersonated the identity of a real young woman and stole her pictures to construct the fake profile, along with a professional biography also stolen from yet another person.In the course of this email correspondence, the attacker — Safeena” — then sent what appeared to be invitations to access several documents on Google Drive.The attackers were meticulous in making their phishing page as credible as possible.Among the targets of this campaign is the International Trade Union Confederation (ITUC).Both in the attacks against ITUC and in other occasions, Operation Kingphish approached selected targets over social media, prominently Facebook, and engaged in chat conversations with them on and off, sometimes over a period of several months.This time the document purported to be about the involvement of the Emir of Qatar in funding ISIS, which was seemingly copied from a website critical of Qatar.While there is a clear underlying Qatar migrant workers theme in Operation Sheep, it is also hypothetically possible that these attacks could have been perpetrated by a malicious actor affiliated to a different government with an interest in damaging the reputation of the State of Qatar.Dubbed ‘Operation Sheep’, this massive data stealing campaign is the first known campaign seen in the wild to exploit the Man-in-the-Disk vulnerability revealed by Check Point Research earlier last year.The SDK, named SWAnalytics is integrated into seemingly innocent Android applications published on major 3rd party Chinese app stores such as Tencent MyApp, Wandoujia, Huawei App Store, and Xiaomi App Store.After app installation, whenever SWAnalytics senses victims opening up infected applications or rebooting their phones, it silently uploads their entire contacts list to Hangzhou Shun Wang Technologies controlled servers.In theory, Shun Wang Technologies could have collected a third of China’s population names and contact numbers if not more.With no clear declaration of usage from Shun Wang, nor proper regulatory supervision, such data could circulate into underground markets for further exploit, ranging from rogue marketing, targeted telephone scams or even friend referral program abuse during November’s Single’s Day and December’s Asian online shopping fest.This paper will cover the discovery of this campaign, dubbed ‘Operation Sheep’, and an analysis of SWAnalytics.In mid-September, an app named ‘Network Speed Master’ stood out on our radar with its rather unusual behavior patterns.This module monitors a wide range of device activities including application installation / remove / update, phone restart and battery charge.It turns out that contacts data isn’t the only unusual data SWAnalytics is interested in.With default settings, SWAnalytics will scan through an Android device’s external storage, looking for directory tencent/MobileQQ/WebViewCheck”.From our first malicious sample encounter back in mid-September until now, we have observed 12 infected applications, the majority of which are in the system utility category.By listing sub-folders, SWAnalytics is able to infer QQ accounts which have never been used on the device.Operation Sheep is the first campaign we have observed in the wild that abuses similar concept since our MitD publication.To make this data harvesting operation flexible, SWAnalytics equips the ability to receive and process configuration files from a remote Command-and-Control.Whenever users reboot their device or open up Network Speed Master, SWAnalytics will fetch the latest configuration file from http[:]//mbl[.]shunwang[.]com/cfg/config[.]json”.In order to understand SWAnalytics’ impact, we turned to public download volume data available on Chandashi, one of the app store optimization vendors specialized in Chinese mobile application markets.Data points span from September 2018 to January 2019 where we observed over 17 million downloads in just five months.In China alone, we have seen underground market sheep shavers” ported SMS rogue marketing strategy to spread Alipay Red Packet referral URL links.In Operation Sheep’s case, Shun Wang likely harvests end user contact lists without application developer acknowledgement.According to Cheetah Mobile’s follow-up investigation, fraudulent behaviors came from two 3rd party SDKs Batmobi, Duapps integrated inside Cheetah SDK.It is likely a new campaign or actor started using Panda Banker since in addition to the previously unseen Japanese targeting, Arbor has not seen any indicator of compromise (IOC) overlaps with previous Panda Banker campaigns.Webinjects targeting Japan, a country we haven’t seen targeted by Panda Banker before.Japan is no stranger to banking malware.Based on recent reports, the country has been plagued by attacks using the Ursnif and Urlzone banking malware.This post was our first analysis of the first Panda Banker campaign that we’ve seen to target financial institutions in Japan.Operation Pawn Storm is an active economic and political cyber-espionage operation that targets a wide range of entities, like the military, governments, defense industries, and the media.We believe the iOS malware gets installed on already compromised systems, and it is very similar to next stage SEDNIT malware we have found for Microsoft Windows’ systems.We found two malicious iOS applications in Operation Pawn Storm.One is called XAgent detected as IOS_XAGENT.A and the other one uses the name of a legitimate iOS game, MadCap detected as IOS_ XAGENT.B.The obvious goal of the SEDNIT-related spyware is to steal personal data, record audio, make screenshots, and send them to a remote command-and-control (C&C) server.Madcap” is similar to the XAgent malware, but the former is focused on recording audio.To learn more about this campaign, you may refer to our report, Operation Pawn Storm Using Decoys to Evade Detection.Additionally, we discovered a new DNS hijacking technique that we assess with moderate confidence is connected to the actors behind Sea Turtle.Talos now has moderate confidence that the threat actors behind Sea Turtle have been using another DNS hijacking technique.This technique was also observed against a government organizations in the Middle East and North African region.Cisco telemetry confirmed that the actors behind Sea Turtle maintained access to the ICS-Forth network from an operational command and control (C2) node.Our telemetry indicates that the actors maintained access in the ICS-Forth network through at least April 24, five days after the statement was publicly released.This full-blown spying framework consists of two packages named ‘Tokyo’ and ‘Yokohama’.Just to highlight its capabilities, TajMahal is able to steal data from a CD burnt by a victim as well as from the printer queue.The first confirmed date when TajMahal samples were seen on a victim’s machine is August 2014.More details about TajMahal are available to customers of the Kaspersky Intelligence Reporting service (contact [email protected]).The dropper first appeared in mid-July, suggesting that this APT activity is potentially ongoing, with Turla actively targeting G20 participants and/or those with interest in the G20, including member nations, journalists, and policymakers.Turla is a well-documented, long operating APT group that is widely believed to be a Russian state-sponsored organization.Turla is perhaps most notoriously suspected as responsible for the breach of the United States Central Command in 2008.More recently Turla was accused of breaching RUAG, a Swiss technology company, in a public report published by GovCERT.ch.The delivery of KopiLuwak in this instance is currently unknown as the MSIL dropper has only been observed by Proofpoint researchers on a public malware repository.Assuming this variant of KopiLuwak has been observed in the wild, there are a number of ways it may have been delivered including some of Turla’s previous attack methods such as spear phishing or via a watering hole.This could include diplomats, experts in the areas of interest related to the Digital Economy Task Force, or possibly even journalists.Turla's goal could include diplomats, experts in the areas of interest related to the Digital Economy Task Force, or possibly even journalists.The earliest step in any possible attack(s) involving this variant of KopiLuwak of which Proofpoint researchers are currently aware begin with the MSIL dropper.The basic chain of events upon execution of the MSIL dropper include dropping and executing both a PDF decoy and a Javascript (JS) dropper.As explained in further detail below, the JS dropper ultimately installs a JS decryptor onto an infected machine that will then finally decrypt and execute the actual KopiLuwak backdoor in memory only.As Proofpoint has not yet observed this attack in the wild it is likely that there is an additional component that leads to the execution of the MSIL payload.The newer variant of KopiLuwak is now capable of exfiltrating files to the C&C as well as downloading files and saving them to the infected machine.Despite the added capabilities, we still agree with Kaspersky that this backdoor is likely used as an initial reconnaissance tool and would probably be used as a staging point to deploy one of Turla’s more fully featured implants.Turla is a complex cyberattack platform focused predominantly on diplomatic and government-related targets, particularly in the Middle East, Central and Far East Asia, Europe, North and South America and former Soviet bloc nations.We didn’t choose to name it after a vegetable; the .NET malware developers named it Topinambour themselves.The role of the .NET module is to deliver the known KopiLuwak JavaScript Trojan.Moreover, Turla now also has a heavily obfuscated PowerShell Trojan that is similar to KopiLuwak.RocketMan!” (probably a reference to Donald Trump’s nickname for Kim Jong Un) and MiamiBeach” serve as the first beacon messages from the victim to the control server.These could be tools to circumvent internet censorship, such as Softether VPN 4.12” and psiphon3”, or Microsoft Office activators”.These campaign-related VPSs are located in South Africa.The tool does all that a typical Trojan needs to accomplish: upload, download and execute files, fingerprint target systems.The PowerShell version of the Trojan also has the ability to get screenshots.The Trojan is quite similar to the .NET RocketMan Trojan and can handle the same commands; additionally, it includes the #screen” command to take a screenshot.The usage of KopiLuwak, a well-known and exclusive artefact previously used by the Turla group, makes us attribute this campaign to this actor with high confidence.Winnti's mode of operation: to collect information on the organizational charts of companies, on cooperating departments, on the IT systems of individual business units, and on trade secrets, obviously.Hackers usually take precautions, which experts refer to as Opsec.The Winnti group’s Opsec was dismal to say the least.This mode of operation is typical of many hacker groups—and especially of Winnti.They are a very, very persistent group, ” says Costin Raiu, who has been watching Winnti since 2011.Raiu and his team have followed the digital tracks left behind by some of the Winnti hackers.One government official puts it very matter-of-factly: Winnti is very specific to Germany.By 2014, the Winnti malware code was no longer limited to game manufacturers.Winnti is targeting high-tech companies as well as chemical and pharmaceutical companies.Winnti is attacking companies in Japan, France, the U.S. and Germany.The Winnti hackers broke into Henkel’s network in 2014.Henkel confirms the Winnti incident and issues the following statement: The cyberattack was discovered in the summer of 2014 and Henkel promptly took all necessary precautions.Far from attacking Henkel and the other companies arbitrarily, Winnti takes a highly strategic approach.The hackers behind Winnti have also set their sights on Japan’s biggest chemical company, Shin-Etsu Chemical.In the case of another Japanese company, Sumitomo Electric, Winnti apparently penetrated their networks during the summer of 2016.Winnti hackers also penetrated the BASF and Siemens networks.Thanks to this tool, we found out back in March 2019 that the Bayer pharmaceutical group had been hacked by Winnti.At Gameforge, the Winnti hackers had already been removed from the networks when a staff member noticed a Windows start screen with Chinese characters.To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner.From the time of file creation, the attacker started working at least as early as July 2018.The link to feeds.rapidfeeds.com left in its XML configuration file was also mentioned by Kaspersky’s report in the reference section, which confirms that the APT-C-09 group keeps updating its C2 configuration channel and the recent one reserves some past features.For example, Donot and Bitter disguised as Kashmiri Voice to attack Pakistan, Transparent Tribe attacked India with decoy document regarding terrorist attacks in Kashmir.Considering APT-C-09, Bitter and Donot have carried out targeted attacks against China, we must take actions in advance and keep a close eye on their recent activities.APT41 espionage operations against the healthcare, high-tech, and telecommunications sectors include establishing and maintaining strategic access, and through mid-2015, the theft of intellectual property.FireEye Threat Intelligence assesses with high confidence that APT41 carries out an array of financially motivated intrusions, particularly against the video game industry, including stealing source code and digital certificates, virtual currency manipulation, and attempting to deploy ransomware.APT41 has executed multiple software supply chain compromises, gaining access to software companies to inject malicious code into legitimate files before distributing updates.APT41 is unique among tracked China-based actors in that it leverages non-public malware typically reserved for espionage operations in what appears to be activity that falls outside the scope of state-sponsored missions.Based on early observed activity, consistent behavior, and APT41's unusual focus on the video game industry, we believe the group's cyber crime activities are most likely motivated by personal financial gain or hobbyist interests.APT41 campaigns include most of the incidents previously attributed in FireEye Threat Intelligence reporting to GREF Team and a number of additional clusters that were previously unnamed.Activity traces back to 2012 when individual members of APT41 conducted primarily financially motivated operations focused on the video game industry before expanding into likely statesponsored activity.Learning to access video game production environments enabled APT41 to develop the tactics, techniques, and procedures (TTPs) that were later leveraged against software companies to inject malicious code into software updates.APT41 has targeted organizations in 14 countries (and Hong Kong) over seven years, including: France, India, Italy, Japan, Myanmar, the Netherlands, Singapore, South Korea, South Africa, Switzerland, Thailand, Turkey, the United Kingdom, and the United States (Figure 1).APT41 espionage operations against entities in these countries follow targeting of verticals consistent with Chinese national policy priorities.We believe that like other Chinese espionage operators, APT41 has moved toward strategic intelligence collection and establishing access, but away from direct intellectual property theft.In 2014, APT41 was observed carrying out espionage campaigns concurrently with financially motivated intrusions, demonstrating that they could balance different objectives simultaneously.Since 2017, APT41's activities have included a series of supply chain compromises.The group also targeted companies involved in producing motherboards, processors, and server solutions for enterprises.Since 2013, APT41 has targeted organizations involved in the research, development, and sale of computer components used for machine-learning, autonomous vehicles, medical imaging, and the consumer market.In a 2014 compromise, APT41 targeted a European conglomerate and specifically focused on systems physically located in China.In spring 2015, APT41 targeted information related to two entities undergoing a merger announced the previous year.Since 2017, APT41 has consistently targeted telecommunications companies, possibly a crucial first step to establish a foothold in targeting a particular region.Targeted telecom companies spanned several countries, and recently identified intrusions were concentrated in countries where we had not identified any prior APT41 activity.In July and August 2016, APT41 sent spear-phishing emails to Hong Kong media organizations known for pro-democracy editorial content.This was the first instance we have observed of APT41 targeting pro-democracy groups in Hong Kong.APT41 frequently leverages timely news stories as the lure content in their spear-phishing emails, although social engineering content does not always correlate with targeted users or organizations.In 2015, APT41 targeted a Japanese media organization with a lure document (Figure 3) titled 中東呼吸器症候 群(MERS)の予防, ” which translates to Prevention of Middle East Respiratory Syndrome (MERS).APT41 activity aimed at medical device companies and pharmaceuticals is demonstrative of the group's capacity to collect sensitive and highly valuable intellectual property (IP), although we have not observed evidence of IP theft since late 2015.Unlike other observed Chinese espionage operators, APT41 conducts explicit financially motivated activity, which has included the use of tools that are otherwise exclusively used in campaigns supporting state interests.Although APT41 initially targeted the parent company, 30 percent of the victimized hosts were related to a subsidiary specialized in manufacturing medical devices.In 2018, we observed APT41 target a third healthcare company, although their goals during this compromise were unclear.In June 2018, APT41 sent spear-phishing emails using an invitation lure to join a decentralized gaming platform linked to a cryptocurrency service (Figure 5) that had positioned itself as a medium of exchange for online games and gambling sites.This provides another connection between the targeting of the cryptocurrency organizations and video game targeting.In October 2018, the group compiled an instance of XMRig, a Monero cryptocurrency mining tool, demonstrating a continued interest in cryptocurrency.APT41 campaigns focused on the video game sector have largely affected studios and distributors in East and Southeast Asia, although global companies based in the United States have also been targeted.APT41 continuously returns to targeting the video game sector and seems to have matured its campaigns through lessons learned in operations against the industry.We believe these operations include broadly malicious activity that can enable further operations, such as targeting game source code and compromising digital certificates, while other activities are explicitly financially motivated, such as abusing in-game currency mechanics.In October 2012, APT41 used captured credentials to compromise a jump server and access a production environment where they deployed a Linux version of PHOTO.Since at least 2012, APT41 has repeatedly gained access to game development environments within affected companies, including online multiplayer networks, as well as targeting of production database administrators.APT41 has been observed inserting malicious code into legitimate video game files to distribute malware.In 2018, the group inserted CRACKSHOT malware into game files that were signed with legitimate codesigning certificates, most likely indicating access to the production environment, which facilitated a supply chain compromise.We have also observed APT41 limitedly deploy rootkits on Linux systems and Master Boot Record (MBR) bootkits, such as ROCKBOOT, on Windows systems to hide their malware and maintain persistence on victim systems.Selective deployment of ROCKBOOT suggests that APT41 reserves more advanced TTPs and malware only for high-value targets.APT41 has blatantly engaged in financially motivated activity targeting the video game industry, including manipulating virtual currencies.In a highly unusual case, APT41 attempted to extort a game company by deploying the Encryptor RaaS ransomware.APT41 is well-known for leveraging compromised digital certificates from video game studios to sign malware.We suggest that APT41 sought to target in-game currency but found they could not monetize the specific targeted game, so the group resorted to ransomware to attempt to salvage their efforts and profit from the compromise.APT41 has also used credentials compromised in previous operations.In 2014, APT41 compromised an online billing/payment service using VPN access between a third-party service provider and the targeted payment service.Although we do not have first-hand evidence of APT41's compromise of TeamViewer, we have observed APT41 use compromised TeamViewer credentials as an entry point at multiple organizations.Public reports of supply chain compromises linked to APT41 date back to at least 2014, and technical evidence associated with these incidents was used to determine a relationship, if any, with APT41.As demonstrated in operations targeting the video game industry, APT41 leverages a variety of TTPs to access production environments where they can inject malicious code into legitimate files.In March 2017, suspected Chinese espionage operators targeted CCleaner, a utility that assists in the removal of unwanted files from a computer.In July 2017, APT41 injected malicious code into a software update package maintained by Netsarang and signed it with a legitimate Netsarang certificate in an operation referred to as ShadowPad by Kaspersky.Both APT41 and the actors in the CCleaner incident used TeamViewer during initial compromise.Supply chain compromises are most likely an extension of APT41's tactics used in gaining access to gaming development environments and to other gaming organizations via third-party service providers.Beginning in July 2018, APT41 appeared to have directly targeted several East and Southeast Asia-based video game developers and distributors to inject legitimate executables with the CRACKSHOT backdoor.The lure used to target the cryptocurrency exchange (displayed in Figure 5 and translated in Figure 6) referenced an online gaming platform, tying the cryptocurrency targeting to APT41's focus on video game-related targeting.FireEye malware analysis identified source code overlaps between malware used by APT41 in May 2016 targeting of a U.S.-based game development studio and the malware observed in supply chain compromises in 2017 and 2018.In May 2016, APT41 deployed a POISONPLUG sample at a U.S.-based game development studio.Alternatively, it is also possible that APT41 injected malicious code into the package prior to compilation, circumventing the need to steal the code-signing certificate and compile it on their own.Either APT41 is operating outside of state control but still working with other Chinese APT malware actors, tools, and infrastructure on a parttime or contractual basis, or APT41 is a full-time.APT41 uses many of the same tools and compromised digital certificates that have been leveraged by other Chinese espionage operators.Initial reports about HIGHNOON and its variants reported publicly as Winnti dating back to at least 2013 indicated the tool was exclusive to a single group, contributing to significant conflation across multiple distinct espionage operations.APT41 has used several malware families that have also been used by other Chinese espionage operators, including variants of HIGHNOON, HOMEUNIX, PHOTO, SOGU, and ZXSHELL, among others.HIGHNOON, one of the main code families observed being used by APT41, was also used by APT17 in 2015 to target semiconductor and chemical manufacturers.HOMEUNIX, another popular backdoor used by APT41, has been used by at least 14 separate Chinese espionage groups, including APT1, APT10, APT17, APT18, and APT20.APT41 has used CROSSWALK.BIN, a kernel driver, to circumvent firewalls and covertly send data.Another Chinese espionage group used a similar tool, CLASSFON, to covertly proxy network communications in 2011.At least two of these malware families, HIGHNOON.CLI and GEARSHIFT, have been used by APT17 and another suspected Chinese espionage group.APT41 regularly leverages code-signing certificates to sign malware when targeting both gaming and nongaming organizations.In July 2017, APT41 initiated a TeamViewer session and transferred files that were later deleted.In these instances, APT41 leveraged TeamViewer to transfer malware into the compromised environment, although we do not have direct evidence of APT41 compromising TeamViewer.In May 2018, APT41 used TeamViewer for initial entry in the compromise of a healthcare company.Notably, APT41 was observed using proof-of-concept exploit code for CVE-2019-3396 within 23 days after the Confluence.APT41 has targeted payment services specializing in handling in-game transactions and real money transfer (RMT) purchases.We observed APT41 using a compromised account to create a scheduled task on a system, write a binary component of HIGHNOON containing the payload and C&C information to disk, and then modify the legitimate Windows WMI Performance Adaptor (wmiApSrv) to execute the HIGHNOON payload.The group will also use a compromised account to create scheduled tasks on systems or modify legitimate Windows services to install the HIGHNOON and SOGU backdoors.APT41 uses multiple methods to perform lateral movement in an environment, including RDP sessions, using stolen credentials, adding accounts to User and Admin groups, and password brute-forcing utilities.To maintain presence, APT41 relies on backdoors, a Sticky Keys vulnerability, scheduled tasks, bootkits, rootkits, registry modifications, and creating or modifying startup files.APT41 leveraged ROCKBOOT as a persistence mechanism for PHOTO and TERA backdoors.APT41 has also been observed modifying firewall rules to enable file and printer sharing to allow for inbound Server Message Block (SMB) traffic.In some instances, APT41 leveraged POISONPLUG as a first-stage backdoor to deploy the HIGHNOON backdoor in the targeted environment.The group also deploys the SOGU and CROSSWALK malware families as means to maintain presence.APT41 sent spear-phishing emails to multiple HR employees three days after the compromise had been remediated and systems were brought back online.APT41 also deploys the SOGU and CROSSWALK malware families as means to maintain presence.Within hours of a user opening the malicious attachment dropping a HOMEUNIX backdoor, APT41 regained a foothold within the environment by installing PHOTO on the organization's servers across multiple geographic regions.Before attempting to deploy the publicly available Ransomware-as-a-Service (RaaS) Encryptor RaaS through group policy, APT41 blocked victim systems from retrieving anti-virus updates by accessing the DNS management console and implementing a forward lookup on the domain used for anti-virus updates to the park IP address 1.1.1.1.APT41 has been observed creating a RAR archive of targeted files for exfiltration.APT41 is unique among tracked China-based actors in that it leverages non-public malware typically reserved for espionage campaigns in what appears to be activity for personal gain.During multiple engagements, APT41 attempted to remove evidence of some of its activity by deleting Bash histories, clearing Windows security and system events, and modifying DNS management to avoid anti-virus detections.Explicit financially-motivated targeting is unusual among Chinese statesponsored threat groups, and evidence suggests APT41 has conducted simultaneous cyber crime and cyber espionage operations from 2014 onward.APT41 operations against higher education, travel services, and news/media firms provide some indication that the group also tracks individuals and conducts surveillance.For example, the group has repeatedly targeted call record information at telecom companies.APT41 has established and maintained strategic access to organizations in the healthcare, high-tech, and telecommunications sectors.The group’s financially motivated activity has primarily focused on the video game industry, where APT41 has manipulated virtual currencies and even attempted to deploy ransomware.In another instance, APT41 targeted a hotel’s reservation systems ahead of Chinese officials staying there, suggesting the group was tasked to reconnoiter the facility for security reasons.These supply chain compromise tactics have also been characteristic of APT41’s best known and most recent espionage campaigns.Interestingly, despite the significant effort required to execute supply chain compromises and the large number of affected organizations, APT41 limits the deployment of follow-on malware to specific victim systems by matching against individual system identifiers.Mapping the group’s activities since 2012 (Figure 2) also provides some indication that APT41 primarily conducts financially motivated operations outside of their normal day jobs.The latter is especially notable because APT41 has repeatedly returned to targeting the video game industry and we believe these activities were formative in the group’s later espionage operations.APT41 leverages an arsenal of over 46 different malware families and tools to accomplish their missions, including publicly available utilities, malware shared with other Chinese espionage operations, and tools unique to the group.Once in a victim organization, APT41 can leverage more sophisticated TTPs and deploy additional malware.APT41 often relies on spear-phishing emails with attachments such as compiled HTML (.chm) files to initially compromise their victims.APT41 has also deployed rootkits and Master Boot Record (MBR) bootkits on a limited basis to hide their malware and maintain persistence on select victim systems.The limited use of these tools by APT41 suggests the group reserves more advanced TTPs and malware only for high-value targets.Like other Chinese espionage operators, APT41 appears to have moved toward strategic intelligence collection and establishing access and away from direct intellectual property theft since 2015.This shift, however, has not affected the group's consistent interest in targeting the video game industry for financially motivated reasons.BalkanRAT enables the attacker to remotely control the compromised computer via a graphical interface, i.e, manually; BalkanDoor enables them to remotely control the compromised computer via a command line, i.e, possibly en masse.With the contents of the emails, included links and decoy PDFs all involving taxes, the attackers are apparently targeting the financial departments of organizations in the Balkans region.Some parts of the campaign were briefly described by a Serbian security provider in 2016 and the Croatian CERT in 2017.The campaign has been active at least from January 2016 to the time of writing the most recent detections in our telemetry are from July 2019.Our findings show that the mentioned attacks have been orchestrated and we consider them a single long-term campaign that spans Croatia, Serbia, Montenegro, and Bosnia and Herzegovina.We’ve discovered a new version of BalkanDoor with a new method for execution/installation: an exploit of the WinRAR ACE vulnerability CVE-2018-20250.Both BalkanRAT and BalkanDoor spread in Croatia, Serbia, Montenegro, and Bosnia and Herzegovina.According to our telemetry, the campaign spreading these tools has been live since 2016, with the most recent detections as late as in July 2019.In some of the latest samples of BalkanDoor detected in 2019, the malware is distributed as an ACE archive, disguised as a RAR archive (i.e, not an executable file), specially crafted to exploit the WinRAR ACE vulnerability CVE-2018-20250.Via the BalkanDoor backdoor, the attacker sends a backdoor command to unlock the screen… and using BalkanRAT, they can do whatever they want on the computer.The BalkanDoor backdoor does not implement any exfiltration channel.APT41 leveraged ADORE.XSEC, a Linux backdoor launched by the Adore-NG rootkit, throughout an organization's Linux environment.The backdoor can connect to any of the C&Cs from a hardcoded list – a measure to increase resilience.The main part of the BalkanRAT malware is a copy of the Remote Utilities software for remote access.Interestingly, some of the APT41's POISONPLUG malware samples leverage the Steam Community website associated with Valve, a video game developer and publisher.The campaign targeting accountants in the Balkans shows some similarities with a campaign aimed at Ukrainian notaries reported in 2016.Based on the Let’s Encrypt certificate issuance date, we believe this campaign to be active from May 2019.One of the domains uncovered during the investigation was identified by the Chinese security vendor CERT 360 as being part of the BITTER APT campaign in May 2019.Further analysis of the BITTER APT’s infrastructure uncovered a broader phishing campaign targeting other government sites and state-owned enterprises in China.Further investigation revealed approximately 40 additional sites, all of which appear to be targeting the government of China and other organisations in China.We expect to see BITTER APT continuing to target the government of China by employing spoofed login pages designed to steal user credentials and obtain access to privileged account information.This domain and IP address has been previously associated with the BITTER APT and targeting government agencies in China with phishing attacks, based on reporting from 360-CERT.At the time of analysis, the subdomains did not host a website; however, based on BITTER APT group’s targeting patterns, it is highly likely that they were created to host faux login phishing pages designed to steal user’s credentials.BITTER APT campaigns are primarily targeting China, Pakistan and Saudi Arabia historically.As part of its ongoing research initiatives, the Anomali Threat Research Team has discovered a new phishing attack leveraging spoof sites that seem to be designed to steal email credentials from the target victims within the government of the People’s Republic of China.360 Threat Intelligence Center has reported on related indicators being attributed to BITTER APT a South Asian country suspected Indian APT in open source reporting.China Chopper is a tool that has been used by some state-sponsored actors such as Leviathan and Threat Group-3390, but during our investigation we've seen actors with varying skill levels.China Chopper is a tool that allows attackers to remotely control the target system that needs to be running a web server application before it can be targeted by the tool.Cisco Talos discovered significant China Chopper activity over a two-year period beginning in June 2017, which shows that even nine years after its creation, attackers are using China Chopper without significant modifications.Here, we investigate a campaign targeting an Asian government organization.We observed another campaign targeting an organisation located in Lebanon.China Chopper contains a remote shell (Virtual Terminal) function that has a first suggested command of netstat an|find ESTABLISHED.They download and install an archive containing executables and trivially modified source code of the password-stealing tool Mimikatz Lite as GetPassword.exe.The tool investigates the Local Security Authority Subsystem memory space in order to find, decrypt and display retrieved passwords.The actor attempts to exploit CVE-2018–8440 — an elevation of privilege vulnerability in Windows when it improperly handles calls to Advanced Local Procedure Call — to elevate the privileges using a modified proof-of-concept exploit.The attacker obtains the required privileges and launches a few other tools to modify the access control lists (ACLs) of all websites running on the affected server.The Windows branch of the Cloud Atlas intrusion set still uses spear-phishing emails to target high profile victims.From the beginning of 2019 until July, we have been able to identify different spear-phishing campaigns related to this threat actor mostly focused on Russia, Central Asia and regions of Ukraine with ongoing military conflicts.We described one of the techniques used by Cloud Atlas in 2017 and our colleagues at Palo Alto Networks also wrote about it in November 2018.The China Chopper actor activity starts with the download and execution of two exploit files which attempt to exploit the Windows vulnerabilities CVE-2015-0062, CVE-2015-1701 and CVE-2016-0099 to allow the attacker to modify other objects on the server.Previously, Cloud Atlas dropped its validator” implant named PowerShower” directly, after exploiting the Microsoft Equation vulnerability CVE-2017-11882 mixed with CVE-2018-0802.This malware has been used since October 2018 by Cloud Atlas as a validator and now as a second stage.Cloud Atlas remains very prolific in Eastern Europe and Central Asia.During its recent campaigns, Cloud Atlas used a new polymorphic” infection chain relying no more on PowerShower directly after infection, but executing a polymorphic HTA hosted on a remote server, which is used to drop three different files on the local system.The Gamaredon Group has been actively launching spear-phishing attacks against Ukrainian government and military departments from the mid-2013s.In addition, the anonymous cybersecurity experts referenced in the article connected the malicious Gamaredon Group actors with Russian state-sponsored hackers.In one article published in the Kharkiv Observer – an independent Ukranian online publication – an unnamed source stated that even the Ukrainian Presidential Administration has been attacked by malware developed by the Gamaredon Group.Gamaredon Group primarily target Ukrainian organizations and resources using spear-phishing attacks, and they use military or similar documents as bait.Once they have found a victim, they then deploy remote manipulation system binaries (RMS) via self-extracting archives and batch command files.The following archive caught our attention for exploiting a WinRAR unacev2 module vulnerability and for having interesting content.During a recent incident response investigation, our team identified new attacks by the financially motivated attack group ITG08, also known as FIN6.More recently, ITG08 has been observed targeting e-commerce environments by injecting malicious code into online checkout pages of compromised websites — a technique known as online skimming — thereby stealing payment card data transmitted to the vendor by unsuspecting customers.This tool, a TTP observed in ITG08 attacks since 2018, is sold on the dark web by an underground malware-as-a-service (MaaS) provider.ITG08 is an organized cybercrime gang that has been active since 2015, mostly targeting pointof-sale (POS) machines in brick-and-mortar retailers and companies in the hospitality sector in the U.S. and Europe.Past campaigns by ITG08 using the More_eggs backdoor were last reported in February 2019.Attackers use it to create, expand and cement their foothold in compromised environments.Lastly, ITG08 used Comodo code-signing certificates several times during the course of the campaign.Let’s take a closer look at ITG08’s TTPs that are relevant to the campaign we investigated, starting with its spear phishing and intrusion tactics and covering information on its use of the More_eggs backdoor.Additional capabilities of the More_eggs malware include the download and execution of files and scripts and running commands using cmd.exe.X-Force IRIS determined that the More_eggs backdoor later downloaded additional files, including a signed binary shellcode loader and a signed Dynamic Link Library (DLL), as described below, to create a reverse shell and connect to a remote host.Once the ITG08 established a foothold on the network, they employed WMI and PowerShell techniques to perform network reconnaissance and move laterally within the environment.The attackers used this technique to remotely install a Metasploit reverse TCP stager on select systems, subsequently spawning a Meterpreter session and Mimikatz.In addition to the More_eggs malware, ITG08 leveraged in-memory attacks by injecting malicious code, in this case Mimikatz, into legitimate system processes.A recently rising attack tool in ITG08 campaigns has been the More_eggs JScript backdoor.Mimikatz is a post-exploitation tool that allows attackers to extract credentials from volatile memory.After a successful phishing attack in which users have opened emails and browsed to malicious links, ITG08 attackers install the More_eggs JScript backdoor on user devices alongside several other malware components.Beyond using More_eggs as a backdoor, ITG08 in this campaign also used offensive security tools and PowerShell scripts to carry out the different stages of the attack.After injecting Meterpreter into memory, the attacker had complete control of the infected device.IBM X-Force IRIS has gained insight into ITG08’s intrusion methods, ability to navigate laterally, use of custom and open-source tools, and typical persistence mechanisms.After the phishing email resulted in a successful infiltration, ITG08 used the More_eggs backdoor to gain a foothold and infect additional devices.In addition, configuring PowerShell script logging and identifying any obfuscation will assist in mitigating ITG08’s use of PowerShell to conduct malicious activity.The LYCEUM threat group targets organizations in sectors of strategic national importance, including oil and gas and possibly telecommunications.CTU research indicates that LYCEUM may have been active as early as April 2018.In May 2019, the threat group launched a campaign against oil and gas organizations in the Middle East.This campaign followed a sharp uptick in development and testing of their toolkit against a public multivendor malware scanning service in February 2019.Stylistically, the observed tradecraft resembles activity from groups such as COBALT GYPSY (which is related to OilRig, Crambus, and APT34 and COBALT TRINITY also known as Elfin and APT33.When CTU researchers first published information about LYCEUM to Secureworks Threat Intelligence clients, no public documentation on the group existed.Using compromised accounts, LYCEUM send spearphishing emails with malicious Excel attachments to deliver the DanBot malware, which subsequently deploys post-intrusion tools.The developer consistently used Accept-Enconding” (note the extra ‘n’) in all DanBot samples analyzed by CTU researchers.Get-LAPSP.ps1 is a PowerShell script that gathers account information from Active Directory via LDAP.LYCEUM deployed this tool via DanBot shortly after gaining initial access to a compromised environment.LYCEUM delivers weaponized maldocs via spearphishing from the compromised accounts to the targeted executives, human resources (HR) staff, and IT personnel.This focus on training aligns with LYCEUM’s targeting of executives, HR staff, and IT personnel.Despite the initial perception that the maldoc sample was intended for ICS or OT staff, LYCEUM has not demonstrated an interest in those environments.However, CTU researchers cannot dismiss the possibility that the LYCEUM could seek access to OT environments after establishing robust access to the IT environment.LYCEUM is an emerging threat to energy organizations in the Middle East, but organizations should not assume that future targeting will be limited to this sector.Aside from deploying novel malware, LYCEUM’s activity demonstrates capabilities CTU researchers have observed from other threat groups and reinforces the value of a few key controls.Password spraying, DNS tunneling, social engineering, and abuse of security testing frameworks are common tactics, particularly from threat groups operating in the Middle East.The group behind these attacks has stolen gigabytes of confidential documents, mostly from military organizations.Machete is still very active at the time of this publication, regularly introducing changes to its malware, infrastructure and spearphishing campaigns.ESET has been tracking a new version of Machete (the group’s Python-based toolset) that was first seen in April 2018.This extends to other countries in Latin America, with the Ecuadorean military being another organization highly targeted with the Machete malware.Their long run of attacks, focused on Latin American countries, has allowed them to collect intelligence and refine their tactics over the years.Machete is interested in files that describe navigation routes and positioning using military grids.The Machete group sends very specific emails directly to its victims, and these change from target to target.The Machete group is very active and has introduced several changes to its malware since a new version was released in April 2018.Previous versions were described by Kaspersky in 2014 and Cylance in 2017.Since August 2018, the Machete components have been delivered with an extra layer of obfuscation.The GoogleUpdate.exe component is responsible for communicating with the remote C&C server.ESET has been tracking this threat for months and has observed several changes, sometimes within weeks.This way, the malware can have its configuration, malicious binaries and file listings updated, but can also download and execute other binaries.The presence of code to exfiltrate data to removable drives when there is physical access to a compromised computer may indicate that Machete operators could have a presence in one of the targeted countries, although we cannot be certain.This group is very active and continues to develop new features for its malware, and implement infrastructure changes in 2019.Machete's long run of attacks, focused in Latin American countries, has allowed them to collect intelligence and refine their tactics over the years.ESET researchers have detected an ongoing, highly targeted campaign, with a majority of the targets being military organizations.The group behind Machete uses effective spearphishing techniques.First described by Kaspersky in 2014 [1] and later, by Cylance in 2017 [2], Machete is a piece of malware found to be targeting high profile individuals and organizations in Latin American countries.In 2018 Machete reappeared with new code and new features.As of June 2019, ESET has seen over 50 victims being actively spied upon by Machete, with more than half of them being computers belonging to the Venezuelan military forces.Machete has Latin American targets and has been developed by a Spanish-speaking group, presumably from a LATAM country.Machete was active and constantly working on very effective spearphishing campaigns.In some cases, Machete trick new victims by sending real documents that had been stolen on the very same day.Machete relies on spearphishing to compromise its targets.They seem to have specialized knowledge about military operations, as they are focused on stealing specific files such as those that describe navigation routes.Attackers take advantage of that, along with their knowledge of military jargon and etiquette, to craft very convincing phishing emails.Operators behind Machete apparently already have information about individuals or organizations of interest to them in Latin America, how to reach them, and how best to trick them into getting compromised.Since the end of March up until the end of May 2019, ESET observed that there were more than 50 victimized computers actively communicating with the C&C server.This extends to other countries in Latin America, with the Ecuadorean military being another organization highly targeted by Machete.Machete is malware that has been developed and is actively maintained by a Spanish-speaking group.Since it was active in 2012, it has been carrying out attacks against sensitive targets in China and is one of the most active APT attack organizations targeting mainland China in recent years.By introducing small changes to their code and infrastructure, the group has bypassed several security products.OceanLotus will release malicious sub-packages in the background, receive the remote control command, steal the privacy information of users such as SMS messages, contacts, call records, geographic locations, and browser records.They also download apks secretly and record audios and videos, then upload users’ privacy information to server, causing users’ privacy leakage.It can be seen that after the code leakage, the CEO of the HackingTeam organization said that the leaked code is only a small part is based on the facts, which also reflects that the network arms merchants have lowered the threshold of APT attacks to a certain extent, making more uncertainties of cyber attacks.This report includes details related to the major hacking targets of the SectorJ04 group in 2019, how those targets were hacked, characteristics of their hacking activities this year and recent cases of the SectorJ04 group’s hacking.In 2019, the SectorJ04 group expanded its hacking activities to cover various industrial sectors located across Southeast Asia and East Asia, and is changing the pattern of their attacks from targeted attacks to searching for random victims.The SectorJ04 group has maintained the scope of its existing hacking activities while expanding its hacking activities to companies in various industrial sectors located in East Asia and Southeast Asia.There was a significant increase in SectorJ04's hacking activities in 2019, especially those targeting South Korea.They mainly utilize spam email to deliver their backdoor to the infected system that can perform additional commands from the attacker’s server.We saw SectorJ04 group activity in Germany, Indonesia, the United States, Taiwan, India.The SectorJ04 group mainly utilizes a spear phishing email with MS Word or Excel files attached, and the document files downloads the Microsoft Installer (MSI) installation file from the attacker server and uses it to install backdoor on the infected system.The SectorJ04 group’s preexisting targets were financial institutions located in countries such as North America and Europe, or general companies such as retail and manufacturing, but they recently expanded their areas of activity to include the medical, pharmaceutical, media, energy and manufacturing industries.The SectorJ04 group mainly used their own backdoor, ServHelper and FlawedAmmy RAT, for hacking.SectorJ04 also used the Remote Manipulator System (RMS) RAT, a legitimate remote management software created in Russia.Backdoors are installed in infected systems and SectorJ04 also distributed email stealers, botnet malware and ransomware through those backdoors.Backdoor installed in the infected system distributed additional botnet malware, ransomware and email stealers.SectorJ04 was recently confirmed to use additional backdoor called AdroMut and FlowerPippi, which is used to install other backdoor such as FlawedAmmy RAT on behalf of the MSI file, or to collect system information and send it to the attacker’s server.Although the SectorJ04 group mainly targeted countries located in Europe or North America, it has recently expanded its field of activities to countries located in Southeast Asia and East Asia.The email stealer collects connection protocol information and account information, such as SMTP, IMAP, and POP3, which are stored in the registry by Outlook and Thunderbird mail clients and sends them to the attacker server in a specific format.A new type of backdoor called AdroMut and a new malware called FlowerPippi was also found coming from SectorJ04.But after 2019 SectorJ04 has changed its hacking strategy to attack using spam email.The hacking activities of SectorJ04 group, which targeted South Korea in the first half of 2019, have been continuously discovered.Prior to 2019, the SectorJ04 group conducted large-scale hacking activities for financial gain using exploit kits on websites to install ransomware, such as Locky and GlobeImporter, along with its banking Trojan, on its victims computers.In June 2019, continuous SectorJ04's activities targeting South Korea were found again and spam emails were written with various contents, including transaction statements, receipts and remittance cards.The SectorJ04 group has carried out large-scale hacking activities targeting South Korea, while also expanding the field of attacks to Southeast Asian countries such as Taiwan and the Philippines.In June, SectorJ04 group conducted hacking using spam emails written in various languages, including English, Arabic, Korean and Italian, and the emails were written with various contents, including remittance card, invoice and tax invoice.Spam emails and attachments written in Chinese were found in May, and the SectorJ04 group at that time targeted industrial sectors such as electronics and telecommunications, international schools and manufacturing.In addition to their preexist backdoor, ServHelper and FlawedAmmy, they have also been confirmed to use the backdoor called AdroMut and FlowerPippi.AdroMut downloads the malware ServHelper and FlawedAmmy RAT used by the SectorJ04 group from the attacker server and simultaneously performs the functions of a backdoor.The SectorJ04 group, which has been utilizing the same pattern of infection and the same malware for more than six months, is believed to be attempting to change its infection methods such as downloading malware directly from malicious documents without using MSI installation files, changing their spam email format and using new types of backdoor.Until 2019, SectorJ04 group had carried out massive website-based hacking activities that mainly utilize ransomware and banking trojans for financial profit, and has also been carrying out information gathering activities to secure attack resources such as email accounts and system login information from users since 2019.The SectorJ04 group has shown a pattern of hacking activities that have changed from targeted attacks to a large-scale distribution of spam.This allows them to expand their range of targets of hacking activities for financial profit, and in this regard, SectorJ04 group has been found to have hacked into a company’s internal network by using a spear phishing email targeting executives and employees of certain South Korean companies around February 2019.SectorJ04 group carried out intensive hacking on various industrial sectors, including South Korea’s media, manufacturing and universities, around February and March 2019.SectorJ04 used the spear phishing email to spread malicious Excel or malicious Word files, and downloaded the MSI files from the attacker’s server when the malicious documents were run.SectorJ04 group conducted hacking activities targeting financial institutions located in India and Hong Kong around April 2019.SectorJ04 group carried out hacking activities targeting financial institutions located in Italy and other countries around May 2019.In late July, SectorJ04 group used FlawedAmmy RAT to carry out hacking attacks on companies and universities in sectors such as education, job openings, real estate and semiconductors in South Korea.In early August, the SectorJ04 group carried out extensive hacking activities targeting the users around the world, including South Korea, India, Britain, the United States, Germany, Canada, Argentina, Bangladesh and Hong Kong.Spam emails targeting email accounts used in the integrated mail service of public officials were also found in the hacking activity.They are one of the most active cyber crime groups in 2019, and they often modify and tweak their hacking methods and perform periodic hacking activities.Now, Silence is one of the most active threat actors targeting the financial sector.Since we released our original report, Silence: Moving into the darkside, the confirmed damage from Silence's operations has increased fivefold compared to the figures in Group-IB's initial report.Silence started by targeting organizations in Russia, gradually shifting their focus to former Soviet countries, and then the world.Silence also started using Ivoke, a fileless loader, and EDA agent, both written in PowerShell.Silence 2.0: Going Global is an extension of our original report: Silence: Moving into the Darkside which remains the most significant contribution to the research on the group and is the first such report to reveal Silence’s activity.Since the report’s release in September 2018, Group-IB’s Threat Intelligence team has detected 16 campaigns targeting banks launched by Silence.Like the majority of APT groups, Silence uses phishing as their infection vector.In the last successful attack described in Silence: Moving into the darkside, dated April 2018, the hackers siphoned off about $150, 000 through ATMs in a single night.Prior to April 2018, as described in Group-IB’s Silence: Moving into the darkside report, Silence’s target interests were primarily limited to former Soviet and Eastern European countries including Russia, Ukraine, Belarus, Azerbaijan, Poland, and Kazakhstan.In 2018, Silence conducted test campaigns to update their database of current targets and expand their attack geography.The threat actor’s emails usually contain a picture or a link without a malicious payload and are sent out to a huge recipient database of up to 85, 000 users.Silence has conducted at least three campaigns using recon emails, followed by malicious mail sent to an updated recipient list.Group-IB has also detected recon emails sent out to New Zealand.Since our last public report, Silence has sent out more than 170, 000 recon emails to banks in Russia, the former Soviet Union, Asia and Europe.In November 2018, Silence tried their hand at targeting the Asian market for the first time in their history.In total, Silence sent out about 80, 000 emails, with more than half of them targeting Taiwan, Malaysia, and South Korea.Prior to April 2018, as described in Group-IB’s Silence: Moving into the darkside report, Silence’s target interests were primarily limited to former Soviet and Eastern European countries including Russia, Ukraine, Belarus, Azerbaijan, Poland, and Kazakhstan.From 16 October 2018 to 1 January 2019, Silence sent out about 84, 000 emails in Russia alone to update their address database.As part of their phishing campaigns, silence still uses Microsoft Office documents with macros or exploits, CHM files, and .LNK shortcuts as malicious attachments.In the former Soviet Union, Silence targeted banks in Kyrgyzstan, Kazakhstan, and Ukraine.In 2019, Group-IB also observed the use of a new fileless PowerShell loader called Ivoke.The Silence.Main Trojan, which is the main stage of the attack, has a full set of commands to control a compromised computer.As the CnC server, Silence use CnC-3 server running Windows, from which they send commands to download additional modules.To control ATMs, the group uses the Atmosphere Trojan, which is unique to Silence, or a program called xfs-disp.exe.In addition, Silence downloads the reverse proxy programs Silence.ProxyBot and Silence. ProxyBot.NET, which are described in detail in the report Silence: moving into the darkside.Analysis of the emails has shown that the attachment contains an exploit for the CVE-2017-11882 vulnerability.Group-IB specialists tracked a massive mailout of emails containing a malicious Microsoft Word attachment titled Договор.doc” [Contract.doc].Silence sent out emails to Russian banks.The exploit installs Silence’s loader, designed to download backdoors and other malicious programs.Silence conducted a massive phishing campaign posing as the Central Bank of the Russian Federation.Group-IB specialists have established that the aim of the attack was to deliver and launch the second stage of Silence’s Trojan, known as Silence.MainModule.Silence attacked financial organisations in the UK.Silence conducted the first stage of their Asian campaign, organising a massive phishing attack aimed at receiving an up-to-date list of current recipients in different countries for further targeted attacks delivering their malicious software.The attackers used the server deployed on 6 June 2019 to control compromised workstations in these banks.On 24 March 2019, Silence.ProxyBot (MD5 2fe01a04d6beef14555b2cf9a717615c) was uploaded to VirusTotal from an IP address in Sri Lanka.On October 18th, 2018, the group sent out emails to British financial companies as part of their preparatory campaign.Group-IB experts established that the server 185.20.187.89 started functioning no later than 28 January 2019.According to local media reports, in 2019 Silence successfully withdrew money from the Bangladeshi bank twice within 2 months.To do this, the actor may have used a unique tool called Atmosphere, a Trojan developed by Silence to remotely control ATM dispensers, or a similar program called xfs-disp.exe, which the actor may have used in their attack on IT Bank.As we described in Silence: Moving into the darkside report, Silence has experience with theft using compromised card processing systems.In February 2019, Russian media7 reported a Silence attack on IT Bank in the city of Omsk.On 16 January 2019, Silence sent out phishing emails with malicious attachments disguised as invitations to the International Financial Forum iFin-2019 (see section ‘Attack timeline’).Group-IB specialists determined that the email addresses of IT bank employees were among the recipients of these emails.The main goal of Silence.Downloader is to receive an executable file and run it on an infected machine.Silence.MainModule is a typical remote control Trojan that provides access to the command shell CMD.EXE with the possibility of downloading files from remote nodes to a computer and uploading files from a computer to a remote server.Since at least 2011, these hackers have been using malware to spy on corporate networks.Hackers are targeting high-tech companies as well as chemical and pharmaceutical companies.The hackers will map a company’s network and look for strategically favorable locations for placing their malware.The corporation conrms the Winnti incident and issues the following statement: The cyberattack was discovered in the summer of 2014 and Henkel promptly took all necessary precautions.” Henkel claims that a very small portion” of its worldwide IT systems had been aected — the systems in Germany.A BASF spokeswoman tells us in an email that in July 2015, hackers had successfully overcome the rst levels” of defense.The tool was written by sta of Thyssenkrupp, because the industrial giant—company number eleven—had been spied on by Winnti.Hackers are charged with spying on a manufacturer of gas turbines.The Hong Kong government was spied on by the Winnti hackers.Komplex is a backdoor that has been used by APT28 on OS X and appears to be developed in a similar manner to XAgentOSX.While OceanLotus’ targets are global, their operations are mostly active within the APAC region which encompasses targeting private sectors across multiple industries, foreign governments, activists, and dissidents connected to Vietnam.NewsBeef attacks against Saudi Arabian organizations and individuals (as well as targets in the European Union) are likely to continue.Rapid7 discovered that additional data was placed into the Dropbox accounts under control of the APT10 during the compromise and was able to attribute data that was placed into it as being owned by Visma.Rapid7 again observed APT10 dropping payloads named ccSEUPDT.exe.These RAT families are discussed in Novetta’s other report on the Lazarus Group’s RAT and Staging capabilities.Magic Hound has primarily targeted organizations in the energy, government, and technology sectors that are either based or have business interests in Saudi Arabia.Since at least 2013, the Iranian threat group that FireEye tracks as APT33 has carried out a cyber espionage operation to collect information from defense, aerospace and petrochemical organizations.CTU researchers observed likely unsuccessful phishing campaigns being followed by highly targeted spearphishing and social engineering attacks from a threat actor using the name Mia Ash.CTU researchers conclude that COBALT GYPSY created the persona to gain unauthorized access to targeted computer networks via social engineering.Characterized by relatively unsophisticated technical merit and extensive use of spear phishing, the Magic Hound targeted individuals and organizations in the Middle East (including targets inside Iran itself), as well as across Europe and in the United States.These malware families have a rich history of being used in many targeted attacks against government and private organizations.The activity surfaced in Southeast Asia, a region where APT10 frequently operates.The samples we analyzed originated from the Philippines.APT10 frequently targets the Southeast Asia region.Both of the loader’s variants and their various payloads that enSilo analyzed share similar Tactics, Techniques, and Procedures (TTPs) and code associated with APT10.Typically, APT10 tends to employ a namesquatting scheme in their domains that aims to confuse the observer by posing as a legitimate domain.Also, the certificate embedded in the Quasar sample was issued at 22.12.2018, which correlates with the file’s compilation date.Over the past three months, Recorded Future’s Insikt Group has observed an increase in APT33’s also known as Elfin infrastructure building and targeting activity, and on June 21, 2019, Yahoo.News reported that the U.S. Cyber Command launched cyberattacks on an Iranian spy group.Iranian state-sponsored threat actor APT33 has been conducting cyberespionage activity since at least 2013, predominantly targeting nations in the Middle East, but also notably targeting U.S., South Korean, and European commercial entities across a wide variety of sectors.Our research found that APT33, or a closely aligned threat actor, continues to conduct and prepare for widespread cyberespionage activity, with over 1, 200 domains used since March 28, 2019 and with a strong emphasis on using commodity malware.The targeting of mainly Saudi Arabian organizations across a wide variety of industries aligns with historical targeting patterns for the group, which appear undeterred following previous exposés of their activity.Towards the end of April 2019, we tracked down what we believe to be new activity by APT10, a Chinese cyber espionage group.Almost 60% of the suspected APT33 domains that were classified to malware families related to njRAT infections, a RAT not previously associated with APT33 activity.Other commodity RAT malware families, such as AdwindRAT and RevengeRAT, were also linked to suspected APT33 domain activity.APT33 is an Iranian state-sponsored threat actor that has engaged in cyberespionage activities since at least 2013.Western and Saudi organizations in industries that have been historically targeted by APT33 should be monitoring geopolitical developments and increasing the scrutiny of operational security controls focusing on detection and remediation of initial unauthorized access, specifically from phishing campaigns, webshells.Symantec’s Elfin report denoted additional targeting of the engineering, chemical, research, finance, IT, and healthcare sectors.We assess that the recent reporting on links between the Nasr Institute and Kavosh Security Group, as well as technical and persona analysis, overlaps among APT33, APT35, and MUDDYWATER, and is probably a result of the tiered structure that Iran utilizes to manage cyber operations.Recorded Future has been monitoring APT33 activity, beginning with research published in October 2017, which revealed new infrastructure, malware hashes, and TTPs relating to the threat actor(s).FireEye also noted in their 2017 report that the online handle xman_1365_x, ” found within the PDB path in an APT33 TURNEDUP backdoor sample, belonged to an individual at the Nasr Institute.Recorded Future’s Insikt Group has been monitoring APT33 activity, beginning with research published in October 2017, which revealed new infrastructure, malware hashes, and TTPs relating to the threat actor(s).Based on this information, it is possible that upon the exposure of the Nasr Institute as a front for Iranian state-sponsored offensive cyber activity, employees transitioned over to other entities, such as Kavosh, to protect their identities and minimize further exposure.Insikt Group researchers used proprietary methods, including Recorded Future Domain Analysis and Recorded Future Network Traffic Analysis, along with other common analytical approaches, to profile recently reported Iranian threat actor APT33’s domain and hosting infrastructure in an effort to identify recent activity.Insikt Group enumerated all domains reported as being used by APT33 since January 2019.PlugX is a modular structured malware that has many different operational plugins such as communication compression and encryption, network enumeration, files interaction, remote shell operations and more.Using data from Recorded Future Domain Analysis and combining it with data derived from Recorded Future Network Traffic Analysis, Insikt Group researchers were able to identify a small selection of likely targeted organizations impacted by suspected APT33 activity.Following the exposure of a wide range of their infrastructure and operations by Symantec earlier this year, we discovered that APT33, or closely aligned actors, reacted by either parking or reassigning some of their domain infrastructure.Since late March, suspected APT33 threat actors have continued to use a large swath of operational infrastructure, well in excess of 1, 200 domains, with many observed communicating with 19 different commodity RAT implants.While we haven’t observed a widespread targeting of commercial entities or regional adversaries like in previously documented APT33 operations, the handful of targeted organizations that we did observe were mainly located in Saudi Arabia across a range of industries, indicating ongoing targeting aligned with geopolitical aims.The zip contained a sample of the Poison Ivy malware which is also known to be used by APT10.The new malware families, which we will examine later in this post, show APT34 relying on their PowerShell development capabilities, as well as trying their hand at Golang.Additionally, with the assistance of our FireEye Labs Advanced Reverse Engineering (FLARE), Intelligence, and Advanced Practices teams, we identified three new malware families and a reappearance of PICKPOCKET, malware exclusively observed in use by APT34.This threat group has conducted broad targeting across a variety of industries operating in the Middle East; however, we believe APT34's strongest interest is gaining access to financial, energy, and government entities.Additionally, with the assistance of FireEye Labs, we identified three new malware families and a reappearance of PICKPOCKET, malware exclusively observed in use by APT34.APT34 is an Iran-nexus cluster of cyber espionage activity that has been active since at least 2014.This CPE was created to ensure our customers are updated with new discoveries, activity and detection efforts related to this campaign, along with other recent activity from Iranian-nexus threat actors to include APT33, which is mentioned in this updated FireEye blog post.On June 19, 2019, FireEye’s Managed Defense Security Operations Center received an exploit detection alert on one of our FireEye Endpoint Security appliances.A backdoor that communicates with a single command and control (C2) server using HTTP GET and POST requests, TONEDEAF supports collecting system information, uploading and downloading of files, and arbitrary shell command execution.FireEye’s Advanced Practices and Intelligence teams were able to identify additional artifacts and activity from the APT34 actors at other victim organizations.Of note, FireEye discovered two additional new malware families hosted at this domain, VALUEVAULT and LONGWATCH.This tool was previously observed during a Mandiant incident response in 2018 and, to date, solely utilized by APT34.PICKPOCKET is a credential theft tool that dumps the user's website login credentials from Chrome, Firefox, and Internet Explorer to a file.FireEye detects this activity across our platforms, including named detection for TONEDEAF, VALUEVAULT, and LONGWATCH.Several spear-phishing campaigns attributed to Carbanak, all occurring between March and May 2018, were analyzed by security researchers in 2018.One of the most prolific APT-style cyberattacks, specifically targeting the financial sector, is known as Carbanak.Discovered in 2014, the campaign quickly gained notoriety after compromising the security systems of 100 banks in 40 countries and stealing up to $1 billion in the process.The same group is believed to have also been using the Cobalt Strike framework to run sophisticated campaigns, plotting and performing financial heists of financial institutions.Banks in countries such as Russia, the United Kingdom, the Netherlands, Spain, Romania, Belarus, Poland, Estonia, Bulgaria, Georgia, Moldova, Kyrgyzstan, Armenia, Taiwan and Malaysia have allegedly been targeted with spearphishing emails, luring victims into clicking malicious URLs and executing booby-trapped documents.A Carbanak trademark in cyberattacks remains the use of Cobalt Strike – a powerful pentesting tool designed for exploiting and executing malicious code, simulating post-exploitation actions of advanced threat actors – which allows them to infiltrate the organization, move laterally, exfiltrate data, and deploy anti-forensic and evasion tools.However, this action doesn’t appear to have made a dent in the cybercriminal organization, as subsequent spear-phishing campaigns seem to have been reported from March until May 2018.Bitdefender’s forensics and investigation team was contacted to look into a security incident that started in May 2018 with an email received by two of the bank’s employees.The Carbanak group, which has a long track record of compromising infrastructure belonging to financial institutions, is still active.Its purpose remains to manipulate financial assets, such as transferring funds from bank accounts or taking over ATM infrastructures and instructing them to dispense cash at predetermined time intervals.If the attack had succeeded, it would have given hackers control over the ATM network, while money mules would have been standing by the ATM machines at pre-set time intervals to cash them out.The actors uploaded a variety of tools that they used to perform additional activities on the compromised network, such as dumping credentials, as well as locating and pivoting to additional systems on the network.We believe Emissary Panda exploited a recently patched vulnerability in Microsoft SharePoint tracked by CVE-2019-0604, which is a remote code execution vulnerability used to compromise the server and eventually install a webshell.Bitdefender’s investigation shows the attackers’ main methods remain to quietly infiltrate the infrastructure by establishing a foothold on an employee’s system, then move laterally across the infrastructure or elevate privileges to find critical systems that manage financial transactions or ATM networks.We also found the China Chopper webshell on the SharePoint servers, which has also been used by the Emissary Panda threat group.Of particular note is their use of tools to identify systems vulnerable to CVE-2017-0144, which is the same vulnerability exploited by EternalBlue that is best known for its use in the WannaCry attacks of 2017.In addition to the aforementioned post-exploitation tools, the actors used these webshells to upload legitimate executables that they would use DLL sideloading to run a malicious DLL that has code overlaps with known Emissary Panda attacks.This webshell activity took place across three SharePoint servers hosted by two different government organizations between April 1, 2019 and April 16, 2019, where actors uploaded a total of 24 unique executables across the three SharePoint servers.The timeline shows three main clusters of activity across the three webshells, with activity occurring on two separate webshells (green and orange) within a very small window of time on April 2, 2019 and the activity involving the third webshell two weeks later on April 16, 2019.In April 2019, several national security organizations released alerts on CVE-2019-0604 exploitation, including the Saudi Arabian National Cyber Security Center and the Canadian Center for Cyber Security.Based on the functionality of the various tools uploaded to the webshells, we believe the threat actors breach the SharePoint servers to use as a beachhead, then attempt to move laterally across the network via stolen credentials and exploiting vulnerabilities.We also observed the actors uploading custom backdoors such as HyperBro which is commonly associated with Emissary Panda.Both of these alerts discussed campaigns in which actors used the CVE-2019-0604 to exploit SharePoint servers to install the China Chopper webshell.During our research into this attack campaign, Unit 42 gathered several tools that the Emissary Panda uploaded to the three webshells at the two government organizations.We also observed the actors uploading the HyperBro backdoor to one of the webshells, as well as legitimate executables that would sideload malicious DLLs that have overlapping code associated with known Emissary Panda activity.Lastly, we saw the actor uploading a custom backdoor called HyperBro, which has been associated with Emissary Panda operations in the past.The other overlapping files are tools used by the adversary to locate other systems on the network (etool.exe), check to see if they are vulnerable to CVE-2017-0144 (EternalBlue) patched in MS07-010 (checker1.exe) and pivot to them using remote execution functionality offered by a tool similar to PsExec offered by Impacket (psexec.exe).Also, the NCSC advisory mentioned that the actors used a file name stylecss.aspx for their webshell, which is the same filename we saw associated with China Chopper.We will provide an analysis of the HyperBro tool in an upcoming section.However, using NCC Group’s research published in May 2018, we were able to discover code overlaps between these DLLs and a sideloaded DLL that ran the SysUpdate tool that the NCC group has associated with an Emissary Panda campaign.The list also includes several hack tools, such as Mimikatz for credential dumping and several compiled python scripts used to locate and compromise other systems on the local network.Unfortunately, we do not have access to the PYTHON33.hlp or CreateTsMediaAdm.hlp files, so we do not know the final payload loaded by either of these DLLs.Figure 9 shows a code comparison between the PYTHON33.dll (right) and inicore_v2.3.30.dll (left) (SHA256: 4d65d371a789aabe1beadcc10b38da1f998cd3ec87d4cc1cfbf0af014b783822), which was sideloaded to run the SysUpdate tool in a previous Emissary Panda campaign.The Emissary Panda threat group loaded the China Chopper webshell onto SharePoint servers at two Government organizations in the Middle East, which we believe with high confidence involved exploiting a remote code execution vulnerability in SharePoint tracked in CVE-2019-0604.The files uploaded to this webshell included the same compiled python script that would scan remote systems that were vulnerable to CVE-2017-0144 (EternalBlue) that we saw uploaded to the other errr.aspx webshell.According to Microsoft’s advisory, this vulnerability was patched on March 12, 2019 and we first saw the webshell activity on April 1, 2019.We believe the actors pivoted to other systems on the network using stolen credentials and by exploiting the CVE-2017-0144 (EternalBlue) vulnerability patched in MS17-010.Once the adversary established a foothold on the targeted network, they used China Chopper and other webshells to upload additional tools to the SharePoint server to dump credentials, perform network reconnaissance and pivot to other systems.We also observed Emissary Panda uploading legitimate tools that would sideload DLLs, specifically the Sublime Text plugin host and the Microsoft’s Create Media application, both of which we had never seen used for DLL sideloading before.Consequently, the Linux malware ecosystem is plagued by financial driven crypto-miners and DDoS botnet tools which mostly target vulnerable servers.We also observed the actors uploading legitimate tools that would sideload DLLs, specifically the Sublime Text plugin host and the Microsoft’s Create Media application, both of which we had never seen used for DLL sideloading before.It has been active since at least 2013, and has targeted individuals likely involved with the Ukrainian government.The group’s implants are characterized by the employment of information stealing tools among them being screenshot and document stealers delivered via a SFX, and made to achieve persistence through a scheduled task.The finding shows that EvilGnome operates on an IP address that was controlled by the Gamaredon group two months ago.FIN7 operations are linked to numerous intrusion attempts having targeted hundreds of companies since at least as early as 2015.The FIN7 intrusion set continued its tailored spear phishing campaigns throughout last year.In addition, during the investigation, we discovered certain similarities to other attacker groups that seemed to share or copy the FIN7 TTPs in their own operations.In 2018-2019, researchers of Kaspersky Lab’s Global Research and Analysis Team analyzed various campaigns that used the same Tactics Tools and Procedures (TTPs) as the historic FIN7, leading the researchers to believe that this threat actor had remained active despite the 2018 arrests.One of the domains used by FIN7 in their 2018 campaign of spear phishing contained more than 130 email HackOrges, leading us to think that more than 130 companies had been targeted by the end of 2018.Interestingly, following some open-source publications about them, the FIN7 operators seems to have developed a homemade builder of malicious Office document using ideas from ThreadKit, which they employed during the summer of 2018.The first module downloaded by the GRIFFON malware to the victim’s computer is an information-gathering JScript, which allows the cybercriminals to understand the context of the infected workstation.The new GRIFFON implant is written to the hard drive before each execution, limiting the file-less” aspect of this method.Given FIN7’s previous use of false security companies, we decided to look deeper into this one.This activity cluster, which Kaspersky Lab has followed for a few years, uses various implants for targeting mainly banks, and developers of banking and money processing software solutions.FIN7’s last campaigns were targeting banks in Europe and Central America.After a successful penetration, FIN7 uses its own backdoors and the CobaltStrike framework or Powershell Empire components to hop to interesting parts of the network, where it can monetize its access.AveMaria is a new botnet, whose first version we found in September 2018, right after the arrests of the FIN7 members.This threat actor stole suspected of stealing €13 million from Bank of Valetta, Malta earlier this year.In fact, AveMaria is a classic infostealer bot that collects all possible credentials from various types of software: browsers, email clients, messengers, etc, and can act as a keylogger.They also use AutoIT droppers, password-protected EXE files and even ISO images.To deliver their malware, the cyber criminals use spearphishing emails with various types of attachments: MS Office documents or spreadsheet files exploiting some known vulnerability like CVE-2017-11882, or documents with Ole2Link and SCT.Interestingly, this actor targeted financial entities and companies in one African country, which lead us to think that CopyPaste was associated with cybermercenaries or a training center.At the end of 2018, while searching for new FIN7 campaigns via telemetry, we discovered a set of activity that we temporarily called CopyPaste” from a previously unknown APT.FIN7 and Cobalt used decoy 302 HTTP redirections too, FIN7 on its GRIFFON C2s before January 2018, and Cobalt, on its staging servers, similar to CopyPaste.Quite recently, FIN7 threat actors typosquatted the brand Digicert” using the domain name digicert-cdn[.]com, which is used as a command and control server for their GRIFFON implants.The first of them is the well-known FIN7, which specializes in attacking various companies to get access to financial data or PoS infrastructure.The second one is CobaltGoblin Carbanak EmpireMonkey, which uses the same toolkit, techniques and similar infrastructure but targets only financial institutions and associated software/services providers.We observe, with various level of confidence, that there are several interconnected groups using very similar toolkits and the same infrastructure to conduct their cyberattacks.The last piece is the newly discovered CopyPaste group, who targeted financial entities and companies in one African country, which lead us to think that CopyPaste was associated with cybermercenaries or a training center.At the end of 2018, the cluster started to use not only CobaltStrike but also Powershell Empire in order to gain a foothold on the victims’ networks.FIN7 thus continues to use effective spearphishing campaigns in conjunction with well-known MS Office exploits generated by the framework.MuddyWater is widely regarded as a long-lived APT group in the Middle East.From February to April 2019, MuddyWater launched a series of spear-phishing attacks against governments, educational institutions, financial, telecommunications and defense companies in Turkey, Iran, Afghanistan, Iraq, Tajikistan and Azerbaijan.FIN7 thus continue to use effective spearphishing campaigns in conjunction with well-known MS Office exploits generated by the framework.We also unearthed and detailed our other findings on MuddyWater, such as its connection to four Android malware variants and its use of false flag techniques, among others, in our report New MuddyWater Activities Uncovered: Threat Actors Used Multi-Stage Backdoors, False Flags, Android Malware, and More.Instead, the campaign used compromised legitimate accounts to trick victims into installing malware.Notably, the group’s use of email as infection vector seems to yield success for their campaigns.We also observed MuddyWater’s use of multiple open source post-exploitation tools, which they deployed after successfully compromising a target.The attacker also connected to the compromised servers from IP addresses that were linked to dynamic domain names used as C&Cs by the delivered payloads.The main payload is usually Imminent Monitor RAT; however, at the beginning of 2018, we also observed the use of LuminosityLink RAT, NetWire RAT, and NjRAT.In a case in June 2019, we also noticed Warzone RAT being used.Xpert RAT reportedly first appeared in 2011.The first version of Proyecto RAT” was published at the end of 2010.But with the West African gang we’ve named Scattered Canary, we have a deeper look at how business email compromise is connected to the rest of the cybercrime.In a recent report, the FBI’s Internet Crime Complaint Center (IC3) reported that more than 20, 000 businesses lost nearly $1.3 billion to BEC attacks in 2018.This investigation by the Agari Cyber Intelligence Division into the cybercriminal group we’ve named Scattered Canary offers unprecedented visibility into eleven years of fraud and criminal activities, and the growth of a 419 startup into a fully operational BEC business.While this criminal organization’s activities now center around BEC, and extend to romance scams, credit card fraud, check fraud, fake job listings, credential harvesting, tax schemes, and more, these actors came from much humbler beginnings, starting with basic Craigslist scams in 2008.On November 29, 2018, Scattered Canary sent an attack email to Agari CFO Raymond Lim, enquiring as to his availability to send out a domestic wire transfer.Many feel that they have a home team advantage living in Nigeria, where they are free to pay off law enforcement to look the other way.Scattered Canary’s fraudulent history can be traced as far back as October 2008, when the group first arrived on the cybercriminal circuit.By March 2016, one of Scattered Canary’s members had built enough trust with a romance victim—who we’ll call Jane—that she became a frequent source of new mule accounts for the group.Alpha’s early role was fairly simple: engage with individuals, who he chose based on the goods they were selling, and then provide personal shipping addresses back to Omega.By all accounts, late 2015 was the beginning of BEC for Scattered Canary.The first type of attack Scattered Canary pivoted to was credential phishing.Between July 2015 and February 2016, Scattered Canary’s primary focus seemed to be mass harvesting general credentials using a Google Docs phishing page.In the first few months of their credential phishing ventures, Scattered Canary’s sights were mostly set on Asian targets—Malaysia and Japan, in particular.In November 2015, the group started to focus on North American users, mostly in the United States.This activity ceased in February 2016, likely because the men who made up Scattered Canary began to focus on honing their BEC In total, Scattered Canary received more than 3, 000 account credentials as a result of their phishing attacks.For over eighteen months from March 2017 until November 2018, Scattered Canary’s frequent enterprise-focused credential phishing campaigns almost exclusively targeted businesses in the United States and Canada.In July 2018, following a trend we have observed across the entire BEC threat landscape, Scattered Canary changed their preferred cash out mechanism from wire transfers to gift cards.Instead of using fake Google Docs phishing pages to collect personal email login credentials, Scattered Canary began using phishing pages of commonly used business applications to compromise enterprise credentials.Using personal information obtained from various sources, Scattered Canary started perpetrating fraud against US federal and state government agencies.In total, 35 actors have been tied to Scattered Canary’s operations since the group emerged in 2008.Just as with romance scams, actors make use of scripts and templates they can copy-and-paste without having to create something on their own.When it comes to engaging targets, Scattered Canary frequently maximized efficiencies through the use of scripts, or as some members of the group call them, formats.” These formats are templated text documents that can contain several layers of phishing messages to send to potential victims.Recently, we unveiled the existence of a UEFI rootkit, called LoJax, which we attribute to the Sednit group.If Scattered Canary can be seen as a microcosm for the rapidly evolving organizations behind today’s most pernicious email scams, this report demonstrates that a much more holistic approach—one based on threat actor identity rather than type of fraudulent activity—is required to detect email fraud and protect organizations.This is a first for an APT group, and shows Sednit has access to very sophisticated tools to conduct its espionage operations.Three years ago, the Sednit group unleashed new components targeting victims in various countries in the Middle East and Central Asia.In the past, Sednit used a similar technique for credential phishing.At the end of August 2018, the Sednit group launched a spearphishing email campaign where it distributed shortened URLs that delivered the first stage of Zebrocy components.As we explained in our most recent blogpost about Zebrocy, the configuration of the backdoor is stored in in the resource section and is split into four different hex-encoded, encrypted blobs.The past iteration of SLUB spread from a unique watering hole website exploiting CVE-2018-8174, a VBScript engine vulnerability.It used GitHub and Slack as tools for communication between the malware and its controller.On July 9, we discovered a new version of SLUB delivered via another unique watering hole website.This malicious site used CVE-2019-0752, an Internet Explorer vulnerability discovered by Trend Micro’s Zero Day Initiative (ZDI) that was just patched this April.Since we published out last report on SLUB, the backdoor has been updated and several improvements were implemented.The SLUB malware was delivered through watering hole websites that were injected with exploits for CVE-2018-8174 or CVE-2019-0752.During this attack, we found that the SLUB malware used two Slack teams sales-yww9809” and marketing-pwx7789.SWEED remains consistent across most of their campaigns in their use of spear-phishing emails with malicious attachments.In April 2018, SWEED began making use of a previously disclosed Office exploit.In May 2018, campaigns being conducted by SWEED began leveraging another vulnerability in Microsoft Office: CVE-2017-11882, a remote code execution bug in Microsoft Office that is commonly observed being leveraged in malicious documents used in commodity malware distribution.We found them targeting countries in the Middle East such as United Arab Emirates and Saudi Arabia, as well as other countries such as India, Japan, Argentina, the Philippines, and South Korea.Similar to previous campaigns, the JAR was directly attached to emails and used file names such as Order_2018.jar.Code contained inside one of the slides triggers an exploit for CVE-2017-8759, a remote code execution vulnerability in Microsoft .NET framework.TA505 is also using FlowerPippi (Backdoor.Win32.FLOWERPIPPI.A), a new backdoor that we found them using in their campaigns against targets in Japan, India, and Argentina.TA505 targeted Middle Eastern countries in a June 11 campaign that delivered more than 90% of the total spam emails to the UAE, Saudi Arabia, and Morroco.It fetches the same FlawedAmmyy downloader .msi file, then downloads the FlawedAmmyy payload.TA505 used Wizard (.wiz) files in this campaign, with FlawedAmmyy RAT as the final payload.On June 14, we saw TA505’s campaign still targeting UAE with similar tactics and techniques, but this time, some of the spam emails were delivered via the Amadey botnet.It later delivered an information stealer named EmailStealer, ” which stolesimple mail transfer protocol (SMTP) credentials and email addresses in the victim’s machine.On June 18, the majority of the campaign’s spam emails were sent with the subject, Your RAKBANK Tax Invoice / Tax Credit Note” or Confirmation.This campaign used the abovementioned .html file, malicious Excel/Word document VBA macro, the FlawedAmmyy payload, and Amadey.On June 24, we found another campaign targeting Lebanon with the ServHelper malware.On June 17, we observed the campaign’s spam emails delivering malware-embedded Excel files directly as an attachment.On June 20, we spotted the campaign’s spam emails delivering .doc and .xls files.Nonetheless, these spam emails were not delivered to the UAE or Arabic-speaking users, but to banks in Asian countries such as India, Indonesia, and the Philippines.After our analysis, we found that Proofpoint reported this malware as AndroMut as well.In the campaign that targeted Japan, Philippines, and Argentina on June 20, we found what seems to be a new, undisclosed malware, which we named Gelup.Another new malware we found that TA505 is using in their campaigns last June 20 against targets in Japan, the Philippines, and Argentina is FlowerPippi.The malicious email contains a highly suspicious sample which triggered the ZLAB team to investigate its capabilities and its possible attribution, discovering a potential expansion of the TA505 operation.The attack, as stated by CyberInt, leveraged a command and control server located in Germany related to the TA505 actor: a very active group involved in cyber-criminal operation all around the world, threatening a wide range of high profile companies, active since 2014.The comparison of the infection chains reveals in both cases TA505 used a couple of SFX stages to deploy the RMS” software: a legitimate remote administration tool produced by the Russian company TektonIT.The TA505 group is one of the most active threat groups operating since 2014, it has traditionally targeted Banking and Retail industries, as we recently documented during the analysis of the Stealthy Email Stealer” part of their arsenal.Also, some code pieces are directly re-used in the analyzed campaigns, such as the i.cmd” and exit.exe” files, and, at the same time, some new components have been introduced, for instance the rtegre.exe” and the veter1605_MAPS_10cr0.exe” file.In 2018, Kaspersky Labs published a report that analyzed a Turla PowerShell loader that was based on the open-source project Posh-SecMod.Turla is believed to have been operating since at least 2008, when it successfully breached the US military.This is not the first time Turla has used PowerShell in-memory loaders to increase its chances of bypassing security products.However, it is likely the same scripts are used more globally against many traditional Turla targets in Western Europe and the Middle East.In some samples deployed since March 2019, Turla developers modified their PowerShell scripts in order to bypass the Antimalware Scan Interface (AMSI).Based on our research, SWEED — which has been operating since at least 2017 — primarily targets their victims with stealers and remote access trojans.It is interesting to note that Turla operators used the free email provider GMX again, as in the Outlook Backdoor and in LightNeuron.This new research confirms our forecast and shows that the Turla group does not hesitate to use open-source pen-testing frameworks to conduct intrusion.Neptun is installed on Microsoft Exchange servers and is designed to passively listen for commands from the attackers.One attack during this campaign involved the use of infrastructure belonging to another espionage group known as Crambus aka OilRig, APT34.Waterbug has been using Meterpreter since at least early 2018 and, in this campaign, used a modified version of Meterpreter, which was encoded and given a .wav extension in order to disguise its true purpose.In all likelihood, Waterbug’s use of Crambus infrastructure appears to have been a hostile takeover.One of the most interesting things to occur during one of Waterbug’s recent campaigns was that during an attack against one target in the Middle East, Waterbug appeared to hijack infrastructure from the Crambus espionage group and used it to deliver malware on to the victim’s network.These three recent Waterbug campaigns have seen the group compromise governments and international organizations across the globe in addition to targets in the IT and education sectors.Curiously though, Waterbug also compromised other computers on the victim’s network using its own infrastructure.Symantec believes that the variant of Mimikatz used in this attack is unique to Waterbug.Aside from the attack involving Crambus infrastructure, this sample of Mimikatz has only been seen used in one other attack, against an education target in the UK in 2017.The first observed evidence of Waterbug activity came on January 11, 2018, when a Waterbug-linked tool (a task scheduler named msfgi.exe) was dropped on to a computer on the victim’s network.In the case of the attack against the Middle Eastern target, Crambus was the first group to compromise the victim’s network, with the earliest evidence of activity dating to November 2017.Waterbug’s intrusions on the victim’s network continued for much of 2018.Symantec did not observe the initial access point and the close timeframe between Waterbug observed activity on the victim’s network and its observed use of Crambus infrastructure suggests that Waterbug may have used the Crambus infrastructure as an initial access It also reconfigures the Microsoft Sysinternals registry to prevent pop-ups when running the PsExec tool.Waterbug also used an older version of PowerShell, likely to avoid logging.In one of these campaigns, Waterbug used a USB stealer that scans removable storage devices to identify and collect files of interest.The malware then uses WebDAV to upload the RAR archive to a Box account.The DeepSight Managed Adversary and Threat Intelligence (MATI) team co-authored this blog and its customers have received intelligence with additional details about these campaigns, the characteristics of the Waterbug (aka Turla) cyber espionage group, and methods of detecting and thwarting activities of this adversary.The DeepSight MATI team authored this blog and its customers have received intelligence with additional details about these campaigns, the characteristics of the Waterbug (aka Turla) cyber espionage group, and methods of detecting and thwarting activities of this adversary.While reviewing a 2015 report⁵ of a Winnti intrusion at a Vietnamese gaming company, we identified a small cluster of Winnti⁶ samples designed specifically for Linux⁷.Following these reports, Chronicle researchers doubled down on efforts to try to unravel the various campaigns where Winnti was leveraged.Distinct changes to Azazel by the Winnti developers include the addition of a function named ‘Decrypt2’, which is used to decode an embedded configuration similar to the core implant.Zebrocy activity initiates with spearphishing operations delivering various target profilers and downloaders without the use of any 0day exploits.We will see more from Zebrocy into 2019 on government and military related organizations.The PowerShell script will look at the architecture of the system to check which malicious DLL files should be downloaded.In the same year, Silence conducted DDoS attacks using the Perl IRC bot and public IRC chats to control Trojans.The FBI issued a rare bulletin admitting that a group named APT6 hacked into US government computer systems as far back as 2011 and for years stole sensitive data.FireEye iSIGHT Intelligence believes that APT37 is aligned with the activity publicly reported as Scarcruft and Group123.Trend Micro attributes this activity to MuddyWater, an Iran-nexus actor that has been active since at least May 2017.FireEye assess that the actors employing this latest Flash zero-day are a suspected North Korean group we track as TEMP.Reaper.FireEye has observed other suspected North Korean threat groups such as TEMP.Hermit employ wiper malware in disruptive attacks.On Nov14, 2017, FireEye observed APT34 using an exploit for the Microsoft Office vulnerability to target a government organization in the Middle East.Kaspersky reveals that APT33 is a capable group that has carried out cyber espionage operations since at least 2013.APT33 is the only group that Kaspersky has observed use the DROPSHOT dropper.The cyber espionage group APT32 heavily obfuscates their backdoors and scripts, and Mandiant consultants observed APT32 implement additional command argument obfuscation in April 2017.In all Mandiant investigations to date where the CARBANAK backdoor has been discovered, the activity has been attributed to the FIN7 threat group.Kaspersky released a similar report about the same group under the name Carbanak in February 2015.FireEye assesses that APT32 leverages a unique suite of fully-featured malware.FireEye has observed APT32 targeting foreign corporations with a vested interest in Vietnam’s manufacturing, consumer products, and hospitality sectors.The FireEye iSIGHT Intelligence MySIGHT Portal contains additional information on these backdoor families based on Mandiant investigations of APT32 intrusions.FireEye assesses that APT32 is a cyber espionage group aligned with Vietnamese government interests.In May and June 2017, FireEye has associated this campaign with APT19, a group that we assess is composed of freelancers, with some degree of sponsorship by the Chinese government.APT10 is a Chinese cyber espionage group that FireEye has tracked since 2009.In addition to the spear phishes, FireEye ISIGHT Intelligence has observed APT10 accessing victims through global service providers.FireEye’s visibility into the operations of APT28 – a group we believe the Russian government sponsors – has given us insight into some of the government’s targets, as well as its objectives and the activities designed to further them.FireEye has tracked and profiled APT28 group through multiple investigations, endpoint and network detections, and continuous monitoring.In April 2015, FireEye uncovered the malicious efforts of APT30, a suspected China-based threat group.FireEye iSIGHT Intelligence has been tracking a pair of cybercriminals that we refer to as the Vendetta Brothers.Google and Microsoft have already confirmed the Russian hacker group APT28 used a Flash vulnerability CVE-2016-7855 along with this kernel privilege escalation flaw to perform a targeted attack.McAfee concludes that some groups—and especially the Poetry Group —have shifted tactics to use Citadel in ways other than what it was originally intended for.McAfee Advanced Threat research determines with confidence that Lazarus is the threat group behind this attack for the following reasons:Contacts an IP address / domain that was used to host a malicious document from a Lazarus previous campaign in 2017.In November 2017, Talos observed the Group123, which included a new version of ROKRAT being used in the latest wave of attacks.In addition to TALOS investigation on KONNI, on July 18 2017, BitDefender released a whitepaper on DarkHotel.According to security 360 Threat Intelligence Center, Goldmouse was observed deploying the nebulous njRAT backdoor.ESET has also reported PowerShell scripts being used by Turla to provide direct, in-memory loading and execution of malware.Additionally Kaspersky identified a new backdoor that we attribute with medium confidence to Turla.Researchers at Symantec suspect that Turla used the hijacked network to attack a Middle Eastern government.Symantec researchers have uncovered evidence that the Waterbug APT group has conducted a hostile takeover of an attack platform.Researchers at the Microstep Intelligence Bureau have published a report on targeted attacks on the Ukrainian government that they attribute to the Gamaredon threat actor.Kaspersky found an active campaign by a Chinese APT group we call SixLittleMonkeys that uses a new version of the Microcin Trojan and a RAT that we call HawkEye as a last stager.Trend Micro has previously reported the use of this malware in targeted attacks by the BlackTech group, primarily focused on cyber-espionage in Asia.LuckyMouse activity detected by Palo Alto involved the attackers installing web shells on SharePoint servers to compromise government organizations in the Middle East.Talos published its analysis of the BlackWater campaign, related to MuddyWater group.Trend Micro also reported MuddyWater’s use of a new multi-stage PowerShell-based backdoor called POWERSTATS v3.Regarding other groups, Kaspersky discovered new activity related to ZooPark, a cyber-espionage threat actor that has focused mainly on stealing data from Android devices.Recorded Future published an analysis of the infrastructure built by APT33 (aka Elfin) to target Saudi organizations.Early in Q2, Kaspersky identified an interesting Lazarus attack targeting a mobile gaming company in South Korea that we believe was aimed at stealing application source code.In a recent campaign, Kaspersky observed ScarCruft using a multi-stage binary to infect several victims and ultimately install a final payload known as ROKRAT – a cloud service-based backdoor.ESET recently analyzed a new Mac OS sample from the OceanLotus group that had been uploaded to VirusTotal.The threat actor behind the campaign, which Kaspersky believes to be the PLATINUM APT group, uses an elaborate, previously unseen, steganographic technique to conceal communication.FireEye defined APT40 as the Chinese state-sponsored threat actor previously reported as TEMP.Periscope, Leviathan and TEMP.Jumper.In January, Kaspersky identified new activity by the Transparent Tribe APT group aka PROJECTM and MYTHIC LEOPARD, a threat actor with interests aligned with Pakistan that has shown a persistent focus on Indian military targets.OceanLotus was another actor active during this period, using a new downloader called KerrDown, as reported by Palo Alto.ESET recently uncovered a new addition to OceanLotus’s toolset targeting Mac OS.In mid-2018, Kaspersky's report on Operation AppleJeus” highlighted the focus of the Lazarus threat actor on cryptocurrency exchanges.Kaspersky also observed some activity from Gaza Team and MuddyWater.Kaspersky wrote about LuckyMouse targeting national data centers in June.Kaspersky also discovered that LuckyMouse unleashed a new wave of activity targeting Asian governmental organizations just around the time they had gathered for a summit in China.Kaspersky have observed similar activity in the past from groups such as Oilrig and Stonedrill, which leads us to believe the new attacks could be connected, though for now that connection is only assessed as low confidence.In August 2019, FireEye released the Double Dragon” report on our newest graduated threat group, APT41.Today, FireEye Intelligence is releasing a comprehensive report detailing APT41, a prolific Chinese cyber threat group that carries out state-sponsored espionage activity in parallel with financially motivated operations.Group-IB experts continuously monitor the Silence’ activities.Group-IB has uncovered a hacker group, MoneyTaker, attacking banks in the USA and Russia.Group-IB reveals the unknown details of attacks from one of the most notorious APT groups, Lazarus.Finally, Kaspersky produced a summary report on Sofacy’s summertime activity.Kaspersky were also able to produce two reports on Korean speaking actors, specifically involving Scarcruft and Bluenoroff.Analysis of the payload allowed us to confidently link this attack to an actor Kaspersky track as BlackOasis.Kaspersky first became aware of BlackOasis’ activities in May 2016, while investigating another Adobe Flash zero day.It contains a Word document in plaintext (written to Bienvenue_a_Sahaja_Yoga_Toulouse.doc), along with an executable (Update.exe) and DLL (McUpdate.dll).We identified decoy files which indicate these attacks began with spear phishing messages but have not observed the actual messages.Additionally, these decoy documents are hosted on legitimate websites including a government website belonging to the Cambodia Government and in at least once case, Facebook.However, the unique malware variant, BlackEnergy 3, reemerged in Ukraine early in 2015, where we had first found Sandworm Team.The initial indicator of the attack was a malicious web shell that was detected on an IIS server, coming out of the w3wp.exe process.We have previously detected groups we suspect are affiliated with the North Korean government compromising electric utilities in South Korea, but these compromises did not lead to a disruption of the power supply.Instead, sensitive KHNP documents were leaked by the actors as part of an effort to exaggerate the access they had and embarrass the South Korean Government, a technique we assess North Korea would turn to again in order to instill fear and/or meet domestic propaganda aims.North Korea linked hackers are among the most prolific nation-state threats, targeting not only the U.S. and South Korea but the global financial system and nations worldwide.The malware may inject itself into browser processes and explorer.exe.In the last few weeks, FormBook was seen downloading other malware families such as NanoCore.The vulnerability is bypassing most mitigations; however, as noted above, FireEye email and network products detect the malicious documents.Through the exploitation of the HTA handler vulnerability described in CVE-2017-1099, the observed RTF attachments download.In early May, the phishing lures leveraged RTF attachments that exploited the Microsoft Windows vulnerability described in CVE-2017-0199.In their current campaign, APT32 has leveraged ActiveMime files that employ social engineering methods to entice the victim into enabling macros.APT32 actors continue to deliver the malicious attachments via spear-phishing emails.APT19 leveraged Rich Text Format (RTF) and macro-enabled Microsoft Excel files to deliver their initial exploits.Most of these data-stealing capabilities were present in the oldest variants of CARBANAK that we have seen and some were added over time.February saw three particularly interesting publications on the topic of macOS malware: a Trojan Cocoa application that sends system information including keychain data back to the attacker, a macOS version of APT28’s Xagent malware, and a new Trojan ransomware.As early as March 4, 2017, malicious documents exploiting CVE-2017-0199 were used to deliver the LATENTBOT malware.The first, st07383.en17.docx, continues by utilizing 32 or 64 bit versions of CVE-2017-0001 to escalate privileges before executing a final JavaScript payload containing a malware implant known as SHIRIME.This vulnerability was found in a document named Trump's_Attack_on_Syria_English.docx”.To install and register the malicious shim database on a system, FIN7 used a custom Base64 encoded PowerShell script, which ran the sdbinst.exe” utility to register a custom shim database file containing a patch onto a system.During the investigations, Mandiant observed that FIN7 used a custom shim database to patch both the 32-bit and 64-bit versions of services.exe” with their CARBANAK payload.We have not yet identified FIN7’s ultimate goal in this campaign, as we have either blocked the delivery of the malicious emails or our FaaS team detected and contained the attack early enough in the lifecycle before we observed any data targeting or theft.Figure 1 shows a sample phishing email used by HawkEye operators in this latest campaign.Many groups leverage the regsvr32.exe application whitelisting bypass, including APT19 in their 2017 campaign against law firms.The malware was initially distributed through a compromised software update system and then self-propagated through stolen credentials and SMB exploits, including the EternalBlue exploit used in the WannaCry attack from May 2017.The malware appends encrypted data files with the .WCRY extension, drops and executes a decryptor tool, and demands $300 or $600 USD (via Bitcoin) to decrypt the data.The malware then builds two DLLs in memory – they are 32 and 64-bit DLLs that have identical functionality.The malware continues by creating a service named mssecsvc2.0 with a binary path pointing to the running module with the arguments -m security.The malware then writes the R resource data to the file C:\WINDOWS\tasksche.exe.The usefulness of flare-qdb can be seen in cases such as loops dealing with strings.The usefulness of flare-qdb can be seen in cases such as loops dealing with strings.The usefulness of flare-qdb can be seen in cases such as loops dealing with strings.Attaching with IDA Pro via WinDbg as in Figure 11 shows that the program counter points to the infinite loop written in memory allocated by flare-qdb.We have also observed them using virtual private network services that use IPs based in numerous countries to ensure anonymity and obfuscate criminal operations.Once downloaded and executed, it drops an intermediate payload that further downloads a Pony DLL and Vawtrak executable, which perform data theft and connect to a command and control (C2) server.The attachment in these emails is a weaponized Microsoft Office document containing a malicious macro that – when enabled – leads to the download of Hancitor.After the executable is executed, it downloads Pony and Vawtrak malware variants to steal data.Upon execution, it will communicate with an attacker-controller website to download a variant of the Pony malware, pm.dll” along with a standard Vawtrak trojan.In this blog, FireEye Labs dissects this new ATM malware that we have dubbed RIPPER (due to the project name ATMRIPPER” identified in the sample) and documents indicators that strongly suggest this piece of malware is the one used to steal from the ATMs at banks in Thailand.RIPPER interacts with the ATM by inserting a specially manufactured ATM card with an EMV chip that serves as the authentication mechanism.RIPPER will examine the contents of directories associated with the targeted ATM vendors and will replace legitimate executables with itself.This malware family can be used to compromise multiple vendor platforms and leverages uncommon technology to access physical devices.From our trend analysis seen in Figure 3, Locky ransomware started being delivered via DOCM format email attachments more extensively beginning in August.Discovered for the first time in Mexico back in 2013, Ploutus enabled criminals to empty ATMs using either an external keyboard attached to the machine or via SMS message, a technique that had never been seen before.FireEye Labs recently identified a previously unobserved version of Ploutus, dubbed Ploutus-D, that interacts with KAL’s Kalignite multivendor ATM platform.The samples we identified target the ATM vendor Diebold.This blog covers the changes, improvements, and Indicators of Compromise (IOC) of Ploutus-D in order to help financial organizations identify and defend against this threat.Ploutus-D also allows the attackers to enter the amount to withdraw (billUnits – 4 digits) and the number of cycles (billCount – 2 digits) to repeat the dispensing operation (see Figure 10).Ploutus-D will load KXCashDispenserLib” library implemented by Kalignite Platform (K3A.Platform.dll) to interact with the XFS Manager and control the Dispenser (see Figure 13).Since Ploutus-D interacts with the Kalignite Platform, only minor modifications to the Ploutus-D code may be required to target different ATM vendors worldwide.The threat actors used two publicly available techniques, an AppLocker whitelisting bypass and a script to inject shellcode into the userinit.exe process.The regsvr32.exe executable can be used to download a Windows Script Component file (SCT file) by passing the URL of the SCT file as an argument.We observed implementation of this bypass in the macro code to invoke regsvr32.exe, along with a URL passed to it which was hosting a malicious SCT file.There was code to download a decoy document from the Internet and open it in a second winword.exe process using the Start-Process cmdlet.Ordnance will be able to immediately generate shellcode after users provide the IP and Port that the shellcode should connect to or listen on.DarkPulsar is a very interesting administrative module for controlling a passive backdoor named' sipauth32.tsp' that provides remote control, belonging to this category.One of them – ipv4.dll – has been placed by the APT with what is, in fact, a downloader for other malicious components.Written in pure C language, Canhadr/Ndriver provides full access to the hard drive and operating memory despite device security restrictions, and carries out integrity control of various system components to avoid debugging and security detection.First observed in mid-2014, this malware shared code with the Bugat (aka Feodo) banking Trojan.In all emails sent to these government officials, the actor used the same attachment: a malicious Microsoft Word document that exploited the CVE-2012-0158 vulnerability to drop a malicious payload.Despite being an older vulnerability, many threat actors continue to leverage CVE-2012-0158 to exploit Microsoft Word.Whitefly first infects its victims using a dropper in the form of a malicious.exe or .dll file that is disguised as a document or image.CraP2P has frequently been used to distribute other malware such as Locky and Dridex, but also supported large scale spam campaigns for dating advertisement and pump-and-dump scams after the demise of Kelihos.Once the LOWBALL malware calls back to the Dropbox account, the admin@338 will create a file called upload.bat which contains commands to be executed on the compromised computer.In 2014, APT32 leveraged a spear-phishing attachment titled " Plans to crackdown on protesters at the Embassy of Vietnam.exe, " which targeted dissident activity among the Vietnamese diaspora in Southeast Asia.In 2014, APT32 leveraged a spear-phishing attachment titled " Plans to crackdown on protesters at the Embassy of Vietnam.exe ".More recently, in May 2017, APT33 appeared to target a Saudi organization and a South Korean business conglomerate using a malicious file that attempted to entice victims with job vacancies for a Saudi Arabian petrochemical company.More recently, in May 2017, APT33 appeared to target organizations in Saudi and South Korea using a malicious file that attempted to entice victims with job vacancies.In fact, REDBALDKNIGHT has been targeting Japan as early as 2008, based on the file properties of the decoy documents they've been sending to their targets.In fact, REDBALDKNIGHT has been zeroing in on Japanese organizations as early as 2008 — at least based on the file properties of the decoy documents they've been sending to their targets.Carbanak is a backdoor used by the attackers to compromise the victim.This Gorgon Group campaign leveraged spear phishing emails with Microsoft Word documents exploiting CVE-2017-0199.The Korean-language Word document manual.doc appeared in Vietnam on January 17, with the original author name of Honeybee.This malicious document contains a Visual Basic macro that dropped and executed an upgraded version of the implant known as SYSCON, which appeared in 2017 in malicious Word documents as part of several campaigns using North Korea–related topics.Ke3chang has also leveraged a Java zero-day vulnerability (CVE-2012-4681), as well as older, reliable exploits for Microsoft Word (CVE-2010-3333) and Adobe PDF Reader (CVE-2010-2883).For example, DeltaAlfa specifies a DDoS bot family identified as Alfa.This alert's IOC files provide HIDDEN COBRA indicators related to FALLCHILL.The McAfee Advanced Threat Research team discovered a previously unknown data-gathering implant that surfaced in mid-February 2018.This alert's IOC files provide HIDDEN COBRA indicators related to FALLCHILL.The McAfee Advanced Threat Research team discovered a previously unknown data-gathering implant that surfaced in mid-February 2018.Documents with the Flash exploit managed to evade static defenses and remain undetected as an exploit on VirusTotal.This malware report contains analysis of one 32-bit Windows executable file, identified as a Remote Access Trojan (RAT).In one of the samples received for analysis, the US-CERT Code Analysis Team observed botnet controller functionality.Volgmer payloads have been observed in 32-bit form as either executables or dynamic-link library (.dll)Trend Micro endpoint solutions such as Trend Micro™ Smart Protection Suites and Worry-Free™ Business Security can protect users and businesses from these threats by detecting malicious files and spammed messages as well as blocking all related malicious URLs.WannaCry appends encrypted data files with the .WCRY extension, drops and executes a decryptor tool, and demands $300 or $600 USD (via Bitcoin) to decrypt the data.Some of the documents exploited CVE-2017-0199 to deliver the payload.The Leviathan also occasionally used macro-laden Microsoft Word documents to target other US research and development organizations during this period.The download name was " Zawgyi_Keyboard_L.zip ", and it dropped a " setup.exe " that contained several backdoor components, including an Elise " wincex.dll " (a42c966e26f3577534d03248551232f3, detected as Backdoor.Win32.Agent.delp).Both attachments are malicious Word documents that attempt to exploit the Windows OLE Automation Array Remote Code Execution Vulnerability tracked by CVE-2014-6332.To set up persistence, the loader writes a file to " c:\temp\rr.exe " and executes it with specific command line arguments to create auto run registry keys.The Magic Hound campaign was also discovered using a custom dropper tool, which we have named MagicHound.DropIt.For example, we analyzed a DropIt sample (SHA256: cca268c13885ad5751eb70371bbc9ce8c8795654fedb90d9e3886cbcfe323671) that dropped two executables, one of which was saved to "%TEMP%\flash_update.exe " that was a legitimate Flash Player installer.During a recent campaign, APT32 leveraged social engineering emails with Microsoft ActiveMime file attachments to deliver malicious macros.The HTA files contained job descriptions and links to job postings on popular employment websites.These emails included recruitment-themed lures and links to malicious HTML application (HTA) files.POWRUNER was delivered using a malicious RTF file that exploited CVE-2017-0199.ChopShop1 is a new framework developed by the MITRE Corporation for network-based protocol decoders that enable security professionals to understand actual commands issued by human operators controlling endpoints.Attachments are typically sent as an executable file embedded in a ZIP archive or a password-protected Microsoft Office document.This blog post analyzes several recent Molerats attacks that deployed PIVY against targets in the Middle East and in the U.S. We also examine additional PIVY attacks that leverage Arabic-language content related to the ongoing crisis in Egypt and the wider Middle East to lure targets into opening malicious files.The archive contains an .exe file, sometimes disguised as a Microsoft Word file, a video, or another file format, using the corresponding icon.The Palo Alto Networks Unit 42 research team recently came across a series of malicious files which were almost identical to those targeting the Saudi Arabian government previously discussed by MalwareBytes.We found new variants of the Powermud backdoor, a new backdoor (Backdoor.Powemuddy), and custom tools for stealing passwords, creating reverse shells, privilege escalation, and the use of the native Windows cabinet creation tool, makecab.exe, probably for compressing stolen data to be uploaded.Analysts in our DeepSight Managed Adversary and Threat Intelligence (MATI) team have found a new backdoor, Backdoor.Powemuddy, new variants of Seedworm's Powermud backdoor (aka POWERSTATS), a GitHub repository used by the group to store their scripts, as well as several post-compromise tools the group uses to exploit victims once they have established a foothold in their network.Like the previous campaigns, these samples again involve a Microsoft Word document embedded with a malicious macro that is capable of executing PowerShell (PS) scripts leading to a backdoor payload.In May 2018, Trend Micro found a new sample (Detected as W2KM_DLOADR.UHAOEEN) that may be related to this campaign.In May 2018, Trend Micro found a new sample (Detected as W2KM_DLOADR.UHAOEEN) that may be related to this campaign.This bait document, or email attachment, appears to be a standard Word document, but is in fact an CVE-2012-0158 exploit, an executable with a double extension, or an executable with an RTLO filename, so it can execute code without the user's knowledge or consent.Taking a step back, as discussed in the Appendix in our initial OilRig blog, Clayslide delivery documents initially open with a worksheet named " Incompatible " that displays content that instructs the user to " Enable Content " to see the contents of the document, which in fact runs the malicious macro and compromises the system.The backdoor was delivered via a malicious .rtf file that exploited CVE-2017-0199.The vulnerability exists in the old Equation Editor (EQNEDT32.EXE), a component of Microsoft Office that is used to insert and evaluate mathematical formulas.The January 8 attack used a variant of the ThreeDollars delivery document, which we identified as part of the OilRig toolset based on attacks that occurred in August 2017.The email contained an attachment named Seminar-Invitation.doc, which is a malicious Microsoft Word document we track as ThreeDollars.We also identified another sample of ThreeDollars, created on January 15, 2017 with the file name strategy preparation.dot.We had previously observed this author name in use once before, in the very first ThreeDollars document we collected that we had reported on in August 2017.The June 2017 sample of Clayslide contained the same OfficeServicesStatus.vbs file found in the ISMAgent Clayslide document, but instead of having the payload embedded in the macro as segregated base64 strings that would be concatenated, this variant obtained its payload from multiple cells within the " Incompatible " worksheet.During this testing, we saw document filenames that contain the C2 we witnessed in the targeted attack above, specifically the filenames XLS-withyourface.xls and XLS-withyourface – test.xls.These samples appeared to have been created by OilRig during their development and testing activities, all of which share many similarities with the delivery document used in the recent OilRig attack against a Middle Eastern government, N56.15.doc (7cbad6b3f505a199d6766a86b41ed23786bbb99dab9cae6c18936afdc2512f00) that we have also included in Table 1.The attackers sent multiple emails containing macro-enabled XLS files to employees working in the banking sector in the Middle East.In the first week of May 2016, FireEye's DTI identified a wave of emails containing malicious attachments being sent to multiple banks in the Middle East region.Their next move was to list any remote shared drives and then attempt to access remote shares owned by the specific government office they were targeting, again attempting to extract all Word documents.For example, in September 2016, Sowbug infiltrated an organization in Asia, deploying the Felismus backdoor on one of its computers, Computer A, using the file name adobecms.exe in CSIDL_WINDOWS\debug.Symantec has found evidence of Starloader files being named AdobeUpdate.exe, AcrobatUpdate.exe, and INTELUPDATE.EXE among others.The attackers then began to perform reconnaissance activities on Computer A via cmd.exe, collecting system-related information, such as the OS version, hardware configuration, and network information.In September 2015, Kaspersky Lab's Anti-Targeted Attack Platform discovered anomalous network traffic in a government organization network.Symantec detects this threat as Backdoor.Nidiran.Attackers have been known to distribute malicious files masquerading as the legitimate iviewers.dll file and then use DLL load hijacking to execute the malicious code and infect the computer.Once exploit has been achieved, Nidiran is delivered through a self-extracting executable that extracts the components to a .tmp folder after it has been executed.While there have been several Suckfly campaigns that infected organizations with the group's custom malware Backdoor.Nidiran, the Indian targets show a greater amount of post-infection activity than targets in other regions.While there have been several Suckfly campaigns that infected organizations with the group's custom malware Backdoor.Nidiran, the Indian targets show a greater amount of post-infection activity than targets in other regions.This time, however, TA459 opportunistically used spear-phishing emails with a Microsoft Word attachment exploiting the recently patched CVE-2017-0199 to deploy the ZeroT Trojan, which in turn downloaded the PlugX Remote Access Trojan (RAT).This time, however, attackers opportunistically used spear-phishing emails with a Microsoft Word attachment exploiting the recently patched CVE-2017-0199 to deploy the ZeroT Trojan, which in turn downloaded the PlugX Remote Access Trojan (RAT).Data from the early part of this year shows that the Taidoor attackers rampantly used malicious.DOC files to exploit a Microsoft Common Controls vulnerability, CVE-2012-0158.To better understand how the adversary was operating and what other actions they had performed, CTU researchers examined cmd.exe and its supporting processes to uncover additional command line artifacts.In a separate incident, CTU researchers identified a file named s.txt, which is consistent with the output of the Netview host-enumeration tool.Thrip was attempting to remotely install a previously unknown piece of malware (Infostealer.Catchamas) on computers within the victim's network.Catchamas is a custom Trojan designed to steal information from an infected computer and contains additional features designed to avoid detection.The malicious loader will use dynamic-link library (DLL) hijacking — injecting malicious code into a process of a file/application — on sidebar.exe and launch dllhost.exe (a normal file).As we have noted in many earlier reports, attackers commonly use decoy files to trick victims into thinking a malicious document is actually legitimate.The documents attached to spear-phishing e-mails used in both attacks contain code that exploits CVE-2012-0158, which despite its age remains one of the most common Microsoft Word vulnerabilities being exploited by multiple threat actors.Even an experienced user can be fooled by downloading a malicious file that is apparently from adobe.com, since the URL and the IP address correspond to Adobe's legitimate infrastructure.According to Deepen, APT6 has been using spear phishing in tandem with malicious PDF and ZIP attachments or links to malware infected websites that contains a malicious SCR file.Bellingcat also reported the domain had been used previously to host potential decoy documents as detailed in VirusTotal here using hxxp://voguextra.com/decoy.doc.We identified an overlap in the domain voguextra.com, which was used by Bahamut within their " Devoted To Humanity " app to host an image file and as C2 server by the PrayTime iOS app mentioned in our first post.While not detected at the time, Microsoft's antivirus and security products now detect this Barium malicious file and flag the file as " Win32/ShadowPad.A ".MXI Player appears to be a version of the Bahamut agent, designed to record the phone calls and collect other information about the user (com.mxi.videoplay).Like PLEAD, Shrouded Crossbow uses spear-phishing emails with backdoor-laden attachments that utilize the RTLO technique and accompanied by decoy documents.The self-extracting RAR writes a legitimate executable, an actor-created DLL called Loader.dll and a file named readme.txt to the filesystem and then executes the legitimate executable.Leader is Bookworm's main module and controls all of the activities of the Trojan, but relies on the additional DLLs to provide specific functionality.We speculate that other attacks delivering Bookworm were also targeting organizations in Thailand based on the contents of the associated decoys documents, as well as several of the dynamic DNS domain names used to host C2 servers that contain the words " Thai " or " Thailand ".Threat actors may use the date string hardcoded into each Bookworm sample as a build identifier.Due to these changes without a new date string, we believe the date codes are used for campaign tracking rather than a Bookworm build identifier.Another decoy slideshow associated with the Bookworm attack campaign contains photos of an event called Bike for Dad 2015.If the document was delivered with macros instead of exploits (CVE-2012-0158, CVE-2013-3906 or CVE-2014-1761), then the document contained instructions for enabling macros.The executable would install the real Ammyy product, but would also launch a file called either AmmyyService.exe or AmmyySvc.exe which contained the malicious payload.The second, aptly titled " kontrakt87.doc ", copies a generic telecommunications service contract from MegaFon, a large Russian mobile phone operator.In addition to built-in functionalities, the operators of Careto can upload additional modules which can perform any malicious task.Careto's Mask campaign we discovered relies on spear-phishing e-mails with links to a malicious website.Sometimes, the attackers use sub-domains on the exploit websites, to make them seem more legitimate.We initially became aware of Careto when we observed attempts to exploit a vulnerability in our products to make the malware " invisible " in the system.The scanner was identified as the Acunetix Web Vulnerability Scanner which is a commercial penetration testing tool that is readily available as a 14-day trial.The decoy documents dropped suggest that the targets are likely to be politically or militarily motivated, with subjects such as Intelligence reports and political situations being used as lure documents.Lately, Patchwork has been sending multiple RTF files exploiting CVE-2017-8570.The first of which we call' CONFUCIUS_A', a malware family that has links to a series of attacks associated with a backdoor attack method commonly known as SNEEPY (aka ByeByeShell) first reported by Rapid7 in 2013.At first glance CONFUCIUS_B looks very similar to CONFUCIUS_A, and they are also packaged in plain SFX binary files.The CONFUCIUS_B executable is disguised as a PowerPoint presentation, using a Right-To-Left-Override (RTLO) trick and a false icon.We also believe that both clusters of activity have links to attacks with likely Indian origins, the CONFUCIUS_A attacks are linked to the use of SNEEPY/BYEBYESHELL and the CONFUCIUS_B have a loose link to Hangover.The two malware families themselves are also very similar, and therefore we think that the shared technique is an indication of a single developer, or development company, behind both CONFUCIUS_A and CONFUCIUS_B.The Android version, for instance, can steal SMS messages, accounts, contacts, and files, as well as record audio.The documents that exploit CVE2017-11882 download another payload — an HTML Application (HTA) file toting a malicious Visual Basic (VBS) script — from the server, which is executed accordingly by the command-line tool mshta.exe.According to our statistics, as of the beginning of 2015 this botnet encompassed over 250 000 infected devices worldwide including infecting more than 100 financial institutions with 80% of them from the top 20 list.If a bot was installed on a network that was of interest to the hacking group, this bot was then used to upload one of the remote access programs.At first look, it pretends to be a Java related application but after a quick analysis, it was obvious this was something more than just a simple Java file.Contextually relevant emails are sent to specific targets with attached documents that are packed with exploit code and Trojan horse programmes designed to take advantage of vulnerabilities in software installed on the target's computer.The authors of that report identify three primary tools used in the campaigns attributed to Hidden Lynx: Trojan.Naid, Backdoor.Moudoor, and Backdoor.Hikit.The above network shows relationships between three tools used by Hidden Lynx during its VOHO campaign: Trojan.Naid, Backdoor.Moudoor, and Backdoor.Hikit.Symantec during 2012 linked the Elderwood Project to Operation Aurora; Trojan.Naid and Backdoor.Moudoor were also used in Aurora, by the Elderwood Gang, and by Hidden Lynx.One e-mail carried a Microsoft PowerPoint file named " thanks.pps " (VirusTotal), the other a Microsoft Word document named " request.docx ".Around the same time, WildFire also captured an e-mail containing a Word document (" hello.docx ") with an identical hash as the earlier Word document, this time sent to a U.S. Government recipient.The initially-observed " thanks.pps " example tricks the user into running the embedded file named ins8376.exe which loads a payload DLL named mpro324.dll.In this case, the file used the software name " Cyberlink ", and a description of " CLMediaLibrary Dynamic Link Library " and listing version 4.19.9.98.This next stage library copies itself into the System32 directory of the Windows folder after the hardcoded file name — either KBDLV2.DLL or AUTO.DLL, depending on the malware sample.Once BARIUM has established rapport, they spear-phish the victim using a variety of unsophisticated malware installation vectors, including malicious shortcut (.lnk) files with hidden payloads, compiled HTML help (.chm) files, or Microsoft Office documents containing macros or exploits.This was the case in two known intrusions in 2015, where attackers named the implant DLL " ASPNET_FILTER.DLL " to disguise it as the DLL for the ASP.NET ISAPI Filter.In early 2016 the Callisto Group began sending highly targeted spear phishing emails with malicious attachments that contained, as their final payload, the " Scout " malware tool from the HackingTeam RCS Galileo platform.The malicious attachments purported to be invitations or drafts of the agenda for the conference.We encountered the first document exploit called " THAM luan - GD - NCKH2.doc " a few days ago, which appears to be leveraging some vulnerabilities patched with MS12-060.This document, written in Vietnamese, appears to be reviewing and discussing best practices for teaching and researching scientific topics.Examples as early as 2008 document malware operations against Tibetan non-governmental organizations (NGOs) that also targeted Falun Gong and Uyghur groups.There is the exploit code and malware used to gain access to systems, the infrastructure that provides command and control to the malware operator, and the human elements – developers who create the malware, operators who deploy it, and analysts who extract value from the stolen information.The operation against the Tibetan Parliamentarians illustrates the continued use of malicious attachments in the form of documents bearing exploits.The first attack started in early July with a ShimRatReporter payload.In their Operation Tropic Trooper report, Trend Micro documented the behaviour and functionality of an espionage toolkit with several design similarities to those observed in the various components of KeyBoy.The exploit document carrying this alternate KeyBoy configuration also used a decoy document which was displayed to the user after the exploit launched.This technique hides the true C2 server from researchers that do not have access to both the rastls.dll and Sycmentec.config files.This file requires the target to attempt to open the .lnk file, which redirects the user to a Windows Scripting Component (.wsc) file, hosted on an adversary-controlled microblogging page.Upon successful exploitation, the attachment will install the trojan known as NetTraveler using a DLL side-loading attack technique.Kaspersky Lab's products detect the Microsoft Office exploits used in the spear-phishing attacks, including Exploit.MSWord.CVE-2010-333, Exploit.Win32.CVE-2012-0158.The files exploit the well-known Microsoft Office vulnerability, CVE-2012-0158, to execute malicious code in order to take control of the targeted systems.We also discovered an interesting piece of rare malware created by this threat actor – a Bluetooth device harvester.For example, Bisonal malware in 2012 used send() and recv() APIs to communicate with its C2 This Bisonal variant used in the latest attack communicates with one of the following hard-coded C2 addresses by using the HTTP POST method on TCP port 443.Previous reports have discussed Bisonal malware used in attacks against Japan, South Korea and Russia.This particular sample we found targeted an organization in Russia and there is a specific system language check for Cyrillic and no others.If it's Cyrillic and the command to the shell is not ‘ipconfig’, the threat converts the command result text encoding from Cyrillic to UTF-16.Similar to the Bisonal variant targeting the Russian organization, this sample was also disguised as PDF document.The contents of the decoy PDF is a job descriptions with the South Korean Coast Guard.The installed EXE file is almost exactly the same as the DLL version of Bisonal variant used against the Russian organization.ined in the archive is called DriverInstallerU.exe” but its metadata shows that its original name is Interenet Assistant.exe”.In this sample, however, the module names were changed from actors and characters’ names to car models, namely BMW_x1”, BMW_x2” and up to BMW_x8”.wuaupdt.exe is a CMD backdoor, which can receive and execute CMD commands sent from C2.Furthermore, it has similar code logic as previous ones wuaupdt.exe in this attack appears in previous Donot attack, and C2 addresses are same to previous ones.Other open source and semi-legitimate pen-testing tools like nbtscan and powercat are being used for mapping available resources and lateral movement as well.As described in the infection flow, one of the first uses of the AutoHotKey scripts is to upload a screenshot from the compromised PC.Throughout our investigation, we have found evidence that shows operational similarities between this implant and Gamaredon Group.The techniques and modules employed by EvilGnome — that is the use of SFX, persistence with task scheduler and the deployment of information stealing tools—remind us of Gamaredon Group’s Windows tools.We can observe that the sample is very recent, created on Thursday, July 4As can be observed in the illustration above, the makeself script is instructed to run ./setup.sh after unpacking.The ShooterAudio module uses PulseAudio to capture audio from the user's microphone.makeself.sh is a small shell script that generates a self-extractable compressed tar archive from a directory.The RAT, however, had a multitude of functionalities (as listed in the table below) such as to download and execute, compress, encrypt, upload, search directories, etc.In a more recent version of the modified Gh0st RAT malware, Ghost Dragon implemented dynamic packet flags which change the first five bytes of the header in every login request with the controller.One hour later, Bemstour was used against an educational institution in Belgium.Bemstour is specifically designed to deliver a variant of the DoublePulsar backdoor.DoublePulsar is then used to inject a secondary payload, which runs in memory only.A significantly improved variant of the Bemstour exploit tool was rolled out in September 2016, when it was used in an attack against an educational institution in Hong Kong.Bemstour was used again in June 2017 in an attack against an organization in Luxembourg.Between June and September 2017, Bemstour was also used against targets in the Philippines and Vietnam.Development of Bemstour has continued into 2019.Unlike earlier attacks when Bemstour was delivered using Buckeye's Pirpi backdoor, in this attack Bemstour was delivered to the victim by a different backdoor Trojan (Backdoor.Filensfer).The most recent sample of Bemstour seen by Symantec appears to have been compiled on March 23, 2019, eleven days after the zero-day vulnerability was patched by Microsoft.Filensfer is a family of malware that has been used in targeted attacks since at least 2013.While Symantec has never observed the use of Filensfer alongside any known Buckeye tools, information shared privately by another vendor included evidence of Filensfer being used in conjunction with known Buckeye malware (Backdoor.Pirpi).CVE-2017-0143 was also used by two other exploit tools—EternalRomance and EternalSynergy—that were released as part of the Shadow Brokers leak in April 2017.Buckeye's exploit tool, EternalRomance, as well as EternalSynergy, can exploit the CVE-2017-0143 message type confusion vulnerability to perform memory corruption on unpatched victim computers.this RTF exploits again the CVE-2017_1882 on eqnedt32.exe.And the dropper execute the iassvcs.exe to make a side loading and make the persistence.Over the past three years, Filensfer has been deployed against organizations in Luxembourg, Sweden, Italy, the UK, and the U.S.Our analysis of this malware shows that it belongs to Hussarini, also known as Sarhust, a backdoor family that has been used actively in APT attacks targeting countries in the ASEAN region since 2014.OutExtra.exe is a signed legitimate application from Microsoft named finder.exe.Today, this malware is still actively being used against the Philippines.Xagent” is the original filename Xagent.exe whereas seems to be the version of the worm.Our technical analysis of the malware used in these attacks showed close ties to BS2005 backdoors from operation Ke3chang, and to a related TidePool malware family discovered by Palo Alto Networks in 2016 that targeted Indian embassies across the globe.The malicious actors behind the Okrum malware were focused on the same targets in Slovakia that were previously targeted by Ketrican 2015 backdoors.We started connecting the dots when we discovered that the Okrum backdoor was used to drop a Ketrican backdoor, freshly compiled in 2017.In 2017, the same entities that were affected by the Okrum malware and by the 2015 Ketrican backdoors again became targets of the malicious actors.This time, the attackers used new versions of the RoyalDNS malware and a Ketrican 2017 backdoor.According to ESET telemetry, Okrum was first detected in December 2016, and targeted diplomatic missions in Slovakia, Belgium, Chile, Guatemala and Brazil throughout 2017.According to our telemetry, Okrum was used to target diplomatic missions in Slovakia, Belgium, Chile, Guatemala, and Brazil, with the attackers showing a particular interest in Slovakia.The detection evasion techniques we observed in the Okrum malware include embedding the malicious payload within a legitimate PNG image, employing several anti-emulation and anti-sandbox tricks, as well as making frequent changes in implementation.According to ClearSky, the suspected Lazarus operatives looked to leverage a vulnerability in outdated WinRAR file-archiving software that hackers have been exploiting since it was disclosed last month.The diagram below illustrates how we believe the actors behind the Sea Turtle campaign used DNS hijacking to achieve their end goals.If the user enables macro to open the xlsm file, it will then drop the legitimate script engine AutoHotkey along with a malicious script file.Create a link file in the startup folder for AutoHotkeyU32.exe, allowing the attack to persist even after a system restart.Such attacks highlight the need for caution before downloading files from unknown sources and enabling macro for files from unknown sources.Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from 'Fine Dining' questionairies.Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant.UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.'Improvise' is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor).This sample, similar to other Trochilus samples, was deployed using a DLL sideloading method utilizing three files, uploaded to the same folder on the victim machine as identified in US-CERT advisory TA17-117A last revised on December 20, 2018.The configuration file then loads the Trochilus payload into memory by injecting it into a valid system process.Additionally, the same DLL sideloading technique observed in the Visma attack was used, and many of the tools deployed by the APT10 shared naming similarities as well 1.bat, cu.exe, ss.rar, r.exe, pd.exe.Most interestingly, Rapid7 observed the use of the Notepad++ updater gup.exe as a legitimate executable to sideload a malicious DLL (libcurl.dll) in order to deploy a variant of the UPPERCUT backdoor also known as ANEL.Insikt Group analysis of network metadata to and from the VPN endpoint IPs revealed consistent connectivity to Citrix-hosted infrastructure from all eight VPN endpoint IPs starting on August 17, 2018 — the same date the first authenticated login to Visma’s network was made using stolen credentials.KHRAT is a backdoor trojan purported to be used with the China-linked cyberespionage group DragonOK.Rapid7 reviewed malware discovered in the victim’s environment and found implants that used Dropbox as the C2.The analyzed RTF files share the same object dimension (objw2180\objh300) used to track the RTF weaponizer in our previous report, however, the sample was not exploiting CVE-2017-11882 or CVE-2018-0802.After further analysis, it was discovered that the RTF files were exploiting the CVE-2018-0798 vulnerability in Microsoft’s Equation Editor (EQNEDT32).Anomali Researchers were able to identify multiple samples of malicious RTF documents ITW using the same exploit for CVE-2018-0798.The earliest use of the exploit ITW we were able to identify and confirm is a sample (e228045ef57fb8cc1226b62ada7eee9b) dating back to October 2018 (VirusTotal submission of 2018-10-29) with the RTF creation time 2018-10-23.Upon decrypting and executing, it drops two additional files wsc_proxy.exe” (legitimate Avast executable) and a malicious DLL wsc.dll” in the%TEMP% folder.However, Beginning on 25 June 2019, we started observing multiple commodity campaigns Mostly dropping AsyncRAT using the updated RTF weaponizer with the same exploit (CVE-2018-0798).In addition, a current ANY.RUN playback of our observed Elise infection is also available.Upon opening of the MS Word document, our embedded file exploits CVE-2017-11882 to drop a malicious fake Norton Security Shell Extension module, 'NavShExt.dll', which is then injected into iexplore.exe to install the backdoor, begin collection, and activate command and control.Moving through the infection process, NetWitness Endpoint detects the initial exploit CVE-2017-1182 in action as the Microsoft Equation Editor, 'EQNEDT32.exe', scores high for potentially malicious activity.The well-crafted and socially engineered malicious documents then become the first stage of a long and mainly fileless infection chain that eventually delivers POWERSTATS, a signature PowerShell backdoor of this threat group.This powerful backdoor can receive commands from the attackers, enabling it to exfiltrate files from the system it is running on, execute additional scripts, delete files, and more.If the macros in SPK KANUN DEĞİŞİKLİĞİ GİB GÖRÜŞÜ.doc” are enabled, an embedded payload is decoded and saved in the%APPDATA% directory with the name CiscoAny.exe”.INF files have been used in the past by MuddyWater, although they were launched using Advpack.dll and not IEAdvpack.dll.In addition, by using VBA2Graph, we were able to visualize the VBA call graph in the macros of each document.We assume that RunPow stands for run PowerShell, ” and triggers the PowerShell code embedded inside the .dll file.The main delivery method of this type of backdoor is spear phishing emails or spam that uses social engineering to manipulate targets into enabling malicious documents.This includes Python scripts.Usually, the Stageless Meterpreter has the Ext_server_stdapi.x64.dll”, Ext_server_extapi.x64.dll”, and Ext_server_espia.x64.dll” extensions.However, Kaspersky Security Network (KSN) records also contain links that victims clicked from the Outlook web client outlook.live.com” as well as attachments arriving through the Outlook desktop application.The JavaScript forces visiting web browsers to collect and send (via a POST request) web browser, browser version, country of origin, and IP address data to the attacker controlled server jquerycodedownload.live/check.aspx”.We identified two methods to deliver the KerrDown downloader to targets.The link to the final payload of KerrDown was still active during the time of analysis and hence we were able to download a copy which turned out to be a variant of Cobalt Strike Beacon.While investigating KerrDown we found multiple RAR files containing a variant of the malware.The dropped PE file has the distinctive file name 8.t”.The malware was first seen packed with VMProtect; when unpacked the sample didn’t show any similarities with previously known malware.The malware starts communicating with the C&C server by sending basic information about the infected machine.The malware basically provides a remote CMD/PowerShell terminal for the attackers, enabling them to execute scripts/commands and receive the results via HTTP requests.This time the document purported to be about the involvement of the Emir of Qatar in funding ISIS, which was seemingly copied from a website critical of Qatar.The SDK, named SWAnalytics is integrated into seemingly innocent Android applications published on major 3rd party Chinese app stores such as Tencent MyApp, Wandoujia, Huawei App Store, and Xiaomi App Store.After app installation, whenever SWAnalytics senses victims opening up infected applications or rebooting their phones, it silently uploads their entire contacts list to Hangzhou Shun Wang Technologies controlled servers.This module monitors a wide range of device activities including application installation / remove / update, phone restart and battery charge.It turns out that contacts data isn’t the only unusual data SWAnalytics is interested in.With default settings, SWAnalytics will scan through an Android device’s external storage, looking for directory tencent/MobileQQ/WebViewCheck”.From our first malicious sample encounter back in mid-September until now, we have observed 12 infected applications, the majority of which are in the system utility category.By listing sub-folders, SWAnalytics is able to infer QQ accounts which have never been used on the device.To make this data harvesting operation flexible, SWAnalytics equips the ability to receive and process configuration files from a remote Command-and-Control.Whenever users reboot their device or open up Network Speed Master, SWAnalytics will fetch the latest configuration file from http[:]//mbl[.]shunwang[.]com/cfg/config[.]json”.In order to understand SWAnalytics’ impact, we turned to public download volume data available on Chandashi, one of the app store optimization vendors specialized in Chinese mobile application markets.According to Cheetah Mobile’s follow-up investigation, fraudulent behaviors came from two 3rd party SDKs Batmobi, Duapps integrated inside Cheetah SDK.It is likely a new campaign or actor started using Panda Banker since in addition to the previously unseen Japanese targeting, Arbor has not seen any indicator of compromise (IOC) overlaps with previous Panda Banker campaigns.Webinjects targeting Japan, a country we haven’t seen targeted by Panda Banker before.Japan is no stranger to banking malware.Based on recent reports, the country has been plagued by attacks using the Ursnif and Urlzone banking malware.This post was our first analysis of the first Panda Banker campaign that we’ve seen to target financial institutions in Japan.We believe the iOS malware gets installed on already compromised systems, and it is very similar to next stage SEDNIT malware we have found for Microsoft Windows’ systems.One is called XAgent detected as IOS_XAGENT.A and the other one uses the name of a legitimate iOS game, MadCap detected as IOS_ XAGENT.B.Madcap” is similar to the XAgent malware, but the former is focused on recording audio.This full-blown spying framework consists of two packages named ‘Tokyo’ and ‘Yokohama’.Just to highlight its capabilities, TajMahal is able to steal data from a CD burnt by a victim as well as from the printer queue.The first confirmed date when TajMahal samples were seen on a victim’s machine is August 2014.More details about TajMahal are available to customers of the Kaspersky Intelligence Reporting service (contact [email protected]).The delivery of KopiLuwak in this instance is currently unknown as the MSIL dropper has only been observed by Proofpoint researchers on a public malware repository.The earliest step in any possible attack(s) involving this variant of KopiLuwak of which Proofpoint researchers are currently aware begin with the MSIL dropper.The basic chain of events upon execution of the MSIL dropper include dropping and executing both a PDF decoy and a Javascript (JS) dropper.As explained in further detail below, the JS dropper ultimately installs a JS decryptor onto an infected machine that will then finally decrypt and execute the actual KopiLuwak backdoor in memory only.As Proofpoint has not yet observed this attack in the wild it is likely that there is an additional component that leads to the execution of the MSIL payload.The newer variant of KopiLuwak is now capable of exfiltrating files to the C&C as well as downloading files and saving them to the infected machine.We didn’t choose to name it after a vegetable; the .NET malware developers named it Topinambour themselves.The role of the .NET module is to deliver the known KopiLuwak JavaScript Trojan.RocketMan!” (probably a reference to Donald Trump’s nickname for Kim Jong Un) and MiamiBeach” serve as the first beacon messages from the victim to the control server.These could be tools to circumvent internet censorship, such as Softether VPN 4.12” and psiphon3”, or Microsoft Office activators”.These campaign-related VPSs are located in South Africa.The tool does all that a typical Trojan needs to accomplish: upload, download and execute files, fingerprint target systems.The PowerShell version of the Trojan also has the ability to get screenshots.The Trojan is quite similar to the .NET RocketMan Trojan and can handle the same commands; additionally, it includes the #screen” command to take a screenshot.Initial reports about HIGHNOON and its variants reported publicly as Winnti dating back to at least 2013 indicated the tool was exclusive to a single group, contributing to significant conflation across multiple distinct espionage operations.BalkanRAT enables the attacker to remotely control the compromised computer via a graphical interface, i.e, manually; BalkanDoor enables them to remotely control the compromised computer via a command line, i.e, possibly en masse.Both BalkanRAT and BalkanDoor spread in Croatia, Serbia, Montenegro, and Bosnia and Herzegovina.In some of the latest samples of BalkanDoor detected in 2019, the malware is distributed as an ACE archive, disguised as a RAR archive (i.e, not an executable file), specially crafted to exploit the WinRAR ACE vulnerability CVE-2018-20250.The backdoor can connect to any of the C&Cs from a hardcoded list – a measure to increase resilience.The main part of the BalkanRAT malware is a copy of the Remote Utilities software for remote access.China Chopper is a tool that allows attackers to remotely control the target system that needs to be running a web server application before it can be targeted by the tool.China Chopper contains a remote shell (Virtual Terminal) function that has a first suggested command of netstat an|find ESTABLISHED.They download and install an archive containing executables and trivially modified source code of the password-stealing tool Mimikatz Lite as GetPassword.exe.The tool investigates the Local Security Authority Subsystem memory space in order to find, decrypt and display retrieved passwords.The China Chopper actor activity starts with the download and execution of two exploit files which attempt to exploit the Windows vulnerabilities CVE-2015-0062, CVE-2015-1701 and CVE-2016-0099 to allow the attacker to modify other objects on the server.The following archive caught our attention for exploiting a WinRAR unacev2 module vulnerability and for having interesting content.Let’s take a closer look at ITG08’s TTPs that are relevant to the campaign we investigated, starting with its spear phishing and intrusion tactics and covering information on its use of the More_eggs backdoor.Additional capabilities of the More_eggs malware include the download and execution of files and scripts and running commands using cmd.exe.X-Force IRIS determined that the More_eggs backdoor later downloaded additional files, including a signed binary shellcode loader and a signed Dynamic Link Library (DLL), as described below, to create a reverse shell and connect to a remote host.The document exploited CVE-2012-0158 and will decode and write an executable to disk upon infection.iSiGHT Partners has tracked Sandworm Team for some time - and we publicly reported on some of their activities in October 2014, when we discovered their use of a zero-day exploit, CVE-2014-4114.In July of 2015, we identified a full e-mail uploaded to an antivirus scanning service that carried a Scarlet Mimic exploit document.The group uses legitimate administration tools to fly under the radar in their post-exploitation phase, which makes detection of malicious activity, as well as attribution more complicated.Through the exploitation of the HTA handler vulnerability described in CVE-2017-1099, the observed RTF attachments download.In early May, the phishing lures leveraged RTF attachments that exploited the Microsoft Windows vulnerability described in CVE-2017-0199.As early as March 4, 2017, malicious documents exploiting CVE-2017-0199 were used to deliver the LATENTBOT malware.FireEye believes that two actors – Turla and an unknown financially motivated actor – were using the first EPS zero-day CVE-2017-0261, and APT28 was using the second EPS zero-day CVE-2017-0262 along with a new Escalation of Privilege (EOP) zero-day CVE-2017-0263.The first, st07383.en17.docx, continues by utilizing 32 or 64 bit versions of CVE-2017-0001 to escalate privileges before executing a final JavaScript payload containing a malware implant known as SHIRIME.This vulnerability was found in a document named Trump's_Attack_on_Syria_English.docx”.It is possible that CVE-2017-8759 was being used by additional actors.The addition of the EternalBlue exploit to Metasploit has made it easy for threat actors to exploit these vulnerabilities.The Magnitude EK landing page consisted of CVE-2016-0189, which was first reported by FireEye as being used in Neutrino Exploit Kit after it was patched.The malware leverages an exploit, codenamed EternalBlue”, that was released by the Shadow Brokers on April 14, 2017.Some hackers even went onto use the Cisco exploits in the wild.DanderSpritz is the framework for controlling infected machines, different from FuZZbuNch as the latter provides a limited toolkit for the post-exploitation stage with specific functions such as DisableSecurity and EnableSecurity for DarkPulsar.In their latest leak, they have released the UNITEDRAKE NSA exploit, which is a remote access and control tool that can remotely target Windows-based systems to capture desired information and transfer it to a server.On the other hand, ShadowBrokers group made headlines in 2016 when it claimed to have robbed various exploitation tools used by the NSA including the notorious ETERNALBLUE that was a vital component in the WannaCry ransomware campaign causing damages to systems worldwide.In all emails sent to these government officials, the actor used the same attachment: a malicious Microsoft Word document that exploited the CVE-2012-0158 vulnerability to drop a malicious payload.Despite being an older vulnerability, many threat actors continue to leverage CVE-2012-0158 to exploit Microsoft Word.According to the security firm, this campaign targeted Indian military officials via spear-phishing emails, distributing spyware to its victims via an Adobe Reader vulnerability.In order to carry out this operation, it uses publicly available tools, including Mimikatz (Hacktool.Mimikatz) and an open-source tool that exploits a known Windows privilege escalation vulnerability (CVE-2016-0051) on unpatched computers.Each of the spear phishing attacks contained links to .doc files, which were really RTF documents that attempt to exploit CVE-2017-8570 (Composite Moniker).The Word document usually exploits CVE-2012-0158.Sometimes the attackers send an MS PowerPoint document instead, which exploits CVE-2014-6352.Sometimes Patchwork send an MS PowerPoint document instead, which exploits CVE-2014-6352.The malicious documents that Unit 42 examined contained legitimate decoy lures as well as malicious embedded EPS files targeting the CVE-2015-2545 and CVE-2017-0261 vulnerabilities.One of the favorite methods used by the Pitty Tiger group to infect users is to use a Microsoft Office Word document which exploits a specific vulnerability (CVE-2012-0158).The document, when opened, used an embedded ActiveX control to download a JavaScript file from a remote site that used a previously unknown vulnerability in some versions of Windows (later designated CVE-2013-7331) to read information about the browser's installed components.The document files exploit at least three known vulnerabilities in Microsoft Office, which we discuss in the Infection Techniques section.In all emails sent to these government officials, the actor used the same attachment: a malicious Microsoft Word document that exploited the CVE-2012-0158 vulnerability to drop a malicious payload.According to the security firm, this campaign targeted Indian military officials via spear-phishing emails, distributing spyware to its victims via an Adobe Reader vulnerability.PLATINUM's persistent use of spear phishing tactics (phishing attempts aimed at specific individuals) and access to previously undiscovered zero-day exploits have made it a highly resilient threat.The group's persistent use of spear phishing tactics (phishing attempts aimed at specific individuals) and access to previously undiscovered zero-day exploits have made it a highly resilient threat.We believe that the Carbanak campaign is a clear indicator of a new era in cybercrime in which criminals use APT techniques directly against the financial industry instead of through its customers.Carbanak has its origin in more common financial fraud including theft from consumer and corporate bank accounts in Europe and Russia, using standard banking malware, mainly Carberp.However, in September last year, our friends at CSIS published a blog detailing a new Carbanak variant affecting one of its customers.PIVY also played a key role in the 2011 campaign known as Nitro that targeted chemical makers, government agencies, defense contractors, and human rights groups.10,11 Still active a year later, the Nitro attackers used a zero-day vulnerability in Java to deploy PIVY in 2012.Each of the spear phishing attacks contained links to .doc files, which were really RTF documents that attempt to exploit CVE-2017-8570 (Composite Moniker).The Word document usually exploits CVE-2012-0158.Sometimes the attackers send an MS PowerPoint document instead, which exploits CVE-2014-6352.Sometimes Patchwork send an MS PowerPoint document instead, which exploits CVE-2014-6352.The malicious documents that Unit 42 examined contained legitimate decoy lures as well as malicious embedded EPS files targeting the CVE-2015-2545 and CVE-2017-0261 vulnerabilities.Older documents used by Patchwork focused on the CVE-2017-0261 vulnerability, however in late January 2018 when, paradoxically, newer documents abandoned this vulnerability to attack the older CVE-2015-2545 vulnerability.PittyTiger has also been seen using Heartbleed vulnerability in order to directly get valid credentials.They have also been seen using Heartbleed vulnerability in order to directly get valid credentials.One of the favorite methods used by the Pitty Tiger group to infect users is to use a Microsoft Office Word document which exploits a specific vulnerability (CVE-2012-0158).PittyTiger could also use CVE-2014-1761, which is more recent.PLATINUM is known to have used a number of zero-day exploits, for which no security update is available at the time of transmission, in these attempts.The document, when opened, used an embedded ActiveX control to download a JavaScript file from a remote site that used a previously unknown vulnerability in some versions of Windows (later designated CVE-2013-7331) to read information about the browser's installed components.When the document was opened in Word, PLATINUM exploited a previously unknown vulnerability in the Microsoft Office PostScript interpreter (designated CVE-2015-2545) that enabled it to execute the attacker's code and drop an attacker-generated malicious DLL onto the computer.The DLL exploited another previously unknown vulnerability (designated CVE-2015-2546) in the Windows kernel, which enabled it to elevate privileges for the Word executable and subsequently install a backdoor through the application.When the document was opened in Word, it exploited a previously unknown vulnerability in the Microsoft Office PostScript interpreter (designated CVE-2015-2545) that enabled it to execute the attacker's code and drop an attacker-generated malicious DLL onto the computer.In total, PLATINUM made use of four zero-day exploits during these two attack campaigns (two remote code execution bugs, one privilege escalation, and one information disclosure), showing an ability to spend a non-trivial amount of resources to either acquire professionally written zero-day exploits from unknown markets, or research and utilize the zero-day exploits themselves.PLATINUM has used several zero-day exploits against their victims.Even if CVE-2015-2546 affected Windows 10, the exploitation would have required much more technical prowess to succeed; ultimately, SMEP makes it more difficult for attackers.For example, one zero-day vulnerability exploit (CVE-2015-2545) used by PLATINUM was addressed immediately in September 2015.It possesses a wide range of technical exploitation capabilities, significant resources for researching or purchasing complicated zero-day exploits, the ability to sustain persistence across victim networks for years, and the manpower to develop and maintain a large number of tools to use within unique victim networks.In 2016, an attack campaign by this group was recorded in early May that made use of an exploit for CVE-2016-4117, a vulnerability in Adobe Flash Player, which at the time was both unknown and unpatched.To deliver the malware to the victim machines, the Rocke group exploits vulnerabilities in Apache Struts 2, Oracle WebLogic, and Adobe ColdFusion.However, around a month ago, Rocke started targeting systems that run Jenkins by attempting to exploit CVE-2018-1000861 and CVE-2019-1003000.The Shadow Brokers first emerged in August, when they posted links to a selection of NSA exploits and hacking tools onto Github and other websites.In April, 2018, the 360 Core Security takes the lead in capturing the APT-C-06 group’s new APT attack using 0-day vulnerabilities (CVE-2018-8174) in the wild.The group has demonstrated access to zero-day vulnerabilities (CVE-2018-0802), and the ability to incorporate them into operations.FireEye observed a high volume of activity associated with the exploitation of CVE-2017-10271 following the public posting of proof of concept code in December 2017.If the lateral movement with credentials fails, then the malware uses PingCastle MS17-010 scanner (PingCastle is a French Active Directory security tool) to scan that particular host to determine if its vulnerable to EternalBlue, and uses it to spread to that host.Tactic #1: Delivering the miner directly to a vulnerable serverSome tactics we've observed involve exploiting CVE-2017-10271, leveraging PowerShell to download the miner directly onto the victim’s system (Figure 1), and executing it using ShellExecute().We assess that the actors employing this latest Flash zero-day are a suspected North Korean group we track as TEMP.Reaper.Figure 2: Zyklon attack flowInfection Techniques CVE-2017-8759.This vulnerability was discovered by FireEye in September 2017, and it is a vulnerability we have observed being exploited in the wild.Figure 3: Embedded URL in OLE object CVE-2017-11882 Similarly, we have also observed actors leveraging another recently discovered vulnerability (CVE-2017-11882) in Microsoft Office.The other overlapping files are tools used by the adversary to locate other systems on the network (etool.exe), check to see if they are vulnerable to CVE-2017-0144 (EternalBlue) patched in MS07-010 (checker1.exe) and pivot to them using remote execution functionality offered by a tool similar to PsExec offered by Impacket (psexec.exe).The files uploaded to this webshell included the same compiled python script that would scan remote systems that were vulnerable to CVE-2017-0144 (EternalBlue) that we saw uploaded to the other errr.aspx webshell.We believe the actors pivoted to other systems on the network using stolen credentials and by exploiting the CVE-2017-0144 (EternalBlue) vulnerability patched in MS17-010.Code contained inside one of the slides triggers an exploit for CVE-2017-8759, a remote code execution vulnerability in Microsoft .NET framework.According to FireEye, the admin@338 sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL.According to FireEye, the attackers sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL.Similar to RIPTIDE campaigns, APT12 infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158.The Sofacy group spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware.APT28 spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware.The group spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware.APT28 is using novel techniques involving the EternalBlue exploit and the open source tool Responder to spread laterally through networks and likely target travelers.The JHUHUGIT implant became a relatively popular first stage for the Sofacy attacks and was used again with a Java zero-day (CVE-2015-2590) in July 2015.We are however only aware of one instance - the exploitation of CVE-2013-0640 to deploy MiniDuke - where we believe the exploited vulnerability was a zero-day at the time that the group acquired the exploit.FireEye confirmed that since at least November 2017, APT37 exploited a zero-day Adobe Flash vulnerability, CVE-2018-4878, to distribute DOGCALL malware to South Korean victims.FireEye iSIGHT Intelligence confirmed that since at least November 2017, APT37 exploited a zero-day Adobe Flash vulnerability, CVE-2018-4878, to distribute DOGCALL malware to South Korean victims.A well-funded, highly active group of Middle Eastern hackers was caught, yet again, using a lucrative zero-day exploit in the wild to break into computers and infect them with powerful spyware developed by an infamous cyberweapons dealer named Gamma Group.A well-funded, highly active BlackOasis group of Middle Eastern hackers was caught, yet again, using a lucrative zero-day exploit in the wild to break into computers and infect them with powerful spyware developed by an infamous cyberweapons dealer named Gamma Group.Kaspersky found the BlackOasis group was exploiting a Adobe Flash Player zero-day vulnerability (CVE-2016-4117) to remotely deliver the latest version of " FinSpy " malware, according to a new blog post published Monday.Kaspersky found the group was exploiting a Adobe Flash Player zero-day vulnerability (CVE-2016-4117) to remotely deliver the latest version of " FinSpy " malware, according to a new blog post published Monday.BRONZE BUTLER has demonstrated the ability to identify a significant zero-day vulnerability within a popular Japanese corporate tool and then use scan-and-exploit techniques to indiscriminately compromise Japanese Internet-facing enterprise systems.The group has demonstrated the ability to identify a significant zero-day vulnerability within a popular Japanese corporate tool and then use scan-and-exploit techniques to indiscriminately compromise Japanese Internet-facing enterprise systems.BRONZE BUTLER has used phishing emails with Flash animation attachments to download and execute Daserf malware, and has also leveraged Flash exploits for SWC attacks.The group has used phishing emails with Flash animation attachments to download and execute Daserf malware, and has also leveraged Flash exploits for SWC attacks.While investigating a 2016 intrusion, Secureworks identified BRONZE BUTLER exploiting a then-unpatched remote code execution vulnerability (CVE-2016-7836) in SKYSEA Client View, a popular Japanese product used to manage an organization.While investigating a 2016 intrusion, Secureworks incident responders identified BRONZE BUTLER exploiting a then-unpatched remote code execution vulnerability (CVE-2016-7836) in SKYSEA Client View, a popular Japanese product used to manage an organization.Carbanak is a remote backdoor (initially based on Carberp), designed for espionage, data exfiltration and to provide remote access to infected machines.If found on the target system, Carbanak will try to exploit a known vulnerability in Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows 8, and Windows Server 2012, CVE-2013-3660, for local privilege escalation.To enable connections to the infected computer using the Remote Desktop Protocol (RDP), Carbanak sets Termservice service execution mode to Auto.Carbanak is also aware of the IFOBS banking application and can, on command, substitute the details of payment documents in the IFOBS system.Sensitive bank documents have be found on the servers that were controlling Carbanak.Existing telemetry indicates that the Carbanak attackers are trying to expand operations to other Baltic and Central Europe countries, the Middle East, Asia and Africa.We believe that the Carbanak campaign is a clear indicator of a new era in cybercrime in which criminals use APT techniques directly against the financial industry instead of through its customers.This report describes the details and type of operations carried out by Carbanak that focuses on financial industry, such as payment providers, retail industry and PR companies.Carbanak has its origin in more common financial fraud including theft from consumer and corporate bank accounts in Europe and Russia, using standard banking malware, mainly Carberp.From 2013 Carbanak intensified its activity focused on banks and electronic payment systems in Russia and in the post-Soviet space.Since 2013 Carbanak has successfully gained access to networks of more than 50 banks and 5 payment systems.To reduce the risk of losing access to the internal bank network, the Carbanak, in addition to malicious programs, also used for remote access legitimate programs such as Ammy Admin and Team Viewer.Additionally the reports on Carbanak show a different picture, where banks targeted outside of Russia, specifically Europe, USA and Japan are mentioned, which does not match our research.These attacks have included criminal groups responsible for the delivery of NewPosThings, MalumPOS and PoSeidon point of sale Malware, as well as Carbanak from the Russian criminal organization we track as Carbon Spider.The leader of the crime gang behind the Carbanak and Cobalt malware attacks targeting over a 100 financial institutions worldwide has been arrested in Alicante, Spain, after a complex investigation conducted by the Spanish National Police.Since 2013, the cybercrime gang have attempted to attack banks, e-payment systems and financial institutions using pieces of malware they designed, known as Carbanak and Cobalt.Other public tools used by the CopyKittens are Metasploit, a well-known free and open source framework for developing and executing exploit code against a remote target machine; Mimikatz, a post-exploitation tool that performs credential dumping; and Empire, a PowerShell and Python post-exploitation agent.Just a few months later, in February 2015, we announced the discovery of Carbanak, a cyber-criminal gang that used custom malware and APT techniques to steal millions of dollars while infecting hundreds of financial institutions in at least 30 countries.However, in September last year, our friends at CSIS published a blog detailing a new Carbanak variant affecting one of its customers.In one remarkable case, the Carbanak 2.0 gang used its access to a financial institution that stores information about shareholders to change the ownership details of a large company.This Gorgon Group campaign leveraged spear phishing emails with Microsoft Word documents exploiting CVE-2017-0199.Ke3chang has also leveraged a Java zero-day vulnerability (CVE-2012-4681), as well as older, reliable exploits for Microsoft Word (CVE-2010-3333) and Adobe PDF Reader (CVE-2010-2883).While the URL acts similarly to how eye-watch.in: 443 delivers payloads, we also saw the URL leveraging and exploiting security flaws in Flash: CVE-2015-8651, CVE-2016-1019, and CVE-2016-4117.The exploit, which takes advantage of CVE-2018-4878, allows an attacker to execute arbitrary code such as an implant.Documents with the Flash exploit managed to evade static defenses and remain undetected as an exploit on VirusTotal.WannaCry utilizes EternalBlue by crafting a custom SMB session request with hard-coded values based on the target system.WannaCry leverages an exploit, codenamed " EternalBlue ", that was released by the Shadow Brokers on April 14, 2017.Microsoft addressed the SMBv1 vulnerabilities in March 2017 with Security Bulletin MS17-010.The worm leverages an SMBv1 exploit that originates from tools released by the Shadow Brokers threat group in April.If the DoublePulsar backdoor does not exist, then the SMB worm attempts to compromise the target using the Eternalblue SMBv1 exploit.Leafminer has developed exploit payloads for this framework (Table 2) that deliver custom malware through attacks against SMB vulnerabilities described by Microsoft.The EternalBlue exploit from the framework received worldwide attention after being used in the ransomware campaigns WannaCry in May and Petya / NotPetya in June 2017.The Leafminer operators use EternalBlue to attempt lateral movement within target networks from compromised staging servers.Symantec also observed attempts by Leafminer to scan for the Heartbleed vulnerability (CVE-2014-0160) from an attacker-controlled IP address.The attachments exploited CVE-2017-8759 which was discovered and documented only five days prior to the campaign.Some of the documents exploited CVE-2017-0199 to deliver the payload.The group's capabilities are more than the much discussed CVE-2012-0158 exploits over the past few years.Instead, the Spring Dragon group is known to have employed spearphish exploits, strategic web compromises, and watering holes attack.The group's spearphish toolset includes PDF exploits, Adobe Flash Player exploits, and the common CVE-2012-0158 Word exploits including those generated from the infamous " Tran Duy Linh " kit.While this particular actor effectively used their almost worn out CVE-2012-0158 exploits in the past, Spring Dragon employs more involved and creative intrusive activity as well.To mitigate the threat of the described campaign, security teams can consider blocking access to the C2 server 103.236.150.14 and, where applicable, ensure that the Microsoft Security Update KB2553204 is installed in order to patch the CVE-2017-11882 vulnerability.The actors attempted to exploit CVE-2014-6332 using a slightly modified version of the proof-of-concept (POC) code to install a Trojan called Emissary, which is related to the Operation Lotus Blossom campaign.Both attachments are malicious Word documents that attempt to exploit the Windows OLE Automation Array Remote Code Execution Vulnerability tracked by CVE-2014-6332.Lotus Blossom attempted to exploit CVE-2014-6332 using the POC code available in the wild.Lotus Blossom was attempting to exploit CVE-2014-6332 to install a new version of the Emissary Trojan, specifically version 5.3.POWRUNER was delivered using a malicious RTF file that exploited CVE-2017-0199.In November 2017, APT34 leveraged the Microsoft Office vulnerability CVE-2017-11882 to deploy POWRUNER and BONDUPDATER less than a week after Microsoft issued a patch.PIVY also played a key role in the 2011 campaign known as Nitro that targeted chemical makers, government agencies, defense contractors, and human rights groups.10,11 Still active a year later, the Nitro attackers used a zero-day vulnerability in Java to deploy PIVY in 2012.Just recently, PIVY was the payload of a zero-day exploit in Internet Explorer used in what is known as a " strategic web compromise " attack against visitors to a U.S. government website and a variety of others.It came in the form of a " Tran Duy Linh " CVE-2012-0158 exploit kit document MD5: de8a242af3794a8be921df0cfa51885f61 and was observed on April 10, 2014.This bait document, or email attachment, appears to be a standard Word document, but is in fact an CVE-2012-0158 exploit, an executable with a double extension, or an executable with an RTLO filename, so it can execute code without the user's knowledge or consent.PROMETHIUM and NEODYMIUM both used an exploit for CVE-2016-4117, a vulnerability in Adobe Flash Player that, at the time, was both unknown and unpatched.PROMETHIUM and NEODYMIUM both used a zero-day exploit that executed code to download a malicious payload.NEODYMIUM also used the exact same CVE-2016-4117 exploit code that PROMETHIUM used, prior to public knowledge of the vulnerability's existence.In May 2016, two apparently unrelated activity groups, PROMETHIUM and NEODYMIUM, conducted attack campaigns in Europe that used the same zeroday exploit while the vulnerability was publicly unknown.The Middle Eastern hacker group in this case is codenamed " BlackOasis " Kaspersky found the group was exploiting a Adobe Flash Player zero-day vulnerability (CVE-2016-4117) to remotely deliver the latest version of " FinSpy " malware, according to a new blog post published Monday.The discovery by Kaspersky marks at least the fifth zero-day exploit used by BlackOasis and exposed by security researchers since June 2015.Less than a week after Microsoft issued a patch for CVE-2017-11882 on Nov. 14, 2017, FireEye observed an attacker using an exploit for the Microsoft Office vulnerability to target a government organization in the Middle East.The backdoor was delivered via a malicious .rtf file that exploited CVE-2017-0199.In this latest campaign, APT34 leveraged the recent Microsoft Office vulnerability CVE-2017-11882 to deploy POWRUNER and BONDUPDATER.During the past few months, APT34 has been able to quickly incorporate exploits for at least two publicly vulnerabilities (CVE-2017-0199 and CVE-2017-11882) to target organizations in the Middle East.In November 2017, APT34 leveraged the Microsoft Office vulnerability CVE-2017-11882 to deploy POWRUNER and BONDUPDATER less than a week after Microsoft issued a patch.POWRUNER was delivered using a malicious RTF file that exploited CVE-2017-0199.Specifically, Suckfly used a specially crafted web page to deliver an exploit for the Microsoft Windows OLE Remote Code Execution Vulnerability (CVE-2014-6332), which affects specific versions of Microsoft Windows.This time, however, TA459 opportunistically used spear-phishing emails with a Microsoft Word attachment exploiting the recently patched CVE-2017-0199 to deploy the ZeroT Trojan, which in turn downloaded the PlugX Remote Access Trojan (RAT).This time, however, attackers opportunistically used spear-phishing emails with a Microsoft Word attachment exploiting the recently patched CVE-2017-0199 to deploy the ZeroT Trojan, which in turn downloaded the PlugX Remote Access Trojan (RAT).Data from the early part of this year shows that the Taidoor attackers rampantly used malicious.DOC files to exploit a Microsoft Common Controls vulnerability, CVE-2012-0158.TG-3390 uses older exploits to compromise targets, and CTU researchers have not observed the threat actors using zero-day exploits as of this publication.TG-3390 actors have used Java exploits in their SWCs.In particular, TG-3390 has exploited CVE-2011-3544, a vulnerability in the Java Runtime Environment, to deliver the HTTPBrowser backdoor; and CVE-2010-0738, a vulnerability in JBoss, to compromise internally and externally accessible assets used to redirect users' web browsers to exploit code.In particular, the threat actors have exploited CVE-2011-3544, a vulnerability in the Java Runtime Environment, to deliver the HTTPBrowser backdoor; and CVE-2010-0738, a vulnerability in JBoss, to compromise internally and externally accessible assets used to redirect users' web browsers to exploit code.TG-3390's activities indicate a preference for leveraging SWCs and scan-and-exploit techniques to compromise target systems.Even when we observed LuckyMouse using weaponized documents with CVE-2017-11882 (Microsoft Office Equation Editor, widely used by Chinese-speaking actors since December 2017), we can′t prove they were related to this particular attack.LuckyMouse has been spotted using a widely used Microsoft Office vulnerability (CVE-2017-11882).No zero-day vulnerabilities were used to breach targeted networks, instead " TG-3390 relied on old vulnerabilities such as CVE-2011-3544 " — a near-year-old Java security hole — " and CVE-2010-0738 to compromise their targets ", Dell SecureWorks' researchers reported.Execute a command through exploits for CVE-2017-11882.Execute a command through exploits for CVE-2018-0802.The document attached to this e-mail exploits CVE-2012-0158.Tropic Trooper is also still exploiting CVE-2012-0158, as are many threat actors.The documents attached to spear-phishing e-mails used in both attacks contain code that exploits CVE-2012-0158, which despite its age remains one of the most common Microsoft Word vulnerabilities being exploited by multiple threat actors.the backdoor is packaged together with the CVE-2013-5065 EoP exploit and heavily obfuscated.While we were unable to recover the initial vulnerability used, it is possibly the same CVE-2014-0515 Adobe Flash exploit first reported by Cisco TRAC in late July.However, to increase success rates APT20 can use zero-day exploits, so even a properly patched system would be compromised.PLEAD also dabbled with a short-lived, fileless version of their malware when it obtained an exploit for a Flash vulnerability (CVE-2015-5119) that was leaked during the Hacking Team breach.PLEAD also uses CVE-2017-7269, a buffer overflow vulnerability Microsoft Internet Information Services (IIS) 6.0 to compromise the victim's server.Kaspersky Lab has detected a new method of first infection that uses a drive-by-download with a flash exploit (CVE-2015-5119, the one leaked from The Hacking Team incident).If the document was delivered with macros instead of exploits (CVE-2012-0158, CVE-2013-3906 or CVE-2014-1761), then the document contained instructions for enabling macros.Moreover, they used the same exploit kit Niteris as that in the Corkow case.The CVE-2012-0773 was originally discovered by VUPEN and has an interesting story.The decoy documents used by the InPage exploits suggest that the targets are likely to be politically or militarily motivated.While documents designed to exploit the InPage software are rare, they are not new – however in recent weeks Unit42 has observed numerous InPage exploits leveraging similar shellcode, suggesting continued use of the exploit previously discussed by Kaspersky.Compared to Patchwork, whose Trojanized documents exploit at least five security flaws, Confucius' backdoors are delivered through Office files exploiting memory corruption vulnerabilities CVE-2015-1641 and CVE-2017-11882.Lately, Patchwork has been sending multiple RTF files exploiting CVE-2017-8570.Confucius' backdoors are delivered through Office documents exploiting memory corruption vulnerabilities CVE-2015-1641 and CVE-2017-11882.The sctrls backdoor we came across is delivered via RTF files exploiting CVE-2015-1641.The documents that exploit CVE2017-11882 download another payload — an HTML Application (HTA) file toting a malicious Visual Basic (VBS) script — from the server, which is executed accordingly by the command-line tool mshta.exe.Hackers use the exploits " Nitris Exploit Kit " (earlier known as CottonCastle), which is not available in open sources and sold only to trusted users.Hackers first actively spread bots using the Niteris exploit, and then search for infected devices at banks amongst their bots by analyzing IP addresses, cracked passwords and results of the modules performance.In August 2014, some of our users observed targeted attacks with a variation of CVE-2012-0158 and an unusual set of malware.Longhorn, which we internally refer to as " The Lamberts ", first came to the attention of the ITSec community in 2014, when our colleagues from FireEye discovered an attack using a zero day vulnerability (CVE-2014-4148).The first time the Lambert family malware was uncovered publicly was in October 2014, when FireEye posted a blog about a zero day exploit (CVE-2014-4148) used in the wild.While in most cases the infection vector remains unknown, the high profile attack from 2014 used a very complex Windows TTF zero-day exploit (CVE-2014-4148).To further exemplify the proficiency of the attackers leveraging the Lamberts toolkit, deployment of Black Lambert included a rather sophisticated TTF zero day exploit, CVE-2014-4148.This sample was also found to be deployed using the CVE-2012-0158 vulnerability.Our analysis shows that actors attempted to exploit CVE-2012-0158 to install NetTraveler Trojan.Unit 42's analysis shows that NetTraveler attempted to exploit CVE-2012-0158 to install NetTraveler Trojan.Our analysis shows that NetTraveler attempted to exploit CVE-2012-0158 to install NetTraveler Trojan.In this report, we'll review how the actors attempted to exploit CVE-2012-0158 to install the NetTraveler Trojan.In this report, we'll review how NetTraveler attempted to exploit CVE-2012-0158 to install the NetTraveler Trojan.In this report, we'll review how the NetTraveler attempted to exploit CVE-2012-0158 to install the NetTraveler Trojan.Kaspersky Lab's products detect the Microsoft Office exploits used in the spear-phishing attacks, including Exploit.MSWord.CVE-2010-333, Exploit.Win32.CVE-2012-0158.The files exploit the well-known Microsoft Office vulnerability, CVE-2012-0158, to execute malicious code in order to take control of the targeted systems.Earlier this month, Securelist's technology caught another zero-day Adobe Flash Player exploit deployed in targeted attacks.Operation Daybreak appears to have been launched by ScarCruft in March 2016 and employs a previously unknown (0-day) Adobe Flash Player exploit.Adobe Flash Player exploit.It is also possible that ScarCruft deployed another zero day exploit, CVE-2016-0147, which was patched in April.Operation Erebus leverages another Flash Player exploit (CVE-2016-4117) through the use of watering hole attacks.ScarCruft's Operation Erebus leverages another Flash Player exploit (CVE-2016-4117) through the use of watering hole attacks.Nevertheless, resourceful threat actors such as ScarCruft will probably continue to deploy zero-day exploits against their high profile targets.This malware uses the public privilege escalation exploit code CVE-2018-8120 or UACME which is normally used by legitimate red teams.Earlier this month, we caught another zero-day Adobe Flash Player exploit deployed in targeted attacks.The other one, ScarCruft's Operation Erebus employs an older exploit, for CVE-2016-4117 and leverages watering holes.The other one, " Operation Erebus " employs an older exploit, for CVE-2016-4117 and leverages watering holes.The ScarCruft APT gang has made use of a Flash zero day patched Thursday by Adobe to attack more than two dozen high-profile targets in Russia and Asia primarily.Adobe on Thursday patched a zero-day vulnerability in Flash Player that has been used in targeted attacks carried out by a new APT group operating primarily against high-profile victims in Russia and Asia.Researchers at Kaspersky Lab privately disclosed the flaw to Adobe after exploits against the zero-day were used in March by the ScarCruft APT gang in what Kaspersky Lab is calling Operation Daybreak.Kaspersky speculates that ScarCruft could also be behind another zero-day, CVE-2016-0147, a vulnerability in Microsoft XML Core Services that was patched in April.Another set of attacks called Operation Erebus leverages another Flash exploit, CVE-2016-4117, and relies on watering hole attacks as a means of propagation.Thursday's Flash Player update patched 36 vulnerabilities in total including the zero day CVE-2016-4171.Wild Neutron's attacks in 2015 uses a stolen code signing certificate belonging to Taiwanese electronics maker Acer and an unknown Flash Player exploit.Wild Neutron's attack took advantage of a Java zero-day exploit and used hacked forums as watering holes.Instead of Flash exploits, older Wild Neutron exploitation and watering holes used what was a Java zero-day at the end of 2012 and the beginning of 2013, detected by Kaspersky Lab products as Exploit.Java.CVE-2012-3213.b.In that case, we observed Buhtrap using a local privilege escalation exploit, CVE-2019-1132, against one of its victims.Prior to that report, we published detail analysis on malware exploiting CVE-2018-8414 vulnerability (remote code execution in SettingContent-ms), which is believed a work of DarkHydrus.WannaCry incorporated the leaked EternalBlue exploit that used two known vulnerabilities in Windows CVE-2017-0144 and CVE-2017-0145 to turn the ransomware into a worm, capable of spreading itself to any unpatched computers on the victim's network and also to other vulnerable computers connected to the internet.One vulnerability is a Windows zero-day vulnerability (CVE-2019-0703) discovered by Symantec.Bemstour exploits two Windows vulnerabilities in order to achieve remote kernel code execution on targeted computers.The second Windows vulnerability (CVE-2017-0143) was patched in March 2017 after it was discovered to have been used by two exploit tools—EternalRomance and EternalSynergy—that were also released as part of the Shadow Brokers leak.These include CVE-2010-3962 as part of an attack campaign in 2010 and CVE-2014-1776 in 2014.Beginning in August 2016, a group calling itself the Shadow Brokers began releasing tools it claimed to have originated from the Equation Group.The zero-day vulnerability found and reported by Symantec (CVE-2019-0703) occurs due to the way the Windows SMB Server handles certain requests.CVE-2017-0143 was also used by two other exploit tools—EternalRomance and EternalSynergy—that were released as part of the Shadow Brokers leak in April 2017.this RTF exploits again the CVE-2017_1882 on eqnedt32.exe.At this time, we do not believe that the attackers found a new ASA exploit.We believe the groups moved to use CVE-2018-0798 instead of the other Microsoft Equation Editor Remote Code Execution (RCE) vulnerabilities because the former is more reliable as it works on all known versions of Equation Editor.The analyzed RTF files share the same object dimension (objw2180\objh300) used to track the RTF weaponizer in our previous report, however, the sample was not exploiting CVE-2017-11882 or CVE-2018-0802.After further analysis, it was discovered that the RTF files were exploiting the CVE-2018-0798 vulnerability in Microsoft’s Equation Editor (EQNEDT32).Anomali Researchers were able to identify multiple samples of malicious RTF documents ITW using the same exploit for CVE-2018-0798.CVE-2018-0798 is an RCE vulnerability, a stack buffer overflow that can be exploited by a threat actor to perform stack corruption.As observed previously with CVE-2017-11882 and CVE-2018-0802, the weaponizer was used exclusively by Chinese cyber espionage actors for approximately one year December 2017 through December 2018, after which cybercrime actors began to incorporate it in their malicious activity.Analysis of the Royal Road weaponizer has resulted in the discovery that multiple Chinese threat groups started utilizing CVE-2018-0798 in their RTF weaponizer.These findings also suggest that the threat groups have robust exploit developing capabilities because CVE-2018-0798 is not widely reported on and it is typically not incorporated into publicly available weaponizers.Upon opening of the MS Word document, our embedded file exploits CVE-2017-11882 to drop a malicious fake Norton Security Shell Extension module, 'NavShExt.dll', which is then injected into iexplore.exe to install the backdoor, begin collection, and activate command and control.Moving through the infection process, NetWitness Endpoint detects the initial exploit CVE-2017-1182 in action as the Microsoft Equation Editor, 'EQNEDT32.exe', scores high for potentially malicious activity.Attackers relied on Microsoft Equation Editor exploit CVE-2018-0798 to deliver a custom malware that Proofpoint researchers have dubbed Cotx RAT Maudi Surveillance Operation which was previously reported in 2013.specifically CVE-2018-0798, before downloading subsequent payloads.Dubbed ‘Operation Sheep’, this massive data stealing campaign is the first known campaign seen in the wild to exploit the Man-in-the-Disk vulnerability revealed by Check Point Research earlier last year.Notably, APT41 was observed using proof-of-concept exploit code for CVE-2019-3396 within 23 days after the Confluence.We’ve discovered a new version of BalkanDoor with a new method for execution/installation: an exploit of the WinRAR ACE vulnerability CVE-2018-20250.In some of the latest samples of BalkanDoor detected in 2019, the malware is distributed as an ACE archive, disguised as a RAR archive (i.e, not an executable file), specially crafted to exploit the WinRAR ACE vulnerability CVE-2018-20250.The actor attempts to exploit CVE-2018–8440 — an elevation of privilege vulnerability in Windows when it improperly handles calls to Advanced Local Procedure Call — to elevate the privileges using a modified proof-of-concept exploit.The China Chopper actor activity starts with the download and execution of two exploit files which attempt to exploit the Windows vulnerabilities CVE-2015-0062, CVE-2015-1701 and CVE-2016-0099 to allow the attacker to modify other objects on the server.Previously, Cloud Atlas dropped its validator” implant named PowerShower” directly, after exploiting the Microsoft Equation vulnerability CVE-2017-11882 mixed with CVE-2018-0802.The following archive caught our attention for exploiting a WinRAR unacev2 module vulnerability and for having interesting content.Mimikatz is a post-exploitation tool that allows attackers to extract credentials from volatile memory.Analysis of the emails has shown that the attachment contains an exploit for the CVE-2017-11882 vulnerability.The exploit installs Silence’s loader, designed to download backdoors and other malicious programs.We believe Emissary Panda exploited a recently patched vulnerability in Microsoft SharePoint tracked by CVE-2019-0604, which is a remote code execution vulnerability used to compromise the server and eventually install a webshell.Of particular note is their use of tools to identify systems vulnerable to CVE-2017-0144, which is the same vulnerability exploited by EternalBlue that is best known for its use in the WannaCry attacks of 2017.In addition to the aforementioned post-exploitation tools, the actors used these webshells to upload legitimate executables that they would use DLL sideloading to run a malicious DLL that has code overlaps with known Emissary Panda attacks.PUTTER PANDA are a determined adversary group who have been operating for several years, conducting intelligence-gathering operations with a significant focus on the space sector.PUTTER PANDA is likely to continue to aggressively target Western entities that hold valuable information or intellectual property relevant to these interests.Other groups, such as Buhtrap, Corkow and Carbanak, were already known to target and successfully steal money from financial institutions and their customers in Russia.Related or not, one thing is certain: the actor (s) using these customized BlackEnergy malware are intent on stealing information from the targets.The group uses legitimate administration tools to fly under the radar in their post-exploitation phase, which makes detection of malicious activity, as well as attribution more complicated.In 2014, Unit 42 released a report titled " 419 Evolution " that documented one of the first known cases of Nigerian cybercriminals using malware for financial gain.The threat actor attempted to compromise critical assets, such as database servers, billing servers, and the active directory.The threat actor was able to leverage the web shell to run reconnaissance commands, steal credentials, and deploy other tools.In order to exfiltrate data from a network segment not connected to the Internet, the threat actor deployed a modified version of hTran.Our investigation showed that these attacks were targeted, and that the threat actor sought to steal communications data of specific individuals in various countries.The attackers involved in these email campaigns leveraged a variety of distribution mechanisms to deliver the information stealing FormBook malware.We have previously observed APT19 steal data from law and investment firms for competitive economic purposes.APT19 leveraged Rich Text Format (RTF) and macro-enabled Microsoft Excel files to deliver their initial exploits.Mandiant consultants suspect that APT32 was monitoring web logs to track the public IP address used to request remote images.Most of these data-stealing capabilities were present in the oldest variants of CARBANAK that we have seen and some were added over time.Since May 2017, Mandiant experts observed North Korean actors target at least three South Korean cryptocurrency exchanges with the suspected intent of stealing funds.Russian cyber espionage actors use zero-day exploits in addition to less complex measures.If the attackers are attempting to compromise persons involved in SEC filings due to their information access, they may ultimately be pursuing securities fraud or other investment abuse.The HawkEye malware is primarily used for credential theft and is often combined with additional tools to extract passwords from email and web browser applications.HawkEye is a versatile Trojan used by diverse actors for multiple purposes.In this blog we provide insight into the tactics, techniques and procedures (TTPs) of a Brazilian cyber crime group that specializes in payment card fraud operations.The threat actors, observed by FireEye Labs, use a variety of different methods to either compromise or acquire already compromised payment card credentials, including sharing or purchasing dumps online, hacking vulnerable merchant websites and compromising payment card processing devices.Once in their possession, the actors use these compromised payment card credentials to generate further card information.The members of the group use a variety of tools, including CCleaner, on a daily basis to effectively remove any evidence of their operations.We have also observed them using virtual private network services that use IPs based in numerous countries to ensure anonymity and obfuscate criminal operations.Based on our observations, this group uses a variety of different methods to either compromise or acquire already compromised payment card credentials.Similarly, the group takes advantage of freely available consolidations of email credentials, personal information, and other data shared in eCrime forums for fraud purposes.These actors scan websites for vulnerabilities to exploit to illicitly access databases.The group also uses the SQL injection (SQLi) tools Havij Advanced SQL Injection Tool and SQLi Dumper version 7.0 (Figure 4) to scan for and exploit vulnerabilities in targeted eCommerce sites.Once in possession of compromised payment card credentials, these actors use tools commonly known as card generators to generate new card numbers based on the compromised ones, creating additional opportunities for monetization.The actors frequently use the stolen data to create cloned physical cards, which they use to attempt to withdraw funds from ATMs.The group primarily uses the MSR 606 Software (Figure 12) and Hardware (Figure 13) to create cloned cards.However, Brazilian actors commonly use several methods to do so, such as reselling cards they have created, paying bills with stolen cards in return for a portion of the bill's value and reselling illicitly obtained goods.The individuals using Hancitor malware also known by the name Chanitor are no exception and have taken three approaches to deliver the malware in order to ultimately steal data from their victims.Once downloaded and executed, it drops an intermediate payload that further downloads a Pony DLL and Vawtrak executable, which perform data theft and connect to a command and control (C2) server.After the executable is executed, it downloads Pony and Vawtrak malware variants to steal data.Once a valid card with a malicious EMV chip is detected, RIPPER will instantiate a timer to allow a thief to control the machine.Ploutus-D will load KXCashDispenserLib” library implemented by Kalignite Platform (K3A.Platform.dll) to interact with the XFS Manager and control the Dispenser (see Figure 13).DarkPulsar is a very interesting administrative module for controlling a passive backdoor named' sipauth32.tsp' that provides remote control, belonging to this category.According to Wikipedia, the CSS was formed in 1972 to integrate the NSA and the Service Cryptologic Elements (SCE) of the U.S armed forces.The toolset includes reams of documentation explaining how the cyber weapons work, as well as details about their use in highly classified intelligence operations abroad.Emotet is a type of general-purpose malware that evolved from a well-known banking Trojan, " Cridex ", which was first discovered in 2014.It seems that the main objective of the attackers was information gathering from the infected computers.Transparent Tribe has been active for several years and conducting suspected intelligence collection operations against South Asian political and military targets.Between May 2017 and December 2018, a multi-purpose command tool that has been used by Whitefly was also used in attacks against defense, telecoms, and energy targets in Southeast Asia and Russia.In this case, a small group reusing exploit code, some powershell-based malware and mostly social engineering has been able to steal sensitive documents and data from victims since at least November 2015.The group exploits known vulnerabilities in Microsoft Office products to infect their targets with malware.PittyTiger has also been seen using Heartbleed vulnerability in order to directly get valid credentials.They have also been seen using Heartbleed vulnerability in order to directly get valid credentials.The Pitty Tiger group mostly uses spear phishing in order to gain an initial foothold within the targeted environment.Like many such groups, PLATINUM seeks to steal sensitive intellectual property related to government interests, but its range of preferred targets is consistently limited to specific governmental organizations, defense institutes, intelligence agencies, diplomatic institutions, and telecommunication providers in South and Southeast Asia.LATINUM makes a concerted effort to hide their infection tracks, by self-deleting malicious components, or by using server side logic in' one shot mode' where remotely hosted malicious components are only allowed to load once.PLATINUM does not conduct its espionage activity to engage in direct financial gain, but instead uses stolen information for indirect economic advantages.PLATINUM uses a number of different custom-developed backdoors to communicate with infected computers.The lack of any significant evidence of shared code between any of these backdoor families is another clue as to the scope of the resources on which the activity group is able to draw, and the precautions the group is willing and able to take in order to avoid losing its ability to conduct its espionage operations.PLATINUM has developed or commissioned a number of custom tools to provide the group with access to victim resources.The updated tool has only been seen in a handful of victim computers within organizational networks in Southeast Asia—PLATINUM is known to customize tools based on the network architecture of targeted organizations.The PLATINUM tool is, to our knowledge, the first malware sample observed to misuse chipset features in this way.The Poseidon Group actively targets this sort of corporate environment for the theft of intellectual property and commercial information, occasionally focusing on personal information on executives.This particular unit is believed to hack into victim companies throughout the world in order to steal corporate trade secrets, primarily relating to the satellite, aerospace and communication industries.PUTTER PANDA is a determined adversary group, conducting intelligence-gathering operations targeting the Government, Defense, Research, and Technology sectors in the United States, with specific targeting of the US Defense and European satellite and aerospace industries.But according to Gnosticplayers, his foray into a public marketplace like Dream has two goals --besides the first and obvious one being money.However, CTU analysis indicates that GOLD LOWELL is motivated by financial gain, and there is no evidence of the threat actors using network access for espionage or data theft.The targeting of an organization rather than individuals, and the high ransom demands, made BitPaymer stand out from other contemporary ransomware at the time.Ransom demands have varied significantly, suggesting that INDRIK SPIDER likely calculates the ransom amount based on the size and value of the victim organization.Since they were first identified in January 2-16, this adversary has consistently targeted large organizations for high ransom demands.The BokBot malware provides LUNAR SPIDER affiliates with a variety of capabilities to enable credential theft and wire fraud, through the use of webinjects and a malware distribution function.Instead, OurMine had managed to alter WikiLeaks's DNS records (held by a third-party registrar) to direct anyone who tried to visit wikileaks.org to visit a different IP address which definitely wasn't under the control of Julian Assange and his cronies.Alternatively, OurMine might have used social engineering to trick WikiLeaks's DNS provider into handing over the credentials, or simple requested that a password reset link be sent to a compromised email address.Alternatively, the attackers might have used social engineering to trick WikiLeaks's DNS provider into handing over the credentials, or simple requested that a password reset link be sent to a compromised email address.The group's primary goal is demonstrating to companies that they have weak security.The ultimate goal of this threat is to mine Monero cryptocurrency in compromised Linux machines.It is worth noting that during our investigation f-secure uncovered links between infrastructure associated with the Callisto Group and infrastructure used to host online stores selling controlled substances.The tool then starts a new web browser instance on the attacker’s system and submits credentials on the real VPN portal.The malware checks whether its running on a 32-bit or 64-bit system to determine which PowerShell script to grab from the command and control (C2) server.First, the attacker’s mission is to disrupt an operational process rather than steal data.Georgian military security issues, particularly with regard to U.S. cooperation and NATO, provide a strong incentive for Russian state-sponsored threat actors to steal information that sheds light on these topics.The espionage group, which according to the U.S. Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) is linked to the Russian government, returned to low-key intelligence-gathering operations during 2017 and into 2018, targeting a range of military and government targets in Europe and South America.The APT28, which is linked to the Russian government, returned to low-key intelligence-gathering operations during 2017 and into 2018, targeting a range of military and government targets in Europe and South America.Another attack group, Earworm (aka Zebrocy), has been active since at least May 2016 and is involved in what appears to be intelligence gathering operations against military targets in Europe, Central Asia, and Eastern Asia.APT28 is using novel techniques involving the EternalBlue exploit and the open source tool Responder to spread laterally through networks and likely target travelers.This whitepaper explores the tools - such as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, etc- of the Dukes, a well-resourced, highly dedicated and organized cyberespionage group that we believe has been working for the Russian Federation since at least 2008 to collect intelligence in support of foreign and security policy decision-making.The Dukes are a well-resourced, highly dedicated and organized cyberespionage group that we believe has been working for the Russian Federation since at least 2008 to collect intelligence in support of foreign and security policy decision-making.We assess the targeting of multiple companies with aviation-related partnerships to Saudi Arabia indicates that APT33 may possibly be looking to gain insights on Saudi Arabia's military aviation capabilities to enhance Iran's domestic aviation capabilities or to support Iran's military and strategic decision making vis a vis Saudi Arabia.APT33 may possibly be looking to gain insights on Saudi Arabia's military aviation capabilities to enhance Iran's domestic aviation capabilities or to support Iran's military and strategic decision making vis a vis Saudi Arabia.APT33 registered multiple domains that masquerade as Saudi Arabian aviation companies and Western organizations that together have partnerships to provide training, maintenance and support for Saudi's military and commercial fleet.APT33's focus on aviation may indicate the group's desire to gain insight into regional military capabilities to enhance Iran's aviation capabilities or to support Iran's military and strategic decision making.APT33's focus on aviation may indicate the group's desire to gain insight into regional military aviation capabilities to enhance Iran's aviation capabilities or to support Iran's military and strategic decision making.It is possible that APT37's distribution of KARAE malware via torrent websites could assist in creating and maintaining botnets for future distributed denial-of-service (DDoS) attacks, or for other activity such as financially motivated campaigns or disruptive operations.Operation Daybreak appears to have been launched by unknown attackers to infect high profile targets through spear-phishing e-mails.Operation Daybreak appears to have been launched by APT37 to infect high profile targets through spear-phishing e-mails.APT38 is a financially motivated North Korean regime-backed group responsible for conducting destructive attacks against financial institutions, as well as some of the world's largest cyber heists.APT38 is a financially motivated North Korean regime-backed group responsible for conducting destructive attacks against financial institutions, as well as some of the world.APT38 is believed to operate more similarly to an espionage operation, carefully conducting reconnaissance within compromised financial institutions and balancing financially motivated objectives with learning about internal systems.APT38 is a financially motivated group linked to North Korean cyber espionage operators, renown for attempting to steal hundreds of millions of dollars from financial institutions and their brazen use of destructive malware.Based on observed activity, we judge that APT38's primary mission is targeting financial institutions and manipulating inter-bank financial systems to raise large sums of money for the North Korean regime.Since 2015, APT38 has attempted to steal hundreds of millions of dollars from financial institutions.APT38, in particular, is strongly distinguishable because of its specific focus on financial institutions and operations that attempt to use SWIFT fraud to steal millions of dollars at a time.As previously mentioned, we assess with high confidence that APT38's mission is focused on targeting financial institutions to raise money for the North Korean regime.As previously mentioned, we assess with high confidence that APT38's mission is focused on targeting financial institutions and financial systems to raise money for the North Korean regime.Since at least the beginning of 2014, APT38 operations have focused almost exclusively on developing and conducting financially motivated campaigns targeting international entities, whereas TEMP.Hermit is generally linked to operations focused on South Korea and the United States.APT38 relies on DYEPACK, a SWIFT transaction-hijacking framework, to initiate transactions, steal money, and hide any evidence of the fraudulent transactions from the victimized bank.During this heist, APT38 waited for a holiday weekend in the respective countries to increase the likelihood of hiding the transactions from banking authorities.APT39's focus on the widespread theft of personal information sets it apart from other Iranian groups FireEye tracks, which have been linked to influence operations, disruptive attacks, and other threats.APT39's focus on the telecommunications and travel industries suggests intent to perform monitoring, tracking, or surveillance operations against specific individuals, collect proprietary or customer data for commercial or operational purposes that serve strategic requirements related to national priorities, or create additional accesses and vectors to facilitate future campaigns.Targeting data supports the belief that APT39's key mission is to track or monitor targets of interest, collect personal information, including travel itineraries, and gather customer data from telecommunications firms.BRONZE BUTLER uses credential theft tools such as Mimikatz and WCE to steal authentication information from the memory of compromised hosts.Carbanak is a remote backdoor (initially based on Carberp), designed for espionage, data exfiltration and to provide remote access to infected machines.In some cases, the attackers used the Society for Worldwide Interbank Financial Telecommunication (SWIFT) network to transfer money to their accounts.If found on the target system, Carbanak will try to exploit a known vulnerability in Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows 8, and Windows Server 2012, CVE-2013-3660, for local privilege escalation.To enable connections to the infected computer using the Remote Desktop Protocol (RDP), Carbanak sets Termservice service execution mode to Auto.Sometimes, they aim at establishing a foothold on the target's computer to gain access into their organization, but, based on our data, this is usually not their main objective, as opposed to other Iranian threat groups, such as OilRig and CopyKittens.During intense intelligence gathering over the last 24 months, we observed the technical capabilities of the Operation Cleaver team rapidly evolve faster than any previously observed Iranian effort.Gallmaker used lure documents attempt to exploit the Microsoft Office Dynamic Data Exchange (DDE) protocol in order to gain access to victim machines.Just a few months later, in February 2015, we announced the discovery of Carbanak, a cyber-criminal gang that used custom malware and APT techniques to steal millions of dollars while infecting hundreds of financial institutions in at least 30 countries.Our investigations revealed that the attackers drove around several cities in Russia, stealing money from ATMs belonging to different banks.Utilizing KillDisk in the attack scenario most likely served one of two purposes: the attackers covering their tracks after an espionage operation, or it was used directly for extortion or cyber-sabotage.The Lazarus Group's objective was to gain access to the target's environment and obtain key military program insight or steal money.Just last week Lazarus were found stealing millions from ATMs across Asia and Africa.The backdoors Lazarus are deploying are difficult to detect and a significant threat to the privacy and security of enterprises, allowing attackers to steal information, delete files, install malware, and more.Bankshot is designed to persist on a victim's network for further exploitation; thus the Advanced Threat Research team believes this operation is intended to gain access to specific financial organizations.The Leafminer's post-compromise toolkit suggests that Leafminer is looking for email data, files, and database servers on compromised target systems.Another intrusion approach used by Leafminer seems a lot less sophisticated than the previously described methods but can be just as effective: using specific hacktools to guess the login passwords for services exposed by a targeted system.While the group has not yet demonstrated an ICS capability, RASPITE's recent targeting focus and methodology are clear indicators of necessary activity for initial intrusion operations into an IT network to prepare the way for later potential ICS events.FireEye is highlighting a cyber espionage operation targeting crucial technologies and traditional intelligence targets from a China-nexus state sponsored actor we call APT40.APT40 engages in broader regional targeting against traditional intelligence targets, especially organizations with operations in Southeast Asia.The targeting of this individual suggests the actors are interested in breaching the French Ministry of Foreign Affairs itself or gaining insights into relations between France and Taiwan.During a recent campaign, APT32 leveraged social engineering emails with Microsoft ActiveMime file attachments to deliver malicious macros.APT35 also installed BROKEYOLK, a custom backdoor, to maintain persistence on the compromised host.They then proceeded to log directly into the VPN using the credentials of the compromised user.Ultimately, APT35 had used access to hundreds of mailboxes to read email communications and steal data related to Middle East organizations, which later became victims of destructive attacks.The group has repeatedly used social media, particularly LinkedIn, to identify and interact with employees at targeted organizations, and then used weaponized Excel documents to deliver RATs such as PupyRAT.Sometimes, they aim at establishing a foothold on the target's computer to gain access into their organization, but, based on our data, this is usually not their main objective, as opposed to other Iranian threat groups, such as Oilrig1 and CopyKittens2.To sum up, the HBO hacker - Behzad Mesri is a member of Turk Black Hat along with ArYaIeIrAn, who provides infrastructure for Charming Kitten activity via PersianDNS / Mahanserver together with Mohammad Rasoul Akbari, who is a Facebook friend of Behzad Mesri's.They move laterally and escalate system privileges to extract sensitive information — whenever the attacker wants to do so.4,5 Because some RATs used in targeted attacks are widely available, determining whether an attack is part of a broader APT campaign can be difficult.In 2011, three years after the most recent release of PIVY, attackers used the RAT to compromise security firm RSA and steal data about its SecureID authentication system.Attackers can point and click their way through a compromised network and exfiltrate data.The campaign, which we refer to as Operation Cloud Hopper, has targeted managed IT service providers (MSPs), allowing APT10 unprecedented potential access to the intellectual property and sensitive data of those MSPs and their clients globally.PwC UK and BAE Systems assess it is highly likely that APT10 is a China-based threat actor with a focus on espionage and wide ranging information collection.APT10 is known to have exfiltrated a high volume of data from multiple victims, exploiting compromised MSP networks, and those of their customers, to stealthily move this data around the world.This, in turn, would provide access to a larger amount of intellectual property and sensitive data.APT10 has been observed to exfiltrate stolen intellectual property via the MSPs, hence evading local network defences.In order to gain any further credentials, APT10 will usually deploy credential theft tools such as mimikatz or PwDump, sometimes using DLL load order hijacking, to use against a domain controller, explained further in Annex B.For example, in addition to compromising high value domain controllers and security servers, the threat actor has also been observed identifying and subsequently installing malware on low profile systems that provide non-critical support functions to the business, and are thus less likely to draw the attention of system administrators.Primarily focused on governments and military operations of countries with interests in the South China Sea, Moafee likely chooses its targets based on region's rich natural resources.By targeting high-tech and manufacturing operations in Japan and Taiwan, DragonOK may be acquiring trade secrets for a competitive economic advantage.It is in use by the Molerats (aka Gaza cybergang), a politically motivated group whose main objective, we believe, is intelligence gathering.DustySky has been developed and used since May 2015 by Molerats (aka " Gaza cybergang "), a terrorist group whose main objective in this campaign is intelligence gathering.FIN7 is a threat actor group that is financially motivated with targets in the restaurant, services and financial sectors.Seedworm likely functions as a cyber espionage group to secure actionable intelligence that could benefit their sponsor's interests.After compromising a system, typically by installing Powermud or Powemuddy, Seedworm first runs a tool that steals passwords saved in users' web browsers and email, demonstrating that access to the victim's email, social media, and chat accounts is one of their likely goals.It was during operator X's network monitoring that the attackers placed Naikon proxies within the countries' borders, to cloak and support real-time outbound connections and data exfiltration from high-profile victim organizations.In addition to stealing keystrokes, Naikon also intercepted network traffic.Although most malware today either seeks monetary gain or conducts espionage for economic advantage, both of these activity groups appear to seek information about specific individuals.PROMETHIUM uses a unique set of tools and methods to perform actions like lateral movement and data exfiltration.Last year, Microsoft researchers described Neodymium's behavior as unusual: " unlike many activity groups, which typically gather information for monetary gain or economic espionage, PROMETHIUM and NEODYMIUM appear to launch campaigns simply to gather information about certain individuals.Unlike many activity groups, which typically gather information for monetary gain or economic espionage, PROMETHIUM and NEODYMIUM appear to launch campaigns simply to gather information about certain individuals.The threat actor behind ProjectSauron commands a top-of-the-top modular cyber-espionage platform in terms of technical sophistication, designed to enable long-term campaigns through stealthy survival mechanisms coupled with multiple exfiltration methods.In March 2016, Symantec published a blog on Suckfly, an advanced cyberespionage group that conducted attacks against a number of South Korean organizations to steal digital certificates.During this time they were able to steal digital certificates from South Korean companies and launch attacks against Indian and Saudi Arabian government organizations.The ultimate objective of targeted attacks is to acquire sensitive data.Like many threat groups, TG-3390 conducts strategic web compromises (SWCs), also known as watering hole attacks, on websites associated with the target organization's vertical or demographic to increase the likelihood of finding victims with relevant information.Based on this information, CTU researchers assess that TG-3390 aims to collect defense technology and capability intelligence, other industrial intelligence, and political intelligence from governments and NGOs.CTU researchers have discovered numerous details about TG-3390 operations, including how the adversaries explore a network, move laterally, and exfiltrate data.Within six hours of entering the environment, the threat actors compromised multiple systems and stole credentials for the entire domain.As of this publication, BRONZE UNION remains a formidable threat group that targets intellectual property and executes its operations at a swift pace.This time the group chose a national data center as its target from an unnamed country in Central Asia in an attempt to gain " access to a wide range of government resources at one fell swoop ".Dell SecureWorks researchers unveiled a report on Threat Group-3390 that has targeted companies around the world while stealing massive amounts of industrial data.LAS VEGAS—Today at the Black Hat information security conference, Dell SecureWorks researchers unveiled a report on a newly detected hacking group that has targeted companies around the world while stealing massive amounts of industrial data.Once inside networks, the group generally targeted Windows network domain controllers and Exchange e-mail servers, targeting user credentials to allow them to move to other systems throughout the targeted network.Also, by creating this type of API access, Turla could use one accessible server as a single point to dump data to and exfiltrate data from.However, based on the findings shared in this report we assess with high confidence that the actor's primary long-term mission is politically focused.The primary goal of these attacks was likely to find code-signing certificates for signing future malware.ALLANITE uses email phishing campaigns and compromised websites called watering holes to steal credentials and gain access to target networks, including collecting and distributing screenshots of industrial control systems.ALLANITE operations limit themselves to information gathering and have not demonstrated any disruptive or damaging capabilities.A current round of cyber-attacks from Chinese source groups are targeting the maritime sector in an attempt to steal technology.Dragos does not corroborate nor conduct political attribution to threat activity.As recently as this past week, researchers observed Chinese hackers escalating cyber-attack efforts to steal military research secrets from US universities.The group has also targeted businesses operating in the South China Sea, which is a strategically important region and the focus of disputes between China and other states.Like many espionage campaigns, much of APT40's activity begins by attempting to trick targets with phishing emails, before deploying malware such as the Gh0st RAT trojan to maintain persistence on a compromised network.The group used malware with keylogging capabilities to monitor the computer of an executive who manages the company's relationships with other telecommunications companies.We suspect that the group sought access to these networks to obtain information that would enable it to monitor communications passing through the providers' systems.Bahamut was shown to be resourceful, not only maintaining their own Android malware but running propaganda sites, although the quality of these activities varied noticeably.One curious trait of Bahamut is that it develops fully-functional applications in support of its espionage activities, rather than push nonfunctional fake apps or bundle malware with legitimate software.Curiously, Bahamut appears to track password attempts in response to failed phishing attempts or to provoke the target to provide more passwords.Thus far, Bahamut's campaigns have appeared to be primarily espionage or information operations – not destructive attacks or fraud.Once the Barium Defendants have access to a victim computer through the malware described above, they monitor the victim's activity and ultimately search for and steal sensitive documents (for example, exfiltration of intellectual property regarding technology has been seen), and personal information fi"om the victim's network.Based on the mutexes and domain names of some of their C&C servers, BlackTech's campaigns are likely designed to steal their target's technology.Bookworm has little malicious functionality built-in, with its only core ability involving stealing keystrokes and clipboard contents.Also, Bookworm uses a combination of encryption and compression algorithms to obfuscate the traffic between the system and C2 server.They have different functions and ways of spreading, but the same purpose — to steal money from the accounts of businesses.At that time it was the name of a cybercriminal group that was stealing money from Russian financial establishments — to the tune of at least $150,000 per hit.Estimating the damages is challenging, but as we learned, the criminals are siphoning off assets in transactions that do not exceed $15,000 each.Once an exploitable page is identified, Clever Kitten will attempt to upload a PHP backdoor to gain remote access to the system.Once an exploitable page is identified, the actor will attempt to upload a PHP backdoor to gain remote access to the system.In Clever Kitten's attacks, the goal is lateral movement; this is an attempt to move further into the target environment in order to begin intelligence collection.Confucius' operations include deploying bespoke backdoors and stealing files from their victim's systems with tailored file stealers, some of which bore resemblances to Patchwork's.Threat actors like Confucius and Patchwork are known for their large arsenal of tools and ever-evolving techniques that can render traditional security solutions — which are often not designed to handle the persistent and sophisticated threats detailed in this blog — ineffective.In order to increase the likelihood of their malware successfully communicating home, cyber espionage threat actors are increasingly abusing legitimate web services, in lieu of DNS lookups to retrieve a command and control address.To spread the Corkow malware criminals use a drive-by downloads method, when victims are infected while visiting compromised legitimate websites.Group-IB specialists detected various sites used by criminals to spread the Trojan: mail tracking websites, news portals, electronic books, computer graphics resources, music portals, etc.Metel is a banking Trojan (also known as Corkow) discovered in 2011 when it was used to attack users of online banking services.After the infection stage, criminals move laterally with the help of legitimate and pentesting tools, stealing passwords from their initial victims (entry point) to gain access to the computers within the organization that have access to money transactions.Delivering a backdoor and spyware, this campaign was designed to steal information from infected systems using a malware client capable of filtering out " uninteresting " files, and spread primarily via a targeted phishing email usually promising a pornographic video.Delivering a backdoor and spyware, Desert Falcons's campaign was designed to steal information from infected systems using a malware client capable of filtering out " uninteresting " files, and spread primarily via a targeted phishing email usually promising a pornographic video.Talos said the perpetrators of DNSpionage were able to steal email and other login credentials from a number of government and private sector entities in Lebanon and the United Arab Emirates by hijacking the DNS servers for these targets, so that all email and virtual private networking (VPN) traffic was redirected to an Internet address controlled by the attackers.Talos reported that these DNS hijacks also paved the way for the attackers to obtain SSL encryption certificates for the targeted domains (e.g.webmail.finance.gov.lb), which allowed them to decrypt the intercepted email and VPN credentials and view them in plain text.This APT group usually carries out target attacks against government agencies to steal sensitive information.All attackers simply moved to new C2 infrastructure, based largely around dynamic DNS domains, in addition to making minimal changes to the malware in order to evade signature-based detection.With GozNym, attackers dupe users by showing them the actual bank's URL and SSL certificate.During these intrusions, LEAD's objective was to steal sensitive data, including research materials, process documents, and project plans.While the machine is in isolation, SOC personnel can direct the infected machine to collect live investigation data, such as the DNS cache or security event logs, which they can use to verify alerts, assess the state of the intrusion, and support follow-up actions.In Russia, there were several relatively large cybercriminal groups engaged in financial theft via attacks on RBS.Since 2011, the robbers had allegedly been stealing money directly from bank accounts in Russia and other countries of the Commonwealth of Independent States (CIS) by using a Trojan called Lurk.Cadelle's threats are capable of opening a back door and stealing information from victims' computers.These threats are capable of opening a back door and stealing information from victims' computers.Callisto Group appears to be intelligence gathering related to European foreign and security policy.Based on our analysis of Callisto Group's usage of RCS Galileo, we believe the Callisto Group did not utilize the leaked RCS Galileo source code, but rather used the leaked readymade installers to set up their own installation of the RCS Galileo platform.Called Greenbug, this group is believed to be instrumental in helping Shamoon steal user credentials of targets ahead of Shamoon's destructive attacks.On Tuesday, Arbor Networks said that it has new leads on a credential stealing remote access Trojan (RAT) called Ismdoor, possibly used by Greenbug to steal credentials on Shamoon's behalf.It's now relying on a new DNS-based attack technique to better cloak command and control communications between Greenbug and the malware ", said Dennis Schwarz, research analyst on Arbor's ASERT Team, in an interview with Threatpost.t's now relying on a new DNS-based attack technique to better cloak command and control communications between Greenbug and the malware ", said Dennis Schwarz, research analyst on Arbor's ASERT Team, in an interview with Threatpost.In the context of the Ismdoor RAT, the DNS attack technique is used primarily by Greenbug for stealing credentials.According to the security experts, this collection of malware was discovered after their first initial report was published, meaning that Group 27 ignored the fact they were unmasked and continued to infect their targets regardless, through the same entry point, the Myanmar Union Election Commission (UEC) website.The attackers compromised two legitimate Thai websites to host the malware, which is a tactic this group has used in the past.We were not able to find additional tools, but the attackers again compromised a legitimate Thai website to host their malware, in this case the student portal for a Thai University.As we have seen in some previous targeted malware attacks, the attackers in this incident are taking advantage of services like changeip.com to establish free subdomains in their infrastructure.Blending in with legitimate traffic is a common tactic used by attackers to help fly under the radar.The Tibetan community has been targeted for over a decade by espionage operations that use malware to infiltrate communications and gather information.he Tibetan community has been targeted for over a decade by espionage operations that use malware to infiltrate communications and gather information.In another modification, first observed in the most recent October 11 Parliamentarian operation (version agewkassif), the developer (s) of KeyBoy began using a string obfuscation routine in order to hide many of the critical values referenced within the malware.To control the full operation, MoneyTaker uses a Pentest framework Server.At the end of June 2015 Mofang started its campaign to gather information of a specific target in relation to the sezs: the cpg Corporation.After successfully infecting one of the computers and gaining initial access to the system, the attackers perform reconnaissance of the local network in order to gain domain administrator privileges and eventually consolidate control over the network.This newly observed activity uses a series of redirections and fileless, malicious implementations of legitimate tools to gain access to the targeted systems.The goal of the attackers appears to be to collect intellectual property such as design documents, formulas, and manufacturing processes.The purpose of the attacks appears to be industrial espionage, collecting intellectual property for competitive advantage.This particular threat was also used by hackers to compromise a Korean social network site to steal records of 35 million users.These attacks are primarily targeting private industry in search of key intellectual property for competitive advantage, military institutions, and governmental organizations often in search of documents related to current political events and human rights organizations.Nitro's campaign focused on the chemical sector with the goal of obtaining sensitive documents such as proprietary designs, formulas, and manufacturing processes.This attack campaign focused on the chemical sector with the goal of obtaining sensitive documents such as proprietary designs, formulas, and manufacturing processes.Examples of notable Potao dissemination techniques, some of which were previously unseen, or at least relatively uncommon, include the use of highly-targeted spear-phishing SMS messages to drive potential victims to malware download sites and USB worm functionality that tricked the user into' willingly' executing the trojan.The PassCV group continues to be one of the most successful and active threat groups that leverage a wide array of stolen Authenticode-signing certificates.The PassCV group continues to be extremely effective in compromising both small and large game companies and surreptitiously using their code-signing certificates to infect an even larger swath of organizations.The ScarCruft group keeps expanding its exfiltration targets to steal further information from infected hosts and continues to create tools for additional data exfiltration.Financially motivated APT groups which focus efforts on targeted attacks on the financial sector such as — Anunak, Corkow, Buhtrap — usually managed botnets using developed or modified banking Trojans.They are selective in their attacks and wait for about three months between incidents, which is approximately three times longer than other financially motivated APT groups, like MoneyTaker, Anunak (Carbanak), Buhtrap or Cobalt.The company specializes in finance and natural resources specific to that region.Based on the profile of the victims and the type of information targeted by the attackers, Symantec believes that Butterfly is financially motivated, stealing information it can potentially profit from.Fxmsp specialize in breaching highly secure protected networks to access private corporate and government information.But, thanks to the attackers known affection for decoy documents that pose as news summaries, we were able to date the campaign back to March 2018.Donot attacked government agencies, aiming for classified intelligence.Lazarus is a very active attack group involved in both cyber crime and espionage.To make the fraudulent withdrawals, Lazarus first breaches targeted banks' networks and compromises the switch application servers handling ATM transactions.The operation, known as FASTCash” has enabled Lazarus to fraudulently empty ATMs of cash.This malware in turn intercepts fraudulent Lazarus cash withdrawal requests and sends fake approval responses, allowing the attackers to steal cash from ATMs.The threat actors behind the Sea Turtle campaign were successful in compromising entities by manipulating and falsifying DNS records at various levels in the domain name space.If an attacker was able to compromise an organization's network administrator credentials, the attacker would be able to change that particular organization's DNS records at will.If the attackers were able to obtain one of these EPP keys, they would be able to modify any DNS records that were managed by that particular registrar.Captured legitimate user credentials when users interacted with these actor - controlled servers.During a typical incident, the actor would modify the NS records for the targeted organization, pointing users to a malicious DNS server that provided actor-controlled responses to all DNS queries.The next step for the actor was to build MitM servers that impersonated legitimate services to capture user credentials.This redirection allowed the attackers to harvest credentials of administrators who manage domains with the TLD of Saudi Arabia (.sa).Obtaining access to this ccTLD registrars would have allowed attackers to hijack any domain that used those ccTLDs.Once they have access to the network, they steal the organization's legitimate SSL certificate and use it on actor-controlled servers.The document exploited CVE-2012-0158 and will decode and write an executable to disk upon infection.iSiGHT Partners has tracked Sandworm Team for some time - and we publicly reported on some of their activities in October 2014, when we discovered their use of a zero-day exploit, CVE-2014-4114.In July of 2015, we identified a full e-mail uploaded to an antivirus scanning service that carried a Scarlet Mimic exploit document.The group uses legitimate administration tools to fly under the radar in their post-exploitation phase, which makes detection of malicious activity, as well as attribution more complicated.Through the exploitation of the HTA handler vulnerability described in CVE-2017-1099, the observed RTF attachments download.In early May, the phishing lures leveraged RTF attachments that exploited the Microsoft Windows vulnerability described in CVE-2017-0199.As early as March 4, 2017, malicious documents exploiting CVE-2017-0199 were used to deliver the LATENTBOT malware.FireEye believes that two actors – Turla and an unknown financially motivated actor – were using the first EPS zero-day CVE-2017-0261, and APT28 was using the second EPS zero-day CVE-2017-0262 along with a new Escalation of Privilege (EOP) zero-day CVE-2017-0263.The first, st07383.en17.docx, continues by utilizing 32 or 64 bit versions of CVE-2017-0001 to escalate privileges before executing a final JavaScript payload containing a malware implant known as SHIRIME.This vulnerability was found in a document named Trump's_Attack_on_Syria_English.docx”.It is possible that CVE-2017-8759 was being used by additional actors.The addition of the EternalBlue exploit to Metasploit has made it easy for threat actors to exploit these vulnerabilities.The Magnitude EK landing page consisted of CVE-2016-0189, which was first reported by FireEye as being used in Neutrino Exploit Kit after it was patched.The malware leverages an exploit, codenamed EternalBlue”, that was released by the Shadow Brokers on April 14, 2017.Some hackers even went onto use the Cisco exploits in the wild.DanderSpritz is the framework for controlling infected machines, different from FuZZbuNch as the latter provides a limited toolkit for the post-exploitation stage with specific functions such as DisableSecurity and EnableSecurity for DarkPulsar.In their latest leak, they have released the UNITEDRAKE NSA exploit, which is a remote access and control tool that can remotely target Windows-based systems to capture desired information and transfer it to a server.On the other hand, ShadowBrokers group made headlines in 2016 when it claimed to have robbed various exploitation tools used by the NSA including the notorious ETERNALBLUE that was a vital component in the WannaCry ransomware campaign causing damages to systems worldwide.In all emails sent to these government officials, the actor used the same attachment: a malicious Microsoft Word document that exploited the CVE-2012-0158 vulnerability to drop a malicious payload.Despite being an older vulnerability, many threat actors continue to leverage CVE-2012-0158 to exploit Microsoft Word.According to the security firm, this campaign targeted Indian military officials via spear-phishing emails, distributing spyware to its victims via an Adobe Reader vulnerability.In order to carry out this operation, it uses publicly available tools, including Mimikatz (Hacktool.Mimikatz) and an open-source tool that exploits a known Windows privilege escalation vulnerability (CVE-2016-0051) on unpatched computers.Each of the spear phishing attacks contained links to .doc files, which were really RTF documents that attempt to exploit CVE-2017-8570 (Composite Moniker).The Word document usually exploits CVE-2012-0158.Sometimes the attackers send an MS PowerPoint document instead, which exploits CVE-2014-6352.Sometimes Patchwork send an MS PowerPoint document instead, which exploits CVE-2014-6352.The malicious documents that Unit 42 examined contained legitimate decoy lures as well as malicious embedded EPS files targeting the CVE-2015-2545 and CVE-2017-0261 vulnerabilities.One of the favorite methods used by the Pitty Tiger group to infect users is to use a Microsoft Office Word document which exploits a specific vulnerability (CVE-2012-0158).The document, when opened, used an embedded ActiveX control to download a JavaScript file from a remote site that used a previously unknown vulnerability in some versions of Windows (later designated CVE-2013-7331) to read information about the browser's installed components.The document files exploit at least three known vulnerabilities in Microsoft Office, which we discuss in the Infection Techniques section.In all emails sent to these government officials, the actor used the same attachment: a malicious Microsoft Word document that exploited the CVE-2012-0158 vulnerability to drop a malicious payload.According to the security firm, this campaign targeted Indian military officials via spear-phishing emails, distributing spyware to its victims via an Adobe Reader vulnerability.PLATINUM's persistent use of spear phishing tactics (phishing attempts aimed at specific individuals) and access to previously undiscovered zero-day exploits have made it a highly resilient threat.The group's persistent use of spear phishing tactics (phishing attempts aimed at specific individuals) and access to previously undiscovered zero-day exploits have made it a highly resilient threat.We believe that the Carbanak campaign is a clear indicator of a new era in cybercrime in which criminals use APT techniques directly against the financial industry instead of through its customers.Carbanak has its origin in more common financial fraud including theft from consumer and corporate bank accounts in Europe and Russia, using standard banking malware, mainly Carberp.However, in September last year, our friends at CSIS published a blog detailing a new Carbanak variant affecting one of its customers.PIVY also played a key role in the 2011 campaign known as Nitro that targeted chemical makers, government agencies, defense contractors, and human rights groups.10,11 Still active a year later, the Nitro attackers used a zero-day vulnerability in Java to deploy PIVY in 2012.Each of the spear phishing attacks contained links to .doc files, which were really RTF documents that attempt to exploit CVE-2017-8570 (Composite Moniker).The Word document usually exploits CVE-2012-0158.Sometimes the attackers send an MS PowerPoint document instead, which exploits CVE-2014-6352.Sometimes Patchwork send an MS PowerPoint document instead, which exploits CVE-2014-6352.The malicious documents that Unit 42 examined contained legitimate decoy lures as well as malicious embedded EPS files targeting the CVE-2015-2545 and CVE-2017-0261 vulnerabilities.Older documents used by Patchwork focused on the CVE-2017-0261 vulnerability, however in late January 2018 when, paradoxically, newer documents abandoned this vulnerability to attack the older CVE-2015-2545 vulnerability.PittyTiger has also been seen using Heartbleed vulnerability in order to directly get valid credentials.They have also been seen using Heartbleed vulnerability in order to directly get valid credentials.One of the favorite methods used by the Pitty Tiger group to infect users is to use a Microsoft Office Word document which exploits a specific vulnerability (CVE-2012-0158).PittyTiger could also use CVE-2014-1761, which is more recent.PLATINUM is known to have used a number of zero-day exploits, for which no security update is available at the time of transmission, in these attempts.The document, when opened, used an embedded ActiveX control to download a JavaScript file from a remote site that used a previously unknown vulnerability in some versions of Windows (later designated CVE-2013-7331) to read information about the browser's installed components.When the document was opened in Word, PLATINUM exploited a previously unknown vulnerability in the Microsoft Office PostScript interpreter (designated CVE-2015-2545) that enabled it to execute the attacker's code and drop an attacker-generated malicious DLL onto the computer.The DLL exploited another previously unknown vulnerability (designated CVE-2015-2546) in the Windows kernel, which enabled it to elevate privileges for the Word executable and subsequently install a backdoor through the application.When the document was opened in Word, it exploited a previously unknown vulnerability in the Microsoft Office PostScript interpreter (designated CVE-2015-2545) that enabled it to execute the attacker's code and drop an attacker-generated malicious DLL onto the computer.In total, PLATINUM made use of four zero-day exploits during these two attack campaigns (two remote code execution bugs, one privilege escalation, and one information disclosure), showing an ability to spend a non-trivial amount of resources to either acquire professionally written zero-day exploits from unknown markets, or research and utilize the zero-day exploits themselves.PLATINUM has used several zero-day exploits against their victims.Even if CVE-2015-2546 affected Windows 10, the exploitation would have required much more technical prowess to succeed; ultimately, SMEP makes it more difficult for attackers.For example, one zero-day vulnerability exploit (CVE-2015-2545) used by PLATINUM was addressed immediately in September 2015.It possesses a wide range of technical exploitation capabilities, significant resources for researching or purchasing complicated zero-day exploits, the ability to sustain persistence across victim networks for years, and the manpower to develop and maintain a large number of tools to use within unique victim networks.In 2016, an attack campaign by this group was recorded in early May that made use of an exploit for CVE-2016-4117, a vulnerability in Adobe Flash Player, which at the time was both unknown and unpatched.To deliver the malware to the victim machines, the Rocke group exploits vulnerabilities in Apache Struts 2, Oracle WebLogic, and Adobe ColdFusion.However, around a month ago, Rocke started targeting systems that run Jenkins by attempting to exploit CVE-2018-1000861 and CVE-2019-1003000.The Shadow Brokers first emerged in August, when they posted links to a selection of NSA exploits and hacking tools onto Github and other websites.In April, 2018, the 360 Core Security takes the lead in capturing the APT-C-06 group’s new APT attack using 0-day vulnerabilities (CVE-2018-8174) in the wild.The group has demonstrated access to zero-day vulnerabilities (CVE-2018-0802), and the ability to incorporate them into operations.FireEye observed a high volume of activity associated with the exploitation of CVE-2017-10271 following the public posting of proof of concept code in December 2017.If the lateral movement with credentials fails, then the malware uses PingCastle MS17-010 scanner (PingCastle is a French Active Directory security tool) to scan that particular host to determine if its vulnerable to EternalBlue, and uses it to spread to that host.Tactic #1: Delivering the miner directly to a vulnerable serverSome tactics we've observed involve exploiting CVE-2017-10271, leveraging PowerShell to download the miner directly onto the victim’s system (Figure 1), and executing it using ShellExecute().We assess that the actors employing this latest Flash zero-day are a suspected North Korean group we track as TEMP.Reaper.Figure 2: Zyklon attack flowInfection Techniques CVE-2017-8759.This vulnerability was discovered by FireEye in September 2017, and it is a vulnerability we have observed being exploited in the wild.Figure 3: Embedded URL in OLE object CVE-2017-11882 Similarly, we have also observed actors leveraging another recently discovered vulnerability (CVE-2017-11882) in Microsoft Office.The other overlapping files are tools used by the adversary to locate other systems on the network (etool.exe), check to see if they are vulnerable to CVE-2017-0144 (EternalBlue) patched in MS07-010 (checker1.exe) and pivot to them using remote execution functionality offered by a tool similar to PsExec offered by Impacket (psexec.exe).The files uploaded to this webshell included the same compiled python script that would scan remote systems that were vulnerable to CVE-2017-0144 (EternalBlue) that we saw uploaded to the other errr.aspx webshell.We believe the actors pivoted to other systems on the network using stolen credentials and by exploiting the CVE-2017-0144 (EternalBlue) vulnerability patched in MS17-010.Code contained inside one of the slides triggers an exploit for CVE-2017-8759, a remote code execution vulnerability in Microsoft .NET framework.According to FireEye, the admin@338 sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL.According to FireEye, the attackers sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL.Similar to RIPTIDE campaigns, APT12 infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158.The Sofacy group spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware.APT28 spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware.The group spearphished targets in several waves with Flash exploits leading to their Carberp based JHUHUGIT downloaders and further stages of malware.APT28 is using novel techniques involving the EternalBlue exploit and the open source tool Responder to spread laterally through networks and likely target travelers.The JHUHUGIT implant became a relatively popular first stage for the Sofacy attacks and was used again with a Java zero-day (CVE-2015-2590) in July 2015.We are however only aware of one instance - the exploitation of CVE-2013-0640 to deploy MiniDuke - where we believe the exploited vulnerability was a zero-day at the time that the group acquired the exploit.FireEye confirmed that since at least November 2017, APT37 exploited a zero-day Adobe Flash vulnerability, CVE-2018-4878, to distribute DOGCALL malware to South Korean victims.FireEye iSIGHT Intelligence confirmed that since at least November 2017, APT37 exploited a zero-day Adobe Flash vulnerability, CVE-2018-4878, to distribute DOGCALL malware to South Korean victims.A well-funded, highly active group of Middle Eastern hackers was caught, yet again, using a lucrative zero-day exploit in the wild to break into computers and infect them with powerful spyware developed by an infamous cyberweapons dealer named Gamma Group.A well-funded, highly active BlackOasis group of Middle Eastern hackers was caught, yet again, using a lucrative zero-day exploit in the wild to break into computers and infect them with powerful spyware developed by an infamous cyberweapons dealer named Gamma Group.Kaspersky found the BlackOasis group was exploiting a Adobe Flash Player zero-day vulnerability (CVE-2016-4117) to remotely deliver the latest version of " FinSpy " malware, according to a new blog post published Monday.Kaspersky found the group was exploiting a Adobe Flash Player zero-day vulnerability (CVE-2016-4117) to remotely deliver the latest version of " FinSpy " malware, according to a new blog post published Monday.BRONZE BUTLER has demonstrated the ability to identify a significant zero-day vulnerability within a popular Japanese corporate tool and then use scan-and-exploit techniques to indiscriminately compromise Japanese Internet-facing enterprise systems.The group has demonstrated the ability to identify a significant zero-day vulnerability within a popular Japanese corporate tool and then use scan-and-exploit techniques to indiscriminately compromise Japanese Internet-facing enterprise systems.BRONZE BUTLER has used phishing emails with Flash animation attachments to download and execute Daserf malware, and has also leveraged Flash exploits for SWC attacks.The group has used phishing emails with Flash animation attachments to download and execute Daserf malware, and has also leveraged Flash exploits for SWC attacks.While investigating a 2016 intrusion, Secureworks identified BRONZE BUTLER exploiting a then-unpatched remote code execution vulnerability (CVE-2016-7836) in SKYSEA Client View, a popular Japanese product used to manage an organization.While investigating a 2016 intrusion, Secureworks incident responders identified BRONZE BUTLER exploiting a then-unpatched remote code execution vulnerability (CVE-2016-7836) in SKYSEA Client View, a popular Japanese product used to manage an organization.Carbanak is a remote backdoor (initially based on Carberp), designed for espionage, data exfiltration and to provide remote access to infected machines.If found on the target system, Carbanak will try to exploit a known vulnerability in Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows 8, and Windows Server 2012, CVE-2013-3660, for local privilege escalation.To enable connections to the infected computer using the Remote Desktop Protocol (RDP), Carbanak sets Termservice service execution mode to Auto.Carbanak is also aware of the IFOBS banking application and can, on command, substitute the details of payment documents in the IFOBS system.Sensitive bank documents have be found on the servers that were controlling Carbanak.Existing telemetry indicates that the Carbanak attackers are trying to expand operations to other Baltic and Central Europe countries, the Middle East, Asia and Africa.We believe that the Carbanak campaign is a clear indicator of a new era in cybercrime in which criminals use APT techniques directly against the financial industry instead of through its customers.This report describes the details and type of operations carried out by Carbanak that focuses on financial industry, such as payment providers, retail industry and PR companies.Carbanak has its origin in more common financial fraud including theft from consumer and corporate bank accounts in Europe and Russia, using standard banking malware, mainly Carberp.From 2013 Carbanak intensified its activity focused on banks and electronic payment systems in Russia and in the post-Soviet space.Since 2013 Carbanak has successfully gained access to networks of more than 50 banks and 5 payment systems.To reduce the risk of losing access to the internal bank network, the Carbanak, in addition to malicious programs, also used for remote access legitimate programs such as Ammy Admin and Team Viewer.Additionally the reports on Carbanak show a different picture, where banks targeted outside of Russia, specifically Europe, USA and Japan are mentioned, which does not match our research.These attacks have included criminal groups responsible for the delivery of NewPosThings, MalumPOS and PoSeidon point of sale Malware, as well as Carbanak from the Russian criminal organization we track as Carbon Spider.The leader of the crime gang behind the Carbanak and Cobalt malware attacks targeting over a 100 financial institutions worldwide has been arrested in Alicante, Spain, after a complex investigation conducted by the Spanish National Police.Since 2013, the cybercrime gang have attempted to attack banks, e-payment systems and financial institutions using pieces of malware they designed, known as Carbanak and Cobalt.Other public tools used by the CopyKittens are Metasploit, a well-known free and open source framework for developing and executing exploit code against a remote target machine; Mimikatz, a post-exploitation tool that performs credential dumping; and Empire, a PowerShell and Python post-exploitation agent.Just a few months later, in February 2015, we announced the discovery of Carbanak, a cyber-criminal gang that used custom malware and APT techniques to steal millions of dollars while infecting hundreds of financial institutions in at least 30 countries.However, in September last year, our friends at CSIS published a blog detailing a new Carbanak variant affecting one of its customers.In one remarkable case, the Carbanak 2.0 gang used its access to a financial institution that stores information about shareholders to change the ownership details of a large company.This Gorgon Group campaign leveraged spear phishing emails with Microsoft Word documents exploiting CVE-2017-0199.Ke3chang has also leveraged a Java zero-day vulnerability (CVE-2012-4681), as well as older, reliable exploits for Microsoft Word (CVE-2010-3333) and Adobe PDF Reader (CVE-2010-2883).While the URL acts similarly to how eye-watch.in: 443 delivers payloads, we also saw the URL leveraging and exploiting security flaws in Flash: CVE-2015-8651, CVE-2016-1019, and CVE-2016-4117.The exploit, which takes advantage of CVE-2018-4878, allows an attacker to execute arbitrary code such as an implant.Documents with the Flash exploit managed to evade static defenses and remain undetected as an exploit on VirusTotal.WannaCry utilizes EternalBlue by crafting a custom SMB session request with hard-coded values based on the target system.WannaCry leverages an exploit, codenamed " EternalBlue ", that was released by the Shadow Brokers on April 14, 2017.Microsoft addressed the SMBv1 vulnerabilities in March 2017 with Security Bulletin MS17-010.The worm leverages an SMBv1 exploit that originates from tools released by the Shadow Brokers threat group in April.If the DoublePulsar backdoor does not exist, then the SMB worm attempts to compromise the target using the Eternalblue SMBv1 exploit.Leafminer has developed exploit payloads for this framework (Table 2) that deliver custom malware through attacks against SMB vulnerabilities described by Microsoft.The EternalBlue exploit from the framework received worldwide attention after being used in the ransomware campaigns WannaCry in May and Petya / NotPetya in June 2017.The Leafminer operators use EternalBlue to attempt lateral movement within target networks from compromised staging servers.Symantec also observed attempts by Leafminer to scan for the Heartbleed vulnerability (CVE-2014-0160) from an attacker-controlled IP address.The attachments exploited CVE-2017-8759 which was discovered and documented only five days prior to the campaign.Some of the documents exploited CVE-2017-0199 to deliver the payload.The group's capabilities are more than the much discussed CVE-2012-0158 exploits over the past few years.Instead, the Spring Dragon group is known to have employed spearphish exploits, strategic web compromises, and watering holes attack.The group's spearphish toolset includes PDF exploits, Adobe Flash Player exploits, and the common CVE-2012-0158 Word exploits including those generated from the infamous " Tran Duy Linh " kit.While this particular actor effectively used their almost worn out CVE-2012-0158 exploits in the past, Spring Dragon employs more involved and creative intrusive activity as well.To mitigate the threat of the described campaign, security teams can consider blocking access to the C2 server 103.236.150.14 and, where applicable, ensure that the Microsoft Security Update KB2553204 is installed in order to patch the CVE-2017-11882 vulnerability.The actors attempted to exploit CVE-2014-6332 using a slightly modified version of the proof-of-concept (POC) code to install a Trojan called Emissary, which is related to the Operation Lotus Blossom campaign.Both attachments are malicious Word documents that attempt to exploit the Windows OLE Automation Array Remote Code Execution Vulnerability tracked by CVE-2014-6332.Lotus Blossom attempted to exploit CVE-2014-6332 using the POC code available in the wild.Lotus Blossom was attempting to exploit CVE-2014-6332 to install a new version of the Emissary Trojan, specifically version 5.3.POWRUNER was delivered using a malicious RTF file that exploited CVE-2017-0199.In November 2017, APT34 leveraged the Microsoft Office vulnerability CVE-2017-11882 to deploy POWRUNER and BONDUPDATER less than a week after Microsoft issued a patch.PIVY also played a key role in the 2011 campaign known as Nitro that targeted chemical makers, government agencies, defense contractors, and human rights groups.10,11 Still active a year later, the Nitro attackers used a zero-day vulnerability in Java to deploy PIVY in 2012.Just recently, PIVY was the payload of a zero-day exploit in Internet Explorer used in what is known as a " strategic web compromise " attack against visitors to a U.S. government website and a variety of others.It came in the form of a " Tran Duy Linh " CVE-2012-0158 exploit kit document MD5: de8a242af3794a8be921df0cfa51885f61 and was observed on April 10, 2014.This bait document, or email attachment, appears to be a standard Word document, but is in fact an CVE-2012-0158 exploit, an executable with a double extension, or an executable with an RTLO filename, so it can execute code without the user's knowledge or consent.PROMETHIUM and NEODYMIUM both used an exploit for CVE-2016-4117, a vulnerability in Adobe Flash Player that, at the time, was both unknown and unpatched.PROMETHIUM and NEODYMIUM both used a zero-day exploit that executed code to download a malicious payload.NEODYMIUM also used the exact same CVE-2016-4117 exploit code that PROMETHIUM used, prior to public knowledge of the vulnerability's existence.In May 2016, two apparently unrelated activity groups, PROMETHIUM and NEODYMIUM, conducted attack campaigns in Europe that used the same zeroday exploit while the vulnerability was publicly unknown.The Middle Eastern hacker group in this case is codenamed " BlackOasis " Kaspersky found the group was exploiting a Adobe Flash Player zero-day vulnerability (CVE-2016-4117) to remotely deliver the latest version of " FinSpy " malware, according to a new blog post published Monday.The discovery by Kaspersky marks at least the fifth zero-day exploit used by BlackOasis and exposed by security researchers since June 2015.Less than a week after Microsoft issued a patch for CVE-2017-11882 on Nov. 14, 2017, FireEye observed an attacker using an exploit for the Microsoft Office vulnerability to target a government organization in the Middle East.The backdoor was delivered via a malicious .rtf file that exploited CVE-2017-0199.In this latest campaign, APT34 leveraged the recent Microsoft Office vulnerability CVE-2017-11882 to deploy POWRUNER and BONDUPDATER.During the past few months, APT34 has been able to quickly incorporate exploits for at least two publicly vulnerabilities (CVE-2017-0199 and CVE-2017-11882) to target organizations in the Middle East.In November 2017, APT34 leveraged the Microsoft Office vulnerability CVE-2017-11882 to deploy POWRUNER and BONDUPDATER less than a week after Microsoft issued a patch.POWRUNER was delivered using a malicious RTF file that exploited CVE-2017-0199.Specifically, Suckfly used a specially crafted web page to deliver an exploit for the Microsoft Windows OLE Remote Code Execution Vulnerability (CVE-2014-6332), which affects specific versions of Microsoft Windows.This time, however, TA459 opportunistically used spear-phishing emails with a Microsoft Word attachment exploiting the recently patched CVE-2017-0199 to deploy the ZeroT Trojan, which in turn downloaded the PlugX Remote Access Trojan (RAT).This time, however, attackers opportunistically used spear-phishing emails with a Microsoft Word attachment exploiting the recently patched CVE-2017-0199 to deploy the ZeroT Trojan, which in turn downloaded the PlugX Remote Access Trojan (RAT).Data from the early part of this year shows that the Taidoor attackers rampantly used malicious.DOC files to exploit a Microsoft Common Controls vulnerability, CVE-2012-0158.TG-3390 uses older exploits to compromise targets, and CTU researchers have not observed the threat actors using zero-day exploits as of this publication.TG-3390 actors have used Java exploits in their SWCs.In particular, TG-3390 has exploited CVE-2011-3544, a vulnerability in the Java Runtime Environment, to deliver the HTTPBrowser backdoor; and CVE-2010-0738, a vulnerability in JBoss, to compromise internally and externally accessible assets used to redirect users' web browsers to exploit code.In particular, the threat actors have exploited CVE-2011-3544, a vulnerability in the Java Runtime Environment, to deliver the HTTPBrowser backdoor; and CVE-2010-0738, a vulnerability in JBoss, to compromise internally and externally accessible assets used to redirect users' web browsers to exploit code.TG-3390's activities indicate a preference for leveraging SWCs and scan-and-exploit techniques to compromise target systems.Even when we observed LuckyMouse using weaponized documents with CVE-2017-11882 (Microsoft Office Equation Editor, widely used by Chinese-speaking actors since December 2017), we can′t prove they were related to this particular attack.LuckyMouse has been spotted using a widely used Microsoft Office vulnerability (CVE-2017-11882).No zero-day vulnerabilities were used to breach targeted networks, instead " TG-3390 relied on old vulnerabilities such as CVE-2011-3544 " — a near-year-old Java security hole — " and CVE-2010-0738 to compromise their targets ", Dell SecureWorks' researchers reported.Execute a command through exploits for CVE-2017-11882.Execute a command through exploits for CVE-2018-0802.The document attached to this e-mail exploits CVE-2012-0158.Tropic Trooper is also still exploiting CVE-2012-0158, as are many threat actors.The documents attached to spear-phishing e-mails used in both attacks contain code that exploits CVE-2012-0158, which despite its age remains one of the most common Microsoft Word vulnerabilities being exploited by multiple threat actors.the backdoor is packaged together with the CVE-2013-5065 EoP exploit and heavily obfuscated.While we were unable to recover the initial vulnerability used, it is possibly the same CVE-2014-0515 Adobe Flash exploit first reported by Cisco TRAC in late July.However, to increase success rates APT20 can use zero-day exploits, so even a properly patched system would be compromised.PLEAD also dabbled with a short-lived, fileless version of their malware when it obtained an exploit for a Flash vulnerability (CVE-2015-5119) that was leaked during the Hacking Team breach.PLEAD also uses CVE-2017-7269, a buffer overflow vulnerability Microsoft Internet Information Services (IIS) 6.0 to compromise the victim's server.Kaspersky Lab has detected a new method of first infection that uses a drive-by-download with a flash exploit (CVE-2015-5119, the one leaked from The Hacking Team incident).If the document was delivered with macros instead of exploits (CVE-2012-0158, CVE-2013-3906 or CVE-2014-1761), then the document contained instructions for enabling macros.Moreover, they used the same exploit kit Niteris as that in the Corkow case.The CVE-2012-0773 was originally discovered by VUPEN and has an interesting story.The decoy documents used by the InPage exploits suggest that the targets are likely to be politically or militarily motivated.While documents designed to exploit the InPage software are rare, they are not new – however in recent weeks Unit42 has observed numerous InPage exploits leveraging similar shellcode, suggesting continued use of the exploit previously discussed by Kaspersky.Compared to Patchwork, whose Trojanized documents exploit at least five security flaws, Confucius' backdoors are delivered through Office files exploiting memory corruption vulnerabilities CVE-2015-1641 and CVE-2017-11882.Lately, Patchwork has been sending multiple RTF files exploiting CVE-2017-8570.Confucius' backdoors are delivered through Office documents exploiting memory corruption vulnerabilities CVE-2015-1641 and CVE-2017-11882.The sctrls backdoor we came across is delivered via RTF files exploiting CVE-2015-1641.The documents that exploit CVE2017-11882 download another payload — an HTML Application (HTA) file toting a malicious Visual Basic (VBS) script — from the server, which is executed accordingly by the command-line tool mshta.exe.Hackers use the exploits " Nitris Exploit Kit " (earlier known as CottonCastle), which is not available in open sources and sold only to trusted users.Hackers first actively spread bots using the Niteris exploit, and then search for infected devices at banks amongst their bots by analyzing IP addresses, cracked passwords and results of the modules performance.In August 2014, some of our users observed targeted attacks with a variation of CVE-2012-0158 and an unusual set of malware.Longhorn, which we internally refer to as " The Lamberts ", first came to the attention of the ITSec community in 2014, when our colleagues from FireEye discovered an attack using a zero day vulnerability (CVE-2014-4148).The first time the Lambert family malware was uncovered publicly was in October 2014, when FireEye posted a blog about a zero day exploit (CVE-2014-4148) used in the wild.While in most cases the infection vector remains unknown, the high profile attack from 2014 used a very complex Windows TTF zero-day exploit (CVE-2014-4148).To further exemplify the proficiency of the attackers leveraging the Lamberts toolkit, deployment of Black Lambert included a rather sophisticated TTF zero day exploit, CVE-2014-4148.This sample was also found to be deployed using the CVE-2012-0158 vulnerability.Our analysis shows that actors attempted to exploit CVE-2012-0158 to install NetTraveler Trojan.Unit 42's analysis shows that NetTraveler attempted to exploit CVE-2012-0158 to install NetTraveler Trojan.Our analysis shows that NetTraveler attempted to exploit CVE-2012-0158 to install NetTraveler Trojan.In this report, we'll review how the actors attempted to exploit CVE-2012-0158 to install the NetTraveler Trojan.In this report, we'll review how NetTraveler attempted to exploit CVE-2012-0158 to install the NetTraveler Trojan.In this report, we'll review how the NetTraveler attempted to exploit CVE-2012-0158 to install the NetTraveler Trojan.Kaspersky Lab's products detect the Microsoft Office exploits used in the spear-phishing attacks, including Exploit.MSWord.CVE-2010-333, Exploit.Win32.CVE-2012-0158.The files exploit the well-known Microsoft Office vulnerability, CVE-2012-0158, to execute malicious code in order to take control of the targeted systems.Earlier this month, Securelist's technology caught another zero-day Adobe Flash Player exploit deployed in targeted attacks.Operation Daybreak appears to have been launched by ScarCruft in March 2016 and employs a previously unknown (0-day) Adobe Flash Player exploit.Adobe Flash Player exploit.It is also possible that ScarCruft deployed another zero day exploit, CVE-2016-0147, which was patched in April.Operation Erebus leverages another Flash Player exploit (CVE-2016-4117) through the use of watering hole attacks.ScarCruft's Operation Erebus leverages another Flash Player exploit (CVE-2016-4117) through the use of watering hole attacks.Nevertheless, resourceful threat actors such as ScarCruft will probably continue to deploy zero-day exploits against their high profile targets.This malware uses the public privilege escalation exploit code CVE-2018-8120 or UACME which is normally used by legitimate red teams.Earlier this month, we caught another zero-day Adobe Flash Player exploit deployed in targeted attacks.The other one, ScarCruft's Operation Erebus employs an older exploit, for CVE-2016-4117 and leverages watering holes.The other one, " Operation Erebus " employs an older exploit, for CVE-2016-4117 and leverages watering holes.The ScarCruft APT gang has made use of a Flash zero day patched Thursday by Adobe to attack more than two dozen high-profile targets in Russia and Asia primarily.Adobe on Thursday patched a zero-day vulnerability in Flash Player that has been used in targeted attacks carried out by a new APT group operating primarily against high-profile victims in Russia and Asia.Researchers at Kaspersky Lab privately disclosed the flaw to Adobe after exploits against the zero-day were used in March by the ScarCruft APT gang in what Kaspersky Lab is calling Operation Daybreak.Kaspersky speculates that ScarCruft could also be behind another zero-day, CVE-2016-0147, a vulnerability in Microsoft XML Core Services that was patched in April.Another set of attacks called Operation Erebus leverages another Flash exploit, CVE-2016-4117, and relies on watering hole attacks as a means of propagation.Thursday's Flash Player update patched 36 vulnerabilities in total including the zero day CVE-2016-4171.Wild Neutron's attacks in 2015 uses a stolen code signing certificate belonging to Taiwanese electronics maker Acer and an unknown Flash Player exploit.Wild Neutron's attack took advantage of a Java zero-day exploit and used hacked forums as watering holes.Instead of Flash exploits, older Wild Neutron exploitation and watering holes used what was a Java zero-day at the end of 2012 and the beginning of 2013, detected by Kaspersky Lab products as Exploit.Java.CVE-2012-3213.b.In that case, we observed Buhtrap using a local privilege escalation exploit, CVE-2019-1132, against one of its victims.Prior to that report, we published detail analysis on malware exploiting CVE-2018-8414 vulnerability (remote code execution in SettingContent-ms), which is believed a work of DarkHydrus.WannaCry incorporated the leaked EternalBlue exploit that used two known vulnerabilities in Windows CVE-2017-0144 and CVE-2017-0145 to turn the ransomware into a worm, capable of spreading itself to any unpatched computers on the victim's network and also to other vulnerable computers connected to the internet.One vulnerability is a Windows zero-day vulnerability (CVE-2019-0703) discovered by Symantec.Bemstour exploits two Windows vulnerabilities in order to achieve remote kernel code execution on targeted computers.The second Windows vulnerability (CVE-2017-0143) was patched in March 2017 after it was discovered to have been used by two exploit tools—EternalRomance and EternalSynergy—that were also released as part of the Shadow Brokers leak.These include CVE-2010-3962 as part of an attack campaign in 2010 and CVE-2014-1776 in 2014.Beginning in August 2016, a group calling itself the Shadow Brokers began releasing tools it claimed to have originated from the Equation Group.The zero-day vulnerability found and reported by Symantec (CVE-2019-0703) occurs due to the way the Windows SMB Server handles certain requests.CVE-2017-0143 was also used by two other exploit tools—EternalRomance and EternalSynergy—that were released as part of the Shadow Brokers leak in April 2017.this RTF exploits again the CVE-2017_1882 on eqnedt32.exe.At this time, we do not believe that the attackers found a new ASA exploit.We believe the groups moved to use CVE-2018-0798 instead of the other Microsoft Equation Editor Remote Code Execution (RCE) vulnerabilities because the former is more reliable as it works on all known versions of Equation Editor.The analyzed RTF files share the same object dimension (objw2180\objh300) used to track the RTF weaponizer in our previous report, however, the sample was not exploiting CVE-2017-11882 or CVE-2018-0802.After further analysis, it was discovered that the RTF files were exploiting the CVE-2018-0798 vulnerability in Microsoft’s Equation Editor (EQNEDT32).Anomali Researchers were able to identify multiple samples of malicious RTF documents ITW using the same exploit for CVE-2018-0798.CVE-2018-0798 is an RCE vulnerability, a stack buffer overflow that can be exploited by a threat actor to perform stack corruption.As observed previously with CVE-2017-11882 and CVE-2018-0802, the weaponizer was used exclusively by Chinese cyber espionage actors for approximately one year December 2017 through December 2018, after which cybercrime actors began to incorporate it in their malicious activity.Analysis of the Royal Road weaponizer has resulted in the discovery that multiple Chinese threat groups started utilizing CVE-2018-0798 in their RTF weaponizer.These findings also suggest that the threat groups have robust exploit developing capabilities because CVE-2018-0798 is not widely reported on and it is typically not incorporated into publicly available weaponizers.Upon opening of the MS Word document, our embedded file exploits CVE-2017-11882 to drop a malicious fake Norton Security Shell Extension module, 'NavShExt.dll', which is then injected into iexplore.exe to install the backdoor, begin collection, and activate command and control.Moving through the infection process, NetWitness Endpoint detects the initial exploit CVE-2017-1182 in action as the Microsoft Equation Editor, 'EQNEDT32.exe', scores high for potentially malicious activity.Attackers relied on Microsoft Equation Editor exploit CVE-2018-0798 to deliver a custom malware that Proofpoint researchers have dubbed Cotx RAT Maudi Surveillance Operation which was previously reported in 2013.specifically CVE-2018-0798, before downloading subsequent payloads.Dubbed ‘Operation Sheep’, this massive data stealing campaign is the first known campaign seen in the wild to exploit the Man-in-the-Disk vulnerability revealed by Check Point Research earlier last year.Notably, APT41 was observed using proof-of-concept exploit code for CVE-2019-3396 within 23 days after the Confluence.We’ve discovered a new version of BalkanDoor with a new method for execution/installation: an exploit of the WinRAR ACE vulnerability CVE-2018-20250.In some of the latest samples of BalkanDoor detected in 2019, the malware is distributed as an ACE archive, disguised as a RAR archive (i.e, not an executable file), specially crafted to exploit the WinRAR ACE vulnerability CVE-2018-20250.The actor attempts to exploit CVE-2018–8440 — an elevation of privilege vulnerability in Windows when it improperly handles calls to Advanced Local Procedure Call — to elevate the privileges using a modified proof-of-concept exploit.The China Chopper actor activity starts with the download and execution of two exploit files which attempt to exploit the Windows vulnerabilities CVE-2015-0062, CVE-2015-1701 and CVE-2016-0099 to allow the attacker to modify other objects on the server.Previously, Cloud Atlas dropped its validator” implant named PowerShower” directly, after exploiting the Microsoft Equation vulnerability CVE-2017-11882 mixed with CVE-2018-0802.The following archive caught our attention for exploiting a WinRAR unacev2 module vulnerability and for having interesting content.Mimikatz is a post-exploitation tool that allows attackers to extract credentials from volatile memory.Analysis of the emails has shown that the attachment contains an exploit for the CVE-2017-11882 vulnerability.The exploit installs Silence’s loader, designed to download backdoors and other malicious programs.We believe Emissary Panda exploited a recently patched vulnerability in Microsoft SharePoint tracked by CVE-2019-0604, which is a remote code execution vulnerability used to compromise the server and eventually install a webshell.Of particular note is their use of tools to identify systems vulnerable to CVE-2017-0144, which is the same vulnerability exploited by EternalBlue that is best known for its use in the WannaCry attacks of 2017.NetWire, DarkComet, NanoCore, LuminosityLink, Remcos and Imminent Monitor are all designed to provide remote access to compromised systems.The most common credential stealing tool used by the threat actor was a modified mimikatz that dumps NTLM hashes.This' connection bouncer' tool lets the threat actor redirect ports and connections between different networks and obfuscate C2 server traffic.It is capable of a variety of functions, including credential theft, hard drive and data wiping, disabling security software, and remote desktop functionality.The usefulness of flare-qdb can be seen in cases such as loops dealing with strings.We have also observed them using virtual private network services that use IPs based in numerous countries to ensure anonymity and obfuscate criminal operations.Once downloaded and executed, it drops an intermediate payload that further downloads a Pony DLL and Vawtrak executable, which perform data theft and connect to a command and control (C2) server.Upon execution, it will communicate with an attacker-controller website to download a variant of the Pony malware, pm.dll” along with a standard Vawtrak trojan.RIPPER interacts with the ATM by inserting a specially manufactured ATM card with an EMV chip that serves as the authentication mechanism.RIPPER will examine the contents of directories associated with the targeted ATM vendors and will replace legitimate executables with itself.Once a valid card with a malicious EMV chip is detected, RIPPER will instantiate a timer to allow a thief to control the machine.This malware family can be used to compromise multiple vendor platforms and leverages uncommon technology to access physical devices.From our trend analysis seen in Figure 3, Locky ransomware started being delivered via DOCM format email attachments more extensively beginning in August.Discovered for the first time in Mexico back in 2013, Ploutus enabled criminals to empty ATMs using either an external keyboard attached to the machine or via SMS message, a technique that had never been seen before.FireEye Labs recently identified a previously unobserved version of Ploutus, dubbed Ploutus-D, that interacts with KAL’s Kalignite multivendor ATM platform.That post included download links for a slew of NSA hacking tools and exploits, many of which could be used to break into hardware firewall appliances, and in turn, corporate or government networks.Some hackers even went onto use the Cisco exploits in the wild.DanderSpritz consists entirely of plugins to gather intelligence, use exploits and examine already controlled machines.DanderSpritz consists entirely of plugins to gather intelligence, use exploits and examine already controlled machines.PeddleCheap is a plugin of DanderSpritz which can be used to configure implants and connect to infected machines.Each of them consists of a set of plugins designed for different tasks: while FuzzBunch plugins are responsible for reconnaissance and attacking a victim, plugins in the DanderSpritz framework are developed for managing already infected victims.In their latest leak, they have released the UNITEDRAKE NSA exploit, which is a remote access and control tool that can remotely target Windows-based systems to capture desired information and transfer it to a server.The ShadowBrokers is a group of hackers known for leaking exclusive information about the National Security Agency – NSA's hacking tools and tactics.It captures information using plugins to compromise webcam and microphone output along with documenting log keystrokes, carrying out surveillance and access external drives.Written in pure C language, Canhadr/Ndriver provides full access to the hard drive and operating memory despite device security restrictions, and carries out integrity control of various system components to avoid debugging and security detection.The toolset includes reams of documentation explaining how the cyber weapons work, as well as details about their use in highly classified intelligence operations abroad.The Ham Backdoor functions primarily as a modular platform, which provides the attacker with the ability to directly download additional modules and execute them in memory from the command and control (C2) server.Originally targeting Western European banks, Emotet has since been developed into a robust global botnet that is comprised of several modules, each of which equips Emotet with different spamming, email logging, information stealing, bank fraud, downloading, and DDoS, among others.Originally targeting Western European banks, it has since been developed into a robust global botnet that is comprised of several modules, each of which equips Emotet with different spamming, email logging, information stealing, bank fraud, downloading, and DDoS, among others.Beginning in mid-January 2019, TA542 distributed millions of Emotet-laden emails in both English and German.DanaBot is a Trojan that includes banking site web injections and stealer functions.Two binder tools — used to disguise custom executables as legitimate Microsoft implants — were discovered by Falcon Intelligence and linked to MYTHIC LEOPARD in July 2017.Neptun is installed on Microsoft Exchange servers and is designed to passively listen for commands from the attackers.At a high level, hot patching can transparently apply patches to executables and DLLs in actively running processes, which does not happen with traditional methods of code injection such as CreateRemoteThread or WriteProcessMemory.This isn’t a bad thing as it shows a natural grouping of nodes that could be a good candidate to group to help simplify the overall graph and make analysis easier.The files exploit the well-known Microsoft Office vulnerability, CVE-2012-0158, to execute malicious code in order to take control of the targeted systems.We have also observed them using virtual private network services that use IPs based in numerous countries to ensure anonymity and obfuscate criminal operations.Once downloaded and executed, it drops an intermediate payload that further downloads a Pony DLL and Vawtrak executable, which perform data theft and connect to a command and control (C2) server.The files exploit the well-known Microsoft Office vulnerability, CVE-2012-0158, to execute malicious code in order to take control of the targeted systems.Both groups can set permissions on specific files to Everyone, and work in tandem with the PLATINUM backdoors.At a high level, hot patching can transparently apply patches to executables and DLLs in actively running processes, which does not happen with traditional methods of code injection such as CreateRemoteThread or WriteProcessMemory.Hot patching is an operating system-supported feature for installing updates without having to reboot or restart a process.Until this incident, no malware had been discovered misusing the AMT SOL feature for communication.The folders seem to contain information about the company's development documentation, artificial intelligence model, web security software, and antivirus software base code.As mentioned in the Hermes to Ryuk section, Ryuk uses a combination of symmetric (AES) and asymmetric (RSA) encryption to encrypt files.Their software, once surreptitiously installed on a target's cell phone or computer, can be used to monitor the target's communications, such as phone calls, text messages, Skype calls, or emails.This isn’t a bad thing as it shows a natural grouping of nodes that could be a good candidate to group to help simplify the overall graph and make analysis easier.Mimikatz is a post-exploitation tool that allows attackers to extract credentials from volatile memory.The GoogleUpdate.exe component is responsible for communicating with the remote C&C server.This way, the malware can have its configuration, malicious binaries and file listings updated, but can also download and execute other binaries.They also download apks secretly and record audios and videos, then upload users’ privacy information to server, causing users’ privacy leakage.The SectorJ04 group mainly utilizes a spear phishing email with MS Word or Excel files attached, and the document files downloads the Microsoft Installer (MSI) installation file from the attacker server and uses it to install backdoor on the infected system.The email stealer collects connection protocol information and account information, such as SMTP, IMAP, and POP3, which are stored in the registry by Outlook and Thunderbird mail clients and sends them to the attacker server in a specific format.The Silence.Main Trojan, which is the main stage of the attack, has a full set of commands to control a compromised computer.The main goal of Silence.Downloader is to receive an executable file and run it on an infected machine.Silence.MainModule is a typical remote control Trojan that provides access to the command shell CMD.EXE with the possibility of downloading files from remote nodes to a computer and uploading files from a computer to a remote server.PlugX is a modular structured malware that has many different operational plugins such as communication compression and encryption, network enumeration, files interaction, remote shell operations and more.TONEDEAF supports collecting system information, uploading and downloading of files, and arbitrary shell command execution.PICKPOCKET is a credential theft tool that dumps the user's website login credentials from Chrome, Firefox, and Internet Explorer to a file.The first module downloaded by the GRIFFON malware to the victim’s computer is an information-gathering JScript, which allows the cybercriminals to understand the context of the infected workstation.The new GRIFFON implant is written to the hard drive before each execution, limiting the file-less” aspect of this method.In fact, AveMaria is a classic infostealer bot that collects all possible credentials from various types of software: browsers, email clients, messengers, etc, and can act as a keylogger.Some of the documents exploited CVE-2017-0199 to deliver the payload.The malware basically provides a remote CMD/PowerShell terminal for the attackers, enabling them to execute scripts/commands and receive the results via HTTP requests.Some of the documents exploited CVE-2017-0199 to deliver the payload.The LOWBALL first stage malware allows the group to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets.The batch script would then attempt to have the VNC program connect to a command and control (C2) server to enable the server to control the compromised system.The IndiaBravo-PapaAlfa installer is responsible for installing the service DLL variant.These tools often lay the groundwork for further malicious activity, such as the targeting of antivirus capabilities and the disabling of firewalls, both of which are very fundamental defensive measures.The first class, colloquially known as " wipers ", are a class of malware has the primary intent of destroying data on a victim's machine.DDoS malware floods a target's network-connected service with an excessive number of request at once in order to overload the capacity of the server.The naming scheme used by Novetta for the malware identified during Operation Blockbuster consists of at least two identifiers which each identifier coming from the International Civil Aviation Organization (ICAO)'s phonetic alphabet,2 commonly referred to as the NATO phonetic alphabet.Loaders are typically responsible for loading a DLL component into memory given that a DLL cannot operate in a standalone mode such as an executable.This campaign is tailored to identifying those who are running Bitcoin related software through specific system scans.FALLCHILL typically infects a system as a file dropped by other HIDDEN COBRA malware or as a file downloaded unknowingly by users when visiting sites compromised by HIDDEN COBRA actors.As a backdoor Trojan, Volgmer has several capabilities including: gathering system information, updating service registry keys, downloading and uploading files, executing commands, terminating processes, and listing directories.RATANKBA is delivered to its victims using a variety of lure documents, including Microsoft Office documents, malicious CHM files, and different script downloaders.These files have the capability to download and install malware, install proxy and Remote Access Trojans (RATs), connect to command and control (C2) servers to receive additional instructions, and modify the victim's firewall to allow incoming connections.The WannaCry malware consists of two distinct components, one that provides ransomware functionality and a component used for propagation, which contains functionality to enable SMB exploitation capabilities.WannaCry appends encrypted data files with the .WCRY extension, drops and executes a decryptor tool, and demands $300 or $600 USD (via Bitcoin) to decrypt the data.WCry uses a combination of the RSA and AES algorithms to encrypt files.Some of the documents exploited CVE-2017-0199 to deliver the payload.Depending on placement, a web shell can provide continued access to victims' environments, re-infect victim systems, and facilitate lateral movement.While it lacks more advanced functionality like screen capturing, it is still able to carry out most tasks desired by threat actors: exfiltration of files, ability to download and execute additional payloads, and gain remote shell access.To set up persistence, the loader writes a file to " c:\temp\rr.exe " and executes it with specific command line arguments to create auto run registry keys.For example, we analyzed a DropIt sample (SHA256: cca268c13885ad5751eb70371bbc9ce8c8795654fedb90d9e3886cbcfe323671) that dropped two executables, one of which was saved to "%TEMP%\flash_update.exe " that was a legitimate Flash Player installer.DROPSHOT is a notable piece of malware used to deliver variants of the TURNEDUP backdoor.The SHAPESHIFT wiper is capable of wiping disks and volumes, as well as deleting files.The HTA files contained job descriptions and links to job postings on popular employment websites.The attacker used a spear-phishing email containing a link to a fake resume hosted on a legitimate website that had been compromised.Further analysis revealed a well-established collection of fake social media profiles that appear intended to build trust and rapport with potential victims.The macro ran a PowerShell command that attempted to download additional PowerShell loader scripts for PupyRAT, a research and penetration-testing tool that has been used in attacks.ChopShop1 is a new framework developed by the MITRE Corporation for network-based protocol decoders that enable security professionals to understand actual commands issued by human operators controlling endpoints.Poison Ivy is a remote access tool that is freely available for download from its official web site at www.poisonivy-rat.com.Poison Ivy includes features common to most Windows-based RATs, including key logging, screen capturing, video capturing, file transfers, system administration, password theft, and traffic relaying.The Poison Ivy builder kit allows attackers to customize and build their own PIVY server, which is delivered as mobile code to a target that has been compromised, typically using social engineering.We found new variants of the Powermud backdoor, a new backdoor (Backdoor.Powemuddy), and custom tools for stealing passwords, creating reverse shells, privilege escalation, and the use of the native Windows cabinet creation tool, makecab.exe, probably for compressing stolen data to be uploaded.Like the previous campaigns, these samples again involve a Microsoft Word document embedded with a malicious macro that is capable of executing PowerShell (PS) scripts leading to a backdoor payload.Taking a step back, as discussed in the Appendix in our initial OilRig blog, Clayslide delivery documents initially open with a worksheet named " Incompatible " that displays content that instructs the user to " Enable Content " to see the contents of the document, which in fact runs the malicious macro and compromises the system.The vulnerability exists in the old Equation Editor (EQNEDT32.EXE), a component of Microsoft Office that is used to insert and evaluate mathematical formulas.ISMDoor is able to exfiltrate data, take screenshots, and execute arbitrary commands on the victim's machine.The attackers then began to perform reconnaissance activities on Computer A via cmd.exe, collecting system-related information, such as the OS version, hardware configuration, and network information.Based on the command capabilities of the Taidoor malware, we were able to determine that data theft and data destruction was possible.This script relays commands and output between the controller and the system.But two tools used were unique to the group: ASPXTool, an Internet Information Services (IIS) specific " Web shell " used to gain access to servers inside a target's network; and the OwaAuth credential stealing tool and Web shell, used to attack Microsoft Exchange servers running the Web Outlook interface.PsExec is a Microsoft Sysinternals tool for executing processes on other systems and is one of the most frequently seen legitimate pieces of software used by attackers attempting to live off the land.Catchamas is a custom Trojan designed to steal information from an infected computer and contains additional features designed to avoid detection.As detailed in the previous section, this malware is able to manipulate and exfiltrate emails.Kazuar generates its mutex by using a process that begins with obtaining the MD5 hash of a string " [username]=>singleton-instance-mutex ".MXI Player appears to be a version of the Bahamut agent, designed to record the phone calls and collect other information about the user (com.mxi.videoplay).Using XREFs during static analysis is a common technique to quickly find where functions of interest are called.Although the developers of Bookworm have included only keylogging functionality in Bookworm as a core ability, as suggested in Table 1, several of the embedded DLLs provide Leader with cryptographic and hashing functions, while others support Leader's ability to communicate with its C2 server.As mentioned in our previous blog on Bookworm, the Trojan sends a static date string to the C2 server that we referred to as a campaign code.We believed that the actors would use this date code to track their attack campaigns; however, after continued analysis of the malware, we think these static dates could also be a build identifier for the Trojan.Threat actors may use the date string hardcoded into each Bookworm sample as a build identifier.A Trojan sending a build identifier to its C2 server is quite common, as it notifies the threat actors of the specific version of the Trojan in which they are interacting.Due to these changes without a new date string, we believe the date codes are used for campaign tracking rather than a Bookworm build identifier.We believe that Bookworm samples use the static date string as campaign codes, which we used to determine the approximate date of each attack that we did not have detailed targeting information.Malicious programs intentionally scan for machines with an automated Bank-Customer system of the Central bank of Russia (further referred to as BCS CBR).In addition to built-in functionalities, the operators of Careto can upload additional modules which can perform any malicious task.Tweety Chat's Android version can record audio, too.One of its file stealers, swissknife2, abuses a cloud storage service as a repository of exfiltrated files.The CONFUCIUS_B executable is disguised as a PowerPoint presentation, using a Right-To-Left-Override (RTLO) trick and a false icon.The Android version, for instance, can steal SMS messages, accounts, contacts, and files, as well as record audio.If a bot was installed on a network that was of interest to the hacking group, this bot was then used to upload one of the remote access programs.To obtain logins and passwords they applied keyloggers built into Corkow, as well as a commonly used feature of Mimikatz, dumping clear text Windows credentials from LSA.Palo Alto Networks has noted and described the differences of two malware agents developed in parallel, with commonalities in behavior but differing functionalities; families described as Infy and Infy M. Our primary observation was of the Infy (non-M) malware, which primarily functions as a keylogger for the collection of account credentials.At this stage, the malware gathers information about the infected computer.Initial intrusion stages feature the Win32/Barlaiy implant—notable for its use of social network profiles, collaborative document editing sites, and blogs for C&C.The Windows 10 Creators Update will bring several enhancements to Windows Defender ATP that will provide SOC personnel with options for immediate mitigation of a detected threat.If it did, the malware downloaded additional modules, including ones allowing for the automatic creation of unauthorized payment orders, changing details in legal payment orders, etc.Lurk uses a form of steganography: that's where one file is hidden away inside another file of a completely different sort, such as an image, audio, or video file.To do this, it employs a number of specific commands via DNSMessenger.This document, written in Vietnamese, appears to be reviewing and discussing best practices for teaching and researching scientific topics.There is the exploit code and malware used to gain access to systems, the infrastructure that provides command and control to the malware operator, and the human elements – developers who create the malware, operators who deploy it, and analysts who extract value from the stolen information.We believe the 2013, 2015, and 2016 KeyBoy samples provide evidence of a development effort focused on changing components that would be used by researchers to develop detection signatures.KeyBoy provides basic backdoor functionality, allowing the operators to select from various capabilities used to surveil and steal information from the victim machine.If KeyBoy is a single component of a larger espionage toolkit, the developers may have realized that this older, static-key based, configuration encoding algorithm was inadvertently providing a link between disparate components of their malware suite.The NetTraveler trojan has been known to be used in targeted cyber espionage attacks for more than a decade by nation state threat actors and continues to be used to target its victims and exfiltrate data.This program is designed to capture keystrokes, take screenshots of the user's desktop and get contents from the clipboard.This file requires the target to attempt to open the .lnk file, which redirects the user to a Windows Scripting Component (.wsc) file, hosted on an adversary-controlled microblogging page.Upon successful exploitation, the attachment will install the trojan known as NetTraveler using a DLL side-loading attack technique.In addition, the NetTraveler toolkit was able to install additional info-stealing malware as a backdoor, and it could be customized to steal other types of sensitive information such as configuration details for an application or computer-aided design files.The PassCV group typically utilized publicly available RATs in addition to some custom code, which ultimately provided backdoor functionality to affected systems via phony resumes and curriculum vitae (CVs).he PassCV group typically utilized publicly available RATs in addition to some custom code, which ultimately provided backdoor functionality to affected systems via phony resumes and curriculum vitae (CVs).The files exploit the well-known Microsoft Office vulnerability, CVE-2012-0158, to execute malicious code in order to take control of the targeted systems.One of the most notable functions of the initial dropper is to bypass Windows UAC (User Account Control) in order to execute the next payload with higher privileges.Afterwards, the installer malware creates a downloader and a configuration file from its resource and executes it.The downloader malware uses the configuration file and connects to the C2 server to fetch the next payload.He is responsible for developing tools for conducting attacks and is also able to modify complex exploits and third party software.wuaupdt.exe is a CMD backdoor, which can receive and execute CMD commands sent from C2.As described in the infection flow, one of the first uses of the AutoHotKey scripts is to upload a screenshot from the compromised PC.The RAT, however, had a multitude of functionalities (as listed in the table below) such as to download and execute, compress, encrypt, upload, search directories, etc.Bemstour is specifically designed to deliver a variant of the DoublePulsar backdoor.DoublePulsar is then used to inject a secondary payload, which runs in memory only.The detection evasion techniques we observed in the Okrum malware include embedding the malicious payload within a legitimate PNG image, employing several anti-emulation and anti-sandbox tricks, as well as making frequent changes in implementation.The threat actors behind the Sea Turtle campaign were successful in compromising entities by manipulating and falsifying DNS records at various levels in the domain name space.The diagram below illustrates how we believe the actors behind the Sea Turtle campaign used DNS hijacking to achieve their end goals.If the user enables macro to open the xlsm file, it will then drop the legitimate script engine AutoHotkey along with a malicious script file.The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell's 1984, but Weeping Angel, developed by the CIA's Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from 'Fine Dining' questionairies.The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant.UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.'Improvise' is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor).This sample, similar to other Trochilus samples, was deployed using a DLL sideloading method utilizing three files, uploaded to the same folder on the victim machine as identified in US-CERT advisory TA17-117A last revised on December 20, 2018.The configuration file then loads the Trochilus payload into memory by injecting it into a valid system process.Insikt Group analysis of network metadata to and from the VPN endpoint IPs revealed consistent connectivity to Citrix-hosted infrastructure from all eight VPN endpoint IPs starting on August 17, 2018 — the same date the first authenticated login to Visma’s network was made using stolen credentials.This powerful backdoor can receive commands from the attackers, enabling it to exfiltrate files from the system it is running on, execute additional scripts, delete files, and more.In addition, by using VBA2Graph, we were able to visualize the VBA call graph in the macros of each document.The JavaScript forces visiting web browsers to collect and send (via a POST request) web browser, browser version, country of origin, and IP address data to the attacker controlled server jquerycodedownload.live/check.aspx”.The malware was first seen packed with VMProtect; when unpacked the sample didn’t show any similarities with previously known malware.The malware starts communicating with the C&C server by sending basic information about the infected machine.The malware basically provides a remote CMD/PowerShell terminal for the attackers, enabling them to execute scripts/commands and receive the results via HTTP requests.After app installation, whenever SWAnalytics senses victims opening up infected applications or rebooting their phones, it silently uploads their entire contacts list to Hangzhou Shun Wang Technologies controlled servers.This module monitors a wide range of device activities including application installation / remove / update, phone restart and battery charge.It turns out that contacts data isn’t the only unusual data SWAnalytics is interested in.With default settings, SWAnalytics will scan through an Android device’s external storage, looking for directory tencent/MobileQQ/WebViewCheck”.By listing sub-folders, SWAnalytics is able to infer QQ accounts which have never been used on the device.To make this data harvesting operation flexible, SWAnalytics equips the ability to receive and process configuration files from a remote Command-and-Control.Just to highlight its capabilities, TajMahal is able to steal data from a CD burnt by a victim as well as from the printer queue.The newer variant of KopiLuwak is now capable of exfiltrating files to the C&C as well as downloading files and saving them to the infected machine.The tool does all that a typical Trojan needs to accomplish: upload, download and execute files, fingerprint target systems.The PowerShell version of the Trojan also has the ability to get screenshots.Initial reports about HIGHNOON and its variants reported publicly as Winnti dating back to at least 2013 indicated the tool was exclusive to a single group, contributing to significant conflation across multiple distinct espionage operations.BalkanRAT enables the attacker to remotely control the compromised computer via a graphical interface, i.e, manually; BalkanDoor enables them to remotely control the compromised computer via a command line, i.e, possibly en masse.The backdoor can connect to any of the C&Cs from a hardcoded list – a measure to increase resilience.China Chopper is a tool that allows attackers to remotely control the target system that needs to be running a web server application before it can be targeted by the tool.China Chopper contains a remote shell (Virtual Terminal) function that has a first suggested command of netstat an|find ESTABLISHED.The tool investigates the Local Security Authority Subsystem memory space in order to find, decrypt and display retrieved passwords.Additional capabilities of the More_eggs malware include the download and execution of files and scripts and running commands using cmd.exe.Mimikatz is a post-exploitation tool that allows attackers to extract credentials from volatile memory.The GoogleUpdate.exe component is responsible for communicating with the remote C&C server.This way, the malware can have its configuration, malicious binaries and file listings updated, but can also download and execute other binaries.They also download apks secretly and record audios and videos, then upload users’ privacy information to server, causing users’ privacy leakage.The email stealer collects connection protocol information and account information, such as SMTP, IMAP, and POP3, which are stored in the registry by Outlook and Thunderbird mail clients and sends them to the attacker server in a specific format.AdroMut downloads the malware ServHelper and FlawedAmmy RAT used by the SectorJ04 group from the attacker server and simultaneously performs the functions of a backdoor.The Silence.Main Trojan, which is the main stage of the attack, has a full set of commands to control a compromised computer.The exploit installs Silence’s loader, designed to download backdoors and other malicious programs.As we described in Silence: Moving into the darkside report, Silence has experience with theft using compromised card processing systems.The main goal of Silence.Downloader is to receive an executable file and run it on an infected machine.Silence.MainModule is a typical remote control Trojan that provides access to the command shell CMD.EXE with the possibility of downloading files from remote nodes to a computer and uploading files from a computer to a remote server.PlugX is a modular structured malware that has many different operational plugins such as communication compression and encryption, network enumeration, files interaction, remote shell operations and more.A backdoor that communicates with a single command and control (C2) server using HTTP GET and POST requests, TONEDEAF supports collecting system information, uploading and downloading of files, and arbitrary shell command execution.PICKPOCKET is a credential theft tool that dumps the user's website login credentials from Chrome, Firefox, and Internet Explorer to a file.The first module downloaded by the GRIFFON malware to the victim’s computer is an information-gathering JScript, which allows the cybercriminals to understand the context of the infected workstation.The new GRIFFON implant is written to the hard drive before each execution, limiting the file-less” aspect of this method.In fact, AveMaria is a classic infostealer bot that collects all possible credentials from various types of software: browsers, email clients, messengers, etc, and can act as a keylogger.Neptun is installed on Microsoft Exchange servers and is designed to passively listen for commands from the attackers.The usefulness of flare-qdb can be seen in cases such as loops dealing with strings.The usefulness of flare-qdb can be seen in cases such as loops dealing with strings.The usefulness of flare-qdb can be seen in cases such as loops dealing with strings.We have also observed them using virtual private network services that use IPs based in numerous countries to ensure anonymity and obfuscate criminal operations.Once downloaded and executed, it drops an intermediate payload that further downloads a Pony DLL and Vawtrak executable, which perform data theft and connect to a command and control (C2) server.Upon execution, it will communicate with an attacker-controller website to download a variant of the Pony malware, pm.dll” along with a standard Vawtrak trojan.RIPPER interacts with the ATM by inserting a specially manufactured ATM card with an EMV chip that serves as the authentication mechanism.RIPPER will examine the contents of directories associated with the targeted ATM vendors and will replace legitimate executables with itself.This malware family can be used to compromise multiple vendor platforms and leverages uncommon technology to access physical devices.From our trend analysis seen in Figure 3, Locky ransomware started being delivered via DOCM format email attachments more extensively beginning in August.Discovered for the first time in Mexico back in 2013, Ploutus enabled criminals to empty ATMs using either an external keyboard attached to the machine or via SMS message, a technique that had never been seen before.FireEye Labs recently identified a previously unobserved version of Ploutus, dubbed Ploutus-D, that interacts with KAL’s Kalignite multivendor ATM platform.Written in pure C language, Canhadr/Ndriver provides full access to the hard drive and operating memory despite device security restrictions, and carries out integrity control of various system components to avoid debugging and security detection.WannaCry appends encrypted data files with the .WCRY extension, drops and executes a decryptor tool, and demands $300 or $600 USD (via Bitcoin) to decrypt the data.Some of the documents exploited CVE-2017-0199 to deliver the payload.To set up persistence, the loader writes a file to " c:\temp\rr.exe " and executes it with specific command line arguments to create auto run registry keys.For example, we analyzed a DropIt sample (SHA256: cca268c13885ad5751eb70371bbc9ce8c8795654fedb90d9e3886cbcfe323671) that dropped two executables, one of which was saved to "%TEMP%\flash_update.exe " that was a legitimate Flash Player installer.The HTA files contained job descriptions and links to job postings on popular employment websites.ChopShop1 is a new framework developed by the MITRE Corporation for network-based protocol decoders that enable security professionals to understand actual commands issued by human operators controlling endpoints.We found new variants of the Powermud backdoor, a new backdoor (Backdoor.Powemuddy), and custom tools for stealing passwords, creating reverse shells, privilege escalation, and the use of the native Windows cabinet creation tool, makecab.exe, probably for compressing stolen data to be uploaded.Like the previous campaigns, these samples again involve a Microsoft Word document embedded with a malicious macro that is capable of executing PowerShell (PS) scripts leading to a backdoor payload.Taking a step back, as discussed in the Appendix in our initial OilRig blog, Clayslide delivery documents initially open with a worksheet named " Incompatible " that displays content that instructs the user to " Enable Content " to see the contents of the document, which in fact runs the malicious macro and compromises the system.The vulnerability exists in the old Equation Editor (EQNEDT32.EXE), a component of Microsoft Office that is used to insert and evaluate mathematical formulas.The attackers then began to perform reconnaissance activities on Computer A via cmd.exe, collecting system-related information, such as the OS version, hardware configuration, and network information.Catchamas is a custom Trojan designed to steal information from an infected computer and contains additional features designed to avoid detection.MXI Player appears to be a version of the Bahamut agent, designed to record the phone calls and collect other information about the user (com.mxi.videoplay).Threat actors may use the date string hardcoded into each Bookworm sample as a build identifier.Research presented in this report shows that the PUTTER PANDA operators are likely members of the 12th Bureau, 3rd General Staff Department (GSD) of the People's Liberation Army (PLA), operating from the unit's headquarters in Shanghai with MUCD 61486.That this group is mostly targeting businesses is apparent from the processes they are looking for on a compromised system.They are both targeting businesses using accounting software, are fingerprinting systems of interest similarly, are looking for smart card readers, and finally, they deploy an array of malicious tools to spy on their victims.This adversary has been identified leveraging custom-developed plugins for versions 2 and 3 of the commodity malware Black Energy to target entities associated with energy, industrial control systems and SCADA, government, and media for espionage and destructive purposes, since at least 2011.This adversary has been identified leveraging custom-developed plugins for versions 2 and 3 of the commodity malware Black Energy to target entities associated with energy, government, and media for espionage and destructive purposes, since at least 2011.If you haven't heard about it for some reason, I would recommend to read this detailed report by Group-IB, as this APT attacks not only Russian banks, but also banks in more than 25 countries.The credentials they use to register their malware infrastructure are easily associated with their public social media accounts on Google®, Facebook®, MySpace®, Instagram®, and various dating and blogging sites.We have previously detected groups we suspect are affiliated with the North Korean government compromising electric utilities in South Korea, but these compromises did not lead to a disruption of the power supply.North Korea linked hackers are among the most prolific nation-state threats, targeting not only the U.S. and South Korea but the global financial system and nations worldwide.CapabilitiesFormBook is a data stealer, but not a full-fledged banker.Furthermore, there are indications that APT32 actors are targeting peripheral network security and technology infrastructure corporations.The targeting of private sector interests by APT32 is notable and FireEye believes the actor poses significant risk to companies doing business in, or preparing to invest in, the country.While the motivation for each APT32 private sector compromise varied – and in some cases was unknown – the unauthorized access could serve as a platform for law enforcement, intellectual property theft, or anticorruption measures that could ultimately erode the competitive advantage of targeted organizations.The use of the CARBANAK malware in FIN7 operations also provides limited evidence that these campaigns are linked to previously observed CARBANAK operations leading to fraudulent banking transactions, ATM compromise, and other monetization schemes.For our M-Trends 2017 report, we took a look at the incidents we investigated last year and provided a global and regional (the Americas, APAC and EMEA) analysis focused on attack trends, and defensive and emerging trends.In April 2015, we uncovered the malicious efforts of APT30, a suspected China-based threat group that has exploited the networks of governments and organizations across the region, targeting highly sensitive political, economic and military information.Yet the document cache published April 8 provides evidence that the NSA had once launched a series of successful computer-based intrusions against multiple high-profile foreign targets, including the Office of the President of Iran and the Russian Federal Nuclear Center.Emotet activity in 2019 included several high-volume campaigns that collectively distributed tens of millions of messages primarily targeting the manufacturing and healthcare industries.Originally targeting Western European banks, Emotet has since been developed into a robust global botnet that is comprised of several modules, each of which equips Emotet with different spamming, email logging, information stealing, bank fraud, downloading, and DDoS, among others.Originally targeting Western European banks, it has since been developed into a robust global botnet that is comprised of several modules, each of which equips Emotet with different spamming, email logging, information stealing, bank fraud, downloading, and DDoS, among others.Transparent Tribe has been active for several years and conducting suspected intelligence collection operations against South Asian political and military targets.In previous incidents involving this threat actor, we observed them using malicious documents hosted on websites about the Indian Army, instead of sending these documents directly as an email attachment.To date, Whitefly has attacked organizations in the healthcare, media, telecommunications, and engineering sectors.Between May 2017 and December 2018, a multi-purpose command tool that has been used by Whitefly was also used in attacks against defense, telecoms, and energy targets in Southeast Asia and Russia.The malicious documents seen in recent activity refer to a number of topics, including recent military promotions within the Pakistan Army, information related to the Pakistan Atomic Energy Commission, as well as Pakistan's Ministry of the Interior.We believe that the Carbanak campaign is a clear indicator of a new era in cybercrime in which criminals use APT techniques directly against the financial industry instead of through its customers.We believe that the Carbanak campaign is a clear indicator of a new era in cybercrime in which criminals use APT techniques directly against the financial industry instead of through its customers.APT41 has targeted payment services specializing in handling in-game transactions and real money transfer (RMT) purchases.The group behind these attacks has stolen gigabytes of confidential documents, mostly from military organizations.They seem to have specialized knowledge about military operations, as they are focused on stealing specific files such as those that describe navigation routes.Early in Q2, Kaspersky identified an interesting Lazarus attack targeting a mobile gaming company in South Korea that we believe was aimed at stealing application source code.We believe that the Carbanak campaign is a clear indicator of a new era in cybercrime in which criminals use APT techniques directly against the financial industry instead of through its customers.We believe that the Carbanak campaign is a clear indicator of a new era in cybercrime in which criminals use APT techniques directly against the financial industry instead of through its customers.We believe that these industries have also been targeted as part of a larger supply-chain attack in order for Orangeworm to get access to their intended victims related to healthcare.Orangeworm's secondary targets include Manufacturing, Information Technology, Agriculture, and Logistics.While these industries may appear to be unrelated, we found them to have multiple links to healthcare, such as large manufacturers that produce medical imaging devices sold directly into healthcare firms, IT organizations that provide support services to medical clinics, and logistical organizations that deliver healthcare products.Patchwork targets were chosen worldwide with a focus on personnel working on military and political assignments, and specifically those working on issues relating to Southeast Asia and the South China Sea.Patchwork (also known as Dropping Elephant) is a cyberespionage group whose targets included diplomatic and government agencies as well as businesses.Dropping Elephant (also known as " Chinastrats " and " Patchwork ") is a relatively new threat actor that is targeting a variety of high profile diplomatic and economic targets using a custom set of attack tools.In this case, a small group reusing exploit code, some powershell-based malware and mostly social engineering has been able to steal sensitive documents and data from victims since at least November 2015.The malicious documents seen in recent activity refer to a number of topics, including recent military promotions within the Pakistan Army, information related to the Pakistan Atomic Energy Commission, as well as Pakistan's Ministry of the Interior.PittyTiger leverages social engineering to deliver spearphishing emails, in a variety of languages including English, French and Chinese, and email phishing pages to their targets.The previous two volumes of the Microsoft Security Intelligence Report explored the activities of two such groups, code-named STRONTIUM and PLATINUM, which used previously unknown vulnerabilities and aggressive, persistent techniques to target specific individuals and institutions — often including military installations, intelligence agencies, and other government bodies.This particular unit is believed to hack into victim companies throughout the world in order to steal corporate trade secrets, primarily relating to the satellite, aerospace and communication industries.PUTTER PANDA is a determined adversary group, conducting intelligence-gathering operations targeting the Government, Defense, Research, and Technology sectors in the United States, with specific targeting of the US Defense and European satellite and aerospace industries.In 2015 and 2016, Dridex was one of the most prolific eCrime banking trojans on the market and, since 2014, those efforts are thought to have netted INDRIK SPIDER millions of dollars in criminal profits.In August 2017, a new ransomware variant identified as BitPaymer was reported to have ransomed the U.K.'s National Health Service (NHS), with a high ransom demand of 53 BTC (approximately $200,000 USD).Known for hijacking prominent social media accounts, the self-styled white hat hacking group OurMine took over a number of verified Twitter and Facebook accounts belonging to the cable network.Through research, 360 Helios Team has found that, since 2007, the Poison Ivy Group has carried out 11 years of cyber espionage campaigns against Chinese key units and departments, such as national defense, government, science and technology, education and maritime agencies.Dragos has reported that XENOTIME, the APT group behind the TRISIS (aka TRITON and HatMan) attack on a Saudi Arabian petro-chemical facility in 2017, has expanded its focus beyond the oil and gas industries.Known targets of this group have been involved in the maritime industry, as well as engineering-focused entities, and include research institutes, academic organizations, and private firms in the United States.Historically, the majority of their targeting has been focused on the South Korean government, military, and defense industrial base.Historically, the majority of their targeting has been focused on the South Korean government, military, and defense industrial base.TEMP.Periscope BackgroundActive since at least 2013, TEMP.Periscope has primarily focused on maritime-related targets across multiple verticals, including engineering firms, shipping and transportation, manufacturing, defense, government offices, and research universities.TEMP.Periscope BackgroundActive since at least 2013, TEMP.Periscope has primarily focused on maritime-related targets across multiple verticals, including engineering firms, shipping and transportation, manufacturing, defense, government offices, and research universities.These malware families have a rich history of being used in many targeted attacks against government and private organizations.In this same time frame, APT10 also targeted a U.S. law firm and an international apparel company, likely to gather information for commercial advantage.The admin@338 has largely targeted organizations involved in financial, economic and trade policy, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors.The admin@338 started targeting Hong Kong media companies, probably in response to political and economic challenges in Hong Kong and China.The admin@338 linked to China and alleged to be responsible for targeted attacks against foreign governments and ministries, has now pointed its focus inward at China autonomous territory Hong Kong.An APT gang linked to China and alleged to be responsible for targeted attacks against foreign governments and ministries, has now pointed its focus inward at China autonomous territory Hong Kong.The group targeting Hong Kong media outlets is called admin@338 and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack government and financial firms specializing in global economic policy.The agroup targeting Hong Kong media outlets is called admin@338 and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack government and financial firms specializing in global economic policy.The admin@338, active since 2008, has been seen targeting organizations in the financial services, telecoms, government, and defense sectors.The APT actor, active since 2008, has been seen targeting organizations in the financial services, telecoms, government, and defense sectors.FireEye said it has tracked admin@338's activity since 2013 and the group has largely targeted organizations involved in financial, economic, and trade policy.They have largely targeted organizations involved in financial, economic and trade policy, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors.Between November 26, 2015, and December 1, 2015, known and suspected China-based APT16 launched several spear phishing attacks targeting Japan and Taiwan in the high-tech, government services, media and financial services industries.Between November 26, 2015, and December 1, 2015, known and suspected China-based APT groups launched several spear phishing attacks targeting Japanese and Taiwanese organizations in the high-tech, government services, media and financial services industries.TG-0416 is a stealthy and extremely successful Advanced Persistent Threat (APT) group known to target a broad range of verticals since at least 2009, including technology, industrial, manufacturing, human rights groups, government, pharmaceutical, and medical technology.APT19 seemed to be going after defense sector firms, Chinese dissident groups and political, financial, pharmaceutical and energy sectors that could benefit the Chinese economy.APT19 seemed to be going after defense sector firms, Chinese dissident groups and other political target, as well as certain financial targets and other commercial targets in pharmaceutical and energy sectors that could benefit the Chinese economy.FANCY BEAR (also known as Sofacy or APT 28) is a separate Russian-based threat actor, which has been active since mid 2000s, and has been responsible for targeted intrusion campaigns against the Aerospace, Defense, Energy, Government and Media sectors.APT28 espionage activity has primarily targeted entities in the U.S., Europe, and the countries of the former Soviet Union, including governments, militaries, defense attaches, media entities, and dissidents and figures opposed to the current Russian Government.APT28 espionage activity has primarily targeted entities in the U.S., Europe, and the countries of the former Soviet Union, including governments and militaries, defense attaches, media entities, and dissidents and figures opposed to the current Russian Government.Since at least 2014, FireEye has observed APT32 targeting foreign corporations with a vested interest in Vietnam's manufacturing, consumer products, and hospitality sectors.APT33 has targeted organizations – spanning multiple industries – headquartered in the United States, Saudi Arabia and South Korea.During the same time period, APT33 also targeted companies in South Korea involved in oil refining and petrochemicals.The generalized targeting of organizations involved in energy and petrochemicals mirrors previously observed targeting by other suspected Iranian threat groups, indicating a common interest in the sectors across Iranian actors.APT33's targeting of organizations involved in aerospace and energy most closely aligns with nation-state interests, implying that the threat actor is most likely government sponsored.APT33's focus on aviation may indicate the group's desire to gain insight into regional military capabilities to enhance Iran's aviation capabilities or to support Iran's military and strategic decision making.Specifically, the targeting of organizations in the aerospace and energy sectors indicates that the APT33 is likely in search of strategic intelligence capable of benefitting a government or military sponsor.APT33's focus on aviation may indicate the group's desire to gain insight into regional military aviation capabilities to enhance Iran's aviation capabilities or to support Iran's military and strategic decision making.In 2017, APT37 expanded its targeting beyond the Korean peninsula to include Japan, Vietnam and the Middle East, and to a wider range of industry verticals, including chemicals, electronics, manufacturing, aerospace, automotive and healthcare entities.We surmise that the targeting of banks, media, and government agencies is conducted in support of APT38's primary mission.The APT38 targeted news outlets known for their business and financial sector reporting, probably in support of efforts to identify and compromise additional financial institutions.APT39 has prioritized the telecommunications sector, with additional targeting of the travel industry and IT firms that support it and the high-tech industry.APT39's focus on the telecommunications and travel industries suggests intent to perform monitoring, tracking, or surveillance operations against specific individuals, collect proprietary or customer data for commercial or operational purposes that serve strategic requirements related to national priorities, or create additional accesses and vectors to facilitate future campaigns.REDBALDKNIGHT, also known as BRONZE BUTLER and Tick, is a cyberespionage group known to target Japanese organizations such as government agencies (including defense) as well as those in biotechnology, electronics manufacturing, and industrial chemistry.REDBALDKNIGHT, also known as BRONZE BUTLER and Tick, is a cyberespionage group known to target Japan such as government agencies as well as those in biotechnology, electronics manufacturing, and industrial chemistry.We believe that the Carbanak campaign is a clear indicator of a new era in cybercrime in which criminals use APT techniques directly against the financial industry instead of through its customers.This report describes the details and type of operations carried out by Carbanak that focuses on financial industry, such as payment providers, retail industry and PR companies.From 2013 Carbanak intensified its activity focused on banks and electronic payment systems in Russia and in the post-Soviet space.Since 2013 Carbanak has successfully gained access to networks of more than 50 banks and 5 payment systems.The Charming Kitten' focus appears to be individuals of interest to Iran in the fields of academic research.However, even though the TTPs of the Cleaver team have some overlap to techniques used by Iranian Cyber Army (botnets), Ashiyane (SQL injection) and Syrian Electronic Army (phishing), we believe this is largely the work of a new team.Since 2013, the Cobalt have attempted to attack banks and financial institutions using pieces of malware they designed.Since 2013, the cybercrime gang have attempted to attack banks, e-payment systems and financial institutions using pieces of malware they designed, known as Carbanak and Cobalt.Gallmaker's activity appears to be highly targeted, with its victims all related to government, military, or defense sectors.There are no obvious links between the Eastern European and Middle Eastern targets, but it is clear that Gallmaker is specifically targeting the defense, military, and government sectors.traditionally targeted the aerospace, energy, government, high-tech, consulting services, and chemicals / manufacturing / mining sectors.The Ke3chang have used three types of malware over the years and have traditionally targeted the aerospace, energy, government, high-tech, consulting services, chemicals, manufacturing, mining sectors.The attackers have used three types of malware over the years and have traditionally targeted the aerospace, energy, government, high-tech, consulting services, and chemicals / manufacturing / mining sectors.APT15 was targeting information related to UK government departments and military technology.APT15 is known for committing cyberespionage against companies and organizations located in many different countries, targeting different sectors such as the oil industry, government contractors, military, and more.cyber actors of the North Korean to target the media, aerospace, financial, and critical infrastructure sectors in the United States and globally.According to trusted third-party reporting, HIDDEN COBRA actors have likely been using FALLCHILL malware since 2016 to target the aerospace, telecommunications, and finance industries.McAfee Advanced Threat Research analysts have uncovered a global data reconnaissance campaign assaulting a wide number of industries including critical infrastructure, entertainment, finance, health care, and telecommunications.Since at least 2013, HIDDEN COBRA actors have been observed using Volgmer malware in the wild to target the government, financial, automotive, and media industries.Ransomware that has been publicly named " WannaCry ", " WCry " or " WanaCrypt0r " (based on strings in the binary and encrypted files) has spread to at least 74 countries as of Friday 12 May 2017, reportedly targeting Russia initially, and spreading to telecommunications, shipping, car manufacturers, universities and health care industries, among others.Ransomware that has been publicly named " WannaCry ", " WCry " or " WanaCrypt0r " (based on strings in the binary and encrypted files) has spread to at least 74 countries as of Friday 12 May 2017, reportedly targeting Russia initially, and spreading to telecommunications, shipping, car manufacturers, universities and health care industries, among others.Known targets of the Leviathan have been involved in the maritime industry, and research institutes, academic organizations, and private firms in the United States.Active since at least 2013, TEMP.Periscope has primarily focused on maritime-related targets across multiple verticals, including engineering firms, shipping and transportation, manufacturing, defense, government offices, and research universities.Within a year APT40 was observed masquerading as a UUV manufacturer, and targeting universities engaged in naval research.APT40 engages in broader regional targeting against traditional intelligence targets, especially organizations with operations in Southeast Asia.Lotus Blossom targeted the government, higher education, and high tech companies.The Lotus Blossom largely targets military or government, with some cases of higher education and high tech companies.Organizations in the government, energy, and technology sectors have been targeted by Magic Hound, specifically organizations based in or doing business in Saudi Arabia.Since at least 2014, APT32, also known as the OceanLotus Group, has targeted foreign corporations with investments in Vietnam, foreign governments, journalists, and Vietnamese dissidents.Evidence also suggests that APT32 has targeted network security and technology infrastructure corporations with connections to foreign investors.Since at least 2014, APT32, also known as the OceanLotus Group, has targeted foreign corporations foreign governments.Additionally, there is evidence to suggest APT33 targeted Saudi Arabian and Western organizations that provide training, maintenance and support for Saudi Arabia's military and commercial fleets.The OilRig group conducts operations primarily in the Middle East, targeting financial, government, energy, chemical, telecommunications and other industries.APT35 typically targets military, diplomatic and government, media, energy, engineering, business services and telecommunications sectors in U.S. and the Middle East.APT35 typically targets U.S. and the Middle Eastern military, diplomatic and government personnel, organizations in the media, energy and defense industrial base (DIB), and engineering, business services and telecommunications sectors.Since at least 2013, the Iranian threat group that FireEye tracks as APT33 has carried out a cyber espionage operation to collect information from defense, aerospace and petrochemical organizations.Since at least 2013, the Iranian threat group FireEye tracks as APT33 has carried out a cyber espionage operation to collect information from defense, aerospace and petrochemical organizations.Ultimately, APT35 had used access to hundreds of mailboxes to read email communications and steal data related to Middle East organizations, which later became victims of destructive attacks.Further analysis revealed a well-established collection of fake social media profiles that appear intended to build trust and rapport with potential victims.COBALT GYPSY has used spearphishing to target telecommunications, government, defense, oil, and financial services organizations based in or affiliated with the MENA region, identifying individual victims through social media sites.The Magic Hound has repeatedly used social media to identify and interact with employees at targeted organizations and then used weaponized Excel documents.We identified decoy files which indicate these attacks began with spear phishing messages but have not observed the actual messages.This group has used a large array of infection vectors, mostly revolving around drive-by downloads and spam.To infect individuals with access to the data the actors desire, Scarlet Mimic deploys both spear-phishing and watering hole (strategic web compromise) attacks.As with many other attackers who use spear-phishing to infect victims, Scarlet Mimic makes heavy use of " decoy " files.The most recent Scarlet Mimic attacks we have identified were conducted in 2015 and suggest the group has a significant interest in both Muslim activists and those interested in critiques of the Russian government and Russian President Vladimir Putin.Using these tactics Scarlet Mimic can directly target previously identified individuals (spear phishing) as well as unidentified individuals who are interested in a specific subject (watering hole).Scarlet Mimic primarily deploys spear-phishing e-mails to infect its targets, but was also responsible for a watering hole attack in 2013.Scarlet Mimic has carried out attacks using both spear-phishing and watering holes since at least 2009 with increasingly advanced malware, and has deployed malware to attack multiple operating systems and platforms.The group primarily deploys spear-phishing e-mails to infect its targets, but was also responsible for a watering hole attack in 2013.When using email scams, SilverTerrier actors preferred to use large target audiences, which maximized the likelihood of success with very little risk.The malware may inject itself into browser processes and explorer.exe.In early May, the phishing lures leveraged RTF attachments that exploited the Microsoft Windows vulnerability described in CVE-2017-0199.In their current campaign, APT32 has leveraged ActiveMime files that employ social engineering methods to entice the victim into enabling macros.APT32 actors continue to deliver the malicious attachments via spear-phishing emails.In the following weeks, FireEye released threat intelligence products and updated malware profiles to customers while developing new detection techniques for APT32’s tools and phishing lures.FIN7 is a financially motivated intrusion set that selectively targets victims and uses spear phishing to distribute its malware.The malware was initially distributed through a compromised software update system and then self-propagated through stolen credentials and SMB exploits, including the EternalBlue exploit used in the WannaCry attack from May 2017.The threat actors, observed by FireEye Labs, use a variety of different methods to either compromise or acquire already compromised payment card credentials, including sharing or purchasing dumps online, hacking vulnerable merchant websites and compromising payment card processing devices.Another common step taken by threat actors is changing their system's MAC Address to avoid being uniquely identified.The attachment in these emails is a weaponized Microsoft Office document containing a malicious macro that – when enabled – leads to the download of Hancitor.FireEye Labs detects this phishing attack and customers will be protected against the usage of these sites in possible future campaigns.The threat actors used two publicly available techniques, an AppLocker whitelisting bypass and a script to inject shellcode into the userinit.exe process.To run its code in kernel mode in the most recent versions of operating systems, that have Driver Signature Enforcement, Slingshot loads signed vulnerable drivers and runs its own code through their vulnerabilities.To date, all observed Snake Wine's attacks were the result of spear phishing attempts against the victim organizations.Beginning in mid-January 2019, TA542 distributed millions of Emotet-laden emails in both English and German.Proofpoint researchers observed one DanaBot affiliate (Affid 11) specifically targeting Canada with " Canada Post " themed lures between January 1 and May 1, 2019.In all emails sent to these government officials, the actor used the same attachment: a malicious Microsoft Word document that exploited the CVE-2012-0158 vulnerability to drop a malicious payload.In this latest incident, the group registered a fake news domain, timesofindiaa.in, on May 18, 2016, and then used it to send spear phishing emails to Indian government officials on the same day.In previous incidents involving this threat actor, we observed them using malicious documents hosted on websites about the Indian Army, instead of sending these documents directly as an email attachment.In this latest incident, Transparent Tribe registered a fake news domain, timesofindiaa.in, on May 18, 2016, and then used it to send spear phishing emails to Indian government officials on the same day.This exploit file made use of the same shellcode that we have observed Transparent Tribe use across a number of spear phishing incidents.According to the security firm, this campaign targeted Indian military officials via spear-phishing emails, distributing spyware to its victims via an Adobe Reader vulnerability.Whitefly compromises its victims using custom malware alongside open-source hacking tools and living off the land tactics, such as malicious PowerShell scripts.After the demise of Storm, it was replaced by another new botnet known as Waledac that also leveraged peer-to-peer communications.ESET recently analyzed a new Mac OS sample from the OceanLotus group that had been uploaded to VirusTotal.At this point, the attackers know the user has opened the document and send another spear-phishing email, this time containing an MS Word document with an embedded executable.In one case from 2013, the target was sent a malicious document through a spear phishing email message.The malware may communicate with its command and control (C2) server over The Onion Router (Tor) network if configured to do so.Harvested credentials provided by an embedded Mimikatz executable facilitate the infection of other systems on the network.This time, however, TA459 opportunistically used spear-phishing emails with a Microsoft Word attachment exploiting the recently patched CVE-2017-0199 to deploy the ZeroT Trojan, which in turn downloaded the PlugX Remote Access Trojan (RAT).This time, however, attackers opportunistically used spear-phishing emails with a Microsoft Word attachment exploiting the recently patched CVE-2017-0199 to deploy the ZeroT Trojan, which in turn downloaded the PlugX Remote Access Trojan (RAT).The documents attached to spear-phishing e-mails used in both attacks contain code that exploits CVE-2012-0158, which despite its age remains one of the most common Microsoft Word vulnerabilities being exploited by multiple threat actors.In all emails sent to these government officials, the actor used the same attachment: a malicious Microsoft Word document that exploited the CVE-2012-0158 vulnerability to drop a malicious payload.According to the security firm, this campaign targeted Indian military officials via spear-phishing emails, distributing spyware to its victims via an Adobe Reader vulnerability.PLATINUM's persistent use of spear phishing tactics (phishing attempts aimed at specific individuals) and access to previously undiscovered zero-day exploits have made it a highly resilient threat.The group's persistent use of spear phishing tactics (phishing attempts aimed at specific individuals) and access to previously undiscovered zero-day exploits have made it a highly resilient threat.We believe that the Carbanak campaign is a clear indicator of a new era in cybercrime in which criminals use APT techniques directly against the financial industry instead of through its customers.We believe that the Carbanak campaign is a clear indicator of a new era in cybercrime in which criminals use APT techniques directly against the financial industry instead of through its customers.Alternatively, it is also possible that APT41 injected malicious code into the package prior to compilation, circumventing the need to steal the code-signing certificate and compile it on their own.SectorJ04 used the spear phishing email to spread malicious Excel or malicious Word files, and downloaded the MSI files from the attacker’s server when the malicious documents were run.Spam emails targeting email accounts used in the integrated mail service of public officials were also found in the hacking activity.Instead of using fake Google Docs phishing pages to collect personal email login credentials, Scattered Canary began using phishing pages of commonly used business applications to compromise enterprise credentials.During a recent campaign, APT32 leveraged social engineering emails with Microsoft ActiveMime file attachments to deliver malicious macros.Tactic #1: Delivering the miner directly to a vulnerable serverSome tactics we've observed involve exploiting CVE-2017-10271, leveraging PowerShell to download the miner directly onto the victim’s system (Figure 1), and executing it using ShellExecute().This time, however, TA459 opportunistically used spear-phishing emails with a Microsoft Word attachment exploiting the recently patched CVE-2017-0199 to deploy the ZeroT Trojan, which in turn downloaded the PlugX Remote Access Trojan (RAT).This time, however, attackers opportunistically used spear-phishing emails with a Microsoft Word attachment exploiting the recently patched CVE-2017-0199 to deploy the ZeroT Trojan, which in turn downloaded the PlugX Remote Access Trojan (RAT).The documents attached to spear-phishing e-mails used in both attacks contain code that exploits CVE-2012-0158, which despite its age remains one of the most common Microsoft Word vulnerabilities being exploited by multiple threat actors.According to the security firm, this campaign targeted Indian military officials via spear-phishing emails, distributing spyware to its victims via an Adobe Reader vulnerability.PLATINUM's persistent use of spear phishing tactics (phishing attempts aimed at specific individuals) and access to previously undiscovered zero-day exploits have made it a highly resilient threat.The group's persistent use of spear phishing tactics (phishing attempts aimed at specific individuals) and access to previously undiscovered zero-day exploits have made it a highly resilient threat.We believe that the Carbanak campaign is a clear indicator of a new era in cybercrime in which criminals use APT techniques directly against the financial industry instead of through its customers.Should a user enable this content, Gallmaker is then able to use the DDE protocol to remotely execute commands in memory on the victima's system.These socially engineered emails contain web links of weaponized documents containing exploits or macros.It contains an additional meta tag at the end of the web page source code, " refreshing " (redirecting) the site visitor to the weaponized document.Volexity has also found that, in addition to sending malware lures, the Patchwork threat actors are leveraging unique tracking links in their e-mails for the purpose of identifying which recipients opened their e-mail messages.At this point, the attackers know the user has opened the document and send another spear-phishing email, this time containing an MS Word document with an embedded executable.The majority of the code for TINYTYPHON is taken from the MyDoom worm and has been repurposed to find and exfiltrate documents.Pitty Tiger group is sometimes using stolen material as spear phishing content to target other persons.The Pitty Tiger group mostly uses spear phishing in order to gain an initial foothold within the targeted environment.PittyTiger leverages social engineering to deliver spearphishing emails, in a variety of languages including English, French and Chinese, and email phishing pages to their targets.PLATINUM's persistent use of spear phishing tactics (phishing attempts aimed at specific individuals) and access to previously undiscovered zero-day exploits have made it a highly resilient threat.The group's persistent use of spear phishing tactics (phishing attempts aimed at specific individuals) and access to previously undiscovered zero-day exploits have made it a highly resilient threat.PLATINUM often spear phishes its targets at their non-official or private email accounts, to use as a stepping stone into the intended organization's network.PLATINUM primarily targets its intended victims using spear phishing.In August 2015, the admin@338 sent spear phishing emails to a number of Hong Kong-based media organizations, including newspapers, radio, and television.In August 2015, the threat actors sent spear phishing emails to a number of Hong Kong-based media organizations, including newspapers, radio, and television.In August 2015, the admin@338 sent spear phishing emails to a number of Hong Kong-based media organizations.The admin@338 previous activities against financial and policy organizations have largely focused on spear phishing emails written in English, destined for Western audiences.When the document was opened in Word, PLATINUM exploited a previously unknown vulnerability in the Microsoft Office PostScript interpreter (designated CVE-2015-2545) that enabled it to execute the attacker's code and drop an attacker-generated malicious DLL onto the computer.n one case from 2013, the target was sent a malicious document through a spear phishing email message.According to FireEye, the admin@338 sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL.According to FireEye, the attackers sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL.This week the experts at FireEye discovered that a group of Chinese-based hackers called admin@338 had sent multiple MH370-themed spear phishing emails, the attackers targeted government officials in Asia-Pacific, it is likely for cyber espionage purpose.The group previous activities against financial and policy organizations have largely focused on spear phishing emails written in English, destined for Western audiences.On November 26, 2015, a suspected China-based APT16 sent Japanese defense policy-themed spear phishing emails to multiple Japanese financial and high-tech companies.On November 26, 2015, a suspected China-based APT group sent Japanese defense policy-themed spear phishing emails to multiple Japanese financial and high-tech companies.APT16 actors sent spear phishing emails to two Taiwanese media organizations.On the same date that APT16 targeted Taiwanese media, suspected Chinese APT actors also targeted a Taiwanese government agency, sending a lure document that contained instructions for registration and subsequent listing of goods on a local Taiwanese auction website.APT28 targets Russian rockers and dissidents Pussy Riot via spear-phishing emails.In 2014, APT32 leveraged a spear-phishing attachment titled " Plans to crackdown on protesters at the Embassy of Vietnam.exe, " which targeted dissident activity among the Vietnamese diaspora in Southeast Asia.In 2014, APT32 leveraged a spear-phishing attachment titled " Plans to crackdown on protesters at the Embassy of Vietnam.exe ".APT33 sent spear phishing emails to employees whose jobs related to the aviation industry.It is possible that APT37's distribution of KARAE malware via torrent websites could assist in creating and maintaining botnets for future distributed denial-of-service (DDoS) attacks, or for other activity such as financially motivated campaigns or disruptive operations.In May 2017, APT37 used a bank liquidation letter as a spear phishing lure against a board member of a Middle Eastern financial company.Operation Daybreak appears to have been launched by unknown attackers to infect high profile targets through spear-phishing e-mails.Operation Daybreak appears to have been launched by APT37 to infect high profile targets through spear-phishing e-mails.BRONZE BUTLER has demonstrated the ability to identify a significant zero-day vulnerability within a popular Japanese corporate tool and then use scan-and-exploit techniques to indiscriminately compromise Japanese Internet-facing enterprise systems.The group has demonstrated the ability to identify a significant zero-day vulnerability within a popular Japanese corporate tool and then use scan-and-exploit techniques to indiscriminately compromise Japanese Internet-facing enterprise systems.BRONZE BUTLER has used phishing emails with Flash animation attachments to download and execute Daserf malware, and has also leveraged Flash exploits for SWC attacks.The group has used phishing emails with Flash animation attachments to download and execute Daserf malware, and has also leveraged Flash exploits for SWC attacks.While investigating a 2016 intrusion, Secureworks identified BRONZE BUTLER exploiting a then-unpatched remote code execution vulnerability (CVE-2016-7836) in SKYSEA Client View, a popular Japanese product used to manage an organization.While investigating a 2016 intrusion, Secureworks incident responders identified BRONZE BUTLER exploiting a then-unpatched remote code execution vulnerability (CVE-2016-7836) in SKYSEA Client View, a popular Japanese product used to manage an organization.Symantec discovered the most recent wave of Tick attacks in July 2015, when the group compromised three different Japanese websites with a Flash (.swf) exploit to mount watering hole attacks.Symantec discovered the most recent wave of Tick attacks in July 2015, when BRONZE BUTLER compromised three different Japanese websites with a Flash (.swf) exploit to mount watering hole attacks.However, even though the TTPs of the Cleaver team have some overlap to techniques used by Iranian Cyber Army (botnets), Ashiyane (SQL injection) and Syrian Electronic Army (phishing), we believe this is largely the work of a new team.In several cases, the Cobalt compromised company infrastructure and employee accounts in order to send phishing messages to partner companies in North and South America, Europe, CIS countries, and Central and Southeast Asia.To ensure remote access to the workstation of an employee at a target organization, the Cobalt group (as in previous years) uses Beacon, a Trojan available as part of commercial penetration testing software.In a recent spear-phishing campaign, the Cobalt Hacking Group used a remote code execution vulnerability in Microsoft Office software to connect to its command and control server via Cobalt Strike.
The O
admin@338 B-HackOrg
has O
largely O
targeted O
organizations O
involved O
in O
financial B-Idus
, O
economic B-Idus
and O
trade B-Idus
policy I-Idus
, O
typically O
using O
publicly B-Tool
available I-Tool
RATs I-Tool
such O
as O
Poison B-Tool
Ivy I-Tool
, O
as O
well O
some O
non-public B-Tool
backdoors I-Tool
. O
The O
admin@338 B-HackOrg
started O
targeting O
Hong B-Area
Kong I-Area
media B-Org
companies I-Org
, O
probably O
in O
response O
to O
political B-Idus
and O
economic B-Idus
challenges O
in O
Hong B-Area
Kong I-Area
and O
China B-Area
. O
Multiple O
China-based B-Area
cyber B-HackOrg
threat I-HackOrg
groups I-HackOrg
have O
targeted O
international B-Org
media I-Org
organizations I-Org
in O
the O
past O
. O
The O
admin@338 B-HackOrg
has O
targeted O
international B-Org
media I-Org
organizations I-Org
in O
the O
past O
. O
In O
August B-Time
2015 I-Time
, O
the O
admin@338 B-HackOrg
sent O
spear B-Way
phishing I-Way
emails I-Way
to O
a O
number O
of O
Hong O
Kong-based O