text
stringlengths 0
383k
|
---|
What did SEP Web Extension do for you last week? Week 48, 2023
Symantec Threat Intelligence teams around the world provide unparalleled analysis and commentary on the cyberthreats affecting businesses today. Symantec’s browser extensions bring this intelligence into your browser to effectively detect and block various web-borne threats.
Symantec Endpoint Security (SES) and Symantec Endpoint Protection (SEP) deliver browser protection through browser extensions for Google Chrome and Microsoft Edge. These extensions rely on two key technologies:
URL reputation, which identifies and blocks websites that host malicious content such as phishing, malware, fraud, scams, and spam.
Browser Intrusion Prevention, which leverages Symantec's deep packet inspection engine to safeguard customers against a variety of threats.
Bringing these technologies together in the browser provides an effective browser protection solution.
In the last 7 days, Symantec blocked a total of 6.1M attacks across 144.1K protected endpoints via the Endpoint protection browser extensions.
5.2M attacks were blocked on blocked on 127.3K endpoints using URL reputation
613.1K attacks were blocked on 31.1K endpoints attempting to redirect users to attacker-controlled websites
169.8K Browser Notification Scam attacks were blocked on 13.1K endpoints
56K attacks were blocked on 624 endpoints which leverage malicious script injections on compromised websites
2K Technical Support Scam attacks were blocked on 1.3K endpoints
858 Cryptojacking attempts were blocked on 221 endpoints
Customers are advised to enable Endpoint browser protection. Click here for instructions on how to do so. |
What did SEP Web Extension do for you last week? Week 49, 2023
Symantec Threat Intelligence teams around the world provide unparalleled analysis and commentary on the cyberthreats affecting businesses today. Symantec’s browser extensions bring this intelligence into your browser to effectively detect and block various web-borne threats.
Symantec Endpoint Security (SES) and Symantec Endpoint Protection (SEP) deliver browser protection through browser extensions for Google Chrome and Microsoft Edge. These extensions rely on two key technologies:
URL reputation, which identifies and blocks websites that host malicious content such as phishing, malware, fraud, scams, and spam.
Browser Intrusion Prevention, which leverages Symantec's deep packet inspection engine to safeguard customers against a variety of threats.
Bringing these technologies together in the browser provides an effective browser protection solution.
In the last 7 days, we blocked a total of 6.3M attacks across 142.1K protected endpoints via the Endpoint protection browser extensions.
5.5M attacks were blocked on blocked on 126.1K endpoints using URL reputation
596.3K attacks were blocked on 30.4K endpoints attempting to redirect users to attacker-controlled websites
158.5K Browser Notification Scam attacks were blocked on 12.4K endpoints
44.4K attacks were blocked on 567 endpoints which leverage malicious script injections on compromised websites
1.9K Technical Support Scam attacks were blocked on 1.2K endpoints
584 Cryptojacking attempts were blocked on 210 endpoints
Customers are advised to enable Endpoint browser protection. Click here for instructions on how to do so. |
What did SEP Web Extension do for you last week? Week 50, 2023
Symantec Threat Intelligence teams around the world provide unparalleled analysis and commentary on the cyberthreats affecting businesses today. Symantec’s browser extensions bring this intelligence into your browser to effectively detect and block various web-borne threats.
Symantec Endpoint Security (SES) and Symantec Endpoint Protection (SEP) deliver browser protection through browser extensions for Google Chrome and Microsoft Edge. These extensions rely on two key technologies:
URL reputation, which identifies and blocks websites that host malicious content such as phishing, malware, fraud, scams, and spam.
Browser Intrusion Prevention, which leverages Symantec's deep packet inspection engine to safeguard customers against a variety of threats.
Bringing these technologies together in the browser provides an effective browser protection solution.
In the last 7 days, we blocked a total of 6.3M attacks across 144.6K protected endpoints via the Endpoint protection browser extensions.
5.5M attacks were blocked on blocked on 129.3K endpoints using URL reputation
588.8K attacks were blocked on 30K endpoints attempting to redirect users to attacker-controlled websites
166.6K Browser Notification Scam attacks were blocked on 12.3K endpoints
46K attacks were blocked on 547 endpoints which leverage malicious script injections on compromised websites
2.4K Technical Support Scam attacks were blocked on 1K endpoints
911 Cryptojacking attempts were blocked on 240 endpoints
Customers are advised to enable Endpoint browser protection. Click here for instructions on how to do so. |
What did SEP Web Extension do for you last week? Week 52, 2023
Symantec Threat Intelligence teams around the world provide unparalleled analysis and commentary on the cyberthreats affecting businesses today. Symantec’s browser extensions bring this intelligence into your browser to effectively detect and block various web-borne threats.
Symantec Endpoint Security (SES) and Symantec Endpoint Protection (SEP) deliver browser protection through browser extensions for Google Chrome and Microsoft Edge. These extensions rely on two key technologies:
URL reputation, which identifies and blocks websites that host malicious content such as phishing, malware, fraud, scams, and spam.
Browser Intrusion Prevention, which leverages Symantec's deep packet inspection engine to safeguard customers against a variety of threats.
Bringing these technologies together in the browser provides an effective browser protection solution.
In the last 7 days, we blocked a total of 4.2M attacks across 98.5K protected endpoints via the Endpoint protection browser extensions.
3.5M attacks were blocked on blocked on 87.8K endpoints using URL reputation
554.6K attacks were blocked on 23.4K endpoints attempting to redirect users to attacker-controlled websites
146.8K Browser Notification Scam attacks were blocked on 8.9K endpoints
18K attacks were blocked on 337 endpoints which leverage malicious script injections on compromised websites
1.7K Technical Support Scam attacks were blocked on 632 endpoints
452 Cryptojacking attempts were blocked on 133 endpoints
Customers are advised to enable Endpoint browser protection. Click here for instructions on how to do so. |
WhatsApp used to spread new worm-like Android malware
Worm viruses are nothing new in computer security, however recently researchers have discovered a new Android malware that spreads by auto-replying to WhatsApp messages. The malware masquerades itself on the Google Play Store as an application which would allow the user to view Netflix content on their mobile device. If installed, it would actually be monitoring for message activity in WhatsApp and auto-reply to incoming messages, trying to lure the original sender to install the malware under the guise of obtaining free Netflix access for two months.
Symantec protects you from this threat, identified by the following:
Mobile-based
Android.Reputation.1.
Symantec Endpoint Protection Mobile is able to also analyze links contained within SMS messages. It shields users from SMS phishing attempts by checking URLs found in text messages against the threat intelligence in Symantec WebPulse, part of the Symantec Global Intelligence Network (GIN), and alerting users when the links are suspect. |
When LockBit failed, new Ransomware 3AM did the job
Symantec’s Threat Hunter Team, part of Broadcom, observed a recent attack in which a new ransomware family was used due to the failure of installing a more established family. A single ransomware affiliate made use of the new family, 3AM, when attempts to distribute LockBit onto the target victim's network were blocked.
Once inside the victim's network, the attackers collected information related to security policies, leveraged Cobalt Strike components, and attempted to elevate privileges. Further activity encompassed network reconnaissance for lateral distribution, persistence by way of a new user, and exfiltration of files. Deployment of the 3AM ransomware was only partially successful after blocked attempts to introduce LockBit.
Read more in our blog: 3AM: New Ransomware Family Used As Fallback in Failed LockBit Attack
Symantec protects you from this threat, identified by the following:
Behavior-based
Backdoor.Cobalt!gm1
SONAR.TCP!gen6
File-based
Backdoor.Cobalt
Ransom.3AM
WS.Malware.1
Machine learning-based
Heur.AdvML.A
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Wherever Agent Tesla goes, Lokibot follows
Both Agent Tesla and Lokibot remain two of the most prevalent infostealers delivered via multiple malicious spam campaigns almost on a daily basis. In one such malspam campaign, we have seen thousands of emails initially delivering the payload of Agent Tesla and after a few days pushing Lokibot instead. The campaign started on the 28th of October and seems to be still ongoing at the time of writing. The emails purport as fake order confirmations and contain either .zip or .rar attachments. The archives extract to infostealer executables.
Email subjects:
"Fwd: Re: New Order Inquiry Grupo Dani Chile"
"Re: New Order Inquiry Grupo Dani"
"RE: RFQ -Attached"
"RE: ABS SG - PC No.9 - Gennal - Suntec (SEPT 2020) - PG201001"
"Re: Chake Berberian Order"
Email attachments:
"Chake Berberian Order_pdf.zip"
"Chake Berberian Order.zip"
"Grupo Dani Order_pdf.rar"
"Grupo Dani Order_pdf.zip"
"RFQ Touma Group USA_pdf.zip"
Symantec has various coverage in place covering this malspam run:
File-based
Heur.AdvML.B
Heur.AdvML.C
Infostealer.Lokibot*
Trojan Horse
Trojan.Gen.2
Trojan.Gen.NPE
Trojan.Gen.MBT
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers.
* This indicates multiple detections exist such as Infostealer.Lokibot!g1, Infostealer.Lokibot!g2, etc... |
Whiffy Recon malware delivered by SmokeLoader
Recent SmokeLoader campaigns have been observed to spread a variant of Wi-Fi scanning malware dubbed Whiffy Recon. Once the malware is deployed it checks for the presence of the WLANSVC service (Wireless AutoConfig Service) on the infected system. If found, it will start scanning for nearby Wi-Fi access points via the Windows WLAN API. The received results are sent to the Google Geolocation API service that allows the attackers to triangulate the infected system's location to specific geo-coordinates. With the scanning activity occurring every minute, it effectively allows tracking of the infected systems.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.ProcHijack!g45
File-based
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
WhiskerSpy backdoor
WhiskerSpy is a newly discovered backdoor variant attributed to the threat group known as Earth Kitsune. A recent campaign by this actor has leveraged a watering hole attack for the purpose of the malware delivery. Compromised websites containing malicious scripts injected by the attackers would point unaware users to a download of the WhiskerSpy loader disguised as a video codec installer. The malware functionality includes downloading arbitrary files, loading executables and injecting shellcode into processes, among others.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
File-based
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Network-based
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories |
WhiteSnake Infostealer distributed through Python packages
WhiteSnake is an Infostealer malware that can be distributed and used in both Windows and Linux environments. For the past while this malware has been seen being distributed in malicious PyPI packages. On an infected system, once the information is collected, it exfiltrates the data using Open Source tools, like OpenSSH and serveo\.net to some remote server and notifies the threat actor through Telegram channels, to avoid detection as much as possible.
Symantec protects you from this threat, identified by the following:
File-based
Downloader
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B!100
Heur.AdvML.B!200
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
WhiteSnake Stealer (MaaS) malware
A new infostealing malware dubbed WhiteSnake Stealer has been discovered in the wild. The malware is being offered for sale in a form of MaaS (Malware as a Service) offering. WhiteSnake is designed to collect confidential information from compromised machines. The collected data includes credentials, credit card details, cookies, screenshots, files from FTP or email clients, cryptocurrency wallets, etc. Once collected, the compromised data is exfiltrated to a specified Telegram bot URL controlled by the attackers.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.TCP!gen1
File-based
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Network-based
System Infected: Trojan.Backdoor Activity 634 |
Who's the malware Imposter among us?
'Among Us' is an extremely popular online multiplayer social deduction game that has been trending in recent months with famous gaming streamers and even U.S. politicians playing. The goal of the game is to identify and eliminate the "Impostors". Security Response has been observing more and more malicious activity surrounding this game (both mobile and desktop versions) and unwary players could easily become victims of malware actors targeting the game if they are not careful about what they download.
On various social platforms and forums, many infostealers (Discord Stealer for example) and remote access trojans (NJRAT for example) have been posing as fake installers, game & skins hacks, and more. Some actors have also posted on forums and websites, Android applications purporting to be hacks allowing users to see who the Imposters in the mobile game version are.
Symantec has a wide range of coverage in place for the threats that have been observed:
File-based
Trojan.Gen.MBT
Packed.Vuntid!gen1
WS.Malware.1
WS.Malware.2
Heur.AdvML.B
Heur.AdvML.C
Behavior-based
SONAR.Dropper
SONAR.SuspBeh!gen22
Mobile-based
Trojan:Malapp
Website-based
This activity is proactively blocked by Symantec Web Isolation technology |
Widespread AdLoad campaign targets MacOS users
According to a latest report, AdLoad continues widespread campaigns targeting MacOS users. AdLoad is a well-known adware loader and installer that has been present on the MacOS threat landscape for the last few years. This latest AdLoad campaign leverages a new malware variant that implements updated persistence and naming patterns and it has been reported to evade some of the built-in OS protection mechanisms.
Symantec protects you from this threat, identified by the following:
File-based
OSX.Malcol
OSX.Trojan.Gen
OSX.Trojan.Gen.2 |
Wiki - a Crysis ransomware variant
Wiki is another identified Crysis ransomware variant. The malware has been reported to be distributed either directly through RDP connections or disguised as a harmless program installer. Wiki will encrypt user data and append a custom extension consisting of a unique ID, email address and .wiki appended at the end. The malware will attempt to terminate selected system processes and services as well as delete the volume shadow copies on the infected machine.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.RansomCrys!g2
File-based
Ransom.Crysis
Ransom.Crysis!gm
SMG.Heur!gen
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Network-based
Attack: Ransom.Crysis Activity 3 |
Wikiloader malspam campaign observed
There have been reports of another WikiLoader campaign in which actors are using emails with malicious URLs as the first stage of the attack chain. This campaign is not targeting specific organizations, nor is it secluded to specific countries—the malicious emails are being observed around the world. WikiLoader is a malware downloader that first came to light in late 2022 and has been associated with various threats such as Ursnif.
Observed emails subjects:
reminder past due invoice
Payment Status on Invoice
Outstanding Invoice
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
Behavior-based
ACM.Ps-Wscr!g1
ACM.Wscr-CPE!g1
ACM.Ps-Rd32!g1
ACM.Wscr-Rd32!g1
SONAR.SuspLaunch!g235
Network-based
Audit: Scripting Host Processes Making Network Connections
Audit: System Process Accessing discordapp.com
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
WinDealer malware leveraged by LuoYu threat group
According to the latest reports, WinDealer malware has been leveraged by the threat group known as LuoYu in some recent campaigns. The threat group is known to target Korean and Japanese organisations. WinDealer is a type of infostealing malware that collects information about the victim's system, network configuration or extracts user documents from the local drives and sends the collected data to a pre-configured C2 server.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.C |
Windestroyer destructive malware seen in the wild
A new destructive malware dubbed Windestroyer has recently been observed in the wild. Windestroyer infects and encrypts all executable files rendering the targeted system unusable, can launch DLL reload and API hammering attacks, and has bootkit functionality and persistence via the registry. Once running on an infected system it also has the ability to move laterally looking for network shares and then infecting all the found files.
The absence of a ransom note or demand along with the attackers likely Russian origin point to the fact that this is some sort of "hacktivisit" attack and probably not financially motivated.
Symantec protects you from these threats, identified by the following:
Adaptive-based
ACM.Untrst-RunSys!g1
File-based
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B!100
Heur.AdvML.B
Heur.AdvML.B!200
Heur.AdvML.C |
WindiGo (aka RanaumBot) malware
WindiGo (aka RanaumBot) is one of the modules associated with the infamous Glupteba botnet. The malware has been recently used in campaigns leveraging Winbox (a proprietary protocol used by MikroTik RouterOS). WindiGo scans networks in search of MikroTik devices with open Winbox port 8291 and later attempts to exploit known MikroTik vulnerability (CVE-2018-14847) for credentials theft and further propagation.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.Glupteba!gen2
SONAR.TCP!gen1
File-based
Trojan.Gen.MBT
W32.Fixflo.B!inf
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Network-based
Attack: Mikrotik Admin Password Leak CVE-2018-14847
System Infected: Trojan.Backdoor Activity 634
Policy-based
Symantec DCS can stop Suspicious Process Execution: Prevention policies prevent Windigo botnet from being dropped or executed on the system.
Symantec DCS hardening has the ability to block outgoing connections to the public internet and limit required traffic to and from the server.
Web-based
Observed domains/IPs are covered under security categories |
WindowsReport.com leveraged by attackers to spread malware
'WindowsReport.com' an online Windows publication platform, is all about PC related news, tips and advice. The website shares latest updates about the tech industry where users can also download software utilities.
Google Ads was leveraged to lure victims into accessing an identical but fake copy of the WindowsReport website which hosts a trojanized version of a popular freeware tool called 'CPU-Z'. The CPU-Z installer contains a PowerShell loader that goes by the name 'FakeBat' which will subsequently fetch RedLine Stealer - malware capable of collecting sensitive personal information and cryptocurrency wallet data.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
File-based
Downloader
Trojan.Gen.NPE.C
Trojan.RedLineStealer
Web.Reputation.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!200
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
Windows SmartScreen bypass vulnerability CVE-2023-24880 exploited by Magniber ransomware
CVE-2023-24880 is a recently disclosed Windows SmartScreen vulnerability that can be exploited to create executables bypassing the Mark of the Web (MOTW) security defenses in Windows. The attackers are leveraging .MSI files signed with malformed Authenticode signatures that cause SmartScreen errors which in turn can lead to a bypass of the security warnings displayed to the end user. The vulnerability has been reported as being exploited in the wild in malicious campaigns delivering Magniber ransomware.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.SuspLaunch!g193
File-based
Exp.CVE-2023-24880
JS.Downloader
Ransom.Magniber
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200 |
WingOfGod RAT malware
WingOfGod RAT is a Remote Access Trojan recently identified in campaigns abusing a free online notepad platform called aNotepad. The malware targets both Windows systems as well as the Linux platform. The RAT has the functionality to run arbitrary commands, download/upload files and collect information about the infected hosts, among others.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Ps-Msbuild!g1
ACM.Ps-Rd32!g1
ACM.Ps-Wscr!g1
ACM.Untrst-RunSys!g1
File-based
Scr.Malcode!gdn14
Trojan.Gen.MBT
Trojan.Gen.NPE
Web.Reputation.1
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B!100
Heur.AdvML.B!200
Heur.AdvML.C
Network-based
System Infected: Trojan.Backdoor Activity 634
System Infected: Trojan.Backdoor Activity 721
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Winter Vivern - APT group driving phishing campaigns against government entities
Winter Vivern APT is a lesser known pro-Russian group. The group has been using known attack vectors like website phishing mimicking government websites to distribute their malicious document payload which enables them to gain unauthorized access to systems and initiate network attacks by establishing connection to C2 servers.
The APT group in the past has targeted government entities of India, Vatican, Slovakia and most recently Poland and Ukraine.
In the recent activity that has been observed the group is disguising its malware as a fake antivirus software scanner hosted on mimicked government websites, by spear-phishing email messages to targets as government notices.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
Behavior-based
AGR.Terminate!g2
SONAR.MSOffice!g7
File-based
Scr.MalMacro!gen3
Trojan.Gen.2
Trojan Horse
Trojan.Mdropper
W97M.Downloader
Web-based
Observed domains/IPs are covered under security categories |
Witchetty espionage group activities
The Witchetty espionage group (aka LookingFrog) has been progressively updating its toolset, using new malware in attacks on targets in the Middle East and Africa. Among the new tools being used by the group is a backdoor Trojan (Backdoor.Stegmap) that employs steganography, a rarely seen technique where malicious code is hidden within an image. In attacks between February and September 2022, Witchetty targeted the governments of two Middle Eastern countries and the stock exchange of an African nation. The attackers exploited the ProxyShell (CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207) and ProxyLogon (CVE-2021-26855 and CVE-2021-27065) vulnerabilities to install web shells on public-facing servers before stealing credentials, moving laterally across networks, and installing malware on other computers.
Read more in our blog: Witchetty: Group Uses Updated Toolset in Attacks on Governments in Middle East
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen6
File-based
Backdoor.Lookback
Backdoor.Stegmap
Hacktool
Hacktool.Fscan
Hacktool.Gen
Hacktool.Mimikatz
Spyware.Keylogger
Trojan Horse
Trojan.Chinchop
Trojan.Gen.NPE
WS.Malware.2
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories |
Woody RAT malware discovered in the wild
Woody RAT is a custom remote access trojan that has been active in various campaigns for at least a year. The malware has been distributed mostly through malicious archives and MS Office documents exploiting the MSDT Follina (CVE-2022-30190) vulnerability. Woody RAT's functionality includes collection of various information about the infected system, remote command execution, download of additional arbitrary files or payloads as well as execution of commands received from the C2 servers.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
File-based
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
W97M.Downloader
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Network-based
Web Attack: MSDT Remote Code Execution CVE-2022-30190
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed IPs/domains are covered under security categories |
WordPress File Manager vulnerability exploited in campaigns spreading cryptominers
We have been aware of reports relating to malicious actors exploiting the WordPress File Manager Plugin vulnerability (CVE-2020-25213) in recent campaigns. Successful exploitation of this vulnerability could allow a remote code execution on the vulnerable WordPress sites - effectively enabling the attackers to run arbitrary files. According to the reports the recent campaign exploiting CVE-2020-25213 has been spreading Go-lang based Kinsing malware and cryptominers from the H2miner family.
Symantec provides the following coverage against this campaign:
File-based
Backdoor.Trojan
Downloader
Trojan.Gen.NPE
Trojan Horse
WS.Malware.1
WS.Malware.2
Network-based
[32545] Attack: WordPress File Manager Plugin RCE
[32535] Attack: WordPress File Manager Plugin RCE 2 |
Wormable Android Malware Spreads Through WhatsApp
A wormable Android malware has been discovered that attempts to spread through WhatsApp. The malware makes use of the quick reply feature in WhatsApp to automatically reply to message notifications with a link to a mobile app. The link loads a site that looks like the Google Play Store from where the victim could download an application masquerading as Huawei Mobile. Installing this application and accepting the necessary permissions infects the Android user's mobile device.
Symantec has the following protection in place:
Mobile-based
AppRisk:Generisk |
Would you like malware with that?
Symantec Security Response has observed malware - referred to as "TriumphLoader" - being distributed via a spam campaign where the malicious email is disguised as a thank-you for an online purchase. Emails were sent to more than 600 organizations and include the following email subjects:
Thank you for choosing our shop!
Thanks for your recent purchase!
Welcome to the world of ONLINESHOPPING!
Thank you for your order!
The email has an attachment "shop order 19-11-2020-#23.xlsm" which contains a malicious macro, the payload being TriumphLoader.
Symantec provides the following protection against this spam run:
File-based
W97M.Downloader
Trojan Horse
Email-based
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. |
Would you like some shrimps with that DarkStealer?
DarkStealer is not a new infostealer and while it hasn't been as prevalent as its more infamous cousins, we do continue to observe drive-by-download and malspam activities from multiple groups and individuals. In a recent campaign, actors are purporting themselves to be a Colombian seafood supplier specializing in shrimps. This invoice-related malspam campaign has been observed around the world. DarkStealer has run-of-the-mill infostealing and remote access capabilities and uses Telegram to send logs.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec's email security products
File-based
Scr.Malcode!gdn30
Machine Learning-based
Heur.AdvML.B |
Wroba Android malware implements DNS changer functionality
Wroba Android malware is associated with the threat group known as Roaming Mantis. Recent variants of this malware have been reported to implement a DNS changer functionality. This new implementation allows the attackers to compromise Wi-Fi routers for the purpose of DNS hijacking attacks. Any users accessing such compromised routers will get redirected to landing pages serving malicious payloads. This distribution method differs from some older Roaming Mantis campaigns dating back to 2019-2022 where smishing attacks were the preferred infection method.
Symantec protects you from this threat, identified by the following:
Mobile-based
Android.Reputation.2
AppRisk:Generisk
Web-based
Observed domains/IPs are covered under security categories |
WSH-RAT distributed via malicious RTF documents
Symantec Security Response has been aware of the reported ongoing campaigns spreading the WSH-RAT. The initial distribution stage involves malicious RTF documents that attempt to exploit the relatively old CVE-2017-11182 vulnerability in MS Office to spread the malware. WSH-RAT is a type of commodity malware that has been known for years and sold on underground forums.
Symantec has the following coverage in place against this campaign:
File-based:
Exp.CVE-2017-11882!g2
Exp.CVE-2017-11882!g3
Heur.AdvML.B
Trojan.Gen.2
Trojan.Gen.MBT
Trojan Horse
VBS.Heur.SNIC
Network-based:
Web Attack: Microsoft Office CVE-2017-11882 2 |
WyrmSpy and DragonEgg mobile malware leveraged by APT41 aka Blackfly threat group
Two mobile malware variants known as WyrmSpy and DragonEgg have been recently leveraged in malicious attacks attributed to the APT41 threat group (aka Blackfly, Winnti, Bronze Atlas). The group is known since at least 2010 and despite several indictments of its members, it continues campaigns targeted at organizations from both public and private sectors. WyrmSpy and DragonEgg malware variants belong to cyber-surveillance malware with extensive data exfiltration capabilities. The malware targets the collection of data files, photos, sms messages and audio recordings, among others. Both malware variants rely heavily on commands received from the C2 servers so the functionality against the compromised devices might vary in each case.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
AdLibrary:MoPub
Android.Reputation.1
Android.Reputation.2
Android.Reputation.3
AppRisk:Generisk
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
XAgent spyware targeting iOS devices
An XAgent spyware targeting iOS devices has been identified, linked to the Swallowtail group (APT28). Primarily targeting political and government entities in Western Europe, XAgent possesses capabilities for remote control and data exfiltration. It can gather information on users' contacts, messages, device details, installed applications, screenshots, and call records. This data could potentially be used for social engineering or spear-phishing campaigns.
Symantec protects you from this threat, identified by the following:
Mobile-based
Android.Reputation.2
AppRisk:Generisk
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Xamalicious Android malware
Xamalicious is a backdoor malware targeting the Android platform. The malware is built using Xamarin framework which is an open source platform for creating apps with .NET and C#. The malware has been previously distributed by various apps hosted on Google Play and some other 3rd party platforms. Xamalicious has the functionality to collect information about the infected device including hardware info, list of installed applications, geolocation info and network provider data, among others. Second stage payload might allow the attackers to take full control of the infected device and to perform additional fraudulent tasks.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
Android.Reputation.2
AppRisk:Generisk |
Xanthe mining botnet targets exposed Docker installations
There have been reports of a newly discovered Monero-mining botnet named Xanthe. The botnet targets misconfigured and vulnerable Docker installations exposed to external networks and can laterally spread to other hosts of a compromised network using SSH. Once the main Xanthe module is deployed it will attempt to disable other competing miners if found and run a XMRig binary to mine for Monero cryptocurrency.
Symantec has the following protection in place for this campaign:
File-based
Linux.Coinminer
Trojan.Gen.NPE
Trojan Horse
WS.Malware.1
Website-based
These activities are proactively blocked by Symantec Web Isolation technology. |
Xaro DJVU ransomware variant distributed by loaders disguised as cracked software installers
A new Xaro variant of the DJVU (aka STOP) ransomware has been observed in the wild. The malware is distributed by various loaders disguised as freeware or cracked software installers. The malware encrypts user files and appends the .xaro extension to them. Upon successful encryption, a ransom note in the form of a text file called " _readme.txt" is dropped on the infected machine. The threat actors ask for $980 as ransom for the decryption of the locked files. Recent campaigns distributing Xaro have been observed to also run additional malicious payloads such as infostealers and clipbankers.
Symantec protects you from this threat, identified by the following:
Behavior-based
ACM.Untrst-Runsys!g1
ACM.Untrst-Schtsk!g1
SONAR.MalTraffic!gen1
SONAR.ProcHijack!g21
SONAR.SuspLaunch!g12
File-based
Ransom.Pots
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.2
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.A!400
Heur.AdvML.A!500
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
XcodeSpy campaign leverages EggShell Backdoor to target developers
According to recent reports a new custom variant of the EggShell Mac backdoor is being distributed in a recent campaign targeting iOS developers. The attackers use a malicious Xcode project dubbed as XcodeSpy. The dropped malware exhibits infostealing and keylogging capabilities.
Symantec's protection against Eggshell backdoor includes the following:
File-based
OSX.Malcol
OSX.Trojan.Gen |
XCSSET Mac malware spreads via Xcode projects
Xcode is a free integrated development environment (IDE) used in macOS for developing Apple-related software and apps. A form of Mac malware known as XCSSET is being spread by attackers exploiting Xcode projects. The malware focuses on compromising Safari and other browsers to steal data. The two vulnerabilities discovered by researchers that XCSSET is using, are security feature bypass flaws found in WebKit and Data Vault. The bugs allow Safari cookies to be read and dumped, and then used to inject JavaScript-based backdoors into displayed pages via a Universal Cross-site Scripting (UXSS) attack.
XCSSET can also be used to steal Evernote content, Notes information, and communication from Skype, Telegram, QQ, and WeChat applications. The malware can take screenshots, exfiltrate data to a C&C server, and also has a ransomware module.
Symantec Protections
OSX.Trojan.Gen
Infostealer
IPS [32516] System Infected: OSX.Trojan.Gen Activity 2 |
XCSSET macOS malware distributed in the wild
New variants of the XCSSET macOS malware have been recently seen in the wild. In the latest campaigns distributing this malware, the threat actors have been hiding the malicious executables in the fake Notes.app application. The malware makes use of multiple run-only AppleScripts to target various chat apps and web browsers for information stealing. In this new XCSSET variant the authors also updated the leveraged python scripts for python3, adapting to the latest macOS Monterey releases.
Symantec protects you from this threat, identified by the following:
File-based
OSX.Trojan.Gen
Trojan Horse
WS.Malware.1
Web-based
Observed IPs/domains are covered under security categories |
XCSSET macOS malware found to be targeting systems running Apple Silicon chips
XCSSET Spyware was first seen in mid 2020 and again at the beginning of 2021. New executable modules of XCSSET now have been observed that are complied for both Intel and the new Apple Silicon ARM64 chips.
Apple Silicon Macs have already become a target as malware writers are starting to recompiling their wares to run natively on the new Apple Silicon Macs. For example, the recent Silver Sparrow theat.
Symantec has the following coverage in place for this threat:
File-based
OSX.Trojan.Gen
OSX.Trojan.Gen.2
WS.Malware.1 |
XDSpy - APT group targets Eastern Europe and Balkans
There have been reports about a newly discovered APT group responsible for spying on government entities in Eastern Europe and the Balkans since 2011. The group named as XDSpy has been using spearphishing as the initial attack vector, a downloader malware dubbed as XDDown and has also been observed in attempted exploitations of Internet Explorer CVE-2020-0968 vulnerability.
Symantec has the following protections in place:
File-based
Trojan.Gen.MBT
Trojan.Gen.NPE
Trojan.Gen.2
Website-based
This attack is proactively blocked by Symantec Web Isolation technology |
Xehook Stealer
In recent weeks, more drive-by-download and test activities related to Xehook have been observed. This malware is an infostealer that is being advertised on underground forums as well as Telegram, with subscription fees ranging from $31 a month to $600 for unlimited access.
In terms of capabilities, Xehook is similar to most stealers out there, with nothing to make it stand out. It is capable of stealing sensitive data from Chromium and Gecko-based browsers, as well as various browser cryptocurrency and 2FA extensions.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B |
Xeno-RAT drive-by-download activities continue
Xeno-RAT is a remote access trojan that has been making the rounds in the threat landscape for the past few months. As it's open-source and available to the public – posted on a public software development and version control hosting service, hack forums, and social media – the malware is being used by numerous groups and individuals who are conducting drive-by-download campaigns.
In terms of victimology, consumers are currently the primary targets, as Xeno-RAT binaries are being disguised as popular video game installers and hacks. Nonetheless, enterprise customers aren't fully exempt from this menace, as Symantec also observed drivers and device software masquerades.
This threat includes generic capabilities such as HVNC (Hidden Virtual Network Computing), access to the victim's webcam, live microphone surveillance, keylogging, screen control, among other things.
Symantec protects you from this threat, identified by the following:
Behavior-based
ACM.Untrst-Schtsk!g1
SONAR.Dropper
SONAR.SuspBeh!gen609
File-based
Trojan.Gen.MBT
Machine Learning-based
Heur.AdvML.B!100 |
Xenomorph banking trojan re-emerges via Google Play
According to a recent report, Xenomorph mobile banking trojan has been spread via malicious lifestyle apps hosted on the Google Play store. The payload itself is downloaded from GitHub repositories and installed upon the execution of the malicious app. Xenomorph contains functionality to steal banking credentials or to intercept victims' SMS messages. The stolen SMS messages can assist the attackers with theft of one-time passwords or with any similar multifactor authentication requests.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
Android.Malapp
Android.Reputation.2
AppRisk:Generisk |
Xenomorph v3 Android malware implements the ATS framework
Xenomorph is an Android banking malware initially discovered in 2022 and attributed to the threat actor, Hadoken Security Group. A new v3 variant of the malware has just arrived on the threat landscape and it adds several new capabilities and improvements. One of the more significant changes is the implementation of the ATS framework. ATS stands for Automated Transfer Systems and allows the actors to perform a number of fraudulent operations automatically without any need for manual or remote interaction from the operator's side. The new Xenomorph variant also incorporates a cookie stealer module to extract cookies from the Android CookieManager.
Symantec protects you from this threat, identified by the following:
Mobile-based
Android.Reputation.2
AppRisk:Generisk
Web-based
Observed domains/IPs are covered under security categories |
XHTML Payroll phishing campaign
HTML, SHTML, XHTML and HTM are different file extensions used in web development to indicate the type of markup language used in a web page. These are a widely used format to conduct phishing and act as an infection vector for malware. Malicious actors tend to favor HTML and SHTML as their preferred choice, while XHTML is less commonly used. This could be attributed to the fact that XHTML is stricter in nature compared to HTML which, in contrast, is known for being more forgiving when it comes to errors.
XHTML (Extensible Hypertext Markup Language) files are web documents that adhere to the XHTML standard, which is a stricter and more standardized version of HTML (Hypertext Markup Language). XHTML combines the syntax and rules of XML (eXtensible Markup Language) with the flexibility and elements of HTML. XHTML files have the file extension ".xhtml". They can be viewed in web browsers just like HTML files, but strict XHTML documents may not display properly in older browsers that do not support XML or adhere to XHTML standards.
Symantec recently observed a malicious email campaign that purports to be payroll related (subject: Payroll for period ending 12 July, 2023) targeting both private and public sectors. If victims are successfully lured, they'll see a fake Microsoft 365 login page that is designed to harvest their email credentials.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products.
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products. |
Xollam Ransomware
Xollam is the latest ransomware variant from the TargetCompany ransomware family. Previous known variants used by the same threat group back in 2021 and 2022 include Fargo and Mallox. The name Xollam is an anadrome of the word Mallox as it is spelled backwards using the same letters. Xollam was first observed in 2023 in campaigns leveraging Microsoft OneNote files for initial access and payload delivery. This ransomware encrypts users' files and appends .xollam extension to them before dropping a ransom note in the form of a .txt file named "FILE RECOVERY.txt".
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.CryptoLocker!g36
SONAR.CryptoLocker!g42
SONAR.SuspLaunch!g18
SONAR.SuspLaunch!g230
SONAR.SuspLaunch!g253
SONAR.SuspLaunch!gen4
SONAR.TCP!gen1
File-based
Downloader
Ransom.Mallox
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Network-based
System Infected: Trojan.Backdoor Activity 568
System Infected: Trojan.Backdoor Activity 634 |
XorDdos activity continues...
Earlier this year there were reports of a XorDdos activity increase and as of today, this Denial of Service (DDoS) Linux Trojan is still active targeting endpoints, Internet-of-Things (IoT) devices and cloud infrastructure. With sophisticated evasion capabilities, XorDos spreads via SSH brute force attack.
Symantec protects you from this threat, identified by the following:
File-based
Linux.Xorddos
Policy-based
DCS hardening provides 0 day protection by preventing installation and malicious activities of the Linux.Xorddos malware. |
Xorist ransomware variants are still observed in the wild
Xorist ransomware family (known also as EnCiPhErEd) has been active for the last several years and new variants of this malware continue to be found in the wild compromising both consumer and enterprise users. Xorist ransomware is known to be distributed via cracked software installers, drive-by-downloads or malspam campaigns. The malware appends various extensions to the encrypted files depending on the variant. Some examples of extensions used by most recently discovered variants of this ransomware include: .VoNiX, .gold, .kmbgdftfgdlf, .WiKoN, .GpCODE, .EnCrYpTeD.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.SuspBeh!gen616
SONAR.SuspTempRun
SONAR.SuspTempRun2
SONAR.TCP!Gen1
File-based
Downloader
Ransom.CryptoTorLocker
Trojan.Ransomlock
WS.Malware.1
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.B |
XPhase Clipper malware
XPhase Clipper, a recent malware variant, has been identified in a campaign aimed at cryptocurrency users. The payload is distributed through phishing websites posing as popular cryptocurrency wallets or trading platforms such as Metamask, WazirX, Cryptonotify, or Luno App. This clipper malware has the functionality to intercept cryptocurrency transactions by substituting the victim's copied wallet address with one controlled by the attackers.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Ps-Rd32!g1
ACM.Ps-Wscr!g1
ACM.Untrst-RunSys!g1
ACM.Wscr-Reg!g1
Behavior-based
SONAR.Dropper
SONAR.TCP!gen1
File-based
ISB.Downloader!gen60
Trojan.Gen.MBT
Web.Reputation.1
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!500
Heur.AdvML.C
Network-based
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
XploitSPY Android malware
An active malicious campaign dubbed "eXotic Visit" has been recently spreading a customized variant of the XploitSPY Android malware. The campaign, which reportedly started way back in 2021, has been delivering malicious apps hosted on either dedicated websites or the Google Play store. Most recent variants of this malware incorporate code updates regarding obfuscation, emulator detection and use of native libraries to hide attacker information, among others. XploitSPY has the functionality to extract call logs, contacts and text messages from the infected device. It can also take pictures, record audio or send SMS messages, etc.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
Android.Reputation.2
AppRisk:Generisk
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Xray Ransomware
Xray is yet another ransomware actor that has been observed in the threat landscape, targeting companies' servers and clients. Capability-wise, it's a generic ransomware that allows the actor to determine which folders to encrypt and which to skip. Upon successful encryption, files will be appended with a .Xray extension.
According to the dropped ransom note (Xray_Help.txt), there are no clear indicators as to whether they employ a double-extortion tactic or not, and there's also no specified ransom amount. They simply advise users to reach out to them via email. Currently, this actor doesn't exhibit the same prevalence as other more active ransomware actors. Nevertheless, Symantec will vigilantly monitor their activities.
Symantec protects you from this threat, identified by the following:
Behavior-based
ACM.Ps-RgPst!g1a
ACM.Ps-Schtsk!g1
SONAR.Dropper
File-based
Ransom.Generic.1 |
Xret Ransomware
A ransomware actor known as Xret has been observed. Upon successful encryption, it will add a .Xret extension to encrypted files. The ransom note (# XRET #.txt) left on the machine informs the victim to contact them via either a Proton email address or a WhatsApp number. The actor also mentions in the note that they've encrypted and stolen files, intending to further pressure victims. Additionally, they state that they're not politically motivated and are solely after the money.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.SuspBeh!gen625
File-based
Ransom.HiddenTear!g1
Machine Learning-based
Heur.AdvML.B
Policy-based
Symantec Data Center Security (DCS) default hardening policies provide 0-day protection against Xret ransomware |
XWorm - a RAT with HVNC attack capabilities
XWorm is a Remote Access Trojan (RAT) currently sold on underground forums. This .NET-based malware includes various functionalities aimed at remote control of the infected machine, command execution and data ex-filtration. XWorm binary can also drop additional malicious payloads and contains routines that allow it to perform Hidden Virtual Network Computing (HVNC) attacks - effectively granting the attackers user-grade access to the infected host.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.SuspBeh!gen23
SONAR.SuspBeh!gen93
SONAR.SuspDataRun
SONAR.TCP!gen6
SONAR.UACBypass!gen30
File-based
Hacktool
Scr.Malcode!gdn14
Scr.Malcode!gdn32
Trojan Horse
Trojan.Dropper!g6
Trojan.Gen.2
WS.Malware.1
Machine Learning-based
Heur.AdvML.B |
XWorm malware activity continues in the wild
XWorm is a .NET-based commodity Remote Access Trojan (RAT) actively used in the wild. While this malware family has been observed several times in the past, new versions continue to be sold on underground forums and might be distributed by various threat groups across different campaigns. Along with common RAT capabilities, the latest variants of XWorm have some additional info-stealing functionalities that allow the attackers to collect confidential user data, banking details, credentials, cookies and others. The malware can also download additional plugins from C2 servers which may further enhance its operational capabilities.
Symantec protects you from this threat, identified by the following:
Behavior-based
ACM.Ps-Rd32!g1
ACM.Untrst-FlPst!g1
AGR.Terminate!g2
SONAR.MalTraffic!gen1
SONAR.SuspBeh!gen93
SONAR.SuspBeh!gen752
SONAR.SuspDataRun
SONAR.TCP!gen1
File-based
MSIL.Xworm!gen1
Scr.Malcode!gdn14
Scr.Malcode!gdn30
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Heur.AdvML.C
Network-based
System Infected: Trojan.Backdoor Activity 568
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
XWorm malware spread via compromised WebDAV servers
A new campaign leveraging compromised WebDAV servers to spread the XWorm malware has been observed in the wild. The attack chain starts with .LNK files distributed via malspam. Upon .LNK file execution, a malicious PowerShell code hosted on a remote WebDAV server is run, that in turn downloads a .zip archive containing the BATloader malware binary. The loader's function is to inject XWorm into the running processes on the infected endpoint. The functionality of the dropped XWorm payload comprises of user data theft, cryptowallet clipping, DDoS attacks execution or the download of additional payloads.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.BatCloak!gen1
SONAR.SuspBeh!gen6
File-based
Scr.Malcode!gdn14
Trojan Horse
Trojan.Gen.NPE
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
XWorm payloads delivered by the MEME#4CHAN campaign
XWorm is a Remote Access Trojan (RAT) known to be sold on underground forums. This .NET-based malware has multiple capabilities aimed at control of the infected machine, remote command execution, DoS attacks initiation and data ex-filtration. XWorm 3.1 variant has been recently distributed in a malicious campaign dubbed MEME#4CHAN. The attackers have been employing a multi-staged approach in their activities. The initial attack starts with malspam and malicious MS Office documents containing exploit code for the well known Follina MSDT Remote Code Execution vulnerability CVE-2022-30190. Further attack stages involve both PowerShell and JavaScript executions that lead up to the final payload of this campaign.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.TCP!gen1
Email-based
Coverage is in place for Symantec's email security products
File-based
CL.Downloader!gen12
ISB.Downloader!gen80
Scr.Malcode!gdn14
Scr.Malcode!gdn32
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.NPE
Trojan.Gen.NPE.C
W97M.Downloader
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.C
Network-based
Web Attack: MSDT Remote Code Execution CVE-2022-30190
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories |
X_Trader supply chain attack
In a recent report it was uncovered that Trojanized X_Trader software was the cause of the 3CX breach. Further investigation has uncovered that the X_Trader software supply chain attack affected more organizations than 3CX. An investigation by Symantec’s Threat Hunter Team has, to date, found that among the victims are two critical infrastructure organizations in the energy sector, one in the U.S. and the other in Europe. In addition to this, two other organizations involved in financial trading were also breached.
Read more in our blog: X_Trader Supply Chain Attack Affects Critical Infrastructure Organizations in U.S. and Europe
Symantec protects you from this threat, identified as the following:
Behavior-based
SONAR.TCP!gen6
File-based
FastReverseProxy
Packed.Generic.553
Trojan Horse
Trojan.Dropper
Trojan.Samsis
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.B
Heur.AdvML.C |
Yanluowang ransomware attacks continue
Attacks involving Yanluowang, the ransomware recently discovered by Symantec, are continuing and the ransomware is now being used by threat actors that have been mounting targeted attacks against U.S. businesses since at least August 2021.
There is a tentative link between recent Yanluowang attacks and older attacks involving Thieflock, ransomware-as-a-service developed by the Canthroid (aka Fivehands) group. Several tactics, techniques, and procedures (TTPs) used by these attackers overlap with TTPs used earlier by Thieflock and it is possible that some of the attacks leveraging Yanluowang may have been carried out by a former Thieflock affiliate.
Read more in our blog: Yanluowang: Further Insights on New Ransomware Threat
Symantec protects you from this threat, identified by the following:
File-based
Ransom.Yanluowang
Trojan Horse
Network-based
Web Attack: Webpulse Bad Reputation Domain Request
Web-based
Observed domains/IPs are covered under security categories |
Yashma - a Chaos ransomware variant
Yashma is a Chaos ransomware variant that first emerged around May 2022. According to recent reports, new versions of Yashma have been lately distributed in the wild. Yashma binaries are known to be generated with the help of Chaos ransomware builder that leaked on several underground forums earlier this year. Yashma contains functionality to check the OS language of the infected machine before execution. If the language is on the exclusion list hardcoded by the attackers, the malware will abort execution upon performing this check. Yashma is able to delete local backups and volume shadow copies on the infected endpoint.
Symantec protects you from this threat, identified by the following:
Behavior-based
SONAR.SuspBeh!gen625
SONAR.SuspDrop!gen1
File-based
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C |
Year-End Phishing in Japan: Fake Tepco unpaid bill
Japan is one of those countries that are widely targeted by phishing emails all year round – even during the last week of the year and the first days of the new year when many take a national year-end break. Symantec has observed one of these currently targeting both Japanese enterprises and consumers with unpaid electricity bill-related social engineering.
The actor has crafted the emails (subject: 【くらしTEPCO】電気料金未払い ? 即時対応が必要) to mimic Tokyo Electric Power Company Holdings (TEPCO), a major Japanese electric utility company. If users are successfully tricked by the lure and click on the malicious URL, they will be redirected to a fake TEPCO login page. The domain is typosquatting Tepco's name to further deceive users, and uses a XYZ top-level domain name.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
YoroTrooper threat group targets Commonwealth of Independent States (CIS)
New threat group dubbed YoroTrooper has been identified in espionage attacks targeted at governmental organization in countries belonging to the Commonwealth of Independent States (CIS). YoroTrooper group leverages various custom and open-source tools, infostealers and Remote Access Trojans (RATs) such as Stink Stealer, AveMaria, LodaRAT, Meterpreter and others. The infection chain involves malicious archives being delivered via malspam. Once extracted the malicious .LNK files serve as downloaders for .HTA files which in turn download next stage payloads and droppers to the compromised endpoints.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.SuspDataRun
SONAR.TCP!gen1
File-based
CL.Downloader!gen203
Downloader
Scr.Malcode!gdn32
Scr.Mallnk!gen3
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
Trojan.Gen.NPE.C
WS.Malware.1
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.B
Heur.AdvML.C
Network-based
URL reputation: Browser navigation to known bad URL
Web-based
Observed domains/IPs are covered under security categories |
Your LNK to malware
Recent data shows an increased usage of Windows Shortcut (LNK) files to deliver malware via email. Observed malware families include Qakbot (as referenced in an earlier June Protection Bulletin), Emotet, IcedID, BumbleeBee Loader, and others. Campaigns are making use of multiple different mechanisms to chain together payload delivery and execution. These have included the use of ISO, zip, and html files to deliver LNK files which in turn may launch applications like Powershell, CMD, curl, and regsvr32 to complete the chain.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
File-based
CL.Downloader!gen111
CL.Downloader!gen260
CL.Downloader!gen261
Downloader
ISB.Downloader!gen347
Trojan Horse
Web-based
Observed IPs/domains are covered under security categories |
Your Zeppelin invoice is ready
We have been aware of reports about fake "UPS Invoice" malspam being distributed to thousands of recipients this week. The same campaign has been found to deliver Dridex malware earlier but on the 3rd of November it suddenly changed its payload to the Zeppelin ransomware. Our earlier Protection Bulletin from September mentioned this ransomware variant being a spinoff of the older Vegalocker and Buran strains.
While Symantec continues monitoring this ransomware family, we recommend regular backup procedures of any important files and applying the latest product definitions to protect against ransomware threats.
Symantec Protection against Zeppelin ransomware family and the mentioned malspam run:
File-based Protection:
Downloader
Heur.AdvML.B
Heur.AdvML.C
Ransom.Buran
Trojan.Gen.2
Trojan.Gen.MBT
W97M.Downloader
Behavior-based Protection:
SONAR.SuspDrop!gen1
SONAR.SuspLaunch!gen4
SONAR.SuspLaunch!g22
Network-based Protection:
[31967] System Infected: Legion Loader Activity
[32179] Attack: Ransom.Gen Activity 23
[32436] Attack: Ransom.Gen Activity 29
Email-based Protection:
Coverage is in place for Symantec's email security products and Email Threat Isolation (ETI) technology provides an extra layer of protection for our customers. |
YouTube Hijacking: Rise in Attack Campaigns Distributing Infostealers
An increase in attack campaigns utilizing YouTube has been observed, with threat actors hijacking existing popular YouTube accounts to distribute Vidar and LummaC2 Infostealer malwares. Users are lured with videos purporting to offer cracked versions of everyday programs like Adobe. Links provided in the comments section lead to malicious packages uploaded to MediaFire. Consequently, users unwittingly become infected by downloading and executing malicious code instead of the desired program.
Symantec protects you from this threat, identified by the following:
File-based
Scr.Malcode!gdn32
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
YouTube video tutorials distributing Vidar Stealer, Laplas Clipper, XMRig Miner malwares
Threat actors capitalized on the eagerness of various end users to possibly acquire something for free rather than paying for a subscription via YouTube tutorials. These users will unknowingly be lured into installing an information stealer from the link provided on the video, trusting it is legitimate. It actually delivers not just one threat but a triple threat to its victims.
Vidar Stealer is one of them, known to collect a wide range of sensitive data. Laplas Clipper is another variant of infostealer and its main objective is to hijack cryptocurrency transactions. Lastly, XMRig Miner is designed to mine cryptocurrencies, particularly Monero (XMR).
Symantec protects you from this threat, identified by the following:
Web-based
Observed domains/IPs are covered under security categories
File-based
Miner.XMRig!gen2
Trojan.Gen.MBT
Trojan.Gen.2
Trojan Horse
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C |
YTStealer looking for YouTubers' authentication cookies and more
YouTube's popularity has remained unshaken for years – the platform hosts a large number of content creators and many have millions of viewers daily. What if prominent YouTube content creators and influencers had their account compromised? It opens doors to multiple adverse outcomes that may affect the account owner and their viewers. Other than plain credential phishing, there hasn't been much malware that primarily targets the platform. But recently there have been reports of an infostealer dubbed YTStealer that is specifically trying to snatch YouTube users authentication cookies and steal various information about the victim's account/channel.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.MBT
Trojan.Gen.2
Trojan.Gen.9
Network-based
System Infected: Trojan.Backdoor Activity 634
System Infected: Trojan.Backdoor Activity 564 |
z0Miner takes advantage of latest RCE CVEs for deployment
z0Miner is a cryptominer with a history of taking advantage of Remote Code Execution (RCE) vulnerabilities for deployment. The most recent vulnerability it has been abusing affects Atlassian's Confluence, identified as CVE-2021-26084. Previously, it has been seen exploiting vulnerabilities in Oracle’s WebLogic Server and ElasticSearch.
In a typical attack, the attacker will attempt to exploit a vulnerability to install a webshell on a targeted server. Following that, it will download and install additional payloads and the miner itself.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.NPE
Trojan.Gen.MBT
Trojan Horse
Network-based
Web Attack: Confluence RCE CVE-2021-26084
Web Attack: Oracle Weblogic Server RCE CVE-2020-14882
Web-based
Observed IPs/domains are covered under security categories |
Zanubis mobile malware continues to target banks and financial institutions in Peru
Zanubis is an Android banking malware variant that has been first seen on the threat landscape back in 2022. The malware continues to target banks and financial institutions specifically in Peru. In the recent campaigns from this year, the threat actors have been disguising the malicious Zanubis packages as official Android apps for the Peruvian governmental organization SUNAT. The malware relies on victims granting accessibility permissions to the malicious app in order to take control of the compromised device. The malware monitors for any executions of targeted applications on the device and once found proceeds with data theft, logging of observed events or taking screen recordings.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
Android.Malapp
Android.Reputation.2
AppRisk:Generisk |
Zanubis mobile malware targets banking apps
A new Android malware dubbed Zanubis has been discovered in the wild. The latest variant of this malware masquerades as a PDF app and targets mostly banking applications of various financial institutions and banks from Peru. Zanubis uses overlay-based attacks to steal users' credentials of the targeted applications. The collected information is later ex-filtrated to C2 servers controlled by the attackers.
Symantec protects you from this threat, identified by the following:
Mobile-based
AdLibrary:Generisk
Android.Reputation.2
AppRisk:Generisk |
Zardoor backdoor
A new backdoor, dubbed Zardoor, has recently been observed in a targeted attack against an Islamic organization. The actors behind this prolonged campaign have been using a multi-chain attack involving living-off-the-land binaries (LoLBins) and reverse proxy tools. The attackers also customized open-source tools and were able to maintain access to the victim's network for years, according to reports. At this time, the initial vector of compromise remains unknown.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Untrst-RunSys!g1
ACM.Ps-Rd32!g1
File-based
Hacktool
ProxyVenom
Trojan.Gen.2
Trojan.Gen.MBT
Trojan Horse |
Zarik Ransomware: a 20 dollar tip on Boosty as ransom
Another ransomware actor has been targeting individual machines using various Chaos ransomware variants. Upon successful encryption, the dropped ransom note advises victims to tip the crook $20 on Boosty, a Russian content subscription platform. Activities have been observed in Russia, the Netherlands, and Ukraine. Drive-by-download is the primary vector of infection, where malicious binaries have been disguised as cracked software such as Photoshop.
Symantec protects you from this threat, identified by the following:
Adaptive-based
ACM.Untrst-RLsass!g1
ACM.Untrst-RunSys!g1
File-based
Ransom.Sorry |
ZE Loader
According to recent reports, there is another run-of-the-mill banking malware called ZE Loader doing the rounds. ZE Loader leverages the classic overlay technique and DLL hijack combo to steal victims' credentials when they browse their banking websites. This trick has been around for years but still sees success, hence the reason we continue to see such malware.
Symantec protects you from this threat, identified by the following:
File-based
Trojan.Gen.MBT
Trojan.Horse |
ZenRAT malware masquerades as installer for password managers
ZenRAT is a recently discovered malware variant targeting Windows users. The malware is spread under the disguise of fake installer package for a password manager application called Bitwarden. Upon infection the malware will contact the pre-configured C&C servers and request further commands. ZenRAT has the functionalities to receive additional modules, forward logs to C2 servers or even assist the attackers with infostealing capabilities.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.ProcHijack!g21
SONAR.SuspBeh!gen625
File-based
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
WS.Reputation.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.A!500
Heur.AdvML.A!400
Heur.AdvML.B
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Zeoticus ransomware 2.0 in the wild
Symantec Security Response is aware that a new variant of Zeoticus ransomware has appeared on the threat landscape. The initial version (v1.0) of the ransomware was released in early 2020.
Zeoticus, most likely named after an anime character, drops a ransom note in read_me.html and appends a contact email address (i.e. [email protected]) at the end of the file name of the files it encrypts.
Symantec provides the following detection against Zeoticus 2.0:
File-based
Trojan.Gen.MBT |
Zephyr coinminer
A recent campaign has been observed distributing a variant of Zephyr coinminer. The malware is spread via a .7z archive titled "WINDOWS_PY_M3U_EXPLOIT_2024." This archive aims to disguise the malware binaries as leaked code for a Windows vulnerability. The compressed files include an NSIS (Nullsoft Scriptable Install System) installation file and two JavaScript files. The execution of the .js files triggers the generation of an AutoIt-based script, ultimately leading to the deployment of the final cryptomining payload.
Symantec protects you from this threat, identified by the following:
Behavior-based
ACM.Ps-Wscr!g1
ACM.Untrst-RunSys!g1
ACM.Wscr-Schtsk!g1
ACM.Wscr-Wscr!g1
AGR.Terminate!g2
SONAR.SuspDrop!g36
SONAR.TCP!gen1
File-based
ISB.Downloader!gen202
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A!300
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Network-based
Web Attack: Webpulse Bad Reputation Domain Request |
Zeppelin ransomware
Zeppelin is a Delphi-based ransomware, a younger sibling of VegaLocker (Vega) and Buran ransomware, that has been around since late 2019. The ransomware was named simply after the “.zeppelin” extension is added to the files it encrypted.
Zeppelin ransomware was observed time to time but a report suggests the ransomware made a resurgence. In line with the recently popular malware distribution method, Zeppelin was spammed out via Microsoft Word documents with malicious macro.
As with any other ransomware, the encrypted files may never be recovered. Make a habit of regularly backing up important files, enable macros that are from trusted sources and apply latest definitions to protect yourself from ransomware.
Symantec Protection against Zeppelin ransomware as well as related files:
File-based Protection:
Ransom.Buran
Trojan.Gen.MBT
W97M.Downloader
VBS.Downloader.Trojan
Network-based Protection:
Attack: Ransom.Gen Activity 29
System Infected: Legion Loader Activity |
Zeppelin ransomware attacks in the wild
Symantec Security Response is aware of the recent CISA and FBI alert regarding a number of targeted activities observed for the Zeppelin ransomware. Zeppelin is a ransomware variant originating from the Buran strain and sold on underground forums as a part of a Ransomware-as-a-Service (RaaS) offering. According to the released report, there have been instances where the threat actors executed the ransomware multiple times in the targeted network and this resulted in victims requiring to obtain several different decryption keys. The attackers behind the Zeppelin ransomware are also known to employ the double extortion scheme.
Symantec protects you from this threat, identified by the following:
Behavior-based
AGR.Terminate!g2
SONAR.SuspBeh!gen25
SONAR.SuspDrop!gen1
SONAR.SuspLaunch!g18
SONAR.SuspLaunch!g193
File-based
Downloader
Ransom.Buran
Ransom.LetsGo
Ransom.Zeppelin!g1
WS.Malware.1
Machine Learning-based
Heur.AdvML.B
Network-based
Attack: Ransom.Gen Activity 29
System Infected: Trojan.Backdoor Activity 634
Web-based
Observed IPs/domains are covered under security categories |
Zeppelin Ransomware re-surges with a new variant
Zeppelin is a ransomware variant originating from the Buran strain and sold on underground forums as a part of a Ransomware-as-a-Service (RaaS) offering. According to latest reports, a new Zeppelin variant is currently being advertised that comes with improvements to the implemented encryption mechanisms.
As we continue to monitor and enhance our protections against Zeppelin Ransomware variants, we recommend performing regular backups for any important data and ensuring your security products are kept up to date with the latest product definitions.
Symantec protects you from this threat, identified by the following:
File-based
Downloader
Heur.AdvML.B
Ransom.Buran
Trojan.Gen.MBT |
Zeppelin Ransomware still actively distributed
Protection Bulletin from last September discussed a 2020 resurgence of the Zeppelin ransomware. Zeppelin is a successor of the VegaLocker/Buran strain that remains active on the threat landscape according to a recently released report. Zeppelin distribution campaigns leverage phishing emails, MS Office documents with malicious macros and PowerShell loaders among others.
Symantec's protection against Zeppelin ransomware includes the following:
File-based
Downloader
Heur.AdvML.B
Ransom.Buran
Ransom.Gen
Trojan.Gen.2
Trojan.Gen.MBT
Trojan.Gen.NPE
Trojan Horse
Network-based
Attack: Ransom.Gen Activity 29
System Infected: Legion Loader Activity |
Zerobot botnet targets a variety of IoT devices through unpatched vulnerabilities
A new Go-based botnet called Zerobot has been recently distributed by exploitation of over twenty vulnerabilities in a variety of Internet of Things (IoT) devices. Zerobot supports several different architectures including i386, amd64, arm, arm64, mips, mips64, mips64le, mipsle, ppc64, ppc64le, riscv64, and s390x. The malware has the ability to communicate with the C2 servers over the WebSocket protocol. Once C2 connection is established, Zerobot will await commands from the command and control server. The malware has attack execution capabilities for various protocols such as: TCP, UDP, TLS, HTTP, ICMP.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.NPE
WS.Malware.1
WS.Malware.2
Network-based
Attack: D-Link DNS-320 RCE CVE-2020-25506
Attack: FLIR AX8 Thermal Camera Command Injection CVE-2022-37061
Attack: Hikvision Command Injection CVE-2021-36260
Attack: Telesquare SDT OS Command Injection CVE-2021-46422
Attack: Zyxel Firewall Unauthenticated Command Injection CVE-2022-30525
Web Attack: f5 Big-IP iControl Rest RCE CVE-2022-1388
Web Attack: Huawei Router RCE CVE-2017-17215
Web Attack: phpMyAdmin RFI CVE-2018-12613
Web Attack: Realtek SDK RCE CVE-2014-8361
Web Attack: Spring Framework CVE-2022-22965
Web Attack: Spring Framework CVE-2022-22965 2
Web Attack: Tenda Router RCE CVE-2020-10987
Web Attack: TOTOLINK Router Command Injection CVE-2022-26186
Web-based
Observed domains/IPs are covered under security categories |
zgRAT Activity On The Rise
Over the past two months we have been observing a steady increase in zgRAT activity, with most being vectored via malicious emails, either directly or by way of other threats such as loaders and stealers. This threat is a classic remote access trojan that allows its operator to gain remote control of a compromised machine, perform keylogging, steal sensitive data, and also upload/execute other threats. Note zgRAT is also capable of spreading via USB drives.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec's email security products
Adaptive-based
ACM.Ps-RgPst!g1
ACM.RegRun-TPs!g1
ACM.Ps-Msbuild!g1
Behavior-based
SONAR.SuspDataRun
File-based
Backdoor.Trojan
Machine Learning-based
Heur.AdvML.B |
ZHtrap Linux botnet
Symantec Security Response is aware that a new Linux botnet ZHtrap is in the wild targeting UPnP SOAP and Digital Video Recorder devices, and also wireless routers for which four N-day vulnerabilities are still unpatched. In addition to the backdoor functionality ZHtrap is also capable of carrying out the following actions:
Performing DDoS attacks
Scanning for vulnerable systems
Performing telnet scans
Downloading and executing remote files
Symantec provides the following detection against ZHtrap:
File-based
Linux.Lightaidra
Trojan Horse
Trojan.Gen.NPE
Web-based
Observed domains are covered under security categories |
Zimbra Collaboration's RCE (CVE-2022-27925) used in-the-wild
Recently, actors have been observed leveraging multiple vulnerabilities in Zimbra – a cloud-hosted collaboration software suite that includes an email server and a web client. In this protection bulletin, we'll cover CVE-2022-27925 which is a remote code execution vulnerability that allows attackers to upload crafted zip files with directory traversal in file path. In the attack, webshells were then dropped on targeted locations that acted as a backdoor to access the compromised servers.
Symantec protects you from this threat, identified by the following:
Network-based
Web Attack: Malicious ZIP File Upload
Policy-based
DCS default protection policies for servers will block webshells from being dropped on the system |
Zimbra Collaboration XSS vulnerability CVE-2023-37580
CVE-2023-37580 is a recently disclosed 0-day (CVSS score: 6.1) Cross-Site Scripting vulnerability affecting Zimbra Collaboration suite. Successful exploitation of the vulnerability may allow an attacker to compromise the confidentiality and integrity of the target system by means of malicious scripts injection. The exploit code for the vulnerability has been released publicly and the vulnerability has also been reported as exploited in the wild. Users are recommended to upgrade to version 8.8.15 Patch 41 or greater to fix this issue.
Symantec protects you from this threat, identified by the following:
Network-based
Web Attack: Zimbra Collaboration XSS CVE-2023-37580
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Zimbra users targeted in phishing campaign
A phishing campaign targeting Zimbra users in Latin America and Europe has recently been observed. The phishing messages purport to be from the domains used by the Zimbra admin, alerting the targets that their accounts will be deactivated unless they follow the link or open the attached HTML file and enter their credentials. Both the links in the message bodies and the form destination in the attached HTML point to a 'zimbraAdmin.php' file for credential exfiltration.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
File-based
Phishing.HTM.Gen
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
ZINC / Lazarus APT leveraging weaponized open-source software
Zinc aka Lazarus APT has been reported to be posing as recruiters on LinkedIn in order to lure targets into installing trojanized version of open-source software packages. The campaign has been targeting individuals and organizations in multiple sectors including media, defense and aerospace, and IT services. The malware spread by the threat actors has been hidden in trojanized packages of known open-source software such as PuTTY, KiTTY, TightVNC Viewer and Sumatra PDF Reader. The reported campaigns have been distributing malware from the ZetaNile and EventHorizon families, among others.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.B
Web-based
Observed domains are covered under security categories |
ZK Java Framework RCE vulnerability CVE-2022-36537 exploited in the wild
CVE-2022-36537 is a 2022 Remote Code Execution (RCE) vulnerability impacting the ZK Framework that has been rated with a high CVSS score. ZK is a Java-based and open-source Ajax Web framework that allows for creation of graphical user interfaces for web and mobile applications. When exploited the flaw could lead to information disclosure but could also allow potential attackers to perform remote code execution. The vulnerability has just recently been added to the "Known Exploited Vulnerabilities Catalog" by CISA following the reports of in the wild exploitation.
Symantec protects you from this threat, identified by the following:
Network-based
Web Attack: ZK Framework RCE CVE-2022-36537 |
Zloader distributed by DOCM files
Zloader is a variant of the Zeus banking trojan and according to the latest reports it has been recently distributed by malspam campaigns leveraging .docm files. In the past Zloader has been often spread via malicious .xls or .xlsm files. The change to .docm format is an evident effort at detection evasion.
Symantec protects you from this threat, identified by the following:
File-based
ISB.Downloader!gen411
Trojan.Gen.NPE
W97M.Downloader
Web-based
Observed domains are covered under security categories |
Zloader malware returns in a new campaign
Zloader (aka DELoader or Terdot) is a modular trojan variant based on the leaked Zeus malware source code, that first appeared on the threat landscape around 2015. Following the takedown operation that took place in April 2022, Zloader became inactive for almost 2 years. A new campaign delivering Zloader has now been observed in the wild. The latest variants of this loader come with new enhancements such as support for 64-bit versions of Windows, updated domain generation algorithm (DGA) or added RSA encryption capability for network communication.
Symantec protects you from this threat, identified by the following:
Behavior-based
ACM.Ps-Rd32!g1
File-based
Backdoor.Cobalt!gen20
Trojan Horse
Trojan.Gen.MBT
WS.Malware.1
Machine Learning-based
Heur.AdvML.A
Heur.AdvML.B
Heur.AdvML.B!100
Heur.AdvML.B!200
Heur.AdvML.C
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
Zombinder service leveraged to bind Ermac infostealer with legitimate apps
A new malicious campaign targeting both Android and Windows users has been observed in the wild. The attackers have been spreading the Ermac banking trojan for Android and Erbium, Aurora and Laplas infostealers for Windows. The malware has been distributed via a fake website advertising Wi-Fi authorization apps or browser updates. Once the user has been lured into downloading and executing the app, it would install the final payload on the compromised device. The threat group behind this campaign has been leveraging a third-party service used to bind obfuscated malicious payloads with Android apps called Zombinder.
Symantec protects you from this threat, identified by the following:
File-based
Trojan Horse
Trojan.Gen.2
Trojan.Gen.MBT
Mobile-based
AdLibrary:Generisk
Android.Reputation.1
Android.Reputation.2
AppRisk:Generisk |
ZuoRAT Hijacking SOHO Routers
A stealthy under-the-radar remote access trojan (RAT) dubbed ZuoRAT has been compromising small office/home office (SOHO) routers since 2020.
Due to the recent pandemic, a lot of workers opted to work from home and it presented an opportunity for threat actors to exploit this flaw on SOHO routers since less monitoring from corporate network admins is done.
The capabilities demonstrated in this campaign include gaining access to SOHO devices of different makes and models, collecting host and LAN information to assist in targeting, sampling and hijacking network communications to gain potentially persistent access to in-land devices, and stealthy C2 infrastructure leveraging multistage siloed router to router communications.
Symantec protects you from these threats, identified by the following:
Behavior-based
SONAR.ProcHijack!g43
SONAR.ProcHijack!g45
SONAR.ProcHijack!g47
SONAR.TCP!gen1
File-based
Backdoor.Cobalt!gm5
Trojan Horse
Trojan.Gen.MBT
Trojan.Gen.NPE
Trojan.Gen.2
WS.Malware.1
WS.Malware.2
Machine Learning-based
Heur.AdvML.B
Heur.AdvML.C
Network-based
System Infected: Trojan.Backdoor Activity 235
System Infected: Trojan.Backdoor Activity 612
Web Attack: Webpulse Bad Reputation Domain Request(29565)
Web-based
Observed domains/IPs are covered under security categories |
ZuRu targets MacOS
ZuRu is a dropper that has recently been spotted in the MacOS threat landscape. The actors behind ZuRu trojanized a popular app (iTerm2, a terminal emulator for macOS) and mimicked the official website in order to lure victims. In this campaign, successful infection will result in ZuRu downloading additional malicious files such as a python script to steal private information.
Symantec protects you from this threat, identified by the following:
File-based
OSX.Trojan.Gen |
Zyxel CVE-2023-28771 vulnerability leveraged by DDoS botnets
CVE-2023-28771 is a critical (CVSS score 9.8) command injection vulnerability affecting Zyxel devices. If exploited the vulnerability could allow unauthenticated attackers to execute arbitrary code remotely on the targeted systems. The vulnerability has also been added to the "Known Exploited Vulnerabilities Catalog" by CISA following reports of in-the-wild exploitation. CVE-2023-28771 has been recently used for propagation by several DDoS botnets such as Dark.IoT or various Mirai variants.
Symantec protects you from this threat, identified by the following:
File-based
Linux.Lightaidra
Linux.Mirai
Trojan Horse
Trojan.Gen.NPE
Web.Reputation.1
WS.Malware.1
WS.Malware.2
Network-based
Attack: Zyxel Command Injection CVE-2023-28771
Web-based
Observed domains/IPs are covered under security categories in all WebPulse enabled products |
École Française de Téhéran spoofed in an email credential phishing campaign
Cybercriminals have been targeting email credentials for decades through phishing and malware attacks. Recently, Symantec observed a phishing campaign targeting banks, insurance companies, real estate firms, energy companies, and research and education entities around the world. In this phishing campaign, the perpetrators used a shipping theme to trick victims, pretending to be the École Française de Téhéran, a French international school located in Tehran. Victims received an email with a PDF attachment that contained a link to a website that appeared to be a blurred shipping document. When they clicked on the link, they were prompted to enter their email credentials to view that document.
Symantec protects you from this threat, identified by the following:
Email-based
Coverage is in place for Symantec’s email security products
Web-based
Observed domains/IPs are covered under security categories |
‘RedDelta’ Group Finds Religion
There have been reports published of a three-month campaign against targets in the Vatican. The attacks have been attributed to the RedDelta group, which shares some links to Mustang Panda (aka PKPLUG), They began with a series of spear-phishing emails which were disguised as either legitimate internal Vatican correspondence or news about Hong Kong’s national security laws.
Aside from the Vatican, a number of other Catholic organizations were targeted including mail servers belonging to the Diocese of Hong Kong and an Italian-based missionary organization. Once inside targeted organizations, the attackers then deployed a range of malware including Plug X, Poison Ivy, and Cobalt Strike.
Symantec Protections
Trojan.Gen.2
Trojan.Gen.MBT
Trojan Horse
Trojan.Gen.NPE
Downloader |
The data in this report is aggregated from a combination of sources including Symantec’s Phish
Report Network (PRN), strategic partners, customers and security solutions.
This report discusses the metrics and trends observed in phishing activity during the month of
July 2009.
Highlighted in the August 2009 report:
Symantec observed a 52 percent increase from the previous month in all phishing attack
63 percent of phishing URLs were generated using phishing toolkits; an increase of 150
percent from the previous month
More than 130 Web hosting services were used, which accounted for 6 percent of all
phishing attacks; a decrease of 14 percent of total Web host URLs when compared to the
previous month
There was a 17 percent decrease from the previous month in non -English phishing sites
Symantec observed an increase in attacks employing fraudulent use of hijacked legitimate
SSL certificates
August 2009 Report #22
Phishing Tactic Distribution: Phish-
ing sites were categorized based
upon the domains they leveraged.
A considerable increase was seen
in the number of phishing sites be-
ing generated using phishing tool-
kits. This was likely a result of a
particular Command & Control
served being re -activated. This also
is partially attributable for the
overall increase in the volume of
phishing activity in July.
David Cowings
Executive Editor
Security Response Suyog Sainkar
Editor
Security Response Sagar Desai
PR Contact
[email protected]
The following categories were analyzed:
Sectors
Number of brands
Phishing toolkits
Fraud URLs with IP addresses
Phish sites by hosted cities
Use of Web -hosting sites
Geo-locations of phishing sites
Non -English phishing sites
Top-Level domains of phishing sites
Country of brand
Sectors: Phishing target sectors are seen in
the graphic below.
Number of Brands: Symantec observed that
37 percent of all attacks were from unique
phishing websites, which included more than
226 targeted brands. Although, the unique
phishing activity decreased by only 8 percent
in July, the proportion of unique phishing
URLs decreased considerably from 62% (in
June) to 35% (in July). This was the result of a
sharp increase in toolkit activity as the trend-
ing of the two is usually inversely correlated.
Phishing site attack methods and target sectors
Automated Phishing Toolkits: Symantec ob-
served that 63 percent of phishing URLs were
generated using phishing toolkits in the last
month. The number of toolkit attacks in-
creased by 150 percent. Symantec observed
that there was a vast increase in toolkit at-
tacks during the first half of the month
(primarily targeting the information services
sectors).
The increased toolkit attacks observed since
the previous month continued to primarily
target a social networking site popular in the
United States. This toolkit attack is in all likeli-
hood related to a specific Command & Control
server being reactivated. These attacks tar-
geted towards the information services sec-
tor, facilitates attackers in the collection of
personal data to leverage further spamming
activities.
Symantec recently observed an increase in
phishing attacks abusing legitimate SSL
certificates. Fraudsters have targeted the us-
ers of major brands by compromising Web
servers with SSL certificates so that the
fraudulent Web pages can display the familiar
padlock icon, while offering a false sense of
security to the victims.
In this particular attack, the certificates were
legitimate because they matched the compro-
mised legitimate domain. The fake pages that
were spoofing the target brands in actuality
had no connection with the displayed domain
or the certificate. A single compromised Web
server with an SSL certificate can be used to
host a broad range of phishing sites, and, can
have a higher success rate to trick users gain
trust in the fake site. Web servers using SSL
certificates generally have strong security
measures so they do not tend to be compro-
mised as frequently as non -SSL sites and in
the larger picture represent a relatively small
percentage of all phishing attacks. Weekly Behavior of Phishing T oolkit Activity
Phishers today use IP addresses as part of the
hostname instead of a domain name. This is a
tactic used to hide the actual fake domain
name that otherwise can be easily
noticed. Also, many banks use IP
addresses in their Web site URLs.
A total of 1067 phishing sites were
hosted in 61 countries. This
amounted to a decrease of approxi-
mately 29 percent of IP attacks in
comparison to the previous month.
The Greater China region ac-
counted for approximately 9 per-
cent of IP attacks in the month.
The total number of IP attacks origi-
nating from this region reduced by
10 percent as compared to the pre-
vious month. Panama and Peru are
new members in the list of top five
countries making their debut appearances at
the third and fourth positions respectively.
The top cities hosting Phish sites were Taipei,
Jacksonville and Houston. Symantec observed
that Phish sites with IP domains continued to
originate from newer cities every month.
Phishing Attacks Using IP Address Domains
For phishers, usage of free Web -hosting ser-
vices has been the easiest form of phishing in
terms of cost and technical skills required to
develop fake sites.
A total of 130 different Web -hosting services
served as the home for 2,402 phishing sites in
the month of July. Symantec observed that
there was a 14% decrease in the number of
free Web -hosting services utilized for
Phishing sites were analyzed based upon the
geo-location of their web hosts as well as the
1. Geo -Location of Phishing Lures
Leading this area are the USA (35 percent),
Germany (5 percent) and Romania (5 per-
cent). In July, there was a considerable in-
crease observed in the proportion of phishing
2. Geo -Location of Phishing Web Hosts
The top countries are USA (42 percent), Ger-
many (6 percent) and Romania (4 percent).
developing phishing sites. More than 85
brands were attacked using this method in
the reporting period. However, this form of
attack is not as widely used as it frequently
requires manual efforts to prepare the phish-
ing Web page, unlike the automated kit gen-
erated websites. Many free web hosts have
also improved their preventative and correc-
tive anti -phishing measures significantly de-
creasing the lifespan of phishing sites on their
systems.
number of unique URL’s (referred to in this
report as “lures”) utilized to lure victims to
the phishing web hosts.
lures for Hungary, making an introduction at
the ninth position. The proportion of active
phishing lures remained fairly evenly distrib-
uted for the rest of the locations.
There was a considerable increase observed in
the proportion of phishing hosts for Romania
and Poland. In July, the distribution of web
hosts was evenly distributed for rest of the
locations. Phishing Exploits of Free Web -Hosting Services
Global Distribution of Phishing Sites
Phishing attacks in French, Italian
and Chinese languages were found
to be higher in July. French language
attacks once again returned to the
top position. Symantec observed
that phishing websites in French and
Italian remained higher for some
popular financial brands. Phishing
attacks in Chinese languages pre-
vailed from the e -commerce sector.
Phishing URLs were categorized based on the
Top-Level Domains (TLD). TLDs are the last
part of an Internet domain name; i.e., the let-
ters that follow the final dot of any domain
name. E.g., in the domain name www.example.com,
the Top -Level Domain is .com (or COM, as do-
main names are not case -sensitive). Country
Code Top -Level Domains (ccTLD) are used by a
country or a territory. Non -English Phishing Trends
Top-Level Domains of Phishing Sites
Geo-Location of Phishing Web Hosts
They are two letters long, for example .us is
for the United States. Generic Top -Level Do-
mains (gTLD) are used by aparticular type of
organization (.com for a commercial organiza-
tion).
1. Generic Top -Level
Domains (gTLDs)
The generic TLDs .com,
.net and .org were the
most utilized with (72
percent), (10 percent)
and (7 percent) of the
total phish attacks re-
spectively.
2. Country Code Top -
Level Domains (ccTLDs)
The German, Korean
and United Kingdom
ccTLDs were evaluated
to be the highest in
phishing attacks with
(10 percent), (8 per-
cent) and (8 percent)
respectively. It is three or more letters long. Most gTLDs
are available for use worldwide, but for his-
torical reasons .mil (military) and .gov
(government) are restricted to use by the re-
spective U.S. authorities.
Comparisons of Top -Level Domains of Phishing Sites
Overall TLDs
The most used TLDs in phishing sites in the month of June were, .com, .net and .org compris-
ing of (53 percent), (8 percent) and (5 percent) respectively.
The Top -Level Domains in phishing were then further categorized:
The top countries of brands attacked in July
were the USA, UK and Italy. There were 30
countries whose brands were attacked. As
seen in the previous months, the trend of the
sectors targeted is similar throughout the
countries of brand origin except for those be-
longing to Germany and China.
There was a combination of banking, e -
commerce and information services sectors in
German brands. In China, the e -commerce
sector has been a primary target. However, in
July, Symantec observed a few phishing sites
targeted towards a large Chinese financial
brand. Country of Targeted Brands
The brands that phishing sites spoofed were categorized based on the country in which the
brand’s parent company is based. |
The data in this report is aggregated from a combination of sources including Symantec’s Phish
Report Network (PRN), strategic partners, customers and security solutions.
This report discusses the metrics and trends observed in phishing activity during the month of
November 2009.
Highlighted in the December 2009 report:
Symantec observed a 6 percent decrease from the previous month in all phishing at-
tacks
25 percent of phishing URLs were generated using phishing toolkits; a decrease of 24
percent from the previous month
A 26 percent decrease from the previous month was observed in non -English phishing
sites
More than 122 Web hosting services were used, which accounted for 10 percent of all
phishing attacks; an increase of 16 percent in total Web host URLs when compared to
the previous month
December 2009 Report #26
Phishing Tactic Distribution: Phishing sites
were categorized based upon the domains
they leveraged. The total volume of phish-
ing, in November, decreased by 6 percent
from the previous month. Symantec saw a
considerable drop in a particular toolkit
phishing based attack targeting an informa-
tion services brand and that in all probabil-
ity led to the drop in the overall phishing
volume. In November, there was a slight in-
crease in the number of free Web hosting
services utilized.
David Cowings
Executive Editor
Security Response Suyog Sainkar
Editor
Security Response Sagar Desai
PR Contact
[email protected]
The following categories were analyzed:
Sectors
Number of brands
Phishing toolkits
Fraud URLs with IP addresses
Phish sites that use IP address domains – categorized by hosted cities
Use of Web hosting sites
Geo-locations of phishing sites
Sectors: Phishing target sectors are seen in the graphic below. Phishing site attack methods and target sectors
Phishing sites in November were categorized to understand the attack methods and to deter-
mine the sectors and brands impacted by the attacks.
Number of Brands:
Symantec observed that 75
percent of all attacks were
from unique phishing web-
sites, which included more
than 220 targeted brands.
In November, the unique
phishing activity increased
by 2% over the previous
month. The proportion of
unique phishing URLs in-
creased from 70 percent (in
October) to 75 percent (in
November). The higher pro-
portion of unique phishing
activity was a result of a fall
in the number of toolkit
phishing Web sites in the
month.
Automated Phishing Toolkits:
Symantec observed that 25 percent of phish-
ing URLs were generated using phishing tool-
kits. The number of toolkit attacks decreased
considerably by 24 percent. This decrease was
attributed to a fall in the number of toolkit
phishing websites in the information services
sector.
Unlike the previous month, the activity of
toolkit phishing on the financial sector was
more than the remaining sectors. Symantec
observed a recurring rise and drop in the tool-
kit activity during the beginning of the month.
The toolkit activity was more consistent to-
wards the end of the month. Weekly Behavior of Phishing Toolkit Activity
Phishing Attacks Using IP Address Domains
Phishers today use IP addresses as part of the hostname instead of a domain name. This is a
tactic employed to hide the actual fake domain name that otherwise can easily be noticed. As
many banks use IP addresses in their website URLs, this establishes a precedent that spam-
mers can follow as it raises less suspicion.
A total of 1044 phishing sites were hosted in 55 countries. This amounted to an increase of
approximately 6 % of IP attacks in comparison to the previous month. The United States con-
tinued to be the top ranked country hosting phishing sites. In November, the Greater China
was back to the second position. This region accounted for approximately 8 % of IP attacks.
Canada accounted for approximately 5 percent of IP attacks in the month.
The top cities hosting phish sites were Fort Lauderdale, Montreal and Seoul. As observed in pre-
vious months, phish sites with IP domains continued to originate from newer cities every
month. Fort Lauderdale, entered the list of top cities hosting phishing sites for the first time and
took the top position as well. Montreal, Seoul, Taipei and Beijing were common in the list of top
cities in the previous month.
For phishers, using free Web hosting services
has been the easiest form of phishing in terms
of cost and technical skills required to develop
fake sites.
A total of 122 different Web hosting services
served as the home for 2,106 phishing sites in
the month of November. Symantec observed
that there was a 16 percent increase in the
number of free Web hosting services utilized
for developing phishing sites. More than 96
Phishing sites were analyzed based upon the
geo-location of their Web hosts as well as the
number of unique URL’s (referred to in this
1. Geo-Location of Phishing Lures
Leading this area are the USA (40 percent),
South Korea (6 %) and Germany (5 %). In No-
vember, a decrease was observed in the num-
ber of phishing lures originating from the USA
2. Geo -Location of Phishing Web Hosts
The top countries are USA (43 percent), South
Korea (6 %) and Germany (5 %). There was an
increase observed in the number of phishing
hosts from the USA. brands were attacked using this method in
the reporting period.
However, this form of attack is not as widely
used as it frequently requires manual efforts
to prepare the phishing Web page, unlike the
automated kit generated Websites. Many free
Web hosts have also improved their preventa-
tive and corrective anti -phishing measures
significantly decreasing the lifespan of phish-
ing sites on their systems.
report as “lures”) utilized to lure victims to
the phishing Web hosts.
and South Korea. Symantec has observed that
the phishing lures originated from fewer
countries than last month. The proportion of
active phishing lures remained evenly distrib-
uted for the rest of the locations .
On the other hand, there was a decrease for
South Korea and Germany. In November, the
distribution of Web hosts was evenly distrib-
uted for all other locations. Phishing Exploits of Free Web Hosting Services
Global Distribution of Phishing Sites
Phishing attacks in Italian, French and
Chinese languages continued to be the
highest in Non -English language phish-
ing attacks. In November, the number of
attacks in Portuguese exceeded that of
Spanish. The increase in Portuguese lan-
guage attacks was due to a rise in phish-
ing on a Brazilian social networking
website. Phishing websites in Italian and
French remain higher in financial
brands. The attacks in Chinese language
prevailed in the e -commerce sector.
Phishing URLs were categorized based on the
Top-Level Domains (TLD). TLDs are the last
part of an Internet domain name; i.e., the
letters that follow the final dot of any domain
name. E.g., in the domain name www.example.com,
the Top -Level Domain is .com (or COM, as
domain names are not case -sensitive).
Country Code Top -Level Domains (ccTLD) are
used by a country or a territory. Non -English Phishing Trends
Top-Level Domains of Phishing Sites
Geo-Location of Phishing Web Hosts
They are two letters long, for example .us is for
the United States. Generic Top -Level
Domains (gTLD) are used by a particular type of
organization (.com for a commercial
organization).
1. Generic Top -Level
Domains (gTLDs)
The generic TLDs .com,
.net and .co were the
most utilized with (72
percent), (9 %) and (7
%) of the total phish
attacks respectively.
2. Country Code Top -
Level Domains
(ccTLDs)
The Chinese, Korean
and United Kingdom
ccTLDs were evaluated
to be the highest in
phishing attacks with
(9 %), (9 %) and (8 %)
respectively. It is three or more letters long. Most gTLDs
are available for use worldwide, but for
historical reasons .mil (military) and .gov
(government) are restricted to use by the
respective U.S. authorities.
Comparisons of Top -Level Domains of Phishing Sites
Overall TLDs
The most used TLDs in phishing sites in the month of November were, .com, .net and .org
comprising of (50 percent), (7 %) and (5 %) respectively.
The Top -Level Domains in phishing were then further categorized:
The top countries of brands attacked in November were the USA, UK and Italy. There were 29
countries whose brands were attacked. As seen in the previous months, the trend of the sec-
tors targeted is similar throughout the countries of brand origin except for those belonging to
Germany and China. There was a combination of banking, e -commerce and information ser-
vices sectors in German brands. In China, the e -commerce sector remains a primary target. The
number of phishing attacks on South African brands increased significantly. Phishers are piggy-
backing on the hype and hoopla surrounding the 2010 FIFA World cup and are launching at-
tacks masquerading World cup related sites. Internet users are advised to be cautious of phish-
ing attacks during the World Cup season .
Country of Targeted Brands
The brands that phishing sites spoofed were categorized based on the country in which the
brand’s parent company is based. |
The data in this report is aggregated from a combination of sources including Symantec’s Phish
Report Network (PRN), strategic partners, customers and security solutions.
This report discusses the metrics and trends observed in phishing activity during the month of
December 2009.
Highlighted in the January 2010 report:
Symantec observed a 4 percent decrease from the previous month in all phishing at-
tacks
21 percent of phishing URLs were generated using phishing toolkits; a decrease of 19
percent from the previous month
A 26 percent decrease from the previous month was observed in non -English phishing
sites
More than 118 Web hosting services were used, which accounted for 11 percent of all
phishing attacks; an increase of 2 percent in total Web host URLs when compared to
the previous month
January 2010 Report #27
Phishing Tactic Distribution: Phishing sites
were categorized based upon the domains
they leveraged. In December, the total
volume of phishing decreased by 4 percent
from the previous month. Toolkit based
phishing attacks faced a decrease of 19
percent, which most likely led to the
decrease in the overall volume of phishing.
However, phishing attacks based on other
methods including typosquatting, IP
domains and use of webhosting sites have
slightly increased from the previous
month.
David Cowings
Executive Editor
Security Response Mathew Maniyara
Editor
Security Response Sagar Desai
PR Contact
[email protected]
The following categories were analyzed:
Sectors
Number of brands
Phishing toolkits
Fraud URLs with IP addresses
Phish sites that use IP address domains – categorized by hosted cities
Use of Web hosting sites
Geo-locations of phishing sites
Non -English phishing sites
Top-Level domains of phishing sites
Country of brand Non -English phishing sites
Sectors: Phishing target sectors are seen in the graphic below. Phishing site attack methods and target sectors
Phishing sites in December 2009 were categorized to understand the attack methods and
determine the sectors and brands impacted by the attacks.
Number of Brands:
Symantec observed that 79
percent of all attacks were from
unique phishing websites,
which included more than 218
targeted brands. In December
2009, the unique phishing
activity increased by 2 percent
over the previous month. The
proportion of unique phishing
URLs increased from 75 percent
(in November 2009) to 79
percent (in December 2009).
The higher proportion of
unique phishing activity was a
result of a fall in the number of
toolkit phishing websites in the
month.
Automated Phishing Toolkits:
Symantec observed that 21 percent of
phishing URLs were generated using phishing
toolkits. The number of toolkit attacks
decreased considerably by 19 percent. A
spike was observed in the first week of the
month in toolkit phishing activity. However,
the volume of phishing attacks from these
toolkits was considerably low throughout the
rest of the month. The toolkit attacks on the
financial sector decreased considerably in De-
cember 2009. The information services sector
had the majority of toolkit attacks during the
month. The attacks on the financial sector
spanned several brands whereas the attacks
in information services sector were primarily
targeted at a single brand. Weekly Behavior of Phishing Toolkit Activity
Phishing Attacks Using IP Address Domains
Phishers today use IP addresses as part of the hostname instead of a domain name. This is a
tactic employed to hide the actual fake domain name that otherwise can easily be noticed.
Also, many banks use IP addresses in their website URLs.
A total of 1135 phishing sites were hosted in 61 countries. This amounted to an increase of
approximately 8 percent of IP attacks in comparison to the previous month. The United States
continued to be the top ranked country hosting phishing sites. The Greater China region con-
tinued to be at the second spot comprising of 7 percent of IP attacks. South Korea accounted
for approximately 7 percent of IP attacks in the month.
The top cities hosting phish sites were Seoul, Fort Lauderdale and Clarksville. Debuting in
December was Clarksville at the third position. Brooklyn, Atlanta and Montreal were common
to the list of top cities in the previous month as well.
A total of 118 different web hosting services
served as the home for 2,150 phishing sites in
the month of December. Symantec observed
a 2 percent increase in the number of free
web hosting services utilized for developing
phishing sites. More than 84 brands were
attacked using this method in the reporting
period.
1. Geo-Location of Phishing Lures
Leading this area are the USA (37 percent),
South Korea (5 percent) and Canada (5 per-
cent). The proportion of lures from the USA
has decreased considerably from (43 percent)
2. Geo -Location of Phishing Web Hosts
The top countries are the USA (43 percent),
Germany (4 percent) and South Korea (3 per-
cent). Symantec observed that the phishing
hosts originated from more countries than the However, this form of attack is not as widely
used as it frequently requires manual efforts
to prepare the phishing Web page, unlike the
automated kit generated websites. Many free
web hosts have also improved their preventa-
tive and corrective anti -phishing measures
significantly decreasing the lifespan of phish-
ing sites on their systems.
in the previous month to (37 percent) in the
current month. The number of active lures
from Canada exceeded that from Germany
and has taken over the third position.
previous month. In December, the distribu-
tion of web hosts was evenly distributed for
all other locations. Phishing Exploits of Free Web Hosting Services
Global Distribution of Phishing Sites
For phishers, using free web hosting services has been the easiest form of phishing in terms of
cost and technical skills required to develop fake sites.
Phishing sites were analyzed based upon the geo -location of their web hosts as well as the
number of unique URL’s (referred as “lures” in the report) utilized to lure victims to the phish-
Phishing attacks in Italian, French and Portu-
guese languages were the highest in Non -
English language attacks. In December 2009,
the number of attacks in Portuguese in-
creased further, exceeding Chinese and reach-
ing the third position. The increase in phishing
on a Brazilian social networking website was
the reason behind the increase of attacks in
Portuguese language. Phishing websites in
Italian and French remained higher in financial
brands. The attacks in Chinese language pre-
vailed in the e -commerce sector.
Non -English Phishing Trends
Top-Level Domains of Phishing Sites
Geo-Location of Phishing Web Hosts
Phishing URLs were categorized based on the Top -Level Domains (TLD). TLDs are the last part
of an Internet domain name; i.e., the letters that follow the final dot of any domain name. E.g.,
in the domain name www.example.com, the Top -Level Domain is .com (or COM, as domain
names are not case -sensitive). Country Code Top -Level Domains (ccTLD) are used by a country
or a territory. They are two letters long, for example .us is for the United States. Generic Top -
Level Domains (gTLD) are used by a particular type of organization (.com for a commercial
Comparisons of Top -Level Domains of Phishing Sites
Overall TLDs
The most used TLDs in phishing sites in the month of December were, .com, .net and .org com-
prising of (54 percent), (7 percent) and (4 percent) respectively.
The Top -Level Domains in phishing were then further categorized:
organization). It is three or more letters long. Most gTLDs are available for use worldwide, but
for historical reasons .mil (military) and .gov (government) are restricted to use by the respec-
tive U.S. authorities.
1. Generic Top -Level Domains (gTLDs)
The generic TLDs .com, .net and .co were the most utilized with (74 percent), (10 percent) and
(6 percent) of the total phish attacks respectively.
2. Country Code Top -Level Domains (ccTLDs)
The Russian, Chinese and United Kingdom ccTLDs were evaluated to be the highest in phishing
attacks with (11 percent), (8 percent) and (7 percent) respectively. The top countries of brands attacked in December were the USA, UK and Italy. There were 32
countries whose brands were attacked. As seen in the previous months, the trend of the sec-
tors targeted is similar throughout the countries of brand origin except for those belonging to
Germany and China. There was a combination of banking, e -commerce and information ser-
vices sectors in German brands. In China, the e -commerce sector remains a primary target. UAE
made its debut in the top countries of brands attacked. A higher number of phishing attacks on
a bank based in UAE led to the country making its debut in the list. Another contributing factor
was the disappearance of France and Israel from the list. There were fewer phishing attacks on
brands based in these two countries as compared to the previous month.
Country of Targeted Brands
The brands that phishing sites spoofed were categorized based on the country in which the
brand’s parent company is based. |
The data in this report is aggregated from a combination of sources including Symantec’s Phish
Report Network (PRN), strategic partners, customers and security solutions.
This report discusses the metrics and trends observed in phishing activity during the month of
June 2009.
Highlighted in the July 2009 report:
Symantec observed a 21 percent increase from the previous month in all phishing attack
A 9 percent increase was observed in the total number of phishing URLs generated using
phishing toolkits. However, when compared against all phishing attacks the proportion of
phishing URLs using toolkits actually reduced to 38 percent. This decrease can be partially
attributed to a significant increase in the total number of phishing URLs utilizing free Web
-hosting services.
More than 143 Web hosting services were used, which accounted for 10 percent of all
phishing attacks; a staggering increase of 96 percent from the previous month
Symantec observed a 21 percent increase in non -English phishing sites
Symantec identified a new phishing tactic used in an attack targeting the Australian Taxa-
tion Office
July 2009 Report #21
Phishing Tactic Distribution: Phishing sites
were categorized based upon the domains
they leveraged. A considerable increase was
seen in the number of phishing sites using
automated toolkits. This increase was a re-
sult of a large toolkit attack targeting an in-
formation services brand .
David Cowings
Executive Editor
Security Response Suyog Sainkar
Editor
Security Response Sagar Desai
PR Contact
[email protected]
The following categories were analyzed:
Sectors
Number of brands
Phishing toolkits
Fraud URLs with IP addresses
Phish sites by hosted cities
Use of Web -hosting sites
Geo-locations of phishing sites
Non -English phishing sites
Top-Level domains of phishing sites
Country of brand
Sectors: Phishing target sectors are seen in
the graphic below.
Number of Brands: Symantec observed that
62 percent of all attacks were from unique
phishing Web sites, which included more than
208 targeted known brands. The unique at-
tacks increased by 27 percent from the previ-
ous month. The increase was likely a result of
phishers evading the phishing mitigation tac-
tics of several web hosting companies to their
benefit. This has also partially attributed to
an overall increase in the volume of phishing
activity in June.
Phishing site attack methods and target sectors
Automated Phishing Toolkits: Symantec ob-
served that 38 percent of phishing URLs in the
month of June were generated using phishing
toolkits. The number of toolkit attacks in-
creased by 9 percent. Symantec observed
that there was a sudden increase in toolkit
attacks during the last week of June (primarily
targeting the information services sectors).
The rise in toolkit attacks was primarily the
resurgence in phishers targeting a social net-
working site popular mainly in the United
States. This phishing attack follows right after
the recent phishing attacks observed in May
targeting another popular social networking
site Facebook, which was successfully curbed
by the team at Facebook.
This particular toolkit attack is most likely re-
lated to a specific Command & Control server
being reactivated. These attacks play a signifi-
cant part in populating and updating under-
ground economy servers with stolen personal
data; marketed in the maturing underground
economy. The primary objective of those who
operate in these activities is - money.
Symantec observed a new technique used in
phishing scams targeting the Australian Taxa-
tion Office at the closing of the financial year.
Most of these phishing attacks were traced
back to compromised Web servers hosted in
Germany and Australia.
The phishing scam was technically very nifty
as it asked the intended victims to supply de-
tails and print the form. The completed form
was to be sent to the mailing address to proc-
ess the tax refund. If someone completed the
form and clicked on the "Print" button, what
actually happened was the confidential infor-
mation was sent to a server utilizing the fraud
domain. Fortunately the Australian Taxation
Office took serious note of the phishing at-
tacks and worked diligently to gain control
over it.
Weekly Behavior of Phishing Toolkit Activity
Phishers today use IP addresses as part of the
hostname instead of a domain name. This is a
tactic used to hide the actual fake domain
name that otherwise can be easily
noticed. Also, many banks use IP
addresses in their Web site URLs.
A total of 1503 phishing sites were
hosted in 92 countries. This
amounted to an increase of approxi-
mately 21 percent of IP attacks in
comparison to the previous month.
The Greater China region accounted
for approximately 19 percent of IP
attacks in the month, the highest
observed from this region, as com-
pared to the previous months.
Thailand is a new member in the list of top
five countries making its debut appearance at
the fourth position. The top cities hosting
Phish sites were Taipei, Chicago and Bangkok. Phishing Attacks Using IP Address Domains
Free Web -Hosting services has been the easi-
est form of phishing in terms of cost and tech-
nical skill required to develop fake sites.
A total of 143 different Web hosting services
served as the home for 2,814 phishing sites in
the month of June. Symantec observed that,
there was a significant increase in the number
of free Webhosting services utilized for devel-
oping phishing sites. More than 77 brands
Phishing sites were analyzed based upon the
geo-location of their Web hosts as well as the
number of unique URL’s (referred to in this
report as “lures”) utilized to lure victims to
the phishing Web hosts.
Leading this area are the USA (35 percent),
1. Geo-Location of Phishing Lures
2. Geo -Location of Phishing Web Hosts
The top countries are USA (42 percent), Ger-
many (5 percent) and China (4 percent).
were attacked using this method in the re-
porting period.
However, this form of attack is not as widely
used as it frequently requires manual efforts
to prepare the phishing Web page, unlike the
automated kit generated Web sites. Many
Free Web Hosts have also improved their pre-
ventative and corrective anti -phishing meas-
ures significantly decreasing the lifespan of
phishing sites on their systems.
Spain (4 percent) and Romania (4 percent).
In June, there was a considerable increase ob-
served in the proportion of phishing lures for
Spain, Romania and Mexico. The proportion
of active phishing lures remained evenly dis-
tributed for the rest of the locations as ob-
served in the recent months.
Unlike the active phishing lures, the distribu-
tion of Web hosts remained somewhat un-
evenly distributed as in the previous month. Phishing Exploits of Free Web Hosting Services
Global Distribution of Phishing Sites
Phishing attacks in Italian,
French and Chinese lan-
guages were found to be
higher in June. French lan-
guage attacks returned to
the top position after a gap
of a couple of months. Sy-
mantec observed that phish-
ing Web sites in Italian and
French language remained
higher for some popular fi-
nancial brands. Italian and
French language phishing
sites were mainly from the
financial sector, while Chi-
nese language phishing sites
were from the e -commerce
sector.
Phishing URLs were catego-
rized based on the Top -Level Domains (TLD).
TLDs are the last part of an Internet domain
name; i.e., the letters that follow the final dot
of any domain name.
E.g., in the domain name www.example.com,
the Top -Level Domain is .com (or COM, as do-
main names are not case -sensitive). Country
Code Top -Level Domains (ccTLD) are used by a
country or a territory. Non -English Phishing Trends
Top-Level Domains of Phishing Sites
Geo-Location of Phishing Web Hosts They are two letters long, for example .us is
for the United States. Generic Top -Level Do-
mains (gTLD) are used by particular classes of
organizations (.com for commercial organiza-
tions).
1. Generic Top -Level Domains (gTLDs)
The generic TLDs .com, .net and .co were the
most used with (73 percent), (12 percent) and
(6 percent) of the total phish attacks respec-
tively. It is three or more letters long. Most gTLDs
are available for use worldwide, but for his-
torical reasons .mil (military) and .gov
(government) are restricted to use by the re-
spective U.S. authorities.
2. Country Code Top -Level Domains (ccTLDs)
The German, Russian and United Kingdom
ccTLDs were the highest found in phishing at-
tacks with (9 percent), (8 percent) and (7 per-
cent) respectively. Comparisons of Top -Level Domains of Phishing Sites
Overall TLDs
The most used TLDs in phishing sites in the month of June were, .com, .net and .org compris-
ing of (50 percent), (9 percent) and (4 percent) respectively.
The Top -Level Domains in phishing were then further categorized:
There was a combination of banking, e -
commerce and information services sectors in
German brands. In China, the e -commerce
sector has been a primary target. In the
month of June, there was a considerable in-
crease observed in the phishing sites targeted
towards some large Australian and Indian fi-
nancial brands. Country of Targeted Brands
The brands that the phishing sites spoofed were categorized based on the country in which
the brand’s parent company is based. |
The data in this report is aggregated from a combination of sources including Symantec’s Phish
Report Network (PRN), strategic partners, customers and security solutions.
This report discusses the metrics and trends observed in phishing activity during the month of
June 2009.
Highlighted in the June 2009 report:
Symantec observed that 42% of phishing URLs were generated using phishing toolkits; an
increase of 100% from the previous month
There was a 14% decrease from the previous month in non -English phishing sites
More than 98 Web hosting services were used, which accounted for 6 percent of all phish-
ing attacks; a decrease of 5 percent from the previous month
Symantec observed a new trend of phishing attack towards the popular social -networking
site Facebook
June 2009 Report #20
Phishing Tactic Distribution: Phishing sites were categorized based upon the domains they
leveraged. A considerable increase was seen in the number of phishing sites using automated
toolkits. This increase was a result of a large toolkit attack targeting an information services
brand .
David Cowings
Executive Editor
Security Response Suyog Sainkar
Editor
Security Response Sagar Desai
PR Contact
[email protected]
The following categories were analyzed:
Sectors
Number of brands
Phishing toolkits
Fraud URLs with IP addresses
Phish sites by hosted cities
Use of Web -hosting sites
Geo-locations of phishing sites
Non -English phishing sites
Top-Level domains of phishing sites
Country of brand
Sectors: Phishing target sectors are seen in
the graphic below.
Number of Brands: Symantec observed that
58 percent of all attacks were from unique
phishing Web sites, which included more than
206 targeted known brands. The unique at-
tacks decreased by 9 percent from the previ-
ous month. This was the result of a sharp in-
crease in toolkit activity as the trending of the
two is usually inversely correlated .
Phishing site attack methods and target sectors
Automated Phishing Toolkits: Symantec ob-
served that 42 percent of phishing URLs were
generated using phishing toolkits in the last
month. The number of toolkit attacks in-
creased by 100 percent. Symantec observed
that there was a sudden increase in toolkit
attacks during the first week of the month
(primarily targeting the information services
and Financial sectors ).
The rise in toolkit attacks was primarily the
resurgence in phishers targeting a popular
information services brand. This is in all likeli-
hood related to a specific Command & Control
server being reactivated, as toolkit activity
often fluctuates with the activities of Com-
mand & Control servers and botnets.
In May, Symantec observed a new trend of
phishing attacks towards the popular social -
networking site Facebook. The domains
hosting the phishing sites were mainly a jum-
ble of haphazardly generated names all of
which included a country code (many of which
were “.im”, “.at” or “.be”). Most of these
phishing sites were based out of Latvia and
China.
Symantec suspects that the initial Facebook
phishing attack vector was through forged
spam email. However, once user accounts
had been compromised, the attacks were
most likely launched through Facebook itself.
The purpose of phishing attacks towards
popular information services sites are primar-
ily to obtain a large number of credentials and
leverage email services for spamming activi-
ties. Fortunately the team at Facebook re-
garded the phishing attacks very seriously and
worked diligently to remove messages with
those links, and helping secure any compro-
mised accounts. Weekly Behavior of Phishing Toolkit Activity
Phishers today use IP addresses as part of the
hostname instead of a domain name. This is a
tactic used to hide the actual fake domain
name that otherwise can be easily noticed.
Also, many banks use IP addresses in their
Web site URLs.
A total of 1237 phishing sites were hosted in
77 countries. This amounted to an increase of
approximately 2 percent of IP attacks in com-
parison to the previous month. The Greater
China region accounted for approximately 15
percent of IP attacks in the month . Brazil and
Russia are new members in the top ten list
making their debut appearance at the third
and fourth positions respectively.
The top cities hosting Phish sites were San
Diego, Taipei and Taichung. Symantec ob-
served that Phish sites with IP domains con-
tinue to originate from more and more new
cities every month .
Phishing Attacks Using IP Address Domains
Free Web -Hosting services has been the easi-
est form of phishing in terms of cost and tech-
nical skill required to develop fake sites.
A total of 98 different Web -Hosting services
served as the home for 1,434 phishing sites.
More than 52 brands were attacked using this
method in the reporting period.
Phishing sites were analyzed based upon the
geo-location of their Web hosts as well as the
number of unique URL’s (referred to in this
report as “lures”) utilized to lure victims to
the phishing Web hosts.
1. Geo-Location of Phishing Lures
2. Geo -Location of Phishing Web Hosts
The top countries are USA (44 percent), Ger-
many (5 percent) and China (5 percent). However, this form of attack is not as widely
used as it frequently requires manual efforts
to prepare the phishing Web page, unlike the
automated kit generated Web sites. Many
Free Web Hosts have also improved their pre-
ventative and corrective anti -phishing meas-
ures significantly decreasing the lifespan of
phishing sites on their systems.
Leading this area are the USA (31 percent),
Germany (5 percent) and China (4 percent). It
is interesting to observe that the proportion
of active phishing lures remains evenly distrib-
uted for the rest of the locations as in the re-
cent months .
Unlike the active phishing lures, the distribu-
tion of web hosts was somewhat unevenly
distributed . Phishing Exploits of Free Web Hosting Services
Global Distribution of Phishing Sites
Phishing attacks in French, Italian and Chinese
languages were found to be higher in May.
French language attacks topped the list for
the second consecutive month. Symantec ob-
served that phishing Web sites in French and
Italian language remained to be higher for
Phishing URLs were categorized based on the
Top-Level Domains (TLD). TLDs are the last
part of an Internet domain name; i.e., the let-
ters that follow the final dot of any domain
name. E.g., in the domain name
www.example.com, the Top -Level Domain
is .com (or COM, as domain names are not
case -sensitive). Country Code Top -Level Do-
mains (ccTLD) are used by a country or a terri-
tory. some popular financial brands. French and
Italian language phishing sites were mainly
from the financial sector, while Chinese lan-
guage phishing sites were from the e -
commerce sector.
They are two letters long, for example .us is
for the United States. Generic Top -Level Do-
mains (gTLD) are used by particular classes of
organizations (.com for commercial organiza-
tions). It is three or more letters long. Most
gTLDs are available for use worldwide, but for
historical reasons .mil (military) and .gov
(government) are restricted to use by the re-
spective U.S. authorities.
Non -English Phishing Trends
Top-Level Domains of Phishing Sites
Overall TLDs
The most used TLDs in phishing sites in the
month of May were, .com, .net and .org com-
prising of (54 percent), (8 percent) and (5 per-
cent) respectively.
The Top -Level Domains in phishing were then
further categorized:
1. Generic Top -Level Domains (gTLDs)
The generic TLDs .com, .net and .org were the
most utilized with (75 percent), (11 percent)
and (6 percent) of the total phish attacks re-
spectively.
2. Country Code Top -Level Domains (ccTLDs)
The Russian, Brazilian and German ccTLDs
were evaluated to be the highest in phishing
attacks with (9 percent), (8 percent) and (7
percent) respectively. Comparisons of Top -Level Domains of Phishing Sites
The top countries of brands attacked in May
were the USA, UK and Italy. There were 24
countries whose brands were attacked. The
trend of the sectors targeted is similar
throughout the countries of brand origin ex-
cept for those belonging to Germany and
China.
There was a combination of banking, e -
commerce and information services sectors in
German brands. In China, the e -commerce
sector has been a primary target. Also in the
month of May, there was a considerable in-
crease observed in the phishing sites targeted
towards some Australian Financial brands.
Country of Targeted Brands
The brands that the phishing sites spoofed were categorized based on the country in which
the brand’s parent company is based. |