Cyware Monthly Threat Intelligence

Cyware Monthly Threat Intelligence - Featured Image

Monthly Threat Briefing March 2, 2023

The Good

Counterterrorism and confronting new challenges in cyberspace is the only way forward. In the wake of the newest offensive cyber operations and national security threats against the U.S. and its allies, the DoJ has introduced the Disruptive Technology Strike Force. With increasing attempts to compromise IoT devices, NIST has picked Ascon as the new cryptography standard for small IoT devices. Get ready to witness post-quantum cryptography guidance in the first, much anticipated National Cybersecurity Strategy from the White House Office of the National Cyber Director.

  • The DoJ launched a new Disruptive Technology Strike Force to address several national security threats. The force will consist of top experts and will use intelligence and data analytics to tackle nation-state-sponsored cyberattacks, supply chain attacks, and abuse of sensitive data. The force is also assigned with the job of providing early warnings of threats to critical assets.

  • Singapore and the European Union (EU) signed a partnership agreement to drive collaboration across multiple digital platforms. These include digital payments, trusted data flows, 5G, artificial intelligence (AI), and digital identities. The agreement also mentions improving and maintaining cybersecurity standards across these platforms.

  • The NIST selected the Ascon algorithm developed at Graz University as a cryptography standard for lightweight IoT protection. The algorithm has been selected from 57 proposals submitted in 2019. The agency will publish the full standard later this year, which applies to miniature technologies, such as medical implants or keyless car openers.

  • The White House Office of the National Cyber Director confirmed it will include guidance on post-quantum cryptography in the upcoming National Cybersecurity Strategy to fortify digital networks. This will enable the government and private industries to better safeguard sensitive information, such as medical and personal data, against cyberattacks in the coming years.

The Bad

With organizations striving to detect, track, and take down phishing and malware attack attempts, the DDoS landscape also continues to evolve. Last month, security analysts took the wraps off of a DDoSaaS activity dubbed Passion, which may have an inimitable connection with Russian hacking groups. Meanwhile, Vice Society, which also happens to have a Russian connection, claimed two victims in the education sector in the U.S. and the U.K. Besides, there were several data breach incidents this month.

  • Web hosting giant GoDaddy disclosed that it was a victim of a multi-year security breach that started in May 2020. The same attackers stole the source code for Managed WordPress (MWP) in November 2021 and, later in December 2022, infected the cPanel hosting server with malware.

  • Lehigh Valley Health Network revealed that it suffered an attack by the BlackCat ransomware group. The unauthorized activity was detected on February 6 and involved a computer system used for patient images for radiation oncology treatment. The investigation to understand the full scope of the attack is underway.

  • A new DDoS-as-a-Service (DDoSaaS) platform named Passion was seen being used in attacks targeting medical institutions in the U.S. and Europe. Although its origins are unknown, the operation has distinctive ties with Russian hacking groups, such as Killnet, Mirai, Venom, and Anonymous Russia.

  • The Vice Society ransomware group claimed to have stolen sensitive data from the Guildford County School, the gang posted several files containing sensitive information belonging to teachers and students. U.S-based Mount Saint Mary College also disclosed a ransomware attack incident that it suffered from the same group.

  • A novel phishing attack, dubbed Screentime, was observed deploying a first-stage malware payload that infected over 1,000 organizations in the U.S. and Germany. The campaign was first observed in October 2022 and has been attributed to a new threat actor TA866. The malware used in the campaign were WasabiSeed, Screenshotter, AHK Bot, and Rhadamanthys Stealer.

  • The Tallahassee Memorial HealthCare (TMH) hospital was forced to cancel all non-emergency surgeries and other medical procedures following a security incident that crippled its computer systems. The incident is believed to be yet another ransomware attack on the U.S. healthcare providers.

  • Berkeley County Schools, West Virginia, was forced to temporarily cancel its daily classes and activities following a cyberattack. Law enforcement agencies were notified about the attack and the institution worked constantly to restore the affected IT systems, internet, and phone services.

  • Unknown hackers stole internal data from the gaming giant Activision and published them on dark web forums. According to the firm, the hackers stole information, such as full names, email addresses, phone numbers, salaries, work addresses, and home addresses of employees.

  • Indigo Books & Music, the largest bookstore chain in Canada, was hit by a ransomware attack that forced the chain to shut down its website. The incident compromised the current and former employees' data, including their credit card numbers.

  • A hacking crew called SiegedSec targeted Atlassian by gaining access to a third-party contractor’s systems and stole the personal data of more than 13,000 employees, along with floor plans for two of Atlassian’s offices. The exposed data included names, email addresses, work departments, and other information of employees.

  • Cutout, a popular AI image editing tool, suffered a data breach that exposed user images, usernames, and email addresses. An unsecured Elasticsearch database belonging to the tool included 9GB of user data with 22 million log entries. It also had information on the number of user credits, a virtual in-game currency, and links to Amazon S3 buckets.

  • German airport websites were hit by DDoS attacks once again. The alleged attack took place a day after an IT failure that caused cancellations and delays for thousands of passengers traveling via the country’s flag carrier Lufthansa. The investigations are underway.

New Threats

Given all the hype around ChatGPT, cybercriminals are not far from exploiting it for disruptive attacks. A case in point is cybercriminals abusing the platform through fake Windows desktop clients and bogus payment portals. Additionally, three ransomware groups, namely ESXiArgs, Royal Ransomware, and BlackBasta, were found crippling ESXi servers. Moving on, we have two BEC scammer groups baiting users in at least 13 languages, such as Norwegian, Polish, Portuguese, and Spanish.

  • A new variant of the LockBit ransomware, dubbed LockBit Green, is capable of targeting cloud-based services. The variant resembles Conti ransomware v3. It uses a random extension rather than the standard .lockbit extension and the ransom note is identical to the one used by the LockBit Black variant.
  • Researchers shared technical details of a new Sh1mmer exploit that could allow attackers to gain root-level access to ChromeOS. Expanded as Shady Hacking 1nstrument Makes Machine Enrollment Retreat, the exploit could be used to bypass administrator restrictions and unenroll enterprise-managed Chromebooks.
  • Researchers discovered multiple phishing pages related to OpenAI’s ChatGPT chatbot that pushed a variety of malware onto the victims’ systems. These websites were either disguised in the form of a legitimate tool such as ChatGPT Windows desktop client or promoted via Facebook. The malware distributed includes RedLine stealer and Lumma stealer.
  • Android users in Southeast Asia are being targeted in a campaign that is active since July 2022. The campaign distributes a banking trojan called TgToxic which is capable of stealing victims’ assets from banking applications, cryptocurrency wallets, and other financial apps. The victims are targeted via phishing emails and SMSes that carry malicious links.
  • Malwarebytes Labs detected a Magecart skimmer that not only acquires the victim's email, address, phone number, and credit card details but also records their IP address and browser user agent. The skimmer code uses iframes that are loaded when the checkout page is accessed.
  • Users of the GoAnywhere MFT software were warned of a zero-day remote code execution vulnerability that could allow malicious actors to target systems directly from the Internet. While there are no security patches available currently, users were asked to follow recommendations to prevent exploitation.
  • A new version of the Medusa botnet, based on Mirai code, has been spotted in the wild. It features a ransomware module and a Telnet brute-forcer, along with DDoS capabilities. The new version of Medusa features a data exfiltration tool, however, it does not steal user files before encryption.
  • A new ransomware named ESXiArgs and the Royal Ransomware’s Linux variant was found actively targeting a two-year-old RCE vulnerability in VMware ESXi servers. Additionally, BlackBasta ransomware operators were blamed for multiple attacks that involved the exploitation of vulnerable ESXi servers.
  • Chinese threat actor 8220 Gang has been found consistently change its C2 IP addresses to exploit Linux and cloud app vulnerabilities to expand its botnet and cryptomining attacks. The gang was also found using the ‘onacroner’ script, something that has been previously used by the Rocke cryptomining group.
  • The North Korean state-sponsored hacking group APT37, also known as RedEyes or ScarCruft, has recently added a new evasive malware, dubbed M2RAT, to its arsenal. The group is using the malware in conjunction with a steganography technique to target specific individuals and steal personal PC information and mobile phone data.
  • Two groups, identified as Midnight Hedgehog and Manadarin Capybara, were found impersonating executives to launch BEC attacks worldwide. While the first group is engaged in payment fraud, Mandarin Capybara executes payroll diversion attacks. Both groups have launched BEC campaigns in at least 13 different languages, including Danish, Dutch, Estonian, French, German, Hungarian, Italian, Norwegian, Polish, Portuguese, and Spanish.
  • A new threat cluster tracked as WIP26 relies heavily on public cloud infrastructure to target telecommunication providers in the Middle East. It also used the backdoors, dubbed CMD365 and CMDEmber, to abuse Microsoft 365 Mail and Google Firebase services for C2 purposes.
  • A new version of Hardbit ransomware has been found asking for details on cyber insurance policies from victims as part of the negotiation process. This is a unique trick adopted by the operators so that their ransom demands are covered by the victim’s insurance company, without the involvement of intermediaries.
  • A new malware, dubbed S1deloaded Stealer, has been found leveraging the DLL sideloading tactic in an ongoing attack campaign to evade detection. The campaign targets YouTube and Facebook users, infecting their computers and hijacking their social media accounts to mine cryptocurrency. More than 600 devices have been targeted in the campaign.
  • A previously unseen threat group, dubbed Hydrochasma, was found targeting medical labs and shipping companies in Asia. The activity has been ongoing since October 2022 and primarily relies on phishing emails. The tools deployed by the threat actors indicate a desire to achieve persistent and stealthy access to victim machines.

Related Threat Briefings

Mar 4, 2025

Cyware Monthly Threat Intelligence, February 2025

Google ramped up its defenses against the quantum threat. The company rolled out quantum-resistant digital signatures in Cloud KMS, following NIST’s post-quantum cryptography standards. Cyber defenders sharpened their tools, this month, and EARLYCROW is the latest weapon against stealthy APT operations. This method detects C2 activity over HTTP(S) using a novel traffic analysis format called PAIRFLOW. PyPI adopted a "dead but not gone" approach to abandoned software with Project Archival, a new system that flags inactive projects while keeping them accessible. Developers will see warnings about outdated dependencies, helping them make smarter security choices and avoid relying on unmaintained code. China’s Salt Typhoon made itself right at home in global telecom networks. The group was caught using JumbledPath, a custom-built spying tool, to infiltrate ISPs in the U.S., Italy, South Africa, and Thailand. Russia’s Sandworm hackers are using pirated software as bait. Their latest attack on Ukrainian Windows users disguises malware inside trojanized KMS activators and fake Windows updates. The CISA flagged major security holes in Microsoft Outlook and Sophos XG Firewall. One flaw allows remote code execution in Outlook, while another exposes firewall users to serious risks. A new payment card skimming campaign turned Stripe’s old API into a weapon. Hackers inserted malicious scripts into checkout pages, validating stolen card details through Stripe before exfiltration. A new malware named Ratatouille is stirring up trouble by bypassing UAC and using I2P for anonymous communications. Spreading through phishing emails and fake CAPTCHA pages, it tricks victims into running an embedded PowerShell script. A new version of ValleyRAT was also spotted, using stealthy techniques to infiltrate systems. Researchers found the malware being spread through fake Chrome downloads.

Feb 10, 2025

Cyware Monthly Threat Intelligence, January 2025

The U.K took a proactive stance on cyber resilience with its Cyber Local initiative, injecting £1.9 million into 30 projects across England and Northern Ireland. The effort focuses on closing the cyber skills gap, fortifying small businesses, and supporting underrepresented groups. India tightened its grip on data privacy with new draft rules designed to give citizens more control over their personal information. The proposed regulations mandate clearer data processing disclosures, stricter security protocols, and swift breach reporting. Hackers turned to SparkRAT, an open-source GoLang RAT, to target macOS users and government entities. Initially released in 2022, its modular design and cross-platform capability have made it a cybercriminal favorite. More than 10,000 WordPress sites were hijacked in a large-scale malware campaign delivering AMOS to macOS users and SocGholish to Windows users. Attackers exploited outdated plugins to inject fake browser update prompts. Lumma Stealer is made its way through GitHub in a new malware campaign that abuses the platform’s release infrastructure. Attackers deployed malware like SectopRAT and Vidar, using secure-looking download links to exfiltrate data while evading detection. Cybercriminals deployed the Coyote banking trojan against financial firms in Brazil, using malicious Windows LNK files to execute PowerShell scripts. This malware established secure connections with C2 servers, enabling keylogging and data theft. A two-year-long phishing campaign targeted Microsoft’s advertising platform users through malicious Google Search ads. A Mirai-based botnet exploited zero-day vulnerabilities in industrial routers and smart home devices. With 15,000 active nodes daily, it launched high-intensity DDoS attacks surpassing 100 Gbps, posing a growing threat across multiple countries.

Jan 3, 2025

Cyware Monthly Threat Intelligence, December 2024

The cloud revolution isn’t just about convenience anymore; it’s now the frontline of defense. With CISA's new directive mandating cloud environment fortification, federal agencies face a race against time to safeguard Microsoft 365 and other services. Meanwhile, proposed updates to the HIPAA security rules push healthcare organizations toward stronger PHI protection with advanced technical controls and detailed incident planning. On the global front, Operation PowerOFF turned the tables on DDoS attackers, dismantling 27 illegal platforms and curbing festive-season chaos. The cyber battlefield sees no intermission as new threats take center stage. A phishing campaign, dubbed Aggressive Inventory Zombies (AIZ), exploited brand trust by mimicking retail giants and crypto platforms. Meanwhile, the resurrected BADBOX botnet has compromised 192,000 Android devices globally, sneaking into supply chains to wreak havoc with ad fraud and account abuse. Adding to the turbulence, Poison Ivy (APT-C-01) resurged, targeting critical sectors with advanced phishing techniques and deploying Sliver RAT to breach systems and steal sensitive data. This month, new threats targeted IoT, banking, and app ecosystems, with threat actors unleashing diverse attacks. Iranian hackers deployed IOCONTROL malware to compromise IoT and OT systems, targeting critical infrastructure like gas stations. Meanwhile, the DroidBot banking malware infiltrates cryptocurrency and banking apps across Europe, leveraging MaaS operations for tailored attacks. Adding to the chaos, SpyLoan malware apps, with over eight million installs, exploited users in South America, Southeast Asia, and Africa, highlighting the escalating risks within app marketplaces. For detailed Cyber Threat Intel, click ‘Read More’.

Dec 4, 2024

Cyware Monthly Threat Intelligence, November 2024

The TSA reshaped the cybersecurity landscape for pipeline and railroad operators with proposed rules mandating incident reporting and risk management plans. Estimated to cost $2.1 billion over the next decade, the rules aimed to address growing cyber threats while balancing flexibility with resilience. Meta dismantled a sprawling web of over two million accounts tied to pig butchering scams in Southeast Asia and the UAE. Africa’s cybercrime ecosystem faced a decisive blow with Operation Serengeti, as over 1,000 suspects were arrested, and 134,000 malicious networks taken offline. TAG-110, a Russia-aligned threat group, launched a cyber-espionage campaign targeting governments and organizations in Asia and Europe. Using malware like HATVIBE and CHERRYSPY, it aimed to monitor geopolitical developments and assert influence. A botnet powered by Ngioweb malware converted 35,000 IoT devices into residential proxies. These compromised devices, found largely in the U.S., were sold on platforms like NSOCKS for malicious purposes. Water Barghest compromised over 20,000 IoT devices by exploiting known vulnerabilities. The group used Shodan to identify targets and deployed Ngioweb malware to connect them to its monetized network. LIMINAL PANDA, a Chinese cyberespionage group, has been targeting telecoms in South Asia and Africa since 2020. Using tools like SIGTRANslator and PingPong, the group exploits telecom protocols to steal critical data while staying undetected. NodeStealer has resurfaced, targeting Facebook Ads Manager accounts to steal credit card details and browser credentials. It uses Windows Restart Manager and Python scripts to execute its attacks, with stolen data sent via Telegram. BabbleLoader, a stealthy malware loader, delivers WhiteSnake and Meduza stealers. Disguised as accounting software, it targets English and Russian speakers, evading antivirus systems with advanced techniques.