Cyware Monthly Threat Intelligence

Monthly Threat Briefing • February 3, 2020
Monthly Threat Briefing • February 3, 2020
The Good
Slump back in your favorite chair as we go over all the cybersecurity incidents for the first month of the year 2020. To begin with, let’s learn about all the good developments first. Researchers from Ben-Gurion University introduced first-ever all-optical ‘stealth’ encryption technology. In other news, MITRE released its new ATT&CK framework for Industrial Control Systems (ICS). Also, the National Institute of Standards and Technology (NIST) launched version 1.0 of its Privacy Framework to help businesses manage data privacy issues.
The Bad
There were also numerous cases of breaches this month that caused potential harm to millions of individuals. Cybercriminals posted payment card details of more than 30 million Americans and over one million foreigners for sale on Joker's Stash, traces of which were linked with the Wawa Inc. database breach. Also, the stolen data from Toronto-based firm Bird Construction was published by ransomware attackers after it denied their demands. Meanwhile, researchers reported Microsoft’s unsecured Elasticsearch servers exposing call center data of almost 250 million customers.
New Threats
Cybercriminals continue to target firms by finding loopholes and exploiting vulnerabilities in their security infrastructure. Now, Microsoft exposed an ongoing $100 million Evil Corp phishing campaign by TA505 threat actor group. Also, 200 million Broadcom cable modems were at the risk of eavesdropping and traffic re-routing attacks on users. Further, researchers found a new breed of ransomware, dubbed Ako, camouflaged as a request agreement.
Microsoft detected an ongoing $100 million Evil Corp phishing campaign that delivers malicious payloads through Excel documents. The new campaign uses HTML redirectors attached to emails. When opened, the HTML leads to the download of Dudear—a malicious macro-laden Excel file that drops the payload. The campaign was being carried out by the TA505 threat actor group.
At least 200 million Broadcom-based cable modems were affected by the new Cable Haunt flaw. The flaw allowed attackers to compromise a modem and gain full control over the inbound and outbound traffic. The attackers could also eavesdrop on browsing activity, re-route traffic to malicious domains, or even zombify devices to use them in botnet attacks.
Some 5,000 Android phones were reported to be infected by the new version Faketoken Android trojan. The trojan is used to drain its victims’ bank accounts to fuel offensive mass text campaigns targeting mobile devices from all over the world. Once installed on the victim’s device, Faketoken first checks if their bank accounts have enough money. It will then use the stolen payment cards to add credit to the victim’s mobile account.
More than 800 computers of a medical firm got compromised in a cyber incident starting October 14, 2019. Threat actors reportedly exploited the WAV audio files to hide the malware modules and later distributed it to vulnerable Windows 7 machines via EternalBlue. The purpose of the infection was to mine cryptocurrencies.
Microsoft issued security patches for 49 vulnerabilities, out of which 7 were classified as ‘Critical’, 41 as ‘Important’ and 1 as ‘Moderate’. One of the critical vulnerabilities termed as CryptoAPI spoofing flaw was discovered and reported by the NSA. It could allow attackers to spoof digital certificates to perform Man-in-the-Middle (MITM) attacks.
A widely known arbitrary file read vulnerability, tracked as CVE-2019-11510, was found to be exploited in the wild. The flaw could be exploited to infiltrate corporate networks, obtain sensitive information, and eavesdrop on communications. Despite patches being made available by the impacted vendors, many organizations still haven’t applied them, allowing threat actors to leverage the vulnerabilities in their attacks.
Ako, a new breed of ransomware, was discovered and reported this month. However, it remained unclear how the ransomware spreads. It was found that the ransomware was distributed via malicious spam emails camouflaged to be a request agreement with title such as ‘Agreement 2020 #1775505’. Such emails included a password-protected zip file named agreement.zip with the password ‘2020’ being given in the email.
Iranian state-sponsored hackers were linked to the data-wiper malware attack incident on the network of Bahrain’s national oil company Bapco. Dustman, the new malware, is designed to wipe data on infected computers. The malware appeared to be an upgraded and more advanced version of the ZeroCleare wiper that was discovered last fall.
In a sequel to the infamous Operation AppleJeus campaign, the Lazarus threat actor group was found using homemade malware—capable of evading detection—to target Windows and macOS users. The attack campaign used fake cryptocurrency trading websites with links to equally fake Telegram trading groups. So far, the malware has been spotted in the wild on machines located in the UK, Poland, Russia, and China.
A malicious extension named Shitcoin Wallet was found stealing passwords and private keys from cryptocurrency wallets and cryptocurrency portals. To initiate the stealing process, the extension requests permission to inject JavaScript code on 77 websites. When users navigate to any of these 77 sites, the extension loads and injects the malicious code that records users’ login credentials, searches for private keys, and sends the data back to the hackers.