Cyware Monthly Threat Intelligence

Cyware Monthly Threat Intelligence - Featured Image

Monthly Threat Briefing July 3, 2023

The Good

Robust risk management practices to protect sensitive data and protect against potential threats are the need of the hour. With the Metior framework, an MIT research group is trying to achieve the same. It aims to assess the efficacy of various cybersecurity obfuscation schemes while laying down promising architecture to safeguard against different cyber threats. In a similar line, FCC Chairwoman Jessica Rosenworcel unveiled the establishment of a new task force last month. This is to fortify the cyber infrastructure of the telecom industry and ensure consumer data safety.

  • MIT researchers developed the Metior framework that provides a quantitative assessment of cybersecurity obfuscation schemes, helping engineers evaluate the effectiveness of different security approaches. The framework enables users to analyze the impact of various factors, such as victim programs, attacker strategies, and obfuscation scheme configurations, on the leakage of sensitive information. Microprocessor engineers can, hence, use it to determine the most promising architecture during the early stages of chip design.

  • The FCC announced the launch of its first-ever privacy and data protection task force with an aim to address SIM swapping attacks and thwart threats concerning data privacy. The creation of the task force comes in the wake of the rising number of data protection issues faced by customers of U.S. telecom providers. The task force will coordinate with the FCC to create authentication-related standards for carriers transferring a number to a new device or a new carrier.

  • The U.S. and Israeli government agencies released a guide for organizations to secure remote access software against malicious attacks. The guide highlights the attractiveness of remote access software to malicious actors, particularly ransomware groups, and offers recommendations to improve security and identify and prevent malicious activity.

  • Google has introduced a Secure AI Framework (SAIF) to help mitigate the risks of AI systems being misused. SAIF builds on Google's experience developing cybersecurity models and is designed to help protect against theft of AI models, data poisoning, malicious inputs, and extraction of confidential information.

The Bad

It won’t be wrong to dedicate the month of June to Cl0p victims. The ransomware group exploited a security issue in the MOVEit file transfer tool and compromised at least 158 organizations. In other news, a third-party breach exposed the personal information of numerous pilot applicants for American Airlines and Southwest Airlines. Meanwhile, a car insurance comparison platform and a well-known investment research firm collectively blurted out over 100 GB of data due to misconfigured databases.

  • National Health Service (NHS), the U.K, suffered a breach impacting the sensitive personal information of about 1.1 million patients, including trauma patients and victims of terrorism. The attack originally targeted the University of Manchester, which led to the NHS leak. The incident also led to the compromise of student and alumni information, which includes personal details, including demographic data. The university's backup servers were accessed by criminals; however, their identity remains unknown at this time.

  • The Cl0p ransomware group, responsible for numerous breaches due to a bug in the MOVEit file transfer tool, may have impacted at least 158 organizations. The number of individuals impacted by hackers exploiting vulnerabilities in the MOVEit software has surpassed 16 million, and this count is expected to rise further.

  • The LockBit ransomware group claimed to have hacked into Taiwan Semiconductor Manufacturing Company (TSMC) and demanded $70 million in ransom demand. Meanwhile, TSMC confirmed that one of its IT hardware suppliers was hit by a cyberattack that compromised data related to initial server setup and configuration. The supplier that suffered the actual attack is Kinmax Technology, Taiwan.

  • Hawai'i Community College observed dealing with a ransomware attack that knocked off its network. The ransomware group named N0_Esc4pe claimed responsibility for the attack and threatened to leak 65 GB of data stolen from the college. Experts said the incident did not impact the other campuses of the University of Hawaii (UH).

  • Major global airlines American Airlines and Southwest Airlines disclosed data breaches resulting from a hack at a third-party vendor, Pilot Credentials. On April 30, an unauthorized individual reportedly infiltrated Pilot Credentials' systems and illicitly obtained documents containing sensitive information. As a result, personal information belonging to 5,745 pilots from American Airlines and 3,009 pilots from Southwest Airlines has been affected.

  • A database containing 255,756 records, worth 93.93 GB, was left publicly available. Researchers claimed that the unprotected database belonged to RateForce and contained scans and images of various documents, including vehicle registrations, driver’s licenses, insurance cards, vehicle titles, and state Medicaid health coverage cards.

  • Hackers breached the computer network at a Scranton, Pennsylvania-based cardiology group and potentially obtained the private data of over 181,000 patients. The exposed information included names, addresses, dates of birth, Social Security numbers, driver’s license numbers, and passport numbers.

  • A misconfigured database containing the personal information of more than 8.8 million Zacks Investment Research users was dumped on a hacking forum. The compromised information included names, addresses, phone numbers, email addresses, usernames, and passwords stored as unsalted SHA-256 hashes. The oldest entry in the database dated back to May 2020.

  • A widespread brand impersonation scam campaign was discovered targeting over 100 popular clothing, footwear, and apparel brands. The campaign has been active since 2022 and peaked between November 2022 and February 2023. Scammers have set up more than 3,000 domains impersonating major brands such as Nike, Puma, Clarks, Crocs, Caterpillar, Fila, and Vans. SEO poisoning tactic is used to dupe unsuspecting users.

  • The government of the Canadian province of Nova Scotia and the University of Rochester, New York, confirmed data theft as a result of the exploitation of a new vulnerability affecting the popular file transfer tool MOVEit Transfer. The payroll provider Zellis was also hit by a cyberattack due to the same vulnerability, compromising the personal data of employees at the BBC, British Airways, Boots, and Aer Lingus, among other companies.

  • Globalcaja, a major bank in Spain, suffered a ransomware attack by the Play ransomware group. The group claimed to have stolen personal and confidential data and threatened to publish it if the bank did not pay the ransom. While the bank claims that the attack did not affect transactions or accounts of clients, some operations were temporarily limited.

New Threats

If you ask what’s hot in the cybercrime market, Mystic Stealer will make it to the list. The new info-stealer was found operating with at least 50 C2 servers and targets apps, browsers, crypto browser extensions, and much more. There’s another stealer, dubbed RDStealer, that uses RDP connections to steal sensitive data. The stealer cleverly exploits a remote machine when client drive mapping is enabled. Lastly, PowerStar and PowerDrop have emerged as new threats that you must learn about.

  • Security researchers stumbled across a new mobile malware campaign targeting online banking customers in the U.S., the U.K., Germany, Austria, and Switzerland. The campaign, active since March 2023, utilizes the Anatsa Android banking trojan embedded within apps posing as PDF scanners, QR code scanners, and fitness tracking apps, among others. The malware has already amassed over 30,000 installations and targets approximately 600 financial apps globally.
  • The relatively new Akira ransomware broadened its operations by including Linux-based platforms among its targets. Cyble Research and Intelligence Labs (CRIL) came across the Linux version of the malware and revealed that the group has 46 publicly disclosed victims. The attacks carried out by the group aimed at a broad spectrum of industries, including education, BFSI, professional services, manufacturing, and others.
  • Researchers uncovered an active cryptojacking campaign abusing and breaking into Internet-exposed Linux and IoT devices through brute-force attacks. Once inside a system, the attackers utilize a modified OpenSSH package to create a backdoor on the compromised devices and illicitly obtain SSH credentials, enabling them to maintain persistence. Criminals also deploy Reptile and Diamorphine open-source LKM rootkits to conceal their malicious actions.
  • China-linked APT15 (aka Flea) was found using a new Graphican backdoor in a long-running campaign that targeted foreign affairs ministers in the Americas. The backdoor shares similarities with Ketrican, another backdoor used by APT15 in previous attacks. Attackers leveraged a critical flaw in the Microsoft Windows Netlogon Remote Protocol (MS-NRPC) that was patched in 2020, to gain initial access.
  • A cyberespionage operation deploying RDStealer on systems in East Asia was observed by Bitdefender Labs. The malware was used to steal data from drives through RDP connections. The operation initially relied on commonly available malware such as AsyncRAT and hacking tools like Cobalt Strike. However, in late 2021 or early 2022, the threat actors switched to custom-made malware to avoid detection.
  • Iranian threat actor Charming Kitten introduced a new version of its PowerStar backdoor malware. The latest iteration of the backdoor unveils enhanced operational security measures, rendering the malware even more challenging to analyze and gather intelligence on. The updated malware utilizes the InterPlanetary File System (IPFS) and publicly accessible cloud hosting for its decryption function and configuration details.
  • Cyfirma and Zscaler published two simultaneous reports on a new info-stealer, named Mystic Stealer. The malware targets a wide range of applications and platforms, including 40 web browsers, 70 browser extensions, 21 cryptocurrency applications, nine MFA and password management applications, 55 cryptocurrency browser extensions, as well as Steam and Telegram credentials.
  • Researchers uncovered a new malware loader, dubbed DoubleFinger, deploying the GreetingGhoul cryptocurrency stealer on victims’ machines. The multi-stage campaign appears to be primarily targeting entities in Europe, the U.S., and Latin America. In some cases, the malware loader was found deploying Remcos RAT alongside DoubleFinger, using multiple evasion tactics, including steganography.
  • The newly discovered Pikabot trojan was found to be capable of executing a range of malicious commands, including running arbitrary shellcode, DLLs, and distributing malicious tools such as Cobalt Strike. The trojan is modular in nature, comprising a loader and a core module. It shares similarities with the QakBot trojan.
  • A new version of the GravityRAT Android spyware was observed being distributed via trojanized versions of BingeChat and Chatico apps. The malware came with two new capabilities — receiving commands to delete files and exfiltrating WhatsApp backup files. The campaign was attributed to a group named SpaceCobra.
  • Adlumin discovered a new malware named PowerDrop, which uses PowerShell and Windows Management Instrumentation (WMI) to infiltrate networks and execute remote commands. The malware was designed to target the aerospace industry in the US. The use of PowerShell for remote access and WMI-based persistence of PowerShell scripts, as well as ICMP triggering and tunneling, suggests the involvement of more proficient threat actors.
  • Check Point Research revealed a cyberespionage campaign using a previously undisclosed backdoor named Stealth Soldier targeting Libyan organizations. The malware is a customized modular backdoor with surveillance capabilities, and there are three distinct versions of it, varying in factors such as filenames and registry keys.
  • Researchers linked the recent attacks exploiting a zero-day vulnerability in a Barracuda Networks email security appliance to a cyberespionage group operating in China. The flaw, tracked as CVE-2023-2868, could lead to a remote command injection attack by sending a specially crafted TAR file as an attachment.

Related Threat Briefings

Mar 4, 2025

Cyware Monthly Threat Intelligence, February 2025

Google ramped up its defenses against the quantum threat. The company rolled out quantum-resistant digital signatures in Cloud KMS, following NIST’s post-quantum cryptography standards. Cyber defenders sharpened their tools, this month, and EARLYCROW is the latest weapon against stealthy APT operations. This method detects C2 activity over HTTP(S) using a novel traffic analysis format called PAIRFLOW. PyPI adopted a "dead but not gone" approach to abandoned software with Project Archival, a new system that flags inactive projects while keeping them accessible. Developers will see warnings about outdated dependencies, helping them make smarter security choices and avoid relying on unmaintained code. China’s Salt Typhoon made itself right at home in global telecom networks. The group was caught using JumbledPath, a custom-built spying tool, to infiltrate ISPs in the U.S., Italy, South Africa, and Thailand. Russia’s Sandworm hackers are using pirated software as bait. Their latest attack on Ukrainian Windows users disguises malware inside trojanized KMS activators and fake Windows updates. The CISA flagged major security holes in Microsoft Outlook and Sophos XG Firewall. One flaw allows remote code execution in Outlook, while another exposes firewall users to serious risks. A new payment card skimming campaign turned Stripe’s old API into a weapon. Hackers inserted malicious scripts into checkout pages, validating stolen card details through Stripe before exfiltration. A new malware named Ratatouille is stirring up trouble by bypassing UAC and using I2P for anonymous communications. Spreading through phishing emails and fake CAPTCHA pages, it tricks victims into running an embedded PowerShell script. A new version of ValleyRAT was also spotted, using stealthy techniques to infiltrate systems. Researchers found the malware being spread through fake Chrome downloads.

Feb 10, 2025

Cyware Monthly Threat Intelligence, January 2025

The U.K took a proactive stance on cyber resilience with its Cyber Local initiative, injecting £1.9 million into 30 projects across England and Northern Ireland. The effort focuses on closing the cyber skills gap, fortifying small businesses, and supporting underrepresented groups. India tightened its grip on data privacy with new draft rules designed to give citizens more control over their personal information. The proposed regulations mandate clearer data processing disclosures, stricter security protocols, and swift breach reporting. Hackers turned to SparkRAT, an open-source GoLang RAT, to target macOS users and government entities. Initially released in 2022, its modular design and cross-platform capability have made it a cybercriminal favorite. More than 10,000 WordPress sites were hijacked in a large-scale malware campaign delivering AMOS to macOS users and SocGholish to Windows users. Attackers exploited outdated plugins to inject fake browser update prompts. Lumma Stealer is made its way through GitHub in a new malware campaign that abuses the platform’s release infrastructure. Attackers deployed malware like SectopRAT and Vidar, using secure-looking download links to exfiltrate data while evading detection. Cybercriminals deployed the Coyote banking trojan against financial firms in Brazil, using malicious Windows LNK files to execute PowerShell scripts. This malware established secure connections with C2 servers, enabling keylogging and data theft. A two-year-long phishing campaign targeted Microsoft’s advertising platform users through malicious Google Search ads. A Mirai-based botnet exploited zero-day vulnerabilities in industrial routers and smart home devices. With 15,000 active nodes daily, it launched high-intensity DDoS attacks surpassing 100 Gbps, posing a growing threat across multiple countries.

Jan 3, 2025

Cyware Monthly Threat Intelligence, December 2024

The cloud revolution isn’t just about convenience anymore; it’s now the frontline of defense. With CISA's new directive mandating cloud environment fortification, federal agencies face a race against time to safeguard Microsoft 365 and other services. Meanwhile, proposed updates to the HIPAA security rules push healthcare organizations toward stronger PHI protection with advanced technical controls and detailed incident planning. On the global front, Operation PowerOFF turned the tables on DDoS attackers, dismantling 27 illegal platforms and curbing festive-season chaos. The cyber battlefield sees no intermission as new threats take center stage. A phishing campaign, dubbed Aggressive Inventory Zombies (AIZ), exploited brand trust by mimicking retail giants and crypto platforms. Meanwhile, the resurrected BADBOX botnet has compromised 192,000 Android devices globally, sneaking into supply chains to wreak havoc with ad fraud and account abuse. Adding to the turbulence, Poison Ivy (APT-C-01) resurged, targeting critical sectors with advanced phishing techniques and deploying Sliver RAT to breach systems and steal sensitive data. This month, new threats targeted IoT, banking, and app ecosystems, with threat actors unleashing diverse attacks. Iranian hackers deployed IOCONTROL malware to compromise IoT and OT systems, targeting critical infrastructure like gas stations. Meanwhile, the DroidBot banking malware infiltrates cryptocurrency and banking apps across Europe, leveraging MaaS operations for tailored attacks. Adding to the chaos, SpyLoan malware apps, with over eight million installs, exploited users in South America, Southeast Asia, and Africa, highlighting the escalating risks within app marketplaces. For detailed Cyber Threat Intel, click ‘Read More’.

Dec 4, 2024

Cyware Monthly Threat Intelligence, November 2024

The TSA reshaped the cybersecurity landscape for pipeline and railroad operators with proposed rules mandating incident reporting and risk management plans. Estimated to cost $2.1 billion over the next decade, the rules aimed to address growing cyber threats while balancing flexibility with resilience. Meta dismantled a sprawling web of over two million accounts tied to pig butchering scams in Southeast Asia and the UAE. Africa’s cybercrime ecosystem faced a decisive blow with Operation Serengeti, as over 1,000 suspects were arrested, and 134,000 malicious networks taken offline. TAG-110, a Russia-aligned threat group, launched a cyber-espionage campaign targeting governments and organizations in Asia and Europe. Using malware like HATVIBE and CHERRYSPY, it aimed to monitor geopolitical developments and assert influence. A botnet powered by Ngioweb malware converted 35,000 IoT devices into residential proxies. These compromised devices, found largely in the U.S., were sold on platforms like NSOCKS for malicious purposes. Water Barghest compromised over 20,000 IoT devices by exploiting known vulnerabilities. The group used Shodan to identify targets and deployed Ngioweb malware to connect them to its monetized network. LIMINAL PANDA, a Chinese cyberespionage group, has been targeting telecoms in South Asia and Africa since 2020. Using tools like SIGTRANslator and PingPong, the group exploits telecom protocols to steal critical data while staying undetected. NodeStealer has resurfaced, targeting Facebook Ads Manager accounts to steal credit card details and browser credentials. It uses Windows Restart Manager and Python scripts to execute its attacks, with stolen data sent via Telegram. BabbleLoader, a stealthy malware loader, delivers WhiteSnake and Meduza stealers. Disguised as accounting software, it targets English and Russian speakers, evading antivirus systems with advanced techniques.