Cyware Monthly Threat Intelligence

Monthly Threat Briefing • April 1, 2021
Monthly Threat Briefing • April 1, 2021
The Good
No bad deed goes unpunished, as the saying goes. It’s always good to see cybercriminals being punished for their actions. Several arrests were made this month, which clearly made us look forward to more such news. We also got to see some much-needed innovation in the cybersecurity field. The CISA released a tool that would help detect malicious activities related to the supply chain hack. One of the best news of the month is that researchers developed a novel system that can be used to generate cryptographic keys for maximum security.
The Bad
The month witnessed a constant influx of cyber breaches due to malware attacks on various organizations. Even educational institutions were not exempt. While the SolarWinds attack continued to stay in the spotlight, it was followed by the Accellion FTA and Exchange Server attacks. Furthermore, hackers pitting against hackers seem to have become quite a trend and we are watching what happens next.
New Threats
Various malware from every corner of the cyber world wore new skins i.e. got upgraded to cause more damage with no repercussions. Take Purple Fox for instance; a new variant of the malware can now move like a worm. Cyberespionage operations have become mainstream and a dangerous operation targeting the telecom sector was spotted by researchers. Cryptocurrency has surged in popularity, thereby making it a lucrative target for threat actors as we can see by the range of attacks on crypto wallets this month.
A new version of Agent Tesla was spotted with the capability to steal information via HTTP, SMTP, or FTP. Speaking about upgraded variants, a new Purple Fox malware strain with worm capabilities was found to be deployed in an ongoing attack campaign. New variants of Phoenix CryptoLocker and Gafgyt botnet were responsible for attacking CNA and vulnerable D-Link and IoT devices, respectively. A new variant of Ryuk ransomware that includes self-propagation capabilities was uncovered by researchers.
ZHtrap is a new IoT botnet that inherits functionalities from the infamous Mirai botnet. The botnet works by exploiting vulnerabilities in DVRs, CCTV cameras, Netgear routers, and Realtek devices.
Threat actors are using Google Ads to distribute a fake version of the Telegram desktop app. Three links spoofing Telegram’s website have been detected so far. One of these sites was used to spread AZORult trojan.
Security researchers have discovered a new type of steganography technique that involves hiding data inside a PNG image file posted on Twitter. Threat actors can exploit the method to obscure their nefarious activities on social media platforms.
An espionage campaign, dubbed Operation Diànxùn, was identified by the McAfee Advanced Threat Research Strategic Intelligence team. Another cyberespionage campaign that distributes ObliqueRAT malware was traced by researchers.
CopperStealer is an actively developed password and cookie stealer that targets the users of major service providers including Google, Facebook, Amazon, and Apple.
A new sophisticated backdoor malware, dubbed RedXOR, has been found masquerading as a polkit daemon to target Linux endpoints and servers. In similar lines, XcodeSpy is a new malware that targets Xcode projects used in macOS to spread custom EggShell backdoors.
The TA800 threat actor group was found distributing a malware loader called NimzaLoader in an ongoing highly-targeted spear-phishing email campaign. The Lazarus Group has been found using its MATA malware framework to deploy TFlower ransomware.
A hybrid malware that includes both cryptominer and ransomware capabilities has hit 20,000 machines in the span of a few days. z0Miner botnet was upgraded to take control of Jenkins and Elasticsearch servers to mine Monero.
Several new phishing campaigns came to the forefront, including attacks on the Coinbase platform to steal funds from cryptocurrency wallets. Scammers were found targeting investors in a sophisticated BEC scam with an average payout of $809,000 and another phishing campaign was impersonating the IRS to propagate the Dridex banking trojan.
Research revealed that the SunCrypt ransomware shares similarities with QNAPCrypt ransomware. Three more malware strains—GoldMax, Sibot, and GoldFinder—related to the SolarWinds supply chain attack were discovered by Microsoft and FireEye.
Time for some trojan news. The Ursnif Trojan was traced back to attacks against at least 100 banks in Italy. Threat actors are leveraging SEO techniques in the Gootloader technique to spread the Gootkit banking Trojan, Kronos, Cobalt Strike, and REvil ransomware.