Cyware Monthly Threat Intelligence

Monthly Threat Briefing • April 5, 2023
Monthly Threat Briefing • April 5, 2023
Allow us to open the newsletter with a major announcement - the release of the new U.S. National Cybersecurity Strategy, that envisages closer collaboration between government and industry while also focusing on increased collaboration with international coalitions and partnerships. Another development was observed to secure cloud servers as they face a range of security challenges, leaving organizations vulnerable to a myriad of cyber threats. In that light, the CISA released a publicly available and free post-incident hunting tool for organizations using Microsoft cloud applications and services.
Supply chain attacks continue to pose a significant threat across industry verticals. For instance, a major supply chain attack that has a connection to the North Korean Lazarus Group began last month. The group targeted 3CX, a software-based PBX provider. Victims of Cl0p witnessed a spike with at least ten victims disclosing data breaches owing to Forta’s GoAnywhere MFT zero-day abuse. Furthermore, a lesser-known Russian hacking group was associated with a new wave of attacks against government entities in Europe.
Moving on, Emotet malware made a comeback after a hiatus of three months. In the latest campaign, cybercriminals camouflaged as fake invoices. Meanwhile, hackers attempted to take over thousands of Facebook user accounts via a couple of trojanized ChatGPT extensions for Chrome (in reality, there are none). Also, security experts spotted several new threats namely dotRunpeX, Nexus, and Kritec described as a .NET malware injector, an Android banking trojan, and a skimmer malware, respectively.
The GlobeImposter ransomware was being distributed by the same threat actors who are responsible for MedusaLocker. The ransomware was being disseminated via RDP endpoints. Once the attackers take over systems via RDP, GlobeImposter conducts lateral movement and internal reconnaissance.
After three months of inactivity, the Emotet trojan resumed its malspam campaign last month. Unlike previously where it would use reply-chain emails, new phishing emails include ZIP files that are related to fake invoices. As per the researchers, the operators are gathering new credentials from address books to drive the campaign.
A new and sophisticated malware dubbed HiatusRAT, that targets various business-grade routers, has emerged in the threat landscape. Threat actors compromise DrayTek Vigor routers that have reached end-of-life to deploy the malware along with a variant of tcpdump, which enabled packet capture. At least 100 computers were infected, predominantly in Europe and Latin America.
A new variant of Xenomorph Android banking trojan surfaced in the wild. The new version comes with features to perform financial fraud seamlessly. It is capable of targeting more than 400 banking and financial institutions, including several cryptocurrency wallets.
Two fake ChatGPT Chrome extensions were recently discovered, called Quick access to Chat GPT and Chat GPT for Google. Both the variants were found targeting Facebook users in an attempt to hijack their accounts and installing backdoors that could give threat actors super-admin permissions to run paid ads and steal cookies of authorized active sessions.
Microsoft stumbled across a new phishing kit that has been part of several high-volume AiTM phishing attacks. Offered by a threat actor named DEV-1101, the kit was first advertised on a cybercrime forum in May 2022. The kit includes a wide range of readymade phishing pages that mimics several services such as Microsoft Office and Outlook.
A newly discovered .NET malware injector was discovered in the wild to deliver a wide range of malware. Tracked as dotRunpeX, the malware rose to prominence between November 2022 and January 2023. The malware leverages the process hollowing technique to hide its presence during the infection process.
A new Kritec skimming malware was used in Magecart attacks to target Magento stores. The malware masqueraded as a legitimate Google Tag Manager to evade detection. Once executed, the stolen credit card details were exfiltrated twice - one via a WebSocket skimmer and the other via a POST request.
Several threat actors were observed using a new Android banking trojan, dubbed Nexus, to target 450 financial applications and conduct fraud. While it was found to be still under development, the trojan provides all the main features to perform ATO attacks against banking portals and cryptocurrency services. The trojan was advertised on various hacking forums for a monthly fee of $3,000.
The threat group tracked as REF2924 was found deploying previously unseen malware in its attacks against entities in South and Southeast Asia. The malware, dubbed NAPLISTENER, is an HTTP listener programmed in C# and is designed to evade network-based forms of detection.
A new variant of BlackGuard stealer was spotted with capabilities like USB propagation, persistence mechanisms, and targeting additional crypto wallets. While the developers are constantly improving the malware, researchers warn that the new variant was being widely used to launch attacks.