Cyware Monthly Threat Intelligence

Monthly Threat Briefing • November 2, 2022
Monthly Threat Briefing • November 2, 2022
Countries across the globe are taking on cybersecurity threats. Among the top initiatives announced last month was a new cybersecurity task force in Singapore to assist organizations in strengthening their own infrastructure against cyber threats. The U.S. Transportation Security Administration (TSA) released a security directive regarding railroad cybersecurity threat mitigation actions and testing. Moreover, Google introduced passkey support to make users’ digital life passwordless and more secure within its ecosystem.
The Healthcare sector was actively targeted in October. The firms targeted include Advocate Aurora Health, Keystone Health, and CommonSpirit Health. Also, the fallout from the Medibank hacking incident grew as it impacted all of its customer data. Meanwhile, U.K’s largest car dealership firm was blackmailed to cough up a $60 million ransom in Bitcoin.
In the past month, Android-based threats were plenty. One that stood out was Clicker. Speaking of Android malware, North Korean hackers were observed experimenting with three new malware variants against South Korean Android phone users. There was also a new threat group spotted with unusual behavior. Dubbed Water Labbu, it was found targeting other scammers to steal cryptocurrency from them.
New Clicker Android malware was found infecting 20 million users by sneaking into Google Play Store as utility apps. The targeted utility apps are flashlight, QR code readers, camera unit converters, and task managers. The malware is designed to generate revenue for attackers by displaying fraudulent ads.
A threat actor is selling a new UEFI bootkit that comes with an anti-virtual machine (anti-VM), anti-debug, and code obfuscation features to block malware analysis attempts. Named BlackLotus, the malware is linked to APT41 threat actors and can be used to load unsigned drivers for launching BYOVD attacks.
Microsoft spotted a new ransomware strain, named Prestige, that was deployed last week in a campaign targeting organizations in the transportation and related logistics industries in Ukraine and Poland. The attacks overlap with previous victims of the FoxBlade (HermeticWiper) data-wiping malware.
Palo Alto Networks researchers revealed Ransom Cartel is likely the evolution of the defunct REvil ransomware. They found connections between the TTPs used by the attackers. One of these similarities was the algorithm used to encrypt files.
Trustwave researchers discovered a new Emotet botnet campaign that pushes password-protected attachments in either ZIP or ISO formats to infect users. These attachments are used to deliver Quasar RAT, Coinminer, and more.
The North Korea-based Kimsuky threat group was spotted using three new Android malware—FastFire, FastViewer, and FastSpy—to target users in South Korea. The malware disguised as multiple utility tools on Google Play Store. The Android malware set is capable of compromising almost all phone functions, ranging from hijacking communication channels to take over the camera.
Zimperium researchers observed a campaign associated with a lesser-known Android spyware strain, named RatMilad. The spyware is disguised as a mobile VPN app that is promoted on a Telegram channel and targets Middle Eastern enterprise mobile devices.
A critical authentication bypass vulnerability affecting multiple Fortinet services was exploited in the wild. Tracked as CVE-2022-40684, the vulnerability can be exploited by sending specially crafted HTTP or HTTPS requests.
More than 800 corporate users were infected in a new QBot malware attack campaign since September 28, Kaspersky warned. The most targeted country is the U.S., with 220 targeted users, including 95 corporate users. This is followed by Italy with 151 users, Germany with 93 users, and India with 74 users.
A new threat cluster tracked as WIP19 was seen targeting telecommunications and IT service providers in the Middle East and Asia. Some of the attack tactics and malware employed by the cluster overlap with Operation Shadow Force.
A new attack framework of Chinese origin is being used in the wild. Called Alchimist, it includes a customizable RAT for Windows and Linux machines. The framework can also be used to generate PowerShell-based attack shellcodes or distribute malicious implants on macOS.
A new infostealer named LilithBot was linked to a Russia-based threat actor group called Jester, which has been active since January. The malware is being distributed via a dedicated Telegram group and a Tor link.
A new threat actor named Water Labbu was found abusing malicious decentralized applications, or DApps, to steal cryptocurrency from other scammers. The group leveraged different social engineering tactics used by crypto scammers to trick users to subsequently inject malicious JavaScript code into their sites and stealing their cryptocurrency loot.
Researchers investigated a Cheerscrypt ransomware attack that utilized Night Sky ransomware TTPs. Believed to be the work of the Emperor Dragonfly threat actor, the ransomware is capable of targeting both Windows and Linux ESXi environments.