Cookie Settings

This website uses cookies and similar technologies to provide essential functionality and improve your experience. Some features, such as demo scheduling and chat support, require marketing cookies to function. By clicking "Accept All", you consent to all cookies. Alternatively, you can customize your preferences, but note that declining marketing cookies will limit certain website features.

Cyware Weekly Threat Intelligence - April 08–12

Cyware Weekly Threat Intelligence - April 08–12 - Featured Image

Weekly Threat Briefing Apr 12, 2019

The Good

We’re back with the most interesting threat intel of the week. Before we get into cybersecurity incidents and new threats, let’s first acknowledge all the positive events that happened over the past week. RSA conference has announced its new innovation program in the Asia-Pacific and Japan (APJ) region to help cybersecurity startups accelerate its growth. USA.gov has launched an AI-powered chatbot ‘Sam’ that is capable of answering users’ questions on scams and frauds. Meanwhile, two US senators have introduced new bipartisan legislation to ban social networking platforms from using ‘dark patterns’ to trick users into providing their private data.

  • USA.gov, the official online portal of the U.S federal government, has launched an artificial intelligence (AI) powered chatbot named ‘Sam’ that is capable of answering users’ questions on scams and frauds. In just over a month, Sam interacted with over 4,000 users, with 78% users having successfully asked their question and received an answer.

  • RSA conference has announced its new innovation program in the Asia-Pacific and Japan (APJ) region to help cybersecurity startups accelerate their growth. The innovation program will include RSAC Launch Pad, which is designed to give cybersecurity talents a platform to pitch their new businesses and industry solutions to high-profile venture capitalists (VCs) and Chief Information Security Officers (CISOs).

  • US senators have introduced a bipartisan bill named ‘Cyber Resiliency Act’ that would require DHS to provide grants to support state and local governments in enhancing cyber defenses and addressing cybersecurity threats.

  • Another two US senators have introduced a new bipartisan legislation to ban social networking platforms from using ‘dark patterns’ to trick users into providing their private data. Social media platforms have long abused dark patterns and have gained access to users’ private data such as geolocation, contacts, call logs, friend lists, and more.

The Bad

Several data breaches and massive cyber attacks have occurred over the past week. Researchers have detected almost 74 Facebook groups that were used to carry out illicit trading of stolen credentials, email addresses, private data, credit card information, and phishing kits. An unprotected database at VoterVoice exposed over 300,000 unique email addresses and other personal information of people. Last but not least, researchers have uncovered a new cybercrime marketplace named ‘Genesis’ where cybercriminals are selling full digital fingerprints of over 60,000 users.

  • Researchers have detected almost 74 Facebook groups with nearly 385,000 members that were used to carry out illicit trading of stolen credentials, email addresses, private data, credit card information, and phishing kits. Facebook’s security team has removed all the 74 groups from the site.

  • Kaspersky Lab researchers have revealed the existence of a new cybercrime marketplace named ‘Genesis’ where cybercriminals are selling full digital fingerprints for over 60,000 users. Genesis market sells digital fingerprints, digital identity, cookies, credit card information, sensitive documents, browser user-agent details, WebGL signatures, website user logins, and passwords.

  • Genesee County has been hit by ransomware attack which led to the shut down of the County’s computers. The ransomware attack impacted its email services and regular operations across all departments. However, Genesee County confirmed that no information has been compromised.

  • Japanese optical manufacturer Hoya Corporation has suffered a cyber attack which led to the shut down of its factories for almost 3 days. In the attack, almost 100 computers were infected with a virus and user ID - passwords were stolen. However, no data leak was detected due to the attack.

  • AeroGrow International disclosed that attackers injected malicious code on its website in order to steal customers’ payment card information such as card number, expiration date, and CVV code. However, no personal information such as Social Security number, personal identification number (PIN), and driver’s license number, was leaked in the incident.

  • An unprotected database at VoterVoice exposed over 300,000 unique email addresses and other personal information of people who have sent messages to legislators or participated in campaigns via ‘the grassroots advocacy system’. The database also contained sensitive information related to political persuasions and religious beliefs.

  • The official website of the Bangladeshi oil company PetroBangla was initially hacked on April 07, 2019. On April 08, 2019, around 9.30 AM, the company restored its websites. However, hackers managed to successfully compromise the website for the second time around 5 PM.

  • Researchers have observed a new phishing scheme wherein cybercriminals are using international companies’ official newsletter subscription forms to trick victims into making payments to attackers’ bank account. This phishing scheme targets Russian users with a message written in Russian that states ‘Money for you’.

  • A new extortion email campaign has been observed wherein scammers claim that they have hacked your computer network and uncovered that you’re hiding your taxes from tax authorities. They then demand 2 bitcoins otherwise threatening to release all the tax-related documents to the tax department, DDoS the network, and installing WannaCry ransomware on the victims’ computers.

  • Greenville officials have disclosed that the city’s network has been infected with ransomware, forcing the city to shut down a majority of its servers. The city’s communications manager Brock Letchworth confirmed that no public safety is impacted and the city phones are operational.

  • The UK Home Office has inadvertently leaked the email addresses of almost 240 EU citizens who applied for the EU Settlement Scheme. While communicating with a small group of applicants via email, an administrative error was made. All the recipients’ email addresses were included in the CC field instead of BCC, which exposed the email addresses of the applicants to other applicants.

New Threats

Over the past week, several vulnerabilities and malware strains have emerged. A researcher has spotted Anubis Android trojan that steals PayPal credentials. In another instance, researchers have discovered a sophisticated APT framework dubbed ‘TajMahal’. Meanwhile, researchers have discovered a set of vulnerabilities called Dragonblood in the WiFi Alliance’s WPA3 security and authentication standard.

  • Researchers have discovered a new variant of the GoBrut malware that targets Unix-based machines. This malware was also spotted exploiting WordPress-based websites. GoBrut uses a malicious Executable and Linkable Format (ELF) file for this purpose.
  • A new variant of Mirai botnet that targets processors has been discovered recently. The new variant has been evolved to include a modified version of XOR encryption algorithm and a type of DDoS attack method. This Mirai variant targets Altera Nios II, OpenRISC, Tensilica Xtensa, and Xilinx MicroBlaze processors.
  • At the Kaspersky Security Analyst Summit in Singapore, this week, researchers have presented the iOS version of the Exodus spyware. This iOS version of Exodus spyware is capable of stealing contacts, photos, videos, audio recordings, and GPS information from the infected Apple device. It can also perform on-demand audio recording operations on the infected device.
  • A security researcher spotted the Anubis trojan disguised as an Android application that is available for download in Google Play Store. This trojan is capable of stealing banking credentials from the infected device, encrypting all files, and locking the device with a black screen.
  • FIN6, which is one of the sophisticated cybercriminal groups, has now shifted its focus to deploy ransomware in its attacks. Researchers uncovered this when they analyzed a cyber attack against an engineering firm. It was found that FIN6 installed ransomware on systems that did not have any payment data on them.
  • The MyCar controls mobile application for Android and iOS contains hard-coded admin credentials, which can be used by attackers to communicate and send commands to the target user account’s server endpoint. Attackers can also retrieve data such as the target’s location from a target MyCar unit as well as gain unauthorized physical access to a target’s vehicle.
  • A new info-stealer malware dubbed Baldr which was first spotted in the underground forums in January 2019 is now spotted in the wild. Baldr can steal system information and browser details such as browser history, cookies, stored passwords, system files, and user data. The malware can steal an entire file’s data and bulk transfer the stolen data to its C&C server.
  • The infamous Triton malware has now been linked with the attack against a Russia-based technical research institute. Researchers revealed that the operators of Triton had used a custom attack tool along with a publicly available exploit kit to launch the attack. The tools that were used in the attack are identified as SecHack and Mimikatz.
  • Kaspersky Lab researchers have revealed that Gaza Cybergang has targeted 240+ victims in the attacks across 39 countries. Majority of the victims were from the Palestinian Territories. Other victims were from countries such as Jordan, Israel, Lebanon, Saudi Arabia, Syria, Egypt, and the UAE.
  • Researchers have discovered a sophisticated APT framework dubbed ‘TajMahal’. Researchers noted that the recent activity related to TajMahal indicated that it contained two different packages named Tokyo and Yokohama. Tokyo was used to deploy Yokohama on victims’ machines, while Yokohama was used to steal sensitive data belonging to the victims.
  • The Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) has released a security alert about a new malware strain named HOPLIGHT. The backdoor trojan has been linked to HIDDEN COBRA, the North Korea-based hacking group.
  • A new variant of Emotet trojan has been found collecting financial information of users by injecting malicious code into computers. The variant has affected a total of 176 users in Chile. In the malware attack, the attackers have leveraged the ‘Living off the Land’ technique to evade antivirus detection and complicate its analysis.
  • Security researchers detected Dragonblood vulnerabilities in WiFi Alliance’s WiFi WPA3 security and authentication standard. These vulnerabilities, if exploited, could allow attackers to recover WiFi network passwords and gain access to the encrypted network traffic between the connected devices.

Related Threat Briefings

Feb 7, 2025

Cyware Weekly Threat Intelligence, February 03–07, 2025

PyPI is taking a "dead but not gone" approach to abandoned software with Project Archival, a new system that flags inactive projects while keeping them accessible. Developers will see warnings about outdated dependencies, helping them make smarter security choices and avoid relying on unmaintained code. The U.K is bringing earthquake-style metrics to cybersecurity with its new Cyber Monitoring Centre, designed to track digital disasters as precisely as natural ones. Inspired by the Richter scale, the CMC will quantify cyber incidents based on financial impact and affected users, offering clearer insights for national security planning. Kimsuky is back with another phishing trick, this time using fake Office and PDF files to sneak forceCopy malware onto victims' systems. Its latest campaign delivers PEBBLEDASH and RDP Wrapper by disguising malware as harmless shortcuts, ultimately hijacking browser credentials and sensitive data. Hackers have found a new way to skim credit card data - by hiding malware inside Google Tag Manager scripts. CISA is flagging major security holes in Microsoft Outlook and Sophos XG Firewall, urging agencies to patch them before February 27. One flaw allows remote code execution in Outlook, while another exposes firewall users to serious risks. Bitcoin scammers are switching tactics, swapping static images for video attachments in MMS to make their schemes more convincing. A recent case involved a tiny .3gp video luring victims into WhatsApp groups where scammers apply pressure to extract money or personal data. XE Group has shifted from credit card skimming to zero-day exploitation, now targeting manufacturing and distribution companies. A new version of ValleyRAT is making the rounds, using stealthy techniques to infiltrate systems. Morphisec found the malware being spread through fake Chrome downloads from a fraudulent Chinese telecom site.

Jan 10, 2025

Cyware Weekly Threat Intelligence, January 06–10, 2025

The U.K is fortifying its digital defenses with the launch of Cyber Local, a £1.9 million initiative to bridge cyber skills gaps and secure the digital economy. Spanning 30 projects across England and Northern Ireland, the scheme emphasizes local business resilience, neurodiverse talent, and cybersecurity careers for youth. Across the Atlantic, the White House introduced the U.S. Cyber Trust Mark, a consumer-friendly cybersecurity labeling program for smart devices. Overseen by the FCC, the initiative tests products like baby monitors and security systems for compliance with rigorous cybersecurity standards, ensuring Americans can make safer choices for their connected homes. China-linked threat actor RedDelta has ramped up its cyber-espionage activities across Asia, targeting nations such as Mongolia, Taiwan, Myanmar, and Vietnam with a modified PlugX backdoor. Cybercriminals have weaponized trust by deploying a fake PoC exploit tied to a patched Microsoft Windows LDAP vulnerability. CrowdStrike reported a phishing operation impersonating the company, using fake job offers to lure victims into downloading a fraudulent CRM application. Once installed, the malware deploys a Monero cryptocurrency miner. A new Mirai-based botnet, dubbed Gayfemboy, has emerged as a formidable threat, leveraging zero-day exploits in industrial routers and smart home devices. With 15,000 active bot nodes daily across China, the U.S., and Russia, the botnet executes high-intensity DDoS attacks exceeding 100 Gbps. In the Middle East, fraudsters are posing as government officials in a social engineering scheme targeting disgruntled customers. Cybercriminals have weaponized WordPress with a malicious plugin named PhishWP to create realistic fake payment pages mimicking services like Stripe. The plugin not only captures payment details in real time but also sends fake confirmation emails to delay detection.

Dec 20, 2024

Cyware Weekly Threat Intelligence, December 16–20, 2024

In a digital age where borders are blurred, governments are sharpening their strategies to outpace cyber adversaries. The draft update to the National Cyber Incident Response Plan (NCIRP) introduces a comprehensive framework for managing nationwide cyberattacks that impact critical infrastructure and the economy. Meanwhile, the fiscal year 2025 defense policy bill, recently approved by the Senate, emphasizes strengthening cybersecurity measures both at home and abroad. A deceptive health app on the Amazon Appstore turned out to be a Trojan horse for spyware. Masquerading as BMI CalculationVsn, the app recorded device screens, intercepted SMS messages, and scanned for installed apps to steal sensitive data. Malicious extensions targeting developers and cryptocurrency projects have infiltrated the VSCode marketplace and NPM. Disguised as productivity tools, these extensions employed downloader functionality to deliver obfuscated PowerShell payloads. The BADBOX botnet has resurfaced, compromising over 192,000 Android devices, including high-end smartphones and smart TVs, directly from the supply chain. Industrial control systems are facing heightened risks as malware like Ramnit and Chaya_003 targets engineering workstations from Mitsubishi and Siemens. Both malware families exploit legitimate services, complicating detection and mitigation efforts in ICS environments. The Chinese hacking group Winnti has been leveraging a PHP backdoor called Glutton, targeting organizations in China and the U.S. This modular ELF-based malware facilitates tailored attacks across industries and even embeds itself into software packages to compromise other cybercriminals. A tax-themed phishing campaign, dubbed FLUX#CONSOLE, is deploying backdoor payloads to compromise systems in Pakistan. Threat actors employ phishing emails with double-extension files masquerading as PDFs.

Dec 13, 2024

Cyware Weekly Threat Intelligence, December 09–13, 2024

Cybercrime’s web of deception unraveled in South Korea as authorities dismantled a fraud network responsible for extorting $6.3 million through fake online trading platforms. Dubbed Operation Midas, the effort led to the arrest of 32 individuals and the seizure of 20 servers. In a significant move to combat surveillance abuses, the U.S. defense policy bill for 2025 introduced measures to shield military and diplomatic personnel from commercial spyware threats. The legislation calls for stringent cybersecurity standards, a review of spyware incidents, and regular reporting to Congress. The subtle art of deception found a new stage with a Microsoft Teams call, as attackers used social engineering to manipulate victims into granting remote access. By convincing users to install AnyDesk, they gained control of systems, executing commands to download the DarkGate malware. Russian APT Secret Blizzard has resurfaced and used the Amadey bot to infiltrate Ukrainian military devices and deploy their Tavdig backdoor. In a phishing spree dubbed "Aggressive Inventory Zombies (AIZ)," scammers impersonated brands like Etsy, Amazon, and Binance to target retail and crypto audiences. Surveillance has reached unsettling new depths with the discovery of BoneSpy and PlainGnome, two spyware families linked to the Russian group Gamaredon. Designed for extensive espionage, these Android malware tools track GPS, capture audio, and harvest data. A new Android banking trojan has already caused havoc among Indian users, masquerading as utility and banking apps to steal sensitive financial information. With 419 devices compromised, the malware intercepts SMS messages, exfiltrates personal data via Supabase, and even tricks victims into entering details under the pretense of bill payment. Iranian threat actors have set their sights on critical infrastructure, deploying IOCONTROL malware to infiltrate IoT and OT/SCADA systems in Israel and the U.S.

Dec 6, 2024

Cyware Weekly Threat Intelligence, December 02–06, 2024

NIST sharpened the tools for organizations to measure their cybersecurity readiness, addressing both technical and leadership challenges. The two-volume guidance blends data-driven assessments with managerial insights, emphasizing the critical role of leadership in applying findings. The Manson Market, a notorious hub for phishing networks, fell in a sweeping Europol-led takedown. With over 50 servers seized and 200TB of stolen data recovered, the operation spanned multiple countries, including Germany and Austria. Russian APT group BlueAlpha leveraged Cloudflare Tunnels to cloak its GammaDrop malware campaign from prying eyes. The group deployed HTML smuggling and DNS fast-fluxing to bypass detection, targeting Ukrainian organizations with precision. Earth Minotaur intensified its surveillance operations against Tibetan and Uyghur communities through the MOONSHINE exploit kit. The kit, now updated with newer exploits, enables the installation of the DarkNimbus backdoor on Android and Windows devices. Cloudflare Pages became an unwitting ally in the sharp rise of phishing campaigns, with a staggering 198% increase in abuse cases. Cybercriminals exploited the platform's infrastructure to host malicious pages, fueling a surge from 460 incidents in 2023 to over 1,370 by October 2024. DroidBot has quietly infiltrated over 77 cryptocurrency exchanges and banking apps, building a web of theft across Europe. Active since June 2024, this Android malware operates as a MaaS platform, enabling affiliates to tailor attacks. Rockstar 2FA, a phishing platform targeting Microsoft 365 users, has set the stage for large-scale credential theft. With over 5,000 phishing domains launched, the platform is marketed on Telegram. The Gafgyt malware is shifting gears, targeting exposed Docker Remote API servers through legitimate Docker images, creating botnets capable of launching DDoS attacks.