Cyware Weekly Threat Intelligence - April 29–03

Weekly Threat Briefing • May 3, 2024
Weekly Threat Briefing • May 3, 2024
In a significant step towards bolstering cyber defenses, the NCSC-U.K launched the Advanced Mobile Solutions risk model to protect high-threat organizations from espionage via consumer-grade devices. Concurrently, the U.K. enforced the new PSTI Act, setting stringent cybersecurity standards for IoT manufacturers, with severe penalties for non-compliance. Together, these initiatives aim to fortify digital landscapes against evolving threats.
The NCSC-U.K introduced the Advanced Mobile Solutions risk model to enhance cyber resilience for high-threat organizations targeted by nation states. This initiative aims to protect against consumer-grade devices being compromised by spyware, which could be used as a gateway to corporate systems. Key principles include untrusted mobile devices, robust network protection, and secure data handling. The architecture of AMS involves mobile device management tools, data protection measures, VPN terminators, continuous monitoring, and data inspection.
The CISA released guidelines for critical infrastructure owners and operators to address both the opportunities and risks posed by AI. The guidelines instruct operators to govern, map, measure, and manage their use of AI, incorporating NIST's AI risk management framework. The guidelines emphasize steps such as understanding dependencies on AI vendors, inventorying AI use cases, creating procedures for reporting AI security risks, and continually testing AI systems for vulnerabilities.
The Product Security and Telecommunications Infrastructure (PSTI) Act came into effect in the U.K, mandating manufacturers of IoT products to stop using guessable default passwords and to have a vulnerability disclosure policy. The law covers a wide range of internet-connected products and imposes hefty fines for non-compliance. It also requires manufacturers to provide information on reporting security issues, security update timelines, and more. Enforcement will be handled by the Office for Product Safety and Standards.
The DHS formed a new board to guide the use of AI across 16 critical infrastructure sectors within the U.S. The board includes representatives from tech companies, academia, government agencies, civil rights and civil liberties organizations, and leaders in the AI industry. It aims to create guidelines for responsible AI use and defense against its risks. The board is part of broader efforts by the U.S. government to oversee AI deployment, including hiring AI experts and issuing executive orders related to AI safety standards and protection of critical infrastructure.
Europol's Operation Pandora successfully shut down a network of phone scam centers operating in Albania, Bosnia-Herzegovina, Kosovo, and Lebanon. The operation led to the arrest of 21 suspects and prevented criminals from defrauding victims of over €10 million ($11 million). German investigators played a crucial role in uncovering the scam, leading to the interception of millions of fraudulent calls. The authorities also identified different types of scams operated by call centers in each country.
A tri-agency cybersecurity advisory from the U.S. government has flagged the North Korean Kimsuky group for spear-phishing campaigns targeting foreign policy experts with seemingly legitimate emails. In a related vein, cybercriminals and state actors are exploiting compromised routers, like the Ubiquiti EdgeRouter, for anonymity and espionage activities. This botnet also involves Raspberry Pi devices and VPS servers and uses sophisticated malware like Ngioweb. Adding to the concerns, researchers have identified an Android trojan named Wpeeper, which leverages compromised WordPress sites for its C2 infrastructure.
The NSA, the FBI, and the Department of State issued a joint cybersecurity advisory warning about the North Korean Kimsuky group using spear-phishing campaigns to send spoofed emails appearing legitimate. The attackers exploit weak DMARC policies to deceive targets, particularly foreign policy experts, into sharing sensitive information. The hacking group engages in prolonged conversations to build trust and obtain opinions without immediately deploying malware. Organizations are advised to update their DMARC policies to better detect and mitigate such phishing attempts.
Cybercriminals and nation-state actors are exploiting compromised routers for anonymity, renting them out for malicious activities. Pawn Storm APT accessed the Ubiquiti EdgeRouter botnet and used it for espionage, revealed Trend Micro. The botnet, dating back to 2016, also includes Raspberry Pi devices and VPS servers. Another threat, Ngioweb malware, operates discreetly on EdgeRouters. With diverse exploits like SSHDoor, attackers persistently compromise routers.
Chinese cybersecurity firm QAX XLab uncovered the Android trojan Wpeeper, utilizing compromised WordPress sites for multi-level C&C infrastructure. Wpeeper, distributed via repackaged apps on UPtodown Store, employs HTTPS, elliptic signature encryption, and session differentiation to conceal its activities. Despite its sudden self-deletion command and disappearance, likely to evade detection, Wpeeper has infected thousands of devices.
Zloader resurfaced with enhanced anti-analysis measures, reminiscent of ZeuS's original design. In versions 2.4.1.0 and 2.5.1.0, Zloader implements registry checks and MZ header validations to thwart execution on different systems. It reintroduces an anti-analysis feature akin to the original ZeuS 2.x code, restricting binary execution to the infected machine.
A sophisticated phishing campaign has been found using RTF attachments in personalized emails mimicking reputable brands, like Epson and HP, to trick recipients into revealing Microsoft credentials. The RTF files harbor deceptive links redirecting victims to malicious sites designed to request users’ login credentials. The scam was detected over 1,000 times in two days.
APT42, an Iranian state-sponsored cyber espionage actor, is using enhanced social engineering schemes to gain access to victim networks, including cloud environments. The actor targets Western and Middle Eastern NGOs, media organizations, academia, legal services, and activists, often posing as journalists, event organizers, or legitimate services to build trust with victims. Some of the news outlets it impersonated include The Washington Post, The Economist, The Jerusalem Post, Khaleej Times, Azadliq, and more.
The digital security terrain is under threat with critical vulnerabilities across major platforms. GitLab's CVE-2023-7028 flaw enables account hijacks bypassing MFA, while Microsoft's Dirty Stream flaw in Android apps allows unauthorized code execution. Additionally, a new variant of Adload adware is evading Apple's XProtect on macOS, prompting calls for enhanced security measures.