Cyware Weekly Threat Intelligence, August 31 - September 04, 2020

Weekly Threat Briefing • September 4, 2020
Weekly Threat Briefing • September 4, 2020
The Good
The week comes to an end on a positive note with government agencies and firms making good strides toward addressing cyber threats. The DHS came up with two new initiatives to improve the cyber ecosystem of federal agencies and the public. One of them involved the set up of Vulnerability Disclosure Policies (VDPs) while the other was the launch of a Malicious Domain Block and Reporting (MDBR) service.
The Bad
Skimming attacks caught the attention of security experts this week. The affected victim organizations include the American Payroll Association (APA) and Warner Music Group. A wave of DDoS attacks was also observed on multiple ISPs across Belgium, France, and the Netherlands.
New Threats
Several new malware also appeared in different attack campaigns this week. This includes PyVil RAT, Cyrat ransomware, KryptoCibule, and Sepulcher malware. Additionally, the notorious Emotet and AgentTesla trojans made a comeback in different phishing email campaigns that purported to be from Windows 10 mobile OS and chemical manufacturers, respectively.
Unit 42 researchers at Palo Alto Networks found the wild exploitation of vBulletin pre-auth RCE vulnerability that can allow attackers to gain privileged access and control over any vBulletin server running versions 5.0.0 to 5.5.4.
Cisco Talos uncovered a series of email campaigns distributing various malware payloads such as GoziISFB, ZLoader, SmokeLoader, and AveMaria among others. These emails included links to malicious documents that were hosted on legitimate file-sharing platforms.
Several new malware that are capable of stealing information, hijacking cryptocurrency wallets, and more were also discovered this week. The names include PyVil RAT, Cyrat ransomware, KryptoCibule, and Sepulcher malware.
A new version of the Inter skimming kit that is capable of connecting to a variety of other cybercriminal campaigns including ransomware deployment, Darkcloud, and SandiFlux DNS services was also uncovered this week.
Emotet trojan operators were found using fake ‘Windows 10 Mobile’ attachments as a lure to trick users. Once installed, the trojan stole victims’ emails and later downloaded additional malware such as TrickBot and QBot.
Six apps designed to distribute Joker malware were found on the Google Play Store. These apps had a combined total of 200,000 downloads. In another incident, Google removed an Android app, named NEXTA LIVE, that collected personal information from Belarusians attending anti-government protests.
Attackers are abusing Google DNS over HTTPS to download malware. One such suspicious domain discovered was ‘jqueryupdatejs[.]com’.
AgentTesla trojan returned in a new COVID-19 phishing scheme that spoofed messages from chemical manufacturers and import/export businesses. These messages purported to offer information about surgical masks and other personal protective equipment.
Apple accidentally approved the ubiquitous Shlayer adware as a part of its new security notarization process. The malware was distributed via fake Adobe Flash Player update.
Iran-based Pioneer Kitten APT group was found selling corporate network credentials on different hacker forums. The credentials would let other cybercriminals and APTs perform cyberespionage and nefarious cyber activities.
Thousands of stolen Fortnite accounts were sold in underground marketplaces at prices between $200 and $250. Reports show that cybercriminals amassed around $1.2 million a year by selling these accounts.