Cookie Settings

This website uses cookies and similar technologies to provide essential functionality and improve your experience. Some features, such as demo scheduling and chat support, require marketing cookies to function. By clicking "Accept All", you consent to all cookies. Alternatively, you can customize your preferences, but note that declining marketing cookies will limit certain website features.

Cyware Weekly Threat Intelligence, January 06 - 10, 2020

Cyware Weekly Threat Intelligence, January 06 - 10, 2020 - Featured Image

Weekly Threat Briefing Jan 10, 2020

The Good

As we gear up for a new weekend, let’s quickly glance through all that happened in cyberspace over the week. Starting with the good, MITRE, released a new ATT&CK knowledge-base on the Industrial Control Systems (ICS). Meanwhile, a five-month-long operation ‘Goldfish Alpha’ by Interpol declined cryptojacking incidents by 78% in the ASEAN region. Also, the European Commission's MDCG released new guidance to assist manufacturers meet the cybersecurity requirements for different regulations.

  • MITRE released a new ATT&CK knowledge-base of the tactics and techniques that cybercriminals use while attacking Industrial Control Systems (ICS). The framework highlights the unique aspects of the specialized applications and protocols that system operators typically use, and of which adversaries can take advantage of.

  • Goldfish Alpha’, a five-month-long operation by Interpol has led to a 78% drop in cryptojacking incidents in countries of the Association of Southeast Asian Nations (ASEAN) region. INTERPOL's Operation Goldfish Alpha launched in June 2019 allowed cybercrime investigators and experts from 10 ASEAN countries to detect infected routers.

  • The European Commission's Medical Device Coordination Group (MDCG) unveiled new guidance to help manufacturers meet all the relevant cybersecurity requirements in Annex I of the Medical Devices Regulation (MDR) and In Vitro Diagnostic Regulation (IVDR). MDCG also calls for companies to include security issues in the risk assessment.

The Bad

This week also witnessed critical breaches exposing personal data and a BEC scam. A database containing the personal details of 56.25 million US residents was left open on a Chinese server. In the BEC scam incident, Colorado Town of Erie lost over $1 million when a phishing email dropped into an unsuspecting employee’s inbox. In other news, Minnesota-based hospital operator Alomere Health disclosed a data breach that may have exposed information of around 50,000 patients.

  • A database containing the personal details of 56.25 million US residents was exposed from the people-finder website CheckPeople.com, a Florida-based firm. The database, however, was served bizarrely from a computer with a Chinese IP address associated with Alibaba's web hosting wing in Hangzhou.

  • Colorado Town of Erie lost over $1 million in a Business Email Compromise (BEC) scam. The phishing email was sent to an unsuspecting town employee. The fraudsters used an electronic form on the town’s website to request a change in the payment information on the building contract for the Erie Parkway bridge awarded to SEMA Construction in October 2018.

  • The City of Bend, Oregon announced a security breach that may have compromised the credit and debit card information of about 5,000 residents who paid their city utility bills online. Stolen customer data could include cardholders’ names, card billing addresses, card numbers, card types, card security codes, and expiration dates.

  • Austria’s foreign ministry had fallen victim to a “serious cyberattack,” which they suspect was conducted by a foreign state. The attack took place on January 4 and it was quickly detected. Authorities immediately adopted defensive measures to protect their infrastructure. It is not clear if the hackers gained access to sensitive data.

  • A group of hackers claiming to be from Iran hijacked a US government website and posted a pro-Iranian message on it. The attackers defaced the website of the Federal Depository Library program and replaced the home page with a page titled ‘Iranian Hackers!’. The cyber-attack came just days after Iran vowed "crushing and powerful" retaliation for Soleimani's assassination, and amidst analyst warnings of Iran-led cyber-attacks against the US.

  • Minnesota-based hospital operator Alomere Health issued a data breach notice to nearly 50,000 patients that may have been a victim of the attack. The incident occurred after a malicious actor gained access to two employees’ email accounts in late October and early November. The compromised data includes names, addresses, dates of birth, medical record numbers, health insurance information and diagnosis, and treatment details information.

  • Focus Camera, a photography and imaging retailer, revealed that its website was hacked last year by Magecart attackers. To hide the malicious traffic, the attackers registered a fake domain ‘zdsassets.com’ that resembles the legitimate domain ‘zdassets.com.’ The attackers injected malicious code into the website to steal customers’ payment card details.

  • Blue Bear Software, an administration and e-commerce platform for K-12 schools and other educational institutions, warned its customers earlier this week about a Magecart attack on their system. It occurred on the websites using Blue Bear between October 1 and November 13, 2019. The attack reportedly affects parents who used the platforms to pay student fees, books, and school supplies.

  • HappyHotel, a Japanese search engine for finding and booking rooms in ‘Love Hotels’, disclosed a security breach on its website. The firm reacted to the incident by suspending its website but not before hackers got their hands on a wealth of sensitive user information. The type of data that hackers might have accessed included details such as real names, email addresses, login credentials, birth dates, gender information, phone numbers, home addresses, and payment card details.

New Threats

Several new malware strains and vulnerabilities were also discovered and reported with the help of researchers this week. A data-wiping malware was detected on the network of Bapco, Bahrain’s national oil company. Meanwhile, a new trick from scammers pretending to be from the National Broadband Network was reported; they were after users’ personal data. Also, researchers exposed a new ransomware in the wild called ‘SNAKE’, targeting networks and aiming to encrypt all of the devices connected to it.

  • Iranian state-sponsored hackers were linked to the data-wiper malware attack incident on the network of Bahrain’s national oil company Bapco. Dustman, the new malware, is designed to wipe data on infected computers. The malware appeared to be an upgraded and more advanced version of the ZeroCleare wiper that was discovered last fall.
  • In a sequel to the infamous Operation AppleJeus campaign, the Lazarus threat actor group has been found using homemade malware—capable of evading detection—to target Windows and macOS users. The attack campaign makes use of fake cryptocurrency trading websites with links to equally fake Telegram trading groups. The malware has been spotted in the wild on machines in the UK, Poland, Russia, and China.
  • Scammers pretending to be from the National Broadband Network (NBN) were reported tricking users into revealing their personal details like bank account numbers. The scam involved an automated call that warns a resident that their landline and internet-connected services would be disconnected within 24 hours. If the listener presses the prompted number, they are forwarded to a scammer who will request their personal data.
  • Budget Android smartphones in the U.S were reported to come with preinstalled, unremovable Chinese malware. These low-cost smartphones are sold by Assurance Wireless, a federal Lifeline Assistance program under Virgin Mobile. The Unimax (UMX) U686CL ($35) is the most inexpensive smartphone it sells.
  • Security experts demonstrated JackHammer, a new variant of the Rowhammer attack. JackHammer uses a hybrid FPGA and CPU setup to conduct more efficient attacks on various forms of PC memory. Such attacks can allow a malicious party to abuse FPGA cards to launch better and faster Rowhammer attacks. The research team has listed several mitigations to secure cloud computing platforms against JackHammer. They include the use of hardware monitoring, partitioning CP cache, CPU cache pinning, increased refresh rates for DRAM memory, and more.
  • Clop ransomware returned this week and it has now evolved to terminate 663 Windows processes before encrypting files. The processes include new Windows 10 apps, popular text editors, debuggers, programming languages, terminal programs, and programming IDE software. Apart from disabling a number of processes, this Clop variant also utilizes a new .ClOp extension, rather than the “.CIop” or “.Clop” extensions used in previous versions.
  • A new Mirai-inspired botnet, dubber LiquorBot, was found under active development by the actors. The botnet is written in Go language and already incorporates Monero cryptocurrency mining features. It spreads through SSH brute-force attacks or by exploiting unpatched vulnerabilities in selected router models. LiquorBot targets a wide range of CPU architectures ranging from ARM and ARM64 to x86, x64, and MIPS.
  • Researchers discovered a new ransomware called SNAKE, targeting networks and aiming to encrypt all of the devices connected to it. Having been written in Go language, it contains a much higher level of obfuscation to evade detection. Once installed, the ransomware removes the computer’s Shadow Volume Copies and then kills numerous processes related to SCADA systems, virtual machines, industrial control systems, remote management tools, network management software, and more. When encrypting a file, it appends a random five-character string to the file’s extension.
  • A phishing scam came into the light where an attacker tried to cash in on the recent warnings about possible Iranian cyberattacks by attempting to collect Microsoft login credentials. The email counterfeits to be from ‘Microsoft MSA’, and has an email subject of ‘Email user hit by Iran cyber attack’ warning. The email goes on to say that in response to this attack, Microsoft was forced to protect its users by locking their email and data on Microsoft’s servers.
  • Scammers were seen targeting victims using a new tactic that takes advantage of the web browser’s full-screen mode to show a fake Windows 10 desktop. Termed as police browser locker scam, the fake desktop screen would state the victim that their computer has been locked on the pretext of illegal activity. The scammers ask victims to pay a fine via a credit card in order to unlock their computer. These types of scams are easy to detect as they fake URLs and urge users to use other apps on their computers even when the browser is locked.
  • A widely known arbitrary file read vulnerability (tracked as CVE-2019-11510) was found to be exploited in the wild. The flaw could be exploited to infiltrate corporate networks, obtain sensitive information, and eavesdrop on communications. Despite patches being made available by the impacted vendors, many organizations still haven’t applied them, allowing threat actors to leverage the vulnerabilities in their attacks.

Related Threat Briefings

Feb 7, 2025

Cyware Weekly Threat Intelligence, February 03–07, 2025

PyPI is taking a "dead but not gone" approach to abandoned software with Project Archival, a new system that flags inactive projects while keeping them accessible. Developers will see warnings about outdated dependencies, helping them make smarter security choices and avoid relying on unmaintained code. The U.K is bringing earthquake-style metrics to cybersecurity with its new Cyber Monitoring Centre, designed to track digital disasters as precisely as natural ones. Inspired by the Richter scale, the CMC will quantify cyber incidents based on financial impact and affected users, offering clearer insights for national security planning. Kimsuky is back with another phishing trick, this time using fake Office and PDF files to sneak forceCopy malware onto victims' systems. Its latest campaign delivers PEBBLEDASH and RDP Wrapper by disguising malware as harmless shortcuts, ultimately hijacking browser credentials and sensitive data. Hackers have found a new way to skim credit card data - by hiding malware inside Google Tag Manager scripts. CISA is flagging major security holes in Microsoft Outlook and Sophos XG Firewall, urging agencies to patch them before February 27. One flaw allows remote code execution in Outlook, while another exposes firewall users to serious risks. Bitcoin scammers are switching tactics, swapping static images for video attachments in MMS to make their schemes more convincing. A recent case involved a tiny .3gp video luring victims into WhatsApp groups where scammers apply pressure to extract money or personal data. XE Group has shifted from credit card skimming to zero-day exploitation, now targeting manufacturing and distribution companies. A new version of ValleyRAT is making the rounds, using stealthy techniques to infiltrate systems. Morphisec found the malware being spread through fake Chrome downloads from a fraudulent Chinese telecom site.

Jan 10, 2025

Cyware Weekly Threat Intelligence, January 06–10, 2025

The U.K is fortifying its digital defenses with the launch of Cyber Local, a £1.9 million initiative to bridge cyber skills gaps and secure the digital economy. Spanning 30 projects across England and Northern Ireland, the scheme emphasizes local business resilience, neurodiverse talent, and cybersecurity careers for youth. Across the Atlantic, the White House introduced the U.S. Cyber Trust Mark, a consumer-friendly cybersecurity labeling program for smart devices. Overseen by the FCC, the initiative tests products like baby monitors and security systems for compliance with rigorous cybersecurity standards, ensuring Americans can make safer choices for their connected homes. China-linked threat actor RedDelta has ramped up its cyber-espionage activities across Asia, targeting nations such as Mongolia, Taiwan, Myanmar, and Vietnam with a modified PlugX backdoor. Cybercriminals have weaponized trust by deploying a fake PoC exploit tied to a patched Microsoft Windows LDAP vulnerability. CrowdStrike reported a phishing operation impersonating the company, using fake job offers to lure victims into downloading a fraudulent CRM application. Once installed, the malware deploys a Monero cryptocurrency miner. A new Mirai-based botnet, dubbed Gayfemboy, has emerged as a formidable threat, leveraging zero-day exploits in industrial routers and smart home devices. With 15,000 active bot nodes daily across China, the U.S., and Russia, the botnet executes high-intensity DDoS attacks exceeding 100 Gbps. In the Middle East, fraudsters are posing as government officials in a social engineering scheme targeting disgruntled customers. Cybercriminals have weaponized WordPress with a malicious plugin named PhishWP to create realistic fake payment pages mimicking services like Stripe. The plugin not only captures payment details in real time but also sends fake confirmation emails to delay detection.

Dec 20, 2024

Cyware Weekly Threat Intelligence, December 16–20, 2024

In a digital age where borders are blurred, governments are sharpening their strategies to outpace cyber adversaries. The draft update to the National Cyber Incident Response Plan (NCIRP) introduces a comprehensive framework for managing nationwide cyberattacks that impact critical infrastructure and the economy. Meanwhile, the fiscal year 2025 defense policy bill, recently approved by the Senate, emphasizes strengthening cybersecurity measures both at home and abroad. A deceptive health app on the Amazon Appstore turned out to be a Trojan horse for spyware. Masquerading as BMI CalculationVsn, the app recorded device screens, intercepted SMS messages, and scanned for installed apps to steal sensitive data. Malicious extensions targeting developers and cryptocurrency projects have infiltrated the VSCode marketplace and NPM. Disguised as productivity tools, these extensions employed downloader functionality to deliver obfuscated PowerShell payloads. The BADBOX botnet has resurfaced, compromising over 192,000 Android devices, including high-end smartphones and smart TVs, directly from the supply chain. Industrial control systems are facing heightened risks as malware like Ramnit and Chaya_003 targets engineering workstations from Mitsubishi and Siemens. Both malware families exploit legitimate services, complicating detection and mitigation efforts in ICS environments. The Chinese hacking group Winnti has been leveraging a PHP backdoor called Glutton, targeting organizations in China and the U.S. This modular ELF-based malware facilitates tailored attacks across industries and even embeds itself into software packages to compromise other cybercriminals. A tax-themed phishing campaign, dubbed FLUX#CONSOLE, is deploying backdoor payloads to compromise systems in Pakistan. Threat actors employ phishing emails with double-extension files masquerading as PDFs.

Dec 13, 2024

Cyware Weekly Threat Intelligence, December 09–13, 2024

Cybercrime’s web of deception unraveled in South Korea as authorities dismantled a fraud network responsible for extorting $6.3 million through fake online trading platforms. Dubbed Operation Midas, the effort led to the arrest of 32 individuals and the seizure of 20 servers. In a significant move to combat surveillance abuses, the U.S. defense policy bill for 2025 introduced measures to shield military and diplomatic personnel from commercial spyware threats. The legislation calls for stringent cybersecurity standards, a review of spyware incidents, and regular reporting to Congress. The subtle art of deception found a new stage with a Microsoft Teams call, as attackers used social engineering to manipulate victims into granting remote access. By convincing users to install AnyDesk, they gained control of systems, executing commands to download the DarkGate malware. Russian APT Secret Blizzard has resurfaced and used the Amadey bot to infiltrate Ukrainian military devices and deploy their Tavdig backdoor. In a phishing spree dubbed "Aggressive Inventory Zombies (AIZ)," scammers impersonated brands like Etsy, Amazon, and Binance to target retail and crypto audiences. Surveillance has reached unsettling new depths with the discovery of BoneSpy and PlainGnome, two spyware families linked to the Russian group Gamaredon. Designed for extensive espionage, these Android malware tools track GPS, capture audio, and harvest data. A new Android banking trojan has already caused havoc among Indian users, masquerading as utility and banking apps to steal sensitive financial information. With 419 devices compromised, the malware intercepts SMS messages, exfiltrates personal data via Supabase, and even tricks victims into entering details under the pretense of bill payment. Iranian threat actors have set their sights on critical infrastructure, deploying IOCONTROL malware to infiltrate IoT and OT/SCADA systems in Israel and the U.S.

Dec 6, 2024

Cyware Weekly Threat Intelligence, December 02–06, 2024

NIST sharpened the tools for organizations to measure their cybersecurity readiness, addressing both technical and leadership challenges. The two-volume guidance blends data-driven assessments with managerial insights, emphasizing the critical role of leadership in applying findings. The Manson Market, a notorious hub for phishing networks, fell in a sweeping Europol-led takedown. With over 50 servers seized and 200TB of stolen data recovered, the operation spanned multiple countries, including Germany and Austria. Russian APT group BlueAlpha leveraged Cloudflare Tunnels to cloak its GammaDrop malware campaign from prying eyes. The group deployed HTML smuggling and DNS fast-fluxing to bypass detection, targeting Ukrainian organizations with precision. Earth Minotaur intensified its surveillance operations against Tibetan and Uyghur communities through the MOONSHINE exploit kit. The kit, now updated with newer exploits, enables the installation of the DarkNimbus backdoor on Android and Windows devices. Cloudflare Pages became an unwitting ally in the sharp rise of phishing campaigns, with a staggering 198% increase in abuse cases. Cybercriminals exploited the platform's infrastructure to host malicious pages, fueling a surge from 460 incidents in 2023 to over 1,370 by October 2024. DroidBot has quietly infiltrated over 77 cryptocurrency exchanges and banking apps, building a web of theft across Europe. Active since June 2024, this Android malware operates as a MaaS platform, enabling affiliates to tailor attacks. Rockstar 2FA, a phishing platform targeting Microsoft 365 users, has set the stage for large-scale credential theft. With over 5,000 phishing domains launched, the platform is marketed on Telegram. The Gafgyt malware is shifting gears, targeting exposed Docker Remote API servers through legitimate Docker images, creating botnets capable of launching DDoS attacks.