Cyware Weekly Threat Intelligence - January 23–27

Weekly Threat Briefing • January 27, 2023
Weekly Threat Briefing • January 27, 2023
This week, the FBI scored a big win against ransomware threats. The U.S. federal authority, along with other international partners, has successfully dismantled the network of Hive, one of the world’s top ransomware gangs. This comes months after the FBI had silently infiltrated the ransomware’s control panel and decrypted the network of some 1,300 victims. In another major development, the Australian government has commenced operations on the International Counter Ransomware Task Force, with members of governments from 37 countries.
A new update on the cryptocurrency heist at Harmony’s Horizon bridge surfaced this week, as the FBI connected the attack with the Lazarus threat actor group. GoTo, the parent company of LastPass, also shared new details from its ongoing investigation of a security incident that occurred in November 2022. Meanwhile, LockBit and BlackCat ransomware gangs added multiple victims to their respective data leak websites.
Emotet was sighted for the first time in 2023, with new evasion tactics to fly under the radar. Two latest module additions include an SMB spreader and a credit card stealer. The threat landscape also witnessed the emergence of several new malware such as Titan Stealer, PY#RATION, and Mimic ransomware. While Titan Stealer and PY#RATION are designed to harvest sensitive information, Mimic ransomware abuses the API of a legitimate Windows search tool to encrypt files.
Researchers at SentinelLabs tracked a new attack campaign by a Chinese hacking group, dubbed DragonSpark, that deployed SparkRAT malware on victims’ systems. The attack was targeted against organizations in East Asia and used compromised infrastructures located in China and Taiwan to launch the Golang malware.
Uptycs published a report on the new Titan Stealer malware, currently advertised on a Russian-speaking Telegram channel. The malware is sold for $900 or rented for $150/month and can steal data from browsers, FTP clients, and crypto wallets.
A new malware, dubbed PY#RATION, was unearthed in a fresh attack campaign to gain control over compromised systems. Written in Python, the malware comes with the ability to harvest sensitive information. Furthermore, it can be used to deploy other malicious payloads malware, such as a Python-based info-stealer designed to siphon data from web browsers and cryptocurrency wallets.
A new ransomware, dubbed Mimic, has been found abusing the APIs of the ‘Everything’ search tool for Windows to encrypt files. The malware is equipped with multiple capabilities such as deleting shadow copies and terminating multiple applications and services.
Emotet returned with a new evasion tactic to fly under the radar. Two latest module additions include an SMB spreader and a credit card stealer. While the SMB spreader facilitates lateral movement using a list of hard-coded usernames and passwords, the credit card stealer targets the Chrome web browser.
In a new security alert, IBM’s X-Force team said that it detected a new attack with the Kronos banking trojan targeting Mexican financial institutions. The malware is installed through a malicious chrome extension called Seguridad.
The ASEC analysis team discovered a new attack that targeted systems vulnerable to Sunlogin vulnerability to deploy Sliver backdoor and BYOVD malware that disabled security products and installed a reverse shell. In 2022, the flaw was exploited to distribute Gh0st RAT, XMRig coin miner, and Powercat.