Cyware Weekly Threat Intelligence - January 24–28

Weekly Threat Briefing • January 28, 2022
Weekly Threat Briefing • January 28, 2022
The Good
In a fascinating new development, South Korean researchers devised a way to enhance cryptographic security by using silk. Yes, you read that right! Here’s the second one. The dark web marketplace Canadian HeadQuarters was dismantled by Canadian law enforcement. The criminals were issued a hefty fine. There's more. The U.S. government has taken steps to fortify the cybersecurity of water systems in the country, as they have endured quite a lot of attacks in the recent past.
The Bad
Lazarus is back in action and, in its latest campaign, used GitHub as a C2 server. The APT group was found using job-themed lures to target engineers. The government sector is still not safe from cyberattacks as the Canadian government’s foreign affairs ministry became the latest victim. Another malicious app made its way into the Google Play Store and was downloaded thousands of times before being removed.
New Threats
Active for at least eight years, Konni RAT means business. Its operators have adjusted its code to make it stealthier. Speaking about new malware strains, BRATA has three new variants that can now perform factory reset on compromised devices. Another malware news for you. The new DazzleSpy malware was discovered conducting watering hole attacks against Android and Windows users.
Several variants of the BotenaGo botnet have been observed in a series of new attack campaigns targeting routers and IoT devices globally. This development comes after researchers found the malware source code uploaded to GitHub, allowing threat actors to create their own versions to launch attacks.
Konni RAT received significant updates and is being actively developed. Its evasion capabilities have been upgraded. The malware has also transitioned from base64 encoding to AES encryption to its string for obfuscation purposes. Moreover, some samples were found using an unknown packer, however, it has not been observed in real-world scenarios yet.
The Android malware BRATA has upgraded its features to perform a factory reset on compromised devices to wipe all traces of malicious activity. The malware has three new strains that have targeted online banking users in the U.K, Poland, Italy, Spain, China, and Latin America. Some new capabilities added to the new variants include keylogging functionality and GPS tracking.
Cybercriminals are hijacking the Instagram accounts of companies and influencers in a new campaign to extort the targeted users with a ransom. The threat actors send a message pretending to be from Instagram, notifying the users of copyright infringement. The campaign has reportedly been active since 2021 and hackers are selling access to the hijacked accounts for $40,000.
A new malware, dubbed DazzleSpy, has come to light during the investigation of a watering hole attack targeting Windows and Android users. ESET researchers found that the group also targeted macOS users and visitors of a pro-democracy radio station website in Hong Kong. Moreover, the attackers had exploited a WebKit flaw in Safari as part of the infection chain.
The new DeadBolt ransomware is encrypting QNAP NAS devices by exploiting a zero-day flaw in the device software. The ransomware appends .deadbolt extension to the encrypted files and drops a ransom note, demanding a ransom of 0.03 bitcoin. QNAP has force-updated customers’ NAS devices.
A mobile malware infection chain dating back to September 2021 was used to distribute a new malware, dubbed TianySpy. The malware was designed to steal credentials associated with membership websites of major Japanese telecommunication services. It targeted both Android and iPhone users.
A phishing email scam is targeting Amazon users with a fake subscription message that claims to lock their accounts. The email uses the Amazon logo to add authenticity. The email warns users that there was a problem in authorizing the payment for renewing their Prime Membership, as the billing information did not match the information in the card issuer file. The email, further, asks the recipients to take immediate action to prevent their accounts from being locked.