Cyware Weekly Threat Intelligence, June 27 - July 01, 2022

Weekly Threat Briefing • July 1, 2022
Weekly Threat Briefing • July 1, 2022
With great technology comes the great responsibility of protecting it from sophisticated cyberattacks. This week, the U.S. House of Representatives passed a new cybersecurity bill to help organizations strengthen the security of Industrial Control Systems (ICS). This comes in the wake of rising cyberattacks from Russia. In another development, the NIST has urged organizations across the globe to follow the new macOS security framework that is designed to secure macOS endpoints.
Cryptoassets are still popular among cybercriminals despite the plunging cryptocurrency prices. The Lazarus group has reportedly pulled off another crypto heist that enabled them to steal $100 million in altcoins from Harmony Horizon Bridge. Meanwhile, outages at Apetito ready meal distributor and Napa Valley of College enter another week as the organizations continue to work on restoring the impacted systems.
A record number of Information-stealing malware were uncovered by researchers this week. While Raccoon has revived its operations with version 2.0, the XFiles is using phishing emails to spread across systems. Additionally, the new YTStealer and RecordStealer have been discovered in the wild targeting YouTube content creators and other users.
A new version of Raccoon Stealer is being distributed on multiple underground forums. The malware is written in C/C++ using WinApi and borrows many of its capabilities from the original version.
A newly discovered RAT named ZuoRAT was used as part of a sophisticated campaign targeting North American and European networks. The RAT hijacked SOHO routers to pivot into the local network and gain access to additional systems.
Scammers are using deepfakes and stolen personally identifiable information to apply to remote tech jobs, according to the FBI. For some of the positions, scammers had access to customer PII, financial data, corporate IT databases, or proprietary information.
Threat actors are using Microsoft Office files as bait to distribute the new AstraLocker 2.0 ransomware. The malware borrows its code from Babuk ransomware and uses several anti-analysis techniques to bypass security solutions.
CISA has issued a new advisory about the active exploitation of the PwnKit vulnerability. The flaw impacts Linux systems and can be abused to execute malicious commands on systems.
Threat actors are shifting to Bumblebee loader, as a replacement for TrickBot and BazarLoader, to distribute ransomware. In one such incident, the loader was used to deploy Conti, Quantum, and Mountlocker ransomware.
Cybercriminals leveraged Facebook Messenger chatbots in an attempt to steal the credentials of managers of Facebook pages. The chatbots allowed threat actors to impersonate the company's support team and convince the managers in sharing their credentials.
The XFiles info-stealer malware is leveraging the Follina vulnerability to spread across systems. The infection chain starts with a phishing email that contains a malicious document. The malware is capable of pilfering cookies, passwords, and history stored in web browsers. It also targets cryptocurrency wallets.
Microsoft has spotted a new activity of 8220 cybercriminal gang that exploits the recently discovered Atlassian Confluence vulnerability to install cryptocurrency miners on Linux servers. The gang also deploys an IRC bot alongside the miner in the campaign.
A new information stealer named YTStealer targeted YouTube content creators to steal their authentication cookies. The malware is distributed via fake installers that also drop RedLine Stealer and Vidar.
The LockBit ransomware operation has released LockBit 3.0, introducing the first ransomware bug bounty program and leaking new extortion tactics and Zcash cryptocurrency payment options. The operators are reportedly offering rewards ranging between $1,000 and $1 million to those who submit bug reports.
CISA, the FBI, FinCEN, and the US Treasury have released a security advisory on the MedusaLocker ransomware. The advisory said that the ransomware was observed to be active in May and relied on Windows RDP services to gain initial access to the network.
A new IIS backdoor trojan named SessionManager was discovered this week. A variant of OwlProxy backdoor, SessionManager has been used against NGOs, government, military, and industrial organizations in Africa, South America, Asia, Europe, Russia, and the Middle East, starting from at least March 2021.
Trend Micro has released details of new tactics employed by Black Basta affiliates. The tactics involve the use of QakBot trojan and PrintNightmare vulnerability to gain initial access and expand their access respectively.
A new infostealer named RecordStealer is being used in the wild. The malware disguises itself as a software crack package or a software installer. It is used to harvest data from browsers, and cryptocurrency wallets.
A researcher has published a technical write-up on a technique named call stack spoofing that can be used to confuse EDR products and hide malicious operations.