Cyware Weekly Threat Intelligence - November 20–24

Weekly Threat Briefing • November 24, 2023
Weekly Threat Briefing • November 24, 2023
With new cyberattacks and threats emerging everyday, it has become crucial for organizations to go beyond traditional security approaches and adopt new strategies. Taking an initiative in this aspect, the U.S. Navy has released its first cyber strategy that outlines plans to secure defense critical infrastructures and foster collaboration with allies. In another story, the healthcare sector has been issued a new vulnerability mitigation guide by the CISA to reduce the risk across hospitals and clinics.
With good comes the bad. Two new organizations were added to the ever-expanding list of MOVEit data breaches, with a Denver-based healthcare SaaS provider disclosing that nearly 8.5 million patients had their data stolen. Autopart giant AutoZone was another victim added to the list. This week, the legal sector was in the wreck as the New York City Bar Association and the Kansas Judicial Branch shared details of people and systems impacted. Separately, a data leak incident that involved the exposure of over 50 million sensitive records by a Korean IT company was also reported.
The ever-changing threat landscape witnessed the emergence of a Mirai-inspired botnet named InfectedSlurs. It was found exploiting two zero-day vulnerabilities in routers and Network Video Recorder (NVR) devices to launch DDoS attacks. Remember the ClearFake campaign from last month? Now, the attackers have expanded their operations to target macOS devices as well. The successors of the QakBot trojan are here! Its operators have reportedly replaced QBot with DarkGate and Pikabot to venture into ransomware, espionage, and data theft attacks.
Akamai discovered a new Mirai-based DDoS botnet, named InfectedSlurs, actively exploiting two zero-day vulnerabilities in routers and NVR devices. One of these flaws is associated with a remote code execution issue. The botnet borrows its code from the JenX Mirai malware variant and leverages default admin credentials to launch DDoS attacks against devices.
North Korea-based threat actors deployed two new malware families, BeaverTail and InvisibleFerret, in a couple of campaigns targeting job seekers. These malware are designed to perform data theft on Windows, Linux, and macOS systems. While InvisibleFerret is a Python-based backdoor malware, BeaverTail is distributed as JavaScript inside npm packages.
Lumma Stealer (aka LummaC2) was updated with a new anti-evasion feature that allows cybercriminals to restore expired Google cookies. This enables the attackers to gain unauthorized access to Google accounts even after the legitimate owner has logged out of their account or their session has expired. The feature is available on a subscription basis on a forum that boasts that attackers can restore Google cookies using a key from restore files.
The relatively new ClearFake campaign was found expanding its operation to deliver Atomic Stealer on macOS systems. The campaign leveraged SEO poisoning to advertise fake browser updates for Safari or Chrome browsers and tricked users into downloading the malware. The malware was embedded within a password-protected DMG file.
Security researchers observed a new Konni RAT campaign that leveraged a Russian-language Word document purporting to be an assessment of Russia’s so-called Special Military Operation. A VBA script is triggered upon opening the document, which runs and performs system checks, UAC bypass, and DLL file manipulations on victims’ systems. The subsequent script stops redundant execution, copies files, creates a new service, and configures registry settings. The final payload encrypts its C2 configuration using AES-CTR encryption and gathers system information.
DarkGate and Pikabot replaced the now-defunct QakBot trojan, indicating that threat actors use two malware loaders with features similar to Qbot to perform ransomware, espionage, and data theft attacks. Cofense researchers drew a conclusion based on the recent phishing campaigns using tactics and techniques similar to previous QBot campaigns. One of these campaigns was observed hijacking email threads in September.
Microsoft observed mobile banking trojan campaigns targeting users in India with social media messages designed to steal users’ information for financial fraud. The attackers were found using two malicious applications mimicking official banking apps to steal user information. Upon installation, the fake apps displayed a bank icon to convince users and requested them to sign in by entering their mobile number, ATM pin, and PAN card details.
A new variant of Agent Tesla was found using an uncommon compression format ZPAQ to steal information from approximately 40 web browsers and various email clients. The file is sent via a phishing email in the form of a purchase order to trick recipients. The variant is also capable of capturing screenshots, recording keylogs, and gathering system information.
Trend Micro shared details of a new framework, dubbed ParasiteSnatcher, which is used by threat actors to create malicious Chrome extensions to monitor and steal data from browsers. The framework was observed in a campaign leveraging Banco do Brasil- and Caixa Econômica Federal (Caixa) banks to pilfer personal and financial details from Brazilian users.
Additionally, researchers from the same firm observed new malicious operations that infected users with Lu0bot malware. The infection chain leveraged the Google search engine to distribute the malware via loaders. It is capable of performing a number of functions that include gathering sensitive information and launching DDoS attacks.
The CISA added Looney Tunables Linux vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, indicating its exploitation in the wild. The flaw, tracked as CVE-2023-4911, can enable attackers to execute code with elevated privileges. It affects multiple Linux distributions, including Debian, Fedora, and Ubuntu. Researchers at Qualys’ Threat Research Unit disclosed the vulnerability last week and published a PoC exploit.