New Threat Detection Added | 2 (Oyster Backdoor and Sidewinder APT) |
New Threat Protections | 91 |
Weekly Detected Threats
The following threats were added to Crystal Eye XDR this week:
Threat name: | Oyster Backdoor | |||||||||||||||||||||||||||
Oyster is a relatively new backdoor malware that emerged in 2023. Initially delivered through a loader called Broomstick, it has evolved to be deployed directly. This malware is capable of data exfiltration, remote code execution, and persistent system control. Associated with the Russia-linked ITG23 group, Oyster has been observed in malvertising campaigns, where it is disguised as popular software installers. Its modular structure and ability to evade detection make it a growing threat to individuals and organisations. | ||||||||||||||||||||||||||||
Threat Protected: | 16 | |||||||||||||||||||||||||||
Rule Set Type: |
| |||||||||||||||||||||||||||
Class Type: | Trojan-activity | |||||||||||||||||||||||||||
Kill Chain: |
|
Threat name: | Sidewinder APT | ||||||||||||||||||||||||
Sidewinder APT, also known as Razor Tiger, Rattlesnake, or T-APT-04, is a persistent threat actor believed to originate from India. Active since 2012, they have targeted government, military, and business entities primarily in South Asia. Sidewinder's arsenal includes spear-phishing, document exploitation, and DLL side-loading to deliver malicious payloads. Their recent shift to server-side polymorphism to obfuscate their attacks highlights their adaptability. While primarily focused on espionage, the group's tactics pose a significant threat to various sectors. | |||||||||||||||||||||||||
Threat Protected: | 05 | ||||||||||||||||||||||||
Rule Set Type: |
| ||||||||||||||||||||||||
Class Type: | Trojan-activity | ||||||||||||||||||||||||
Kill Chain: |
|
Known exploited vulnerabilities (Week 3 - August 2024)
Threat | CVSS | Description | |
CVE-2024-38107 | 7.8 (High) | Microsoft Windows Power Dependency Coordinator Privilege Escalation Vulnerability | |
CVE-2024-38106 | 7.0 (High) | Microsoft Windows Kernel Privilege Escalation Vulnerability | |
CVE-2024-38193 | 7.8 (High) | Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability | |
CVE-2024-38213 | 6.5 (Medium) | Microsoft Windows SmartScreen Security Feature Bypass Vulnerability | |
CVE-2024-38178 | 7.5 (High) | Microsoft Windows Scripting Engine Memory Corruption Vulnerability | |
CVE-2024-38189 | 8.8 (High) | Microsoft Project Remote Code Execution Vulnerability | |
CVE-2024-28986 | 9.8 (Critical) | SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability |
For more information, please visit the Red Piranha Forum:
https://forum.redpiranha.net/t/known-exploited-vulnerabilities-catalog-3rd-week-of-august-2024/499
Updated Malware Signatures (Week 3 - August 2024)
Threat | Description | |
HawkEye | A trojan and keylogger used to steal various account credentials | |
Nanocore | The Nanocore trojan, built on the .NET framework, has been the subject of multiple source code leaks, resulting in its widespread accessibility. Like other remote access trojans (RATs), Nanocore empowers malicious actors with complete system control, enabling activities such as video and audio recording, password theft, file downloads, and keystroke logging. | |
Lumma Stealer | A type of malware classified as an information stealer. Its primary purpose is to steal sensitive information from infected systems, including but not limited to credentials, financial information, browser data, and potentially other personal or confidential information. | |
Remcos | Remcos functions as a remote access trojan (RAT), granting unauthorised individuals the ability to issue commands on the compromised host, record keystrokes, engage with the host's webcam, and take snapshots. Typically, this malicious software is distributed through Microsoft Office documents containing macros, which are often attached to malicious emails. |
Ransomware Report | |
The Red Piranha Team actively collects information on organisations globally affected by ransomware attacks from various sources, including the Dark Web. In the past week alone, our team uncovered new ransomware victims and updates on previous victims across 20 industries spanning 26 countries. This underscores the widespread and indiscriminate impact of ransomware attacks, emphasising their potential to affect organisations of varying sizes and sectors worldwide. Hunters ransomware group stands out as the most prolific, having updated a significant number of victims (15%) distributed across multiple countries. In comparison, LockBit3.0 ransomware updated 14% of victims, in the past week. The following list provides the victim counts in percentages for these ransomware groups and a selection of others. | |
Name of Ransomware Group | Percentage of new Victims last week |
Abyss-Data | 0.78% |
Akira | 0.78% |
Bianlian | 5.43% |
Black Suit | 0.78% |
Brain Cipher | 0.78% |
Cicada3301 | 1.55% |
Ciphbit | 0.78% |
Dan0N | 1.55% |
Darkvault | 2.33% |
Dispossessor | 1.55% |
Everest | 0.78% |
Fog | 0.78% |
Handala | 0.78% |
Helldown | 6.98% |
Hunters | 15.50% |
Inc Ransom | 0.78% |
Killsec | 0.78% |
13.95% | |
Lynx | 6.20% |
Meow | 5.43% |
Metaencryptor | 0.78% |
Mydata | 0.78% |
6.20% | |
Qilin | 4.65% |
Ransomexx | 0.78% |
Ransomhouse | 1.55% |
Ransomhub | 11.63% |
Rhysida | 4.65% |
Trinity | 0.78% |
Helldown Ransomware
Emerging in the early months of 2023, Helldown ransomware rapidly established itself as a formidable threat in the cybercrime landscape. This malicious software employs a double extortion tactic, encrypting victims' data and threatening to leak it on the dark web unless a ransom is paid. While the exact origins of Helldown remain shrouded in mystery, security researchers believe it may be linked to a cybercriminal group operating out of Eastern Europe. This group's previous activities suggest a level of sophistication in malware development and deployment, making Helldown a particularly dangerous adversary.
TTPs:
Helldown ransomware doesn't rely solely on brute force. It possesses a diverse arsenal of tactics, techniques, and procedures (TTPs) to infiltrate and compromise systems. Here's a glimpse into its malicious toolkit:
- Phishing Attacks: Deceptive emails designed to trick users into clicking malicious links or downloading infected attachments are a common entry point. These emails often mimic legitimate business communications, making them more likely to be clicked.
- Exploiting Vulnerabilities: Helldown actively seeks out unpatched vulnerabilities in software and operating systems to gain unauthorised access to networks. This underscores the importance of keeping all software and systems updated with the latest security patches.
- Remote Desktop Protocol (RDP) Exploitation: Like other ransomware strains, Helldown can exploit weaknesses in RDP configurations to gain access to a system. RDP allows remote access to a computer, and misconfigured settings can create a vulnerability for attackers.
- Supply Chain Attacks: Helldown has shown a preference for targeting supply chains, compromising vendors and suppliers to gain access to a wider network of victims. This tactic allows attackers to reach a larger number of victims with a single intrusion.
- Lateral Movement: Once a foothold is established on a single system, Helldown can utilise various tools to move laterally across a network. This allows it to infect additional devices, escalate privileges, and potentially compromise critical systems.
- Data Exfiltration: Before encryption, Helldown often exfiltrates sensitive data like financial records, personal information, and intellectual property. This stolen data serves as additional leverage in extortion attempts, putting pressure on victims to pay the ransom.
- Strong Encryption: The malware utilises robust encryption algorithms to render files inaccessible. Decrypting them without the attacker's key is extremely difficult, if not impossible. This effectively cripples a victim's operations until a decision is made.
Data Leak Site: Helldown maintains a data leak site on the dark web where they list victims who haven't paid the ransom. This serves as a public shaming tactic and adds pressure on compromised organisations.