Quantcast
Channel: Cisco Talos Blog
Viewing all 1927 articles
Browse latest View live

Threat Source newsletter (June 16, 2022) — Three top takeaways from Cisco Live

$
0
0
By Jon Munshaw.  Welcome to this week’s edition of the Threat Source newsletter.  I’m still decompressing from Cisco Live and the most human interaction I’ve had in a year and a half.   But after spending a few days on the show floor and interacting with everyone, there are a...

[[ This is only the beginning! Please visit the blog for the complete entry ]]

Threat Roundup for June 10 to June 17

$
0
0
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between June 10 and June 17. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics,...

[[ This is only the beginning! Please visit the blog for the complete entry ]]

Avos ransomware group expands with new attack arsenal

$
0
0
By Flavio Costa, Chris Neal and Guilherme Venere. In a recent customer engagement, we observed a month-long AvosLocker campaign. The attackers utilized several different tools, including Cobalt Strike, Sliver and multiple commercial network scanners. The initial ingress point in this incident was...

[[ This is only the beginning! Please visit the blog for the complete entry ]]

Threat Roundup for June 17 to June 24

$
0
0
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between June 17 and June 24. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics,...

[[ This is only the beginning! Please visit the blog for the complete entry ]]

De-anonymizing ransomware domains on the dark web

$
0
0
By Paul Eubanks. We have developed three techniques to identify ransomware operators' dark websites hosted on public IP addresses, allowing us to uncover previously unknown infrastructure for the DarkAngels, Snatch, Quantum and Nokoyawa ransomware groups.The methods we used to identify the public...

[[ This is only the beginning! Please visit the blog for the complete entry ]]

Vulnerability Spotlight: Command injection vulnerabilities in Robustel cellular router

$
0
0
Lilith >_> of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw.  Cisco Talos recently discovered four vulnerabilities in the Robustel R1510 industrial cellular router.  The R1510 is a portable router that shares 2G, 3G and 4G wireless internet access. It comes with...

[[ This is only the beginning! Please visit the blog for the complete entry ]]

Threat Source newsletter (June 30, 2022) — AI voice cloning is somehow more scary than deepfake videos

$
0
0
By Jon Munshaw.  Welcome to this week’s edition of the Threat Source newsletter.  We took a week off for summer vacation but are back in the thick of security things now.  My first exposure to deepfake videos was when Jordan Peele worked with BuzzFeed News to produce this video of...

[[ This is only the beginning! Please visit the blog for the complete entry ]]

Researcher Spotlight: Around the security world and back again with Nick Biasini

$
0
0
By Jon Munshaw.  Nick Biasini’s seen it all.   Going on a nearly 20-year security career, he’s been a part of some of Cisco Talos’ largest undertakings in the company’s history. From an attack on the global Olympic Games, to a wireless router malware that affected hundreds of...

[[ This is only the beginning! Please visit the blog for the complete entry ]]

Threat Source newsletter (July 7, 2022) — Teamwork makes the dream work

$
0
0
By Jon Munshaw.  Welcome to this week’s edition of the Threat Source newsletter.  I’ve been thinking a lot recently about the pros and cons of the way we publicize our threat research. I had a few conversations at Cisco Live with people — who are more generally IT-focused than...

[[ This is only the beginning! Please visit the blog for the complete entry ]]

Threat Roundup for July 1 to July 8

$
0
0
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between July 1 and July 8. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics,...

[[ This is only the beginning! Please visit the blog for the complete entry ]]

Microsoft Patch Tuesday for July 2022 — Snort rules and prominent vulnerabilities

$
0
0
By Jon Munshaw and Tiago Pereira.  Microsoft released its monthly security update Tuesday, disclosing more than 80 vulnerabilities in the company’s various software, hardware and firmware offerings, including one that’s actively being exploited in the wild.  July's security update...

[[ This is only the beginning! Please visit the blog for the complete entry ]]

Vulnerability Spotlight: Adobe Acrobat DC use-after-free issues could lead to arbitrary code execution

$
0
0
Aleksandar Nikolic of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw.  Cisco Talos recently discovered two use-after-free vulnerabilities in Adobe Acrobat Reader DC that could allow an attacker to eventually gain the ability to execute arbitrary code.   Acrobat is...

[[ This is only the beginning! Please visit the blog for the complete entry ]]

Transparent Tribe begins targeting education sector in latest campaign

$
0
0
Cisco Talos has been tracking a new malicious campaign operated by the Transparent Tribe APT group.This campaign involves the targeting of educational institutions and students in the Indian subcontinent, a deviation from the adversary's typical focus on government entities.The attacks result in...

[[ This is only the beginning! Please visit the blog for the complete entry ]]

Vulnerability Spotlight: Use-after-free condition in Google Chrome WebGPU

$
0
0
Piotr Bania of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.  Cisco Talos recently discovered an exploitable use-after-free vulnerability in Google Chrome’s WebGPU standard.   Google Chrome is a cross-platform web browser — and Chromium is the open-source version of...

[[ This is only the beginning! Please visit the blog for the complete entry ]]

Threat Source newsletter (July 14, 2022) — Are virtual IDs worth the security risk of saving a few seconds in the TSA line?

$
0
0
By Jon Munshaw.  Welcome to this week’s edition of the Threat Source newsletter.  I’ve started flying again on a somewhat regular basis now that work conferences and out-of-state vacations are becoming a thing again. I took about 18 months or so off flying during the peak of the pandemic,...

[[ This is only the beginning! Please visit the blog for the complete entry ]]

EMEAR Monthly Talos Update: Training the next generation of cybersecurity researchers

$
0
0
Cisco Talos and Cisco Secure have the latest edition of the Talos EMEAR Threat Update series out now, which you can watch above or over at this link, where Martin Lee and Hazel Burton talk about the cybersecurity skills gap that currently exists and how we can better train the next generation...

[[ This is only the beginning! Please visit the blog for the complete entry ]]

Vulnerability Spotlight: Adobe Acrobat DC use-after-free issues could lead to arbitrary code execution

$
0
0



Aleksandar Nikolic of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw. 

Cisco Talos recently discovered two use-after-free vulnerabilities in Adobe Acrobat Reader DC that could allow an attacker to eventually gain the ability to execute arbitrary code.  

Acrobat is one of the most popular PDF reader software options available currently. It includes the ability to read and process JavaScript to give PDFs greater interactivity and customization options for users. This vulnerability exists in the way Acrobat Reader processes JavaScript. 

TALOS-2022-1516 (CVE-2022-34221) is a type confusion vulnerability that is triggered if the user opens a PDF with specially crafted, malicious JavaScript embedded. Object misuse can cause memory corruption, which can lead to arbitrary code execution. TALOS-2022-1525 (CVE-2022-34230) can trigger the reuse of a freed object, which can ultimately result in arbitrary code execution, as well.

Cisco Talos worked with Adobe to ensure that these issues are resolved and an update is available for affected customers, all in adherence to Cisco’s vulnerability disclosure policy. 

Users are advised to update the following software, which is tested and confirmed to be affected by these vulnerabilities: Adobe Acrobat Reader, version 2022.001.20085.  

The following Snort rules will detect exploitation attempts against this vulnerability: 59644, 59645, 59942 and 59943. Additional rules may be released in the future and current rules are subject to change, pending additional vulnerability information. For the most current rule information, please refer to your Cisco Secure Firewall management center or Snort.org. 

 

Transparent Tribe begins targeting education sector in latest campaign

$
0
0



  • Cisco Talos has been tracking a new malicious campaign operated by the Transparent Tribe APT group.
  • This campaign involves the targeting of educational institutions and students in the Indian subcontinent, a deviation from the adversary's typical focus on government entities.
  • The attacks result in the deployment of CrimsonRAT, Transparent Tribe's malware of choice for establishing long-term access into victim networks.
  • We assess with high confidence that a Pakistani web hosting services provider "Zain Hosting" was used for deploying and operating components of Transparent Tribe's infrastructure. This is likely one of many third parties Transparent Tribe employs to prepare, stage and/or deploy components of their operation.


Overview


Cisco Talos recently discovered an ongoing campaign conducted by the Transparent Tribe APT group against students at various educational institutions in India. This campaign was partially covered by another security firm, but our findings reveal more details regarding the adversary's operations.

Typically, this APT group focuses on targeting government (government employees, military personnel) and pseudo-government entities (think tanks, conferences, etc.) using remote access trojans (RATs) such as CrimsonRAT and ObliqueRAT. However, in this new campaign dating back to December 2021, the adversary is targeting students of universities and colleges in India. This new campaign also suggests that the APT is actively expanding its network of victims to include civilian users.

We also assess with high confidence that a Pakistani web hosting services provider, "ZainHosting" was employed by the APT for deploying and operating parts of Transparent Tribe's infrastructure used in this campaign.



Threat actor profile


Transparent Tribe is a suspected Pakistan-linked threat actor. This group typically targets individuals and entities associated with governments and military personnel in the Indian subcontinent, specifically Afghanistan and India. Transparent Tribe has also been known to use their CrimsonRAT implant against human rights activists in Pakistan.

The group primarily uses three Windows-based malware families to carry out espionage activities against their targets.

  • CrimsonRAT is a .NET-based implant that is the group's malware of choice since at least 2020. Transparent Tribe's multiple campaigns leveraging CrimsonRAT over the years indicate a steady evolution in the implant's capabilities.
  • ObliqueRAT is a C/C++-based implant discovered by Talos in early 2020. ObliqueRAT is primarily reserved for hyper-targeted attacks on government personnel and in operations where stealth is a prime focus of the attackers' infection chain. This implant has also seen a constant evolution in deployment tactics and malicious functionalities over time.
  • Custom malware used by Transparent Tribe consists of easily and quickly deployable downloaders, droppers and lightweight RATs containing limited capabilities as opposed to CrimsonRAT and ObliqueRAT.


Transparent Tribe also maintains a suite of mobile implants in their arsenal. Implants such as CapraRAT are constantly modified to be deployed against targets. These implants contain a plethora of malicious capabilities meant to steal data from mobile devices.




Attack details: Infection chain


The attack consists of a maldoc delivered to the target as an attachment or a link to a remote location via a spear-phishing email. The maldocs consist of malicious VBA macros commonly observed in previous Transparent Tribe campaigns. The macros extract an embedded archive file from the maldoc and unzip it to execute a copy of the malware in the archive file. The malware in the archive files is CrimsonRAT.


Malicious macro dropping embedded zip to disk.


CrimsonRAT


The CrimsonRAT payloads deployed in this campaign are very similar to those from past Transparent Tribe campaigns. It is the staple implant of choice for Transparent Tribe to establish long-term access into victim networks. This RAT is actively updated, adding new capabilities and obfuscating the implant.

The latest version of CrimsonRAT seen in this campaign contains a number of capabilities, including:

  • List files and folders in a directory path specified by the command and control (C2).
  • Run specific processes on the endpoint, such as keylogger and USB modules.
  • List process IDs and names running on the endpoint.
  • Get information, such as name, creation times and size of image files (pictures such as BMP, JPG, etc.) specified by the C2.
  • Take screenshots of the current screen and send them to the C2.
  • Upload keylogger logs from a file on disk to the C2.
  • Send system information to the C2, including:
    • Computer name, username, operating system name, the file path of implant and parent folder path.
    • Indicator of whether the keylogger module is in the endpoint and running and its version.
    • Indicator of whether the USB module is in the endpoint and running and its version.
  • Run arbitrary commands on the system.
  • Write data sent by the C2 to a file on disk.
  • Read contents of a file on disk and exfiltrate to the C2.
  • List all drives on the system.
  • List all files in a directory.
  • Download the USB worm and keylogger modules from the C2 and write them to disk.
  • Send a file's name, creation time and size to the C2- file path as specified by the C2.
  • Delete files specified by the C2 from the endpoint.
  • Get names, creation times and size of all files containing the file extension specified by the C2.



Infrastructure and attribution


Campaign Infrastructure


A number of these maldocs and archives containing these maldocs were hosted on the domains registered by the attackers, with the earliest domain registered in June 2021. These domains were named so that they would appear relevant to students and educational entities in India. Some examples of domains registered by the threat actor are:

  • studentsportal[.]live
  • studentsportal[.]website
  • studentsportal[.]co


However, we've also discovered the use of additional media-themed domains that the attackers are preparing to use in parallel campaigns against their targets. These domains are in line with Transparent Tribe's tactic of using malicious file-sharing domains we've observed in previous attacks and campaigns.

  • cloud-drive[.]store
  • user-onedrive[.]live
  • drive-phone[.]online


During the course of our research, we discovered SSL certificate overlaps with another domain registered by the attackers in June 2021, geo-news[.]tv, using the email address immikhan034[@]gmail[.]com. This domain is a typo-squatted version of geo[.]tv, a legitimate Pakistani news website. Subdomains on the malicious typo-squatted domains include those that hosted SSL certificates for the student and media-themed malicious domains:

  • cloud-drive.geo-news.tv
  • drive-phone.geo-news.tv
  • studentsportal.geo-news.tv
  • user-onedrive.geo-news.tv


All the malicious domains have recently resolved to the same IP address: 198[.]37[.]123[.]126. This strongly suggests shared infrastructure among all the malicious domains.



SSL certificate for geo-news[.]tv.


Honeytraps


Many of the domains registered by the attackers for this campaign consisted of rudimentary websites with front pages containing embedded Google Drive folders. All of these folders contained pictures of women. It is highly likely that these front pages will be used as stagers for honeytrap-based attacks in the future, another tactic typical of the Transparent Tribe APT.



Google Drive folder embedded in the fake website operated by Transparent Tribe.


Infrastructure attribution


The DNS SOA records for all the malicious domains utilized in this APT campaign contain a common administrator email address: rupees001[at]gmail[.]com. This email address has been used to register and administer approximately 2,000 legitimate and malicious domains. However, there are a couple of domains in this list that stand out:

  • zainhosting[.]net
  • vebhost[.]com


Of the two domains, vebhost[.]com hosts a dummy website that advertises website-building services. The malicious domains used in this campaign, such as studentsportal[.]live and others, use vebhost[.]com name servers, specifically:

  • ns1[.]vebhost[.]com
  • ns2[.]vebhost[.]com


Therefore, it is highly likely that the operators registering and maintaining the malicious domains also operate web-hosting services through vebhost[.]com.

The second domain, zainhosting[.]net belongs to a seemingly legitimate web services and hosting provider called "Zain Hosting" based out of Lahore, Pakistan.

Apart from zainhosting[.]net, the hosting provider also operates zainhosting[.]com, which is this business' primary front for their legitimate operations. Interestingly, vebhost[.]com uses zainhosting[.]com's name servers:

  • ns5.zainhosting.com
  • ns6.zainhosting.com


ZainHosting advertises their services heavily on Facebook and has been active since at least 2010. Their webpage from 2010 listed rupees001[at]gmail[.]com as a contact address for the business. This email has since been used to register, renew and administer several malicious web pages over time, including the malicious domains used by the Transparent Tribe APT in their most recent campaign.




ZainHosting webpage from 2010 listing rupees001[at]gmail[.]com as a contact address.


All three sets of domains -- the malicious Transparent Tribe infrastructure, vebhost[.]com and zainhosting[.]net/com -- are clearly related, with "ZainHosting"' owning and operating the malicious infrastructure. However, the entire scope of ZainHosting's role in the Transparent Tribe organization is still unknown. We believe with high confidence that ZainHosting is just one of the many infrastructure contractors hired by Transparent Tribe. Such contractors might be hired to simply prepare and stage the APT's infrastructure and possibly be given packages (archives, etc.) containing malicious artifacts to deploy, that are then distributed by the APT operators themselves to targets of interest.



Conclusion


Transparent Tribe has been aggressively trying to widen its net of victims in the Indian subcontinent. Their operations started as early as at least 2016 and have largely focussed on infecting government and military officials in Afghanistan and India. Over the past few years, we saw the APT begin targeting pseudo-government entities and individuals belonging to think tanks and defense contractors.

However, their new campaign indicates that the threat actors' strategy is evolving to target civilian personnel, specifically those connected to educational institutions. This might be in accordance with their nation-state's goal to establish long-term access and steal valuable and restricted research from premier research institutions associated with the Indian government. Keeping tabs on an adversary nation's research endeavors is a strategic goal adopted by many APT groups observed across the world.

Organizations must be diligent against such highly motivated adversaries that are rapidly evolving their strategies and expanding their network of targets. In-depth defense strategies based on a risk analysis approach can deliver the best results in the prevention. However, this should always be complemented by a good incident response plan which has been not only tested with tabletop exercises and reviewed and improved every time it's put to the test on real engagements.



Coverage


Ways our customers can detect and block this threat are listed below.



Cisco Secure Endpoint (formerly AMP for Endpoints) is ideally suited to prevent the execution of the malware detailed in this post. Try Secure Endpoint for free here.

Cisco Secure Web Appliance web scanning prevents access to malicious websites and detects malware used in these attacks.

Cisco Secure Email (formerly Cisco Email Security) can block malicious emails sent by threat actors as part of their campaign. You can try Secure Email for free here.

Cisco Secure Firewall (formerly Next-Generation Firewall and Firepower NGFW) appliances such as Threat Defense Virtual, Adaptive Security Appliance and Meraki MX can detect malicious activity associated with this threat.

Cisco Secure Malware Analytics (Threat Grid) identifies malicious binaries and builds protection into all Cisco Secure products.

Umbrella, Cisco's secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs and URLs, whether users are on or off the corporate network. Sign up for a free trial of Umbrella here.

Cisco Secure Web Appliance (formerly Web Security Appliance) automatically blocks potentially dangerous sites and tests suspicious sites before users access them.

Additional protections with context to your specific environment and threat data are available from the Firewall Management Center.

Cisco Duo provides multi-factor authentication for users to ensure only those authorized are accessing your network.

Open-source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.


Orbital Queries


Cisco Secure Endpoint users can use Orbital Advanced Search to run complex OSqueries to see if their endpoints are infected with this specific threat. For specific OSqueries on this threat, click here.




IOCs


IOCs for this research can also be found at our Github repository here.

Maldocs

bdeb9d019a02eb49c21f7c04169406ac586d630032a059f63c497951303b8d00
388f212dfca2bfb5db0a8b9958a43da6860298cdd4fcd53ed2c75e3b059ee622
0d61d5fe8dbf69c6e61771451212fc8e587d93246bd866adf1031147d6d4f8c2
14ee2e3a9263bab359bc19050567d0dbd6371c8c0a7c6aeba71adbf5df2fc35b


Archives

8c1a5052bf3c1b33aff9e249ae860ea1435ce716d5b5be2ec3407520507c6d37
79aee357ea68d8f66b929ba2e57465eaee4d965b0da5001fe589afe1588874e3


CrimsonRAT
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IPs

192[.]3[.]99[.]68
198[.]37[.]123[.]126


Domains

studentsportal[.]live
geo-news[.]tv
cloud-drive[.]store
user-onedrive[.]live
drive-phone[.]online
studentsportal[.]co
studentsportal[.]website
nsdrive-phone[.]online
statefinancebank[.]com
in[.]statefinancebank[.]com
centralink[.]online
cloud-drive[.]geo-news[.]tv
drive-phone[.]geo-news[.]tv
studentsportal[.]geo-news[.]tv
user-onedrive[.]geo-news[.]tv
studentsportal[.]live[.]geo-news[.]tv
phone-drive[.]online[.]geo-news[.]tv
sunnyleone[.]hopto[.]org
swissaccount[.]ddns[.]net


URLs

hxxps[://]studentsportal[.]live/download[.]php?file=Mental_Health_Survey[.]docm
hxxps[://]studentsportal[.]website/download[.]php?file=5-mar[.]zip






Vulnerability Spotlight: Use-after-free condition in Google Chrome WebGPU

$
0
0



Piotr Bania of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw. 

Cisco Talos recently discovered an exploitable use-after-free vulnerability in Google Chrome’s WebGPU standard.  

Google Chrome is a cross-platform web browser — and Chromium is the open-source version of the browser that both Google and other software developers use as the basis to build their browsers, as well. This specific vulnerability exists in WebGPU, which is a JavaScript API for processing accelerated 3-D graphics and other functions in the browser.

TALOS-2022-1508 (CVE-2022-2399) occurs if the user opens a specially crafted web page in Chrome. That page could trigger a use-after-free condition in the application, which an attacker could then use to manipulate the browser in additional ways.  

Cisco Talos worked with Google to ensure that this issue is resolved and an update is available for affected customers, all in adherence to Cisco’s vulnerability disclosure policy

Users are encouraged to update these affected products as soon as possible: Google Chrome, version 102.0.4956.0 (64-bit) and 99.0.4844.82 (64-bit). Talos tested and confirmed these versions of Chrome could be exploited by this vulnerability. 

The following Snort rules will detect exploitation attempts against this vulnerability: 59448 and 59449. Additional rules may be released in the future and current rules are subject to change, pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org. 

Threat Source newsletter (July 14, 2022) — Are virtual IDs worth the security risk of saving a few seconds in the TSA line?

$
0
0

By Jon Munshaw. 

Welcome to this week’s edition of the Threat Source newsletter. 

I’ve started flying again on a somewhat regular basis now that work conferences and out-of-state vacations are becoming a thing again. I took about 18 months or so off flying during the peak of the pandemic, but now I’ve received by second booster shot of the vaccine and am confident in the ability to acquire N95 masks when I need them. 

One thing I didn’t miss about flying at all is the airports themselves — lines upon lines, waiting forever just to check a bag, and having to pay $6 for a cup of coffee from a Subway because that’s the only restaurant that happens to be open at 5 a.m. 

There’s certainly a temptation to try to streamline the entire airport process by consolidating your personal information into one app. In Maryland, where I live, they recently rolled out the use of state IDs in Apple Wallet and use them at airports. And American Airlines now has its own travel app where users can consolidate their driver’s license, passports, TSA Pre-Check and more in one place to make flying easier. And other states have pledged to work on going digital with their IDs. But I’m hesitant to be willing to take the security risk with these apps in exchange for just not having to fumble around with a physical ID while I’m waiting in the TSA line. During the COVID-19 pandemic, many states rolled out their own tracking apps to alert users if they’ve potentially been exposed, and eventually to log their vaccination status.  

It didn’t take long for bad actors to start taking advantage of these apps. North Dakota’s state-run app almost immediately violated its own terms of service by sending users’ location data and personal information to advertisers. And in Pennsylvania, up to 72,000 people may have had their personal information affected as part of a data leak at a third-party contact-tracing service.  

And this could be said for pretty much anything in security, but I simply ask — “What could go wrong?” 

I have no doubt the people who create these apps have the best intentions in mind. But when you start adding on layers of bureaucracy, plus the blurred lines that come with governments enlisting third parties to create apps on their behalf, and then bad guys looking into every nook and cranny for their next foothold, there are too many unknowns with these plans.  

I certainly see the appeal of being able to always keep digital versions of my ID on my phone. It could probably help me avoid some awkward stares from fellow travelers the next time I’m at the airport as I spend the extra 30 seconds fishing out my boarding pass and ID.  

But this has got to be another example of consumers sacrificing privacy for the sake of convenience, and I’m not even sure how much of a convenience they are.  

  

The one big thing 


The Transparent Tribe APT just won’t go away. We’ve been tracking this threat actor for more than a year, and now they’re shifting again by targeting college-aged students in India. This group traditionally goes after government organizations and other government-adjacent companies in the region, likely seeking out sensitive information. The attacks resulted in the deployment of CrimsonRAT, Transparent Tribe's malware of choice for establishing long-term access into victim networks. 

Why do I care? 

Regardless of whether you’re a potential target for this group, it’s clear that everyone in the security space should be following Transparent Tribe. They’ve gone from a relatively unknown group operating on the Indian subcontinent to an actor we’ve continuously followed and has widened their target scope in recent months. Anyone hit with the group’s signature CrimsonRAT malware could have sensitive information stolen, including the attacker being able to take screenshots, log keystrokes and run certain processes on the endpoint. 

So now what? 

Organizations must always be on the lookout for these types of highly motivated adversaries. In-depth defense strategies based on a risk analysis approach can deliver the best prevention results. However, this should always be complemented by a strong incident response plan that's been tested with tabletop exercises and reviewed and improved every time it's put to the test on real engagements. Additionally, there are several Snort rules and ClamAV signatures that protect against this group’s tactics and tools. 

 

Other news of note


A group known as Predatory Sparrow is claiming responsibility for a series of cyber attacks on steel facilities in Iran, one of which caused a fire at a plant. Additionally, they group dumped nearly 20 GBs of documents they claim include information connecting the facilities to Iran’s Revolutionary Guard Corps. Predatory Sparrow also launched a Telegram page, where it posted the message, “These companies are subject to international sanctions and continue their operations despite the restrictions. These cyber-attacks, being carried out carefully to protect innocent individuals." Other attacks from the group came in 2021 when they targeted an Iranian railway system and a state-run gasoline distribution center. (CyberScoop, Yahoo!, BBC

The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) selected four encryption algorithms it says can withstand threats from quantum computing, with a new standard expected to come in about two years. Current encryption methods are not expected to hold up as other countries develop quantum computing technologies that can break those algorithms. Once the new encryption standards are created, companies will be urged, but not necessarily required, to adopt them. It’s recommended that organizations take inventory of applications that use the current public key encryption standards in preparation for the switch. (VentureBeat, DarkReading, Wired)  

Apple released a new Lockdown Mode for its major operating systems that can help victims respond to spyware attacks. If enabled, Lockdown Mode turns off certain functions on the devices that may be vulnerable to attack and remote monitoring, including message attachments, shared photo albums and mobile device management. The announcement comes as more instances of governments using spyware have come to light, targeting high-profile journalists, politicians and activists. Apple is offering a $2 million bug bounty to anyone who can discover a vulnerability in Lockdown Mode. (CNET, Apple


Can’t get enough Talos? 

Upcoming events where you can find Talos 


A New HOPE (July 22 - 24, 2022)
New York City 

BlackHat U.S. (Aug. 6 - 11, 2022)
Las Vegas, Nevada 

DEF CON U.S. (Aug. 11 - 14, 2022)
Las Vegas, Nevada 


Most prevalent malware files from Talos telemetry over the past week  


MD5: 2915b3f8b703eb744fc54c81f4a9c67f   
Typical Filename: VID001.exe   
Claimed Product: N/A   
Detection Name: Win.Worm.Coinminer::1201 

SHA 256: e4973db44081591e9bff5117946defbef6041397e56164f485cf8ec57b1d8934  
MD5: 93fefc3e88ffb78abb36365fa5cf857c  
Typical Filename: Wextract  
Claimed Product: Internet Explorer  
Detection Name: PUA.Win.Trojan.Generic::85.lp.ret.sbx.tg  

MD5: aa367b2ef077ffd51bf0597237ef513e  
Typical Filename: 1302323352.exe  
Claimed Product: N/A    
Detection Name: W32.DFC.MalParent  

MD5: 2c8ea737a232fd03ab80db672d50a17a    
Typical Filename: LwssPlayer.scr    
Claimed Product: 梦想之巅幻灯播放器    
Detection Name: Auto.125E12.241442.in02    

MD5: a7742a6d7d8b39f1a8cdf7f0b50f12bb    
Typical Filename: wrsanvs.exe  
Claimed Product: N/A      
Detection Name: W32.Auto:91e994229a.in03.Talos 
Viewing all 1927 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>