<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p><em><img src="http://info.threatstop.com/hubfs/Why_Security_Icon.png" alt="Why_Security_Icon.png" width="454" height="338"></em></p> <!--more--> <p>&nbsp;</p> <p><em>Malicious Content Identified and Inserted:</em></p> <ul> <li>IPs – 2024</li> <li>Domains – 1723</li> </ul> <p><em>Target List Content Updated:</em></p> <ul> <li>TSCritical</li> <li>TSRansomware</li> <li>TSPhishing</li> <li>TSBanking</li> <li>TSInbound – <span style="color: #ff0000;">NEW!</span></li> </ul> <p><em>Indicators of compromise have been updated for the following:</em></p> <p><em>(For a deeper dive into the research behind a threat or campaign, click on the links in each description)</em></p> <ul> <li>IOCs that were involved in <strong>suspicious scanning activities</strong> on domains and hosts.</li> <li>IOCs that were involved in <strong><a href="https://dochub.threatstop.com/display/TS/M#M-_malspam" data-hs-link-id="0" target="_blank" rel="noopener">Malspam</a></strong>.</li> <li>IOCs that were involved in <strong>phishing</strong>.</li> <li>IOCs that are related to the <strong>DucoSign</strong> <strong>breach</strong>, where phishing emails were utilized to spread malware sent to the Docosign customers’ corporate e-mail addresses.</li> <li><strong>WannaCry</strong> is a Ransomware that spread wildly in a short amount of time, detected at May 2017. It infected over 100K victims in over 99 countries, utilizing the MS17-010 Vulnerability in SMBv1 server, also named <strong>EternalBlue</strong>. This Ransomware has infected large financial and governmental entities. For more information, visit our blog <a href="https://blog.threatstop.com/this-past-weekend-made-all-of-us-wannacry" data-hs-link-id="0" target="_blank" rel="noopener">here</a>.</li> <li><strong>Adylkuzz</strong> is a cryptocurrency miner, installed using <strong>EternalBlue</strong> and <strong>DoublePulsar</strong>, both utilities leaked from NSA disclosure. <strong>EternalBlue</strong> is an exploit of a vulnerability in Microsoft's SMB servers. This <a href="https://www.proofpoint.com/us/threat-insight/post/adylkuzz-cryptocurrency-mining-malware-spreading-for-weeks-via-eternalblue-doublepulsar" data-hs-link-id="0" target="_blank" rel="noopener">attack</a> shut down SMB networking to prevent further infections with other malware. It can be detected by symptoms of loss of access to shared Windows resources, as well as degradation of PC and server performance. This campaign is estimated to be larger in scope than the <strong>Wannacry</strong> worm distribution.</li> <li><strong>ZeroT</strong> is a downloader <a href="https://www.proofpoint.com/us/threat-insight/post/apt-targets-financial-analysts" data-hs-link-id="0" target="_blank" rel="noopener">used</a> to install the <strong>PlugX</strong> Remote Access <a href="https://dochub.threatstop.com/display/TS/T#T-_trojan" data-hs-link-id="0" target="_blank" rel="noopener">Trojan</a> (RAT) and distributed primarily through spear-phishing emails. This malware targets entities in Russia, Belarus and Asia. <strong>ZeroT</strong> showed up in the summer of 2016, following its use by the Chinese APT group linked with cyber actor TA459.</li> <li><strong>Mirai</strong>, a Linux malware targeting IoT systems, is mainly used for DDoS attacks. This malware is distributed by identifying vulnerable devices using a table of common factory default usernames and passwords, subsequently logging in and infecting them. This botnet was used in the recent DDoS attacks against computer security journalist Brian Krebs' web site, as well as in the October 2016 Dyn cyber-attack. You can read more in our blog, <a href="https://blog.threatstop.com/2016/11/08/mirai-dont-be-one-of-the-millions/" data-hs-link-id="0" target="_blank" rel="noopener">here</a>.</li> <li>A vendor, <strong><a href="http://www.clearskysec.com/the-rainmaker/" data-hs-link-id="0" target="_blank" rel="noopener">Rainmaker</a></strong>, is offering a Ransomware named “<strong>Philadelphia</strong>,” a version of the <strong>Stampado</strong> <strong>Rainmaker&nbsp;</strong>also offering other tools, including RATs.</li> <li><strong>Machete&nbsp;</strong><span></span>is a<span>&nbsp;</span><a href="http://www.cylance.com/en_us/blog/el-machete-malware-attacks-cut-through-latam.html" data-hs-link-id="0" target="_blank" rel="noopener">malware targeting</a><span>&nbsp;</span>intelligence services, military, embassies and government institutions in South America and Russia. It was first detected by <a href="https://securelist.com/blog/research/66108/el-machete/" data-hs-link-id="0" target="_blank" rel="noopener">Kaspersky</a> in August 2014. It was found to log keystrokes, capture audio from a computer’s microphone, capture screenshots, capture geolocation data and take photos from a computer’s web camera.</li> <li><strong>BankBot</strong> is a malware targeting android OS, appearing in Google Play in various forms, often impersonating well-known application icons or names. The predecessor of this malware, <strong>BankBotAlpha,</strong> was first advertised back on December 19, 2016, on a Russian forum as a new initiative to build an Android banker from scratch. This malware achieves device admin privileges from the user and collects information like IMEI, Bank applications present on the device, OS version, presence of root, etc. Communication to the C&amp;C is by SMS and over HTTP protocol.</li> <li><strong>Artemis</strong> malware effects the work of web browsers. Common signs of infection by the Artemis virus include: Change in browser homepage, search engine queries redirected to advertisement pages, and new, opened browser windows with pop-up ads.</li> <li><strong>Jaff</strong> Ransomware was found distributed via Malspam from <strong>Necurs</strong>. These SPAM emails will have subjects like “Scan_84686473.” As of May 2017, it was determined the <strong><a href="http://www.malware-traffic-analysis.net/2017/05/16/index.html" data-hs-link-id="0" target="_blank" rel="noopener">Jaff Ransomware</a></strong> is not decryptable</li> <li><strong>Operation Cloud Hopper</strong>, uncovered by researchers at BAE Systems and PwC, was a cyber espionage campaign by <a href="https://raw.githubusercontent.com/PwCUK-CTO/OperationCloudHopper/master/cloud-hopper-indicators-of-compromise-v3.csv" data-hs-link-id="0" target="_blank" rel="noopener">APT10</a> (known as <a href="https://www.pwc.co.uk/issues/cyber-security-data-privacy/insights/operation-cloud-hopper.html" data-hs-link-id="0" target="_blank" rel="noopener">Red Apollo</a> and the menuPass Team) that targeted IT MSPs to steal client corporate data. A US-CERT Alert on the subject is available <a href="https://www.us-cert.gov/ncas/alerts/TA17-117A" data-hs-link-id="0" target="_blank" rel="noopener">here</a>, with additional info. on our blog&nbsp;<a href="https://blog.threatstop.com/operation-cloud-hopper-jumps-into-view" data-hs-link-id="0" target="_blank" rel="noopener">here</a>.</li> <li><strong>DarkTrack</strong> backdoor was distributed via spear phishing to CERTs in the military domain, as <a href="https://nioguard.blogspot.ro/2017/05/targeted-attack-against-ukrainian.html?m=1" data-hs-link-id="0" target="_blank" rel="noopener">found by NioGuard</a> in May 2017.</li> <li><strong>Astrum</strong> is an <a href="http://blog.trendmicro.com/trendlabs-security-intelligence/astrum-exploit-kit-abuses-diffie-hellman-key-exchange/" data-hs-link-id="0" target="_blank" rel="noopener">Exploit Kit</a>&nbsp;found to be used in the <strong>AdGholas</strong> Malvertising campaign, delivering several types of malware, including <strong>Dreambot/Gozi</strong> and <strong>RAMNIT</strong>.</li> <li><strong>Magnitude Exploit </strong><strong>Kit</strong> is an attack <a href="http://www.csoonline.com/article/2459925/malware-cybercrime/exposed-an-inside-look-at-the-magnitude-exploit-kit.html" data-hs-link-id="0" target="_blank" rel="noopener">toolkit</a> that <a href="https://community.rsa.com/community/products/netwitness/blog/2017/02/09/magnitude-exploit-kit-under-the-hood" data-hs-link-id="0" target="_blank" rel="noopener">infects victims</a> through <a href="https://www.fireeye.com/blog/threat-research/2016/04/cve-2016-1019_a_new.html" data-hs-link-id="0" target="_blank" rel="noopener">compromised</a> websites, and uses a variety of <a href="https://blog.malwarebytes.com/threat-analysis/2015/11/magnitude-exploit-kit-activity-increases-via-malvertising-attacks/" data-hs-link-id="0" target="_blank" rel="noopener">exploits to download</a> malware on to the <a href="http://blog.trendmicro.com/trendlabs-security-intelligence/cve-2016-1019-zero-day-integrated-in-exploit-kit/" data-hs-link-id="0" target="_blank" rel="noopener">computer</a>. The U.S. is the country with the largest Magnitude EK victims.</li> <li><span></span><strong>Cerber&nbsp;</strong><span></span><a href="http://researchcenter.paloaltonetworks.com/2017/03/unit42-blank-slate-campaign-takes-advantage-hosting-providers-spread-ransomware/" data-hs-link-id="0" target="_blank" rel="noopener">Ransomware</a><span>.</span> This <a href="http://www.malware-traffic-analysis.net/2016/08/27/index.html" data-hs-link-id="0" target="_blank" rel="noopener">ransomware debuted</a> in late February 2016 and is one of the most prevalent ransomware variants. This <a href="https://threatpost.com/malvertising-leads-to-magnitude-exploit-kit-ransomware-infection/112894/" data-hs-link-id="0" target="_blank" rel="noopener">ransomware</a> is typically distributed via emails containing macro-enabled Word documents, Windows Script Files or Rich Text Documents.<span>&nbsp;</span><strong>Cerber</strong><span>&nbsp;</span>uses a strong, presently unbreakable encryption, and has a number of features that, when combined, make it unique in today's ransomware landscape. A new development of this ransomware potentially gives it DDOS capabilities. One recent variant of the ransomware has been spotted quietly sending out huge amounts of network traffic from infected machines. You can read more about it in our blog post <a href="https://blog.threatstop.com/2016/06/17/cerber-ransomware-gets-stronger-adds-ddos-capabilities" data-hs-link-id="0" target="_blank" rel="noopener">here</a>.</li> <li><strong>DiamondFox malware</strong> is capable of <a href="http://blog.checkpoint.com/2017/05/10/diamondfox-modular-malware-one-stop-shop/" data-hs-link-id="0" target="_blank" rel="noopener">information disclosure</a> (specifically Credentials and financial information), also known for point of sale systems&nbsp;<a href="http://blog.checkpoint.com/wp-content/uploads/2017/05/DiamondFox_Report_170510-3.pdf" data-hs-link-id="0" target="_blank" rel="noopener">attacks</a>&nbsp;for the same purposes.</li> </ul> <p>&nbsp;<em style="font-size: 12.1612px; background-color: transparent;">Security Blog Roundup:</em></p> <ul> <li><a href="https://blog.threatstop.com/mo-ek-domains-mo-security-mo-better" data-hs-link-id="0" target="_blank" rel="noopener">Mo EK Domains, Mo Security, Mo Better</a></li> <li><span></span><a href="https://blog.threatstop.com/enhancing-protection-against-tor" data-hs-link-id="0" target="_blank" rel="noopener">Enhancing Protection Against Tor</a></li> <li><span><a href="https://blog.threatstop.com/threatstop-ransomware-wannacry" data-hs-link-id="0" target="_blank" rel="noopener">ThreatSTOP Tools for Visibility Into WannaCry</a></span></li> <li><a href="https://blog.threatstop.com/this-past-weekend-made-all-of-us-wannacry" data-hs-link-id="1" target="_blank" rel="noopener">WannaCry Roundup</a></li> <li><a href="https://blog.threatstop.com/operation-cloud-hopper-jumps-into-view" data-hs-link-id="1" target="_blank" rel="noopener">Operation “Cloud Hopper” Jumps Into View</a></li> </ul> <p><em>&nbsp;</em><em style="font-size: 12.1612px; background-color: transparent;">New/Updated Targets:</em></p> <ul> <li>New: <ul> <li><strong>BlackHole:&nbsp;</strong>BlackHole is a popular and customizable kit designed to exploit a range of client vulnerabilities via the Web. Hackers license the kit (or rent an already exploited site) to cyber criminals. In turn, cyber criminals compromise web pages and embed an invisible iframe. When potential victims visit a compromised Web page, they are redirected to the hosted exploit. If the victim has one of the targeted client vulnerabilities, their device is infected. (Expert)</li> </ul> </li> <li>Updated: <ul> <li><strong>Anonymous Networks:&nbsp;</strong>More resources for anonymous networks were added to the targets, and it was duplicated to appear in both Standard and Expert modes in policy creation.</li> <li><strong>Tor Exit Nodes: </strong>Updated with more sources.</li> <li><strong>Driveby, Driveby (paranoid), Driveby (super paranoid):</strong>&nbsp;Now updated with the Blackhole data.</li> </ul> </li> </ul></span>