<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p><em><img src="https://info.threatstop.com/hubfs/03_shipping_malware-100694090-large.jpg" alt="03_shipping_malware-100694090-large.jpg" width="454" height="340"></em></p> <!--more--> <p><em>Malicious Content Identified and Inserted:</em></p> <ul> <li>IPs – 1515</li> <li>Domains – 865</li> </ul> <p><em>Target List Content Updated:</em></p> <ul> <li>TSCritical</li> <li>TSRansomware</li> <li>TSPhishing</li> <li>TSBanking</li> <li>TSInbound</li> </ul> <p><em>Indicators of compromise have been updated for the following:</em></p> <p><em>(For a deeper dive into the research behind a threat or campaign, click on the links in each description)</em></p> <ul> <li><strong>POWHOV</strong> is Trojan downloader active by merely hovering your mouse’s pointer over a hyperlinked picture or text in PowerPoint’s slideshow. It was discovered by <a href="http://blog.trendmicro.com/trendlabs-security-intelligence/mouseover-otlard-gootkit/?linkId=38532342&amp;utm_campaign=Biweekly%20Security%20Update&amp;_hsenc=p2ANqtz-_NsUXc7seTX-e8P5eJg7p01dzwHi2Z3f6SdTSDsIFSUAD8zGOYC8rxbN1hiTZ0O-_BnyvZ" data-hs-link-id="0" target="_blank" rel="noopener">Trend Micro</a> and delivered the Banking Trojan, <strong>Gootkit</strong>. This campaign targeted industries including manufacturing, device fabrication, education, logistics and pyrotechnics in Europe, the Middle East and Africa.</li> <li><strong>GootKit</strong> is a banking Trojan used to target primarily European bank accounts. It captures videos on infected machines and exfiltrates them back to a command and control server.</li> <li><strong>Mirai</strong>, a Linux malware targeting IoT systems, is mainly used for DDoS attacks. This malware is distributed by identifying vulnerable devices using a table of common factory default usernames and passwords, subsequently logging in and infecting them. This botnet was used in the recent DDoS attacks against computer security journalist Brian Krebs' web site, as well as in the October 2016 Dyn cyber-attack. You can read more on our blog, <a href="https://blog.threatstop.com/2016/11/08/mirai-dont-be-one-of-the-millions/?utm_campaign=Biweekly%20Security%20Update&amp;_hsenc=p2ANqtz--lWXb1iCVmpGPA-zHYtbty69DgXsc03Z62D6jxJ5m7I6nQed5z4r4MV6S1DcOdXkTnKZ2T" data-hs-link-id="0" target="_blank" rel="noopener">here</a>.</li> <li><strong>Cobalt Kitty</strong>, defined as an APT (by CybeReason) targeting a global corporation based in Asia, aims to steal proprietary business information. The initial step of this <a href="https://www.cybereason.com/labs-operation-cobalt-kitty-a-large-scale-apt-in-asia-carried-out-by-the-oceanlotus-group/?utm_campaign=Biweekly%20Security%20Update&amp;_hsenc=p2ANqtz--zuc0qxnIFW4KFaPNORA955XgA7N_Y7JN2fP1ZoJv7eTtNBGgxQzd4oY4UVifK-8YPp7UH" data-hs-link-id="0" target="_blank" rel="noopener">campaign</a> included spear-phishing attacks towards the corporation’s management entities. The attackers compromised more than 40 PCs and servers, including the domain controller, file servers, Web application server and database server. This campaign was not completely attributed, but had signs linking this actor to <a href="https://www.cybereason.com/labs-operation-cobalt-kitty-a-large-scale-apt-in-asia-carried-out-by-the-oceanlotus-group/?utm_campaign=Biweekly%20Security%20Update&amp;_hsenc=p2ANqtz-8u2XmC3oJH_uXn4GWxW4QXSJ5MkEO2CEW3bht-1HzlyHe7gg5jrN9Nmj9yREwC2reoqcpX" data-hs-link-id="1" target="_blank" rel="noopener">OceanLotus</a> (Also known by the names <strong>APT-C-00</strong>, <strong>SeaLotus</strong> and <strong>APT32</strong>)</li> <li><a href="https://www.us-cert.gov/HIDDEN-COBRA-North-Korean-Malicious-Cyber-Activity?utm_campaign=Biweekly%20Security%20Update&amp;_hsenc=p2ANqtz-_1avAskXi8J8b_hHc4pg0nwJ0ydAKwtKQlp5AnJpXCryrKh4gK6bF59pprItCnRhXNWEWj" data-hs-link-id="0" target="_blank" rel="noopener">HIDDEN COBRA</a> are cyber actors attributed to North Korean government. The malware variant (<strong>DeltaCharlie</strong>) used to manage their distributed denial-of-service (DDoS) botnet infrastructure is likely also used for network exploitation.</li> <li><strong>TrickBot</strong> is the successor of This malware is distributed through spam emails and the threat loader <strong>'TrickLoader</strong>.' TrickLoader is associated with several other threats, including <strong>Pushdo</strong>, <strong>Cutwail</strong> and <strong>Vawtrak</strong>. The primary target of this malware is credential theft.</li> <li><a href="https://www.welivesecurity.com/wp-content/uploads/2017/06/Win32_Industroyer.pdf?utm_campaign=Biweekly%20Security%20Update&amp;_hsenc=p2ANqtz--OPSDiMJjwIsLcvykeF36oRqlx43XT1hUiT67XcT9QDSyJVa2qLqPF9KqrUduI9z0w8cQl" data-hs-link-id="0" target="_blank" rel="noopener">Win32/Industroyer</a> is a malware designed to disrupt the processes of industrial control systems (ICS), specifically those used in electrical substations. This <a href="https://www.us-cert.gov/ncas/alerts/TA17-163A?utm_campaign=Biweekly%20Security%20Update&amp;_hsenc=p2ANqtz-_dQ2zZlcZgbtJCyzs6HRCOIszVnolbMLfQjSGIHQy2Hl5bowF0J-Q0JpvLvxjKpQurSrf4" data-hs-link-id="0" target="_blank" rel="noopener">malware</a> is capable of directly controlling switches and circuit breakers.</li> <li>A <a href="https://myonlinesecurity.co.uk/fake-bookatable-com-and-efaxcorporatexx-top-malspam-using-cve-2017-0199-exploits-to-deliver-malware/?utm_campaign=Biweekly%20Security%20Update&amp;_hsenc=p2ANqtz--S_9BJaqJddG1VU_6L2HegYnSgvNTJzUQXevpxQRusl3PkiqfNswGth8qsORFozdHtMkZo" data-hs-link-id="0" target="_blank" rel="noopener">Phishing campaign</a> that uses domains imitating the domain of both HMRC services in the UK and e-fax services.</li> <li>A<strong><strong> <strong>HookAds</strong> </strong></strong>Malvertising campaign led to<strong><strong> <strong>Rig EK</strong> and <strong>LatentBot</strong>.<br></strong></strong><strong>The Rig</strong> <strong>Exploit</strong> Kit, discovered in mid-2014, primarily exploits vulnerabilities in Internet Explorer, Java, Adobe Flash and Silverlight.</li> <li>The <strong><a href="https://malwarebreakdown.com/2017/05/18/hookads-malvertising-campaign-leads-to-rig-ek-at-185-154-53-33-drops-latentbot/?utm_campaign=Biweekly%20Security%20Update&amp;_hsenc=p2ANqtz--V93tj3MIYhF2y6pU0g1akKu4OZezNQ3lBmZqfUUQdPFxHP9Q9lIn5HIDIgBmiph23kyY6" data-hs-link-id="0" target="_blank" rel="noopener">LatentBot</a></strong> malware, discovered by FireEye in 2015, has been active since 2013. This malware was seen targeting financial and insurance companies from different countries. Some of its features include: a modular design that allows easy updates on victims’ machines, the ability to hide applications in a different desktop, the ability to wipe the MBR and ransomware-like capabilities. (ex. being able to lock down the desktop) It can also establish hidden VNC connections and remove decrypted strings in memory after use. It is primarily distributed through emails with malicious attachments.</li> <li><strong>Matrix Banker </strong>is a banking malware, dubbed <a href="https://www.arbornetworks.com/blog/asert/another-banker-enters-matrix/?utm_campaign=Biweekly%20Security%20Update&amp;_hsenc=p2ANqtz-84atwoEm8FM1RyrtolZtPDKOW4MxZVQBB1e2Xg7FheiPMwAJNDhniOUDM_lth3odqb59o3" data-hs-link-id="0" target="_blank" rel="noopener">RediModiUpd</a> by ProofPoint. It primarily targets financial institutions in Latin America, specifically Mexico and Peru.</li> </ul> <p>&nbsp;<em style="font-size: 12.1612px; background-color: transparent;">Blog Roundup:</em></p> <ul> <li><a href="https://blog.threatstop.com/astrum-ek-the-star-of-the-adgholas-campaign?utm_campaign=Biweekly%20Security%20Update&amp;_hsenc=p2ANqtz--i0KjwA-fFT6LptBd4tQYOS5fJYuH7oBjB1O7iCOUtgwiAy5x61Iczks2Y19ZDC4d5s0Su" data-hs-link-id="0" target="_blank" rel="noopener">Astrum EK: The Star of the AdGholas Campaign</a></li> <li><a href="https://blog.threatstop.com/terror-ek-fails-to-scare?utm_campaign=Biweekly%20Security%20Update&amp;_hsenc=p2ANqtz-9KkvK1v_hOntlfiGbqBG5B06Fy4sq1Zkb3iSb-0Ssk_RgfWxAuxtybvZ_c-LO24-Fuy8ov" bgcolor="transparent" data-hs-link-id="0" target="_blank" rel="noopener">Terror EK Fails to Scare</a></li> <li><a href="https://blog.threatstop.com/kasidet-pos-malware-spread-through-fake-security-update?utm_campaign=Biweekly%20Security%20Update&amp;_hsenc=p2ANqtz-9q4gvtDTuR_PSWWHEusjq5DRsDxNw5BdXK45Aq2gCOPCaz4RTY3qs9DVlT2dDVYOIJCq_8" bgcolor="transparent" data-hs-link-id="0" target="_blank" rel="noopener">Kasidet POS Malware Spread Through Fake Security Update</a></li> <li><a href="https://blog.threatstop.com/jaff-ransomware-is-nothing-to-laugh-about?utm_campaign=Biweekly%20Security%20Update&amp;_hsenc=p2ANqtz-8rn6DYR7LUEmpnOtChkhuyuJyK1WjLD3umZ4BB8CW2xtLUib9PEF5-nXOX4fShKCMbu0CM" bgcolor="transparent" data-hs-link-id="0" target="_blank" rel="noopener">Jaff Ransomware Is Nothing to Laugh About</a></li> <li><a href="https://blog.threatstop.com/steam-stealers-game-the-system?utm_campaign=Biweekly%20Security%20Update&amp;_hsenc=p2ANqtz-_RyQVZ0wCpnuL5a9D71yTDnr8HsXm6jfGs_XPyTBrL9wRNSJwZDQZftU_TkOC9UI30Ssd4" bgcolor="transparent" data-hs-link-id="0" target="_blank" rel="noopener">Steam Stealers Game the System</a></li> </ul> <p>&nbsp;<em style="font-size: 12.1612px; background-color: transparent;">New/Updated Targets:</em></p> <ul> <li>We have added over 72 new targets for IP and DNS Firewalls for various malware families. Information about these new targets are detailed in our blog post <a href="https://blog.threatstop.com/adding-new-cybercrime-trackers?utm_campaign=Biweekly%20Security%20Update&amp;_hsenc=p2ANqtz-_d3-Sz-eqdPwuGpXNAevXIcdAnNkGbJoBP5vs_RKtD8wveB_A8KlNCKxrA150Ml31zOZLB" data-hs-link-id="0" target="_blank" rel="noopener">here</a><span>.</span></li> <li>Multiple compound targets including Botnets, Botnets 2, Ransomware and Banking were updated with data pertaining to the newly added threats above.</li> </ul></span>