<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><h4 style="text-align: center;">4.12 Release Notes</h4> <p><strong>Reporting</strong> – The Legacy reporting link has been removed from the portal. All Legacy reporting information is available in the Next-Generation reporting UI.</p> <p>&nbsp;12.14 .16 Security Update</p> <p><strong>Malicious Content Identified &amp; Inserted:</strong></p> <ul> <li>IPs – 166</li> <li>Domains – 1288</li> </ul> <p><strong>Target Lists Updated:</strong></p> <ul> <li>TS-CRIT</li> <li>TS-RANS<!--more--></li> </ul> <p><strong>Indicators of compromise have been updated for the following:</strong></p> <ul> <li><strong>Carbanak\Anunak</strong>&nbsp;M<strong>alware</strong>, which was named after the cyber criminal group related to it. This malware targets POS (point of sale) machines. It was widely reported after in February 2016 it had composed a large campaign on banking targets.</li> </ul> <ul> <li><strong>Tropic Trooper</strong> campaign, which mostly targets Taiwan and the Philippines. This campaign has been related to the use of Yahoyah malware, Poison Ivy RAT and PCShare malware families. It is distributed mainly by spear phishing.</li> </ul> <ul> <li><strong>The Rig Exploit Kit</strong>, which was discovered in mid-2014 and mainly exploits vulnerabilities in Internet Explorer, Java, Adobe Flash and Silverlight.</li> </ul> <ul> <li><strong>Sundown Exploit Kit</strong>. This kit is composed of a landing page and an additional page on a different domain, containing the payload. Its distribution is by malvertising and compromised sites. It has a relatively large number of domains for communication the first steps of infection, mostly domains obtained by the method of domain shadowing (creating subdomains under a compromised legitimate domains).</li> </ul> <ul> <li>Remote Access Trojan <strong>Hworm</strong>, which is attributed to the cyber-criminal persona <strong>Houdini</strong>. This Trojan’s capabilities include information disclosure, keylogging and enabling webcam and microphone. It’s communication to command and control servers is via Dynamic DNS domains and currently, there are more than 10 known versions of this Trojan. You can read about this more in our blog – <a href="https://blog.threatstop.com/2016/12/01/houdinis-rat-is-no-disappearing-act/" target="_blank">https://blog.threatstop.com/2016/12/01/houdinis-rat-is-no-disappearing-act/</a></li> </ul> <ul> <li><strong>Cerber Ransomware</strong>. This ransomware debuted in late February, 2016, and has already become one of the most prevalent ransomware variants. The ransomware is typically distributed via emails containing macro-enabled Word documents, Windows Script Files, or Rich Text Documents. <strong>Cerber</strong> uses a strong, currently unbreakable encryption, and has a number of features that, when combined, make it unique in today’s ransomware landscape. A new development of the ransomware potentially gives it DDOS capabilities. One recent variant of the ransomware has been spotted quietly sending out huge amounts of network traffic from infected machines. You can read more about it in our blog post – <a href="https://blog.threatstop.com/2016/06/17/cerber-ransomware-gets-stronger-adds-ddos-capabilities/" target="_blank">https://blog.threatstop.com/2016/06/17/cerber-ransomware-gets-stronger-adds-ddos-capabilities/</a></li> </ul> <ul> <li><strong>Mirai</strong> is a Linux malware targeting IoT systems, which are mainly used for DDoS attacks. This malware is distributed by identifying vulnerable devices using a table of common factory default usernames and passwords, and logging into them in order to infect them. This botnet have been used in the recent large DDoS attacks against computer security journalist Brian Krebs’s web site, and the October 2016 Dyn cyberattack. You can read more in our blog – <a href="https://blog.threatstop.com/2016/11/08/mirai-dont-be-one-of-the-millions/" target="_blank">https://blog.threatstop.com/2016/11/08/mirai-dont-be-one-of-the-millions/</a></li> </ul> <ul> <li><strong>Fareit </strong>aka<strong> Pony</strong> is a data stealer Trojan which is capable of collecting sensitive user information such as usernames and passwords in certain browsers, stored email credentials, bitcoin-related details, and more. You can read about it more in our blog post – <a href="https://blog.threatstop.com/2016/11/30/dont-pony-up-your-data-to-fareit/" target="_blank">https://blog.threatstop.com/2016/11/30/dont-pony-up-your-data-to-fareit/</a></li> </ul> <ul> <li>A new Google Android Trojan named “<strong>PluginPhantom</strong>” was recently discovered by PaloAltoNetworks research group. it can steal data, act as a key logger, capture screens, record audio, take pictures and manipulate (intercept and send) SMS messages.</li> </ul> <ul> <li><strong>Nemucod</strong> is a JavaScript downloader Trojan that targets users through malware spam campaigns. <strong>Nemucod</strong> downloads additional malware and executes it without the user’s consent. <strong>Nemucod</strong> usually arrives on an infected machine through malicious spam emails with .zip extensions. Recently, there has been a rise in cases of <strong>Nemucod</strong> distributing ransomware.</li> </ul> <ul> <li>A new Android-based malware pretends to be a mobile banking app. Once installed, the malware targets not only banking credentials, but also credentials for Google Play, Facebook, Skype, and Instagram using overlays on top of the legitimate applications.</li> </ul> <ul> <li>Phishing</li> </ul> <ul> <li>Sinkholes</li> </ul></span>