<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p><em>Malicious content identified and inserted:</em></p> <ul> <li>IPs – 3967</li> <li>Domains – 391</li> </ul> <p><em>Target list content updated:</em></p> <ul> <li>TSCritical</li> <li>TSRansomware</li> <li>TSPhishing</li> <li>TSBanking<!--more--></li> </ul> <p><em>Indicators of compromise have been updated for the following:</em></p> <ul> <li><strong>Luabot</strong> is a Trojan horse for Linux computers that may perform malicious activities, including recruiting them to DDoS botnets</li> <li><strong>Bashlite </strong>, also called Remaiten\Gafgyt\ Qbot\ Torlusis, is a Linux malware, targeting IoT systems, that spreads through methods of brute forcing over telnet platform (port 23). In one of the earliest reports by <a href="http://netformation.com/level-3-pov/attack-of-things-2">Level 3</a> researchers, after the attackers gain access to the device, it establishes a shell command to download other malicious binaries on the infected system. This bot has been found to be used for DDoS activity.</li> <li><strong>Magic Hound</strong>, as dubbed by researchers at Palo Alto Networks, is a targeted espionage campaign against government, energy, and technology industries with ties to Saudi Arabia. The campaign utilized phishing emails with malicious Word documents that would run scripts to download additional malware onto the victim's computers.</li> <li><strong>Marche</strong>r, which targets Android devices, has been seen posing as the popular game Super Mario Run. Because the game is currently iOS exclusive, attackers are able to lure eager gamers into installing malware onto their device. The malware still presents victims with fake overlays on the Google Play Store which ask for credit card information.</li> <li><strong>MacDownloader</strong>, a MacOS malware agent, was observed in the wild as targeting the defense industrial base, and reported elsewhere to have been used against human rights advocates. This is attributed to Iranian based group <strong>Charming Kitten</strong>. <strong>MacDownloader</strong> attempts to pose as both an installer for Adobe Flash, as well as the Bitdefender Adware Removal Tool, in order to extract system information and copies of OS X keychain databases.</li> <li><strong>Mirai</strong>, a Linux malware targeting IoT systems, which is mainly used for DDoS attacks. This malware is distributed by identifying vulnerable devices using a table of common factory default usernames and passwords, then logging into them in order to infect them. This botnet has been used in the recent large DDoS attacks against computer security journalist Brian Krebs' web site, and in the October 2016 Dyn cyber-attack. You can read more in our blog - <a href="https://blog.threatstop.com/2016/11/08/mirai-dont-be-one-of-the-millions/">https://blog.threatstop.com/2016/11/08/mirai-dont-be-one-of-the-millions/</a></li> <li><strong>Fareit</strong> aka <strong>Pony</strong> is a data stealer Trojan which is capable of collecting sensitive user information such as usernames and passwords in certain browsers, stored email credentials, bitcoin-related details, and more. You can read about it more in our blog post - <a href="https://blog.threatstop.com/2016/11/30/dont-pony-up-your-data-to-fareit/">https://blog.threatstop.com/2016/11/30/dont-pony-up-your-data-to-fareit/</a></li> <li><strong>EITest</strong> was first found in 2014 by Malwarebytes as a campaign distributing malware, mainly by Exploit Kits such as <strong>Angler</strong> and <strong>RIG</strong>. In recent years this campaign has been used to distribute malware such as <strong>Cerber</strong>, <strong>CryptoMix</strong>, <strong>Gootkit</strong> or the <strong>Chthonic</strong> banking Trojan.</li> <li><strong>DustySky</strong> is a campaign which has been attributed <strong>Gaza Cybergang</strong> group, a group that targets government interests in the region.</li> </ul> <p>Recently, Palo Alto Networks caught an activity related to DustySky installing the <strong>Downeks</strong> downloader, which in turn infects the victim’s computer with the <strong>Quasar</strong> RAT, which is an open-source tool.</p> <ul> <li><strong>IRCTelnet</strong> Linux malware targets IoT devices. This malware has code taken from several malwares but is mainly the successor of <strong>Aidra</strong> The attack vector of this malware is detecting IoT devices via Telnet scanning, and brute forcing to them through known vulnerable credentials of these devices. Post infection, this botnet can launch DDoS attacks using UDP floods and TCP floods, along with other techniques, and uses both IPv4 and IPv6 protocols.</li> <li>Indicators related to a suspicious spam text message.</li> <li>IOCs involved in suspicious scanning activities on domains and hosts.</li> <li>The <strong>Rig</strong> Exploit Kit, which was discovered in mid-2014 and mainly exploits vulnerabilities in Internet Explorer, Java, Adobe Flash, and Silverlight.</li> <li><strong>Fancy Bear</strong>, also known as <strong>Sofacy</strong> and <strong>APT28</strong>, is an APT group that is known for spear-phishing attacks against government and military organizations. They have been sending Trojans through weaponized documents to conduct cyber espionage, with their latest target being the United States government.</li> <li><strong>Hancitor</strong>, also known as <strong>Tordal</strong> and <strong>Chanitor</strong>, is a malware downloader that is known for spreading the <strong>Pony</strong> and <strong>Vawtrak</strong> Trojans among others. <strong>Hancitor</strong> has recently re-appeared in malware campaigns after disappearing in 2015.</li> <li>Since the summer of 2016, The a Chinese APT group associated with the cyber actor <strong>TA459</strong> and, began using a new downloader known as <strong>ZeroT</strong> to install the <strong>PlugX</strong> remote access Trojan (RAT) distributed mainly in spear-phishing emails, Targeting entities in Russia, Belarus and other countries in Asia.</li> </ul></span>