Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ AA20-182A: EINSTEIN Data Trends โ€“ 30-day Lookback

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š AA20-182A: EINSTEIN Data Trends โ€“ 30-day Lookback


๐Ÿ’ก Newskategorie: Sicherheitslรผcken
๐Ÿ”— Quelle: us-cert.gov

Original release date: June 30, 2020

Summary

Cybersecurity and Infrastructure Security Agency (CISA) analysts have compiled the top detection signatures that have been the most active over the month of May in our national Intrusion Detection System (IDS), known as EINSTEIN. This information is meant to give the reader a closer look into what analysts are seeing at the national level and provide technical details on some of the most active threats.

IDS is a network tool that uses sensors to monitor inbound and outbound traffic to search for any type of suspicious activity or known threats, alerting analysts when a specific traffic pattern matches with an associated threat. IDS allows users to deploy signatures on these boundary sensors to look for the specific pattern, or network indicator, associated with a known threat.

The EINSTEIN Program is an automated process for collecting, correlating, analyzing, and sharing computer security information across the federal civilian government. By collecting information from participating federal government agencies, CISA builds and enhances our Nationโ€™s cyber-related situational awareness.

The signatures CISA created have been included below for analysts across various organizations to use in enhancing their own network defenses. Note: CISA has created and tested these signatures in an environment that might not be the same for all organizations, so administrators may need to make changes or updates before using in the following signatures in their local environments.

Technical Details

Note: the below Snort signatures accounted for over 90 percent of what CISA analysts identified as potential threats using the IDS system for detection.

1. NetSupport Manager RAT

Description

The NetSupport Manager Remote Access Tool (RAT) is a legitimate program that, once installed on a victimโ€™s machine, allows remote administrative control. In a malicious context, it canโ€”among many other functionsโ€”be used to steal information. Malicious RATs can be difficult to detect because they do not normally appear in lists of running programs, and they can mimic the behavior of legitimate applications.

Examples

In January 2020, Palo Alto researchers observed the abuse of NetSupport in targeted phishing email campaigns.[1] In November 2019, Zscaler researchers observed โ€œsoftware update-themedโ€ campaigns tricking users into installing a malicious NetSupport Manager RAT.[2] The earliest malicious use of NetSupport was seen in a phishing email campaignโ€”reported by FireEye researchers in April 2018.[3]

Snort Signature

alert tcp any any -> any $HTTP_PORTS (msg:"NetSupportManager:HTTP Client Header contains 'User-Agent|3a 20|NetSupport Manager/'"; flow:established,to_server; flowbits:isnotset,.tagged; content:"User-Agent|3a 20|NetSupport Manager/"; http_header; fast_pattern:only; content:"CMD="; nocase; http_client_body; depth:4; content:"POST"; nocase; http_method; flowbits:set,.; classtype:http-header; reference:url,unit42.paloaltonetworks.com/cortex-xdr-detects-netsupport-manager-rat-campaign/; reference:url,www.pentestpartners.com/security-blog/how-to-reverse-engineer-a-protocol/; reference:url,github.com/silence-is-best/c2db;

2. Kovter

Description

Kovter is a fileless Trojan with several variants. This malware started as ransomware that malicious actors used to trick victims into thinking that they need to pay their local police a fine. Cyber actors have also used Kovter to perform click-fraud operations to infect targets and send stolen information from the target machines to command and control servers. Kovterโ€™s evolving features have allowed this malware to rank among the Center for Internet Securityโ€™s most prolific malware year after year.[4] See CISAโ€™s Webinar on Combatting Ransomware for additional information on Kovter.

Snort Signature

alert tcp any any -> any $HTTP_PORTS (msg:"Kovter:HTTP URI POST to CnC Server";; flow:established,to_server; flowbits:isnotset,.tagged; content:"POST / HTTP/1.1"; depth:15; content:"Content-Type|3a 20|application/x-www-form-urlencoded"; http_header; depth:47; fast_pattern; content:"User-Agent|3a 20|Mozilla/"; http_header; content:!"LOADCURRENCY"; nocase; content:!"Accept"; http_header; content:!"Referer|3a|"; http_header; content:!"Cookie|3a|"; nocase; http_header; pcre:"/^(?:[A-Za-z0-9+\/]{4})*(?:[A-Za-z0-9+\/]{2}==|[A-Za-z0-9+\/]{3}=|[A-Za-z0-9+\/]{4})$/P"; pcre:"/User-Agent\x3a[^\r\n]+\r\nHost\x3a\x20(?:\d{1,3}\.){3}\d{1,3}\r\nContent-Length\x3a\x20[1-5][0-9]{2,3}\r\n(?:Cache-Control|Pragma)\x3a[^\r\n]+\r\n(?:\r\n)?$/H";; classtype:nonstd-tcp;; reference:url,www.malware-traffic-analysis.net/2017/06/29/index2.html;

3. XMRig

Description

XMRig is a type of cryptocurrency miner that uses the resources of an unsuspecting infected machine to mine Moneroโ€”a type of cryptocurrency. XMRig can cause a victim computer to overheat and perform poorly by using additional system resources that would otherwise not be active.

Snort Signature

alert tcp any any -> any !25 (msg:"XMRIG:Non-Std TCP Client Traffic contains JSONRPC 2.0 Config Data";; flow:established,to_server; flowbits:isnotset; content:"|22|jsonrpc|22 3a 22|2.0|22|"; distance:0; content:"|22|method|22 3a 22|login|22|"; distance:0; content:"|22|agent|22 3a 22|XMRig"; nocase; distance:0; fast_pattern; content:"libuv/"; nocase; distance:0; content:!"|22|login|22 3a 22|x|22|"; flowbits:set,; classtype:nonstd-tcp;; reference:url,malware-traffic-analysis.net/2017/11/12/index.html; reference:url,www.mysonicwall.com/sonicalert/searchresults.aspx?ev=article&id=1101;

Mitigations

CISA recommends using the following best practices to strengthen the security posture of an organization's systems. Any configuration changes should be reviewed by system owners and administrators prior to implementation to avoid unwanted impacts.

  • Maintain up-to-date antivirus signatures and engines. See Protecting Against Malicious Code.
  • Ensure systems have the latest security updates. See Understanding Patches and Software Updates.
  • Disable file and printer sharing services. If these services are required, use strong passwords or Active Directory authentication.
  • Restrict users' permissions to install and run unwanted software applications. Do not add users to the local administratorsโ€™ group unless required.
  • Enforce a strong password policy. See Choosing and Protecting Passwords.
  • Exercise caution when opening email attachments, even if the attachment is expected and the sender appears to be known. See Using Caution with Email Attachments.
  • Enable a personal firewall on agency workstations that is configured to deny unsolicited connection requests.
  • Disable unnecessary services on agency workstations and servers.
  • Scan for and remove suspicious email attachments; ensure the scanned attachment is its "true file type" (i.e., the extension matches the file header).
  • Monitor users' web browsing habits; restrict access to sites with unfavorable content.
  • Exercise caution when using removable media (e.g., USB thumb drives, external drives, CDs).
  • Scan all software downloaded from the internet prior to executing.
  • Maintain situational awareness of the latest threats and implement appropriate Access Control Lists (ACLs). Sign up to receive CISAโ€™s alerts on security topics and threats.
  • Sign up for CISAโ€™s free vulnerability scanning and testing services to help organizations secure internet-facing systems from weak configuration and known vulnerabilities. Email vulnerability_info@cisa.dhs.gov to sign up. See https://www.cisa.gov/cyber-resource-hub for more information about vulnerability scanning and other CISA cybersecurity assessment services.

Resources

https://unit42.paloaltonetworks.com/cortex-xdr-detects-netsupport-manager-rat-campaign/
https://threatpost.com/netsupport-manager-rat-nortonlifelock-docs/153387/
https://www.zdnet.com/article/new-lokibot-trojan-malware-campaign-comes-disguised-as-a-popular-game-launcher/
https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/kovter-an-evolving-malware-gone-fileless
https://www.varonis.com/blog/what-is-mimikatz/

References

Revisions

  • June 30, 2020: Initial Version

This product is provided subject to this Notification and this Privacy & Use policy.

...



๐Ÿ“Œ Missing Link: Kollaps der Newton-Einstein-Gravitation oder hat Einstein fertig?


๐Ÿ“ˆ 34.45 Punkte

๐Ÿ“Œ Endgame Improves Endpoint Security with Total Attack Lookback


๐Ÿ“ˆ 24.43 Punkte

๐Ÿ“Œ A lookback at some of the highlights and talks at the sixth annual steelcon conference


๐Ÿ“ˆ 24.43 Punkte

๐Ÿ“Œ New "LookBack" Malware Used in Attacks Against U.S. Utilities Sector


๐Ÿ“ˆ 24.43 Punkte

๐Ÿ“Œ Nation-state actor uses new LookBack RAT to target US utilities


๐Ÿ“ˆ 24.43 Punkte

๐Ÿ“Œ Malware Moves: The Rise of LookBack โ€“ And Return of Emotet


๐Ÿ“ˆ 24.43 Punkte

๐Ÿ“Œ More U.S. Utility Firms Targeted in Evolving LookBack Spearphishing Campaign


๐Ÿ“ˆ 24.43 Punkte

๐Ÿ“Œ State-Backed Attackers Target US Entities with LookBack Malware


๐Ÿ“ˆ 24.43 Punkte

๐Ÿ“Œ News Wrap: GandCrab Operators Resurface, Utilities Firms Hit By LookBack Malware


๐Ÿ“ˆ 24.43 Punkte

๐Ÿ“Œ The Rise of LookBack Malware And Return of Emotet, Retefe


๐Ÿ“ˆ 24.43 Punkte

๐Ÿ“Œ A lookback under the TA410 umbrella: Its cyberespionage TTPs and activity


๐Ÿ“ˆ 24.43 Punkte

๐Ÿ“Œ Researchers spotted the never-before-seen lookback malware being used in spearphishing campaigns against three u.s. utilities.


๐Ÿ“ˆ 24.43 Punkte

๐Ÿ“Œ Attackers Undeterred in Efforts to Target U.S. Utilities with LookBack


๐Ÿ“ˆ 24.43 Punkte

๐Ÿ“Œ Additional U.S. Utilities Targeted With LookBack Malware


๐Ÿ“ˆ 24.43 Punkte

๐Ÿ“Œ US Utilities Targeted with LookBack RAT in a new phishing campaign


๐Ÿ“ˆ 24.43 Punkte

๐Ÿ“Œ Security Product Metrics, ML 101, PEACH for Cloud, Log4Shell Lookback, Appsec Tools - ASW #224


๐Ÿ“ˆ 24.43 Punkte

๐Ÿ“Œ LookBack Malware Campaign Spreads to More US Utilities


๐Ÿ“ˆ 24.43 Punkte

๐Ÿ“Œ U.S. Utilities Targeted with FlowCloud Malware by LookBack Attackers


๐Ÿ“ˆ 24.43 Punkte

๐Ÿ“Œ How To Use FuboTVโ€™s Lookback Feature


๐Ÿ“ˆ 24.43 Punkte

๐Ÿ“Œ AA20-304A: Iranian Advanced Persistent Threat Actor Identified Obtaining Voter Registration Data


๐Ÿ“ˆ 23.36 Punkte

๐Ÿ“Œ AA20-345A: Cyber Actors Target K-12 Distance Learning Education to Cause Disruptions and Steal Data


๐Ÿ“ˆ 23.36 Punkte

๐Ÿ“Œ With AI upgrade, Salesforce's Einstein Copilot will handle unstructured data


๐Ÿ“ˆ 20.57 Punkte

๐Ÿ“Œ AA20-006A: Potential for Iranian Cyber Response to U.S. Military Strike in Baghdad


๐Ÿ“ˆ 20.01 Punkte

๐Ÿ“Œ AA20-006A: Potential for Iranian Cyber Response to U.S. Military Strike in Baghdad


๐Ÿ“ˆ 20.01 Punkte

๐Ÿ“Œ AA20-010A: Continued Exploitation of Pulse Secure VPN Vulnerability


๐Ÿ“ˆ 20.01 Punkte

๐Ÿ“Œ AA20-031A: Detecting Citrix CVE-2019-19781


๐Ÿ“ˆ 20.01 Punkte

๐Ÿ“Œ AA20-049A: Ransomware Impacting Pipeline Operations


๐Ÿ“ˆ 20.01 Punkte

๐Ÿ“Œ AA20-049A: Ransomware Impacting Pipeline Operations


๐Ÿ“ˆ 20.01 Punkte

๐Ÿ“Œ AA20-049A: Ransomware Impacting Pipeline Operations


๐Ÿ“ˆ 20.01 Punkte

๐Ÿ“Œ AA20-049A: Ransomware Impacting Pipeline Operations


๐Ÿ“ˆ 20.01 Punkte

๐Ÿ“Œ AA20-073A: Enterprise VPN Security


๐Ÿ“ˆ 20.01 Punkte

๐Ÿ“Œ AA20-099A: COVID-19 Exploited by Malicious Cyber Actors


๐Ÿ“ˆ 20.01 Punkte

๐Ÿ“Œ AA20-106A: Guidance on the North Korean Cyber Threat


๐Ÿ“ˆ 20.01 Punkte

๐Ÿ“Œ AA20-107A: Continued Threat Actor Exploitation Post Pulse Secure VPN Patching


๐Ÿ“ˆ 20.01 Punkte

๐Ÿ“Œ AA20-120A: Microsoft Office 365 Security Recommendations


๐Ÿ“ˆ 20.01 Punkte











matomo