Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ Anomali Cyber Watch: Caller-ID Spoofing Actors Arrested, Fast-Moving Qakbot Infection Deploys Black Basta Ransomware, New YARA Rules to Detect Cobalt Strike, and More

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Anomali Cyber Watch: Caller-ID Spoofing Actors Arrested, Fast-Moving Qakbot Infection Deploys Black Basta Ransomware, New YARA Rules to Detect Cobalt Strike, and More


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: anomali.com

The various threat intelligence stories in this iteration of the Anomali Cyber Watch discuss the following topics: APT, Caller-ID spoofing, False-flag, Phishing, Ransomware, Russia, the UK, and Ukraine. The IOCs related to these stories are attached to Anomali Cyber Watch and can be used to check your logs for potential malicious activity.


Figure 1 - IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed.

Trending Cyber News and Threat Intelligence

Voice-Scamming Site โ€œiSpoofโ€ Seized, 100s Arrested in Massive Crackdown

(published: November 25, 2022)

iSpoof was a threat group offering spoofing for caller phone numbers (also known as Caller ID, Calling Line Identification). iSpoof core group operated out of the UK with presence in other countries. In the 12 months until August 2022 around 10 million fraudulent calls were made globally via iSpoof. On November 24, 2022, Europol announced a joint operation involving Australia, Canada, France, Germany, Ireland, Lithuania, Netherlands, Ukraine, the UK, and the USA, that led to the arrest of 142 suspects and seizure of iSpoof websites.
Analyst Comment: Threat actors can spoof Caller ID (Calling Line Identification) similar to spoofing the โ€œFrom:โ€ header in an email. If contacted by an organization you should not confirm any details about yourself, take the callerโ€™s details, disconnect and initiate a call back to the organization yourself using a trusted number. Legitimate organizations understand scams and fraud and do not engage in unsolicited calling.
Tags: iSpoof, Teejai Fletcher, United Kingdom, source-country:UK, Caller ID, Calling Line Identification, Voice-scamming, Social engineering

New Ransomware Attacks in Ukraine Linked to Russian Sandworm Hackers

(published: November 25, 2022)

On November 21, 2022, multiple organizations in Ukraine were targeted with new ransomware written in .NET. It was dubbed RansomBoggs by ESET researchers who attributed it to the Russia-sponsored Sandworm Team (aka Iridium, BlackEnergy). Sandworm distributed RansomBoggs from the domain controller using the same PowerShell script (PowerGap) that was seen in its previous attacks. RansomBoggs encrypts files using AES-256 in CBC mode using a randomly generated key. The key is RSA encrypted prior to storage and the encrypted files are appended with a .chsch extension.
Analyst Comment: Ransomware remains one of the most dangerous types of malware threats and even some government-sponsored groups are using it. Sandworm is a very competent actor group specializing in these forms of attack. Organizations with exposure to the military conflict in Ukraine, or considered by the Russian state to be providing support relating to the conflict, should prepare offline backups to minimize the effects of a potential data-availability-denial attack.
MITRE ATT&CK: [MITRE ATT&CK] Command and Scripting Interpreter - T1059 | [MITRE ATT&CK] Data Encrypted for Impact - T1486 | [MITRE ATT&CK] Obfuscated Files or Information - T1027
Tags: detection:RansomBoggs, detection:Filecoder.Sullivan, malware-type:Ransomware, AES-256, PowerShell, detection:PowerGap, mitre-group:Sandworm Team, actor:Iridium, Russia, source-country:RU, Ukraine, target-country:UA, APT

Aggressive Qakbot Campaign and the Black Basta Ransomware Group Targeting U.S. Companies

(published: November 23, 2022)

Cybereason researchers detected a new Qakbot campaign distributing the Black Basta ransomware. The attackers were targeting companies in the US in a fast-moving fashion, achieving domain administrator privileges in less than two hours and moving to ransomware deployment in less than 12 hours. The infection starts with a phishing email delivering an IMG or an ISO disk image file with a VBS script downloading Qakbot. The attackers proceed to steal credentials and Domain Administration accounts, deploying Cobalt Strike, moving laterally, and globally deploying the Black Basta ransomware.
Analyst Comment: Organizations should invest in comprehensive anti-phishing training. Network defenders are advised to disable auto-mounting of disk image files (such as .IMG, .ISO, .VHD, and .VHDX). Network indicators associated with this campaign are available in the Anomali platform and customers are advised to block these on their infrastructure.
MITRE ATT&CK: [MITRE ATT&CK] Ingress Tool Transfer - T1105 | [MITRE ATT&CK] Data Encrypted for Impact - T1486 | [MITRE ATT&CK] Application Layer Protocol - T1071 | [MITRE ATT&CK] Service Stop - T1489 | [MITRE ATT&CK] Inhibit System Recovery - T1490 | [MITRE ATT&CK] Impair Defenses - T1562 | [MITRE ATT&CK] Credentials from Password Stores - T1555
Tags: detection:QakBot, detection:Qbot, detection:Cobalt Strike, detection:Black Basta, malware-type:Ransomware, file-type:IMG, Windows, Disabling DNS, USA, target-country:US

RansomExx Upgrades to Rust

(published: November 22, 2022)

The double-extortion DefrayX ransomware group (aka Hive0091) has rewritten its C++ RansomExx malware in the Rust programming language. It has allowed the studied RansomExx sample to stay undetected in the VirusTotal platform for at least 2 weeks after its initial submission. This sample detected by IBM researchers is targeting Linux, but the DefrayX group typically releases both Linux and Windows malware versions.
Analyst Comment: Ransomware is an evolving threat, and the most fundamental defense is having proper backup processes in place. Follow the 3-2-1 rule: 3 copies, 2 devices, and 1 stored in a secure location. Data loss is manageable through segmentation, off-line storage, encrypting data at rest, and limiting the storage of personal and sensitive data.
MITRE ATT&CK: [MITRE ATT&CK] Data Encrypted for Impact - T1486 | [MITRE ATT&CK] Obfuscated Files or Information - T1027 | [MITRE ATT&CK] Deobfuscate/Decode Files or Information - T1140
Tags: detection:RansomExx, detection:RansomExx2, detection:EXX, Rust, Linux, malware-type:Ransomware, actor:DefrayX, actor:Hive0091

Yanluowang Ransomware Leaks Analysis: Organization, Collaboration with HelloKitty, Babuk and Conti

(published: November 22, 2022)

Trellix researchers analyzed over 3,000 messages leaked from the Yanluowang ransomware group internal Matrix chat. The group communicates in Russian and appears to be from Russia, despite portraying themselves as Chinese and privately discussing a possibility to plant a Ukrainian false-flag. Yanluowang members include leader and payroll manager Saint, lead developer Killanas (aka coder0) and pen-testers Felix and Shoker. The group appears to be connected to Conti and HelloKitty ransomware groups, use Babuk ransomware code to develop their own Linux crypter and cooperate with LockBit for Bitcoin laundering.
Analyst Comment: Researchers should be extremely mindful of false-flags and other attribution mistakes. Hidden cooperation between multiple ransomware groups allows for quick evolution and adaptability of threat actors.
MITRE ATT&CK: [MITRE ATT&CK] Data Encrypted for Impact - T1486
Tags: detection:Yanluowang, detection:YLW, malware-type:Ransomware, Russia, source-country:RU, Windows, Linux

Google Seeks to Make Cobalt Strike Useless to Attackers

(published: November 21, 2022)

Various threat actors often rely on abusing the Cobalt Strike attack framework. They mostly use leaked and cracked versions that are powerful but can not be upgraded easily. Google researchers analyzed various Cobalt Strike components: the stagers (small shellcode, diskless implants-downloaders), templates, and beacons (final stage implants), including the XOR encodings used by Cobalt Strike. This allowed them to create a collection of 165 Cobalt Strike-specific YARA rules (up to and including Cobalt Strike version 4.7).
Analyst Comment: Despite the growing number of alternatives, Cobalt Strike remains one of the most frequently abused tools. Network defenders are advised to use the Yara rules shared by Google to help with the Cobalt Strike detection.
MITRE ATT&CK: [MITRE ATT&CK] Ingress Tool Transfer - T1105 | [MITRE ATT&CK] Application Layer Protocol - T1071 | [MITRE ATT&CK] Command and Scripting Interpreter - T1059
Tags: detection:Cobalt Strike, Cobalt Strike stager, Cobalt Strike Beacon, Windows, Attack framework

...



๐Ÿ“Œ Black Basta Ransomware Gang Infiltrates networks via QAKBOT, Brute Ratel, and Cobalt Strike


๐Ÿ“ˆ 73.29 Punkte

๐Ÿ“Œ Google releases 165 YARA rules to detect Cobalt Strike attacks


๐Ÿ“ˆ 63.93 Punkte

๐Ÿ“Œ Google Released Over 165 YARA Rules to Detect Cobalt Strike Components in Their Networks


๐Ÿ“ˆ 63.93 Punkte

๐Ÿ“Œ Black Basta Gang Deploys Qakbot Malware in Aggressive Cyber Campaign


๐Ÿ“ˆ 63.07 Punkte

๐Ÿ“Œ Qakbot infection with Cobalt Strike, (Wed, Mar 3rd)


๐Ÿ“ˆ 58.86 Punkte

๐Ÿ“Œ Google Releases YARA Rules to Disrupt Cobalt Strike Abuse


๐Ÿ“ˆ 52.5 Punkte

๐Ÿ“Œ Google provides rules to detect tens of cracked versions of Cobalt Strike


๐Ÿ“ˆ 47.39 Punkte

๐Ÿ“Œ Black Basta Ransomware Operators Expand Their Attack Arsenal With QakBot Trojan and PrintNightmare Exploit


๐Ÿ“ˆ 47.26 Punkte

๐Ÿ“Œ Black Basta Ransomware Hackers Use Qakbot to Deploy Brute Ratel C4


๐Ÿ“ˆ 45.48 Punkte

๐Ÿ“Œ Qakbot Infections Linked to Black Basta Ransomware Campaign


๐Ÿ“ˆ 45.48 Punkte

๐Ÿ“Œ Black Basta Ransomware Gang Actively Infiltrating U.S. Companies with Qakbot Malware


๐Ÿ“ˆ 45.48 Punkte

๐Ÿ“Œ Black Basta Ransomware Hackers Infiltrates Networks via Qakbot to Deploy Brute Ratel C4


๐Ÿ“ˆ 45.48 Punkte

๐Ÿ“Œ Black Basta Ransomware Hackers Infiltrates Networks via Qakbot to Deploy Brute Ratel C4


๐Ÿ“ˆ 45.48 Punkte

๐Ÿ“Œ Black Basta Ransomware Hackers Use Qakbot to Deploy Brute Ratel C4


๐Ÿ“ˆ 45.48 Punkte

๐Ÿ“Œ An aggressive malware campaign targets US-based companies with Qakbot to deliver Black Basta Ransomware


๐Ÿ“ˆ 45.48 Punkte

๐Ÿ“Œ Black Basta Ransomware Gang Infiltrates U.S. Companies via Qakbot Malware


๐Ÿ“ˆ 45.48 Punkte

๐Ÿ“Œ Anomali Cyber Watch:  Klingon RAT Holding on for Dear Life, CVS Medical Records Breach, Black Kingdom Ransomware and More


๐Ÿ“ˆ 43.55 Punkte

๐Ÿ“Œ 'Robocall Strike Force' Proposal Could Stop Caller ID Spoofing


๐Ÿ“ˆ 42.75 Punkte

๐Ÿ“Œ 'Robocall Strike Force' Proposal Could Stop Caller ID Spoofing


๐Ÿ“ˆ 42.75 Punkte

๐Ÿ“Œ Hancitor infection with Pony, Evil Pony, Ursnif, and Cobalt Strike, (Wed, Nov 20th)


๐Ÿ“ˆ 42.56 Punkte

๐Ÿ“Œ Stopping Cobalt Strike with YARA


๐Ÿ“ˆ 42.56 Punkte

๐Ÿ“Œ Examining the Black Basta Ransomwareโ€™s Infection Routine


๐Ÿ“ˆ 42.16 Punkte

๐Ÿ“Œ Anomali Cyber Watch: Cozy Bear TTPs, Darkside Ransomware Shuts Down US Pipeline, Operation TunnelSnake Uses New Moriya Rootkit, and More


๐Ÿ“ˆ 41.43 Punkte

๐Ÿ“Œ Emotet infection with Cobalt Strike, (Thu, Jul 7th)


๐Ÿ“ˆ 40.78 Punkte

๐Ÿ“Œ Anomali Cyber Watch: Costa Rica in Ransomware Emergency, Charming Kitten Spy and Ransom, Saitama Backdoor Hides by Sleeping, and More


๐Ÿ“ˆ 40.29 Punkte











matomo