Cisco Talos Archives – Gridinsoft Blog Welcome to the Gridinsoft Blog, where we share posts about security solutions to keep you, your family and business safe. Tue, 03 Jan 2023 11:14:58 +0000 en-US hourly 1 https://wordpress.org/?v=94045 200474804 Hackers Use Excel Add-Ins as Initial Penetration Vector https://gridinsoft.com/blogs/hackers-use-excel-add-ins/ https://gridinsoft.com/blogs/hackers-use-excel-add-ins/#respond Tue, 03 Jan 2023 11:14:58 +0000 https://gridinsoft.com/blogs/?p=13022 Cisco Talos analysts say that hackers are now using Excel add-ins to infiltrate victims’ systems and networks. After Microsoft began blocking VBA macros in Office documents downloaded from the Internet (marked as Mark Of The Web), attackers had to rethink their attack chains: for example, now hackers are increasingly using Excel add-in files (.XLL) as… Continue reading Hackers Use Excel Add-Ins as Initial Penetration Vector

The post Hackers Use Excel Add-Ins as Initial Penetration Vector appeared first on Gridinsoft Blog.

]]>

Cisco Talos analysts say that hackers are now using Excel add-ins to infiltrate victims’ systems and networks.

After Microsoft began blocking VBA macros in Office documents downloaded from the Internet (marked as Mark Of The Web), attackers had to rethink their attack chains: for example, now hackers are increasingly using Excel add-in files (.XLL) as an initial compromise vector.

According to experts, Office documents distributed using phishing emails and other social engineering remain one of the most popular attack vectors for attackers. Such documents traditionally suggest that victims enable macros to view supposedly harmless content, but in fact activate hidden malware execution in the background.

To address these abuses, earlier this year, Microsoft began blocking VBA macros in Office documents downloaded from the Internet. Although the company admitted that they received negative feedback from users because of this and were even forced to temporarily reverse this decision, as a result, the blocking of VBA macros was still continued.

We also wrote that Hackers use the .NET library for creating malicious Excel files, and also that Weak Block Cipher in Microsoft Office 365 Leads to Message Content Disclosure.

Despite the fact that the blocking only applies to the latest versions of Access, Excel, PowerPoint, Visio, and Word, attackers have begun experimenting with alternative ways to infect and deploy malware. One such “innovation” is the use of XLL files, which Microsoft describes as “a kind of DLL file that can only be opened in Excel,” the researchers report.

XLL files can be sent via email, and even with normal malware scanning mechanisms in place, users can open them without knowing that such files may contain malicious code.writes Cisco Talos.

Hackers use Excel add-ins

Although Excel warns about the potential dangers of XLLs, these warnings are usually overlooked by users.

According to experts, hackers combine add-ons written in C++ with add-ons developed using the free tool Excel-DNA. And if the first such experiments of hackers were noticed a few years ago, then in 2021-2022 such attacks began to develop much more actively.

Hackers use Excel add-ins

The researchers write that the Chinese hack groups APT10 and TA410 (and they started back in 2017), the Russian-speaking group FIN7, which began using add-on files in their campaigns last summer, famous Dridex malware loader and FormBook loader; as well as other major malware families, including AgentTesla, Ransomware Stop, Vidar, Buer Loader, Nanocore, IceID, Arkei, AsyncRat, BazarLoader, and so on are already abusing XLL.

Hackers use Excel add-ins

As more and more users migrate to new versions of Microsoft Office, it is likely that in the future hackers will move away from malicious VBA documents and move to other formats (such as XLL), or rely on exploiting newly discovered vulnerabilities to run malicious code. in the Office application space.the analysts summarize.

The post Hackers Use Excel Add-Ins as Initial Penetration Vector appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/hackers-use-excel-add-ins/feed/ 0 13022
New Version of Truebot Exploits Vulnerabilities in Netwrix Auditor and Raspberry Robin Worm https://gridinsoft.com/blogs/new-version-of-truebot/ https://gridinsoft.com/blogs/new-version-of-truebot/#respond Wed, 14 Dec 2022 12:36:56 +0000 https://gridinsoft.com/blogs/?p=12608 Information security experts warned of an increase in the number of infections with the new version of TrueBot, primarily targeting users from Mexico, Brazil, Pakistan and the United States. According to Cisco Talos, malware operators have now moved from using malicious emails to alternative delivery methods, including exploiting an RCE vulnerability in Netwrix Auditor, as… Continue reading New Version of Truebot Exploits Vulnerabilities in Netwrix Auditor and Raspberry Robin Worm

The post New Version of Truebot Exploits Vulnerabilities in Netwrix Auditor and Raspberry Robin Worm appeared first on Gridinsoft Blog.

]]>

Information security experts warned of an increase in the number of infections with the new version of TrueBot, primarily targeting users from Mexico, Brazil, Pakistan and the United States.

According to Cisco Talos, malware operators have now moved from using malicious emails to alternative delivery methods, including exploiting an RCE vulnerability in Netwrix Auditor, as well as using the Raspberry Robin worm.

Let me remind you that experts attribute the authorship of TrueBot to the Russian-speaking hack group Silence, which is known due to the major robberies of financial institutions.

As reported now, the attackers not only switched to new methods of delivering malware, but also began to use the custom tool Teleport to steal data, and also distribute the Clop encryptor, which is usually used by hackers from the TA505 group associated with another Russian-speaking hack group – FIN11.

Cisco Talos researchers write that they discovered several new attack vectors back in August 2022. According to their observations, Silence participants introduced their malware into 1500 systems around the world, “bringing with them” shellcodes, Cobalt Strike beacons, Grace malware, Teleport data theft tool and Clop ransomware.

It is noted that in most of the attacks detected during the period from August to September, hackers infected the systems of victims of Truebot (Silence.Downloader) using the critical vulnerability of Netwrix Auditor servers, tracked as CVE-2022-31199.

In October 2022, hackers completely switched to using malicious USB drives and the Raspberry Robin worm, which delivered IcedID, Bumblebee, and Truebot payloads to victims’ machines.

Let me remind you that in the October Microsoft report, this worm was associated with the spread of the Clop ransomware and the DEV-0950 hack group, whose malicious activity is associated with the activity of the FIN11 and TA505 groups.

As Cisco Talos now notes, Truebot operators used Raspberry Robin to infect more than 1,000 hosts, many of which were not accessible via the Internet. Most of the victims of hackers are in Mexico, Brazil and Pakistan.

New version of Truebot

In November, hackers targeted Windows servers, whose SMB, RDP, and WinRM services can be found over the Internet. The researchers counted more than 500 cases of such infections, about 75% of them in the United States.

Analysts remind that in fact Truebot is a first-level module that collects basic information about the victim’s system and takes screenshots. It also extracts information about Active Directory, which helps hackers plan their next steps after an infection.

New version of Truebot

The attacker’s command and control server can then instruct Truebot to load shellcode or DLLs into memory, execute additional modules, remove itself, or load DLLs, EXEs, BATs, and PS1 files.

Also, after being compromised, hackers use Truebot to inject Cobalt Strike beacons or Grace malware (FlawedGrace, GraceWire) into victim systems. The attackers then deploy Teleport, which Cisco describes as a new custom tool written in C++ that helps to steal data silently.

The communication channel between Teleport and the C&C server is encrypted. Operators can limit download speeds, filter files by size (to steal more), or remove payloads. Teleport is also capable of stealing files from OneDrive folders, collecting victim mail from Outlook, and looking for specific file extensions.

New version of Truebot

It is noted that after lateral movement, infection of the maximum number of systems using Cobalt Strike and data theft, in some cases hackers deploy the Clop ransomware already mentioned above in the systems of victims.

New version of Truebot

During the exploration and lateral movement phase, the attackers browsed key server and desktop file systems, connected to SQL databases and collected data, which they then transferred to a remote server using the Teleport tool. Once enough data was collected, the attackers created scheduled tasks on a large number of systems in order to simultaneously run Clop ransomware on them and encrypt as much data as possible.the researchers explain.

The post New Version of Truebot Exploits Vulnerabilities in Netwrix Auditor and Raspberry Robin Worm appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/new-version-of-truebot/feed/ 0 12608
Gamaredon Hack Group Uses New Malware to Attack Ukrainian Organizations https://gridinsoft.com/blogs/gamaredon-hack-group/ https://gridinsoft.com/blogs/gamaredon-hack-group/#respond Mon, 19 Sep 2022 08:07:15 +0000 https://gridinsoft.com/blogs/?p=10645 Cisco Talos analysts write that the Russian-speaking hack group Gamaredon (aka Primitive Bear, Shuckworm, IronTiden and Callisto) is attacking Ukrainian organizations with the help of a new infostealer. The targets of this campaign are employees of the Ukrainian state, defense and law enforcement agencies. Let me remind you that we also wrote that Hacker groups… Continue reading Gamaredon Hack Group Uses New Malware to Attack Ukrainian Organizations

The post Gamaredon Hack Group Uses New Malware to Attack Ukrainian Organizations appeared first on Gridinsoft Blog.

]]>
Cisco Talos analysts write that the Russian-speaking hack group Gamaredon (aka Primitive Bear, Shuckworm, IronTiden and Callisto) is attacking Ukrainian organizations with the help of a new infostealer. The targets of this campaign are employees of the Ukrainian state, defense and law enforcement agencies.

Let me remind you that we also wrote that Hacker groups split up: some of them support Russia, others Ukraine, and that TrickBot Hack Group Systematically Attacks Ukraine.

Experts remind that the Gamaredon group is known for using only proprietary tools in its campaigns, including malicious scripts, backdoors and infostealers.

As part of the new campaign, which began in August 2022 and is still active, hackers began to use a new information theft tool that is able to extract certain types of files from victims’ computers, as well as deploy additional payloads.

This is a new infostealer that Gamaredon has not used before. We suspect this is a new member of the Giddome backdoor family, but cannot currently confirm this.writes Cisco Talos.

The new malware has not yet received its own name, but it is known that it has clear instructions for stealing files with the following extensions: .doc, .docx, .xls, .rtf, .odt, .txt, .jpg, . jpeg, .pdf, .ps1, .rar, .zip, .7z and .mdb. The new Gamaredon stealer can steal files from connected devices (local and remote) by creating a POST request for each stolen file with metadata and its contents.

Gamaredon Hack Group

Experts say that this infostealer is spread via phishing emails containing Microsoft Office documents with malicious VBS macros. The VBS code is hidden in remote templates and is executed when the document is opened, after which it loads the RAR archive with LNK files.

Gamaredon Hack Group

LNK files are designed to run mshta.exe to download and parse a remote XML file that executes a malicious PowerShell script that Gamaredon has previously used in its spy campaigns.

Another PowerShell script is loaded and executed to collect data about the infected system (computer name, VSN, base64 encoded screenshot) and then send this information to a remote server.

The post Gamaredon Hack Group Uses New Malware to Attack Ukrainian Organizations appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/gamaredon-hack-group/feed/ 0 10645
North Korean Group Lazarus Attacks Energy Companies https://gridinsoft.com/blogs/north-korean-group-lazarus/ https://gridinsoft.com/blogs/north-korean-group-lazarus/#comments Mon, 12 Sep 2022 08:15:33 +0000 https://gridinsoft.com/blogs/?p=10521 A new malware campaign by the North Korean hacker group Lazarus has been discovered, which was active from February to July 2022. This time the hackers have targeted energy suppliers around the world, including companies in the US, Canada and Japan. Let me remind you that we also reported that Microsoft accused Russia and North… Continue reading North Korean Group Lazarus Attacks Energy Companies

The post North Korean Group Lazarus Attacks Energy Companies appeared first on Gridinsoft Blog.

]]>
A new malware campaign by the North Korean hacker group Lazarus has been discovered, which was active from February to July 2022. This time the hackers have targeted energy suppliers around the world, including companies in the US, Canada and Japan.

Let me remind you that we also reported that Microsoft accused Russia and North Korea of attacks on pharmaceutical companies, and also that Cybersecurity researchers discovered the Chinese hack group Earth Lusca.

Cisco Talos experts talk about the new campaign, according to which, the goal of Lazarus was “to infiltrate organizations around the world to establish long-term access and subsequent theft of data of interest to the enemy state.”

Whereas earlier Lazarus attacks resulted in the use of Preft (Dtrack) and NukeSped (Manuscrypt) malware, the new campaign was notable for the use of a number of other malware: the VSingle HTTP bot, which executes arbitrary code on a remote network; YamaBot backdoor written in Go; as well as the previously unknown Remote Access Trojan (RAT) MagicRAT, which has been used to find and steal data from infected devices, but can also be used to launch additional payloads on infected systems.

It is worth saying that Symantec and AhnLab analysts have already written about this activity of Lazarus, but the latest Cisco report turned out to be more in-depth and reveals much more details about the activities of hackers.

It is known that Lazarus obtained initial access to the corporate networks of its victims by exploiting vulnerabilities in VMware products (for example, Log4Shell). These problems have been used to run shellcode, create reverse shells, and execute arbitrary commands on a compromised machine.

Although the same tactics were used in the attacks, the resulting malware deployed was different from each other, indicating a wide variety of implants at the disposal of Lazarus.the researchers say.

North Korean Group Lazarus

Thus, the use of VSingle malware in one of the attacks allowed the attackers to perform various actions, including reconnaissance, data theft, and manual installation of backdoors, which gave them a clear understanding of the victim’s environment. In essence, this malware sets the stage for credential theft, creates new admin users on the host, and installs a reverse shell to communicate with the command and control server and download plugins that extend its functionality.

North Korean Group Lazarus

In another case, after gaining initial access and conducting reconnaissance, the hackers used not only VSingle, but also MagicRAT, to which the researchers paid special attention and devoted a separate post.

The Trojan is able to fix itself in the victim’s system by executing hard-coded commands and creating scheduled tasks, conduct reconnaissance and extract additional malware from the command-and-control server (such as TigerRAT).

In the third case, Lazarus deployed the YamaBot malware to the affected systems, written in Go and having standard RAT features:

  1. listing files and directories;
  2. transferring information about processes to the control server;
  3. downloading remote files;
  4. execution of arbitrary commands and self-destruction.

It is also noted that the group often used not only its own tools, but also collected credentials in the victim’s networks using such well-known solutions as Mimikatz and Procdump, disabled anti-virus components and Active Directory services, and also took measures to cover up traces after backdoors were activated.

The post North Korean Group Lazarus Attacks Energy Companies appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/north-korean-group-lazarus/feed/ 1 10521
A special version of Flash for China turned into adware https://gridinsoft.com/blogs/flash-for-china-turned-into-adware/ https://gridinsoft.com/blogs/flash-for-china-turned-into-adware/#respond Wed, 24 Feb 2021 16:07:02 +0000 https://blog.gridinsoft.com/?p=5150 Many users and cybersecurity specialists have discovered that a special version of Flash for China has turned into adware. As you know, at the beginning of 2021, support for Adobe Flash Player was finally discontinued. A special self-destructing code was pre-built into the software code, and starting from January 12, 2021, Adobe blocks the launch… Continue reading A special version of Flash for China turned into adware

The post A special version of Flash for China turned into adware appeared first on Gridinsoft Blog.

]]>
Many users and cybersecurity specialists have discovered that a special version of Flash for China has turned into adware.

As you know, at the beginning of 2021, support for Adobe Flash Player was finally discontinued. A special self-destructing code was pre-built into the software code, and starting from January 12, 2021, Adobe blocks the launch of any Flash content.

However, in China, Adobe has allowed local Zhong Cheng Network to continue Flash support, as it is still an important part of the local IT ecosystem and is widely used in both the public and private sectors. For example, at the beginning of the year, due to the termination of support for Flash, Chinese railway workers faced serious problems.

A special Chinese version of Flash is distributed through the flash[.]сn website and Minerva Labs recently discovered that it is insecure.

It is important to mention that the file is signed by “Zhong Cheng Network” which is a distributor of Adobe’s software in China. The binary contains an embedded DLL encrypted inside its data section, which is reflectively loaded and executed.Minerva Labs specialists report.

According to the researchers, in addition to Flash itself, other payloads also penetrate users’ machines. In particular, the application downloaded and launched the nt.dll file inside the FlashHelperService.exe process, which opens a new browser window at regular intervals and shows various sites with a lot of ads and pop-ups.

Special version of Flash for China

The suspicious behavior of this process was also noticed by Cisco Talos analysts, who noted that FlashHelperService.exe became one of the leading threats in January, and then in February.

Users noticed this problem too. Numerous complaints can already be found on the Adobe Support Forum, local blogs, and more.

Most enterprises with a Chinese office had this service installed in their organizational network. If this framework was used with a malicious intent, an attacker will have an initial foothold in many organizations.Minerva Labs researchers wrote.

Let me remind you that the Authorities of South Africa create their own browser to continue to use Flash.

The post A special version of Flash for China turned into adware appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/flash-for-china-turned-into-adware/feed/ 0 5150
Prometei botnet uses SMB for distribution https://gridinsoft.com/blogs/prometei-botnet-uses-smb-for-distribution/ https://gridinsoft.com/blogs/prometei-botnet-uses-smb-for-distribution/#respond Thu, 23 Jul 2020 16:32:14 +0000 https://blog.gridinsoft.com/?p=4095 Cisco Talos has discovered a new botnet, Prometei, which was active since March 2020 and focused on mining the Monero (XMR) cryptocurrency. The researchers note that the Prometei botnet intensively uses the SMB protocol for distribution. The malware mainly attacks users from the USA, Brazil, Pakistan, China, Mexico and Chile. During four months of activity,… Continue reading Prometei botnet uses SMB for distribution

The post Prometei botnet uses SMB for distribution appeared first on Gridinsoft Blog.

]]>
Cisco Talos has discovered a new botnet, Prometei, which was active since March 2020 and focused on mining the Monero (XMR) cryptocurrency. The researchers note that the Prometei botnet intensively uses the SMB protocol for distribution.

The malware mainly attacks users from the USA, Brazil, Pakistan, China, Mexico and Chile. During four months of activity, the botnet operators “earned” about $5,000, that is, an average of about $1,250 per month.

Do you know who else is focused on mining Monero and manipulates a variety of exploits? Lucifer! (don’t be alarmed – this is such malware)

“The malware uses several techniques for distribution, including LOLbins (living off the land) to use legitimate Windows processes to execute malicious code (including PsExec and WMI), SMB exploits (including EternalBlue), and stolen credentials”, – write Cisco Talos experts.

In total, the researchers counted more than 15 ingredients in Prometei. All of them are controlled by the main module, which encrypts (RC4) the data before sending it to the management server via HTTP.

Prometei botnet uses SMB

Auxiliary modules can be used to establish communication over Tor or I2P, collect system information, check open ports, spread via SMB, and scan the infected system for any cryptocurrency wallets.

For example, a botnet steals passwords using a modified version of Mimikatz (miwalk.exe), and then passwords are passed to the spreader module (rdpclip.exe) for analysis and authentication via SMB. If that doesn’t work, the EternalBlue exploit is used for propagation.

The final payload delivered to the compromised system is SearchIndexer.exe, which is simply an XMRig version 5.5.3.

However, experts write that Prometei is not just a miner, the malware can also be used as a full-fledged Trojan and info-stealer.

“The botnet is split into two main branches: the C ++ branch is dedicated to cryptocurrency mining operations, and the .NET-based branch focuses on credential theft, SMB attacks and obfuscation. At the same time, the main branch can work independently from the second one, since it can independently communicate with the control server, steal credentials and engage in mining”, – say the researchers.

Cisco Talos experts point out that Prometei is unlike most mining botnets. Its authors not only divided their tools according to their purpose, it also “taught” malware to avoid detection and analysis. In particular, even in earlier versions, you can find several layers of obfuscation, which have become much more difficult in later versions.

The post Prometei botnet uses SMB for distribution appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/prometei-botnet-uses-smb-for-distribution/feed/ 0 4095