Weekly Intelligence Report – 11 Aug 2023

Published On : 2023-08-11
Share :
Weekly Intelligence Report – 11 Aug 2023

Ransomware of the Week

CYFIRMA Research and Advisory Team would like to highlight ransomware trends and insights gathered while monitoring various forums. This includes multiple – industries, geography, and technology – which could be relevant to your organization.

Type: Ransomware.
Target Technologies: MS Windows.

Introduction
CYFIRMA Research and Advisory Team has found a new DoDo ransomware while monitoring various underground forums as part of our Threat Discovery Process.

Relevancy: This ransomware predominantly targets the widely used Windows Operating System, which is prevalent across numerous industries and organizations.

DoDo ransomware:
The DoDo ransomware is believed to have possibly originated from Chaos Ransomware. A new version of the DoDo ransomware has recently emerged.

The ransomware samples bear the “Mercurial Grabber” file icon, suggesting probable distribution through this method. Mercurial Grabber is an open-source malware builder capable of generating an infostealer configured to pilfer Discord tokens, machine data, Windows product keys, and Chrome passwords from victims’ machines.

Threat actors have been actively leveraging this builder to target victims and extract information using its built-in functionalities.

File icon of the DoDo ransomware samples(Source: Surface Web)

The latest DoDo ransomware samples have been submitted to a public file scanning service from the following countries: France, Germany, India, China, the United Kingdom, and Peru. There is a possibility of victims from these geographies.

Countries that submitted new DoDo Ransomware samples.

The masquerading of free apps and tools remains a longstanding and effective tactic used by cybercriminals. In this case, the DoDo ransomware disguises itself as the Mercurial Grabber application, potentially targeting malicious attackers or curious users. The surprising abundance of submission sources suggests worldwide users have unknowingly downloaded the fake builder.

While the newer and older DoDo variants have slight differences in their ransom notes and file extensions for encrypted files, they share two common traits, all DoDo ransomware samples were created using Chaos Builder version 3, and they employ the same Bitcoin address for ransom payments. The drawback of Chaos Builder 3 is that it can only encrypt files smaller than 1 MB, rendering larger files unrecoverable unless backups are available. Consequently, for larger files, DoDo functions more like a wiper, as full file recovery becomes impossible even if the ransom is paid.

The older DoDo variants included a ransom note labelled “dodov2_readit.txt” and appended a “.dodov2” extension to encrypted files. In contrast, recent DoDo samples drop a ransom note named “PLEASEREAD.txt,” apply a “.crypterdodo” extension to encrypted files and replace the desktop wallpaper with the same ransom message. Additionally, the attacker has provided a contact email address, potentially for better “customer” service.

Ransom note dropped by the older DoDo ransomware variants(Source: Surface Web)

Files encrypted by the older DoDo ransomware samples. (Source: Surface Web)

Ransom note dropped by the recent DoDo ransomware samples. (Source: Surface Web)

Files encrypted by the recent DoDo ransomware samples. (Source: Surface Web)

Desktop wallpaper replaced by the recent DoDo ransomware samples. (Source: Surface Web)

Insights :

  • Detect-Debug-Environment: Debugging environments are used by developers to analyze and troubleshoot software. Ransomware that can detect debug environments may have implemented techniques to evade or disable debugging tools.
  • Obfuscation is a common behaviour exhibited by ransomware to hide its malicious code, making it challenging for security solutions to detect and analyze. By obfuscating their code, ransomware developers aim to evade detection and increase their chances of successfully infecting systems.
  • There are no leak sites for this group, if the victims don’t pay the ransom the attackers may also attempt to sell the stolen data on underground forums or use it for other malicious purposes.
  • It’s crucial to highlight that altering the file icon is a straightforward task. In essence, this enables it to mimic various other applications, a fact that all users should remain mindful of when obtaining and utilizing third-party apps from the internet.

Following are the TTPs based on MITRE Attack Framework.

Sr. No Tactics Techniques/Sub-Techniques
1 TA0002: Execution T1047: Windows Management Instrumentation
T1106: Native API
T1129: Shared Modules
2 TA0003: Persistence T1547.001: Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
3 TA0004: Privilege Escalation T1547.001: Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
4 TA0005: Defense Evasion T1027: Obfuscated Files or Information
T1036: Masquerading
T1070.004: Indicator Removal: File Deletion
T1140: Deobfuscate/Decode Files or Information
T1222: File and Directory Permissions Modification
T1497.001: Virtualization/Sandbox Evasion: System Checks
5 TA0007: Discovery T1012: Query Registry
T1033: System Owner/User Discovery
T1057: Process Discovery
T1083: File and Directory Discovery
T1087: Account Discovery
T1497.001: Virtualization/Sandbox Evasion: System Checks
T1518: Software Discovery
6 TA0009: Collection T1005: Data from Local System
T1115: Clipboard Data
T1119: Automated Collection
T1560: Archive Collected Data
7 TA0011: Command and Control T1071: Application Layer Protocol
T1071.001: Application Layer Protocol: Web Protocols
8 TA0040: Impact T1486: Data Encrypted for Impact
T1490: Inhibit System Recovery
T1491: Defacement

Sigma Rule:
title: Drops script at startup location
logsource:
service: sysmon
product: windows
detection:
selection:
EventID: 11
TargetFilename:
– ‘*\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\\*.vbs*’
– ‘*\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\\*.js*’
– ‘*\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\\*.jse*’
– ‘*\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\\*.bat*’
– ‘*\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\\*.url*’
– ‘*\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\\*.cmd*’
– ‘*\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\\*.hta*’
– ‘*\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\\*.ps1*’
– ‘*\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\\*.wsf*’
condition: selection
level: critical

(Source: Surface Web)

Indicators of Compromise
Kindly refer to the IOCs section to exercise controls on your security systems.

STRATEGIC RECOMMENDATION

  • Implement competent security protocols and encryption, authentication, or access credentials configurations to access critical systems in your cloud and local environments.
  • Ensure that backups of critical systems are maintained which can be used to restore data in case a need arises.

MANAGEMENT RECOMMENDATION

  • A data breach prevention plan must be developed considering, (a) the type of data being managed by the company; (b) the remediation process; (c) where and how the data is stored; (d) if there is an obligation to notify the local authority.
  • Enable zero-trust architecture and multifactor authentication (MFA) to mitigate the compromise of credentials.
  • Foster a culture of cybersecurity, where you encourage and invest in employee training so that security is an integral part of your organization.

TACTICAL RECOMMENDATION

  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defence based on the tactical intelligence provided.
  • Update all applications/software regularly with the latest versions and security patches alike.
  • Add the Sigma rules for threat detection and monitoring which will help to detect anomalies in log events, identify and monitor suspicious activities.

Trending Malware of the Week

Type: Crypto-Mining Botnet
Objective: Crypto Mining
Target Technology: Linux distributions

Active Malware of the Week
This week “SkidMap” is trending.

SkidMap
Researchers recently discovered a new version of the SkidMap malware is being employed in a fresh campaign that focuses on multiple Linux distributions, such as Alibaba, Anolis, openEuler, EulerOS, Steam, CentOS, RedHat, and Rock. This latest variant of the malware stands out as a significantly enhanced and more dangerous version. Originally identified in September 2019 as a botnet for cryptocurrency mining, the malware has undergone developments, incorporating malicious kernel modules in order to avoid being detected.

Infection Process

  • The attack chain begins with attackers logging into unsecured Redis instances via brute force attacks and setting up variables containing cron tasks under a base64 string.
  • Once the poorly secured Redis server instances are breached, a dropper shell script is deployed to distribute an ELF binary hidden inside a GIF image file.
  • The binary then adds SSH keys to the “/root/.ssh/authoried_keys” file to disable SELinux and establish a reverse shell to connect with the attacker-controlled server every 60 minutes.
  • Based on the Linux distribution targeted and the kernel used, an appropriate package (gold, stream, euler) is downloaded from the C2 server.

Attack Strategy
The attack begins by trying to access an unprotected Redis instance and establishing variables with hidden cron tasks encoded in base64. The cron tasks are designed to download and execute a dropper script (‘b’) using either ‘curl’ or ‘wget’. The cron job runs every 10 minutes to ensure persistence and continued malicious activity. The name ‘HA’ suggests a potential focus on high availability clusters, a technique observed in other Redis malware campaigns.

OS Stage Infection
The dropper script (‘b’) downloaded in the Redis stage aims to infect the host operating system. The script’s main goal is to download a binary executable file (ELF) named ‘gif’ to the ‘/var/lib/’ directory. The script ensures that the backdoor file is in the correct location and matches the expected signature. If the file is incorrect, the script removes the file protection and deletes it to make space for the correct version. The malware adapts its file names, changing from ‘jpeg’ to ‘gif’ in different versions.

Encrypted Packages
After successful deployment, the ‘gif’ executable downloads encrypted packages (‘gold’, ‘stream’, ‘euler’) to a specific directory. The malware decodes these packages and initiates the execution of shell scripts, installation of kernel modules, and placement of other executable binaries. The process includes cleaning logs to cover its tracks using shell scripts. Different passwords are used to decrypt specific packages, adding a layer of complexity to the attack.

Bot Stage
The ‘bot’ ELF executable is a key component of the malware. Upon execution, the ‘bot’ downloads additional files required for the infection process. In the case of the Debian/Ubuntu variant, connections to official resources, such as Canonical, are observed for file downloads. The ‘bot’ employs a multi-layered structure, embedding various binary files within each other. Obfuscation techniques, like fixing malformed UPX headers, are used to hinder analysis. The binary files contain embedded kernel modules, including rootkits with distinct purposes.

The malware involves the deployment of various kernel modules to manipulate and control the host operating system.

Module – mcpuinfo.ko
This module is a critical component of the malware and carries out advanced functions that significantly impact the host OS. The module’s purpose is to deceive and hide the true system load by modifying the behavior of the ‘fake_loading_proc_show’ function. By displaying common and unsuspecting values, it aims to mask the activity of cryptocurrency mining (Miner activity). Some functions within the module are intended for local program use, while others are export functions accessible to other malware components.

Module – kmeminfo.ko
This module is responsible for monitoring network activity using Netfilter hooks. It employs the ‘nf_register_net_hook’ function within the Netfilter framework, which allows the malware to analyze, modify, or drop network packets. Netfilter is crucial for networking-related operations and is utilized by tools like iptables for network packet filtering and manipulation.

Kernel Module – mzoneinfo.ko (?)
There are indications of another potential module named ‘mzoneinfo.ko,’ although its corresponding binary was not found during analysis. This module could have been utilized in previous attacks and might be used in future attacks. The malware’s structure suggests that some components might not have been properly updated. It is important to note that mzoneinfo.ko isn’t a part of any official kernel module.

Miner – Debian/Ubuntu Linux Family Variant
The Miner binary is downloaded to the ‘/tmp/.miner’ directory (or ‘.mimer’ in another variant) and executed from there, spawning hidden processes. The binary’s integrity is verified using MD5 checksums at different steps to ensure it’s not tampered with. These hidden processes, spawned after the execution of the ‘gif’ binary in the ‘/var/lib’ directory, are concealed from system commands like ‘ps,’ ‘pstree,’ and ‘top.’

Miner – RedHat/CentOS Linux Family Variant
This variant avoids downloading a separate miner binary by utilizing the built-in miner from an extracted ‘gif’ binary file. In this case the ‘/tmp/.miner’ will not exist. The malware aims to remain hidden by blocking the execution of a popular forensic tool called ‘unhide,’ making detection more challenging. The malware persists in memory using a spawn-execute-remove mechanism to evade scanners and researchers. Attackers use encrypted packages, like ‘gold8,’ to deliver miners to the system. The malware persists in memory using a similar spawn-execute-remove technique for concealment and evasion.

Miner’s Networking
The specifics of the communication patterns and issues with the Miner’s networking are not fully clear in the analysis. Despite this, the miner successfully establishes a connection to a mining pool after some time following the initial infection.

INSIGHTS

  • Over time, SkidMap has become a more dangerous and clever type of malware. Researchers looked into attacks on Redis instances because it’s becoming more popular. This new SkidMap version is much better and scarier, surprising researchers with how smart it is. It can target specific types of Linux systems like Debian/Ubuntu and RedHat/CentOS, using different methods for each, which makes its attack method more tailored and effective.
  • SkidMap demonstrates the continuous evolution of malware, adapting to its environment and developing new methods to evade detection. Its focus on cryptocurrencies as a source of profit and its ability to target specific Linux distributions highlight the increasing sophistication of cybercriminals’ strategies.
  • Linux systems are becoming more frequent targets of cyberattacks. An advanced rootkit called Reptile was recently identified by researchers, allowing attackers to quickly access compromised systems using a reverse shell feature. Additionally, the Chinese APT31 hacking group deployed the Rekoobe backdoor malware to target domestic companies via Linux systems. These incidents underscore the growing need for enhanced security measures to safeguard Linux environments from evolving threats.

Indicators of Compromise
Kindly refer to the IOCs Section to exercise controls on your security systems.

STRATEGIC RECOMMENDATION

  • Deploy an Extended Detection and Response (XDR) solution as part of the organization’s layered security strategy that provides detection/prevention for malware and malicious activities that do not rely on signature-based detection methods.
  • Configure organization’s intrusion detection systems (IDS), intrusion prevention systems (IPS), or any network defence mechanisms in place to alert on — and upon review, consider blocking connection attempts to and from — the external IP addresses and domains listed in the appendix.
  • Maintain an up-to-date inventory of all active software used within the organization and perform regular self-audit of workstations, servers, laptops, mobile devices to identify unauthorized/ restricted software.

MANAGEMENT RECOMMENDATION

  • Strengthen boundary defence such as network segmentation and have a strong access management capability in line with the Principle of Least Privilege (POLP) that can assist in mitigating cyberattacks.
  • Implement real-time website monitoring to analyse network traffic going in and out of the website to detect malicious behaviours.
  • Ensure compromised systems are disconnected from the network and powered down as soon as possible.
  • Enable zero-trust architecture and multifactor authentication (MFA) to mitigate compromise of credentials.

TACTICAL RECOMMENDATION

  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defence based on the tactical intelligence provided.
  • Enable network protection to prevent applications or users from accessing malicious domains and other malicious content on the internet.
  • Place all websites behind web application firewall.
  • Enable Network traffic/security monitoring, security incident detection, notification, and alerting by leveraging SIEM solutions.

Weekly Intelligence Trends/Advisory

Weekly Attack Type and Trends

Key Intelligence Signals:

  • Attack Type: Malware Implants, Ransomware Attacks, Vulnerabilities & Exploits, DDoS, Data Leaks.
  • Objective: Unauthorized Access, Data Theft, Data Encryption, Financial Gain. Espionage.
  • Business Impact: Data Loss, Financial Loss, Reputational Damage, Loss of Intellectual Property, Operational Disruption.
  • Ransomware –BlackCat Ransomware | Malware – SkidMap
  • BlackCat Ransomware – One of the ransomware groups.
  • Please refer to the trending malware advisory for details on the following:
  • Malware – SkidMap
  • Behavior –Most of this malware uses phishing and social engineering techniques as its initial attack vector. Apart from these techniques, exploitation of vulnerabilities, defence evasion, and persistence tactics are being observed.

Threat Actor in Focus

Unknown Threat Actor Breaches into UK’s Electoral Commission System

  • Threat Actors: Unknown
  • Target Technology: Windows
  • Target Geographies: UK
  • Target Industries: Government
  • Business Impact: Operational Disruption

Summary:
In a recent observation, an unknown threat actor made unauthorized access into UK’s electoral commission’s system. The UK’s Electoral Commission disclosed a complex cyber-attack that compromised the personal details of millions of British voters. However, the Commission didn’t disclose technical details and attack type. Initially detected in October 2022, the attack was traced back to server access in August 2021. Personal information was compromised from reference copies of electoral registers, utilized for research and donation checks, affecting those registered to vote in the UK between 2014 and 2022, including names, home addresses, and some overseas voters’ details. Anonymous registrations remained unaffected. The Commission confirmed that the breach wouldn’t impact election security, voter registration, or democratic processes, reducing concerns about potential interference in the upcoming 2024 UK General Election. The breach also exposed the Commission’s email system, revealing further sensitive data like email addresses, phone numbers, and personal images shared with the Commission. Although the breached information was considered low risk for individuals, the Commission adhered to UK General Data Protection Regulation, making the public notified through a notification on the 8th of August on their website. While apologizing to those affected, the Commission collaborated with security experts to investigate the attack and reinforce its systems against future breaches. At present, the culprits behind the breach remain unidentified, leaving questions about their motives and potential consequences.

Insights:
The perpetrators behind the attack remain undisclosed, and the Commission clarified that no entities or persons have asserted accountability for the breach. Although, an eventual cyberattack on the UK electoral register was expected, what raises greater concern is the fact that the breach went undetected for more than a year.

Indicators of Compromise
Kindly refer to the IOCs (Indicators of Compromise) Section to exercise controls on your security systems.

Major Geopolitical Developments in Cybersecurity

North Korean cyberespionage against Russian aerospace industry
According to a recently published research, North Korean hackers have successfully penetrated Russian aerospace bureau; NPO Mashinostroyenia, working on rocket designs in Moscow. The news came just shortly after the Russian minister of defense; Sergey Shoigu was welcomed with a bombastic reception in Pyongyang, wherever closer cooperation of the two increasingly isolated countries has been presented to the world. North Korea is among the very few countries that is openly supporting Russia in its war against Ukraine, including deliveries of artillery shells to the Russian military.

Researchers found two instances of a North Korean compromise of the company, one being a compromise on an email server, with the second involving a Windows backdoor called “OpenCarrot,” which has been historically associated with the Lazarus Group. The hack serves as evidence of North Korean determination to advance its missile development program, even off the back of its notional ally, probably counting on Moscow considering North Korean material support too important for taking corresponding measures in return.

Older penetration of Japan’s defense networks by Chinese hackers revealed
Media have recently brought information about a major 2020 Chinese penetration of classified Japanese defense networks. According to the reports, the hackers have obtained “deep, persistent access and appeared to be after anything they could get their hands on — plans, capabilities, assessments of military shortcomings, according to three former senior U.S. officials, who were among a dozen current and former U.S. and Japanese officials interviewed, who spoke on the condition of anonymity, because of the matter’s sensitivity.” The Japanese government offered no comment on the matter but the incident complicated US-Japanese defense cooperation, especially intelligence-sharing, which has grown closer as China adopts an increasingly assertive policy in the Indo-Pacific region.

Wide-ranging cyberespionage campaign by China’s Ministry of State Security
Researchers have recently published a report on an extensive hacking campaign by RedHotel (also known as Charcoal Typhoon or Bronze University), a threat actor most likely run by China’s Ministry of State Security, that’s prospecting targets primarily not only in Southeast Asia but in other regions as well. The activity is marked by unusual scope and intensity. The group has been very active since at least 2019 and has showcased a relentless scope and scale of wider PRC state-sponsored cyber-espionage activity, by maintaining a high operational tempo and targeting public and private sector organizations globally. The group often utilizes a mix of offensive security tools, shared capabilities, and bespoke tooling. RedHotel’s operations have been recorded in more than 15 countries in Asia, Europe, and North America and its targets include academia and research, aerospace industry, government organizations, media, or telecommunications. The group has been focusing particularly on Southeast Asia’s governments and private companies in the sectors outlined above and the groups’ infrastructure for malware command-and-control, reconnaissance, and exploitation points to administration in Chengdu, China. Based on targeting trends, RedHotel likely operates with a mission of both intelligence gathering and economic espionage.

Rise in Malware/Ransomware and Phishing

Premier BPO is Impacted by BlackCat Ransomware

  • Attack Type: Ransomware
  • Target Industry: Business Services
  • Target Geography: The United States of America
  • Ransomware: BlackCat Ransomware
  • Objective: Data Theft, Data Encryption, Financial Gains
  • Business Impact: Financial Loss, Data Loss, Reputational Damage

Summary:
From the External Threat Landscape Management (ETLM) Perspective, CYFIRMA observed in the dark forum that a company from the United States of America, (www[.]premierbpo[.]com), was compromised by BlackCat Ransomware. Premier BPO LLC provides back-office processing services to businesses. Its back-office processing services include B2B and B2C collections, billing, data entry and transcription, employee benefit processing, operational analysis and reporting. The breached data encompasses their entire customer databases, containing an alarming volume of Protected Health Information (PHI) and other confidential data. The compromised data amounts to 57.7 GB in size.

The following screenshot was observed published on the dark web:

Source: Dark Web

Insights:
Having recorded 312 instances of victimization in the year 2023, the group establishes its standing as one of the most prolific ransomware collectives. Analyzing the geographical focus of their attacks it becomes evident that the group primarily targets organizations situated in the United States.

The group with financial motives, identified as FIN8, has been seen employing an updated variant of a backdoor named “Sardonic” to distribute the BlackCat ransomware.

Vulnerabilities and Exploits

Vulnerability in Zoom SDK

  • Attack Type: Vulnerabilities & Exploits
  • Target Technology: Zoom Meeting SDK for Windows
  • Vulnerability: CVE-2023-36533 (CVSS Base Score 7.1)
  • Vulnerability Type: Resource Exhaustion

Summary:
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

Insights:
The vulnerability exists due to application does not properly controlling consumption of internal resources.

Impact:
A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
Affected Products: https[:]//explore[.]zoom[.]us/en/trust/security/security-bulletin/#ZSB-23029

Latest Cyber-Attacks, Incidents, and Breaches

Russian Hacktivists launch DDoS attacks, causing Spanish websites to be inundated.

  • Threat Actors: NoName057
  • Objective: Operational Disruption
  • Target Technology: DDoS
  • Target Geographies: Spain
  • Target Industries: Government, Research Institutions, Banks, Telecoms Providers, Media, and Tourism
  • Business Impact: Operational Disruption

Summary:
The most prominent research institute in Spain has fallen victim to a recent cyber assault from Russia. This attack, which lasted for weeks, involved a DDoS campaign that seems to be driven by geopolitical motives. The DDoS barrage, affecting a minimum of 72 websites from July 19 to 30, has been attributed to the highly active hacktivist collective known as NoName057. Following Prime Minister Pedro Sanchez’s visit to Kyiv, during which he expressed his government’s backing for Ukraine, there is speculation that the attacks have impacted various sectors, including banks, telecommunications providers, media outlets, and tourism companies. The websites that fell victim to the attacks encompassed a range of targets, such as La Moncloa, which serves as the official residence of the Prime Minister, the Constitutional Court, the ministries of justice and territorial policy, as well as the Ministry of Defence agency; Isdefe.

Insights:
NoName057 is a notable hacktivist group recognized for their active engagement in various online activities. They have been linked to multiple cyber operations, often involving distributed denial-of-service (DDoS) attacks on websites and online platforms. This group’s motives are diverse and can encompass geopolitical, social, or ideological causes. Their actions have demonstrated a level of technical proficiency and coordination, allowing them to carry out impactful disruptions.

Data Leaks

Industrial Safety’s Data Advertised in Leak Site

  • Attack Type: Data Leaks
  • Target Industry: Hospitality and Tourism
  • Target Geography: Manufacturing
  • Target Technology: SQL Database
  • Objective: Data Theft, Financial Gains
  • Business Impact: Data Loss, Reputational Damage

Summary:
CYFIRMA Research team observed a potential data leak related to Industrial Safety, {www[.]industrialsafety[.]com}. Industrial Safety are a full-service government contractor and a preferred fulfilment partner to Fortune 500 clients. The breached information includes identifiers (id), message identifiers (msgid), messages, date of occurrence (jamtgl), and other sensitive data in SQL format.

Source: Underground forums

Insights:
Constantly seeking financial gains, opportunistic cybercriminals remain vigilant for accessible and weak systems and applications. Most of these attackers participate in clandestine discussions within underground forums, where they engage in the purchase and sale of stolen digital assets. In contrast to financially motivated groups like ransomware or extortion syndicates, who often publicize their attacks, these culprits prefer discreet operations. They exploit unpatched systems or vulnerabilities in applications to infiltrate and exfiltrate valuable data. Subsequently, this stolen data is promoted for sale on underground platforms, finding its way to new owners and being repurposed in subsequent attacks by other perpetrators.

Other Observations

CYFIRMA Research team observed a potential data leak related to MediaMatis, {www[.]mediamatis[.]com}. MediaMatis is a company specialized in dematerialization, development, and integration of ‘business’ solutions for its clients. As a marketing agency, they design and develop applications, accessible via the Internet in ASP and SaaS. The breached information in SQL format includes identifiers (id, id_company, id_role), title, department, alternate department, first name, last name, position, email, password, telephone, mobile phone, LinkedIn, Twitter, Facebook, and other sensitive data.

Source: Underground forums

STRATEGIC RECOMMENDATION

  • Attack Surface Management should be adopted by organizations, ensuring that a continuous closed-loop process is created between attack surface monitoring and security testing.
  • Deploy a unified threat management strategy – including malware detection, deep learning neural networks, and anti-exploit technology – combined with vulnerability and risk mitigation processes.
  • Incorporate Digital Risk Protection (DRP) in the overall security posture that acts as a proactive defence against external threats targeting unsuspecting customers.
  • Implement a holistic security strategy that includes controls for attack surface reduction, effective patch management, active network monitoring, through next generation security solutions and ready to go incident response plan.
  • Create risk-based vulnerability management with deep knowledge about each asset. Assign a triaged risk score based on the type of vulnerability and criticality of the asset to help ensure that the most severe and dangerous vulnerabilities are dealt with first.

MANAGEMENT RECOMMENDATION

  • Take advantage of global Cyber Intelligence providing valuable insights on threat actor activity, detection, and mitigation techniques.
  • Proactively monitor the effectiveness of risk-based information security strategy, the security controls applied and the proper implementation of security technologies, followed by corrective actions remediations, and lessons learned.
  • Move beyond the traditional model of security awareness towards improved simulation and training exercises that mimic real attack scenarios, account for behaviours that lead to a compromised, and are measured against real attacks the organization receives.
  • Consider implementing Network Traffic Analysis (NTA) and Network Detection and Response (NDR) security systems to compensate for the shortcoming of EDR and SIEM solutions.
  • Detection processes are tested to ensure awareness of anomalous events. Timely communication of anomalies and continuously evolved to keep up with refined ransomware threats.

TACTICAL RECOMMENDATION

  • Patch software/applications as soon as updates are available. Where feasible, automated remediation should be deployed since vulnerabilities are one of the top attack vectors.
  • Consider using security automation to speed up threat detection, improve incident response, increase the visibility of security metrics, and rapid execution of security checklists.
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthen defences based on tactical intelligence provided.
  • Deploy detection technologies that are behavioural anomaly-based to detect ransomware attacks and help to take appropriate measures.
  • Implement a combination of security control such as reCAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart), Device fingerprinting, IP backlisting, Rate-limiting, and Account lockout to thwart automated brute-force attacks.
  • Ensure email and web content filtering uses real-time blocklists, reputation services, and other similar mechanisms to avoid accepting content from known and potentially malicious sources.