Suspected Threat Actors: Kimsuky(Suspected)
It is estimated that the document contains inter-Korean relations-related matters and may be used to target individuals or organizations. Attacks using PDF document files have not been found in many ongoing exploits; it is suspected this could be an emerging new attack method.
Researchers have recently observed a new Android trojan used by attackers to compromise Facebook accounts. Dubbed as FlyTrap, the malware has Impacted approximately 10,000 users from at least 144 countries since March 2021. The malware is distributed via fraudulent apps through Google Play Store and other third-party app marketplaces and employs social engineering techniques to compromise Facebook accounts. FlyTrap is suspected to be operating out of Vietnam carrying out a session hijacking campaign. After infecting the victim’s device Facebook ID, Location, Email address, IP address, Cookie, and Tokens associated with the Facebook account. The attackers leveraged several appealing themes such as free Netflix coupon codes, Google AdWords coupon codes, and voting for the best football team or player. The fraudulent application tricks users into installing with its high-quality designs and social engineering. While the nine offending applications listed below have been removed from Google Play, they continue to be available in third-party app stores.
The threat actors are taking advantage of common user misconceptions that they are protected when logging into the right domain irrespective of the application used to log in. Further, the use of high-quality graphics and official-looking login screens are common tactics to lure users into taking action that targets their sensitive information.
Rogue Mobile Apps, a counterfeit app designed to impersonate trusted brands is a constant problem for businesses as well as app stores trying to protect users from such malicious apps. Due to increased digitization and wider reach of social media penetration, attackers have been increasingly using Rogue Mobile Apps as an attack vector. Earlier this year, while tracking threat actors Triangulum and HeXaGon Dev – known to have distributed multiple Android malware, including crypto miners, key loggers, and sophisticated P2P (Phone to Phone) mobile RATs – researchers have observed advertisements on “Rogue” mobile RAT for sale in one of the dark web forums.
Tracked as CVE-2021-20090 is a Path Traversal vulnerability that was made public on August 3, 2021, by researchers. The vulnerability potentially affects millions of devices such as home routers including IoT devices that use the same vulnerable code base. The flaw allows unauthenticated remote attackers to bypass authentication. In another report from researchers on August 5, 2021, attackers attempted to exploit this vulnerability targeting home routers and infecting them with a variant of the Mirai botnet – likely for a DDoS attack. The attacker attempted to deploy the Mirai variant on the affected routers using similar scripts which were also reported in activity observed in March targeting vulnerable network security devices from different vendors.
Researchers also observed other vulnerabilities and exploits being exercised alongside CVE-2021-20090, namely:
Apart from the current activity, researchers have observed a similar campaign around February this year. It is suspected that the similarity between the two activities indicates the same threat actor is behind the new attack.
This also demonstrates that threat actors keep a close eye on all disclosed vulnerabilities and are quick to take advantage of them. Whenever there is an exploit PoC published, threat actors often take very little time to integrate it into their attack routine.
CYFIRMA Researchers also observed an unknown threat actor selling Arcadyan Firmware RCE Exploit referring CVE-2021-20090 in one of the underground forums.
Source: Underground Forums