By Jon Munshaw.
The one big thing
Why do I care?
This exercise taught us a great deal about how ransomware actors operate. We can see ransomware operators take several precautions to obscure their true identity online and the hosting location of their web server infrastructure. We also learned that most ransomware operators use hosting providers outside their country of origin (such as Sweden, Germany and Singapore) to host their ransomware operations sites. This is all valuable information to use in the fight against ransomware.So now what?
If you’re a security researcher yourself, there are several techniques outlined in our recent post that could be of use to you. We hope to arm the security community with as much information as possible so that others may help us in the global fight against ransomware and threat actors.
Other news of note
The recent Supreme Court decision overturning nationally protected abortion rights in the U.S. has wide-ranging consequences that even reach the tech industry. Major social media companies are being asked to consider whether they’d cooperate with government investigations into women who potentially had abortions in states where it’s illegal by passing along personal information. Many women are now skeptical of period-tracking apps, too, some of which have privacy policies that openly state they would share user data with law enforcement. And the state-by-state method of abortion policy will only make the topic more complicated to untangle. (Yahoo! News, Axios, Vice Motherboard)
A new mobile spyware is targeting Android and iOS users across Europe and Asia. The recently discovered Hermit comes from Italian vendor RCS Labs and can steal data and record and make phone calls. The spyware disguises itself as legitimate apps to trick the user into downloading it, though researchers say these apps don’t appear on Google or Apple’s app stores. Hermit shows that attackers and governments alike are still using spyware like the NSO Group’s widespread Pegasus tool. Although spyware is not strictly illegal in many countries, it is often used by governments and state-sponsored groups to target vulnerable users, including high-profile activists, politicians and journalists. (Wired, ThreatPost)
A multi-stage remote access trojan is targeting several small and home office routers, potentially going back as far as 2020. The newly named ZuoRAT exploits known vulnerabilities in some Cisco, Netgear, Asus and DrayTek routers and infects other devices on the network and downloads other malware via DNS and HTTP hijacking. Security researchers say they’ve so far discovered at least 80 victims. (Dark Reading, Ars Technica)
Can’t get enough Talos?
- Avos ransomware group expands with new attack arsenal
- Cisco Talos Supports Ukraine Through Empathy
- Threat Roundup for June 17 - 24
Upcoming events where you can find Talos
New York City
BlackHat U.S. (Aug. 6 - 11, 2022)
Las Vegas, Nevada
Las Vegas, Nevada
Most prevalent malware files from Talos telemetry over the past week
MD5: 93fefc3e88ffb78abb36365fa5cf857c
Typical Filename: Wextract
Claimed Product: Internet Explorer
Detection Name: PUA.Win.Trojan.Generic::85.lp.ret.sbx.tg
MD5: a087b2e6ec57b08c0d0750c60f96a74c
Typical Filename: AAct.exe
Claimed Product: N/A
Detection Name: PUA.Win.Tool.Kmsauto::1201
SHA 256: c67b03c0a91eaefffd2f2c79b5c26a2648b8d3c19a22cadf35453455ff08ead0
MD5: 8c69830a50fb85d8a794fa46643493b2
Typical Filename: AAct.exe
Claimed Product: N/A
Detection Name: PUA.Win.Dropper.Generic::1201
SHA 256: 8664e2f59077c58ac12e747da09d2810fd5ca611f56c0c900578bf750cab56b7
MD5: 0e4c49327e3be816022a233f844a5731
Typical Filename: aact.exe
Claimed Product: AAct x86
Detection Name: PUA.Win.Tool.Kmsauto::in03.talos
SHA 256: 125e12c8045689bb2a5dcad6fa2644847156dec8b533ee8a3653b432f8fd5645
MD5: 2c8ea737a232fd03ab80db672d50a17a
Typical Filename: LwssPlayer.scr
Claimed Product: 梦想之巅幻灯播放器
Detection Name: Auto.125E12.241442.in02
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.