id int64 1 978 | title stringlengths 1 120 | start_line int64 59 237k | end_line int64 132 237k | lines int64 30 3.31k | path stringlengths 27 27 | text stringlengths 577 300k |
|---|---|---|---|---|---|---|
901 | Juniper Advanced Threat Prevention Cloud detects the Muhstik bot as follows. | 196,211 | 196,607 | 397 | data/reports_final/0901.txt | Juniper Advanced Threat Prevention Cloud detects the Muhstik bot as follows.
Indicators of Compromise 192[.
]31.52.174 34[.
]221.40.237 157[.
]230.189.52 18[.
]235.127.50 fe98548300025a46de1e06b94252af601a215b985dad31353596af3c1813efb0 *dk32 0e574fd30e806fe4298b3cbccb8d1089454f42f52892f87554325cb352646049
*dk86 39db1c5... |
902 | Indicators of Compromise Domains: gtmpbeaxruxy[. | 196,622 | 196,676 | 55 | data/reports_final/0902.txt | Indicators of Compromise Domains: gtmpbeaxruxy[.
]myftp.org URLs: http://gtmpbeaxruxy[.
]myftp.org/setup.py http://gtmpbeaxruxy[.
]myftp.org/setup http://gtmpbeaxruxy[.
]myftp.org/xmrig http://gtmpbeaxruxy[.
]myftp.org/xmrig1 Files: File Hash File Name Eb4a48a32af138e9444f87c4706e5c03d8dc313fabb7ea88c733ef1be9372899 se... |
903 | Botnet HTTP.Unix. | 196,677 | 196,850 | 174 | data/reports_final/0903.txt | Botnet HTTP.Unix.
Shell.
IFS.Remote.
Code.
Execution FortiGuard Labs also provides IPS signatures against the following vulnerabilities.
CVE-2017-17215 - Huawei.HG532.Remote.
Code.
Execution CVE-2016-5674 - NUUO.Surveillance.
Application.
UNAUTH.Remote.
Code.
Execution The FortiGuard Web Filtering Service blocks downlo... |
904 | RDP shop overview Systems for sale: The advertised systems ranged from Windows XP through Windows 10. | 196,851 | 197,218 | 368 | data/reports_final/0904.txt | RDP shop overview Systems for sale: The advertised systems ranged from Windows XP through Windows 10.
Windows 2008 and 2012 Server were the most abundant systems, with around 11,000 and 6,500, respectively, for sale.
Prices ranged from around US $3 for a simple configuration to $19 for a high-bandwidth system that offe... |
905 | In Q3 we saw two new exploit kits: Fallout and Underminer. | 197,219 | 197,265 | 47 | data/reports_final/0905.txt | In Q3 we saw two new exploit kits: Fallout and Underminer.
Fallout almost certainly had a bearing on the spread of GandCrab, the leading ransomware.
Five years ago we published the report “Cybercrime Exposed,” which detailed the rise of cybercrime as a service.
Exploit kits are the epitome of this economy, affording an... |
906 | Backdoor. | 197,305 | 197,399 | 95 | data/reports_final/0906.txt | Backdoor.
Emdivi are persistently used as a payload.
All attacks arrive on the target computers as an
attachment to email messages.
Mostly the attachments are in a simple executable format with a fake icon.
However, some of the files exploit software vulnerabilities, and the aforementioned vulnerability in
Ichitaro sof... |
907 | Backdoor. | 197,400 | 197,458 | 59 | data/reports_final/0907.txt | Backdoor.
Emdivi.
The compromised cloud hosting company has been notified but, at the time of writing, has not replied.
Symantec offers two IPS signatures that detect and block network communication between infected
computers and the Emdivi C&C server:
System Infected: Backdoor.
Emdivi Activity
System Infected: Backdoo... |
908 | System Infected: Backdoor. | 197,470 | 197,975 | 506 | data/reports_final/0908.txt | System Infected: Backdoor.
Emdivi Activity
System Infected: Backdoor.
Emdivi Activity 2
NetTraveler APT Gets a Makeover for 10th Birthday
We have written about NetTraveler before HERE and HERE.
Earlier this year, we observed an uptick in the number of attacks against Uyghur and Tibetan supporters
using an updated versi... |
909 | • | 197,987 | 198,431 | 445 | data/reports_final/0909.txt | • %System%\config\SystemLog.evt: Contains Stage 5 user mode DLLs.
They constitute Regin’s payload.
• %System%\config\SecurityLog.evt: Contains Stage 5 data files, used by the Stage 4 and 5 components to
store various data items
• %System%\config\ApplicationLog.evt: Another Stage 5 log container, which is
referenced ... |
910 | INTELLIGENCE TEAM REPORT VER. | 198,432 | 198,464 | 33 | data/reports_final/0910.txt | INTELLIGENCE TEAM REPORT VER.
1.0
DEEP PANDA
11 EXECUTIVE SUMMARY 2
12 TECHNICAL ANALYSIS 3
Dropper Sample (MD5: 14c04f88dc97aef3e9b516ef208a2bf5) ... |
911 | Appendix D: Raw bytes of example Authentication packet. | 198,465 | 199,237 | 773 | data/reports_final/0911.txt | Appendix D: Raw bytes of example Authentication packet.
30
Appendix E: Initialization of KEY and IV for AES 30
Appendix F: Command & Control Servers 31
Appendix G: Edward Sun’s kernel network hook code ... |
912 | Appendix D: Raw bytes of example Authentication packet. | 199,238 | 201,921 | 2,684 | data/reports_final/0912.txt | Appendix D: Raw bytes of example Authentication packet.
03 01 74 80 82 21 b5 64 c2 74 22 e3 02 00 00 00 49 03 00 00 00 00 00 00 00 00 00 00 00
00 00 00
Appendix E: Initialization of KEY and IV for AES
for (int i = 0; i < 0x20; ++i )
{ for (int i = 0; i < 0x20; ++i )
{
buffer[i] = (byte)((i + 8) + ((byte)password[... |
913 | 000000E0 06 3C AA D8 F0 49 52 DB 22 A5 0D 7B 2B 4D 8A D1 .<...IR.”..{+M.. | 201,937 | 202,557 | 621 | data/reports_final/0913.txt | 000000E0 06 3C AA D8 F0 49 52 DB 22 A5 0D 7B 2B 4D 8A D1 .<...IR.”..{+M..
000000F0 21 5C 62 11 E6 13 E2 CA AF A5 4F 5A 9E 1C AF AE !\b.......OZ....
00000100 C4 1C 36 4D A0 E4 72 3A CD 07 A3 01 AE E6 0A 84 ..6M..r... |
914 | The answer: No. | 202,558 | 203,577 | 1,020 | data/reports_final/0914.txt | The answer: No.
Bootkits must overwrite the Master Boot Record (MBR) and antivirus products are well trained to catch that kind of
bad behavior.
The masterminds behind Snake rootkit seem to be well aware of this so what they resorted to instead is leveraging a vulnerability
in a well-known virtualization product called... |
915 | recipient – the CEO of a large Russian bank. | 203,578 | 204,044 | 467 | data/reports_final/0915.txt | recipient – the CEO of a large Russian bank.
The email was apparently sent from
“Mrs.
World”; note the Mrs., and not Miss - World.
The weaponized Microsoft Word document attached to the email message
(“photo.doc”) contained two separate exploits: one targeting the vulnerability
detailed in CVE-2012-0158 (MSCOMCTL Activ... |
916 | Apparently a rented server at AS52048 DATACLUB DataClub S.A. Latvia. | 204,045 | 204,157 | 113 | data/reports_final/0916.txt | Apparently a rented server at AS52048 DATACLUB DataClub S.A. Latvia.
Traffic from this IP had a very specific purpose: It unlocked routers for proxying in
connection with the sending of phishing emails.
In the wild we observed this IP connect to our router on the malware
management port and specify a SOCKSS proxy port ... |
917 | other : Serve MMS phishing content. | 204,158 | 204,346 | 189 | data/reports_final/0917.txt | other : Serve MMS phishing content.
The code identifies mobile operator and
determines which logo will be displayed when the user follows the link.
35
MMS Phishing
We have no sample of the actual MMS phishing messages apparently being
sent, but we can see the page served when a user clicks a spammed link.
This is
just ... |
918 | periods: 6:00 -10:00 UTC and 17:00 - 21:00 UTC. | 204,347 | 204,391 | 45 | data/reports_final/0918.txt | periods: 6:00 -10:00 UTC and 17:00 - 21:00 UTC.
No uploads were seen
between 23:00 and 05:00 UTC.
It is however doubtful how indicative these timeframes are.
To illustrate, we
looked into another and more obscure timing factor: The timing of the AES
InitVector random seeds.
A random seed is the initial value passed int... |
919 | classical Chinese APT implant. | 204,392 | 207,702 | 3,311 | data/reports_final/0919.txt | classical Chinese APT implant.
It is a downloader and remote shell program,
designed to connect to a C&C server to interact with the attacker and/or
download more malware.
The C&C server in this case is ict32.msname.org.
When connecting to this server, sccm.exe issues the following request:
POST /check.jsp HTTP/1.1
Acc... |
920 | Image 1: Example of an online threat made against RSS. | 207,703 | 209,613 | 1,911 | data/reports_final/0920.txt | Image 1: Example of an online threat made against RSS.
The image, which cannot be confirmed, purports to show CCTV
installed around Raqqah.
In addition, RSS is targeted online by ISIS supporters with harassment, including threats to the physical safety of its
members.
For example, ISIS supporters have claimed that ISIS... |
921 | Loaders. | 209,614 | 210,887 | 1,274 | data/reports_final/0921.txt | Loaders.
Both versions of the Loader begin by loading the embedded DLL from the Loader’s resources
(item 102 under the Group Icons resource tree), decrypting and decompressing the image into memory,
then manually loading the DLL into memory using a custom loading routine.
The function
LoadEmbeddedImage, as seen in part... |
922 | Cyber war: The next threat to national security and what to do about it. | 210,888 | 210,933 | 46 | data/reports_final/0922.txt | Cyber war: The next threat to national security and what to do about it.
New York, NY: Ecco.
128
maps.google.com
Figure 12 A satellite view of the Chilbosan Hotel.129
Several entities are nested under the Workers’ Party.
The Central Party
Committee oversees the Central Party Investigative Group, also known as Unit ... |
923 | Cyber war: The next threat to national security and what to do about it. | 210,934 | 211,834 | 901 | data/reports_final/0923.txt | Cyber war: The next threat to national security and what to do about it.
New York, NY: Ecco.
131
https://www.usnwc.edu/getattachment/8e487165-a3ef-4ebc-83ce-0ddd7898e16a/The-Republic-of-Korea-s-Counter-asymmetric-Strateg
132
http://goodfriendsusa.blogspot.co.uk/2008/07/north-korea-today-no174.html
133
https://www.usnwc... |
924 | DarkSeoul Backdoor. | 211,835 | 212,394 | 560 | data/reports_final/0924.txt | DarkSeoul Backdoor.
Prioxer detected (June) 283
Korean Central News Agency website becomes North Korea’s first known direct
connection to the Internet (October)284
273
http://www.nbcnews.com/news/other/north-korean-ship-carrying-hidden-missile-equipment-detained-after-leaving-f6C10647045
274
http://www.... |
925 | published in our annual HP Cyber Risk Report 2013. | 212,395 | 213,083 | 689 | data/reports_final/0925.txt | published in our annual HP Cyber Risk Report 2013.
Analysis of this malware is included in
Appendix C. Analysis of additional malware used in these campaigns produced no new findings
and only corroborated what was found by external security researchers.
These publicly available
analyses have been cited throughout the r... |
926 | • SecureCRT—a commercial SSH and Telnet client by VanDyke Software. | 213,084 | 214,251 | 1,168 | data/reports_final/0926.txt | • SecureCRT—a commercial SSH and Telnet client by VanDyke Software.
If an mRemote installation is located, the dropper reads the configuration file and checks if there’s
a NODE that is defined with “Username=root”, “Protocol=SSH”, and a password that is not blank.
If
those conditions are satisfied it extracts the infor... |
927 | Targeted Attacks: Understanding the Characteristics of an Escalating Threat. | 214,262 | 216,279 | 2,018 | data/reports_final/0927.txt | Targeted Attacks: Understanding the Characteristics of an Escalating Threat.
In Proc.
Of the 15th
International conference on Research in Attacks, Intrusions, and Defenses (RAID), 2012.
[5] Symantec Internet Security Threat Report (ISTR), Volume 17, April 2012.
Page 28
Author
Candid Wueest
Principal Software Engineer
... |
928 | day Government Spy Assembler 0x29A Micro Backdoorand shortly after in a paper by Bitdefender. | 216,280 | 216,549 | 270 | data/reports_final/0928.txt | day Government Spy Assembler 0x29A Micro Backdoorand shortly after in a paper by Bitdefender.
Some
of the characteristics of MiniDuke — such as its small size (20 KB), its crafty use of assembly
programming, and the use of zero-day exploits for distribution — made it an intriguing threat.
Although
the backdoor is still... |
929 | “Threat Intelligence Briefing Episode 11”. | 216,550 | 216,599 | 50 | data/reports_final/0929.txt | “Threat Intelligence Briefing Episode 11”.
February 2014.
2 Perlroth, N. “In Cyberattack on Saudi Firm, U.S. Sees Iran Firing Back”.
October 2012.
3 Gallagher, S. “Iranians hacked Navy network for four months?
Not a surprise”.
February 2014.
4 Key.
“Honker Union of China to launch network attacks against Japan is a rum... |
930 | “Iran strengthened cyber capabilities after Stuxnet: U.S. general”. | 216,636 | 216,694 | 59 | data/reports_final/0930.txt | “Iran strengthened cyber capabilities after Stuxnet: U.S. general”.
January 2013, Lim, K. “Iran’s cyber posture”.
November 2013.
3 www.fireeye.com
Fireeye: Operation Saffron Rose 2013
Attack Vectors registered the domain “aeroconf2014[.
]org” in
We have ob... |
931 | “After the Green Movement: Internet Controls in Iran 2009 – 2012”. | 216,695 | 217,150 | 456 | data/reports_final/0931.txt | “After the Green Movement: Internet Controls in Iran 2009 – 2012”.
February 2013.
19 Torbati, Y.
“Iran blocks use of tool to get around Internet filter”.
March 2013.
20 Marquis-Boire, M. “Iranian anti-censorship software ‘Simurgh’ circulated with malicious backdoor”.
May 2012.
5 www.fireeye.com
Fireeye: Operation Saffr... |
932 | “Beyond Attribution: Seeking National Responsibility for Cyber Attacks”. | 217,151 | 217,936 | 786 | data/reports_final/0932.txt | “Beyond Attribution: Seeking National Responsibility for Cyber Attacks”.
January 2012.
18 www.fireeye.com
Fireeye: Operation Saffron Rose 2013
Conclusion About FireEye
The increased politicization of the Ajax Security FireEye has invented a purpose-built, virtual
Tea... |
933 | The FireEye Threat Prevention Platform Fortune 500. | 217,937 | 218,136 | 200 | data/reports_final/0933.txt | The FireEye Threat Prevention Platform Fortune 500.
FireEye, Inc. | 1440 McCarthy Blvd.
Milpitas, CA 95035 | 408.321.6300 | 877.FIREEYE (347.3393) | info@fireeye.com | www.fireeye.com
© 2014 FireEye, Inc. All rights reserved.
FireEye is a registered trademark of FireEye,
Inc. All other brands, products, or service... |
934 | Exploit. | 218,154 | 218,801 | 648 | data/reports_final/0934.txt | Exploit.
Win32.CVE-2012-0158.j
Exploit.
Win32.CVE-2012-0158.eu
Exploit.
Win32.CVE-2012-0158.aw
Exploit.MSWord.CVE-2012-0158.ea
HEUR:Trojan.
Win32.CloudAtlas.gen
HEUR:Trojan.
Win32.Generic
HEUR:Trojan.
Script.
Generic
Trojan-Spy.
Win32.Agent.ctda
Trojan-Spy.
Win32.Agent.cteq
Trojan-Spy.
Win32.Agent.ctgm
Trojan-Spy.
Win3... |
935 | HackTool. | 218,855 | 219,174 | 320 | data/reports_final/0935.txt | HackTool.
Win32.Agent.vhs
HackTool.
Win64.Agent.b
Rootkit.
Win32.Turla.d
Trojan-Dropper.
Win32.Dapato.dwua
Trojan-Dropper.
Win32.Demp.rib
Trojan-Dropper.
Win32.Injector.jtxs
Trojan-Dropper.
Win32.Injector.jtxt
Trojan-Dropper.
Win32.Injector.jznj
Trojan-Dropper.
Win32.Injector.jznk
Trojan-Dropper.
Win32.Injector.khqw
Tr... |
936 | Operation Cleaver. | 219,175 | 220,514 | 1,340 | data/reports_final/0936.txt | Operation Cleaver.
6
#OPCLEAVER
While previously reported operations attributed to Iran have largely focused on Defense Industrial
Base (DIB) companies, the United States Federal Government, or targets in Middle Eastern countries,
Operation Cleaver has instead focused on a wide array of targets, including energy produc... |
937 | Exploit Team. | 220,515 | 220,761 | 247 | data/reports_final/0937.txt | Exploit Team.
Pivoting is the process of leveraging access from one compromised computer in order to gain
access to additional systems on the target network.
This can involve launching attacks from the
compromised computer, or simply abusing access once it has been gained.
Cached Credential Dumping
A very common method... |
938 | The –h argument enables HTTP mode. | 220,762 | 221,552 | 791 | data/reports_final/0938.txt | The –h argument enables HTTP mode.
This makes the traffic between zhCat instances look like benign HTTP traffic.
For instance, if the
attackers set up a zhCat instance listening on port 1000 on 192.168.116.128 in HTTP mode, the
client instance of zhCat would use the following command:
b2
zhcat.exe –h –p 1000 –i 192.168... |
939 | impersonate Adobe Report Service. | 221,553 | 222,179 | 627 | data/reports_final/0939.txt | impersonate Adobe Report Service.
WndTest starts using PHP servers for its command and control
server, some of which are listed as defaced sites.
58
#OPCLEAVER
We have seen wndTest communicate with the following servers:
• 209.208.97.44, Orlando, Florida, USA, www.lat(dot)am
• 23.238.17.181, Tulsa, Oklahoma, USA, r... |
940 | This Appendix details the IOCs discovered in the investigation of Operation Cleaver. | 222,180 | 222,875 | 696 | data/reports_final/0940.txt | This Appendix details the IOCs discovered in the investigation of Operation Cleaver.
CylancePROTECT prevents the malware used in Operation Cleaver from ever executing.
Domains
doosan-job(dot)com
downloadsservers(dot)com
drivercenterupdate(dot)com
easyresumecreatorpro(dot)com
googleproductupdate(dot)com
googleproductupd... |
941 | Operation “Arachnophobia”. | 222,876 | 225,341 | 2,466 | data/reports_final/0941.txt | Operation “Arachnophobia”.
The following report is a product of collaborative research and threat intelligence sharing between
Cyber Squared Inc.’s TCIRT and FireEye Labs.
Key Findings
• While we are not conclusively attributing BITTERBUG activity to Tranchulas or a specific Pakistani entity, we can confidently
point ... |
942 | associated with Operation Poisoned Hurricane. | 225,342 | 225,932 | 591 | data/reports_final/0942.txt | associated with Operation Poisoned Hurricane.
However, the malicious document.write driveby URLs
listed above both result in 403 Forbidden errors as of December 18, 2014.
While the 403 Forbidden errors may seem like an analytic dead end, the TCIRT also identified a malicious
Java applet submission to VirusTotal that co... |
943 | FinSpy Campaign. | 225,933 | 225,962 | 30 | data/reports_final/0943.txt | FinSpy Campaign.
Beginning in April 2012, the authors
received 5 suspicious e-mails from US and UK-based activists
4 Case Studies: Three Countries and journalists working on Bahrain.
We found that some
of the attachments contained a PE (.exe) file designed to
This fo... |
944 | Identification as FinSpy: By running the sample using ated with another government [4]. | 225,963 | 226,568 | 606 | data/reports_final/0944.txt | Identification as FinSpy: By running the sample using ated with another government [4].
However, a proxy would
Windows Virtual PC, we found the following string in mem- show gaps in a global IPID as it forwarded traffic; our frequent
ory: y:\lsvn_branches\finspyv4.01\finspyv2\.
observat... |
945 | Appin: In early 2013 UAE H.R. | 226,569 | 226,649 | 81 | data/reports_final/0945.txt | Appin: In early 2013 UAE H.R.
activist E forwarded nu- servers We note some interesting master locations in Table 4.
merous documents that included a particular CVE-2012-0158 Server locations: In all, our fingerprints matched 92 dis-
exploit for Microsoft Word.
In all, these totaled 17 ... |
946 | Fingerprints: We probed the C&C servers of the RCS and Team [76]. | 226,650 | 226,843 | 194 | data/reports_final/0946.txt | Fingerprints: We probed the C&C servers of the RCS and Team [76].
The domain hackingteam.it resolves to an
FSBSpy samples, and found that they responded in a distinc- address in this range.
(2) An address belonging to Omantel, a
tive way to HTTP requests, and returned distinctive SSL cer- ... |
947 | sorship in China: Where Does the Filtering Occur?” in cessed: 11-November-2013. | 226,844 | 226,989 | 146 | data/reports_final/0947.txt | sorship in China: Where Does the Filtering Occur?” in cessed: 11-November-2013.
[Online].
Available:
Proc.
PAM, 2011. http://bit.ly/1aRUZ4b
[12] M. Sherr, G. Shah, E. Cronin, S. Clark, and M. Blaze, [31] “Unionist Questioned,” 2013, a... |
948 | [49] “Free Syrian Army Sex Tape—Abdul Razzaq Tlass 2012. | 226,990 | 227,143 | 154 | data/reports_final/0948.txt | [49] “Free Syrian Army Sex Tape—Abdul Razzaq Tlass 2012.
[NSFW],” accessed: 5-August-2013.
[Online].
Available: [69] “Democracy Index 2012: Democracy at a Standstill,”
http://bit.ly/1gHqDDH 2012, accessed: 7-August-2013.
[Online].
Available:... |
949 | SMB Worm Tool: This worm uses a brute force authentication attack to propagate via Windows SMB shares. | 227,144 | 227,187 | 44 | data/reports_final/0949.txt | SMB Worm Tool: This worm uses a brute force authentication attack to propagate via Windows SMB shares.
It connects home every five minutes to send log data
back to command and control (C2) infrastructure if it has successfully spread to other Windows hosts via SMB port 445.
The tool also accepts new scan tasking
when i... |
950 | US-CERT recommends reviewing the Security Tip Handling Destructive Malware #ST13-003. | 227,210 | 227,896 | 687 | data/reports_final/0950.txt | US-CERT recommends reviewing the Security Tip Handling Destructive Malware #ST13-003.
Description
Cyber threat actors are using an SMB worm to conduct cyber exploitation activities.
This tool contains five components – a listening implant, lightweight backdoor,
proxy tool, destructive hard drive tool, and destructive t... |
951 | LegalCopyright: Copyright 2012 Google Inc. All rights reserved. | 227,897 | 228,215 | 319 | data/reports_final/0951.txt | LegalCopyright: Copyright 2012 Google Inc. All rights reserved.
InternalName: chrome_exe
ProcuctShortName: Chrome
FileVersion: 34.0.1847.131
CompanyName: Google Inc.
OrginaLFilename: chrome.exe
LegalTrademarks:
ProductName: Google Chrome
ComparyShortName: Google
LastChange: 265687
FileDescription: Google Chrome
Offcial... |
952 | including Operation Poisoned Hurricane. | 228,216 | 228,411 | 196 | data/reports_final/0952.txt | including Operation Poisoned Hurricane.
Specifically, 17bc9d2a640da75db6cbb66e5898feb1 is a PlugX
variant signed by the QTI International certificate.
This PlugX variant connected to a Google Code project
at code.google[.
]com/p/udom/, where it decoded a command that configured its C2 server.
The sample 0b54ae49fd5a841... |
953 | against US Defense companies under the code name Operation DeathClick. | 228,412 | 228,725 | 314 | data/reports_final/0953.txt | against US Defense companies under the code name Operation DeathClick.
Traditional malvertizing has been an effective but indiscriminate method cyber crime gangs use to
compromise endpoints to perpetrate ad fraud, identity fraud, and banking credential theft.
In this new
targeted variation of malvertizing, the perpetra... |
954 | Audience Targeting: Bid on the audiences most valuable to you. | 228,726 | 229,027 | 302 | data/reports_final/0954.txt | Audience Targeting: Bid on the audiences most valuable to you.
Each impression in the PubMatic
auction can be enhanced with first- and third-party data; giving buyers targeting capabilities
across display, mobile, tablet and video inventory.
Media buyers can also cookie sync with
publisher audiences to incorporate CRM,... |
955 | ad placement ran on sports.yahoo.com – an Alexa Top 4 rated site. | 229,028 | 229,315 | 288 | data/reports_final/0955.txt | ad placement ran on sports.yahoo.com – an Alexa Top 4 rated site.
Highlighted in order in Figure 22 is
the common filename of obupdat.exe, which has ever changing hashes, followed by the TOR port, and
the 3rd party ad platform of first-impression.com.
Analysis (Original report):
Figure 22: CryptoWall 2.0 infection repo... |
956 | to both Operation DeputyDog and Operation Ephemeral Hydra. | 229,316 | 229,644 | 329 | data/reports_final/0956.txt | to both Operation DeputyDog and Operation Ephemeral Hydra.
Figure 1 illustrates the
infrastructure overlaps and connections we observed between the strategic Web compromise campaign
leveraging the VFW’s website, the DeputyDog, and the Ephemeral Hydra operations.
Figure 1: Ties between Operation SnowMan, DeputyDog, and ... |
957 | PANDA resolved to this same IP address: login. | 229,645 | 229,861 | 217 | data/reports_final/0957.txt | PANDA resolved to this same IP address: login.
several PUTTER PANDA associated
aolon1ine.com.
Additionally, for a brief period in April
domains have resolved to IP
2012, update8.firefoxupdata.com also resolved to
address 100.42.216.230:
this IP address.
• news.decipherment.net
• res.decipherment.net
The use of the same... |
958 | – specifically the PLA Army. | 229,862 | 230,214 | 353 | data/reports_final/0958.txt | – specifically the PLA Army.
In addition to his declaration on his personal blog that he works for the “military/
police”, and contacts with actors such as Linxder that have been previously associated with hacking units
within the PLA, cpyy’s Picasa site contains several photographs that hint at military connections.
F... |
959 | • CCommandCD – Change the working directory for the current C2 session. | 230,215 | 230,956 | 742 | data/reports_final/0959.txt | • CCommandCD – Change the working directory for the current C2 session.
•C CommandCMD – Execute a command, with standard input/output/error Screenshot of Truecaller
redirected over the C2 channel.
Database Shared by
• CCommandNOP – List the current working directory.
DEADEYE JACKAL on Their
Twitter Account (names
reda... |
960 | description: Detects the DLL-Sideloading of windowscodecs.dll by calc.exe. | 230,957 | 231,334 | 378 | data/reports_final/0960.txt | description: Detects the DLL-Sideloading of windowscodecs.dll by calc.exe.
date: 04/08/2022
logsource:
product: windows
category: image_load
detection:
selection:
- ImageLoaded|endswith:
- '\WindowsCodecs.dll'
- Image|endswith:
- 'calc.exe'
filter:
- Imageloaded|startswith:
- 'C:\Windows\System32\'
- 'C:\Windows\Syswow... |
961 | Trellix conducts research in accordance with its Vulnerability Reasonable Disclosure Policy | Trellix. | 231,335 | 231,898 | 564 | data/reports_final/0961.txt | Trellix conducts research in accordance with its Vulnerability Reasonable Disclosure Policy | Trellix.
Any attempt to recreate part or all of the activities described is solely at the user’s risk, and neither Trellix nor its affiliates will bear any responsibility or liability.
Countering Follina Attack (CVE- 2022-3019... |
962 | Deploy XSOAR Playbook - Ransomware Manual for incident response. | 231,899 | 232,128 | 230 | data/reports_final/0962.txt | Deploy XSOAR Playbook - Ransomware Manual for incident response.
These capabilities are part of the NGFW cloud-delivered security subscriptions service
Conclusion
BlackByte ransomware operators have been active since at least July 2021.
Due to the high-profile nature and steady stream of BlackByte attacks identified gl... |
963 | Trellix conducts research in accordance with its Vulnerability Reasonable Disclosure Policy | Trellix. | 232,129 | 232,341 | 213 | data/reports_final/0963.txt | Trellix conducts research in accordance with its Vulnerability Reasonable Disclosure Policy | Trellix.
Any attempt to recreate part or all of the activities described is solely at the user’s risk, and neither Trellix nor its affiliates will bear any responsibility or liability.
Damart clothing store hit by Hive ransomw... |
964 | Trellix conducts research in accordance with its Vulnerability Reasonable Disclosure Policy. | 232,342 | 232,584 | 243 | data/reports_final/0964.txt | Trellix conducts research in accordance with its Vulnerability Reasonable Disclosure Policy.
Any attempt to recreate part or all of the activities described is solely at the user’s risk, and neither Trellix nor its affiliates will bear any responsibility or liability.
Threat Brief: CVE-2022-30190 – MSDT Code Execution ... |
965 | Another suspected Phishing page. | 232,585 | 232,824 | 240 | data/reports_final/0965.txt | Another suspected Phishing page.
Figure 11.
Another suspected Phishing page.
The IP address 82.221.139[.
]137 was observed in other spear phishing campaigns impersonating the cybersecurity center and CSOC in Ukraine.
Wipers
Communication is vital to survive during wartime, and the adversarial use of malware attacks to ... |
966 | Cloud security: Detect and remediate account compromises and third-party application abuse. | 232,825 | 232,897 | 73 | data/reports_final/0966.txt | Cloud security: Detect and remediate account compromises and third-party application abuse.
Proofpoint CASB integrates with Proofpoint Nexus Threat Graph and third-party threat intelligence to stop account takeovers and third-party application abuse.
Data loss prevention: Prevent sensitive data downloads and large-scal... |
967 | MVISION Insights API to pull Campaign Threat Intelligence for further correlation across data events. | 232,920 | 233,229 | 310 | data/reports_final/0967.txt | MVISION Insights API to pull Campaign Threat Intelligence for further correlation across data events.
Figure 6.
MVISION Insights API to pull Campaign Threat Intelligence for further correlation across data events.
Utilizing expert and behavioral rules in trellix endpoint security
Trellix ENS Threat Prevention and Adapt... |
968 | Microsoft – The Threat Actor’s Playground. | 233,230 | 233,588 | 359 | data/reports_final/0968.txt | Microsoft – The Threat Actor’s Playground.
A Blog Series.
This post is an ongoing series of blogs on different types of people-centric email attacks slipping past Microsoft’s detection.
These attacks cost organizations millions of dollars every year in losses and cause frustration for information security teams and use... |
969 | Encrypted Channel | 233,645 | 233,774 | 130 | data/reports_final/0969.txt | Encrypted Channel Uses Qakbot primarily and Cobalt Strike.
TA0040 Impact
T1486.
Data Encrypted for Impact Black Basta modifies the Desktop background by adding a .jpg in C:\Temp and creating a registry key HKCU\Control Panel\Desktop.
Additionally modifies the registry to change the icon of encrypted files.
It encrypt... |
970 | Palo Alto Networks Cortex XDR contains an Anti-Ransomware Protection module. | 233,775 | 234,717 | 943 | data/reports_final/0970.txt | Palo Alto Networks Cortex XDR contains an Anti-Ransomware Protection module.
This module targets encryption-based activity associated with ransomware.
Cortex XDR contains defined behavioral indicators of compromise designed to detect anomalies within your network.
More information on ransomware can be found in the 2021... |
971 | Password reuse: 44% of organizations allow IAM password reuse. | 234,734 | 234,833 | 100 | data/reports_final/0971.txt | Password reuse: 44% of organizations allow IAM password reuse.
Weak passwords (<14 characters): 53% of cloud accounts allow weak password usage.
Cloud identities are too permissive: 99% of cloud users, roles, services, and resources were granted excessive permissions which were ultimately left unused (we consider permi... |
972 | From: Financeiro UNIMED <financeiro@unimed-corporated[. | 234,858 | 234,902 | 45 | data/reports_final/0972.txt | From: Financeiro UNIMED <financeiro@unimed-corporated[.
]com>
Subject: Reserva
Replyto: cdt[name]cdt@gmail[.
]com
Attachment: OficioCircularencaminhadoaoSetorFinanceiroUNIMED.docx
SHA256: 2f0f99cbac828092c0ec23e12ecb44cbf53f5a671a80842a2447e6114e4f6979
Emails masqueraded as Unimed, a Brazilian medical work cooperative ... |
973 | From: Mauricio Fortunato <contato@155hotel[.]com[. | 234,903 | 235,408 | 506 | data/reports_final/0973.txt | From: Mauricio Fortunato <contato@155hotel[.]com[.
]br>
Subject: Enc: Reserva Familiar
The URL purported to be a legitimate 155 Hotel reservation link that led to an ISO file and an embedded batch file.
The execution of the BAT file led to a PowerShell helper script that downloaded a follow-on payload, AsyncRAT.
Simila... |
974 | Update: Added more info on Kochava's lawsuit against the FTC. | 235,409 | 235,741 | 333 | data/reports_final/0974.txt | Update: Added more info on Kochava's lawsuit against the FTC.
Fake 'Cthulhu World' P2E project used to push info-stealing malware
Hackers have created a fake 'Cthulhu World' play-to-earn community, including websites, Discord groups, social accounts, and a Medium developer site, to distribute the Raccoon Stealer, Async... |
975 | ImpacketObf — a slightly obfuscated version of the open-source Impacket framework. | 235,742 | 235,836 | 95 | data/reports_final/0975.txt | ImpacketObf — a slightly obfuscated version of the open-source Impacket framework.
This python-based framework implements various network protocols and contains utilities like smbexec.py and wmiexec.py, which can be used for lateral movement Obfuscated impacket wmiexec (utility) [FireEye Tools][IOC0111]
Obfuscated impa... |
976 | From: Binance Team <root@mensagem1[.]bnb-naoresponda[. | 235,837 | 236,289 | 453 | data/reports_final/0976.txt | From: Binance Team <root@mensagem1[.]bnb-naoresponda[.
]com>
Subject: Listagem de criptoativos em breve - 09/05/2022 (Machine translation: Crypto asset listing coming soon - 05/09/2022)
The email contained a link to a Binance-themed landing page with a popup listing several cryptocurrency wallets.
If a user attempted t... |
977 | Don’t forget about your Achilles heel – the seemingly innocent employees at their desks. | 236,290 | 236,499 | 210 | data/reports_final/0977.txt | Don’t forget about your Achilles heel – the seemingly innocent employees at their desks.
A little training can go a long way to limit the number of incidents caused by bad employee behavior.
A crucial part of setting up your network is to make sure all the necessary monitoring and logging tools are in place to collect ... |
978 | Trellix conducts research in accordance with its Vulnerability Reasonable Disclosure Policy | Trellix. | 236,500 | 237,205 | 706 | data/reports_final/0978.txt | Trellix conducts research in accordance with its Vulnerability Reasonable Disclosure Policy | Trellix.
Any attempt to recreate part or all of the activities described is solely at the user’s risk, and neither Trellix nor its affiliates will bear any responsibility or liability.
Microsoft found TikTok Android flaw that ... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.