ARMORYZE
  • Home
  • Solutions
    • Zero Trust Security
    • Cloud Security
    • Web Application & API Protection
    • SIEM Logging & Monitoring
    • Risk Based Vulnerability Management
  • Services
    • Cyber Essentials & Cyber Essentials Plus Certification
    • IASME Cyber Assurance Certification
    • ISO27001 Certification
    • Penetration Testing
    • Cloud Security Assessment
    • Managed Detection & Response
    • Managed Security Services
    • Managed Compliance Services
  • Company
    • About Us
    • Customer Success Story
    • Free Resources >
      • Whitepaper - How To Prioritize Risk Across the Attack Surface
      • The Ultimate Guide to Achieving Cyber Essentials Plus Certification
      • ISO 27001 Implementation Checklist
      • Whitepaper - What is Credential Stuffing? How To Prevent Credential Stuffing Attacks.
      • eBook: Effective Security Strategies for Devops & Application Services
      • eBook - How To Build A Next Generation SOC
      • Free Cyber Security Assessment & Consultation
    • Free Trial >
      • Armoryze USM Anywhere - Free Trial
    • Careers >
      • Account Manager
      • Business Development Manager
      • Cyber Security Engineer
    • Contact Us
    • Blog
    • Privacy-Policy
  • SHOP
    • Cyber Essentials Certification
    • Cyber Essentials Certification with Expert Assistance
    • Cyber Essentials Plus Certification

CYBER SECURITY THREAT INTELLIGENCE REPORT – WEEK ENDING 31 OCT 2020

2/11/2020

0 Comments

 
Picture
TrickBot is a module-based malware that can extend its capabilities by downloading new modules from its command-and-control (C&C) server and executing them on its victim's device. While it was initially identified as a banking Trojan, it has gradually extended its reach to collect credentials from its victims' email accounts, browsers, installed network apps, and so on. It can also send spam to its victim's email contacts as well as deliver other malware to the victim's device, such as Emotet.

TrickBot is considered one of the world's largest botnets that had infected more than 1 million computers, including many Internet-of-Things (IoT) devices. Last week, multiple cybersecurity firms led by Microsoft orchestrated a global takedown against TrickBot. Even though they were capable of taking down 94% of TrickBot's infrastructure, the botnet is still alive. It looks like the botnet authors use hacked MikroTik routers instead of the actual C&C servers to keep the botnet alive and push new server lists to the infected hosts. According to cyber intelligence reseachers, the remaining C&C servers are in Brazil, Colombia, Indonesia, and Kyrgyzstan.

As always, a robust cooperative cyber security fabric that enables you to virtually patch vulnerable systems using intrusion prevention system (IPS) signatures along with endpoint detection measures provides malware protection across the organization. Appropriate network segmentation to prevent threat propagation is also key to securing your organization. Check out our latest white papers on how to secure your organization without compromising performance.
Picture
Tongda.Office.Anywhere.gateway.php.handling.Path.Traversal – CVE-2019-9759 indicates an attack attempt to exploit a Directory Traversal Vulnerability in Tongda Office Anywhere. This vulnerability is due to improper handling of the request parameters in the vulnerable application. A remote attacker could exploit this vulnerability by sending a crafted HTTP request to the targeted server. Successful exploitation of the vulnerability could lead to disclosure of sensitive information or remote code execution which may be used to facilitate further exploitation.
Picture
Ryuk Ransomware – According to Global Threat Landscape Report 2020 there has been an increased amount of ransomware attacks. Ryuk is a well-known ransomware variant and has been used in targeting large organizations. It is thought to be tailored by each attacker to the victim organization's unique configurations and network designs. Different versions have been reviewed in the past. However, due to its targeted and ever-evolving nature, it is interesting to see the latest variants in store. Security researchers took a look at the latest encryption and evasion techniques. According to a supervisory special agent from the FBI, the Ryuk ransomware generated over $61 million so far.

AV Signatures:
W32/Injector.ENRF!tr W32/Zenpak.AS!tr
 
Indicator(s):
7e28426e89e79e20a6d9b1913ca323f112868e597fcaf6b9e073102e73407b47
f8bc1638ec3b04412f708233e8586e1d91f18f6715d68cba1a491d4a7f457da0

Web Filtering
Windows malware 'GravityRAT' now a threat to Android and macOS users too – The GravityRAT malware, previously known only to infect Windows computers, enables attackers to retrieve sensitive hardware information about a system, search for files on a device, log victim keystrokes, take screenshots, execute shell commands, and get a list of running processes. According to Kaspersky's new report, the GravityRAT malware has recently been overhauled to infect both Android and macOS devices. This Android variant of the malware can steal user data, including email addresses, SMS messages, call logs, contact lists, and documents. The discovery was made when researchers observed a piece of malicious code inserted in an Android travel application for Indian users. Researchers then discovered many more legitimate-looking applications containing this malware, including those masquerading as secure file-sharing applications or media players. The threat actors also used digital signatures to make the applications look legitimate and avoid detection by basic scanners. The links to download these malicious applications are sent to targeted individuals through social media, and once the application is installed, the malware receives commands from the C2 server.
 
Indicator(s):
windowsupdates[.]eu
mozillaupdates[.]com
msoftserver[.]eu
nortonupdates[.]online
mozillaupdates[.]us
microsoftupdate[.]in
213[.]152[.]161[.]219
chat2hire[.]net
wesharex[.]net
click2chat[.]org

Our Research  & Insights:

Whitepaper: Effective Cyber Security Strategies during the Covid-19 Pandemic

Whitepaper: The Essential Guide to Securing Remote Access​

Secure Devops: Learn how to make security integral into your DevOps process.

​E-Book: Effective Security Strategies for Devops & Application Services

​E-Book: How to Build a Next Generation Security Operations Center


0 Comments

Your comment will be posted after it is approved.


Leave a Reply.

    Book Free - Cyber Security Assessment & Consultation!
    BOOK NOW

      Free - Sign up for email cyber security news & updates!​
    REGISTER ME NOW

    Follow Us and Share on Social Media. Join the Community to fight cyber crime.
    Picture
    Picture
© 2023 Armoryze Consultancy Services, All Rights Reserved
Picture
  • Home
  • Solutions
    • Zero Trust Security
    • Cloud Security
    • Web Application & API Protection
    • SIEM Logging & Monitoring
    • Risk Based Vulnerability Management
  • Services
    • Cyber Essentials & Cyber Essentials Plus Certification
    • IASME Cyber Assurance Certification
    • ISO27001 Certification
    • Penetration Testing
    • Cloud Security Assessment
    • Managed Detection & Response
    • Managed Security Services
    • Managed Compliance Services
  • Company
    • About Us
    • Customer Success Story
    • Free Resources >
      • Whitepaper - How To Prioritize Risk Across the Attack Surface
      • The Ultimate Guide to Achieving Cyber Essentials Plus Certification
      • ISO 27001 Implementation Checklist
      • Whitepaper - What is Credential Stuffing? How To Prevent Credential Stuffing Attacks.
      • eBook: Effective Security Strategies for Devops & Application Services
      • eBook - How To Build A Next Generation SOC
      • Free Cyber Security Assessment & Consultation
    • Free Trial >
      • Armoryze USM Anywhere - Free Trial
    • Careers >
      • Account Manager
      • Business Development Manager
      • Cyber Security Engineer
    • Contact Us
    • Blog
    • Privacy-Policy
  • SHOP
    • Cyber Essentials Certification
    • Cyber Essentials Certification with Expert Assistance
    • Cyber Essentials Plus Certification