TI10 Summary: Government agencies & state leaders partner to thwart cyberattacks on water systems
Article Title: White House and EPA warn of hackers breaching water systems
Threat Type: Ransomware, Vulnerability
Industry: Utilities (Water)
Impact to Business: Disruption, Financial, Physical Damage
Additional Info: In recent months, Iranian & Chinese state-backed hackers have targeted & breached U.S. water systems
Mitigation:
TI10 Summary: Content provider lures victims into downloading malware with wallpaper, games or software ads
Article Title: The rise of Charcoal Stork
Threat Type: Social Engineering, Malware
Industry: Not specific
Impact to Business: Information Disclosure
Additional Info: Named Charcoal Stork; “A suspected pay-per-install (PPI) content provider that’s responsible for the malvertising or the search engine optimization (SEO) that gets the user (otherwise known as the victim) to download its affiliate’s malware.” - Laura Brosnan & Christina Johns
Mitigation:
TI10 Summary: Phishing campaign lures victims into downloading malicious software leading to unauthorized access
Article Title: VCURMS: A Simple and Functional Weapon
Threat Type: Malware
Industry: Not specific
Impact to Business: Information Disclosure, Unauthorized Access
Additional Info: The hackers operation deploys multiple malicious programs including remote access trojans, infostealers & keyloggers to collect sensitive data from the victim. The hacker uses obfuscation techniques to avoid detection & email for communicating with the command & control server.
Mitigation:
Source: https://www.fortinet.com/blog/threat-research/vcurms-a-simple-and-functional-weapon
TI10 Summary: Russian hackers accessed Microsoft’s source code & likely stole credentials
Article Title: Microsoft says Russian hackers breached its systems, accessed source code
Threat Type: Cyber Espionage, Password Spray
Industry: Information Technology (& others including Government)
Impact to Business: Information Disclosure
Additional Info: Hacker group named 'Midnight Blizzard’ used a password spray attack to gain access to Microsoft’s corporate email servers and likely steal authentication tokens, API keys, or credentials.
“A password spray is a type of brute force attack where threat actors collect a list of potential login names and then attempt to log in to all of them using a long list of possible passwords. If one password fails, they repeat this process with other passwords until they run out or successfully breach the account. For this reason, companies must configure MFA on all accounts to prevent access, even if credentials are correctly guessed.” - Bleeping Computer
Mitigation:
Additional mitigation from Microsoft
TI10 Summary: Hackers employ stealth leveraging legitimate software to exfiltrate data & establish persistence in victim networks
Article Title: Data Exfiltration: Increasing Number of Tools Leveraged by Ransomware Attackers
Threat Type: Ransomware
Industry: Not specific
Impact to Business: Disruption, Financial
Additional Info: “Data exfiltration is now a key step in the attack chain for most ransomware actors and many see stolen data as their most effective way of extorting organizations. While some malware is still being authored for this purpose, many attackers are turning to legitimate software packages in the belief that they are less likely to trigger alerts when deployed on their victims’ networks.” - Symantec
Mitigation:
TI10 Summary: Ransomware attacks target government & critical infrastructure via phishing or exposed services
Article Title: Phobos Ransomware Aggressively Targeting U.S. Critical Infrastructure
Threat Type: Ransomware
Industry: Critical Infrastructure, Government
Impact to Business: Disruption, Financial
Additional Info: “Attack chains involving the ransomware strain have typically leveraged phishing as an initial access vector to drop stealthy payloads like SmokeLoader. Alternatively, vulnerable networks are breached by hunting for exposed RDP services and exploiting them by means of a brute-force attack.” - Bleeping Computer
Mitigation:
1. Secure RDP ports to prevent threat actors from abusing and leveraging RDP tools.
2. Prioritize remediating known exploited vulnerabilities.
3. Implement EDR solutions to disrupt threat actor memory allocation techniques.
Additional mitigation provided by Cybersecurity and Infrastructure Security Agency (CISA)
Source: https://thehackernews.com/2024/03/phobos-ransomware-aggressively.html
TI10 Summary: Ransomware shuts down production at German steel company’s automotive unit
Article Title: Steel giant ThyssenKrupp confirms cyberattack on automotive division
Threat Type: Ransomware
Industry: Automotive
Impact to Business: Disruption
Additional Info: ThyssenKrupp is continuing to investigate the incident. “At this point, the spokeswoman said, there is no indication data has been stolen or altered, and other parts of its Automotive Technology division haven’t been affected.” - WSJ
Mitigation:
https://www.wsj.com/articles/thyssenkrupp-auto-unit-hit-by-cyberattack-34b41469
https://cybersocialhub.com/csh/german-steelmaker-thyssenkrupp-confirms-ransomware-attack/
TI10 Summary: Malware takes steps to evade analysis & hide its network traffic
Article Title: Xeno RAT Abuses Windows DLL Search To Avoid Detection
Threat Type: Malware
Industry: Not specific
Impact to Business: Information Disclosure
Additional Info: Named, Xeno RAT. This malware uses defense evasion, obfuscation, anti-debugging, & other techniques to avoid detection.
“It is delivered via a shortcut file and multi-stage payload downloader. Xeno RAT abuses the Windows DLL search order to load a malicious DLL into legitimate processes. It has capabilities like monitoring, hidden VNC, SOCKS5 proxy, process injection, and C2 communication.” - AlienVault
Mitigation: Scan endpoints for indicators of compromise (IOCs)
Source: https://cybersecuritynews.com/xeno-rat-windows-dll-evasion/
TI10 Summary: Healthcare organizations advised to implement mitigation to defend against BlackCat ransomware attacks
Article Title: FBI, CISA warn US hospitals of targeted BlackCat ransomware attacks
Threat Type: Ransomware
Industry: Healthcare
Impact to Business: Information Disclosure, Business Disruption
Additional Info: ALPHV/Blackcat gang has raked in at least $300 million in ransoms from over 1,000 victims until September 2023.
Mitigation: Healthcare and Public Health (HPH) Cybersecurity Performance Goals https://hphcyber.hhs.gov/performance-goals.html
TI10 Summary: Russian hackers target cloud infrastructure using compromised credentials, dormant accounts, & stolen access tokens
Article Title: Russian hackers shift to cloud attacks, US and allies warn
Threat Type: Initial Access (brute force & password spraying)
Industry: Government, Healthcare, Energy & Utilities, Aviation, Education, Law Enforcement, Financial, Military
Impact to Business: Information Disclosure
Additional Info: Tracked as APT29 (also tracked as Cozy Bear, Midnight Blizzard, The Dukes) breached multiple U.S. federal agencies following the SolarWinds supply-chain attack they orchestrated more than three years ago.
"As organizations continue to modernize their systems and move to cloud-based infrastructure, the SVR has adapted to these changes in the operating environment.”
"They have to move beyond their traditional means of initial access, such as exploiting software vulnerabilities in an on-premises network, and instead target the cloud services themselves." - CISA joint advisory
Mitigation:
Copyright © 2024 TI10 - All Rights Reserved.
Powered by GoDaddy
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.