Unit 42 Threat Intel Bulletin - December

Unit 42 Threat Intel Bulletin - December

Cybersecurity Trends

Hear expert insights into attack methods, trends and best practices:

Respond with confidence. Partner with experts.
No alt text provided for this image
Get the Unit 42 Threat Intel Bulletin delivered to your inbox.

Unit 42 Threat Intel Blogs

Unit 42 Finds Three Vulnerabilities in OpenLiteSpeed Web Server

Unit 42 Finds Three Vulnerabilities in OpenLiteSpeed Web Server (Cloud, Vulnerability) 

The Unit 42 research team has researched and discovered three different vulnerabilities in the open source OpenLiteSpeed Web Server. These vulnerabilities also affect the enterprise version, LiteSpeed Web Server. By chaining and exploiting the vulnerabilities, adversaries could compromise the web server and gain fully privileged remote code execution.

Read up on these vulnerabilities

Typhon Reborn with New Capabilities

Typhon Reborn with New Capabilities (Malware) 

In early August 2022, Cyble Research Labs (a cybercrime monitoring service) uncovered a new crypto miner/stealer for hire that the malware author named Typhon Stealer. Shortly thereafter, they released an updated version called Typhon Reborn. Both versions have the ability to steal crypto wallets, monitor keystrokes in sensitive applications and evade antivirus products.

Discover all the details

Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the Wild

Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the Wild (Tutorial) 

As Cobalt Strike remains a premier post-exploitation tool for malicious actors trying to evade threat detection, new techniques are needed to identify its Team Servers. To this end, we present new techniques that leverage active probing and network fingerprint technology. This is a fundamental change from previous passive traffic detection approaches. 

Understand the new techniques 

Banking Trojan Techniques: How Financially Motivated Malware Became Infrastructure

Banking Trojan Techniques: How Financially Motivated Malware Became Infrastructure (Malware) 

While advanced persistent threats get the most breathless coverage in the news, many threat actors have money on their mind rather than espionage. You can learn a lot about the innovations used by these financially motivated groups by watching banking Trojans.

Because attackers constantly create new techniques to evade detection and perform malicious acts, studying monetarily motivated malware can help defenders understand threat actor tactics and protect organizations more effectively. Some of the banking Trojans described here are historically known for being financial malware, but now they’re primarily used as infrastructure to deliver other malware. Which is to say, by preventing techniques used by banking Trojans, you can also stop other types of threats.

Learn more about banking Trojans

Defeating Guloader Anti-Analysis Technique

Defeating Guloader Anti-Analysis Technique (Malware, Tutorial)

Unit 42 researchers recently discovered a Guloader variant that contains a shellcode payload protected by anti-analysis techniques, which are meant to slow human analysts and sandboxes processing this sample. To help speed analysis for this sample and others like it, we are providing a complete Python script to deobfuscate the Guloader sample that is available on GitHub.

Check out more

Trends in Web Threats: Old Web Skimmer Still Active Today

Trends in Web Threats: Old Web Skimmer Still Active Today (Malware)

Palo Alto Networks Advanced URL Filtering subscription collects data regarding two types of URLs; landing URLs and host URLs. We define a malicious landing URL as one that provides an opportunity for a user to click a malicious link. A malicious host URL is a web page that contains a malicious code snippet that could abuse someone’s computing power, steal sensitive information or perform other types of attacks.

Read about the trends

CNAME Cloaking: Disguising Third Parties Through the DNS

CNAME Cloaking: Disguising Third Parties Through the DNS (Malware)

When you visit a website, do you ever feel like you’re being watched? Who is observing your movements through that website - or across the internet in general? Is it possible to limit or at least understand that information flow?

With advertising at the heart of much of the internet, user data is an invaluable resource to those companies that profit from monitoring people’s online activities. In many cases, the information they collect provides helpful (if not truly necessary) support for a good user experience. In other cases, tracking practices infringe on people’s privacy, and they have raised valid concerns.

Find out who’s watching you

Trends in Web Threats in CY Q2 2022: Malicious JavaScript Downloaders Are Evolving

Trends in Web Threats in CY Q2 2022: Malicious JavaScript Downloaders Are Evolving (Malware)

Palo Alto Networks Advanced URL Filtering subscription collects data regarding two types of URLs; landing URLs and host URLs. We define a malicious landing URL as one that allows a user to click a malicious link. A malicious host URL is a page containing a malicious code snippet that could abuse someone’s computing power, steal sensitive information or perform other types of attacks.

Our researchers regularly track web threats to better understand trends that develop over time. This blog will cover trends we’ve identified between April 2022 and June 2022 using our web threat detection module.

Read our Q2 trends of 2022

Ransom Cartel Ransomware: A Possible Connection with REvil

Ransom Cartel Ransomware: A Possible Connection with REvil (Ransomware, Threat Briefs and Assessments)

Ransom Cartel is #ransomware as a service (RaaS) that surfaced in mid-December 2021. This ransomware performs double extortion attacks and exhibits several similarities and technical overlaps with REvil ransomware. REvil ransomware disappeared just a couple of months before Ransom Cartel surfaced and just one month after 14 of its alleged members were arrested in Russia. When Ransom Cartel first appeared, it was unclear whether it was a rebrand of REvil or an unrelated threat actor who reused or mimicked REvil ransomware code.

In this report, we will provide our analysis of Ransom Cartel ransomware, as well as our assessment of the possible connections between REvil and Ransom Cartel ransomware.

What is Ransom Cartel?

Detecting Emerging Network Threats from Newly Observed Domains

Detecting Emerging Network Threats from Newly Observed Domains (Malware)

In May 2021, Palo Alto Networks launched a proactive detector employing state-of-the-art methods to recognize malicious domains at the time of registration, with the aim of identifying them before they are able to engage in harmful activities. The system scans newly registered domains (NRDs) and detects potential network abuses. However, the proactive detector has limitations; created to only focus on new domains, it cannot obtain and analyze malicious indicators appearing after a domain's creation. In addition, in the cases of adversaries leveraging or compromising aged domains to carry out attack traffic, the proactive detector fails to capture the emerging threats because the malicious domains are out of the scope of being considered NRDs.

Learn more about this detector

No alt text provided for this image

Threat Roll-up

  • (Major Cyber Event) CVE-2022-3786 and CVE-2022-3602: X.509 Email Address Buffer Overflows. (Source: OpenSSL)
  • (APT) Kimsuky (PANW: Sparkling Pisces) Hacker Group Targeting Mobile Users with New Android #Malware. (Source: S2W)
  • (Ransomware) LockBit 3.0 Malware Using Weaponized Word Doc to Drop Ransomware via Amadey Bot. (Source: AnhLab)
  • (APT) OPERA1ER hackers steal over $11 million from banks and telcos. (Source: Group-IB)
  • (Criminal) The Emotet malware operation is again spamming malicious emails after almost a four-month "vacation" that saw little activity from the notorious cybercrime operation. (Source: Cryptolaemus)
  • (Ransomware) Microsoft links Raspberry Robin worm to Clop #ransomware attacks. (Source: MSTIC)
  • (Ransomware) BlackByte #ransomware uses a new data theft tool for double-extortion. (Source: BleepingComputer)
  • (Ransomware) #Hackers exploit critical VMware flaw to drop ransomware, miners. (Source: BleepingComputer)

No alt text provided for this image

More Information

No alt text provided for this image

Under Attack?

If you think you may have been compromised or have an urgent matter, get in touch with the Unit 42 Incident Response team by filling out this form or calling: North America Toll-Free: 1.866.486.4842 (866.4.UNIT42), UK: +44.20.3743.3660, EMEA: +31.20.299.3130, APAC: +65.6983.8730, and Japan: +81.50.1790.0200.

If you have cyber insurance or legal counsel, you can request for Unit 42 to serve as your incident response team. Unit 42 is on over 70 cyber insurance panels as a preferred vendor.

Will A.

Startup Leader & Board Advisor || Technology & Data

2y

Love it! 😍

To view or add a comment, sign in

More articles by Palo Alto Networks Unit 42

Insights from the community

Others also viewed

Explore topics