20200729
pdf
keyboard_arrow_up
School
Wichita State University *
*We aren’t endorsed by this school
Course
453
Subject
Information Systems
Date
Nov 24, 2024
Type
Pages
7
Uploaded by eras3r98
UNCLASSIFIED
Page 1
29 July 2020
Table of Contents
Industrial VPN vulnerabilities put critical infrastructure at risk
Ransomware: These free decryption tools have now saved victims over $600m
U.S. cybersecurity firm says Beijing-linked hackers target Vatican ahead of talks
Office 365 phishing baits employees with fake SharePoint alerts
Windows 10: New bug hits popular built-in security features
Emotet malware now steals your email attachments to attack contacts
Cerberus banking Trojan team breaks up, source code goes to auction
North Korean hackers created VHD ransomware for enterprise attacks
OkCupid: Hackers want your data, not a relationship
Feature-rich Ensiko malware can encrypt, targets Windows, macOS, Linux
Industrial VPN vulnerabilities put critical infrastructure at risk
BleepingComputer, 28 Jul 2020:
Security researchers analyzing popular remote access
solutions used for industrial control systems (ICS) found multiple vulnerabilities that
could let unauthenticated attackers execute arbitrary code and breach the
environment.
The flaws are in virtual private network (VPN) implementations
and
adversaries could exploit them cause physical damage by connecting to field devices
and programmable logic controllers (PLCs).
After discovering and reporting a critical
vulnerability (CVE-2020-14511) in Moxa EDR-G902 and EDR-G903 series routers
(version 5.4 and below), Claroty Research Team found that products from Secomea
and HMS Networks also had severe flaws that could be leveraged to gain full access to
the internal network without authentication.
Remote access servers like Secomea
GateManager manage secure connections from outside the local network. They are
critical assets and attackers with access to them can view internal traffic and reach
hosts on the network.
"If carried out successfully, such an attack could result in a
complete security breach that grants full access to a customer’s internal network,
along with the ability to decrypt all traffic that passes through the VPN."
Claroty
created proof-of-concept exploit code to demonstrate that leveraging the
vulnerability for root access is possible and prepared a video with an attack in action.
Secomea received a report about the bug and its severity in May and released a patch
on July 2020. Organizations using GateManager are strongly advised to prioritize
applying the patch.
Another vulnerability that could lead to remote code execution
was discovered in eWon VPN. A product from HMS Networks, eWon allows remote
clients to connect to it using a proprietary VPN client called eCatcher.
Brizinov found
that a vulnerability in eCatcher could allow unauthenticated remote code execution.
Identified as CVE-2020-14498, the bug could be triggered by visiting a malicious
website or opening a crafted email with a specific HTML element.
In a scenario
demonstrated by Claroty, a threat actor could send a phishing email to a target to
trigger the flaw and potentially get access to the restricted network.
Purpose
Educate recipients of cyber
events to aid in protecting
electronically stored DoD,
corporate proprietary, and/or
Personally Identifiable
Information from unauthorized
access, theft or espionage
Source
This publication incorporates
open source news articles to
educate readers on cyber
security matters IAW USC Title
17, section 107, Para a. All
articles are truncated to avoid
the appearance of copyright
infringement
Newsletter Team
* SA Sylvia Romero
Albuquerque FBI
* CI Agent Scott Daughtry
Purple Arrow Founder
Subscription/Questions
Click
HERE
to request for your
employer-provided email address
to be added to this product’s
distribution list
Purple Arrow Overview
The Purple Arrow Working Group
was founded in 2009 to address
suspicious reporting originating
from New Mexico (NM) cleared
companies. Purple Arrow is a
subset of the NM CI Working
Group.
Purple Arrow Members
Our membership includes
representatives from these New
Mexico-focused agencies:
902nd
MI, AFOSI, DOE, DCSA, DTRA, FBI,
HSI and NCIS
Disclaimer
Viewpoints, company names, or
products within this document
are not necessarily the opinion
of, or an endorsement by, the FBI
or any member of the Purple
Arrow Working Group or NM CI
Working Group
Distribution
You may freely forward this
product to U.S. person
co-workers or other U.S. agency /
U.S. company managed email
accounts
Personal Email/Foreigners
The FBI will
not
send Purple
Arrow products to a non-United
States employer-provided email
account (e.g. Hotmail, Gmail)
UNCLASSIFIED
Page 2
Ransomware: These free decryption tools have now saved
victims over $600m
ZD Net, 27 Jul 2020:
Over four million victims of ransomware attacks have now
avoided paying over £600 million in extortion demands to cyber criminals in the first
four years of Europol's No More Ransom initiative.
First launched in 2016 with four
founding members, No More Ransom (
link
) provides free decryption tools for
ransomware and has been growing ever since, now consisting of 163 partners across
cybersecurity, law enforcement bodies, financial services and more.
Together,
they've released free decryption tools for over 140 families of ransomware that have
been downloaded a combined total of over 4.2 million times – something that
Europol estimates has prevented $632 million from being paid out to cyber criminals.
Among the top contributors to the project are Emsisoft, which has provided 54
decryption tools for 45 ransomware families, founding member Kaspersky, which has
provided five tools for 32 ransomware families and Trend Micro, which has provided
two decryption tools for 27 ransomware families.
Other cybersecurity firms that have
provided multiple tools to No More Ransom include Avast, Bitdefender, Check Point,
ESET and founding member McAfee.
No More Ransom is now available in 36
languages and has received visitors from 188 countries around the world. The largest
number of visitors come from South Korea, the US, Brazil, Russia and India.
Despite
the best efforts of No More Ransom and other cybersecurity initiatives, ransomware
remains a highly effective money-making tool for cyber criminals, who in many cases
can make hundreds of thousands or even millions of pounds from a single attack.
However, applying security updates and patches to PCs and networks can go a long
way to stopping attacks in the first place.
"No More Ransom is like a car seatbelt: it's
a critical safety net, but it's best to abide by the rules of the road to lessen the chance
of needing to use it. Or, to be put it another way, ransomware is definitely a case in
which prevention is better than cure," says Brett Callow, threat analyst at Emsisoft.
U.S. cybersecurity firm says Beijing-linked hackers target
Vatican ahead of talks
Reuters, 29 Jul 2020:
Hackers linked to the Chinese government have infiltrated
Vatican computer networks, including the Roman Catholic Church's Hong Kong-based
representative, a U.S. firm that tracks state-backed cyber attacks said on Wednesday .
It said the attacks began in May. The Vatican and Beijing were expected to engage in
talks this year over the renewal of a landmark 2018 deal that stabilised relations
between China and the Church.
U.S. cybersecurity firm Recorded Future said in the
report that the attacks targeted the Vatican and the Catholic diocese of Hong Kong,
including the head of the Hong Kong Study Mission, who is seen as Pope Francis' de
facto representative to China.
The report said the targets included communications
Incident Reporting
- Cleared Company: notify your
Defense Counterintelligence and
Security Service representative. If
the event compromised DoD
information, you must also
initiate the
DIBNET
process.
-
Financial Scam/Fraud:
submit a
complaint to the FBI’s Internet
Crime Complaint Center (
IC3
)
- Children:
if a child has been
targeted via the Internet, contact
your state’s Attorney General via
their web site. They likely have
an Internet Crimes against
Children task force that
specializes in this crime category
Cyber investigations are likely to
require the original offending
email (to obtain the email
headers) and/or log files that are
generated/maintained by an IDS,
router or firewall. Ensure your IT
office preserves this information
should law enforcement request
them for analysis.
Newsletter Archival
We do not maintain a formal
archive of this newsletter. Your
company/agency may archive
Purple Arrow products on its
internal network. This product
may NOT be altered in any way.
Cybersecurity Training
All employees must understand
cyber threats and think
defensively every time they use
automated systems. Many
intrusions occur because a single
employee failed basic
cybersecurity practices and
clicked on a hostile hyperlink or
opened a malicious file
attachment. The Defense
Counterintelligence and Security
Agency (formerly known as DSS)
offers free cyber training via its
Center for Development of
Security Excellence (CDSE)
website. Click
HERE
for info
UNCLASSIFIED
Page 3
between the Hong Kong diocese and the Vatican and used similar tools and methods previously identified with
Chinese state-backed hacking groups.
Beijing routinely denies it engages in any state-backed hacking
attempts, and says it is a victim of such threats.
The reported hacking follows an extremely rare meeting
between Beijing and the Vatican's foreign minister earlier this year in Germany, marking the highest-level
official encounter between the two sides in decades.
Office 365 phishing baits employees with fake SharePoint alerts
BleepingComputer, 27 Jul 2020:
Employees using Microsoft Office 365 are targeted in a phishing campaign
that makes use of bait messages camouflaged as automated SharePoint notifications to steal their accounts.
The phishing emails delivered as part of this phishing campaign are addressed to all employees working at
targeted organizations and have until now reached an estimated number of up to 50,000 mailboxes based on
stats from email security company Abnormal Security.
What makes these phishing messages potentially
dangerous is the fact that they're using a shotgun approach, trying to trick at least one employee and then use
their credentials to further compromise their employer's systems.
The attackers behind this phishing
campaign did their best to keep the phishing messages as short and vague as possible, and they also made it a
point to include the targeted company's name multiple times within the emails.
"In the email body, the
recipient’s company name was also used numerous times to impersonate an internal document shared by this
service," Abnormal Security explains.
"Recipients may be convinced that the email is safe and coming from
their company because of the repetitive inclusion of the company name."
The phishing messages' goal is to
make the targets click on an embedded hyperlink that sends them to a SharePoint themed landing page
through a series of redirects.
This is where they are required to click on a button to download "important
documents" mentioned within the phishing emails, a button that will either download a PDF that sends them
to another website or that will redirect them to a submission form where they are asked to input their
credentials.
If the targets fall for the phishers' tricks, their Microsoft credentials will give the attackers' full
control of their Office 365 accounts, with their information to be stolen and used as apart of identity theft and
fraud schemes such as Business Email Compromise (BEC).
Windows 10: New bug hits popular built-in security features
ZD Net, 27 Jul 2020:
Microsoft says it is working on a fix for an error that prevents Windows Sandbox and
Windows Defender Application Guard from opening.
The issue affects Windows 10 versions 1903, 1909, and
2004. When failing to open, the bug triggers the error message
'ERROR_VSMB_SAVED_STATE_FILE_NOT_FOUND (0xC0370400)' or 'E_PATHNOTFOUND (0x80070003)'.
Windows Sandbox is a relatively new feature of Windows 10 Pro and Enterprise editions since version 1903
that lets users launch a virtual machine with a basic version of Windows 10 to run potentially suspicious
software without the risk of it affecting the main Windows 10 installation. The feature has proved popular
with IT pros because of its ability to safely run potentially risky executables in a container, and Microsoft
included several improvements to Windows Sandbox in Windows 10 version 2004.
WDAG comes into play
when users access a URL outside that list. It launches Microsoft Edge in a Hyper-V container to keep the
browser isolated from the operating system. Microsoft released WDAG extensions for Chrome and Firefox last
year.
"To mitigate this issue after receiving one of the above error messages, you will need to restart your
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
UNCLASSIFIED
Page 4
device," Microsoft explains in a support note. Microsoft plans on addressing the bug in an upcoming release of
Windows 10. However it hasn't said when the fix is expected to arrive.
Emotet malware now steals your email attachments to attack contacts
BleepingComputer, 28 Jul 2020:
The Emotet malware botnet is now also using stolen attachments to increase
the authenticity of spam emails used for infecting targets' systems.
This is the first time the botnet is using
stolen attachments to add credibility to emails as Binary Defense threat researcher James Quinn told
BleepingComputer. The attachment stealer module code was added around June 13th according to Marcus
'MalwareTech' Hutchins.
This new tactic adds to the Emotet gang's leveraging of hijacked email conversation
threads where a malicious URL or attachment would be included in new emails attached to existing
conversations as a concealment measure (as first spotted by Minerva Labs in March 2019).
"Emotet seems to
be using not only stolen email bodies, but is now including stolen attachments as well," email security firm
Cofense said today.
"This lends to even more authenticity in their phishing emails. In one example we found 5
benign attachments and a dropper link within the templated portion of the email."
The botnet has been
delivering massive amounts of malicious spam emails — camouflaged as payment reports, invoices,
employment opportunities, and shipping information — through all its server clusters starting with July 17,
after more than five months of inactivity.
Since it has returned to life, Emotet first started installing the
TrickBot trojan on compromised Windows computers, later to switch to once again heavily spreading QakBot
malware, fully replacing the TrickBot payloads.
At the moment, there is no exact info on QakBot's final
payloads but reports say that it will deploy ProLock ransomware on some of the systems initially infected with
Emotet.
This huge spike of activity was behind Emotet being ranked first in a list of top 10 malware strains
analyzed on the interactive malware analysis platform Any.Run during the last week, head and shoulders
above the next malware in the top (the njRAT Remote Access Trojan), with more than double the number of
sample uploads submitted for analysis.
Cerberus banking Trojan team breaks up, source code goes to auction
ZD Net, 27 Jul 2020:
The source code of the Android-based Cerberus banking Trojan is being auctioned off due
to the break-up of the development team.
As reported by Bleeping Computer, the malware's maintainer
recently posted an advert on an underground forum for Russian speakers offering the malware on a bidding
basis, with the hopes of generating up to $100,000 from the sale. According to the post, spotted by Hudson
Rock, the operator is attempting to sell off the full project at a starting price of $50,000, including the Trojan's
.APK source code, module code, the code for administrator panels, and servers. In addition, threat actors
looking to adopt the malware into their own toolkits are being offered Cerberus' customer base with active
licensing and the required installation materials. The seller says that the project is being sold off due to a "lack
of time" and because the "team has broken up" -- leading to what appears to be a single maintainer left to
support customers. To try and lure potential bidders, the seller claims that the Android malware is generating
$10,000 in profit per month. Cerberus has been in circulation since 2019 and was spotted earlier this month in
the Google Play store, having bypassed Google's app protections. A seemingly-legitimate currency converter
app designed for Spanish speakers -- downloaded over 10,000 times before its removal -- deployed the Trojan
on Android devices by way of a malicious update performed months after the app passed security inspections.
Once deployed on a device, the malware creates overlays across existing financial service and banking apps in
UNCLASSIFIED
Page 5
order to steal account credentials that are then sent to the attacker's command-and-control (C2) server. The
Trojan is also able to intercept 2FA mechanisms, such as one-time passcodes (OTP), to obtain the information
necessary to pilfer financial accounts. ThreatFabric researchers said in February that test versions of the
malware are able to abuse Android Accessibility privileges to steal OTPs from Google Authenticator, software
designed to enhance the security of 2FA in comparison to one-time SMS messages. Cerberus has many of the
standard capabilities of Remote Access Trojans (RATs), including data theft modules, keylogging, phone call
recording, and SMS grabbing. The malware is also advertised as being able to lock mobile devices, uninstall
apps, push notifications, and self-destruct.
The Android malware’s operator is hoping the code and client list
will net them up to $100,000.
The source code of the Android-based Cerberus banking Trojan is being
auctioned off due to the break-up of the development team. Once deployed on a device, the malware creates
overlays across existing financial service and banking apps in order to steal account credentials that are then
sent to the attacker's command-and-control (C2) server. The Trojan is also able to intercept 2FA mechanisms,
such as one-time passcodes (OTP), to obtain the information necessary to pilfer financial accounts.
ThreatFabric researchers said in February that test versions of the malware are able to abuse Android
Accessibility privileges to steal OTPs from Google Authenticator, software designed to enhance the security of
2FA in comparison to one-time SMS messages. Cerberus has many of the standard capabilities of Remote
Access Trojans (RATs), including data theft modules, keylogging, phone call recording, and SMS grabbing. The
malware is also advertised as being able to lock mobile devices, uninstall apps, push notifications, and self-
destruct.
North Korean hackers created VHD ransomware for enterprise attacks
BleepingComputer, 28 Jul 2020:
North Korean-backed hackers tracked as the Lazarus Group have developed
and are actively using VHD ransomware against enterprise targets according to a report published by
Kaspersky researchers today.
The researchers found VHD ransomware samples between March and May
2020 during two investigations, being deployed over the network with the help of an SMB brute-forcing
spreading tool and the MATA malware framework (also known as Dacls).
"Functionally, VHD is a fairly
standard ransomware tool. It creeps through the drives connected to a victim’s computer, encrypts files, and
deletes all System Volume Information folders (thereby sabotaging System Restore attempts in Windows),"
the report reads.
"What’s more, it can suspend processes that could potentially protect important files from
modification (such as Microsoft Exchange or SQL Server)." While analyzing the two incidents, Kaspersky's
researchers were able to determine the entire VHD ransomware infection chain starting with the attackers
gaining access to their victims' network after successfully exploiting vulnerable VPN gateways.
Next, they
escalated their privileges on the compromised devices and installed a backdoor, part of the multi-platform and
modular MATA malware framework.
Kaspersky linked the MATA framework to the Lazarus hackers based on
unique orchestrator filenames used in versions of the Manuscrypt trojan (also known as Volgmer).
Once the
backdoor deployed, it allowed the attackers to take control of their victims' Active Directory server which
made it possible to deliver VHD ransomware payloads to all systems on the network within 10 hours with the
help of a Python-based loader.
Kaspersky attributed the VHD ransomware to the Lazarus Group based on the
tools used to deploy the ransomware as part of the two attacks and the lateral movement tactics also
observed in previous Lazarus intrusions.
UNCLASSIFIED
Page 6
OkCupid: Hackers want your data, not a relationship
ZD Net, 29 Jul 2020:
Researchers exploring OkCupid for security holes have found a way for hackers to pillage
the sensitive data of users. OkCupid has catered to over 50 million registered users since its launch. As one of
the most popular options out there for dating -- alongside rivals such as Tinder, Plenty of Fish, eHarmony,
Match, and Grindr -- the online dating platform is used to organize roughly 50,000 dates per week. Dating
apps experiencing a surge in users or requests for new features -- such as video chats -- began changing the
way their platforms worked, and OkCupid was no exception. The dating platform has experienced a 20%
increase in conversations worldwide and a 10% increase in matches since the beginning of lockdowns imposed
due to COVID-19.
On Wednesday, Check Point Research disclosed a set of vulnerabilities in OkCupid that
could lead to the exposure of sensitive profile data on the OkCupid app, the hijack of user accounts to perform
various actions without their permission, and the theft of user authentication tokens, IDs, and email
addresses.
The app in question is OkCupid on Android, with version 40.3.1 on Android 6.0.1 becoming the test
subject. The cybersecurity researchers reverse-engineered the mobile software and discovered "deep link"
functionality, which meant that it could be possible for attackers to send custom, malicious links to open the
mobile app. Reflected Cross-Site Scripting (XSS) attack vectors were also discovered due to coding issues in the
app's user settings functionality, which opened up a path for the deployment of JavaScript code. Combined, an
attacker could send an HTTP GET request and an XSS payload from their own server, of which JavaScript could
then be executed via WebView.
If a victim clicks on a crafted link -- potentially sent personally through the
app or posted on a public forum -- PII, profile data, user characteristics -- such as those submitted when
profiles are created -- preferences, email addresses, IDs, and authentication tokens could all be compromised
and exfiltrated to the attacker's command-and-control server (C2). As the vulnerabilities could be used to steal
IDs and tokens, this could also lead to attackers executing actions on their behalf, such as sending messages.
However, a full account takeover is not possible due to existing cookie protections. Check Point also
uncovered a misconfigured Cross-Origin Resource Sharing (CORS) policy in the API server of api.OkCupid.com,
allowing any origin to send requests to the server and to read responses. Further attacks could lead to the
filtration of user data from the profile API endpoint. While the theft of information submitted to a dating app
may not seem like such a big deal, the wealth of personal data possibly harvested by attackers could be used
in social engineering attempts, leading to far more damaging consequences.
Feature-rich Ensiko malware can encrypt, targets Windows, macOS, Linux
BleepingComputer, 28 Jul 2020:
Threat researchers have found a new feature-rich malware that can encrypt
files on any system running PHP, making it a high risk for Windows, macOS, and Linux web servers.
The
malware received the name Ensiko and is a web shell written in PHP. Attackers can use it to remotely control a
compromised system and run a host of malicious activities.
From Ensiko’s large list of capabilities, the file-
encryption component stands out as it can be used for ransomware attacks against servers.
Researchers at
Trend Micro analyzed the malware and found that it uses the symmetric Rijnadel-128 cipher in CBC mode to
encrypt files. Below is the code responsible for locking and unlocking the data.
Ensiko encrypts files in a web
shell directory and subdirectories and appends the .BAK extension to processed files.
The researchers found
that the malware can be password protected for secure access and avoid a takeover like it happened last week
with Emotet when someone replaced the malware payloads with memes.
Authenticating to this web shell is
not straightforward. The developer hid the login form on a “Not Found” page. For the analyzed sample, the
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
UNCLASSIFIED
Page 7
access key is “RaBiitch.”
To expand capabilities, Ensiko can load several tools, which the malware downloads
from Pastebin and stores them in a directory named “tools_ensikology.”
One of the functions of the malware
is called Steganologer, which can identify image files that have code in their metadata (EXIF headers). The
code is then extracted and executed on the compromised server.
Trend Micro malware analyst Aliakbar
Zahravi discovered that Ensiko can also check if a web shell from a predefined list is present on a remote host.
Another scanning function called Remote File Check allows the operator to look for arbitrary files on a remote
system.
Another function in this malicious tool allows recursive overwrite of all files with a specified extension
in a directory of a web shell.
Ensiko’s capabilities do not stop at this, though. The malware lets threat actors
run brute-force attacks on FTP, cPanel, and Telnet, thus enabling them extended access.