Self Assessment

Weekly Intelligence Report – 28 June 2024

Published On : 2024-06-28
Share :
Weekly Intelligence Report – 28 June 2024

Ransomware of the Week

CYFIRMA Research and Advisory Team would like to highlight ransomware trends and insights gathered while monitoring various forums. This includes multiple – industries, geography, and technology – which could be relevant to your organization.

Type: Ransomware
Target Technologies: MS Windows

Introduction
CYFIRMA Research and Advisory Team has found COBRA Ransomware while monitoring various underground forums as part of our Threat Discovery Process.

COBRA Ransomware
By the End of June 2024 researchers discovered a new ransomware group called COBRA, this malicious program is based on Chaos. COBRA encrypted the files and added a “.COBRA” extension to their names. It then altered the desktop wallpaper and generated a ransom note in a text file titled “read_it_cobra.txt”.

Screenshot of files encrypted by ransomware (Source: SurfaceWeb)

COBRA’s ransom note informs the victim that their files have been encrypted and demands
$1,197,026 in Bitcoin (BTC) within 48 hours to restore the locked data. The note also lists the ransom as 18.301 BTC, which is approximately $1,191,488 at the time of writing, though exchange rates fluctuate.

If the victim does not comply, their files will be sold on the dark web and deleted from the infected network. The same consequences will occur if the victim attempts to remove the ransomware or contacts authorities.

Screenshot of COBRA ransomware’s text file (“read_it_cobra.txt”): (Source: SurfaceWeb)

Screenshot of COBRA’s desktop wallpaper (Source: SurfaceWeb)

Following are the TTPs based on the MITRE Attack Framework

Sr. No. Tactics Techniques/Sub-Techniques
1 TA0002: Execution T1106: Native API
T1129: Shared Modules
2 TA0003: Persistence T1176: Browser Extensions
T1547.001: Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
T1574.002: Hijack Execution Flow: DLL Side- Loading
3 TA0004: Privilege Escalation T1547.001: Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
T1548: Abuse Elevation Control Mechanism
T1574.002: Hijack Execution Flow: DLL Side- Loading
4 TA0005: Defense Evasion T1027: Obfuscated Files or Information
T1036: Masquerading
T1070.004: Indicator Removal: File Deletion
T1112: Modify Registry
T1140: Deobfuscate/Decode Files or Information
T1222: File and Directory Permissions Modification
T1497: Virtualization/Sandbox Evasion
T1548: Abuse Elevation Control Mechanism
T1562.001: Impair Defenses: Disable or Modify Tools
T1564.001: Hide Artifacts: Hidden Files and Directories
T1574.002: Hijack Execution Flow: DLL Side- Loading
5 TA0006: Credential Access T1003: OS Credential Dumping
T1552.001: Unsecured Credentials: Credentials In Files
T1555.003: Credentials from Password Stores: Credentials from Web Browsers
6 TA0007: Discovery T1010: Application Window Discovery
T1012: Query Registry
T1057: Process Discovery
T1082: System Information Discovery
T1083: File and Directory Discovery
T1087: Account Discovery
T1497: Virtualization/Sandbox Evasion
T1518: Software Discovery
7 TA0009: Collection T1005: Data from Local System
T1114: Email Collection
T1115: Clipboard Data
T1185: Browser Session Hijacking
8 TA0011: Command and Control T1071: Application Layer Protocol
9 TA0040: Impact T1485: Data Destruction
T1486: Data Encrypted for Impact
T1490: Inhibit System Recovery

Relevancy and Insights:

  • This ransomware specifically targets the widely used Windows Operating System, which is prevalent across numerous industries and organizations.
  • Detect-Debug-Environment: Debugging environments are used by developers to analyze and troubleshoot software. This technique is used by the ransomware to determine whether it is operating in a debug environment. This feature aids the ransomware in avoiding analysis and detection attempts.
  • Ransomware performs long sleep periods to evade detection by security software, ensuring it remains undetected for longer and increasing the likelihood of successfully encrypting files.
  • The Ransomware places itself in “HKEY_LOCAL_MACHINE\ SOFTWARE \Microsoft\Windows NT\CurrentVersion\Image File Execution Options\” to manipulate the execution behaviour of the image. This registry key allows the ransomware to achieve persistence, silently execute alongside or instead of legitimate images, and maintain control over compromised systems, evading detection.

ETLM Assessment:
CYFIRMA’s assessment, based on available information, suggests that COBRA ransomware, with its demand for 18 bitcoins, is likely to target economically developed nations located in Europe, East Asia, South-East Asia, and the US, where organizations are more capable of meeting such demands. This reflects a deliberate strategy aimed at entities capable of fulfilling substantial ransom demands. Furthermore, the ransomware is anticipated to persistently target Windows OS, utilizing sophisticated evasion tactics and persistence methods. This will likely result in heightened encryption complexity and system disruption, posing considerable challenges to detection and recovery efforts across various industries. Vigilance and strong cybersecurity measures are essential to mitigate these threats effectively.

Indicators of Compromise
Kindly refer to the IOCs section to exercise controls on your security systems.

Sigma
title: Drops script at startup location threatname:
behaviorgroup: 1
classification: 7 logsource:
service: sysmon product: windows
detection: selection:
EventID: 11 TargetFilename:
– ‘*\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\\*.vbs*’
– ‘*\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\\*.js*’
– ‘*\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\\*.jse*’
– ‘*\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\\*.bat*’
– ‘*\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\\*.url*’
– ‘*\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\\*.cmd*’
– ‘*\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\\*.hta*’
– ‘*\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\\*.ps1*’
– ‘*\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\\*.wsf*’ condition: selection
level: critical

(Source: SurfaceWeb)

STRATEGIC RECOMMENDATIONS

  • Implement competent security protocols and encryption, authentication, or access credentials configurations to access critical systems in your cloud and local environments.
  • Ensure that backups of critical systems are maintained which can be used to restore data in case a need arises.

MANAGEMENT RECOMMENDATIONS

  • A data breach prevention plan must be developed considering, (a) the type of data being managed by the company; (b) the remediation process; (c) where and how the data is stored; (d) if there is an obligation to notify the local authority.
  • Enable zero-trust architecture and multifactor authentication (MFA) to mitigate the compromise of credentials.
  • Foster a culture of cybersecurity, where you encourage and invest in employee training so that security is an integral part of your organization.

TACTICAL RECOMMENDATIONS

  • Update all applications/software regularly with the latest versions and security patches alike.
  • Add the Sigma rules for threat detection and monitoring which will help to detect anomalies in log events, identify and monitor suspicious activities.
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defence based on the tactical intelligence provided.

Trending Malware of the Week

Type: Backdoor
Objective: Remote Access, Data Exfiltration
Target Technology: Windows OS, Web Browsers (Google Chrome) and productivity tools (Microsoft Teams)

Active Malware of the Week
This week “Oyster” is trending.

Oyster
Researchers recently identified a malvertising campaign targeting users by offering malicious installers for well-known software like Google Chrome and Microsoft Teams. These installers were actually delivering a backdoor known as Oyster (aka Broomstick and CleanUpLoader). After the backdoor was executed, researchers observed direct control activities, including commands to gather information and the deployment of more malicious software.

Initial Access
Researchers found that users were downloading fake Microsoft Teams installers from websites with URLs similar to the official Microsoft Teams site, a technique called typo- squatting. These deceptive websites appeared in search results on platforms like Google and Bing when users looked for Microsoft Teams downloads. By imitating the legitimate site’s appearance, the fake sites tricked users into believing they were downloading genuine software, but instead, they ended up downloading malicious software from the threat actors.

Fig: Fake Microsoft Teams Website

In this scenario, a user visited the URL hxxps[:]//micrsoft-teams-download[.]com/ and downloaded a file named MSTeamsSetup_c_l_.exe. Upon initial examination, it was found that the binary MSTeamsSetup_c_l_.exe had been signed with an authenticode certificate issued to ‘Shanxi Yanghua HOME Furnishings Ltd.’

Technical Analysis
Upon analyzing MSTeamsSetup_c_l_.exe, it was found that it stored two binaries within its resource section. During execution, it used FindResourceA to locate these binaries and LoadResource to access them, subsequently dropping them into the Temp folder. The binaries dropped were identified as CleanUp30.dll and MSTeamsSetup_c_l_.exe (the legitimate Microsoft Teams installer). Following the drop of CleanUp30.dll into Temp, the program executed the DLL using rundll32.exe %s,Test passed to CreateProcessA, where %s represented CleanUp30.dll. After executing CleanUp30.dll, the program then launches the legitimate Microsoft Teams installer, MSTeamsSetup_c_l_.exe, which is also stored in the Temp directory. This strategy aims to prevent arousing suspicion from the user.

CleanUp30.dll Analysis
During the execution of CleanUp30.dll, researchers observed several actions: first, the binary attempted to create a hardcoded mutual exclusion (mutex) named ITrkfSaV- 4c7KwdfnC-Ds165XU4C-lH6R9pk1, commonly used to check if the program is already running to terminate any new instances. Following mutex creation, the binary determined its execution path by using GetModuleFilenameA. This path was then used to create a scheduled task named ClearMngs using ShellExecuteExW. The scheduled task was configured to run every three hours with the command:

  • schtasks.exe /create /tn ClearMngs /tr “rundll32 ‘<location of binary>\CleanUp30.dll’,Test” /sc hourly /mo 3 /f

The purpose of ClearMngs was to execute CleanUp30.dll’s Test function using rundll32.exe. After setting up the scheduled task, the binary proceeded to decode its command-and-control (C2) server addresses using a unique decoding function. This decoding function processes an encoded string by reading each byte from the end of the string.

The encoded string is decoded using a byte map, where each byte serves as an index to retrieve the decoded byte from a predefined array. This technique helps obscure data and strings commonly used by malware authors. The decoding process involves iterating through the encoded string, swapping pairs of bytes from both ends towards the center, and reversing the originally encoded plaintext strings. To maintain accuracy, all encoded strings must have an even length. After decoding, the string is re-encoded using a similar method. Ultimately, the first decoded string reveals a list of command-and-control (C2) domains delimited by carriage return and line feed (CRLF) characters. After the binary decodes the C2 addresses, the program proceeds to fingerprint the infected machine using the following functions:

During host information enumeration, the gathered data is stored within JSON fields extracted from decoded strings. The fingerprint information undergoes encoding, following the same reversing and byte map technique, before transmission. Once encoded, it is sent via HTTP POST method to domains such as whereverhomebe[.]com/, supfoundrysettlers[.]us/, and retdirectyourman[.]eu/. Researchers found that CleanUp30.dll utilizes the Boost.Beast C++ library for communication with these command-and-control (C2) domains, supporting both HTTP and web sockets.

Follow-on Activity
In an observed incident, researchers noted the execution of a PowerShell script after another version of CleanUp30.dll, named CleanUp.dll, was executed. This variant of CleanUp.dll was initially dropped by a fake Microsoft Teams installer, TMSSetup.exe, into the AppData/Local/Temp directory. The PowerShell script’s purpose was to create a startup shortcut named DiskCleanUp.lnk in C:\Users\<User>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.

This ensured that DiskCleanUp.lnk would execute each time the user logged in, launching CleanUp.dll using rundll32.exe and the Test export.

Following the PowerShell script’s execution, researchers observed the launch of additional payloads:

  • k1.ps1
  • main.dll
  • getresult.exe

These actions were part of the broader malicious activities initiated by the malware after installation on the compromised system.

INSIGHTS

  • Oyster, discovered by researchers in September 2023, initially spread through deceptive tactics using an installer disguised as a browser installer, named Oyster Installer. This method facilitated the deployment of Oyster Main, a backdoor component that gathered extensive host data, communicated with hardcoded command-and-control (C2) servers, and enabled remote code execution. This underscored Oyster’s capability to establish persistence, maintain control over compromised systems, and potentially execute additional malicious activities as directed by its operators.
  • Oyster malware poses a significant threat owing to its effective distribution strategies and advanced operational techniques. By leveraging deceptive tactics such as fake software installers and malvertising campaigns, Oyster capitalizes on users’ trust in widely used applications like Microsoft Teams and Google Chrome. This underscore the enduring challenge of social engineering in cyberattacks, where unsuspecting users inadvertently download and activate malicious software.
  • Oyster malware employs sophisticated techniques to establish and maintain communication with its command-and-control (C2) infrastructure. By utilizing encrypted channels and potentially employing methods to mimic legitimate network traffic, Oyster ensures that malicious activities remain hidden and difficult to detect. This enables threat actors to remotely control compromised systems discreetly, execute malicious commands, and potentially exfiltrate sensitive data without raising suspicion.

ETLM ASSESSMENT
From the ETLM perspective, CYFIRMA anticipates that the evolution of Oyster malware is expected to persist as cyber attackers refine their strategies. Deceptive tactics, including fake software installers and malvertising campaigns aimed at trusted applications like Microsoft Teams and Google Chrome, will continue to pose significant challenges. For organizations and employees relying on Microsoft Teams, the implications could be substantial. In addition to potential operational disruptions and productivity losses from compromised systems, there remains a heightened risk of data breaches and the exposure of sensitive information.

IOCs:
Kindly refer to the IOCs Section to exercise controls on your security systems.

STRATEGIC RECOMMENDATIONS

  • Incorporate Digital Risk Protection (DRP) as part of the overall security posture to proactively defend against impersonations and phishing attacks.
  • Maintain an up-to-date inventory of all active software used within the organization and perform regular self-audit of workstations, servers, laptops, mobile devices to identify unauthorized/ restricted software.
  • Configure organization’s intrusion detection systems (IDS), intrusion prevention systems (IPS), or any network defence mechanisms in place to alert on — and upon review, consider blocking connection attempts to and from — the external IP addresses and domains listed in the appendix.

MANAGEMENT RECOMMENDATIONS

  • Provide your staff with basic cybersecurity hygiene training since many targeted attacks start with phishing or other social engineering techniques.
  • Regularly reinforce awareness of unauthorized attempts with end-users across the environment and emphasize the human weakness in mandatory information security training sessions.
  • Move beyond the traditional model of security awareness towards Improved Simulation and training exercises that mimic real attack scenarios, account for behaviors that lead to a compromise, and are measured against real attacks the organization receives.
  • Security Awareness training should be mandated for all company employees. The training should ensure that employees:
  • Always inspect the full URL before downloading files to ensure it matches the source (e.g., Microsoft Team should come from a Microsoft domain).

TACTICAL RECOMMENDATIONS

  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defence based on the tactical intelligence provided.
  • Evaluate the security and reputation of each piece of open-source software or utilities before usage.
  • Enforce policies to validate third-party software before installation.

Weekly Intelligence Trends/Advisory

1. Weekly Attack Type and Trends

Key Intelligence Signals:

  • Attack Type: Malware Implant, Ransomware Attacks, Vulnerabilities & Exploits, Data Leaks.
  • Objective: Unauthorized Access, Data Theft, Data Encryption, Financial Gains, Espionage.
  • Business Impact: Data Loss, Financial Loss, Reputational Damage, Loss of Intellectual Property, Operational Disruption.
  • Ransomware – 8Base Ransomware, DarkVault Ransomware | Malware – Oyster
  • 8Base Ransomware – One of the ransomware groups.
  • DarkVault Ransomware – One of the ransomware groups.
  • Please refer to the trending malware advisory for details on the following:
  • Malware – Oyster
  • Behaviour –Most of these malwares use phishing and social engineering techniques as their initial attack vectors. Apart from these techniques, exploitation of vulnerabilities, defence evasion, and persistence tactics are being observed.

2. Threat Actor in Focus

RedJuliett: Intensified Cyber Espionage on Taiwanese Government, Academia, and Tech Sectors

  • Threat Actors: RedJuliett
  • Attack Type: Public-facing Vulnerability
  • Objective: Espionage
  • Target Technology: Windows
  • Target Geographies: Taiwan, Hong Kong, Malaysia, Laos, South Korea, the United States
  • Target Industries: Government, Academic, and Technology Sectors
  • Business Impact: Data Loss, Data exfiltration

Summary:
Between November 2023 and April 2024, the researcher identified a series of cyber- espionage activities conducted by RedJuliett, a likely Chinese state-sponsored threat group. RedJuliett primarily targeted government, academic, technology, and diplomatic organizations in Taiwan. The group gained initial access by exploiting known vulnerabilities in network edge devices such as firewalls, VPNs, and load balancers.

They employed structured query language (SQL) injection and directory traversal exploits against web and SQL applications to further penetrate systems. Additionally, RedJuliett conducted reconnaissance and exploitation activities using Acunetix Web Application Security Scanners. Operating likely from Fuzhou, China, RedJuliett’s actions align with its persistent targeting of Taiwan and support Beijing’s intelligence collection on Taiwan’s economic and diplomatic relations, as well as critical technology development.

RedJuliett expanded its operations beyond Taiwan, compromising organizations in Hong Kong, Malaysia, Laos, South Korea, the United States, Djibouti, Kenya, and Rwanda. Post-exploitation, RedJuliett used open-source web shells and exploited an elevation of privilege vulnerability in the Linux operating system to maintain access and escalate their privileges within the compromised networks. They also created SoftEther VPN bridges or clients within victim networks, facilitating persistent access and data exfiltration. The group’s infrastructure was administered using SoftEther VPN, leveraging both threat actor-controlled leased servers and compromised infrastructure from Taiwanese universities.

RedJuliett’s extensive use of internet-facing devices highlights the strategic importance of these vulnerable points. They employed multiple SoftEther nodes from infrastructure geolocating to Fuzhou, reinforcing their operational base. RedJuliett’s activities suggest a comprehensive and multi-layered attack strategy, involving initial access through vulnerabilities, network reconnaissance, lateral movement, and persistence techniques.

The motive behind RedJuliett’s activities is to gather intelligence to support Beijing’s policymaking on cross-strait relations. The group’s focus on critical technology companies indicates a strategic interest in Taiwan’s technological advancements.

RedJuliett’s activities highlight the importance of comprehensive cybersecurity measures. Organizations are advised to adopt network segmentation, enhance security monitoring and detection capabilities for all external-facing services and devices, review public guidance on mitigating Chinese APT activity, prioritize patching high-risk vulnerabilities, and monitor malicious traffic to detect and respond to threats effectively. The continued exploitation of public-facing devices underscores the need for improved security protocols and regular audits of internet-facing and perimeter appliances to reduce the attack surface and detect post-exploitation activities.

Relevancy & Insights:
Flax Typhoon, also known as RedJuliett, has been actively targeting Taiwanese organizations since mid-2021. This group has primarily focused on government agencies, educational institutions, critical manufacturing, and IT sectors. Using living- off-the-land (LotL) techniques and the open-source VPN software SoftEther, Flax Typhoon exploits vulnerabilities in public-facing services such as VPNs, web applications, and SQL applications to gain initial access. Once inside, they establish persistence using the China Chopper web shell on compromised servers to execute remote code. Following initial access, Flax Typhoon relies on open-source tools like JuicyPotato and BadPotato, as well as other LotL techniques. These tactics and techniques closely resemble those reported by CrowdStrike regarding Ethereal Panda, including the use of the open-source web shell Godzilla. This persistent and strategic approach highlights the importance of robust cybersecurity measures to protect against such sophisticated cyber threats.

ETLM Assessment:
RedJuliett is a China-nexus cyber espionage group that has primarily targeted Taiwan, focusing on government, education, and technology sectors. The group exploits vulnerabilities in public-facing services to gain access and uses tools like the China Chopper web shell for persistence. Their operations, which include compromising organizations in Taiwan and other countries, align with strategic objectives likely backed by the Chinese state. RedJuliett’s activities reflect a sophisticated understanding of economic and trade policies in the targeted regions, posing a significant threat to entities within these sectors. The group has conducted reconnaissance and attempted exploitation of at least 75 organizations, mainly within Taiwan’s government, education, and technology sectors. RedJuliett is particularly interested in Taiwan’s economic and trade policies and international affairs, targeting de facto embassies from South and Southeast Asian countries, government departments focused on economic policy, think tanks researching economic policy, and a trade promotion organization. This extensive targeting underscores RedJuliett’s role in advancing Beijing’s intelligence objectives and illustrates a serious concern as threat actors adopt and integrate techniques from other sophisticated groups to enhance their attacks.

Recommendations:

  • Use threat intelligence to monitor real-time output and identify suspected intrusion activities involving key vendors and partners within physical, network, and software supply chains.
  • Implement monitoring of Malicious Traffic Analysis to proactively detect and alert on infrastructure involved in notable communications with known RedJuliett command- and-control (C2) IP addresses.
  • Install the Threat Intelligence Browser Extension to access instant threat intelligence from any web-based resource, enabling faster alert processing within security information and event management (SIEM) systems and prioritizing vulnerabilities for patching.
  • Ensure comprehensive security monitoring and detection capabilities for all external- facing services and devices. Look for follow-on activities likely to occur after exploitation, such as the deployment of web shells, backdoors, or reverse shells, and subsequent lateral movement within internal networks.
  • Practice network segmentation by isolating internet-facing services in a demilitarized zone (DMZ) to limit the potential impact of an attack and prevent lateral movement within the network.
  • Regularly review public guidance on mitigating common tactics, techniques, and procedures (TTPs) used by Chinese state-sponsored groups. Additionally, “Charting China’s Climb as a Leading Global Cyber Power,” for trends and recommendations to mitigate Chinese advanced persistent threat (APT) activities more broadly.

IOCs:
Kindly refer to the IOCs (Indicators of Compromise) Section to exercise controls on your security systems.

3. Major Geopolitical Developments in Cybersecurity

Japanese aerospace agency hit by cyberattacks
Researchers have recently revealed that the Japan Aerospace Exploration Agency
(JAXA) has sustained several cyberattacks over the past year. Japanese officials stated that sensitive information related to rockets and satellites was not compromised. According to Japanese media, the attacks targeted a JAXA server for the agency’s general business operations. The Japanese government is investigating the attacks, which have now been confirmed to have originated from outside of Japan.

ETLM Assessment:
This campaign most likely constitutes a classic state-driven espionage effort enabled by cyber means. The Japanese government finds itself in a new strategic envirnemnt with many new threats rising especially from China and North Korea. Many of the limits imposed by the pacifist postwar constitution imposed by Japan’s history (and written by the Americans during the occupation) are now being relaxed or modified, and the current version of the constitution is now being reinterpreted to give the government more room to maneuver. This in return provokes the sources of the threat to Japan to conduct aggressive cyber espionage in order to keep tabs on Japanese capabilities.

4. Rise in Malware/Ransomware and Phishing

The 8Base Ransomware impacts the Taiyo Kogyo Co., Ltd

  • Attack Type: Ransomware
  • Target Industry: Construction
  • Target Geography: Japan
  • Ransomware: 8Base Ransomware
  • Objective: Data Theft, Data Encryption, Financial Gains
  • Business Impact: Financial Loss, Data Loss, Reputational Damage

Summary:
From the External Threat Landscape Management (ETLM) Perspective, CYFIRMA observed in an underground forum that a company from Japan; (www[.]taiyokogyo[.]co[.]jp), was compromised by the 8Base Ransomware. Taiyo Kogyo Co., Ltd., a leading company in the production of large-sized membrane structures, occupies a leading position in the world-class market. It operates on seven continents and has worked on numerous buildings, including stadiums, international airports, and exposition centers. The compromised data contains Invoices, Receipts, Accounting documents, Personal data, Certificates, Employment contracts, Confidentiality agreements, Personal files, and Others.

The following screenshot was observed published on the dark web:

Source: Dark Web

Relevancy & Insights:

  • The 8Base ransomware group has seen a significant increase in activity since June 2023, using double extortion tactics to pressure victims into paying ransoms. This group, which first appeared in March 2022, has ramped up its attacks, targeting various industries and listing numerous victims on its dark website.
  • 8Base ransomware is known for its use of the Phobos v2.9.1 ransomware, typically delivered through SmokeLoader, a malware downloader. The ransomware encrypts files with the .8base extension and demands ransom payments for decryption keys. Recent technical analyses show that 8Base employs various sophisticated methods to ensure persistence on victim systems, such as creating multiple copies of itself in startup folders and modifying registry keys for auto-start capabilities.
  • The 8Base Ransomware group primarily targets countries such as the United States of America, Italy, Japan, France, and Spain.
  • The 8Base Ransomware group primarily targets industries, including Heavy Construction, Business Support Services, Industrial Machinery, Real Estate, and Specialized Consumer Services.
  • Based on the 8Base Ransomware victims list from 1 Jan 2023 to 26 June 2024, the top 5 Target Countries are as follows:
  • The Top 10 Industries, most affected by 8Base Ransomware from 1 Jan 2023 to 26 June 2024 are as follows:

ETLM Assessment:
Based on the available information, CYFIRMA’s assessment indicates that 8Base Ransomware will continue to target various industries globally, with a significant emphasis on the United States, European, and Asian regions. The recent incident involving an attack on Taiyo Kogyo Co., Ltd, a prominent Construction company located in Japan, underscores the extensive threat posed by this particular ransomware strain in the Asia Pacific region.

The DarkVault Ransomware impacts the OExpress

  • Attack Type: Ransomware
  • Target Industry: Logistics
  • Target Geography: Indonesia
  • Ransomware: DarkVault Ransomware
  • Objective: Data Theft, Data Encryption, Financial Gains
  • Business Impact: Financial Loss, Data Loss, Reputational Damage

Summary:
From the External Threat Landscape Management (ETLM) Perspective, CYFIRMA observed in an underground forum that a company from Indonesia; (www[.]oexpress[.]id), was compromised by the DarkVault Ransomware. OExpress is a logistics platform that offers various express delivery services, as an expedition with a smart system that helps increase delivery success. The data, which has been breached, has not yet appeared on the leak site, indicating that negotiations between the affected party and the ransomware group may be underway. The compromised data includes confidential and sensitive information belonging to the organization.

The following screenshot was observed published on the dark web:

Source: Dark Web

Relevancy & Insights:

  • DarkVault ransomware has emerged as a notable threat in the cybercrime landscape. This ransomware group has been particularly active in recent months, targeting organizations with the intent to encrypt their data and demand ransoms.
  • DarkVault has upgraded its encryption mechanisms, making it more challenging for victims to recover their data without paying the ransom. Their new tactics involve the use of double and even triple extortion techniques.
  • The DarkVault Ransomware group primarily targets countries such as Brazil, the United States of America, Lithuania, Canada, and the United Kingdom.
  • The DarkVault Ransomware group primarily targets industries, such as Software, Computer Services, Real Estate, Industrial Machinery, and the Internet.
  • Based on the DarkVault Ransomware victims list from 1 Jan 2023 to 26 June 2024, the top 5 Target Countries are as follows:
  • The Top 5 Industries, most affected by the DarkVault Ransomware from 1st Jan 2023 to 26 June 2024 are as follows:

ETLM Assessment:
The DarkVault ransomware group has honed its approach to deploying ransomware by leveraging a variety of sophisticated techniques. These include phishing emails, which lure victims into clicking on malicious links or attachments and exploiting vulnerabilities in unpatched software to gain initial access to systems. According to CYFIRMA’s assessment, DarkVault is likely to continue its aggressive targeting of a wide array of industries on a global scale. Their focus is particularly intense in the United States, Europe, and Asia. A recent attack on OExpress, a leading Logistics company based in Indonesia, highlights the broad and severe threat posed by DarkVault, especially in Southeast Asia. This incident underscores the group’s capacity to disrupt operations and underscores the critical need for robust cybersecurity defenses across diverse regions and sectors.

5. Vulnerabilities and Exploits

Vulnerability in Apache StreamPipes

  • Attack Type: Vulnerabilities & Exploits
  • Target Technology: Server application
  • Vulnerability: CVE-2024-29868 (CVSS Base Score 7.5)
  • Vulnerability Type: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
  • Patch: Available

Summary:
The vulnerability allows a remote attacker to compromise accounts of application users.

Relevancy & Insights:
The vulnerability exists due to the usage of a weak pseudo-random number generator for recovery tokens.

Impact :
A remote attacker can use the self-registration and password recovery mechanism to take over an arbitrary user account.

Affected Products:
https[:]//lists[.]apache[.]org/thread/zqn5z48gz7bp0q8ctk96ht8bc7vd3njv

Recommendations:
Monitoring and Detection: Implement monitoring and detection mechanisms to identify unusual system behavior that might indicate an attempted exploitation of this vulnerability.

TOP 5 AFFECTED PRODUCTS OF THE WEEK
This week, CYFIRMA researchers have observed significant impacts on various technologies, due to a range of vulnerabilities. The following are the top 5 most affected technologies.

ETLM Assessment:
Vulnerability in Apache StreamPipes can pose significant threats to user privacy and security. This can impact various industries globally, including technology, finance, healthcare, and beyond. Ensuring the security of Apache StreamPipes is crucial for maintaining the integrity and protection of users’ data worldwide. Therefore, addressing these vulnerabilities is essential to safeguarding online activities, including connecting, analyzing, and exploring IoT data streams, across different geographic regions and sectors.

6. Latest Cyber-Attacks, Incidents, and Breaches

Spacebears Ransomware attacked and Published data of SAWA INTERNATIONAL

  • Threat Actors: Spacebears Ransomware
  • Attack Type: Ransomware
  • Objective: Data Leak, Financial Gains
  • Target Technology: Web Application
  • Target Geographies: United Arab Emirates
  • Target Industry: Telecommunication
  • Business Impact: Operational Disruption, Data Loss, Financial Loss, Potential Reputational Damage

Summary:
Recently we observed that Spacebears Ransomware attacked and published data of SAWA INTERNATIONAL(www[.]sawainternational[.]com) on its darkweb website. SAWA International in the UAE operates primarily as a partner for telecom services, specifically focusing on providing personalized telecom plans for homes and businesses in collaboration with Emirates Integrated Telecommunications Corporation, commonly known as DU. The data leak, following the ransomware attack, encompasses Databases, Financial Reports, and other Valuable and Confidential Information, Personal Information (Photo, IDs. etc), Contracts, and Documents in multiple formats, including Excel (.xls), Word (.docx), and PDF (.pdf).

Relevancy & Insights:
SpaceBears utilizes advanced encryption methods to lock victims’ data and demands large ransoms in exchange for decryption keys. They typically employ social engineering tactics like phishing emails to gain initial access to the systems.

ETLM Assessment:
SpaceBears is an emerging ransomware group that has recently garnered attention due to several high-profile attacks. Known for its sophisticated tactics, the group is suspected to be based in Moscow, Russia, and operates with a distinct corporate-like structure, which sets it apart from many other ransomware groups. Based on the available information, CYFIRMA’s assessment indicates that SpaceBears Ransomware will continue to target various industries globally, with a significant emphasis on the United States, European, and Asian regions. The recent incident involving an attack on SAWA INTERNATIONAL, a prominent Telecommunication company located in the United Arab Emirates, underscores the extensive threat posed by this particular ransomware strain in the Middle East.

Source: Dark Web

Relevancy & Insights:
SpaceBears utilizes advanced encryption methods to lock victims’ data and demands large ransoms in exchange for decryption keys. They typically employ social engineering tactics like phishing emails to gain initial access to the systems.

ETLM Assessment:
SpaceBears is an emerging ransomware group that has recently garnered attention due to several high-profile attacks. Known for its sophisticated tactics, the group is suspected to be based in Moscow, Russia, and operates with a distinct corporate-like structure, which sets it apart from many other ransomware groups. Based on the available information, CYFIRMA’s assessment indicates that SpaceBears Ransomware will continue to target various industries globally, with a significant emphasis on the United States, European, and Asian regions. The recent incident involving an attack on SAWA INTERNATIONAL, a prominent Telecommunication company located in the United Arab Emirates, underscores the extensive threat posed by this particular ransomware strain in the Middle East.

7. Data Leaks

Badan Intelijen Strategis (Indonesian Military Strategic Intelligence Agency) Data Advertised on a Leak Site

  • Attack Type: Data Leak
  • Target Industry: Government
  • Target Geography: Indonesia
  • Objective: Data Theft, Financial Gains
  • Business Impact: Data Loss, Reputational Damage

Summary:
The CYFIRMA Research team observed a potential data sale related to Badan Intelijen Strategis (Indonesian Military Strategic Intelligence Agency) in an underground forum. A threat actor claims to be selling highly sensitive data from the Badan Intelijen Strategis (Indonesian Military Strategic Intelligence Agency). The data breach is allegedly claimed by the threat actor ‘MoonzHaxor’

Badan Intelijen Strategis (Indonesian Military Strategic Intelligence Agency)Data

The threat actor has allegedly posted a sample of the data for download and is offering the full dataset for sale. The Strategic Intelligence Agency is responsible for military intelligence and operates under the command of the Indonesian National Army Headquarters.

Compromised Files:
2,000 user databases (.SQL) containing data such as:

Id, name, task force, rank, username, email, password, avatar, tokens, phone number, IMEI, last seen, generation, NRP, device, manufacture, OS, app version

Confidential (secret) documents from military intelligence members (.PDF and .DOC) from 2020 to 2022

Pricing:
User database files (.SQL), 773KB: $1,000 Secret documents (.ZIP), 33.7GB: $7,000 Free sample data available on the forum The threat actor states that they are accepting payments only in cryptocurrency, specifically XMR (Monero), and can be contacted via Telegram.

Source: Underground Forums

INAFIS (Indonesia Automatic Fingerprint Identification System) data advertised on a Leak Site

  • Attack Type: Data Leak
  • Target Industry: Government
  • Target Geography: Indonesia
  • Objective: Data Theft, Financial Gains
  • Business Impact: Data Loss, Reputational Damage

Summary:
The CYFIRMA Research team observed a potential data leak related to INAFIS (Indonesia Automatic Fingerprint Identification System) in an underground forum. The threat actor claims to be selling data from INAFIS (Indonesia Automatic Fingerprint Identification System), which is crucial for the identification process through fingerprints and focuses on collecting authentic data on the Indonesian population. The data breach is allegedly claimed by the threat actor ‘MoonzHaxor’

Compromised Files:
INAFIS faces member images (.PNG) with email INAFIS fingerprints member images (.WSQ) with email
INAFIS SpringBoot application (.JAR) with database configuration properties Pricing:
INAFIS SpringBoot application with configuration: $1,000
Potential to access API/DB with 200+ million Indonesian ID card numbers through reverse engineering the application
The threat actor further claims that anyone interested in the INAFIS data can contact them via Telegram.

Source: Underground Forums

Relevancy & Insights:
Financially motivated cybercriminals are continuously scouring for exposed and vulnerable systems and applications to exploit. A significant number of these malicious actors congregate within underground forums, where they discuss cybercrime and trade stolen digital assets. Operating discreetly, these opportunistic attackers target unpatched systems or vulnerabilities in applications to illicitly gain access and steal valuable data. Subsequently, the pilfered data is advertised for sale within underground markets, where it can be acquired, repurposed, and utilized by other malicious actors in further illicit activities.

ETLM Assessment:
According to CYFIRMA’s analysis, the financially driven cybercriminal known as ‘MoonzHaxor’ presents a considerable threat to organizations across various sectors. This actor is notorious for infiltrating institutions with weak cybersecurity defenses and subsequently monetizing the stolen sensitive data through sales on the dark web and other illicit forums. ‘MoonzHaxor’ frequently targets entities that lack robust security protocols, making them susceptible to these sophisticated and opportunistic cyberattacks.

Recommendations: Enhance the cybersecurity posture by

  • Updating all software products to their latest versions is essential to mitigate the risk of vulnerabilities being exploited.
  • Ensure proper database configuration to mitigate the risk of database-related attacks.
  • Establish robust password management policies, incorporating multi-factor authentication and role-based access, to fortify credential security and prevent unauthorized access.

8. Other Observations

CYFIRMA Research team observed a potential data breach related to MyRepublic Indonesia (www.myrepublic.co.id). A threat actor has announced the sale of a database allegedly obtained from a recent breach of MyRepublic Indonesia, a prominent telecommunications company known for its high-speed fiber broadband services. MyRepublic operates across several countries, offering broadband internet, mobile services, and enterprise solutions. The threat actor disclosed their intent to sell the breached database, emphasizing that it includes comprehensive customer data. They are open to using a middleman for transactions and exclusively accept payments in Monero (XMR). They urge interested parties to contact them via private message to negotiate offers. The compromised dataset reportedly contains a variety of sensitive information, including customer IDs, names, email addresses, phone numbers, residential addresses, internet and TV service plans, sales and service dates, promotional details, and more. The data breach is allegedly claimed by the threat actor ‘abyss0’.

Source: Underground forums

ETLM Assessment :
Threat Actor ‘abyss0’ group has become active in underground forums and has emerged as a formidable force in cybercrime mainly for financial gains. The threat actor has already targeted Government, Industrial Conglomerates, Retail, Staffing, Business consulting, Banks, E-Commerce, Electric & Utilities industries, indicating its intention to expand its attack surface in the future to other industries globally.

STRATEGIC RECOMMENDATIONS

  • Attack Surface Management should be adopted by organizations, ensuring that a continuous closed-loop process is created between attack surface monitoring and security testing.
  • Deploy a unified threat management strategy – including malware detection, deep learning neural networks, and anti-exploit technology – combined with vulnerability and risk mitigation processes.
  • Incorporate Digital Risk Protection (DRP) in the overall security posture that acts as a proactive defence against external threats targeting unsuspecting customers.
  • Implement a holistic security strategy that includes controls for attack surface reduction, effective patch management, active network monitoring, through next generation security solutions and ready to go incident response plan.
  • Create risk-based vulnerability management with deep knowledge about each asset. Assign a triaged risk score based on the type of vulnerability and criticality of the asset to help ensure that the most severe and dangerous vulnerabilities are dealt with first.

MANAGEMENT RECOMMENDATIONS

  • Take advantage of global Cyber Intelligence providing valuable insights on threat actor activity, detection, and mitigation techniques.
  • Proactively monitor the effectiveness of risk-based information security strategy, the security controls applied and the proper implementation of security technologies, followed by corrective actions remediations, and lessons learned.
  • Move beyond the traditional model of security awareness towards improved simulation and training exercises that mimic real attack scenarios, account for behaviours that lead to a compromised, and, are measured against real attacks the organization receives.
  • Consider implementing Network Traffic Analysis (NTA) and Network Detection and Response (NDR) security systems to compensate for the shortcoming of EDR and SIEM solutions.
  • Detection processes are tested to ensure awareness of anomalous events. Timely communication of anomalies and continuously evolved to keep up with refined ransomware threats.

TACTICAL RECOMMENDATIONS

  • Patch software/applications as soon as updates are available. Where feasible, automated remediation should be deployed since vulnerabilities are one of the top attack vectors.
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthen defences based on tactical intelligence provided.
  • Deploy detection technologies that are behavioural anomaly-based to detect ransomware attacks and help to take appropriate measures.
  • Implement a combination of security control such as reCAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart), Device fingerprinting, IP backlisting, Rate-limiting, and Account lockout to thwart automated brute-force attacks.
  • Ensure email and web content filtering uses real-time blocklists, reputation services, and other similar mechanisms to avoid accepting content from known and potentially malicious sources.

Situational Awareness – Cyber News

Please find the Geography-Wise and Industry-Wise breakup of cyber news for the last 5 days as part of the situational awareness pillar.

Geography-Wise Graph

Industry-Wise Graph

For situational awareness intelligence and specific insights mapped to your organisation’s geography, industry, technology, please access DeCYFIR.