Articles

Fresh information from the world of IT security

Current threats by Fortinet for 18-24 August. 2018 more articles »

Current threats by Fortinet for 18-24 August. 2018

Our partner Fortinet publishes a report every week about exposed threats. You can review the weekly report below. If you have questions, do not hesitate to contact us.


Activity Summary - Week Ending August 24, 2018


For years there have been tools developed for malware research with a primary focus on the Windows platform, whereas tools for alternative operating systems, such as Linux and macOS, were few and far between. This made sense given the enormous adoption rate and market share that Windows operating systems had over the past several decades. Most recently the industry has seen a shift over to these alternative operating systems, due to the popularity of devices running them. This also means bad actors have taken notice and are looking at ways of distributing their malware. 

Introducing FortiAppMonitor 

FortiAppMonitor is a freeware utility developed and released by Fortinet designed to monitor the behaviors of programs on macOS. It enables users to understand malware capabilities and quickly analyze the malicious behaviors of malware targeting macOS. This utility, presented by FortiGuard Labs researcher Kai Lu at the Black Hat USA 2018 Arsenal, was titled "Learn How to Build Your Own Utility to Monitor Malicious Behaviors of Malware on macOS." 

Its capabilities include the following features:

  1. Monitors process execution with command line arguments and process exit
  2. Monitors all common file system events, including file open, read, write, delete, and rename operations
  3. Monitors network activities, including UDP, TCP, DNS query and response, and ICMP for both IPv4 and IPv6 protocols
  4. Monitors .dylib loading events
  5. Monitors KEXT loading and unloading events

It also provides a fine-grained filter so that users can track those event types they are interested in, as well as powerful search functionality so users can quickly hunt through records based on keywords. Users can also save all records into a JSON formatted file. In addition, all these FortiAppMonitor features are accessed through an easy-to-navigate GUI design. Users can also copy one specific record on a GUI screen to the clipboard using the shortcut key "Command+C." 

FortiAppMonitor can be downloaded from here. Kai Lu's slides from his presentation at BlackHat can be accessed from here. Users are welcome to send feedback or submit bugs to: fortiappmon@fortinet.com.

Application Vulnerabilities / IPS

 

Rank

Name

Prevalence

1

MS.IIS.WebDAV.PROPFIND.ScStoragePathFromUrl.Buffer.Overflow

43,595

2

D-Link.DSL-2750B.CLI.OS.Command.Injection

40,378

3

Apache.Struts.2.Jakarta.Multipart.Parser.Code.Execution

38,226

4

Avtech.Devices.HTTP.Request.Parsing.Multiple.Vulnerabilities

31,874

5

Dahua.IP.Camera.Unauthorized.File.Access.Information.Disclosure

30,215

 

Flir.Systems.Camera.HTTP.Request.Handling.Code.Execution -- The FLIR-FC-S/PT series are thermal network security cameras being manufactured by FLIR Systems, Inc. (http://www.flir.com), the world's largest commercial company specializing in the design and production of thermal imaging cameras. They are used by high-end military and government agencies alike as well as the average home user, as the company portfolio of services is very extensive. These cameras suffer from an authenticated OS command injection vulnerability and unauthenticated remote code execution, which can be exploited to inject and run arbitrary shell commands on the system. Cameras with software version 10.0.2.43 are affected. The cameras also suffer from hard-coded credentials and stream disclosure vulnerabilities, which were discovered at the same time by the same researcher. 

Exploitation is as trivial as sending an HTTP GET request to the camera's web server; known exploits have been available since the time the vulnerability was disclosed. We are seeing increased activity in the last seven days when comparing the number from the 30 days' average (the jump was 30%). The most affected regions are Taiwan (95.96%), South Korea (2.43%), and China (1.44%). 

Signatures: Flir.Systems.Camera.HTTP.Request.Handling.Code.Execution 

GnuTLS.Security.Null.Signature.Bypass --A security bypass vulnerability exists in GnuTLS before 3.1.22 and 3.2.x before 3.2.12 due to improper error handling when parsing X.509 certificates. An attacker could impersonate a legitimate server with a specially crafted certificate. This can result in a MITM attack. 

When such an error occurred, it would report that a certificate validation was successful, even though it might have failed. The attack is delivered through the crafting of a special certificate file and using it against a vulnerable implementation of GnuTLS, in which the certificate would be accepted as valid even though it wasn't signed by any of the trusted authorities.

The certificate signature checks in GnuTLS allow an attacker to impersonate the real server in an SSL-protected communication. We are seeing a 16% increase in the detection of this attack when comparing this to the last 30 days. Countries with more detected activity were Chile (35%), Argentina (12.50%), and Peru (12.21%). 

Signatures: GnuTLS.Security.Null.Signature.Bypass

 

Malware Activity

 

Rank

Name

Prevalence

1

Android/Agent.FJ!tr

5,631

2

W32/Injector.DZGI!tr

4,180

3

W32/Agent.AJFK!tr

4,018

4

MSIL/Kryptik.PFC!tr

2,943

5

W32/Agent.DZRK!tr.bdr

2,823

 

Dark Tequila and its Hangover -- FortiGuard Labs is aware of a new attack discovered by researchers called Dark Tequila. It is an attack that has been observed targeting users in Mexico. The threat contains an infostealing Trojan that focuses on credential thefts of banks, web hosts, online services, and file repositories (Dropbox) and domain registrar credential theft. Additional observations are a multistage payload that will only be delivered if there are no known security suites installed. Anti-analysis techniques also include the fact that it will not deliver the payload in a virtualized environment. 

The threat also contains six modules that perform the following checks: (1) a C2 connection that verifies if a MITM attack is occurring by validating itself with several popular websites, (2) if there are AV analysis tools or if it is running in a virtualized environment; if this is the case, it will immediately exit and remove traces of itself, including persistence mechanisms, (3) a keylogger that checks for known banks, Plesk, cPanel, Office 365, various registrars, Dropbox, and AWS and Rackspace online-based services for credential harvesting, (4) an infostealer, focused on email and FTP clients' credential theft, (5) a USB infector for network spread, and finally, (6) a service watchdog that checks to see if the malware and its processes are operational.

Indicator(s):
hxxps://46.17.97.12/website/
hxxps://174.37.6.34/98157cdfe45945293201e71acb2394d2
hxxps://75.126.60.251/store/


More Ransomware from HIDDEN COBRA -- There is another ransomware variant making the rounds. Dubbed "Ryuk" after a fictional manga character from a series called "Death Note." 

Discovered earlier this week by researchers, Ryuk, which is an offshoot of Hermes ransomware, first gained publicity in October 2017 via an attack against the Far Eastern International Bank (FEIB) in Taiwan. 

Sources suggest that the latest attack has similarities to Hermes, suggesting a connection to HIDDEN COBRA or a possible smokescreen. Analysis has concluded that the file marker for encrypted files have a structure similar to Hermes. Also the function for the encryption routine is similar to Hermes. 

Ryuk also incorporates the following evasion tactics:
- Destroy its encryption key
- Delete shadow copies via a .BAT file
- Also observed is that Ryuk will kill more than 40 processes and stop over 180 services. 

Payments so far have allocated the attackers $640 million in ransomware payments. The distribution vector remains unknown at this time, and could be either via spearphishing or RDP brute force attacks. According to researchers, it appears that Ryuk attacks are targeted. 

Signatures: W64/Filecoder.T!tr

Web Filtering Activity


Scratch and Ursnif -- The FortiGuard Labs Web Filtering team has recently observed new activity from the Ursnif/Gozi gang. Researchers have discovered a list of IOCs related to Ursnif/Gozi and C2 domains from Twitter. Ursnif is a data-stealing malware which targets banks and attempts to steal online banking credentials. The FortiGuard Labs Web Filtering team has added all the malicious IOCs into our database. 

Indicator(s):
hxxp://tapertoni[.]com/Flux/tst/index[.]php?l=ab3[.]tkn
hxxp://nesocina[.]com/Flux/tst/index[.]php?l=abc2[.]tkn
hxxp://seritopola[.]com/Flux/tst/index[.]php?l=zxc2[.]tkn
mlfafafafa[.]host
gbasdyqwe12[.]com
igjqwnedjgqwnqwemnta[.]net
 

Donot Call List -- A new APT group, also known as Donot targets primarily government agencies in the disputed Kashmir region. They have started to spread malware to smartphones and mobile networks. The payload delivery is in a form of a typical spearphishing attack using social engineering techniques to compel victims to install malicious APK files. From the operation, victims' credentials are stolen, such as mails and mobile phone number. The execution of the malware is hidden in two ways. It will either display a normal form of application after running or disguised the application icon similar to a legit mobile application. The FortiGuard Labs Web Filtering team has blacklisted all the known malicious URLs. 

Indicator(s):
138.68.81.74
139.59.46.35
206.189.42.61
godspeed[.]geekgalaxy[.]com
jasper[.]drivethrough[.]top

 

Source : https://fortiguard.com/resources/threat-brief/2018/08/24/fortiguard-threat-intelligence-brief-august-24-2018

Why to choose us?

Credibility

We have been on the market since 2008 and our credibility can be approved by partnership with prominent companies in the field of IT and mostly by lots of satisfied customers who use our services. We are not freshmen. Our team knows what your IT infrastructure needs and we will be happy to provide it to you. Our quality is also reflected in certification of the management systems according to the ISO 9 001 standard.

Professional attitude

Your data should not be protected by inexperienced people. Therefore, ask for a professional partner. Our rich experience is attested by trainings which our employees attend on a regular basis so that they can give you adequate advice and ensure fluent running of your infrastructure. We are owners of the 27 001 certification, which means your data are secured.

Efficiency

We do not offer you unnecessary solution just to earn money at your expense. Our purpose is not to impose a robust solution you will be using at the minimum level. However, this does not mean we do not take structure design seriously. We also consider possible plans of your company’s development. Your satisfaction and data security are our main priority.

References

IKAR, a.s.
Ministerstvo školstva, vedy, výskumu a športu SR
Saneca Pharmaceuticals a.s.
Zeppelin SK Ltd.
Správa služieb diplomatickému zboru, a.s.
Mercedes-Benz Slovakia, s.r.o.

Articles more articles »

Activity Summary - Week Ending January 4, 2019

Activity Summary - Week Ending January 4, 2019

22.02.2019 | Our partner Fortinet publishes a report every week about exposed threats. You can review the weekly report below. If you have questions, do not hesitate to contact us

Read more »

Contact


ReFoMa, s.r.o.
Dolné Rudiny 1
010 01 Žilina, Slovakia

+421 41/202 88 80 – front office
+421 41/202 88 80 – sales department
Company No.: 43892345
TAX No.: 2022541378
VAT No.: SK2022541378
Bank account (IBAN):
SK13 1100 0000 0026 2582 3735