Novinky

Aktuálne informácie zo sveta bezpečnosti IT riešení

Aktuálne hrozby podľa Fortinetu za 3.- 9.9. 2018 viac článkov »

Aktuálne hrozby podľa Fortinetu za 3.- 9.9. 2018

Nižšie v článku mate možnosť sa dočítať o odhalených hrozbách za predchádzajúci týždeň. V prípade otázok nás neváhajte kontaktovať.


Activity Summary - Week Ending September 7, 2018


A new banking Trojan has been identified targeting major Brazilian banking customers, as well as public sector organizations. This malware, code-named CamuBot, uses interesting new tactics with social engineering and malware techniques to bypass security controls, including strong authentication.

CamuBot operators begin their attacks with basic reconnaissance to find people that likely have access to the business's bank account credentials. The attackers, pretending to be bank employees, phone the banking customer and using social engineering get the victim to download the malware. The malware disguises itself as a required security module, using valid banking logos, allowing the victim to think it is indeed a required security update. Once this malware is downloaded, a fake application appears in the foreground while the malware is silently installed in the background. A connection with a command-and-control server is then started. At this time the victim is directed to what they think is the bank's online portal and they are prompted to enter login credentials, which are then captured by the threat operators.

Interesting, when the threat actor encounters a situation where strong authentication is required, the malware installs a driver that enables remote sharing of any hardware-based device. The attackers get the victim to approve sharing such device, and are now able to capture any one-time passwords that the bank generates for authentication. The attacker then creates a fraudulent session and then steals money from the victim.

FortiGuard Labs detects this malware as W32/CamuBot.A!tr. See Dark Reading for a detailed write-up.

Application Vulnerabilities / IPS

 

Rank

Name

Prevalence

1

D-Link.DSL-2750B.CLI.OS.Command.Injection

40,934

2

Apache.Struts.2.Jakarta.Multipart.Parser.Code.Execution

37,202

3

Bash.Function.Definitions.Remote.Code.Execution

26,101

4

MS.Windows.HTTP.sys.Request.Handling.Remote.Code.Execution

18,772

5

Oracle.WebLogic.Server.wls-wsat.Component.Code.Injection

18,365

 

Underminer.Exploit.Kit – The Underminer exploit kit delivers a bootkit that infects the system's boot sectors as well as a cryptocurrency-mining malware named Hidden Mellifera. It transfers malware via an encrypted transmission control protocol (TCP) tunnel and packages malicious files with a customized format similar to ROM file system format (romfs). It appears to be active since at least Q4 2017 and it is targeting mostly Asian countries such as Japan, Taiwan, and South Korea.

Underminer works in the same way other exploit kits do, such as browser profiling, filtering, and prevention of double visits, but with added functionality such as URL randomization and asymmetric encryption of payloads, which makes analysis harder for reverse engineers. 

Once someone visits the payload delivery URL, the exploit kit creates a token to the browser cookie, and if the victim already accessed the page, they will not deliver the malicious payload, but will instead deliver a 404 HTTP error message. This essentially deters researchers from reproducing the attack by trying to visit the URL more than once, and also prevents the exploit kit from attacking the same victim twice.

Underminer uses three main exploits to infect users, and they are:
* CVE-2015-5119, a use-after-free vulnerability in Adobe Flash Player patched in July 2015. ( Adobe.Flash.Player.ByteArray.Memory.Corruption )
* CVE-2016-0189, a memory corruption vulnerability in Internet Explorer (IE) patched in May 2016. (MS.VB.Script.Engine.Memory.Corruption)
* CVE-2018-4878, a use-after-free vulnerability in Adobe Flash Player patched in February 2018. (Adobe.Flash.PSDK.Listener.Use.After.Free)

We are tracking the development of this exploit kit and will keep you up to speed if any major developments are spotted on this threat.

Signatures: Underminer.Exploit.Kit

VideoLan.VLC.Media.Player.MKV.Header.Handling.Use.After.Free – VLC media player through 2.2.8 is prone to a use-after-free (UAF) vulnerability in the module MP4 demuxer; the issue if exploited correctly allows an attacker to execute arbitrary code in the context of the logged-in user via crafted MKV files.

Failed exploit attempts will likely result in denial-of-service conditions. The exploit can work on both 32 bits and 64 bits of VLC media player. This problem has been fixed in version 3.0.3.

If the user interacts in a specific way, by opening a maliciously crafted file with VideoLAN, especially if downloading unknown media files via torrents and/or unknown sources, this attack will be successful.

This affects all systems that support VLC media player, such as Windows, Linux, and macOS. There is exploit code freely available for Windows 10 x64 on popular websites dedicated to sharing threat intelligence for the open source community, such as SecLists and GitHub.

Signatures: VideoLan.VLC.Media.Player.MKV.Header.Handling.Use.After.Free

 

Malware Activity

 

Rank

Name

Prevalence

1

WM/Agent.Q!tr

5,170

2

W32/Injector.DZYZ!tr

5,696

3

W32/Injector.EADU!tr

2,607

4

W32/Injector.EABP!tr

2,583

5

W32/Agent.HTL!tr.rkit

2,343

 

CeidPagelock and Search Hijacks/Hijinks – CEIDPageLock is a new rootkit observed this week intercepting search results of users. CEIDPageLock is reminiscent of search page hijacker malware, such as CoolWebSearch and Bayrob of past lore. CEIDPageLock has been observed being distributed via a RIG exploit kit. It mostly is targeting users in China, one mechanism for distribution, a dropper that is a signed certificate, appears to be revoked, at the time of this writing. The dropper's main goal is to extract the driver and place it into the Windows Temp directory. Once extracted, the driver connects to tj999[.]top, to send the MAC address and user ID of the victim machine. The driver contains tricks to evade AV detection, and will connect to two predetermined C2 servers in order to serve the victim with the tampered homepage. The attacker then gathers statistics on the victim and makes a profit off the victim every time a search is queried. The driver employs anti-evasion tactics and is protected by VMProtect, which makes analysis difficult.

Indicator(s):
www[.]tj999[.]top
42[.]51[.]223[.]86

118[.]193[.]211[.]11

A Code of Dishonor - Bushido –
 Bushido is a new IoT botnet that researchers discovered this week. Observations for this new IoT botnet malware include the ability to connect to an IRC server, where it can receive a multitude of commands from it, which makes it very modular in scope. It appears that Bushido propagates by brute forcing common passwords on Telnet port 23. Bushido then propagates where the infection script essentially downloads various Linux binaries from the malicious server and runs them. It is also observed that these binaries are compiled for different platforms, furthering spread and impact.

Observed strings within the malware are: C2 server IP, username, and password used to brute force Telnet service. HTTP headers, user agent strings, lots of IRC commands and strings, libc function names, and nmap scan commands and error logging. The main functionality observed in this botnet is DDoS functionality, via TCP/UDP/ICMP attacks. Another interesting functionality observed in the malware is its ability to download the source, compile itself, and then delete it to thwart analysis. It appears to have incorporated some of Mirai's source as well.

Signatures: PHP/PBot.G!tr.bdr, BASH/Shell_Agent.P!tr.dldr

Web Filtering Activity


How Do They Come Up with These Names? (aka Asacub) – This malicious payload is distributed through SMS containing a phishing link and offering to view a photo or MMS. Upon clicking the link, a webpage prompting the victim to download the APK file of the Trojan will appear. However, in order for the Trojan to be installed into the device, the victim would need to allow installation of apps from an unknown service. During the installation, Asacub will prompt the victim for Device Administrator rights or Accessibility Service, depending on the version of Trojan. Once the selection has been made, it will then set itself as a default SMS app and disappears from the screen. If the selection has been rejected, the window will reopen every few seconds. The Trojan would then begin communicating with the C&C servers upon successful installation. The purpose of this malware is intended to obtain money from the victims of mobile banking services.

FortiGuard Labs has blacklisted all the related IOCs into the database.

Indicator(s):
155[.]133[.]82[.]181
155[.]133[.]82[.]240
155[.]133[.]82[.]244
185[.]234[.]218[.]59
195[.]22[.]126[.]160
195[.]22[.]126[.]163

 

 Source: https://fortiguard.com/resources/threat-brief/2018/09/07/fortiguard-threat-intelligence-brief-september-07-2018

 

 

Prečo si vybrať nás?

Dôveryhodnosť

Na trhu pôsobíme už od roku 2008 a našu dôveryhodnosť potvrdzujú partnerstvá popredných spoločností v oblasti IT a hlavne množstvo spokojných zákazníkov, ktorí využívajú naše služby. Nie sme nováčikom a vieme, čo vaša IT infraštruktúra potrebuje a radi vám to ponúkneme. O našej kvalite hovorí aj certifikácia systémov manažérstva podľa normy ISO 9 001.

Profesionalita

Bezpečnosť vašich dát nedokáže chrániť len tak niekto. Obráťte sa teda na profesionálneho partnera. Naše bohaté skúsenosti potvrdzujú školenia, ktoré naši zamestnanci absolvujú pravidelne, aby vám vedeli vždy poskytnúť adekvátne rady a zabezpečiť tak plynulý a ničím nerušený chod vašej infraštruktúry. Sme vlastníkom certifikácie 27 001, takže vaše dáta sú u nás v bezpečí.

Efektivita

Neponúkame vám riešenia, ktoré sú pre vás zbytočné, len aby sme na vás zarobili. Našim cieľom nie je nanútiť vám robustné riešenie, ktoré budete využívať na minimum, no zároveň návrh štruktúry berieme vážne aj s ohľadom na prípadné plány rozvoja vašej spoločnosti. Prioritou pre nás je vaša spokojnosť a bezpečnosť vašich dát.

Referencie

Správa služieb diplomatickému zboru, a.s.
Mercedes-Benz Slovakia, s.r.o.
ŽSR – Železničné telekomunikácie Bratislava
IKAR, a.s.
PosAm, spol. s r.o.
Kancelária prezidenta Slovenskej republiky

Kontakt


ReFoMa, s.r.o.
Dolné Rudiny 1
010 01 Žilina, Slovakia

+421 41/202 88 80 – sekretariát
+421 41/202 88 80 – obchodné oddelenie
IČO: 43892345
DIČ: 2022541378
IČ DPH: SK2022541378
Okresný súd Žilina, odd.: Sro, vl. číslo 20197/L

Bankové spojenie (IBAN):
SK13 1100 0000 0026 2582 3735