Malware Devil

Friday, December 4, 2020

The chronicles of Emotet

More than six years have passed since the banking Trojan Emotet was first detected. During this time it has repeatedly mutated, changed direction, acquired partners, picked up modules, and generally been the cause of high-profile incidents and multimillion-dollar losses. The malware is still in fine fettle, and remains one of the most potent cybersecurity threats out there. The Trojan is distributed through spam, which it sends itself, and can spread over local networks and download other malware.

All its “accomplishments” have been described thoroughly in various publications and reports from companies and independent researchers. This being the case, we decided to summarize and collect in one place everything that is currently known about Emotet.

2014

June

Emotet was first discovered in late June 2014 by TrendMicro. The malware hijacked user banking credentials using the man-in-the-browser technique. Even in those early days, the malware was multicomponent: browser traffic was intercepted by a separate module downloaded from the C&C server. Its configuration file with web injections was also loaded from there. The banker’s main targets were clients of German and Austrian banks, and its main distribution vector was spam disguised as bank emails with malicious attachments or links to a ZIP archive containing an executable file.

Examples of malicious emails with link and attachment

November

In the fall of 2014, we discovered a modification of Emotet with the following components:

  • Module for modifying HTTP(S) traffic
  • Module for collecting email addresses in Outlook
  • Module for stealing accounts in Mail PassView (a password recovery tool)
  • Spam module (downloaded additionally as an independent executable file from addresses not linked to C&C)
  • Module for organizing DDoS attacks

We came across the latter bundled with other malware, and assume that it was added to Emotet with a cryptor (presumably back then Emotet’s authors did not have their own and so used a third-party one, possibly hacked or stolen). It is entirely possible that the developers were unaware of its presence in their malware. In any event, this module’s C&C centers were not responsive, and it itself was no longer updated (compilation date: October 19, 2014).

In addition, the new modification had begun to employ techniques to steal funds from victims’ bank accounts automatically, using the so-called Automatic Transfer System (ATS). You can read more about this modification in our report.

December

The C&C servers stopped responding and the Trojan’s activity dropped off significantly.

2015

January

In early 2015, a new Emotet modification was released, not all that different from the previous one. Among the changes were: new built-in public RSA key, most strings encrypted, ATS scripts for web injection cleared of comments, targets included clients of Swiss banks.

June

The C&C servers again became unavailable, this time for 18 months. Judging by the configuration file with web injects, the Trojan’s most recent victims were clients of Austrian, German and Polish banks.

2016

December

Emotet redux: for the first time in a long while, a new modification was discovered. This version infected web-surfing victims using the RIG-E and RIG-V exploit kits. This distribution method was not previously used by the Trojan, and, fast-forwarding ahead, would not be employed again. We believe that this was a trial attempt at a new distribution mechanism, which did not pass muster with Emotet’s authors.

The C&C communication protocol in this modification was also changed: for amounts of data less than 4 KB, a GET request was used, and the data itself was transmitted in the Cookie field of the HTTP header. For larger amounts, a POST request was used. The RC4 encryption algorithm had been replaced by AES, with the protocol itself based on a slightly modified Google Protocol Buffer. In response to the request, the C&C servers returned a header with a 404 Not Found error, which did not prevent them from transmitting the encrypted payload in the body of the reply.

Examples of GET and POST requests used by Emotet

The set of modules sent to the Trojan from C&C was different too:

  • Out was the module for intercepting and modifying HTTP(S) traffic
  • In was a module for harvesting accounts and passwords from browsers (WebBrowserPassView)

2017

February

Up until now, we had no confirmation that Emotet could send spam independently. A couple of months after the C&C servers kicked back into life, we got proof when a spam module was downloaded from there.

April

In early April, a large amount of spam was seen targeting users in Poland. Emails sent in the name of logistics company DHL asked recipients to download and open a “report” file in JavaScript format. Interestingly, the attackers did not try the further trick of hiding the executable JavaScript as a PDF. The calculation seemed to be that many users would simply not know that JavaScript is not at all a document or report file format.

Example of JS file names used:
 dhl__numer__zlecenia___4787769589_____kwi___12___2017.js (MD5:7360d52b67d9fbb41458b3bd21c7f4de)

In April, a similar attack involving fake invoices targeted British-German users.

invoice__924__apr___24___2017___lang___gb___gb924.js (MD5:e91c6653ca434c55d6ebf313a20f12b1)
telekom_2017_04rechnung_60030039794.js (MD5:bcecf036e318d7d844448e4359928b56)

Then in late April, the tactics changed slightly when the spam emails were supplemented with a PDF attachment which, when opened, informed the user that the report in JavaScript format was available for download via the given link.

Document_11861097_NI_NSO___11861097.pdf (MD5: 2735A006F816F4582DACAA4090538F40)

Example of PDF document contents

Document_43571963_NI_NSO___43571963.pdf (MD5: 42d6d07c757cf42c0b180831ef5989cb)

Example of PDF document contents

As for the JavaScript file itself, it was a typical Trojan-Downloader that downloaded and ran Emotet. Having successfully infected the system, the script showed the user a pretty error window.

Error message displayed by the malicious JavaScript file

May

In May, the scheme for distributing Emotet via spam changed slightly. This time, the attachment contained an Office document (or link to it) with an image disguised as an MS Word message saying something about the version of the document being outdated. To open the document, the user was prompted to enable macros. If the victim did so, a malicious macro was executed that launched a PowerShell script that downloaded and ran Emotet.

Screenshot of the opened malicious document ab-58829278.dokument.doc (MD5: 21542133A586782E7C2FA4286D98FD73)

Also in May, it was reported that Emotet was downloading and installing the banking Trojan Qbot (or QakBot). However, we cannot confirm this information: among the more than 1.2 million users attacked by Emotet, Qbot was detected in only a few dozen cases.

June

Starting June 1, a tool for spreading malicious code over a local network (Network Spreader), which would later become one of the malware modules, began being distributed from Emotet C&C servers.  The malicious app comprised a self-extracting RAR archive containing the files bypass.exe (MD5: 341ce9aaf77030db9a1a5cc8d0382ee1) and service.exe (MD5: ffb1f5c3455b471e870328fd399ae6b8).

Self-extracting RAR archive with bypass.exe and service.exe

bypass.exe:

  • Searches network resources by brute-forcing passwords using a built-in dictionary
  • Copies service.exe to a suitable resource
  • Creates a service on the remote system to autorun service.exe

Screenshot of the function for creating the service (bypass.exe)

Screenshot with a list of brute-force passwords (bypass.exe)

In terms of functionality, service.exe is extremely limited and only sends the name of the computer to the cybercriminals’ server.

Function for generating data to be sent to C&C

Function for sending data to C&C

The mailing was obviously a test version, and the very next day we detected an updated version of the file. The self-extracting archive had been furnished with a script for autorunning bypass.exe (MD5: 5d75bbc6109dddba0c3989d25e41851f), which had not undergone changes, while service.exe (MD5: acc9ba224136fc129a3622d2143f10fb) had grown in size by several dozen times.

Self-extracting RAR archive with bypass.exe and service.exe

The updated service.exe was larger because its body now contained a copy of Emotet. A function was added to save Emotet to disk and run it before sending data about the infected machine to C&C.

New functions in service.exe for saving Emotet to disk and running it

July

An update to the Emotet load module was distributed over the botnet. One notable change: Emotet had dropped GET requests with data transfer in the Cookie field of the HTTP header. Henceforth, all C&C communication used POST (MD5: 643e1f4c5cbaeebc003faee56152f9cb).

August

Network Spreader is included in the Emotet “distribution kit” as a DLL (MD5: 9c5c9c4f019c330aadcefbb781caac41), the compilation date of the new module is July 24, 2017, but it was obtained only in August. Recall that it used to be a self-extracting RAR archive with two files: bypass.exe and service.exe. The distribution mechanism did not change much, but the list of brute-force passwords was expanded significantly to exactly 1,000.

Screenshot of the decrypted password list

November

In November 2017, IBM X-Force published a report about the new IcedId banker. According to the researchers, Emotet had been observed spreading it. We got our hands on the first IcedId sample (MD5: 7e8516db16b18f26e504285afe4f0b21) in April, and discovered back then that it was wrapped in a cryptor also used in Emotet. The cryptor was not just similar, but a near byte-for-byte copy of the one in the Emotet sample (MD5: 2cd1ef13ee67f102cb99b258a61eeb20), which was being distributed at the same time.

2018

January

Emotet started distributing the banking Trojan Panda (Zeus Panda, first discovered in 2016 and based on the leaked Zbot banker source code, carries out man-in-the-browser attacks and intercepts keystrokes and input form content on websites).

April

April 9

In early April, Emotet acquired a module for distribution over wireless networks (MD5: 75d65cea0a33d11a2a74c703dbd2ad99), which tried to access Wi-Fi using a dictionary attack. Its code resembled that of the Network Spreader module (bypass.exe), which had been supplemented with Wi-Fi connection capability. If the brute-force was successful, the module transmitted data about the network to C&C.

Like bypass.exe, the module was distributed as a separate file (a.exe) inside a self-extracting archive (MD5: 5afdcffca43f8e7f848ba154ecf12539). The archive also contained the above-described service.exe (MD5: 5d6ff5cc8a429b17b5b5dfbf230b2ca4), which, like its first version, could do nothing except send the name of the infected computer to C&C.

Self-extracting RAR archive with a component for distribution over Wi-Fi

The cybercriminals quickly updated the module, and within a few hours of detecting the first version we received an updated self-extracting archive (MD5: d7c5bf24904fc73b0481f6c7cde76e2a) containing a new service.exe with Emotet inside (MD5: 26d21612b676d66b93c51c611fa46773).

Self-extracting RAR archive with updated service.exe

The module was first publicly described only in January 2020, by Binary Defense. The return to the old distribution mechanism and the use of code from old modules looked a little strange, since back in 2017 bypass.exe and service.exe had been merged into one DLL module.

April 14

Emotet again started using GET requests with data transfer in the Cookie field of the HTTP header for data transfer sizes of less than 1 KB simultaneously with POST requests for larger amounts of data. (MD5: 38991b639b2407cbfa2e7c64bb4063c4). Also different was the template for filling the Cookie field. If earlier it took the form Cookie: %X=, now it was Cookie: %u =. The newly added space between the numbers and the equals sign helped to identify Emotet traffic.

Example of a GET request

April 30

The C&C servers suspended their activity and resumed it only on May 16, after which the space in the GET request had gone.

Example of a corrected GET request

June

Yet another banking Trojan started using Emotet to propagate itself. This time it was Trickster (or Trickbot) — a modular banker known since 2016 and the successor to the Dyreza banker.

July

The so-called UPnP module (MD5: 0f1d4dd066c0277f82f74145a7d2c48e), based on the libminiupnpc package, was obtained for the first time. The module enabled port forwarding on the router at the request of a host in the local network. This allowed the attackers not only to gain access to local network computers located behind NAT, but to turn an infected machine into a C&C proxy.

August

In August, there appeared reports of infections by the new Ryuk ransomware — a modification of the Hermes ransomware known since 2017. It later transpired that the chain of infection began with Emotet, which downloaded Trickster, which in turn installed Ryuk. Both Emotet and Trickster by this time had been armed with functions for distribution over a local network, plus Trickster exploited known vulnerabilities in SMB, which further aided the spread of the malware across the local network. Coupled with Ryuk, it made for a killer combination.

At the end of the month, the list of passwords in the Network Spreader module was updated. They still numbered 1,000, but about 100 had been changed (MD5: 3f82c2a733698f501850fdf4f7c00eb7).

Screenshot of the decrypted password list

October

October 12

The C&C servers suspended their activity while we registered no distribution of new modules or updates. Activity resumed only on October 26.

October 30

The data exfiltration module for Outlook (MD5:64C78044D2F6299873881F8B08D40995) was updated. The key innovation was the ability to steal the contents of the message itself. All the same, the amount of stealable data was restricted to 16 KB (larger messages were truncated).

Comparison of the code of the old and new versions of the data exfiltration module for Outlook

November

The C&C servers suspended their activity while we registered no distribution of new modules or updates. Activity resumed only on December 6.

December

More downtime while C&C activity resumed only on January 10, 2019.

2019

March

March 14

Emotet again modified a part of the HTTP protocol, switching to POST requests and using a dictionary to create the path. The Referer field was now filled, and Content-Type: multipart/form-data appeared.  (MD5: beaf5e523e8e3e3fb9dc2a361cda0573)

Code of the POST request generation function

Example of a POST request

March 20

Yet another change in the HTTP part of the protocol. Emotet dropped Content-Type: multipart/form-data. The data itself was encoded using Base64 and UrlEncode (MD5: 98fe402ef2b8aa2ca29c4ed133bbfe90).

 

Code of the updated POST request generation function

Example of a POST request

April

The first reports appeared that information stolen by the new data exfiltration module for Outlook was being used in Emotet spam mailings: the use of stolen topics, mailing lists and message contents was observed in emails.

May

The C&C servers stopped working for quite some time (three months). Activity resumed only on August 21, 2019. Over the following few weeks, however, the servers only distributed updates and modules with no spam activity being observed. The time was likely spent restoring communication with infected systems, collecting and processing data, and spreading over local networks.

November

A minor change to the HTTP part of the protocol. Emotet dropped the use of a dictionary to create the path, opting for a randomly generated string (MD5: dd33b9e4f928974c72539cd784ce9d20).

Example of a POST request

February

February 6

Yet another change in the HTTP part of the protocol. The path now consisted not of a single string, but of several randomly generated words. Content-Type again became multipart/form-data.

Example of a POST request

Along with the HTTP part, the binary part was also updated. The encryption remained the same, but Emotet dropped Google Protocol Buffer and switched to its own format. The compression algorithm also changed, with zlib replaced by liblzf. More details about the new protocol can be found in the Threat Intel and CERT Polska reports.

February 7

C&C activity started to decline and resumed only in July 2020. During this period, the amount of spam fell to zero. At the same time, Binary Defense, in conjunction with various CERTs and the infosec community, began to distribute EmoCrash, a PowerShell script that creates incorrect values ​for system registry keys used by Emotet. This caused the malware to “crash” during installation. This killswitch worked until August 6, when the actors behind Emotet patched the vulnerability.

July

Only a few days after the resumption of spam activity, online reports appeared that someone was substituting the malicious Emotet payload on compromised sites with images and memes. As a result, clicking the links in spam emails opened an ordinary picture instead of a malicious document. This did not last long, and by July 28 the malicious files had stopped being replaced with images.

Conclusion

Despite its ripe old age, Emotet is constantly evolving and remains one of the most current threats out there. Save for the explosive growth in distribution after five months of inactivity, we have yet to see anything previously unobserved; that said, a detailed analysis always takes time, and we will publish the results of the study in due course. On top of that, we are currently observing the evolution of third-party malware that propagates using Emotet, which we will certainly cover in future reports.

Our security solutions can block Emotet at any stage of attack. The mail filter blocks spam, the heuristic component detects malicious macros and removes them from Office documents, while the behavioral analysis module makes our protection system resistant not only to statistical analysis bypass techniques, but to new modifications of program behavior as well.

To mitigate the risks, it is vital to receive accurate, reliable, before-the-fact information about all information security matters. Scanning IP addresses, file hashes and domains/URLs on opentip can determine if an object poses a genuine threat based on risk levels and additional contextual information. Analyzing files with opentip, using our proprietary technologies, including dynamic, statistical and behavioral analysis, as well as our global reputation system, can help detect advanced mass and latent threats.

And Kaspersky Threat Intelligence is there to track constantly evolving cyberthreats, analyze them, respond to attacks in good time, and minimize the consequences.

IOC

Most active C&Cs in November 2020:

173.212.214.235:7080
167.114.153.111:8080
67.170.250.203:443
121.124.124.40:7080
103.86.49.11:8080
172.91.208.86:80
190.164.104.62:80
201.241.127.190:80
66.76.12.94:8080
190.108.228.27:443

Links to Emotet extracted from malicious documents

hxxp://tudorinvest[.]com/wp-admin/rGtnUb5f/
hxxp://dp-womenbasket[.]com/wp-admin/Li/
hxxp://stylefix[.]co/guillotine-cross/CTRNOQ/
hxxp://ardos.com[.]br/simulador/bPNx/
hxxps://sangbadjamin[.]com/move/r/
hxxps://asimglobaltraders[.]com/baby-rottweiler/duDm64O/
hxxp://sell.smartcrowd[.]ae/wp-admin/CLs6YFp/
hxxps://chromadiverse[.]com/wp-content/OzOlf/
hxxp://rout66motors[.]com/wp-admin/goi7o8/
hxxp://caspertour.asc-florida[.]com/wp-content/gwZbk/

MD5s of malicious Office documents downloading Emotet

59d7ae5463d9d2e1d9e77c94a435a786
7ef93883eac9bf82574ff2a75d04a585
4b393783be7816e76d6ca4b4d8eaa14a

MD5s of Emotet executable files

4c3b6e5b52268bb463e8ebc602593d9e
0ca86e8da55f4176b3ad6692c9949ba4
8d4639aa32f78947ecfb228e1788c02b
28df8461cec000e86c357fdd874b717e
82228264794a033c2e2fc71540cb1a5d
8fc87187ad08d50221abc4c05d7d0258
b30dd0b88c0d10cd96913a7fb9cd05ed
c37c5b64b30f2ddae58b262f2fac87cb
3afb20b335521c871179b230f9a0a1eb
92816647c1d61c75ec3dcd82fecc08b2

The post The chronicles of Emotet appeared first on Malware Devil.



https://malwaredevil.com/2020/12/04/the-chronicles-of-emotet/?utm_source=rss&utm_medium=rss&utm_campaign=the-chronicles-of-emotet

People Are Paying Ransomware Attackers In Large Numbers In 2020

Hackers have increasingly gravitated to ransomware attacks in 2020, as being one of the best and most reliable paths to a payday.

That brings to mind an interesting question though. Naturally, the viability of this type of attack comes down to what percentage of victims are willing to actually pay the ransom, and what is that number as of right now?

Crowdstrike recently took a deep dive into the best available data to find out. They discovered that slightly more than one in four (27 percent) of companies that fall victim to a ransomware attack wind up paying the toll, rather than restoring from backup, and the average ransom demanded is now slightly higher than $1 million USD.

Given the steady rise in popularity of this type of attack, and how easy it is to avoid paying the ransom, one might wonder why such a high percentage of business owners opt to pay up. There are two parts to the explanation.

First, although it does seem that on the surface of things, it’s easy to set the conditions that would make it easy to recover from such an attack (have regular backups). However, unfortunately in practice, that’s easier said than done. Few companies back up their entire network from end to end, so even if they’ve got current backups, there’s going to be lost data and it’s going to take quite some time to restore full functionality, figure out what’s missing, try and recreate that data, etc.

The other issue is that in a surprising number of cases, a company’s backup plan isn’t as robust or as complete as they imagined it was. We’ve seen instances where the company’s CEO thought they were doing backups on a weekly basis, only to discover that the last good backup they had available was from six months before.

When you suffer from a ransomware attack and then find out your last backup is six months old, you don’t really have any other moves to make. You pay up and hope the hackers deliver on their promise to unlock your files.

Given the prevalence of ransomware attacks, if you’re not preparing for one, you should be. When was your company’s last backup taken? How sure about that are you?

Used with permission from Article Aggregator

Read More

The post People Are Paying Ransomware Attackers In Large Numbers In 2020 appeared first on Malware Devil.



https://malwaredevil.com/2020/12/03/people-are-paying-ransomware-attackers-in-large-numbers-in-2020/?utm_source=rss&utm_medium=rss&utm_campaign=people-are-paying-ransomware-attackers-in-large-numbers-in-2020

Clearswift Secure Email and ICAP Gateway now Available on AWS Marketplace


English
Tags: 
<a href=’/blog?tag=’></a> <a href=’/blog?tag=’></a> <a href=’/blog?tag=’></a>

There’s no doubting the many benefits brought by a move to the cloud; it offers organizations flexibility, scalability and reduces capital costs. The adoption of cloud computing is widespread with 80% of organizations predicted to make the move by 2025. When moving on-premise infrastructures, organizations can also benefit from cloud-based services that manage the availability of applications, leaving organizations free to focus on the operational aspects of the software.

In the last couple of years, Clearswift has seen an increase in demand for cloud-based deployment options and managed email services. And as a result, we’ve been developing our software products to support installations on Public Cloud platforms such as AWS and Azure. In Version 4 we moved from a proprietary Linux distribution to a Red Hat Enterprise Linux (RHEL) platform – an off-the-shelf operating system that allows software to run in cloud environments.

Now, with Version 5, customers can install a complete Secure Email or ICAP Gateway from the AWS Marketplace. Installing directly from AWS significantly simplifies the installation process, reduces the chance of installation errors, and saves deployment time. Further platforms will include Microsoft Azure Marketplace, the world’s second largest cloud platform.

Visit Secure Email Gateway on AWS Marketplace.

Visit Secure ICAP Gateway on AWS Marketplace.

While our Secure Email Gateway can run as a standalone product for scanning email before it enters or leaves an organization, our Secure ICAP Gateway is typically used alongside web proxies such as Zscaler, F5 or Blue Coat or secure file transfer products such as GoAnywhere MFT or Globalscape to provide data hygiene and data loss prevention capabilities.

To find out more about Clearswift’s cloud strategy, request a demo from the team.

Request a Demo

Tags: 

The post Clearswift Secure Email and ICAP Gateway now Available on AWS Marketplace appeared first on Security Boulevard.

Read More

The post Clearswift Secure Email and ICAP Gateway now Available on AWS Marketplace appeared first on Malware Devil.



https://malwaredevil.com/2020/12/04/clearswift-secure-email-and-icap-gateway-now-available-on-aws-marketplace/?utm_source=rss&utm_medium=rss&utm_campaign=clearswift-secure-email-and-icap-gateway-now-available-on-aws-marketplace

Celebrating Holidays With Older Family Members | Avast

Many of us will be spending time away from our family members this holiday season, even with Covid-19 vaccines on the horizon. Not being able to see grandchildren or nieces and nephews will be especially heartbreaking for older family members. And, unfortunately, many people in older generations either don’t have the technology to stay in touch — or they aren’t sure how to operate it.

The post Celebrating Holidays With Older Family Members | Avast appeared first on Security Boulevard.

Read More

The post Celebrating Holidays With Older Family Members | Avast appeared first on Malware Devil.



https://malwaredevil.com/2020/12/04/celebrating-holidays-with-older-family-members-avast/?utm_source=rss&utm_medium=rss&utm_campaign=celebrating-holidays-with-older-family-members-avast

Supreme Court Reviews CFAA | Avast

A 34-year-old hacking law called the Computer Fraud and Abuse Act (CFAA) sits at the center of a U.S. Supreme Court hearing where the defense insists the law was too vaguely written. Nathan van Buren, a former Georgia police officer, is on trial for allegedly accepting payment to search for a license plate in the police database, which violates the CFAA.

The post Supreme Court Reviews CFAA | Avast appeared first on Security Boulevard.

Read More

The post Supreme Court Reviews CFAA | Avast appeared first on Malware Devil.



https://malwaredevil.com/2020/12/04/supreme-court-reviews-cfaa-avast/?utm_source=rss&utm_medium=rss&utm_campaign=supreme-court-reviews-cfaa-avast

Why Hackers Love the Pandemic

pandemic

The novel coronavirus pandemic has been a boon for cybercriminals seeking profit amid chaos. Tanium’s special report of 1,000 chief executives and VPs revealed that 90% of enterprises surveyed experienced an increase in cyberattacks due to the pandemic and nearly all (98%) of CXOs and VPs incurred security challenges within the first two months. Hackers..

The post Why Hackers Love the Pandemic appeared first on Security Boulevard.

Read More

The post Why Hackers Love the Pandemic appeared first on Malware Devil.



https://malwaredevil.com/2020/12/04/why-hackers-love-the-pandemic/?utm_source=rss&utm_medium=rss&utm_campaign=why-hackers-love-the-pandemic

A Holistic Approach to Kubernetes Security and Compliance

Taking a holistic approach to security and risk is essential for any organization that uses Kubernetes or other cloud based container platform. As an open source container orchestration system for automating deployment, scaling, and management of containerized applications, Kubernetes is … Read more

The post A Holistic Approach to Kubernetes Security and Compliance appeared first on DivvyCloud.

The post A Holistic Approach to Kubernetes Security and Compliance appeared first on Security Boulevard.

Read More

The post A Holistic Approach to Kubernetes Security and Compliance appeared first on Malware Devil.



https://malwaredevil.com/2020/12/04/a-holistic-approach-to-kubernetes-security-and-compliance/?utm_source=rss&utm_medium=rss&utm_campaign=a-holistic-approach-to-kubernetes-security-and-compliance

Detecting Actors Activity with Threat Intel, (Fri, Dec 4th)

Over the past three weeks I have applied threat intel to all the inbound traffic going to my honeypot and the stats have shown some interesting trends. The top 20 TCP ports targeted have been between 1-50 and top 20 UDP 7-11211. During this period, the sensor recorded over 301K indicators matching threat intel from known actors.

A Look at the Top 3 IPs

The port the most targeted over that period has been the Telnet (TCP/23) service with over 97% of the traffic.

As a security practitioner, I have stopped using Telnet years ago (a honeypot being the exception). To find out how widespread Telnet is available, a query for this service on Shodan[4] shows there are still thousand of host showing this port as open and/or active. This map from Censys [8] illustrate a list of 2090422 hosts matched the search query where Telnet was open. Censys only shows the first 500 locations on the map.

IP 207.244.234.226 launched a large scan on the 30 Nov (12:00-06:00) lasting for 6 hours actively scanning various TCP ports multiple times (46836 records). However, IP 88.214.24.77 has been a lot more consistent over time, scanning mostly TCP ports between 1000-1100 illustrated below:

The third IP 5.182.210.95 has been scanning a single port over the past few and it is MemoryCache (UDP/11211). This source was first report in DShield on the 14 Nov 2020 with a last report today. The reports in DShield are mostly against LDAP (UDP/389) and only one record for 11211.

Last, this is the list of top 10 IPs with Intel source, techniques and total.

Two freely and widely available intel platform Anomali Staxx[1] after registration is available for download and installed locally (has API) and AlienVault[2] can be accessed via API and is widely supported.

[1] https://www.anomali.com/resources/staxx
[2] https://otx.alienvault.com/
[3] https://isc.sans.edu/port.html?port=23
[4] https://www.shodan.io/search?query=telnet
[5] https://isc.sans.edu/ipinfo.html?ip=207.244.234.226
[6] https://isc.sans.edu/ipinfo.html?ip=88.214.24.77
[7] https://isc.sans.edu/ipinfo.html?ip=5.182.210.95
[8] https://censys.io/ipv4/map?q=protocols%3A+(“23%2Ftelnet”)

———–
Guy Bruneau IPSS Inc.
My Handler Page
Twitter: GuyBruneau
gbruneau at isc dot sans dot edu

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post Detecting Actors Activity with Threat Intel, (Fri, Dec 4th) appeared first on Malware Devil.



https://malwaredevil.com/2020/12/04/detecting-actors-activity-with-threat-intel-fri-dec-4th/?utm_source=rss&utm_medium=rss&utm_campaign=detecting-actors-activity-with-threat-intel-fri-dec-4th

ISC Stormcast For Friday, December 4th 2020 https://isc.sans.edu/podcastdetail.html?id=7278, (Fri, Dec 4th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post ISC Stormcast For Friday, December 4th 2020 https://isc.sans.edu/podcastdetail.html?id=7278, (Fri, Dec 4th) appeared first on Malware Devil.



https://malwaredevil.com/2020/12/04/isc-stormcast-for-friday-december-4th-2020-https-isc-sans-edu-podcastdetail-htmlid7278-fri-dec-4th/?utm_source=rss&utm_medium=rss&utm_campaign=isc-stormcast-for-friday-december-4th-2020-https-isc-sans-edu-podcastdetail-htmlid7278-fri-dec-4th

Github Code Scanning: vulnerability scanner by Justin Hutchings

 

GitHub code scanning is a developer-first, GitHub-native approach to easily find security vulnerabilities before they reach production. We’re thrilled to announce the general availability of code scanning. You can enable it on your public repository today!

One year ago, GitHub welcomed Semmle. We’ve since worked to bring the revolutionary code analysis capabilities of its CodeQL technology to GitHub users as a native capability. At GitHub Satellite in May, we released the first beta of our native integration: code scanning. Now, thanks to the thousands of developers in the community who tested and gave feedback, we’re proud to announce that code scanning is generally available.

Code scanning helps you prevent security issues in code

Code scanning is designed for developers first. Instead of overwhelming you with linting suggestions, code scanning runs only the actionable security rules by default so that you can stay focused on the task at hand.

Code scanning integrates with GitHub Actions—or your existing CI/CD environment—to maximize  flexibility for your team. It scans code as it’s created and surfaces actionable security reviews within pull requests and other GitHub experiences you use everyday, automating security as a part of your workflow. This helps ensure vulnerabilities never make it to production in the first place.

Code scanning is powered by CodeQL—the world’s most powerful code analysis engine. You can use the 2,000+ CodeQL queries created by GitHub and the community, or create custom queries to easily find and prevent new security concerns.

Built on the open SARIF standard, code scanning is extensible so you can include open source and commercial static application security testing (SAST) solutions within the same GitHub-native experience you love. You can integrate third-party scanning engines to view results from all your security tools in a single interface and also export multiple scan results through a single API. We’ll share more on our extensibility capabilities and partner ecosystem soon, so stay tuned.

Exciting results so far! 

Since introducing the beta in May, we’ve seen tremendous adoption within the community:

  • We’ve scanned over 12,000 repositories 1.4 million times, and found more than 20,000 security issues including remote code execution (RCE), SQL injection, and cross site scripting (XSS) vulnerabilities.
  • Developers and maintainers fixed 72% of reported security errors identified in their pull requests before merging in the last 30 days. We’re proud to see this impact, given industry data shows that less than 30% of all flaws are fixed one month after discovery.
  • We’ve had 132 community contributions to CodeQL’s open sourced query set.
  • We’ve partnered with more than a dozen open source and commercial security vendors to allow developers to run CodeQL and industry leading solutions for SAST, container scanning, and infrastructure as code validation side-by-side in GitHub’s native code scanning experience.

Hear from teams already using it

Code scanning is free for public repositories and is a GitHub Advanced Security feature for GitHub Enterprise. Here’s what some teams have shared about their experience with code scanning so far:

“We chose Advanced Security for its out-of-the-box functionality and the custom functionality that we can build off of. Instead of it taking a full day to find and fix one security issue, we were able to find and fix three issues in the same amount of time.”

– Charlotte Townsley, Director of Security Engineering, Auth0

“GitHub allows us to enable security, versus enforcing it. The sooner we can catch vulnerabilities and product issues, the better it is for the company in the long run.”

– James Hurley, Director of Developer Services, McKesson Labs

“If Advanced Security reports error issues, the pull request isn’t allowed to be merged. If a security issue is found, we’re informed immediately. We go over anything GitHub has highlighted, and we make sure that it’s resolved before releasing a stable release. For the developer who will press the merge button, it inspires confidence.”

– Dimosthenis Kaponis, CTO, Netdata

Enable code scanning for public and private repositories

  • Code scanning is free for public repositories. Learn more about how to enable code scanning today.
  • For private repositories, code scanning is available to GitHub Enterprise through Advanced Security. Contact Sales to learn more.
  • For those interested in helping to secure the open source ecosystem, we also invite you to contribute to the growing list of CodeQL queries and become part of our growing security community.

About the Author

Justin Hutchings is a product leader with a 13 years experience in building security features for developers. He worked with worldwide known technology companies, including Microsoft and Rose-Hulman Institute of Technology. Currently he’s a Staff Product Manager at GitHub – a code hosting platform that lets programmers from around the world work together and build new projects.

LinkedIn: https://www.linkedin.com/in/hutchingsjustin/

 

 

 

 

 

The post Github Code Scanning: vulnerability scanner by Justin Hutchings appeared first on Hakin9 – IT Security Magazine.

Read More

The post Github Code Scanning: vulnerability scanner by Justin Hutchings appeared first on Malware Devil.



https://malwaredevil.com/2020/12/03/github-code-scanning-vulnerability-scanner-by-justin-hutchings/?utm_source=rss&utm_medium=rss&utm_campaign=github-code-scanning-vulnerability-scanner-by-justin-hutchings

Traffic Analysis Quiz: Mr Natural, (Thu, Dec 3rd)

Introduction

It’s time for another ISC traffic analysis quiz!  Like previous quizzes, we have traffic and alerts from an infected Windows computer.  This month’s quiz consists of:

  • a packet capture (pcap) of infection traffic
  • a image of the alerts shown in Squil
  • a text file listing the alerts with a few more details
  • a PDF document with answers to the questions below.

The alerts were created using Security Onion running Suricata using the EmergingThreats Pro ruleset, viewed through Sguil.

You can find the pcap, alerts, and answers here.  Don’t peek at the answers just yet!

Environment and quiz questions

The environment where this infection takes place:

  • LAN segment range: 10.12.1.0/24 (10.12.1.0 thru 10.12.1.255)
  • Domain: mrnatural.info
  • Domain controller: 10.12.1.2 – MrNatural-DC
  • LAN segment gateway: 10.12.1.1
  • LAN segment broadcast address: 10.12.1.255

Here are questions to answer based on the pcap and the alerts:

  • What is the IP address of the infected Windows host?
  • What is the MAC address of the infected Windows host?
  • What is the host name of the infected Windows host?
  • What is the Windows user account name used on the the infected Windows host?
  • What is the date and time of this infection?
  • What is the SHA256 hash of the EXE or DLL that was downloaded from 5.44.43.72?
  • Which two IP addresses and associated domains have HTTPS traffic with “Internet Widgets Pty” as part of the certificate data?
  • Based on the alert for CnC (command and control) traffic, what type of malware caused this infection?

Requirements

This type of analysis requires Wireshark.  Wireshark is my tool of choice to review pcaps of infection activity.  However, default settings for Wireshark are not optimized for web-based malware traffic.  That’s why I encourage people to customize Wireshark after installing it.  To help, I’ve written a series of tutorials.  The ones most helpful for this quiz are:

Furthermore, I  recommend using a non-Windows environment like BSD, Linux, or macOS to analyze malicious traffic.  This pcap contains HTTP traffic sending Windows-based malware.  If you’re using a Windows host to review the pcap, your antivirus (or Windows Defender) may delete the pcap or malware.  Worst case scenario?  If you extract the malware from the pcap and accidentally run it, you might infect your Windows computer.

So beware, because there’s actual malware involved for this exercise.

Final words

Again, files associated with this quiz (pcap, alerts, and answers) can be found here.

If you found this fun, we have previous traffic analysis quizzes:


Brad Duncan
brad [at] malware-traffic-analysis.net

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post Traffic Analysis Quiz: Mr Natural, (Thu, Dec 3rd) appeared first on Malware Devil.



https://malwaredevil.com/2020/12/03/traffic-analysis-quiz-mr-natural-thu-dec-3rd/?utm_source=rss&utm_medium=rss&utm_campaign=traffic-analysis-quiz-mr-natural-thu-dec-3rd

ISC Stormcast For Thursday, December 3rd 2020 https://isc.sans.edu/podcastdetail.html?id=7276, (Thu, Dec 3rd)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post ISC Stormcast For Thursday, December 3rd 2020 https://isc.sans.edu/podcastdetail.html?id=7276, (Thu, Dec 3rd) appeared first on Malware Devil.



https://malwaredevil.com/2020/12/03/isc-stormcast-for-thursday-december-3rd-2020-https-isc-sans-edu-podcastdetail-htmlid7276-thu-dec-3rd/?utm_source=rss&utm_medium=rss&utm_campaign=isc-stormcast-for-thursday-december-3rd-2020-https-isc-sans-edu-podcastdetail-htmlid7276-thu-dec-3rd

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...