![全球情報報告_第1頁](http://file4.renrendoc.com/view4/M01/32/11/wKhkGGYfVjCAVwEHAAJ6ljrv0SI813.jpg)
![全球情報報告_第2頁](http://file4.renrendoc.com/view4/M01/32/11/wKhkGGYfVjCAVwEHAAJ6ljrv0SI8132.jpg)
![全球情報報告_第3頁](http://file4.renrendoc.com/view4/M01/32/11/wKhkGGYfVjCAVwEHAAJ6ljrv0SI8133.jpg)
![全球情報報告_第4頁](http://file4.renrendoc.com/view4/M01/32/11/wKhkGGYfVjCAVwEHAAJ6ljrv0SI8134.jpg)
![全球情報報告_第5頁](http://file4.renrendoc.com/view4/M01/32/11/wKhkGGYfVjCAVwEHAAJ6ljrv0SI8135.jpg)
版權說明:本文檔由用戶提供并上傳,收益歸屬內容提供方,若內容存在侵權,請進行舉報或認領
文檔簡介
GLOBAL
TINHTERLLIEGEANCTE
REPORT
DELIVERINGACTIONABLEAND
CONTEXTUALIZEDINTELLIGENCETOINCREASECYBERRESILIENCE
2023
APRIL
EDITION
ReportingPeriod:December2022toFebruary2023
2023GlobalThreatIntelligenceReport
AprilEdition
PAGE
28
CONTENTS
5
TheLast90DaysinNumbers
TotalNumbersofAttacksandUniqueMalwareHashes
GeographyofAttacks
MostTargetedIndustriesbyNumberofAttacks
9
TypesofMalwareUsedinAttacksDuringthisReportingPeriod
Windows
Droppers/DownloadersEmotetPrivateLoaderSmokeLoader
Infostealers
XLoader(akaFormbook)RaccoonStealer
RedLineIcedID
RemoteAccessTrojansandBackdoors
Warzone/AveMariaDarkCrystal/DCRatAgentTeslaAsyncRAT
RansomwareRoyalBlackBastaBlackCat
macOS/OSXTrojans/DownloadersAdware
Cross-PlatformMalware
Linux
CryptoMiners
Industry-SpecificAttacks
15
Healthcare
TopHealthcareThreatsFinancialGovernment/PublicEntitiesManufacturing
TopManufacturingThreats
WiderManufacturingThreatLandscape
Energy
TopEnergyThreats
WiderEnergyThreatLandscape
20
NotableThreatActorsandWeapons
APT28/SofacyTsunami/LinuxBackdoorXORDDoSLinuxMalwarePlugX
MeterpreterRedLine
SEOPoisoning
22
MostSoundAttacks
ESXiArgsRansomwareKnocks
OutUnpatchedVMwareESXiLinuxServersWorldwide
DarkBitRansomwareTargetsIsraelwithCommand-LineOptionsandOptimizedEncryptionRoutines
PreviouslyUnknownThreatActorNewsPenguinTargetsPakistanwithAdvancedEspionageTool
GamaredonTargetsUkrainianOrganizationswithTelegram
BlindEagleTargetsColombia’sJudiciary,Financial,Public,andLawEnforcement
OtherNotableAttacks
BlackCatGangTargetsIrishUniversity
LockBit
AbuseofMicrosoftOneNote
26CommonMITRETechniques
DetectionTechniques
27
SigmaRule:Creationofan
ExecutablebyanExecutable
SigmaRule:Wow6432NodeCurrentVersionAutorunKeysModification
SigmaRule:DisableMicrosoftDefenderFirewallviaRegistry
AdditionalThreatBehaviorsProcess:cmd.exeProcess:cvtres.exeProcess:AutoIt3.exe
31
Forecasts
RevisitingOurForecasts
NewandUpdatedForecasts
ContinuedIncreaseinCyberattacksAgainstUkraine
AbuseofChatGPTbyCyberCriminalsSupplyChainAttacksWill
RemainaThreat
34
33Conclusion
Resources
PublicIndicatorsofCompromise
PublicRules
CommonMITRETechniquesMITRED3FENDCountermeasures
35References
Theinformationcontainedinthisreportisintendedforeducationalpurposesonly.BlackBerrydoesnotguaranteeortakeresponsibilityfortheaccuracy,completenessandreliabilityofanythird-partystatementsorresearchreferencedherein.Theanalysisexpressedinthisreportreflectsthecurrentunderstandingofavailableinformationbyourresearchanalystsandmaybesubjecttochangeasadditionalinformationismadeknowntous.Readersareresponsibleforexercisingtheirownduediligencewhenapplyingthisinformationtotheirprivateandprofessionallives.BlackBerrydoesnotcondoneanymalicioususeormisuseoftheinformationpresentedinthisreport.
INTRODUCTION
AtBlackBerry,werecognizethatintoday’sworld,securityleadersmustexpandtheirfocusbeyondtechnologiesandtheirvulnerabilities.Toeffectivelymanagerisk,securityleadersmustcontinuallyanalyzetheglobalthreatlandscapeandunderstandhowbusinessdecisionscaninfluencetheirorganization’sthreatprofile.Similarly,businessleadersrequireawarenessofhowsecurityposture,riskexposure,andcyberdefensestrategycanaffecttheirbusinessoperations.
ThroughtheBlackBerryGlobalThreatIntelligenceReportandourprofessional
CylanceINTELLIGENCE
?subscriptionservice,modernleaderscanhavetimelyaccesstothisimportantinformation.Basedonthetelemetryobtainedfromourownartificialintelligence(AI)-drivenproductsandanalyticalcapabilities,andcomplementedbyotherpublic
andprivateintelligencesources,ourglobal
BlackBerryThreatResearch
andIntelligence
teamprovidesactionableintelligenceaboutattacks,threatactors,andcampaignssothatyoucanmakewell-informeddecisionsandtakeprompt,effectiveactions.
Keyhighlightsofthisreportinclude:
90daysbythenumbers.FromDecember2022toFebruary2023,weobservedupto12attacksperminute,andthenumberofuniqueattacksusingnewmalwaresamplesskyrocketedby50percent—fromoneperminuteinthepreviousreportto1.5perminuteduringthisreportingperiod.
Toptencountriesexperiencingcyberattacksduringthisperiod.TheU.S.remainsthecountrywiththehighestnumberofstoppedattacks.However,thethreatlandscapehaschangedandBrazilisnowthesecondmost-targetedcountry,followedbyCanadaandJapan.Singaporeenteredthetop10forthefirsttime.
Mosttargetedindustriesbynumberofattacks.AccordingtoBlackBerrytelemetry,customersinthefinancial,healthcareservices,andfoodandstaplesretailingindustriesreceived60percentofallmalware-basedcyberattacks.
Mostcommonweapons.Droppers,downloaders,remoteaccesstools(RATs),andransomwareweremostfrequentlyused.Here’sapreview:Inthisperiod,BlackBerryobservedatargetedattackusingWarzoneRATagainstaTaiwanesesemiconductormanufacturer;cybercriminalgroupsusingAgentTeslaandRedLineinfostealer;andwideneduseofBlackCatransomware.
Industry-specificattacks.Thehealthcareindustryfacedasignificantnumberofcyberattacksduringthisperiod,withCylanceEndpointSecuritypreventinganaverageof59new
malicioussampleseveryday,includinganincreasingnumberofnewEmotetsamples.Inthelast90days,financialinstitutionsworldwideprotectedbyBlackBerrytechnologiesblockedmorethan231,000attacksincludingupto34uniquemalwaresamplesperday.Additionally,thisreportdivesdeepintoattacksagainstgovernmententities,manufacturing,andcriticalinfrastructure,keysectorsthatareoftentargetedbysophisticatedandsometimesstate-sponsoredthreatactorsengagedinespionageandintellectualpropertycampaigns.However,aswerevealinthisreport,crimewareandcommoditymalwarearealsooftenfoundinthesecriticalindustries.
Thereportalsocoversnotablethreatactorsandweapons,mostsoundattacks,and—mostimportantly—actionabledefensivecountermeasuresintheformofMITREATT&CKandMITRED3FENDmappingsdeployedduringthisperiod.Finally,weofferananalysisoftheforecastingaccuracyofourpreviousreportandalistofinsightfulkeytakeawaysbasedontheeventsofthepastmonths.
Wehopethatyouwillvalueallthedetailedandactionabledatapresentedinthisedition.Onceagain,Iwouldliketoexpressmygratitudetotheauthors,thehighlyskilledglobalresearchersontheBlackBerryThreatResearchandIntelligenceteam.Theirongoingeffortstoproducecutting-edgeresearchempowersustocontinuouslyimproveBlackBerry’sdata-andCylanceAI-drivenproductsandservices.
IsmaelValenzuela
VicePresident,ThreatResearch&IntelligenceatBlackBerry
@aboutsecurity
ThedatainthisreportwasproducedbyBlackBerryCybersecuritytelemetryandisthepropertyofBlackBerryLimited.
BlackBerryCybersecurityThreatIntelligenceAuthors:
DmitryBestuzhev
DeanGiven
JacobFaires
GeoffO’Rourke
JoseLuisSanchez
EoinHealy
PratimaLohar
PedroDrimel
AnujSoni
TonyO’Regan
RoryO’Callaghan
HamedAlRajhi
PatrykMatysik
MarksonLeite
THELAST90DAYSINNUMBERS
TOTALNUMBERSOFATTACKSANDUNIQUEMALWAREHASHES
FromDecember2022toFebruary2023,Cylance?EndpointSecuritysolutionsbyBlackBerrystopped1,578,733malware-basedcyberattacks.Onaverage,threatactorsdeployedapproximately17,738malicioussamplesperdayagainstcustomersprotectedbyourtechnologies,foranaverageofapproximately12attackseveryminute.
Thesethreatsincluded200,454newuniquemalwaresamplesthatdifferfrompreviouslyseenthreats.Thistranslatestoanaverageofapproximately2,252novelsamplesperday,orroughly1.5newsamplesperminute.Thisrepresentsa50percentincreasefromthepreviousreportingperiod’saverageofoneuniquesampleperminute.
ThefollowinggraphshowsthedynamicsofcyberattacksthatCylanceEndpointSecuritysolutionspreventedfromDecember2022toFebruary2023.Thedipinweek4—whichwasthelastweekinDecember—islikelyattributabletoend-of-yearholidays,andthesharpriseinweek5correspondswiththedatesthatpeopletypicallyreturntoworkinthenewyear.
DYNAMICSOF
PREVENTEDATTACKS
DECEMBER2022 FEBRUARY2023
250,000
200,000
150,000
100,000
50,000
0
1 2 3 4 5 6 7 8 9 10 11 12 13
WEEKS
AttacksStopped UniqueHashes
Figure1:CyberattackspreventedbyBlackBerryperweekduringthisreportingperiod.
GEOGRAPHYOFATTACKS
Generally,countrieswithgreaterInternetpenetration,economy,andpopulationexperiencethemostthreats.Ourtelemetryshowsthatthreatactorsduringthisperiodhavefocusedmostinthefollowingcountriesaroundtheworld.
COUNTRIESWITHMOST
CYBERATTACKSSTOPPED
USA
WASTHEMOSTTARGETEDDURINGTHISPERIOD.
Figure2:Countrieswiththemostcyberattacksstoppedarerepresentedbyredandblue.
Figure3showsthetencountrieswhereCylanceEndpointSecuritysolutionspreventedthemostcyberattacks.Asinthepreviousreportingperiod,BlackBerrypreventedthegreatestnumberofattacksintheUnitedStates.ChangesincludeBrazil’srisetobecomethesecondmost-targetedcountry,followedbyCanadaandJapan(whichwasthesecondmost-targetedcountryinourpreviousreport)inthirdandfourthpositions.ThisisalsothefirsttimethatSingaporehasplacedinthetoptenmost-targetedcountries.
TOP10COUNTRIESTHATEXPERIENCEDCYBERATTACKS
Figure3:ToptencountrieswhereBlackBerryclientsweretargetedbycyberattacks.
Figure4showsthecountrieswhereBlackBerryclientsweremostfrequentlyattackedwithuniquemalicioussamples.Enteringattenthposition,thisisHongKong’sfirstappearanceonthislist.
TOP10COUNTRIESWHEREUNIQUE
MALWARE
SAMPLESWEREUSED
Figure4:ToptencountrieswhereuniquemalicioussampleswereusedincyberattacksagainstBlackBerry-protecteddevices.
TITLEXXXXXXXXXXXX
MOSTTARGETEDINDUSTRIESBYNUMBEROFATTACKS
ThetopthreeindustriesthatCylanceEndpointSecuritysolutionsprotectedduringthisreportingperiodare:
Financialinstitutions
Healthcareservicesandequipmentincludinghospitals,clinics,andmedicaldevices
Foodandstaplesretailing,whichincludessupermarkets,drugstores,andcompaniesthatsellfoodproductstootherbusinesses
Thosethreeindustriesaccountfor60percentofcyberattacksagainstBlackBerryclients.
MOSTTARGETEDINDUSTRIES
Figure5:Topindustriesattackedduringthisreportingperiod.
MALWAR
E
TYPESOF
USEDINATTACKSDURINGTHISREPORTINGPERIOD
Themostwidespreadandinterestingmalwarefamiliesidentifiedthisreportingperiodareorganizedbyoperatingsystem(OS)below.It’simportanttonotethateventhoughMicrosoft?Windows?isstillthemostattackedOS,itsusersmaybesomewhatbetterpreparedtofacemalwareattacksthanothers,whomayincorrectlybelievethattheiralternativeOSisimmunetocyberattacks.
However,BlackBerrytelemetrydatashowsthatmacOS?,Linux?,andmobileusersarealsofrequentlyattacked:noplatformsareimmunefrominfection.
WINDOWS
Asnotedabove,whilemalwarecanrunonanyOS,Windowsremainsthemostattacked.Reasonsincludeitspopularity,thewiderangeofdocumentationavailablefordevelopers,andmanyyearsofcumulativeexperienceattackingtheOSinthecybercriminalcommunity,wheretipsandtricksarefrequentlysharedinforums.Here
arethetopprevalentWindowsthreatsrecordedbyBlackBerrytelemetry.
Droppers/Downloaders
Downloaderslurevictimstoopenfilesthatdownloadmalware.Thefilesfrequentlyposeaslegitimatedigitaldocumentsorexecutables.
Emotet
EmotetismodularmalwarethatbeganasabankingTrojanin2014.Aftersurvivingseveralself-imposed
EMOTETSERVESASABOTNET-OPERATEDDROPPERANDDELIVERYMECHANISMFORADDITIONALMALWARE.
exilesandalaw-enforcementtakedown,Emotetreemergedattheendof2022andwasfrequentlyusedinattacksduringthisreportingperiod.Emotet’sfunctionalityandusagehaveevolvedovertime,anditnowservesasabotnet-operateddropperanddeliverymechanismforadditionalmalwaresuchas
Cobalt
StrikeBeacon
,
IcedID
,QBot,
Trickbot
,andransomwareincluding
Ryuk
and
BlackCat
.EmotetisprimarilyspreadthroughspamemailandweaponizedMicrosoft?WordandExcel?documents,andcansendacopyofitselftoeveryoneinavictim’scontactlist.
PrivateLoader
PrivateLoaderisarelativelynewdownloaderfirstspottedinthewildin2021.Itismodularinnature,containsanti-analysisfunctionality,andcangatherandsendinformationandmetadataaboutaninfectedhosttoacommand-and-control(C2)server.PrivateLoader’sprimarypurposeistodeliveranddetonateadditionalmalwarepayloads.Italsohasbeenobserveddistributinganarray1ofcommoditymalwareincluding
SmokeLoader
,
RaccoonStealer
,
RedLine
,Vidar,andothers.MultipleinstancesofPrivateLoaderwereobserveddownloadingRedLineinmanycampaignsacrossawiderangeofindustries.
SmokeLoader
SmokeLoader,whichwasfirstdiscoveredin2011,hasundergoneseveraliterationsandremainsaprominentthreatusedtoloadeverythingfromcryptominers,ransomware,Trojans,andevenpoint-of-sale(POS)malwareontoinfectedsystems.EarlierversionsofthismalwareweresoldinundergroundforumsunderthenameSmokeLdr,butsince2014,itisonlybeingsold
toRussian-basedthreatactors.In2018,SmokeLoaderwasthefirstmalwaretousethePROPagatecodeinjection2technique.Themalwarecanbedistributedthroughawiderangeofattackvectors,includingmaliciousdocumentsrelatedtolarge-scalemassphishingcampaigns.InJuly2022,theBlackBerryThreatResearchandIntelligenceteamobserved
SmokeLoader
distributinganewversionofAmadeyBot
.During
thisattack,SmokeLoaderwashiddenin“cracked”software(aka“cracks”)andkey-generationtools(aka“keygens”)forpopularsoftwareapplications.Thethreatactorbehindthecampaignreliedonblack-hatSEOtechniques3(akaSEOpoisoning)toensurethattheirmalwaresitesappearedatornearthetopofrelatedsearchengineresultstoenticepeopleseekingcrackedfilestodownloadandrunthemaliciousexecutable.
Becausesomeantivirussolutionsmayblockcracksandkeygens,somepeopleintentionallydisabletheirsecurityproductsbeforedownloadingthesefilesorignoredetectionalertsandproceedwiththedownload.Asaresult,evenwidelydetectedthreatscaninfectsystemswhenavictimexplicitlyallowsthedownloadandexecutionofmalware.
INJULY2022,SMOKELOADERDISTRIBUTEDANEWVERSIONOFAMADEYBOT.DURINGTHIS
ATTACK
SMOKELOADERWASHIDDENIN“CRACKED”SOFTWAREANDKEY-GENERATIONTOOLSFORPOPULARSOFTWAREAPPLICATIONS.
Infostealers
Infostealersgatherinformationfromavictim’smachineanddeliverittoanattacker.Herearesomeofthemostactiveinfostealersduringthisreportingperiod.
XLoader(akaFormbook)
Formbook
wasinitiallynamedBabushkaCrypter.Afterbeingshutdownin2020byitsapparentauthor,FormBookwasrebrandedasXLoader.StrainsofthemalwarewerethenheavilyabusedascommoditymalwareinQ12023andsoldasmalware-as-a-service(MaaS)inundergroundforums.Themalwarecontainscommonfeaturessuchaskeyloggingandscreencapture.FormbookattemptstoavoiddetectionbyutilizingaRunPEandprocess-hollowingtechniquesimilartoanothernotedcommoditymalwarecalled
LokiBot
.
RaccoonStealer
RaccoonStealer
istypicallydistributedasMaaSandavailableatpricesstartingaround$75USDperweekor$200USDpermonth.RaccoonStealer’s
corefunctionalityistostealpasswords,cookies,andcryptocurrencywalletsfromthevictim’shostsystem.TheRaccoonStealerattackchainoftenbeginsthroughdownloadingaTrojanizedRARarchive.InMarch2022,thethreatactorsbehindRaccoonStealerannouncedthesuspensionofitsdevelopmentbecauseoneof
itsdevelopersallegedlydiedintheRussia-Ukraine
conflict.Afterashorthiatus,anewversion4dubbedRaccoonStealer2.0wasannouncedinhackingforumsinJune2022.RaccoonStealer2.0wasreportedlydevelopedfromscratchandusesanewinfrastructure.
RedLine
RedLineexfiltratesdataincludingpasswordsandcreditcardinformationfrombrowsers,filetransferprotocol(FTP),andinstantmessaging(IM)applications;gathersalistofinstalledapplications(includingsecuritysoftware)thatmaybesentbacktotheattacker;andenablesattackerstoexecuteothercommands,suchasuploadinganddownloadingadditionalfiles.RedLineissoldonundergrounddarkmarketsandhackingforumsforaslittleas$100to$150USDaseitherastandaloneorasubscription-basedmodel.Inthisreportingperiod,bothPrivateLoaderandtheAmadeybotnetwereobserveddroppingRedLine.
IcedID
ThebankingTrojan
IcedID
—alsoknownasBokBot—wasfirstdiscoveredin2017.IcedIDhascapabilitiessimilartothelegacy
Zeus
(akaZbot)and
Dridex
infostealermalware.Thismalwareisofteninitiallydeployedasa
second-stagedropperthatdeploysadditionalcommoditymalwareonthevictim’sdevice.ThethreatactorShatak(TA5515)hasbeenobserved6usingIcedIDasMaaS,
andhasdemonstratedawillingnesstoworkwithothercommoditymalwarecreatorsandthreatactors.
REDLINEISSOLDONUNDERGROUND
DARKMARKETS
ANDHACKINGFORUMSFORASLITTLEAS
$100TO$150USDASEITHERASTANDALONEORASUBSCRIPTION-BASEDMODEL.
RemoteAccessTrojansandBackdoors
ThefollowingremoteaccessTrojans(RATs)wereobservedinthisreportingperiod.
Warzone/AveMaria
Warzone
(akaAveMaria)RATisavailableforsaleonundergroundandabove-groundforums.Warzone’scomprehensivefeaturesincludekeylogging,processmanipulation,commandexecution,passwordscraping,webcamaccess,reverseproxyconfiguration,andsupportfordownloadingandexecutingadditionalfilesormalware.
Warzoneofferstwotiersofpricing:aninitialsubscriptiontothebasicRATbuilderthatbeginsat$22.95USDpermonth,andahigher-pricedpremiumversion.Designedtoappealto
novicethreatactors
,thepremiumversionoffersadvancedfeaturessuchasarootkit,hiddenprocesscapability,premiumdynamicDNS(DDNS),andcustomersupportforapproximately$800USDforathree-monthsubscription.
Thiscommoditymalwarehasnospecifictargetsandisusedbyvariousthreatactorsandcybergroups.Lastquarter,WarzonewasdeployedinacampaignsolelyfocusedonTaiwanesesemiconductormanufacturersanddeliveredviamalicious.RARfileattachments.
DarkCrystal/DCRat
DarkCrystal
(alsoknownasDCRat)wasfirstreleasedin2018andisoneofthecheapest.NETbackdoorsavailable,withpricesrangingfromaround$5USDfora
two-monthlicense,upto$40USDfora“l(fā)ifetime”license(whichtypicallymeansthelifetimeofthethreatgroup).
Anembeddedconfigurationfiledictateswhichfeaturesareenabledonexecution,whichmayincludebutarenotlimitedtoscreenshots,keylogging,andstealingcookiesandpasswordsfromwebbrowsersandclipboards.TheComputerEmergencyResponseTeamofUkraine(CERT-UA)observed7DarkCrystaltargetingUkraineduringtheRussian-Ukraineconflict.
AgentTesla
This.NETRATwasfirstobservedin2014andisoftensoldinundergroundforumsaspartofMaaSofferings.Themalwarecancapturekeystrokes,takescreenshots,andscrapecredentialsfrommorethan60commonlyusedapplicationsincludingMicrosoft?Outlook?,Firefox?,Chrome?,andOpera?.AgentTeslaistypicallydeliveredthroughmaliciousandweaponizeddocumentsandusesmultipleanti-analysisandanti-detectiontechniques.
TheRATunpacksitselfinseverallayersandusessteganographytohidedatainordinary-lookingfilesormessagesbeforedeployingitsfinalpayload.
AsyncRAT
Thisopen-sourceRATisfreelyavailable8onGitHub,whereanyonecanaccessitssourcecodeandmodifyittomeettheirneeds.AsyncRATreliesonthefreely
availableStealerLibplugintostealpasswordsfromwebbrowsersandapplications.Otherfeaturesincludescreenviewingandrecording,uploadanddownloadcapabilitiesusingSecureFileTransferProtocol(SFTP),keylogging,andmore.AsyncRAT’santi-analysisandanti-detectiontechniquesincludeserverobfuscation.ThethreatgroupTA2541hasweaponizedAsyncRAT9intheirattacksontheaviationindustry.
Ransomware
Royal
Royal
isarelativelynewransomwarestrainthatfirstappearedinthewildinSeptember2022andisthoughttoincludemembersoftheold
Conti
ransomwaregroup.RoyaltargetsWindows,Linux,andVMware?ESXiservers.Themalwarewasinitiallydistributed10viamalvertisingandphishingcallback(aschemeinwhichphishinglurescontainacallbacknumberforusersto
callthatenticesthemtoinstallmalicioussoftware).LastDecember,Royal’soperatorstookresponsibilityforanattack11onEngland’sfamousSilverstoneFormulaOneracetrack.
BlackBasta
BlackBasta
isarelativelynewransomwaregroupoperatingasaransomware-as-a-service(RaaS)thatwasfirstspottedinApril2022.Itemploysadouble-extortiontechnique,demandingransomtodecryptcompanydataandextortingadditionalfeestokeepthedatafrombeingleakedtothepublic.
BlackBastausestoolslike
Qakbot
(akaQbot)andthePrintNightmare(CVE-2021–3452712)exploitinits
attacks,andencryptsvictimdatawithacombinationofChaCha20andRSA-4096.BlackBasta’sinfectionchaindiffersfromtargettotarget,anditencryptsdatafasterthanotherransomwaregroups.SomeofBlackBasta’sbehaviorsaresimilartomalwarepreviouslyproducedbytheContigroup.
BlackCat
BlackCat
ransomware,whichfirstappearedinthewildinNovember2021,wasthefirstmajorransomwarefamilyauthoredintheRustprogramminglanguage.(Asdetailedinthis
report
,Rustdeliversmoreflexibilityforthreatactorstocross-compilebinariesthattargetallmajoroperatingsystems,wideningitsreachofpotentialtargetsandsystems.)ThegrouphasusedtheEmotetbotnettodeliveraransomwarepayload.
Afterafootholdisestablished,aCobaltStrikebeaconisdeployedtoallowthethreatactorstomovedeeperwithinthetargetnetwork.
BlackCathasbeenprolificsinceitsinception,targetingnumeroushigh-profilevictimsandusingdoubleandeventriple-extortionmethods.Accordingtoa2022
FBIadvisory13,BlackCatransomwareaffiliatesarepotentiallylinkedtotwoolderthreatgroups:
DarkSide
and
BlackMatter
.BlackCatmadeheadlinesinFebruary2023afteranattackonMunsterTechnologicalUniversityinIreland.
MACOS/OSX
BecauseApplemacOSisusedlessoftenincorporateenvironmentsthanWindowsorLinux,it’slessfrequently
targetedwithmalware.However,whilemanybelievethatmacOSdevicesare“safer”thantheirWindowsorLinuxcounterparts,
macOSmalware
isagrowingthreatthatmustbemonitored.ThissectiondiscussescategoriesofmacOSmalwareobservedacrossBlackBerrycustomerenvironments.
Trojans/Downloaders
TheUpdateAgentTrojan(alsoknownasWizardUpdate)targetsmacOScomputersandfirstappearedinenterprisenetworksin2020.Thismalwaredownloadsanddeploysadditionalpayloads.Althoughthemostcommonpayloadisadware,theinitialloadercouldbeusedtodownloadandexecutemoremaliciouscode.
UpdateAgentisconcerningbecauseitcancircumventGatekeepercontrols,amacOSsecurityfeaturedesignedtopreventuntrustedappsfromrunning.
Adware
Adwareissometimesviewedasmerelyanuisance,butitcanbefarmoredamaging.Displayingtheunwantedadsreliesonmaliciousbehaviors,includingmonitoringuseractivity,communicatingwithaserver,anddownloadingadditionaldataorcode.Forexample,theUpdateAgentTrojandeploystheaggressiveadwareAdLoad.WepreventednumerousAdLoadinfectionsamongourcustomerswhousemacOSdevicesduringthisreportingperiod.
WealsoidentifiedthecontinueduseofPirritadware.ThismalwaredownloadsandlaunchesscriptsandadditionalMachobjectfileformat(Mach-O)executablesonthecompromisedmachine,whichcouldbeusedtoexecutemoredangerouscode.
Cross-PlatformMalware
Withtheemergenceofcross-platformprogramminglanguageslikeRustandGolang(aka“Go”),threatactorscandevelopmalwareandcompilethesamecodebaseformultipleoperatingsystems,includingmacOS.Thisreducesthemarginalcostoftargetingnon-Windows
operatingsystems.Duringthisreportingperiod,weobservedmalwareaffectingMac?deviceswritteninGolangonlyusedtolaunchadware,butweanticipatecross-platformmalwareforMacwillhavemoreambitiousgoalsinthefuture.
LINUX
Linux’spopularitycontinuestogrow.Upto90percentofpubliccloudservices14runonLinux,andasignificantnumberofbusinessesaremigratingorplanning
amigrationtocloudservices.Inaddition,LinuxiscommonlyusedintheInternetofThings(IoT).BecauseLinuxisnotacommondesktopOSinbusinesses,mostinfectionsrelyontechniquessuchasbrute-forceattacksorexploitingnetworkandservervulnerabilitiesinsteadofencouraginguserstoopenaninfectedattachment.
Forthesereasons,organizationsthatrelyonLinuxinfrastructurerequireacomprehensivevulnerabilitymanagementprogramtoprotecttheirservers.
Duringthisreportingperiod,BlackBerrytelemetryuncoveredmultipleLinuxattacksattemptingtodeploycryptominersthat,inadditiontoconsumingsystemresources,canallowthedeploymentofothermalwaresuchasbackdoorsthatallowcriminalsremotesystemaccess.
Thereportingperiodalsoincludedanincreaseincross-platformransomwarethatcantargetmultipleoperatingsystems.Forexample,thenewRoyalransomwarecantargetLinuxaswellasWindowsandESXisystems.
WEANTICIPATECROSS-PLATFORMMALWAREFORMACWILLHAVEMOREAMBITIOUSGOALSINTHEFUTURE.
CryptoMiners
Cryptominersuseavictim’sLinuxsystemresourcestominedigitalcryptocurrencyforfinancialgain,anactivityknownas
cryptojacking
15.BlackBerryresearcherspreviouslydetectedanattackusingtheDota3malwarefamily16,whichattacksSSHserversthatuseweakpasswordsandinstallstheknowncryptominerXMRig17.TheSysrv18cryptominerbotnet,whichhasbeenactivesinceearly202
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯系上傳者。文件的所有權益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網頁內容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經權益所有人同意不得將文件中的內容挪作商業(yè)或盈利用途。
- 5. 人人文庫網僅提供信息存儲空間,僅對用戶上傳內容的表現方式做保護處理,對用戶上傳分享的文檔內容本身不做任何修改或編輯,并不能對任何下載內容負責。
- 6. 下載文件中如有侵權或不適當內容,請與我們聯系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 2025年克孜勒蘇州道路貨運運輸從業(yè)資格證模擬考試
- 2025年度金融理財消費協議合同模板
- 2025年度城市青年創(chuàng)業(yè)公寓退房保障合同
- 2025年度特色餐飲店裝修與非遺文化融合合同
- 2025年度網絡安全技術資金入股合伙人合同
- 二零二五年度能源供應預約解除與節(jié)能服務合同
- 2025年度城市綜合體游樂場地租賃合同協議
- 職場技能如何快速提升小學生的閱讀理解能力
- 2025年度海洋漁業(yè)捕撈漁船轉讓合同協議
- 科技與設計雙輪驅動的創(chuàng)新實踐
- 2025民政局離婚協議書范本(民政局官方)4篇
- 2024年03月四川農村商業(yè)聯合銀行信息科技部2024年校園招考300名工作人員筆試歷年參考題庫附帶答案詳解
- 小學一年級數學上冊口算練習題總匯
- 潤滑油知識-液壓油
- 2024年江蘇省中醫(yī)院高層次衛(wèi)技人才招聘筆試歷年參考題庫頻考點附帶答案
- 臨床思維能力培養(yǎng)
- 人教版高中物理必修第三冊第十章靜電場中的能量10-1電勢能和電勢練習含答案
- 《中國香文化》課件
- 2024簡易租房合同下載打印
- 阿基米德課件
- 2024年步步高高考英語大一輪復習(新人教版)基礎知識默寫本必修第一冊含答案
評論
0/150
提交評論