Cyber Intel Brief: August 1-7, 2024

By Eric Ford, Sr. Threat Intelligence Analyst

Estimated Reading Time: 7 minutes

Phishing Exploits TryCloudflare for RATs, Stealthy Windows Backdoor, Russian APT’s Free Service Malware, StormBamboo’s DNS Poisoning, RAT Unveiled in Ransomware Attack, Ransomware Activity Declines, and CISA Updates

In our latest Cyber Intelligence Brief, Deepwatch ATI looks at new threats and techniques to deliver actionable intelligence for SecOps organizations. 

Each week we look at in-house and industry threat intelligence and provide ATI analysis and perspective to shine a light on a spectrum of cyber threats.

How Phishing Emails Use TryCloudflare to Spread RATs

Phishing – Malware – Remote Access Trojan – AsyncRAT – Xworm – VenomRAT – GuLoader – Remocos – All Industries

The Rundown

Proofpoint is tracking phishing campaigns that use a TryCloudflare subdomain to deliver various remote access trojans (RATs). First observed in February 2024, the cluster escalated its activity from May through July. Later campaigns delivered AsyncRAT and Xworm RAT, while previous campaigns also delivered VenomRAT, GuLoader, and Remcos. 

While the attack chain requires significant victim interaction, which provides multiple opportunities to identify suspicious activity, TryCloudflare provides attackers with free temporary infrastructure that doesn’t require the attacker to make an account, giving them the flexibility to build and take down instances. This temporary infrastructure makes it harder for defenders as traditional security measures and static blocklists are ineffective.

Source Material: Proofpoint


New Stealthy Backdoor Utilizes Windows Built-in File Transfer Service

Malware – Backdoor – Background Intelligent Transfer Service (BITS) –  BITSLOTH – Targeted Latin America (LATAM) – All Industries

The Rundown

Elastic Security Labs has discovered a new Windows backdoor dubbed BITSLOTH. It uses the BITS for command and control communications and has advanced data collection, keylogging, and screen capture capabilities.

BITSLOTH’s use of BITS for command and control communications allows it to blend in with legitimate network traffic, making it extremely difficult for traditional detection systems to identify and block. This backdoor’s advanced capabilities can lead to significant data breaches and compromises of sensitive information. Understanding BITSLOTH’s mechanisms is crucial for organizations to enhance security measures and protect against stealthy threats.

Discovered during an investigation into an intrusion in South America, BITSLOTH exploits the Background Intelligent Transfer Service (BITS) to seamlessly integrate its malicious activities into legitimate network traffic, making it exceptionally difficult to detect. 

This report provides a high-level overview of BITSLOTH’s communication methods, persistence mechanisms, and detection challenges to help organizations safeguard against this sophisticated threat. For a deeper technical analysis, please consult Elastic Security Lab’s report.

Source Material: Elastic


Phishing Campaign by Russian APT Leverages Free Services to Spread Malware

Russian Threat Actor – Phishing – Malware – Backdoor – HeadLace – All Industries

The Rundown

A recent Palo Alto Unit 42 blog post details a phishing campaign by Russian threat actor Fighting Ursa, targeting diplomats with a “car for sale” lure. The post highlights the group’s use of free, legitimate services for malware deployment and the persistent and evolving threat from advanced persistent threats (APTs).

This campaign, active since March 2024, demonstrates how Fighting Ursa, also known as APT28 or Fancy Bear, exploits legitimate web services like Webhook.site to deliver the HeadLace backdoor. The use of such services not only complicates detection efforts but also serves as a potential blueprint for other cybercriminals, amplifying the threat landscape.

Source Material: Palo Alto Unit 42


StormBamboo’s DNS Poisoning Attack Exposes Critical Software Update Flaws

DNS Poisoning – Malware – MACMA (macOS) – POCOSTICK (Windows) – RELOADEXT – StormBamboo – Evasive PandaChinese APT –  All Industries

The Rundown

A recent Volexity blog post details a DNS response poisoning attack conducted by StormBamboo, a notorious and highly skilled Chinese threat group that has successfully compromised an Internet Service Provider (ISP) to abuse insecure software update mechanisms, targeting macOS and Windows systems. This breach has led to the deployment of POCOSTICK, new variants of the MACMA malware, and a malicious Chrome extension, RELOADEXT.

This attack underscores the critical weaknesses in current software update practices. By compromising an ISP, StormBamboo deployed malware that could exfiltrate sensitive data, highlighting the urgent need for organizations to ensure secure update mechanisms, such as using HTTPS and validating digital signatures, are used to protect against sophisticated cyber threats.

StormBamboo has demonstrated a sophisticated approach by compromising third parties to breach their intended targets. The variety of malware employed in various campaigns by StormBamboo indicates significant effort, with payloads developed for macOS, Windows, and network appliances. The group has shown capabilities to intercept and poison DNS requests, redirecting them to malicious IP addresses and exploiting automatic update mechanisms that use HTTP rather than HTTPS.

Source Material: Volexity


RAT Used for Initial Access Unveiled in Ransomware Attack

Ransomware – Malware – Remote Access Trojan (RAT) – Typosquatted Domains – Hunters International – SharpRhino – All Industries

The Rundown

In an August 2nd blog post, Quorum Cyber unveiled their discovery of a new Remote Access Trojan (RAT) named SharpRhino that used a valid code certificate identified during an investigation of a Hunters International ransomware incident.

This discovery underscores the continuous evolution of cyber threats and the necessity for robust detection and response mechanisms. Hunters International’s use of typosquatting and legitimate code certificates highlights attackers’ increasing sophistication, necessitating vigilance, and advanced threat intelligence among cybersecurity professionals.

Source Material: Quorum Cyber


Ransomware Activity Falls; US Manufacturing Still Most Affected

Professional, Scientific, and Technical Services – Manufacturing – Educational Services – Health Care and Social Assistance

The Rundown

Ransomware attacks significantly dropped from last week’s 100, adding 53 organizations to data leak sites. The Professional, Scientific, Technical Services, and Manufacturing sectors bore the brunt of the impact.

This decrease in ransomware attacks still highlights the persistent threat to organizations. The Professional, Scientific, Technical Services, and Manufacturing sectors were the most targeted in the past week, and have been this year, underscoring the need for robust cybersecurity measures.


CISA Adds CVE-2018-0824 to Known Exploited Catalog

Microsoft COM for Windows CVE-2018-0824

The Rundown

CISA has added the high-severity Microsoft COM for Windows vulnerability CVE-2018-0824 to its Known Exploited Vulnerabilities (KEV) catalog. APT41 has been observed exploiting this vulnerability to escalate privileges.

This vulnerability in Microsoft COM for Windows allows for remote code execution and privilege escalation, posing a significant threat to systems worldwide. Its inclusion in CISA’s KEV catalog underscores the urgency for users to update their systems to the latest versions to mitigate potential attacks.

Recommendations

ATI recommends mitigative action occur according to the mitigation “Due Date” recommended by CISA.

Source: CISA 


What We Mean When We Say

Estimates of Likelihood

We use probabilistic language to reflect the Intel Team’s estimates of the likelihood of developments or events because analytical judgments are not certain. Terms like “probably,” “likely,” “very likely,” and “almost certainly” denote a higher than even chance. The terms “unlikely” and “remote” imply that an event has a lower than even chance of occurring; they do not imply that it will not. Terms like “might” reflect situations where we are unable to assess the likelihood, usually due to a lack of relevant information, which is sketchy or fragmented. Terms like “we can’t dismiss,” “we can’t rule out,” and “we can’t discount” refer to an unlikely, improbable, or distant event with significant consequences.

Confidence in Assessments

Our assessments and projections are based on data that varies in scope, quality, and source. As a result, we assign our assessments high, moderate, or low levels of confidence, as follows:

High confidence indicates that our decisions are based on reliable information and/or that the nature of the problem allows us to make a sound decision. However, a “high confidence” judgment is not a fact or a guarantee, and it still carries the risk of being incorrect.

Moderate confidence denotes that the information is credible and plausible, but not of high enough quality or sufficiently corroborated to warrant a higher level of assurance.

Low confidence indicates that the information’s credibility and/or plausibility are in doubt, that the information is too fragmented or poorly corroborated to make solid analytic inferences, or that we have serious concerns or problems with the sources.

Eric Ford

Eric Ford, Sr. Threat Intelligence Analyst

Eric is an accomplished intelligence professional with 10+ years of experience in the intelligence field supporting the Department of Defense and commercial organizations. He is responsible for collecting open-source information and analyzing it to turn it into actionable intelligence.

Read Posts

Share

LinkedIn Twitter YouTube

Subscribe to the Deepwatch Insights Blog