id
int64
1
14.4k
text
stringlengths
3
5.01k
entities
list
relations
sequence
Comments
sequence
1
This post is also available in: 日本語 (Japanese) CTB-Locker is a well-known ransomware Trojan used by crimeware groups to encrypt files on the victim's endpoints and demand ransom payment to decrypt the files back to their original state, but most antiviruses detect it by mistake as CryptoLocker (only one vendor correctly detects it as CTB-Locker).
[ { "id": 45800, "label": "malware", "start_offset": 288, "end_offset": 300 }, { "id": 45801, "label": "malware", "start_offset": 53, "end_offset": 63 }, { "id": 45802, "label": "malware", "start_offset": 342, "end_offset": 352 } ]
[]
[]
2
The attack vector is very basic and repeats itself: It begins with a spear phishing email sent with SCR attachments (double zipped).
[ { "id": 48941, "label": "attack-pattern", "start_offset": 69, "end_offset": 115 } ]
[]
[]
3
Once executed by the user the first stage malware downloads and executes the ransomware from a fixed hardcoded server list.
[]
[]
[]
4
The first known campaign was launched by Crimeware on November 2014.
[ { "id": 45806, "label": "TIME", "start_offset": 55, "end_offset": 68 }, { "id": 48942, "label": "malware", "start_offset": 42, "end_offset": 51 } ]
[]
[]
5
The first stage downloaded the ransomware from these sites:
[]
[]
[]
6
A very serious campaign was launched between January 19, 2015 and January 20, 2015, and Palo Alto Networks Enterprise Security Platform has discovered more than 1000 unique attacks since.
[ { "id": 22, "label": "identity", "start_offset": 90, "end_offset": 108 }, { "id": 44570, "label": "TIME", "start_offset": 46, "end_offset": 62 }, { "id": 44571, "label": "TIME", "start_offset": 67, "end_offset": 83 } ]
[]
[]
7
The attacker used a polymorphic malware builder to generate malware with a unique hash for each victim, preventing signature-based solutions from detecting the new attacks before it was too late for the victim.
[]
[]
[]
8
This tactic is a nightmare for legacy security products that are based on legacy techniques such as bytes signatures, since they can only detect attacks after the damage is done instead of preventing it as a true solution should.
[]
[]
[]
9
Palo Alto Networks Enterprise Security Platform offers multilayer protection to prevent this attack along with other attacks without the need for prior knowledge of the specific attack.
[ { "id": 31, "label": "identity", "start_offset": 1, "end_offset": 19 } ]
[]
[]
10
We can see here that server hostnames were changed but they didn’t change the server IP address – see the attached file with results for files from last week’s campaign from VirusTotal.
[ { "id": 45807, "label": "SOFTWARE", "start_offset": 175, "end_offset": 185 } ]
[]
[]
11
Most legacy security programs could not detect this malware at the time it was posted.
[]
[]
[]
12
If you re-test these hashes again from last week you can see an average of 49/57 engines that detect last week’s threat – but that’s too little, too late for anyone who already lost data.
[]
[]
[]
13
This campaign started earlier today, and the malware uses the same techniques and even the same IOCs: And only added two new hostnames:
[ { "id": 45808, "label": "TIME", "start_offset": 23, "end_offset": 36 } ]
[]
[]
14
By now you shouldn’t be surprised that one of them is on the same known malicious IP address.
[]
[]
[]
15
We found 147 new unique pieces of malware today alone, two of them fully undetectable by the legacy security solutions in VirusTotal and most of them barely detected by one vendor (few have 4/57 detection rate).
[ { "id": 44574, "label": "SOFTWARE", "start_offset": 122, "end_offset": 132 } ]
[]
[]
16
See below:
[]
[]
[]
17
So basically you have two choices:
[]
[]
[]
18
The most surprising fact about this campaign is that almost all the IOCs haven’t been changed: For those still using legacy solutions we’ve attached two lists of SHA256 hashes in a text file format for reference.
[]
[]
[]
19
One list shows the new campaign, which continues to progress.
[]
[]
[]
20
The other list is of last week’s campaign by the same attackers (exhaustive or close to it). Palo Alto Networks Enterprise Security Platform would have stopped this ransomware attack campaign thanks to the platform’s unique integration between the network, endpoint and the cloud to maximize security.
[ { "id": 45809, "label": "identity", "start_offset": 94, "end_offset": 112 } ]
[]
[]
21
Attacks aren't getting any less sophisticated, so it is time to leave legacy security solutions behind and upgrade to real, prevention-based security.
[]
[]
[]
22
Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!
[]
[]
[]
23
Please mark, I'm not a robot!
[]
[]
[]
24
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
[]
[]
[]
25
This post is also available in: 日本語 (Japanese) Over the past six months, we’ve seen a major increase in the number of attack campaigns with the ultimate goal of mining cryptocurrency.
[]
[]
[]
26
It’s a subject Unit 42 has been tracking in the past year:
[ { "id": 45810, "label": "identity", "start_offset": 15, "end_offset": 22 } ]
[]
[]
27
So, what is driving a widespread shift from attackers and creating a significant trend in the industry?
[]
[]
[]
28
There are three factors at work:
[]
[]
[]
29
To answer the question in more detail, it’s important to put yourself into the criminal’s shoes and consider what alternative routes they have to monetize infections.
[]
[]
[]
30
In this brief, we’ll share how this trend came to fruition, why it’s so prevalent, and how security professionals and defenders can keep an eye out for this rising type of threat.
[]
[]
[]
31
How Attacks Monetize Infections
[]
[]
[]
32
While targeted attacks gain the most attention from researchers and media, the majority of malware infections are untargeted and even indiscriminate.
[]
[]
[]
33
Instead of seeking out specific targets, many criminals aim to infect as many systems as possible and then turn those infections into cash.
[]
[]
[]
34
This has been true for over a decade, although the mechanisms available to criminals have shifted in that time.
[]
[]
[]
35
To understand where we are now, it helps to look at how we got here, and to look at the evolution of common cybercriminal activities.
[]
[]
[]
36
Back in the early 2000s, some of the earliest “botnet herders” made their income by relaying spam emails through infected computers.
[ { "id": 45768, "label": "attack-pattern", "start_offset": 93, "end_offset": 104 }, { "id": 44575, "label": "TIME", "start_offset": 12, "end_offset": 23 } ]
[]
[]
37
Over time, that business became less profitable due to anti-spam controls and ISPs preventing infected systems from directly relaying emails.
[]
[]
[]
38
In the mid-2000s, criminals made great profits from using Banking Trojans to steal credentials for online banking websites, and subsequently draining the accounts’ associated funds.
[ { "id": 45811, "label": "TIME", "start_offset": 7, "end_offset": 16 }, { "id": 45812, "label": "attack-pattern", "start_offset": 77, "end_offset": 94 } ]
[]
[]
39
This account takeover activity continues today, but various anti-fraud measures and law enforcement actions have made it less profitable and riskier for criminals.
[]
[]
[]
40
Another aspect of Banking Trojan infections is that, while the criminal may be infecting hosts indiscriminately, the value of the host greatly depends on the individual who owns it, and the criminals’ ability to “cash out” their bank account.
[]
[]
[]
41
Figure 1 is a capture from a book I wrote with some colleagues in 2008, “Cyber Fraud: Tactics, Techniques, and Procedures.”
[ { "id": 51804, "label": "TIME", "start_offset": 66, "end_offset": 70 } ]
[]
[]
42
It shows the price that a criminal enterprise called IFRAME DOLLARS was charging to infect computers in various countries at that time.
[ { "id": 44577, "label": "threat-actor", "start_offset": 53, "end_offset": 67 } ]
[]
[]
43
Figure 1: Capture from Cyber Fraud: Tactics, Techniques, and Procedures showing prices of host infections by country.
[]
[]
[]
44
In 2007, the infection of a system in Australia went for US$0.60, while an infection in Poland was only a fraction of the cost, at US$0.096.
[ { "id": 45814, "label": "location", "start_offset": 38, "end_offset": 48 }, { "id": 45815, "label": "location", "start_offset": 88, "end_offset": 94 }, { "id": 45813, "label": "TIME", "start_offset": 3, "end_offset": 7 } ]
[]
[]
45
The difference in price represented the difference in value: criminals were able to make more money through a Banking Trojan account takeover from an Australian infection than they could in Poland.
[ { "id": 45771, "label": "malware", "start_offset": 110, "end_offset": 124 }, { "id": 45772, "label": "attack-pattern", "start_offset": 125, "end_offset": 141 }, { "id": 44579, "label": "location", "start_offset": 190, "end_offset": 196 }, { "id": 44580, "label": "location", "start_offset": 150, "end_offset": 160 } ]
[]
[]
47
As anti-fraud protections evolved, so did the criminals.
[]
[]
[]
48
Fast forward five years to 2013 and the rise of the Ransomware business model
[ { "id": 44581, "label": "TIME", "start_offset": 27, "end_offset": 31 } ]
[]
[]
49
This new way to generate profit had two major advantages over account takeovers:
[]
[]
[]
50
Put another way, the ransomware model represented both increased efficiency and decreased risk in monetizing the infection.
[]
[]
[]
51
Anyone who’s been paying attention to cybercrime since 2013 is aware of the ransomware surge, infecting systems throughout the world and plaguing networks’ administrators.
[ { "id": 44582, "label": "TIME", "start_offset": 55, "end_offset": 59 } ]
[]
[]
52
While only a tiny fraction (possibly 1 in 1000) of systems infected with a banking Trojan pay out for attackers, a much higher portion of ransomware victims pay to get their files back.
[]
[]
[]
53
While US$300 payments are less than a single account takeover could return, ransomware makes greater returns due to the volume and decreased risk in this new business model.
[]
[]
[]
54
Cybercriminals have become good business people: they saw the benefits and embraced the change.
[]
[]
[]
55
Enter “The Bubble” – Where We Are Now
[]
[]
[]
56
In the last two years, but particularly in the last six months, the price of bitcoin and other cryptocurrencies experienced a massive price surge with respect to the U.S. dollar and other fiat currencies.
[]
[]
[]
57
Here’s the chart for bitcoin over the last two years, showing a rise of 2,000% to 4,000% in the versus the U.S. dollar.
[ { "id": 44585, "label": "SOFTWARE", "start_offset": 21, "end_offset": 28 } ]
[]
[]
58
Figure 2: Price of bitcoin in U.S. dollars from CoinMarketCap While botnets mining cryptocurrency is nothing new, the technique was much less profitable than using ransomware.
[ { "id": 45817, "label": "SOFTWARE", "start_offset": 19, "end_offset": 26 }, { "id": 45818, "label": "SOFTWARE", "start_offset": 48, "end_offset": 60 } ]
[]
[]
59
In fact, with the rise of specialized bitcoin mining hardware, no regular PC can make any significant amount of money for an attacker.
[]
[]
[]
60
However, there are many other “crypto coins” in the market today.
[]
[]
[]
61
The one we see mined most by attackers is called Monero.
[ { "id": 45819, "label": "SOFTWARE", "start_offset": 49, "end_offset": 55 } ]
[]
[]
62
In contrast to bitcoin, Monero was designed to enable private transactions using a closed ledger, and its mining algorithm is still mined effectively by both PC CPUs and GPUs.
[ { "id": 45820, "label": "SOFTWARE", "start_offset": 24, "end_offset": 30 } ]
[]
[]
63
As the chart below shows, Monero has risen even faster than bitcoin in price in the last two years, with more than a 30,000% gain in U.S. dollars.
[ { "id": 45773, "label": "TIME", "start_offset": 84, "end_offset": 98 }, { "id": 44583, "label": "SOFTWARE", "start_offset": 26, "end_offset": 32 }, { "id": 44584, "label": "SOFTWARE", "start_offset": 60, "end_offset": 67 } ]
[]
[]
64
Figure 3: Price of Monero in U.S. dollars from CoinMarketCap
[ { "id": 45821, "label": "SOFTWARE", "start_offset": 19, "end_offset": 25 }, { "id": 45823, "label": "SOFTWARE", "start_offset": 47, "end_offset": 60 } ]
[]
[]
65
A normal PC used to mine Monero can earn around US$0.25 per day at the current prices.
[ { "id": 45824, "label": "SOFTWARE", "start_offset": 25, "end_offset": 31 } ]
[]
[]
66
That number is small, but it’s important to note that it doesn’t matter what country or network a Monero miner is part of: computers in Australia and Poland mine at the same speed.
[ { "id": 44586, "label": "SOFTWARE", "start_offset": 98, "end_offset": 104 }, { "id": 44587, "label": "location", "start_offset": 136, "end_offset": 145 }, { "id": 44588, "label": "location", "start_offset": 150, "end_offset": 156 } ]
[]
[]
67
Every infected system is a profit-generating resource when mining Monero, and users are much less likely to identify their infection and remove the mining program than they would be with ransomware.
[ { "id": 45825, "label": "SOFTWARE", "start_offset": 66, "end_offset": 72 } ]
[]
[]
68
For context, in January, we found a Monero mining campaign that infected around 15 million systems, largely in the developing world.
[ { "id": 45827, "label": "SOFTWARE", "start_offset": 36, "end_offset": 42 }, { "id": 45826, "label": "TIME", "start_offset": 16, "end_offset": 23 }, { "id": 45828, "label": "location", "start_offset": 115, "end_offset": 131 } ]
[]
[]
69
If these systems remained infected for at least 24 hours each, the attackers could have earned well over 3 million U.S. dollars in Monero.
[ { "id": 260, "label": "TIME", "start_offset": 39, "end_offset": 56 }, { "id": 44589, "label": "SOFTWARE", "start_offset": 131, "end_offset": 137 } ]
[]
[]
70
Additionally, the risk of arrest and conviction is significantly lower than with ransomware, as mining cryptocurrency is less likely to generate reports to law enforcement than a data-destroying ransomware infection.
[]
[]
[]
71
What’s Next?
[]
[]
[]
72
This wave of attacks will continue as long as it maintains a high level of profitability with a low level of risk for cybercriminals.
[]
[]
[]
73
For defenders, it’s important to note that the techniques used to infect systems with coin mining malware are the same as they were for ransomware.
[]
[]
[]
74
Infections typically begin with emails carrying malicious macro documents, drive-by exploit kits targeting browsers, or direct attacks on servers running vulnerable software.
[]
[]
[]
75
There is no single solution to stopping these attacks, but the same technologies and policies you use to prevent other malware infections will be effective.
[ { "id": 44590, "label": "attack-pattern", "start_offset": 119, "end_offset": 137 } ]
[]
[]
76
Across the changing landscape of botnet herders, Banking Trojans, ransomware and coin mining is one constant: the business-savvy drive to maximize profit and reduce risk.
[]
[]
[]
77
Using these as our guide, we can make sense of where we are today, how we got here, and be prepared for what has yet to develop in the future.
[]
[]
[]
78
Here are three things to watch for:
[]
[]
[]
79
1. A marked increase in the price of Monero or other cryptocurrencies will draw even more attackers into this business.
[ { "id": 45829, "label": "SOFTWARE", "start_offset": 37, "end_offset": 43 } ]
[]
[]
80
For many users, this could actually be a positive development, as the negative impact of having resources sapped from one’s computer is much less than paying a ransom or restoring your system from a backup due to ransomware.
[]
[]
[]
81
Conversely, a crash in the price of cryptocurrencies will decrease the profitability and drive criminals back to ransomware.
[]
[]
[]
82
2. Listen to your fans or keep an eye on your CPU usage.
[]
[]
[]
83
Many users realize their system is infected with coin mining malware when their laptop fans kick into high-speed mode to keep the overtaxed CPU cool.
[]
[]
[]
84
Listening to fans won’t work at the enterprise scale, but implementing widespread CPU performance monitoring could be a good way to find compromised devices.
[]
[]
[]
85
This will also help you identify the coin mining “insider threat,” as misguided administrators may see their organizations’ unused CPU time as a way to generate personal income.
[]
[]
[]
86
3. Criminals will find ways to target these attacks.
[]
[]
[]
87
Compromising a user’s browser or a regular home PC will net the criminal an average system for mining coins, but higher-end systems will generate more income.
[ { "id": 45830, "label": "attack-pattern", "start_offset": 0, "end_offset": 29 } ]
[]
[]
88
Attackers will soon begin targeting devices with higher specifications to get more bang for their buck.
[]
[]
[]
89
Gaming PCs with high-end GPUs and servers with large numbers of processing cores will be prime targets.
[]
[]
[]
90
Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!
[]
[]
[]
91
Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
[]
[]
[]
92
It’s that time of year again – our researchers have analyzed and reviewed the threats and attacks that occurred during the first half of 2021.
[ { "id": 45831, "label": "TIME", "start_offset": 123, "end_offset": 141 } ]
[]
[]
93
Our report, Attacks From All Angles: 2021 Midyear Security Roundup, highlights many of the active attacks we saw, from APTs to ransomware to zero-day exploits.
[ { "id": 44591, "label": "TIME", "start_offset": 37, "end_offset": 49 }, { "id": 44592, "label": "attack-pattern", "start_offset": 141, "end_offset": 158 } ]
[]
[]
94
I’d like to highlight an area where we are seeing increased activity: attacks against cloud infrastructures.
[]
[]
[]
95
I’ve spoken on this at a few events and asked my audiences how many have active cloud infrastructure projects going on, the answer is always most of them.
[]
[]
[]
96
In our 1H’ 2021 Cyber Risk Index, we asked organizations what their top infrastructure risks are.
[ { "id": 45832, "label": "identity", "start_offset": 16, "end_offset": 32 }, { "id": 44593, "label": "TIME", "start_offset": 7, "end_offset": 15 } ]
[]
[]
97
Cloud security has been in the top two for the last few years.
[]
[]
[]
98
Obviously, many organizations are moving quickly to the cloud and, as such, need to be thinking about how to secure it.
[]
[]
[]
99
Below is an overview of what we’re seeing in cloud attacks.
[]
[]
[]
100
Threats Impacting Cloud Environments
[]
[]
[]
101
In our first half report, we highlight an APT group named TeamTNT that has been targeting clouds for quite a while now.
[ { "id": 45833, "label": "threat-actor", "start_offset": 58, "end_offset": 65 } ]
[]
[]
README.md exists but content is empty. Use the Edit dataset card button to edit it.
Downloads last month
130
Edit dataset card

Models trained or fine-tuned on mrmoor/cyber-threat-intelligence