id
int64
1
14.4k
text
stringlengths
3
5.01k
entities
list
relations
list
Comments
list
202
Additionally, the attacks targeted two banking institutions, PrivatBank and Oschadbank.
[ { "id": 45896, "label": "identity", "start_offset": 61, "end_offset": 71 }, { "id": 45897, "label": "identity", "start_offset": 76, "end_offset": 86 } ]
[]
[]
203
An initial investigation into the DDoS attacks suggested that Mirai and Meris bot networks may have been leveraged in the attacks.
[ { "id": 45900, "label": "malware", "start_offset": 72, "end_offset": 90 }, { "id": 45898, "label": "attack-pattern", "start_offset": 34, "end_offset": 46 }, { "id": 45899, "label": "malware", "start_offset": 62, "end_offset": 67 } ]
[]
[]
204
On Feb. 18, both the United States and the United Kingdom attributed these DDoS attacks to Russia’s Main Intelligence Directorate (GRU). Over the past week, Ukraine has continued to observe a relatively constant flow of DDoS attacks targeting its government and financial institutions.
[ { "id": 44621, "label": "identity", "start_offset": 22, "end_offset": 35 }, { "id": 44622, "label": "TIME", "start_offset": 4, "end_offset": 11 }, { "id": 44623, "label": "identity", "start_offset": 44, "end_offset": 58 }, { "id": 44624, "label": "attack-pattern", "start_offset": 76, "end_offset": 80 }, { "id": 44625, "label": "threat-actor", "start_offset": 92, "end_offset": 136 }, { "id": 44626, "label": "identity", "start_offset": 159, "end_offset": 166 }, { "id": 44627, "label": "attack-pattern", "start_offset": 222, "end_offset": 234 }, { "id": 44628, "label": "identity", "start_offset": 249, "end_offset": 286 } ]
[ { "id": 4, "from_id": 44624, "to_id": 44625, "type": "attributed-to" }, { "id": 131, "from_id": 44627, "to_id": 44628, "type": "targets" } ]
[]
205
However, at this time, attribution for the ongoing attacks has not been established.
[]
[]
[]
206
The Ukrainian CERT did identify a post on RaidForums from a user named “Carzita” that suggested that additional actors may also be launching DDoS and defacement attacks for undisclosed reasons.
[ { "id": 45901, "label": "identity", "start_offset": 4, "end_offset": 18 }, { "id": 45903, "label": "identity", "start_offset": 72, "end_offset": 79 }, { "id": 45902, "label": "identity", "start_offset": 42, "end_offset": 52 }, { "id": 45904, "label": "attack-pattern", "start_offset": 141, "end_offset": 145 }, { "id": 45905, "label": "attack-pattern", "start_offset": 150, "end_offset": 168 } ]
[]
[]
207
On Feb. 23, a malicious file named conhosts._exe (SHA256: 1bc44eef75779e3ca1eefb8ff5a64807dbc942b1e4a2672d77b9f6928d292591) was uploaded to a public malware repository from an organization in Kyiv, Ukraine.
[ { "id": 678, "label": "SHA2", "start_offset": 58, "end_offset": 122 }, { "id": 44630, "label": "location", "start_offset": 192, "end_offset": 205 }, { "id": 44631, "label": "FILEPATH", "start_offset": 35, "end_offset": 48 }, { "id": 44632, "label": "TIME", "start_offset": 3, "end_offset": 10 } ]
[ { "id": 133, "from_id": 678, "to_id": 44631, "type": "indicates" } ]
[]
208
This executable is a signed file with a valid signature from an organization named Hermetica Digital Ltd. This signing certificate has since been explicitly revoked by its issuer.
[ { "id": 45906, "label": "identity", "start_offset": 83, "end_offset": 104 } ]
[]
[]
209
Upon execution, this file enumerates all files on a hard drive, wipes the partition info and then forces a system reboot, which predictably results in the following screen:
[]
[]
[]
210
Further analysis has confirmed that the malware accepts command-line arguments allowing an attacker to instruct the malware to sleep for a period of time or to shut down the system.
[]
[]
[]
211
Additionally the kernel module responsible for the actual wiping activity is from a legitimate application called EaseUS Partition Master.
[ { "id": 45907, "label": "tools", "start_offset": 115, "end_offset": 138 } ]
[]
[]
212
This software is designed as free partition software that can reorganize disk space for better performance.
[]
[]
[]
213
In tracking this threat, early reports show that the malware has been deployed against a financial institution in Ukraine as well as two contractors in Latvia and Lithuania that provide services to the Ukrainian Government.
[ { "id": 44633, "label": "location", "start_offset": 114, "end_offset": 121 }, { "id": 44634, "label": "identity", "start_offset": 202, "end_offset": 222 }, { "id": 44635, "label": "identity", "start_offset": 90, "end_offset": 110 }, { "id": 44636, "label": "location", "start_offset": 152, "end_offset": 158 }, { "id": 44637, "label": "location", "start_offset": 163, "end_offset": 172 }, { "id": 44638, "label": "malware", "start_offset": 53, "end_offset": 60 }, { "id": 44639, "label": "identity", "start_offset": 133, "end_offset": 172 } ]
[ { "id": 6, "from_id": 44638, "to_id": 44635, "type": "targets" }, { "id": 7, "from_id": 44638, "to_id": 44639, "type": "targets" } ]
[]
214
Additionally, ESET researchers have warned that they found this malware installed across “hundreds of machines” in Ukraine.
[ { "id": 45908, "label": "identity", "start_offset": 14, "end_offset": 18 }, { "id": 45909, "label": "location", "start_offset": 115, "end_offset": 122 } ]
[]
[]
215
Concurrent with the discovery of wiper malware, we also witnessed a second round of website defacements on Feb. 23.
[ { "id": 45910, "label": "TIME", "start_offset": 108, "end_offset": 115 }, { "id": 45911, "label": "attack-pattern", "start_offset": 85, "end_offset": 104 } ]
[]
[]
216
These attacks appear to have copied the messaging template observed in attacks exploiting the OctoberCMS vulnerability a month earlier on Jan.14, while adding a .onion web address and a message in red font that translates to, “Do you need proof, see the link at the end.”
[ { "id": 44640, "label": "vulnerability", "start_offset": 94, "end_offset": 118 }, { "id": 44641, "label": "TIME", "start_offset": 138, "end_offset": 144 } ]
[]
[]
217
The .onion site links to an entity calling themselves “Free Civilian” and offering to sell databases containing the personal data of Ukrainian citizens.
[]
[]
[]
218
Over the past 24 hours, the list of entities on the leaks section has expanded to 48 gov.ua domains and one Ukranian company (motorsich[.]com) that builds engines for airplanes and helicopters.
[ { "id": 45912, "label": "TIME", "start_offset": 5, "end_offset": 22 }, { "id": 45913, "label": "identity", "start_offset": 108, "end_offset": 124 }, { "id": 45914, "label": "DOMAIN", "start_offset": 126, "end_offset": 141 } ]
[]
[]
219
Our team analyzed the larger trends regarding Ukraine-related phishing and scam URLs detected by Advanced URL Filtering.
[ { "id": 715, "label": "attack-pattern", "start_offset": 63, "end_offset": 71 }, { "id": 44643, "label": "attack-pattern", "start_offset": 76, "end_offset": 85 } ]
[]
[]
220
We noticed an overall increase in the detection of websites that host phishing and scam URLs on domains using Ukraine-related TLDs such as gov.ua and com.ua, or containing popular Ukraine-related keywords such as "ukraine" and "ukrainian".
[ { "id": 45915, "label": "attack-pattern", "start_offset": 70, "end_offset": 78 }, { "id": 45918, "label": "location", "start_offset": 214, "end_offset": 221 }, { "id": 45919, "label": "location", "start_offset": 110, "end_offset": 117 } ]
[]
[]
221
This trend correlates with an increase in Google searches for terms like "Ukraine aid."
[ { "id": 45916, "label": "SOFTWARE", "start_offset": 42, "end_offset": 48 } ]
[]
[]
223
From January to late February, it appears that the number of Ukraine-related phishing and scam sites largely followed a similar trend as Ukraine-related internet searches; however, the number of phishing and scam sites has continued to rise through mid-late March as the situation remains ongoing.
[ { "id": 737, "label": "attack-pattern", "start_offset": 78, "end_offset": 86 }, { "id": 741, "label": "attack-pattern", "start_offset": 196, "end_offset": 204 }, { "id": 45920, "label": "TIME", "start_offset": 6, "end_offset": 13 }, { "id": 45925, "label": "attack-pattern", "start_offset": 209, "end_offset": 219 }, { "id": 45921, "label": "TIME", "start_offset": 17, "end_offset": 30 }, { "id": 45922, "label": "location", "start_offset": 62, "end_offset": 69 }, { "id": 45923, "label": "location", "start_offset": 138, "end_offset": 145 } ]
[]
[]
224
Figure 8 shows that the number of Ukraine-related phishing/scam sites is currently continuing to rise about a month after the “Ukraine aid” search term started trending in Google search.
[ { "id": 747, "label": "attack-pattern", "start_offset": 50, "end_offset": 58 }, { "id": 45924, "label": "attack-pattern", "start_offset": 59, "end_offset": 69 }, { "id": 45926, "label": "location", "start_offset": 34, "end_offset": 41 }, { "id": 45927, "label": "SOFTWARE", "start_offset": 172, "end_offset": 178 } ]
[]
[]
225
Among these phishing and scam URLs, we found a targeted phishing attack.
[ { "id": 751, "label": "attack-pattern", "start_offset": 14, "end_offset": 22 }, { "id": 44645, "label": "attack-pattern", "start_offset": 27, "end_offset": 36 }, { "id": 44646, "label": "attack-pattern", "start_offset": 49, "end_offset": 73 } ]
[]
[]
226
On March 16 while ingesting a third-party data feed, our in-house machine learning models detected a phishing webpage targeting a Ukrainian state administration employee.
[ { "id": 756, "label": "attack-pattern", "start_offset": 101, "end_offset": 109 }, { "id": 45928, "label": "TIME", "start_offset": 3, "end_offset": 11 }, { "id": 45929, "label": "identity", "start_offset": 130, "end_offset": 169 } ]
[ { "id": 134, "from_id": 756, "to_id": 45929, "type": "targets" } ]
[]
227
The webpage is imitating a popular cloud file storage site.
[]
[]
[]
228
Upon visiting the webpage, the “Username” field is pre-
[]
[]
[]
229
populated with the targeted employee’s email address, and the user is then prompted to enter in their password in order to view a sensitive document as shown in Figure 9.
[]
[]
[]
230
Figure 9. hxxps://startrackzm[.]com/wap-admin/ONE-DRIVE/one%20d%20%20no%[email protected].
[ { "id": 45930, "label": "URL", "start_offset": 11, "end_offset": 114 } ]
[]
[]
231
A phishing webpage targeting a Ukrainian state administration employee, detected by our in-house machine learning models on March 16.Our teams at Palo Alto Networks are actively monitoring the phishing landscape surrounding Ukraine-related URLs and are sharing this threat intelligence with relevant authorities in Ukraine and internationally.
[ { "id": 765, "label": "attack-pattern", "start_offset": 2, "end_offset": 10 }, { "id": 771, "label": "attack-pattern", "start_offset": 193, "end_offset": 201 }, { "id": 44647, "label": "identity", "start_offset": 31, "end_offset": 70 }, { "id": 44648, "label": "TIME", "start_offset": 124, "end_offset": 132 }, { "id": 44649, "label": "identity", "start_offset": 146, "end_offset": 164 }, { "id": 44650, "label": "location", "start_offset": 315, "end_offset": 322 } ]
[ { "id": 135, "from_id": 765, "to_id": 44647, "type": "targets" }, { "id": 136, "from_id": 771, "to_id": 44650, "type": "targets" } ]
[]
232
We are also sharing a list of IoCs that were detected as phishing and scam URLs.
[ { "id": 45931, "label": "attack-pattern", "start_offset": 57, "end_offset": 65 }, { "id": 45932, "label": "attack-pattern", "start_offset": 70, "end_offset": 79 } ]
[]
[]
233
Palo Alto Networks customers who subscribe to Advanced URL Filtering are already protected from these IoCs.
[ { "id": 45933, "label": "identity", "start_offset": 0, "end_offset": 18 } ]
[]
[]
234
We monitored a list of 50 legitimate Ukraine-related domains (e.g., popular news and donation websites) and keywords (e.g., Ukraine, refugee) as targets for cybersquatting.
[ { "id": 45781, "label": "location", "start_offset": 125, "end_offset": 132 }, { "id": 45934, "label": "location", "start_offset": 38, "end_offset": 45 }, { "id": 44651, "label": "attack-pattern", "start_offset": 158, "end_offset": 172 } ]
[ { "id": 137, "from_id": 44651, "to_id": 45781, "type": "targets" } ]
[]
235
We detected 11,637 cybersquatting newly registered domains (NRDs) during February and March.
[ { "id": 45935, "label": "TIME", "start_offset": 73, "end_offset": 81 }, { "id": 45936, "label": "TIME", "start_offset": 86, "end_offset": 91 } ]
[]
[]
236
In particular, we noticed a sharp increase in the number of cybersquatting domains that were registered close to Feb. 24, as shown in Figure 10 below.
[ { "id": 45937, "label": "attack-pattern", "start_offset": 60, "end_offset": 74 }, { "id": 45938, "label": "TIME", "start_offset": 113, "end_offset": 120 } ]
[]
[]
237
We manually analyzed a sample set of these cybersquatting domains.
[ { "id": 45782, "label": "attack-pattern", "start_offset": 44, "end_offset": 58 } ]
[]
[]
238
Below we share some interesting case studies.
[]
[]
[]
240
A detailed analysis of these domains revealed that many of them are fake.
[]
[]
[]
241
These donation websites provide little to no information about the associated organization and distribution of funds.
[]
[]
[]
242
Many of these websites use cryptocurrency wallets (e.g., BTC, ETH) to accept payment (likely because these wallets are easy to set up and require no verification). We also find that some websites are mimicking popular donation websites or organizations to trick users into paying them money.
[ { "id": 45940, "label": "SOFTWARE", "start_offset": 57, "end_offset": 60 }, { "id": 45941, "label": "SOFTWARE", "start_offset": 62, "end_offset": 65 } ]
[]
[]
243
We show some examples in Figure 11.
[]
[]
[]
244
For instance, donatetoukraine[.]com is pretending to be associated with the popular Come Back Alive campaign.
[ { "id": 45942, "label": "DOMAIN", "start_offset": 14, "end_offset": 35 }, { "id": 45943, "label": "campaign", "start_offset": 84, "end_offset": 108 } ]
[ { "id": 138, "from_id": 45942, "to_id": 45943, "type": "related-to" } ]
[]
245
While the banking information shared on the donation website matches the original campaign website, we confirmed that the BTC wallet address is different from the actual.
[ { "id": 45944, "label": "SOFTWARE", "start_offset": 122, "end_offset": 132 } ]
[]
[]
246
We found a cybersquatting domain – save-russia[.]today – that is launching DoS attacks on Ukrainian news sites.
[ { "id": 44652, "label": "attack-pattern", "start_offset": 13, "end_offset": 27 }, { "id": 44653, "label": "DOMAIN", "start_offset": 37, "end_offset": 56 }, { "id": 44654, "label": "attack-pattern", "start_offset": 77, "end_offset": 88 }, { "id": 44655, "label": "identity", "start_offset": 92, "end_offset": 112 } ]
[ { "id": 8, "from_id": 44653, "to_id": 44655, "type": "targets" }, { "id": 112, "from_id": 44652, "to_id": 44653, "type": "uses" }, { "id": 113, "from_id": 44654, "to_id": 44653, "type": "uses" } ]
[]
247
Once a user opens the website in the browser, it starts making requests to various Ukrainian news sites and lists the number of requests made to each new site on the home page, as shown in Figure 12 below.
[ { "id": 45945, "label": "identity", "start_offset": 83, "end_offset": 103 } ]
[]
[]
248
Figure 12.
[]
[]
[]
249
A cybersquatting domain save-russia[.]today is launching DoS attacks on Ukrainian news sites.
[ { "id": 44656, "label": "attack-pattern", "start_offset": 2, "end_offset": 16 }, { "id": 44657, "label": "DOMAIN", "start_offset": 24, "end_offset": 43 }, { "id": 44658, "label": "attack-pattern", "start_offset": 57, "end_offset": 68 }, { "id": 44659, "label": "identity", "start_offset": 72, "end_offset": 92 } ]
[ { "id": 9, "from_id": 44658, "to_id": 44659, "type": "targets" }, { "id": 114, "from_id": 44656, "to_id": 44657, "type": "uses" }, { "id": 115, "from_id": 44658, "to_id": 44657, "type": "uses" } ]
[]
250
We strongly recommend that users be alert to the possibility of cybersquatting domains.
[ { "id": 45946, "label": "attack-pattern", "start_offset": 64, "end_offset": 78 } ]
[]
[]
251
In particular, fake donation websites mimicking popular websites can be misleading, as described earlier.
[ { "id": 45948, "label": "attack-pattern", "start_offset": 38, "end_offset": 64 }, { "id": 45947, "label": "attack-pattern", "start_offset": 15, "end_offset": 37 } ]
[]
[]
252
Before donating money, we recommend checking whether the website is referenced and shared by the official charity or government organization.
[]
[]
[]
253
Our teams at Palo Alto Networks will continue monitoring domain squatting attacks and work to protect customers against them.
[ { "id": 45949, "label": "identity", "start_offset": 13, "end_offset": 31 }, { "id": 45950, "label": "attack-pattern", "start_offset": 57, "end_offset": 81 } ]
[]
[]
255
We detected campaigns of fake downloads where threat actors have set up web pages to host malicious binaries.
[ { "id": 44660, "label": "attack-pattern", "start_offset": 26, "end_offset": 40 }, { "id": 44661, "label": "attack-pattern", "start_offset": 86, "end_offset": 109 } ]
[]
[]
257
Most of these web pages show malicious binaries as popular browsers or communication apps in order to deceive users.
[]
[]
[]
258
For example, we detected a website that was distributing a malicious binary by masquerading as a popular global communication app targeting users in Ukraine.
[ { "id": 847, "label": "attack-pattern", "start_offset": 79, "end_offset": 91 }, { "id": 44662, "label": "location", "start_offset": 149, "end_offset": 156 }, { "id": 44663, "label": "attack-pattern", "start_offset": 44, "end_offset": 75 } ]
[]
[]
260
Note that Palo Alto Networks customers receive protections against such domains from the Next-Generation Firewall via Advanced URL Filtering, DNS Security and WildFire URL Analysis subscriptions.
[ { "id": 45955, "label": "SOFTWARE", "start_offset": 159, "end_offset": 167 }, { "id": 45954, "label": "identity", "start_offset": 10, "end_offset": 28 } ]
[]
[]
261
We also found that these fake download campaigns rotate domains to distribute the same malicious binaries.
[ { "id": 44664, "label": "attack-pattern", "start_offset": 25, "end_offset": 38 }, { "id": 44665, "label": "attack-pattern", "start_offset": 87, "end_offset": 105 } ]
[]
[]
262
For example, we detected two domains distributing the same malicious binary where one domain was impersonating a popular, widely used video conferencing application and the other a widely used internet browser.
[]
[]
[]
264
Our teams at Palo Alto Networks will continue to monitor and work to protect our customers against such attacks.
[ { "id": 44666, "label": "identity", "start_offset": 13, "end_offset": 31 } ]
[]
[]
267
Consistent with our previous reporting on the situation, Unit 42 continues to lead a company-wide effort to collect, evaluate and disseminate the latest intelligence on cyber activity related to Russia and Ukraine.
[ { "id": 45785, "label": "identity", "start_offset": 58, "end_offset": 65 }, { "id": 45783, "label": "location", "start_offset": 196, "end_offset": 202 }, { "id": 45784, "label": "location", "start_offset": 207, "end_offset": 214 } ]
[]
[]
268
We are actively collaborating with our partners in industry and governments to share our analysis and findings based on our global threat telemetry network.
[]
[]
[]
269
These efforts have enabled us to make near-daily updates to our platform to ensure our customers have the best protection possible.
[]
[]
[]
270
This includes blocking hundreds of domain names, IP addresses and URLs for our customers related to newly discovered attacks.
[]
[]
[]
271
We’ve updated and added signatures to the WildFire analysis and Cortex XDR Prevent and Pro products to block newly discovered vulnerabilities and malware including HermeticWiper.
[ { "id": 45961, "label": "SOFTWARE", "start_offset": 42, "end_offset": 50 }, { "id": 45960, "label": "malware", "start_offset": 164, "end_offset": 177 }, { "id": 45962, "label": "SOFTWARE", "start_offset": 64, "end_offset": 90 } ]
[]
[]
272
Read more about Cortex XDR protections.
[ { "id": 45963, "label": "SOFTWARE", "start_offset": 16, "end_offset": 26 } ]
[]
[]
273
Our Threat Prevention and Web Application and API Security products added coverage for the OctoberCMS vulnerability exploited in the WhisperGate attacks, and we released an XSOAR Playbook to help organizations hunt for this threat.
[ { "id": 906, "label": "malware", "start_offset": 133, "end_offset": 144 }, { "id": 44671, "label": "campaign", "start_offset": 133, "end_offset": 152 }, { "id": 44672, "label": "SOFTWARE", "start_offset": 173, "end_offset": 178 }, { "id": 44670, "label": "vulnerability", "start_offset": 91, "end_offset": 115 } ]
[ { "id": 10, "from_id": 44671, "to_id": 44670, "type": "delivers" } ]
[]
274
Cortex Xpanse can assist with understanding and managing your organization’s attack surface as well as identifying vulnerable resources.
[ { "id": 45964, "label": "SOFTWARE", "start_offset": 0, "end_offset": 13 } ]
[]
[]
275
We have released public reports on the WhisperGate attacks and the infrastructure and tactics used by the Gamaredon group.
[ { "id": 45965, "label": "malware", "start_offset": 40, "end_offset": 51 }, { "id": 45966, "label": "threat-actor", "start_offset": 107, "end_offset": 122 } ]
[]
[]
276
On the Unit 42 website, you will also find a free ATOM which contains a structured mapping of the Gamaredon group’s tactics aligned to MITRE’s ATT&CK framework.
[ { "id": 44673, "label": "identity", "start_offset": 7, "end_offset": 14 }, { "id": 44674, "label": "threat-actor", "start_offset": 98, "end_offset": 107 }, { "id": 44675, "label": "SOFTWARE", "start_offset": 135, "end_offset": 159 }, { "id": 44676, "label": "SOFTWARE", "start_offset": 50, "end_offset": 54 } ]
[]
[]
277
As the situation continues to develop, we’ll continue to update our blog with the latest information.
[]
[]
[]
278
There is no single action you can take to protect your organization against this threat.
[]
[]
[]
279
Unlike a new malware family or vulnerability in the wild, the attacks we expect could come in many forms.
[]
[]
[]
280
Several western governments have proposed broad recommendations focused on technical hygiene.
[ { "id": 45967, "label": "identity", "start_offset": 8, "end_offset": 27 } ]
[]
[]
281
We consider these appropriate given the variety of tactics that Russian actors have used in the past.
[ { "id": 45968, "label": "identity", "start_offset": 64, "end_offset": 78 } ]
[]
[]
282
We recommend organizations prioritize actions in the following four areas: There is no way to know for certain what shape an attack may take, but taking these steps will help provide broad protection against what we expect to come.
[]
[]
[]
283
Unit 42, the threat intelligence and security consulting arm of Palo Alto Networks, has a team of experts who can help your organization assess and test your security controls with proactive assessments and incident simulation services.
[ { "id": 45970, "label": "identity", "start_offset": 1, "end_offset": 8 }, { "id": 45971, "label": "identity", "start_offset": 65, "end_offset": 83 } ]
[]
[]
284
Because of the likelihood of ransomware attacks – or destructive attacks that pose as ransomware – it may be beneficial to focus on preparing in this area, particularly ensuring backup and recovery plans are in place.
[]
[]
[]
285
We have distilled the knowledge we’ve gained from responding to hundreds of ransomware incidents into our Ransomware Readiness Assessment offering, which is designed to help organizations strengthen their processes and technology to mitigate threats like the ones we expect in the coming days and weeks.
[]
[]
[]
286
If you think you may have been compromised by wiper attacks, Gamaredon, DDoS attacks or other cyber activity related to Russia-Ukraine, or have an urgent matter, get in touch with the Unit 42 Incident Response team or call North America Toll-Free: 866.486.4842 (866.4.UNIT42), EMEA: +31.20.299.3130, APAC: +65.6983.8730, or Japan: +81.50.1790.0200.
[ { "id": 45972, "label": "threat-actor", "start_offset": 62, "end_offset": 71 }, { "id": 45975, "label": "location", "start_offset": 325, "end_offset": 330 }, { "id": 45976, "label": "location", "start_offset": 301, "end_offset": 305 }, { "id": 45979, "label": "identity", "start_offset": 185, "end_offset": 215 }, { "id": 45973, "label": "attack-pattern", "start_offset": 73, "end_offset": 85 }, { "id": 45974, "label": "location", "start_offset": 224, "end_offset": 237 }, { "id": 45977, "label": "location", "start_offset": 278, "end_offset": 282 }, { "id": 45980, "label": "attack-pattern", "start_offset": 47, "end_offset": 60 } ]
[]
[]
287
Threat Brief: Ongoing Russia and Ukraine Cyber Conflict (Jan. 20) Russia’s Gamaredon aka Primitive Bear APT Group Actively Targeting Ukraine (Updated Feb. 16)
[ { "id": 965, "label": "threat-actor", "start_offset": 76, "end_offset": 85 }, { "id": 966, "label": "threat-actor", "start_offset": 90, "end_offset": 104 }, { "id": 51805, "label": "TIME", "start_offset": 58, "end_offset": 65 }, { "id": 51806, "label": "TIME", "start_offset": 151, "end_offset": 158 }, { "id": 45982, "label": "location", "start_offset": 23, "end_offset": 29 }, { "id": 45983, "label": "location", "start_offset": 34, "end_offset": 41 }, { "id": 45981, "label": "location", "start_offset": 67, "end_offset": 74 } ]
[ { "id": 139, "from_id": 965, "to_id": 966, "type": "duplicate-of" }, { "id": 141, "from_id": 966, "to_id": 45981, "type": "originates-from" }, { "id": 140, "from_id": 965, "to_id": 45981, "type": "originates-from" } ]
[]
288
Spear Phishing Attacks Target Organizations in Ukraine, Payloads Include the Document Stealer OutSteel and the Downloader SaintBot Threat Briefing: Protecting Against Russia-Ukraine Cyber Activity Palo Alto Networks Resource Page: Protect Against Russia-Ukraine Cyber Activity Cortex XDR Protections Against Malware Associated with Ukraine and Russia Cyber Activity
[ { "id": 970, "label": "attack-pattern", "start_offset": 0, "end_offset": 14 }, { "id": 974, "label": "malware", "start_offset": 94, "end_offset": 102 }, { "id": 976, "label": "malware", "start_offset": 122, "end_offset": 130 }, { "id": 977, "label": "location", "start_offset": 167, "end_offset": 173 }, { "id": 978, "label": "location", "start_offset": 174, "end_offset": 181 }, { "id": 979, "label": "identity", "start_offset": 197, "end_offset": 215 }, { "id": 981, "label": "location", "start_offset": 247, "end_offset": 253 }, { "id": 982, "label": "location", "start_offset": 254, "end_offset": 261 }, { "id": 983, "label": "tools", "start_offset": 277, "end_offset": 287 }, { "id": 44679, "label": "identity", "start_offset": 30, "end_offset": 54 }, { "id": 44678, "label": "location", "start_offset": 47, "end_offset": 54 }, { "id": 44685, "label": "location", "start_offset": 332, "end_offset": 339 }, { "id": 44686, "label": "location", "start_offset": 344, "end_offset": 350 } ]
[ { "id": 116, "from_id": 970, "to_id": 44679, "type": "targets" }, { "id": 118, "from_id": 974, "to_id": 970, "type": "uses" }, { "id": 119, "from_id": 976, "to_id": 970, "type": "uses" }, { "id": 117, "from_id": 974, "to_id": 44679, "type": "targets" } ]
[]
289
CISA: Shields Up Technical Guidance 1bc44eef75779e3ca1eefb8ff5a64807dbc942b1e4a2672d77b9f6928d292591 0385eeab00e946a302b24a91dea4187c1210597b8e17cd9e2230450f5ece21da a64c3e0522fad787b95bfb6a30c3aed1b5786e69e88e023c062ec7e5cebf4d3e 3c557727953a8f6b4788984464fb77741b821991acbf5e746aebdd02615b1767 2c10b2ec0b995b88c27d141d6f7b14d6b8177c52818687e4ff8e6ecf53adf5bf 06086c1da4590dcc7f1e10a6be3431e1166286a9e7761f2de9de79d7fda9c397 Name
[ { "id": 988, "label": "SHA2", "start_offset": 37, "end_offset": 101 }, { "id": 989, "label": "SHA2", "start_offset": 102, "end_offset": 166 }, { "id": 990, "label": "SHA2", "start_offset": 167, "end_offset": 231 }, { "id": 992, "label": "SHA2", "start_offset": 297, "end_offset": 361 }, { "id": 991, "label": "SHA2", "start_offset": 232, "end_offset": 296 }, { "id": 993, "label": "SHA2", "start_offset": 362, "end_offset": 426 }, { "id": 45984, "label": "identity", "start_offset": 0, "end_offset": 4 } ]
[]
[]
290
Hermetica Digital Ltd Thumbprint 1AE7556DFACD47D9EFBE79BE974661A5A6D6D923 Serial Number 0C 48 73 28 73 AC 8C CE BA F8 F0 E1 E8 32 9C EC
[ { "id": 45985, "label": "identity", "start_offset": 0, "end_offset": 21 } ]
[]
[]
291
gcbejm2rcjftouqbxuhimj5oroouqcuxb2my4raxqa7efkz5bd5464id[.]onion
[ { "id": 44687, "label": "DOMAIN", "start_offset": 1, "end_offset": 65 } ]
[]
[]
292
Please see the IoCs on GitHub.
[ { "id": 45987, "label": "SOFTWARE", "start_offset": 24, "end_offset": 30 } ]
[]
[]
293
In Alert AA22-011A (updated March 1, 2022), the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (DHS/CISA) identifies a selection of vulnerabilities that Russian advanced persistent threat (APT) groups are assessed to have exploited in the past, but recommends that users take action against a much broader list of known exploited vulnerabilities (KEVs).
[ { "id": 45992, "label": "identity", "start_offset": 141, "end_offset": 145 }, { "id": 45989, "label": "identity", "start_offset": 48, "end_offset": 84 }, { "id": 45990, "label": "identity", "start_offset": 87, "end_offset": 135 }, { "id": 45991, "label": "identity", "start_offset": 137, "end_offset": 140 }, { "id": 45993, "label": "location", "start_offset": 194, "end_offset": 201 } ]
[]
[]
294
The cited KEVs and their impacted devices – all of which can be identified using Cortex Xpanse – are: Cortex Xpanse’s ability to index the entire internet helps organizations discover, prioritize, and remediate significant exposures on their attack surfaces – including all of the impacted services listed above.
[ { "id": 44688, "label": "SOFTWARE", "start_offset": 81, "end_offset": 94 }, { "id": 44689, "label": "SOFTWARE", "start_offset": 104, "end_offset": 117 } ]
[]
[]
295
We routinely observe vulnerable devices across the global internet, despite the fact that most of these CVEs are more than two years old.
[]
[]
[]
296
Beyond Alert AA22-011A, CISA’s overarching guidance for attack surface reduction includes hardening of forward-facing network services, with prioritized patching of KEVs, as documented in Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities (KEV).
[ { "id": 45994, "label": "identity", "start_offset": 24, "end_offset": 28 } ]
[]
[]
297
This directive requires agencies to remediate all vulnerabilities that CISA includes in their KEV catalog based on an assessment that the vulnerabilities “carry significant risk to the federal enterprise.”
[ { "id": 45995, "label": "identity", "start_offset": 71, "end_offset": 75 } ]
[]
[]
298
Learn more and see a detailed workflow example on the Palo Alto Networks SecOps blog, “How Xpanse Can Identify CISA-Identified Known Exploited Vulnerabilities.”
[ { "id": 45998, "label": "identity", "start_offset": 111, "end_offset": 115 }, { "id": 45996, "label": "identity", "start_offset": 54, "end_offset": 72 }, { "id": 45997, "label": "SOFTWARE", "start_offset": 91, "end_offset": 97 } ]
[]
[]
299
Updated April 1, 2022, at 11 a.m. PT.
[ { "id": 45999, "label": "TIME", "start_offset": 8, "end_offset": 37 } ]
[]
[]
300
Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!
[]
[]
[]
301
Please mark, I'm not a robot!
[]
[]
[]
302
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
[]
[]
[]
303
Recent events continue to highlight the abuse of remote access applications in the enterprise.
[]
[]
[]
304
Last Tuesday, Trusteer reported that a new variant of Citadel, which has long relied on VNC to give attackers remote control over systems, began adding new credentials to systems it infects and enabling the standard Windows remote desktop application (RDP).
[ { "id": 1035, "label": "malware", "start_offset": 54, "end_offset": 61 }, { "id": 46000, "label": "tools", "start_offset": 88, "end_offset": 91 }, { "id": 46001, "label": "tools", "start_offset": 216, "end_offset": 256 }, { "id": 46002, "label": "identity", "start_offset": 14, "end_offset": 22 }, { "id": 46003, "label": "TIME", "start_offset": 0, "end_offset": 12 } ]
[ { "id": 142, "from_id": 1035, "to_id": 46000, "type": "uses" }, { "id": 143, "from_id": 1035, "to_id": 46001, "type": "uses" } ]
[]
305
This allows the attacker to maintain control over the system even after the Citadel infection is removed.
[ { "id": 46004, "label": "malware", "start_offset": 76, "end_offset": 83 } ]
[]
[]
306
As the report indicates, using RDP this way also allows the attackers to “fly under the radar” as RDP is commonly used by administrators and often not treated as a threat.
[ { "id": 44690, "label": "tools", "start_offset": 98, "end_offset": 101 }, { "id": 44691, "label": "tools", "start_offset": 31, "end_offset": 34 } ]
[]
[]
307
Later that same week, US-CERT released alert TA14-212A on the Backoff Point of Sale (PoS) malware, which describes how malicious actors used publicly available tools to identify organizations that use remote access applications in an unsafe way.
[ { "id": 46005, "label": "identity", "start_offset": 23, "end_offset": 30 }, { "id": 46006, "label": "malware", "start_offset": 63, "end_offset": 90 } ]
[]
[]
308
This reconnaissance was then leveraged in brute force attacks against credentials, toward unauthorized access, implant installation, and subsequent exfiltration of consumer payment data.
[ { "id": 1059, "label": "attack-pattern", "start_offset": 42, "end_offset": 53 }, { "id": 46007, "label": "attack-pattern", "start_offset": 111, "end_offset": 131 }, { "id": 46009, "label": "attack-pattern", "start_offset": 148, "end_offset": 185 }, { "id": 46008, "label": "attack-pattern", "start_offset": 90, "end_offset": 109 } ]
[]
[]
309
As with any tool, remote access applications can be used for good or malicious intent.
[]
[]
[]