The Blue Report 2024
Get a comprehensive analysis of over 136 million cyber attacks and understand the state of threat exposure management.
November was another busy month for new malware families and ransomware campaigns. As always, Picus Labs swiftly added attack simulations to Picus Threat Library for these new threats as they were discovered.
This blog briefly explains the top five cyber threats observed in November 2022. You can easily simulate these threats and validate and improve your security controls against them with the Picus Complete Security Validation Platform.
Simulate Emerging Cyber Threats with 14-Day Free Trial of the Picus Platform
Top Cyber Threats of November 2022
1. Iranian Government-Sponsored APT Actors (AA22-320A)
2. Hive Ransomware Group (AA22-321A)
3. TONESHELL Backdoor Loader
4. Koxic Ransomware
5. Aurora Infostealer Malware
1. Iranian Government-Sponsored APT Actors (AA22-320A)
On November 16, 2022, CISA and FBI released a joint advisory on Iranian government-sponsored APT actors [1]. In their attack campaign, threat actors exploited the Log4Shell vulnerability to gain a foothold on an unpatched VMware Horizon server, which belongs to a Federal Civilian Executive Branch (FCEB) organization.
Upon initial access, adversaries allow-listed specific directories to download malicious tools without getting caught by virus scans and executed a PowerShell script to impair Windows Defender. Next, the threat actors downloaded malicious files and software (XMRig crypto miner) on the target system, which are later leveraged to establish persistence and use the victim’s computing power to mine cryptocurrency.
Next, adversaries laterally move from the compromised VM Horizon server to the VMware VDI-KMS host using a built-in Windows user account over an RDP connection. Later, they transferred some tools to the VID-KMS host (Mimikatz, PsExec, ngrok) for post-exploitation activities. In the end, adversaries had complete control over all domain-joined assets, including the Domain Controller.
We strongly suggest simulating Advanced Persistent Threats (APTs) to test the effectiveness of your security controls against cyber attacks using the Picus Complete Security Validation Platform. You can test your defenses against infamous APT actors such as Lazarus, HAFNIUM, and DEV-0586 within minutes with a 14-day free trial of the Picus Platform. |
Picus Threat Library includes the following threats for Iranian APT actors targeting FCEB Organization:
Threat ID |
Threat Name |
21296 |
Apache Log4j Web Attack Campaign (Web Application) |
63158 |
XMRig Malware Downloader Email Threat (Email Infiltration) |
93377 |
XMRig Malware Downloader Download Threat (Network Infiltration) |
77752 |
XMRigMinerDropper Email Threat (Email Infiltration) |
24052 |
XMrig Cryptocurrency Email Threat (Email Infiltration) |
27275 |
XMRigMinerDropper Worm Email Threat (Email Infiltration) |
90867 |
XMRigMinerDropper Download Threat (Network Infiltration) |
44668 |
XMrig Cryptocurrency Download Threat (Network Infiltration) |
48749 |
XMRigCC Cryptocurrency Miner Download Threat (Network Infiltration) |
47618 |
XMRigMinerDropper Worm Download Threat (Network Infiltration) |
2. Hive Ransomware (AA22-321A)
As of November 2022, Hive ransomware has affected more than 1300 companies, causing a waste of $100 million US dollars as a ransom payment.
Hive ransomware holders leverage different initial access techniques. However, it is seen that adversaries generally send phishing emails with a malicious attachment, which are crafted to exploit known vulnerabilities within public-facing applications like Windows Exchange Servers (CVE-2021-31207, CVE-2021-34473, CVE-2021-34523).
After the foothold is gained, Hive actors download malicious binaries and an obfuscated Powershell script, which is part of the Cobalt Strike framework, from their C2 server. Upon compromising the most powerful built-in user on the local computer, NT Authority, adversaries dump all NTLM hashes to leverage a Pass-the-Hash (PtH) attack.
Using the stolen valid account credentials, adversaries send Remote Desktop Protocol (RDP) connection requests to many internal assets to see which databases they have access to. It is suspected this was done to check the expansion of their access and figure out which sensitive information they can exfiltrate before the encryption starts. Next, having a list of all domain objects, attackers execute a batch script to ping every item in the list and write the ones that respond to a file. These files later get encrypted for higher impact.
Picus Threat Library already had a threat for the Hive Ransomware group’s attack campaigns. Picus Labs added new attack simulations to Picus Threat Library for new malware that Hive actors use.
Picus Threat Library includes the following threats for Hive Ransomware Group.
Threat ID |
Threat Name |
28770 |
Hive Ransomware Download Threat (Network Infiltration) |
59759 |
Hive Ransomware Campaign (Endpoint) |
63385 |
Hive Ransomware Email Threat (Email Infiltration) |
3. TONESHELL Backdoor Malware
Starting from March 2022, we started to see a new cyber-espionage activity scratching the surface. According to security researchers, this attack campaign is tracked to an Advanced Persistent Threat (APT) actor, Earth Preta [3] (a.k.a Mustang Panda and Bronze President).
The victimology points to the usage of fake Google and DropBox accounts to distribute the Hive malware. Adversaries send targeted phishing emails, spearphishing, with a malicious Google Drive or DropBox link attached to them. Analysis shows that attachments contain malicious archive files (rar/zip/jar), consisting of various files such as images (.png), word documents (.doc), and legitimate executables (.exe). These files possess benign-looking names, luring the victims into thinking that they come from governmental sources, while in reality, they trigger the execution of the following malware families: TONEINS, TONESHELL, and PUBLOAD.
Among these three malware, TONESHELL is the backdoor that is mainly used by Earth Preta in their targeted phishing campaigns. TONESHELL gets loaded and decoded on the target system through the shellcode loader, called Backdoor.Win32.TONESHELL.
Further analysis shows that the code of the TONESHELL payload contains various functions with very self-explonatory strings used for uploading, downloading, and executing files, lateral movement, and data exchange over intranet through OnePipeShell, one-way shell over one named pipe [3], and TwoPipeShell functions.
After the backdoor is installed and encrypted C2 communication is established, adversaries exfiltrate sensitive information as part of their double-extortion method.
Picus Labs have already had the threats for Mustang Panda.
Now, Picus Threat Library includes the following threats for TONESHELL backdoor, TONEINS malware dropper, and PUBLOAD malware downloader. We highly recommend you test your security infrastructure’s effectiveness against these latest threats.
Threat ID |
Threat Name |
59444 |
TONESHELL Backdoor Malware Download Threat |
91901 |
TONESHELL Backdoor Malware Email Threat |
65814 |
TONEINS Malware Dropper Download Threat (Network Infiltration) |
50546 |
TONEINS Malware Dropper Email Threat (E-mail Infiltration) |
86723 |
PUBLOAD Malware Downloader Download Threat (Network Infiltration) |
67981 |
PUBLOAD Malware Downloader Email Threat (E-mail Infiltration) |
59489 |
Mustang Panda Threat Group Campaign Malware Email Threat (E-mail Infiltration) |
56290 |
Mustang Panda Threat Group Campaign Malware Download Threat (Network Infiltration) |
4. Koxic Ransomware
Even though we first started to see it in Korea, more and more users are becoming victims of a new variant of Koxic ransomware worldwide.
Upon getting executed, Koxic ransomware starts a discovery phase to retrieve the current system information. Following this, they re-configure the RDP expiry as maximum to maintain a more extended remote desktop session and disable both the real-time and behavior monitoring features of the Windows Defender to evade detection and prevent the defending systems from sending alert notifications to the SIEM systems.
HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services\MaxDisconnectionTime HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services\MaxIdleTime
HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware
HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring HKCU\Software\Policies\Microsoft\Windows\Explorer\DisableNotificationCenter
The ransomware continues its flow by deleting the volume shadow copies and disabling database services like MongoDB, SQLWriter, and MySQL.
Then, Koxic malware starts to make a list of all targets that can be encrypted. As a parallel process, it beings a threat that loops over this list, encrypting each item one by one. Encryption is performed using the AES algorithm in CBC mode, where the Initialization Value (IV) value and the symmetric key for the AES algorithm are encrypted by an asymmetric encryption algorithm, RSA.
Picus Threat Library includes the following threats for Koxic ransomware. We recommend that organizations validate their security infrastructure against the Koxic ransomware that we will likely encounter more in the wild.
Threat ID |
Threat Name |
55587 |
Koxic Ransomware Download Threat (Network Infiltration) |
26807 |
Koxic Ransomware Email Threat (E-mail Infiltration) |
5. Aurora Infostealer Malware
In April 2022, Aurora was first advertised under the Russian-speaking hacking forums and Telegram channel as a Malware-as-a-Service (MaaS) botnet with data-stealing and remote access features. In August 2022, its activity almost vanished; being suspected that its developers had stopped selling it and removed its code from underground repositories.
However, in September 2022, a new and large amount of Aurora activity drew the attention of security researchers, revealing itself not as a botnet but as an “infostealer.” It became so popular that many big traffers teams suggested its use. In November 2022, an analysis of many active C2 servers showed that Aurora had become a number-one infostealer used by adversaries.
Aurora mainly uses the lxn/win library to get system-related information, which depends on WMIC. The following wmic commands are run in the infected host:
wmic os get Caption wmic path win32_VideoController get name wmic cpu get name |
Figure 11. File grabber functionality of Aurora infostealer [7].
The data gets exfiltrated in the JSON format from the target system to an attaker-owned Aurora C2, which listens to the incoming network traffic on ports 9865 and 8081 ports over TCP.
Picus Labs already had different RATs (PoetRAT, FairFAX) used in the Aurora malware campaign (2021).
Now, Picus Threat Library includes the following threat for the Aurora infostealer malware. We highly recommend organizations test their security infrastructure against this increasingly adapted infostealer.
Threat ID |
Threat Name |
38571 |
Aurora Infostealer Download Threat (Network Infiltration) |
56237 |
Aurora Infostealer Email Threat (E-mail Infiltration) |
24087 |
Aurora Campaign Malware Download Threat (Network Infiltration) |
30142 |
FairFax RAT Email Threat (E-mail Infiltration) |
76563 |
FairFax RAT Download Threat (Network Infiltration) |
31003 |
PoetRAT RAT Download Threat (Network Infiltration) |