OCTOBER'S THREAT: RYUK RANSOMWARE |
Return of the Ryuk RansomwareRyuk has been one of the most proficient ransomware threat actors. The threat group grew a little quiet earlier in the year, but that seems to have changed in the past couple of weeks, with incidents like what happened at UHS hospitals.
You can test the effectiveness of your security controls against the Ryuk ransomware campaigns with '714922 Ryuk Ransomware Attack Scenario" in Picus Threat Library. You can also validate your defenses against Ryuk malware samples with threats 312355, 424348, 727882, 551628, 269817, 588030, 507789, 230239, 675517, 247255, 429456, 591155, 304959, 204994, 506926, and 166962 in Picus Threat Library. |
OCTOBER'S THREAT ACTORS |
MuddyWater
Picus Labs has updated the Picus Threat Library with new attack methods for malware samples used in the Earth Vetala attack campaign of the MuddyWater. For more information, check the blog post Earth Vetala Campaign of MuddyWater APT Group Jointworm
|
ATTACK SCENARIOS |
Lazarus (APT38) Threat Group PowerRatankba Attack Scenario
ACTIONS 1. Query System Information ATT&CK Technique: T1082 System Information Discovery ATT&CK Tactic: Discovery
2. Execute a Keylogger uses GetAsyncKeyState() ATT&CK Technique: T1056 Input Capture ATT&CK Tactics: Credential Access, Collection
3. Capture ScreenShot using PsTools ATT&CK Technique: T1113 Screen Capture ATT&CK Tactic: Collection ... 12. C2 Communicate Over HTTPS Port 443 ATT&CK Technique: T1043 Commonly Used Port ATT&CK Tactic: Command and Control
Picus Labs has updated the Picus Threat Library with new attack methods for malware samples used by Lazarus. For more information, check the blog post Lazarus (Hidden Cobra) Group Employs HTA Embedded BMP Files |
Ryuk Ransomware Scenario
Picus Threat ID: 714922
ACTIONS 1. Gather Information about Target Domain ATT&CK Technique: T1018 ATT&CK Tactic: Discovery
2. Disable Defender Features ATT&CK Technique: T1562 Impair Defenses ATT&CK Tactic: Defense Evasion 3. Gather Trusted Domains via Nltest Command ATT&CK Technique: T1482 Domain Trust Discovery ATT&CK Tactic: Discovery ... 14. File Exfiltration with Encryptor.exe ATT&CK Technique: T1486 Data Encrypted for Impact ATT&CK Tactic: Impact |
Atomic AttacksProcess Injection with Process Herpaderping Method
Spearphishing Attachment Attack by using Hot Manchego
Wuauclt.exe OS Binary (Lolbas) used in Signed Binary Proxy Execution Technique
|
MALICIOUS CODE |
Covicli Backdoor Malware
Egregor Ransomware
SLOTHFULMEDIA RAT
|
WEB APPLICATION ATTACKS |
Ruby on Rails MemCacheStore and RedisCacheStore Remote Code Execution (RCE)
Cisco ASA and Firepower Arbitrary File Deletion
SharePoint Server DataFormWebPart CreateChildControls RCE
|
VULNERABILITY EXPLOITATIONS |
Google Chrome V8 Engine Null Pointer Information Leak
Win32k Denial of Service Vulnerability
Windows Kernel Information Disclosure
|
SIGMA RULES |
Bypass User Access Control via Modifying Software Registry Value
Credential Access using Obtaining Debug Privileges by Mimikatz via PowerShell
Windows Firewall Configurations Discovery via Netsh Tool |
PICUS LABS MONTHLY #October 2020
Emerging Threat
Palo Alto CVE-2024-0012 and CVE-2024-9474 Vulnerabilities Explained
Emerging Threat
Understanding and Mitigating Midnight Blizzard's RDP-Based Spear Phishing Campaign
Emerging Threat
CVE-2024-47575: FortiManager Missing Authentication Zero-Day Vulnerability Explained
Emerging Threat
Iranian Cyber Actors’ Brute Force and Credential Access Attacks: CISA Alert AA24-290A
Emerging Threat
CISA Alert AA24-249A: Russian GRU Unit 29155 Targeting U.S. and Global Critical Infrastructure
Emerging Threat
CVE-2024-38063: Remote Kernel Exploitation via IPv6 in Windows
Emerging Threat
RansomHub Ransomware Analysis, Simulation, and Mitigation - CISA Alert AA24-242A
Emerging Threat
Pioneer Kitten: Iranian Threat Actors Facilitate Ransomware Attacks Against U.S. Organizations
Emerging Threat
Andariel: North Korean APT Group Targets Military and Nuclear Programs