OCTOBER'S THREAT: RYUK RANSOMWARE |
Return of the Ryuk RansomwareRyuk has been one of the most proficient ransomware threat actors. The threat group grew a little quiet earlier in the year, but that seems to have changed in the past couple of weeks, with incidents like what happened at UHS hospitals.
You can test the effectiveness of your security controls against the Ryuk ransomware campaigns with '714922 Ryuk Ransomware Attack Scenario" in Picus Threat Library. You can also validate your defenses against Ryuk malware samples with threats 312355, 424348, 727882, 551628, 269817, 588030, 507789, 230239, 675517, 247255, 429456, 591155, 304959, 204994, 506926, and 166962 in Picus Threat Library. |
OCTOBER'S THREAT ACTORS |
MuddyWater
Picus Labs has updated the Picus Threat Library with new attack methods for malware samples used in the Earth Vetala attack campaign of the MuddyWater. For more information, check the blog post Earth Vetala Campaign of MuddyWater APT Group Jointworm
|
ATTACK SCENARIOS |
Lazarus (APT38) Threat Group PowerRatankba Attack Scenario
ACTIONS 1. Query System Information ATT&CK Technique: T1082 System Information Discovery ATT&CK Tactic: Discovery
2. Execute a Keylogger uses GetAsyncKeyState() ATT&CK Technique: T1056 Input Capture ATT&CK Tactics: Credential Access, Collection
3. Capture ScreenShot using PsTools ATT&CK Technique: T1113 Screen Capture ATT&CK Tactic: Collection ... 12. C2 Communicate Over HTTPS Port 443 ATT&CK Technique: T1043 Commonly Used Port ATT&CK Tactic: Command and Control
Picus Labs has updated the Picus Threat Library with new attack methods for malware samples used by Lazarus. For more information, check the blog post Lazarus (Hidden Cobra) Group Employs HTA Embedded BMP Files |
Ryuk Ransomware Scenario
Picus Threat ID: 714922
ACTIONS 1. Gather Information about Target Domain ATT&CK Technique: T1018 ATT&CK Tactic: Discovery
2. Disable Defender Features ATT&CK Technique: T1562 Impair Defenses ATT&CK Tactic: Defense Evasion 3. Gather Trusted Domains via Nltest Command ATT&CK Technique: T1482 Domain Trust Discovery ATT&CK Tactic: Discovery ... 14. File Exfiltration with Encryptor.exe ATT&CK Technique: T1486 Data Encrypted for Impact ATT&CK Tactic: Impact |
Atomic AttacksProcess Injection with Process Herpaderping Method
Spearphishing Attachment Attack by using Hot Manchego
Wuauclt.exe OS Binary (Lolbas) used in Signed Binary Proxy Execution Technique
|
MALICIOUS CODE |
Covicli Backdoor Malware
Egregor Ransomware
SLOTHFULMEDIA RAT
|
WEB APPLICATION ATTACKS |
Ruby on Rails MemCacheStore and RedisCacheStore Remote Code Execution (RCE)
Cisco ASA and Firepower Arbitrary File Deletion
SharePoint Server DataFormWebPart CreateChildControls RCE
|
VULNERABILITY EXPLOITATIONS |
Google Chrome V8 Engine Null Pointer Information Leak
Win32k Denial of Service Vulnerability
Windows Kernel Information Disclosure
|
SIGMA RULES |
Bypass User Access Control via Modifying Software Registry Value
Credential Access using Obtaining Debug Privileges by Mimikatz via PowerShell
Windows Firewall Configurations Discovery via Netsh Tool |