Scattered Spider ransomware gang falls under government agency scrutiny

As you may have read in our November Ransomware Review, Scattered Spider is a relatively new, albeit dangerous, ransomware gang who made headlines in September for attacking MGM Resorts and Caesar Entertainment. For small security teams, one of the most important findings about the group is their use of Living Of The Land (LOTL) techniques to avoid detection: Scattered Spider aka Octo Tempest employs everyday tools like PowerShell for reconnaissance and stealthily alters network settings to bypass security measures. They also exploit identity providers and modify security systems, blending their malicious activities with normal network operations.

In a joint cybersecurity advisory (CSA) on Tuesday, the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) provided detailed information about the techniques leveraged by Scattered Spider. The advisory was issued in response to the recent activity by Scattered Spider against the commercial facilities sector and subsectors.

CISA and the FBI consider Scattered Spider to be experts that use multiple social engineering techniques, especially phishing, push bombing, and SIM swap attacks, to obtain credentials, install remote access tools, and bypass multi-factor authentication (MFA).

Push bombing is a targeted MFA attack in which an attacker triggers multiple login attempts against the target’s single-sign-on (SSO) portal or publicly exposed corporate apps and services. The objective is that the target will grow tired of the notifications or make a mistake and allow the access.

SIM swapping, also known as SIM jacking, is the act of illegally taking over a target’s cell phone number. This can be done in a number of ways, but one of the most common methods involves tricking the target’s phone carrier into porting the phone number to a new SIM under the control of the attacker.

Scattered Spider is a group that typically targets large companies and their contracted information technology (IT) help desks. To lend credibility to their phishing mails they often register domains like victimname-sso[.]com, victimname-servicedesk[.]com or victimname-okta[.]com.

Once the groups establish access, Scattered Spider often searches the victim’s Slack, Microsoft Teams, and Microsoft Exchange online for emails or conversations regarding the intrusion, along with any security response to see if their attack has been discovered.

The advisory describes how elaborate these efforts can be:

“The threat actors frequently join incident remediation and response calls and teleconferences, likely to identify how security teams are hunting them and proactively develop new avenues of intrusion in response to victim defenses.”

According to several sources, Scattered Spider has a relationship to ALPHV/BlackCat and has recently started using their ransomware for data exfiltration and file encryption.

The FBI seemingly struggles to arrest group members, even though they’re believed to be based in the US and other Western countries, because victims don’t come forward and share details about their incidents. For that reason, the FBI and CISA have urged victim organizations to share information about attacks with the agencies.

Another initiative that may hinder Scattered Spider’s tactics is the fact that the US Federal Communications Commission (FCC) has adopted new rules to protect US consumers from SIM-swapping attacks and port-out scams. These new rules require US wireless providers to use secure methods of authenticating a customer when they request porting a SIM card to a new device or their phone number to a new carrier.

How to avoid ransomware

Block common forms of entry. Create a plan for patching vulnerabilities in internet-facing systems quickly; and disable or harden remote access like RDP and VPNs.

Prevent intrusions. Stop threats early before they can even infiltrate or infect your endpoints. Use endpoint security software that can prevent exploits and malware used to deliver ransomware.

Detect intrusions. Make it harder for intruders to operate inside your organization by segmenting networks and assigning access rights prudently. Use EDR or MDR to detect unusual activity before an attack occurs.

Stop malicious encryption. Deploy Endpoint Detection and Response software like Malwarebytes EDR that uses multiple different detection techniques to identify ransomware, and ransomware rollback to restore damaged system files.

Create offsite, offline backups. Keep backups offsite and offline, beyond the reach of attackers. Test them regularly to make sure you can restore essential business functions swiftly.

Don’t get attacked twice. Once you’ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.

Our business solutions remove all remnants of ransomware and prevent you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.

Malwarebytes – ​Read More

20th November – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 20th November, please download our Threat_Intelligence Bulletin.

TOP ATTACKS AND BREACHES

Russia-affiliated military intelligence group SandWorm is reportedly responsible for an attack against 22 critical infrastructure companies in Denmark. The attacks, most severe in Danish history, have compromised industrial control systems and forced companies from the energy sector to work offline.
Medusa ransomware group has claimed two attacks this week. One of the victims, Toyota Financial Services, resorted to taking its operations partially offline to prevent further damage, whilst another victim, Canadian fin-tech giant Moneris, claimed it was able to prevent critical data leakage.
An elaborate attack on numerous European diplomatic and government entities, international organizations, and internet service providers, perpetrated by the Russia-affiliated APT29 group (AKA Cozy Bear) has been unveiled. The group launched a sophisticated phishing campaign to gain initial access and leveraged newly found WinRAR vulnerability CVE-2023-38831 to execute arbitrary code.

Check Point Harmony Endpoint and Threat Emulation provide protection against this threat
(APT.Win.APT29, APT.Wins.APT29.ta, APT.Wins.APT29)

Ransomware group AlphV/BlackCat claimed to have attacked American financial company MeridianLink. Notably, AlphV has reported the company’s failure to disclose the breach to the U.S. Securities and Exchange Commission. In response, the company claimed the attack was contained.

Check Point Harmony Endpoint and Threat Emulation provide protection against this threat (Ransomware.Win.BlackCat, Ransomware_Linux_BlackCat)

LockBit ransomware group added two new US victims to its list: Community Dental and Planet Home Lending. The companies hold highly sensitive medical and financial information, which LockBit threaten to publish should the requested ransom not be paid.

Check Point Harmony Endpoint and Threat Emulation provide protection against this threat (Ransomware.Win.Lockbit; Gen.Win.Crypter.Lockbit; Ransomware.Wins.LockBit.ta; Ransomware_Linux_Lockbit)

Samsung UK discovered a year-long data breach which compromised information of the company’s eCommerce site users. This week, it became apparent that an attacker exploited a vulnerability in a 3rd party vendor to access the data.
North Carolina’s Bladen county has suffered a cyber-attack which allowed hackers access to the county’s data systems. Access to some of the county government’s data is restricted, suggesting data was encrypted in an effort to extort ransom payment.

VULNERABILITIES AND PATCHES

In November’s Patch Tuesday, Microsoft have issued security updates for 58 flaws and five zero-day vulnerabilities. Three critical flaws were fixed: Azure information disclosure bug (CVE-2023-36052), a Remote Code Execution in Windows Internet Connection Sharing (CVE-2023-36397), and a Hyper-V escape flaw that allows executions of programs on the host with SYSTEM privileges (CVE-2023-36400).
Vulnerability researchers have discovered new attack methods against Google Workspace and Google Cloud Platform. The methods involve exploitation of cloned machines with Google Credentials Provider for Windows, a bypass of Google’s MFA process, and a password-reset bug. This could result in data exfiltration from all Google-managed platforms.
A zero-day cross-site scripting (XSS) vulnerability (CVE-2023-37580) in Zimbra email server was detected. Four groups were observed to have exploited the flaw to steal email data, credentials and authentication tokens. Most activities are believed to have occurred after a fix was published on GitHub.

Check Point IPS blade provides protection against this threat (Zimbra Collaboration Cross-Site Scripting (CVE-2023-37580))

THREAT INTELLIGENCE REPORTS

Check Point Research has published a report highlighting the activities of Russian cyber-espionage group Gamaredon and its use of a USB-propagating worm dubbed LitterDrifter. Gamaredon primarily focuses on Ukrainian targets, however LittleDrifter was observed in other countries as well. The worm spreads automatically and communicates with C2 servers to maintain persistent control across diverse targets.

Check Point Harmony Endpoint and Threat Emulation provide protection against this threat (APT.Win.Gamaredon, Trojan-Dropper.WIN32.Gamaredon, Trojan.Win32.Gamaredon)

Check Point Research witnessed an increase in cyber-crime targeting of online-shoppers as the November sales period approaches. Attackers used phishing websites designed to lure bargain shoppers, and crafted phishing emails impersonating luxury brands to steal customer’s credentials.
Check Point Research conducted an experimental deep dive to test ChatGPT’s malware analysis capabilities. The findings focus on the guidance the AI system requires in order to expand its capabilities and deliver a verdict.
Researchers have observed a recent phishing campaign by a likely Palestinian-based APT group Molerats (aka TA402, Gaza Cybergang). The group has targeted MENA based government entities using new tactics, such as the new downloader ‘IronWind’ and unique file attachments to evade detection.

Check Point Harmony Endpoint and Threat Emulation provide protection against this threat (APT.Wins.TA402.ta)

The post 20th November – Threat Intelligence Report appeared first on Check Point Research.

Check Point Research – ​Read More

Student discount: Get 50% off Malwarebytes

Technology is now an indispensable part of student life, used for everything from socialising and calling home, to writing and researching essays. Unfortunately, that makes students taking their first steps into adult life a prime target for cybercrime.

But how can you be sure the Wi-Fi network you’re connecting to at your library or local coffee shop is safe? What about when you’re inside college walls? More than that, your social media accounts likely hold a lot of information about you, information you don’t want to get into the wrong hands.

It’s hard to know who to trust online, and one click on a dodgy link could lead to compromised accounts, identity theft or even malware.

And, as one student we spoke to said “Nothing is worse than losing a school essay”.

We know you need to protect yourself and your important files online, but we also know that you’re probably feeling strapped for cash at the moment.

We’ve got good news. Malwarebytes is now offering 50% off our products to students, wherever you are in the world.

Here’s what we can help with:

Protect your important essays from ransomware and other nasties with Premium Security

Help you shop online safer, with protection against infected ad and credit card skimmers in Browser Guard

Keep your identity safe and protect your social media accounts with Identity Theft Protection

Block trackers and ads with Browser Guard

Work safely in coffee shops, libraries and other public places with Privacy VPN

Game faster and in peace while staying protected by using Play mode to suspend notifications

Find out more and see pricing on our student discount page.

Malwarebytes – ​Read More

A week in security (November 13 – November 19)

Last week on Malwarebytes Labs:

Signal is testing usernames so you don’t have to share your phone number

State of Maine data breach impacts 1.3 million people

Credit card skimming on the rise for the holiday shopping season

Update now! Microsoft patches 3 actively exploited zero-days

Ransomware review: November 2023

Alarm system cyberattack leaves those in need struggling to call for help

3 benefits of ThreatDown bundles

Ransomware gang files SEC complaint about victim

Stay safe!

Our business solutions remove all remnants of ransomware and prevent you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.

Malwarebytes – ​Read More

Leveraging Sandbox and Threat Intelligence Feeds to Combat Cyber Threats

Combining a malware sandbox with threat intelligence feeds improves security detection, analysis, and response capabilities.

Dark Reading – ​Read More

A Detection and Response Benchmark Designed for the Cloud

Does your security operation center’s performance meet the 5/5/5 benchmark for cloud threat detection and incident response?

Dark Reading – ​Read More

Crypto Scammers Exploit Gaza Crisis, Deceiving Users in Donation Scam

By Deeba Ahmed

Scammers taking advantage of a humanitarian crisis? Well, who saw that coming…

This is a post from HackRead.com Read the original post: Crypto Scammers Exploit Gaza Crisis, Deceiving Users in Donation Scam

Hackread – Latest Cybersecurity News, Press Releases & Technology Today – ​Read More

Yamaha and WellLife Network Confirm Cyber Incidents After Ransomware Gang Claims Attacks

Japanese manufacturer Yamaha Motor and healthcare organization WellLife Network have both confirmed being victims of cyberattacks. The ransomware group responsible for the attacks, possibly the INC gang, has been targeting various industries.

Cyware News – Latest Cyber News – ​Read More

Over a Dozen Exploitable Vulnerabilities Found in AI/ML Tools

The Huntr bug bounty platform has discovered multiple vulnerabilities in popular AI/ML tools, including H2O-3, MLflow, and Ray, which could lead to system takeover and data theft.

Cyware News – Latest Cyber News – ​Read More

Stanley Steemer Hack Breached Data of Almost 67K Customers

The breach went undetected for almost a month, highlighting the importance of proactive monitoring and timely detection of suspicious activities to prevent data breaches.

Cyware News – Latest Cyber News – ​Read More