We at Kaspersky recently conducted a study and found that the average person spends $938 a year on 12 subscriptions. This just confirms that in today’s world, being subscribed to numerous services is just as much a part of everyday life as having your smartphone with you at all times.
There are subscriptions for everything: music, movies, fitness, security solutions, and even messaging apps. In this article, we’ll focus on one of the latter — Telegram Premium, a subscription that doubles almost all the messenger’s free-version’s limits. And the coolest thing about it is that you can give it to your friends as a present. If you have a large contact list, Telegram frequently reminds you of this possibility. Of course, scammers are exploiting this feature, sending out fake Telegram Premium gift subscriptions left and right.
So what’s behind these gift subscriptions from cybercriminals — and how can you protect your Telegram account?
How the Telegram gift-subscription scam works
It all starts with an innocent-looking Telegram message from someone in your contact list (actually — an impostor): “You’ve been sent a gift — a Telegram Premium subscription”. Beneath it is a link that, at first glance, seems legitimate. And indeed, it leads to an official-looking Telegram Premium channel. But there’s a catch…
Admit it, receiving a message like this feels great, and in a moment of excitement, it’s easy not to cotton on to the trap
The text you see — https://t.me/premium — actually hides a link to a completely different phishing page. It’s a simple trick. Consider this example: here’s a link to the Kaspersky Daily blog homepage — https://kaspersky.com/blog, but it actually redirects to the homepage of our other blog, Securelist. Scammers use the same principle: they mask their phishing links with seemingly legitimate addresses.
Let’s return to the Telegram gift-subscriptions scam. The phishing page looks like a regular Telegram login page in a browser. However, the scam is betrayed by the dodgy URL: the address starts with the familiar https://t.me, but then has something extra, which wouldn’t be there if were a legitimate page:
Nice try, scammers — it looks almost identical to the real site
If you enter your account details here, consider them stolen. Your user name, password, and possibly your two-factor authentication code will end up in bad guys’ hands. Once you’ve handed over your credentials, the scammers display a congratulatory message and start a 24-hour timer, claiming it’s the activation period for Telegram Premium. This delay is a classic cybercriminal tactic. They’re counting on the user either forgetting about the subscription or believing it’s genuinely on its way. Most likely, the only thing that will happen during these 24 hours is that you’ll permanently lose access to your account.
After 24 hours, the timer ends, but the subscription never materializes
How else do scammers exploit gift Telegram subscriptions?
Since Telegram Premium launched several years ago, various scam scenarios have emerged. Unsurprisingly, these scams bear similarities to other primitive forms of fraud we frequently discuss on the Kaspersky Daily blog.
For example, cybercriminals might claim to host a free raffle for a three-month Telegram Premium subscription. However, there’s no real drawing of the winning “tickets” — everyone’s a winner; however, the prize isn’t a genuine gift subscription. Victims are directed to click a link and log in to Telegram on a phishing site. And that’s where their accounts get compromised.
Cybercriminals play to your ego with false claims like: “You’ve been selected as one of seven participants in our exclusive prize draw!”
Another common tactic involves distributing APK files for supposedly “hacked” Telegram apps bundled with Premium subscriptions. Needless to say, such modified apps are often nothing more than malware in disguise.
Always be skeptical of allegedly hacked or alternative versions of popular apps
Now, you’ll have noticed that the screenshots above are in various languages. The fact is that these scammers operate all over the world, and if this scheme hasn’t reached your region yet, rest assured it surely soon will. Therefore, you should ensure the security of your devices and accounts with reliable protection.
How to protect your Telegram account
To start, we recommend setting up your Telegram security and privacy using our guide. If you’ve already done this, here are some additional tips to help you avoid becoming a victim of these and other scams:
Remember that there’s no such thing as a free lunch. Before celebrating a sudden gift, double-check if the sender really has good intentions. At the very least, contact them via a different communication channel — call them, use another messenger, or verify in person. As your personal account is at stake, you’d better err on the side of excessive caution.
Purchase subscriptions only through official channels. Telegram, for example, has a designated bot for buying subscriptions.
Learn more about other ways scammers can steal your Telegram account. There are countless fraudulent schemes — many of which are more sophisticated than they appear.
Slow down, even if you’re being rushed. Scammers love pressuring victims with timers. When it comes to your digital safety, ignore countdowns and take your time.
Be cautious about alternative versions of apps. We recommend only using official apps, because unofficial versions are almost always loaded with Trojans.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-11-28 08:06:342024-11-28 08:06:34Telegram Premium gift subscription scam | Kaspersky official blog
CISA has announced new additions to its Secure by Design initiative with the introduction of advanced fields in artificial intelligence (AI). This plan ensures the safety, security, and reliability of AI systems, especially as they are increasingly integrated into critical infrastructure and public safety applications. One of the most effective ways to evaluate and improve the resilience of AI systems is through the process of AI red teaming, which is an integral part of a broader strategy known as Testing, Evaluation, Validation, and Verification (TEVV).
This approach, backed by decades of experience in software security testing, emphasizes the importance of a Secure by Design methodology and aims to protect against both technical and ethical risks associated with AI deployment. The Cybersecurity and Infrastructure Security Agency (CISA), as the national coordinator for critical infrastructure security, has been at the forefront of promoting the Secure by Design approach in the development and testing of AI systems.
This initiative is designed to ensure that AI technologies are not only functional but also resistant to exploitation and capable of operating safely within complex environments. In a recent blog post by Jonathan Spring, Deputy Chief AI Officer, and Divjot Singh Bawa, Strategic Advisor, CISA emphasizes the importance of integrating AI red teaming into the established framework of software TEVV.
Red teaming, in the context of AI, refers to third-party safety and security evaluations of AI systems. It is part of a broader risk-based approach that includes thorough testing to uncover vulnerabilities and potential points of failure. According to the CISA blog, AI red teaming is essential for identifying weaknesses that could lead to critical failures, whether through physical attacks, cyberattacks, or unforeseen system malfunctions. The goal of AI testing is to predict how an AI system may fail and develop strategies to mitigate such risks.
AI Testing, Evaluation, Validation, and Verification (TEVV)
TEVV, a well-established methodology used for testing software systems, is not just relevant but essential for evaluating AI systems. Despite some misconceptions, AI TEVV should not be seen as entirely distinct from software TEVV. In fact, AI systems are fundamentally software systems, and the principles of TEVV are directly applicable to AI evaluations. This approach is particularly important as AI becomes increasingly integrated into safety-critical sectors like healthcare, transportation, and aerospace.
The TEVV framework is built upon three core components: system test and evaluation, software verification, and software validation. These processes ensure that software, including AI systems, functions as intended, meets safety standards, and performs reliably in diverse conditions. AI systems, like traditional software, must be rigorously tested for both validity (whether the system performs as expected) and reliability (how well the system performs under varying conditions).
One of the common misconceptions about AI systems is that their probabilistic nature — which allows them to adapt to changing inputs and conditions — makes them fundamentally different from traditional software. However, both AI and traditional software systems are inherently probabilistic, as demonstrated by issues like race conditions in software, where seemingly minor changes can lead to critical errors.
The Intersection of Software and AI TEVV
The notion that AI systems require entirely new testing frameworks separate from software TEVV is flawed. While AI systems may introduce new challenges, particularly around their decision-making processes and data-driven behaviors, many of the testing methodologies used in traditional software security remain relevant.
For instance, AI systems must undergo similar testing to ensure they are robust against unexpected inputs, exhibit reliability over time, and operate within secure boundaries. These concepts are not new but have been applied to traditional software for decades, particularly in industries where safety is paramount.
Take, for example, automated braking systems in modern vehicles. These systems rely on AI to interpret sensor data and make split-second decisions in critical situations, such as detecting pedestrians or obstacles. To ensure these systems are safe, engineers must test their robustness under a variety of scenarios, from unexpected road conditions to sensor malfunctions. Similarly, AI systems, regardless of their complexity, must undergo similar evaluations to guarantee their safety and reliability in real-world conditions.
CISA’s Role in Advancing AI Red Teaming and Security
CISA’s leadership in AI red teaming and security testing is crucial as AI becomes more prevalent in critical infrastructure. The agency is a founding member of the newly formed Testing Risks of AI for National Security (TRAINS) Taskforce, which aims to test advanced AI models used in national security and public safety contexts. The taskforce will focus on creating new AI evaluation methods and benchmarks to ensure that AI systems meet national security standards and can be securely deployed.
Moreover, CISA is actively involved in post-deployment AI security testing. This includes penetration testing, vulnerability scanning, and configuration testing for AI systems deployed across both federal and non-federal entities. As AI technologies, especially Large Language Models (LLMs), become more integrated into various sectors, CISA expects an increase in demand for these security testing services.
In addition to its technical efforts, CISA works closely with the National Institute of Standards and Technology (NIST) to develop and refine standards for AI security testing, providing expertise on how to make these standards actionable and effective.
Conclusion
As the field of AI testing continues to evolve, integrating AI red teaming into the existing software TEVV framework offers significant benefits. By adapting traditional software security testing methods to address the unique challenges posed by AI, the testing community can build upon proven strategies while incorporating new tools and methodologies specific to AI evaluation. This streamlined approach helps save time, resources, and effort by avoiding the creation of parallel testing processes that may ultimately yield similar results.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-11-27 13:06:332024-11-27 13:06:33CISA Enhances Secure by Design Strategy with AI Red Teaming for Critical Infrastructure Protection
In this article, ANY.RUN‘s analyst team will explore a malicious loader known as PSLoramyra. This advanced malware leverages PowerShell, VBS, and BAT scripts to inject malicious payloads into a system, execute them directly in memory, and establish persistent access.
Classified as a fileless loader, PSLoramyra bypasses traditional detection methods by loading its primary payload entirely into memory, leaving minimal traces on the system.
PSLoramyra Loader: Technical Analysis
To see PSLoramyra loader in action, let’s have a look at its sample inside ANY.RUN’s sandbox:
Let’s take a closer look at this loader. The infection chain begins with an initial PowerShell script that contains both the main malicious payload and the scripts required to execute it. The script performs the following steps:
File creation:
The script generates three files critical to the infection chain:
roox.ps1
roox.bat
roox.vbs
Execution chain:
The roox.vbs script is executed first to initiate the process.
roox.vbs launches the roox.bat script.
roox.bat then runs the roox.ps1 PowerShell script.
Payload execution:
Execution chain of the attack
The roox.ps1 script loads the main malicious payload directly into memory using Reflection.Assembly.Load.
Process tree generated by ANY.RUN sandbox
It then leverages RegSvcs.exe to execute the payload. In this case, the payload is the Quasar RAT.
Black Friday 2024: Get up to 3 sandbox licenses for free
The PowerShell script establishes persistence by creating a Windows Task Scheduler task that runs roox.vbs every two minutes. Here’s how it operates step by step:
Creating the scheduler object:
The script initializes a Task Scheduler object using the following command:
New-Object -ComObject Schedule.Service
It then connects to the Task Scheduler service: $scheduler.Connect()
Defining a new task:
A new task is created with: $taskDefinition = $scheduler.NewTask(0)
The task is described, and its execution is enabled: $taskDefinition.Settings.Enabled = $true
Setting the Trigger:
A trigger is configured to execute the task every two minutes: $trigger.Repetition.Interval = “PT2M”
Configuring the Task Action:
The action specifies the execution of the roox.vbs script: $action.Path = “C:UsersPublicroox.vbs
Registering the Task:
Finally, the task is registered in the Task Scheduler, ensuring it runs continuously: $taskFolder.RegisterTaskDefinition()
Script Creation
The initial PowerShell script generates multiple scripts and writes them to the disk. This is achieved using the following command: [IO.File]::WriteAllText(“PATH”, CONTENT)
The content of these scripts is initially stored in variables such as $Content.
Script execution shown in the ANY.RUN sandbox
Detailed Script Breakdown
Roox.vbs script
This script runs every two minutes and acts as the starting point for executing the other scripts in the malware chain. Essentially, it serves as a link between the Task Scheduler and the subsequent scripts, ensuring the infection chain progresses successfully.
VBS Script
The roox.vbs script launches the next script in the chain, roox.bat, in a hidden window. This ensures that its execution remains invisible to the user, maintaining the stealth of the infection process.
Error handling:
The command on error resume next suppresses error messages, allowing the script to continue execution even if exceptions occur. This ensures the script does not fail visibly during the process.
CreateWshShellObj function
This function creates a COM object named WScript.Shell. The object is used to execute commands and scripts, which are essential for launching the next stage in the infection chain.
GetFilePath function
This function retrieves the path to the next stage in the chain, specifically pointing to the BAT file roox.bat.
GetVisibilitySetting function
Configures the visibility settings to ensure that roox.bat runs without displaying a window on the desktop. This stealthy execution minimizes the chances of detection by the user.
RunFile function
Executes a file at the specified path with the defined visibility settings. In this case, it launches roox.bat in hidden mode.
Sequence of calls
The script executes the required functions in the following order to launch roox.bat:
Creates the WScript.Shell object using CreateWshShellObj.
Retrieves the path to roox.bat via GetFilePath.
Configures the visibility mode to hidden (0) using GetVisibilitySetting.
Executes roox.bat in hidden mode through the RunFile function.
ROOX.BAT Script
BAT script
This script runs roox.ps1 using PowerShell. It employs the following flags to enhance stealth and bypass security measures:
NoProfile: Prevents the loading of user-specific PowerShell profiles
WindowStyle Hidden: Hides the PowerShell window during execution, ensuring that the process remains invisible to the user.
ExecutionPolicy Bypass: Overrides Windows PowerShell execution policies, allowing scripts to run without restrictions imposed by security configurations.
ROOX.PS1 Script
PowerShell script
The roox.ps1 PowerShell script deobfuscates the main malicious payload, dynamically loads it into memory, and executes it using .NET Reflection and RegSvcs.exe. The script employs simple obfuscation using the # character to make detection more challenging.
The variables $RoXstring_lla and $Mordexstring_ojj store the main malicious payload in the form of HEX strings, with each byte separated by %&% as a means of obfuscation.
Form byte arrays: This forms a byte array (Byte[]), representing the binary code of the payload.
Deobfuscate using -replace: Obfuscated commands are cleaned by removing # symbols using the -replace command. For example, a string like L####o####a####d is transformed into Load.
Restore the method name: The variable $Fu restores the method name [Reflection.Assembly]::Load, which is used to load a .NET assembly into memory.
Payload execution in memory: The script dynamically loads the NewPE2.PE type from the .NET assembly and calls its Execute method. The Execute method injects malicious code into a legitimate process, such as aspnet_compiler.exe. In this case, the target process is RegSvcs.exe.
The initial variable $RoXstring_lla contains the injector for the .NET assembly NewPE2, which is responsible for loading the main payload into the process.
Within this assembly, the script locates the type NewPE2.PE and executes the Execute method. The latter is provided with parameters: the path and the malicious .NET assembly itself.
Learn to analyze cyber threats
See a detailed guide to using ANY.RUN’s Interactive Sandbox for malware and phishing analysis
Read full guide
Use the following query to search for more samples and threat data in TI Lookup:
PSLoramyra is a sophisticated fileless loader. It leverages PowerShell, VBS, and BAT scripts to inject and execute malicious payloads directly in memory, evading traditional detection methods. Its infection chain begins with an initial PowerShell script that generates essential files and establishes persistence through Windows Task Scheduler. The malware’s stealthy execution and minimal system footprint make it a serious threat.
About ANY.RUN
ANY.RUN helps more than 500,000 cybersecurity professionals worldwide. Our interactive sandbox simplifies malware analysis of threats that target both Windows and Linux systems. Our threat intelligence products, TI Lookup, YARA Search and Feeds, help you find IOCs or files to learn more about the threats and respond to incidents faster.
With ANY.RUN you can:
Detect malware in seconds
Interact with samples in real time
Save time and money on sandbox setup and maintenance
The 2023–2024 Annual Cyber Threat Report from the Australian Signals Directorate (ASD) reports a new rise in cyber threats targeting both individuals and businesses in Australia. As global tensions escalate, particularly due to ongoing conflicts such as Russia’s invasion of Ukraine and strife in the Middle East, cybercriminals and state-sponsored threat actors are intensifying their efforts to exploit vulnerabilities across nations.
The Australia government stresses the growing threat to its critical infrastructure, with malicious actors continuing to engage in espionage, cybercrime, and disinformation campaigns. At the same time, technological advancements are enabling both state and non-state actors to enhance their cyber capabilities, creating new challenges for businesses, individuals, and government entities alike.
In response to these mounting risks, the Australian Government has committed $15–$20 billion to support the nation’s cyber resilience, strengthen infrastructure security, and support offensive operations against cyber threats. Central to this strategy is the importance of public-private partnerships and the ongoing use of cyber sanctions to target adversarial actors such as Russian cybercriminals.
2023–2024 Annual Cyber Threat Report: Key Findings on Cyber Threat Trends for Individuals
In the 2023–2024 Cyber Threat Trends, the report reveals troubling statistics and insights into the personal cyber risks faced by Australians. Over 87,400 cybercrime reports were made in FY2023–24, marking a 7% decrease from the previous year. This equates to an average of one cybercrime report every six minutes. The Australian Cyber Security Hotline responded to over 36,700 calls in the same period, an increase of 12% compared to FY2022–23, signaling that cyber threats targeting individuals are on the rise.
The most prevalent types of cybercrimes reported by individuals were:
Identity fraud (26%)
Online shopping fraud (15%)
Online banking fraud (12%)
The financial impact of these crimes is substantial. The average cost of cybercrime per report for individuals has risen to approximately $30,700, a 17% increase from the previous year. This figure highlights the growing financial burden that cybercrime places on individuals, many of whom find themselves victims of scams, data breaches, and fraud. According to the Australian Institute of Criminology’s Cybercrime in Australia 2023 report, 34% of Australians had their financial or personal information exposed in a data breach in the last year, with 79% of them being notified by the affected company or a government agency.
Cybercriminals continue to exploit various tactics to carry out their attacks, with common methods including phishing, where cybercriminals impersonate trusted businesses to trick individuals into revealing sensitive information, such as passwords or credit card details. Malware is another frequent tool used to infect devices, steal data, or carry out unauthorized transactions.
The main 2023–2024 cyber threats individuals need to be aware of include:
Identity fraud: The theft and misuse of personal information for financial gain or to create fake accounts.
Online shopping fraud: Scams that occur when individuals purchase goods or services online, only to be defrauded or receive counterfeit products.
Online banking fraud: Cybercriminals gain unauthorized access to bank accounts to steal funds or commit fraudulent activities.
2023–2024 Annual Cyber Threat Report: Cyber Threat Trends for Businesses
The 2023–2024 Annual Cyber Threat Report also provides insights into the growing risks faced by businesses in Australia, particularly those that deal with sensitive customer data or proprietary information. In FY2023–24, businesses reported over 87,400 cybercrime incidents, with a slight 7% decrease from the previous year, though the number remains concerningly high. The Australian Cyber Security Hotline received more than 36,700 calls, highlighting that businesses continue to grapple with increasing cyber threats.
The three primary types of cybercrimes reported by businesses were:
Email compromise (20%)
Online banking fraud (13%)
Business email compromise (BEC) fraud, which resulted in financial losses (13%)
The average self-reported cost of cybercrime to businesses showed a mixed picture. For small businesses, the average loss increased by 8%, reaching $49,600, while medium-sized businesses saw a significant 35% decline, down to $62,800, and large businesses experienced an 11% decrease, to $63,600. Despite this overall decrease, BEC remains one of the most financially damaging threats, with Australian businesses reporting losses of nearly $84 million due to these scams.
BEC continues to have a impact, with an average loss of more than $55,000 per confirmed incident. This type of fraud typically involves attackers impersonating trusted figures within an organization to trick employees into authorizing fraudulent transactions or providing sensitive information.
In terms of security incidents, ASD responded to over 1,100 incidents, with 11% of these attacks targeting critical infrastructure, reflecting the growing vulnerability of Australia’s essential services to cyber threats. Ransomware attacks, in particular, have increased by 3% from the previous year, further underscoring the need for businesses to adopt proactive measures to defend against cybercriminals.
Common cyber threats facing businesses today include:
Online banking fraud
Email compromise, including phishing attacks
Business email compromise (BEC) fraud
To mitigate these threats, businesses must implement comprehensive security measures and adopt best practices such as the ASD’s Essential Eight—a set of cybersecurity strategies designed to reduce the risk of cyberattacks. Additionally, organizations should train their employees to recognize phishing attempts and suspicious activity.
The Cyble ANZ Report on Cyber Threat Trends
Along with the 2023–2024 Annual Cyber Threat Report, Cyble recently shared its ANZ Cyber Threat Landscape Report 2024 offering a critical supplement to the annual report, providing additional insights into the threat environment faced by both individuals and businesses in Australia. Cyble’s report highlights the rapid rise of cybercrime-as-a-service (CaaS) platforms, which continue to democratize cybercrime, allowing even less technically skilled individuals to launch devastating attacks. These platforms sell malware, ransomware, and exploits, lowering the entry barriers for criminals and increasing the frequency and sophistication of attacks.
Key Threats Identified in the Cyble ANZ Report
Ransomware: Cyble’s research highlights the growing risk of ransomware attacks across various sectors, with Australian businesses increasingly falling victim to this type of threat. Notably, Conti, LockBit, and Clop are some of the most active ransomware families identified in the region, and their impact continues to grow. These groups have increasingly used tactics such as data exfiltration, threatening to release sensitive data unless a ransom is paid.
Supply Chain Attacks: The report notes an increase in attacks targeting third-party suppliers, leveraging their vulnerabilities to gain access to larger organizations. Attackers often infiltrate smaller organizations with weaker cybersecurity measures, using them as steppingstones to gain access to larger, more lucrative targets. This type of attack is particularly concerning as businesses often rely on third-party suppliers for critical services and infrastructure, making them vulnerable to cascading effects.
Phishing and Business Email Compromise (BEC): Cyble’s analysis of social engineering tactics reveals a rise in phishing attacks, which remain one of the most commonly used methods for infiltrating organizations. BEC campaigns are also on the rise, where attackers impersonate trusted business partners or executives to deceive employees into transferring funds or sharing sensitive information.
Dark Web Activity: The Cyble report emphasizes the growing role of the dark web in facilitating cybercrime. The increasing volume of stolen credentials, malicious tools, and data leaks sold on dark web marketplaces presents a serious risk to both individuals and businesses.
A key focus of both the 2023–2024 Annual Cyber Threat Report and the Cyble ANZ Report is the growing risks to Australia’s critical infrastructure. Cybercriminals, as well as state-sponsored threat actors, continue to target sectors vital to the nation’s security and economic stability, including energy, water, transportation, and telecommunications. These sectors are particularly attractive to cyber adversaries due to the potential for widespread disruption and financial and operational impact.
Conclusion
To effectively mitigate the growing cyber risks highlighted in the 2023–2024 Annual Cyber Threat Report and the Cyble ANZ Cyber Threat Landscape Report 2024, both individuals and businesses must stay alert and adopt proactive security measures. For individuals, practices like multi-factor authentication, strong passphrases, and regular software updates are essential for reducing the likelihood of cybercrime. Businesses should follow the ASD’s Essential Eight guidelines, implement vulnerability management, and maintain strong partnerships with cybersecurity agencies.
The Computer Emergency Response Team of India (CERT-In) has issued an urgent vulnerability note (CIVN-2024-0349) regarding multiple security flaws in Android. These vulnerabilities, identified as “High” in severity, affect Android versions 12, 12L, 13, 14, and 15, potentially putting millions of devices worldwide at risk.
This advisory serves as a wake-up call for OEMs (Original Equipment Manufacturers), Android users, and cybersecurity professionals. If exploited, the vulnerabilities could lead to unauthorized data access, privilege escalation, arbitrary code execution, and system crashes.
Overview of the Threats
Android is the world’s most widely used mobile operating system. It powers billions of devices globally, including smartphones, tablets, smartwatches, and IoT devices. Its open-source nature and vast ecosystem make it a prime target for attackers.
CERT-In has highlighted that multiple vulnerabilities have been detected in various critical components of Android, including:
The exploitation of these vulnerabilities could allow threat actors to:
Extract sensitive information such as user credentials and private data.
Gain elevated privileges, enabling unauthorized control over the device.
Execute arbitrary code, leading to malware installation or unauthorized actions.
Cause Denial of Service (DoS), rendering the device unstable or inoperable.
Implications for Users and OEMs
Risk Assessment
The vulnerabilities have been classified as High Risk, indicating significant potential for widespread damage:
Unauthorized Access: Attackers could exploit the flaws to infiltrate devices and access sensitive user data.
System Instability: Successful exploitation might cause devices to crash or malfunction, disrupting regular operations.
Impact Assessment
Data Breaches: Private user data could be exposed or stolen, posing privacy and financial risks.
System Downtime: Affected devices could experience crashes, slowing down productivity and service availability.
This situation demands immediate attention from OEMs, who must release timely patches, and from users, who must ensure their devices remain updated.
The Scope of the Vulnerabilities
The CERT-In advisory lists over 40 vulnerabilities tracked under the Common Vulnerabilities and Exposures (CVE) system. A few of the critical CVEs include:
CVE-2023-35659
CVE-2024-20104
CVE-2024-21455
CVE-2024-38402
CVE-2024-43093
Each CVE points to a specific flaw in Android’s components. For instance, vulnerabilities in Qualcomm and MediaTek chipsets could allow remote attackers to bypass critical security controls. Kernel vulnerabilities could enable privilege escalation, granting attackers complete control over the device.
Recommended Actions
For Users
Update Your Device: Check for system updates regularly and apply them as soon as they become available. OEMs release patches to mitigate these vulnerabilities.
Download Apps Only from Trusted Sources: Avoid third-party app stores and download apps exclusively from Google Play.
Enable Security Features: Utilize features like biometric authentication, two-factor authentication (2FA), and device encryption.
Avoid Clicking Suspicious Links: Phishing attacks often exploit such vulnerabilities to compromise devices.
For OEMs and Enterprises
Prioritize Patch Management: Ensure timely delivery of security patches to devices running vulnerable Android versions.
Conduct Risk Assessments: Evaluate the potential impact of these vulnerabilities on your devices and systems.
Collaborate with Google: Work closely with Google to address vulnerabilities and maintain the integrity of Google Play system updates.
Communicate with Users: Inform customers about the risks and provide clear instructions on applying updates.
Technical Analysis: Why These Flaws Matter
The vulnerabilities stem from diverse sources, including outdated software components, misconfigurations, and unpatched exploits. Here’s a breakdown:
Framework and System Flaws: These are at the core of Android and may enable attackers to access sensitive OS-level permissions.
Kernel and Kernel LTS Issues: Kernel vulnerabilities are particularly dangerous as they grant low-level access, making privilege escalation easier.
Chipset-Specific Weaknesses: Vulnerabilities in MediaTek and Qualcomm components highlight how third-party hardware can introduce risks into Android devices.
Google Play Updates: An attacker exploiting flaws in Google Play system updates can compromise the very mechanism meant to secure devices.
Attackers typically exploit these flaws via:
Remote Code Execution (RCE): Delivering malicious payloads through apps or websites.
Privilege Escalation: Gaining unauthorized control of devices.
Denial of Service (DoS): Overloading system resources to render the device inoperable.
Looking Ahead: The Role of Collaborative Efforts
The CERT-In advisory emphasizes the need for collaboration among stakeholders, including Google, OEMs, and the cybersecurity community. A comprehensive approach involving timely patching, user education, and proactive risk management is essential to mitigate these risks.
Key Takeaways
Android versions 12 through 15 are vulnerable to multiple high-severity security flaws.
The vulnerabilities could lead to data theft, privilege escalation, or denial of service.
Users must apply updates promptly and exercise caution while browsing or installing apps.
OEMs should expedite patch rollouts to ensure device security.
Even a single unpatched vulnerability can cascade into large-scale cyber incidents. Staying vigilant and acting swiftly is the only way to ensure Android devices remain safe from exploitation.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-11-26 15:06:362024-11-26 15:06:36CERT-In Alert: Multiple Vulnerabilities in Android Impacting Millions of Devices
The Cybersecurity and Infrastructure Security Agency (CISA) published seven detailed security advisories to address critical vulnerabilities in various Industrial Control Systems (ICS).
These advisories cover a range of products, from web-based control servers to automated management systems, and highlight security risks that could compromise the integrity and functionality of ICS used across various sectors.
The released advisories focus on several key products, with each alert providing specific technical details about the vulnerabilities, their risk ratings, and the corresponding mitigations. The advisories include:
ICSA-24-326-01 – Automated Logic WebCTRL Premium Server
ICSA-24-326-02 – OSCAT Basic Library
ICSA-24-326-03 and ICSA-24-326-04 – Schneider Electric Modicon M340, MC80, and Momentum Unity M1E
ICSA-24-326-05 – Schneider Electric EcoStruxure IT Gateway
ICSA-24-326-06 – Schneider Electric PowerLogic PM5300 Series
ICSA-24-326-07 – mySCADA myPRO Manager
Each security advisory provides critical information on vulnerabilities that could be exploited remotely or locally and highlights potential consequences such as unauthorized access, service disruptions, and the compromise of sensitive data.
Key Vulnerabilities and Mitigations
Automated Logic WebCTRL Server Vulnerabilities
The Automated Logic WebCTRL Premium Server has been found to contain two serious vulnerabilities: CVE-2024-8525 (unrestricted file upload) and CVE-2024-8526 (URL redirection). These vulnerabilities affect WebCTRL, Carrier i-Vu, and SiteScan Web servers, allowing unauthenticated users to upload potentially malicious files or redirect users to harmful sites. These issues could lead to remote code execution or data exposure. CISA recommends updating to the latest version of WebCTRL and using firewalls and VPNs to limit system exposure.
OSCAT Basic Library
The OSCAT Basic Library vulnerability (CVE-2024-6876) is related to an out-of-bounds read issue, which can be exploited by local attackers to read internal PLC data, possibly causing system crashes. The advisory emphasizes updating to OSCAT Basic Library version 3.3.5 to resolve this issue and ensuring proper validation of inputs in PLC programs to mitigate the risk of exploitation.
Schneider Electric Modicon M340, MC80, and Momentum Unity M1E
A series of vulnerabilities in Schneider Electric’s Modicon M340, MC80, and Momentum Unity M1E controllers (CVE-2024-8933 and others) expose the systems to various attacks. These include message integrity issues, authentication bypass, and improper memory buffer handling, which could lead to service disruptions, password hash exposure, or even a complete system compromise.
The advisories strongly recommend network segmentation, firewall application, and ensuring the activation of memory protection on M340 CPUs to prevent unauthorized access.
Schneider Electric EcoStruxure IT Gateway
The EcoStruxure IT Gateway is vulnerable to a missing authorization issue, which could allow unauthorized access to connected systems. This flaw, present in versions 1.21.0.6 through 1.23.0.4, is rated with a CVSS score of 10.0. CISA urges users to update to version 1.23.1.10 and to secure systems by isolating networks and implementing firewalls for access control.
Schneider Electric PowerLogic PM5300 Series
The PowerLogic PM5300 Series from Schneider Electric suffers from an uncontrolled resource consumption issue caused by IGMP packet overload. This vulnerability, found in versions prior to 2.4.0 for PM5320 and 2.6.6 for PM5341, can result in communication losses and device unresponsiveness.
To mitigate this, CISA recommends updating the devices or enabling IGMP snooping, configuring VLAN interfaces, and employing multicast filtering. Additionally, applying best practices such as isolating control systems behind firewalls and using secure remote access methods is essential.
mySCADA myPRO Manager
The myPRO Manager from mySCADA has been found to contain multiple vulnerabilities, including OS command injection, improper authentication, and path traversal. These flaws, present in versions before 1.3 of the Manager and 9.2.1 of the Runtime, are extremely critical, with CVSS scores as high as 10.0 for OS command injection.
Attackers exploiting these vulnerabilities could gain remote access, execute arbitrary commands, and disrupt system operations. Users are advised to update to the latest versions (1.3 and 9.2.1) and secure their systems by implementing network isolation and VPNs for remote access.
Recommendations and Mitigations
In addition to addressing specific vulnerabilities, CISA’s advisories emphasize a set of best practices to protect ICS from potential threats:
Firewalls and Virtual Private Networks (VPNs) are crucial for controlling access to ICS networks and limiting exposure to remote threats.
Isolating ICS networks from general IT networks is key to minimizing risks from external attacks.
Keeping systems up to date with the latest security patches is critical to defending against known vulnerabilities.
CISA encourages organizations to conduct impact assessments and apply appropriate cybersecurity strategies before patching systems.
Conclusion
As cyberattacks on industrial control systems continue to rise, CISA’s release of these ICS advisories highlights the critical need for proactive security measures.
To protect their assets and ensure operational continuity, organizations must stay informed about the latest security vulnerabilities, follow best practices, and promptly implement CISA’s recommended solutions.
With cyber threats‘ growing sophistication and interconnectivity, staying up to date on security advisories has never been more important for protecting critical infrastructure.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-11-26 11:07:002024-11-26 11:07:00CISA Releases Seven Critical ICS Advisories to Address Vulnerabilities in Industrial Control Systems
TI Lookup from ANY.RUN is a versatile tool for gathering up-to-date intelligence on the latest cyber threats. The best way to demonstrate its effectiveness is to hear from actual security professionals about how they use the service in their daily work.
This time, we asked Jane_0sint, an accomplished network traffic analyst and the first ANY.RUN ambassador, for her real-world cases of using TI Lookup. Lucky for us, she agreed to share her insights and sent us a few examples, which include finding intel on phishing kits like Mamba2FA and Tycoon2FA.
About Threat Intelligence Lookup
TI Lookup is a searchable hub for investigating malware and phishing attacks and collecting fresh cyber threat data. Powered by a massive public database of millions of samples analyzed in ANY.RUN’s Interactive Sandbox, it contains various Indicators of Compromise (IOCs), Indicators of Attack (IOAs), and Indicators of Behavior (IOBs), from threats’ network activity to system processes and beyond.
The service provides you with extensive search capabilities, allowing you to create custom requests that feature different data points to home in on specific threats. It offers:
Quick Results: Searches for events and indicators from the past six months take just 5 seconds on average
Unique Data: It contains over 40 types of threat data, including malicious IPs, URLs, command line contents, mutexes, and YARA rules
Large Database: TI Lookup is updated daily with thousands of public samples uploaded to ANY.RUN’s sandbox by a global community of over 500,000 security professionals
Black Friday 2024: Get x2 search requests for your TI Lookup plan
Mamba2FA is a phishing kit that has seen a significant rise over the past several months. To investigate this threat and gather more context, we can utilize a typical URL pattern commonly found in its campaigns. This pattern follows the structure {domain}/{m,n,o}/?{Base64 string}.
When translating this into an actual query for TI Lookup, we can use the following search string:
Asterisk (*): This wildcard character indicates any character string. It helps expand our search to include all domains used in Mamba2FA attacks, ensuring a comprehensive investigation
Question Mark (?): This is another wildcard character that indicates exactly one character or none at all. In our case, there are two question marks in the query. The first one is the wildcard that serves as a stand-in for the characters “m”, “n”, and “o” that are commonly used in Mamba2FA URLs. The second question mark is a part of the address. To escape it, we use the slash symbol
c3Y9: This is a Base64-encoded parameter found across Mamba2FA attacks. When decoded, it translates to sv=, which specifies the appearance of the phishing page
TI Lookup provides threat intel all sandbox sessions with the matching command line strings
Submitting this search query to TI Lookup allows us to access plenty of results that match our string, from command lines with URLs to sandbox sessions where these command lines were logged.
CyberChef recipe used for decoding the URL string
We then can collect the full URLs found and decode the base64-encoded parts to reveal more information on the attack and extract the list of domains from them.
Investigating the Tycoon2FA Phishing Kit
Tycoon2FA is another phishing kit, which is known for faking Microsoft authentication pages to steal victims’ credentials. With the help of TI Lookup, we can collect plenty of intel on its latest samples and wider infrastructure.
A good practice for constructing queries in TI Lookup is to link each condition of the query to specific features of the phishkit:
If the phishkit hides its pages behind Cloudflare Turnstile, we add a condition for this;
If there is content encryption, we add a condition for the encryption library;
If the phishing page stores content on a specific CDN (Content Delivery Network), we add a condition for that as well.
An example of this query construction method for searching Tycoon2FA phishkit attacks can be seen below.
As noted, one of the signature features of this threat is the abuse of Cloudflare’s Turnstile challenges as a barrier for automated security solutions. For the challenge to work, Tycoon2FA loads the library api.js.
During the challenge, Tycoon2FA also loads another library, crypto-js.min.js, which it uses at later stages of the attack to encrypt its communication with the command-and-control center (C2).
The phish kit also accesses elements stored on the legitimate domain ok4static[.]oktacdn[.]com and utilizes them to build phishing pages designed to imitate Microsoft’s login pages.
The two libraries and the domain make solid pieces of intel to pivot on using TI Lookup to find instances of Tycoon2FA attacks.
TI Lookup pulls relevant threat data from sandbox sessions where both libraries were detected
In response to the query, the service provides a list of matching events found in 20 decrypted sandbox sessions over the past 180 days. Search queries created on this principle based on domains bring more results because they work not only on decrypted network sessions but also require a larger number of conditions in the query. We can collect the information and take a closer look at the sessions to observe attacks as they unfolded in real time.
Tracking APT-C-36 Phishing Campaigns
Threat Intelligence Lookup can be helpful in your investigations into campaigns that are attributed to advanced persistent threats (APTs).
Consider the example of Blind Eagle, also known as APT-C-36, which is a group that targets Latin America. You can learn more about their activity in ANY.RUN’s article on the threats discovered in October 2024.
Knowing that APT-C-36 uses phishing emails with attachments that contain malware, such as AsyncRAT and Remcos, and attempts to reach targets in LATAM countries like Colombia, we can put together a TI Lookup query to find more relevant samples related to their attacks:
The service provides 100 sandbox sessions that match our request along with events from those sessions.
One of the phishing emails containing an AsyncRAT payload discovered via TI Lookup
Among them, we can find samples of actual phishing emails belonging to Blind Eagle’s campaigns which were publicly uploaded to ANY.RUN’s sandbox for analysis by users in Colombia.
Another useful way to utilize TI Lookup is to proactively research phishing attacks that use legitimate resources to access content as legitimate account login pages do. For example, attackers often use parts of the Azure Content Delivery Network (CDN), like backgrounds or login forms.
To find these examples with TI Lookup, you can specify the Azure domain. However, it’s important to filter out non-malicious instances. You can do this by excluding Microsoft’s domains from the query using the NOT operator and setting the threat level to “suspicious.” You are free to add exceptions at your discretion if you wish to cleanse your query results of unsolicited submissions.
We can also include parameters with empty values. This signals the system to show all possible results for those parameters.
Adding domainName:”” and suricataMessage:”” will display all domains and Suricata messages found across sandbox sessions that match our query.
In response to our query, TI Lookup provides extensive threat data, including the Suricata rules that were triggered during analysis.
Suricata rules that match our query
We can also observe all the domains in sessions involving phishing attacks. We can collect them and examine each of them separately to check if they are used as part of attackers’ infrastructure.
Apart from domains, TI Lookup also presents IP addresses and URLs
We also get a list of sandbox sessions that feature examples of actual phishing attacks abusing Microsoft’s infrastructure.
Sandbox sessions that match our request
Let’s explore one of them in greater detail.
Suricata rule displayed in the ANY.RUN sandbox
In this session we can see a Suricata rule that indicates a request to Azure’s content delivery network.
You can build upon this search by adding a commandLine parameter. Specifically, we can tell the service to look for command lines that include URLs with the # anchor, which attackers use to add a victim’s email address.
Learn to Track Emerging Cyber Threats
Check out expert guide to collecting intelligence on emerging threats with TI Lookup
Read full guide
To find results with URLs containing email addresses, include the @ symbol in your query. Use the * wildcard to account for any characters between the anchor and the @ symbol.
Command line data from logged during ANY.RUN sandbox sessions
Apart from relevant sandbox sessions, the service returns a list of command lines extracted from these, allowing us to see the URLs used by attackers that include emails of victims.
About ANY.RUN
ANY.RUN’s Threat Intelligence Lookup and YARA Search services allow for precise threat hunting and the extraction of valuable insights into current cyber threat trends. What’s impressive is how fast these scans are—they significantly speed up the analysis process, allowing for quick detection of threats and malware.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-11-26 10:07:212024-11-26 10:07:21Investigating Phishing Threats with TI Lookup: Use Cases from an Expert
Among the vulnerabilities highlighted by Microsoft on the latest patch Tuesday on November 12 was CVE-2024-49040 in Exchange. Its exploitation allows an attacker to create emails that are displayed in the victim’s interface with a completely legitimate sender address. It would seem that the vulnerability was fixed, but, as it turned out, on November 14, Microsoft temporarily suspended distribution of the updates for Exchange Server. In the meantime, we’ve already observed attempts to exploit this vulnerability. So far the cases have been isolated: it looks like someone is testing the proof of concept. That’s why we at Kaspersky’s Content Filtering Methods Research Department have added to all our email security solutions a method for detection of attempts to use CVE-2024-49040 for spoofing.
What’s the problem with the CVE-2024-49040 vulnerability?
CVE-2024-49040 is a vulnerability with a CVSS rating of 7.5 that’s relevant for Exchange Server 2019 and Exchange Server 2016 and classified as “important”. Its essence lies in an incorrectly formulated P2 FROM header processing policy. An attacker can use it to have this header contain two email addresses: the real one – which is hidden from the victim, and the legitimate one – which is shown to the victim. As a result, Microsoft Exchange correctly checks the sender’s address, but shows the recipient a completely different one that doesn’t look suspicious to the user (for example, an internal address of an employee of the same company).
With the November 12 patch, Microsoft added a new feature that detects P2 FROM headers that don’t comply with the RFC 5322 internet message format standard, and that should have fixed the situation. However, according to a post on the Microsoft blog, some users began to have problems with the Transport rules, which sometimes stopped working after installing the update. Therefore, distribution of the update was suspended and will be resumed after it’s re-released.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-11-26 10:07:212024-11-26 10:07:21Spoofing via CVE-2024-49040 | Kaspersky official blog
Cyble Research and Intelligence Labs (CRIL) has identified a malicious campaign likely targeting business professionals across the United States.
The campaign employs a malicious LNK file, masquerading as a PDF with encoded data. This file is decoded by leveraging certutil.exe, which then delivers the next-stage payload: an HTA file.
The HTML Application (HTA) file contains VBScript that extracts and executes a lure document and a malicious DLL file, both embedded within the HTA file.
The DLL file acts as a Loader, decrypting the subsequent payload and shellcode, which are responsible for executing the Ursnif core component.
The Threat Actor (TA) behind this campaign uses a multi-stage operation that executes entirely in memory, effectively evading detection by security products.
The final payload file (DLL) is identified as Ursnif malware, capable of establishing a connection with the C&C server and downloading additional modules to steal sensitive information from the victim’s machine.
Overview
CRIL recently identified an active malicious campaign utilizing a malicious LNK file as the initial infection vector, delivered within a ZIP archive, potentially through spam emails. This LNK file is cleverly disguised as a PDF, tricking users into thinking they are opening a legitimate document.
Based on the lure document observed in this campaign, CRIL has concluded that the campaign is likely targeting business professionals across the United States.
When executed, the LNK file runs a command via cmd.exe to invoke the legitimate certutil.exe tool on the compromised system. This process decodes and prepares the next-stage payload embedded within the LNK file. The decoded payload is identified as a malicious HTML Application (HTA) file, which is executed using the legitimate mshta.exe utility. Upon execution, the HTA file opens a PDF lure document to trick the victim and simultaneously drops a malicious DLL file embedded within its content. The DLL is then executed using regsvr32.exe.
The DLL functions as a loader, decrypting both the shellcode and another encrypted DLL file from its resource section, and then executing the shellcode. Once the shellcode is executed, it loads the decrypted DLL, which subsequently loads another embedded malicious DLL identified as Ursnif—a notorious banking trojan. Ursnif then establishes a connection to its Command and Control (C&C) server and retrieves additional payloads designed to steal sensitive information from the victim’s machine. The below image shows the infection chain of this campaign.
Figure 1 – Infection chain
Technical Analysis
The ZIP archive contains an LNK file disguised as a PDF. Once extracted, the file appears as “staplesds02_23.pdf,” but it is actually an LNK file with a dual extension (.pdf.lnk) crafted to mislead users into believing it is a legitimate PDF document. When the user opens the disguised LNK file, it triggers cmd.exe and leverages certutil.exe to decode and execute malicious content embedded within the file. The following image shows the command line configured within the malicious LNK file.
Figure 2 – command line to decode an embedded content
Certutil is a Windows command-line utility primarily used for managing certificates. However, it is frequently abused by TAs to decode files encoded in Base64 format. In this case, the malicious LNK file contains Base64-encoded data, enclosed within the “—–BEGIN CERTIFICATE—–” and “—–END CERTIFICATE—–” tags, as shown in the figure below.
Figure 3 – Partial content of LNK file
The decoded content results in an .hta file (HTML Application), which is saved in the system’s temporary directory (C:UsersuserprofileAppDataLocalTemp) and executed using mshta.exe. The image below shows the content of the dropped HTA file.
Figure 4 – Partial content of HTA file
The initial section of the HTA file contains a VBScript designed to retrieve data from a remote server at hxxps://docusign-staples[.]com/api/key via an HTTP GET request. Once a response is received, the script verifies that the HTTP status code is 200 (OK) and that no errors occurred before executing further actions. If an error occurs or the status code is not 200, the script terminates its execution.
Upon receiving the response from the remote server, the VBScript decodes the response body into a readable string. It then extracts the first five characters from the decoded data and compares them to the hardcoded string “QG099.” If the strings do not match, the script terminates execution; otherwise, it continues with further actions.
When the first five characters of the decoded response body match the hardcoded string, the VBScript extracts a portion of the file’s content, starting at byte offset 7956 (1F14h) with a length of 138617 bytes. The image below displays a portion of the extracted content at this offset.
Figure 5 – Embedded PDF file
The extracted content, identified as a PDF, is saved in the temporary folder as staplesds.pdf. The script then opens this PDF, presenting it as a lure document to the victims. The figure below shows the lure document.
Figure 6 – Lure document
The Figure below shows another lure document observed in this campaign.
Figure 7 – Lure document 2
Then, the VBScript disables Windows Defender protection by adding the C: drive to the exclusion list through PowerShell commands.
Add-MpPreference -ExclusionPath “C:” ; timeout 15
After adding the exclusion path, the VBScript extracts another large chunk of data from the file, starting immediately after the PDF content, and retrieves a block of 1,416,704 bytes. As shown below, this extracted data corresponds to a PE (Portable Executable) file.
Figure 8 -Embedded PF file content
The retrieved PE file is then saved as a DLL file named “x.dll” in the temporary location. Additionally, the script pads the newly created DLL file with empty spaces by writing 35 blocks, each containing 10 million space characters.
Finally, the HTA script sets the current working directory to the user’s Desktop and executes a command to use regsvr32, registering the newly created DLL file as a system component.
Loader DLL
Upon execution, the DLL calls the ntdll.LdrFindResource API to access a resource named “FAMILY.” This resource contains two encrypted pieces of content, which are stored within the executable, as shown below.
Figure 9 – Encrypted Resource Contents
The DLL reads the encrypted contents and decrypts them using a hardcoded key present in the file. The following figure shows the code snippet responsible for decrypting the encoded data.”
Figure 10 – Decryption Loop
The first encrypted content is a shellcode that, when decrypted, is responsible for mapping another PE (Portable Executable) file into memory, as illustrated below.
Figure 11 – Decrypted Shellcode
The second encrypted content is a PE DLL file, which acts as another loader for executing the core module of the Ursnif component. This core component is responsible for establishing a connection to the C&C server and downloading additional Ursnif modules to steal sensitive information from the victim’s machine. The figure below shows the decrypted file, with control being transferred to the shellcode after decryption.
Figure 12 – Decrypted DLL and the control transfer to Shellcode
Shellcode Execution
Next, the shellcode copies the hardcoded API strings that are necessary for dynamically resolving the required APIs.
Figure 13 – Hardcoded API Names
The shellcode then passes the hardcoded checksum “0xBDBF9C13” of the “LdrLoadDll” to a custom function. This function scans the loaded DLLs in memory that have export functions. If an export function is found, it calculates the checksum based on the DLL name, then iterates through the APIs associated with that DLL, calculating the checksum for each API.
It adds the checksum of each API name to the DLL name checksum and compares the result with the hardcoded checksum. If there is a match, the shellcode identifies the corresponding address to dynamically resolve the “LdrLoadDll” function. Similarly, it resolves the “LdrGetProcedureAddressEx” API by passing the checksum “0x5ED941B5.”
Figure 14 : Passing Hardcoded Checksum to Resolve APIs
After resolving, it uses LdrLoadDll and LdrGetProcedureAddressEx to resolve the following APIs:
VirtualAlloc
VirtualProtect
FlushInstructionCache
GetNativeSystemInfo
RtlAddFunctionTable
LoadLibraryA
The shellcode then uses the VirtualAlloc API to allocate a new memory region. Afterward, it copies the decrypted DLL (previously extracted from the resource section) into this newly allocated memory, excluding the DOS header. To ensure the DLL can be executed properly, the shellcode modifies the memory protection of the allocated space using the VirtualProtect API, as shown below.
Figure 15 – Calling VirtualProtect API
Finally, the shellcode calls the RtlAddFunctionTable API to add a dynamic function table to the list of function tables in memory. Afterward, it uses the FlushInstructionCache API to ensure that the changes made to the memory are permanently written and reflected in the processor’s cache. Once the necessary memory modifications are made, it proceeds to execute the loaded DLL by invoking the DllRegisterServer function, which typically registers the DLL with the system and allows its functions to be used for further malicious activities.
Second Stage DLL
The second-stage DLL contains another embedded DLL, which is the core component of the Ursnif malware. This DLL holds encrypted configuration data, including crucial information such as the C&C server address, user agent, bot-details, and more. Upon execution, the second-stage DLL loads the embedded DLL found in the .data section, maps it into memory, and modifies its protection using the VirtualProtect API. It then transfers control to the entry point of the DLL, as illustrated below.
Figure 16 – Transferring Control to the Core Component.
The final DLL file now reads the encrypted configuration details stored in the .bss section, passes it through a decryption loop, and retrieves the C&C server details from the decrypted configuration, as shown below.
Figure 17 – C&C Server Details
The decrypted configuration file also contains additional information, such as the user agent details and the structure used for communication with the C&C server, as shown below.
Figure 18 – Decrypted configuration File
After decrypting the configuration file, the malware calculates a checksum based on the creation time of pagefile.sys or hiberfil.sys present on the system. It then generates a checksum of the victim’s username. To ensure that only one instance of the malware is running at any given time, it creates a mutex named “GlobalDbEls,” as shown below.
Figure 19 – Mutex Creation
After creating the mutex, the malware uses GetCurrentThreadId, OpenThread, and QueueUserAPC APIs to launch a new thread. This new thread is responsible for handling communication with the C&C server.
Figure 20 – Launching New thread
C&C Communication
The malware constructs a specific format for its C&C communication, which is shown in the figure below. This structure is designed to facilitate the exchange of data between the infected machine and the C&C server.
Figure 21 – Creating Structure for its C&C Communication
Filed
Description
version
Bot Version
user
Checksum calculated previously based on the victim’s username
group
Bot ID
System
Checksum created based on the creation time of pagefile.sys or hiberfil.sys
file
Checksum of the filename
arc
File architecture
crc
File checksum
size
File size
The malware then prepends a random string “emst=urxll&” to the created format, as shown below.
The malware then utilizes the following APIs to encrypt the format it generated for its C&C communication, using AES encryption:
CryptAcquireContextW
CryptImportKey
CryptsetKeyParam
GenRandom
CryptReleaseContext
CryptEncrypt
After encryption, the malware invokes the CryptStringToBinaryA API to convert the encrypted content into a BASE64-encoded format, as shown below.
Figure 22 – Encrypted content for C&C communication
Finally, the malware generates a boundary and uses the following boundary and User-Agent string to communicate with its C&C server at “budalixt.top/index.html.” In this instance, the malware utilizes an outdated User-Agent for its communication, as shown below.
Figure 23 – C&C communication
In the next stage, the malware receives a response from the C&C server, which is intended to download and execute additional malware to carry out malicious activities. Unfortunately, we were unable to retrieve any response from the C&C server as it was down, preventing us from fully analyzing the next stage of the attack.
Conclusion
The Ursnif malware campaign exemplifies the growing sophistication in cyber threats. By utilizing advanced techniques such as dynamic API resolution, encrypted payloads, and memory manipulation, Ursnif successfully evades detection and establishes secure communication with its C&C server. Each stage of the malware’s execution, from initial resource loading to the final encrypted C&C communication, is designed to ensure persistence, data exfiltration, and the ability to adapt to changing environments.
Yara rule to detect the latest ursnif loader, available for download from the Github repository.
Recommendations
This campaign reaches users via potential phishing campaigns, so exercise extreme caution when handling email attachments and external links. Always verify the legitimacy of the sender and links before opening them.
Implement advanced email filtering solutions to detect and block malicious attachments and links.
Use EDR solutions to detect the execution of regsvr32 in unusual contexts or locations, especially when the DLL is from non-standard directories (e.g., AppData or Temp).
Limit the execution of scripting tools to necessary users only and enforce least privilege policies to prevent malware from escalating privileges and performing malicious actions.
The campaign abused the legitimate certutil and mshta utility; hence, it is advised to monitor the activities conducted by these tools and restrict access to limited users.
Implement behavior-based detection systems that can identify malicious actions, such as frequent attempts to contact C&C servers or unexpected encrypted data being transmitted.
The United States has reaffirmed its commitment to nurturing a prosperous, secure, and sovereign Southeast Asia, anchored by the principles of self-determination, free trade, and mutual respect. Guided by ASEAN centrality, the U.S. Department of Defense revealed a comprehensive vision aimed at enhancing regional cooperation and supporting defense capacities in the face of evolving global challenges.
This strategic initiative emphasizes the United States’ long-standing partnership with Southeast Asia, promoting stability, sovereignty, and prosperity across the Indo-Pacific.
The vision statement comes at a critical time, reflecting the U.S.’s strategic alignment with ASEAN’s principles outlined in its Outlook on the Indo-Pacific. With the 15th anniversary of the ASEAN Defense Ministers’ Meeting-Plus (ADMM-Plus) approaching in 2025, the United States seeks to further deepen its ties with ASEAN member states by building capabilities in domain awareness, cyber defense, maritime security, and defense industrial capacity.
Here’s a detailed look at the U.S. Department of Defense’s key lines of effort and its broader implications for the Southeast Asian region:
Strengthening Regional Security and Sovereignty
At the heart of the U.S. vision is the goal of empowering ASEAN nations to safeguard their sovereignty against external coercion and illegal intrusions. By supporting enhanced domain awareness and defense capabilities, the U.S. aims to enable Southeast Asian countries to detect, respond to, and deter threats across air, maritime, cyber, and information domains.
Key efforts include:
Air Domain Awareness: Improving capabilities to monitor airspace, Exclusive Economic Zones (EEZs), and Air Defense Identification Zones, ensuring sovereignty and compliance with international agreements.
Cyber Defense: Enhancing collaboration with ASEAN’s Cybersecurity and Information Centre of Excellence (ACICE) through tabletop exercises, capacity-building programs, and professional training to address regional cyber threats.
Maritime Security: Strengthening maritime operational capabilities by leveraging AI-driven technologies and unmanned systems to enhance continuous presence and regional cooperation under international law.
These initiatives align closely with ASEAN’s Outlook on the Indo-Pacific, reinforcing a rules-based order and advancing collective resilience against emerging security threats.
Strengthening Historical Ties with ASEAN
The U.S. has had a longstanding relationship with ASEAN, dating back to the inaugural ASEAN Defense Ministers’ Meeting-Plus (ADMM-Plus) in 2010. Former U.S. Defense Secretary Robert Gates’ attendance at the meeting symbolized Washington’s commitment to engaging with ASEAN nations on defense and security. Since then, every U.S. Secretary of Defense has supported the forum, emphasizing its importance in addressing shared security challenges.
As the ADMM-Plus approaches its 15th anniversary in 2025, the U.S. aims to solidify these ties further. The alignment between the U.S. Indo-Pacific Strategy and ASEAN’s own Outlook on the Indo-Pacific reinforces mutual objectives, such as promoting transparency, good governance, and adherence to international law. These shared principles serve as the foundation for the U.S.’s renewed defense cooperation strategy.
Key Investments in Regional Security
The U.S. has made significant investments in strengthening the defense capabilities of Southeast Asian nations. Key milestones include:
$17 Billion in Military Sales: Since 2005, the U.S. has delivered advanced military equipment to ASEAN member states, addressing their security needs with cutting-edge capabilities.
40 Annual Military Exercises: The U.S. conducts a range of bilateral and multilateral exercises with regional partners, involving over 30,000 personnel to enhance readiness and interoperability.
Training for Over 76,000 Defense Personnel: U.S.-sponsored professional military education programs have cultivated deep people-to-people ties and elevated the expertise of ASEAN defense officials.
$475 Million for Maritime Security: Through the Maritime Security Initiative, the U.S. has bolstered maritime operational capabilities for seven ASEAN nations, ensuring a common operating picture in regional waters.
These efforts demonstrate a strong commitment to empowering Southeast Asia to address emerging challenges independently while fostering collaboration with the U.S. and other allies.
Strategic Lines of Effort
To advance regional security, the U.S. has outlined six primary focus areas:
1. Domain Awareness and Defense
The U.S. is working to enhance regional capacity in the air, maritime, and cyberspace domains. Specific initiatives include:
Airspace Surveillance: Upgrading capabilities to monitor sovereign airspace and Exclusive Economic Zones (EEZs).
Cybersecurity: Partnering with Singapore’s ADMM Cybersecurity and Information Centre of Excellence to address capacity gaps and train cybersecurity professionals.
Maritime Operations: Leveraging AI and unmanned systems to enhance maritime domain awareness and protect regional waters.
2. Joint Exercises
The U.S. will expand its annual exercises, including Balikatan, Cobra Gold, And Super Garuda Shield, to improve partner readiness and interoperability. Plans are underway for a second ASEAN-U.S. maritime exercise in 2025, further cementing multilateral cooperation.
3. Education and Training
Programs like the Emerging Defense Leaders’ Program and longstanding International Military Education and Training (IMET) courses will continue to nurture the next generation of Southeast Asian defense professionals. The State Partnership Program also fosters enduring relationships between U.S. states and ASEAN nations.
4. Defense Industrial Capacity Building
The U.S. aims to support the region’s defense industrial growth through academic collaborations, science and technology demonstrations, and investment opportunities. These efforts seek to create a more integrated defense ecosystem, fostering resilience and innovation.
5. Institutional Capacity Building
Through initiatives like the ADMM-Plus Expert Working Groups (EWGs), the U.S. supports ASEAN’s institutional growth. Recent efforts include co-chairing the Military Medicine EWG alongside Indonesia, with a focus on Women, Peace, and Security principles.
6. Climate Resilience
The U.S. will collaborate with ASEAN nations to address the impacts of climate change on defense readiness. Workshops and technical demonstrations will provide member states with tools to enhance resilience and mitigate climate-related risks.
The Timor-Leste Factor
The U.S. supports ASEAN’s decision to admit Timor-Leste as its eleventh member and is committed to including the nation in its defense capacity-building initiatives. Assistance programs will focus on helping Timor-Leste meet accession milestones and integrate seamlessly into ASEAN’s security framework.
Challenges and Strategic Implications
The U.S.’s enhanced engagement in Southeast Asia comes against the backdrop of intensifying competition with China. By investing in defense capabilities, the U.S. seeks to counter coercive actions and illegal intrusions, particularly in contested maritime zones like the South China Sea. Additionally, the emphasis on cybersecurity reflects growing concerns over state-sponsored cyberattacks in the region.
However, the success of these initiatives hinges on ASEAN’s ability to maintain unity and speak with a collective voice on key issues. The U.S. vision aligns closely with ASEAN’s Outlook on the Indo-Pacific, but implementing these programs will require careful navigation of regional sensitivities and power dynamics.
Conclusion
The U.S. Department of Defense’s vision for Southeast Asia represents a strategic blend of historical ties, vigorous investments, and a forward-looking approach to regional security. By prioritizing sovereignty, transparency, and mutual respect, the U.S. aims to empower ASEAN nations to address shared challenges while fostering a stable and prosperous Indo-Pacific.
As the U.S. deepens its partnerships with ASEAN, its success will be measured not only in terms of defense capacity but also in its ability to uphold a rules-based international order that benefits the broader region.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png2024-11-25 13:07:282024-11-25 13:07:28ASEAN at the Forefront: U.S. Outlines New Defense Vision for Regional Stability