Search

12 June 2020 | Asia Cyber Summary

In the spotlight this week:

  • Maze ransomware gang hit against Singapore-based defence contractor ST Engineering, leaking its findings on the Dark Web. Last week Maze and Netwalker gangs also released partial leaks of two Hong Kong business entities.


  • New Ransomware-as-a-Service (RaaS) Tool Thanos is for sale on Exploit Forum. Recorded Future found connections between Thanos and Hakbit Group.


  • Crowdstrike found Internet-as-a-service (IaaS) API key theft has opened a vast new arena for attacks. Cado Security also identified an on-going campaign to steal AWS accounts through phishing.


  • A1 Telekom, the largest internet service provider in Austria, has admitted to a security breach this week, following a whistleblower's exposé. It took A1 Telekom more than six months to kick the hackers off its network.




June 8, 2020 | Maze Ransomware Gang Hits Defense Contractor ST Engineering

The prolific Maze ransomware gang has been affiliated once again to more attacks, including against Singapore-based defense contractor ST Engineering. ST Engineering is a global aerospace, maritime, smart city, and defense contractor with about 23,000 employees worldwide. Upon discovering the incident, the company says it “took immediate action, including disconnecting certain systems from the network, retaining third-party forensic advisors to help investigate and notifying appropriate law enforcement authorities," according to VT San Antonio Aerospace. The company also has begun informing any potentially affected customers and is continuing to conduct an investigation into the incident.


Source: https://www.bankinfosecurity.com/maze-ransomware-gang-hits-defense-contractor-st-engineering-a-14399




Jun 9, 2020 | CrowdStrike Found Attackers are Targeting Cloud Service Providers

Internet-as-a-service (IaaS) API key theft has opened a vast new attack surface, giving adversaries easy access to critical controls and data assets when appropriate protection is not in place. As discussed in the latest CrowdStrike Services Cyber Front Lines Report, recent cases have involved static credentials that were not protected by multi-factor authentication (MFA), IP address-based restrictions, or automatic rotation. Previously, when threat actors harvested API keys from public source code repositories, it was often a crime of opportunity. Now, it has become targeted. CrowdStrike has responded to multiple cases in which attackers actively sought cloud IaaS API keys in client and third-party infrastructure. In virtually all cases, these long-lived API keys were an unnecessary liability as they could have been replaced with ephemeral credentials issued through the underlying cloud infrastructure.

Source: https://www.crowdstrike.com/blog/crowdstrike-observes-increase-in-iaas-api-key-theft/

and: https://www.cadosecurity.com/2020/06/11/an-ongoing-aws-phishing-campaign/




Jun 11, 2020 | Hackers breached A1 Telekom, Austria's largest ISP


A1 Telekom, the largest internet service provider in Austria, has admitted to a security breach this week, following a whistleblower's exposé. The company admitted to suffering a malware attack in November 2019. A1 acknowledged that its security team detected the malware a month later, but that removing the infection was more problematic than they initially anticipated needing more than six months to kick the hackers off their network. The whistleblower claimed the intruders were Chinese hackers. A1, did not disclose the nature of the malware, nor if the intruders were a financially focused cybercrime gang or a nation-state hacking group.

Source: https://www.zdnet.com/article/hackers-breached-a1-telekom-austrias-largest-isp/


Jun 10, 2020 | New RaaS Tool ‘Thanos’ Shows Connections to ‘Hakbit’


Insikt Group uncovered a new family of ransomware for sale on Exploit Forum called Thanos, developed by a threat actor with the alias “Nosophoros.” Nosophoros offered Thanos as a private ransomware builder with the ability to generate new Thanos ransomware clients based on 43 different configuration options. Recorded Future analyzed the Thanos ransomware builder to detect, understand, and exercise the breadth of functionality that the Thanos ransomware can support. The Thanos client is simple in its overall structure and functionality. It is written in C# and is straightforward to understand even with obfuscation, though it does incorporate some more advanced features such as the RIPlace technique.

Source: https://www.recordedfuture.com/thanos-ransomware-builder/


Jun 8, 2020 | The Group Behind LookBack Attacks Against U.S. Utilities Sector Returns with New Malware

In August 2019, Proofpoint researchers reported that LookBack malware was targeting the United States utilities sector between July and August 2019. The same researchers identified a new, additional malware family named FlowCloud that was also being delivered to U.S. utilities providers. Analysis found similarities between TA410 and TA429 (APT10) delivery tactics, specifically attachment macros that are common to both actors. TA410 campaigns detected in November 2019 included TA429 (APT10)-related infrastructure used in phishing attachment delivery macros. However, Proofpoint analysts believe that intentional reuse of well-publicized TA429 (APT10) techniques and infrastructure may be an attempt by threat actors to create a false flag.


Source: https://www.proofpoint.com/us/blog/threat-insight/ta410-group-behind-lookback-attacks-against-us-utilities-sector-returns-new



Subscribe Here to receive Blackpanda thought leadership, webinar invitations, and cyber intelligence direct to your inbox.

Copyright © 2020 Blackpanda.
All Rights Reserved.

HONG KONG

Room 37, Level 5, Core F

Cyberport 3, 100 Cyberport Rd

Hong Kong

+852 6975 1099

PHILIPPINES

Penthouse, World Plaza Bldg.

5th Ave., Bonifacio Global City

Taguig City 1634

+63 2 8250 6110

JAPAN

301, 2-7-18

Nishiazabu Minato-ku,

Tokyo 106-0031

+81 80 2077 9824

MALAYSIA

D1-U3A-6 Solaris Dutamas

Jalan Dutamas 1

50480 Kuala Lumpur

+60 3 6206 2582

SINGAPORE

3 Church Street, #25-01,

Singapore 049483

+65 6692 9110

  • LinkedIn
  • Facebook
  • Twitter