Discover more from ESSGroup
Subscribe to get the latest posts sent to your email.
Threat Overview
A recent phishing campaign has been observed delivering Formbook stealers through email attachments, as reported by AlienVault on January 7th, 2025. This report provides an analysis of the attack and recommendations for mitigation.
The malware employs multiple stages and steganography to hide malicious files inside images. The infection chain involves three stages before the final payload: Purchase Order.exe, Arthur.dll, and Montero.dll.
Attack Details
The attack begins with a spear-phishing email containing a purchase order and a zip file attachment. Once executed, the malware uses various evasion techniques such as process hollowing, mutex creation, adding itself to exclusion paths, creating scheduled tasks for persistence, downloading additional payloads, or receiving commands from the threat actor’s C2 server.
The final payload is a highly obfuscated 32-bit MASM compiled binary.
Threat Actor Group
The short description of the actor group behind this campaign is not provided in the report.
Threat Level and Reliability
The confidence level for this threat is rated as 100, and the reliability of the report is verified. The revoke status is false.
Recommendations
Based on the threat report, several recommendations can be made:
* Educate users to Spot Phishing Emails: Train employees to recognize phishing emails and avoid opening suspicious attachments.
* Implement Email Filtering Solutions: Use advanced email filtering techniques to block malicious emails before they reach user inboxes.
* Keep Systems Updated: Regularly update software packages to protect against known vulnerabilities exploited by malware.
* Monitor for Suspicious Activity: Use threat intelligence platforms and security monitoring tools to detect anomalies and potential infections in your network.
Connected Elements\
There are 30 connected elements present in the report.
External References
Additional information about this campaign can be found at:
* Seqrite Blog: https://www.seqrite.com/blog/formbook-phishing-campaign-analysis/
Subscribe to get the latest posts sent to your email.
Lorem Ipsum is simply dummy text of the printing and typesetting
industry. Lorem Ipsum has been the industry's
Threat Overview
A recent threat report published by AlienVault on April 22, 2025, highlights a series of attacks targeting poorly managed Microsoft SQL (MS-SQL) servers. These attacks involve the installation of Ammyy Admin, a remote control tool, which allows attackers to gain unauthorized access and control over affected systems. This report provides an in-depth analysis of the threat, the tactics, techniques, and procedures (TTPs) employed by the attackers, and recommendations for mitigating such threats.
Threat Details
The attacks identified in this report exploit vulnerabilities in MS-SQL servers that are not properly managed or secured. The primary objective of these attacks is to install Ammyy Admin, a legitimate remote administration tool that has been repurposed for malicious activities. Once installed, the attackers can execute commands to gather system information and use tools like WGet to download additional malware.
The malware components identified in this campaign include:
1. Ammyy Admin (mscorsvw.exe) – An old version (v3.10) of the remote control tool.
2. Settings file (settings3.bin) – Configuration settings for Ammyy Admin.
3. PetitPotato (p.ax) – A privilege escalation tool used to gain higher-level access on the compromised system.
The attackers utilize known exploitation methods to install these components and gain remote control over the affected servers. They also employ PetitPotato for privilege escalation, adding new users and activating Remote Desktop Protocol (RDP) services to maintain persistent access.
Attacker Group
While the report does not provide a detailed description of the actor group responsible for these attacks, it is evident that they possess advanced knowledge of MS-SQL vulnerabilities and remote administration tools. Their TTPs suggest a high level of sophistication and familiarity with exploiting poorly managed servers.
Impact and Consequences
The installation of Ammyy Admin on compromised MS-SQL servers can have severe consequences, including unauthorized access to sensitive data, data exfiltration, and further compromise of the network. The use of PetitPotato for privilege escalation allows attackers to gain administrative-level access, making it easier to move laterally within the network and deploy additional malware.
Mitigation Recommendations
To prevent such attacks, administrators are advised to implement the following security measures:
By following these recommendations, organizations can significantly reduce the risk of falling victim to such attacks and enhance their overall cybersecurity posture.
Conclusion
The threat report published by AlienVault underscores the importance of proactive security measures in protecting MS-SQL servers from malicious attacks. By understanding the TTPs employed by attackers and implementing robust security controls, organizations can effectively mitigate the risks associated with these threats and safeguard their critical assets.
For additional information on this threat, please refer to the following external references:
– https://asec.ahnlab.com/en/87606
– https://otx.alienvault.com/pulse/6807c69906b162a197133ee9
Please check the following page for additional information: https://asec.ahnlab.com/en/87606
Threat Report: XE Group Evolution
Introduction
The XE Group, a cybercriminal organization active since 2013, has evolved its tactics, techniques, and procedures (TTPs) significantly. Initially focused on web vulnerabilities and supply chain attacks, the group has shifted towards targeted information theft in manufacturing and distribution sectors
Threat Overview
Recent Activities: Their recent activities involve exfiltrating config files, network reconnaissance, and deploying a Remote Access Trojan using obfuscated PowerShell commands.
Implications
The evolution of XE Group highlights their adaptability and growing threat to supply chain security. Organizations in manufacturing and distribution sectors should be particularly vigilant.
Recommendations
Monitor Webshells: Regularly scan and monitor for webshells, especially those planted long ago that may be reactivated.
Strengthen Access Controls: Implement strong access controls to limit unauthorized access and maintain audit trails.
Network Segmentation: Segment networks to contain potential breaches and reduce the risk of lateral movement.
PowerShell Script Scanning: Employ tools to scan for obfuscated PowerShell commands used in malware delivery.
Threat Intelligence: Stay informed about emerging threats like XE Group through threat intelligence feeds.
References
Threat Overview
A recent threat report published by AlienVault provides insights into a malicious Linux rootkit malware that has been used to compromise CentOS systems.
The report, titled “Deep Dive Into a Linux Rootkit Malware”, highlights the potential dangers posed by this malware and its capabilities.
Malware Analysis
The analysis examines a Linux rootkit malware consisting of two components: a kernel module (sysinitd.ko) and a user-space binary (sysinitd). The kernel module hijacks inbound network traffic using Netfilter hooks, creates procfs entries for communication, and starts the user-space process. Meanwhile, the user-space component disguises itself as ‘bash’, enabling remote command execution with root privileges.
Initiation of Communication
Attackers initiate communication using a special ‘attack-init’ packet, allowing them to send encrypted commands to control the compromised system. The malware’s initialization process involves binding system calls and intercepting select network protocols.
Tactics Employed
The report sheds light on the tactics employed by attackers to deploy this malware:
* Remote compromise of systems to install malicious kernel modules.
* Disguising malware components to evade detection.
* Leveraging system privileges to execute arbitrary commands.
Recommendations
Based on the threat report, several recommendations can be made for enhancing cybersecurity measures:
1. Regular Patching and Updates: Ensure CentOS systems are up-to-date to protect against exploited vulnerabilities.
2. Network Intrusion Detection Systems (NIDS): Implementing NIDS can help detect unusual network activity and anomalies.
3. Endpoint Protection: Deploy robust endpoint protection solutions that can identify rootkit malware and prevent its installation.
4. Least Privilege Principle: Implement the principle of least privilege to minimize potential damage from compromised accounts.
5. Regular Backups: Maintain regular backups of critical data to facilitate swift recovery in case of an attack.
Resources
The full threat report can be accessed here:
https://www.fortinet.com/blog/threat-research/deep-dive-into-a-linux-rootkit-malware