Discover more from ESSGroup
Subscribe to get the latest posts sent to your email.
Threat Overview
A significant cyber threat has been identified and detailed in a report published by AlienVault. The report, titled “No Honor Among Thieves: Uncovering a Trojanized XWorm RAT Builder Propagated by Threat Actors and Disrupting Its Operations”, highlights the weaponization of a trojanized version of the XWorm RAT builder.
Threat Summary
The malware, targeted at novice cybersecurity enthusiasts, was propagated through popular platforms such as GitHub, Telegram, and file-sharing services. Over 18,459 devices worldwide have been compromised, with sensitive data like browser credentials, Discord tokens, and system information being exfiltrated.
Tactics Employed
To evade detection and maintain persistence, the malware employs advanced techniques:
Command-and-Control Infrastructure
The malware leverages Telegram as its command-and-control infrastructure, utilizing bot tokens and API calls.
Data Exfiltration
Over 1 GB of browser credentials has been exfiltrated from multiple devices,
Threat Actors Involved
Attribution efforts have linked the operation to a threat actor using aliases such as ‘@shinyenigma’ and ‘@milleniumrat’.
Disruption Efforts
Researchers discovered a ‘kill switch’ feature that was employed to disrupt active devices.
Recommendations
Based on this report, the following recommendations are provided:
Resources
Full report available at:
https://www.cloudsek.com/blog/no-honour-among-thieves-uncovering-a-trojanized-xworm-rat-builder-propagated-by-threat-actors-and-disrupting-its-operations
Subscribe to get the latest posts sent to your email.
Lorem Ipsum is simply dummy text of the printing and typesetting
industry. Lorem Ipsum has been the industry's
Threat Overview
AlienVault has recently published a threat report highlighting the activities of several Chrome extensions that have been compromised. The affected extensions are linked to multiple suspicious domains resolving to the same IP address as cyberhavenext[.]pro.
Compromised Extensions and Domains
Some confirmed compromised extensions include Cyberhaven, with their corresponding URLs listed below. Users are advised to search for these extensions in their environments and monitor for any traffic to the IP address 149.28.124[.]84.
Threat Actor’s TTPs
The threat actor behind this compromise has been linked to multiple suspicious domains, suggesting a widespread attack targeting browser extensions. This could potentially put users’ data and privacy at risk.
Recommendations for Improving Cybersecurity Posture
Based on the threat report, several recommendations can be made:
* Monitor activity from known malware samples, such as those associated with cyberhavenext[.]pro.
* Implement strict security controls around access to sensitive systems.
* Regularly update software packages to prevent exploitation by zero-day vulnerabilities
* Implement layered web and network security mechanisms to detect and prevent lateral movement.
Resources
The Record Article on Cyberhaven Hack
LinkedIn Post by Jaime Blasco
Threat Overview
A recent phishing campaign has been observed delivering Formbook stealers through email attachments, as reported by AlienVault on January 7th, 2025. This report provides an analysis of the attack and recommendations for mitigation.
The malware employs multiple stages and steganography to hide malicious files inside images. The infection chain involves three stages before the final payload: Purchase Order.exe, Arthur.dll, and Montero.dll.
Attack Details
The attack begins with a spear-phishing email containing a purchase order and a zip file attachment. Once executed, the malware uses various evasion techniques such as process hollowing, mutex creation, adding itself to exclusion paths, creating scheduled tasks for persistence, downloading additional payloads, or receiving commands from the threat actor’s C2 server.
The final payload is a highly obfuscated 32-bit MASM compiled binary.
Threat Actor Group
The short description of the actor group behind this campaign is not provided in the report.
Threat Level and Reliability
The confidence level for this threat is rated as 100, and the reliability of the report is verified. The revoke status is false.
Recommendations
Based on the threat report, several recommendations can be made:
* Educate users to Spot Phishing Emails: Train employees to recognize phishing emails and avoid opening suspicious attachments.
* Implement Email Filtering Solutions: Use advanced email filtering techniques to block malicious emails before they reach user inboxes.
* Keep Systems Updated: Regularly update software packages to protect against known vulnerabilities exploited by malware.
* Monitor for Suspicious Activity: Use threat intelligence platforms and security monitoring tools to detect anomalies and potential infections in your network.
Connected Elements\
There are 30 connected elements present in the report.
External References
Additional information about this campaign can be found at:
* Seqrite Blog: https://www.seqrite.com/blog/formbook-phishing-campaign-analysis/
Threat Overview
The Security Operations Center (SOC) has identified a new threat report published by CyberHunter_NL on April 15, 2025. This report highlights significant cyber threats that are currently lurking in search engine results. The confidence level of this report is 100%, and its reliability is rated as A – Completely reliable.
Threat Description
The report focuses on various traps set by malicious actors within search engine results. These traps often lead unsuspecting users to compromised websites, phishing pages, or download sites for malware. The primary goal of these threats is to exploit user trust in search engines and popular websites to steal sensitive information, install malicious software, or gain unauthorized access to systems.
Key Findings
The report includes 26 connected elements that provide detailed insights into the tactics, techniques, and procedures (TTPs) used by threat actors. Some of the key findings include:
Compromised Websites: Threat actors compromise legitimate websites to inject malicious scripts or redirect users to other malicious sites. These compromised websites often rank high in search results, increasing the likelihood of user interaction.
Social Engineering: Malicious actors use social engineering techniques to trick users into clicking on malicious links or downloading harmful files. They exploit human psychology and trust to bypass technical security measures.
Recommendations
To mitigate these threats, the SOC recommends the following actions:
Implement Strong Security Measures: Ensure that all systems have up-to-date antivirus software, firewalls, and intrusion detection/prevention systems (IDS/IPS). Regularly update these security measures to protect against the latest threats.
Use Reputable Search Engines: Encourage users to use reputable search engines that have robust security features and regularly scan for malicious content. Avoid using lesser-known or untrusted search engines.
Enable Browser Security Features: Utilize browser security features such as safe browsing modes, ad blockers, and script blockers to reduce the risk of encountering malicious content in search results.
Regular Audits and Monitoring: Conduct regular audits of search engine results for your organization’s domain names and keywords. Monitor for any suspicious activity or unauthorized changes that could indicate a compromise.
Incident Response Plan: Develop and maintain an incident response plan to quickly detect, respond to, and recover from cyber threats. Ensure that all stakeholders are aware of their roles and responsibilities in the event of a security incident.
Collaboration with Security Communities: Collaborate with other security organizations and communities to share threat intelligence and best practices. This collaboration can help identify emerging threats and develop effective mitigation strategies.
Conclusion
The threat report published by CyberHunter_NL provides valuable insights into the traps lurking in search engine results. By understanding these threats and implementing the recommended actions, organizations can significantly reduce their risk of falling victim to cyber attacks. The SOC will continue to monitor these threats and provide updates as necessary to ensure the security of our systems and data.
For additional information, please refer to the following external references:
Please check the following page for additional information:
https://www.welivesecurity.com/en/cybersecurity/watch-out-traps-lurking-search-results/?utm_source=twitter&utm_medium=organic&utm_campaign=wls&utm_term=search-results
Subscribe now to keep reading and get access to the full archive.