al3x@wannaCYbeR(security)~$ echo "Issue \x09"
Alessandra ?? Perotti
Malware Reverse Engineer + Cyber Threat Intel Analyst @ CVS Health | Threat Researcher | GREM | GCIH | GIAC Advisory Board
Greetings, fellow cyber people, and welcome to the ninth issue of wannaCYbeR, a weekly newsletter dedicated to those who are just starting in cybersecurity. It’s been a week packed with news so far, from phishing attacks to emergency updates, so let’s dive in!
The Patch Roundup
Armageddon Phishing Attacks
Phishing attacks going on around the Russian invasion of Ukraine are anything but over. After attempts from government-backed threat actors from China, Russia, and Belarus, the Ukrainian Computer Emergency Response Team discovered new phishing attempts made by the Russian group called Armageddon (“Gamaredon”), which is targeting both Ukrainian organizations and European government agencies with malware aimed at collecting intelligence. The group has been active since 2013 in targeting Ukrainian government officials.
Most of the techniques used by Gamaredon are aimed at cyber-espionage and file exfiltration and are accomplished by using Pteranodon, a custom backdoor that, according to researchers with Unit42 at Palo Alto Networks , is a fully-featured malware with capabilities that include:
Learn more on MITRE ATT&CK’s pages for Gamaredon and Pteranodon .
The Evolution of FIN7
In other threat intelligence news, Mandiant researchers let us know that the APT group called FIN7 has been updating its arsenal with new ransomware tools. FIN7 is a threat actor that has been active since 2013 and has been targeting mostly “the U.S. retail, restaurant, and hospitality sectors.” The group recently shifted its tactics to using ransomware such as REvil and also owns a “ransomware as a service” (RaaS) called Darkside.
According to Mandiant researchers, FIN7 has started using a new backdoor called Powerplant, as well as “new versions of the BIRDWATCH downloader being developed, which are tracked as CROWVIEW and FOWLGAZE.” On top of that, the group’s first access techniques have expanded to include “software supply chain compromise and the use of stolen credentials, in addition to their traditional phishing techniques.”
Hydra Down
The German authorities have taken down Hydra, allegedly one of the biggest online darknet markets. The authorities report that the Russian-speaking .onion website had “17 million customer accounts (many individual buyers may have had several accounts, of course) and more than 19,000 seller accounts at the time they shuttered it.”
According to Naked Security by Sophos, “they started following up on a tip in the middle of 2021 that suggested the servers were actually hosted in Germany.” This allowed the authorities to proceed and shut down the marketplace.
领英推荐
LAPSUS$: “Advanced Persistent Teenagers”
After the Okta, Microsoft, Nvidia, and Samsung breaches, investigative cybersecurity reporter Brian Krebs takes an in-depth look at the “old-fashioned” techniques used by LAPSUS$, as well as traces back the group's story to a Twitter hack that happened in 2020:
“The group of teenagers who hacked Twitter hailed from a community that traded in hacked social media accounts. This community places a special premium on accounts with short “OG” usernames, and some of its most successful and notorious members were known to use all of the methods Microsoft attributed to LAPSUS$ in the service of hijacking prized OG accounts.”
Meme of the Week: Mimikatz vs Windows Defender
Special of the Week #1: DFIR Diva Training Collection
In my hunt for content and training material, I stumbled upon the excellent DFIR Diva , an initiative founded by Elan Wright , Incident Response Analyst and Cybersecurity Expert.
DFIR Diva features a broad collection of free and affordable training , events, webinars, CTFs, and other information in the Digital Forensics and Incident Response spaces. Topics range from forensics to programming, to malware analysis, to OSINT. If you’re particularly interested in Incident Response, there is also a free Incident Response Training Plan that you can follow starting from beginner-level classes.
Last, but not least, you can find a “Get Your Start in DFIR Scholarship Fund ” that provides financial aid for people who want to get started in the field and need financial support.
Special of the Week #2: OSINT course by TCM Security
If you're interested in Open Source Intelligence, you can't miss this: The Cyber Mentor, aka Heath Adams from TCM Security , posted on YouTube the first half of TCM Security's OSINT course. It's packed with useful tools and information, including tips on geolocation, email harvesting, reverse image search, and even advice on how to create a sock puppet.
Watch it here or on The Cyber Mentor's YouTube channel.
That's all for this week. If you enjoyed the newsletter, please feel free to share it with your connections. Do you know of a great piece of content I should include? Don’t be shy, reach out!
P.S. In case you were wondering, I don't receive any compensation or sponsorship for the content I share. I do it just because I love to nerd out with other people on topics of common interest.