March 9, 2020 By David Bisson 3 min read

Last week in security news, security researchers investigated how ransomware actors are targeting victims’ cloud-based backups to maximize their profits. Speaking of ransomware, the security community learned of a new family attempting to encrypt the entire networks of U.S. cities and businesses. New attack attempts involving Cerberus and Domen also came to light.

Top Story of the Week: Cloud-Based Backups Targeted by Ransomware Actors

Bleeping Computer reached out to the operators of the DoppelPaymer and Maze ransomware families to learn how these threats target victims’ cloud backups. From this conversation, the computer self-help site learned that ransomware actors commonly use tools such as Mimikatz to dump credentials from the active directory as part of the infection chain. Malicious actors turned to this technique in the past in an attempt to gain access to organizations’ cloud backup software.

If they found properly configured software, the ransomware actors attempted to gain access to a victim’s credentials for the service using phishing attacks, keyloggers and/or other means. They then abused those credentials to authenticate themselves for the purpose of restoring a victim’s data onto their servers before deleting the backups and demanding that the victim pay up.

Source: iStock

Also in Security News

  • More Than a Billion Devices Open to Krøøk Vulnerability: ESET identified a vulnerability that could enable malicious actors to intercept and decrypt Wi-Fi traffic using WPA2 connections. The security flaw, dubbed Krøøk, affected more than a billion devices at the time of discovery, the security firm noted.
  • Expired Security Certificates Employed as Lure to Deliver Malware: Kaspersky Lab detected several attack attempts in which infected websites informed visitors that some kind of security certificate had expired and thus required an update. If they allowed the update to run, they unknowingly exposed themselves to Buerak, which then downloaded the Mokes backdoor.
  • Smoke Loader Distributed by Domen’s New Malvertising Campaign: In mid-February, Malwarebytes discovered a new malvertising campaign launched by the Domen social engineering toolkit. Using a VPN service as a lure, the campaign redirected its victims to Smoke Loader, a malicious downloader that installed numerous secondary payloads in some cases.
  • New RAT Capability Added by Cerberus Android Malware: Back in mid-January, security researchers at ThreatFabric came across a new variant of the Cerberus Android malware family. This version arrived with the ability to steal two-factor authentication (2FA) codes by abusing the Accessibility services on an infected device and the ability to intercept a user’s screen lock credentials via an overlay screen.
  • U.S. Cities, Businesses Caught in PwndLocker’s Crosshairs: Sources told Bleeping Computer that a new family of ransomware called PwndLocker began encrypting the entire networks of U.S. businesses and cities. In each of its successful attacks, the threat demanded high ransom payments ranging from $175,000 to $660,000.
  • OneNote Notebook Leveraged by Phishers to Prey Upon Users: Cofense discovered a phishing campaign in which malicious actors used a OneNote notebook hosted on OneDrive to phish for users’ account credentials. The threat actors behind this operation also leveraged the notebook to drop the Agent Tesla keylogger and other malware payloads.

Security Tip of the Week: Protect Your Organization’s Data Assets

Security professionals can help protect their organization’s data assets by using security controls to block and mask their sensitive information. These security measures should involve the implementation of encryption. Additionally, infosec personnel should use ongoing security awareness training to cultivate a strong security culture in the workplace.

More from

IBM identifies zero-day vulnerability in Zyxel NAS devices

12 min read - While investigating CVE-2023-27992, a vulnerability affecting Zyxel network-attached storage (NAS) devices, the IBM X-Force uncovered two new flaws, which when used together, allow for pre-authenticated remote code execution. Zyxel NAS devices are typically used by consumers as cloud storage devices for homes or small to medium-sized businesses. When used together, the flaws X-Force discovered allow a remote attacker to execute arbitrary code on the device with superuser permissions and without requiring any credentials. This results in complete control over the…

What cybersecurity pros can learn from first responders

4 min read - Though they may initially seem very different, there are some compelling similarities between cybersecurity professionals and traditional first responders like police and EMTs. After all, in a world where a cyberattack on critical infrastructure could cause untold damage and harm, cyber responders must be ready for anything. But are they actually prepared? Compared to the readiness of traditional first responders, how do cybersecurity professionals in incident response stand up? Let’s dig deeper into whether the same sense of urgency exists…

Unified endpoint management for purpose-based devices

4 min read - As purpose-built devices become increasingly common, the challenges associated with their unique management and security needs are becoming clear. What are purpose-built devices? Most fall under the category of rugged IoT devices typically used outside of an office environment and which often run on a different operating system than typical office devices. Examples include ruggedized tablets and smartphones, handheld scanners and kiosks. Many different industries are utilizing purpose-built devices, including travel and transportation, retail, warehouse and distribution, manufacturing (including automotive)…

Stealthy WailingCrab Malware misuses MQTT Messaging Protocol

14 min read - This article was made possible thanks to the hard work of writer Charlotte Hammond and contributions from Ole Villadsen and Kat Metrick. IBM X-Force researchers have been tracking developments to the WailingCrab malware family, in particular, those relating to its C2 communication mechanisms, which include misusing the Internet-of-Things (IoT) messaging protocol MQTT. WailingCrab, also known as WikiLoader, is a sophisticated, multi-component malware delivered almost exclusively by an initial access broker that X-Force tracks as Hive0133, which overlaps with TA544. WailingCrab…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today