Get Help Now
CONTACT US

Get expert threat analysis weekly. Sign up to receive our Threat Briefing:

    RESOURCES  >   THREAT INTEL BRIEFINGS

    Date: 03/23/2023

    Microsoft OneNote Distributes Emotet Malware

    Overview

    Emotet malware is now being distributed via Microsoft OneNote email attachments. This is done in an effort to bypass macro security controls for other Microsoft applications, such as Excel or Word, to execute malware. These OneNote attachments may contain a fake notification stating that the document is protected, and clicking through the prompt will also execute malware.

    Potential Impact

    Emotet is a paid platform for other threat actors to launch campaigns. Emotet allows for threat actors to establish a foothold within a target environment and steal sensitive information. Second stages of the attack could involve ransomware deployment.

    Recommended Actions

    Block OneNote file extensions via email if there is no business need to send/receive them. Also, installing MS 365/MS Office group policy templates will allow for implementing OneNote policies named “Disable embedded files” and “Embedded Files Blocked Extensions.” Lastly, ensure endpoints are monitored 24/7/365 using an Endpoint Detection & Response platform.

    Sources

    https://thehackernews.com/2023/03/emotet-rises-again-evades-macro.html

    Decryptor for Conti Ransomware Released By Kaspersky

    Overview

    One of the more prolific ransomware threat actors in 2020 and 2021 was the Conti Ransomware group. Conti disbanded approximately a year ago after attacking more than 850 organizations. Kaspersky has released a decryptor that may prove helpful for victim organizations still possessing encrypted files.

    Potential Impact

    This may be good news for Conti victims. If your organization was a victim who didn’t pay for a decryptor, this release from Kaspersky may be helpful for data recovery.

    Recommended Actions

    Implement a comprehensive cybersecurity program to prevent ransomware. If your organization has been a victim of ransomware, and did not pay for a decryptor, it may be beneficial to keep encrypted files for some time after the assault in case a decryptor is released.

    Request Consultation

    For more information, fill out the form below and we will be in touch shortly

      Number of Employees - select one:
      Industry - select one:

      Federal Civilian Agency Compromised by Exploitation of 2019 Vulnerability

      Overview

      The Cybersecurity Infrastructure and Security Agency (CISA) published a report on March 15, 2023, describing a compromise of a Federal Civilian Executive Agency (FECB) whereby several threat actor groups exploited the same vulnerability in Progress Telerik  UI running on  Microsoft IIS. One interesting aspect of this report is that the agency did regularly scan for the vulnerability (CVE-2019-18935), although it “failed to detect the vulnerability due to the Telerik UI software being installed in a file path it does not typically scan.”

      Potential Impact

      While the report does not describe the impact on the agency, it offers a valuable lesson to vulnerability management program administrators. Vulnerability scanners generally search in standard installation directories, and any deviation from a standard install may result in a critical vulnerability being missed.

      Recommended Actions

      It is difficult to protect assets that you don’t know about. Ensure that a thorough hardware and software inventory is performed in conjunction with vulnerability management programs. Furthermore, ensure that software is updated through a regular patching cadence.

      Sources

      https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-074a

       CatB Ransomware Evasion Techniques Exposed

      Overview

      A new type of ransomware, called CatB (also known as CatB99 and Baxtoy), appeared in late 2022. It originated from the Pandora ransomware and is believed to be associated with the Chinese advanced persistent threat group Bronze Starlight due to similarities in code and tactics.

      One of CatB’s strengths is its capacity to avoid detection by security tools using a technique called DLL search order hijacking. This method involves the malware embedding itself in the search order that the Windows operating system employs when looking for DLLs. As a result, the system inadvertently runs the malware instead of a legitimate DLL without triggering any security alerts.

      Potential Impact

      Upon detonation of a system, CatB ransomware unleashes a suite of powerful tools, including multiple privilege escalation capabilities, data exfiltration, and encryption functions. Its potent information-stealing abilities are also noteworthy, as CatB can extract sensitive data from web browsers like Google Chrome, Microsoft Edge, and Mozilla Firefox.

      This ransomware can not only lock victims out of their systems and files but can also steal their personal data, putting their privacy and security at risk. The information that CatB can harvest from a user’s web browsing history can range from passwords and login credentials to credit card information and sensitive business data.

      Recommended Actions

      Organizations face a persistent threat from ransomware strains such as CatB. These attacks typically aim to encrypt all data and deploy ransom files. To counter this threat, organizations should implement a range of defense strategies. Routine backups are critical, as is the deployment of endpoint security tools such as endpoint detection and response (EDR). Additionally, users must be trained to identify and avoid potentially malicious social engineering attacks.

      Threat actors often target end-users rather than directly attacking infrastructure systems. By reducing the likelihood of users falling victim to these attacks, organizations can increase their resilience against ransomware threat groups. These measures form a vital part of any comprehensive cybersecurity strategy and can help safeguard an organization’s data, reputation, and financial well-being.

      Sources

      https://thehackernews.com/2023/03/researchers-shed-light-on-catb.html?&web_view=true

      For strategic clients, your vCISO will add this to your next Office Hours for further discussion. However, if you have an immediate need, concern, or question, please reach out to them directly.

      For non-strategic clients, please reach out to your Advisor for further discussion.

      For those not yet clients of GreyCastle Security, please click the “Contact Us” button below and we’ll be glad to provide assistance as well as answer any questions you might have.


      Let’s Discuss Your Cybersecurity Needs

      Contact Us  
      Privacy Settings
      We use cookies to enhance your experience while using our website. If you are using our Services via a browser you can restrict, block or remove cookies through your web browser settings. We also use content and scripts from third parties that may use tracking technologies. You can selectively provide your consent below to allow such third party embeds. For complete information about the cookies we use, data we collect and how we process them, please check our Privacy Policy
      Youtube
      Consent to display content from - Youtube
      Vimeo
      Consent to display content from - Vimeo
      Google Maps
      Consent to display content from - Google
      Spotify
      Consent to display content from - Spotify
      Sound Cloud
      Consent to display content from - Sound
      Contact Us