VIDEO: BSidesNYC 2024 - From HiatusRAT to Cuttlefish advances in credential theft through the router - Danny Adamitis & Ryan English - Black Lotus Labs

https://www.youtube.com/watch?v=Oi-x_YPtHZA&list=PLlg8We3ePxcMDrUFNWs7hyx3uJwnhK-_a

#BSidesNYC #BsidesNYC2024 #bsidesnyc0x04 #cybersecurity #InfoSec #HiatusRAT #Cuttlefish #APTs

BSidesNYC 2024 - From HiatusRAT to Cuttlefish advances in credential theft through the router

YouTube
HiatusRAT Actors Targeting Web Cameras and DVRs
#HiatusRAT
https://www.ic3.gov/CSA/2024/241216.pdf
Fbi waarschuwt voor gevaarlijke hiatusrat-malware op webcams en dvrs

De FBI heeft een dringende waarschuwing afgegeven over de verspreiding van HiatusRAT-malware die kwetsbare webcams en digitale videorecorders (DVRs) aanvalt. D

Tech Nieuws

The FBI has issued a warning about the HiatusRAT malware targeting web cameras and DVRs, urging immediate action to protect vulnerable devices! 🚨 This cyber campaign exploits known vulnerabilities in popular brands like Hikvision. Organizations must update systems, change weak passwords, and monitor network activity. Stay safe online! 💻🔒 #CyberSecurity #FBI #HiatusRAT #IoT #MalwareAlert #newz

https://cyberinsider.com/fbi-warns-of-hiatusrat-campaigns-targeting-web-cameras-and-dvrs/

FBI Warns of HiatusRAT Campaigns Targeting Web Cameras and DVRs

The FBI has issued an alert highlighting an active cyber campaign involving HiatusRAT malware targeting Chinese-branded web cameras and DVRs.

CyberInsider
FBI warns of HiatusRAT scanning campaigns against Chinese-branded web cameras and DVRs

The FBI warned of a fresh wave of HiatusRAT malware attacks targeting internet-facing Chinese-branded web cameras and DVRs.

Security Affairs
New HiatusRAT campaign targets Taiwan and U.S. military procurement system

HiatusRAT malware operators resurfaced with a new wave of attacks targeting Taiwan-based organizations and a U.S. military procurement system. In March 2023, Lumen Black Lotus Labs researchers uncovered a sophisticated campaign called “HiatusRAT” that infected over 100 edge networking devices globally. Threat actors leveraged edge routers, or “living on the edge” access, to passively collect […]

Security Affairs
New HiatusRAT router malware covertly spies on victims - Lumen

Lumen Black Lotus Labs identified a new campaign involving compromised routers. HiatusRAT allows threat actors to remotely interact with the system.

Lumen

Happy Monday folks, I hope you had a restful weekend and managed to take a breather from all things cyber! Time to get back into it though, so let me give you hand - catch up on the week’s infosec news with the latest issue of our newsletter:

https://opalsec.substack.com/p/soc-goulash-weekend-wrap-up-09e?sd=pf

#Emotet are back and are using…OneNote lures? ISO disk images? Malvertising? Nah – they’re sticking with tier tried and true TTPs – their Red Dawn maldoc template from last year; macro-enabled documents as lures, and null-byte padding to evade automated scanners.

We’ve highlighted a report on the Xenomorph #Android Banking Trojan, which added support for targeting accounts of over 400 banks; automated bypassing of MFA-protected app logins, and a Session Token stealer module. With capabilities like these becoming the norm, is it time to take a closer look at the threat Mobile Malware could pose to enterprise networks?

North Korean hackers have demonstrated yet again that they’re tracking and integrating the latest techniques, and investing in malware development. A recent campaign saw eight new pieces of malware distributed throughout the kill chain, leveraging #Microsoft #InTune to deliver payloads and an in-memory dropper to abuse the #BYOVD technique and evade EDR solutions.

A joint investigation by #Mandiant and #SonicWall has unearthed a two-year campaign by Chinese actors, enabled through exploitation of unpatched SMA100 appliances and delivery of tailored payloads. A critical vulnerability reported by #Fortinet this week helps reinforce the point that perimeter devices need to be patched with urgency, as it’s a well-documented target for Chinese-affiliated actors.

#HiatusRAT is a novel malware targeting #DrayTek routers, sniffing network traffic and proxying C2 traffic to forward-deployed implants. TTPs employed in recent #BatLoader and #Qakbot campaigns are also worth taking note of, as is #GoBruteforcer, a new malware family targeting specific web server applications to brute force logins and deploy an IRC bot for C2.

Those in Vulnerability Management should take particular note of the #Veeam vulnerability, which appears trivial to exploit and actually delivers plaintext credentials to the attacker. CISA have also taken note of nearly 40k exploit attempts of a 2 year old code-exec-as-root vulnerability in the #VMWare Cloud Foundation product in the last two months, so make sure you’re patched against it.

#Redteam members have some excellent reading to look forward to, looking at HTTP request smuggling to harvest AD credentials and persisting with a MitM Exchange server, as well as a detailed post that examines #CobaltStrike’s reflective loading capability;

The #blueteam has some great tradecraft tips from @inversecos on #Azure DFIR, as well as tools to help scan websites for malicious objects, and to combat the new #Stealc #infostealer and well-established Raccoon Stealer.

Catch all this and much more in this week's newsletter:

https://opalsec.substack.com/p/soc-goulash-weekend-wrap-up-09e?sd=pf

#infosec #cyber #news #cybernews #infosec #infosecnews #informationsecurity #cybersecurity #newsletter #hacking #security #technology #hacker #vulnerability #vulnerabilities #malware #ransomware #dfir #soc #threatintel #threatintelligence #DarkWeb #mdm #dprk #FortiOS #FortiProxy

SOC Goulash: Weekend Wrap-Up

06/03/2023 - 12/03/2023

Opalsec

Too often I think organizations focus on only protecting compute endpoints. This is a good reminder #APT #ThreatActors do still like to #compromise network devices.

Nice write up on #HiatusRAT #malware compromising routers.

#DFIR #NetworkForensics
https://blog.lumen.com/new-hiatusrat-router-malware-covertly-spies-on-victims/

New HiatusRAT router malware covertly spies on victims - Lumen

Lumen Black Lotus Labs identified a new campaign involving compromised routers. HiatusRAT allows threat actors to remotely interact with the system.

Lumen

New research on a #router campaign we are calling #Hiatus that we suspect has been active for years, as we recently discovered variant 1.5 of the #malware.

This campaign consists of two modules. The first is a variant of #TCPDump designed to passively collect email traffic as it transits through the routers. The second module #HiatusRAT, turns the router into a covert relay to #proxy commands and exfil.

https://blog.lumen.com/new-hiatusrat-router-malware-covertly-spies-on-victims/

New HiatusRAT router malware covertly spies on victims - Lumen

Lumen Black Lotus Labs identified a new campaign involving compromised routers. HiatusRAT allows threat actors to remotely interact with the system.

Lumen