Magniber ransomware targets home users | Malwarebytes

Home users are being targeted by a ransomware called Magniber which locks up files and demands money for the key.

Malwarebytes

Happy Monday everyone!

I am sifting through the Cisco Talos Intelligence Group "Year In Review" report that was recently published and highlighting some of the things that I found useful/interesting from my perspective.

Top Targeted Vulnerabilities:
7/10 of the top CVE's belonged to #Microsoft. Now I am not pointing fingers, I think it is there simply because the vast majority of environments are Windows.
What IS concerning is that there are multiple vulnerabilities that were being exploited that were either 10 years old or ALMOST 10 years old.
8/10 of the top CVE's had a score of 9 or above.

One of these CVE's was CVE-2021-1675, which is a remote code execution vulnerability that exists when the Windows Print Spooler service improperly performs privileged file operations. One product of this vulnerability was the #PrintNightmare exploit that was leveraged by the #Magniber ransomware group.

Stay tuned for more as we work our way through this report! Enjoy and Happy Hunting!

https://blog.talosintelligence.com/talos-year-in-review-2022/

Talos Year in Review 2022

We expect this data-driven story will shed some insight into Cisco’s and the security community’s most notable successes and remaining challenges. As these Year in Review reports continue in the future, we aim to help explain how the threat landscape changes from one year to the next.

Cisco Talos Blog
"해킹 피해자 730명으로부터 26억 원 갈취한 데이터복구 업체 운영자 등 구속기소" published by KRSPO. #Ransomware, #News, #Magniber, #CTI, #OSINT, #LAZARUS https://www.spo.go.kr/site/spo/ex/board/View.do?cbIdx=1403&bcIdx=1043403
홈 > 알림소식 > 검찰발표자료 - 대검찰청

I did a writeup on #Magniber - an obfuscated #ransomware using raw #syscalls to call functions. The writeup has more of a tutorial form, demonstrating usage of some of my tools (mainly #TinyTracer) in action, and also sharing some of my approaches & workflow. Check it out: https://hshrzd.wordpress.com/2023/03/30/magniber-ransomware-analysis/
Magniber ransomware analysis: Tiny Tracer in action

hasherezade's 1001 nights

Get up to speed on the week's infosec news before another week in the trenches:

https://opalsec.substack.com/p/soc-goulash-weekend-wrap-up-e05

Last week's patch Tuesday had SmartScreen bypasses and the Ping of Death, but nothing could beat the #Outlook zero-click credential leak that #Microsoft patche-er, uh, wait, no not quite patched - turns out you can still abuse it locally to harvest NTLM credentials, yikes!

Non-transitive trusts have one job - to enable cross-domain authentication between only the two domains that maintain it. Turns out, that's not the case - you can actually pivot between domains and forests, authenticating to Services well outside the intended scope of the trust. And Microsoft aren't going to fix it.

#Emotet have realised in week two of their return that there's more to life than Macros, and have joined in the abuse of #OneNote files to deliver their lures.

In the world of ransomware, #BianLian have opted to focus on exfil-and-extortion campaigns, after Avast released a pesky decryptor for their ransomware in January this year. #CISA have opened their books and shared a detailed profile on #LockBit 3.0's favoured TTPs and tooling that's worth a read.

#Google TAG have ousted Microsoft taking the easy way out in their previous patch of a SmartScreen bypass, opting to issue a half-baked patch that the #Magniber ransomware crew quickly circumvented, enabling them to deliver over 100,000 malicous lures unencumbered by the now-patched security control.

If you're running Adobe's ColdFusion, Aruba ClearPass, or SAP software - you're going to want to make sure you caught and patched these vulnerabilities that debuted last week.

#Redteam members have a new and improved AD lab environment to play in, as well as new evasion techniques for remote shells and macros to add to the toolkit!

Offensive Security have a gift for the #blueteam in the defensive Kali Purple distro, and we've caught a bunch of awesome write-ups to help in scaling Detection Engineering and mitigating common initial access vectors.

Catch all this and much more in this week's newsletter:

https://opalsec.substack.com/p/soc-goulash-weekend-wrap-up-e05

#infosec #cyber #news #cybernews #infosec #infosecnews #informationsecurity #cybersecurity #hacking #security #technology #hacker #vulnerability #vulnerabilities #malware #ransomware #dfir #soc #threatintel #threatintelligence #patchtuesday #adobe #ColdFusion #Aruba #ClearPass #SAP #Kali

SOC Goulash: Weekend Wrap-Up

13/03/2023 - 19/03/2023

Opalsec

#Magniber #ransomware actors used a variant of #Microsoft #SmartScreen #bypass

Financially motivated threat actors used an unpatched security bypass to deliver ransomware without any security warnings

https://blog.google/threat-analysis-group/magniber-ransomware-actors-used-a-variant-of-microsoft-smartscreen-bypass/

Magniber ransomware actors used a variant of Microsoft SmartScreen bypass

New research from Threat Analysis Group on Magniber's exploitation of Microsoft 0-day vulnerability.

Google

Proof of Concept: #Malware Delivery via #appx/#msix packages.
In our test case we needed administrative permissions to install the package with putty.exe as our test payload.

We did test it first with a #Wannacry #Ransomware binary, but Windows Defender caught the payload and that didn't look so nice on a screenshot 😅

Our .appx demo package is based off of a in-the-wild sample of #Magniber #Ransomware that was signed with a stolen signature (Jan 2022). With this change in Windows 11 it is now possible to install unsigned appx packages (given required perms).
https://twitter.com/f0wlsec/status/1481338661824307204

Detection opportunities:
- Execution out of C:\Program Files\WindowsApps\
- Looking for the special OID documented by Microsoft here: https://learn.microsoft.com/en-us/windows/msix/package/unsigned-package

We are going to publish our #Yara rules for this tomorrow, stay tuned.

Marius 'f0wL' Genheimer on Twitter

“The .appx file can only be installed if the system is set to the "Sideloading" or "Developer" mode. Since the error message is pretty clear most victims would probably still enable it though. Sample: e2d3af7acd9bb440f9972b192cbfa83b07abdbb042f8bf1c2bb8f63944a4ae39”

Twitter

Picking up where we left off yesterday: We created two #Yara rules for the #Magniber #Ransomware delivery method. You can find them in our GitHub Repository and on @abuse_ch Yaraify ⬇️ Have a nice weekend and happy hunting 🔍

https://github.com/SIFalcon/Detection/tree/main/Yara/Malware

https://yaraify.abuse.ch/yarahub/rule/RANSOM_Magniber_ISO_Jan23/

https://yaraify.abuse.ch/yarahub/rule/RANSOM_Magniber_LNK_Jan23/

Detection/Yara/Malware at main · SIFalcon/Detection

Contribute to SIFalcon/Detection development by creating an account on GitHub.

GitHub

#Magniber #Ransomware is continuing to spread fake Windows Update installers (.msi), but since yesterday the threat actors are also distributing .iso archives instead of .zip files. You can find our brief analysis of the msi and the lnk file below ⬇️

AvastThreatLabs first reported about the .zip file distribution yesterday: https://twitter.com/AvastThreatLabs/status/1613248553626787842

IoC:
5G offer.lnk 5ab873527a526cd4ea2bead2b302b38a
5G-Installer 126f77e151529eeb3b2f42c49691e9c0
Binary.UpdateBinary 10ccc8f56a2894d18d71f9f32a923aa7
iso fedb6673626b89a9ee414a5eb642a9d9

We uploaded the samples mentioned above to @abuse_ch
Malware Bazaar, have fun :)

https://bazaar.abuse.ch/browse/tag/Magniber/

Avast Threat Labs on Twitter

“Several waves of #MagniBer #ransomware attacks have hit FR 🇫🇷, IT 🇮🇹 and DE 🇩🇪 in the past hours with roughly 20K protected users. The attackers used #malvertising, leading to downloading a ZIP file with a fake MSI installer that appears to be an important security update.”

Twitter

Something interesting with #Magniber ransomware delivery.

Seeing the previous #MagnitudeEK URI pattern again (sub domains).