Month: May 2018

Hidden Cobra Strikes Again with Custom RAT, SMB Malware

The feds are warning that the North Korean APT group known as Hidden Cobra is mounting active attacks on U.S. businesses (and others globally), including organizations in the media, aerospace, financial and critical infrastructure sectors.

According to a United States Computer Emergency Readiness Team (US-CERT) bulletin released Tuesday, the state-sponsored group is using two families of malware against U.S. assets: A remote access tool (RAT) dubbed Joanap; and a Server Message Block (SMB) worm known as Brambul.

Neither family is new, having been first observed in 2009. However, both are bringing thoroughly modern tricks to the cyber-party. The actors are targeting sensitive and proprietary information, and the malware could disrupt regular operations and disable systems and files.

A Look at Joanap and Brambul

Joanap is a fully functional RAT that serves as the payload in various phishing or drive-by attacks. Hidden Cobra uses it to exfiltrate data and host system information, drop and run secondary payloads, and initialize proxy and peer-to-peer communications on compromised Windows devices, according to the alert. It uses Rivest Cipher 4 encryption to communicate with the C2.

It also has capabilities to manage botnets for other types of operations, and can carry out file management, process management, the creation and deletion of directories, and node management.

Brambul meanwhile is a Windows 32-bit brute-force authentication worm that spreads through SMB, which is the Windows file-sharing protocol that enables shared access to files between users on a network. Famously, SMB is the point of compromise targeted by leaked National Security Agency hacking tools like EternalBlue and EternalRomance.

In this case, Brambul specifically targets insecure or unsecured user accounts and spreads through poorly secured network shares. It shows up looking like a service dynamic link library file or a portable executable file; and once executed, it pivots to spread to other subnets and systems on the network.

“If successful, the application attempts to gain unauthorized access via the SMB protocol (ports 139 and 445) by launching brute-force password attacks using a list of embedded passwords. Additionally, the malware generates random IP addresses for further attacks,” the alert explained.

Once active on a system, Brambul sets about harvesting system information and sending it back to Hidden Cobra actors via malicious email messages. It can also accept command-line arguments, and it has a self-kill mechanism.

North Korea Behind the Scenes

Joint Hidden Cobra research from the Department of Homeland Security and the FBI noted that IP addresses and other indicators of compromise (IOCs) associated with the attacks link back to both strains, which they say are custom malware deployed by the North Korean government.

“FBI has high confidence that Hidden Cobra actors are using the IP addresses—listed in this report’s IOC files—to maintain a presence on victims’ networks and enable network exploitation,” the feds said in their alert. “DHS and FBI are distributing these IP addresses and other IOCs to enable network defense and reduce exposure to any North Korean government malicious cyber-activity.”

Hidden Cobra (also known as the Lazarus Group) has been on the radar screen for some time; it was linked to the infamous 2014 Sony Pictures hack, for instance, as well as the SWIFT banking attacks. More recently, last June the group was seen leveraging malware called DeltaCharlie, which is the brains behind North Korea’s distributed denial-of-service (DDoS) botnet infrastructure.

Also, in April, Thailand’s Computer Emergency Response Team (ThaiCERT) seized a server operated by the APT, which is part of the network used to control the global GhostSecret espionage campaign, which researchers say is still ongoing. McAfee warned at the time that the GhostSecret campaign was carrying out data reconnaissance on a wide number of industries, including critical infrastructure, entertainment, finance, healthcare and telecommunications, in at least 17 countries.

To avoid compromise, users and administrators should follow best practices, especially maintaining up-to-date patching and antivirus; enabling workstation firewalls; implementing email- and download-scanning to quarantine or block suspicious attachments and files; restricting user permissions for software installations; and disabling Microsoft’s File and Printer Sharing service, if not needed.

“If this service is required, use strong passwords or Active Directory authentication,” US-CERT noted.

How to set Vacation Auto Responder in GMail

As summer comes, so does the family vacations.  If you use Gmail, there is a way to set up an auto responder to let your customers know that you'll get back to them as soon as you can.

Here's how to set it up:

1.  Login to your Gmail account as normal.

2.  Click Settings (gear icon) > General.

3.  Scroll down to "Vacation Responder".

4.  Click the vacation responder section to "ON".

5.  Fill out the Start Date and End Date for the responder.

6.  Click if you want to only respond to people in your Contacts.

7.  When satisfied, click on the "Save Changes" button.

8.  That's it.

 

AI is now better at detecting skin cancer than human doctors

“Modern medicine pushes forward thanks to the efforts of doctors and scientists who develop new tools, techniques, and methods for diagnosing and treating ailments, but what happens when the tools become smarter than the humans?” Mike Wehner reports for BGR. “A new algorithm for detecting skin cancers might provide the answer to that question, as it just demonstrated it can outperform human doctors in spotting malignant melanomas.”

“In a new study published in the journal Annals of Oncology, a team of scientists asked trained dermatologists to face off against a neural network to see which one provided accurate diagnoses more often,” Wehner reports. “Spoiler: The humans didn’t win.”

“The numbers are quite stunning: 87 percent of melanomas were accurately diagnosed by the human doctors the first time around, and that number improved to 89 percent during the second round of examination,” Wehner reports. “The AI, on the other hand, nailed 95 percent of malignant growths.”

Read more in the full article here.

Why you may NOT want to enable Message for iCloud

While we have an article explaining how to turn on the Message in iCloud feature, now we'd like to present the other side of the coin, as Adrian Kingsley-Hughes reports for ZDNet.

“iOS 11.4 is out, and it brings with it a feature that was first promised to us in iOS 11.3 designed to help streamline messaging between devices.  Called Messages in iCloud, it syncs messages you receive through the Messages app across your devices, whether that be your iPhone, iPad, iPod touch, or even a Mac (sorry Apple Watch owners, you don’t get this feature, and will most likely have to wait for watchOS 5).”

“First off, to make Messages in iCloud work you need to download and install iOS 11.4 onto your iOS devices, and macOS 10.13.5 onto your Macs (as of time of publication macOS 10.13.5 has not been released, but is expected shortly),” Kingsley-Hughes reports. “After that, you need to activate Messages in iCloud on your iOS devices.”

“OK, so why might you not want to activate this feature? Well, remember that it’s called Messages in iCloud, which means that it makes use of, and uses up, your iCloud storage. And it might just mean that you have to start paying Apple for more iCloud storage space,” Kingsley-Hughes reports. “Extra iCloud storage space isn’t all that expensive — plans start at $0.99 for 50 gigabytes — but if you don’t want to have to start giving Apple more money on a regular basis, you should be mindful of the fact that Messages in iCloud could be what pushes your iCloud usage over the edge.”

Read more in the full article here.

You may have Missed:

Verified by MonsterInsights