Backup-Everything-UK-Cloud-Backup-Online-Backup-Remote-Backup

.

Muddy Water APT leveraging spear-phishing to extend beyond its traditional Middle East targets

Woburn, MA – October 10, 2018 — /BackupReview.info/ — Kaspersky Lab researchers monitoring the activity of Muddy Water, an advanced threat actor first seen targeting Iraq and Saudi Arabia in 2017, have uncovered a massive operation focused on government entities and more in Jordan, Turkey, Azerbaijan, Pakistan and Afghanistan, alongside its original targets. The malware is distributed through a highly personalized spear-phishing campaign featuring Office documents and asking users to enable embedded macros. The attacks are ongoing.

Muddy Water is a relatively new threat actor that surfaced in 2017 with a campaign focused on government targets in Iraq and Saudi Arabia. Earlier this year, Kaspersky Lab researchers detected a continuous stream of spear-phishing emails targeting a much wider range of countries than previously seen for this threat actor. The campaign peaked in May and June 2018.

The content of the spear-phishing messages suggests the main targets are government and military entities, telecoms companies and educational institutions. The emails carry an MS Office 97-2003 file attachment and infection is activated as soon as the user has been persuaded to enable macros.

Kaspersky Lab researchers have analyzed the first stages of the attack and preliminary findings are available in order to help organizations across the target regions protect themselves. The investigation continues into the attackers’ arsenal of PowerShell, VBS, VBA, Python and C# scripts, tools and Remote Access Trojans (RATs).

Once the infection is activated, the malware establishes contact with its command server by picking a random URL from an embedded list. After scanning for the presence of security software, the malware drops a number of scripts onto the victim computer, with a final PowerShell payload establishing basic backdoor functionality and destructive capabilities (the ability to delete files). The use of legitimate MS files means the malware can bypass any blacklisting. In addition, the PowerShell code disables the ‘Macro Warnings’ and ‘Protected View’ features to ensure future attacks will not require any user interaction. The malware’s infrastructure comprises a range of compromised hosts.

Attack targets were detected in Turkey, Jordan, Azerbaijan, Iraq and Saudi Arabia, as well as in Mali, Austria, Russia, Iran and Bahrain.

It is not known for certain who is behind the Muddy Water operation, although the attacks are clearly geopolitically motivated, targeting sensitive personnel and organizations. The code used in the current attacks carries a number of features that appear designed to distract and mislead investigators. This includes the insertion of Chinese into the code and the use of names such as Leo, PooPak, Vendetta and Turk in the malware.

“Over the last year, we have seen the Muddy Water group implement a large number of attacks, as well as the continuous development of new methods and techniques,” said Amin Hasbini, senior security researcher, Kaspersky Lab Global Research and Analysis Team. “The group has active developers improving its toolkit in order to minimize exposure to security products and services. This suggests to us that this type of attack is likely to intensify in the short term. That is why we decided to share our first findings publicly – to raise awareness of the threat so that organizations can take action to defend themselves. We are still analyzing the attackers’ arsenal and will keep a close eye on their progression, strategies and mistakes.”

To reduce the risk of falling victim to operations like Muddy Water, Kaspersky Lab recommends organizations consider the following actions:

  • Implement a comprehensive approach to the detection, prevention and investigation of targeted attacks, involving advanced anti-targeted attack security solutions and training;
  • Provide security staff with access to the latest threat intelligence data, which will arm them with helpful tools for targeted attack prevention and discovery, such as indicators of compromise and YARA rules;
  • Ensure enterprise grade patch management processes are well established;
  • Double check all system configurations and implement best practices;
  • Educate staff on how to spot and what to do when they receive a suspicious email.

For further details of the first stages of this Muddy Water operation, including indicators of compromise, read the blog on Securelist.

Further information on the Muddy Water arsenal, additional indicators of compromise, Yara rules and more is available to customers of Kaspersky Intelligence Reporting. Contact: intelreports@kaspersky.com

About Kaspersky Lab
Kaspersky Lab is a global cybersecurity company, which has been operating in the market for over 20 years. Kaspersky Lab’s deep threat intelligence and security expertise is constantly transforming into next generation security solutions and services to protect businesses, critical infrastructure, governments and consumers around the globe. The company’s comprehensive security portfolio includes leading endpoint protection and a number of specialized security solutions and services to fight sophisticated and evolving digital threats. Over 400 million users are protected by Kaspersky Lab technologies and we help 270,000 corporate clients protect what matters most to them. Learn more at www.kaspersky.com.

Media Contact
Jessica Bettencourt
781.503.7851
Jessica.Bettencourt@kaspersky.com

Source: Kaspersky Lab

 

 

General Tags: online backup news, online data backup, CEO interviews, compare online backups, online backup services, online file backup, cloud computing, SaaS, online backup companies, online backup reviews, data security, top rated online backups, online backup providers directory, software as a service, data storage, backing up online, online backup, online file storage

Like us on Facebook




===========================
Do you like this post? Subscribe to our RSS feed ===========================



Share/Save/Bookmark

Related posts:

  1. Kaspersky Lab Finds Asia and Middle East Top Targets for New Threat Actors in Q1 2018
  2. Kaspersky Lab Uncovers Skygofree, a Highly Advanced, Powerful Android Surveillance Software
  3. Kaspersky Lab Spam and Phishing in Q2 2015 Report: Exploiting World Events and Targeting the Vulnerable with ‘$2 million’ Offers
  4. Kaspersky Lab Identifies Alarming Trend: Cybercriminals are Focusing Heavily on Businesses
  5. Kaspersky Lab Research Shows DDoS Devastation on Organizations Continues to Climb
  6. Kaspersky Lab Quarterly Report Shows Zero-Day Exploits and Rampant ‘Ransomware’
  7. Crypto-Ransomware Attacks are Now Targeting Corporate Users
  8. Kaspersky Lab IT Threat Evolution Report: Attacks Leveraging Microsoft Office Exploits Grew Fourfold in Q1 2018
  9. Kaspersky Lab Discovers New Upgrades to Notorious Gaza Team Cybergang’s Malicious Toolset
  10. Kaspersky Lab Report: The Number of Phishing Attacks in Q3 Reach Over 137 Million

Tags: ,