Page 11 - Threat Intelligence 12-13-2019
P. 11

Hackers Trick Venture Capital Firm Into Sending Them $1 Million. Security researchers at Check Point say the
         company has uncovered evidence that Chinese hackers managed to hijack $1 million in seed money during a
         wire transfer between a Chinese venture capital firm and an Israeli startup—without either side realizing
         anything was wrong. The VC firm and the startup, whose names Check Point hasn’t released, reached out to
         the security firm after the funds failed to arrive. Once Check Point dug into the details, it discovered a man in
         the middle attack that took a lot of planning and plenty of patience. After analyzing the server logs, emails,
         and the computers involved in correspondence between the companies, Check Point noticed some
         abnormalities. Some of the emails, analysts discovered, had been modified. Others hadn’t even been written
         by either organization. After seeing the original email thread announcing the upcoming multi-million dollar
         seeding fund, the hacker took action. Instead of monitoring subsequent emails by creating an auto forwarding
         rule (standard practice in traditional attacks), the hacker started by creating two lookalike domains.
                Source: https://www.vice.com/en_us/article/mbmmaq/hackers-trick-venture-capital-firm-into-
                sending-them-dollar1-million



         Cybercriminals Use Malicious Office 365 App for Phishing Campaign. Cybercriminals are using a malicious
         Microsoft Office 365 app to illegally access end user accounts and data, according to managed threat
         intelligence and mitigation services provider PhishLabs. The Office 365 phishing campaign involves the use of a
         phishing message that impersonates an internal SharePoint and OneDrive file-share, PhishLabs noted. Once a
         victim clicks on an embedded link in the message, he or she is taken to a legitimate Microsoft login page. Next,
         the victim is asked to provide access to his or her Office 365 inbox, contacts and files, PhishLabs indicated. If
         the victim accepts the request, a cybercriminal then gains access to his or her Office 365 account and data.

                Source: https://www.msspalert.com/cybersecurity-breaches-and-attacks/phishing/office-365-phishing-
                campaign/



         Persistent Malware Using Multiple Techniques Hits Online Readers in Time for the Holidays. The Media
         Trust’s Digital Security & Operations (DSO) team discovered a new malicious campaign affecting iPhone users
         of over 100 publisher websites, many of which were UK online newspapers and international weekly news
         magazines. Named Krampus-3PC1 by the DSO, this unique malware delivered the payload using a multi-stage
         redirect mechanism and two obfuscation methods to evade conventional scanning and blocking tools. While
         most malicious campaigns use one method of redirection, Krampus-3PC employed a backup method to ensure
         users were redirected to the fraudulent popup masquerading as a global grocery store reward ad. Moreover,
         the malware hoovered up user session information, including cookies, from a widely used adtech vendor,
         enabling attackers to log into users’ various online accounts.

                Source: https://mediatrust.com/sites/default/files/2019-12/Krampus-3PC_2019-1211.pdf



         Fake Payroll Emails Used by Phishing Campaign to Deliver TrickBot. At the beginning of November, Palo Alto
         Networks’ Unit 42 research team identified a phishing campaign sending out attack emails whose subject lines
         referred to payroll and annual bonuses. These emails didn’t arrive with an attachment. Instead, they included
         links to what appeared to be a Google Docs document. That file, in turn, contained links to malicious files
         hosted on Google Drive that acted as simple downloaders of TrickBot. Upon execution, the malware
         established persistence on the infected machine by creating a scheduled task that ran at user login. As noted
         by Unit 42, this phishing campaign was unique in that malicious actors used SendGrid, a legitimate email
         delivery service (EDS), to send out the initial attack emails. They had also used SendGrid to conceal the
         malicious Google Drive links contained in the Google Docs document.

                Source: https://securityintelligence.com/news/fake-payroll-emails-used-by-phishing-campaign-to-
                deliver-trickbot/


                                                    www.accumepartners.com
                                                                                                                    11
   6   7   8   9   10   11   12   13   14   15   16