DefendEdge Logo
Categories
blogs Cyber Threat Intelligence Uncategorized

Clop Ransomware Gang: Profiling a Notorious Cybercriminal Organization

In recent years, the Clop ransomware gang has emerged as one of the most prolific and notorious cybercriminal organizations. Employing sophisticated techniques and constantly evolving their strategies, the group has successfully targeted high-profile organizations worldwide. This article aims to provide an informative profile of the Clop ransomware gang, detailing its history, operations, and recent activities.

History of Clop
Clop originated as a variant of the CryptoMix ransomware family and gained prominence in February 2019 when the threat group known as TA505 employed it in a large-scale spear-phishing email campaign. Operating as a ransomware-as-a-service (RaaS) model, Clop was used by a Russian-speaking group and disguised its malicious intent by utilizing verified and digitally signed binaries. This approach allowed the ransomware to evade security detection effectively.

In 2020, the financially motivated hacking group FIN11 started deploying Clop ransomware, leveraging zero-day vulnerabilities in the Kiteworks file transfer appliance. These attacks involved the use of a specific web shell called “DEWMODE” for exfiltrating stolen information. Clop’s operators also began implementing double extortion schemes, where they threatened to publicize and auction off stolen data if their demands were not met.

Clop’s Operations
The Clop ransomware gang exhibits a range of sophisticated techniques in its operations. Unlike other ransomware variants, Clop targets entire networks rather than individual computers, gaining access to the Active Directory (AD) server to persistently infect endpoints. Previous attacks by the group involved large-scale phishing campaigns, utilizing spam emails and malicious attachments to deliver the Clop malware. These attacks often involved various tools, such as SDBOT, FlawedAmmyy, and Cobalt Strike, which facilitated reconnaissance, lateral movement, and exfiltration of data before the deployment of the ransomware.

The group utilizes multiple tactics to coerce victims, including negotiation emails and threats of publicizing stolen information on their dedicated leak site, “Cl0p^_-Leaks.” Clop has even employed quadruple extortion techniques, targeting top executives and customers to exert additional pressure on companies to pay the ransom. By constantly evolving its tactics, Clop has set new trends in the world of cybercrime.

Recent Activities
While the arrests of six suspected Clop members in Ukraine in June 2021 dealt a significant blow to the group, their criminal activities continued throughout 2021 and 2022. However, recent data suggests a slowdown in ransomware deployments, indicating a shift towards data stealing and extortion. Law enforcement and private partners managed to seize parts of Clop’s infrastructure and takedown money laundering channels used for cryptocurrency payments.

In May 2023, the Clop gang exploited critical zero-day vulnerabilities in the MOVEit Transfer and MOVEit Cloud file transfer software, targeting numerous private and public organizations. These attacks focused on stealing sensitive data and extorting companies rather than encrypting systems. The group used a combination of tactics, including data leak threats and demands for negotiations, to pressure victims into complying with their demands.

The Clop ransomware gang has established itself as a formidable threat in the cybersecurity landscape. With a history of high-profile attacks and constantly evolving tactics, the group continues to pose a significant risk to organizations worldwide. Enterprises must remain vigilant and adopt proactive cybersecurity measures to mitigate the threats posed by ransomware groups like Clop. Collaborative efforts between law enforcement, private partners, and cybersecurity professionals are crucial in dismantling such criminal organizations and safeguarding sensitive data from exploitation.

Categories
alerts blogs Cyber Threat Intelligence

The Play Ransomware Gang: Profile of a Persistent Threat

In recent years, the world has witnessed an alarming rise in cyberattacks, with ransomware being one of the most pervasive and damaging forms of malicious activity. The Play ransomware gang has emerged as a highly disruptive and notorious group among the many ransomware gangs. This article aims to provide an informative and professional profile of the Play ransomware gang, shedding light on their operations, tactics, and notable attacks.

The City of Oakland Attack

The Play ransomware gang made headlines with their cyberattack on the City of Oakland, California. Beginning in mid-February 2023, the attack targeted the city’s IT systems, causing significant disruptions. While emergency services remained operational, various other departments were severely impacted, including business taxation and parking citation services. The gang claimed responsibility for the attack and demanded a ransom, threatening to expose sensitive data stolen from the city.

Attack Methodologies

Play ransomware employs several sophisticated techniques to infiltrate and compromise targeted organizations. They exploit known vulnerabilities, such as exposed RDP servers and FortiOS vulnerabilities (CVE-2018-13379 and CVE-2020-12812), to gain initial access. Once inside the network, they employ “lolbins” binaries and distribute executables via Group Policy Objects. Notably, the gang also engages in double extortion, exfiltrating sensitive data and threatening to release it if their ransom demands are not met.

Unique Technique: Intermittent Encryption

A distinctive characteristic of the Play ransomware gang is their use of intermittent encryption. This novel technique involves encrypting files in smaller, intermittent chunks, evading detection by security systems that rely on static analysis. By encrypting only portions of a file, often distinguished by null characters, Play ransomware can remain undetected for longer periods, exacerbating the damage caused to targeted organizations.

Notable Attacks

Beyond the City of Oakland, the Play ransomware gang has targeted various organizations worldwide. One significant incident occurred in Switzerland, where they hacked Xplain, an IT firm that supported numerous federal and cantonal government departments. They also targeted the major Spanish bank Globalcaja, compromising client and employee documents. Additionally, the gang claimed to have stolen 600GB of data from communications firm Poly (Polycom).

Play Ransomware Tools

The Play ransomware gang has developed custom tools to enhance their attacks’ effectiveness. Grixba, a network-scanning and information-stealing tool, enables them to enumerate users and computers within a compromised network. The VSS Copying Tool allows the gang to interact with the Volume Shadow Copy Service, even copying files in use by applications. These tools provide them with critical information and increase the efficiency of their malicious activities.

Security Recommendations

Organizations should implement robust security measures to combat the evolving threat posed by ransomware groups like Play. These include multifactor authentication (MFA), least privilege principles, network segmentation, attack surface management (ASM), secure domain controllers (DC), regular patching and updates, and maintaining encrypted offline backups of critical data. Additionally, employing threat intelligence platforms and monitoring the dark web for emerging threats can enhance an organization’s security posture.

The Play ransomware gang has proven to be a persistent and highly disruptive threat to organizations worldwide. Their sophisticated attack methods, including intermittent encryption and double extortion, showcase their determination to exploit vulnerabilities for financial gain. Organizations must remain vigilant, implementing robust security measures and proactive threat mitigation strategies to protect themselves against the increasing menace of ransomware attacks.

Categories
alerts blogs

Internet of Things Targeted by Campaigns and Attacks of Opportunity

Internet of Things Targeted by Campaigns and Attacks of Opportunity

blog-internet-picture

July 19, 2022 

By Calvin Bryant 

 It should come as no surprise that an ever-expanding threat landscape brings with it an increased number of attack vectors for threat bad actors’ use and, subsequently, an inevitable increase in exploitation.  The Internet of Things (IoT) is a common term used to describe devices that are connected to a network in one manner or another but are not typical network devices such as computers, mobile devices, tablets, or servers.  When we refer to IoT, we are talking about many common items integrated into your home or office network that you often do not think about.  Do you own a Ring Security system or similar product that connects to your wireless network?  How about an Alexa device?  Do you have a “smart” refrigerator or television, an iRobot Roomba vacuum perhaps?  These devices, and so many more, are all potentially included within the internet of things provided they have the capacity to connect to your network in one way or another. 

Whereas a home or office (or your home office) used to be comprised of a server, routers, and computers, that entire attack surface has drastically expanded to include all of these IoT devices.  This brings us to the targeting of the internet of things by threat actors both in campaigns and in targets of opportunity.  Over the past few years, the exploitation of IoT devices has been on the rise.  This is no surprise to individuals familiar with the topic, however, the efforts appear to be more concerted.  If you look at the recent Common Vulnerability and Exposures (CVEs), what you will find, more and more, is an increased number of IoT-related CVEs.  Thankfully, many of these are being found by the efforts of researchers and blue team actors, but not all.   

In the past month, multiple CVEs were reported within a host of IoT devices, and we can look at a few examples.  Digital Video Recorder (DVR) systems for closed circuit television systems (CCTV) have been found vulnerable to buffer overflow exploits that can result in lateral movement of malicious data or privilege escalation as seen in CVE-2021-44954.  This week, Programmable Logic Controllers (PLCs), which are the computing devices behind industrial manufacturing control, were found lacking in authentication and security measures with easy-to-crack passwords.  Subsequently, they have been targeted by malware campaigns to tie them into botnets for distributed denial of service attacks as reported with CVE-2022-33971.  And, lest we forget about cameras, infrared security cameras have also been exploited through buffer overflow vulnerabilities (CVE-2022-31209) and have a history of privilege escalation concerns both remotely and through a direct hack of security cameras. 

As noted, these incidents are not few and far between.  A few weeks back, the Defending the Edge podcast covered the story of security doors being bypassed by tapping into and exploiting vulnerabilities in external control panels.  Once inside, a research team was able to escalate privilege and move laterally in the network, going so far as to open and close doors and shut down cameras.  It took a good bit of groundwork and some reverse engineering, but it was doable, and in theory, a threat actor could be just as savvy to successfully make such an attack in the wild.  As much as this sounds like science fiction or something out of a spy novel, hackers have been exploiting physical security systems, primarily thanks to a lack of segmentation, compartmentalization, and lack of purposely designed security measures for the past two decades in one form or another.   

The ever-increasing move to wireless networks and wireless access points is only increasing the attack surface by linking in more devices that may not be properly secured or not tested properly to avoid the same types of pitfalls that traditional computers and servers have been hardened against (or at least attempt to do so) for many years.  We add these devices to our networks because they have convenience features.  I can turn on my vacuum remotely, adjust my thermostat, or access my security system from anywhere in the world.  This leaves us with only a few options.  We can throw away technology, move into the woods, and avoid the chance of a bad guy exploiting some device.  We could, perhaps, migrate away from IoT devices and lessen our use of these convenience items.  Or we could deal with the challenge, and in doing so, accept risk, but employ our best practices to manage that risk. 

Cyber security is all about risk assessment and risk management.  You will never fully remove risk, but you can manage it.  With IoT, especially in a work setting or even a home office, we should start by taking the simple actions.  Apply strong passwords even to your seemingly harmless devices.  Did you update your WiFi router password?  Does your robot vacuum have a complex password?  Is the PLC in your manufacturing and assembly line updated with the most recent firmware and has a solid password and maybe an authentication measure in place?   

Aside from trying to keep up with manufacture notifications for any vulnerabilities, or skimming CVE lists that nobody outside of our research team is doing, just ask yourself how your device connects, what else is connected on that network, and what security measures are in place to stop someone from using that device as a conduit.  Does it have a password? Can it?  If not, is it on the same network as your other more sensitive devices, such as your home computer or your work or company office network?  Remove the low-hanging fruit and keep your systems up to date and you can still enjoy the convenience of these devices with far less risk. 

 

Calvin Bryant is a Cyber Security and Cyber Threat Intelligence analyst for DefendEdge and the Producer and Host of the Defending the Edge Podcast. 

Categories
alerts blogs

LinkedIn, Our Business Home Platform, gets Abused.

LinkedIn, Our Business Home Platform, Gets Abused.

blog-linkedin-picture

July, 13 2022

Will we ever escape scammers? The answer is no. As people, we adapt and overcome by facing new challenges and obstacles, and in turn, we learn how to handle whatever comes our way. Well, scammers are people too. With that said, scammers adapt as well. So how do we avoid this? By staying updated on the latest trends and news. Currently, there have been crypto scammers that have used the platform LinkedIn for their work. That’s right, our number one go-to for business relations and exposure.

For LinkedIn, these crypto scammers have been creating professional-looking profiles to fool the eye. From there, they use a fraudulent site to direct the user because trust has been established. They do this by convincing the user to move money to a different cryptocurrency platform where they can manage it. Factually manage. From there, some of us know what happens next all too well. Once the funds are moved to the fraudulent site, all the cash and the scammer vanish.

Unfortunately, this is not the only scam going on using LinkedIn. Scammers are targeting job applicants, creating fake job applications, and generating offers to harvest credentials from users. Things to be on the lookout for are subject lines like, ‘You appeared 6 searches this week, “You have 1 new message,’ or even, ‘Your profile matches this job.’ Very similar to what we may see. For someone in need of a job, well, these notifications become more intriguing and easier to fall for.

Additionally, victims not looking for a job per se can get caught up in a romance scam, ending in the exact outcome of the disappearance of funds and the scammer. This has been successful, and the result of it is unsettling. Per CNBC, scammers have been able to bleed their victims of funds ranging from $200,000 to $1.6 million! This is just from users using LinkedIn alone.

To become safer on LinkedIn and other platforms, always be cautious of any requests you may get. Especially from individuals, you may not recognize. You can always verify this person on LinkedIn. Be on the lookout for any form of money being asked for, such as cash, gift cards, visa cards, prizes, and now cryptocurrency. Never trust someone else with your personal information and banking details that you don’t recognize. Remember, scammers, build that trust with you and have all the time in the world to have a conversation, so be wary of that fake account. Lastly, you can stay safe by not clicking on unsolicited email notifications from LinkedIn or links that can lead you astray.

Your Cybersecurity Analyst,

Stephenie Stombaugh

Professional Reference by Cyware Social:

https://cyware.com/news/crypto-scammers-turn-to-linkedin-to-target-victims-568c9be2

Categories
blogs

Home Internet Protection for Kids

How to Make Your Home Network Better

Your Kids internet activity is suspicious and at risk. The problem in most cases is that the parents and kids usually aren’t aware.

Let’s tackle the common questions we receive from Parents:

  • Why is my internet so slow?
  • How do I monitor my kids TikTok, Snapchat, Instagram, Twitch, and other social media account?

Well there are a few answers, some you won’t like, and other really helpful.

DefendEdge Kids Internet Safety

Question: Why is my internet so slow?

Answer: There are several factors that could contribute to a slow internet connection. Here’s a short list:

  • Home Wiring & Equipment – your best performance will be based on your weakest link. That means, if your home network is slow at a single point that could be the root of all issues (i.e. Network Switch, Cabling, Wiring to Wireless Devices).
  • Wireless Access Point – there are several apps you can download to view your neighbors congested wireless network channel traffic. Essentially, you all can’t be driving in the same virtual highway to the internet because of a possible collision. Download apps Wireless Analytics tools to perform a scan and figure out which channel is the most congested one and move away from that one.
  • Your Internet Service Provider – If you’ve checked off the first two items and you have Comcast, AT&T, or another provider call their support and submit a ticket requesting a technicians assistance. Tip: during colder months such as Fall and Winter mice get into the outside ISP neighborhood communication central boxes and cause damage by chewing the wires. This is often the fix for most issues.

Question: How do I monitor my kids TikTok, Snapchat, Instagram, Twitch, and other social media accounts?

Answer: This one you won’t like, but you will appreciate how far privacy and security has evolved with technology.

  • Social Media companies have made it almost impossible to view user to user messages. Meaning that information is protected through an encryption method and not stored on a central server. That means the messages cannot be intercepted or analyzed through any logs.
  • Next-Generation Firewalls like our Fortinet appliances allow you to implement restrictions and controls on specific family devices. The security options to implement schedules, monitoring, denying, allowing, or inspecting certain inbound or outbound app traffic are very useful with younger children. These Firewalls also help prevent risks of data theft, embedded viruses in websites, or social media apps from exfiltrating personal data.
  • Mobile Carriers like AT&T have family options like Secure Family which allows you to fully control both mobile and tablets enrolled in the plan. A very powerful and recommended feature to enable in case kids decide to disconnect from the home wireless network in an attempt to bypass security controls by your Firewall.

Better and Secure Home Internet Experience in 4 Steps

Step 1. Select an Internet Service Provider (ISP)
Your primary ISP should be someone reliable and able to respond quickly to issues
Step 2. Firewall Commercial Grade
Advanced Security Features, SDWAN, Safe and Secure Internet Browsing
Step 3. Powerful & Realiable Wireless
Improve your wireless signal and reliability in highly congested living neighborhoods
Step 4. Install Endpoint Protection
Having a reliable

Step 1

Internet Provider

DefendEdge ISP Recommendation
DefendEdge ISP Recommendation
DefendEdge Wireless Recommendation
Recommended for remote rural areas

Step 3

Wireless

Step 2

Firewall

DefendEdge Firewall Recommendation

Step 4

Endpoint Protection

DefendEdge Endpoint Protection Recommendation

For more information

Categories
blogs

Social Engineering

Social Engineering

How to Stop Social Engineering, Phishing Attacks, and Identity Theft​

DefendEdge Fights Cyber Attackers

What is social engineering?

In a social engineering scenario, the attacker (bad actor) uses human interaction through social media, email, or some other form of communications to obtain targeted information. These bad actors typically claim to be a new employee, repair person, or researcher and can offer false credentials to support their story. By asking questions, the bad actor may be able to piece together enough information to accomplish their mission. If an attacker is not able to gather enough information from one source, they may contact another source within the same organization and rely on the information from the first source to add to his or her credibility.

What is phishing?

Phishing is a method part of social engineering while the bad actor uses email or malicious websites to solicit information by posing as a trustworthy organization. For example, the bad actor may send email seemingly from a reputable company (Netflix, Amazon, Bank of America), often suggesting that there is a problem. When users respond with the requested information, the bad actor uses it to piece personal information together or have enough to gain access to the target’s accounts.

Phishing attacks may also appear to come from other types of organizations, such as charities, political affiliations, or a friend’s email. Attackers also often take advantage of current events and certain times of the year, such as

  • Natural disasters (e.g., Hurricane Katrina, Indonesian tsunami)
  • Epidemics and health scares (e.g., H1N1, COVID-19)
  • Economic concerns (e.g., IRS scams)
  • Major political elections
  • Holidays

What do they want?

In simple terms, someone wants access to confidential information you may or may not have part of your personal life or career. In most cases:

  • Your Username
  • Your Password
  • Date of Birth
  • Social Security Number
  • Bank Account
  • Identifiable Sensitive Information

The Attackers / Bad Actors  Goal

  • Character Defamation
  • Financial Gain (ransomware)
  • Corporate Sabotage
  • Fame

How does an Attacker, Hacker, Bad Actor make money?

The estimated cost of ransomware attacks has increased from $8 Billion in 2018 to $20 Billion in 2020.

What exactly is ransomware?

A type of malware that encrypts company data and holds information for ransom. Typically, hackers either encrypt data and make victims pay for a key or threaten to leak sensitive information.

How to improve your network defense?

  • Keep your operating system patched and up to date to ensure you have fewer vulnerabilities to exploit.
  • Do not install software or give it administrative privileges unless you know exactly what it is and what it does.
  • Install antivirus software, which detects malicious programs like ransomware as they arrive, and whitelisting software, which prevents unauthorized applications from executing in the first place.
  • And, of course, back up your files, frequently and automatically! That will not stop a malware attack, but it can make the damage caused by one much less significant.

For more Cyber Security Social Engineering Awareness Training contact DefendEdge

For Emergency Cyber Security Incident Response please email RedTeam@DefendEdge.com