Nov 10, 2021
94 Views
0 0

TrickBot teams up with Shatak phishers for Conti ransomware attacks

Written by

Microsoft urges Exchange admins to patch bug exploited in the wild
Microsoft November 2021 Patch Tuesday fixes 6 zero-days, 55 flaws
TeamTNT hackers target your poorly configured Docker servers
NUCLEUS:13 TCP security bugs impact critical healthcare devices
Void Balaur hackers-for-hire sell stolen mailboxes and private data
HPE says hackers breached Aruba Central using stolen access key
FBI warns of Iranian hackers looking to buy US orgs’ stolen data
Telnyx is the latest VoIP provider hit with DDoS attacks
Qualys BrowserCheck
STOPDecrypter
AuroraDecrypter
FilesLockerDecrypter
AdwCleaner
ComboFix
RKill
Junkware Removal Tool
How to remove the PBlock+ adware browser extension
Remove the Toksearches.xyz Search Redirect
Remove the Smashapps.net Search Redirect
Remove the Smashappsearch.com Search Redirect
Remove Security Tool and SecurityTool (Uninstall Guide)
How to remove Antivirus 2009 (Uninstall Instructions)
How to Remove WinFixer / Virtumonde / Msevents / Trojan.vundo
How to remove Google Redirects or the TDSS, TDL3, or Alureon rootkit using TDSSKiller
Locky Ransomware Information, Help Guide, and FAQ
CryptoLocker Ransomware Information Guide and FAQ
CryptorBit and HowDecrypt Information Guide and FAQ
CryptoDefense and How_Decrypt Ransomware Information Guide and FAQ
How to make the Start menu full screen in Windows 10
How to install the Microsoft Visual C++ 2015 Runtime
How to open an elevated PowerShell Admin prompt in Windows 10
How to Translate a Web Page in Google Chrome
How to start Windows in Safe Mode
How to remove a Trojan, Virus, Worm, or other Malware
How to show hidden files in Windows 7
How to see hidden files in Windows
eLearning
IT Certification Courses
Gear + Gadgets
Security
ransomware-lock
A threat actor tracked as Shatak (TA551) recently partnered with the ITG23 gang (aka TrickBot and Wizard Spider) to deploy Conti ransomware on targeted systems.
The Shatak operation partners with other malware developers to create phishing campaigns that download and infect victims with malware.
Researchers from IBM X-Force discovered that Shatak and TrickBot began working together in July 2021, with what appears to be good results, as the campaigns have continued until today.
A recent technical analysis from Cybereason provides more details on how the two distinct actors partnered to deliver ransomware attacks.
A typical infection chain starts with a phishing email sent by Shatak, carrying a password-protected archive containing a malicious document.
According to an October report by IBM X-Force, Shatak commonly uses reply-chain emails stolen from previous victims and adds password-protected archive attachments.
These attachments contain scripts that execute base-64 encoded code to download and install the TrickBot or BazarBackdoor malware from a remote site.
The distribution sites used in the most recent campaign are based in European countries such as Germany, Slovakia, and the Netherlands.
After successfully deploying TrickBot and/or BazarBackdoor, ITG23 takes over by deploying a Cobalt Strike beacon on the compromised system, adding it to the scheduled tasks for persistence.
The Conti actors then use the dropped BazarBackdoor for network reconnaissance, enumerating users, domain admins, shared computers, and shared resources.
Then they steal user credentials, password hashes, and Active Directory data, and abuse what they can to spread laterally through the network.
Some signs of this activity include fiddling with registry values that enable the RDP connectivity and modifying Windows Firewall rules with the ‘netsh’ command.
Windows Defender’s real-time monitoring feature is also disabled to prevent alerts or interventions during the encryption process.
The next step is data exfiltration, which is the final stage before the file encryption, with Conti using the ‘Rclone’ tool to send everything to a remote endpoint under their control.
After harvesting all valuable data from the network, the threat actors deploy the ransomware to encrypt devices.
In a recent report from France’s Computer Emergency Response Team (CERT), TA551 appears as a collaborator of ‘Lockean’, a newly discovered ransomware group with multiple affiliations.
In that case, Shatak was sending phishing emails to distribute the Qbot/QakBot banking trojan, which was used for deploying the ProLock, Egregor, and DoppelPaymer ransomware infections.
As such, TA551 may have more collaborations with other ransomware gangs besides those spotted by analysts.
This threat actor is also identified under different names, such as Shathak, UNC2420, and Gold Cabin.
The best defense against these types of attacks is to train employees on the risks of phishing emails.
Apart from that, admins should enforce the use of multi-factor authentication on accounts, disable unused RDP services, and regularly monitor the relevant event logs for unusual configuration changes.
Finally, an important safety measure is regularly backing up important data to a secured remote location and then taking those backups offline so they can’t be targeted by threat actors.
FIN12 hits healthcare with quick and focused ransomware attacks
Phishing emails deliver spooky zombie-themed MirCop ransomware
Snake malware biting hard on 50 apps for only $25
Russian orgs heavily targeted by smaller tier ransomware gangs
Sandhills online machinery markets shut down by ransomware attack
Not a member yet? Register Now
MediaMarkt hit by Hive ransomware, initial $240 million ransom
Microsoft urges Exchange admins to patch bug exploited in the wild
To receive periodic updates and news from BleepingComputer, please use the form below.
Terms of Use Privacy PolicyEthics Statement
Copyright @ 2003 – 2021 Bleeping Computer® LLC – All Rights Reserved
Not a member yet? Register Now
Read our posting guidelinese to learn what content is prohibited.

source

Article Categories:
Cybersecurity News

Comments are closed.