Archive for category Rewterz News

Rewterz Threat Advisory – CVE-2020-1600 – Juniper Networks Junos OS Denial of Service in the RPD daemon

Severity

Medium

Analysis Summary

In a Point-to-Multipoint (P2MP) Label Switched Path (LSP) scenario, an uncontrolled resource consumption vulnerability in the Routing Protocol Daemon (RPD) in Juniper Networks Junos OS allows a specific SNMP request to trigger an infinite loop causing a high CPU usage Denial of Service (DoS) condition.

Impact

Denial of Service

Affected Vendors

Denial of Service

Affected Products

Juniper Networks Junos OS

Remediation

Please see vendor’s advisory for the list of affected products and updated versions.

https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10979&cat=SIRT_1&actp=LIST


Rewterz Threat Alert – Bank of America Phishing Campaign

Severity

Medium

Analysis Summary

A recent phishing campaign targeting Bank of America has been active and luring users to giveaway their credentials. It came in a very critical time when tensions are on the high between the US and Iran. It can be a move to destabilize the financial sector to gain advantage over the enemy and give a major setback to the economic front.

Impact

Credential theft

Indicators of Compromise

URL

  • http[:]//logind-bankofamarca[.]com/
  • http[:]//loginds-bankofamarca[.]com/
  • http[:]//logined-bankofamarca[.]com/

Remediation

  • Block all threat indicators at your respective controls.
  • Always be suspicious about emails sent by sent unknown senders.
  • Never click on the links/attachments sent by unknown senders.

Rewterz Threat Alert – LiquorBot Botnet

Severity

Medium

Analysis Summary

A Mirai-like botnet named “LiquorBot” was analyzed by Bitdefender researchers. Their blog post discusses the distribution method and goals of this botnet variant. In most cases the initial infection vector is via SSH brute-forcing, although it is also capable of exploiting several command injection and remote execution vulnerabilities. Installation of the malware begins with a dropper shell script that downloads a series of binaries from a remote server. These binaries are all LiquorBot samples but compiled for a variety of CPU architectures. Upon installation, the bot relaunches itself under the guise of the sshd daemon and subsequently clears its tracks. There are 3 servers involved in the botnet’s communication: a C2 server from which it receives commands, a mining server, and the server hosting the aforementioned binaries. The available commands include those to download and execute files or shutdown the server. Additionally, this botnet malware incorporates Monero cryptocurrency mining into its functionality.

Impact

Mine for cryptocurrency

Indicators of Compromise

SHA1

  • 14592719e2a354633131bc238f07aa0cb9cce698
  • 1611a8445085d1687c72b7e5a7c5602cbe580c8b
  • 1f15195ddc1e4174674fbf5d1fc95ed0a7726f7b
  • 2784a122089c20d5c02665da1241fe02f9ac90cc
  • 2901d4ee7f289bf0b1a863bec716d751f66a4324
  • 2d1d294aac29fab2041949d4cb5c58d3169a31d3
  • 31176239ab5187af5d89666f37038340b95a5a4e
  • 31d9ca734c5f4c1787131d3a1b6b91ca60e57794
  • 331ec23c250b86d912fa34e0e700bfcac1a7c388
  • 3453a96414e63a813b82c6d98fa3b76c1824abd8
  • 36382165bb53a7ed9387a02e5b9baee36fe23f64
  • 48c863e4ad23fb946386320f3a85391b54ba50ad
  • 49602256c8d65d0620d5abe8011a78425c7ae177
  • 54bdfa936c9eb4ea329ca35b95e471d51daef1d5
  • 5821ff8eb9b23035a520e1fb836e43b1ec87ffaf
  • 61abc90c20930c7615880ac9931778b48b9e6ebd
  • 63b556a0afcf643337310254cc7f57c729188f36
  • 65cd6a0371bdfffd7383907ba9a816e8e2e95da5
  • 6c7a92d5d68b68ddba10af7ca6350cfb24b2595f
  • 6d24c472b06e6f9ac3204ca768319d2b035a210a
  • 8364c272e0c95ed214c71dbcb48f89c468544bc8
  • 8df16857cb914f5eded0249cfde07f1c01697db1
  • a69f9f5f2ac15aec393ab68277ec268c0624fe91
  • b40f4f13b2b144946b165a2e4284c96fbc0d4682
  • b9dd4d230d103b3db458d752d4917466ec1cb9b0
  • ba55d92e3d7dba70205597433f1a98b35e4911b8
  • bb07341ab6b203687845ae38cd8c17dfc947e79f
  • c59dd90f7cefadaa80d9c0113f8af39e4ed0c1a1
  • c5adabbdbf641f3e53e3268af60ac1b26088aa6b
  • c6d850e264d7d8d6978cd85d69c22b29378e34e4
  • c7ed7241e2d21fa471b6bfd6b97b24b514b3c5f2
  • d216f33695421dfb17e69ed05aec46cf84b544b7
  • d59175ffacd8895362253a3bcb18637ced765fcd
  • d62cdd8f16a8f6b6cde5e8da633c224eab4765f2
  • e91f2d5df4ef43cb4c69b15de9a68c7ff2d4951d
  • fd65e6c5ae07c50c7d7639e2712c45324d4cf8de

Remediation

  • Block all threat indicators at your respective controls.
  • Always be suspicious about emails sent by unknown senders.
  • Never click on the links/attachments sent by unknown senders.

Rewterz Threat Advisory – CVE-2019-16005 – Cisco Webex Video Mesh Node Command Injection Vulnerability

Severity

Medium

Analysis Summary

The vulnerability is due to improper validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by logging in to the web-based management interface with administrative privileges and supplying crafted requests to the application. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system with root privileges on a targeted node.

Impact

Execute arbitrary commands

Affected Vendors

Cisco

Affected Products

Cisco Webex Video Mesh Software releases earlier than 2019.09.19.1956m

Remediation

Please see vendor’s advisory for more details.

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-webex-video


Rewterz Threat Alert – ZeroCleare Malware Debuts in Middle East Targeting Energy Sector

Severity

High

Analysis Summary

An overlapping attack activity carried by ITG013 (also known as “APT34” or “Oilrig”) and an unknown, probably Iranian cyber group targeting the energy sector in the Middle East. Further, it is assessed that access to at least one targeted environment was used to conduct a destructive attack using newly identified disk wiper malware, ZeroCleare. The attack timeline may have begun as early as Autumn of 2018 with reconnaissance scanning from various low cost/free VPN providers and gaining access to one of the accounts that was later involved in the attack. Then, in the Summer of 2019, the attackers used a password spray from a system on the local network to gain access to additional accounts, install ASPX webshells, and gain domain administration privileges. Finally, unknown actors spread a destructive wiper ZeroCleare across the target network and executed it. The ZeroCleare disk wiper malware had both x86 and x64 versions to execute across 32-bit and 64-bit operating systems. Interestingly, this malware incorporated the Eldos RawDisk driver, which was previously used in each of the Shamoon attacks, reportedly perpetrated by Iranian-linked threat actors.

Impact

Wipe out data from the infected host

Indicators of Compromise

IP

193[.]111[.]152[.]13

MD5

  • 33f98b613b331b49e272512274669844
  • 69b0cec55e4df899e649fa00c2979661
  • 1a69a02b0cd10b1764521fec4b7376c9
  • 993e9cb95301126debdea7dd66b9e121
  • 1ef610b1f9646063f96ad880aad9569d
  • eaea9ccb40c82af8f3867cd0f4dd5e9d

Remediation

  • Block all threat indicators at your respective controls.
  • Always be suspicious about emails sent by unknown senders.
  • Never click on the links/attachments sent by unknown senders.

Rewterz Threat Alert – The Dustman Malware Hits Bahrain’s national oil company

Severity

High

Analysis Summary

Iranian state-sponsored hackers have deployed a new strain of data-wiping malware on the network of Bahrain’s national oil company. The security incident came to light amid rising political tensions between the US and Iran after the US military killed a top Iranian military general in a drone strike last week. 

THE DUSTMAN MALWARE

Dustman is a so-called data wiper — malware designed to delete data on infected computers, once launched into execution. The main shared component between all three strains is EldoS RawDisk, a legitimate software toolkit for interacting with files, disks, and partitions. The three malware strains use different exploits and techniques to elevate initial access to admin-level, from where they unpack and launch the EldoS RawDisk utility to wipe data on infected hosts. 

Since Dustman is considered an evolved version of ZeroCleare, most of the code is the same, but Saudi CNA officials who analyzed the malware said Dustman comes with two important differences:

  • Dustman’s destructive capability and all needed drivers and loaders are delivered in one executable file as opposed to two files, as was the case with ZeroCleare.
  • Dustman overwrites the volume, while ZeroCleare wipes a volume by overwriting it with garbage data (0x55).
Bapco attack MO

Successful attacks resulted in all wiped systems showing a Blue Screen of Death (BSOD) message.

dustman-bsod.png

Impact

Data Destruction

Indicators of Compromise

SHA-256

  • 18c92f23b646eb85d67a890296000212091f930b1fe9e92033f123be3581a90f
  • f07b0c79a8c88a5760847226af277cf34ab5508394a58820db4db5a8d0340fc7
  • 2fc39463b6db44873c9c07724ac28b63cdd72f5863a4a7064883e3afdd141f8d

Remediation

  • Block all threat indicators at your respective controls.
  • Always be suspicious about emails sent by unknown senders.
  • Never click on the links/attachments sent by unknown senders.

Copyright © Rewterz. All rights reserved.