Rewterz Threat Alert – GuLoader Malspam Campaign – Active IOCs
August 25, 2022Rewterz Threat Update – France Hospital Center Hospitalier Sud Francilien Hit By A Ransomware Attack
August 25, 2022Rewterz Threat Alert – GuLoader Malspam Campaign – Active IOCs
August 25, 2022Rewterz Threat Update – France Hospital Center Hospitalier Sud Francilien Hit By A Ransomware Attack
August 25, 2022Severity
High
Analysis Summary
This financially-motivated advance persistence threat group is one of the most prolific cyber threat actor gangs in the world which has added ransomware to its attack arsenal. The organization gained infamy in 2014 after it stole a total of $1 billion from over 100 companies around the world. REvil has also been used by the threat group until they created their own RaaS (Ransomware as a Service), Darkside. The group has been behind many notorious hacks of 2018 and has also been linked to Ryuk. Researchers think FIN7 has a well-funded research and testing division that enables it avoid detection by antivirus and scanners.
The gang leverages PowerShell to automate tasks and maintain configurations throughout all of its intrusions, including a new backdoor named PowerPlant. In addition to the usual phishing techniques, its initial access methods have expanded to encompass software supply chain breach and the exploitation of stolen credentials.
Impact
- Information Theft and Espionage
Indicators of Compromise
MD5
- fb4696c4c8b1c1dfb2e74248bd22ed84
- ef94e0c8d6ca99dcda02476ca2fddd3f
SHA-256
- 520c825191a3924964e52385a8310bfd7b6a36e5b7ff07d4f9388024a2b74a95
- 0fde3063fc11bf3901d5323487e7407c30df22bee7d694e44aa689e9e755f74d
SHA-1
- cac5292335d60684d14bcc9fce39b61c689f8878
- 3ea2921a3619eaf9a95eb023a22215005924e8bb
URL
https[:]//195[.]123[.]218[.]99/
Remediation
- Logging – Log your eCommerce environment’s network activity and web server activity.
- Passwords – Implement strong passwords.
- Admin Access – limit access to administrative accounts and portals to only relevant personnel and make sure they are
- not publicly accessible.
- WAF – Set up a Web Application Firewall with rules to block suspicious and malicious requests.
- Patch – Patch and upgrade any platforms and software timely. Prioritize patching known exploited vulnerabilities.
- 2FA – Enable two-factor authentication.
- Antivirus – Enable antivirus and anti-malware software and update signature definitions in a timely manner.