Rewterz Threat Alert – STOP (djvu) Ransomware Actively Spread
January 20, 2020Rewterz Threat Alert – FTCODE Ransomware — New Version Harvests Saved Credentials
January 21, 2020Rewterz Threat Alert – STOP (djvu) Ransomware Actively Spread
January 20, 2020Rewterz Threat Alert – FTCODE Ransomware — New Version Harvests Saved Credentials
January 21, 2020Severity
High
Analysis Summary
The Iranian cyber criminal group MuddyWater has resurfaced. The group primarily has targeted Middle Eastern, European and North American nations. The industries under target include telecommunications, government (IT services), and oil sectors. Indicators of compromise are given below.
Most of the campaigns by MuddyWater are designed upon socially engineering their victims into enabling macros in order to infect the targeted workstation. Once macros were enabled, the threat actor-written code would attempt to obtain a trojan hosted on an adversarial payload command and control node. This was a fully functional remote access trojan, that would allow the threat actors to interact with the compromised workstation via the adversarial interactive command and control node.
Impact
- Credential Theft
- Theft of sensitive information
Indicators of Compromise
Domain Name
pism[.]pl
Hostname
www[.]pism[.]pl
Source IP
5[.]101[.]0[.]209
37[.]128[.]98[.]144
URL
- http[:]//www[.]pism[.]pl/publikacje/biuletyn/nr-45-91
- https[:]//www[.]pism[.]pl/files/?id_plik=23304
- https[:]//www[.]pism[.]pl/publications/books/Eurozone_Enlargement_in_Times_of_Crisis_Challenges_for_the_V4_Countrie
- https[:]//www[.]pism[.]pl/publikacje/ksiazki/Kryzys_1939_roku_w_interpretacjach_polskich_i_rosyjskich_historyko
- http[:]//www[.]pism[.]pl/_inc/_assets’
- http[:]//www[.]pism[.]pl/_inc/_assets
Remediation
- Block the threat indicators at their respective controls.
- Do not download untrusted files from emails or random sources on the internet.
- Do not enable macros for untrusted files.