Rewterz Threat Alert – STRRAT Malware – Active IOCs
December 2, 2022Rewterz Threat Advisory – Multiple GitLab Vulnerabilities
December 2, 2022Rewterz Threat Alert – STRRAT Malware – Active IOCs
December 2, 2022Rewterz Threat Advisory – Multiple GitLab Vulnerabilities
December 2, 2022Severity
High
Analysis Summary
Phobos Ransomware is based on the Dharma malware that first appeared at the beginning of 2019. It spreads into several systems via compromised Remote Desktop Protocol (RDP) connections. This malware does not use any UAC bypass methods. Unlike other cybercrime gangs that go after big hunts, Phobos creators go after smaller firms that don’t have sufficient funding to pay massive ransoms. This ransomware usually targets healthcare providers, with victims in the United States, Seychelles, Portugal, Brazil, Indonesia, Germany, Romania, and Japan. Its perpetrators demand a little ransom payment, which appeals to victims and enhances the chances of payment. The average Phobos ransom payment in July 2021 was $54,700.
Impact
- File Encryption
- Data Exfiltration
Indicators of Compromise
MD5
e76c5a5f3b8f69f6b390b812f24bb9af
SHA-256
c6960bb3329175489959ec95de0a83a3bd5f206f8cd7f46633e34a0227973d0e
SHA-1
107102c804bffc23c2c61f4ec7e554e0d8bbadbb
Remediation
- Block all threat indicators at your respective controls.
- Search for IOCs in your environment.
- Maintain cyber hygiene by updating your anti-virus software and implement patch management lifecycle.
- Maintain Offline Backups – In a ransomware attack, the adversary will often delete or encrypt backups if they have access to them. That’s why it’s important to keep offline (preferably off-site), encrypted backups of data and test them regularly.
- Emails from unknown senders should always be treated with caution.
- Never trust or open ” links and attachments received from unknown sources/senders.