Rewterz Threat Advisory – CVE-2020-29012 – Fortinet FortiSandbox Security Vulnerability
September 10, 2021Rewterz Threat Advisory – CVE-2021-34870 – NETGEAR XR1000 Security Vulnerability
September 10, 2021Rewterz Threat Advisory – CVE-2020-29012 – Fortinet FortiSandbox Security Vulnerability
September 10, 2021Rewterz Threat Advisory – CVE-2021-34870 – NETGEAR XR1000 Security Vulnerability
September 10, 2021Severity
High
Analysis Summary
Phobos ransomware appeared at the beginning of 2019. It has been noted that this new strain of ransomware is strongly based on the previously known family: Dharma (a.k.a. Crysis), and probably distributed by the same group as Dharma. Phobos is one of the ransomware that is distributed via hacked Remote Desktop (RDP) connections. This isn’t surprising, as hacked RDP servers are a cheap commodity on the underground market, and can make for an attractive and cost-efficient dissemination vector for threat groups. This ransomware does not deploy any techniques of UAC bypass. When we try to run it manually, the UAC confirmation pops up:
Impact
- File Encryption
- Data Exfiltration
Indicators of Compromise
MD5
- 318f2a89931322c07c85d9ae7b73b72d
- 75d7f895c4c1abb6665f3aac4240d85e
SHA-256
- 23e988853dd3b11d7c335aa6d6299e0f834c02ea3db70343bea1d7f5a14a3f76
- 0572a3c0e86109bab8a29809971973c4617f039c636cc42c719507f487935e36
SHA-1
- 4f9f069c597618ef736e457482a5639053b109cc
- fada46f20243688d946b74f0f6a07a1c6d1c5abc
Remediation
- Block all threat indicators at your respective controls.
- Search for IOCs in your environment.