Rewterz Threat Advisory – ICS: Siemens SINEC NMS Vulnerabilities
March 9, 2022Rewterz Threat Advisory – Multiple Adobe Illustrator and After Effect Vulnerabilities
March 10, 2022Rewterz Threat Advisory – ICS: Siemens SINEC NMS Vulnerabilities
March 9, 2022Rewterz Threat Advisory – Multiple Adobe Illustrator and After Effect Vulnerabilities
March 10, 2022Severity
High
Analysis Summary
Phobos Ransomware is based on the Dharma malware that first appeared at the beginning of 2019. It spreads into several systems via compromised Remote Desktop Protocol (RDP) connections. This malware does not use any UAC bypass methods. Unlike other cybercrime gangs that go after big hunts, Phobos creators go after smaller firms that don’t have sufficient funding to pay massive ransoms. This ransomware usually targets healthcare providers, with victims in the United States, Seychelles, Portugal, Brazil, Indonesia, Germany, Romania, and Japan. Its perpetrators demand a little ransom payment, which appeals to victims and enhances the chances of payment. The average Phobos ransom payment in July 2021 was $54,700.
Impact
- File Encryption
- Data Exfiltration
Indicators of Compromise
MD5
- f4abb15b0f2ae805f0732379dc65cb5c
- 7cd34220e9ae004aac2f251b4c829238
- 39f311f675a991b169aba52d92bf1b76
SHA-256
- 196c144fd6c99f115561e39bc233f56e174ef609625d088578f2cd7b05abad3b
- e65778705e388300fd327bf330aa53ba61f139f4fc33e0eec9d062041318700e
- e629c768101653789642f9f32a3b480a1fc58484e770a9dec732edf8787a7ba0
SHA1
- c30c13ad37808ca7064505c628aa177b203a0c2f
- f0aa03395557a1e90f8fbeffa525d949563cc4c2
- b0130e1b3542316ed79eeb19e2079870941afa41
Remediation
- Block all threat indicators at your respective controls.
- Search for IOCs in your environment.