• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
4 Reasons Why You Should Outsource Your SOC
May 1, 2020
Rewterz threat Advisory – SaltStack Vulnerability gets Ghost Blogging Platform Infected with Crypto-miner
May 4, 2020

Rewterz threat Alert – Bank of Costa Rica Hacked by Maze Ransomware Group

May 2, 2020

Severity

High

Analysis Summary

Maze aka ChaCha an infamous ransomware group in its recent statement released on its victim shaming website claims to have hacked into the Bank of Cost Rica in August 2019 but didn’t pursue the further attack citing reason that possible damage would be too high and in February 2020 during their routine check of previously accessed system they found out the bank security wasn’t improved they still had access to the bank network, Maze claims to have obtained years of transnational data including credit cards data of 11million with 4million unique credit cards in which 140,000 belongs to US citizens.

advisory-1588383180.png

As proof of this theft, Maze posted what they say are 240 credit card numbers, with the last four digits removed, along with expiration dates and credit card verification codes (CVC).

advisory-1588383182.png

Bank of Cost Rica is a state-owned commercial bank that operates in Costa Rica. With an equity of $806,606,710 and assets of $7,607,483,881, Founded in April 20, 1877 the bank of Cost Rica has established itself as one of the strongest banking companies in both Costa Rica and Central America.

The Maze ransomware, previously known in the community as “ChaCha ransomware” uses 2048 bit Rivest-Shamir-Adleman(RSA) and the ChaCha20 stream cipher to encrypt individual files. It appends different extensions to the files during theencryption process. It then changes the user’s desktopwallpaper to a message about the encrypted files and the file name ofthe dropped ransom note. A notable feature of Maze ransomware is that it sets the ransomware amount based on the type ofdevice it detects.This is uncommon among other types of ransomware. Maze operators have used the following labels to indicate the user’s computer type in the wallpaper message:

• standalone server • server in corporate network • workstation in corporate network • home computer • primary domaincontroller • backup server • very valuable for you

Maze Ransomware is distributed using several different ways. It has utilized the Spelevo and Fallout exploit kits and one of the vulnerabilities that Maze is targeting is the CVE-2018-15982 vulnerability in Flash Player. It is also worth noting that in the case of the Fallout kit, the users were redirected to the exploit from a fake cryptocurrency trading platform.Another observed attack vector is via email spam campaigns containing a Microsoft Office document with a malicious macro. For technical analysis of Maze ransomware please check Advisory # 7186.

Impact

  • Data Loss
  • Information Theft
  • Reputation Loss

Indicators of Compromise

SHA-256

  • 4218214f32f946a02b7a7bebe3059af3dd87bcd130c0469aeb21b58299e2ef9a
  • 5470f0644589685000154cb7d3f60280acb16e39ca961cce2c016078b303bc1b
  • c84b2c7ec20dd835ece13d5ae42b30e02a9e67cc13c831ae81d85b49518387b9
  • 9845f553ae868cd3f8d8c3f8684d18f226de005ee6b52ad88b353228b788cf73
  • 6d4836c75092d75f1d3a1d90100f19247473f9b0d7e12602221a7badf7feb29d
  • e49225cc26ec911a213eb942d7797e8eec6de3f793abc8bb30f4b89f14e72d96
  • b27bfa476a6915e573583c63b1d898913472ed86f224d5c470051359ceff8828
  • f97bda917e52379ae9fe06605e4f120f9c88aebea38d3b4aeb3c21d476ea4d39
  • 92125cc9aec53e2e7d0a67e8a53f0d6cb4a33f9ca73243d66b0397d7ddec907e
  • 3fd37d42d5821a8cbcf930255ca1259a680937e4e7dfa2d535d56121187806c2
  • eed70e8b4425aea2c6cd37c06c8789acbc049269d6f56d8968787383e82d23dc
  • 0606c6d918e0c02cea5fd85bfeb862c8ffe3eee4ef059cd8d2cd3ff342fdf9d9
  • 94673f34efc32e73523f8435acf0afce782ba4f68e9f71f80afbeb3b917162f3
  • 67f338c9f15b000aedac1d736fbce1ab27fd72a10d397315ba724b1dccf4e834
  • 4e1f7d397a07477bc3da1e1185a5960475817e9d04529b5bcc2068830262fa1b
  • d215134b504790b3a3850e4e28a056a5eb2afdd057828626838507792476a74d
  • abb36315ed6f708ba60c8cf70fdc0e327f7fbcfdfe33a403827e47a0155d1e4f
  • fe0a5682abc92037d79318d3f5bc6a920df2ceafaa5f1869406ee842c422f0e9

Remediation

Organizations can be targeted specifically by attackers, or they can be caught in the wide net cast by cyber crime operations. Large organizations are high value targets and attackers can demand bigger ransoms.

It is recommended to :

  • Back up important files regularly. Use the 3-2-1 rule. Keep three backups of your data, on two different storage types, and at least one backup offsite.
  • Apply the latest updates to your operating systems and apps.
  • Educate your employees so they can identify social engineering and spear-phishing attacks.
  • Controlled folder access. It can stop ransomware from encrypting files and holding the files for ransom.
  • Block all threat indicators at their respective controls.
  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.