• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Advisory – CVE-2019-13537 – AVEVA Vijeo Citect and Citect SCADA Server Side Crash Vulnerability
October 21, 2019
Rewterz Threat Alert – Turla group Exploits Their CounterParts
October 21, 2019

Rewterz Threat ALert – Continued Activity of Kimsuky Group – IOC’s

October 21, 2019

Severity

High

Analysis Summary

The Kimsuky group is a threat group that is known to have been behind the KHNP (Korea Hydro & Nuclear Power) cyber terrorism attacks in 2014 and is still active as of 2019. The spear-phishing email used in the attack was designed with the purpose of stealing portal account information and attaching malicious code. The main targets of the attack are government  and military officials or reporters.

The malicious document is a question about ROK- US / China – Korea diplomacy related to North Korea policy on the Korean peninsula. The attacker inserted a n EPS image file format using the CVE 2017-8291 ghost vulnerability into the document to execute the malicious function. 

img.png
img.png

Impact

Exposure of sensitive information

Indicators of Compromise

MD5

42ae424f27d83fa132b2967b64f6ba21

SH256

  • 8ea86eb5844f537be71f98ff5ff5ffade8ff7b61a69406090495c92072140277
  • 0aa978d3ec302c57370201906148280a90baec51b99afdd334cc4e22e89fd037
  • d94f26158dc3fd9fd93aa7f38afe63f3893b00c03d04c08f0581323e3ee3de58
  • ed4c809ec7fb8aec56e4280b3f2867aa2eb75cd7db26464dd49d82ae99517b20

URL

  • http[:]//clouds[.]scienceontheweb[.]net/img/png/download[.]png/?filename=button03
  • http[:]//clouds[.]scienceontheweb[.]net/img/png/download[.]png/button03[.]down
  • http[:]//clouds[.]scienceontheweb[.]net/img/png/load[.]png/
  • http[:]//clouds[.]scienceontheweb[.]net/img/png/download[.]png/?filename=button04

Remediation

  • Block all threat indicators at your respective controls.
  • Always be suspicious about emails sent by unknown senders.
  • Never click on the links/attachments sent by unknown senders.
  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.