An Interpol headline on November 25, 2020 announces "Three arrested as INTERPOL, Group-IB and the Nigeria Police Force disrupt prolific cybercrime group" however the article does not name the suspects. The Interpol article says the three are "believed to be members of a wider organized crime group responsible for distributing malware, carrying out phishing campaigns and extensive Business Email Compromise scams." Interpol's Craig Jones says the year-long investigation was known as "Operation Falcon."
Thursday, November 26, 2020
Major Nigerian Phishing and BEC Actors, SSGToolz and CeeCeeBossTMT, Arrested by Nigerian Police and Interpol
Sunday, November 15, 2020
ENISA: Top 15 Threats: Spam, Phishing, and Malware!
ENISA's Top 15 Threats report starts with this summary document:
A full report from ENISA is available for each of the topics below. Click to access each one. I'll only comment on a few in this blog post! |
#1 Cyber Threat - Malware
#2 Cyber Threat - Web-Based Attacks
#3 Cyber Threat - Phishing
#5 Cyber Threat - Spam
The ENISA Cybersecurity Threat Landscape
ENISA, the European Union Agency for CyberSecurity, met on October 6, 2020 to review their current recommendations and get any last minute changes. On October 20, 2020, they released a huge batch of reports that many folks seem to have not seen. We wanted to take a moment to give you the guided tour and strongly recommend the consumption of these report. Each publication is available "flip book" style on the ENISA website, and also as a downloadable PDF.
Let's get started!
https://www.enisa.europa.eu/publications/year-in-review |
This is the 8th Year In Review for ENISA and their reporting just keeps getting better! This year the main components of the report break down into topics like this:
- The Year In Review
- Cyber Threat Intelligence Overview
- Sectoral and Thematic Threat Analysis
- Main Incidents in the EU and WorldWide
- Research Topics
- Emerging Trends
- List of Top 15 Threats
The Year In Review
- Attack surface in cybersecurity continues to expand as we are entering a new phase of the digital transformation
- There will be a new social and economic norm after the COVID-19 pandemic even more dependent on a secure and reliable cyberspace.
- The use of social media platforms in targeted attacks is a serious trend and reaches different domains and types of threats.
- Finely targeted and persistent attacks on high-value data (e.g. intellectual property and state secrets) are being meticulously planned and executed by state-sponsored actors
- Massively distributed attacks with a short duration and wide impact are used with multiple objectives such as credential theft
- The motivation behind the majority of cyberattacks is still financial
- Ransomware remains widespread with costly consequences to many organisations
- Still many cybersecurity incidents go unnoticed or take a long time to be detected
- With more security automation, organizations will invest more in preparedness using Cyber Threat Intelligence as its main capability
- The number of phishing victims continues to grow since it exploits the human dimension being the weakest link.
Cyber Threat Intelligence Overview
- CTI is still primarily a MANUAL PROCESS in most organizations.
- Much CTI data is still primarily being passed through spreadsheets and email.
- CTI Requirements are becoming more defined and beginning to take significant guidance from business needs and executive input.
- CTI from Public Sources combined with observations from internal network and system monitoring is a popular model
- Open-source information, enriched by threat feeds from CTI vendors is a "clear upwards trend" indicating more focus on internal CTI production.
- Threat Detection is described as the main use for CTI, with IOCs being a base, but more interest in TTPs in the area of threat behavior and adversary tactics.
- Only 4% of respondents felt they could measure the effectiveness of their CTI programs! OUCH! Machine learning was ranked especially low, with most saying the skill of the analysts was the best predictor of success!
Sectoral and Thematic Threat Analysis
Main Incidents in the EU and WorldWide
- TURLA - attacking Microsoft Exchange serveres
- APT27 - mentions attacks against government SharePoint servers in the Middle East
- Vicious Panda - targeting Mongolian government entities
- Gamaredon - spear-phished the Ministry of Defence in Ukraine in December 2019
- Industrial property and Trade secrets
- State/Military classified information
- Server infrastructure
- Authentication Data
- Financial Data
Research Topics
- Better understanding of the human dimension of security - (I know so many great researchers in this space, from UAB's own Nitesh Saxena, to UAB's Ragib Hasan and his current survey on "User Preferences in Authentication" to Carnegie Mellon's Lorrie Cranor and the IIIT Delhi PreCog lab run by Ponnurangam "PK" Kumaraguru.)
- Cybersecurity research and innovation - with a special focus on building "test labs and cyber ranges" that better reflect real world deployments.
- 5G Security
- EU Research and Innovation Projects on Cybersecurity
- Rapid dissemination of CTI methods and content
Emerging Trends
- Attacks will be massively distributed with a short duration and a wider impact
- Finely targeted and persistent attacks will be meticulously planned with well-defined and long-term objectives
- Malicious actors will use digital platforms in targeted attacks
- The exploitation of business processes will increase
- The attack surface will continue expanding
- Teleworking will be exploited through home devices
- Attackers will come better prepared
- Obfuscation techniques will sophisticate
- The automated exploitation of unpatched systems and discontinued applications will increase
- Cyber threats are moving to the edge
List of Top 15 Threats
Saturday, November 07, 2020
US Victims of Indian Call Center Scams Send Cash to Money Mules Across the Country
On November 6, 2020, the US Attorney in the Eastern District of Virginia announced the sentence for a husband and wife, Chirag Choksi and Shachi Majmudar, both 36 years old. This pair had involved themselves in the money laundering side of an international scam ring that preys on the elderly via call centers located in India. Chirag will serve 78 months in prison while his wife Shachi will serve 14 months in prison.
I've had the pleasure of presenting my research on Indian Call Centers at a meeting the Federal Trade Commission hosted in Washington DC last year. The scope of these networks and the absolute impunity with which they operate should be a cause of national shame in India. In 2019, according to the Consumer Sentinel Network Data Book 2019, assembled by the Federal Trade Commission, reported 647,472 "Imposter Scams" with total losses of $667 Million, primarily to the elders who are most deserving of our protection. (These scams are increasing rapidly. In 2017 there were 461,476 Imposter Scam complaints, in 2018 there 549,732 complaints.)
The Scam: Law Enforcement Impersonation
The Money Mules: Choksi and Shachi
The Mule Recruiter: Shehzadkan Pathan
Shehzadkhan Khan Pathan |
- Pradipsinh Dharmendrasinh Parmar
- Sumer Kantilal Patel
- Jayeshkumar Prabhudas Deliwala
More Mules: Parmar, Patel
Pradispsinh Parmar |
Friday, October 16, 2020
Trickbot on the Ropes Part 2: The QQAAZZ Money Laundering Ring
While shutting down the technical aspects of malware is critical (see Trickbot on the Ropes Part 1), the real disincentive to the criminals is when you hit them hard in the money. That was the objective of Europol's Operation 2BaGoldMule case against QQAAZZ. Working with partners in 16 countries, including Latvia, Bulgaria, the United Kingdom, Spain, and Italy, Europol helped to coordinate search warrants being executed at 40 different residences in support of criminal proceedings in the United States, Portugal, and the UK, and Spain.
Europol put out a two-part InfoGraphic as part of their story on the arrests, "20 Arrests in QQAAZZ Multi-Million Money Laundering Case":
Infographic: https://www.europol.europa.eu/publications-documents/operation-2bagoldmule
Date Victim Bank Wire Attempt Beneficiary 07MAR2017 Schwab $75000 Aktrofi Services 20SEP2017 BOA $84900 Aktrofi Services 26OCT2017 JPMorgan Chase $98780 Privelegioasis 29NOV2017 American Express $121360 Selbevulte 30NOV2017 BB&T $72000 Privelegioasis 08MAR2018 USAA $29500 Flamingocloud 08MAR2018 USAA $29500 Colossal Devotion 21MAR2018 BOA $49000 Colossal Devotion 10APR2018 JPMorgan Chase $59426 Cardinal Gradual 10APR2018 JPMorgan Chase $59426 Cardinal Gradual 10APR2018 JPMorgan Chase $59426 Cardinal Gradual 30AUG2018 PNC $99693 Selbevulte 14NOV2018 BOA $56202 Aktrofi Services 14NOV2018 BOA $112921 Deinis Gorenko 14NOV2018 BOA $45830 Deinis Gorenko 06DEC2018 JPMorgan Chase $114652 Flamingocloud
- Nika Nazarovi - of Georgia - aka Nika Utiashvili, Mihail Atanasov, Stefan Trifonov Zhelyazkov
- Martins Ignatjevs - of Latvia - aka Yodan Angelov Stoyanov, Aleksander Tihomirov Yanev, Svetlin Iliyanov Asenov
- Aleksandre Kobiashvili - of Georgia - aka Antonios Nastas, Ognyan Krasimirov Trifonov
- Dmitrijs Kuzminovs - of Latvia - aka Parush Gospodinov
- Valentins Sevecs - of Latvia - aka Marek Jaswilko, Rafal Szczytko
- Dmitrijs Slapins - of Latvia
- Armens Vecels - of Latvia
- Artiom Capacli - of Bulgaria
- Ion Cebanu - of Romania
- TOmass Trescinkas - of Latvia
- Ruslans Sarapovs - of Latvia
- Silvestrs Tamenieks - of Latvia
- Abdelhak Hamdaoui - of Latvia
- Petar Iliev - of Belgium
- a technology company in Windsor, CT
- an Orthodox Jewish Synagogue in Brooklyn, NY
- a medical device manufacturer in York, Pennsylvania
- an individual in Montclair, NJ
- an architecture firm in Miami, FL
- an individual in Acworth, GA
- an automative parts manufacturer in Livonia, MI
- a homebuilder in Skokie, IL
- an individual in Carollton, TX
- an individual in Villa Park, CA.
Trickbot On The Ropes: Microsoft's Case Against Trickbot
Trickbot is having a truly bad time this month! While as of today, Trickbot binaries are being delivered by Emotet, there is every sign that they are struggling. Emotet's daily activities are best documented by a team of researchers using the collective identity "Cryptolaemus" and sharing news of IOCs and URLs on their website: https://paste.cryptolaemus.com/. With no activity from October 6th to 12th, there was every indication a "change" was coming, and beginning on 14OCT2020, researchers such as our friends at @CofenseLabs and @Malware_Traffic are both reporting that Trickbot is now being delivered by the Emotet spam-sending botnet.
This post examines Microsoft's case against Trickbot. However, there are also reports of U.S. Cyber Command taking a role in disrupting Trickbot, as reported by the Washington Post and security journalist Brian Krebs. In the "take-down" attempt, as described by Krebs, the bot began propagating to other bots that its new controller IP address should be "127.0.0.1:1" - which would result in the bot-infected computer stopping communication with the criminals. There was also an attempt to flood the criminals with millions of fake "stolen credentials" hoping to confuse their ability to sort out "true victims." As Krebs also reported, the fabulous Trickbot C&C tracker at FEODOTracker is reporting many live C&C addresses for Trickbot. (Also see Trickbot On the Ropes Part 2: the QQAAZZ Money Laundering Ring.)
The Microsoft Trickbot Case
On October 12, 2020, Microsoft announced "New action to combat ransomware ahead of U.S. election" describing Trickbot as malware that "has infected over a million computing devices around the world since late 2016." By filing a lawsuit in the U.S. District Court for the Eastern District of Virginia, Microsoft received permission for a Temporary Restraining Order (TRO). The Digital Crimes Unit (much love, guys!) worked with the FS-ISAC, ESET, Symantec, the Microsoft Defender team, NTT, and Lumen's Black Lotus Lab and others to lay out their case.
The legal documents surrounding the case are on the Microsoft website: NoticeOfPleadings.com/trickbot/
Microsoft and the FS-ISAC bring the case with a 60 page complaint, demonstrating harm to their respective customers in the Eastern District of Virginia, and demanding that "John Doe 1" and "John Doe 2" appear in court for a Jury Trial.
They charge them with violations of:
- The Copyright Act - 17 USC § § 101
- The Computer Fraud and Abuse Act 18 USC § 1030
- The Electronic Communications Privacy Act 18 USC § 2701
- Trademark Infringement under the Lanham Act 15 USC § 1114
- False Designation of Origin under the Lanham Act 15 USC § 1125(a)
- Trademark Dilution under the Lanham Act 15 USC § 1125(c)
- Common Law Trespasses to Chattels
- Unjust Enrichment
- and Conversion
- Input Output Flood, LLC of Las Vegas, for IP addresses:
- 104.161.32[.]103, .105, .106, .109, and .118.
- Hosting Solution Ltd (Hurricane Electric of Fremont, California) for IP address:
- 104.193.252[.]221.
- Nodes Direct Holdings of Jacksonville Florida for IP addresses:
- 107.155.137[.]7, .19, and .28,
- 162.216.0[.]163,
- 23.239.84[.]132, .136
- Virtual Machine Solutions, LLC of Los Angeles, California for IP addresses:
- 107.174.192[.]162 and
- 107.175.184[.]201
- Hostkey USA of New York for IP address:
- 139.60.163[.]45
- Fastlink Network Inc, of Los Angelese for IP address:
- 156.96.46[.]27
- Green Floid LLC for IP addresses:
- 195.123.241[.]13 and .55
- Twinservers Hosting of Nashua, New Hampshire for IP address:
- 162.247.155[.]165
Each team made significant contributions to the effort, and most have published their own Trickbot blogs, which I link below, with regards to the case, their most important function was to provide professional analysis in the form of a Declaration in Support of Motion for TRO:
- Lyons is Jason Lyons, a Senior Manager of Investigations at the DCU Malware & Cloud Crimes Team. Lyons, who served in the Cyber CounterIntelligence unit of the U.S. Army, provides 25 pages of testimony and ten "Exhibits." Part of his testimony included the proof of 25 million Gmail, 19 million Yahoo, 11 million Hotmail, 7 million AOL, 3.5 million MSN, and 2 million Yahoo.co.uk addresses known to have been targeted by Trickbot (based on reporting from Deep Instinct)
- Finones is Rodelio Finones, a Senior Security Software Engineer and Malware Researcher at the Microsoft DCU. He provides a 21 page testimony of his own investigation into Trickbot,
- Thakur is Vikram Thakur, the Technical Director of Symantec Enterprise, where he has been a major rockstar for more than a dozen years! He provides a 20 page testimony.
- Garlow is Kevin Garlow, Lead Information Security Engineer at LUMEN (formerly CenturyLink). His testimony includes the fact that he has identified 502 distinct IP addresses that had acted as Trickbot controllers, but that 40 of them have remained online despite more than 30 abuse notifications and that 9 of them have been sent more than 100 such notifications. He states that "We confirmed 55 new Trickbot controller IPs in September 2020 and 99 new Trickbot controller IPs in August." It is these long-lived "bullet-proof" controllers that Microsoft is targeting. It is also likely that revealing whoever is paying the bills for those long-lived services may be a path to identifying John Doe 1 and John Doe 2. Garlow's testimony that he has sent so many notices for take-down which have been ignored is a powerful part of this package!
- Silberstein is Steven Silberstein, the CEO of the FS-ISAC. He provides testimony to more than 500 fraud attempts against FS-ISAC member institutions over an 18 month period, with $7 Million in attempted fraud. One FS-ISAC member had dozens of attempts in a two week period with an average fraud attempt of $268,000!
- Ghaffari is Kayvan M. Ghaffari, an attorney with Crowell & Moring LLP for Microsoft and the FS-ISAC. His testimony calls out the particular web hosting companies that were hosting the machines targeted by the TRO, including Colocrossing, IOFlood, HostKey, VDI-Network, ENET-2, and King Servers, pointing out that all of these organizations have Terms of Service which are clearly violated by the Trickbot controllers. He then attaches as exhibits more than 650 pages of similar cases and the related court documents from them.
- Boutin is Jean-Ian Boutin, the Head of Threat Research, calls Trickbot "one of the most prolific and frequently encountered types of malware on the Internet."
Related TrickBot Blogs
ESET analyzed 125,000 malware samples and downloaded and decrypted 40,000 configuration files used by Trickbot modules, helping to map out the C&C servers by the botnet. While Trickbot can drop many "modules" these are not one-size-fits-all. Trickbot modules were sometimes dropped in phases after an initial assessment of the network on which the bot found itself, and other times varies by the "gtag" -- the unique label used to sign the infection, thought to be related to affiliates who paid the Trickbot operators.
gtag timeline by ESET |
Lumen's Black Lotus provided C2 timelines, demonstrating which IP addresses in which countries were active in which timeframes. Indonesia, for example, hosted active C2 servers on 1,362 days! Colombia and Ecuador, which by their count were #2 and #3 had only 652 and 637 C2 days by comparison. They shared 95 C2 addresses in their recent Look Inside the Trickbot Botnet blog post. Many of these IP addresses are also called out in Lyons testimony as Exhibit 2.
5.152.210[.]188 | 45.89.127[.]27 | 96.9.77[.]56 | 129.232.133[.]39 | 185.172.129[.]100 | 194.87.236[.]171 |
5.182.210[.]224 | 51.77.112[.]252 | 103.111.83[.]246 | 131.161.253[.]190 | 185.234.72[.]114 | 195.123.238[.]83 |
5.182.211[.]124 | 51.83.196[.]234 | 103.12.161[.]194 | 139.60.163[.]45 | 185.234.72[.]35 | 195.123.239[.]193 |
5.182.211[.]138 | 51.89.215[.]186 | 103.196.211[.]120 | 156.96.46[.]27 | 185.236.202[.]249 | 195.123.240[.]18 |
27.147.173[.]227 | 62.108[.]35.9 | 103.221.254[.]102 | 158.181.155[.]153 | 185.25.51[.]139 | 195.123.240[.]93 |
36.66.218[.]117 | 80.210.32[.]67 | 103.36.48[.]103 | 176.31.28[.]85 | 185.99.2[.]106 | 195.123.241[.]224 |
36.89.182[.]225 | 83.220.171[.]175 | 103.76.169[.]213 | 177.190.69[.]162 | 185.99.2[.]115 | 195.123.241[.]229 |
36.89.243[.]241 | 85.204.116[.]117 | 104.161.32[.]108 | 179.127.88[.]41 | 186.159.8[.]218 | 195.161.62[.]25 |
36.91.45[.]10 | 89.249.65[.]53 | 104.161.32[.]118 | 180.211.170[.]214 | 190.136.178[.]52 | 200.116.159[.]183 |
36.91.87[.]227 | 91.200.100[.]71 | 107.155.137[.]15 | 181.112.157[.]42 | 190.145.83[.]98 | 200.116.232[.]186 |
36.94.33[.]102 | 91.200.103[.]236 | 110.93.15[.]98 | 181.129.104[.]139 | 190.152.182[.]150 | 200.171.101[.]169 |
45.127[.]222.8 | 92.38.135[.]61 | 112.109.19[.]178 | 181.129.134[.]18 | 190.214.28[.]74 | 200.29.119[.]71 |
45.138.158[.]33 | 92.62.65[.]163 | 117.252.214[.]138 | 181.143.186[.]42 | 190.99.97[.]42 | 201.231.85[.]50 |
45.148.10[.]174 | 93.189.42[.]225 | 121.100.19[.]18 | 182.253.113[.]67 | 192.3.246[.]216 | 212.22.70[.]59 |
45.66.10[.]22 | 96.9.73[.]73 | 121.101.185[.]130 | 185.14.30[.]247 | 194.5.249[.]214 | 220.247.174[.]12 |
45.89.125[.]148 | 96.9.77[.]142 | 122.50.6[.]122 | 185.142.99[.]94 | 194.5.249[.]215 |
Symantec's blog post "Trickbot: U.S. Court Order Hits Botnet's Infrastructure" has a great infographic about "How Trickbot Works":
Microsoft on Trickbot's use of Covid-19 Lures
Microsoft is in a unique position to take action against malware, having visibility to so much malware-related traffic from browser telemetry, Microsoft Defender reports, and Office365 scans. In the past year, they have evaluated 6 Trillion messages and blocked 13 Billion malicious emails that used 1.6 Billion URLs to try to infect the email recipients!
Microsoft's Digital Defense Report 2020 points out that Trickbot began using COVID-19 spam lures on March 3, 2020, and went on to become the most prominent spam botnet using COVID-19 themes.
From MS Digital Defense Report 2020 |
We've long argued that if the lure is timely and controversial, people will click on it. That seems to be the case even today as ProofPoint's @ThreatInsight has pointed out, documenting that a recent malware campaign, first seen October 6, 2020, is using President Trump's diagnosis as a lure to infect people with additional malware, using the subject line "Recent material about the president's situation" and the promise of additional details in a password-protected email attachment.